Bug#828564: sx: FTBFS with openssl 1.1.0

2016-12-06 Thread Sebastian Andrzej Siewior
On 2016-12-05 22:36:39 [+0100], László Böszörményi (GCS) wrote: > Hi Sebastian, Hi László, > On Mon, Dec 5, 2016 at 10:20 PM, Sebastian Andrzej Siewior > > Okay. What do we do here? Any idea Laszlo? > > I could try to cherry-pick the three patches into the currect 2.0 but I >

Bug#828564: sx: FTBFS with openssl 1.1.0

2016-12-05 Thread Sebastian Andrzej Siewior
On 2016-10-09 11:38:37 [+0300], Török Edwin wrote: > Dear Maintainer, > > Patches to build with both OpenSSL 1.0.x, and 1.1.0 are available in the > upstream git repository: > https://gitweb.skylable.com/gitweb/?p=sx.git;a=commitdiff;h=5acd940e97aa1f2bd1b3fdd41f4c98a5783fcb44 > https://gitweb.sky

Bug#828258: canl-c/gridsite: FTBFS with openssl 1.1.0

2016-12-03 Thread Sebastian Andrzej Siewior
On 2016-12-03 12:14:38 [+0100], Stefan Fritsch wrote: > On Friday, 2 December 2016 00:16:24 CET Sebastian Andrzej Siewior wrote: > > is there a reason for gridsite not to go for 3.0 (or backport the > > change) and libssl-dev? Apache stays 1.0 but does not expose anything > >

Bug#828371: lastpass-cli openssl 1.1.0 now has PR upstream

2016-12-01 Thread Sebastian Andrzej Siewior
On 2016-11-02 22:13:04 [+0100], Andreas Henriksson wrote: > Hello! Hi, > > I've sent a PR to upstream that fixes building against OpenSSL 1.1.0. > Same patch should apply cleanly to the packaged version. could you please address the review comments and update your pull request? > Regards, > And

Bug#828258: canl-c/gridsite: FTBFS with openssl 1.1.0

2016-12-01 Thread Sebastian Andrzej Siewior
On 2016-11-15 20:22:10 [+0100], Stefan Fritsch wrote: > Hi again, Hi, > On Saturday, 12 November 2016 07:51:40 CET Stefan Fritsch wrote: > > If these two packages cannot transition to openssl 1.1.0 before apache2 > > does, I suggest that you build with openssl 1.0.2 explicitly and then > > downgra

Bug#846113: polygraph loses SSL support when compiled with OpenSSL 1.1

2016-11-30 Thread Sebastian Andrzej Siewior
.0. I actually spent more time writing this email than the patch. And I would like to avoid switching B-D now and looking at it again after the release. > cu > Adrian Sebastian >From dc21aa1a25fa59e3e667cff8487f971dd74a3d0a Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior Date: W

Bug#845729: libtspi-dev must not force OpenSSL 1.1 on packages that are not ready

2016-11-29 Thread Sebastian Andrzej Siewior
On 2016-11-26 11:31:49 [+0200], Adrian Bunk wrote: > Package: libtspi-dev > Version: 0.3.14+fixed1-1 > Severity: serious > Control: block 827061 by -1 > > libtspi-dev must not force OpenSSL 1.1 on packages that > are not ready for 1.1 > > At least opencryptoki (#828465) and tpm-tools (#828577) >

Bug#846113: polygraph loses SSL support when compiled with OpenSSL 1.1

2016-11-29 Thread Sebastian Andrzej Siewior
On 2016-11-28 16:49:35 [+0200], Adrian Bunk wrote: > Package: polygraph > Version: 4.3.2-4 > Severity: serious > Tags: patch > Control: block 827061 by -1 > > ... > checking for CRYPTO_lock in -lcrypto... no > checking for CRYPTO_add_lock in -lcrypto... no > ... > > Not a perfect solution but an

Bug#828351: inn2: FTBFS with openssl 1.1.0

2016-11-29 Thread Sebastian Andrzej Siewior
. Should I NMU it? Sebastian From: Sebastian Andrzej Siewior Date: Tue, 29 Nov 2016 21:10:31 +0100 Subject: [PATCH] cherry-pick patches for OpenSSL 1.1.0 support and TCP_NODELAY Signed-off-by: Sebastian Andrzej Siewior --- debian/changelog| 9 ++

Bug#828327: gnubiff: FTBFS due to missing #include

2016-11-28 Thread Sebastian Andrzej Siewior
On 2016-11-28 23:31:38 [+0200], Adrian Bunk wrote: > Control: retitle -1 gnubiff: FTBFS due to missing #include > Control: tags -1 patch fixed-upstream > Control: unblock 827061 by -1 > > I've confirmed that gnubiff builds fine with OpenSSL 1.1 > > The attached patch cherry-picks the missing cst

Bug#835811: closed by Dimitri John Ledkov (Bug#835811: fixed in libica 2.6.1-4)

2016-11-23 Thread Sebastian Andrzej Siewior
control: reopen -1 control: severity -1 important On 2016-11-22 17:06:05 [+], Debian Bug Tracking System wrote: >* Build-depend on libssl1.0-dev, upgrade to 1.1 requires v3.0 upstream > release. Closes: #835811 please keep this bug open and close once it builds against openssl 1.1.0.

Bug#844503: [Pkg-salt-team] Bug#844503: Acknowledgement (salt-call fails with libcrypto.so.1.1: undefined symbol: OPENSSL_no_config)

2016-11-18 Thread Sebastian Andrzej Siewior
On 2016-11-18 15:22:07 [+0100], Benjamin Drung wrote: > Instead of forcing salt to use OpenSSL 1.0, let's try to make it work > with OpenSSL 1.1. Adjusting the initialization to work with OpenSSL 1.1 > was quite easy. I forwarded the patch upstream to > https://github.com/saltstack/salt/pull/37772

Bug#828357: isync: FTBFS with openssl 1.1.0

2016-11-17 Thread Sebastian Andrzej Siewior
control: tags -1 patch fixed-upstream On 2016-07-24 12:01:29 [+0200], Oswald Buddenhagen wrote: > fixed in git on isync_1_2_branch. Upstream fixed it https://sourceforge.net/p/isync/isync/ci/41308e481466b91813f6765a0c92ad83fd9d1ab2/ In their 1.2 release branch which is available in exper

Bug#844503: Acknowledgement (salt-call fails with libcrypto.so.1.1: undefined symbol: OPENSSL_no_config)

2016-11-17 Thread Sebastian Andrzej Siewior
SSL_no_config the problem is that salt/rsax931.py loads the library manually and expects certain symbols which are no longer available in OpenSSL 1.1.0. And it loads the first libcrypto it finds plus has no dependency on openssl. Sebastian >From 67676f782796071a793ec1908de50c7b86e9fbee Mon Sep 17

Bug#828231: Building with OpenSSL 1.0.2 is sufficient for stretch

2016-11-16 Thread Sebastian Andrzej Siewior
Control: tags -1 - patch On 2016-11-10 12:31:00 [+0200], Adrian Bunk wrote: > > Not a perfect solution but sufficient for stretch is the following > change to use OpenSSL 1.0.2: > > --- debian/control.old2016-11-10 10:20:58.0 + > +++ debian/control2016-11-10 10:21:32.000

Bug#843988: stunnel4 segfaults (client mode)

2016-11-15 Thread Sebastian Andrzej Siewior
On 2016-11-14 22:43:16 [+0100], gregor herrmann wrote: > Yay, this looks good! So upstream came up with the patch attached after I forwaded mine. Can you please confirm whether this works or not? > Cheers, > gregor Sebastian diff --git a/src/prototypes.h b/src/prototypes.h index c196f92..86f4631

Bug#843988: stunnel4 segfaults (client mode)

2016-11-14 Thread Sebastian Andrzej Siewior
On 2016-11-14 22:43:16 [+0100], gregor herrmann wrote: > Control: tag -1 + patch > > On Mon, 14 Nov 2016 22:07:12 +0100, Sebastian Andrzej Siewior wrote: > > > On 2016-11-14 00:17:31 [+0100], gregor herrmann wrote: > > > Thanks, but nope, still the same: > > Wh

Bug#843988: stunnel4 segfaults (client mode)

2016-11-14 Thread Sebastian Andrzej Siewior
On 2016-11-14 00:17:31 [+0100], gregor herrmann wrote: > Thanks, but nope, still the same: What about this one? Sebastian >From b436cd6527a2a32bd94b67ff10363e45a2f52430 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior Date: Mon, 14 Nov 2016 21:03:24 + Subject: [PATCH] t

Bug#843988: stunnel4 segfaults (client mode)

2016-11-13 Thread Sebastian Andrzej Siewior
On 2016-11-11 16:05:05 [+0100], gregor herrmann wrote: > As soon as fetchnews connects, stunnel4 segfaults. I tried your config against a http server and mail server with no luck. > The messages in the syslog: > Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: > ptr=0x7f6340010430 a

Bug#844254: libesmtp: FTBFS with openssl 1.1.0

2016-11-13 Thread Sebastian Andrzej Siewior
Source: libesmtp Version: 1.0.6-4 Severity: serious Control: block 827061 by -1 OpenSSL 1.1.0 has been released. During a rebuild of all packages using OpenSSL this package succeeded to build but it should have failed. That is why this bug is coming so late. The build simply deactivated TLS suppor

Bug#843532: [Pkg-dns-devel] Bug#843532: dnssec-trigger: broken by OpenSSL 1.1.0

2016-11-10 Thread Sebastian Andrzej Siewior
On 2016-11-10 12:10:41 [+0100], Ondřej Surý wrote: > Sebastian, Hi Ondřej, > thanks for the patch. The 0.13~svn685-7 version in unstable includes > your patch, > and I would really appreciate if someone could test whether > dnssec-trigger now > works. I managed to get around to test it. So the i

Bug#828556: sslscan: FTBFS with openssl 1.1.0

2016-11-10 Thread Sebastian Andrzej Siewior
On 2016-11-10 12:10:04 [+0200], Adrian Bunk wrote: > On Thu, Sep 01, 2016 at 09:55:46PM +0200, Sebastian Andrzej Siewior wrote: > > control: forwarded -1 https://github.com/rbsec/sslscan/issues/108 > > Sebastian, Marvin, what is the status regarding getting this patch that > wa

Bug#843532: dnssec-trigger: broken by OpenSSL 1.1.0

2016-11-07 Thread Sebastian Andrzej Siewior
rks? I am confident but don't time todo it myself just now. Sebastian >From 05cd529e19d317b8bcc69f7d883873a27195b904 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior Date: Mon, 7 Nov 2016 20:59:11 + Subject: [PATCH] dnssec-trigger: openssl 1.1.0 fixup - SSL_OP_NO_SSLv2 / SSLv2 has

Bug#828299: fetchmail: FTBFS with openssl 1.1.0

2016-11-03 Thread Sebastian Andrzej Siewior
On 2016-11-03 23:39:32 [+0100], László Böszörményi (GCS) wrote: > OK, it remained the same then. May you try the work in progress > update[1]? I'm off for sleeping. :-/ yup, worked. > Thanks, > Laszlo/GCS Sebastian

Bug#828299: fetchmail: FTBFS with openssl 1.1.0

2016-11-03 Thread Sebastian Andrzej Siewior
On 2016-11-03 22:02:23 [+0100], László Böszörményi (GCS) wrote: > On Thu, Nov 3, 2016 at 8:48 PM, Sebastian Andrzej Siewior > wrote: > > On 2016-11-03 07:45:16 [+0100], Andreas Henriksson wrote: > > fetchmail builds against openssl 1.1.0. So we are good here. > > fetchmail

Bug#828299: fetchmail: FTBFS with openssl 1.1.0

2016-11-03 Thread Sebastian Andrzej Siewior
control: retitle: -1 fetchmail: FTBFS if building in parallel On 2016-11-03 07:45:16 [+0100], Andreas Henriksson wrote: > Hello Kurt Roeckx. Hi, > The failure in this build log didn't look like it was really openssl related. > I've tried rebuilding the package which succeded for me. > > Could yo

Bug#828440: moonshot-gss-eap: FTBFS with openssl 1.1.0

2016-11-03 Thread Sebastian Andrzej Siewior
On 2016-11-01 17:41:27 [-0400], Sam Hartman wrote: > Hi. Hi, > I'm sorry I didn't get a chance to respond to your other mail. > upstream has dealt with moonshot-gss-eap and moonshot-ui and I plan to > address the bugs there with a new upstream version. You could point that out in the relevant bug

Bug#828589: uw-imap: FTBFS with openssl 1.1.0

2016-11-02 Thread Sebastian Andrzej Siewior
someone that can test it and is using it. So far it seems only alpine does [0]. [0] http://sources.debian.net/src/alpine/2.20%2Bdfsg1-2/web/src/alpined.d/alpined.c/?hl=10831#L10831 > Kurt Sebastian >From b45c2495fffd431a4eee359c24a0b292c87bc33c Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej

Bug#828393: pull request applied upstream

2016-11-01 Thread Sebastian Andrzej Siewior
control: tags -1 fixed-upstream control: forwarded -1 https://github.com/libevent/libevent/pull/397 my understaning is that an updated version of this patch has been merged upstream. That is https://github.com/libevent/libevent/commit/3e9e0a0d46e4508e8782ec3787c6d86bab63046d Sebastian

Bug#828440: moonshot-gss-eap: FTBFS with openssl 1.1.0

2016-11-01 Thread Sebastian Andrzej Siewior
Attempted/moonshot-gss-eap_0.9.5-1_amd64-20160529-1451 this builds now. Do you have anything to verify? > Kurt Sebastian >From 50b12a010649c57ca7080cc728c8088abf53f73e Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior Date: Tue, 1 Nov 2016 20:41:46 + Subject: [PATCH] moonshot-gss-e

Bug#828579: trousers: FTBFS with openssl 1.1.0

2016-10-31 Thread Sebastian Andrzej Siewior
control: tags -1 patch On 2016-06-26 12:24:29 [+0200], Kurt Roeckx wrote: > OpenSSL 1.1.0 is about to released. During a rebuild of all packages using > OpenSSL this package fail to build. A log of that build can be found at: > https://breakpoint.cc/openssl-1.1-rebuild-2016-05-29/Attempted/trous

Bug#828506: pkcs11-helper: FTBFS with openssl 1.1.0

2016-10-31 Thread Sebastian Andrzej Siewior
control: forwarded -1 https://github.com/OpenSC/pkcs11-helper/pull/7 control: tags -1 patch On 2016-06-26 12:23:44 [+0200], Kurt Roeckx wrote: > OpenSSL 1.1.0 is about to released. During a rebuild of all packages using > OpenSSL this package fail to build. A log of that build can be found at: >

Bug#828259: cargo: FTBFS with openssl 1.1.0

2016-10-31 Thread Sebastian Andrzej Siewior
On 2016-06-26 12:21:14 [+0200], Kurt Roeckx wrote: > Source: cargo > Version: 0.9.0-1 > Severity: important > Control: block 827061 by -1 > > Hi, > > OpenSSL 1.1.0 is about to released. During a rebuild of all packages using > OpenSSL this package fail to build. A log of that build can be found

Bug#828552: spamassassin: FTBFS with openssl 1.1.0

2016-10-31 Thread Sebastian Andrzej Siewior
On 2016-10-29 14:15:30 [-0700], Noah Meyerhans wrote: > Control: tags -1 - patch + upstream > Control: forwarded -1 https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7361 > > Unfortunately, this patch breaks compatibility with OpenSSL < 1.1.0, as > the CRYPTO_zalloc function does not exist there.

Bug#828522: QT4 and OpenSSL 1.1.0: [was Re: OpenSSL 1.1.0]

2016-10-29 Thread Sebastian Andrzej Siewior
On 2016-10-29 23:26:49 [+0200], Kurt Roeckx wrote: > On Sat, Oct 29, 2016 at 10:32:34PM +0200, Sebastian Andrzej Siewior wrote: > > One thing that confuses me: Why has none > > of the libraries a dependency on libssl? > > From what I understand they use dlopen() and

Bug#828522: QT4 and OpenSSL 1.1.0: [was Re: OpenSSL 1.1.0]

2016-10-29 Thread Sebastian Andrzej Siewior
On 2016-08-30 12:40:12 [+0200], Gert Wollny wrote: > > Am Dienstag, den 30.08.2016, 08:51 +0200 schrieb Kurt Roeckx: > > On Tue, Jun 28, 2016 at 09:53:20PM +0200, Gert Wollny wrote: > > > > > > Thanks for the review.  > > Can I ask what the current state of this is? > > IIRC the last patch appli

Bug#828389: libcrypt-smime-perl: FTBFS with openssl 1.1.0

2016-10-27 Thread Sebastian Andrzej Siewior
control: tags -1 patch fixed-upstream control: forwarded -1 https://rt.cpan.org/Public/Bug/Display.html?id=118344 Crypt-SMIME-0.18 has the fix Sebastian

Bug#828466: opendkim: FTBFS with openssl 1.1.0

2016-10-27 Thread Sebastian Andrzej Siewior
Control: tags - patch builds. Further testing is welcome. Sebastian >From f6afa6be81eae0b149ad18a0642c67e75b148c69 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior Date: Thu, 27 Oct 2016 19:43:15 + Subject: [PATCH] opendkim: port to openssl 1.1.0 In configure.ac AC_SEARCH_L

Bug#839850: [Pkg-clamav-devel] Bug#839850: clamav: FTBFS with LLVM 3.8

2016-10-05 Thread Sebastian Andrzej Siewior
On 2016-10-05 20:06:13 [+0200], Emilio Pozuelo Monfort wrote: > configure: Using external LLVM > checking for supported LLVM version... no (3.8.1) > configure: error: LLVM < 3.7 required, but "3.8.1"(381) found > configure: error: Failed to configure LLVM, and LLVM was explicitly requested it is n

Bug#839019: gsoap: FTBFS with -j16

2016-09-27 Thread Sebastian Andrzej Siewior
Package: gsoap Version: 2.8.35-2 Severity: serious The package FTBFS with -j16: | make[5]: Entering directory '/<>/gsoap/src' | /bin/bash ../../ylwrap soapcpp2_yacc.y y.tab.c soapcpp2_yacc.c y.tab.h `echo soapcpp2_yacc.c | sed -e s/cc$/hh/ -e s/cpp$/hpp/ -e s/cxx$/hxx / -e s/c++$/h++/ -e s/c$/h/

Bug#836611: chromium: crash after upgrade 52.0.2743.116-2 -> 53.0.2785.89-1

2016-09-05 Thread Sebastian Andrzej Siewior
On 2016-09-04 21:37:45 [+0300], Stefanos Sofroniou wrote: > Weird...I have the same problem with 52.0.2743.116-2 and it happened a few > minutes ago when I tried to open multiple tabs at once. > > I'm using Debian testing 64-bit, fully updated. Fully updated unstable and it works again after goin

Bug#835090: [Pkg-openssl-devel] Bug#835090: libssl1.0.0: broken dependencies in backports

2016-08-22 Thread Sebastian Andrzej Siewior
On 2016-08-22 13:15:19 [+0200], Bernd Zeimetz wrote: > Hi, Hi, > if a package from backports depends on the libssl version from backports, > the openssl package won't be upgraded, resulting in > > /usr/bin/openssl: /usr/lib/x86_64-linux-gnu/libcrypto.so.1.0.0: version > `OPENSSL_1.0.1s' not found

Bug#833698: icedove: SIGSEGV, Segmentation fault in js::jit::HandleExceptionIon

2016-08-08 Thread Sebastian Andrzej Siewior
On 2016-08-08 17:50:38 [+0200], Carsten Schoenert wrote: > Hello Andrzej, Hi Carsten, > we will try, I was already thinking of that. > The problem at the end is this all is only a workaround in my eyes. The > source is lacking some fixups for getting compiled with gcc-6 without > regressions. I d

Bug#833698: icedove: SIGSEGV, Segmentation fault in js::jit::HandleExceptionIon

2016-08-08 Thread Sebastian Andrzej Siewior
On 2016-08-08 12:06:24 [+1200], jfp wrote: > Thread 1 "icedove" received signal SIGSEGV, Segmentation fault. > 0x73e007a1 in js::jit::SnapshotIterator::numAllocations > (this=0x7ffeb560) at ./mozilla/js/src/jit/JitFrames.cpp:2159 > 2159 ./mozilla/js/src/jit/JitFrames.cpp: No such file

Bug#778747: openssl: RFC 7465 says RC4 is broken, never to be used

2016-08-02 Thread Sebastian Andrzej Siewior
On 2015-02-22 11:44:37 [+0100], Kurt Roeckx wrote: > Even with RC4 enabled on both sides, it does provide something > secure that doesn't use RC4 as long as you don't don't touch the > defaults. And I've seen many applications that screw up the > defaults. As of openssl in experimental we don't h

Bug#825863: percona-xtradb-cluster-galera-2.x: should it be removed from Debian?

2016-06-08 Thread Sebastian Andrzej Siewior
retitle 825863 RM: percona-xtradb-cluster-galera-2.x -- RoQA; NPOASR; FTBFS; RC-buggy; unmaintained; low popcon severity 825863 normal reassign 825863 ftp.debian.org thanks Dear FTP-Master, please remove percona-xtradb-cluster-galera-2.x from unstable. It is RC-buggy and FTBFS (not to mention t

Bug#826406: [Pkg-clamav-devel] Bug#826406: Too abrupt removal of AllowSupplementaryGroups option in stable

2016-06-05 Thread Sebastian Andrzej Siewior
On 2016-06-05 13:27:08 [+0200], Hans van Kranenburg wrote: > Hi Maintainer, Hi, > The version in the main Debian Stable archive (so not in the additional > jessie-updates) has the option AllowSupplementaryGroups removed (see > #822444), which prevents the program from starting when this option is

Bug#804619: tlsdate: FTBFS: undefined reference to `SSLv3_client_method'

2016-05-30 Thread Sebastian Andrzej Siewior
On 2016-05-30 21:40:17 [+], Mattia Rizzolo wrote: > Hello everybody! Hi, > Is anybody working on this? > We would like to proceed with the complete RM of the old libssl1.0.0 > library, and this package is one of the very few left. A side note: if we apply the patch then it builds against curr

Bug#804623: osptoolkit: SSLv3 method

2016-05-19 Thread Sebastian Andrzej Siewior
On 2015-11-14 14:10:27 [+0100], Kurt Roeckx wrote: > You should change the call from SSLv3_client_method() to > SSLv23_client_method(). > > The SSLv3_* call only talks SSLv3 while the SSLv23_* call is the > only one supporting multiple protocol version. > > I suggest you also get that fixed in th

Bug#824485: [Pkg-clamav-devel] Bug#824485: clamav-freshclam: Segfault

2016-05-18 Thread Sebastian Andrzej Siewior
On 2016-05-16 19:33:58 [+0200], Kurt Roeckx wrote: > I'm guessing there is some ABI breakage between the 2 versions. So now learnt how to use/ read abipkgdiff properly: | in unqualified underlying type 'struct cl_engine' at others.h:250:1: |type size changed from 8640 to 8704 bits |1 dat

Bug#824485: [Pkg-clamav-devel] Bug#824485: clamav-freshclam: Segfault

2016-05-16 Thread Sebastian Andrzej Siewior
On 2016-05-16 17:32:55 [+0200], Kurt Roeckx wrote: > Received signal: wake up > ClamAV update process started at Mon May 16 15:52:55 2016 > main.cvd is up to date (version: 57, sigs: 4218790, f-level: 60, builder: > amishhammer) > Downloading daily-21555.cdiff [100%] > Downloading daily-21556.cdif

Bug#805112: zorp: FTBFS: SSLv3 method removed

2016-05-13 Thread Sebastian Andrzej Siewior
On 2015-11-14 21:50:33 [+0100], Kurt Roeckx wrote: > The SSLv3 methods in the openssl package have been removed and as > a result your package can't be build anymore. SZALAY, do you plan to look at this? The 3.9.5 release is from 2012, there is 3.9.8 from 2014 and v6.0.7 from 2015. Would it make s

Bug#797867: libzypp: ABI transition needed for libstdc++ v5

2016-05-13 Thread Sebastian Andrzej Siewior
On 2015-10-30 15:56:38 [+0100], Emilio Pozuelo Monfort wrote: > This is a friendly ping wrt the libstdc++ ABI transition. Your package is > listed > as needing a transition but has seen no action. It'd be good to get things > going > so we can finish the transition soon. Mike, this package didn'

Bug#804531: eagle: cannot be rebuilt against libssl1.0.2

2016-05-11 Thread Sebastian Andrzej Siewior
On 2016-05-10 18:19:02 [-0400], Scott Howard wrote: > I agree with this assessment. I'll raise the issue upstream. It's > non-free, so not too high on my priority list (and not much I can do > on my own anyways...) Could you please open a RM bug against ftp-master? There is no need to keep this in

Bug#804531: eagle: cannot be rebuilt against libssl1.0.2

2016-05-10 Thread Sebastian Andrzej Siewior
On 2016-05-10 00:14:48 [+0200], Sebastian Andrzej Siewior wrote: > Redistributing may be allowed due to the chapter in debian/copyright. It > is not the latest [1] available document which might be "recent" and the > license seems to have change a little, too. My bad. Tha

Bug#804531: eagle: cannot be rebuilt against libssl1.0.2

2016-05-09 Thread Sebastian Andrzej Siewior
On 2016-04-22 00:19:58 [+0200], Andreas Beckmann wrote: > Since the only API/ABI difference between libssl1.0.0 and libssl1.0.2 is > the removal of some symbols, you could try the following: … | $ readelf -a bin/eagle|grep -i SSLv3 |09aa3640 00019607 R_386_JUMP_SLOT SSLv3_client_meth

Bug#804807: utopia-documents: FTBFS with swig 3.0

2016-05-05 Thread Sebastian Andrzej Siewior
control: tags -1 patch On 2015-11-11 12:47:33 [-0800], Steve Langasek wrote: > The utopia-documents package fails to build in unstable, now that swig has > been updated to version 3.0.7: The two patches attached will let build again. However due to #812823 I don't think it makes sense to apply th

Bug#812823: utopia-documents: Segmentation fault on start

2016-05-05 Thread Sebastian Andrzej Siewior
On 2016-01-26 18:38:23 [-0500], Douglas Calvert wrote: > gdb followus: > > #0 0x7fc100d95795 in QMetaObject::className() const () from > /usr/lib/x86_64-linux-gnu/libQt5Core.so.5 with QT's dbg package I get #0 QtPrivate::RefCount::deref (this=0x74430f00) at ../../include/QtCore/../..

Bug#804138: percona-xtradb-cluster-galera-2.x: FTBFS: ssl support required but asio/ssl.hpp not found or not usable

2016-05-04 Thread Sebastian Andrzej Siewior
alera-2.x (1:2.11.2675-1.3) unstable; urgency=medium + + * Non-maintainer upload. + * Depend on libasio-dev to avoid build failure on internal asio copy +(Closes: #804138). + * Replace _BSD_SOURCE with _DEFAULT_SOURCE to avoid a warning with -Werror + + -- Sebastian Andrzej Siewior Wed, 04 May 2

Bug#804619: tlsdate: FTBFS: undefined reference to `SSLv3_client_method'

2016-04-27 Thread Sebastian Andrzej Siewior
_* function as suggested by Kurt. Sebastian >From b1afb00818c8d269c52d4b914e62fd5a9985df69 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior Date: Wed, 27 Apr 2016 21:10:03 +0200 Subject: [PATCH] Drop explicit support SSLv3 and TLSv1 There is no addedd value in using only SSLv3 or TLSv1. With current openssl impleme

Bug#778599: Vulnerabilities in nanohttp

2016-04-20 Thread Sebastian Andrzej Siewior
On 2015-03-15 06:42:08 [+0100], Salvatore Bonaccorso wrote: > On Tue, Feb 17, 2015 at 10:07:06AM +, Patrick Coleman wrote: > > * Remote null pointer dereference > > A remote user can cause a null pointer dereference by sending a > > malformed Authorization: header. > > http://patrick.ld.net.au/

Bug#749354: isakmpd: diff for NMU version 20041012-7.3

2016-04-20 Thread Sebastian Andrzej Siewior
e for certpatch. Patch by Erwan Prioul (Closes: #749354). + + -- Sebastian Andrzej Siewior Wed, 20 Apr 2016 21:40:11 +0200 + isakmpd (20041012-7.2) unstable; urgency=low * Non-maintainer upload. diff -Nru isakmpd-20041012/debian/patches/08_gnumakefile.patch isakmpd-20041012/debian/pa

Bug#804606: httest: diff for NMU version 2.4.8-1.1

2016-04-20 Thread Sebastian Andrzej Siewior
loses: #804606). + + -- Sebastian Andrzej Siewior Wed, 20 Apr 2016 21:00:04 +0200 + httest (2.4.8-1) unstable; urgency=low * New upstream release diff -Nru httest-2.4.8/debian/patches/consider-OPENSSL_NO_SSL3.patch httest-2.4.8/debian/patches/consider-OPENSSL_NO_SSL3.patch --- httest-2.4.8/d

Bug#754645: polygraph: FTBFS on kfreebsd-*: error: 'uintptr_t' has not been declared

2016-04-18 Thread Sebastian Andrzej Siewior
control: severity -1 normal On 2014-07-13 05:31:36 [+0200], Cyril Brulebois wrote: > Source: polygraph > Version: 4.3.2-1.2 > Severity: serious > Justification: FTBFS > > Hi, Hi, I change the severity to normal because kfreebsd is not a release architecture and as such it is no longer serious.

Bug#805083: polygraph: FTBFS: SSlv3 method

2016-04-17 Thread Sebastian Andrzej Siewior
On 2015-11-16 08:19:36 [-0700], Alex Rousskov wrote: > On 11/14/2015 09:02 AM, Alex Rousskov wrote: > > > If we can provide a small better fix, we will. If a better fix requires > > too many unrelated changes to this Polygraph version, we will provide a > > patch that disables SSLv3 (until a recen

Bug#749354: isakmpd: FTBFS - cannot open /../../Makefile

2016-04-17 Thread Sebastian Andrzej Siewior
Hi, The patch looks simple. Any reason why I should not use it and NMU it isakmpd? It would make isakmpd build again and we would have one libssl1.0.0 user less. Sebastian

Bug#804463: ckermit: FTBFS: ?wermit not found

2016-03-06 Thread Sebastian Andrzej Siewior
control: tags -1 +fixed-upstream On 2015-11-08 19:01:29 [+], Chris West (Faux) wrote: > make[1]: *** [override_dh_auto_install] Error 2 missing SSLv3. According to [0] the issue has been addressed upstream: |25 Dec 2015 9.0.304 Dev.15 |§ Changes to makefile for building on Red Hat Linux EL6

Bug#804616: sslscan: diff for NMU version 1.8.2-2.1

2016-03-05 Thread Sebastian Andrzej Siewior
ebian/changelog @@ -1,3 +1,10 @@ +sslscan (1.8.2-2.1) unstable; urgency=medium + + * Non-maintainer upload. + * Make it build without SSLv3 (Closes: #804616) + + -- Sebastian Andrzej Siewior Sat, 05 Mar 2016 21:17:46 +0100 + sslscan (1.8.2-2) unstable; urgency=low * debian/control: diff --

Bug#788257: Info received and FILED only (SSH packet_write_wait: Connection to ...: Broken pipe / Marvell 88E8071 PCI-E Gigabit Ethernet)

2016-02-09 Thread Sebastian Andrzej Siewior
Control: reassign -1 linux 3.16.7-ckt9-3~deb8u1 Control: retitle -1 sky2 NIC driver freezes the system (Marvell 0x436B / 88E8071) I hereby reassing the bug to the linux package since it has nothing to do with openssh. Based on the last feedback from the submitter he replaced the NIC and the probl

Bug#788257: SSH packet_write_wait: Connection to ...: Broken pipe / Marvell 88E8071 PCI-E Gigabit Ethernet

2016-01-29 Thread Sebastian Andrzej Siewior
On 2016-01-29 21:44:45 [+0100], SkyFish wrote: > > I wouldn't hurt to use real name if you attemt communicate with real > people. > > You are right, I'm Andrey :) Hi, > > Does the system respond to ping? > > After the system freezes it doesn't respond to anything > > > Does the syslog log fi

Bug#788257: SSH packet_write_wait: Connection to ...: Broken pipe / Marvell 88E8071 PCI-E Gigabit Ethernet

2016-01-27 Thread Sebastian Andrzej Siewior
On 2015-06-09 22:26:38 [+0200], SkyFish wrote: I wouldn't hurt to use real name if you attemt communicate with real people. > Any help would be greatly appreciated! Do you have the problem or has it been it been solved in the meantime? If not. I don't think the ssh package has anything to do wi

Bug#795084: esajpip: FTBFS due to B-D libprocps3-dev instead libprocps4-dev

2015-08-10 Thread Sebastian Andrzej Siewior
Package: esajpip Version: 0.1~bzr33-2 Severity: serious Your package FTBFS during the GCC5 transition [0]. It has Build-Depends "libprocps3-dev | libprocps-dev," which can not be satisfied because none of this packages exist in unstable anymore. Please use libprocps4-dev instead. [0] https://buil

Bug#781197: FTBFS with GCC-5

2015-08-06 Thread Sebastian Andrzej Siewior
On 2015-08-06 13:42:29 [+0200], Sylvestre Ledru wrote: > > | Makefile:107: recipe for target 'check-local' failed > > > > on AMD64. One step further I guess. > Do you have the actual errors? not anymore. I built it yesterday and copied the build-log away. The remaining part is gone but I could re

Bug#781197: FTBFS with GCC-5

2015-08-06 Thread Sebastian Andrzej Siewior
On 2015-03-25 23:57:21 [+0100], Roderich Schupp wrote: > Build stops with: > I tried 3.5.2-1 with gcc version 5.2.1 20150730 (Debian 5.2.1-14). Patch Patch #1 should fix the FTBFS. Patch #2 should workaround the part where it tries to use gcc-5.2 which is not available as package or binary. The bu

Bug#784797: libsane-common: fails to upgrade

2015-05-08 Thread Sebastian Andrzej Siewior
Package: libsane-common Version: 1.0.24-10 Severity: serious dist-upgrade did this: |Preparing to unpack .../libsane-common_1.0.24-10_all.deb ... |/var/lib/dpkg/tmp.ci/preinst: line 9: rm_conffile: command not found |dpkg: error processing archive /var/cache/apt/archives/libsane-common_1.0.24-10_

Bug#783720: clamav-daemon does not honour Local* with systemd

2015-05-01 Thread Sebastian Andrzej Siewior
On 2015-04-29 23:03:49 [+0200], Andreas Cadhalpun wrote: > Hi Sebastian, Hi Andreas, > >> The options > >>LocalSocket /var/run/clamav/clamd.ctl.change > >>LocalSocketGroup nobody > >>LocalSocketMode 600 same options > I just pushed a fix for this. > It seems to work as intended, but

Bug#783726: [Pkg-clamav-devel] Bug#783726: clamav-daemon.postinst: line 626: $DEBCONFILE: ambiguous redirect

2015-04-29 Thread Sebastian Andrzej Siewior
fixed 783726 0.98.6+dfsg-2 thanks On 2015-04-29 16:12:42 [+0200], Mounaam wrote: > Package: clamav-daemon > Version: 0.98.6+dfsg-1 > Severity: grave > Justification: renders package unusable > > Problem: > typo in line 626: $DEBCONFILE used instead of $DEBCONFFILE (double F) fixed, please check

Bug#783720: clamav-daemon does not honour Local* with systemd

2015-04-29 Thread Sebastian Andrzej Siewior
Package: clamav-daemon Version: 0.98.6+dfsg-1 Severity: serious The options LocalSocket /var/run/clamav/clamd.ctl.change LocalSocketGroup nobody LocalSocketMode 600 in clamd.conf are not considered when used via systemd. It seems that /lib/systemd/system/clamav-da

Bug#777481: [Pkg-clamav-devel] Bug#777481: clamav-daemon: /etc/clamav/freshclam.conf corruped after fresh installing clamav-daemon

2015-02-09 Thread Sebastian Andrzej Siewior
control: severtiy -1 important On 2015-02-08 20:31:48 [+0100], Ulrich Schmidt wrote: > Severity: grave > Justification: renders package unusable I changed it to important. It does not render the package unusable for everyone. Also, if affected then the bogus line can be removed and the package is

Bug#775687: libmspack: CHM decompression: another pointer arithmetic overflow

2015-01-29 Thread Sebastian Andrzej Siewior
0.5alpha has been just released [0] with this issue fixed. If you package that one you get rid of all currently known bugs :) [0] http://www.cabextract.org.uk/libmspack/libmspack-0.5alpha.tar.gz Sebastian -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "un

Bug#775687: libmspack: CHM decompression: another pointer arithmetic overflow

2015-01-18 Thread Sebastian Andrzej Siewior
m d78acf012a47fb4e868a87ef738a947ad3aa7ea3 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior Date: Sun, 18 Jan 2015 22:47:45 +0100 Subject: [PATCH] mspack/chmd: check p > end also after we left Jakub's AFL produced a case where "p" reads the name_len just just at the

Bug#775400: [Pkg-clamav-devel] Bug#775400: clamav-freshclam: freshclam cant download virus definitions

2015-01-15 Thread Sebastian Andrzej Siewior
On Thu, Jan 15, 2015 at 10:13:27AM +0100, Ulrich Schmidt wrote: > Package: clamav-freshclam > Version: 0.98.5+dfsg-3 > Severity: grave > Tags: newcomer Why newcommer? > Justification: renders package unusable Not unter normal circumstances. Atleast I hope so :) > Hi. > > I did a fresh Jessie ins

Bug#774767: libmspack: CHM decompression: pointer arithmetic overflow

2015-01-07 Thread Sebastian Andrzej Siewior
* Sebastian Andrzej Siewior | 2015-01-07 13:13:57 [+0100]: >* Jakub Wilk | 2015-01-06 21:18:30 [+0100]: >>Two sample CHM files that trigger segfaults, which are caused by the >>overflows, are also attached. >> >>This bug does affect ClamAV. > >How do you trigge

Bug#774726: libmspack: CHM decompression: pointer arithmetic overflow

2015-01-07 Thread Sebastian Andrzej Siewior
* Jakub Wilk | 2015-01-06 21:18:30 [+0100]: >Two sample CHM files that trigger segfaults, which are caused by the >overflows, are also attached. > >This bug does affect ClamAV. How do you trigger this? I tried both files with "cabextract -t", clamdscan, clamscan and chmd_md5. None of those segfau

Bug#773041: Bug#773318: clamav dies/hangs

2014-12-23 Thread Sebastian Andrzej Siewior
meone has unattended-upgrades running, how does he get clamd restarted after a libmspack update? >From a0449d2079c4ba5822e6567ad7094c10108f16cd Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior Date: Tue, 23 Dec 2014 21:20:43 +0100 Subject: libmspack: qtmd: fix frame_end overflow Debian

Bug#773041: Bug#773318: clamav dies/hangs

2014-12-22 Thread Sebastian Andrzej Siewior
epo. >From 9041fefc0d48aa3c307baa20c5cc4b7eceafe616 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior Date: Mon, 22 Dec 2014 22:10:47 +0100 Subject: [PATCH] make frame_end off_t Debian bts #773041, #772891 contains a report of a .cab file which causes an endless loop. Eric Sharkey diagnosed the problem as frame_en

Bug#773041: Bug#773318: clamav dies/hangs

2014-12-22 Thread Sebastian Andrzej Siewior
* Marc Dequènes (duck) | 2014-12-22 02:52:02 [+0100]: >Coin, > >On 2014-12-21 22:16, Sebastian Andrzej Siewior wrote: >>On 2014-12-20 12:12:13 [+0100], Andreas Cadhalpun wrote: >>>As it shows that clamd hangs in libmspack, I think this is bug #773041 >>>[1]. >

Bug#773041: Bug#773318: clamav dies/hangs

2014-12-21 Thread Sebastian Andrzej Siewior
On 2014-12-20 12:12:13 [+0100], Andreas Cadhalpun wrote: > As it shows that clamd hangs in libmspack, I think this is bug #773041 [1]. > A possible fix is mentioned in [2]. We'll have to include it in the > libmspack copy embedded in clamav, which is used in wheezy. Oh great. So for clamav we have

Bug#770647: double free in libclamunrar_iface + memory leak in read_block()

2014-11-22 Thread Sebastian Andrzej Siewior
Package: libclamunrar Version: 0.96.4-1 Severity: serious Tags: security pending The debian security tracker references a problem ("clamav: double-free error libclamunrar_iface/unrar_iface.c") which it learned from http://www.openwall.com/lists/oss-security/2013/11/29/6 This got marked as fixed in

Bug#769384: ERROR: This tool requires libclamav with functionality level 79 or higher (current f-level: 77)

2014-11-13 Thread Sebastian Andrzej Siewior
severity 769384 serious tags 769384 + pending thanks. On 2014-11-13 05:23:09 [-0800], Jesse Molina wrote: > Sorry, I opened this bug when I was tired. My apologies for the lack of > detail. No problem, it all worked out :) > I did a global upgrade, which is how I ended up in that situation. > lib

Bug#769384: ERROR: This tool requires libclamav with functionality level 79 or higher (current f-level: 77)

2014-11-13 Thread Sebastian Andrzej Siewior
On 2014-11-13 01:16:25 [-0700], Jesse Molina wrote: > Severity: grave I would downgrade it to important. Scott? > Fails on start. I imagine this wasn't tested? You imagine wrong. But this case in particular wasn't. > Setting up clamav-freshclam (0.98.5~rc1+dfsg-3) ... > [] Starting ClamAV vir

Bug#751337: [PATCH] tests: test_ctf_writer: replace HOST_NAME_MAX

2014-08-06 Thread Sebastian Andrzej Siewior
On 2014-08-05 16:14:12 [-0400], Jon Bernard wrote: > This may also work as well: > > diff --git a/configure.ac b/configure.ac > index 80eba33..248044e 100644 > --- a/configure.ac > +++ b/configure.ac > @@ -50,6 +50,17 @@ AC_C_INLINE > AC_TYPE_PID_T > AC_TYPE_SIZE_T >

Bug#751337: [PATCH] tests: test_ctf_writer: replace HOST_NAME_MAX

2014-08-05 Thread Sebastian Andrzej Siewior
does not build KFreeBSD due to missing HOST_NAME_MAX. The test suite passed. Signed-off-by: Sebastian Andrzej Siewior --- tests/lib/Makefile.am | 3 +- tests/lib/test_ctf_writer.c | 10 -- tests/lib/xgethostname.c| 76 + tests/lib

Bug#751336: babeltrace: FTBFS on armel (test failure)

2014-08-05 Thread Sebastian Andrzej Siewior
tags 751336 + patch upstream fixed-upstream thanks. On 2014-06-11 22:29:48 [+0200], Julien Cristau wrote: > See the build log at > https://buildd.debian.org/status/fetch.php?pkg=babeltrace&arch=armel&ver=1.2.1-2&stamp=1395846913 > > There's also a build failure on sparc which may or may not be re

Bug#753533: dansguardian: libclamav requires additional init to work

2014-07-02 Thread Sebastian Andrzej Siewior
eless. This affects the "plugname = 'clamav'" method of the package. Sebastian >From 75bf67fe1568ffcbb488f4e7026883b39dd1a3eb Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior Date: Wed, 2 Jul 2014 22:06:30 +0200 Subject: [PATCH] update dansguardian Signed-off-b

Bug#753530: havp: libclamav requires additional init to work

2014-07-02 Thread Sebastian Andrzej Siewior
ve set the severity to grave since havp can't be used without clamav. Sebastian >From 45b1edab07d76fc331c4dc0a47d8ecc3a5438a27 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior Date: Wed, 2 Jul 2014 21:12:37 +0200 Subject: [PATCH] update to current (0.94.4) clamav As of 0.94.4 ve

Bug#710195: [Pkg-libvirt-maintainers] Processed: Re: Bug#710195 closed by Guido Günther (Bug#710195: fixed in libvirt 1.2.4-1)

2014-06-28 Thread Sebastian Andrzej Siewior
* Guido Günther | 2014-06-26 21:54:40 [+0200]: >Already in VCS as 9321997cddf7bb5b030d6328d9db67eb4f5830f6 since May. >Cheers, It seems to be part of the experimental branch which also has new v1.2.5 in it. Please add the Closes tag to finally close the bug :) > -- Guido Sebastian -- To UNSUB

Bug#710195: [Pkg-libvirt-maintainers] Processed: Re: Bug#710195 closed by Guido Günther (Bug#710195: fixed in libvirt 1.2.4-1)

2014-06-26 Thread Sebastian Andrzej Siewior
On 2014-05-17 15:09:00 [+0200], Guido Günther wrote: > which dependency are you still seeing? > -- Guido I think he meant: >From b19ba46d6a9c3b67a8a70457ed1970924bb97489 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior Date: Thu, 26 Jun 2014 20:08:04 +0200 Subject: [PATCH] dr

Bug#748180: [Pkg-clamav-devel] Bug#748180: Bug#748180: clamav: FTBFS on powerpc: test failure

2014-05-15 Thread Sebastian Andrzej Siewior
tags 748180 + upstream forwarded 748180 https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=10;mbox=yes;bug=748180 thanks On 2014-05-15 14:19:10 [+0200], Sebastian Andrzej Siewior wrote: > Yesterday I tried to bring the in-tree llvm-back and build it. The build > failed, too. The log is ava

Bug#748180: [Pkg-clamav-devel] Bug#748180: clamav: FTBFS on powerpc: test failure

2014-05-15 Thread Sebastian Andrzej Siewior
On 2014-05-15 11:54:23 [+0800], Paul Wise wrote: > 99%: Checks: 960, Failures: 1, Errors: 1 > check_bytecode.c:136:F:arithmetic:test_bswap_jit:0: Invalid return value from > bytecode run, expected: beef, have: dead1 > > check_bytecode.c:111:E:arithmetic:test_inflate_int:0: (after this point) > R

<    1   2   3   4   5   >