Bug#846389: plasma-workspace: random plasmashell freezes

2017-01-13 Thread MAG4 Piemonte
Hi, yesterday before we open a bug in package xserver-xorg-core about 
plasmashell freezes ...
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850940
Regards!

Guido



Processed: affects 848936, affects 832351, user debian...@lists.debian.org, usertagging 848936

2017-01-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> affects 848936 =
Bug #848936 [sddm] init-system-helpers: purging gdm3/lightdm/sddm/xdm leaves 
dangling /etc/systemd/system/display-manager.service symlink
Removed indication that 848936 affects gdm3, sddm, lightdm, and xdm
> affects 832351 =
Bug #832351 [xdm] init-system-helpers: purging gdm3/lightdm/sddm/xdm leaves 
dangling /etc/systemd/system/display-manager.service symlink
Removed indication that 832351 affects gdm3, lightdm, xdm, and sddm
> user debian...@lists.debian.org
Setting user to debian...@lists.debian.org (was a...@debian.org).
> usertags 848936 piuparts
There were no usertags set.
Usertags are now: piuparts.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
832351: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832351
848936: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848936
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Still Failing: chroot-installation_jessie_install_kde_upgrade_to_stretch_aptdpkg_first/135

2017-01-13 Thread jenkins
See 
https://jenkins.debian.net/job/chroot-installation_jessie_install_kde_upgrade_to_stretch_aptdpkg_first/135//console
 or just 
https://jenkins.debian.net/job/chroot-installation_jessie_install_kde_upgrade_to_stretch_aptdpkg_first/135/
 for more information.

Still Failing: chroot-installation_jessie_install_kde-full_upgrade_to_stretch_aptdpkg_first/135

2017-01-13 Thread jenkins
See 
https://jenkins.debian.net/job/chroot-installation_jessie_install_kde-full_upgrade_to_stretch_aptdpkg_first/135//console
 or just 
https://jenkins.debian.net/job/chroot-installation_jessie_install_kde-full_upgrade_to_stretch_aptdpkg_first/135/
 for more information.

Processing of kopete_16.08.1-3_amd64.changes

2017-01-13 Thread Debian FTP Masters
kopete_16.08.1-3_amd64.changes uploaded successfully to localhost
along with the files:
  kopete_16.08.1-3.dsc
  kopete_16.08.1-3.debian.tar.xz
  kopete-dbgsym_16.08.1-3_amd64.deb
  kopete_16.08.1-3_amd64.buildinfo
  kopete_16.08.1-3_amd64.deb
  libkopete-dev_16.08.1-3_amd64.deb
  libkopete4-dbgsym_16.08.1-3_amd64.deb
  libkopete4_16.08.1-3_amd64.deb

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#827048: marked as done (kopete+otr send messages unencrypted without notice)

2017-01-13 Thread Debian Bug Tracking System
Your message dated Fri, 13 Jan 2017 15:06:28 +
with message-id 
and subject line Bug#827048: fixed in kopete 4:16.08.1-3
has caused the Debian Bug report #827048,
regarding kopete+otr send messages unencrypted without notice
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
827048: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827048
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Subject: kopete+otr send messages unencrypted without notice
Package: kopete
Version: 4:4.14.1-2
Justification: user security hole
Severity: grave
Tags: security upstream

Dear Maintainer,

Using kopete with OTR plugin lead to messages sent unencrypted without notice. 
(I discovered this after sending sensitive credentials while helping some 
people remotely...)

After checking that OTR encryption was working ("private session started" 
notice), I was helping people remotely while feeling secure. After a first 
restart of the other end computer, I saw a notification saying that OTR session 
was refreshed (which is normal$
Later on, I detected that, in fact, the people at the other end were getting 
all my messages unencrypted... despite of the notification I got on my end.
First detection was done with "Opportunistic" policy on both sides. Then I 
tested again with a full restart at both ends + "Always" policy for OTR plugin. 
Same result: when the other end restarts and I keep my session opened, I get 
the "OTR session refreshed"$

Several accounts credentials were sent in clear, among which for a root account.

When I pay attention for the "OTR session refreshed" message, and especially 
when "Always" policy is used on both sides, I would expect to be alerted that 
some internal issue canceled the encryption, no matters what's the reason.
The notifications are not reliable, and we're talking about a secure messaging 
system here (OTR)... This forced me to uninstall kopete, since I cannot rely on 
it for secure messaging.

Remarks:
 - Two bugs already mention this in the bug tracking of kopete at 
https://bugs.kde.org/show_bug.cgi?id=274099 and 
https://bugs.kde.org/show_bug.cgi?id=362535
 - While the kopete team cannot solve this (old) issue, I cannot believe debian 
can go on propagating this dangerous thing and the heavy security consequences 
to the community, among which are key journalists.
 - Until it is fixed, the OTR plugin should be disabled for kopete, or the 
kopete UI should at least alert about its experimental support status in red 
uppercases.

Thanks a lot in advance for any action, to disable it or fix it!




-- System Information:
Debian Release: 8.5
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=fr_BE.UTF-8, LC_CTYPE=fr_BE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages kopete depends on:
ii  kde-runtime 4:4.14.2-2
ii  kdepim-runtime  4:4.14.2-3
ii  libc6   2.19-18+deb8u4
ii  libexpat1   2.1.0-6+deb8u3
ii  libgadu31:1.12.0-5
ii  libgif4 4.1.6-11+deb8u1
ii  libglib2.0-02.42.1-1+b1
ii  libidn111.29-1+deb8u1
ii  libjasper1  1.900.1-debian1-2.4+deb8u1
ii  libkabc44:4.14.2-2+b1
ii  libkcmutils44:4.14.2-5
ii  libkde3support4 4:4.14.2-5
ii  libkdecore5 4:4.14.2-5
ii  libkdeui5   4:4.14.2-5
ii  libkdnssd4  4:4.14.2-5
ii  libkemoticons4  4:4.14.2-5
ii  libkhtml5   4:4.14.2-5
ii  libkio5 4:4.14.2-5
ii  libkmime4   4:4.14.2-2+b1
ii  libknewstuff2-4 4:4.14.2-5
ii  libknotifyconfig4   4:4.14.2-5
ii  libkopete4  4:4.14.1-2
ii  libkparts4  4:4.14.2-5
ii  libkpimidentities4  4:4.14.2-2+b1
ii  libmeanwhile1   1.0.2-5
ii  libmediastreamer-base3  3.6.1-2.4+b1
ii  libmsn0.3   4.2-2
ii  libortp93.6.1-2.4+b1
ii  libotr5 4.1.0-2+deb8u1
ii  libphonon4  4:4.8.0-4
ii  libqca2 2.0.3-6
ii  libqimageblitz4 1:0.0.6-4
ii  libqt4-dbus 4:4.8.6+git64-g5dc8b2b+dfsg-3+deb8u1
ii  libqt4-network  4:4.8.6+git64-g5dc8b2b+dfsg-3+deb8u1
ii  libqt4-qt3support   4:4.8.6+git64-g5dc8b2b+dfsg-3+deb8u1
ii  libqt4-sql  4:4.8.6+git64-g5dc8b2b+dfsg-3+deb8u1
ii  libqt4-xml  4:4.8.6+git64-g5dc8b2b+dfsg-3+deb8u1
ii  libqtcore4 

kopete_16.08.1-3_amd64.changes ACCEPTED into unstable

2017-01-13 Thread Debian FTP Masters


Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 13 Jan 2017 09:00:46 -0500
Source: kopete
Binary: libkopete4 kopete libkopete-dev
Architecture: source amd64
Version: 4:16.08.1-3
Distribution: unstable
Urgency: medium
Maintainer: Debian/Kubuntu Qt/KDE Maintainers 
Changed-By: Scott Kitterman 
Description:
 kopete - instant messaging and chat application
 libkopete-dev - development files for the Kopete instant messaging and chat 
appli
 libkopete4 - main Kopete library
Closes: 827048
Changes:
 kopete (4:16.08.1-3) unstable; urgency=medium
 .
   * Team upload.
   * Add debian/patches/fix_otr.patch from upstream to resolve issue with
 unencrypted messages being sent without notice (Closes: #827048)
Checksums-Sha1:
 19b0d50d847804a6c7efbf0ac519f7eb8e39f2e2 2916 kopete_16.08.1-3.dsc
 d847aa9e7529bf7cdb0b14ed2864308afeb337ee 58192 kopete_16.08.1-3.debian.tar.xz
 105a7d90bbfa6a902049a07dfc4c6e160faac328 61048834 
kopete-dbgsym_16.08.1-3_amd64.deb
 795205ad4be6634e82e4577909431d44522c5d30 16650 kopete_16.08.1-3_amd64.buildinfo
 952451586b3c75e9f1918c97f6206e9b9c8a832a 6753472 kopete_16.08.1-3_amd64.deb
 60958bbe1a85349e8a3051bf242011669f95f4e5 124342 
libkopete-dev_16.08.1-3_amd64.deb
 58f7f1c1766142be695d21e27e4deb3ca9dfff25 6067840 
libkopete4-dbgsym_16.08.1-3_amd64.deb
 08bcc13608eec581591493815caa9cd773bbb770 414162 libkopete4_16.08.1-3_amd64.deb
Checksums-Sha256:
 f784bbdd2f9d6b4502fee6d26bedd5558193c8d7a09d233c34b5477b1d5f86ab 2916 
kopete_16.08.1-3.dsc
 1c5b2eb91d5cbed8a08eeabe106f5a2e064b28ebba05e9994abe9239f26c3e08 58192 
kopete_16.08.1-3.debian.tar.xz
 8d48de7b52cd3890745126e539cb2f2d1e2b51b03d9f05f40a97f6c5814f7a43 61048834 
kopete-dbgsym_16.08.1-3_amd64.deb
 fbacd49604c46f8d991ce317e6c5329f3411b36ddde9e72b6c77c39150859d7f 16650 
kopete_16.08.1-3_amd64.buildinfo
 8def94b2cde9295aab462a2231b5856ca853b3f90e3f240f221c453132fe27fd 6753472 
kopete_16.08.1-3_amd64.deb
 5d9091884bdf77b2ea2ccb242b7d1fac9b2925bd8adf5b4f67a11c7e2e425756 124342 
libkopete-dev_16.08.1-3_amd64.deb
 2c04947cb519dddef3c9324e6742f55d981bff0d72aaa3653616d6d9f1f67a46 6067840 
libkopete4-dbgsym_16.08.1-3_amd64.deb
 1fbe1b9ffee055a453fe012fd378537126e3f791d621ae4514282710fdc4a75e 414162 
libkopete4_16.08.1-3_amd64.deb
Files:
 58f46329570276922cf2b7f7f5f5a6be 2916 kde optional kopete_16.08.1-3.dsc
 3177eb696b2dfdf9a937068dfee85215 58192 kde optional 
kopete_16.08.1-3.debian.tar.xz
 e1e2949aaeb2fe61e18dd7265516ab7f 61048834 debug extra 
kopete-dbgsym_16.08.1-3_amd64.deb
 031de9eb270fa49617c3faf9d666b82a 16650 kde optional 
kopete_16.08.1-3_amd64.buildinfo
 0e86e471c969582138f96980251768f8 6753472 net optional 
kopete_16.08.1-3_amd64.deb
 5de6aef1ea5fb6abb37f48ff79746207 124342 libdevel optional 
libkopete-dev_16.08.1-3_amd64.deb
 c32cb52b8fba424f66bb6daeea4d8415 6067840 debug extra 
libkopete4-dbgsym_16.08.1-3_amd64.deb
 3d339520fb3e35b329d97fe122c06edd 414162 libs optional 
libkopete4_16.08.1-3_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=C35G
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



=Предлагаем информацию = kfilerepl...@packages.debian.org

2017-01-13 Thread =INFO=
Добрый день, коллеги!

Готовы предоставить информацию для компаний нефтегазового сектора: 

Platts European Marketscan - Ежедневный обзор европейского рынка 
нефтепродуктов
 публикует цены на все основные нефтепродукты 
на европейских и азиатских 
 рынках, которые также используются для расчета 
стоимости наличных поставок. 
Platts Crude Oil Marketwire- Ежедневный обзор рынка сырой нефти
 публикует цены на спотовую нефть сорта Брент, 
по цене которой 
 рассчитывается текущая стоимость до 75% всей 
остальной нефти в мире.
Platts LPGaswire   - Ежедневный отчёт по рынкам СПГ/СПГ 
Platts Dirty Tankerwire- Ежедневный отчет по рынку "грязных" танкеров

Russian domestic market- Ежедневный обзор российского рынка 
нефтепродуктов
Platts Europe And Americas 
Petrochemical Scan - Еженедельный обзор рынка нефтехимии

ARGUS International LPG- Ежедневный отчёт по рынкам LPG
Аргус Сжиженный газ и конденсат- Еженедельный отчёт

Argus Рынок нефти России   - Ежедневный отчёт по рынкам
Argus Экспорт нефти России - Еженедельный отчёт


Если интересует образец информации - пишите запрос, отправим файл

Информация отправляется от 8-30 до 12-00 по Московскому времени

Варианты оплаты и стоимость - оговариваются


Купим информацию

от Platts и Аргус

или можем предложить Вам обмен Вашей информации на наши котировки




Просим прощения, если Вас не заинтересовала эта информация


13.01.2017  19:56:45

ld



Processed: Bug is also in stretch

2017-01-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> found 850874 4:16.08.2-1
Bug #850874 [src:ark] ark: CVE-2017-5330: Unintended execution of scripts and 
executable files
Marked as found in versions ark/4:16.08.2-1.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
850874: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850874
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems