Bug#862154: wolfssl: CVE-2017-2800 / TALOS-2017-0293

2017-05-08 Thread Salvatore Bonaccorso
Source: wolfssl
Version: 3.10.2+dfsg-2
Severity: grave
Tags: upstream security

Hi,

the following vulnerability was published for wolfssl.

CVE-2017-2800[0]:
No description was found (try on a search engine)

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-2800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2800
[1] http://www.talosintelligence.com/reports/TALOS-2017-0293/

Regards,
Salvatore



Bug#862098: marked as done (lxterminal: CVE-2016-10369: socket can be blocked by another user)

2017-05-08 Thread Debian Bug Tracking System
Your message dated Tue, 09 May 2017 06:34:08 +
with message-id 
and subject line Bug#862098: fixed in lxterminal 0.3.0-2
has caused the Debian Bug report #862098,
regarding lxterminal: CVE-2016-10369: socket can be blocked by another user
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
862098: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862098
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: lxterminal
Version: 0.3.0-1
Severity: grave
Tags: upstream patch security
Justification: user security hole

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

This vulnerability is discussed in a Stackexchange website:

https://unix.stackexchange.com/questions/333539/lxterminal-in-the-netstat-output/333578

The socket placed in /tmp is predictable and public-writable, Therefore
if Alice placed a file or lxterminal socket in
/tmp/.lxterminal-socket:0-bob, bob is unable to open lxterminal, or open
a lxterminal instance for Alice.

This bug is fixed in the commit:
https://git.lxde.org/gitweb/?p=lxde/lxterminal.git;a=commit;h=f99163c6ff8b2f57c5f37b1ce5d62cf7450d4648

- -- System Information:
Debian Release: 9.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64
 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.9.0-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages lxterminal depends on:
ii  libatk1.0-0  2.22.0-1
ii  libc62.24-10
ii  libcairo21.14.8-1
ii  libfontconfig1   2.11.0-6.7+b1
ii  libfreetype6 2.6.3-3.2
ii  libgdk-pixbuf2.0-0   2.36.5-2
ii  libglib2.0-0 2.50.3-2
ii  libgtk2.0-0  2.24.31-2
ii  libpango-1.0-0   1.40.5-1
ii  libpangocairo-1.0-0  1.40.5-1
ii  libpangoft2-1.0-01.40.5-1
ii  libvte9  1:0.28.2-5+b2
ii  libx11-6 2:1.6.4-3
ii  libxext6 2:1.3.3-1+b2

lxterminal recommends no packages.

lxterminal suggests no packages.

- -- no debconf information

-BEGIN PGP SIGNATURE-
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=fmHh
-END PGP SIGNATURE-
--- End Message ---
--- Begin Message ---
Source: lxterminal
Source-Version: 0.3.0-2

We believe that the bug you reported is fixed in the latest version of
lxterminal, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 862...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Yao Wei (魏銘廷)  (supplier of updated lxterminal package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 09 May 2017 12:13:07 +0800
Source: lxterminal
Binary: lxterminal lxterminal-dbg
Architecture: source
Version: 0.3.0-2
Distribution: unstable
Urgency: high
Maintainer: Debian LXDE Maintainers 

Changed-By: Yao Wei (魏銘廷) 
Description:
 lxterminal - LXDE terminal emulator
 lxterminal-dbg - LXDE terminal emulator (debug)
Closes: 862096 862098
Changes:
 lxterminal (0.3.0-2) unstable; urgency=high
 .
   * Fix improper use of /tmp for a socket file. (CVE-2016-10369)
 (Closes: #862098)
   * Fix tab renaming dialog. (Closes: #862096)
Checksums-Sha1:
 31a95d70463145b8aad662f4ce2dfea74743c901 2124 lxterminal_0.3.0-2.dsc
 a24fd7df8742321d1a5ad828ccb397333e8e406f 7320 lxterminal_0.3.0-2.debian.tar.xz
 b1cada92dcd40aec33d39efb0553ad101b1cd836 11218 
lxterminal_0.3.0-2_source.

Bug#860225: marked as done (bind9: CVE-2017-3137: A response packet can cause a resolver to terminate when processing an answer containing a CNAME or DNAME)

2017-05-08 Thread Debian Bug Tracking System
Your message dated Tue, 09 May 2017 04:48:34 +
with message-id 
and subject line Bug#860225: fixed in bind9 1:9.10.3.dfsg.P4-12.3
has caused the Debian Bug report #860225,
regarding bind9: CVE-2017-3137: A response packet can cause a resolver to 
terminate when processing an answer containing a CNAME or DNAME
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
860225: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860225
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: bind9
Version: 1:9.9.5.dfsg-9
Severity: grave
Tags: patch upstream security fixed-upstream

Hi,

the following vulnerability was published for bind9.

CVE-2017-3137[0]:
|A response packet can cause a resolver to terminate when processing an
|answer containing a CNAME or DNAME

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-3137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3137
[1] https://kb.isc.org/article/AA-01466

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

-- System Information:
Debian Release: 9.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/8 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)
--- End Message ---
--- Begin Message ---
Source: bind9
Source-Version: 1:9.10.3.dfsg.P4-12.3

We believe that the bug you reported is fixed in the latest version of
bind9, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 860...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso  (supplier of updated bind9 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 07 May 2017 15:22:46 +0200
Source: bind9
Binary: bind9 bind9utils bind9-doc host bind9-host libbind-dev libbind9-140 
libdns162 libirs141 libisc160 liblwres141 libisccc140 libisccfg140 dnsutils 
lwresd libbind-export-dev libdns-export162 libdns-export162-udeb 
libisc-export160 libisc-export160-udeb libisccfg-export140 libisccc-export140 
libisccc-export140-udeb libisccfg-export140-udeb libirs-export141 
libirs-export141-udeb
Architecture: all source
Version: 1:9.10.3.dfsg.P4-12.3
Distribution: unstable
Urgency: high
Maintainer: LaMont Jones 
Changed-By: Salvatore Bonaccorso 
Closes: 860224 860225 860226
Description: 
 bind9  - Internet Domain Name Server
 bind9-doc  - Documentation for BIND
 bind9-host - Version of 'host' bundled with BIND 9.X
 bind9utils - Utilities for BIND
 dnsutils   - Clients provided with BIND
 host   - Transitional package
 libbind-dev - Static Libraries and Headers used by BIND
 libbind-export-dev - Development files for the exported BIND libraries
 libbind9-140 - BIND9 Shared Library used by BIND
 libdns-export162 - Exported DNS Shared Library
 libdns-export162-udeb - Exported DNS library for debian-installer (udeb)
 libdns162  - DNS Shared Library used by BIND
 libirs-export141 - Exported IRS Shared Library
 libirs-export141-udeb - Exported IRS library for debian-installer (udeb)
 libirs141  - DNS Shared Library used by BIND
 libisc-export160 - Exported ISC Shared Library
 libisc-export160-udeb - Exported ISC library for debian-installer (udeb)
 libisc160  - ISC Shared Library used by BIND
 libisccc-export140 - Command Channel Library used by BIND
 libisccc-export140-udeb - Command Channel Library used by BIND (udeb)
 libisccc140 - Command Channel Library used by BIND
 libisccfg-export140 - Exported ISC CFG Shared Library
 libisccfg-export140-udeb - Exported ISC CFG library for debian-installer (udeb)
 libisccfg140 - Config File Handling Library used by BIND
 liblwres141 - Lightweight Resolver Library used by BIND
 lwresd - Lightweight Resolver Daemon
Changes:
 bind9 (1:9.10.3.dfsg.P4-12.3) unstable; urgency=high
 .
   * Non-maintainer upload.
   * Dns64 with "break-dnssec yes;" can result in a assertion failure
 (CVE

Bug#860225: bind9: diff for NMU version 1:9.10.3.dfsg.P4-12.3

2017-05-08 Thread Salvatore Bonaccorso
Hi Michael,

On Mon, May 08, 2017 at 06:23:23PM -0400, Michael Gilbert wrote:
> On Sun, May 7, 2017 at 10:38 AM, Salvatore Bonaccorso wrote:
> > I've prepared an NMU for bind9 (versioned as 1:9.10.3.dfsg.P4-12.3) and
> > uploaded it to DELAYED/5. Please feel free to tell me if I
> > should delay it longer.
> 
> Hi Salvatore,
> 
> I reviewed the diff.  It does look correct to me, so please feel free
> to remove the delay.

Okay rescheduled!

> I don't have the free time to prepare the jessie DSA right now, are
> you willing to do it?

Okay I will try to come up with the patchset/debdiff and will post it
here for testing.

Regards,
Salvatore



Bug#860225: bind9: diff for NMU version 1:9.10.3.dfsg.P4-12.3

2017-05-08 Thread Salvatore Bonaccorso
Hi,

On Mon, May 08, 2017 at 06:28:51PM -0400, Michael Gilbert wrote:
> On Mon, May 8, 2017 at 6:23 PM, Michael Gilbert wrote:
> > I reviewed the diff.  It does look correct to me, so please feel free
> > to remove the delay.
> 
> There is also CVE-2017-3139 now [0].

This should only affect Red Hat bind9 version as in Red Hat 6 and not
ustream bind, so Debian should furthermore not be affected by this.
Was this assessment wrong?

Regards,
Salvatore



Bug#854872: marked as done (golang-github-docker-docker-credential-helpers FTBFS on 32bit: type [1073741824]*C.char larger than address space)

2017-05-08 Thread Debian Bug Tracking System
Your message dated Tue, 09 May 2017 00:33:31 +
with message-id 
and subject line Bug#854872: fixed in 
golang-github-docker-docker-credential-helpers 0.5.0-2
has caused the Debian Bug report #854872,
regarding golang-github-docker-docker-credential-helpers FTBFS on 32bit: type 
[1073741824]*C.char larger than address space
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
854872: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854872
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: golang-github-docker-docker-credential-helpers
Version: 0.3.0+git20160906.22.f72c04f-1
Severity: serious

https://buildd.debian.org/status/package.php?p=golang-github-docker-docker-credential-helpers

...
make[1]: Entering directory 
'/«BUILDDIR»/golang-github-docker-docker-credential-helpers-0.3.0+git20160906.22.f72c04f'
dh_auto_build
go install -v -p 1 github.com/docker/docker-credential-helpers/client 
github.com/docker/docker-credential-helpers/credentials 
github.com/docker/docker-credential-helpers/secretservice 
github.com/docker/docker-credential-helpers/secretservice/cmd
github.com/docker/docker-credential-helpers/credentials
github.com/docker/docker-credential-helpers/client
github.com/docker/docker-credential-helpers/secretservice
# github.com/docker/docker-credential-helpers/secretservice
src/github.com/docker/docker-credential-helpers/secretservice/secretservice_linux.go:98:
 type [1073741824]*C.char larger than address space
src/github.com/docker/docker-credential-helpers/secretservice/secretservice_linux.go:98:
 type [1073741824]*C.char too large
src/github.com/docker/docker-credential-helpers/secretservice/secretservice_linux.go:99:
 type [1073741824]*C.char larger than address space
src/github.com/docker/docker-credential-helpers/secretservice/secretservice_linux.go:99:
 type [1073741824]*C.char too large
dh_auto_build: go install -v -p 1 
github.com/docker/docker-credential-helpers/client 
github.com/docker/docker-credential-helpers/credentials 
github.com/docker/docker-credential-helpers/secretservice 
github.com/docker/docker-credential-helpers/secretservice/cmd returned exit 
code 2
debian/rules:7: recipe for target 'override_dh_auto_build' failed
make[1]: *** [override_dh_auto_build] Error 2
make[1]: Leaving directory 
'/«BUILDDIR»/golang-github-docker-docker-credential-helpers-0.3.0+git20160906.22.f72c04f'
debian/rules:4: recipe for target 'build-arch' failed
make: *** [build-arch] Error 2
--- End Message ---
--- Begin Message ---
Source: golang-github-docker-docker-credential-helpers
Source-Version: 0.5.0-2

We believe that the bug you reported is fixed in the latest version of
golang-github-docker-docker-credential-helpers, which is due to be installed in 
the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 854...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jordi Mallach  (supplier of updated 
golang-github-docker-docker-credential-helpers package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 09 May 2017 00:03:09 +0200
Source: golang-github-docker-docker-credential-helpers
Binary: golang-github-docker-docker-credential-helpers-dev 
golang-docker-credential-helpers
Architecture: source amd64 all
Version: 0.5.0-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Go Packaging Team 

Changed-By: Jordi Mallach 
Description:
 golang-docker-credential-helpers - Use native stores to safeguard Docker 
credentials
 golang-github-docker-docker-credential-helpers-dev - Use native stores to 
safeguard Docker credentials
Closes: 854872
Changes:
 golang-github-docker-docker-credential-helpers (0.5.0-2) unstable; 
urgency=medium
 .
   * Attempt to fix 32bit builds by reducing the slice conversion
 (closes: #854872).
Checksums-Sha1:
 1dec5d2ad2d855d4f288b2714798cb56fccdf288 2591 
golang-github-docker-docker-credential-helpers_0.5.0-2.dsc
 071c55d5f4beb5bd9c3256b545f8f4ca9c64f800 2600 
golang-github-docker-docker-credential-helpers_0.5.0-2.debian.tar.xz
 935b78c3a992cf95b2bc04344ba43ac2f5972dfb 253126 
golang-docker-credential-helpers-dbgsym_0.5.0-2_amd64.deb
 fb824ea3e808041847c36832e86de8ab6761fe1c 474394 
go

Bug#861539: marked as done (tcpreplay FTBFS on armel/armhf/mips*: L7 fuzzing test: Makefile:963: recipe for target 'rewrite_l7fuzzing' failed)

2017-05-08 Thread Debian Bug Tracking System
Your message dated Tue, 09 May 2017 00:18:39 +
with message-id 
and subject line Bug#861539: fixed in tcpreplay 4.2.5-1
has caused the Debian Bug report #861539,
regarding tcpreplay FTBFS on armel/armhf/mips*: L7 fuzzing test: Makefile:963: 
recipe for target 'rewrite_l7fuzzing' failed
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
861539: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861539
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: tcpreplay
Version: 4.2.4-1
Severity: serious

https://buildd.debian.org/status/package.php?p=tcpreplay&suite=sid

...
[tcprewrite] Seeded Keep MAC test:  OK
[tcprewrite] L7 fuzzing test: Makefile:963: recipe for target 
'rewrite_l7fuzzing' failed
make[2]: *** [rewrite_l7fuzzing] Error 1
make[2]: Target 'test' not remade because of errors.
make[2]: Leaving directory '/«PKGBUILDDIR»/test'
Makefile:888: recipe for target 'test' failed
make[1]: *** [test] Error 2
--- End Message ---
--- Begin Message ---
Source: tcpreplay
Source-Version: 4.2.5-1

