Bug#1054119: data loss patch for qpdf targeted at stable (11.3.0)

2023-10-18 Thread Jay Berkenbilt
On Tue, Oct 17, 2023, at 12:15 PM, Adam D. Barratt wrote:
> # bcc control@bugs.d.o
> user release.debian@packages.debian.org
> usertags 1054119 pu
> tags 1054119 bookworm moreinfo
> retitle 1054119 bookworm-pu: package qpdf/11.3.0-1
> thanks

Thanks for fixing the tags. I'll reply to this instead of starting
over.

> On Tue, 2023-10-17 at 07:32 -0400, Jay Berkenbilt wrote:
> > The attached patch to qpdf 11.3.0 fixes a bug that could potentially
> > result in loss of data. I'd like permission from the release team to
> > . . .
> >
>
> Close, but a few rough edges. :-)
>

Ah, thanks for helping me get past my brain rot. When I used to
maintain several packages, including tiff and icu, which had lots of
security updates, I was much more familiar with this. It's funny how
we can forget something so thoroughly that we can forget we knew it at
one time. The doc reference was perfect and jogged my memory.

> As noted in the dev-ref section, please use "reportbug
> release.debian.org" for p-u requests, or set equivalent metadata. That
> helps ensure that the request ends up in the correct section of our BTS
> web view, where uncategorised bugs may get overlooked for some time.
> I've fixed up the relevant bits for this request (see the start of my
> reply).

Thanks for fixing it up. Rather than starting over, I am replying with
the information from reportbug. I'll let you remove the moreinfo tag
assuming I have provided enough information.

--

[ Reason ]
Between qpdf 10.6.3 and 11.0.0, a contributor did substantial
refactoring and performance optimizations on qpdf, ultimately
achieving better than a 2x performance boost. In spite of careful
testing and review, a bug to the lexical layer of qpdf snuck in. From
the changelog:

 Fix data loss bug introduced in 11.0.0 and fixed in 11.6.3. The bug
 causes the qpdf tokenizer to discard the character after a one-digit
 or two-digit quoted octal string. Most writers don't create these, and
 they are rare outside of content streams. By default, qpdf doesn't
 parse content streams. The most common place for this to occur would
 be in a document's /ID string, but in the worst case, this bug could
 cause silent damage to some strings in a PDF file's metadata, such as
 bookmark names or form field values.

The fix is in upstream version 11.6.3 which has been uploaded to
unstable and has migrated to testing.

Given that this bug can cause potential data loss, updating stable is
warranted. The version in oldstable is not affected by this bug.

[ Impact ]
In rare cases, qpdf may silently corrupt data in the user's PDF file.

[ Tests ]
The commit that includes the fix:
https://github.com/qpdf/qpdf/commit/1ecc6bb29e24a4f89470ff91b2682b46e0576ad4
includes a number of new automated tests to specifically exercise this
bug. (I have not included the additional automated tests in the
patch.) Additionally, the user who reported the original upstream bug:
https://github.com/qpdf/qpdf/issues/1050 has confirmed that the issue
is fixed. I also verified with the user's file.

[ Risks ]
This is a very low-risk patch. The fix is small and targeted. qpdf has
a rigorous test suite and a very good track record for stability. A
bug of this sort is a very rare event.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]
The character following the short octal quoted character was used to
cause a state transition in the tokenizer but not reprocessed in the
new state. The bug fixes this. Prior to refactoring, the code did not
suffer from this logic error because a different mechanism was used to
re-process a character used in a state transition.

[ Other info ]
Note: I am the upstream author of qpdf as well as the debian
maintainer of the package. The user who submitted the pull request
that contained this bug is a reliable and steady contributor to qpdf
who has made great improvements to the code base. Heavy refactoring
carries risks. qpdf processes millions of pages a day in commercial
and open source applications. It is very important to get this fix out
to avoid silent and hard-to-detect damage to PDF files.


qpdf_11.30.0-1--11.30.0-1+deb12u1.debdiff
Description: Binary data


Bug#1054119: data loss patch for qpdf targeted at stable (11.3.0)

2023-10-17 Thread Jay Berkenbilt
Package: release.debian.org
X-Debbugs-CC: q...@debian.org

The attached patch to qpdf 11.3.0 fixes a bug that could potentially
result in loss of data. I'd like permission from the release team to
upload this to stable. I've been a debian developer since 2005, but
it's been years since I've last prepared a release to the stable
distribution. As far as I can tell, the current procedure is to upload
with the target distribution as "stable" and upload to ftp-master.
This will direct the package the proposed-updates queue. Is this
correct?

The nature of the bug is that, if a quoted octal character with one or
two digits instead of three digits appears in the file, the following
character will be dropped from the string. This bug snuck in in a pull
request I accepted that performed significant performance optimization
on the tokenizer. Because it only affects strings in metadata when
qpdf is used in its default configuration, and because such quoted
characters of this type don't appear very often, it's somewhat of a
corner case, but I think the bug is critical to fix because there is a
chance that it could silently damage files in ways that would be hard
to detect.

Please let me know if I should proceed with an update to stable.

--Jay Berkenbilt (a.k.a. q...@debian.org)--- libqpdf/QPDFTokenizer.cc.orig	2023-10-17 07:19:31.829119946 -0400
+++ libqpdf/QPDFTokenizer.cc	2023-10-17 07:20:55.689510562 -0400
@@ -739,17 +739,22 @@
 void
 QPDFTokenizer::inCharCode(char ch)
 {
+bool handled = false;
 if (('0' <= ch) && (ch <= '7')) {
 this->char_code = 8 * this->char_code + (int(ch) - int('0'));
 if (++(this->digit_count) < 3) {
 return;
 }
-// We've accumulated \ddd.  PDF Spec says to ignore
-// high-order overflow.
+handled = true;
 }
+// We've accumulated \ddd or we have \d or \dd followed by other
+// than an octal digit. The PDF Spec says to ignore high-order
+// overflow.
 this->val += char(this->char_code % 256);
 this->state = st_in_string;
-return;
+if (!handled) {
+inString(ch);
+}
 }
 
 void


Re: Should qpdf depend on gnutls?

2020-04-09 Thread Jay Berkenbilt
Yeah, that's what what I decided to do. Thanks.

On Thu, Apr 9, 2020, at 2:08 PM, Florian Weimer wrote:
> * Jay Berkenbilt:
> 
> > I'm about to release qpdf 10. Someone contributed an openssl crypto
> > provider. Do you think I should build with the qpdf packages for
> > debian with 1) only gnutls, 2) only openssl, or 3) both gnutls and
> > openssl? Option 3 allows users to select at runtime but makes qpdf
> > dependent on both packages. I notice that systemd also depends on
> > openssl. My impulse is to go with option 1 (gnutls only) because I
> > really don't see any advantage in the OS package letting users
> > choose at runtime which crypto to use, but including both cryptos
> > probably doesn't ultimately affect what gets installed on anyone's
> > system since openssl is basically always going to be there.
> 
> This seems to be more of a query for debian-devel, to be honest.
> 
> Two packages do not seem particularly useful to me. Since apt depends
> on libgnutls30, I don't see how an OpenSSL backend for qpdf could
> minimize installation size. This suggests to me that you should stick
> with GNUTLS for Debian.
> 

Re: Should qpdf depend on gnutls?

2020-04-06 Thread Jay Berkenbilt
I'm about to release qpdf 10. Someone contributed an openssl crypto provider. 
Do you think I should build with the qpdf packages for debian with 1) only 
gnutls, 2) only openssl, or 3) both gnutls and openssl? Option 3 allows users 
to select at runtime but makes qpdf dependent on both packages. I notice that 
systemd also depends on openssl. My impulse is to go with option 1 (gnutls 
only) because I really don't see any advantage in the OS package letting users 
choose at runtime which crypto to use, but including both cryptos probably 
doesn't ultimately affect what gets installed on anyone's system since openssl 
is basically always going to be there.

Opinions welcome. Thanks!

On Sun, Nov 10, 2019, at 9:10 PM, Jay Berkenbilt wrote:
> Okay, thanks for all the response, public and private. There seems to be 
> broad consensus to use the gnutls crypto and disable the native one, so 
> that's what I'll do. Appreciate the advice!
> 
> --Jay
> 
> On Sun, Nov 10, 2019 at 2:05 PM Moritz Mühlenhoff  wrote:
>> On Sat, Nov 09, 2019 at 07:10:44PM -0500, Jay Berkenbilt wrote:
>>  > I am the upstream author and the debian maintainer of qpdf.
>>  > 
>>  > At the request of RedHat, I have made an enhancement to qpdf that
>>  > allows an external library to be used for crypto functions rather than
>>  > using qpdf's native crypto implementations. The qpdf library includes
>>  > code to compute hashes with md5 and sha2 (256, 384, and 512) as well
>>  > as encryption functions for rc4 and aes256 with and without CBC.
>>  > Disabling insecure crypto is not a practical option because of the way
>>  > these things are used in the PDF spec, but it is possible create PDFs
>>  > that don't use insecure crypto by just using 256-bit encryption.
>>  > 
>>  > I can build qpdf 9.1 for Debian in one of three ways: 1) use only the
>>  > native crypto as in all previous releases, thus avoiding a dependency
>>  > on gnutls; 2) build only the gnutls crypto provider thus causing a
>>  > dependency on gnutls but eliminating the native crypto entirely; or 3)
>>  > building both crypto providers, in which case gnutls will be used by
>>  > default, but developers and end users will have the ability to select
>>  > the native crypto provider at runtime if desired.
>>  > 
>>  > Do you have an opinion about which way I should go? I believe RHEL and
>>  > Fedora are going to use the second option of building with only gnutls
>>  > and dropping native crypto, but I have also enjoyed the fact that qpdf
>>  > has so few build dependencies. It is possible that a future version of
>>  > qpdf may support digital signature, in which case I will definitely
>>  > have to add either openssl or gnutls as a dependency.
>> 
>>  I'd recommend to go with 2); there's a lot of value in using a common /
>>  scrutinised crypto library over a custom implementation and for all
>>  practical purposes gnutls would not be an additional dep as systemd
>>  already pulls it in on virtually every Linux system these days.
>> 
>>  Cheers,
>>  Moritz
>> 


Re: Should qpdf depend on gnutls?

2019-11-10 Thread Jay Berkenbilt
Okay, thanks for all the response, public and private. There seems to be
broad consensus to use the gnutls crypto and disable the native one, so
that's what I'll do. Appreciate the advice!

--Jay

On Sun, Nov 10, 2019 at 2:05 PM Moritz Mühlenhoff  wrote:

> On Sat, Nov 09, 2019 at 07:10:44PM -0500, Jay Berkenbilt wrote:
> > I am the upstream author and the debian maintainer of qpdf.
> >
> > At the request of RedHat, I have made an enhancement to qpdf that
> > allows an external library to be used for crypto functions rather than
> > using qpdf's native crypto implementations. The qpdf library includes
> > code to compute hashes with md5 and sha2 (256, 384, and 512) as well
> > as encryption functions for rc4 and aes256 with and without CBC.
> > Disabling insecure crypto is not a practical option because of the way
> > these things are used in the PDF spec, but it is possible create PDFs
> > that don't use insecure crypto by just using 256-bit encryption.
> >
> > I can build qpdf 9.1 for Debian in one of three ways: 1) use only the
> > native crypto as in all previous releases, thus avoiding a dependency
> > on gnutls; 2) build only the gnutls crypto provider thus causing a
> > dependency on gnutls but eliminating the native crypto entirely; or 3)
> > building both crypto providers, in which case gnutls will be used by
> > default, but developers and end users will have the ability to select
> > the native crypto provider at runtime if desired.
> >
> > Do you have an opinion about which way I should go? I believe RHEL and
> > Fedora are going to use the second option of building with only gnutls
> > and dropping native crypto, but I have also enjoyed the fact that qpdf
> > has so few build dependencies. It is possible that a future version of
> > qpdf may support digital signature, in which case I will definitely
> > have to add either openssl or gnutls as a dependency.
>
> I'd recommend to go with 2); there's a lot of value in using a common /
> scrutinised crypto library over a custom implementation and for all
> practical purposes gnutls would not be an additional dep as systemd
> already pulls it in on virtually every Linux system these days.
>
> Cheers,
> Moritz
>
>


Should qpdf depend on gnutls?

2019-11-09 Thread Jay Berkenbilt
I am the upstream author and the debian maintainer of qpdf.

At the request of RedHat, I have made an enhancement to qpdf that
allows an external library to be used for crypto functions rather than
using qpdf's native crypto implementations. The qpdf library includes
code to compute hashes with md5 and sha2 (256, 384, and 512) as well
as encryption functions for rc4 and aes256 with and without CBC.
Disabling insecure crypto is not a practical option because of the way
these things are used in the PDF spec, but it is possible create PDFs
that don't use insecure crypto by just using 256-bit encryption.

I can build qpdf 9.1 for Debian in one of three ways: 1) use only the
native crypto as in all previous releases, thus avoiding a dependency
on gnutls; 2) build only the gnutls crypto provider thus causing a
dependency on gnutls but eliminating the native crypto entirely; or 3)
building both crypto providers, in which case gnutls will be used by
default, but developers and end users will have the ability to select
the native crypto provider at runtime if desired.

Do you have an opinion about which way I should go? I believe RHEL and
Fedora are going to use the second option of building with only gnutls
and dropping native crypto, but I have also enjoyed the fact that qpdf
has so few build dependencies. It is possible that a future version of
qpdf may support digital signature, in which case I will definitely
have to add either openssl or gnutls as a dependency.

--Jay



Bug#929252: unblock: qpdf/8.4.2-1

2019-05-27 Thread Jay Berkenbilt
On Mon, May 27, 2019 at 4:14 PM Paul Gevers  wrote:

> Control: tags -1 moreinfo
>
> On Sun, 19 May 2019 20:43:29 -0400 Jay Berkenbilt  wrote:
> > The changes between qpdf 8.4.0 and 8.4.2 are bug fixes, but I am
> > asking for consideration because this update includes fixes to a
> > serious performance bug (CLI), a CLI non-compatibility bug, and a
> > library fix that could cause data loss in rare cases. These bugs are
> > all in the part of the code concerned with splitting and merging
> > documents, which is one of the main things people use the qpdf CLI
> > for. While these changes are not critical, it would be disappointing
> > if the version of qpdf in the next debian stable has these
> > already-fixed bugs.
>
> How would a targeted fix look like? I don't think we'll unblock the new
> upstream version.
>

I could extract the changes between 8.4.0 and 8.4.2 and apply them as a
patch to 8.4.0, but I don't think I'll do it. It will be confusing if the
debian stable version is called 8.4.0 but actually includes most of the
fixes from 8.4.2. If it's too late to accept this unblock request, that's
fine; we'll just leave things as they are. I plan on releasing a version 9
this summer, and I can just do a backport. If the unblock request is
rejected, please feel free to close the request. Thanks!

--Jay


Bug#805093: transition: qpdf

2015-11-14 Thread Jay Berkenbilt
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

The latest version of qpdf includes an soname bump. The qpdf
transition is very small. The only other source package with a
dependency on libqpdf is cups-filters. qpdf 6.0.0 with libqpdf17 has
already passed the NEW and is waiting in experimental. As soon as I
get the green light, I can upload to unstable and a rebuild of
cups-filters can be triggered. This is completely source compatible
with the pervious versions.

Ben file:

title = "qpdf";
is_affected = .depends ~ "libqpdf13v5" | .depends ~ "libqpdf17";
is_good = .depends ~ "libqpdf17";
is_bad = .depends ~ "libqpdf13v5";


-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (200, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.2.0-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)



Bug#757025: icu 53 is no longer current

2015-02-11 Thread Jay Berkenbilt
I am not going to be able to handle the ICU transition and am looking
for a new maintainer for ICU (an RFA is open). Whoever takes over ICU
will have to manage the transition to whatever version of ICU is current
at the time, and it will have to be handled after jessie is released.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20150211132946.0261508682.qww314...@jberkenbilt-linux.appiancorp.com



Bug#775968: unblock: icu/52.1-7

2015-01-21 Thread Jay Berkenbilt
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package icu

A small, localized fix to ICU fixes CVE-2014-6591 and CVE-2014-6585. ICU
passes its test suite after application of this patch. The security team
requested that this be included for Jessie. See
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775884 for additional
details.

unblock icu/52.1-7

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (200, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.14-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -Nru icu-52.1/debian/changelog icu-52.1/debian/changelog
--- icu-52.1/debian/changelog	2014-09-29 10:27:22.0 -0400
+++ icu-52.1/debian/changelog	2015-01-21 21:47:39.0 -0500
@@ -1,3 +1,10 @@
+icu (52.1-7) unstable; urgency=high
+
+  * Patch to CVE-2014-6591, CVE-2014-6585 a font parsing bug.
+(Closes: #775884)
+
+ -- Jay Berkenbilt q...@debian.org  Wed, 21 Jan 2015 21:33:19 -0500
+
 icu (52.1-6) unstable; urgency=medium
 
   * Ensure that only flags intended to be set by users make it into
diff -Nru icu-52.1/debian/patches/CVE-2014-6591.patch icu-52.1/debian/patches/CVE-2014-6591.patch
--- icu-52.1/debian/patches/CVE-2014-6591.patch	1969-12-31 19:00:00.0 -0500
+++ icu-52.1/debian/patches/CVE-2014-6591.patch	2015-01-21 21:47:39.0 -0500
@@ -0,0 +1,59 @@
+Description: fix ICU font parsing problem
+Bug-Debian: http://bugs.debian.org/775884
+Bug-RedHat: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-6591
+
+Index: icu/source/layout/CursiveAttachmentSubtables.cpp
+===
+--- icu.orig/source/layout/CursiveAttachmentSubtables.cpp
 icu/source/layout/CursiveAttachmentSubtables.cpp
+@@ -20,6 +20,9 @@ le_uint32 CursiveAttachmentSubtable::pro
+ le_int32  coverageIndex = getGlyphCoverage(base, glyphID, success);
+ le_uint16 eeCount   = SWAPW(entryExitCount);
+ 
++LEReferenceToArrayOfEntryExitRecord
++entryExitRecordsArrayRef(base, success, entryExitRecords, coverageIndex);
++
+ if (coverageIndex  0 || coverageIndex = eeCount) {
+ glyphIterator-setCursiveGlyph();
+ return 0;
+Index: icu/source/layout/Features.cpp
+===
+--- icu.orig/source/layout/Features.cpp
 icu/source/layout/Features.cpp
+@@ -15,6 +15,9 @@ U_NAMESPACE_BEGIN
+ 
+ LEReferenceToFeatureTable FeatureListTable::getFeatureTable(const LETableReference base, le_uint16 featureIndex, LETag *featureTag, LEErrorCode success) const
+ {
++LEReferenceToArrayOfFeatureRecord
++featureRecordArrayRef(base, success, featureRecordArray, featureIndex);
++
+   if (featureIndex = SWAPW(featureCount) || LE_FAILURE(success)) {
+ return LEReferenceToFeatureTable();
+   }
+Index: icu/source/layout/LigatureSubstSubtables.cpp
+===
+--- icu.orig/source/layout/LigatureSubstSubtables.cpp
 icu/source/layout/LigatureSubstSubtables.cpp
+@@ -27,6 +27,9 @@ le_uint32 LigatureSubstitutionSubtable::
+ Offset ligTableOffset = SWAPW(ligSetTable-ligatureTableOffsetArray[lig]);
+ const LigatureTable *ligTable = (const LigatureTable *) ((char *)ligSetTable + ligTableOffset);
+ le_uint16 compCount = SWAPW(ligTable-compCount) - 1;
++LEReferenceToArrayOfTTGlyphID
++componentArrayRef(base, success, ligTable-componentArray, compCount);
++if (LE_FAILURE(success)) { return 0; }
+ le_int32 startPosition = glyphIterator-getCurrStreamPosition();
+ TTGlyphID ligGlyph = SWAPW(ligTable-ligGlyph);
+ le_uint16 comp;
+Index: icu/source/layout/MultipleSubstSubtables.cpp
+===
+--- icu.orig/source/layout/MultipleSubstSubtables.cpp
 icu/source/layout/MultipleSubstSubtables.cpp
+@@ -35,6 +35,8 @@ le_uint32 MultipleSubstitutionSubtable::
+ 
+ le_int32 coverageIndex = getGlyphCoverage(base, glyph, success);
+ le_uint16 seqCount = SWAPW(sequenceCount);
++LEReferenceToArrayOfOffset
++sequenceTableOffsetArrayRef(base, success, sequenceTableOffsetArray, seqCount);
+ 
+ if (coverageIndex = 0  coverageIndex  seqCount) {
+ Offset sequenceTableOffset = SWAPW(sequenceTableOffsetArray[coverageIndex]);
diff -Nru icu-52.1/debian/patches/series icu-52.1/debian/patches/series
--- icu-52.1/debian/patches/series	2014-09-29 10:27:22.0 -0400
+++ icu-52.1/debian/patches/series	2015-01-21 21:47:39.0 -0500
@@ -6,3 +6,4 @@
 mlym-crash.patch
 two-digit-year-test.patch
 icu-config.patch
+CVE-2014-6591.patch


Bug#774235: unblock: tiff/4.0.3-12

2014-12-30 Thread Jay Berkenbilt
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package tiff

This is a narrowly targeted fix from upstream for CVE-2014-9330. It
changes only bmp2tiff, one of the tools that is part of libtiff-tools.
Although the bug was not created as RC, other similar bugs that only
affect tools in libtiff-tools have been classified as RC, and this fixes
a security issue with an assigned CVE number, so I think it would be
best if it goes through.

debdiff attached.

unblock tiff/4.0.3-12

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (200, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.14-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

diff -Nru tiff-4.0.3/debian/changelog tiff-4.0.3/debian/changelog
--- tiff-4.0.3/debian/changelog	2014-12-23 15:52:13.0 -0500
+++ tiff-4.0.3/debian/changelog	2014-12-30 11:32:33.0 -0500
@@ -1,3 +1,9 @@
+tiff (4.0.3-12) unstable; urgency=high
+
+  * Fix integer overflow in bmp2tiff. CVE-2014-9330. (Closes: #773987)
+
+ -- Jay Berkenbilt q...@debian.org  Tue, 30 Dec 2014 11:32:04 -0500
+
 tiff (4.0.3-11) unstable; urgency=medium
 
   * Don't crash on JPEG = non-JPEG conversion (Closes: #741451)
diff -Nru tiff-4.0.3/debian/patches/CVE-2014-9330.patch tiff-4.0.3/debian/patches/CVE-2014-9330.patch
--- tiff-4.0.3/debian/patches/CVE-2014-9330.patch	1969-12-31 19:00:00.0 -0500
+++ tiff-4.0.3/debian/patches/CVE-2014-9330.patch	2014-12-30 11:32:33.0 -0500
@@ -0,0 +1,45 @@
+Description: CVE-2014-9330
+ Integer overflow in bmp2tiff
+Origin: upstream, http://bugzilla.maptools.org/show_bug.cgi?id=2494
+Bug: http://bugzilla.maptools.org/show_bug.cgi?id=2494
+Bug-Debian: http://bugs.debian.org/773987
+
+Index: tiff/tools/bmp2tiff.c
+===
+--- tiff.orig/tools/bmp2tiff.c
 tiff/tools/bmp2tiff.c
+@@ -1,4 +1,4 @@
+-/* $Id: bmp2tiff.c,v 1.23 2010-03-10 18:56:49 bfriesen Exp $
++/* $Id: bmp2tiff.c,v 1.24 2014-12-21 15:15:32 erouault Exp $
+  *
+  * Project:  libtiff tools
+  * Purpose:  Convert Windows BMP files in TIFF.
+@@ -403,6 +403,13 @@ main(int argc, char* argv[])
+ 
+ 		width = info_hdr.iWidth;
+ 		length = (info_hdr.iHeight  0) ? info_hdr.iHeight : -info_hdr.iHeight;
++if( width = 0 || length = 0 )
++{
++TIFFError(infilename,
++  Invalid dimensions of BMP file );
++close(fd);
++return -1;
++}
+ 
+ 		switch (info_hdr.iBitCount)
+ 		{
+@@ -593,6 +600,14 @@ main(int argc, char* argv[])
+ 
+ 			compr_size = file_hdr.iSize - file_hdr.iOffBits;
+ 			uncompr_size = width * length;
++/* Detect int overflow */
++if( uncompr_size / width != length )
++{
++TIFFError(infilename,
++Invalid dimensions of BMP file );
++close(fd);
++return -1;
++}
+ 			comprbuf = (unsigned char *) _TIFFmalloc( compr_size );
+ 			if (!comprbuf) {
+ TIFFError(infilename,
diff -Nru tiff-4.0.3/debian/patches/series tiff-4.0.3/debian/patches/series
--- tiff-4.0.3/debian/patches/series	2014-12-23 15:52:13.0 -0500
+++ tiff-4.0.3/debian/patches/series	2014-12-30 11:32:33.0 -0500
@@ -7,3 +7,4 @@
 CVE-2013-4244.patch
 CVE-2013-4243.patch
 jpeg-colorspace.patch
+CVE-2014-9330.patch


Bug#773837: unblock: tiff/4.0.3-11

2014-12-23 Thread Jay Berkenbilt
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package tiff

This is a very localized patch to the tiffcp utility (doesn't even
affect the tiff library) to fix a potential crash, fixing RC bug
#741451. The originated from upstream where it was based on a fix
previously submitted by the original reporter.

(include/attach the debdiff against the package in testing)

unblock tiff/4.0.3-11

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (200, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.14-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -Nru tiff-4.0.3/debian/changelog tiff-4.0.3/debian/changelog
--- tiff-4.0.3/debian/changelog	2014-06-29 17:32:44.0 -0400
+++ tiff-4.0.3/debian/changelog	2014-12-23 15:52:13.0 -0500
@@ -1,3 +1,10 @@
+tiff (4.0.3-11) unstable; urgency=medium
+
+  * Don't crash on JPEG = non-JPEG conversion (Closes: #741451)
+  * Thanks Tomasz Buchert tomasz.buch...@inria.fr for preparing the fix!
+
+ -- Jay Berkenbilt q...@debian.org  Tue, 23 Dec 2014 15:51:40 -0500
+
 tiff (4.0.3-10) unstable; urgency=medium
 
   * Remove libtiff4-dev, completing the tiff transition. Packages that
diff -Nru tiff-4.0.3/debian/patches/jpeg-colorspace.patch tiff-4.0.3/debian/patches/jpeg-colorspace.patch
--- tiff-4.0.3/debian/patches/jpeg-colorspace.patch	1969-12-31 19:00:00.0 -0500
+++ tiff-4.0.3/debian/patches/jpeg-colorspace.patch	2014-12-23 15:52:13.0 -0500
@@ -0,0 +1,38 @@
+Description: fix for Debian bug #741451
+ tiffcp crashes when converting JPEG-encoded TIFF to a different
+ encoding (like none or lzw). For example this will probably fail:
+ .
+tiffcp -c none jpeg_encoded_file.tif output.tif
+ .
+ The reason is that when the input file contains JPEG data,
+ the tiffcp code forces conversion to RGB space. However,
+ the output normally inherits YCbCr subsampling parameters
+ from the input, which leads to a smaller working buffer
+ than necessary. The buffer is subsequently overrun inside
+ cpStripToTile() (called from writeBufferToContigTiles).
+ Note that the resulting TIFF file would be scrambled even
+ if tiffcp wouldn't crash, since the output file would contain
+ RGB data intepreted as subsampled YCbCr values.
+ .
+ This patch fixes the problem by forcing RGB space on the output
+ TIF if the input is JPEG-encoded and output is *not* JPEG-encoded.
+Origin: upstream, http://bugzilla.maptools.org/show_bug.cgi?id=2480
+Author: Tomasz Buchert tomasz.buch...@inria.fr
+Bug: http://bugzilla.maptools.org/show_bug.cgi?id=2480
+Bug-Debian: http://bugs.debian.org/741451
+
+--- a/tools/tiffcp.c
 b/tools/tiffcp.c
+@@ -629,6 +629,12 @@
+ 		TIFFSetField(out, TIFFTAG_PHOTOMETRIC,
+ 		samplesperpixel == 1 ?
+ 		PHOTOMETRIC_LOGL : PHOTOMETRIC_LOGLUV);
++	else if (input_compression == COMPRESSION_JPEG 
++		samplesperpixel == 3) {
++		/* RGB conversion was forced above
++		   hence the output will be of the same type */
++		TIFFSetField(out, TIFFTAG_PHOTOMETRIC, PHOTOMETRIC_RGB);
++	}
+ 	else
+ 		CopyTag(TIFFTAG_PHOTOMETRIC, 1, TIFF_SHORT);
+ 	if (fillorder != 0)
diff -Nru tiff-4.0.3/debian/patches/series tiff-4.0.3/debian/patches/series
--- tiff-4.0.3/debian/patches/series	2014-06-29 17:32:44.0 -0400
+++ tiff-4.0.3/debian/patches/series	2014-12-23 15:52:13.0 -0500
@@ -6,3 +6,4 @@
 CVE-2013-4232.patch
 CVE-2013-4244.patch
 CVE-2013-4243.patch
+jpeg-colorspace.patch


Bug#769618: unblock: qpdf/5.1.2-2

2014-11-14 Thread Jay Berkenbilt
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package qpdf

Version 5.1.2-2 fixes bug #769599, originally reported as
https://bugs.launchpad.net/ubuntu/+source/qpdf/+bug/1392048.

One-sentence summary: this one-line code change fixes a bug that makes
it impossible to print certain PDF files that contain blank pages.

Detailed description: a PDF file may contain a page that lacks a
/Contents key in its page dictionary. This is one way to represent a
blank page in a PDF file. (The other, more common way is to include
/Contents but have it be empty.) The /usr/lib/cups/filter/pdftopdf
program, which is part of cups-filters, uses the qpdf library in this
way, so without this fix, it is not possible to print PDF files that
contain blank pages implemented in this way. The fix to this bug is one
line of code, and I have already committed the fix upstream. (I am
upstream for qpdf.) The patch attached here includes only the code
change, but the original commit also includes updates to the extensive
test suite.

Changelog entry:

--
qpdf (5.1.2-2) unstable; urgency=medium

  * Properly handle pages with no /Content in the page dictionary,
enabling printing of files with blank pages as produced by some
software. (Closes: #769599)

 -- Jay Berkenbilt q...@debian.org  Fri, 14 Nov 2014 21:07:25 -0500
--

unblock qpdf/5.1.2-2

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (200, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.14-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -Nru qpdf-5.1.2/debian/changelog qpdf-5.1.2/debian/changelog
--- qpdf-5.1.2/debian/changelog	2014-06-07 17:14:59.0 -0400
+++ qpdf-5.1.2/debian/changelog	2014-11-14 21:22:24.0 -0500
@@ -1,3 +1,11 @@
+qpdf (5.1.2-2) unstable; urgency=medium
+
+  * Properly handle pages with no /Content in the page dictionary,
+enabling printing of files with blank pages as produced by some
+software. (Closes: #769599)
+
+ -- Jay Berkenbilt q...@debian.org  Fri, 14 Nov 2014 21:07:25 -0500
+
 qpdf (5.1.2-1) unstable; urgency=medium
 
   * New upstream release.
diff -Nru qpdf-5.1.2/debian/patches/page-no-content.patch qpdf-5.1.2/debian/patches/page-no-content.patch
--- qpdf-5.1.2/debian/patches/page-no-content.patch	1969-12-31 19:00:00.0 -0500
+++ qpdf-5.1.2/debian/patches/page-no-content.patch	2014-11-14 21:22:24.0 -0500
@@ -0,0 +1,44 @@
+Description: properly handle page with no /Content
+Origin: upstream, https://github.com/qpdf/qpdf/commit/caab1b0e1642bc6ee0194c7ab4c4a4de2ab22f2c
+Bug-Debian: http://bugs.debian.org/769599
+Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/qpdf/+bug/1392048
+
+commit caab1b0e1642bc6ee0194c7ab4c4a4de2ab22f2c
+Author: Jay Berkenbilt e...@ql.org
+Date:   Fri Nov 14 13:43:34 2014 -0500
+
+Handle pages with no /Contents from getPageContents()
+
+The spec allows /Contents to be omitted for pages that are blank, but
+QPDFObjectHandle::getPageContents() was throwing an exception in this
+case.
+
+Index: qpdf/ChangeLog
+===
+--- qpdf.orig/ChangeLog
 qpdf/ChangeLog
+@@ -1,3 +1,11 @@
++2014-11-14  Jay Berkenbilt  e...@ql.org
++
++	* Bug fix: QPDFObjectHandle::getPageContents() no longer throws an
++	exception when called on a page that has no /Contents key in its
++	dictionary. This is allowed by the spec, and some software
++	packages generate files like this for pages that are blank in the
++	original.
++
+ 2014-06-07  Jay Berkenbilt  e...@ql.org
+ 
+ 	* 5.1.2: release
+Index: qpdf/libqpdf/QPDFObjectHandle.cc
+===
+--- qpdf.orig/libqpdf/QPDFObjectHandle.cc
 qpdf/libqpdf/QPDFObjectHandle.cc
+@@ -633,7 +633,7 @@ QPDFObjectHandle::getPageContents()
+ {
+ 	result.push_back(contents);
+ }
+-else
++else if (! contents.isNull())
+ {
+ 	throw std::runtime_error(unknown object type inspecting /Contents 
+  key in page dictionary);
diff -Nru qpdf-5.1.2/debian/patches/series qpdf-5.1.2/debian/patches/series
--- qpdf-5.1.2/debian/patches/series	2014-06-07 17:14:59.0 -0400
+++ qpdf-5.1.2/debian/patches/series	2014-11-14 21:22:24.0 -0500
@@ -0,0 +1 @@
+page-no-content.patch


Bug#757025: transition: icu

2014-08-04 Thread Jay Berkenbilt
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

ICU version 53 is out, and this is the latest version of ICU that will
be available before the freeze for Jesse, so this will be the only
remaining ICU transition the Jesse freeze.. (ICU does releases by the
calendar.) ICU transitions have historically been quite painless. The
dev package is just called libicu-dev, and the API is very stable.
Failure to keep ICU reasonably current results in important packages
like libreoffice pulling in their own ICU, which is a challenge from a
security standpoint. I have already put ICU 53 in experimental, so most
likely, doing this transition is just giving me the okay to upload to
experimental and then scheduling binary NMUs of downstream packages.
This has been the case in the past.

Ben file:

title = icu;
is_affected = .depends ~ libicu52 | .depends ~ libicu52-dbg | .depends ~ 
libicu53 | .depends ~ libicu53-dbg;
is_good = .depends ~ libicu53 | .depends ~ libicu53-dbg;
is_bad = .depends ~ libicu52 | .depends ~ libicu52-dbg;


-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (200, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.14-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20140804115950.0234191861.qww314...@soup.appiancorp.com



Re: dropping libtiff4-dev transitional package

2014-07-08 Thread Jay Berkenbilt
Emilio Pozuelo Monfort po...@debian.org wrote:

 On 23/06/14 21:20, Jay Berkenbilt wrote:

 There are 27 packages (including 1 pending upload) left that still
 have build dependencies on libtiff4-dev:

 https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=libtiff4-dev;users=q...@debian.org

 At this point, I'd like to go ahead and remove libtiff4-dev and change
 these to serious since they will be FTBFS. I'm thinking most people
 will probably fix their packages soon after this, and I can work on NMUs
 for the rest after a little more time. I think we should act soon if we
 want go get the libtiff4-dev transitional out of the archive before
 jessie.

 Any objections?

 Sounds good to me.

 Cheers,
 Emilio

Does it need a hint to transition to jessie? tiff-4.0.3-10 is not going
because of the (intentional) disappearance of binary package
libtiff4-dev.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20140708135452.3193645226.qww314...@jberkenbilt-linux.appiancorp.com



dropping libtiff4-dev transitional package

2014-06-23 Thread Jay Berkenbilt

There are 27 packages (including 1 pending upload) left that still
have build dependencies on libtiff4-dev:

https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=libtiff4-dev;users=q...@debian.org

At this point, I'd like to go ahead and remove libtiff4-dev and change
these to serious since they will be FTBFS. I'm thinking most people
will probably fix their packages soon after this, and I can work on NMUs
for the rest after a little more time. I think we should act soon if we
want go get the libtiff4-dev transitional out of the archive before
jessie.

Any objections?

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20140623152042.0241539363.qww314...@jberkenbilt-linux.appiancorp.com



Bug#717923: tiff transition apparently nearing completion

2014-01-22 Thread Jay Berkenbilt
It looks like there are only two blocking bugs left on the tiff
transition and only one of them applies to a package that's in testing
(gimp).  After these issues are resolved, will it be time for me to
request removal of the tiff3 package?  If not, what is the trigger that
the time has come to request removal?

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20140122153512.0235710083.qww314...@jberkenbilt-linux.appiancorp.com



Re: permission to do a vips upload to proposed-updates (bug 714984)

2013-12-23 Thread Jay Berkenbilt
Adam D. Barratt a...@adam-barratt.org.uk wrote:

 On 2013-12-21 14:49, Adam D. Barratt wrote:
 On 2013-12-20 22:02, Jay Berkenbilt wrote:
 Adam D. Barratt a...@adam-barratt.org.uk wrote:

 Before giving a final ack, please could you provide a source
 debdiff of
 the package you're proposing to upload, preferably versioned as
 7.28.5-1
 +deb7u1?

 Attached.  Thanks!

 Please go ahead; thanks.

 For the record, this was uploaded and I've just flagged it for
 acceptance in to p-u.

Thanks.

 One request: for future updates, please open a suitably-tagged bug
 report against release.debian.org (e.g. via reportbug).

Noted.  I think I knew this at one time and forgot.  I was going to
suggest updating the developer's reference to mention this explicitly,
but I see it's already there.  I will, instead, update my brain, which
appears to have gotten out of date.  Unfortunately, there's some problem
with the data storage system that my brain uses which causes it to
sometimes retrieve old versions of information I have stored there.
This happened not long ago when I requested a library transition.
Hopefully I can make myself remember that I should always try reportbug
against release.debian.org before emailing
debian-release@lists.debian.org.  Thanks.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20131223170828.0401913930.qww314...@soup.q.qbilt.org



permission to do a vips upload to proposed-updates (bug 714984)

2013-12-20 Thread Jay Berkenbilt
Details are in bug 714984.

There's a small bug in vips in wheezy that prevents jpeg compression
from working right in some cases.  This severely impacts the use of vips
for certain types of work.  The problem seems to be related to the jpeg
transition, but upstream provided a small patch.  Mathieu Malaterre
ma...@debian.org did a great job of reporting the problem upstream,
testing it, and having another user test it, so I think this is ready
for a stable upload.  If you are okay with it, I will prepare an upload,
build against wheezy, and upload to proposed-updates.  Any objections?

Note that the current vips in jessie and sid are not affected by this
problem, nor is the version in squeeze.  This problem only affects the
version in wheezy.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20131220101345.3007967710.qww314...@jberkenbilt-linux.appiancorp.com



Re: permission to do a vips upload to proposed-updates (bug 714984)

2013-12-20 Thread Jay Berkenbilt
Adam D. Barratt a...@adam-barratt.org.uk wrote:

 Before giving a final ack, please could you provide a source debdiff of
 the package you're proposing to upload, preferably versioned as 7.28.5-1
 +deb7u1?

Attached.  Thanks!

-- 
Jay Berkenbilt q...@debian.org

diff -Nru vips-7.28.5/debian/changelog vips-7.28.5/debian/changelog
--- vips-7.28.5/debian/changelog	2012-05-29 14:25:06.0 -0400
+++ vips-7.28.5/debian/changelog	2013-12-20 16:53:02.0 -0500
@@ -1,3 +1,11 @@
+vips (7.28.5-1+deb7u1) stable; urgency=low
+
+  * Fix crash on tiff with jpeg compression.  Thanks to Mathieu Malaterre
+ma...@debian.org for diagnosing this bug, getting a fix from
+upstream, and preparing a patch.  (Closes: #689523, #714984, #731948)
+
+ -- Jay Berkenbilt q...@debian.org  Fri, 20 Dec 2013 16:39:12 -0500
+
 vips (7.28.5-1) unstable; urgency=low
 
   * New upstream release
diff -Nru vips-7.28.5/debian/patches/bug714984.patch vips-7.28.5/debian/patches/bug714984.patch
--- vips-7.28.5/debian/patches/bug714984.patch	1969-12-31 19:00:00.0 -0500
+++ vips-7.28.5/debian/patches/bug714984.patch	2013-12-20 16:53:02.0 -0500
@@ -0,0 +1,103 @@
+Description: Segmentation Fault: vips 7.28.5-1 with jpeg compression
+ commit 996f26ec7011f6eb1aad4c204100d0f0970e2cad
+ Author: John Cupitt jcup...@gmail.com
+ Date:   Fri Dec 13 15:03:16 2013 +
+ 
+ fix a tiff write crash
+ 
+ see
+ 
+ http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714984
+ https://github.com/jcupitt/libvips/issues/88
+Bug-Debian: http://bugs.debian.org/714984
+Reviewed-by: Mathieu Malaterre ma...@debian.org
+
+Index: vips-7.28.5/ChangeLog
+===
+--- vips-7.28.5.orig/ChangeLog	2012-05-06 13:29:26.0 +0200
 vips-7.28.5/ChangeLog	2013-12-14 10:47:03.610487401 +0100
+@@ -1,3 +1,6 @@
++13/12/13 started 7.28.5-1
++- fix jpeg tiff write, see https://github.com/jcupitt/libvips/issues/88
++
+ 19/4/12 started 7.28.5
+ - ifthenelse blend mode was broken
+ - small blend speedup
+Index: vips-7.28.5/libvips/foreign/vips2tiff.c
+===
+--- vips-7.28.5.orig/libvips/foreign/vips2tiff.c	2012-05-06 13:29:26.0 +0200
 vips-7.28.5/libvips/foreign/vips2tiff.c	2013-12-14 10:47:03.610487401 +0100
+@@ -126,6 +126,8 @@
+  * 2/12/11
+  * 	- make into a simple function call ready to be wrapped as a new-style
+  * 	  VipsForeign class
++ * 7/8/12
++ * 	- be more cautious enabling YCbCr mode
+  */
+ 
+ /*
+@@ -452,15 +454,9 @@
+ 	TIFFSetField( tif, TIFFTAG_ORIENTATION, ORIENTATION_TOPLEFT );
+ 	TIFFSetField( tif, TIFFTAG_COMPRESSION, tw-compression );
+ 
+-	if( tw-compression == COMPRESSION_JPEG ) {
++	if( tw-compression == COMPRESSION_JPEG ) 
+ 		TIFFSetField( tif, TIFFTAG_JPEGQUALITY, tw-jpqual );
+ 
+-		/* Enable rgb-ycbcr conversion in the jpeg write. See also
+-		 * the photometric selection below.
+-		 */
+-		TIFFSetField( tif, TIFFTAG_JPEGCOLORMODE, JPEGCOLORMODE_RGB );
+-	}
+-
+ 	if( tw-predictor != -1 ) 
+ 		TIFFSetField( tif, TIFFTAG_PREDICTOR, tw-predictor );
+ 
+@@ -518,12 +514,17 @@
+ 	TIFFTAG_INKSET, INKSET_CMYK );
+ 			}
+ 			else if( tw-compression == COMPRESSION_JPEG 
+-tw-im-Bands == 3 ) 
++tw-im-Bands == 3 
++tw-im-BandFmt == VIPS_FORMAT_UCHAR ) { 
+ /* This signals to libjpeg that it can do
+  * YCbCr chrominance subsampling from RGB, not
+  * that we will supply the image as YCbCr.
+  */
+ photometric = PHOTOMETRIC_YCBCR;
++TIFFSetField( tif, 
++	TIFFTAG_JPEGCOLORMODE, 
++	JPEGCOLORMODE_RGB );
++			}
+ 			else
+ photometric = PHOTOMETRIC_RGB;
+ 
+@@ -1340,9 +1341,27 @@
+ 	/* TIFFTAG_JPEGQUALITY is a pesudo-tag, so we can't copy it.
+ 	 * Set explicitly from TiffWrite.
+ 	 */
+-	if( tw-compression == COMPRESSION_JPEG ) 
++	if( tw-compression == COMPRESSION_JPEG ) {
+ 		TIFFSetField( out, TIFFTAG_JPEGQUALITY, tw-jpqual );
+ 
++		/* Only for three-band, 8-bit images.
++		 */
++		if( tw-im-Bands == 3 
++			tw-im-BandFmt == VIPS_FORMAT_UCHAR ) { 
++			/* Enable rgb-ycbcr conversion in the jpeg write. 
++			 */
++			TIFFSetField( out, 
++TIFFTAG_JPEGCOLORMODE, JPEGCOLORMODE_RGB );
++
++			/* And we want ycbcr expanded to rgb on read. 
++			 * Otherwise TIFFTileSize() will give us the size of 
++			 * a chrominance subsampled tile.
++			 */
++			TIFFSetField( in, 
++TIFFTAG_JPEGCOLORMODE, JPEGCOLORMODE_RGB );
++		   }
++	}
++
+ 	/* We can't copy profiles :( Set again from TiffWrite.
+ 	 */
+ 	if( embed_profile( tw, out ) )
diff -Nru vips-7.28.5/debian/patches/series vips-7.28.5/debian/patches/series
--- vips-7.28.5/debian/patches/series	2010-02-06 17:41:01.0 -0500
+++ vips-7.28.5/debian/patches/series	2013-12-20 16:53:02.0 -0500
@@ -0,0 +1 @@
+bug714984.patch


Bug#729531: transition: icu

2013-12-04 Thread Jay Berkenbilt
Julien Cristau jcris...@debian.org wrote:

 I'd like to upgrade the version of ICU from 4.8 to 52.  They changed
 their version numbering scheme essentially multiplying everything by 10.
 We skipped a few versions (49, 50, 51) because of the freeze before
 wheezy.  This is the first major version to be released since Wheezy.
 (A major ICU version is released every six months.)  ICU 52 should be
 source compatible but not binary compile with ICU 4.8.  Many bugs have
 been fixed since ICU 4.8.  I have basically done a library transition
 approximately every other ICU version, and they have all gone smoothly
 up to this point.  The dev package name is versionless (libicu-dev) so
 this transition should be able to be done with just a forced rebuild of
 ICU's reverse dependencies.

 Please go ahead, and let us know when icu 52 is installed on all archs
 so we can start the rebuilds.

ICU 52 is installed on all architectures now.  Thanks!

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20131204082445.0398451667.qww314...@soup.q.qbilt.org



Bug#717923: transition: tiff 4.x (libtiff5)

2013-12-04 Thread Jay Berkenbilt
Julien Cristau jcris...@debian.org wrote:

 On Tue, Dec  3, 2013 at 16:02:17 -0500, Jay Berkenbilt wrote:

 If you're good with this plan, give me the word, and I will do the
 upload.  I can probably take care of the mass bug filing...I can script
 it locally unless you have a quick way to do it.
 
 Sounds good to me, I think we can go ahead with this.

I've got it ready to go but with two changes, so I wanted to get
confirmation.

1. Why is it necessary for the transition packages to depend on the
binary libraries and not just the dev package?  If libtiff4-dev and
libtiff5-alt-dev depend on libtiff5-dev ( 4.0.3-6~), isn't this
sufficient?  Is there some special reason that the dependency on
libtiff5 (and presumably also libtiffxx5) has to be explicit?

2. I think I'm going punt on libtiff4-alt-dev.  Fedora switched over
to tiff 4.x a while ago and never provided any way for people to build
against 3.x libraries.  There were only something like 3 packages that
had any issues, and by now, fixes are available in all cases.  Also,
unlike libtiff5-alt-dev, which was totally transparent because of
pkg-config, tiff 3.x doesn't use pkg-config, so having people use it
would require changes to their builds anyway.

The new package will 4.0.3-6.  For libtiff4-dev and libtiff5-alt-dev,
both provided by the tiff source package, I have

Depends: ${misc:Depends}, libtiff5-dev ( 4.0.3-6~)

and for libtiff5-dev, I have

Replaces: libtiff5-alt-dev ( 4.0.3-6~), libtiff4-dev ( 4.0.3-6~)
Conflicts: libtiff5-alt-dev ( 4.0.3-6~), libtiff4-dev ( 4.0.3-6~)
Provides: libtiff-dev

For the tiff3 package, I just dropped the libtiff4-dev package and the
provides of libtiff-dev along with it.  There will be no -dev package
for tiff 3.x.

I won't upload today because I want to compose a message to debian-devel
first, but if this sounds okay, I will do the upload tomorrow.  I did
various tests including installing libtiff4-dev and libtiff5-alt-dev and
upgrading.  The upgrade pulled in libtiff5-dev and libtiff5xx (libtiff5
was already on my system) and autoremoved libtiffxx0c2, and then it was
safe for me to remove the two transitional packages as expected.  I also
tested building vips in a chroot with the updated packages.  vips has
tons of dependencies including both tiff4 and tiff5 indirectly.
Everything looks good there as well.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20131204165927.0208763127.qww314...@jberkenbilt-linux.appiancorp.com



Bug#717923: transition: tiff 4.x (libtiff5)

2013-12-03 Thread Jay Berkenbilt
Julien Cristau jcris...@debian.org wrote:

 Hi Jay,

 first, sorry for not handling this sooner.

Apology accepted.  I know you guys have too much to do and not enough
resources.


 On Fri, Jul 26, 2013 at 11:33:03 -0400, Jay Berkenbilt wrote:

  Rationale for not keeping libtiff4-dev:
 
   * tiff 3.x does not support pkg-config.  We can't install libtiff4
 dev files in a standard path since they will then conflict with
 libtiff-dev.  Therefore, source packages that must have
 libtiff4-dev will have to make changes to their builds anyway to
 change include and library paths; simple binary NMU for this
 case is not possible.  Forcing them to change the build
 dependency to libtiff4-alt-dev makes it easier to track which
 packages need attention and which packages have already been
 updated.  Basically everyone with libtiff4-dev in their build
 dependency list will either have to replace it with libtiff-dev
 or replace it with libtiff4-alt-dev and update include and
 library paths.
 
 So I think your plan sounds good, but I would really prefer to have as
 few packages as possible build-depending on libtiff4-dev before we flip
 the switch.  Either that, or make the libtiff-dev built from the tiff
 4.x source package temporarily build a transitional libtiff4-dev package
 depending on libtiff-dev and libtiff5, do the mass bug filing, and give
 people a couple months to change their build-deps (or less, if there are
 volunteers for an aggressive NMU campaign).  I count about 70 such
 source packages right now, and making them all FTBFS would be annoying.

Sounds great to me.  I think this plan will make for a smoother transition:

1. tiff3: stop providing libtiff-dev, drop libtiff4-dev, add
   libtiff4-alt-dev as in the original plan.

2. tiff: New plan: keep libtiff5-dev but have it provide libtiff-dev.
   Don't drop libtiff5-alt-dev, but instead make it a transitional
   package that depends on libtiff5-dev.  Incorporate your suggestion of
   adding libtiff4-dev to depend on libtiff-dev and libtiff5.

3. Do mass bug filing as described before.  Give people some time to
   adjust.

4. Eventually remove libtiff5-alt-dev and libtiff4-dev from the tiff
   package and drop the tiff3 package.  Deal with anything that's FTBFS
   at that time.

Only step 2 really differs from my original plan, and I agree that it is
an improvement.  By adding the libtiff4-dev package that you suggest and
also making libtiff5-alt-dev a transitional package that depends on
libtiff5-dev, very few if any should packages be FTBFS during the
transition, right?

Note that Ubuntu has had libtiff5-dev providing libtiff-dev for some
time now, which bodes well for us.

If you're good with this plan, give me the word, and I will do the
upload.  I can probably take care of the mass bug filing...I can script
it locally unless you have a quick way to do it.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20131203160217.2981378896.qww314...@jberkenbilt-linux.appiancorp.com



Bug#729531: ICU 52.1 in experimental

2013-11-14 Thread Jay Berkenbilt
I neglected to mention that ICU 5.2 is packaged and in experimental.
When I get the green light from the release team to upload, it should be
ready to go.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20131114103002.0503992294.qww314...@jberkenbilt-linux.appiancorp.com



Bug#729531: transition: icu

2013-11-13 Thread Jay Berkenbilt
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

I'd like to upgrade the version of ICU from 4.8 to 52.  They changed
their version numbering scheme essentially multiplying everything by 10.
We skipped a few versions (49, 50, 51) because of the freeze before
wheezy.  This is the first major version to be released since Wheezy.
(A major ICU version is released every six months.)  ICU 52 should be
source compatible but not binary compile with ICU 4.8.  Many bugs have
been fixed since ICU 4.8.  I have basically done a library transition
approximately every other ICU version, and they have all gone smoothly
up to this point.  The dev package name is versionless (libicu-dev) so
this transition should be able to be done with just a forced rebuild of
ICU's reverse dependencies.

Ben file:

title = icu;
is_affected = .depends ~ libicu48 | .depends ~ libicu52;
is_good = .depends ~ libicu52;
is_bad = .depends ~ libicu48;


-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (200, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.10-3-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20131113164158.0666434927.qww314159@soup



Re: tiff 4.x (libtiff5) transition

2013-09-03 Thread Jay Berkenbilt
Luk Claes l...@debian.org wrote:

 Your plan looks good except that I think it would be better to have
 libtiff5-dev provide libtiff-dev and not introduce a proper libtiff-dev.

Thanks for the reply.  That's fine, I can make that modification.
Rereading my plan all the way through, I think having libtiff5-dev
provide libtiff-dev instead of renaming it requires small and obvious
changes and also means that people who depend on libtiff5-dev don't
technically have to change their packages.  I'd still rather have people
build depend on libtiff-dev.  Most of my arguments for not having
libtiff5-dev were based on potential future transitions, which are not
all that likely to happen.  That said, I do use unversioned dev package
names for all my other library packages, and if I were packaging tiff
from scratch today, I would probably do it that way.  But I don't feel
strongly, so I can and will go with your modification unless someone
tells me not to.

I am assuming this is not an invitation to proceed yet, right?  I am
holding off on doing it until I actually get an explicit go-ahead.  If
I'm supposed to take this as a green light, please let me know.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20130903141817.0222656689.qww314...@jberkenbilt-linux.appiancorp.com



Bug#717922: transition: qpdf

2013-07-26 Thread Jay Berkenbilt
Package: release.debian.org
Usertags: transition

I have uploaded qpdf 5.0.0-2 to unstable.  This is a transition from
libqpdf10 to libqpdf13.  It's source compatible, and the one package
(cups-filters) that build depends on libqpdf-dev just needs a binary
NMU.  (I'm not even sure I have to tell you about this...I think this
has happened automatically in the past, but I can't remember for sure.)


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20130726112918.1573207152.qww314...@jberkenbilt-linux.appiancorp.com



Bug#717923: transition: tiff 4.x (libtiff5)

2013-07-26 Thread Jay Berkenbilt
.

 Rationale for not having libtiff-dev provide libtiff5-dev:

  * Hardly anything can be depending on libtiff5-dev since it would
only be possible currently if you have no packages in your
dependency or reverse dependency chain that build depend on
libtiff4-dev.

  * Not having a libtiff5-dev in the archive at all will make it
easier for us in dealing with some future hypothetical upgrade
to a newer non-binary-compatible version in the future.  No such
upgrade is planned, and upstream is pretty much just in
maintenance mode, but you never know.

 Rationale for not keeping libtiff4-dev:

  * tiff 3.x does not support pkg-config.  We can't install libtiff4
dev files in a standard path since they will then conflict with
libtiff-dev.  Therefore, source packages that must have
libtiff4-dev will have to make changes to their builds anyway to
change include and library paths; simple binary NMU for this
case is not possible.  Forcing them to change the build
dependency to libtiff4-alt-dev makes it easier to track which
packages need attention and which packages have already been
updated.  Basically everyone with libtiff4-dev in their build
dependency list will either have to replace it with libtiff-dev
or replace it with libtiff4-alt-dev and update include and
library paths.

 Right now, we have a stable state where the default is libtiff4,
 most packages get libtiff4, those that need libtiff5 can get it
 with special workarounds, and libtiff4 and libtiff5 can be
 arbitrarily mixed in the dependency/build dependency chain.

 This step can get us quickly to a new stable state that reverses
 the roles of libtiff4 and libtiff5: the default becomes libtiff5,
 most packages get libtiff5, those that need libtiff4 can get it
 with special workarounds, and libtiff4 and libtiff5 can be
 arbitrarily mixed in the dependency/build dependency chain.

 Though things will admittedly be a little chaotic right after the
 initial upload, we will quickly reach a point where new versions
 can transition to jessie, and we can work at our leisure in
 fixing the packages that need libtiff4-alt-dev.

 2.  Tell packagers (via mass bug filing?):

  * If your package depends on libtiff-dev already, no action
required; the release team will automatically schedule binary
NMUs of your package.

  * If your package depends on libtiff4-dev but can work fine with
tiff 4.x (most packages), replace your dependency on
libtiff4-dev with a new dependency on libtiff-dev.

  * If your package depended on libtiff5-dev, change it to depend on
libtiff-dev, or to help future backporters, on libtiff-dev (
4.0.3-1~).

  * If your package previously depended on libtiff5-alt-dev, change
it to depend on libtiff-dev ( 4.0.3-1~) and remove any special
code in your packaging that you had to add to get
libtiff5-alt-dev.  (If you were finding libtiff5 with
pkg-config, no action will be required.)

  * If your package MUST continue to use tiff 3.x, then replace your
build dependency on libtiff4-dev or libtiff-dev with one on
libtiff4-alt-dev (which can coexist with libtiff-dev) and change
your build to look in /usr/include/libtiff4-alt for headers and
libraries in /usr/lib/arch/libtiff4-alt.  (There is no
pkg-config support in tiff 3.x, unfortunately, so this will have
to be manual.)

 3.  Continue to monitor.  Work toward fixing any issues that prevent
 packages from dropping libtiff4-alt-dev.

 4.  Before jessie, when all issues are resolved, remove tiff3 source
 package.

As I said, this is disruptive in the short term (basically between the
uploads of the new tiff packages and when people fix their build
dependencies), but I think it can converge quickly because none of the
steps required for developers (or NMU-ers) to follow are hard.
Basically no one has to change any source code or fix any bugs at this
point.  The only thing they have to do is make sure -I and -L are
correct in their packages' builds, and this can likely be done pretty
easily for most packages.

I'm happy to discuss less disruptive ways to do this, but I worry about
having this drag on for ages, and I would also can't think of any less
disruptive way to do it that doesn't require most packages to be changed
twice instead of just once.  But someone on the release team with more
experience in planning and managing transitions like this may come up
with something better that I have overlooked.

I'd obviously like to get on this as soon as possible, but I understand
that there are many competing priorities and will certainly work with
the release team to get this done at the appropriate time and in the
appropriate way.

-- 
Jay Berkenbilt q

Re: Why does libgeotiff-dev depend on libtiff5-dev ?

2013-06-17 Thread Jay Berkenbilt
Francesco P. Lovergine fran...@debian.org wrote:

 On Sat, Jun 15, 2013 at 10:00:26PM +0100, Alastair McKinstry wrote:
 I'm unfamiliar with the history of libtiff4 / tiff5, but libgd-dev
 depends on libtiff-dev ;
 can anyone answer:
 (1) why does libgeotiff-dev depend on libtiff5-dev?

 Because it needs a working bigtiff support, which is only provided by libtiff5

 (2) why libtiff5-dev not provide the virtual libtiff-dev?
 

 Because in wheezy the tiff maintainer would not accept the migration to the
 current library for all rdeps, which is understandable.

The release team would not let me, which is also understandable.

 The 5 flavor is of primary interest for gis-related programs.
 Something that definitevely needs to be managed for jessie, because
 sometimes one could need to link gis-related and other libraries. To
 support that decision let me remember all of you that tiff5 is
 compatible at source level with tiff4.

Please instead build-depend on libtiff5-alt-dev and use pkg-config to
find libtiff.  Then you will be all set for the transition when it
occurs.  For additional details, please see README.Debian in the tiff
package and
http://lists.debian.org/debian-release/2013/05/msg00127.html.

The release team has not yet found the time to reply to my message of
May 6 on when they will be ready to think about the tiff transition or
whether my plans for the transition are okay.  (It is not my intention
to be critical of the release team.  They do a great job and are
volunteers with limited time just like the rest of us.)  In the mean
time, we will continue to have issues like this popping up as people
stumble over the current confusion.  If I had known over a year ago when
I put the first version of libtiff5-dev into debian that it was going to
be this long before the transition could happen, I would have not made a
libtiff5-dev and instead only made a libtiff5-alt-dev, but it's too late
for that now, I'm afraid.  I suppose I could make libtiff5-dev an alias
for libtiff5-alt-dev, but that would break any packages that aren't
using pkg-config to find -ltiff.

Please note that if you build depend on libtiff5-alt-dev, you will get a
lintian error about use of a runpath.  This is harmless as the runpath
points to a location where there will never be a copy of the library.  I
am going to try to resolve this.

Maybe I will ask the release team if I should make libtiff5-dev an alias
to libtiff5-alt-dev, assuming they do not reply to that suggestion from
this message.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20130617101759.0237414693.qww314...@jberkenbilt-linux.appiancorp.com



Re: tiff 4.x (libtiff5) transition

2013-06-01 Thread Jay Berkenbilt
It's been a few weeks since my original post about the libtiff
transition, and I haven't heard any responses.  While I appreciate that
this is not at the top of your long list, I would really appreciate some
kind of response if only an indication that you've got it on your list
and will prioritize it when you have a chance.  Mainly I'm interested to
know whether you think my plan is sound and whether you have any idea
when we might be able to move forward.

In the mean time, I'm going to move forward with uploading new versions,
etc., without changing the current packaging scheme since I don't want
to make a change that will make things harder than necessary.  In my
original message, I mentioned the versions that would be part of the
transition, so clearly those versions are going to change now.  I just
don't want anyone to think that I have given up waiting and am going to
push forward.  Thanks.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130601145540.0542213282.qww314159@soup



Re: tiff 4.x (libtiff5) transition

2013-05-14 Thread Jay Berkenbilt

I'm not sure where the tiff transition falls on your long list, but I
thought I'd add a little more information on what issues we may
encounter.

Jay Berkenbilt q...@debian.org wrote:

 Wasting no time, I'd like to remind the release team that I'm really
 hoping Jessie will ship with only one version of the tiff library:
 . . .

 The vast majority of packages that use tiff 3.x will transition to tiff
 4.x with no changes to their code.  Those packages that already build
 depend on libtiff-dev instead of libtiff4-dev may even get away with
 just a binary NMU.  There are some packages that may require small code
 changes to take care of places where APIs have changed to support
 bigtiff. . . .

Following up on this, I'm include the following remark from Tom Lane,
the person at Red Hat who manages the tiff package and who is active on
the upstream mailing list (and who I have talked to many times about
coordinating security issues, etc.):

  libtiff4 is source-compatible but not binary-compatible with libtiff3.
  The breaks were necessary to support large files.

 FWIW, my experience with updating the Fedora distro is that 4.0 is only
 about 99.9% source-compatible either.  There were a few packages that
 required source-code fixes (freeimage, tkimg, xloadimage according to
 my notes).  As an example, the library no longer exposes the contents
 of struct TIFFFieldInfo.

In any case, as Fedora has already made progress in this area, I can
mine their patches for any required NMUs.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20130514110904.0207178878.qww314...@jberkenbilt-linux.appiancorp.com



tiff 4.x (libtiff5) transition

2013-05-06 Thread Jay Berkenbilt
 upgrade
to a newer non-binary-compatible version in the future.  No such
upgrade is planned, and upstream is pretty much just in
maintenance mode, but you never know.

 Rationale for not keeping libtiff4-dev:

  * tiff 3.x does not support pkg-config.  We can't install libtiff4
dev files in a standard path since they will then conflict with
libtiff-dev.  Therefore, source packages that must have
libtiff4-dev will have to make changes to their builds anyway to
change include and library paths; simple binary NMU for this
case is not possible.  Forcing them to change the build
dependency to libtiff4-alt-dev makes it easier to track which
packages need attention and which packages have already been
updated.  Basically everyone with libtiff4-dev in their build
dependency list will either have to replace it with libtiff-dev
or replace it with libtiff4-alt-dev and update include and
library paths.

 Right now, we have a stable state where the default is libtiff4,
 most packages get libtiff4, those that need libtiff5 can get it
 with special workarounds, and libtiff4 and libtiff5 can be
 arbitrarily mixed in the dependency/build dependency chain.

 This step can get us quickly to a new stable state that reverses
 the roles of libtiff4 and libtiff5: the default becomes libtiff5,
 most packages get libtiff5, those that need libtiff4 can get it
 with special workarounds, and libtiff4 and libtiff5 can be
 arbitrarily mixed in the dependency/build dependency chain.

 Though things will admittedly be a little chaotic right after the
 initial upload, we will quickly reach a point where new versions
 can transition to jessie, and we can work at our leisure in
 fixing the packages that need libtiff4-alt-dev.

 2.  Tell packagers (via mass bug filing?):

  * If your package depends on libtiff-dev already, no action
required; the release team will automatically schedule binary
NMUs of your package.

  * If your package depends on libtiff4-dev but can work fine with
tiff 4.x (most packages), replace your dependency on
libtiff4-dev with a new dependency on libtiff-dev.

  * If your package depended on libtiff5-dev, change it to depend on
libtiff-dev, or to help future backporters, on libtiff-dev (
4.0.3-1~).

  * If your package previously depended on libtiff5-alt-dev, change
it to depend on libtiff-dev ( 4.0.3-1~) and remove any special
code in your packaging that you had to add to get
libtiff5-alt-dev.  (If you were finding libtiff5 with
pkg-config, no action will be required.)

  * If your package MUST continue to use tiff 3.x, then replace your
build dependency on libtiff4-dev or libtiff-dev with one on
libtiff4-alt-dev (which can coexist with libtiff-dev) and change
your build to look in /usr/include/libtiff4-alt for headers and
libraries in /usr/lib/arch/libtiff4-alt.  (There is no
pkg-config support in tiff 3.x, unfortunately, so this will have
to be manual.)

 3.  Continue to monitor.  Work toward fixing any issues that prevent
 packages from dropping libtiff4-alt-dev.

 4.  Before jessie, when all issues are resolved, remove tiff3 source
 package.

As I said, this is disruptive in the short term (basically between the
uploads of the new tiff packages and when people fix their build
dependencies), but I think it can converge quickly because none of the
steps required for developers (or NMU-ers) to follow are hard.
Basically no one has to change any source code or fix any bugs at this
point.  The only thing they have to do is make sure -I and -L are
correct in their packages' builds, and this can likely be done pretty
easily for most packages.

I'm happy to discuss less disruptive ways to do this, but I worry about
having this drag on for ages, and I would also can't think of any less
disruptive way to do it that doesn't require most packages to be changed
twice instead of just once.  But someone on the release team with more
experience in planning and managing transitions like this may come up
with something better that I have overlooked.

I'd obviously like to get on this as soon as possible, but I understand
that there are many competing priorities and will certainly work with
the release team to get this done at the appropriate time and in the
appropriate way.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20130506102958.0230117954.qww314...@jberkenbilt-linux.appiancorp.com



Bug#703631: unblock: icu/4.8.1.1-12

2013-03-21 Thread Jay Berkenbilt
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package icu

This upload addresses CVE-2013-0900 and closes RC-bug 702346.  The
change came from upstream and was backported to ICU 4.8 by people at Red
Hat for Fedora 17.  I took their patch, removed the extraneous inclusion
of one of the .orig files from it, and applied it with updated DEP-3
headers.  The resulting package passes its own test suite.

The attached debdiff is relative to 4.8.1.1-11 even though 4.8.1.1-10 is
the version in wheezy.  This is because 4.8.1.1-11 has already been
unblocked and would have transitioned tomorrow, so I wanted to give you
a diff against the most recently approved package.

unblock icu/4.8.1.1-12

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (200, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -Nru icu-4.8.1.1/debian/changelog icu-4.8.1.1/debian/changelog
--- icu-4.8.1.1/debian/changelog	2013-03-16 14:58:26.0 -0400
+++ icu-4.8.1.1/debian/changelog	2013-03-21 11:29:08.0 -0400
@@ -1,3 +1,10 @@
+icu (4.8.1.1-12) unstable; urgency=high
+
+  * Add patch to address CVE-2013-0900, a threading race condition.
+(Closes: #702346)
+
+ -- Jay Berkenbilt q...@debian.org  Thu, 21 Mar 2013 11:29:08 -0400
+
 icu (4.8.1.1-11) unstable; urgency=medium
 
   * Fix crash on rendering incremental Malayalam text input.  Thanks Colin
diff -Nru icu-4.8.1.1/debian/patches/CVE-2013-0900.patch icu-4.8.1.1/debian/patches/CVE-2013-0900.patch
--- icu-4.8.1.1/debian/patches/CVE-2013-0900.patch	1969-12-31 19:00:00.0 -0500
+++ icu-4.8.1.1/debian/patches/CVE-2013-0900.patch	2013-03-21 11:26:50.0 -0400
@@ -0,0 +1,296 @@
+Description: CVE-2013-0900: Race condition in ICU.
+ Credit to Google Chrome Security Team (Inferno)
+ Patch taken from backport done by Fedora 17
+Origin: upstream, http://www.icu-project.org/trac/changeset/32865, http://www.icu-project.org/trac/changeset/32908
+Bug-Debian: http://bugs.debian.org/702346
+Bug-RedHat: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-0900
+
+Index: icu-4.8.1.1/source/common/locid.cpp
+===
+--- icu-4.8.1.1.orig/source/common/locid.cpp	2013-03-21 11:21:45.053153118 -0400
 icu-4.8.1.1/source/common/locid.cpp	2013-03-21 11:21:45.029153121 -0400
+@@ -1,6 +1,6 @@
+ /*
+  **
+- *   Copyright (C) 1997-2010, International Business Machines
++ *   Copyright (C) 1997-2012, International Business Machines
+  *   Corporation and others.  All Rights Reserved.
+  **
+ *
+@@ -32,6 +32,7 @@
+ 
+ #include unicode/locid.h
+ #include unicode/uloc.h
++#include mutex.h
+ #include umutex.h
+ #include uassert.h
+ #include cmemory.h
+@@ -41,6 +42,21 @@
+ 
+ #define LENGTHOF(array) (int32_t)(sizeof(array)/sizeof((array)[0]))
+ 
++U_CDECL_BEGIN
++static UBool U_CALLCONV locale_cleanup(void);
++U_CDECL_END
++
++U_NAMESPACE_BEGIN
++
++static U_NAMESPACE_QUALIFIER Locale *gLocaleCache = NULL;
++
++// gDefaultLocaleMutex protects all access to gDefaultLocalesHashT and gDefaultLocale.
++static UMTX  gDefaultLocaleMutex  = 0;
++static UHashtable   *gDefaultLocalesHashT = NULL;
++static U_NAMESPACE_QUALIFIER Locale *gDefaultLocale   = NULL;
++
++U_NAMESPACE_END
++
+ typedef enum ELocalePos {
+ eENGLISH,
+ eFRENCH,
+@@ -75,10 +91,6 @@
+ UBool valuesToo,
+ UErrorCode *status);
+ 
+-static U_NAMESPACE_QUALIFIER Locale *gLocaleCache = NULL;
+-static U_NAMESPACE_QUALIFIER Locale *gDefaultLocale   = NULL;
+-static UHashtable   *gDefaultLocalesHashT = NULL;
+-
+ U_CDECL_BEGIN
+ //
+ // Deleter function for Locales owned by the default Locale hash table/
+@@ -100,24 +112,19 @@
+ if (gDefaultLocalesHashT) {
+ uhash_close(gDefaultLocalesHashT);   // Automatically deletes all elements, using deleter func.
+ gDefaultLocalesHashT = NULL;
++gDefaultLocale = NULL;
+ }
+-else if (gDefaultLocale) {
+-// The cache wasn't created, and only one default locale was created.
+-delete gDefaultLocale;
+-}
+-gDefaultLocale = NULL;
+ 
+ return TRUE;
+ }
+ U_CDECL_END
+ 
+ U_NAMESPACE_BEGIN
+-//
+-//  locale_set_default_internal.
+-//
+-void locale_set_default_internal(const char *id)
+-{
+-UErrorCode   status = U_ZERO_ERROR;
++
++Locale *locale_set_default_internal(const char *id, UErrorCode status) {
++// Synchronize this entire function.
++Mutex lock(gDefaultLocaleMutex);
++
+ UBool canonicalize = FALSE;
+ 
+ // If given a NULL string for the locale id

Bug#703199: unblock: icu/4.8.1.1-11

2013-03-16 Thread Jay Berkenbilt
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package icu

This patch fixes ICU bug 702982, severity important.  The bug fix is a
one-line (actually one character) change to a table in ICU that fixes a
potential crash rendering incremental Malayalam text input.  This patch
has been applied upstream, and upstream has encouraged distributions to
take it.  The Ubuntu version of ICU already includes this patch.  Since
this is a bug of priority important (which I set it to because a crash
caused by a particular pattern of characters is a potential DOS attack)
and the package can go into testing through unstable, I hope you will
grant the unblock request.  Thanks for considering.

unblock icu/4.8.1.1-11

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (200, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -Nru icu-4.8.1.1/debian/changelog icu-4.8.1.1/debian/changelog
--- icu-4.8.1.1/debian/changelog	2012-11-17 14:37:40.0 -0500
+++ icu-4.8.1.1/debian/changelog	2013-03-16 14:58:26.0 -0400
@@ -1,3 +1,10 @@
+icu (4.8.1.1-11) unstable; urgency=medium
+
+  * Fix crash on rendering incremental Malayalam text input.  Thanks Colin
+Watson. (Closes: #702982)
+
+ -- Jay Berkenbilt q...@debian.org  Sat, 16 Mar 2013 14:58:15 -0400
+
 icu (4.8.1.1-10) unstable; urgency=low
 
   * Include pkg-config files in dev package.  Thanks Tommi Vainikainen.
diff -Nru icu-4.8.1.1/debian/patches/mlym-crash.patch icu-4.8.1.1/debian/patches/mlym-crash.patch
--- icu-4.8.1.1/debian/patches/mlym-crash.patch	1969-12-31 19:00:00.0 -0500
+++ icu-4.8.1.1/debian/patches/mlym-crash.patch	2013-03-16 14:56:23.0 -0400
@@ -0,0 +1,19 @@
+Description: Fix crash on rendering incremental Malayalam text input
+Author: Caolán McNamara caol...@redhat.com
+Origin: other, https://ssl.icu-project.org/trac/ticket/9948
+Forwarded: https://ssl.icu-project.org/trac/ticket/9948
+Last-Update: 2013-03-13
+
+Index: b/source/layout/IndicClassTables.cpp
+===
+--- a/source/layout/IndicClassTables.cpp
 b/source/layout/IndicClassTables.cpp
+@@ -273,7 +273,7 @@
+ 
+ static const IndicClassTable kndaClassTable = {0x0C80, 0x0CEF, 4, KNDA_SCRIPT_FLAGS, kndaCharClasses, kndaSplitTable};
+ 
+-static const IndicClassTable mlymClassTable = {0x0D00, 0x0D6F, 3, MLYM_SCRIPT_FLAGS, mlymCharClasses, mlymSplitTable};
++static const IndicClassTable mlymClassTable = {0x0D00, 0x0D6F, 4, MLYM_SCRIPT_FLAGS, mlymCharClasses, mlymSplitTable};
+ 
+ static const IndicClassTable sinhClassTable = {0x0D80, 0x0DF4, 4, SINH_SCRIPT_FLAGS, sinhCharClasses, sinhSplitTable};
+ 
diff -Nru icu-4.8.1.1/debian/patches/series icu-4.8.1.1/debian/patches/series
--- icu-4.8.1.1/debian/patches/series	2012-05-24 13:52:17.0 -0400
+++ icu-4.8.1.1/debian/patches/series	2013-03-16 14:55:46.0 -0400
@@ -8,3 +8,4 @@
 pathmax.patch
 CVE-2011-4599.patch
 indic-ccmp.patch
+mlym-crash.patch


Bug#699044: unblock: tiff/4.0.2-6, tiff3/3.9.6-11

2013-01-26 Thread Jay Berkenbilt
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock packages tiff and tiff3

I hope it's okay that I'm including two unblock requests together in one
bug report.  The problem applies to both the tiff3 and tiff packages,
and it's exactly the same problem exactly the same fix.

These versions close RC bugs 699041 (tiff3) and 687645 .  They fix a small but
important problem: back in 2008, I changed these packages to stop
creating symlinks in /usr/share/doc, but the preinst wasn't properly
removing old symlinks.  This could affect people who were upgrading from
etch or people whose systems have been continuously updated since that
time who may still have symlinks for those packages.

Debdiffs attached.

tiff3_3.9.6-10-to-11.debdiff
--
diff -Nru tiff3-3.9.6/debian/all-preinst tiff3-3.9.6/debian/all-preinst
--- tiff3-3.9.6/debian/all-preinst  2009-06-28 13:10:19.0 -0400
+++ tiff3-3.9.6/debian/all-preinst  2013-01-26 12:22:55.0 -0500
@@ -1,6 +1,5 @@
 #!/bin/sh
 set -e
-if [ x$1 = xupgrade -a \
- -d /usr/share/doc/PKG -a ! -h /usr/share/doc/PKG ]; then
-  rm -rf /usr/share/doc/PKG
+if [ -h /usr/share/doc/PKG ]; then
+  rm -f /usr/share/doc/PKG
 fi
diff -Nru tiff3-3.9.6/debian/changelog tiff3-3.9.6/debian/changelog
--- tiff3-3.9.6/debian/changelog2012-12-15 06:13:58.0 -0500
+++ tiff3-3.9.6/debian/changelog2013-01-26 12:32:35.0 -0500
@@ -1,3 +1,11 @@
+tiff3 (3.9.6-11) unstable; urgency=high
+
+  * Fix /usr/share/doc symlink to directory transition.  When upgrading
+from very old versions (pre 3.8.2-8), /usr/share/doc may contain
+symbolic links that should be removed.  (Closes: #699041)
+
+ -- Jay Berkenbilt q...@debian.org  Sat, 26 Jan 2013 12:27:56 -0500
+
 tiff3 (3.9.6-10) unstable; urgency=high
 
   * Add fix for CVE-2012-5581, reimplementing DOTRANGE handling to make it
--


tiff_4.0.2-5-to-6.debdiff
--
diff -Nru tiff-4.0.2/debian/all-preinst tiff-4.0.2/debian/all-preinst
--- tiff-4.0.2/debian/all-preinst   2009-08-21 13:26:05.0 -0400
+++ tiff-4.0.2/debian/all-preinst   2013-01-26 12:29:19.0 -0500
@@ -1,6 +1,5 @@
 #!/bin/sh
 set -e
-if [ x$1 = xupgrade -a \
- -d /usr/share/doc/PKG -a ! -h /usr/share/doc/PKG ]; then
-  rm -rf /usr/share/doc/PKG
+if [ -h /usr/share/doc/PKG ]; then
+  rm -f /usr/share/doc/PKG
 fi
diff -Nru tiff-4.0.2/debian/changelog tiff-4.0.2/debian/changelog
--- tiff-4.0.2/debian/changelog 2012-11-17 12:40:40.0 -0500
+++ tiff-4.0.2/debian/changelog 2013-01-26 12:28:48.0 -0500
@@ -1,3 +1,11 @@
+tiff (4.0.2-6) unstable; urgency=high
+
+  * Fix /usr/share/doc symlink to directory transition.  When upgrading
+from very old versions (pre 3.8.2-8), /usr/share/doc may contain
+symbolic links that should be removed.  (Closes: #687645)
+
+ -- Jay Berkenbilt q...@debian.org  Sat, 26 Jan 2013 12:28:19 -0500
+
 tiff (4.0.2-5) unstable; urgency=high
 
   * Add fix for CVE-2012-4564, a heap-buffer overflow.  Thanks Adrian La
--

unblock tiff/4.0.2-6
unblock tiff/3.9.6-11

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (200, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130126124542.0457685504.qww314159@soup



Bug#695988: unblock: tiff3/3.9.6-10

2012-12-15 Thread Jay Berkenbilt
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package tiff3

This version of tiff3 addresses CVE-2012-5581 and closes RC bug 694693.
The only change is the inclusion of the patch, which was prepared by
the Ubuntu security team and was backported from upstream CVS by the Red
Hat Security team.

Debdiff attached.

unblock tiff3/3.9.6-10

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (200, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

diff -Nru tiff3-3.9.6/debian/changelog tiff3-3.9.6/debian/changelog
--- tiff3-3.9.6/debian/changelog	2012-10-05 17:32:44.0 -0400
+++ tiff3-3.9.6/debian/changelog	2012-12-15 06:13:58.0 -0500
@@ -1,3 +1,11 @@
+tiff3 (3.9.6-10) unstable; urgency=high
+
+  * Add fix for CVE-2012-5581, reimplementing DOTRANGE handling to make it
+safer.  Thanks to Red Hat security team for backporting the fix.
+(Closes: #694693)
+
+ -- Jay Berkenbilt q...@debian.org  Sat, 15 Dec 2012 06:04:00 -0500
+
 tiff3 (3.9.6-9) unstable; urgency=high
 
   * Previous change was uploaded with the wrong CVE number.  I updated the
diff -Nru tiff3-3.9.6/debian/patches/CVE-2012-5581.patch tiff3-3.9.6/debian/patches/CVE-2012-5581.patch
--- tiff3-3.9.6/debian/patches/CVE-2012-5581.patch	1969-12-31 19:00:00.0 -0500
+++ tiff3-3.9.6/debian/patches/CVE-2012-5581.patch	2012-12-15 05:59:34.0 -0500
@@ -0,0 +1,324 @@
+Author: Frank Warmerdam  warmer...@google.com
+Description: * libtiff/tif_dir.c, tif_print.c : Remove FIELD_CUSTOM handling
+  for PAGENUMBER, HALFTONEHINTS, and YCBCRSUBSAMPLING.  Implement DOTRANGE
+  differently. This is to avoid using special TIFFGetField/TIFFSetField rules
+  for these fields in non-image directories (like EXIF).
+
+Back-ported patch from upstream CVS by Huzaifa S. Sidhpurwala of Red Hat
+Security Response Team.
+
+https://bugzilla.redhat.com/show_bug.cgi?id=867235
+https://bugzilla.redhat.com/attachment.cgi?id=640578
+
+Index: tiff3-3.9.6/libtiff/tif_dir.c
+===
+--- tiff3-3.9.6.orig/libtiff/tif_dir.c	2010-07-08 12:17:59.0 -0400
 tiff3-3.9.6/libtiff/tif_dir.c	2012-12-15 05:59:21.869364661 -0500
+@@ -493,94 +493,90 @@
+ 		status = 0;
+ 		goto end;
+ 		}
++   if (fip-field_tag == TIFFTAG_DOTRANGE 
++strcmp(fip-field_name,DotRange) == 0) {
++   /* TODO: This is an evil exception and should not have been
++  handled this way ... likely best if we move it into
++  the directory structure with an explicit field in 
++  libtiff 4.1 and assign it a FIELD_ value */
++   uint16 v[2];
++   v[0] = (uint16)va_arg(ap, int);
++   v[1] = (uint16)va_arg(ap, int);
++   _TIFFmemcpy(tv-value, v, 4);
++   }
++
++   else if (fip-field_passcount
++ || fip-field_writecount == TIFF_VARIABLE
++ || fip-field_writecount == TIFF_VARIABLE2
++ || fip-field_writecount == TIFF_SPP
++ || tv-count  1) {
+ 
+-		if ((fip-field_passcount
+-		|| fip-field_writecount == TIFF_VARIABLE
+-		|| fip-field_writecount == TIFF_VARIABLE2
+-		|| fip-field_writecount == TIFF_SPP
+-		|| tv-count  1)
+-		 fip-field_tag != TIFFTAG_PAGENUMBER
+-		 fip-field_tag != TIFFTAG_HALFTONEHINTS
+-		 fip-field_tag != TIFFTAG_YCBCRSUBSAMPLING
+-		 fip-field_tag != TIFFTAG_DOTRANGE) {
+ _TIFFmemcpy(tv-value, va_arg(ap, void *),
+ tv-count * tv_size);
+ 		} else {
+-		/*
+-		 * XXX: The following loop required to handle
+-		 * TIFFTAG_PAGENUMBER, TIFFTAG_HALFTONEHINTS,
+-		 * TIFFTAG_YCBCRSUBSAMPLING and TIFFTAG_DOTRANGE tags.
+-		 * These tags are actually arrays and should be passed as
+-		 * array pointers to TIFFSetField() function, but actually
+-		 * passed as a list of separate values. This behaviour
+-		 * must be changed in the future!
+-		 */
+-		int i;
++assert( tv-count == 1 );
+ 		char *val = (char *)tv-value;
+-
+-		for (i = 0; i  tv-count; i++, val += tv_size) {
+-			switch (fip-field_type) {
+-case TIFF_BYTE:
+-case TIFF_UNDEFINED:
+-{
+-	uint8 v = (uint8)va_arg(ap, int);
+-	_TIFFmemcpy(val, v, tv_size);
+-}
+-break;
+-case TIFF_SBYTE:
+-{
+-	int8 v = (int8)va_arg(ap, int);
+-	_TIFFmemcpy(val, v, tv_size

Bug#693541: unblock: tiff/4.0.2-5

2012-11-17 Thread Jay Berkenbilt
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
Severity: normal

Please unblock package tiff 4.0.2-5, which includes a patch to address
CVE-2012-4564 and which closes RC bug #692345.

diff -Nru tiff-4.0.2/debian/changelog tiff-4.0.2/debian/changelog
--- tiff-4.0.2/debian/changelog	2012-10-05 17:39:16.0 -0400
+++ tiff-4.0.2/debian/changelog	2012-11-17 12:40:40.0 -0500
@@ -1,3 +1,10 @@
+tiff (4.0.2-5) unstable; urgency=high
+
+  * Add fix for CVE-2012-4564, a heap-buffer overflow.  Thanks Adrian La
+Duca for doing all the work to prepare this upload.  (Closes: #692345)
+
+ -- Jay Berkenbilt q...@debian.org  Sat, 17 Nov 2012 12:40:25 -0500
+
 tiff (4.0.2-4) unstable; urgency=high
 
   * Previous change was uploaded with the wrong CVE number.  I updated the
diff -Nru tiff-4.0.2/debian/patches/CVE-2012-4564.patch tiff-4.0.2/debian/patches/CVE-2012-4564.patch
--- tiff-4.0.2/debian/patches/CVE-2012-4564.patch	1969-12-31 19:00:00.0 -0500
+++ tiff-4.0.2/debian/patches/CVE-2012-4564.patch	2012-11-17 12:39:17.0 -0500
@@ -0,0 +1,31 @@
+Index: tiff-4.0.2/tools/ppm2tiff.c
+===
+--- tiff-4.0.2.orig/tools/ppm2tiff.c	2010-04-10 15:22:34.0 -0400
 tiff-4.0.2/tools/ppm2tiff.c	2012-11-16 13:00:44.654825029 -0500
+@@ -89,6 +89,7 @@
+ 	int c;
+ 	extern int optind;
+ 	extern char* optarg;
++	tmsize_t scanline_size;
+ 
+ 	if (argc  2) {
+ 	fprintf(stderr, %s: Too few arguments\n, argv[0]);
+@@ -237,8 +238,16 @@
+ 	}
+ 	if (TIFFScanlineSize(out)  linebytes)
+ 		buf = (unsigned char *)_TIFFmalloc(linebytes);
+-	else
+-		buf = (unsigned char *)_TIFFmalloc(TIFFScanlineSize(out));
++	else {
++		scanline_size = TIFFScanlineSize(out);
++		if (scanline_size != 0)
++			buf = (unsigned char *)_TIFFmalloc(TIFFScanlineSize(out));
++		else {
++			fprintf(stderr, %s: scanline size overflow\n,infile);
++			(void) TIFFClose(out);
++			exit(-2);
++			}
++		}
+ 	if (resolution  0) {
+ 		TIFFSetField(out, TIFFTAG_XRESOLUTION, resolution);
+ 		TIFFSetField(out, TIFFTAG_YRESOLUTION, resolution);
diff -Nru tiff-4.0.2/debian/patches/series tiff-4.0.2/debian/patches/series
--- tiff-4.0.2/debian/patches/series	2012-10-05 17:07:54.0 -0400
+++ tiff-4.0.2/debian/patches/series	2012-11-17 12:39:17.0 -0500
@@ -1,3 +1,4 @@
 opengl.patch
 CVE-2012-3401.patch
 CVE-2012-4447.patch
+CVE-2012-4564.patch


Bug#693551: unblock: icu/4.8.1.1-10

2012-11-17 Thread Jay Berkenbilt
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
Severity: normal

Please unblock package icu 4.8.1.1-10.  This fixes severity important
bug #687339.  The issue is trivial: the libicu-dev package failed to
install pkg-config files.  I upgraded the priority of the bug to
important since, without pkg-config files, there is a potential for a
downstream package to work on other distributions that properly include
these files but not to work on debian, which accidentally omits them.
Since this is a very small, low-risk change on a priority optional
package that fixes an important bug and that can go into wheezy
through unstable, I believe it should be eligible for an unblock
request.  The debdiff is attached.  Thanks for considering it.

-- 
Jay Berkenbilt q...@debian.org
diff -Nru icu-4.8.1.1/debian/changelog icu-4.8.1.1/debian/changelog
--- icu-4.8.1.1/debian/changelog	2012-08-11 13:27:24.0 -0400
+++ icu-4.8.1.1/debian/changelog	2012-11-17 14:37:40.0 -0500
@@ -1,3 +1,10 @@
+icu (4.8.1.1-10) unstable; urgency=low
+
+  * Include pkg-config files in dev package.  Thanks Tommi Vainikainen.
+(Closes: #687339)
+
+ -- Jay Berkenbilt q...@debian.org  Sat, 17 Nov 2012 14:37:40 -0500
+
 icu (4.8.1.1-9) unstable; urgency=low
 
   * debian/rules: Use xz compression for binary packages.
diff -Nru icu-4.8.1.1/debian/libicu-dev.install icu-4.8.1.1/debian/libicu-dev.install
--- icu-4.8.1.1/debian/libicu-dev.install	2012-04-22 08:30:07.0 -0400
+++ icu-4.8.1.1/debian/libicu-dev.install	2012-11-17 14:38:18.0 -0500
@@ -1,6 +1,7 @@
 usr/lib/*/lib*.so
 usr/lib/*/lib*.a
 usr/lib/*/icu
+usr/lib/*/pkgconfig/*.pc
 usr/include
 usr/bin
 usr/sbin


Bug#689752: unblock tiff3-3.9.6-9 and tiff-4.0.2-4

2012-10-05 Thread Jay Berkenbilt
Package: release.debian.org
Usertags: unblock

Please unblock tiff3-3.9.6-9 and tiff-4.0.2-4, which fix CVE-2012-4447
and address RC security bug #688944.

I had uploaded tiff3-3.9.6-8 and tiff-4.0.2-3, which fixed CVE-2012-4447
but claimed to fix non-existent CVE-2012-4777.  Ugh.  My dcut was a few
seconds too late.  So those versions only lived a few minutes.  The bug
was only reported against the tiff package but affects both tiff and
tiff3.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121005174346.0433238412.qww314159@soup



Bug#685847: freeze exception for psutils to fix RC bug

2012-08-25 Thread Jay Berkenbilt
Package: release.debian.org
Severity: normal

I have uploaded psutils_1.17.dfsg-1, which removes some files with
unclear or inappropriate copyright.  This closes RC bug #682908.  No
changes were made that were not directly related to this fix.

I updated README.source and copyright to describe the repackaging of the
upstream source tarball, which was basically just to remove the
offending files.  Then I added a patch to fix the Makefile to remove
references to those files, refreshed the other patches with quilt
refresh -p1, and updated the watch file to add dversionmangle.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120825064329.0434567009.qww314159@soup



request unblock for icu 4.8.1.1-9 (bug #683901)

2012-08-14 Thread Jay Berkenbilt
At the request of Ansgar Burchardt, I re-uploaded ICU with xz
compression to save space on the first CD.  The upload includes no other
changes.  I'm requesting a freeze exception for this version.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20120814084948.1065356132.qww314159@jberkenbilt-linux



Re: request unblock for icu 4.8.1.1-9 (bug #683901)

2012-08-14 Thread Jay Berkenbilt
Adam D. Barratt a...@adam-barratt.org.uk wrote:

 On Tue, 2012-08-14 at 08:49 -0400, Jay Berkenbilt wrote:
 At the request of Ansgar Burchardt, I re-uploaded ICU with xz
 compression to save space on the first CD.  The upload includes no other
 changes.  I'm requesting a freeze exception for this version.

 Unblocked.

Thanks.

 Please could you file any further requests in the BTS?  That makes it
 much less likely that it'll get lost in the flood.

Yes, sorry.  I had forgotten about that.  Most likely I would not have
forgotten if the testing migration section of the PTS page mentioned
filing a bug report with details (like which pseudopackage to report
against, which I would have to go digging for) rather than what it says
now:

  Not touching package due to block request by freeze (contact
  debian-release if update is needed)

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20120814134208.1065349316.qww314159@jberkenbilt-linux



Re: freeze exception qpdf versioned symbols?

2012-07-22 Thread Jay Berkenbilt
Jonathan Nieder jrnie...@gmail.com wrote:

 Hi,

 Jay Berkenbilt wrote:

 Okay, I've attached two files here.  The first is a copy of
 version-symbols.patch with the real changes, so this excludes the
 changes to the regenerated configure file.  The second file is a source
 debdiff.

 I am not on the release team, so please take anything I say with a
 grain of salt.

The release team decided that they weren't going to accept this, so this
discussion is now academic.  However, you made some interesting points
that I thought were worth responding to.


 [...]
 --- qpdf-2.3.1/debian/changelog  2012-05-19 09:21:52.0 -0400
 +++ qpdf-2.3.1/debian/changelog  2012-07-18 10:20:10.0 -0400
 @@ -1,3 +1,9 @@
 +qpdf (2.3.1-5) unstable; urgency=low
 +
 +  * Enable versioned symbols.

 Are the symbol versions used shared with upstream, or is this a
 Debian-specific thing?

 *checks*

 Looks like these are Debian-private but the patch is based on 92c94e7d
 (Add symbol versioning, 2012-06-20).  Ok.

I am upstream for this.  I enabled versioned symbols for future releases
of qpdf (I will soon be releasing 3.0.0).  This was a debian-specific
backport to 2.3.1 for the old ABI.  qpdf does appear in other
distributions that I am not involved in, and they wouldn't have
versioned symbols.  So actually this is a pretty decent argument for not
doing it anyway.

 ++# Check if LD supports linker scripts, and define conditional
 ++# HAVE_LD_VERSION_SCRIPT if so.  This functionality is currently
 ++# constrained to compilers using GNU ld on ELF systems or systems
 ++# which provide an adequate emulation thereof.
 ++AC_ARG_ENABLE([ld-version-script],
 ++  AS_HELP_STRING([--enable-ld-version-script],
 ++[enable linker version script (default is disabled)]),

 Is the default really --disable?

No, the default is really enable.  I copied this code from something
that had a default of disable, and while I changed the default, I didn't
change the help message.  Thanks for catching it.  I fixed it upstream
now.

 +@@ -0,0 +1,4 @@
 ++LIBQPDF_3 {
 ++  global:
 ++*;
 ++};

 It would be more comforting to have a list of symbols intended for
 export here, so unintentional ABI changes could be caught more easily.
 Do I understand that that would be hard to make because this is a C++
 library?

It would be hard but not impossible.  qpdf also works on Windows, and
for that, I already have every public API marked, but I don't think the
value for the amount of effort is good enough.

 Thanks and hope that helps,

Yes, your comments were helpful and at least resulted in fixing the
configure help message.  Thanks!

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120722213822.0386649101.qww314159@soup



Re: freeze exception qpdf versioned symbols?

2012-07-21 Thread Jay Berkenbilt
Jay Berkenbilt q...@debian.org wrote:

 Okay, I've attached two files here.  The first is a copy of
 version-symbols.patch with the real changes, so this excludes the
 changes to the regenerated configure file.  The second file is a source
 debdiff. . . .

 If it looks good, I'll proceed with the upload.

I haven't heard anything about this.  Should I proceed with the upload?

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120721213626.1487195862.qww314159@soup



freeze exception for tiff3 and tiff for security bugs

2012-07-21 Thread Jay Berkenbilt
I've upload tiff3-3.9.6-7 and tiff-4.0.2-2 with fixes to CVE-2012-3401.
The patch is as attached to the bug reports, 682195 and 682115.  Please
unblock so these RC security bug fixes can go in.  No other changes were
made in these uploads.  The bug doesn't actually apply to tiff3, but the
patch should work for the version of tiff in stable.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120721214405.1487172600.qww314159@soup



Re: freeze exception qpdf versioned symbols?

2012-07-18 Thread Jay Berkenbilt
Cyril Brulebois k...@debian.org wrote:

 I must confess I'm not really fluent with symbol versioning, but I think
 a patch enabling it for the current package with no further changes
 could be worth an unblock. Feel free to propose a source debdiff (or to
 upload it), and we'll review that.

Okay, I've attached two files here.  The first is a copy of
version-symbols.patch with the real changes, so this excludes the
changes to the regenerated configure file.  The second file is a source
debdiff.  The only changes are a shlibs bump and the addition of
versioned-symbols.patch.  The patch includes changes from regeneration
of configure, which you can ignore since the relevant changes are to
configure.ac and most of the configure changes are from the change from
autoconf 2.68 to 2.69.  The shlibs bump is needed to make sure packages
that built with the versioned library pull in the versioned library.

If it looks good, I'll proceed with the upload.

-- 
Jay Berkenbilt q...@debian.org

Index: qpdf-2.3.1/autoconf.mk.in
===
--- qpdf-2.3.1.orig/autoconf.mk.in	2011-12-28 17:19:40.0 -0500
+++ qpdf-2.3.1/autoconf.mk.in	2012-07-18 10:08:07.677346374 -0400
@@ -31,3 +31,4 @@
 VALIDATE_DOC=@VALIDATE_DOC@
 SKIP_TEST_COMPARE_IMAGES=@SKIP_TEST_COMPARE_IMAGES@
 BUILDRULES=@BUILDRULES@
+HAVE_LD_VERSION_SCRIPT=@HAVE_LD_VERSION_SCRIPT@
Index: qpdf-2.3.1/configure.ac
===
--- qpdf-2.3.1.orig/configure.ac	2011-12-28 17:19:40.0 -0500
+++ qpdf-2.3.1/configure.ac	2012-07-18 10:08:07.677346374 -0400
@@ -42,6 +42,40 @@
 AC_TYPE_UINT32_T
 AC_CHECK_FUNCS(random)
 
+# Check if LD supports linker scripts, and define conditional
+# HAVE_LD_VERSION_SCRIPT if so.  This functionality is currently
+# constrained to compilers using GNU ld on ELF systems or systems
+# which provide an adequate emulation thereof.
+AC_ARG_ENABLE([ld-version-script],
+  AS_HELP_STRING([--enable-ld-version-script],
+[enable linker version script (default is disabled)]),
+[have_ld_version_script=$enableval], [have_ld_version_script=yes])
+if test $have_ld_version_script != no; then
+  AC_MSG_CHECKING([if LD -Wl,--version-script works])
+  save_LDFLAGS=$LDFLAGS
+  LDFLAGS=$LDFLAGS -Wl,--version-script=conftest.map
+  cat  conftest.map EOF
+VERS_1 {
+global: sym;
+};
+
+VERS_2 {
+global: sym;
+} VERS_1;
+EOF
+  AC_LINK_IFELSE([AC_LANG_PROGRAM([], [])],
+ [have_ld_version_script=yes], [have_ld_version_script=no])
+  rm -f conftest.map
+  LDFLAGS=$save_LDFLAGS
+  AC_MSG_RESULT($have_ld_version_script)
+fi
+if test $have_ld_version_script = yes; then
+  HAVE_LD_VERSION_SCRIPT=1
+else
+  HAVE_LD_VERSION_SCRIPT=0
+fi
+AC_SUBST(HAVE_LD_VERSION_SCRIPT)
+
 AC_MSG_CHECKING(for gnu make = 3.81)
 make_okay=0
 if make --version /dev/null 21; then
Index: qpdf-2.3.1/libqpdf.map
===
--- /dev/null	1970-01-01 00:00:00.0 +
+++ qpdf-2.3.1/libqpdf.map	2012-07-18 10:08:07.677346374 -0400
@@ -0,0 +1,4 @@
+LIBQPDF_3 {
+  global:
+*;
+};
Index: qpdf-2.3.1/make/libtool.mk
===
--- qpdf-2.3.1.orig/make/libtool.mk	2011-12-28 17:19:40.0 -0500
+++ qpdf-2.3.1/make/libtool.mk	2012-07-18 10:08:07.677346374 -0400
@@ -15,6 +15,12 @@
 
 # --- Private definitions ---
 
+ifeq ($(HAVE_LD_VERSION_SCRIPT), 1)
+LD_VERSION_FLAGS=-Wl,--version-script=libqpdf.map
+else
+LD_VERSION_FLAGS=
+endif
+
 # Usage: $(call libdepflags,$(basename obj))
 # Usage: $(call fixdeps,$(basename obj))
 ifeq ($(GENDEPS),1)
@@ -80,7 +86,8 @@
 # Usage: $(call makelib,objs,library,ldflags,libs,current,revision,age)
 define makelib
 	$(LIBTOOL) --mode=link \
-		$(CXX) $(CXXFLAGS) -o $(2) $(1) $(3) $(4) \
+		$(CXX) $(CXXFLAGS) $(LD_VERSION_FLAGS) \
+		 -o $(2) $(1) $(3) $(4) \
 		 -rpath $(libdir) -version-info $(5):$(6):$(7)
 endef
 
diff -Nru qpdf-2.3.1/debian/changelog qpdf-2.3.1/debian/changelog
--- qpdf-2.3.1/debian/changelog	2012-05-19 09:21:52.0 -0400
+++ qpdf-2.3.1/debian/changelog	2012-07-18 10:20:10.0 -0400
@@ -1,3 +1,9 @@
+qpdf (2.3.1-5) unstable; urgency=low
+
+  * Enable versioned symbols.
+
+ -- Jay Berkenbilt q...@debian.org  Wed, 18 Jul 2012 10:20:10 -0400
+
 qpdf (2.3.1-4) unstable; urgency=low
 
   * Work around portability issues exposed by upgrading to gcc 4.7.  The
diff -Nru qpdf-2.3.1/debian/libqpdf3.shlibs qpdf-2.3.1/debian/libqpdf3.shlibs
--- qpdf-2.3.1/debian/libqpdf3.shlibs	2012-04-22 10:25:08.0 -0400
+++ qpdf-2.3.1/debian/libqpdf3.shlibs	2012-07-18 10:20:43.0 -0400
@@ -1 +1 @@
-libqpdf 3 libqpdf3 (= 2.3.0)
+libqpdf 3 libqpdf3 ( 2.3.1-5~)
diff -Nru qpdf-2.3.1/debian/patches/series qpdf-2.3.1/debian/patches/series
--- qpdf-2.3.1/debian/patches/series	2012-05-19 09:18:54.0 -0400
+++ qpdf-2.3.1/debian/patches/series	2012-07-18 10:08:15.0

freeze exception qpdf versioned symbols?

2012-07-14 Thread Jay Berkenbilt

I have added symbol versioning to qpdf (for which I am the maintainer
and also upstream) in a not-yet-released upstream version.  Sometime
soon, I will be releasing a new version of qpdf with a few ABI-breaking
changes in preparation for qpdf becoming a dependency of cups-filters,
resulting in work being done in a google summer of code project.  While
there are currently no packages in debian that depend on qpdf, I thought
it might be nice to get the symbol versions into debian before wheezy
since the next release will not be binary compatible.  I have no plans
to make any future ABI-breaking changes as I am committed to ABI
stability.  In this case, however, it was unavoidable as there were
functions that took int and needed off_t.  As long as I had to break it
anyway, I also made one change to significantly simplify one rarely used
operation for the user.

If you would grant a freeze exception for a patch to the existing
version of qpdf to enable symbol versioning, I would prepare an upload
and then request a freeze exception on the specific version.  If not, it
doesn't really matter...the next upload to unstable for version 3.0.0
and libqpdf8 (now libqpdf3) will have symbol versions enabled
regardless, and as I said, there are no packages in the archive at all,
let alone library packages, that currently depend on qpdf.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120714110026.0385755749.qww314159@soup



Re: short-term plans for libtiff

2012-05-27 Thread Jay Berkenbilt
 format.

Here is the README.Debian that I intend to include with the new tiff
packages:

--
Note that tiff 4.x provides libtiff5 and libtiff5-dev, while tiff 3.x
provides libtiff4 and libtiff4-dev.  This may seem confusing, but it
is just because the shared library versions and the software versions
don't happen to be the same, nor is there any expectation for them to
be the same.

Until the libtiff4 - libtiff5 transition occurs after the release of
wheezy, a new temporary package called libtiff5-alt-dev is being
provided.  This package installs include and library files for
libtiff5 (tiff 4.x) in an alternative location with pkg-config files
that point to it.  You should only use this package if you need to
depend on libtiff5 development files while also having libtiff4-dev
installed on your system.  This package will disappear when
libtiff4-dev is removed from the archive.

The most common use of libtiff5-alt-dev will be as a build dependency
for a debian package that has a direct dependency on libtiff5 (for
example, to get bigtiff support) and an indirect dependency on
libtiff4-dev.  In this case, you can have your package specify
libtiff5-alt-dev instead of libtiff5-dev as a build dependency.  If
your package finds the location of libtiff headers and libraries with
pkg-config, then all you will have to do when libtiff5-alt-dev
disappears is to change your build dependency to libtiff-dev, which
will then point to libtiff5-dev.  For an example of a package that
does this, look at vips.  Note that if you link use this package, your
executables or shared libraries will include an rpath that points
/usr/lib/arch/libtiff5-alt.  This is harmless since no actual shared
libraries will live in that directory, but it is a side effect of
having libdir set in the libtiff.la file there, which is needed for
libtool to link with the correct -ltiff.  This situation will cause
lintian errors, but the problem will go away after the libtiff
transition is complete.

 -- Jay Berkenbilt q...@debian.org, Thu, 24 May 2012 15:50:07 -0400
--

Again, I believe this is harmless.  It creates a very small number of
cases where a package will have to be changed and re-uploaded during the
transition, but there will obviously be several packages like that for
other reasons (things that explicitly depend on libtiff4-dev).  I
suspect that only a very small number of packages will actually do this.

I am open to alternative ways of doing this, but without something like
this, packages that want bigtiff support and also depend on things that
use libtiff4 will have to resort to including tiff 4.x sources in their
package as some things were doing prior to the introduction of
libtiff5-dev.

I tested this by building vips packages.  Vips has a ton of dependencies
including many that also depend on libtiff4-dev.  The only change to the
vips packages (aside from lintian overrides) is changing the build
dependency from libtiff4-dev to libtiff5-alt-dev and changing the
corresponding dependency of the dev package.  ldd shows the resulting
package to have linked with both libtiff4 and libtiff5.  Bigtiff support
works as does the rest of the package.

May I proceed?  If not, can you give me some explanation of what I need
to do?

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120527113123.0386049510.qww314159@soup



short-term plans for libtiff

2012-05-19 Thread Jay Berkenbilt
I'm planning on a new upload of tiff where all existing packages are
unchanged and there's a new package called libtiff5-alt-dev.  This
package installed the tiff 4.x headers and libraries in a path that does
not conflict with libtiff4-dev, and it installs the libtiff pkg-config
files in the usual location.  (libtiff4-dev does not provide
pkg-config.)  libtiff5-alt-dev conflicts with libtiff5-dev (since they
both install pkg-config files) but not with libtiff4-dev.  It is
possible to have both libtiff5-alt-dev and libtiff4-dev installed at the
same time, and this makes it possible to build a package that directly
requires libtiff5 and indirectly depends on libtiff4-dev, such as vips.
This will work easily for packages that use pkg-config to find tiff
headers.  A few packages do this and then fall back to standard system
paths if pkg-config fails.  Those packages work with either libtiff4-dev
or libtiff5-dev.  For packages that declare build dependencies on
libtiff5-alt-dev and use pkg-config to find tiff, all they have to do
after the transition is change the build dependency to libtiff-dev.

Can you think of any reason that this could possibly cause any harm?  I
don't think it will since it won't have any impact at all on packages
that don't explicitly build depend on libtiff5-alt-dev.  I'm going to go
ahead and do the upload.  If it's a bad idea for some reason that I am
failing to see, it can always be rejected from NEW.

If this is a bad idea for some reason, I would really like to find a
solution so that vips and nip2 (among others) can have bigtiff support
before wheezy.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120519104227.1611971078.qww314159@soup



Re: short-term plans for libtiff

2012-05-19 Thread Jay Berkenbilt
Cyril Brulebois k...@debian.org wrote:

 Hi Jay,

 Jay Berkenbilt q...@debian.org (19/05/2012):
 Can you think of any reason that this could possibly cause any harm?
 I don't think it will since it won't have any impact at all on
 packages that don't explicitly build depend on libtiff5-alt-dev.  I'm
 going to go ahead and do the upload.  If it's a bad idea for some
 reason that I am failing to see, it can always be rejected from NEW.
 
 If this is a bad idea for some reason, I would really like to find a
 solution so that vips and nip2 (among others) can have bigtiff support
 before wheezy.

 I'd appreciate if you could give us a few days to get back to you on
 this. I think Julien is more or less the only one of us who looked into
 libtiff stuff, so I think it makes sense to wait for his input.

 Mraw,
 KiBi.

I will wait as you request.  For what it's worth, I have (locally) built
vips and nip2 with this change, and they work perfectly.  No build
dependency conflicts, and the software opens and saves bigtiff files
properly.  There's also ITK packages (medical) where the maintainer has
contacted me about not being able to support bigtiff because of this
same issue.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120519110804.1611974333.qww314159@soup



Re: versioned tiff uploaded to experimental

2012-02-20 Thread Jay Berkenbilt
Julien Cristau jcris...@debian.org wrote:

 On Sun, Jan 29, 2012 at 07:05:25 -0500, Jay Berkenbilt wrote:

 [snip]
 Any objections to this plan?  I would probably wait until after wheezy
 to work on removal of tiff3, but I guess we could move libtiff-dev to
 libtiff5-dev sooner than that if lots of packages work fine with it.
 But we don't necessarily have to.
 
 The plan sounds good to me, fwiw.  Sorry for the delay in replying.

No problem.  Coincidentally, I am in the process of preparing uploads
for unstable since upstream released this weekend.  I guess the next
step will be sometime post-wheezy when we try to push to get rid of
tiff3 from the archive.

Do I have to do anything to ask for all tiff reverse dependencies to be
automatically rebuild (other than mentioning it here)?  I expect the
uploads within half an hour.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20120220095658.0204565560.qww314...@jberkenbilt-linux.appiancorp.com



Re: versioned tiff uploaded to experimental

2012-02-20 Thread Jay Berkenbilt
Julien Cristau jcris...@debian.org wrote:

 On Mon, Feb 20, 2012 at 09:56:58 -0500, Jay Berkenbilt wrote:

 Do I have to do anything to ask for all tiff reverse dependencies to be
 automatically rebuild (other than mentioning it here)?  I expect the
 uploads within half an hour.

 I'll take care of this once the new version is in testing.  I set up
 http://release.debian.org/transitions/html/libtiff4-symbols.html so we
 can track what's left.

Great, thanks.

 BTW, in version number comparisons '' confusingly means greater or
 equal (and is deprecated for that reason), so I suspect the shlibs
 should really say = 3.9.5-3 or = 3.9.6 to also account for the
 3.9.5-2+b2 binary NMU on armhf.  Doesn't matter much anyway, 3.9.5-2
 is greater than the stable version, just thought I'd mention it.

Oops, yeah, I knew that at one time and had forgotten.  I made the same
mistake in the control file, but lintian caught it.  I updated my notes
for shlibs files to remind myself for the future.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20120220111315.0204591992.qww314...@jberkenbilt-linux.appiancorp.com



Re: versioned tiff uploaded to experimental

2012-01-29 Thread Jay Berkenbilt
Jay Berkenbilt q...@debian.org wrote:

 [please cc me on responses; I am not subscribed to debian-release]

 I have uploaded tiff3_3.9.5-3 with libtiff4, libtiff4-dev, and
 libtiffxx0c2 and tiff_4.0.0-1 with libtiff5, libtiff-dev, libtiffxx5,
 libtiff-tools, libtiff-doc, and libtiff-opengl to experimental as
 previously discussed.  All libraries have versioned symbols.  I did a
 bunch of tests, and everything works as expected.  . . .

It dawned on me that if I just call the dev package in tiff_4.0.1-1
libtiff5-dev and don't have it provide libtiff-dev, then I don't have to
wait, and I can just upload tiff3_3.9.6-1 and tiff_4.0.1-1 to unstable
at the same time.  So the initial condition would be that tiff3 includes
libtiff4-dev which provides libtiff-dev, and tiff includes libtiff5-dev
which doesn't provide anything.  Nothing will break during the bin NMUs
(or regular uploads) since no one is depending on libtiff5-dev, but the
packages the specifically need it can get it right away.

Later, after all the bin NMUs are done and nothing in the archive is
linked against the non-versioned libtiff4, if we want to push toward
removal of tiff3 or just to making tiff 4.x the default tiff, I can
change it so that tiff includes libtiff-dev which provides libtiff5-dev
for compatibility and make tiff3's libtiff4-dev stop providing
libtiff-dev.  (Or I could keep libtiff5-dev's name as it is and have it
provide libtiff-dev...I'm not really sure which is better.  jpeg does it
one way, png does it the other way.)

Any objections to this plan?  I would probably wait until after wheezy
to work on removal of tiff3, but I guess we could move libtiff-dev to
libtiff5-dev sooner than that if lots of packages work fine with it.
But we don't necessarily have to.

Another advantage is that you won't have to keep hearing from me about
tiff. :-)  I appreciate the indulgence as you've helped guide me toward
a better solution or at least keep me from making things worse.

If we do this, I'll do one more tiff upload to experimental since I
guess tiff will be NEW with libtiff5-dev as a real package.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120129070525.0289307139.qww314159@soup



versioned tiff uploaded to experimental

2012-01-28 Thread Jay Berkenbilt
[please cc me on responses; I am not subscribed to debian-release]

I have uploaded tiff3_3.9.5-3 with libtiff4, libtiff4-dev, and
libtiffxx0c2 and tiff_4.0.0-1 with libtiff5, libtiff-dev, libtiffxx5,
libtiff-tools, libtiff-doc, and libtiff-opengl to experimental as
previously discussed.  All libraries have versioned symbols.  I did a
bunch of tests, and everything works as expected.  Specifically:

Programs linked with non-versioned libtiff4 still run properly when
libtiff4 is upgraded to the versioned libtiff4.  Programs linked with a
versioned copy of libtiff4 do not work with a non-versioned copy.

It works to link a program with one shared library that uses versioned
libtiff4 and another that uses versioned libtiff5.  Here's what I did:

--- f.c ---
#include tiffio.h
#include tiff.h
#include stdio.h

void f()
{
uint32 width;
TIFF* t = TIFFOpen(/tmp/a.tif, r);
if (TIFFGetField(t, TIFFTAG_IMAGEWIDTH, width))
{
printf(%d\n, width);
}
}
--

--- g.c ---
#include tiffio.h
#include tiff.h
#include stdio.h

void g()
{
uint32 height;
TIFF* t = TIFFOpen(/tmp/a.tif, r);
if (TIFFGetField(t, TIFFTAG_IMAGELENGTH, height))
{
printf(%d\n, height);
}
}
--

--- main.c ---
void f();
void g();
int main()
{
f();
g();
return 0;
}
--

With libtiff4-dev installed:

% gcc -fPIC -c f.c
% gcc -shared -o libf.so -ltiff f.o

With libtiff-dev (tiff5) installed:

% gcc -fPIC -c c.c
% gcc -shared -o libg.so -ltiff g.o

Then

% gcc -o main main.c -L. -lf -lg
% LD_LIBRARY_PATH=. ldd ./main

linux-vdso.so.1 =  (0x7fffd13ff000)
libf.so = ./libf.so (0x7f8aca4a1000)
libg.so = ./libg.so (0x7f8aca2a)
libc.so.6 = /lib/x86_64-linux-gnu/libc.so.6 (0x7f8ac9ef7000)
libtiff.so.5 = /usr/lib/x86_64-linux-gnu/libtiff.so.5 
(0x7f8ac9c86000)
libtiff.so.4 = /usr/lib/x86_64-linux-gnu/libtiff.so.4 
(0x7f8ac9a21000)
/lib64/ld-linux-x86-64.so.2 (0x7f8aca6a4000)
libjpeg.so.8 = /usr/lib/libjpeg.so.8 (0x7f8ac97e6000)
libz.so.1 = /usr/lib/libz.so.1 (0x7f8ac95cf000)
libm.so.6 = /lib/x86_64-linux-gnu/libm.so.6 (0x7f8ac934d000)
% LD_LIBRARY_PATH=. ./main
170
168

Once tiff3 clears NEW in experimental, unless I hear any objections,
as soon as upstream release 3.9.6, I'll upload that to unstable and let
the release team know that they can start binary NMUs of everything that
links with tiff.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120128130600.0464744872.qww314159@soup



Re: intention for tiff packages

2012-01-24 Thread Jay Berkenbilt
Julien Cristau jcris...@debian.org wrote:

 On Mon, Jan 23, 2012 at 11:00:53 -0500, Jay Berkenbilt wrote:

 Upstream has committed symbol versioning for both the 3.9.x branch and
 the trunk (4.0.0) and is prepared to release 3.9.6 and 4.0.1 with symbol
 versioning once we sign off that it's what we're looking for.  What's
 the best way to do this?  I would hate to make the assessment on my own
 and then find out it's still not right.  Maybe I can prepare versions
 for experimental built with symbol versioning and someone can look it
 over?  I'll still do my test of an application depending on a library
 with tiff 3 and another library with tiff 4.

 An upload to experimental with the option enabled seems reasonable.  On
 the packaging side the addition of versioned symbols means bumping
 libtiff4's shlibs to avoid warnings from ld.so.  I quickly looked over
 the upstream changes adding the version script, which look fine to me.

Okay, thanks.  One more question: tiff 4.0.0~beta7 is already in
experimental, so I can't upload a new tiff 3.9 version to experimental
without an epoch or some funky version numbering.  While the next upload
of tiff to unstable will be a symbol-versioned 3.9.x, should I go ahead
and upload the trial version to experimental with the tiff3 source?
That way, experimental would have the pair of source packages, both with
versioned symbols, that we ultimately want in unstable.  This is what I
think I need to do:

1.  Upload tiff-4.0.0-1 with versioned symbols to experimental
2.  Upload tiff3-3.9.5-3 to experimental with versioned symbols
3.  Wait for confirmation that this is good
4.  Give upstream the go-ahead to release 3.9.6 and 4.0.1
5.  Wait for release team to be ready to do the transition
6.  Upload tiff-3.9.6-1 with versioned symbols to unstable
7.  Wait for transition (all bin-NMUs finish, tiff-3.9.6-1 migrates to
testing)
8.  Upload tiff3-3.9.6-2 to unstable and simultaneously upload
tiff-4.0.1-1 to unstable

If this is right, I'll go ahead and do steps 1 and 2.  Then I'll wait
for an okay before proceeding.  Of course, let me know if I should do
this differently.  My goal is to help make this as smooth as possible.

(Thanks for continuing to include me explicitly me on all response since
I'm not subscribed to debian-release.)

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20120124140033.0220789135.qww314...@jberkenbilt-linux.appiancorp.com



Re: intention for tiff packages

2012-01-23 Thread Jay Berkenbilt
Jay Berkenbilt q...@debian.org wrote:

 Julien Cristau jcris...@debian.org wrote:

 On Sat, Jan 21, 2012 at 19:10:00 -0500, Jay Berkenbilt wrote:

 Julien Cristau jcris...@debian.org wrote:
 
  As I said previously, if versioned symbols don't happen (in both the old
  and new versions), then the transition is unlikely to happen too.  It
  was done for png and jpeg, so it's not like it'd be a first.
 
 I have the skills to do this and understand the concept, but I don't
 have the specific knowledge of exactly how to do it.  I can figure it
 out by looking at png or jpeg, reading documentation, searching the web,
 etc., but if you have any specific pointers, email threads, or other
 references that might save me some time, I would be most grateful.
 
 I'll try and have a look asap.  Might not be until next week though.

 Much to my surprise, upstream looks like they are going to take it.  I
 started a thread on the tiff list today, and one of the primary
 maintainers already introduced a change in their CVS to make this
 possible.

 I think the process will be

  1.  Introduce a symbol-versioned version of tiff 3.x
  2.  Binary NMU everything so that all existing libraries and programs
  link with the symbol-versioned tiff 3.x
  3.  Introduce a symbol-versioned tiff 4.x using something akin to my
  original plan of having a tiff3 source package with 3.9.x libraries
  only and upgrading the tiff package to use 4.x

 Is this right?  Many packages will be able to link with tiff 4.x without
 any changes.  Anyway, we can discuss the exact mechanics of the
 migration after step 2 is done assuming this is more or less right since
 I imagine that will still take some time.

Upstream has committed symbol versioning for both the 3.9.x branch and
the trunk (4.0.0) and is prepared to release 3.9.6 and 4.0.1 with symbol
versioning once we sign off that it's what we're looking for.  What's
the best way to do this?  I would hate to make the assessment on my own
and then find out it's still not right.  Maybe I can prepare versions
for experimental built with symbol versioning and someone can look it
over?  I'll still do my test of an application depending on a library
with tiff 3 and another library with tiff 4.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20120123110053.0292693063.qww314...@jberkenbilt-linux.appiancorp.com



Re: intention for tiff packages

2012-01-22 Thread Jay Berkenbilt
Jay Berkenbilt q...@debian.org wrote:

 As I said previously, if versioned symbols don't happen (in both the old
 and new versions), then the transition is unlikely to happen too.  It
 was done for png and jpeg, so it's not like it'd be a first.

 I have the skills to do this and understand the concept, but I don't
 have the specific knowledge of exactly how to do it.  I can figure it
 out by looking at png or jpeg, reading documentation, searching the web,
 etc., but if you have any specific pointers, email threads, or other
 references that might save me some time, I would be most grateful.

I found information in the debian library packaging guide.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120122111828.0289256487.qww314159@soup



Re: intention for tiff packages

2012-01-22 Thread Jay Berkenbilt
Julien Cristau jcris...@debian.org wrote:

 On Sat, Jan 21, 2012 at 19:10:00 -0500, Jay Berkenbilt wrote:

 Julien Cristau jcris...@debian.org wrote:
 
  As I said previously, if versioned symbols don't happen (in both the old
  and new versions), then the transition is unlikely to happen too.  It
  was done for png and jpeg, so it's not like it'd be a first.
 
 I have the skills to do this and understand the concept, but I don't
 have the specific knowledge of exactly how to do it.  I can figure it
 out by looking at png or jpeg, reading documentation, searching the web,
 etc., but if you have any specific pointers, email threads, or other
 references that might save me some time, I would be most grateful.
 
 I'll try and have a look asap.  Might not be until next week though.

Much to my surprise, upstream looks like they are going to take it.  I
started a thread on the tiff list today, and one of the primary
maintainers already introduced a change in their CVS to make this
possible.

I think the process will be

 1.  Introduce a symbol-versioned version of tiff 3.x
 2.  Binary NMU everything so that all existing libraries and programs
 link with the symbol-versioned tiff 3.x
 3.  Introduce a symbol-versioned tiff 4.x using something akin to my
 original plan of having a tiff3 source package with 3.9.x libraries
 only and upgrading the tiff package to use 4.x

Is this right?  Many packages will be able to link with tiff 4.x without
any changes.  Anyway, we can discuss the exact mechanics of the
migration after step 2 is done assuming this is more or less right since
I imagine that will still take some time.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120122204611.0289269656.qww314159@soup



intention for tiff packages

2012-01-21 Thread Jay Berkenbilt
Here's what I'd like to do with the tiff packages.  I believe this will
be relatively non-disruptive.  Technically, I don't think I *have* to
ask permission for this, but I want to do it as a courtesy to the
release team, to give you the chance to suggest a different approach or
influence the timing, and to make sure I'm picking the best approach.  I
hope you will find a few minutes to reply so I can move forward, and I
hope I won't have to wait very long.

Current state:

 * The tiff source package in unstable is version 3.9.5-2.  It includes
   binary packages libtiff4, libtiffxx0c2, libtiff4-dev, libtiff-tools,
   libtiff-opengl, and libtiff-doc.  The libtiff4-dev package Provides
   and Conflicts libtiff-dev.

 * The tiff source package in experimental is version 4.0.0~beta7-2.  It
   includes binary packages libtiff5, libtiffxx5, libtiff-dev,
   libtiff-tools, libtiff-opengl, and libtiff-doc.  The libtiff-dev
   package Provides libtiff5-dev (reversing the sense from the older
   package where libtiff4-dev provided libtiff-dev) and both Conflicts
   and Replaces libtiff4-dev.  This was to set the stage for an
   eventual tiff transition.

 * Some packages (not sure which ones) apparently embed tiff 4.x sources
   because they need BigTIFF support.  This is bad from many angles.

Proposed new state:

 * Upgrade the tiff package to 4.0.0-1 and upload to unstable.  No other
   changes would be made to the package.

 * Create source package tiff3 in section oldlibs at initial version
   3.9.5-3.  Have it include libtiff4, libtiffxx0c2, and libtiff4-dev,
   and still have libtiff4-dev provide libtiff-dev for now.  Drop
   libtiff-doc, libtiff-opengl, and libtiff-tools.  (The libtiff-doc
   package from 4.x includes the older documentation as well.)
   Basically this would just be a copy of the existing package minus the
   duplicated packages.

The libtiff4-dev package and tiff 3.x binary packages will stick around
but move to the new source package.  Their version numbers will continue
in sequence, so upgrades will be seamless and automatic.  Packages that
build-depend on libtiff4-dev will be unaffected.  Packages that depend
on libtiff-dev alone (if any) will have to specify libtiff4-dev or
libtiff5-dev explicitly.  This is the only area that might cause a
hiccup, but it should be minor.  (Also, the tiff3 package would have to
go through NEW, so there could be a very brief time when the libtiff4,
libtiff4-dev, and libtiffxx02 packages might be uninstallable.)
Packages that require tiff 4.x can explicitly depend on libtiff5-dev (or
on libtiff-dev | libtiff5-dev).

I believe this is a better alternative than just dropping the older
packages entirely and forcing a full transition, but I would also be
happy to do it that way if you want, though I think it will be much more
difficult.  Otherwise, I think we should wait until both versions are in
the archive and then plan a more orderly transition that could culminate
in the removal of the tiff3 source packages prior to the release of
wheezy+1.

As a reminder, there are ABI changes between libtiff4 and libtiff5, and
there are very few source API changes, and they are clearly documented.
The tiff libraries do not use versioned symbols, and there is no one
right now how has time time and inclination to tackle this.  It's
basically not going to happen.  Anyway, it's extremely unlikely that
there will be any more ABI changes in the next many years.

There are some packages out there that require features from tiff 4.x.
We can help debian be the leader of getting the world to upgrade to the
new version of the tiff packages.

Thanks.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120121113810.3089362963.qww314159@soup



Re: intention for tiff packages

2012-01-21 Thread Jay Berkenbilt
Julien Cristau jcris...@debian.org wrote:

Okay, I basically have to admit that I agree with everything you said.

 Proposed new state:

  * Upgrade the tiff package to 4.0.0-1 and upload to unstable.  No other
changes would be made to the package.

  * Create source package tiff3 in section oldlibs at initial version
3.9.5-3.  Have it include libtiff4, libtiffxx0c2, and libtiff4-dev,
and still have libtiff4-dev provide libtiff-dev for now.  Drop
libtiff-doc, libtiff-opengl, and libtiff-tools.  (The libtiff-doc
package from 4.x includes the older documentation as well.)
Basically this would just be a copy of the existing package minus the
duplicated packages.

 I think that's a bad plan.  There are packages in the archive right now,
 including shared libraries, that build-depend on the unversioned
 libtiff-dev package.  They'd pick up a dependency on libtiff5 on a
 rebuild, which is not a good thing if we're not going to move the whole
 archive to it.

Yes, you're right.

 As a reminder, there are ABI changes between libtiff4 and libtiff5, and
 there are very few source API changes, and they are clearly documented.
 The tiff libraries do not use versioned symbols, and there is no one
 right now how has time time and inclination to tackle this.  It's
 basically not going to happen.  Anyway, it's extremely unlikely that
 there will be any more ABI changes in the next many years.

 As I said previously, if versioned symbols don't happen (in both the old
 and new versions), then the transition is unlikely to happen too.  It
 was done for png and jpeg, so it's not like it'd be a first.

I have the skills to do this and understand the concept, but I don't
have the specific knowledge of exactly how to do it.  I can figure it
out by looking at png or jpeg, reading documentation, searching the web,
etc., but if you have any specific pointers, email threads, or other
references that might save me some time, I would be most grateful.

I've got my hands full with one-year-old twins, and my debian time is
extremely limited.  While I acknowledge that the only right answer is
going to be to do symbol versioning, and while I will not argue against
your insistence on doing the right thing, I just don't know when I can
do it.  I know that I'm going to have to actually figure out which
symbols are part of the public API, etc.

Once versioned symbols are done, will the plan be more or less what I
outlined: tiff3 package with versioned libtiff4 and tiff package with
versioned libtiff5, just with the difference being that it will work for
lib1 to link with libtiff4, lib2 to link with libtiff5, and program1 to
link with both lib1 and lib2, or will there be some other solution?

Thanks for keeping us on the right path, even if it means that getting
tiff 4.0 into unstable will take a long time.  I wish I had never
suggested doing anything else.  Just my realization that no one really
has time to do this forced me down the dark path of looking for an easy
solution.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120121191000.3089338302.qww314159@soup



Re: potential tiff transition, tiff 4.0.0 strategy

2011-12-29 Thread Jay Berkenbilt
Julien Cristau jcris...@debian.org wrote:

 On Tue, Dec 13, 2011 at 09:02:50 -0500, Jay Berkenbilt wrote:

 So, what is the recommendation of the release team?  If you agree that
 we should do a transition as soon as possible after the final 4.0.0 is
 released (so that wheezy can have 4.x), do you have any guesses as to
 when you would be ready for an upload?

 FWIW, I think it should be required for such a library to use versioned
 symbols if it doesn't care to keep its ABI stable.

While I agree in principle, this is the first ABI change in the over 10
years since I've been using the library, and no others are planned for
the foreseeable future.  (There was an accidental ABI change in 2003,
but they are much more careful now, and even if upstream messes up, I
and others on the upstream mailing list call them on it and it gets
fixed.)  The ABI change was the result of a revised specification to the
TIFF file format (support of bigtiff), and this doesn't happen very
often.  While the TIFF ABI is not absolutely set in stone, I would
hardly say it's not stable.  There is very little effort on the tiff
libraries upstream right now, and the library is very stable and in wide
use, so there's basically no chance that upstream is going to do this.
I don't have the bandwidth to do it just for the debian packages, and I
also don't think it's worth the effort since no ABI changes are likely
for years.

I'm planning on uploading the new version to unstable but not having it
provide libtiff-dev until I hear from the release time how the
transition should be handled.  That way at least those packages that are
already including their own copies of the tiff 4.x source code can stop
doing it, but there won't be any accidental dependencies on multiple
versions.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20111229110217.0207078936.qww314...@jberkenbilt-linux.appiancorp.com



potential tiff transition, tiff 4.0.0 strategy

2011-12-13 Thread Jay Berkenbilt
(Please CC me on replies; I am not subscribed to debian-release.)

After many moons, it appears that a final, non-beta release of libtiff
4.0.0 is imminent.  tiff-4.0.0~beta7 is in experimental, and some 4.0
beta has been in experimental since August, 2009.  I recently learned
that the tiff 4.0.0 sources are embedded in some existing packages,
which we know is really bad from a security perspective.  While tiff 4
is almost entirely source-compatible with tiff 3, there are ABI changes,
and in some cases, a source-full upload may be required.  For some
packages, especially those who are depending on libtiff-dev instead of
libtiff4-dev, it's possible that a binary NMU may be sufficient.

As you well know, the tiff library has a very long chain of reverse
dependencies, so managing a transition could be involved, but it
shouldn't really be all that complicated since there should be few
source changes.  Many packages will have to change their build
dependencies.  Also, most of the packages that are downstream from tiff
depend on it indirectly through other imaging libraries.

As I see it, we have two choices: supporting two versions of libtiff in
unstable at the same time for some period of time, or biting the bullet
and tackling the transition right off the bat.  I don't have any window
into how ready the release team would be to swallow a tiff transition
right now.  That said, having two versions of tiff in unstable at the
same time seems like it could cause more problems than it solves.  Many
packages depend on libtiff indirectly, so it seems potentially easy for
a package to end up needing two versions at once, and libtiff does not
use versioned symbols.  (And I don't have the bandwidth to tackle it,
and neither does upstream.)

My preference would be to just do a libtiff transition.  With the
release of tiff 4.0.0, the debian version of tiff will be identical to
upstream since they are using 5 as the soname of the library in
response to our having moved to 4 as the result of an earlier accidental
ABI change.  All our patches from 3.x are present in the upstream
version, and all security issues reported against the 3.x series have
also been fixed in 4.x.  The 4.x libraries are already being used in
many projects and are already getting external security scrutiny, and
there is wide consensus that it is ready for prime time.

So, what is the recommendation of the release team?  If you agree that
we should do a transition as soon as possible after the final 4.0.0 is
released (so that wheezy can have 4.x), do you have any guesses as to
when you would be ready for an upload?

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20111213090250.0813570557.qww314...@jberkenbilt-linux.appiancorp.com



Bug#628529: transition: ICU transition (4.4 - 4.8)

2011-11-09 Thread Jay Berkenbilt
On 11/08/2011 05:46 PM, Julien Cristau wrote:
 On Sat, Sep 10, 2011 at 13:04:13 -0400, Jay Berkenbilt wrote:

 Julien Cristau jcris...@debian.org wrote:

 On 05/29/2011 10:19 PM, Jay Berkenbilt wrote:
 I'd like to schedule a transition for ICU from 4.4 to 4.8.  . . .

 This can't really happen as long as icu itself FTBFS on one of the
 release architectures, so marking the corresponding bug as a blocker.
 The problem blocking this transition has been fixed, and we've had a
 successful build on that platform.  Still waiting for builds on some of
 the rest of the platforms, but it looks good since it was a one-line
 change to ./configure{,.in} to add kfreebsd to a case statement.
 Hopefully we can move forward with the transition.

 I think we're finally ready for this, so please go ahead with the upload
 to unstable.  Sorry for the delay.

 Cheers,
 Julien
I'll be uploading shortly.  Thanks.

--Jay



-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4eba975c.80...@ql.org



binNMU on tiff

2011-09-03 Thread Jay Berkenbilt
Please see bug 640225.  A request is made there to binNMU tiff so it no
longer links with libjpeg.so.62.  I believe that is the correct
solution, rather than having me do a new upload.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110903113514.0293615102.qww314159@soup



ICU transition

2011-05-29 Thread Jay Berkenbilt
I'd like to schedule a transition for ICU from 4.4 to 4.8.  In the past
several ICU transitions, it has been sufficient to do a binary NMU for
each reverse dependency, and there's little reason to believe that this
time should be any different.  There are a few API changes, but they are
mostly for interfaces that have been deprecated for a long time, and
this is pretty much comparable to earlier ICU releases.  I will wait to
upload ICU to unstable until I get an okay from the release team and
until I hear from openoffice.org maintainers.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110529161900.3019911685.qww314159@soup



libjpeg-dev dependency (bug 610862)

2011-03-03 Thread Jay Berkenbilt

Where did we eventually land on the correct way to make a dependency on
libjpeg's dev package?  libtiff4-dev depends on libjpeg-dev (and tiff
build-depends on libjpeg-dev), which I believe was explicitly done
during the libjpeg62 to libjpeg8 transition, which got confused at some
point.  Anyway, a user complains in bug 610862 that libtiff4-dev depends
on libjpeg-dev and shouldn't, but before I change it, I wanted to find
out what I should be doing now.  I could change to something like
libjpeg-dev | libjpeg8-dev or even to libjpeg8-dev | libjpeg-dev (or the
libjpeg62-dev versions of the above), but I thought by using
libjpeg-dev, I was protecting my package against having to be
re-uploaded in the event of a jpeg transition.  I could look at the
current state, but that doesn't necessarily tell me what the long-term
plans are.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20110303180429.1925906716.qww314159@motoko.argon.local



Re: fixing 604471/591615 (Malayalam rendering problem) in squeeze

2010-11-25 Thread Jay Berkenbilt

Attached is a diff between icu-4.4.1-6 and icu-4.4.1-7 which fixes
merged RC-critical bugs 604471 and 591615.  I can't do this through
unstable because unstable already contains 4.4.2, a new upstream release
(albeit one with only bug fixes).

As you can see, all this does is add a new patch to the debian directory
(and update series and changelog).  I have built this package in a
squeeze chroot and have tested OpenOffice.org (in the squeeze chroot and
also on my sid system) with and without the patch and have verified that
it fixes the problem as reported.  (The Red Hat report contains screen
shots.)  The patch has been accepted by Red Hat and has now also been
reported upstream (http://bugs.icu-project.org/trac/ticket/8198).

With the (US) holiday weekend, I will not be around my email quite as
often as usual, so I have gone ahead and uploaded this to
testing-proposed-updates for you to either accept or reject.  I hope
that's okay -- I know it requires manual intervention either way, so I'm
trying to do what makes it easiest for the release team.

I will upload to unstable after you either accept or reject this so I
can either include or not include its changelog entry in the unstable
package's changelog.

My original message is below for reference.

--Jay

Jay Berkenbilt q...@debian.org wrote:

 There is a bug in ICU 4.4, for which we have a small and minimally
 invasive patch, that causes OpenOffice.org rendering of Malayalam to not
 work.  The reporter argues that the bug makes the package unusable for
 at least one set of users (those who work in Malayalam).  I've attached
 the latest bit of the email trail to this message.  As such, I have
 suggested that the bug should be considered grave.

 The patch is to revert a particular change set's changes to one file:

 http://bugs.icu-project.org/trac/changeset/26090/icu/trunk/source/layout/IndicReordering.cpp

 Red Hat has apparently accepted this solution.  Their bug report is
 here:

 https://bugzilla.redhat.com/show_bug.cgi?id=654200

 I don't see an upstream report on this at this time, but the discussion
 in the Red Hat bug report seems to indicate a thorough analysis.

 Unfortunately, the version of ICU in squeeze is 4.4.1-6 and the version
 in sid is 4.4.2-1.  I therefore can't upload to unstable and request a
 freeze exception unless we were prepared to accept 4.4.2-1's changes in
 squeeze (which .  I would prepare a 4.4.1-7 release for
 testing-proposed-updates, or this could be handled in a point release of
 squeeze.

 I've copied the reporter so he can clarify/correct anything I may have
 said here.

 Please advise as to whether I should upload a to t-p-u.  I'll upload to
 unstable either way.

 --Jay



 From: Mahesh T. Pai paiva...@gmail.com
 Subject: Re: Bug#604471: libreoffice: Malayalam Rendering issue (probably icu
  related)
 To: Jay Berkenbilt q...@debian.org
 Cc: Rene Engelhard r...@debian.org, 604...@bugs.debian.org,
   prav...@gmail.com
 Date: Mon, 22 Nov 2010 22:07:11 +0530

 Jay Berkenbilt said on Mon, Nov 22, 2010 at 11:12:12AM -0500,:

   the patch and upload, but only the release team can make the decision as
   to whether the change will get into squeeze.  It's very late right now,
   so they will have to be convinced that it is a release-critical bug.  If
   you upgrade the status of the bug from important to grave and justify
   this, I will upload a new version with the patch that reverts the change
   that introduced the problem and will request that the release team allow
   a freeze exception.  They will either grant the freeze exception, or
   they will disagree with the classification of the bug.  In the former

 It is absolutely essential that this patch squeezes past the Squeeze freeze.

 OO.o / LibO is one of the critical components for the desktop, and the 
 rendering
 issues caused by the bug renders OO.o / LibO practically useless for people 
 using
 Malayalam. This has been working well in previous versions of Debian / OO.o / 
 LibO,
 and it will be extremely disappointing for users to find the problem arising 
 now.

 While personally, I can wait till the next version of ICU enters testing, 
 that is 
 because I use Sid, and know reasonably well my way around Debian. 

 I would rather that the Squeeze freeze is freeezed till this is fixed.
diff -urN ../icu-4.4.1-6/debian/changelog ./debian/changelog
--- ../icu-4.4.1-6/debian/changelog	2010-07-28 18:44:01.0 -0400
+++ ./debian/changelog	2010-11-25 12:07:26.0 -0500
@@ -1,3 +1,9 @@
+icu (4.4.1-7) testing-proposed-updates; urgency=high
+
+  * Apply patch to fix Malayam rendering.  (Closes: #591615)
+
+ -- Jay Berkenbilt q...@debian.org  Thu, 25 Nov 2010 12:07:26 -0500
+
 icu (4.4.1-6) unstable; urgency=low
 
   * Include patch from Alexander Kurtz to solve failure to build from
diff -urN ../icu-4.4.1-6/debian/patches/malayalam-rendering.patch ./debian/patches/malayalam-rendering.patch
--- ../icu-4.4.1-6/debian/patches/malayalam-rendering.patch

fixing 604471/591615 (Malayalam rendering problem) in squeeze

2010-11-22 Thread Jay Berkenbilt
There is a bug in ICU 4.4, for which we have a small and minimally
invasive patch, that causes OpenOffice.org rendering of Malayalam to not
work.  The reporter argues that the bug makes the package unusable for
at least one set of users (those who work in Malayalam).  I've attached
the latest bit of the email trail to this message.  As such, I have
suggested that the bug should be considered grave.

The patch is to revert a particular change set's changes to one file:

http://bugs.icu-project.org/trac/changeset/26090/icu/trunk/source/layout/IndicReordering.cpp

Red Hat has apparently accepted this solution.  Their bug report is
here:

https://bugzilla.redhat.com/show_bug.cgi?id=654200

I don't see an upstream report on this at this time, but the discussion
in the Red Hat bug report seems to indicate a thorough analysis.

Unfortunately, the version of ICU in squeeze is 4.4.1-6 and the version
in sid is 4.4.2-1.  I therefore can't upload to unstable and request a
freeze exception unless we were prepared to accept 4.4.2-1's changes in
squeeze (which .  I would prepare a 4.4.1-7 release for
testing-proposed-updates, or this could be handled in a point release of
squeeze.

I've copied the reporter so he can clarify/correct anything I may have
said here.

Please advise as to whether I should upload a to t-p-u.  I'll upload to
unstable either way.

--Jay


---BeginMessage---
Jay Berkenbilt said on Mon, Nov 22, 2010 at 11:12:12AM -0500,:

  the patch and upload, but only the release team can make the decision as
  to whether the change will get into squeeze.  It's very late right now,
  so they will have to be convinced that it is a release-critical bug.  If
  you upgrade the status of the bug from important to grave and justify
  this, I will upload a new version with the patch that reverts the change
  that introduced the problem and will request that the release team allow
  a freeze exception.  They will either grant the freeze exception, or
  they will disagree with the classification of the bug.  In the former

It is absolutely essential that this patch squeezes past the Squeeze freeze.

OO.o / LibO is one of the critical components for the desktop, and the rendering
issues caused by the bug renders OO.o / LibO practically useless for people 
using
Malayalam. This has been working well in previous versions of Debian / OO.o / 
LibO,
and it will be extremely disappointing for users to find the problem arising 
now.

While personally, I can wait till the next version of ICU enters testing, that 
is 
because I use Sid, and know reasonably well my way around Debian. 

I would rather that the Squeeze freeze is freeezed till this is fixed.


-- 
Mahesh T. Pai   ||  http://[paivakil|fizzard].blogspot.com
Funny how people infriging commercial software licences are called
pirates, while huge companies infriging the GPL are called users

---End Message---


tiff-3.9.4-5: fixes RC Bug 600188

2010-10-17 Thread Jay Berkenbilt

I've just uploaded tiff-3.9.4-5, which fixes RC bug 600188,
CVE-2010-3087.  The change adds a single patch.  I uploaded with urgency
high and am requesting a freeze exception.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20101017165109.0601285123.qww314...@soup



backport of CVE-2010-3364 to vips/nip2 in testing

2010-10-10 Thread Jay Berkenbilt
The bug reported in bug 598296 is the security vulnerability
CVE-2010-3364.  The bug was reported against vips 7.22, but it actually
affects both vips and nip2, and it is present in all previous versions.
Its fix is a simple change to some wrapper shell scripts.  The versions
currently in unstable include upstream's fix to the bug, but the
unstable versions have no possibility of migrating to testing since they
are new upstream versions and depend on other things that are not going
to transition.

I have backported the fix from the current versions in unstable to the
versions in testing.  The patch applied with no modifications other than
the name of the file being changed.  I have prepared new versions for
testing, but as per your instructions, I have not uploaded them.
(Anyway, I don't have a clean testing chroot set up at the moment,
though I can always make one.)  I'm attaching my diffs to this email.
Feel free to either put these in testing or to ask me to go ahead and
upload.  I can set up a testing chroot and build packages to upload
(though it might take me several days to get to it).

I haven't done anything with to mark that the bug appears in older
versions.  I will also be contacting the security team about fixing it
in stable.

-- 
Jay Berkenbilt q...@debian.org
Index: debian/changelog
===
--- debian/changelog	(.../tags/7.20.7-1)	(revision 1488)
+++ debian/changelog	(.../branches/7.20)	(revision 1488)
@@ -1,3 +1,10 @@
+vips (7.20.7-2) testing-proposed-updates; urgency=low
+
+  * Backport fix to CVE-2010-3364 (insecure library loading) from 7.22.4
+release.
+
+ -- Jay Berkenbilt q...@debian.org  Sun, 10 Oct 2010 15:11:35 -0400
+
 vips (7.20.7-1) unstable; urgency=low
 
   * New upstream release
Index: debian/patches/ld-library-path.patch
===
--- debian/patches/ld-library-path.patch	(.../tags/7.20.7-1)	(revision 0)
+++ debian/patches/ld-library-path.patch	(.../branches/7.20)	(revision 1488)
@@ -0,0 +1,60 @@
+Description: fix to CVE-2010-3364 backported from upstream
+ Prevent insecure prepend to LD_LIBRARY_PATH
+Origin: upstream, backported from 7.22.4
+
+Index: vips-7.20.7/tools/scripts/vips-7.20
+===
+--- vips-7.20.7.orig/tools/scripts/vips-7.20	2010-10-10 15:07:23.240170610 -0400
 vips-7.20.7/tools/scripts/vips-7.20	2010-10-10 15:07:28.867670770 -0400
+@@ -19,6 +19,19 @@
+ 	exit 1
+ fi
+ 
++# prepend a path component to an environment variable
++# be careful to avoid trailing : characters if the var is not defined, they
++# can cause security problems
++function prepend_var () {
++	# we have to use eval to do double indirection, I think
++	eval value=\$$1
++	if [ x$value = x ]; then
++		export $1=$2
++	else 
++		export $1=$2:$value
++	fi
++}
++
+ # try to extract the prefix from a path to an executable
+ # eg. /home/john/vips/bin/fred - /home/john/vips
+ function find_prefix () {
+@@ -92,25 +105,26 @@
+ export VIPSHOME=$prefix
+ 
+ # add VIPSHOME to man pages
+-export MANPATH=$VIPSHOME/man:$MANPATH
++prepend_var MANPATH $VIPSHOME/man
+ 
+ # add the VIPS lib area to the library path
+ case `uname` in
+ HPUX)
+-	export SHLIB_PATH=$VIPSHOME/lib:$SHLIB_PATH
++	libvar=SHLIB_PATH 
+ 	;;
+ 
+ Darwin)
+-	export DYLD_LIBRARY_PATH=$VIPSHOME/lib:$DYLD_LIBRARY_PATH
++	libvar=DYLD_LIBRARY_PATH
+ 	;;
+  
+ *)
+-	export LD_LIBRARY_PATH=$VIPSHOME/lib:$LD_LIBRARY_PATH
++	libvar=LD_LIBRARY_PATH
+ 	;;
+ esac
++prepend_var $libvar $VIPSHOME/lib
+ 
+ # add VIPS bin area to path
+-export PATH=$VIPSHOME/bin:$PATH
++prepend_var PATH $VIPSHOME/bin
+ 
+ # run, passing in args we were passed
+ exec $*
Index: debian/patches/series
===
--- debian/patches/series	(.../tags/7.20.7-1)	(revision 1488)
+++ debian/patches/series	(.../branches/7.20)	(revision 1488)
@@ -0,0 +1 @@
+ld-library-path.patch
Index: debian/changelog
===
--- debian/changelog	(.../tags/7.20.7-2)	(revision 1487)
+++ debian/changelog	(.../branches/7.20)	(revision 1487)
@@ -1,3 +1,10 @@
+nip2 (7.20.7-3) testing-proposed-updates; urgency=low
+
+  * Backport fix to CVE-2010-3364 (insecure library loading) from 7.22.3
+release.
+
+ -- Jay Berkenbilt q...@debian.org  Sun, 10 Oct 2010 15:17:11 -0400
+
 nip2 (7.20.7-2) unstable; urgency=low
 
   * Updated build dependencies: libjpeg62-dev - libjpeg-dev
Index: debian/patches/ld-library-path.patch
===
--- debian/patches/ld-library-path.patch	(.../tags/7.20.7-2)	(revision 0)
+++ debian/patches/ld-library-path.patch	(.../branches/7.20)	(revision 1487)
@@ -0,0 +1,51 @@
+Description: fix to CVE-2010-3364 backported from upstream
+ Prevent insecure prepend to LD_LIBRARY_PATH
+Origin: upstream, backported from 7.22.3
+
+Index: nip2

tiff-3.9.4-4 fixes CVE-2010-3364

2010-10-02 Thread Jay Berkenbilt

I had overlooked that bug 595064 was a security bug that fixed
CVE-2010-3364.  I think perhaps a CVE number had not been assigned when
the bug was originally reported.  In any case, I upgraded the bug to
grave and uploaded tiff-3.9.4-4 with a fix to it.  The fix changes one
line of code, and I didn't make any other changes to the package.  Since
this is a security-related fix that should be able to enter testing
through unstable, I am requesting a freeze exception.  Otherwise, it can
be handled through normal security channels.  I uploaded it with urgency
high and mentioned the CVE number in the changelog.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20101002134407.0289400883.qww314...@soup



Re: freeze exceptions: qpdf, tiff

2010-08-21 Thread Jay Berkenbilt
Julien Cristau jcris...@debian.org wrote:

 On Fri, Aug 20, 2010 at 16:27:13 -0400, Jay Berkenbilt wrote:

 For qpdf, this is a new upstream version that is binary compatible with
 the old one.  qpdf is isolated in the dependency tree (no other packages
 depend on it), and I am upstream, so I can definitely vouch for the fact
 that the changes were relatively minor and should be very safe.
 
 I see new API but no shlibs bump?

New API doesn't require a shlibs bump.  Changed or removed API requires
a shlibs bump.  2.2.0 adds several new functions.  The only function
that changed incompatibly was
QPDFWriter::disableIncompatbleEncryption(float), which is a private
method in the QPDFWriter object.  No external code could call that
method, so it can't be an unresolved symbol anywhere, so changing it
does not require a shlibs bump.  I use libtool to manage the shlibs.
CURRENT,REVISION,AGE for 2.2.0 is 4,0,1.  For 2.1.5, it was 3,4,0.  This
is consistent with new API having been added but no callable API having
been changed or removed.

To be absolutely certain, I built qpdf 2.1.5 from source, swapped its
native libqpdf.so.3.0.4 with a copy of libqpdf.so.3.1.0 (renamed to
libqpdf.os.3.4), and ran qpdf's very thorough test suite.  The 2.1.5
qpdf's test suite passes when run with the 2.2.0 qpdf's shared library
with the exception of the fact that the test suite reports incomplete
coverage on the new API (which is, of course, not exercised by the 2.1.5
test suite).  So (assuming you trust the thoroughness of the qpdf test
suite), this also confirms that the ABI has not been broken.

Are you seeing something different from this?  If so, please let me
know.  I'm also interested to know what you're using to determine
whether there are ABI changes.  Thanks for being so thorough.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100821090836.0290813736.qww314...@soup



Re: freeze exceptions: qpdf, tiff

2010-08-21 Thread Jay Berkenbilt
Julien Cristau jcris...@debian.org wrote:

I hope you will not take it the wrong way that I'm continuing to argue
this point.  We share a common goal of ensuring that this change is safe
and will not cause problems, and I appreciate that you have to act in a
policing role about this issue.  I also appreciate that many developers
don't understand the subtleties of what constitutes a breaking ABI change.

In the case of qpdf, it seems as though we disagree on whether the
changes are safe.  If I have made a mistake, I will surely correct it,
but at this point, I still don't believe that I have introduced an
incompatible change to the library's ABI, and I really don't want to
artificially and needlessly increase the SONAME as that is disruptive to
my users.  So I continue the discussion below.

  I see new API but no shlibs bump?

 New API doesn't require a shlibs bump.  Changed or removed API requires
 a shlibs bump.

 Err.  New API is what shlibs is for.  Changed or removed API requires a
 SONAME and package name change.

How is what you're saying different from what I'm saying?  I interpreted
shlibs bump to mean changing the SONAME.  Do you mean something
different?  You say Changed or removed API requires SONAME and package
name change, and I agree.  But I don't believe that I have introduced
any changed or removed API.  Adding new API is not a reason to increase
the SONAME.  This happens all the time.

The reason for this is that the SONAME needs to change when there's a
reason that OLD applications linked originally with the OLD library
can't continue to work with the NEW library.  In other words, you should
be able to upgrade the shared library without breaking existing
applications.  Having new callable methods appear in the shared library
will not interfere with existing applications as long as existing
symbols can be resolved in the same way.

There's no expectation that executables linked with the new library will
work with the old library.  That's why adding new API doesn't require
changing the SONAME.

Do you disagree with my understanding of when the SONAME has to change,
or do you disagree with my analysis that none of the things that require
an SONAME change have happened?  Or have I just done a poor job of
explaining why my changes are compatible and have unwitting led you to a
false conclusion?

If our communication is clear but we disagree on one of these issues,
can we get someone else to weigh in?  Isn't this what the technical
committee is for?

A good discussion of this issue can be found here:

http://tldp.org/HOWTO/Program-Library-HOWTO/shared-libraries.html

Fundamentally though, you can usually tell by comparing the header files
and the list of exported symbols from the libraries.

The only changes that could even possibly be considered worthy of
causing an SONAME change are the addition of two new private data
members to the end of QPDF_Stream and the change to a private member
function of QPDFWriter.  However, QPDF_Stream is a private class to the
library: its header is not installed, no actual instances of the class
are ever exposed to the users of the library, and no classes are derived
from QPDF_Stream.  Therefore, addition of new data members to the end of
the object can't cause breakage of existing applications.  And the
method that changed in QPDFWriter is private.  It can't be called from
outside the QPDFWriter class, so this is safe too.  If there's any
doubt, you can run nm -D --demangle on the old and new shared libraries,
observe that the only method that disappeared from the old is
QPDFWriter::disableIncompatbleEncryption(float), and then verify by
looking at QPDFWriter.hh in 2.1.5 that this was in fact a private
method.

I designed QPDF's APIs the way they are in significant part to make it
possible to make certain types of changes without breaking binary
compatibility.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100821105320.0290889916.qww314...@soup



Re: freeze exceptions: qpdf, tiff

2010-08-21 Thread Jay Berkenbilt
Julien Cristau jcris...@debian.org wrote:

 Seems we're just talking past each other.

 On Sat, Aug 21, 2010 at 10:53:20 -0400, Jay Berkenbilt wrote:

 I interpreted shlibs bump to mean changing the SONAME.  Do you mean
 something different?

 I wasn't talking about the library's SONAME, I was talking about the
 shlibs control file from your package (as documented in policy §8.6, and
 used by dpkg-shlibdeps).

AH!  (*strikes head on forehead*) Oops...  Thanks for catching that.  My
mistake.  I so thoroughly missed the point that I interpreted shlibs
bump as SONAME change.  Of course shlibs makes sure you have a new
enough version of the library package.  I will fix it, re-upload, and
re-request a freeze exception.  Thanks for setting me straight, and
sorry for the confusion.

-- 
Jay Berkenbilt q...@debian.org


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100821120054.0290808079.qww314...@soup



freeze exceptions: qpdf, tiff

2010-08-20 Thread Jay Berkenbilt
I'd like to request two freeze exceptions: qpdf 2.2.0-1 and tiff
3.9.4-3.

For tiff, there are no code changes from 3.9.4-2.  I just fixed up
requires, conflicts, etc., to bring it up to standards 3.9.1.  (I didn't
want to combine that with the security fix that was in 3.9.4-2 and was
uploaded with urgency=high.)

For qpdf, this is a new upstream version that is binary compatible with
the old one.  qpdf is isolated in the dependency tree (no other packages
depend on it), and I am upstream, so I can definitely vouch for the fact
that the changes were relatively minor and should be very safe.

Thanks for your consideration.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20100820162713.2402820247.qww314...@motoko.argon.local



please unblock tiff

2010-08-14 Thread Jay Berkenbilt

I have uploaded tiff-3.9.4-2 to fix CVE-2010-2233.  Please unblock so
the security fix can be propagated to testing.  I did the upload with
urgency=high.  Thanks.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100814160125.0277396117.qww314...@soup



icu package RC bug and fix

2010-07-28 Thread Jay Berkenbilt

Someone posted an RC bug against ICU because of an FTBFS.  Upon
investigating the problem, it turns out to be because of doxygen 1.7.1
having showed up the day after the ICU packages were built.  The new
doxygen doesn't generate gif files anymore, which caused the install-doc
target of ICU to fail.  I'm uploading a new icu package today, which
will of course reset the 10-day counter (since I'm using urgency=low).
There are no other changes to the package.  If the ICU transition is
imminent, it would be safe to override the transition delay.  All I've
changed is to add a patch that removes *.gif from the list of installed
docs and that changes the build dependency on doxygen to be = 1.7.1.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20100728190214.2306552371.qww314...@motoko.argon.local



Re: ICU status check

2010-07-09 Thread Jay Berkenbilt
Adam D. Barratt a...@adam-barratt.org.uk wrote:

 On Fri, June 25, 2010 22:46, Jay Berkenbilt wrote:
 So, I don't want to nag since I know the release team is busy managing
 many conflicting priorities, but I'd like to get some sense of when I
 can upload ICU 4.4.  If it's soon, I'll wait on uploading the 4.6 test
 releases.  If not, then I may just go ahead and start on 4.6 with
 experimental.  However, I will still want to upload 4.4 to unstable.

 Apologies for not getting back to you sooner; sorting out what we were
 doing after the python transition took a little longer than expected.

 Please go ahead with the upload of 4.4 to unstable.

Thanks.  I will be offline starting in about 5 hours until Sunday early
afternoon.  As soon as I return, I will upload.  That way I will be able
to closely monitor for any problems.

No problem on the delay.  We're all volunteers!

--Jay


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100709103457.0280422710.qww314...@soup



ICU status check

2010-06-25 Thread Jay Berkenbilt

Hello again.  I know the release team hasn't forgotten about the ICU
transition, but I'm now faced with a bit of dilema.  Upstream is already
starting with testing for 4.6, and debian hasn't even got 4.4 yet.  I
would like to be able to start using experimental to stage 4.6
milestones, but I've got 4.4 there.  So I have two choices...either wait
to start testing the 4.6 milestones until after the transition, or go
ahead and start with the transition and then just upload 4.4 to unstable
whenever you give the okay.  The past few ICU transitions have been very
smooth because the ICU team is careful about source compatibility and
the ICU packages are structured so that binary NMUs are sufficient for
most of ICU's reverse dependencies.

So, I don't want to nag since I know the release team is busy managing
many conflicting priorities, but I'd like to get some sense of when I
can upload ICU 4.4.  If it's soon, I'll wait on uploading the 4.6 test
releases.  If not, then I may just go ahead and start on 4.6 with
experimental.  However, I will still want to upload 4.4 to unstable.

Thanks.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100625174638.0306576272.qww314...@soup



Re: permission to upload ICU 4.4 to unstable

2010-04-18 Thread Jay Berkenbilt
Jay Berkenbilt q...@debian.org wrote:

 ICU 4.4 was released a few weeks ago.  There are very few changes from
 4.4.rc1.  I'm going to do one upload of 4.4 to experimental to make sure
 it builds properly on all platforms.  If all goes well, I'd like to go
 ahead and upload to unstable.  Please let me know when I can proceed
 with the upgrade.  As before, there are no API changes for people who
 stick to published interfaces, so binary NMUs for reverse dependencies
 should be adequate, as it has been for the last few ICU transitions.

Hello again.  I'm still waiting for a response to this.  Of course, I
understand that the release team is busy and understaffed, and that you
have to serialize things sometimes, so I'm not complaining...I'm just
asking for an update. :-) I know you know about it because I saw it in
your bits from the release team.  If you could let me know where this is
in the queue, I'd appreciate it.  Alternatively, if there's something
else I need to do to get this on the queue, I'm not aware of it.  I
remember some discussion about using the BTS for this kind of request,
but I don't remember seeing a resolution to that question.  Thanks.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100418100019.0267997463.qww314...@soup



permission to upload ICU 4.4 to unstable

2010-04-09 Thread Jay Berkenbilt

ICU 4.4 was released a few weeks ago.  There are very few changes from
4.4.rc1.  I'm going to do one upload of 4.4 to experimental to make sure
it builds properly on all platforms.  If all goes well, I'd like to go
ahead and upload to unstable.  Please let me know when I can proceed
with the upgrade.  As before, there are no API changes for people who
stick to published interfaces, so binary NMUs for reverse dependencies
should be adequate, as it has been for the last few ICU transitions.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100409223507.0270542654.qww314...@soup



ICU transition for squeeze?

2010-03-14 Thread Jay Berkenbilt

In response to your request to debian-devel-announce, I'd like to ask if
it's possible to transition ICU to version 4.4 for squeeze.  4.4 is
supposed to be released this coming week, and we had several pre-release
versions in experimental.  The ICU packages are set up so that binary
NMU's are usually if not always sufficient, and the ICU upstream has
what I believe to be a perfect track record when it comes it maintaining
API compatibility.  The last few ICU transitions have gone through
without incident.

The most important package that depends on ICU is openoffice.org.  My
usual policy with respect to ICU transitions is to make sure openoffice
tests with the new version and, if everything is okay, to upload and ask
the release team to schedule binary NMUs for its reverse dependencies.
A 4.4 release candidate was released last week.  I haven't uploaded to
experimental yet because of a small problem with installation.  There
are two possible solutions, both of which are easy, but I'm waiting for
upstream to let me know which one they prefer.  The most likely
progression will be that I upload 4.4-1 to experimental for NEW
processing (soname change), openoffice.org tests with it, and then I
upload 4.4-2 to unstable, coordinate with the release team, of course.

As far as my other packages are concerned, I don't see anything
significant coming up.  There is likely to be a final release of tiff
4.0 soon, but that's going to be a more significant transition that I
plan not to start until after squeeze is released.  I'll contact the
release team separately about preparing for that.  Maybe we can learn
from the jpeg8 transition, but I'll save the details for another
message.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100314210331.0274750181.qww314...@soup



Re: xerces-c2-2.8.0-3+lenny1: permission to upload to stable

2010-02-07 Thread Jay Berkenbilt
Adam D. Barratt a...@adam-barratt.org.uk wrote:

 Please prepare an update (built against stable, either on a stable
 system or in a chroot), and send a debdiff against the current stable
 package to debian-release for upload approval.

Here it is.  I have built the packages in a lenny chroot and have done
light testing to ensure proper functionality.  The packages are signed
and ready to upload pending approval.

diff -u xerces-c2-2.8.0/debian/changelog xerces-c2-2.8.0/debian/changelog
--- xerces-c2-2.8.0/debian/changelog
+++ xerces-c2-2.8.0/debian/changelog
@@ -1,3 +1,9 @@
+xerces-c2 (2.8.0-3+lenny1) stable; urgency=low
+
+  * Apply patch to correct CVE-2009-1885: DoS attack from nested DTDs.
+
+ -- Jay Berkenbilt q...@debian.org  Sat, 06 Feb 2010 22:01:25 -0500
+
 xerces-c2 (2.8.0-3) unstable; urgency=low
 
   * Change priority from extra to optional as priority optional packages
only in patch2:
unchanged:
--- xerces-c2-2.8.0.orig/debian/patches/00-CVE-2009-1885.patch
+++ xerces-c2-2.8.0/debian/patches/00-CVE-2009-1885.patch
@@ -0,0 +1,650 @@
+diff -urN xerces-c-src_2_8_0.orig/src/xercesc/validators/DTD/DTDScanner.cpp xerces-c-src_2_8_0/src/xercesc/validators/DTD/DTDScanner.cpp
+--- xerces-c-src_2_8_0.orig/src/xercesc/validators/DTD/DTDScanner.cpp	2007-08-28 14:43:25.0 -0400
 xerces-c-src_2_8_0/src/xercesc/validators/DTD/DTDScanner.cpp	2010-02-06 21:58:25.675927667 -0500
+@@ -27,7 +27,9 @@
+ #include xercesc/util/FlagJanitor.hpp
+ #include xercesc/util/Janitor.hpp
+ #include xercesc/util/XMLUniDefs.hpp
++#include xercesc/util/ValueStackOf.hpp
+ #include xercesc/util/UnexpectedEOFException.hpp
++#include xercesc/util/OutOfMemoryException.hpp
+ #include xercesc/sax/InputSource.hpp
+ #include xercesc/framework/XMLDocumentHandler.hpp
+ #include xercesc/framework/XMLEntityHandler.hpp
+@@ -39,7 +41,6 @@
+ #include xercesc/validators/DTD/DTDEntityDecl.hpp
+ #include xercesc/validators/DTD/DocTypeHandler.hpp
+ #include xercesc/validators/DTD/DTDScanner.hpp
+-#include xercesc/util/OutOfMemoryException.hpp
+ 
+ XERCES_CPP_NAMESPACE_BEGIN
+ 
+@@ -1046,338 +1047,354 @@
+ // Check for a PE ref here, but don't require spaces
+ checkForPERef(false, true);
+ 
+-// We have to check entity nesting here
+-unsigned int curReader;
+-
++ValueStackOfXMLSize_t* arrNestedDecl=NULL;
+ //
+ //  We know that the caller just saw an opening parenthesis, so we need
+-//  to parse until we hit the end of it, recursing for other nested
+-//  parentheses we see.
++//  to parse until we hit the end of it; if we find several parenthesis,
++//  store them in an array to be processed later.
+ //
+ //  We have to check for one up front, since it could be something like
+ //  (((a)*)) etc...
+ //
+ ContentSpecNode* curNode = 0;
+-if (fReaderMgr-skippedChar(chOpenParen))
++while(fReaderMgr-skippedChar(chOpenParen))
+ {
+-curReader = fReaderMgr-getCurrentReaderNum();
++// to check entity nesting
++const unsigned int curReader = fReaderMgr-getCurrentReaderNum();
++if(arrNestedDecl==NULL)
++arrNestedDecl=new (fMemoryManager) ValueStackOfXMLSize_t(5, fMemoryManager);
++arrNestedDecl-push(curReader);
+ 
+-// Lets call ourself and get back the resulting node
+-curNode = scanChildren(elemDecl, bufToUse);
++// Check for a PE ref here, but don't require spaces
++checkForPERef(false, true);
++}
+ 
+-// If that failed, no need to go further, return failure
+-if (!curNode)
+-return 0;
++// We must find a leaf node here, either standalone or nested in the parenthesis
++if (!fReaderMgr-getName(bufToUse))
++{
++fScanner-emitError(XMLErrs::ExpectedElementName);
++return 0;
++}
+ 
+-if (curReader != fReaderMgr-getCurrentReaderNum()  fScanner-getDoValidation())
+-fScanner-getValidator()-emitError(XMLValid::PartialMarkupInPE);
++//
++//  Create a leaf node for it. If we can find the element id for
++//  this element, then use it. Else, we have to fault in an element
++//  decl, marked as created because of being in a content model.
++//
++XMLElementDecl* decl = fDTDGrammar-getElemDecl(fEmptyNamespaceId, 0, bufToUse.getRawBuffer(), Grammar::TOP_LEVEL_SCOPE);
++if (!decl)
++{
++decl = new (fGrammarPoolMemoryManager) DTDElementDecl
++(
++bufToUse.getRawBuffer()
++, fEmptyNamespaceId
++, DTDElementDecl::Any
++, fGrammarPoolMemoryManager
++);
++decl-setCreateReason(XMLElementDecl::InContentModel);
++decl-setExternalElemDeclaration(isReadingExternalEntity());
++fDTDGrammar-putElemDecl(decl);
+ }
+- else
++curNode = new (fGrammarPoolMemoryManager) ContentSpecNode
++(
++decl-getElementName()
++, fGrammarPoolMemoryManager
++);
++
++// Check for a PE ref

Re: xerces-c2-2.8.0-3+lenny1: permission to upload to stable

2010-02-07 Thread Jay Berkenbilt
Adam D. Barratt a...@adam-barratt.org.uk wrote:

 On Sun, 2010-02-07 at 13:30 -0500, Jay Berkenbilt wrote:
 Adam D. Barratt a...@adam-barratt.org.uk wrote:
 
  Please prepare an update (built against stable, either on a stable
  system or in a chroot), and send a debdiff against the current stable
  package to debian-release for upload approval.
 
 Here it is.  I have built the packages in a lenny chroot and have done
 light testing to ensure proper functionality.  The packages are signed
 and ready to upload pending approval.

 Please go ahead.

Done.  Thanks.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



xerces-c2-2.8.0-3+lenny1: permission to upload to stable

2010-02-06 Thread Jay Berkenbilt

The current xerces-c2 package, 2.8.0+deb1-2, contains a patch supplied
by upstream to address CVE-2009-1885.  The security team has deemed that
this is not important enough for a DSA, and I agree.  From Giuseppe
Iuculano:

 the following CVE (Common Vulnerabilities  Exposures) id was
 published for xerces-c2 and xerces27 some time ago.

 CVE-2009-1885[0]:
 | Stack consumption vulnerability in validators/DTD/DTDScanner.cpp in
 | Apache Xerces C++ 2.7.0 and 2.8.0 allows context-dependent attackers
 | to cause a denial of service (application crash) via vectors involving
 | nested parentheses and invalid byte values in simply nested DTD
 | structures, as demonstrated by the Codenomicon XML fuzzing framework.

 Unfortunately the vulnerability described above is not important
 enough to get it fixed via regular security update in Debian stable
 and oldstable. It does not warrant a DSA.

 However it would be nice if this could get fixed via a regular point
 update[1].  Please contact the release team for this.

As it happens, the patch from 2.8.0+deb1-2 applies perfectly to the
version in stable, so preparing an update to stable is trivial.  With
the permission of the release team, I will prepare the upload.  I'm not
sure what the best way to do this is.  I can either prepare an upload to
stable or I can supply a patch that can be applied to the version of the
package in stable.  I don't presently have a stable chroot to build in,
though I can obviously make one to prepare the package if it would help.
My changelog starts with this:

xerces-c2 (2.8.0-3+lenny1) stable; urgency=low

I also added the patch to the debian/patches directory after
regenerating it (just to be sure) and changing its name based on the
different packaging of the older version.

[note to self: ~/tmp/xerces-c2-2.8.0-3+lenny1.patch]

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



does qpdf need a hint?

2009-11-14 Thread Jay Berkenbilt

It looks like qpdf might need a hint to move to testing.  The testing
migration status is reporting that it's out of date because of the
libqpdf1 binary package, but this package is no longer created by qpdf,
which now creates libqpdf3.  Funny...I don't remember this type of
problem needing a manual push before.  In any case, I'd be grateful if
someone could look into why this isn't transitioning.  I can't see any
reason that it shouldn't.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



version screwup: any recourse besides epoch?

2009-08-21 Thread Jay Berkenbilt

I screwed up and released tiff 3.9.0beta+deb1 to experimental earlier
this week instead of 3.9.0~beta+deb1.  Now I'd like to upload 3.9.0 to
unstable.  I really don't want to introduce an epoch.  Is it possible to
make 3.9.0beta+deb1 just disappear?  It's never been anywhere but
experimental, and it's only been there for two days.  Otherwise, I'll
have to think about whether to introduce an epoch or to just contort the
version for this one release, like 3.9.0+final.  I hate to use an epoch
to fix a typo instead of to handle a genuine change to the version
numbering scheme.  Advice welcome.  I'll delay my 3.9.0 upload a bit
until I get an answer.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: version screwup: any recourse besides epoch?

2009-08-21 Thread Jay Berkenbilt
Jay Berkenbilt q...@debian.org wrote:

 I screwed up and released tiff 3.9.0beta+deb1 to experimental earlier
 this week instead of 3.9.0~beta+deb1.  Now I'd like to upload 3.9.0 to
 unstable.  I really don't want to introduce an epoch.  Is it possible to
 make 3.9.0beta+deb1 just disappear?  It's never been anywhere but
 experimental, and it's only been there for two days.  Otherwise, I'll
 have to think about whether to introduce an epoch or to just contort the
 version for this one release, like 3.9.0+final.  I hate to use an epoch
 to fix a typo instead of to handle a genuine change to the version
 numbering scheme.  Advice welcome.  I'll delay my 3.9.0 upload a bit
 until I get an answer.

Please disregard.  I figured it out.  I'm going to upload 3.9.0 to
unstable, which will work fine because it's newer than 3.8.2.  I'll
upload 4.0.0beta3 to experimental which will clear out 3.9.0beta+deb1.

Sorry for the noise.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: version screwup: any recourse besides epoch?

2009-08-21 Thread Jay Berkenbilt
Andreas Metzler ametz...@downhill.at.eu.org wrote:

 On 2009-08-21 Jay Berkenbilt q...@debian.org wrote:
 Jay Berkenbilt q...@debian.org wVrote:

  I screwed up and released tiff 3.9.0beta+deb1 to experimental earlier
  this week instead of 3.9.0~beta+deb1.  Now I'd like to upload 3.9.0 to
 [...]
 I'll
 upload 4.0.0beta3 to experimental which will clear out 3.9.0beta+deb1.

 4.0.0~beta3 I guess ;-)
 cu andreas

Yes.  Of course. ;-)


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: scheduling ICU 4.2 transition

2009-08-19 Thread Jay Berkenbilt

I have uploaded ICU 4.2.1 to unstable.  Once it builds, it should be
possible to initiate rebuilds of its reverse dependencies.  Thanks.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: scheduling ICU 4.2 transition

2009-08-08 Thread Jay Berkenbilt
Luk Claes l...@debian.org wrote:

 Please upload now.

Great, glad we're ready.  However, I'm getting ready to be gone without
email access for a week, and I have an RC bugfix in ICU 4.0.1 unstable
waiting to transition.  I wouldn't want to introduce a new problem while
I'm not here to deal with it or possibly leave an RC buggy version of
4.0.1 sitting in squeeze for however long the transition takes.
Hopefully in one week when I get back, it will still be a good time.  I
will plan on uploading then unless I hear otherwise.  Thanks!

--Jay


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



scheduling ICU 4.2 transition

2009-08-01 Thread Jay Berkenbilt

It's now been a full month since my first message about scheduling an
ICU 4.2 transition, and I have still not done an upload to unstable
because I am still waiting for a response.  Again, with the utmost
respect and admiration for the hard work being done by the release team,
I think the new policy of coordinating library transitions won't work if
the response time is so long.  Perhaps I'm misunderstanding the policy
and I should just upload to unstable?

To save you from reading the earlier thread, I'd like to upload ICU
4.2.1 to unstable.  It is source-compatible but not binary-compatible
with ICU 4.0.  The packages are structured so that binary NMUs should be
sufficient for the vast majority of reverse dependencies.  The most
prominent reverse dependency, openoffice.org, is already okay with the
upload.  The final 4.2.1 release is identical to 4.2.1~rc3 currently in
experimental.  Thanks.

--Jay

---BeginMessage---

I sent the message below to debian-release 11 days ago requesting
permission to upload ICU 4.2.1 to unstable.  I understand and fully
support the new policy of getting advance permission and trying to
coordinate transitions, but I'm unsure of how long I should expect to
wait before receiving a response one way or the other.

The actual 4.2.1 differs from 4.2.1~rc1 in experimental by only one line
of code and that line is inside of an #ifdef that only runs on Windows,
so for our purposes, 4.2.1~rc1 in experimental is identical to 4.2.1.
I'd still like to go ahead and get the transition going, but as per
requests to debian-devel-announce, I intend to hold off my upload until
I get confirmation from debian-release.

Please cc me on any response as I am not subscribed to debian-release.
(I did check the archives for responses before reposting.)

Thanks for all you do to keep things moving.  Please see this message as
a gentle tug from someone who wants to cause as little disruption as
possible rather than as a complaint or criticism.

-- 
Jay Berkenbilt q...@debian.org


Jay Berkenbilt q...@debian.org wrote:

 I'd like to get a place in line for doing a transition to ICU 4.2.  I
 realize there are other transitions going on right now, but I'd be
 interested in an ETA.  I believe the ICU 4.0 transition worked just with
 binary NMUs, but I also seem to recall that it was forced into testing
 early.  Also, openoffice.org previously reported that it worked with
 4.2.  In any case, I won't upload to unstable before I hear back from
 the release team.  I'll be uploading 4.2.1 to experimental in the mean
 time unless you say, yeah, go ahead and upload to unstable. :-)
---End Message---


Re: scheduling ICU 4.2 transition

2009-08-01 Thread Jay Berkenbilt
Philipp Kern pk...@debian.org wrote:

 It's now been a full month since my first message about scheduling an
 ICU 4.2 transition, and I have still not done an upload to unstable
 because I am still waiting for a response.  Again, with the utmost
 respect and admiration for the hard work being done by the release team,
 I think the new policy of coordinating library transitions won't work if
 the response time is so long.  Perhaps I'm misunderstanding the policy
 and I should just upload to unstable?

 Please hold off if possible.  We are currently blocked with britney (the
 testing migration tool) not coping with the vast amount of to-be-migrated
 packages.  We hope to resolve this issue soon.

 However I agree that you should've get a reply.  We are a bit understaffed
 and that britney runs in circles currently really doesn't help.

Thank you for the response.  I will hold off.  Should I check in again
in a few weeks, or is there something specific I should be monitoring
before I check in again?  If there is a specific package or group of
packages that should migrate before I ask again, I'll just check the
status of those and not ask again until they are through.  Thanks!

--Jay


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: scheduling ICU 4.2 transition

2009-07-12 Thread Jay Berkenbilt

I sent the message below to debian-release 11 days ago requesting
permission to upload ICU 4.2.1 to unstable.  I understand and fully
support the new policy of getting advance permission and trying to
coordinate transitions, but I'm unsure of how long I should expect to
wait before receiving a response one way or the other.

The actual 4.2.1 differs from 4.2.1~rc1 in experimental by only one line
of code and that line is inside of an #ifdef that only runs on Windows,
so for our purposes, 4.2.1~rc1 in experimental is identical to 4.2.1.
I'd still like to go ahead and get the transition going, but as per
requests to debian-devel-announce, I intend to hold off my upload until
I get confirmation from debian-release.

Please cc me on any response as I am not subscribed to debian-release.
(I did check the archives for responses before reposting.)

Thanks for all you do to keep things moving.  Please see this message as
a gentle tug from someone who wants to cause as little disruption as
possible rather than as a complaint or criticism.

-- 
Jay Berkenbilt q...@debian.org


Jay Berkenbilt q...@debian.org wrote:

 I'd like to get a place in line for doing a transition to ICU 4.2.  I
 realize there are other transitions going on right now, but I'd be
 interested in an ETA.  I believe the ICU 4.0 transition worked just with
 binary NMUs, but I also seem to recall that it was forced into testing
 early.  Also, openoffice.org previously reported that it worked with
 4.2.  In any case, I won't upload to unstable before I hear back from
 the release team.  I'll be uploading 4.2.1 to experimental in the mean
 time unless you say, yeah, go ahead and upload to unstable. :-)


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: scheduling ICU 4.2 transition

2009-07-12 Thread Jay Berkenbilt
Rene Engelhard r...@debian.org wrote:

 Hi,

 Jay Berkenbilt wrote:
 permission to upload ICU 4.2.1 to unstable.  I understand and fully
 support the new policy of getting advance permission and trying to
 coordinate transitions, but I'm unsure of how long I should expect to
 wait before receiving a response one way or the other.

 I am not from the RT..

 The actual 4.2.1 differs from 4.2.1~rc1 in experimental by only one line
 of code and that line is inside of an #ifdef that only runs on Windows,
 so for our purposes, 4.2.1~rc1 in experimental is identical to 4.2.1.
 I'd still like to go ahead and get the transition going, but as per
 requests to debian-devel-announce, I intend to hold off my upload until
 I get confirmation from debian-release.

 ... but a transition to ICU 4.2 involcing bin-NMUs would disrupt the
 suitesparse transition which afaics is nearly ready and just needs
 some hinting/forcing by the RT. After this, *in my opinion* there
 shouldn't be a problem, but that of course is no official statement by
 the RT :()

 Grüße/Regards,

 René

Regardless, I consider renewed input from openoffice maintainers
essential before any potentially disruptive upload, so your input is
useful to me and hopefully also to the release team.  I'll be on
pseudo-vacation from 7/17 until maybe 7/24 or so, so I probably would
want to wait until after then anyway.  I'll of course still wait for the
release team before acting.  Thanks.

-- 
Jay Berkenbilt q...@debian.org


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



excuses.php is confused about ICU

2009-07-01 Thread Jay Berkenbilt

(Release team: ICU 4.0.1-3 might need a hint to transition to testing
once its 10 days are up...see below for details.)

Whatever excuses.php calls (update-excuses?) is confused about RC bug
530568, reported against the experimental version of ICU.  It now seems
to think that transitioning ICU to testing will introduce this bug, but
this bug does not apply to the unstable version.  Maybe the confusion is
because the unstable version is newer in time than the experimental
version, but I haven't looked at the code.

Here is an abbreviated chronology:

 1.  2009-05-25: RC bug 530568 was reported against ICU 4.2-1 (experimental)

 2.  2009-06-27: Version 4.0.1-3 uploaded to unstable

 3.  2009-06-28: bug 530568 closed for version 4.2.1~rc1-3
 (experimental) and also explicitly marked notfound in 4.0.1-3

http://qa.debian.org/excuses.php?package=icu reports

Excuse for icu

  * Too young, only 4 of 10 days old
  * icu (source) has new bugs!
  * Updating icu introduces new bugs: #530568
  * Not considered

In fact, updating ICU does not introduce new RC bugs.  I imagine that
there is either a problem in the excuses code or that I have done
something wrong with respect to telling the BTS which versions of the
package contain this bug.  It seems to me that the logic should be that,
if a bug applies to version X, it should apply automatically to version
Y if Y  X, not if Y was uploaded more recently than X.  But I'm only
guessing about the age anyway since I haven't looked at the code.

If it makes a difference, I closed the bug manually with a -done message
that contained a Version: pseudo header because I accidentally put the
wrong bug number in the ChangeLog.  But I think I sent my done message
correctly, and the BTS seems to have an accurate idea of which versions
contain the bug.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



scheduling ICU 4.2 transition

2009-07-01 Thread Jay Berkenbilt

I'd like to get a place in line for doing a transition to ICU 4.2.  I
realize there are other transitions going on right now, but I'd be
interested in an ETA.  I believe the ICU 4.0 transition worked just with
binary NMUs, but I also seem to recall that it was forced into testing
early.  Also, openoffice.org previously reported that it worked with
4.2.  In any case, I won't upload to unstable before I hear back from
the release team.  I'll be uploading 4.2.1 to experimental in the mean
time unless you say, yeah, go ahead and upload to unstable. :-)

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: excuses.php is confused about ICU

2009-07-01 Thread Jay Berkenbilt

Adam D. Barratt a...@adam-barratt.org.uk wrote:

 The BTS's version tracking is based on upload history as laid out in the
 package's changelog, not version nor date comparisons.  The changelog
 for icu 4.0.1-3 (unstable) included the entries for the 4.2-1 upload to
 experimental . . .

Okay, thanks for the explanation.  When I have interleaved versions
between unstable and experimental, I always put things in chronological
order in the newer version's ChangeLog so I eventually have an
unabridged, chronological history.  My habit of doing this was based on
a discussion on debian-devel years ago (maybe 2004 or 2005).  Perhaps
I'll switch to doing it based on version ordering instead if it will
make the right thing more likely to happen.

The full version diagram suggests that BTS is aware of the branches
created at stable releases but not necessarily unstable
vs. experimental.

Adam D. Barratt a...@adam-barratt.org.uk wrote:

 The simplest solution in this case is to mark the bug as fixed in
 4.0.1-3 as well and then as found in 4.2.1~rc1-1.  It's not correct but
 will convince the BTS that 4.2.1 and 4.2.1~rc1-[12] contain the bug but
 4.0.1-3 does not.

Makes sense, given the explanation.  I'll go ahead and do this.

 (For reference, notfound does not indicate to the BTS that a
 particular package version does not contain a bug; it removes the
 version from the explicit list of versions known to be affected, but
 the rules mentioned above regarding changelog ordering still apply).

Yes, I see that now.  Thanks!

--Jay


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



xerces-c2 out of date on mips for no apparent reason?

2009-06-22 Thread Jay Berkenbilt

PTS (http://packages.qa.debian.org/x/xerces-c2.html) reports that the
xerces-c2 package is out of date on mips.  However, the build logs
(https://buildd.debian.org/pkg.cgi?pkg=xerces-c2) indicate that the
package was successfully built on June 12 but was never installed.
Starting today, this will prevent xerces-c2 from transitioning.
Hopefully someone can poke this to resolve the problem.  Thanks.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: ICU 4.2 in experimental

2009-05-26 Thread Jay Berkenbilt
Rene Engelhard r...@debian.org wrote:

 Rene Engelhard wrote:
 Jay Berkenbilt wrote:
  I have just uploaded ICU 4.2 in experimental.  As is generally the
  case, this release of ICU is expected to be source-compatible with
  earlier versions, including 4.0 which is currently in unstable.  It
  will have to clear NEW, but once it does, you may wish to test your
  packages against the new version of ICU.  Once it does clear NEW, I
  will send email to debian-devel mentioning that it is there.  I will
  work with debian-release to schedule a transition to ICU 4.2 once I
  have received confirmation from the Open Office people that they are
  ready.  Most likely, everyone else will get by with just an binary
  NMU.
 
 Well, assuming OOo builds (which it seems it does, it at least passed
 the place where it does heavy stuff with icu at build time) it can be
 bin-NMUed, too.. Need to check whether it works, though...

 Needed a fix in the Lotus Word Pro filter nevertheless, no idea why it
 broke right now with icu 4.2 and not  before but the file does include
 unicode/timezone.h. Anyway, fixed. (LONG_MAX self-defined as const instead
 of using limits.h

 Means: we'll need OOo = 3.0.1-5 to build against ICU 4.2

Thanks for the quick turnaround on testing.  I have no problem with
ICU 4.2 being behind OOo 3.1.0 if that's what you and the release team
decide.  At the moment, ICU 4.2 is failing to build on most
architectures because of a library on which ranlib was not run.  Some
architectures, like i386, don't care, but most do.  I've already
reported to upstream.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



  1   2   >