Control: fixed -1 3.0.3-1
This has been fixed in 3.0.3
Author: Bernhard Schmidt
Date: Thu Feb 18 12:54:29 2016 +0100
Put postfix daemons into upstream-default /usr/libexec/postfix
Closes: #815047
diff --git a/debian/patches/06_debian_paths.diff b/debian/patches/06_debian_paths.diff
index eb79317..3ecf574 100644
--- a/debian/patches
Am 18.02.2016 um 13:51 schrieb Marco d'Itri:
> On Feb 18, Bernhard Schmidt wrote:
>
>> The following patch fixes the issue on my test system. The patch is
> This is not a valid fix because Debian does not use libexec. Ever.
You're absolutely right, thanks for pointing t
On Wed, May 13, 2015 at 12:54:33PM +0200, Jan Gerber wrote:
Dear Laurent,
> Several new upstream versions have been released since 0.2.4
> would be nice to see an update to the current release 0.2.7.
> http://freedesktop.org/software/farstream/releases/farstream/
I see you have prepared 0.2.7 at
On Wed, Mar 16, 2016 at 10:28:10AM +0100, g...@leonde.de wrote:
> As soon as I do any interaction with plasma, xorg starts consuming 100% cpu.
Same here. Sometimes it dies at the login prompt of SDDM, sometimes
shortly after. Xorg uses 100% CPU.
Happens on my desktop (Intel Skylake) and my lapto
Hi,
these seem to be related.
https://www.reddit.com/r/archlinux/comments/4a55fc/note_intel_users_dont_install_lastest_xorg_1182/
https://bugs.freedesktop.org/show_bug.cgi?id=94515
https://bugzilla.redhat.com/show_bug.cgi?id=1317153
Best Regards,
Bernhard
Package: src:linux
Version: 3.16.7-ckt20-1+deb8u3
Severity: normal
Hi,
short history on this:
We run a pretty large VMware infrastructure. In November 2014 we migrated the
hardware the cluster runs on
Old: HP BL490c Gen6, Flex10 something, BCM57711E
New: HP BL460c Gen8, HP FlexFabric 630FLB, B
The issue affects SLES11SP4 (3.0.101-68-default) and SLES12SP1
(3.12.53-60.30-default) as well. Both have backported vmxnet3 1.4.2.0-k
in their kernel package.
It does _not_ affect the official vmxnet3 module from the VMware tools,
also calling itself version 1.4.2.0. So there seems to be a differ
Package: pepperflashplugin-nonfree
Version: 1.8.2
Severity: normal
Dear Maintainer,
on today's upgrade the embedded wget call failed, most likely due to
https://lists.debian.org/debian-infrastructure-announce/2015/12/msg0.html
The following error message scrolls by, but is easily missed with
Package: systemd
Version: 215-7
Followup-For: Bug #751638
Control: affects -1 puppet
Vincent Bernat:
> I am also annoyed by this bug because this makes Puppet thinks that the
> service is not enabled as it should. Did you get a chance to have a
> better look at the problem?
Same here, marking p
Package: alpine
Followup-For: Bug #405762
Hi,
just to add to this bug, the original patch location 404s now. Current
patches from the same author are available at
http://patches.freeiz.com/alpine/info/maildir.html
There is still nothing about the licence on that page or in the patch,
On Fri, May 26, 2017 at 06:58:03PM +0200, Julien Cristau wrote:
> +rdisc6 maintainer
>
> > IMO we should change d-i/netcfg to just never install rdnssd. I guess
> > that might negatively impact systems on ipv6-only networks that don't
> > have any other means to pick up name servers, but that see
Package: src:ntp
Version: 1:4.2.8p10+dfsg-3+exp2
Severity: important
sntp tries to write a KoD db file to the path /var/db/ntp-kod defined by
upstream. This path does not exist (and must not exist on Debian, because
it does not match policy).
$ sntp ntp1.lrz.de
sntp 4.2.8p10@1.3728-o (1)
kod_init
Control: tags -1 + confirmed pending experimental
On 01.06.2017 06:07, 積丹尼 Dan Jacobson wrote:
> Package: ntp
> Version: 1:4.2.8p10+dfsg-3+exp2
> Severity: important
> File: /usr/lib/ntp/ntp-systemd-wrapper
>
> Because $PIDFILE is never set, you end up writing the PIDFILE to a file
> called "/-g
Package: src:pjproject
Version: 2.5.5~dfsg-5
Severity: critical
Tags: security patch
The following security advisory has been announced by the Asterisk project
for the third party pjproject library. A patch is available.
Asterisk Project Security Advisory - AST-2017-002
Package: src:pjproject
Version: 2.5.5~dfsg-5
Severity: critical
Tags: security patch
The following security advisory was published by the Asterisk project for
the pjproject third party library. A patch is available.
Asterisk Project Security Advisory - AST-2017-003
Prod
Package: src:asterisk
Version: 1:13.0.0~dfsg-1
Severity: critical
Tags: security
Asterisk Project Security Advisory - AST-2017-004
Product Asterisk
Summary Memory exhaustion on short SCCP packets
On 08.08.2017 22:19, Adam D. Barratt wrote:
Hi Adam,
> Control: tags -1 + moreinfo
>
> On Tue, 2017-07-18 at 12:07 +0200, Bernhard Schmidt wrote:
>> I'm looking for an indication whether something like this would be acceptable
>> for a stable release. If it might be ac
.10.3.dfsg.P4/debian/changelog 2017-07-21 22:28:32.0 +0200
+++ bind9-9.10.3.dfsg.P4/debian/changelog 2017-08-11 19:10:07.0 +0200
@@ -1,3 +1,10 @@
+bind9 (1:9.10.3.dfsg.P4-12.6) unstable; urgency=medium
+
+ * Non-maintainer upload.
+ * Import upcoming DNSSEC KSK-2017 from 9.10.5 (Clo
Control: tags -1 + moreinfo
On Thu, Aug 24, 2017 at 09:38:55AM +0300, Esa Peuha wrote:
Hi Esa,
> I have an installation of Debian testing with ntp installed on it. With
> ntp version 1:4.2.8p10+dfsg-3 and earlier, ntpd was started during boot,
> but with 1:4.2.8p10+dfsg-4 and -5, ntpd isn't star
On 24.08.2017 10:31, Bernhard Schmidt wrote:
>> I have an installation of Debian testing with ntp installed on it. With
>> ntp version 1:4.2.8p10+dfsg-3 and earlier, ntpd was started during boot,
>> but with 1:4.2.8p10+dfsg-4 and -5, ntpd isn't started (which BTW is far
&g
On Thu, Oct 15, 2015 at 10:11:07AM +, Mike Gabriel wrote:
> We just found an issue with amavisd-status and amavis-service executables
> missing ZMQ::LibZMQ3.
>
> """
> >root@office:/etc/amavis/conf.d# amavisd-status
> >Perl modules ZMQ::LibZMQ3 or ZMQ::LibZMQ2 or ZeroMQ not available
> >BEGIN
Am 20.06.2017 um 03:33 schrieb Vincent Lefevre:
> On 2017-06-19 23:55:04 +0200, Bernhard Schmidt wrote:
>> Marking as wontfix since this is not going to be changed in stable
>> releases.
>
> Most bugs are in that case, so "wontfix" is improper. What matters
> is
Control: forcemerge -1 863873
Control: found 863873 1:4.2.8p10+dfsg-4
Am 20.06.2017 um 11:12 schrieb Laurent Bonnaud:
Hi,
> here is the problem:
>
> # sntp pool.ntp.org
> sntp 4.2.8p10@1.3728-o (1)
> kod_init_kod_db(): Cannot open KoD db file /var/db/ntp-kod: No such file or
> directory
> 2017
On Thu, Jun 22, 2017 at 07:24:14PM +0200, Alberto Gonzalez Iniesta wrote:
Hi,
> Due to lack of time I request an adopter for the openvpn package.
I'd be willing to co-maintain, but definitely not do it alone.
Alberto, thanks a lot for the maintenance this far. Really appreciated.
Bernhard
Hi,
> Package: ntp
> Version: 1:4.2.8p10+dfsg-5
> Severity: normal
>
> Dear Maintainer,
>
> Fail to upgrade or here start after a removal.
>
> Here is the apt-get output and then 'journalctl -xe' :
>
> Setting up ntp (1:4.2.8p10+dfsg-5) ...
> Created symlink /etc/systemd/system/multi-user.targ
On Wed, Jun 21, 2017 at 09:56:14PM +0200, Salvatore Bonaccorso wrote:
Hi,
> Source: openvpn
> Version: 2.3.4-1
> Severity: grave
> Tags: security upstream
>
> Hi,
>
> the following vulnerabilities were published for openvpn.
In light of the recent RFA bug on OpenVPN, has there any work been do
Control: retitle -1 ITA: openvpn -- virtual private network daemon
On Fri, Jun 23, 2017 at 07:21:26AM +0200, Jörg Frings-Fürst wrote:
> Alberto thanks for your work.
>
> Bernhard, I would also like to contribute as a co-maintainer.
Okay then. git repo is already on collab-maint, but seems to la
On Fri, Aug 25, 2017 at 09:20:47AM -0700, Troy Ready wrote:
Hi Troy,
> * Package name: openvpn-auth-script
> Version : 0.0.1
> Upstream Author : Caius Durling
> * URL : https://github.com/fac/auth-script-openvpn
> * License : Apache 2.0
> Programming Lang: C
Am 26.08.2017 um 13:18 schrieb Kurt Roeckx:
Hi Kurt,
> Source: openvpn
> Version: 2.4.3-4
> Severity: important
> Tags: patch
>
> Hi,
>
> The attached patch add supports for the new way of setting up the
> minimum and maximum supported TLS version in OpenSSL.
>
> This is marked as important be
On 28.08.2017 18:43, Kurt Roeckx wrote:
Hi,
>>> Source: openvpn
>>> Version: 2.4.3-4
>>> Severity: important
>>> Tags: patch
>>>
>>> Hi,
>>>
>>> The attached patch add supports for the new way of setting up the
>>> minimum and maximum supported TLS version in OpenSSL.
>>>
>>> This is marked as im
Source: asterisk
Version: 1:13.14.1~dfsg-2
Severity: important
Tags: upstream
chan_pjsip does not support TLSv1.1 and above.
See upstream bug
Package: src:asterisk
Severity: important
Tags: security
Asterisk Project Security Advisory - AST-2017-005
ProductAsterisk
SummaryMedia takeover in RTP stack
Nature of Adv
Package: src:asterisk
Severity: important
Tags: security
Asterisk Project Security Advisory - AST-2017-007
ProductAsterisk
SummaryRemote Crash Vulerability in res_pjsip
Nature of Adv
Package: src:asterisk
Severity: important
Tags: security
Asterisk Project Security Advisory - AST-2017-006
ProductAsterisk
SummaryShell access command injection in app_minivm
Nature of Adv
Control: blocks 828477 859555
On Sat, Jun 24, 2017 at 11:24:18AM +0200, Dr. Markus Waldeck wrote:
Hi,
> this defect will be fixed in OpenVPN 2.5.
>
> OpenVPN 2.5_git [git:master/0402c7faadf907d4] x86_64-pc-linux-gnu [SSL
> (OpenSSL)] [EPOLL] [MH/PKTINFO] [AEAD] built on Jun 23 2017
> library v
Am 29.06.2017 um 06:31 schrieb Dr. Markus Waldeck:
Hi Markus,
> this topic should have gone directly to you:
>
> OpenSSL 1.1 support in OpenVPN
>
>> has been fixed in 2.4.3, but switching over is
>> currently blocked by libpkcs11-helper1-dev depending on libssl1.0-dev
>> (presumably because of
Package: openvpn
Version: 2.4~rc1-1
Severity: important
Since 2.4~rc1-1 the OpenVPN binary package ships two additional systemd
units from upstream
/lib/systemd/system/openvpn-client@.service
/lib/systemd/system/openvpn-server@.service
in addition to the ones that are Debian specific
/lib/syste
Control: tags -1 + moreinfo
Control: forwarded -1 https://community.openvpn.net/openvpn/ticket/911
On 04.07.2017 09:52, Marc Haber wrote:
Hi Marc,
> On Mon, Jul 03, 2017 at 11:39:58PM +0200, Marc Haber wrote:
>> Jul 3 23:33:11 torres ovpn-server[5730]: /sbin/ip link set dev tun0 up mtu
>> 1278
Control: tags -1 + moreinfo
On 04.07.2017 23:21, Anton Ivanov wrote:
Hi,
> Package: ntp
> Version: 1:4.2.8p10+dfsg-3
> Severity: important
>
> Dear Maintainer,
>
> It is no longer possible to query the ntpd state. ntpdc fails to work.
