Your message dated Mon, 13 Oct 2025 12:34:22 +0000
with message-id <[email protected]>
and subject line Bug#1071640: fixed in mitmproxy 8.1.1-4
has caused the Debian Bug report #1071640,
regarding mitmproxy: Error prevents the program to starts
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1071640: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071640
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: mitmproxy
Version: 8.1.1-2
Severity: important
X-Debbugs-Cc: [email protected]
Dear Maintainer,
starting the program leads to an unrecoverable error, a backtrace is printed on
the console and the error is:
"ModuleNotFoundError: No module named 'blinker._saferef'"
than the process ends and we get back to the shell.
Bye!
C.
-- System Information:
Debian Release: trixie/sid
APT prefers testing
APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 6.7.12-amd64 (SMP w/24 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages mitmproxy depends on:
ii dpkg 1.22.6
ii fonts-font-awesome 5.0.10+really4.7.0~dfsg-4.1
ii python3 3.11.8-1
ii python3-asgiref 3.8.1-1
ii python3-blinker 1.8.2-1
ii python3-brotli 1.1.0-2+b3
ii python3-certifi 2023.11.17-1
ii python3-cryptography 42.0.5-2
ii python3-flask 3.0.3-1
ii python3-h11 0.14.0-1
ii python3-h2 4.1.0-4
ii python3-hyperframe 6.0.0-1
ii python3-kaitaistruct 0.10-1
ii python3-ldap3 2.9.1-2
ii python3-msgpack 1.0.3-3+b1
ii python3-openssl 24.1.0-1
ii python3-passlib 1.7.4-4
ii python3-pkg-resources 68.1.2-2
ii python3-protobuf 3.21.12-8.2
ii python3-publicsuffix2 2.20191221-3
ii python3-pyparsing 3.1.2-1
ii python3-pyperclip 1.8.2-2
ii python3-ruamel.yaml 0.18.6+ds-3
ii python3-sortedcontainers 2.4.0-2
ii python3-tornado 6.4.0-1
ii python3-urwid 2.6.10-1
ii python3-wsproto 1.2.0-1
ii python3-zstandard 0.22.0-1+b1
mitmproxy recommends no packages.
mitmproxy suggests no packages.
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: mitmproxy
Source-Version: 8.1.1-4
Done: Gianfranco Costamagna <[email protected]>
We believe that the bug you reported is fixed in the latest version of
mitmproxy, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Gianfranco Costamagna <[email protected]> (supplier of updated mitmproxy
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 13 Oct 2025 14:09:20 +0200
Source: mitmproxy
Built-For-Profiles: noudeb
Architecture: source
Version: 8.1.1-4
Distribution: unstable
Urgency: medium
Maintainer: Debian Python Team <[email protected]>
Changed-By: Gianfranco Costamagna <[email protected]>
Closes: 1071640 1103701 1110243
Changes:
mitmproxy (8.1.1-4) unstable; urgency=medium
.
[ Emmanuel Arias ]
* Team upload.
* d/patches/0008-Stop-using-blinker._saferef.patch: Add patch to stop
using blinker._saferef module (Closes: #1071640, #1110243).
* Fix CVE-2025-23217: mitmweb's API now requires an authentication
token by default. While the client cannot access the API directly,
they can access the API through the proxy. An attacker may be able to
escalate this SSRF-style access to remote code execution (Closes:
#1103701).
Checksums-Sha1:
6615b934ddd7762fd1884bf6d576025c948db999 2974 mitmproxy_8.1.1-4.dsc
6bd081352ea4b784e3fdcd019e23e86ee3b3aa0a 15776 mitmproxy_8.1.1-4.debian.tar.xz
fc676697d406366da06140e150218a372714b80b 8084
mitmproxy_8.1.1-4_source.buildinfo
Checksums-Sha256:
3ce0cafe373eb01379d7d643a46786c73fbc142c044579d45725ce576a189cdc 2974
mitmproxy_8.1.1-4.dsc
b382a7a42e9bf0fddae1b9861c17562ac488d49804385165b8fdff607ae85b46 15776
mitmproxy_8.1.1-4.debian.tar.xz
2c7cf559019182483adf7cde8c398c2146f42ed6f6fc3653bc7cc199d4927601 8084
mitmproxy_8.1.1-4_source.buildinfo
Files:
0755cf106d2a86f8b4b850f7ef3c080d 2974 net optional mitmproxy_8.1.1-4.dsc
8ffdf249c4aaf2d3f159f3a96da46eb5 15776 net optional
mitmproxy_8.1.1-4.debian.tar.xz
40c72df30c1e5a4dc2530f3055f8a494 8084 net optional
mitmproxy_8.1.1-4_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=Im32
-----END PGP SIGNATURE-----
pgptyuskJjl1t.pgp
Description: PGP signature
--- End Message ---