Processed: transition: poppler

2018-04-13 Thread Debian Bug Tracking System
Processing control commands:

> block -1 with 894371
Bug #895633 [release.debian.org] transition: poppler
895633 was not blocked by any bugs.
895633 was not blocking any bugs.
Added blocking bug(s) of 895633: 894371

-- 
895633: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895633
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#895633: transition: poppler

2018-04-13 Thread Emilio Pozuelo Monfort
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition
Control: block -1 with 894371

Time for another poppler transition. It's in experimental, and all
the rdepends build fine, except for

gdcm, due to an unrelated bug #894371.

Cheers,
Emilio



Bug#895621: RM: enki-aseba/oldstable [armel armhf] -- RoQA; FTBFS for armel/armhf

2018-04-13 Thread Georges Khaznadar
Package: ftp.debian.org
Severity: normal

As Adrian Bunk reported in Bug#895499, the package enki-aseba cannot be built
for armel/armhf since those architectures use Qt5 libraries compiled with
OpenGL ES instead of OpenGL.

I uploaded a revision 1.6.0-6 which addresses this issue, but please can you
remove previous builds made for armel and armhf?

Thank you.



Processed: Re: Bug#895193: transition: openmpi

2018-04-13 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 confirmed
Bug #895193 [release.debian.org] transition: openmpi
Added tag(s) confirmed.

-- 
895193: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895193
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#895193: transition: openmpi

2018-04-13 Thread Emilio Pozuelo Monfort
Control: tags -1 confirmed

On 11/04/18 11:12, Alastair McKinstry wrote:
> 
> 
> On 11/04/2018 10:07, John Paul Adrian Glaubitz wrote:
>> On 04/11/2018 10:53 AM, Alastair McKinstry wrote:
>>> As of 3.0.1, openmpi now works on Big-Endian powerpc (which was to be a
>>> problem; it had been dropped upstream because of an unknown bug, now
>>> fixed).
>>
>> Oh, really, they fixed that? I already had given up hopes and
>> therefore ignored
>> the thread on github out of frustration.
>>
>>From the thread (and related PRs it references) its fixed and works as
> long as -O3 is used.
> I've implemented and tested this in ./rules.
> 
>>> The other non-release archs were failing due to missing dependencies: in
>>> particular java support (not used by any package in stable/testing) and
>>> pmix (new; not used in testing/stable; pmix enables scaling to ~100,000+
>>> nodes, which is unlikely to be needed).
>>
>> I am working on fixing the remaining OpenJDK issues. I'm an upstream
>> committer in the OpenJDK project, so I can commit all changes myself.
>>
> Ok. I've just disabled support as necessary for archs with openjdk issues.
> While a riscv64 build has not yet occurred (awaiting in queue to see),
> all issues on all other archs should now be resolved,
> making the transition possible.

Great. Please go ahead.

Cheers,
Emilio



Bug#895596: stretch-pu: package xrdp/0.9.1-9+deb9u2

2018-04-13 Thread Dominik George
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

The last upload to stretch, fixing a minor security issue, had an incomplete
patch provided by upstream which can lead to memory corruption and crashes
in some cases.

The update was first negotiated with the security team, who proposed to
update via stretch-pu AND stretch-updates.

Find attached the debdiff.

N.B.: This is not an NMU - I am now using my debian.org mail address, but
did not want to change Uploaders: in a stable update (or should I?).

