Bug#781298: missing Built-Using: qt4-x11

2015-03-27 Thread Helmut Grohne
Package: fw4spl
Version: 0.9.2-1
Severity: serious
Justification: policy 7.8

fw4spl copies parts of libqt4-qt3support during build:

http://dedup.debian.net/compare/fw4spl/libqt4-qt3support

It therefore must list qt4-x11 in Built-Using according to the Debian
policy section 7.8.

Of course, the better solution here is not to copy libraries
libqt4-qt3support in the first place. You may be able to do with
symbolic links and a suitable dependency.

If you choose to keep that copy, please also register your embedded copy
with the security tracker:

https://wiki.debian.org/EmbeddedCodeCopies

Helmut


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#779660: marked as done (ruby-actionpack-page-caching: fails to upgrade from 'wheezy' - trying to overwrite /usr/lib/ruby/vendor_ruby/action_controller/caching/pages.rb)

2015-03-27 Thread Debian Bug Tracking System
Your message dated Fri, 27 Mar 2015 11:19:20 +
with message-id e1ybsik-00045c...@franck.debian.org
and subject line Bug#779660: fixed in ruby-actionpack-page-caching 1.0.2-2
has caused the Debian Bug report #779660,
regarding ruby-actionpack-page-caching: fails to upgrade from 'wheezy' - trying 
to overwrite /usr/lib/ruby/vendor_ruby/action_controller/caching/pages.rb
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
779660: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779660
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: ruby-actionpack-page-caching
Version: 1.0.2-1
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package fails to upgrade from
'wheezy'.
It installed fine in 'wheezy', then the upgrade to 'sid' fails
because it tries to overwrite other packages files without declaring a
Breaks+Replaces relation.

See policy 7.6 at
https://www.debian.org/doc/debian-policy/ch-relationships.html#s-replaces

From the attached log (scroll to the bottom...):

  Selecting previously unselected package ruby-actionpack.
  Unpacking ruby-actionpack (from .../ruby-actionpack_2%3a2.3.14.2_all.deb) ...
  Selecting previously unselected package ruby-actionpack-page-caching.
  Unpacking ruby-actionpack-page-caching (from 
.../ruby-actionpack-page-caching_1.0.2-1_all.deb) ...
  dpkg: error processing 
/var/cache/apt/archives/ruby-actionpack-page-caching_1.0.2-1_all.deb (--unpack):
   trying to overwrite 
'/usr/lib/ruby/vendor_ruby/action_controller/caching/pages.rb', which is also 
in package ruby-actionpack-2.3 2.3.14-5
  Errors were encountered while processing:
   /var/cache/apt/archives/ruby-actionpack-page-caching_1.0.2-1_all.deb

ruby-actionpack-2.3 is not part of jessie, but there is no upgrade path
guarantee that this obsolete package will be removed on upgrades to from
wheezy to jessie, so ruby-actionpack-page-caching (which will not be part
of jessie either) will have to add the corresponding
  Breaks+Replaces: ruby-actionpack-2.3
anyway to ensure this package gets removed during the jessie-stretch
upgrade path.


cheers,

Andreas


ruby-actionpack-2.3=2.3.14-5_ruby-actionpack-page-caching=1.0.2-1.log.gz
Description: application/gzip
---End Message---
---BeginMessage---
Source: ruby-actionpack-page-caching
Source-Version: 1.0.2-2

We believe that the bug you reported is fixed in the latest version of
ruby-actionpack-page-caching, which is due to be installed in the Debian FTP 
archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 779...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Balasankar C balasank...@autistici.org (supplier of updated 
ruby-actionpack-page-caching package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 27 Mar 2015 16:45:08 +0530
Source: ruby-actionpack-page-caching
Binary: ruby-actionpack-page-caching
Architecture: source all
Version: 1.0.2-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers 
pkg-ruby-extras-maintain...@lists.alioth.debian.org
Changed-By: Balasankar C balasank...@autistici.org
Description:
 ruby-actionpack-page-caching - static page caching for Action Pack (removed 
from core in Rails 4
Closes: 779660
Changes:
 ruby-actionpack-page-caching (1.0.2-2) unstable; urgency=medium
 .
   * Added Breaks+Replaces relation for ruby-actionpack-2.3 (Closes: #779660)
Checksums-Sha1:
 cc62fb935dde2bce53de8eb2bf1991428672c265 1955 
ruby-actionpack-page-caching_1.0.2-2.dsc
 18d41724296522cf7a28a742c460a8b3f816a7e5 3028 
ruby-actionpack-page-caching_1.0.2-2.debian.tar.xz
 3d97d7847f41c9c7574e3d63cd9b2d35d04b4fbe 7182 
ruby-actionpack-page-caching_1.0.2-2_all.deb
Checksums-Sha256:
 467bf34b0e78d4aeec119c39cff3d36f0f918449feb4c0b86f550a79c2a5b196 1955 
ruby-actionpack-page-caching_1.0.2-2.dsc
 325f6293651f790dfa66f64a1bdbd46b46e7b16b62a4928138133c2c94b4287c 3028 
ruby-actionpack-page-caching_1.0.2-2.debian.tar.xz
 dcc86048659985b9e475e669e1012158f73d2322c9231efb811d877aad3adf52 7182 
ruby-actionpack-page-caching_1.0.2-2_all.deb
Files:
 886da5f35cb2313550c7b1b5b7cb144e 1955 ruby optional 

