Re: Bug#835851: add MIPS r6 support in dak

2016-08-28 Thread YunQiang Su
On Mon, Aug 29, 2016 at 3:32 AM, Adam D. Barratt
 wrote:
> On Mon, 2016-08-29 at 03:10 +0800, YunQiang Su wrote:
>> We are working on MIPS r6 support, which are different ports with MIPS ones.
>> They include mipsr6, mipsr6el, mipsn32r6, mipsn32r6el, mips64r6, mips64r6el.
>>
>> Theses ports have been supported by `dpkg' in sid/testing,
>> while not in stable yet.
> [...
>> It seems there are 2 options:
>>  1. backport `dpkg' in sid to stable, and ftpmaster team install that
>> package into dak machine
>>  2. backport archtable/cputable changes into `dpkg' in stable and upload it 
>> to
>>  jessie-updates with help of release team.
>
> With an SRM hat on, I fail to see why this would be eligible for
> jessie-updates. (Assuming you're not simply confused as to what that
> means.)

I guess I did confused by the name. :(
By anyway, ftpmaster can accept this change.

>
> Regards,
>
> Adam
>



-- 
YunQiang Su



Bug#835873: RM: openstreetmap-client/14.03.1~ds0-1

2016-08-28 Thread Alessio Treglia
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: rm

Please remove openstreetmap-client from stable.
One of the package's core functionalities - the search
function - is utterly broken. Plus, upstream maintainer
has been unresponsive for quite a while now - 2 years
have passed since the last commit.

I can't find any compelling reason for supporting it on
the long term.

Thanks in advance for considering.


-- 
Alessio Treglia  | www.alessiotreglia.com
Debian Developer | ales...@debian.org
Ubuntu Core Developer|  quadris...@ubuntu.com
0416 0004 A827 6E40 BB98 90FB E8A4 8AE5 311D 765A



Bug#835851: add MIPS r6 support in dak

2016-08-28 Thread YunQiang Su
Package: ftp.debian.org
X-Debbugs-CC: guil...@debian.org, debian-release@lists.debian.org

We are working on MIPS r6 support, which are different ports with MIPS ones.
They include mipsr6, mipsr6el, mipsn32r6, mipsn32r6el, mips64r6, mips64r6el.

Theses ports have been supported by `dpkg' in sid/testing,
while not in stable yet.

When try to upload packages to dak, it rejected these packages whose
`Architecture: ' list contains these new ports.

What should we do to make dak support these new ports, ASAP,
so we can feedback patches now.

It seems there are 2 options:
 1. backport `dpkg' in sid to stable, and ftpmaster team install that
package into dak machine
 2. backport archtable/cputable changes into `dpkg' in stable and upload it to
 jessie-updates with help of release team.

Which one is acceptable or better option?

-- 
YunQiang Su



Re: Bug#835851: add MIPS r6 support in dak

2016-08-28 Thread Adam D. Barratt
On Mon, 2016-08-29 at 03:10 +0800, YunQiang Su wrote:
> We are working on MIPS r6 support, which are different ports with MIPS ones.
> They include mipsr6, mipsr6el, mipsn32r6, mipsn32r6el, mips64r6, mips64r6el.
> 
> Theses ports have been supported by `dpkg' in sid/testing,
> while not in stable yet.
[...
> It seems there are 2 options:
>  1. backport `dpkg' in sid to stable, and ftpmaster team install that
> package into dak machine
>  2. backport archtable/cputable changes into `dpkg' in stable and upload it to
>  jessie-updates with help of release team.

With an SRM hat on, I fail to see why this would be eligible for
jessie-updates. (Assuming you're not simply confused as to what that
means.)

Regards,

Adam



Bug#834479: xul-ext-* (Was: Bug#834480: jessie-pu: package mozilla-noscript/2.9.0.11-1~deb8u1)

2016-08-28 Thread David Prévot
Hi,

Le 28/08/2016 à 04:09, Adam D. Barratt a écrit :
> Control; tags -1 + confirmed
[…]
> Oh, how I've missed Firefox plugin updates. :-|

Same here :/

> Please go ahead.

Thanks, all uploaded.

Regards

David



signature.asc
Description: OpenPGP digital signature


Bug#835829: RM: openstreetmap-client/stable -- ROM; RC-buggy; inactive upstream

2016-08-28 Thread Alessio Treglia
Package: ftp.debian.org
Severity: normal


Hi,

Please remove openstreetmap-client from the archive.
One of the package's core functionalities - the search
function - is utterly broken. Plus, upstream maintainer
has been unresponsive for quite a while now - 2 years
have passed since the last commit.

It is reportedly broken on stable too, I can't find any
compelling reason for supporting it on the long term.

Thanks in advance for considering.
Regards.


-- 
Alessio Treglia  | www.alessiotreglia.com
Debian Developer | ales...@debian.org
Ubuntu Core Developer|  quadris...@ubuntu.com
0416 0004 A827 6E40 BB98 90FB E8A4 8AE5 311D 765A



Bug#835170: transition: protobuf

2016-08-28 Thread Sebastiaan Couwenberg

On 08/25/16 19:17, Sebastiaan Couwenberg wrote:

On 08/25/16 17:33, Sebastiaan Couwenberg wrote:

Several packages unfortunately fail to build, some due to unrelated
issues to the new protobuf packages. Bugs still need to be filed for
those that weren't sid-ony due to RC bugs already.


The bugreports have been filed, and ones specific to protobuf 3.0.0 have
been usertagged for easy access:

https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=protobuf-3.0.0;users=pkg-protobuf-de...@lists.alioth.debian.org


Release Team, can you schedule binNMUs for the packages that rebuilt OK?

 anfo (sid only)  (0.98-4)   FTBFS
 appstream(0.9.8-4)  OK
 berkeley-express (1.5.1-2)  OK
 bitcoin (sid only)   (0.12.1-0.1 / 0.13.0-0.1~exp1) OK / OK
 clementine   (1.3.1+dfsg-1) OK
 cubemap  (1.3.1-1)  OK
 dogecoin (1.10.0-2) OK
 gazebo   (7.3.0+dfsg-2) FTBFS
 harvest-tools(1.2-2)OK
 ignition-transport   (1.3.0-1)  FTBFS
 imposm-parser(1.0.7+ds-3)   OK
 libphonenumber   (7.1.0-4)  FTBFS
 litecoin (sid only)  (0.10.4.0-1)   FTBFS
 mahimahi (sid only)  (0.92-1)   FTBFS
 mixxx(2.0.0~dfsg-5) OK
 mosh (1.2.6-1)  NOT-NEEDED
 mozc (2.18.2595.102+dfsg-1) OK
 mumble   (1.2.16-2) OK
 ola (sid only)   (0.10.2-1) FTBFS
 osmpbf   (1.3.3-7)  NOT-NEEDED
 ostinato (0.8-1)FTBFS
 pdns-recursor(4.0.1-1)  OK
 php-pinba (sid only) (1.0.0-2)  OK
 pink-pony(1.4.1-2)  OK
 pokerth (sid only)   (1.1.1-4)  OK
 protobuf-c   (1.2.1-1)  OK
 r-cran-rprotobuf (0.4.3-1)  OK
 ricochet-im  (1.1.2-1)  OK
 shogun (sid only)(3.2.0-7.3)FTBFS
 zbackup  (1.4.4-1)  OK

 imposm   (2.6.0+ds-3)   OK
 osmium   (0.0~20160425-e2e4368-2)   OK

Kind Regards,

Bas

--
 GPG Key ID: 4096R/6750F10AE88D4AF1
Fingerprint: 8182 DE41 7056 408D 6146  50D1 6750 F10A E88D 4AF1



Re: Porter roll call for Debian Stretch

2016-08-28 Thread Aurelien Jarno
Hi,

I am an active porter for the following architectures and I intend
to continue this for the lifetime of the Stretchj release (est. end
of 2020):

For mips, mipsel and mips64el, I
- run a Debian testing system on a real mipsel machine that I use
  regularly
- run a Debian stable system on a real mipsel machine that I use
  regularly
- run a Debian testing or unstable system on emulated mips, mipsel and
  mips64el machines that I use regularly
  regularly
- fix toolchain issues
- triage arch-specific bugs
- fix arch-related bugs
- test d-i more or less regularly using QEMU
- fix d-i bugs/issues
- maintain buildds
- fix kernel issues in stable and testing/unstable

I am a DD.

The mips* ports do support -fPIE/-pie and we already have binaries in
the archive built that way. I believe the ports are ready to have
-fPIE/-pie enabled by default. That said I am not aware of another
distribution doing so (Fedora still uses pie only for a few binaries
just like us), so we should probably not do that at the last minute
before the Stretch release.

Aurelien Jarno

-- 
Aurelien Jarno  GPG: 4096R/1DDD8C9B
aurel...@aurel32.net http://www.aurel32.net


signature.asc
Description: PGP signature


Re: Porter roll call for Debian Stretch

2016-08-28 Thread Aurelien Jarno
Hi,

I am an active porter for the following architectures and I intend
to continue this for the lifetime of the Stretchj release (est. end
of 2020):

For s390x, I
- run a Debian testing system on an emulated s390x machine, that I use
  regularly
- fix toolchain issues, though in practice there is almost nothing to do
- triage arch-specific bugs
- fix arch-related bugs
- test d-i on an emulated machine from time to time
- maintain buildds

I am a DD.

I believe the port is ready to have -fPIE/-pie enabled by default,
Ubuntu has proven so.

Aurelien Jarno

-- 
Aurelien Jarno  GPG: 4096R/1DDD8C9B
aurel...@aurel32.net http://www.aurel32.net


signature.asc
Description: PGP signature


Re: Porter roll call for Debian Stretch

2016-08-28 Thread Aurelien Jarno
On 2016-08-17 22:05, ni...@thykier.net wrote:
> Hi,
> 
> Like last release, we are doing a roll call for porters of all release
> architectures.  If you are an active porter behind one of the [release

Does it really concerns *all* release architectures? Traditionally amd64
and i386 have been granted waivers as "the toolchain maintainers are
happy to support" these architectures "as-is". That said the toolchain
maintainers do not fix ports specific bugs outside of the toolchain.

While I fully agree that we can have a waiver for amd64 due to being the
de facto standard architecture, it seems that a few leaf packages do
not build on i386 and that we have no porters to fix them. That is
probably still fine, but I wonder how fast the number of such packages
will increase in the future.

> architectures] for the entire lifetime of Debian Stretch (est. end of
> 2020), please respond with a signed email containing the following

What is the relation between the end of support of Stretch...

> before Friday, the 9th of September:
 
>  * Which architectures are you committing to be an active porter for?
>  * Please describe recent relevant porter contributions.
>  * Are you running/using Debian testing or sid on said port(s)?
>  * Are you testing/patching d-i for the port(s)?
>  * If we were to enable -fPIE/-pie by default in GCC-6, should that change
>also apply to this port? [0]

... and the above questions?

I fully agree that running testing/sid, fixing bugs or working on d-i up
to the release of Stretch will improve its quality. But after the
release it will improve the quality of Buster and later Bullseye. On the
other hand running testing/sid after the release of Stretch will not
help to catch bugs that can be fixed through a point release.

Aurelien

-- 
Aurelien Jarno  GPG: 4096R/1DDD8C9B
aurel...@aurel32.net http://www.aurel32.net


signature.asc
Description: PGP signature


Bug#835812: jessie-pu: package ccache/3.1.12-2

2016-08-28 Thread Joel Rosdahl
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Tags: jessie
Severity: normal

To fix #829088 ("ccache don't stop immediately on SIGINT and SIGTERM"), I
propose to upgrade ccache from 3.1.12-1 to 3.1.12-2 in stable-proposed-updates.

The change is a simple one-liner: Call _exit(1) at the end of the signal
handler to exit from e.g. SIGTERM. Without the exit, ccache will resume and run
the compiler again.

See attachment for the proposed update diff relative to 3.1.12-1.

-- Joel
diff -Nru ccache-3.1.12/debian/changelog ccache-3.1.12/debian/changelog
--- ccache-3.1.12/debian/changelog  2016-07-15 19:54:06.0 +0200
+++ ccache-3.1.12/debian/changelog  2016-08-28 15:45:26.0 +0200
@@ -1,3 +1,11 @@
+ccache (3.1.12-2) stable; urgency=medium
+
+  * Exit properly from signal handler (closes: #835460)
+This fixes a regression in ccache 3.1.10 leading to ccache not dying
+properly when interrupted by a signal.
+
+ -- Joel Rosdahl   Sun, 28 Aug 2016 15:45:26 +0200
+
 ccache (3.1.12-1) stable; urgency=medium

   * New upstream release 3.1.12 containing important bug fixes (and only
diff -Nru ccache-3.1.12/debian/patches/fix_signal_handler_exit.patch 
ccache-3.1.12/debian/patches/fix_signal_handler_exit.patch
--- ccache-3.1.12/debian/patches/fix_signal_handler_exit.patch  1970-01-01 
01:00:00.0 +0100
+++ ccache-3.1.12/debian/patches/fix_signal_handler_exit.patch  2016-08-28 
15:45:26.0 +0200
@@ -0,0 +1,13 @@
+Description: Exit properly from exit handler
+Author: Joel Rosdahl 
+
+--- a/ccache.c
 b/ccache.c
+@@ -264,6 +264,7 @@ signal_handler(int signo)
+ {
+   (void)signo;
+   clean_up_pending_tmp_files();
++  _exit(1);
+ }
+
+ static void
diff -Nru ccache-3.1.12/debian/patches/series 
ccache-3.1.12/debian/patches/series
--- ccache-3.1.12/debian/patches/series 2016-07-15 19:54:06.0 +0200
+++ ccache-3.1.12/debian/patches/series 2016-08-28 15:45:26.0 +0200
@@ -1 +1,2 @@
 debian_specific_usage_docs.patch
+fix_signal_handler_exit.patch


Processed: Re: Bug#829606: jessie-pu: package duck/0.7+deb8u1

2016-08-28 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 +confirmed -moreinfo
Bug #829606 [release.debian.org] jessie-pu: package duck/0.7+deb8u1
Added tag(s) confirmed.
Bug #829606 [release.debian.org] jessie-pu: package duck/0.7+deb8u1
Removed tag(s) moreinfo.

-- 
829606: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829606
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#829606: jessie-pu: package duck/0.7+deb8u1

2016-08-28 Thread Adam D. Barratt
Control: tags -1 +confirmed -moreinfo

[re-ordered]

> Am 2016-07-29 um 14:20 schrieb Julien Cristau:
> > Control: tag -1 moreinfo
> > 
> > On Mon, Jul  4, 2016 at 18:22:46 +0200, Simon Kainz wrote:
[...]
> >> Paul Wise found out that duck rund untrusted code from the current 
> >> directory as
> >> well as the ./lib and ./lib/checks directory. The attached patch fixes this
> >> issue.
> >>
> > Hi,
> > 
> > any chance of a diff from git diff -M or similar so the actual changes
> > are easier to spot?

On Mon, 2016-08-01 at 20:41 +0200, Simon Kainz wrote:
> Ok, please see the attached patch, which is the same as the previous
> one, but cleaned up - i made a diff without commiting all my changes,
> so git had a hard time recognising rename vs. delete new.

The changelog says "jessie-security" - with that changed to simply
"jessie", please go ahead.

