Bug#805073: Current version is not compatible with node 4. Please update from upstream.

2015-11-14 Thread Stefano Rivoir
Package: node-sqlite3 Version: 2.2.0+ds1-1+b1 Severity: grave -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 4.1.3 (SMP w/1 CPU core) Locale: LANG=C, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Processed: reassign 804993 to libjs-pie-doc, fixed 804993 in 1.0.0+dfsg-2, affects 804993 ..., tagging 805060 ...

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 804993 libjs-pie-doc 1.0.0+dfsg-1 Bug #804993 {Done: Michael Fladischer } [libjs-pie-doc,python-django-classy-tags-doc] python-django-classy-tags-doc and libjs-pie-doc: error when trying to install together Bug

Bug#801059: marked as done (libxmu's debian/rules is not safe to execute in parallel)

2015-11-14 Thread Debian Bug Tracking System
Your message dated Sat, 14 Nov 2015 09:35:56 + with message-id and subject line Bug#801059: fixed in libxmu 2:1.1.2-2 has caused the Debian Bug report #801059, regarding libxmu's debian/rules is not safe to execute in parallel to be marked as done. This

Bug#804240: marked as done (libsane: scanning does not work with HPLIP backend)

2015-11-14 Thread Debian Bug Tracking System
Your message dated Sat, 14 Nov 2015 10:19:58 + with message-id and subject line Bug#804240: fixed in sane-backends 1.0.25-2 has caused the Debian Bug report #804240, regarding libsane: scanning does not work with HPLIP backend to be marked as done. This

Bug#788708: Bug#799632: iceweasel: SIGSEGV when playing videos via gstreamer

2015-11-14 Thread Agustin Martin
2015-11-12 16:13 GMT+01:00 Sebastian Dröge : > On Do, 2015-11-12 at 15:35 +0100, Soeren D. Schulze wrote: >> Am 12.11.2015 um 15:02 schrieb Sebastian Dröge: >> > On Do, 2015-11-12 at 14:41 +0100, Soeren D. Schulze wrote: >> > > Hello, >> > > >> > > the problem does not seem to

Bug#804603: courier: FTBFS: undefined reference to `SSLv3_method'

2015-11-14 Thread peter green
Tags 804603 +patch thanks The package fails to build, as openssl have dropped sslv3 support: ./.libs/libcouriertls.a(libcouriertls.o): In function `tls_create': /courier-0.73.1/libs/tcpd/libcouriertls.c:530: undefined reference to `SSLv3_method' collect2: error: ld returned 1 exit status

Bug#804604: fetchmail: FTBFS: undefined reference to `SSLv3_client_method'

2015-11-14 Thread peter green
Tags 804604 +patch thanks socket.o: In function `SSLOpen': /fetchmail-6.3.26/socket.c:917: undefined reference to `SSLv3_client_method' collect2: error: ld returned 1 exit status Makefile:699: recipe for target 'fetchmail' failed make[3]: *** [fetchmail] Error 1 I just fixed this in raspbian,

Bug#800496: evolution-ews: Unable to store Host URI / OAB URI

2015-11-14 Thread Michael Biebl
On Wed, 30 Sep 2015 09:13:36 +0200 Yusuf Iskenderoglu wrote: > Package: evolution-ews > Version: 3.16.3-1 > Severity: grave > Justification: renders package unusable > > Dear Maintainer, > > Currently, evolution cannot access EWS anymore and prevents me from using > company

Bug#804605: heirloom-mailx: FTBFS: undefined reference to `SSLv3_client_method'

2015-11-14 Thread peter green
Tags 804605 +patch thanks openssl.o: In function `ssl_select_method': /heirloom-mailx-12.5/openssl.c:220: undefined reference to `SSLv3_client_method' collect2: error: ld returned 1 exit status Makefile:92: recipe for target 'mailx' faile I just fixed this in raspbian, debdiff at

Bug#804326: ace: FTBFS: SSLv3 methods removed

2015-11-14 Thread peter green
I think we can make it Debian specific until it gets integrated upstream. I took the diff submitted as a pull request upstream, applied it to the source package from debian (which required some path tweaks and defuzzing) and uploaded it to raspbian. Debdiff at

Bug#804604: [pkg-fetchmail-maint] Bug#804604: fetchmail: FTBFS: undefined reference to `SSLv3_client_method'