Bug#781306: makehuman: Immediate segmentation fault at launch

2015-03-27 Thread John O'Hagan
Package: makehuman
Version: 1.0.0~alpha6-5+b1
Severity: grave
Justification: renders package unusable

Dear Maintainer,

Launching makehuman from the Xfce menu, a terminal window is briefly seen, then
nothing else happens. Launching makehuman in a terminal gives the following
output:

No antialiasing available, turning off antialiasing.
/usr/bin/makehuman: line 2: 21015 Segmentation fault
../makehuman.real




-- System Information:
Debian Release: 8.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.3-2015-03-12-14.59
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages makehuman depends on:
ii  fontconfig2.11.0-6.3
ii  libc6 2.19-15
ii  libgl1-mesa-glx [libgl1]  10.3.2-1
ii  libglew1.10   1.10.0-3
ii  libglu1-mesa [libglu1]9.0.0-2
ii  libpython2.7  2.7.9-2
ii  libsdl-image1.2   1.2.12-5+b5
ii  libsdl1.2debian   1.2.15-10+b1
ii  libx11-6  2:1.6.2-3
ii  makehuman-data1.0.0~alpha6-5
pn  python2.7:any none
pn  python:anynone

Versions of packages makehuman recommends:
pn  aqsis  none

Versions of packages makehuman suggests:
pn  makehuman-doc  none

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#756581: marked as done (Not fit for Jessie)

2015-03-27 Thread Debian Bug Tracking System
Your message dated Fri, 27 Mar 2015 13:01:39 +
with message-id e1ybttl-000609...@franck.debian.org
and subject line Bug#781261: Removed package(s) from unstable
has caused the Debian Bug report #756581,
regarding Not fit for Jessie
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
756581: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756581
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: php-phpdocx
Severity: serious

[Filled as an RC-bug by the maintainer to exclude package from testing]

php-phpdocx has been introduced as an owncloud dependency, but no
package depends on it anymore. Upstream does not really maintain the
community version, and does not really care about security either:

 All vendors except PHPDocX have released an update. PHPDocX states
 that the admin is responsible to validate the DOCX document and is
 considering this as won't fix.

http://owncloud.org/security/advisory/?id=oc-sa-2014-006

(about CVE-2014-2056, fixed in Debian)

There is little point to release it with Jessie, especially without
someone willing to maintain it, including security-wise (see: #748605).

Regards

David


signature.asc
Description: Digital signature
---End Message---
---BeginMessage---
Version: 3.0+dfsg-2+rm

Dear submitter,

as the package phpdocx has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/781261

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmas...@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Scott Kitterman (the ftpmaster behind the curtain)---End Message---


Bug#781311: gss_delete_sec_context breaks openssl usage in other libraries

2015-03-27 Thread Sam Hartman
package: moonshot-gss-eap
version: 0.9.2-3
severity: grave

Whenever the last gss-eap security context is deleted, the gss-eap
mechanism shuts down openssl including freeing x_data, error strings,
and engines.
In practice this tends to mean that any other library in the same
process using openssl will fail.
So, for example if you use GSS-API to authenticate a TLS-protected
session, then that session will fail.

This is grave because it breaks unrelated packages.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#781312: CA certificates cannot handle internal space

2015-03-27 Thread Sam Hartman
package: moonshot-gss-eap
version: 0.9.2-3
severity: serious
justification: Broken interoperability with the UK's production Moonshot
infrastructure.

It turns out that despite code designed specifically to permit internal
white space in CA certificates in moonshot trust anchors, the length
check in util_moonshot.c will reject a CA certificate whose base64
encoding includes whitespace.

Unfortunately, JISC Assent, the production Moonshot infrastructure in
the UK, includes internal space in the cross-organizational certificates
it generates.

So, using this version of the software, you cannot interact with those
credentials.


--Sam


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#781259: marked as done (fasttree: hard-coded limit on branch length precision leads to erroneous results)

2015-03-27 Thread Debian Bug Tracking System
Your message dated Fri, 27 Mar 2015 12:21:27 +
with message-id e1ybtgr-0002bq...@franck.debian.org
and subject line Bug#781259: fixed in fasttree 2.1.7-2
has caused the Debian Bug report #781259,
regarding fasttree: hard-coded limit on branch length precision leads to 
erroneous results
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
781259: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781259
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: fasttree
Version: 2.1.7-1

Hi,

as described in detail at
http://darlinglab.org/blog/2015/03/23/not-so-fast-fasttree.html
fasttree 2.1.7 has a a serious issue for many genomic epidemiology
studies which can lead to completely wrong conclusions about research
results in biomedicine. The current version of fasttree in jessie
(2.1.7-1) has this severe deficiency.

The above article describes the patch needed to prevent the
flaw. Upstream incorporated the fix in version 2.1.8. In my opinion this
bug is release critical and should be fixed before the release of
jessie. I've already prepared a patched new package for this, so the bug
could be closed very fast after uploading that new package version.

Roland

---
http://www.q-leap.com / http://qlustar.com
  --- HPC / Storage / Cloud Linux Cluster OS ---
---End Message---
---BeginMessage---
Source: fasttree
Source-Version: 2.1.7-2

We believe that the bug you reported is fixed in the latest version of
fasttree, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 781...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Roland Fehrenbacher r...@q-leap.de (supplier of updated fasttree package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 24 Mar 2015 18:37:23 +
Source: fasttree
Binary: fasttree
Architecture: source amd64
Version: 2.1.7-2
Distribution: unstable
Urgency: low
Maintainer: Debian Med Packaging Team 
debian-med-packag...@lists.alioth.debian.org
Changed-By: Roland Fehrenbacher r...@q-leap.de
Description:
 fasttree   - phylogenetic trees from alignments of nucleotide or protein seque
Closes: 781259
Changes:
 fasttree (2.1.7-2) unstable; urgency=low
 .
   * Team upload
   * Modify/add patches to use double precision and increase branch
 length precision. This is absolutely crucial to prevent flawed datas
 analysis as described e.g. in
 http://darlinglab.org/blog/2015/03/23/not-so-fast-fasttree.html
 Closes: #781259
Checksums-Sha1:
 d2421de9bcbc9f9bb6f1c4c4bd9b9b38f560e743 2012 fasttree_2.1.7-2.dsc
 b303586a1297081ef8d043f437640ce5dc4f765d 8444 fasttree_2.1.7-2.debian.tar.xz
 a02f2585c4e249a8d50aaa44947ef6210c3182b7 127978 fasttree_2.1.7-2_amd64.deb
Checksums-Sha256:
 de23ccb963ca451c902319455dde025ba612ef2d6d3a7dba7d94fef6ed92e7ce 2012 
fasttree_2.1.7-2.dsc
 c8c6769825f4a71e17d561323aea8e14a6286fa332936af5236ed5574d17fb3d 8444 
fasttree_2.1.7-2.debian.tar.xz
 34b09b1563f7d352d3d19e28555e96c1ef088cf68629e5884c10928af8d1479b 127978 
fasttree_2.1.7-2_amd64.deb
Files:
 b8bbe18ec1d2e531e60c65edca973218 2012 science extra fasttree_2.1.7-2.dsc
 ef65cd2f36924b08ebb6e85331c02336 8444 science extra 
fasttree_2.1.7-2.debian.tar.xz
 735b9a93eaa80e3cfe7508059bafa96a 127978 science extra 
fasttree_2.1.7-2_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=QeRC
-END PGP SIGNATUREEnd Message---


Bug#781309: libdebconfclient0: Priority is 'Optional' although being a dependency of base-passwd

2015-03-27 Thread Benoit Allard
Package: libdebconfclient0
Version: 0.192
Severity: serious
Justification: Policy 2.5

Dear Maintainer,

I believe the priority of the package libdebconfclient0 should be raised as it 
is a hard-dependency of the base-passwd package.

Relevant part of the Debian Policy:

Packages must not depend on packages with lower priority values (excluding 
build-time dependencies). In order to ensure this, the priorities of one or 
more packages may need to be adjusted. 

I believe a patch is not required, let me know otherwise.

-- System Information:
Debian Release: 8.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages libdebconfclient0 depends on:
ii  libc6  2.19-15
ii  multiarch-support  2.19-15

libdebconfclient0 recommends no packages.

libdebconfclient0 suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#761023: [bb] Visual stops when audio starts

2015-03-27 Thread Jean-Michel Nirgal Vourgère
I did a few extra tests:

- bb works fine with the music on the console (no X).

- I had the same bug on X. Uninstalling pulseaudio - and rebooting -
fixed the issue.

- I tried compiling with --disable-libmikmodtest, but video also freezes
when pulse-audio is there.

-- 
Nirgal
My skype account was deleted by M$ without reason: Bye bye pulseaudio :)
And welcome back sound hotkeys on my Asus!



signature.asc
Description: OpenPGP digital signature


Bug#781309: libdebconfclient0: Priority is 'Optional' although being a dependency of base-passwd

2015-03-27 Thread Ben Hutchings
Control: reassign -1 ftp.debian.org

On Fri, 2015-03-27 at 12:32 +0100, Benoit Allard wrote:
 Package: libdebconfclient0
 Version: 0.192
 Severity: serious
 Justification: Policy 2.5
 
 Dear Maintainer,
 
 I believe the priority of the package libdebconfclient0 should be raised as 
 it is a hard-dependency of the base-passwd package.
 
 Relevant part of the Debian Policy:
 
 Packages must not depend on packages with lower priority values 
 (excluding build-time dependencies). In order to ensure this, the priorities 
 of one or more packages may need to be adjusted. 
 
 I believe a patch is not required, let me know otherwise.

Priorities are set by the FTP team.  A package's control file is only a
hint as to what its priority should be.

Ben.

-- 
Ben Hutchings
Everything should be made as simple as possible, but not simpler.
   - Albert Einstein


signature.asc
Description: This is a digitally signed message part


Processed: Re: Bug#781309: libdebconfclient0: Priority is 'Optional' although being a dependency of base-passwd

2015-03-27 Thread Debian Bug Tracking System
Processing control commands:

 reassign -1 ftp.debian.org
Bug #781309 [libdebconfclient0] libdebconfclient0: Priority is 'Optional' 
although being a dependency of base-passwd
Bug reassigned from package 'libdebconfclient0' to 'ftp.debian.org'.
No longer marked as found in versions cdebconf/0.192.
Ignoring request to alter fixed versions of bug #781309 to the same values 
previously set

-- 
781309: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781309
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#780729: Bug#780725: PATH used for building is not specified

2015-03-27 Thread Thibaut Paumard
Hi,

On Wed, 18 Mar 2015 13:58:10 +0100 Holger Levsen hol...@layer-acht.org
wrote:
 clone 780724 -1
 reassign -1 pbuilder
 severity -1 serious
 retitle -1 pbuilder must defines PATH as in debian-policy (and as on buildds)
 # justification: breaks package builds, see 780724

I challenge this justification. Also I'm not going to downgrade it
myself, pbuilder should not be removed from jessie just because of this
bug, this is just not a reasonable possible outcome.

I don't think that serious is the right severity. This bug does not
provoke FTBFS on the auto-builders and it remains possible to build the
package by invoking dpkg-buildpackage by hand. The fact that pbuilder
fails to build a certain package does not means that if breaks the build
of this package.

Besides,

  In any case, policy currently has:
  
  10.10. File names
  -
  
   The name of the files installed by binary packages in the system PATH
   (namely `/bin', `/sbin', `/usr/bin', `/usr/sbin' and `/usr/games')
   must be encoded in ASCII.

This section is intended to mean that file names in these directory must
be encoded in ASCII. I find it contrived to use this section as a
definition of a the PATH that should be used for building.

Kind regards, Thibaut.




signature.asc
Description: OpenPGP digital signature


Processed: Re: Bug#781210: systemd asserts on function cg_is_empty_recursive, crashes

2015-03-27 Thread Debian Bug Tracking System
Processing control commands:

 tag -1 confirmed
Bug #781210 [systemd] systemd asserts on function cg_is_empty_recursive, crashes
Added tag(s) confirmed.
 severity -1 grave
Bug #781210 [systemd] systemd asserts on function cg_is_empty_recursive, crashes
Severity set to 'grave' from 'important'
 fixed -1 219-1
Bug #781210 [systemd] systemd asserts on function cg_is_empty_recursive, crashes
Marked as fixed in versions systemd/219-1.

-- 
781210: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781210
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: severity of 781309 is normal

2015-03-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 781309 normal
Bug #781309 [ftp.debian.org] libdebconfclient0: Priority is 'Optional' although 
being a dependency of base-passwd
Severity set to 'normal' from 'serious'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
781309: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781309
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#780261: fsck scan of crypto-root on EVERY startup

2015-03-27 Thread Holger Todorowski

On Wed, 11 Mar 2015 19:58:23 +0100 Eduard Bloch e...@gmx.de wrote:


[...]

* Ben Hutchings [Wed, Mar 11 2015, 05:01:58PM]:

 [...]

 From the NEWS file:

   * If the RTC (real time clock) is set to local time and the local time is
 ahead of UTC, e2fsck will print a warning during boot about the time
 changing backward (bug #767040).  You can disable this by putting the
 following lines in /etc/e2fsck.conf:
 [options]
 broken_system_clock=1
[...]


[...]

Setting the mentioned option in e2fsck.conf does help.

[...]



I just want to confirm Eduards results.

I do not have an encrypted root but my system performed also a full fsck 
scan on every boot since this update.


I did have the superblock time warning but judging by the NEWS file I 
considered it only as a mere bonus info.


But it turned out that this time difference triggered the full scan and 
by setting the parameter I got rid of it.


Thanks Ben for the advice.


Regards
Holger


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#781210: systemd asserts on function cg_is_empty_recursive, crashes

2015-03-27 Thread Martin Pitt
Hello Faidon,

Faidon Liambotis [2015-03-27 18:06 +0200]:
 I *think* you read systemctl stop ipsec while I really meant ipsec
 stop (ipsec being /usr/sbin/ipsec, and stop being an action that
 sends SIGTERM to the daemons, among other things).

Ah, ok :-) Well, I don't actually need to do that, merely killing the
two daemons does just fine.

 By get that very exception you mean that systemd crashes for you as
 well? If so, that's great :)

Yes, I get that assertion.

 Anything more I can do to help then? You seem to be in a better
 position to reproduce than me at the moment.

Yes, should be fine. I created a reproducer in the form of an
autopkgtest, and now run git bisect on upstream to find the commit
between v215 and v219 that fixed it.

Martin
-- 
Martin Pitt| http://www.piware.de
Ubuntu Developer (www.ubuntu.com)  | Debian Developer  (www.debian.org)


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#781312: marked as done (CA certificates cannot handle internal space)

2015-03-27 Thread Debian Bug Tracking System
Your message dated Fri, 27 Mar 2015 16:34:50 +
with message-id e1ybxde-0001hs...@franck.debian.org
and subject line Bug#781312: fixed in moonshot-gss-eap 0.9.2-3+deb8u1
has caused the Debian Bug report #781312,
regarding CA certificates cannot handle internal space
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
781312: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781312
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
package: moonshot-gss-eap
version: 0.9.2-3
severity: serious
justification: Broken interoperability with the UK's production Moonshot
infrastructure.

It turns out that despite code designed specifically to permit internal
white space in CA certificates in moonshot trust anchors, the length
check in util_moonshot.c will reject a CA certificate whose base64
encoding includes whitespace.

Unfortunately, JISC Assent, the production Moonshot infrastructure in
the UK, includes internal space in the cross-organizational certificates
it generates.

So, using this version of the software, you cannot interact with those
credentials.


--Sam
---End Message---
---BeginMessage---
Source: moonshot-gss-eap
Source-Version: 0.9.2-3+deb8u1

We believe that the bug you reported is fixed in the latest version of
moonshot-gss-eap, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 781...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sam Hartman hartm...@debian.org (supplier of updated moonshot-gss-eap package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Fri, 27 Mar 2015 08:16:18 -0400
Source: moonshot-gss-eap
Binary: moonshot-gss-eap moonshot-gss-eap-dbg
Architecture: source amd64
Version: 0.9.2-3+deb8u1
Distribution: unstable
Urgency: medium
Maintainer: Sam Hartman hartm...@debian.org
Changed-By: Sam Hartman hartm...@debian.org
Description:
 moonshot-gss-eap - Moonshot Federated Authentication - authentication mechanism
 moonshot-gss-eap-dbg - Moonshot Federated Authentication - debugging Symbols
Closes: 781311 781312
Changes:
 moonshot-gss-eap (0.9.2-3+deb8u1) unstable; urgency=medium
 .
   * Incorporate upstream deltas:
   - 6dbf073: Allow white space in CA certificates, Closes: #781312
   - 90f04c98: Don't shut down openssl on last context deletion,
 Closes: #781311
Checksums-Sha1:
 8b74b9e6f0859ac8f50f713f0e5bbfc924eac9c4 2219 
moonshot-gss-eap_0.9.2-3+deb8u1.dsc
 df6a9a05dd8376e2982c9723bf78e0d9e73ad630 33288 
moonshot-gss-eap_0.9.2-3+deb8u1.debian.tar.xz
 caf92a4c6a6bff785dffd00cd6c13d587bd2c015 161198 
moonshot-gss-eap_0.9.2-3+deb8u1_amd64.deb
 4c95527cc335159b7839201dd4206201a6362023 658390 
moonshot-gss-eap-dbg_0.9.2-3+deb8u1_amd64.deb
Checksums-Sha256:
 98a6ff3235832ab5507e41a5d20cd97d5280657fc1696a4f69ab9903b3f08a39 2219 
moonshot-gss-eap_0.9.2-3+deb8u1.dsc
 e46650b54ee411c830187410f0335f9290f2b184da9478e4047e4457b6180e42 33288 
moonshot-gss-eap_0.9.2-3+deb8u1.debian.tar.xz
 13b562d16bb639c56d4c73f17fb1bed35a008a66f20f7d20ff5878c83d2f0567 161198 
moonshot-gss-eap_0.9.2-3+deb8u1_amd64.deb
 912e2e70f502b147677ca77b472d5897d56770a7bc96144b56d5bf4755f8829f 658390 
moonshot-gss-eap-dbg_0.9.2-3+deb8u1_amd64.deb
Files:
 e614302682d0b2f607a8ed8f94d528af 2219 net optional 
moonshot-gss-eap_0.9.2-3+deb8u1.dsc
 6f9bdad598ee1e6d761b4302a43e49fd 33288 net optional 
moonshot-gss-eap_0.9.2-3+deb8u1.debian.tar.xz
 d34d31f18598a0f3e6431794ea4a3b6b 161198 net optional 
moonshot-gss-eap_0.9.2-3+deb8u1_amd64.deb
 188b90d88d556496b08056e966156aec 658390 debug extra 
moonshot-gss-eap-dbg_0.9.2-3+deb8u1_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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Bug#781311: marked as done (gss_delete_sec_context breaks openssl usage in other libraries)

2015-03-27 Thread Debian Bug Tracking System
Your message dated Fri, 27 Mar 2015 16:34:50 +
with message-id e1ybxde-0001hm...@franck.debian.org
and subject line Bug#781311: fixed in moonshot-gss-eap 0.9.2-3+deb8u1
has caused the Debian Bug report #781311,
regarding gss_delete_sec_context breaks openssl usage in other libraries
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
781311: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781311
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
package: moonshot-gss-eap
version: 0.9.2-3
severity: grave

Whenever the last gss-eap security context is deleted, the gss-eap
mechanism shuts down openssl including freeing x_data, error strings,
and engines.
In practice this tends to mean that any other library in the same
process using openssl will fail.
So, for example if you use GSS-API to authenticate a TLS-protected
session, then that session will fail.

This is grave because it breaks unrelated packages.
---End Message---
---BeginMessage---
Source: moonshot-gss-eap
Source-Version: 0.9.2-3+deb8u1

We believe that the bug you reported is fixed in the latest version of
moonshot-gss-eap, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 781...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sam Hartman hartm...@debian.org (supplier of updated moonshot-gss-eap package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Fri, 27 Mar 2015 08:16:18 -0400
Source: moonshot-gss-eap
Binary: moonshot-gss-eap moonshot-gss-eap-dbg
Architecture: source amd64
Version: 0.9.2-3+deb8u1
Distribution: unstable
Urgency: medium
Maintainer: Sam Hartman hartm...@debian.org
Changed-By: Sam Hartman hartm...@debian.org
Description:
 moonshot-gss-eap - Moonshot Federated Authentication - authentication mechanism
 moonshot-gss-eap-dbg - Moonshot Federated Authentication - debugging Symbols
Closes: 781311 781312
Changes:
 moonshot-gss-eap (0.9.2-3+deb8u1) unstable; urgency=medium
 .
   * Incorporate upstream deltas:
   - 6dbf073: Allow white space in CA certificates, Closes: #781312
   - 90f04c98: Don't shut down openssl on last context deletion,
 Closes: #781311
Checksums-Sha1:
 8b74b9e6f0859ac8f50f713f0e5bbfc924eac9c4 2219 
moonshot-gss-eap_0.9.2-3+deb8u1.dsc
 df6a9a05dd8376e2982c9723bf78e0d9e73ad630 33288 
moonshot-gss-eap_0.9.2-3+deb8u1.debian.tar.xz
 caf92a4c6a6bff785dffd00cd6c13d587bd2c015 161198 
moonshot-gss-eap_0.9.2-3+deb8u1_amd64.deb
 4c95527cc335159b7839201dd4206201a6362023 658390 
moonshot-gss-eap-dbg_0.9.2-3+deb8u1_amd64.deb
Checksums-Sha256:
 98a6ff3235832ab5507e41a5d20cd97d5280657fc1696a4f69ab9903b3f08a39 2219 
moonshot-gss-eap_0.9.2-3+deb8u1.dsc
 e46650b54ee411c830187410f0335f9290f2b184da9478e4047e4457b6180e42 33288 
moonshot-gss-eap_0.9.2-3+deb8u1.debian.tar.xz
 13b562d16bb639c56d4c73f17fb1bed35a008a66f20f7d20ff5878c83d2f0567 161198 
moonshot-gss-eap_0.9.2-3+deb8u1_amd64.deb
 912e2e70f502b147677ca77b472d5897d56770a7bc96144b56d5bf4755f8829f 658390 
moonshot-gss-eap-dbg_0.9.2-3+deb8u1_amd64.deb
Files:
 e614302682d0b2f607a8ed8f94d528af 2219 net optional 
moonshot-gss-eap_0.9.2-3+deb8u1.dsc
 6f9bdad598ee1e6d761b4302a43e49fd 33288 net optional 
moonshot-gss-eap_0.9.2-3+deb8u1.debian.tar.xz
 d34d31f18598a0f3e6431794ea4a3b6b 161198 net optional 
moonshot-gss-eap_0.9.2-3+deb8u1_amd64.deb
 188b90d88d556496b08056e966156aec 658390 debug extra 
moonshot-gss-eap-dbg_0.9.2-3+deb8u1_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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Bug#781265: gnome-power-manager: gnome-power-statistics segfaults always under certain case

2015-03-27 Thread Andreas Cadhalpun
Control: reassign -1 upower
Control: forcemerge 774546 -1

Hi Mohammed,

On 27.03.2015 01:45, Mohammed Sadik P. K. wrote:
 On 3/27/15, Andreas Cadhalpun andreas.cadhal...@googlemail.com wrote:
 This looks like a duplicate of #774546 [1].
 Can you install libupower-glib3 0.99.2-2 from experimental and report
 if that fixed this problem?
 
 Yes, It does fix the bug. Please close the bug.

Thanks for confirming. I'm merging it with the other bug.

Best regards,
Andreas


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#781265: gnome-power-manager: gnome-power-statistics segfaults always under certain case

2015-03-27 Thread Debian Bug Tracking System
Processing control commands:

 reassign -1 upower
Bug #781265 [gnome-power-manager] gnome-power-manager: gnome-power-statistics 
segfaults always under certain case
Bug reassigned from package 'gnome-power-manager' to 'upower'.
No longer marked as found in versions gnome-power-manager/3.14.1-1.
Ignoring request to alter fixed versions of bug #781265 to the same values 
previously set
 forcemerge 774546 -1
Bug #774546 {Done: Martin Pitt mp...@debian.org} [upower] two uninitialized 
pointers cause segfaults
Bug #781265 [upower] gnome-power-manager: gnome-power-statistics segfaults 
always under certain case
Severity set to 'important' from 'grave'
Marked Bug as done
Added indication that 781265 affects gnome-power-manager,mate-power-manager
Marked as fixed in versions upower/0.99.2-2.
Marked as found in versions upower/0.99.1-3.1.
Added tag(s) sid, jessie, fixed-upstream, and patch.
Merged 774546 781265

-- 
774546: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774546
781265: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781265
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#781306: Please remove makehuman from debian jessie

2015-03-27 Thread Joel Palmius

I am an official representant from the MakeHuman crew.

The version currently in debian repositories is a several years old 
alpha. It is not stable. It is not fit for use. It is not supported. It 
is not endorsed by the MakeHuman crew.


Unless bug #751755 is solved, the most efficient way to handle all bugs 
related to the makehuman package currently in the debian repositories 
would be to remove the package altogether.


This is what we of the makehuman crew recommends as an emergency fix.


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#781210: systemd asserts on function cg_is_empty_recursive, crashes

2015-03-27 Thread Faidon Liambotis
Hi Martin,

On Fri, Mar 27, 2015 at 04:40:25PM +0100, Martin Pitt wrote:
  If so, a mere ipsec stop after that should be able to crash
  systemd.
 
 Not that, it just marks the unit as stopped but keeps the processes
 running. But killing the two daemons manually makes the cgroup empty
 and I get that very exception.

I *think* you read systemctl stop ipsec while I really meant ipsec
stop (ipsec being /usr/sbin/ipsec, and stop being an action that
sends SIGTERM to the daemons, among other things).

By get that very exception you mean that systemd crashes for you as
well? If so, that's great :) Anything more I can do to help then? You
seem to be in a better position to reproduce than me at the moment.

On a side note, I've noticed that if I put the system under stress
--cpu 8 the behavior changes and systemctl restart strongswan works
properly. This definitely points to some kind of race.

Thanks!
Faidon


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: limit source to perl, tagging 781120

2015-03-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 limit source perl
Limiting to bugs with field 'source' containing at least one of 'perl'
Limit currently set to 'source':'perl'

 tags 781120 + pending
Bug #781120 [perl] perl: handling of non-readable directories on @INC
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
781120: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781120
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: clone for release notes

2015-03-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 clone 781120 -1
Bug #781120 [perl] perl: handling of non-readable directories on @INC
Bug 781120 cloned as bug 781334
 severity -1 normal
Bug #781334 [perl] perl: handling of non-readable directories on @INC
Severity set to 'normal' from 'serious'
 retitle -1 release-notes: add warning about change in perl's handling of 
 unreadable module paths
Bug #781334 [perl] perl: handling of non-readable directories on @INC
Changed Bug title to 'release-notes: add warning about change in perl's 
handling of unreadable module paths' from 'perl: handling of non-readable 
directories on @INC'

End of message, stopping processing here.

Please contact me if you need assistance.
-- 
781120: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781120
781334: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781334
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: found 780989 in 0.8.5-1

2015-03-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 found 780989 0.8.5-1
Bug #780989 {Done: Jelmer Vernooij jel...@debian.org} [src:dulwich] dulwich: 
CVE-2014-9706: does not prevent to write files in commits with invalid paths to 
working tree
Bug #781001 {Done: Jelmer Vernooij jel...@debian.org} [src:dulwich] 
python-dulwich: CVE-2014-9706: arbitrary command execution vulnerability in 
conjunction with git
Marked as found in versions dulwich/0.8.5-1.
Marked as found in versions dulwich/0.8.5-1.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
780989: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780989
781001: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781001
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#781346: slapi-nis: CVE-2015-0283: infinite loop in getgrnam_r() and getgrgid_r()

2015-03-27 Thread Salvatore Bonaccorso
Source: slapi-nis
Version: 0.54-1
Severity: grave
Tags: security upstream fixed-upstream

Hi Timo,

the following vulnerability was published for slapi-nis. I was not
able to verify the issue itself but only checked patch-wise.

CVE-2015-0283[0]:
infinite loop in getgrnam_r() and getgrgid_r()

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities  Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2015-0283
[1] https://bugzilla.redhat.com/show_bug.cgi?id=1195729

Regards,
Salvatore


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#780645: marked as done (shinken-mod-webui: files containing password or salt are word readable)

2015-03-27 Thread Debian Bug Tracking System
Your message dated Fri, 27 Mar 2015 21:36:04 +
with message-id e1ybbva-0006uv...@franck.debian.org
and subject line Bug#780645: fixed in shinken-mod-webui 1.0-3
has caused the Debian Bug report #780645,
regarding shinken-mod-webui: files containing password or salt are word readable
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
780645: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780645
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: shinken-mod-webui
Version: 1.0-1
Severity: grave
Tags: security
Justification: user security hole

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

The two files referenced in README containing users+passwords and salt
are world readable.

Any local user can apparently gain administrator access to shinken!


 - Jonas

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=K7qm
-END PGP SIGNATURE-
---End Message---
---BeginMessage---
Source: shinken-mod-webui
Source-Version: 1.0-3

We believe that the bug you reported is fixed in the latest version of
shinken-mod-webui, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 780...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thibault Cohen thibault.co...@savoirfairelinux.com (supplier of updated 
shinken-mod-webui package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Thu, 26 Mar 2015 10:19:04 -0400
Source: shinken-mod-webui
Binary: shinken-mod-webui
Architecture: source all
Version: 1.0-3
Distribution: unstable
Urgency: medium
Maintainer: Shinken Debian packages maintainers 
pkg-shinken-ma...@lists.alioth.debian.org
Changed-By: Thibault Cohen thibault.co...@savoirfairelinux.com
Description:
 shinken-mod-webui - Shinken webui module
Closes: 780645
Changes:
 shinken-mod-webui (1.0-3) unstable; urgency=medium
 .
   [ Thibault Cohen ]
   * Fix perms on webui.cfg. (Closes: #780645)
Checksums-Sha1:
 3ced1d90b4e575aa9a2a290d99bbb4cea9f26e80 2111 shinken-mod-webui_1.0-3.dsc
 baf61a89308aea93b28e841dc68dadd0c85f3ab2 398412 
shinken-mod-webui_1.0-3.debian.tar.xz
 450c8f6279809f395463bdf0a57cb527e7a97441 2599130 
shinken-mod-webui_1.0-3_all.deb
Checksums-Sha256:
 ffa4274040b805061948824ec9950da81af8407561c8867b415ac5fe23d73ef6 2111 
shinken-mod-webui_1.0-3.dsc
 50dfcc39a23853cce5e40feb8e24959c68247db9bb4eae58c76fee4d12c5ede0 398412 
shinken-mod-webui_1.0-3.debian.tar.xz
 4e9f537d0058df7ad8775efc6ca95f3bc5ff19f8c13404238856a607b56281f5 2599130 
shinken-mod-webui_1.0-3_all.deb
Files:
 55c42cc4f77aace4aeb6736e304b7d77 2111 net optional shinken-mod-webui_1.0-3.dsc
 9720a8a44bef8b5fe76a287311ccc154 398412 net optional 
shinken-mod-webui_1.0-3.debian.tar.xz
 ebb5955b12b92fa3b135cf18c2f11096 2599130 net optional 
shinken-mod-webui_1.0-3_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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Processed: fig: New upstream version, renamed to docker-compose

2015-03-27 Thread Debian Bug Tracking System
Processing control commands:

 block -1 by 781355 781054
Bug #781356 [fig] fig: New upstream version, renamed to docker-compose
781356 was not blocked by any bugs.
781356 was not blocking any bugs.
Added blocking bug(s) of 781356: 781355 and 781054

-- 
781356: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781356
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#781356: fig: New upstream version, renamed to docker-compose

2015-03-27 Thread Felipe Sateler
Package: fig
Version: 1.0.0-1
Severity: serious
Control: block -1 by 781355 781054

Setting severity to serious because it should not reach testing
after jessie release until it is updated.

There is version 1.1.0, but dockerpty is not packaged yet and
python-docker is too old.


-- System Information:
Debian Release: 8.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages fig depends on:
ii  python2.7.9-1
ii  python-docker 0.5.3-2
ii  python-docopt 0.6.2-1
ii  python-requests   2.4.3-6
ii  python-six1.8.0-1
ii  python-texttable  0.8.1-1
ii  python-websocket  0.18.0-2
ii  python-yaml   3.11-2
pn  python:anynone

fig recommends no packages.

fig suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#775733: xemacs21-gnome-*: hangs during upgrade from squeeze - wheezy - jessie

2015-03-27 Thread gregor herrmann
On Tue, 24 Mar 2015 10:18:44 -0700, Mark Brown wrote:

 Actually having opened the logs I'm not seeing the command lines, the
 logs appear to start with displaying output from the commend.

And the output shows the used command lines very close to the top:

% grep -n Command line xemacs21-gnome-mule* 
xemacs21-gnome-mule.patched.pass.log:7:0m0.0s INFO: Command line arguments: 
/srv/piuparts/sbin/piuparts --skip-logrotatefiles-test --warn-on-others 
--no-eatmydata --scriptsdir /etc/piuparts/scripts --allow-database 
--warn-on-leftovers-after-purge -i /etc/shells --scriptsdir 
/etc/piuparts/scripts-jessie --warn-on-debsums-errors --proxy 
http://localhost:3128 --mirror 'http://ftp.de.debian.org/debian main' --tmpdir 
/tmp/piupartss --arch amd64 -b /srv/piuparts/slave/basetgz/squeeze_amd64.tar.gz 
-d squeeze -d wheezy -d jessie --apt xemacs21-gnome-mule=None --bindmount 
/tmp/xem2 --testdebs-repo /tmp/xem2 --distupgrade-to-testdebs --log-file 
xemacs21-gnome-mule.patched.pass.log
xemacs21-gnome-mule_None.fail.log:41:0m0.0s INFO: Command line arguments: 
/srv/piuparts/sbin/piuparts --skip-logrotatefiles-test --warn-on-others 
--no-eatmydata --scriptsdir /etc/piuparts/scripts --allow-database 
--warn-on-leftovers-after-purge -i /etc/shells --scriptsdir 
/etc/piuparts/scripts-jessie --warn-on-debsums-errors --proxy 
http://localhost:3128 --mirror 'http://ftp.de.debian.org/debian main' --tmpdir 
/tmp/piupartss --arch amd64 -b /srv/piuparts/slave/basetgz/squeeze_amd64.tar.gz 
-d squeeze -d wheezy -d jessie -d testing --apt xemacs21-gnome-mule=None


Cheers,
gregor

-- 
 .''`.  Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06
 : :' : Debian GNU/Linux user, admin, and developer -  https://www.debian.org/
 `. `'  Member of VIBE!AT  SPI, fellow of the Free Software Foundation Europe
   `-   NP: Red Hot Chili Peppers: Savior


signature.asc
Description: Digital Signature