Bug#781298: missing Built-Using: qt4-x11
Package: fw4spl Version: 0.9.2-1 Severity: serious Justification: policy 7.8 fw4spl copies parts of libqt4-qt3support during build: http://dedup.debian.net/compare/fw4spl/libqt4-qt3support It therefore must list qt4-x11 in Built-Using according to the Debian policy section 7.8. Of course, the better solution here is not to copy libraries libqt4-qt3support in the first place. You may be able to do with symbolic links and a suitable dependency. If you choose to keep that copy, please also register your embedded copy with the security tracker: https://wiki.debian.org/EmbeddedCodeCopies Helmut -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#779660: marked as done (ruby-actionpack-page-caching: fails to upgrade from 'wheezy' - trying to overwrite /usr/lib/ruby/vendor_ruby/action_controller/caching/pages.rb)
Your message dated Fri, 27 Mar 2015 11:19:20 + with message-id e1ybsik-00045c...@franck.debian.org and subject line Bug#779660: fixed in ruby-actionpack-page-caching 1.0.2-2 has caused the Debian Bug report #779660, regarding ruby-actionpack-page-caching: fails to upgrade from 'wheezy' - trying to overwrite /usr/lib/ruby/vendor_ruby/action_controller/caching/pages.rb to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 779660: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779660 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: ruby-actionpack-page-caching Version: 1.0.2-1 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Hi, during a test with piuparts I noticed your package fails to upgrade from 'wheezy'. It installed fine in 'wheezy', then the upgrade to 'sid' fails because it tries to overwrite other packages files without declaring a Breaks+Replaces relation. See policy 7.6 at https://www.debian.org/doc/debian-policy/ch-relationships.html#s-replaces From the attached log (scroll to the bottom...): Selecting previously unselected package ruby-actionpack. Unpacking ruby-actionpack (from .../ruby-actionpack_2%3a2.3.14.2_all.deb) ... Selecting previously unselected package ruby-actionpack-page-caching. Unpacking ruby-actionpack-page-caching (from .../ruby-actionpack-page-caching_1.0.2-1_all.deb) ... dpkg: error processing /var/cache/apt/archives/ruby-actionpack-page-caching_1.0.2-1_all.deb (--unpack): trying to overwrite '/usr/lib/ruby/vendor_ruby/action_controller/caching/pages.rb', which is also in package ruby-actionpack-2.3 2.3.14-5 Errors were encountered while processing: /var/cache/apt/archives/ruby-actionpack-page-caching_1.0.2-1_all.deb ruby-actionpack-2.3 is not part of jessie, but there is no upgrade path guarantee that this obsolete package will be removed on upgrades to from wheezy to jessie, so ruby-actionpack-page-caching (which will not be part of jessie either) will have to add the corresponding Breaks+Replaces: ruby-actionpack-2.3 anyway to ensure this package gets removed during the jessie-stretch upgrade path. cheers, Andreas ruby-actionpack-2.3=2.3.14-5_ruby-actionpack-page-caching=1.0.2-1.log.gz Description: application/gzip ---End Message--- ---BeginMessage--- Source: ruby-actionpack-page-caching Source-Version: 1.0.2-2 We believe that the bug you reported is fixed in the latest version of ruby-actionpack-page-caching, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 779...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Balasankar C balasank...@autistici.org (supplier of updated ruby-actionpack-page-caching package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 27 Mar 2015 16:45:08 +0530 Source: ruby-actionpack-page-caching Binary: ruby-actionpack-page-caching Architecture: source all Version: 1.0.2-2 Distribution: unstable Urgency: medium Maintainer: Debian Ruby Extras Maintainers pkg-ruby-extras-maintain...@lists.alioth.debian.org Changed-By: Balasankar C balasank...@autistici.org Description: ruby-actionpack-page-caching - static page caching for Action Pack (removed from core in Rails 4 Closes: 779660 Changes: ruby-actionpack-page-caching (1.0.2-2) unstable; urgency=medium . * Added Breaks+Replaces relation for ruby-actionpack-2.3 (Closes: #779660) Checksums-Sha1: cc62fb935dde2bce53de8eb2bf1991428672c265 1955 ruby-actionpack-page-caching_1.0.2-2.dsc 18d41724296522cf7a28a742c460a8b3f816a7e5 3028 ruby-actionpack-page-caching_1.0.2-2.debian.tar.xz 3d97d7847f41c9c7574e3d63cd9b2d35d04b4fbe 7182 ruby-actionpack-page-caching_1.0.2-2_all.deb Checksums-Sha256: 467bf34b0e78d4aeec119c39cff3d36f0f918449feb4c0b86f550a79c2a5b196 1955 ruby-actionpack-page-caching_1.0.2-2.dsc 325f6293651f790dfa66f64a1bdbd46b46e7b16b62a4928138133c2c94b4287c 3028 ruby-actionpack-page-caching_1.0.2-2.debian.tar.xz dcc86048659985b9e475e669e1012158f73d2322c9231efb811d877aad3adf52 7182 ruby-actionpack-page-caching_1.0.2-2_all.deb Files: 886da5f35cb2313550c7b1b5b7cb144e 1955 ruby optional
Bug#781306: makehuman: Immediate segmentation fault at launch
Package: makehuman Version: 1.0.0~alpha6-5+b1 Severity: grave Justification: renders package unusable Dear Maintainer, Launching makehuman from the Xfce menu, a terminal window is briefly seen, then nothing else happens. Launching makehuman in a terminal gives the following output: No antialiasing available, turning off antialiasing. /usr/bin/makehuman: line 2: 21015 Segmentation fault ../makehuman.real -- System Information: Debian Release: 8.0 APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.16.3-2015-03-12-14.59 Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages makehuman depends on: ii fontconfig2.11.0-6.3 ii libc6 2.19-15 ii libgl1-mesa-glx [libgl1] 10.3.2-1 ii libglew1.10 1.10.0-3 ii libglu1-mesa [libglu1]9.0.0-2 ii libpython2.7 2.7.9-2 ii libsdl-image1.2 1.2.12-5+b5 ii libsdl1.2debian 1.2.15-10+b1 ii libx11-6 2:1.6.2-3 ii makehuman-data1.0.0~alpha6-5 pn python2.7:any none pn python:anynone Versions of packages makehuman recommends: pn aqsis none Versions of packages makehuman suggests: pn makehuman-doc none -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#756581: marked as done (Not fit for Jessie)
Your message dated Fri, 27 Mar 2015 13:01:39 + with message-id e1ybttl-000609...@franck.debian.org and subject line Bug#781261: Removed package(s) from unstable has caused the Debian Bug report #756581, regarding Not fit for Jessie to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 756581: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756581 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: php-phpdocx Severity: serious [Filled as an RC-bug by the maintainer to exclude package from testing] php-phpdocx has been introduced as an owncloud dependency, but no package depends on it anymore. Upstream does not really maintain the community version, and does not really care about security either: All vendors except PHPDocX have released an update. PHPDocX states that the admin is responsible to validate the DOCX document and is considering this as won't fix. http://owncloud.org/security/advisory/?id=oc-sa-2014-006 (about CVE-2014-2056, fixed in Debian) There is little point to release it with Jessie, especially without someone willing to maintain it, including security-wise (see: #748605). Regards David signature.asc Description: Digital signature ---End Message--- ---BeginMessage--- Version: 3.0+dfsg-2+rm Dear submitter, as the package phpdocx has just been removed from the Debian archive unstable we hereby close the associated bug reports. We are sorry that we couldn't deal with your issue properly. For details on the removal, please see https://bugs.debian.org/781261 The version of this package that was in Debian prior to this removal can still be found using http://snapshot.debian.org/. This message was generated automatically; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org. Debian distribution maintenance software pp. Scott Kitterman (the ftpmaster behind the curtain)---End Message---
Bug#781311: gss_delete_sec_context breaks openssl usage in other libraries
package: moonshot-gss-eap version: 0.9.2-3 severity: grave Whenever the last gss-eap security context is deleted, the gss-eap mechanism shuts down openssl including freeing x_data, error strings, and engines. In practice this tends to mean that any other library in the same process using openssl will fail. So, for example if you use GSS-API to authenticate a TLS-protected session, then that session will fail. This is grave because it breaks unrelated packages. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#781312: CA certificates cannot handle internal space
package: moonshot-gss-eap version: 0.9.2-3 severity: serious justification: Broken interoperability with the UK's production Moonshot infrastructure. It turns out that despite code designed specifically to permit internal white space in CA certificates in moonshot trust anchors, the length check in util_moonshot.c will reject a CA certificate whose base64 encoding includes whitespace. Unfortunately, JISC Assent, the production Moonshot infrastructure in the UK, includes internal space in the cross-organizational certificates it generates. So, using this version of the software, you cannot interact with those credentials. --Sam -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#781259: marked as done (fasttree: hard-coded limit on branch length precision leads to erroneous results)
Your message dated Fri, 27 Mar 2015 12:21:27 + with message-id e1ybtgr-0002bq...@franck.debian.org and subject line Bug#781259: fixed in fasttree 2.1.7-2 has caused the Debian Bug report #781259, regarding fasttree: hard-coded limit on branch length precision leads to erroneous results to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 781259: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781259 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: fasttree Version: 2.1.7-1 Hi, as described in detail at http://darlinglab.org/blog/2015/03/23/not-so-fast-fasttree.html fasttree 2.1.7 has a a serious issue for many genomic epidemiology studies which can lead to completely wrong conclusions about research results in biomedicine. The current version of fasttree in jessie (2.1.7-1) has this severe deficiency. The above article describes the patch needed to prevent the flaw. Upstream incorporated the fix in version 2.1.8. In my opinion this bug is release critical and should be fixed before the release of jessie. I've already prepared a patched new package for this, so the bug could be closed very fast after uploading that new package version. Roland --- http://www.q-leap.com / http://qlustar.com --- HPC / Storage / Cloud Linux Cluster OS --- ---End Message--- ---BeginMessage--- Source: fasttree Source-Version: 2.1.7-2 We believe that the bug you reported is fixed in the latest version of fasttree, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 781...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Roland Fehrenbacher r...@q-leap.de (supplier of updated fasttree package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Tue, 24 Mar 2015 18:37:23 + Source: fasttree Binary: fasttree Architecture: source amd64 Version: 2.1.7-2 Distribution: unstable Urgency: low Maintainer: Debian Med Packaging Team debian-med-packag...@lists.alioth.debian.org Changed-By: Roland Fehrenbacher r...@q-leap.de Description: fasttree - phylogenetic trees from alignments of nucleotide or protein seque Closes: 781259 Changes: fasttree (2.1.7-2) unstable; urgency=low . * Team upload * Modify/add patches to use double precision and increase branch length precision. This is absolutely crucial to prevent flawed datas analysis as described e.g. in http://darlinglab.org/blog/2015/03/23/not-so-fast-fasttree.html Closes: #781259 Checksums-Sha1: d2421de9bcbc9f9bb6f1c4c4bd9b9b38f560e743 2012 fasttree_2.1.7-2.dsc b303586a1297081ef8d043f437640ce5dc4f765d 8444 fasttree_2.1.7-2.debian.tar.xz a02f2585c4e249a8d50aaa44947ef6210c3182b7 127978 fasttree_2.1.7-2_amd64.deb Checksums-Sha256: de23ccb963ca451c902319455dde025ba612ef2d6d3a7dba7d94fef6ed92e7ce 2012 fasttree_2.1.7-2.dsc c8c6769825f4a71e17d561323aea8e14a6286fa332936af5236ed5574d17fb3d 8444 fasttree_2.1.7-2.debian.tar.xz 34b09b1563f7d352d3d19e28555e96c1ef088cf68629e5884c10928af8d1479b 127978 fasttree_2.1.7-2_amd64.deb Files: b8bbe18ec1d2e531e60c65edca973218 2012 science extra fasttree_2.1.7-2.dsc ef65cd2f36924b08ebb6e85331c02336 8444 science extra fasttree_2.1.7-2.debian.tar.xz 735b9a93eaa80e3cfe7508059bafa96a 127978 science extra fasttree_2.1.7-2_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBCAAGBQJVFTf1AAoJEFeKBJTRxkbR9fAP/jMti2vSblxgQsXc9DPknHKO wTNtz9yEp1zTV3T2ne9ImeHg9tln0dPGf4ARcmcFk5nwMb0Jjq+58L7pYb4XspDf C/AxyFBno7mUcHfafNI6seoVMY1ageOg/77rPyf4F7gUkkaE7KxEij4/KA6L9Whr bhJmY9tetxhGBXqKzgD3gLAt/5hBjgiryz/cCfUHPY+rrkFHOZDFkiVGudE090Gn FVPGv+4HoVv7/jl5X5se3exbZWIg89OD3ueQ0AvLmNxDXUVV8k4O5u0svyXspjSl zuNFLxj1+hIQtX775zbReK99VGLi3TwkU+iNBFaE3pm9VGAqGKtTQW+cIm9DE6YF yL64wA/hTtP1yKnRY9ITd8OhpU+gxs4TT475ys4XovIDO0d0fQ8iagbFUN3RSoH0 s6Tx30eW9j3V2RA87V/5X0tHhLD3GP0UL9r+9whU23kM1YlV1iqdvNI1xO3mNJJq pLDBVoTJPXP9q9VrqEye2z6CPcOq1v2rk8oLGll83FMrziOU4M/kLi9DHl34sZgc KfFNyldsJA6p24xkHQTTHIAagW/WbnbMUPF2d+oMRkDhePsYLYt0g/gEWqE7P/Dp LyMB/CAAnSw+e8tDEGDMrIE7LTDcc4tSJC6Da/8QGanGF5fHOeHK0wGjbNNcADfv aFEZZ0wznZv8fJAY8TG9 =QeRC -END PGP SIGNATUREEnd Message---
Bug#781309: libdebconfclient0: Priority is 'Optional' although being a dependency of base-passwd
Package: libdebconfclient0 Version: 0.192 Severity: serious Justification: Policy 2.5 Dear Maintainer, I believe the priority of the package libdebconfclient0 should be raised as it is a hard-dependency of the base-passwd package. Relevant part of the Debian Policy: Packages must not depend on packages with lower priority values (excluding build-time dependencies). In order to ensure this, the priorities of one or more packages may need to be adjusted. I believe a patch is not required, let me know otherwise. -- System Information: Debian Release: 8.0 APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.16.0-4-amd64 (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages libdebconfclient0 depends on: ii libc6 2.19-15 ii multiarch-support 2.19-15 libdebconfclient0 recommends no packages. libdebconfclient0 suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#761023: [bb] Visual stops when audio starts
I did a few extra tests: - bb works fine with the music on the console (no X). - I had the same bug on X. Uninstalling pulseaudio - and rebooting - fixed the issue. - I tried compiling with --disable-libmikmodtest, but video also freezes when pulse-audio is there. -- Nirgal My skype account was deleted by M$ without reason: Bye bye pulseaudio :) And welcome back sound hotkeys on my Asus! signature.asc Description: OpenPGP digital signature
Bug#781309: libdebconfclient0: Priority is 'Optional' although being a dependency of base-passwd
Control: reassign -1 ftp.debian.org On Fri, 2015-03-27 at 12:32 +0100, Benoit Allard wrote: Package: libdebconfclient0 Version: 0.192 Severity: serious Justification: Policy 2.5 Dear Maintainer, I believe the priority of the package libdebconfclient0 should be raised as it is a hard-dependency of the base-passwd package. Relevant part of the Debian Policy: Packages must not depend on packages with lower priority values (excluding build-time dependencies). In order to ensure this, the priorities of one or more packages may need to be adjusted. I believe a patch is not required, let me know otherwise. Priorities are set by the FTP team. A package's control file is only a hint as to what its priority should be. Ben. -- Ben Hutchings Everything should be made as simple as possible, but not simpler. - Albert Einstein signature.asc Description: This is a digitally signed message part
Processed: Re: Bug#781309: libdebconfclient0: Priority is 'Optional' although being a dependency of base-passwd
Processing control commands: reassign -1 ftp.debian.org Bug #781309 [libdebconfclient0] libdebconfclient0: Priority is 'Optional' although being a dependency of base-passwd Bug reassigned from package 'libdebconfclient0' to 'ftp.debian.org'. No longer marked as found in versions cdebconf/0.192. Ignoring request to alter fixed versions of bug #781309 to the same values previously set -- 781309: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781309 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#780729: Bug#780725: PATH used for building is not specified
Hi, On Wed, 18 Mar 2015 13:58:10 +0100 Holger Levsen hol...@layer-acht.org wrote: clone 780724 -1 reassign -1 pbuilder severity -1 serious retitle -1 pbuilder must defines PATH as in debian-policy (and as on buildds) # justification: breaks package builds, see 780724 I challenge this justification. Also I'm not going to downgrade it myself, pbuilder should not be removed from jessie just because of this bug, this is just not a reasonable possible outcome. I don't think that serious is the right severity. This bug does not provoke FTBFS on the auto-builders and it remains possible to build the package by invoking dpkg-buildpackage by hand. The fact that pbuilder fails to build a certain package does not means that if breaks the build of this package. Besides, In any case, policy currently has: 10.10. File names - The name of the files installed by binary packages in the system PATH (namely `/bin', `/sbin', `/usr/bin', `/usr/sbin' and `/usr/games') must be encoded in ASCII. This section is intended to mean that file names in these directory must be encoded in ASCII. I find it contrived to use this section as a definition of a the PATH that should be used for building. Kind regards, Thibaut. signature.asc Description: OpenPGP digital signature
Processed: Re: Bug#781210: systemd asserts on function cg_is_empty_recursive, crashes
Processing control commands: tag -1 confirmed Bug #781210 [systemd] systemd asserts on function cg_is_empty_recursive, crashes Added tag(s) confirmed. severity -1 grave Bug #781210 [systemd] systemd asserts on function cg_is_empty_recursive, crashes Severity set to 'grave' from 'important' fixed -1 219-1 Bug #781210 [systemd] systemd asserts on function cg_is_empty_recursive, crashes Marked as fixed in versions systemd/219-1. -- 781210: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781210 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: severity of 781309 is normal
Processing commands for cont...@bugs.debian.org: severity 781309 normal Bug #781309 [ftp.debian.org] libdebconfclient0: Priority is 'Optional' although being a dependency of base-passwd Severity set to 'normal' from 'serious' thanks Stopping processing here. Please contact me if you need assistance. -- 781309: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781309 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#780261: fsck scan of crypto-root on EVERY startup
On Wed, 11 Mar 2015 19:58:23 +0100 Eduard Bloch e...@gmx.de wrote: [...] * Ben Hutchings [Wed, Mar 11 2015, 05:01:58PM]: [...] From the NEWS file: * If the RTC (real time clock) is set to local time and the local time is ahead of UTC, e2fsck will print a warning during boot about the time changing backward (bug #767040). You can disable this by putting the following lines in /etc/e2fsck.conf: [options] broken_system_clock=1 [...] [...] Setting the mentioned option in e2fsck.conf does help. [...] I just want to confirm Eduards results. I do not have an encrypted root but my system performed also a full fsck scan on every boot since this update. I did have the superblock time warning but judging by the NEWS file I considered it only as a mere bonus info. But it turned out that this time difference triggered the full scan and by setting the parameter I got rid of it. Thanks Ben for the advice. Regards Holger -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#781210: systemd asserts on function cg_is_empty_recursive, crashes
Hello Faidon, Faidon Liambotis [2015-03-27 18:06 +0200]: I *think* you read systemctl stop ipsec while I really meant ipsec stop (ipsec being /usr/sbin/ipsec, and stop being an action that sends SIGTERM to the daemons, among other things). Ah, ok :-) Well, I don't actually need to do that, merely killing the two daemons does just fine. By get that very exception you mean that systemd crashes for you as well? If so, that's great :) Yes, I get that assertion. Anything more I can do to help then? You seem to be in a better position to reproduce than me at the moment. Yes, should be fine. I created a reproducer in the form of an autopkgtest, and now run git bisect on upstream to find the commit between v215 and v219 that fixed it. Martin -- Martin Pitt| http://www.piware.de Ubuntu Developer (www.ubuntu.com) | Debian Developer (www.debian.org) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#781312: marked as done (CA certificates cannot handle internal space)
Your message dated Fri, 27 Mar 2015 16:34:50 + with message-id e1ybxde-0001hs...@franck.debian.org and subject line Bug#781312: fixed in moonshot-gss-eap 0.9.2-3+deb8u1 has caused the Debian Bug report #781312, regarding CA certificates cannot handle internal space to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 781312: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781312 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- package: moonshot-gss-eap version: 0.9.2-3 severity: serious justification: Broken interoperability with the UK's production Moonshot infrastructure. It turns out that despite code designed specifically to permit internal white space in CA certificates in moonshot trust anchors, the length check in util_moonshot.c will reject a CA certificate whose base64 encoding includes whitespace. Unfortunately, JISC Assent, the production Moonshot infrastructure in the UK, includes internal space in the cross-organizational certificates it generates. So, using this version of the software, you cannot interact with those credentials. --Sam ---End Message--- ---BeginMessage--- Source: moonshot-gss-eap Source-Version: 0.9.2-3+deb8u1 We believe that the bug you reported is fixed in the latest version of moonshot-gss-eap, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 781...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Sam Hartman hartm...@debian.org (supplier of updated moonshot-gss-eap package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 27 Mar 2015 08:16:18 -0400 Source: moonshot-gss-eap Binary: moonshot-gss-eap moonshot-gss-eap-dbg Architecture: source amd64 Version: 0.9.2-3+deb8u1 Distribution: unstable Urgency: medium Maintainer: Sam Hartman hartm...@debian.org Changed-By: Sam Hartman hartm...@debian.org Description: moonshot-gss-eap - Moonshot Federated Authentication - authentication mechanism moonshot-gss-eap-dbg - Moonshot Federated Authentication - debugging Symbols Closes: 781311 781312 Changes: moonshot-gss-eap (0.9.2-3+deb8u1) unstable; urgency=medium . * Incorporate upstream deltas: - 6dbf073: Allow white space in CA certificates, Closes: #781312 - 90f04c98: Don't shut down openssl on last context deletion, Closes: #781311 Checksums-Sha1: 8b74b9e6f0859ac8f50f713f0e5bbfc924eac9c4 2219 moonshot-gss-eap_0.9.2-3+deb8u1.dsc df6a9a05dd8376e2982c9723bf78e0d9e73ad630 33288 moonshot-gss-eap_0.9.2-3+deb8u1.debian.tar.xz caf92a4c6a6bff785dffd00cd6c13d587bd2c015 161198 moonshot-gss-eap_0.9.2-3+deb8u1_amd64.deb 4c95527cc335159b7839201dd4206201a6362023 658390 moonshot-gss-eap-dbg_0.9.2-3+deb8u1_amd64.deb Checksums-Sha256: 98a6ff3235832ab5507e41a5d20cd97d5280657fc1696a4f69ab9903b3f08a39 2219 moonshot-gss-eap_0.9.2-3+deb8u1.dsc e46650b54ee411c830187410f0335f9290f2b184da9478e4047e4457b6180e42 33288 moonshot-gss-eap_0.9.2-3+deb8u1.debian.tar.xz 13b562d16bb639c56d4c73f17fb1bed35a008a66f20f7d20ff5878c83d2f0567 161198 moonshot-gss-eap_0.9.2-3+deb8u1_amd64.deb 912e2e70f502b147677ca77b472d5897d56770a7bc96144b56d5bf4755f8829f 658390 moonshot-gss-eap-dbg_0.9.2-3+deb8u1_amd64.deb Files: e614302682d0b2f607a8ed8f94d528af 2219 net optional moonshot-gss-eap_0.9.2-3+deb8u1.dsc 6f9bdad598ee1e6d761b4302a43e49fd 33288 net optional moonshot-gss-eap_0.9.2-3+deb8u1.debian.tar.xz d34d31f18598a0f3e6431794ea4a3b6b 161198 net optional moonshot-gss-eap_0.9.2-3+deb8u1_amd64.deb 188b90d88d556496b08056e966156aec 658390 debug extra moonshot-gss-eap-dbg_0.9.2-3+deb8u1_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBAgAGBQJVFYPGAAoJECg2gbpv5/QdNiMP/i+PHFqp+lkz7e9uuseu8Bqv RJe7d1Ui7iwyHRWvr7jhkVWDz6Wtm50cajUcRSCCwHco0y+mxpxc9EWL0xkCkJEC vJ60Sx3ys0pIG26twQ+IywvqlmKaqQHwvmsu9jelKgxMSBjj3qC+0rLZmPf43++p Lx8j/SF6Pf04xI/I5tpU/clZS0RW7s7uMPOYtEB5sf5RonSEi0h9ya+otpeXVxA6 1+flWoEdSq/lF631hFDZV9URrVSNxE0W/HcjsaInIR423dobq366nHann8KSoIu8 lIPWFxjKhewqalyqMG9lnyAYQJFeLrumoyzXEc8x+Yz2+Eawi+/D22yVH5vx4UmN j7BGjeKTu6ftJBylzoMuz15sXOzzTA/LqRy34eWWeH5v4LnPcoNx/Xrpr0YLU4xK 0FUPFSQTPVGEd/pYPoLEo5OUHFOPizy3I1asTP6FplyZAUbRUx/4ch5t1RC7ChVg
Bug#781311: marked as done (gss_delete_sec_context breaks openssl usage in other libraries)
Your message dated Fri, 27 Mar 2015 16:34:50 + with message-id e1ybxde-0001hm...@franck.debian.org and subject line Bug#781311: fixed in moonshot-gss-eap 0.9.2-3+deb8u1 has caused the Debian Bug report #781311, regarding gss_delete_sec_context breaks openssl usage in other libraries to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 781311: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781311 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- package: moonshot-gss-eap version: 0.9.2-3 severity: grave Whenever the last gss-eap security context is deleted, the gss-eap mechanism shuts down openssl including freeing x_data, error strings, and engines. In practice this tends to mean that any other library in the same process using openssl will fail. So, for example if you use GSS-API to authenticate a TLS-protected session, then that session will fail. This is grave because it breaks unrelated packages. ---End Message--- ---BeginMessage--- Source: moonshot-gss-eap Source-Version: 0.9.2-3+deb8u1 We believe that the bug you reported is fixed in the latest version of moonshot-gss-eap, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 781...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Sam Hartman hartm...@debian.org (supplier of updated moonshot-gss-eap package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 27 Mar 2015 08:16:18 -0400 Source: moonshot-gss-eap Binary: moonshot-gss-eap moonshot-gss-eap-dbg Architecture: source amd64 Version: 0.9.2-3+deb8u1 Distribution: unstable Urgency: medium Maintainer: Sam Hartman hartm...@debian.org Changed-By: Sam Hartman hartm...@debian.org Description: moonshot-gss-eap - Moonshot Federated Authentication - authentication mechanism moonshot-gss-eap-dbg - Moonshot Federated Authentication - debugging Symbols Closes: 781311 781312 Changes: moonshot-gss-eap (0.9.2-3+deb8u1) unstable; urgency=medium . * Incorporate upstream deltas: - 6dbf073: Allow white space in CA certificates, Closes: #781312 - 90f04c98: Don't shut down openssl on last context deletion, Closes: #781311 Checksums-Sha1: 8b74b9e6f0859ac8f50f713f0e5bbfc924eac9c4 2219 moonshot-gss-eap_0.9.2-3+deb8u1.dsc df6a9a05dd8376e2982c9723bf78e0d9e73ad630 33288 moonshot-gss-eap_0.9.2-3+deb8u1.debian.tar.xz caf92a4c6a6bff785dffd00cd6c13d587bd2c015 161198 moonshot-gss-eap_0.9.2-3+deb8u1_amd64.deb 4c95527cc335159b7839201dd4206201a6362023 658390 moonshot-gss-eap-dbg_0.9.2-3+deb8u1_amd64.deb Checksums-Sha256: 98a6ff3235832ab5507e41a5d20cd97d5280657fc1696a4f69ab9903b3f08a39 2219 moonshot-gss-eap_0.9.2-3+deb8u1.dsc e46650b54ee411c830187410f0335f9290f2b184da9478e4047e4457b6180e42 33288 moonshot-gss-eap_0.9.2-3+deb8u1.debian.tar.xz 13b562d16bb639c56d4c73f17fb1bed35a008a66f20f7d20ff5878c83d2f0567 161198 moonshot-gss-eap_0.9.2-3+deb8u1_amd64.deb 912e2e70f502b147677ca77b472d5897d56770a7bc96144b56d5bf4755f8829f 658390 moonshot-gss-eap-dbg_0.9.2-3+deb8u1_amd64.deb Files: e614302682d0b2f607a8ed8f94d528af 2219 net optional moonshot-gss-eap_0.9.2-3+deb8u1.dsc 6f9bdad598ee1e6d761b4302a43e49fd 33288 net optional moonshot-gss-eap_0.9.2-3+deb8u1.debian.tar.xz d34d31f18598a0f3e6431794ea4a3b6b 161198 net optional moonshot-gss-eap_0.9.2-3+deb8u1_amd64.deb 188b90d88d556496b08056e966156aec 658390 debug extra moonshot-gss-eap-dbg_0.9.2-3+deb8u1_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBAgAGBQJVFYPGAAoJECg2gbpv5/QdNiMP/i+PHFqp+lkz7e9uuseu8Bqv RJe7d1Ui7iwyHRWvr7jhkVWDz6Wtm50cajUcRSCCwHco0y+mxpxc9EWL0xkCkJEC vJ60Sx3ys0pIG26twQ+IywvqlmKaqQHwvmsu9jelKgxMSBjj3qC+0rLZmPf43++p Lx8j/SF6Pf04xI/I5tpU/clZS0RW7s7uMPOYtEB5sf5RonSEi0h9ya+otpeXVxA6 1+flWoEdSq/lF631hFDZV9URrVSNxE0W/HcjsaInIR423dobq366nHann8KSoIu8 lIPWFxjKhewqalyqMG9lnyAYQJFeLrumoyzXEc8x+Yz2+Eawi+/D22yVH5vx4UmN j7BGjeKTu6ftJBylzoMuz15sXOzzTA/LqRy34eWWeH5v4LnPcoNx/Xrpr0YLU4xK 0FUPFSQTPVGEd/pYPoLEo5OUHFOPizy3I1asTP6FplyZAUbRUx/4ch5t1RC7ChVg /uuoT4v3gFC/ip9O9vx5Qnx2nHAIoBgB8a0C/2W0q7a6ErHpESK2ToLLJAoR4IYg lfe4vT3NBos6JpbTcFLqR+Y4V6N5KC3TVjcigSwIWuNdTszJNnziVk+bFg0ImUK5
Bug#781265: gnome-power-manager: gnome-power-statistics segfaults always under certain case
Control: reassign -1 upower Control: forcemerge 774546 -1 Hi Mohammed, On 27.03.2015 01:45, Mohammed Sadik P. K. wrote: On 3/27/15, Andreas Cadhalpun andreas.cadhal...@googlemail.com wrote: This looks like a duplicate of #774546 [1]. Can you install libupower-glib3 0.99.2-2 from experimental and report if that fixed this problem? Yes, It does fix the bug. Please close the bug. Thanks for confirming. I'm merging it with the other bug. Best regards, Andreas -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#781265: gnome-power-manager: gnome-power-statistics segfaults always under certain case
Processing control commands: reassign -1 upower Bug #781265 [gnome-power-manager] gnome-power-manager: gnome-power-statistics segfaults always under certain case Bug reassigned from package 'gnome-power-manager' to 'upower'. No longer marked as found in versions gnome-power-manager/3.14.1-1. Ignoring request to alter fixed versions of bug #781265 to the same values previously set forcemerge 774546 -1 Bug #774546 {Done: Martin Pitt mp...@debian.org} [upower] two uninitialized pointers cause segfaults Bug #781265 [upower] gnome-power-manager: gnome-power-statistics segfaults always under certain case Severity set to 'important' from 'grave' Marked Bug as done Added indication that 781265 affects gnome-power-manager,mate-power-manager Marked as fixed in versions upower/0.99.2-2. Marked as found in versions upower/0.99.1-3.1. Added tag(s) sid, jessie, fixed-upstream, and patch. Merged 774546 781265 -- 774546: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774546 781265: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781265 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#781306: Please remove makehuman from debian jessie
I am an official representant from the MakeHuman crew. The version currently in debian repositories is a several years old alpha. It is not stable. It is not fit for use. It is not supported. It is not endorsed by the MakeHuman crew. Unless bug #751755 is solved, the most efficient way to handle all bugs related to the makehuman package currently in the debian repositories would be to remove the package altogether. This is what we of the makehuman crew recommends as an emergency fix. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#781210: systemd asserts on function cg_is_empty_recursive, crashes
Hi Martin, On Fri, Mar 27, 2015 at 04:40:25PM +0100, Martin Pitt wrote: If so, a mere ipsec stop after that should be able to crash systemd. Not that, it just marks the unit as stopped but keeps the processes running. But killing the two daemons manually makes the cgroup empty and I get that very exception. I *think* you read systemctl stop ipsec while I really meant ipsec stop (ipsec being /usr/sbin/ipsec, and stop being an action that sends SIGTERM to the daemons, among other things). By get that very exception you mean that systemd crashes for you as well? If so, that's great :) Anything more I can do to help then? You seem to be in a better position to reproduce than me at the moment. On a side note, I've noticed that if I put the system under stress --cpu 8 the behavior changes and systemctl restart strongswan works properly. This definitely points to some kind of race. Thanks! Faidon -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: limit source to perl, tagging 781120
Processing commands for cont...@bugs.debian.org: limit source perl Limiting to bugs with field 'source' containing at least one of 'perl' Limit currently set to 'source':'perl' tags 781120 + pending Bug #781120 [perl] perl: handling of non-readable directories on @INC Added tag(s) pending. thanks Stopping processing here. Please contact me if you need assistance. -- 781120: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781120 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: clone for release notes
Processing commands for cont...@bugs.debian.org: clone 781120 -1 Bug #781120 [perl] perl: handling of non-readable directories on @INC Bug 781120 cloned as bug 781334 severity -1 normal Bug #781334 [perl] perl: handling of non-readable directories on @INC Severity set to 'normal' from 'serious' retitle -1 release-notes: add warning about change in perl's handling of unreadable module paths Bug #781334 [perl] perl: handling of non-readable directories on @INC Changed Bug title to 'release-notes: add warning about change in perl's handling of unreadable module paths' from 'perl: handling of non-readable directories on @INC' End of message, stopping processing here. Please contact me if you need assistance. -- 781120: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781120 781334: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781334 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: found 780989 in 0.8.5-1
Processing commands for cont...@bugs.debian.org: found 780989 0.8.5-1 Bug #780989 {Done: Jelmer Vernooij jel...@debian.org} [src:dulwich] dulwich: CVE-2014-9706: does not prevent to write files in commits with invalid paths to working tree Bug #781001 {Done: Jelmer Vernooij jel...@debian.org} [src:dulwich] python-dulwich: CVE-2014-9706: arbitrary command execution vulnerability in conjunction with git Marked as found in versions dulwich/0.8.5-1. Marked as found in versions dulwich/0.8.5-1. thanks Stopping processing here. Please contact me if you need assistance. -- 780989: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780989 781001: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781001 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#781346: slapi-nis: CVE-2015-0283: infinite loop in getgrnam_r() and getgrgid_r()
Source: slapi-nis Version: 0.54-1 Severity: grave Tags: security upstream fixed-upstream Hi Timo, the following vulnerability was published for slapi-nis. I was not able to verify the issue itself but only checked patch-wise. CVE-2015-0283[0]: infinite loop in getgrnam_r() and getgrgid_r() If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2015-0283 [1] https://bugzilla.redhat.com/show_bug.cgi?id=1195729 Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#780645: marked as done (shinken-mod-webui: files containing password or salt are word readable)
Your message dated Fri, 27 Mar 2015 21:36:04 + with message-id e1ybbva-0006uv...@franck.debian.org and subject line Bug#780645: fixed in shinken-mod-webui 1.0-3 has caused the Debian Bug report #780645, regarding shinken-mod-webui: files containing password or salt are word readable to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 780645: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780645 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: shinken-mod-webui Version: 1.0-1 Severity: grave Tags: security Justification: user security hole -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 The two files referenced in README containing users+passwords and salt are world readable. Any local user can apparently gain administrator access to shinken! - Jonas -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBAgAGBQJVCAslAAoJECx8MUbBoAEhlxAP/2bvzmTfk9ZbXrlVO/9jLS98 FAQeiDK81tBmUz1ey4ZsheaSaBnysB31M8SFgNNfAa27mfQLZ2EtmPkbsaqiTcy2 SXy2k4LtTE7ccIJs5cPFdvVlwjAX/ZRVDBkaIMxt4qfpoD3BoK7kiANrO/qoVojx l03M+gyMy1lJZJXCz5rcpRnUMA7tRHOg0FjkGdff3XlQpzm/RV3SM8BzdUFOBoW0 nCo7spLbT5A83kLajv+0DXJfuAibW9ViFmY64y2hd9xew3ZK3AE+utKu2p4pBW98 9Elqa2vQ9NZzXZ8SkAsp/eeVs6SaK2XzwMyQosuIvtlmQYdh9uOC/sgy1KztoZ3g vez1NzRKSVdsx35O5L5hlZTAij6rs5wl41BOBlf5/27AoSWa9vqvT5ko+Vy4Unnv GvRAVobHjTBPeaS6Y12Njzzltr45Xl5nslY7GuoBDi9Ck//2I8vN3KZmqI/M/huV dKBoESDyRlxeannsV3YHxBDlXs9wBmtji/86acQ16gGUMj6cnRSfcmg1uCQKGLOc iIZJUlD2txPrGCnZR/WUN35oTN5Hk51SLeL/5lsiuqU5kIjzt41ebJngyt5vOfYC SSTut3aub74QJxWBPAtQvPAjXM7FHea4Fu1+CLasM8pGWG8Xyv+OYT32Ut9sPEjI x7T1b6PDquLhukInM08s =K7qm -END PGP SIGNATURE- ---End Message--- ---BeginMessage--- Source: shinken-mod-webui Source-Version: 1.0-3 We believe that the bug you reported is fixed in the latest version of shinken-mod-webui, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 780...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thibault Cohen thibault.co...@savoirfairelinux.com (supplier of updated shinken-mod-webui package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 26 Mar 2015 10:19:04 -0400 Source: shinken-mod-webui Binary: shinken-mod-webui Architecture: source all Version: 1.0-3 Distribution: unstable Urgency: medium Maintainer: Shinken Debian packages maintainers pkg-shinken-ma...@lists.alioth.debian.org Changed-By: Thibault Cohen thibault.co...@savoirfairelinux.com Description: shinken-mod-webui - Shinken webui module Closes: 780645 Changes: shinken-mod-webui (1.0-3) unstable; urgency=medium . [ Thibault Cohen ] * Fix perms on webui.cfg. (Closes: #780645) Checksums-Sha1: 3ced1d90b4e575aa9a2a290d99bbb4cea9f26e80 2111 shinken-mod-webui_1.0-3.dsc baf61a89308aea93b28e841dc68dadd0c85f3ab2 398412 shinken-mod-webui_1.0-3.debian.tar.xz 450c8f6279809f395463bdf0a57cb527e7a97441 2599130 shinken-mod-webui_1.0-3_all.deb Checksums-Sha256: ffa4274040b805061948824ec9950da81af8407561c8867b415ac5fe23d73ef6 2111 shinken-mod-webui_1.0-3.dsc 50dfcc39a23853cce5e40feb8e24959c68247db9bb4eae58c76fee4d12c5ede0 398412 shinken-mod-webui_1.0-3.debian.tar.xz 4e9f537d0058df7ad8775efc6ca95f3bc5ff19f8c13404238856a607b56281f5 2599130 shinken-mod-webui_1.0-3_all.deb Files: 55c42cc4f77aace4aeb6736e304b7d77 2111 net optional shinken-mod-webui_1.0-3.dsc 9720a8a44bef8b5fe76a287311ccc154 398412 net optional shinken-mod-webui_1.0-3.debian.tar.xz ebb5955b12b92fa3b135cf18c2f11096 2599130 net optional shinken-mod-webui_1.0-3_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBCAAGBQJVFbwKAAoJEK4DmARmaB+l6okP/0Gp4Rg5pzc66c4qWsr3LX+v /G2GLgjoLhx+Doeqk5vwjDof3zmetFeekcOzzJGegog4mxTiq6o/LcrZS+tooZ4P Cr+YkYCpM1pr1gkd5IXldxgepiANRo6KENn7LACY1Z/KLfyOccASYviTflAjDJ1v YGjYWVqpm0QOVPIjselNgEY+Bh8zLXSh1T5p0drjwuznL9IropRQKH0uXhO0OUxv l/KJH6sJA/aOntxRSaLBvuPuU5jWi8xwdeGUPYR/R4FUKtQzPP8+3bxQVfKxI4em JleAaUCD0DQD5/9fm/P0Z5Nk6gr15Ctqdf5jGHQ/lrCVlodbl09T5Vkw4UVeY05Z nniIofAjdu4s806D7hBXaDUgS0xfy/9be472SldaI9jyiBmb9zEtQjWRzfpdlSby P2bprFAEfA+9LB75/9CF87E7ItEmHQbyYY0P2wLnYw8msgyKWz+NFbOB3OljRcus hQW26QvR9hb0HWGRkPWqNlR6xE/NQoJ7gArBhQNRgDaVtUxDBiGReRvRVexWZhkf
Processed: fig: New upstream version, renamed to docker-compose
Processing control commands: block -1 by 781355 781054 Bug #781356 [fig] fig: New upstream version, renamed to docker-compose 781356 was not blocked by any bugs. 781356 was not blocking any bugs. Added blocking bug(s) of 781356: 781355 and 781054 -- 781356: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781356 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#781356: fig: New upstream version, renamed to docker-compose
Package: fig Version: 1.0.0-1 Severity: serious Control: block -1 by 781355 781054 Setting severity to serious because it should not reach testing after jessie release until it is updated. There is version 1.1.0, but dockerpty is not packaged yet and python-docker is too old. -- System Information: Debian Release: 8.0 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages fig depends on: ii python2.7.9-1 ii python-docker 0.5.3-2 ii python-docopt 0.6.2-1 ii python-requests 2.4.3-6 ii python-six1.8.0-1 ii python-texttable 0.8.1-1 ii python-websocket 0.18.0-2 ii python-yaml 3.11-2 pn python:anynone fig recommends no packages. fig suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#775733: xemacs21-gnome-*: hangs during upgrade from squeeze - wheezy - jessie
On Tue, 24 Mar 2015 10:18:44 -0700, Mark Brown wrote: Actually having opened the logs I'm not seeing the command lines, the logs appear to start with displaying output from the commend. And the output shows the used command lines very close to the top: % grep -n Command line xemacs21-gnome-mule* xemacs21-gnome-mule.patched.pass.log:7:0m0.0s INFO: Command line arguments: /srv/piuparts/sbin/piuparts --skip-logrotatefiles-test --warn-on-others --no-eatmydata --scriptsdir /etc/piuparts/scripts --allow-database --warn-on-leftovers-after-purge -i /etc/shells --scriptsdir /etc/piuparts/scripts-jessie --warn-on-debsums-errors --proxy http://localhost:3128 --mirror 'http://ftp.de.debian.org/debian main' --tmpdir /tmp/piupartss --arch amd64 -b /srv/piuparts/slave/basetgz/squeeze_amd64.tar.gz -d squeeze -d wheezy -d jessie --apt xemacs21-gnome-mule=None --bindmount /tmp/xem2 --testdebs-repo /tmp/xem2 --distupgrade-to-testdebs --log-file xemacs21-gnome-mule.patched.pass.log xemacs21-gnome-mule_None.fail.log:41:0m0.0s INFO: Command line arguments: /srv/piuparts/sbin/piuparts --skip-logrotatefiles-test --warn-on-others --no-eatmydata --scriptsdir /etc/piuparts/scripts --allow-database --warn-on-leftovers-after-purge -i /etc/shells --scriptsdir /etc/piuparts/scripts-jessie --warn-on-debsums-errors --proxy http://localhost:3128 --mirror 'http://ftp.de.debian.org/debian main' --tmpdir /tmp/piupartss --arch amd64 -b /srv/piuparts/slave/basetgz/squeeze_amd64.tar.gz -d squeeze -d wheezy -d jessie -d testing --apt xemacs21-gnome-mule=None Cheers, gregor -- .''`. Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06 : :' : Debian GNU/Linux user, admin, and developer - https://www.debian.org/ `. `' Member of VIBE!AT SPI, fellow of the Free Software Foundation Europe `- NP: Red Hot Chili Peppers: Savior signature.asc Description: Digital Signature