Re: Y2038-safe replacements for utmp/wtmp and lastlog

2024-05-07 Thread Craig Small
On Wed, 8 May 2024 at 09:03, Jun MO  wrote:

> 1) I hope there will still be the original
> w(1)/last(1)/lastb(1)/lastlog(1)/faillog(1)
> tools which can still read *old* format utmp/wtmp/lastlog in Debian at
> least for
> a while after switch to Y2038-safe replacements. Those tools can read
>

I can only speak for w.  It currently prefers what it gets from systemd or
elogind, effectively
iterating over the sessions coming from sd_get_sessions() if sd_booted()
returns true.

If sd_booted() returns false, then it uses the old utmp/utmpx files for
now. Besides the Y2038
issue, the utmp "API" is pretty awful with things like errors pretty much
undetectable. There is also
the problem about who (e.g. which process) should be writing to those files
as you have pointed out
in your email.

For now w/uptime will use utmp as a fallback, but I'll be happy if this
gets updated to something better; it's a low-priority
for me because systemd/elogind do what I need most of the time.

 - Craig


Bug#1022573: transition: procps

2022-12-30 Thread Craig Small
On Thu, 29 Dec 2022 at 05:04, Paul Gevers  wrote:

> With procps migrated to testing, dose [1] is reporting two more packages
> that weren't on our radar: open-vm-tools and guymager. Can you have a
>
Both these packages do not use any symbols from the old library and their
binary packages
do not depend on libprocps.

Looks like old dependencies so the removal of libprocps-dev from their
build dependency line in control is all that is needed.

I can do that, or the respective maintainers can.

 - Craig


Bug#1022573: transition: procps

2022-12-30 Thread Craig Small
OK, open-vm-tools doesn't even use the library so that's an easy fix.

On Sat, 31 Dec 2022 at 15:50, Craig Small  wrote:

> On Thu, 29 Dec 2022 at 05:04, Paul Gevers  wrote:
>
>> With procps migrated to testing, dose [1] is reporting two more packages
>> that weren't on our radar: open-vm-tools and guymager. Can you have a
>> look and help the maintainer with migrating to the new version of
>> procps? open-vm-tools has a new version in unstable that's now unable to
>> migrate.
>>
>  Odd they hadn't noticed it not compiling.  I think I have looked at both
> these before so I'll see what I can do.
>
>  - Craig
>
>


Bug#1022573: transition: procps

2022-12-30 Thread Craig Small
On Thu, 29 Dec 2022 at 05:04, Paul Gevers  wrote:

> With procps migrated to testing, dose [1] is reporting two more packages
> that weren't on our radar: open-vm-tools and guymager. Can you have a
> look and help the maintainer with migrating to the new version of
> procps? open-vm-tools has a new version in unstable that's now unable to
> migrate.
>
 Odd they hadn't noticed it not compiling.  I think I have looked at both
these before so I'll see what I can do.

 - Craig


Bug#1022573: transition: procps

2022-12-22 Thread Craig Small
On Thu, 22 Dec 2022 at 19:50, Paul Gevers  wrote:

> That's (in general) sub-optimal for the release team. We try hard to
> avoid entangling transitions and therefor we try to finish transitions
> sooner rather than later. My preference would be that you NMU (minimal
> changes) now; the maintainer can always update the pending changes after
> the migration happened.
>
Sure thing Paul; I have uploaded an NMU which is only the patch that gets
it to link to libproc2.

I know upstream made some slight changes, with the patch I sent them but it
was for things like
using exit instead of return for some functions when there was a failure,
but most of them used both anyway so it seemed
pretty arbitrary.  If /proc is unmounted or malloc fails, you're in a world
of hurt anyway.

Timo, if you need help getting the next version linked to libproc2 I've
done both versions so I can help.

 - Craig


Bug#1022573: procps transition status at Dec 22

2022-12-21 Thread Craig Small
#1024218 - apitrace - patch available
#1024219 - cpu-x - patch available at upstream git
#1024220 - deepin-screen-recorder - nil
#1024221 - intel-gpu-tools - patch available upstream, version issues
#1024223 - obs-advanced-scene-switcher - Done!
#1024224 - openscap - Done!
#1024225 - veyon - nil

I have patches for all but some cannot be tested due to the odd way their
build systems work.


Bug#1022573: transition: procps

2022-12-21 Thread Craig Small
(added the bug report for igt)
On Thu, 22 Dec 2022 at 08:29, Craig Small  wrote:

> On Thu, 22 Dec 2022 at 07:46, Paul Gevers  wrote:
>
>> An actual upload. If the maintainer isn't doing it, I think an NMU is
>> appropriate if you're sure of the fix.
>>
> Ah, I thought you were the igt maintainer :)
>
> I'll have a go recreating it and uploading it tonight. I'm pretty
> confident about the patches but don't use the package myself.
>
So the issue is that the changelog has updated the version to
1.26+git20221011-1 but this isn't uploaded or tagged.
I can either:
  Attach my patch for 1024221 to bug #1024221 and wait
  Update to 20221011 and add the patch, this both links to libproc2 and
updates the version
  Roll-back to 20220524 and add the patch, keeps the binary the same linked
to libproc2 but moves the changelog back

Ideally, I'd like 20221011 linked to libproc2 but I don't want to release a
new version of intel-gpu-tools as I'm not the maintainer and there might be
a reason its not being updated.

BUT, procps is in transition and this linking needs to happen before the
first freeze milestone so I will upload 20220525 linked to libproc2 if we
get near to running out of time.

 - Craig


>  - Craig
>
>


Bug#1022573: transition: procps

2022-12-21 Thread Craig Small
On Thu, 22 Dec 2022 at 07:46, Paul Gevers  wrote:

> An actual upload. If the maintainer isn't doing it, I think an NMU is
> appropriate if you're sure of the fix.
>
Ah, I thought you were the igt maintainer :)

I'll have a go recreating it and uploading it tonight. I'm pretty confident
about the patches but don't use the package myself.

 - Craig


Bug#1022573: transition: procps

2022-12-21 Thread Craig Small
On Thu, 22 Dec 2022 at 05:54, Paul Gevers  wrote:

> The issue is that src:intel-gpu-tools is a key packages but currently
> unfixed. Having procps migrate to testing now would cause it to be
> instantaneously RC buggy, but because it is key, we can't simply remove
> it from bookworm. Can you help fix this package in unstable?
>
I'm surprised there is an issue:
 * There has been a patch for it for a while now
 * Upstream have the patch and I believe is either in or still being
discussed
 * I've personally built igt Debian packages with that patch

Is there something else you need? This one was one of the easier ones to
fix.

 - Craig


Bug#1022573: transition: procps

2022-10-24 Thread Craig Small
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

The procps library is now finally changing. Over 20 years ago there was
a library to assist with the procps binaries but the API wasn't very
good nor not really intentioned for use outside procps.

The Bad: This change is a major API change. Basically nothing is like
what was before as far as the API is concerned. The library is still
about parsing the /proc filesystem but that's about it.
All packages will need patching and/or updating.

The Good: Upstream/me is able to provide patches as we've done these
fixes already.

Upstream has an issue tracking the dependent packages at[1]

The impacted packages are:
 * apitrace - Untested patches available
 * cpu-x - Upstream updated to new (interim API) minor fixes to get it
   working
 * deepin-screen-recorder - Embeds old pointers into functions, needs
   work
 * intel-gpu-tools - Patches available, upstream working on issue
 * obs-advanced-scene-switches - Have patches for 4.0.0, minor fix to
   get them to new API
 * openscap - Have patches for 4.0.0, minor fix for new API
 * veyon - No patches but a way forward

I can work with the relevant developers to get the API changed.

 - Craig

1: https://gitlab.com/procps-ng/procps/-/issues/239

Ben file:

title = "procps";
is_affected = .depends ~ 
/libproc2\-0|libproc\-dev|libprocps[0-9]|libprocps\-dev/;
is_good = .depends ~ /libproc2\-0|libproc\-dev/;
is_bad = .depends ~ /libprocps[0-9]|libprocps\-dev/;



Bug#996192: unblock: net-snmp/5.9.1+dfsg-3

2021-10-11 Thread Craig Small
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package net-snmp

[ Reason ]
net-snmp is not moving into bookworm due to a regression with
pyagentx. However there is reason to believe this is due to 
a race condition in pyagentx test script
https://salsa.debian.org/python-team/packages/pyagentx/-/merge_requests/2

[ Impact ]
net-snmp will stay at 5.9, specifically the AES improvements 
will not be there and anything else that was added in the
last year.

[ Tests ]
net-snmp passes all its autopkg tests see
https://qa.debian.org/excuses.php?package=net-snmp

[ Risks ]
I see no risk, the issue is pyagentx failing its tests.
It's not a linking issue, pyagentx is pure python but
uses snmpd to test itself. The problem is that if
the agentx starts faster than snmpd the test fails
because it cannot connect to the socket.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

[ Other info ]

unblock net-snmp/5.9.1+dfsg-3



Bug#992243: buster-pu: package psmisc/23.2-1+deb10u1

2021-09-04 Thread Craig Small
Thanks for looking after this Raphael! This will stop a lot a bug reports
about why does the process not get found.

