Bug#717314: gnutls priority string regression in 3.2.2

2013-07-19 Thread Stefan Bühler
Package: libgnutls28 Version: 3.2.2-1 Hi, gnutls 3.2.2 tried to fix a bug; when removing an algorithm the list order wasn't preserved. but the fix introduced another bug: NONE:+MAC-ALL:-SHA1:+SHA1 misses SHA1 and has MD5 twice See upstream commit:

Bug#725959: support tmpfiles.d for other init systems

2013-10-10 Thread Stefan Bühler
Package: init-system-helpers Version: 1.11 Severity: wishlist Hi, perhaps the init-system-helpers would be the right place to support tmpfiles.d? I think it would be good to have this available with all init systems. See also: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=636339

Bug#726394: lighttpd: config.guess/config.sub out of date for arm64

2013-10-15 Thread Stefan Bühler
Hi, On Tue, 15 Oct 2013 11:44:56 +0100 Colin Watson cjwat...@ubuntu.com wrote: lighttpd's config.guess/config.sub are out of date for the forthcoming arm64 port. The attached patch sets things up so that you don't have to be bothered by this type of bug for future ports. Ideally, you'd be

Bug#726394: lighttpd: config.guess/config.sub out of date for arm64

2013-10-15 Thread Stefan Bühler
Hi Colin, On Tue, 15 Oct 2013 12:31:46 +0100 Colin Watson cjwat...@ubuntu.com wrote: I'm not sure what --with=autotools_dev does exactly, but I'd like to point out that autoconf is often incompatible across versions Not relevant; the autotools-dev debhelper add-on only updates

Bug#671740: Bug #671740 patch review

2013-12-04 Thread Stefan Bühler
Hi Kim, On Wed, 04 Dec 2013 11:12:21 -0500 Kim Vandry van...@tzone.org wrote: Hello Stefan, I was revieweing your patch, and I was concerned about passing data.dptr directly to crypt(). Are you sure it's safe? I cannot find any reference in the db documentation as to whether or not the

Bug#732058: icinga-web 1.10 requires icinga core idoutils 1.10

2013-12-13 Thread Stefan Bühler
Package: icinga-web Version: 1.10.0-1 Severity: important subject says it all. please update the debian package dependencies. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#703379: lighttpd don't interpret SSI commands

2013-04-19 Thread Stefan Bühler
Hi, On Fri, 19 Apr 2013 17:17:28 +0200 Olaf van der Spek o...@xwis.net wrote: Hi, Did you report this upstream? If not, could you do so? Olaf upstream is not interested... module load order is important, and mod_ssi and mod_compress both handle only static files, so only one of them

Bug#706700: tt-rss postinst chown ignores dpkg-statoverride

2013-05-03 Thread Stefan Bühler
Package: tt-rss Version: 1.7.8+dfsg-2 Hi, the subject says it all. See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624426 why this is a bad idea, also the mumble-django.postinst and http://www.debian.org/doc/debian-policy/ch-files.html#s10.9.1 should give you ideas how to solve this.

Bug#717569: glfw: Please update to version 3.0.1

2013-09-06 Thread Stefan Bühler
Hi, I packaged 3.0.2-0.1 at https://build.opensuse.org/package/show/home:stbuehler:opengl/glfw3 based on git://anonscm.debian.org/pkg-games/glfw.git I renamed the dev package to libglfw3-dev to avoid name conflicts. Perhaps this helps you with an official package :) regards, Stefan -- To

Bug#729480: SSL connections with client certificates no longer working

2013-11-13 Thread Stefan Bühler
Hi, On Wed, 13 Nov 2013 13:51:30 +0100 gator...@yahoo.de wrote: Package: lighttpd Version: 1.4.31-4+deb7u1 Severity: important I am running a webserver that only offers https and normally requires client certificates. When I install the security upgrade 1.4.31-4+deb7u1 and restart

Bug#729480: SSL connections with client certificates no longer working

2013-11-13 Thread Stefan Bühler
Hi, I updated our advisory at http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_01.txt and the patch at http://download.lighttpd.net/lighttpd/security/lighttpd-1.4.33_fix_ssl_sni.patch with the diff from revision 2925:

Bug#729555: lighttpd: SSL/SNI completely broken!

2013-11-14 Thread Stefan Bühler
Hi, I think this may be related to 729480, but I could be wrong (shouldn't have merged so quickly, sorry). On Thu, 14 Nov 2013 10:00:25 +0100 r.koeb...@yahoo.de wrote: The last security update completely broke SSL/SNI. Before the update, SSL and SNI worked fine, but after the update, no more

Bug#729555: lighttpd: SSL/SNI completely broken!

2013-11-14 Thread Stefan Bühler
Hi, On Thu, 14 Nov 2013 12:48:04 +0100 Roland Koebler r.koeb...@yahoo.de wrote: Hmm, here it *is* completely broken. I've attached a minimized config-file. If the $HTTP-section or the ssl.ca-file-line is removed, I can connect to lighttpd with SSL again; but if they are there, no

Bug#729555: lighttpd: SSL/SNI completely broken!

2013-11-14 Thread Stefan Bühler
Hi, On Thu, 14 Nov 2013 14:41:32 +0100 Roland Koebler r.koeb...@yahoo.de wrote: My guess is that the two private CAs you configured have a name (Issuer/Subject) conflict; in that case openssl probably can't figure out which one to use. that sounds reasonable, since I now figured out that

Bug#729555: lighttpd: SSL/SNI completely broken!

2013-11-15 Thread Stefan Bühler
Hi again. The following is my own opinion, and does not reflect an upstream consensus. On Thu, 14 Nov 2013 18:40:30 +0100 Roland Koebler r.koeb...@yahoo.de wrote: Hi, This is a loop. yes and no: It's not exactly a loop, since the two certificates belong to certificate-chains of two

Bug#602079: Replace Mono-provided Npgsql with official Npgsql

2013-09-27 Thread Stefan Bühler
Hi. The Npgsql contained in mono is crap. See https://github.com/mono/mono/blob/master/mcs/class/Npgsql/Npgsql/NpgsqlFactory.cs#L51 The usage of casts in that place should ring all alarm bells... and ofc they don't work: System.InvalidCastException Cannot cast from source type to destination

Bug#739896: Recommends: spawn-fcgi violates Debian Policy

2014-02-23 Thread Stefan Bühler
Hi, On Sun, 23 Feb 2014 17:29:11 +0100 Frank Luithle f.luit...@gmail.com wrote: Dear Maintainer, lighttpd should not Recommend spawn-fcgi, as that package is not needed at all unless the user wants to actually use the FCGI interface. Debian Policy prescribes that The Recommends field

Bug#748329: p11-kit fails to build on wheezy with automake 1.12

2014-05-16 Thread Stefan Bühler
Package: p11-kit Version: 0.20.2-5 Hi, p11-kit from jessie fails to build with automake 1.11 from debian wheezy. (Also this is why I think dh-autoreconf is bad). You need a manual additional dependency on automake = 1.12 due to serial-tests (or find a better patch for enable_locale.diff and

Bug#753276: lighttpd: FTBFS when using cowbuilder

2014-06-30 Thread Stefan Bühler
Hi, On Sun, 29 Jun 2014 23:45:40 +0100 Michael Tautschnig m...@debian.org wrote: Package: lighttpd Version: 1.4.35-2 Severity: wishlist Usertags: goto-cc During a rebuild of all Debian packages in a clean sid chroot (using cowbuilder and pbuilder) the build failed with the following

Bug#758866: Upstream missing / dependency

2014-08-22 Thread Stefan Bühler
Package: libconstantine-java Version: 0.7-5 Hi, the Homepage link (http://github.com/wmeissner/jnr-constants/) is broken; maybe https://github.com/jnr/jnr-constants is upstream now? Also is the dependency on default-jre really necessary or would default-jre-headless do? Because of this jenkins

Bug#622905: spawn-fcgi: No init.d script provided

2014-06-05 Thread Stefan Bühler
Hi, running the single php backend with the standard user is usually done by the web-server package. spawn-fcgi is about doing it better, which involves more work (setting up different user accounts and so on). Also using init scripts is not the recommended way, runit / daemontools is better

Bug#750653: new upstream release

2014-06-05 Thread Stefan Bühler
Package: spawn-fcgi Version: 1.6.3 Hi, I just released spawn-fcgi 1.6.4. If you want you can take look at https://build.opensuse.org/package/show/home:stbuehler/spawn-fcgi for updated packages (fixing some lintian warnings). I tried to keep the package simple and the dependencies low so it

Bug#750920: missing dependency, broken interpreter

2014-06-08 Thread Stefan Bühler
Package: attic Version: 0.10-1 Severity: grave Hi, attic uses #!/usr/bin/python3 as interpreter, but has native (cython) modules that were compiled with a certain python3 version (3.3 in the archive, but depends on python3-dev version at build time). As testing now switched to 3.4 as default,

Bug#750920: missing dependency, broken interpreter

2014-06-12 Thread Stefan Bühler
Hi, On Thu, 12 Jun 2014 01:49:37 -0400 Scott Kitterman deb...@kitterman.com wrote: On Sunday, June 08, 2014 15:00:00 Stefan Bühler wrote: Hi, attic uses #!/usr/bin/python3 as interpreter, but has native (cython) modules that were compiled with a certain python3 version (3.3

Bug#754909: sogo can't display mail anymore

2014-07-15 Thread Stefan Bühler
Package: sogo Version: 2.2.5-3 Hi, sogo can't display mail anymore; I get this in the log: Error (objc-load):/usr/lib/GNUstep/SOGo/MailPartViewers.SOGo/./MailPartViewers: undefined symbol: __objc_class_name_SOGoMailBodyPart Error (objc-load):/usr/lib/GNUstep/SOGo/MailerUI.SOGo/./MailerUI:

Bug#741493: lighttpd: SA_2014_01

2014-03-16 Thread Stefan Bühler
. (I'm not happy with two ids anyway, but splitting the patch only makes it worse.) b) If you can't copy utf8 chars, s/ü/ue/, s/ä/ae/, s/ö/oe/ :) regards, Stefan Bühler -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas

Bug#765702: lighttpd: Disable SSL 3.0

2014-10-17 Thread Stefan Bühler
Hi, On Fri, 17 Oct 2014 14:39:52 +0200 Christian Tacke christian.tacke+debian@cosmokey.com wrote: Hi, looking at CVE-2014-3566 (POODLE) it seems a very good idea to finally disable SSL 3.0 by default (secure by default). Please test attached patch. I'd say go with this instead:

Bug#765806: Some patches to get cgit special stuff working in debian

2014-10-18 Thread Stefan Bühler
Package: cgit Version: 0.10.2.git2.0.1-3 Hi, thanks for packaging. I have some old patches from my own packaging efforts (https://build.opensuse.org/package/show/home:stbuehler/cgit): * 0001-assume-highlight-version-3-in-filter-script.patch this one is important and should be straight

Bug#774644: lighttpd: fails to start (with no message given) when fastcgi-php module is enabled

2015-01-05 Thread Stefan Bühler
On Mon, 05 Jan 2015 12:39:42 -0500 David Z unimportantdav...@gmail.com wrote: Package: lighttpd Version: 1.4.31-4+deb7u3 Severity: important A simple dependency fix, lighttpd package should simply add a dependency for php5-cgi No. I don't think you understand what dependencies are for.

Bug#765379: gcc-4.7 should not ship with jessie

2015-03-18 Thread Stefan Bühler
Hi, this was a bad one; gcc-4.9-base from jessie breaks gcc-4.7-base from wheezy, so you had to update gcc-4.7-base to jessie/unstable for a stable/testing mix as soon as some package required gcc-4.9-base from testing. For now using gcc-4.7-base from unstable seems to work; wheezy/jessie mix is

Bug#789856: lighttpd: FTBFS with perl 5.22: test failures

2015-07-04 Thread Stefan Bühler
Hi Dominic, perl-modules-5.22 doesn't include the CGI module, formerly libcgi-pm-perl, which apparently gets replaced by perl-modules 5.20.2-6. As soon as you fix perl-modules-5.22 it should work again. (Also I couldn't even install libcgi-pm-perl with perl 5.22, needed to go for cpan to

Bug#792140: phabricator postinst should respect dpkg-statoverride

2015-08-08 Thread Stefan Bühler
Hi, On Sun, 12 Jul 2015 00:37:31 +0200 Stefan Bühler stbueh...@lighttpd.net wrote: Package: phabricator Version: 0~git20150613-1 phabricator postinst should respect dpkg-statoverride (and not just chown stuff); users should have the choice to run php for phabricate as a separate user

Bug#801994: hosts stuck in refresh

2015-10-26 Thread Stefan Bühler
Hi, On Mon, 26 Oct 2015 17:51:25 +0100 Patrick Matthäi <pmatth...@debian.org> wrote: > Am 16.10.2015 um 20:23 schrieb Stefan Bühler: > > Package: apt-dater > > Version: 1.0.2+git20150804-1 > > > > Hi, > > > > every host I refresh stays in refre

Bug#802680: Acknowledgement (lighttpd: server.error-handler-404 broken, returns status code 200)

2015-10-25 Thread Stefan Bühler
Hi, On Thu, 22 Oct 2015 18:23:22 +0100 Jonathan Dowland wrote: > The relevant upstream docs say > > "You can use a dynamic or static page for the handler. If you use a > static page, the server will return a 404 HTTP status code with the > content of your static page." > >

Bug#801994: hosts stuck in refresh

2015-10-16 Thread Stefan Bühler
Package: apt-dater Version: 1.0.2+git20150804-1 Hi, every host I refresh stays in refresh forever, until i force close apt-dater and restart. after a restart it seems to have the correct package states. On the server I saw "/usr/bin/perl /usr/bin/apt-dater-host refresh" running at first, and

Bug#792136: phabricator conflicts with php5-mysqlnd

2015-07-11 Thread Stefan Bühler
Package: phabricator Version: 0~git20150613-1 phabricator depends on php-mysql | php5-mysqli; php5-mysqlnd should be allowed too, unless it actually doesn't work with it. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact

Bug#792140: phabricator postinst should respect dpkg-statoverride

2015-07-11 Thread Stefan Bühler
Package: phabricator Version: 0~git20150613-1 phabricator postinst should respect dpkg-statoverride (and not just chown stuff); users should have the choice to run php for phabricate as a separate user phabricator-php instead of www-data. -- To UNSUBSCRIBE, email to

Bug#797917: clang should use the new CXX11_ABI

2015-09-27 Thread Stefan Bühler
Control: forwarded -1 https://llvm.org/bugs/show_bug.cgi?id=23529 Control: found -1 clang-3.4/1:3.4.2-15 Control: found -1 clang-3.6/1:3.6.2-1 Control: found -1 clang-3.7/1:3.7-2 Control: found -1 clang-3.8/1:3.8~svn247576-1 Hi, I've been trying to fix this, see the upstream bug report and

Bug#801994: hosts stuck in refresh

2015-11-22 Thread Stefan Bühler
Hi, I just took a look at the source and found the problem; see the attached patch. regards, Stefan Description: fix hosts stuck in refresh G_FILE_MONITOR_SEND_MOVED might trigger G_FILE_MONITOR_EVENT_MOVED instead of G_FILE_MONITOR_EVENT_DELETED + G_FILE_MONITOR_EVENT_CREATED, and MOVED is

Bug#813000: apt complains about corrupted index files even after multiple updates

2016-01-30 Thread Stefan Bühler
Hi, On Sat, 30 Jan 2016 15:03:27 +0100 Julian Andres Klode <j...@debian.org> wrote: > On 30 January 2016 at 13:42, Stefan Bühler <stbueh...@web.de> wrote: > > [...] > > ==890== Conditional jump or move depends on uninitialised value(s) > > ==890==at 0x4F

Bug#813000: apt complains about corrupted index files even after multiple updates

2016-01-30 Thread Stefan Bühler
Hi, On Thu, 28 Jan 2016 12:53:18 + Rohan Garg wrote: > Package: apt > Version: 1.2.1 > Severity: important > > Dear Maintainer, > > It seems that after the 1.2.1 update apt fails to install packages > even after multiple 'apt update' calls. > > I constantly see this

Bug#815138: sympa-archiver loops with encrypted messages

2016-02-19 Thread Stefan Bühler
Package: sympa Version: 6.1.23~dfsg-2 Hi, when trying to archive an encrypted messages, sympa will try to "clean" the message, but as it doesn't lookup the list context in Message->new (due to $noxsympato = 1) it doesn't pass the list to tools::smime_decrypt - which then tries to use the keys

Bug#815148: sympa fails to send encrypted messages: Unable to send message to list

2016-02-19 Thread Stefan Bühler
Package: sympa Version: 6.1.23~dfsg-2 Hi, sympa fails to send encrypted messages due to a bug in mail.pm:609; you should not dereference array-references in $#{...}, it takes the reference directly (according to my tests. I couldn't find official documentation on it, just an example in

Bug#815148: sympa fails to send encrypted messages: Unable to send message to list

2016-03-03 Thread Stefan Bühler
Hi, while my first patch fixes the syntax error, the logic in that function is still completely flawed: it will return an error if there is more than one subscriber when it has to re-encrypt the message. Please see attached patch for a fix which actually can handle more than one subscriber; but

Bug#821787: cleanup libusb when open fails

2016-04-19 Thread Stefan Bühler
Package: libccid Version: 1.4.22-1 Tags: patch Severity: important Hi, after suspend/resume pcscd burns a core: --- [pid 23458] poll([{fd=6, events=POLLIN}, {fd=5, events=POLLIN}], 2, 4294967295) = 1 ([{fd=5, revents=POLLIN}]) [pid 23458] recvmsg(11, 0x7f0332553d80, 0) = -1 EAGAIN (Resource

Bug#836822: ocsptool --ask output corrupted

2016-09-06 Thread Stefan Bühler
Package: gnutls-bin Version: 3.3.8-6+deb8u3 The output file containing the DER-encoded OCSP response starts with a newline; ocsptool itself can't read the file anymore, failing with: importing response: ASN1 parser: Error in TAG. This was fixed upstream in commit e95d7d1a (first released with

Bug#836371: ocsptool --ask segfault

2016-09-02 Thread Stefan Bühler
Package: gnutls-bin Version: 3.5.3-3 Severity: important Hi, the "STARTTLS-fix" makes ocsptool segfault as it tries to use a NULL session. I think the following upstream commit tries to fix it, but did not test it:

Bug#835342: curl or git clone commands throws "gnutls_handshake() failed" on https targets

2016-08-28 Thread Stefan Bühler
Hi Marcelo, On Fri, 26 Aug 2016 10:30:51 -0400 "marcelomen...@gmail.com" wrote: > 2016-08-25 13:25 GMT-04:00 Andreas Metzler : > > On 2016-08-24 "marcelomen...@gmail.com" > > wrote: > >> Package: libgnutls30 > >> Version:

Bug#844497: seccomp "Invalid argument" due to old library version

2016-11-16 Thread Stefan Bühler
Package: systemd Version: 232-3 Hi, pdns.service (from pdns-server in testing) didn't start anymore with this message: pdns.service: Failed at step SECCOMP spawning /usr/sbin/pdns_server: Invalid argument (See http://sources.debian.net/src/pdns/4.0.1-5/pdns/pdns.service.in/ for the service

Bug#844496: seccomp "Invalid argument" due to old library version

2016-11-16 Thread Stefan Bühler
Package: libseccomp Version: 2.3.1-2 Hi, pdns.service (from pdns-server in testing) didn't start anymore with this message: pdns.service: Failed at step SECCOMP spawning /usr/sbin/pdns_server: Invalid argument Updating libseccomp2 from 2.1.1-1 (stable) to 2.3.1-2 (testing) fixed it. systemd

Bug#846917: fix debian packaging for lighttpd 1.4.43

2016-12-04 Thread Stefan Bühler
Package: lighttpd Version: 1.4.43-1 Severity: serious Hi, the debian package for 1.4.43 is in a very sad state (one could say similar to the upstream release itself...). See attached patch for what we're using to build packages for https://debian.lighttpd.net/ - debian stable doesn't know

Bug#846917: fix debian packaging for lighttpd 1.4.43

2016-12-04 Thread Stefan Bühler
Hi again, adding "Multi-Arch: foreign" to lighttpd-doc should fix a lintian warning. To fix the build hardening warnings I added this to the configure call: CPPFLAGS_FOR_BUILD="$(shell dpkg-buildflags --get CPPFLAGS)" \ CFLAGS_FOR_BUILD="$(shell dpkg-buildflags --get CFLAGS)" \

Bug#849813: zfs-zed.service can't start

2017-01-05 Thread Stefan Bühler
On Sat, 31 Dec 2016 12:24:20 + Rho YounJae wrote: > Package: zfs-zed > Version: 0.6.5.8-2~bpo8+1 > Severity: minor > > Dear Maintainer, > > zfs-zed.service can't start since there is no /sbin/zed This bug is also present in testing, and a package with the only purpose of

Bug#857255: lighttpd: mod_scgi: out of bounds read in scgi_demux_response

2017-03-09 Thread Stefan Bühler
Hi Helmut, On 03/09/2017 10:06 AM, Helmut Grohne wrote: > Package: lighttpd > Version: 1.4.45-1 > Tags: security patch > > While debugging a problem with lighttpd on behalf of my current employer > Intenta GmbH, I found an out of bounds read. > >

Bug#870069: orig-tarball-missing-upstream-signature error breaks rebuilding existing packages and more

2017-07-29 Thread Stefan Bühler
Package: lintian Version: 2.5.52 Hi, I think "error" is a rather unfortunate choice for the severity level of "orig-tarball-missing-upstream-signature". * I have some (existing) packages uploaded on build.opensuse.org, and they now fail to build for "Debian_Next" (buster). I'd rather avoid

Bug#863981: check_ping uses IPv6 with -4

2017-07-11 Thread Stefan Bühler
Hi Jan, On 07/11/2017 12:29 PM, Jan Wagner wrote: > Dear Stefan, > > Am 11.07.17 um 11:07 schrieb Stefan Bühler: >> You didn't get the issue. I know very well how to call check_ping with >> -4 - I can do that with my local config. But check_ping -4 DOES NOT >> cal

Bug#863981: check_ping uses IPv6 with -4

2017-07-11 Thread Stefan Bühler
Hi Jan, On 07/11/2017 09:12 AM, Jan Wagner wrote: > Hi Stefan, > > thanks for bringing this to our attention. > > Am 02.06.2017 um 18:39 schrieb Stefan Bühler: >> check_ping doesn't forward the "-4" option to ping, and ping prefers >> IPv6 now (i.e. pr

Bug#867016: fails to handle filenames longer than 199 bytes

2017-07-03 Thread Stefan Bühler
Package: cruft-ng Version: 0.4.4 Hi, I have some local packages which use filenames longer than 200 bytes; it would be nice if cruft-ng would handle theses in a sane way. Changing SIZEBUF to 4096 in dpkg_popen.cc:70 should fix it. cheers, Stefan

Bug#866362: dash.preinst uses bash

2017-06-29 Thread Stefan Bühler
Package: dash Version: 0.5.8-2.4 Hi, the dash.preinst script starts with: #!/bin/bash Is there any reason for this madness? :) If there is a reason it might be worth documenting it in the script; at a first glance the script doesn't look like it is using bashisms to me. As bash Pre-Depends on

Bug#866387: custom filters for missing files

2017-06-29 Thread Stefan Bühler
Package: cruft-ng Version: 0.4.4+b1 Severity: whishlist Hi, it seems empty directories sometimes get missing in dpkg. Not sure yet whether this is a bug and if so, in which package. # cruft-ng cruft report: Thu 29 Jun 2017 11:40:30 AM UTC missing: dpkg

Bug#866387: custom filters for missing files

2017-06-29 Thread Stefan Bühler
Hi, On 06/29/2017 02:11 PM, Alexandre Detiste wrote: > Hi, > > When I took over cruft, I realized support for "filters-miss/" has never > been fully implemented; so it hasn't been re-implemented in cruft-ng: > > See here: nothing > https://sources.debian.net/src/cruft/0.9.12/filters-miss/ >

Bug#861313: kernel BUG with kvm

2017-04-27 Thread Stefan Bühler
Package: linux-image-3.16.0-4-amd64 Version: 3.16.43-1 Severity: serious Hi, upgrading to 3.16.43-1 led to a "kernel BUG" after kvm virtual machines started. Downgrading to 3.16.39-1+deb8u2 fixed the issue. The "BUG" lines in short (see attached file for full log): --- Apr 27 11:11:42 audria

Bug#862398: build wks client and server tools

2017-05-12 Thread Stefan Bühler
Package: gnupg2 Version: 2.1.18-8 Severity: wishlist Tags: patch Hi, it would be nice to build and have packages for the gpg-wks-* tools. It seems there was already done some work in https://anonscm.debian.org/git/pkg-gnupg/gnupg2.git/log/?h=dev/wks I rebased that commit to the

Bug#862236: Xen jessie testing

2017-05-11 Thread Stefan Bühler
On Thu, 11 May 2017 11:00:30 +0100 Ian Jackson wrote: > [...] > > The only place this seems to be used is to prepend it to > the LD_LIBRARY_PATH in force during execution of the hotplug scripts. > > This is inherited from upstream, where it is needed (I think)

Bug#862236: xen-utils-common hotplugpath.sh has architecture dependent bits

2017-05-10 Thread Stefan Bühler
Package: xen-utils-common Version: 4.4.1-9+deb8u9 Severity: serious Hi, xen-utils-common contains /etc/xen/scripts/hotplugpath.sh, which contains the architecture dependent path LIBDIR. I just noticed because my etckeeper told me: --- diff --git a/xen/scripts/hotplugpath.sh

Bug#865421: Purging old postgres stops all instances

2017-06-21 Thread Stefan Bühler
Package: postgresql-client-common Version: 181 Hi, I installed postgresql-9.6, upgraded the cluster (dropping the new empty one, pg_upgradecluster, dropping the old one), and then purged postgresql-9.4, and suddenly my 9.6 cluster is down (probably triggers with simple remove too). The

Bug#839575: hangs waiting for openssl

2017-05-20 Thread Stefan Bühler
Hi, tinyca hangs due to a regression in openssl, fixed in: https://github.com/openssl/openssl/commit/888adbe064556ff5ab2f1d16a223b0548696614c The tinyca code quality is still very low - very close to unacceptable for something handling private keys and crypto. * it builds strings to

Bug#862398: [pkg-gnupg-maint] Bug#862398: build wks client and server tools

2017-05-18 Thread Stefan Bühler
Hi dkg, On 05/15/2017 10:04 PM, Daniel Kahn Gillmor wrote: > Hi Stefan-- > > On Fri 2017-05-12 12:37:03 +0200, Stefan Bühler wrote: >> it would be nice to build and have packages for the gpg-wks-* tools. >> >> It seems there was already done some work in >> >

Bug#803259: support for deprecated openssl features

2017-05-18 Thread Stefan Bühler
Hi, I think a separate openssl-insecure package with an (possibly statically linked) "/usr/bin/openssl-insecure" binary should be safe enough that people don't "accidentally" use it. If you would want to really make sure it isn't abused you'd put it somewhere in /usr/lib/openssl-insecure/.

Bug#863221: [pkg-gnupg-maint] Bug#863221: dirmngr doesn't reload resolv.conf

2017-05-24 Thread Stefan Bühler
Hi, On 05/24/2017 02:14 PM, Werner Koch wrote: > Hi! > > When you switch the laptop connection you should flush dirmngr anyway > and thus I do not consider the need to do this just for the resolver. > > gpgconf --reload dirmngr > > in the ifup script should do that job. Note that gpgconf

Bug#863221: dirmngr doesn't reload resolv.conf

2017-05-23 Thread Stefan Bühler
Package: dirmngr Version: 2.1.18-6 Hi, dirmngr doesn't reload /etc/resolv.conf but is a long-living process. For laptop users resolv.conf might change more than once a day, and having to remember or even knowing you have to kill/SIGHUP dirmngr is not helping the gpg usecase... When using

Bug#860055: ITP: dino -- modern XMPP client

2017-05-19 Thread Stefan Bühler
Hi, I gave packaging dino a try: https://build.opensuse.org/package/show/home:stbuehler/dino * "dino" is already used as package name. I went for "dino-xmpp-client" instead. * I bundled libsignal-protocol-c as a separate tar ball. Longterm #840366 should be used instead ofc. * It

Bug#863981: check_ping uses IPv6 with -4

2017-06-02 Thread Stefan Bühler
Package: monitoring-plugins-basic Version: 2.2-3 Hi, check_ping doesn't forward the "-4" option to ping, and ping prefers IPv6 now (i.e. probably whatever is configured through gai.ping). Giving upstream only allows configuring "ping-command" and "ping6-command" (there is no explicit

Bug#714726: wrong (as in: release-specific) "Suite:" entry in backports Release file

2017-06-18 Thread Stefan Bühler
Hi, On Tue, 6 Jun 2017 13:33:03 +0200 Stefan Bühler wrote: > Hi, > > On Sun, 26 Apr 2015 22:01:03 +0200 Stefano Zacchiroli <z...@debian.org> > wrote: > > Heya, > > > > On Tue, Jul 02, 2013 at 10:30:40AM +0200, Stefano Zacchiroli wrote: > > > ./whe

Bug#861313: fixed in linux 3.16.43-2

2017-05-01 Thread Stefan Bühler
Hi, the update indeed fixes the issue. Thanks! Cheers, Stefan On 04/30/2017 01:36 PM, Debian Bug Tracking System wrote: > This is an automatic notification regarding your Bug report > which was filed against the src:linux package: > > #861313: kernel BUG with kvm > > It has been closed by Ben

Bug#714726: wrong (as in: release-specific) "Suite:" entry in backports Release file

2017-06-06 Thread Stefan Bühler
Hi, On Sun, 26 Apr 2015 22:01:03 +0200 Stefano Zacchiroli wrote: > Heya, > > On Tue, Jul 02, 2013 at 10:30:40AM +0200, Stefano Zacchiroli wrote: > > ./wheezy-backports/Release:Suite: wheezy-backports > > ./wheezy-backports/Release:Codename: wheezy-backports > > > > as you

Bug#877870: lighttpd: "reload" action breaks further actions

2017-10-06 Thread Stefan Bühler
Hi, (upstream) 1.4.46 will contain an updated unit file which includes a reload action, see https://git.lighttpd.net/lighttpd/lighttpd1.4.git/commit/?h=0ae6bab4a97f12a0c93200df36ac1741696eeed5 for details. (Afaics the debian packages installs the upstream unit file). On 10/06/2017 03:53

Bug#838473: lighttpd: Not reliably stoppable using systemd service file

2017-10-03 Thread Stefan Bühler
Hi, On 09/21/2016 12:22 PM, Lukas Martini wrote: > Package: lighttpd > Version: 1.4.35-4+deb8u1 > Severity: normal > > When running 'systemctl stop lighttpd', sometimes the command will seemingly > complete successfully, but doesn't actually stop lighttpd. Similarly, after > 'systemctl restart

Bug#878432: mailman broken held requests due to log problems

2017-10-13 Thread Stefan Bühler
Package: mailman Version: 1:2.1.23-1+deb9u1 Hi, my /var/log/mailman directory had mode "drwxr-sr-x" (owned by root:list); not all log files exist. When a new request came in that mailman tried to held back, it couldn't create the log file "vette" and crashed with: --- Oct 13 16:27:23 2017

Bug#860055: Inquiry about packaging progress

2017-08-30 Thread Stefan Bühler
Hi Marcus, On 08/29/2017 09:58 PM, Marcus Poller wrote: > Dear Stefan, > > gentle ping? What's the status of your packaging work? I'ld love to use this > package. This ITP (#860055) is owned by Dominik George. I only wanted to give dino a short try, and preferred to have a package for this.

Bug#860055: Inquiry about packaging progress

2017-08-30 Thread Stefan Bühler
Hi Christoph, On 08/30/2017 07:27 PM, Christoph Biedl wrote: > Stefan Bühler wrote... > >> This ITP (#860055) is owned by Dominik George. > > Ups, I indeed mis-directed Marcus here. > >> I only wanted to give dino a short try, and preferred to have a package >&g

Bug#877039: ":80" is appended to socket file name

2017-10-01 Thread Stefan Bühler
Hi Jonathan, On 09/28/2017 01:23 AM, Jonathan Krebs wrote: > Package: lighttpd > Version: 1.4.45-1 > > If the server is bound to a socket in file system, three characters :80 are > appended to the file path, breaking my reverse proxy setup. > Minimal example: > > jonny@heron:/var/tmp/ltest$

Bug#876553: fixed in weechat 1.9.1-1

2017-09-27 Thread Stefan Bühler
Hi, are there any plans to fix this in stable (stretch) too? I disagree with the "Minor issue; requires a malicious IRC server" comment on https://security-tracker.debian.org/tracker/CVE-2017-14727 (even upstream classified it as "high severity"), and it seems the patch is easy to backport (no

Bug#860055: Inquiry about packaging progress

2017-09-02 Thread Stefan Bühler
Hi again, On 08/31/2017 12:17 AM, Christoph Biedl wrote: > Christoph Biedl wrote... > >> * The build failure on i386 (also seen on armhf) and probably >> all other 32bit archs needs to be fixed. > [...] This is fixed upstream now: https://github.com/dino/dino/commit/dc26841b9e I updated my

Bug#870069: orig-tarball-missing-upstream-signature error breaks rebuilding existing packages and more

2017-09-03 Thread Stefan Bühler
Hi, On 09/03/2017 06:20 AM, Paul Hardy wrote: > On Sat, Sep 2, 2017 at 1:41 PM, Chris Lamb wrote: >> ... >> See #870722. This was fixed in 4th August in: >> >> >> https://anonscm.debian.org/git/lintian/lintian.git/commit/?id=126157380dc0eba302f3d476b1cffc13f968c207 > > That

Bug#881329: systemd service

2017-11-10 Thread Stefan Bühler
Hi again, I had to add RestartPreventExitStatus=1 in [Service], because on certain failures (e.g. broken permissions in the lock directory) mailmanctl forks and exits (which systemd considers a successful start), and then the fork exits with status code 1. Because it was started "successfully",

Bug#881329: systemd service

2017-11-10 Thread Stefan Bühler
Package: mailman Version: 1:2.1.23-1+deb9u1 Hi, it would be nice if the mailman package offered a real systemd service; that way it could be automatically restarted on crashes (e.g. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505638), and `systemctl list-units --failed` would complain

Bug#883870: warning: Negative repeat count does nothing

2017-12-08 Thread Stefan Bühler
Package: libtext-quoted-perl Version: 2.09-1 Hi, rt shows warnings like these in the log: Negative repeat count does nothing at /usr/share/perl5/Text/Quoted.pm line 244. Upstream bug is: https://rt.cpan.org/Public/Bug/Display.html?id=111986 - seems dead to me. Attached patch silences the

Bug#879496: New upstream release 1.4.46 available

2017-10-22 Thread Stefan Bühler
Package: lighttpd Version: 1.4.45-1 Hi, we just released 1.4.46. In https://build.opensuse.org/package/show/home:stbuehler:lighttpd-1.4.x/lighttpd I provide an updated package; as always our goal is to build on older distributions too, while sticking to the official package as close as

Bug#879496: New upstream release 1.4.46 available

2017-10-22 Thread Stefan Bühler
Hi again, On 10/22/2017 12:15 PM, Stefan Bühler wrote: > [...] > > Build service doesn't provide the source gpg signature yet, > so to download the source package use: > >wget -O lighttpd_1.4.46.orig.tar.xz.asc > https://download.lighttpd.net/lighttpd/releases-

Bug#904741: lighttpd: create-mime.assign.pl skips mime types with capital letters

2018-07-29 Thread Stefan Bühler
Hi, this was fixed upstream (in 1.4.36) a long time ago, see: https://github.com/lighttpd/lighttpd1.4/commit/8db141a1b30e5808679e1f341c6ca914be91bed8 We imported the script from debian and extended it heavily. The debian package is still using the original debian one. cheers, Stefan On

Bug#893516: postfix: check shouldn't complain about outdated chroot if it isn't used

2018-03-19 Thread Stefan Bühler
Package: postfix Version: 3.1.8-0+deb9u1 Hi, postfix-script (`service postfix check`) checks for outdated chroot, even if the chroot isn't used. But /usr/lib/postfix/configure-instance.sh only updates the chroot if it is used. Please either always update the chroot or skip the warnings if it

Bug#912358: lighttpd FTCBFS: unsatisfiable Build-Depends

2018-10-30 Thread Stefan Bühler
Hi. On 10/30/2018 06:02 PM, Helmut Grohne wrote: > Source: lighttpd > Version: 1.4.49-1.1 > Tags: patch > User: helm...@debian.org > Usertags: rebootstrap > > lighttpd fails to cross build from source. The first problem is > satisfying Build-Depends. Two dependencies are problematic: perl and >

Bug#912358: lighttpd FTCBFS: unsatisfiable Build-Depends

2018-10-30 Thread Stefan Bühler
Hi, On 10/30/2018 09:33 PM, Helmut Grohne wrote: > On Tue, Oct 30, 2018 at 08:57:04PM +0100, Stefan Bühler wrote: >>> lighttpd fails to cross build from source. The first problem is >>> satisfying Build-Depends. Two dependencies are problematic: perl and >>> libcgi

Bug#913742: ip6tables-save produces broken syntax, unable to load them

2018-11-14 Thread Stefan Bühler
"!" Systems trying to load previously saved rules on boot will not be able to load those rules, and may be either unreachable (if they set a strict policy before) or completely open. -- Stefan BühlerMail/xmpp: stefan.bueh...@tik.uni-stuttgart.de Netze und Kommunikationssysteme

Bug#917347: Obsolete build dependency on libssl1.0-dev

2018-12-26 Thread Stefan Bühler
Hi, On 12/26/18 1:01 PM, Moritz Muehlenhoff wrote: > Source: lighttpd > Severity: normal > > Your package uses "libssl-dev | libssl1.0-dev" as a build dependency > on OpenSSL. openssl1.0 is scheduled for removal, the alternate build > dependency can now be removed. Please keep in mind that some

Bug#924005: client certificate verification regression with puppetdb

2019-03-08 Thread Stefan Bühler
system ii puppetdb 6.2.0-3 all Puppet data warehouse --- cheers, Stefan -- Stefan BühlerMail/xmpp: stefan.bueh...@tik.uni-stuttgart.de Netze und Kommunikationssysteme der Universität Stuttgart (NKS) https://www.tik.uni-stuttgart.de/Telefon

Bug#929608: pmciscoios parser module not enabled

2019-05-28 Thread Stefan Bühler
Hi, On 5/28/19 4:32 PM, Michael Biebl wrote: > On 27.05.19 10:26, Stefan Bühler wrote: >> Package: rsyslog >> >> Hi, >> >> please enable the pmciscoios parser module. > > Can you provide a bit more feedback where and why you want to use this > modul

Bug#929608: pmciscoios parser module not enabled

2019-05-27 Thread Stefan Bühler
Package: rsyslog Hi, please enable the pmciscoios parser module. cheers, Stefan -- Stefan BühlerMail/xmpp: stefan.bueh...@tik.uni-stuttgart.de Netze und Kommunikationssysteme der Universität Stuttgart (NKS) https://www.tik.uni-stuttgart.de/Telefon: +49 711 685 60854

Bug#714726: wrong (as in: release-specific) "Suite:" entry in backports Release file

2019-06-20 Thread Stefan Bühler
| head -n4 Origin: Debian Label: Debian Suite: testing Codename: buster The Suite for buster-backports should be "testing-backports" right now and become "stable-backports" when buster gets released. cheers, Stefan On 18.06.17 09:46, Stefan Bühler wrote: > Hi, > >

<    1   2   3   >