Regards,

Adam



Bug#834419: jessie-pu: package glibc/2.19-18+deb8u6

2016-08-28 Thread Aurelien Jarno
On 2016-08-28 14:59, Adam D. Barratt wrote:
> On Fri, 2016-08-19 at 11:23 +0200, Aurelien Jarno wrote:
> > On 2016-08-15 15:29, Aurelien Jarno wrote:
> [...] 
> > > I would like to upload a new glibc package for the next jessie release.
> > 
> > In the meantime a new security issue (CVE-2016-6323) has been found and
> > backported to the upstream 2.19 stable branch. I would like to also
> > include this change into the jessie upload. You will find updated diff
> > and debdiff attached.
> 
> The Security Tracker suggests that the issue applies to glibc in
> unstable and is not yet fixed there; is that correct?

This is indeed correct. This fix is in our git tree ready for the 2.24-1
upload, but it hasn't happened yet as we are waiting for a transition
slot (see #834855).

The changes itself is relatively small and self contained. See:

https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=9e2ff6c9cc54c0b4402b8d49e4abe7000fde7617

Aurelien 

-- 
Aurelien Jarno  GPG: 4096R/1DDD8C9B
aurel...@aurel32.net http://www.aurel32.net


signature.asc
Description: PGP signature


Bug#834261: jessie-pu: package intel-microcode/3.20160714.1~deb8u1

2016-08-28 Thread Henrique de Moraes Holschuh
On Sun, 28 Aug 2016, Adam D. Barratt wrote:
> On Sat, 2016-08-13 at 18:27 -0300, Henrique de Moraes Holschuh wrote:
> > I would like to update the intel-microcode packages in stable to address
> > several critical errata in newer Intel processors, as well as to
> > properly support the Linux kernel 4.4 and later.
> > 
> > The updated packages being proposed in this bug report are identical to
> > the ones in unstable/testing and jessie-backports, other than
> > debian/changelog and version numbering.
> > 
> > These changes have been tested in unstable since 2016-07-22 and in
> > testing and jessie-backports since 2016-07-28, without any issues being
> > reported.
> > 
> > This microcode update is very important to get Debian to run in a more
> > stable way on the newer processors that have TSX enabled, but as usual,
> > it also fixes other unspecified errata, so it is important even for
> > processors without TSX.
> 
> Please go ahead.

Thank you!

Uploaded.

-- 
  Henrique Holschuh



Processed: tagging 835444, tagging 834480

2016-08-28 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> # Sigh, stupid fingers
> tags 835444 + confirmed
Bug #835444 [release.debian.org] jessie-pu: package 
ovirt-guest-agent/1.0.10.2.dfsg-2+deb8u1
Added tag(s) confirmed.
> tags 834480 + confirmed
Bug #834480 [release.debian.org] jessie-pu: package 
mozilla-noscript/2.9.0.11-1~deb8u1
Added tag(s) confirmed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
834480: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834480
835444: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=835444
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Re: Bug#834479: jessie-pu: package greasemonkey/3.8-1~deb8u1

2016-08-28 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #834479 [release.debian.org] jessie-pu: package greasemonkey/3.8-1~deb8u1
Added tag(s) confirmed.

-- 
834479: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834479
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#834479: jessie-pu: package greasemonkey/3.8-1~deb8u1

2016-08-28 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Mon, 2016-08-15 at 17:25 -1000, David Prévot wrote:
> The latest firefox major update in stable broke greasemonkey (#828622).
> The latest stable version of greasemonkey in Debian (3.8) is known to
> work with it, and has been in Sid and Stretch for a while.
> Unfortunately, the debdiff against the version is Jessie is quite insane
> (252 files changed, 6416 insertions(+), 3144 deletions(-) while ignoring
> all spaces and blank lines)…
> 
> I’m simply attaching the debdiff against Sid (adding a changelog entry).
> The package, rebuild in a Jessie chroot, has been successfully tested in
> Jessie.

Regards,

Adam



Processed: Re: Bug#834483: jessie-pu: package tabmixplus/0.5.0.0-1~deb8u1

2016-08-28 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #834483 [release.debian.org] jessie-pu: package tabmixplus/0.5.0.0-1~deb8u1
Added tag(s) confirmed.

-- 
834483: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834483
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Re: Bug#834484: jessie-pu: package firegestures/1.10.9-1~deb8u1

2016-08-28 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #834484 [release.debian.org] jessie-pu: package firegestures/1.10.9-1~deb8u1
Added tag(s) confirmed.

-- 
834484: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834484
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#834483: jessie-pu: package tabmixplus/0.5.0.0-1~deb8u1

2016-08-28 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Mon, 2016-08-15 at 17:20 -1000, David Prévot wrote:
> The latest firefox major update in stable broke again tabmixplus
> (#826995). The latest stable version of tabmixplus in debian (0.5.0.0)
> is known to work with it, and has been in Sid and Stretch for a while.
> Unfortunately, the debdiff against the version is Jessie is again quite
> insane (293 files changed, 9739 insertions(+), 6153 deletions(-) while
> ignoring all spaces and blank lines)…
> 
> I’m simply attaching the debdiff against Sid (mostly adding a changelog
> entry). The package, rebuild in a Jessie chroot, has been successfully
> tested in Jessie.

Please go ahead.

Regards,

Adam



Bug#834484: jessie-pu: package firegestures/1.10.9-1~deb8u1

2016-08-28 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Mon, 2016-08-15 at 19:08 -1000, David Prévot wrote:
> The latest firefox major update in stable broke firegestures (#827277).
> The latest version of firegestures in Debian (1.10.9) is known to work
> with it, and has been in Sid and Stretch for a while. Unfortunately, the
> debdiff against the version is Jessie is big (50 files changed, 1216
> insertions(+), 303 deletions(-) while ignoring all spaces and blank lines)…
> 
> I’m simply attaching the debdiff against Sid (adding a changelog entry).
> The package, rebuilt in a Jessie chroot, has been successfully tested in
> Jessie.

Please go ahead.

Regards,

Adam



Bug#834482: jessie-pu: package adblock-plus/2.7.3+dfsg-1~deb8u1

2016-08-28 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Mon, 2016-08-15 at 17:37 -1000, David Prévot wrote:
> The latest firefox major update in stable broke adblock-plus (#829267).
> The latest version of adblock-plus in Debian (2.7.3) is known to work
> with it, and has been in Sid and Stretch for a while. Unfortunately, the
> debdiff against the version is Jessie is pretty insane (611 files
> changed, 21429 insertions(+), 6423 deletions(-) while ignoring all
> spaces and blank lines, as well as most renamed and moved files)…
> 
> I’m simply attaching the debdiff against Sid (adding a changelog entry).
> The package, rebuild in a Jessie chroot, has been successfully tested in
> Jessie.

Please go ahead.

Regards,

Adam



Processed: Re: Bug#834482: jessie-pu: package adblock-plus/2.7.3+dfsg-1~deb8u1

2016-08-28 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #834482 [release.debian.org] jessie-pu: package 
adblock-plus/2.7.3+dfsg-1~deb8u1
Added tag(s) confirmed.

-- 
834482: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834482
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#834480: jessie-pu: package mozilla-noscript/2.9.0.11-1~deb8u1

2016-08-28 Thread Adam D. Barratt
Control; tags -1 + confirmed

On Mon, 2016-08-15 at 17:28 -1000, David Prévot wrote:
> The latest firefox major update in stable broke noscript (#826896).
> The latest version of noscript in Debian (2.9.0.11) is known to work
> with it, and has been in Sid and Stretch for a while. Unfortunately, the
> debdiff against the version is Jessie is quite insane (169 files
> changed, 3584 insertions(+), 1594 deletions(-) while ignoring all spaces
> and blank lines)…
> 
> I’m simply attaching the debdiff against Sid (adding a changelog entry).
> The package, rebuild in a Jessie chroot, has been successfully tested in
> Jessie.

