Bug#703081: emacs23-bin-common: emacsclient launches emacs with the wrong arg0
Package: emacs23-bin-common Version: 23.4+1-4 Severity: important Dear Maintainer, I have $EDITOR set to /usr/bin/emacsclient -c. When there is no (server) emacs running, emacsclient starts a new emacs, but places -c as the arg0 (instead of the emacs binary name). Example emacsclient invocation: sh -c /usr/bin/emacsclient -c +6 '/tmp/reportbug-emacs23-bin-common-20130315-13844-cG7qgW' Results in: -c +6 /tmp/reportbug-emacs23-bin-common-20130315-13844-cG7qgW I consider this important because it hides which process is actually running. Version info: % /usr/bin/emacsclient --version emacsclient 23.4 Env vars: ALTERNATE_EDITOR=emacs EDITOR=/usr/bin/emacsclient -c The same bug manifests itself in the emacs24 packages from sid. Thanks, Christian -- Christian Hofstaedtler | design, deploy, scale http://christian.hofstaedtler.name/ | phone +43 720 699846 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703082: linux: Please change path in which dtb is installed
Source: linux Version: 3.8.2-1~experimental.1 Severity: normal Tags: patch Dear Maintainer, From linux 3.8, the directory where dtb is created was changed. Therefore, we need to change the script for package building. I created a patch which fix this problem. Please check and apply. Best regards, Nobuhiro -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores) Locale: LANG=ja_JP.UTF-8, LC_CTYPE=ja_JP.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash diff --git a/debian/rules.real b/debian/rules.real index f4b61f5..2b77891 100644 --- a/debian/rules.real +++ b/debian/rules.real @@ -384,7 +384,7 @@ install-image_$(ARCH)_$(FEATURESET)_$(FLAVOUR)_plain_image: DTB_INSTALL_DIR = /u install-image_$(ARCH)_$(FEATURESET)_$(FLAVOUR)_plain_image: install -m644 '$(DIR)/arch/$(KERNEL_ARCH)/boot/zImage' $(INSTALL_DIR)/vmlinuz-$(REAL_VERSION) +$(MAKE_CLEAN) -C $(DIR) dtbs - shopt -s nullglob ; for i in $(DIR)/arch/arm/boot/*.dtb ; do \ + shopt -s nullglob ; for i in $(DIR)/arch/arm/boot/dts/*.dtb ; do \ install -D -m644 $$i '$(PACKAGE_DIR)'/'$(DTB_INSTALL_DIR)'/$$(basename $$i) ; \ done endif -- 1.7.10.4
Bug#703083: linux: Please add support armel/Plat'Home OpenBlocks A6
Package: linux Version: 3.8.2-1~experimental.1 Severity: wishlist Tags: patch Dear Maintainer, Please add support Plat'Home OpenBlocks A6 of armel. This board was supported from 3.8. I attached the patch which supports this. Please check and apply. Best regards, Nobuhiro -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores) Locale: LANG=ja_JP.UTF-8, LC_CTYPE=ja_JP.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash diff --git a/debian/config/armel/config.kirkwood b/debian/config/armel/config.kirkwood index 1e8790a..0d07c9a 100644 --- a/debian/config/armel/config.kirkwood +++ b/debian/config/armel/config.kirkwood @@ -60,6 +60,7 @@ CONFIG_MACH_GURUPLUG=y CONFIG_ARCH_KIRKWOOD_DT=y CONFIG_MACH_DREAMPLUG_DT=y CONFIG_MACH_ICONNECT_DT=y +CONFIG_MACH_OPENBLOCKS_A6_DT=y CONFIG_MACH_TS219=y CONFIG_MACH_TS41X=y CONFIG_MACH_DOCKSTAR=y
Bug#703084: owncloud: should not be shipped with wheezy
package: src:owncloud version: 4.0.4debian2-3.3 severity: grave This package should not be shipped with wheezy. The biggest problem is lack of upstream security support. See: https://lists.debian.org/debian-release/2013/03/msg00535.html Removal request already filed: http://bugs.debian.org/702186 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703085: keepalived: Version 1.2.6 simply do not work with chk_script, please upgrade to 1.2.7 stable
Package: keepalived Version: 1.2.6 Severity: important Dear Maintainer, Please upgrade to 1.2.7 because of the upstream bug and patch. Thks. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703086: bugs.debian.org: non-ASCII characters appear as \xHH on bugs pages
Package: bugs.debian.org Severity: normal Non-ASCII characters appear as \xHH on bugs pages. AFAIK, this problem is new. For instance, http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=35;bug=399875 or http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=399875#35 contains the line: Vincent Lef\xE8vre vinc...@vinc17.net - Web: http://www.vinc17.net/ with \xE8 instead of 'e' with a grave accent. -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.8-trunk-amd64 (SMP w/2 CPU cores) Locale: LANG=POSIX, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703087: php-xml-rss: Requires PHPunit but does not Depend on it
Package: php-xml-rss Version: 1.0.2-3 Severity: important Dear Maintainer, attempting to run an included test revealed that a required package was not installed: php /usr/share/php/tests/XML_RSS/tests/XML_RSS_Infrastructure_Test.php PHP Warning: require_once(PHPUnit/Autoload.php): failed to open stream: No such file or directory in /usr/share/php/tests/XML_RSS/tests/ XML_RSS_Infrastructure_Test.php on line 21 PHP Fatal error: require_once(): Failed opening required 'PHPUnit/Autoload.php' (include_path='.:/usr/share/php:/usr/share/pear') in /usr/share/php/tests/XML_RSS/tests/ XML_RSS_Infrastructure_Test.php on line 21 after installing phpunit, the system gives: php /usr/share/php/tests/XML_RSS/tests/XML_RSS_Infrastructure_Test.php PHPUnit 3.6.10 by Sebastian Bergmann. .. Time: 0 seconds, Memory: 2.75Mb OK (2 tests, 4 assertions) === Perhaps the package should be made to depend on phpunit or at least to recommend phpunit. Thanks. -- System Information: Debian Release: 7.0 APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.8.2 (SMP w/4 CPU cores) Locale: LANG=en_CA.UTF8, LC_CTYPE=en_CA.UTF8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages php-xml-rss depends on: ii php-pear5.4.4-14 ii php-xml-parser 1.3.4-6 ii php55.4.4-14 php-xml-rss recommends no packages. php-xml-rss suggests no packages. -- no debconf information -- Robert Pogson Have server, will travel...
Bug#703088: ITP: ruby-remcached -- Ruby EventMachine memCACHED client implementation
package: wnpp severity: wishlist * Homepage: http://rubygems.org/gems/remcached * Version: 0.4.1 * Upstream Author: Stephan Maka * Programming Language: Ruby * License: unknown (asking the author to clarify https://github.com/astro/remcached/issues/4) * Description: * **Ruby EventMachine memCACHED client implementation** * provides a direct interface to the memcached protocol and its semantics * uses the memcached `binary protocol`_ to reduce parsing overhead on the server side (requires memcached = 1.3) * supports multiple servers with simple round-robin key hashing (**TODO:** implement the libketama algorithm) in a fault-tolerant way * writing your own abstraction layer is recommended * uses RSpec * partially documented in RDoc-style -- പ്രവീണ് അരിമ്പ്രത്തൊടിയില് You have to keep reminding your government that you don't get your rights from them; you give them permission to rule, only so long as they follow the rules: laws and constitution. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703089: arb_edit4 broken in BioLinux (Ubuntu12.04)
Package: arb Version: 5.3-private-8210 Nothing happens when trying to open the ARB_EDIT4 sequence editor, but a file not found error in the terminal: sh: 1: arb_edit4: not found The file is indeed not found under /usr/local/bin, /usr/lib/arb, /usr/lib/arb/bin or anywhere else in the system. A similar file is found under /usr/lib/arb/bin/arb_edit. Softlinking this file to arb_edit4 has still no effect but a message referring to the opening of the old ARB editor. Already checked the correct paths in the environmental variables, and softlinked the libmotif libraries from 3 to 4. This error is not reproduced when installing the latest arb version 5.5-org-9167 from source, but this is not available through the repositories and version 5.3 is still the one being shipped with BioLinux. And I don't really know what went wrong. I'm using the preinstalled arb in Biolinux (Ubuntu 12.04 precise), kernel 3.2.0-38-generic #61-Ubuntu SMP , libc6 2.15-0ubuntu10.3. This error is replicated in another BioLinux7 installation on an i7x4 laptop. cheers. Germän Bonilla-Rosso --- Inst för mikrobiologi Box 7025 BioCentrum 750 07 UPPSALA (+46) 018-673204 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703091: python-tweepy-doc: wrong paragraph separation
Package: python-tweepy-doc Severity: minor Dear Maintainer, I've found an error in the Debian Package Description of this package: the separation of the two paragraph has a . preceded by a space; this way the two paragraph are not separated correctly. Also the second paragraph start with a space. Bye. Mirco aka scottmir -- If you can't explain it simply, you don't understand it well enough. (A.Einstein) GNU/Linux User: 410619 (https://linuxcounter.net/) -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703093: RFS: beret/1.2.1-1 [ITP]
Package: sponsorship-requests Severity: normal [important for RC bugs, wishlist for new packages] Dear mentors, I am looking for a sponsor for my package beret * Package name: beret Version : 1.2.1-1 * URL : http://http://kiwisauce.com/beret/ * License : LGPL Section : games It builds those binary packages: beret - 2D puzzle platformer game beret-data - 2D puzzle platformer game (data) To access further information about this package, please visit the following URL: http://mentors.debian.net/package/beret Alternatively, one can download the package with dget using this command: dget -x http://mentors.debian.net/debian/pool/main/b/beret/beret_1.2.1-1.dsc Regards, Alfonso Sabato Siciliano thanks -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703094: owncloud: multiple vulnerabilities (oC-SA-2013-009, oC-SA-2013-010)
Package: owncloud Severity: grave Tags: security Hi, the following vulnerabilities were published for owncloud. CVE-2013-1851[0]: user_migrate: Local file disclosure CVE-2013-1850[1]: Contacts: Bypass of file blacklist If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities Exposures) ids in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1851 http://security-tracker.debian.org/tracker/CVE-2013-1851 http://owncloud.org/about/security/advisories/oC-SA-2013-010 [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1850 http://security-tracker.debian.org/tracker/CVE-2013-1850 http://owncloud.org/about/security/advisories/oC-SA-2013-009 Please adjust the affected versions in the BTS as needed. Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703092: dpkg --set-selections ignores available packages never installed or removed by dpkg
Package: dpkg Version: 1.16.9 Severity: normal Dear Maintainers, I recently noticed that the workflow to install in a basic box the list of extra packages present in other more complete box seems to no longer work full-box# dpkg --get-selections desired-selections.txt basic-box# dpkg --get-selections desired-selections.txt basic-box# apt-get upgrade This is better seen in a chroot with following sequence # debootstrap sid mychroot http://http.debian.net/debian # chroot mychroot In the chroot: mychroot# apt-get update mychroot# echo joe install | dpkg --set-selections ... dpkg: warning: package not in database at line 1: joe mychroot# apt-get upgrade ... 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. mychroot# dpkg --get-selections | grep joe Selection seems lost. Trying with apt-get dselect-upgrade does not help mychroot# apt-get install dselect mychroot# apt-get dselect-upgrade ... 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. mychroot# dselect update mychroot# apt-get dselect-upgrade ... 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Only if I set selections again after dselect update things work (althouch only for apt-get dselect-upgrade). After previous commands mychroot# echo joe install | dpkg --set-selections mychroot# apt-get upgrade ... 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. mychroot# apt-get dselect-upgrade ... 0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. ... Setting up joe (3.7-2.3) ... Seems that dpkg ignores setting values for packages that were never installed or removed in the system, although they are available and can be retrieved with apt-get. I guess dselect update adds apropriate entries to database that can later be set. IIRC this workflow is described in a number of places to clone a system, so behavior should be fixed or clarified. If this change is intentional, some comment should be added to dpkg man page or to README file. Regards, -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable'), (200, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 3.2.0-4-686-pae (SMP w/1 CPU core) Locale: LANG=es_ES.ISO-8859-1, LC_CTYPE=es_ES.ISO-8859-1 (charmap=ISO-8859-1) Shell: /bin/sh linked to /bin/bash Versions of packages dpkg depends on: ii libbz2-1.0 1.0.6-4 ii libc62.13-38 ii liblzma5 5.1.1alpha+20120614-2 ii libselinux1 2.1.9-5 ii tar 1.26+dfsg-0.1 ii zlib1g 1:1.2.7.dfsg-13 dpkg recommends no packages. Versions of packages dpkg suggests: ii apt 0.9.7.8 -- no debconf information -- Agustin -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703095: RFS: fonts-sil-averia/1.01-1 [ITP]
Package: sponsorship-requests Severity: wishlist Dear mentors, I am looking for a sponsor for my package fonts-sil-averia * Package name: fonts-sil-averia Version : 1.01-1 * URL : http://iotic.com/averia * License : SIL Open Font License Section : fonts It builds those binary packages: fonts-sil-averia - Avería is a Unicode typeface family To access further information about this package, please visit the following URL: http://mentors.debian.net/package/fonts-sil-averia Alternatively, one can download the package with dget using this command: dget -x http://mentors.debian.net/debian/pool/main/f/fonts-sil-averia/fonts-sil-averia_1.01-1.dsc Regards, Alfonso Sabato Siciliano thanks -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703096: libguestfs-tools: too many stramge dependencies
Package: libguestfs-tools Version: 1:1.18.1-1+deb7u1 In need of virt-resize, I'm about to install libguestfs-tools, however the amount of dependencies is a little bit strange: # apt-get install libguestfs-tools ... 0 upgraded, 87 newly installed, 0 to remove and 0 not upgraded. Need to get 38.4 MB of archives. After this operation, 120 MB of additional disk space will be used. While 120 MB is not much nowadays, I wonder whether indirect dependencies on e.g. aptitude, fonts-droid, ghostscript, ico-utils, or netpbm can be avoided somehow? Maybe the package could be split accordingly? TIA! -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703097: upstream 1.10-RC1 packaging
Package: liferea Version: 1.8.6 For my own nefarious purposes, I packaged 1.10-RC1 based upon the tip of the experimental branch in the collab-maint repo, in the process making some other random updates. Available in git://git.debian.org/~bap/liferea.git You are welcome to pick anything of use from it, as you wish. Cheers, --Barak. -- Barak A. Pearlmutter Hamilton Institute Dept Comp Sci, NUI Maynooth, Co. Kildare, Ireland http://www.bcl.hamilton.ie/~barak/ -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703098: Fwd: Bug in 7z documentation
Package: p7zip Severity: minor Merci. Message original Objet: Bug in 7z documentation Date: 2013-03-15 18:07 De: Guillaume MULLER g...@presans.com À: adn+...@diwi.org Dear Mohammed, The man page of 7z (at least, in Ubuntu 12.10) says the synopsis is: 7z [adeltux] [-] [SWITCH] ARCHIVE_NAME ARGUMENTS... I've just tested, it does not work. However, the following sysopsis works: 7z [adeltux] ARCHIVE_NAME [-] [SWITCH] ARGUMENTS... The exact command I just used was: 7z x JNI_SVM-light-6.01-64bit.zip -- -x '*.dll' JNI_SVM-light-6.01-64bit/lib/ Cheers -- Mohammed Adnène TROJETTE -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703100: pwman3: Please, upgrade to the latest version
Package: pwman3 Version: 0.0.8-1 Severity: wishlist Dear Maintainer, There is just a new pwman3 release (0.3.0). Would be great if you could upgrade it in Debian. https://pypi.python.org/pypi/Pwman3/0.3.0 Thank you very much! Guilherme -- System Information: Debian Release: 7.0 APT prefers testing APT policy: (500, 'testing'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages pwman3 depends on: ii python 2.7.3-4 ii python-crypto 2.6-4 ii python-support 1.0.15 Versions of packages pwman3 recommends: ii python-mysqldb 1.2.3-1+b1 ii python-pygresql 1:4.0-3 Versions of packages pwman3 suggests: ii mysql-server 5.5.28+dfsg-1 -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703101: missing /usr/share/javascript/jquery-ui/themes/base/images/ui-anim_basic_16x16.gif
Package: libjs-jquery-ui Version: 1.8.ooops.21+dfsg-2 Severity: normal After upgrade from squeeze to wheezy the ui-anim_basic_16x16.gif is missing. Please re-add, THNX -- System Information: Debian Release: 7.0 APT prefers testing-updates APT policy: (500, 'testing-updates'), (500, 'testing'), (400, 'testing-proposed-updates') Architecture: armel (armv5tel) Kernel: Linux 3.2.0-4-kirkwood Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages libjs-jquery-ui depends on: ii libjs-jquery 1.7.2+dfsg-1 Versions of packages libjs-jquery-ui recommends: ii javascript-common 7 Versions of packages libjs-jquery-ui suggests: ii libjs-jquery-ui-docs 1.8.ooops.21+dfsg-2 -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703102: PidFile /dev/null replaces /dev/null with a real file if run as root
Package: apache2.2-bin Version: 2.2.22-13 Severity: normal As part of a test setup, I ran Apache within a cgroup to contain it, so I didn't need Apache to manage a PID file. I set PidFile /dev/null, but when I ran Apache as root (so that it could drop privileges and change to another user/group), it overwrite /dev/null with a real file. That caused no end of havoc on my system. Perhaps Apache could truncate the existing file but not remove it? - Josh Triplett -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.8-trunk-amd64 (SMP w/4 CPU cores) Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages apache2.2-bin depends on: ii libapr1 1.4.6-3 ii libaprutil1 1.4.1-3 ii libaprutil1-dbd-sqlite3 1.4.1-3 ii libaprutil1-ldap 1.4.1-3 ii libc62.13-38 ii libcap2 1:2.22-1.2 ii libldap-2.4-22.4.31-1 ii libpcre3 1:8.31-2 ii libssl1.0.0 1.0.1e-1 ii zlib1g 1:1.2.7.dfsg-13 apache2.2-bin recommends no packages. apache2.2-bin suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703103: base: System boots to an apparently random tty
Package: base Severity: minor I've recently installed an AGP ATI Radeon 100 graphics card to get advantage of an high resolution console. (I believe this is relevant as the problem was nonexistant while using the integrated Intel i810 video): (lspci output: 00:01.0 PCI bridge: Intel Corporation 82815 815 Chipset AGP Bridge (rev 02) 00:1e.0 PCI bridge: Intel Corporation 82801AA PCI Bridge (rev 02) [...] 02:00.0 VGA compatible controller: Advanced Micro Devices [AMD] nee ATI RV100 QY [Radeon 7000/VE] ) I used `aptitude install linux-firmware-nonfree` to fix some warnings printed at early boot, but this problem was preexisting. In fact, the problem manifested immediately after installing Sid via a tutorial found on a popular Italian fansite (install stable base system, edit sources.list, apt-get update/upgrade/install apt dpkg aptitude, aptitude dist-upgrade). At this moment, the system is fully upgraded as the packages available at 2013-3-15 13:00 GMT were. After booting, the login prompt appears on an apparently random virtual console (most often tty3). While this isn't clearly correct behavior, it does not impair usability on a standard setup as all consoles are equal (this might not apply if inittab is edited to use autologin, but I haven't tried this scenario or any display manager). -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 3.2.0-4-686-pae (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703099: claws-mail-tools: please don't compress bundled scripts
Package: claws-mail-tools Version: 3.9.0-1 Severity: normal Currently, scripts such as /usr/share/doc/claws-mail/tools/fix_date.sh.gz are compressed, which makes it impossible to use them as is without decompressing prior to that. Please add /usr/share/doc/claws-mail/tools/ to the -X of dh_compress. Thanks. -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 3.2.0-4-686-pae (SMP w/4 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_GB.UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages claws-mail-tools depends on: ii claws-mail 3.9.0cvs61-1 ii perl5.14.2-16 ii python 2.7.3~rc2-1 claws-mail-tools recommends no packages. claws-mail-tools suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703104: ITP: ruby-multipart-parser -- simple parser for multipart MIME messages
Package: wnpp Severity: wishlist Owner: Jérémy Bobbio lu...@debian.org * Package name: ruby-multipart-parser Version : 0.1.1 Upstream Author : Daniel Abrahamsson hams...@gmail.com * URL : https://github.com/danabr/multipart-parser * License : Expat Programming Lang: Ruby Description : simple parser for multipart MIME messages multipart-parser is a simple parser for multipart MIME messages, written in Ruby, based on felixge/node-formidable's parser. Some things to note: - pure Ruby - event-driven API - only supports one level of multipart parsing: another parser needs to be invoked to handle nested messages - does not perform I/O - does not depend on any other library -- Jérémy Bobbio.''`. lu...@debian.org: :Ⓐ : # apt-get install anarchism `. `'` `- signature.asc Description: Digital signature
Bug#703105: ITP: ruby-upr -- Upload Progress for Rack
Package: wnpp Severity: wishlist Owner: Jérémy Bobbio lu...@debian.org * Package name: ruby-upr Version : 0.2.0 Upstream Author : upr hackers u...@librelist.com * URL : http://www.example.org/ * License : Ruby or GPL-2 Programming Lang: Ruby Description : Upload Progress for Rack upr is Rack middleware that allows browser-side upload progress monitoring. It is based on (and should be client-side compatible with) several upload progress modules including ones used by leading web servers. It allows any Moneta backing store in addition to DRb. -- Jérémy Bobbio.''`. lu...@debian.org: :Ⓐ : # apt-get install anarchism `. `'` `- signature.asc Description: Digital signature
Bug#703106: nautilus fails to start with missing 'org.gnome.desktop.privacy'
package: nautilus version: 3.7.91-1 severity: grave $ nautilus (nautilus:5290): GLib-GIO-ERROR **: Settings schema 'org.gnome.desktop.privacy' is not installed Trace/breakpoint trap after installing gsettings-desktop-schemas 3.7.90-1 I was able to start nautilus, so a versioned dependency on gsettings-desktop-schemas should fix this. -- പ്രവീണ് അരിമ്പ്രത്തൊടിയില് You have to keep reminding your government that you don't get your rights from them; you give them permission to rule, only so long as they follow the rules: laws and constitution. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703107: ITP: rainbows -- HTTP server for sleepy Rack applications
Package: wnpp Severity: wishlist Owner: Jérémy Bobbio lu...@debian.org * Package name: rainbows Version : 4.5.0 Upstream Author : Rainbows! Hackers rainbows-t...@rubyforge.org * URL : http://rainbows.rubyforge.org/ * License : Ruby or GPL-2 or GPL-3 Programming Lang: Ruby Description : HTTP server for sleepy Rack applications Rainbows! is an HTTP server for sleepy Rack applications. It is based on Unicorn, but designed to handle applications that expect long request/response times and/or slow clients. -- Jérémy Bobbio.''`. lu...@debian.org: :Ⓐ : # apt-get install anarchism `. `'` `- signature.asc Description: Digital signature
Bug#703108: live-config.noroot does not work due to a missing/extra underscore in config.sh
Package: live-config Version: 3.0.21-1 Severity: important Dear Maintainer, The config.sh script in live-config does not apply the noroot parameter correctly. In Line 74 it performs the command: _NOROOT=true Then on line 100, it performs a select case on it: case ${_NO_ROOT} in There is either an extra underscore on line 100, or a missing one on line 74. This causes sudo policykit to be configured when noroot is specified. As a workaround, I'm applying this using noconfig=sudo,policykit Please could this be fixed. Many thanks in advance. Regards, Chris Malton -- System Information: Debian Release: 7.0 APT prefers testing APT policy: (500, 'testing'), (500, 'stable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703110: Navit crashes while setting destination
Package: navit Version: 0.5.0~svn5126+dfsg.1-2 Severity: important Navit crashes while clicking on the map (a reasonable travel destination point) and then selecting Set as destination option. Set as position, Add as bookmark and POIs seem to work. Some months ago Set as destination was working fine for me as well with the same maps (data=/opt/osm/osm_bbox_-80.2,36.8,-68.2,46.2.bin) and the same navit.xml. I was hoping maybe it was some bad change in testing and navit would fix itself but apparently no. Tried to download navit package again and then reinstalling it. The problem is still there. Any ideas? Thanks -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703109: DateTime-modify('tomorrow') Bug in PHP 5.3 in Debian Squeeze 4.3.5-4
Package: php5 Version: 5.3.3-7+squeeze15 Tags: squeeze I have a strange bug with DateTime-modify('tomorrow') in PHP 5.3. Code to reproduce: ?php $d = new DateTime('2013-02-05 06:33:33'); echo $d-format('Y-m-d H:i:s').\n; $d-modify('tomorrow'); echo $d-format('Y-m-d H:i:s').\n; ? Current output on Windows with PHP 5.3.14: 2013-02-05 06:33:33 2013-02-06 00:00:00 Current output on Linux (Debian) with PHP 5.3.3-7+squeeze15: 2013-02-05 06:33:33 2013-02-06 06:33:33 I have asked the PHP internals mailinglist (see http://www.mail-archive.com/internals@lists.php.net/msg64587.html) and got this answer: The 5.3.14 result is correct. It was apparently a bug in earlier 5.3 versions. cheers, Derick http://www.mail-archive.com/internals@lists.php.net/msg64588.html So it seems like the patch has not been integrated into Debian. It would be nice if this could be done. Best regards Christian Stoller
Bug#529680: O: php-net-dime -- class that implements DIME encoding
Control: retitle -1 ITA: php-net-dime -- class that implements DIME encoding Control: owner -1 ! -- Prach -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#574725: chromium-browser: Adobe flashplugin-nonfree usage spawns: XID collision trouble ahead errors to console
Bart Martens wrote: On Thu, Mar 14, 2013 at 10:00:06PM -0700, Jonathan Nieder wrote: I don't know if this is caused by Adobe Flash player or something else. Then I guess you don't mind that I revert the reassignment. In fact I do mind, since this almost certainly has nothing to do with chromium and I have no desire to debug anything touching Flash. [...] for example by letting the reporter know how to report it to Adobe That can be found on Adobe's website. For future reference: I assume you'd prefer that I not refer future bugs reported through the BTS about Flash's behavior on Debian when installed using flashplayer-nonfree to its maintainers in the future? Thanks for your work, Jonathan -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#575873: sigar: change from RFP to ITP
retitle 575873 ITP: sigar -- A cross-platform API for collecting software inventory data owner 575873 ! thanks Hi, I have started packaging sigar to ship at least the C, Java and Python libraries. This is an intermediate step for packaging elasticsearch for Debian. Regards, Apollon -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#603757: kde-plasma-desktop: Similar problem, although in my case the widgets got moved to small screen size
Package: kde-plasma-desktop Version: 5:77 Followup-For: Bug #603757 Dear Maintainer, I ran lincity-ng (for the first time) and it seemed to take over my main monitor, forcing everything to the secondary monitor. I tried to shut down KDE, but nothing happened after hitting the red log-off/shutdown button on the file menu and the show desktop widget. In the end I had to do a power switch reboot falled by control-alt-del to restart the whole system from scratch. When I returned to the orginal dual monitor desktop, all the widgets on the larger sceen had been moved from the right edge towards the centre (seemingly forgetting their original settings - instead remembering the settings as a result of running on the smaller screen) What made me attach to this bug report however is that the task bar was orginally placed on my secondary screen (at the bottom) and seems to have moved without reason to the main screen as a result of the activities above. -- System Information: Debian Release: 7.0 APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages kde-plasma-desktop depends on: ii kde-baseapps4:4.8.4-2 ii kde-runtime 4:4.8.4-2 ii kde-workspace 4:4.8.4-6 ii plasma-desktop 4:4.8.4-6 ii udisks 1.0.4-7 ii upower 0.9.17-1 Versions of packages kde-plasma-desktop recommends: pn kdm none ii xserver-xorg 1:7.7+2 Versions of packages kde-plasma-desktop suggests: pn kde-l10n none -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#622960: Freeplane package + JMapViewer dependency
