Bug#774192: marked as done (movabletype-opensource: CVE-2014-9057)

2014-12-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Dec 2014 08:11:00 +
with message-id 20141230081059.gm6...@urchin.earth.li
and subject line Re: [pkg-mt-om-devel] Bug#774192: CVE-2014-9057
has caused the Debian Bug report #774192,
regarding movabletype-opensource: CVE-2014-9057
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
774192: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774192
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Source: movabletype-opensource
Severity: grave
Tags: security

Hi,
please see https://movabletype.org/news/2014/12/6.0.6.html 

Cheers,
Moritz
---End Message---
---BeginMessage---
On Tue, Dec 30, 2014 at 02:56:31AM +0100, Moritz Muehlenhoff wrote:
 Source: movabletype-opensource
 Severity: grave
 Tags: security
 
 Hi,
 please see https://movabletype.org/news/2014/12/6.0.6.html 

Hi,

This doesn't affect Debian:

Note this issue only affects Movable Type versions 6.0.6, 5.2.11 and 5.18. It 
does not affect versions 6.0.5, 5.2.10, 5.17 and prior versions.

Cheers,
Dominic.---End Message---


Bug#761170: upstream

2014-12-30 Thread Russell Sim
Hi Ivo!

Ivo De Decker iv...@debian.org writes:

 On Tue, Nov 25, 2014 at 10:38:44PM +0100, Lucas Nussbaum wrote:
 Note that the build now fails on i386 too.
 
 Trying to reproduce it locally, I run into yet another problem:
 
   1) Failure:
 repo::iterator::fs_preserves_error 
 [/tmp/libgit2-0.21.1/tests/repo/iterator.c:952]
   Expected function call to fail: git_iterator_advance(e, i)

 This problem is only occurs when running is root (the test chmods a file to
 000 and checks if accessing it fails). It would probably be a good idea to add
 another test to check if the test is running as root, and fail in that case
 (because the tests assume they aren't).

Interesting I didn't know that the user running the tests was the
problem.  Is that a problem with the buildd deployments?  Or is it not a
requirement that they all run as the same user?  I guess what I'm really
asking is if I add a test who will fix it when it fails?

 The failure that happens on the i386 buildd is this one:

   1) Failure:
 clone::nonetwork::local_absolute_path 
 [/«PKGBUILDDIR»/tests/clone/nonetwork.c:91]
   Function call failed: (git_clone(g_repo, local_src, ./foo, g_options))
   error -1 - git_path_direach callback returned -1


 I can reproduce this in my test environment on i386 and amd64. It only happens
 when the builddir and /tmp are on different filesystems. It seems the local
 clone tries to create a hard link, which fails across filesystems (the fact
 that this happens without fallback is an error in itself, so the test actually
 discovered a problem here). When setting the TMPDIR to a directory on the same
 filesystem, the test doesn't hit this issue, and the build works fine.

 It's unclear to me why this only happens on i386, but I suspect that the setup
 of the buildd chroots isn't the same everywhere.

Yeah it struck me as odd.  This same problem effects kfreebsd too so the
change of the tmp dir will fix those builds as well.  I'll have go at the
running the clone nonetwork test with TMPDIR set to a mounted file
system and report a bug upstream.

 In any case, adding this patch fixes it in my environment. I can do an NMU if
 necessary.

Thanks heaps for the patch,  I only yesterday did exactly the same
thing.  It's included in the yet to be uploaded 0.21.3-1 that will also
address the recent CVE.

0. 
http://anonscm.debian.org/cgit/users/arrsim-guest/libgit2.git/commit/?id=bd3a1fc82c5af703fe061fb22022eb48fb89be50

-- 
Cheers,
Russell


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#773343: request-tracker4: fails to upgrade from 'wheezy' if rt4-extension-assettracker is installed

2014-12-30 Thread Satoru KURASHIKI
hi,

On Sun, Dec 28, 2014 at 11:07 PM, Niko Tyni nt...@debian.org wrote:
 The attached patch implements this. It's also pushed in the
 ntyni/bug-773343 branch in the Alioth repository (see the Vcs-Git header.)

Great! Thank you fixing it!

I've tested 4.2.8-2 (built from your branch), and confirmed with pbuilder that:

RT (wheezy) - 4.2.8-1 upgrade succeeds.
RT + assettracker (wheezy) - 4.2.8-1 upgrade fails.
RT (wheezy) - 4.2.8-2 upgrade succeeds.
RT + assettracker (wheezy) - 4.2.8-2 upgrade succeeds.

 However, I have not actually tested to use RT after the patched
 upgrade. It would be nice if somebody could do that.

I've also applied 4.2.8-2 to my local RT instance and had no problem using it,
but from 4.2.8-1, so it's not be useful verification...

regards,
-- 
KURASHIKI Satoru


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#773818: Crashes on start

2014-12-30 Thread Andreas Henriksson
Hello Adam Majer!

Stumbled across your bug report while browsing over release-critical ones...

I haven't even looked at the lpe source, but just from looking at the
hunk included as context in your patch it looks like the source
could really use some wider review then just targeted fixes.

On Tue, Dec 23, 2014 at 09:34:20AM -0600, Adam Majer wrote:
[...]
 diff -u lpe-1.2.7/src/buffer.c lpe-1.2.7/src/buffer.c
 --- lpe-1.2.7/src/buffer.c2014-06-23 22:53:33.582593198 -0500
 +++ lpe-1.2.7/src/buffer.c2014-12-23 09:08:54.888625050 -0600
 @@ -158,8 +158,8 @@
   int (*accept) (buffer *);
  

Consider the case where strlen(ent-d_name) == basename_len.

  if (strlen(ent-d_name)  basename_len) {
This should probably use = .

   The  strlen() function calculates the length of the string s,
 =excluding the terminating null byte ('\0').

 -basename_len = strlen(ent-d_name) + 1;
 -name = realloc(name, (basename-name) + basename_len);
 +basename_len = strlen(ent-d_name);
 +name = realloc(name, (basename-name) + basename_len + 1);
  basename = name + basename_off;
  }
   strcpy (basename, ent-d_name);

   The  strcpy()  function  copies the string pointed to by src,
 =including the terminating null byte ('\0'), ...

As mentioned, I haven't looked at the full source so I might very well
be missing something.  As I understood it this is the second attempt at
fixing an issue here.  Possibly a wider review of how to avoid
off-by-one in the entire source could be useful.

Regards,
Andreas Henriksson


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#774194: marked as done (phpmyadmin: CVE-2014-9218 CVE-2014-9219)

2014-12-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Dec 2014 10:04:08 +
with message-id e1y5teq-0003yi...@franck.debian.org
and subject line Bug#774194: fixed in phpmyadmin 4:4.2.12-2
has caused the Debian Bug report #774194,
regarding phpmyadmin: CVE-2014-9218 CVE-2014-9219
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
774194: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774194
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: phpmyadmin
Severity: grave
Tags: security

Please see:
http://www.phpmyadmin.net/home_page/security/PMASA-2014-17.php
http://www.phpmyadmin.net/home_page/security/PMASA-2014-18.php

Cheers,
Moritz
---End Message---
---BeginMessage---
Source: phpmyadmin
Source-Version: 4:4.2.12-2

We believe that the bug you reported is fixed in the latest version of
phpmyadmin, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 774...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michal Čihař ni...@debian.org (supplier of updated phpmyadmin package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 30 Dec 2014 10:54:32 +0100
Source: phpmyadmin
Binary: phpmyadmin
Architecture: source all
Version: 4:4.2.12-2
Distribution: unstable
Urgency: high
Maintainer: Thijs Kinkhorst th...@debian.org
Changed-By: Michal Čihař ni...@debian.org
Description:
 phpmyadmin - MySQL web administration tool
Closes: 774194
Changes:
 phpmyadmin (4:4.2.12-2) unstable; urgency=high
 .
   * Fix security issues (Closes: #774194).
 - CVE-2014-9219 / PMASA-2014-18 - XSS vulnerability in redirection.
 - CVE-2014-9218 / PMASA-2014-17 - DoS vulnerability with long passwords.
Checksums-Sha1:
 3b872c10a4dc8056889220fe9c30326b132fce5a 1925 phpmyadmin_4.2.12-2.dsc
 5050d7290502f9c791f26b4a05c525deb6270a96 49620 
phpmyadmin_4.2.12-2.debian.tar.xz
 cbb594076beccf3d25df6ff7a86f1d7d1531985c 3862078 phpmyadmin_4.2.12-2_all.deb
Checksums-Sha256:
 24a81f2ef2335656e58ca0ce1f0fcb9ac7d4a9bd8c409c378dc2d8a7f1822c82 1925 
phpmyadmin_4.2.12-2.dsc
 5230ca896a77f81fa9dfa80d1f1c8adee71bb83d913fd6998090b61c16171c5b 49620 
phpmyadmin_4.2.12-2.debian.tar.xz
 45f2eb8227a292da9514ba1298ab4a63c65136a3ad11f3c6b6daf958770d44ff 3862078 
phpmyadmin_4.2.12-2_all.deb
Files:
 1f69aaa1dba26087394527de0094dbde 1925 web extra phpmyadmin_4.2.12-2.dsc
 1a1b891a54b9d3eee5b0140c56723804 49620 web extra 
phpmyadmin_4.2.12-2.debian.tar.xz
 33ce87def73a5b1418690d42e9882c02 3862078 web extra phpmyadmin_4.2.12-2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIcBAEBCAAGBQJUonb4AAoJEJwnsxNCt1Edd9wP/iaELM5PyB16GTZ1A1ZlxE0I
WMyE/L1nCE+aFb3nR6bSPusMAG/AiXS34qjF9h8DoNkcSVEgUKrmTRP4YlIz6D/E
u3Ye+hLRVdbharoJPMUYhrhGAT2n8lOc3cVCKD9lGhph9M7s4aySCmTNJsg1s4Yo
JoOe4E1UjQVfcYpMm8GNb2psHb56ZzcozILI8FkGartDKHhBZaNyXxKwTlP1dIv9
0QtY/5aNtOBc1fD/HkUpMar9qp6Ky6TEVbPhuj4d2yt/5nm6I3eYesiUwdtcca8O
zt1wqI9vgVd46WQmUW+MkxeJkqLgaXEjh7i9a0xBdhHClKJdHY7VrN2YOmavCAZ1
MMg3UeI7Uz8bC+aTdIDgsIHnnkMixt33zH2ximVOaX2idsxwVGsUNNIb/7JTXtTZ
v9UMORXjpF9dLRnsEzksoRml1T4/hLIOrIsDWLK4tT75/Ja1/judFNt6W5CadrP3
e9z0HJKu6/G9k+SpovSNvqFXyXHTe/cmJoLzsYAsIPxwKmcieDbvvaWPhhjMZAul
UAVEaUIWRBZn1OL2iAIky+ghXMBJsxyvfvi5ORKIxsBuy4ULU/VbDVriOgb/iwQ2
UO2yLDJyCWZUn6f7j0BC7gdlAO63uKHo97ufl2Kx7Rc8EVA9uj1H54BWjb5xfLCw
USa215rKZqjpzz9cLJv+
=xUx8
-END PGP SIGNATUREEnd Message---


Processed (with 1 errors): merge 738119 774121

2014-12-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 774121 help fixed-upstream
Bug #774121 [android-tools-adb] adb sideload fails with TWRP 2.8.2.0
Added tag(s) help and fixed-upstream.
 tags 738119 help fixed-upstream
Bug #738119 [src:android-tools] android-tools: new upstream version 4.4.2 is 
available
Added tag(s) help and fixed-upstream.
 merge 738119 774121
Bug #738119 [src:android-tools] android-tools: new upstream version 4.4.2 is 
available
Unable to merge bugs because:
severity of #774121 is 'serious' not 'normal'
package of #774121 is 'android-tools-adb' not 'src:android-tools'
Failed to merge 738119: Did not alter merged bugs


End of message, stopping processing here.

Please contact me if you need assistance.
-- 
738119: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=738119
774121: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774121
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771863: [ovs-dev] Bug#771863: [PKG-Openstack-devel] Bug#771863: Bug#771863: Service does not start or parse interfaces correctly

2014-12-30 Thread Fabio Fantoni

Il 23/12/2014 16:27, Gurucharan Shetty ha scritto:

I tried 2.3.0+git20140819-3 building it in wheezy with kernel 3.16 from
backports but bridge of my test was still not working:

auto xenbr0
allow-ovs xenbr0
iface xenbr0 inet static
address 192.168.1.90
 netmask 255.255.255.0
 network 192.168.1.0
 broadcast 192.168.1.255
 gateway 192.168.1.200
 ovs_type OVSBridge
 ovs_ports eth0

auto eth0

You should not be using 'auto' above. eth0 is a port of an OVS bridge
and it should be configured after 'xenbr0' is configured.


allow-xenbr0 eth0
iface eth0 inet manual
 ovs_bridge xenbr0
 ovs_type OVSPort

auto xenbr1
allow-ovs xenbr1
iface xenbr1 inet static
address 192.168.45.91
 netmask 255.255.255.0
 network 192.168.45.0
 broadcast 192.168.45.255
 ovs_type OVSBridge
 ovs_ports vlan100

allow-xenbr1 vlan100
iface vlan100 inet manual
 ovs_bridge xenbr1
 ovs_type OVSIntPort
 ovs_options tag=100
 ovs_extra set interface ${IFACE} external-ids:iface-id=$(hostname
-s)

Without applying the below mentioned patch, does your problem go away
if you remove all the 'auto' for xenbr0 and xenbr1 also?


Thanks for your reply.
I removed all auto and now works also without backports other patches.
Then ovs networks starts automatically on boot also without auto, is 
it correct?




For have it working I had to do service networking restart.
I found probably final solution applying also this patch:
http://git.openvswitch.org/cgi-bin/gitweb.cgi?p=openvswitch;a=commitdiff;h=9a8b5cc1a3d941c0e33f3f5b5ac260a35a8130af

The above patch adds the ability to configure OVS with 'auto'
configured and additionally has the following information:

Notes on dependencies:
-

openvswitch-switch depends on $network, $named $remote_fs and $syslog to start.
This creates some startup dependency issues.

* Since openvswitch utilities are placed in /usr and /usr can be mounted
through NFS, openvswitch has to start after it.  But if a user uses openvswitch
for all his networking needs and hence to mount NFS, there will be a deadlock.
So, if /usr is mounted through NFS and openvswitch is used for all networking,
the administrator should figure out a way to mount NFS before starting OVS.
One way to do this is in initramfs.

* Since openvswitch starts after $network, $remote_fs and $syslog, any startup
script that depends on openvswitch but starts before it, needs to be changed
to depend on openvswitch-switch too.

* Ideally, an admin should not add openvswitch bridges in the 'auto'
section of the 'interfaces' file.  This is because, when ifupdown starts
working on bridges listed in 'auto', openvswitch has not yet started.

But, if the admin wants to go down this route and adds openvswitch bridges
in the 'auto' section, openvswitch-switch will forcefully be started when
ifupdown kicks in. In a case like this, the admin needs to make sure that /usr
has already been mounted and that a remote $syslog (if used) is ready to
receive openvswitch logs.




Even if seems not good in some cases.

Does the above explanation give any hints on why it wouldn't work in some cases?

Yes




I don't know if also Jessie have this problem but probably yes. If yes I
think this bug is only partially solves with 2.3.0+git20140819-3.



I had also another start problem probably not related to this, after some
hours xenbr0 stopped to working.
I not found any useful errors about in logs, only some strange thing, in
ifconfig xenbr0 was without the static ip, in syslog keep tried to acquire
configuration with dhcp failing (dhcp server present and working in lan).
After service networking restart was working again but I not understand
was happen and why :(
Someone have any idea about?



Thanks for any reply and sorry for my bad english.
___
dev mailing list
d...@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#773916: libical: Ship different constant values accross builds

2014-12-30 Thread Jérémy Bobbio
Dimitri John Ledkov:
 If I fail to upload this, please upload it instead of me.

Looks like the upload went ok. I am now able to rebuild libical
reproducibly. :)

Please remember to coordinate with the release team for binNUMs and
unblocks.

-- 
Lunar.''`. 
lu...@debian.org: :Ⓐ  :  # apt-get install anarchism
`. `'` 
  `-   


signature.asc
Description: Digital signature


Bug#774213: zope2.13: import zope.security._proxy - SystemError: dynamic module not initialized properly

2014-12-30 Thread Kirill Smelkov
Package: zope2.13
Version: 2.13.22-1
Severity: grave
Justification: renders package unusable

Dear Maintainer,

With zope2.13 I've tried to create a (user) instance and start it, but a
`SystemError: dynamic module not initialized properly` is raised while
zopectl tries to import zope.security._proxy .

The bug could be demonstrated in essence this way:

$ /usr/lib/zope2.13/bin/python 

 import zope.security._proxy
Traceback (most recent call last):
  File console, line 1, in module
  File 
/usr/lib/zope2.13/lib/python/zope.security-3.7.4.egg/zope/security/__init__.py,
 line 19, in module
from zope.security.management import checkPermission
  File 
/usr/lib/zope2.13/lib/python/zope.security-3.7.4.egg/zope/security/management.py,
 line 23, in module
from zope.security.checker import CheckerPublic
  File 
/usr/lib/zope2.13/lib/python/zope.security-3.7.4.egg/zope/security/checker.py,
 line 46, in module
from zope.security._proxy import _Proxy as Proxy, getChecker
SystemError: dynamic module not initialized properly


Full log demonstrating the problem is attached.

Thanks,
Kirill

 8 
$ whoami 
kirr# non-root

$ pwd
/home/kirr

$ rm -rf zope   # make sure there are no user instances

$ dzhandle -z2.13 make-instance -m all ktest -u user:passwd
$ dzhandle -z2.13 list-instances 
ktest2.13   addon-mode=all addon-technique=tree-linked 
userfile=inituser purged

$ ls zope/instance/zope2.13/
ktest

$ dzhandle -z2.13 zopectl ktest start
Traceback (most recent call last):
  File /usr/lib/zope2.13/bin/python, line 78, in module
execfile(__file__)
  File /usr/lib/zope2.13/bin/zopectl, line 6, in module
Zope2.Startup.zopectl.run()
  File 
/usr/lib/zope2.13/lib/python/Zope2-2.13.22.egg/Zope2/Startup/zopectl.py, line 
484, in run
exitstatus = main()
  File 
/usr/lib/zope2.13/lib/python/Zope2-2.13.22.egg/Zope2/Startup/zopectl.py, line 
440, in main
options.realize(args)
  File 
/usr/lib/zope2.13/lib/python/Zope2-2.13.22.egg/Zope2/Startup/zopectl.py, line 
158, in realize
ZDOptions.realize(self, *args, **kw)
  File /usr/lib/zope2.13/lib/python/zdaemon-2.0.7.egg/zdaemon/zdoptions.py, 
line 290, in realize
self.load_schema()
  File /usr/lib/zope2.13/lib/python/zdaemon-2.0.7.egg/zdaemon/zdoptions.py, 
line 338, in load_schema
self.schema = ZConfig.loadSchema(self.schemafile)
  File /usr/lib/zope2.13/lib/python/ZConfig-2.9.1.egg/ZConfig/loader.py, line 
33, in loadSchema
return SchemaLoader().loadURL(url)
  File /usr/lib/zope2.13/lib/python/ZConfig-2.9.1.egg/ZConfig/loader.py, line 
67, in loadURL
return self.loadResource(r)
  File /usr/lib/zope2.13/lib/python/ZConfig-2.9.1.egg/ZConfig/loader.py, line 
195, in loadResource
schema = ZConfig.schema.parseResource(resource, self)
  File /usr/lib/zope2.13/lib/python/ZConfig-2.9.1.egg/ZConfig/schema.py, line 
27, in parseResource
xml.sax.parse(resource.file, parser)
  File /usr/lib/python2.7/xml/sax/__init__.py, line 33, in parse
parser.parse(source)
  File /usr/lib/python2.7/xml/sax/expatreader.py, line 107, in parse
xmlreader.IncrementalParser.parse(self, source)
  File /usr/lib/python2.7/xml/sax/xmlreader.py, line 123, in parse
self.feed(buffer)
  File /usr/lib/python2.7/xml/sax/expatreader.py, line 210, in feed
self._parser.Parse(data, isFinal)
  File /usr/lib/python2.7/xml/sax/expatreader.py, line 304, in start_element
self._cont_handler.startElement(name, AttributesImpl(attrs))
  File /usr/lib/zope2.13/lib/python/ZConfig-2.9.1.egg/ZConfig/schema.py, line 
103, in startElement
getattr(self, start_ + name)(attrs)
  File /usr/lib/zope2.13/lib/python/ZConfig-2.9.1.egg/ZConfig/schema.py, line 
306, in start_import
src = self._loader.schemaComponentSource(pkg, file)
  File /usr/lib/zope2.13/lib/python/ZConfig-2.9.1.egg/ZConfig/loader.py, line 
212, in schemaComponentSource
__import__(package)
  File /usr/lib/zope2.13/lib/python/Zope2-2.13.22.egg/ZServer/__init__.py, 
line 41, in module
from HTTPServer import zhttp_server, zhttp_handler
  File /usr/lib/zope2.13/lib/python/Zope2-2.13.22.egg/ZServer/HTTPServer.py, 
line 44, in module
from HTTPResponse import make_response
  File 
/usr/lib/zope2.13/lib/python/Zope2-2.13.22.egg/ZServer/HTTPResponse.py, line 
29, in module
from ZPublisher.HTTPResponse import HTTPResponse # XXX WTF?
  File /usr/lib/zope2.13/lib/python/Zope2-2.13.22.egg/ZPublisher/__init__.py, 
line 20, in module
from zExceptions import NotFound, BadRequest, InternalError, Forbidden
  File 
/usr/lib/zope2.13/lib/python/zExceptions-2.13.0.egg/zExceptions/__init__.py, 
line 24, in module
from zope.publisher.interfaces import INotFound
  File 
/usr/lib/zope2.13/lib/python/zope.publisher-3.12.6.egg/zope/publisher/interfaces/__init__.py,
 line 26, in module
from zope.security.interfaces import IParticipation
  File 

Processed: Re: Bug#715416: python-urlgrabber: Fails to download from https

2014-12-30 Thread Debian Bug Tracking System
Processing control commands:

 severity -1 serious
Bug #715416 [python-urlgrabber] python-urlgrabber: Fails to download from https
Bug #722191 [python-urlgrabber] yum: CURLOPT_SSL_VERIFYHOST no longer supports 
1 as value!
Severity set to 'serious' from 'important'
Severity set to 'serious' from 'important'

-- 
715416: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=715416
722191: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722191
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#722191: marked as done (yum: CURLOPT_SSL_VERIFYHOST no longer supports 1 as value!)

2014-12-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Dec 2014 12:34:09 +
with message-id e1y5w01-9o...@franck.debian.org
and subject line Bug#722191: fixed in urlgrabber 3.9.1-4.1
has caused the Debian Bug report #722191,
regarding yum: CURLOPT_SSL_VERIFYHOST no longer supports 1 as value!
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
722191: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722191
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: yum
Version: 3.4.3-2
Severity: normal

Dear Maintainer,
*** Please consider answering these questions, where appropriate ***

   * What led up to the situation?
   * What exactly did you do (or not do) that was effective (or
 ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?

*** End of the template - remove these lines ***

I was experimenting with building fedora chroots and under certain
circumstances yum exits with:

  File /usr/lib/pymodules/python2.7/urlgrabber/grabber.py, line 1193, in
_set_opts
self.curl_obj.setopt(pycurl.SSL_VERIFYHOST, opts.ssl_verify_host)
pycurl.error: (43, 'CURLOPT_SSL_VERIFYHOST no longer supports 1 as value!')

I was using the command:

yum --releasever=19 --nogpg -c rootfs/etc/yum.repos.d/fedora.repo
--disableplugin='*' --disablerepo='*' --enablerepo=fedora --installroot
/tmp/rootfs/ install bash vim-minimal procps-ng yum passwd fedora-release
systemd

I'll attach the fedora.repo file I was using.

I found this forum post which claims that CURLOPT_SSL_VERIFYHOST needs to be 2.
http://devot-ee.com/add-ons/support/simple-s3-uploader/viewthread/9731

I had a simple patch which got around the issue for me.

In addition to the packages picked up by report bug I think the following are
also relevant:

python-pycurl 7.19.0-7
libcurl3-gnutls: 7.32.0-1

Diane Trout



-- System Information:
Debian Release: jessie/sid
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'testing'), (500, 'stable'), (110, 
'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.8-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages yum depends on:
ii  python   2.7.5-4
ii  python-libxml2   2.9.1+dfsg1-3
ii  python-rpm   4.11.1-2
ii  python-sqlite1.0.1-9
ii  python-sqlitecachec  1.1.4-1
ii  python-urlgrabber3.9.1-4
ii  rpm  4.11.1-2

yum recommends no packages.

yum suggests no packages.

-- no debconf information
--- /tmp/yumRepo.py	2013-09-08 14:17:43.692054028 -0700
+++ /usr/lib/python2.7/dist-packages/yum/yumRepo.py	2013-06-26 22:07:25.0 -0700
@@ -504,9 +504,9 @@
  'proxies': self.proxy_dict,
  'timeout': self.timeout,
  'http_headers': tuple(self.__headersListFromDict(cache=cache)),
  'ssl_verify_peer': self.sslverify,
- 'ssl_verify_host': 2 if self.sslverify else 0,
+ 'ssl_verify_host': self.sslverify,
  'ssl_ca_cert': self.sslcacert,
  'ssl_cert': self.sslclientcert,
  'ssl_key': self.sslclientkey,
  'user_agent': default_grabber.opts.user_agent,
[fedora]
name=Fedora $releasever - $basearch
failovermethod=priority
#baseurl=http://download.fedoraproject.org/pub/fedora/linux/releases/$releasever/Everything/$basearch/os/
mirrorlist=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releaseverarch=$basearch
enabled=1
#metadata_expire=7d
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-$basearch

[fedora-debuginfo]
name=Fedora $releasever - $basearch - Debug
failovermethod=priority
#baseurl=http://download.fedoraproject.org/pub/fedora/linux/releases/$releasever/Everything/$basearch/debug/
mirrorlist=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releaseverarch=$basearch
enabled=0
metadata_expire=7d
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-$basearch

[fedora-source]
name=Fedora $releasever - Source
failovermethod=priority
#baseurl=http://download.fedoraproject.org/pub/fedora/linux/releases/$releasever/Everything/source/SRPMS/
mirrorlist=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releaseverarch=$basearch
enabled=0
metadata_expire=7d
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-$basearch
---End Message---
---BeginMessage---
Source: urlgrabber
Source-Version: 3.9.1-4.1

We believe that the bug you reported is fixed in the latest 

Bug#715416: marked as done (python-urlgrabber: Fails to download from https)

2014-12-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Dec 2014 12:34:09 +
with message-id e1y5w01-9o...@franck.debian.org
and subject line Bug#722191: fixed in urlgrabber 3.9.1-4.1
has caused the Debian Bug report #722191,
regarding python-urlgrabber: Fails to download from https
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
722191: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722191
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: python-urlgrabber
Version: 3.9.1-4
Severity: normal

Dear Maintainer,

python-urlgrabber fails to download from any https

urlgrabber https://www.google.com
Traceback (most recent call last):
  File /usr/bin/urlgrabber, line 329, in module
ugc.run()
  File /usr/bin/urlgrabber, line 293, in run
f = self.g.urlgrab(url, self.op.outputfile)
  File /usr/lib/pymodules/python2.7/urlgrabber/grabber.py, line 982, in 
urlgrab
return self._retry(opts, retryfunc, url, filename)
  File /usr/lib/pymodules/python2.7/urlgrabber/grabber.py, line 886, in _retry
r = apply(func, (opts,) + args, {})
  File /usr/lib/pymodules/python2.7/urlgrabber/grabber.py, line 968, in 
retryfunc
fo = PyCurlFileObject(url, filename, opts)
  File /usr/lib/pymodules/python2.7/urlgrabber/grabber.py, line 1063, in 
__init__
self._do_open()
  File /usr/lib/pymodules/python2.7/urlgrabber/grabber.py, line 1350, in 
_do_open
self._set_opts()
  File /usr/lib/pymodules/python2.7/urlgrabber/grabber.py, line 1193, in 
_set_opts
self.curl_obj.setopt(pycurl.SSL_VERIFYHOST, opts.ssl_verify_host)
pycurl.error: (43, 'CURLOPT_SSL_VERIFYHOST no longer supports 1 as value!')

-- System Information:
Debian Release: jessie/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.9-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages python-urlgrabber depends on:
ii  python  2.7.5-2
ii  python-pycurl   7.19.0-7
ii  python-support  1.0.15

python-urlgrabber recommends no packages.

python-urlgrabber suggests no packages.

-- no debconf information
---End Message---
---BeginMessage---
Source: urlgrabber
Source-Version: 3.9.1-4.1

We believe that the bug you reported is fixed in the latest version of
urlgrabber, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 722...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
John Paul Adrian Glaubitz glaub...@physik.fu-berlin.de (supplier of updated 
urlgrabber package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 30 Dec 2014 13:13:08 +0100
Source: urlgrabber
Binary: python-urlgrabber
Architecture: source all
Version: 3.9.1-4.1
Distribution: unstable
Urgency: medium
Maintainer: Kevin Coyner kcoy...@debian.org
Changed-By: John Paul Adrian Glaubitz glaub...@physik.fu-berlin.de
Description:
 python-urlgrabber - A high-level cross-protocol url-grabber
Closes: 715416 722191
Changes:
 urlgrabber (3.9.1-4.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Add debian/patches/https-verifyhost-fix.diff taken from upstream
 to fix https connection issues (Closes: #715416, #722191).
Checksums-Sha1:
 3798d1ee0a98e51b467910e56e1a1c8e39dbe54b 2069 urlgrabber_3.9.1-4.1.dsc
 937c7ad3177539c337d4010e0175b2c7bd874938 72343 urlgrabber_3.9.1.orig.tar.gz
 3940e32bf6e0a49791b0c3be0aef3d2dafaf3905 10620 
urlgrabber_3.9.1-4.1.debian.tar.xz
 5d6a88b3dafb8a1d322756c8389d6852b5c66ae1 45930 
python-urlgrabber_3.9.1-4.1_all.deb
Checksums-Sha256:
 840a162400d46a31dfce001d3d6560dcfc0b025743e4373c27c85e62ada3046a 2069 
urlgrabber_3.9.1-4.1.dsc
 4437076c8708e5754ea04540e46c7f4f233734ee3590bb8a96389264fb0650d0 72343 
urlgrabber_3.9.1.orig.tar.gz
 849b922c792c1daf0d084a9b107387b39dbb769f4bfd75628c0e021611560162 10620 
urlgrabber_3.9.1-4.1.debian.tar.xz
 7d21f843ad6a7d91e2c9f9aa2b38bd75ab1a8568055add6eee3bf970dc846724 45930 
python-urlgrabber_3.9.1-4.1_all.deb
Files:
 f9bd663541b5eb5cf5947f757fe76151 2069 python optional urlgrabber_3.9.1-4.1.dsc
 00c8359bf71062d0946bacea521f80b4 72343 python optional 
urlgrabber_3.9.1.orig.tar.gz
 

Bug#722191: marked as done (yum: CURLOPT_SSL_VERIFYHOST no longer supports 1 as value!)

