Bug#927333: node-postcss-reporter: depends on non-existent node-log-symbols

2019-04-17 Thread Steve Langasek
Package: node-postcss-reporter
Version: 5.0.0-1
Severity: grave
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu disco

The node-postcss-reporter package is uninstallable because it depends on a
non-existent node-log-symbols package.

$ sudo apt install node-postcss-reporter
Reading package lists... Done
Building dependency tree   
Reading state information... Done
Some packages could not be installed. This may mean that you have
requested an impossible situation or if you are using the unstable
distribution that some required packages have not yet been created
or been moved out of Incoming.
The following information may help to resolve the situation:

The following packages have unmet dependencies:
 node-postcss-reporter : Depends: node-log-symbols (>= 2.0.0) but it is not 
installable
E: Unable to correct problems, you have held broken packages.
$

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
Ubuntu Developer   https://www.debian.org/
slanga...@ubuntu.com vor...@debian.org


signature.asc
Description: PGP signature


Bug#926917: marked as done (openjdk-13-doc: ships usr/share/doc/openjdk-12-jre-headless/api/jquery/*)

2019-04-17 Thread Debian Bug Tracking System
Your message dated Thu, 18 Apr 2019 05:08:09 +
with message-id 
and subject line Bug#926917: fixed in openjdk-13 13~17-1
has caused the Debian Bug report #926917,
regarding openjdk-13-doc: ships 
usr/share/doc/openjdk-12-jre-headless/api/jquery/*
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
926917: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926917
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: openjdk-13-doc
Version: 13~12-1
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package fails to upgrade from
'sid' to 'experimental'.
It installed fine in 'sid', then the upgrade to 'experimental' fails
because it tries to overwrite other packages files.

Looks like a hardcoded package name/path somewhere ...

>From the attached log (scroll to the bottom...):

  Preparing to unpack .../openjdk-13-doc_13~12-1_all.deb ...
  Unpacking openjdk-13-doc (13~12-1) ...
  dpkg: error processing archive 
/var/cache/apt/archives/openjdk-13-doc_13~12-1_all.deb (--unpack):
   trying to overwrite 
'/usr/share/doc/openjdk-12-jre-headless/api/jquery/external/jquery/jquery.js', 
which is also in package openjdk-12-doc 12.0.0-3
  Errors were encountered while processing:
   /var/cache/apt/archives/openjdk-13-doc_13~12-1_all.deb

This is the list of clashing files:

  usr/share/doc/openjdk-12-jre-headless/api/jquery/external/jquery/jquery.js
  usr/share/doc/openjdk-12-jre-headless/api/jquery/jquery-3.3.1.js
  usr/share/doc/openjdk-12-jre-headless/api/jquery/jquery-ui.css
  usr/share/doc/openjdk-12-jre-headless/api/jquery/jquery-ui.js
  usr/share/doc/openjdk-12-jre-headless/api/jquery/jquery-ui.min.css
  usr/share/doc/openjdk-12-jre-headless/api/jquery/jquery-ui.min.js


cheers,

Andreas


openjdk-12-doc=12.0.0-3_openjdk-13-doc=13~12-1.log.gz
Description: application/gzip
--- End Message ---
--- Begin Message ---
Source: openjdk-13
Source-Version: 13~17-1

We believe that the bug you reported is fixed in the latest version of
openjdk-13, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 926...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Matthias Klose  (supplier of updated openjdk-13 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Thu, 18 Apr 2019 06:33:56 +0200
Source: openjdk-13
Architecture: source
Version: 13~17-1
Distribution: experimental
Urgency: medium
Maintainer: OpenJDK Team 
Changed-By: Matthias Klose 
Closes: 926845 926917
Changes:
 openjdk-13 (13~17-1) experimental; urgency=medium
 .
   [ Matthias Klose ]
   * Build the alternate zero VM using the just built hotspot VM.
   * Remove the icedtea-sound/pulseaudio build support.
   * Remove some xulrunner build bits.
   * Annotate the bootstrap dependency with :native.
   * Fix installation of the -doc package. Closes: #926845, #926917.
 .
   [ Tiago Stürmer Daitx ]
   * Install swing.properties into /conf instead of /lib.
Checksums-Sha1:
 4222901dba6fe2e6651cf9b94a3888d4bf518336 4644 openjdk-13_13~17-1.dsc
 17abad06ff98254cf8a11c19c6e851c994cbc47e 68633036 openjdk-13_13~17.orig.tar.xz
 5fb5b639b14909acba27a1b493c3bea72edc4936 165020 
openjdk-13_13~17-1.debian.tar.xz
 dd41f8d03632f0b553e393e5a126949fd7871861 17312 
openjdk-13_13~17-1_source.buildinfo
Checksums-Sha256:
 4dbecce8627e46c336b70d72e33e463ba46b26d159ff2e2dea211abec0161592 4644 
openjdk-13_13~17-1.dsc
 6bfedb954060252645617c4f0d93889ea81c597795b9c0971dc72eafaafe7823 68633036 
openjdk-13_13~17.orig.tar.xz
 d6beec43b769af1a5ec2fcea5eab738e49b153b7f5a4faad53c84a3bffb55d64 165020 
openjdk-13_13~17-1.debian.tar.xz
 24623d6affe1ae53bc3934aa7a591a0b7305eb3dd9f255cd102e5cff22dc3a9a 17312 
openjdk-13_13~17-1_source.buildinfo
Files:
 dfa197833ef0557a012946538c23abe3 4644 java optional openjdk-13_13~17-1.dsc
 3efbf96e661669998fd93fe214f8f31e 68633036 java optional 
openjdk-13_13~17.orig.tar.xz
 de64847d17cdba6bffd3014beb7a18f3 165020 java optional 
openjdk-13_13~17-1.debian.tar.xz
 377b6e70933acd7013a0bf6fc9d49e6c 17312 java optional 
openjdk-13_13~17-1_source.buildinfo

-BEGIN PGP SIGNATURE-


Bug#926845: marked as done (openjdk-13-doc: conflicts with openjdk-12-doc)

2019-04-17 Thread Debian Bug Tracking System
Your message dated Thu, 18 Apr 2019 05:08:08 +
with message-id 
and subject line Bug#926845: fixed in openjdk-13 13~17-1
has caused the Debian Bug report #926845,
regarding openjdk-13-doc: conflicts with openjdk-12-doc
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
926845: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926845
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: openjdk-13-doc
Severity: grave
Justification: renders package unusable

--8<---cut here---start->8---
Unpacking openjdk-13-doc (13~12-1) ...
dpkg: error processing archive 
/var/cache/apt/archives/openjdk-13-doc_13~12-1_all.deb (--unpack):
 trying to overwrite 
'/usr/share/doc/openjdk-12-jre-headless/api/jquery/external/jquery/jquery.js', 
which is also in package openjdk-12-doc 12.0.0-3
Errors were encountered while processing:
 /var/cache/apt/archives/openjdk-13-doc_13~12-1_all.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)
--8<---cut here---end--->8---

-- System Information:
Debian Release: buster/sid
  APT prefers stable
  APT policy: (900, 'stable'), (190, 'testing'), (180, 'unstable'), (170, 
'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-4-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages openjdk-13-doc depends on:
ii  libjs-jquery 3.3.1~dfsg-1
ii  libjs-jquery-ui  1.12.1+dfsg-5

openjdk-13-doc recommends no packages.

Versions of packages openjdk-13-doc suggests:
ii  openjdk-13-jdk  13~12-1
--- End Message ---
--- Begin Message ---
Source: openjdk-13
Source-Version: 13~17-1

We believe that the bug you reported is fixed in the latest version of
openjdk-13, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 926...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Matthias Klose  (supplier of updated openjdk-13 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Thu, 18 Apr 2019 06:33:56 +0200
Source: openjdk-13
Architecture: source
Version: 13~17-1
Distribution: experimental
Urgency: medium
Maintainer: OpenJDK Team 
Changed-By: Matthias Klose 
Closes: 926845 926917
Changes:
 openjdk-13 (13~17-1) experimental; urgency=medium
 .
   [ Matthias Klose ]
   * Build the alternate zero VM using the just built hotspot VM.
   * Remove the icedtea-sound/pulseaudio build support.
   * Remove some xulrunner build bits.
   * Annotate the bootstrap dependency with :native.
   * Fix installation of the -doc package. Closes: #926845, #926917.
 .
   [ Tiago Stürmer Daitx ]
   * Install swing.properties into /conf instead of /lib.
Checksums-Sha1:
 4222901dba6fe2e6651cf9b94a3888d4bf518336 4644 openjdk-13_13~17-1.dsc
 17abad06ff98254cf8a11c19c6e851c994cbc47e 68633036 openjdk-13_13~17.orig.tar.xz
 5fb5b639b14909acba27a1b493c3bea72edc4936 165020 
openjdk-13_13~17-1.debian.tar.xz
 dd41f8d03632f0b553e393e5a126949fd7871861 17312 
openjdk-13_13~17-1_source.buildinfo
Checksums-Sha256:
 4dbecce8627e46c336b70d72e33e463ba46b26d159ff2e2dea211abec0161592 4644 
openjdk-13_13~17-1.dsc
 6bfedb954060252645617c4f0d93889ea81c597795b9c0971dc72eafaafe7823 68633036 
openjdk-13_13~17.orig.tar.xz
 d6beec43b769af1a5ec2fcea5eab738e49b153b7f5a4faad53c84a3bffb55d64 165020 
openjdk-13_13~17-1.debian.tar.xz
 24623d6affe1ae53bc3934aa7a591a0b7305eb3dd9f255cd102e5cff22dc3a9a 17312 
openjdk-13_13~17-1_source.buildinfo
Files:
 dfa197833ef0557a012946538c23abe3 4644 java optional openjdk-13_13~17-1.dsc
 3efbf96e661669998fd93fe214f8f31e 68633036 java optional 
openjdk-13_13~17.orig.tar.xz
 de64847d17cdba6bffd3014beb7a18f3 165020 java optional 
openjdk-13_13~17-1.debian.tar.xz
 377b6e70933acd7013a0bf6fc9d49e6c 17312 java optional 
openjdk-13_13~17-1_source.buildinfo

-BEGIN PGP SIGNATURE-

iQJEBAEBCAAuFiEE1WVxuIqLuvFAv2PWvX6qYHePpvUFAly3/80QHGRva29AdWJ1

Bug#900912: marked as done (openjdk-11: Accessibility does not get loaded)

2019-04-17 Thread Debian Bug Tracking System
Your message dated Thu, 18 Apr 2019 03:22:30 +
with message-id 
and subject line Bug#900912: fixed in openjdk-11 11.0.3+7-2
has caused the Debian Bug report #900912,
regarding openjdk-11: Accessibility does not get loaded
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
900912: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900912
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: openjdk-10
Version: 10.0.1+10-4
Severity: important
Tags: a11y

Hello,

Like with openjdk-9, accessibility does not work in the openjdk-10
packages, the libatk-wrapper and java-atk-wrapper do not get loaded.

See Bug#822642 for my researches at the time, I gues things haven't
improved since then. I have pasted it for conveniency:

“
In previous versions there were symlinks for java-atk-wrapper.jar and
libatk-wrapper.so in
/usr/lib/jvm/java-8-openjdk-amd64/jre/lib/ext
but with openjdk-9 this directory seems to be disabled. I see that it's
where the class gets loaded from with openjdk-8: -verbose:class show:

[Loaded org.GNOME.Accessibility.AtkWrapper from 
file:/usr/lib/jvm/java-8-openjdk-amd64/jre/lib/ext/java-atk-wrapper.jar]

and removing that file brings

Exception in thread "main" java.awt.AWTError: Assistive Technology not found: 
org.GNOME.Accessibility.AtkWrapper
at java.awt.Toolkit.loadAssistiveTechnologies(Toolkit.java:807)
at java.awt.Toolkit.getDefaultToolkit(Toolkit.java:886)
at java.awt.Window.getToolkit(Window.java:1362)

I tried to look for the equivalent code in openjdk-9, but I don't see
where the binary is supposed to be: in openjdk-8, it was in rt.jar, but
I can't find this in openjdk-9. The source code of getDefaultToolkit
seems to be the same, except that it also checks for running headless.
Perhaps that's the test that fails?
”

I guess openjdk-8 will be phased out in Buster, so this is a really
important issue: people needing accessibility will not be able to use
java applications at all any more if openjdk-10 does not properly load
accessibility support.

