Bug#1053821: bookworm patch?

2023-11-02 Thread Jesse Hathaway
Hey Faidon, I hope you are well!

Since this bug affects the current version in bookworm, v1.8.1, would
there be a possibility of adding the upstream patch to bookworm's
version? I tested applying the patches atop v1.8.1 and they apply
cleanly, and fix the issue as well.

git checkout -b bookworm 1.8.1
git cherry-pick 57262a2710c83fa08767f0ce3ba7a80993515bb2
git cherry-pick 14afa8a46e2e83608a3a219402bce8ea8d071192

Yours kindly, Jesse Hathaway


Bug#409360: GSSAPIAuthentication should be disabled by default

2023-10-26 Thread Jesse Hathaway
I just ran into this issue when sshing to a server with GSSAPIAuthentication
enabled. Even though I am not using GSSAPI auth, Debian's default on the client
side added 15s to the login time. I agree with other folks that GSSAPI auth is
unusual and should be disabled by default since it may cause significant delays.

# With GSSAPIAuthentication on
$ time ssh -v foo hostname

debug1: Next authentication method: gssapi-with-mic
debug1: No credentials were supplied, or the credentials were
unavailable or inaccessible
No Kerberos credentials available (default cache: FILE:/tmp/krb5cc_1000)
debug1: No credentials were supplied, or the credentials were
unavailable or inaccessible
No Kerberos credentials available (default cache: FILE:/tmp/krb5cc_1000)

real0m15.204s
user0m0.010s
sys 0m0.011s

# With GSSAPIAuthentication off
$ time ssh -v foo hostname
real0m0.195s
user0m0.014s
sys 0m0.007s



Bug#1050389: puppetserver: ExecReload fails when kill is not installed

2023-08-23 Thread Jesse Hathaway
Package: puppetserver
Version: 7.9.5-2
Severity: normal
X-Debbugs-Cc: je...@mbuki-mvuki.org

Dear Maintainer,

The systemd unit's ExecReload tries to use the kill binary directly, but
puppetserver does not depend on procps, it should either be added as a
dependency or the kill statement should be wrapped in sh -c so that the
kill shell builtin can be used instead:

  puppetserver.service: Failed at step EXEC spawning kill: No such file or 
directory

-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 6.4.0-2-amd64 (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages puppetserver depends on:
ii  default-jre-headless 2:1.17-74
pn  facter   
ii  jruby9.3.9.0+ds-8
pn  libclj-time-clojure  
pn  libclj-yaml-clojure  
pn  libclojure-java  
pn  libcomidi-clojure
pn  libcommons-exec-java 
ii  libcommons-io-java   2.11.0-2
pn  libcommons-lang-java 
pn  libdropwizard-metrics-java   
pn  libdujour-version-check-clojure  
pn  libjruby-utils-clojure   
pn  libkitchensink-clojure   
pn  libliberator-clojure 
pn  libprismatic-schema-clojure  
pn  libpuppetlabs-http-client-clojure
pn  libpuppetlabs-i18n-clojure   
pn  libpuppetlabs-ring-middleware-clojure
pn  libraynes-fs-clojure 
pn  libsemver-clojure
pn  libshell-utils-clojure   
pn  libslingshot-clojure 
pn  libssl-utils-clojure 
pn  libtrapperkeeper-authorization-clojure   
pn  libtrapperkeeper-clojure 
pn  libtrapperkeeper-comidi-metrics-clojure  
pn  libtrapperkeeper-filesystem-watcher-clojure  
pn  libtrapperkeeper-metrics-clojure 
pn  libtrapperkeeper-scheduler-clojure   
pn  libtrapperkeeper-status-clojure  
pn  libtrapperkeeper-webserver-jetty9-clojure
ii  libyaml-snake-java   1.33-2
ii  puppet-agent [hiera] 7.25.0-1bullseye
ii  ruby 1:3.1
pn  ruby-deep-merge  
pn  ruby-fast-gettext
pn  ruby-gettext 
pn  ruby-hocon   
pn  ruby-locale  
pn  ruby-puppet-resource-api 
pn  ruby-puppetserver-ca-cli 
pn  ruby-semantic-puppet 
pn  ruby-text

Versions of packages puppetserver recommends:
pn  puppet-module-puppetlabs-augeas-core   
pn  puppet-module-puppetlabs-cron-core 
pn  puppet-module-puppetlabs-host-core 
pn  puppet-module-puppetlabs-mount-core
pn  puppet-module-puppetlabs-selinux-core  
pn  puppet-module-puppetlabs-sshkeys-core  

puppetserver suggests no packages.



Bug#1041731: groff-base: Tough bug to find

2023-08-08 Thread Jesse Hathaway
Package: groff-base
Version: 1.23.0-2
Followup-For: Bug #1041731
X-Debbugs-Cc: je...@mbuki-mvuki.org

Thanks for maintaining groff-base,

I spent a half hour debugging why the example command in podman-images
would not work and then another half hour debugging why my man pages
were suddenly displaying U+2010 rather than U+002D. I sympathize with
the desire for accurate typography, but the manner in which this change
was introduced hurts users like myself. Please consider patching
Debian's copy and investigating another why to encourage man page
authors and tooling to use the correct hyphen.



Bug#1029152: systemd: Revisit disabling of bump fs.nr_open, bump-proc-sys-fs-nr-open=false

2023-01-18 Thread Jesse Hathaway
Package: systemd
Version: 252.4-1
Severity: normal
X-Debbugs-Cc: je...@mbuki-mvuki.org

Dear Maintainer,

Would it be possible to revisit the decision to disable
bump-proc-sys-fs-nr-open, from commit,
084e84e33a403868b7f84159da745689e2ff0ba9 ^[1]?

This recently caused me trouble when running a minikube instance on my
laptop which used a bunch of file descriptors. It would be nice to not
need to write sysctl values to bump it higher. Are there any paths to
reverting this patch? Thanks for maintaining systemd!!

[1]: 
https://salsa.debian.org/systemd-team/systemd/-/commit/084e84e33a403868b7f84159da745689e2ff0ba9.

-- Package-specific info:

-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.0-1-amd64 (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages systemd depends on:
ii  libacl12.3.1-3
ii  libaudit1  1:3.0.7-1.1+b2
ii  libblkid1  2.38.1-4
ii  libc6  2.36-8
ii  libcap21:2.66-3
ii  libcryptsetup122:2.6.0-2
ii  libfdisk1  2.38.1-4
ii  libgcrypt201.10.1-3
ii  libkmod2   30+20221128-1
ii  liblz4-1   1.9.4-1
ii  liblzma5   5.4.1-0.0
ii  libmount1  2.38.1-4
ii  libp11-kit00.24.1-2
ii  libseccomp22.5.4-1+b2
ii  libselinux13.4-1+b4
ii  libssl33.0.7-1
ii  libsystemd-shared  252.4-1
ii  libsystemd0252.4-1
ii  libzstd1   1.5.2+dfsg2-3
ii  mount  2.38.1-4

Versions of packages systemd recommends:
ii  dbus [default-dbus-system-bus]   1.14.4-1
ii  systemd-timesyncd [time-daemon]  252.4-1

Versions of packages systemd suggests:
ii  libfido2-11.12.0-2
ii  libqrencode4  4.1.1-1
ii  libtss2-esys-3.0.2-0  3.2.1-2
ii  libtss2-mu0   3.2.1-2
pn  libtss2-rc0   
ii  policykit-1   122-1
ii  polkitd   122-1
pn  systemd-boot  
pn  systemd-container 
pn  systemd-homed 
ii  systemd-resolved  252.4-1
pn  systemd-userdbd   

Versions of packages systemd is related to:
ii  dbus-user-session  1.14.4-1
pn  dracut 
ii  initramfs-tools0.142
ii  libnss-systemd 252.4-1
ii  libpam-systemd 252.4-1
ii  udev   252.4-1

-- Configuration Files:
/etc/systemd/logind.conf changed [not included]

-- no debconf information



Bug#1023760: openssh-client: scp should not be provided as an alternative to rcp

2022-11-09 Thread Jesse Hathaway
Package: openssh-client
Version: 1:9.0p1-1+b2
Severity: minor
X-Debbugs-Cc: je...@mbuki-mvuki.org

Dear Maintainer,

I needed to rcp a file to a legacy system, to my surprise it at first
appeared that rcp was installed, but my invocation failed. After some
investigation I found that scp was symlinked as an alternative to rcp.
>From reading the manpage I was unable to discern a way to have scp
perform a classic rcp transfer. If scp cannot perform an rcp transfer,
should it be symlinked to /etc/alternatives/rcp?

-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 6.0.0-1-amd64 (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages openssh-client depends on:
ii  adduser   3.129
ii  dpkg  1.21.9+b1
ii  libc6 2.36-4
ii  libedit2  3.1-20221030-1
ii  libfido2-11.12.0-1
ii  libgssapi-krb5-2  1.20-1+b1
ii  libselinux1   3.4-1+b2
ii  libssl3   3.0.7-1
ii  passwd1:4.12.3+dfsg1-3
ii  zlib1g1:1.2.13.dfsg-1

Versions of packages openssh-client recommends:
ii  xauth  1:1.1.1-1

Versions of packages openssh-client suggests:
pn  keychain  
pn  libpam-ssh
pn  monkeysphere  
pn  ssh-askpass   

-- no debconf information



Bug#973581: apt: Occasional pipelined requests failing against localhost nginx mirror

2022-02-09 Thread Jesse Hathaway
On Tue, 8 Feb 2022 13:21:44 -0600 Jesse Hathaway
 wrote:
> I hit this bug as well with our debian mirror, mirrors.wikimedia.org.
> We also use nginx to serve our mirror and bullseye clients frequently
> receive resets while pulling down packages. I tested reverting commit,
> fa375493c5a4ed9c10d4e5257ac82c6e687862d3, and it does indeed stop the
> connection resets. I also tested against apache2, but I was unable to
> reproduce the issue, so it seems to be nginx specific. I am happy to provide
> pcaps as well.

Using the same script I was able to reproduce the issue against the
following mirror as well:

- http://ftp.us.debian.org/debian/  Server: nginx/1.18.0
- http://debian.unnoba.edu.ar/debian/ Server: nginx/1.18.0
- http://mirrors.tuna.tsinghua.edu.cn/debian/ Server: nginx/1.18.0
- http://repo.ialab.dsu.edu/debian/ Server: nginx/1.18.0
- http://mirror.us.leaseweb.net/debian/ Server: nginx
- http://plug-mirror.rcac.purdue.edu/debian/  Server: nginx/1.14.2



Bug#973581: apt: Occasional pipelined requests failing against localhost nginx mirror

2022-02-08 Thread Jesse Hathaway
On Sun, 1 Nov 2020 20:55:36 -0800 Stefano Rivera  wrote:
> Recently I noticed repeated sbuild failures during package installation,
> due to connection resets. Can't reproduce with apt 2.1.8 but can with
> >= 2.1.9, so presumably the regression is due to
> fa375493c5a4ed9c10d4e5257ac82c6e687862d3 disabling retries.

I hit this bug as well with our debian mirror, mirrors.wikimedia.org.
We also use nginx to serve our mirror and bullseye clients frequently
receive resets while pulling down packages. I tested reverting commit,
fa375493c5a4ed9c10d4e5257ac82c6e687862d3, and it does indeed stop the
connection resets. I also tested against apache2, but I was unable to
reproduce the issue, so it seems to be nginx specific. I am happy to provide
pcaps as well.

Here is the script I used to reproduce:

  #!/bin/bash

  set -o errexit

  if [[ $EUID -ne 0 ]]; then
printf 'MUST BE ROOT\n' >&2
exit 1
  fi

  sed -i 's/deb.debian.org/mirrors.wikimedia.org/' /etc/apt/sources.list
  apt-get update
  while true; do
apt-get clean
declare -a install_opts=(--yes --download-only --no-install-recommends)
declare -a install_pkgs=(firefox-esr chromium)
if ! apt-get install "${install_opts[@]}" "${install_pkgs[@]}"; then
  printf 'ERROR: We caught a fish!\n' >&2
  tput bel
  exit 1
fi
  done

Here is how I built apt to test the revert:

  #!/bin/bash
  set -o errexit

  echo 'deb-src http://deb.debian.org/debian bullseye main'
>>/etc/apt/sources.list
  apt-get update
  apt-get install --yes git build-essential
  apt-get build-dep --yes apt
  git clone https://salsa.debian.org/apt-team/apt.git
  git config --global user.email "jhatha...@wikimedia.org"
  git config --global user.name "Jesse Hathaway"
  pushd apt
  git checkout 2.2.4
  git checkout -b butter
  git revert --no-edit fa375493c5a4ed9c10d4e5257ac82c6e687862d3
  dpkg-buildpackage -jauto -us -nc -b
  popd
  dpkg -i -- *.deb

I tested with buildah and this Dockerfile:

  FROM docker.io/debian:bullseye
  ENV LANG C.UTF-8
  COPY build /root/
  COPY resets /root/



Bug#980139: fc-cache failure

2021-06-10 Thread Jesse Hathaway
This still seems to be an issue, the script checks if the dejavu font
is present and
if it is not it continues, but then the call to build the fc-cache
fails, presumably
because no fonts are present in DESTDIR.



Bug#879786: apt-secure man page needs to provide useful pointers for Release file info changes

2018-11-07 Thread Jesse Hathaway
> IMO, the right answer would be to run "apt update" and confirm the
> change when asked.

I find it strange to recommend another tool, when there is a flag to
confirm the change with apt-get. If the intent is to deprecate using
apt-get interactively entirely, then that should be done at a more
holistic level, such as a warning on every invocation, rather than
when a specific error appears.



Bug#879786: apt-secure man page needs to provide useful pointers for Release file info changes

2018-11-07 Thread Jesse Hathaway
On Wed, Nov 7, 2018 at 12:12 PM Julian Andres Klode  wrote:
>
> On Wed, Nov 07, 2018 at 10:50:05AM -0600, Jesse Hathaway wrote:
> > Just ran into this issue with chrome package from Google:
> >
> > E: Repository 'http://dl.google.com/linux/chrome/deb stable
> > Release' changed its 'Origin' value from 'Google, Inc.' to 'Google
> > LLC'
> > N: This must be accepted explicitly before updates for this
> > repository can be applied. See apt-secure(8) manpage for details.
> >
> > Rather than adding information to apt-secure's man page, I think it
> > would be more helpful to output the command the user needs to accept
> > the change:
> >
> > E: Repository 'http://dl.google.com/linux/chrome/deb stable
> > Release' changed its 'Origin' value from 'Google, Inc.' to 'Google
> > LLC'
> > N: If you would like to accept this change, please rerun apt-get
> > update with the `--allow-releaseinfo-change` flag
>
> If you run it interactive, you get asked directly, and don't need
> the flag. Just recommending the flag is probably not a good idea,
> as it makes people add them to update scripts without thinking.

What do you mean by running interactively? I ran `apt-get update` in
my terminal and I was not prompted, it just showed those error
messages. I also don't see why showing the flag is not helpful, that
was the only way I was able to confirm the change?



Bug#879786: apt-secure man page needs to provide useful pointers for Release file info changes

2018-11-07 Thread Jesse Hathaway
Just ran into this issue with chrome package from Google:

E: Repository 'http://dl.google.com/linux/chrome/deb stable
Release' changed its 'Origin' value from 'Google, Inc.' to 'Google
LLC'
N: This must be accepted explicitly before updates for this
repository can be applied. See apt-secure(8) manpage for details.

Rather than adding information to apt-secure's man page, I think it
would be more helpful to output the command the user needs to accept
the change:

E: Repository 'http://dl.google.com/linux/chrome/deb stable
Release' changed its 'Origin' value from 'Google, Inc.' to 'Google
LLC'
N: If you would like to accept this change, please rerun apt-get
update with the `--allow-releaseinfo-change` flag



Bug#829245: /etc/os-release: Please specify VERSION_CODENAME

2018-04-03 Thread Jesse Hathaway
This would definitely simplify our bash scripts, we currently grab the
codename with this snippet:

#!/bin/bash
source /etc/os-release
IFS=' ()' read -r _ VERSION_CODENAME <<<"${VERSION}"

Thanks, Jesse



Bug#683971: dpkg-statoverride --remove fails if group no longer exists

2014-06-21 Thread Jesse Hathaway
Guillem,


It appears that the patch for this issue has not made it into 1.17.10.
Is the patch ready for inclusion or does it need further work?


If the patch is ready when is it expected to be merged?

If the patch is not ready, would it be possible to post the existing
patch noting where further work is needed?

Thanks, Jesse Hathaway


Bug#691770: New upstream release 2.2.0

2012-10-29 Thread Jesse Hathaway
Package: freeradius
Version: 2.1.12+dfsg-1.1
Severity: wishlist

There is a new upstream release of freeradius with numerous bug fixes,
it would be great if it could be packaged.

--
Jesse Hathaway, Systems Engineer
Braintree
917-418-8423


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#654863: patch causes a regression with filenames with spaces

2012-02-01 Thread Jesse Hathaway
patch causes a regression with filenames with spaces:

--- /home/jhathaway/tmp/xdg-open 2012-02-01 10:16:01.258018651 -0600
+++ /usr/bin/xdg-open 2012-02-01 10:12:31.305570388 -0600
@@ -549,7 +549,7 @@
                 command=`grep -E ^Exec(\[[^]=]*])?= $file | cut
-d= -f 2- | first_word`
                 command_exec=`which $command 2/dev/null`
                 arguments=`grep -E ^Exec(\[[^]=]*])?= $file |
cut -d= -f 2- | last_word`
-                local sed_escaped_url=$(echo $1 | sed -e 's/[\\]/\\/g')
+                local sed_escaped_url=$(echo $1 | sed -e 's/[\\]/\\/g')
                 arguments_exec=`echo $arguments | sed -e
's*%[fFuU]*'$sed_escaped_url'*g'`
                 if [ -x $command_exec ] ; then
                     if echo $arguments | grep -iq '%[fFuU]' ; then

Thanks, Jesse Hathaway



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#652067: xdg-utils: xdg-open uses eval rather than exec which breaks opening filenames with spaces

2011-12-14 Thread Jesse Hathaway
Package: xdg-utils
Version: 1.1.0~rc1+git20111210-1
Severity: important

Dear Maintainer,

xdg-open no longer is able to open filenames with spaces, patch below:

--- /usr/bin/xdg-open   2011-12-12 05:05:18.0 -0600
+++ xdg-open2011-12-14 09:10:00.791735160 -0600
@@ -552,9 +552,9 @@
 arguments_exec=`echo $arguments | sed -e 
's*%[fFuU]*'$1'*g'`
 if [ -x $command_exec ] ; then
 if echo $arguments | grep -iq '%[fFuU]' ; then
-eval $command_exec $arguments_exec
+exec $command_exec $arguments_exec
 else
-eval $command_exec $arguments_exec $1
+exec $command_exec $arguments_exec $1
 fi
 
 if [ $? -eq 0 ]; then

Thanks, Jesse

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.1.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

xdg-utils depends on no packages.

Versions of packages xdg-utils recommends:
ii  libfile-mimeinfo-perl  0.15-2
ii  libnet-dbus-perl   1.0.0-1+b1
ii  libx11-protocol-perl   0.56-2
ii  x11-utils  7.6+4
ii  x11-xserver-utils  7.6+3

Versions of packages xdg-utils suggests:
pn  gvfs-bin  none

-- no debconf information



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#652066: xdg-utils: xdg-mime uses '==' bashism

2011-12-14 Thread Jesse Hathaway
Package: xdg-utils
Version: 1.1.0~rc1+git20111210-1
Severity: important

Dear Maintainer,

The latest version of xdg-mime contains a bashism, patch below:

--- /usr/bin/xdg-mime   2011-12-12 05:05:18.0 -0600
+++ xdg-mime2011-12-14 09:09:57.743611810 -0600
@@ -430,7 +430,7 @@
 elif [ x$GNOME_DESKTOP_SESSION_ID != x ]; then DE=gnome;
 elif `dbus-send --print-reply --dest=org.freedesktop.DBus 
/org/freedesktop/DBus org.freedesktop.DBus.GetNameOwner 
string:org.gnome.SessionManager  /dev/null 21` ; then DE=gnome;
 elif xprop -root _DT_SAVE_MODE 2 /dev/null | grep ' = \xfce4\$' 
/dev/null 21; then DE=xfce;
-elif [ x$DESKTOP_SESSION == xLXDE ]; then DE=lxde;
+elif [ x$DESKTOP_SESSION = xLXDE ]; then DE=lxde;
 else DE=
 fi
 }

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.1.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

xdg-utils depends on no packages.

Versions of packages xdg-utils recommends:
ii  libfile-mimeinfo-perl  0.15-2
ii  libnet-dbus-perl   1.0.0-1+b1
ii  libx11-protocol-perl   0.56-2
ii  x11-utils  7.6+4
ii  x11-xserver-utils  7.6+3

Versions of packages xdg-utils suggests:
pn  gvfs-bin  none

-- no debconf information



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#643670: apparix: New upstream release

2011-09-28 Thread Jesse Hathaway
Package: apparix
Version: 07-261-1
Severity: wishlist

Dear Maintainer,

Please update this package with the newest release of apparix. The
current one in Debian is not compatible with the bash functions provided
by the author of the package on his homepage.

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.0.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages apparix depends on:
ii  libc6  2.13-21

apparix recommends no packages.

apparix suggests no packages.

-- no debconf information



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org