cuneiform is marked for autoremoval from testing

2015-07-10 Thread Debian testing autoremoval watch
cuneiform 1.1.0+dfsg-5 is marked for autoremoval from testing on 2015-07-25 It is affected by these RC bugs: 781354: cuneiform: [cuneiform] Buffer overflow triggered by user supplied image -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". T

Bug#748972: libmilter1.0.1: Opendkim and opendmarc milters have allocation leaks; libmilter is common element

2015-07-10 Thread James Cloos
> "AB" == Andreas Beckmann writes: AB> Is this still occurring with the libmilter from jessie, stretch, sid, or AB> experimental? I.e. version 8.14.4-8 or newer. Yes, sid still shows this. And since the last two updates to opendkim, it crashes daily again. Some days multiple times per day.

Bug#622822: libmilter1.0.1: segfault / error 4 in libmilter.so.1.0.1 causing any running app to die

2015-07-10 Thread Tim Warnock
No idea sorry. Moved away from sendmail because of it - went to postfix. Thanks for checking but. > -Original Message- > From: Andreas Beckmann [mailto:a...@debian.org] > Sent: Saturday, 11 July 2015 3:07 AM > To: 622...@bugs.debian.org; Tim Warnock; Bartosz Feński; Albrecht Dreß > Subje

Processed: Re: Bug#748972: libmilter1.0.1: Opendkim and opendmarc milters have allocation leaks; libmilter is common element

2015-07-10 Thread Debian Bug Tracking System
Processing control commands: > tag -1 moreinfo Bug #748972 [libmilter1.0.1] libmilter1.0.1: Opendkim and opendmarc milters have allocation leaks; libmilter is common element Added tag(s) moreinfo. -- 748972: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=748972 Debian Bug Tracking System Cont

Bug#748972: libmilter1.0.1: Opendkim and opendmarc milters have allocation leaks; libmilter is common element

2015-07-10 Thread Andreas Beckmann
Control: tag -1 moreinfo Hi James, On 2014-05-22 20:25, James Cloos wrote: > The bug is socket-type agnostic. It occurs with unix domain and with tcp > sockets. > > Every milter event allocates ram which is not free(2)d. (It shows up in > VmData in > /proc/$pid/status.) I estimate that the

Processed: Re: libmilter1.0.1: milters crash when under high load

2015-07-10 Thread Debian Bug Tracking System
Processing control commands: > tag -1 moreinfo Bug #690034 [libmilter1.0.1] libmilter1.0.1: milters crash when under high load Added tag(s) moreinfo. -- 690034: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690034 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To

Bug#690034: libmilter1.0.1: milters crash when under high load

2015-07-10 Thread Andreas Beckmann
Control: tag -1 moreinfo Hi Scott, On Tue, 9 Oct 2012 10:57:09 +0100 (BST) Scott Ashcroft wrote: > I've got serveral milters when crash when under high load. > The problem seems to be that a signal is caught in poll but the handler > doesn't do the right thing. > I think the problem is that the

Bug#792048: xdemorse: FTBFS: ***Error***: You must have automake >= 1.9 installed

2015-07-10 Thread Mattia Rizzolo
Package: xdemorse Version: 2.9-2 Severity: serious Justification: fails to build from source (but built successfully in the past) User: reproducible-bui...@lists.alioth.debian.org Usertags: ftbfs The package depends on automake, but it checks up to automake 1.14, while now the default is 1.15. Ple

Processed: Re: libmilter1.0.1: segfault / error 4 in libmilter.so.1.0.1 causing any running app to die

2015-07-10 Thread Debian Bug Tracking System
Processing control commands: > tag -1 moreinfo Bug #622822 [libmilter1.0.1] libmilter1.0.1: segfault / error 4 in libmilter.so.1.0.1 causing any running app to die Added tag(s) moreinfo. -- 622822: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622822 Debian Bug Tracking System Contact ow...@

Bug#622822: libmilter1.0.1: segfault / error 4 in libmilter.so.1.0.1 causing any running app to die

2015-07-10 Thread Andreas Beckmann
Control: tag -1 moreinfo Hi all, On Fri, 15 Apr 2011 07:53:31 +1000 Tim Warnock wrote: > Apr 15 03:53:09 mx01 kernel: [2953367.914567] milter-greylist[1275]: segfault > at 130 ip 7f2ed9253760 sp 7f2ed70c3e80 error 4 > Apr 15 03:53:09 mx01 kernel: [2953367.914675] spamass-milter[1236]: s

Bug#354055: marked as done (sendmail.mc: sendmail)

2015-07-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Jul 2015 15:38:22 + with message-id and subject line Bug#354055: fixed in sendmail 8.14.9-3 has caused the Debian Bug report #354055, regarding sendmail.mc: sendmail to be marked as done. This means that you claim that the problem has been dealt with. If this is not

Bug#296158: marked as done (sendmail.mc is not built correctly by sendmailconfig)

2015-07-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Jul 2015 15:38:22 + with message-id and subject line Bug#293017: fixed in sendmail 8.14.9-3 has caused the Debian Bug report #293017, regarding sendmail.mc is not built correctly by sendmailconfig to be marked as done. This means that you claim that the problem has

Bug#293017: marked as done (MAILER before FEATURE in sendmail.mc generated by sendmailconfig)

2015-07-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Jul 2015 15:38:22 + with message-id and subject line Bug#293017: fixed in sendmail 8.14.9-3 has caused the Debian Bug report #293017, regarding MAILER before FEATURE in sendmail.mc generated by sendmailconfig to be marked as done. This means that you claim that the

sendmail_8.14.9-3_amd64.changes ACCEPTED into unstable

2015-07-10 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 10 Jul 2015 15:37:14 +0200 Source: sendmail Binary: sendmail-bin rmail sensible-mda libmilter1.0.1 libmilter1.0.1-dbg libmilter-dev sendmail-doc sendmail sendmail-base sendmail-cf Architecture: source all Version:

Bug#559302: marked as done (sendmail provides bad default config file)

2015-07-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Jul 2015 15:38:22 + with message-id and subject line Bug#354055: fixed in sendmail 8.14.9-3 has caused the Debian Bug report #354055, regarding sendmail provides bad default config file to be marked as done. This means that you claim that the problem has been dealt

Bug#790968: marked as done (readcf: DontBlameSendmail option: GroupReadableaDefaultAuthInfoFile unrecognized)

2015-07-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Jul 2015 15:38:22 + with message-id and subject line Bug#790968: fixed in sendmail 8.14.9-3 has caused the Debian Bug report #790968, regarding readcf: DontBlameSendmail option: GroupReadableaDefaultAuthInfoFile unrecognized to be marked as done. This means that yo

Bug#328750: marked as done (sendmail fails to install)

2015-07-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Jul 2015 15:38:22 + with message-id and subject line Bug#293017: fixed in sendmail 8.14.9-3 has caused the Debian Bug report #293017, regarding sendmail fails to install to be marked as done. This means that you claim that the problem has been dealt with. If this is

Processing of sendmail_8.14.9-3_amd64.changes

2015-07-10 Thread Debian FTP Masters
sendmail_8.14.9-3_amd64.changes uploaded successfully to localhost along with the files: sendmail_8.14.9-3.dsc sendmail_8.14.9-3.debian.tar.xz sendmail-base_8.14.9-3_all.deb sendmail-cf_8.14.9-3_all.deb sendmail-doc_8.14.9-3_all.deb sendmail_8.14.9-3_all.deb Greetings, Your De

Bug#579563: marked as done (sendmail-bin: does not load all signature algorithms for TLS)

2015-07-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Jul 2015 14:01:09 +0200 with message-id <559fb405.3090...@debian.org> and subject line Re: sendmail-bin: does not load all signature algorithms for TLS has caused the Debian Bug report #579563, regarding sendmail-bin: does not load all signature algorithms for TLS to be

Bug#752528: marked as done ([wxmaxima] segfault when entering parentheses in a dialog)

2015-07-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Jul 2015 09:36:40 + with message-id and subject line Bug#752528: fixed in wxmaxima 15.04.0-1 has caused the Debian Bug report #752528, regarding [wxmaxima] segfault when entering parentheses in a dialog to be marked as done. This means that you claim that the proble

Bug#617355: marked as done ([wxmaxima] hangs on UTF8 characters like µ)

2015-07-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Jul 2015 09:36:39 + with message-id and subject line Bug#617355: fixed in wxmaxima 15.04.0-1 has caused the Debian Bug report #617355, regarding [wxmaxima] hangs on UTF8 characters like µ to be marked as done. This means that you claim that the problem has been dea

Processed: Re: [cuneiform] Buffer overflow triggered by user supplied image

2015-07-10 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + security Bug #781354 [cuneiform] [cuneiform] Buffer overflow triggered by user supplied image Added tag(s) security. > severity -1 grave Bug #781354 [cuneiform] [cuneiform] Buffer overflow triggered by user supplied image Severity set to 'grave' from 'nor

Bug#781354: [cuneiform] Buffer overflow triggered by user supplied image

2015-07-10 Thread Franz Schrober
Control: tags -1 + security Control: severity -1 grave The buffer overflow maybe has the potential to introduce a security problem. This is especially a problem because cuneiform is used by remote users in different document archiving software/document management system servers. -- To UNSUBSC