Samuel

-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable-debug'), (500, 
'testing-debug'), (500, 'stable-debug'), (500, 'oldoldstable'), (500, 
'buildd-unstable'), (500, 'unstable'), (500, 'stable'), (500, 'oldstable'), (1, 
'experimental-debug'), (1, 'buildd-experimental'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.17.0 (SMP w/4 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), 
LANGUAGE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
--- End Message ---
--- Begin Message ---
Source: openjdk-11
Source-Version: 11.0.3+7-2

We believe that the bug you reported is fixed in the latest version of
openjdk-11, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 900...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Matthias Klose  (supplier of updated openjdk-11 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Thu, 18 Apr 2019 04:54:26 +0200
Source: openjdk-11
Architecture: source
Version: 11.0.3+7-2
Distribution: unstable
Urgency: high
Maintainer: OpenJDK Team 
Changed-By: Matthias Klose 
Closes: 900912
Changes:
 openjdk-11 (11.0.3+7-2) unstable; urgency=medium
 .
   * Fix 8210739: Calling JSpinner's setFont with null throws
 NullPointerException.
   * Fix 8210483: AssertionError in DeferredAttr at setOverloadKind caused by
 JDK-8203679.
 .
 openjdk-11 (11.0.3+7-1) unstable; urgency=high
 .
   * OpenJDK 11.0.3+7 build.
 - Security fixes:
   - S8211936, CVE-2019-2602: Better String parsing.
   - S8218453, CVE-2019-2684: More dynamic RMI interactions.
   - S8219066, CVE-2019-2698: Fuzzing TrueType fonts: setCurrGlyphID().
   * Support using the Java ATK wrapper (Samuel Thibault). Closes: #900912.
 - patches/jaw-classpath.diff: Fix finding the Java ATK wrapper.
 - patches/jaw-optional.diff: Make failing to load the Java ATK wrapper
   non-fatal.
Checksums-Sha1:
 

Bug#927307: libgraphicsmagick breaks gnudatalanguage

2019-04-17 Thread GCS
Control: tags -1 +confirmed

On Wed, Apr 17, 2019 at 10:00 PM Bob Friesenhahn
 wrote:
> On Wed, 17 Apr 2019, Ole Streicher wrote:
> > gdl: magick/semaphore.c:606: LockSemaphoreInfo:
> > Assertion `semaphore_info != (SemaphoreInfo *) NULL' failed.
> > Aborted
>
> A stack trace would be very useful in order to diagnose the cause.
> Unfortunately, the assertion does not reveal which semaphore is
> involved.
 Simply invoking gdl also produce:
gdl: magick/semaphore.c:606: LockSemaphoreInfo: Assertion
`semaphore_info != (SemaphoreInfo *) NULL' failed.
Aborted

strace didn't reveal too much things (not for me at least). The gdb
backtrace says:
#0  0x7335b8bb in __GI_raise (sig=sig@entry=6)
at ../sysdeps/unix/sysv/linux/raise.c:50
set =
{__val = {0, 93824992798416, 0, 140737274038087,
4222451712, 93824992798416, 93824992798517, 93824992798416,
93824992798416, 93824992798525, 93824992798716, 93824992798416,
93824992798716, 0, 0, 0}}
pid = 
tid = 
#1  0x73346535 in __GI_abort () at abort.c:79
save_stage = 1
act =
  {__sigaction_handler = {sa_handler = 0x55578090,
sa_sigaction = 0x55578090}, sa_mask = {__val = {0, 303,
93824992798416, 0, 0, 0, 21474836480, 140737488349736,
140737488349584, 140737275153072, 140737275137760, 0,
7985314115815763968, 140737275122618, 0, 140737275137760}}, sa_flags =
-161122104, sa_restorer = 0x76657940}
sigs = {__val = {32, 0 }}
#2  0x7334640f in __assert_fail_base
(fmt=0x734a8ee0 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n",
assertion=0x76657940 "semaphore_info != (SemaphoreInfo *) NULL",
file=0x766578c8 "magick/semaphore.c", line=606,
function=) at assert.c:92
str = 0x55578090 ""
total = 4096
#3  0x733540f2 in __GI___assert_fail
(assertion=0x76657940 "semaphore_info != (SemaphoreInfo *)
NULL", file=0x766578c8 "magick/semaphore.c", line=606,
function=0x766579c0 "LockSemaphoreInfo") at assert.c:101
#4  0x7651802d in LockSemaphoreInfo ()
at /usr/lib/libGraphicsMagick-Q16.so.3
#5  0x76514e59 in GetMagickResourceLimit ()
at /usr/lib/libGraphicsMagick-Q16.so.3
#6  0x764f1719 in GetCacheInfo ()
at /usr/lib/libGraphicsMagick-Q16.so.3
#7  0x764d4081 in AllocateImage ()
at /usr/lib/libGraphicsMagick-Q16.so.3
#8  0x763eacf5 in Magick::ImageRef::ImageRef() (this=0x555d9740)
at Magick++/lib/ImageRef.cpp:49
#9  0x763e155c in Magick::Image::Image()
(this=0x77f9fc60 ) at Magick++/lib/Image.cpp:278
#10 0x773fb1d0 in  ()
at /usr/lib/x86_64-linux-gnu/libgnudatalanguage.so.0
#11 0x77fe430a in call_init
(l=, argc=argc@entry=1,
argv=argv@entry=0x7fffec58, env=env@entry=0x7fffec68) at
dl-init.c:72
j = 
jm = 
addrs = 
init_array = 
#12 0x77fe4406 in call_init
(env=0x7fffec68, argv=0x7fffec58, argc=1, l=)
at dl-init.c:30
preinit_array = 
preinit_array_size = 
i = 1
#13 0x77fe4406 in _dl_init
(main_map=0x77ffe190, argc=1, argv=0x7fffec58, env=0x7fffec68)
at dl-init.c:119
preinit_array = 
preinit_array_size = 
i = 1
#14 0x77fd60ca in _dl_start_user () at /lib64/ld-linux-x86-64.so.2
#15 0x0001 in  ()
#16 0x7fffee4c in  ()
#17 0x in  ()

Sorry for my brevity, it's almost morning here. Should rest before my
working hours. But I hope this helps something.
Regards,
Laszlo/GCS



Processed: Re: Bug#927307: libgraphicsmagick breaks gnudatalanguage

2019-04-17 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 +confirmed
Bug #927307 [libgraphicsmagick-q16-3] libgraphicsmagick breaks gnudatalanguage
Added tag(s) confirmed.

-- 
927307: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927307
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#921688: saw this

2019-04-17 Thread Joey Hess
This is still happening, the legitimate public servers may not work with
electrum 3.3, but there are dozens of rogue servers that do and that are
exploiting this bug.

-- 
see shy jo


signature.asc
Description: PGP signature


Bug#927314: rust-ascii depends on obsolete version of librust-quickcheck-dev

2019-04-17 Thread Steve Langasek
Package: librust-ascii+quickcheck-dev
Version: 0.9.1-1
Severity: grave
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu disco

The rust-ascii package in unstable depends on an obsolete version of
librust-quickcheck-dev:

$ sudo apt install librust-ascii+quickcheck-dev
Reading package lists... Done
Building dependency tree   
Reading state information... Done
Some packages could not be installed. This may mean that you have
requested an impossible situation or if you are using the unstable
distribution that some required packages have not yet been created
or been moved out of Incoming.
The following information may help to resolve the situation:

The following packages have unmet dependencies:
 librust-ascii+quickcheck-dev : Depends: librust-quickcheck-0.6+default-dev but 
it is not installable
E: Unable to correct problems, you have held broken packages.
$

librust-quickcheck+default-dev is at version 0.7 in testing and version 0.8
in unstable, and neither provide the 0.6 that this depends on.

rust-ascii needs to be updated for a current rust-quickcheck.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
Ubuntu Developer   https://www.debian.org/
slanga...@ubuntu.com vor...@debian.org


signature.asc
Description: PGP signature


Bug#917501: meson: does not build ok when built with eatmydata + overlayfs

2019-04-17 Thread Santiago Vila
severity 917501 normal
retitle 917501 meson: does not build ok when built with eatmydata + overlayfs
thanks

[ Cc:ing all the parties who tried to help ]

I'm really sorry. My apologies.

I usually build with eatmydata and overlayfs, as it speeds the build a lot,
and I forgot to try without those addons for this package.

After I stopped using eatmydata, the package built ok for me.

My mistake was to assume that because it failed for me and it failed
in reproducible-builds, it would fail in the usual sense, but a failure
which only happens when using eatmydata is not a "real" failure.

I suspect that this fails in reproducible-builds because they use
eatmydata as well, but I don't know how to check this.

Thanks and sorry again.



Processed: Re: Bug#917501: meson: does not build ok when built with eatmydata + overlayfs

2019-04-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 917501 normal
Bug #917501 [src:meson] meson: FTBFS (failing tests)
Severity set to 'normal' from 'serious'
> retitle 917501 meson: does not build ok when built with eatmydata + overlayfs
Bug #917501 [src:meson] meson: FTBFS (failing tests)
Changed Bug title to 'meson: does not build ok when built with eatmydata + 
overlayfs' from 'meson: FTBFS (failing tests)'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
917501: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917501
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#927310: libvirt-daemon: LXC container shut down, e.g., virsh -c lxc:// shutdown , is ignored

2019-04-17 Thread Joachim Falk
Package: libvirt-daemon
Version: 5.0.0-2
Severity: grave
Tags: patch
Justification: renders package unusable

Dear maintainer,

LXC container shut down is ignore. Amongst others, this will induce
a hang on host shut down as the libvirt daemon waits 3 minutes per
active container for shut down. Relevant patches from upstram are

>From 64eca3d5e30030147383bc63eba77e723563d4e2 Mon Sep 17 00:00:00 2001
From: Michal Privoznik 
Date: Fri, 25 Jan 2019 12:37:53 +0100
Subject: [PATCH 1/2] virinitctl: Expose fifo paths and allow caller to chose one

So far the virInitctlSetRunLevel() is fully automatic. It finds
the correct fifo to use to talk to the init and it will set the
desired runlevel. Well, callers (so far there is just one) will
need to inspect the fifo a bit just before the runlevel is set.
Therefore, expose the internal list of fifos and also allow
caller to explicitly use one.

Signed-off-by: Michal Privoznik 
Reviewed-by: Erik Skultety 

>From 94fce255461ad6bf0366dd4428921d7d41ba1a8f Mon Sep 17 00:00:00 2001
From: Michal Privoznik 
Date: Fri, 25 Jan 2019 12:42:54 +0100
Subject: [PATCH 2/2] lxc: Don't reboot host on virDomainReboot

If the container is really a simple one (init is just bash and
the whole root is passed through) then virDomainReboot and
virDomainShutdown will talk to the actual init within the host.
Therefore, 'virsh shutdown $dom' will result in shutting down the
host. True, at that point the container is shut down too but
looks a bit harsh to me.

The solution is to check if the init inside the container is or
is not the same as the init running on the host.

Signed-off-by: Michal Privoznik 
Reviewed-by: Erik Skultety 

>From 14b6a1854fb4c02c5fb2f51679f8ff099f28f53c Mon Sep 17 00:00:00 2001
From: Maxim Kozin 
Date: Wed, 6 Mar 2019 21:39:11 +0300
Subject: [PATCH] lxc: Try harder to stop/reboot containers

If shutting down a container via setting the runlevel fails, the
control jumps right onto endjob label and doesn't even try
sending the signal. If flags allow it, we should try both
methods.

Signed-off-by: Maxim Kozin 
Signed-off-by: Michal Privoznik 

-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages libvirt-daemon depends on:
ii  libacl1 2.2.53-4
ii  libapparmor12.13.2-10
ii  libaudit1   1:2.8.4-2
ii  libavahi-client30.7-4+b1
ii  libavahi-common30.7-4+b1
ii  libblkid1   2.33.1-0.1
ii  libc6   2.28-8
ii  libcap-ng0  0.7.9-2
ii  libcurl3-gnutls 7.64.0-2
ii  libdbus-1-3 1.12.12-1
ii  libdevmapper1.02.1  2:1.02.155-2
ii  libfuse22.9.9-1
ii  libgcc1 1:8.3.0-6
ii  libgnutls30 3.6.6-2
ii  libnetcf1   1:0.2.8-1+b2
ii  libnl-3-200 3.4.0-1
ii  libnl-route-3-200   3.4.0-1
ii  libnuma12.0.12-1
ii  libparted2  3.2-24
ii  libpcap0.8  1.8.1-6
ii  libpciaccess0   0.14-1
ii  libsasl2-2  2.1.27+dfsg-1
ii  libselinux1 2.8-1+b1
ii  libssh2-1   1.8.0-2.1
ii  libudev1241-3
hi  libvirt05.0.0-2
ii  libxenmisc4.11  4.11.1+26-g87f51bf366-3
ii  libxenstore3.0  4.11.1+26-g87f51bf366-3
ii  libxentoollog1  4.11.1+26-g87f51bf366-3
ii  libxml2 2.9.4+dfsg1-7+b3
ii  libyajl22.1.0-3

Versions of packages libvirt-daemon recommends:
ii  libxml2-utils   2.9.4+dfsg1-7+b3
ii  netcat-openbsd  1.195-2
ii  qemu-kvm1:3.1+dfsg-7

Versions of packages libvirt-daemon suggests:
pn  libvirt-daemon-driver-storage-gluster  
pn  libvirt-daemon-driver-storage-rbd  
pn  libvirt-daemon-driver-storage-zfs  
hi  libvirt-daemon-system  5.0.0-2
ii  numad  0.5+20150602-5

-- no debconf information
>From 64eca3d5e30030147383bc63eba77e723563d4e2 Mon Sep 17 00:00:00 2001
From: Michal Privoznik 
Date: Fri, 25 Jan 2019 12:37:53 +0100
Subject: [PATCH 1/2] virinitctl: Expose fifo paths and allow caller to chose
 one

So far the virInitctlSetRunLevel() is fully automatic. It finds
the correct fifo to use to talk to the init and it will set the
desired runlevel. Well, callers (so far there is just one) will
need to inspect the fifo a bit just before the runlevel is set.
Therefore, expose the internal list of fifos and also allow
caller to explicitly use one.

Signed-off-by: Michal Privoznik 
Reviewed-by: Erik Skultety 
---
 src/libvirt_private.syms |  1 +
 src/lxc/lxc_driver.c |  2 +-
 src/util/virinitctl.c| 67 ++--
 src/util/virinitctl.h|  6 +++-
 4 files changed, 50 insertions(+), 26 deletions(-)

Index: libvirt/src/libvirt_private.syms

Processed: tagging 883872

2019-04-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 883872 + patch
Bug #883872 [src:bitlbee] bitlbee: Extremely incomplete d/copyright
Added tag(s) patch.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
883872: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883872
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#926928: closing 926928

2019-04-17 Thread Jochen Sprickerhof
close 926928 
thanks

Maybe a coincidence with the provider changing their certificate.

Glad to hear it's fixed, so closing.

Cheers Jochen



Processed: closing 926928

2019-04-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> close 926928
Bug #926928 [fetchmail] fetchmail: Server CommonName mismatch
Marked Bug as done
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
926928: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926928
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#927307: libgraphicsmagick breaks gnudatalanguage

2019-04-17 Thread Bob Friesenhahn

On Wed, 17 Apr 2019, Ole Streicher wrote:


gdl: magick/semaphore.c:606: LockSemaphoreInfo:
Assertion `semaphore_info != (SemaphoreInfo *) NULL' failed.
Aborted


A stack trace would be very useful in order to diagnose the cause. 
Unfortunately, the assertion does not reveal which semaphore is 
involved.


Bob
--
Bob Friesenhahn
bfrie...@simple.dallas.tx.us, http://www.simplesystems.org/users/bfriesen/
GraphicsMagick Maintainer,http://www.GraphicsMagick.org/
Public Key, http://www.simplesystems.org/users/bfriesen/public-key.txt



Bug#927308: mysql-5.7: Security fixes from the April 2019 CPU

2019-04-17 Thread Salvatore Bonaccorso
Source: mysql-5.7
Version: 5.7.25-1
Severity: grave
Tags: security upstream

Hi

See
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixMSQL
for a list of CVEs affecting src:mysql-5.7.

Regards,
Salvatore



Bug#905772: libvirtd upgrade broken stretch->buster

2019-04-17 Thread Sam Hartman
When I marked the bug RC, I thought it was happening all the time; I
then went to reproduce yet again in a controlled environment to be more
in a position to test a fix.
That's when I discovered things are more complex.

Obviously if this is a fringe situation, then it shouldn't be RC.



Bug#905772: libvirtd upgrade broken stretch->buster

2019-04-17 Thread Guido Günther
Hi,
On Wed, Apr 17, 2019 at 02:47:41PM -0400, Sam Hartman wrote:
> but I haven't been able to reproduce on a clean install.
> It's frustrating: on my machines where I really want the upgrade to be
> smoothe this bit me, but on all my toy tests, it didn't happen.
> What I think may be necessary is for virtlogd to be active.
> So it may be necessary to actually get libvirtd running and actually
> running a VM to use the socket before the issue comes up.

That's possible.

> Alternatively, it's possible some other change has fixed this in the
> last month.

We did not change anything in that area so it's likely hidden (e.g. only
happening when running a VM) - I'll check that.


> I'll certainly say that a month ago ran into this on two different VM
> servers.

That's an important data point. Thanks
 -- Guido



Bug#926784: firehol: Please document usage of iptables-legacy

2019-04-17 Thread Libor Klepáč
Hi,
just a follow up from today.

On host, where I was debuging firehol behaviour on iptables-nft vs. iptables-
legacy (before reporting bug) , I got strange behavior after upgrading to 
3.1.6+ds-8.

It was caused by my manual change of iptables alternatives -legacy one.

Sequence was like this:
install firehol 3.1.6+ds-7
setup firewall (loaded do nft tables)
do some debuging to find out that you need -legacy
update-alternatives to iptables-legacy
load firewall again (this time, it loads to legacy iptables)
upgrade to firehol 3.1.6+ds-8, keep iptables alternatives to -legacy

Now you have two "identical" firewalls ;) - first was loaded with old version 
of firehol to nft, second is loaded to legacy tables.

Now change config of firehol, open new port to be accessible, reload firehol 
and test it.
It's not accessible, iptables keep logging dropped packet.

Try to allow all access, try to stop firehol - port is still not accessible.

List your firewall using iptables -L 

You see empty ruleset with policy=ACCEPT in all chains.

Go crazy ;)

Try to list 
iptables-nft -L

AHA - here is your firewall blocking your access. (it also warns you, that 
there are some rules in legacy tables)

Reboot

I think, users are safe to upgrade from -7 to -8 , unless they did manual 
override of iptables alternatives.

Libor



Bug#927307: libgraphicsmagick breaks gnudatalanguage

2019-04-17 Thread Ole Streicher
Package: libgraphicsmagick-q16-3
Version: 1.4~hg15968-1
Severity: serious
Control: affects -1 gnudatalanguage gdl-coyote gdl-mpfit gdl-astrolib

The latest upload of graphicsmagick to unstable breaks the CI test of
gnudatalanguage and all GDL packages, and also causes an FTBFS for these
packages.

CI failure is catched in
https://ci.debian.net/data/autopkgtest/unstable/amd64/g/gnudatalanguage/2250913/log.gz

with the overall error

gdl: magick/semaphore.c:606: LockSemaphoreInfo:
 Assertion `semaphore_info != (SemaphoreInfo *) NULL' failed.
Aborted

This is an assertion within graphicsmagick. It is a regression and
worked well with 1.4~hg15916-2.

Best regards

Ole



Processed: libgraphicsmagick breaks gnudatalanguage

2019-04-17 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 gnudatalanguage gdl-coyote gdl-mpfit gdl-astrolib
Bug #927307 [libgraphicsmagick-q16-3] libgraphicsmagick breaks gnudatalanguage
Added indication that 927307 affects gnudatalanguage, gdl-coyote, gdl-mpfit, 
and gdl-astrolib

-- 
927307: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927307
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#905772: libvirtd upgrade broken stretch->buster

2019-04-17 Thread Sam Hartman
> "Guido" == Guido Günther  writes:

Guido> Hi,
Guido> On Mon, Apr 15, 2019 at 02:38:27PM -0400, Sam Hartman wrote:
>> control: severity -1 serious
>> 
>> justification: libvirtd upgrades from stretch to buster break
>> causing apt to fail and requiring the admin to get the systemd
>> units into a consistent state before things can continue
>> 
>> 
>> Unfortunately based on discussion so far this is a complex bug to
>> fix.  Ubuntu's solution is to drop the sysv scripts and to drop
>> Also= lines in some of the units.

Guido> Did you reproduce this bug on a stretch->buster upgrade?
Guido> Cause I just did that and didn't encounter any errors.

I've run into this on two active server upgrades--servers that were
running VMs,
but I haven't been able to reproduce on a clean install.
It's frustrating: on my machines where I really want the upgrade to be
smoothe this bit me, but on all my toy tests, it didn't happen.
What I think may be necessary is for virtlogd to be active.
So it may be necessary to actually get libvirtd running and actually
running a VM to use the socket before the issue comes up.
Alternatively, it's possible some other change has fixed this in the
last month.
I'll certainly say that a month ago ran into this on two different VM
servers.



Bug#910964: marked as done (libprotobuf17 needs Breaks: libprotobuf10)

2019-04-17 Thread Debian Bug Tracking System
Your message dated Wed, 17 Apr 2019 18:34:17 +
with message-id 
and subject line Bug#910964: fixed in protobuf 3.6.1.3-2
has caused the Debian Bug report #910964,
regarding libprotobuf17 needs Breaks: libprotobuf10
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
910964: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910964
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libprotobuf17
Version: 3.6.1-2
Severity: serious
Control: affects -1 src:cura-engine

https://buildd.debian.org/status/package.php?p=cura-engine=sid

...
Running tests...
/usr/bin/ctest --force-new-ctest-process -j4
Test project /<>/obj-x86_64-linux-gnu
Start 1: SpaceFillingTreeFillTest
Start 2: SparseGridTest
Start 3: IntPointTest
Start 4: LinearAlg2DTest
1/8 Test #1: SpaceFillingTreeFillTest .***Exception: Child aborted  
0.02 sec
[libprotobuf FATAL google/protobuf/stubs/common.cc:79] This program was 
compiled against version 3.0.0 of the Protocol Buffer runtime library, which is 
not compatible with the installed version (3.6.1).  Contact the program author 
for an update.  If you compiled the program yourself, make sure that your 
headers are from the same version of Protocol Buffers as your link-time 
library.  (Version verification failed in "google/protobuf/any.pb.cc".)
terminate called after throwing an instance of 
'google::protobuf::FatalException'
  what():  This program was compiled against version 3.0.0 of the Protocol 
Buffer runtime library, which is not compatible with the installed version 
(3.6.1).  Contact the program author for an update.  If you compiled the 
program yourself, make sure that your headers are from the same version of 
Protocol Buffers as your link-time library.  (Version verification failed in 
"google/protobuf/any.pb.cc".)

Start 5: PolygonUtilsTest
2/8 Test #2: SparseGridTest ...***Exception: Child aborted  
0.03 sec
[libprotobuf FATAL google/protobuf/stubs/common.cc:79] This program was 
compiled against version 3.0.0 of the Protocol Buffer runtime library, which is 
not compatible with the installed version (3.6.1).  Contact the program author 
for an update.  If you compiled the program yourself, make sure that your 
headers are from the same version of Protocol Buffers as your link-time 
library.  (Version verification failed in "google/protobuf/any.pb.cc".)
terminate called after throwing an instance of 
'google::protobuf::FatalException'
  what():  This program was compiled against version 3.0.0 of the Protocol 
Buffer runtime library, which is not compatible with the installed version 
(3.6.1).  Contact the program author for an update.  If you compiled the 
program yourself, make sure that your headers are from the same version of 
Protocol Buffers as your link-time library.  (Version verification failed in 
"google/protobuf/any.pb.cc".)

Start 6: PolygonTest
3/8 Test #3: IntPointTest .***Exception: Child aborted  
0.03 sec
[libprotobuf FATAL google/protobuf/stubs/common.cc:79] This program was 
compiled against version 3.0.0 of the Protocol Buffer runtime library, which is 
not compatible with the installed version (3.6.1).  Contact the program author 
for an update.  If you compiled the program yourself, make sure that your 
headers are from the same version of Protocol Buffers as your link-time 
library.  (Version verification failed in "google/protobuf/any.pb.cc".)
terminate called after throwing an instance of 
'google::protobuf::FatalException'
  what():  This program was compiled against version 3.0.0 of the Protocol 
Buffer runtime library, which is not compatible with the installed version 
(3.6.1).  Contact the program author for an update.  If you compiled the 
program yourself, make sure that your headers are from the same version of 
Protocol Buffers as your link-time library.  (Version verification failed in 
"google/protobuf/any.pb.cc".)

Start 7: StringTest
4/8 Test #4: LinearAlg2DTest ..***Exception: Child aborted  
0.02 sec
[libprotobuf FATAL google/protobuf/stubs/common.cc:79] This program was 
compiled against version 3.0.0 of the Protocol Buffer runtime library, which is 
not compatible with the installed version (3.6.1).  Contact the program author 
for an update.  If you compiled the program yourself, make sure that your 
headers are from the same version of Protocol Buffers as your link-time 
library.  (Version verification failed in "google/protobuf/any.pb.cc".)
terminate called after throwing an instance of 
'google::protobuf::FatalException'
  

Bug#905772: libvirtd upgrade broken stretch->buster

2019-04-17 Thread Guido Günther
Hi,
On Mon, Apr 15, 2019 at 02:38:27PM -0400, Sam Hartman wrote:
> control: severity -1 serious
> 
> justification: libvirtd upgrades from stretch to buster break causing
> apt to fail and requiring the admin to get the systemd units into a
> consistent state before things can continue
> 
> 
> Unfortunately based on discussion so far this is a complex bug to fix.
> Ubuntu's solution is to drop the sysv scripts and to drop  Also= lines
> in some of the units.

Did you reproduce this bug on a stretch->buster upgrade? Cause I just
did that and didn't encounter any errors.

Cheers,
 -- Guido



Bug#921232: marked as done (mono: Internal compiler error building libsbml on s390x)

2019-04-17 Thread Debian Bug Tracking System
Your message dated Wed, 17 Apr 2019 17:58:13 +
with message-id 
and subject line Bug#921232: fixed in mono 5.18.0.240+dfsg-3
has caused the Debian Bug report #921232,
regarding mono: Internal compiler error building libsbml on s390x
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
921232: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921232
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: mono-mcs
Version: 5.18.0.240+dfsg-2
Severity: serious
Control: affects -1 src:libsbml

https://buildd.debian.org/status/fetch.php?pkg=libsbml=s390x=5.17.2%2Bdfsg-3=1548889326=0

...
[ 98%] Build csharp files
Creating: libsbmlcsP.dll
csharp-files/FbcModelPlugin.cs(119,3): error CS0589: Internal compiler error 
during parsingSystem.ArgumentOutOfRangeException: Length cannot be less than 
zero.
Parameter name: length
  at System.String.Substring (System.Int32 startIndex, System.Int32 length) 
[0x0003a] in :0 
  at System.String.SplitKeepEmptyEntries (System.ReadOnlySpan`1[T] sepList, 
System.ReadOnlySpan`1[T] lengthList, System.Int32 defaultLength, System.Int32 
count) [0x00049] in :0 
  at System.String.SplitInternal (System.ReadOnlySpan`1[T] separators, 
System.Int32 count, System.StringSplitOptions options) [0x000d1] in 
:0 
  at System.String.Split (System.Char separator, System.StringSplitOptions 
options) [0x9] in :0 
  at Mono.CSharp.Tokenizer.update_formatted_doc_comment (System.Int32 
current_comment_start) [0x0002a] in <5ee4ea6b36fa4cf3b3000934ce92985a>:0 
  at Mono.CSharp.Tokenizer.xtoken () [0x00b1c] in 
<5ee4ea6b36fa4cf3b3000934ce92985a>:0 
  at Mono.CSharp.Tokenizer.token () [0x0] in 
<5ee4ea6b36fa4cf3b3000934ce92985a>:0 
  at Mono.CSharp.CSharpParser.yyparse (Mono.CSharp.yyParser.yyInput yyLex) 
[0x0010f] in <5ee4ea6b36fa4cf3b3000934ce92985a>:0 
  at Mono.CSharp.CSharpParser.parse () [0x0002e] in 
<5ee4ea6b36fa4cf3b3000934ce92985a>:0 
csharp-files/ListOfMembers.cs(120,3): error CS0589: Internal compiler error 
during parsingSystem.ArgumentOutOfRangeException: Length cannot be less than 
zero.
Parameter name: length
  at System.String.Substring (System.Int32 startIndex, System.Int32 length) 
[0x0003a] in :0 
  at System.String.SplitKeepEmptyEntries (System.ReadOnlySpan`1[T] sepList, 
System.ReadOnlySpan`1[T] lengthList, System.Int32 defaultLength, System.Int32 
count) [0x00049] in :0 
  at System.String.SplitInternal (System.ReadOnlySpan`1[T] separators, 
System.Int32 count, System.StringSplitOptions options) [0x000d1] in 
:0 
  at System.String.Split (System.Char separator, System.StringSplitOptions 
options) [0x9] in :0 
  at Mono.CSharp.Tokenizer.update_formatted_doc_comment (System.Int32 
current_comment_start) [0x0002a] in <5ee4ea6b36fa4cf3b3000934ce92985a>:0 
  at Mono.CSharp.Tokenizer.xtoken () [0x00b1c] in 
<5ee4ea6b36fa4cf3b3000934ce92985a>:0 
  at Mono.CSharp.Tokenizer.token () [0x0] in 
<5ee4ea6b36fa4cf3b3000934ce92985a>:0 
  at Mono.CSharp.CSharpParser.yyparse (Mono.CSharp.yyParser.yyInput yyLex) 
[0x0010f] in <5ee4ea6b36fa4cf3b3000934ce92985a>:0 
  at Mono.CSharp.CSharpParser.parse () [0x0002e] in 
<5ee4ea6b36fa4cf3b3000934ce92985a>:0 
csharp-files/Parameter.cs(126,3): error CS0589: Internal compiler error during 
parsingSystem.ArgumentOutOfRangeException: Length cannot be less than zero.
Parameter name: length
  at System.String.Substring (System.Int32 startIndex, System.Int32 length) 
[0x0003a] in :0 
  at System.String.SplitKeepEmptyEntries (System.ReadOnlySpan`1[T] sepList, 
System.ReadOnlySpan`1[T] lengthList, System.Int32 defaultLength, System.Int32 
count) [0x00049] in :0 
  at System.String.SplitInternal (System.ReadOnlySpan`1[T] separators, 
System.Int32 count, System.StringSplitOptions options) [0x000d1] in 
:0 
  at System.String.Split (System.Char separator, System.StringSplitOptions 
options) [0x9] in :0 
  at Mono.CSharp.Tokenizer.update_formatted_doc_comment (System.Int32 
current_comment_start) [0x0002a] in <5ee4ea6b36fa4cf3b3000934ce92985a>:0 
  at Mono.CSharp.Tokenizer.xtoken () [0x00b1c] in 
<5ee4ea6b36fa4cf3b3000934ce92985a>:0 
  at Mono.CSharp.Tokenizer.token () [0x0] in 
<5ee4ea6b36fa4cf3b3000934ce92985a>:0 
  at Mono.CSharp.CSharpParser.yyparse (Mono.CSharp.yyParser.yyInput yyLex) 
[0x0010f] in <5ee4ea6b36fa4cf3b3000934ce92985a>:0 
  at Mono.CSharp.CSharpParser.parse () [0x0002e] in 
<5ee4ea6b36fa4cf3b3000934ce92985a>:0 
csharp-files/SBMLDocument.cs(1221,5): error CS0589: Internal compiler error 
during parsingSystem.ArgumentOutOfRangeException: Length cannot be less than 
zero.
Parameter name: length
  at 

Bug#926935: tagging 926935

2019-04-17 Thread Santiago Vila
I said:
[ lots of things ]

Ok, sorry, I didn't want to sound confrontational. Just FYI: The
reason this issue makes me to be upset is the discussion that took
place here:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907829

[ Since you applied buster-ignore here, you might want to apply
  buster-ignore to such bug as well instead of downgrading as Adrian
  did. In fact, maybe it would be good news to have it serious and
  buster-ignore ].

Thanks.



Bug#927295: marked as done (depends on non-available version of grub-common)

2019-04-17 Thread Debian Bug Tracking System
Your message dated Wed, 17 Apr 2019 18:53:39 +0100
with message-id <20190417175339.dhdyjewgpxbdr...@riva.ucam.org>
and subject line Re: Bug#927295: depends on non-available version of grub-common
has caused the Debian Bug report #927295,
regarding depends on non-available version of grub-common
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
927295: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927295
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: grub-efi-amd64-bin
Version: 1+2.02+dfsg1+16
Severity: serious

grub-efi-amd64-bin depends on grub-common_2.02+dfsg1-16 but only
grub-common_2.02+dfsg1-17 is available in the archive.

Regards,
Michael

-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (200, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages grub-efi-amd64-signed depends on:
ii  grub-common  2.02+dfsg1-16

Versions of packages grub-efi-amd64-signed recommends:
pn  shim-signed  

grub-efi-amd64-signed suggests no packages.

Versions of packages grub-efi-amd64-bin depends on:
ii  grub-common  2.02+dfsg1-16

grub-efi-amd64-bin recommends no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---
On Wed, Apr 17, 2019 at 04:25:55PM +0200, Michael Biebl wrote:
> Package: grub-efi-amd64-bin
> Version: 1+2.02+dfsg1+16

That's a version of grub-efi-amd64-signed, not grub-efi-amd64-bin.

> grub-efi-amd64-bin depends on grub-common_2.02+dfsg1-16 but only
> grub-common_2.02+dfsg1-17 is available in the archive.

grub-efi-amd64-signed is a separate source package.  Its builds will
catch up; and the point of the strict dependency is to make sure they
stay in sync in testing, so we don't need an RC bug to avoid that.

  https://buildd.debian.org/status/package.php?pkg=grub-efi-amd64-signed

Thanks,

-- 
Colin Watson   [cjwat...@debian.org]--- End Message ---


Processed: retitle 905772 to virtlogd dependency loop causing upgrade failures

2019-04-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> retitle 905772 virtlogd dependency loop causing upgrade failures
Bug #905772 [libvirt] virtlogd dependency loop causing upgrade failures
Ignoring request to change the title of bug#905772 to the same title
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
905772: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905772
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: retitle 905772 to virtlogd dependency loop causing upgrade failures

2019-04-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> retitle 905772 virtlogd dependency loop causing upgrade failures
Bug #905772 [libvirt] virtlogd dependency loop cuaing upgrade failures
Changed Bug title to 'virtlogd dependency loop causing upgrade failures' from 
'virtlogd dependency loop cuaing upgrade failures'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
905772: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905772
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#926935: tagging 926935

2019-04-17 Thread Santiago Vila
Hi. I forgot: The fact that you decided to use buster-ignore here
means that it's still ok to use "serious" for these kind of bugs?

Thanks.



Bug#926935: tagging 926935

2019-04-17 Thread Santiago Vila
On Sat, 13 Apr 2019, Ivo De Decker wrote:

> # buildds have at least 2 CPU cores

However, this is still a FTBFS bug in a release architecture (amd64).

We are a free software distribution. We don't agree that the end user
*must* be able to rebuild the package?

For the record: I can build 99.99% of Debian with a single CPU, and
only a handful of packages FTBFS with a single CPU. Not 10 and not
100, only a handful. Since VPS providers have small machines where
building packages is still cheaper, there is no clear benefit in
"deprecating" building in single-CPU machines.

So: Could I know please when exactly this started not to be RC, if
that's the case? Please state exact date and how many bugs had to be
downgraded after the decision was made (AFAIK, this has never happened).

Thanks.



Bug#926872: evolution: Spaces in mail view disappeared with recent updates

2019-04-17 Thread Boyuan Yang
在 2019-04-17三的 10:55 +,Niels Thykier写道:
> Control: tags -1 moreinfo unreproducible
> 
> Hi Boyuan Yang,
> 
> Dominique provided the following message to your bug.  However, I am
> sure if you have seen it (you were not listed as an explicit CC and the
> BTS does not CC submitters by default).
> 
> On Wed, 17 Apr 2019 10:06:22 +0200 Dominique Dumont  wrote:
> > On Thu, 11 Apr 2019 11:22:46 -0400 Boyuan Yang  wrote:
> > > A screenshot is provided with the email here. I'm not sure if it can be
> > > reproduced by you, but at least this issues appears on all my machines
> > > running Debian Sid.
> > 
> > I'm using evolution 3.30.5-1 and cannot reproduce this bug.
> > 
> > Could you check that the mail source does contain the missing white spaces
> > ?
> > 
> > Could you reproduce this bug with different font settings ?

I found that this will happen when I set the default font to be Noto Sans CJK
SC with arbitary font weight. By resetting the font to default, the email
viewer would recover back to normal however the composer is always missing
spaces no matter how I set up the fonts.

It's really a headache if this issue is related to fonts. I'm sending mail
copy to debian-fonts list to see if anyone could help.

--
Thanks,
Boyuan Yang



Bug#926737: marked as done (Possible memory leak after upgrading from 16.1.1 to 16.2.1)

2019-04-17 Thread Debian Bug Tracking System
Your message dated Wed, 17 Apr 2019 18:44:22 +0200
with message-id <55b1659a-ab89-b49b-9a83-178a9ed15...@debian.org>
and subject line Re: Bug#926737: Possible memory leak after upgrading from 
16.1.1 to 16.2.1
has caused the Debian Bug report #926737,
regarding Possible memory leak after upgrading from 16.1.1 to 16.2.1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
926737: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926737
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: asterisk
Version: 1:16.2.1~dfsg-1
Severity: serious

Hi,

I intend to look at this myself, but I'm short on time right now. Filing this
bug so I don't forget (and maybe someone else can look at it).

After having upgraded one of my test systems from 16.1.1 to 16.2.1 shows the
Asterisk process being constantly growing until the machine finally runs out of
memory.

2019-04-04 16:55:33 upgrade asterisk:amd64 1:16.1.1~dfsg-1 1:16.2.1~dfsg-1

This was a dist-upgrade in a sid container, so it might be something else
triggering it, but it is definitely the Asterisk process leaking memory.

asterisk 10485  0.3 26.8 964940 271656 ?   Ssl  Apr08   5:23 
/usr/sbin/asterisk -g -f -p -U asterisk

Directly after a fresh restart

asterisk 11171 15.8  8.0 759704 80928 ?Ssl  19:45   0:03 
/usr/sbin/asterisk -g -f -p -U asterisk

I'll do some more tests and will followup on this bug.

Bernhard
--- End Message ---
--- Begin Message ---
I cannot reproduce this anymore.

I have identified two misconfigurations that might have lead to this, as
chan_pjsip is known to leak memory in some error handling paths.

a) I have a buster container without network namespace on a Stretch
host. Asterisk is installed on both. Due to a local misconfiguration the
stretch host instance was started as well and the containerized Asterisk
could not bind to the source port, permanently logging

[2019-04-17 16:41:00] ERROR[14824] res_pjsip.c: Unable to retrieve PJSIP
transport 'transport-udp'

b) At the same time a libssl1.1 update overwrote (with my consent of
course) /etc/ssl/openssl.cnf with the default SECLEVEL=2. I have two
upstream peers that run a too small dh key, making Asterisk log

SSL SSL_ERROR_SSL (Handshake): Level: 0 err: <337260938>  len: 0

every 30 seconds.

However, I have reinstated both errors and could not get Asterisk to
leak any memory. Hence I'm closing this for now.--- End Message ---


Bug#909750: applications tries to write to /usr/* directories via libfontconfig1

2019-04-17 Thread Chris Hofstaedtler
* Niels Thykier  [190413 18:28]:
> Vincas Dargis:
> > On 2019-04-13 12:50, Niels Thykier wrote:
> >> What is the status of this bug? AFAICT, we have *some* fixes from
> >> upstream but Chris's mail implies that the bug is not completely fixed.
> > 
> > This bug disappeared from my logs long time ago, at least haven't seen
> > any application reproducing it so far.
> 
> Interestingly, Chris (just Cc'ed) claims to have reproduced it about a
> week ago with libfontconfig1:amd64 using strace and to my knowledge
> libfontconfig1 hasn't changed for months in sid/buster.
> 
> @Chris: Just to confirm: Do you still see the issue?

I've given this another try, and can hopefully shed some light:

In a local X session with fluxbox, I don't see the EACCESS in
strace.

In an ssh session with X11 forwarding to an XQuartz server, I still
get the EACCESS.

Couldn't try with a remote Xorg server though, maybe someone else
can verify this.

Chris



Processed: affects 927245

2019-04-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> affects 927245 - jtb
Bug #927245 [src:caveconverter] caveconverter: obsolete d/javabuild points to 
non-existant directory
Removed indication that 927245 affects jtb
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
927245: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927245
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#927243: marked as done (jtb: Obsolete and unused jh_build + d/javabuild references non-existant dir causing FTBFS)

2019-04-17 Thread Debian Bug Tracking System
Your message dated Wed, 17 Apr 2019 14:33:50 +
with message-id 
and subject line Bug#927243: fixed in jtb 1.4.12-2
has caused the Debian Bug report #927243,
regarding jtb: Obsolete and unused jh_build + d/javabuild references 
non-existant dir causing FTBFS
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
927243: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927243
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:jtb
Version: 1.4.12-1.1
Severity: serious
Tags: ftbfs

Dear maintainer:

I tried to build this package in buster but it failed:


[...]
 debian/rules build-indep
dh build-indep --with javahelper
   dh_update_autotools_config -i
   dh_auto_configure -i
   jh_linkjars -i
   dh_auto_build -i
ant -Duser.name debian
Buildfile: /<>/build.xml

echo_jtb_props:
 [echo] jtb_proj_dir=/<>
 [echo] jtb_last_version=1.4.11
 [echo] jtb_curr_version=1.4.12
 [echo] jtb_bs_jar=/<>/lib/jtb132.jar
 [echo] jtblv=/<>/lib/jtb-1.4.11.jar
 [echo] jtb_last_jar=/<>/lib/jtb-1.4.11.jar
 [echo] jtb_new_jar=/<>/lib/new_jtb-1.4.12.jar
 [echo] jtb_prev_jar=/<>/lib/jtb-1.4.12.jar
 [echo] jtb_ok_jar=/<>/lib/jtb-1.4.12.jar

echo_javacc_props:
 [echo] 
javacc_imp_dir=/usr/share/maven-repo/net/java/dev/javacc/javacc/debian
 [echo] 
javacc_ok_jar=/usr/share/maven-repo/net/java/dev/javacc/javacc/debian/javacc-debian.jar
 [echo] javacc_main=org.javacc.parser.Main

echo_all_props:

clean_javacc_gen_files:

clean_jtb_gen_files:

clean_all_gen_files:

process_jtbgram.jtb:
 [java] JTB version 1.4.12
 [java] JTB:  Reading jtb input file 
/<>/src/EDU/purdue/jtb/jtbgram.jtb...
 [java] JTB:  jtb input file parsed successfully.
 [java] JTB:  jj output file 
"/<>/src/EDU/purdue/jtb/jtb.out.jj" generated.
 [java] JTB:  base node class files generated into directory 
"/<>/src/EDU/purdue/jtb/syntaxtree".
 [java] JTB:  134 syntax tree node class files generated into directory 
"/<>/src/EDU/purdue/jtb/syntaxtree".
 [java] 
 [java] JTB:  Visitor interface "IRetArguVisitor.java" generated into 
directory "/<>/src/EDU/purdue/jtb/visitor".
 [java] JTB:  Visitor interface "IVoidVisitor.java" generated into 
directory "/<>/src/EDU/purdue/jtb/visitor".
 [java] JTB:  Visitor interface "IRetVisitor.java" generated into directory 
"/<>/src/EDU/purdue/jtb/visitor".
 [java] JTB:  Visitor interface "IVoidArguVisitor.java" generated into 
directory "/<>/src/EDU/purdue/jtb/visitor".
 [java] JTB:  Visitor class "DepthFirstRetArguVisitor.java" generated into 
directory "/<>/src/EDU/purdue/jtb/visitor".
 [java] JTB:  Visitor class "DepthFirstRetVisitor.java" generated into 
directory "/<>/src/EDU/purdue/jtb/visitor".
 [java] JTB:  Visitor class "DepthFirstVoidArguVisitor.java" generated into 
directory "/<>/src/EDU/purdue/jtb/visitor".
 [java] JTB:  Visitor class "DepthFirstVoidVisitor.java" generated into 
directory "/<>/src/EDU/purdue/jtb/visitor".
 [java] 

process_jtb.out.jj:
 [java] Java Compiler Compiler Version 5.0 (Parser Generator)
 [java] (type "javacc" with no arguments for help)
 [java] Reading from file /<>/src/EDU/purdue/jtb/jtb.out.jj . 
. .
 [java] Warning: Line 119, Column 1: Command line setting of 
"OUTPUT_DIRECTORY" modifies option value in file.
 [java] File "TokenMgrError.java" does not exist.  Will create one.
 [java] File "ParseException.java" does not exist.  Will create one.
 [java] File "Token.java" does not exist.  Will create one.
 [java] File "JavaCharStream.java" does not exist.  Will create one.
 [java] Parser generated with 0 errors and 1 warnings.

copy_specific_token_for_jtb:
 [copy] Copying 1 file to /<>/src/EDU/purdue/jtb/parser

generate_all:

generate_all+compile_java:

compile_java:
[javac] Compiling 234 source files to /<>/bin
[javac] warning: [options] bootstrap class path not set in conjunction with 
-source 7
[javac] Note: Some input files use or override a deprecated API.
[javac] Note: Recompile with -Xlint:deprecation for details.
[javac] 1 warning

build_new_jtb_jar:

check_jtb_jar:

make_new_jtb_jar:
  [jar] Building jar: /<>/lib/new_jtb-1.4.12.jar

test_process_jtbgram.jtb:
 [java] JTB version 1.4.12
 [java] JTB:  Reading jtb input file 
/<>/src/EDU/purdue/jtb/jtbgram.jtb...
 [java] java.lang.NullPointerException
 [java] at 
EDU.purdue.jtb.parser.JTBToolkit.makeNodeToken(JTBParser.java:12271)
 [java] 

Bug#926885: marked as done (lighttpd: CVE-2019-11072)

2019-04-17 Thread Debian Bug Tracking System
Your message dated Wed, 17 Apr 2019 14:33:59 +
with message-id 
and subject line Bug#926885: fixed in lighttpd 1.4.53-4
has caused the Debian Bug report #926885,
regarding lighttpd: CVE-2019-11072
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
926885: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926885
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: lighttpd
Version: 1.4.53-3
Severity: grave
Tags: security upstream
Forwarded: https://redmine.lighttpd.net/issues/2945

Hi,

The following vulnerability was published for lighttpd.

CVE-2019-11072[0]:
| lighttpd before 1.4.54 has a signed integer overflow, which might
| allow remote attackers to cause a denial of service (application
| crash) or possibly have unspecified other impact via a malicious HTTP
| GET request, as demonstrated by mishandling of /%2F? in
| burl_normalize_2F_to_slash_fix in burl.c.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-11072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11072
[1] https://redmine.lighttpd.net/issues/2945
[2] 
https://github.com/lighttpd/lighttpd1.4/commit/32120d5b8b3203fc21ccb9eafb0eaf824bb59354

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: lighttpd
Source-Version: 1.4.53-4

We believe that the bug you reported is fixed in the latest version of
lighttpd, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 926...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Glenn Strauss  (supplier of updated lighttpd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 13 Apr 2019 00:00:00 -0400
Source: lighttpd
Architecture: source
Version: 1.4.53-4
Distribution: unstable
Urgency: high
Maintainer: Debian QA Group 
Changed-By: Glenn Strauss 
Closes: 926885
Changes:
 lighttpd (1.4.53-4) unstable; urgency=high
 .
   * QA upload.
   * fix mixed use of srv->split_vals array (regression)
   * mod_magnet:fix invalid script return-type crash
   * fix assertion with server.error-handler
   * mod_wstunnel:fix wstunnel.ping-interval for big-endian architectures
   * fix abort in server.http-parseopts with url-path-2f-decode enabled
 CVE-2019-11072 (closes: #926885)
Checksums-Sha1:
 b609f87fcac5281e0dea93b72ba74b9db2fe0a24 3879 lighttpd_1.4.53-4.dsc
 b79ba0fa89ad031f0fe979a2bd6d0667390459b7 44060 lighttpd_1.4.53-4.debian.tar.xz
 5b34212f522882d440645fc8636cd8d68265e282 16638 
lighttpd_1.4.53-4_amd64.buildinfo
Checksums-Sha256:
 d496e9a6879a70451402d8a19f0396e781dc00fc902c9bf0b567c6c8b6b63257 3879 
lighttpd_1.4.53-4.dsc
 b11b1ff4831671cc67da207009d5cb9dac71fea5b17ac10144a980cb5903dcc4 44060 
lighttpd_1.4.53-4.debian.tar.xz
 c70fdd421bf1240ca925390e01c9cd14a4c121dfab3d4c6a215175fabdcb1eb0 16638 
lighttpd_1.4.53-4_amd64.buildinfo
Files:
 f0d901e9c6b3d9ab91179b4d54567aa4 3879 httpd optional lighttpd_1.4.53-4.dsc
 f0b909359a42999d57044af80513cc39 44060 httpd optional 
lighttpd_1.4.53-4.debian.tar.xz
 ebed16c45ec61b788fb19f1696944831 16638 httpd optional 
lighttpd_1.4.53-4_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=ZGri
-END PGP SIGNATURE End Message ---


Bug#927295: depends on non-available version of grub-common

2019-04-17 Thread Michael Biebl
Package: grub-efi-amd64-bin
Version: 1+2.02+dfsg1+16
Severity: serious

grub-efi-amd64-bin depends on grub-common_2.02+dfsg1-16 but only
grub-common_2.02+dfsg1-17 is available in the archive.

Regards,
Michael

-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (200, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages grub-efi-amd64-signed depends on:
ii  grub-common  2.02+dfsg1-16

Versions of packages grub-efi-amd64-signed recommends:
pn  shim-signed  

grub-efi-amd64-signed suggests no packages.

Versions of packages grub-efi-amd64-bin depends on:
ii  grub-common  2.02+dfsg1-16

grub-efi-amd64-bin recommends no packages.

-- no debconf information



Bug#927292: libqb: Breaks applications not running as root (for example pacemaker-based AKA cib)

2019-04-17 Thread Ferenc Wágner
Source: libqb
Version: 1.0.4-1
Severity: grave
Tags: upstream
Justification: renders package unusable

Forwarded: https://github.com/ClusterLabs/libqb/issues/338

IPC connection setup is aborted if the application is unable to chown()
the temporary communication directory under /dev/shm to the credentials
of the client.  This can happen if the application isn't running as
root, but isn't necessarily fatal if the client has appropriate privileges.



Bug#927142: cyrus-imapd: Cyrus 3 segfaults when attempting to deliver mail via lmtp

2019-04-17 Thread Kim-Alexander Brodowski

Hello,

once again a small update:

1) I was able to trace our vacation issues to a problem on our end. This 
won't be relevant to Debian.


2) The squatter issue I referred to earlier is odd and reproducible, but 
probably an upstream issue:


busternt.kim.mein-iserv.de ~ # /usr/sbin/cyrus squatter -u kim.brodowski
cyrus/squatter[17830]: indexing mailboxes
cyrus/squatter[17830]: indexing mailbox user/kim.brodowski...
cyrus/squatter[17830]: indexing mailbox user/kim.brodowski/Drafts...
cyrus/squatter[17830]: indexing mailbox user/kim.brodowski/Junk...
cyrus/squatter[17830]: indexing mailbox user/kim.brodowski/Sent...
cyrus/squatter[17830]: indexing mailbox user/kim.brodowski/Trash...
cyrus/squatter[17830]: done indexing mailboxes
busternt.kim.mein-iserv.de ~ # /usr/sbin/cyrus squatter 
user/kim.brodowski/Sent

cyrus/squatter[19346]: indexing mailboxes
cyrus/squatter[19346]: indexing mailbox user/kim.brodowski/Sent...
cyrus/squatter[19346]: done indexing mailboxes
busternt.kim.mein-iserv.de ~ # /usr/sbin/cyrus squatter user/kim^brodowski
fatal error: Internal error: assertion failed: lib/cyrusdb_twoskip.c: 
2339: keylen


Compared to Stretch:

stable.iserv.eu /etc # /usr/sbin/cyrus squatter user/kim.brodowski -v
Indexing mailbox user/kim.brodowski... Indexed 401 messages (7007950 
bytes) into 942379 index bytes in 0 seconds

stable.iserv.eu /etc # /usr/sbin/cyrus squatter user/kim^brodowski -v
Indexing mailbox user/kim.brodowski... Indexed 401 messages (7007950 
bytes) into 942379 index bytes in 0 seconds


Depending on how squatter is called it'll crash. This is relevant to us 
because of a different bug that'll cause squatter to fail creating it's 
index on i386 systems when user mailboxes are too big and the squat file 
exceeds 2 147 483 647 bytes. As a workaround - so that at the very least 
some folders can be searched - we call squatter for each folder 
individually. Since there is a workaround by replacing the ^ character 
with the . character in squatter calls this isn't a major issue right now.


--
Kind regards,
Kim-Alexander Brodowski

IServ GmbH
Bültenweg 73
38106 Braunschweig

Telefon:   +49 531 22 43 666-0
Mobil: +49 152 55 17 55 16
Fax:   +49 531 22 43 666-9
E-Mail:kim.brodow...@iserv.eu
Internet:  https://iserv.eu

USt-IdNr. DE265149425 | Amtsgericht Braunschweig | HRB 201822
Geschäftsführer: Benjamin Heindl, Martin Hüppe, Jörg Ludwig



Bug#925546: How to reproduce?

2019-04-17 Thread Joonas Kylmälä
Hi,

Hilko Bengen:
> I can get rid of the issues by backporting a number of commits from
> github.com/nsf/gocode and will submnit an updated package for
> stretch-proposed-updates.

Thanks for investigating.

> Are you able to build .deb packages from source or should I provide a
> binary package for you to test?

I can build from source.

Joonas



Bug#818366: synaptic: fails to start under Wayland

2019-04-17 Thread Sebastien CHAVAUX

Great thank you


Bug#926928: fetchmail: Server CommonName mismatch

2019-04-17 Thread BERTRAND Joël
Thanks for your answer.

I have replaced pop.nerim.fr by pop.nerim.net and it works as expected.
This configuration worked fine with pop.nerim.fr for a very long time
until last upgrade of feetchmail.

Best regards,

JB



Processed: Re: Bug#926215: dune-pdelab: FTBFS with gcc 8.3

2019-04-17 Thread Debian Bug Tracking System
Processing control commands:

> reassign -1 src:dune-pdelab 2.6~20180302-1
Bug #926215 [src:dune-istl] dune-pdelab: FTBFS with gcc 8.3
Bug reassigned from package 'src:dune-istl' to 'src:dune-pdelab'.
No longer marked as found in versions dune-istl/2.6.0-2.
Ignoring request to alter fixed versions of bug #926215 to the same values 
previously set
Bug #926215 [src:dune-pdelab] dune-pdelab: FTBFS with gcc 8.3
Marked as found in versions dune-pdelab/2.6~20180302-1.
> retitle -1 dune-pdelab: testpk fails with assertion failure
Bug #926215 [src:dune-pdelab] dune-pdelab: FTBFS with gcc 8.3
Changed Bug title to 'dune-pdelab: testpk fails with assertion failure' from 
'dune-pdelab: FTBFS with gcc 8.3'.

-- 
926215: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926215
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#926215: dune-pdelab: FTBFS with gcc 8.3

2019-04-17 Thread Ansgar Burchardt
Control: reassign -1 src:dune-pdelab 2.6~20180302-1
Control: retitle -1 dune-pdelab: testpk fails with assertion failure

On Mon, 2019-04-08 at 08:42 +0200, Ansgar Burchardt wrote:
> This is a bug in dune-istl, though I'm not quite sure I understand
> what
> is exactly wrong.  Renaming the template argument from `T` to `T1` in
> the definition of `prolongateVector` makes the problem go away, but the
> name of template arguments shouldn't really matter?
> 
> There is also a template argument `T` in the generic version of the
> `Transfer` class...  Maybe that results in the confusion in some way?

That problem went away with a GCC update, but there is still a problem
with a test in dune-pdelab that now fails...  Not sure yet if the
problem is in dune-grid or dune-pdelab for that one, reassigning to
dune-pdelab for now:

+---
| check_mesh: checking mesh 'DUNE AlbertaGrid'
| checking done; no error detected
| AlbertaGrid< 2, 2 > created from macro grid file 
'/<>/dune/pdelab/test/grids/ldomain.al'.
| GridParameterBlock: Parameter 'refinementedge' not specified, defaulting to 
'ARBITRARY'.
| testpk: 
/build/dune-grid-yp9bpw/dune-grid-2.6.0/dune/grid/albertagrid/elementinfo.hh:488:
 bool Dune::Alberta::ElementInfo::isLeaf() const [with int dim = 2]: 
Assertion `!(*this) == false' failed.
+---

Ansgar



Bug#925546: How to reproduce?

2019-04-17 Thread Hilko Bengen
Joonas,

I can get rid of the issues by backporting a number of commits from
github.com/nsf/gocode and will submnit an updated package for
stretch-proposed-updates.

Are you able to build .deb packages from source or should I provide a
binary package for you to test?

Cheers,
-Hilko



Processed: Re: evolution: Spaces in mail view disappeared with recent updates

2019-04-17 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 moreinfo unreproducible
Bug #926872 [evolution] evolution: Spaces in mail view disappeared with recent 
updates
Added tag(s) moreinfo and unreproducible.

-- 
926872: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926872
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#926872: evolution: Spaces in mail view disappeared with recent updates

2019-04-17 Thread Niels Thykier
Control: tags -1 moreinfo unreproducible

Hi Boyuan Yang,

Dominique provided the following message to your bug.  However, I am
sure if you have seen it (you were not listed as an explicit CC and the
BTS does not CC submitters by default).

On Wed, 17 Apr 2019 10:06:22 +0200 Dominique Dumont  wrote:
> On Thu, 11 Apr 2019 11:22:46 -0400 Boyuan Yang  wrote:
> > A screenshot is provided with the email here. I'm not sure if it can be
> > reproduced by you, but at least this issues appears on all my machines
> > running Debian Sid.
> 
> I'm using evolution 3.30.5-1 and cannot reproduce this bug.
> 
> Could you check that the mail source does contain the missing white spaces ?
> 
> Could you reproduce this bug with different font settings ?
> 
> All the best
> 
> 

Thanks,
~Niels



Processed: Re: Bug#927142: cyrus-imapd: Cyrus 3 segfaults when attempting to deliver mail via lmtp

2019-04-17 Thread Debian Bug Tracking System
Processing control commands:

> severity -1 serious
Bug #927142 [cyrus-imapd] cyrus-imapd: Cyrus 3 segfaults when attempting to 
deliver mail via lmtp
Severity set to 'serious' from 'important'

-- 
927142: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927142
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: reassign 927243 to src:jtb ...

2019-04-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 927243 src:jtb
Bug #927243 [javahelper] jh_build: Regression in handling directories in 
d/javabuild
Bug reassigned from package 'javahelper' to 'src:jtb'.
Ignoring request to alter found versions of bug #927243 to the same values 
previously set
Ignoring request to alter fixed versions of bug #927243 to the same values 
previously set
> retitle 927243 jtb: Obsolete and unused jh_build + d/javabuild references 
> non-existant dir causing FTBFS
Bug #927243 [src:jtb] jh_build: Regression in handling directories in 
d/javabuild
Changed Bug title to 'jtb: Obsolete and unused jh_build + d/javabuild 
references non-existant dir causing FTBFS' from 'jh_build: Regression in 
handling directories in d/javabuild'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
927243: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927243
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#925483: tilda: does not start (segfault) (under Wayland)

2019-04-17 Thread Vlad Orlov
Hi,

Upstream has a workaround for this crash at [1], you might want to use it as a 
patch.
Also this report can be probably merged with [2].


[1] 
https://github.com/lanoxx/tilda/commit/daa64f579b4d544cb7da614612f1d35c461b43be
[2] https://bugs.debian.org/904309

Processed: unmerging 927245, reassign 927245 to src:caveconverter ...

2019-04-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> unmerge 927245
Bug #927245 [javahelper] caveconverter: FTBFS (jh_build: Cannot find 
"caveconverter")
Bug #927243 [javahelper] jh_build: Regression in handling directories in 
d/javabuild
Disconnected #927245 from all other report(s).
> reassign 927245 src:caveconverter
Bug #927245 [javahelper] caveconverter: FTBFS (jh_build: Cannot find 
"caveconverter")
Bug reassigned from package 'javahelper' to 'src:caveconverter'.
Ignoring request to alter found versions of bug #927245 to the same values 
previously set
Ignoring request to alter fixed versions of bug #927245 to the same values 
previously set
> retitle 927245 caveconverter: obsolete d/javabuild points to non-existant 
> directory
Bug #927245 [src:caveconverter] caveconverter: FTBFS (jh_build: Cannot find 
"caveconverter")
Changed Bug title to 'caveconverter: obsolete d/javabuild points to 
non-existant directory' from 'caveconverter: FTBFS (jh_build: Cannot find 
"caveconverter")'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
927243: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927243
927245: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927245
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#927275: gnome-shell - Intel GPU - monitors.xml is ignored and settings are not applied after suspend/reboot

2019-04-17 Thread -
Package: gnome-shell
Version: 3.30.2-3
Severity: serious

Device: Thinkpad L390

Debian Version: Buster with latest updates

After a fresh install, arranging all monitors in gnome-settings and
saving the changes the setup works on both sides (office and home) with
two same dockingstations (Thinkpad Thunderbolt 3 Dock Gen 2) and
different monitor settings at each side. All monitors are placed
correctly and the internal screen is off, as it was defined in gnome
settings before, see attached monitors.xml

But after disconnecting the dockingstation, suspend the laptop and
change the location, wake it up and connecting to the other dock, the
settings are not applied again, just the default display arrangement
(all three in one row, from left to right). Even a reboot, or another
suspend while beeing connected to the dockingstation is not solving it.
There is no way to get the correct saved options applied again which
have been working before.

It seems gnome-shell is not reading in the monitors.xml where the
correct settings are applied and stored for each side after a suspend
or even a reboot.

Any idea what is causing this issue and what could be a workaround for
now to trigger a manual reading of the monitors.xml so that it can be
applied manually as a temporary fix?

best regards

Christian Höffer



monitors.xml
Description: XML document


Bug#927244: marked as done (mina: FTBFS (Unknown option: source 1.7 -target 1.7))

2019-04-17 Thread Debian Bug Tracking System
Your message dated Wed, 17 Apr 2019 08:34:24 +
with message-id 
and subject line Bug#927244: fixed in mina 1.1.7.dfsg-13
has caused the Debian Bug report #927244,
regarding mina: FTBFS (Unknown option: source 1.7 -target 1.7)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
927244: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927244
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:mina
Version: 1.1.7.dfsg-12
Severity: serious
Tags: ftbfs

Dear maintainer:

I tried to build this package in buster but it failed:


[...]
 debian/rules build-indep
dh build-indep --with javahelper
   dh_update_autotools_config -i
   dh_autoreconf -i
   jh_linkjars -i
   debian/rules override_dh_auto_build
make[1]: Entering directory '/<>'
# Build the packages
( CLASSPATH=/usr/share/java/slf4j-api.jar jh_build -J -o"-source 1.7 -target 
1.7" mina-core.jar core/src/main/java/  )
Unknown option: source 1.7 -target 1.7
jh_build: unknown option or error during option parsing; aborting
make[1]: *** [debian/rules:43: override_dh_auto_build] Error 25
make[1]: Leaving directory '/<>'
make: *** [debian/rules:39: build-indep] Error 2
dpkg-buildpackage: error: debian/rules build-indep subprocess returned exit 
status 2


The build was made in my autobuilder with "dpkg-buildpackage -A"
and it also fails here:

https://tests.reproducible-builds.org/debian/rb-pkg/unstable/amd64/mina.html

If this is really a bug in one of the build-depends, please use reassign and 
affects,
so that this is still visible in the BTS web page for this package.

Thanks.
--- End Message ---
--- Begin Message ---
Source: mina
Source-Version: 1.1.7.dfsg-13

We believe that the bug you reported is fixed in the latest version of
mina, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 927...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Emmanuel Bourg  (supplier of updated mina package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 17 Apr 2019 09:56:32 +0200
Source: mina
Architecture: source
Version: 1.1.7.dfsg-13
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers 

Changed-By: Emmanuel Bourg 
Closes: 889352 927244
Changes:
 mina (1.1.7.dfsg-13) unstable; urgency=medium
 .
   * Team upload.
   * Fixed the build failure with javahelper 0.72 (Closes: #927244)
   * Removed Damien Raude-Morvan from the uploaders (Closes: #889352)
   * Use salsa.debian.org Vcs-* URLs
Checksums-Sha1:
 cfac90082116ecd1d03c702f9f8731edb2b3354e 2097 mina_1.1.7.dfsg-13.dsc
 b5f040988bc2d24e17167478d0d477c67c4dec52 4764 mina_1.1.7.dfsg-13.debian.tar.xz
 2f1f7ff0c2ee839ec2cabc4eaba84641db23a051 12847 
mina_1.1.7.dfsg-13_source.buildinfo
Checksums-Sha256:
 3962d4cf018e7ff6a3bc5f27efa5563cff1c32f7ebc96d6034972234976ff4dd 2097 
mina_1.1.7.dfsg-13.dsc
 4468c73d39ac6bcc5fdc968b8bf698b0cfda5ebe9af4935fac5eeb7a44a91b00 4764 
mina_1.1.7.dfsg-13.debian.tar.xz
 770edabb1154825e2a589e47af32efd8bd8e66913fd0461a0c86e02e31ad5a4f 12847 
mina_1.1.7.dfsg-13_source.buildinfo
Files:
 2039d44f51175265ae8f776eb39fbd83 2097 java optional mina_1.1.7.dfsg-13.dsc
 ddad1d51b29d5f1f76515eb79f42ff5c 4764 java optional 
mina_1.1.7.dfsg-13.debian.tar.xz
 1aafd238837e1c6bd2cd5b13b6203c96 12847 java optional 
mina_1.1.7.dfsg-13_source.buildinfo

-BEGIN PGP SIGNATURE-

iQJGBAEBCgAwFiEEuM5N4hCA3PkD4WxA9RPEGeS50KwFAly23OYSHGVib3VyZ0Bh
cGFjaGUub3JnAAoJEPUTxBnkudCsg0gQAJIiwQy6mo6GsNd6UMbb2CGJmbA/fetf
vTWb3cVO7D/CPBtLk8xzluOc4NoSrTlz3HIuu8hwK+bVkPHaydKyzHyS9cTCm2f8
jlRGu1dYGK4DyhhYYsnt/sUlWhuR8KoRr5DZ4mdeKuSSidD698xNCSY9znZjNnWX
qNyxvbJwGGB5qIiD5NSDbQpX91z+7WF2yBXt3yr2hyJ0mDBpEXaB2aINJhG08/hp
LUy797NCfNdBKma2fHgjqeSsBZPvrFPiq235ibHdCRIdYuDfg+Ng2qD9yk1xlVfz
NKnGIk3IgqaFep9HVQXSaGfcinFCg3i+5NDZ/MosydtGQTyWisos1L0hR5h7D49W
OZmgG6tcUzWICFb04qT4zry3O1JZHwHHyQFq1CoFp807KjHmSbrGLdCptyFZuPzy
FCZzDE/+7Rh8h7C9dQtq4mYoCKs+Lshg7ooVuSMKjEivB8ITJNszyMmeTh+FexQY
5TOQqVg3JdTF7Lxi5W817f8qehbsPRhVAErzABXFBkXfmsn3z3+LE566BFC6WlLl

Bug#926872: evolution: Spaces in mail view disappeared with recent updates

2019-04-17 Thread Dominique Dumont
On Thu, 11 Apr 2019 11:22:46 -0400 Boyuan Yang  wrote:
> A screenshot is provided with the email here. I'm not sure if it can be
> reproduced by you, but at least this issues appears on all my machines
> running Debian Sid.

I'm using evolution 3.30.5-1 and cannot reproduce this bug.

Could you check that the mail source does contain the missing white spaces ?

Could you reproduce this bug with different font settings ?

All the best



Processed: Bug #927244 in mina marked as pending

2019-04-17 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 pending
Bug #927244 [src:mina] mina: FTBFS (Unknown option: source 1.7 -target 1.7)
Added tag(s) pending.

-- 
927244: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927244
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#927244: Bug #927244 in mina marked as pending

2019-04-17 Thread Emmanuel Bourg
Control: tag -1 pending

Hello,

Bug #927244 in mina reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:

https://salsa.debian.org/java-team/mina/commit/3cf6af5c1f789d8b84c08239e37d22e76bf96381


Fixed the build failure with javahelper 0.72 (Closes: #927244)


(this message was generated automatically)
-- 
Greetings

https://bugs.debian.org/927244



Bug#857208: marked as done (socklog: building with -A doesn't put the changelog in usr/share/doc/socklog-run/changelog.Debian.gz)

2019-04-17 Thread Debian Bug Tracking System
Your message dated Wed, 17 Apr 2019 07:52:42 +
with message-id 
and subject line Bug#857208: fixed in socklog 2.1.0+repack-1
has caused the Debian Bug report #857208,
regarding socklog: building with -A doesn't put the changelog in 
usr/share/doc/socklog-run/changelog.Debian.gz
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
857208: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857208
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: socklog
Version: 2.1.0-8
Severity: serious

building binary-indep with dpkg-buildpackage -A leads to
changelog.Debian to be renamed to just changelog, as this code in
debian/implicit does the wrong thing:

@sh -cx 'install -m0644 debian/changelog \
  debian/$*/usr/share/doc/$*/changelog.Debian'
@test ! -r changelog || \
  sh -cx 'install -m0644 changelog debian/$*/usr/share/doc/$*/'
@test -r debian/$*/usr/share/doc/$*/changelog || \
  sh -cx 'mv debian/$*/usr/share/doc/$*/changelog.Debian \
debian/$*/usr/share/doc/$*/changelog'

I couldn't completely get what was going on and why this is not
happening during a full or arch-dep build, and I refuse to wrap my mind
around that make for more than 2 minutes.


In any case, this could easily be fixed by shipping that tarball
unpacked properly, and switching to debhelper…..

-- 
regards,
Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540  .''`.
more about me:  https://mapreri.org : :'  :
Launchpad user: https://launchpad.net/~mapreri  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-


signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---
Source: socklog
Source-Version: 2.1.0+repack-1

We believe that the bug you reported is fixed in the latest version of
socklog, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 857...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Mathieu Mirmont  (supplier of updated socklog package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 12 Apr 2019 00:24:26 +0200
Source: socklog
Architecture: source
Version: 2.1.0+repack-1
Distribution: experimental
Urgency: medium
Maintainer: Mathieu Mirmont 
Changed-By: Mathieu Mirmont 
Closes: 668718 834089 857208 907092
Changes:
 socklog (2.1.0+repack-1) experimental; urgency=medium
 .
   * uscan: add watch file and repack.sh script
   * New upstream version 2.1.0+repack
   * Convert the package to debhelper (Closes: #857208)
   * patch: socklog-conf(8): refer to update-service(8)
   * patch: tryto.c: don't fail if the final try succeeds
   * socklog-run: migrate to dh-runit (Closes: #668718, #834089)
   * Merge socklog and socklog-run
   * source/lintian-overrides: no https upstream
   * doc-base: register the html documentation
   * copyright: convert to DEP-5 format
   * gitlab-ci.yml: add GitLab CI file
   * patch: Makefile: bypass the chkshsgr test in CI
   * Add sysv init scripts
   * control: update the Vcs fields
   * control: new maintainer (Closes: #907092)
Checksums-Sha1:
 702e73ba0ddfe1650e0bb9e201e0f60085ba203f 1974 socklog_2.1.0+repack-1.dsc
 dafd279c26942a8f34184aeec3f3780db3788a3d 59796 socklog_2.1.0+repack.orig.tar.gz
 dd6550d95979983e131967fa9b71277110708226 10080 
socklog_2.1.0+repack-1.debian.tar.xz
 26d10ea1bb6d4d59e672f2a989e556911096225e 5214 
socklog_2.1.0+repack-1_source.buildinfo
Checksums-Sha256:
 0a7833514825931a6bc54fdcc6a3105c3e956aec6a27719fe2201f7f5b1ba779 1974 
socklog_2.1.0+repack-1.dsc
 80c0b73e6409b06748026dd3d26276fea29b78b1bd145a748e4a4c04cdf769f7 59796 
socklog_2.1.0+repack.orig.tar.gz
 bb61ca3e50807f062372a6f9eb0da126c1c02a615a07c2bc98c5d145f5ba1713 10080 
socklog_2.1.0+repack-1.debian.tar.xz
 0a35fa8e9834d730526b92b3b98f56d2ac3e16c0b4aea80242889dee927c9e08 5214 
socklog_2.1.0+repack-1_source.buildinfo
Files:
 63d65fa3cc08e887907590ea54724711 1974 admin optional socklog_2.1.0+repack-1.dsc
 936848fc4531da3882ace2b9309fbac2 59796 admin optional 
socklog_2.1.0+repack.orig.tar.gz
 

Bug#834089: marked as done (runit: breaks users of runit: ln: failed to create symbolic link '/etc/service/bcron-sched': No such file or directory)

2019-04-17 Thread Debian Bug Tracking System
Your message dated Wed, 17 Apr 2019 07:52:42 +
with message-id 
and subject line Bug#834089: fixed in socklog 2.1.0+repack-1
has caused the Debian Bug report #834089,
regarding runit: breaks users of runit: ln: failed to create symbolic link 
'/etc/service/bcron-sched': No such file or directory
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
834089: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834089
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: runit
Version: 2.1.2-4
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package failed to install. As
per definition of the release team this makes the package too buggy for
a release, thus the severity.

>From the attached log (scroll to the bottom...):

  Selecting previously unselected package bcron-run.
  (Reading database ... 
(Reading database ... 6995 files and directories currently installed.)
  Preparing to unpack .../bcron-run_0.10-3_all.deb ...
  Unpacking bcron-run (0.10-3) ...
  Setting up bcron-run (0.10-3) ...
  Installing new version of config file /etc/crontab ...
  Adding system user `cron' (UID 151) ...
  Adding new group `cron' (GID 152) ...
  Adding new user `cron' (UID 151) with group `cron' ...
  Not creating home directory `/var/spool/cron'.
  Warning: The home dir /nonexistent you specified can't be accessed: No such 
file or directory
  Adding system user `cronlog' (UID 152) ...
  Adding new user `cronlog' (UID 152) with group `nogroup' ...
  Not creating home directory `/nonexistent'.
  ln: failed to create symbolic link '/etc/service/bcron-sched': No such file 
or directory
  dpkg: error processing package bcron-run (--configure):
   subprocess installed post-installation script returned error exit status 1
  Errors were encountered while processing:
   bcron-run

Similar problems were seen in different *-run packages.


cheers,

Andreas


bcron-run_0.10-3.log.gz
Description: application/gzip
--- End Message ---
--- Begin Message ---
Source: socklog
Source-Version: 2.1.0+repack-1

We believe that the bug you reported is fixed in the latest version of
socklog, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 834...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Mathieu Mirmont  (supplier of updated socklog package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 12 Apr 2019 00:24:26 +0200
Source: socklog
Architecture: source
Version: 2.1.0+repack-1
Distribution: experimental
Urgency: medium
Maintainer: Mathieu Mirmont 
Changed-By: Mathieu Mirmont 
Closes: 668718 834089 857208 907092
Changes:
 socklog (2.1.0+repack-1) experimental; urgency=medium
 .
   * uscan: add watch file and repack.sh script
   * New upstream version 2.1.0+repack
   * Convert the package to debhelper (Closes: #857208)
   * patch: socklog-conf(8): refer to update-service(8)
   * patch: tryto.c: don't fail if the final try succeeds
   * socklog-run: migrate to dh-runit (Closes: #668718, #834089)
   * Merge socklog and socklog-run
   * source/lintian-overrides: no https upstream
   * doc-base: register the html documentation
   * copyright: convert to DEP-5 format
   * gitlab-ci.yml: add GitLab CI file
   * patch: Makefile: bypass the chkshsgr test in CI
   * Add sysv init scripts
   * control: update the Vcs fields
   * control: new maintainer (Closes: #907092)
Checksums-Sha1:
 702e73ba0ddfe1650e0bb9e201e0f60085ba203f 1974 socklog_2.1.0+repack-1.dsc
 dafd279c26942a8f34184aeec3f3780db3788a3d 59796 socklog_2.1.0+repack.orig.tar.gz
 dd6550d95979983e131967fa9b71277110708226 10080 
socklog_2.1.0+repack-1.debian.tar.xz
 26d10ea1bb6d4d59e672f2a989e556911096225e 5214 
socklog_2.1.0+repack-1_source.buildinfo
Checksums-Sha256:
 0a7833514825931a6bc54fdcc6a3105c3e956aec6a27719fe2201f7f5b1ba779 1974 
socklog_2.1.0+repack-1.dsc
 80c0b73e6409b06748026dd3d26276fea29b78b1bd145a748e4a4c04cdf769f7 59796 
socklog_2.1.0+repack.orig.tar.gz
 bb61ca3e50807f062372a6f9eb0da126c1c02a615a07c2bc98c5d145f5ba1713 10080 
socklog_2.1.0+repack-1.debian.tar.xz
 

Bug#926392: licensecheck chokes on long lines

2019-04-17 Thread Niels Thykier
On Thu, 04 Apr 2019 18:13:43 +0200 Jonas Smedegaard  wrote:
> control: tag -1 confirmed
> 
> Quoting Sandro Mani (2019-04-04 13:36:28)
> > $ wget 
> > https://files.pythonhosted.org/packages/source/x/xonsh/xonsh-0.8.12.tar.gz
> > $ tar xf xonsh-0.8.12.tar.gz
> > $ licensecheck xonsh-0.8.12/xonsh/parser_table.py
> > 
> > => Licensecheck hangs eating cpu cycles (the file has lines with 33k and 
> > 71k characters).
> 
> Indeed. Thanks for reporting!
> 
>  - Jonas
> 
> -- 
>  * Jonas Smedegaard - idealist & Internet-arkitekt
>  * Tlf.: +45 40843136  Website: http://dr.jones.dk/
> 
>  [x] quote me freely  [ ] ask before reusing  [ ] keep private

Hi,

I have been digging in the code (admittedly using the master branch of
the libregexp-pattern-license-perl and licensecheck rather than the
packages) and basically, it is a DOS from suboptimal regex.

I traced it down to getting stuck on the python_2 "grant_license".  This
regex expands to (manually reformatted with /x for readability):

"""
m!
(?^:
(?:
(?: (?:[Ll]icensed|[Rr]eleased) [ ] under|(?:according [ ] to|as
[ ] governed [ ] by|under) [ ] the [ ] (?:conditions|terms)
[ ] of)(?:(?:[Tt]he [ ] )?Python-2.0

  | (?:[Tt]he [ ])?Python(?: [ ] [Ll]icense)? [ ] 2.0
  | (?:[Tt]he [ ])?Python-2.0
  | (?:[Tt]he [ ])?Python [ ] Software [ ]
Foundation(?: [ ] [Ll]icense)? [ ] version [ ] 2
  | (?:[Tt]he [ ])?python2
  | (?:[Tt]he [ ])?Python-2
  | (?:[Tt]he [ ])?PSF-2
  | (?:[Tt]he [ ])?Python(?: [ ] [Ll]icense)? [ ] Version [ ] 2
  | (?:[Tt]he [ ])?PYTHON [ ] SOFTWARE [ ] FOUNDATION [ ] LICENSE [
] VERSION [ ] 2
  | (?:[Tt]he [ ])?python-license-2.0)
  | (?:\W*\S+\W*)PSF [ ] is [ ] making [ ] Python [ ] available [ ]
to [ ] Licensee

)

)
!x
"""

The problem is the *last* alternative, namely:

"""
  (?:\W*\S+\W*)PSF [ ] is [ ] making [ ] [...]
"""


That \W*\S+\W* (known as ${BB} in the libregexp-pattern-license-perl
code) is stirring up hell. Basically, perl wants to find the *longest*
match and will spent stupid amount of time in this "trivial" regex
enumerating exponentially many "non-matches" ([1] strikes again).

Simply removing ${BB} will make the code continue past the python_2 test
relatively fast.   For the python_2 case, I think that the phrase "PSF
is making Python available to Licensee" would be sufficient enough to
consider it a match (i.e. ${BB} is redundant) - though it will change
behaviour on an anchored match (I hope this is not a problem).


Though it then gets stuck in the next regex "cube" (from
@L_type_unversioned) and that is as far down the rabbit hole I ventured
in terms of regex getting stuck (note that "cube" indirectly uses the
$BB regex too).

Thanks,
~Niels

[1] https://swtch.com/~rsc/regexp/regexp1.html