Bug#928963: marked as done (gpg-agent READKEY emits an invalid S-expression when private key file has comment (on 64-bit big-endian platforms))

2019-05-13 Thread Debian Bug Tracking System
Your message dated Tue, 14 May 2019 06:18:31 + with message-id and subject line Bug#928963: fixed in gnupg2 2.2.13-2 has caused the Debian Bug report #928963, regarding gpg-agent READKEY emits an invalid S-expression when private key file has comment (on 64-bit big-endian platforms) to be mar

Bug#928172: fixing debian-security-support upgrades from stretch (for good)

2019-05-13 Thread Niels Thykier
Sean Whitton: > Hello, > > On Mon 13 May 2019 at 11:52AM +00, Holger Levsen wrote: > >> [re-sent with debian-release list address corrected...] > > Also resending. Sorry. > >> so there is "#928172 debian-security-support: fails to upgrade from >> 'testing': >> dpkg: error: error executing hoo

Processed: gpg-agent READKEY emits an invalid S-expression when private key file has comment (on 64-bit big-endian platforms)

2019-05-13 Thread Debian Bug Tracking System
Processing control commands: > found -1 2.2.13-1 Bug #928963 [gpg-agent] gpg-agent READKEY emits an invalid S-expression when private key file has comment (on 64-bit big-endian platforms) Marked as found in versions gnupg2/2.2.13-1. > found -1 2.2.14-1 Bug #928963 [gpg-agent] gpg-agent READKEY em

Bug#928963: gpg-agent READKEY emits an invalid S-expression when private key file has comment (on 64-bit big-endian platforms)

2019-05-13 Thread Daniel Kahn Gillmor
Package: gpg-agent Severity: serious Version: 2.2.12-1 Control: found -1 2.2.13-1 Control: found -1 2.2.14-1 Control: found -1 2.2.15-1 Control: affects -1 src:monkeysphere Control: tags -1 patch upstream Control: forwarded -1 https://dev.gnupg.org/T4501 On sparc64, powerpc64, and s390x (debian's

Bug#928505: fixed in ruby-pygments.rb 1.2.0-4

2019-05-13 Thread dai
Hi, On Sun, May 12, 2019 at 09:55:33PM +0530, Pirate Praveen wrote: > We will have to file an unblock request for this to migrate to testing. > Can you file it? sorry for my afk, but thanks to release team (maybe), it migrated to testing. -- Regards, dai GPG Fingerprint = 0B29 D88E 42E6

Bug#927126: aqemu: after updating can't open VMs

2019-05-13 Thread Abhijith PA
On 29/04/19 1:22 am, Alexis Murzeau wrote: > The vlan argument issue has a upstream issues open [0]. > > [0] : > - https://github.com/tobimensch/aqemu/issues/58 > - https://github.com/tobimensch/aqemu/issues/57 The error log in issue 57 is same as what I get. > - https://github.com/tobimen

Bug#927126: aqemu: after updating can't open VMs

2019-05-13 Thread Abhijith PA
On 14/05/19 4:02 am, Alexis Murzeau wrote: > Le 28/04/2019 à 21:52, Alexis Murzeau a écrit : ... > As this package is going to be removed if nothing happen, I will try to > backport a patch from upstream forks. > popcon indicate that is really used (while I don't use it myself), and > might be

Bug#927126: aqemu: after updating can't open VMs

2019-05-13 Thread Abhijith PA
Hi, I missed this mail somehow. Sorry for the late reply On 29/04/19 1:22 am, Alexis Murzeau wrote: > On Mon, 15 Apr 2019 16:55:13 +0530 Abhijith PA wrote: >> I recently updated aqemu and ended up in not able to open VMs. >> >> Following is the message is what I get when I open VMs >> >> AQEMU E

Bug#914034: Bug#911938: libhttp-daemon-ssl-perl FTBFS: tests fail: Connection refused

2019-05-13 Thread Steffen Ullrich
> Ah I see, thanks for the clarification. I thought you meant it could > yield a deadlock. Aren't temporary failures also possible on plain > sockets (though of course the extra SSL layer make it strictly more > likely to happen)? IIRC if the checksum of the incoming packet > mismatches, which c

Bug#928172: fixing debian-security-support upgrades from stretch (for good)

2019-05-13 Thread Sean Whitton
Hello, On Mon 13 May 2019 at 11:32AM +00, Holger Levsen wrote: > so there is "#928172 debian-security-support: fails to upgrade from 'testing': > dpkg: error: error executing hook" which happens when base-files is upgraded > before debian-security-support (but doesnt happen if d-s-s is upgraded

Bug#928172: fixing debian-security-support upgrades from stretch (for good)

2019-05-13 Thread Sean Whitton
Hello, On Mon 13 May 2019 at 11:52AM +00, Holger Levsen wrote: > [re-sent with debian-release list address corrected...] Also resending. Sorry. > so there is "#928172 debian-security-support: fails to upgrade from 'testing': > dpkg: error: error executing hook" which happens when base-files is

Bug#928429: dpkg: trigger cycle postgresql-common -> sgml-base while upgrading from stretch to buster

2019-05-13 Thread Guillem Jover
Hi! On Fri, 2019-05-10 at 21:45:09 +0200, Andreas Beckmann wrote: > On 2019-05-09 06:00, Guillem Jover wrote: > > awaiting trigger does not help matters, I'm not entirely sure this > > might not be still a problem with dpkg itself. :/ > > I can also reproduce the problem in stretch -> sid upgrade

Bug#928959: papi: DFSG-unfree file in source

2019-05-13 Thread Sean Whitton
Source: papi Version: 5.7.0-1 Severity: serious At least one file in this package fails to permit derivative works: spwhitton@iris:~/tmp/papi>head -n15 src/components/appio/tests/iozone/fileop.c /* * Author: Don Capps * 3/13/2006 * * Author: Don Capps (ca...@iozone.org) *

Bug#914034: Bug#911938: libhttp-daemon-ssl-perl FTBFS: tests fail: Connection refused

2019-05-13 Thread Guilhem Moulin
On Mon, 13 May 2019 at 22:24:55 +0200, Steffen Ullrich wrote: > On Mon, May 13, 2019 at 03:18:14PM +0200, Guilhem Moulin > wrote: >> Uh, what? “Before” meaning with ≤TLSv1.2, or with OpenSSL <1.1.1a's >> default flags? libssl mentions no such thing beside the new default >> mode. And in fact t

Bug#926180: scilab: FTBFS on all - New trouble

2019-05-13 Thread Alexis Murzeau
Le 13/05/2019 à 08:08, Sylvestre Ledru a écrit : > > On 12/05/2019 22:10, Julien Puydt wrote: >> Hi, >> >> On 12/05/2019 11:46, Alexis Murzeau wrote: >> >>> I saw that there is a bugfix release 6.0.2 with many fixes [0]. >> I had started to package 6.0.2 on salsa already in february. I removed >>

Bug#927126: aqemu: after updating can't open VMs

2019-05-13 Thread Alexis Murzeau
Le 28/04/2019 à 21:52, Alexis Murzeau a écrit : > On Mon, 15 Apr 2019 16:55:13 +0530 Abhijith PA wrote: >> I recently updated aqemu and ended up in not able to open VMs. >> >> Following is the message is what I get when I open VMs >> >> AQEMU Error [264] >>> >> Sender: QEMU return value != 0 >> Me

Bug#928488: marked as done (pyspf-milter fails to start on minmal system)

2019-05-13 Thread Debian Bug Tracking System
Your message dated Mon, 13 May 2019 22:04:03 + with message-id and subject line Bug#928488: fixed in spf-engine 2.9.0-4 has caused the Debian Bug report #928488, regarding pyspf-milter fails to start on minmal system to be marked as done. This means that you claim that the problem has been de

Bug#926180: scilab: FTBFS on all - baseline violation?

2019-05-13 Thread Rebecca N. Palmer
Given that the error is "Illegal instruction", and reproducibly happens on x86-bm-01 and not the other machines we've tried, could it be something assuming CPU features more recent than the amd64 baseline? If so, it's not obvious where: scilab does contain some C/C++ code (as well as Java), bu

Bug#928204: check-support-status: cannot create /var/lib/debian-security-support/security-support.semaphore: Directory nonexistent

2019-05-13 Thread Santiago Vila
Way to reproduce it: 1. Install package in the *host* machine: # apt-get install debian-security-support 2. Enter a sid chroot where debian-security-support has never been installed: # schroot -c sid 3. Install package inside the chroot: # apt-get install debian-security-support The postinst bl

Bug#928957: expiration task fails on non-existent files

2019-05-13 Thread Eduard Bloch
Package: apt-cacher-ng Version: 3.2-1 Severity: serious This bug is basically reminder to myself and not to whoever runs into this issue. Looks like apt-cacher-ng expiery manages to maneuver itself into a state which cannot be recovered. It reports non-existent files from apparently guessed sourc

Bug#928204: lower severity

2019-05-13 Thread Cyril Brulebois
HoLger, Holger Levsen (2019-05-13): > severity 928204 important > tags 928204 unreproducible moreinfo > # thanks > > Kibi, > > #928204 is the bug with the title "check-support-status: cannot create > /var/lib/debian-security-support/security-support.semaphore: Directory > nonexistent"... > >

Bug#927934: marked as done (bind9: CVE-2018-5743: Limiting simultaneous TCP clients is ineffective)

2019-05-13 Thread Debian Bug Tracking System
Your message dated Mon, 13 May 2019 21:17:13 + with message-id and subject line Bug#927932: fixed in bind9 1:9.10.3.dfsg.P4-12.3+deb9u5 has caused the Debian Bug report #927932, regarding bind9: CVE-2018-5743: Limiting simultaneous TCP clients is ineffective to be marked as done. This means t

Bug#927932: marked as done (bind9: CVE-2018-5743: Limiting simultaneous TCP clients is ineffective)

2019-05-13 Thread Debian Bug Tracking System
Your message dated Mon, 13 May 2019 21:17:13 + with message-id and subject line Bug#927932: fixed in bind9 1:9.10.3.dfsg.P4-12.3+deb9u5 has caused the Debian Bug report #927932, regarding bind9: CVE-2018-5743: Limiting simultaneous TCP clients is ineffective to be marked as done. This means t

Bug#928304: marked as done (groonga-httpd: Privilege escalation due to insecure use of logrotate (CVE-2019-11675))

2019-05-13 Thread Debian Bug Tracking System
Your message dated Mon, 13 May 2019 21:17:46 + with message-id and subject line Bug#928304: fixed in groonga 6.1.5-1+deb9u1 has caused the Debian Bug report #928304, regarding groonga-httpd: Privilege escalation due to insecure use of logrotate (CVE-2019-11675) to be marked as done. This mea

Bug#927553: marked as done (atftp: CVE-2019-11365 CVE-2019-11366)

2019-05-13 Thread Debian Bug Tracking System
Your message dated Mon, 13 May 2019 21:17:07 + with message-id and subject line Bug#927553: fixed in atftp 0.7.git20120829-3.1~deb9u1 has caused the Debian Bug report #927553, regarding atftp: CVE-2019-11365 CVE-2019-11366 to be marked as done. This means that you claim that the problem has b

Bug#922954: marked as done (bind9: CVE-2018-5745: An assertion failure can occur if a trust anchor rolls over to an unsupported key algorithm when using managed-keys)

2019-05-13 Thread Debian Bug Tracking System
Your message dated Mon, 13 May 2019 21:17:13 + with message-id and subject line Bug#922954: fixed in bind9 1:9.10.3.dfsg.P4-12.3+deb9u5 has caused the Debian Bug report #922954, regarding bind9: CVE-2018-5745: An assertion failure can occur if a trust anchor rolls over to an unsupported key a

Bug#922955: marked as done (bind9: CVE-2019-6465: Zone transfer controls for writable DLZ zones were not effective)

2019-05-13 Thread Debian Bug Tracking System
Your message dated Mon, 13 May 2019 21:17:13 + with message-id and subject line Bug#922955: fixed in bind9 1:9.10.3.dfsg.P4-12.3+deb9u5 has caused the Debian Bug report #922955, regarding bind9: CVE-2019-6465: Zone transfer controls for writable DLZ zones were not effective to be marked as do

Bug#928942:

2019-05-13 Thread Leandro Doctors
Control: user qa.debian@packages.debian.org Control: usertags -1 + udd

Bug#928172: marked as done (base-files: please add a break on d-s-s < 2019.04.25)

2019-05-13 Thread Debian Bug Tracking System
Your message dated Mon, 13 May 2019 20:48:27 + with message-id and subject line Bug#928172: fixed in base-files 10.3 has caused the Debian Bug report #928172, regarding base-files: please add a break on d-s-s < 2019.04.25 to be marked as done. This means that you claim that the problem has be

Bug#928944: marked as done (CVE-2019-12046: lemonldap-ng tokens allows anonymous session when stored in session DB)

2019-05-13 Thread Debian Bug Tracking System
Your message dated Mon, 13 May 2019 20:35:33 + with message-id and subject line Bug#928944: fixed in lemonldap-ng 2.0.2+ds-7+deb10u1 has caused the Debian Bug report #928944, regarding CVE-2019-12046: lemonldap-ng tokens allows anonymous session when stored in session DB to be marked as done.

Processed: Re: Bug#928204: lower severity

2019-05-13 Thread Debian Bug Tracking System
Processing control commands: > severity -1 serious Bug #928204 [debian-security-support] check-support-status: cannot create /var/lib/debian-security-support/security-support.semaphore: Directory nonexistent Severity set to 'serious' from 'important' -- 928204: https://bugs.debian.org/cgi-bin/

Processed (with 1 error): Re: udd

2019-05-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 928942 + udd Unknown tag/s: udd. Recognized are: patch wontfix moreinfo unreproducible help security upstream pending confirmed ipv6 lfs d-i l10n newcomer a11y ftbfs fixed-upstream fixed fixed-in-experimental sid experimental potato woody s

Bug#914034: Bug#911938: libhttp-daemon-ssl-perl FTBFS: tests fail: Connection refused

2019-05-13 Thread Steffen Ullrich
On Mon, May 13, 2019 at 03:18:14PM +0200, Guilhem Moulin wrote: > On Mon, 13 May 2019 at 06:31:26 +0200, Steffen Ullrich wrote: > > Applications which relied on blocking I/O in connection with select could > > also hang before, > > Uh, what? “Before” meaning with ≤TLSv1.2, or with OpenSSL <1.1.1

Processed (with 1 error): Re: udd

2019-05-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 928942 + udd + buster + sid Unknown tag/s: udd. Recognized are: patch wontfix moreinfo unreproducible help security upstream pending confirmed ipv6 lfs d-i l10n newcomer a11y ftbfs fixed-upstream fixed fixed-in-experimental sid experimental

Bug#928944: marked as pending in lemonldap-ng

2019-05-13 Thread Xavier Guimard
Control: tag -1 pending Hello, Bug #928944 in lemonldap-ng reported by you has been fixed in the Git repository and is awaiting an upload. You can see the commit message below and you can check the diff of the fix at: https://salsa.debian.org/perl-team/modules/packages/lemonldap-ng/commit/fdf782

Processed: Bug#928944 marked as pending in lemonldap-ng

2019-05-13 Thread Debian Bug Tracking System
Processing control commands: > tag -1 pending Bug #928944 [liblemonldap-ng-portal-perl] CVE-2019-12046: lemonldap-ng tokens allows anonymous session when stored in session DB Added tag(s) pending. -- 928944: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928944 Debian Bug Tracking System Con

Processed: reassign

2019-05-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 928172 base-files Bug #928172 [base-files] debian-security-support: fails to upgrade from 'testing': dpkg: error: error executing hook Ignoring request to reassign bug #928172 to the same package > retitle 928172 base-files: please add a

Processed: actually reassign

2019-05-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 928172 base-files Bug #928172 [debian-security-support] debian-security-support: fails to upgrade from 'testing': dpkg: error: error executing hook Bug reassigned from package 'debian-security-support' to 'base-files'. No longer marked a

Processed (with 5 errors): lower severity

2019-05-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 928204 important Bug #928204 [debian-security-support] check-support-status: cannot create /var/lib/debian-security-support/security-support.semaphore: Directory nonexistent Severity set to 'important' from 'serious' > tags 928204 unrep

