Bug#619576: openerp-server: The Company OpenERP states that there will be no upgrade module to version 6

2011-05-31 Thread W. Martin Borgert

Package: openerp-server
Severity: wishlist

Why is this bug "serious"? It is annoying, but common, that new
software versions may completely break old installations. While
this is a major PITA and Debian should make software upgrades
as convenient as possible, I can not see a reason for removing
the software because of a bad or missing upgrade process. Any
commercial services by some company are not related to Debian.

If a smooth upgrade process cannot be provided by Debian, the
version v6 should (maybe) packaged seperately, so that users
can install both in parallel and decide how to handle problems.




--
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/2011053452.15926r3pt99yf...@webmail.in-berlin.de



Bug#825245: dia: cannot input anything in Text object

2016-10-16 Thread W. Martin Borgert
tags 825245 unreproducible
thanks

Hi, I cannot reproduce this behaviour with dia 0.97.3+git20160930-1
and I don't remember such bug in a former version of dia. I assume,
that it is a side effect of something else, e.g. an input method.



Bug#775580: dia: Rulers enabled causes cursot to "flicker" and sometimes dissapear

2016-10-16 Thread W. Martin Borgert
retitle 775580 /usr/bin/dia-gnome-integrated: Rulers enabled causes cursor to 
"flicker" and sometimes dissapear
tags 775580 unreproducible
thanks

Hi, dia does not flicker for me and never did, IIRC.



Bug#704028: new version of twitter-bootstrap

2014-11-29 Thread W. Martin Borgert
twitter-recess is now in sid and the RC bug it has is probably
already solved. Is there anything else blocking a new upstream
version?


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20141129174608.GA5611@fama



Bug#797165: CVE-2015-0852: integer overflow in PluginPCX.cpp

2015-09-14 Thread W. Martin Borgert
tags 797165 +patch
thanks

Could someone please check attached patch? Thanks.
Description: fix integer overflow
Origin: upstream
 http://freeimage.cvs.sourceforge.net/viewvc/freeimage/FreeImage/Source/FreeImage/PluginPCX.cpp?view=patch&r1=1.17&r2=1.18&pathrev=MAIN
 http://freeimage.cvs.sourceforge.net/viewvc/freeimage/FreeImage/Source/FreeImage/PluginPCX.cpp?view=patch&r1=1.18&r2=1.19&pathrev=MAIN
Bug-Debian: https://bugs.debian.org/797165
Last-Update: 2015-09-14
---
This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
--- a/Source/FreeImage/PluginPCX.cpp
+++ b/Source/FreeImage/PluginPCX.cpp
@@ -347,12 +347,14 @@
 
 	try {
 		// check PCX identifier
-
-		long start_pos = io->tell_proc(handle);
-		BOOL validated = pcx_validate(io, handle);		
-		io->seek_proc(handle, start_pos, SEEK_SET);
-		if(!validated) {
-			throw FI_MSG_ERROR_MAGIC_NUMBER;
+		// (note: should have been already validated using FreeImage_GetFileType but check again)
+		{
+			long start_pos = io->tell_proc(handle);
+			BOOL validated = pcx_validate(io, handle);
+			io->seek_proc(handle, start_pos, SEEK_SET);
+			if(!validated) {
+throw FI_MSG_ERROR_MAGIC_NUMBER;
+			}
 		}
 
 		// process the header
@@ -366,20 +368,38 @@
 		SwapHeader(&header);
 #endif
 
-		// allocate a new DIB
+		// process the window
+		const WORD *window = header.window;	// left, upper, right,lower pixel coord.
+		const int left		= window[0];
+		const int top		= window[1];
+		const int right		= window[2];
+		const int bottom	= window[3];
 
-		unsigned width = header.window[2] - header.window[0] + 1;
-		unsigned height = header.window[3] - header.window[1] + 1;
-		unsigned bitcount = header.bpp * header.planes;
-
-		if (bitcount == 24) {
-			dib = FreeImage_AllocateHeader(header_only, width, height, bitcount, FI_RGBA_RED_MASK, FI_RGBA_GREEN_MASK, FI_RGBA_BLUE_MASK);
-		} else {
-			dib = FreeImage_AllocateHeader(header_only, width, height, bitcount);			
+		// check image size
+		if((left >= right) || (top >= bottom)) {
+			throw FI_MSG_ERROR_PARSING;
 		}
 
-		// if the dib couldn't be allocated, throw an error
+		const unsigned width = right - left + 1;
+		const unsigned height = bottom - top + 1;
+		const unsigned bitcount = header.bpp * header.planes;
+
+		// allocate a new DIB
+		switch(bitcount) {
+			case 1:
+			case 4:
+			case 8:
+dib = FreeImage_AllocateHeader(header_only, width, height, bitcount);
+break;
+			case 24:
+dib = FreeImage_AllocateHeader(header_only, width, height, bitcount, FI_RGBA_RED_MASK, FI_RGBA_GREEN_MASK, FI_RGBA_BLUE_MASK);
+break;
+			default:
+throw FI_MSG_ERROR_DIB_MEMORY;
+break;
+		}
 
+		// if the dib couldn't be allocated, throw an error
 		if (!dib) {
 			throw FI_MSG_ERROR_DIB_MEMORY;
 		}
@@ -426,19 +446,23 @@
 
 if (palette_id == 0x0C) {
 	BYTE *cmap = (BYTE*)malloc(768 * sizeof(BYTE));
-	io->read_proc(cmap, 768, 1, handle);
 
-	pal = FreeImage_GetPalette(dib);
-	BYTE *pColormap = &cmap[0];
+	if(cmap) {
+		io->read_proc(cmap, 768, 1, handle);
 
-	for(int i = 0; i < 256; i++) {
-		pal[i].rgbRed   = pColormap[0];
-		pal[i].rgbGreen = pColormap[1];
-		pal[i].rgbBlue  = pColormap[2];
-		pColormap += 3;
+		pal = FreeImage_GetPalette(dib);
+		BYTE *pColormap = &cmap[0];
+
+		for(int i = 0; i < 256; i++) {
+			pal[i].rgbRed   = pColormap[0];
+			pal[i].rgbGreen = pColormap[1];
+			pal[i].rgbBlue  = pColormap[2];
+			pColormap += 3;
+		}
+
+		free(cmap);
 	}
 
-	free(cmap);
 }
 
 // wrong palette ID, perhaps a gray scale is needed ?
@@ -466,9 +490,9 @@
 		// calculate the line length for the PCX and the DIB
 
 		// length of raster line in bytes
-		unsigned linelength = header.bytes_per_line * header.planes;
+		const unsigned linelength = header.bytes_per_line * header.planes;
 		// length of DIB line (rounded to DWORD) in bytes
-		unsigned pitch = FreeImage_GetPitch(dib);
+		const unsigned pitch = FreeImage_GetPitch(dib);
 
 		// run-length encoding ?
 


Bug#808872: new version 1.5.0 available

2015-12-23 Thread W. Martin Borgert
Source: python-socksipy
Version: 1.02-2
Severity: wishlist

The latest reincarnation of socksipy at
https://github.com/Anorov/PySocks
has released 1.5.0 on 2014-01-02



Bug#808872: pysocks vs socksipy

2015-12-27 Thread W. Martin Borgert
Hi Jean-Michel, hi Thomas,

On 2015-12-28 01:19, Jean-Michel Vourgère wrote:
> W. Martin Borgert wrote:
> > The latest reincarnation of socksipy at
> > https://github.com/Anorov/PySocks
> > has released 1.5.0 on 2014-01-02
>
> You might want to check package python-pysocks that already contains
> that fork by Anorov.
>
> Ouch :(
>
> https://packages.qa.debian.org/p/python-pysocks.html
> https://packages.qa.debian.org/p/python-socksipy.html

Thanks for the information.
IMHO, one of the packages should be removed from unstable and testing.

I wonder, why pysocks has been packaged instead of updating socksipy?
After all, one seems to be the (compatible) successor of the other.

Where is the Debian packaging VCS for pysocks?
I didn't find it in the DPMT git repo.

Cheers