Bug#923315: unblock: gigolo/0.4.2-3

2019-02-26 Thread Yves-Alexis Perez
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Hi,

due to a bad timing combination, the gigolo packag is currently not in
testing and won't migrate without an unblock. I think it would be nice
for its users to let it migrate.

The package has been removed from testing a long time ago, and didn't
migrate again because of the alioth maintainer address RC bug. There's a
new development version in experimental fixing that bug, and I hoped
there would be a stable release in time for the freeze, but that didn't
happen and I uploaded just a new revision (I thought) in time for the
freeze.

Unfortunately my timing was off (I uploaded 5 days before the soft
freeze but too late). The diff between stable and unstable is attached.

Please unblock package gigolo

unblock gigolo/0.4.2-3

-- System Information:
Debian Release: buster/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable'), (450, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-3-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.utf8, LC_CTYPE=fr_FR.utf8 (charmap=UTF-8), 
LANGUAGE=fr_FR.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
diff -Nru gigolo-0.4.2/debian/changelog gigolo-0.4.2/debian/changelog
--- gigolo-0.4.2/debian/changelog   2014-01-09 23:00:47.0 +0100
+++ gigolo-0.4.2/debian/changelog   2019-02-07 17:29:33.0 +0100
@@ -1,3 +1,35 @@
+gigolo (0.4.2-3) unstable; urgency=medium
+
+  * Moved the package to git on salsa.debian.org
+  * Updated the maintainer address to debian-x...@lists.debian.org
+closes: #899525
+  * d/gbp.conf added, following DEP-14
+  * d/watch: use HTTPS protocol
+  * d/gbp.conf adjusted for buster branch
+  * d/control: drop Emanuele, Simon, Lionel and Stefan from uploaders
+  * d/control: update standards version to 4.2.1
+
+ -- Yves-Alexis Perez   Thu, 07 Feb 2019 17:29:33 +0100
+
+gigolo (0.4.2-2) unstable; urgency=medium
+
+  * debian/patches:
+- 01_migrate-gvfs-command added, replace gvfs-open by gio open as default
+open command.
+  * debian/control:
+- replace gvfs-bin by libglib2.0-bin in Recommends  closes: #877744
+- run wrap-and-sort
+- update standards version to 4.4.1. 
+- drop -dbg package.
+  * debian/rules:
+- migrate to dbgsym package.
+- use debian/gigolo instead of debian/tmp in file removals, since we only
+have one binary package now. 
+- drop list-missing since we install everything.
+  * debian/gigolo.install dropped since we only have one package.
+
+ -- Yves-Alexis Perez   Sun, 15 Oct 2017 16:08:34 +0200
+
 gigolo (0.4.2-1) unstable; urgency=low
 
   [ Evgeni Golov ]
diff -Nru gigolo-0.4.2/debian/control gigolo-0.4.2/debian/control
--- gigolo-0.4.2/debian/control 2014-01-09 23:00:41.0 +0100
+++ gigolo-0.4.2/debian/control 2019-02-07 17:29:33.0 +0100
@@ -1,34 +1,23 @@
 Source: gigolo
 Section: xfce
 Priority: optional
-Maintainer: Debian Xfce Maintainers 
-Uploaders: Yves-Alexis Perez , Emanuele Rocca 
, Simon Huggins , Stefan Ott 
, Lionel Le Folgoc 
-Build-Depends: debhelper (>= 9), intltool, pkg-config,
-  libgtk2.0-dev (>= 2.12.0)
-Standards-Version: 3.9.5
+Maintainer: Debian Xfce Maintainers 
+Uploaders: Yves-Alexis Perez 
+Build-Depends: debhelper (>= 9),
+   intltool,
+   libgtk2.0-dev (>= 2.12.0),
+   pkg-config
+Standards-Version: 4.2.1
 Homepage: http://www.uvena.de/gigolo/
-Vcs-Svn: svn://anonscm.debian.org/pkg-xfce/goodies/trunk/gigolo/
-Vcs-Browser: http://anonscm.debian.org/viewvc/pkg-xfce/goodies/trunk/gigolo/
+Vcs-Git: https://salsa.debian.org/xfce-team/apps/gigolo.git
+Vcs-Browser: https://salsa.debian.org/xfce-team/apps/gigolo
 
 Package: gigolo
 Section: xfce
 Architecture: any
-Depends: ${shlibs:Depends}, ${misc:Depends}
-Recommends: gvfs-bin
+Depends: ${misc:Depends}, ${shlibs:Depends}
+Recommends: libglib2.0-bin
 Description: frontend to manage connections to remote filesystems using 
GIO/GVfs
  Gigolo is a frontend to easily manage connections to remote filesystems
  using GIO/GVfs. It allows you to quickly connect/mount a remote filesystem
  and manage bookmarks of such.
-
-Package: gigolo-dbg
-Section: debug
-Architecture: any
-Priority: extra
-Depends: gigolo (= ${binary:Version}), ${misc:Depends}
-Description: frontend to manage connections to remote filesystems using 
GIO/GVfs (debug)
- Gigolo is a frontend to easily manage connections to remote filesystems
- using GIO/GVfs. It allows you to quickly connect/mount a remote filesystem
- and manage bookmarks of such.
- .
- This package contains the debugging symbols.
-
diff -Nru gigolo-0.4.2/debian/gbp.conf gigolo-0.4.2/debian/gbp.conf
--- gigolo-0.4.2/debian/gbp.conf1970-01-01 01:00:00.0 +0100
+++ gigolo-0.4.2/debian/gbp.conf2019-02-07 17:29:33.0 +0100
@@ -0,0 +1,