We believe that the bug you reported is fixed in the latest version of
tcpreplay, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 861...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christoph Biedl  (supplier of updated tcpreplay 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 09 May 2017 01:10:08 +0200
Source: tcpreplay
Binary: tcpreplay
Architecture: source powerpc
Version: 4.2.5-1
Distribution: unstable
Urgency: medium
Maintainer: Christoph Biedl 
Changed-By: Christoph Biedl 
Description:
 tcpreplay  - Tool to replay saved tcpdump files at arbitrary speeds
Closes: 861539
Changes:
 tcpreplay (4.2.5-1) unstable; urgency=medium
 .
   * New upstream version 4.2.5. Also fixes test for architectures
 where unaligned memory access is not acceptable. Closes: #861539
Checksums-Sha1:
 ba43c1c2b4aecaf45e043290b4a7d49a7ce3fc37 1761 tcpreplay_4.2.5-1.dsc
 18f695597693a10918a9b4c0af4abeb7253ed5da 714028 tcpreplay_4.2.5.orig.tar.xz
 80c16b26d2e5437c5f4af5d957385540d1fece54 7512 tcpreplay_4.2.5-1.debian.tar.xz
 21c4e7f97bbbd253110c45f24ae82762b4188299 679184 
tcpreplay-dbgsym_4.2.5-1_powerpc.deb
 0ac449e26360100c393f5c36c9b5870087b405f4 4926 
tcpreplay_4.2.5-1_powerpc.buildinfo
 7d6776c5d0e8be163608fd472372afbfdb87c9d3 214994 tcpreplay_4.2.5-1_powerpc.deb
Checksums-Sha256:
 92ad8a09c5e2a446c19caf63ca22b5941fad6f5f635cdbd0d18c9c805d1d8ece 1761 
tcpreplay_4.2.5-1.dsc
 4c8739a34040ff78ac5a6133105a1220218de4f4ea865673950bd54da74d34d4 714028 
tcpreplay_4.2.5.orig.tar.xz
 8ab2420f79d366b8f191316be742534d092382f52a17e3cbd4d4b63b23e426a5 7512 
tcpreplay_4.2.5-1.debian.tar.xz
 f1245c846be402fc516b5dc25496f9c3ad4439870975ce0945481fc6db855748 679184 
tcpreplay-dbgsym_4.2.5-1_powerpc.deb
 095e9bb61037953e1e0af67c9b3c1a7e21be9f510887232e8bc7a6f68c3344a1 4926 
tcpreplay_4.2.5-1_powerpc.buildinfo
 60fed547ca343f6a2aa1e2fa155bc63ec93144de4769ce066ec28b683fcfcb5d 214994 
tcpreplay_4.2.5-1_powerpc.deb
Files:
 11104e6dc9ae891bf8dd07af1d1b6264 1761 net optional tcpreplay_4.2.5-1.dsc
 755ce8821132b4a5adcb508aaa7f1f81 714028 net optional 
tcpreplay_4.2.5.orig.tar.xz
 f8df13418d6046268854f62b47b3a785 7512 net optional 
tcpreplay_4.2.5-1.debian.tar.xz
 31627d877e36781328cd6feba6a490b1 679184 debug extra 
tcpreplay-dbgsym_4.2.5-1_powerpc.deb
 0a69c28051f272db8a6e245443b0b55a 4926 net optional 
tcpreplay_4.2.5-1_powerpc.buildinfo
 cda7a8adab3a07517a48395beca2aa0c 214994 net optional 
tcpreplay_4.2.5-1_powerpc.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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Bug#860225: bind9: diff for NMU version 1:9.10.3.dfsg.P4-12.3

2017-05-08 Thread Michael Gilbert
On Mon, May 8, 2017 at 6:23 PM, Michael Gilbert wrote:
> I reviewed the diff.  It does look correct to me, so please feel free
> to remove the delay.

There is also CVE-2017-3139 now [0].

Best wishes,
Mike

[0] https://access.redhat.com/errata/RHSA-2017:1202



Bug#860225: bind9: diff for NMU version 1:9.10.3.dfsg.P4-12.3

2017-05-08 Thread Michael Gilbert
On Sun, May 7, 2017 at 10:38 AM, Salvatore Bonaccorso wrote:
> I've prepared an NMU for bind9 (versioned as 1:9.10.3.dfsg.P4-12.3) and
> uploaded it to DELAYED/5. Please feel free to tell me if I
> should delay it longer.

Hi Salvatore,

I reviewed the diff.  It does look correct to me, so please feel free
to remove the delay.

I don't have the free time to prepare the jessie DSA right now, are
you willing to do it?

Best wishes,
Mike



Bug#861591: Bug#862071: password-store: FTBFS when built in a path with >= 74 characters

2017-05-08 Thread Chris Lamb
gregor herrmann wrote:

> > This is due to GNUPGHOME needing to fit within sockaddr_un.sun_path.
> 
> Also #861591, where the same happens.
> 
> I'm not sure how RC-ish this should be, as build paths by our usual
> tools (sbuild, pbuilder) are, IIRC, shorter (/build//…), so
> this shouldn't be a problem in most cases.

As it happens, it appears to also fail when HOME is non-existent:

  https://gist.github.com/lamby/72f051e7c4dd75cfbdd23e48a2151f5e/raw

… which is even more dubious as RC severity, but I'll leave that to
the Release Team.


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-



Processed: use a temporary $GNUPGHOME for test suites

2017-05-08 Thread Debian Bug Tracking System
Processing control commands:

> affects 862071 + src:gnupg2
Bug #862071 [src:password-store] password-store: FTBFS when built in a path 
with >= 74 characters
Added indication that 862071 affects src:gnupg2

-- 
862071: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862071
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#862071: use a temporary $GNUPGHOME for test suites

2017-05-08 Thread Daniel Kahn Gillmor
Control: affects 862071 + src:gnupg2

Upstream's recommendation is currently to use a temporary $GNUPGHOME
(with a short path) for test suites which depend on GnuPG with an
ephemeral homedir.

  --dkg


signature.asc
Description: PGP signature


Bug#861591: Bug#862071: password-store: FTBFS when built in a path with >= 74 characters

2017-05-08 Thread gregor herrmann
On Mon, 08 May 2017 22:25:54 +0100, Chris Lamb wrote:

> retitle 862071 password-store: FTBFS when built in a path with >= 74 
> characters
> thanks
> 
> 
> (Yes, really.)
> This is due to GNUPGHOME needing to fit within sockaddr_un.sun_path.

Also #861591, where the same happens.

I'm not sure how RC-ish this should be, as build paths by our usual
tools (sbuild, pbuilder) are, IIRC, shorter (/build//…), so
this shouldn't be a problem in most cases.


Cheers,
gregor

-- 
 .''`.  https://info.comodo.priv.at/ - Debian Developer https://www.debian.org
 : :' : OpenPGP fingerprint D1E1 316E 93A7 60A8 104D  85FA BB3A 6801 8649 AA06
 `. `'  Member of VIBE!AT & SPI, fellow of the Free Software Foundation Europe
   `-   NP: Tom Waits: Lost in the Harbour


signature.asc
Description: Digital Signature


Bug#862071: password-store: FTBFS when built in a path with >= 74 characters

2017-05-08 Thread Chris Lamb
retitle 862071 password-store: FTBFS when built in a path with >= 74 characters
thanks


(Yes, really.)

This is due to GNUPGHOME needing to fit within sockaddr_un.sun_path.


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-



Processed: Re: password-store: FTBFS when built in a path with >= 74 characters

2017-05-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> retitle 862071 password-store: FTBFS when built in a path with >= 74 
> characters
Bug #862071 [src:password-store] password-store: FTBFS: not ok 1 - Test 
"generate" command
Changed Bug title to 'password-store: FTBFS when built in a path with >= 74 
characters' from 'password-store: FTBFS: not ok 1 - Test "generate" command'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
862071: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862071
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Re: Bug#861771: Fails to install: postinst script returned error exit status 1

2017-05-08 Thread Debian Bug Tracking System
Processing control commands:

> found 861771 0.13-1
Bug #861771 [nodm] Fails to install: postinst script returned error exit status 
1
Marked as found in versions nodm/0.13-1.
> tags 861771 + patch
Bug #861771 [nodm] Fails to install: postinst script returned error exit status 
1
Added tag(s) patch.

-- 
861771: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861771
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#861771: Fails to install: postinst script returned error exit status 1

2017-05-08 Thread Simon McVittie
Control: found 861771 0.13-1
Control: tags 861771 + patch

On Mon, 08 May 2017 at 20:14:28 +0100, Simon McVittie wrote:
> If you try to downgrade to 0.13-1 (in testing), do you still get this?

I can reproduce this with 0.13-1, so it should not block migration.

> I think the attached patch should hopefully fix this bug (thanks to
> Ansgar Burchardt for suggesting this approach)

This doesn't work: if an ExecStartPre command exits with the
SuccessExitStatus then systemd proceeds to ExecStart, so I don't think
we can have an ExecStartPre that cancels start without marking the service
as failed (which would in turn make the postinst fragment fail). But it
can be adapted by using a non-trivial ExecStartPre, as in the attached.

The long-term solution would be to not enable the display manager at
the update-rc.d level) if it wasn't enabled by the user, and migrate
enabledness like this pseudocode:

if (enabled, using the same algorithm as invoke-rc.d &&
enabled in /etc/default/nodm) {
update-rc.d nodm enable
} else {
update-rc.d nodm disable
}

then remove NODM_ENABLED from /etc/default/nodm. openarena-server has
code in its preinst to do something similar.

But that definitely seems like a job for post-stretch, particularly
if it gets entangled with a new approach to registering for the
display-manager.service symlink (#852125).

S
From: Simon McVittie 
Date: Mon, 8 May 2017 17:01:40 +0100
Subject: nodm.service: Don't respawn or fail if disabled in
 /etc/default

Bug-Debian: https://bugs.debian.org/861771
---
 nodm.service.in | 7 +--
 1 file changed, 5 insertions(+), 2 deletions(-)

diff --git a/nodm.service.in b/nodm.service.in
index 0b7e95b..b53fef8 100644
--- a/nodm.service.in
+++ b/nodm.service.in
@@ -5,8 +5,11 @@ After=plymouth-quit.service systemd-user-sessions.service
 
 [Service]
 EnvironmentFile=-/etc/default/nodm
-ExecStartPre=/usr/bin/test ${NODM_ENABLED} != no -a ${NODM_ENABLED} != false
-ExecStart=@sbindir@/nodm $NODM_OPTIONS
+# 77 is EX_NOPERM, and doesn't seem to be used by nodm itself
+# Don't respawn or mark as failed if disabled via /etc/default/nodm
+RestartPreventExitStatus=77
+SuccessExitStatus=77
+ExecStart=/bin/sh -c 'if test ${NODM_ENABLED} = no || test ${NODM_ENABLED} = false; then exit 77; else exec @sbindir@/nodm $NODM_OPTIONS; fi'
 Restart=always
 KillMode=mixed
 TimeoutStopSec=10


Processed: user release.debian....@packages.debian.org, usertagging 851819, tagging 851819

2017-05-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> user release.debian@packages.debian.org
Setting user to release.debian@packages.debian.org (was ni...@thykier.net).
> usertags 851819 - stretch-can-defer
Usertags were: stretch-can-defer.
Usertags are now: .
> tags 851819 - stretch-ignore
Bug #851819 [flashplugin-nonfree] ERROR: wget failed to download 
http://people.debian.org/~bartm/...
Bug #851066 [flashplugin-nonfree] flashplugin-nonfree: Mismatch between 
detected and available versions (Download file not available at 
people.debian.org)
Bug #853095 [flashplugin-nonfree] flashplugin-nonfree: Unable to update to the 
last flash version
Bug #854467 [flashplugin-nonfree] cannot upgrade
Bug #857765 [flashplugin-nonfree] flashplugin-nonfree has 33 severe security 
flaws, orphaned?
Removed tag(s) stretch-ignore.
Removed tag(s) stretch-ignore.
Removed tag(s) stretch-ignore.
Removed tag(s) stretch-ignore.
Removed tag(s) stretch-ignore.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
851066: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851066
851819: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851819
853095: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=853095
854467: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854467
857765: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857765
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#861771: Fails to install: postinst script returned error exit status 1

2017-05-08 Thread Simon McVittie
On Wed, 03 May 2017 at 16:13:25 -0400, Ryan Kavanagh wrote:
> nodm fails to install/upgrade.

What version did you upgrade from, and how long had you had that version
installed before upgrading?

If you try to downgrade to 0.13-1 (in testing), do you still get this?
If you do, please mark this bug as found in 0.13-1 so the fix for #860463
can migrate - at the moment this bug report is preventing another RC bug
from being fixed in testing.

I suspect this regressed in 0.12-1.1 with the addition of the native
systemd unit.

> I marked the severity as grave because the package fails
> to install/upgrade, thus rendering it unusable to (all?) users.

I think this bug makes it unusable to users who boot with systemd and
have configured nodm to not be started on boot (which does prompt the
question of why it's installed at all), so not all users.
A systemd unit identical to the one in 0.13-1 works fine for me on
a system where nodm is enabled.

I think the attached patch should hopefully fix this bug (thanks to
Ansgar Burchardt for suggesting this approach) but I haven't had a
chance to test it on a system with NODM_ENABLED=false yet.

S
From: Simon McVittie 
Date: Mon, 8 May 2017 17:01:40 +0100
Subject: nodm.service: Don't respawn or fail if disabled in
 /etc/default

Bug-Debian: https://bugs.debian.org/861771
---
 nodm.service.in | 6 +-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git a/nodm.service.in b/nodm.service.in
index 0b7e95b..b6c77fa 100644
--- a/nodm.service.in
+++ b/nodm.service.in
@@ -5,7 +5,11 @@ After=plymouth-quit.service systemd-user-sessions.service
 
 [Service]
 EnvironmentFile=-/etc/default/nodm
-ExecStartPre=/usr/bin/test ${NODM_ENABLED} != no -a ${NODM_ENABLED} != false
+# 77 is EX_NOPERM, and doesn't seem to be used by nodm itself
+ExecStartPre=/bin/sh -c 'if test ${NODM_ENABLED} = no || test ${NODM_ENABLED} = false; then exit 77; fi'
+# Don't respawn or mark as failed if disabled via /etc/default/nodm
+RestartPreventExitStatus=77
+SuccessExitStatus=77
 ExecStart=@sbindir@/nodm $NODM_OPTIONS
 Restart=always
 KillMode=mixed


Processed: reopening 862103

2017-05-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reopen 862103
Bug #862103 [mariadb-server-10.1] mariadb-server-10.1: MariaDB crash after 
throwing an instance of 'std::out_of_range'
Bug 862103 is not marked as done; doing nothing.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
862103: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862103
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: retitle 862098 to lxterminal: CVE-2016-10369: socket can be blocked by another user

2017-05-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> retitle 862098 lxterminal: CVE-2016-10369: socket can be blocked by another 
> user
Bug #862098 [lxterminal] lxterminal: socket can be blocked by another user
Changed Bug title to 'lxterminal: CVE-2016-10369: socket can be blocked by 
another user' from 'lxterminal: socket can be blocked by another user'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
862098: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862098
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#862052: marked as done (Latest slim upgrade caused involuntary crashes/logouts...)

2017-05-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 May 2017 17:29:00 +
with message-id <1d3c25fa-0033-79a1-a5d9-e0c33c9ff...@thykier.net>
and subject line Re: Latest slim upgrade caused involuntary crashes/logouts...
has caused the Debian Bug report #862052,
regarding Latest slim upgrade caused involuntary crashes/logouts...
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
862052: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862052
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: slim
Version: 1.3.6-5
Severity: serious

When upgrading from 1.3.6-4+b2 to 1.3.6-5 of slim I noticed that my
window manager appeared to suddenly "crash" and logged me out. However
I had
not changed anything related to that but I had recently upgraded slim so I
investigated it a bit.