Processed (with 1 error): udd

2019-05-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 928942 udd + buster sid Unknown tag/s: udd. Recognized are: patch wontfix moreinfo unreproducible help security upstream pending confirmed ipv6 lfs d-i l10n newcomer a11y ftbfs fixed-upstream fixed fixed-in-experimental sid experimental pot

Bug#914034: Bug#911938: libhttp-daemon-ssl-perl FTBFS: tests fail: Connection refused

2019-05-13 Thread Guilhem Moulin
On Mon, 13 May 2019 at 06:31:26 +0200, Steffen Ullrich wrote: > Additionally switching off SSL_MODE_AUTO_RETRY would actually just add > a different unexpected behavior: that sysread might return with EAGAIN > on a blocking socket. FWIW as shown below that's always been the case, until OpenSSL 1.1

Bug#928948: hostapd: syslog is spammed every two seconds

2019-05-13 Thread Andrej Shadura
Hi, On Mon, 13 May 2019 at 21:42, sergio wrote: > Dear Maintainer, > > after installing hostap on debian buster syslog begin sapammed every > 2 seconds with: > > systemd[1]: hostapd.service: Service RestartSec=2s expired, scheduling > restart. > systemd[1]: hostapd.service: Scheduled restart job

Bug#928948: hostapd: syslog is spammed every two seconds

2019-05-13 Thread sergio
Package: hostapd Version: 2:2.7+git20190128+0c1e29f-5 Severity: serious Dear Maintainer, after installing hostap on debian buster syslog begin sapammed every 2 seconds with: systemd[1]: hostapd.service: Service RestartSec=2s expired, scheduling restart. systemd[1]: hostapd.service: Scheduled res

Bug#927462: marked as done (megadown: Does not download anything)

2019-05-13 Thread Debian Bug Tracking System
Your message dated Mon, 13 May 2019 19:33:39 + with message-id and subject line Bug#927462: fixed in megadown 0~20180705+git83c53dd-1.1 has caused the Debian Bug report #927462, regarding megadown: Does not download anything to be marked as done. This means that you claim that the problem has

Processed: found 928944 in 1.9.7-3

2019-05-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > found 928944 1.9.7-3 Bug #928944 [liblemonldap-ng-portal-perl] CVE-2019-12046: lemonldap-ng tokens allows anonymous session when stored in session DB Marked as found in versions lemonldap-ng/1.9.7-3. > thanks Stopping processing here. Please con

Bug#928172: fixing debian-security-support upgrades from stretch (for good)

2019-05-13 Thread Holger Levsen
On Mon, May 13, 2019 at 08:17:26PM +0100, Ben Hutchings wrote: > On Mon, 2019-05-13 at 19:08 +, Holger Levsen wrote: > > reassign -1 base-files > > retitle -1 base-files: please add a break on d-s-s < 2019.04.25 and FWIW and for future releases, I've just now done https://salsa.debian.org/deb

Bug#927462: megadown: Does not download anything

2019-05-13 Thread Boyuan Yang
On Mon, 13 May 2019 01:34:12 +0200 Alexis Murzeau wrote: > Hi, > > Did you see this bug on the megadown package ? > I saw that your maintainer email (vivia.nikolai...@puri.sm) is not the one you used when creating bugs before (n.vi...@gmail.com), so I am mailing both just in case. > > On Sat, 20

Bug#928172: fixing debian-security-support upgrades from stretch (for good)

2019-05-13 Thread Ben Hutchings
On Mon, 2019-05-13 at 19:08 +, Holger Levsen wrote: > reassign -1 base-files > retitle -1 base-files: please add a break on d-s-s < 2019.04.25 > thanks > > On Mon, May 13, 2019 at 01:00:14PM +0100, Ben Hutchings wrote: > > On Mon, 2019-05-13 at 11:52 +, Holger Levsen wrote: > > > So I thin

Bug#928172: fixing debian-security-support upgrades from stretch (for good)

2019-05-13 Thread Holger Levsen
reassign -1 base-files retitle -1 base-files: please add a break on d-s-s < 2019.04.25 thanks On Mon, May 13, 2019 at 01:00:14PM +0100, Ben Hutchings wrote: > On Mon, 2019-05-13 at 11:52 +, Holger Levsen wrote: > > So I think this can only be fixed properly (=without asking people to > > upgra

Bug#928944: CVE-2019-12046: lemonldap-ng tokens allows anonymous session when stored in session DB

2019-05-13 Thread Xavier
Package: liblemonldap-ng-portal-perl Severity: grave Tags: security upstream patch Justification: user security hole Forwarded: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1742 Found: 1.9.7-3 Hi all, during an internal audit, one of lemonldap-ngi's developers discovered an attack vect

Bug#928942: udd: cannot import database dump into PostgreSQL ("function release_name(text) does not exist")

2019-05-13 Thread Leandro Doctors
Package: qa.debian.org Severity: grave Justification: causes non-serious data loss Dear Maintainer, (Sorry for any format error in this bug. I tried to use "reportbug", but it gave me so many problems I gave up and ended up creating this manually...) I am trying to create a replica from the pu

Bug#928941: marked as done (HOME and TERM are stripped by mistake)

2019-05-13 Thread Debian Bug Tracking System
Your message dated Mon, 13 May 2019 18:20:33 + with message-id and subject line Bug#928941: fixed in lxqt-sudo 0.14.1-2 has caused the Debian Bug report #928941, regarding HOME and TERM are stripped by mistake to be marked as done. This means that you claim that the problem has been dealt wit

Bug#928887: marked as done (hello: version skew: 2.10-1+deb9u1 (stretch-security) > 2.10-1 (buster))

2019-05-13 Thread Debian Bug Tracking System
Your message dated Mon, 13 May 2019 18:19:38 + with message-id and subject line Bug#928887: fixed in hello 2.10-2 has caused the Debian Bug report #928887, regarding hello: version skew: 2.10-1+deb9u1 (stretch-security) > 2.10-1 (buster) to be marked as done. This means that you claim that t

Bug#928941: HOME and TERM are stripped by mistake

2019-05-13 Thread Alf Gaida
Package: lxqt-sudo Version: 0.14.1-1 Severity: critical Tags: patch Configurations are written into wrong directories etc - not funny, if a programm is called with lxsudo again the false written config will be read, if called with a right working (graphical) sudo not. Informations written into wr

Processed: Re: Bug#928887: hello: version skew: 2.10-1+deb9u1 (stretch-security) > 2.10-1 (buster)

2019-05-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 928887 + pending Bug #928887 [hello] hello: version skew: 2.10-1+deb9u1 (stretch-security) > 2.10-1 (buster) Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 928887: https://bugs.debian.

Bug#928887: hello: version skew: 2.10-1+deb9u1 (stretch-security) > 2.10-1 (buster)

2019-05-13 Thread Santiago Vila
tags 928887 + pending thanks I've asked release.debian.org for permission to do very minimal changes in addition to the dummy upload (see #928939 for details). Thanks.

Bug#924787: I would really like to see yubikey-personalization in buster

2019-05-13 Thread Karl O. Pinc
Hi, The release critical bug count for buster is getting really low. Is there anything to be done to be sure yubikey-personalization gets into buster? Regards, Karl Free Software: "You don't pay back, you pay forward." -- Robert A. Heinlein

Bug#908678: security-tracker - Breaks salsa.d.o

2019-05-13 Thread Bastian Blank
Hi Salvatore On Thu, Sep 13, 2018 at 01:37:35PM +0200, Salvatore Bonaccorso wrote: > On Wed, Sep 12, 2018 at 03:10:56PM +0200, Bastian Blank wrote: > > As the problems caused by the state of this repo now causes user visible > > outages, this needs to be fixed. Please provide a plan how and when

Bug#923091: That merged-usr is mandatory is RC

2019-05-13 Thread Bastian Blank
Control: severity -1 wishlist Hi Ian On Mon, May 13, 2019 at 11:22:35AM +0100, Ian Jackson wrote: > In #923091, Guillem (with dpkg maintainer hat on) asks for a > base-installer option to allow installing buster without merged-usr. No, he did not mention dpkg. But as always, please provide a pa

Processed: Re: Bug#923091: That merged-usr is mandatory is RC

2019-05-13 Thread Debian Bug Tracking System
Processing control commands: > severity -1 wishlist Bug #923091 [base-installer] base-installer: Allow installing w/o the broken merged-usr-via-symlinks Severity set to 'wishlist' from 'serious' -- 923091: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923091 Debian Bug Tracking System Conta

Processed: Adjusting severity

2019-05-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 928053 important Bug #928053 [modsecurity-crs] CVE-2019-11387 CVE-2019-11388 CVE-2019-11389 CVE-2019-11390 CVE-2019-11391 Severity set to 'important' from 'grave' > thanks Stopping processing here. Please contact me if you need assistan

Bug#928053: Adjusting severity

2019-05-13 Thread Alberto Gonzalez Iniesta
severity 928053 important thanks Hi, Thanks, Christian and Ervin, for your help. I'm lowering the severity of this bug since it does not really affect Debian (as explained in upstream link regarding this issue). If anyone disagrees with this change, please get in touch with me before raising it

Bug#927122: marked as done (ruby2.5: Rinda::TestRingFinger test_make_socket_ipv4_multicast Errno::ENETUNREACH: Network is unreachable)

2019-05-13 Thread Debian Bug Tracking System
Your message dated Mon, 13 May 2019 14:36:23 + with message-id and subject line Bug#927122: fixed in ruby2.5 2.5.5-2 has caused the Debian Bug report #927122, regarding ruby2.5: Rinda::TestRingFinger test_make_socket_ipv4_multicast Errno::ENETUNREACH: Network is unreachable to be marked as do

Bug#927122: marked as pending in ruby

2019-05-13 Thread Antonio Terceiro
Control: tag -1 pending Hello, Bug #927122 in ruby reported by you has been fixed in the Git repository and is awaiting an upload. You can see the commit message below and you can check the diff of the fix at: https://salsa.debian.org/ruby-team/ruby/commit/f0b13d061b1c57910e0390cd3af4f40e94a87a8

Processed: Bug#927122 marked as pending in ruby

2019-05-13 Thread Debian Bug Tracking System
Processing control commands: > tag -1 pending Bug #927122 [src:ruby2.5] ruby2.5: Rinda::TestRingFinger test_make_socket_ipv4_multicast Errno::ENETUNREACH: Network is unreachable Added tag(s) pending. -- 927122: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927122 Debian Bug Tracking System

Processed: reassign 918522 to timidity, forcibly merging 901148 918522

2019-05-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 918522 timidity Bug #918522 [pulseaudio] No sound with PulseAudio when an NVidia GPU is installed. Bug reassigned from package 'pulseaudio' to 'timidity'. No longer marked as found in versions pulseaudio/12.2-4 and pulseaudio/12.2-2. Ign

Bug#914034: Bug#911938: libhttp-daemon-ssl-perl FTBFS: tests fail: Connection refused

2019-05-13 Thread Guilhem Moulin
On Mon, 13 May 2019 at 06:31:26 +0200, Steffen Ullrich wrote: > Applications which relied on blocking I/O in connection with select could > also hang before, Uh, what? “Before” meaning with ≤TLSv1.2, or with OpenSSL <1.1.1a's default flags? libssl mentions no such thing beside the new default mo

Processed (with 1 error): Re: Bug#918522: No sound with PulseAudio when an NVidia GPU is installed - workaround

2019-05-13 Thread Debian Bug Tracking System
Processing control commands: > forcemerge 901148 -1 Bug #901148 [timidity] timidity: upgrading to 2.14.0-2 broke sound via pulseaudio Bug #902330 [timidity] timidity: upgrading to 2.14.0-2 broke sound via pulseaudio Bug #904652 [timidity] pulseaudio: looses device and replace it with dummy pack

Bug#927153: plymouth: upgrade fails: /usr/share/initramfs-tools/hooks/plymouth failed with return 134

2019-05-13 Thread Tobias Eliasson
On Tue, 16 Apr 2019 15:33:04 +0200 Sven Hartge wrote: > My uneducated guess is, the problem is here. See how the prefix > "/var/tmp/mkinitramfs_0BRFs9/" is applied twice, somehow? > This was reproduced in fontconfig version 2.12.6 by running as earlier suggested: mkdir -p /var/tmp/mkinitramfs_0BR

Bug#928172: fixing debian-security-support upgrades from stretch (for good)

2019-05-13 Thread Marco d'Itri
On May 13, Holger Levsen wrote: > So I think this can only be fixed properly (=without asking people to > upgrade to the latest stretch pointrelease but instead allowing upgrades > to buster from *any* stretch pointrelease) by adding a "pre-depends: > debian-security-support (>= 2019.04.25)" to b

Bug#913576: Reboot

2019-05-13 Thread Mattia Oss
Hello, I just want to add that today I rebooted my server and everything seems fine so far. Mattia

Bug#928172: fixing debian-security-support upgrades from stretch (for good)

2019-05-13 Thread Ben Hutchings
On Mon, 2019-05-13 at 11:52 +, Holger Levsen wrote: > [re-sent with debian-release list address corrected...] > > > hi, > > so there is "#928172 debian-security-support: fails to upgrade from 'testing': > dpkg: error: error executing hook" which happens when base-files is upgraded > before d

Bug#928172: fixing debian-security-support upgrades from stretch (for good)

2019-05-13 Thread Holger Levsen
[re-sent with debian-release list address corrected...] hi, so there is "#928172 debian-security-support: fails to upgrade from 'testing': dpkg: error: error executing hook" which happens when base-files is upgraded before debian-security-support (but doesnt happen if d-s-s is upgraded first...)

Bug#928172: fixing debian-security-support upgrades from stretch (for good)

2019-05-13 Thread Santiago Vila
On Mon, May 13, 2019 at 11:32:36AM +, Holger Levsen wrote: > hi, > > so there is "#928172 debian-security-support: fails to upgrade from 'testing': > dpkg: error: error executing hook" which happens when base-files is upgraded > before debian-security-support (but doesnt happen if d-s-s is upg

Bug#928172: fixing debian-security-support upgrades from stretch (for good)

2019-05-13 Thread Holger Levsen
hi, so there is "#928172 debian-security-support: fails to upgrade from 'testing': dpkg: error: error executing hook" which happens when base-files is upgraded before debian-security-support (but doesnt happen if d-s-s is upgraded first...) So I think this can only be fixed properly (=without ask

Bug#923091: That merged-usr is mandatory is RC

2019-05-13 Thread Ian Jackson
(sending this because I got the release team address wrong) Ian Jackson writes ("That merged-usr is mandatory is RC"): > Control: severity -1 serious > > In #923091, Guillem (with dpkg maintainer hat on) asks for a > base-installer option to allow installing buster without merged-usr. > > Guille

Processed: That merged-usr is mandatory is RC

2019-05-13 Thread Debian Bug Tracking System
Processing control commands: > severity -1 serious Bug #923091 [base-installer] base-installer: Allow installing w/o the broken merged-usr-via-symlinks Severity set to 'serious' from 'wishlist' -- 923091: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923091 Debian Bug Tracking System Contac

Bug#928840: marked as done (boot hangs forever at live-config when libnss-systemd in image)

2019-05-13 Thread Debian Bug Tracking System
Your message dated Mon, 13 May 2019 09:48:49 + with message-id and subject line Bug#928840: fixed in live-config 5.20190507 has caused the Debian Bug report #928840, regarding boot hangs forever at live-config when libnss-systemd in image to be marked as done. This means that you claim that t

Processed: severity of 928840 is serious

2019-05-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 928840 serious Bug #928840 [live-config] boot hangs forever at live-config when libnss-systemd in image Severity set to 'serious' from 'normal' > thanks Stopping processing here. Please contact me if you need assistance. -- 928840: htt

Processed: Re: grub-pc: upgrade hangs

2019-05-13 Thread Debian Bug Tracking System
Processing control commands: > severity -1 serious Bug #558422 [grub-pc] grub-pc: upgrade hangs Severity set to 'serious' from 'important' -- 558422: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=558422 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems