From owner at bugs.debian.org Mon Jun 1 09:03:03 2020 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Mon, 01 Jun 2020 08:03:03 +0000 Subject: Processed: found 961889 in 3.6.7-1, found 961889 in 3.5.8-1, severity of 961889 is serious References: <1590998317-2905-bts-ametzler@debian.org> Message-ID: Processing commands for control at bugs.debian.org: > found 961889 3.6.7-1 Bug #961889 [src:gnutls28] src:gnutls28: Fails building chains with expired intermediate regardless of trust store Marked as found in versions gnutls28/3.6.7-1. > found 961889 3.5.8-1 Bug #961889 [src:gnutls28] src:gnutls28: Fails building chains with expired intermediate regardless of trust store Marked as found in versions gnutls28/3.5.8-1. > severity 961889 serious Bug #961889 [src:gnutls28] src:gnutls28: Fails building chains with expired intermediate regardless of trust store Severity set to 'serious' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 961889: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961889 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From ftpmaster at ftp-master.debian.org Mon Jun 1 10:14:18 2020 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Mon, 01 Jun 2020 09:14:18 +0000 Subject: Processing of gnutls28_3.6.13-4_multi.changes Message-ID: gnutls28_3.6.13-4_multi.changes uploaded successfully to localhost along with the files: gnutls28_3.6.13-4.dsc gnutls28_3.6.13-4.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org) From ftpmaster at ftp-master.debian.org Mon Jun 1 10:18:51 2020 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Mon, 01 Jun 2020 09:18:51 +0000 Subject: gnutls28_3.6.13-4_multi.changes ACCEPTED into unstable Message-ID: Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Mon, 01 Jun 2020 10:34:25 +0200 Source: gnutls28 Architecture: source Version: 3.6.13-4 Distribution: unstable Urgency: medium Maintainer: Debian GnuTLS Maintainers Changed-By: Andreas Metzler Closes: 961889 Changes: gnutls28 (3.6.13-4) unstable; urgency=medium . * Output some network related debugging from debian/rules. * Fix verification error with alternate chains. Closes: #961889 Checksums-Sha1: ae3303cec3065a3057cd4b8e902908abf94a758f 3479 gnutls28_3.6.13-4.dsc e2faf23583c3ac9a5eb0aa83dacdeb6a5109951b 68068 gnutls28_3.6.13-4.debian.tar.xz Checksums-Sha256: 0a9f4becd4b88477d3cfa2593fb60b5e8e52c7739c74c817f9c508107b9cd295 3479 gnutls28_3.6.13-4.dsc 490ccbce3730cc976e19008329198ea0e6205d77ca297496744071352c063448 68068 gnutls28_3.6.13-4.debian.tar.xz Files: a2adbdd0fe35c40b933feb81b43c841b 3479 libs optional gnutls28_3.6.13-4.dsc 1f990100dd348223e43941253e8ebead 68068 libs optional gnutls28_3.6.13-4.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEE0uCSA5741Jbt9PpepU8BhUOCFIQFAl7Uw5kACgkQpU8BhUOC FIQTZxAAm2KnegX6VwsE2oBpAtQtS+RwYIM41y2lcxUkAVklC/q7J2q5cYkv28l8 YT8LIEzuXLgobFWKbhXxbX7/AtU9BrQ4kCIMhP78baJ2xGhPzKkg2cZCYyIccK/z PsCm0OoBj0beteEXR24LAFLxYN0AdxCBvPU+gL58G+ZnNxogdQqu/bcLHm4UENdJ b4xheJ8hVig2ZTukglXJfB7ufAXWWcKUAss3be8La/TILtotyguvq4gavFQFJwVP So+zLh7SZEo8+c95Wogt3BsQANEVrwX6IkipUKVicBAY9vwElT2zW0V0wjYn34sS xjjJFu6paEz7XpSmXJUe7DX7ZAS4BYQ/jVu/+h2OlT7Cm9krkAHV+5FKGz4TM0sd nXcf8hof2GG7hN7+4g85WdtNPESJP5WIvokEjQ6ZmR364g1/3cwaX7fTVjmEdir/ o1sd9AgCdTxfa0AhWpTXSSaOVnILNoeENS/lW5CDCHkhjbK3qWmikpSmq1NzoF0R 8r9VwKTodEUN/H3zFZ2Cb0/i7i5SldnGEcX+LuJ8UUFjTuB3MAFsN1kFC8VdEy/I 6/4hZ+73UzK7hJKTkAhGqEPXnD8Q+X8oAVBJI6pwaFJ4jY02KAT0ndmWZp1jfS/D C55STJPm7FwLZlUpajTAhwmv4nwIPLwAxYYclutL1X0cRANC+wc= =r7oU -----END PGP SIGNATURE----- Thank you for your contribution to Debian. From owner at bugs.debian.org Mon Jun 1 10:21:03 2020 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Mon, 01 Jun 2020 09:21:03 +0000 Subject: Bug#961889: marked as done (src:gnutls28: Fails building chains with expired intermediate regardless of trust store) References: <159087918969.3631489.3818329626307855049.reportbug@percival.namespace.at> Message-ID: Your message dated Mon, 01 Jun 2020 09:18:51 +0000 with message-id and subject line Bug#961889: fixed in gnutls28 3.6.13-4 has caused the Debian Bug report #961889, regarding src:gnutls28: Fails building chains with expired intermediate regardless of trust store to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 961889: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961889 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Chris Hofstaedtler Subject: src:gnutls28: Fails building chains with expired intermediate regardless of trust store Date: Sun, 31 May 2020 00:53:09 +0200 Size: 5354 URL: -------------- next part -------------- An embedded message was scrubbed... From: Debian FTP Masters Subject: Bug#961889: fixed in gnutls28 3.6.13-4 Date: Mon, 01 Jun 2020 09:18:51 +0000 Size: 4971 URL: From ipmplant at gmail.com Mon Jun 1 15:15:33 2020 From: ipmplant at gmail.com (=?euc-kr?B?ZGVubnloYW4=?=) Date: Mon, 01 Jun 2020 23:15:33 +0900 Subject: =?euc-kr?B?IChBRCkgT1NBTkcgSEVB?= =?euc-kr?B?TFRIQ0FSRSAuLCBsdGQg?= =?euc-kr?B?Q09WSUQtMTkgZGlhZ25v?= =?euc-kr?B?c3RpYyBraXQh?= Message-ID: <202006012315336243@send66.postman.co.kr> An HTML attachment was scrubbed... URL: From contato at kasat.com.br Mon Jun 1 23:51:15 2020 From: contato at kasat.com.br (Douglas McGregor) Date: Mon, 01 Jun 2020 15:51:15 -0700 Subject: Is this email still active? Message-ID: I have been trying to reach you, is this email still active? I have something important to discuss with you. Please get back to me as soon as you can. A. Douglas McGregor From sales at bonesca.nl Tue Jun 2 20:28:21 2020 From: sales at bonesca.nl (Bonesca Sales) Date: Tue, 2 Jun 2020 22:28:21 +0300 Subject: Portal Bonesca Message-ID: An HTML attachment was scrubbed... URL: From noreply at release.debian.org Wed Jun 3 05:39:08 2020 From: noreply at release.debian.org (Debian testing watch) Date: Wed, 03 Jun 2020 04:39:08 +0000 Subject: libksba 1.4.0-2 MIGRATED to testing Message-ID: FYI: The status of the libksba source package in Debian's testing distribution has changed. Previous version: 1.3.5-2 Current version: 1.4.0-2 -- This email is automatically generated once a day. As the installation of new packages into testing happens multiple times a day you will receive later changes on the next day. See https://release.debian.org/testing-watch/ for more information. From genevaforum at osi-ngo.org Wed Jun 3 11:42:12 2020 From: genevaforum at osi-ngo.org (Geneva Forum at United Nations (Objectif Sciences International)) Date: Wed, 3 Jun 2020 10:42:12 +0000 Subject: Invitation United Nations / Nations-Unies Message-ID: Invitation United Nations / Nations Unies French version below (Version Française plus bas) The World is Small ! Please forward this invitation through all your networks ; Somebody you don't know but connected by only 2 persons with you, is also concerned by this invitation ! Dear all, I have the great pleasure to share to you the Program and Calls for Contribution of the GENEVA FORUM that will be done at United Nations, Geneva, next December about these 6 key factor topics : Annual International Conference on Participatory Research, Citizen Sciences, Crowd-Innovation and Fab Labs for Sustainable Development Goals and Peace http://www.osi-genevaforum.org/Participatory-Researches-Citizen-Sciences.html Annual International Conference on Inclusive Education and Project Based Learning for Sustainable Development Goals and Peace http://www.osi-genevaforum.org/Project-Based-Learning-for-Peace-and-Development.html Annual International Conference on Rights of Nature for Sustainable Development Goals and Peace http://www.osi-genevaforum.org/Rights-of-Nature-for-Peace-and-Development.html Annual International Conference on Sustainable Tourism and Smart Travel for Sustainable Development Goals and Peace http://www.osi-genevaforum.org/Pedagogy-Travel-Tourism-Peace-Development.html Annual International Conference on Smart Finance and Cryptocurrencies for Sustainable Development Goals and Peace http://www.osi-genevaforum.org/Smart-Finance-Cryptocurrencies-for-Peace-and-Sustainable-Development-Annual.html Annual International Conference on Impact Investment, Donations and Philanthropists for Sustainable Development Goals and Peace http://www.osi-genevaforum.org/Impact-investments-Donations-Philanthropists-for-Peace-and-Sustainable.html The interest of numerous of my relations for this annual meeting, bring me to invite all of you to meet back together during these days dedicated to changing the world : Look the pdf « Program of the week » on the page http://www.osi-genevaforum.org/Registration.html Are already subscribed people of 5 networks coming from Germany, UK, USA, Tunisia, Togo, Spain, Iceland, China, Bolivia, Mexico, Brasilia, Guinea, Congo RDC, Morocco, France, Switzerland... Please forward this information to your network with a customized introduction from yourself. By persuading friends and partners to come in the United Nations, you enhance the potential for projects to succeed. See you soon on the field, Version française Le Monde est Petit ! Merci de faire suivre cette invitation à travers tous vos réseaux : Quelqu'un que vous ne connaissez pas, mais connecté avec vous par seulement 2 personnes interposées, est également concerné par cette invitation ! Chers tous, J'ai le grand plaisir de vous partager le Programme et les Appels à Contribution du FORUM DE GENÈVE qui a lieu à l'ONU à Genève en Décembre prochain, à propos des thèmes de ces 6 facteurs clés : Conférence Annuelle Internationale sur la Recherche Participative, les Sciences Citoyennes, l'Innovation Partagée et les Fab Labs pour la Paix et la réalisation des Objectifs du Développement Durable http://www.osi-genevaforum.org/Participatory-Researches-Citizen-Sciences.html?lang=fr Conférence Annuelle Internationale sur la Pédagogie de Projet et l'Education Inclusive pour la Paix et la réalisation des Objectifs du Développement Durable http://www.osi-genevaforum.org/Project-Based-Learning-for-Peace-and-Development.html?lang=fr Conférence Annuelle Internationale sur les Droits de la Nature pour la Paix et la réalisation des Objectifs du Développement Durable http://www.osi-genevaforum.org/Rights-of-Nature-for-Peace-and-Development.html?lang=fr Conférence Annuelle Internationale sur le Tourisme Durable et le Voyage Intelligent pour la Paix et la réalisation des Objectifs du Développement Durable http://www.osi-genevaforum.org/Pedagogy-Travel-Tourism-Peace-Development.html?lang=fr Conférence Annuelle Internationale sur le Financement Participatif, la Finance Intelligente et les Crypto-monnaies pour la Paix et la réalisation des Objectifs du Développement Durable http://www.osi-genevaforum.org/Smart-Finance-Cryptocurrencies-for-Peace-and-Sustainable-Development-Annual.html?lang=fr Conférence Annuelle Internationale sur les Investissements à Impacts, les Dons et la Philanthropie pour la Paix et la réalisation des Objectifs du Développement Durable http://www.osi-genevaforum.org/Impact-investments-Donations-Philanthropists-for-Peace-and-Sustainable.html?lang=fr L'intérêt que beaucoup de mes relations ont montré pour cette réunion annuelle, m'amène à tous vous inviter personnellement à vous retrouver dans le cadre de ces journées dédiées à changer le monde : Voir le pdf « Programme de la Semaine » sur le lien http://www.osi-genevaforum.org/Registration.html?lang=fr Sont déjà inscrits des acteurs de ces 5 réseaux en provenance d'Allemagne, des UK, des USA, de Tunisie, du Togo, d'Espagne, Islande, Chine, Bolivie, Mexique, Brésil, Guinée, Congo RDC, Maroc, France, Suisse... Merci de faire suivre cet appel à contribution dans vos réseaux, accompagné d'un petit mot de votre part. Si vous faites venir vos amis et partenaires au sein des Nations Unies, cela viendra renforcer votre capacité de projets. A bientôt sur le terrain, - Thomas EGLI - Founder of the NGO Objectif Sciences International Manager of the Participation Development Program OSI DEV Manager of the OSI GENEVA FORUM at UN Objectif Sciences International - NGO International Annual Conferences : osi-genevaforum.org Science Camps and Participatory Research : vacances-scientifiques.com Institutional Web Site : osi-ngo.org Special Consultative Status to Economic and Social Council of the United Nations Membre of the AAAS Science and Human Rights Coalition shr.aaas.org Membre of the community of Practices of the International Bureau of Education ibe.unesco.org -------------- next part -------------- An HTML attachment was scrubbed... URL: From helmut at subdivi.de Thu Jun 4 15:00:39 2020 From: helmut at subdivi.de (Helmut Grohne) Date: Thu, 4 Jun 2020 16:00:39 +0200 Subject: Bug#962199: gnutls28 FTBFS when using the nocheck build profile Message-ID: <20200604140039.GA22608@alf.mars> Source: gnutls28 Version: 3.6.13-4 Tags: patch ftbfs User: helmutg at debian.org Usertags: rebootstrap gnutls28 fails to build from source when activating the nocheck build profile, because it uses netstat, but the corresponding depdendency is conditional to the profile. Please consider applying the attached patch to fix the buile. Helmut -------------- next part -------------- diff --minimal -Nru gnutls28-3.6.13/debian/changelog gnutls28-3.6.13/debian/changelog --- gnutls28-3.6.13/debian/changelog 2020-06-01 10:34:25.000000000 +0200 +++ gnutls28-3.6.13/debian/changelog 2020-06-04 05:59:42.000000000 +0200 @@ -1,3 +1,10 @@ +gnutls28 (3.6.13-4.1) UNRELEASED; urgency=medium + + * Non-maintainer upload. + * Fix FTFBS with nocheck build profile. (Closes: #-1) + + -- Helmut Grohne Thu, 04 Jun 2020 05:59:42 +0200 + gnutls28 (3.6.13-4) unstable; urgency=medium * Output some network related debugging from debian/rules. diff --minimal -Nru gnutls28-3.6.13/debian/rules gnutls28-3.6.13/debian/rules --- gnutls28-3.6.13/debian/rules 2020-06-01 10:03:00.000000000 +0200 +++ gnutls28-3.6.13/debian/rules 2020-06-04 05:59:40.000000000 +0200 @@ -102,11 +102,13 @@ dh_compress $(BDIR) -X.pdf override_dh_auto_test: +ifeq (,$(filter nocheck,$(DEB_BUILD_OPTIONS))) @echo DEBUG info about network setup starts ... if test -x /sbin/ifconfig ; then /sbin/ifconfig ; else true ; fi netstat -tln @echo ... DEBUG info about network setup ends. dh_auto_test $(BDIR) --verbose -- VERBOSE=1 +endif override_dh_clean: dh_clean $(BDIR) -X.bak From ametzler at bebt.de Thu Jun 4 15:43:13 2020 From: ametzler at bebt.de (Andreas Metzler) Date: Thu, 4 Jun 2020 16:43:13 +0200 Subject: Bug#962199: gnutls28 FTBFS when using the nocheck build profile In-Reply-To: <20200604140039.GA22608@alf.mars> References: <20200604140039.GA22608@alf.mars> <20200604140039.GA22608@alf.mars> Message-ID: <20200604144313.GA1481@argenau.bebt.de> On 2020-06-04 Helmut Grohne wrote: > Source: gnutls28 > Version: 3.6.13-4 > Tags: patch ftbfs > User: helmutg at debian.org > Usertags: rebootstrap > gnutls28 fails to build from source when activating the nocheck build > profile, because it uses netstat, but the corresponding depdendency is > conditional to the profile. Please consider applying the attached patch > to fix the buile. [...] Sorry for that. I will drop the whole block once I have managed for gnutls to not heisen-FTBFS on regular builds on Debian buildds. cu Andreas From ftpmaster at ftp-master.debian.org Thu Jun 4 17:29:45 2020 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Thu, 04 Jun 2020 16:29:45 +0000 Subject: Processing of gnutls28_3.6.13-5_source.changes Message-ID: gnutls28_3.6.13-5_source.changes uploaded successfully to localhost along with the files: gnutls28_3.6.13-5.dsc gnutls28_3.6.13-5.debian.tar.xz gnutls28_3.6.13-5_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org) From ftpmaster at ftp-master.debian.org Thu Jun 4 17:33:33 2020 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Thu, 04 Jun 2020 16:33:33 +0000 Subject: gnutls28_3.6.13-5_source.changes ACCEPTED into experimental Message-ID: Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Thu, 04 Jun 2020 18:08:14 +0200 Source: gnutls28 Architecture: source Version: 3.6.13-5 Distribution: experimental Urgency: low Maintainer: Debian GnuTLS Maintainers Changed-By: Andreas Metzler Changes: gnutls28 (3.6.13-5) experimental; urgency=low . * Reupload to experimental to verify that something outside gnutls has made gnutls -3 and later heisen-FTBFS on Debian's buildds. Modify debian/rules to force package build error after testsuite run. Checksums-Sha1: 5f4827c202a83f9812092484ed3f16885353caff 3479 gnutls28_3.6.13-5.dsc 4779f27a5aaf847fe94b97c7077f65f1b05b3edd 61276 gnutls28_3.6.13-5.debian.tar.xz e4d30731f98865ab8a2342887e98c11e9e1b31b4 6550 gnutls28_3.6.13-5_source.buildinfo Checksums-Sha256: 01d073950ce71894211fbeb5945328a9bc52b96a52908ab8ff9e1860d06d6907 3479 gnutls28_3.6.13-5.dsc 3ad53eec53aaa28d39e6731a506e069bbc5bfb2ee5157b4503004520cf948340 61276 gnutls28_3.6.13-5.debian.tar.xz 46d51df553214253fee5902ce7d4561a0fb515e69710d1a8345d14b862060221 6550 gnutls28_3.6.13-5_source.buildinfo Files: 863c918af8e688dea61ecb86bbeb2e25 3479 libs optional gnutls28_3.6.13-5.dsc f02e9706eb360f361875079cdb295c15 61276 libs optional gnutls28_3.6.13-5.debian.tar.xz 4a7637e3d12fa2925e1cf34f344b0fd6 6550 libs optional gnutls28_3.6.13-5_source.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEE0uCSA5741Jbt9PpepU8BhUOCFIQFAl7ZHjcACgkQpU8BhUOC FITIAw/9GDPDBy/VYeqNQ8GFBHvgUaftCv7KQe8uMbwi03ucqV92S2/Ux1lN1SW0 TG+s0L3JA3CCHj3+gk/3Mc4U/593zAayo4vLa8bq5LYlvWh86SA2cO/QidUGcDr1 FtVWMVbT63I5pyXLYu84jGZrA8lTBEpGjVaGXUq/Vcl9d03w+Jyvsx3Oq6ARnkXm bsc/9+pyCxCqBikILx2xZqfdhCe3kqEoYffvSIdgovbXdjFVWuStynzStsrOu5ln xF1eK2eQFw/3OA/jwylVNdQJorPcCcgzBHHazwxRKchf4khiI0v3GjSIKTgVqwS5 HXA+VwRFgHImwaJFrYW1F0jxXPQ24FKUw/poMz5e/e+tINxcV3dgZ/hHauo1XG+5 JgYuDX/JZY14YbZ4GAlD/cXKT+sggfxgdtTs8ofeJ/EKXulK6jecXrgrv8DANslX QojmoQdrEXzU/ZdiEBp5oqZCUClTSymvuPQXiAN/eVeb9N/VKUBGAkfDBAn6KsMQ XyygdZOdy2dVNdicQvyrt7QBGW3vHaHxtJ2VUUgfyhkYRMq+DP0r9X/rpGC2mQ/7 /Pr9UOjBNmEc3t1Y0np++74MKAIHxUVrujwdZvt3GIzz9S1IgfOwh8X9/ea7V4hq McmVjlCWTT+kZ4NhjiC4ZaLFEEuMPrrK73F3JxnDYpWL9XpMWZc= =Cwqr -----END PGP SIGNATURE----- Thank you for your contribution to Debian. From bunk at debian.org Thu Jun 4 17:59:22 2020 From: bunk at debian.org (Adrian Bunk) Date: Thu, 04 Jun 2020 19:59:22 +0300 Subject: Bug#962218: gnutls28: build fails on IPv6-only buildds Message-ID: <159128996234.21244.4980861446799504629.reportbug@localhost> Source: gnutls28 Version: 3.6.13-2 Severity: serious Tags: ftbfs https://buildd.debian.org/status/logs.php?pkg=gnutls28&ver=3.6.13-3 https://buildd.debian.org/status/logs.php?pkg=gnutls28&ver=3.6.13-4 ... SKIP: ssl30-server-kx-neg ========================= SKIP ssl30-server-kx-neg (exit status: 77) SKIP: ssl30-cipher-neg ====================== SKIP ssl30-cipher-neg (exit status: 77) SKIP: fips-mode-pthread ======================= We are not in FIPS140 mode SKIP fips-mode-pthread (exit status: 77) SKIP: fips-test =============== Please note that if in FIPS140 mode, you need to assure the library's integrity prior to running this test We are not in FIPS140 mode SKIP fips-test (exit status: 77) SKIP: fips-override-test ======================== Please note that if in FIPS140 mode, you need to assure the library's integrity prior to running this test We are not in FIPS140 mode SKIP fips-override-test (exit status: 77) SKIP: ssl30-cert-key-exchange ============================= SKIP ssl30-cert-key-exchange (exit status: 77) FAIL: dtls_hello_random_value ============================= testing: default client:156: client: Handshake failed: Resource temporarily unavailable, try again. server:271: server: Handshake has failed: The TLS connection was non-properly terminated. FAIL dtls_hello_random_value (exit status: 1) SKIP: starttls.sh ================= SKIP starttls.sh (exit status: 77) SKIP: starttls-ftp.sh ===================== SKIP starttls-ftp.sh (exit status: 77) SKIP: starttls-smtp.sh ====================== SKIP starttls-smtp.sh (exit status: 77) SKIP: starttls-lmtp.sh ====================== SKIP starttls-lmtp.sh (exit status: 77) SKIP: starttls-pop3.sh ====================== SKIP starttls-pop3.sh (exit status: 77) SKIP: starttls-xmpp.sh ====================== SKIP starttls-xmpp.sh (exit status: 77) SKIP: starttls-nntp.sh ====================== SKIP starttls-nntp.sh (exit status: 77) SKIP: starttls-sieve.sh ======================= SKIP starttls-sieve.sh (exit status: 77) SKIP: p11-kit-trust.sh ====================== p11-kit trust module was not found SKIP p11-kit-trust.sh (exit status: 77) ============================================================================ Testsuite summary for GnuTLS 3.6.13 ============================================================================ # TOTAL: 471 # PASS: 455 # SKIP: 15 # XFAIL: 0 # FAIL: 1 # XPASS: 0 # ERROR: 0 ============================================================================ See tests/test-suite.log Please report to bugs at gnutls.org ============================================================================ make[6]: *** [Makefile:8525: test-suite.log] Error 1 The conova buildds are IPv6-only, see #962019 for a similar problem in perl. From ametzler at bebt.de Thu Jun 4 18:32:13 2020 From: ametzler at bebt.de (Andreas Metzler) Date: Thu, 4 Jun 2020 19:32:13 +0200 Subject: Bug#962218: gnutls28: build fails on IPv6-only buildds In-Reply-To: <159128996234.21244.4980861446799504629.reportbug@localhost> References: <159128996234.21244.4980861446799504629.reportbug@localhost> <159128996234.21244.4980861446799504629.reportbug@localhost> Message-ID: <20200604173213.GC1481@argenau.bebt.de> On 2020-06-04 Adrian Bunk wrote: > Source: gnutls28 > Version: 3.6.13-2 > Severity: serious > Tags: ftbfs > https://buildd.debian.org/status/logs.php?pkg=gnutls28&ver=3.6.13-3 > https://buildd.debian.org/status/logs.php?pkg=gnutls28&ver=3.6.13-4 > ... [...] > The conova buildds are IPv6-only, see #962019 for a similar > problem in perl. Helo Adrian, is there a way to declare a dependency on IPv4 for building? Also the setup is strange, both netstat and ifconfig show IPv4: DEBUG info about network setup starts ... if test -x /sbin/ifconfig ; then /sbin/ifconfig ; else true ; fi eth0: flags=4163 mtu 1500 inet6 2a02:16a8:dc41:100::240 prefixlen 64 scopeid 0x0 inet6 fe80::216:37ff:fed2:16f0 prefixlen 64 scopeid 0x20 ether 00:16:37:d2:16:f0 txqueuelen 1000 (Ethernet) RX packets 108814178 bytes 157204088386 (146.4 GiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 13855486 bytes 11641875516 (10.8 GiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 lo: flags=73 mtu 65536 inet 127.0.0.1 netmask 255.0.0.0 inet6 ::1 prefixlen 128 scopeid 0x10 loop txqueuelen 1000 (Local Loopback) RX packets 4506091 bytes 20691973484 (19.2 GiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 4506091 bytes 20691973484 (19.2 GiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 netstat -tln Active Internet connections (only servers) Proto Recv-Q Send-Q Local Address Foreign Address State tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN tcp 0 0 0.0.0.0:5666 0.0.0.0:* LISTEN tcp 0 0 127.0.0.1:53 0.0.0.0:* LISTEN tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN tcp 0 0 127.0.0.1:8888 0.0.0.0:* LISTEN tcp6 0 0 :::25 :::* LISTEN tcp6 0 0 :::5666 :::* LISTEN tcp6 0 0 :::4949 :::* LISTEN tcp6 0 0 ::1:53 :::* LISTEN tcp6 0 0 :::22 :::* LISTEN ... DEBUG info about network setup ends. dh_auto_test -O--builddirectory=b4deb --verbose -- VERBOSE=1 cd b4deb && make -j4 check VERBOSE=1 VERBOSE=1 cu Andreas PS: I wish the introduction of IPv6-only buildds a) had not happened when I was trying to get a fix for a serious bug into testing (and buster) and b) was not happening without announcement. -- `What a good friend you are to him, Dr. Maturin. His other friends are so grateful to you.' `I sew his ears on from time to time, sure' From bunk at debian.org Thu Jun 4 18:54:08 2020 From: bunk at debian.org (Adrian Bunk) Date: Thu, 4 Jun 2020 20:54:08 +0300 Subject: Bug#962218: gnutls28: build fails on IPv6-only buildds In-Reply-To: <20200604173213.GC1481@argenau.bebt.de> References: <159128996234.21244.4980861446799504629.reportbug@localhost> <159128996234.21244.4980861446799504629.reportbug@localhost> <20200604173213.GC1481@argenau.bebt.de> <159128996234.21244.4980861446799504629.reportbug@localhost> Message-ID: <20200604175408.GA8295@localhost> On Thu, Jun 04, 2020 at 07:32:13PM +0200, Andreas Metzler wrote: > On 2020-06-04 Adrian Bunk wrote: > > Source: gnutls28 > > Version: 3.6.13-2 > > Severity: serious > > Tags: ftbfs > > > https://buildd.debian.org/status/logs.php?pkg=gnutls28&ver=3.6.13-3 > > https://buildd.debian.org/status/logs.php?pkg=gnutls28&ver=3.6.13-4 > > > ... > [...] > > > The conova buildds are IPv6-only, see #962019 for a similar > > problem in perl. > > Helo Adrian, > > is there a way to declare a dependency on IPv4 for building? No. > Also the setup is strange, both netstat and ifconfig show IPv4: > > DEBUG info about network setup starts ... > if test -x /sbin/ifconfig ; then /sbin/ifconfig ; else true ; fi > eth0: flags=4163 mtu 1500 > inet6 2a02:16a8:dc41:100::240 prefixlen 64 scopeid 0x0 > inet6 fe80::216:37ff:fed2:16f0 prefixlen 64 scopeid 0x20 > ether 00:16:37:d2:16:f0 txqueuelen 1000 (Ethernet) > RX packets 108814178 bytes 157204088386 (146.4 GiB) > RX errors 0 dropped 0 overruns 0 frame 0 > TX packets 13855486 bytes 11641875516 (10.8 GiB) > TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 > > lo: flags=73 mtu 65536 > inet 127.0.0.1 netmask 255.0.0.0 > inet6 ::1 prefixlen 128 scopeid 0x10 > loop txqueuelen 1000 (Local Loopback) > RX packets 4506091 bytes 20691973484 (19.2 GiB) > RX errors 0 dropped 0 overruns 0 frame 0 > TX packets 4506091 bytes 20691973484 (19.2 GiB) > TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 >... The usage of AI_ADDRCONFIG in src/serv.c:listen_socket() looks similar to the problem described in the perl bug. > cu Andreas >... cu Adrian From jcristau at debian.org Thu Jun 4 18:55:32 2020 From: jcristau at debian.org (Julien Cristau) Date: Thu, 4 Jun 2020 19:55:32 +0200 Subject: Bug#962218: gnutls28: build fails on IPv6-only buildds In-Reply-To: <159128996234.21244.4980861446799504629.reportbug@localhost> References: <159128996234.21244.4980861446799504629.reportbug@localhost> <159128996234.21244.4980861446799504629.reportbug@localhost> Message-ID: <20200604175532.GA187695@chou> Control: tag -1 moreinfo On Thu, Jun 04, 2020 at 07:59:22PM +0300, Adrian Bunk wrote: > FAIL: dtls_hello_random_value > ============================= > > testing: default > client:156: client: Handshake failed: Resource temporarily unavailable, try again. > server:271: server: Handshake has failed: The TLS connection was non-properly terminated. > > FAIL dtls_hello_random_value (exit status: 1) > This particular test seems to use a AF_UNIX socketpair, I'm not sure how it would fail due to network setup? Cheers, Julien From owner at bugs.debian.org Thu Jun 4 18:57:06 2020 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Thu, 04 Jun 2020 17:57:06 +0000 Subject: Processed: Re: Bug#962218: gnutls28: build fails on IPv6-only buildds References: <20200604175532.GA187695@chou> <159128996234.21244.4980861446799504629.reportbug@localhost> Message-ID: Processing control commands: > tag -1 moreinfo Bug #962218 [src:gnutls28] gnutls28: build fails on IPv6-only buildds Added tag(s) moreinfo. -- 962218: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962218 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From jcristau at debian.org Thu Jun 4 18:56:24 2020 From: jcristau at debian.org (Julien Cristau) Date: Thu, 4 Jun 2020 19:56:24 +0200 Subject: Bug#962218: gnutls28: build fails on IPv6-only buildds In-Reply-To: <20200604173213.GC1481@argenau.bebt.de> References: <159128996234.21244.4980861446799504629.reportbug@localhost> <159128996234.21244.4980861446799504629.reportbug@localhost> <20200604173213.GC1481@argenau.bebt.de> <159128996234.21244.4980861446799504629.reportbug@localhost> Message-ID: <20200604175624.GB187695@chou> On Thu, Jun 04, 2020 at 07:32:13PM +0200, Andreas Metzler wrote: > On 2020-06-04 Adrian Bunk wrote: > > Source: gnutls28 > > Version: 3.6.13-2 > > Severity: serious > > Tags: ftbfs > > > https://buildd.debian.org/status/logs.php?pkg=gnutls28&ver=3.6.13-3 > > https://buildd.debian.org/status/logs.php?pkg=gnutls28&ver=3.6.13-4 > > > ... > [...] > > > The conova buildds are IPv6-only, see #962019 for a similar > > problem in perl. > > Helo Adrian, > > is there a way to declare a dependency on IPv4 for building? > > Also the setup is strange, both netstat and ifconfig show IPv4: > eth0 has no ipv4, that's all. Why is that strange? Cheers, Julien From bunk at debian.org Thu Jun 4 20:18:10 2020 From: bunk at debian.org (Adrian Bunk) Date: Thu, 4 Jun 2020 22:18:10 +0300 Subject: Bug#962218: gnutls28: build fails on IPv6-only buildds In-Reply-To: <20200604175532.GA187695@chou> References: <159128996234.21244.4980861446799504629.reportbug@localhost> <20200604175532.GA187695@chou> <159128996234.21244.4980861446799504629.reportbug@localhost> Message-ID: <20200604191810.GB8295@localhost> On Thu, Jun 04, 2020 at 07:55:32PM +0200, Julien Cristau wrote: > Control: tag -1 moreinfo > > On Thu, Jun 04, 2020 at 07:59:22PM +0300, Adrian Bunk wrote: > > FAIL: dtls_hello_random_value > > ============================= > > > > testing: default > > client:156: client: Handshake failed: Resource temporarily unavailable, try again. > > server:271: server: Handshake has failed: The TLS connection was non-properly terminated. > > > > FAIL dtls_hello_random_value (exit status: 1) > > > This particular test seems to use a AF_UNIX socketpair, I'm not sure > how it would fail due to network setup? I copied the log from the 3.6.13-4 arm64 failure. This specific test passes in the other logs. The binary-all log (non-conova) of 3.6.13-4 has no test failures, but the build fails due to timeout after 150 minutes without output. My gut feeling is that there might be an (unrelated) problem with the #961889 fix, but this is just a guess. > Cheers, > Julien cu Adrian From jcristau at debian.org Thu Jun 4 22:19:31 2020 From: jcristau at debian.org (Julien Cristau) Date: Thu, 4 Jun 2020 23:19:31 +0200 Subject: Bug#962218: gnutls28: build fails on IPv6-only buildds In-Reply-To: <20200604191810.GB8295@localhost> References: <159128996234.21244.4980861446799504629.reportbug@localhost> <20200604175532.GA187695@chou> <20200604191810.GB8295@localhost> <159128996234.21244.4980861446799504629.reportbug@localhost> Message-ID: <20200604211931.GT1984@topinambour.cristau.org> On Thu, Jun 4, 2020 at 22:18:10 +0300, Adrian Bunk wrote: > On Thu, Jun 04, 2020 at 07:55:32PM +0200, Julien Cristau wrote: > > Control: tag -1 moreinfo > > > > On Thu, Jun 04, 2020 at 07:59:22PM +0300, Adrian Bunk wrote: > > > FAIL: dtls_hello_random_value > > > ============================= > > > > > > testing: default > > > client:156: client: Handshake failed: Resource temporarily unavailable, try again. > > > server:271: server: Handshake has failed: The TLS connection was non-properly terminated. > > > > > > FAIL dtls_hello_random_value (exit status: 1) > > > > > This particular test seems to use a AF_UNIX socketpair, I'm not sure > > how it would fail due to network setup? > > I copied the log from the 3.6.13-4 arm64 failure. > This specific test passes in the other logs. > > The binary-all log (non-conova) of 3.6.13-4 has no test failures, > but the build fails due to timeout after 150 minutes without output. > > My gut feeling is that there might be an (unrelated) problem with > the #961889 fix, but this is just a guess. > The arch:all failure is at grnet and that buildd has both v4 and v6 addresses, so presumably unrelated. Which leaves us with the armel failure (on arm-conova-03) which does look related to the lack of public v4 address, e.g.: > FAIL: sni-hostname.sh > ===================== > > Checking SNI hostname in gnutls-cli > Echo Server listening on IPv6 :: port 26448...done > Could not connect to 127.0.0.1:26448: Connection refused > Failure: 1. handshake should have succeeded! > Exiting via signal 15 > FAIL sni-hostname.sh (exit status: 1) If we listen on :: and then try to connect to 127.0.0.1, that won't work. And indeed gnutls-serv seems to call getaddrinfo with node == NULL and hints.ai_flags == AI_PASSIVE|AI_ADDRCONFIG, to figure out what address to listen on. If the host has no non-local ipv4 address, that getaddrinfo call returns :: but not 0.0.0.0; and then the test hardcodes 127.0.0.1 as the address for gnutls-cli to connect to, and sadness ensues. Cheers, Julien From jcristau at debian.org Fri Jun 5 11:19:58 2020 From: jcristau at debian.org (Julien Cristau) Date: Fri, 5 Jun 2020 12:19:58 +0200 Subject: Bug#962218: gnutls28: build fails on IPv6-only buildds In-Reply-To: <20200604211931.GT1984@topinambour.cristau.org> References: <159128996234.21244.4980861446799504629.reportbug@localhost> <20200604175532.GA187695@chou> <20200604191810.GB8295@localhost> <159128996234.21244.4980861446799504629.reportbug@localhost> <20200604211931.GT1984@topinambour.cristau.org> <159128996234.21244.4980861446799504629.reportbug@localhost> Message-ID: <20200605101958.GA212523@chou> On Thu, Jun 04, 2020 at 11:19:31PM +0200, Julien Cristau wrote: > The arch:all failure is at grnet and that buildd has both v4 and v6 > addresses, so presumably unrelated. > A further give-back seems to have worked, so 3.6.13-4 managed to build on all arches and move to testing now. Cheers, Julien From ametzler at bebt.de Fri Jun 5 14:44:08 2020 From: ametzler at bebt.de (Andreas Metzler) Date: Fri, 5 Jun 2020 15:44:08 +0200 Subject: Bug#962218: gnutls28: build fails on IPv6-only buildds In-Reply-To: <20200605101958.GA212523@chou> References: <159128996234.21244.4980861446799504629.reportbug@localhost> <20200604175532.GA187695@chou> <20200604191810.GB8295@localhost> <159128996234.21244.4980861446799504629.reportbug@localhost> <20200604211931.GT1984@topinambour.cristau.org> <159128996234.21244.4980861446799504629.reportbug@localhost> <20200605101958.GA212523@chou> <159128996234.21244.4980861446799504629.reportbug@localhost> Message-ID: <20200605134408.GA1587@argenau.bebt.de> On 2020-06-05 Julien Cristau wrote: > On Thu, Jun 04, 2020 at 11:19:31PM +0200, Julien Cristau wrote: > > The arch:all failure is at grnet and that buildd has both v4 and v6 > > addresses, so presumably unrelated. > > > A further give-back seems to have worked, so 3.6.13-4 managed to build > on all arches and move to testing now. Thank you! From owner at bugs.debian.org Fri Jun 5 17:12:03 2020 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Fri, 05 Jun 2020 16:12:03 +0000 Subject: Processed: bug 962218 is forwarded to https://gitlab.com/gnutls/gnutls/-/issues/1007 References: <1591373289-25-bts-ametzler@debian.org> Message-ID: Processing commands for control at bugs.debian.org: > forwarded 962218 https://gitlab.com/gnutls/gnutls/-/issues/1007 Bug #962218 [src:gnutls28] gnutls28: build fails on IPv6-only buildds Set Bug forwarded-to-address to 'https://gitlab.com/gnutls/gnutls/-/issues/1007'. > thanks Stopping processing here. Please contact me if you need assistance. -- 962218: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962218 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From carnil at debian.org Fri Jun 5 17:27:45 2020 From: carnil at debian.org (Salvatore Bonaccorso) Date: Fri, 05 Jun 2020 18:27:45 +0200 Subject: Bug#962289: gnutls28: CVE-2020-13777: session resumption works without master key allowing MITM Message-ID: <159137446593.1706768.18348904510591878623.reportbug@eldamar.local> Source: gnutls28 Version: 3.6.13-4 Severity: grave Tags: security upstream Forwarded: https://gitlab.com/gnutls/gnutls/-/issues/1011 Control: found -1 3.6.4-1 Control: found -1 3.6.7-4+deb10u3 Hi Andreas, The following vulnerability was published for gnutsl28, filling it as RC given the resulting in authentication bypass possibility, but if you do not agree please downgrade. CVE-2020-13777[0]: | GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting | a session ticket (a loss of confidentiality in TLS 1.2, and an | authentication bypass in TLS 1.3). The earliest affected version is | 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until | the first key rotation, the TLS server always uses wrong data in place | of an encryption key derived from an application. If you want I can try to help preparing as well a corresponding buster-security update. The issue was introduced in 3.6.4 upstream, so stretch is not affected. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2020-13777 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13777 [1] https://gnutls.org/security-new.html#GNUTLS-SA-2020-06-03 [2] https://gitlab.com/gnutls/gnutls/-/issues/1011 Regards, Salvatore From owner at bugs.debian.org Fri Jun 5 17:30:05 2020 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Fri, 05 Jun 2020 16:30:05 +0000 Subject: Processed: gnutls28: CVE-2020-13777: session resumption works without master key allowing MITM References: <159137446593.1706768.18348904510591878623.reportbug@eldamar.local> <159137446593.1706768.18348904510591878623.reportbug@eldamar.local> Message-ID: Processing control commands: > found -1 3.6.4-1 Bug #962289 [src:gnutls28] gnutls28: CVE-2020-13777: session resumption works without master key allowing MITM Marked as found in versions gnutls28/3.6.4-1. > found -1 3.6.7-4+deb10u3 Bug #962289 [src:gnutls28] gnutls28: CVE-2020-13777: session resumption works without master key allowing MITM Marked as found in versions gnutls28/3.6.7-4+deb10u3. -- 962289: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962289 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From noreply at release.debian.org Sat Jun 6 05:39:07 2020 From: noreply at release.debian.org (Debian testing watch) Date: Sat, 06 Jun 2020 04:39:07 +0000 Subject: gnutls28 3.6.13-4 MIGRATED to testing Message-ID: FYI: The status of the gnutls28 source package in Debian's testing distribution has changed. Previous version: 3.6.13-2 Current version: 3.6.13-4 -- This email is automatically generated once a day. As the installation of new packages into testing happens multiple times a day you will receive later changes on the next day. See https://release.debian.org/testing-watch/ for more information. From ftpmaster at ftp-master.debian.org Sat Jun 6 13:42:52 2020 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Sat, 06 Jun 2020 12:42:52 +0000 Subject: Processing of gnutls28_3.6.14-1_multi.changes Message-ID: gnutls28_3.6.14-1_multi.changes uploaded successfully to localhost along with the files: gnutls28_3.6.14-1.dsc gnutls28_3.6.14.orig.tar.xz gnutls28_3.6.14.orig.tar.xz.asc gnutls28_3.6.14-1.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org) From ftpmaster at ftp-master.debian.org Sat Jun 6 13:49:02 2020 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Sat, 06 Jun 2020 12:49:02 +0000 Subject: gnutls28_3.6.14-1_multi.changes ACCEPTED into unstable Message-ID: Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 06 Jun 2020 14:11:30 +0200 Source: gnutls28 Architecture: source Version: 3.6.14-1 Distribution: unstable Urgency: high Maintainer: Debian GnuTLS Maintainers Changed-By: Andreas Metzler Closes: 962199 962218 962289 Changes: gnutls28 (3.6.14-1) unstable; urgency=high . * Drop debugging code added in -4, fixes nocheck profile build error. Closes: #962199 * Add Daiki Ueno 462225C3B46F34879FC8496CD605848ED7E69871 key to debian/upstream/signing-key.asc. * New upstream version. + Fixes insecure session ticket key construction. [GNUTLS-SA-2020-06-03, CVE-2020-13777] Closes: #962289 + Drop 50_Update-session_ticket.c-to-add-support-for-zero-leng.patch 51_01-_gnutls_pkcs11_verify_crt_status-check-validity-agai.patch 51_02-x509-trigger-fallback-verification-path-when-cert-is.patch 51_03-tests-add-test-case-for-certificate-chain-supersedin.patch * Drop guile-gnutls.lintian-overrides. * 40_fix_ipv6only_testsuite_AI_ADDRCONFIG.diff: In gnutls-serv do not pass AI_ADDRCONFIG to getaddrinfo. This broke the testsuite on systems without IPv4 on non-loopback addresses. (Thanks, Adrian Bunk and Julien Cristau!) Hopefully Closes: #962218 Checksums-Sha1: 7c9199a08f66d1d0431141be3a3ffe6ac6e376e5 3479 gnutls28_3.6.14-1.dsc bea1b5abcb691acf014e592f41d0a9580a41216a 6069088 gnutls28_3.6.14.orig.tar.xz 49cb57a9accb3a95a0c23605b2c8d76b21d90dd0 854 gnutls28_3.6.14.orig.tar.xz.asc 7c18ebbc0669216fa3ad82ba6539276cb0626a3d 62708 gnutls28_3.6.14-1.debian.tar.xz Checksums-Sha256: 9f85587356a29ceb26ba6d741348e190090b9f2c86b6352626eff2ea5cbe6dfd 3479 gnutls28_3.6.14-1.dsc 5630751adec7025b8ef955af4d141d00d252a985769f51b4059e5affa3d39d63 6069088 gnutls28_3.6.14.orig.tar.xz a3e05b531b68a4aca8fdc5dce83e7091b5aa859d76de7e8ba9992047272f04dd 854 gnutls28_3.6.14.orig.tar.xz.asc 1414cfc508353c270c55043b65a2279b86e75370e501f7fefd175ca7bcf07aee 62708 gnutls28_3.6.14-1.debian.tar.xz Files: 72de6549424ab4b283f02c94aa89ffd0 3479 libs optional gnutls28_3.6.14-1.dsc bf70632d420e421baff482247f01dbfe 6069088 libs optional gnutls28_3.6.14.orig.tar.xz 19d5bef6bc38dec017b5d345ac6cf578 854 libs optional gnutls28_3.6.14.orig.tar.xz.asc 0b33c05bcaca099c34db04074cf65bbd 62708 libs optional gnutls28_3.6.14-1.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEE0uCSA5741Jbt9PpepU8BhUOCFIQFAl7bjKUACgkQpU8BhUOC FIRhog/+KYNWbEM6TPmBS9ZIbKuprvlCvc0Sax/JtCOIUrhOebhTX6CQmC66wcB6 LEHcySYOYdtHEurHgDwud2lsLFf7VLgNiIxZMRYeAAdQoISuNOl81IOhhTTUFSGM QHC0GSdCLiphTjvr0m40qU4WMsa03IztgGjO1b06WYN57QQOP996XNjij7GbAjjx +H0/9xIJExoKlpLdFVxVYVjyOIi4UNZmI900MiJNFzuPtgSZ0a1U+z+NMSHtlAwp F35TG/DGHa++dPHtX2yKvmdaa5W9U+bbctzAs8EE7MEhxS7i44IdhwCQNCt4Nmf5 OoJAwg4qiK3go9JG0lveuyj1V547DvAQkQlg7sReEjoJKjN8OwvMFJel5XgyR6uL w60nwBOfWGw+2foMuti/94cRU1G1dlBHkTpo119T+c13yLI1ltaCfjVc+029KMVa k0qLLGs5YWEBK+m0Bke23NFfjoqjdA8O3fFXGpyWW3KRYu5XkPk9MDvtRSUj34S8 hTG9gArcAwVmvl+4qh77Giz20IPhdxlBeA7smy4f7U3kG8VpoINhay25c4SHvT0u KVzpCtdqxP4/+w4oZ5WZyTXUmQQSBeHALSGzeLsylHoJR28klCdUXC2544D4+dCZ V59gDCr0UXosmWL4ZEDLlNX38cg/wrZXg23ej9AR7Xj2Z8bCTR4= =utoV -----END PGP SIGNATURE----- Thank you for your contribution to Debian. From owner at bugs.debian.org Sat Jun 6 13:51:03 2020 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 06 Jun 2020 12:51:03 +0000 Subject: Bug#962199: marked as done (gnutls28 FTBFS when using the nocheck build profile) References: <20200604140039.GA22608@alf.mars> Message-ID: Your message dated Sat, 06 Jun 2020 12:49:02 +0000 with message-id and subject line Bug#962199: fixed in gnutls28 3.6.14-1 has caused the Debian Bug report #962199, regarding gnutls28 FTBFS when using the nocheck build profile to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 962199: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962199 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Helmut Grohne Subject: gnutls28 FTBFS when using the nocheck build profile Date: Thu, 4 Jun 2020 16:00:39 +0200 Size: 3340 URL: -------------- next part -------------- An embedded message was scrubbed... From: Debian FTP Masters Subject: Bug#962199: fixed in gnutls28 3.6.14-1 Date: Sat, 06 Jun 2020 12:49:02 +0000 Size: 6368 URL: From owner at bugs.debian.org Sat Jun 6 13:51:05 2020 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 06 Jun 2020 12:51:05 +0000 Subject: Bug#962218: marked as done (gnutls28: build fails on IPv6-only buildds) References: <159128996234.21244.4980861446799504629.reportbug@localhost> Message-ID: Your message dated Sat, 06 Jun 2020 12:49:02 +0000 with message-id and subject line Bug#962218: fixed in gnutls28 3.6.14-1 has caused the Debian Bug report #962218, regarding gnutls28: build fails on IPv6-only buildds to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 962218: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962218 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Adrian Bunk Subject: gnutls28: build fails on IPv6-only buildds Date: Thu, 04 Jun 2020 19:59:22 +0300 Size: 4428 URL: -------------- next part -------------- An embedded message was scrubbed... From: Debian FTP Masters Subject: Bug#962218: fixed in gnutls28 3.6.14-1 Date: Sat, 06 Jun 2020 12:49:02 +0000 Size: 6367 URL: From owner at bugs.debian.org Sat Jun 6 13:51:07 2020 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 06 Jun 2020 12:51:07 +0000 Subject: Bug#962289: marked as done (gnutls28: CVE-2020-13777: session resumption works without master key allowing MITM) References: <159137446593.1706768.18348904510591878623.reportbug@eldamar.local> Message-ID: Your message dated Sat, 06 Jun 2020 12:49:02 +0000 with message-id and subject line Bug#962289: fixed in gnutls28 3.6.14-1 has caused the Debian Bug report #962289, regarding gnutls28: CVE-2020-13777: session resumption works without master key allowing MITM to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 962289: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962289 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Salvatore Bonaccorso Subject: gnutls28: CVE-2020-13777: session resumption works without master key allowing MITM Date: Fri, 05 Jun 2020 18:27:45 +0200 Size: 3010 URL: -------------- next part -------------- An embedded message was scrubbed... From: Debian FTP Masters Subject: Bug#962289: fixed in gnutls28 3.6.14-1 Date: Sat, 06 Jun 2020 12:49:02 +0000 Size: 6343 URL: From ftpmaster at ftp-master.debian.org Sat Jun 6 18:33:32 2020 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Sat, 06 Jun 2020 17:33:32 +0000 Subject: gnutls28_3.6.7-4+deb10u4_sourceonly.changes ACCEPTED into proposed-updates->stable-new Message-ID: Mapping stable-security to proposed-updates. Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Fri, 05 Jun 2020 19:32:17 +0200 Source: gnutls28 Architecture: source Version: 3.6.7-4+deb10u4 Distribution: buster-security Urgency: high Maintainer: Debian GnuTLS Maintainers Changed-By: Salvatore Bonaccorso Closes: 962289 Changes: gnutls28 (3.6.7-4+deb10u4) buster-security; urgency=high . * Non-maintainer upload by the Security Team. * GNUTLS-SA-2020-06-03: Flaw in TLS session ticket key construction (CVE-2020-13777) (Closes: #962289) Checksums-Sha1: a6a03560185c91ff0756e4a5a89e64cc216aef6e 3509 gnutls28_3.6.7-4+deb10u4.dsc ab70d6845d2efd27986a7af146ffa3192d973838 78712 gnutls28_3.6.7-4+deb10u4.debian.tar.xz Checksums-Sha256: 0d633cb281152d025b49fa398930c8f5ea2e9af529bc9a2d288813679e75d88f 3509 gnutls28_3.6.7-4+deb10u4.dsc 2bf9e2ce3603e46ad2a47762e4e96c2f64729fe5bd784274025aa99f33a11688 78712 gnutls28_3.6.7-4+deb10u4.debian.tar.xz Files: 4e19564f52ba71851112b45c5e4cfc9f 3509 libs optional gnutls28_3.6.7-4+deb10u4.dsc f2e6a94c3af7e8346738ee0b339d9790 78712 libs optional gnutls28_3.6.7-4+deb10u4.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl7bmT5fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89EygkP/RmssqHIMnJO3RT8Fcyry1YwfoYOCnnI 7cGQALm5OaQvlduqrrfbw75nSO5MoSoCDVxwEtUkqpMHQR6mZacDfSA/7vdWTQ0g rtRd+LJ2gtUceRdoX0fQV4KH0fCfnYUv/YITjiT4UYqr98RV6n/MZAJyNt1gMOGL 84BPeLqcVfmNOOatoWTpH9H93qqpxPyepqPcx8W21DId8Y9d21OpXNBylo8rc7et k0iwe5bGeQoQA8h9M23P3HtO9o9Fgap/SeKAvm5LPGXRBCpMCuxBnez0rvVw/I6c lR+Ze6xVGIO8H03j66PDhy4D/M7V8JbInP1FEwtw0TNAgVXiwPk2b7YrTepCSgQE ByqF+STaAyccP69NVGwbh7fW2EW/oaJqtUL8w0HH7+3KPcYKKUcyTU/dNvENZlr0 hdqIitX3Ogkr2/A9SGSVhSMR/AonCYodYuZAPjjiicg5BeS+dwauT7kDxvTfCugp LmBsZM81PqiBWMR73WE1VV6YmH32cJRwZn8BbwdZvtlHnjY1aZPHjibs3eHNFpJV 67lwLXV7QkStkRWZE25gQkHRvZW5t8+31w/NzLNBEXJ95zCjRGgzx02ewMYCKZQj wwTkaJRMAtnqvSSi41IdBL4hZB2jCJ1Z4ELs2Hte9xLmsfy4SeZetAfS/gt8auJC HW6jdmFvIY9D =oQIP -----END PGP SIGNATURE----- Thank you for your contribution to Debian. From ametzler at bebt.de Sun Jun 7 07:45:17 2020 From: ametzler at bebt.de (Andreas Metzler) Date: Sun, 7 Jun 2020 08:45:17 +0200 Subject: Bug#960836: buster-pu: package gnutls28/3.6.7-4+deb10u4 In-Reply-To: <20200526185826.GA9090@argenau.bebt.de> References: <20200517122316.GA483510@argenau.bebt.de> <20200517122316.GA483510@argenau.bebt.de> <20200518165452.GD1264@argenau.bebt.de> <20200526185826.GA9090@argenau.bebt.de> <20200517122316.GA483510@argenau.bebt.de> Message-ID: <20200607064517.GB1529@argenau.bebt.de> Control: tags -1 - moreinfo Control: retitle -1 buster-pu: package gnutls28/3.6.7-4+deb10u5 On 2020-05-26 Andreas Metzler wrote: > Control: tags 960836 + moreinfo > Please hold on approving this. I will probably need to add a fix for > https://gitlab.com/gnutls/gnutls/-/issues/997 Hello, find attached a new version rebased on the latests DSA and featuring these additional fixes: * 44_rel3.6.14_10-Update-session_ticket.c-to-add-support-for-zero-leng.patch from GnuTLS 3.6.14: Handle zero length session tickets, fixing connection errors on TLS1.2 sessions to some big hosting providers. (See LP 1876286) * 44_rel3.6.14_15-_gnutls_pkcs11_verify_crt_status-check-validity-agai.patch 44_rel3.6.14_16-x509-trigger-fallback-verification-path-when-cert-is.patch 44_rel3.6.14_17-tests-add-test-case-for-certificate-chain-supersedin.patch backported from GnuTLS 3.6.14: Fix verification error with alternate chains. Closes: #961889 TIA, cu Andreas -- `What a good friend you are to him, Dr. Maturin. His other friends are so grateful to you.' `I sew his ears on from time to time, sure' -------------- next part -------------- A non-text attachment was scrubbed... Name: from_deb10u4_to_deb10u5.diff Type: text/x-diff Size: 57799 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 833 bytes Desc: not available URL: From michaelu445 at gmail.com Sun Jun 7 11:23:20 2020 From: michaelu445 at gmail.com (General Rupert Jones) Date: Sun, 7 Jun 2020 11:23:20 +0100 Subject: Dear Sir/Madam Message-ID: Dear Sir/Madam My name is General Rupert Jones, serving in the Engineering military unit in Ba'qubah in Iraq. We found some money here in Baqubah in Iraq,We are looking for a foreign partner to help us move this money out of iraq,for investment ,please If you are interested kindly contact me for more details Thanks. -------------- next part -------------- An HTML attachment was scrubbed... URL: From noreply at release.debian.org Mon Jun 8 05:39:11 2020 From: noreply at release.debian.org (Debian testing watch) Date: Mon, 08 Jun 2020 04:39:11 +0000 Subject: gnutls28 3.6.14-1 MIGRATED to testing Message-ID: FYI: The status of the gnutls28 source package in Debian's testing distribution has changed. Previous version: 3.6.13-4 Current version: 3.6.14-1 -- This email is automatically generated once a day. As the installation of new packages into testing happens multiple times a day you will receive later changes on the next day. See https://release.debian.org/testing-watch/ for more information. From owner at bugs.debian.org Mon Jun 8 15:21:03 2020 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Mon, 08 Jun 2020 14:21:03 +0000 Subject: Processed: reassign 962467 to src:gnutls28 References: <1591625994-1718-bts-mattia@debian.org> Message-ID: Processing commands for control at bugs.debian.org: > reassign 962467 src:gnutls28 3.6.14-1 Bug #962467 [gnutls30] severe memory issue in gnutls Warning: Unknown package 'gnutls30' Bug reassigned from package 'gnutls30' to 'src:gnutls28'. Ignoring request to alter found versions of bug #962467 to the same values previously set Ignoring request to alter fixed versions of bug #962467 to the same values previously set Bug #962467 [src:gnutls28] severe memory issue in gnutls Marked as found in versions gnutls28/3.6.14-1. > thanks Stopping processing here. Please contact me if you need assistance. -- 962467: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962467 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From george at shetlermilk.com Tue Jun 9 08:19:09 2020 From: george at shetlermilk.com (ialas) Date: Tue, 9 Jun 2020 00:19:09 -0700 Subject: =?UTF-8?Q?Hallo_=5BBelangrijk!=5D?= Message-ID: <3b79033d-2310-487a-bdfa-9fbb652fd8e3@shetlermilk.com> [ Dringend!] https://bit.ly/2APocRX wees voorzichtig,ialas at yahoo.com From sales at bonesca.nl Tue Jun 9 12:14:41 2020 From: sales at bonesca.nl (Bonesca I Sales) Date: Tue, 9 Jun 2020 14:14:41 +0300 Subject: Seabass Filets 80-120 Message-ID: An HTML attachment was scrubbed... URL: From ftpmaster at ftp-master.debian.org Thu Jun 11 10:57:26 2020 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Thu, 11 Jun 2020 09:57:26 +0000 Subject: Processing of gnutls28_3.6.14-2_multi.changes Message-ID: gnutls28_3.6.14-2_multi.changes uploaded successfully to localhost along with the files: gnutls28_3.6.14-2.dsc gnutls28_3.6.14-2.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org) From ftpmaster at ftp-master.debian.org Thu Jun 11 11:04:32 2020 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Thu, 11 Jun 2020 10:04:32 +0000 Subject: gnutls28_3.6.14-2_multi.changes ACCEPTED into unstable Message-ID: Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Thu, 11 Jun 2020 11:27:34 +0200 Source: gnutls28 Architecture: source Version: 3.6.14-2 Distribution: unstable Urgency: medium Maintainer: Debian GnuTLS Maintainers Changed-By: Andreas Metzler Closes: 962467 Changes: gnutls28 (3.6.14-2) unstable; urgency=medium . * Pull selected patches from upstream GIT: + 50_01-serv-omit-upper-bound-of-maxearlydata-option-definit.patch: Fixes difference in generated docs on 32 and 64 bit archs. + 50_02-gnutls_aead_cipher_init-fix-potential-memleak.patch 50_03-gnutls_cipher_init-fix-potential-memleak.patch Fix memleak in gnutls_aead_cipher_init() with keys having invalid length. (Broken since 3.6.3) + 50_04-crypto-api-always-allocate-memory-when-serializing-i.patch Closes: #962467 Checksums-Sha1: d7075a580544545fb72f3872590b3047c33c4ddb 3479 gnutls28_3.6.14-2.dsc f29f8ef49ba278d20a5a619673ff8b70d1baa803 65404 gnutls28_3.6.14-2.debian.tar.xz Checksums-Sha256: c45f3443e574c1ba34b65e3c1165adb9a0a911af57cb1e333f976d8206841b4d 3479 gnutls28_3.6.14-2.dsc dc8574598e599fb83fba2b3163c03d7e9976ddc7e2609c3916f28f09f118d9d8 65404 gnutls28_3.6.14-2.debian.tar.xz Files: de6d49f4929e88c74eb0795b293f4318 3479 libs optional gnutls28_3.6.14-2.dsc c5a0234626fb6655c51e82f6d3df6b31 65404 libs optional gnutls28_3.6.14-2.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEE0uCSA5741Jbt9PpepU8BhUOCFIQFAl7h/YQACgkQpU8BhUOC FIR7AxAAkbnWLqVr7ndhrUiclgyI3z3cMRTfHGbb6k1aLE9NPRA74xUQNElIsJiv kL1KSyZRIp0q6kF3rbZ9Gg4gbo+PrAAOigFbJ6iA37OR2y0jHXdP5uZFGzI+wAaK SFtrbbriV0U8Cu1C9I4wl8HeVu87nSFLK2PRAF+V3ft0DessyhQG0aXiFjIvyoGu sCEF/6f+Jm85SUhW3nAnN49+hgHEeu0/jXdeVFDKMr1W/NIkvtyen3pCZ/OGac+B t1HtTFnbA0OSC0KZ4+yFFnpoBryXzsm2JNZNcVQB9iOxiE7bYeQGuGTMuh6ISCxb /HBMjK+mKAIRymH4thMM/eehU7mUH4xOTXkhrJrfGtBI/2Yaj0XNriPIqNq3T+Zo QsEki7P1/U/YFX6CIp7Z2hQZg+w3gHOjZoWFtLLRB+cZo3PMCmUv6ZbkmZSspb6h qMfybIRIOR5EEJKbs6mnndLslOSfLVae0jxq3Zjx/QojC+OX5hy3P06e6aR6kkjV wuOnpn0Xvaw4KoFtOJcVclEX3VVn2Gym31309KOwo6RxoJdMFvmYqAdH/5mSzEBj xqrYhpwp4S7Y5Ovf2KklRQUjbyndWUYItGcjurRr9J+YOh2XirOVymn4+Ai9PO7+ urVNWh/mCNJlJ0VtCUPd6RuVlyKCKXQANX/WKciTEKxugO3qDEo= =gdM4 -----END PGP SIGNATURE----- Thank you for your contribution to Debian. From owner at bugs.debian.org Thu Jun 11 11:09:05 2020 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Thu, 11 Jun 2020 10:09:05 +0000 Subject: Bug#962467: marked as done (severe memory issue in gnutls) References: <20200608130612.GC815979@sernet.de> Message-ID: Your message dated Thu, 11 Jun 2020 10:04:32 +0000 with message-id and subject line Bug#962467: fixed in gnutls28 3.6.14-2 has caused the Debian Bug report #962467, regarding severe memory issue in gnutls to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 962467: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962467 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: =?iso-8859-1?Q?Bj=F6rn?= JACKE Subject: severe memory issue in gnutls Date: Mon, 8 Jun 2020 15:06:12 +0200 Size: 2700 URL: -------------- next part -------------- An embedded message was scrubbed... From: Debian FTP Masters Subject: Bug#962467: fixed in gnutls28 3.6.14-2 Date: Thu, 11 Jun 2020 10:04:32 +0000 Size: 5389 URL: From ftpmaster at ftp-master.debian.org Fri Jun 12 09:17:32 2020 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Fri, 12 Jun 2020 08:17:32 +0000 Subject: gnutls28_3.6.7-4+deb10u4_sourceonly.changes ACCEPTED into proposed-updates->stable-new, proposed-updates Message-ID: Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Fri, 05 Jun 2020 19:32:17 +0200 Source: gnutls28 Architecture: source Version: 3.6.7-4+deb10u4 Distribution: buster-security Urgency: high Maintainer: Debian GnuTLS Maintainers Changed-By: Salvatore Bonaccorso Closes: 962289 Changes: gnutls28 (3.6.7-4+deb10u4) buster-security; urgency=high . * Non-maintainer upload by the Security Team. * GNUTLS-SA-2020-06-03: Flaw in TLS session ticket key construction (CVE-2020-13777) (Closes: #962289) Checksums-Sha1: a6a03560185c91ff0756e4a5a89e64cc216aef6e 3509 gnutls28_3.6.7-4+deb10u4.dsc ab70d6845d2efd27986a7af146ffa3192d973838 78712 gnutls28_3.6.7-4+deb10u4.debian.tar.xz Checksums-Sha256: 0d633cb281152d025b49fa398930c8f5ea2e9af529bc9a2d288813679e75d88f 3509 gnutls28_3.6.7-4+deb10u4.dsc 2bf9e2ce3603e46ad2a47762e4e96c2f64729fe5bd784274025aa99f33a11688 78712 gnutls28_3.6.7-4+deb10u4.debian.tar.xz Files: 4e19564f52ba71851112b45c5e4cfc9f 3509 libs optional gnutls28_3.6.7-4+deb10u4.dsc f2e6a94c3af7e8346738ee0b339d9790 78712 libs optional gnutls28_3.6.7-4+deb10u4.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl7bmT5fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89EygkP/RmssqHIMnJO3RT8Fcyry1YwfoYOCnnI 7cGQALm5OaQvlduqrrfbw75nSO5MoSoCDVxwEtUkqpMHQR6mZacDfSA/7vdWTQ0g rtRd+LJ2gtUceRdoX0fQV4KH0fCfnYUv/YITjiT4UYqr98RV6n/MZAJyNt1gMOGL 84BPeLqcVfmNOOatoWTpH9H93qqpxPyepqPcx8W21DId8Y9d21OpXNBylo8rc7et k0iwe5bGeQoQA8h9M23P3HtO9o9Fgap/SeKAvm5LPGXRBCpMCuxBnez0rvVw/I6c lR+Ze6xVGIO8H03j66PDhy4D/M7V8JbInP1FEwtw0TNAgVXiwPk2b7YrTepCSgQE ByqF+STaAyccP69NVGwbh7fW2EW/oaJqtUL8w0HH7+3KPcYKKUcyTU/dNvENZlr0 hdqIitX3Ogkr2/A9SGSVhSMR/AonCYodYuZAPjjiicg5BeS+dwauT7kDxvTfCugp LmBsZM81PqiBWMR73WE1VV6YmH32cJRwZn8BbwdZvtlHnjY1aZPHjibs3eHNFpJV 67lwLXV7QkStkRWZE25gQkHRvZW5t8+31w/NzLNBEXJ95zCjRGgzx02ewMYCKZQj wwTkaJRMAtnqvSSi41IdBL4hZB2jCJ1Z4ELs2Hte9xLmsfy4SeZetAfS/gt8auJC HW6jdmFvIY9D =oQIP -----END PGP SIGNATURE----- Thank you for your contribution to Debian. From owner at bugs.debian.org Fri Jun 12 09:21:10 2020 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Fri, 12 Jun 2020 08:21:10 +0000 Subject: Bug#962289: marked as done (gnutls28: CVE-2020-13777: session resumption works without master key allowing MITM) References: <159137446593.1706768.18348904510591878623.reportbug@eldamar.local> Message-ID: Your message dated Fri, 12 Jun 2020 08:17:32 +0000 with message-id and subject line Bug#962289: fixed in gnutls28 3.6.7-4+deb10u4 has caused the Debian Bug report #962289, regarding gnutls28: CVE-2020-13777: session resumption works without master key allowing MITM to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 962289: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962289 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Salvatore Bonaccorso Subject: gnutls28: CVE-2020-13777: session resumption works without master key allowing MITM Date: Fri, 05 Jun 2020 18:27:45 +0200 Size: 3010 URL: -------------- next part -------------- An embedded message was scrubbed... From: Debian FTP Masters Subject: Bug#962289: fixed in gnutls28 3.6.7-4+deb10u4 Date: Fri, 12 Jun 2020 08:17:32 +0000 Size: 5235 URL: From noreply at release.debian.org Sat Jun 13 05:39:06 2020 From: noreply at release.debian.org (Debian testing watch) Date: Sat, 13 Jun 2020 04:39:06 +0000 Subject: gnutls28 3.6.14-2 MIGRATED to testing Message-ID: FYI: The status of the gnutls28 source package in Debian's testing distribution has changed. Previous version: 3.6.14-1 Current version: 3.6.14-2 -- This email is automatically generated once a day. As the installation of new packages into testing happens multiple times a day you will receive later changes on the next day. See https://release.debian.org/testing-watch/ for more information. From ajf243 at ameritech.net Sat Jun 13 19:39:31 2020 From: ajf243 at ameritech.net (Alfredo Fabeiro) Date: Sat, 13 Jun 2020 14:39:31 -0400 Subject: libgnutls30 update from 3.5 to 3.6 References: Message-ID: Dear developers; I am running Linux version 4.9.0-11-686-pae (Debian Stretch 6.3.0-18+deb9u1) on a old system and I've using Evolution for long time without any problem, the installed version is 3.22.6 and after Apr/21 I was not able to receive or send emails. I get this error" ?????? "Error performing TLS handshake: Internal error in memory allocation." Seems to be the problem has been identify: https://bugs.launchpad.net/ubuntu/+source/evolution/+bug/1876286 And the solution to the problem is to update is to update my library for gnuTLS from 3.5 to 3.6 The problem is that I don't know how to force that library to update. I tried with Synaptic to no avail. Could you help me here and give some directions or advice on how to do that. Or maybe you guys know that an update is imminent so it is a matter of just waiting for few days... Please, let me know. Alfredo Fabeiro Sterling Heights, MI From ametzler at bebt.de Sun Jun 14 06:08:05 2020 From: ametzler at bebt.de (Andreas Metzler) Date: Sun, 14 Jun 2020 07:08:05 +0200 Subject: libgnutls30 update from 3.5 to 3.6 In-Reply-To: References: Message-ID: <20200614050805.GA1461@argenau.bebt.de> On 2020-06-13 Alfredo Fabeiro wrote: > Dear developers; > I am running Linux version 4.9.0-11-686-pae (Debian Stretch 6.3.0-18+deb9u1) > on a old system and I've using Evolution for long time without any problem, > the installed version is 3.22.6 and after Apr/21 I was not able to receive > or send emails. > I get this error" > ?????? "Error performing TLS handshake: Internal error in memory allocation." > Seems to be the problem has been identify: > https://bugs.launchpad.net/ubuntu/+source/evolution/+bug/1876286 > And the solution to the problem is to update is to update my library for > gnuTLS from 3.5 to 3.6 > The problem is that I don't know how to force that library to update. I > tried with Synaptic to no avail. > Could you help me here and give some directions or advice on how to do that. > Or maybe you guys know that an update is imminent so it is a matter of just > waiting for few days... Hello Alfredo, I am planning to make a final update of gnutls28 for Debian 09 (stretch) including a fix for this bug. But this will probably take a couple of weeks. (I can give you a heads up when I have got packages ready for testing). However I would strongly suggest to do a full system upgrade to Debian 10 (buster). Debian 9 is very soon going to be end of life and this specific issue will not affect you in Debian 10, since the issue does not affect TLS 1.3 connections, which buster's gnutls supports. cu Andreas -- `What a good friend you are to him, Dr. Maturin. His other friends are so grateful to you.' `I sew his ears on from time to time, sure' From sales at bonesca.nl Wed Jun 17 18:04:08 2020 From: sales at bonesca.nl (Bonesca I Sales) Date: Wed, 17 Jun 2020 20:04:08 +0300 Subject: SALE!! SKB Frog Legs Indonesia Message-ID: An HTML attachment was scrubbed... URL: From jannyhamy at gmail.com Thu Jun 18 09:06:15 2020 From: jannyhamy at gmail.com (janny hamy) Date: Thu, 18 Jun 2020 01:06:15 -0700 Subject: No subject Message-ID: Hello, I am Susanne Klatten from Germany (born April 28, 1962), I am an advertising agency in Frankfurt. I have given 25 percent of my personal fortune to charity and, based on the current situation Covid -19 Virus, provide you with € 500,000.00. Your email was selected via our (E.B.S.) email voting system. The Incorporated Network International teams arrange and collect all email addresses of people who are active online, among the billions that are sent to all emails worldwide. You can also view my link and learn more about me. https://en.wikipedia.org/wiki/Susanne_Klatten Contact me quickly to get directories. Signature. Hallo, ich bin Susanne Klatten aus Deutschland (geb. 28. April 1962), ich bin eine Werbeagentur in Frankfurt. Ich habe 25 Prozent meines persönlichen Vermögens für wohltätige Zwecke gespendet und Ihnen auf der Grundlage der aktuellen Situation des Covid-19-Virus 500.000,00 € zur Verfügung gestellt. Ihre E-Mail wurde über unser E-Mail-Abstimmungssystem (E.B.S.) ausgewählt. Die Teams von Incorporated Network International arrangieren und sammeln alle E-Mail-Adressen von Personen, die online aktiv sind, unter den Milliarden, die an alle E-Mails weltweit gesendet werden. Sie können auch meinen Link anzeigen und mehr über mich erfahren. https://en.wikipedia.org/wiki/Susanne_Klatten Kontaktieren Sie mich schnell, um Verzeichnisse zu erhalten. Unterschrift. -------------- next part -------------- An HTML attachment was scrubbed... URL: From ashok at prabhutv.com.np Sat Jun 20 06:04:36 2020 From: ashok at prabhutv.com.np (Invest Binance) Date: 19 Jun 2020 22:04:36 -0700 Subject: SMART CRYPTO INVESTMENT Message-ID: <20200619220436.84A0FB23AC336021@prabhutv.com.np> An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image1509938017119.jpg Type: image/jpeg Size: 4434 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image1510827524440.png Type: image/png Size: 11548 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image1510827560662.png Type: image/png Size: 1336 bytes Desc: not available URL: From sales at bonesca.nl Tue Jun 23 11:33:44 2020 From: sales at bonesca.nl (Bonesca I Sales) Date: Tue, 23 Jun 2020 13:33:44 +0300 Subject: Realtime Pricelist Message-ID: An HTML attachment was scrubbed... URL: From sales at bonesca.nl Tue Jun 23 11:58:43 2020 From: sales at bonesca.nl (Bonesca I Sales) Date: Tue, 23 Jun 2020 13:58:43 +0300 Subject: Correct link: Realtime Pricelist Message-ID: An HTML attachment was scrubbed... URL: From bertus at bonesca.nl Tue Jun 23 17:25:14 2020 From: bertus at bonesca.nl (Bonesca I Bertus) Date: Tue, 23 Jun 2020 19:25:14 +0300 Subject: problems with links Message-ID: An HTML attachment was scrubbed... URL: From sales at bonesca.nl Wed Jun 24 17:07:18 2020 From: sales at bonesca.nl (Bonesca I Sales) Date: Wed, 24 Jun 2020 19:07:18 +0300 Subject: Cleaned Cuttlefish 60+ Message-ID: An HTML attachment was scrubbed... URL: From ametzler at bebt.de Thu Jun 25 16:37:29 2020 From: ametzler at bebt.de (Andreas Metzler) Date: Thu, 25 Jun 2020 17:37:29 +0200 Subject: Bug#963703: stretch-pu: package gnutls28/3.5.8-5+deb9u5 Message-ID: <20200625153729.GA197447@argenau.bebt.de> Package: release.debian.org Severity: normal Tags: stretch User: release.debian.org at packages.debian.org Usertags: pu Hello, I would like to make a last bugfix upload to stretch: * Pull fixes for CVE-2019-3836 / [GNUTLS-SA-2019-03-27, #694]. + 40_casts_related_to_fix_CVE-2019-3829.patch + 40_rel3.6.7_01-Automatically-NULLify-after-gnutls_free.patch + 40_rel3.6.7_01-fuzz-added-fuzzer-for-certificate-verification.patch + 41_use_datefudge_to_trigger_CVE-2019-3829_testcase.diff * More important fixes: + 43_rel3.6.14_10-session_pack-fix-leak-in-error-path.patch [One-line-fix for memleak] + 44_rel3.6.14_10-Update-session_ticket.c-to-add-support-for-zero-leng.patch Handle zero length session tickets, fixing connection errors on TLS1.2 sessions to some big hosting providers. (See LP 1876286) [Fixes connections to e.g. verizon popserver.] TIA, cu Andreas From ametzler at bebt.de Thu Jun 25 16:41:42 2020 From: ametzler at bebt.de (Andreas Metzler) Date: Thu, 25 Jun 2020 17:41:42 +0200 Subject: Bug#963703: stretch-pu: package gnutls28/3.5.8-5+deb9u5 In-Reply-To: <20200625153729.GA197447@argenau.bebt.de> References: <20200625153729.GA197447@argenau.bebt.de> <20200625153729.GA197447@argenau.bebt.de> Message-ID: <20200625154142.GB1443@argenau.bebt.de> On 2020-06-25 Andreas Metzler wrote: [...] > * Pull fixes for CVE-2019-3836 / [GNUTLS-SA-2019-03-27, #694]. > + 40_casts_related_to_fix_CVE-2019-3829.patch > + 40_rel3.6.7_01-Automatically-NULLify-after-gnutls_free.patch > + 40_rel3.6.7_01-fuzz-added-fuzzer-for-certificate-verification.patch > + 41_use_datefudge_to_trigger_CVE-2019-3829_testcase.diff > * More important fixes: > + 43_rel3.6.14_10-session_pack-fix-leak-in-error-path.patch > [One-line-fix for memleak] > + 44_rel3.6.14_10-Update-session_ticket.c-to-add-support-for-zero-leng.patch > Handle zero length session tickets, fixing connection errors on TLS1.2 > sessions to some big hosting providers. (See LP 1876286) > [Fixes connections to e.g. verizon popserver.] [...] Here is the missing debdiff. cu Andreas -------------- next part -------------- A non-text attachment was scrubbed... Name: from_deb9u4_to_deb9u5.diff Type: text/x-diff Size: 26310 bytes Desc: not available URL: From ametzler at bebt.de Fri Jun 26 06:31:16 2020 From: ametzler at bebt.de (Andreas Metzler) Date: Fri, 26 Jun 2020 07:31:16 +0200 Subject: Bug#963703: stretch-pu: package gnutls28/3.5.8-5+deb9u5 In-Reply-To: <20200625214400.GA2438668@eldamar.local> References: <20200625153729.GA197447@argenau.bebt.de> <20200625153729.GA197447@argenau.bebt.de> <20200625154142.GB1443@argenau.bebt.de> <20200625214400.GA2438668@eldamar.local> <20200625153729.GA197447@argenau.bebt.de> Message-ID: <20200626053116.GA1515@argenau.bebt.de> On 2020-06-25 Salvatore Bonaccorso wrote: > On Thu, Jun 25, 2020 at 05:41:42PM +0200, Andreas Metzler wrote: > > On 2020-06-25 Andreas Metzler wrote: > > [...] > > > * Pull fixes for CVE-2019-3836 / [GNUTLS-SA-2019-03-27, #694]. [...] > Only noticed too late, but the above CVE reference should be > CVE-2019-3829 in the "Pull fixes for ..." changelog entry. Thanks, you are right. (The other CVE is also GNUTLS-SA-2019-03-27, but the other upstream bug number #704.) cu Andreas -- `What a good friend you are to him, Dr. Maturin. His other friends are so grateful to you.' `I sew his ears on from time to time, sure' From jidanni at jidanni.org Sat Jun 27 00:03:28 2020 From: jidanni at jidanni.org (=?UTF-8?Q?=E7=A9=8D=E4=B8=B9=E5=B0=BC?= Dan Jacobson) Date: Sat, 27 Jun 2020 07:03:28 +0800 Subject: Bug#963783: dependency problems prevent configuration of libgnutls-dane0: Message-ID: <87d05l77lr.8.fsf@jidanni.org> Package: libgnutls-dane0 Selecting previously unselected package libmu-dbm6:amd64. (Reading database ... 144664 files and directories currently installed.) Preparing to unpack .../libmu-dbm6_1%3a3.9-3_amd64.deb ... Unpacking libmu-dbm6:amd64 (1:3.9-3) ... dpkg: error processing archive /var/cache/apt/archives/libmu-dbm6_1%3a3.9-3_amd64.deb (--unpack): trying to overwrite '/usr/lib/x86_64-linux-gnu/libmu_dbm.so.6.0.0', which is also in package libmailutils6:amd64 1:3.7-2.1 dpkg-deb: error: paste subprocess was killed by signal (Broken pipe) Preparing to unpack .../libgnutls-dane0_3.6.14-2_amd64.deb ... Unpacking libgnutls-dane0:amd64 (3.6.14-2) over (3.6.14-1) ... Preparing to unpack .../libgmp10_2%3a6.2.0+dfsg-6_amd64.deb ... Unpacking libgmp10:amd64 (2:6.2.0+dfsg-6) over (2:6.2.0+dfsg-4) ... Errors were encountered while processing: /var/cache/apt/archives/libmu-dbm6_1%3a3.9-3_amd64.deb E: Sub-process /usr/bin/dpkg returned an error code (1) dpkg: dependency problems prevent configuration of libgnutls-dane0:amd64: libgnutls-dane0:amd64 depends on libgnutls30 (= 3.6.14-2); however: Version of libgnutls30:amd64 on system is 3.6.14-1. dpkg: error processing package libgnutls-dane0:amd64 (--configure): dependency problems - leaving unconfigured Setting up libgmp10:amd64 (2:6.2.0+dfsg-6) ... Processing triggers for libc-bin (2.30-8) ... Errors were encountered while processing: libgnutls-dane0:amd64 From ametzler at bebt.de Sat Jun 27 05:28:32 2020 From: ametzler at bebt.de (Andreas Metzler) Date: Sat, 27 Jun 2020 06:28:32 +0200 Subject: Bug#963783: dependency problems prevent configuration of libgnutls-dane0: In-Reply-To: <87d05l77lr.8.fsf@jidanni.org> References: <87d05l77lr.8.fsf@jidanni.org> <87d05l77lr.8.fsf@jidanni.org> Message-ID: <20200627042832.GA1468@argenau.bebt.de> Control: reassign -1 libmu-dbm6 Control: retitle libmu-dbm6 1:3.9-3 missing breaks/replaces with libmailutils6 1:3.7-2.1 Control: forcemerge 963211 963783 On 2020-06-27 積丹尼 Dan Jacobson wrote: > Package: libgnutls-dane0 > Selecting previously unselected package libmu-dbm6:amd64. > (Reading database ... 144664 files and directories currently installed.) > Preparing to unpack .../libmu-dbm6_1%3a3.9-3_amd64.deb ... > Unpacking libmu-dbm6:amd64 (1:3.9-3) ... > dpkg: error processing archive /var/cache/apt/archives/libmu-dbm6_1%3a3.9-3_amd64.deb (--unpack): > trying to overwrite '/usr/lib/x86_64-linux-gnu/libmu_dbm.so.6.0.0', which is also in package libmailutils6:amd64 1:3.7-2.1 > dpkg-deb: error: paste subprocess was killed by signal (Broken pipe) [...] This is a duplicate of https://bugs.debian.org/963211 cu Andreas From owner at bugs.debian.org Sat Jun 27 05:33:06 2020 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 27 Jun 2020 04:33:06 +0000 Subject: Processed (with 1 error): Re: Bug#963783: dependency problems prevent configuration of libgnutls-dane0: References: <20200627042832.GA1468@argenau.bebt.de> <87d05l77lr.8.fsf@jidanni.org> Message-ID: Processing control commands: > reassign -1 libmu-dbm6 Bug #963783 [libgnutls-dane0] dependency problems prevent configuration of libgnutls-dane0: Bug reassigned from package 'libgnutls-dane0' to 'libmu-dbm6'. Ignoring request to alter found versions of bug #963783 to the same values previously set Ignoring request to alter fixed versions of bug #963783 to the same values previously set > retitle libmu-dbm6 1:3.9-3 missing breaks/replaces with libmailutils6 1:3.7-2.1 Unknown command or malformed arguments to command. > forcemerge 963211 963783 Bug #963211 [libmu-dbm6] libmu-dbm6: Tries to overwrite `libmu_dbm.so.6.0.0` from `libmailutils6` Bug #963783 [libmu-dbm6] dependency problems prevent configuration of libgnutls-dane0: Severity set to 'serious' from 'normal' Marked as found in versions mailutils/1:3.9-2 and mailutils/1:3.9-3. Merged 963211 963783 -- 963211: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963211 963783: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963783 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From sales at bonesca.nl Sat Jun 27 18:35:58 2020 From: sales at bonesca.nl (Bonesca I Sales) Date: Sat, 27 Jun 2020 20:35:58 +0300 Subject: Jona Wakake & Hijiki Salad Message-ID: An HTML attachment was scrubbed... URL: From williamnoah1201 at gmail.com Sun Jun 28 19:16:27 2020 From: williamnoah1201 at gmail.com (John Scott Younger) Date: Sun, 28 Jun 2020 19:16:27 +0100 Subject: Your attention to this news update. Message-ID: -- Your attention to this news update. The report / analysis received from our correspondence shows that you have NOT received your PAYMENT, due to administrative injustice from unpatriotic and uncivil payment officials. Following the resolution of the U.S Department of State, you are mandated to kindly reinstate your fund acquisition details for accreditation. Sequel to the joint /collaborative effort by United Nations and US Department of State, to review, nullify and release all STOP ORDER on beneficiary transferred sum and consignment HELD at custom port authorities. At this juncture, you are advised to forward information of agencies that has put a HOLD on your consignment or STOP ORDER on your transferred sum. This office is commission to investigate/rectify ISSUES affecting beneficiaries whose payment is HELD/STOP unjustly with the intent of demanding un-official fees/levies. Be informed that all administrative injustice imposed on beneficiaries by some dubious person(s) has come to the knowledge of oversight committee of United Nations and US Department of State. Thus our objective is to resolve all challenges facing release of your payment. Therefore get back to my office with the required information for assessment. Our in service, John Scott Younger Human Right Activist Tel:- + 44 770 002 8251 From sirjakes11 at gmail.com Tue Jun 30 00:10:17 2020 From: sirjakes11 at gmail.com (sir jakes) Date: Mon, 29 Jun 2020 16:10:17 -0700 Subject: No subject Message-ID: -- *Vom Schreibtisch von: Visa® Inc.900 Metro Center Blvd.Foster City, CA 94404-2172.* Lieber glücklicher Gewinner! Herzliche Glückwünsche! Wir möchten Sie demütig darüber informieren, dass Sie unter den 10.000.000 glücklichen Kunden ausgewählt wurden, die die Summe der Covid-19-Virus-Lotterie 2020 in Höhe von 2.969.775 (zwei Millionen, neunhundertneunundsechzigtausend und siebenhundertfünfundsiebzig Euro) gewonnen haben für dich. Diese nationale Lotterie- / Lotto-Aktion wurde von Visa USA Incorporated organisiert und gesponsert, um die neuen Vorteile der Visa® Card für Reisende und Geschäftsinhaber einzuführen. Die Gewinner der internationalen Lotterie von Visa United States Incorporated Network wurden über das EBS-E-Mail-Abstimmungssystem (EBS) ausgewählt. Die Teams von Visa United States Incorporated Network International organisieren und sammeln alle E-Mail-Adressen von Personen, die online aktiv sind. Unter den Milliarden, die alle globalen E-Mail-Netzwerke abonniert haben, wählen wir nur neun (10.000.000) Kandidaten pro Jahr als Gewinner aus . Diese nationale Lotterie sollte Familien und Gemeinden bei der aktuellen globalen Krise des Covid-19-Virus helfen und auch dazu beitragen, die Armut in der globalen Welt aufgrund des Corona-Virus zu verringern. Sie wurden ausgewählt und haben den Preis erhalten. Bleiben Sie in Verbindung. Von der Förderung der finanziellen Eingliederung bis hin zur Unterstützung in Krisenzeiten setzen wir unsere Produkte, unser Know-how und unsere Philanthropie ein, um positive Veränderungen herbeizuführen. Dieses Angebot steht Ihnen nur in dieser Saison zur Verfügung und Sie werden automatisch bezahlt. Dieser Lotteriepreis muss spätestens (5) Werktage nach dem Datum der Bekanntgabe nach dem Ziehungsdatum, an dem der Preis gewonnen wurde, geltend gemacht werden. Alle Preisabrechnungen müssen eingelöst werden, Gewinner müssen in der staatlichen Gerichtsbarkeit oder im Abrechnungszentrum ausgezahlt werden und alle Preise, die nicht innerhalb der Frist von (5) beansprucht werden, verfallen. Wenden Sie sich an Ihren Schadenverwalter / -agenten und befolgen Sie dessen Richtlinien. Ansprechpartner: -------- Frau Glenda Hartwell (Verwaltungsbeamte) E-Mail-Adresse: --------- visalortteryinc at gmail.com Gebührenfreie Nummer: ------------ + 1 (57) 528-2722 Bitte wenden Sie sich innerhalb der 24-Stunden-Arbeitszeit per E-Mail / Telefon an Ihren Schadenregulierer und an Ihre Co-Branded Visa®-Karte. Senden Sie die folgenden Informationen an die oben angegebene E-Mail-Adresse, um die Zahlung Ihres Gewinnpreises mit dem Bestellten zu erleichtern und zu verarbeiten zahlende Bank. Ticket Nr.: 51 79 4 58 1 0 Gewinnnummer: 1 39 48 11 67 18 26 Referenznummer: MMV-SF71271-00-18VINC Registrierungsnummer: MMLV-W73-3L2019 Geschäftsführer: Alfred F Kelly Jr. *MACHT FÜR SIE. Fühlen Sie sich wie zu Hause und machen Sie die Visa Corporation zu Ihrem © Copyright 1996-2020. Visa Lotterie Alle Rechte vorbehalten.BLEIB SICHER!!* -------------- next part -------------- An HTML attachment was scrubbed... URL: From Amazon at dafa615.com Tue Jun 30 16:41:44 2020 From: Amazon at dafa615.com (Amazon) Date: Tue, 30 Jun 2020 15:41:44 +0000 (UTC) Subject: =?utf-8?B?5pSv5omV5pa55rOV44Gu5oOF5aCx44KS5pu05paw44GZ44KLIA==?= Message-ID: <00757c8cac5b$1bf4b5ee$894254bc$@qbconafxsc> サインインが検出されました 尊敬する客様、新しいデバイスからお客様のアカウントへのサインインが検出されました。 日時: Jul 1, 2020 0:41:44 Japan Standard Time デバイス: Microsoft Internet Explorer Windows (デスクトップ) 付近: Japan これがお客様ご自身による操作だった場合、このメッセージは無視してください。 そうでない場合は、お知らせください。 1. アカウントサービスからAmazonプライム会員情報を管理するにアクセスします。 2. Amazonプライムに登録したAmazon.co.jpのアカウントを使用してサインインします。 3. 左側に表示されている「現在の支払方法」の下にある「支払方法を変更する」のリンクをクリックします。 4. 有効期限の更新または新しいクレジットカード情報を入力してください。 Amazonプライムを継続してご利用いただくために、会費のお支払いにご指定いただいたクレジットカードが使用できない場合は、アカウントに登録されている別 のクレジットカードに会費を請求させて頂きます。会費の請求が出来ない場合は、お客様のAmazonプライム会員資格は失効し、特典をご利用できなくなります。 Amazon.co.jpカスタマーサービス 支払方法の情報を更新する 注意:本通知メールは送信専用アドレスで送信しております。返信いただいても受信できませんのでご了承下さい。このメッセージはpkg-gnutls-maint at lists.alioth.debian.org に送信されました。 -------------- next part -------------- An HTML attachment was scrubbed... URL: From Amazon2 at dafa615.com Tue Jun 30 18:20:07 2020 From: Amazon2 at dafa615.com (Amazon) Date: Tue, 30 Jun 2020 17:20:07 +0000 (UTC) Subject: =?utf-8?B?5pSv5omV5pa55rOV44Gu5oOF5aCx44KS5pu05paw44GZ44KLIA==?= Message-ID: <0091802209f3$bf0c0e2c$bc5935af$@grf> サインインが検出されました 尊敬する客様、新しいデバイスからお客様のアカウントへのサインインが検出されました。 日時: Jul 1, 2020 2:20:06 Japan Standard Time デバイス: Microsoft Internet Explorer Windows (デスクトップ) 付近: Japan これがお客様ご自身による操作だった場合、このメッセージは無視してください。 そうでない場合は、お知らせください。 1. アカウントサービスからAmazonプライム会員情報を管理するにアクセスします。 2. Amazonプライムに登録したAmazon.co.jpのアカウントを使用してサインインします。 3. 左側に表示されている「現在の支払方法」の下にある「支払方法を変更する」のリンクをクリックします。 4. 有効期限の更新または新しいクレジットカード情報を入力してください。 Amazonプライムを継続してご利用いただくために、会費のお支払いにご指定いただいたクレジットカードが使用できない場合は、アカウントに登録されている別 のクレジットカードに会費を請求させて頂きます。会費の請求が出来ない場合は、お客様のAmazonプライム会員資格は失効し、特典をご利用できなくなります。 Amazon.co.jpカスタマーサービス 支払方法の情報を更新する 注意:本通知メールは送信専用アドレスで送信しております。返信いただいても受信できませんのでご了承下さい。このメッセージはpkg-gnutls-maint at lists.alioth.debian.org に送信されました。 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sales at bonesca.nl Tue Jun 30 20:00:56 2020 From: sales at bonesca.nl (Bonesca I Sales) Date: Tue, 30 Jun 2020 22:00:56 +0300 Subject: Rayfish Steaks Message-ID: An HTML attachment was scrubbed... URL: