Bug#861870: gitlab: CVE-2017-8778

2017-05-04 Thread Salvatore Bonaccorso
Source: gitlab Version: 8.13.11+dfsg1-3 Severity: grave Tags: upstream security Forwarded: https://gitlab.com/gitlab-org/gitlab-ce/issues/27471 Hi, the following vulnerability was published for gitlab. Please note I was not able to verfy that affects back 8.13.11, and the merge request has restri

Bug#856521: marked as done (libwala-java-doc: uninstallable in sid: unsatisfiable Depends: default-java-doc)

2017-05-04 Thread Debian Bug Tracking System
Your message dated Fri, 05 May 2017 04:04:42 + with message-id and subject line Bug#856521: fixed in wala 1.3.9-2 has caused the Debian Bug report #856521, regarding libwala-java-doc: uninstallable in sid: unsatisfiable Depends: default-java-doc to be marked as done. This means that you clai

Processed: tagging 858096

2017-05-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 858096 - moreinfo Bug #858096 [mate-panel] [mate-panel?] Mate panel unstable, notification area icons disappear without warning. Removed tag(s) moreinfo. > thanks Stopping processing here. Please contact me if you need assistance. -- 85809

Processed: forcibly merging 861548 861282

2017-05-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > forcemerge 861548 861282 Bug #861548 [packer] packer: FTBFS with latest golang-go.crypto Bug #861282 [packer] packer: FTBFS 860429 was blocked by: 861552 861549 861550 861551 861546 861547 861548 861432 860429 was blocking: 859655 Added blocking b

Bug#861431: marked as done (restic: Rebuild needed for CVE-2017-3204; #859655)

2017-05-04 Thread Debian Bug Tracking System
Your message dated Thu, 4 May 2017 22:33:25 +0200 with message-id <7afee585-1ea4-725c-027f-29e908ca0...@debian.org> and subject line Bug housekeeping has caused the Debian Bug report #861431, regarding restic: Rebuild needed for CVE-2017-3204; #859655 to be marked as done. This means that you clai

Processed: Bug housekeeping

2017-05-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > notfound 861431 0.3.3-1 Bug #861431 [restic] restic: Rebuild needed for CVE-2017-3204; #859655 No longer marked as found in versions restic/0.3.3-1. > thanks Stopping processing here. Please contact me if you need assistance. -- 861431: http://b

Processed: pulseaudio creates .config/pulse in a root directory

2017-05-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > unarchive 779556 Bug #779556 {Done: Felipe Sateler } [alsa-utils] pulseaudio creates .config/pulse in a root directory Bug #675857 {Done: Felipe Sateler } [alsa-utils] PulseAudio-related hidden config files & folders created in the root director

Bug#861180: shc: infinite loop does not work properly

2017-05-04 Thread Eriberto
Control: severity 861180 normal 2017-05-04 16:30 GMT-03:00 Tong Sun : > Hi Eriberto, Hi, > Do you still want to mark the Severity: as grave > after Jörg Sommer has explained in > https://github.com/neurobin/shc/issues/23#issuecomment-299035820 > that there is a workaround? I tested this workaro

Processed: Re: Bug#861180: shc: infinite loop does not work properly

2017-05-04 Thread Debian Bug Tracking System
Processing control commands: > severity 861180 normal Bug #861180 [shc] shc: infinite loop makes the final executable not work properly Severity set to 'normal' from 'grave' -- 861180: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861180 Debian Bug Tracking System Contact ow...@bugs.debian.o

Bug#861180: shc: infinite loop does not work properly

2017-05-04 Thread Tong Sun
Hi Eriberto, Do you *still* want to mark the Severity: as grave after *Jörg Sommer *has explained in https://github.com/neurobin/ shc/issues/23#issuecomment-299035820 that there is a workaround? Marking Severity: as grave will make shc 3.8.9b-1 for* autoremoval from testing on **2017-05-24* Wou

Processed: block 861835 with 861834

2017-05-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 861835 with 861834 Bug #861835 [src:rpcbind] rpcbind: CVE-2017-8779 861835 was not blocked by any bugs. 861835 was not blocking any bugs. Added blocking bug(s) of 861835: 861834 > thanks Stopping processing here. Please contact me if you ne

Bug#861855: php7.0-fpm: Uses kill without depending on procps

2017-05-04 Thread Adrian Heine
Package: php7.0-fpm Version: 7.0.16-3 Severity: serious Justification: Policy 3.5 /lib/systemd/system/php7.0-fpm.service contains: ``` ExecReload=/bin/kill -USR2 $MAINPID ``` procps is not Essential.

Processed: bug housekeeping

2017-05-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # The package has been fixed with a stable update > notfound 859805 3.1.4-4 Bug #859805 {Done: Scott Kitterman } [postfix-ldap] postfix-ldap: unsupported dictionary type: ldap after upgrade No longer marked as found in versions postfix/3.1.4-4. >

Bug#860660: marked as done (golang-github-cznic-fileutil: FTBFS on i386: dh_auto_test: go test -v -p 1 github.com/cznic/fileutil github.com/cznic/fileutil/falloc github.com/cznic/fileutil/hdb github.c

2017-05-04 Thread Debian Bug Tracking System
Your message dated Thu, 04 May 2017 18:03:26 + with message-id and subject line Bug#860660: fixed in golang-github-cznic-fileutil 0.0~git20150708.0.1c9c88f-2 has caused the Debian Bug report #860660, regarding golang-github-cznic-fileutil: FTBFS on i386: dh_auto_test: go test -v -p 1 github.

Bug#861536: runit-init: Cannot reboot or shutdown after installing (or removing) the package.

2017-05-04 Thread John Paul Adrian Glaubitz
Hi Matthew! > I ran `apt install runit-init` and then attempted to reboot with > `/sbin/reboot`, `/sbin/poweroff`, `init 0` & `init 6`, all to no > effect; no error messages were returned and the exit status of all of > the commands was zero. This happens because the computer is still running sy

Bug#858143: marked as done (xrdp: CVE-2017-6967: incorrect placement of auth_start_session())

2017-05-04 Thread Debian Bug Tracking System
Your message dated Thu, 04 May 2017 17:18:35 + with message-id and subject line Bug#858143: fixed in xrdp 0.9.1-9 has caused the Debian Bug report #858143, regarding xrdp: CVE-2017-6967: incorrect placement of auth_start_session() to be marked as done. This means that you claim that the probl

Bug#861842: snort 2.9.7 is EOL upstream

2017-05-04 Thread Lee Garrett
Source: snort Version: 2.9.7.0-5 Severity: grave Justification: renders package unusable Dear maintainer, The version of snort in Debian testing/sid has reached EOL in March [0], making it difficult to provide security updates or rule updates over the lifecycle of stretch. Since no newer version

Processed: Re: ca-certificates: Contains untrusted StartCom and WoSign certificates

2017-05-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 858539 serious Bug #858539 [ca-certificates] ca-certificates: Contains untrusted StartCom and WoSign certificates Severity set to 'serious' from 'important' > thanks Stopping processing here. Please contact me if you need assistance. --

Processed: Re: Bug#861834: libtirpc: CVE-2017-8779

2017-05-04 Thread Debian Bug Tracking System
Processing control commands: > clone -1 -2 Bug #861834 [src:libtirpc] libtirpc: CVE-2017-8779 Bug 861834 cloned as bug 861836 > reassign -2 src:ntirpc 1.4.3-3 Bug #861836 [src:libtirpc] libtirpc: CVE-2017-8779 Bug reassigned from package 'src:libtirpc' to 'src:ntirpc'. No longer marked as found in

Bug#861834: libtirpc: CVE-2017-8779

2017-05-04 Thread Salvatore Bonaccorso
Control: clone -1 -2 Control: reassign -2 src:ntirpc 1.4.3-3 Control: retitle -2 ntirpc: CVE-2017-8779 On Thu, May 04, 2017 at 05:01:11PM +0200, Salvatore Bonaccorso wrote: > Source: libtirpc > Version: 0.2.5-1 > Severity: grave > Tags: security upstream patch > Justification: user security hole >

Processed: retitle 861835 to rpcbind: CVE-2017-8779

2017-05-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > retitle 861835 rpcbind: CVE-2017-8779 Bug #861835 [src:rpcbind] libtirpc: CVE-2017-8779 Changed Bug title to 'rpcbind: CVE-2017-8779' from 'libtirpc: CVE-2017-8779'. > thanks Stopping processing here. Please contact me if you need assistance. --

Bug#861834: libtirpc: CVE-2017-8779

2017-05-04 Thread Salvatore Bonaccorso
Source: libtirpc Version: 0.2.5-1 Severity: grave Tags: security upstream patch Justification: user security hole Control: clone -1 -2 Control: reassign -2 src:rpcbind Control: found -2 0.2.1-6 Hi, the following vulnerability was published for libtirpc. CVE-2017-8779[0]: | rpcbind through 0.2.4,

Processed: libtirpc: CVE-2017-8779

2017-05-04 Thread Debian Bug Tracking System
Processing control commands: > clone -1 -2 Bug #861834 [src:libtirpc] libtirpc: CVE-2017-8779 Bug 861834 cloned as bug 861835 > reassign -2 src:rpcbind Bug #861835 [src:libtirpc] libtirpc: CVE-2017-8779 Bug reassigned from package 'src:libtirpc' to 'src:rpcbind'. No longer marked as found in versi

Bug#861486: julia: FTBFS on mips64el (segmentation fault)

2017-05-04 Thread Graham Inggs
Possibly related to bug #684344 in libopenblas-base: please install OpenMP version.