2015-11-14 Thread GCS
Hi Peter, On Sun, Nov 15, 2015 at 6:00 AM, peter green wrote: >> socket.o: In function `SSLOpen': >> /fetchmail-6.3.26/socket.c:917: undefined reference to >> `SSLv3_client_method' >> collect2: error: ld returned 1 exit status >> Makefile:699: recipe for target 'fetchmail'

Processed: block 797926 with 804607

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 797926 with 804607 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804324 804089 803975 803886 804336 804452 803972 803889 804457 804334 803881 804326 804327 804455 803974 797926 was not

Bug#799186: konqueror: now comes with built-in keylogger

2015-11-14 Thread Luigi Toscano
retitle 799186 kdelibs/ktextedit: keypresses are logged reassign 799186 libkdeui5 kde4libs/4:4.14.10-3 thanks On Wed, 16 Sep 2015 23:04:24 +0200 M4:4.14.13-1artin Steigerwald wrote: > Am Mittwoch, 16. September 2015, 22:55:23 CEST schrieb Dominik George: > > > I think this

Processed: Re: Bug#799186: konqueror: now comes with built-in keylogger

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > retitle 799186 kdelibs/ktextedit: keypresses are logged Bug #799186 [konqueror] konqueror: now comes with built-in keylogger Changed Bug title to 'kdelibs/ktextedit: keypresses are logged' from 'konqueror: now comes with built-in keylogger' >

Bug#788708: Bug#799632: iceweasel: SIGSEGV when playing videos via gstreamer

2015-11-14 Thread Agustin Martin
2015-11-14 12:22 GMT+01:00 Agustin Martin : > 2015-11-12 16:13 GMT+01:00 Sebastian Dröge : >> On Do, 2015-11-12 at 15:35 +0100, Soeren D. Schulze wrote: >>> Am 12.11.2015 um 15:02 schrieb Sebastian Dröge: >>> > On Do, 2015-11-12 at 14:41 +0100, Soeren D.

Processed: re: anon-proxy: FTBFS on kfreebsd-*: missing -pthread/-lpthread?

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > Severity 754681 important Bug #754681 [src:anon-proxy] anon-proxy: FTBFS on kfreebsd-*: missing -pthread/-lpthread? Severity set to 'important' from 'serious' > Thanks Stopping processing here. Please contact me if you need assistance. --

Processed: block 797926 with 804623

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 797926 with 804623 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 803889 804334 804457 804336 803975 803881 804089 803886 804326 804455 803972 804327 804607 803974 804452 804324 797926 was

Bug#754681: anon-proxy: FTBFS on kfreebsd-*: missing -pthread/-lpthread?

2015-11-14 Thread peter green
Severity 754681 important Thanks kfreebsd is no longer a release architecture.

Bug#804620: pavuk: SSLv3 method

2015-11-14 Thread Kurt Roeckx
Hi, The code looks like this: #ifndef OPENSSL_NO_SSL2 case 2: method = SSLv2_client_method(); break; #endif case 3: method = SSLv3_client_method(); break; #ifdef WITH_SSL_TLS1 case 4: method = TLSv1_client_method(); break; #endif default: method =

Processed: block 797926 with 804138

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 797926 with 804138 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804457 804623 804620 803972 804326 803886 804089 803974 804336 804455 803975 804452 803889 804327 804324 804334 804607

Bug#804607: lua-sec: SSLv3 method

2015-11-14 Thread Kurt Roeckx
Looking at the code it has: static LSEC_SSL_METHOD* str2method(const char *method) { if (!strcmp(method, "sslv23")) return SSLv23_method(); if (!strcmp(method, "sslv3")) return SSLv3_method(); if (!strcmp(method, "tlsv1")) return TLSv1_method(); #if (OPENSSL_VERSION_NUMBER >=

Processed: polygraph: FTBFS: SSlv3 method

2015-11-14 Thread Debian Bug Tracking System
Processing control commands: > block 797926 by -1 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 803889 804138 803886 804620 804324 803972 804455 803975 804336 804089 804327 804457 803974 803881 804623 804607 804334 804452 804326 797926 was not

Processed (with 1 error): Re: Should this package be removed?

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 802995 ftp.debian.org Bug #802995 [alarm-clock] Should this package be removed? Bug reassigned from package 'alarm-clock' to 'ftp.debian.org'. Ignoring request to alter found versions of bug #802995 to the same values previously set

Bug#805083: polygraph: FTBFS: SSlv3 method

2015-11-14 Thread Kurt Roeckx
Source: polygraph Version: 4.3.2-1.2 Severity: serious Control: block 797926 by -1 Hi, The SSLv3 method has been disabled in openssl and as a result your package no longer build. The code looks like this: switch(protocol) { case SSLv2: #ifndef OPENSSL_NO_SSL2

Bug#802995: Should this package be removed?

2015-11-14 Thread Moritz Mühlenhoff
reassign 802995 ftp.debian.org retitle 802995: RM: alarm-clock - unmaintained, dead upstream, depends on gstreamer 0.10 thanks On Sun, Oct 25, 2015 at 09:37:55PM +0100, Moritz Muehlenhoff wrote: > Package: alarm-clock > Severity: serious > > alarm-clock hasn't seen a maintainer upload since

Bug#804611: socat: FTBFS: SSLv3 methods

2015-11-14 Thread Kurt Roeckx
Hi, You already had to apply a patch like that for SSLv2. You could just do the same for SSLv3. But I recommend you get rid of all the methods other than SSLv23_*. Only the SSLv23_* methods support multiple versions. If you want to limit the support of supported protocols I suggest you use

Bug#799186: marked as done (kdelibs/ktextedit: keypresses are logged)

2015-11-14 Thread Debian Bug Tracking System
Your message dated Sat, 14 Nov 2015 16:27:38 +0100 with message-id <564752ea.4080...@tiscali.it> and subject line Closing bug 799186, solved has caused the Debian Bug report #799186, regarding kdelibs/ktextedit: keypresses are logged to be marked as done. This means that you claim that the

Bug#805083: polygraph: FTBFS: SSlv3 method

2015-11-14 Thread Kurt Roeckx
On Sat, Nov 14, 2015 at 08:34:47AM -0700, Alex Rousskov wrote: > On 11/14/2015 06:39 AM, Kurt Roeckx wrote: > > Source: polygraph > > Version: 4.3.2-1.2 > > Severity: serious > > Control: block 797926 by -1 > > > I suggest you remove all of that and only use SSLv23_method(). > > All the other are

Bug#804623: osptoolkit: SSLv3 method

2015-11-14 Thread Kurt Roeckx
Hi, You should change the call from SSLv3_client_method() to SSLv23_client_method(). The SSLv3_* call only talks SSLv3 while the SSLv23_* call is the only one supporting multiple protocol version. I suggest you also get that fixed in the stable branches. Kurt

Processed: block 797926 with 804620

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 797926 with 804620 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 803881 804334 804623 804457 804336 804455 804452 804327 804607 804324 804326 803975 803972 803974 804089 803886 803889

Bug#805082: pjproject FTBFS, references to removed SSLv3 functions.

2015-11-14 Thread peter green
Package: pjproject Version:**2.4~dfsg-1 Severity: serious Openssl in stretch/sid has dropped the SSLv3 functions. This makes your package fail to build (at an earlier point in the build than previously reported build failures gcc -o ../bin/pjlib-test-x86_64-pc-linux-gnu \

Bug#804431: zeroinstall-injector: FTBFS: error: The implementation support/hash.ml does not match the interface support/hash.cmi

2015-11-14 Thread Thomas Leonard
On 12 November 2015 at 11:28, Chris Lamb wrote: > Hi Thomas, > >> I think this was fixed in 2.9: > > Great stuff. > >> [ I'm still working on getting my GPG key upgraded, so can't upload >> new packages to Debian at the moment. ] > > No problem. Let me know if you need

Processed: closing 803756

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # This was a bug in boost, fixed in boost > close 803756 Bug #803756 [src:pion] pion: FTBFS: error: '::SSLv3_method' has not been declared Marked Bug as done > thanks Stopping processing here. Please contact me if you need assistance. --

Processed: Re: Should this package be removed?

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 802993 ftp.debian.org Bug #802993 [g2ipmsg] Should this package be removed? Bug reassigned from package 'g2ipmsg' to 'ftp.debian.org'. Ignoring request to alter found versions of bug #802993 to the same values previously set Ignoring

Bug#802993: Should this package be removed?

2015-11-14 Thread Moritz Mühlenhoff
reassign 802993 ftp.debian.org retitle 802993 RM: g2ipmsg - dead upstream, unmaintained, unused, depends on gstreamer 0.10 thanks On Sun, Oct 25, 2015 at 09:33:53PM +0100, Moritz Muehlenhoff wrote: > Package: g2ipmsg > Severity: serious > > - Dead upstream (last release from 2008) > -

Bug#805084: python-srp: Hardcoded dependency on libssl1.0.0

2015-11-14 Thread Kurt Roeckx
Source: python-srp Version: 1.0.4-1 Severity: serious Control: block 797926 by -1 Hi, It seems you have a hardcoded dependency on libssl1.0.0. The package has been renamed to libssl1.0.2 and you now depend on both of them. Please remove the hardcoded dependency. Kurt

Processed: python-srp: Hardcoded dependency on libssl1.0.0

2015-11-14 Thread Debian Bug Tracking System
Processing control commands: > block 797926 by -1 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804327 804607 803881 804334 803975 805083 804324 804336 804452 804620 803974 804138 803972 804623 804089 804455 804326 803889 804457 803886 797926

Bug#801866: update-flashplugin-nonfree fails to install last flash version (again)

2015-11-14 Thread Virgo Pärna
Package: flashplugin-nonfree Version: 1:3.6.1 Followup-For: Bug #801866 Same problem is also now: installed version = 11.2.202.540 upstream version = 11.2.202.548 downloading http://people.debian.org/~bartm/flashplugin-nonfree/D5C0FC14/fp.11.2.202.548.sha512.i386.pgp.asc ... --2015-11-14

Bug#803248: marked as done (openscad: B-D on obsolete *-swx11 packages)

2015-11-14 Thread Debian Bug Tracking System
Your message dated Sat, 14 Nov 2015 16:20:52 + with message-id and subject line Bug#803248: fixed in openscad 2015.03-1+dfsg-3 has caused the Debian Bug report #803248, regarding openscad: B-D on obsolete *-swx11 packages to be marked as done. This means

Processed: block 797926 with 804611

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 797926 with 804611 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 803889 804138 804326 804455 803886 803881 805083 804089 804620 803974 804607 804452 804336 804457 804334 803975 804324

Processed: block 797926 with 804616

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 797926 with 804616 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804607 805084 803889 804138 803974 803975 804324 803886 803881 804623 804334 804089 804455 804611 804452 804327 805083

Bug#788708: Bug#799632: iceweasel: SIGSEGV when playing videos via gstreamer

2015-11-14 Thread Soeren D. Schulze
I am not sure about those SIGPIPEs. They occured to me, too, but I could just press 'c' in gdb and continue using iceweasel until the SIGSEGV. On the other hand, they are apparently gone now in stretch. Could you press 'c' next time it happens, and wait for a SIGSEGV to occur?

Bug#805083: polygraph: FTBFS: SSlv3 method

2015-11-14 Thread Alex Rousskov
On 11/14/2015 06:39 AM, Kurt Roeckx wrote: > Source: polygraph > Version: 4.3.2-1.2 > Severity: serious > Control: block 797926 by -1 > I suggest you remove all of that and only use SSLv23_method(). > All the other are version specific methods, only SSLv23_* speaks > multiple versions. Removal

Bug#805083: polygraph: FTBFS: SSlv3 method

2015-11-14 Thread Alex Rousskov
On 11/14/2015 08:47 AM, Kurt Roeckx wrote: > On Sat, Nov 14, 2015 at 08:34:47AM -0700, Alex Rousskov wrote: >> On 11/14/2015 06:39 AM, Kurt Roeckx wrote: >>> Source: polygraph >>> Version: 4.3.2-1.2 >>> Severity: serious >>> Control: block 797926 by -1 >> >>> I suggest you remove all of that and

Processed: block 797926 with 804463

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 797926 with 804463 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804455 804616 804807 804457 804334 803974 804623 804324 803975 804611 804452 804326 804327 803972 805084 804607 803889

Processed: block 797926 with 804807

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 797926 with 804807 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804089 804455 805084 804138 804616 803889 804452 804620 803886 804334 803975 805083 804623 803881 804336 804611 803972

Processed: block 797926 with 804605

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 797926 with 804605 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804623 804611 805084 804138 804457 804616 803886 803975 804326 803881 804455 805083 804604 803889 804089 804607 804463

Processed: block 797926 with 804604

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 797926 with 804604 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804089 803881 805084 804452 804327 804457 804455 804336 804326 803886 803889 804623 804138 804334 803974 803972 804616

Processed: closing 803753

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # Was issue in boost that's already fixed > close 803753 Bug #803753 [src:reconserver] reconserver: FTBFS: context.ipp:92:29: error: '::SSLv3_method' has not been declared Marked Bug as done > thanks Stopping processing here. Please contact me

Processed: block 797926 with 804615

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 797926 with 804615 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804336 804604 804327 804611 805083 803972 804607 803975 803889 804457 804463 804334 803881 804807 804326 804605 804455

Processed: sslsplit: FTBFS: Removed SSLv3 method

2015-11-14 Thread Debian Bug Tracking System
Processing control commands: > block 797926 by -1 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 803974 805083 804604 803889 803881 803753 804605 803975 803886 804336 804452 803972 804457 804623 804455 805084 804611 804620 804324 804089 804616

Bug#805097: sslsplit: FTBFS: Removed SSLv3 method

2015-11-14 Thread Kurt Roeckx
Source: sslsplit Version: 0.4.11+dfsg-1 Severity: serious Control: block 797926 by -1 Hi, The SSLv3 method has been disabled in Debian so your package now fails to build. You have this code: #ifdef SSL_OP_NO_SSLv3 if (!strcmp(optarg, "ssl3")) { opts->sslmethod =

Processed: block 797926 with 804431

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 797926 with 804431 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804457 804463 803974 804324 803972 805084 804620 804327 804607 804089 804611 804452 803886 805097 804138 804615 804605

Bug#804619: tlsdate: FTBFS: SSLv3 method removed

2015-11-14 Thread Kurt Roeckx
Hi, So the code looks like: if (0 == strcmp("sslv23", protocol)) { verb ("V: using SSLv23_client_method()"); ctx = SSL_CTX_new(SSLv23_client_method()); } else if (0 == strcmp("sslv3", protocol)) { verb ("V: using SSLv3_client_method()"); ctx =

Bug#804431: zeroinstall-injector: FTBFS: error: The implementation support/hash.ml does not match the interface support/hash.cmi

2015-11-14 Thread Chris Lamb
> That would be very useful. I've uploaded the new package here: > > https://mentors.debian.net/package/zeroinstall-injector "Successfully uploaded zeroinstall-injector_2.10-1_amd64.changes to ftp.upload.debian.org for ftp-master." :) Regards, -- ,''`. : :' : Chris Lamb

Bug#805102: liblog-dispatch-message-passing-perl: FTBFS: t/basic.t failure

2015-11-14 Thread Niko Tyni
Package: liblog-dispatch-message-passing-perl Version: 0.009-2 Severity: serious Tags: sid This package fails to build on current sid: Can't locate JSON.pm in @INC (you may need to install the JSON module) (@INC contains: /<>/inc /<>/blib/lib /<>/blib/arch /etc/perl

Processed: Re: libatombus-perl: FTBFS: Atompub::DateTime does not export: datetime

2015-11-14 Thread Debian Bug Tracking System
Processing control commands: > reassign -1 libatompub-perl 0.3.7-2 Bug #805105 [libatombus-perl] libatombus-perl: FTBFS: Atompub::DateTime does not export: datetime Bug reassigned from package 'libatombus-perl' to 'libatompub-perl'. No longer marked as found in versions libatombus-perl/1.0405-2.

Bug#805105: libatombus-perl: FTBFS: Atompub::DateTime does not export: datetime

2015-11-14 Thread Niko Tyni
Control: reassign -1 libatompub-perl 0.3.7-2 Control: retitle -1 libatompub-perl: doesn't work with Perl6::Export::Attrs-0.0.4 Control: affects -1 libatombus-perl On Sat, Nov 14, 2015 at 09:19:14PM +0200, Niko Tyni wrote: > Package: libatombus-perl > Version: 1.0405-2 > Severity: serious > >

Processed: block 797926 with 803753

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 797926 with 803753 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804336 803886 804623 804807 804607 804334 805084 804457 804452 803889 803881 804604 804611 804324 804620 803975 805083

Bug#804605: heirloom-mailx: SSLv3 method

2015-11-14 Thread Kurt Roeckx
Hi, So you currently have: static const SSL_METHOD * ssl_select_method(const char *uhp) { const SSL_METHOD *method; char*cp; cp = ssl_method_string(uhp); if (cp != NULL) { if (equal(cp, "ssl3")) method =

Bug#803778: marked as done (wine-development: arch all FTBFS on 64-bit architectures)

2015-11-14 Thread Debian Bug Tracking System
Your message dated Sat, 14 Nov 2015 18:06:37 + with message-id and subject line Bug#803778: fixed in wine-development 1.7.54-2 has caused the Debian Bug report #803778, regarding wine-development: arch all FTBFS on 64-bit architectures to be marked as

Bug#804046: marked as done (No wine-development package and so not binary available anymore)

2015-11-14 Thread Debian Bug Tracking System
Your message dated Sat, 14 Nov 2015 18:06:37 + with message-id and subject line Bug#803778: fixed in wine-development 1.7.54-2 has caused the Debian Bug report #803778, regarding No wine-development package and so not binary available anymore to be marked

Processed: block 797926 with 804619

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 797926 with 804619 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 803886 804607 803881 804615 804455 804138 804807 804324 805097 804623 804463 804611 804605 803889 803974 803975 804616

Bug#805102: liblog-dispatch-message-passing-perl: FTBFS: t/basic.t failure

2015-11-14 Thread Niko Tyni
retitle 805102 libmessage-passing-perl: missing runtime and build dependencies on libjson-perl reassign 805102 libmessage-passing-perl 0.116-1 affects 805102 liblog-dispatch-message-passing-perl thanks On Sat, Nov 14, 2015 at 08:55:33PM +0200, Niko Tyni wrote: > Package:

Bug#805103: libmessage-passing-filter-regexp-perl: FTBFS: missing build-dependency on libjson-perl

2015-11-14 Thread Niko Tyni
Package: libmessage-passing-filter-regexp-perl Version: 0.05-1 Severity: serious Tags: sid This package fails to build on current sid: Can't locate JSON.pm in @INC (you may need to install the JSON module) (@INC contains: lib /<>/blib/lib /<>/blib/arch /etc/perl

Processed: Re: Bug#805102: liblog-dispatch-message-passing-perl: FTBFS: t/basic.t failure

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > retitle 805102 libmessage-passing-perl: missing runtime and build > dependencies on libjson-perl Bug #805102 [liblog-dispatch-message-passing-perl] liblog-dispatch-message-passing-perl: FTBFS: t/basic.t failure Changed Bug title to

Bug#805105: libatombus-perl: FTBFS: Atompub::DateTime does not export: datetime

2015-11-14 Thread Niko Tyni
Package: libatombus-perl Version: 1.0405-2 Severity: serious This package fails to build on current sid: Atompub::DateTime does not export: datetime use Atompub::DateTime failed at /<>/lib/AtomBus.pm line 5. BEGIN failed--compilation aborted at /<>/lib/AtomBus.pm line 5. Compilation

Bug#805095: sflphone: Uses ALL ciphers

2015-11-14 Thread Kurt Roeckx
Source: sflphone Severity: grave Tags: security I just saw this in the code: SSL_CTX_set_cipher_list(ctx, "ALL"); This enables ciphers you don't want, it might include those that don't provide authentication or encryption. Kurt

Bug#804615: sflphone: SSLv3 method

2015-11-14 Thread Kurt Roeckx
Hi, I see various things like: typedef enum pj_ssl_sock_proto { PJ_SSL_SOCK_PROTO_DEFAULT, /**< Default protocol of backend. */ PJ_SSL_SOCK_PROTO_TLS1, /**< TLSv1.0 protocol. */ PJ_SSL_SOCK_PROTO_SSL3, /**< SSLv3.0 protocol. */

Processed: block 797926 with 804603

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 797926 with 804603 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804138 804616 804336 804334 803753 804607 805097 804619 805114 804324 804327 804326 804463 803975 803886 805112 804615

Bug#804603: courier: FTBFS: SSLv3 method removed

2015-11-14 Thread Kurt Roeckx
Hi, So looking at the code your currently have: method=((!protocol || !*protocol) ? NULL: strcmp(protocol, "SSL3") == 0 ? SSLv3_method(): strcmp(protocol, "SSL23") == 0 ? SSLv23_method():

Processed: block 797926 with 804606

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 797926 with 804606 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 805112 804463 804615 804431 803975 803886 804327 805097 803881 804605 804440 804452 803753 804619 804334 804089 804138

Bug#804606: httest: FTBFS: SSLv3 method removed

2015-11-14 Thread Kurt Roeckx
Hi, So you have code like this for both client and server: static int worker_set_client_method(worker_t * worker, const char *sslstr) { int is_ssl = 0; ssl_wconf_t *config = ssl_get_worker_config(worker); if (strcasecmp(sslstr, "SSL") == 0) { is_ssl = 1; config->meth =

Processed: block 797926 with 804467

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 797926 with 804467 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804605 804463 805084 804440 804620 804611 804336 804089 804603 803972 805112 803881 804606 803974 803975 804623 805117

Processed: kannel-sqlbox: FTBFS: Can't satisfy build-depends

2015-11-14 Thread Debian Bug Tracking System
Processing control commands: > block 797926 by -1 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804605 803975 804620 804615 804440 804606 803881 804326 804607 803974 804603 804619 804334 805112 803886 804611 804327 804324 804336 804604 804431

Bug#805117: kannel-sqlbox: FTBFS: Can't satisfy build-depends

2015-11-14 Thread Kurt Roeckx
Source: kannel-sqlbox Version: 0.7.2-3 Severity: serious Control: block 797926 by -1 Hi, You have a build-depedency on kannel-dev (<< 1.4.4), but the current version in unstable is 1.4.4-1+b1. Kurt

Processed: block 797926 with 804386

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 797926 with 804386 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804334 804603 804623 804611 803886 803753 803972 804431 804463 804440 804607 804452 805114 803881 804467 804616 805083

Processed: galera-3: FTBFS on s390x

2015-11-14 Thread Debian Bug Tracking System
Processing control commands: > block 797926 by -1 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 805112 804336 805114 803889 804467 803972 804623 804807 804606 804463 804334 804604 804611 804457 804440 805084 804431 804452 804616 803753 803886

Bug#805118: galera-3: FTBFS on s390x

2015-11-14 Thread Kurt Roeckx
Source: galera-3 Version: 25.3.12-3 Severity: serious Control: block 797926 by -1 Hi, Your package FTBFS on s390x. It's unclear to me what the error is. For a full log see: https://buildd.debian.org/status/fetch.php?pkg=galera-3=s390x=25.3.12-3=1447450818 Kurt

Processed: unblock 797926 with 804336

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > unblock 797926 with 804336 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804324 803974 804386 804603 804463 803753 804611 804619 803972 804440 805118 804089 804623 804604 805084 803889 804336

Bug#799840: marked as done (libpam-smbpass: installed libpam-smbpass break all local login)

2015-11-14 Thread Debian Bug Tracking System
Your message dated Sat, 14 Nov 2015 22:22:40 + with message-id and subject line Bug#799840: fixed in samba 2:4.3.1+dfsg-1 has caused the Debian Bug report #799840, regarding libpam-smbpass: installed libpam-smbpass break all local login to be marked as

Bug#805121: kumofs: FTBFS on ppc64el: ICE

2015-11-14 Thread Kurt Roeckx
Source: kumofs Version: 0.4.13-6.1 Severity: serious Control: block 797926 by -1 Hi, Your package is failing to build on ppc64el with the following error: cluster.cc: In member function 'void rpc::cluster_transport::init_message(rpc::msgobj, rpc::auto_zone)': cluster.cc:134:1: error:

Processed: kumofs: FTBFS on ppc64el: ICE

2015-11-14 Thread Debian Bug Tracking System
Processing control commands: > block 797926 by -1 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804463 803886 804138 804455 804431 804603 804452 804326 804089 804324 804604 804611 804623 804620 804616 803972 804615 805097 803975 803974 804619

Bug#785867: morituri: Please update to GStreamer 1.x

2015-11-14 Thread Moritz Muehlenhoff
On Wed, May 20, 2015 at 04:03:06PM +0300, sl...@debian.org wrote: > Source: morituri > Severity: important > User: sl...@debian.org > Usertags: gstreamer0.10-removal > > Hi maintainer, > > your package morituri currently still depends on GStreamer 0.10. > > GStreamer 0.10 is no longer

Bug#804666: marked as done (simutrans: FTBFS: convert convert: Unrecognized option (-alpha).)

2015-11-14 Thread Debian Bug Tracking System
Your message dated Sat, 14 Nov 2015 22:35:25 + with message-id and subject line Bug#804666: fixed in simutrans 120.1.1+repack-1 has caused the Debian Bug report #804666, regarding simutrans: FTBFS: convert convert: Unrecognized option (-alpha). to be

Bug#805123: swi-prolog: FTBFS on ppc64el

2015-11-14 Thread Kurt Roeckx
Source: swi-prolog Version: 7.2.0-2 Severity: serious Control: block 797926 by -1 Hi, Your package is failing to build with the following error on ppc64el: JUNIT=/usr/share/java/junit.jar JAVA=java JAVA_PRELOAD= ./test-java.sh Welcome to SWI-Prolog (Multi-threaded, 64 bits, Version 7.2.0)

Processed: swi-prolog: FTBFS on ppc64el

2015-11-14 Thread Debian Bug Tracking System
Processing control commands: > block 797926 by -1 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804603 804327 803972 804615 804604 804606 804324 803881 804440 804467 805083 804334 805117 804326 805084 803886 804611 804463 803975 803974 804457

Processed: trafficserver: FTBFS on ppc64el: Uses -mcx16

2015-11-14 Thread Debian Bug Tracking System
Processing control commands: > block 797926 by -1 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 805121 804605 804324 804334 804615 804606 804604 805117 803975 804467 805097 804607 804138 804431 804611 805083 803753 804603 803889 804623 804326

Bug#805124: trafficserver: FTBFS on ppc64el: Uses -mcx16

2015-11-14 Thread Kurt Roeckx
Source: trafficserver Version: 6.0.0-2 Severity: serious Control: block 797926 by -1 Hi, Your package is failing to build on ppc64el. It looks like this is the error: configure:25484: cc -c -g -O2 -fPIE -fstack-protector-strong -Wformat -Werror=format-security -O3 -std=gnu99 -pipe -Wall

Processed: tagging 804454 ...

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 804454 + upstream Bug #804454 [soundconverter] [soundconverter] Does not write any output files. Added tag(s) upstream. > forwarded 804454 > https://bugs.launchpad.net/ubuntu/+source/soundconverter/+bug/1516319 Bug #804454 [soundconverter]

Processed: transgui: Fixed dependency on libssl1.0.0

2015-11-14 Thread Debian Bug Tracking System
Processing control commands: > block 797926 by -1 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804603 803972 804138 804619 804326 804452 804455 804324 804615 803974 804623 805124 804334 804089 804440 804611 804327 803889 804463 805114 804616

Bug#805125: transgui: Fixed dependency on libssl1.0.0

2015-11-14 Thread Kurt Roeckx
Source: transgui Version: 5.0.1-2 Severity: serious Control: block 797926 by -1 Hi, Your package seems to have a dependency on libssl1.0.0. It has just been renamed to libssl1.0.2. After a rebuild you still depend on libss1.0.0. It seems the library is loaded using:

Processed: severity of 802118 is important

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 802118 important Bug #802118 [libengine-pkcs11-openssl] libengine-pkcs11-openssl: Functions to set static global data may cause memory leak. Severity set to 'important' from 'grave' > thanks Stopping processing here. Please contact me

Processed: Re: Bug#613674: Subject: xutils-dev: Can't get have_xmlto_text unless I add some content to the conftest.xml

2015-11-14 Thread Debian Bug Tracking System
Processing control commands: > severity -1 serious Bug #613674 [xutils-dev] Subject: xutils-dev: Can't get have_xmlto_text unless I add some content to the conftest.xml Severity set to 'serious' from 'normal' > affects -1 src:libxdmcp Bug #613674 [xutils-dev] Subject: xutils-dev: Can't get

Bug#805113: CVE-2015-8126: buffer overflow

2015-11-14 Thread Josh Triplett
Package: libpng12-0 Version: 1.2.50-2+b2 Severity: critical Tags: security upstream Quoting https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8126 > Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE > functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54,

Processed: block 797926 with 804440

2015-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 797926 with 804440 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804455 803974 804605 805097 804604 804616 804807 805084 804620 804457 804611 804452 804431 805112 804463 805083 803975

Processed: zorp: FTBFS: SSLv3 method removed

2015-11-14 Thread Debian Bug Tracking System
Processing control commands: > block 797926 by -1 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804457 805084 804431 804455 803753 804334 805083 804604 804607 804619 803881 804605 804324 803975 804138 804615 803974 804611 804327 803889 804807

Bug#805112: zorp: FTBFS: SSLv3 method removed

2015-11-14 Thread Kurt Roeckx
Source: zorp Version: 3.9.5-7 Severity: serious Control: block 797926 by -1 Hi, The SSLv3 methods in the openssl package have been removed and as a result your package can't be build anymore. The code looks like: if (strcmp(self->ssl_opts.ssl_method[side]->str, "SSLv23") == 0) { if

Processed: medusa: FTBFS: SSLv3 method removed

2015-11-14 Thread Debian Bug Tracking System
Processing control commands: > block 797926 by -1 Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods 797926 was blocked by: 804615 804326 804457 804431 804327 804336 804623 804463 804089 804452 805112 803886 804607 805084 804807 804620 803753 803881 805097 804440 805083

Bug#805114: medusa: FTBFS: SSLv3 method removed

2015-11-14 Thread Kurt Roeckx
Source: medusa Version: 2.1.1-1 Severity: serious Control: block 797926 by -1 Hi, SSLv3 support has been removed in Debian and as a result your package now fails to build. The code looks like this: /* The SSL context can support SSLv2, SSLv3, or both. The default is to use whatever the

  1   2   >