❦ 20 février 2015 22:50 +0100, Kurt Roeckx :
> Please note that RC4 in the default configuration should never be
> negiotated by modern clients and servers. The problem is
> administrators who think they know better changed somethign not to
> use the defaults. If we adjust the defaults it's no
On Fri, 20 Feb 2015, Mehdi Dogguy wrote:
> What is the impact of disabling statsmodels 0.6 features in seaborn?
> Also, AFAICS, the runtime error is not catched, so I guess the program
> will just kill itself?
not "kill" but throw an exception, and quite an informative one ;)
> Why not just set
Processing commands for cont...@bugs.debian.org:
> notfound 778880 4.0.2-3
Bug #778880 {Done: Axel Beckert } [xul-ext-https-everywhere]
xul-ext-https-everywhere: Breaks redirects with query string (e.g. deb.li/… to
anonscm.d.o/cgit/…)
No longer marked as found in versions https-everywhere/4.0.2-
Your message dated Sat, 21 Feb 2015 03:34:18 +
with message-id
and subject line Bug#776719: fixed in icu 52.1-7.1
has caused the Debian Bug report #776719,
regarding icu: CVE-2015-1205 / CVE-2014-9654
to be marked as done.
This means that you claim that the problem has been dealt with.
If thi
Your message dated Sat, 21 Feb 2015 03:56:38 +0100
with message-id <20150221025637.gl3...@sym.noone.org>
and subject line Re: Bug#778880: xul-ext-https-everywhere: Breaks redirects
with query string (e.g. deb.li/… to anonscm.d.o/cgit/…)
has caused the Debian Bug report #778880,
regarding xul-ext-h
Processing control commands:
> affects -1 iceweasel conkeror
Bug #778880 [xul-ext-https-everywhere] xul-ext-https-everywhere: Breaks
redirects with query string (e.g. deb.li/… to anonscm.d.o/cgit/…)
Added indication that 778880 affects iceweasel and conkeror
--
778880: http://bugs.debian.org/cg
Package: xul-ext-https-everywhere
Version: 4.0.2-3
Severity: grave
Justification: Breaks iceweasel in a non-obvious way, potentially causes data
loss
Control: affects -1 iceweasel conkeror
Dear Lunar and Fabrizio,
If I enter the URL http://deb.li/3czsE into Iceweasel's location bar
with HTTPS Ev
control: tags -1 moreinfo
Am 21.02.2015 um 00:55 schrieb Dominik George:
> Package: firewalld
> Version: 0.3.12-1
> Severity: critical
> Justification: breaks the whole system
>
> firewalld has started breaking system boot.
>
> When the unit is enabled, the system boots normally until lightdm is
Processing control commands:
> tags -1 moreinfo
Bug #778872 [firewalld] firewalld: breaks boot (probably LightDM)
Added tag(s) moreinfo.
--
778872: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778872
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--
To UNSUBSCRIBE,
Package: firewalld
Version: 0.3.12-1
Severity: critical
Justification: breaks the whole system
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
firewalld has started breaking system boot.
When the unit is enabled, the system boots normally until lightdm is
being started. LightDM then renders the
Package: typo3-src
Severity: grave
Tags: security
Justification: user security hole
Please see here for details:
https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-001/
Cheers,
Moritz
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
wit
On Sun, 18 Jan 2015 at 21:27:49 +, Simon McVittie wrote:
> On 18/01/15 14:34, Neil Williams wrote:
> > For the benefit of the bug report, I've tried Simon's patch and I do not
> > get the expected results.
>
> I might be misremembering, but I don't think evince's libevdocument-3-4
> is what us
On Fri, Feb 20, 2015 at 10:08:48PM +0100, Florian Schlichting wrote:
> On Fri, Feb 20, 2015 at 06:25:44PM +0100, Kurt Roeckx wrote:
> > On Fri, Feb 20, 2015 at 06:10:59PM +0100, Florian Schlichting wrote:
> > > What servers, and what clients are we talking about here?
> >
> > You might want to loo
On Fri, Feb 20, 2015 at 06:25:44PM +0100, Kurt Roeckx wrote:
> On Fri, Feb 20, 2015 at 06:10:59PM +0100, Florian Schlichting wrote:
> > What servers, and what clients are we talking about here?
>
> You might want to look at those stats:
> https://lists.fedoraproject.org/pipermail/security/2015-Feb
Package: videotrans
Version: 1.6.1-2
Severity: grave
Justification: renders package unusable
I converted to mp4 files with "movie-to-dvd movie1.mp4 movie2.mp4".
I made a background with "movie-make-title-simple -o title -m pal"
Then I tried to create the .vob with "movie-title -o title.vob -t titl
Processing commands for cont...@bugs.debian.org:
> severity 778683 normal
Bug #778683 {Done: jnqnfe } [libparted2] Error creating
partition table on RAID device
Severity set to 'normal' from 'important'
> severity 778697 normal
Bug #778697 {Done: Phillip Susi } [libparted2] libparted2:
error on
Processing control commands:
> severity -1 normal
Bug #778712 [libparted2] libparted2: Breakage of RAID GPT header
Severity set to 'normal' from 'grave'
> close -1
Bug #778712 [libparted2] libparted2: Breakage of RAID GPT header
Marked Bug as done
--
778712: http://bugs.debian.org/cgi-bin/bugrep
Control: severity -1 normal
Control: close -1
thanks
On Fri, 2015-02-20 at 15:12 -0500, Phillip Susi wrote:
> I'm sorry; I misread what you said. I thought you said you had
> removed the information about the individual disks that were members
> of the array.
No problem.
> At this point the arr
Processing control commands:
> severity -1 important
Bug #777421 [dnstop] dnstop: fails to capture packets in realtime
Severity set to 'important' from 'grave'
--
777421: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777421
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problem
Control: severity -1 important
I believe this isn't a RC bug, as it not seem to fall in any of these
categories:
==
* makes unrelated software on the system (or the whole system)
break
* causes serious data loss
* introduces a security hole on systems where you install the
packages
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 2/20/2015 12:17 PM, jnqnfe wrote:
> What? I very carefully went through every one of them before
> sending to ensure that only information about the array (md126) and
> the array members (sdb and sdc) were included. I have just checked
> back over e
Package: mediatomb
Version: 0.12.1-4
Followup-For: Bug #580120
Hello,
I think this is not a bug.
Just tell user that this feature allows anyone to
browse '/' with the user mediatomb runs under
(which is not root !)...
Apache basic authentication could be setup very easily.
Cheers,
Michel
--
Processing commands for cont...@bugs.debian.org:
> block 778196 by 778858
Bug #778196 [openafs-modules-dkms] Fails to built with current Jessie's kernel
778196 was blocked by: 778254
778196 was not blocking any bugs.
Added blocking bug(s) of 778196: 778858
> thanks
Stopping processing here.
Pleas
Processing control commands:
> severity -1 important
Bug #767682 [debian-installer] D-I: installer hangs on re-formatting ext4
partition (having grub in the partition boot record).
Severity set to 'important' from 'serious'
--
767682: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=767682
Debi
Control: severity -1 important
Axel Beckert (2015-02-04):
> Control: found -1 20150107
> Control: severity -1 serious
>
> Hi,
>
> MARTON Jozsef wrote:
> > The formatting dialog hanged at 33%.
> >
> >* What outcome did you expect instead?
> >
> > To re-format /dev/sda3 creating a fresh ext
Processing commands for cont...@bugs.debian.org:
> fixed 709972 4:4.8.4-3
Bug #709972 {Done: Maximiliano Curia } [src:kdenetwork] kppp
doesn't need to run suid
Marked as fixed in versions kdenetwork/4:4.8.4-3.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
70997
Processing commands for cont...@bugs.debian.org:
> reassign 709972 src:kdenetwork
Bug #709972 {Done: Maximiliano Curia } [kppp] kppp doesn't
need to run suid
Bug reassigned from package 'kppp' to 'src:kdenetwork'.
No longer marked as found in versions kdenetwork/4:4.8.4-1.
No longer marked as fix
On Fri, Feb 20, 2015 at 06:10:59PM +0100, Florian Schlichting wrote:
> Hi Kurt,
>
> > > To protect our users and comply with adopted Internet standards, openssl
> > > in Debian should no longer include RC4 ciphers in the DEFAULT list of
> > > ciphers, neither in Jessie nor supported stable / oldst
Processing commands for cont...@bugs.debian.org:
> fixed 709972 4:4.8.4-3
Bug #709972 {Done: Maximiliano Curia } [kppp] kppp doesn't
need to run suid
Ignoring request to alter fixed versions of bug #709972 to the same values
previously set
> thanks
Stopping processing here.
Please contact me if
On Fri, 2015-02-20 at 10:16 -0500, Phillip Susi wrote:
> On 2/19/2015 2:24 PM, jnqnfe wrote:
> > Firstly, I am not running fdisk or parted on the raw member disks,
> > I am simply running generic 'fdisk -l' and 'parted -l' commands,
> > which return information about all disks. To simplify matters
Hi Kurt,
> > To protect our users and comply with adopted Internet standards, openssl
> > in Debian should no longer include RC4 ciphers in the DEFAULT list of
> > ciphers, neither in Jessie nor supported stable / oldstable releases.
>
> I fully support that RFC. However I don't think it's a goo
Processing commands for cont...@bugs.debian.org:
> # sid tag is sufficient
> # Please don't add -ignore tags without discussion with the Release team
> tags 778831 - jessie-ignore
Bug #778831 [src:udevil] udevil: do not ship with Stretch
Removed tag(s) jessie-ignore.
>
End of message, stopping pro
Your message dated Fri, 20 Feb 2015 17:03:57 +
with message-id
and subject line Bug#778555: fixed in icewm 1.3.8+githubmod+20150214+d373d98-2
has caused the Debian Bug report #778555,
regarding icewm: fails to upgrade from 'sid' - trying to overwrite
/usr/share/xsessions/icewm-session.desktop
source: openafs
version: 1.6.9-2
severity: grave
control: fixed -1 1.6.10-4
A bug in OpenAFS's determination of the data version of a file can cause
data loss when writing a file larer than the AFS cache and simultaneously
exceeding the system's maximum dirty ratio.
See
http://rt.central.org/rt/T
Processing control commands:
> fixed -1 1.6.10-4
Bug #778851 [src:openafs] corrupted mmaped files in AFS
Marked as fixed in versions openafs/1.6.10-4.
--
778851: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778851
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--
To
Processing control commands:
> tags 22 + pending
Bug #22 [xdg-utils] xdg-open: CVE-2015-1877: command injection vulnerability
Added tag(s) pending.
--
22: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=22
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags 22 + pending
Dear maintainer,
I've prepared an NMU for xdg-utils (versioned as 1.1.0~rc1+git20111210-7.4) and
uploaded it to DELAYED/2. Please feel free to tell me if I
should delay it longer.
Regards,
Salvatore
diff -Nru xdg-utils-1.1.0~rc1+git20111210/debian/changelog xdg-uti
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 2/19/2015 2:24 PM, jnqnfe wrote:
> Firstly, I am not running fdisk or parted on the raw member disks,
> I am simply running generic 'fdisk -l' and 'parted -l' commands,
> which return information about all disks. To simplify matters I
> removed info
Source: nordugrid-arc
Version: 4.2.0-2
Severity: serious
Tags: sid
Hi,
nordugrid-arc FTBFS in unstable (but not jessie) with the following
error:
> libtool: compile: x86_64-linux-gnu-g++ -DHAVE_CONFIG_H -I. -I../../../..
> -D_FORTIFY_SOURCE=2 -I../../../../include -I/usr/include/giomm-2.4
> -
On Fri, Feb 20, 2015 at 10:07:01AM +, Ian Campbell wrote:
>On Fri, 2015-02-20 at 18:39 +0900, Mark Brown wrote:
>> This is a 1st gen Lenovo Yoga, the other machine that's broken with a
>> fresh install is an Acer Aspire E11 (with BIOS 1.13 IIRC). I can supply
>> more specific data on both if y
Package: src:udevil
Version: 0.4.3-1
Severity: serious
Tags: sid jessie-ignore
Udevil is upstream dead:
https://igurublog.wordpress.com/2014/04/28/ignorantgurus-hiatus/ and
shouldn't be ship with Stretch.
Mateusz
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a sub
Processing control commands:
> affects -1 + live-tools
Bug #778828 [dmsetup] dmsetup: please add Breaks: live-tools (<< 4.0.1-1)
Added indication that 778828 affects live-tools
--
778828: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778828
Debian Bug Tracking System
Contact ow...@bugs.debian
Package: dmsetup
Version: 2:1.02.90-2
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts
Control: affects -1 + live-tools
In order to ensure smooth upgrades from wheezy to jessie dmsetup needs
to break the wheezy version of live-tools. live-tools/wheezy diverts
update-initramfs
On Fri, Feb 20, 2015 at 11:56:59AM +0100, Andreas Beckmann wrote:
> Hi Gerrit,
>
> attached is a patch that moves the default aliases out of
> /usr/share/doc. I verified that this fixes the serious problems discovered
> by piuparts. There are more issues still (leaving around created files,
> pack
Processing commands for cont...@bugs.debian.org:
> severity 648300 serious
Bug #648300 [gsad] Missing xsltproc build dependency
Severity set to 'serious' from 'normal'
> user debian...@lists.debian.org
Setting user to debian...@lists.debian.org (was a...@debian.org).
> usertags 648300 piuparts
The
On Fri, Feb 20, 2015 at 09:25:52AM +, Ian Campbell wrote:
> On Fri, 2015-02-20 at 14:21 +0900, Mark Brown wrote:
> This sounds, if I'm interpreting the paths correctly, like it relates
> somehow to the stuff Steve was doing in #708430, in as much as it sounds
> like your system is one which wo
On Fri, 2015-02-20 at 18:39 +0900, Mark Brown wrote:
> This is a 1st gen Lenovo Yoga, the other machine that's broken with a
> fresh install is an Acer Aspire E11 (with BIOS 1.13 IIRC). I can supply
> more specific data on both if you tell me what you're looking for (I see
> some talk of a blackli
(Steve is probably best placed to say something sensible about this, but
he's away at the moment so I'll see if I can avoid sounding too dumb...)
On Fri, 2015-02-20 at 14:21 +0900, Mark Brown wrote:
> Package: grub-efi-amd64-bin
> Version: 2.02~beta2-20
> Severity: critical
>
> On a couple of occ
48 matches
Mail list logo