I use newest maxima backported to stretch.
Regards,
Daniel
The question I now have is:
Which debian distribution and version do you use does contain the
version that has been broken by the sudden gcl change and that does not
yet incorporate the patch?
Thanks a lot,
and
Kind regards,
Gunter.
On 05.06.2017 07:37, Daniel Baumann wrote:
> tag 853787 p
Processing commands for cont...@bugs.debian.org:
> tag 853787 patch
Bug #853787 [wxmaxima] wxmaxima: loadfile: failed to load
/usr/share/wxMaxima/wxmathml.lisp
Added tag(s) patch.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
853787: http://bugs.debian.org/cgi-
tag 853787 patch
thanks
I can confirm that the following patch works fine:
https://sources.progress-linux.org/distributions/dschinn-backports/packages/wxmaxima/commit/?id=eb016f3c20d6e482ad7c433c5047f20eb33166f4
Regards,
Daniel
Processing commands for cont...@bugs.debian.org:
> severity 853787 serious
Bug #853787 [wxmaxima] wxmaxima: loadfile: failed to load
/usr/share/wxMaxima/wxmathml.lisp
Severity set to 'serious' from 'important'
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
85378
Processing control commands:
> tags -1 unreproducible
Bug #863950 [gitlab] gitlab: Fresh install does not start
Bug #863951 [gitlab] gitlab: Fresh install does not start
Added tag(s) unreproducible.
Added tag(s) unreproducible.
> severity -1 normal
Bug #863950 [gitlab] gitlab: Fresh install does n
Control: tags -1 unreproducible
Control: severity -1 normal
On Fri, 2 Jun 2017 17:34:01 +0530 Pirate Praveen wrote:
> On a freshly created stretch lxc container also, I could not reproduce it.
>
Balasankar could not reproduce it as well.
Hi!
On Sun, Jun 04, 2017 at 08:35:05PM +0200, Salvatore Bonaccorso wrote:
> Hi Bdale
>
> Since time is pressing a bit for the release of stretch, any problem
> in if I would prepare a NMU for both stretch (targetted) and sid for
> this issue?
Attached attempt/proposed debdiff for stretch.
Regar
Processing commands for cont...@bugs.debian.org:
> retitle 863897 sudo: CVE-2017-1000368: Arbitrary terminal access due to issue
> in parsing /proc/[pid]/stat when process name contains newline
Bug #863897 [src:sudo] sudo: Further issue in parsing /proc/[pid]/stat when
process name contains newl
Hi
Correct commit is obviously not the one posted, but rather
https://www.sudo.ws/repos/sudo/raw-rev/15a46f4007dd
Regards,
Salvatore
Control: reassign 864177 libssl1.1
Control: reassign 864186 libssl1.1
Control: forcemerge -1 864177 864186
Control: affects -1 src:nordugrid-arc src:xtensor-python
On Mon, Jun 05, 2017 at 01:10:34AM +0200, Kurt Roeckx wrote:
> On Mon, Jun 05, 2017 at 12:45:33AM +0300, Adrian Bunk wrote:
> > Contro
Processing control commands:
> reassign 864177 libssl1.1
Bug #864177 [nordugrid-arc] nordugrid-arc: FTBFS: test failure
Bug reassigned from package 'nordugrid-arc' to 'libssl1.1'.
No longer marked as found in versions 5.3.0-1.
Ignoring request to alter fixed versions of bug #864177 to the same val
@Petter, thanks for asking.
@Bert, etoys 5.0.2408 does not complete "Initializing Squeak security
system" on Debian Stretch, but it did on Debian Jessie.
I don't know what's wrong, yet.
I've reproduced the problem.
CPU is 100%. strace shows the process making syscalls, of which the
most freque
Processing control commands:
> affects -1 libbpp-seq9v5 src:libbpp-phyl
Bug #864188 [libbpp-core2v5] libbpp-core2v5: symbols removed without soname bump
Added indication that 864188 affects libbpp-seq9v5 and src:libbpp-phyl
--
864188: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864188
Debia
Package: libbpp-core2v5
Version: 2.3.0-1~exp1
Severity: serious
Control: affects -1 libbpp-seq9v5 src:libbpp-phyl
2.3.0-1~exp1 in unstable (sic) removes symbols without changing soname,
causing the following FTBFS in libbpp-phyl:
https://tests.reproducible-builds.org/debian/rb-pkg/unstable/amd64/
I am also seeing this behavior in Thunderbird 45.8.0 on a fresh install
of Debian Stretch. While Mozilla has fixed this issue in 52.1, they
have indicated that they do not intend to fix the issue in 45.8.0. It
will have to be backported.
signature.asc
Description: This is a digitally signed mess
On Mon, Jun 05, 2017 at 12:45:33AM +0300, Adrian Bunk wrote:
> Control: reassign -1 libssl1.1 1.1.0f-1
> Control: affects -1 src:simple-tpm-pk11
>
> Looking at the reproducible builds results, I noticed that
> simple-tpm-pk11 always FTBFS in unstable but never FTBFS in stretch.
>
> I confirmed t
Package: libpam-google-authenticator
Version: 20160607-2+b1
Severity: grave
Tags: security patch
Justification: user security hole
When configuring this pam module to add two-factor authentification to your ssh
daemon (for example)
every ssh enabled user has to be configured for google-authentica
Source: xtensor-python
Version: 0.12.1-1
Severity: serious
https://tests.reproducible-builds.org/debian/rb-pkg/unstable/amd64/xtensor-python.html
...
[--] Global test environment tear-down
[==] 32 tests from 3 test cases ran. (2 ms total)
[ PASSED ] 32 tests.
[ FATAL ]
xtensor
Processing control commands:
> reassign -1 libssl1.1 1.1.0f-1
Bug #863707 [src:simple-tpm-pk11] simple-tpm-pk11: FTBFS: ./m4/test-driver:
line 107: 4695 Aborted (core dumped)
Bug reassigned from package 'src:simple-tpm-pk11' to 'libssl1.1'.
No longer marked as found in versions simple-tpm-pk11/0
Control: reassign -1 libssl1.1 1.1.0f-1
Control: affects -1 src:simple-tpm-pk11
Looking at the reproducible builds results, I noticed that
simple-tpm-pk11 always FTBFS in unstable but never FTBFS in stretch.
I confirmed that "make check" always succeeds with libssl1.1 1.1.0e-2
installed and alw
RAID1 actually needs a warning too. It will not work as "classic" RAID1 e.g.
it need to be able to make two copies always to not get stuck in read only mode.
You will not loose your data which is a good thing, but to be safe you need a
minimum of 3 devices (I would prefer four or more to be on t
Source: libraw
Severity: grave
Tags: security
Please see
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6886
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6887
Cheers,
Moritz
On Sat, Jun 03, 2017 at 09:33:38PM +0200, Sandro Knauß wrote:
> Hey,
>
> > No, the fix would be to not produce 1 GB of debug info for this library:
>
> > The build log [1] confirms that -g is used in the i386 build.
> >
> > -g0 instead of -g (or no -g option) would surely solve this problem.
> >
On 4 June 2017 at 05:46, Svein Engelsgjerd wrote:
>
> I would like voice my concern as well. Btrfs RAID5/6 really needs a warning.
> These days most (if not all) of the problems you see with Btrfs is caused by
> the unstable features (https://btrfs.wiki.kernel.org/index.php/Status).
>
> RAID5/6 in
This issue is going to cause etags to be removed from Stretch. Anyone have any
idea what is wrong?
--
Happy hacking
Petter Reinholdtsen
Package: fsl-5.0-core
Version: 5.0.8-5
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts
Hi,
during a test with piuparts I noticed your package is no longer
installable in sid:
The following packages have unmet dependencies:
fsl-5.0-core : Depends: fslview but it is not inst
Hi Bdale
Since time is pressing a bit for the release of stretch, any problem
in if I would prepare a NMU for both stretch (targetted) and sid for
this issue?
Regards,
Salvatore
Your message dated Sun, 04 Jun 2017 18:19:59 +
with message-id
and subject line Bug#862535: fixed in llvm-toolchain-3.9 1:3.9.1-9
has caused the Debian Bug report #862535,
regarding llvm-toolchain-3.9: Fix R_AARCH64_MOVW_UABS_G3
to be marked as done.
This means that you claim that the problem
Your message dated Sun, 04 Jun 2017 18:19:59 +
with message-id
and subject line Bug#862597: fixed in llvm-toolchain-3.9 1:3.9.1-9
has caused the Debian Bug report #862597,
regarding clang-3.9-doc: -doc package contains (almost) no documentation
to be marked as done.
This means that you claim
Processing commands for cont...@bugs.debian.org:
> tags 810158 - stretch-ignore
Bug #810158 {Done: Christoph Martin } [ksh] ksh fails to
install on systems with merged /usr
Removed tag(s) stretch-ignore.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
810158: htt
Your message dated Sun, 04 Jun 2017 17:34:32 +
with message-id
and subject line Bug#864081: fixed in openssl1.0 1.0.2l-2
has caused the Debian Bug report #864081,
regarding openssl1.0: libssl1.0-udeb is missing versioned dependency on
libcrypto1.0-udeb
to be marked as done.
This means that y
Processing commands for cont...@bugs.debian.org:
> tags 863584 - stretch-ignore
Bug #863584 {Done: Dmitry Smirnov } [src:zabbix] zabbix:
CVE-2017-2824 CVE-2017-2825
Removed tag(s) stretch-ignore.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
863584: http://bugs
Your message dated Sun, 04 Jun 2017 17:19:36 +
with message-id
and subject line Bug#863367: fixed in openssl 1.1.0f-2
has caused the Debian Bug report #863367,
regarding libssl-dev: declare conflict with libssl1.0-dev to help apt find
solutions
to be marked as done.
This means that you claim
Your message dated Sun, 04 Jun 2017 17:19:36 +
with message-id
and subject line Bug#864080: fixed in openssl 1.1.0f-2
has caused the Debian Bug report #864080,
regarding openssl: libssl1.1-udeb is missing versioned dependency on
libcrypto1.1-udeb
to be marked as done.
This means that you cla
Processing commands for cont...@bugs.debian.org:
> forcemerge 851066 857766
Bug #851066 [flashplugin-nonfree] flashplugin-nonfree: Mismatch between
detected and available versions (Download file not available at
people.debian.org)
Bug #851819 [flashplugin-nonfree] ERROR: wget failed to download
On Sun, Jun 04, 2017 at 12:15:56AM +0200, Andreas Beckmann wrote:
>...
> dpkg spews a lot of warnings about dependency problems, so it's not
> dblatex's fault if its postrm failed due to dependency violations.
> More likely apt (from jessie) is at fault here for choosing a broken
> upgrade path.
>.
Processing commands for cont...@bugs.debian.org:
> forcemerge 851066 864030
Bug #851066 [flashplugin-nonfree] flashplugin-nonfree: Mismatch between
detected and available versions (Download file not available at
people.debian.org)
Bug #851819 [flashplugin-nonfree] ERROR: wget failed to download
Your message dated Sun, 04 Jun 2017 16:20:16 +
with message-id
and subject line Bug#862517: fixed in openbabel 2.3.2+dfsg-3
has caused the Debian Bug report #862517,
regarding python-openbabel: Cannot 'import pybel' reliably
to be marked as done.
This means that you claim that the problem has
Package: openstack-dashboard-apache
Version: 3:9.0.1-2~bpo8+1
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts
Hi,
during a test with piuparts I noticed your package fails to upgrade from
'jessie'.
It installed fine in 'jessie', then the upgrade to 'jessie-backports' fails.
Processing commands for cont...@bugs.debian.org:
> limit source debhelper
Limiting to bugs with field 'source' containing at least one of 'debhelper'
Limit currently set to 'source':'debhelper'
> tags 863447 + pending
Bug #863447 [debhelper] dh_install -X is ignored for --list/fail-missing
Added
Processing control commands:
> found -1 10.2.5-6~bpo8+1
Bug #864161 [ceph-mon] ceph-mon: missing Breaks+Replaces: ceph-common (<< 10)
Marked as found in versions ceph/10.2.5-6~bpo8+1.
> affects -1 + ceph
Bug #864161 [ceph-mon] ceph-mon: missing Breaks+Replaces: ceph-common (<< 10)
Added indication
Processing commands for cont...@bugs.debian.org:
> user debian...@lists.debian.org
Setting user to debian...@lists.debian.org (was a...@debian.org).
> usertags 864159 piuparts
There were no usertags set.
Usertags are now: piuparts.
> severity 864159 serious
Bug #864159 [mariadb-server-10.1] mariad
Package: ceph-mon
Version: 10.2.5-7
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts
Control: found -1 10.2.5-6~bpo8+1
Control: affects -1 + ceph
Hi,
during a test with piuparts I noticed your package fails to upgrade from
'jessie'.
It installed fine in 'jessie', then the upg
Processing control commands:
> reopen -1
Bug #864159 {Done: Debian FTP Masters }
[mysql-server-5.6] mysql-server-5.6: needs Conflicts: cqrlog (<< 1.9.0-5~)
Warning: Unknown package 'mysql-server-5.6'
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will
Followup-For: Bug #864159
Control: reopen -1
Control: reassign -1 mariadb-server-10.1 10.1.23-8
Control: retitle -1 mariadb-server-10.1: needs Conflicts: cqrlog (<< 1.9.0-5~)
Control: severity -1 serious .
I haven't tested it, but I'm pretty sure that the solution that would
have worked for mysql-
Processing commands for cont...@bugs.debian.org:
> unarchive 804920
Bug #804920 {Done: Debian FTP Masters }
[mysql-server-5.6] mysql-server-5.6: needs Conflicts: cqrlog (<< 1.9.0-5~)
Warning: Unknown package 'mysql-server-5.6'
Unarchived Bug 804920
Warning: Unknown package 'mysql-server-5.6'
> cl
Source: qtcharts-opensource-src
Version: 5.7.1-3
Severity: serious
Justification: Files declared as only commercial
Forwarded: https://bugreports.qt.io/browse/QTBUG-61126
Files in the tarball has been incorrectly marked as commercial-only
by upstream.
The files are meant to be DFSG-compatible, so
Your message dated Sun, 04 Jun 2017 13:36:11 +
with message-id
and subject line Bug#863594: fixed in veusz 1.21.1-1.1
has caused the Debian Bug report #863594,
regarding veusz-helpers: duplicates .../veusz/resources symlink
to be marked as done.
This means that you claim that the problem has
Processing commands for cont...@bugs.debian.org:
> limit source debhelper
Limiting to bugs with field 'source' containing at least one of 'debhelper'
Limit currently set to 'source':'debhelper'
> tags 863887 + pending
Bug #863887 [src:debhelper] debhelper: Broken handling of -indep/-arch override
clone 854727 -1
retitle -1 zziplib: CVE-2017-5977
severity -1 important
thanks
hi
On Sun, Jun 04, 2017 at 11:09:40AM +0200, Moritz Muehlenhoff wrote:
> Moritz Muehlenhoff wrote:
> > On Fri, Mar 24, 2017 at 07:41:03AM -0400, Scott Howard wrote:
> > > I was contacted by someone at SUSE that is work
Processing commands for cont...@bugs.debian.org:
> clone 854727 -1
Bug #854727 {Done: Moritz Muehlenhoff } [src:zziplib] zziplib:
Multiple vulnerabilities
Bug 854727 cloned as bug 864150
> retitle -1 zziplib: CVE-2017-5977
Bug #864150 {Done: Moritz Muehlenhoff } [src:zziplib] zziplib:
Multiple v
Control: tags -1 patch
https://github.com/binarycrusader/openexr/commit/749193265ac99956f01a2dd9b20f124f2f7859d0.patch
Processing control commands:
> tags -1 patch
Bug #864078 [src:openexr] CVE-2017-9110 CVE-2017-9111 CVE-2017-9112
CVE-2017-9113 CVE-2017-9114 CVE-2017-9115 CVE-2017-9116 CVE-2017-9117
Added tag(s) patch.
--
864078: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864078
Debian Bug Tracking Syste
Processing commands for cont...@bugs.debian.org:
> fixed 863671 1.7-1+deb7u1
Bug #863671 {Done: deba...@debian.org (W. Martin Borgert)} [picocom]
CVE-2015-9059
There is no source info for the package 'picocom' at version '1.7-1+deb7u1'
with architecture ''
Unable to make a source version for ver
Processing commands for cont...@bugs.debian.org:
> fixed 863671 2.2-1
Bug #863671 {Done: deba...@debian.org (W. Martin Borgert)} [picocom]
CVE-2015-9059
Marked as fixed in versions picocom/2.2-1.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
863671: http://bugs
Processing commands for cont...@bugs.debian.org:
> notfound 863671 picocom/1.7-1+deb7u1
Bug #863671 {Done: deba...@debian.org (W. Martin Borgert)} [picocom]
CVE-2015-9059
The source picocom and version 1.7-1+deb7u1 do not appear to match any binary
packages
Ignoring request to alter found versio
Processing commands for cont...@bugs.debian.org:
> reassign 862971 debhelper
Bug #862971 [src:debhelper] debhelper: Use of uninitialized value $options[1]
Bug reassigned from package 'src:debhelper' to 'debhelper'.
No longer marked as found in versions debhelper/10.3.
Ignoring request to alter fix
Processing commands for cont...@bugs.debian.org:
> limit source debhelper
Limiting to bugs with field 'source' containing at least one of 'debhelper'
Limit currently set to 'source':'debhelper'
> tags 863961 + pending
Bug #863961 [debhelper] Optimisation to avoid calling Getopt makes some CDBS
p
Your message dated Sun, 04 Jun 2017 11:50:04 +
with message-id
and subject line Bug#863290: fixed in linux 4.9.30-1
has caused the Debian Bug report #863290,
regarding src:linux: no warning that btrfs RAID5/6 is buggered up
to be marked as done.
This means that you claim that the problem has
Package: src:linux
Followup-For: Bug #863290
Dear Maintainer,
I would like voice my concern as well. Btrfs RAID5/6 really needs a warning.
These days most (if not all) of the problems you see with Btrfs is caused by
the unstable features (https://btrfs.wiki.kernel.org/index.php/Status).
RAID5/6
Your message dated Sun, 04 Jun 2017 09:33:44 +
with message-id
and subject line Bug#854727: fixed in zziplib 0.13.62-3.1
has caused the Debian Bug report #854727,
regarding zziplib: Multiple vulnerabilities
to be marked as done.
This means that you claim that the problem has been dealt with.
Moritz Muehlenhoff wrote:
> On Fri, Mar 24, 2017 at 07:41:03AM -0400, Scott Howard wrote:
> > I was contacted by someone at SUSE that is working on fixing the security
> > bugs - but even if successful, I don't know how good the quality will be or
> > how much testing will be able to get done befor
Your message dated Sun, 04 Jun 2017 09:08:40 +
with message-id
and subject line Bug#863584: fixed in zabbix 1:3.0.7+dfsg-3
has caused the Debian Bug report #863584,
regarding zabbix: CVE-2017-2824 CVE-2017-2825
to be marked as done.
This means that you claim that the problem has been dealt wi
Processing commands for cont...@bugs.debian.org:
> severity 863926 important
Bug #863926 [src:fxt] fxt: FTBFS: Test failures ("*** stack smashing detected
***")
Severity set to 'important' from 'serious'
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
863926: htt
Processing commands for cont...@bugs.debian.org:
> clone 864080 -1
Bug #864080 [openssl] openssl: libssl1.1-udeb is missing versioned dependency
on libcrypto1.1-udeb
Bug 864080 cloned as bug 864081
> reassign -1 openssl1.0
Bug #864081 [openssl] openssl: libssl1.1-udeb is missing versioned depende
tag 863584 pending
--
We believe that the bug #863584 you reported has been fixed in the Git
repository. You can see the commit message below and/or inspect the
commit contents at:
http://anonscm.debian.org/cgit/collab-maint/zabbix.git/diff/?id=ea3c3ea
(This message was generated automatical
Processing commands for cont...@bugs.debian.org:
> tag 863584 pending
Bug #863584 [src:zabbix] zabbix: CVE-2017-2824 CVE-2017-2825
Added tag(s) pending.
> --
Stopping processing here.
Please contact me if you need assistance.
--
863584: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863584
Deb
Package: openssl
Version: 1.1.0e-2
Severity: serious
Tags: d-i
As noted in #863472:
"""
The libssl1.1-udeb package is broken, as it fails to depend on an
appropriate version of libcrypto1.1-udeb, which means I've just
successfully built a debian-installer against testing with this
addition: build
Processing commands for cont...@bugs.debian.org:
> forwarded 863584 https://support.zabbix.com/browse/ZBX-12075
Bug #863584 [src:zabbix] zabbix: CVE-2017-2824 CVE-2017-2825
Set Bug forwarded-to-address to 'https://support.zabbix.com/browse/ZBX-12075'.
> thanks
Stopping processing here.
Please con
70 matches
Mail list logo