Processed: Add more blocking bugs

2019-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 930404 by 929829 Bug #930404 [gitlab] [Meta] move gitlab back to main from contrib 930404 was blocked by: 930262 930372 863294 863293 930404 was not blocking any bugs. Added blocking bug(s) of 930404: 929829 > Thanks Stopping processing

Processed: Re: Bug#911844: okular: Prints to the wrong printer

2019-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 911844 important Bug #911844 [okular] okular: Prints to the wrong printer Severity set to 'important' from 'critical' > thanks Stopping processing here. Please contact me if you need assistance. -- 911844:

Bug#929916: marked as done (libreswan: CVE-2019-12312)

2019-06-11 Thread Debian Bug Tracking System
Your message dated Tue, 11 Jun 2019 06:49:02 + with message-id and subject line Bug#929916: fixed in libreswan 3.29-1 has caused the Debian Bug report #929916, regarding libreswan: CVE-2019-12312 to be marked as done. This means that you claim that the problem has been dealt with. If this is

Bug#930348: chromium: missing intrinsics on armhf

2019-06-11 Thread Michael Gilbert
package: src:chromium severity: serious version: 75.0.3770.80-1 The latest upload fails to build on armhf due to missing intrinsics [0]. Best wishes, Mike [0]https://buildd.debian.org/status/fetch.php?pkg=chromium=armhf=75.0.3770.80-1=1560141959=0

Bug#928097: marked as done (chromium: crc32 build errors on arm64)

2019-06-11 Thread Debian Bug Tracking System
Your message dated Tue, 11 Jun 2019 02:07:04 -0400 with message-id and subject line Re: Bug#928097: chromium: crc32 build errors on arm64 has caused the Debian Bug report #928097, regarding chromium: crc32 build errors on arm64 to be marked as done. This means that you claim that the problem

Bug#911844: okular: Prints to the wrong printer

2019-06-11 Thread Martin Steigerwald
severity: important thanks Hi Brian, Brian Potkin - 10.06.19, 21:32: > Severity: critical > thanks > > On Thu 25 Oct 2018 at 12:50:25 +0100, Brian Potkin wrote: > > Package: okular > > Version: 4:17.12.2-2 > > Severity: critical > > Tags: upstream security > > > > > > > > "critical" because

Bug#767572: marked as done (libthunar-vfs-1-2-dbg: fails to upgrade from squeeze - trying to overwrite /usr/lib/debug/usr/lib/libthunar-vfs-1.so.2.3.1)

2019-06-11 Thread Debian Bug Tracking System
Your message dated Tue, 11 Jun 2019 13:47:21 +0200 with message-id <896bc054-7b27-6941-b707-e70dc3be9...@debian.org> and subject line thunar-vfs has been removed from Debian has caused the Debian Bug report #767572, regarding libthunar-vfs-1-2-dbg: fails to upgrade from squeeze - trying to

Processed: reassign 930256 to src:firefox, severity of 930256 is grave

2019-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 930256 src:firefox 68.0~b8-1 Bug #930256 [firefox-l10n-bn] Ignoring Provides line with non-equal DepCompareOp for package firefox-l10n-bn-bd Bug #930260 [firefox-l10n-bn] Ignoring Provides line with non-equal DepCompareOp for package

Bug#930356: CVE-2019-12760

2019-06-11 Thread Moritz Muehlenhoff
Source: parso Severity: grave Tags: security Please see https://bugzilla.redhat.com/show_bug.cgi?id=1718212 Patch is at https://gist.github.com/dhondta/f71ae7e5c4234f8edfd2f12503a5dcc7 Cheers, Moritz

Processed: Re: Bug#865975: #865975 docker.io breaks (bridged) network for VMs

2019-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 865975 critical Bug #865975 [docker.io] docker.io changes iptables default FORWARD policy to DROP, breaks VM and others Bug #930302 [docker.io] docker.io changes iptables default FORWARD policy to DROP, breaks VM and others Severity

Bug#865975: docker.io changes iptables default FORWARD policy to DROP, breaks VM and others

2019-06-11 Thread Shengjing Zhu
Hi, I checked more carefully on https://github.com/moby/moby/pull/28257 and https://github.com/moby/moby/issues/14041 Then I concluded that docker does nothing wrong in this case. If you didn't set net.ipv4.ip_forward=1 before starting docker, then docker will set this for you by default,

Bug#774290: marked as done (worldwind: Immediate crash (HeadlessException) with 'Java(TM) SE Runtime Environment (build 1.7.0_45-b18')

