id even for this code sequence. We enter the debug
exception with a 256bytes long per cpu stack and migrate to the kernel
stack before calling do_debug().
[0] x86-disable-debug-stack.patch
[1] fix-rt-int3-x86_32-3.2-rt.patch
Reported-by: Brian Silverman
Cc: Andi Kleen
Signed-off-by: Sebastian Andrzej
Package: src:xsd
Version: 3.3.0-2
Severity: serious
Your package: FTBFS on a few architectures [0]. Mips, powerpc, s390 and
sparc are all big endian. All architectures which built were little
endian. Here is a snippet from powerpc [1]:
|ld
/build/buildd-xsd_3.3.0-2-powerpc-MuXwhF/xsd-3.3.0/xsd-s
Package: src:fmtools
Version: 2.0.4
Severity: serious
Your package FTBS on all buildds[0]. Here is snippet from s390:
|dh_clean
| debian/rules build
|dh_testdir
|./configure --prefix=/usr --sysconfdir=/etc --libexecdir=/usr/lib
|configure: error: cannot find install-sh, install.sh, or shtool in bu
Package: src:raidutils
Version: 0.0.6-14
Severity: serious
Your package FTBFS on all architectures [0]. Here is a snippet from
powerpc[1]:
|pkg-buildpackage: source package raidutils
|dpkg-buildpackage: source version 0.0.6-14
| dpkg-source --before-build raidutils-0.0.6
|dpkg-buildpackage: host
On 26.01.14, Jose Miguel Mata wrote:
> root@debian01:~# apt-get -f install
> Leyendo lista de paquetes... Hecho
> Creando árbol de dependencias
> Leyendo la información de estado... Hecho
> 0 actualizados, 0 se instalarán, 0 para eliminar y 0 no actualizados.
> 1 no instalados del todo o eliminados
On 09/25/2013 03:24 PM, Ben Hutchings wrote:
> On Tue, 2013-09-24 at 13:43 -0700, Brian Silverman wrote: [...]
>> I got down to a really simple program that reproduces this bug:
>>
>>
>> #include #include int main() { // I've
>> tried SYS_getpid, SYS_write, and SYS_read here too.
>> syscall(SY
reassign 732323 src:linux
found 732323 3.2.53-1
forcemerge 732208 732323
thanks
this is a copy of #732208 which has been fixed in the meantime.
Sebastian
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.deb
* Andi Kleen | 2014-01-04 19:18:07 [+0100]:
>On Fri, Jan 03, 2014 at 02:55:48PM +0100, Sebastian Andrzej Siewior wrote:
>> where do I start. Let me explain what is going on here. The code
>> sequence
>
>Yes the IST stacks are needed for correctness, even in more cases than
&g
On 2014-05-17 15:09:00 [+0200], Guido Günther wrote:
> which dependency are you still seeing?
> -- Guido
I think he meant:
>From b19ba46d6a9c3b67a8a70457ed1970924bb97489 Mon Sep 17 00:00:00 2001
From: Sebastian Andrzej Siewior
Date: Thu, 26 Jun 2014 20:08:04 +0200
Subject: [PATCH] dr
Package: src:lzo2
Version: 2.03-2
Severity: important
Tags: security
>From http://www.oberhumer.com/opensource/lzo/:
|LZO 2.07 has been released:
|
|Fixed a potential integer overflow condition in the "safe" decompressor
|variants which could result in a possible buffer overrun when processing
|m
* Guido Günther | 2014-06-26 21:54:40 [+0200]:
>Already in VCS as 9321997cddf7bb5b030d6328d9db67eb4f5830f6 since May.
>Cheers,
It seems to be part of the experimental branch which also has new v1.2.5
in it. Please add the Closes tag to finally close the bug :)
> -- Guido
Sebastian
--
To UNSUB
tags 740059 + upstream
forwarded 740059 https://bugzilla.clamav.net/show_bug.cgi?id=10971
thanks
On 2014-03-15 20:37:01 [+0100], Sebastian Andrzej Siewior wrote:
> On 2014-03-16 00:16:38 [+0700], Ста Деюс wrote:
> > Здравствуй, Sebastian.
Hello Ста,
the patch below is what I sent to
tags 744314 - patch
thanks
On 2014-04-13 21:06:49 [+0200], Holger Wansing wrote:
> Hi,
Hi Holger,
> > Can someone then review and improve it?
>
> Will be done.
Good. In the meantime I remove the patch tag.
> Thanks
>
>
> Holger
Sebastian
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ.
tags 745754 + pending
thanks
On 2014-04-24 19:37:26 [+0100], Américo Monteiro wrote:
> Updated Portuguese translation for clamav's debconf messages.
> (1 String updated)
> Translator: Américo Monteiro
> Feel free to use it.
Thanks you.
Sebastian
--
To UNSUBSCRIBE, email to debian-bugs-dist-r
On 2013-09-24 09:50:56 [+0200], Sebastian Andrzej Siewior wrote:
> On Thu, Aug 08, 2013 at 09:53:35AM -0700, Jonathan Nieder wrote:
> > Yes, this is worth fixing in stable. Thanks for a clear report.
>
> Thanks. It seems 7.2 will be released on 12.Oct. Do you think you get th
tags 743874 +pending
thanks.
On 2014-04-08 03:03:07 [+0900], victory wrote:
> Dear clamav package maintainer,
>
> Here's Japanese po-debconf template translation (ja.po) file that
> reviewed by several Japanese Debian developers and users.
>
> Could you apply it, please?
Yes, thank you.
Se
On 2009-08-22 15:01:00 [+0200], nutzteil wrote:
> I made rar-archives with the compression-levels '-m0' to '-m5'.
> ('-m0' is RAR-Archive v14, the others are v1d)
>
> Put eicar / clamav-testfiles in it.
> When ther are small number of files, all is ok.
> But with a big number of files ( ~ 50 MB ~
On 2014-05-23 20:13:54 [+0800], Jim Barber wrote:
> So the sequence of events was the upgrade on the 19th; freshclam on the
> 20th;
> then the first hang on the 21st.
I see. Could you please go back to 0.98.3 and see if the issue goes
away? It might be a regression in the comming up 0.98.4 of clam
Package: src:babeltrace
Version: 1.2.1-2
Tags: patch
Severity: wishlist
Please enable python3 bindings in the babeltrace package. Patch
attached.
Sebastian
>From 52db172006200d97e3da7e3b87d1f29af0a9 Mon Sep 17 00:00:00 2001
From: Sebastian Andrzej Siewior
Date: Tue, 27 May 2014 10:45
On 2014-05-29 18:37:40 [+0200], Andreas Cadhalpun wrote:
> As I don't know, when the PowerPC failure will be fixed, it's probably best
> to cherry-pick this fix for wheezy.
>
> Scott, what do you think?
I'm going to cherry-pick it for wheezy soon.
> Best regards,
> Andreas
Sebastian
--
To UN
On 2014-05-29 18:42:15 [+0200], Sebastian Andrzej Siewior wrote:
> On 2014-05-29 18:37:40 [+0200], Andreas Cadhalpun wrote:
> > As I don't know, when the PowerPC failure will be fixed, it's probably best
> > to cherry-pick this fix for wheezy.
> >
> > Scott,
On 2014-05-29 23:28:56 [-0400], Scott Kitterman wrote:
> Thanks. If I do UNRELEASED/unstable and make a source package and then
> debdiff
> 7u3 to 7u4 I get the attached diff, which is more than we want. For
> resolving
> this bug we want the minimal change. I can produce a reduced change to
eb7u4) UNRELEASED; urgency=medium
+
+ * cherry pick upstream patches to fix a crash while using clamscan. Added
+patches: c6f5ef98d ("bb #10970 - Force a filesize limit of UINT_MAX - 2")
+and 99ee2138c ("Key off INT_MAX") (Closes: #749715).
+
+ -- Sebastian Andrzej Siew
tags 750075 + patch pending
thanks
On 2014-06-01 11:34:14 [+0100], Michael Tautschnig wrote:
fixed upstream by commit e0f667e7f1 ("bb11023 - Wrong declaration of
function destroy_ctx to cause undefined behavior").
> Best,
> Michael
Sebastian
>From e0f667e7f12ec561e6b87a3664f6f673c12908d3 Mon Se
On 2014-06-02 14:49:50 [-0400], Scott Kitterman wrote:
> The fix for this will be in 0.98.4. No need for a separate patch.
Yes, I just learned that and that they will release 0.98.4 any time
soon.
Sebastian
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of
On 2014-05-15 11:54:23 [+0800], Paul Wise wrote:
> 99%: Checks: 960, Failures: 1, Errors: 1
> check_bytecode.c:136:F:arithmetic:test_bswap_jit:0: Invalid return value from
> bytecode run, expected: beef, have: dead1
>
> check_bytecode.c:111:E:arithmetic:test_inflate_int:0: (after this point)
> R
tags 748180 + upstream
forwarded 748180
https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=10;mbox=yes;bug=748180
thanks
On 2014-05-15 14:19:10 [+0200], Sebastian Andrzej Siewior wrote:
> Yesterday I tried to bring the in-tree llvm-back and build it. The build
> failed, too. The log is ava
On 2009-07-17 11:06:16 [+0100], Joao Paulo Serrachinha wrote:
> Sorry for my frustration, but this is an upstream problem. All i want is all
> old command line options have a new On* directive. Meanwhile stick with
> stable.
Now, almost 5years later. Is this problem still there? I don't quite
unde
On 2014-02-25 17:08:56 [+0700], Sthu wrote:
> FYI: about three weeks (after update) i see this behavior:
>
> /usr/bin/clamscan -r --bell --infected --detect-pua=yes --scan-elf=yes
> --scan-mail=yes --algorithmic-detection=yes --scan-pe=yes --scan-ole2=yes
> --scan-pdf=yes --scan-html=yes --scan-
hat this would be the preferred fix
> (depending on upstream), obsoleting /etc/default/clamav-milter.
I have the following patch to get this behaviour.
>From dca6bd7cd4544fb2d30cf79fb3b9c4117e6b52c4 Mon Sep 17 00:00:00 2001
From: Sebastian Andrzej Siewior
Date: Tue, 11 Mar 2014 21:09:32 +0100
Subject: [PATC
av-milter.
There is no need for that SOCKET_RWGROUP hack including waiting until
clamav-milter is up so that we can alter the permissions of the socket.
This can be handled by clamav-milter itself if it is started as root.
Signed-off-by: Sebastian Andrzej Siewior
---
debian/clamav-milter.def
On 2014-03-13 19:37:22 [-0400], Scott Kitterman wrote:
> Does it drop privileges itself somehow? Given clamav's security history and
> what it does, I don't think running as root is a good idea.
Yes it does but only if you specify "User" in clamav-milter.conf. I could
alter it to refuse to start
On 2014-03-14 15:08:41 [-0400], Scott Kitterman wrote:
> In principle, we could check during configure if a User was specified in the
> .conf (and set it if it wasn't). That would be, I believe, a sane transition
> from starting as user to starting as root and letting the milter itself drop
> p
On 2014-03-16 00:16:38 [+0700], Ста Деюс wrote:
> Здравствуй, Sebastian.
Hello Ста,
> You have guessed right: i less than 2.7 GB of RAM, while i was
> scanning file of 2.7 GB in size.
What kind of file is it? Is this some kind of raw data or an archive?
> So, you can assuredly close my report.
On 2007-03-10 10:58:23 [+0100], Marc Haber wrote:
> It would be great if this were configurable.
Upstream suggests [0] to use OnUpdateExecute to alter the permisions
after the update.
Does this work for you?
[0] https://bugzilla.clamav.net/show_bug.cgi?id=470#c3
> Greetings
> Marc
>
Sebastian
found 669287 0.97.3+dfsg-1
fixed 669287 0.98.1+dfsg-4
thanks.
On 2012-04-11 22:46:06 [+0200], Ruud Baart wrote:
>
> I configured to run clamav with User = "amavis". This means that the logfiles
> in /var/log/clamav should be owned
> by "amavis". However in /etc/logrotate.d/clamav-daemon is "cre
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sun, Nov 18, 2012 at 07:59:39PM +, Thorsten Glaser wrote:
> tg@zigo:~ $ sudo apt-get --purge dist-upgrade
> Broken gcc-snapshot:amd64 Depends on libc6-dev-x32 [ amd64 ] < none > ( none
> ) (>= 2.11)
This isn't that critical. A binary-NMU cou
Package: targetcli
Version: 2.0rc1-2
Severity: minor
Please add "python-urwid" to package's suggest list. It does not really depend
on it but it can make use of it. For instance if don't have it installed and
enter "cd" then you see a backtrace. With this package installed you are able
to browse a
Package: src:refdbg
Version: 1.2+git20101215+aa5cb3-2
Severity: Serious
I have here 1.2+git20101215+aa5cb3-2+b1 installed. refdbg binary ends with:
| if [ "x${REFDBG_OPTIONS}" == "x" ] ; then
| LD_PRELOAD=/usr/lib/librefdbg.so "${@:ndx}"
| else
| REFDBG_OPTIONS="${REFDBG_OPTIONS}" LD_PREL
Package: intel-microcode
Version: 1.20120606.2
The cpuid driver is required for this to work, without it it fails silently:
|# iucode_tool -v -S
|iucode_tool: checked the signature of 0 processor(s)
|# echo $?
|0
This fix this, the /usr/share/initramfs-tools/hooks/intel-microcode could
be modifi
Package: rt-tests
Version: 0.83-1
Severity: serious
Tags: patch fixed-upstream
hackbench is a major component in this package and it can't be used on armhf:
|$ hackbench
|Running in process mode with 10 groups using 40 file descriptors each (== 400
tasks)
|Each sender will pass 100 messages of
* Martin Michlmayr | 2010-02-26 07:47:30 [-0500]:
>* Sebastian Andrzej Siewior [2010-02-26 08:50]:
>> > can you get Ralf or David Daney to submit it for inclusion into
>> > the 2.6.32-stable series?
>> It is allready there [0].
>>
>> [0]
>> h
* Moffett, Kyle D | 2010-03-25 17:49:33 [-0500]:
>We can just use --enable-e500-double when building (recent?) GCC.
Yep, looks good.
>Ok, so hopefully we can all agree on "e500v2"? That's the name I'm going to
>go ahead and use in my newest build-cycle.
Yep, I think so. However we will see what
* Rog?rio Brito | 2008-09-17 02:08:27 [-0300]:
>> git://www.jld.com/software/dtc.git
>Thanks for the information. I put it there on that page.
The git tree is still okay, however the Homepage button packages.qa.d.o
points to 404 page. The currently valid link would be
http://git.jdl.com/gitweb
* Alexander Clouter | 2011-06-08 09:54:58 [+]:
>Whilst deploying IPsec (with strongswan-ike2) I ran into a complication[1]
>that causes mv_cesa to spin the CPU when the system receives an IPsec ESP
>packet; it seems to be able to send traffic (before the CPU spin) as a
>ICMP Echo request (a la
Package: libreoffice-common
Version: 1:3.4.3-1
Severity: important
My dist-upgrade of my amd64 sid system ended early with:
|Processing triggers for libreoffice-common ...
|
|ERROR:
com.sun.star.registry.SimpleRegistry.open(file:///usr/lib/libreoffice/basis3.4/program/services.rdb):
underlying
On Fri, Sep 09, 2011 at 01:38:50PM +0200, Rene Engelhard wrote:
> Was the file there when this was tried? Should be, but? Do you have
I can only tell from the content of an older .deb file.
> th eupgrade order logged somewhere?
I don't have the output from the console anymore but would dpkg.log o
* Thus spake Frederic Peters (fpet...@debian.org):
> Sebastian Andrzej Siewior wrote:
>
> > * Thus spake Frederic Peters (fpet...@debian.org):
> > > > Frederic, any chance to see an updated iptraf package in Debian?
> > >
> > > Development is now hap
* Thus spake Alexander Clouter (a...@digriz.org.uk):
> I have just been tasked with putting together an active-active IPsec VPN
> concentrator (with a need to use AES-SHA1 it seems) and I was hoping to
> use the OpenRD's (and mv_cesa). Have you got a patch I can test that
> fixes things for SH
Mon Sep 17 00:00:00 2001
From: Sebastian Andrzej Siewior
Date: Sun, 7 Aug 2011 19:42:18 +0200
Subject: [PATCH] perl: use newSVpv for dcc's file size fields
Using newSViv() makes numbers >2GiB negative because it translate the number
into an signed integer. This patch use a tiny trick by con
Version: 0.10.18-1
thanks.
On Tue, Sep 13, 2011 at 01:26:18PM +0100, Christoph Schmidt-Hieber wrote:
> https://launchpad.net/ubuntu/+source/stimfit/0.10.18-1/+build/2781444
>
> Can we consider this bug as fixed?
Yes, because it built on debian buildd [0]. Please use this as reference :)
>If so
Package: btrfs-tools
Version: 0.19+20130315-2
Severity: important
Just upgraded from stable to sid on a machine where rootfs is on a btrfs
partition. The machine does hangs during boot because fsck failed. The call
chain is:
| init boot
| \_ /bin/sh /etc/init.d/rc S
| \_ startpar -p 4 -t 20
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu
Please binnum libuuid-perl in unstable as it currently depends on
perlapi-5.14.2 but we have perlapi-5.18.1 provided by perl-base 5.18.1-2. In
my recent dist-upgraded I ended up without a ker
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu
Please nmu libtext-iconv-per in unstable as it currently depends on
perlapi-5.12.2 but we have perlapi-5.18.1 provided by perl-base 5.18.1-2. In
my recent dist-upgraded I lost dictionaries-co
On Tue, Aug 27, 2013 at 08:05:53PM +0200, gregor herrmann wrote:
> Hi Sebastian,
Hi Gregor,
> thanks for your bug reports.
>
> You are right that libuuid-perl and libtext-iconv-per need binNMUs;
> just like 525 other packages, as mentioned on
> http://release.debian.org/transitions/html/perl5.18.
Package: git
Version: 1:1.7.2.5-3
Severity: important
Tags: patch
Control: fixed -1 1:1.8.1~rc0-1
The following has been observed:
| $ git push ko
| ko: Counting objects: 332, done.
| Delta compression using up to 4 threads.
| Compressing objects: 100% (110/110), done.
| Writing objects: 100% (13
On Thu, Aug 08, 2013 at 09:53:35AM -0700, Jonathan Nieder wrote:
> Yes, this is worth fixing in stable. Thanks for a clear report.
Thanks. It seems 7.2 will be released on 12.Oct. Do you think you get this in
p-u? Is there anything I can help you with?
> Regards,
> Jonathan
Sebastian
--
To U
* Thus spake Frederic Peters (fpet...@debian.org):
> > Frederic, any chance to see an updated iptraf package in Debian?
>
> Development is now happening in "iptraf-ng"[1], but they renamed
> binaries after they released 1.0.2 months ago and didn't make a new
> release yet; as it will affect packag
On Thu, Jun 06, 2013 at 09:49:21PM +0100, Adam D. Barratt wrote:
> fwiw, as unstable also has 0.83, it would need to be fixed there first.
Yes. I tried to point out that upstream did not release a version including
this fix yet.
Now we have unstable fixed. Could the maintainer be please so kind to
Package: gcc-doc-defaults
Version: 5:3
Severity: wishlist
gcc-4.6 ist in testing and I can only find gcc-4.4-doc-non-dfsg in the
archive. Mind packaging 4.6' man pages? Need a hand with this?
Sebastian
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "un
Package: gcc-snapshot
Version: 20111203-1
Severity could be serious but this package won't be shipped so
The man pages are under the gfdl according to tail of
/usr/lib/gcc-snapshot/share/man/man1/gcc.1 and this is not compatible with the
main archive.
Doko, please don't get me wrong. I've be
On Tue, Oct 21, 2008 at 06:43:26PM +0100, WS wrote:
>
> Still does not work. However, the error has changed:
>
> 2008-10-21 18:38:00 no IP address found for host laptop (during SMTP
> connection from [192.168.1.41])
> 2008-10-21 18:38:07 TLS error on connection from ([192.168.1.41])
> [192.168.
e order to first
compress and then encrypt.
Sebastian
From: Sebastian Andrzej Siewior
Subject: [PATCH] enc: compress before compress/base64 is applied
The command
|openssl enc -pass pass:pass -iv 0 -K 0 -S 0 -aes-256-cbc -base64 < file > file.enc.b64
first performs the encryption followed by
On Tue, Apr 03, 2012 at 01:49:44PM +0200, Patrick Matth?i wrote:
> Could you retest your issue please with 1.2.3-309-g7176ff4-1 ?
I just installed 1.2.3-313-ge5c4657-1 and have the same problem. It went
away after I executed
chown myuid:mygid /dev/input/event*
after that I got the gtk w
On Sat, May 05, 2012 at 11:17:50PM +0200, Tobias Diedrich wrote:
> 1.2.3-313-ge5c4657-1 seems to work fine for me now (despite
> /dev/input/event* being root-owned).
> OTOH I've recently installed pulseaudio (which also pulls in
> policykit), maybe that makes a difference here.
Yes, I see the same
* Ben Hutchings | 2012-06-02 18:55:17 [+0100]:
>Sorry we haven't done anything about this.
No worries :)
>Are you still working on powerpcspe? Can you provide a patch suitable
No, I dropped the ball.
>for the current version in sid or experimental?
I haven't seen much progress here from Kyle or
On 2016-11-03 22:15:50 [+0100], Marek Lukaszuk wrote:
> Thanks, it works, I feel like an idiot for not finding this.
it wasn't documented. how should you find it? I just figured it out
myself.
> > Let me see what upstream says…
>
> It is a bit of a surprise, normally I would argue for a bit more
rks? I am confident
but don't time todo it myself just now.
Sebastian
>From 05cd529e19d317b8bcc69f7d883873a27195b904 Mon Sep 17 00:00:00 2001
From: Sebastian Andrzej Siewior
Date: Mon, 7 Nov 2016 20:59:11 +
Subject: [PATCH] dnssec-trigger: openssl 1.1.0 fixup
- SSL_OP_NO_SSLv2 / SSLv2 has
On 2016-11-10 12:10:04 [+0200], Adrian Bunk wrote:
> On Thu, Sep 01, 2016 at 09:55:46PM +0200, Sebastian Andrzej Siewior wrote:
> > control: forwarded -1 https://github.com/rbsec/sslscan/issues/108
>
> Sebastian, Marvin, what is the status regarding getting this patch that
> wa
On 2016-11-10 12:10:41 [+0100], Ondřej Surý wrote:
> Sebastian,
Hi Ondřej,
> thanks for the patch. The 0.13~svn685-7 version in unstable includes
> your patch,
> and I would really appreciate if someone could test whether
> dnssec-trigger now
> works.
I managed to get around to test it. So the i
On 2016-11-11 19:21:26 [+0100], sternasky wrote:
> Hello,
Hi,
> after some analysis i found infos about php security changes after
> 5.6,7.0.12.2
>
> Self Signed Certs like
>
> SSLCertificateFile/etc/ssl/certs/ssl-cert-snakeoil.pem
> SSLCertificateKeyFile /etc/ssl/private/ssl-cert-snakeoil.k
On 2016-11-12 17:22:42 [+0100], Kurt Roeckx wrote:
> On Fri, Nov 11, 2016 at 09:21:41AM +0100, jean-christophe manciot wrote:
> > Package: openssl
> > Version: 1.1.0c-1
>
> > skipped: Test only supported in a shared build
> > ../test/recipes/90-test_srp.t ..
>
> This test did not fail
On 2016-11-12 21:21:23 [+0100], Kurt Roeckx wrote:
> On Sat, Nov 12, 2016 at 08:51:09PM +0100, Sebastian Andrzej Siewior wrote:
> > Why did it say "Keys mismatch" then? I don#t see this in a normal built.
>
> I see it in all the logs? But it seems to be at a slighty diff
On 2016-11-12 21:57:29 [+0100], Kurt Roeckx wrote:
> > Yes, you are right. Maybe we shouldn't run the testsuite in parallel.
> The test suite should not be running parallel? As far as I know
> that's not supported, and we're not doing it.
I think so. Looking at logs of armel, amd64, arm64 the "key
Source: libesmtp
Version: 1.0.6-4
Severity: serious
Control: block 827061 by -1
OpenSSL 1.1.0 has been released. During a rebuild of all packages using
OpenSSL this package succeeded to build but it should have failed. That is why
this bug is coming so late. The build simply deactivated TLS suppor
On 2016-11-11 16:05:05 [+0100], gregor herrmann wrote:
> As soon as fetchnews connects, stunnel4 segfaults.
I tried your config against a http server and mail server with no luck.
> The messages in the syslog:
> Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt:
> ptr=0x7f6340010430 a
On 2016-11-14 00:17:31 [+0100], gregor herrmann wrote:
> Thanks, but nope, still the same:
What about this one?
Sebastian
>From b436cd6527a2a32bd94b67ff10363e45a2f52430 Mon Sep 17 00:00:00 2001
From: Sebastian Andrzej Siewior
Date: Mon, 14 Nov 2016 21:03:24 +
Subject: [PATCH] t
On 2016-11-14 22:43:16 [+0100], gregor herrmann wrote:
> Control: tag -1 + patch
>
> On Mon, 14 Nov 2016 22:07:12 +0100, Sebastian Andrzej Siewior wrote:
>
> > On 2016-11-14 00:17:31 [+0100], gregor herrmann wrote:
> > > Thanks, but nope, still the same:
> > Wh
On 2016-11-15 12:39:25 [+0100], Apollon Oikonomopoulos wrote:
> Hi Ian,
Hi,
> On 11:16 Tue 15 Nov , Ian Jackson wrote:
> > 812166 is nothing to do with openssl AFAICT.
> > I don't think Xen is involved with the openssl transition.
> >
> > Did you get the wrong bug ?
>
> I'm terribly sorry fo
On 2016-11-14 22:43:16 [+0100], gregor herrmann wrote:
> Yay, this looks good!
So upstream came up with the patch attached after I forwaded mine. Can
you please confirm whether this works or not?
> Cheers,
> gregor
Sebastian
diff --git a/src/prototypes.h b/src/prototypes.h
index c196f92..86f4631
Control: tags -1 - patch
On 2016-11-10 12:31:00 [+0200], Adrian Bunk wrote:
>
> Not a perfect solution but sufficient for stretch is the following
> change to use OpenSSL 1.0.2:
>
> --- debian/control.old2016-11-10 10:20:58.0 +
> +++ debian/control2016-11-10 10:21:32.000
SSL_no_config
the problem is that salt/rsax931.py loads the library manually and
expects certain symbols which are no longer available in OpenSSL 1.1.0.
And it loads the first libcrypto it finds plus has no dependency on
openssl.
Sebastian
>From 67676f782796071a793ec1908de50c7b86e9fbee Mon Sep 17
control: tags -1 patch fixed-upstream
On 2016-07-24 12:01:29 [+0200], Oswald Buddenhagen wrote:
> fixed in git on isync_1_2_branch.
Upstream fixed it
https://sourceforge.net/p/isync/isync/ci/41308e481466b91813f6765a0c92ad83fd9d1ab2/
In their 1.2 release branch which is available in exper
On 2017-05-10 08:48:14 [+0200], Kurt Roeckx wrote:
> This is normal and expected. This is only something you see in
> a debugger, and is covered in the FAQ. Please just "continue".
https://www.openssl.org/docs/faq.html#PROG17
>From looking at
https://sources.debian.net/src/telegram-deskt
Package: sogo
Version: 3.2.6-2
Severity: important
It took me a while to setup this. In the end I went for postgresql as
database including auth backend. I tried very hard to share a calendar
between two users. It just won't happen. If I click on a calendar,
preferences, share then there is almost
On 2017-05-07 16:39:00 [+], Niels Thykier wrote:
> Sebastian Andrzej Siewior:
> > uploaded and built on all releases architectures.
>
> Ack/RT unblock, CC'ing KiBi for a d-i ack.
I don't want to rush or anything but in case it got forgotten, we are
still waiting f
Package: golang-github-google-certificate-transparency
Version: 0.0~git20160709.0.0f6e3d1~ds1-1
Severity: important
Tags: sid buster
User: pkg-openssl-de...@lists.alioth.debian.org
Usertag: openssl-1.1-trans
Please migrate to libssl-dev in the Buster cycle.
Sebastian
Package: haskell-hookup
Version: 0.1.0.0-3
Severity: important
Tags: sid buster
User: pkg-openssl-de...@lists.alioth.debian.org
Usertag: openssl-1.1-trans
Please migrate to libssl-dev in the Buster cycle.
Sebastian
Package: h323plus
Version: 1.24.0~dfsg2-1.3
Severity: important
Tags: sid buster
User: pkg-openssl-de...@lists.alioth.debian.org
Usertag: openssl-1.1-trans
Please migrate to libssl-dev in the Buster cycle. I tried and failed to
clone this from #84 where h323plus switched to libssl1.0-dev.
Seb
Control: reassign 761989 ftp.debian.org
Control: retitle 761989 RM: RoQA; unmaintained, dead upstream, low popcon,
library with no rdeps
On 2017-01-17 10:16:52 [+], Simon McVittie wrote:
> Control: reassign 761998 ftp.debian.org
> Control: retitle 761998 RM: RoQA; unmaintained, dead upstream,
Package: libapache2-mod-auth-pubtkt
Version: 0.10-1
Severity: important
Tags: sid buster
User: pkg-openssl-de...@lists.alioth.debian.org
Usertags: openssl-1.1-trans
Please migrate to libssl-dev in the Buster cycle.
Sebastian
Package: lighttpd
Version: 1.4.44-1
Severity: important
Tags: sid buster
User: pkg-openssl-de...@lists.alioth.debian.org
Usertags: openssl-1.1-trans
Please migrate to libssl-dev in the Buster cycle. I have no idea why
"libssl-dev|libssl1.0-dev" is currently used.
Sebastian
Package: kup
Version: 0.3.2-1
Severity: wishlist
The kup-server on k.o will be probably upgraded / changed around
kernel's rc6 and rc7 which renders current kup-client version useless /
not working. Konstantin tagged as of today 0.3.6 which is working /
contains the required changes on the client
On 2017-03-30 22:45:57 [+0100], Ben Hutchings wrote:
> Upgrading severity as it would be pointless to release with this
> version.
Sure. And probably something for current stable, I don't know. Should we
ask on users@k.o or just do it? Anyway if you want some help here or
there just say so.
> Ben
control: forwarded -1 https://github.com/openssl/openssl/pull/3099
Sebastian
On 2017-03-22 09:29:45 [-0400], Brian Minton wrote:
> This bug still exists in the most recent version of the openssl package.
sad but true. And the master branch has also no manpage for srp. Do you
mind witting one?
Sebastian
Package: mongo-tools
Version: 3.2.11-1
Severity: important
Tags: sid buster
User: pkg-openssl-de...@lists.alioth.debian.org
Usertags: openssl-1.1-trans
Please migrate to libssl-dev in the Buster cycle.
Sebastian
Package: nagios-nrpe
Version: 3.0.1-1~exp1
Severity: important
Tags: sid buster
User: pkg-openssl-de...@lists.alioth.debian.org
Usertags: openssl-1.1-trans
Please migrate to libssl-dev in the Buster cycle.
Sebastian
Package: netkit-ftp-ssl
Version: 0.17.34+0.2-1
Severity: important
Tags: sid buster
User: pkg-openssl-de...@lists.alioth.debian.org
Usertags: openssl-1.1-trans
Please migrate to libssl-dev in the Buster cycle.
Sebastian
Package: netsurf
Version: 3.6-3.1
Severity: important
Tags: sid buster
User: pkg-openssl-de...@lists.alioth.debian.org
Usertags: openssl-1.1-trans
Please migrate to libssl-dev in the Buster cycle. It was moved to
libssl1.0-dev in #846908 due to curl.
Sebastian
1 - 100 of 1895 matches
Mail list logo