Oh, how I've missed Firefox plugin updates. :-|

Please go ahead.

Regards,

Adam



Bug#835444: jessie-pu: package ovirt-guest-agent/1.0.10.2.dfsg-2+deb8u1

2016-08-28 Thread Adam D. Barratt
Control; tags -1 + confirmed

On Thu, 2016-08-25 at 20:45 +0200, Laszlo Boszormenyi (GCS) wrote:
> There are two stupid bugs in ovirt-guest-agent which affects Jessie.
> Both fixed in Sid + Stretch.
> 
> First is that its daemon is not started with the initscript[1]. Reason
> is: it checks for executable bit on the daemon, but it's installed
> without that. chmod a+x added to d/rules.
> 
> Second is that the logging is not working if daemon is started with
> systemd as its log directory is not owned by the ovirtagent user[2].
> To be extra safe, the chown was added to postinst.

Please go ahead.

Regards,

Adam



Bug#835443: jessie-pu: package sqlite3/3.8.7.1-1+deb8u2

2016-08-28 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Thu, 2016-08-25 at 20:45 +0200, Laszlo Boszormenyi (GCS) wrote:
> There's a vulnerability in SQLite3 [1] which was fixed in Sid and
> Stretch, but not yet in Jessie. Security Team decided it's a minor
> issue and doesn't warrant a DSA.
> 
> An other issue, a segfault is fixed as well on heavy 'SAVEPOINT'
> usage[2][3], which affects Django.

Please go ahead.

Regards,

Adam



Processed: Re: Bug#835443: jessie-pu: package sqlite3/3.8.7.1-1+deb8u2

2016-08-28 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #835443 [release.debian.org] jessie-pu: package sqlite3/3.8.7.1-1+deb8u2
Added tag(s) confirmed.

-- 
835443: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=835443
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#834419: jessie-pu: package glibc/2.19-18+deb8u6

2016-08-28 Thread Adam D. Barratt
On Fri, 2016-08-19 at 11:23 +0200, Aurelien Jarno wrote:
> On 2016-08-15 15:29, Aurelien Jarno wrote:
[...] 
> > I would like to upload a new glibc package for the next jessie release.
> 
> In the meantime a new security issue (CVE-2016-6323) has been found and
> backported to the upstream 2.19 stable branch. I would like to also
> include this change into the jessie upload. You will find updated diff
> and debdiff attached.

The Security Tracker suggests that the issue applies to glibc in
unstable and is not yet fixed there; is that correct?

Regards,

Adam



Bug#834261: jessie-pu: package intel-microcode/3.20160714.1~deb8u1

2016-08-28 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Sat, 2016-08-13 at 18:27 -0300, Henrique de Moraes Holschuh wrote:
> I would like to update the intel-microcode packages in stable to address
> several critical errata in newer Intel processors, as well as to
> properly support the Linux kernel 4.4 and later.
> 
> The updated packages being proposed in this bug report are identical to
> the ones in unstable/testing and jessie-backports, other than
> debian/changelog and version numbering.
> 
> These changes have been tested in unstable since 2016-07-22 and in
> testing and jessie-backports since 2016-07-28, without any issues being
> reported.
> 
> This microcode update is very important to get Debian to run in a more
> stable way on the newer processors that have TSX enabled, but as usual,
> it also fixes other unspecified errata, so it is important even for
> processors without TSX.

Please go ahead.

Regards,

Adam



Processed: Re: Bug#834261: jessie-pu: package intel-microcode/3.20160714.1~deb8u1

2016-08-28 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #834261 [release.debian.org] jessie-pu: package 
intel-microcode/3.20160714.1~deb8u1
Added tag(s) confirmed.

-- 
834261: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834261
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: libica: FTBFS with openssl 1.1.0

2016-08-28 Thread Debian Bug Tracking System
Processing control commands:

> block 827061 by -1
Bug #827061 [release.debian.org] transition: openssl
827061 was blocked by: 828278 829465 828343 835800 828471 828490 828283 828543 
828607 828521 828322 828555 828241 828383 828472 828362 828581 828286 828441 
828257 828083 828409 828503 828229 828610 828542 828504 828392 828515 828242 
828487 828475 828233 828572 828375 828327 828238 828481 828363 828342 828499 
828315 828410 828537 828508 828500 828356 828586 828290 828379 828239 828401 
828324 828464 828439 828534 828466 828583 828564 828523 828457 828547 829452 
828432 835793 828237 828509 828548 828603 828254 828473 828451 828341 828498 
828336 828350 828469 828556 828413 828251 828604 828371 828394 828310 828415 
828597 835797 828562 835799 828492 828544 828377 828419 828438 827076 822380 
814600 828514 828491 828605 828311 828527 828569 828445 828582 828337 828502 
828565 828320 828620 828590 828546 828325 828494 828589 828578 828262 835790 
828230 828613 828452 828355 828354 828446 828470 828291 828489 828253 828296 
828351 828429 828567 828302 835804 828568 828497 828442 828376 835785 828299 
828579 828387 828524 828520 828248 828526 828307 828386 828232 828266 828571 
828536 828580 828396 828285 828252 828382 828427 828435 828616 828591 828617 
828598 828528 828539 828276 828496 828374 828255 828608 828292 828282 828561 
828280 828082 828264 828281 828358 828456 828268 828318 828378 828601 828465 
828440 828593 828599 828412 828328 828479 828467 828240 828331 828619 828461 
828295 835798 828588 828345 828535 828236 828594 835796 828424 828142 828541 
828585 828284 828389 828344 828347 828349 828400 828447 828256 828495 828346 
828480 828321 828587 828560 828512 828309 828406 828338 828300 828258 828297 
828436 828416 828486 828353 828370 828243 828566 828397 828368 828263 812166 
828414 828477 828549 828458 828426 828485 828545 828433 828313 828431 828468 
828303 828398 828399 828454 828592 828357 828335 828529 828393 828522 828246 
828519 828330 828360 828493 828455 828277 828127 828403 828334 828474 828538 
828369 828312 828261 828388 828270 828484 828558 828553 828259 828317 828574 
835794 828298 828352 835786 828462 828372 808669 828404 828287 828407 828234 
828618 828557 828507 828339 828614 827068 828615 828249 828420 828289 828425 
828525 828385 828319 828323 828516 828551 828453 828395 828308 828333 828272 
828570 828505 828602 828359 828293 828611 828530 828483 828550 828463 828247 
828301 828294 828533 828430 828305 828265 828459 828488 828139 828274 828326 
828449 828365 828478 828531 828384 828540 835801 835549 828584 828600 828418 
828405 828271 828373 828428 828595 828288 828267 809271 828273 828381 828244 
828612 828231 828443 828423 828228 828444 828390 828559 828511 828402 828411 
828518 828364 828275 828306 828361 828329 828421 828260 828366 828434 828506 
828332 828304 828450 828340 828417 828316 828437 828575 828577 828609 828596 
828554 828517 828482 828563 828532 828235 828510 828552 828391 828314 828367 
828460 835585 828380 828279 828448 828408 828573 828606 828250 828576 828269 
828513 828422 828501
827061 was not blocking any bugs.
Added blocking bug(s) of 827061: 835811

-- 
827061: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827061
835811: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=835811
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#833634: jessie-pu: package apache2/2.4.10-10+deb8u6

2016-08-28 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Sun, 2016-08-07 at 13:20 +0200, Stefan Fritsch wrote:
> apache2 (2.4.10-10+deb8u6) jessie; urgency=medium
> 
>   * Fix race condition and logical error in init script. Thanks to Thomas
> Stangner for the patch. Closes: #822144
>   * Remove links to manpages.debian.org in default index.html to avoid
> broken robots doing a DoS on the site. Closes: #821313
>   * mod_socache_memcache: Increase idle timeout to 15s to allow keep-alive
> connections. Closes: #803035
>   * mod_proxy_fcgi: Fix wrong behavior with 304 responses. Closes: #827472
>   * Correct systemd-sysv-generator behavior by customizing some parameters.
> This fixes 'systemctl status' returning incorrect results.
> Closes: #827444
>   * mod_proxy_html: Add missing config file mods-available/proxy_html.conf.
> This is intentionally not enabled during upgrade, to make it less
> likely to break existing setups. It will be enabled by a a2dismod/a2enmod
> cycle, though. Closes: #827258

Please go ahead.