-BEGIN PGP SIGNATURE-

iQKJBAEBCABzFiEEPJ1UpHV1wCb7F/0mt5o8FqDE8pYFAlrQbtsxGmh0dHBzOi8v
d3d3LmRvbWluaWstZ2VvcmdlLmRlL2dwZy1wb2xpY3kudHh0LmFzYyMcZG9taW5p
ay5nZW9yZ2VAaXQucGlyYXRlbnBhcnRlaS5kZQAKCRC3mjwWoMTyljN1D/9DMKk+
5+A2QnYFxVCeqKKhBt/Yc+dXb7CsyDW80nUZWnlyP0XHi4OChJg8+MyjKVMIMTmp
Vr5LBJbFDlDaQ/hqNY0KKqc4Md4PcEXF+krcN4nL0bEAdAFT7BdDJA+rFeoCGz8z
Vi2Ev0JkdWJndHuNMrGFZb0ESOxy+4vF1P7j7zrTvFfeXj/PowbIUzBGPBEQ8o6y
ELbMjXk0ma5gri9mvyv0xaRV7oDUhHA/czq1A+aM2anJmABaZJzLxWd/9YKcvzxV
Gyhv3dQtESd+fQOzbtqW1okhxPIOnaDcldRDjdvNNLsE7PMjcxq0PresNZkeBMKM
Yys7AInm3L8Pv2dHImAl7GSHyO6FpvFWy8DT9IdSgpz196X/Vx/I6do0lPPbqpWT
Q52vCQ21lR7F6FXYYwoDVzpGrM1OB6bOeJxmM6AnTfzwAKsF5g0+AGZuiW0i3AQj
guxhf5CnoVvUfxY7yixjOZUosvipdU/Fktcbs3rpE2tbHKV84pFcq+EJBjjzKMVc
p/rQW2UP53pZGvO45t5S0cwlnqRtxcXH15yyOfMGdx9jdAWcnVHB8h69TIi0jVWB
1s74hN1IpYbCLu63f/ei1NtOKEkJ8vvTl92omHp548G09oIJNenGTI8WQ1mBXzwg
ZqmqS081W7/dtRv+PiZkF+Gh8+QpQHk627f42w==
=H6gU
-END PGP SIGNATURE-
diff -Nru xrdp-0.9.1/debian/changelog xrdp-0.9.1/debian/changelog
--- xrdp-0.9.1/debian/changelog 2017-12-15 19:28:28.0 +0100
+++ xrdp-0.9.1/debian/changelog 2018-04-12 23:43:25.0 +0200
@@ -1,3 +1,10 @@
+xrdp (0.9.1-9+deb9u3) stretch; urgency=high
+
+  * Fix patch for CVE-2017-16927. (Closes: #884702)
++ Off-by-one mistake could crash xrdp in some cases.
+
+ -- Dominik George   Thu, 12 Apr 2018 23:43:25 +0200
+
 xrdp (0.9.1-9+deb9u2) stretch; urgency=medium
 
   * Fix CVE-2017-16927. (Closes: #882463)
diff -Nru xrdp-0.9.1/debian/patches/cve-2017-16927.patch 
xrdp-0.9.1/debian/patches/cve-2017-16927.patch
--- xrdp-0.9.1/debian/patches/cve-2017-16927.patch  2017-12-15 
19:28:28.0 +0100
+++ xrdp-0.9.1/debian/patches/cve-2017-16927.patch  2018-04-12 
23:43:25.0 +0200
@@ -18,7 +18,7 @@
  /* reading username */
  in_uint16_be(c->in_s, sz);
 -buf[sz] = '\0';
-+buf = g_new0(char, sz);
++buf = g_new0(char, sz + 1);
  in_uint8a(c->in_s, buf, sz);
 -
 +buf[sz] = '\0';
@@ -34,7 +34,7 @@
  /* reading password */
  in_uint16_be(c->in_s, sz);
 -buf[sz] = '\0';
-+buf = g_new0(char, sz);
++buf = g_new0(char, sz + 1);
  in_uint8a(c->in_s, buf, sz);
 -
 +buf[sz] = '\0';
@@ -53,7 +53,7 @@
  
  if (sz > 0)
  {
-+buf = g_new0(char, sz);
++buf = g_new0(char, sz + 1);
  in_uint8a(c->in_s, buf, sz);
  buf[sz] = '\0';
  scp_session_set_domain(session, buf);
@@ -65,7 +65,7 @@
  
  if (sz > 0)
  {
-+buf = g_new0(char, sz);
++buf = g_new0(char, sz + 1);
  in_uint8a(c->in_s, buf, sz);
  buf[sz] = '\0';
  scp_session_set_program(session, buf);
@@ -77,7 +77,7 @@
  
  if (sz > 0)
  {
-+buf = g_new0(char, sz);
++buf = g_new0(char, sz + 1);
  in_uint8a(c->in_s, buf, sz);
  buf[sz] = '\0';
  scp_session_set_directory(session, buf);
@@ -89,7 +89,7 @@
  
  if (sz > 0)
  {
-+buf = g_new0(char, sz);
++buf = g_new0(char, sz + 1);
  in_uint8a(c->in_s, buf, sz);
  buf[sz] = '\0';
  scp_session_set_client_ip(session, buf);
@@ -102,7 +102,7 @@
  /* reading username */
  in_uint16_be(c->in_s, sz);
 -buf[sz] = '\0';
-+buf = g_new0(char, sz);
++buf = g_new0(char, sz + 1);
  in_uint8a(c->in_s, buf, sz);
 +buf[sz] = '\0';
  
@@ -119,7 +119,7 @@
  /* reading password */
  in_uint16_be(c->in_s, sz);
 -buf[sz] = '\0';
-+buf = g_new0(char, sz);
++buf = g_new0(char, sz + 1);
  in_uint8a(c->in_s, buf, sz);
 +buf[sz] = '\0';