Bug#771501: pygopherd: diff for NMU version 2.0.18.3+nmu4

2014-12-08 Thread gregor herrmann
On Mon, 08 Dec 2014 17:49:27 -0800, Cameron Norman wrote: > Unfortunately I have discovered there is an issue in this set of changes. > The gophermap file is modified by the admin in basically all cases of > pygopherd being actually used to serve a gopher site. Overwriting it (on > installation/up

Bug#768730: python-mne REMOVED from testing

2014-12-08 Thread Andreas Tille
Hi, seems we waitet to long. :-( Yaroslav, would you be willing / able to sort things out with the release team since my backlog from vacation is to heavy to try to get this back into testing (if possible at all). Kind regards Andreas. On Mon, Dec 08, 2014 at 04:39:20PM +, Debian te

Bug#772611: horae: build-depend on libpod-latex-perl to fix FTBFS

2014-12-08 Thread Carlo Segre
will do On Tue, 9 Dec 2014, Logan Rosen wrote: Package: horae Version: 071~svn537-1 Severity: serious Tags: patch Justification: fails to build from source (but built successfully in the past) User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu vivid ubuntu-patch Dear Maintainer, hor

Bug#772612: kmail: Sent message opened for editing by default and can be removed from sent by saving

2014-12-08 Thread Shai Berger
Package: kmail Version: 4:4.14.2-2 Severity: grave Justification: causes non-serious data loss Dear Maintainer, Double-click a message in any folder; unlike in kmail1, the message opens as editable (in kmail1 this was only true for Outbox). However, if the message is opened from the sent-mail fo

Bug#772611: horae: build-depend on libpod-latex-perl to fix FTBFS

2014-12-08 Thread Logan Rosen
Package: horae Version: 071~svn537-1 Severity: serious Tags: patch Justification: fails to build from source (but built successfully in the past) User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu vivid ubuntu-patch Dear Maintainer, horae currently FTBFS on amd64 (and presumably i386 as

Bug#767584: segfaults when a dot is used in the config as part of the hostname

2014-12-08 Thread Simon Kainz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hello, Just a short notice: i am currently working on resolving this bug. I isolated the core issue (wrong usage of g_error(), which ultimately leads to application termination and a core dump, as stated in [0]. I'll come up with a patch during th

Bug#772610: bind9: CVE-2014-8500: A Defect in Delegation Handling Can Be Exploited to Crash BIND

2014-12-08 Thread Salvatore Bonaccorso
Source: bind9 Version: 1:9.8.4.dfsg.P1-6 Severity: grave Tags: security upstream fixed-upstream Control: fixed -1 1:9.8.4.dfsg.P1-6+nmu2+deb7u3 Hi, the following vulnerability was published for bind9. CVE-2014-8500[0]: A Defect in Delegation Handling Can Be Exploited to Crash BIND For wheezy-s

Processed: bind9: CVE-2014-8500: A Defect in Delegation Handling Can Be Exploited to Crash BIND

2014-12-08 Thread Debian Bug Tracking System
Processing control commands: > fixed -1 1:9.8.4.dfsg.P1-6+nmu2+deb7u3 Bug #772610 [src:bind9] bind9: CVE-2014-8500: A Defect in Delegation Handling Can Be Exploited to Crash BIND Marked as fixed in versions bind9/1:9.8.4.dfsg.P1-6+nmu2+deb7u3. -- 772610: http://bugs.debian.org/cgi-bin/bugreport

Bug#772609: uhexen2: use autotools-dev to update config.{sub, guess} and fix ppc64el FTBFS

2014-12-08 Thread Logan Rosen
Package: uhexen2 Version: 1.5.6+dfsg-1 Severity: serious Tags: patch Justification: fails to build from source User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu vivid ubuntu-patch Dear Maintainer, Currently, uhexen2 FTBFS on ppc64el because config.guess isn't updated for new architectu

Bug#771092: libuuid1: moreinfo

2014-12-08 Thread Niels Thykier
On 2014-12-08 15:27, Andreas Henriksson wrote: > Hello Niels Thykier. > > Thanks for following up on this bug report... > > On Mon, Dec 08, 2014 at 08:36:36AM +0100, Niels Thykier wrote: >> [...] >> >> In both cases, the condition for the ifs seems to be false. > > In the failing build logs the

Bug#772605: src:python-click: FTBFS due to assertion errors in tests

2014-12-08 Thread Alexandre Viau
Indeed it is. I will try your suggestion and push a patch. On 09/12/14 12:09 AM, Logan Rosen wrote: > Hi Alexandre, > > On Mon, Dec 8, 2014 at 11:21 PM, Alexandre > Viau > wrote: > > Since this is a limitation of the library, I suggest we skip the tests

Bug#772605: src:python-click: FTBFS due to assertion errors in tests

2014-12-08 Thread Logan Rosen
Hi Alexandre, On Mon, Dec 8, 2014 at 11:21 PM, Alexandre Viau wrote: > > Since this is a limitation of the library, I suggest we skip the tests > when building for python2. > > What do you think? I was able to fix the failing tests by adding the following exports to debian/rules, as suggested o

Bug#772605: src:python-click: FTBFS due to assertion errors in tests

2014-12-08 Thread Alexandre Viau
Thank you for the bug report. Since this is a limitation of the library, I suggest we skip the tests when building for python2. What do you think? On 08/12/14 10:50 PM, Logan Rosen wrote: > Package: src:python-click > Version: 3.3-1 > Severity: serious > Justification: fails to build from source

Bug#772606: src:python-tasklib: FTBFS due to UnicodeEncodeError during test

2014-12-08 Thread Logan Rosen
Package: src:python-tasklib Version: 0.5.0-1 Severity: serious Justification: fails to build from source Dear Maintainer, python-tasklib currently FTBFS on amd64 (and presumably i386 as well) due to a UnicodeEncodeError during test_unicode_task of UnicodeTest: ==

Bug#772605: src:python-click: FTBFS due to assertion errors in tests

2014-12-08 Thread Logan Rosen
Package: src:python-click Version: 3.3-1 Severity: serious Justification: fails to build from source Dear Maintainer, python-click FTBFS on amd64 (and presumably i386 as well) due to assertion errors during the tests. 74 tests fail, and 7 pass. Here is a pastebin of the failed local amd64 pbuil

Bug#772604: src:python-ghost: please do not use "--with quilt" in debian/rules

2014-12-08 Thread Logan Rosen
Package: src:python-ghost Version: 0.1b6-1 Severity: serious Justification: fails to build from source (but built successfully in the past) Dear Maintainer, The python-ghost package currently FTBFS due to the inclusion of "--with quilt" in debian/rules without the corresponding build dependency

Bug#756492: Patch available on reviewboard

2014-12-08 Thread Lisandro Damián Nicanor Pérez Meyer
tag 756492 + patch thanks A patch is awaiting for review in KDE's reviewboard [0]. [0] Team mates with KDE reviewboard foo: any way to make this ACKed by upstream? Thanks, Lisandro. -- La vida no se mide por la cantidad de veces que respiramos, sino

Processed: Patch available on reviewboard

2014-12-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tag 756492 + patch Bug #756492 [system-config-printer-kde] system-config-printer-kde: Authentication Dialog cannot receive focus Added tag(s) patch. > thanks Stopping processing here. Please contact me if you need assistance. -- 756492: http://

Bug#771501: pygopherd: diff for NMU version 2.0.18.3+nmu4

2014-12-08 Thread Cameron Norman
On Sun, 7 Dec 2014 15:48:28 +0100 gregor herrmann wrote: > Control: tags 670437 + pending > Control: tags 771501 + pending > > Dear maintainer, > > Cameron Norman has prepared an NMU for pygopherd (versioned as > 2.0.18.3+nmu4) and I've uploaded it to DELAYED/5. Please feel free to > tell me if

Bug#771499: [PATCH] use PROTOCOL_SSLv23 instead of PROTOCOL_SSLv3

2014-12-08 Thread Romain Bignon
Hello, I've pushed a commit on the Weboob package git repository to add a patch to fix this issue: http://anonscm.debian.org/gitweb/?p=collab-maint/weboob.git;a=summary I'm waiting for a DD to upload a new version of the package. Romain -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lis

Bug#770773: marked as done (vdr: Incorrect use of "getent" in postinst script makes the package uninstallable)

2014-12-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Dec 2014 22:25:11 + with message-id and subject line Bug#770773: fixed in vdr 2.0.6-2 has caused the Debian Bug report #770773, regarding vdr: Incorrect use of "getent" in postinst script makes the package uninstallable to be marked as done. This means that you cla

Bug#771499: [PATCH] use PROTOCOL_SSLv23 instead of PROTOCOL_SSLv3

2014-12-08 Thread Jan Gerber
--- a/weboob/deprecated/browser/browser.py.orig 2014-12-08 22:56:48.602859096 +0100 +++ b/weboob/deprecated/browser/browser.py 2014-12-08 22:56:58.818858568 +0100 @@ -730,7 +730,7 @@ class HTTPSConnection2(httplib.HTTPSConnection): _HOSTS = {} -_PROTOCOLS = [ssl.PROTOCOL_TLSv1, ssl.PROT

Bug#767832: please test updated cryptsetup packages

2014-12-08 Thread Jonas Meurer
Hello everyone, I prepared updated cryptsetup packages that fix the following bugs: #767832: cryptsetup: does not decrypt a split /usr as required by initramfs-tools >= 0.118 #767921: files with the same name installed in / and /usr #764564: openrc: fail to boot when encryption + lvm are present

Processed: your mail

2014-12-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tag 761140 + pending Bug #761140 [python-enable] pytimechart fails to start Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 761140: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761140 Deb

Bug#767037: Grub EFI fallback - patches for review

2014-12-08 Thread Steve McIntyre
On Mon, Dec 08, 2014 at 07:29:56PM +, Ian Campbell wrote: >On Mon, 2014-12-08 at 01:36 +, Steve McIntyre wrote: >> >The current package in sid (-17) is unblocked and I think ought to >> >transition tomorrow (or perhaps Tuesday depending on TZ). I propose to >> >upload -18 with this change s

Bug#770942: marked as done (kernel panic from wlc_ioctl)

2014-12-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Dec 2014 21:19:31 + with message-id and subject line Bug#770327: fixed in broadcom-sta 6.30.223.248-3 has caused the Debian Bug report #770327, regarding kernel panic from wlc_ioctl to be marked as done. This means that you claim that the problem has been dealt with

Bug#770327: marked as done (non-root induced DoS via /proc/brcm_monitor0)

2014-12-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Dec 2014 21:19:31 + with message-id and subject line Bug#770327: fixed in broadcom-sta 6.30.223.248-3 has caused the Debian Bug report #770327, regarding non-root induced DoS via /proc/brcm_monitor0 to be marked as done. This means that you claim that the problem ha

Processed: fixed 764926 in 1.0.1-2

2014-12-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > fixed 764926 1.0.1-2 Bug #764926 {Done: Matthias Klumpp } [packagekit] gnome-software: Offline upgrades break boot Marked as fixed in versions packagekit/1.0.1-2. > thanks Stopping processing here. Please contact me if you need assistance. -- 7

Bug#770616: [PATCH] use PROTOCOL_SSLv23 instead of PROTOCOL_SSLv3

2014-12-08 Thread Jan Gerber
Porting nossl3.patch from https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=17;filename=python2.7-nossl3.patch;att=1;bug=768611 to gevent.ssl Not that upstream does not like it that Debian just removed ssl.PROTOCOL_SSLv3 (https://github.com/hypothesis/h/issues/1704) diff a/gevent/ssl.py b/gevent/s

Processed: reassign 764926 to packagekit

2014-12-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 764926 packagekit 1.0.0-2 Bug #764926 {Done: Matthias Klumpp } [gnome-software] gnome-software: Offline upgrades break boot Bug reassigned from package 'gnome-software' to 'packagekit'. No longer marked as found in versions gnome-softwar

Bug#772528: update

2014-12-08 Thread Daniel Pocock
severity 772528 important stop After discussion on debian-security, it appears that SSLv3 is no longer possible[1] with SSLv23_method so I'm reducing the severity. 1. https://lists.debian.org/debian-security/2014/12/msg00021.html -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.

Processed: update

2014-12-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 772528 important Bug #772528 [libresiprocate-1.9] disabling SSL v3 support Severity set to 'important' from 'serious' > stop Stopping processing here. Please contact me if you need assistance. -- 772528: http://bugs.debian.org/cgi-bin/b

Bug#767037: Grub EFI fallback - patches for review

2014-12-08 Thread Ian Campbell
On Mon, 2014-12-08 at 01:36 +, Steve McIntyre wrote: > >The current package in sid (-17) is unblocked and I think ought to > >transition tomorrow (or perhaps Tuesday depending on TZ). I propose to > >upload -18 with this change shortly after that happens. Will you take > >care of the unblock re

Bug#761619: Acknowledgement (installation-reports: Disk scan hangs)

2014-12-08 Thread Ralf-Peter Rohbeck
Fixed in the 2014-11-24 weekly build (debian-testing-amd64-DVD-1.iso). Thanks! -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#764926: marked as done (gnome-software: Offline upgrades break boot)

2014-12-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Dec 2014 19:04:00 + with message-id and subject line Bug#764926: fixed in packagekit 1.0.1-2 has caused the Debian Bug report #764926, regarding gnome-software: Offline upgrades break boot to be marked as done. This means that you claim that the problem has been dea

Bug#771496: overwrites user changes to configuration file /etc/dpkg-cross/cross-compile on upgrade (violates 10.7.3)

2014-12-08 Thread Neil Williams
tag 771496 - confirmed severity 771496 minor thanks On Sun, 7 Dec 2014 15:22:08 +0100 gregor herrmann wrote: > On Sat, 06 Dec 2014 15:28:39 +, Dimitri John Ledkov wrote: > > > The user's configuration in this case comes from debconf prompt and > > that choice is preserved upon upgrades, wit

Processed: Re: Bug#771496: overwrites user changes to configuration file /etc/dpkg-cross/cross-compile on upgrade (violates 10.7.3)

2014-12-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tag 771496 - confirmed Bug #771496 [dpkg-cross] overwrites user changes to configuration file /etc/dpkg-cross/cross-compile on upgrade (violates 10.7.3) Removed tag(s) confirmed. > severity 771496 minor Bug #771496 [dpkg-cross] overwrites user ch

Bug#772573: Update prepared in git

2014-12-08 Thread Ross Gammon
Control: tags -1 pending Hi, I have pushed the fix to git, and will try and arrange an upload soon. Regards, Ross signature.asc Description: OpenPGP digital signature

Bug#770434: marked as done (tcpdump: CVE-2014-8767: tcpdump denial of service in verbose mode using malformed OLSR payload)

2014-12-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Dec 2014 18:33:55 + with message-id and subject line Bug#770434: fixed in tcpdump 4.1.1-1+deb6u1 has caused the Debian Bug report #770434, regarding tcpdump: CVE-2014-8767: tcpdump denial of service in verbose mode using malformed OLSR payload to be marked as done.

Bug#770424: marked as done (tcpdump: CVE-2014-8769: unreliable output using malformed AOVD payload)

2014-12-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Dec 2014 18:33:55 + with message-id and subject line Bug#770424: fixed in tcpdump 4.1.1-1+deb6u1 has caused the Debian Bug report #770424, regarding tcpdump: CVE-2014-8769: unreliable output using malformed AOVD payload to be marked as done. This means that you clai

Processed: Update prepared in git

2014-12-08 Thread Debian Bug Tracking System
Processing control commands: > tags -1 pending Bug #772573 [gramps] gramps: clean target failing Added tag(s) pending. -- 772573: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772573 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bu

Bug#758183: not solved completely

2014-12-08 Thread Jan Vogelsang
I have just installed the latest version of gnome-shell (3.14.2-1) and the problem is still there. 2014-12-08 18:13 GMT+01:00 Josselin Mouette : > Jan Vogelsang wrote: > In gdm3 version 3.14.1-3 autologin is working, but selecting another > user by keyboard is not possible. Using

Bug#759777: marked as done (tt-rss: Partially broken by libjs-dojo-core/dijit upgrade)

2014-12-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Dec 2014 18:18:47 + with message-id and subject line Bug#759777: fixed in tt-rss 1.15+dfsg-1 has caused the Debian Bug report #759777, regarding tt-rss: Partially broken by libjs-dojo-core/dijit upgrade to be marked as done. This means that you claim that the proble

Processed: Re: Bug#772573: gramps: clean target failing

2014-12-08 Thread Debian Bug Tracking System
Processing control commands: > found -1 4.1.1~dfsg-1 Bug #772573 [gramps] gramps: clean target failing Marked as found in versions gramps/4.1.1~dfsg-1. -- 772573: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772573 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- T

Bug#772573: gramps: clean target failing

2014-12-08 Thread Ross Gammon
Control: found -1 4.1.1~dfsg-1 On 12/08/2014 06:37 PM, Ross Gammon wrote: > Package: gramps > Version: 4.0.4+dfsg-1~ubuntu14.04.1 > Severity: serious > Justification: Policy 4.9 > > Dear Maintainer, > > Whilst investigating #771095 I noticed that the clean target for Gramps is > failing, leaving

Bug#772573: gramps: clean target failing

2014-12-08 Thread Ross Gammon
Package: gramps Version: 4.0.4+dfsg-1~ubuntu14.04.1 Severity: serious Justification: Policy 4.9 Dear Maintainer, Whilst investigating #771095 I noticed that the clean target for Gramps is failing, leaving behind the following files: data/tips.xml gramps/plugins/lib/holidays.xml po/.intltool-merge

Bug#758183: not solved completely

2014-12-08 Thread Josselin Mouette
Jan Vogelsang wrote: In gdm3 version 3.14.1-3 autologin is working, but selecting another user by keyboard is not possible. Using the mouse another user can be selected, but when typing the password the password prompt becomes unfocussed after every button press an

Processed: bug 772325 is forwarded to https://bugs.freedesktop.org/show_bug.cgi?id=87093, tagging 772325

2014-12-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > forwarded 772325 https://bugs.freedesktop.org/show_bug.cgi?id=87093 Bug #772325 [libmbim-utils] libmbim-utils: bashism in /bin/sh script Set Bug forwarded-to-address to 'https://bugs.freedesktop.org/show_bug.cgi?id=87093'. > tags 772325 + fixed-u

Bug#771619: marked as done (fusionforge: plugin postinst script uses 'service' instead of invoke-rc.d)

2014-12-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Dec 2014 15:37:08 + with message-id and subject line Bug#771619: fixed in fusionforge 5.3.2+20141104-2 has caused the Debian Bug report #771619, regarding fusionforge: plugin postinst script uses 'service' instead of invoke-rc.d to be marked as done. This means tha

Bug#772262: marked as done (dnssec-trigger: bashism in /bin/sh script)

2014-12-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Dec 2014 15:36:14 + with message-id and subject line Bug#772262: fixed in dnssec-trigger 0.13~svn685-3 has caused the Debian Bug report #772262, regarding dnssec-trigger: bashism in /bin/sh script to be marked as done. This means that you claim that the problem has

Bug#770424: marked as done (tcpdump: CVE-2014-8769: unreliable output using malformed AOVD payload)

2014-12-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Dec 2014 15:33:46 + with message-id and subject line Bug#770424: fixed in tcpdump 4.3.0-1+deb7u1 has caused the Debian Bug report #770424, regarding tcpdump: CVE-2014-8769: unreliable output using malformed AOVD payload to be marked as done. This means that you clai

Bug#770434: marked as done (tcpdump: CVE-2014-8767: tcpdump denial of service in verbose mode using malformed OLSR payload)

2014-12-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Dec 2014 15:33:46 + with message-id and subject line Bug#770434: fixed in tcpdump 4.3.0-1+deb7u1 has caused the Debian Bug report #770434, regarding tcpdump: CVE-2014-8767: tcpdump denial of service in verbose mode using malformed OLSR payload to be marked as done.

Bug#770949: marked as done (wordpress: CVE-2014-9031 CVE-2014-9032 CVE-2014-9033 CVE-2014-9034 CVE-2014-9035 CVE-2014-9036 CVE-2014-9037 CVE-2014-9038 CVE-2014-9039 (issues fixed in 4.0.1 security rel

2014-12-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Dec 2014 15:33:51 + with message-id and subject line Bug#770425: fixed in wordpress 3.6.1+dfsg-1~deb7u5 has caused the Debian Bug report #770425, regarding wordpress: CVE-2014-9031 CVE-2014-9032 CVE-2014-9033 CVE-2014-9034 CVE-2014-9035 CVE-2014-9036 CVE-2014-9037 C

Bug#770425: marked as done (wordpress: CVE-2014-9031 CVE-2014-9032 CVE-2014-9033 CVE-2014-9034 CVE-2014-9035 CVE-2014-9036 CVE-2014-9037 CVE-2014-9038 CVE-2014-9039 (issues fixed in 4.0.1 security rel

2014-12-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Dec 2014 15:33:51 + with message-id and subject line Bug#770425: fixed in wordpress 3.6.1+dfsg-1~deb7u5 has caused the Debian Bug report #770425, regarding wordpress: CVE-2014-9031 CVE-2014-9032 CVE-2014-9033 CVE-2014-9034 CVE-2014-9035 CVE-2014-9036 CVE-2014-9037 C

Bug#766670: marked as done (getmail4: unpatched security issues (MITM) in stable)

2014-12-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Dec 2014 15:32:15 + with message-id and subject line Bug#766670: fixed in getmail4 4.46.0-1~deb7u1 has caused the Debian Bug report #766670, regarding getmail4: unpatched security issues (MITM) in stable to be marked as done. This means that you claim that the probl

Bug#771125: marked as done (mutt: CVE-2014-9116: write_one_header can call mutt_substrdup with begin > end, leading to crash)

2014-12-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Dec 2014 15:32:41 + with message-id and subject line Bug#771125: fixed in mutt 1.5.21-6.2+deb7u3 has caused the Debian Bug report #771125, regarding mutt: CVE-2014-9116: write_one_header can call mutt_substrdup with begin > end, leading to crash to be marked as done

Bug#762745: marked as done ([CVE-2014-6051 to CVE-2014-6055] Multiple issues in libVNCserver)

2014-12-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Dec 2014 15:32:27 + with message-id and subject line Bug#762745: fixed in libvncserver 0.9.9+dfsg-1+deb7u1 has caused the Debian Bug report #762745, regarding [CVE-2014-6051 to CVE-2014-6055] Multiple issues in libVNCserver to be marked as done. This means that you

Bug#766773: marked as done (irssi-plugin-xmpp: /query fails with "Irssi: critical query_init: assertion 'query->name != NULL' failed")

2014-12-08 Thread Debian Bug Tracking System
Your message dated Mon, 8 Dec 2014 16:03:01 +0100 with message-id <20141208150301.ga28...@jadzia.comodo.priv.at> and subject line Re: Bug#766773: Bug#772476: nmu: irssi-plugin-xmpp_0.52+git20140102-2 has caused the Debian Bug report #766773, regarding irssi-plugin-xmpp: /query fails with "Irssi:

Bug#766670: RC bug in stable and oldstable for getmail4

2014-12-08 Thread Raphael Hertzog
Hi, On Mon, 08 Dec 2014, Osamu Aoki wrote: > Si I should change "getmail4 (4.46.0-1~deb7u1) wheezy-security" as: > * Version: 4.46.0-1~deb6u1 change > * target: squeeze-security change target is "squeeze-lts" in fact but there are no queues in front of that r

Bug#771092: libuuid1: moreinfo

2014-12-08 Thread Andreas Henriksson
Hello Niels Thykier. Thanks for following up on this bug report... On Mon, Dec 08, 2014 at 08:36:36AM +0100, Niels Thykier wrote: > On Thu, 27 Nov 2014 12:32:08 +0100 Andreas Henriksson > wrote: > > Control: tags 771092 + moreinfo > > > > Just adding the passwd dependency would hide the real pr

Bug#772347: xbmc: bashism in /bin/sh script

2014-12-08 Thread Bálint Réczey
Control: severity -1 important Control: tags -1 confirmed pending Hi Raphael, Thank you for the bug report. 2014-12-06 15:34 GMT+01:00 Raphael Geissert : > Package: xbmc > Severity: serious > Version: 2:13.2+dfsg1-4 > User: debian-rele...@lists.debian.org > Usertags: goal-dash > > Hi, > > I've r

Processed: Re: Bug#772347: xbmc: bashism in /bin/sh script

2014-12-08 Thread Debian Bug Tracking System
Processing control commands: > severity -1 important Bug #772347 [xbmc] xbmc: bashism in /bin/sh script Severity set to 'important' from 'serious' > tags -1 confirmed pending Bug #772347 [xbmc] xbmc: bashism in /bin/sh script Added tag(s) confirmed and pending. -- 772347: http://bugs.debian.org/

Bug#766670: RC bug in stable and oldstable for getmail4

2014-12-08 Thread Osamu Aoki
Hi, On Thu, Dec 04, 2014 at 12:04:57PM +0100, Raphael Hertzog wrote: > On Fri, 28 Nov 2014, Osamu Aoki wrote: > > Although I am not comfortable to package this way if I do it again (I > > inherited it and did not touch it back then.), I should do the same > > strange packaging style again consider

Bug#767554: python-persistent and python-zodb: error when trying to install together

2014-12-08 Thread Barry Warsaw
On Dec 08, 2014, at 01:47 PM, Arnaud Fontaine wrote: >> Arnaud Fontaine wrote (26 Nov 2014 09:03:09 GMT) : >>> Really sorry about that. FTR, I have not uploaded anything yet because >>> the release team would prefer to avoid the Conflicts if possible and >>> make python-zodb depends upon py

Bug#771797: marked as done (liblldb-3.5: does not ship SONAME link /usr/lib//liblldb.so.1 -> liblldb-3.5.so.1)

2014-12-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Dec 2014 13:50:11 + with message-id and subject line Bug#771797: fixed in llvm-toolchain-3.5 1:3.5-7 has caused the Debian Bug report #771797, regarding liblldb-3.5: does not ship SONAME link /usr/lib//liblldb.so.1 -> liblldb-3.5.so.1 to be marked as done. This mea

Bug#772325: accepted in upstream

2014-12-08 Thread Boris Egorov
My patch was accepted in upstream: https://bugs.freedesktop.org/show_bug.cgi?id=87093 -- Best regards, Boris Egorov -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#772008: CVE request: mpfr: buffer overflow in mpfr_strtofr

2014-12-08 Thread Vasyl Kaigorodov
Hello, A buffer overflow was reported [1] in mpfr. This is due to incorrect GMP documentation for mpn_set_str about the size of a buffer (discussion is at [1]; first fix in the GMP documentation is at [2]). This bug is present in the MPFR versions from 2.1.0 (adding mpfr_strtofr) to this one, and

Processed: Additional fixed versions

2014-12-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > fixed 656586 routino/2.7.2-2 Bug #656586 {Done: Andreas Beckmann } [routino-www] fails to purge - rmdir: failed to remove '/var/lib/routino/data': No such file or directory Marked as fixed in versions routino/2.7.2-2. > thanks Stopping processin

Bug#772512: marked as done (cpl-plugin-muse: FTBFS: tests fail on several architectures)

2014-12-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Dec 2014 12:19:51 + with message-id and subject line Bug#772512: fixed in cpl-plugin-muse 1.0+dfsg-2 has caused the Debian Bug report #772512, regarding cpl-plugin-muse: FTBFS: tests fail on several architectures to be marked as done. This means that you claim that

Bug#772417: Re: Bug#772417: Re: Bug#772417: desktop-base: debian/copyright file needs to be updated

2014-12-08 Thread Francesco Poli
[Dear Aurélien, please reply to me and to the bug address, otherwise I can only see your replies on the mailing list web archives, which is unpractical, and your replies fail to show up on the bug log! Thanks!] On Mon, 08 Dec 2014 08:30:29 +0100 Aurélien COUDERC wrote: > Le 08/12/2014 00:16, Fra

Processed: jessie

2014-12-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 772507 + sid jessie Bug #772507 [pytimechart] pytimechart SIGSEGV on start Added tag(s) sid and jessie. > tags 770448 + sid jessie Bug #770448 [dpkg] Setting up libpam-modules-bin (1.1.8-3.1) hangs forever Added tag(s) sid and jessie. > End o

Bug#760846: marked as done (amanda-server: amreport crashes with segfault in file /usr/lib/amanda/perl/Amanda/Report/human.pm)

2014-12-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Dec 2014 09:49:23 + with message-id and subject line Bug#760846: fixed in amanda 1:3.3.6-4 has caused the Debian Bug report #760846, regarding amanda-server: amreport crashes with segfault in file /usr/lib/amanda/perl/Amanda/Report/human.pm to be marked as done. Th

Processed: Re: Processed: reassign 771555 to xul-ext-gnome-keyring

2014-12-08 Thread Debian Bug Tracking System
Processing control commands: > tags -1 moreinfo unreproducible Bug #771555 [xul-ext-gnome-keyring] gnome-keyring Iceweasel plugin cannot be disabled Added tag(s) unreproducible and moreinfo. > severity -1 important Bug #771555 [xul-ext-gnome-keyring] gnome-keyring Iceweasel plugin cannot be disa

Bug#771555: Processed: reassign 771555 to xul-ext-gnome-keyring

2014-12-08 Thread Ximin Luo
Control: tags -1 moreinfo unreproducible Control: severity -1 important Hi, Please give some more information on how to reproduce this. What version of iceweasel are you running? mozilla-gnome-keyring is known not to work for iceweasel 33 and above, see https://github.com/infinity0/mozilla-gno

Processed: fixed

2014-12-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > fixed 772528 1.9.8-1 Bug #772528 [libresiprocate-1.9] disabling SSL v3 support Marked as fixed in versions resiprocate/1.9.8-1. > End of message, stopping processing here. Please contact me if you need assistance. -- 772528: http://bugs.debian.o

Bug#772325: [PATCH] utils,mbim-network: fix bashisms

2014-12-08 Thread Boris Egorov
See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772325 Signed-off-by: Boris Egorov --- utils/mbim-network.in | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/utils/mbim-network.in b/utils/mbim-network.in index e58a148..5ea8dd6 100755 --- a/utils/mbim-network.in +++ b

Bug#772528: disabling SSL v3 support

2014-12-08 Thread Daniel Pocock
Package: libresiprocate-1.9 Version: 1.9.7-1 Severity: serious Tags: security Thanks to POODLE[1], CVE-2014-3566, many people want to disable SSL v3.0. The existing reSIProcate library code offers developers a choice between TLSv1_method() and SSLv23_method() Using TLSv1_method() disables the SS