 - Craig


On Sun, 5 Sep 2021, 01:01 Raphael Hertzog,  wrote:

> Hello,
>
> On Sat, 04 Sep 2021, Adam D. Barratt wrote:
> > On Mon, 2021-08-16 at 12:02 +0200, Raphael Hertzog wrote:
> > > I would like to update "psmisc" in buster to fix a regression in
> > > "killall". The bug https://bugs.debian.org/912748 was never fixed in
> > > that release and "killall command-longer-than-15-char" is thus not
> > > working at all in buster
> >
> > Please go ahead.
>
> Thanks, uploaded.
>
> Cheers,
> --
> Raphaël Hertzog ◈ Freexian SARL ◈ Tel: +33 (0)6 88 21 35 47
> https://www.freexian.com
>


Bug#987084: Acknowledgement (unblock: wordpress/5.7.1+dfsg1-1)

2021-04-20 Thread Craig Small
Hi,
  I have just got a bug report for WordPress about a messed up symlink in
one of the theme packages #986085. As a result, I'd like to change this
unblock from 5.7.1+dfsg1-1 to 5.7.1+dfsg1-2
The singular change between these two is fixing the symlink for
wordpress-theme-twentytwentyone

 - Craig


On Sat, 17 Apr 2021 at 21:15, Debian Bug Tracking System <
ow...@bugs.debian.org> wrote:

> Thank you for filing a new Bug report with Debian.
>
> You can follow progress on this Bug here: 987084:
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987084.
>
> This is an automatically generated reply to let you know your message
> has been received.
>
> Your message is being forwarded to the package maintainers and other
> interested parties for their attention; they will reply in due course.
>
> Your message has been sent to the package maintainer(s):
>  Debian Release Team 
>
> If you wish to submit further information on this problem, please
> send it to 987...@bugs.debian.org.
>
> Please do not send mail to ow...@bugs.debian.org unless you wish
> to report a problem with the Bug-tracking system.
>
> --
> 987084: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987084
> Debian Bug Tracking System
> Contact ow...@bugs.debian.org with problems
>


Bug#987084: unblock: wordpress/5.7.1+dfsg1-1

2021-04-17 Thread Craig Small
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Please unblock package wordpress

Currently Wordpress in Bullseye is 5.6.1 and is vulnerable to CVE-2021-29450
reported in bug #987065

There are really three options here, either
 a) Bullseye gets upgraded to 5.6.3 [1]; or
 b) Bullseye gets 5.6.1 that only has the patch
 c) WordPress in 5.7.1 in Sid is unblocked and put into Bullseye

My preference is to have Bullseye use 5.7.1, i.e. unblock from Sid,
hence this email.

This will make the inevitable security updates easier during the life of 
Bullseye
and will slow down "why is this version so old" emails I'll get.

I was hoping to get 5.7 into Bullseye anyway but missed the freeze.
With this security bug, there needs to be an update, it just comes
down to which one to do.

Patching only the change initially sounds good, but the issue is any
subsequent patches (and there will be security bugs in future) become
very difficult to do. Upstream may also assume a bug is not a bug due to
some previous fix (e.g. a change in 5.6.2 we don't put stops some
future security issue.

The issue of patching future WordPress 5.6.1+ versions is easy to see
by looking at upstreams source repository[2], there are two security
updates here.

So, 768f1d8 looks like a good contender for a PHP8 related problem
which is CVE-2021-29447[3] but where is the fix for CVE-2021-29450 [4]?
It's probably buried in c937087 "Grouped merges for 5.6.3"

This sort of thing happens all the time, its why for example Buster we
track 5.0.x [5] and Buster has 5.0.11 not 5.0.4+something.

[ Reason ]
To fix security bug CVE-2021-29450 [4] and to ensure that subsequent
security issues are properly handled for Bullseye.

[ Impact ]
Bullseye WordPress users will remain vulnerable OR we have to do some
special upload of 5.6.3 OR some patched thing which is almost but not
quite anything tested anywhere.

[ Tests ]
There are two sets of changes here. WordPress 5.7 has been out for
about a month with no reported issues, so its been tested on various
systems out there including my own.

WordPress 5.7.1 is new. Upstream have automated tests, I have run
this version on my on systems and not had any issues.

[ Risks ]
The change from 5.6.1 to 5.7.1 is big, about 20MB of data but that
would include things like minimised and unminimised javascript.

I'm not sure of the mix of upstream WordPress websites between
5.6.x and 5.7.x but I'd expect most track the latest upstream
meaning 5.7.1 would be used *way* more than 5.6.3

Nobody would be using the patched 5.6.1 option before its released.

[ Checklist ]
  [Y] all changes are documented in the d/changelog
  [Y] I reviewed all changes and I approve them
  [N] attach debdiff against the package in testing

[ Other info ]
I can provide the 25M debdiff if required, but I don't think it will be
useful.

1: https://wordpress.org/support/wordpress-version/version-5-6-3/
2: https://github.com/WordPress/WordPress/commits/5.6-branch
3: 
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-rv47-pc52-qrhh
4: 
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-pmmh-2f36-wvhq
5: 
https://metadata.ftp-master.debian.org/changelogs//main/w/wordpress/wordpress_5.0.11+dfsg1-0+deb10u1_changelog
unblock wordpress/5.7.1+dfsg1-1


-BEGIN PGP SIGNATURE-
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=GwCm
-END PGP SIGNATURE-



Bug#986443: unblock: procps/2:3.3.17-5

2021-04-06 Thread Craig Small
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Please unblock package procps

[ Reason ]
This version only adds a breaks and replaces against
manpages-fr-extra. In other words, only changes to the
control file.

[ Impact ]
#986276 - Depending on where the user is upgrading from
you may get an error updating procps with overwriten files.

[ Tests ]
I installed the package and it worked fine.

[ Risks ]
It's a 2 line change to the control file. Trivial change.

[ Checklist ]
  [Y] all changes are documented in the d/changelog
  [Y] I reviewed all changes and I approve them
  [Y] attach debdiff against the package in testing

[ Other info ]
Nil

unblock procps/2:3.3.17-5


-BEGIN PGP SIGNATURE-
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=4UIz
-END PGP SIGNATURE-
diff -Nru procps-3.3.17/debian/changelog procps-3.3.17/debian/changelog
--- procps-3.3.17/debian/changelog  2021-02-15 20:50:26.0 +1100
+++ procps-3.3.17/debian/changelog  2021-04-06 17:17:53.0 +1000
@@ -1,3 +1,9 @@
+procps (2:3.3.17-5) unstable; urgency=medium
+
+  * Add break/replace for conflicting manpages-fr-extra Closes: #986276
+
+ -- Craig Small   Tue, 06 Apr 2021 17:17:53 +1000
+
 procps (2:3.3.17-4) unstable; urgency=medium
 
   * Remove w alternative in postinst Closes: #982803
diff -Nru procps-3.3.17/debian/control procps-3.3.17/debian/control
--- procps-3.3.17/debian/control2021-02-15 20:50:26.0 +1100
+++ procps-3.3.17/debian/control2021-04-06 17:17:53.0 +1000
@@ -20,8 +20,10 @@
 Multi-Arch: foreign
 Depends: ${shlibs:Depends}, ${misc:Depends}, lsb-base (>= 3.0-10), 
init-system-helpers (>= 1.29~)
 Breaks: guymager (<= 0.5.9-1), open-vm-tools (<= 2011.12.20-562307-1 ),
-manpages-de (<< 4.9.1-2), manpages-fr (<< 4.9.1-2), manpages-pl (<< 
1:4.9.1-2)
-Replaces: manpages-de (<< 4.9.1-2), manpages-fr (<< 4.9.1-2), manpages-pl (<< 
1:4.9.1-2)
+manpages-de (<< 4.9.1-2), manpages-fr (<< 4.9.1-2), manpages-pl (<< 
1:4.9.1-2),
+manpages-fr-extra (<< 20151231+nmu1)
+Replaces: manpages-de (<< 4.9.1-2), manpages-fr (<< 4.9.1-2), manpages-pl (<< 
1:4.9.1-2),
+  manpages-fr-extra (<< 20151231+nmu1)
 Provides: watch
 Recommends: psmisc
 Description: /proc file system utilities


Bug#972149: buster-pu: package net-snmp/5.7.3+dfsg-5+deb10u1

2021-01-28 Thread Craig Small
I missed this. I'm uploading now although with the freeze it might not
matter anyway.