2014-12-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Dec 2014 12:34:09 +
with message-id e1y5w01-9i...@franck.debian.org
and subject line Bug#715416: fixed in urlgrabber 3.9.1-4.1
has caused the Debian Bug report #715416,
regarding yum: CURLOPT_SSL_VERIFYHOST no longer supports 1 as value!
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
715416: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=715416
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: yum
Version: 3.4.3-2
Severity: normal

Dear Maintainer,
*** Please consider answering these questions, where appropriate ***

   * What led up to the situation?
   * What exactly did you do (or not do) that was effective (or
 ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?

*** End of the template - remove these lines ***

I was experimenting with building fedora chroots and under certain
circumstances yum exits with:

  File /usr/lib/pymodules/python2.7/urlgrabber/grabber.py, line 1193, in
_set_opts
self.curl_obj.setopt(pycurl.SSL_VERIFYHOST, opts.ssl_verify_host)
pycurl.error: (43, 'CURLOPT_SSL_VERIFYHOST no longer supports 1 as value!')

I was using the command:

yum --releasever=19 --nogpg -c rootfs/etc/yum.repos.d/fedora.repo
--disableplugin='*' --disablerepo='*' --enablerepo=fedora --installroot
/tmp/rootfs/ install bash vim-minimal procps-ng yum passwd fedora-release
systemd

I'll attach the fedora.repo file I was using.

I found this forum post which claims that CURLOPT_SSL_VERIFYHOST needs to be 2.
http://devot-ee.com/add-ons/support/simple-s3-uploader/viewthread/9731

I had a simple patch which got around the issue for me.

In addition to the packages picked up by report bug I think the following are
also relevant:

python-pycurl 7.19.0-7
libcurl3-gnutls: 7.32.0-1

Diane Trout



-- System Information:
Debian Release: jessie/sid
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'testing'), (500, 'stable'), (110, 
'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.8-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages yum depends on:
ii  python   2.7.5-4
ii  python-libxml2   2.9.1+dfsg1-3
ii  python-rpm   4.11.1-2
ii  python-sqlite1.0.1-9
ii  python-sqlitecachec  1.1.4-1
ii  python-urlgrabber3.9.1-4
ii  rpm  4.11.1-2

yum recommends no packages.

yum suggests no packages.

-- no debconf information
--- /tmp/yumRepo.py	2013-09-08 14:17:43.692054028 -0700
+++ /usr/lib/python2.7/dist-packages/yum/yumRepo.py	2013-06-26 22:07:25.0 -0700
@@ -504,9 +504,9 @@
  'proxies': self.proxy_dict,
  'timeout': self.timeout,
  'http_headers': tuple(self.__headersListFromDict(cache=cache)),
  'ssl_verify_peer': self.sslverify,
- 'ssl_verify_host': 2 if self.sslverify else 0,
+ 'ssl_verify_host': self.sslverify,
  'ssl_ca_cert': self.sslcacert,
  'ssl_cert': self.sslclientcert,
  'ssl_key': self.sslclientkey,
  'user_agent': default_grabber.opts.user_agent,
[fedora]
name=Fedora $releasever - $basearch
failovermethod=priority
#baseurl=http://download.fedoraproject.org/pub/fedora/linux/releases/$releasever/Everything/$basearch/os/
mirrorlist=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releaseverarch=$basearch
enabled=1
#metadata_expire=7d
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-$basearch

[fedora-debuginfo]
name=Fedora $releasever - $basearch - Debug
failovermethod=priority
#baseurl=http://download.fedoraproject.org/pub/fedora/linux/releases/$releasever/Everything/$basearch/debug/
mirrorlist=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releaseverarch=$basearch
enabled=0
metadata_expire=7d
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-$basearch

[fedora-source]
name=Fedora $releasever - Source
failovermethod=priority
#baseurl=http://download.fedoraproject.org/pub/fedora/linux/releases/$releasever/Everything/source/SRPMS/
mirrorlist=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releaseverarch=$basearch
enabled=0
metadata_expire=7d
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-$basearch
---End Message---
---BeginMessage---
Source: urlgrabber
Source-Version: 3.9.1-4.1

We believe that the bug you reported is fixed in the latest 

Bug#715416: marked as done (python-urlgrabber: Fails to download from https)

2014-12-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Dec 2014 12:34:09 +
with message-id e1y5w01-9i...@franck.debian.org
and subject line Bug#715416: fixed in urlgrabber 3.9.1-4.1
has caused the Debian Bug report #715416,
regarding python-urlgrabber: Fails to download from https
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
715416: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=715416
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: python-urlgrabber
Version: 3.9.1-4
Severity: normal

Dear Maintainer,

python-urlgrabber fails to download from any https

urlgrabber https://www.google.com
Traceback (most recent call last):
  File /usr/bin/urlgrabber, line 329, in module
ugc.run()
  File /usr/bin/urlgrabber, line 293, in run
f = self.g.urlgrab(url, self.op.outputfile)
  File /usr/lib/pymodules/python2.7/urlgrabber/grabber.py, line 982, in 
urlgrab
return self._retry(opts, retryfunc, url, filename)
  File /usr/lib/pymodules/python2.7/urlgrabber/grabber.py, line 886, in _retry
r = apply(func, (opts,) + args, {})
  File /usr/lib/pymodules/python2.7/urlgrabber/grabber.py, line 968, in 
retryfunc
fo = PyCurlFileObject(url, filename, opts)
  File /usr/lib/pymodules/python2.7/urlgrabber/grabber.py, line 1063, in 
__init__
self._do_open()
  File /usr/lib/pymodules/python2.7/urlgrabber/grabber.py, line 1350, in 
_do_open
self._set_opts()
  File /usr/lib/pymodules/python2.7/urlgrabber/grabber.py, line 1193, in 
_set_opts
self.curl_obj.setopt(pycurl.SSL_VERIFYHOST, opts.ssl_verify_host)
pycurl.error: (43, 'CURLOPT_SSL_VERIFYHOST no longer supports 1 as value!')

-- System Information:
Debian Release: jessie/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.9-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages python-urlgrabber depends on:
ii  python  2.7.5-2
ii  python-pycurl   7.19.0-7
ii  python-support  1.0.15

python-urlgrabber recommends no packages.

python-urlgrabber suggests no packages.

-- no debconf information
---End Message---
---BeginMessage---
Source: urlgrabber
Source-Version: 3.9.1-4.1

We believe that the bug you reported is fixed in the latest version of
urlgrabber, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 715...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
John Paul Adrian Glaubitz glaub...@physik.fu-berlin.de (supplier of updated 
urlgrabber package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 30 Dec 2014 13:13:08 +0100
Source: urlgrabber
Binary: python-urlgrabber
Architecture: source all
Version: 3.9.1-4.1
Distribution: unstable
Urgency: medium
Maintainer: Kevin Coyner kcoy...@debian.org
Changed-By: John Paul Adrian Glaubitz glaub...@physik.fu-berlin.de
Description:
 python-urlgrabber - A high-level cross-protocol url-grabber
Closes: 715416 722191
Changes:
 urlgrabber (3.9.1-4.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Add debian/patches/https-verifyhost-fix.diff taken from upstream
 to fix https connection issues (Closes: #715416, #722191).
Checksums-Sha1:
 3798d1ee0a98e51b467910e56e1a1c8e39dbe54b 2069 urlgrabber_3.9.1-4.1.dsc
 937c7ad3177539c337d4010e0175b2c7bd874938 72343 urlgrabber_3.9.1.orig.tar.gz
 3940e32bf6e0a49791b0c3be0aef3d2dafaf3905 10620 
urlgrabber_3.9.1-4.1.debian.tar.xz
 5d6a88b3dafb8a1d322756c8389d6852b5c66ae1 45930 
python-urlgrabber_3.9.1-4.1_all.deb
Checksums-Sha256:
 840a162400d46a31dfce001d3d6560dcfc0b025743e4373c27c85e62ada3046a 2069 
urlgrabber_3.9.1-4.1.dsc
 4437076c8708e5754ea04540e46c7f4f233734ee3590bb8a96389264fb0650d0 72343 
urlgrabber_3.9.1.orig.tar.gz
 849b922c792c1daf0d084a9b107387b39dbb769f4bfd75628c0e021611560162 10620 
urlgrabber_3.9.1-4.1.debian.tar.xz
 7d21f843ad6a7d91e2c9f9aa2b38bd75ab1a8568055add6eee3bf970dc846724 45930 
python-urlgrabber_3.9.1-4.1_all.deb
Files:
 f9bd663541b5eb5cf5947f757fe76151 2069 python optional urlgrabber_3.9.1-4.1.dsc
 00c8359bf71062d0946bacea521f80b4 72343 python optional 
urlgrabber_3.9.1.orig.tar.gz
 

Bug#774217: yum: Missing dependency on python-lzma

2014-12-30 Thread John Paul Adrian Glaubitz
Package: yum
Version: 3.4.3-2
Severity: serious
Justification: renders package unusable

Hello!

yum is missing the dependency on the python-lzma package which is
needed to decompress the repository files used in newer Fedora
repositories.

root@z6:~ yum repolist all
rawhide/metalink
 |  22 kB 00:00
rawhide 
 | 4.2 kB 00:00
rawhide/primary_db  
 |  18 MB 00:00
Error: xz compression not available

Manually installing python-lzma fixes the problem. So this should
be fixable by just adding python-lzma to the list of dependencies
for the yum package.

root@z6:~ apt-get install python-lzma
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following NEW packages will be installed:
  python-lzma
  0 upgraded, 1 newly installed, 0 to remove and 1 not upgraded.
  Need to get 75.1 kB of archives.
  After this operation, 153 kB of additional disk space will be used.
  Get:1 http://ftp.debian.org/debian/ unstable/main python-lzma amd64 
0.5.3-2+b1 [75.1 kB]
  Fetched 75.1 kB in 0s (744 kB/s)
  Selecting previously unselected package python-lzma.
  (Reading database ... 432421 files and directories currently installed.)
  Preparing to unpack .../python-lzma_0.5.3-2+b1_amd64.deb ...
  Unpacking python-lzma (0.5.3-2+b1) ...
  Setting up python-lzma (0.5.3-2+b1) ...
  Processing triggers for python-support (1.0.15) ...
  root@z6:~ yum repolist all
  updates-testing/metalink  
   |  22 kB 
00:00
  updates-testing   
   | 4.9 kB 
00:00
  updates-testing/primary_db
   | 1.0 MB 
00:00
  repo id  repo 
name
   status
  rawhide  Fedora   
   
enabled: 43,648
  updates-testing  Fedora 
21 - x86_64 - Test Updates  
 enabled:  1,817
  repolist: 45,465
  root@z6:~

I am raising the severity of this bug to 'serious' since I think it
is important to have this bug fixed for Jessie so that we are
shipping a working version of yum in the release. yum is particularly
interesting for Jessie as we have systemd-nspawn available which allows
one to boot into a Fedora change root with minimal efforts.

I would be happy to NMU in any case.

Adrian

-- System Information:
Debian Release: 8.0
  APT prefers testing
  APT policy: (500, 'testing'), (99, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_US.UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages yum depends on:
ii  python   2.7.8-2
ii  python-libxml2   2.9.1+dfsg1-4
ii  python-rpm   4.11.3-1.1
ii  python-sqlite1.0.1-11
ii  python-sqlitecachec  1.1.4-1
ii  python-urlgrabber3.9.1-4
ii  rpm  4.11.3-1.1

yum recommends no packages.

yum suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#769941: Not because of gstreamer

2014-12-30 Thread Eugen Dedu
I often start iceweasel as another user (with sux) and when I load gmail 
I have this error too:
** (iceweasel:17775): CRITICAL **: gst_app_src_set_size: assertion 
'GST_IS_APP_SRC (appsrc)' failed


However, iceweasel does not crash.  So I think the crash has nothing to 
do with the assertion failed.


I use libgstreamer-plugins-base1.0-0 1.4.4-2 (current unstable).

--
Eugen


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#773806: [pkg-db-devel] Bug#773806: libdb5.3-java: Pre-installation script fails

2014-12-30 Thread Ondřej Surý
Control: severity -1 important
Control: tags -1 + moreinfo

Hi Ulrich,

I can't reproduce the bug and by reading dpkg-maintscript-helper I think
you are mistaken in your diagnosis.

It's the $SYMLINK and not the $SYMLINK_TARGET that has to be absolute
target, see the code. 

But it looks like the support for relative symlinks were added in
1.17.14:

dpkg (1.17.14) unstable; urgency=low
[...]
  * Add support for relative symlinks to dpkg-maintscript-helper
  symlink_to_dir
command. Suggested by Don Armstrong d...@debian.org.

and the ${misc:Pre-Depends} was fixed in 1.17.22:

dpkg (1.17.22) unstable; urgency=low
[...]
  * Bump minimal version for dir_to_symlink and symlink_to_dir commands
to 1.17.14 in dpkg-maintscript-helper(1) man page. Closes: #769843

So libdb5.3-java just needs binNMU with dpkg 1.17.22.

Cheers,
Ondrej

On Tue, Dec 23, 2014, at 14:45, Ulrich Klauer wrote:
 Package: libdb5.3-java
 Version: 5.3.28-7~deb8u1
 Severity: grave
 Justification: prevents package from being installed/upgraded
 
 Unfortunately, there is another[1] bug in libdb5.3-java.maintscript which
 means that the package still can't be installed or, if an earlier version
 is present, can't be upgraded. The error message is:
 
  dpkg-maintscript-helper: error: original symlink target is not an absolute 
  path
 
 So, the target argument to symlink_to_dir must be an absolute path, i.e.
 /usr/share/doc/libdb5.3 instead of just libdb5.3. See [2] for an
 explanation of why this was changed in dpkg 1.17.13.
 