On 15/03/13 04:29, Felix Natter wrote: For the upcoming 1.3.x Freeplane release (upstream in a few months) I also need the JMapViewer dependency. I saw this bug report regarding JMapViewer (which I cc:): http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649226 Is someone taking care of JMapViewer for Debian? (there is no activity since 2011: http://anonscm.debian.org/gitweb/?p=pkg-osm/jmapviewer.git;a=summary) I've just pushed some updates to the packaging to clean it up and updated to the latest upstream version. I'm happy to maintain it (unless upstream makes big changes which make harder to package). However a DD will need to sponsor it's upload if we want it included in Debian. Lastly, my apologies to Laszlo who offered to sponsor it's upload back in August last year, but I never got around to fixing up the package. Hopefully the latest updates I've made will mean it can be sponsored and uploaded into Debian. Thanks all for chasing up with me on this, hopefully my original packaging effort will not have been in vain after all. signature.asc Description: OpenPGP digital signature
Bug#622960: Freeplane package + JMapViewer dependency
On Fri, 2013-03-15 at 21:13 +1100, Andrew Harvey wrote: I've just pushed some updates to the packaging to clean it up and updated to the latest upstream version. Cool! I was beginning to think about hijacking it. I'm happy to maintain it (unless upstream makes big changes which make harder to package). However a DD will need to sponsor it's upload if we want it included in Debian. Lastly, my apologies to Laszlo who offered to sponsor it's upload back in August last year, but I never got around to fixing up the package. Hopefully the latest updates I've made will mean it can be sponsored and uploaded into Debian. Sure, it looks OK. Still, there's some things to fix. Why do you use Java 6? Java 7 is in Debian now, see the openjdk-7-jre package. Copyright format is now official, please use its format line[1]. BSD-2 license text lines are too long, please use a 80 chars width one. It would be nice to 'beautify' debian/rules . The second line can show the file format if set to: '# -*- makefile -*-'. Override targets should be listed in the '.PHONY: ...' line at the end. The debian/watch is essentially empty, delete it or make use of it. Worst is that JMapViewer_Demo.jar is empty, contains only MANIFEST.MF . Is it an upstream build problem? Cheers, Laszlo/GCS [1] http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#631366: include progress logo
tag 631366 -patch thanks On Thu, 23 Jun 2011, Daniel Baumann wrote: tag 631366 patch thanks fixed with this commit, feel free to merge: http://vcs.progress-linux.org/?p=packages/nagios-images.git;a=commitdiff;h=44b4335bb976ea097d8abb5d62e977dabb48d406 Unfortunatly that link is borken. Could you please attach the files? Thanks Alex -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#630617: May be decision
It seems kmix application is responsible for system tray troubles. When it starts, I have a message QDBusConnection: session D-Bus connection created before QCoreApplication. Application may misbehave.. When KDE started first time after boot, systray becomes crazy , no klipper icon and network manager applet not responding to mouse buttons press. Removing kmix.desktop from /usr/share/autostart helps, and when I put it into /home/user/.kde/Autostart, KDE desktop starts normally. Current Wheezy and KDE.Sorry for my English. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#631366: include progress logo
tag 631366 patch thanks On 03/15/2013 08:43 AM, Alexander Wirt wrote: http://vcs.progress-linux.org/?p=packages/nagios-images.git;a=commitdiff;h=44b4335bb976ea097d8abb5d62e977dabb48d406 Unfortunatly that link is borken. http://sources.progress-linux.org/gitweb/?p=releases/baureo/packages/nagios-images.git;a=commitdiff;h=4f54a47fe76bdf9bb6dbb94e2821c570c75a819d -- Address:Daniel Baumann, Donnerbuehlweg 3, CH-3012 Bern Email: daniel.baum...@progress-technologies.net Internet: http://people.progress-technologies.net/~daniel.baumann/ -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#668020: Getting remmina patched for wheezy
Hello Luca, there is a nasty bug in remmina that (sometimes) breaks the WM when setting the window size, which could lead to data loss. Or sometimes it just don't work without breaking the desktop environment. There is an upstream patch (one line) that fixes the issue and at least four (merged) bugs marked important are verified to be fixed by this. So I would consider this a candidate to get into wheezy, even this late in the release cycle. Bugs: 668020 677001 700369 702500 Would you be willing to move forward with this? If you do not have time I can prepare a package, but I cannot upload it. I could search for a sponsor though. Best Regards, Bernhard -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#668020: Getting remmina patched for wheezy
2013/3/15 Bernhard Schmidt be...@birkenwald.de: Bugs: 668020 677001 700369 702500 Thanks a lot for your work on those bugs! Would you be willing to move forward with this? If you do not have time I can prepare a package, but I cannot upload it. I could search for a sponsor though. I'm currently out for work, and don't have any chance to prepare an upload from here, I'll try to see whether I'll have a chance next week. If you don't hear from me within a couple of days, feel free to prepare an NMU (I can eventually sponsor it, if I get the time, and the GPG key with me). Thanks again! -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#675345: Merge
On 03/13/2013 09:40 PM, Anton Gladky wrote: forcemerge 675345 702809 thanks I am merging bugs. No reasons to duplicate them, sorry. Sorry for the double report - hat problems with reportbug (first time it seemed that it didn't work) Best Juergen. On 03/13/2013 09:30 PM, Sven Joachim wrote: The OP has already reported problems in #675345, FWIW. Thanks, Anton signature.asc Description: OpenPGP digital signature
Bug#692830: preliminary Nemo package
Hi Tao, Long time no see. But to answer your question, the preliminary package is available from the git tree[1]. It contains 1.7.1 ATM, the source tar.gz is available from upstream[2]. Package builds and works as expected. Laszlo/GCS [1] git clone git://anonscm.debian.org/pkg-cinnamon/nemo.git [2] https://github.com/linuxmint/nemo/tags -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#688045: Installation report for Wheezy beta 2 installer
Fabian Rodriguez, le Sun 10 Mar 2013 22:26:18 -0400, a écrit : On 2012-09-18 18:46, Samuel Thibault wrote: Fabian Rodriguez, le Tue 18 Sep 2012 12:51:09 -0400, a écrit : - - While installing the base system more optional detail (when downloading updates for example) could be useful . Most people do not care about such details, that is why we don't show them. If you really care, see the documentation: “ Error messages and logs are redirected to the fourth console. You can access this console by pressing Left Alt-F4 (hold the left Alt key while pressing the F4 function key); get back to the main installer process with Left Alt-F1. ” I appreciate Alt-F4 gives access to this but there isn't a hint about it when it would be useful (specially low-bandwidth conditions come to mind). Well, we can't really provide all kinds of hints for all possible conditions. That's why there is documentation. This is not about all possible conditions, just a very specific use case. That's precisely my point. If we give a hint for that very specific use case, it means we should do the same for all other very specific use cases etc. and thus completely clutter the installer with all kinds of hints, making it unusable. At the time I followed this documentation, which doesn't mention anything about the console use: http://d-i.debian.org/manual/en.i386/apa.html If you only have a look at a howto, you indeed can not expect to have this kind of details. A howto is meant to be as concise as possible. Whenever getting into trouble, a howto is not the answer. The proper documentation is. The actual installer documentation does have an introduction to such details, see http://d-i.debian.org/manual/en.i386/ch06s01.html Odd behavior (not show-stopper): - - Clock/timezone setup wasn't automatic even though a network connection was present Do you mean that the clock was not adjusted, or just that the timezone was not asked? When the country has only one timezone, the timezone question is not asked, that's normal. Timezone was asked but could have been guessed (GeoIP?), GeoIP is not really a safe bet. Which country did you select? I actually wonder whether GeoIP can even help for the countries which have several timezones. There wasn't a choice for country, Which language had you chosen? I don't see how you could not be presented with the country choice. Did you perhaps preseed some things? only for timezones (Eastern, etc.) We do already have the support for automatically choosing the proper timezone once the country is properly selected. The information we use for that comes from /usr/share/zoneinfo/zone.tab Since that didn't happen, that's where we have to concentrate debugging: please tell us exactly how you got to that situation. which makes the assumption such information is known/understood. We only ask the timezone for countries which have several timezones. People in such countries do know about them. Geolocation helps a lot with this. Sure, and we already do it. When you mentioned GeoIP, I thought you meant guessing the timezone from the public IP address that the installer gets. That's broken at best, see for instance the thread here: http://stackoverflow.com/questions/743505/how-to-get-time-zone-through-ip-address-in-php Samuel -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#695588: RFS: jitsi/1.1.4365-1 [ITP]
Hi, we've just updated the package on mentors.debian.net following the comments we recieved: The dsc file can be found at: http://mentors.debian.net/debian/pool/main/j/jitsi/jitsi_2.0.4506.10553-1.dsc Regards Damian On Mon, Dec 10, 2012 at 3:13 PM, Damian Minkov damen...@jitsi.org wrote: Package: sponsorship-requests Severity: wishlist Dear mentors, We are looking for a sponsor for our package jitsi * Package name: jitsi Version : 1.1.4365-1 Upstream Author : Jitsi Community d...@jitsi.java.net * URL : https://jitsi.org/ * License : LGPL v2 Section : net It builds those binary packages: jitsi - Java VoIP and Instant Messaging client jitsi-jni - Jitsi JNI library To access further information about this package, please visit the following URL: http://mentors.debian.net/package/jitsi Alternatively, one can download the package with dget using this command: dget -x http://mentors.debian.net/debian/pool/main/j/jitsi/jitsi_1.1.4365-1.dsc More information about Jitsi can be obtained from https://jitsi.org and the developers mailinglist: d...@jitsi.java.net. Regards, Damian Minkov -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#696234: apt: Signed Debian control block parsing can be fooled
(Disclaimer: I am not arguing that we don't need to fix this – we are working on it – the following just outlines why I think that it is a bug in gpgv and/or other implementations that we have to fix to use them …) On Thu, Mar 14, 2013 at 7:31 PM, Guillem Jover guil...@debian.org wrote: I think you might have been confused by the nomenclature, and my lack of more explicit detail, perhaps? Or I missunderstood your comment. Yeah, I messed up the naming a bit … guilty as pledged. So (from what I wrote on the initial bug report) SigVerify::RunGPGV() would not be able to parse something like: -BEGIN PGP SIGNATURE- \t \n For the signature, this might to be a problem, for the message (which I thought you are referring to) I still think §7 is the authority as it not an amored header (line) but a cleartext header (line). Yet, as §7.1 says that any trailing whitespace […] at the end of any line is removed when the cleartext signature is generated. I question even why I should expect to see such a signature. And given that paragraph §6.2 is referring to formatting ASCII Amor which a clear-text message is not as §7 is so quick to outline I question if §6.2 should have relevance in §7 at all without special invocation by name, but this might destroy everything. And in additiona SourcesWriter::DoPackage() should not be able to handle an OpenPGP message starting with stuff like: -BEGIN PGP MESSAGE- \t \n Hash: SHA1\n \n SIGNED MESSAGE\n Beside again invoking §7.1 and repeating that cleartext header isn't mentioned as a possible Amored Header line, §7 also says about the line following the Hash Armor Header(s): Exactly one empty line not included into the message digest, For me an empty line is in fact empty and not just a short way of saying doesn't contain printable characters. gpgv obviously has a more relaxed interpretation … (I wonder now how someone is supposed to sign a message containing whitespace sourcecode …) I don't think trailing whitespace is in this context usually (ever?) significant anyway? https://en.wikipedia.org/wiki/Whitespace_%28programming_language%29 (the remark was a joke) APT code also doesn't support dash-escaped text so far. Neither does dpkg, but that should be fine because they only accept deb822 (?) which only allows message lines starting with fields names or spaces, and field names cannot start with a dash. I agree in theory, its just that §7.1 says: An implementation MAY dash-escape any line and an attacker might use this to disable fields, but if my testing is correct gpgv doesn't allows at least this currently … (which would be a bug if I am right, but I am not complaining) Best regards David Kalnischkies -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698534: Infos on A ...
