Bug#854236: unblock: inkscape 0.92.1
Control: tag -1 - moreinfo On Thu, Feb 09, 2017 at 06:39:00AM +, Niels Thykier wrote: > I am ok with this provided: > > * We aim for 0.92.1 once that is released (assuming it is released >soon) Yes, that's my plan (0.92.2 is "planned" for April/May - I'm dreaming of seeing stretch as stable by "then"). 0.92.1 is scheduled for this week end/early next week, should be soon enough. > * You are ready to react promptly to regressions Sure. > * You are ready to promptly downgrade back to 0.92.0-4 plus minimal >patches for fixing the text-height issue for the worst case. This would be very annoying, but yes, I'm ok to do the downgrade if for some odd reason everything crumbles and there is no good way forward. Thank you! -- regards, Mattia Rizzolo GPG Key: 66AE 2B4A FCCF 3F52 DA18 4D18 4B04 3FCD B944 4540 .''`. more about me: https://mapreri.org : :' : Launchpad user: https://launchpad.net/~mapreri `. `'` Debian QA page: https://qa.debian.org/developer.php?login=mattia `- signature.asc Description: PGP signature
Processed: Re: Bug#854236: unblock: inkscape 0.92.1
Processing control commands: > tag -1 - moreinfo Bug #854236 [release.debian.org] unblock: inkscape 0.92.1 Bug #854247 [release.debian.org] unblock: inkscape 0.92.1 Removed tag(s) moreinfo. Removed tag(s) moreinfo. -- 854236: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854236 854247: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854247 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#854381: unblock: apt/1.4~rc1
On Thu, Feb 09, 2017 at 06:56:00AM +, Niels Thykier wrote: > Julian Andres Klode: > > Please unblock package apt > > It seems to introduce a CI regression. > > https://ci.debian.net/packages/a/apt/unstable/amd64/ […] | Statistics: 234 tests were run: 233 successfully and 1 failed | Failed tests: test-apt-tagfile-fields-order The failing test checks if apt knows all fields dpkg knows – which as dpkg introduced a new field "Auto-Built-Package" in 1.18.19 is making all apt versions fail that test, we just happened to be uploading around the same time. (the test failed in the earlier 1.4~beta4 cases, too, if you look at the output, 1.4~rc1 just fixed a report-test-as-always-successful case …) Perhaps that test shouldn't be critical as we don't do much with the fields (its about ordering them in output), but then again if it isn't on the critical path we might end up desyncing for years again… the team was discussing this a bit yesterday on IRC with no direct outcome, but there will be one eventually… anyway, not a regression of 1.4 and harmless as such. There is another testcase regression hidden on Debian infra as its running the tests on amd64: One test calls: date -d '0-12-25' which is an invalid date on 32bit architectures… as the test is about the day much more than the year a future release is going to change years. We could be doing another upload to fix this I guess if you prefer, but perhaps its better to get that huge diff out of the way first and deal with these minor things later. We^WJulian will do as you prefer. ;P Best regards David Kalnischkies signature.asc Description: PGP signature
Bug#854631: unblock: kodi/2:17.0+dfsg1-2
Hi Jonathan, 2017-02-08 22:04 GMT+01:00 Jonathan Wiltshire : > Control: tag -1 confirmed moreinfo > > On Wed, Feb 08, 2017 at 09:51:32PM +0100, Balint Reczey wrote: >> Current kodi version in Stretch is a Release Candidate >> (2:17.0~rc3+dfsg1-2) while upstream just released final >> Kodi 17.0. >> >> I believe the final version would be a better fit for >> Stretch, while the diff between rc3 and final contains >> quite a few bug fixes and translation updates: >> >> https://github.com/xbmc/xbmc/compare/4d93228e19afa928d08327...a10c5048f2487bd9b2dc1f35d2fee48a2594 > > Skimming that comparison I'm inclined to agree. Please be prepared to take > prompt action (which might include reverting) if there are regressions > though. > > Please go ahead to unstable and update this bug. Thanks, it has been accepted to unstable. Cheers, Balint
Bug#854651: unblock: debootstrap/1.0.88
Niels Thykier (2017-02-09): > Steve McIntyre: > > Package: release.debian.org > > Severity: normal > > User: release.debian@packages.debian.org > > Usertags: unblock > > > > Hey folks, > > > > Please unblock debootstrap 1.0.88 > > > > We have a tiny fix for #836525, which will allow debootstrap to deal > > with arch-qualified dependencies. It'll be a major PITA if debootstrap > > can't deal with these in stretch. > > > > KiBi already knows about this upload and is happy AFAIK. He and I have > > both tested the patch. > > > > [...] > > > > Unblocked from my PoV. For good measure, I'll just have KiBi confirm > that it is not going to disturb any test/release planning for d-i atm. :) It would be nice if one could address #817236 at some point. Fixing other bugs is nice but… Fine for the unblock anyway. KiBi. signature.asc Description: Digital signature
Bug#854674: unblock: puppet/4.8.2-2
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package puppet. 4.8.2-2 fixes a critical bug (#854487) introduced in 4.8.1-3. In short, the puppet package will enable the puppet service by default and puppet will try to connect to the 'puppet' host and receive configuration, which may or may not be intended. Previously, our safeguard against this was to start the puppet service, but leave the agent locked, which meant it would not apply any configuration whatsoever. Unfortunately, this proved to be fragile and stopped working when the agent lock path changed. The fix for this in unstable is to simply not enable the service on new installations at all, rather than enable it but lock the agent. This is a better approach for a number of reasons (resource waste, many systems running puppet under cron anyway etc). The change is properly documented, and also handles the upgrade path from Jessie. See the attached source debdiff for details. unblock puppet/4.8.2-2 diff -Nru puppet-4.8.2/debian/changelog puppet-4.8.2/debian/changelog --- puppet-4.8.2/debian/changelog 2017-01-23 14:39:14.0 +0200 +++ puppet-4.8.2/debian/changelog 2017-02-08 15:24:55.0 +0200 @@ -1,3 +1,18 @@ +puppet (4.8.2-2) unstable; urgency=high + + * Do not enable the puppet service by default on fresh installs +(Closes: #854487). ++ Preserve the agent lock on upgrade from 3.x to safeguard upgrades from + Jessie systems where puppet was installed but never used. + * Update the DEP-8 tests to check that the service is disabled. + * Strip the agent locking logic from puppet.preinst now that we disable the +service by default. + * Add a debian/NEWS entry documenting the disabled service. + * Update the information in README.Debian and remove the (now obsolete) +paragraph about stored configs. + + -- Apollon Oikonomopoulos Wed, 08 Feb 2017 15:24:55 +0200 + puppet (4.8.2-1) unstable; urgency=medium * New upstream bugfix release. diff -Nru puppet-4.8.2/debian/NEWS puppet-4.8.2/debian/NEWS --- puppet-4.8.2/debian/NEWS 2017-01-23 14:37:53.0 +0200 +++ puppet-4.8.2/debian/NEWS 2017-02-08 15:24:55.0 +0200 @@ -1,3 +1,21 @@ +puppet (4.8.2-2) unstable; urgency=high + + As of 4.8.2-2, the puppet service is not enabled by default on new + installations and has to be manually enabled using + + systemctl enable puppet.service + or + update-rc.d puppet enable + + if desired. Note that upgrades from previous puppet versions are not + affected by this change and will preserve the service status. + + Since some versions of the package shipped with the service enabled by + default, if you are upgrading please check and make sure that the service on + your system is properly enabled or disabled to match your preference. + + -- Apollon Oikonomopoulos Wed, 08 Feb 2017 17:43:52 +0200 + puppet (4.8.1-2) unstable; urgency=medium The Ruby Puppet master as shipped in Debian can currently handle Puppet 3.x diff -Nru puppet-4.8.2/debian/puppet.postinst puppet-4.8.2/debian/puppet.postinst --- puppet-4.8.2/debian/puppet.postinst 2017-01-23 14:37:53.0 +0200 +++ puppet-4.8.2/debian/puppet.postinst 2017-02-08 15:24:55.0 +0200 @@ -31,15 +31,24 @@ # Create folders common to "puppet" and "puppetmaster", which need # to be owned by the "puppet" user install --owner puppet --group puppet --directory \ - /var/lib/puppet/state + /var/cache/puppet/state - # Between 4.4.1-2 and 4.8.1-3, puppet was called 'puppet-agent' - # Preserve the systemd and SysV service states - if [ -n "$2" ] && dpkg --compare-versions "$2" gt "4.4.1-2~" && \ + if [ -z "$2" ]; then + # Disable the service by default on new installations + update-rc.d puppet defaults >/dev/null || true + update-rc.d puppet disable >/dev/null || true + elif [ -n "$2" ] && dpkg --compare-versions "$2" gt "4.4.2-1~" && \ dpkg --compare-versions "$2" lt "4.8.1-3~"; then + # Between 4.4.2-1 and 4.8.1-3, puppet was called 'puppet-agent' + # Preserve the systemd and SysV service states if deb-systemd-helper debian-installed puppet-agent.service; then - if ! deb-systemd-helper --quiet was-enabled puppet-agent.service; then -deb-systemd-helper unmask puppet.service >/dev/null || true + # dh_systemd_enable will not enable the service by + # default as of 4.8.2-2; enable it if puppet-agent was + # enabled. + deb-systemd-helper unmask puppet.service >/dev/null || true + if deb-systemd-helper --quiet was-enabled puppet-agent.service; then +deb-systemd-helper enable puppet.service >/dev/null || true + else deb-systemd-helper update-state puppet.service >/dev/null || true fi fi @@ -53,6 +62,18 @@ # Remove puppet-agent's symlinks to avoid duplicate starts # under SysV update-rc.d -f puppet-agent remove >/dev/null || true + elif [ -n "$2" ] && dpkg --compare-versions "$2" lt "4.4.2-1~";
Bug#854676: unblock: xrdp/0.9.1-5 [RC]
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Please unblock package xrdp The upload fixes the release critical bug #854548. Unfortunately, a Forwarded: header in another patch file slipped in… I do not think it makes the package unfit for migration, but do I have to make a new upload and add it to the changelog? - --- xrdp-0.9.1/debian/changelog 2017-01-25 18:10:11.0 +0100 +++ xrdp-0.9.1/debian/changelog 2017-02-09 12:47:36.0 +0100 @@ -1,3 +1,9 @@ +xrdp (0.9.1-5) unstable; urgency=medium + + * Ensure creation of /run directory. (Closes: #854548) + + -- Dominik George Thu, 09 Feb 2017 12:47:36 +0100 + xrdp (0.9.1-4) unstable; urgency=high [ Thorsten Glaser ] diff -Nru xrdp-0.9.1/debian/patches/lfs.diff xrdp-0.9.1/debian/patches/lfs.diff - --- xrdp-0.9.1/debian/patches/lfs.diff 2017-01-25 18:03:33.0 +0100 +++ xrdp-0.9.1/debian/patches/lfs.diff 2017-02-06 21:57:37.0 +0100 @@ -1,5 +1,6 @@ From: Thorsten Glaser Subject: Enable Large File Support on (at least) 32-bit Linux +Forwarded: https://github.com/neutrinolabs/xrdp/issues/647 Reviewed-by: Dominik George --- a/configure.ac +++ b/configure.ac diff -Nru xrdp-0.9.1/debian/patches/systemd.diff xrdp-0.9.1/debian/patches/systemd.diff - --- xrdp-0.9.1/debian/patches/systemd.diff 2017-01-25 18:10:11.0 +0100 +++ xrdp-0.9.1/debian/patches/systemd.diff 2017-02-09 12:47:28.0 +0100 @@ -3,7 +3,7 @@ Forwarded: https://github.com/neutrinolabs/xrdp/pull/646 --- a/instfiles/xrdp-sesman.service +++ b/instfiles/xrdp-sesman.service - -@@ -1,12 +1,13 @@ +@@ -1,12 +1,14 @@ [Unit] Description=xrdp session manager -After=syslog.target network.target @@ -17,12 +17,13 @@ Type=forking -PIDFile=/var/run/xrdp-sesman.pid +PIDFile=/run/xrdp/xrdp-sesman.pid ++RuntimeDirectory=xrdp EnvironmentFile=-/etc/sysconfig/xrdp EnvironmentFile=-/etc/default/xrdp ExecStart=/usr/sbin/xrdp-sesman $SESMAN_OPTIONS --- a/instfiles/xrdp.service +++ b/instfiles/xrdp.service - -@@ -1,13 +1,16 @@ +@@ -1,13 +1,17 @@ [Unit] Description=xrdp daemon +Documentation=man:xrdp(8) man:xrdp.ini(5) @@ -34,6 +35,7 @@ Type=forking -PIDFile=/var/run/xrdp.pid +PIDFile=/run/xrdp/xrdp.pid ++RuntimeDirectory=xrdp EnvironmentFile=-/etc/sysconfig/xrdp EnvironmentFile=-/etc/default/xrdp +User=xrdp unblock xrdp/0.9.1-5 - -- System Information: Debian Release: 9.0 APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.9.0-1-amd64 (SMP w/4 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) -BEGIN PGP SIGNATURE- iQJ4BAEBCABiFiEEPJ1UpHV1wCb7F/0mt5o8FqDE8pYFAlicXqExGmh0dHBzOi8v d3d3LmRvbWluaWstZ2VvcmdlLmRlL2dwZy1wb2xpY3kudHh0LmFzYxIcbmlrQG5h dHVyYWxuZXQuZGUACgkQt5o8FqDE8pYoHg//Q08RXyzpYCe+zbR3e8o7YB2hhC+R zFKXct+nlpSR4TpXw3q26cx5GkeC/KsweHkuNJWN8MbNCw/TzLmBnF7YpFVj+/P0 hKoAnl07rr8mKtl6cp2MdYXR8/QsOSJR6tyvb8yHitrTpqt2MH6XhXvoMj0y6u3D 4bbb7vYdKSwmFVOGArdrW+T2tzfdrnzhrhIt6nYSJorpSAsMOAAwhZxtlNVnQh6q miNGVbgCnD7Dbo8Vlmv9WCiA4EzOe2HOw/XhBLX4LwqxUT2OuL56V2VYyc0Q6wGt nX1xBC9MFKdc+Uw4ukST0ZvUA75JyI7zqb02RjEbn5/iNlbVy07zOClfYb2OqoVI UZ67938yw3sAgHkm8E327er1LQEvTrGBB9PHsp9BJjJeR7w6CEU6zwLIaw/ZAJrY AiYU8/oAw38FzpPp5lCOuStCdP9IlrD09CZG67HbrJl+YWU2DkdoPEqNJ8649s75 XzobFAR40KTaemD81+zVEI8JUI3g6MA5yNAWvh9Qk+tm3kQizBmJ/4jYnrA89EcV 0CGVhW9ibCFUou2QWde2M5U04UwrChCU5AprqEwXMg8BTUvrTV8gxuOpVmGZf1Bh t7uDagV2XFKwoahoYlM2b9yUCLBgWnSNwRC8aCKDXlOGcWT4M9orYsHYhpr11y9O nvAX54I8gPbzr6I= =jNIf -END PGP SIGNATURE-
Bug#854678: unblock: lasagne/0.1+git20160728.8b66737-2
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Hi release team, please unblock package lasagne. The new upload closes RC bug #834910. Please see the attached debdiff for changes. Thank you, Daniel Stender unblock lasagne/0.1+git20160728.8b66737-2 -- System Information: Debian Release: stretch/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 4.8.0-2-amd64 (SMP w/4 CPU cores) Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) diff -Nru lasagne-0.1+git20160728.8b66737/debian/changelog lasagne-0.1+git20160728.8b66737/debian/changelog --- lasagne-0.1+git20160728.8b66737/debian/changelog 2016-08-19 18:46:45.0 +0200 +++ lasagne-0.1+git20160728.8b66737/debian/changelog 2017-02-09 12:25:30.0 +0100 @@ -1,3 +1,10 @@ +lasagne (0.1+git20160728.8b66737-2) unstable; urgency=medium + + * Use inspect.signature instead of inspect.getargspec if possible +(Closes: #834910) [Ole Streicher]. + + -- Daniel Stender Thu, 09 Feb 2017 12:25:30 +0100 + lasagne (0.1+git20160728.8b66737-1) unstable; urgency=medium * Initial release (Closes: #818641). diff -Nru lasagne-0.1+git20160728.8b66737/debian/patches/remove-deprecated.patch lasagne-0.1+git20160728.8b66737/debian/patches/remove-deprecated.patch --- lasagne-0.1+git20160728.8b66737/debian/patches/remove-deprecated.patch 1970-01-01 01:00:00.0 +0100 +++ lasagne-0.1+git20160728.8b66737/debian/patches/remove-deprecated.patch 2017-02-09 12:25:24.0 +0100 @@ -0,0 +1,42 @@ +Author: Ole Streicher +Description: Use inspect.signature instead of inspect.getargspec if possible + inspect.getargspec is deprectated in Python 3.5 and causes a warning. + The deprecation warning caused failures in test_get_output_with_unused_kwarg and + test_get_output_with_no_unused_kwarg. +Bug: https://bugs.debian.org/834910 +Forwarded: https://github.com/Lasagne/Lasagne/pull/797 +--- a/lasagne/layers/helper.py b/lasagne/layers/helper.py +@@ -1,6 +1,6 @@ + from collections import deque + from difflib import get_close_matches +-from inspect import getargspec ++import inspect + from itertools import chain + from warnings import warn + +@@ -9,6 +9,15 @@ + + from .. import utils + ++def getargs(callable): ++try: ++pars = inspect.signature(callable).parameters ++return (list(pars.keys()), ++tuple(p.default for p in pars.values() ++ if p.default is not p.empty)) ++except AttributeError: ++name, _, _, defaults = inspect.getargspec(callable) ++return (name, defaults) + + __all__ = [ + "get_all_layers", +@@ -190,7 +199,7 @@ + % layer) + all_outputs[layer] = layer.get_output_for(layer_inputs, **kwargs) + try: +-names, _, _, defaults = getargspec(layer.get_output_for) ++names, defaults = getargs(layer.get_output_for) + except TypeError: + # If introspection is not possible, skip it + pass diff -Nru lasagne-0.1+git20160728.8b66737/debian/patches/series lasagne-0.1+git20160728.8b66737/debian/patches/series --- lasagne-0.1+git20160728.8b66737/debian/patches/series 2016-08-18 20:59:52.0 +0200 +++ lasagne-0.1+git20160728.8b66737/debian/patches/series 2017-02-09 12:15:56.0 +0100 @@ -1,2 +1,3 @@ pytest-no-cov-pep8.patch use-mathjax-package.patch +remove-deprecated.patch diff -Nru lasagne-0.1+git20160728.8b66737/debian/rules lasagne-0.1+git20160728.8b66737/debian/rules --- lasagne-0.1+git20160728.8b66737/debian/rules 2016-08-18 20:59:52.0 +0200 +++ lasagne-0.1+git20160728.8b66737/debian/rules 2017-02-09 12:15:56.0 +0100 @@ -8,7 +8,7 @@ dh $@ --with python2,python3,sphinxdoc --buildsystem=pybuild override_dh_auto_test: - PYBUILD_SYSTEM=custom PYBUILD_TEST_ARGS="{interpreter} -m pytest -v -rs lasagne/" dh_auto_test || true # 2 fails with Python 3.5 remain + PYBUILD_SYSTEM=custom PYBUILD_TEST_ARGS="{interpreter} -m pytest -v -rs lasagne/" dh_auto_test override_dh_auto_install: dh_auto_install
Bug#854685: unblock: viewvc/1.1.26-1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Hello, the Security Team would like to request the unblocking of viewvc, which fixes #854681 (CVE-2017-5938, XSS). DSA-3784-1 was just issued, fixing this same issue in jessie-security. The debdiff (below) is a tad larger than it ought to be, because: 1. all copyright dates were updated to include "2017" 2. the source wasn't repacked to omit Windows-specific code, like it was in 1.1.25+repack-1. However, the only actual change is indeed the fix for CVE-2017-5938. Here is the debdiff: diff -Nru viewvc-1.1.25+repack/bin/asp/query.asp viewvc-1.1.26/bin/asp/query.asp --- viewvc-1.1.25+repack/bin/asp/query.asp 2016-09-15 21:38:32.0 +0200 +++ viewvc-1.1.26/bin/asp/query.asp 2017-01-25 00:07:15.0 +0100 @@ -3,7 +3,7 @@ # -*-python-*- # -# Copyright (C) 1999-2015 The ViewCVS Group. All Rights Reserved. +# Copyright (C) 1999-2017 The ViewCVS Group. All Rights Reserved. # # By using this file, you agree to the terms and conditions set forth in # the LICENSE.html file which can be found at the top level of the ViewVC diff -Nru viewvc-1.1.25+repack/bin/asp/viewvc.asp viewvc-1.1.26/bin/asp/viewvc.asp --- viewvc-1.1.25+repack/bin/asp/viewvc.asp 2016-09-15 21:38:32.0 +0200 +++ viewvc-1.1.26/bin/asp/viewvc.asp2017-01-25 00:07:15.0 +0100 @@ -3,7 +3,7 @@ # -*-python-*- # -# Copyright (C) 1999-2015 The ViewCVS Group. All Rights Reserved. +# Copyright (C) 1999-2017 The ViewCVS Group. All Rights Reserved. # # By using this file, you agree to the terms and conditions set forth in # the LICENSE.html file which can be found at the top level of the ViewVC diff -Nru viewvc-1.1.25+repack/bin/cgi/query.cgi viewvc-1.1.26/bin/cgi/query.cgi --- viewvc-1.1.25+repack/bin/cgi/query.cgi 2016-09-15 21:38:32.0 +0200 +++ viewvc-1.1.26/bin/cgi/query.cgi 2017-01-25 00:07:15.0 +0100 @@ -1,7 +1,7 @@ #!/usr/bin/env python # -*-python-*- # -# Copyright (C) 1999-2015 The ViewCVS Group. All Rights Reserved. +# Copyright (C) 1999-2017 The ViewCVS Group. All Rights Reserved. # # By using this file, you agree to the terms and conditions set forth in # the LICENSE.html file which can be found at the top level of the ViewVC diff -Nru viewvc-1.1.25+repack/bin/cgi/viewvc.cgi viewvc-1.1.26/bin/cgi/viewvc.cgi --- viewvc-1.1.25+repack/bin/cgi/viewvc.cgi 2016-09-15 21:38:32.0 +0200 +++ viewvc-1.1.26/bin/cgi/viewvc.cgi2017-01-25 00:07:15.0 +0100 @@ -1,7 +1,7 @@ #!/usr/bin/env python # -*-python-*- # -# Copyright (C) 1999-2015 The ViewCVS Group. All Rights Reserved. +# Copyright (C) 1999-2017 The ViewCVS Group. All Rights Reserved. # # By using this file, you agree to the terms and conditions set forth in # the LICENSE.html file which can be found at the top level of the ViewVC diff -Nru viewvc-1.1.25+repack/bin/cvsdbadmin viewvc-1.1.26/bin/cvsdbadmin --- viewvc-1.1.25+repack/bin/cvsdbadmin 2016-09-15 21:38:32.0 +0200 +++ viewvc-1.1.26/bin/cvsdbadmin2017-01-25 00:07:15.0 +0100 @@ -1,7 +1,7 @@ #!/usr/bin/env python # -*-python-*- # -# Copyright (C) 1999-2015 The ViewCVS Group. All Rights Reserved. +# Copyright (C) 1999-2017 The ViewCVS Group. All Rights Reserved. # # By using this file, you agree to the terms and conditions set forth in # the LICENSE.html file which can be found at the top level of the ViewVC diff -Nru viewvc-1.1.25+repack/bin/loginfo-handler viewvc-1.1.26/bin/loginfo-handler --- viewvc-1.1.25+repack/bin/loginfo-handler2016-09-15 21:38:32.0 +0200 +++ viewvc-1.1.26/bin/loginfo-handler 2017-01-25 00:07:15.0 +0100 @@ -1,7 +1,7 @@ #!/usr/bin/env python # -*-python-*- # -# Copyright (C) 1999-2015 The ViewCVS Group. All Rights Reserved. +# Copyright (C) 1999-2017 The ViewCVS Group. All Rights Reserved. # # By using this file, you agree to the terms and conditions set forth in # the LICENSE.html file which can be found at the top level of the ViewVC diff -Nru viewvc-1.1.25+repack/bin/make-database viewvc-1.1.26/bin/make-database --- viewvc-1.1.25+repack/bin/make-database 2016-09-15 21:38:32.0 +0200 +++ viewvc-1.1.26/bin/make-database 2017-01-25 00:07:15.0 +0100 @@ -1,7 +1,7 @@ #!/usr/bin/env python # -*-python-*- # -# Copyright (C) 1999-2015 The ViewCVS Group. All Rights Reserved. +# Copyright (C) 1999-2017 The ViewCVS Group. All Rights Reserved. # # By using this file, you agree to the terms and conditions set forth in # the LICENSE.html file which can be found at the top level of the ViewVC diff -Nru viewvc-1.1.25+repack/bin/mod_python/handler.py viewvc-1.1.26/bin/mod_python/handler.py --- viewvc-1.1.25+repack/bin/mod_python/handler.py 2016-09-15 21:38:32.0 +0200 +++ viewvc-1.1.26/bin/mod_python/handler.py 2017-01-25 00:07:1
Bug#854700: unblock: libproxy/0.4.14-2
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Hi, Please unblock package libproxy I recently discovered that the networkmanager libproxy plugin was not listening to the correct NM event meaning that the cache of libproxy was not properly cleaned up in case of network topology change. After fixing that bug, I discovered that I could create a segfault in some situation when the cache was invalidated. The two patches have already been merged upstream Upstream bug: https://github.com/libproxy/libproxy/issues/58 and https://github.com/libproxy/libproxy/issues/59 unblock libproxy/0.4.14-2 Regards, Laurent Bigonville -- System Information: Debian Release: 9.0 APT prefers unstable-debug APT policy: (500, 'unstable-debug'), (500, 'unstable'), (1, 'experimental-debug'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.9.0-1-amd64 (SMP w/4 CPU cores) Locale: LANG=fr_BE.UTF-8, LC_CTYPE=fr_BE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) diff -Nru libproxy-0.4.14/debian/changelog libproxy-0.4.14/debian/changelog --- libproxy-0.4.14/debian/changelog2017-01-22 13:58:45.0 +0100 +++ libproxy-0.4.14/debian/changelog2017-02-08 12:17:50.0 +0100 @@ -1,3 +1,11 @@ +libproxy (0.4.14-2) unstable; urgency=medium + + * debian/patches/fix-clean-reload-cache.patch: Make sure that the PAC/WPAD +cache is cleanup when network topology changes and prevent a segfault in +the process, patches merged upstream. + + -- Laurent Bigonville Wed, 08 Feb 2017 12:17:50 +0100 + libproxy (0.4.14-1) unstable; urgency=medium * New upstream release. diff -Nru libproxy-0.4.14/debian/libgproxy1-plugin-gsettings.install libproxy-0.4.14/debian/libgproxy1-plugin-gsettings.install --- libproxy-0.4.14/debian/libgproxy1-plugin-gsettings.install 2013-11-26 02:22:50.0 +0100 +++ libproxy-0.4.14/debian/libgproxy1-plugin-gsettings.install 1970-01-01 01:00:00.0 +0100 @@ -1,2 +0,0 @@ -usr/lib/libproxy/0.4.7/modules/config_gnome3.so -usr/lib/libproxy/0.4.7/pxgsettings diff -Nru libproxy-0.4.14/debian/patches/fix-clean-reload-cache.patch libproxy-0.4.14/debian/patches/fix-clean-reload-cache.patch --- libproxy-0.4.14/debian/patches/fix-clean-reload-cache.patch 1970-01-01 01:00:00.0 +0100 +++ libproxy-0.4.14/debian/patches/fix-clean-reload-cache.patch 2017-02-07 16:48:06.0 +0100 @@ -0,0 +1,52 @@ +From 1bf46e951b9d35e2e5ad61c85b15f32496017247 Mon Sep 17 00:00:00 2001 +From: Laurent Bigonville +Date: Tue, 7 Feb 2017 16:02:29 +0100 +Subject: [PATCH] Use StateChanged signal instead of StateChange + +StateChange signal has been deprecated since NM 0.7 and has been +completely removed in 0.9, see: +https://developer.gnome.org/NetworkManager/0.9/ref-migrating.html + +Closes: #58 +--- + libproxy/modules/network_networkmanager.cpp | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/libproxy/modules/network_networkmanager.cpp b/libproxy/modules/network_networkmanager.cpp +index 5198860..546a8ee 100644 +--- a/libproxy/modules/network_networkmanager.cpp b/libproxy/modules/network_networkmanager.cpp +@@ -62,7 +62,7 @@ class networkmanager_network_extension : public network_extension { + + // If connection was successful, set it up + dbus_connection_set_exit_on_disconnect(conn, false); +- dbus_bus_add_match(conn, "type='signal',interface='" NM_DBUS_INTERFACE "',member='StateChange'", NULL); ++ dbus_bus_add_match(conn, "type='signal',interface='" NM_DBUS_INTERFACE "',member='StateChanged'", NULL); + dbus_connection_flush(conn); + } + +From 0bdcf9f9dbee67dee47694e0012fa891588abc89 Mon Sep 17 00:00:00 2001 +From: Laurent Bigonville +Date: Tue, 7 Feb 2017 16:05:00 +0100 +Subject: [PATCH] Set lasturl to NULL after free/delete + +It avoids the lasturl to be freed a 2nd time when the rewind() method is +called. + +Closes: #59 +--- + libproxy/modules/wpad_dns_alias.cpp | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/libproxy/modules/wpad_dns_alias.cpp b/libproxy/modules/wpad_dns_alias.cpp +index 669dccf..5b8c2e0 100644 +--- a/libproxy/modules/wpad_dns_alias.cpp b/libproxy/modules/wpad_dns_alias.cpp +@@ -39,6 +39,7 @@ class dns_alias_wpad_extension : public wpad_extension { + lastpac = *pac = lasturl->get_pac(); + if (!lastpac) { + delete lasturl; ++ lasturl = NULL; + return NULL; + } + diff -Nru libproxy-0.4.14/debian/patches/series libproxy-0.4.14/debian/patches/series --- libproxy-0.4.14/debian/patches/series 2017-01-22 13:49:57.0 +0100 +++ libproxy-0.4.14/debian/patches/series 2017-02-07 16:48:25.0 +0100 @@ -1 +1,2 @@ disable-pac-test.patch +fix-cle
Bug#854709: unblock: adwaita-icon-theme/3.22.0-2
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package adwaita-icon-theme. This fixes bug #853044 (of severity: important) — it was impossible to use the Adwaita-dark GTK+ 3 theme. The fix is a backport of two small upstream commits. The debdiff of what I uploaded is attached. unblock adwaita-icon-theme/3.22.0-2 -- Dmitry Shachnev diff -Nru gnome-themes-standard-3.22.2/debian/changelog gnome-themes-standard-3.22.2/debian/changelog --- gnome-themes-standard-3.22.2/debian/changelog 2016-10-12 17:22:33.0 +0300 +++ gnome-themes-standard-3.22.2/debian/changelog 2017-02-09 20:44:59.0 +0300 @@ -1,3 +1,10 @@ +gnome-themes-standard (3.22.2-2) unstable; urgency=medium + + * Backport upstream fixes to build and install the Adwaita dark theme +properly (closes: #853044). + + -- Dmitry Shachnev Thu, 09 Feb 2017 20:44:59 +0300 + gnome-themes-standard (3.22.2-1) unstable; urgency=medium [ Laurent Bigonville ] diff -Nru gnome-themes-standard-3.22.2/debian/patches/dark_theme.diff gnome-themes-standard-3.22.2/debian/patches/dark_theme.diff --- gnome-themes-standard-3.22.2/debian/patches/dark_theme.diff 1970-01-01 03:00:00.0 +0300 +++ gnome-themes-standard-3.22.2/debian/patches/dark_theme.diff 2017-02-09 20:44:59.0 +0300 @@ -0,0 +1,28 @@ +Description: build Adwaita-dark theme properly +Origin: upstream, commits: + https://git.gnome.org/browse/gnome-themes-standard/commit/?id=bf146e3ba9da90e2 + https://git.gnome.org/browse/gnome-themes-standard/commit/?id=ae703a57261c26ad +Last-Update: 2017-02-09 + +--- a/themes/Adwaita-dark/gtk-3.0/Makefile.am b/themes/Adwaita-dark/gtk-3.0/Makefile.am +@@ -1,4 +1,4 @@ +-themedir = $(datadir)/themes/Adwaita/gtk-3.0 ++themedir = $(datadir)/themes/Adwaita-dark/gtk-3.0 + + theme_DATA = gtk.css + +--- a/themes/Adwaita-dark/index.theme.in b/themes/Adwaita-dark/index.theme.in +@@ -1,9 +1,9 @@ + [X-GNOME-Metatheme] +-_Name=Adwaita ++_Name=Adwaita-dark + Type=X-GNOME-Metatheme + _Comment=There is only one + Encoding=UTF-8 +-GtkTheme=Adwaita ++GtkTheme=Adwaita-dark + MetacityTheme=Adwaita + IconTheme=Adwaita + CursorTheme=Adwaita diff -Nru gnome-themes-standard-3.22.2/debian/patches/series gnome-themes-standard-3.22.2/debian/patches/series --- gnome-themes-standard-3.22.2/debian/patches/series 2016-05-22 23:51:11.0 +0300 +++ gnome-themes-standard-3.22.2/debian/patches/series 2017-02-09 20:44:59.0 +0300 @@ -0,0 +1 @@ +dark_theme.diff signature.asc Description: PGP signature
Bug#854711: Unblocking package netkit-ftp-ssl, resolving #854460.
Package: release.debian.org Severity: important Tags: patch Being the maintainer of netkit-ftp-ssl, I request an unblocking of netkit-ftp-ssl in version 0.17.34+0.2-4. This upload resolves successfully the bug #854460 of severity 'important'. The problem is interoperability with TLS-able FTP servers, like Proftpd, which mandate that the data connection reuse the session identity set by the control channel. The presently available version in testing, 0.17.34+0.2-3, is not able to fetch files or get listings with TLS protection due to an accidental inactivation of function SSL_copy_session_id(). This is a legacy function, not documented in any manual page, and only mentioned in one file 'ssleay.txt' of the openssl archive. The debdiff reactivates this function call, which was commented out by me due to a misunderstanding. In addition, it turns out to be decisive to forbid the use of libssl in version 1.1 for the binary package. The reason being that libssl (>= 1.1.0) only succeeds to reuse the session identity a single time, yes really a single time, with the present unintrusive and long time used solution. Therefore I had to change the build dependency to read libssl1.0-dev | libssl-dev (<< 1.1.0~) Both changes are necessary and they lead also to a package that can be built directly in Wheezy without any changes, allowing trivial backporting. The packages netkit-ftp-ssl, linux-ftpd-ssl and netkit-telnet-ssl have seen substantial improvement for certificate verification and identification for this Debian release, but only the binary ftp-ssl is affected by the present issue. Best regards, Mats Erik Andersson, DM diff -Nru netkit-ftp-ssl-0.17.34+0.2/debian/changelog netkit-ftp-ssl-0.17.34+0.2/debian/changelog --- netkit-ftp-ssl-0.17.34+0.2/debian/changelog 2017-01-18 19:33:56.0 +0100 +++ netkit-ftp-ssl-0.17.34+0.2/debian/changelog 2017-02-08 18:39:46.0 +0100 @@ -1,3 +1,14 @@ +netkit-ftp-ssl (0.17.34+0.2-4) unstable; urgency=medium + + * Correctly reuse SSL session identity in data connection. +This suffices for libssl1.0, not for libssl1.1. (Closes: #854460) ++ debian/patches/700_prefer_tls.diff: Reactivate commented out + function call to SSL_copy_session_id(). ++ debian/control: Prefer libssl1.0-dev and condition libssl-dev + on "<< 1.1.0~" for trivial backporting. + + -- Mats Erik Andersson Wed, 08 Feb 2017 18:39:46 +0100 + netkit-ftp-ssl (0.17.34+0.2-3) unstable; urgency=low * Allow verification mode to print additional details about the diff -Nru netkit-ftp-ssl-0.17.34+0.2/debian/control netkit-ftp-ssl-0.17.34+0.2/debian/control --- netkit-ftp-ssl-0.17.34+0.2/debian/control 2017-01-10 15:37:21.0 +0100 +++ netkit-ftp-ssl-0.17.34+0.2/debian/control 2017-02-08 18:30:50.0 +0100 @@ -4,7 +4,7 @@ Maintainer: Mats Erik Andersson Uploaders: Alberto Gonzalez Iniesta Standards-Version: 3.9.8 -Build-Depends: debhelper (>= 9), libeditline-dev, libncurses5-dev, libssl-dev | libssl1.0-dev +Build-Depends: debhelper (>= 9), libeditline-dev, libncurses5-dev, libssl1.0-dev | libssl-dev (<< 1.1.0~) Package: ftp-ssl Architecture: any diff -Nru netkit-ftp-ssl-0.17.34+0.2/debian/patches/700_prefer_tls.diff netkit-ftp-ssl-0.17.34+0.2/debian/patches/700_prefer_tls.diff --- netkit-ftp-ssl-0.17.34+0.2/debian/patches/700_prefer_tls.diff 2017-01-18 19:33:41.0 +0100 +++ netkit-ftp-ssl-0.17.34+0.2/debian/patches/700_prefer_tls.diff 2017-02-08 15:39:49.0 +0100 @@ -23,7 +23,7 @@ . Author: Mats Erik Andersson Forwarded: no -Last-Update: 2017-01-18 +Last-Update: 2017-02-07 diff -Naurp netkit-ftp-0.17.debian/ftp/cmds.c netkit-ftp-0.17/ftp/cmds.c --- netkit-ftp-0.17.debian/ftp/cmds.c 2016-12-23 00:05:51.820239257 +0100 @@ -190,20 +190,8 @@ .Xr ftpd 8 , diff -Naurp netkit-ftp-0.17.debian/ftp/ftp.c netkit-ftp-0.17/ftp/ftp.c --- netkit-ftp-0.17.debian/ftp/ftp.c 2016-12-23 00:05:52.380213160 +0100 -+++ netkit-ftp-0.17/ftp/ftp.c 2017-01-18 19:19:27.145786765 +0100 -@@ -1672,7 +1672,10 @@ dataconn(const char *lmode) -* this quick assuming Eric has this going -* okay! ;-) -*/ -- SSL_copy_session_id(ssl_data_con,ssl_con); -+ /* MEA: Do not use deterministic session identities -+ * in a subordinate connection. -+ */ -+ //SSL_copy_session_id(ssl_data_con,ssl_con); - - /* we are doing I/O and not using select so -* it is "safe" to read ahead -@@ -1686,12 +1689,17 @@ dataconn(const char *lmode) netkit-ftp-0.17/ftp/ftp.c 2017-02-07 23:35:32.871433587 +0100 +@@ -1686,12 +1686,17 @@ dataconn(const char *lmode) if ((ret=SSL_connect(ssl_data_con))<=0) { static char errbuf[1024]; @@ -224,7 +212,7 @@ fflush(stderr); /* abort time methinks ... */ -@@ -2111,16 +2119,50 @@ printbytes(off_t bytes) +@@ -2111,16 +2116,50 @@ printbytes(off_t by
Processed: Re: Bug#854619: unblock: svtplay-dl/1.9.1-0.1
Processing control commands: > tag -1 - moreinfo Bug #854619 [release.debian.org] unblock: svtplay-dl/1.9.1-0.1 Removed tag(s) moreinfo. -- 854619: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854619 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#854619: unblock: svtplay-dl/1.9.1-0.1
Control: tag -1 - moreinfo On Wed, Feb 08, 2017 at 08:11:25PM +, Jonathan Wiltshire wrote: > On Wed, Feb 08, 2017 at 07:05:40PM +0100, Mattia Rizzolo wrote: > > Please consider unblocking the package svtplay-dl > > > > Well, the delta is quite small despite being a new upstream release, and > > it is needed to make the package usable again. > > I disagree, the bug it closes specifically mentions a targetted fix. Your > upload is a much more invasive new upstream. Does the targetted fix not > work? It probably does, but 1) the relevant commit comes after several dozen other commits since the version currently in stretch (actually it happened "right before" the 1.9.1 release); I can't assume that just because the patch applies it doesn't depend on some subtle change done before 2) if possible, I always prefer something that an upstream says it's "good" rather than mess with patches, especially in small projects like this where that's actually feasible 3) if you glances at the upstream commit log you can see there are at least 3 more crash fixes, and I deem crash important enough to be fixed if possible Furthermore this is a leaf package, and even if it's true the Debian freeze doesn't distinguish between leaf and non-leaf or priority of the package I hope you can see how there is no way this update could jeopardize the final release. > We find packages like this are often broken by service API changes during a > stable lifetime; is svtplay-dl suitable for a stable release? Another version is available in jessie, and ttbomk everything went well, so I'd say it is, yes. Anyway, this is a question for the actual maintainer :) -- regards, Mattia Rizzolo GPG Key: 66AE 2B4A FCCF 3F52 DA18 4D18 4B04 3FCD B944 4540 .''`. more about me: https://mapreri.org : :' : Launchpad user: https://launchpad.net/~mapreri `. `'` Debian QA page: https://qa.debian.org/developer.php?login=mattia `- signature.asc Description: PGP signature
Processed: severity of 854711 is normal, tagging 854711, user release.debian....@packages.debian.org ...
Processing commands for cont...@bugs.debian.org: > severity 854711 normal Bug #854711 [release.debian.org] Unblocking package netkit-ftp-ssl, resolving #854460. Severity set to 'normal' from 'important' > tags 854711 - patch Bug #854711 [release.debian.org] Unblocking package netkit-ftp-ssl, resolving #854460. Removed tag(s) patch. > user release.debian@packages.debian.org Setting user to release.debian@packages.debian.org (was a...@adam-barratt.org.uk). > usertags 854711 unblock There were no usertags set. Usertags are now: unblock. > thanks Stopping processing here. Please contact me if you need assistance. -- 854711: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854711 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#854236: unblock: inkscape 0.92.1
Control: tags -1 confirmed Mattia Rizzolo: > Control: tag -1 - moreinfo > > On Thu, Feb 09, 2017 at 06:39:00AM +, Niels Thykier wrote: >> I am ok with this provided: >> >> * We aim for 0.92.1 once that is released (assuming it is released >>soon) > > Yes, that's my plan (0.92.2 is "planned" for April/May - I'm dreaming of > seeing stretch as stable by "then"). 0.92.1 is scheduled for this week > end/early next week, should be soon enough. > >> * You are ready to react promptly to regressions > > Sure. > >> * You are ready to promptly downgrade back to 0.92.0-4 plus minimal >>patches for fixing the text-height issue for the worst case. > > This would be very annoying, but yes, I'm ok to do the downgrade if for > some odd reason everything crumbles and there is no good way forward. > > > Thank you! > Please go ahead then :) ~Niels
Processed: Re: Bug#854236: unblock: inkscape 0.92.1
Processing control commands: > tags -1 confirmed Bug #854236 [release.debian.org] unblock: inkscape 0.92.1 Bug #854247 [release.debian.org] unblock: inkscape 0.92.1 Added tag(s) confirmed. Added tag(s) confirmed. -- 854236: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854236 854247: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854247 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#854524: marked as done (unblock: linux/4.9.6-3)
Your message dated Thu, 9 Feb 2017 22:51:23 +0100 with message-id <20170209215121.ga25...@ugent.be> and subject line Re: Bug#854524: unblock: linux/4.9.6-3 has caused the Debian Bug report #854524, regarding unblock: linux/4.9.6-3 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 854524: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854524 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package linux This includes many important bug fixes, including security fixes, and new hardware support. It also disables logfs, which is being removed in Linux 4.10 and therefore would not be supportable in stretch. The debdiff would be too large for you to review, unfortunately. Instead, here are the changelog entries: linux (4.9.6-3) unstable; urgency=medium * btree,musb,st_sensors: Ignore ABI changes (fixes FTBFS on armel,armhf) -- Ben Hutchings Sat, 28 Jan 2017 16:11:16 + linux (4.9.6-2) unstable; urgency=medium * linux-cpupower: Use dh-exec architecture filtering for x86-specific files (fixes FTBFS on !x86) -- Ben Hutchings Fri, 27 Jan 2017 22:09:50 + linux (4.9.6-1) unstable; urgency=medium * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.3 - iio: common: st_sensors: fix channel data parsing - [mips] staging: octeon: Call SET_NETDEV_DEV() - ALSA: hda - Fix up GPIO for ASUS ROG Ranger - ALSA: hda - Apply asus-mode8 fixup to ASUS X71SL - ALSA: usb-audio: Fix irq/process data synchronization - fscrypt: fix renaming and linking special files - [hppa/parisc] Add line-break when printing segfault info - [hppa/parisc] Mark cr16 clocksource unstable on SMP systems - HID: sensor-hub: Move the memset to sensor_hub_get_feature() - mac80211: initialize fast-xmit 'info' later - asm-prototypes: Clear any CPP defines before declaring the functions - [x86] drm/i915: Fix oopses in the overlay code due to i915_gem_active stuff - [x86] drm/i915: Fix oops in overlay due to frontbuffer tracking - [x86] drm/i915: Force VDD off on the new power seqeuencer before starting to use it - [x86] drm/i915: Initialize overlay->last_flip properly - [x86] KVM: reset MMU on KVM_SET_VCPU_EVENTS - [armhf] usb: musb: core: add clear_ep_rxintr() to musb_platform_ops - [armhf] usb: musb: dsps: implement clear_ep_rxintr() callback - usb: storage: unusual_uas: Add JMicron JMS56x to unusual device - usb: gadgetfs: restrict upper bound on device configuration size - USB: gadgetfs: fix unbounded memory allocation bug - USB: gadgetfs: fix use-after-free bug - USB: gadgetfs: fix checks of wTotalLength in config descriptors - USB: fix problems with duplicate endpoint addresses - usb: gadget: composite: Test get_alt() presence instead of set_alt() - [arm64, armhf] usb: dwc3: core: avoid Overflow events - usb: xhci: fix possible wild pointer - [x86] usb: xhci: apply XHCI_PME_STUCK_QUIRK to Intel Apollo Lake - xhci: free xhci virtual devices with leaf nodes first - usb: xhci: fix return value of xhci_setup_device() - usb: host: xhci: Fix possible wild pointer when handling abort command - xhci: Handle command completion and timeout race - usb: xhci: hold lock over xhci_abort_cmd_ring() - USB: serial: omninet: fix NULL-derefs at open and disconnect - USB: serial: quatech2: fix sleep-while-atomic in close - USB: serial: pl2303: fix NULL-deref at open - USB: serial: keyspan_pda: verify endpoints at probe - USB: serial: spcp8x5: fix NULL-deref at open - USB: serial: io_ti: fix NULL-deref at open - USB: serial: io_ti: fix another NULL-deref at open - USB: serial: io_ti: fix I/O after disconnect - USB: serial: iuu_phoenix: fix NULL-deref at open - USB: serial: garmin_gps: fix memory leak on failed URB submit - USB: serial: ti_usb_3410_5052: fix NULL-deref at open - USB: serial: io_edgeport: fix NULL-deref at open - USB: serial: oti6858: fix NULL-deref at open - USB: serial: cyberjack: fix NULL-deref at open - USB: serial: kobil_sct: fix NULL-deref in write - USB: serial: mos7840: fix NULL-deref at open - USB: serial: mos7720: fix NULL-deref at open - USB: serial: mos7720: fix use-after-free on probe errors - USB: serial: mos7720: fix parport use-after-free on probe errors - USB: serial: mos7720: fix parallel probe - usb: xhci-m
Bug#854676: marked as done (unblock: xrdp/0.9.1-5 [RC])
Your message dated Thu, 9 Feb 2017 23:03:00 +0100 with message-id <20170209220258.ga25...@ugent.be> and subject line Re: unblock: xrdp/0.9.1-5 [RC] has caused the Debian Bug report #854676, regarding unblock: xrdp/0.9.1-5 [RC] to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 854676: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854676 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Please unblock package xrdp The upload fixes the release critical bug #854548. Unfortunately, a Forwarded: header in another patch file slipped in… I do not think it makes the package unfit for migration, but do I have to make a new upload and add it to the changelog? - --- xrdp-0.9.1/debian/changelog 2017-01-25 18:10:11.0 +0100 +++ xrdp-0.9.1/debian/changelog 2017-02-09 12:47:36.0 +0100 @@ -1,3 +1,9 @@ +xrdp (0.9.1-5) unstable; urgency=medium + + * Ensure creation of /run directory. (Closes: #854548) + + -- Dominik George Thu, 09 Feb 2017 12:47:36 +0100 + xrdp (0.9.1-4) unstable; urgency=high [ Thorsten Glaser ] diff -Nru xrdp-0.9.1/debian/patches/lfs.diff xrdp-0.9.1/debian/patches/lfs.diff - --- xrdp-0.9.1/debian/patches/lfs.diff 2017-01-25 18:03:33.0 +0100 +++ xrdp-0.9.1/debian/patches/lfs.diff 2017-02-06 21:57:37.0 +0100 @@ -1,5 +1,6 @@ From: Thorsten Glaser Subject: Enable Large File Support on (at least) 32-bit Linux +Forwarded: https://github.com/neutrinolabs/xrdp/issues/647 Reviewed-by: Dominik George --- a/configure.ac +++ b/configure.ac diff -Nru xrdp-0.9.1/debian/patches/systemd.diff xrdp-0.9.1/debian/patches/systemd.diff - --- xrdp-0.9.1/debian/patches/systemd.diff 2017-01-25 18:10:11.0 +0100 +++ xrdp-0.9.1/debian/patches/systemd.diff 2017-02-09 12:47:28.0 +0100 @@ -3,7 +3,7 @@ Forwarded: https://github.com/neutrinolabs/xrdp/pull/646 --- a/instfiles/xrdp-sesman.service +++ b/instfiles/xrdp-sesman.service - -@@ -1,12 +1,13 @@ +@@ -1,12 +1,14 @@ [Unit] Description=xrdp session manager -After=syslog.target network.target @@ -17,12 +17,13 @@ Type=forking -PIDFile=/var/run/xrdp-sesman.pid +PIDFile=/run/xrdp/xrdp-sesman.pid ++RuntimeDirectory=xrdp EnvironmentFile=-/etc/sysconfig/xrdp EnvironmentFile=-/etc/default/xrdp ExecStart=/usr/sbin/xrdp-sesman $SESMAN_OPTIONS --- a/instfiles/xrdp.service +++ b/instfiles/xrdp.service - -@@ -1,13 +1,16 @@ +@@ -1,13 +1,17 @@ [Unit] Description=xrdp daemon +Documentation=man:xrdp(8) man:xrdp.ini(5) @@ -34,6 +35,7 @@ Type=forking -PIDFile=/var/run/xrdp.pid +PIDFile=/run/xrdp/xrdp.pid ++RuntimeDirectory=xrdp EnvironmentFile=-/etc/sysconfig/xrdp EnvironmentFile=-/etc/default/xrdp +User=xrdp unblock xrdp/0.9.1-5 - -- System Information: Debian Release: 9.0 APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.9.0-1-amd64 (SMP w/4 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) -BEGIN PGP SIGNATURE- iQJ4BAEBCABiFiEEPJ1UpHV1wCb7F/0mt5o8FqDE8pYFAlicXqExGmh0dHBzOi8v d3d3LmRvbWluaWstZ2VvcmdlLmRlL2dwZy1wb2xpY3kudHh0LmFzYxIcbmlrQG5h dHVyYWxuZXQuZGUACgkQt5o8FqDE8pYoHg//Q08RXyzpYCe+zbR3e8o7YB2hhC+R zFKXct+nlpSR4TpXw3q26cx5GkeC/KsweHkuNJWN8MbNCw/TzLmBnF7YpFVj+/P0 hKoAnl07rr8mKtl6cp2MdYXR8/QsOSJR6tyvb8yHitrTpqt2MH6XhXvoMj0y6u3D 4bbb7vYdKSwmFVOGArdrW+T2tzfdrnzhrhIt6nYSJorpSAsMOAAwhZxtlNVnQh6q miNGVbgCnD7Dbo8Vlmv9WCiA4EzOe2HOw/XhBLX4LwqxUT2OuL56V2VYyc0Q6wGt nX1xBC9MFKdc+Uw4ukST0ZvUA75JyI7zqb02RjEbn5/iNlbVy07zOClfYb2OqoVI UZ67938yw3sAgHkm8E327er1LQEvTrGBB9PHsp9BJjJeR7w6CEU6zwLIaw/ZAJrY AiYU8/oAw38FzpPp5lCOuStCdP9IlrD09CZG67HbrJl+YWU2DkdoPEqNJ8649s75 XzobFAR40KTaemD81+zVEI8JUI3g6MA5yNAWvh9Qk+tm3kQizBmJ/4jYnrA89EcV 0CGVhW9ibCFUou2QWde2M5U04UwrChCU5AprqEwXMg8BTUvrTV8gxuOpVmGZf1Bh t7uDagV2XFKwoahoYlM2b9yUCLBgWnSNwRC8aCKDXlOGcWT4M9orYsHYhpr11y9O nvAX54I8gPbzr6I= =jNIf -END PGP SIGNATURE- --- End Message --- --- Begin Message --- Hi, On Thu, Feb 09, 2017 at 01:20:50PM +0100, Dominik George wrote: > Please unblock package xrdp Unblocked. Thanks, Ivo--- End Message ---
Bug#854678: marked as done (unblock: lasagne/0.1+git20160728.8b66737-2)
Your message dated Thu, 9 Feb 2017 23:55:20 +0100 with message-id <20170209225518.ga26...@ugent.be> and subject line Re: unblock: lasagne/0.1+git20160728.8b66737-2 has caused the Debian Bug report #854678, regarding unblock: lasagne/0.1+git20160728.8b66737-2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 854678: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854678 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Hi release team, please unblock package lasagne. The new upload closes RC bug #834910. Please see the attached debdiff for changes. Thank you, Daniel Stender unblock lasagne/0.1+git20160728.8b66737-2 -- System Information: Debian Release: stretch/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 4.8.0-2-amd64 (SMP w/4 CPU cores) Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) diff -Nru lasagne-0.1+git20160728.8b66737/debian/changelog lasagne-0.1+git20160728.8b66737/debian/changelog --- lasagne-0.1+git20160728.8b66737/debian/changelog 2016-08-19 18:46:45.0 +0200 +++ lasagne-0.1+git20160728.8b66737/debian/changelog 2017-02-09 12:25:30.0 +0100 @@ -1,3 +1,10 @@ +lasagne (0.1+git20160728.8b66737-2) unstable; urgency=medium + + * Use inspect.signature instead of inspect.getargspec if possible +(Closes: #834910) [Ole Streicher]. + + -- Daniel Stender Thu, 09 Feb 2017 12:25:30 +0100 + lasagne (0.1+git20160728.8b66737-1) unstable; urgency=medium * Initial release (Closes: #818641). diff -Nru lasagne-0.1+git20160728.8b66737/debian/patches/remove-deprecated.patch lasagne-0.1+git20160728.8b66737/debian/patches/remove-deprecated.patch --- lasagne-0.1+git20160728.8b66737/debian/patches/remove-deprecated.patch 1970-01-01 01:00:00.0 +0100 +++ lasagne-0.1+git20160728.8b66737/debian/patches/remove-deprecated.patch 2017-02-09 12:25:24.0 +0100 @@ -0,0 +1,42 @@ +Author: Ole Streicher +Description: Use inspect.signature instead of inspect.getargspec if possible + inspect.getargspec is deprectated in Python 3.5 and causes a warning. + The deprecation warning caused failures in test_get_output_with_unused_kwarg and + test_get_output_with_no_unused_kwarg. +Bug: https://bugs.debian.org/834910 +Forwarded: https://github.com/Lasagne/Lasagne/pull/797 +--- a/lasagne/layers/helper.py b/lasagne/layers/helper.py +@@ -1,6 +1,6 @@ + from collections import deque + from difflib import get_close_matches +-from inspect import getargspec ++import inspect + from itertools import chain + from warnings import warn + +@@ -9,6 +9,15 @@ + + from .. import utils + ++def getargs(callable): ++try: ++pars = inspect.signature(callable).parameters ++return (list(pars.keys()), ++tuple(p.default for p in pars.values() ++ if p.default is not p.empty)) ++except AttributeError: ++name, _, _, defaults = inspect.getargspec(callable) ++return (name, defaults) + + __all__ = [ + "get_all_layers", +@@ -190,7 +199,7 @@ + % layer) + all_outputs[layer] = layer.get_output_for(layer_inputs, **kwargs) + try: +-names, _, _, defaults = getargspec(layer.get_output_for) ++names, defaults = getargs(layer.get_output_for) + except TypeError: + # If introspection is not possible, skip it + pass diff -Nru lasagne-0.1+git20160728.8b66737/debian/patches/series lasagne-0.1+git20160728.8b66737/debian/patches/series --- lasagne-0.1+git20160728.8b66737/debian/patches/series 2016-08-18 20:59:52.0 +0200 +++ lasagne-0.1+git20160728.8b66737/debian/patches/series 2017-02-09 12:15:56.0 +0100 @@ -1,2 +1,3 @@ pytest-no-cov-pep8.patch use-mathjax-package.patch +remove-deprecated.patch diff -Nru lasagne-0.1+git20160728.8b66737/debian/rules lasagne-0.1+git20160728.8b66737/debian/rules --- lasagne-0.1+git20160728.8b66737/debian/rules 2016-08-18 20:59:52.0 +0200 +++ lasagne-0.1+git20160728.8b66737/debian/rules 2017-02-09 12:15:56.0 +0100 @@ -8,7 +8,7 @@ dh $@ --with python2,python3,sphinxdoc --buildsystem=pybuild override_dh_auto_test: - PYBUILD_SYSTEM=custom PYBUILD_TEST_ARGS="{interpreter} -m pytest -v -rs lasagne/" dh_auto_test || true # 2 fails with Python 3.5 remain + PYBUILD_SYSTEM=custom PYBUILD_TEST_ARGS="{inte
Bug#854674: marked as done (unblock: puppet/4.8.2-2)
Your message dated Thu, 9 Feb 2017 23:59:20 +0100 with message-id <20170209225918.ga26...@ugent.be> and subject line Re: unblock: puppet/4.8.2-2 has caused the Debian Bug report #854674, regarding unblock: puppet/4.8.2-2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 854674: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854674 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package puppet. 4.8.2-2 fixes a critical bug (#854487) introduced in 4.8.1-3. In short, the puppet package will enable the puppet service by default and puppet will try to connect to the 'puppet' host and receive configuration, which may or may not be intended. Previously, our safeguard against this was to start the puppet service, but leave the agent locked, which meant it would not apply any configuration whatsoever. Unfortunately, this proved to be fragile and stopped working when the agent lock path changed. The fix for this in unstable is to simply not enable the service on new installations at all, rather than enable it but lock the agent. This is a better approach for a number of reasons (resource waste, many systems running puppet under cron anyway etc). The change is properly documented, and also handles the upgrade path from Jessie. See the attached source debdiff for details. unblock puppet/4.8.2-2 diff -Nru puppet-4.8.2/debian/changelog puppet-4.8.2/debian/changelog --- puppet-4.8.2/debian/changelog 2017-01-23 14:39:14.0 +0200 +++ puppet-4.8.2/debian/changelog 2017-02-08 15:24:55.0 +0200 @@ -1,3 +1,18 @@ +puppet (4.8.2-2) unstable; urgency=high + + * Do not enable the puppet service by default on fresh installs +(Closes: #854487). ++ Preserve the agent lock on upgrade from 3.x to safeguard upgrades from + Jessie systems where puppet was installed but never used. + * Update the DEP-8 tests to check that the service is disabled. + * Strip the agent locking logic from puppet.preinst now that we disable the +service by default. + * Add a debian/NEWS entry documenting the disabled service. + * Update the information in README.Debian and remove the (now obsolete) +paragraph about stored configs. + + -- Apollon Oikonomopoulos Wed, 08 Feb 2017 15:24:55 +0200 + puppet (4.8.2-1) unstable; urgency=medium * New upstream bugfix release. diff -Nru puppet-4.8.2/debian/NEWS puppet-4.8.2/debian/NEWS --- puppet-4.8.2/debian/NEWS 2017-01-23 14:37:53.0 +0200 +++ puppet-4.8.2/debian/NEWS 2017-02-08 15:24:55.0 +0200 @@ -1,3 +1,21 @@ +puppet (4.8.2-2) unstable; urgency=high + + As of 4.8.2-2, the puppet service is not enabled by default on new + installations and has to be manually enabled using + + systemctl enable puppet.service + or + update-rc.d puppet enable + + if desired. Note that upgrades from previous puppet versions are not + affected by this change and will preserve the service status. + + Since some versions of the package shipped with the service enabled by + default, if you are upgrading please check and make sure that the service on + your system is properly enabled or disabled to match your preference. + + -- Apollon Oikonomopoulos Wed, 08 Feb 2017 17:43:52 +0200 + puppet (4.8.1-2) unstable; urgency=medium The Ruby Puppet master as shipped in Debian can currently handle Puppet 3.x diff -Nru puppet-4.8.2/debian/puppet.postinst puppet-4.8.2/debian/puppet.postinst --- puppet-4.8.2/debian/puppet.postinst 2017-01-23 14:37:53.0 +0200 +++ puppet-4.8.2/debian/puppet.postinst 2017-02-08 15:24:55.0 +0200 @@ -31,15 +31,24 @@ # Create folders common to "puppet" and "puppetmaster", which need # to be owned by the "puppet" user install --owner puppet --group puppet --directory \ - /var/lib/puppet/state + /var/cache/puppet/state - # Between 4.4.1-2 and 4.8.1-3, puppet was called 'puppet-agent' - # Preserve the systemd and SysV service states - if [ -n "$2" ] && dpkg --compare-versions "$2" gt "4.4.1-2~" && \ + if [ -z "$2" ]; then + # Disable the service by default on new installations + update-rc.d puppet defaults >/dev/null || true + update-rc.d puppet disable >/dev/null || true + elif [ -n "$2" ] && dpkg --compare-versions "$2" gt "4.4.2-1~" && \ dpkg --compare-versions "$2" lt "4.8.1-3~"; then + # Between 4.4.2-1 and 4.8.1-3, puppet was called 'puppet-agent' + # Preserve the systemd and SysV service states if deb-systemd-helper debian-installed p
Bug#854651: marked as done (unblock: debootstrap/1.0.88)
Your message dated Fri, 10 Feb 2017 00:05:17 +0100 with message-id <20170209230515.ga26...@ugent.be> and subject line Re: Bug#854651: unblock: debootstrap/1.0.88 has caused the Debian Bug report #854651, regarding unblock: debootstrap/1.0.88 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 854651: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854651 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Hey folks, Please unblock debootstrap 1.0.88 We have a tiny fix for #836525, which will allow debootstrap to deal with arch-qualified dependencies. It'll be a major PITA if debootstrap can't deal with these in stretch. KiBi already knows about this upload and is happy AFAIK. He and I have both tested the patch. diff -Nru debootstrap-1.0.87/debian/changelog debootstrap-1.0.88/debian/changelog --- debootstrap-1.0.87/debian/changelog 2016-11-16 05:47:27.0 + +++ debootstrap-1.0.88/debian/changelog 2017-02-08 23:52:56.0 + @@ -1,3 +1,10 @@ +debootstrap (1.0.88) unstable; urgency=high + + [ Sven Joachim ] + * Strip the arch-qualifier (Closes: #836525) + + -- Steve McIntyre <93...@debian.org> Wed, 08 Feb 2017 23:53:10 + + debootstrap (1.0.87) unstable; urgency=high [ Julien Cristau ] diff -Nru debootstrap-1.0.87/functions debootstrap-1.0.88/functions --- debootstrap-1.0.87/functions2016-10-31 04:01:25.0 + +++ debootstrap-1.0.88/functions2017-02-03 00:52:30.0 + @@ -1336,6 +1336,7 @@ for $d (split /\s*,\s*/, $1) { $d =~ s/\s*[|].*$//; $d =~ s/\s*[(].*[)]\s*//; + $d =~ s/:.*//; push @d, $d; } } unblock debootstrap/1.0.88 -- System Information: Debian Release: 8.7 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.8.0-0.bpo.2-amd64 (SMP w/4 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) --- End Message --- --- Begin Message --- Hi, On Thu, Feb 09, 2017 at 11:49:08AM +0100, Cyril Brulebois wrote: > > Unblocked from my PoV. For good measure, I'll just have KiBi confirm > > that it is not going to disturb any test/release planning for d-i atm. :) > > It would be nice if one could address #817236 at some point. Fixing > other bugs is nice but… > > Fine for the unblock anyway. Added the unblock-udeb. Cheers, Ivo--- End Message ---
Bug#854685: marked as done (unblock: viewvc/1.1.26-1)
Your message dated Fri, 10 Feb 2017 00:08:30 +0100 with message-id <20170209230828.ga26...@ugent.be> and subject line Re: unblock: viewvc/1.1.26-1 has caused the Debian Bug report #854685, regarding unblock: viewvc/1.1.26-1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 854685: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854685 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Hello, the Security Team would like to request the unblocking of viewvc, which fixes #854681 (CVE-2017-5938, XSS). DSA-3784-1 was just issued, fixing this same issue in jessie-security. The debdiff (below) is a tad larger than it ought to be, because: 1. all copyright dates were updated to include "2017" 2. the source wasn't repacked to omit Windows-specific code, like it was in 1.1.25+repack-1. However, the only actual change is indeed the fix for CVE-2017-5938. Here is the debdiff: diff -Nru viewvc-1.1.25+repack/bin/asp/query.asp viewvc-1.1.26/bin/asp/query.asp --- viewvc-1.1.25+repack/bin/asp/query.asp 2016-09-15 21:38:32.0 +0200 +++ viewvc-1.1.26/bin/asp/query.asp 2017-01-25 00:07:15.0 +0100 @@ -3,7 +3,7 @@ # -*-python-*- # -# Copyright (C) 1999-2015 The ViewCVS Group. All Rights Reserved. +# Copyright (C) 1999-2017 The ViewCVS Group. All Rights Reserved. # # By using this file, you agree to the terms and conditions set forth in # the LICENSE.html file which can be found at the top level of the ViewVC diff -Nru viewvc-1.1.25+repack/bin/asp/viewvc.asp viewvc-1.1.26/bin/asp/viewvc.asp --- viewvc-1.1.25+repack/bin/asp/viewvc.asp 2016-09-15 21:38:32.0 +0200 +++ viewvc-1.1.26/bin/asp/viewvc.asp2017-01-25 00:07:15.0 +0100 @@ -3,7 +3,7 @@ # -*-python-*- # -# Copyright (C) 1999-2015 The ViewCVS Group. All Rights Reserved. +# Copyright (C) 1999-2017 The ViewCVS Group. All Rights Reserved. # # By using this file, you agree to the terms and conditions set forth in # the LICENSE.html file which can be found at the top level of the ViewVC diff -Nru viewvc-1.1.25+repack/bin/cgi/query.cgi viewvc-1.1.26/bin/cgi/query.cgi --- viewvc-1.1.25+repack/bin/cgi/query.cgi 2016-09-15 21:38:32.0 +0200 +++ viewvc-1.1.26/bin/cgi/query.cgi 2017-01-25 00:07:15.0 +0100 @@ -1,7 +1,7 @@ #!/usr/bin/env python # -*-python-*- # -# Copyright (C) 1999-2015 The ViewCVS Group. All Rights Reserved. +# Copyright (C) 1999-2017 The ViewCVS Group. All Rights Reserved. # # By using this file, you agree to the terms and conditions set forth in # the LICENSE.html file which can be found at the top level of the ViewVC diff -Nru viewvc-1.1.25+repack/bin/cgi/viewvc.cgi viewvc-1.1.26/bin/cgi/viewvc.cgi --- viewvc-1.1.25+repack/bin/cgi/viewvc.cgi 2016-09-15 21:38:32.0 +0200 +++ viewvc-1.1.26/bin/cgi/viewvc.cgi2017-01-25 00:07:15.0 +0100 @@ -1,7 +1,7 @@ #!/usr/bin/env python # -*-python-*- # -# Copyright (C) 1999-2015 The ViewCVS Group. All Rights Reserved. +# Copyright (C) 1999-2017 The ViewCVS Group. All Rights Reserved. # # By using this file, you agree to the terms and conditions set forth in # the LICENSE.html file which can be found at the top level of the ViewVC diff -Nru viewvc-1.1.25+repack/bin/cvsdbadmin viewvc-1.1.26/bin/cvsdbadmin --- viewvc-1.1.25+repack/bin/cvsdbadmin 2016-09-15 21:38:32.0 +0200 +++ viewvc-1.1.26/bin/cvsdbadmin2017-01-25 00:07:15.0 +0100 @@ -1,7 +1,7 @@ #!/usr/bin/env python # -*-python-*- # -# Copyright (C) 1999-2015 The ViewCVS Group. All Rights Reserved. +# Copyright (C) 1999-2017 The ViewCVS Group. All Rights Reserved. # # By using this file, you agree to the terms and conditions set forth in # the LICENSE.html file which can be found at the top level of the ViewVC diff -Nru viewvc-1.1.25+repack/bin/loginfo-handler viewvc-1.1.26/bin/loginfo-handler --- viewvc-1.1.25+repack/bin/loginfo-handler2016-09-15 21:38:32.0 +0200 +++ viewvc-1.1.26/bin/loginfo-handler 2017-01-25 00:07:15.0 +0100 @@ -1,7 +1,7 @@ #!/usr/bin/env python # -*-python-*- # -# Copyright (C) 1999-2015 The ViewCVS Group. All Rights Reserved. +# Copyright (C) 1999-2017 The ViewCVS Group. All Rights Reserved. # # By using this file, you agree to the terms and conditions set forth in # the LICENSE.html file which can be found at the top level of the ViewVC diff -Nru viewvc-1.1.25+repack
Bug#853809: unblock: e2fsprogs/1.43.4-2
Hi, Theodore Ts'o (2017-02-08): > On Fri, Feb 03, 2017 at 10:34:09PM +0100, Emilio Pozuelo Monfort wrote: > > > > This seems fine to me, unblocked. Cc'ing debian-boot@/Cyril for the > > udeb unblock. > > Hi, I've since found a regression that I would like to fix via a > cherry pick from upstream. The e2fsprogs/1.43.4-2 package hasn't > transitioned into testing yet (it will in 3 more days). > > Enclosed please find the source debdiff. Would you prefer that I wait > for 1.43.4-2 to transition into testing, and then upload 1.43.4-3 and > then file a new unblock request? Whatever release team members prefer I'll give -3 a try within d-i to check there's no surprises with a casual installation, and I'll update this bug report once I've done so. KiBi. signature.asc Description: Digital signature
Bug#853809: unblock: e2fsprogs/1.43.4-2
Hi again, Cyril Brulebois (2017-02-10): > Whatever release team members prefer I'll give -3 a try within d-i to > check there's no surprises with a casual installation, and I'll update > this bug report once I've done so. Tests within d-i with -3 look OK: creating an ext4 root partition on a full disc is OK, creating both ext2 for /boot and ext4 for / with encrypted LVM is also OK. So no objections from me, thanks. KiBi. signature.asc Description: Digital signature