Bug#961654: buster-pu: package bzip2/1.0.6-9.2~deb10u1

2022-09-16 Thread Santiago R.R.
El 16/09/22 a las 09:39, Emilio Pozuelo Monfort escribió:
> Hi Santiago,
> 
> On 15/09/2022 09:52, Emilio Pozuelo Monfort wrote:
> > On 14/09/2022 15:42, Santiago R.R. wrote:
> > > El 14/09/22 a las 13:58, Emilio Pozuelo Monfort escribió:
> > > > On 13/09/2022 16:46, Sylvain Beucler wrote:
> > > > > Hi,
> > > > > 
> > > > > IIUC this is about fixing 2 non-security bugs, that were introduced
> > > > > prior to buster's initial release.
> > > > > 
> > > > > I personally don't think this fits the LTS project scope.
> > > > > Maybe other LTS members will have a different opinion.
> > > > 
> > > > We've had bugfix updates from time to time. They are rare, but not
> > > > forbidden. This should go in a buster suite rather than 
> > > > buster-security, but
> > > > since there's no such suite for LTS, having it in buster-security is the
> > > > lesser evil. Of course we shouldn't flood -security with bug fixes, if 
> > > > that
> > > > was necessary we should consider keeping $stable open and handled by 
> > > > the LTS
> > > > team (but that doesn't seem necessary at this point).
> > > > 
> > > > In this case, since the update has been prepared and looks sensible, 
> > > > I'll go
> > > > ahead with the upload if nobody objects.
> > > > 
> > > 
> > > Thanks, Emilio. Also consider
> > > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961654#15
> > > 
> > > Haven't tested yet myself. But I suppose I should apply it in unstable.
> > 
> > For buster I'd rather use what was proposed for buster-pu, as that's
> > also what is in bullseye.
> 
> I have uploaded that, with a s/buster/&-security/ in d/changelog, and fixing
> your name to be UTF-8.

Thanks!

,

 -- Santiago


signature.asc
Description: PGP signature


Bug#961654: buster-pu: package bzip2/1.0.6-9.2~deb10u1

2022-09-16 Thread Emilio Pozuelo Monfort

Hi Santiago,

On 15/09/2022 09:52, Emilio Pozuelo Monfort wrote:

On 14/09/2022 15:42, Santiago R.R. wrote:

El 14/09/22 a las 13:58, Emilio Pozuelo Monfort escribió:

On 13/09/2022 16:46, Sylvain Beucler wrote:

Hi,

IIUC this is about fixing 2 non-security bugs, that were introduced
prior to buster's initial release.

I personally don't think this fits the LTS project scope.
Maybe other LTS members will have a different opinion.


We've had bugfix updates from time to time. They are rare, but not
forbidden. This should go in a buster suite rather than buster-security, but
since there's no such suite for LTS, having it in buster-security is the
lesser evil. Of course we shouldn't flood -security with bug fixes, if that
was necessary we should consider keeping $stable open and handled by the LTS
team (but that doesn't seem necessary at this point).

In this case, since the update has been prepared and looks sensible, I'll go
ahead with the upload if nobody objects.



Thanks, Emilio. Also consider
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961654#15

Haven't tested yet myself. But I suppose I should apply it in unstable.


For buster I'd rather use what was proposed for buster-pu, as that's also what 
is in bullseye.


I have uploaded that, with a s/buster/&-security/ in d/changelog, and fixing 
your name to be UTF-8.


Cheers,
Emilio



Bug#961654: buster-pu: package bzip2/1.0.6-9.2~deb10u1

2022-09-15 Thread Emilio Pozuelo Monfort

On 14/09/2022 15:42, Santiago R.R. wrote:

El 14/09/22 a las 13:58, Emilio Pozuelo Monfort escribió:

On 13/09/2022 16:46, Sylvain Beucler wrote:

Hi,

IIUC this is about fixing 2 non-security bugs, that were introduced
prior to buster's initial release.

I personally don't think this fits the LTS project scope.
Maybe other LTS members will have a different opinion.


We've had bugfix updates from time to time. They are rare, but not
forbidden. This should go in a buster suite rather than buster-security, but
since there's no such suite for LTS, having it in buster-security is the
lesser evil. Of course we shouldn't flood -security with bug fixes, if that
was necessary we should consider keeping $stable open and handled by the LTS
team (but that doesn't seem necessary at this point).

In this case, since the update has been prepared and looks sensible, I'll go
ahead with the upload if nobody objects.



Thanks, Emilio. Also consider
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961654#15

Haven't tested yet myself. But I suppose I should apply it in unstable.


For buster I'd rather use what was proposed for buster-pu, as that's also what 
is in bullseye.


Cheers,
Emilio



Bug#961654: buster-pu: package bzip2/1.0.6-9.2~deb10u1

2022-09-14 Thread Santiago R.R.
El 14/09/22 a las 13:58, Emilio Pozuelo Monfort escribió:
> On 13/09/2022 16:46, Sylvain Beucler wrote:
> > Hi,
> > 
> > IIUC this is about fixing 2 non-security bugs, that were introduced
> > prior to buster's initial release.
> > 
> > I personally don't think this fits the LTS project scope.
> > Maybe other LTS members will have a different opinion.
> 
> We've had bugfix updates from time to time. They are rare, but not
> forbidden. This should go in a buster suite rather than buster-security, but
> since there's no such suite for LTS, having it in buster-security is the
> lesser evil. Of course we shouldn't flood -security with bug fixes, if that
> was necessary we should consider keeping $stable open and handled by the LTS
> team (but that doesn't seem necessary at this point).
> 
> In this case, since the update has been prepared and looks sensible, I'll go
> ahead with the upload if nobody objects.
> 

Thanks, Emilio. Also consider
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961654#15

Haven't tested yet myself. But I suppose I should apply it in unstable.

Cheers,

 -- S


signature.asc
Description: PGP signature


Bug#961654: buster-pu: package bzip2/1.0.6-9.2~deb10u1

2022-09-14 Thread Chris Frey
On Wed, Sep 14, 2022 at 01:54:40PM +0200, Emilio Pozuelo Monfort wrote:
> Your top-commit looks very similar to the one from Santiago on [1]. I'd
> rather use that to give him credit as he proposed the fix first (plus using
> CPPFLAGS seems more correct for this flag). In addition to that, the commit
> misses his follow-up fix in [2]. I'm going to consider that last debdiff
> from him for an upload to buster. Thanks in any case for looking at it (and
> coming up with a similar fix) and for testing the update.

No problem, thank you!

- Chris



Bug#961654: buster-pu: package bzip2/1.0.6-9.2~deb10u1

2022-09-14 Thread Emilio Pozuelo Monfort

On 13/09/2022 16:46, Sylvain Beucler wrote:

Hi,

IIUC this is about fixing 2 non-security bugs, that were introduced prior to 
buster's initial release.


I personally don't think this fits the LTS project scope.
Maybe other LTS members will have a different opinion.


We've had bugfix updates from time to time. They are rare, but not forbidden. 
This should go in a buster suite rather than buster-security, but since there's 
no such suite for LTS, having it in buster-security is the lesser evil. Of 
course we shouldn't flood -security with bug fixes, if that was necessary we 
should consider keeping $stable open and handled by the LTS team (but that 
doesn't seem necessary at this point).


In this case, since the update has been prepared and looks sensible, I'll go 
ahead with the upload if nobody objects.


Cheers,
Emilio



Bug#961654: buster-pu: package bzip2/1.0.6-9.2~deb10u1

2022-09-14 Thread Emilio Pozuelo Monfort

Hi Chris,

On 14/09/2022 05:48, Chris Frey wrote:

On the other hand, the fix has been known since 2019 and looks like a
prime problem for an LTS newbie volunteer like me.

I have created the fix based on the Debian/bzip2 repo, the fix is in
the debian/buster branch.

git clone http://digon.foursquare.net/debian-buster-bzip2/.git


Your top-commit looks very similar to the one from Santiago on [1]. I'd rather 
use that to give him credit as he proposed the fix first (plus using CPPFLAGS 
seems more correct for this flag). In addition to that, the commit misses his 
follow-up fix in [2]. I'm going to consider that last debdiff from him for an 
upload to buster. Thanks in any case for looking at it (and coming up with a 
similar fix) and for testing the update.


Cheers,
Emilio

[1] 
https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1;bug=961654;filename=bzip2_1.0.6-9.2~deb10u2.debdiff;msg=5
[2] 
https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1;bug=961654;filename=bzip2_1.0.6-9.2~deb10u2.debdiff;msg=10




I have tested it on a 32bit buster, and it works on +2g files.

I do not have privileges to push this to any server yet, so feel free to
tweak the changelog and claim it as your own, whoever wishes to upload it.

- Chris


On Tue, Sep 13, 2022 at 04:46:14PM +0200, Sylvain Beucler wrote:

Hi,

IIUC this is about fixing 2 non-security bugs, that were introduced prior to
buster's initial release.

I personally don't think this fits the LTS project scope.
Maybe other LTS members will have a different opinion.

Cheers!
Sylvain Beucler
Debian LTS Team

On 13/09/2022 15:27, Santiago R.R. wrote:

El 10/09/22 a las 19:11, Adam D. Barratt escribió:

On Wed, 2020-05-27 at 11:56 +0200, Santiago R.R. wrote:

Since 1.0.6-9, bzip2 was built without the -D_FILE_OFFSET_BITS=64
CPPFLAG, and so it's not able to handle > 2GB files in 32-bit archs.
See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944557

I've uploaded a fixed version to unstable yesterday. It would be
great
to fix it also in buster. Please, consider the attached debdiff.
Would it be OK for you to upload it?



Apologies for apparently letting this sit unanswered. (FTR there was a
reply from a non-SRM member 18 months ago.)


And I am sorry I missed that answer.



The final point release for buster has now happened, so any further
updates to packages in buster will need to be handled via LTS. I'm
therefore going to close this request now.

[snip]

I am forwarding this to the LTS folks, so they can decide about this
change.






Bug#961654: buster-pu: package bzip2/1.0.6-9.2~deb10u1

2022-09-13 Thread Chris Frey
On the other hand, the fix has been known since 2019 and looks like a
prime problem for an LTS newbie volunteer like me.

I have created the fix based on the Debian/bzip2 repo, the fix is in
the debian/buster branch.

git clone http://digon.foursquare.net/debian-buster-bzip2/.git

I have tested it on a 32bit buster, and it works on +2g files.

I do not have privileges to push this to any server yet, so feel free to
tweak the changelog and claim it as your own, whoever wishes to upload it.

- Chris


On Tue, Sep 13, 2022 at 04:46:14PM +0200, Sylvain Beucler wrote:
> Hi,
> 
> IIUC this is about fixing 2 non-security bugs, that were introduced prior to
> buster's initial release.
> 
> I personally don't think this fits the LTS project scope.
> Maybe other LTS members will have a different opinion.
> 
> Cheers!
> Sylvain Beucler
> Debian LTS Team
> 
> On 13/09/2022 15:27, Santiago R.R. wrote:
> > El 10/09/22 a las 19:11, Adam D. Barratt escribió:
> > > On Wed, 2020-05-27 at 11:56 +0200, Santiago R.R. wrote:
> > > > Since 1.0.6-9, bzip2 was built without the -D_FILE_OFFSET_BITS=64
> > > > CPPFLAG, and so it's not able to handle > 2GB files in 32-bit archs.
> > > > See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944557
> > > > 
> > > > I've uploaded a fixed version to unstable yesterday. It would be
> > > > great
> > > > to fix it also in buster. Please, consider the attached debdiff.
> > > > Would it be OK for you to upload it?
> > > > 
> > > 
> > > Apologies for apparently letting this sit unanswered. (FTR there was a
> > > reply from a non-SRM member 18 months ago.)
> > 
> > And I am sorry I missed that answer.
> > 
> > > 
> > > The final point release for buster has now happened, so any further
> > > updates to packages in buster will need to be handled via LTS. I'm
> > > therefore going to close this request now.
> > [snip]
> > 
> > I am forwarding this to the LTS folks, so they can decide about this
> > change.



Bug#961654: buster-pu: package bzip2/1.0.6-9.2~deb10u1

2022-09-13 Thread Sylvain Beucler

Hi,

IIUC this is about fixing 2 non-security bugs, that were introduced 
prior to buster's initial release.


I personally don't think this fits the LTS project scope.
Maybe other LTS members will have a different opinion.

Cheers!
Sylvain Beucler
Debian LTS Team

On 13/09/2022 15:27, Santiago R.R. wrote:

El 10/09/22 a las 19:11, Adam D. Barratt escribió:

On Wed, 2020-05-27 at 11:56 +0200, Santiago R.R. wrote:

Since 1.0.6-9, bzip2 was built without the -D_FILE_OFFSET_BITS=64
CPPFLAG, and so it's not able to handle > 2GB files in 32-bit archs.
See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944557

I've uploaded a fixed version to unstable yesterday. It would be
great
to fix it also in buster. Please, consider the attached debdiff.
Would it be OK for you to upload it?



Apologies for apparently letting this sit unanswered. (FTR there was a
reply from a non-SRM member 18 months ago.)


And I am sorry I missed that answer.



The final point release for buster has now happened, so any further
updates to packages in buster will need to be handled via LTS. I'm
therefore going to close this request now.

[snip]

I am forwarding this to the LTS folks, so they can decide about this
change.




Bug#961654: buster-pu: package bzip2/1.0.6-9.2~deb10u1

2022-09-13 Thread Santiago R.R.
Hi,

El 10/09/22 a las 19:11, Adam D. Barratt escribió:
> On Wed, 2020-05-27 at 11:56 +0200, Santiago R.R. wrote:
> > Since 1.0.6-9, bzip2 was built without the -D_FILE_OFFSET_BITS=64
> > CPPFLAG, and so it's not able to handle > 2GB files in 32-bit archs.
> > See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944557
> > 
> > I've uploaded a fixed version to unstable yesterday. It would be
> > great
> > to fix it also in buster. Please, consider the attached debdiff.
> > Would it be OK for you to upload it?
> > 
> 
> Apologies for apparently letting this sit unanswered. (FTR there was a
> reply from a non-SRM member 18 months ago.)

And I am sorry I missed that answer.

> 
> The final point release for buster has now happened, so any further
> updates to packages in buster will need to be handled via LTS. I'm
> therefore going to close this request now.
[snip]

I am forwarding this to the LTS folks, so they can decide about this
change.

Cheers,

 -- S


signature.asc
Description: PGP signature


Bug#961654: buster-pu: package bzip2/1.0.6-9.2~deb10u1

2021-03-22 Thread Sebastian Andrzej Siewior
On 2020-07-21 16:53:23 [+0200], Santiago Ruano Rincón wrote:
> diff -Nru bzip2-1.0.6/debian/rules bzip2-1.0.6/debian/rules
> --- bzip2-1.0.6/debian/rules  2019-06-24 22:16:40.0 +0200
> +++ bzip2-1.0.6/debian/rules  2020-07-21 10:31:21.0 +0200
> @@ -14,6 +14,9 @@
>  DEB_BUILD_MAINT_OPTIONS := hardening=+all
>  DEB_CFLAGS_MAINT_APPEND := -Wall -Winline
>  DEB_CPPFLAGS_MAINT_APPEND := -D_REENTRANT
> +# This -D_FILE_OFFSET_BITS=64 is needed to make bzip2 able to handle > 
> 2GB-size
> +# files in 32-bit archs. See #944557
> +DEB_CPPFLAGS_MAINT_APPEND += -D_FILE_OFFSET_BITS=64

Isn't the preferred way to add "future=+lfs" to DEB_BUILD_MAINT_OPTIONS
?
>  include /usr/share/dpkg/buildflags.mk
>  
>  include /usr/share/dpkg/pkg-info.mk

Sebastian



Bug#961654: buster-pu: package bzip2/1.0.6-9.2~deb10u1

2020-07-21 Thread Santiago Ruano Rincón
On Wed, 27 May 2020 11:56:07 +0200 "Santiago R.R."  
wrote:
> Package: release.debian.org
> Severity: normal
> Tags: buster
> User: release.debian@packages.debian.org
> Usertags: pu
> 
> Dear Release Managers,
> 
> Since 1.0.6-9, bzip2 was built without the -D_FILE_OFFSET_BITS=64
> CPPFLAG, and so it's not able to handle > 2GB files in 32-bit archs.
> See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944557
> 
> I've uploaded a fixed version to unstable yesterday. It would be great
> to fix it also in buster. Please, consider the attached debdiff.
> Would it be OK for you to upload it?
> 
> I've confirmed the issue is solved in an armhf machine running buster.
…

Dear RM,

I would like to include another important bug fix in this upload.
Attached you can find a refreshed debdiff that also address #965309 in
buster:
https://bugs.debian.org/965309

Would it be OK to upload it?

Thanks,

 -- Santiago
diff -Nru bzip2-1.0.6/debian/changelog bzip2-1.0.6/debian/changelog
--- bzip2-1.0.6/debian/changelog2019-07-10 21:17:52.0 +0200
+++ bzip2-1.0.6/debian/changelog2020-07-21 10:36:47.0 +0200
@@ -1,3 +1,13 @@
+bzip2 (1.0.6-9.2~deb10u2) buster; urgency=medium
+
+  * Append -D_FILE_OFFSET_BITS=64 variable to buildflags, to renable handling
+big files in 32-bit archs (Closes: #944557)
+  * debian/patches/40-bzdiff-l.patch: Fix bzdiff does not work when comparing
+two bzip2 compressed files. Thanks to Joey Schulze .
+(Closes: #965309)
+
+ -- Santiago Ruano Rincón   Tue, 21 Jul 2020 10:36:47 
+0200
+
 bzip2 (1.0.6-9.2~deb10u1) buster; urgency=medium
 
   * Rebuild for buster
diff -Nru bzip2-1.0.6/debian/patches/40-bzdiff-l.patch 
bzip2-1.0.6/debian/patches/40-bzdiff-l.patch
--- bzip2-1.0.6/debian/patches/40-bzdiff-l.patch2019-06-24 
22:16:40.0 +0200
+++ bzip2-1.0.6/debian/patches/40-bzdiff-l.patch2020-07-21 
10:32:51.0 +0200
@@ -2,10 +2,14 @@
  This patch is far from sufficient. See the bug log for details.
 Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/735675
 Origin: ubuntu, https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/735675
+Reviewed-by: Santiago Ruano Rincón 
+Last-Update: 2020-07-20
 
 a/bzdiff
-+++ b/bzdiff
-@@ -24,7 +24,11 @@
+Index: bzip2/bzdiff
+===
+--- bzip2.orig/bzdiff
 bzip2/bzdiff
+@@ -24,7 +24,11 @@ FILES=
  for ARG
  do
  case "$ARG" in
@@ -18,12 +22,3 @@
   *)   if test -f "$ARG"; then
  FILES="$FILES $ARG"
  else
-@@ -54,7 +58,7 @@
- exit 1
-   }
- bzip2 -cdfq "$2" > "$tmp"
--bzip2 -cdfq "$1" | $comp $OPTIONS - "$tmp"
-+bzip2 -cdfq "$1" | $comp "$OPTIONS" - "$tmp"
- STAT="$?"
-   /bin/rm -f "$tmp";;
- 
diff -Nru bzip2-1.0.6/debian/rules bzip2-1.0.6/debian/rules
--- bzip2-1.0.6/debian/rules2019-06-24 22:16:40.0 +0200
+++ bzip2-1.0.6/debian/rules2020-07-21 10:31:21.0 +0200
@@ -14,6 +14,9 @@
 DEB_BUILD_MAINT_OPTIONS := hardening=+all
 DEB_CFLAGS_MAINT_APPEND := -Wall -Winline
 DEB_CPPFLAGS_MAINT_APPEND := -D_REENTRANT
+# This -D_FILE_OFFSET_BITS=64 is needed to make bzip2 able to handle > 2GB-size
+# files in 32-bit archs. See #944557
+DEB_CPPFLAGS_MAINT_APPEND += -D_FILE_OFFSET_BITS=64
 include /usr/share/dpkg/buildflags.mk
 
 include /usr/share/dpkg/pkg-info.mk


signature.asc
Description: PGP signature


Bug#961654: buster-pu: package bzip2/1.0.6-9.2~deb10u1

2020-05-27 Thread Santiago R.R.
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu

Dear Release Managers,

Since 1.0.6-9, bzip2 was built without the -D_FILE_OFFSET_BITS=64
CPPFLAG, and so it's not able to handle > 2GB files in 32-bit archs.
See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944557

I've uploaded a fixed version to unstable yesterday. It would be great
to fix it also in buster. Please, consider the attached debdiff.
Would it be OK for you to upload it?

I've confirmed the issue is solved in an armhf machine running buster.

Cheers,

 -- Santiago
diff -Nru bzip2-1.0.6/debian/changelog bzip2-1.0.6/debian/changelog
--- bzip2-1.0.6/debian/changelog2019-07-10 21:17:52.0 +0200
+++ bzip2-1.0.6/debian/changelog2020-05-27 10:18:11.0 +0200
@@ -1,3 +1,10 @@
+bzip2 (1.0.6-9.2~deb10u2) buster; urgency=medium
+
+  * Append -D_FILE_OFFSET_BITS=64 variable to buildflags, to renable handling
+big files in 32-bit archs (Closes: #944557)
+
+ -- Santiago Ruano Rincón   Wed, 27 May 2020 10:18:11 
+0200
+
 bzip2 (1.0.6-9.2~deb10u1) buster; urgency=medium
 
   * Rebuild for buster
diff -Nru bzip2-1.0.6/debian/rules bzip2-1.0.6/debian/rules
--- bzip2-1.0.6/debian/rules2019-06-24 22:16:40.0 +0200
+++ bzip2-1.0.6/debian/rules2020-05-27 09:58:14.0 +0200
@@ -14,6 +14,9 @@
 DEB_BUILD_MAINT_OPTIONS := hardening=+all
 DEB_CFLAGS_MAINT_APPEND := -Wall -Winline
 DEB_CPPFLAGS_MAINT_APPEND := -D_REENTRANT
+# This -D_FILE_OFFSET_BITS=64 is needed to make bzip2 able to handle > 2GB-size
+# files in 32-bit archs. See #944557
+DEB_CPPFLAGS_MAINT_APPEND += -D_FILE_OFFSET_BITS=64
 include /usr/share/dpkg/buildflags.mk
 
 include /usr/share/dpkg/pkg-info.mk


signature.asc
Description: PGP signature