2013/3/14 Christoph Anton Mitterer cales...@scientia.net: Hi. On Thu, 2013-03-14 at 20:23 +0100, Mathieu Parent wrote: Isn't it https://bugzilla.redhat.com/show_bug.cgi?id=748528? I just tried what they suggest in comment 4, adding [libdefaults] default_tkt_enctypes = rc4-hmac des-cbc-crc des-cbc-md5 default_tgs_enctypes = rc4-hmac des-cbc-crc des-cbc-md5 and with that... everything works with the CERN kerberos... So you seem to be right and it's this issue. Digging further i found the upstream bug: http://krbdev.mit.edu/rt/Ticket/Display.html?id=2131 I won't have time to test soon. -- Mathieu -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698472: FTBFS clang-3.2 (compiler-rt) on i386
On 19/01/2013 03:39, Andrey Gursky wrote: Source: clang Version: 3.2-1~exp5 Severity: normal Here is the relevant output building package on wheezy i386: Well, as you can see here: https://buildd.debian.org/status/logs.php?pkg=clangarch=i386 it works fine on a debian clean system. Sylvestre -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#699361: linux-image-3.2.0-0.bpo.4-amd64: nfsd4 RELEASE_LOCKOWNER is slow and, CPU intensive
On 05/03/13 09:36, Chris Boot wrote: On 03/03/13 01:56, Ben Hutchings wrote: Control: tag -1 moreinfo fixed-upstream On Thu, 2013-02-28 at 15:28 +, Chris Boot wrote: We are also seeing this on an NFS server hosing home directories for a fairly large deployment of Debian desktop systems. The symptoms and perf top agree perfectly with what the reporter is experiencing. Please consider backporting said patch to the 3.2 kernel for wheezy/squeeze-backports. Please test the attached backport as explained here: http://kernel-handbook.alioth.debian.org/ch-common-tasks.html#s-common-official Hi Ben, I have been testing a 3.2 kernel with both the patch you backported as well as 64a284d07c7d84299a90826950079a8ef11e8204 from upstream (nfsd4: maintain one seqid stream per (lockowner, file)). These patches together appear to have resolved the issues our client has been seeing, though this is not running in a production environment just yet. I think the other patch (64a284d07c7d84299a90826950079a8ef11e8204) is also quite important in resolving this problem, as it reduces the number of entries in the lockowner hash table. Would this be a patch you would entertain to backport as well? Hi Ben, Did you have any further thoughts about the other patch I mentioned above? I still don't have this running in a production environment, but the testing I have performed looks good with both patches applied. Best regards, Chris -- |Chris Boot |Tiger Computing Ltd |Linux for Business | |Tel: 033 0088 1511 |Web: http://www.tiger-computing.co.uk | |Registered in England. Company number: 3389961 |Registered address: Wyastone Business Park, | Wyastone Leys, Monmouth, NP25 3SR -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#699888: new nss packages fixing cve-2013-1620
Hi! On Fri, Mar 15, 2013 at 03:33:05PM +0100, Yves-Alexis Perez wrote: On jeu., 2013-03-14 at 22:48 -0400, Michael Gilbert wrote: Hi, I've prepared new nss packages fixing the lucky 13 issue: http://people.debian.org/~mgilbert For the mozilla team, this is a new upstream, so would you be ok with it uploaded as an nmu, or would you like to upload? It seems the BTS never received your mail, not sure why (at least it doesn't appear on the BTS web interface). So I'm not sure mozilla people received it either. Hopefully this mail will reach them. Hmm, this is probably due to: Topic for #debian-devel: BROKEN: mailhandling of bugs.debian.org Current mailhandling for bugs.debian.org is not working. Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#699888: new nss packages fixing cve-2013-1620
On Fri, Mar 15, 2013 at 05:50:08PM +0100, Yves-Alexis Perez wrote: On jeu., 2013-03-14 at 22:48 -0400, Michael Gilbert wrote: Hi, I've prepared new nss packages fixing the lucky 13 issue: http://people.debian.org/~mgilbert For the mozilla team, this is a new upstream, so would you be ok with it uploaded as an nmu, or would you like to upload? For the security team, these fixes are so large that I think a backport is likely impossible. Should (can) we attempt to convince the release team to jump from 3.13.6 to 3.14.3 in testing, or is that crazy at this point in the freeze? If not, then what? Manually adding Mike in the loop because of the broken BTS. I was considering we should get 3.14.x in both testing and stable-security, actually, but it needs some work to make it on par with the versions in testing and stable, because in its current state it breaks some things people might expect not to be broken with a stable update (most notoriously, md5 signature of certificates are rejected, and there are a few other things like that) Mike -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#699888: new nss packages fixing cve-2013-1620
On jeu., 2013-03-14 at 22:48 -0400, Michael Gilbert wrote: Hi, I've prepared new nss packages fixing the lucky 13 issue: http://people.debian.org/~mgilbert For the mozilla team, this is a new upstream, so would you be ok with it uploaded as an nmu, or would you like to upload? It seems the BTS never received your mail, not sure why (at least it doesn't appear on the BTS web interface). So I'm not sure mozilla people received it either. Hopefully this mail will reach them. For the security team, these fixes are so large that I think a backport is likely impossible. Should (can) we attempt to convince the release team to jump from 3.13.6 to 3.14.3 in testing, or is that crazy at this point in the freeze? If not, then what? Well, starting by asking them their pov might be a good idea. And what about Squeeze? Regards, -- Yves-Alexis signature.asc Description: This is a digitally signed message part
Bug#700700: approx: never logs cache hits even when $verbose is true
On Thu, Mar 14, 2013 at 08:01:12AM -0400, Eric Cooper wrote: Sorry, I just realized you were asking for cache hit notification when $verbose, but not $debug, is true. Thanks for bearing with me! I'm willing to reconsider that, along with client information in each log message. I'll look into how squid does it and see if that would be appropriate. I am not sure whether the squid log messages are that useful to look into. So I summarize the properties that I find useful about them: * one line per request * fixed set of fields + time of day (syslog already does this) + source (currently only with $debug) + length (absent) + service time (absent, not that useful for approx) + hit/miss (only misses logged atm) + uri (present) Another example of such a log is apache. It has a different format, but the general idea is the same. Using a common format has the additional benefit of being able to reuse existing tools, but likely comes at the cost of no longer being able to use syslog. I am not sure whether this is really worth the effort. As a compromise I'd suggest to keep logging to syslog, but prefix all per-request messages with a common string such that they are easily recognizable (for a log analyzer). Helmut -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#699888: new nss packages fixing cve-2013-1620
On jeu., 2013-03-14 at 22:48 -0400, Michael Gilbert wrote: Hi, I've prepared new nss packages fixing the lucky 13 issue: http://people.debian.org/~mgilbert For the mozilla team, this is a new upstream, so would you be ok with it uploaded as an nmu, or would you like to upload? For the security team, these fixes are so large that I think a backport is likely impossible. Should (can) we attempt to convince the release team to jump from 3.13.6 to 3.14.3 in testing, or is that crazy at this point in the freeze? If not, then what? Manually adding Mike in the loop because of the broken BTS. -- Yves-Alexis signature.asc Description: This is a digitally signed message part
Bug#701649: Fix for stable
On Fri, Mar 15, 2013 at 10:17:29AM +0100, Guido Günther wrote: On Fri, Mar 15, 2013 at 08:15:15AM +0100, Yves-Alexis Perez wrote: On sam., 2013-03-09 at 19:54 +0100, Guido Günther wrote: Hi, sorry for the delay but attached is the diff for the stable update. This addrsses #701649 (CVE-2013-1766) as well as #699224 (kind of CVE-2013-0170). Is this enough for the security team to issue the DSA? Let me know if I can help further. Just a comment. Does the package still need to create/remove the kvm group? Shouldn't only the kvm package do that? I think so. We need to put the user in that group to access /dev/kvm. We could use a trigger but that would certainly be more fragile. What about the permissions on devices (there's something abou tit on the bug report)? Devices will be changed to libvirt-qemu:libvirt-qemu when accessed to make sure the process has the necessary permission. Permissions of disks are currently set to 0600. -- Guido Cheers, -- Guido -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#701649: Fix for stable
On sam., 2013-03-09 at 19:54 +0100, Guido Günther wrote: Hi, sorry for the delay but attached is the diff for the stable update. This addrsses #701649 (CVE-2013-1766) as well as #699224 (kind of CVE-2013-0170). Is this enough for the security team to issue the DSA? Let me know if I can help further. Allright, please upload to security-master, I'll try to prepare and issue a DSA. Regards, -- Yves-Alexis signature.asc Description: This is a digitally signed message part
Bug#701823: installation-report: Encrypted LVM assisted install failed on Lenovo T430s
Hi Gaudenz, On Mon, Mar 11, 2013 at 10:24:17PM +0100, Gaudenz Steinlin wrote: Raphaël Walther raphael.walt...@gmail.com writes: I reproduce the same issue on the same computer with the new motherboard. I tried to encrypt a partition and it failed again at the same step. Can you please post the logs of this attempt. Without any logs it's hard to tell why it failed. The logs you previously posted really look like it's a hardware issue. Maybe it was not the motherboard which is at fault after all. If the logs still contain similar kernel errors like: Unfortunatly, an USB key failed with the logs on it. But when I looked at it, it was the same type of errors. I suggest you also run a comprehensive harddisk test with some testing tool like badblocks from a Live CD or from a testing CD provided by your hardware vendor. Just to be sure that the hardware issue is indeed fixed. I did two tests which were all successful : badblocks -nvs /dev/sda - no bad blocks smartctl -H /dev/sda - PASSED My guess is that SSD disk works properly. At least, it works as long as I don't try to encrypt it (I use the disk on a daily basis). What is the command the installer is using to shred the partion or the disk? Cheers, Raphaël -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#701293: guitarix: ftbfs with GCC-4.8
Hi! On 02/23/2013 12:20 PM, Matthias Klose wrote: Package: src:guitarix What actually happens is: In file included from /usr/include/c++/4.8/ctime:42:0, from /usr/include/boost/date_time/c_time.hpp:17, from /usr/include/boost/date_time/time_clock.hpp:16, from /usr/include/boost/thread/thread_time.hpp:9, from /usr/include/boost/thread/xtime.hpp:14, from test1.cpp:1: /usr/include/boost/thread/xtime.hpp:23:5: error: expected identifier before numeric constant TIME_UTC=1 ^ /usr/include/boost/thread/xtime.hpp:23:5: error: expected '}' before numeric constant /usr/include/boost/thread/xtime.hpp:23:5: error: expected unqualified-id before numeric constant I'm identifying this as #701377. But keeping open this one here for guitarix in case someone notices the same. Marking #701377 as blocking #701293. Thanks, Roland -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#702633: CVE-2012-1016: NULL pointer dereference (DoS) in plugins/preauth/pkinit/pkinit_srv.c
tags 702633 + patch thanks Hello, After checking the source code, this part of the code does not seem to have changed between 1.10.1 and 1.10.4, so AFAIU this bug affects at least the version available in testing and unstable. The current code is: if ((rep9 != NULL rep9-choice == choice_pa_pk_as_rep_draft9_dhSignedData) || (rep != NULL rep-choice == choice_pa_pk_as_rep_dhInfo)) { /* If mutually supported KDFs were found, use the alg agility KDF */ if (rep-u.dh_Info.kdfID) { Thus, rep could be NULL which has been addressed by the following upstream patch: https://github.com/krb5/krb5/commit/cd5ff932c9d1439c961b0cf9ccff979356686aff I also prepared a NMU[0] in case it helps (it builds fine with cowbuilder but I could not test it though) and attached the diff to this email. Cheers, -- Arnaud Fontaine [0] http://people.debian.org/~arnau/packages/krb5/ diff -Nru krb5-1.10.1+dfsg/debian/changelog krb5-1.10.1+dfsg/debian/changelog --- krb5-1.10.1+dfsg/debian/changelog 2013-02-20 10:54:44.0 +0900 +++ krb5-1.10.1+dfsg/debian/changelog 2013-03-15 17:03:05.0 +0900 @@ -1,3 +1,10 @@ +krb5 (1.10.1+dfsg-4.1) unstable; urgency=high + + * Non-maintainer upload. + * KDC null pointer dereference with PKINIT, CVE-2012-1016. Closes: #702633. + + -- Arnaud Fontaine ar...@debian.org Fri, 15 Mar 2013 17:01:29 +0900 + krb5 (1.10.1+dfsg-4) unstable; urgency=high * KDC null pointer dereference with PKINIT, CVE-2013-1415 diff -Nru krb5-1.10.1+dfsg/debian/patches/0022-PKINIT-null-pointer-deref-CVE-2012-1016.patch krb5-1.10.1+dfsg/debian/patches/0022-PKINIT-null-pointer-deref-CVE-2012-1016.patch --- krb5-1.10.1+dfsg/debian/patches/0022-PKINIT-null-pointer-deref-CVE-2012-1016.patch 1970-01-01 09:00:00.0 +0900 +++ krb5-1.10.1+dfsg/debian/patches/0022-PKINIT-null-pointer-deref-CVE-2012-1016.patch 2013-03-15 16:59:56.0 +0900 @@ -0,0 +1,38 @@ +commit cd5ff932c9d1439c961b0cf9ccff979356686aff +Author: Nalin Dahyabhai na...@redhat.com +Date: Thu Dec 13 14:26:07 2012 -0500 + +PKINIT (draft9) null ptr deref [CVE-2012-1016] + +Don't check for an agility KDF identifier in the non-draft9 reply +structure when we're building a draft9 reply, because it'll be NULL. + +The KDC plugin for PKINIT can dereference a null pointer when handling +a draft9 request, leading to a crash of the KDC process. An attacker +would need to have a valid PKINIT certificate, or an unauthenticated +attacker could execute the attack if anonymous PKINIT is enabled. + +CVSSv2 vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:P/RL:O/RC:C + +[t...@mit.edu: reformat comment and edit log message] + +ticket: 7506 (new) +target_version: 1.11 +tags: pullup + +Index: krb5-1.10.1+dfsg/src/plugins/preauth/pkinit/pkinit_srv.c +=== +--- krb5-1.10.1+dfsg.orig/src/plugins/preauth/pkinit/pkinit_srv.c 2013-03-15 16:52:57.703154249 +0900 krb5-1.10.1+dfsg/src/plugins/preauth/pkinit/pkinit_srv.c 2013-03-15 16:58:58.971037553 +0900 +@@ -1016,8 +1016,9 @@ + rep9-choice == choice_pa_pk_as_rep_draft9_dhSignedData) || + (rep != NULL rep-choice == choice_pa_pk_as_rep_dhInfo)) { + +-/* If mutually supported KDFs were found, use the alg agility KDF */ +-if (rep-u.dh_Info.kdfID) { ++/* If we're not doing draft 9, and mutually supported KDFs were found, ++ * use the algorithm agility KDF. */ ++if (rep != NULL rep-u.dh_Info.kdfID) { + secret.data = server_key; + secret.length = server_key_len; + diff -Nru krb5-1.10.1+dfsg/debian/patches/series krb5-1.10.1+dfsg/debian/patches/series --- krb5-1.10.1+dfsg/debian/patches/series 2013-02-20 10:54:44.0 +0900 +++ krb5-1.10.1+dfsg/debian/patches/series 2013-03-15 16:52:26.0 +0900 @@ -19,3 +19,4 @@ upstream/0019-Null-pointer-deref-in-kadmind-CVE-2012-1013.patch 0020-gssapi-never-unload-mechanisms.patch 0021-PKINIT-null-pointer-deref-CVE-2013-1415.patch +0022-PKINIT-null-pointer-deref-CVE-2012-1016.patch
Bug#701951: libecj-java-gcj: Not installable with /var on 9p(non-hdd) filesystem
Hi, Daniel Dickinson said: This appears to be due to a permissions problem of some kind due to use a 9p filesystem rather than native ext4 or the like. Probably fails on nfs too, but I haven't tried that. Or maybe use of extended attributes (not sure 9p supports them or not)? I don't know what the policy is in such a case (best effort? Implement if patch provided?) but according to [1] 9p is not even part of the standard Debian kernel (and I suspect that there might be a reason for this). Cheers, Eric [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696292 -- Eric de France, d'Allemagne et de Navarre -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#702729: valgrind: build on kfreebsd-amd64
On Thu, Mar 14, 2013 at 06:30:43PM +0100, Alessandro Ghedini wrote: I'll have a look as soon as I have some free time. I was also thinking that the patch may be applied only in the kfreebsd builds, so it wouldn't interfere with the linux builds. That sounds great, but I do not yet have the debian expertise to know how to express this in debian/rules (or whereever the appropriate location is) What did you do to see if the build actually works? I ran some very simple (certainly by comparison to iceweasel or libreoffice), non-interactive programs of my own. A simple stress-test for the MemCheck tool would be to run it on firefox/iceaweasel and libreoffice and see what happens. Unfortunately, firefox doesn't work, possibly due to an unimplemented syscall. --51670-- WARNING: unhandled syscall: 330 --51670-- You may be able to write your own handler. --51670-- Read the file README_MISSING_SYSCALL_OR_IOCTL. --51670-- Nevertheless we consider this a bug. Please report --51670-- it at http://valgrind.org/support/bug_reports.html. this is apparently SYS_sched_getscheduler, so its dear neighbor SYS_sched_setscheduler will probably also need implementation. I'll try to devote some time to this item this weekend. Also, does it work on kfreebsd-i386 too? I have not tested this. I suspect it at least has the sysarch(I386_SET_GSBASE) problem in addition to any problems in the amd64 build. I don't have a kfreebsd-i386 installation at the moment, and due to some compile-time bug I encountered, the kfreebsd-amd64 build is 64bitonly. Anyway, as I mentioned on the debian-bsd list the real problem here is not really the patch itself, but finding someone willing to maintain it in the future (at least until it gets merged upstream) since I'm not qualified (nor really interested) in the kfreebsd ports. So would you be willing to continue to maintain the patch in the future? If so you are welcome to push your changes to the collab-maint git repository where valgrind is maintained [0] in a separate branch called, say, kfreebsd (possibily without the d/changelog changes). I have some level of committment to doing software development on debian-kfreebsd, and I find valgrind to be a useful tool. That being the case I have some stake in whether it works or not. I'm not yet a DD so I can't yet do things like push branches onto anonscm.debian.org, but it's becoming clear that I should go ahead and become one. I assume that for the moment it's appropriate to attach any updated patches to this bug report. If that's inappropriate, please let me know. Thanks, Jeff -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#702790: FTBFS: local changes detected
On Thu, 14 Mar 2013 22:22:26 -0700, tony mancill wrote: My line of thought was: d/copyright requires to include the origin of the upstream source, which means that for repacked tarballs a note about what/why/how was changed should be included. [0]- But in this case -- as you say -- it's only a one-time fix, and in order to bring back the pristine tarball. Agreed, it will definitely require explanation. I'll take care of that. Thanks! However, I'm not able get the package to build even the first time (at least not using git-builder). Weird; what errors do you get? So I went back and pulled the original upstream tarball and it appears that the .orig.tag.gz currently in the archive is the result of packing it up after an build (the diff is attached). Sounds plausible. I think probably the course of action most defensible is to start with the clean upstream tarball (obviously renamed) and iron out the FTBFS from there. Ack, sounds like a good idea. (I just wasn't sure where the upstream tarball came from since there is, IIRC, no debian/watch file :)) Cheers, gregor -- .''`. Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06 : :' : Debian GNU/Linux user, admin, and developer - http://www.debian.org/ `. `' Member of VIBE!AT SPI, fellow of the Free Software Foundation Europe `- NP: Rod Stewart: Lost In You signature.asc Description: Digital signature
Bug#702809: Opinion
On 03/13/2013 08:47 PM, Anton Gladky wrote: I think, it is not easy to triage the bug, using only the information, provided in the bugreport. It can be connected with video-drivers or something else. If nobody confirms the same issue, I would suggest to lower the bug's severity. Yes, good idea, since it seems nobody else was affected. I myself did not experience more problems since that day - wonder what was the problem since it happened on two different systems with two different users, but both Wheezy. Best, Juergen. Cheers, Anton signature.asc Description: OpenPGP digital signature
Bug#702734: [nvidia-detect] please move nvidia-detect out of non-free
On 2013-03-13 03:48, Filipus Klutiero wrote: I don't mind the license. I'm just saying if we split nvidia-detect, we'll have to clarify its license. It doesn't have a clear license (which is technically already a small problem) today, but that won't be a problem, as I'll happily license it under any terms requested. I've now added +# Copyright © 2008-2011 Filipus Klutiero chea...@gmail.com +# Copyright © 2011-2013 Andreas Beckmann a...@debian.org and put it under the GPL2+ (as the current packaging is GPL2+, too) So you're saying changing the section requires splitting from n-g-d? I don't think a (binary) package in contrib can be built from a source package in non-free as that is a different archive area I suspected that splitting the source packages would make updates more complicated, although I can't appreciate the cost. Probably have the pciids shipped in some package and have nvidia-detect build-depend on this and just copy the current file. I agree it's fine. I really meant it would be *better* to keep nvidia-detect up-to-date. I'm not sure a backport for nvidia-detect is the intended use. I see backports as appropriate for updates which could introduce breakage. If we do ourselves a risk-free update, I think it should go directly in stable. I don't think this qualifies for a stable update. There is stable-updates for packages that require frequent updates to stay useful in a stable release (e.g. virus scanners, tzdata, ...) without being security updates (that would be stable/updates). Anything else could only go via stable-proposed-updates into the next point release and that should be important or serious bugfixes, not new features. But if we keep updates in backports anyway, then we could at least prepare stable's nvidia-detect to suggest upgrading to backports if the card is unknown (or refer to the wiki's version, or to NVIDIA's website). Hmm, that could be an option for now. + echo Newer driver releases may be available in backports. Andreas -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#702824: calligrasheets: crash when entering double-quotes and some other special characters in formula
tag 702824 confirmed thanks Hi, The bug is corrected for calligra 2.6.1, which will be soon in experimental. Concering wheezy, I will try to have the patch accepted. Regards, Adrien Grellier -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#702862: Assertion `m_pid = 100000' failed
On 03/12/13 13:04, Arnout Engelen wrote: Oops! Do you happen to know what the max PID is at Oracle? On my Oracle servers it says # cat /proc/sys/kernel/pid_max 131072 This is a local configuration setting (independent from Oracle), so on the next host it might be 100. On AIX I saw PIDs = 23003370. I would assume its a signed 32bit integer. Regards Harri -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#702729: valgrind: build on kfreebsd-amd64
On Fri, Mar 15, 2013 at 07:30:11AM -0500, Jeff Epler wrote: On Thu, Mar 14, 2013 at 06:30:43PM +0100, Alessandro Ghedini wrote: I'll have a look as soon as I have some free time. I was also thinking that the patch may be applied only in the kfreebsd builds, so it wouldn't interfere with the linux builds. That sounds great, but I do not yet have the debian expertise to know how to express this in debian/rules (or whereever the appropriate location is) That would be done by calling quilt pop before building on every platform except from kfreebsd-* (or something like that), with the freebsd patch being the last one in the series. But I can take care of this one. Anyway, as I mentioned on the debian-bsd list the real problem here is not really the patch itself, but finding someone willing to maintain it in the future (at least until it gets merged upstream) since I'm not qualified (nor really interested) in the kfreebsd ports. So would you be willing to continue to maintain the patch in the future? If so you are welcome to push your changes to the collab-maint git repository where valgrind is maintained [0] in a separate branch called, say, kfreebsd (possibily without the d/changelog changes). I have some level of committment to doing software development on debian-kfreebsd, and I find valgrind to be a useful tool. That being the case I have some stake in whether it works or not. I'm not yet a DD so I can't yet do things like push branches onto anonscm.debian.org, but it's becoming clear that I should go ahead and become one. I assume that for the moment it's appropriate to attach any updated patches to this bug report. If that's inappropriate, please let me know. No worries, you don't need to be a DD to push to collab-maint repositories (like valgrind's). You just need an acount on alioth.debian.org and request to join collab-maint [0], then I'll sponsor your request (also see [1]). Cheers [0] http://alioth.debian.org/projects/collab-maint/ [1] https://lists.debian.org/debian-devel-announce/2012/01/msg6.html -- perl -E '$_=q;$/= @{[@_]};and s;\S+;inidehG ordnasselA;eg;say~~reverse' signature.asc Description: Digital signature
Bug#702877: Uploaded to unstable; please unblock
Hi release team, Thomas Goirand was so nice to upload the fixed package to unstable. He added a small change to fix building twice in a row, such that the full changelog now reads: [ Mika Pflüger ] * Team upload. * debian/patches/05_ssl.patch: Add upstream patch to force building SSL support with newer MySQL client libraries. Thanks to Eldon Koyle for isolating the fix in the upstream VCS. (Closes: #678169) * Delete now obsolete debian/patches/README.source which referred to dpatch. [ Thomas Goirand ] * Added a debian/rules clean: rm MySQL_python.egg-info/PKG-INFO, so it is possible to build the package twice. The debdiff between the version in testing and stable is attached, it would be very nice if you could unblock it. Cheers, Mika unblock python-mysqldb/1.2.3-2 -- diff -Nru python-mysqldb-1.2.3/debian/changelog python-mysqldb-1.2.3/debian/changelog --- python-mysqldb-1.2.3/debian/changelog 2011-10-18 12:46:05.0 +0200 +++ python-mysqldb-1.2.3/debian/changelog 2013-03-15 07:02:21.0 +0100 @@ -1,3 +1,19 @@ +python-mysqldb (1.2.3-2) unstable; urgency=low + + [ Mika Pflüger ] + * Team upload. + * debian/patches/05_ssl.patch: Add upstream patch to force building +SSL support with newer MySQL client libraries. Thanks to Eldon Koyle +for isolating the fix in the upstream VCS. (Closes: #678169) + * Delete now obsolete debian/patches/README.source which referred to +dpatch. + + [ Thomas Goirand ] + * Added a debian/rules clean: rm MySQL_python.egg-info/PKG-INFO, so it is +possible to build the package twice. + + -- Mika Pflüger deb...@mikapflueger.de Mon, 11 Mar 2013 18:03:06 +0100 + python-mysqldb (1.2.3-1) unstable; urgency=low * Merge with package from Ubuntu, thanks to Mario Limonciello. diff -Nru python-mysqldb-1.2.3/debian/patches/05_ssl.patch python-mysqldb-1.2.3/debian/patches/05_ssl.patch --- python-mysqldb-1.2.3/debian/patches/05_ssl.patch 1970-01-01 01:00:00.0 +0100 +++ python-mysqldb-1.2.3/debian/patches/05_ssl.patch 2013-03-15 06:51:49.0 +0100 @@ -0,0 +1,21 @@ +Description: Force HAVE_OPENSSL if the client library is 5.5 or newer. +Origin: http://sourceforge.net/p/mysql-python/svn/656/tree//branches/MySQLdb-1.2/MySQLdb/_mysql.c?diff=5059d1f5bfc09e26e1a66617:655 +Bug: http://sourceforge.net/p/mysql-python/bugs/323/ +Reviewed-by: Eldon Koyle eko...@gmail.com +Last-Update: 2013-03-11 + +Index: python-mysqldb-argh/_mysql.c +=== +--- python-mysqldb-argh.orig/_mysql.c 2010-06-17 09:21:56.0 +0200 python-mysqldb-argh/_mysql.c 2013-03-11 18:30:38.839269635 +0100 +@@ -102,6 +102,10 @@ + #define check_server_init(x) if (!_mysql_server_init_done) _mysql_server_init_done = 1 + #endif + ++#if MYSQL_VERSION_ID = 50500 ++#define HAVE_OPENSSL 1 ++#endif ++ + PyObject * + _mysql_Exception(_mysql_ConnectionObject *c) + { diff -Nru python-mysqldb-1.2.3/debian/patches/series python-mysqldb-1.2.3/debian/patches/series --- python-mysqldb-1.2.3/debian/patches/series 2011-10-18 11:38:40.0 +0200 +++ python-mysqldb-1.2.3/debian/patches/series 2013-03-15 06:51:49.0 +0100 @@ -1,2 +1,3 @@ 01_converters_boolean.patch 03_converters_set2str.patch +05_ssl.patch diff -Nru python-mysqldb-1.2.3/debian/rules python-mysqldb-1.2.3/debian/rules --- python-mysqldb-1.2.3/debian/rules 2011-10-18 12:53:10.0 +0200 +++ python-mysqldb-1.2.3/debian/rules 2013-03-15 07:02:45.0 +0100 @@ -17,7 +17,7 @@ python$* setup.py clean find . -name *.py[co] -exec rm -f {} \; dh_testroot - rm -fr build build-python$* + rm -fr build build-python$* MySQL_python.egg-info/PKG-INFO dh_clean build: $(PYVERS:%=build-python%) signature.asc Description: PGP signature
Bug#702821: perl/hash_attack.t fails with 5.10.1 + CVE-2013-1667 fix
Steve Hay wrote on 2013-03-14: Niko Tyni wrote on 2013-03-13: On Wed, Mar 13, 2013 at 09:13:15AM -, Steve Hay wrote: Dominic Hargreaves wrote on 2013-03-12: When trying to fix this issue in Debian stable, I found that the patch at http://svn.apache.org/viewvc?view=revisionrevision=1455340 does not stop the test failing when applied to 2.0.4 (as currently found in Debian stable) and built against the current perl package in Debian stable (5.10 + the rehashing fix). I haven't looked at the Debian package, or tried anything with mod_perl-2.0.4, but I've just checked out origin/maint-5.10 from the Perl git repo (in fact, I took the snapshot at http://perl5.git.perl.org/perl.git/snapshot/f14269908e5f8b4cab4b55643d 7d d9de577e7918.tar.gz) and tried that with Apache 2.2.22 and mod_perl from trunk and the tests all pass for me... (This is on Windows 7 x64 with VC++ 2010.) Thanks for checking. FWIW, I can reproduce the failure with the Debian perl 5.10.1 package and mod_perl2 2.0.7 with just the above test fix. So it doesn't seem to be a Debian change that breaks it. Maybe -Dusethreads or something like that. I'll keep looking and send an update when I know more. The perl I built and tested with was made with ithreads enabled. There is an alternative patch to fix this test, submitted to mod_perl's rt.cpan.org queue after I'd applied the patch from the perl5-security queue on rt.perl.org: https://rt.cpan.org/Ticket/Display.html?id=83916 I haven't tried it myself yet, but is that any better for you? Zefram has now come up with an even better patch (on the same RT ticket), after reproducing the Debian 5.10.1 failure himself. Please take a look (I've also attached it here for your convenience) and let me know whether this works for you. If so then I hope to apply it to SVN over the weekend. hattack_synthesis.patch Description: hattack_synthesis.patch
Bug#702908: PTS: upload signature parsing patch
Paul, On 03/15/2013 03:02 AM, Paul Wise wrote: I would have done this: [2012-05-10] Accepted 1.0-6 in unstable (low) (Markus Wanner, signed by Ludovic Brenta) Looks better, agreed. [2012-05-10] Accepted 1.0-6 in unstable (low) (Markus Wanner, signed by someone else) That's utterly misleading in case someone else is Markus Wanner. The point is, the existence of a signature is not an indication of sponsorship. We really need to have the pubkey of the signer to be able to distinguish between proper self-signed and sponsored uploads. What we can do is distinguish three cases, i.e. (just to stick with the example above): In case we have the pubkey and its UID matches ChangedBy: ..in unstable (low) (Markus Wanner) (This would imply a signature of myself, i.e. no sponsorship.) In case we have the pubkey and its UID does not match ChangedBy: ..in unstable (low) (Markus Wanner, signed by Ludovic Brenta) In case we do not know the pubkey: ..in unstable (low) (Markus Wanner, unknown signature) (This doesn't imply anything about sponsorship. It could still be a valid signature of mine, or of a sponsor, PTS just cannot tell.) It could be sponsorship or co-maintainence, maybe the signer made some changes and put their name in the changelog too. Exactly, so let's keep with signed by rather than trying to identify what exactly we call sponsorship and what not. As these scripts seem to be called from cron, does a simple `print WARNING...` do the trick of notifying the admin about a missing public key? (Or failure to retrieve from the keyserver or some such.) That will notify the folks listed here: http://anonscm.debian.org/viewvc/qa/trunk/data/cronjobs/crontab.head?view=markup Sounds like a notification on stderr about missing pubkeys could do the trick. Regards Markus Wanner signature.asc Description: OpenPGP digital signature
Bug#702965: procps: ps dies with SIGSEGV on kernels 3.2.29 and lots of supplementary groups
On Fri, Mar 15, 2013 at 09:50:02AM +, Karl E. Jorgensen wrote: I may be misreading you here, but I don't think this is a buffer overflow. As far as I can see, file2str() does not fill the buffer beyond the boundary, but the problem lies in the subsequent code which assumes that the entire contents of the file is available in the buffer - in the loop around readproc.c:293 Sorry I meant more that the stuff needed was bigger than the buffer, not the traditional meaning for buffer overflow (as in the program writes beyond the buffer size). I have come to realise that readproc.c makes LOTS of assumptions about the contents of /proc/$pid/status - if the kernel decides to miss a space somewhere, turn spaces into tabs (or vice versa), the whole thing collapses, possibly accompanied by noises like SIGSEGV and similar. It does, but then its been around for decades and is usually ok, until they change their mind again. Then I heard of procps-ng, decided to investigate it further... and life got in the way :-S procps-ng has greatly reduced the number of patches I've and the other distributions have had to carry. - Craig -- Craig Small VK2XLZ http://enc.com.au/ csmall at : enc.com.au Debian GNU/Linux http://www.debian.org/ csmall at : debian.org GPG fingerprint: 5D2F B320 B825 D939 04D2 0519 3938 F96B DF50 FEA5 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703053: lastmp: switch from python-libmpdclient to python-mpd
Control: tags -1 + patch On Thu, Mar 14, 2013 at 06:22:37PM +0100, Helmut Grohne wrote: The lastmp package is using the python-libmpdclient (mpdclient2) module. This library has been abandoned upstream[1] in favour of python-mpd. Would it be possible to switch this tool over to the other library? I attached a patch for this. Note that this patch is based on the library documentation and completely untested (due to the lack of a last.fm account). Could anyone test the patch and report back a result to me and this bug? The patch applies to the lastmp python script and you will have to install python-mpd to make it work. Thanks Helmut --- lastmp 2010-04-19 03:41:31.0 +0200 +++ lastmp.new 2013-03-15 09:48:42.0 +0100 @@ -5,8 +5,9 @@ import time import getopt import signal +import socket -import mpdclient2 +import mpd import lastfm import lastfm.client import lastfm.config @@ -26,11 +27,11 @@ class Song: def __init__(self, sobj): -self.artist = getattr(sobj, 'artist', '') -self.title = getattr(sobj, 'title', '') -self.album = getattr(sobj, 'album', '') -self.length = int(getattr(sobj, 'time', 0)) -self.file = getattr(sobj, 'file', '') +self.artist = sobj.get('artist', '') +self.title = sobj.get('title', '') +self.album = sobj.get('album', '') +self.length = int(sobj.get('time', 0)) +self.file = sobj.get('file', '') def __eq__(self, other): if other == None: @@ -64,6 +65,13 @@ else: return d +def mpd_connect(mpd_args): +mpd = mpd.MPDClient() +mpd.connect(mpd_args[host], mpd_args[port]) +if mpd_args[password]: +mpd.password(mpd_args[password]) +return mpd + class MPDMonitor: def __init__(self, cli): self.cli = cli @@ -74,25 +82,25 @@ self.mpd = None def wake(self): -status = self.mpd.do.status() -song = Song(self.mpd.do.currentsong()) +status = self.mpd.status() +song = Song(self.mpd.currentsong()) -if not hasattr(status, 'state'): +if 'state' not in status: raise MPDAuthError -if not self.prevstatus or status.state != self.prevstatus.state: -self.cli.log.debug('Changed state: %s' % status.state) +if not self.prevstatus or status[state] != self.prevstatus[state]: +self.cli.log.debug('Changed state: %s' % status[state]) -if status.state in ('play', 'pause'): -pos, length = map(float, status.time.split(':')) +if status[state] in ('play', 'pause'): +pos, length = map(float, status[time].split(':')) if length == 0: length = lastfm.MAX_LEN -if status.state == 'play': +if status[state] == 'play': if song != self.prevsong or \ -self.prevstatus.state == 'stop': +self.prevstatus[state] == 'stop': self.cli.log.info(u'New song: %s' % song) if (self.prevsong and pos self.sleep + -FUZZ + int(status.xfade)) or \ +FUZZ + int(status[xfade])) or \ (self.prevsong is None and pos/length lastfm.SUB_PERCENT or pos lastfm.SUB_SECONDS): @@ -141,7 +149,7 @@ while True: try: if not self.mpd: -self.mpd = mpdclient2.connect(**self.mpd_args) +self.mpd = mpd_connect(self.mpd_args) self.cli.log.info('Connected to MPD') self.prevstatus = None self.prevsong = None @@ -151,12 +159,12 @@ self.played_enough = False if self.mpd: self.wake() -except (EOFError, mpdclient2.socket.error): +except (EOFError, socket.error): if not failed: self.cli.log.error(Can't connect or lost connection to MPD) self.mpd = None failed = True -except MPDAuthError: +except (MPDAuthError, mpd.CommandError): if not failed: self.cli.log.error(Can't read info from MPD (bad password?)) failed = True
Bug#703050: www.debian.org: Please document the criteria for debian.net services to be integrated into debian.org
Hi Sebastian, On Fri, Mar 15, 2013 at 03:41:40AM +0100, Sebastian Harl wrote [edited]: On Thu, Mar 14, 2013 at 05:08:29PM +0100, Serafeim Zanikolas wrote: Some debian.net services would serve their purpose better if they were integrated into the www.d.o namespace, but the criteria for deciding which services would qualify is not documented. I don't think that it makes sense to write down any such list of criteria. Imho, this needs to be a case-by-case decision and the exact criteria greatly depend on what kind of service is offered. E.g., in the [..] I agree that there can't be an exhaustive and general-enough list of such criteria. Having said that, it would be useful to set some broad expectations on what it takes for a d.n service to graduate to an official one. Even some generic guidelines would have the benefit of informing developers at the beginning of a developing a service (eg. likelihood of support of certain technical choices), and could later on be the starting point of a discussion of promoting that service to an official one. cheers, sez -- Every great idea is worthless without someone to do the work. --Neil Williams -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703076: Missing argument in calls to amitk_color_table_menu_new
Hi Andy, due to some QA checks in Debian the Amide package received a bug report which I would like to inform you about. I admit we are lagging behind your latest upstream version (because of Debian freeze for the next release we hesitate to introduce other versions than currently beeing in freeze) and the problem might be fixed or not but I would like to make you aware of it in any case. It would be great if you could issue some statement like - Is fixed in 1.0.4 or - Will be fixed in 1.0.5 or - Please be more verbose / provide a patch or - Something else Kind regards and thanks for providing Amide as Free Software Andreas. On Thu, Mar 14, 2013 at 11:33:16PM +, Michael Tautschnig wrote: Package: amide Version: 1.0.1-1 Usertags: goto-cc Building and type-checking the linked results using our research compiler infrastructure showed the following wrong uses of amitk_color_table_menu_new: ./src/amitk_threshold.c:threshold-color_table_menu[i_view_mode] = amitk_color_table_menu_new(); ./src/ui_preferences_dialog.c:menu = amitk_color_table_menu_new(); ./src/ui_render_dialog.c:menu = amitk_color_table_menu_new(); This conflicts with the actual definition of amitk_color_table_menu_new: ./src/amitk_color_table_menu.c:GtkWidget * amitk_color_table_menu_new(AmitkColorTable color_table) { The result will necessarily cause a stack underflow, with entirely undefined consequences (for any application with elevated privileges this is a possibly security issue). Best, Michael PS.: It may be wise to also adjust the declaration of amitk_color_table_menu_new: ./src/amitk_color_table_menu.h:GtkWidget*amitk_color_table_menu_new (); (but this is actually entirely covered by the C standard and not necessarily a bug - it just stops the compiler from producing proper diagnostics). ___ Debian-med-packaging mailing list debian-med-packag...@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/debian-med-packaging -- http://fam-tille.de -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703111: ITP: taopm -- Software package for sound synthesis with physical models
Package: wnpp Severity: wishlist Owner: Tiago B. Vaz ti...@debian.org * Package name: taopm Version : 1.0 Upstream Author : Mark Pearson m.pear...@ukonline.co.uk * URL : http://taopm.sourceforge.net * License : GPL Programming Lang: C++ Description : Software package for sound synthesis with physical models Tao is a software package for sound synthesis using physical models. It provides a virtual acoustic material constructed from masses and springs which can be used as the basis for building quite complex virtual musical instruments. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703112: enigmail 1.4.1-2 not decrypting mails/verifying sigs with Icedove 10.0.12-1
Package: enigmail Version: 2:1.4.1-2 Severity: important Hi, I recently moved from i386 to amd64, and since then I can't decrypt/verify mails with enigmail/icedove. Debug output is: 2013-03-15 08:18:20.094 [DEBUG] enigmailMessengerOverlay.js: messageFrameUnload 2013-03-15 08:18:20.094 [DEBUG] enigmailMessengerOverlay.js: messageCleanup 2013-03-15 08:18:20.094 [DEBUG] enigmailMessengerOverlay.js: setAttachmentReveal 2013-03-15 08:18:20.094 [DEBUG] enigmailMsgHdrViewOverlay.js: this.messageUnload 2013-03-15 08:18:20.096 [DEBUG] enigmailMsgHdrViewOverlay.js: _listener_onStartHeaders 2013-03-15 08:18:20.096 [DEBUG] enigmailCommon.jsm: getFrame: name=messagepane 2013-03-15 08:18:20.096 [DEBUG] enigmailMsgHdrViewOverlay.js: msgFrame=[object Window] 2013-03-15 08:18:20.096 [DEBUG] enigmailMsgHdrViewOverlay.js: enigmailPrepSecurityInfo 2013-03-15 08:18:20.107 [DEBUG] enigmailMsgHdrViewOverlay.js: _listener_onEndHeaders 2013-03-15 08:18:20.112 [DEBUG] enigmailMessengerOverlay.js: messageDecrypt: [object Event] 2013-03-15 08:18:20.114 [DEBUG] enigmailCommon.jsm: dispatchEvent f= 2013-03-15 08:18:20.115 [DEBUG] enigmailCommon.jsm: dispatchEvent running mainEvent 2013-03-15 08:18:20.115 [DEBUG] enigmailMessengerOverlay.js: messageDecryptCb: 2013-03-15 08:18:20.115 [DEBUG] enigmailMessengerOverlay.js: header content-type: multipart/encrypted; boundary=--=_1363330633-19056-2; protocol=application/pgp-encrypted 2013-03-15 08:18:20.115 [DEBUG] enigmailMessengerOverlay.js: header content-transfer-encoding: 2013-03-15 08:18:20.115 [DEBUG] enigmailMessengerOverlay.js: header x-enigmail-version: 2013-03-15 08:18:20.115 [DEBUG] enigmailMessengerOverlay.js: header x-pgp-encoding-format: 2013-03-15 08:18:20.115 [DEBUG] enumerateMimeParts: - multipart/encrypted; boundary=--=_1363330633-19056-2; protocol=application/pgp-encrypted 2013-03-15 08:18:20.115 [DEBUG] enumerateMimeParts: 1 - multipart/encrypted; boundary=--=_1363330633-19056-2; protocol=application/pgp-encrypted 2013-03-15 08:18:20.115 [DEBUG] enumerateMimeParts: 1.1 - application/pgp-encrypted 2013-03-15 08:18:20.115 [DEBUG] enumerateMimeParts: 1.2 - application/octet-stream 2013-03-15 08:18:20.115 [DEBUG] enigmailMessengerOverlay.js: embedded objects: 1.1 / 2013-03-15 08:18:20.115 [ERROR] enigmailMessengerOverlay.js: messageDecryptCb: caught exception: TypeError Message: 'Cc[NS_ENIGMIMESERVICE_CONTRACTID] is undefined' File: file:///usr/lib/mozilla/extensions/%7B3550f703-e582-4d05-9a08-453d09bdfdc6%7D/%7B847b3a00-7ab1-11d4-8f02-006008948af5%7D/components/enigmail.js Line:759 Stack: ()@file:///usr/lib/mozilla/extensions/%7B3550f703-e582-4d05-9a08-453d09bdfdc6%7D/%7B847b3a00-7ab1-11d4-8f02-006008948af5%7D/components/enigmail.js:759 ([object Event],true,[object Object])@chrome://enigmail/content/enigmailMessengerOverlay.js:654 ([object Array])@chrome://enigmail/content/enigmailMessengerOverlay.js:504 ()@resource://enigmail/enigmailCommon.jsm:1207 This looks like bug# 671928, yet the enigmail/icedove versions should be compatible (enigmail 1.4.1-2, Icedove 10). Reinstalling both packages doesn't change anything. Marked important because having to save each message and decrypting it on the command line is rather making enigmail useless ;) Please advise. Kind regards, Robert Waldner -- System Information: Debian Release: 7.0 APT prefers testing APT policy: (990, 'testing'), (500, 'testing-proposed-updates'), (500, 'unstable'), (500, 'stable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.8-trunk-amd64 (SMP w/8 CPU cores) Locale: LANG=en_US.ISO-8859-15, LC_CTYPE=en_US.ISO-8859-15 (charmap=ISO-8859-15) Shell: /bin/sh linked to /bin/dash Versions of packages enigmail depends on: ii gnupg1.4.12-7 ii iceape 2.7.12-1 ii icedove 10.0.12-1 ii libc62.13-38 ii libgcc1 1:4.7.2-5 ii libnspr4-0d 2:4.9.5-1 ii libstdc++6 4.7.2-5 enigmail recommends no packages. enigmail suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703113: libsasl2-modules-gssapi-mit: Java client GSSAPI connections to OpenLDAP fail
Package: libsasl2-modules-gssapi-mit Version: 2.1.25.dfsg1-6 Severity: important Dear Maintainer, We are starting the process of upgrading our LDAP service to OpenLDAP 2.4.34 on wheezy. None of the Java applications that we have tested can connect to the LDAP server using GSSAPI. In the server log we see: % grep conn=142291 /var/log/ldap Mar 15 01:12:36 ldap-dev2 slapd[22102]: conn=142291 fd=16 ACCEPT from IP=171.64.19.165:44175 (IP=0.0.0.0:389) Mar 15 01:12:36 ldap-dev2 slapd[22102]: conn=142291 op=0 BIND dn= method=163 Mar 15 01:12:36 ldap-dev2 slapd[22102]: conn=142291 op=0 RESULT tag=97 err=14 text=SASL(0): successful result: Mar 15 01:12:36 ldap-dev2 slapd[22102]: conn=142291 op=1 BIND dn= method=163 Mar 15 01:12:36 ldap-dev2 slapd[22102]: conn=142291 op=1 BIND authcid=w...@stanford.edu authzid=w...@stanford.edu Mar 15 01:12:36 ldap-dev2 slapd[22102]: conn=142291 op=1 BIND dn=uid=whm,cn=accounts,dc=stanford,dc=edu mech=GSSAPI sasl_ssf=56 ssf=56 Mar 15 01:12:36 ldap-dev2 slapd[22102]: conn=142291 op=1 RESULT tag=97 err=0 text= Mar 15 01:12:36 ldap-dev2 slapd[22102]: conn=142291 fd=16 closed (connection lost) The client failure traceback from a small test program is on Java 1.7.0_03 is: Exception in thread main java.lang.NegativeArraySizeException at sun.security.jgss.krb5.CipherHelper.aes256Encrypt(CipherHelper.java:1367) at sun.security.jgss.krb5.CipherHelper.encryptData(CipherHelper.java:722) at sun.security.jgss.krb5.WrapToken_v2.init(WrapToken_v2.java:200) at sun.security.jgss.krb5.Krb5Context.wrap(Krb5Context.java:851) at sun.security.jgss.GSSContextImpl.wrap(GSSContextImpl.java:385) at com.sun.security.sasl.gsskerb.GssKrb5Base.wrap(GssKrb5Base.java:103) at com.sun.jndi.ldap.sasl.SaslOutputStream.write(SaslOutputStream.java:89) at com.sun.jndi.ldap.Connection.writeRequest(Connection.java:414) at com.sun.jndi.ldap.LdapClient.search(LdapClient.java:547) at com.sun.jndi.ldap.LdapCtx.doSearch(LdapCtx.java:1985) at com.sun.jndi.ldap.LdapCtx.searchAux(LdapCtx.java:1847) at com.sun.jndi.ldap.LdapCtx.c_search(LdapCtx.java:1772) at com.sun.jndi.toolkit.ctx.ComponentDirContext.p_search(ComponentDirContext.java:386) at com.sun.jndi.toolkit.ctx.PartialCompositeDirContext.search(PartialCompositeDirContext.java:356) at com.sun.jndi.toolkit.ctx.PartialCompositeDirContext.search(PartialCompositeDirContext.java:339) at javax.naming.directory.InitialDirContext.search(InitialDirContext.java:267) at TestPersonQuery.performJndiOperation(TestLDAP.java:109) at TestPersonQuery.run(TestLDAP.java:80) at java.security.AccessController.doPrivileged(Native Method) at javax.security.auth.Subject.doAs(Subject.java:356) at TestLDAP.main(TestLDAP.java:53) The failure from Apache Directory Studio on Java 1.6.0_27 is slightly different: java.lang.ArrayIndexOutOfBoundsException: 9 at sun.security.jgss.krb5.WrapToken.getPadding(WrapToken.java:395) at sun.security.jgss.krb5.WrapToken.init(WrapToken.java:406) at sun.security.jgss.krb5.Krb5Context.wrap(Krb5Context.java:826) at sun.security.jgss.GSSContextImpl.wrap(GSSContextImpl.java:384) at com.sun.security.sasl.gsskerb.GssKrb5Base.wrap(GssKrb5Base.java:103) at com.sun.jndi.ldap.sasl.SaslOutputStream.write(SaslOutputStream.java:89) at com.sun.jndi.ldap.Connection.writeRequest(Connection.java:408) at com.sun.jndi.ldap.Connection.writeRequest(Connection.java:383) at com.sun.jndi.ldap.LdapClient.search(LdapClient.java:546) at com.sun.jndi.ldap.LdapCtx.doSearch(LdapCtx.java:1975) at com.sun.jndi.ldap.LdapCtx.searchAux(LdapCtx.java:1837) at com.sun.jndi.ldap.LdapCtx.c_search(LdapCtx.java:1762) at com.sun.jndi.toolkit.ctx.ComponentDirContext.p_search(ComponentDirContext.java:386) at com.sun.jndi.toolkit.ctx.PartialCompositeDirContext.search(PartialCompositeDirContext.java:356) at org.apache.directory.studio.connection.core.io.jndi.JNDIConnectionWrapper$1.run(JNDIConnectionWrapper.java:356) at org.apache.directory.studio.connection.core.io.jndi.JNDIConnectionWrapper.runAndMonitor(JNDIConnectionWrapper.java:1272) at org.apache.directory.studio.connection.core.io.jndi.JNDIConnectionWrapper.checkConnectionAndRunAndMonitor(JNDIConnectionWrapper.java:1203) at org.apache.directory.studio.connection.core.io.jndi.JNDIConnectionWrapper.search(JNDIConnectionWrapper.java:398) at org.apache.directory.studio.ldapbrowser.core.jobs.SearchRunnable.search(SearchRunnable.java:500) at org.apache.directory.studio.ldapbrowser.core.jobs.ReloadSchemaRunnable.getSchemaLocation(ReloadSchemaRunnable.java:266) at org.apache.directory.studio.ldapbrowser.core.jobs.ReloadSchemaRunnable.reloadSchema(ReloadSchemaRunnable.java:147) at org.apache.directory.studio.ldapbrowser.core.BrowserConnectionListener.openBrowserConnection(BrowserConnectionListener.java:115) at
Bug#703114: unblock: debian-edu-archive-keyring/2013.03.15
package: release.debian.org x-debbugs-cc: debian-...@lists.debian.org, debian-b...@lists.debian.org Hi, please unblock debian-edu-archive-keyring/2013.03.15, which set's the the expiration date for the debian-edu-archive key to 2019. The key in the package currently in wheezy has an expiration date of 2014-02-20 which will obviously cause problems as this is during wheezys lifetime. It also contains an udeb, thus cc: to debian-boot@, even though it's not used by d-i in Debian. Regarding the bump to an old standard version: this was already in svn from when I last looked at this package in 2010, so I kept it, as I knew I confirmed back then that it conforms to that standard version and more importantly as the removals from Steffen and Zobel from uploaders is a sensible change for this upload, so you would review the tiny changes in debian/control anyway. $ debdiff debian-edu-archive-keyring_2010.01.05.dsc debian-edu-archive-keyring_2013.03.15.dsc diff -Nru debian-edu-archive-keyring-2010.01.05/debian/changelog debian-edu-archive-keyring-2013.03.15/debian/changelog --- debian-edu-archive-keyring-2010.01.05/debian/changelog 2010-01-05 04:55:37.0 -0800 +++ debian-edu-archive-keyring-2013.03.15/debian/changelog 2013-03-15 12:09:21.0 -0700 @@ -1,3 +1,13 @@ +debian-edu-archive-keyring (2013.03.15) unstable; urgency=low + + * Include an updated version of debian-edu-archive-keyring.gpg with an +expiration date for A26FF456 set to 2019. (Closes: #695726) + * Remove Martin Zobel-Helas and Steffen Joeris from uploaders, thanks for +your work on this package, Martin and Steffen! + * Bump standards version to 3.8.4, no changes needed. + + -- Holger Levsen hol...@debian.org Fri, 15 Mar 2013 12:03:40 -0700 + debian-edu-archive-keyring (2010.01.05) unstable; urgency=low * Add depends to apt as apt-key is being used in postinst. diff -Nru debian-edu-archive-keyring-2010.01.05/debian/control debian-edu-archive-keyring-2013.03.15/debian/control --- debian-edu-archive-keyring-2010.01.05/debian/control2010-01-05 04:51:37.0 -0800 +++ debian-edu-archive-keyring-2013.03.15/debian/control2013-03-15 11:58:30.0 -0700 @@ -4,10 +4,8 @@ Maintainer: Debian Edu Developers debian-...@lists.debian.org Uploaders: Holger Levsen hol...@debian.org, Morten Werner Olsen wer...@debian.org, - Steffen Joeris wh...@debian.org, - Martin Zobel-Helas zo...@ftbfs.de, Petter Reinholdtsen p...@debian.org -Standards-Version: 3.8.3 +Standards-Version: 3.8.4 Package: debian-edu-archive-keyring Architecture: all Binary files /tmp/_Hj4wp9uuX/debian-edu-archive-keyring-2010.01.05/keyrings/debian-edu-archive-keyring.gpg and /tmp/8yUJPArv7q/debian-edu-archive-keyring-2013.03.15/keyrings/debian-edu- archive-keyring.gpg differ keyrings/debian-edu-archive-keyring.gpg is a valid gpg keyring file and contains the bit we want. cheers, Holger -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#631366: [Pkg-nagios-devel] Bug#631366: include progress logo
On Fri, 15 Mar 2013, Daniel Baumann wrote: tag 631366 patch thanks On 03/15/2013 08:43 AM, Alexander Wirt wrote: http://vcs.progress-linux.org/?p=packages/nagios-images.git;a=commitdiff;h=44b4335bb976ea097d8abb5d62e977dabb48d406 Unfortunatly that link is borken. http://sources.progress-linux.org/gitweb/?p=releases/baureo/packages/nagios-images.git;a=commitdiff;h=4f54a47fe76bdf9bb6dbb94e2821c570c75a819d This is a patch and no images. -- Address:Daniel Baumann, Donnerbuehlweg 3, CH-3012 Bern Email: daniel.baum...@progress-technologies.net Internet: http://people.progress-technologies.net/~daniel.baumann/ ___ Pkg-nagios-devel mailing list pkg-nagios-de...@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-nagios-devel -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#581999: rinputd: fails to install
Here is an update of my patch, with randomly generated passord as suggested by vagrand. -Ralf. diff -ur rinputd-1.0.5.old/debian/changelog rinputd-1.0.5/debian/changelog --- rinputd-1.0.5.old/debian/changelog 2012-04-12 20:20:15.0 +0200 +++ rinputd-1.0.5/debian/changelog 2013-03-15 17:33:19.0 +0100 @@ -1,3 +1,9 @@ +rinputd (1.0.5-3) unstable; urgency=low + + * NMU to fix RC bug in wheezy. + + -- Ralf Treinen trei...@debian.org Fri, 15 Mar 2013 17:33:19 +0100 + rinputd (1.0.5-2) unstable; urgency=low * Convert from CDBS to debhelper diff -ur rinputd-1.0.5.old/debian/config rinputd-1.0.5/debian/config --- rinputd-1.0.5.old/debian/config 2012-04-12 20:06:14.0 +0200 +++ rinputd-1.0.5/debian/config 2013-03-15 17:44:54.0 +0100 @@ -2,8 +2,6 @@ set -e -[ `echo $DEBIAN_FRONTEND | tr '[:upper:]' '[:lower:]'` = noninteractive ] exit 0 - . /usr/share/debconf/confmodule db_beginblock @@ -13,6 +11,10 @@ db_go +# initialisation of USER and PASS needed in the non-interactive case +USER=rinputd +PASS=`openssl rand -base64 8` + db_get rinputd/username USER=$RET db_get rinputd/passwd diff -ur rinputd-1.0.5.old/debian/rinputd.postinst rinputd-1.0.5/debian/rinputd.postinst --- rinputd-1.0.5.old/debian/rinputd.postinst 2012-04-04 06:33:44.0 +0200 +++ rinputd-1.0.5/debian/rinputd.postinst 2013-03-15 18:38:50.0 +0100 @@ -24,14 +24,13 @@ echo Done fi -if [ `echo $DEBIAN_FRONTEND | tr '[:upper:]' '[:lower:]'` != noninteractive ]; then -db_get rinputd/username -USER=$RET -db_get rinputd/passwd -PASS=$RET + +db_get rinputd/username +USER=$RET +db_get rinputd/passwd +PASS=$RET -echo $PASS | saslpasswd2 -p -c -u rinput $USER -fi +echo $PASS | saslpasswd2 -p -c -u rinput $USER fi #DEBHELPER#
Bug#693591: Fwd: Re: flashplugin-nonfree: weird upgrade problem with apper
Message came back, resending to the bts. Paul Original Message Subject: Re: flashplugin-nonfree: weird upgrade problem with apper Date: Fri, 15 Mar 2013 07:16:07 +0100 From: Paul Gevers elb...@debian.org To: 693...@bugs.debian.org CC: Matthias Klumpp matth...@tenstral.net On 15-03-13 05:11, Bart Martens wrote: News on this bug ? More info from debugging ? Maybe it's time to ask help from Matthias Klumpp (maintains apper in Debian). My latest info is in the bug. I mentioned to you already earlier that I think the bug is in apper, so I my idea was: reassign. Paul signature.asc Description: OpenPGP digital signature
Bug#697676: Re: Bug#697676: lvm2: cLVM binary package is missing
On 03/03/13 13:57, Vitaly Pashkov wrote: On Thu, 2013-02-28 at 10:08 +0100, Bastian Blank wrote: popcon showed exactly _zero_ installations. Probably a popcon bug or something, which is a different question. We are using clvm in 2 clusters currently and all of the nodes in it have popcon enabled. clvm works fine for us. I think here are the correct popcon stats, around 360 installations: http://qa.debian.org/popcon-graph.php?packages=clvm Regards, -- Steven Chamberlain ste...@pyro.eu.org -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#700581: chromium-browser: Adobe flashplugin-nonfree usage spawns: XID collision trouble ahead errors to console
reassign 700581 chromium-browser found 700581 6.0.472.63~r59945-5+squeeze6 severity 700581 important tags 700581 - upstream wontfix stop (The above changes are restoring the initial settings. Feel free to change further as you see fit.) On Thu, Mar 14, 2013 at 10:00:06PM -0700, Jonathan Nieder wrote: Hi, Bart Martens wrote: If this is caused by the Adobe Flash Player (which version?) then please report this to Adobe, not to Debian. Anyhow, I don't think I can do anything about this in the flashplugin-nonfree Debian package. [...] I intend to close this bug soon. If you want to reassign this bug to elsewhere, then now would be a good time. Sorry I missed your message before. No problem at all. I don't know if this is caused by Adobe Flash player or something else. Then I guess you don't mind that I revert the reassignment. Possibly related bugs: #691410 2012-10-25 iceape: crashes with Gdk-WARNING **: XID collision, trouble ahead #574725 2010-03-20 iceweasel: Gdk warning: XID collision, trouble ahead That sounds like good info for further processing. Please deal with this report as you wish, I'm restoring the initial settings of this bug. for example by letting the reporter know how to report it to Adobe That can be found on Adobe's website. or by merging with one of the other bugs That can be found on the Debian website. if they seem to have the same cause. That I don't know. Regards, Bart Martens -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#660826: RFP: Elasticsearch -- Distributed, RESTful, Search Engine built on top of Apache Lucene
Hi Apollon, Sorry, I didn't have the time to make any progress on this. But any kind of help will definitely welcome :) Best regards, Radu 2013/3/14 Apollon Oikonomopoulos apoi...@gmail.com Hi Radu, Nick, Any news on this? We're also making heavy use of elasticsearch in our main service and would be glad to help package/maintain it properly. Regards, Apollon
Bug#700822: Misdetects Nexus 10 as Nexus 4
Package: mtp-tools Followup-For: Bug #700822 $ mtp-files libmtp version: 1.1.3 Device 0 (VID=18d1 and PID=4ee1) is a Google Inc (for LG Electronics) Nexus 4. â‹® Except that the device is a Nexus 10, not a Nexus 4 (and Samsung, not LG). The version in experimental instead says its a: Device 0 (VID=18d1 and PID=4ee1) is a Google Inc (for LG Electronics/Samsung) Nexus 4/10 (MTP). so I guess they must have used the same product ID... -- System Information: Debian Release: 7.0 APT prefers testing APT policy: (500, 'testing'), (150, 'unstable'), (125, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.8-trunk-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages mtp-tools depends on: ii libc62.13-38 ii libmtp9 1.1.3-35-g0ece104-5 mtp-tools recommends no packages. mtp-tools suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#701649: Fix for stable
On sam., 2013-03-09 at 19:54 +0100, Guido Günther wrote: Hi, sorry for the delay but attached is the diff for the stable update. This addrsses #701649 (CVE-2013-1766) as well as #699224 (kind of CVE-2013-0170). Is this enough for the security team to issue the DSA? Let me know if I can help further. Cheers, -- Guido Ok, I have two more questions: - what is http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701649#43 really about? Does libvirt changes permissions on files added to the storage pool or something? - in http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701649#48 waldi seems to prefer the disks group, but I don't think any other comment replying to that. Could you elaborate about this? Regards, -- Yves-Alexis signature.asc Description: This is a digitally signed message part
Bug#701649: Fix for stable
On Fri, Mar 15, 2013 at 10:40:12AM +0100, Yves-Alexis Perez wrote: On sam., 2013-03-09 at 19:54 +0100, Guido Günther wrote: Hi, sorry for the delay but attached is the diff for the stable update. This addrsses #701649 (CVE-2013-1766) as well as #699224 (kind of CVE-2013-0170). Is this enough for the security team to issue the DSA? Let me know if I can help further. Cheers, -- Guido Ok, I have two more questions: - what is http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701649#43 really about? Does libvirt changes permissions on files added to the storage pool or something? When using qemu:///system (that is running qemu via the system libvirtd instead of the user's session libvirtd) and dynamic_ownership = 1 (the default) libvirtd changes permissions of devices and files it needs to open to libvirt-qemu:libvirt-qemu since it runs the qemu/kvm process itself with these privileges. Before the change this used to be libvirt-qemu:kvm. - in http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701649#48 waldi seems to prefer the disks group, but I don't think any other comment replying to that. Could you elaborate about this? This is just not how dynamic ownership works. It consistently uses the above for all devices accessed by the qemu process. Cheers, -- Guido Regards, -- Yves-Alexis -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#702625: closed by Ben Hutchings b...@decadent.org.uk (Re: Bug#702625: linux-source-3.2: Custom kernel built from Debian source gives a package with huge size)
Hello Ben, Thanks for your explanation :-) You could perhaps add a note in the Debian Kernel handbook about this point ? regards, Fred. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#701649: Fix for stable
On sam., 2013-03-09 at 19:54 +0100, Guido Günther wrote: Hi, sorry for the delay but attached is the diff for the stable update. This addrsses #701649 (CVE-2013-1766) as well as #699224 (kind of CVE-2013-0170). Is this enough for the security team to issue the DSA? Let me know if I can help further. Just a comment. Does the package still need to create/remove the kvm group? Shouldn't only the kvm package do that? What about the permissions on devices (there's something abou tit on the bug report)? Regards, -- Yves-Alexis signature.asc Description: This is a digitally signed message part
Bug#701663: pre-approve unblock: tryton-server/2.2.7-1
Control: tag -1 + moreinfo On Mon, Feb 25, 2013 at 09:55:17PM +0100, Mathias Behrle wrote: Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Dear release managers, please approve the upload of tryton-server_2.2.7-1. There were several bugfix releases in Tryton, that are out since a considerable time and thus are well tested. I am filing this unblock request for the server first to know if it finds the approval of the release team. Once it is accepted I will file the unblock requests for the client and 16 modules. Those fixes are generally quite smaller than this one. Your changelog doesn't indicate how serious the proposed fixes are and I don't have time to dig through upstream commits trying to work it out. If there were Debian bugs for them, what severity would each be? Thanks, -- Jonathan Wiltshire j...@debian.org Debian Developer http://people.debian.org/~jmw 4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51 directhex i have six years of solaris sysadmin experience, from 8-10. i am well qualified to say it is made from bonghits layered on top of bonghits signature.asc Description: Digital signature
Bug#702821: perl/hash_attack.t fails with 5.10.1 + CVE-2013-1667 fix
Hi On Fri, Mar 15, 2013 at 05:56:05PM -, Steve Hay wrote: [...] Zefram has now come up with an even better patch (on the same RT ticket), after reproducing the Debian 5.10.1 failure himself. Please take a look (I've also attached it here for your convenience) and let me know whether this works for you. If so then I hope to apply it to SVN over the weekend. I can confirm that the new patch works on Debian Squeeze, with Perl (5.10.1-17squeeze6) including the security fix. Thank you Steve for keeping us updated! Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#702908: PTS: upload signature parsing patch
On Fri, 2013-03-15 at 08:41 +0100, Markus Wanner wrote: What we can do is distinguish three cases, i.e. (just to stick with the example above): Examples look good to me. Exactly, so let's keep with signed by rather than trying to identify what exactly we call sponsorship and what not. Agreed. Sounds like a notification on stderr about missing pubkeys could do the trick. Yep. -- bye, pabs http://wiki.debian.org/PaulWise signature.asc Description: This is a digitally signed message part
Bug#702965: procps: ps dies with SIGSEGV on kernels 3.2.29 and lots of supplementary groups
Hi On Thu, Mar 14, 2013 at 09:14:21AM +1100, Craig Small wrote: On Wed, Mar 13, 2013 at 12:38:40PM +, Karl E. Jorgensen wrote: We found that under the following circumstances: * Kernel 3.2.29 (which shows 32 groups in /proc/${pid}/status) * one or more users logged in with lots of supplementary groups Hi Karl, Can you look at the change at https://www.gitorious.org/procps/procps/commit/7933435584aa1fd75460f4c7715a3d4855d97c1c That patch looks good - obviously others have had the same idea as me then :-) and see if that fixes (or rather works-around) the problem? The patch used 4k not 8k but: Yeah - I may have gone slightly over the top by jumping to 8k. karl@someserver: ~$ wc --bytes /proc/1997/status 1810 that appears to be ok for now. Yes - but the current ps still appears to choke on it. And it's uncomfortably close to 2k, thus making chose at least 4k. Which paranoia then bumped to 8k. I have a (temporary) patch which increases the buffer size to 8K, which appears sufficient in our case. But this does not fix the underlying problem of having a limited buffer size to start with... You're correct, it shouldn't be a statically defined number. It's a buffer overflow because the read in file2str protects it but the subsequent structure may be a little sad. I may be misreading you here, but I don't think this is a buffer overflow. As far as I can see, file2str() does not fill the buffer beyond the boundary, but the problem lies in the subsequent code which assumes that the entire contents of the file is available in the buffer - in the loop around readproc.c:293 I'm thinking a size for 32 groups with a realloc/read loop might be the way to go. Absolutely. I started working on a patch for that but realised that this would take longer than I had available. I have come to realise that readproc.c makes LOTS of assumptions about the contents of /proc/$pid/status - if the kernel decides to miss a space somewhere, turn spaces into tabs (or vice versa), the whole thing collapses, possibly accompanied by noises like SIGSEGV and similar. Then I heard of procps-ng, decided to investigate it further... and life got in the way :-S -- Karl E. Jorgensen -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703097: upstream 1.10-RC1 packaging
On 15-03-13 16:22, Barak A. Pearlmutter wrote: Package: liferea Version: 1.8.6 For my own nefarious purposes, I packaged 1.10-RC1 based upon the tip of the experimental branch in the collab-maint repo, in the process making some other random updates. Available in git://git.debian.org/~bap/liferea.git You are welcome to pick anything of use from it, as you wish. Just so it is registered. David Smith (the creator of the last NMU) is also working on it. Paul signature.asc Description: OpenPGP digital signature
Bug#703097: git repo url
Oops, got the repo url wrong. Should read: git://anonscm.debian.org/users/bap/liferea.git -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#448638: RFP: i2p -- I2P is an anonymizing network
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, KYTV has been doing an excellent job maintaining Ubuntu and Debian packages: https://launchpad.net/~i2p-maintainers/+archive/i2p Quote from http://www.i2p2.de/debian.html : For Debian Oldstable (Lenny) and Stable (Squeeze): Add the following entries to |/etc/apt/sources.list.d/i2p.list| |deb http://ppa.launchpad.net/i2p-maintainers/i2p/ubuntu natty main deb-src http://ppa.launchpad.net/i2p-maintainers/i2p/ubuntu natty main | For Debian Testing (Wheezy) or Unstable (Sid), use the following: |deb http://ppa.launchpad.net/i2p-maintainers/i2p/ubuntu precise main deb-src http://ppa.launchpad.net/i2p-maintainers/i2p/ubuntu precise main | Regards, HH Am 13.03.2013 04:39, schrieb Carlos Alberto Lopez Perez: retitle 448638 RFP: i2p -- I2P is an anonymizing network noowner 448638 thanks Hi Given the timeline, I think is pretty clear that nobody is working on this package. In the mean time another ITP was filled for this package #665450 (now merged on this one). So I'm retitling this bug to RFP to easily allow anyone that wants to take care of this to work on it. If anyone of you want to step in and take care of packaging I2P for Debian please re-title the bug back to ITP and assign it to you. If it happens that there is more than one person interested on packaging I2P, then the interested ones can talk between them to check the possibility of maintaining the package together. Thanks! -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with undefined - http://www.enigmail.net/ iEYEARECAAYFAlFCzC4ACgkQHix7YXbc3BIe6ACfaJC7G0sQpYaJ3jU1d7iDN1g9 AsMAn1ZSbJ40bOygbounGW3Sba0/j/+8 =AJkZ -END PGP SIGNATURE-
Bug#702821: perl/hash_attack.t fails with 5.10.1 + CVE-2013-1667 fix
The patch in svn.apache.org r1455340 is not correct for Perl 5.10 due to a slight difference in hash splitting logic. Full explanation and revised patch now available on the RT ticket. -zefram -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703114: unblock: debian-edu-archive-keyring/2013.03.15
Control: tags -1 + confirmed d-i On Fri, 2013-03-15 at 12:34 -0700, Holger Levsen wrote: please unblock debian-edu-archive-keyring/2013.03.15, which set's the the expiration date for the debian-edu-archive key to 2019. The key in the package currently in wheezy has an expiration date of 2014-02-20 which will obviously cause problems as this is during wheezys lifetime. Unblocked. It also contains an udeb, thus cc: to debian-boot@, even though it's not used by d-i in Debian. Tagging + CCing for that. Regards, Adam -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703069: German tzdata debconf translation: Typo fixed, please use this file
I was pointed on a typo in my file provided yesterday (thanks to Sven Joachim). Please use the attached file, which fixes that typo. Thanks and sorry Holger -- = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = Created with Sylpheed 3.0.2 under D e b i a n G N U / L I N U X 6.0 ( S q u e e z e ) Registered LinuxUser #311290 - http://linuxcounter.net/ = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = tzdata-2013b-2_de.po.gz Description: Binary data
Bug#684164: ppp: rp-pppoe 3.11 allows 1500B MTU on PPPoE (RFC4638)
Package: ppp Version: 2.4.5-5.1+b1 Followup-For: Bug #684164 Hello, Since this bug was originally reported, rp-pppoe 3.11 has been released, which reports compliance with RFC4638 and so allows 1500B MTU on PPPoE connections (so long as all the hardware supports the intermediate Ethernet MTU of 1508B as well). I grabbed the new source from [1], grabbed the PPP headers from the Debian source package, and set it off compiling, then dropped the resulting rp-pppoe.so into /usr/lib/pppd/2.4.5 and re-started my PPPoE connection. It worked like a charm - the link came back up with a 1500B MTU straight away (previously, it wouldn't negotiate more than 1492 by LCP regardless of what was requested in the peer file). The newly compiled rp-pppoe.so accounts for the debsums warning at the end of this report, for reference. The split between rp-pppoe package and ppp seems a little unusual, but I can see why it might have been done. I think the request to update rp-pppoe.so from rp-pppoe 3.11 should remain attached to ppp, since the ppp package carries the resulting binaries. given how easy it was to just compile against existing headers, I think this fix should be fairly easy to apply to the official Debian builds, too. Give me a shout if there's anything I can do to help. All the best, -Dave. [1]: http://www.roaringpenguin.com/files/download/rp-pppoe-3.11.tar.gz -- System Information: Debian Release: 7.0 APT prefers testing APT policy: (550, 'testing'), (450, 'unstable'), (450, 'stable'), (445, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.8.2 (SMP w/2 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages ppp depends on: ii libc6 2.13-38 ii libpam-modules 1.1.3-7.1 ii libpam-runtime 1.1.3-7.1 ii libpam0g1.1.3-7.1 ii libpcap0.8 1.3.0-1 ii procps 1:3.3.3-2 ppp recommends no packages. ppp suggests no packages. -- Configuration Files: /etc/chatscripts/gprs [Errno 13] Permission denied: u'/etc/chatscripts/gprs' /etc/chatscripts/pap [Errno 13] Permission denied: u'/etc/chatscripts/pap' -- no debconf information -- debsums errors found: debsums: changed file /usr/lib/pppd/2.4.5/rp-pppoe.so (from ppp package) -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#701817: unblock: botan1.10/1.10.4-1
Control: tag -1 moreinfo Hi Ondřej, On Wed, Feb 27, 2013 at 02:52:52PM +0100, Ondřej Surý wrote: Please unblock package botan1.10 Hi, I would like to pre-mediate the inclusion of 1.10.4 (e.g. new upstream version). The patch is very small and fixes three issues. Upstream changelog: What is the impact and severity of these issues? I don't have enough knowledge of the package to assess this from the upstream release notes, and the BTS is lacking any clues. Thanks, -- Jonathan Wiltshire j...@debian.org Debian Developer http://people.debian.org/~jmw 4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51 directhex i have six years of solaris sysadmin experience, from 8-10. i am well qualified to say it is made from bonghits layered on top of bonghits signature.asc Description: Digital signature