Bug#835108: lepton: probably using its own "md5.h" but calling system library functions

2017-05-27 Thread Edmund Grimley Evans
It seems to me likely that both #835108 and #853479 are caused by the thing I mentioned at 2.1 in #863446: the program uses the "md5.h" included in the package's source, but calls the system library functions, which use a different MD5_CTX.

Processed: user release.debian....@packages.debian.org, usertagging 851545, tagging 851545

2017-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > user release.debian@packages.debian.org Setting user to release.debian@packages.debian.org (was ni...@thykier.net). > usertags 851545 stretch-can-defer There were no usertags set. Usertags are now: stretch-can-defer. > tags 851545 + stretc

Bug#863416: jackeq: segmentation fault

2017-05-27 Thread Chris Lamb
tags 863416 + pending patch thanks I've uploaded jackeq 0.5.9-2.1 to DELAYED/5: jackeq (0.5.9-2.1) unstable; urgency=medium * Non-maintainer upload. * Fix segmentation fault caused by passing a truncated pointer instead of a GtkType. (Closes: #863416) The full debdiff is att

Bug#863420: timemachine: segfaults on startup

2017-05-27 Thread Chris Lamb
tags 863420 + pending patch thanks I've uploaded timemachine 0.3.3-2.1 to DELAYED/5: timemachine (0.3.3-2.1) unstable; urgency=medium * Non-maintainer upload. * Fix segmentation fault caused by passing a truncated pointer instead of a GtkType. (Closes: #863420) The full debd

Processed: Re: jackeq: segmentation fault

2017-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 863416 + pending patch Bug #863416 [jackeq] jackeq: segmentation fault Added tag(s) patch and pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 863416: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=

Bug#863421: kluppe: segfaults when pressing 'new looper'

2017-05-27 Thread Chris Lamb
tags 863421 + pending patch thanks I've uploaded kluppe 0.6.20-1.1 to DELAYED/5: kluppe (0.6.20-1.1) unstable; urgency=medium * Non-maintainer upload. * Fix segmentation fauled caused by passing a truncated pointer instead of a GtkType. (Closes: #863421) The full debdiff is

Processed: Re: timemachine: segfaults on startup

2017-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 863420 + pending patch Bug #863420 [timemachine] timemachine: segfaults on startup Added tag(s) patch and pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 863420: http://bugs.debian.org/cgi-bin/bugrep

Processed: Re: kluppe: segfaults when pressing 'new looper'

2017-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 863421 + pending patch Bug #863421 [kluppe] kluppe: segfaults when pressing 'new looper' Added tag(s) pending and patch. > thanks Stopping processing here. Please contact me if you need assistance. -- 863421: http://bugs.debian.org/cgi-bin/

Bug#859307: marked as done (cracklib-runtime: Please migrate to a -noawait trigger)

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 10:04:18 + with message-id and subject line Bug#854554: fixed in cracklib2 2.9.2-5 has caused the Debian Bug report #854554, regarding cracklib-runtime: Please migrate to a -noawait trigger to be marked as done. This means that you claim that the problem ha

Bug#854554: marked as done (dpkg: trigger problem with cracklib-runtime while upgrading libcrypt-cracklib-perl from jessie to stretch)

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 10:04:18 + with message-id and subject line Bug#854554: fixed in cracklib2 2.9.2-5 has caused the Debian Bug report #854554, regarding dpkg: trigger problem with cracklib-runtime while upgrading libcrypt-cracklib-perl from jessie to stretch to be marked as

Bug#863367: apt does not find solutions that involve libssl1.0-dev -> libssl-dev

2017-05-27 Thread s3v
Thanks for investigating. Il 27/05/2017 08:32, Adrian Bunk ha scritto: > libecryptfs-dev Is not actually uninstallable, the core problem is that > you have libssl1.0-dev installed and apt fails to find the solution to > solve the dependencies: Yep, I haven't libssl-dev: $ dpkg -l | grep -i libs

Bug#852675: marked as done (cfengine3: always updates from /usr/share/cfengine3 instead of /var/lib/cfengine3)

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 11:34:32 + with message-id and subject line Bug#852675: fixed in cfengine3 3.9.1-4.2 has caused the Debian Bug report #852675, regarding cfengine3: always updates from /usr/share/cfengine3 instead of /var/lib/cfengine3 to be marked as done. This means that

Bug#863474: python-cryptography: FTBFS with openssl 1.1.0f

2017-05-27 Thread Kurt Roeckx
Package: python-cryptography Version: 1.7.1-2 Severity: serious Hi, OpenSSL made ASN1_TIME_to_generalizedtime() take a const. But it seems that python-cryptography has a local copy of the header files, which now conflict with the one from OpenSSL. It was discussed with python-cryptography and th

Processed: swftools: diff for NMU version 0.9.2+git20130725-4.1

2017-05-27 Thread Debian Bug Tracking System
Processing control commands: > tags 861693 + pending Bug #861693 [src:swftools] swftools: CVE-2017-8400: out-of-bound write of heap data issue can occur in function png_load() Added tag(s) pending. -- 861693: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861693 Debian Bug Tracking System Con

Bug#861693: swftools: diff for NMU version 0.9.2+git20130725-4.1

2017-05-27 Thread Salvatore Bonaccorso
Control: tags 861693 + pending Dear maintainer, I've prepared an NMU for swftools (versioned as 0.9.2+git20130725-4.1) and uploaded it to DELAYED/2. Please feel free to tell me if I should delay it longer. Regards, Salvatore diff -Nru swftools-0.9.2+git20130725/debian/changelog swftools-0.9.2+gi

Bug#862967: Will try tomorrow

2017-05-27 Thread Salvatore Bonaccorso
Hi Bastien, On Sun, May 21, 2017 at 04:14:55PM +0200, Bastien ROUCARIES wrote: > Hi, > > I plan to release a stable version tomorrow Could you as well do a targetted upload able to enter stretch for the open CVEs in stetch+unstable? Regards, Salvatore

Bug#863475: [prosody] Fails to initiate s2s when lua-event 0.4.3 is installed

2017-05-27 Thread Charlemagne Lasse
Package: prosody Version: 0.9.12-1 Severity: serious Tags: patch stretch Prosody fails to intiate S2S connections when lua-event 0.4.3 is installed. This bug was already fixed in the 0.10 branch of prosody but is still present on Debian stretch (which is shipped with lua-event 0.4.3) The fix can

Bug#861521: marked as done (libxstream-java: CVE-2017-7957)

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 12:33:35 + with message-id and subject line Bug#861521: fixed in libxstream-java 1.4.7-2+deb8u2 has caused the Debian Bug report #861521, regarding libxstream-java: CVE-2017-7957 to be marked as done. This means that you claim that the problem has been deal

Bug#859560: marked as done (xen: CVE-2017-7228: x86: broken check in memory_exchange() permits PV guest breakout (XSA-212))

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 12:34:02 + with message-id and subject line Bug#859560: fixed in xen 4.4.1-9+deb8u9 has caused the Debian Bug report #859560, regarding xen: CVE-2017-7228: x86: broken check in memory_exchange() permits PV guest breakout (XSA-212) to be marked as done. Thi

Bug#857561: marked as done (polarssl: CVE-2017-2784: Freeing of memory allocated on stack when validating a public key with a secp224k1 curve)

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 12:33:40 + with message-id and subject line Bug#857561: fixed in polarssl 1.3.9-2.1+deb8u2 has caused the Debian Bug report #857561, regarding polarssl: CVE-2017-2784: Freeing of memory allocated on stack when validating a public key with a secp224k1 curve

Bug#860225: marked as done (bind9: CVE-2017-3137: A response packet can cause a resolver to terminate when processing an answer containing a CNAME or DNAME)

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 12:32:09 + with message-id and subject line Bug#860225: fixed in bind9 1:9.9.5.dfsg-9+deb8u11 has caused the Debian Bug report #860225, regarding bind9: CVE-2017-3137: A response packet can cause a resolver to terminate when processing an answer containing

Bug#861484: The bug is in llvm-toolchain-3.8

2017-05-27 Thread Adrian Bunk
Control: unblock -1 by 862360 Control: reassign -1 src:llvm-toolchain-3.8 Control: forcemerge 862360 -1 Control: retitle -1 llvm-toolchain-3.8: Fix R_AARCH64_MOVW_UABS_G3 relocation Control: affects -1 src:julia The bug is in llvm-toolchain-3.8, all julia needs is a gb after the fixed llvm-toolcha

Processed: The bug is in llvm-toolchain-3.8

2017-05-27 Thread Debian Bug Tracking System
Processing control commands: > unblock -1 by 862360 Bug #861484 [src:julia] julia: FTBFS on arm64 861484 was blocked by: 862360 861484 was not blocking any bugs. Removed blocking bug(s) of 861484: 862360 > reassign -1 src:llvm-toolchain-3.8 Bug #861484 [src:julia] julia: FTBFS on arm64 Bug reassig

Bug#837091: firefox-esr: EME DRM extention present and enabled

2017-05-27 Thread Simon McVittie
On Thu, 08 Sep 2016 at 20:14:28 +0200, Tjeerd Pinkert wrote: > after reading up a bit (late(ly)) on the W3C EME proposed standard for > embedding of DRM managed content in web pages, I decided to have a > look if it is present in the firefox browser [...] > I think the presence of code that require

Bug#863479: perl-base should add Breaks: debconf (<< 1.5.57~)

2017-05-27 Thread Adrian Bunk
Package: perl-base Version: 5.24.1-2 Severity: serious Technically #786705 is just a harmless warning, but when during a jessie -> stretch upgrade perl-base is upgraded before debconf is upgraded the user might see a lot scary warnings as if something was seriously broken. Example with debconf 1.

Bug#863479: perl-base should add Breaks: debconf (<< 1.5.57~)

2017-05-27 Thread Julien Cristau
Control: severity -1 wishlist Control: tag -1 moreinfo On Sat, May 27, 2017 at 16:36:50 +0300, Adrian Bunk wrote: > Package: perl-base > Version: 5.24.1-2 > Severity: serious > > Technically #786705 is just a harmless warning, but when > during a jessie -> stretch upgrade perl-base is upgraded >

Processed: Unlikely to be a problem in jessie

2017-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 863416 stretch sid Bug #863416 [jackeq] jackeq: segmentation fault Added tag(s) sid and stretch. > tags 863420 stretch sid Bug #863420 [timemachine] timemachine: segfaults on startup Added tag(s) sid and stretch. > thanks Stopping processing

Processed: Re: Bug#863479: perl-base should add Breaks: debconf (<< 1.5.57~)

2017-05-27 Thread Debian Bug Tracking System
Processing control commands: > severity -1 wishlist Bug #863479 [perl-base] perl-base should add Breaks: debconf (<< 1.5.57~) Severity set to 'wishlist' from 'serious' > tag -1 moreinfo Bug #863479 [perl-base] perl-base should add Breaks: debconf (<< 1.5.57~) Added tag(s) moreinfo. -- 863479: ht

Processed: Re: Bug#863367: libecryptfs-dev: unable to install because of unmet dependency

2017-05-27 Thread Debian Bug Tracking System
Processing control commands: > reassign -1 libssl-dev 1.1.0e-2 Bug #863367 [apt] apt does not find solutions that involve libssl1.0-dev -> libssl-dev Bug reassigned from package 'apt' to 'libssl-dev'. Ignoring request to alter found versions of bug #863367 to the same values previously set Ignor

Bug#863367: libecryptfs-dev: unable to install because of unmet dependency

2017-05-27 Thread David Kalnischkies
Control: reassign -1 libssl-dev 1.1.0e-2 Control: retitle -1 libssl-dev: declare conflict with libssl1.0-dev to help apt find solutions On Sat, May 27, 2017 at 09:32:34AM +0300, Adrian Bunk wrote: > Control: reassign -1 apt > Control: retitle -1 apt does not find solutions that involve libssl1.0-

Bug#863480: [node-static-module] Uninitialized Memory Exposure

2017-05-27 Thread Bastien ROUCARIÈS
Package: node-static-module Version: 1.3.1-1 Severity: grave Tags: patch security fixed-upstream X-Debbugs-CC: secure-testing-t...@lists.alioth.debian.org forwarded: https://snyk.io/vuln/npm:concat-stream:20160901 concat-stream is writable stream that concatenates strings or binary data and calls

Bug#863367: [Pkg-openssl-devel] Bug#863367: libecryptfs-dev: unable to install because of unmet dependency

2017-05-27 Thread Kurt Roeckx
On Sat, May 27, 2017 at 04:00:58PM +0200, David Kalnischkies wrote: > Control: reassign -1 libssl-dev 1.1.0e-2 > Control: retitle -1 libssl-dev: declare conflict with libssl1.0-dev to help > apt find solutions [...] > Not being installable is the problem of the package which isn't > installable –

Bug#863420: timemachine: segfaults on startup

2017-05-27 Thread James Cowgill
Hi Chris, On 27/05/17 10:02, Chris Lamb wrote: > tags 863420 + pending patch > thanks > > I've uploaded timemachine 0.3.3-2.1 to DELAYED/5: > > timemachine (0.3.3-2.1) unstable; urgency=medium > > * Non-maintainer upload. > * Fix segmentation fault caused by passing a truncated po

Bug#863481: [node-concat-stream] Uninitialized Memory Exposure

2017-05-27 Thread Bastien ROUCARIÈS
Package: node-concat-stream Version: 1.5.1-1 Severity: grave Tags: patch security fixed-upstream fixed-in-experimental X-Debbugs-CC: secure-testing-t...@lists.alioth.debian.org forwarded: https://snyk.io/vuln/npm:concat-stream:20160901 Overview concat-stream is writable stream that concatenates s

Bug#835108: marked as done (lepton: FTBFS [i386]: Test failures)

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 15:11:03 + with message-id and subject line Bug#835108: fixed in lepton 1.2.1+20170405-2 has caused the Debian Bug report #835108, regarding lepton: FTBFS [i386]: Test failures to be marked as done. This means that you claim that the problem has been dealt

Bug#863286: completely broken in non-US locales

2017-05-27 Thread Santiago Ruano Rincón
Control: tags -1 + patch On Thu, 25 May 2017 11:35:42 +1000 Daurnimator wrote: > On 25 May 2017 at 08:03, Steinar H. Gunderson wrote: > > lua-http cannot construct legal requests if a non-US locale (or more > > precisely, > > anything using comma as decimal separator) is in use. > > Fixed upst

Processed: Re: Bug#863286: completely broken in non-US locales

2017-05-27 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + patch Bug #863286 [lua-http] completely broken in non-US locales Added tag(s) patch. -- 863286: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863286 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#863123: marked as done (imagemagick: CVE-2017-9143: Specially crafted arts file could lead to memory leak)

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 16:06:53 + with message-id and subject line Bug#863123: fixed in imagemagick 8:6.9.7.4+dfsg-9 has caused the Debian Bug report #863123, regarding imagemagick: CVE-2017-9143: Specially crafted arts file could lead to memory leak to be marked as done. This m

Bug#863125: marked as done (imagemagick: CVE-2017-9142: A crafted file revealed an assertion failure in blob.c)

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 16:06:53 + with message-id and subject line Bug#863125: fixed in imagemagick 8:6.9.7.4+dfsg-9 has caused the Debian Bug report #863125, regarding imagemagick: CVE-2017-9142: A crafted file revealed an assertion failure in blob.c to be marked as done. This

Bug#862967: marked as done (imagemagick: CVE-2017-9098: use of uninitialized memory in RLE decoder)

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 16:06:53 + with message-id and subject line Bug#862967: fixed in imagemagick 8:6.9.7.4+dfsg-9 has caused the Debian Bug report #862967, regarding imagemagick: CVE-2017-9098: use of uninitialized memory in RLE decoder to be marked as done. This means that yo

Bug#863124: marked as done (imagemagick: CVE-2017-9141: A crafted file revealed an assertion failure in profile.c)

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 16:06:53 + with message-id and subject line Bug#863124: fixed in imagemagick 8:6.9.7.4+dfsg-9 has caused the Debian Bug report #863124, regarding imagemagick: CVE-2017-9141: A crafted file revealed an assertion failure in profile.c to be marked as done. Th

Bug#863126: marked as done (imagemagick: CVE-2017-9144: Check for EOF conditions for RLE image format)

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 16:06:53 + with message-id and subject line Bug#863126: fixed in imagemagick 8:6.9.7.4+dfsg-9 has caused the Debian Bug report #863126, regarding imagemagick: CVE-2017-9144: Check for EOF conditions for RLE image format to be marked as done. This means tha

Bug#840572: ruby-benchmark-suite: FTBFS randomly (failing tests)

2017-05-27 Thread Santiago Vila
retitle 840572 ruby-benchmark-suite: FTBFS randomly (failing tests) severity 840572 important thanks I built this package a lot of times today. So far I have one failure and several hundred successful builds, so the probability of failure may well be below 1% and this is really a "FTBFS randomly"

Processed: Re: ruby-benchmark-suite: FTBFS randomly (failing tests)

2017-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > retitle 840572 ruby-benchmark-suite: FTBFS randomly (failing tests) Bug #840572 [src:ruby-benchmark-suite] ruby-benchmark-suite: FTBFS (failing tests) Changed Bug title to 'ruby-benchmark-suite: FTBFS randomly (failing tests)' from 'ruby-benchma

Bug#851545: marked as done (libpam-modules: multiarch packages with differing files)

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 16:33:52 + with message-id and subject line Bug#851545: fixed in pam 1.1.8-3.6 has caused the Debian Bug report #851545, regarding libpam-modules: multiarch packages with differing files to be marked as done. This means that you claim that the problem has b

Bug#863481: [Pkg-javascript-devel] Bug#863481: [node-concat-stream] Uninitialized Memory Exposure

2017-05-27 Thread Ross Gammon
Hi Bastien, If you would like me to prepare an upload to unstable for this (& unblock request), let me know. I have some time today & tomorrow - but travelling with work next week. I have DM upload rights for it. Only asking in case you are already working on it. Cheers, Ross On 05/27/2017 04:

Bug#863420: timemachine: segfaults on startup

2017-05-27 Thread Chris Lamb
James Cowgill wrote: > I tested your fixes, unfortunately timemachine still segfaults on > startup. This time it occurs in gtk_meterscale_new and it looks like the > same pointer truncation problem there. Huh, how did I miss that. Anyway, I've re-uploaded timemachine 0.3.3-2.1 to DELAYED/5:

Bug#855577: numba: FTBFS: several tests fail

2017-05-27 Thread Daniel Stender
For the latest upload (0.33.0 in experimental), the tests have been failsafed again so that there are even packages building to try out. Bug reports on the individual test failures and other remaining things to fix are coming up. Failsafe is going to be removed again when the package hits unstabl

Bug#855577: marked as done (numba: FTBFS: several tests fail)

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 18:49:38 + with message-id and subject line Bug#855577: fixed in numba 0.33.0-1 has caused the Debian Bug report #855577, regarding numba: FTBFS: several tests fail to be marked as done. This means that you claim that the problem has been dealt with. If thi

Bug#863492: pavuk: segmentation fault when opening graphical "Limitations" window

2017-05-27 Thread Chris Lamb
Package: pavuk Version: 0.9.35-6 Severity: serious Hi, Pavuk segmentation faults when opening the "Limitations" config window: $ pavuk -x https://debian.org/ Select "Config" → "Limitations" Regards, -- ,''`. : :' : Chris Lamb `. `'` la...@debian.org / chris-lamb.

Bug#863493: FTBFS with PHP 7.0.18+

2017-05-27 Thread James Clarke
Source: symfony Version: 2.8.7+dfsg-1.2 Severity: serious Tags: patch upstream fixed-upstream Hi, I noticed that symfony now FTBFS after the upload of php7.0 7.0.18-1, with the following error in the test suite: > 1) Symfony\Component\VarDumper\Tests\CliDumperTest::testThrowingCaster > Failed ass

Bug#863495: Broken on (at least) amd64, looks in wrong path for libporg-log.so

2017-05-27 Thread Andreas Moog
Package: porg Version: 2:0.10-1 Severity: serious Hi there, porg on (at least) amd64 is broken: $ sudo porg -lp foo-1.0 "touch /usr/bin/foo" ERROR: ld.so: object '/usr/lib/x86_64-linux-gnu/libporg-log.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ERROR: ld.s

Bug#863492: pavuk: segmentation fault when opening graphical "Limitations" window

2017-05-27 Thread Chris Lamb
tags 863492 + pending patch thanks I've uploaded pavuk 0.9.35-6.1 to DELAYED/5: pavuk (0.9.35-6.1) unstable; urgency=medium * Non-maintainer upload. * Fix segmentation fault when opening graphical "Limitations" window due to pointer truncation in src/gtkmulticol.[ch]. (Closes

Processed: Re: pavuk: segmentation fault when opening graphical "Limitations" window

2017-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 863492 + pending patch Bug #863492 [pavuk] pavuk: segmentation fault when opening graphical "Limitations" window Added tag(s) pending and patch. > thanks Stopping processing here. Please contact me if you need assistance. -- 863492: http:/

Bug#863493: [pkg-php-pear] Bug#863493: FTBFS with PHP 7.0.18+

2017-05-27 Thread David Prévot
Hi James, Le 27/05/2017 à 09:08, James Clarke a écrit : > Source: symfony > Version: 2.8.7+dfsg-1.2 > I noticed that symfony now FTBFS after the upload of php7.0 7.0.18-1, Thanks! > I am happy to NMU again with just the changes needed Please, go ahead, I don’t have much time currently, and hav

Bug#863481: [Pkg-javascript-devel] Bug#863481: [node-concat-stream] Uninitialized Memory Exposure

2017-05-27 Thread roucaries bastien
I can do it but I do not know that is the best: - let 1.6 go to unstable - patch old version Could you ask release team. The debdiff between the two version is so small that I have doubt On Sat, May 27, 2017 at 6:53 PM, Ross Gammon wrote: > Hi Bastien, > > If you would like me to prepare an upl

Bug#863493: symfony: diff for NMU version 2.8.7+dfsg-1.3

2017-05-27 Thread James Clarke
Dear maintainer, I've prepared an NMU for symfony (versioned as 2.8.7+dfsg-1.3) and uploaded it to unstable. The diff is attached to this message. Regards, James diff -Nru symfony-2.8.7+dfsg/debian/changelog symfony-2.8.7+dfsg/debian/changelog --- symfony-2.8.7+dfsg/debian/changelog 2017-01-29 16

Bug#863501: numba: RuntimeError: cannot cache function 'simple_usecase' [amd64, i386, arm64]

2017-05-27 Thread Daniel Stender
Source: numba Version: 0.33.0-1 Severity: serious https://buildd.debian.org/status/fetch.php?pkg=numba&arch=i386&ver=0.33.0-1&stamp=1495914429&raw=0 https://buildd.debian.org/status/fetch.php?pkg=numba&arch=arm64&ver=0.33.0-1&stamp=1495916190&raw=0 This failure appeared in the tests: __

Bug#863503: numba: numba/compiler.py:243: ConstantInferenceError [amd64, i386, arm64]

2017-05-27 Thread Daniel Stender
Source: numba Version: 0.33.0-1 Severity: serious https://buildd.debian.org/status/fetch.php?pkg=numba&arch=i386&ver=0.33.0-1&stamp=1495914429&raw=0 https://buildd.debian.org/status/fetch.php?pkg=numba&arch=arm64&ver=0.33.0-1&stamp=1495916190&raw=0 This failure appears among the tests several tim

Bug#854819: marked as done (GnuPG support broken in Horde / Debian 9)

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 22:42:33 +0200 with message-id and subject line Done in php-horde-crypt 2.7.8-1 has caused the Debian Bug report #854819, regarding GnuPG support broken in Horde / Debian 9 to be marked as done. This means that you claim that the problem has been dealt with. I

Bug#863504: numba: AssertionError in TestRaising.test_assert_statement_objmode [amd64, i386, arm64]

2017-05-27 Thread Daniel Stender
Source: numba Version: 0.33.0-1 Severity: serious https://buildd.debian.org/status/fetch.php?pkg=numba&arch=arm64&ver=0.33.0-1&stamp=1495916190&raw=0 https://buildd.debian.org/status/fetch.php?pkg=numba&arch=i386&ver=0.33.0-1&stamp=1495914429&raw=0 This test failure appears: __

Bug#863505: numba: AssertionError in TestTimedeltaArithmeticNoPython.test_mul and others [arm64]

2017-05-27 Thread Daniel Stender
Source: numba Version: 0.33.0-1 Severity: serious https://buildd.debian.org/status/fetch.php?pkg=numba&arch=arm64&ver=0.33.0-1&stamp=1495916190&raw=0 There are a couple of supposedly related test failures on arm64: ___ TestTimedeltaArithmeticNoPython.test_mul ___

Bug#863506: numba: KeyError in numba/tracing.py [amd64, i386, arm64]

2017-05-27 Thread Daniel Stender
Source: numba Version: 0.33.0-1 Severity: serious https://buildd.debian.org/status/fetch.php?pkg=numba&arch=i386&ver=0.33.0-1&stamp=1495914429&raw=0 https://buildd.debian.org/status/fetch.php?pkg=numba&arch=arm64&ver=0.33.0-1&stamp=1495916190&raw=0 This test failure appears: ___

Bug#863507: numba: tests are not running/immediately breaking (plugin custom failed with: exit code=1) [armel, armhf]

2017-05-27 Thread Daniel Stender
Source: numba Version: 0.33.0-1 Severity: serious https://buildd.debian.org/status/fetch.php?pkg=numba&arch=armel&ver=0.33.0-1&stamp=1495912245&raw=0 https://buildd.debian.org/status/fetch.php?pkg=numba&arch=armhf&ver=0.33.0-1&stamp=1495912383&raw=0 Tests are immediately breaking on armel and arm

Bug#863508: numba: FTBFS: LLVM ERROR: Program used external function '__aeabi_unwind_cpp_pr0' [armel, armhf]

2017-05-27 Thread Daniel Stender
Source: numba Version: 0.33.0-1 Severity: serious https://buildd.debian.org/status/fetch.php?pkg=numba&arch=armel&ver=0.33.0-1&stamp=1495912245&raw=0 https://buildd.debian.org/status/fetch.php?pkg=numba&arch=armhf&ver=0.33.0-1&stamp=1495912383&raw=0 FTBFS on armel and armhf: http_proxy='127.0.0

Bug#863511: numba: segfault on test_array_reshape [ppc64el]

2017-05-27 Thread Daniel Stender
Source: numba Version: 0.33.0-1 Severity: serious https://buildd.debian.org/status/fetch.php?pkg=numba&arch=ppc64el&ver=0.33.0-1&stamp=1495912133&raw=0 Tests break with a segault on s390x: numba/tests/test_array_manipulation.py::TestArrayManipulation::test_add_axis2_npm PASSED numba/tests/test

Bug#863509: numba: test_mean_magnitude breaks (plugin custom failed with: exit code=1) [mips, mipsel]

2017-05-27 Thread Daniel Stender
Source: numba Version: 0.33.0-1 Severity: serious https://buildd.debian.org/status/fetch.php?pkg=numba&arch=mips&ver=0.33.0-1&stamp=1495913987&raw=0 https://buildd.debian.org/status/fetch.php?pkg=numba&arch=mipsel&ver=0.33.0-1&stamp=1495915594&raw=0 This test breaks appears on the mips archs: n

Bug#863512: numba: segfault on test_shape [s390x]

2017-05-27 Thread Daniel Stender
Source: numba Version: 0.33.0-1 Severity: serious https://buildd.debian.org/status/fetch.php?pkg=numba&arch=s390x&ver=0.33.0-1&stamp=1495911986&raw=0 This test breaks on s390x: numba/tests/test_array_attr.py::TestNestedArrayAttr::test_shape Segmentation fault E: pybuild pybuild:283: test: plug

Bug#863493: marked as done (FTBFS with PHP 7.0.18+)

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 21:09:00 + with message-id and subject line Bug#863493: fixed in symfony 2.8.7+dfsg-1.3 has caused the Debian Bug report #863493, regarding FTBFS with PHP 7.0.18+ to be marked as done. This means that you claim that the problem has been dealt with. If this

Bug#863515: CVE-2017-0350 CVE-2017-0351 CVE-2017-0352

2017-05-27 Thread Moritz Muehlenhoff
Source: nvidia-graphics-drivers Severity: grave Tags: security Please see http://nvidia.custhelp.com/app/answers/detail/a_id/4462 Cheers, Moritz

Bug#861536: runit-init: Cannot reboot or shutdown after installing (or removing) the package.

2017-05-27 Thread Ivo De Decker
Hi, On Fri, May 26, 2017 at 12:04:59PM +0200, John Paul Adrian Glaubitz wrote: > > > As the init system is a rather fundamental component of a Linux > > > distribution, it affects many other packages, directly or indirectly > > > and it's therefore too much of a burden to provide support for all >

Processed: tagging 863475

2017-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 863475 - stretch Bug #863475 [prosody] [prosody] Fails to initiate s2s when lua-event 0.4.3 is installed Removed tag(s) stretch. > thanks Stopping processing here. Please contact me if you need assistance. -- 863475: http://bugs.debian.org

Bug#863414: coyim FTBFS: xmpp: failed to verify TLS certificate: x509: certificate signed by unknown authority

2017-05-27 Thread Chris Lamb
Hi, > coyim FTBFS: xmpp: failed to verify TLS certificate: x509: > certificate signed by unknown authority Adding `ca-certificates` to Build-Depends works, but then I get different test failures in the same area (so not tagging as patch). (Not that the package should really be accessing the inte

Processed: tagging 863283

2017-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # probably unstable only, see #861333 > tags 863283 + sid Bug #863283 [cantor-backend-r] cantor-backend-r: Cantor fails to start R server/session Added tag(s) sid. > thanks Stopping processing here. Please contact me if you need assistance. --

Processed: Re: Broken on (at least) amd64, looks in wrong path for libporg-log.so

2017-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 863495 + pending patch Bug #863495 [porg] Broken on (at least) amd64, looks in wrong path for libporg-log.so Added tag(s) patch and pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 863495: http://bug

Bug#863495: Broken on (at least) amd64, looks in wrong path for libporg-log.so

2017-05-27 Thread Chris Lamb
tags 863495 + pending patch thanks I've uploaded porg 0.10-1.1 to DELAYED/5: porg (2:0.10-1.1) unstable; urgency=medium * Non-maintainer upload. * Fix broken LD_PRELOAD path for libporg-log.so. (Closes: #863495) The full debdiff is attached. Regards, -- ,''`. : :'

Processed: tagging 863474

2017-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 863474 + patch Bug #863474 [python-cryptography] python-cryptography: FTBFS with openssl 1.1.0f Added tag(s) patch. > thanks Stopping processing here. Please contact me if you need assistance. -- 863474: http://bugs.debian.org/cgi-bin/bugre

Processed (with 2 errors): nftables: "workstation" example causes unkillable application hangs

2017-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > retitle 863518 nftables: "workstation" example causes unkillable Bug #863518 [nftables] nftables: "workstation" example breaks alternate keyboard layout in gdm Changed Bug title to 'nftables: "workstation" example causes unkillable' from 'nftabl

Processed: your mail

2017-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > retitle 863518 nftables: workstation example causes unkillable application > hangs Bug #863518 [nftables] nftables: "workstation" example causes unkillable Changed Bug title to 'nftables: workstation example causes unkillable application hangs'

Bug#863286: completely broken in non-US locales

2017-05-27 Thread Daurnimator
On 28 May 2017 at 01:38, Santiago Ruano Rincón wrote: > In case you want to test it, I've uploaded a patched version to my > personal repo: > https://people.debian.org/~santiago/debian/santiago-unstable/ If patching the upstream, please update the version in http/version.lua to something like ve

Bug#863474: marked as done (python-cryptography: FTBFS with openssl 1.1.0f)

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sun, 28 May 2017 03:03:43 + with message-id and subject line Bug#863474: fixed in python-cryptography 1.7.1-3 has caused the Debian Bug report #863474, regarding python-cryptography: FTBFS with openssl 1.1.0f to be marked as done. This means that you claim that the problem

Processed: retitle 863445 to gajim: CVE-2016-10376: possible to remote extract plain-text from encrypted sessions

2017-05-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > retitle 863445 gajim: CVE-2016-10376: possible to remote extract plain-text > from encrypted sessions Bug #863445 {Done: deba...@debian.org (W. Martin Borgert)} [gajim] possible to remote extract plain-text from encrypted sessions Changed Bug ti

Bug#863286: completely broken in non-US locales

2017-05-27 Thread Daurnimator
On 28 May 2017 at 12:53, Daurnimator wrote: > However I'm hoping to make a 0.2 release today that includes the fix > (as well as others that weren't reported to debian directly): please > consider packaging that instead. See http://daurnimator.com/post/161154248644/lua-http-v02-released and https