Upstream says (man ntpdc)
DESCRIPTION
ntpdc is depre
On 09.09.2017 15:12, Julien Cristau wrote:
Hi,
>> +ntp (1:4.2.8p10+dfsg-3+deb9u1) stretch; urgency=medium
> Seems ok, feel free to upload.
Uploaded and accepted.
Bernhard
Control: fixed -1 1:9.10.3.dfsg.P4-12.3+deb9u3
Control: fixed -1 1:9.9.5.dfsg-9+deb8u14
Ondřej Surý has taken care of this issue for Stretch and Jessie. The
fixed packages are now available through Stable Updates
(https://wiki.debian.org/StableUpdates) and should be part of the next
point release.
75450)
+
+ -- Bernhard Schmidt Tue, 12 Sep 2017 13:09:19 +0200
+
asterisk (1:13.14.1~dfsg-2+deb9u1) stretch-security; urgency=high
* CVE-2017-14099 / AST-2017-005
diff -Nru
asterisk-13.14.1~dfsg/debian/patches/875450-chan_sip-oneway-audio.patch
asterisk-13.14.1~dfsg/debian/patches/875450-chan_sip-o
Am 06.07.2017 um 22:06 schrieb Josip Rodin:
Hi Josip,
> I've read the discussion that happened after the message to -done and I'm at
> a loss for words - this kind of a decision would go against the BCP of some
> twenty years of Debian packaging.
>
> Yes, it's common to set up a network service
On Wed, Jul 12, 2017 at 09:35:53AM +0200, Patrick Matthäi wrote:
Hi,
> we have got the same issue with all our VPNs upgraded to Stretch now.
> Most VPNs are connected about a 1 GBit/s datacenter connection with each
> other (also same LAN), the other ones are connected about a 100 MBit/s
> connec
Am 12.07.2017 um 15:41 schrieb Patrick Matthäi:
Hi,
>>> we have got the same issue with all our VPNs upgraded to Stretch now.
>>> Most VPNs are connected about a 1 GBit/s datacenter connection with each
>>> other (also same LAN), the other ones are connected about a 100 MBit/s
>>> connection.
>>
Hi,
> I also uploaded the current testing version to stretch-bpo and deployed
> it on one host, to see if there is a difference later
BTW, right now the version from Buster (2.4.3-4) is installable on
Stretch just fine, so no need for an official backport if you are doing
a short test.
Bernhard
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu
Hi,
I'm looking for an indication whether something like this would be acceptable
for a stable release. If it might be acceptable I would come back with a
proper debdiff for appro
Control: fixed -1 2.4.3-4
Am 18.07.2017 um 10:44 schrieb Patrick Matthäi:
Hi,
thanks for the logs!
> we have got the same issue with all our VPNs upgraded to Stretch now.
> Most VPNs are connected about a 1 GBit/s datacenter connection with each
> other (also same LAN), the other on
Am 18.07.2017 um 13:26 schrieb Patrick Matthäi:
Hi,
> Am 18.07.2017 um 13:05 schrieb Patrick Matthäi:
>>> I've browsed through the git commits between 2.4.0 and 2.4.3, these
>>> might be relevant here
>>>
>>> https://community.openvpn.net/openvpn/ticket/812
>>> https://community.openvpn.net/openv
Control: forwarded -1 https://community.openvpn.net/openvpn/ticket/812
> I have tested it three times, it is definitly
> https://community.openvpn.net/openvpn/ticket/812 which fixes this issue
Thanks, I'll fix it ASAP.
Bernhard
Control: tags -1 + upstream
Hi,
> This bug hit me pretty hard. I unknowingly used the upstream
> openvpn-server@ unit, and then spent a day or so trying to work out why
> it did not work – the upstream one has CAP_AUDIT_WRITE missing from its
> capability list.
>
> Perhaps the upstream one could
Control: clone 866523 -2
Control: retitle -2 Upstream systemd unit has too limited
CapabilityBoundingSet
Control: forwarded -2 https://community.openvpn.net/openvpn/ticket/918
Cloned into seperate bug for the limited bounding set
+1,10 @@
+openvpn (2.4.0-6+deb9u2) stretch; urgency=medium
+
+ * Fix broken reconnect on connection loss due to wrong push digest
calculation.
+Thanks to Patrick Matthäi for testing (Closes: #863110)
+
+ -- Bernhard Schmidt Tue, 18 Jul 2017 22:15:17 +0200
+
openvpn (2.4.0-6+deb9u1) st
On 18.07.2017 13:26, Patrick Matthäi wrote:
> Am 18.07.2017 um 13:05 schrieb Patrick Matthäi:
>>> I've browsed through the git commits between 2.4.0 and 2.4.3, these
>>> might be relevant here
>>>
>>> https://community.openvpn.net/openvpn/ticket/812
>>> https://community.openvpn.net/openvpn/ticket/
On 06.08.2017 14:05, Jonathan Wiltshire wrote:
Hi,
> Control: tag -1 confirmed
>
> On Thu, Aug 03, 2017 at 11:14:04AM +0200, Bernhard Schmidt wrote:
>> I'd like to fix RC bug #863110 in Stretch, causing OpenVPN connections to be
>> broken when they are reestablished
Hi,
somehow I forgot to also add this message to the pkcs11 bug...
Eric, if openvpn was the only reason to stay on OpenSSL 1.0 feel free to
switch over now.
OpenVPN 2.4.3 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL]
[MH/PKTINFO] [AEAD] built on Jun 23 2017
library versions: OpenSSL 1.
Control: tags -1 + pending
On Thu, Aug 03, 2017 at 11:21:28AM +0200, Bernhard Schmidt wrote:
> stretch-pu filed as
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870604
Accepted into p-u, will be part of Debian 9.2 and should be available
shortly on https://www.debian.org/releases/pr
Control: block 793837 by 868756
I have filed a pre-approval question to the SRM to update the ntp
package in Stretch to include sntp. They are not completely against it,
see #868756.
The relevant code is now in
https://anonscm.debian.org/git/pkg-ntp/pkg-ntp.git/log/?h=stretch. I
will test it some
Package: src:bind9
Severity: important
Tags: patch upstream
Hi,
ICANN will roll the DNSSEC root zone KSK in October 2017. DNSSEC-enabled
resolvers will then stop working unless they have the new key configured
to be trusted (note that in the default configuration a running BIND will
learn and st
On Thu, Dec 08, 2016 at 10:23:22PM -0800, Noah Meyerhans wrote:
Hi Noah,
> On Fri, Dec 02, 2016 at 12:25:44PM +0100, Bernhard Schmidt wrote:
> > thanks for providing an AWS EC2 Image with Debian Jessie.
> >
> > AWS is now supporting IPv6 on EC2 instances, see
&g
Control: forcemerge 847668 -1
On Fri, Dec 09, 2016 at 11:30:27PM -0500, Dara Adib wrote:
Hello Dara,
> Package: asterisk
> Version: 1:11.13.1~dfsg-2+deb8u1
> Severity: important
> Tags: security patch
>
> https://security-tracker.debian.org/tracker/TEMP-000-5567B0
> http://downloads.asteris
Package: ufw
Version: 0.35-2
Severity: wishlist
Dear Maintainer,
this is only a wishlist bug because it does not happen with normal building.
I have just tried to backport a current ufw locally for Jessie. Part of our
normal process to do this is gbp-import-dsc --download , then make
a jessie-ba
Package: src:asterisk
Version: 1:13.13.1~dfsg-3
Severity: important
Hi,
Due to the messed up execution/timing of the OpenSSL 1.1.0 transition we
had to disable SNMP support in Asterisk for now.
https://anonscm.debian.org/cgit/pkg-voip/asterisk.git/commit/?id=e1410f4eb0355204c7c3fc232712cd9a1218
On Thu, Jan 19, 2017 at 12:33:44PM +0100, Joerg Dorchain wrote:
Hi Joerg,
> > > I don't see any new development in
> > > http://t38modem.cvs.sourceforge.net/viewvc/t38modem/t38modem/ . So
> > > unless someone steps up to fix #846758 I'm afraid we'll have to RM it
> > > eventually.
> >
> > /usr/b
Source: postfix
Version: 3.1.4-3
Severity: important
Hi,
my fairly standard Debian stretch installation that uses resolvconf with
dns-* configuration lines in /etc/network/interfaces reproducibly does
start a postfix instance at boot unable to deliver any mail to an
external destination.
Jan 30
On Tue, Jan 31, 2017 at 10:40:09PM +0100, Arnoud Dekker wrote:
> I can confirm that packages built manually from
> https://anonscm.debian.org/gitweb/?p=pkg-zfsonlinux/zfs.git and
> https://anonscm.debian.org/gitweb/?p=pkg-zfsonlinux/spl.git , which include
> fixes for this bug (thanks Aron!), seem
Control: tags -1 +moreinfo
On Sun, Aug 12, 2012 at 12:44:18PM +, Daniel Pocock wrote:
> I am using v1.8.8. I've also tried to use 1.8.13 (the version in
> wheezy) to see if that resolves the problem, but 1.8.13 has more severe
> problems that prevent testing of the same TLS environment:
> ht
Control: reassign -1 asterisk-core-sounds
Control: affects -1 asterisk
Control: severity -1 important
On Mon, Jul 27, 2015 at 10:14:56AM -0600, TheSin wrote:
> Package: asterisk-voicemail
> Version: 1:13.1.0~dfsg-1.1
>
> Forwarding a voicemail cause the app to hangup due to missing sound file.
>
Control: forwarded -1 https://trac.pjsip.org/repos/ticket/1932
Control: tags -1 help
On Sun, Jun 26, 2016 at 12:23:43PM +0200, Kurt Roeckx wrote:
Hi,
> Source: pjproject
> Version: 2.4.5~dfsg-4
> Severity: important
> Control: block 827061 by -1
>
> Hi,
>
> OpenSSL 1.1.0 is about to released.
Control: severity -1 grave
Control: tags -1 sid stretch
On Tue, Aug 23, 2016 at 10:30:05AM +0200, Michal Čihař wrote:
Hi,
> maybe I'm just doing something wrong (actually trying to use ODBC after
> very long time), but I get SIGFPE when trying to use libmyodbc.
>
> Setup:
>
> - - the driver is
On Wed, Oct 26, 2016 at 06:08:28PM -0400, James McCoy wrote:
Hi,
> > IMHO this behaviour does not make any sense. You need to check the
> > authenticity of any additional key upstream might use before adding it
> > to the repo,
>
> Of course you do. Why wouldn't you verify the authenticity of a
Control: reassign -1 src:pjproject 2.5.5~dfsg-1
Control: severity -1 grave
Control: affects -1 src:asterisk
On Tue, Nov 01, 2016 at 08:17:16PM -0400, Gedalya wrote:
Hi,
> Package: asterisk
> Version: 1:13.11.2~dfsg-1
>
> Hi,
>
> Not sure if this should be filed against asterisk or pjproject.
>
Control: severity -1 important
2.5.5~dfsg-2 in unstable now builds against libssl1.0-dev. Unless
upstream releases a fixed version in time for stretch we will keep it
that way.
Downgrading severity in accordance with the release team.
signature.asc
Description: Digital signature
Control: tags -1 help
Hi,
current state on this:
- There is no progress visible in the upstream bugtracker, I have also
not found anything in other distros (Fedora etc.)
- switching to libssl1.0-dev does not work for now because the
build-deps
libc-client2007e-dev
libpjproj
Control: tags -1 confirmed
> > == Begin MixMonitor Recording PJSIP/trunk-vitelity-in-
> > asterisk*CLI>
> > Disconnected from Asterisk server
> > Asterisk cleanly ending (0).
> > Executing last minute cleanups
> >
> > That's all. Nothing in the log either.
> >
> > After going back to p
Control: forwarded -1
http://lists.pjsip.org/pipermail/pjsip_lists.pjsip.org/2016-November/019636.html
On Thu, Nov 03, 2016 at 03:12:37PM -0400, Gedalya wrote:
Hi,
> > Confirmed. If you start Asterisk in the foreground you actually get an
> > assertion
> >
> > asterisk: ../src/pj/os_core_unix.c
On Sun, Nov 20, 2016 at 09:20:29PM +0200, Tzafrir Cohen wrote:
Hi,
> This behaves even worse than I remembered it.
>
> It seems that there is a random unicode character (different at any
> invocation) or-ed with the characters printed. I connected several times
> and types 'abc', and got:
>
> p
Control: tags -1 confirmed
On Sat, Nov 19, 2016 at 07:43:42AM +0100, Lucas Nussbaum wrote:
Hi,
> Source: isatapd
> Version: 0.9.7-2
> Severity: serious
> Tags: stretch sid
> User: debian...@lists.debian.org
> Usertags: qa-ftbfs-20161118 qa-ftbfs
> Justification: FTBFS on amd64
>
> Hi,
>
> Duri
Hi Adrian,
On Mon, Nov 21, 2016 at 04:58:34PM +0200, Adrian Bunk wrote:
> On Sun, Nov 20, 2016 at 08:54:06PM +0100, Bernhard Schmidt wrote:
> >...
> > On Sat, Nov 19, 2016 at 07:43:42AM +0100, Lucas Nussbaum wrote:
> >...
> > > Relevant part (hopefully):
>
Package: cloud.debian.org
Severity: minor
User: cloud.debian@packages.debian.org
Usertags: aws
Hi,
thanks for providing an AWS EC2 Image with Debian Jessie.
AWS is now supporting IPv6 on EC2 instances, see
https://aws.amazon.com/de/blogs/aws/new-ipv6-support-for-ec2-instances-in-v
Control: severity -1 important
On Sun, Dec 04, 2016 at 11:03:26PM +0100, Roland Koebler wrote:
Hi Roland,
> Package: python-pjproject
> Version: 2.5.5~dfsg-3
> Severity: grave
> Justification: renders package unusable
>
> Dear Maintainer,
>
> python-pjproject is broken; when trying to use it,
Control: severity -1 important
On Sat, Nov 12, 2016 at 01:53:07PM +0200, Adrian Bunk wrote:
Hi,
> Not a perfect solution but sufficient for stretch is the patch below to
> use OpenSSL 1.0.2
Thanks, I have just uploaded 3.3.0~test17-2.1 with that fix. Downgrading
the bug for now.
Bernhard
si
Package: ftp.debian.org
Severity: normal
Hi,
please remove libzrtpcpp from sid. It has been RC-buggy for more than a year.
The only former rdep has been RMed a while ago already. The upstream website
has been abandoned and domain-squatted.
I have asked within the team and all maintainers. The
Package: open-vm-tools
Version: 2:10.1.0-4449150-1
Severity: minor
Dear maintainer,
starting with upstream version 10.1.0-4449150 (at least this is the
upstream version in
https://github.com/bzed/pkg-open-vm-tools/tree/master/open-vm-tools/udev)
open-vm-tools now ship an udev rule setting the tim
On Sat, Dec 31, 2016 at 09:30:35AM +0100, Joerg Dorchain wrote:
Hi Joerg,
> following testing, after upgrading to asterisk 1:13.13.1~dfsg-2,
> /etc/init.d/asterisk debug endlessly repeats the following screen
> output rapidly:
> ...
> 09:22:39.015 rtp0x558b74e70 Mutex: thread timer is waiting
Hi,
> Your package is failing to build with openss 1.1:
> checking for OpenSSL library... no
> yes
> checking for using OpenSSL for hash functions... no
> [...]
> checking for OpenSSL library... using OpenSSL from /usr/lib and /usr/include
> checking whether linking with OpenSSL works... yes
> [..
On Sat, Jan 14, 2017 at 12:55:08PM +0100, Joerg Dorchain wrote:
Hi Joerg,
> > > I would like config parts containing personal access details
> > > not to be part of the public bug tracker for avoiding security
> > > breaches and direct monetary costs arrising from that, so I did
> > > not sent t
On Sun, Jan 01, 2017 at 11:06:30AM +0100, Tzafrir Cohen wrote:
Hi,
> The messages comes from pjproject. The messages are relatively low
> priority ones there.
>
> However just from reading the code I'm a bit lost. That message seems to
> be at log priorty 6 in pjproject:
> http://sources.debian.
Control: tags -1 - moreinfo
Control: tags -1 + upstream wontfix
On Thu, Mar 04, 2010 at 05:37:51PM +0200, Rémi Denis-Courmont wrote:
> tags 571971 + moreinfo
> thanks
>
> Le dimanche 28 février 2010 19:13:33, vous avez écrit :
> > Debian usualy uses resolvconf to add nameserver entries to /etc/
Control: forwarded -1 https://issues.asterisk.org/jira/browse/ASTERISK-26630
On Sun, Jan 01, 2017 at 12:09:58PM +0100, Joerg Dorchain wrote:
Hi,
> Downgrading these to 2.5.5~dfsg-3 from snapshot.debian.org indeed
> helped the problem. So far, so easy.
>
> To keep me happy, I see some options. M
(1:11.13.1~dfsg-2+deb8u2) jessie; urgency=medium
+
+ * AST-2016-009: non-printable ASCII chars treated as whitespace
(CVE-2016-9938)
+(Closes: #847668)
+
+ -- Bernhard Schmidt Tue, 03 Jan 2017 23:54:39 +0100
+
asterisk (1:11.13.1~dfsg-2+deb8u1) jessie-security; urgency=high
[ Tzafrir
On 05.01.2017 20:53, Adam D. Barratt wrote:
> Control: tags -1 + confirmed
>
> On Wed, 2017-01-04 at 00:05 +0100, Bernhard Schmidt wrote:
>> I would like to fix CVE-2016-9938 (Bug #847668) with the upcoming point
>> release.
>> The issue has been categorized no-dsa
On Tue, Jun 23, 2015 at 11:20:26AM +0800, laalaa wrote:
Hi,
> Package: tacacs+
> Version: 4.0.4.27a-1
> Severity: normal
>
>
> Description:
>
> tacacs+ is missing 'is-enabled' systemd integration:
>
> # systemctl is-active tacacs_plus.service
> active
>
> # systemctl enable tacacs_plus.serv
Hi,
I just hit the very same problem with spl-linux from bpo on a Jessie
system (with dkms 2.2.0.3-2).
It builds fine with dkms 2.2.0.3-4~bpo8+1. I assume this could be
changed by this (in 2.2.0.3-3)
[ Aron Xu ]
* Added patches from Darik Horn and Ubuntu:
- Correct handling of POST_BUIL
Package: bind9
Severity: wishlist
Hi,
bind 9.11 has bene released recently, with many DNSSEC related improvements
- dnssec-keymgr
- Negative Trust-Anchors
- RFC 7344
Please consider packaging 9.11 for Stretch, these features will be immensly
helpful within Stretch lifeti
Control: fixed -1 1:13.0.0~dfsg-1
On Wed, May 27, 2015 at 10:35:33AM +0200, Simone Ricci wrote:
Hi,
> trying to start asterisk via /etc/init.d/asterisk start, or by issuing
> a systemctl start asterisk fails (nothing happens) if machine is
> recovering from a crash, asterisk itself has crashed o
is asterisk, and that doesn't use the C++ library.
Bernhard
From ef670f312cb1e4d3b943bbe370340a482d83c365 Mon Sep 17 00:00:00 2001
From: Bernhard Schmidt
Date: Tue, 11 Oct 2016 09:59:48 +0200
Subject: [PATCH] Update debian/libpjsua2-2v5.symbols for GCC-6
Closes: #831179
---
debian/libpjsua2-2v5.sym
On Tue, Oct 11, 2016 at 11:36:58AM +0300, Andriy Ivashchenko wrote:
Hi Andriy,
> Thanks for your warry about old and important bug!
>
> The same errors i got when try to backport pjproject to jessie.
> I think it is very important to make pjproject backport, because
> no posibility to build Aste
Control: forwarded -1 https://github.com/rakshasa/rtorrent/issues/59
> rtorrent 0.9.0-1 (unreleased) removed IPv6 support again by dropping
> the patch, claiming upstream was now supporting it. This is simply
> false, and I haven't been able to get a response from the rtorrent
> maintainers about
301 - 400 of 965 matches
Mail list logo