Bug#877039: marked as done (":80" is appended to socket file name)

2018-12-06 Thread Debian Bug Tracking System
Your message dated Thu, 06 Dec 2018 13:05:26 +
with message-id 
and subject line Bug#877039: fixed in lighttpd 1.4.52-1
has caused the Debian Bug report #877039,
regarding ":80" is appended to socket file name
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
877039: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877039
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: lighttpd
Version: 1.4.45-1

If the server is bound to a socket in file system, three characters :80 are 
appended to the file path, breaking my reverse proxy setup.
Minimal example:

jonny@heron:/var/tmp/ltest$ lighttpd -D -f config &
[1] 30888
jonny@heron:/var/tmp/ltest$ 2017-09-28 00:26:22: (log.c.217) server started 

jonny@heron:/var/tmp/ltest$ ls
config  lighty.pid  lighty.sock:80

jonny@heron:/var/tmp/ltest$ cat config 
server.document-root = "/var/tmp/ltest/"

index-file.names = ( "index.html", "index.lighttpd.html" )

server.bind = "/var/tmp/ltest/lighty.sock"
server.errorlog = "/dev/tty"

server.pid-file = "/var/tmp/ltest/lighty.pid"

dir-listing.activate = "enable"


#  -- end of lighttpd config.


expected: a socket "lighty.sock" without :80

jonny@heron:~$ dpkg -s libc6 | grep ^Version
Version: 2.24-17
jonny@heron:~$ uname -a
Linux heron 4.11.0-1-amd64 #1 SMP Debian 4.11.6-1 (2017-06-19) x86_64 GNU/Linux

I think the source lines appending the port are src/network.c,
buffer_copy_buffer(b, srv->srvconf.bindhost);
buffer_append_string_len(b, CONST_STR_LEN(":"));
buffer_append_int(b, srv->srvconf.port);

I remember my setup to work some time ago (jessie or something older)
--- End Message ---
--- Begin Message ---
Source: lighttpd
Source-Version: 1.4.52-1

We believe that the bug you reported is fixed in the latest version of
lighttpd, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 877...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Helmut Grohne  (supplier of updated lighttpd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 06 Dec 2018 13:44:42 +0100
Source: lighttpd
Binary: lighttpd lighttpd-doc lighttpd-mod-mysql-vhost 
lighttpd-mod-trigger-b4-dl lighttpd-mod-cml lighttpd-mod-magnet 
lighttpd-mod-webdav lighttpd-mod-authn-gssapi lighttpd-mod-authn-ldap 
lighttpd-mod-authn-mysql lighttpd-mod-geoip
Architecture: source
Version: 1.4.52-1
Distribution: sid
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Helmut Grohne 
Description:
 lighttpd   - fast webserver with minimal memory footprint
 lighttpd-doc - documentation for lighttpd
 lighttpd-mod-authn-gssapi - GGSAPI authentication for lighttpd
 lighttpd-mod-authn-ldap - LDAP authentication for lighttpd
 lighttpd-mod-authn-mysql - MySQL authentication for lighttpd
 lighttpd-mod-cml - cache meta language module for lighttpd
 lighttpd-mod-geoip - GeoIP restrictions for lighttpd
 lighttpd-mod-magnet - control the request handling module for lighttpd
 lighttpd-mod-mysql-vhost - MySQL-based virtual host configuration for lighttpd
 lighttpd-mod-trigger-b4-dl - anti-deep-linking module for lighttpd
 lighttpd-mod-webdav - WebDAV module for lighttpd
Closes: 857255 877039 879496 913528
Changes:
 lighttpd (1.4.52-1) unstable; urgency=medium
 .
   * QA Upload.
   * New upstream release. (Closes: #879496)
 + Fix CVE-2018-19052. (Closes: #913528)
 + Don't append port to unix sockets. (Closes: #877039)
 + Refactor buffer API. (Closes: #857255)
 + Don't use AC_PATH_PROG to find pkg-config. (Addresses: #912358)
 + Drop patch fix-openssl-1.1.1.patch applied upstream.
 + Add new mod_sockproxy.so to main package.
   * Replace Build-Depends: dh-systemd with newer debhelper for lintian.
Checksums-Sha1:
 f83569abd053a4a4142bd6445a14fe5a02cfc1ca 3164 lighttpd_1.4.52-1.dsc
 d2cc3d8b4997e73b0d8bf3fd2685fc0e79650385 728668 lighttpd_1.4.52.orig.tar.xz
 2eca58e718d9567083b7aad2a1be723cf3deba19 801 lighttpd_1.4.52.orig.tar.xz.asc
 3baaa543bdf03c86d8e63ae19e062e0798d89f5d 47008 lighttpd_1.4.52-1.debian.tar.xz
 9830b4a05d827c9e72c12173650296508f0507a5 13155 
lighttpd_1.4.52-1_amd64.buildinfo
Checksums-Sha256:
 bab3dc02ee868bafed693e94c0b565cc

Bug#913528: marked as done (lighttpd: CVE-2018-19052)

2018-12-06 Thread Debian Bug Tracking System
Your message dated Thu, 06 Dec 2018 13:05:26 +
with message-id 
and subject line Bug#913528: fixed in lighttpd 1.4.52-1
has caused the Debian Bug report #913528,
regarding lighttpd: CVE-2018-19052
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
913528: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913528
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: lighttpd
Version: 1.4.49-1.1
Severity: important
Tags: security upstream
Control: found -1 1.4.45-1

Hi,

The following vulnerability was published for lighttpd.

CVE-2018-19052[0]:
| An issue was discovered in mod_alias_physical_handler in mod_alias.c in
| lighttpd before 1.4.50. There is potential ../ path traversal of a
| single directory above an alias target, with a specific mod_alias
| configuration where the matched alias lacks a trailing '/' character,
| but the alias target filesystem path does have a trailing '/'
| character.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-19052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19052
[1] 
https://github.com/lighttpd/lighttpd1.4/commit/2105dae0f9d7a964375ce681e53cb165375f84c1

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: lighttpd
Source-Version: 1.4.52-1

We believe that the bug you reported is fixed in the latest version of
lighttpd, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 913...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Helmut Grohne  (supplier of updated lighttpd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 06 Dec 2018 13:44:42 +0100
Source: lighttpd
Binary: lighttpd lighttpd-doc lighttpd-mod-mysql-vhost 
lighttpd-mod-trigger-b4-dl lighttpd-mod-cml lighttpd-mod-magnet 
lighttpd-mod-webdav lighttpd-mod-authn-gssapi lighttpd-mod-authn-ldap 
lighttpd-mod-authn-mysql lighttpd-mod-geoip
Architecture: source
Version: 1.4.52-1
Distribution: sid
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Helmut Grohne 
Description:
 lighttpd   - fast webserver with minimal memory footprint
 lighttpd-doc - documentation for lighttpd
 lighttpd-mod-authn-gssapi - GGSAPI authentication for lighttpd
 lighttpd-mod-authn-ldap - LDAP authentication for lighttpd
 lighttpd-mod-authn-mysql - MySQL authentication for lighttpd
 lighttpd-mod-cml - cache meta language module for lighttpd
 lighttpd-mod-geoip - GeoIP restrictions for lighttpd
 lighttpd-mod-magnet - control the request handling module for lighttpd
 lighttpd-mod-mysql-vhost - MySQL-based virtual host configuration for lighttpd
 lighttpd-mod-trigger-b4-dl - anti-deep-linking module for lighttpd
 lighttpd-mod-webdav - WebDAV module for lighttpd
Closes: 857255 877039 879496 913528
Changes:
 lighttpd (1.4.52-1) unstable; urgency=medium
 .
   * QA Upload.
   * New upstream release. (Closes: #879496)
 + Fix CVE-2018-19052. (Closes: #913528)
 + Don't append port to unix sockets. (Closes: #877039)
 + Refactor buffer API. (Closes: #857255)
 + Don't use AC_PATH_PROG to find pkg-config. (Addresses: #912358)
 + Drop patch fix-openssl-1.1.1.patch applied upstream.
 + Add new mod_sockproxy.so to main package.
   * Replace Build-Depends: dh-systemd with newer debhelper for lintian.
Checksums-Sha1:
 f83569abd053a4a4142bd6445a14fe5a02cfc1ca 3164 lighttpd_1.4.52-1.dsc
 d2cc3d8b4997e73b0d8bf3fd2685fc0e79650385 728668 lighttpd_1.4.52.orig.tar.xz
 2eca58e718d9567083b7aad2a1be723cf3deba19 801 lighttpd_1.4.52.orig.tar.xz.asc
 3baaa543bdf03c86d8e63ae19e062e0798d89f5d 47008 lighttpd_1.4.52-1.debian.tar.xz
 9830b4a05d827c9e72c12173650296508f0507a5 13155 
lighttpd_1.4.52-1_amd64.buildinfo
Checksums-Sha256:
 bab3dc02ee868bafed693e94c0b565cc924ebd4d0d960ca4e0d404aecb38ad27 3164 
lighttpd_1.4.52-1.dsc
 27bc0991c530b7c6335e6efff2181934d3c1a1c516f7401ea71d8302cefda764 728668 
lighttpd_1.4.52.orig.tar.xz
 fd8b589ec181f2d166fcadd71acf2e0b95c0c9ca8db96af2329d3a5a5efb2177 801 
lighttpd_1.4.52.orig.tar.xz.asc
 40ebe

Bug#879496: marked as done (new upstream release 1.4.52 available)

2018-12-06 Thread Debian Bug Tracking System
Your message dated Thu, 06 Dec 2018 13:05:26 +
with message-id 
and subject line Bug#879496: fixed in lighttpd 1.4.52-1
has caused the Debian Bug report #879496,
regarding new upstream release 1.4.52 available
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
879496: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879496
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: lighttpd
Version: 1.4.45-1

Hi,

we just released 1.4.46.

In


https://build.opensuse.org/package/show/home:stbuehler:lighttpd-1.4.x/lighttpd

I provide an updated package; as always our goal is to build
on older distributions too, while sticking to the official
package as close as possible.

Build service doesn't provide the source gpg signature yet,
so to download the source package use:

   wget -O lighttpd_1.4.46.orig.tar.xz.asc 
https://download.lighttpd.net/lighttpd/releases-1.4.x/lighttpd-1.4.46.tar.xz.asc
   dget -ud 
https://download.opensuse.org/repositories/home:/stbuehler:/lighttpd-1.4.x/Debian_Next/lighttpd_1.4.46-0.1.dsc


* I included the gpg signature in the upload for now (but this
  breaks Ubuntu 14.04, dpkg-dev-1.17.5ubuntu5 doesn't like the
  "unknown" file)
* Some new modules; some of those got their own package.  The
  descriptions might need some work.
* Updated var/www/cgi-bin/ in lighttpd.lintian-overrides.  You
  might want to rethink that (#763618, #837696), policy is
  clear on this imho:

https://www.debian.org/doc/debian-policy/#web-servers-and-applications

  > [...]
  > 1. Cgi-bin executable files are installed in the directory
  >/usr/lib/cgi-bin
  > [...]
--- End Message ---
--- Begin Message ---
Source: lighttpd
Source-Version: 1.4.52-1

We believe that the bug you reported is fixed in the latest version of
lighttpd, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 879...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Helmut Grohne  (supplier of updated lighttpd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 06 Dec 2018 13:44:42 +0100
Source: lighttpd
Binary: lighttpd lighttpd-doc lighttpd-mod-mysql-vhost 
lighttpd-mod-trigger-b4-dl lighttpd-mod-cml lighttpd-mod-magnet 
lighttpd-mod-webdav lighttpd-mod-authn-gssapi lighttpd-mod-authn-ldap 
lighttpd-mod-authn-mysql lighttpd-mod-geoip
Architecture: source
Version: 1.4.52-1
Distribution: sid
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Helmut Grohne 
Description:
 lighttpd   - fast webserver with minimal memory footprint
 lighttpd-doc - documentation for lighttpd
 lighttpd-mod-authn-gssapi - GGSAPI authentication for lighttpd
 lighttpd-mod-authn-ldap - LDAP authentication for lighttpd
 lighttpd-mod-authn-mysql - MySQL authentication for lighttpd
 lighttpd-mod-cml - cache meta language module for lighttpd
 lighttpd-mod-geoip - GeoIP restrictions for lighttpd
 lighttpd-mod-magnet - control the request handling module for lighttpd
 lighttpd-mod-mysql-vhost - MySQL-based virtual host configuration for lighttpd
 lighttpd-mod-trigger-b4-dl - anti-deep-linking module for lighttpd
 lighttpd-mod-webdav - WebDAV module for lighttpd
Closes: 857255 877039 879496 913528
Changes:
 lighttpd (1.4.52-1) unstable; urgency=medium
 .
   * QA Upload.
   * New upstream release. (Closes: #879496)
 + Fix CVE-2018-19052. (Closes: #913528)
 + Don't append port to unix sockets. (Closes: #877039)
 + Refactor buffer API. (Closes: #857255)
 + Don't use AC_PATH_PROG to find pkg-config. (Addresses: #912358)
 + Drop patch fix-openssl-1.1.1.patch applied upstream.
 + Add new mod_sockproxy.so to main package.
   * Replace Build-Depends: dh-systemd with newer debhelper for lintian.
Checksums-Sha1:
 f83569abd053a4a4142bd6445a14fe5a02cfc1ca 3164 lighttpd_1.4.52-1.dsc
 d2cc3d8b4997e73b0d8bf3fd2685fc0e79650385 728668 lighttpd_1.4.52.orig.tar.xz
 2eca58e718d9567083b7aad2a1be723cf3deba19 801 lighttpd_1.4.52.orig.tar.xz.asc
 3baaa543bdf03c86d8e63ae19e062e0798d89f5d 47008 lighttpd_1.4.52-1.debian.tar.xz
 9830b4a05d827c9e72c12173650296508f0507a5 13155 
lighttpd_1.4.52-1_amd64.buildinfo
Checksums-Sha256:
 bab3dc02ee868bafed69

Bug#857255: marked as done (lighttpd: mod_scgi: out of bounds read in scgi_demux_response)

2018-12-06 Thread Debian Bug Tracking System
Your message dated Thu, 06 Dec 2018 13:05:26 +
with message-id 
and subject line Bug#857255: fixed in lighttpd 1.4.52-1
has caused the Debian Bug report #857255,
regarding lighttpd: mod_scgi: out of bounds read in scgi_demux_response
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
857255: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857255
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: lighttpd
Version: 1.4.45-1
Tags: security patch

While debugging a problem with lighttpd on behalf of my current employer
Intenta GmbH, I found an out of bounds read.

http://sources.debian.net/src/lighttpd/1.4.45-1/src/mod_scgi.c/#L1828
|   for (c = hctx->response_header->ptr, cp = 0, used = 
buffer_string_length(hctx->response_header); used; c++, cp++, used--) {
|   if (*c == ':') in_header = 1;
|   else if (*c == '\n') {
|   if (in_header == 0) {
|   /* got a response without a 
response header */
|
|   c = NULL;
|   header_end = 1;
|   break;
|   }
|
|   if (eol == EOL_UNSET) eol = EOL_N;
|
|   if (*(c+1) == '\n') {
|   header_end = 1;
|   hlen = cp + 2;
|   break;
|   }
|
|   } else if (used > 1 && *c == '\r' && *(c+1) == 
'\n') {

The loop is constructed such that up to `used` bytes can be read
starting from `c`. Thus the access to `*c` is ok. However accessing
`*(c+1)` may be out of bounds. The condition should check for `used > 1`
before accessing `*(c+1)`. Both the later condition checking for CR LF
in the excerpt above and an even later condition checking for double CR
LF do check for sufficient buffer contents. It's only this one
occurrence that misses the check. In practise, this can result in
lighttpd sending corrupted responses to its clients when its SCGI reads
are chunked in a bad way (i.e. they end with '\n').

The following patch fixes the problem:
--- a/src/mod_scgi.c
+++ b/src/mod_scgi.c
@@ -1826,7 +1826,7 @@

if (eol == EOL_UNSET) eol = EOL_N;

-   if (*(c+1) == '\n') {
+   if (used > 1 && *(c+1) == '\n') {
header_end = 1;
hlen = cp + 2;
break;

It is unclear whether this issue can be used to corrupt the memory of a
lighttpd. The actual impact beyond malformed responses is not clear and
thus no attempt has been made at allocating a CVE.

Helmut
--- End Message ---
--- Begin Message ---
Source: lighttpd
Source-Version: 1.4.52-1

We believe that the bug you reported is fixed in the latest version of
lighttpd, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 857...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Helmut Grohne  (supplier of updated lighttpd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 06 Dec 2018 13:44:42 +0100
Source: lighttpd
Binary: lighttpd lighttpd-doc lighttpd-mod-mysql-vhost 
lighttpd-mod-trigger-b4-dl lighttpd-mod-cml lighttpd-mod-magnet 
lighttpd-mod-webdav lighttpd-mod-authn-gssapi lighttpd-mod-authn-ldap 
lighttpd-mod-authn-mysql lighttpd-mod-geoip
Architecture: source
Version: 1.4.52-1
Distribution: sid
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Helmut Grohne 
Description:
 lighttpd   - fast webserver with minimal memory footprint
 lighttpd-doc - documentation for lighttpd
 lighttpd-mod-authn-gssapi - GGSAPI authentication for lighttpd
 lighttpd-mod-authn-ldap - LDAP authentication for lighttpd

Processing of lighttpd_1.4.52-1_source.changes

2018-12-06 Thread Debian FTP Masters
lighttpd_1.4.52-1_source.changes uploaded successfully to localhost
along with the files:
  lighttpd_1.4.52-1.dsc
  lighttpd_1.4.52.orig.tar.xz
  lighttpd_1.4.52.orig.tar.xz.asc
  lighttpd_1.4.52-1.debian.tar.xz
  lighttpd_1.4.52-1_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



lighttpd_1.4.52-1_source.changes ACCEPTED into unstable

2018-12-06 Thread Debian FTP Masters
Mapping sid to unstable.

Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 06 Dec 2018 13:44:42 +0100
Source: lighttpd
Binary: lighttpd lighttpd-doc lighttpd-mod-mysql-vhost 
lighttpd-mod-trigger-b4-dl lighttpd-mod-cml lighttpd-mod-magnet 
lighttpd-mod-webdav lighttpd-mod-authn-gssapi lighttpd-mod-authn-ldap 
lighttpd-mod-authn-mysql lighttpd-mod-geoip
Architecture: source
Version: 1.4.52-1
Distribution: sid
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Helmut Grohne 
Description:
 lighttpd   - fast webserver with minimal memory footprint
 lighttpd-doc - documentation for lighttpd
 lighttpd-mod-authn-gssapi - GGSAPI authentication for lighttpd
 lighttpd-mod-authn-ldap - LDAP authentication for lighttpd
 lighttpd-mod-authn-mysql - MySQL authentication for lighttpd
 lighttpd-mod-cml - cache meta language module for lighttpd
 lighttpd-mod-geoip - GeoIP restrictions for lighttpd
 lighttpd-mod-magnet - control the request handling module for lighttpd
 lighttpd-mod-mysql-vhost - MySQL-based virtual host configuration for lighttpd
 lighttpd-mod-trigger-b4-dl - anti-deep-linking module for lighttpd
 lighttpd-mod-webdav - WebDAV module for lighttpd
Closes: 857255 877039 879496 913528
Changes:
 lighttpd (1.4.52-1) unstable; urgency=medium
 .
   * QA Upload.
   * New upstream release. (Closes: #879496)
 + Fix CVE-2018-19052. (Closes: #913528)
 + Don't append port to unix sockets. (Closes: #877039)
 + Refactor buffer API. (Closes: #857255)
 + Don't use AC_PATH_PROG to find pkg-config. (Addresses: #912358)
 + Drop patch fix-openssl-1.1.1.patch applied upstream.
 + Add new mod_sockproxy.so to main package.
   * Replace Build-Depends: dh-systemd with newer debhelper for lintian.
Checksums-Sha1:
 f83569abd053a4a4142bd6445a14fe5a02cfc1ca 3164 lighttpd_1.4.52-1.dsc
 d2cc3d8b4997e73b0d8bf3fd2685fc0e79650385 728668 lighttpd_1.4.52.orig.tar.xz
 2eca58e718d9567083b7aad2a1be723cf3deba19 801 lighttpd_1.4.52.orig.tar.xz.asc
 3baaa543bdf03c86d8e63ae19e062e0798d89f5d 47008 lighttpd_1.4.52-1.debian.tar.xz
 9830b4a05d827c9e72c12173650296508f0507a5 13155 
lighttpd_1.4.52-1_amd64.buildinfo
Checksums-Sha256:
 bab3dc02ee868bafed693e94c0b565cc924ebd4d0d960ca4e0d404aecb38ad27 3164 
lighttpd_1.4.52-1.dsc
 27bc0991c530b7c6335e6efff2181934d3c1a1c516f7401ea71d8302cefda764 728668 
lighttpd_1.4.52.orig.tar.xz
 fd8b589ec181f2d166fcadd71acf2e0b95c0c9ca8db96af2329d3a5a5efb2177 801 
lighttpd_1.4.52.orig.tar.xz.asc
 40ebebd86ba93933dd7eae31e4b0693a0b04299e991c51796fff18afc29cbe19 47008 
lighttpd_1.4.52-1.debian.tar.xz
 1d65294c2112cfd344926224ae6614a708206febb9fca44bbbcc58e0e23b0ccc 13155 
lighttpd_1.4.52-1_amd64.buildinfo
Files:
 b334c8de0c5073d1665513281742a4f6 3164 httpd optional lighttpd_1.4.52-1.dsc
 34f5c79137325ba31484bed1e54e66e6 728668 httpd optional 
lighttpd_1.4.52.orig.tar.xz
 14cbef98f3d645b8ca380c7f8cbd186a 801 httpd optional 
lighttpd_1.4.52.orig.tar.xz.asc
 264d0d39104a12ee68b096d394c9c111 47008 httpd optional 
lighttpd_1.4.52-1.debian.tar.xz
 e2e357134aa1f2bee22773b4163396d0 13155 httpd optional 
lighttpd_1.4.52-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=S5y/
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Processing of xpdf_3.04-11_source.changes

2018-12-06 Thread Debian FTP Masters
xpdf_3.04-11_source.changes uploaded successfully to localhost
along with the files:
  xpdf_3.04-11.dsc
  xpdf_3.04-11.debian.tar.xz
  xpdf_3.04-11_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Processing of xpdf_3.04-11exp1_source.changes

2018-12-06 Thread Debian FTP Masters
xpdf_3.04-11exp1_source.changes uploaded successfully to localhost
along with the files:
  xpdf_3.04-11exp1.dsc
  xpdf_3.04-11exp1.debian.tar.xz
  xpdf_3.04-11exp1_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



xpdf_3.04-11_source.changes ACCEPTED into unstable

2018-12-06 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Thu, 06 Dec 2018 15:13:34 +0100
Source: xpdf
Binary: xpdf
Architecture: source
Version: 3.04-11
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Gianfranco Costamagna 
Description:
 xpdf   - Portable Document Format (PDF) reader
Changes:
 xpdf (3.04-11) unstable; urgency=medium
 .
   * QA upload
   * Revert to 3.04-9 version because unstable has old
 poppler
Checksums-Sha1:
 8e141988129ecdcf684affa478ddaf74edb0b5a3 1867 xpdf_3.04-11.dsc
 ca11d686ee5fb5dba29f343ef6a3fb94e938bbea 53272 xpdf_3.04-11.debian.tar.xz
 88aef74df33c2516efa166d4f5331d9a6d366ca8 8688 xpdf_3.04-11_source.buildinfo
Checksums-Sha256:
 5da1d7802c0cee95f0da25006b1895a0bd65ca2ff53450a6c8be79d1e20863a0 1867 
xpdf_3.04-11.dsc
 63dcb1be64e657307a587dc6a2f1e3092449873e78ad4d7e6977f14a24724ad0 53272 
xpdf_3.04-11.debian.tar.xz
 c7a05bffca1a92295f46061bef82bc0b633a4f06a99911b232437269d28a97b9 8688 
xpdf_3.04-11_source.buildinfo
Files:
 6c65f5a074ed7584469619a07aae7f4d 1867 text optional xpdf_3.04-11.dsc
 04789d00c31bf771de169e432895d290 53272 text optional xpdf_3.04-11.debian.tar.xz
 1376891258dbe369077b18114461516d 8688 text optional 
xpdf_3.04-11_source.buildinfo

-BEGIN PGP SIGNATURE-
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=5sF8
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



xpdf_3.04-11exp1_source.changes ACCEPTED into experimental

2018-12-06 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Thu, 06 Dec 2018 15:16:02 +0100
Source: xpdf
Binary: xpdf
Architecture: source
Version: 3.04-11exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Gianfranco Costamagna 
Description:
 xpdf   - Portable Document Format (PDF) reader
Changes:
 xpdf (3.04-11exp1) experimental; urgency=medium
 .
   * QA upload
   * Upload to experimental with patch for poppler-0.71,
 to make the archive ready for the transition.
Checksums-Sha1:
 fc9cb32a901d89536b34b42ce21ed8b6c8913878 1883 xpdf_3.04-11exp1.dsc
 ca6df6693e51ecd8bb1857780136a8db4003f523 53372 xpdf_3.04-11exp1.debian.tar.xz
 492bcf3c07310a57c561ca8b7025d870549ecf76 8704 xpdf_3.04-11exp1_source.buildinfo
Checksums-Sha256:
 f87d41e781bab3a7d512d973a6aba1bba84e4226cef541028d235ec21a5a43d6 1883 
xpdf_3.04-11exp1.dsc
 b19aec1bc6ce528f70da109493e4e11e0b99f219bf86b1c8044039fca98343b7 53372 
xpdf_3.04-11exp1.debian.tar.xz
 8fcdb2f8a9688c97530c0c44d8aa1e5dc9dd5b354bd6f24077d21c54d7080553 8704 
xpdf_3.04-11exp1_source.buildinfo
Files:
 92e38fa61d77b3519f2409ad65a32ebe 1883 text optional xpdf_3.04-11exp1.dsc
 672c1ec22566573d45af083df577a13f 53372 text optional 
xpdf_3.04-11exp1.debian.tar.xz
 19612bba1faba41e36cffe488aa1af2b 8704 text optional 
xpdf_3.04-11exp1_source.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEkpeKbhleSSGCX3/w808JdE6fXdkFAlwJL1YACgkQ808JdE6f
XdnAwRAAhZgX1FDOkmpqxEwSkUSp6yZaiK8ZtFOeg9hfoByy2RahI8djGpNtf3tL
/e73yj0Jppk4TTwojpXZVn+qzI2FT9wpXR8NyLcKGyNjGIG9JS0oOt/8ZMLD9i+Z
ptdE+Wl5a9VMo0Ey0z1kDOdaJ7dfxt9BYXCxljUdwPWn0dk+GUjJZKDgv5TYtdlS
cnI48EH16ULkqFXmvoogNGqcXBLwIbVNUtye4Y4kbOkIAQSgDLGD53FC0ZU/bRXa
hk9o+gHJnXkpJuEg1nnJ/J9Wp7PQeE061D/qT0qMGLBXc0ADDlKuAGGo2m5UQ3Jm
aB1bwZuCpXg58hS63z987XAbovSRBfgoDmlc8kAzl5ykMi+XyPVdmg6w1ZLPQNpk
UFk39HAUV8H4vCij65ARlSUkD/b9SNC6IfBE4rcZBo1asLmoWTPfm6DKH+BxeLT1
LHLwioRnuDVUGfGWfHsKsDOc1U1f1qGa6pLIEEmwyZrruluSWlhuHzjriiFL7xsn
JQzNMYDtrIT9Z1BLQHiRoUO4yOS0M1sqfKrN+4f4I7cp4Xf1JmkWPEf6lDqzXVmO
/zkbWTGxuIf+6VWuJ7bdE4acq5O/3x74/s7zHx+aEXsr39Vkh14/jx841dMA3YmM
Bn62mdWWlDYhgRzGWJq1SjzDiIgJRLTc19aIxkd6eeK4SLbxfuc=
=iLlp
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Bug#915742: simba: fails to purge - command ucf in postrm not found

2018-12-06 Thread Andreas Beckmann
Package: simba
Version: 0.8.4-5
Severity: important
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package failed to purge due
to a command not found. According to policy 7.2 you cannot rely on the
depends being available during purge, only the essential packages are
available for sure.

Please see the manpages ucf(1), ucfr(1) and the example maintainer
scripts under /usr/share/doc/ucf/examples/ for correct usage of ucf.

Filing this as important because a.) it's a clear policy violation (to
not clean up at purge) b.) having a piuparts clean archive is a release
goal since lenny and c.) this package being piuparts buggy blocks
packages depending on it from being tested by piuparts (and thus
possibly the detection of more severe problems).

>From the attached log (scroll to the bottom...):

0m56.0s ERROR: Command failed (status=1): ['chroot', 
'/srv/piuparts/tmp/tmp1sQcO0', 'dpkg', '--purge', 'simba']
  (Reading database ... 4459 files and directories currently installed.)
  Purging configuration files for simba (0.8.4-5) ...
  /var/lib/dpkg/info/simba.postrm: 27: /var/lib/dpkg/info/simba.postrm: ucf: 
not found
  dpkg: error processing package simba (--purge):
   installed simba package post-removal script subprocess returned error exit 
status 127
  Errors were encountered while processing:
   simba


cheers,

Andreas


simba_0.8.4-5.log.gz
Description: application/gzip


[bts-link] source package doxygen

2018-12-06 Thread debian-bts-link
#
# bts-link upstream status pull for source package doxygen
# see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html
# https://bts-link-team.pages.debian.net/bts-link/
#

user debian-bts-l...@lists.debian.org

# remote status report for #818379 (http://bugs.debian.org/818379)
# Bug title: doxygen: Does not properly trap for errors when calling dot
#  * https://github.com/doxygen/doxygen/issues/6653
#  * remote status changed: (?) -> open
usertags 818379 + status-open

thanks



Bug#915742: simba: fails to purge - command ucf in postrm not found

2018-12-06 Thread Adrian Bunk
On Thu, Dec 06, 2018 at 04:56:07PM +0100, Andreas Beckmann wrote:
>...
> Please see the manpages ucf(1), ucfr(1) and the example maintainer
> scripts under /usr/share/doc/ucf/examples/ for correct usage of ucf.
> 
> Filing this as important because a.) it's a clear policy violation (to
> not clean up at purge) b.) having a piuparts clean archive is a release
> goal since lenny and c.) this package being piuparts buggy blocks
> packages depending on it from being tested by piuparts (and thus
> possibly the detection of more severe problems).
> 
> From the attached log (scroll to the bottom...):
> 
> 0m56.0s ERROR: Command failed (status=1): ['chroot', 
> '/srv/piuparts/tmp/tmp1sQcO0', 'dpkg', '--purge', 'simba']
>   (Reading database ... 4459 files and directories currently installed.)
>   Purging configuration files for simba (0.8.4-5) ...
>   /var/lib/dpkg/info/simba.postrm: 27: /var/lib/dpkg/info/simba.postrm: ucf: 
> not found
>   dpkg: error processing package simba (--purge):
>installed simba package post-removal script subprocess returned error exit 
> status 127
>   Errors were encountered while processing:
>simba

IMHO this is RC:

https://www.debian.org/doc/debian-policy/ch-maintainerscripts.html#id11

  all postrm actions may only rely on essential packages and must 
  gracefully skip any actions that require the package’s dependencies
  if those dependencies are unavailable.

> cheers,
> 
> Andreas

cu
Adrian

-- 

   "Is there not promise of rain?" Ling Tan asked suddenly out
of the darkness. There had been need of rain for many days.
   "Only a promise," Lao Er said.
   Pearl S. Buck - Dragon Seed



Processing of mcrypt_2.6.8-4_source.changes

2018-12-06 Thread Debian FTP Masters
mcrypt_2.6.8-4_source.changes uploaded successfully to localhost
along with the files:
  mcrypt_2.6.8-4.dsc
  mcrypt_2.6.8-4.diff.gz
  mcrypt_2.6.8-4_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



mcrypt_2.6.8-4_source.changes ACCEPTED into unstable

2018-12-06 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 06 Dec 2018 19:18:55 +0100
Source: mcrypt
Binary: mcrypt
Architecture: source
Version: 2.6.8-4
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Andreas Henriksson 
Description:
 mcrypt - Replacement for old unix crypt(1)
Changes:
 mcrypt (2.6.8-4) unstable; urgency=medium
 .
   * QA Upload (sigh, third time is a charm?)
   * Also explicitly pass BZIP2=/bin/bzip2 to configure
Checksums-Sha1:
 d72459ff54b090e10cf382d55d2e0f39020fa24e 1952 mcrypt_2.6.8-4.dsc
 b75636342b34a4988dc51ecde892f27f5a0a93c2 348145 mcrypt_2.6.8-4.diff.gz
 33300ee9a306e66ac6d028c59b63732ecc78030b 5649 mcrypt_2.6.8-4_amd64.buildinfo
Checksums-Sha256:
 082eb363f08ef0a5a1a1f849ff86fd5f838b9a554190c2d22d906c241c4fe684 1952 
mcrypt_2.6.8-4.dsc
 57e1c205ab7d1413f74f140dc832ba0247428f83eb19fc383d62e5fd991af413 348145 
mcrypt_2.6.8-4.diff.gz
 c365ccb7fc40ffc6b040e41c974cd54e8288ac271d1e8fa774908a3243ac93c1 5649 
mcrypt_2.6.8-4_amd64.buildinfo
Files:
 e6f7e719df21a29424e748ecf6895eb9 1952 utils optional mcrypt_2.6.8-4.dsc
 7ea7440c0a574415236b5fa4c7c1e73a 348145 utils optional mcrypt_2.6.8-4.diff.gz
 52d85f2aa8cfda2b11573fc4a0191c41 5649 utils optional 
mcrypt_2.6.8-4_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=OCUa
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Bug#889803: add package with cd-paranoia binary

2018-12-06 Thread Benjamin Barenblat
Niels, it looks like you uploaded src:libcdio-paranoia 10.2+0.94+2-4,
removing the cd-paranoia binary package, because cd-paranoia(1) is
already included in the libcdio-utils package. However, if you look at
libcdio-utils in sid, you’ll see this is no longer the case – there is
currently no package in sid that provides cd-paranoia(1). Would you be
willing to undo that change and upload a new src:libcdio-paranoia
equivalent to 10.2+0.94+2-3?

For reference, here’s the current situation. cd-paranoia(1) was
originally developed in upstream’s libcdio repository.¹ In 2011, shortly
after the release of libcdio 0.83, Rocky Bernstein split that repository
into a libcdio repository and a libcdio-paranoia repository,² copying
over cd-paranoia(1) to the new development. Further work on the program
occurred there. However, libcdio appears not to have much attention paid
to it in Debian at the time, so src:libcdio 0.83 and its associated
binary packages were included with jessie and stretch, and libcdio-utils
contained cd-paranoia(1).

After the stretch release, however, src:libcdio and src:libcdio-paranoia
got updates in Debian: src:libcdio to 2.0.0 and src:libcdio-paranoia
to 10.2+0.94+2. During the update, cd-paranoia(1) disappeared from
src:libcdio, as expected. However, the program didn’t get included in
any of src:libcdio-paranoia’s binary packages. This brings us to the
current situation, in which the cd-paranoia(1) program is not
distributed in sid at all.


¹ https://git.savannah.gnu.org/cgit/libcdio.git
² https://github.com/rocky/libcdio-paranoia



lighttpd is marked for autoremoval from testing

2018-12-06 Thread Debian testing autoremoval watch
lighttpd 1.4.49-1.1 is marked for autoremoval from testing on 2019-01-02

It is affected by these RC bugs:
866737: lighttpd: Enable Mod command fails on Stretch
887450: lighttpd: lighttpd missing dependency on perl5 for mod scripts
913249: lighttpd: Can't locate Term/ReadLine.pm in @INC
913251: lighttpd: SSL: renegotiation initiated by client, killing connection



link-grammar is marked for autoremoval from testing

2018-12-06 Thread Debian testing autoremoval watch
link-grammar 5.5.0-1 is marked for autoremoval from testing on 2019-01-12

It is affected by these RC bugs:
915060: link-grammar: autopkgtest relies on built binaries without matching 
dependencies



abiword is marked for autoremoval from testing

2018-12-06 Thread Debian testing autoremoval watch
abiword 3.0.2-8 is marked for autoremoval from testing on 2019-01-12

It (build-)depends on packages with these RC bugs:
915060: link-grammar: autopkgtest relies on built binaries without matching 
dependencies