Regards,

Adam



Processed: Re: Bug#833634: jessie-pu: package apache2/2.4.10-10+deb8u6

2016-08-28 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #833634 [release.debian.org] jessie-pu: package apache2/2.4.10-10+deb8u6
Added tag(s) confirmed.

-- 
833634: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=833634
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#833595: jessie-pu: package nullmailer/1.13-1+deb8u1

2016-08-28 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Sat, 2016-08-06 at 19:45 +0200, Christian Hofstaedtler wrote:
> #831813 is an rc-bug in nullmailer, which, for some configurations,
> keeps username/passwords in the debconf db. I've fixed this in
> unstable as an NMU; Security has suggested doing the same for jessie
> in a point release.

Please go ahead.

Regards,

Adam



Processed: block 827061 with 812166

2016-08-28 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> block 827061 with 812166
Bug #827061 [release.debian.org] transition: openssl
827061 was blocked by: 828557 828371 828335 835790 828497 828542 828400 828605 
828540 828286 828386 828437 828261 828235 828606 828519 828246 828535 828403 
828503 828285 828323 828395 829452 828509 828544 828515 828444 828263 828257 
828266 828390 828613 828333 828450 808669 835797 828255 828279 828417 828360 
828280 828601 828511 828449 828341 828433 828608 828250 828615 835549 828281 
828325 828461 828502 828340 828267 828562 828349 828243 828312 828411 828330 
828477 828258 828321 828290 828362 828337 828526 828600 828514 828388 828404 
828303 828372 828334 828499 828233 828565 828578 828314 835801 828344 828370 
828301 828291 828358 835804 828406 828350 828380 828412 828287 828546 828483 
828440 828567 829465 828253 828368 828381 828568 828309 828239 828378 828552 
828284 828379 828485 828547 828306 828617 828598 828566 828317 835799 828596 
828364 828273 828373 828471 828451 828408 828269 828543 828470 828420 828394 
828427 828580 828431 828413 828493 828434 828231 828410 828588 828282 828491 
828460 828486 828234 828272 828425 828393 828083 828320 828603 828584 828299 
835800 828589 828414 828467 828351 828464 828248 828324 828530 828318 828507 
828531 828363 828475 828604 828551 828421 828293 828424 828328 828492 828594 
828296 828510 828229 828426 835585 828359 828352 828445 828612 828402 828490 
828498 828527 828616 828607 828355 828366 835796 828548 828367 828396 828453 
828430 828479 828586 828556 828587 828539 828513 828265 828619 828242 828288 
828247 828392 809271 828228 828536 828443 828532 828446 828264 828384 828472 
828595 828241 828473 828455 828558 828357 828399 828573 828331 828554 828385 
828585 828356 835798 828236 828082 828342 828549 828438 828329 828240 828521 
828481 828418 828327 828564 828581 828525 828466 828574 828512 828252 828534 
828488 828462 828452 828480 835786 828251 828590 828593 828262 828563 827076 
828459 828142 828570 828389 828495 828304 828322 828501 828254 828409 828283 
828489 828576 828278 828579 828435 828339 828289 828377 828311 828315 828523 
828609 828528 828274 828487 828469 828275 828442 828319 835785 828496 828577 
828456 828555 835794 828571 828447 828533 814600 828232 828484 828582 828454 
828244 828448 828592 828516 828300 828268 828569 828474 828398 828365 828432 
828520 828457 828305 828294 828298 828346 828439 828256 828354 828347 828575 
828270 828316 828259 828391 828230 828383 828313 828249 828276 828561 828308 
828482 828361 828500 828504 828415 828428 828277 828538 828602 828353 828611 
828401 835793 828583 828336 828599 828423 828559 828376 828407 828518 828506 
828468 828429 828419 828343 828618 828550 828237 828524 828387 828553 828572 
828238 828545 828260 828307 822380 828494 828436 828326 828297 828422 828560 
828382 828397 828620 828591 828508 828295 828614 828302 828127 828465 828458 
828345 828416 828405 828522 828374 828517 828375 828310 828292 828271 827068 
828463 828332 828537 828338 828139 828441 828369 828610 828529 828541 828478 
828505 828597
827061 was not blocking any bugs.
Added blocking bug(s) of 827061: 812166
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
827061: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827061
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Re: Bug#833595: jessie-pu: package nullmailer/1.13-1+deb8u1

2016-08-28 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #833595 [release.debian.org] jessie-pu: package nullmailer/1.13-1+deb8u1
Added tag(s) confirmed.

-- 
833595: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=833595
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



NEW changes in stable-new

2016-08-28 Thread Debian FTP Masters
Processing changes file: flex_2.5.39-8+deb8u1_amd64.changes
  ACCEPT
Processing changes file: flex_2.5.39-8+deb8u1_arm64.changes
  ACCEPT
Processing changes file: flex_2.5.39-8+deb8u1_armel.changes
  ACCEPT
Processing changes file: flex_2.5.39-8+deb8u1_armhf.changes
  ACCEPT
Processing changes file: flex_2.5.39-8+deb8u1_i386.changes
  ACCEPT
Processing changes file: flex_2.5.39-8+deb8u1_mips.changes
  ACCEPT
Processing changes file: flex_2.5.39-8+deb8u1_mipsel.changes
  ACCEPT
Processing changes file: flex_2.5.39-8+deb8u1_powerpc.changes
  ACCEPT
Processing changes file: flex_2.5.39-8+deb8u1_ppc64el.changes
  ACCEPT
Processing changes file: flex_2.5.39-8+deb8u1_s390x.changes
  ACCEPT
Processing changes file: gnupg_1.4.18-7+deb8u2_allonly.changes
  ACCEPT
Processing changes file: gnupg_1.4.18-7+deb8u2_amd64.changes
  ACCEPT
Processing changes file: gnupg_1.4.18-7+deb8u2_arm64.changes
  ACCEPT
Processing changes file: gnupg_1.4.18-7+deb8u2_armel.changes
  ACCEPT
Processing changes file: gnupg_1.4.18-7+deb8u2_armhf.changes
  ACCEPT
Processing changes file: gnupg_1.4.18-7+deb8u2_i386.changes
  ACCEPT
Processing changes file: gnupg_1.4.18-7+deb8u2_mips.changes
  ACCEPT
Processing changes file: gnupg_1.4.18-7+deb8u2_mipsel.changes
  ACCEPT
Processing changes file: gnupg_1.4.18-7+deb8u2_powerpc.changes
  ACCEPT
Processing changes file: gnupg_1.4.18-7+deb8u2_ppc64el.changes
  ACCEPT
Processing changes file: gnupg_1.4.18-7+deb8u2_s390x.changes
  ACCEPT
Processing changes file: imagemagick_6.8.9.9-5+deb8u4_amd64.changes
  ACCEPT
Processing changes file: imagemagick_6.8.9.9-5+deb8u4_arm64.changes
  ACCEPT
Processing changes file: imagemagick_6.8.9.9-5+deb8u4_armel.changes
  ACCEPT
Processing changes file: imagemagick_6.8.9.9-5+deb8u4_armhf.changes
  ACCEPT
Processing changes file: imagemagick_6.8.9.9-5+deb8u4_i386.changes
  ACCEPT
Processing changes file: imagemagick_6.8.9.9-5+deb8u4_mips.changes
  ACCEPT
Processing changes file: imagemagick_6.8.9.9-5+deb8u4_mipsel.changes
  ACCEPT
Processing changes file: imagemagick_6.8.9.9-5+deb8u4_powerpc.changes
  ACCEPT
Processing changes file: imagemagick_6.8.9.9-5+deb8u4_ppc64el.changes
  ACCEPT
Processing changes file: imagemagick_6.8.9.9-5+deb8u4_s390x.changes
  ACCEPT
Processing changes file: libgcrypt20_1.6.3-2+deb8u2_allonly.changes
  ACCEPT
Processing changes file: libgcrypt20_1.6.3-2+deb8u2_amd64.changes
  ACCEPT
Processing changes file: libgcrypt20_1.6.3-2+deb8u2_arm64.changes
  ACCEPT
Processing changes file: libgcrypt20_1.6.3-2+deb8u2_armel.changes
  ACCEPT
Processing changes file: libgcrypt20_1.6.3-2+deb8u2_armhf.changes
  ACCEPT
Processing changes file: libgcrypt20_1.6.3-2+deb8u2_i386.changes
  ACCEPT
Processing changes file: libgcrypt20_1.6.3-2+deb8u2_mips.changes
  ACCEPT
Processing changes file: libgcrypt20_1.6.3-2+deb8u2_mipsel.changes
  ACCEPT
Processing changes file: libgcrypt20_1.6.3-2+deb8u2_powerpc.changes
  ACCEPT
Processing changes file: libgcrypt20_1.6.3-2+deb8u2_ppc64el.changes
  ACCEPT
Processing changes file: libgcrypt20_1.6.3-2+deb8u2_s390x.changes
  ACCEPT
Processing changes file: mupdf_1.5-1+deb8u1_allonly.changes
  ACCEPT
Processing changes file: mupdf_1.5-1+deb8u1_amd64.changes
  ACCEPT
Processing changes file: mupdf_1.5-1+deb8u1_arm64.changes
  ACCEPT
Processing changes file: mupdf_1.5-1+deb8u1_armel.changes
  ACCEPT
Processing changes file: mupdf_1.5-1+deb8u1_armhf.changes
  ACCEPT
Processing changes file: mupdf_1.5-1+deb8u1_i386.changes
  ACCEPT
Processing changes file: mupdf_1.5-1+deb8u1_mips.changes
  ACCEPT
Processing changes file: mupdf_1.5-1+deb8u1_mipsel.changes
  ACCEPT
Processing changes file: mupdf_1.5-1+deb8u1_powerpc.changes
  ACCEPT
Processing changes file: mupdf_1.5-1+deb8u1_ppc64el.changes
  ACCEPT
Processing changes file: mupdf_1.5-1+deb8u1_s390x.changes
  ACCEPT
Processing changes file: quagga_0.99.23.1-1+deb8u2_amd64.changes
  ACCEPT
Processing changes file: quagga_0.99.23.1-1+deb8u2_arm64.changes
  ACCEPT
Processing changes file: quagga_0.99.23.1-1+deb8u2_armel.changes
  ACCEPT
Processing changes file: quagga_0.99.23.1-1+deb8u2_armhf.changes
  ACCEPT
Processing changes file: quagga_0.99.23.1-1+deb8u2_i386.changes
  ACCEPT
Processing changes file: quagga_0.99.23.1-1+deb8u2_mips.changes
  ACCEPT
Processing changes file: quagga_0.99.23.1-1+deb8u2_mipsel.changes
  ACCEPT
Processing changes file: quagga_0.99.23.1-1+deb8u2_powerpc.changes
  ACCEPT
Processing changes file: quagga_0.99.23.1-1+deb8u2_ppc64el.changes
  ACCEPT
Processing changes file: quagga_0.99.23.1-1+deb8u2_s390x.changes
  ACCEPT
Processing changes file: rails_4.1.8-1+deb8u3_amd64.changes
  ACCEPT
Processing changes file: rails_4.1.8-1+deb8u4_amd64.changes
  ACCEPT



NEW changes in stable-new

2016-08-28 Thread Debian FTP Masters
Processing changes file: chromium-browser_52.0.2743.116-1~deb8u1_i386.changes
  ACCEPT
Processing changes file: chromium-browser_52.0.2743.116-1~deb8u1_amd64.changes
  ACCEPT



Processed: block 827061 with 835785, block 827061 with 835786, block 827061 with 835785 ...

2016-08-28 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> block 827061 with 835785
Bug #827061 [release.debian.org] transition: openssl
827061 was blocked by: 828575 828588 835793 828354 828533 828498 828330 828454 
828399 828379 828328 828362 828591 828580 828569 809271 828310 828443 828325 
828435 828412 828329 828403 828499 828142 828239 828273 828257 828471 828334 
828548 828598 828439 828452 828282 828263 828581 828306 828579 828340 828289 
828460 828254 828556 828515 828349 828557 828507 829465 828275 828264 828305 
828272 828488 828401 828565 828521 828323 828309 828497 808669 828228 828356 
828279 828231 828425 828277 828302 828464 828285 828409 828459 828280 828503 
828291 828389 828576 828363 814600 828364 828597 828584 828437 828295 828420 
828600 828351 828332 828392 828308 828604 828534 828387 828544 828343 828506 
828442 828258 828352 828547 828292 828270 828287 828269 828312 828262 828415 
828256 828259 828396 828450 828241 828551 828456 828290 828327 828500 828463 
828586 828493 828508 828321 828395 828612 828520 828470 828517 828445 828532 
828377 828610 828322 828438 828230 828514 828299 828357 828446 828398 828378 
828344 828235 828453 828384 828589 828345 828318 828304 828469 828319 828430 
828407 828554 828447 828455 828350 828242 828567 828574 828484 828582 828303 
828405 828410 828618 828390 828426 828358 828307 828561 828083 828367 828320 
828391 828475 828480 828393 828485 828492 828266 828284 828288 828531 828602 
828402 828314 828566 828542 828570 828346 828419 828283 828540 828509 828400 
828495 828326 828491 828365 828316 828243 828432 828528 828265 828595 828549 
828479 828568 835794 828238 828513 828562 828608 828611 828301 828601 828434 
828411 828504 828609 828523 828465 828535 828333 828449 828229 828274 828267 
828552 828550 828338 828616 828585 828505 828297 828599 828413 828543 828286 
828501 828461 828558 828376 828382 828236 828424 828139 835549 828486 828603 
828232 828502 828416 828404 828240 828571 828614 828487 822380 828394 828546 
828380 828512 828573 828605 828418 828408 828368 828510 828594 828451 828423 
828294 828406 828428 828572 828331 828250 828458 828494 828244 828578 828481 
828315 828271 828383 828335 828440 828375 828467 828466 828278 828462 828489 
828457 828560 828336 828490 828473 828082 828421 828545 828553 828317 828337 
828369 828613 828448 828529 828577 828237 828429 828374 828519 828537 828433 
828620 827068 828324 828431 835585 828615 828311 828593 828474 828596 828525 
828247 828482 828233 828536 828559 828606 828478 828427 828234 828590 828253 
828353 828370 828373 828518 828359 828246 828468 828261 828296 828441 828341 
828385 828511 828127 828381 828524 828366 828255 828360 828619 828251 828371 
828300 828388 828607 828422 828313 828527 828339 828252 828538 828436 828249 
828522 828276 828583 828472 828539 828342 828526 828281 829452 828260 828516 
828248 828530 828417 828372 828617 828541 828444 828555 828564 828293 828587 
828563 828361 828496 828414 828397 828355 828386 828298 828347 828592 828268 
827076 828483 828477
827061 was not blocking any bugs.
Added blocking bug(s) of 827061: 835785
> block 827061 with 835786
Bug #827061 [release.debian.org] transition: openssl
827061 was blocked by: 828595 828241 828472 828384 828357 828558 828473 828455 
828399 828331 828573 828236 828356 828385 828585 828554 828240 828549 828438 
828329 828342 828082 828564 828581 828418 828481 828327 828521 828513 828265 
828587 828539 828586 828479 828556 828242 828619 828392 828247 828288 828536 
828228 809271 828532 828443 828446 828264 828435 828339 828579 828278 828576 
828377 828289 828609 828523 828311 828315 828274 828528 828275 828469 828487 
828319 828442 835785 835794 828571 828555 828456 828577 828496 828252 828512 
828574 828466 828525 828593 828590 828251 828452 828462 828480 828534 828488 
827076 828563 828262 828570 828142 828459 828495 828389 828254 828322 828501 
828304 828489 828283 828409 828439 828346 828347 828575 828354 828256 828391 
828230 828316 828259 828270 828313 828383 828276 828249 828504 828361 828415 
828500 828482 828561 828308 828353 828602 828277 828538 828428 828611 828533 
828447 828232 814600 828454 828582 828484 828516 828592 828244 828448 828474 
828569 828268 828300 828432 828365 828520 828398 828305 828457 828298 828294 
828295 828591 828508 828620 828302 828614 828416 828405 828345 828458 828465 
828127 828292 828517 828375 828310 828374 828522 828463 827068 828271 828441 
828369 828139 828338 828332 828537 828505 828597 828478 828541 828529 828610 
828599 828336 835793 828583 828401 828407 828376 828559 828423 828468 828429 
828419 828506 828518 828550 828618 828343 828524 828387 828237 828260 828545 
828572 828238 828553 822380 828307 828397 828382 828560 828297 828422 828494 
828436 828326 828266 828257 828263 828613 828390 828450 828333 828255 808669 
828511 828601 828360 828417 828280 828279 828433 828608 828341 828449 828371 
828557 828605 828400 828542 828497 828335 828286 828540 828261 828437 828386 
828606 

Processed: forcibly merging 835789 828476

2016-08-28 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> forcemerge 835789 828476
Bug #835789 [src:open-vm-tools] open-vm-tools: FTBFS with openssl 1.1.0
Bug #835789 [src:open-vm-tools] open-vm-tools: FTBFS with openssl 1.1.0
The source open-vm-tools and version 10.0.7-3227872-2 do not appear to match 
any binary packages
Marked as found in versions open-vm-tools/10.0.7-3227872-2.
Added tag(s) upstream.
Bug #828476 [src:open-vm-tools] open-vm-tools: FTBFS with openssl 1.1.0
Unset Bug forwarded-to-address
827061 was blocked by: 828472 828271 828250 828441 828263 828329 828360 828458 
828511 828450 828566 828352 828543 828557 828433 828338 828378 828302 828509 
828469 828427 828555 828388 828261 828401 828326 828384 828291 828498 828341 
828248 828262 828249 828569 828582 828476 828403 828232 828571 828553 828435 
828577 828583 828411 828547 828608 828415 828299 828589 828332 828603 828397 
828497 828474 828319 828327 828400 828447 828396 828538 828586 828301 828243 
828434 828309 828542 828421 828585 828617 828437 828612 828404 828524 828277 
828534 828578 828307 828082 828300 828230 828570 828399 828494 828083 828522 
828533 828508 828491 828615 828252 828345 828529 828606 828517 828593 828536 
828484 828485 828315 828254 828428 828324 828521 828560 828349 828574 828581 
828449 828267 828279 828490 828244 828424 828379 808669 828142 828561 828519 
828607 835549 828425 828392 828613 828616 828350 828313 828312 828518 829452 
828369 828541 828499 828426 828546 828367 828462 828336 828444 828495 828361 
828545 828139 828446 828253 828453 828272 828610 828492 828358 828417 828363 
828311 828549 828334 828516 828456 828528 828330 828395 828409 828364 828293 
828289 828559 828238 835793 828505 828454 828372 828276 828514 828237 828600 
828422 828294 828283 828530 828270 828339 828459 828493 828259 828298 828592 
835585 828304 828604 828442 828390 828371 828440 828127 828501 828420 828290 
828273 828598 828282 828286 828333 828376 828255 828448 814600 828258 828471 
828295 828328 828335 828584 828393 828445 828500 828609 828482 828306 828470 
828475 828266 827076 828340 828594 828314 828488 828234 828353 828436 828405 
828410 828354 828548 828383 828391 828443 828506 828544 828288 828274 828416 
828551 828278 828478 828618 828537 828572 828292 828268 828597 828515 828269 
828414 828231 828503 828318 828365 828385 828439 828381 828535 828575 828568 
828359 828457 828380 828308 828297 828377 828523 829465 828486 828305 828387 
828356 828240 828323 828531 827068 828357 828467 828375 828596 828320 828303 
828465 828331 828532 828602 828407 828418 828316 828483 828346 828507 828438 
828580 828235 828412 828382 828512 828429 828419 828614 828477 828496 828374 
828285 828564 828605 828337 828539 828368 828520 828558 828242 828373 828620 
828394 828281 828540 828431 828554 828601 828325 828406 828322 828513 828619 
828351 828587 828565 828481 828229 828251 828550 828567 828527 828228 828408 
828366 828430 828260 828480 828525 828573 828236 828576 828343 828296 828239 
828310 828487 828504 828463 828389 822380 828287 828344 828599 828473 828595 
828563 828413 828342 828452 828257 835794 828265 828347 828264 828588 828284 
828489 828466 828556 828502 828355 828460 828233 828241 828256 828246 828432 
828562 828370 828451 828317 828455 828468 828247 828579 828275 828611 828479 
828464 828423 828398 809271 828590 828552 828321 828386 828362 828510 828402 
828591 828461 828526 828280
827061 was not blocking any bugs.
Removed blocking bug(s) of 827061: 828476
The source open-vm-tools and version 10.0.7-3227872-2 do not appear to match 
any binary packages
Marked as found in versions open-vm-tools/2:10.0.7-3227872-4.1.
Merged 828476 835789
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
827061: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827061
828476: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=828476
835789: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=835789
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: python3.5: FTBFS with openssl 1.1.2

2016-08-28 Thread Debian Bug Tracking System
Processing control commands:

