Processing control commands:
> tags -1 pending
Bug #861077 [icinga-idoutils] icinga-idoutils: fails to upgrade squeeze ->
wheezy -> jessie -> stretch
Added tag(s) pending.
--
861077: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861077
Debian Bug Tracking System
Contact ow...@bugs.debian.org
Control: tags -1 pending
On 04/28/2017 05:33 PM, Sebastiaan Couwenberg wrote:
> On 04/28/2017 05:10 PM, Andreas Beckmann wrote:
>> On 2017-04-28 15:10, Sebastiaan Couwenberg wrote:
>>> No joy there either. The upgrade to wheezy fails again for unrelated
>>> reasons:
>>>
>>> The following packages
Le Sat, Apr 29, 2017 at 09:50:01AM -0500, Dirk Eddelbuettel a écrit :
>
> I think I will cover these by hand now:
>
>package dotFortran dotC recommended
> 1: class-7.3-14 FALSE TRUETRUE
> 2: cluster-2.0.6 TRUE TRUETRUE
> 3: foreign-0
Processing commands for cont...@bugs.debian.org:
> severity 861573 important
Bug #861573 [debian-installer] debian-installer: function 'go-back' broken
Severity set to 'important' from 'critical'
> tags 861573 - d-i
Bug #861573 [debian-installer] debian-installer: function 'go-back' broken
Removed
It seems like an /etc/gss/mech.d/README-- (or similar)
would alleviate the technical problems with having a single file
named README, and would be glob-able for consuming software that is
adapted to know about a broader convention. It would, of course, be
slightly confusing to users even if there
Your message dated Mon, 01 May 2017 00:48:42 +
with message-id
and subject line Bug#861175: fixed in cairocffi 0.7.2-2
has caused the Debian Bug report #861175,
regarding cairocffi: Please drop Build-Depends and Recommends on xcffib
to be marked as done.
This means that you claim that the pro
Processing commands for cont...@bugs.debian.org:
> tag 861175 pending
Bug #861175 [src:cairocffi] cairocffi: Please drop Build-Depends and Recommends
on xcffib
Added tag(s) pending.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
861175: http://bugs.debian.org/cg
tag 861175 pending
thanks
Hello,
Bug #861175 reported by you has been fixed in the Git repository. You can
see the changelog below, and you can check the diff of the fix at:
https://anonscm.debian.org/cgit/python-modules/packages/cairocffi.git/commit/?id=7047e08
---
commit 7047e089ba798970
There's a pull-request patch upstream:
https://github.com/go-asn1-ber/asn1-ber/pull/7/commits/4563065
But unfortunately it's not clean, and only consider 32-bit system.
Need to figure out a better way.
--
Roger Shimizu, GMT +9 Tokyo
PGP/GPG: 4096R/6C6ACD6417B3ACB1
pgpnv4Q2lge4d.pgp
Descriptio
Your message dated Sun, 30 Apr 2017 23:48:41 +
with message-id
and subject line Bug#861574: fixed in ocrmypdf 4.3.5-3
has caused the Debian Bug report #861574,
regarding ocrmypdf: OCRmyPDF broken with Ghostscript 9.20
to be marked as done.
This means that you claim that the problem has been d
Your message dated Mon, 01 May 2017 00:28:13 +0100
with message-id <1493594893.2564.12.ca...@decadent.org.uk>
and subject line Re: Bug#861225: [Regression] Soft lockup in KVM/QEMU virtual
machine
has caused the Debian Bug report #861225,
regarding [Regression] Soft lockup in KVM/QEMU virtual machi
> try 3.16.43-2, should be available on mirrors in a day or two
Did that just now since my guestes received that kernel update.
Booting fine again, no issues starting/running guests.
Seems Solved, please close this bug.
Thanks a lot for your work, all kernel devs!!
Package: tilix
Version: 1.5.4-1
Severity: grave
Justification: renders package unusable
Dear Maintainer,
Following the name change from terminix to tilix, I updated
my Stretch system (which uses apt pining to install Sid
packages whenever possible) to use the new developments of
tilix.
Instal
Package: ocrmypdf
Version: 4.3.5-2
Severity: grave
Tags: upstream
Justification: renders package unusable
With Ghostscript 9.20 -- the version in stretch & sid at the time of
writing -- OCRmyPDF exits with errors like these:
GPL Ghostscript 9.20: ERROR: VMerror (-25) on closing pdfwrite devic
Package: debian-installer
Version: From Netinst.iso: Binary-1 20170116-10:57
Severity: critical
Tags: d-i
Justification: breaks the whole system
Dear Maintainer,
Im installing debian jessie from netinstall iso amd64.
For example (you will understand later), I've chosen "espeak-udeb" package.
When
Processing commands for cont...@bugs.debian.org:
> tags 861028 + wheezy-ignore
Bug #861028 [morse-simulator] morse-simulator: abuses Conflicts to circument
Policy 10.1 on /usr/bin/morse collision with morse
Added tag(s) wheezy-ignore.
> thanks
Stopping processing here.
Please contact me if you n
Processing commands for cont...@bugs.debian.org:
> retitle 861474 slim: Session restarts in a loop rendering the whole system
> useless
Bug #861474 [slim] slim: Session restarts in a loop renedering whole system
useless.
Changed Bug title to 'slim: Session restarts in a loop rendering the whole
Hi Gianfranco,
On Thu, Apr 27, 2017 at 08:11:46AM +0200, Gianfranco Costamagna wrote:
> On Tue, 25 Apr 2017 15:09:02 +0200 Bernd Zeimetz wrote:
> > Severity: grave
> > Version: 4.7.2~dfsg-2~bpo8+1
> > Package: nodejs-dev
> >
> > nodejs-dev in jessie-backports depends on libssl1.0-dev, which does
Lukas' solution worked it for me as well:
echo "Type=simple" >> /lib/systemd/system/slim.service
systemctl daemon-reload
Shai
On Sat, Apr 29, 2017 at 7:45 PM, Eriberto wrote:
> I did some tests and I have news. I downloaded the versions 3.8.6 and
> 3.8.7 from upstream homepage and I did a 'make' inside a Sid jail.
> After this, I compiled a shell script. The script compiled by 3.8.6
> version worked fine, but the script
Thanks Paul.
>From your output I see you clicked on the Apply button in Synaptic, a
bunch of events from DEAD accessible objects resulted, that Orca kept
processing events, presented the window you Alt+Tabbed into, etc.
Having said that, if memory serves me, even before the changes I made,
Orca k
Source: sphinx
Version: 1.5.5-1
Severity: serious
Justification: breaks build of reverse dependencies.
Hello, I'm not sure if this is a problem in sphinx or not,
I noticed this failure on src:dask in Ubuntu, and it is
reproducible with 1.5.3 and 1.5.5 in Ubuntu artful and Debian experimental.
For
Hi Olav,
On Sun, Apr 30, 2017 at 08:54:30PM +0200, Olav Seyfarth wrote:
> Will it appear in proposed? I will test it for sure, will let you
> know. But I am AFK till next saturday ...
Yes on -proposed. It is scheduled to be included for the next point
release which is due to be on next weekend in
Processing commands for cont...@bugs.debian.org:
> found 861514 0.9-1
Bug #861514 {Done: Jonas Smedegaard } [radicale] radicale:
CVE-2017-8342: htpasswd authentication vulnerable to timing-based bruteforce
attacks
Marked as found in versions radicale/0.9-1.
> thanks
Stopping processing here.
Pl
Hi Sam,
On Sun, Apr 30, 2017 at 12:03:30PM -0400, Sam Hartman wrote:
> I'm going to start by explaining why that file is there and asking for
> your help in figuring out what to do.
> I'm then going to argue that this is not an RC bug (probably not even a
> bug at all).
> But I'm more interested
Processing commands for cont...@bugs.debian.org:
> unarchive 854599
Bug #854599 {Done: Mattia Rizzolo } [libpodofo] libpodofo:
CVE-2015-8981 - Heap overflow in the function ReadXRefSubsection
Unarchived Bug 854599
> fixed 854599 0.9.0-1.1+deb7u1
Bug #854599 {Done: Mattia Rizzolo } [libpodofo] lib
Will it appear in proposed? I will test it for sure, will let you know. But I
am AFK till next saturday ...
signature.asc
Description: OpenPGP digital signature
Hi Joanmarie,
On Sat, 29 Apr 2017 11:51:28 -0400 Joanmarie Diggs
wrote:
> I've asked on the Orca list for testing, and we have enough users that
> use master and respond quite quickly to calls for testing, that we
> should know soon enough.
As you have seen, I already created a Debian package wi
Hi
This issue has been assigned CVE-2017-8342 via the cveform at MITRE.
Regards,
Slavatore
Processing commands for cont...@bugs.debian.org:
> retitle 861514 radicale: CVE-2017-8342: htpasswd authentication vulnerable to
> timing-based bruteforce attacks
Bug #861514 {Done: Jonas Smedegaard } [radicale] radicale:
htpasswd authentication vulnerable to timing-based bruteforce attacks
Chan
Processing commands for cont...@bugs.debian.org:
> severity 857296 serious
Bug #857296 [hol88-library] hol88-library is an empty package on arm64, hppa,
and m68k
Severity set to 'serious' from 'important'
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
857296: ht
Your message dated Sun, 30 Apr 2017 18:04:11 +
with message-id
and subject line Bug#860393: fixed in slashem 0.0.7E7F3-9
has caused the Debian Bug report #860393,
regarding Segfaults on startup
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is no
Processing control commands:
> tags -1 pending
Bug #860393 [slashem-gtk] Segfaults on startup
Added tag(s) pending.
--
860393: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860393
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 pending
On Mon, 17 Apr 2017 18:19:22 +0200 =?UTF-8?Q?Bernhard_=c3=9cbelacker?=
wrote:
> Hello,
> just tried if I can reproduce the issue.
>
> I think this is a again a case of a pointer truncation by default
> int for a pointer returning function.
>
>
> First patch is just to
On Sat, Apr 22, 2017 at 21:42:30 +0100, Ben Hutchings wrote:
> On Sat, 2017-04-22 at 20:07 +, Niels Thykier wrote:
> [...]
> > Hi Ben,
> >
> > Could you please file a pu bug for this? I fear that otherwise, it
> > might be overlooked for the next time the SRMs review the outstanding
> > stab
Processing commands for cont...@bugs.debian.org:
> # cloning the bug, see below
> clone 861432 -1
Bug #861432 [release.debian.org] nmu: golang-go.crypto
Bug 861432 cloned as bug 861546
860429 was blocked by: 861432
860429 was blocking: 859655
Added blocking bug(s) of 860429: 861546
> reassign -1 n
Hello Wolfgang,
thank you for spending your time helping to make Debian better with
this bug report.
I have a bugfix release for sane-backend ready and I send it to you.
Please can you test the packages?
CU
Jörg
--
New:
GPG Fingerprint: 63E0 075F C8D4 3ABB 35AB 30EE 09F8 9F3C 8CA1 D25D
GPG
Your message dated Sun, 30 Apr 2017 16:34:14 +
with message-id
and subject line Bug#860623: fixed in golang-github-jacobsa-bazilfuse
0.0~git20150622-2
has caused the Debian Bug report #860623,
regarding golang-github-jacobsa-bazilfuse: FTBFS on i386: dh_auto_build: go
install -v -p 1 github.
Processing control commands:
> tags -1 patch
Bug #861305 [python-cairo-dbg] python-cairo-dbg: unhandled symlink to directory
conversion: /usr/share/doc/PACKAGE
Added tag(s) patch.
--
861305: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861305
Debian Bug Tracking System
Contact ow...@bugs.de
Control: tags -1 patch
Hi,
On Thu, Apr 27, 2017 at 10:40:40AM +0200, Andreas Beckmann wrote:
> an upgrade test with piuparts revealed that your package installs files
> over existing symlinks and possibly overwrites files owned by other
> packages. This usually means an old version of the package
On Thu, 23 Mar 2017 07:10:05 -0400 Jeremy Bicha wrote:
> By the way, the constant respawn is really annoying when I install
> stretch on VirtualBox.
>
> I use the latest stretch testing netboot iso to install. Then I need
> to boot to a command line with Internet so I can install
> virtualbox-gue
> "Helmut" == Helmut Grohne writes:
Helmut> Package: libgssapi-krb5-2 Version: 1.15-1 Severity: serious
Helmut> libgssapi-krb5-2 is a shared library package and contains
Helmut> /etc/gss/mech.d/README. The latter filename does not depend
Helmut> on the soname of the library an
Your message dated Sun, 30 Apr 2017 16:02:08 +
with message-id
and subject line Bug#855943: fixed in shadow 1:4.2-3+deb8u2
has caused the Debian Bug report #855943,
regarding shadow: CVE-2017-2616: Sending SIGKILL to other processes with root
privileges via su
to be marked as done.
This mean
Your message dated Sun, 30 Apr 2017 15:51:18 +
with message-id
and subject line Bug#861531: fixed in ricochet 0.7
has caused the Debian Bug report #861531,
regarding ricochet: FTBFS - Makefile:900: recipe for target 'ricochet-icon.svg'
failed
to be marked as done.
This means that you claim t
tag 860623 + pending
thanks
Some bugs in the golang-github-jacobsa-bazilfuse package are closed
in revision 88958ce7251d119d1ecf90e462a2b17348c8ff50 in branch '
mentors' by Roger Shimizu
The full diff can be seen at
https://anonscm.debian.org/cgit/pkg-go/packages/golang-github-jacobsa-bazilfuse.
Processing commands for cont...@bugs.debian.org:
> tag 860623 + pending
Bug #860623 [src:golang-github-jacobsa-bazilfuse]
golang-github-jacobsa-bazilfuse: FTBFS on i386: dh_auto_build: go install -v -p
1 github.com/jacobsa/bazilfuse returned exit code 2
Added tag(s) pending.
> thanks
Stopping pr
Control: retitle -1 php-monolog: FTBFS (failing tests at the end of the month)
Hi,
On Sat, Apr 29, 2017 at 12:23:30PM +, Santiago Vila wrote:
> There was 1 failure:
>
> 1) Monolog\Handler\RotatingFileHandlerTest::testRotation with data set
> "Rotation is not triggered when the file of the c
Processing control commands:
> retitle -1 php-monolog: FTBFS (failing tests at the end of the month)
Bug #861468 [src:php-monolog] php-monolog: FTBFS (failing tests)
Changed Bug title to 'php-monolog: FTBFS (failing tests at the end of the
month)' from 'php-monolog: FTBFS (failing tests)'.
--
8
On Fri, 2017-04-28 at 18:11 +0200, Olav Seyfarth wrote:
> Hi Ben,
>
> first, thanks for your patience, very much appreciated. I know how hard
> debugging can be, I'm helping with Enigmail If I have time to do so.
> I tried to write clearly but now see that I did not succeed:
>
> > Based on your o
Removing the slim package solves the problem, so slim seems to be the
culprit.
I don't know what this package is trying to do, but maybe you meant
for it to depend on default-jdk-doc instead?
Thanks,
Jeremy Bicha
Hi Bernd
Am 30.04.2017 um 05:53 schrieb Bernd Zeimetz:
> Hi Michael,
>
> any news on that? I could upload an NMU if you thats okay for you.
> Or is there anything else I can help with?
The package is in collab-maint. If you can commit your changes there and
make the upload, this would be great.
Source: tcpreplay
Version: 4.2.4-1
Severity: serious
https://buildd.debian.org/status/package.php?p=tcpreplay&suite=sid
...
[tcprewrite] Seeded Keep MAC test: OK
[tcprewrite] L7 fuzzing test: Makefile:963: recipe for target
'rewrite_l7fuzzing' failed
make[2]: *** [rewrite_l7fuzzing]
Package: runit-init
Version: 2.1.2-9
Severity: grave
Justification: renders package unusable
Dear Maintainer,
* What led up to the situation?
I ran `apt install runit-init` and then attempted to reboot with
`/sbin/reboot`, `/sbin/poweroff`, `init 0` & `init 6`, all to no
effect; no er
Package: ricochet
Version: 0.6
Severity: serious
Justification: fails to build from source
Dear Maintainer,
The latest version of ricochet currently fails to build from source in
Sid.
(I first saw this when the package was synced to Ubuntu, but I was also
able to reproduce it on my Sid vm)
See
Your message dated Sun, 30 Apr 2017 11:32:23 +
with message-id
and subject line Bug#851755: fixed in mariadb-10.0 10.0.29-0+deb8u1
has caused the Debian Bug report #851755,
regarding mariadb-10.0: CVE-2016-6664 CVE-2017-3238 CVE-2017-3243 CVE-2017-3244
CVE-2017-3257 CVE-2017-3258 CVE-2017-326
Your message dated Sun, 30 Apr 2017 11:32:23 +
with message-id
and subject line Bug#842895: fixed in mariadb-10.0 10.0.29-0+deb8u1
has caused the Debian Bug report #842895,
regarding mariadb-10.0: CVE-2016-6664
to be marked as done.
This means that you claim that the problem has been dealt wi
Your message dated Sun, 30 Apr 2017 11:32:45 +
with message-id
and subject line Bug#858941: fixed in mariadb-10.0 10.0.30-0+deb8u2
has caused the Debian Bug report #858941,
regarding mariadb-server-10.[01]: purging old mariadb-server shuts down
mariadb-server and removes init.d links
to be ma
Processing control commands:
> tag -1 unreproducible
Bug #861431 [restic] restic: Rebuild needed for CVE-2017-3204; #859655
Added tag(s) unreproducible.
--
861431: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861431
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tag -1 unreproducible
I can't reproduce this on amd64.
And https://buildd.debian.org/status/package.php?p=restic says amd64, arm64,
armel, armhf, i386 were rebuilt without any problem.
ppc64el rebuilding seems to give the same error as yours, though.
Do you think we can close this bug,
Hi
Got the same problem on stretch.
Changing the systemd service type to simple solves the problem for me:
echo "Type=simple" >> /lib/systemd/system/slim.service
systemctl daemon-reload
So, i guess the dbus name can't be acquired...
BR
Lukas
Processing commands for cont...@bugs.debian.org:
> forwarded 852261 https://github.com/boothj5/profanity/issues/901
Bug #852261 [src:profanity] profanity FTBFS on armel/armhf/mips/mipsel:
prof_whole_occurrences_tests failed
Set Bug forwarded-to-address to
'https://github.com/boothj5/profanity/is
Package: flashplugin-nonfree
Version: 1:3.7
Followup-For: Bug #851066
Okay, attached is that patch I mentioned in my previous message.
This patch adds a new option to update-flashplugin-nonfree:
--using
Specifies the name of a local tar file instead of attempting to
On Mon, Apr 24, 2017 at 11:49:46PM +0300, Aaro Koskinen wrote:
> On Mon, Apr 24, 2017 at 10:21:47PM +0200, John Paul Adrian Glaubitz wrote:
> > Control: tags -1 moreinfo
> > > xsane with 1 network scanner defined in /etc/sane.d/net.conf
> > > crashes always on start:
While testing Debian Edu Stret
Processing commands for cont...@bugs.debian.org:
> # https://anonscm.debian.org/cgit/kernel/linux.git/commit/?id=ae3e344
> tags 861313 + pending
Bug #861313 [src:linux] kernel BUG with kvm
Added tag(s) pending.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
86131
Processing commands for cont...@bugs.debian.org:
> found 861220 2.7.1-0.1
Bug #861220 {Done: Salvatore Bonaccorso } [src:freetype]
freetype: CVE-2017-8105
Marked as found in versions freetype/2.7.1-0.1 and reopened.
> found 861308 2.7.1-0.1
Bug #861308 {Done: Salvatore Bonaccorso } [src:freetype]
Processing commands for cont...@bugs.debian.org:
> found 861514 1.1.1+20160115-1
Bug #861514 {Done: Jonas Smedegaard } [radicale] radicale:
htpasswd authentication vulnerable to timing-based bruteforce attacks
Marked as found in versions radicale/1.1.1+20160115-1.
> thanks
Stopping processing her
Your message dated Sun, 30 Apr 2017 07:48:48 +
with message-id
and subject line Bug#861514: fixed in radicale 1.1.1+20160115-4
has caused the Debian Bug report #861514,
regarding radicale: htpasswd authentication vulnerable to timing-based
bruteforce attacks
to be marked as done.
This means
Source: bup
Version: 0.29-3
Severity: serious
Justification: fails to build from source
User: reproducible-bui...@lists.alioth.debian.org
Usertags: ftbfs
X-Debbugs-Cc: reproducible-b...@lists.alioth.debian.org
Dear Maintainer,
bup fails to build from source in unstable/amd64:
[…]
dh_auto
69 matches
Mail list logo