Bug#770369: Bug#737491: eterm: Occurs on upgrade to Jessie from Wheezy

2017-05-04 Thread Andy Bennett
Hi, Andy, I have tested a couple of solutions and I think the easiest way for you is just to download the Eterm package for Stretch (testing) and install it in your system manually with: dpkg -i eterm_0.9.6-4_amd64.deb I have just installed the Eterm version in testing and no new packages a

Bug#858316: marked as done (rdiff-backup-fs: segmentation fault on i386)

2017-05-04 Thread Debian Bug Tracking System
Your message dated Thu, 04 May 2017 13:19:28 + with message-id and subject line Bug#858316: fixed in rdiff-backup-fs 1.0.0-5 has caused the Debian Bug report #858316, regarding rdiff-backup-fs: segmentation fault on i386 to be marked as done. This means that you claim that the problem has bee

Bug#861826: heaptrack FTBFS on mips: tst_trace (Failed)

2017-05-04 Thread Adrian Bunk
Source: heaptrack Version: 1.0.1~20170503.git4da8c45-1 Severity: serious https://buildd.debian.org/status/fetch.php?pkg=heaptrack&arch=mips&ver=1.0.1~20170503.git4da8c45-1&stamp=1493846157&raw=0 ... cd /<>/debian/build ; /usr/bin/make test ARGS=-VV make[2]: Entering directory '/<>/debian/build' R

Processed: Re: Incomplete debian/copyright

2017-05-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 712612 serious Bug #712612 [src:gcr] Incomplete debian/copyright Severity set to 'serious' from 'normal' > thanks Stopping processing here. Please contact me if you need assistance. -- 712612: http://bugs.debian.org/cgi-bin/bugreport.cg

Bug#770369: Bug#737491: eterm: Occurs on upgrade to Jessie from Wheezy

2017-05-04 Thread Jose Antonio Jimenez Madrid
Hi, Andy, I have tested a couple of solutions and I think the easiest way for you is just to download the Eterm package for Stretch (testing) and install it in your system manually with: dpkg -i eterm_0.9.6-4_amd64.deb I have just installed the Eterm version in testing and no new packages a

Bug#861333: r-base: R packages uploaded to Debian before 14 April 2017 that use .C or .Fortran fail to find objects

2017-05-04 Thread Johannes Ranke
Am Montag, 1. Mai 2017, 14:53:49 schrieb Charles Plessy: ... > At this point I see 3 options: > > - For each rebuild, insert a "Breaks" relationship in r-base's control > file; This is the solution favoured by me as the maintainer of the backports on CRAN (I know, this is the Debian BTS, but

Processed: Re: Bug#861775: kopanocore: src:kopanocore has a harcoded php7.0-mapi binary

2017-05-04 Thread Debian Bug Tracking System
Processing control commands: > severity -1 serious Bug #861775 [kopanocore] kopanocore: src:kopanocore has a harcoded php7.0-mapi binary Severity set to 'serious' from 'normal' -- 861775: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861775 Debian Bug Tracking System Contact ow...@bugs.debia

Bug#861750: marked as done (xpuzzles: "without fee" requirement in copyright renders package non-DFSG compliant)

2017-05-04 Thread Debian Bug Tracking System
Your message dated Thu, 04 May 2017 09:46:02 +0100 with message-id <1493887562.879136.965419424.625b0...@webmail.messagingengine.com> and subject line Re: xpuzzles: "without fee" requirement in copyright renders package non-DFSG compliant has caused the Debian Bug report #861750, regarding xpuzzl

Bug#861750: xpuzzles: "without fee" requirement in copyright renders package non-DFSG compliant

2017-05-04 Thread Chris Lamb
[Adding bunk@ to CC] Hi Anon, > # Permission to use, copy, modify, and distribute this software and > # its documentation for any purpose and without fee is hereby granted, Thanks for your deligence and for caring about the copyright status of packages. Unfortunately, this is just a misreading

Processed: Re: Bug#861074: cryptsetup: cryptroot-hook doesn't honor initramfs-tools' (>= 0.129) logic for resume devices

2017-05-04 Thread Debian Bug Tracking System
Processing control commands: > severity -1 serious Bug #861074 [cryptsetup] cryptsetup: WARNING: failed to detect canonical device of none Severity set to 'serious' from 'minor' > tag -1 pending Bug #861074 [cryptsetup] cryptsetup: WARNING: failed to detect canonical device of none Added ta

Bug#861474: marked as done (slim: Session restarts in a loop rendering the whole system useless)

2017-05-04 Thread Debian Bug Tracking System
Your message dated Thu, 04 May 2017 07:34:05 + with message-id and subject line Bug#861474: fixed in slim 1.3.6-5.1 has caused the Debian Bug report #861474, regarding slim: Session restarts in a loop rendering the whole system useless to be marked as done. This means that you claim that the