> block 827061 by -1
Bug #827061 [release.debian.org] transition: openssl
827061 was blocked by: 828438 828607 828239 828139 828498 828249 828478 828298 
828577 828321 828395 828297 828344 828419 828260 828347 828266 828362 828319 
828296 828540 828497 828341 828580 828230 828323 828609 828571 828302 828433 
828461 828544 828127 828528 828553 828317 828482 828510 828549 828608 828533 
828327 828471 828582 828425 828499 828522 827068 828278 828316 828518 828592 
828280 828232 828304 828591 828349 828494 828476 828511 828483 828556 828519 
828281 828550 828325 828376 828435 828350 828248 828258 828422 828370 828313 
828404 828386 828504 828257 828501 828472 828614 828601 828352 828573 828241 
828293 828428 828254 828262 828282 828380 828588 828458 828441 828356 828410 
828231 828235 828589 828381 828446 828309 828468 828291 828485 829452 828452 
828615 828531 828335 828424 828256 835585 828590 828488 828558 828427 828415 
828456 828259 828545 828581 828392 828552 828397 828532 828554 828462 828252 
828469 828264 828529 828564 828277 828261 828283 828534 828384 828429 828611 
828263 828331 828593 828599 828391 828579 828491 828617 828492 828442 828379 
828289 828242 828450 828536 828402 828294 828561 828439 828603 828353 828426 
828407 828377 828279 828537 828503 828602 828417 828431 828284 828390 828272 
828310 828354 828542 828509 828477 828411 828436 828333 828299 808669 828440 
828423 828311 828244 828566 828451 828359 828393 828343 828300 828367 828538 
828285 828598 828523 828437 828506 828578 828358 828547 828416 828336 828443 
828340 828394 828378 828524 828339 828475 828338 828457 828082 828355 828447 
828233 814600 828527 829465 828396 828575 828371 828583 828328 828301 828507 
828366 828555 828515 828271 828236 828520 828409 828546 828314 828326 828421 
822380 828346 828505 828372 828444 828361 828406 828276 828470 828312 828083 
828357 828303 828517 828495 828514 828539 828493 828273 828612 828267 828474 
828434 828292 828596 835793 828412 828548 828535 828329 828574 828512 828368 
828570 828330 828453 828595 828445 828243 828513 828275 828473 828403 828496 
828399 828572 828388 828307 828234 828584 828238 828560 828585 828619 828594 
828324 828605 828467 828489 828586 828465 828142 828286 828365 828484 828449 
828342 828374 828240 828559 828414 828543 828567 828460 828387 828351 828389 
828500 828250 828587 828480 828432 828618 828455 828382 828400 828454 828530 
828320 828463 828413 828265 828610 828576 828525 809271 828606 828448 828521 
828255 828604 828237 828373 828229 828508 828385 828363 828502 828360 828269 
828600 828253 828557 828306 828318 828337 828481 828332 828334 828287 828398 
828305 828369 828565 828420 828418 828274 828568 828490 828375 835549 828597 
828613 828569 827076 828466 828563 828487 828308 828541 828551 828228 828383 
828290 828408 828270 828251 828430 828562 828405 828464 828479 828268 828620 
828247 828486 828295 828401 828246 828459 828526 828616 828516 828322 828345 
828364 828315 828288
827061 was not blocking any bugs.
Added blocking bug(s) of 827061: 835794
> forwarded -1 https://bugs.python.org/issue26470
Bug #835794 [src:python3.5] python3.5: FTBFS with openssl 1.1.2
Set Bug forwarded-to-address to 'https://bugs.python.org/issue26470'.

-- 
827061: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827061
835794: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=835794
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: python2.7: FTBFS with openssl 1.1.2

2016-08-28 Thread Debian Bug Tracking System
Processing control commands:

> block 827061 by -1
Bug #827061 [release.debian.org] transition: openssl
827061 was blocked by: 828489 828408 828266 828606 828378 828339 828467 828358 
828304 828554 828539 828345 828514 828455 828483 828571 828505 828453 828302 
828462 828523 828562 828384 828414 828310 828400 828351 828355 828458 828496 
828568 828585 828480 828256 828363 828518 828593 828586 828427 828545 828235 
828083 828291 828543 829452 828443 828487 828376 828494 828301 828416 828263 
828353 828297 828307 828520 828261 828372 828466 828232 828234 828484 828274 
828241 828360 828541 828417 828242 828366 828534 828391 828609 828573 828336 
828528 828394 828548 828599 828602 828512 828547 828413 828529 828388 828502 
828446 828397 828579 828231 828603 828392 828526 828432 828410 828500 828469 
828267 828324 828436 828287 828525 828399 828619 835585 828334 828315 828247 
828273 828382 828330 828337 828507 828527 828440 828418 828569 828319 828127 
828401 828565 828460 828610 828450 828442 828252 828445 828581 835549 828608 
828485 828463 828282 828323 828312 828238 828352 828421 828367 827068 827076 
828468 828430 828244 828594 828380 828420 828320 828395 828277 828570 828292 
828326 828544 828578 828598 828305 828313 828439 828553 828349 828429 828269 
828285 828470 828441 828438 828434 828329 828542 828584 828560 828456 828389 
828428 828314 828259 828344 828281 828371 828311 828531 828551 828298 828567 
828308 828549 828559 828616 828617 828449 828492 828493 828318 828532 828341 
828522 828510 828280 828596 828249 828587 828478 828479 828243 828566 828322 
828452 828237 828461 828504 828615 828373 828328 828335 828558 828497 828286 
828402 828253 828257 828364 828448 828503 828499 828491 828422 828139 828486 
828284 828481 828300 828412 828519 828233 828576 828406 828289 828385 828239 
828535 828508 828343 828583 828393 828605 828488 828375 828473 828359 828597 
828299 828379 828557 828278 829465 828614 828447 828374 828362 828563 828572 
828251 828272 828309 828368 828533 828276 828459 828230 828258 828357 828509 
828370 828431 828369 828270 828538 828482 828537 828612 828517 828424 828515 
828271 828236 828354 828490 828601 828411 828260 828419 828435 828574 828620 
828377 828347 828471 822380 828511 828316 828288 828577 828240 828521 828342 
828346 828250 828506 828279 828387 828457 828293 828495 828327 828464 828275 
828333 828296 828437 828365 828524 828340 828386 828295 828409 828513 828600 
809271 828561 828398 828556 828590 828361 828404 828501 828595 828582 828472 
828405 828423 828465 828580 828294 828415 828575 814600 828338 808669 828611 
828540 828082 828142 828546 828332 828592 828283 828454 828317 828451 828426 
828552 828265 828290 828396 828303 828331 828591 828433 828248 828228 828325 
828618 828516 828588 828321 828444 828476 828350 828381 828255 828536 828390 
828264 828229 828555 828407 828356 828306 828474 828262 828425 828246 828477 
828530 828589 828268 828613 828498 828383 828475 828564 828604 828403 828550 
828254 828607
827061 was not blocking any bugs.
Added blocking bug(s) of 827061: 835793
> forwarded -1 https://bugs.python.org/issue26470
Bug #835793 [src:python2.7] python2.7: FTBFS with openssl 1.1.2
Set Bug forwarded-to-address to 'https://bugs.python.org/issue26470'.

-- 
827061: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827061
835793: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=835793
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#835784: nmu: mpv_0.20.0-1

2016-08-28 Thread Sebastian Ramacher
On 2016-08-28 11:47:32, James Cowgill wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: binnmu
> 
> Hi,
> 
> As I wrote in #835645, some of the ffmpeg symbols in 7:3.1.2-1 do not
> generate tight enough dependencies and if mpv is used with an old version
> of ffmpeg, it segfaults.
> 
> This is fixed in ffmpeg 3.1.3-1 so please binNMU mpv against that version.
> 
> nmu mpv_0.20.0-1 . ANY . unstable . -m "Rebuild against ffmpeg 3.1.3-1 for 
> correct dependencies"
> dw mpv_0.20.0-1 . ANY . unstable . -m 'libavformat57 (>= 7:3.1.3-1)'

mpd is also affected by this issues. So, please also run:

nmu mpd_0.19.18-1 . ANY . unstable . -m "Rebuild against ffmpeg 3.1.3-1 for 
correct dependencies"
dw mpd_0.19.18-1 . ANY . unstable . -m 'libavformat57 (>= 7:3.1.3-1)'

Cheers
-- 
Sebastian Ramacher


signature.asc
Description: PGP signature


Bug#835784: nmu: mpv_0.20.0-1

2016-08-28 Thread James Cowgill
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu

Hi,

As I wrote in #835645, some of the ffmpeg symbols in 7:3.1.2-1 do not
generate tight enough dependencies and if mpv is used with an old version
of ffmpeg, it segfaults.

This is fixed in ffmpeg 3.1.3-1 so please binNMU mpv against that version.

nmu mpv_0.20.0-1 . ANY . unstable . -m "Rebuild against ffmpeg 3.1.3-1 for 
correct dependencies"
dw mpv_0.20.0-1 . ANY . unstable . -m 'libavformat57 (>= 7:3.1.3-1)'

Thanks,
James

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.6.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)



signature.asc
Description: OpenPGP digital signature