2019-06-11 Thread Debian Bug Tracking System
Your message dated Tue, 11 Jun 2019 13:38:40 +0200 with message-id <93beecac-7712-51e6-3701-97bbbd1ba...@debian.org> and subject line worldwind has been removed from Debian has caused the Debian Bug report #774290, regarding worldwind: Immediate crash (HeadlessException) with 'Java(TM) SE Runtime

Processed: found 930248 in 1.0-1.2, tagging 930248

2019-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > found 930248 1.0-1.2 Bug #930248 [gnome-xcf-thumbnailer] RM: gnome-xcf-thumbnailer -- RC buggy, dead-upstream, unmaintained, obsolete Marked as found in versions gnome-xcf-thumbnailer/1.0-1.2. > tags 930248 + sid buster Bug #930248

Bug#929469: systemd-networkd: systemd-networkd: fails with "could not set address: Permission denied"

2019-06-11 Thread Raphael Hertzog
Hi, On Wed, 05 Jun 2019, Michael Biebl wrote: > systemd-networkd.service in v241 is locked down more tightly then v232. > It might be worth a try to comment out the hardening features one by one > to see if one of them causes your problem. Thanks for the idea! I tried that but it did not help. I

Bug#930368: gatb-core: FTBFS due to inaccurate symbols file

2019-06-11 Thread Gilles Filippini
Source: gatb-core Version: 1.4.1+git20181225.44d5a44+dfsg-2 Severity: serious Justification: FTBFS -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, During a rebuild of gatb-core for unstable on amd64 I experienced a FTBFS at the dh_makeshlibs step: dh_makeshlibs

Bug#930375: CVE-2019-12749: DBusServer DBUS_COOKIE_SHA1 authentication bypass

2019-06-11 Thread Simon McVittie
Package: libdbus-1-3 Version: 1.0.0-1 Severity: grave Tags: security fixed-upstream patch Forwarded: https://gitlab.freedesktop.org/dbus/dbus/issues/269 Joe Vennix of Apple Information Security discovered an implementation flaw in the DBUS_COOKIE_SHA1 authentication mechanism. A malicious client

Bug#930373: Shotwell: double clicking on the image viewer freezes an image of the picture. Reboot required

2019-06-11 Thread Fran Glais
Package: shotwell Version: 0.30.1-1 Severity: critical Tags: patch Justification: breaks unrelated software Dear Maintainer, In a Wayland session (gnome-shell in my case), double-clicking on an image when using the Shotwell Viewer fullscreens the image, but then fails to close the picture. This

Bug#930375: CVE-2019-12749: DBusServer DBUS_COOKIE_SHA1 authentication bypass

2019-06-11 Thread Simon McVittie
Version: 1.12.16-1 On Tue, 11 Jun 2019 at 17:34:40 +0100, Simon McVittie wrote: > For buster this has been fixed in libdbus-1-3 1.12.16-1. I'll close this > bug when I have a bug number.

Bug#930376: gvfsd GetConnection() missing authorization check

2019-06-11 Thread Simon McVittie
Package: gvfs-daemons Version: 1.14.1-1 Severity: grave Tags: security fixed-upstream patch Forwarded: https://gitlab.gnome.org/GNOME/gvfs/commit/70dbfc68a79faac49bd3423e079cb6902522082a While looking for services that might be vulnerable to CVE-2019-12749 or a similar vulnerability, I noticed

Bug#930376: marked as done (gvfsd GetConnection() missing authorization check)

2019-06-11 Thread Debian Bug Tracking System
Your message dated Tue, 11 Jun 2019 18:00:41 +0100 with message-id <20190611170041.gc4...@espresso.pseudorandom.co.uk> and subject line Re: Bug#930376: gvfsd GetConnection() missing authorization check has caused the Debian Bug report #930376, regarding gvfsd GetConnection() missing authorization

Bug#930376: marked as done (gvfsd GetConnection() missing authorization check)

2019-06-11 Thread Debian Bug Tracking System
Your message dated Tue, 11 Jun 2019 17:58:59 +0100 with message-id <20190611165859.ga4...@espresso.pseudorandom.co.uk> and subject line Re: Bug#930376: gvfsd GetConnection() missing authorization check has caused the Debian Bug report #930376, regarding gvfsd GetConnection() missing authorization

Bug#928770: closed by Laszlo Boszormenyi (GCS) (Bug#928770: fixed in sqlite3 3.27.2-3)

2019-06-11 Thread Salvatore Bonaccorso
Hi! On Tue, Jun 11, 2019 at 07:24:06AM +0200, László Böszörményi (GCS) wrote: > Hi Salvatore, > > On Tue, Jun 11, 2019 at 6:18 AM Salvatore Bonaccorso > wrote: > > On Mon, Jun 10, 2019 at 05:06:07PM +, Debian Bug Tracking System wrote: > > > sqlite3 (3.27.2-3) unstable; urgency=high > > >

Processed: rdekstop: security issues fixed in 1.8.5 and 1.8.6

2019-06-11 Thread Debian Bug Tracking System
Processing control commands: > fixed -1 1.8.6-1 Bug #930387 [src:rdesktop] rdekstop: security issues fixed in 1.8.5 and 1.8.6 Marked as fixed in versions rdesktop/1.8.6-1. -- 930387: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930387 Debian Bug Tracking System Contact

Bug#930388: ruby-openid: CVE-2019-11027

2019-06-11 Thread Salvatore Bonaccorso
Source: ruby-openid Version: 2.7.0debian-1 Severity: grave Tags: security upstream Justification: user security hole Forwarded: https://github.com/openid/ruby-openid/issues/122 Hi, The following vulnerability was published for ruby-openid. CVE-2019-11027[0]: | Ruby OpenID (aka ruby-openid)

Bug#916610: spacenavd: diff for NMU version 0.6-1.1

2019-06-11 Thread sur5r
Control: tags 916610 + pending Dear maintainer, I've prepared an NMU for spacenavd (versioned as 0.6-1.1) and uploaded it to DELAYED/2. Please feel free to tell me if I should delay it longer. Regards. diff -Nru spacenavd-0.6/debian/changelog spacenavd-0.6/debian/changelog ---

Processed: spacenavd: diff for NMU version 0.6-1.1

2019-06-11 Thread Debian Bug Tracking System
Processing control commands: > tags 916610 + pending Bug #916610 [spacenavd] spacenavd: conflict with /dev/input/js0 Added tag(s) pending. -- 916610: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916610 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Processed: .

2019-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 929617 pending patch Bug #929617 [src:d3-format] d3-format: latest-debian-changelog-entry-reuses-existing-version Added tag(s) pending and patch. > thanks Stopping processing here. Please contact me if you need assistance. -- 929617:

Processed: found 930356 in 0.3.1-1

2019-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > found 930356 0.3.1-1 Bug #930356 [src:parso] CVE-2019-12760 Marked as found in versions parso/0.3.1-1. > thanks Stopping processing here. Please contact me if you need assistance. -- 930356:

Bug#930387: rdekstop: security issues fixed in 1.8.5 and 1.8.6

2019-06-11 Thread Salvatore Bonaccorso
Source: rdesktop Version: 1.8.4-1 Severity: grave Tags: security upstream fixed-upstream Justification: user security hole Control: fixed -1 1.8.6-1 Hi 1.8.6-1 mentions a new upstream release with many security fixes, but none of those apparently have (yet) a CVE. Filling this bug for having an

Bug#927126: Fwd: Bug#929342: unblock: aqemu/0.9.2-2.2

2019-06-11 Thread Paul Gevers
Hi Alexis, [Note: when you think you have covered questions asked, please remove the moreinfo tag, as it will make the bug show up in the list of bugs that need attention from us]. On 06-06-2019 22:16, Alexis Murzeau wrote: > The modification I've done in version aqemu/0.9.2-2.3 specifically fix

Processed: Re: Bug#930373: Shotwell: double clicking on the image viewer freezes an image of the picture. Reboot required

2019-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 930373 + moreinfo Bug #930373 [shotwell] Shotwell: double clicking on the image viewer freezes an image of the picture. Reboot required Added tag(s) moreinfo. > severity 930373 important Bug #930373 [shotwell] Shotwell: double clicking on

Bug#930348: chromium: missing intrinsics on armhf

2019-06-11 Thread Riku Voipio
The build is fixed in: https://salsa.debian.org/chromium-team/chromium/commits/arm-fixes/debian I can make an upload if you prefer, or I can wait for you. Cheers, Riku

Bug#930375: marked as done (CVE-2019-12749: DBusServer DBUS_COOKIE_SHA1 authentication bypass)

2019-06-11 Thread Debian Bug Tracking System
Your message dated Tue, 11 Jun 2019 19:27:05 +0100 with message-id <20190611182705.ga8...@espresso.pseudorandom.co.uk> and subject line Re: Bug#930375: CVE-2019-12749: DBusServer DBUS_COOKIE_SHA1 authentication bypass has caused the Debian Bug report #930375, regarding CVE-2019-12749: DBusServer

Processed: closing 930387

2019-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > close 930387 1.8.6-1 Bug #930387 [src:rdesktop] rdekstop: security issues fixed in 1.8.5 and 1.8.6 Ignoring request to alter fixed versions of bug #930387 to the same values previously set Bug #930387 [src:rdesktop] rdekstop: security issues

Bug#930387: closing 930387

2019-06-11 Thread Salvatore Bonaccorso
close 930387 1.8.6-1 thanks

Bug#930375: marked as done (CVE-2019-12749: DBusServer DBUS_COOKIE_SHA1 authentication bypass)

2019-06-11 Thread Debian Bug Tracking System
Your message dated Tue, 11 Jun 2019 19:28:00 +0100 with message-id <20190611182800.gb8...@espresso.pseudorandom.co.uk> and subject line Re: Bug#930375: CVE-2019-12749: DBusServer DBUS_COOKIE_SHA1 authentication bypass has caused the Debian Bug report #930375, regarding CVE-2019-12749: DBusServer

Processed: change outlook of 865975

2019-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > outlook 865975 enable net.ipv4.ip_forward before starting docker Outlook replaced with message bug 865975 message Outlook replaced with message bug 865975 message > End of message, stopping processing here. Please contact me if you need

Processed: tagging 930356

2019-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 930356 + upstream Bug #930356 [src:parso] CVE-2019-12760 Added tag(s) upstream. > thanks Stopping processing here. Please contact me if you need assistance. -- 930356: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930356 Debian Bug

Bug#927126: Fwd: Bug#929342: unblock: aqemu/0.9.2-2.2

2019-06-11 Thread Alexis Murzeau
Le 11/06/2019 à 21:58, Paul Gevers a écrit : > Hi Alexis, > > [Note: when you think you have covered questions asked, please remove > the moreinfo tag, as it will make the bug show up in the list of bugs > that need attention from us]. Ok, I guess that tag should be removed once aqemu/0.9.2-2.3

Processed: retitle 930376 to CVE-2019-12795: gvfsd GetConnection() missing authorization check

2019-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > retitle 930376 CVE-2019-12795: gvfsd GetConnection() missing authorization > check Bug #930376 {Done: Simon McVittie } [gvfs-daemons] gvfsd GetConnection() missing authorization check Changed Bug title to 'CVE-2019-12795: gvfsd GetConnection()

Bug#929617: marked as done (d3-format: latest-debian-changelog-entry-reuses-existing-version)

2019-06-11 Thread Debian Bug Tracking System
Your message dated Tue, 11 Jun 2019 22:03:42 + with message-id and subject line Bug#929617: fixed in d3-format 1:1.0.2-3.1 has caused the Debian Bug report #929617, regarding d3-format: latest-debian-changelog-entry-reuses-existing-version to be marked as done. This means that you claim that

Bug#881566: Epydoc will be removed after buster

2019-06-11 Thread Kenneth Pronovici
Hi, This bug report is now over 18 months old with no reply. I intend to have the eypdoc package removed from unstable a few weeks after buster is released. Besides its lack of support for Python 3, epydoc has been completely unsupported upstream for close to a decade. It really should have

Bug#930168: Confirming the bug on Debian

2019-06-11 Thread Alexander Kernozhitsky
I also encounter this bug on Debian Buster. But I manually disabled all the AppStream and DEP-11 metadata from apt configs, so this may be the reason. Can anyone reproduce this on a clean system? -- Alexander Kernozhitsky

Bug#930299: marked as done (apt: A warning "Ignoring Provides line with non-equal DepCompareOp for package" for two packages)

2019-06-11 Thread Debian Bug Tracking System
Your message dated Wed, 12 Jun 2019 01:21:33 + with message-id and subject line Bug#930256: fixed in firefox 68.0~b9-1 has caused the Debian Bug report #930256, regarding apt: A warning "Ignoring Provides line with non-equal DepCompareOp for package" for two packages to be marked as done.

Bug#930256: marked as done (Ignoring Provides line with non-equal DepCompareOp for package firefox-l10n-bn-bd)

2019-06-11 Thread Debian Bug Tracking System
Your message dated Wed, 12 Jun 2019 01:21:33 + with message-id and subject line Bug#930256: fixed in firefox 68.0~b9-1 has caused the Debian Bug report #930256, regarding Ignoring Provides line with non-equal DepCompareOp for package firefox-l10n-bn-bd to be marked as done. This means that

Bug#930260: marked as done (Ignoring Provides line with non-equal DepCompareOp for package firefox-l10n-bn-bd)

2019-06-11 Thread Debian Bug Tracking System
Your message dated Wed, 12 Jun 2019 01:21:33 + with message-id and subject line Bug#930256: fixed in firefox 68.0~b9-1 has caused the Debian Bug report #930256, regarding Ignoring Provides line with non-equal DepCompareOp for package firefox-l10n-bn-bd to be marked as done. This means that