so.*
> -usr/lib/*/libvtkDICOMPython*.so usr/lib/python${PYVER}/dist-packages
> usr/lib/*/vtkDICOMPython*.so usr/lib/python${PYVER}/dist-packages
>
> diff -Nru vtk-dicom-0.8.12/debian/tests/autopkgtest-pkg-python.conf
> vtk-dicom-0.8.12/debian/tests/autopkgtest-pkg-python.c
Control: tags -1 moreinfo
On 2021-05-08 22:17:42 +0200, Sebastiaan Couwenberg wrote:
> Control: tags -1 - moreinfo
>
> On 5/8/21 9:18 PM, Sebastian Ramacher wrote:
> > On 2021-05-08 07:29:01 +0200, Bas Couwenberg wrote:
> >> Package: release.debian.org
> &g
ot much I can do about it.
> --
> Vasyl Gello
> ==
> Certified SolidWorks Expert
>
> Mob.:+380 (98) 465 66 77
>
> E-Mail: vasek.ge...@gmail.com
>
> Skype: vasek.gello
> ====
Base" 2.27.90
- (c++)"WebKit::PluginProcessMain(int, char**)@Base" 2.27.90
(c++)"WebKit::WebProcessMain(int, char**)@Base" 2.27.90
(c++)"WebKit::WebKitExtensionManager::initialize(WebKit::InjectedBundle*,
API::Object*)@Base" 2.17.5
(c++)"WebKit::WebKitExtens
Control: tags -1 confirmed moreinfo
On 2021-05-27 09:03:49 +0200, Didier 'OdyX' Raboud wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> X-Debbugs-Cc: c...@packages.debian.org
>
> Please approve the following update for sr
Control: tags -1 moreinfo confirmed
On 2021-05-26 17:24:24 +0200, Étienne Mollier wrote:
> Control: tags -1 - moreinfo
>
> Hi Sebastian,
>
> Sebastian Ramacher, on 2021-05-25:
> > Something seems to be wrong with the autopkgtests. They are not run.
> > Could you plea
the new version is available in unstable.
Cheers
>
> The 3.4.5~pre1-5 debdiff is at
> https://people.debian.org/~noahm/spamassassin_3.4.5~pre1-5.debdiff
>
> I haven't uploaded either to unstable yet.
>
> Thanks
> noah
>
--
Sebastian Ramacher
signature.asc
Description: PGP signature
ge...@gmail.com
>
> Skype: vasek.gello
> ======
> 호랑이는 죽어서 가죽을 남기고 사람은 죽어서 이름을 남긴다
--
Sebastian Ramacher
signature.asc
Description: PGP signature
ash.patch
0100-ansi-c.patch
0001-hurd.patch
#0005-build.patch
Cheers
>
> CU
> Jörg
>
>
> Am Mittwoch, dem 19.05.2021 um 20:28 +0200 schrieb Sebastian Ramacher:
> > Control: tags -1 moreinfo confirmed
> >
> > On 2021-05-17 19:04:20 +0200, Jörg Frings-Fürst wrote
rote:
> > Hi Thomas,
> >
> > Ping.
> >
> > Paul
> > Note: without reply, we'll close the bug without action
> >
> > On 20-04-2021 11:03, Sebastian Ramacher wrote:
> >> Control: tags -1 moreinfo
> >>
> >> On 2021-0
Control: tags -1 moreinfo
Hi Vasyl
On 2021-05-30 09:25:27 +, Vasyl Gello wrote:
> Package: release.debian.org
> Followup-For: Bug #988611
> X-Debbugs-Cc: sramac...@respighi.debian.org, sramac...@debian.org,
> mat...@debian.org
>
> Control: retitle -1 unblock: kodi/2:19.0+dfsg1-2
>
> Hi Seb
On 2021-05-31 05:38:15 +0200, Sebastiaan Couwenberg wrote:
> On 5/30/21 9:12 PM, Salvatore Bonaccorso wrote:
> > Sebastiaan, Sebastian,
> >
> > On Tue, May 25, 2021 at 09:57:28AM +0200, Sebastiaan Couwenberg wrote:
> >> Control: tags -1 - moreinfo
> >>
>
On 2021-05-31 08:17:25 +0200, Sebastiaan Couwenberg wrote:
> On 5/31/21 8:07 AM, Sebastian Ramacher wrote:
> > On 2021-05-31 05:38:15 +0200, Sebastiaan Couwenberg wrote:
> >> On 5/30/21 9:12 PM, Salvatore Bonaccorso wrote:
> >>> Sebastiaan, Sebastian,
> >>>
: Image processing toolkit for registration and segmentation -
> runtime
> ITK is an open-source software toolkit for performing registration and
> segmentation. Segmentation is the process of identifying and
--
Sebastian Ramacher
d or unsigned integers (samples).
> Libaec implements Golomb Rice coding as defined in the Space Data
> System Standard documents 121.0-B-2 [1] and 120.0-G-2[2].
> .
> @@ -63,7 +64,7 @@
> Section: utils
> Architecture: any
> Depends: ${misc:Depends}, ${shlibs:Depends}
> -Description: Adaptive Entropy Coding library (utilies)
> +Description: Adaptive Entropy Coding library (utilities)
> Libaec provides fast lossless compression of 1 up to 32 bit wide
> signed or unsigned integers (samples).
> .
--
Sebastian Ramacher
%r6,%r15,0(%r1)
> + br %r14# return to restored address
> +
> diff -Nru klibc-2.0.8/debian/patches/series klibc-2.0.8/debian/patches/series
> --- klibc-2.0.8/debian/patches/series 2021-04-30 02:38:31.0 +0200
> +++ klibc-2.0.8/debian/patches/se
> + }
> +
> diff -Nru ircii-20190117/debian/patches/series
> ircii-20210314+really20190117/debian/patches/series
> --- ircii-20190117/debian/patches/series 2019-02-20 03:07:03.0
> +0100
> +++ ircii-20210314+really20190117/debian/patches/series 2021-05-30
> 22:39:28.0 +0200
> @@ -3,3 +3,4 @@
> 0003-Add-ioption-to-local-include-paths-so-they-do-not-co.patch
> 0004-absolute-path-for-motd-and-servers-file-and-other-de.patch
> 0006-fix-some-spelling-errors.patch
> +0009-Fix-CVE-2021-29376.patch
--
Sebastian Ramacher
signature.asc
Description: PGP signature
sting
unblock libass/1:0.15.0-2
Cheers
--
Sebastian Ramacher
diff -Nru libass-0.15.0/debian/changelog libass-0.15.0/debian/changelog
--- libass-0.15.0/debian/changelog 2020-10-27 17:15:34.0 +0100
+++ libass-0.15.0/debian/changelog 2021-05-03 20:25:05.0 +0200
@@ -1,3
case DMARC_POLICY_SPF_OUTCOME_PASS:
> diff -Nru opendmarc-1.4.0~beta1+dfsg/debian/patches/cve-2020-12272.patch
> opendmarc-1.4.0~beta1+dfsg/debian/patches/cve-2020-12272.patch
> --- opendmarc-1.4.0~beta1+dfsg/debian/patches/cve-2020-12272.patch
> 1970-01-01 01:00:00.0 +0100
> +++ opendmarc-1.4.0~beta1+dfsg/debian/patches/cve-2020-12272.patch
> 2021-05-29 16:22:50.0 +0200
> @@ -0,0 +1,67 @@
> +Description: CVE-2020-12272: Check syntax of DKIM and SPF domain names
> +Author: Murray S. Kucherawy
> +Origin: backport,
> https://github.com/trusteddomainproject/OpenDMARC/releases/tag/rel-opendmarc-1-4-1-1
> +
> +--- a/libopendmarc/opendmarc_policy.c
> b/libopendmarc/opendmarc_policy.c
> +@@ -4,6 +4,8 @@
> + ** Copyright (c) 2012-2016, 2018, The Trusted Domain Project. All rights
> reserved.
> + **/
> +
> ++#include
> ++
> + #include "opendmarc_internal.h"
> + #include "dmarc.h"
> +
> +@@ -22,6 +24,33 @@
> + # include
> + #endif /* USE_DMARCSTRL_H */
> +
> ++/*
> ++** CHECK_DOMAIN -- check for syntactical validity of a domain name
> ++**
> ++** Parameters:
> ++** domain -- domain name to check
> ++**
> ++** Return value:
> ++** TRUE if the syntax was fine, FALSE otherwise.
> ++*/
> ++
> ++bool check_domain(u_char *domain)
> ++{
> ++u_char *dp;
> ++
> ++for (dp = domain; *dp != '\0'; dp++)
> ++{
> ++if (!(isalpha(*dp) ||
> ++ isdigit(*dp) ||
> ++ *dp == '.' ||
> ++ *dp == '-' ||
> ++ *dp == '_'))
> ++return FALSE;
> ++}
> ++
> ++return TRUE;
> ++}
> ++
> + /**
> + ** OPENDMARC_POLICY_LIBRARY_INIT -- Initialize The Library
> + ** Parameters:
> +@@ -388,6 +417,8 @@
> + dp = opendmarc_util_finddomain(domain, domain_buf, sizeof domain_buf);
> + if (dp == NULL)
> + return DMARC_PARSE_ERROR_NO_DOMAIN;
> ++if (!check_domain(dp))
> ++return DMARC_PARSE_ERROR_BAD_VALUE;
> + if (human_readable != NULL)
> + pctx->spf_human_outcome = strdup((char *)human_readable);
> + pctx->spf_domain = strdup((char *)dp);
> +@@ -454,6 +485,8 @@
> + return DMARC_PARSE_ERROR_NULL_CTX;
> + if (d_equal_domain == NULL || strlen((char *)d_equal_domain) == 0)
> + return DMARC_PARSE_ERROR_EMPTY;
> ++if (!check_domain(d_equal_domain))
> ++return DMARC_PARSE_ERROR_BAD_VALUE;
> +
> + switch (dkim_result)
> + {
> diff -Nru opendmarc-1.4.0~beta1+dfsg/debian/patches/series
> opendmarc-1.4.0~beta1+dfsg/debian/patches/series
> --- opendmarc-1.4.0~beta1+dfsg/debian/patches/series 2020-09-19
> 08:34:33.0 +0200
> +++ opendmarc-1.4.0~beta1+dfsg/debian/patches/series 2021-05-29
> 15:51:16.0 +0200
> @@ -9,3 +9,6 @@
> ticket227.patch
> pull48.patch
> cve-2020-12460.patch
> +cve-2019-16378.patch
> +cve-2020-12272.patch
> +cve-2019-20790.patch
--
Sebastian Ramacher
'groovy-proposed'), (100, 'groovy-backports')
> Architecture: amd64 (x86_64)
> Foreign Architectures: i386
>
> Kernel: Linux 5.12.1-hyper1 (SMP w/8 CPU threads)
> Kernel taint flags: TAINT_CPU_OUT_OF_SPEC, TAINT_OOT_MODULE,
> TAINT_UNSIGNED_MODULE
> Locale: LANG=en_SG.utf8, LC_CTYPE=en_SG.UTF-8 (charmap=UTF-8),
> LANGUAGE=en_SG:en
> Shell: /bin/sh linked to /bin/dash
> Init: systemd (via /run/systemd/system)
> LSM: AppArmor: enabled
--
Sebastian Ramacher
t; 24 July [Steve (CD), press]
> 31 July
> 7 August
> 14 August
I can be around on
3 July
24 July
31 July
7 August
14 august
Cheers
--
Sebastian Ramacher
signature.asc
Description: PGP signature
0
> @@ -1,3 +0,0 @@
> -# Not worth the effort
> -testsuite-autopkgtest-missing
> -
> diff -Nru saga-7.3.0+dfsg/debian/watch saga-7.3.0+dfsg/debian/watch
> --- saga-7.3.0+dfsg/debian/watch 2019-07-12 21:58:13.00000 +0200
> +++ saga-7.3.0+dfsg/debian/watch 2020-11-06 19:58:28.0 +0100
> @@ -1,4 +1,4 @@
> -version=3
> +version=4
> opts=\
> dversionmangle=s/\+(debian|dfsg|ds|deb)\d*$//,\
>
> uversionmangle=s/(\d)[_\.\-\+]?((RC|rc|pre|dev|beta|alpha)\d*)$/$1~$2/;s/RC/rc/,\
--
Sebastian Ramacher
signature.asc
Description: PGP signature
gt; Vasyl Gello
> ==
> Certified SolidWorks Expert
>
> Mob.:+380 (98) 465 66 77
>
> E-Mail: vasek.ge...@gmail.com
>
> Skype: vasek.gello
> ==
> 호랑이는 죽어서 가죽을 남기고 사람은 죽어서 이름
++ k = gen_k( pkey->p );
> + mpi_powm (a, pkey->g, k, pkey->p);
> +
> + /* b = (y^k * input) mod p
> +@@ -594,7 +582,7 @@ sign(gcry_mpi_t a, gcry_mpi_t b, gcry_mpi_t input,
> ELG_secret_key *skey )
> + *
> + */
> + mpi_sub_ui(p_1, p_1, 1);
> +-k = gen_k( skey->p, 0 /* no small K ! */ );
> ++k = gen_k( skey->p );
> + mpi_powm( a, skey->g, k, skey->p );
> + mpi_mul(t, skey->x, a );
> + mpi_subm(t, input, t, p_1 );
> +--
> +2.30.2
> +
> diff -Nru libgcrypt20-1.8.7/debian/patches/series
> libgcrypt20-1.8.7/debian/patches/series
> --- libgcrypt20-1.8.7/debian/patches/series 2021-02-14 13:46:10.0
> +0100
> +++ libgcrypt20-1.8.7/debian/patches/series 2021-05-27 14:19:10.0
> +0200
> @@ -8,3 +8,7 @@
> 30_04-Fix-ubsan-warnings-for-i386-build.patch
> 30_05-Add-handling-for-Og-with-O-flag-munging.patch
> 30_06-Make-sure-the-grcy_get_config-string-is-always-null-.patch
> +30_07-Fix-previous-commit.patch
> +30_08-ecc-Check-the-input-length-for-the-point.patch
> +30_09-ecc-Fix-the-previous-commit.patch
> +30_10-cipher-Fix-ElGamal-encryption-for-other-implementati.patch
--
Sebastian Ramacher
signature.asc
Description: PGP signature
MULTIARCH)
> +
> +
> build: build-arch build-indep
> build-arch: build-stamp
> build-indep: build-stamp
>
> build-stamp:
> dh_testdir
> - $(MAKE)
> + dh_auto_build
> touch build-stamp
>
> clean:
> @@ -28,9 +31,9 @@
> dh_testdir
> dh_testroot
> dh_installdirs
> -
> + mkdir -p $(CURDIR)/debian/libpam-chroot/lib/$(DEB_HOST_MULTIARCH)
> # Add here commands to install the package into debian/libpam-chroot
> - $(MAKE) install DESTDIR=$(CURDIR)/debian/libpam-chroot
> + $(MAKE) install DESTDIR=$(CURDIR)/debian/libpam-chroot
> LIBDIR=$(CURDIR)/debian/libpam-chroot/lib/$(DEB_HOST_MULTIARCH)
> INSTALL="install --strip-program=true"
>
>
> # Build architecture-independent files here.
--
Sebastian Ramacher
signature.asc
Description: PGP signature
> +
> + for (i = 0; i < (int)web_files; i ++)
> ++ {
> + if (strcmp(s, web_cache[i].name) == 0)
> + {
> + DEBUG_printf(("file_find: Returning cache file \"%s\"!\n", s));
> + return (s);
> + }
> ++ }
> +
> + DEBUG_printf(("file_find: \"%s\" not in web cache of %d files...\n", s,
> (int)web_files));
> +
> +@@ -637,11 +639,14 @@ file_find(const char *path,/* I - Path
> "dir;dir;dir" */
> + */
> +
> + if (strchr(s, '%') == NULL)
> ++ {
> + strlcpy(basename, s, sizeof(basename));
> ++ }
> + else
> + {
> + for (sptr = s, temp = basename;
> + *sptr && temp < (basename + sizeof(basename) - 1);)
> ++{
> + if (*sptr == '%' && isxdigit(sptr[1]) && isxdigit(sptr[2]))
> + {
> +/*
> +@@ -664,6 +669,7 @@ file_find(const char *path, /* I - Path
> "dir;dir;dir" */
> + }
> + else
> + *temp++ = *sptr++;
> ++}
> +
> + *temp = '\0';
> + }
> +@@ -918,7 +924,9 @@ file_localize(const char *filename, /* I - Filename
> */
> + const char */* O - Method string ("http", "ftp",
> etc.) */
> + file_method(const char *s) /* I - Filename or URL */
> + {
> +- if (strncmp(s, "http:", 5) == 0)
> ++ if (strncmp(s, "data:", 5) == 0)
> ++return ("data");
> ++ else if (strncmp(s, "http:", 5) == 0)
> + return ("http");
> + else if (strncmp(s, "https:", 6) == 0)
> + return ("https");
> diff -Nru htmldoc-1.9.11/debian/patches/series
> htmldoc-1.9.11/debian/patches/series
> --- htmldoc-1.9.11/debian/patches/series 2021-05-10 16:10:41.0
> +0200
> +++ htmldoc-1.9.11/debian/patches/series 2021-06-03 21:29:16.0
> +0200
> @@ -6,3 +6,9 @@
> disable_libz.patch
> remove-os-check.patch
> Fix-crash-bug-with-bad-GIFs-Issue-423.patch
> +CVE-2021-23158-CVE-2021-23191-CVE-2021-26252.patch
> +CVE-2021-23165.patch
> +CVE-2021-23180.patch
> +CVE-2021-23206.patch
> +CVE-2021-26259.patch
> +CVE-2021-26948.patch
--
Sebastian Ramacher
signature.asc
Description: PGP signature
/control: Make libobs-dev depend on libsimde-dev (Closes: #980171)
+
+ -- Sebastian Ramacher Tue, 01 Jun 2021 22:05:24 +0200
+
obs-studio (26.1.2+dfsg1-1) unstable; urgency=medium
[ gregor herrmann ]
diff -Nru obs-studio-26.1.2+dfsg1/debian/control
obs-studio-26.1.2+dfsg1/debian/control
-x "*/xbmc/cores/VideoPlayer/VideoRenderers/windows/*" \
> > -x "*/xbmc/windowing/win10/*" \
> > -x "*/xbmc/windowing/windows/*" \
> > 1>kodi_19.0+dfsg1-2_19.1+dfsg2-1.filtered.diff
>
>
> Also, two other m
egressions.
[ Checklist ]
[x] all changes are documented in the d/changelog
[x] I reviewed all changes and I approve them
[x] attach debdiff against the package in testing
[ Other info ]
ffmpeg is a key package and requires an unblock.
unblock ffmpeg/7:4.3.2-0+deb11u2
Cheers
--
Sebastian Ramacher
om/ondratu/formiko
> diff -Nru formiko-1.3.0/debian/watch formiko-1.3.0/debian/watch
> --- formiko-1.3.0/debian/watch 2018-01-16 08:48:07.0 +0100
> +++ formiko-1.3.0/debian/watch2021-05-25 12:43:39.0 +0200
> @@ -1,5 +1,5 @@
> # Compulsory line, this is a version 4 file
> version=4
>
> -opts=uversionmangle=s/(rc|a|b|c)/~$1/,pgpsigurlmangle=s/$/.asc/ \
> +opts=uversionmangle=s/(rc|a|b|c)/~$1/ \
>
> https://pypi.debian.net/formiko/formiko-(.+)\.(?:zip|tgz|tbz|txz|(?:tar\.(?:gz|bz2|xz)))
--
Sebastian Ramacher
t;
> [ Checklist ]
> [x] all changes are documented in the d/changelog
> [x] I reviewed all changes and I approve them
> [x] attach debdiff against the package in testing
>
> > File lists identical (after any substitutions)
> >
> > Control files: lines which differ (wdiff format)
> >
> > Version: [-1.7-1-] {+1.7.1-1+}
>
--
Sebastian Ramacher
; +
> + /* Test input that is considerably larger than n */
> + mpz_mul_2exp (bad_input, pub.n, 100);
> + mpz_add (bad_input, bad_input, gibberish);
> + decrypted_length = msg_length;
> + ASSERT(!rsa_decrypt(&key, &decrypted_length, decrypted, bad_input));
> + ASSERT(!
ROOT=$$(pwd)/builddir/usr SOF_VERSION="v$(DEB_VERSION_UPSTREAM)" ./go.sh
> + mkdir -p $(SOF_INSTALL_DIR)
> + cp -a sof-v$(DEB_VERSION_UPSTREAM) $(SOF_INSTALL_DIR)/sof
> + cp -a sof-tplg-v$(DEB_VERSION_UPSTREAM) $(SOF_INSTALL_DIR)
> + ln -s sof-tplg-v$(DEB_VERSION_UPSTREAM) $(SOF_INSTALL_DIR)/sof-tplg
> dh_auto_install
--
Sebastian Ramacher
signature.asc
Description: PGP signature
freeze policy,
> that's highly unlikely as the RMs seem unwilling to make exceptions.
Is 3.2.2 a bugfix only release? Are there any changes in 3.2.2 that go
beyond targetted fixes? Is there a policy that gdal upstream follows for
picking patches for a bug fix release?
Cheers
>
> Kind Regards,
>
> Bas
>
> --
> GPG Key ID: 4096R/6750F10AE88D4AF1
> Fingerprint: 8182 DE41 7056 408D 6146 50D1 6750 F10A E88D 4AF1
>
--
Sebastian Ramacher
signature.asc
Description: PGP signature
gt; lrwxrwxrwx root/root /lib/firmware/intel/sof/community/sof-ehl.ri ->
> ../v1.6.1/public-signed/sof-tgl-v1.6.1.ri
> lrwxrwxrwx root/root /lib/firmware/intel/sof/community/sof-glk.ri ->
> ../v1.6.1/public-signed/sof-apl-v1.6.1.ri
> lrwxrwxrwx root/root /lib/firmware/intel/sof/community/sof-icl.ri ->
> ../v1.6.1/public-signed/sof-icl-v1.6.1.ri
> lrwxrwxrwx root/root /lib/firmware/intel/sof/community/sof-jsl.ri ->
> ../v1.6.1/public-signed/sof-jsl-v1.6.1.ri
> lrwxrwxrwx root/root /lib/firmware/intel/sof/community/sof-tgl.ri ->
> ../v1.6.1/public-signed/sof-tgl-v1.6.1.ri
> lrwxrwxrwx root/root /lib/firmware/intel/sof/sof-apl.ri ->
> v1.6.1/intel-signed/sof-apl-v1.6.1.ri
> lrwxrwxrwx root/root /lib/firmware/intel/sof/sof-bdw.ri ->
> v1.6.1/sof-bdw-v1.6.1.ri
> lrwxrwxrwx root/root /lib/firmware/intel/sof/sof-byt.ri ->
> v1.6.1/sof-byt-v1.6.1.ri
> lrwxrwxrwx root/root /lib/firmware/intel/sof/sof-cfl.ri ->
> v1.6.1/intel-signed/sof-cnl-v1.6.1.ri
> lrwxrwxrwx root/root /lib/firmware/intel/sof/sof-cht.ri ->
> v1.6.1/sof-cht-v1.6.1.ri
> lrwxrwxrwx root/root /lib/firmware/intel/sof/sof-cml.ri ->
> v1.6.1/intel-signed/sof-cnl-v1.6.1.ri
> lrwxrwxrwx root/root /lib/firmware/intel/sof/sof-cnl.ri ->
> v1.6.1/intel-signed/sof-cnl-v1.6.1.ri
> lrwxrwxrwx root/root /lib/firmware/intel/sof/sof-ehl.ri ->
> v1.6.1/intel-signed/sof-ehl-v1.6.1.ri
> lrwxrwxrwx root/root /lib/firmware/intel/sof/sof-glk.ri ->
> v1.6.1/intel-signed/sof-apl-v1.6.1.ri
> lrwxrwxrwx root/root /lib/firmware/intel/sof/sof-icl.ri ->
> v1.6.1/intel-signed/sof-icl-v1.6.1.ri
> lrwxrwxrwx root/root /lib/firmware/intel/sof/sof-jsl.ri ->
> v1.6.1/intel-signed/sof-jsl-v1.6.1.ri
> lrwxrwxrwx root/root /lib/firmware/intel/sof/sof-tgl.ri ->
> v1.6.1/intel-signed/sof-tgl-v1.6.1.ri
>
> Control files: lines which differ (wdiff format)
>
> Installed-Size: [-7871-] {+9817+}
> Version: [-1.6.1-2-] {+1.7-1+}
>
> --
> Make sure special cases are truly special.
> - The Elements of Programming Style (Kernighan & Plauger)
--
Sebastian Ramacher
signature.asc
Description: PGP signature
soname"
Please get libogre fixed first. Marking as blocked by #989344.
Cheers
--
Sebastian Ramacher
signature.asc
Description: PGP signature
On 2021-06-11 21:21:09 +0200, Sebastiaan Couwenberg wrote:
> On 6/11/21 8:49 PM, Sebastian Ramacher wrote:
> > On 2021-06-09 12:41:29 +0200, Sebastiaan Couwenberg wrote:
> >> On 6/9/21 12:11 PM, Andreas Beckmann wrote:
> >>> On 08/06/2021 11.56, Andreas Beckmann wrot
On 2021-06-13 10:58:19 +0200, Andreas Beckmann wrote:
> On 13/06/2021 06.45, Sebastiaan Couwenberg wrote:
> > On 6/12/21 10:23 PM, Sebastian Ramacher wrote:
> > > I have unblocked gdal.
> >
> > Thanks, libgdal (3.2.2-1) will need to be unblocked as well, it goes
&g
On 2021-06-13 11:14:45 +0200, Sebastiaan Couwenberg wrote:
> On 6/13/21 10:58 AM, Andreas Beckmann wrote:
> > On 13/06/2021 06.45, Sebastiaan Couwenberg wrote:
> >> On 6/12/21 10:23 PM, Sebastian Ramacher wrote:
> >>> I have unblocked gdal.
> >>
> &g
On 2021-06-13 11:30:47 +0200, Sebastiaan Couwenberg wrote:
> On 6/13/21 11:12 AM, Sebastian Ramacher wrote:
> > On 2021-06-13 10:58:19 +0200, Andreas Beckmann wrote:
> >> On 13/06/2021 06.45, Sebastiaan Couwenberg wrote:
> >>> On 6/12/21 10:23 PM, Sebastian Ramacher
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: rm
X-Debbugs-Cc: sramac...@debian.org
(explain the reason for the removal here)
--
Sebastian Ramacher
signature.asc
Description: PGP signature
PI but until today this didn't happen. So it makes no
> sense to ship a version of sogo-connector that is not working with
> thunderbird.
>
> I requested the removal from unstable by filing #989788.
I'm cloning the bug to track its status for buster separately.
Cheers
&g
ebian/watch ogdi-dfsg-4.1.0+ds/debian/watch
> --- ogdi-dfsg-4.1.0+ds/debian/watch 2020-11-12 06:04:54.0 +0100
> +++ ogdi-dfsg-4.1.0+ds/debian/watch 2021-03-20 08:51:20.0 +0100
> @@ -5,4 +5,4 @@
>
> filenamemangle=s/(?:.*?)?(?:rel|v|ogdi)?[\-\_]?(\d\S+)\.(tgz|tbz|txz|(?:tar\.(?:gz|bz2|xz)))/ogdi-$1.$2/;s/_/\./g,\
> repacksuffix=+ds \
> https://github.com/libogdi/ogdi/releases \
> -(?:.*?/archive/)?(?:rel|v|ogdi)?[\-\_]?(\d\S+)\.(?:tgz|tbz|txz|(?:tar\.(?:gz|bz2|xz)))
> +(?:.*?/archive/(?:.*?/)?)?(?:rel|v|ogdi)?[\-\_]?(\d\S+)\.(?:tgz|tbz|txz|(?:tar\.(?:gz|bz2|xz)))
--
Sebastian Ramacher
signature.asc
Description: PGP signature
Control: reopen -1
On 2021-06-13 16:47:58 +0200, Sebastiaan Couwenberg wrote:
> Control: tags -1 - moreinfo
>
> On 6/13/21 3:13 PM, Sebastian Ramacher wrote:
> > On 2021-06-13 15:03:18 +0200, Bas Couwenberg wrote:
> >> Package: release.debian.org
> >> Severity:
On 2021-06-13 17:57:46 +0200, Sebastiaan Couwenberg wrote:
> On 6/13/21 11:32 AM, Sebastian Ramacher wrote:
> > On 2021-06-13 11:14:45 +0200, Sebastiaan Couwenberg wrote:
> >> On 6/13/21 10:58 AM, Andreas Beckmann wrote:
> >>> On 13/06/2021 06.45, Sebastiaan Couwenbe
On 2021-06-13 23:35:40 +0200, Andreas Beckmann wrote:
> On 13/06/2021 22.44, Sebastian Ramacher wrote:
> > My goal is to make libgdal20 and libgdal28 co-installable. Adding those
> > Breaks is not enough and is step into the wrong direction.
>
> Thanks for making that cl
able,
makes it only more painful for our users. So I'd say, yes, libgdal20 and
libgdal28 co-installablity is a must.
> We can also drop the Breaks from gdal-data, and have libgdal20 be broken
> for the bits that use it. It will help with the dependency resolution.
If a non-function libgdal20 would mean that even if if installed, it's
completely useless for the cases above, then no, that's not an option.
Cheers
--
Sebastian Ramacher
signature.asc
Description: PGP signature
On 2021-06-15 06:05:28, Sebastiaan Couwenberg wrote:
> On 6/14/21 9:55 PM, Sebastian Ramacher wrote:
> > On 2021-06-14 13:49:47 +0200, Sebastiaan Couwenberg wrote:
> >> On 6/14/21 1:30 PM, Andreas Beckmann wrote:
> >>> On 14/06/2021 10.06, Sebastiaan Couwenberg wrot
On 2021-06-15 13:18:23, Sebastiaan Couwenberg wrote:
> On 6/15/21 1:00 PM, Sebastian Ramacher wrote:
> > If neither you as maintainer nor upstream care about upgrade without
> > data loss, I don't think postgis is suitable to be included in a stable
> > release. Best o
> @@ -69,7 +85,7 @@
>
># echo myusername veth lxcbr0 10 >> /etc/lxc/lxc-usernet
>
> -4) Default container configuration
> +5) Default container configuration
>
> Add the following to ~/.config/lxc/default.conf:
>
> @@ -82,13 +98,13 @@
> The lxc.idmap entries must match the id ranges in /etc/subuid and
> /etc/subgid,
> as explained in step 2 above.
>
> -5) Creating containers
> +6) Creating containers
>
> non-root users can only use the `download` template. Example:
>
>$ lxc-create -t download -n mycontainer -- -d debian -r bullseye -a amd64
>
> -6) Starting containers
> +7) Starting containers
>
> Under the unified groups hierarchy (default in systemd starting with Debian
> 11/bullseye), a non-root user needs lxc-start to have some additional
> @@ -99,11 +115,34 @@
>$ systemd-run --scope --quiet --user --property=Delegate=yes \
> lxc-start -n mycontainer
>
> -7) Managing containers
> +or, lastly, you can use the helper script Debian made available:
> +lxc-unpriv-start. It'll care about using the systemd-run command properly and
> +also to make sure the required environment variables are set properly.
> +
> +8) Managing containers
>
> When not logged in on a graphical session, lxc-attach also requires being run
> -via systemd-run as lxc-start above. Other common actions, such as lxc-stop
> and
> -lxc-destroy, can be run directly.
> +via systemd-run as lxc-start above. Other common actions, such as
> lxc-console,
> +lxc-stop and lxc-destroy, can be run directly.
> +
> +Debian also made available a lxc-unpriv-attach command to ease the use of
> +lxc-attach.
> +
> +9) Avoiding containers destruction by systemd
> +
> +When exiting a user session (closing ssh or a tty), the remaining processes
> +running in background die, including the containers. The solution to avoid
> such
> +an issue is to either have the unprivileged containers running as a user
> +service, or to enable session lingering via loginctl.
> +
> +As a user, if policykit-1 is installed, it's just a call to `loginctl
> +enable-linger`
> +
> +If policykit-1 can't be installed, then one must be root and do a `sudo
> +loginctl enable-linger {username}`.
> +
> +Containers started via systemd-run won't get killed.
>
> -- Evgeni Golov Sat, 16 Jul 2016 11:49:16 +0200
> -- Antonio Terceiro Sat, 30 Jan 2021 10:02:37 -0300
> + -- Pierre-Elliott Bécue Fri, 11 Jun 2021 15:08:30 +0200
--
Sebastian Ramacher
signature.asc
Description: PGP signature
against nss3 3.66 (which would
also satisfy the version requirement)?
If not, is nss3 in bullseye broken? Of yes, did 3.67 break its ABI? Or
is it simply a matter of an incorrectly produce dependency which is not
high enough?
Cheers
--
Sebastian Ramacher
Hi Kevin
On 2021-06-18 10:48:05 -0600, Kevin Locke wrote:
> On 2021-06-17 22:32:46 +0200, Sebastian Ramacher wrote:
> > On 2021-06-17 19:54:51, Carsten Schoenert wrote:
> >> Unfortunately rather also quickly I got some bug reports about
> >> Thunderbird isn't corre
listically cover with testing for isolated backports.
Okay, if that helps with security maintenance in the long run, let's do
this. Please keep any unreleated changes to a minimum, though. Also note
that the full freeze is coming closer, so the upload would need to
happen very soon.
Cheers
>
Hi Sebastian,
> >
> > On Fri, 2021-06-18 at 22:26 +0200, Sebastian Ramacher wrote:
> >> Thanks for this detailed analysis. That actually means that the symbol
> >> file for libnss3 2:3.67-1 is broken. It would need to bump the minimum
> >> version requir
oxy
> init-common.sh usr/share/squid-deb-proxy/
> +../apparmor-profiles/* etc/apparmor.d/abstractions/squid-deb-proxy/
I'm not an apparmor expert, but is this enough? Shouldn't there also be
a profile for the binary that uses this abstraction?
In any case, the package builds an udeb. Cyril, could you please (N)ACK
for D-I?
Cheers
--
Sebastian Ramacher
signature.asc
Description: PGP signature
Zz5cR6X1BWlcH3404bVB/LHcq7+c1NUqvRfIlwwwsKGjMCWf
> +vv3cDVUvb3mMhvQs0rBEyb71bbKCe3qb10CvOJAmocp1c+YHo5vpQYeMJQARAQAB
> +tDJDaHJpc3RvcGhlIEpBSUxMRVQgPGNocmlzdG9waGUuamFpbGxldEB3YW5hZG9v
> +LmZyPokCTgQTAQoAOBYhBMVat7kTnrImPNGqvBmwM9F2DCJ7BQJggHovAhsDBQsJ
> +CAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJEBmwM9F2DCJ7E4MP/iVC7ZglH2sLi5wv
1.3.7-1
>
> --
> This email is automatically generated once a day. As the installation of
> new packages into testing happens multiple times a day you will receive
> later changes on the next day.
> See https://release.debian.org/testing-watch/ for more information.
>
--
Sebastian Ramacher
signature.asc
Description: PGP signature
On 2021-06-20 21:43:45 +0200, Moritz Muehlenhoff wrote:
> On Sat, Jun 19, 2021 at 09:33:37PM +0200, Sebastian Ramacher wrote:
> > Hallo Carsten
> >
> > On 2021-06-19 09:00:13 +0200, Carsten Schoenert wrote:
> > > Hello Kevin, hello Sebastian,
> > >
&g
ture: any
> Section: python
> -Depends: libopencv-calib3d4.5 (= ${binary:Version}),
> - libopencv-dnn4.5 (= ${binary:Version}),
> - libopencv-features2d4.5 (= ${binary:Version}),
> - libopencv-flann4.5 (= ${binary:Version}),
> - libopencv-highgui4.5 (= ${binary:Version}),
> - libopencv-imgcodecs4.5 (= ${binary:Version}),
> - libopencv-imgproc4.5 (= ${binary:Version}),
> - libopencv-ml4.5 (= ${binary:Version}),
> - libopencv-objdetect4.5 (= ${binary:Version}),
> - libopencv-photo4.5 (= ${binary:Version}),
> - libopencv-shape4.5 (= ${binary:Version}),
> - libopencv-stitching4.5 (= ${binary:Version}),
> - libopencv-superres4.5 (= ${binary:Version}),
> - libopencv-video4.5 (= ${binary:Version}),
> - libopencv-videoio4.5 (= ${binary:Version}),
> - libopencv-videostab4.5 (= ${binary:Version}),
> - libopencv-viz4.5 (= ${binary:Version}),
> - ${misc:Depends},
> +Depends: ${misc:Depends},
> ${python3:Depends},
> ${shlibs:Depends},
> libcharls2
--
Sebastian Ramacher
* We make a second pass over the fds to find if any "to" fd index
> ++ overlaps an already in use fd (i.e. one in the "from" category
> ++ that are allocated randomly). If a fd overlaps "to" fd then its
> ++ a caller issue and not our fault, so we ignore that. */
> ++ for (i = 0; i < fd_map->len; i++)
> ++{
> ++ int to_fd = g_array_index (fd_map, FdMapEntry, i).to;
> ++ gboolean conflict = FALSE;
> ++
> ++ /* At this point we're fine with using "from" values for this
> ++ value (because we handle to==from in the code), or values
> ++ that are before "i" in the fd_map (because those will be
> ++ closed at this point when dup:ing). However, we can't
> ++ reuse a fd that is in "from" for j > i. */
> ++ for (j = i + 1; j < fd_map->len; j++)
> ++{
> ++ int from_fd = g_array_index(fd_map, FdMapEntry, j).from;
> ++ if (from_fd == to_fd)
> ++{
> ++ conflict = TRUE;
> ++ break;
> ++}
> ++}
> ++
> ++ if (conflict)
> ++g_array_index (fd_map, FdMapEntry, i).to = ++max_fd;
> ++}
> ++
> ++ child_setup_data.fd_map = &g_array_index (fd_map, FdMapEntry, 0);
> ++ child_setup_data.fd_map_len = fd_map->len;
> ++
> + /* We use LEAVE_DESCRIPTORS_OPEN to work around dead-lock, see
> flatpak_close_fds_workaround */
> + if (!g_spawn_async_with_pipes (NULL,
> + (char **) flatpak_argv->pdata,
> diff --git a/debian/patches/series b/debian/patches/series
> index ee9cda11a..b62fb3796 100644
> --- a/debian/patches/series
> +++ b/debian/patches/series
> @@ -1 +1,5 @@
> tests-Remove-hard-coded-references-to-x86_64.patch
> +Fix-several-memory-leaks.patch
> +portal-Don-t-leak-fd-used-for-serialized-environment.patch
> +portal-Use-a-GArray-to-store-fds.patch
> +portal-Remap-env-fd-into-child-process-s-fd-space.patch
--
Sebastian Ramacher
signature.asc
Description: PGP signature
from the debdiff to unstable.
> >
> > Sounds fine to me.
>
> If the RMs are onboard as well, then let's not waste any more time on
> alternatives.
It's a step in the right direction. So, yes, please go ahead.
Cheers
>
> Kind Regards,
>
> Bas
>
> --
> GPG Key ID: 4096R/6750F10AE88D4AF1
> Fingerprint: 8182 DE41 7056 408D 6146 50D1 6750 F10A E88D 4AF1
>
--
Sebastian Ramacher
signature.asc
Description: PGP signature
On 2021-05-20 08:51:00 +0200, Thomas Goirand wrote:
> On 5/19/21 9:21 PM, Sebastian Ramacher wrote:
> > Control: tags -1 moreinfo
> >
> > On 2021-05-07 10:56:51 +0200, Thomas Goirand wrote:
> >> Package: release.debian.org
> >> Severity: normal
> >&g
t; ++else
> ++return SMFIS_ACCEPT;
> ++}
> + }
> +
> + user = users[0];
> diff -Nru opendmarc-1.4.0~beta1+dfsg/debian/patches/series
> opendmarc-1.4.0~beta1+dfsg/debian/patc
3.0.beta2', 0],
> ++['beta le 3.0.beta2', 1],
> ++['beta eq 3.0.beta2', 1],
> ++['beta ge 3.0.beta2', 1],
> ++['beta gt 3.0.beta2', 0],
> ++
> ++['beta lt 3.0.beta3', 1],
> ++['beta le 3.0.beta3', 1],
> ++['beta eq 3.0.beta3', 0],
> ++['beta ge 3.0.beta3', 0],
> ++['beta gt 3.0.beta3', 0],
> ++
> ++['beta lt 3.0.0', 1],
> ++['beta le 3.0.0', 1],
> ++['beta eq 3.0.0', 0],
> ++['beta ge 3.0.0', 0],
> ++['beta gt 3.0.0', 0],
> + );
> +
> + my %c = env_init;
> diff -Nru feature-check-0.2.2/debian/patches/series
> feature-check-0.2.2/debian/patches/series
> --- feature-check-0.2.2/debian/patches/series 2019-09-22 22:47:39.0
> +0300
> +++ feature-check-0.2.2/debian/patches/series 2021-06-24 15:29:45.0
> +0300
> @@ -1 +1,3 @@
> python-no-executable.patch
> +cmp-num.patch
> +cmp-rest.patch
--
Sebastian Ramacher
signature.asc
Description: PGP signature
ciautils/config.opts etc/pcmciautils/
> +usr/lib/pcmciautils/config.opts etc/pcmcia/
>
> --
> Colin Watson (he/him) [cjwat...@debian.org]
>
--
Sebastian Ramacher
signature.asc
Description: PGP signature
S="-lssl" dh_auto_configure -- $(confflags)
> + # MAILER: Fix for #296022, #475771 and #990080
> + MAILER="/usr/bin/mail" LIBS="-lssl" dh_auto_configure --
> $(confflags)
>
> override_dh_install:
> sed -i "/dependency_libs/ s/'.*'/''/" `find debian/tmp -name '*.la'`
Let's use this one. Please remove the moreinfo tag once the new version
is available in unstable.
Cheers
--
Sebastian Ramacher
signature.asc
Description: PGP signature
rc/test-donkey.py
> +Test-Command: env TEST_PROCESS_DRIVER=pty TEST_PROG=/usr/bin/donkey python3
> src/test-donkey.py
> Depends: @, python3, python3-ddt, python3-six, tmux
> Restrictions: allow-stderr
> Features: test-name=upstream
--
Sebastian Ramacher
signature.asc
Description: PGP signature
s/commit/412b69dfabe223a69159c8579ba808b49f0982e0
>
>
> unblock zfs-linux/2.0.3-9
> Thank you for using reportbug
ACK, please go ahead and remove the moreinfo tag once the new version is
available in unstable.
Cheers
--
Sebastian Ramacher
signature.asc
Description: PGP signature
RPM_STRING_TYPE:
> +-case RPM_STRING_ARRAY_TYPE:
> +- case RPM_BIN_TYPE:
> +-if (td.count >= 16*1024)
> +-continue;
> ++if (xl->count && td.count != xl->count)
> + break;
> +-case RPM_I18NSTRING_TYPE:
> +-continue;
> ++if (!headerPut(h, &td, HEADERPUT_DEFAULT))
> + break;
> +-}
> +-(void) headerPut(h, &td, HEADERPUT_DEFAULT);
> ++rpmtdFreeData(&td);
> + }
> + }
> +-headerFreeIterator(hi);
> ++rpmtdFreeData(&td);
> ++
> ++exit:
> ++if (xl->stag) {
> ++rasprintf(msg, "invalid signature tag %s (%d)",
> ++rpmTagGetName(xl->xtag), xl->xtag);
> ++}
> ++
> ++return xl->stag;
> + }
> +
> + /**
> +@@ -378,7 +374,8 @@
> + goto exit;
> +
> + /* Append (and remap) signature tags to the metadata. */
> +-headerMergeLegacySigs(h, sigh);
> ++if (headerMergeLegacySigs(h, sigh, &msg))
> ++goto exit;
> + applyRetrofits(h);
> +
> + /* Bump reference count for return. */
> diff -Nru rpm-4.16.1.2+dfsg1/debian/patches/series
> rpm-4.16.1.2+dfsg1/debian/patches/series
> --- rpm-4.16.1.2+dfsg1/debian/patches/series 2021-01-19 13:28:15.0
> +0200
> +++ rpm-4.16.1.2+dfsg1/debian/patches/series 2021-06-29 17:03:24.0
> +0300
> @@ -9,3 +9,5 @@
> 0012-pythondistdeps.py-Use-python3-in-shebang.patch
> debugedit-trunk.diff
> gcc-dwarf5.diff
> +CVE-2021-3421-CVE-2021-20271.patch
> +CVE-2021-20266.patch
--
Sebastian Ramacher
signature.asc
Description: PGP signature
9xx
> | APL| E0 | 06-5c-0a/03 | 000c | 0016 | Atom
> x5-E39xx
> | SKL-H/S| R0/N0| 06-5e-03/36 | 00c6 | 00cc | Core Gen6;
> Xeon E3 v5
> @@ -495,9 +580,9 @@ None
> | SKX-SP | H0/M0/U0 | 06-55-04/b7 | 025a | 005e | Xe
in linux mint
> and other distros and from a fast search I not found regression about it.
>
> The diff:
> https://salsa.debian.org/cinnamon-team/nemo/-/compare/debian%2F4.8.6-1...debian%2F4.8.6-2
>
> unblock nemo/4.8.6-2
Please attach a debdiff of the source packages in testing an
On 2021-06-16 12:58:20, Andreas Beckmann wrote:
> Control: tag -1 - moreinfo
>
> On 31/05/2021 13.54, Sebastian Ramacher wrote:
> > On 2021-05-31 13:32:33, Andreas Beckmann wrote:
>
> > > Please unblock package insighttoolkit4
> > >
> > > Let's
o-horizon.preinst
> --- horizon-18.6.2/debian/python3-django-horizon.preinst 1970-01-01
> 01:00:00.0 +0100
> +++ horizon-18.6.2/debian/python3-django-horizon.preinst 2021-06-29
> 14:53:41.0 +0200
> @@ -0,0 +1,12 @@
> +#!/bin/sh
> +
> +set -e
> +
> +if [ "${1}" = "install" ] || [ "${1}" = "upgrade" ] ; then
> + if [ -L
> /usr/lib/python3/dist-packages/openstack_dashboard/local/enabled ]; then
> + rm
> /usr/lib/python3/dist-packages/openstack_dashboard/local/enabled
> + fi
> + mkdir -p
> /usr/lib/python3/dist-packages/openstack_dashboard/local/enabled
> +fi
> +
> +#DEBHELPER#
> diff -Nru horizon-18.6.2/debian/python3-django-horizon.prerm
> horizon-18.6.2/debian/python3-django-horizon.prerm
> --- horizon-18.6.2/debian/python3-django-horizon.prerm2021-04-04
> 14:13:10.0 +0200
> +++ horizon-18.6.2/debian/python3-django-horizon.prerm1970-01-01
> 01:00:00.0 +0100
> @@ -1,9 +0,0 @@
> -#!/bin/sh
> -
> -set -e
> -
> -if [ -d /usr/lib/python3/dist-packages/openstack_dashboard/local ] ; then
> - rm -rf /usr/lib/python3/dist-packages/openstack_dashboard/local
> -fi
> -
> -#DEBHELPER#
--
Sebastian Ramacher
signature.asc
Description: PGP signature
he package in testing
The debdiff is missing. We'd appreciate a fitered debdiff without the
autotools cruft in this case.
Cheers
>
> [ Other info ]
> Sorry for being late with this, but I hope it will be accepted.
>
> unblock irssi/1.2.3-1
>
--
Sebastian Ramacher
signature.asc
Description: PGP signature
kodi-19.1+dfsg2/debian/patches/series 2021-06-24 20:44:30.0
> +
> @@ -19,6 +19,7 @@
> kodi/0019-Disable-GetCPUFrequency-test.patch
> kodi/0020-Fix-C++-example-includes.patch
> kodi/0021-Detect-and-honor-big-endian-arch.patch
> +kodi/0022-Workaround-989814.patch
> libdvdnav/0001-xbmc-dvdnav-allow-get-set-vm-state.patch
> libdvdnav/0002-xbmc-dvdnav-expose-dvdnav_get_vm-dvdnav_get_button_i.patch
> libdvdnav/0003-xbmc-dvdnav-detection-of-dvd-name.patch
--
Sebastian Ramacher
signature.asc
Description: PGP signature
ository (https://mirrors.kodi.tv) and not as
> a collection of PO files.
>
> --
> Vasyl Gello
> ==
> Certified SolidWorks Expert
>
> Mob.:+380 (98) 465 66 77
>
> E-Mail: vasek.ge...@gmail.com
>
> Skype: vasek.gello
> ==
> 호랑이는 죽어서 가죽을 남기고 사람은 죽어서 이름을 남긴다
--
Sebastian Ramacher
=====
> 호랑이는 죽어서 가죽을 남기고 사람은 죽어서 이름을 남긴다
--
Sebastian Ramacher
signature.asc
Description: PGP signature
On 2021-07-03 16:32:44 +0200, Fabio Fantoni wrote:
> Il 29/06/2021 22:52, Sebastian Ramacher ha scritto:
> > > The diff:
> > > https://salsa.debian.org/cinnamon-team/nemo/-/compare/debian%2F4.8.6-1...debian%2F4.8.6-2
> > Please attach a debdiff of the source packages
e problems with client side decorated windows.
>
> There would be undocumented options.
>
> [ Tests ]
> Manual tests.
>
> [ Risks ]
> X2Go sessions being busted if some of the above commits is flawed.
>
> [ Checklist ]
> [x] all changes are documented in the d/chan
It's just metadata changes, only risk is like regressions
> in toolchain since last upload.
>
> [ Checklist ]
> [x] all changes are documented in the d/changelog
> [x] I reviewed all changes and I approve them
> [x] attach debdiff against the package in testing
>
> unblock py
tch.php?pkg=mdevctl&arch=all&ver=0.78-1&stamp=1606290427
Please attach a debdiff between the version in testing and unstable.
Regarding the packaging changes: it's too late to bump debhelper compat.
See https://release.debian.org/bullseye/freeze_policy.html. Please
revert that c
e anyway. My debdiff was detected as malware so you'll
> have to fetch it from
> https://salsa.debian.org/-/snippets/549/raw/master/privacybadger.diff
119 files changed, 37556 insertions(+), 16534 deletions(-)
This is too much for us to sensibly review. If possible, please provide
a filtered debdiff (e.g., by filtering the website data and
translations).
Cheers
>
> unblock privacybadger/2021.6.8-1
>
>
--
Sebastian Ramacher
signature.asc
Description: PGP signature
is use the just built version of lxml, e.g., by setting the
appropriate PYTHONPATH, instead of the old packaged lxml in python3-lxml?
Cheers
> touch $@
> dbg-build3-python%: prebuild
> python$*-dbg setup.py build
> Binary files /tmp/nGluINxi3b/lxml-4.6.3/doc/html/flattr-badge-large.png and
> /tmp/DP0ayk9l1g/lxml-4.6.3+dfsg/doc/html/flattr-badge-large.png differ
--
Sebastian Ramacher
signature.asc
Description: PGP signature
TS Xapian: Buildmore: Can not open db
> (3)");
> + }
> + }
> }
> else
> {
>
> ok=fts_backend_xapian_index_text(backend,ctx->tbi_uid,ctx->tbi_field, &d2);
> + if(!ok)
> +
ttp)"
> log " -t, --tests # Number of hosts to test ($test_hosts)"
> log " -c, --country COUNTRY Restrict search to servers in that
> country"
> log " -d, --debugEnable debugging"
> @@ -302,7 +304,7 @@
> -n|--nonfree) want_nonfree=1; shift ;;
> -c|--country) country=$2; shift 2 ;;
> -t|--tests) test_hosts=$2; shift 2 ;;
> - -f|--ftp) protocol="FTP"; shift ;;
> + -f|--ftp) protocol="ftp"; shift ;;
> -d|--debug) DEBUG=1; shift ;;
> -h|--help) usage; exit 0;;
> --) shift; break;;
> @@ -366,7 +368,9 @@
> if [ -n "$country" ]; then
> log "(will filter only for mirrors in country $country)"
> fi
> -hosts_netselect=$(run_netselect "Packages over $protocol" $protocol)
> +# Convert Search string to uppercase as it is used in the website
> +search_string="Packages over ${protocol^^}"
> +hosts_netselect=$(run_netselect "$search_string" $protocol)
> netselect_rv=$?
> if [ $netselect_rv -eq 0 ] ; then
> if [ ! -z "$hosts_netselect" ] ; then
--
Sebastian Ramacher
signature.asc
Description: PGP signature
rategy will be applied for Thunderbird.
If the security team extends security support to the involved packages,
then we'd want debdiffs in separate unblock bugs (except for the
upstream changes copied from webkit2gtk to wpewebkit). Also, the
release-notes need to changed accordingly.
Cheers
--
Sebastian Ramacher
signature.asc
Description: PGP signature
and small changes. I don't expect that building
> the latest version of webkit2gtk or wpewebkit for a security update
> requires updating any of those libraries, but I think it can
> theoretically happen. Is there a way to handle that in Debian?
>
> Berto
>
> [1] https://lists.webkit.org/pipermail/webkit-gtk/2021-March/003689.html
>
--
Sebastian Ramacher
signature.asc
Description: PGP signature
On 2021-07-03 14:38:16 +0200, Andreas Beckmann wrote:
> On 01/07/2021 11.25, Sebastian Ramacher wrote:
> > Besides libotb-apps, is this an issue for any other package? I've randomly
> > tried two packages from your list above (elastix and odin), but apt
> > found upgra
tian-brush. So is
that really what you want?
Cheers
--
Sebastian Ramacher
signature.asc
Description: PGP signature
before release or
> after.
> I don't have preference FWIW.
> CCed security team as well.
>
> [ Checklist ]
> [ ] all changes are documented in the d/changelog
> [ ] I reviewed all changes and I approve them
> [ ] attach debdiff against the package in testing
>
ls *.index-log.* \
> | sort --numeric-sort --field-separator='-' --key=1,4 --key=6,7
> --key=9,10 \
> | head --lines=-5 \
> -| xargs --no-run-if-empty --max-args=1 --max-lines=1 rm -f
> +| xargs --no-run-if-empty --max-args=1 rm -f
>)
> fi
--
Sebastian Ramacher
On 2021-07-07 11:53:16 +0200, Moritz Muehlenhoff wrote:
> On Tue, Jul 06, 2021 at 10:11:36PM +0200, Sebastian Ramacher wrote:
> > Control: tags -1 moreinfo
> >
> > On 2021-07-06 11:20:10 +0200, Alberto Garcia wrote:
> > > Package: release.debian.org
>
ne
> +@@ -172,5 +179,30 @@ teardown()
> + exec 9<>/dev/tcp/127.0.0.1/10001
> + echo>&9 "get encoding%er...@otherdomain.com"
> + read<&9 line
> + [[ "$line" =~ ^500 ]]
> ++exec 9<>/dev/tcp/127.0.0.1/10001
> ++# Try to overflow the input buffer
> ++echo>&9 "get too_long@`fillchar 1024 a`.com"
> ++read<&9 line
> ++[[ "$line" =~ ^500 ]]
> ++}
> ++
> ++@test "Pipelining multiple requests" {
> ++start_postsrsd_at "2020-01-01 00:01:00 UTC"
> ++exec 9<>/dev/tcp/127.0.0.1/10001
> ++# Send two requests at once and see if PostSRSd answers both
> ++echo>&9 -e "get t...@domain1.com\nget t...@domain2.com"
> ++read<&9 line
> ++[[ "$line" =~ ^200 ]]
> ++read<&9 line
> ++[[ "$line" =~ ^200 ]]
> ++}
> ++
> ++@test "Session timeout" {
> ++start_postsrsd_at "2020-01-01 00:01:00 UTC"
> ++exec 9<>/dev/tcp/127.0.0.1/10001
> ++# Wait until PostSRSd disconnects due to inactivity
> ++sleep 2
> ++echo >&9 "get t...@example.com"
> ++! read <&9 line
> + }
> diff -Nru postsrsd-1.10/debian/patches/series
> postsrsd-1.10/debian/patches/series
> --- postsrsd-1.10/debian/patches/series 2020-12-02 22:36:36.0
> +0100
> +++ postsrsd-1.10/debian/patches/series 2021-07-14 21:21:11.0
> +0200
> @@ -1 +1,2 @@
> 0001-Run-as-postsrsd-user-by-default.patch
> +0002-SECURITY-Fix-DoS-on-overly-long-input-from-Postfix.patch
--
Sebastian Ramacher
> ++ for (multi_param ('hostname'))
> + {
> + my $host = _sanitize_generic_allow_minus ($_);
> + if (defined ($ret{$host}))
> +@@ -597,7 +597,7 @@
> + $ret{$_} = 0;
> + }
> +
> +- for (param ('plugin'))
> ++ for (multi_param ('plugin'))
> + {
> + if (defined ($ret{$_}))
> + {
> diff -Nru collectd-5.12.0/debian/patches/series
> collectd-5.12.0/debian/patches/series
> --- collectd-5.12.0/debian/patches/series 2021-06-02 00:56:33.0
> +0900
> +++ collectd-5.12.0/debian/patches/series 2021-07-14 21:46:02.0
> +0900
> @@ -3,3 +3,4 @@
> myplugin_includes.patch
> nagios-debian-paths.patch
> fix-smart-test
> +cgi-param-in-list-context.patch
--
Sebastian Ramacher
signature.asc
Description: PGP signature
the status? If we cannot reduce the number of packages to binNMU,
then this needs to happen soon. Otherwise there won't be enough time to
chase all the rebuilds.
Cheers
--
Sebastian Ramacher
signature.asc
Description: PGP signature
On 2021-07-18 02:49:26 +0800, Shengjing Zhu wrote:
> On Sun, Jul 18, 2021 at 2:29 AM Sebastian Ramacher
> wrote:
> >
> > On 2021-07-15 02:03:19 +0800, Shengjing Zhu wrote:
> > > On Thu, Jul 15, 2021 at 2:02 AM Shengjing Zhu wrote:
> > > >
> > > &g
On 2021-07-18 02:54:31 +0800, Shengjing Zhu wrote:
> On Sun, Jul 18, 2021 at 2:52 AM Sebastian Ramacher
> wrote:
> >
> > On 2021-07-18 02:49:26 +0800, Shengjing Zhu wrote:
> > > On Sun, Jul 18, 2021 at 2:29 AM Sebastian Ramacher
> > > wrote:
> >
On 2021-07-18 13:06:18 +0800, Shengjing Zhu wrote:
> On Sun, Jul 18, 2021 at 3:00 AM Sebastian Ramacher
> wrote:
> [..]
> > Ah, I missed the debdiff due to the other discussion. Please go ahead.
> >
>
> Uploaded, built and installed on all architecures.
Thanks,
t (DebConf)
> RT: elbrus
> 4 September
> RT: elbrus
> 11 September:
> RT: elbrus
11 September works for me. I am going to be on VAC on 28 August and 4
September. On the other dates I can try to be around, but cannot commit.
Cheers
--
Sebastian Ramacher
(all_t.size() >= 65536)
> all_t.resize(65535);
> ns->addUInt16((uint16_t)all_k.size()).addUInt16((uint16_t)all_t.size());
> diff --git a/src/network/protocols/server_lobby.cpp
> b/src/network/protocols/server_lobby.cpp
> index 2d55ce81f25..b81ade8d0a4 100644
> --- a/src/network/protocols/server_lobby.cpp
> +++ b/src/network/protocols/server_lobby.cpp
> @@ -26,6 +26,7 @@
> #include "karts/controller/player_controller.hpp"
> #include "karts/kart_properties.hpp"
> #include "karts/kart_properties_manager.hpp"
> +#include "karts/official_karts.hpp"
> #include "modes/capture_the_flag.hpp"
> #include "modes/linear_world.hpp"
> #include "network/crypto.hpp"
> @@ -172,8 +173,6 @@ ServerLobby::ServerLobby() : LobbyProtocol()
> {
> m_client_server_host_id.store(0);
> m_lobby_players.store(0);
> -std::vector all_k =
> -kart_properties_manager->getKartsInGroup("standard");
> std::vector all_t =
> track_manager->getTracksInGroup("standard");
> std::vector all_arenas =
> @@ -183,16 +182,7 @@ ServerLobby::ServerLobby() : LobbyProtocol()
> all_t.insert(all_t.end(), all_arenas.begin(), all_arenas.end());
> all_t.insert(all_t.end(), all_soccers.begin(), all_soccers.end());
>
> -for (int kart : all_k)
> -{
> -const KartProperties* kp =
> kart_properties_manager->getKartById(kart);
> -// Some distro put kart itself, ignore it online for the rest of stk
> -// user
> -if (kp->getIdent() == "geeko")
> -continue;
> -if (!kp->isAddon())
> -m_official_kts.first.insert(kp->getIdent());
> -}
> +m_official_kts.first = OfficialKarts::getOfficialKarts();
> for (int track : all_t)
> {
> Track* t = track_manager->getTrack(track);
> @@ -579,9 +569,18 @@ void ServerLobby::updateAddons()
> m_addon_kts.second.insert(t->getIdent());
> }
>
> -auto all_k = kart_properties_manager->getAllAvailableKarts();
> -if (all_k.size() >= 65536)
> -all_k.resize(65535);
> +std::vector all_k;
> +for (unsigned i = 0; i < kart_properties_manager->getNumberOfKarts();
> i++)
> +{
> +const KartProperties* kp = kart_properties_manager->getKartById(i);
> +if (kp->isAddon())
> +all_k.push_back(kp->getIdent());
> +}
> +std::set oks = OfficialKarts::getOfficialKarts();
> +if (all_k.size() >= 65536 - (unsigned)oks.size())
> +all_k.resize(65535 - (unsigned)oks.size());
> +for (const std::string& k : oks)
> +all_k.push_back(k);
> if (ServerConfig::m_live_players)
> m_available_kts.first = m_official_kts.first;
> else
> From 339e07bb836d48c932b8516362a764480f57c8e8 Mon Sep 17 00:00:00 2001
> From: Benau
> Date: Mon, 19 Jul 2021 12:29:54 +0800
> Subject: [PATCH] Fix memory leak
>
> ---
> src/karts/official_karts.cpp | 1 +
> 1 file changed, 1 insertion(+)
>
> diff --git a/src/karts/official_karts.cpp b/src/karts/official_karts.cpp
> index c8d7b9f38b..c9f7a4e75f 100644
> --- a/src/karts/official_karts.cpp
> +++ b/src/karts/official_karts.cpp
> @@ -84,6 +84,7 @@ void load()
> g_official_karts.emplace_back(name, type, width, height, length,
> gravity_shift);
> }
> +delete root;
> } // load
>
> //
>
--
Sebastian Ramacher
1 - 100 of 1497 matches
Mail list logo