I compiled 1.3.6-5 without the fix for 860465 as mentioned in the -5 debian
patch (but keeping all other additions from -4+b2 to -5 the same). Without
this "fix" my desktop no longer had problems. Could this be because
I don't have plymouth installed (whatever that is)? I'm happy to do further
testing if you can provide something for me to test. Besides this minor
mishap I'm actually a happy slim user, thanks for putting in the effort. :)

 / Sebastian
--- End Message ---
--- Begin Message ---
Source: slim
Source-Version: 1.3.6-5.1

Sebastian Rasmussen:
>>> Could you please try to upgrade to slim/1.3.6-5.1 to see if that
>>> fixes your issue?
>> Of course, no problem, but it will have to wait a day or so.
> 
> I can now confirm that upgrading to 1.3.6-5.1 does indeed fix
> the issue I was experiencing. From my perspective that means
> that you may mark this bug as resolved, but you might want to
> tie it to to the 1.3.6-5.1 release some how.

With the -done + plus the above Pseudo-headers the bug will now be
closed in 1.3.6-5.1 and later.

> Thanks for being responsive and helpful! :)
> 
>  / Sebastian
> 

You are welcome. :)

Thanks,
~Niels--- End Message ---


Bug#861134: marked as done (slim: Reloads automatically and queries login-prompt after running window manager for some (a short) time)

2017-05-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 May 2017 17:29:00 +
with message-id <1d3c25fa-0033-79a1-a5d9-e0c33c9ff...@thykier.net>
and subject line Re: Latest slim upgrade caused involuntary crashes/logouts...
has caused the Debian Bug report #862052,
regarding slim: Reloads automatically and queries login-prompt after running 
window manager for some (a short)  time
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
862052: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862052
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: slim
Version: 1.3.6-5
Severity: important

Dear Maintainer,

   * Slim has been set up as the default display manager
   * After running the Window Manager (XFCE in my case) and working with
   it causes a sudden reload of Slim and (re-)querying the login prompt
   * So there is a login-prompt query over and over again

-- System Information:
Debian Release: 9.0
  APT prefers buildd-unstable
  APT policy: (500, 'buildd-unstable'), (500, 'unstable'), (1, 'experimental')
Architecture: i386
 (i686)

Kernel: Linux 4.9.0-2-686-pae (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages slim depends on:
ii  dbus   1.10.18-1
ii  debconf [debconf-2.0]  1.5.60
ii  libc6  2.24-10
ii  libfontconfig1 2.11.0-6.7+b1
ii  libfreetype6   2.6.3-3.1
ii  libgcc11:7-20161115-1
ii  libjpeg62-turbo1:1.5.1-2
ii  libpam0g   1.1.8-3.5
ii  libpng16-161.6.28-1
ii  libstdc++6 7-20161115-1
ii  libx11-6   2:1.6.4-3
ii  libxext6   2:1.3.3-1+b2
ii  libxft22.3.2-1+b2
ii  libxmu62:1.1.2-2
ii  libxrandr2 2:1.5.1-1
ii  libxrender11:0.9.10-1
ii  lsb-base   9.20161125
ii  zlib1g 1:1.2.8.dfsg-5

Versions of packages slim recommends:
ii  xterm  327-2

Versions of packages slim suggests:
pn  scrot  
ii  xauth  1:1.0.9-1+b2

-- debconf information excluded
--- End Message ---
--- Begin Message ---
Source: slim
Source-Version: 1.3.6-5.1

Sebastian Rasmussen:
>>> Could you please try to upgrade to slim/1.3.6-5.1 to see if that
>>> fixes your issue?
>> Of course, no problem, but it will have to wait a day or so.
> 
> I can now confirm that upgrading to 1.3.6-5.1 does indeed fix
> the issue I was experiencing. From my perspective that means
> that you may mark this bug as resolved, but you might want to
> tie it to to the 1.3.6-5.1 release some how.

With the -done + plus the above Pseudo-headers the bug will now be
closed in 1.3.6-5.1 and later.

> Thanks for being responsive and helpful! :)
> 
>  / Sebastian
> 

You are welcome. :)

Thanks,
~Niels--- End Message ---


Bug#861474: marked as done (slim: Session restarts in a loop rendering the whole system useless)

2017-05-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 May 2017 17:29:00 +
with message-id <1d3c25fa-0033-79a1-a5d9-e0c33c9ff...@thykier.net>
and subject line Re: Latest slim upgrade caused involuntary crashes/logouts...
has caused the Debian Bug report #862052,
regarding slim: Session restarts in a loop rendering the whole system useless
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
862052: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862052
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: slim
Version: 1.3.6-5
Severity: critical
Justification: breaks the whole system

I am not sure that this is a slim problem, but as the system is almost
unusable, I cannot investigate.

After an apt-get upgrade earlier today, the system presents a new slim
login page. Logging in works, but then the whole system restarts X
(presumably) and the sylim login prompt appear again. This ahhpens in
what seems to be an infinite loop, roughly every minute or so.

I am only able to compose this message outside X using a pseudo
terminal. The restarts interrupt the terminal and represents the slim
login page. Fortunately the terminal context is retained so I can switch
back to the terminal.

I have not yet tried removing slim which I hope I may be able to do
despite the constant restarts.

I suspect slim because it seems to be the only likely candidate in the
set of upgrades earlier today, and it is the slim login screen which
keeps looping.

Presumably others will report this problem as well.

-- System Information:
Debian Release: 9.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64
 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.9.0-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages slim depends on:
ii  dbus   1.10.18-1
ii  debconf [debconf-2.0]  1.5.60
ii  libc6  2.24-10
ii  libfontconfig1 2.11.0-6.7+b1
ii  libfreetype6   2.6.3-3.1
ii  libgcc11:6.3.0-14
ii  libjpeg62-turbo1:1.5.1-2
ii  libpam0g   1.1.8-3.5
ii  libpng16-161.6.28-1
ii  libstdc++6 6.3.0-14
ii  libx11-6   2:1.6.4-3
ii  libxext6   2:1.3.3-1+b2
ii  libxft22.3.2-1+b2
ii  libxmu62:1.1.2-2
ii  libxrandr2 2:1.5.1-1
ii  libxrender11:0.9.10-1
ii  lsb-base   9.20161125
ii  zlib1g 1:1.2.8.dfsg-5

Versions of packages slim recommends:
ii  xterm  327-2

Versions of packages slim suggests:
pn  scrot  
ii  xauth  1:1.0.9-1+b2

-- debconf information:
* shared/default-x-display-manager: slim
  slim/daemon_name: /usr/bin/slim
--- End Message ---
--- Begin Message ---
Source: slim
Source-Version: 1.3.6-5.1

Sebastian Rasmussen:
>>> Could you please try to upgrade to slim/1.3.6-5.1 to see if that
>>> fixes your issue?
>> Of course, no problem, but it will have to wait a day or so.
> 
> I can now confirm that upgrading to 1.3.6-5.1 does indeed fix
> the issue I was experiencing. From my perspective that means
> that you may mark this bug as resolved, but you might want to
> tie it to to the 1.3.6-5.1 release some how.

With the -done + plus the above Pseudo-headers the bug will now be
closed in 1.3.6-5.1 and later.

> Thanks for being responsive and helpful! :)
> 
>  / Sebastian
> 

You are welcome. :)

Thanks,
~Niels--- End Message ---


Processed: severity of 862052 is critical, fixed 862052 in 1.3.6-5.1, closing 862052, merging 862052 861474

2017-05-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 862052 critical
Bug #862052 [slim] Latest slim upgrade caused involuntary crashes/logouts...
Severity set to 'critical' from 'serious'
> fixed 862052 1.3.6-5.1
Bug #862052 [slim] Latest slim upgrade caused involuntary crashes/logouts...
Marked as fixed in versions slim/1.3.6-5.1.
> close 862052 1.3.6-5.1
Bug #862052 [slim] Latest slim upgrade caused involuntary crashes/logouts...
Ignoring request to alter fixed versions of bug #862052 to the same values 
previously set
Bug #862052 [slim] Latest slim upgrade caused involuntary crashes/logouts...
Marked Bug as done
> merge 862052 861474
Bug #862052 {Done: Apollon Oikonomopoulos } [slim] Latest 
slim upgrade caused involuntary crashes/logouts...
Bug #862052 {Done: Apollon Oikonomopoulos } [slim] Latest 
slim upgrade caused involuntary crashes/logouts...
Added tag(s) moreinfo and patch.
Bug #861134 {Done: Samuel Hym } [slim] 
slim: Reloads automatically and queries login-prompt after running window 
manager for some (a short)  time
Bug #861474 {Done: Apollon Oikonomopoulos } [slim] slim: 
Session restarts in a loop rendering the whole system useless
Merged 861134 861474 862052
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
861134: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861134
861474: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861474
862052: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862052
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: found 862098 in 0.2.0-1

2017-05-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> found 862098 0.2.0-1
Bug #862098 [lxterminal] lxterminal: socket can be blocked by another user
Marked as found in versions lxterminal/0.2.0-1.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
862098: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862098
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#862098: lxterminal: socket can be blocked by another user

2017-05-08 Thread Salvatore Bonaccorso
Hi

I have requested a CVE via https://cveform.mitre.org .

Regards,
Salvatore



Bug#862103: mariadb-server-10.1: MariaDB crash after throwing an instance of 'std::out_of_range'

2017-05-08 Thread Samuel D. [CPC]
Follow up : 

 

Patrick Gaus just suggested on the MariaDB bug report that the same fix
should also be applied to XtraDB (storage/xtradb/dict/dict0stats.cc - Around
line 1171), and not just in InnoDB. Makes sense. 

 



Bug#862103: mariadb-server-10.1: MariaDB crash after throwing an instance of 'std::out_of_range'

2017-05-08 Thread Samuel D. [CPC]
Thanks!

Hope the fix will be good enough to solve this issue.

Unfortunately, Kazuhiko Shiozaki reported 3 days ago on the MariaDB bug
report (http://cpc.cx/jg3) that the same crash happened to MariaDB 10.1.23
with the patch applied. That's the only report so far.

PS: The package currently available in testing (10.1.22-3) seems badly
affected by this issue (no problem with the previous 10.1.21-5). 


> Hi Sam,
> 
> thanks for the heads-up and for the link to the patch - it applies
> cleanly (after whitespace fixes) to MariaDB 10.1.23, so I am just
> building 10.1.23-5 with the patch applied.
> 
> Cheers,
> -- 
> Ondřej Surý
> Knot DNS (https://www.knot-dns.cz/) - a high-performance DNS server
> Knot Resolver (https://www.knot-resolver.cz/) - secure, privacy-aware,
> fast DNS(SEC) resolver
> Vše pro chleba (https://vseprochleba.cz) - Mouky ze mlýna a potřeby pro
> pečení chleba všeho druhu



Bug#862052: Latest slim upgrade caused involuntary crashes/logouts...

2017-05-08 Thread Sebastian Rasmussen
>> Could you please try to upgrade to slim/1.3.6-5.1 to see if that
>> fixes your issue?
> Of course, no problem, but it will have to wait a day or so.

I can now confirm that upgrading to 1.3.6-5.1 does indeed fix
the issue I was experiencing. From my perspective that means
that you may mark this bug as resolved, but you might want to
tie it to to the 1.3.6-5.1 release some how. Thanks for being
responsive and helpful! :)

 / Sebastian



Bug#860618: golang-github-seccomp-libseccomp-golang: FTBFS on i386: dh_auto_test

2017-05-08 Thread Roger Shimizu
unblock report filed: #862108

-- 
Roger Shimizu, GMT +9 Tokyo
PGP/GPG: 4096R/6C6ACD6417B3ACB1


pgpDcNjbHuTyp.pgp
Description: PGP signature


Bug#862103: mariadb-server-10.1: MariaDB crash after throwing an instance of 'std::out_of_range'

2017-05-08 Thread Ondřej Surý
Hi Sam,

thanks for the heads-up and for the link to the patch - it applies
cleanly (after whitespace fixes) to MariaDB 10.1.23, so I am just
building 10.1.23-5 with the patch applied.

Cheers,
-- 
Ondřej Surý 
Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server
Knot Resolver (https://www.knot-resolver.cz/) – secure, privacy-aware,
fast DNS(SEC) resolver
Vše pro chleba (https://vseprochleba.cz) – Mouky ze mlýna a potřeby pro
pečení chleba všeho druhu

On Mon, May 8, 2017, at 16:32, Sam D. wrote:
> Package: mariadb-server-10.1
> Version: 10.1.22-3
> Severity: grave
> Tags: newcomer upstream
> Justification: causes non-serious data loss
> 
> Dear Maintainer,
> 
> A critical MySQL bug was discovered in InnoDB storage engine (related to
> statistics calculation) some weeks ago.
> 
> This bug affects MariaDB 10.1 as well and is present in the current
> Debian Stretch (MariaDB 10.1.22) package 
> [mariadb  Ver 15.1 Distrib 10.1.22-MariaDB, for debian-linux-gnu (x86_64)
> using readline 5.2]. 
> 
> Seems to also affect the unstable 10.1.23-3 package. 
> 
> MariaDB crash very often on many of our server, from many times daily to
> many times hourly.
> 
> The bug (and fix) is well described here :
> 
> https://bugs.mysql.com/bug.php?id=84940 (rated serious)
> 
> and here
> 
> https://jira.mariadb.org/browse/MDEV-12281 (rated critical)
> 
> The bug come from a missing bracket in the InnoDB Stats code and a patch
> is available here :
> 
> https://github.com/mysql/mysql-server/commit/0241e1c1b216d87050cdfcb4531ffc17f9eb1dc7
> 
> Data corruption in InnoDB tables may occur as a side effect.
> 
> 
> Typical Error/crash log :
> 
> ---
> 
> Version: '10.1.22-MariaDB-'  socket: '/var/run/mysqld/mysqld.sock'  port:
> 3306  Debian 9.0
> terminate called after throwing an instance of 'std::out_of_range'
>   what():  vector::_M_range_check: __n (which is 4294967295) >=
>   this->size() (which is 0)
> 170508 13:55:21 [ERROR] mysqld got signal 6 ;
> This could be because you hit a bug. It is also possible that this binary
> or one of the libraries it was linked against is corrupt, improperly
> built,
> or misconfigured. This error can also be caused by malfunctioning
> hardware.
> 
> To report this bug, see https://mariadb.com/kb/en/reporting-bugs
> 
> We will try our best to scrape up some info that will hopefully help
> diagnose the problem, but since we have already crashed,
> something is definitely wrong and this may fail.
> 
> Server version: 10.1.22-MariaDB-
> key_buffer_size=16777216
> read_buffer_size=131072
> max_used_connections=5
> max_threads=386
> thread_count=2
> It is possible that mysqld could use up to
> key_buffer_size + (read_buffer_size + sort_buffer_size)*max_threads =
> 864227 K  bytes of memory
> Hope that's ok; if not, decrease some variables in the equation.
> 
> Thread pointer: 0x0
> Attempting backtrace. You can use the following information to find out
> where mysqld died. If you see no messages after this, something went
> terribly wrong...
> stack_bottom = 0x0 thread_stack 0x3
> /usr/sbin/mysqld(my_print_stacktrace+0x2e)[0x5607ce9d50ce]
> /usr/sbin/mysqld(handle_fatal_signal+0x3bd)[0x5607ce51e50d]
> /lib/x86_64-linux-gnu/libpthread.so.0(+0x110c0)[0x7feadffc90c0]
> /lib/x86_64-linux-gnu/libc.so.6(gsignal+0xcf)[0x7feade8c4fcf]
> /lib/x86_64-linux-gnu/libc.so.6(abort+0x16a)[0x7feade8c63fa]
> /usr/lib/x86_64-linux-gnu/libstdc++.so.6(_ZN9__gnu_cxx27__verbose_terminate_handlerEv+0x15d)[0x7feadefc50ad]
> /usr/lib/x86_64-linux-gnu/libstdc++.so.6(+0x8f066)[0x7feadefc3066]
> /usr/lib/x86_64-linux-gnu/libstdc++.so.6(+0x8f0b1)[0x7feadefc30b1]
> /usr/lib/x86_64-linux-gnu/libstdc++.so.6(+0x8f2c9)[0x7feadefc32c9]
> /usr/lib/x86_64-linux-gnu/libstdc++.so.6(_ZSt24__throw_out_of_range_fmtPKcz+0xf5)[0x7feadefebb85]
> /usr/sbin/mysqld(+0x9ace97)[0x5607ce931e97]
> /usr/sbin/mysqld(+0x9b07f4)[0x5607ce9357f4]
> /usr/sbin/mysqld(+0x9b4626)[0x5607ce939626]
> /usr/sbin/mysqld(+0x9b5d19)[0x5607ce93ad19]
> /lib/x86_64-linux-gnu/libpthread.so.0(+0x7494)[0x7feadffbf494]
> /lib/x86_64-linux-gnu/libc.so.6(clone+0x3f)[0x7feade97a93f]
> The manual page at http://dev.mysql.com/doc/mysql/en/crashing.html
> contains
> information that should help you find out what is causing the crash.
> 2017-05-08 13:55:27 140012981801536 [Note] InnoDB: Using mutexes to ref
> count buffer pool pages
> 2017-05-08 13:55:27 140012981801536 [Note] InnoDB: The InnoDB memory heap
> is disabled
> 2017-05-08 13:55:27 140012981801536 [Note] InnoDB: Mutexes and rw_locks
> use GCC atomic builtins
> 2017-05-08 13:55:27 140012981801536 [Note] InnoDB: GCC builtin
> __atomic_thread_fence() is used for memory barrier
> 2017-05-08 13:55:27 140012981801536 [Note] InnoDB: Compressed tables use
> zlib 1.2.8
> 2017-05-08 13:55:27 140012981801536 [Note] InnoDB: Using Linux native AIO
> 2017-05-08 13:55:27 140012981801536 [Note] InnoDB: Using SSE crc32
> instructions