Bug#868355: Any reason not to simply upload ceres-solver with adjusted version of libeigen3-dev

2019-02-26 Thread Andreas Tille
Hi Philipp,

On Tue, Feb 26, 2019 at 10:45:52AM +0100, Philipp Huebner wrote:
> 
> > I mean: There is no *effective* change since the Build-Depends we set is
> > fullfilled anyway by the existing packages.  Its just that it is
> > explicitly declared in the package metadata.
> 
> IMO that's a valid fix for buster, but does not fix the underlying issue
> for sid / buster+1.

Sure, but we want to release Buster and if this bug is not fixed
ceres-solver (and its dependencies are removed in now 4.3 days.  Thus
I'm just building the current HEAD and will upload if nobody will stop
me.
 
> The next time a newer version of eigen3 is uploaded, you'll have the
> same "problem" all over again: adjust the build dep and upload to get a
> corresponding rebuild.
> Updating eigen3 renders ceres and similar packages unusable until
> rebuilt, please read through the discussion in #868355 to understand
> what I mean.
> 
> The eigen3 maintainer and I are happy to simply rebuild affected
> packages after every eigen3 update, but Emilio considers it an upstream bug.
> Unfortunately I could not find anybody able to shed more light on the
> eigen3 topic.

I agree that the topic seems to be more complex in general but for the
moment we need a fix for Buster and that fix is very simple - so I do
not see any reason to not fix it.  You might like to reopen the relevant
bugs (I mean #868355 - I just asked for closing which was done and
#883619) with lower severity to keep on discussing for Buster+1.

Kind regards

   Andreas.

-- 
http://fam-tille.de



Bug#923323: stretch-pu: CVE-2018-1000872: package python-pykmip/0.5.0-4

2019-02-26 Thread Thomas Goirand
Package: release.debian.org
Severity: important
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu

Dear release team,

Here's the changelog entry:

+  * CVE-2018-1000872: Resource Management Errors (similar issue to
+CVE-2015-5262) vulnerability in PyKMIP server that can result in DOS: the
+server can be made unavailable by one or more clients opening all of the
+available sockets. Applied upstream patch: Fix a denial-of-service bug by
+setting the server socket timeout (Closes: #917030).

The security team doesn't think a DSA is needed. Debdiff is attached. The
resulting package is here:

http://sid.gplhost.com/stretch-proposed-updates/python-pykmip/

Please allow me to upload python-pykmip/0.5.0-4+deb9u1 to Stretch-proposed.

Cheers,

Thomas Goirand (zigo)
diff -Nru python-pykmip-0.5.0/debian/changelog 
python-pykmip-0.5.0/debian/changelog
--- python-pykmip-0.5.0/debian/changelog2016-12-02 21:49:06.0 
+
+++ python-pykmip-0.5.0/debian/changelog2019-02-24 16:43:42.0 
+
@@ -1,3 +1,13 @@
+python-pykmip (0.5.0-4+deb9u1) stretch; urgency=medium
+
+  * CVE-2018-1000872: Resource Management Errors (similar issue to
+CVE-2015-5262) vulnerability in PyKMIP server that can result in DOS: the
+server can be made unavailable by one or more clients opening all of the
+available sockets. Applied upstream patch: Fix a denial-of-service bug by
+setting the server socket timeout (Closes: #917030).
+
+ -- Thomas Goirand   Sun, 24 Feb 2019 17:43:42 +0100
+
 python-pykmip (0.5.0-4) unstable; urgency=medium
 
   * Team upload.
diff -Nru 
python-pykmip-0.5.0/debian/patches/CVE-2018-1000872_Fix_a_denial-of-service_bug_by_setting_the_server_socket_timeout.patch
 
python-pykmip-0.5.0/debian/patches/CVE-2018-1000872_Fix_a_denial-of-service_bug_by_setting_the_server_socket_timeout.patch
--- 
python-pykmip-0.5.0/debian/patches/CVE-2018-1000872_Fix_a_denial-of-service_bug_by_setting_the_server_socket_timeout.patch
  1970-01-01 00:00:00.0 +
+++ 
python-pykmip-0.5.0/debian/patches/CVE-2018-1000872_Fix_a_denial-of-service_bug_by_setting_the_server_socket_timeout.patch
  2019-02-24 16:43:42.0 +
@@ -0,0 +1,54 @@
+Description: CVE-2018-1000872: Fix a denial-of-service bug by setting the 
server socket timeout
+ This change fixes a potential denial-of-service bug with the
+ server, setting a default timeout for all server sockets. This
+ allows the server to drop hung connections without blocking
+ forever. The interrupt triggered during accept calls is expected
+ and is now handled appropriately. Server unit tests have been
+ updated to reflect this change.
+Author: Peter Hamilton 
+Date: Tue, 24 Apr 2018 21:57:20 -0400
+Origin: upstream, 
https://github.com/OpenKMIP/PyKMIP/commit/3a7b880bdf70d295ed8af3a5880bab65fa6b3932
+Bug-Debian: https://bugs.debian.org/917030
+Last-Update: 2019-02-24
+
+Index: python-pykmip/kmip/services/server/server.py
+===
+--- python-pykmip.orig/kmip/services/server/server.py
 python-pykmip/kmip/services/server/server.py
+@@ -176,6 +176,7 @@ class KmipServer(object):
+ self._logger.info("Starting server socket handler.")
+ 
+ # Create a TCP stream socket and configure it for immediate reuse.
++socket.setdefaulttimeout(10)
+ self._socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
+ self._socket.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
+ 
+@@ -283,6 +284,11 @@ class KmipServer(object):
+ while self._is_serving:
+ try:
+ connection, address = self._socket.accept()
++except socket.timeout:
++# Setting the default socket timeout to break hung connections
++# will cause accept to periodically raise socket.timeout. This
++# is expected behavior, so ignore it and retry accept.
++pass
+ except socket.error as e:
+ if e.errno == errno.EINTR:
+ self._logger.warning("Interrupting connection service.")
+Index: python-pykmip/kmip/tests/unit/services/server/test_server.py
+===
+--- python-pykmip.orig/kmip/tests/unit/services/server/test_server.py
 python-pykmip/kmip/tests/unit/services/server/test_server.py
+@@ -342,7 +342,11 @@ class TestKmipServer(testtools.TestCase)
+ 
+ # Test the expected behavior for a normal server/interrupt sequence
+ s._socket.accept = mock.MagicMock(
+-side_effect=[('connection', 'address'), expected_error]
++side_effect=[
++('connection', 'address'),
++socket.timeout,
++expected_error
++]
+ )
+ 
+ s.serve()
diff -Nru python-pykmip-0.5.0/debian/patches/series 
python-pykmip-0.5.0/debian/patches/series
--- python-pykmip-0.

Bug#923324: nmu: libssh_0.8.6-3

2019-02-26 Thread Laurent Bigonville
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu

Hi,

libssh is statically linking against nacl.

Before 20110221-6.1 (uploaded today), nacl was not built with -fPIC
(#92), I suspect that this might be the root cause of #919956.

Could you please rebuild libssh against the last upload of nacl?

Thanks,

Laurent Bigonville

nmu libssh_0.8.6-3 . ANY -ia64 -kfreebsd-amd64 -kfreebsd-i386 . unstable . -m 
"Rebuild against nacl built with -fPIC"
dw libssh_0.8.6-3 . ANY . -m "libnacl-dev (>= 20110221-6.1)"

-- System Information:
Debian Release: buster/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-3-amd64 (SMP w/8 CPU cores)
Locale: LANG=fr_BE.UTF-8, LC_CTYPE=fr_BE.UTF-8 (charmap=UTF-8), 
LANGUAGE=fr_BE:fr (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Processed: severity of 923323 is normal

2019-02-26 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 923323 normal
Bug #923323 [release.debian.org] stretch-pu: CVE-2018-1000872: package 
python-pykmip/0.5.0-4
Severity set to 'normal' from 'important'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
923323: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923323
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#868355: Any reason not to simply upload ceres-solver with adjusted version of libeigen3-dev

2019-02-26 Thread Mo Zhou
On Tue, Feb 26, 2019 at 11:25:49AM +0100, Andreas Tille wrote:
> > The eigen3 maintainer and I are happy to simply rebuild affected
> > packages after every eigen3 update, but Emilio considers it an upstream bug.
> > Unfortunately I could not find anybody able to shed more light on the
> > eigen3 topic.
> 
> I agree that the topic seems to be more complex in general but for the
> moment we need a fix for Buster and that fix is very simple - so I do
> not see any reason to not fix it.  You might like to reopen the relevant
> bugs (I mean #868355 - I just asked for closing which was done and
> #883619) with lower severity to keep on discussing for Buster+1.

Similar to packages built against static libraries, eigen3 as a
header-only library gives us no chance except for binNMU all the rdeps.

There are a lot of header only packages in my packaging radar, and
the transition problem really brings me headache. Fortunately they
won't have to much rdeps at the beginning.



Bug#923342: stretch-pu: package kauth/5.28.0-2+deb9u1

2019-02-26 Thread Moritz Muehlenhoff
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu

This fixes CVE-2019-7443 /
https://mail.kde.org/pipermail/kde-announce/2019-February/11.html.

Debdiff attached.

Cheers,
Moritz
diff -Nru kauth-5.28.0/debian/changelog kauth-5.28.0/debian/changelog
--- kauth-5.28.0/debian/changelog   2017-05-10 15:03:15.0 +0200
+++ kauth-5.28.0/debian/changelog   2019-02-15 00:03:40.0 +0100
@@ -1,3 +1,9 @@
+kauth (5.28.0-2+deb9u1) stretch; urgency=medium
+
+  * CVE-2019-7443 (Closes: #921995)
+
+ -- Moritz Mühlenhoff   Fri, 15 Feb 2019 00:03:40 +0100
+
 kauth (5.28.0-2) unstable; urgency=medium
 
   * Drop applied patch: kauth_add_license
diff -Nru kauth-5.28.0/debian/patches/CVE-2019-7443.patch 
kauth-5.28.0/debian/patches/CVE-2019-7443.patch
--- kauth-5.28.0/debian/patches/CVE-2019-7443.patch 1970-01-01 
01:00:00.0 +0100
+++ kauth-5.28.0/debian/patches/CVE-2019-7443.patch 2019-02-15 
00:03:40.0 +0100
@@ -0,0 +1,68 @@
+From fc70fb0161c1b9144d26389434d34dd135cd3f4a Mon Sep 17 00:00:00 2001
+From: Albert Astals Cid 
+Date: Sat, 2 Feb 2019 14:35:25 +0100
+Subject: Remove support for passing gui QVariants to KAuth helpers
+
+Supporting gui variants is very dangerous since they can end up triggering
+image loading plugins which are one of the biggest vectors for crashes, which
+for very smart people mean possible code execution, which is very dangerous
+in code that is executed as root.
+
+We've checked all the KAuth helpers inside KDE git and none seems to be using
+gui variants, so we're not actually limiting anything that people wanted to do.
+
+Reviewed by secur...@kde.org and Aleix Pol
+
+Issue reported by Fabian Vogt
+---
+ src/backends/dbus/DBusHelperProxy.cpp | 9 +
+ src/kauthaction.h | 2 ++
+ 2 files changed, 11 insertions(+)
+
+diff --git a/src/backends/dbus/DBusHelperProxy.cpp 
b/src/backends/dbus/DBusHelperProxy.cpp
+index 10c14c6..8f0d336 100644
+--- a/src/backends/dbus/DBusHelperProxy.cpp
 b/src/backends/dbus/DBusHelperProxy.cpp
+@@ -31,6 +31,8 @@
+ #include "kf5authadaptor.h"
+ #include "kauthdebug.h"
+ 
++extern Q_CORE_EXPORT const QMetaTypeInterface *qMetaTypeGuiHelper;
++
+ namespace KAuth
+ {
+ 
+@@ -229,10 +231,17 @@ QByteArray DBusHelperProxy::performAction(const QString 
&action, const QByteArra
+ return ActionReply::HelperBusyReply().serialized();
+ }
+ 
++// Make sure we don't try restoring gui variants, in particular 
QImage/QPixmap/QIcon are super dangerous
++// since they end up calling the image loaders and thus are a vector for 
crashing → executing code
++auto origMetaTypeGuiHelper = qMetaTypeGuiHelper;
++qMetaTypeGuiHelper = nullptr;
++
+ QVariantMap args;
+ QDataStream s(&arguments, QIODevice::ReadOnly);
+ s >> args;
+ 
++qMetaTypeGuiHelper = origMetaTypeGuiHelper;
++
+ m_currentAction = action;
+ emit remoteSignal(ActionStarted, action, QByteArray());
+ QEventLoop e;
+diff --git a/src/kauthaction.h b/src/kauthaction.h
+index c67a70a..01f3ba1 100644
+--- a/src/kauthaction.h
 b/src/kauthaction.h
+@@ -298,6 +298,8 @@ public:
+  * This method sets the variant map that the application
+  * can use to pass arbitrary data to the helper when executing the action.
+  *
++ * Only non-gui variants are supported.
++ *
+  * @param arguments The new arguments map
+  */
+ void setArguments(const QVariantMap &arguments);
+-- 
+cgit v1.1
+
diff -Nru kauth-5.28.0/debian/patches/series kauth-5.28.0/debian/patches/series
--- kauth-5.28.0/debian/patches/series  2017-05-10 15:03:15.0 +0200
+++ kauth-5.28.0/debian/patches/series  2019-02-15 00:03:40.0 +0100
@@ -1 +1,2 @@
 Verify-that-whoever-is-calling-us-is-actually-who-he-says.patch
+CVE-2019-7443.patch


Bug#923356: unblock: prelude-lml/4.1.0-1+b2

2019-02-26 Thread Thomas Andrejak
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package prelude-lml

The package was removed from testing due to a bad purge script which has just 
been fixed (#919869).
Prelude-LML is an important part of the Prelude suite, it would be nice to have 
it.

The fix has been accepted by Mattia Rizzolo: 
https://tracker.debian.org/news/1032409/accepted-prelude-lml-410-2-source-into-unstable/

Thank you,

Thomas Andrejak

unblock prelude-lml/4.1.0-1+b2

-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.18.0-1-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_SOFTLOCKUP
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#922300: unblock: chef/13.8.7-3, ohai/13.8.0-1

2019-02-26 Thread Antonio Terceiro
On Thu, Feb 14, 2019 at 09:42:42AM -0200, Antonio Terceiro wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> 
> Hello,
> 
> Please unblock package chef
> 
> Hi,
> 
> The ci.debian.net nodes are managed with chef, and during the weekend I
> realized that it was not in testing. There was an RC bug against chef (FTBFS, 
> 3
> tests broken by an update to the test framework, package just worked
> nevertheless) and ruby-cheffish (broken by openssl 1.1.1). I fixed both, and
> they were ACCEPTED in unstable Sunday morning within less than one hour of 
> each
> other (ruby-cheffish at 11:53:21 + and chef at 12:34:15 +)
> 
> https://tracker.debian.org/news/1029431/accepted-chef-1387-3-source-into-unstable/
> https://tracker.debian.org/news/1029425/accepted-ruby-cheffish-1310-2-source-into-unstable/

FWIW today I noticed a new item in the chef migration excuses that was
not there when I opened this bug, a piuparts regression. I made a new
upload with a trivial patch fixing only that.


signature.asc
Description: PGP signature


Bug#923324: marked as done (nmu: libssh_0.8.6-3)

2019-02-26 Thread Debian Bug Tracking System
Your message dated Wed, 27 Feb 2019 06:31:00 +
with message-id <7a88a0d7-bcb1-f825-7d16-d66ae187a...@thykier.net>
and subject line Re: Bug#923324: nmu: libssh_0.8.6-3
has caused the Debian Bug report #923324,
regarding nmu: libssh_0.8.6-3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
923324: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923324
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu

Hi,

libssh is statically linking against nacl.

Before 20110221-6.1 (uploaded today), nacl was not built with -fPIC
(#92), I suspect that this might be the root cause of #919956.

Could you please rebuild libssh against the last upload of nacl?

Thanks,

Laurent Bigonville

nmu libssh_0.8.6-3 . ANY -ia64 -kfreebsd-amd64 -kfreebsd-i386 . unstable . -m 
"Rebuild against nacl built with -fPIC"
dw libssh_0.8.6-3 . ANY . -m "libnacl-dev (>= 20110221-6.1)"

-- System Information:
Debian Release: buster/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-3-amd64 (SMP w/8 CPU cores)
Locale: LANG=fr_BE.UTF-8, LC_CTYPE=fr_BE.UTF-8 (charmap=UTF-8), 
LANGUAGE=fr_BE:fr (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
--- End Message ---
--- Begin Message ---
Laurent Bigonville:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: binnmu
> 
> Hi,
> 
> libssh is statically linking against nacl.
> 
> Before 20110221-6.1 (uploaded today), nacl was not built with -fPIC
> (#92), I suspect that this might be the root cause of #919956.
> 
> Could you please rebuild libssh against the last upload of nacl?
> 
> Thanks,
> 
> Laurent Bigonville
> 
> nmu libssh_0.8.6-3 . ANY -ia64 -kfreebsd-amd64 -kfreebsd-i386 . unstable . -m 
> "Rebuild against nacl built with -fPIC"
> dw libssh_0.8.6-3 . ANY . -m "libnacl-dev (>= 20110221-6.1)"
> 
> [...]

Scheduled, thanks.
~Niels--- End Message ---


Bug#923315: marked as done (unblock: gigolo/0.4.2-3)

2019-02-26 Thread Debian Bug Tracking System
Your message dated Wed, 27 Feb 2019 06:39:00 +
with message-id 
and subject line Re: Bug#923315: unblock: gigolo/0.4.2-3
has caused the Debian Bug report #923315,
regarding unblock: gigolo/0.4.2-3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
923315: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923315
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Hi,

due to a bad timing combination, the gigolo packag is currently not in
testing and won't migrate without an unblock. I think it would be nice
for its users to let it migrate.

The package has been removed from testing a long time ago, and didn't
migrate again because of the alioth maintainer address RC bug. There's a
new development version in experimental fixing that bug, and I hoped
there would be a stable release in time for the freeze, but that didn't
happen and I uploaded just a new revision (I thought) in time for the
freeze.

Unfortunately my timing was off (I uploaded 5 days before the soft
freeze but too late). The diff between stable and unstable is attached.

Please unblock package gigolo

unblock gigolo/0.4.2-3

-- System Information:
Debian Release: buster/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable'), (450, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-3-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.utf8, LC_CTYPE=fr_FR.utf8 (charmap=UTF-8), 
LANGUAGE=fr_FR.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
diff -Nru gigolo-0.4.2/debian/changelog gigolo-0.4.2/debian/changelog
--- gigolo-0.4.2/debian/changelog   2014-01-09 23:00:47.0 +0100
+++ gigolo-0.4.2/debian/changelog   2019-02-07 17:29:33.0 +0100
@@ -1,3 +1,35 @@
+gigolo (0.4.2-3) unstable; urgency=medium
+
+  * Moved the package to git on salsa.debian.org
+  * Updated the maintainer address to debian-x...@lists.debian.org
+closes: #899525
+  * d/gbp.conf added, following DEP-14
+  * d/watch: use HTTPS protocol
+  * d/gbp.conf adjusted for buster branch
+  * d/control: drop Emanuele, Simon, Lionel and Stefan from uploaders
+  * d/control: update standards version to 4.2.1
+
+ -- Yves-Alexis Perez   Thu, 07 Feb 2019 17:29:33 +0100
+
+gigolo (0.4.2-2) unstable; urgency=medium
+
+  * debian/patches:
+- 01_migrate-gvfs-command added, replace gvfs-open by gio open as default
+open command.
+  * debian/control:
+- replace gvfs-bin by libglib2.0-bin in Recommends  closes: #877744
+- run wrap-and-sort
+- update standards version to 4.4.1. 
+- drop -dbg package.
+  * debian/rules:
+- migrate to dbgsym package.
+- use debian/gigolo instead of debian/tmp in file removals, since we only
+have one binary package now. 
+- drop list-missing since we install everything.
+  * debian/gigolo.install dropped since we only have one package.
+
+ -- Yves-Alexis Perez   Sun, 15 Oct 2017 16:08:34 +0200
+
 gigolo (0.4.2-1) unstable; urgency=low
 
   [ Evgeni Golov ]
diff -Nru gigolo-0.4.2/debian/control gigolo-0.4.2/debian/control
--- gigolo-0.4.2/debian/control 2014-01-09 23:00:41.0 +0100
+++ gigolo-0.4.2/debian/control 2019-02-07 17:29:33.0 +0100
@@ -1,34 +1,23 @@
 Source: gigolo
 Section: xfce
 Priority: optional
-Maintainer: Debian Xfce Maintainers 
-Uploaders: Yves-Alexis Perez , Emanuele Rocca 
, Simon Huggins , Stefan Ott 
, Lionel Le Folgoc 
-Build-Depends: debhelper (>= 9), intltool, pkg-config,
-  libgtk2.0-dev (>= 2.12.0)
-Standards-Version: 3.9.5
+Maintainer: Debian Xfce Maintainers 
+Uploaders: Yves-Alexis Perez 
+Build-Depends: debhelper (>= 9),
+   intltool,
+   libgtk2.0-dev (>= 2.12.0),
+   pkg-config
+Standards-Version: 4.2.1
 Homepage: http://www.uvena.de/gigolo/
-Vcs-Svn: svn://anonscm.debian.org/pkg-xfce/goodies/trunk/gigolo/
-Vcs-Browser: http://anonscm.debian.org/viewvc/pkg-xfce/goodies/trunk/gigolo/
+Vcs-Git: https://salsa.debian.org/xfce-team/apps/gigolo.git
+Vcs-Browser: https://salsa.debian.org/xfce-team/apps/gigolo
 
 Package: gigolo
 Section: xfce
 Architecture: any
-Depends: ${shlibs:Depends}, ${misc:Depends}
-Recommends: gvfs-bin
+Depends: ${misc:Depends}, ${shlibs:Depends}
+Recommends: libglib2.0-bin
 Description: frontend to manage connections to remote filesystems using 
GIO/GVfs
  Gigolo is a frontend to easily manage connections to remote filesystems
  using

Bug#923306: marked as done (unblock: kazam/1.4.5-2.1)

2019-02-26 Thread Debian Bug Tracking System
Your message dated Wed, 27 Feb 2019 06:42:00 +
with message-id 
and subject line Re: Bug#923306: unblock: kazam/1.4.5-2.1
has caused the Debian Bug report #923306,
regarding unblock: kazam/1.4.5-2.1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
923306: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923306
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package kazam.

It's a popular option for screen capture (both screenshots and video), and we
don't seem to have alternatives for it in the archive, that work out-of-the-box.
(That was the reason I used it in the first place.)


I performed a NMU early this month, to solve the bug that got it removed from
testing:

  $ debdiff kazam_1.4.5-2.dsc /opt/deb/buildarea/kazam_1.4.5-2.1.dsc 
  diff -Nru kazam-1.4.5/debian/changelog kazam-1.4.5/debian/changelog
  --- kazam-1.4.5/debian/changelog2015-10-13 03:33:29.0 +0200
  +++ kazam-1.4.5/debian/changelog2019-02-08 12:24:25.0 +0100
  @@ -1,3 +1,11 @@
  +kazam (1.4.5-2.1) unstable; urgency=high
  +
  +  * Non-maintainer upload.
  +  * Patch after configuration API change (Closes: #916416)
  +  * debian/control: Add missing build dependency on dh-python
  +
  + -- Nicolas Braud-Santoni   Fri, 08 Feb 2019 12:24:25 +0100
  +
   kazam (1.4.5-2) unstable; urgency=medium
   
 * configparser_api_changes.patch: Update for changes
  diff -Nru kazam-1.4.5/debian/control kazam-1.4.5/debian/control
  --- kazam-1.4.5/debian/control  2015-10-13 03:32:51.0 +0200
  +++ kazam-1.4.5/debian/control  2019-02-08 12:24:25.0 +0100
  @@ -3,6 +3,7 @@
   Priority: optional
   Maintainer: Andrew Starr-Bochicchio 
   Build-Depends: debhelper (>= 9),
  +   dh-python,
  gettext,
  intltool,
  python3-all (>= 3.2),
  diff -Nru kazam-1.4.5/debian/patches/fix-configuration-handling.patch 
kazam-1.4.5/debian/patches/fix-configuration-handling.patch
  --- kazam-1.4.5/debian/patches/fix-configuration-handling.patch 1970-01-01 
01:00:00.0 +0100
  +++ kazam-1.4.5/debian/patches/fix-configuration-handling.patch 2019-02-08 
12:24:25.0 +0100
  @@ -0,0 +1,51 @@
  +Subject: Fix configuration handling
  +
  +Origin: vendor
  +Bug: https://bugs.debian.org/916416
  +Forwarded: https://github.com/hzbd/kazam/pull/21
  +From: Sergey Spitsyn 
  +Reviewed-by: Nicolas Braud-Santoni 
  +Last-Update: 2019-02-07
  +Applied-Upstream: no
  +
  +---
  + kazam/backend/config.py | 11 ---
  + 1 file changed, 4 insertions(+), 7 deletions(-)
  +
  +diff --git a/kazam/backend/config.py b/kazam/backend/config.py
  +index 64b5117..2274435 100644
  +--- a/kazam/backend/config.py
   b/kazam/backend/config.py
  +@@ -73,7 +73,7 @@ class KazamConfig(ConfigParser):
  + CONFIGFILE = os.path.join(CONFIGDIR, "kazam.conf")
  + 
  + def __init__(self):
  +-ConfigParser.__init__(self, self.DEFAULTS[0]['keys'])
  ++super().__init__(self)
  + if not os.path.isdir(self.CONFIGDIR):
  + os.makedirs(self.CONFIGDIR)
  + if not os.path.isfile(self.CONFIGFILE):
  +@@ -98,10 +98,9 @@ class KazamConfig(ConfigParser):
  + if d_key == key:
  + return d_section["keys"][key]
  + 
  +-def get(self, section, key, raw=True, fallback=None):
  ++def get(self, section, key, **kwargs):
  + try:
  +-return super(KazamConfig, self).get(section,
  +- key, raw=True, fallback=fallback)
  ++return super(KazamConfig, self).get(section, key, **kwargs)
  + except NoSectionError:
  + default = self.find_default(section, key)
  + self.set(section, key, default)
  +@@ -123,9 +122,7 @@ class KazamConfig(ConfigParser):
  + def set(self, section, option, value):
  + # If the section referred to doesn't exist (rare case),
  + # then create it
  +-if not self.has_section(section):
  +-self.add_section(section)
  +-ConfigParser.set(self, section, option, str(value))
  ++super().set(section, option, str(value))
  + 
  + def write(self):
  + file_ = open(self.CONFIGFILE, "w")
  diff -Nru kazam-1.4.5/debian/patches/series kazam-1.4.5/debian/patches/series
  --- kazam-1.4.5/debian/patches/series   2015-10-13 03:23:18.0 +0200
  +++ kazam-1.4.5/debian/patches/series   2019-02-08 12:24:25

Bug#922904: marked as done (RM: libcpan-meta-perl/2.150010-2)

2019-02-26 Thread Debian Bug Tracking System
Your message dated Wed, 27 Feb 2019 06:47:00 +
with message-id <20e7431b-126f-038c-be9f-3af7233d9...@thykier.net>
and subject line Re: Bug#922904: RM: libcpan-meta-perl/2.150010-2
has caused the Debian Bug report #922904,
regarding RM: libcpan-meta-perl/2.150010-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
922904: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922904
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: rm

please remove libcpan-meta-perl from testing

This is a separately packaged version of a module that is also bundled
with Perl core. There is no value in releasing buster with this as a
separate package.

Bug #915876 (serious) was filed against libcpan-meta-perl in December to
have the package auto-removed and kept out of buster, but this doesn't
seem to have been effective, hence I'm asking for manual removal now.

Florian
--- End Message ---
--- Begin Message ---
Florian Schlichting:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: rm
> 
> please remove libcpan-meta-perl from testing
> 
> This is a separately packaged version of a module that is also bundled
> with Perl core. There is no value in releasing buster with this as a
> separate package.
> 
> Bug #915876 (serious) was filed against libcpan-meta-perl in December to
> have the package auto-removed and kept out of buster, but this doesn't
> seem to have been effective, hence I'm asking for manual removal now.
> 
> Florian
> 

Removal hint added, thanks.
~Niels--- End Message ---


Bug#922903: marked as done (RM: libautodie-perl/2.29-2)

2019-02-26 Thread Debian Bug Tracking System
Your message dated Wed, 27 Feb 2019 06:46:00 +
with message-id <2cd79db9-9e1a-f515-d4b0-71cc3ac33...@thykier.net>
and subject line Re: Bug#922903: RM: libautodie-perl/2.29-2
has caused the Debian Bug report #922903,
regarding RM: libautodie-perl/2.29-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
922903: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922903
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: rm

please remove libautodie-perl from testing

This is a separately packaged version of a module that is also bundled
with Perl core. There is no value in releasing buster with this as a
separate package.

Bug #915550 (serious) was filed against libautodie-perl in December to
have the package auto-removed and kept out of buster, but this doesn't
seem to have been effective, hence I'm asking for manual removal now.

Florian
--- End Message ---
--- Begin Message ---
Florian Schlichting:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: rm
> 
> please remove libautodie-perl from testing
> 
> This is a separately packaged version of a module that is also bundled
> with Perl core. There is no value in releasing buster with this as a
> separate package.
> 
> Bug #915550 (serious) was filed against libautodie-perl in December to
> have the package auto-removed and kept out of buster, but this doesn't
> seem to have been effective, hence I'm asking for manual removal now.
> 
> Florian
> 

Removal hint added, thanks.
~Niels--- End Message ---


Re: Unifont Freeze Exception Request

2019-02-26 Thread Niels Thykier
Paul Hardy:
> Dear Release Team,
> 
> Unicode, Inc. expects to release Unicode Standard version 12.0.0 on or
> shortly after 5 March 2019[1].  Would you consider allowing a freeze
> exception for a unifont 12.0.01-1 package, to be uploaded by the day
> after Unicode 12.0.0 is released?
> 
> Please CC me, as I am not subscribed to this list.
> 
> TL;DR
> This is what I expect to change:
> 
> * Add new glyphs introduced in Unicode 12.0.0
> * Replace "sed -i" with "sed -e" in the font/Makefile "bmp" target for
> portability
> * Possibly add new glyph ranges (Unicode "scripts") to src/unibmp2hex.c.
> 
> I consider these changes to be low-risk.
> 
> I have been drawing Unifont glyphs since 2007, so I think I have the
> hang of doing it correctly. :-)  I also will be adding contributions
> from others, and will make a final check of every new glyph.
> 
> The "bmp" font/Makefile target is only invoked manually, if someone
> wants Microsoft Bitmap Graphics (".bmp") files for editing.  So
> modifying that target will not affect the Debian build.  I will test
> the "bmp" font/Makefile target change and any changes to
> src/unibmp2hex.c before the upload.
> 
> Thank you,
> 
> 
> Paul Hardy
> 
> [1]http://unicode.org/versions/Unicode12.0.0/
> 

Hi Paul,

Thanks for your email.

Could I have you file an unblock request/bug against release.debian.org
with the full source debdiff (when unifont 12.0.01 is released)?  We
will evaluate your request at that time when we have seen the diff.

Thanks,
~Niels



Re: Freeze exception enquiry (Xen 4.12)

2019-02-26 Thread Niels Thykier
Ian Jackson:
> tl;dr: should we update buster to Xen 4.12 (currently, 4.12-RC2) ?
> 
> Hi.  I hope you will be able to answer this question before we prepare
> a proposed updated package (and certainly without us uploading the
> package to unstable, since we want to keep unstable for updates to
> buster).
> 
> Xen upstream is currently in the 2nd week of the freeze for Xen 4.12.
> sid/buster currently have 4.11.
> 
> Upstream quality in 4.12 seems reasonable (and comparable to that of
> the Xen 4.11) we have.  It is very likely that Xen 4.12 will be
> finally released well before Debian buster.
> 
> [...]
> 
> Please could you advise whether this update is something you generally
> favour ?  If so then we will prepare a suitable update and check that
> the library transition is fine for all the the rdepends, and then
> return with a formal freeze exception request.
> 
> We do not expect to need any significant changes to the packaging.  A
> whole package debdiff is not likely to be very illuminating because
> there will be a fair few upstream changes.
> 
> Regards,
> Ian.
> 

Hi Ian,

Do we know when xen 4.12 will be released?

Also, be advised that even if we approve the exception, we may ask you
to rollback to the current upstream version of xen in a timely fashion
if it turns xen 4.12 has or causes non-trivial regressions (i.e. either
on its own or in other packages).

Thanks,
~Niels



Bug#923245: marked as done (unblock: procyon/0.5.32-5)

2019-02-26 Thread Debian Bug Tracking System
Your message dated Wed, 27 Feb 2019 07:06:00 +
with message-id <48653503-9877-9cff-4e1e-57c67a7f9...@thykier.net>
and subject line Re: Bug#923245: unblock: procyon/0.5.32-5
has caused the Debian Bug report #923245,
regarding unblock: procyon/0.5.32-5
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
923245: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923245
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package procyon

The package was removed from testing due to an incompatibility with Java 11
which has just been fixed (#909259). Procyon is the only Java decompiler
packaged in Debian, it was part of Stretch and it would be nice to have it
in Buster.

Thank you,

Emmanuel Bourg

unblock procyon/0.5.32-5
--- End Message ---
--- Begin Message ---
Emmanuel Bourg:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> 
> Please unblock package procyon
> 
> The package was removed from testing due to an incompatibility with Java 11
> which has just been fixed (#909259). Procyon is the only Java decompiler
> packaged in Debian, it was part of Stretch and it would be nice to have it
> in Buster.
> 
> Thank you,
> 
> Emmanuel Bourg
> 
> unblock procyon/0.5.32-5
> 

I have added an unblock for that particular version on the premise that
procyon/0.5.32-5 in its current form is ready for the release.  If it
turns out that procyon cannot migrate to testing in this version with
only that unblock hint, then procyon will not be a part of buster.

Thanks,
~Niels--- End Message ---