Your message dated Tue, 14 May 2019 06:18:31 +
with message-id
and subject line Bug#928963: fixed in gnupg2 2.2.13-2
has caused the Debian Bug report #928963,
regarding gpg-agent READKEY emits an invalid S-expression when private key file
has comment (on 64-bit big-endian platforms)
to be mar
Sean Whitton:
> Hello,
>
> On Mon 13 May 2019 at 11:52AM +00, Holger Levsen wrote:
>
>> [re-sent with debian-release list address corrected...]
>
> Also resending. Sorry.
>
>> so there is "#928172 debian-security-support: fails to upgrade from
>> 'testing':
>> dpkg: error: error executing hoo
Processing control commands:
> found -1 2.2.13-1
Bug #928963 [gpg-agent] gpg-agent READKEY emits an invalid S-expression when
private key file has comment (on 64-bit big-endian platforms)
Marked as found in versions gnupg2/2.2.13-1.
> found -1 2.2.14-1
Bug #928963 [gpg-agent] gpg-agent READKEY em
Package: gpg-agent
Severity: serious
Version: 2.2.12-1
Control: found -1 2.2.13-1
Control: found -1 2.2.14-1
Control: found -1 2.2.15-1
Control: affects -1 src:monkeysphere
Control: tags -1 patch upstream
Control: forwarded -1 https://dev.gnupg.org/T4501
On sparc64, powerpc64, and s390x (debian's
Hi,
On Sun, May 12, 2019 at 09:55:33PM +0530, Pirate Praveen wrote:
> We will have to file an unblock request for this to migrate to testing.
> Can you file it?
sorry for my afk, but thanks to release team (maybe), it migrated to testing.
--
Regards,
dai
GPG Fingerprint = 0B29 D88E 42E6
On 29/04/19 1:22 am, Alexis Murzeau wrote:
> The vlan argument issue has a upstream issues open [0].
>
> [0] :
> - https://github.com/tobimensch/aqemu/issues/58
> - https://github.com/tobimensch/aqemu/issues/57
The error log in issue 57 is same as what I get.
> - https://github.com/tobimen
On 14/05/19 4:02 am, Alexis Murzeau wrote:
> Le 28/04/2019 à 21:52, Alexis Murzeau a écrit :
...
> As this package is going to be removed if nothing happen, I will try to
> backport a patch from upstream forks.
> popcon indicate that is really used (while I don't use it myself), and
> might be
Hi, I missed this mail somehow. Sorry for the late reply
On 29/04/19 1:22 am, Alexis Murzeau wrote:
> On Mon, 15 Apr 2019 16:55:13 +0530 Abhijith PA wrote:
>> I recently updated aqemu and ended up in not able to open VMs.
>>
>> Following is the message is what I get when I open VMs
>>
>> AQEMU E
> Ah I see, thanks for the clarification. I thought you meant it could
> yield a deadlock. Aren't temporary failures also possible on plain
> sockets (though of course the extra SSL layer make it strictly more
> likely to happen)? IIRC if the checksum of the incoming packet
> mismatches, which c
Hello,
On Mon 13 May 2019 at 11:32AM +00, Holger Levsen wrote:
> so there is "#928172 debian-security-support: fails to upgrade from 'testing':
> dpkg: error: error executing hook" which happens when base-files is upgraded
> before debian-security-support (but doesnt happen if d-s-s is upgraded
Hello,
On Mon 13 May 2019 at 11:52AM +00, Holger Levsen wrote:
> [re-sent with debian-release list address corrected...]
Also resending. Sorry.
> so there is "#928172 debian-security-support: fails to upgrade from 'testing':
> dpkg: error: error executing hook" which happens when base-files is
Hi!
On Fri, 2019-05-10 at 21:45:09 +0200, Andreas Beckmann wrote:
> On 2019-05-09 06:00, Guillem Jover wrote:
> > awaiting trigger does not help matters, I'm not entirely sure this
> > might not be still a problem with dpkg itself. :/
>
> I can also reproduce the problem in stretch -> sid upgrade
Source: papi
Version: 5.7.0-1
Severity: serious
At least one file in this package fails to permit derivative works:
spwhitton@iris:~/tmp/papi>head -n15 src/components/appio/tests/iozone/fileop.c
/*
* Author: Don Capps
* 3/13/2006
*
* Author: Don Capps (ca...@iozone.org)
*
On Mon, 13 May 2019 at 22:24:55 +0200, Steffen Ullrich wrote:
> On Mon, May 13, 2019 at 03:18:14PM +0200, Guilhem Moulin
> wrote:
>> Uh, what? “Before” meaning with ≤TLSv1.2, or with OpenSSL <1.1.1a's
>> default flags? libssl mentions no such thing beside the new default
>> mode. And in fact t
Le 13/05/2019 à 08:08, Sylvestre Ledru a écrit :
>
> On 12/05/2019 22:10, Julien Puydt wrote:
>> Hi,
>>
>> On 12/05/2019 11:46, Alexis Murzeau wrote:
>>
>>> I saw that there is a bugfix release 6.0.2 with many fixes [0].
>> I had started to package 6.0.2 on salsa already in february. I removed
>>
Le 28/04/2019 à 21:52, Alexis Murzeau a écrit :
> On Mon, 15 Apr 2019 16:55:13 +0530 Abhijith PA wrote:
>> I recently updated aqemu and ended up in not able to open VMs.
>>
>> Following is the message is what I get when I open VMs
>>
>> AQEMU Error [264] >>>
>> Sender: QEMU return value != 0
>> Me
Your message dated Mon, 13 May 2019 22:04:03 +
with message-id
and subject line Bug#928488: fixed in spf-engine 2.9.0-4
has caused the Debian Bug report #928488,
regarding pyspf-milter fails to start on minmal system
to be marked as done.
This means that you claim that the problem has been de
Given that the error is "Illegal instruction", and reproducibly happens
on x86-bm-01 and not the other machines we've tried, could it be
something assuming CPU features more recent than the amd64 baseline?
If so, it's not obvious where: scilab does contain some C/C++ code (as
well as Java), bu
Way to reproduce it:
1. Install package in the *host* machine:
# apt-get install debian-security-support
2. Enter a sid chroot where debian-security-support has never been installed:
# schroot -c sid
3. Install package inside the chroot:
# apt-get install debian-security-support
The postinst bl
Package: apt-cacher-ng
Version: 3.2-1
Severity: serious
This bug is basically reminder to myself and not to whoever runs into
this issue.
Looks like apt-cacher-ng expiery manages to maneuver itself into a state
which cannot be recovered. It reports non-existent files from apparently
guessed sourc
HoLger,
Holger Levsen (2019-05-13):
> severity 928204 important
> tags 928204 unreproducible moreinfo
> # thanks
>
> Kibi,
>
> #928204 is the bug with the title "check-support-status: cannot create
> /var/lib/debian-security-support/security-support.semaphore: Directory
> nonexistent"...
>
>
Your message dated Mon, 13 May 2019 21:17:13 +
with message-id
and subject line Bug#927932: fixed in bind9 1:9.10.3.dfsg.P4-12.3+deb9u5
has caused the Debian Bug report #927932,
regarding bind9: CVE-2018-5743: Limiting simultaneous TCP clients is ineffective
to be marked as done.
This means t
Your message dated Mon, 13 May 2019 21:17:13 +
with message-id
and subject line Bug#927932: fixed in bind9 1:9.10.3.dfsg.P4-12.3+deb9u5
has caused the Debian Bug report #927932,
regarding bind9: CVE-2018-5743: Limiting simultaneous TCP clients is ineffective
to be marked as done.
This means t
Your message dated Mon, 13 May 2019 21:17:46 +
with message-id
and subject line Bug#928304: fixed in groonga 6.1.5-1+deb9u1
has caused the Debian Bug report #928304,
regarding groonga-httpd: Privilege escalation due to insecure use of logrotate
(CVE-2019-11675)
to be marked as done.
This mea
Your message dated Mon, 13 May 2019 21:17:07 +
with message-id
and subject line Bug#927553: fixed in atftp 0.7.git20120829-3.1~deb9u1
has caused the Debian Bug report #927553,
regarding atftp: CVE-2019-11365 CVE-2019-11366
to be marked as done.
This means that you claim that the problem has b
Your message dated Mon, 13 May 2019 21:17:13 +
with message-id
and subject line Bug#922954: fixed in bind9 1:9.10.3.dfsg.P4-12.3+deb9u5
has caused the Debian Bug report #922954,
regarding bind9: CVE-2018-5745: An assertion failure can occur if a trust
anchor rolls over to an unsupported key a
Your message dated Mon, 13 May 2019 21:17:13 +
with message-id
and subject line Bug#922955: fixed in bind9 1:9.10.3.dfsg.P4-12.3+deb9u5
has caused the Debian Bug report #922955,
regarding bind9: CVE-2019-6465: Zone transfer controls for writable DLZ zones
were not effective
to be marked as do
Control: user qa.debian@packages.debian.org
Control: usertags -1 + udd
Your message dated Mon, 13 May 2019 20:48:27 +
with message-id
and subject line Bug#928172: fixed in base-files 10.3
has caused the Debian Bug report #928172,
regarding base-files: please add a break on d-s-s < 2019.04.25
to be marked as done.
This means that you claim that the problem has be
Your message dated Mon, 13 May 2019 20:35:33 +
with message-id
and subject line Bug#928944: fixed in lemonldap-ng 2.0.2+ds-7+deb10u1
has caused the Debian Bug report #928944,
regarding CVE-2019-12046: lemonldap-ng tokens allows anonymous session when
stored in session DB
to be marked as done.
Processing control commands:
> severity -1 serious
Bug #928204 [debian-security-support] check-support-status: cannot create
/var/lib/debian-security-support/security-support.semaphore: Directory
nonexistent
Severity set to 'serious' from 'important'
--
928204: https://bugs.debian.org/cgi-bin/
Processing commands for cont...@bugs.debian.org:
> tags 928942 + udd
Unknown tag/s: udd.
Recognized are: patch wontfix moreinfo unreproducible help security upstream
pending confirmed ipv6 lfs d-i l10n newcomer a11y ftbfs fixed-upstream fixed
fixed-in-experimental sid experimental potato woody s
On Mon, May 13, 2019 at 03:18:14PM +0200, Guilhem Moulin
wrote:
> On Mon, 13 May 2019 at 06:31:26 +0200, Steffen Ullrich wrote:
> > Applications which relied on blocking I/O in connection with select could
> > also hang before,
>
> Uh, what? “Before” meaning with ≤TLSv1.2, or with OpenSSL <1.1.1
Processing commands for cont...@bugs.debian.org:
> tags 928942 + udd + buster + sid
Unknown tag/s: udd.
Recognized are: patch wontfix moreinfo unreproducible help security upstream
pending confirmed ipv6 lfs d-i l10n newcomer a11y ftbfs fixed-upstream fixed
fixed-in-experimental sid experimental
Control: tag -1 pending
Hello,
Bug #928944 in lemonldap-ng reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:
https://salsa.debian.org/perl-team/modules/packages/lemonldap-ng/commit/fdf782
Processing control commands:
> tag -1 pending
Bug #928944 [liblemonldap-ng-portal-perl] CVE-2019-12046: lemonldap-ng tokens
allows anonymous session when stored in session DB
Added tag(s) pending.
--
928944: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928944
Debian Bug Tracking System
Con
Processing commands for cont...@bugs.debian.org:
> reassign 928172 base-files
Bug #928172 [base-files] debian-security-support: fails to upgrade from
'testing': dpkg: error: error executing hook
Ignoring request to reassign bug #928172 to the same package
> retitle 928172 base-files: please add a
Processing commands for cont...@bugs.debian.org:
> reassign 928172 base-files
Bug #928172 [debian-security-support] debian-security-support: fails to upgrade
from 'testing': dpkg: error: error executing hook
Bug reassigned from package 'debian-security-support' to 'base-files'.
No longer marked a
Processing commands for cont...@bugs.debian.org:
> severity 928204 important
Bug #928204 [debian-security-support] check-support-status: cannot create
/var/lib/debian-security-support/security-support.semaphore: Directory
nonexistent
Severity set to 'important' from 'serious'
> tags 928204 unrep
Processing commands for cont...@bugs.debian.org:
> tags 928942 udd + buster sid
Unknown tag/s: udd.
Recognized are: patch wontfix moreinfo unreproducible help security upstream
pending confirmed ipv6 lfs d-i l10n newcomer a11y ftbfs fixed-upstream fixed
fixed-in-experimental sid experimental pot
On Mon, 13 May 2019 at 06:31:26 +0200, Steffen Ullrich wrote:
> Additionally switching off SSL_MODE_AUTO_RETRY would actually just add
> a different unexpected behavior: that sysread might return with EAGAIN
> on a blocking socket.
FWIW as shown below that's always been the case, until OpenSSL 1.1
Hi,
On Mon, 13 May 2019 at 21:42, sergio wrote:
> Dear Maintainer,
>
> after installing hostap on debian buster syslog begin sapammed every
> 2 seconds with:
>
> systemd[1]: hostapd.service: Service RestartSec=2s expired, scheduling
> restart.
> systemd[1]: hostapd.service: Scheduled restart job
Package: hostapd
Version: 2:2.7+git20190128+0c1e29f-5
Severity: serious
Dear Maintainer,
after installing hostap on debian buster syslog begin sapammed every
2 seconds with:
systemd[1]: hostapd.service: Service RestartSec=2s expired, scheduling restart.
systemd[1]: hostapd.service: Scheduled res
Your message dated Mon, 13 May 2019 19:33:39 +
with message-id
and subject line Bug#927462: fixed in megadown 0~20180705+git83c53dd-1.1
has caused the Debian Bug report #927462,
regarding megadown: Does not download anything
to be marked as done.
This means that you claim that the problem has
Processing commands for cont...@bugs.debian.org:
> found 928944 1.9.7-3
Bug #928944 [liblemonldap-ng-portal-perl] CVE-2019-12046: lemonldap-ng tokens
allows anonymous session when stored in session DB
Marked as found in versions lemonldap-ng/1.9.7-3.
> thanks
Stopping processing here.
Please con
On Mon, May 13, 2019 at 08:17:26PM +0100, Ben Hutchings wrote:
> On Mon, 2019-05-13 at 19:08 +, Holger Levsen wrote:
> > reassign -1 base-files
> > retitle -1 base-files: please add a break on d-s-s < 2019.04.25
and FWIW and for future releases, I've just now done
https://salsa.debian.org/deb
On Mon, 13 May 2019 01:34:12 +0200 Alexis Murzeau wrote:
> Hi,
>
> Did you see this bug on the megadown package ?
> I saw that your maintainer email (vivia.nikolai...@puri.sm) is not the one
you used when creating bugs before (n.vi...@gmail.com), so I am mailing both
just in case.
>
> On Sat, 20
On Mon, 2019-05-13 at 19:08 +, Holger Levsen wrote:
> reassign -1 base-files
> retitle -1 base-files: please add a break on d-s-s < 2019.04.25
> thanks
>
> On Mon, May 13, 2019 at 01:00:14PM +0100, Ben Hutchings wrote:
> > On Mon, 2019-05-13 at 11:52 +, Holger Levsen wrote:
> > > So I thin
reassign -1 base-files
retitle -1 base-files: please add a break on d-s-s < 2019.04.25
thanks
On Mon, May 13, 2019 at 01:00:14PM +0100, Ben Hutchings wrote:
> On Mon, 2019-05-13 at 11:52 +, Holger Levsen wrote:
> > So I think this can only be fixed properly (=without asking people to
> > upgra
Package: liblemonldap-ng-portal-perl
Severity: grave
Tags: security upstream patch
Justification: user security hole
Forwarded: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1742
Found: 1.9.7-3
Hi all,
during an internal audit, one of lemonldap-ngi's developers discovered an
attack vect
Package: qa.debian.org
Severity: grave
Justification: causes non-serious data loss
Dear Maintainer,
(Sorry for any format error in this bug. I tried to use "reportbug",
but it gave me so many problems I gave up and ended up creating this
manually...)
I am trying to create a replica from the pu
Your message dated Mon, 13 May 2019 18:20:33 +
with message-id
and subject line Bug#928941: fixed in lxqt-sudo 0.14.1-2
has caused the Debian Bug report #928941,
regarding HOME and TERM are stripped by mistake
to be marked as done.
This means that you claim that the problem has been dealt wit
Your message dated Mon, 13 May 2019 18:19:38 +
with message-id
and subject line Bug#928887: fixed in hello 2.10-2
has caused the Debian Bug report #928887,
regarding hello: version skew: 2.10-1+deb9u1 (stretch-security) > 2.10-1
(buster)
to be marked as done.
This means that you claim that t
Package: lxqt-sudo
Version: 0.14.1-1
Severity: critical
Tags: patch
Configurations are written into wrong directories etc - not funny,
if a programm is called with lxsudo again the false written config
will be read, if called with a right working (graphical) sudo not.
Informations written into wr
Processing commands for cont...@bugs.debian.org:
> tags 928887 + pending
Bug #928887 [hello] hello: version skew: 2.10-1+deb9u1 (stretch-security) >
2.10-1 (buster)
Added tag(s) pending.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
928887: https://bugs.debian.
tags 928887 + pending
thanks
I've asked release.debian.org for permission to do very minimal
changes in addition to the dummy upload (see #928939 for details).
Thanks.
Hi,
The release critical bug count for buster is getting really low.
Is there anything to be done to be sure yubikey-personalization
gets into buster?
Regards,
Karl
Free Software: "You don't pay back, you pay forward."
-- Robert A. Heinlein
Hi Salvatore
On Thu, Sep 13, 2018 at 01:37:35PM +0200, Salvatore Bonaccorso wrote:
> On Wed, Sep 12, 2018 at 03:10:56PM +0200, Bastian Blank wrote:
> > As the problems caused by the state of this repo now causes user visible
> > outages, this needs to be fixed.
Please provide a plan how and when
Control: severity -1 wishlist
Hi Ian
On Mon, May 13, 2019 at 11:22:35AM +0100, Ian Jackson wrote:
> In #923091, Guillem (with dpkg maintainer hat on) asks for a
> base-installer option to allow installing buster without merged-usr.
No, he did not mention dpkg. But as always, please provide a pa
Processing control commands:
> severity -1 wishlist
Bug #923091 [base-installer] base-installer: Allow installing w/o the broken
merged-usr-via-symlinks
Severity set to 'wishlist' from 'serious'
--
923091: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923091
Debian Bug Tracking System
Conta
Processing commands for cont...@bugs.debian.org:
> severity 928053 important
Bug #928053 [modsecurity-crs] CVE-2019-11387 CVE-2019-11388 CVE-2019-11389
CVE-2019-11390 CVE-2019-11391
Severity set to 'important' from 'grave'
> thanks
Stopping processing here.
Please contact me if you need assistan
severity 928053 important
thanks
Hi,
Thanks, Christian and Ervin, for your help. I'm lowering the severity of
this bug since it does not really affect Debian (as explained in
upstream link regarding this issue).
If anyone disagrees with this change, please get in touch with me before
raising it
Your message dated Mon, 13 May 2019 14:36:23 +
with message-id
and subject line Bug#927122: fixed in ruby2.5 2.5.5-2
has caused the Debian Bug report #927122,
regarding ruby2.5: Rinda::TestRingFinger test_make_socket_ipv4_multicast
Errno::ENETUNREACH: Network is unreachable
to be marked as do
Control: tag -1 pending
Hello,
Bug #927122 in ruby reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:
https://salsa.debian.org/ruby-team/ruby/commit/f0b13d061b1c57910e0390cd3af4f40e94a87a8
Processing control commands:
> tag -1 pending
Bug #927122 [src:ruby2.5] ruby2.5: Rinda::TestRingFinger
test_make_socket_ipv4_multicast Errno::ENETUNREACH: Network is unreachable
Added tag(s) pending.
--
927122: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927122
Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:
> reassign 918522 timidity
Bug #918522 [pulseaudio] No sound with PulseAudio when an NVidia GPU is
installed.
Bug reassigned from package 'pulseaudio' to 'timidity'.
No longer marked as found in versions pulseaudio/12.2-4 and pulseaudio/12.2-2.
Ign
On Mon, 13 May 2019 at 06:31:26 +0200, Steffen Ullrich wrote:
> Applications which relied on blocking I/O in connection with select could
> also hang before,
Uh, what? “Before” meaning with ≤TLSv1.2, or with OpenSSL <1.1.1a's
default flags? libssl mentions no such thing beside the new default
mo
Processing control commands:
> forcemerge 901148 -1
Bug #901148 [timidity] timidity: upgrading to 2.14.0-2 broke sound via
pulseaudio
Bug #902330 [timidity] timidity: upgrading to 2.14.0-2 broke sound via
pulseaudio
Bug #904652 [timidity] pulseaudio: looses device and replace it with dummy
pack
On Tue, 16 Apr 2019 15:33:04 +0200 Sven Hartge wrote:
> My uneducated guess is, the problem is here. See how the prefix
> "/var/tmp/mkinitramfs_0BRFs9/" is applied twice, somehow?
>
This was reproduced in fontconfig version 2.12.6 by running as earlier
suggested:
mkdir -p /var/tmp/mkinitramfs_0BR
On May 13, Holger Levsen wrote:
> So I think this can only be fixed properly (=without asking people to
> upgrade to the latest stretch pointrelease but instead allowing upgrades
> to buster from *any* stretch pointrelease) by adding a "pre-depends:
> debian-security-support (>= 2019.04.25)" to b
Hello,
I just want to add that today I rebooted my server and everything seems
fine so far.
Mattia
On Mon, 2019-05-13 at 11:52 +, Holger Levsen wrote:
> [re-sent with debian-release list address corrected...]
>
>
> hi,
>
> so there is "#928172 debian-security-support: fails to upgrade from 'testing':
> dpkg: error: error executing hook" which happens when base-files is upgraded
> before d
[re-sent with debian-release list address corrected...]
hi,
so there is "#928172 debian-security-support: fails to upgrade from 'testing':
dpkg: error: error executing hook" which happens when base-files is upgraded
before debian-security-support (but doesnt happen if d-s-s is upgraded first...)
On Mon, May 13, 2019 at 11:32:36AM +, Holger Levsen wrote:
> hi,
>
> so there is "#928172 debian-security-support: fails to upgrade from 'testing':
> dpkg: error: error executing hook" which happens when base-files is upgraded
> before debian-security-support (but doesnt happen if d-s-s is upg
hi,
so there is "#928172 debian-security-support: fails to upgrade from 'testing':
dpkg: error: error executing hook" which happens when base-files is upgraded
before debian-security-support (but doesnt happen if d-s-s is upgraded first...)
So I think this can only be fixed properly (=without ask
(sending this because I got the release team address wrong)
Ian Jackson writes ("That merged-usr is mandatory is RC"):
> Control: severity -1 serious
>
> In #923091, Guillem (with dpkg maintainer hat on) asks for a
> base-installer option to allow installing buster without merged-usr.
>
> Guille
Processing control commands:
> severity -1 serious
Bug #923091 [base-installer] base-installer: Allow installing w/o the broken
merged-usr-via-symlinks
Severity set to 'serious' from 'wishlist'
--
923091: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923091
Debian Bug Tracking System
Contac
Your message dated Mon, 13 May 2019 09:48:49 +
with message-id
and subject line Bug#928840: fixed in live-config 5.20190507
has caused the Debian Bug report #928840,
regarding boot hangs forever at live-config when libnss-systemd in image
to be marked as done.
This means that you claim that t
Processing commands for cont...@bugs.debian.org:
> severity 928840 serious
Bug #928840 [live-config] boot hangs forever at live-config when libnss-systemd
in image
Severity set to 'serious' from 'normal'
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
928840: htt
Processing control commands:
> severity -1 serious
Bug #558422 [grub-pc] grub-pc: upgrade hangs
Severity set to 'serious' from 'important'
--
558422: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=558422
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
80 matches
Mail list logo