Bug#862103: mariadb-server-10.1: MariaDB crash after throwing an instance of 'std::out_of_range'

2017-05-08 Thread Sam D.
Package: mariadb-server-10.1
Version: 10.1.22-3
Severity: grave
Tags: newcomer upstream
Justification: causes non-serious data loss

Dear Maintainer,

A critical MySQL bug was discovered in InnoDB storage engine (related to 
statistics calculation) some weeks ago.

This bug affects MariaDB 10.1 as well and is present in the current Debian 
Stretch (MariaDB 10.1.22) package 
[mariadb  Ver 15.1 Distrib 10.1.22-MariaDB, for debian-linux-gnu (x86_64) using 
readline 5.2]. 

Seems to also affect the unstable 10.1.23-3 package. 

MariaDB crash very often on many of our server, from many times daily to many 
times hourly.

The bug (and fix) is well described here :

https://bugs.mysql.com/bug.php?id=84940 (rated serious)

and here

https://jira.mariadb.org/browse/MDEV-12281 (rated critical)

The bug come from a missing bracket in the InnoDB Stats code and a patch is 
available here :

https://github.com/mysql/mysql-server/commit/0241e1c1b216d87050cdfcb4531ffc17f9eb1dc7

Data corruption in InnoDB tables may occur as a side effect.


Typical Error/crash log :

---

Version: '10.1.22-MariaDB-'  socket: '/var/run/mysqld/mysqld.sock'  port: 3306  
Debian 9.0
terminate called after throwing an instance of 'std::out_of_range'
  what():  vector::_M_range_check: __n (which is 4294967295) >= this->size() 
(which is 0)
170508 13:55:21 [ERROR] mysqld got signal 6 ;
This could be because you hit a bug. It is also possible that this binary
or one of the libraries it was linked against is corrupt, improperly built,
or misconfigured. This error can also be caused by malfunctioning hardware.

To report this bug, see https://mariadb.com/kb/en/reporting-bugs

We will try our best to scrape up some info that will hopefully help
diagnose the problem, but since we have already crashed,
something is definitely wrong and this may fail.

Server version: 10.1.22-MariaDB-
key_buffer_size=16777216
read_buffer_size=131072
max_used_connections=5
max_threads=386
thread_count=2
It is possible that mysqld could use up to
key_buffer_size + (read_buffer_size + sort_buffer_size)*max_threads = 864227 K  
bytes of memory
Hope that's ok; if not, decrease some variables in the equation.

Thread pointer: 0x0
Attempting backtrace. You can use the following information to find out
where mysqld died. If you see no messages after this, something went
terribly wrong...
stack_bottom = 0x0 thread_stack 0x3
/usr/sbin/mysqld(my_print_stacktrace+0x2e)[0x5607ce9d50ce]
/usr/sbin/mysqld(handle_fatal_signal+0x3bd)[0x5607ce51e50d]
/lib/x86_64-linux-gnu/libpthread.so.0(+0x110c0)[0x7feadffc90c0]
/lib/x86_64-linux-gnu/libc.so.6(gsignal+0xcf)[0x7feade8c4fcf]
/lib/x86_64-linux-gnu/libc.so.6(abort+0x16a)[0x7feade8c63fa]
/usr/lib/x86_64-linux-gnu/libstdc++.so.6(_ZN9__gnu_cxx27__verbose_terminate_handlerEv+0x15d)[0x7feadefc50ad]
/usr/lib/x86_64-linux-gnu/libstdc++.so.6(+0x8f066)[0x7feadefc3066]
/usr/lib/x86_64-linux-gnu/libstdc++.so.6(+0x8f0b1)[0x7feadefc30b1]
/usr/lib/x86_64-linux-gnu/libstdc++.so.6(+0x8f2c9)[0x7feadefc32c9]
/usr/lib/x86_64-linux-gnu/libstdc++.so.6(_ZSt24__throw_out_of_range_fmtPKcz+0xf5)[0x7feadefebb85]
/usr/sbin/mysqld(+0x9ace97)[0x5607ce931e97]
/usr/sbin/mysqld(+0x9b07f4)[0x5607ce9357f4]
/usr/sbin/mysqld(+0x9b4626)[0x5607ce939626]
/usr/sbin/mysqld(+0x9b5d19)[0x5607ce93ad19]
/lib/x86_64-linux-gnu/libpthread.so.0(+0x7494)[0x7feadffbf494]
/lib/x86_64-linux-gnu/libc.so.6(clone+0x3f)[0x7feade97a93f]
The manual page at http://dev.mysql.com/doc/mysql/en/crashing.html contains
information that should help you find out what is causing the crash.
2017-05-08 13:55:27 140012981801536 [Note] InnoDB: Using mutexes to ref count 
buffer pool pages
2017-05-08 13:55:27 140012981801536 [Note] InnoDB: The InnoDB memory heap is 
disabled
2017-05-08 13:55:27 140012981801536 [Note] InnoDB: Mutexes and rw_locks use GCC 
atomic builtins
2017-05-08 13:55:27 140012981801536 [Note] InnoDB: GCC builtin 
__atomic_thread_fence() is used for memory barrier
2017-05-08 13:55:27 140012981801536 [Note] InnoDB: Compressed tables use zlib 
1.2.8
2017-05-08 13:55:27 140012981801536 [Note] InnoDB: Using Linux native AIO
2017-05-08 13:55:27 140012981801536 [Note] InnoDB: Using SSE crc32 instructions
2017-05-08 13:55:27 140012981801536 [Note] InnoDB: Initializing buffer pool, 
size = 2.0G
2017-05-08 13:55:27 140012981801536 [Note] InnoDB: Completed initialization of 
buffer pool
2017-05-08 13:55:27 140012981801536 [Note] InnoDB: Highest supported file 
format is Barracuda.
2017-05-08 13:55:27 140012981801536 [Note] InnoDB: Starting crash recovery from 
checkpoint LSN=195680453668
2017-05-08 13:55:27 140012981801536 [Note] InnoDB: Restoring possible 
half-written data pages from the doublewrite buffer...
InnoDB: 1 transaction(s) which must be rolled back or cleaned up
InnoDB: in total 1 row operations to undo
InnoDB: Trx id counter is 100954368
2017-05-08 13:55:27 140012981801536 [Note] InnoDB: Starting fin

Bug#861736:

2017-05-08 Thread PICCA Frederic-Emmanuel
Here after rebuilding hdf5 in debug mode

:~/Debian/nexus$ ./bug.py
H5get_libversion(majnum=0xbf8a5b04, minnum=0xbf8a5b08, relnum=0xbf8a5b0c) = 
SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;
H5open() = SUCCEED;
H5Pcreate(cls=8 (genprop class)) = 18 (genprop list);
H5Pget_cache(plist=18 (genprop list), mdc_nelmts=0xbf8a5af8, 
rdcc_nslots=0xbf8a5afc, rdcc_nbytes=0xbf8a5b00, rdcc_w0=0xbf8a5b10) = SUCCEED;
H5Pset_cache(plist=18 (genprop list), mdc_nelmts=0, rdcc_nslots=521, 
rdcc_nbytes=1024000, rdcc_w0=0.75) = SUCCEED;
H5Pset_fclose_degree(plist=18 (genprop list), degree=H5F_CLOSE_STRONG) = 
SUCCEED;
H5check_version(majnum=1, minnum=10, relnum=0) = SUCCEED;
H5open() = SUCCEED;
H5Fcreate(filename=0x82517ef8, flags=2, fcpl=H5P_DEFAULT, fapl=18 (genprop 
list)) = 0 (file);
H5Pclose(plist=18 (genprop list)) = SUCCEED;
ERROR: cannot open file: filenamenxs.h5
Traceback (most recent call last):
  File "./bug.py", line 5, in 
e.save("filenamenxs.h5", 'w5')
  File "/usr/lib/python2.7/dist-packages/nxs/tree.py", line 868, in save
file = NeXusTree(filename, format)
  File "/usr/lib/python2.7/dist-packages/nxs/napi.py", line 320, in __init__
raise NeXusError, "Could not %s %s"%(op,filename)
nxs.napi.NeXusError: Could not create filenamenxs.h5
H5Eget_auto2(estack=H5P_DEFAULT, func=0xbf8a6954, client_data=NULL) = SUCCEED;
H5Eauto_is_v2(estack=H5P_DEFAULT, is_stack=0xbf8a6898) = SUCCEED;
H5Eget_auto2(estack=H5P_DEFAULT, func=0xbf8a689c, client_data=0xbf8a68a0) = 
SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;
H5Eauto_is_v2(estack=H5P_DEFAULT, is_stack=0xbf8a6858) = SUCCEED;
H5Eget_auto2(estack=H5P_DEFAULT, func=0xbf8a685c, client_data=0xbf8a6860) = 
SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;
H5Eauto_is_v2(estack=H5P_DEFAULT, is_stack=0xbf8a6858) = SUCCEED;
H5Eget_auto2(estack=H5P_DEFAULT, func=0xbf8a685c, client_data=0xbf8a6860) = 
SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;
H5Eauto_is_v2(estack=H5P_DEFAULT, is_stack=0xbf8a6888) = SUCCEED;
H5Eget_auto2(estack=H5P_DEFAULT, func=0xbf8a688c, client_data=0xbf8a6890) = 
SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;
H5Eauto_is_v2(estack=H5P_DEFAULT, is_stack=0xbf8a6888) = SUCCEED;
H5Eget_auto2(estack=H5P_DEFAULT, func=0xbf8a688c, client_data=0xbf8a6890) = 
SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;
H5Eauto_is_v2(estack=H5P_DEFAULT, is_stack=0xbf8a6888) = SUCCEED;
H5Eget_auto2(estack=H5P_DEFAULT, func=0xbf8a688c, client_data=0xbf8a6890) = 
SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;
H5Eauto_is_v2(estack=H5P_DEFAULT, is_stack=0xbf8a6898) = SUCCEED;
H5Eget_auto2(estack=H5P_DEFAULT, func=0xbf8a689c, client_data=0xbf8a68a0) = 
SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;
H5Eauto_is_v2(estack=H5P_DEFAULT, is_stack=0xbf8a6868) = SUCCEED;
H5Eget_auto2(estack=H5P_DEFAULT, func=0xbf8a686c, client_data=0xbf8a6870) = 
SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;
H5Eauto_is_v2(estack=H5P_DEFAULT, is_stack=0xbf8a6868) = SUCCEED;
H5Eget_auto2(estack=H5P_DEFAULT, func=0xbf8a686c, client_data=0xbf8a6870) = 
SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;
H5Eauto_is_v2(estack=H5P_DEFAULT, is_stack=0xbf8a6868) = SUCCEED;
H5Eget_auto2(estack=H5P_DEFAULT, func=0xbf8a686c, client_data=0xbf8a6870) = 
SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;
H5Eset_auto2(estack=H5P_DEFAULT, func=NULL, client_data=NULL) = SUCCEED;



Processed: severity of 862095 is wishlist

2017-05-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 862095 wishlist
Bug #862095 [reportbug] reportbug: Bugs in backported packages must not be sent 
to the BTS
Severity set to 'wishlist' from 'serious'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
862095: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862095
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#862095: reportbug: Bugs in backported packages must not be sent to the BTS

2017-05-08 Thread Ben Hutchings
On Mon, 2017-05-08 at 15:00 +0200, Thorsten Glaser wrote:
> Hi!
> 
> I disagree with making this RC right now, for the following reasons:
[...]

I also disagree, and I like bugs for backported linux packages going to
the BTS as they are rarely specific to the backport.

Ben.

-- 
Ben Hutchings
[W]e found...that it wasn't as easy to get programs right as we had
thought.
... I realized that a large part of my life from then on was going to
be spent
in finding mistakes in my own programs. - Maurice Wilkes, 1949



signature.asc
Description: This is a digitally signed message part


Bug#862095: reportbug: Bugs in backported packages must not be sent to the BTS

2017-05-08 Thread Adrian Bunk
On Mon, May 08, 2017 at 03:00:13PM +0200, Thorsten Glaser wrote:
>...
> > Bugs against backported packages (~bpo versions) are not allowed
> > to be reported to the BTS without explicit permission from the
> > maintainer to do so
> 
> 1. There is no automated way for the maintainers to agree to that
>currently, formally (but see below).

Doing that per-package would be the worst possible option,
there should be one place (mailing list or BTS query) for
getting all bugs.

And bugs like #860147 that are reported against backport A but caused by 
backport B would be a real pain to handle with a per-package policy.

>...
> 4. Due to the above, I believe a short-circuit/knee-jerk reaction
>to force reportbug to deliver _all_ bpo bugreports to the bpo
>mailing list is wrong, and this should at the least be tagged
>with stretch-ignore and discussed more broadly.

What you call "short-circuit/knee-jerk reaction" is the official policy:

https://backports.debian.org/FAQ/

Q: Where shall I report bugs I found in packages from backports to?

A: Please report them to the debian-backports mailing list. The Debian
bugtracking system doesn't know anything about backports versions, and
sometimes the backporter isn't in the Debian packaging team so they
might miss the report.

The default bug reporting tool doing the exact opposite of the official 
policy is plainly wrong and leads to lost bug reports like #860147 or
#854610 - the bug reporting tool and the documented procedure should
result in the bug going to the same location.

> bye,
> //mirabilos

cu
Adrian

-- 

   "Is there not promise of rain?" Ling Tan asked suddenly out
of the darkness. There had been need of rain for many days.
   "Only a promise," Lao Er said.
   Pearl S. Buck - Dragon Seed



Bug#852059: marked as done (opendnssec-signer: installation hangs on invoke-rc.d due to script name being to long)

2017-05-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 May 2017 13:18:30 +
with message-id 
and subject line Bug#852059: fixed in opendnssec 1:2.0.4-3
has caused the Debian Bug report #852059,
regarding opendnssec-signer: installation hangs on invoke-rc.d due to script 
name being to long
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
852059: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852059
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: opendnssec-signer
Version: 1:2.0.3-5
Severity: important

Dear Maintainer,

During installation of opendnssec the installation of this package
and opendnssec-enforcer hang on command:

invoke-rc.d  start

Each configuration round teh script has to be killed to end the
wait. Don't know of this should be reported here, as the scriptname is
longer then 15 characters, or with the maintainers of invoke-rc.d or the
start-stop-daemon function.

The scripts will never start this way. (at least on this system)

I haven't been able to fix this, and as this is a new installation, no
comparisons with older versions.

-- System Information:
Debian Release: 9.0
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'oldstable'), (60, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.8.0-2-amd64 (SMP w/1 CPU core)
Locale: LANG=en_GB.ISO-8859-15, LC_CTYPE=en_GB.ISO-8859-15 (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages opendnssec-signer depends on:
ii  init-system-helpers  1.46
ii  libc62.24-8
ii  libldns2 1.7.0-1
ii  libssl1.11.1.0c-2
ii  libxml2  2.9.4+dfsg1-2.1
ii  opendnssec-common1:2.0.3-5

Versions of packages opendnssec-signer recommends:
iu  opendnssec   1:2.0.3-5
ih  opendnssec-enforcer  1:2.0.3-5
pn  softhsm2 

opendnssec-signer suggests no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: opendnssec
Source-Version: 1:2.0.4-3

We believe that the bug you reported is fixed in the latest version of
opendnssec, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 852...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ondřej Surý  (supplier of updated opendnssec package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 08 May 2017 14:47:39 +0200
Source: opendnssec
Binary: opendnssec-common opendnssec opendnssec-doc opendnssec-enforcer 
opendnssec-enforcer-mysql opendnssec-enforcer-sqlite3 opendnssec-signer 
libhsm-bin
Architecture: source
Version: 1:2.0.4-3
Distribution: unstable
Urgency: medium
Maintainer: Debian DNS Packaging 
Changed-By: Ondřej Surý 
Description:
 libhsm-bin - library for interfacing PKCS#11 Hardware Security Modules
 opendnssec - dependency package to install full OpenDNSSEC suite
 opendnssec-common - common configuration files for OpenDNSSEC suite
 opendnssec-doc - documentation for OpenDNSSEC suite
 opendnssec-enforcer - tool to prepare DNSSEC keys (common package)
 opendnssec-enforcer-mysql - tool to prepare DNSSEC keys (MySQL backend)
 opendnssec-enforcer-sqlite3 - tool to prepare DNSSEC keys (sqlite3 backend)
 opendnssec-signer - daemon to sign DNS zone files periodically
Closes: 852059 859418
Changes:
 opendnssec (1:2.0.4-3) unstable; urgency=medium
 .
   * Fix reading the tmpfiles (Thanks Michael Biebl for catching that)
 (Closes: #852059)
   * Add /var/lib/opendnssec/{signer,enforcer} to the list of managed
 directories (Closes: #859418)
Checksums-Sha1:
 62f8cf3a0512f663722ec842dd18bc11a9737763 2835 opendnssec_2.0.4-3.dsc
 f3e7d8396d0ca17e930b8ce573069fa136ca2a6c 23760 opendnssec_2.0.4-3.debian.tar.xz
 caf6a3be5ca5b8b0a6103543def2b6135679678a 14881 
opendnssec_2.0.4-3_amd64.buildinfo
Checksums-Sha256:
 40eaea4aa8ecbf209000d13f92a3bf57cdeef2e3c01aec60b1941c2bf20ac9ff 2835 
opendnssec_2.0.4-3.dsc
 cebcee30c6d0ff32702fc6472ac0113e1524bd4e65cc0dcd2b713643791421c1 23760 
opendnssec_2.0.4-3.debian.tar.xz
 a71c9b06519b5b6ecebadb9ee5af393ffc87660a28aa9c4fdfbc29e69b80edb3 14881 
opendnssec_2.0.4-3_amd64.buildinfo
Files:
 f86f4e55e07eda0024d572a52f7a7a89 2835 admin extra ope

Processed: Re: Bug#859419: non-functional after installation (service fails to start)

2017-05-08 Thread Debian Bug Tracking System
Processing control commands:

> severity -1 important
Bug #859419 [opendnssec-enforcer] non-functional after installation (service 
fails to start)
Severity set to 'important' from 'serious'

-- 
859419: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859419
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#859418: marked as done (non-functional after installation (service fails to start))

2017-05-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 May 2017 13:18:30 +
with message-id 
and subject line Bug#859418: fixed in opendnssec 1:2.0.4-3
has caused the Debian Bug report #859418,
regarding non-functional after installation (service fails to start)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
859418: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859418
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: opendnssec-signer
Version: 1:2.0.4-2
Severity: serious

After running apt-get install opendnssec-signer, the service fails to
start. See attached screenshot from a test VM





-- System Information:
Debian Release: 9.0
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable'), (200, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.9.0-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
--- End Message ---
--- Begin Message ---
Source: opendnssec
Source-Version: 1:2.0.4-3

We believe that the bug you reported is fixed in the latest version of
opendnssec, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 859...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ondřej Surý  (supplier of updated opendnssec package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 08 May 2017 14:47:39 +0200
Source: opendnssec
Binary: opendnssec-common opendnssec opendnssec-doc opendnssec-enforcer 
opendnssec-enforcer-mysql opendnssec-enforcer-sqlite3 opendnssec-signer 
libhsm-bin
Architecture: source
Version: 1:2.0.4-3
Distribution: unstable
Urgency: medium
Maintainer: Debian DNS Packaging 
Changed-By: Ondřej Surý 
Description:
 libhsm-bin - library for interfacing PKCS#11 Hardware Security Modules
 opendnssec - dependency package to install full OpenDNSSEC suite
 opendnssec-common - common configuration files for OpenDNSSEC suite
 opendnssec-doc - documentation for OpenDNSSEC suite
 opendnssec-enforcer - tool to prepare DNSSEC keys (common package)
 opendnssec-enforcer-mysql - tool to prepare DNSSEC keys (MySQL backend)
 opendnssec-enforcer-sqlite3 - tool to prepare DNSSEC keys (sqlite3 backend)
 opendnssec-signer - daemon to sign DNS zone files periodically
Closes: 852059 859418
Changes:
 opendnssec (1:2.0.4-3) unstable; urgency=medium
 .
   * Fix reading the tmpfiles (Thanks Michael Biebl for catching that)
 (Closes: #852059)
   * Add /var/lib/opendnssec/{signer,enforcer} to the list of managed
 directories (Closes: #859418)
Checksums-Sha1:
 62f8cf3a0512f663722ec842dd18bc11a9737763 2835 opendnssec_2.0.4-3.dsc
 f3e7d8396d0ca17e930b8ce573069fa136ca2a6c 23760 opendnssec_2.0.4-3.debian.tar.xz
 caf6a3be5ca5b8b0a6103543def2b6135679678a 14881 
opendnssec_2.0.4-3_amd64.buildinfo
Checksums-Sha256:
 40eaea4aa8ecbf209000d13f92a3bf57cdeef2e3c01aec60b1941c2bf20ac9ff 2835 
opendnssec_2.0.4-3.dsc
 cebcee30c6d0ff32702fc6472ac0113e1524bd4e65cc0dcd2b713643791421c1 23760 
opendnssec_2.0.4-3.debian.tar.xz
 a71c9b06519b5b6ecebadb9ee5af393ffc87660a28aa9c4fdfbc29e69b80edb3 14881 
opendnssec_2.0.4-3_amd64.buildinfo
Files:
 f86f4e55e07eda0024d572a52f7a7a89 2835 admin extra opendnssec_2.0.4-3.dsc
 b2001c6bb58af5e08979ea10af262eb2 23760 admin extra 
opendnssec_2.0.4-3.debian.tar.xz
 8f40e84bce786e1c37f048fdac647f17 14881 admin extra 
opendnssec_2.0.4-3_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iQKTBAEBCgB9FiEEMLkz2A/OPZgaLTj7DJm3DvT8uwcFAlkQbDlfFIAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDMw
QjkzM0Q4MEZDRTNEOTgxQTJEMzhGQjBDOTlCNzBFRjRGQ0JCMDcACgkQDJm3DvT8
uwcpKA//WIXEq8LRO2v0dANFC+9RttzHWrHpmecwckdP5uDmzjjRmwzqkW2zzdVd
R43KblPU/Oxf3JKbB4G1w/rh7Qm4UX/ftwuxIlqNy14Ss/A/NU5m6E0RxN/I6a1O
UxlukzkJMpqe/Zea6h/txZn28sy0CB7ly44tmHC552hdBVtql2VMOLDfsSIkIg0U
d3oDT9VJrO/40yXioS/qbRo0YECpPcMh7Fb23wdPuhGiF2ZFE79DQApLWcEg6V8G
OGBr86oEsXKHSyITLdoWt06036Unna0CFturT77wH8CudO+umPCE3rWQURfhXkaJ
3Ys4kDcuc8XtnZY2qGRgEtZvy9UuyPxHp9hoWq97u5qi5puIrR6yosuPFSrWjyZA
X8FzYK4yqAiCqEytlpFiedSZTYEzMRmqZAKUxmBchhTLMICQiRZOOSZ7EHxpFoAl
/l962lboFAjVi/FfZb5g+M6V

Bug#859419: non-functional after installation (service fails to start)

2017-05-08 Thread Ondřej Surý
Control: severity -1 important

Hi,

this is not something really fixable without breaking existing user base
(for now).

The problem is that you need configured and initialized HSM store for
the keys, and that something the user must do manually, because he is
expected to provide his own HSM - and while softhsm2 is the most common
implementation used together with OpenDNSSEC, it's not the only one.

I could probably provide --no-start to dh_systemd_start invocation, but
doing that now inside the stretch freeze would be very disruptive (in my
opinion). It might be also fixed upstream to not exit violently when no
key store is configured, but just refuse to generate new keys and log
that prominently.

I have fixed the other two RC bugs, and I am lowering the severity on
this one, as this is how the OpenDNSSEC have worked since the beginning.

Cheers,
-- 
Ondřej Surý 
Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server
Knot Resolver (https://www.knot-resolver.cz/) – secure, privacy-aware,
fast DNS(SEC) resolver
Vše pro chleba (https://vseprochleba.cz) – Mouky ze mlýna a potřeby pro
pečení chleba všeho druhu



Bug#862098: lxterminal: socket can be blocked by another user

2017-05-08 Thread 魏銘廷
Package: lxterminal
Version: 0.3.0-1
Severity: grave
Tags: upstream patch security
Justification: user security hole

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

This vulnerability is discussed in a Stackexchange website:

https://unix.stackexchange.com/questions/333539/lxterminal-in-the-netstat-output/333578

The socket placed in /tmp is predictable and public-writable, Therefore
if Alice placed a file or lxterminal socket in
/tmp/.lxterminal-socket:0-bob, bob is unable to open lxterminal, or open
a lxterminal instance for Alice.

This bug is fixed in the commit:
https://git.lxde.org/gitweb/?p=lxde/lxterminal.git;a=commit;h=f99163c6ff8b2f57c5f37b1ce5d62cf7450d4648

- -- System Information:
Debian Release: 9.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64
 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.9.0-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages lxterminal depends on:
ii  libatk1.0-0  2.22.0-1
ii  libc62.24-10
ii  libcairo21.14.8-1
ii  libfontconfig1   2.11.0-6.7+b1
ii  libfreetype6 2.6.3-3.2
ii  libgdk-pixbuf2.0-0   2.36.5-2
ii  libglib2.0-0 2.50.3-2
ii  libgtk2.0-0  2.24.31-2
ii  libpango-1.0-0   1.40.5-1
ii  libpangocairo-1.0-0  1.40.5-1
ii  libpangoft2-1.0-01.40.5-1
ii  libvte9  1:0.28.2-5+b2
ii  libx11-6 2:1.6.4-3
ii  libxext6 2:1.3.3-1+b2

lxterminal recommends no packages.

lxterminal suggests no packages.

- -- no debconf information

-BEGIN PGP SIGNATURE-
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=fmHh
-END PGP SIGNATURE-



Bug#862095: reportbug: Bugs in backported packages must not be sent to the BTS

2017-05-08 Thread Thorsten Glaser
Hi!

I disagree with making this RC right now, for the following reasons:

> Bugs against backported packages (~bpo versions) are not allowed
> to be reported to the BTS without explicit permission from the
> maintainer to do so

1. There is no automated way for the maintainers to agree to that
   currently, formally (but see below).

>, and should instead automatically be sent
> to debian-backpo...@lists.debian.org

2. This is normally the backporter’s duty: reportbug supports a
   Bugs: field in debian/control which lists an eMail address where
   bugreports should be sent to; for an example of a package using
   this, look at e.g. my wtf package:
   https://www.mirbsd.org/~tg/Debs/dists/sarge/wtf/Pkgs/wtf/wtf_2016_all.deb

3. Absense of such a field *could*, however, be seen as maintainer
   approval of bugreports in the BTS (especially if the backporter
   is the maintainer), so there’s nothing that reportbug should do
   at the moment.