 Ulrich
 
 [1] http://bugs.debian.org/771877
 [2] http://bugs.debian.org/758778
 
 -- System Information:
 Debian Release: 8.0
   APT prefers testing
   APT policy: (990, 'testing'), (800, 'unstable'), (100, 'experimental')
 Architecture: amd64 (x86_64)
 Foreign Architectures: i386
 
 Kernel: Linux 3.16-2-amd64 (SMP w/2 CPU cores)
 Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
 Shell: /bin/sh linked to /bin/dash
 
 Versions of packages libdb5.3-java depends on:
 ii  dpkg   1.17.13
 ii  libdb5.3-java-jni  5.3.28-7~deb8u1
 
 libdb5.3-java recommends no packages.
 
 Versions of packages libdb5.3-java suggests:
 pn  libdb5.3-java-gcj  none
 
 -- no debconf information
 
 ___
 pkg-db-devel mailing list
 pkg-db-de...@lists.alioth.debian.org
 http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-db-devel


-- 
Ondřej Surý ond...@sury.org
Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: [pkg-db-devel] Bug#773806: libdb5.3-java: Pre-installation script fails

2014-12-30 Thread Debian Bug Tracking System
Processing control commands:

 severity -1 important
Bug #773806 [libdb5.3-java] libdb5.3-java: Pre-installation script fails
Severity set to 'important' from 'grave'
 tags -1 + moreinfo
Bug #773806 [libdb5.3-java] libdb5.3-java: Pre-installation script fails
Added tag(s) moreinfo.

-- 
773806: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773806
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: dante-client: socksify preloads libdl.so.2 from an incorrect path

2014-12-30 Thread Debian Bug Tracking System
Processing control commands:

 severity -1 grave
Bug #656096 [dante-client] dante-client: socksify preloads libdl.so.2 from an 
incorrect path
Severity set to 'grave' from 'normal'

-- 
656096: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=656096
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: reassign 754218 to ifupdown, closing 754218, forcibly merging 771943 754218

2014-12-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 reassign 754218 ifupdown
Bug #754218 [systemd] boot hangs forever on LSB job raise network interfaces
Bug reassigned from package 'systemd' to 'ifupdown'.
No longer marked as found in versions systemd/215-7 and systemd/204-14.
Ignoring request to alter fixed versions of bug #754218 to the same values 
previously set
 close 754218
Bug #754218 [ifupdown] boot hangs forever on LSB job raise network interfaces
Marked Bug as done
 forcemerge 771943 754218
Bug #771943 {Done: Andrew Shadura andre...@debian.org} [ifupdown] ifupdown: 
boot hangs, interface won't raise
Bug #773832 {Done: Andrew Shadura andre...@debian.org} [ifupdown] systemd: 
LSB job raise network interfaces hangs with allow-hotplug and no cable
Bug #754218 {Done: Martin Pitt martin.p...@ubuntu.com} [ifupdown] boot hangs 
forever on LSB job raise network interfaces
Severity set to 'serious' from 'important'
Marked as fixed in versions ifupdown/0.7.51.
Marked as found in versions ifupdown/0.7.50.
Bug #773832 {Done: Andrew Shadura andre...@debian.org} [ifupdown] systemd: 
LSB job raise network interfaces hangs with allow-hotplug and no cable
Merged 754218 771943 773832
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
754218: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754218
771943: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771943
773832: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773832
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed (with 1 errors): merge 738119 774121

2014-12-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 forcemerge 738119 774121
Bug #738119 [src:android-tools] android-tools: new upstream version 4.4.2 is 
available
Unable to merge bugs because:
package of #774121 is 'android-tools-adb' not 'src:android-tools'
Failed to forcibly merge 738119: Did not alter merged bugs

 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
738119: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=738119
774121: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774121
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: merge 738119 774121

2014-12-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 reassign 774121 src:android-tools
Bug #774121 [android-tools-adb] adb sideload fails with TWRP 2.8.2.0
Bug reassigned from package 'android-tools-adb' to 'src:android-tools'.
No longer marked as found in versions android-tools/4.2.2+git20130529-5.1.
Ignoring request to alter fixed versions of bug #774121 to the same values 
previously set
 forcemerge 738119 774121
Bug #738119 [src:android-tools] android-tools: new upstream version 4.4.2 is 
available
Bug #774121 [src:android-tools] adb sideload fails with TWRP 2.8.2.0
Severity set to 'normal' from 'serious'
The source android-tools and version 4.2.2+git20130529 do not appear to match 
any binary packages
Marked as found in versions android-tools/4.2.2+git20130529-5.1 and 
android-tools/4.2.2+git20130529.
Merged 738119 774121
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
738119: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=738119
774121: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774121
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#772868: marked as done (gxine: Trigger cycle causes dpkg to fail processing)

2014-12-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Dec 2014 15:48:35 +
with message-id e1y5z2b-0007sx...@franck.debian.org
and subject line Bug#772868: fixed in gxine 0.5.908-3.1
has caused the Debian Bug report #772868,
regarding gxine: Trigger cycle causes dpkg to fail processing
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
772868: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772868
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: gxine
Version: 2.4.0+dfsg-2
Severity: serious

Hi!

This package can get involved in a trigger cycle. The problem is that
it installs interests on /usr/lib/xine/plugins with files there
provided by libxine2-ffmpeg, libxine2-gnome, libxine2-misc-plugins
and libxine2-x, which is directly or transitively depended on
by gxine itself.


A solution to the above is to simply switch the triggers to their
noawait variants, in this case from «interest» to «interest-noawait»,
as long as they are not critical for the activating packages, which
might be the case here (?). Otherwise a fix might unfortunatly be
more involved.

Thanks,
Guillem
---End Message---
---BeginMessage---
Source: gxine
Source-Version: 0.5.908-3.1

We believe that the bug you reported is fixed in the latest version of
gxine, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 772...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
gregor herrmann gre...@debian.org (supplier of updated gxine package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 28 Dec 2014 16:19:25 +0100
Source: gxine
Binary: gxine gxineplugin
Architecture: source amd64
Version: 0.5.908-3.1
Distribution: unstable
Urgency: medium
Maintainer: Darren Salt devs...@moreofthesa.me.uk
Changed-By: gregor herrmann gre...@debian.org
Description:
 gxine  - the xine video player, GTK+/Gnome user interface
 gxineplugin - the xine video player, GTK+/Gnome; launcher plugin for Mozilla
Closes: 772868
Changes:
 gxine (0.5.908-3.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Fix Trigger cycle causes dpkg to fail processing:
 switch trigger from interest to interest-noawait,
 thanks Guillem Jover
 (Closes: #772868)
Checksums-Sha1:
 d002e2f5bc3da9a097ee93111ce8d69a0f59d3c5 2261 gxine_0.5.908-3.1.dsc
 154eada9d3e94a0c641e60fc515a74afb736eb49 12176 gxine_0.5.908-3.1.debian.tar.xz
 b17aa68bb762c96ebcf62727bafea48e784e9064 391558 gxine_0.5.908-3.1_amd64.deb
 b962c73639a51a2ce1565bb732a30aa967956bee 6442 gxineplugin_0.5.908-3.1_amd64.deb
Checksums-Sha256:
 a4fda487224286aed9d5434ca9059fcc7ce758bcf6b3ca94dac184adb13ebd88 2261 
gxine_0.5.908-3.1.dsc
 8bdcf54a0f0907c688756a6681bf0680e6d6d5852cf08946504ae2956d881332 12176 
gxine_0.5.908-3.1.debian.tar.xz
 fa946227e92f9d84bef1839459cf65cce6c6ae2a4609ef0020487d2da493a35d 391558 
gxine_0.5.908-3.1_amd64.deb
 16dbadb0ac7236fd65375c5e1cbf21c29127f507335e8ad81400f4dc2157da49 6442 
gxineplugin_0.5.908-3.1_amd64.deb
Files:
 715ad9dc68d0c65d3635ae81015e13e4 2261 video optional gxine_0.5.908-3.1.dsc
 a61c85b5cd28a15dd4e01063eaa98d9b 12176 video optional 
gxine_0.5.908-3.1.debian.tar.xz
 06043677f3c9501fd3d34cb24e30 391558 video optional 
gxine_0.5.908-3.1_amd64.deb
 e3356e6ca7a2ccf297c2f508afcd9b71 6442 video optional 
gxineplugin_0.5.908-3.1_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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Processed: Re: Bug#773041: Bug#773318: clamav dies/hangs

2014-12-30 Thread Debian Bug Tracking System
Processing control commands:

 tag 773041 + pending
Bug #773041 [libmspack0] libmspack: hangs on a crafted CAB file
Added tag(s) pending.

-- 
773041: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773041
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#773041: Bug#773318: clamav dies/hangs

2014-12-30 Thread duck

Control: tag 773041 + pending

Coin,

Thanks a lot Andreas.

Have a pleasant end of year time.

--
Marc Dequènes


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771226: Not currently a problem

2014-12-30 Thread Neil Williams
notfound 771226 0.4
tag 771226 + moreinfo
severity 771226 important
tag 771729 + moreinfo
severity 771729 important
thanks

These bugs appear to no longer be present. A clean pbuilder chroot can
install the package, as long as the architecture is first added.

# dpkg --add-architecture armhf
# apt update
# apt install gcc-arm-linux-gnueabihf

The same works for gcc-mipsel-linux-gnu and gcc-mips-linux-gnu after
mips and mipsel are added respectively.

Please re-verify and feel free to close these bugs by sending email to
771729-d...@bugs.debian.org or 771226-d...@bugs.debian.org as appropriate.

-- 


Neil Williams
=
http://www.linux.codehelp.co.uk/



pgpwz2vJnP6PI.pgp
Description: OpenPGP digital signature


Processed: Not currently a problem

2014-12-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 notfound 771226 0.4
Bug #771226 [gcc-arm-linux-gnueabihf] gcc-arm-linux-gnueabihf: Currently 
uninstallable
There is no source info for the package 'gcc-arm-linux-gnueabihf' at version 
'0.4' with architecture ''
Unable to make a source version for version '0.4'
No longer marked as found in versions cross-gcc-defaults/0.4.
 tag 771226 + moreinfo
Bug #771226 [gcc-arm-linux-gnueabihf] gcc-arm-linux-gnueabihf: Currently 
uninstallable
Added tag(s) moreinfo.
 severity 771226 important
Bug #771226 [gcc-arm-linux-gnueabihf] gcc-arm-linux-gnueabihf: Currently 
uninstallable
Severity set to 'important' from 'serious'
 tag 771729 + moreinfo
Bug #771729 [gcc-arm-linux-gnueabihf] Depends: gcc-4.9-arm-linux-gnueabihf (= 
4.9.2-2) but it is not installable
Added tag(s) moreinfo.
 severity 771729 important
Bug #771729 [gcc-arm-linux-gnueabihf] Depends: gcc-4.9-arm-linux-gnueabihf (= 
4.9.2-2) but it is not installable
Severity set to 'important' from 'grave'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
771226: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771226
771729: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771729
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#773818: Crashes on start

2014-12-30 Thread Adam Majer
On Tue, Dec 30, 2014 at 10:49:34AM +0100, Andreas Henriksson wrote:
 Hello Adam Majer!

Hello!

 Stumbled across your bug report while browsing over release-critical ones...
 
 I haven't even looked at the lpe source, but just from looking at the
 hunk included as context in your patch it looks like the source
 could really use some wider review then just targeted fixes.

That's quite correct. lpe hasn't really been updated in a decade. But
it's still a very simple editor I prefer over vim or emacs for simple
tasks.

 - Ctrl-C close without saving
 - Ctrl-X close and save
 - Ctrl-V Ctrl-V/A/S - pass buffer through shell command, awk, or sed

Can't get faster than that.


 On Tue, Dec 23, 2014 at 09:34:20AM -0600, Adam Majer wrote:
 [...]
  diff -u lpe-1.2.7/src/buffer.c lpe-1.2.7/src/buffer.c
  --- lpe-1.2.7/src/buffer.c  2014-06-23 22:53:33.582593198 -0500
  +++ lpe-1.2.7/src/buffer.c  2014-12-23 09:08:54.888625050 -0600
  @@ -158,8 +158,8 @@
  int (*accept) (buffer *);
   
 
 Consider the case where strlen(ent-d_name) == basename_len.
 
   if (strlen(ent-d_name)  basename_len) {
 This should probably use = .

No. This already includes null when accounting for basename_len. If
strlen == basename_len then there is enough room in the buffer. Output
is just before the \0 that is already allocated.

That is also why that +1 to account for \0 in the calculation was in
the wrong spot and caused issues on next loop when filename could be
+1 character longer. And those happen,

cppmode.so
htmlmode.so


 As mentioned, I haven't looked at the full source so I might very well
 be missing something.  As I understood it this is the second attempt at
 fixing an issue here.  Possibly a wider review of how to avoid
 off-by-one in the entire source could be useful.

In this case this is the problem. I think it was caused by trying to
be fancy and retaining old code that used fixed length array and
then apply it to dynamic array. Better approach would have been to
simplify all those concatenations in one spot instead of all over the
loop.

You are 100% correct. lpe would benefit from overall update.

Thanks for looking at this.

- Adam

-- 
Adam Majer
ad...@zombino.com


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771126: libav/tests/lena.pnm: also not mentioned in debian/copyright

2014-12-30 Thread Sebastian Ramacher
On 2014-12-02 15:31:39, Jonas Smedegaard wrote:
  Jonas, would you mind taking over from here and upload 
  https://libav.org/releases/libav-11.1.tar.xz
 
  to unstable?
 
 I don't mind doing the technical work of packaging, but prefer if 
 someone else takes to dialogue with release team about freeze exception, 
 as I don't have the stomach for that (no blame on the release team for 
 that!).
 
 I also don't mind doing the additional technical work of cherry-picking 
 only the fix for this bug and apply to 6:11-2 currently targeted Jessie.
 
 Which of those to do would probably need input from the person willing 
 to do the negotiation with release team, however.  So I await someone 
 volunteering for that (and while waiting will prepare that new upstream 
 release, and if noone have appeared before done release it targeted 
 experimental).

I'm currently preparing the upload to unstable and will follow up with
the release team.

Cheers
-- 
Sebastian Ramacher


signature.asc
Description: Digital signature


Bug#773041: marked as done (libmspack: hangs on a crafted CAB file)

2014-12-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Dec 2014 17:03:39 +
with message-id e1y60cp-yl...@franck.debian.org
and subject line Bug#773041: fixed in libmspack 0.4-2
has caused the Debian Bug report #773041,
regarding libmspack: hangs on a crafted CAB file
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
773041: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773041
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---

Package: cabextract
Version: 1.4-4+b1
Severity: minor
Usertags: afl

The attached file makes cabextract hang forever (or at least for two 
minutes, after which I lost my patience :-P).


This bug was found using American fuzzy lop:
http://lcamtuf.coredump.cx/afl/


-- System Information:
Debian Release: 8.0
 APT prefers unstable
 APT policy: (990, 'unstable'), (500, 'experimental')
Architecture: i386 (x86_64)
Foreign Architectures: amd64

Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=pl_PL.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages cabextract depends on:
ii  libc6  2.19-13

--
Jakub Wilk


hang.cab
Description: application/cab
---End Message---
---BeginMessage---
Source: libmspack
Source-Version: 0.4-2

We believe that the bug you reported is fixed in the latest version of
libmspack, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 773...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Marc Dequènes (Duck) d...@duckcorp.org (supplier of updated libmspack package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 30 Dec 2014 17:40:47 +0100
Source: libmspack
Binary: libmspack0 libmspack-dev libmspack-dbg libmspack-doc
Architecture: source amd64 all
Version: 0.4-2
Distribution: unstable
Urgency: medium
Maintainer: Marc Dequènes (Duck) d...@duckcorp.org
Changed-By: Marc Dequènes (Duck) d...@duckcorp.org
Description:
 libmspack-dbg - library for Microsoft compression formats (debugging symbols)
 libmspack-dev - library for Microsoft compression formats (development files)
 libmspack-doc - library for Microsoft compression formats (documentation)
 libmspack0 - library for Microsoft compression formats (shared library)
Closes: 773041
Changes:
 libmspack (0.4-2) unstable; urgency=medium
 .
   * Added patch 'qtmd-fix-frame_end-overflow.patch' to fix an overflow
 causing an infinite loop in some situation (Closes: #773041).
Checksums-Sha1:
 f84986daa0318462b156e739abfa10a83e3c3f35 2064 libmspack_0.4-2.dsc
 fb6cbf08a9fc2fbfd713ba2d048f06d7aeeccceb 3516 libmspack_0.4-2.debian.tar.xz
 a9ea854769dcd26dad3a965daee1cc8d5f42fc20 45570 libmspack0_0.4-2_amd64.deb
 bebc11d8e2e89c1e87998a913d6ece23d768a946 63944 libmspack-dev_0.4-2_amd64.deb
 583b9ab31401e42fb336e2d5e085e83fff638192 82966 libmspack-dbg_0.4-2_amd64.deb
 6a6ed210f9125f7a11b2f1a835197a38b2189609 87766 libmspack-doc_0.4-2_all.deb
Checksums-Sha256:
 45c8f9a2280a0857b1dc2a3b1ed2a1c593eefc25b003dcb1e8ccdd9d5201c008 2064 
libmspack_0.4-2.dsc
 cc59f38c4661112139817ddbb177ec966b7ffbb8fa215ccf9fa6531e9b1c6e54 3516 
libmspack_0.4-2.debian.tar.xz
 d5bfe0ddfd7eae30bf5dff7b68053f28f8844f1fa204fc6419992e3e6d623091 45570 
libmspack0_0.4-2_amd64.deb
 60bd8c1fcbce7a165fc62313b048b02d1d4c0cda19ec86e713f1f2c429019e6b 63944 
libmspack-dev_0.4-2_amd64.deb
 e5a5a5da15bcedcaf6439732e08941ba9619f72718bd630978d20bee0c901aad 82966 
libmspack-dbg_0.4-2_amd64.deb
 578913a0c8bc6bba3abf7b045f10a73f55449f0219a97a653b5c2f1bc7c298e5 87766 
libmspack-doc_0.4-2_all.deb
Files:
 2f4d81be6b8025ba24d3318678200fd7 2064 libs optional libmspack_0.4-2.dsc
 40301461d418e010cd6fbbf3d3fd6a55 3516 libs optional 
libmspack_0.4-2.debian.tar.xz
 a1f869d6e77d53784d9cdcd089c64366 45570 libs optional libmspack0_0.4-2_amd64.deb
 d4258fb2c2747ec3c0edfafe8ff7db11 63944 libdevel optional 
libmspack-dev_0.4-2_amd64.deb
 6bb0e11c8893f0fc0b1a0f701f9d5b32 82966 debug extra 
libmspack-dbg_0.4-2_amd64.deb
 fb93a34a6279963a791dcc6e09448ba0 87766 doc optional libmspack-doc_0.4-2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIcBAEBCgAGBQJUotguAAoJEFXp+fesHEQ/WVgQAKZMKwZpeaGokq9RqOp4rsbr

Bug#774185: marked as done (libsys-virt-perl: Wrong runtime dependency on libvirt-bin)

2014-12-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Dec 2014 17:33:52 +
with message-id e1y60g4-0006oa...@franck.debian.org
and subject line Bug#774185: fixed in libsys-virt-perl 1.2.9-2
has caused the Debian Bug report #774185,
regarding libsys-virt-perl: Wrong runtime dependency on libvirt-bin
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
774185: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774185
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: libsys-virt-perl
Severity: normal

Dear Maintainer,

right now libsys-virt-perl declares a hard dependency on libvirt-bin
which is rather silly since libvirt supports accessing remote daemons
via the network so why should this library depend on the deamon anyways?

This is not only an inconvinience but could also result in security
issues for users unknowingly installing an autostarting daemon even
though they just tried to install libguestfs-tools for example (which
is the problem I ran into).

So I propose at least downgrading the dependency on libvirt-bin to a
Recomends so users can choose not to install the daemon.

Thanks

-- System Information:
Debian Release: 8.0
  APT prefers testing-updates
  APT policy: (500, 'testing-updates'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
---End Message---
---BeginMessage---
Source: libsys-virt-perl
Source-Version: 1.2.9-2

We believe that the bug you reported is fixed in the latest version of
libsys-virt-perl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 774...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso car...@debian.org (supplier of updated libsys-virt-perl 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 30 Dec 2014 08:11:19 +0100
Source: libsys-virt-perl
Binary: libsys-virt-perl
Architecture: source amd64
Version: 1.2.9-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Perl Group pkg-perl-maintain...@lists.alioth.debian.org
Changed-By: Salvatore Bonaccorso car...@debian.org
Description:
 libsys-virt-perl - Perl module providing an extension for the libvirt library
Closes: 774185
Changes:
 libsys-virt-perl (1.2.9-2) unstable; urgency=medium
 .
   * Change Build-Depends from libvirt-bin to libvirt-daemon
 libvirt-bin is now a transitional package and only libvirt-daemon is
 used during build.
   * Drop Depends on libvirt-bin.
 The runtime dependency to neither libvirt-daemon-system or
 libvirt-clients is required to have the Perl module working. It only
 requires the dependency on the library, since libvirt supports also
 accessing remote daemons via the network.
 Thanks to Daniel Gröber d...@darkboxed.org (Closes: #774185)
Checksums-Sha1:
 f2bd56eb47922e193966e7515c53b90dbc54ca90 2194 libsys-virt-perl_1.2.9-2.dsc
 25bf98d79f5ae48968f2f2f7a636d09843d6f694 3800 
libsys-virt-perl_1.2.9-2.debian.tar.xz
Checksums-Sha256:
 29f745727edade4a417852a25931724250237b2c3815f8814bf1a5ddf0451303 2194 
libsys-virt-perl_1.2.9-2.dsc
 6d75981e6d6f9946377cf148ea1dac8aa8d98edd42bffb065d9040e8555bd256 3800 
libsys-virt-perl_1.2.9-2.debian.tar.xz
Files:
 605a5aed5e239b1a86b00cc2d6f237fd 2194 perl optional 
libsys-virt-perl_1.2.9-2.dsc
 790d6ab191262f7d5993352fb24195b3 3800 perl optional 
libsys-virt-perl_1.2.9-2.debian.tar.xz

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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Processed: severity of 773806 is grave

2014-12-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 773806 grave
Bug #773806 [libdb5.3-java] libdb5.3-java: Pre-installation script fails
Severity set to 'grave' from 'important'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
773806: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773806
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#773806: [pkg-db-devel] Bug#773806: Bug#773806: libdb5.3-java: Pre-installation script fails

2014-12-30 Thread Ondřej Surý
JFTR This is caused by older dpkg ( 1.17.22) that didn't set
${misc:Pre-Depends} to = 1.17.14.

This is not a bug in src:db5.3 per se, but it needs to be fixed by
sourceful upload of db5.3 anyway since libdb5.3-java is arch:all and
cannot be fixed by binNMU.

As a temporary fix upgrade your dpkg to = 1.17.14 first and then
upgrade rest of the system.

Cheers,
Ondrej

On Tue, Dec 30, 2014, at 15:50, Ondřej Surý wrote:
 Control: severity -1 important
 Control: tags -1 + moreinfo
 
 Hi Ulrich,
 
 I can't reproduce the bug and by reading dpkg-maintscript-helper I think
 you are mistaken in your diagnosis.
 
 It's the $SYMLINK and not the $SYMLINK_TARGET that has to be absolute
 target, see the code. 
 
 But it looks like the support for relative symlinks were added in
 1.17.14:
 
 dpkg (1.17.14) unstable; urgency=low
 [...]
   * Add support for relative symlinks to dpkg-maintscript-helper
   symlink_to_dir
 command. Suggested by Don Armstrong d...@debian.org.
 
 and the ${misc:Pre-Depends} was fixed in 1.17.22:
 
 dpkg (1.17.22) unstable; urgency=low
 [...]
   * Bump minimal version for dir_to_symlink and symlink_to_dir commands
 to 1.17.14 in dpkg-maintscript-helper(1) man page. Closes: #769843
 
 So libdb5.3-java just needs binNMU with dpkg 1.17.22.
 
 Cheers,
 Ondrej
 
 On Tue, Dec 23, 2014, at 14:45, Ulrich Klauer wrote:
  Package: libdb5.3-java
  Version: 5.3.28-7~deb8u1
  Severity: grave
  Justification: prevents package from being installed/upgraded
  
  Unfortunately, there is another[1] bug in libdb5.3-java.maintscript which
  means that the package still can't be installed or, if an earlier version
  is present, can't be upgraded. The error message is:
  
   dpkg-maintscript-helper: error: original symlink target is not an 
   absolute path
  
  So, the target argument to symlink_to_dir must be an absolute path, i.e.
  /usr/share/doc/libdb5.3 instead of just libdb5.3. See [2] for an
  explanation of why this was changed in dpkg 1.17.13.
  
  Ulrich
  
  [1] http://bugs.debian.org/771877
  [2] http://bugs.debian.org/758778
  
  -- System Information:
  Debian Release: 8.0
APT prefers testing
APT policy: (990, 'testing'), (800, 'unstable'), (100, 'experimental')
  Architecture: amd64 (x86_64)
  Foreign Architectures: i386
  
  Kernel: Linux 3.16-2-amd64 (SMP w/2 CPU cores)
  Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
  Shell: /bin/sh linked to /bin/dash
  
  Versions of packages libdb5.3-java depends on:
  ii  dpkg   1.17.13
  ii  libdb5.3-java-jni  5.3.28-7~deb8u1
  
  libdb5.3-java recommends no packages.
  
  Versions of packages libdb5.3-java suggests:
  pn  libdb5.3-java-gcj  none
  
  -- no debconf information
  
  ___
  pkg-db-devel mailing list
  pkg-db-de...@lists.alioth.debian.org
  http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-db-devel
 
 
 -- 
 Ondřej Surý ond...@sury.org
 Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server
 
 ___
 pkg-db-devel mailing list
 pkg-db-de...@lists.alioth.debian.org
 http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-db-devel


-- 
Ondřej Surý ond...@sury.org
Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#774217: yum: Missing dependency on python-lzma

2014-12-30 Thread Debian Bug Tracking System
Processing control commands:

 severity -1 normal
Bug #774217 [yum] yum: Missing dependency on python-lzma
Severity set to 'normal' from 'serious'

-- 
774217: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774217
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#774217: yum: Missing dependency on python-lzma

2014-12-30 Thread Mike Miller
Control: severity -1 normal

Hi, thanks for catching and reporting this oversight.

On Tue, Dec 30, 2014 at 13:42:46 +0100, John Paul Adrian Glaubitz wrote:
 yum is missing the dependency on the python-lzma package which is
 needed to decompress the repository files used in newer Fedora
 repositories.

Agreed, so a simple workaround is apt-get install yum python-lzma.

I agree a dependency should be added on python-lzma, probably no
higher than Recommends, since yum works perfectly well without it,
assuming you are pulling from a repository that uses either gzip or
bzip2 compression. But I honestly don't think this bug, which isn't a
policy violation and has such a simple workaround, is RC.

-- 
mike


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771126: libav/tests/lena.pnm: also not mentioned in debian/copyright

2014-12-30 Thread Jonas Smedegaard
Hi Sebastian,

Quoting Sebastian Ramacher (2014-12-30 18:01:24)
 On 2014-12-02 15:31:39, Jonas Smedegaard wrote:
 Jonas, would you mind taking over from here and upload 
 https://libav.org/releases/libav-11.1.tar.xz

 to unstable?

 I don't mind doing the technical work of packaging, but prefer if 
 someone else takes to dialogue with release team about freeze 
 exception, as I don't have the stomach for that (no blame on the 
 release team for that!).

 I also don't mind doing the additional technical work of 
 cherry-picking only the fix for this bug and apply to 6:11-2 
 currently targeted Jessie.

 Which of those to do would probably need input from the person 
 willing to do the negotiation with release team, however.  So I await 
 someone volunteering for that (and while waiting will prepare that 
 new upstream release, and if noone have appeared before done release 
 it targeted experimental).

 I'm currently preparing the upload to unstable and will follow up with 
 the release team.

Great!

 - Jonas

-- 
 * Jonas Smedegaard - idealist  Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private


signature.asc
Description: signature


Bug#774242: libical1 1.0-1.2 breaks kalarm

2014-12-30 Thread Thilo Six
Package: libical1
Version: 1.0-1.1
Severity: critical
Justification: breaks unrelated software

Dear Maintainer,

after updating libical1 to 1.0-1.2 kalarm does not work anymore.
Manual downgrading libical1 back to 1.0-1.1 fixes this.
Setting high bug priority to prevent migration to jessie at this point of 
release.

If you need any more input let me know.

Bye Thilo


-- System Information:
Debian Release: 8.0
  APT prefers unstable
  APT policy: (400, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages libical1 depends on:
ii  libc6   2.19-13
ii  tzdata  2014j-1

libical1 recommends no packages.

libical1 suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#764630: marked as done (missing JNI multi-arch PATHs in jarwrapper)

2014-12-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Dec 2014 18:18:36 +
with message-id e1y61nm-0004gr...@franck.debian.org
and subject line Bug#764630: fixed in javatools 0.48
has caused the Debian Bug report #764630,
regarding missing JNI multi-arch PATHs in jarwrapper
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
764630: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=764630
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: dicomscope
Version: 3.6.0-11
Severity: important

Some dependency seems to be missing.

$ dicomscope 
starting DICOMscope
please wait...
Exception in thread main java.lang.UnsatisfiedLinkError: no jInterface in 
java.library.path
at java.lang.ClassLoader.loadLibrary(ClassLoader.java:1886)
at java.lang.Runtime.loadLibrary0(Runtime.java:849)
at java.lang.System.loadLibrary(System.java:1088)
at main.MainContext.clinit(MainContext.java:58)
at dicomscope.DICOMscope.main(DICOMscope.java:91)

-- System Information:
Debian Release: jessie/sid
  APT prefers testing
  APT policy: (700, 'testing'), (650, 'stable'), (600, 'unstable'), (550, 
'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.14-rc7-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages dicomscope depends on:
ii  default-jre  2:1.7-52
ii  jarwrapper   0.47
ii  libc62.19-11
ii  libdcmtk23.6.0-15+b1
ii  libgcc1  1:4.9.1-15
ii  libstdc++6   4.9.1-15
ii  tk [wish]8.6.0+8
ii  tk8.68.6.2-1

dicomscope recommends no packages.

dicomscope suggests no packages.

-- no debconf information
---End Message---
---BeginMessage---
Source: javatools
Source-Version: 0.48

We believe that the bug you reported is fixed in the latest version of
javatools, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 764...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Markus Koschany a...@gambaru.de (supplier of updated javatools package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 05 Dec 2014 10:38:23 +0100
Source: javatools
Binary: jarwrapper javahelper java-propose-classpath
Architecture: source all
Version: 0.48
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers 
pkg-java-maintain...@lists.alioth.debian.org
Changed-By: Markus Koschany a...@gambaru.de
Description:
 jarwrapper - Run executable Java .jar files
 java-propose-classpath - Helper script to suggest a classpath for jar files
 javahelper - Helper scripts for packaging Java programs
Closes: 764630
Changes:
 javatools (0.48) unstable; urgency=medium
 .
   * Team upload.
   * jarwrapper: Add MULTIARCH_LIBRARY_PATH variables for 32bit and 64bit arches
 which contain all known multiarch jni library paths and use this as
 value for -Djava.library.path depending on the JVM that is used to
 launch the application. Add an additional check for the GIJ bytecode
 interpreter and let it handle the library path by itself.
 This ensures that all JVM will find the corresponding libraries correctly.
 (Closes: #764630)
Checksums-Sha1:
 0759ab0e7c1cacb5adbebaf35bcbe81757c8272c 1968 javatools_0.48.dsc
 9cb1662da725b533e126e2e949731fb97afda5af 49948 javatools_0.48.tar.xz
 042c61bfe1792bd7d5637590bce7b039f054ddb0 17116 jarwrapper_0.48_all.deb
 094161b9fd023294b3f08e46bc4ba89c4c0bf148 84148 javahelper_0.48_all.deb
 03cb6102ad6a1cefa026f6b78c4096750dbbefe5 13796 
java-propose-classpath_0.48_all.deb
Checksums-Sha256:
 352cf4837d00483dc068ab6b0cb59470b7e04e93566838765eced4b85fedccfb 1968 
javatools_0.48.dsc
 e2e6eff0a563ded62a937265fe88a8308040e824586482272c703d010cce7626 49948 
javatools_0.48.tar.xz
 a5d177213261b366c44ad0d0ea998bdd79644819173aec40663bedbaed8bd8e0 17116 
jarwrapper_0.48_all.deb
 1d57d84fa33873c7c144d6a663f37825f00618e26c873fb897aa126f56d4b07b 84148 
javahelper_0.48_all.deb
 ff66f067d09f01a2812be25e5b90ac9f712197182254c88bb8d98447131bf86e 13796 
java-propose-classpath_0.48_all.deb
Files:
 ca2a05c00fd5148554eec0a36ff983dd 1968 java optional javatools_0.48.dsc
 

Bug#764630: RFS: javatools 0.48 [RC]

2014-12-30 Thread tony mancill
On 12/29/2014 02:15 PM, Markus Koschany wrote:
 On Sun, 21. Dec 09:57 tony mancill tmanc...@debian.org wrote:
 On 12/15/2014 12:06 AM, Mathieu Malaterre wrote:
 On Sun, Dec 14, 2014 at 6:50 PM, Markus Koschany a...@gambaru.de wrote:
 [...]
 Actually what was the reasoning behind the choice to use a custom shell
 script like jarwrapper instead of jexec to register executable jars with
 binfmt-misc? This question also came up in the bug report.

 Here is my guess:
 `jexec` only works with openjdk installed. At one point debian had
 multiple java implementation (sun, kaffe...). These days only two
 really remains, so maybe an easier solution would be to have a
 `gcj-exec` provided by `gcj-jdk` to mimic openjdk package. Which means
 it would be much easier to handle the LD_LIBRARY_PATH issue within the
 `gcj-exec` executable.

 jarwrapper is only really needed with a custom jre installation...

 That sounds reasonable to me, although it can be hard in practice to
 keep things functional for users running non-Debian JRE packages.  Which
 is not to say that we shouldn't generally discourage jarwrapper...
 
 I think before we create another solution like gcj-exec, it is easier to
 maintain the current implementation of jarwrapper. I agree that gcj's
 handling of LD_LIBRARY_PATH and Multiarch could be improved but in my
 opinion there are other aspects about gcj which deserve even more
 attention. Most modern Java applications just don't work with it.
 
 I suggest to upload the fix for #764630 now. I just saw tony's email
 from the 21th. The current state on master is final. I haven't planned
 any further changes to jarwrapper. Please go ahead.

Uploaded to unstable.  Markus, would you be willing to file the unblock
request for this bug?  Attached are the debdiffs for the upload I
performed.  As the author of this change, you're in the best position to
discuss specifics with the Release Team if there are any questions.

If you'd rather not, please let me know and I'll do it.  I think we want
this change for jessie, if that's still possible.

Thank you,
tony




diff -Nru javatools-0.47/debian/changelog javatools-0.48/debian/changelog
--- javatools-0.47/debian/changelog	2014-09-10 13:42:21.0 -0700
+++ javatools-0.48/debian/changelog	2014-12-11 22:44:41.0 -0800
@@ -1,3 +1,16 @@
+javatools (0.48) unstable; urgency=medium
+
+  * Team upload.
+  * jarwrapper: Add MULTIARCH_LIBRARY_PATH variables for 32bit and 64bit arches
+which contain all known multiarch jni library paths and use this as
+value for -Djava.library.path depending on the JVM that is used to
+launch the application. Add an additional check for the GIJ bytecode
+interpreter and let it handle the library path by itself.
+This ensures that all JVM will find the corresponding libraries correctly.
+(Closes: #764630)
+
+ -- Markus Koschany a...@gambaru.de  Fri, 05 Dec 2014 10:38:23 +0100
+
 javatools (0.47) unstable; urgency=medium
 
   * Team upload.
diff -Nru javatools-0.47/jarwrapper javatools-0.48/jarwrapper
--- javatools-0.47/jarwrapper	2014-09-10 12:33:53.0 -0700
+++ javatools-0.48/jarwrapper	2014-12-11 22:44:41.0 -0800
@@ -19,7 +19,7 @@
 JAVAOPTS=$(perl -0nE 's{\r?\n\s}{}gsm; print $1 if m{^Debian-Java-Parameters:\s*([^\r\n]+)}m;' $TEMP/META-INF/MANIFEST.MF)
 rm -rf $TEMP
 
-for i in $NEW_JAVA_HOMES; do 
+for i in $NEW_JAVA_HOMES; do
if [ -x $i/bin/java ]; then
   JAVA=$i/bin/java
   JAVA_HOME=$i
@@ -33,9 +33,25 @@
JAVA=java
 fi
 
+MULTIARCH_LIBRARY_PATH_32BIT=/usr/lib/jni:/usr/lib/arm-linux-gnueabi/jni:/usr/lib/arm-linux-gnueabihf/jni:/usr/lib/i386-gnu/jni:/usr/lib/i386-linux-gnu/jni:/usr/lib/i386-kfreebsd-gnu/jni:/usr/lib/mips-linux-gnu/jni:/usr/lib/mipsel-linux-gnu/jni:/usr/lib/powerpc-linux-gnu/jni:/usr/lib/powerpc-linux-gnuspe/jni:/usr/lib/sparc-linux-gnu/jni:/usr/lib/x86_64-linux-gnux32/jni:/usr/lib/hppa-linux-gnu/jni:/usr/lib/sh4-linux-gnu/jni:/usr/lib/m68k-linux-gnu/jni
+
+MULTIARCH_LIBRARY_PATH_64BIT=/usr/lib/jni:/usr/lib/alpha-linux-gnu/jni:/usr/lib/x86_64-linux-gnu/jni:/usr/lib/aarch64-linux-gnu/jni:/usr/lib/x86_64-kfreebsd-gnu/jni:/usr/lib/powerpc64-linux-gnu/jni:/usr/lib/powerpc64le-linux-gnu/jni:/usr/lib/s390x-linux-gnu/jni:/usr/lib/sparc64-linux-gnu/jni
+
 if which $JAVA /dev/null 21; then
-	export LD_LIBRARY_PATH=/usr/lib/jni 
-	exec $JAVA $JAVAOPTS -Djava.library.path=/usr/lib/jni -jar $JAR $@
+if java --version 21 | grep GNU libgcj  /dev/null; then
+# Let GNU gij handle the library path by itself
+export LD_LIBRARY_PATH=/usr/lib/jni
+exec $JAVA $JAVAOPTS -jar $JAR $@
+fi
+if java -d32 21 | grep does not support  /dev/null; then
+# 64bit
+export LD_LIBRARY_PATH=$MULTIARCH_LIBRARY_PATH_64BIT
+exec $JAVA $JAVAOPTS -Djava.library.path=$MULTIARCH_LIBRARY_PATH_64BIT -jar $JAR $@
+else
+# 32bit
+export LD_LIBRARY_PATH=$MULTIARCH_LIBRARY_PATH_32BIT
+exec $JAVA $JAVAOPTS 

Bug#766700: marked as done (pidgin-encryption: Please default to stronger keys)

2014-12-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Dec 2014 18:49:49 +
with message-id e1y61rz-yy...@franck.debian.org
and subject line Bug#766700: fixed in pidgin-encryption 3.1-1.1
has caused the Debian Bug report #766700,
regarding pidgin-encryption: Please default to stronger keys
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
766700: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766700
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package:  pidgin-encryption
Version: 3.1-1:amd64
Severity: important

Dear Maintainer,

Pidgin-encryption generates 1024 bit keys by default, while they are
now considered to be weak.
Please switch to defaulting to 4096 bit keys.

I'm setting severity to important since the aim of this package is
providing strong security with little work, thus IMO the defaults
should provide strong encryption.

Cheers,
Balint
---End Message---
---BeginMessage---
Source: pidgin-encryption
Source-Version: 3.1-1.1

We believe that the bug you reported is fixed in the latest version of
pidgin-encryption, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 766...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Balint Reczey bal...@balintreczey.hu (supplier of updated pidgin-encryption 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 25 Dec 2014 13:43:08 +0100
Source: pidgin-encryption
Binary: pidgin-encryption
Architecture: source
Version: 3.1-1.1
Distribution: unstable
Urgency: medium
Maintainer: Leo Costela cost...@debian.org
Changed-By: Balint Reczey bal...@balintreczey.hu
Description:
 pidgin-encryption - pidgin plugin that provides transparent encryption
Closes: 766700
Changes:
 pidgin-encryption (3.1-1.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Default to 4096 bits when creating new keys (Closes: #766700)
   * Pass hardening flags to configure
Checksums-Sha1:
 685a02ef257b9883616f4cd23a813eeb43ec 1851 pidgin-encryption_3.1-1.1.dsc
 e0bc6acec89b1ecc3ee6cbfff474e9cdaf253862 5240 
pidgin-encryption_3.1-1.1.debian.tar.xz
Checksums-Sha256:
 0142c5653a223c5812885caf0a9480b3b390632002f68a9c5facd48ce2879bbe 1851 
pidgin-encryption_3.1-1.1.dsc
 b1bfe8f3f4aca2d0f7b1a1ebb5305ed100cba0cf9895a431c0530f327af7b70a 5240 
pidgin-encryption_3.1-1.1.debian.tar.xz
Files:
 b9a1e16cb6dafb62386614ecaafa9b96 1851 net optional 
pidgin-encryption_3.1-1.1.dsc
 54d6ac7be9193172321e7755592e21fb 5240 net optional 
pidgin-encryption_3.1-1.1.debian.tar.xz

-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQIcBAEBAgAGBQJUnEq6AAoJEPZk0la0aRp9jMcP/jBviJZf7P45euoBnu4fXOUO
mYEsJaxnNrXQPmIXFmcpTFRVjQYGnkk+KmnDxrf1ALASKHhKNzNOQROZa7Gw0eVd
dvHRsQH9TtvSYpZGt1pRVAA3rjhLTSVPSc2iFYnX9CNToCUNgKpCtnAZs+6IaaTa
FFlQTugj2xv9TKf2dmmUkoiLF63J329vdSRe4UePoB77nLBDh+v/q/A/ssmOHjF9
Z1bPD8ZPSSO6APvwSsQGd+i3VaPtqo9TjDfgj/Hy00e6Zt5cspECOjKxPtm5HZa6
tGbKMDZVi/ljtLdTXSBf1ZVvzVCSvXYTOAKn7XeBGMMwIrM+qnHSJo9OxyCh3U6W
LmneVSh0eT0B71jzxSnXzpfldNZuGOI/l5XLhrpXynN5i0s6JjFyDpozHJfv1obk
R1arEIstXF1L5mmQYQs1CHyzdtdbPKnJZGk34TMmK5Wz5bPrmBQTrgWpMHIiVO/y
W/GK1IJ7DNwCG8+rU2d7O4sr87qDhPWUZfL25grk+L82NczjuSUu6a3bOA8tG4fz
Oh1b6HNMXXtG8gBcioPW/ltK6OVXC9IaEZXL9juGIVvk+oTjbMedjikctGT8uaUH
HogxBi0XiSl2HaJpe5BFj7JftqCkvNaJcgrdPO4mqzX5R6PqCtSb1+BbPOhTDnVE
y5ivdzQM6EeD5nUh1w79
=UZS8
-END PGP SIGNATUREEnd Message---


Bug#773806: marked as done (libdb5.3-java: Pre-installation script fails)

2014-12-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Dec 2014 18:49:18 +
with message-id e1y61r4-tn...@franck.debian.org
and subject line Bug#773806: fixed in db5.3 5.3.28-8
has caused the Debian Bug report #773806,
regarding libdb5.3-java: Pre-installation script fails
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
773806: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773806
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: libdb5.3-java
Version: 5.3.28-7~deb8u1
Severity: grave
Justification: prevents package from being installed/upgraded

Unfortunately, there is another[1] bug in libdb5.3-java.maintscript which
means that the package still can't be installed or, if an earlier version
is present, can't be upgraded. The error message is:

 dpkg-maintscript-helper: error: original symlink target is not an absolute 
 path

So, the target argument to symlink_to_dir must be an absolute path, i.e.
/usr/share/doc/libdb5.3 instead of just libdb5.3. See [2] for an
explanation of why this was changed in dpkg 1.17.13.

Ulrich

[1] http://bugs.debian.org/771877
[2] http://bugs.debian.org/758778

-- System Information:
Debian Release: 8.0
  APT prefers testing
  APT policy: (990, 'testing'), (800, 'unstable'), (100, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages libdb5.3-java depends on:
ii  dpkg   1.17.13
ii  libdb5.3-java-jni  5.3.28-7~deb8u1

libdb5.3-java recommends no packages.

Versions of packages libdb5.3-java suggests:
pn  libdb5.3-java-gcj  none

-- no debconf information
---End Message---
---BeginMessage---
Source: db5.3
Source-Version: 5.3.28-8

We believe that the bug you reported is fixed in the latest version of
db5.3, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 773...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ondřej Surý ond...@debian.org (supplier of updated db5.3 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 30 Dec 2014 18:20:12 +0100
Source: db5.3
Binary: db5.3-doc libdb5.3-dev libdb5.3 db5.3-util db5.3-sql-util libdb5.3++ 
libdb5.3++-dev libdb5.3-tcl libdb5.3-dbg libdb5.3-java-jni libdb5.3-java 
libdb5.3-java-gcj libdb5.3-java-dev libdb5.3-sql-dev libdb5.3-sql 
libdb5.3-stl-dev libdb5.3-stl
Architecture: source all
Version: 5.3.28-8
Distribution: unstable
Urgency: medium
Maintainer: Debian Berkeley DB Group pkg-db-de...@lists.alioth.debian.org
Changed-By: Ondřej Surý ond...@debian.org
Description:
 db5.3-doc  - Berkeley v5.3 Database Documentation [html]
 db5.3-sql-util - Berkeley v5.3 SQL Database Utilities
 db5.3-util - Berkeley v5.3 Database Utilities
 libdb5.3   - Berkeley v5.3 Database Libraries [runtime]
 libdb5.3++ - Berkeley v5.3 Database Libraries for C++ [runtime]
 libdb5.3++-dev - Berkeley v5.3 Database Libraries for C++ [development]
 libdb5.3-dbg - Berkeley v5.3 Database Libraries [debug]
 libdb5.3-dev - Berkeley v5.3 Database Libraries [development]
 libdb5.3-java - Berkeley v5.3 Database Libraries for Java
 libdb5.3-java-dev - Berkeley v5.3 Database Libraries for Java [development]
 libdb5.3-java-gcj - Berkeley v5.3 Database Libraries for Java (native code)
 libdb5.3-java-jni - Berkeley v5.3 Database Libraries for Java
 libdb5.3-sql - Berkeley v5.3 Database Libraries [SQL runtime]
 libdb5.3-sql-dev - Berkeley v5.3 Database Libraries [SQL development]
 libdb5.3-stl - Berkeley v5.3 Database Libraries [STL runtime]
 libdb5.3-stl-dev - Berkeley v5.3 Database Libraries [STL development]
 libdb5.3-tcl - Berkeley v5.3 Database Libraries for Tcl [module]
Closes: 773806
Changes:
 db5.3 (5.3.28-8) unstable; urgency=medium
 .
   * Force dpkg-dev to 1.17.22 to have correct Pre-Depends (Closes: #773806)
Checksums-Sha1:
 9acfa9e09e2270ea33b72da1bbe4a0fa2a528205 3179 db5.3_5.3.28-8.dsc
 fe1fa912372031f68ba19fbd0c53455118eb97da 27608 db5.3_5.3.28-8.debian.tar.xz
 f8119c6724268a450dedf1281beb6f3019955f6b 19053500 db5.3-doc_5.3.28-8_all.deb
 

Processed: Re: Bug#768076: abcde: latest upstream version breaks eyeD3 usage

2014-12-30 Thread Debian Bug Tracking System
Processing control commands:

 merge 768076 772778
Bug #768076 [abcde] abcde: latest upstream version breaks eyeD3 usage
Bug #772778 [abcde] abcde: Tagging mp3 fails with eyeD3  - version conflict
Added tag(s) upstream.
Merged 768076 772778
 severity 768076 grave
Bug #768076 [abcde] abcde: latest upstream version breaks eyeD3 usage
Bug #772778 [abcde] abcde: Tagging mp3 fails with eyeD3  - version conflict
Severity set to 'grave' from 'normal'
Severity set to 'grave' from 'normal'
 tags 768076 + patch
Bug #768076 [abcde] abcde: latest upstream version breaks eyeD3 usage
Bug #772778 [abcde] abcde: Tagging mp3 fails with eyeD3  - version conflict
Added tag(s) patch.
Added tag(s) patch.

-- 
768076: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768076
772778: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772778
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#768076: abcde: latest upstream version breaks eyeD3 usage

2014-12-30 Thread Debian Bug Tracking System
Processing control commands:

 merge 768076 772778
Bug #768076 [abcde] abcde: latest upstream version breaks eyeD3 usage
Bug #772778 [abcde] abcde: Tagging mp3 fails with eyeD3  - version conflict
Bug #772778 [abcde] abcde: Tagging mp3 fails with eyeD3  - version conflict
Merged 768076 772778
 severity 768076 grave
Bug #768076 [abcde] abcde: latest upstream version breaks eyeD3 usage
Bug #772778 [abcde] abcde: Tagging mp3 fails with eyeD3  - version conflict
Ignoring request to change severity of Bug 768076 to the same value.
Ignoring request to change severity of Bug 772778 to the same value.
 tags 768076 + patch
Bug #768076 [abcde] abcde: latest upstream version breaks eyeD3 usage
Bug #772778 [abcde] abcde: Tagging mp3 fails with eyeD3  - version conflict
Ignoring request to alter tags of bug #768076 to the same tags previously set
Ignoring request to alter tags of bug #772778 to the same tags previously set

-- 
768076: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768076
772778: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772778
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#772778: Bug#768076: abcde: latest upstream version breaks eyeD3 usage

2014-12-30 Thread Samuel Thibault
Control: merge 768076 772778
Control: severity 768076 grave
Control: tags 768076 + patch

Hello,

I can confirm the issue: abcde just can't work ATM because when using
eyeD3, it passes --encoding and --text-frame, instead of what the
current debian version of eyeD3 expects: --set-encoding and
--set-text-frame.

Also, I don't see abcde being able to use id3v2 any more for ID3
tags.  This gravely reduces the usefulness of the package.

The attached patch fixed the behavior for me, with eyed3  0.7. Of
course, when eyed3 = 0.7 gets uploaded to Debian, this will have to be
reverted, thus putting a versioned suggestion.

Samuel
--- a/abcde
+++ b/abcde
@@ -835,8 +835,8 @@ do_tag ()
-a $TRACKARTIST -t 
$TRACKNAME ${CDYEAR:+-Y $CDYEAR} \
-G $GENREID -n 
${TRACKNUM:-$1} \
${TRACKNUM:+-N $TRACKS} \
-   
${ENCODING:+--encoding=$ENCODING} \
-   
${TPE2:+--text-frame=TPE2:$TPE2} \
+   
${ENCODING:+--set-encoding=$ENCODING} \
+   
${TPE2:+--set-text-frame=TPE2:$TPE2} \
$ABCDETEMPDIR/track$1.$OUTPUT
;;
# FIXME # Still not activated...
@@ -3324,7 +3324,7 @@ ID3OPTS=
 # FIXME # Older versions of eyeD3 ( 0.7.0) expect --set-encoding=utf16-LE
 # so perhaps some version sniffing would be useful. Or perhaps it might be
 # better to simply cut ties with the older eyeD3... Andrew.
-EYED3OPTS=--encoding utf16
+EYED3OPTS=--set-encoding utf16
 CDPARANOIAOPTS=
 CDDA2WAVOPTS=
 DAGRABOPTS=
--- debian/control.original 2014-12-30 19:49:39.514180740 +0100
+++ debian/control  2014-12-30 19:49:58.117642148 +0100
@@ -12,7 +12,7 @@
 Architecture: all
 Depends: ${misc:Depends}, cd-discid, wget, cdparanoia | icedax, vorbis-tools 
(= 1.0beta4-1) | lame | flac | bladeenc | speex | musepack-tools | opus-tools
 Recommends: vorbis-tools, libmusicbrainz-discid-perl, 
libwebservice-musicbrainz-perl, libdigest-sha-perl, bsd-mailx
-Suggests: eject, distmp3, id3 (= 0.12), id3v2, eyed3, normalize-audio, 
vorbisgain, mkcue, mp3gain, atomicparsley
+Suggests: eject, distmp3, id3 (= 0.12), id3v2, eyed3 ( 0.7~), 
normalize-audio, vorbisgain, mkcue, mp3gain, atomicparsley
 Description: A Better CD Encoder
  frontend program to cdparanoia, wget, cd-discid, id3, and your favorite
  Ogg/Vorbis, MP3, FLAC, Ogg/Speex and/or MPP/MP+(Musepack) encoder (defaults 


Bug#764630: RFS: javatools 0.48 [RC]

2014-12-30 Thread Markus Koschany
On 30.12.2014 19:19, tony mancill wrote:
[...]
 Uploaded to unstable.  Markus, would you be willing to file the unblock
 request for this bug?  

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774255

Done. Thanks for the upload tony!





signature.asc
Description: OpenPGP digital signature


Bug#772815: marked as done (pyyaml: CVE-2014-9130)

2014-12-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Dec 2014 21:17:20 +
with message-id e1y64ak-0003aw...@franck.debian.org
and subject line Bug#772815: fixed in pyyaml 3.10-4+deb7u1
has caused the Debian Bug report #772815,
regarding pyyaml: CVE-2014-9130
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
772815: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772815
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: pyyaml
Severity: grave
Tags: security

Hi,
CVE-2014-9130 from libyaml also affects pyyaml. I'm attaching a short
reproducer.

Cheers,
Moritz
import yaml
import codecs

with codecs.open('CVE-2014-9130.yaml', 'r') as stream:
	foo = yaml.load(stream)
	for key, value in foo.items():
		setattr(self, key, value)
abc: 
   def: 'xxx
'  ghi: 'yyy'---End Message---
---BeginMessage---
Source: pyyaml
Source-Version: 3.10-4+deb7u1

We believe that the bug you reported is fixed in the latest version of
pyyaml, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 772...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Muehlenhoff j...@debian.org (supplier of updated pyyaml package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sun, 28 Dec 2014 23:35:53 +0100
Source: pyyaml
Binary: python-yaml python-yaml-dbg python3-yaml python3-yaml-dbg
Architecture: source amd64
Version: 3.10-4+deb7u1
Distribution: wheezy-security
Urgency: medium
Maintainer: Debian Python Modules Team 
python-modules-t...@lists.alioth.debian.org
Changed-By: Moritz Muehlenhoff j...@debian.org
Description: 
 python-yaml - YAML parser and emitter for Python
 python-yaml-dbg - YAML parser and emitter for Python (debug build)
 python3-yaml - YAML parser and emitter for Python3
 python3-yaml-dbg - YAML parser and emitter for Python3 (debug build)
Closes: 772815
Changes: 
 pyyaml (3.10-4+deb7u1) wheezy-security; urgency=medium
 .
   * CVE-2014-9130, patch by Thorsten Alteholz (Closes: #772815)
Checksums-Sha1: 
 d66b30c9e327438aacfa4785a28a3ff65a991f07 2193 pyyaml_3.10-4+deb7u1.dsc
 476dcfbcc6f4ebf3c06186229e8e2bd7d7b20e73 241524 pyyaml_3.10.orig.tar.gz
 60b7c5e6920684c273bd1c489469c67176cd08ee 6535 pyyaml_3.10-4+deb7u1.diff.gz
 aa88f35bb1c5e09814f56265cd73a006d97605d8 176034 
python-yaml_3.10-4+deb7u1_amd64.deb
 12ff228a192c1687fd8afcd4c4f2605e21cd57ae 168636 
python-yaml-dbg_3.10-4+deb7u1_amd64.deb
 e5975a56983da44d57409d490f6858e153cd40f5 105238 
python3-yaml_3.10-4+deb7u1_amd64.deb
 5d5fcc15ea2f9a8a9982c004286691009520bfa7 84276 
python3-yaml-dbg_3.10-4+deb7u1_amd64.deb
Checksums-Sha256: 
 9190dc62f7a85a9d6761795ddc2efbc35b5a28413966468dc00899e5af5938da 2193 
pyyaml_3.10-4+deb7u1.dsc
 e713da45c96ca53a3a8b48140d4120374db622df16ab71759c9ceb5b8d46fe7c 241524 
pyyaml_3.10.orig.tar.gz
 62bf97dc495ca6a9c251a12271f9dc472f39b5739fcb1c4bb73caf1687fb0ecc 6535 
pyyaml_3.10-4+deb7u1.diff.gz
 c47bd55ee5a7ba19b403fc090075ca079b37db43f5128ca5a396d8b3f06a30f5 176034 
python-yaml_3.10-4+deb7u1_amd64.deb
 34fd8e9952193c8fca48924316e0d90937db0efa98b03bbe14bd2ab9fc7b3001 168636 
python-yaml-dbg_3.10-4+deb7u1_amd64.deb
 7a7969149dad1a77a8973965d0586590101da6ed00ea1d991779459f021b0e24 105238 
python3-yaml_3.10-4+deb7u1_amd64.deb
 ba022dd06d2c687e3fcefb2b494c4c499d748dc499243d035ffeb469ae2e7d44 84276 
python3-yaml-dbg_3.10-4+deb7u1_amd64.deb
Files: 
 4180e6eb4c4c1f011e9580057d82ad15 2193 python optional pyyaml_3.10-4+deb7u1.dsc
 74c94a383886519e9e7b3dd1ee540247 241524 python optional pyyaml_3.10.orig.tar.gz
 e1f3b69f2d3b7167f2bfac403ce99f40 6535 python optional 
pyyaml_3.10-4+deb7u1.diff.gz
 ca2eb20c56eaf7779fb10171f4cee9b6 176034 python optional 
python-yaml_3.10-4+deb7u1_amd64.deb
 99210f59b004904651a1ace9d1593c98 168636 debug extra 
python-yaml-dbg_3.10-4+deb7u1_amd64.deb
 ab74da300825221025233d102407b605 105238 python optional 
python3-yaml_3.10-4+deb7u1_amd64.deb
 3193abd088987ee27fed04a71bfd9928 84276 debug extra 
python3-yaml-dbg_3.10-4+deb7u1_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIcBAEBAgAGBQJUoIwXAAoJEBDCk7bDfE427z0P/2oP6tBxtKdvFj2x+p1j+xVp
kgmSzT/W1jexhIogVzoQ0SDjjo7uFH8B/Z0JoRxS/85wyIvN4kXXLF3/KL9ciT50

Bug#773785: marked as done (unzip: FTBFS on armhf)

2014-12-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Dec 2014 21:51:59 +
with message-id e1y64hr-0007om...@franck.debian.org
and subject line Bug#773785: fixed in unzip 6.0-14
has caused the Debian Bug report #773785,
regarding unzip: FTBFS on armhf
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
773785: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773785
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
package: unzip
version: 6.0-13
severity: serious

Hi,

The latest upload of unzip fails on armhf. This blocks migration to testing.

https://buildd.debian.org/status/package.php?p=unzip

Cheers,

Ivo
---End Message---
---BeginMessage---
Source: unzip
Source-Version: 6.0-14

We believe that the bug you reported is fixed in the latest version of
unzip, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 773...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Santiago Vila sanv...@debian.org (supplier of updated unzip package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 30 Dec 2014 22:17:12 +0100
Source: unzip
Binary: unzip
Architecture: source amd64
Version: 6.0-14
Distribution: unstable
Urgency: medium
Maintainer: Santiago Vila sanv...@debian.org
Changed-By: Santiago Vila sanv...@debian.org
Description:
 unzip  - De-archiver for .zip files
Closes: 773785
Changes:
 unzip (6.0-14) unstable; urgency=medium
 .
   * Drop -O2 optimization on armhf as a workaround for gcc Bug #764732.
 Closes: #773785.
Checksums-Sha1:
 45d734aea62a601dfea4288b8474684beeb38190 1311 unzip_6.0-14.dsc
 d0eb2e1723dd03276fb8aa02f726747da67e675c 13608 unzip_6.0-14.debian.tar.xz
 854a35442f0836f713fac66c91fb5e47ce9dfba3 160796 unzip_6.0-14_amd64.deb
Checksums-Sha256:
 d68b75cd0db65507a2f6f4ab427bb272bb8774aa51ee20153c74fafca73c7db0 1311 
unzip_6.0-14.dsc
 75810cc21a6f1e4ccbe69042be567c658abe45def9f9e8358ceca17149adcd9f 13608 
unzip_6.0-14.debian.tar.xz
 6a12033b9cd6b508da6eab87a8ae11ea9aa0f143d4797610b7ea22bf3f9ef695 160796 
unzip_6.0-14_amd64.deb
Files:
 e0395bcb0ffee66f9fcb6a032214f32c 1311 utils optional unzip_6.0-14.dsc
 106ec6e7b3cfd9c05765af09cc0d4312 13608 utils optional 
unzip_6.0-14.debian.tar.xz
 b7050d27077be2480ca64eecb546d389 160796 utils optional unzip_6.0-14_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCAAGBQJUoxaeAAoJEEHOfwufG4syePMH/2MObU/eChM2/aldSkH2YwYW
agyivPgB3EsdsZgxHcFMBBMWFxa94s0bleFgubJqZkaMWmPJQkEe5CEgL1T+yk9R
SFXzYu6AST78gs4lwJqSnhUE2Gf+TkPKoxdJBNNnZyrOKFFm5x8cvLbMkL3FsUu6
StN88utcImyMcCnkj/m6AK7t4tZWgFFq5yvj6q0BG6VX10ptw+r5/aHb+hiViDN0
2zuUXtksD2Aoxsoz4lvkJPqeTsmjfJ3ltl2q7c9oDU0vZjIp59RUt04fu+uAl4V6
2GxSI39/pe+vQxgyKXKCKCVrlkZX4HQ8g+oyqYlG0aoYcFxXvhAdzbI+M9FsthQ=
=PQt4
-END PGP SIGNATUREEnd Message---


Bug#774264: dvb-apps: Source not available

2014-12-30 Thread David Liontooth
Package: dvb-apps
Version: 1.1.1+rev1500-1
Severity: serious
Justification: Policy 4.13

Dear Maintainer,

For some reason the source package appears not to be available for dvb-apps -- 
I tried wheezy and testing:

# apt-get source dvb-apps/testing
Reading package lists... Done
Building dependency tree   
Reading state information... Done
Picking 'linuxtv-dvb-apps' as source package instead of 'dvb-apps'
E: Ignore unavailable version '1.1.1+rev1500-1' of package 'dvb-apps'
E: Unable to find a source package for linuxtv-dvb-apps

I may be missing something, but this looks like a violation of Debian policy 
(and GPL).

Cheers,
David


-- System Information:
Debian Release: jessie/sid
  APT prefers stable
  APT policy: (990, 'stable'), (500, 'unstable'), (500, 'testing'), (500, 
'oldstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.12.24 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=ISO-8859-1) (ignored: 
LC_ALL set to en_US)
Shell: /bin/sh linked to /bin/dash

Versions of packages dvb-apps depends on:
ii  dtv-scan-tables  0+git20141218.b46a22c-1
ii  libc62.18-5
ii  libpng12-0   1.2.49-1
ii  libx11-6 2:1.5.0-1+deb7u1
ii  libzvbi0 0.2.33-6
ii  udev 175-7.2
ii  zlib1g   1:1.2.8.dfsg-1

dvb-apps recommends no packages.

dvb-apps suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#774264: marked as done (dvb-apps: Source not available)

2014-12-30 Thread Debian Bug Tracking System
Your message dated Wed, 31 Dec 2014 00:10:27 +0100
with message-id 20141230231027.gg7...@ramacher.at
and subject line Re: Bug#774264: dvb-apps: Source not available
has caused the Debian Bug report #774264,
regarding dvb-apps: Source not available
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
774264: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774264
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: dvb-apps
Version: 1.1.1+rev1500-1
Severity: serious
Justification: Policy 4.13

Dear Maintainer,

For some reason the source package appears not to be available for dvb-apps -- 
I tried wheezy and testing:

# apt-get source dvb-apps/testing
Reading package lists... Done
Building dependency tree   
Reading state information... Done
Picking 'linuxtv-dvb-apps' as source package instead of 'dvb-apps'
E: Ignore unavailable version '1.1.1+rev1500-1' of package 'dvb-apps'
E: Unable to find a source package for linuxtv-dvb-apps

I may be missing something, but this looks like a violation of Debian policy 
(and GPL).

Cheers,
David


-- System Information:
Debian Release: jessie/sid
  APT prefers stable
  APT policy: (990, 'stable'), (500, 'unstable'), (500, 'testing'), (500, 
'oldstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.12.24 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=ISO-8859-1) (ignored: 
LC_ALL set to en_US)
Shell: /bin/sh linked to /bin/dash

Versions of packages dvb-apps depends on:
ii  dtv-scan-tables  0+git20141218.b46a22c-1
ii  libc62.18-5
ii  libpng12-0   1.2.49-1
ii  libx11-6 2:1.5.0-1+deb7u1
ii  libzvbi0 0.2.33-6
ii  udev 175-7.2
ii  zlib1g   1:1.2.8.dfsg-1

dvb-apps recommends no packages.

dvb-apps suggests no packages.

-- no debconf information
---End Message---
---BeginMessage---
On 2014-12-30 14:07:38, David Liontooth wrote:
 Package: dvb-apps
 Version: 1.1.1+rev1500-1
 Severity: serious
 Justification: Policy 4.13
 
 Dear Maintainer,
 
 For some reason the source package appears not to be available for dvb-apps 
 -- I tried wheezy and testing:
 
 # apt-get source dvb-apps/testing
 Reading package lists... Done
 Building dependency tree   
 Reading state information... Done
 Picking 'linuxtv-dvb-apps' as source package instead of 'dvb-apps'
 E: Ignore unavailable version '1.1.1+rev1500-1' of package 'dvb-apps'
 E: Unable to find a source package for linuxtv-dvb-apps
 
 I may be missing something, but this looks like a violation of Debian policy 
 (and GPL).

Looks like you do not have the appropriate deb-src lines in your
sources.list. apt-get(8) has the following bit about apt-get source:

  Source packages are tracked separately from binary packages via
  deb-src lines in the sources.list(5) file. This means that you will
  need to add such a line for each repository you want to get sources
  from; otherwise you will probably get either the wrong (too old/too
  new) source versions or none at all.

Cheers
-- 
Sebastian Ramacher


signature.asc
Description: Digital signature
---End Message---


Bug#773504: NMU patch on top of current GIT

2014-12-30 Thread Gaudenz Steinlin

Hi

Please find attached the patch on top of the current git tree on Alioth
for the NMU of version 2014.1.3-7.1.

If you add me to the Alioth project I can also push these changes myself.

Gaudenz

From 6f8528cc0cd4d7c2bd0a8f2519971acec310cdf9 Mon Sep 17 00:00:00 2001
From: Gaudenz Steinlin gaud...@soziologie.ch
Date: Tue, 30 Dec 2014 23:41:16 +0100
Subject: [PATCH] Fix changelog and add NMU version

The two last changelog entries don't belong to the -7 release which is
already uploaded. Also add bug number to changelog entry.
---
 debian/changelog | 14 ++
 1 file changed, 10 insertions(+), 4 deletions(-)

diff --git a/debian/changelog b/debian/changelog
index b0c0add..3f354cc 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,13 @@
+nova (2014.1.3-7.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Added avoid_changing_UUID_when_redefining_nwfilters.patch so that nova
+continues to work with libvirt = 1.2.7 (Closes: #773504).
+  * Updated the es.po debconf translation, thanks to jathan
+jathanblack...@openmailbox.org (Closes: #773483).
+
+ -- Gaudenz Steinlin gaud...@debian.org  Tue, 30 Dec 2014 23:41:04 +0100
+
 nova (2014.1.3-7) unstable; urgency=medium
 
   * Now init scripts depends on libvirtd and not libvirt-bin, as this has been
@@ -11,10 +21,6 @@ nova (2014.1.3-7) unstable; urgency=medium
 openstack-pkg-tools (= 20~).
   * Only calls pkgos_dbc_postinst if the user asked for dbconf-common
 management.
-  * Added avoid_changing_UUID_when_redefining_nwfilters.patch so that nova
-continues to work with libvirt = 1.2.7.
-  * Updated the es.po debconf translation, thanks to jathan
-jathanblack...@openmailbox.org (Closes: #773483).
 
  -- Thomas Goirand z...@debian.org  Wed, 10 Dec 2014 19:21:37 +0800
 
-- 
2.1.4



signature.asc
Description: PGP signature


Bug#773504: marked as done (python-nova: nwfilter-problem with libvirt = 1.2.7)

2014-12-30 Thread Debian Bug Tracking System
Your message dated Tue, 30 Dec 2014 23:21:27 +
with message-id e1y666r-0004yw...@franck.debian.org
and subject line Bug#773504: fixed in nova 2014.1.3-7.1
has caused the Debian Bug report #773504,
regarding python-nova: nwfilter-problem with libvirt = 1.2.7
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
773504: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773504
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: python-nova
Version: 2014.1.3-6
Severity: grave
Tags: upstream
Justification: renders package unusable

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?
Running openstack on jessie. Starting or migrating VMs leads to errors like

libvirtError: operation failed: filter 
'nova-instance-instance-0012-fa163e8eb435' already exists with uuid 
6b2b71c1-486c-4ef2-b0e3-1c0918bd317f

   * What exactly did you do (or not do) that was effective (or
 ineffective)?
Including patch from https://review.openstack.org/#/c/122721/


*** firewall.py.origThu Dec 18 14:20:43 2014
--- firewall.py Thu Dec 18 14:19:55 2014
***
*** 15,20 
--- 15,23 
  #License for the specific language governing permissions and limitations
  #under the License.
  
+ import uuid
+ 
+ from lxml import etree
  from oslo.config import cfg
  
  from nova.cloudpipe import pipelib
***
*** 59,89 
  return self._libvirt_get_connection()
  _conn = property(_get_connection)
  
! @staticmethod
! def nova_no_nd_reflection_filter():
  This filter protects false positives on IPv6 Duplicate Address
  Detection(DAD).
  
  return '''filter name='nova-no-nd-reflection' chain='ipv6'
!-- no nd reflection --
!-- drop if destination mac is v6 mcast mac addr and
 we sent it. --
! 
rule action='drop' direction='in'
mac dstmacaddr='33:33:00:00:00:00'
 dstmacmask='ff:ff:00:00:00:00' srcmacaddr='$MAC'/
/rule
!   /filter'''
  
! @staticmethod
! def nova_dhcp_filter():
  The standard allow-dhcp-server filter is an ip one, so it uses
 ebtables to allow traffic through. Without a corresponding rule in
 iptables, it'll get blocked anyway.
  
! 
  return '''filter name='nova-allow-dhcp-server' chain='ipv4'
! uuid891e4787-e5c0-d59b-cbd6-41bc3c6b36fc/uuid
  rule action='accept' direction='out'
priority='100'
udp srcipaddr='0.0.0.0'
--- 62,91 
  return self._libvirt_get_connection()
  _conn = property(_get_connection)
  
! def nova_no_nd_reflection_filter(self):
  This filter protects false positives on IPv6 Duplicate Address
  Detection(DAD).
  
+ uuid = self._get_filter_uuid('nova-no-nd-reflection')
  return '''filter name='nova-no-nd-reflection' chain='ipv6'
!-- no nd reflection --
!-- drop if destination mac is v6 mcast mac addr and
 we sent it. --
!   uuid%s/uuid
rule action='drop' direction='in'
mac dstmacaddr='33:33:00:00:00:00'
 dstmacmask='ff:ff:00:00:00:00' srcmacaddr='$MAC'/
/rule
!   /filter''' % uuid
  
! def nova_dhcp_filter(self):
  The standard allow-dhcp-server filter is an ip one, so it uses
 ebtables to allow traffic through. Without a corresponding rule in
 iptables, it'll get blocked anyway.
  
! uuid = self._get_filter_uuid('nova-allow-dhcp-server')
  return '''filter name='nova-allow-dhcp-server' chain='ipv4'
! uuid%s/uuid
  rule action='accept' direction='out'
priority='100'
udp srcipaddr='0.0.0.0'
***
*** 97,103 
 srcportstart='67'
 dstportstart='68'/
  /rule
!   /filter'''
  
  def setup_basic_filtering(self, instance, network_info):
  Set up basic filtering (MAC, IP, and ARP spoofing protection).
--- 99,105 
 srcportstart='67'
 dstportstart='68'/

Bug#773768: pandoc upload

2014-12-30 Thread Jonas Smedegaard
[responding to bug rather than (directly) our list]

Quoting Joachim Breitner (2014-12-31 00:35:49)
 Am Dienstag, den 30.12.2014, 20:42 +0100 schrieb Jonas Smedegaard:
 Did you find out anything new about your ghc/linker problems?

 Nope :-(

 I guess the suggestion these days would be: Can you reproduce it with 
 a Dockerfile that you can share with us?

I don't mind you pointing me to some guide on how to mimick with docker 
the routines pbuilder and cowbuilder have done flawlessly for years - 
just for some mysterious reason no longer with Haskell.

I won't promise when I will take time to explore such alternative setup, 
nor that I will like it and change - but I am not against it, just have 
absolute zero experience with that fancy new approach.


 - Jonas

-- 
 * Jonas Smedegaard - idealist  Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private


signature.asc
Description: signature


Processed: severity of 774257 is serious

2014-12-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 774257 serious
Bug #774257 [gnome-control-center] Configuring a printer does not work without 
system-config-printer
Severity set to 'serious' from 'normal'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
774257: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774257
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#773806: libdb5.3-java: Pre-installation script fails

2014-12-30 Thread Guillem Jover
Hi!

On Tue, 2014-12-30 at 18:42:42 +0100, Ondřej Surý wrote:
 JFTR This is caused by older dpkg ( 1.17.22) that didn't set
 ${misc:Pre-Depends} to = 1.17.14.

dpkg never sets misc:Pre-Depends, that's debhelper, so this fix
is not correct.

 On Tue, Dec 30, 2014, at 15:50, Ondřej Surý wrote:
  and the ${misc:Pre-Depends} was fixed in 1.17.22:
  
  dpkg (1.17.22) unstable; urgency=low
  [...]
* Bump minimal version for dir_to_symlink and symlink_to_dir commands
  to 1.17.14 in dpkg-maintscript-helper(1) man page. Closes: #769843
  
  So libdb5.3-java just needs binNMU with dpkg 1.17.22.

Nope, as the changelog says, that was just a man page update. The fix
you are looking for is:

,---
debhelper (9.20141221) unstable; urgency=medium

  [ Niels Thykier ]
  * dh_installdeb: Raise required dpkg version for dir_to_symlink to
1.17.13 (see #769843, msg #10).  Thanks to Guillem Jover.
…

  [ Axel Beckert ]
  * dh_installdeb: Raise required dpkg version for symlink_to_dir to
1.17.14. It is needed in case of relative symlinks. (Closes: #770245)

 -- Niels Thykier ni...@thykier.net  Sun, 21 Dec 2014 21:21:18 +0100
`---

Thanks,
Guillem


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org