 - Craig


On Thu, 24 Dec 2020 at 16:52, Salvatore Bonaccorso 
wrote:

> Hi Craig,
>
> On Sun, Nov 22, 2020 at 07:09:29PM +, Adam D. Barratt wrote:
> > Control: tags -1 + confirmed
> >
> > On Tue, 2020-10-13 at 21:30 +1100, Craig Small wrote:
> > > The security release in deb10u1 made EXTEND-MIB read-only
> > > to close a security hole (CVE-2020-15862/Bug #9651166)
> > > However this meant the cacheTime and execType could not be
> > > changed which caused problems with some SNMP managers or setups.
> > >
> > > [ Impact ]
> > > The cachetime and execType cannot be set anywhere as these
> > > parameters appear in net-snmp 5.8 which is in sid but not
> > > buster.
> >
> > +net-snmp (5.7.3+dfsg-5+deb10u2) buster-security; urgency=high
> >
> > The distribution wants to simply be "buster" for a stable upload.
> >
> > +  * snmpd: Add cacheTime and execType flags to EXTEND-MIB.
> > +Previous security release made EXTEND-MIB read-only which meant
> > +it was not possible to set the timeout of the cache. This patch
> > +allows administrator to set the value in the snmpd.conf file.
> >
> > s/administrator// (or "the administrator", I guess).
> >
> > Bearing the above in mind, please go ahead.
>
> Did you saw this ack from Adam to upload it for buster-pu?
>
> Regards,
> Salvatore
>


Bug#972149: buster-pu: package net-snmp/5.7.3+dfsg-5+deb10u1

2020-10-13 Thread Craig Small
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

[ Reason ]
The security release in deb10u1 made EXTEND-MIB read-only
to close a security hole (CVE-2020-15862/Bug #9651166)
However this meant the cacheTime and execType could not be
changed which caused problems with some SNMP managers or setups.

[ Impact ]
The cachetime and execType cannot be set anywhere as these
parameters appear in net-snmp 5.8 which is in sid but not
buster.

[ Tests ]
Tested with Ubuntu
https://bugs.launchpad.net/ubuntu/+source/net-snmp/+bug/1892980
Upstream have the patch and their tests:
https://sourceforge.net/p/net-snmp/patches/1290/

My tests.
Install the candidate snmpd on a Debian10 VM
Configuration file is:
rocommunity public default
extend -cacheTime 10 test /usr/bin/date

Run snmpd using this configuration file

On a different host, run
watch -d snmpwalk -v 1 -c public  {test_server_ip} 
.1.3.6.1.4.1.8072.1.3.2.3.1.1.4

Notice the date only changes approximately every 10 seconds as the
result is cached.

[ Risks ]
The patch is about 30 additional lines.  Most users probably don't
use the "extend" option so won't exercise this or the buggy setup.

[ Checklist ]
  [*] *all* changes are documented in the d/changelog
  [*] I reviewed all changes and I approve them
  [*] attach debdiff against the package in (old)stable
  [*] the issue is verified as fixed in unstable

[ Changes ]
Adds two options to the extend command line parameter

[ Other info ]
None

- -- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.8.0-3-amd64 (SMP w/8 CPU threads)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_AU:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

-BEGIN PGP SIGNATURE-
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=gGjJ
-END PGP SIGNATURE-
diff -Nru net-snmp-5.7.3+dfsg/debian/changelog 
net-snmp-5.7.3+dfsg/debian/changelog
--- net-snmp-5.7.3+dfsg/debian/changelog2020-07-31 20:53:22.0 
+1000
+++ net-snmp-5.7.3+dfsg/debian/changelog2020-09-07 07:16:17.0 
+1000
@@ -1,3 +1,13 @@
+net-snmp (5.7.3+dfsg-5+deb10u2) buster-security; urgency=high
+
+  * snmpd: Add cacheTime and execType flags to EXTEND-MIB.
+Previous security release made EXTEND-MIB read-only which meant
+it was not possible to set the timeout of the cache. This patch
+allows administrator to set the value in the snmpd.conf file.
+Closes: #969508
+
+ -- Craig Small   Mon, 07 Sep 2020 07:16:17 +1000
+
 net-snmp (5.7.3+dfsg-5+deb10u1) buster-security; urgency=high
 
   * snmpd: Make EXTEND-MIB readonly access
diff -Nru net-snmp-5.7.3+dfsg/debian/patches/series 
net-snmp-5.7.3+dfsg/debian/patches/series
--- net-snmp-5.7.3+dfsg/debian/patches/series   2020-07-31 20:53:22.0 
+1000
+++ net-snmp-5.7.3+dfsg/debian/patches/series   2020-09-07 07:16:17.0 
+1000
@@ -44,3 +44,4 @@
 snmpd_stop_mib_indexes_files
 snmp_snmptrapd_disallow_user_change
 
+snmpd_cachetime_exectype
diff -Nru net-snmp-5.7.3+dfsg/debian/patches/snmpd_cachetime_exectype 
net-snmp-5.7.3+dfsg/debian/patches/snmpd_cachetime_exectype
--- net-snmp-5.7.3+dfsg/debian/patches/snmpd_cachetime_exectype 1970-01-01 
10:00:00.0 +1000
+++ net-snmp-5.7.3+dfsg/debian/patches/snmpd_cachetime_exectype 2020-09-07 
07:16:17.0 +1000
@@ -0,0 +1,85 @@
+Description: Add a couple of optional flags to the "extend" config
+ directive, enabling non-volatile configuration of a couple of aspects that so
+ far have been configurable only temporarily via SETs:
+ -cacheTime specifies the cache timeout
+Author: Jeff Gehlbach 
+Origin: upstream, 
https://github.com/net-snmp/net-snmp/commit/d8b12900629ed73a78b27535f08c4f0a721a93be
+Bug-Debian: https://bugs.debian.org/969508
+Applied-Upstream: 5.8
+Reviewed-by: Craig Small 
+Last-Update: 2020-09-05
+--- a/agent/mibgroup/agent/extend.c
 b/agent/mibgroup/agent/extend.c
+@@ -528,8 +528,27 @@

Re: Accepted net-snmp 5.8+dfsg-1 (source all amd64) into unstable, unstable

2019-10-20 Thread Craig Small
Hi Paul,
  The first two are just how SNMP works, you scan the table and... just
fall off it. The last looks like the perl error that has been fixed up.

I put some testing on the packages now and the salsa output is all green (I
have bypassed the reproducibility tests)[1]
This also includes a simple include the perl module test.

My reading of this is the "old" -1 is failing (the urls you sent) while the
"new" -2 is not (salsa url I sent). Is that how you see it?

Odd about the first two. Salsa is ok but other systems are not.

 - Craig



1: https://salsa.debian.org/debian/net-snmp/pipelines


On Mon, 21 Oct. 2019, 5:32 am Paul Gevers,  wrote:

> Hi Craig,
>
> On 15-10-2019 07:41, Paul Gevers wrote:
> > On 15-10-2019 01:15, Craig Small wrote:
> >>  I'll have to build a new version of net-snmp including the library to
> >> fix at least the perl problem.  For that second upload, do you want me
> >> to run it through experimental or just upload "normally"?
> >
> > As the new soname is already in unstable, and there is no new binary
> > package (I hope), there is no need to use experimental. Our "need" for
> > experimental is to clear the NEW queue and in case of transitions to
> > have an automatically generated ben file for the transition tracker,
> > such that we can plan transitions. Both of these reasons don't apply
> > anymore to new uploads of net-snmp as long as the soname isn't bumped
> again.
> >
> >> With the RC bug, it's not going anywhere fast in its current state.
> >
> > Ack.
>
> Any progress with net-snmp?
>
> Also, I'll like to draw your attention to 3 autopkgtest regressions [1]
> which are also blocking migration. Two have seemingly the same error:
> [2]:
> PACEMAKER-PCS-V1-MIB::pcmkPcsV1 = No more variables left in this MIB
> View (It is past the end of the MIB tree)
> [3]:
> iso.3.6.1.4.1.8072.. = No more variables left in this MIB View
> (It is past the end of the MIB tree)
>
> The third seems to require an update in your reverse (test) dependencies
> [4], but I could be wrong:
> # Can't load
>
> '/usr/lib/x86_64-linux-gnu/perl5/5.30/auto/NetSNMP/default_store/default_store.so'
> for module NetSNMP::default_store:
>
> /usr/lib/x86_64-linux-gnu/perl5/5.30/auto/NetSNMP/default_store/default_store.so:
> undefined symbol: netsnmp_ds_get_boolean at
> /usr/lib/x86_64-linux-gnu/perl/5.30/DynaLoader.pm line 193.
>
> Paul
>
> [1] https://qa.debian.org/excuses.php?package=net-snmp
> [2]
> https://ci.debian.net/data/autopkgtest/testing/amd64/p/pcs/3208873/log.gz
> [3]
>
> https://ci.debian.net/data/autopkgtest/testing/amd64/p/pyagentx/3208874/log.gz
> [4]
>
> https://ci.debian.net/data/autopkgtest/testing/amd64/libs/libsnmp-info-perl/3208872/log.gz
>
>


Re: Accepted net-snmp 5.8+dfsg-1 (source all amd64) into unstable, unstable

2019-10-14 Thread Craig Small
Hi,
 I'll have to build a new version of net-snmp including the library to fix
at least the perl problem.  For that second upload, do you want me to run
it through experimental or just upload "normally"?
With the RC bug, it's not going anywhere fast in its current state.
 - Craig


On Tue, 15 Oct 2019 at 07:24, Paul Gevers  wrote:

> Hi Craig,
>
> On 14-10-2019 04:27, Craig Small wrote:
> > Hi Paul (and others),
> >   I think I see the problem, the wiki has two places for transition.
> >
> > https://wiki.debian.org/TransitionBestPractices which speaks to the
>
> Whow, not updated since 2014.
>
> > developer and doesn't mention at all things like going into experimental
> and
> > https://wiki.debian.org/Teams/ReleaseTeam/Transitions which initially
>
> Which is linked from https://release.debian.org/transitions/
>
> > looks more like what the transition team need to do but has important
> > instructions for developers.
>
> Yes, that page is totally meant for developers.
>
> > So it seems Debian's documentation strikes again.
>
> Ack. I'll fix the first wiki page you mentioned. Thanks for bringing
> that up.
>
> > My understanding of experimental was it was used for, well, experimental
> > stuff. However, the release teams page uses this as a standard workflow.
>
> Yes, as has been communicated multiple times. Last that I know of (about
> the source-only issue):
> https://lists.debian.org/debian-devel-announce/2019/07/msg2.html
>
> The documentation about how to start transitions is indeed the second
> wiki you mention.
>
> > Regarding the source only uploads, this is the message you get if you
> > try that.
> >
> > Source-only uploads to NEW are not allowed.
> >
> > binary:libsnmp35 is NEW.
> > binary:libsnmp35-dbg is NEW.
>
> Ack
>
> > My understanding now is this running through experimental hack will
> > "fix" this issue. You upload, I guess the full binary/source into
> > experimental, wait, and then it's fine for sid once its updates.
>
> Indeed.
>
> > It looks like its going to be stuck in sid anyway, there is a
> > perl-related problem that is somehow related to what the Debian
> > packaging is doing to the module (it works ok as a plain upstream thing).
>
> I'm subscribed to the snmp bugs (because of my cacti-spine reverse
> dependency), so I saw that.
>
> Paul
>
>


Re: Accepted net-snmp 5.8+dfsg-1 (source all amd64) into unstable, unstable

2019-10-13 Thread Craig Small
Hi Paul (and others),
  I think I see the problem, the wiki has two places for transition.

https://wiki.debian.org/TransitionBestPractices which speaks to the
developer and doesn't mention at all things like going into experimental and
https://wiki.debian.org/Teams/ReleaseTeam/Transitions which initially looks
more like what the transition team need to do but has important
instructions for developers.
So it seems Debian's documentation strikes again.

My understanding of experimental was it was used for, well, experimental
stuff. However, the release teams page uses this as a standard workflow.

Regarding the source only uploads, this is the message you get if you try
that.

Source-only uploads to NEW are not allowed.

binary:libsnmp35 is NEW.
binary:libsnmp35-dbg is NEW.

My understanding now is this running through experimental hack will "fix"
this issue. You upload, I guess the full binary/source into experimental,
wait, and then it's fine for sid once its updates.

It looks like its going to be stuck in sid anyway, there is a perl-related
problem that is somehow related to what the Debian packaging is doing to
the module (it works ok as a plain upstream thing).

 - Craig



On Mon, 14 Oct 2019 at 07:27, Craig Small  wrote:

> Hi,
>  Source only uploads get automatically rejected so someone needs to fix
> that then. I originally did upload source only for net-snmp but got the
> reject message.
>
> I never have run a soname change through experimental for any of my
> packages before, is this a new thing?
>
> On Mon, 14 Oct. 2019, 6:49 am Paul Gevers,  wrote:
>
>> Dear Craig,
>>
>> Next time, can you please start your transition in experimental?
>> Everybody is supposed to coordinate transitions with us such that they
>> don't interfere with ongoing transitions. I think we're lucky [1], but
>> there were others waiting for a transition slot, so this isn't nice to
>> them.
>>
>> You'll also have to upload a source-only upload because we're not
>> allowing binary packages that aren't build on a buildd to propagate to
>> testing anymore, so please do that ASAP.
>>
>> Paul
>>
>> [1] https://release.debian.org/transitions/html/auto-net-snmp.html
>>
>> > Changes:
>> >  net-snmp (5.8+dfsg-1) unstable; urgency=medium
>>
>> [...]
>>
>> >* Library soname updated to 35
>>
>>


Re: Accepted net-snmp 5.8+dfsg-1 (source all amd64) into unstable, unstable

2019-10-13 Thread Craig Small
Hi,
 Source only uploads get automatically rejected so someone needs to fix
that then. I originally did upload source only for net-snmp but got the
reject message.

I never have run a soname change through experimental for any of my
packages before, is this a new thing?

On Mon, 14 Oct. 2019, 6:49 am Paul Gevers,  wrote:

> Dear Craig,
>
> Next time, can you please start your transition in experimental?
> Everybody is supposed to coordinate transitions with us such that they
> don't interfere with ongoing transitions. I think we're lucky [1], but
> there were others waiting for a transition slot, so this isn't nice to
> them.
>
> You'll also have to upload a source-only upload because we're not
> allowing binary packages that aren't build on a buildd to propagate to
> testing anymore, so please do that ASAP.
>
> Paul
>
> [1] https://release.debian.org/transitions/html/auto-net-snmp.html
>
> > Changes:
> >  net-snmp (5.8+dfsg-1) unstable; urgency=medium
>
> [...]
>
> >* Library soname updated to 35
>
>


Bug#925314: unblock: wordpress/5.0.3+dfsg1-1

2019-03-23 Thread Craig Small
Hi,
  Attached is a debdiff between 5.0.3 to 5.04 which is essentially the
changesets I previously reference from the upstream SVN repository.

Option 1 is my preference, the main difference between #1 and #2 was the
changelog version.

 - Craig
diff -Nru wordpress-5.0.3+dfsg1/debian/changelog wordpress-5.0.4+dfsg1/debian/changelog
--- wordpress-5.0.3+dfsg1/debian/changelog	2019-02-05 22:23:39.0 +1100
+++ wordpress-5.0.4+dfsg1/debian/changelog	2019-03-24 09:20:02.0 +1100
@@ -1,3 +1,10 @@
+wordpress (5.0.4+dfsg1-1) testing-proposed-updates; urgency=medium
+
+  * Backport of 5.1.1 patches
+  * Fix XSS security hole in comments Closes: #924546 CVE-2019-9787
+
+ -- Craig Small   Sun, 24 Mar 2019 09:20:02 +1100
+
 wordpress (5.0.3+dfsg1-1) unstable; urgency=medium
 
   * New upstream release
diff -Nru wordpress-5.0.3+dfsg1/wp-admin/about.php wordpress-5.0.4+dfsg1/wp-admin/about.php
--- wordpress-5.0.3+dfsg1/wp-admin/about.php	2019-02-05 21:54:35.0 +1100
+++ wordpress-5.0.4+dfsg1/wp-admin/about.php	2019-03-24 09:14:11.0 +1100
@@ -65,6 +65,26 @@
 			
 Version %s addressed some security issues.' ),
+	'5.0.4'
+);
+?>
+the release notes.' ),
+	sprintf(
+		/* translators: %s: WordPress version */
+		esc_url( __( 'https://wordpress.org/support/wordpress-version/version-%s/' ) ),
+		sanitize_title( '5.0.4' )
+	)
+);
+?>
+			
+			
+Version %1$s addressed %2$s bug.',
diff -Nru wordpress-5.0.3+dfsg1/wp-admin/includes/ajax-actions.php wordpress-5.0.4+dfsg1/wp-admin/includes/ajax-actions.php
--- wordpress-5.0.3+dfsg1/wp-admin/includes/ajax-actions.php	2019-02-05 21:54:35.0 +1100
+++ wordpress-5.0.4+dfsg1/wp-admin/includes/ajax-actions.php	2019-03-24 09:14:11.0 +1100
@@ -1070,6 +1070,8 @@
 			if ( wp_create_nonce( 'unfiltered-html-comment' ) != $_POST['_wp_unfiltered_html_comment'] ) {
 kses_remove_filters(); // start with a clean slate
 kses_init_filters(); // set up the filters
+remove_filter( 'pre_comment_content', 'wp_filter_post_kses' );
+add_filter( 'pre_comment_content', 'wp_filter_kses' );
 			}
 		}
 	} else {
diff -Nru wordpress-5.0.3+dfsg1/wp-includes/comment.php wordpress-5.0.4+dfsg1/wp-includes/comment.php
--- wordpress-5.0.3+dfsg1/wp-includes/comment.php	2019-02-05 21:54:35.0 +1100
+++ wordpress-5.0.4+dfsg1/wp-includes/comment.php	2019-03-24 09:14:11.0 +1100
@@ -3098,6 +3098,8 @@
 			) {
 kses_remove_filters(); // start with a clean slate
 kses_init_filters(); // set up the filters
+remove_filter( 'pre_comment_content', 'wp_filter_post_kses' );
+add_filter( 'pre_comment_content', 'wp_filter_kses' );
 			}
 		}
 	} else {
diff -Nru wordpress-5.0.3+dfsg1/wp-includes/formatting.php wordpress-5.0.4+dfsg1/wp-includes/formatting.php
--- wordpress-5.0.3+dfsg1/wp-includes/formatting.php	2019-02-05 21:54:35.0 +1100
+++ wordpress-5.0.4+dfsg1/wp-includes/formatting.php	2019-03-24 09:14:11.0 +1100
@@ -2750,10 +2750,12 @@
 	$atts = shortcode_parse_atts( $matches[1] );
 	$rel  = 'nofollow';
 
-	if ( preg_match( '%href=["\'](' . preg_quote( set_url_scheme( home_url(), 'http' ) ) . ')%i', $text ) ||
-	 preg_match( '%href=["\'](' . preg_quote( set_url_scheme( home_url(), 'https' ) ) . ')%i', $text )
-	) {
-		return "";
+	if ( ! empty( $atts['href'] ) ) {
+		if ( in_array( strtolower( wp_parse_url( $atts['href'], PHP_URL_SCHEME ) ), array( 'http', 'https' ), true ) ) {
+			if ( strtolower( wp_parse_url( $atts['href'], PHP_URL_HOST ) ) === strtolower( wp_parse_url( home_url(), PHP_URL_HOST ) ) ) {
+return "";
+			}
+		}
 	}
 
 	if ( ! empty( $atts['rel'] ) ) {
@@ -2766,11 +2768,11 @@
 
 		$html = '';
 		foreach ( $atts as $name => $value ) {
-			$html .= "{$name}=\"$value\" ";
+			$html .= "{$name}=\"" . esc_attr( $value ) . "\" ";
 		}
 		$text = trim( $html );
 	}
-	return "";
+	return "";
 }
 
 /**
diff -Nru wordpress-5.0.3+dfsg1/wp-includes/version.php wordpress-5.0.4+dfsg1/wp-includes/version.php
--- wordpress-5.0.3+dfsg1/wp-includes/version.php	2019-02-05 21:54:35.0 +1100
+++ wordpress-5.0.4+dfsg1/wp-includes/version.php	2019-03-24 09:14:11.0 +1100
@@ -4,7 +4,7 @@
  *
  * @global string $wp_version
  */
-$wp_version = '5.0.3';
+$wp_version = '5.0.4';
 
 /**
  * Holds the WordPress DB revision, increments when changes are made to the WordPress DB schema.
@@ -33,3 +33,4 @@
  * @global string $required_mysql_version
  */
 $required_mysql_version = '5.0';
+	
\ No newline at end of file


Bug#925314: Acknowledgement (unblock: wordpress/5.0.3+dfsg1-1)

2019-03-22 Thread Craig Small
I probably should have stated it in the initial email but if you are asking
what my preference is, it would be to have WordPress 5.0.4 in Buster.

The difference between 5.0.4 and 5.0.3 currently in Buster is the security
fixes.

 - Craig


Bug#925314: unblock: wordpress/5.0.3+dfsg1-1

2019-03-22 Thread Craig Small
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package wordpress

WordPress 5.0.3 has a security bug #924546 which was fixed in upstream
version 5.1.1 [1]

Sid has 5.1.1 which has this fix, however it also has all the
non-security fixes of 5.1 as well.

For stretch, there is a patch ready to go for 4.7.5, seen at [2] that
covers only the security fixes.

If Buster was released, I'd prepare a security patch that would be
almost-identical to the Stretch fix, taken from [3] which is where
upstream tracks 5.0.x releases, using  changeset 44835 and 44844.

So, we have a few options:
1) Update Buster WordPress 5.0.3 to 5.0.4 which is the security fixes
2) Make a security release for Buster, effectively what (1) is with
different version numbers
3) Update Buster to follow Sid, which is a major update, 5.1.1
4) Do nothing and wait until Buster is released and then fix it.

I haven't prepared differences yet because depending on the answer you
get a different debdiff.

 - Craig

1: 
https://wordpress.org/news/2019/03/wordpress-5-1-1-security-and-maintenance-release/
2: 
https://salsa.debian.org/debian/wordpress/commit/a903dc48fb4177b15642c2c50912de50adb77c73
3: https://core.trac.wordpress.org/log/branches/5.0

unblock wordpress/5.0.3+dfsg1-1

-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-2-amd64 (SMP w/6 CPU cores)
Locale: LANG=en_AU.utf8, LC_CTYPE=en_AU.utf8 (charmap=UTF-8), LANGUAGE=en_AU:en 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#779962: unblock: procps/2:3.3.9-9

2015-03-06 Thread Craig Small
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package procps
This is to fix #775624 which FTBFS depending on the kernel version used.
The fix is a four line diff which moves some output lines before the
check that passes/fails depending on the kernel response.

Either look in the source of procps for the patch
bts775624-pmap-xoutput or on the BTS at
https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=42;filename=procps-pmap-xoutput.diff;att=1;bug=775624

debdiff:
File lists identical (after any substitutions)

Control files: lines which differ (wdiff format)

Version: [-2:3.3.9-8-] {+2:3.3.9-9+}

dsc debdiff attached.


unblock procps/2:3.3.9-9

-- System Information:
Debian Release: 8.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/6 CPU cores)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
diff -Nru procps-3.3.9/debian/changelog procps-3.3.9/debian/changelog
--- procps-3.3.9/debian/changelog	2014-09-28 09:45:14.0 +1000
+++ procps-3.3.9/debian/changelog	2015-03-07 08:12:02.0 +1100
@@ -1,3 +1,9 @@
+procps (2:3.3.9-9) unstable; urgency=medium
+
+  * pmap: output with unreadale /proc/1/smaps Closes: #775624
+
+ -- Craig Small csm...@debian.org  Sat, 07 Mar 2015 08:11:15 +1100
+
 procps (2:3.3.9-8) unstable; urgency=medium
 
   * Revert to 3.3.9 upstream for Jessie freeze
diff -Nru procps-3.3.9/debian/patches/bts775624-pmap-xoutput procps-3.3.9/debian/patches/bts775624-pmap-xoutput
--- procps-3.3.9/debian/patches/bts775624-pmap-xoutput	1970-01-01 10:00:00.0 +1000
+++ procps-3.3.9/debian/patches/bts775624-pmap-xoutput	2015-03-07 08:12:02.0 +1100
@@ -0,0 +1,29 @@
+Description: pmap: output when smaps unreadable
+ If smaps can be opened but not readable, the output
+ is now the same as if the file cannot be opened
+Bug-Debian: https://bugs.debian.org/775624
+Last-Update: 2015-03-07
+--- a/pmap.c
 b/pmap.c
+@@ -532,6 +532,10 @@
+ 	 */
+ 	int maxcmd = 0xf;
+ 
++	escape_command(cmdbuf, p, sizeof cmdbuf, maxcmd,
++		   ESC_ARGS | ESC_BRACKETS);
++	printf(%u:   %s\n, p-tgid, cmdbuf);
++
+ 	if (x_option || X_option || c_option) {
+ 		sprintf(buf, /proc/%u/smaps, p-tgid);
+ 		if ((fp = fopen(buf, r)) == NULL)
+@@ -542,10 +546,6 @@
+ 			return 1;
+ 	}
+ 
+-	escape_command(cmdbuf, p, sizeof cmdbuf, maxcmd,
+-		   ESC_ARGS | ESC_BRACKETS);
+-	printf(%u:   %s\n, p-tgid, cmdbuf);
+-
+ 	if (X_option || c_option) {
+ 		print_extended_maps(fp);
+ 		return 0;
diff -Nru procps-3.3.9/debian/patches/series procps-3.3.9/debian/patches/series
--- procps-3.3.9/debian/patches/series	2014-09-28 09:45:14.0 +1000
+++ procps-3.3.9/debian/patches/series	2015-03-07 08:12:02.0 +1100
@@ -1,3 +1,4 @@
+bts775624-pmap-xoutput
 bts743758_vmstat_test
 top_defines
 uptime_test


Re: Bug#772862: Pending dpkg upload will Break your package due to trigger cycle in your package

2014-12-28 Thread Craig Small
On Sun, Dec 28, 2014 at 11:31:39AM +0100, Raphael Hertzog wrote:
 We have been pushing new upstream releases as security updates both in
 wheezy and in squeeze. It's likely that this will need to happen again
 during the 5 years of Jessie.
 
 Given this, it seems to me that pushing wordpress 4.1 in Jessie during the
 freeze should be considered too.
For the same reason, I agree with Raphael.  The short-term pain for
getting wordpress 4.1 in will benefit over its lifecycle as the newer
the package is to the then current the easier it is to maintain it.

If there must only be a change for this fix, I can change the trigger
line only, but it is a second preference.

 - Craig

-- 
Craig Small (@smallsees)   http://enc.com.au/   csmall at : enc.com.au
Debian GNU/Linux   http://www.debian.org/   csmall at : debian.org
GPG fingerprint:5D2F B320 B825 D939 04D2  0519 3938 F96B DF50 FEA5


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20141228110056.gb30...@enc.com.au



Bug#770700: unblock: wordpress/4.0.1+dfsg-1

2014-11-23 Thread Craig Small
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package wordpress

Wordpress 4.0 which is currently in Jessie has several
security bugs, see upstream announcement at
https://wordpress.org/news/2014/11/wordpress-4-0-1/
for details. Security bug is #770425.

The Debian 4.0.1+dfsg-1 package is *only* this upstream
change, I have no fixed anything else in order to give
the smallest delta to what we already have. I not that
the debdiff shows libphp-phpmailer version bump but
version 5.2.9+dfsg-2 is in jessie so there's no problem there.

  - Craig

unblock wordpress/4.0.1+dfsg-1

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/6 CPU cores)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
File lists identical (after any substitutions)

Control files of package wordpress: lines which differ (wdiff format)
-
Depends: apache2 | httpd, libapache2-mod-php5 | php5, ca-certificates, 
mysql-client | mariadb-client, php5-gd, php5-mysql | php5-mysqlnd, 
wordpress-theme-twentyfourteen, libjs-cropper (= 1.2.2), libphp-phpmailer (= 
[-5.2.8+dfsg),-] {+5.2.9+dfsg),+} libphp-snoopy (= 1.2.4)
Installed-Size: [-15462-] {+15468+}
Version: [-4.0+dfsg-1-] {+4.0.1+dfsg-1+}

Control files of package wordpress-l10n: lines which differ (wdiff format)
--
Depends: wordpress (= [-4.0+dfsg-1)-] {+4.0.1+dfsg-1)+}
Version: [-4.0+dfsg-1-] {+4.0.1+dfsg-1+}

Control files of package wordpress-theme-twentyfourteen: lines which differ 
(wdiff format)
--
Version: [-4.0+dfsg-1-] {+4.0.1+dfsg-1+}

Control files of package wordpress-theme-twentythirteen: lines which differ 
(wdiff format)
--
Installed-Size: [-638-] {+639+}
Version: [-4.0+dfsg-1-] {+4.0.1+dfsg-1+}

Control files of package wordpress-theme-twentytwelve: lines which differ 
(wdiff format)

Version: [-4.0+dfsg-1-] {+4.0.1+dfsg-1+}


Re: Your procps upload 1:3.3.10-1

2014-09-27 Thread Craig Small
On Fri, Sep 26, 2014 at 08:23:47PM +0100, Jonathan Wiltshire wrote:
 I thought it would stay in sid
 and not be put into the frozen set of packages.
 
 I don't understand what you mean by this.
I thought that: New package goes into SID = no real problem.
The frozen set of packages come from testing, not Sid, so as long
as procps wasn't moved from Sid to testing, then it would not
mess up the don't change libraries stage we're in now.

So Jessie has 1:3.3.9-7 and Sid has 1:3.3.10-1 and when the freeze
comes its all based on Jessie which is 1:3.3.9-7 which doesn't have
the API change.

Isn't just a case of ensuring that 1:3.3.10-1 does not move into
Jessie and it's all ok? Wouldn't merely a RC bug stop that?
Is there something more to this problem I'm missing? I get its not
the ideal situation.

 - Craig


-- 
Craig Small (@smallsees)   http://enc.com.au/   csmall at : enc.com.au
Debian GNU/Linux   http://www.debian.org/   csmall at : debian.org
GPG fingerprint:5D2F B320 B825 D939 04D2  0519 3938 F96B DF50 FEA5


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140927224204.gb14...@enc.com.au



Re: Your procps upload 1:3.3.10-1

2014-09-27 Thread Craig Small
On Sat, Sep 27, 2014 at 11:56:19PM +0100, Steven Chamberlain wrote:
 But the buildd chroots take packages from sid, so a reverse-dependency
 of procps could pick up a dependency on procps = 1:3.3.10;  then that
 package then can't migrate unless procps does too.
Yep, the other Steve (McIntyre) explained a bit too.
2%3.3.9-1 is on its way.

 - Craig
-- 
Craig Small (@smallsees)   http://enc.com.au/   csmall at : enc.com.au
Debian GNU/Linux   http://www.debian.org/   csmall at : debian.org
GPG fingerprint:5D2F B320 B825 D939 04D2  0519 3938 F96B DF50 FEA5


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140927231633.ga17...@enc.com.au



Re: Your procps upload 1:3.3.10-1

2014-09-27 Thread Craig Small
procps 2:3.3.9-8 got uploaded a few minutes ago. This has reverted back
to libprocps3 API. I have also attempted to make sure the correct
-dev library gets installed too. Let me know if there are further
problems; there's a 1:3 chance that the s390 will complain due to the
funny buildds they have.

Apologies for the noise, you've got enough release worries to deal with
without people like me doing what I did.

I'll put libprocps4 into experimental with some adjustments for the top
that everyone seems to hate (but that's not a RC problem).

 - Craig

-- 
Craig Small (@smallsees)   http://enc.com.au/   csmall at : enc.com.au
Debian GNU/Linux   http://www.debian.org/   csmall at : debian.org
GPG fingerprint:5D2F B320 B825 D939 04D2  0519 3938 F96B DF50 FEA5


signature.asc
Description: Digital signature


Re: Your procps upload 1:3.3.10-1

2014-09-26 Thread Craig Small
On Thu, Sep 25, 2014 at 04:12:06PM +0100, Jonathan Wiltshire wrote:
  - procps FTBFS on s390x [1]
The s390x is flaky, sometimes it builds sometimes it doesn't. It's due
to how they (the individual buildds) are setup; they are not consistent.

  - open-vm-tools on i386 no longer depends on libprocps when rebuilt
  - open-vm-tools on amd64 FTBFS with procps-related errors [2] when rebuilt.
 It builds fine with libprocps3 in an otherwise up-to-date chroot
I suspect it uses certain library calls it shouldn't that was the
problem last time.

 Please either revert your upload, or fix this mess, before midnight Sunday
 GMT.
Why did it actually get transistioned? I thought it would stay in sid 
and not be put into the frozen set of packages.

How do you actually revert an upload? It's out there now isn't it?
Again, I thought there were gates in the freeze period to stop this very
thing.

 - Craig

-- 
Craig Small (@smallsees)   http://enc.com.au/   csmall at : enc.com.au
Debian GNU/Linux   http://www.debian.org/   csmall at : debian.org
GPG fingerprint:5D2F B320 B825 D939 04D2  0519 3938 F96B DF50 FEA5


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140926075802.ga9...@enc.com.au



Bug#704127: unblock: procps/3.3.3-3

2013-03-28 Thread Craig Small
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package procps

ps crashes when processes have larger than normal groups, essentially
it is because the /proc/PID/status file is larger than 1024 bytes. This
is NOT a buffer overflow but the parser gets all sad because it runs out
of things to parse.

The fix is a rather simple bump up the buffer from 1024 to 4096.
This fixes bug #702965 which is merged with another.
We (upstream) have a permanent fix in later versions that is much more
intrusive.

Strictly speaking, the bug is in libproc0 not procps, it is just that
the binary ps crashes because of it.


unblock procps/3.3.3-3

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -Nru procps-3.3.3/debian/changelog procps-3.3.3/debian/changelog
--- procps-3.3.3/debian/changelog	2012-06-17 18:06:28.0 +1000
+++ procps-3.3.3/debian/changelog	2013-03-28 21:14:02.0 +1100
@@ -1,3 +1,9 @@
+procps (1:3.3.3-3) UNRELEASED; urgency=low
+
+  * 3.3.3-3 Fix ps crash with large process groups Closes: #702965
+
+ -- Craig Small csm...@debian.org  Thu, 28 Mar 2013 21:03:15 +1100
+
 procps (1:3.3.3-2) unstable; urgency=low
 
   * Fixes for kFreeBSD Closes: #674785
diff -Nru procps-3.3.3/debian/patches/bts702965-biggerbuff procps-3.3.3/debian/patches/bts702965-biggerbuff
--- procps-3.3.3/debian/patches/bts702965-biggerbuff	1970-01-01 10:00:00.0 +1000
+++ procps-3.3.3/debian/patches/bts702965-biggerbuff	2013-03-28 21:17:28.0 +1100
@@ -0,0 +1,47 @@
+Description: ps: allow large list of groups
+  ps crashes when the information exceeds 1024 bytes in files such as
+  /proc/PID/status.
+Origin: https://www.gitorious.org/procps/procps/commit/7933435584aa1fd75460f4c7715a3d4855d97c1c
+Author: Eric Dumazet eric.duma...@gmail.com
+Reviewed-by: Craig Small csm...@debian.org
+Bug-Debian: http://bugs.debian.org/702965
+--- a/proc/readproc.c
 b/proc/readproc.c
+@@ -353,7 +353,9 @@
+ P-vm_swap = strtol(S,S,10);
+ continue;
+ case_Groups:
+-{   int j = strchr(S, '\n') - S;// currently lines end space + \n
++{   char *nl = strchr(S, '\n');
++int j = nl ? (nl - S) : strlen(S);
++
+ if (j) {
+ P-supgid = xmalloc(j+1);   // +1 in case space disappears
+ memcpy(P-supgid, S, j);
+@@ -723,7 +725,7 @@
+ // room to spare.
+ static proc_t* simple_readproc(PROCTAB *restrict const PT, proc_t *restrict const p) {
+ static struct stat sb; // stat() buffer
+-static char sbuf[1024];// buffer for stat,statm,status
++static char sbuf[4096];// buffer for stat,statm,status
+ char *restrict const path = PT-path;
+ unsigned flags = PT-flags;
+ 
+@@ -827,7 +829,7 @@
+ // path is a path to the task, with some room to spare.
+ static proc_t* simple_readtask(PROCTAB *restrict const PT, const proc_t *restrict const p, proc_t *restrict const t, char *restrict const path) {
+ static struct stat sb; // stat() buffer
+-static char sbuf[1024];// buffer for stat,statm,status
++static char sbuf[4096];// buffer for stat,statm,status
+ unsigned flags = PT-flags;
+ 
+ if (unlikely(stat(path, sb) == -1))/* no such dirent (anymore) */
+@@ -1368,7 +1370,7 @@
+  * and filled out proc_t structure.
+  */
+ proc_t * get_proc_stats(pid_t pid, proc_t *p) {
+-	static char path[32], sbuf[1024];
++	static char path[32], sbuf[4096];
+ 	struct stat statbuf;
+ 
+ 	sprintf(path, /proc/%d, pid);
diff -Nru procps-3.3.3/debian/patches/series procps-3.3.3/debian/patches/series
--- procps-3.3.3/debian/patches/series	2012-06-17 18:00:06.0 +1000
+++ procps-3.3.3/debian/patches/series	2013-03-28 21:14:25.0 +1100
@@ -2,3 +2,4 @@
 bts676239-pkill-u-option
 watch_8bit
 uptime_test
+bts702965-biggerbuff


Bug#704127: unblock: procps/3.3.3-3

2013-03-28 Thread Craig Small
On Thu, Mar 28, 2013 at 10:51:47AM +, Adam D. Barratt wrote:
 This doesn't appear to have made it to the archive yet as far as I
 can see. If the attached debdiff was created from the final package
I thought the debdiff needed to be sent first, anyhow its now uploaded
to testing-proposed-updates.

 unstable already has 3.3.4-2, so a fix for this in wheezy would need
 to go via testing-proposed-updates. In such cases, we'd generally be
 looking at getting the fix in to unstable first though.
Thanks for the tip, 3.3.4-1 had this same fix so I've let the BTS know
about that too.

 - Craig
-- 
Craig Small VK2XLZ   http://enc.com.au/  csmall at : enc.com.au
Debian GNU/Linux http://www.debian.org/  csmall at : debian.org
GPG fingerprint: 5D2F B320 B825 D939 04D2  0519 3938 F96B DF50 FEA5


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130328111509.ga17...@enc.com.au



ps crashes with some wheezy kernels

2013-03-27 Thread Craig Small
Hello,
  It seems with some kernels, including some found in wheezy, that ps
will crash. The most likely problem is the number of groups appearing in 
/proc/PID/status.  I have two reports of this happening already.

I am proposing:
  * Increase the severity of bug #702965
  * Applying a minimal diff which is in upstream (second half of [1])
  * Uploading a new version of procps

Otherwise we're going to be plauged with ps crashing type bugs for
years while wheezy is still around, or until the next sub-release.
This change is pretty trivial and works for all known kernel formats.
There is another change at [2] where the buffers are dynamically
created but this is brand new and a much much bigger change.

I'd like to do this today (28/Mar).

 - Craig

[1] 
https://www.gitorious.org/procps/procps/commit/7933435584aa1fd75460f4c7715a3d4855d97c1c
[2] 
https://www.gitorious.org/procps/procps/commit/a45dace4b82c9cdcda7020ca5665153b1e81275f
-- 
Craig Small VK2XLZ   http://enc.com.au/  csmall at : enc.com.au
Debian GNU/Linux http://www.debian.org/  csmall at : debian.org
GPG fingerprint: 5D2F B320 B825 D939 04D2  0519 3938 F96B DF50 FEA5


signature.asc
Description: Digital signature


Bug#699308: unblock: psmisc/22.19-2

2013-02-01 Thread Craig Small
On Wed, Jan 30, 2013 at 01:23:49PM +, Adam D. Barratt wrote:
 Please could you prepare a tpu upload (preferably versioned as
 22.19-1+deb7u1) and send a debdiff to this report?
Done both, the debdiff only shows the changelog changing.
The patch of the source code changes is in bug 687829.

 - Craig

-- 
Craig Small VK2XLZ   http://enc.com.au/  csmall at : enc.com.au
Debian GNU/Linux http://www.debian.org/  csmall at : debian.org
GPG fingerprint: 5D2F B320 B825 D939 04D2  0519 3938 F96B DF50 FEA5


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130202070417.ga31...@enc.com.au



Bug#699308: unblock: psmisc/22.19-2

2013-01-29 Thread Craig Small
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package psmisc

unblock psmisc/22.19-2

psmisc 22.19-2 is a minimal change to 22.19-1 that fixes a bug for 
kFreeBSD systems (see #687829) where they don't shutdown cleanly.

Other than the version number the debdiff says there is no difference
to the packages. The patch involved is bug687829-kfreebsd-hang.patch
which basically sets the root pid to 0.
22.20-1 also fixes this but that is probably a much bigger change
to swallow while 22.19-2 is a minimal change.

 - Craig

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20130130021453.19652.96526.report...@elmo.enc.com.au



Re: procps 3.3.4 and 3.3.5

2012-11-04 Thread Craig Small
On Sun, Nov 04, 2012 at 01:04:40PM +0100, Julien Cristau wrote:
 Then the broken changes in 3.3.4 need to be reverted in sid ASAP.
Was uploaded a few minutes ago. It's procps 3.3.4-2  I've tested against
procps 3.3.3-2 and 3.3.4-2 and it doesn't matter which combination you
use, they work (slabtop and ps ax being the main two to test)

 - Craig
-- 
Craig Small VK2XLZ   http://enc.com.au/  csmall at : enc.com.au
Debian GNU/Linux http://www.debian.org/  csmall at : debian.org
GPG fingerprint: 5D2F B320 B825 D939 04D2  0519 3938 F96B DF50 FEA5


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121104121147.ga3...@enc.com.au



Bug#692074: unblock: procps/1:3.3.5-1

2012-11-04 Thread Craig Small
On Thu, Nov 01, 2012 at 08:10:55PM -0700, Jonathan Nieder wrote:
  1. prepare 3.3.4-2 backing out the ABI change,
 ask ftpmasters to reject 3.3.5-1 from NEW
I emailled them tonight.

  2. upload 3.3.4-2
Uploaded a few minutes ago

  3. coordinate with the release team on the next step (probably
 that means scheduling a transition to libprocps1)
Yes, I now know where the two changes were.

 - Craig
-- 
Craig Small VK2XLZ   http://enc.com.au/  csmall at : enc.com.au
Debian GNU/Linux http://www.debian.org/  csmall at : debian.org
GPG fingerprint: 5D2F B320 B825 D939 04D2  0519 3938 F96B DF50 FEA5


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121104121315.gb3...@enc.com.au



Bug#692074: unblock: procps/1:3.3.5-1

2012-11-01 Thread Craig Small
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package procps

procps 3.3.5-1 is blocked because libproc1 is new.  The problem is that
the oldest libproc0 will not work with 3.3.5-1 because the API changed.
This means current if you install procps 3.3.4 with libproc0 3.3.4 you
have an unbootable system.  Critical bug 691847 is against procps 3.3.4
but I'd like this cleared up.


unblock procps/1:3.3.5-1

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.0-3-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -Nru procps-3.3.4/configure procps-3.3.5/configure
--- procps-3.3.4/configure	2012-10-29 22:04:42.0 +1100
+++ procps-3.3.5/configure	2012-10-30 22:24:28.0 +1100
@@ -1,6 +1,6 @@
 #! /bin/sh
 # Guess values for system-dependent variables and create Makefiles.
-# Generated by GNU Autoconf 2.69 for procps-ng 3.3.4.
+# Generated by GNU Autoconf 2.69 for procps-ng 3.3.5.
 #
 # Report bugs to pro...@freelists.org.
 #
@@ -590,8 +590,8 @@
 # Identity of this package.
 PACKAGE_NAME='procps-ng'
 PACKAGE_TARNAME='procps-ng'
-PACKAGE_VERSION='3.3.4'
-PACKAGE_STRING='procps-ng 3.3.4'
+PACKAGE_VERSION='3.3.5'
+PACKAGE_STRING='procps-ng 3.3.5'
 PACKAGE_BUGREPORT='pro...@freelists.org'
 PACKAGE_URL='http://gitorious.org/procps'
 
@@ -1359,7 +1359,7 @@
   # Omit some internal or obsolete options to make the list less imposing.
   # This message is too long to be a string in the A/UX 3.1 sh.
   cat _ACEOF
-\`configure' configures procps-ng 3.3.4 to adapt to many kinds of systems.
+\`configure' configures procps-ng 3.3.5 to adapt to many kinds of systems.
 
 Usage: $0 [OPTION]... [VAR=VALUE]...
 
@@ -1429,7 +1429,7 @@
 
 if test -n $ac_init_help; then
   case $ac_init_help in
- short | recursive ) echo Configuration of procps-ng 3.3.4:;;
+ short | recursive ) echo Configuration of procps-ng 3.3.5:;;
esac
   cat \_ACEOF
 
@@ -1559,7 +1559,7 @@
 test -n $ac_init_help  exit $ac_status
 if $ac_init_version; then
   cat \_ACEOF
-procps-ng configure 3.3.4
+procps-ng configure 3.3.5
 generated by GNU Autoconf 2.69
 
 Copyright (C) 2012 Free Software Foundation, Inc.
@@ -2039,7 +2039,7 @@
 This file contains any messages produced by compilers while
 running configure, to aid debugging if configure makes a mistake.
 
-It was created by procps-ng $as_me 3.3.4, which was
+It was created by procps-ng $as_me 3.3.5, which was
 generated by GNU Autoconf 2.69.  Invocation command line was
 
   $ $0 $@
@@ -2857,7 +2857,7 @@
 
 # Define the identity of the package.
  PACKAGE='procps-ng'
- VERSION='3.3.4'
+ VERSION='3.3.5'
 
 
 cat confdefs.h _ACEOF
@@ -16644,7 +16644,7 @@
 # report actual input values of CONFIG_FILES etc. instead of their
 # values after options handling.
 ac_log=
-This file was extended by procps-ng $as_me 3.3.4, which was
+This file was extended by procps-ng $as_me 3.3.5, which was
 generated by GNU Autoconf 2.69.  Invocation command line was
 
   CONFIG_FILES= $CONFIG_FILES
@@ -16711,7 +16711,7 @@
 cat $CONFIG_STATUS _ACEOF || ac_write_fail=1
 ac_cs_config=`$as_echo $ac_configure_args | sed 's/^ //; s/[\\\`\$]//g'`
 ac_cs_version=\\
-procps-ng config.status 3.3.4
+procps-ng config.status 3.3.5
 configured by $0, generated by GNU Autoconf 2.69,
   with options \\\$ac_cs_config\\
 
diff -Nru procps-3.3.4/debian/changelog procps-3.3.5/debian/changelog
--- procps-3.3.4/debian/changelog	2012-10-29 22:36:52.0 +1100
+++ procps-3.3.5/debian/changelog	2012-10-30 22:36:28.0 +1100
@@ -1,3 +1,12 @@
+procps (1:3.3.5-1) unstable; urgency=low
+
+  * New upstream version
+  * bumped SONAME of packages Closes: #691847
+  * Stop SIGFPE on vmstat at times Closes: #677903
+  * Upstream took freebsd bug patch
+
+ -- Craig Small csm...@debian.org  Tue, 30 Oct 2012 22:26:52 +1100
+
 procps (1:3.3.4-1) unstable; urgency=low
 
   * New upstream version
diff -Nru procps-3.3.4/debian/clean procps-3.3.5/debian/clean
--- procps-3.3.4/debian/clean	1970-01-01 10:00:00.0 +1000
+++ procps-3.3.5/debian/clean	2012-10-30 22:43:23.0 +1100
@@ -0,0 +1 @@
+.version
diff -Nru procps-3.3.4/debian/control procps-3.3.5/debian/control
--- procps-3.3.4/debian/control	2012-05-20 16:47:39.0 +1000
+++ procps-3.3.5/debian/control	2012-10-30 22:27:47.0 +1100
@@ -25,7 +25,7 @@
  It contains free, kill, pkill, pgrep, pmap, ps, pwdx, skill, slabtop,
  snice, sysctl, tload, top, uptime, vmstat, w, and watch.
 
-Package: libprocps0
+Package: libprocps1
 Architecture: any
 Multi-Arch: same
 Pre-Depends: ${misc:Pre-Depends}
@@ -38,11 +38,11 @@
  This package contains the shared libraries necessary to run programs
  compilied with libprocps.
 
-Package: libprocps0-dev
+Package: libprocps1-dev

Bug#692074: unblock: procps/1:3.3.5-1

2012-11-01 Thread Craig Small
On Thu, Nov 01, 2012 at 05:37:37PM -0700, Jonathan Nieder wrote:
 I think including libprocps1 in wheezy would be good, but would it be
 possible to back out the ABI break in sid in the meantime?
Tell me how to do it (not the API change, but more around the what
version etc) and I will.

I assume its making a 3.3.4-2 with a debian patch to reverse the API
and then do.. something.

 - Craig
-- 
Craig Small VK2XLZ   http://enc.com.au/  csmall at : enc.com.au
Debian GNU/Linux http://www.debian.org/  csmall at : debian.org
GPG fingerprint: 5D2F B320 B825 D939 04D2  0519 3938 F96B DF50 FEA5


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121102030318.ga18...@enc.com.au



procps 3.3.4 and 3.3.5

2012-10-30 Thread Craig Small
Hi,
  I'm trying to make sure procps 3.3.4-1 is not going to be
progressed along any further.  The API changed which means if procps is
upgraded and libproc0 isn't, then some procps commands don't work well.

I've reported a critical bug [1] on procps (it stops the boot process)
but 3.3.5 is stuck because the package name has changed to libproc1.

Ideally I'd like 3.3.4 gone but I think its too late for that, so some
things depending on libproc0 may go strange.

 - Craig
[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691847
-- 
Craig Small VK2XLZ   http://enc.com.au/  csmall at : enc.com.au
Debian GNU/Linux http://www.debian.org/  csmall at : debian.org
GPG fingerprint: 5D2F B320 B825 D939 04D2  0519 3938 F96B DF50 FEA5


signature.asc
Description: Digital signature


Putting procps 3.2.7-9 into Lenny

2009-01-01 Thread Craig Small
Hello Release Team,
  I would like to propose that procps 3.2.7-9 be put into Lenny, instead
of procps 3.2.7-8.  There are some small but  (for some significant)
changes in this version.

The biggie is #460331. If you are like me and have only i386 computers
you don't see this bug at all :)  This fix basically reads all 7 numbers
in the cpu line instead of 4 (which it used to be in old kernels). These
numbers are used to work out the Hz-jiffy conversion.

Anyhow, if you have something strange like an Armel, ARM, qnap 209 and
probably other things, you will get this bug at some time.  Changing to
3.2.7-9 means our friends with these sorts of architectures won't (or
shouldn't) get that bug. I think hosts running Xen or other things like
it may get it too.

3.2.7-9 has been out since August, procps is in base so everyone has it
and there are no NEW bugs specific to 3.2.7-9 (ie that weren't in
3.2.7-8 or earlier)

 - Craig

-- 
Craig Small  GnuPG:1C1B D893 1418 2AF4 45EE  95CB C76C E5AC 12CA DFA5
http://www.enc.com.au/ csmall at : enc.com.au
http://www.debian.org/  Debian GNU/Linux, software should be Free 


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Bug#311344: Replacing lpr-ppd with lprng removes printer database

2005-06-01 Thread Craig Small
On Wed, Jun 01, 2005 at 01:15:37PM +0200, A Mennucc wrote:
 /etc/printcap is a conffile of lpr-ppd ; if
 lpr-ppd is removed, /etc/printcap will still be there ;
 but if you purge  lpr-ppd  , dpkg will delete /etc/printcap ,
 since it is not a conffile of lprng

lprng used to have /etc/printcap but for very good reasons I can no
longer remember (perhaps that conffiles need to be only for a single
package) it no longer has a printcap.

  - Craig
-- 
Craig Small  GnuPG:1C1B D893 1418 2AF4 45EE  95CB C76C E5AC 12CA DFA5
Eye-Net Consulting http://www.enc.com.au/   MIEE Debian developer
csmall at : enc.com.au  ieee.org   debian.org


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



rspfd : You can remove this package

2005-05-30 Thread Craig Small
Hello,
  I was just going over my packages around release time and noticed that
rspfd was still in sarge.  You can easily drop this package and nothing
should depend on it.  I have had it RFA for over a year and just put in
a bug to ftp.debian.org to have it removed.

Sorry for my bad timing!

 - Craig
-- 
Craig Small  GnuPG:1C1B D893 1418 2AF4 45EE  95CB C76C E5AC 12CA DFA5
Eye-Net Consulting http://www.enc.com.au/   MIEE Debian developer
csmall at : enc.com.au  ieee.org   debian.org


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



lprng 3.8.28-2 fixes security bug #286391

2004-12-22 Thread Craig Small
Hello,
  I have just uploaded lprng 3.8.28-2 which fixes a minor but security
related bug #286391.  I have only made enough changes to fix this bug
which is a patch to a shell script and so, i hope, will not cause too
much headache for you guys.

  - Craig
-- 
Craig Small  GnuPG:1C1B D893 1418 2AF4 45EE  95CB C76C E5AC 12CA DFA5
Eye-Net Consulting http://www.enc.com.au/   MIEE Debian developer
csmall at : enc.com.au  ieee.org   debian.org