4. Due to the above, I believe a short-circuit/knee-jerk reaction
   to force reportbug to deliver _all_ bpo bugreports to the bpo
   mailing list is wrong, and this should at the least be tagged
   with stretch-ignore and discussed more broadly.

bye,
//mirabilos
-- 
tarent solutions GmbH
Rochusstraße 2-4, D-53123 Bonn • http://www.tarent.de/
Tel: +49 228 54881-393 • Fax: +49 228 54881-235
HRB 5168 (AG Bonn) • USt-ID (VAT): DE122264941
Geschäftsführer: Dr. Stefan Barth, Kai Ebenrett, Boris Esser, Alexander Steeg



Bug#862095: reportbug: Bugs in backported packages must not be sent to the BTS

2017-05-08 Thread Adrian Bunk
Package: reportbug
Version: 6.6.3
Severity: serious

Bugs against backported packages (~bpo versions) are not allowed
to be reported to the BTS without explicit permission from the
maintainer to do so, and should instead automatically be sent
to debian-backpo...@lists.debian.org

Example for a bug that was wrongly sent to the BTS: #860147



Bug#862052: same bug

2017-05-08 Thread Dtux


Hi,

Same bug for me with 1.3.6-5

Solved with 1.3.6-5.1



Bug#840516: patterns are deprecated

2017-05-08 Thread Stephane Bortzmeyer
There are several reasons why graphite-web does not work with Django
1.10 (the current version in sid). One of them is that it uses the
"patterns" variable:

Traceback (most recent call last):
  File "/usr/bin/graphite-manage", line 15, in 
execute_from_command_line(sys.argv)
  File "/usr/lib/python2.7/dist-packages/django/core/management/__init__.py", 
line 367, in execute_from_command_line
utility.execute()
  File "/usr/lib/python2.7/dist-packages/django/core/management/__init__.py", 
line 359, in execute
self.fetch_command(subcommand).run_from_argv(self.argv)
  File "/usr/lib/python2.7/dist-packages/django/core/management/base.py", line 
294, in run_from_argv
self.execute(*args, **cmd_options)
  File "/usr/lib/python2.7/dist-packages/django/core/management/base.py", line 
342, in execute
self.check()
  File "/usr/lib/python2.7/dist-packages/django/core/management/base.py", line 
374, in check
include_deployment_checks=include_deployment_checks,
  File 
"/usr/lib/python2.7/dist-packages/django/core/management/commands/migrate.py", 
line 62, in _run_checks
issues.extend(super(Command, self)._run_checks(**kwargs))
  File "/usr/lib/python2.7/dist-packages/django/core/management/base.py", line 
361, in _run_checks
return checks.run_checks(**kwargs)
  File "/usr/lib/python2.7/dist-packages/django/core/checks/registry.py", line 
81, in run_checks
new_errors = check(app_configs=app_configs)
  File "/usr/lib/python2.7/dist-packages/django/core/checks/urls.py", line 14, 
in check_url_config
return check_resolver(resolver)
  File "/usr/lib/python2.7/dist-packages/django/core/checks/urls.py", line 24, 
in check_resolver
for pattern in resolver.url_patterns:
  File "/usr/lib/python2.7/dist-packages/django/utils/functional.py", line 35, 
in __get__
res = instance.__dict__[self.name] = self.func(instance)
  File "/usr/lib/python2.7/dist-packages/django/urls/resolvers.py", line 313, 
in url_patterns
patterns = getattr(self.urlconf_module, "urlpatterns", self.urlconf_module)
  File "/usr/lib/python2.7/dist-packages/django/utils/functional.py", line 35, 
in __get__
res = instance.__dict__[self.name] = self.func(instance)
  File "/usr/lib/python2.7/dist-packages/django/urls/resolvers.py", line 306, 
in urlconf_module
return import_module(self.urlconf_name)
  File "/usr/lib/python2.7/importlib/__init__.py", line 37, in import_module
__import__(name)
  File "/usr/lib/python2.7/dist-packages/graphite/urls.py", line 29, in 
urlpatterns = patterns('',
NameError: name 'patterns' is not defined


Which has been removed from Django in 1.9:

https://docs.djangoproject.com/en/1.9/ref/urls/#patterns



Bug#861913: mariadb-client-10.1: trying to overwrite '/usr/bin/mytop', which is also in package mytop 1.9.1-4

2017-05-08 Thread Ondřej Surý
https://anonscm.debian.org/git/pkg-mysql/mariadb-10.1.git/commit/?id=2a17c70476de768f1e166b65f4a1b3865ac9757f

-- 
Ondřej Surý 
Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server
Knot Resolver (https://www.knot-resolver.cz/) – secure, privacy-aware,
fast DNS(SEC) resolver
Vše pro chleba (https://vseprochleba.cz) – Mouky ze mlýna a potřeby pro
pečení chleba všeho druhu

On Mon, May 8, 2017, at 12:08, Olaf van der Spek wrote:
> 2017-05-08 11:42 GMT+02:00 Ondřej Surý :
> > Definitely, I am just building the fixed version. I did a cleanup of
> > upstream files not being installed in the last bigger mariadb update,
> > and I was just not aware mytop was already packaged. Sorry for the
> > troubles.
> 
> Shouldn't it also declare a Replaces?



Bug#861913: mariadb-client-10.1: trying to overwrite '/usr/bin/mytop', which is also in package mytop 1.9.1-4

2017-05-08 Thread Olaf van der Spek
2017-05-08 11:42 GMT+02:00 Ondřej Surý :
> Definitely, I am just building the fixed version. I did a cleanup of
> upstream files not being installed in the last bigger mariadb update,
> and I was just not aware mytop was already packaged. Sorry for the
> troubles.

Shouldn't it also declare a Replaces?



Bug#861913: marked as done (mariadb-client-10.1: trying to overwrite '/usr/bin/mytop', which is also in package mytop 1.9.1-4)

2017-05-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 May 2017 10:03:55 +
with message-id 
and subject line Bug#861913: fixed in mariadb-10.1 10.1.23-4
has caused the Debian Bug report #861913,
regarding mariadb-client-10.1: trying to overwrite '/usr/bin/mytop', which is 
also in package mytop 1.9.1-4
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
861913: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861913
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: mariadb-client-10.1
Version: 10.1.22-3
Severity: normal

Hi,

Not sure how mytop ended up in mariadb-client..

# apt --fix-broken install
Reading package lists... Done
Building dependency tree   
Reading state information... Done
Correcting dependencies... Done
The following additional packages will be installed:
  mariadb-client-10.1
The following packages will be upgraded:
  mariadb-client-10.1
1 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
38 not fully installed or removed.
Need to get 0 B/5,816 kB of archives.
After this operation, 21.5 MB of additional disk space will be used.
Do you want to continue? [Y/n] 
(Reading database ... 64666 files and directories currently installed.)
Preparing to unpack .../mariadb-client-10.1_10.1.23-3_amd64.deb ...
Unpacking mariadb-client-10.1 (10.1.23-3) over (10.1.22-3) ...
dpkg: error processing archive 
/var/cache/apt/archives/mariadb-client-10.1_10.1.23-3_amd64.deb (--unpack):
 trying to overwrite '/usr/bin/mytop', which is also in package mytop 1.9.1-4
dpkg-deb: error: subprocess paste was killed by signal (Broken pipe)
Errors were encountered while processing:
 /var/cache/apt/archives/mariadb-client-10.1_10.1.23-3_amd64.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)

Gr,

Olaf

-- System Information:
Debian Release: 9.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64
 (x86_64)

Kernel: Linux 4.9.0-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages mariadb-client-10.1 depends on:
ii  debianutils   4.8.1.1
ii  libc6 2.24-10
ii  libstdc++66.3.0-16
iu  mariadb-client-core-10.1  10.1.23-3
pn  perl:any  
ii  zlib1g1:1.2.8.dfsg-5

Versions of packages mariadb-client-10.1 recommends:
ii  libdbd-mysql-perl 4.041-2
ii  libdbi-perl   1.636-1+b1
ii  libterm-readkey-perl  2.37-1

mariadb-client-10.1 suggests no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: mariadb-10.1
Source-Version: 10.1.23-4

We believe that the bug you reported is fixed in the latest version of
mariadb-10.1, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 861...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ondřej Surý  (supplier of updated mariadb-10.1 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 08 May 2017 11:31:13 +0200
Source: mariadb-10.1
Binary: libmariadbclient18 libmariadbclient-dev libmariadbclient-dev-compat 
libmariadbd18 libmariadbd-dev mariadb-common mariadb-client-core-10.1 
mariadb-client-10.1 mariadb-server-core-10.1 mariadb-server-10.1 mariadb-server 
mariadb-client mariadb-plugin-connect mariadb-plugin-oqgraph 
mariadb-plugin-tokudb mariadb-plugin-mroonga mariadb-plugin-spider 
mariadb-plugin-gssapi-server mariadb-plugin-gssapi-client 
mariadb-plugin-cracklib-password-check mariadb-test mariadb-test-data
Architecture: source
Version: 10.1.23-4
Distribution: unstable
Urgency: medium
Maintainer: Debian MySQL Maintainers 
Changed-By: Ondřej Surý 
Description:
 libmariadbclient-dev - MariaDB database development files
 libmariadbclient-dev-compat - MariaDB database development files 
(libmysqlclient compatibility)
 libmariadbclient18 - MariaDB database client library
 libmariadbd-dev - MariaDB embedded database, development files
 libmariadbd18 - MariaDB embedded database, shared library
 mariadb-client - MariaDB database client (metapackage depending on the latest 
vers
 mariadb-client-10.1 - M

Bug#860618: marked as done (golang-github-seccomp-libseccomp-golang: FTBFS on i386: dh_auto_test: go test -v -p 1 github.com/seccomp/libseccomp-golang returned exit code 1)

2017-05-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 May 2017 09:48:26 +
with message-id 
and subject line Bug#860618: fixed in golang-github-seccomp-libseccomp-golang 
0.0~git20150813.0.1b506fc-2
has caused the Debian Bug report #860618,
regarding golang-github-seccomp-libseccomp-golang: FTBFS on i386: dh_auto_test: 
go test -v -p 1 github.com/seccomp/libseccomp-golang returned exit code 1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
860618: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860618
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: golang-github-seccomp-libseccomp-golang
Version: 0.0~git20150813.0.1b506fc-1
Severity: serious
Tags: stretch sid
User: debian...@lists.debian.org
Usertags: qa-ftbfs-20170418-i386 qa-ftbfs
Justification: FTBFS in stretch on i386

Hi,

During a rebuild of all packages in stretch (in a stretch chroot, not a
sid chroot), your package failed to build on i386.

Relevant part (hopefully):
>  debian/rules build
> dh build --buildsystem=golang --with=golang
>dh_testdir -O--buildsystem=golang
>dh_update_autotools_config -O--buildsystem=golang
>dh_auto_configure -O--buildsystem=golang
>dh_auto_build -O--buildsystem=golang
>   go install -v -p 1 github.com/seccomp/libseccomp-golang
> github.com/seccomp/libseccomp-golang
>dh_auto_test -O--buildsystem=golang
>   go test -v -p 1 github.com/seccomp/libseccomp-golang
> === RUN   TestActionSetReturnCode
> --- PASS: TestActionSetReturnCode (0.00s)
> === RUN   TestSyscallGetName
> Got name of syscall 0x1 on native arch as exit
> --- PASS: TestSyscallGetName (0.00s)
> === RUN   TestSyscallGetNameByArch
> --- PASS: TestSyscallGetNameByArch (0.00s)
> === RUN   TestGetSyscallFromName
> Got syscall number of write on native arch as 4
> --- PASS: TestGetSyscallFromName (0.00s)
> === RUN   TestGetSyscallFromNameByArch
> Got syscall number of write on AMD64 as 1
> --- PASS: TestGetSyscallFromNameByArch (0.00s)
> === RUN   TestMakeCondition
> --- PASS: TestMakeCondition (0.00s)
> === RUN   TestGetNativeArch
> Got native arch of system as x86
> --- PASS: TestGetNativeArch (0.00s)
> === RUN   TestFilterCreateRelease
> --- PASS: TestFilterCreateRelease (0.00s)
> === RUN   TestFilterReset
> --- PASS: TestFilterReset (0.00s)
> === RUN   TestFilterArchFunctions
> --- PASS: TestFilterArchFunctions (0.00s)
> === RUN   TestFilterAttributeGettersAndSetters
> --- PASS: TestFilterAttributeGettersAndSetters (0.00s)
> === RUN   TestMergeFilters
> --- PASS: TestMergeFilters (0.00s)
> === RUN   TestRuleAddAndLoad
> --- FAIL: TestRuleAddAndLoad (0.00s)
>   seccomp_test.go:455: Syscall should have returned error code!
> FAIL
> exit status 1
> FAIL  github.com/seccomp/libseccomp-golang0.004s
> dh_auto_test: go test -v -p 1 github.com/seccomp/libseccomp-golang returned 
> exit code 1

The full build log is available from:
   
http://aws-logs.debian.net/2017/04/18/golang-github-seccomp-libseccomp-golang_0.0~git20150813.0.1b506fc-1_testing-i386.log

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.
--- End Message ---
--- Begin Message ---
Source: golang-github-seccomp-libseccomp-golang
Source-Version: 0.0~git20150813.0.1b506fc-2

We believe that the bug you reported is fixed in the latest version of
golang-github-seccomp-libseccomp-golang, which is due to be installed in the 
Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 860...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Roger Shimizu  (supplier of updated 
golang-github-seccomp-libseccomp-golang package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sat, 06 May 2017 12:09:57 +0900
Source: golang-github-seccomp-libseccomp-golang
Binary: golang-github-seccomp-libseccomp-golang-dev
Architecture: source
Version: 0.0~git20150813.0.1b506fc-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Go Packaging Team 


Bug#861804: marked as done (slrn non-free license issue)

2017-05-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 May 2017 09:49:14 +
with message-id 
and subject line Bug#861804: fixed in slrn 1.0.3+dfsg-1
has caused the Debian Bug report #861804,
regarding slrn non-free license issue
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
861804: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861804
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Subject: slrn non-free license issue
Package: slrn
Version: 1.0.3a-1

The slrn sources contain a file with a non-free license with
slrn-1.0.3/src/vms.c:

> Copyright : (c) Copyright 1991-95 by Iain Lea & Andrew Greer
> You may  freely  copy or  redistribute  this software,
> so  long as there is no profit made from its use, sale
> trade or  reproduction.  You may not change this copy-
> right notice, and it must be included in any copy made

This file is only used when building on VMS and can be removed from the
tarball.
The sources are non-free nevertheless due the the non-commercial
restriction.



In addition, slrn-1.0.3/src/help.c refers to a non-free license.
It is printed only VMS where SLRN_USE_SLTCP is 1:

> This software is Copyright 1991 by Stan Barber.
>
> Permission is hereby granted to copy, reproduce, redistribute or otherwise
> use this software as long as: there is no monetary profit gained
> specifically from the use or reproduction or this software, it is not
> sold, rented, traded or otherwise marketed, and this copyright notice is
> included prominently in any copy made.

It applies to slrn-1.0.3/src/clientlib.{c,h}, which have already been
cleared
from the upstream tarball:

> #error This file has been removed from the slrn source tarball because its
> #error license is more restrictive than the one of slrn itself.
>
> #error If you want to compile slrn for VMS and need this file, please
get it
> #error from http://slrn.sourceforge.net/data/clientlib.tar.gz

The help output may be cleared:
sed '/^#if ! SLRN_USE_SLTCP$/,/^#endif$/d'
--- End Message ---
--- Begin Message ---
Source: slrn
Source-Version: 1.0.3+dfsg-1

We believe that the bug you reported is fixed in the latest version of
slrn, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 861...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Muehlenhoff  (supplier of updated slrn package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 05 May 2017 19:35:29 +0200
Source: slrn
Binary: slrn slrnpull
Architecture: source amd64
Version: 1.0.3+dfsg-1
Distribution: unstable
Urgency: medium
Maintainer: Moritz Muehlenhoff 
Changed-By: Moritz Muehlenhoff 
Description:
 slrn   - threaded text-mode news reader
 slrnpull   - pulls a small newsfeed from an NNTP server
Closes: 861804
Changes:
 slrn (1.0.3+dfsg-1) unstable; urgency=medium
 .
   * Strip non-free vms.c from the tarball (only needed for builds
 on VMS). Thanks to Andreas Stieger for the report (Closes: #861804)
Checksums-Sha1:
 7e244730f7fd7270cb5069ff701115bf17b754c5 1957 slrn_1.0.3+dfsg-1.dsc
 357a21ababaac3a5fed4776436726e4a803e6427 1036038 slrn_1.0.3+dfsg.orig.tar.bz2
 0db6e628ed59fe03170be22f9834e333141983f5 50212 slrn_1.0.3+dfsg-1.debian.tar.xz
 9aea13d0cb5c1dd3ad0f32620dde4f7e2c3e286f 6554 slrn_1.0.3+dfsg-1_amd64.buildinfo
 f84abd42cd432b2d02cb694ca38b9d77e1e62846 564420 slrn_1.0.3+dfsg-1_amd64.deb
 09914af9d10914d4121e0fa5a9d42eb6ff17d438 139082 slrnpull_1.0.3+dfsg-1_amd64.deb
Checksums-Sha256:
 54acc1bebb8724f2ef4376a601feaa9db6e0b5188a2b0ec9d56c6f7ff55034bd 1957 
slrn_1.0.3+dfsg-1.dsc
 1513dbb1fe3916437cd0d9e6c08aeeff85d222b1d67c40d507601680b55373d1 1036038 
slrn_1.0.3+dfsg.orig.tar.bz2
 bd0547f3fc07f25478af768d5d5bb7b2923e20449a73b8c373cb4a8408023cb8 50212 
slrn_1.0.3+dfsg-1.debian.tar.xz
 68dc9cba21f092b2739191672973c65e457db26b48ceae88c13cbd0a299a1342 6554 
slrn_1.0.3+dfsg-1_amd64.buildinfo
 9001d0cee516f11b127545c8c1f4620bf3adcbee3b4b2013db4c892ba573d4ba 564420 
slrn_1.0.3+dfsg-1_amd64.deb
 c15cfddbf640c1631993b8a2cd12576eb15a8892f4c8af761ac611eb51dea77a 139082 
slrnpull_1.0.3+dfsg-1_amd64.deb
Files:
 899cd49f9dca7378972deda8d1529069 1957 news o

Bug#861913: mariadb-client-10.1: trying to overwrite '/usr/bin/mytop', which is also in package mytop 1.9.1-4

2017-05-08 Thread Olaf van der Spek
Hi Ondřej,

Shouldn't it conflict / replace the mytop pkg?

2017-05-08 11:34 GMT+02:00 Ondřej Surý :
> Hi Olaf,
>
> mytop is part of MariaDB a version that fixes little bugs here and
> there:
>
> +=item Michael "Monty" Widenius 
> +
> +Fixed a couple of minor bugs that gave warnings on startup.
> +Added support for MariaDB (show MariaDB at top and % done).
> +Cut long server version names to display width.
> +Made 'State' length dynamic.



Bug#861913: mariadb-client-10.1: trying to overwrite '/usr/bin/mytop', which is also in package mytop 1.9.1-4

2017-05-08 Thread Ondřej Surý
Definitely, I am just building the fixed version. I did a cleanup of
upstream files not being installed in the last bigger mariadb update,
and I was just not aware mytop was already packaged. Sorry for the
troubles.

Cheers,
-- 
Ondřej Surý 
Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server
Knot Resolver (https://www.knot-resolver.cz/) – secure, privacy-aware,
fast DNS(SEC) resolver
Vše pro chleba (https://vseprochleba.cz) – Mouky ze mlýna a potřeby pro
pečení chleba všeho druhu

On Mon, May 8, 2017, at 11:40, Olaf van der Spek wrote:
> Hi Ondřej,
> 
> Shouldn't it conflict / replace the mytop pkg?
> 
> 2017-05-08 11:34 GMT+02:00 Ondřej Surý :
> > Hi Olaf,
> >
> > mytop is part of MariaDB a version that fixes little bugs here and
> > there:
> >
> > +=item Michael "Monty" Widenius 
> > +
> > +Fixed a couple of minor bugs that gave warnings on startup.
> > +Added support for MariaDB (show MariaDB at top and % done).
> > +Cut long server version names to display width.
> > +Made 'State' length dynamic.



Bug#861913: mariadb-client-10.1: trying to overwrite '/usr/bin/mytop', which is also in package mytop 1.9.1-4

2017-05-08 Thread Ondřej Surý
Hi Olaf,

mytop is part of MariaDB a version that fixes little bugs here and
there:

+=item Michael "Monty" Widenius 
+
+Fixed a couple of minor bugs that gave warnings on startup.
+Added support for MariaDB (show MariaDB at top and % done).
+Cut long server version names to display width.
+Made 'State' length dynamic.

Cheers,
-- 
Ondřej Surý 
Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server
Knot Resolver (https://www.knot-resolver.cz/) – secure, privacy-aware,
fast DNS(SEC) resolver
Vše pro chleba (https://vseprochleba.cz) – Mouky ze mlýna a potřeby pro
pečení chleba všeho druhu

On Fri, May 5, 2017, at 21:21, Olaf van der Spek wrote:
> Package: mariadb-client-10.1
> Version: 10.1.22-3
> Severity: normal
> 
> Hi,
> 
> Not sure how mytop ended up in mariadb-client..
> 
> # apt --fix-broken install
> Reading package lists... Done
> Building dependency tree   
> Reading state information... Done
> Correcting dependencies... Done
> The following additional packages will be installed:
>   mariadb-client-10.1
> The following packages will be upgraded:
>   mariadb-client-10.1
> 1 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
> 38 not fully installed or removed.
> Need to get 0 B/5,816 kB of archives.
> After this operation, 21.5 MB of additional disk space will be used.
> Do you want to continue? [Y/n] 
> (Reading database ... 64666 files and directories currently installed.)
> Preparing to unpack .../mariadb-client-10.1_10.1.23-3_amd64.deb ...
> Unpacking mariadb-client-10.1 (10.1.23-3) over (10.1.22-3) ...
> dpkg: error processing archive
> /var/cache/apt/archives/mariadb-client-10.1_10.1.23-3_amd64.deb
> (--unpack):
>  trying to overwrite '/usr/bin/mytop', which is also in package mytop
>  1.9.1-4
> dpkg-deb: error: subprocess paste was killed by signal (Broken pipe)
> Errors were encountered while processing:
>  /var/cache/apt/archives/mariadb-client-10.1_10.1.23-3_amd64.deb
> E: Sub-process /usr/bin/dpkg returned an error code (1)
> 
> Gr,
> 
> Olaf
> 
> -- System Information:
> Debian Release: 9.0
>   APT prefers unstable
>   APT policy: (500, 'unstable')
> Architecture: amd64
>  (x86_64)
> 
> Kernel: Linux 4.9.0-2-amd64 (SMP w/2 CPU cores)
> Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
> Shell: /bin/sh linked to /usr/bin/dash
> Init: systemd (via /run/systemd/system)
> 
> Versions of packages mariadb-client-10.1 depends on:
> ii  debianutils   4.8.1.1
> ii  libc6 2.24-10
> ii  libstdc++66.3.0-16
> iu  mariadb-client-core-10.1  10.1.23-3
> pn  perl:any  
> ii  zlib1g1:1.2.8.dfsg-5
> 
> Versions of packages mariadb-client-10.1 recommends:
> ii  libdbd-mysql-perl 4.041-2
> ii  libdbi-perl   1.636-1+b1
> ii  libterm-readkey-perl  2.37-1
> 
> mariadb-client-10.1 suggests no packages.
> 
> -- no debconf information
> 



Bug#861855: marked as done (php7.0-fpm: Uses kill without depending on procps)

2017-05-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 May 2017 09:18:45 +
with message-id 
and subject line Bug#861855: fixed in php7.0 7.0.18-3
has caused the Debian Bug report #861855,
regarding php7.0-fpm: Uses kill without depending on procps
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
861855: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861855
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: php7.0-fpm
Version: 7.0.16-3
Severity: serious
Justification: Policy 3.5

/lib/systemd/system/php7.0-fpm.service contains:
```
ExecReload=/bin/kill -USR2 $MAINPID
```
procps is not Essential.
--- End Message ---
--- Begin Message ---
Source: php7.0
Source-Version: 7.0.18-3

We believe that the bug you reported is fixed in the latest version of
php7.0, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 861...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ondřej Surý  (supplier of updated php7.0 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 08 May 2017 10:25:18 +0200
Source: php7.0
Binary: libapache2-mod-php7.0 libphp7.0-embed php7.0 php7.0-cgi php7.0-cli 
php7.0-dev php7.0-fpm php7.0-phpdbg php7.0-xsl php7.0-intl php7.0-odbc 
php7.0-readline php7.0-recode php7.0-sqlite3 php7.0-xml php7.0-zip 
php7.0-sybase php7.0-gd php7.0-gmp php7.0-ldap php7.0-common php7.0-tidy 
php7.0-mcrypt php7.0-snmp php7.0-curl php7.0-json php7.0-pgsql php7.0-mbstring 
php7.0-enchant php7.0-opcache php7.0-imap php7.0-mysql php7.0-bcmath 
php7.0-soap php7.0-dba php7.0-interbase php7.0-xmlrpc php7.0-pspell php7.0-bz2
Architecture: source
Version: 7.0.18-3
Distribution: unstable
Urgency: medium
Maintainer: Debian PHP Maintainers 
Changed-By: Ondřej Surý 
Description:
 libapache2-mod-php7.0 - server-side, HTML-embedded scripting language (Apache 
2 module)
 libphp7.0-embed - HTML-embedded scripting language (Embedded SAPI library)
 php7.0 - server-side, HTML-embedded scripting language (metapackage)
 php7.0-bcmath - Bcmath module for PHP
 php7.0-bz2 - bzip2 module for PHP
 php7.0-cgi - server-side, HTML-embedded scripting language (CGI binary)
 php7.0-cli - command-line interpreter for the PHP scripting language
 php7.0-common - documentation, examples and common module for PHP
 php7.0-curl - CURL module for PHP
 php7.0-dba - DBA module for PHP
 php7.0-dev - Files for PHP7.0 module development
 php7.0-enchant - Enchant module for PHP
 php7.0-fpm - server-side, HTML-embedded scripting language (FPM-CGI binary)
 php7.0-gd  - GD module for PHP
 php7.0-gmp - GMP module for PHP
 php7.0-imap - IMAP module for PHP
 php7.0-interbase - Interbase module for PHP
 php7.0-intl - Internationalisation module for PHP
 php7.0-json - JSON module for PHP
 php7.0-ldap - LDAP module for PHP
 php7.0-mbstring - MBSTRING module for PHP
 php7.0-mcrypt - libmcrypt module for PHP
 php7.0-mysql - MySQL module for PHP
 php7.0-odbc - ODBC module for PHP
 php7.0-opcache - Zend OpCache module for PHP
 php7.0-pgsql - PostgreSQL module for PHP
 php7.0-phpdbg - server-side, HTML-embedded scripting language (PHPDBG binary)
 php7.0-pspell - pspell module for PHP
 php7.0-readline - readline module for PHP
 php7.0-recode - recode module for PHP
 php7.0-snmp - SNMP module for PHP
 php7.0-soap - SOAP module for PHP
 php7.0-sqlite3 - SQLite3 module for PHP
 php7.0-sybase - Sybase module for PHP
 php7.0-tidy - tidy module for PHP
 php7.0-xml - DOM, SimpleXML, WDDX, XML, and XSL module for PHP
 php7.0-xmlrpc - XMLRPC-EPI module for PHP
 php7.0-xsl - XSL module for PHP (dummy)
 php7.0-zip - Zip module for PHP
Closes: 861855
Changes:
 php7.0 (7.0.18-3) unstable; urgency=medium
 .
   * php-fpm has to depend on procps due kill usage in systemd service file
 (Closes: #861855)
   * Regenerate d/control
   * Do a fresh rewrap of debian/ directory
Checksums-Sha1:
 9634b9e01bbff31a9da14611b096ecc7441e4b11 5762 php7.0_7.0.18-3.dsc
 5fa251e91729a8cf4c94de2c712af984e32e454f 91456 php7.0_7.0.18-3.debian.tar.xz
 e672b74edc018aefa634f10f013ad9d912909dad 33547 php7.0_7.0.18-3_amd64.buildinfo
Checksums-Sha256:
 9cc7ca6c4803b00702764b49d02169f6bde98ca2b215afa413388570335a7f7e 5762 
ph

Processed: Bug housekeeping

2017-05-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> # The BTS still considers this bug to apply to testing
> # and unstable, hopefully this command is enough to mark
> # the bug as done there.
> fixed 859805 3.1.4-4
Bug #859805 {Done: Scott Kitterman } [postfix-ldap] 
postfix-ldap: unsupported dictionary type: ldap after upgrade
Marked as fixed in versions postfix/3.1.4-4.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
859805: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859805
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#851545: Version tracking fix

2017-05-08 Thread Adrian Bunk
Control: found -1 1.1.8-3.1

What causes this breakage is the date in the manpage,
which is the date of the package build.

Always likely to hit on jessie when the upload contained 
amd64 (or i386) binaries.

On stretch this is breakage waiting to happen when a DSA gets built on 
different days on different architectures.

cu
Adrian

-- 

   "Is there not promise of rain?" Ling Tan asked suddenly out
of the darkness. There had been need of rain for many days.
   "Only a promise," Lao Er said.
   Pearl S. Buck - Dragon Seed



Processed: iceweasel is now firefox

2017-05-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 788721 src:firefox-esr
Bug #788721 [src:iceweasel] [src:iceweasel] Some sources are not included in 
your package
Warning: Unknown package 'src:iceweasel'
Bug reassigned from package 'src:iceweasel' to 'src:firefox-esr'.
No longer marked as found in versions iceweasel/43.0.4-1, iceweasel/44.0-1, and 
iceweasel/39.0~b1-1.
Ignoring request to alter fixed versions of bug #788721 to the same values 
previously set
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
788721: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=788721
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Version tracking fix

2017-05-08 Thread Debian Bug Tracking System
Processing control commands:

> found -1 1.1.8-3.1
Bug #851545 [libpam-modules] libpam-modules: multiarch packages with differing 
files
Marked as found in versions pam/1.1.8-3.1.

-- 
851545: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851545
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#855927: marked as done (golang-prometheus-client: FTBFS: dh_auto_build: go install -v -p 1 github.com/prometheus/client_golang/deps/bitbucket.org/ww/goautoneg github.com/prometheus/client_golang/d

2017-05-08 Thread Debian Bug Tracking System
Your message dated Mon, 8 May 2017 11:35:37 +0300
with message-id <20170508083535.d5hogtbpxxbdsjeo@localhost>
and subject line src:golang-prometheus-client binaries have been removed from 
stretch/sid
has caused the Debian Bug report #855927,
regarding golang-prometheus-client: FTBFS: dh_auto_build: go install -v -p 1 
github.com/prometheus/client_golang/deps/bitbucket.org/ww/goautoneg 
github.com/prometheus/client_golang/deps/github.com/beorn7/perks/quantile 
github.com/prometheus/client_golang/extraction 
github.com/prometheus/client_golang/model 
github.com/prometheus/client_golang/prometheus 
github.com/prometheus/client_golang/text returned exit code 1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
855927: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855927
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: golang-prometheus-client
Version: 0.7.0+ds-3
Severity: serious
Tags: stretch sid
User: debian...@lists.debian.org
Usertags: qa-ftbfs-20170221 qa-ftbfs
Justification: FTBFS in stretch on amd64

Hi,

During a rebuild of all packages in stretch (in a stretch chroot, not a
sid chroot), your package failed to build on amd64.

Relevant part (hopefully):
> make[1]: Entering directory '/<>/golang-prometheus-client-0.7.0+ds'
> dh_auto_configure -O--buildsystem=golang
>   mkdir -p obj-x86_64-linux-gnu
>   Copy examples/simple/main.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/examples/simple/main.go
>   Copy examples/random/main.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/examples/random/main.go
>   Copy model/signature.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/model/signature.go
>   Copy model/labelname.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/model/labelname.go
>   Copy model/labelvalue_test.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/model/labelvalue_test.go
>   Copy model/sample.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/model/sample.go
>   Copy model/labelset.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/model/labelset.go
>   Copy model/fingerprinting.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/model/fingerprinting.go
>   Copy model/labelvalue.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/model/labelvalue.go
>   Copy model/timestamp.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/model/timestamp.go
>   Copy model/samplevalue.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/model/samplevalue.go
>   Copy model/model.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/model/model.go
>   Copy model/sample_test.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/model/sample_test.go
>   Copy model/labelname_test.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/model/labelname_test.go
>   Copy model/timestamp_test.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/model/timestamp_test.go
>   Copy model/signature_test.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/model/signature_test.go
>   Copy model/metric_test.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/model/metric_test.go
>   Copy model/metric.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/model/metric.go
>   Copy prometheus/push.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/prometheus/push.go
>   Copy prometheus/histogram.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/prometheus/histogram.go
>   Copy prometheus/process_collector_test.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/prometheus/process_collector_test.go
>   Copy prometheus/histogram_test.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/prometheus/histogram_test.go
>   Copy prometheus/registry.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/prometheus/registry.go
>   Copy prometheus/vec_test.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/prometheus/vec_test.go
>   Copy prometheus/go_collector_test.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/prometheus/go_collector_test.go
>   Copy prometheus/registry_test.go -> 
> obj-x86_64-linux-gnu/src/github.com/prometheus/client_golang/prome

Bug#860608: marked as done (golang: FTBFS: Go version is "go1.6.1", ignoring -next /<>/api/next.txt)

2017-05-08 Thread Debian Bug Tracking System
Your message dated Mon, 8 May 2017 11:27:50 +0300
with message-id <20170508082750.lh5tt7d75uomuhpu@localhost>
and subject line src:golang binaries have been removed from stretch/sid
has caused the Debian Bug report #860608,
regarding golang: FTBFS: Go version is "go1.6.1", ignoring -next 
/<>/api/next.txt
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
860608: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860608
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: golang
Version: 2:1.6.1-2
Severity: serious
Tags: stretch sid
User: debian...@lists.debian.org
Usertags: qa-ftbfs-20170418 qa-ftbfs
Justification: FTBFS in stretch on amd64

Hi,

During a rebuild of all packages in stretch (in a stretch chroot, not a
sid chroot), your package failed to build on amd64.

Relevant part (hopefully):
> make[1]: Entering directory '/<>'
> set -ex; \
>   cd src; \
>   export PATH="/<>/bin:$PATH"; \
>   eval "$(go tool dist env)"; \
>   bash run.bash -k -no-rebuild;
> + cd src
> + export 
> PATH=/<>/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games
> + go tool dist env
> + eval CC="gcc"
> CC_FOR_TARGET="gcc"
> GOROOT="/<>"
> GOBIN="/<>/bin"
> GOARCH="amd64"
> GOOS="linux"
> GOHOSTARCH="amd64"
> GOHOSTOS="linux"
> GOTOOLDIR="/<>/pkg/tool/linux_amd64"
> + CC=gcc
> + CC_FOR_TARGET=gcc
> + GOROOT=/<>
> + GOBIN=/<>/bin
> + GOARCH=amd64
> + GOOS=linux
> + GOHOSTARCH=amd64
> + GOHOSTOS=linux
> + GOTOOLDIR=/<>/pkg/tool/linux_amd64
> + bash run.bash -k -no-rebuild
> 
> # Testing packages.
> okarchive/tar 0.019s
> okarchive/zip 0.215s
> okbufio   0.193s
> okbytes   0.204s
> okcompress/bzip2  0.247s
> okcompress/flate  0.831s
> okcompress/gzip   0.100s
> okcompress/lzw0.039s
> okcompress/zlib   0.168s
> okcontainer/heap  0.009s
> okcontainer/list  0.038s
> okcontainer/ring  0.017s
> okcrypto/aes  0.083s
> okcrypto/cipher   0.015s
> okcrypto/des  0.085s
> okcrypto/dsa  0.055s
> okcrypto/ecdsa0.072s
> okcrypto/elliptic 0.125s
> okcrypto/hmac 0.024s
> okcrypto/md5  0.047s
> okcrypto/rand 0.050s
> okcrypto/rc4  0.213s
> okcrypto/rsa  0.146s
> okcrypto/sha1 0.049s
> okcrypto/sha256   0.036s
> okcrypto/sha512   0.019s
> okcrypto/subtle   0.008s
> okcrypto/tls  2.594s
> okcrypto/x509 3.088s
> okdatabase/sql0.136s
> okdatabase/sql/driver 0.066s
> okdebug/dwarf 0.039s
> okdebug/elf   0.117s
> okdebug/gosym 0.520s
> okdebug/macho 0.032s
> okdebug/pe0.034s
> okdebug/plan9obj  0.017s
> okencoding/ascii850.088s
> okencoding/asn1   0.021s
> okencoding/base32 0.020s
> okencoding/base64 0.035s
> okencoding/binary 0.043s
> okencoding/csv0.037s
> okencoding/gob0.055s
> okencoding/hex0.048s
> okencoding/json   0.412s
> okencoding/pem0.046s
> okencoding/xml0.024s
> okerrors  0.021s
> okexpvar  0.017s
> okflag0.026s
> okfmt 0.205s
> okgo/ast  0.040s
> okgo/build0.205s
> okgo/constant 0.023s
> okgo/doc  0.125s
> okgo/format   0.041s
> okgo/internal/gccgoimporter   0.013s
> okgo/internal/gcimporter  0.314s
> okgo/parser   0.086s
> okgo/printer  0.716s
> okgo/scanner  0.049s
> okgo/token0.044s
> okgo/types1.656s
> okhash/adler320.032s
> okhash/crc32  0.039s
> okhash/crc64  0.045s
> okhash/fnv0.038s
> okhtml0.019s
> okhtml/template   0.078s
> okimage   0.226s
> okimage/color 0.110s
> okimage/draw  0.117s
> okimage/gif   0.160s
> okimage/jpeg  0.341s
> okimage/png   0.103s
> okindex/suffixarray   0.044s
> okinternal/golang.org/x/net/http2/hpack   0.029s
> okinternal/singleflight   0.062s
> okinternal/trace  0.069s
> okio  0.048s
> okio/ioutil   0.014s
> oklog 0.020s
> oklog/syslog  2.055s
> okmath0.017s
> okmath/big1.017s
> okmath/cmplx  0.009s
> okmath/rand   0.189s
> okmime0.087s
> okmime/multipart  1.560s
> okmime/quotedprintable0.759s
> oknet 1.464s
> oknet/http10.894s
> oknet/http/cgi0.616s
> oknet/http/cookiejar  0.012s
> oknet/http/fcgi   0.009s
> oknet/http/httptest   0.026s
> oknet/http/httputil   0.21

Bug#860606: marked as done (golang-1.6: FTBFS: Go version is "go1.6.3", ignoring -next /<>/api/next.txt)

2017-05-08 Thread Debian Bug Tracking System
Your message dated Mon, 8 May 2017 11:24:11 +0300
with message-id <20170508082410.kfmh3l6khny5x2ez@localhost>
and subject line src:golang-1.6 binaries have been removed from stretch/sid
has caused the Debian Bug report #860606,
regarding golang-1.6: FTBFS: Go version is "go1.6.3", ignoring -next 
/<>/api/next.txt
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
860606: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860606
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: golang-1.6
Version: 1.6.3-1
Severity: serious
Tags: stretch sid
User: debian...@lists.debian.org
Usertags: qa-ftbfs-20170418 qa-ftbfs
Justification: FTBFS in stretch on amd64

Hi,

During a rebuild of all packages in stretch (in a stretch chroot, not a
sid chroot), your package failed to build on amd64.

Relevant part (hopefully):
> make[1]: Entering directory '/<>'
> set -ex; \
>   cd src; \
>   export PATH="/<>/bin:$PATH"; \
>   eval "$(go tool dist env)"; \
>   bash run.bash -k -no-rebuild;
> + cd src
> + export 
> PATH=/<>/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games
> + go tool dist env
> + eval CC="gcc"
> CC_FOR_TARGET="gcc"
> GOROOT="/<>"
> GOBIN="/<>/bin"
> GOARCH="amd64"
> GOOS="linux"
> GOHOSTARCH="amd64"
> GOHOSTOS="linux"
> GOTOOLDIR="/<>/pkg/tool/linux_amd64"
> + CC=gcc
> + CC_FOR_TARGET=gcc
> + GOROOT=/<>
> + GOBIN=/<>/bin
> + GOARCH=amd64
> + GOOS=linux
> + GOHOSTARCH=amd64
> + GOHOSTOS=linux
> + GOTOOLDIR=/<>/pkg/tool/linux_amd64
> + bash run.bash -k -no-rebuild
> 
> # Testing packages.
> okarchive/tar 0.121s
> okarchive/zip 0.207s
> okbufio   0.168s
> okbytes   0.254s
> okcompress/bzip2  0.209s
> okcompress/flate  0.832s
> okcompress/gzip   0.125s
> okcompress/lzw0.008s
> okcompress/zlib   0.142s
> okcontainer/heap  0.015s
> okcontainer/list  0.037s
> okcontainer/ring  0.029s
> okcrypto/aes  0.066s
> okcrypto/cipher   0.032s
> okcrypto/des  0.025s
> okcrypto/dsa  0.066s
> okcrypto/ecdsa0.125s
> okcrypto/elliptic 0.067s
> okcrypto/hmac 0.019s
> okcrypto/md5  0.021s
> okcrypto/rand 0.070s
> okcrypto/rc4  0.154s
> okcrypto/rsa  0.156s
> okcrypto/sha1 0.029s
> okcrypto/sha256   0.015s
> okcrypto/sha512   0.030s
> okcrypto/subtle   0.031s
> okcrypto/tls  2.701s
> okcrypto/x509 2.735s
> okdatabase/sql0.201s
> okdatabase/sql/driver 0.025s
> okdebug/dwarf 0.039s
> okdebug/elf   0.060s
> okdebug/gosym 0.476s
> okdebug/macho 0.035s
> okdebug/pe0.078s
> okdebug/plan9obj  0.061s
> okencoding/ascii850.026s
> okencoding/asn1   0.010s
> okencoding/base32 0.018s
> okencoding/base64 0.030s
> okencoding/binary 0.018s
> okencoding/csv0.037s
> okencoding/gob0.107s
> okencoding/hex0.062s
> okencoding/json   0.350s
> okencoding/pem0.064s
> okencoding/xml0.016s
> okerrors  0.036s
> okexpvar  0.112s
> okflag0.018s
> okfmt 0.270s
> okgo/ast  0.034s
> okgo/build0.111s
> okgo/constant 0.020s
> okgo/doc  0.124s
> okgo/format   0.077s
> okgo/internal/gccgoimporter   0.023s
> okgo/internal/gcimporter  0.369s
> okgo/parser   0.079s
> okgo/printer  0.624s
> okgo/scanner  0.110s
> okgo/token0.080s
> okgo/types1.885s
> okhash/adler320.053s
> okhash/crc32  0.013s
> okhash/crc64  0.009s
> okhash/fnv0.021s
> okhtml0.072s
> okhtml/template   0.095s
> okimage   0.326s
> okimage/color 0.306s
> okimage/draw  0.143s
> okimage/gif   0.183s
> okimage/jpeg  0.349s
> okimage/png   0.084s
> okindex/suffixarray   0.092s
> okinternal/golang.org/x/net/http2/hpack   0.015s
> okinternal/singleflight   0.122s
> okinternal/trace  0.060s
> okio  0.115s
> okio/ioutil   0.082s
> oklog 0.064s
> oklog/syslog  2.079s
> okmath0.031s
> okmath/big0.949s
> okmath/cmplx  0.039s
> okmath/rand   0.126s
> okmime0.019s
> okmime/multipart  1.139s
> okmime/quotedprintable0.639s
> oknet 1.470s
> oknet/http10.713s
> oknet/http/cgi1.495s
> oknet/http/cookiejar  0.034s
> oknet/http/fcgi   0.033s
> oknet/http/httptest   0.045s
> oknet/http/httputil 

Bug#862071: password-store: FTBFS: not ok 1 - Test "generate" command

2017-05-08 Thread Chris Lamb
Source: password-store
Version: 1.6.5-5
Severity: serious
Justification: fails to build from source
User: reproducible-bui...@lists.alioth.debian.org
Usertags: ftbfs
X-Debbugs-Cc: reproducible-b...@lists.alioth.debian.org

Dear Maintainer,

password-store fails to build from source in unstable/amd64:

  […]

 dh_auto_configure
 dh_auto_build
make -j1
  make[1]: Entering directory '«BUILDDIR»'
  Password store is a shell script, so there is nothing to do. Try "make 
install" instead.
  make[1]: Leaving directory '«BUILDDIR»'
 dh_auto_test
make -j1 test
  make[1]: Entering directory '«BUILDDIR»'
  ok 1 - Make sure we can run pass
  ok 2 - Make sure we can initialize our test store
  # passed all 2 test(s)
  1..2
  not ok 1 - Test "generate" command
  # 
  # "$PASS" init $KEY1 &&
  # "$PASS" generate cred 19 &&
  # [[ $("$PASS" show cred | wc -m) -eq 20 ]]
  # 
  not ok 2 - Test replacement of first line
  # 
  # "$PASS" insert -m cred2 <<<"$(printf "this is a 
big\\npassword\\nwith\\nmany\\nlines\\nin it bla bla")" &&
  # PATH="$TEST_HOME:$PATH" FAKE_PWGEN_PASSWORD="This is a fake 
password" "$PASS" generate -i cred2 88 &&
  # [[ $("$PASS" show cred2) == "$(printf "This is a fake 
password\\npassword\\nwith\\nmany\\nlines\\nin it bla bla")" ]]
  # 
  # failed 2 among 2 test(s)
  1..2
  Makefile:67: recipe for target 'tests/t0010-generate-tests.sh' failed
  make[1]: *** [tests/t0010-generate-tests.sh] Error 1
  make[1]: Leaving directory '«BUILDDIR»'
  dh_auto_test: make -j1 test returned exit code 2
  debian/rules:3: recipe for target 'build' failed
  make: *** [build] Error 2
  dpkg-buildpackage: error: debian/rules build gave error exit status 2

  […]

The full build log is attached.


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-


password-store.1.6.5-5.unstable.amd64.log.txt.gz
Description: Binary data


Processed: your mail

2017-05-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 861913 serious
Bug #861913 [mariadb-client-10.1] mariadb-client-10.1: trying to overwrite 
'/usr/bin/mytop', which is also in package mytop 1.9.1-4
Severity set to 'serious' from 'normal'
> quit
Stopping processing here.

Please contact me if you need assistance.
-- 
861913: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861913
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems