Processed: r1452 - pear/php-net-smtp/trunk/debian
Processing commands for cont...@bugs.debian.org: tags 602865 pending Bug #602865 [php-pear] upgrading from Lenny breaks php-pear setup Added tag(s) pending. thanks Stopping processing here. Please contact me if you need assistance. -- 602865: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602865 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#602865: marked as done (upgrading from Lenny breaks php-pear setup)
Your message dated Sun, 14 Nov 2010 08:32:06 + with message-id e1phy0m-0007t8...@franck.debian.org and subject line Bug#602865: fixed in php-net-smtp 1.4.2-2 has caused the Debian Bug report #602865, regarding upgrading from Lenny breaks php-pear setup to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 602865: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602865 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: php-pear Version: 5.2.6.dfsg.1-1+lenny9 Severity: important Package php-pear makes /usr/share/php/doc a symlink Package php-net-smtp makes /usr/share/php/doc a directory This makes installation of both packages fail. By the way, I had both packages installed without problems. The problem became when upgrading apt-net-smtp from version 1.3.1-1 (lenny) to 1.4.2-1 (squeeze) with php-pear version 5.2.6.dfsg.1-1+lenny9 installed. I ignore if the debian policy for php packages tells how to handle the /usr/share/php/doc directory, but probably it should. Thanks for your great work at Debian. Best regards, Gonzalo. -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.32-bpo.5-686-bigmem (SMP w/2 CPU cores) Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages php-pear depends on: ii php5-cli 5.2.6.dfsg.1-1+lenny9 command-line interpreter for the p ii php5-common5.2.6.dfsg.1-1+lenny9 Common files for packages built fr Versions of packages php-pear recommends: ii gnupg 1.4.9-3+lenny1 GNU privacy guard - a free PGP rep Versions of packages php-pear suggests: pn php5-dev | php4-dev none (no description available) -- no debconf information ---End Message--- ---BeginMessage--- Source: php-net-smtp Source-Version: 1.4.2-2 We believe that the bug you reported is fixed in the latest version of php-net-smtp, which is due to be installed in the Debian FTP archive: php-net-smtp_1.4.2-2.debian.tar.gz to main/p/php-net-smtp/php-net-smtp_1.4.2-2.debian.tar.gz php-net-smtp_1.4.2-2.dsc to main/p/php-net-smtp/php-net-smtp_1.4.2-2.dsc php-net-smtp_1.4.2-2_all.deb to main/p/php-net-smtp/php-net-smtp_1.4.2-2_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 602...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thomas Goirand z...@debian.org (supplier of updated php-net-smtp package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Format: 1.8 Date: Sun, 14 Nov 2010 16:16:34 +0800 Source: php-net-smtp Binary: php-net-smtp Architecture: source all Version: 1.4.2-2 Distribution: unstable Urgency: low Maintainer: Debian PHP Maintainers pkg-php-ma...@lists.alioth.debian.org Changed-By: Thomas Goirand z...@debian.org Description: php-net-smtp - PHP PEAR module implementing SMTP protocol Closes: 602865 Changes: php-net-smtp (1.4.2-2) unstable; urgency=low . * Added a Conflicts: php-pear ( 5.3), and now depends on php-pear (= 5.3) because otherwise upgrading path from Lenny is borken (Closes: #602865). * Added myself as an uploader. Checksums-Sha1: 0117ec0032cd429f9277b8c5b81718de167d8ab9 1355 php-net-smtp_1.4.2-2.dsc 14da74813357c3143565beb5e911d5c443dffe97 4614 php-net-smtp_1.4.2-2.debian.tar.gz f9b78d839a2fd7a904dab8405f153b53b0d8b439 21530 php-net-smtp_1.4.2-2_all.deb Checksums-Sha256: 12875f4b5cd8ab9c2f5d6f9d8678873d5e388008fe827c4ed5b912fb645c1914 1355 php-net-smtp_1.4.2-2.dsc 21ac78a039d115de6af081a13d8876ea43c063fd8366be41808ab6ea6c3594d9 4614 php-net-smtp_1.4.2-2.debian.tar.gz 37a1877669af80d096485b6f4e88f3d22e88eacfb00da72349dd146163cd917e 21530 php-net-smtp_1.4.2-2_all.deb Files: 763572870b8848fe9c2d442a7dde8c7f 1355 php optional php-net-smtp_1.4.2-2.dsc c83064e6ea8ee4e1dc4320c59f9a1eea 4614 php optional php-net-smtp_1.4.2-2.debian.tar.gz 8ffbb92efdb854efb54471ef83e006d6 21530 php optional php-net-smtp_1.4.2-2_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux) iEYEAREDAAYFAkzfnHwACgkQl4M9yZjvmklA2gCgsGS8G1jOG8dwcwA2SunYPt3R RmkAoMbGeVzXpqfGl6akmRH/HSV0tOTX =uXQb -END PGP SIGNATURE-
Bug#594119: Upgrade path from Lenny to Squeeze is broken
On 11/13/2010 09:59 PM, Julien Cristau wrote: On Tue, Nov 2, 2010 at 12:27:59 +0100, Stefan Hornburg (Racke) wrote: On 11/02/2010 12:25 PM, Julien Cristau wrote: On Sun, Oct 10, 2010 at 03:15:22 +0200, Jonas Smedegaard wrote: On Sat, Oct 09, 2010 at 05:36:08PM +0200, Julien Cristau wrote: On Tue, Aug 31, 2010 at 15:00:32 +0200, Stefan Hornburg (Racke) wrote: Fix applied to Git: http://git.debian.org/?p=collab-maint/sympa.git;a=commitdiff;h=edd77f243ec95fddd4eac534b0f1f76dcf5895ba;hp=c175d2ae1a605e4e651df76408d1a8035f8a2aa1 Any chance we can get this bug fix uploaded? I'll do it tomorrow! Err. That was uploaded as part of a new upstream release, which as far as I can tell doesn't really match the criteria from http://lists.debian.org/debian-devel-announce/2010/10/msg2.html What's the plan for getting this fixed in squeeze? Through an upload via testing-proposed-updates. When is that supposed to happen? I committed the necessary patches to debian-squeeze branch in our Git repository. I'll write to the release mailinglist tomorrow. Regards Racke -- LinuXia Systems = http://www.linuxia.de/ Expert Interchange Consulting and System Administration ICDEVGROUP = http://www.icdevgroup.org/ Interchange Development Team -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#577321: RM bug filed
I've picked through this bug and replicated the various issues. I agree with Tim, gpib should be removed from Squeeze. I've filed an RM bug at release.debian.org: 603399 -- Neil Williams = http://www.linux.codehelp.co.uk/ pgpI0Ed9Qu7Wx.pgp Description: PGP signature
Bug#603450: offlineimap: fails check the remote servers ssl certificate is valid
Package: offlineimap Severity: grave Tags: security Justification: user security hole offlineimap performs absolutely no ssl certificate checking. So users could/can be the victim of a man in the middle attack. In debian the following bugs exist: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=536421 (re certificate expiration) http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=153240 (re ssl fingerprint checking) This could be considered a bug in imaplib (http://bugs.python.org/issue10274). A partial 'fix' is the following(this 'fix' isn't complete and would break connections to servers using self-signed certificates): WARNING XXX: I haven't tested this 'fix' at all and so it is most likely wrong. diff --git a/offlineimap/imaplibutil.py b/offlineimap/imaplibutil.py index a60242b..c37688c 100644 --- a/offlineimap/imaplibutil.py +++ b/offlineimap/imaplibutil.py @@ -62,7 +62,7 @@ class IMAP4_Tunnel(IMAP4): self.infd.close() self.outfd.close() self.process.wait() - + class sslwrapper: def __init__(self, sslsock): self.sslsock = sslsock @@ -171,7 +171,7 @@ def new_open_ssl(self, host = '', port = IMAP4_SSL_PORT): if last_error != 0: # FIXME raise socket.error(last_error) -self.sslobj = ssl_wrap(self.sock, self.keyfile, self.certfile) +self.sslobj = ssl_wrap(self.sock, self.keyfile, self.certfile, cert_reqs=ssl.CERT_REQUIRED, ca_certs=/etc/ssl/certs/ca-certificates.crt) self.sslobj = sslwrapper(self.sslobj) Although, this isn't complete because it will break self-signed certificate using servers and http://bugs.python.org/issue1589 means that it won't provide full protection etc. Really, what is required is that by default the certificate is checked and perhaps an option is added to bypass the check. This isn't a new discovery, see [1], but the package provides no warning about this fact. I added a warning too https://github.com/jgoerzen/offlineimap/wiki/ perhaps debian can add a warning (in the package description) until this is fixed. [0] - http://thread.gmane.org/gmane.mail.imap.offlineimap.general/760 -- System Information: Debian Release: 5.0.6 APT prefers stable APT policy: (900, 'stable'), (650, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.36 (SMP w/4 CPU cores) Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#597375: No response, RM bug filed
In the absence of any progress, despite pings, I've filed the RM bug to have bsc removed from Squeeze. If there is a fix, it can go into unstable or if no news in another month, bsc can be removed from unstable too. -- Neil Williams = http://www.linux.codehelp.co.uk/ pgpRQeTllDDPc.pgp Description: PGP signature
Bug#591194: tdiary: does not build .swf files from source
Hi, On Sat, Nov 13, 2010 at 10:02:16PM +, Simon McVittie wrote: The package cannot be released with squeeze as it is now, so I'll try to list some options: 1. Remove package from Squeeze (leaving it in unstable) and think about it for the next release 2. Move the package to non-free 3. Find the sources and build flash files from source. 4. Completely remove package from Debian. 5. repack the tarball as tdiary_2.2.1+dfsg1.orig.tar.gz (or similar), removing the two sourceless flash files; fix tdiary-contrib so it still builds, with the two plugins that need those flash files removed. Here is option 5 approach. - Removing tdiary-2.2.1/contrib2/plugin/tdiarygraph/ and tdiary-2.2.1/contrib2/plugin/tdiarytimes/ directories. The two plugins need flash files. Without flash files, they are quite useless. So, we need to remove the two plugins completely. Upstream agrees with this approach. - Removing tdiarygraph and tdiarytimes from debian/tdiary.copyright. % pwd /usr/src/tdiary/tdiary-2.2.1+dfsg1 % find -name '*swf' % % find -name '*tdiarygraph*' % find -name '*tdiarytimes*' % % grep -ir tdiarygraph * % grep -ir tdiarytimes * % That's all. Patch attached. -- Regards, dai GPG Fingerprint = 0B29 D88E 42E6 B765 B8D8 EA50 7839 619D D439 668E diff -urNp tdiary-2.2.1/debian/tdiary-contrib.copyright tdiary-2.2.1+dfsg1/debian/tdiary-contrib.copyright --- tdiary-2.2.1/debian/tdiary-contrib.copyright 2010-11-14 17:32:37.0 +0900 +++ tdiary-2.2.1+dfsg1/debian/tdiary-contrib.copyright 2010-11-14 17:33:07.0 +0900 @@ -87,14 +87,6 @@ plugin/select_theme Copyright (C) 2005 akira yamada License: GPL2 -plugin/tdiarygraph - Copyright (c) 2004 phonondrive tdi...@phonondrive.com - License: GPL - -plugin/tdiarytimes - Copyright (c) 2003 neuichi neui...@nmnl.jp - License: GPL - plugin/twitter[ Copyright (C) 2007 Michitaka Ohno el...@mars.dti.ne.jp License: GPL2 signature.asc Description: Digital signature
Bug#603450: Acknowledgement (offlineimap: fails check the remote servers ssl certificate is valid)
I wish debian let me edit bugs like ubuntu does! (offlineimap: fails check the remote servers ssl certificate is valid) should be (offlineimap: fails *to* check the remote server's ssl certificate is valid) s/servers/server's/ -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#599282: phamm 0.5.18-3
sorry for delay, just sent to my sponsor the new version patched for upload dsc available here: http://open.rhx.it/debian/source/phamm_0.5.18-3.dsc Alessandro (lota)
Bug#591194: tdiary: does not build .swf files from source
Hi, I'm not going to do option 5 myself because I have no idea how to test tdiary, but that seems like the only way we're likely to keep it in Squeeze. Since tdiary is a leaf package with a lowish popcon score, I'm inclined to ask the release team to drop tdiary from squeeze (i.e. option 1) if there isn't any progress on this. I'm one of the users of tdiary :) # and had worked for DSA for this package http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=572417 Those swf files are not main component for tdiary, but just an addon, so option 5 approach is kind for us (me, upstream authors and other users). And surely I can test it (roughly, though). Dai, could you upload updated one to mentors or attache debdiff for it? -- Regards, Hideki Yamane henrich @ debian.or.jp/org http://wiki.debian.org/HidekiYamane -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: tagging 599282
Processing commands for cont...@bugs.debian.org: tags 599282 + pending Bug #599282 [phamm] phamm: [patch] fix for failure to install in chroot Bug #603080 [phamm] phamm: fails to install Added tag(s) pending. Added tag(s) pending. thanks Stopping processing here. Please contact me if you need assistance. -- 599282: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599282 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#591194: tdiary: does not build .swf files from source
Hi, On Sun, Nov 14, 2010 at 07:24:43PM +0900, Hideki Yamane wrote: I'm not going to do option 5 myself because I have no idea how to test tdiary, but that seems like the only way we're likely to keep it in Squeeze. Since tdiary is a leaf package with a lowish popcon score, I'm inclined to ask the release team to drop tdiary from squeeze (i.e. option 1) if there isn't any progress on this. Those swf files are not main component for tdiary, but just an addon, so option 5 approach is kind for us (me, upstream authors and other users). And surely I can test it (roughly, though). Dai, could you upload updated one to mentors or attache debdiff for it? uploaded to mentors. - URL: http://mentors.debian.net/debian/pool/main/t/tdiary - Source repository: deb-src http://mentors.debian.net/debian unstable main contrib non-free - dget http://mentors.debian.net/debian/pool/main/t/tdiary/tdiary_2.2.1+dfsg1-0.1.dsc I repackaged source tarball and modified debian/tdiary.copyright and debian/changelog. Would you please check and modify to suitable for official? -- Regards, dai GPG Fingerprint = 0B29 D88E 42E6 B765 B8D8 EA50 7839 619D D439 668E signature.asc Description: Digital signature
Bug#602778: one project packages twice (u-boot and uboot-mkimage)
On Sat, Nov 13, 2010 at 01:13:59 +0100, Julien Cristau wrote: On Mon, Nov 8, 2010 at 01:30:00 +0100, Benjamin Drung wrote: Hi, I just want to let you know that the uboot-mkimage source package contains a stripped version the u-boot source package and both packages have the same functionality. I filed the series bug #602778 [1]. [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602778 uboot-mkimage hasn't been uploaded since before lenny, and Clint says we should get rid of it, so I'll get it out of squeeze. Please reassign 602778 and file a bug against ftp.debian.org for its removal from unstable. It looks like debian-installer build-depends on uboot-mkimage. Is switching to u-boot an option? If not, I guess the removal will have to be deferred. Cheers, Julien signature.asc Description: Digital signature
Bug#594150: Bug#594153: Bug#594150: CURLOPT_TIMEOUT defaults to zero seconds
On Sat, 13 Nov 2010, Simon McVittie wrote: # GNUTLS backend, zero timeout, fails ./debian/build-gnutls/src/curl -k https://apt-test.aviatis.com/apt-cacher/ftp.us.debian.org/debian/dists/squeeze/Release --cert ../test-client.apt-test.aviatis.com.crt --key ../test-client.apt-test.aviatis.com.key curl: (28) SSL connection timeout It turns out that the error in the GNUTLS, zero timeout test is the *second* occurrence of this error message in lib/gtls.c handshake() (the one marked as g2 in my git branch referenced above). Curl_timeleft() returns 0, and Curl_socket_ready() also returns 0. This turned out to be a minor bug in curl, yes, and I've fixed it upstream now. BUT, I'd like to stress that the timeout problem was just a false track and it simply made the error reporting a bit confused and now with my fix curl will instead say this: $ ./src/curl -k https://apt-test.aviatis.com/apt-cacher/ftp.us.debian.org/debian/dists/squeeze/ -v * About to connect() to apt-test.aviatis.com port 443 (#0) * Trying 204.145.147.227... connected * Connected to apt-test.aviatis.com (204.145.147.227) port 443 (#0) * found 141 certificates in /etc/ssl/certs/ca-certificates.crt *server certificate verification SKIPPED *common name: apt-test.aviatis.com (matched) *server certificate expiration date OK *server certificate activation date OK *certificate public key: RSA *certificate version: #1 *subject: C=US,ST=CA,O=apt-test.aviatis.com,CN=apt-test.aviatis.com *start date: Mon, 23 Aug 2010 04:23:41 GMT *expire date: Sun, 19 May 2013 04:23:41 GMT *issuer: C=US,ST=CA,O=apt-test.aviatis.com,CN=apt-test.aviatis.com *compression: NULL *cipher: AES-128-CBC *MAC: SHA1 GET /apt-cacher/ftp.us.debian.org/debian/dists/squeeze/ HTTP/1.1 User-Agent: curl/7.21.3-DEV (i686-pc-linux-gnu) libcurl/7.21.3-DEV GnuTLS/2.8.6 zlib/1.2.3.4 c-ares/1.7.4-DEV libidn/1.18 libssh2/1.2.6 Host: apt-test.aviatis.com Accept: */* * gnutls_handshake() failed: Decryption has failed. * Closing connection #0 curl: (35) gnutls_handshake() failed: Decryption has failed. ... this should be compared with what curl says when instead built to use OpenSSL (the exact same code base, the current git version built with some extra debug): $ ./src/curl -k https://apt-test.aviatis.com/apt-cacher/ftp.us.debian.org/debian/dists/squeeze/ -v * About to connect() to apt-test.aviatis.com port 443 (#0) * Trying 204.145.147.227... connected * Connected to apt-test.aviatis.com (204.145.147.227) port 443 (#0) * successfully set certificate verify locations: * CAfile: /etc/ssl/certs/ca-certificates.crt CApath: none * SSLv3, TLS handshake, Client hello (1): * SSLv3, TLS handshake, Server hello (2): * SSLv3, TLS handshake, CERT (11): * SSLv3, TLS handshake, Server key exchange (12): * SSLv3, TLS handshake, Server finished (14): * SSLv3, TLS handshake, Client key exchange (16): * SSLv3, TLS change cipher, Client hello (1): * SSLv3, TLS handshake, Finished (20): * SSLv3, TLS change cipher, Client hello (1): * SSLv3, TLS handshake, Finished (20): * SSL connection using DHE-RSA-AES256-SHA * Server certificate: *subject: C=US; ST=CA; O=apt-test.aviatis.com; CN=apt-test.aviatis.com *start date: 2010-08-23 04:23:41 GMT *expire date: 2013-05-19 04:23:41 GMT *common name: apt-test.aviatis.com (matched) *issuer: C=US; ST=CA; O=apt-test.aviatis.com; CN=apt-test.aviatis.com * SSL certificate verify result: self signed certificate (18), continuing anyway. GET /apt-cacher/ftp.us.debian.org/debian/dists/squeeze/ HTTP/1.1 User-Agent: curl/7.21.3-DEV (i686-pc-linux-gnu) libcurl/7.21.3-DEV OpenSSL/0.9.8o zlib/1.2.3.4 c-ares/1.7.4-DEV libidn/1.18 libssh2/1.2.8_DEV librtmp/2.2e Host: apt-test.aviatis.com Accept: */* * SSLv3, TLS handshake, Hello request (0): * SSLv3, TLS handshake, Client hello (1): * SSLv3, TLS handshake, Server hello (2): * SSLv3, TLS handshake, CERT (11): * SSLv3, TLS handshake, Server key exchange (12): * SSLv3, TLS handshake, Request CERT (13): * SSLv3, TLS handshake, Server finished (14): * SSLv3, TLS handshake, CERT (11): * SSLv3, TLS handshake, Client key exchange (16): * SSLv3, TLS change cipher, Client hello (1): * SSLv3, TLS handshake, Finished (20): * SSLv3, TLS alert, Server hello (2): * SSL read: error:14094410:SSL routines:SSL3_READ_BYTES:sslv3 alert handshake failure, errno 0 * Closing connection #0 curl: (56) SSL read: error:14094410:SSL routines:SSL3_READ_BYTES:sslv3 alert handshake failure, errno 0 ... to me, it seems the remote server is a bit troublesome. -- / daniel.haxx.se -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#602778: one project packages twice (u-boot and uboot-mkimage)
Processing commands for cont...@bugs.debian.org: tag 602778 squeeze-ignore Bug #602778 [uboot-mkimage] u-boot and uboot-mkimage conflict Added tag(s) squeeze-ignore. kthxbye Stopping processing here. Please contact me if you need assistance. -- 602778: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602778 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#602778: one project packages twice (u-boot and uboot-mkimage)
tag 602778 squeeze-ignore kthxbye On Sun, Nov 14, 2010 at 12:45:57 +0100, Julien Cristau wrote: On Sat, Nov 13, 2010 at 01:13:59 +0100, Julien Cristau wrote: On Mon, Nov 8, 2010 at 01:30:00 +0100, Benjamin Drung wrote: Hi, I just want to let you know that the uboot-mkimage source package contains a stripped version the u-boot source package and both packages have the same functionality. I filed the series bug #602778 [1]. [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602778 uboot-mkimage hasn't been uploaded since before lenny, and Clint says we should get rid of it, so I'll get it out of squeeze. Please reassign 602778 and file a bug against ftp.debian.org for its removal from unstable. It looks like debian-installer build-depends on uboot-mkimage. Is switching to u-boot an option? If not, I guess the removal will have to be deferred. tbm says this is post squeeze, so I'll ignore this for now. 13:11 tbm jcristau: sounsd like uboot-mkimage should become a dummy package depending on u-boot 13:16 jcristau tbm: we can't just change the build-dep and remove uboot-mkimage? 13:20 tbm jcristau: for d-i, sure. but there are other things that use uboot-mkimage 13:20 jcristau there's no other reverse dep 13:20 tbm jcristau: but imho this is post-squeeze 13:20 jcristau ok 13:21 tbm flash-kernel uses uboot-mkimage, but it's not Depends Cheers, Julien signature.asc Description: Digital signature
Bug#584327: Bug #584327: is it an issue?
On Sun, Nov 14, 2010 at 01:59:31AM +0100, Luca Falavigna wrote: I wonder whether this is still an issue, given that enigmail now builds on mipsel again, see related log: It builds fine because mozilla-devscripts (a build-dep of enigmail) no longer depends on this package. Rdflib 3.0.0 is on its way (I promise, he) so, as it does not ship C extensions, it will be impossible to reproduce this problem. Willi, do you agree on closing this bug? Nacho signature.asc Description: Digital signature
Bug#584327: Bug #584327: is it an issue?
Am 2010-11-14 01:59, schrieb Luca Falavigna: I wonder whether this is still an issue, given that enigmail now builds on mipsel again, see related log: https://buildd.debian.org/fetch.cgi?pkg=enigmailarch=mipselver=2%3A1.0.1-5stamp=1278109432file=logas=raw I builds on mipsel because we switched to another rdf query implementation in mozilla-devscripts. m-d did the SIGBUS-causing query when building enigmail on mipsel. I already posted this on Jun 10, but my message was probably to cryptic. WM -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: policykit-1: FTBFS on kfreebsd-*: sys/signalfd.h: No such file or directory
Processing commands for cont...@bugs.debian.org: tags 602476 + experimental Bug #602476 [src:policykit-1] policykit-1: FTBFS on kfreebsd-*: sys/signalfd.h: No such file or directory Added tag(s) experimental. thanks Stopping processing here. Please contact me if you need assistance. -- 602476: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602476 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#584327: Bug #584327: is it an issue?
Am 2010-11-14 13:30, schrieb Nacho Barrientos Arias: On Sun, Nov 14, 2010 at 01:59:31AM +0100, Luca Falavigna wrote: I wonder whether this is still an issue, given that enigmail now builds on mipsel again, see related log: It builds fine because mozilla-devscripts (a build-dep of enigmail) no longer depends on this package. Rdflib 3.0.0 is on its way (I promise, he) so, as it does not ship C extensions, it will be impossible to reproduce this problem. Willi, do you agree on closing this bug? Yes, I'm fine with that as it no longer touches one of my packages. Additionally, if there's still a bug, it's in gcc. WM -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#591194: tdiary: does not build .swf files from source
Dai, Hideki, 2010/11/14 d+...@vdr.jp: On Sun, Nov 14, 2010 at 07:24:43PM +0900, Hideki Yamane wrote: I'm not going to do option 5 myself because I have no idea how to test tdiary, but that seems like the only way we're likely to keep it in Squeeze. Since tdiary is a leaf package with a lowish popcon score, I'm inclined to ask the release team to drop tdiary from squeeze (i.e. option 1) if there isn't any progress on this. Those swf files are not main component for tdiary, but just an addon, so option 5 approach is kind for us (me, upstream authors and other users). And surely I can test it (roughly, though). Dai, could you upload updated one to mentors or attache debdiff for it? uploaded to mentors. - URL: http://mentors.debian.net/debian/pool/main/t/tdiary - Source repository: deb-src http://mentors.debian.net/debian unstable main contrib non-free - dget http://mentors.debian.net/debian/pool/main/t/tdiary/tdiary_2.2.1+dfsg1-0.1.dsc I repackaged source tarball and modified debian/tdiary.copyright and debian/changelog. Would you please check and modify to suitable for official? Thank you for the preparation and sorry for my too late reply. I will be able to take time tomorrow. I will check and upload the package. Regards, Daigo -- Daigo Moriwaki beatles at sgtpepper dot net -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601989: Permission to upload vanessa-logger_0.0.10-1.1 (NMU)
On Sun, Nov 14, 2010 at 02:06:20 +0100, Luca Falavigna wrote: --- vanessa-logger-0.0.10.orig/debian/control +++ vanessa-logger-0.0.10/debian/control @@ -20,6 +20,8 @@ Architecture: any Section: libdevel Depends: libvanessa-logger0 (= ${binary:Version}), ${misc:Depends} +Breaks: libvanessa-logger0 ( 0.0.8-1) +Replaces: libvanessa-logger0 ( 0.0.8-1) Description: Headers and static libraries for libvanessa-logger Headers and static libraries required to develop against vanessa-logger. Vanessa logger is a generic logging layer that may be used to log to The Breaks field seems unnecessary, as you already have Depends on the exact version. If you agree please drop the Breaks and go ahead. Cheers, Julien signature.asc Description: Digital signature
Processed: Re: qtcreator: FTBFS on kfreebsd-*: expected unqualified-id before 'int'
Processing commands for cont...@bugs.debian.org: tags 600652 + experimental Bug #600652 [src:qtcreator] qtcreator: FTBFS on kfreebsd-*: expected unqualified-id before 'int' Added tag(s) experimental. thanks Stopping processing here. Please contact me if you need assistance. -- 600652: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600652 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: severity of 603439 is serious
Processing commands for cont...@bugs.debian.org: severity 603439 serious Bug #603439 [gpsd] gpsd: SEGV when receiving short aivdm message type 26 Severity set to 'serious' from 'important' thanks Stopping processing here. Please contact me if you need assistance. -- 603439: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603439 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#592768: clisp segfaults on install on powerpc system.
Hello, I have successfully installed this package into powerpc machine. On Thu, Aug 12, 2010 at 01:14:45PM -0400, Len Sorensen wrote: ;; Loaded file /usr/share/common-lisp/source/common-lisp-controller/common-lisp-controller.lisp *** - handle_fault error2 ! address = 0x77946b98 not in [0x69a5a0d8,0x69b37000) ! SIGSEGV cannot be cured. Fault address = 0x77946b98. Reinstalling for clisp Recompiling Common Lisp Controller for clisp Installing clc... ;; Loading file /usr/lib/clisp-2.48/install-clc.lisp ... ;; Loading file /usr/share/common-lisp/source/common-lisp-controller/common-lisp-controller.lisp ... ;; Loaded file /usr/share/common-lisp/source/common-lisp-controller/common-lisp-controller.lisp ;; Loading file /var/cache/common-lisp-controller/0/clisp/common-lisp-controller/common-lisp-controller.fas ... ;; Loaded file /var/cache/common-lisp-controller/0/clisp/common-lisp-controller/common-lisp-controller.fas ;; Loading file /var/cache/common-lisp-controller/0/clisp/cl-asdf/asdf.fas ... ;; Loaded file /var/cache/common-lisp-controller/0/clisp/cl-asdf/asdf.fas ;; Loading file /var/cache/common-lisp-controller/0/clisp/cl-asdf/wild-modules.fas ... ;; Loaded file /var/cache/common-lisp-controller/0/clisp/cl-asdf/wild-modules.fas ;; Loading file /var/cache/common-lisp-controller/0/clisp/common-lisp-controller/post-sysdef-install.fas ... ;; Loaded file /var/cache/common-lisp-controller/0/clisp/common-lisp-controller/post-sysdef-install.fas ;; Loaded file /usr/lib/clisp-2.48/install-clc.lisp ;; Wrote the memory image into /usr/lib/clisp-2.48/full/lispinit.mem (3,384,224 bytes) Bytes permanently allocated:108,736 Bytes currently in use: 3,268,676 Bytes available until next GC: 814,454 created /usr/lib/clisp-2.48/full/lispinit.mem as expected. -rw-r--r-- 1 root root 3384224 nov 14 13:54 /usr/lib/clisp-2.48/full/lispinit.mem Done rebuilding Configurando common-lisp-controller (7.4+nmu1) ... Reinstalling for clisp Recompiling Common Lisp Controller for clisp Installing clc... ;; Loading file /usr/lib/clisp-2.48/install-clc.lisp ... ;; Loading file /usr/share/common-lisp/source/common-lisp-controller/common-lisp-controller.lisp ... ;; Loaded file /usr/share/common-lisp/source/common-lisp-controller/common-lisp-controller.lisp ;; Loading file /var/cache/common-lisp-controller/0/clisp/common-lisp-controller/common-lisp-controller.fas ... ;; Loaded file /var/cache/common-lisp-controller/0/clisp/common-lisp-controller/common-lisp-controller.fas ;; Loading file /var/cache/common-lisp-controller/0/clisp/cl-asdf/asdf.fas ... ;; Loaded file /var/cache/common-lisp-controller/0/clisp/cl-asdf/asdf.fas ;; Loading file /var/cache/common-lisp-controller/0/clisp/cl-asdf/wild-modules.fas ... ;; Loaded file /var/cache/common-lisp-controller/0/clisp/cl-asdf/wild-modules.fas ;; Loading file /var/cache/common-lisp-controller/0/clisp/common-lisp-controller/post-sysdef-install.fas ... ;; Loaded file /var/cache/common-lisp-controller/0/clisp/common-lisp-controller/post-sysdef-install.fas ;; Loaded file /usr/lib/clisp-2.48/install-clc.lisp ;; Wrote the memory image into /usr/lib/clisp-2.48/full/lispinit.mem (3,384,224 bytes) Bytes permanently allocated:108,736 Bytes currently in use: 3,268,676 Bytes available until next GC: 814,454 created /usr/lib/clisp-2.48/full/lispinit.mem as expected. -rw-r--r-- 1 root root 3384224 nov 14 13:54 /usr/lib/clisp-2.48/full/lispinit.mem Done rebuilding Configurando clisp (1:2.48-3) ... Installing clc... ;; Loading file /usr/lib/clisp-2.48/install-clc.lisp ... ;; Loading file /usr/share/common-lisp/source/common-lisp-controller/common-lisp-controller.lisp ... ;; Loaded file /usr/share/common-lisp/source/common-lisp-controller/common-lisp-controller.lisp ;; Loading file /var/cache/common-lisp-controller/0/clisp/common-lisp-controller/common-lisp-controller.fas ... ;; Loaded file /var/cache/common-lisp-controller/0/clisp/common-lisp-controller/common-lisp-controller.fas ;; Loading file /var/cache/common-lisp-controller/0/clisp/cl-asdf/asdf.fas ... ;; Loaded file /var/cache/common-lisp-controller/0/clisp/cl-asdf/asdf.fas ;; Loading file /var/cache/common-lisp-controller/0/clisp/cl-asdf/wild-modules.fas ... ;; Loaded file /var/cache/common-lisp-controller/0/clisp/cl-asdf/wild-modules.fas ;; Loading file
Bug#603319: dmraid-activate (silently) fails to active RAID1 array
retitle 603319 dmraid-activate does not handle DDF1-based disks properly thanks Hello, apparently, this problem is strictly related to DDF1 format. dmraid-activate needs special handling for it because /sbin/dmraid binary provides no way to extract names of DDF1 RAID subsets for the particular physical device. `dmraid -r` returns only the top group .ddf1_disks [1] which is useless because `dmraid -s` refuses to work with it [2] (contrary to dmraid 1.0.0.rc14 where this works) [1] # dmraid -r /dev/sda /dev/sda: ddf1, .ddf1_disks, GROUP, ok, 486326272 sectors, data@ 0 [2] # dmraid -s .ddf1_disks ERROR: ddf1: wrong # of devices in RAID set ddf1_4c534920202020201055471147110a28 [1/2] on /dev/sdb ERROR: ddf1: wrong # of devices in RAID set ddf1_4c534920202020201055471147110a28 [1/2] on /dev/sda ERROR: either the required RAID set not found or more options required no raid sets and with names: .ddf1_disks I wrote an awk based program which extracts RAID subsets from the native log of the physical drive (dmraid -i -n /dev/sda). I will test it in the next few days and I will send a patch for dmraid-activate if it works. Special casing is obviously not optimal but changing behaviour of /sbin/dmraid at this point would be worse imho. -- Modestas Vainius mo...@debian.org signature.asc Description: This is a digitally signed message part.
Processed: Re: dmraid-activate (silently) fails to active RAID1 array
Processing commands for cont...@bugs.debian.org: retitle 603319 dmraid-activate does not handle DDF1-based disks properly Bug #603319 [dmraid] dmraid-activate (silently) fails to activate RAID1 array Changed Bug title to 'dmraid-activate does not handle DDF1-based disks properly' from 'dmraid-activate (silently) fails to activate RAID1 array' thanks Stopping processing here. Please contact me if you need assistance. -- 603319: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603319 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#598424: Patch for CVE-2010-3394
found 598424 1:1.0.7.4-3 thanks * Etienne Millon etienne.mil...@gmail.com, 2010-10-20, 09:44: It does, indeed. On line 30 of /usr/bin/texmacs, the inclusion of $TEXMACS_BIN_PATH/lib is properly done, because : - if LD_LIBRARY_PATH is empty before, the ${LD_LIBRARY_PATH+...} constructs evaluates to the empty string (and no colon is added) No. It evalutes to empty string only if LD_LIBRARY_PATH is unset, not when it's empty: $ LD_LIBRARY_PATH= $ LD_LIBRARY_PATH=/foobar${LD_LIBRARY_PATH+:$LD_LIBRARY_PATH} $ echo $LD_LIBRARY_PATH /foobar: -- Jakub Wilk signature.asc Description: Digital signature
Processed: Re: Bug#598424: Patch for CVE-2010-3394
Processing commands for cont...@bugs.debian.org: found 598424 1:1.0.7.4-3 Bug #598424 {Done: Atsuhito KOHDA ko...@debian.org} [texmacs] texmacs: CVE-2010-3394: insecure library loading Bug Marked as found in versions texmacs/1:1.0.7.4-3; no longer marked as fixed in versions texmacs/1:1.0.7.4-3 and reopened. thanks Stopping processing here. Please contact me if you need assistance. -- 598424: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598424 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#603473: zshdb: Installation fails
Package: zshdb Version: 0.05+git20101031-1 Severity: grave Tags: sid Justification: renders package unusable Package installation fails, also happens when upgrading. -8- Setting up zshdb (0.05+git20101031-1) ... emacsen-common: Handling install of emacsen flavor emacs emacsen-common: Handling install of emacsen flavor emacs21 emacsen-common: byte-compiling for emacs21 Wrote /etc/emacs21/site-start.d/00debian-vars.elc Wrote /usr/share/emacs21/site-lisp/debian-startup.elc Done install/zshdb: Handling install for emacsen flavor emacs21 /usr/lib/emacsen-common/packages/install/zshdb: line 36: cd: /usr/share/emacs/site-lisp/zshdb: No such file or directory emacs-package-install: /usr/lib/emacsen-common/packages/install/zshdb emacs21 emacs21 failed at /usr/lib/emacsen-common/emacs-package-install line 30, TSORT line 2. dpkg: error processing zshdb (--configure): subprocess installed post-installation script returned error exit status 1 configured to not write apport reports Errors were encountered while processing: zshdb E: Sub-process /usr/bin/dpkg returned an error code (1) zsh: exit 100 apt-get install zshdb -8- Probably because directory /usr/share/emacs/site-lisp/zshdb does not exist and zshdb is not creating one. -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.33.1-bfs315 (SMP w/4 CPU cores) Locale: LANG=C, LC_CTYPE=fi_FI (charmap=ISO-8859-1) Shell: /bin/sh linked to /bin/bash Versions of packages zshdb depends on: ii emacsen-common1.4.19 Common facilities for all emacsen ii zsh 4.3.10-16 A shell with lots of features zshdb recommends no packages. zshdb suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: severity of 566559 is important
Processing commands for cont...@bugs.debian.org: severity 566559 important Bug #566559 [libdspam7-drv-pgsql] fails to install Severity set to 'important' from 'serious' thanks Stopping processing here. Please contact me if you need assistance. -- 566559: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566559 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: tagging 591566
Processing commands for cont...@bugs.debian.org: tags 591566 - squeeze Bug #591566 [opensync-module-python] opensync-module-python not installable in unstable Removed tag(s) squeeze. thanks Stopping processing here. Please contact me if you need assistance. -- 591566: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591566 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: tagging 569393
Processing commands for cont...@bugs.debian.org: tags 569393 - squeeze Bug #569393 [src:libopensync-plugin-python] libopensync-plugin-python: FTBFS: Nonexistent build-dependency: libopensync0-dev Removed tag(s) squeeze. thanks Stopping processing here. Please contact me if you need assistance. -- 569393: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=569393 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: tagging 591990
Processing commands for cont...@bugs.debian.org: tags 591990 + sid Bug #591990 [opensync-plugin-barry] opensync-plugin-barry: not installable in sid Added tag(s) sid. thanks Stopping processing here. Please contact me if you need assistance. -- 591990: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591990 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: tagging 569443
Processing commands for cont...@bugs.debian.org: tags 569443 + sid Bug #569443 [src:barry] barry: FTBFS: Nonexistent build-dependency: libopensync0-dev Added tag(s) sid. thanks Stopping processing here. Please contact me if you need assistance. -- 569443: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=569443 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: tagging 569382
Processing commands for cont...@bugs.debian.org: tags 569382 + sid Bug #569382 [src:libopensync-plugin-kdepim] libopensync-plugin-kdepim: FTBFS: Nonexistent build-dependency: libopensync0-dev Added tag(s) sid. thanks Stopping processing here. Please contact me if you need assistance. -- 569382: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=569382 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: tagging 603439
Processing commands for cont...@bugs.debian.org: tags 603439 + fixed-upstream Bug #603439 [gpsd] gpsd: SEGV when receiving short aivdm message type 26 Added tag(s) fixed-upstream. thanks Stopping processing here. Please contact me if you need assistance. -- 603439: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603439 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601989: Permission to upload vanessa-logger_0.0.10-1.1 (NMU)
Il 14/11/2010 14:06, Julien Cristau ha scritto: The Breaks field seems unnecessary, as you already have Depends on the exact version. If you agree please drop the Breaks and go ahead. Correct, thanks for spotting. Simon ACKed the first NMU proposal, so I'm going to upload the revised version (as per attached debdiff) without delay. -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- only in patch2: unchanged: --- vanessa-logger-0.0.10.orig/debian/changelog +++ vanessa-logger-0.0.10/debian/changelog @@ -1,3 +1,12 @@ +vanessa-logger (0.0.10-1.1) unstable; urgency=medium + + * Non-maintainer upload. + * Add Replaces field on libvanessa-logger0 ( 0.0.8-1) for +libvanessa-logger-dev package to fix overwrite issues with +/usr/share/doc/libvanessa-logger-dev/README file (Closes: #601989). + + -- Luca Falavigna dktrkr...@debian.org Sun, 14 Nov 2010 16:06:16 +0100 + vanessa-logger (0.0.10-1) unstable; urgency=low * New upstream only in patch2: unchanged: --- vanessa-logger-0.0.10.orig/debian/control +++ vanessa-logger-0.0.10/debian/control @@ -20,6 +20,7 @@ Architecture: any Section: libdevel Depends: libvanessa-logger0 (= ${binary:Version}), ${misc:Depends} +Replaces: libvanessa-logger0 ( 0.0.8-1) Description: Headers and static libraries for libvanessa-logger Headers and static libraries required to develop against vanessa-logger. Vanessa logger is a generic logging layer that may be used to log to signature.asc Description: OpenPGP digital signature
Bug#594150: Bug#594153: Bug#594150: CURLOPT_TIMEOUT defaults to zero seconds
On Sun, 14 Nov 2010 at 12:51:34 +0100, Daniel Stenberg wrote: This turned out to be a minor bug in curl, yes, and I've fixed it upstream now. Thanks! (https://github.com/bagder/curl/commit/cbf4961bf3e42d88f6489f981efd509faa86f501 for those following the Debian bug log) BUT, I'd like to stress that the timeout problem was just a false track and it simply made the error reporting a bit confused and now with my fix curl will instead say this: $ ./src/curl -k https://apt-test.aviatis.com/apt-cacher/ftp.us.debian.org/debian/dists/squeeze/ -v That's not meant to work here: the test case is an apt repository where you have to present a client certificate to gain access. Presumably Johannes also has a real repository that contains private data or something, but this one is just a mirror of ftp.us.debian.org configured with similar access control, for testing; see http://apt-test.aviatis.com/ for a working client certificate and its private key. curl: (35) gnutls_handshake() failed: Decryption has failed. routines:SSL3_READ_BYTES:sslv3 alert handshake failure, errno 0 You'd know better than I do whether these are what you'd expect to see if the server requires a client certificate and you didn't have one... I'm not sure whether apt-cacher does directory listings, but here's the URL to a flat-file which works with Debian's (OpenSSL-based) curl(1): https://apt-test.aviatis.com/apt-cacher/ftp.us.debian.org/debian/dists/squeeze/Release The command I've been using to test is something like this: curl -k https://apt-test.aviatis.com/apt-cacher/ftp.us.debian.org/debian/dists/squeeze/Release --cert ../test-client.apt-test.aviatis.com.crt --key ../test-client.apt-test.aviatis.com.key Hope this helps, S -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601989: marked as done (libvanessa-adt-dev: file conflict when upgrading from lenny)
Your message dated Sun, 14 Nov 2010 15:32:30 + with message-id e1phezc-0003yf...@franck.debian.org and subject line Bug#601989: fixed in vanessa-logger 0.0.10-1.1 has caused the Debian Bug report #601989, regarding libvanessa-adt-dev: file conflict when upgrading from lenny to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 601989: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601989 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: libvanessa-adt-dev Version: 0.0.9-1 Severity: serious Installing the package in a lenny chroot, then upgrading to squeeze, causes: Preparing to replace libvanessa-logger-dev 0.0.7-2 (using .../libvanessa-logger-dev_0.0.10-1_amd64.deb) ... Unpacking replacement libvanessa-logger-dev ... dpkg: error processing /var/cache/apt/archives/libvanessa-logger-dev_0.0.10-1_amd64.deb (--unpack): trying to overwrite `/usr/share/doc/libvanessa-logger-dev/README', which is also in package libvanessa-logger0 Interestingly, it doesn't seem to be reproducible when upgrading only libvanessa-logger-dev. I'm not sure why. But it's reproducible when upgrading libvanessa-socket-dev. - Lucas ---End Message--- ---BeginMessage--- Source: vanessa-logger Source-Version: 0.0.10-1.1 We believe that the bug you reported is fixed in the latest version of vanessa-logger, which is due to be installed in the Debian FTP archive: libvanessa-logger-dev_0.0.10-1.1_amd64.deb to main/v/vanessa-logger/libvanessa-logger-dev_0.0.10-1.1_amd64.deb libvanessa-logger-sample_0.0.10-1.1_amd64.deb to main/v/vanessa-logger/libvanessa-logger-sample_0.0.10-1.1_amd64.deb libvanessa-logger0_0.0.10-1.1_amd64.deb to main/v/vanessa-logger/libvanessa-logger0_0.0.10-1.1_amd64.deb vanessa-logger_0.0.10-1.1.diff.gz to main/v/vanessa-logger/vanessa-logger_0.0.10-1.1.diff.gz vanessa-logger_0.0.10-1.1.dsc to main/v/vanessa-logger/vanessa-logger_0.0.10-1.1.dsc A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 601...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Luca Falavigna dktrkr...@debian.org (supplier of updated vanessa-logger package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 14 Nov 2010 16:06:16 +0100 Source: vanessa-logger Binary: libvanessa-logger0 libvanessa-logger-dev libvanessa-logger-sample Architecture: source amd64 Version: 0.0.10-1.1 Distribution: unstable Urgency: medium Maintainer: Simon Horman ho...@debian.org Changed-By: Luca Falavigna dktrkr...@debian.org Description: libvanessa-logger-dev - Headers and static libraries for libvanessa-logger libvanessa-logger-sample - Sample programme using libvanessa-logger libvanessa-logger0 - Generic Logging Library Closes: 601989 Changes: vanessa-logger (0.0.10-1.1) unstable; urgency=medium . * Non-maintainer upload. * Add Replaces field on libvanessa-logger0 ( 0.0.8-1) for libvanessa-logger-dev package to fix overwrite issues with /usr/share/doc/libvanessa-logger-dev/README file (Closes: #601989). Checksums-Sha1: db7df49650c738a427eb49ad794e8ddd6fba6633 1065 vanessa-logger_0.0.10-1.1.dsc eda0e9f7353eadeab0b855a8746a4d6d9ba0edb6 515 vanessa-logger_0.0.10-1.1.diff.gz 1226bf69c3799e9d8f8601583b2254440eb6f9a1 9862 libvanessa-logger0_0.0.10-1.1_amd64.deb d1c3fb093c3ac49c5935e3cfb1181801bcaf2410 13450 libvanessa-logger-dev_0.0.10-1.1_amd64.deb 88331486b72bf0b6f0ed203d973ffcac440db0f6 9724 libvanessa-logger-sample_0.0.10-1.1_amd64.deb Checksums-Sha256: 21062c438ab2849b888760ec5707e7d869c1413c4537554deae15378b5eee429 1065 vanessa-logger_0.0.10-1.1.dsc 6be11d7f9a43fca94c44ef6a90b122ba61c299facb20c0f5c6c63584da3a9cde 515 vanessa-logger_0.0.10-1.1.diff.gz fbb37caf8aa3f24873a922ee12ceccfdd47aa6468acf2c4ae8c929879f8a039c 9862 libvanessa-logger0_0.0.10-1.1_amd64.deb 080624dceec00fe6d8f8d21431d4ec2fcbdb99f046f1a81a7f11fe2ef0073b68 13450 libvanessa-logger-dev_0.0.10-1.1_amd64.deb 47b0fb63d6ea9347d7be7e8c90b83d89690f27d334312aa5012792158ce8ba29 9724 libvanessa-logger-sample_0.0.10-1.1_amd64.deb Files: eacc26a9ea41944645871e337fa22712 1065 libs optional vanessa-logger_0.0.10-1.1.dsc d81b9d1e087bde3a7785cbc9ead9bac5 515 libs optional
Bug#590884: grub-pc: upgrading with vmlinuz-2.6.32-5-amd64 kernel fails on device detection
This looks like the failure of grub-probe to find underlying device from partition. This should be fixed by now. Can you retest? -- Regards Vladimir 'φ-coder/phcoder' Serbinenko signature.asc Description: OpenPGP digital signature
Bug#496718: marked as done (vpnc: Disconnects after an hour and loops trying to reconnect)
Your message dated Sun, 14 Nov 2010 15:32:42 + with message-id e1phezo-0003b8...@franck.debian.org and subject line Bug#496718: fixed in vpnc 0.5.3r449-2.1 has caused the Debian Bug report #496718, regarding vpnc: Disconnects after an hour and loops trying to reconnect to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 496718: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496718 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: vpnc Version: 0.5.1r334-1 Severity: important When I use vpnc to connect to my company's VPN, I only stay connected for an hour. After that, vpnc sometimes stays up for a bit of time, but I can't access the VPN during that time. Eventually, the client will usually give up and exit. I'm attaching a log of debug output using 'vpnc-connect --debug 2 --no-detach snt'. This time the client hung at a time I needed to do more on the VPN, so I needed to kill it using vpnc-disconnect. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages vpnc depends on: ii libc6 2.7-13 GNU C Library: Shared libraries ii libgcrypt11 1.4.1-1LGPL Crypto library - runtime libr Versions of packages vpnc recommends: ii iproute 20080725-2 networking and traffic control too ii resolvconf1.42 name server information handler vpnc suggests no packages. -- no debconf information -- Daniel Schepler vpnc-log.lzma Description: Binary data ---End Message--- ---BeginMessage--- Source: vpnc Source-Version: 0.5.3r449-2.1 We believe that the bug you reported is fixed in the latest version of vpnc, which is due to be installed in the Debian FTP archive: vpnc_0.5.3r449-2.1.diff.gz to main/v/vpnc/vpnc_0.5.3r449-2.1.diff.gz vpnc_0.5.3r449-2.1.dsc to main/v/vpnc/vpnc_0.5.3r449-2.1.dsc vpnc_0.5.3r449-2.1_i386.deb to main/v/vpnc/vpnc_0.5.3r449-2.1_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 496...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Reinhard Tartler siret...@tauware.de (supplier of updated vpnc package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 09 Nov 2010 12:03:17 +0100 Source: vpnc Binary: vpnc Architecture: source i386 Version: 0.5.3r449-2.1 Distribution: unstable Urgency: low Maintainer: Eric Warmenhoven warmenho...@debian.org Changed-By: Reinhard Tartler siret...@tauware.de Description: vpnc - Cisco-compatible VPN client Closes: 496718 Changes: vpnc (0.5.3r449-2.1) unstable; urgency=low . * Non-maintainer upload. * Bug fix: Disconnects after an hour and loops trying to reconnect, thanks to Daniel Schepler (Closes: #496718, LP: #479632). Patch taken from upstream: http://www.gossamer-threads.com/lists/vpnc/devel/3442 Checksums-Sha1: 56b6682d4b0c393a7cd1c73a2a9f992e9b21adba 1149 vpnc_0.5.3r449-2.1.dsc df0228a912caa7593320ffd7e1dfe39f1ad7541d 53551 vpnc_0.5.3r449-2.1.diff.gz 51af34bb8e719f43d63c4fd1fc4eef584aa98b27 81222 vpnc_0.5.3r449-2.1_i386.deb Checksums-Sha256: d81e8bea1773d2fff28948c0533e387b001fc9661ff9b275ca13452993b5f06e 1149 vpnc_0.5.3r449-2.1.dsc fd037c3d069e4aa9ba59bd3ac10a61c39271966952198759372102c33ad83275 53551 vpnc_0.5.3r449-2.1.diff.gz ec26493ceeda570b2d1b0b32c34d379f7b118400574cd74a29ac7981f432a726 81222 vpnc_0.5.3r449-2.1_i386.deb Files: d53198a76663beb50f8f12da1303953b 1149 net extra vpnc_0.5.3r449-2.1.dsc 05a9da0920b4fc0169ef55c8f446ec2b 53551 net extra vpnc_0.5.3r449-2.1.diff.gz 0bc5436bbc1019e79054b548b0b8b446 81222 net extra vpnc_0.5.3r449-2.1_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Debian Powered! iJwEAQECAAYFAkzZY0kACgkQ78RAoABp8o8rRgP+Lzildfo6of/Sb4/hTC53zK9O lbQ5KDxCx7Fe7ZRnjP6ttPGvwsclUxfKlijVa96vzyf234uctiFDlwEZmvX1qCUI 22Nj1fXkQg1l9L/Le3Vyp3imudir9Qelf2c2Tbj01T0P+kWq8J5OwCBRQMlJ5eNZ 7AZsMUTCw7AC7RpWhnI= =y3HN -END PGP SIGNATURE- ---End
Bug#599303: hacky patch and link
Hi, I believe the cause of this bug is a missing NULL check in kdebase-workspace; I've filed a bug for it as bug 603480, that causes a seg if hiding a file dialog before making it visible. The following hacky patch to ktoon works around the bug in kdebase-workspace and solves this problem; but I think the right thing is to fix kdebase-workspace. Dave --- ktoon-0.8.1/src/core/configwizard.cpp 2007-06-15 03:33:07.0 +0100 +++ ktoon-0.8.1-daveg/src/core/configwizard.cpp 2010-11-14 15:49:54.0 + @@ -115,6 +115,7 @@ connect(fd, SIGNAL(currentChanged ( const QString )), m_kthome, SLOT(setText(const QString ))); fd-setFileMode(QFileDialog::Directory); fd-setModal(true); + fd-show(); /* DAG */ fd-hide(); connect(button, SIGNAL(clicked()), fd, SLOT(show())); @@ -131,6 +132,7 @@ QFileDialog *fd2 = new QFileDialog(hbox2); connect(fd2, SIGNAL(currentChanged ( const QString )), m_ktrepos, SLOT(setText(const QString ))); + fd2-show(); /* DAG */ fd2-hide(); fd2-setFileMode(QFileDialog::Directory); fd2-setModal(true); -- -Open up your eyes, open up your mind, open up your code --- / Dr. David Alan Gilbert| Running GNU/Linux | Happy \ \ gro.gilbert @ treblig.org | | In Hex / \ _|_ http://www.treblig.org |___/ -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601220: noip2: abuse of debconf
Hello, On Sun, Oct 24, 2010 at 02:44:16PM +0200, Jakub Wilk wrote: Package: noip2 Version: 2.1.9-3 Severity: serious Justification: Policy 10.7 The only place noip2 store configuration data (apart from the debconf cache) is a binary blob in /var/lib/noip2/. This file will be happily overwritten on each upgrade using *only* values supplied by debconf. debconf is set to critical asking those questions. Otavio, could you give us some feedback on this bug? You can read data back (all but password) with noip -S, do you need a patch for this? Best regards -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#404760: closed: fixed in inetutils 2:1.8-1
Hello, Could you consider backporting the fix to unstable/testing? On Sun, Sep 12, 2010 at 02:51:10PM +, Debian Bug Tracking System wrote: #404760: inetutils-inetd: [in.tftpd-hpda] received address was not AF_INET zumbi #404760 needs to be unblocked? jcristau zumbi: there's a freeze exception request. no decision yet, as it came with lots of changes. zumbi jcristau: thanks - i was trying to ping guillem and see if fix is backportable adsb It looked like it should be backportable from my look over the diff a few months ago. There were a lot of other changes though, as jcristau said :-/ adsb iirc we appear to be one of the few distributions shipping inetutils at all, and the only one currently shipping our version jcristau having just the rc bug fix(es?) in sid would make things easier... Best regards, -- Héctor Orón -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#597057: live-manual is outdated for squeeze
Hello Daniel, On Thu, Sep 16, 2010 at 10:30:04AM +0200, Daniel Baumann wrote: content needs updates for squeeze. It looks like deep freeze is approaching, do you need help on this task? (http://live.debian.net/devel/live-manual/todo/ is the reference to follow?) Best regards, -- Héctor Orón -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#597057: live-manual is outdated for squeeze
On 11/14/2010 05:12 PM, Hector Oron wrote: Hello Daniel, Hi, It looks like deep freeze is approaching, do you need help on this task? (http://live.debian.net/devel/live-manual/todo/ is the reference to follow?) above todo contains more than what is required for squeeze. for squeeze, all the files in the sources at manual/en/other_* are the remaining ones that needs to be reviewed. any help with that welcome. Regards, Daniel -- Address:Daniel Baumann, Burgunderstrasse 3, CH-4562 Biberist Email: daniel.baum...@panthera-systems.net Internet: http://people.panthera-systems.net/~daniel-baumann/ -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#599437: Looks like we should drop gdisk for squeeze
On Sat, 2010-11-13 at 17:27 +, Steve McIntyre wrote: gdisk 0.5.1-1 is currently in squeeze and sid and has the RC bug #599437 open against it. There's a new upstream version available (0.6.13), but the change is huge (39 files changed, 9069 insertions(+), 2593 deletions(-)); IMHO the changes are far too large for an update now. The code in the older version of gdisk looks nasty, I'll be honest, and I would rather see it removed. Small popcon usage and no rdeps. For the record, Julien added a removal hint for this yesterday and it's no longer in Squeeze. Regards, Adam -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#584327: marked as done (python-rdflib: fails with SIGBUS on mipsel - breaks build of enigmail)
Your message dated Sun, 14 Nov 2010 07:19:15 -0600 with message-id 20101114131915.ga3...@dev.localdomain and subject line Re: Bug#584327: Bug #584327: is it an issue? has caused the Debian Bug report #584327, regarding python-rdflib: fails with SIGBUS on mipsel - breaks build of enigmail to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 584327: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584327 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: python-rdflib Version: 2.4.2-1+b1 Severity: serious Justification: Breaks build of another package Building enigmail 1.0.1-2 on mipsel fails with Bus error: https://buildd.debian.org/fetch.cgi?pkg=enigmailarch=mipselver=2%3A1.0.1-2stamp=1275423629file=logas=raw I've reproduced this on a qemu-emulated mipsel machine. The problem is the script /usr/bin/install-xpi that uses rdflib to parse the file install.rdf. I've reduced install-xpi to the method that shows the problem, and added printf debugging to find the failing method. The output of this script on mipsel is $ ./install-xpi gei 1 install.rdf gei 2 gei 3 gei 4 gei 5 Bus error So the problem occurs when calling rdf_graph.query(). I have no experience at debugging python applications, especially not when system level bugs are involved, so I can't debug this issue further. I can make the qemu image I used available. It is based on the lenny image by Aurélien Jarno. #!/usr/bin/python # Copyright (c) 2009 Benjamin Drung bdr...@ubuntu.com # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the Software), to deal # in the Software without restriction, including without limitation the rights # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell # copies of the Software, and to permit persons to whom the Software is # furnished to do so, subject to the following conditions: # # The above copyright notice and this permission notice shall be included in # all copies or substantial portions of the Software. # # THE SOFTWARE IS PROVIDED AS IS, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN # THE SOFTWARE. import csv import optparse import os import stat import subprocess import sys import zipfile from rdflib import Namespace from rdflib.Graph import Graph # error codes COMMAND_LINE_SYNTAX_ERROR = 1 XPI_FILE_DOES_NOT_EXISTS = 2 def get_extension_id(install_rdf): print gei 1 + install_rdf extension_ids = set() print gei 2 rdf_graph = Graph() print gei 3 rdf_graph.parse(install_rdf) print gei 4 query = SELECT ?id WHERE {?x1 em:targetApplication ?x2 . ?x1 em:id ?id } print gei 5 results = rdf_graph.query(query, initNs=dict(em=Namespace(http://www.mozilla.org/2004/em-rdf#;))) print gei 6 for result in results: print gei 7 extension_ids.add(str(result[0])) print gei 8 return extension_ids.pop() if __name__ == __main__: extension_id = get_extension_id(install.rdf) install.rdf Description: XML document ---End Message--- ---BeginMessage--- On Sun, Nov 14, 2010 at 01:54:15PM +0100, Willi Mann wrote: Am 2010-11-14 13:30, schrieb Nacho Barrientos Arias: On Sun, Nov 14, 2010 at 01:59:31AM +0100, Luca Falavigna wrote: I wonder whether this is still an issue, given that enigmail now builds on mipsel again, see related log: It builds fine because mozilla-devscripts (a build-dep of enigmail) no longer depends on this package. Rdflib 3.0.0 is on its way (I promise, he) so, as it does not ship C extensions, it will be impossible to reproduce this problem. Willi, do you agree on closing this bug? Yes, I'm fine with that as it no longer touches one of my packages. Additionally, if there's still a bug, it's in gcc. I'm closing it then. Feel free to reopen the report if something similar arises in the future. Thanks. Nacho signature.asc Description: Digital signature ---End Message---
Bug#602084: further analysis + plan (1-day NMU of autofs5 today)
found 602765 5.0.3-3 tags 602765 + patch thanks Hi, so this bug (602765) is also present in+since lenny, etch had no autofs5-ldap package. And, to repeat myself: the autofs-ldap package ships this configfile with the same path since etch... In sid, there are currently 80 schema files deployed in /etc/ldap/schema/ and non in /etc/ldap/ except this one. So I'll go ahead with my NMU now, but I'll make it 1-day. Tomorrow I'll then upload a fixed (602084) debian-edu-config package. The fix is simply to fix the path in debian/autofs5-ldap.install cheers, Holger signature.asc Description: This is a digitally signed message part.
Processed: further analysis + plan (1-day NMU of autofs5 today)
Processing commands for cont...@bugs.debian.org: found 602765 5.0.3-3 Bug #602765 [autofs5-ldap] schema file has changed path, breaking other software Bug Marked as found in versions autofs5/5.0.3-3. tags 602765 + patch Bug #602765 [autofs5-ldap] schema file has changed path, breaking other software Added tag(s) patch. thanks Stopping processing here. Please contact me if you need assistance. -- 602765: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602765 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601989: Permission to upload vanessa-logger_0.0.10-1.1 (NMU)
On Sun, Nov 14, 2010 at 16:12:38 +0100, Luca Falavigna wrote: Il 14/11/2010 14:06, Julien Cristau ha scritto: The Breaks field seems unnecessary, as you already have Depends on the exact version. If you agree please drop the Breaks and go ahead. Correct, thanks for spotting. Simon ACKed the first NMU proposal, so I'm going to upload the revised version (as per attached debdiff) without delay. Unblocked, thanks. Cheers, Julien signature.asc Description: Digital signature
Bug#548099: Some debug
Hi. I can reproduce this bug (using a kFreeBSD AMD64 in VirtualBox). As noted, this bug does only happen when root access is gained using sudo, because $SSH_CONNECTION is not passed to sudo's children. Using su or logging directly as root works fine. Unfortunately the patch suggested by Martin doesn't completely solve the Linux-ism, because under kFreeBSD sshd apparently doesn't retain the TTY name in the children it spawns: r...@bestiola:~# ps ax | grep sshd 911 ?R+ 0:00 grep sshd 862 ?S 0:00 /usr/sbin/sshd -R 858 ?Ss 0:00 /usr/sbin/sshd -R 468 ?Ss 0:00 /usr/sbin/sshd Thus the pgrep test always fails and isn't able to detect SSH connections (unless $SSH_CONNECTION is set, that triggers the other test). I don't know why, but ps seems to be unable to detect the running TTY of a program (here, the TTY column is the one full of ?: the same happens for the rest of processes in ps ax). One could rely on the fact that ps (without arguments) displays the processes with the same TTY and calling user and test if its output contains a sshd. It doesn't seem to be the Right Way(tm), but it may work. Thanks, Giovanni. -- Giovanni Mascellani mascell...@poisson.phc.unipi.it Pisa, Italy Web: http://poisson.phc.unipi.it/~mascellani Jabber: g.mascell...@jabber.org / giova...@elabor.homelinux.org signature.asc Description: OpenPGP digital signature
Processed: tagging 599303
Processing commands for cont...@bugs.debian.org: tags 599303 + patch Bug #599303 [ktoon] ktoon: KToon crashes with Signal 11 Added tag(s) patch. thanks Stopping processing here. Please contact me if you need assistance. -- 599303: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599303 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#594150: More information
Daniel Silverstone I have been trying to get some debug output of this bug during the Manchester BSP. It strongly appears to be a bug in the gnutls library, rather than curl and is also restricted to client certificates only. gnutls is failing in the rehandshake for client certificates. This section of gtls.c: if(ret == GNUTLS_E_REHANDSHAKE) { /* BLOCKING call, this is bad but a work-around for now. Fixing this the proper way takes a whole lot of work. */ CURLcode rc = handshake(conn, num, FALSE, FALSE); if(rc) /* handshake() writes error message on its own */ *curlcode = rc; else *curlcode = CURLE_AGAIN; /* then return as if this was a wouldblock */ return -1; } Performing a manual glutls-cli does not work for client certificates when the equivalent command with openssl s_client does work. Tested with: gnutls-cli --insecure -p 443 --x509certfile /etc/apt/client-certs/test-client.apt-test.aviatis.com.crt --x509keyfile /etc/apt/client-certs/test-client.apt-test.aviatis.com.key apt-test.aviatis.com Also tested with libgnutls26 (2.10.2-1) from experimental. Entering the data: GET /apt-cacher/ftp.us.debian.org/debian/dists/squeeze/Release HTTP/1.1 Host: apt-test.aviatis.com Gives: *** Non fatal error: Rehandshake was requested by the peer. *** Received rehandshake request *** Fatal error: Unsafe renegotiation denied. *** Rehandshake Failed. *** Fatal error: An unexpected TLS packet was received. *** Server has terminated the connection abnormally. openssl command: openssl s_client -key test-client.apt-test.aviatis.com.key -cert test-client.apt-test.aviatis.com.crt -connect apt-test.aviatis.com:https -- Neil Williams = http://www.linux.codehelp.co.uk/ pgpZKHG2KeqcS.pgp Description: PGP signature
Bug#597962: Seems to have resolved itself
I was going to take a shot at debugging this today, since it's on the RC bug list for squeeze, but it seems to have resolved itself at some point, at least in unstable. QL starts without errors, and it's playing music right now. The last time I tried it was weeks ago, so unfortunately I don't know which of the many package updates between then and now was responsible for the change. I also don't have a system running squeeze, so I can't test whether it works there. But it's working for me in sid. -- Mike Paul m...@wyzardry.net -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#597933: Non-free files distributed in sdcc
Hello, On Fri, Sep 24, 2010 at 12:45:57PM +0200, Philipp Klaus Krause wrote: Package: sdcc Version: 2.9.0-5 Severity: serious Since the 2.9.0 release sdcc is in the process of changing the lbrary license to GPL+LE. The process is mostly complete. While doing so, some files of unclear license status were found. Rights holders have been contacted and, with one exception (), agreed to license their files under GPL+LE. This exception is Microchip Technology Inc. They insist on a the file can be used only with authentic Microchip devices condition, which clearly violates DFSG §6. I have review all files under pic and pic16 directories in sdcc 2.9.0 package in testing/unstable. $ grep -nRH authentic Microchip devices * tells me nothing I do not really see anything wrong in the licensing of this package. Could you please point out which files are affected? Best regards, -- Héctor Orón -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: tagging 597933
Processing commands for cont...@bugs.debian.org: tags 597933 + moreinfo Bug #597933 [sdcc] Non-free files distributed in sdcc Added tag(s) moreinfo. thanks Stopping processing here. Please contact me if you need assistance. -- 597933: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=597933 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#603450: Acknowledgement (offlineimap: fails check the remote servers ssl certificate is valid)
retitle 603540 offlineimap: fails to check the remote server's ssl certificate is valid thanks On Sun, Nov 14, 2010 at 08:15:18PM +1100, dave b wrote: I wish debian let me edit bugs like ubuntu does! Done. See http://www.debian.org/Bugs/server-control for more details on the commands available. (offlineimap: fails check the remote servers ssl certificate is valid) should be (offlineimap: fails *to* check the remote server's ssl certificate is valid) s/servers/server's/ -- Steve McIntyre, Cambridge, UK.st...@einval.com The problem with defending the purity of the English language is that English is about as pure as a cribhouse whore. We don't just borrow words; on occasion, English has pursued other languages down alleyways to beat them unconscious and rifle their pockets for new vocabulary. -- James D. Nicoll -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#534466: Is this IA64 specific?
I haven't got a machine to try and recreate this on easily, but I wonder if this bug is IA64 specific? If not then it's even more important - unless someone knows of a specific ia64 change in the md raid sb then I guess it might be more general. Dave -- -Open up your eyes, open up your mind, open up your code --- / Dr. David Alan Gilbert| Running GNU/Linux | Happy \ \ gro.gilbert @ treblig.org | | In Hex / \ _|_ http://www.treblig.org |___/ -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#591206: License updated (flvplayer)
Hello, On Thu, Nov 11, 2010 at 04:35:53PM +0100, Alexander Reichle-Schmehl wrote: If I understand it correctly, it's just a plugin of tinymce in need of that flash player? Then couldn't that plugin be moved to non-free (in a sepperate source package) so that a tinymce cleaned from this plugin could stay in main as well as the other packages? $ find . -name *swf* ./jscripts/tiny_mce/plugins/media/img/flv_player.swf ./examples/media/sample.swf How important are those files? Could those be replaced or removed without affecting application functionality? Cheers -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601115: adabrowse: FTBFS in squeeze: error: (/usr/lib/ada/adalib/asis/a4g-contt-dp.ali is obsolete and read-only)
Hi Lucas, Sorry for the late reply... Lucas Nussbaum wrote: Package: adabrowse Version: 4.0.3-4 Severity: serious Tags: squeeze sid User: debian...@lists.debian.org Usertags: qa-ftbfs-20101023 qa-ftbfs Justification: FTBFS on amd64 Hi, During a rebuild of all packages in a squeeze chroot, your package failed to build on amd64. I just setup a fresh squeeze chroot on an amd64 machine and was able to build the adabrowse package without any errors... gnatbind -shared -I- -x /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/obj/adabrowse.ali error: a4g-contt-dp.adb must be compiled error: (/usr/lib/ada/adalib/asis/a4g-contt-dp.ali is obsolete and read-only) error: a4g-contt-ut.adb must be compiled error: (/usr/lib/ada/adalib/asis/a4g-contt-ut.ali is obsolete and read-only) error: a4g-contt-tt.adb must be compiled error: (/usr/lib/ada/adalib/asis/a4g-contt-tt.ali is obsolete and read-only) error: a4g-asis_tables.adb must be compiled error: (/usr/lib/ada/adalib/asis/a4g-asis_tables.ali is obsolete and read-only) error: uintp.adb has been modified and must be recompiled error: a4g-contt-sd.adb must be compiled error: (/usr/lib/ada/adalib/asis/a4g-contt-sd.ali is obsolete and read-only) error: a4g-cu_info2.adb must be compiled error: (/usr/lib/ada/adalib/asis/a4g-cu_info2.ali is obsolete and read-only) error: a4g-vcheck.adb must be compiled error: (/usr/lib/ada/adalib/asis/a4g-vcheck.ali is obsolete and read-only) error: asis-extensions.adb must be compiled error: (/usr/lib/ada/adalib/asis/asis-extensions.ali is obsolete and read-only) error: a4g-a_sem.adb must be compiled error: (/usr/lib/ada/adalib/asis/a4g-a_sem.ali is obsolete and read-only) error: a4g-mapping.adb must be compiled error: (/usr/lib/ada/adalib/asis/a4g-mapping.ali is obsolete and read-only) error: a4g-norm.adb must be compiled error: (/usr/lib/ada/adalib/asis/a4g-norm.ali is obsolete and read-only) error: asis-declarations.adb must be compiled error: (/usr/lib/ada/adalib/asis/asis-declarations.ali is obsolete and read-only) error: a4g-decl_sem.adb must be compiled error: (/usr/lib/ada/adalib/asis/a4g-decl_sem.ali is obsolete and read-only) error: asis-definitions.adb must be compiled error: (/usr/lib/ada/adalib/asis/asis-definitions.ali is obsolete and read-only) error: asis-elements.adb must be compiled error: (/usr/lib/ada/adalib/asis/asis-elements.ali is obsolete and read-only) error: a4g-encl_el.adb must be compiled error: (/usr/lib/ada/adalib/asis/a4g-encl_el.ali is obsolete and read-only) error: asis-expressions.adb must be compiled error: (/usr/lib/ada/adalib/asis/asis-expressions.ali is obsolete and read-only) error: a4g-expr_sem.adb must be compiled error: (/usr/lib/ada/adalib/asis/a4g-expr_sem.ali is obsolete and read-only) error: a4g-dda_aux.adb must be compiled error: (/usr/lib/ada/adalib/asis/a4g-dda_aux.ali is obsolete and read-only) error: asis-data_decomposition.adb must be compiled error: (/usr/lib/ada/adalib/asis/asis-data_decomposition.ali is obsolete and read-only) error: asis-data_decomposition-aux.adb must be compiled error: (/usr/lib/ada/adalib/asis/asis-data_decomposition-aux.ali is obsolete and read-only) error: asis-data_decomposition-set_get.adb must be compiled error: (/usr/lib/ada/adalib/asis/asis-data_decomposition-set_get.ali is obsolete and read-only) gnatmake: *** bind failed. make: *** [build-stamp] Error 4 This suggests that the linker detects a version/source mismatch for the ASIS library by means of the ALI files. I fail to see however why it should fail for you and not for me. I will add Ludovic, the maintainer of the ASIS package, as CC to this mail. Thanks again for the report, Adrian -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: tagging 591206
Processing commands for cont...@bugs.debian.org: tags 591206 + moreinfo Bug #591206 [src:tinymce] tinymce: contains Flash files without source code, notably non-free flv_player.swf Added tag(s) moreinfo. thanks Stopping processing here. Please contact me if you need assistance. -- 591206: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591206 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#584942: by the way
yeh the bug's still present, and isn't it the same as bug #569580 ? -- byte-byte, grin -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#602765: Fwd: Bug#603491: acknowledge or cancel 5.0.4-3.2 NMU
-- Forwarded Message -- Betreff: Bug#603491: acknowledge or cancel 5.0.4-3.2 NMU Datum: Sonntag, 14. November 2010 Von: Holger Levsen hol...@layer-acht.org An: sub...@bugs.debian.org package: autofs5 Hi, please include my change from 5.0.4-3.2 (diff attached) into your next upload. I've just uploaded it to 1-day delayed, so if you want to, you could also cancel that upload and fix 602765 by an upload of yours. cheers thanks for maintaining autofs5! Holger --- attachment omitted here. signature.asc Description: This is a digitally signed message part.
Bug#512883: marked as done (gphoto2: Silently fails when unable to retreive files from camera)
Your message dated Sun, 14 Nov 2010 18:03:25 + with message-id e1phgvf-0001tl...@franck.debian.org and subject line Bug#512883: fixed in gphoto2 2.4.5-3 has caused the Debian Bug report #512883, regarding gphoto2: Silently fails when unable to retreive files from camera to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 512883: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512883 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: gphoto2 Version: 2.4.0-1 Severity: normal When I run gphoto2 -P from within a directory where the user has no write permissions, gphoto shows that the file is being retreived, and shows a successful exit, though the files are not actually saved on to the harddisk. A sample directory permission where the command failed:- drwxr-xr-x 3 paivakil root 4096 2008-04-21 10:59 2008March2 A different user, who is not a member of the root group ran gphoto2 -P from within the above directory, and was told that the files are being downloaded. Running ls at the end of the process shows that the files were not actually saved:- Output of the command:- gphoto2 -P Downloading '100_2496.JPG' from folder '/store_00010001/DCIM/100KC663'... Saving file as 100_2496.JPG Downloading '100_2497.JPG' from folder '/store_00010001/DCIM/100KC663'... Saving file as 100_2497.JPG Downloading 'DDISCVRY.DPS' from folder '/store_00020001'... Saving file as DDISCVRY.DPS Resulst of ls -la at end of the command:- total 22632 -rw--- 1 nandana camera 1486326 2008-03-03 21:23 100_1523.JPG -rw--- 1 nandana camera 1425718 2008-03-03 21:23 100_1524.JPG -rw--- 1 nandana camera 1467106 2008-03-03 21:23 100_1525.JPG -rw--- 1 nandana camera 1238891 2008-03-03 21:23 100_1526.JPG -rw--- 1 nandana camera 1251119 2008-03-03 21:24 100_1527.JPG -rw--- 1 nandana camera 1424014 2008-03-03 21:24 100_1528.JPG -rw--- 1 nandana camera 1066989 2008-03-03 21:24 100_1529.JPG -rw--- 1 nandana camera 1244265 2008-03-03 21:24 100_1530.JPG -rw--- 1 nandana camera 1945151 2008-03-03 21:24 100_1531.JPG -rw--- 1 nandana camera 1664090 2008-03-03 21:24 100_1532.JPG -rw--- 1 nandana camera 1411502 2008-03-03 21:24 100_1533.JPG -rw--- 1 nandana camera 675804 2008-03-03 21:24 100_1534.JPG -rw--- 1 nandana camera 1290160 2008-03-03 21:24 100_1535.JPG -rw--- 1 nandana camera 1384751 2008-03-03 21:24 100_1536.JPG -rw--- 1 nandana camera 1386654 2008-03-03 21:24 100_1537.JPG -rw--- 1 nandana camera 740676 2008-03-03 21:24 100_1538.JPG -rw--- 1 nandana camera 1161485 2008-03-03 21:24 100_1539.JPG -rw--- 1 nandana camera 805859 2008-03-03 21:24 100_1540.JPG (Those files were already in the folder; before running gphoto; downloaded earlier, and chmod'ed. the point I want to make is that the two files we are told are being saved are not found in the listing). But running under strace does show some problems:- ioctl(4, USBDEVFS_REAPURBNDELAY, 0x7fffe9254b68) = -1 EAGAIN (Resource temporarily unavailable) select(5, NULL, [4], NULL, {0, 1000}) = 1 (out [4], left {0, 1000}) ioctl(4, USBDEVFS_REAPURBNDELAY, 0x7fffe9254b68) = 0 ioctl(4, USBDEVFS_SUBMITURB, 0x7fffe9254af0) = 0 ioctl(4, USBDEVFS_REAPURBNDELAY, 0x7fffe9254b68) = -1 EAGAIN (Resource temporarily unavailable) select(5, NULL, [4], NULL, {0, 1000}) = 0 (Timeout) ioctl(4, USBDEVFS_REAPURBNDELAY, 0x7fffe9254b68) = -1 EAGAIN (Resource temporarily unavailable) select(5, NULL, [4], NULL, {0, 1000}) = 0 (Timeout) ioctl(4, USBDEVFS_REAPURBNDELAY, 0x7fffe9254b68) = -1 EAGAIN (Resource temporarily unavailable) select(5, NULL, [4], NULL, {0, 1000}) = 0 (Timeout) ioctl(4, USBDEVFS_REAPURBNDELAY, 0x7fffe9254b68) = -1 EAGAIN (Resource temporarily unavailable) select(5, NULL, [4], NULL, {0, 1000}) = 0 (Timeout) ioctl(4, USBDEVFS_REAPURBNDELAY, 0x7fffe9254b68) = -1 EAGAIN (Resource temporarily unavailable)
Bug#601220: noip2: abuse of debconf
On Sun, Nov 14, 2010 at 1:57 PM, Hector Oron zu...@debian.org wrote: Otavio, could you give us some feedback on this bug? You can read data back (all but password) with noip -S, do you need a patch for this? I haven't have time to look at it. If you can look at it please do. It is in collab-maint so please take it over :-D -- Otavio Salvador O.S. Systems E-mail: ota...@ossystems.com.br http://www.ossystems.com.br Mobile: +55 53 9981-7854 http://projetos.ossystems.com.br -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#602765: further analysis + plan (1-day NMU of autofs5 today)
h01ger autofs5 (#602765) NMUed+uploaded to delayed-1 pere_ how do you make sure those using the old path will still find the schema? h01ger i could do an archive wide grep h01ger i suspect that path has no/very few users h01ger people still use autofs-ldap h01ger popcon is at 135 installed and 12 recent h01ger thats half the popcon score of debian-edu-config h01ger autofs-ldap OTOH, has 666 installed and 17 recent h01ger pere, also there is no other schema file in /etc/ldap, all 80 in sid are in /etc/ldap/schema so i'm very confident that this is *right* h01ger pere, i'd like to put our discussion until 18:34 into the bug log, you're fine with that? :) pere_ h01ger: I am fine with that. you might want to address those with their own local slapd.conf setup, as in not from a debian package. that would be the majority, as most sites create their own ldap server config. signature.asc Description: This is a digitally signed message part.
Bug#603237: marked as done (python2.7-minimal: fails to configure with IOError: invalid Python installation: unable to open /usr/lib/python2.7/config/Makefile)
Your message dated Sun, 14 Nov 2010 19:50:13 + with message-id e1phiab-al...@franck.debian.org and subject line Bug#603237: fixed in python2.7 2.7.1~rc1-2 has caused the Debian Bug report #603237, regarding python2.7-minimal: fails to configure with IOError: invalid Python installation: unable to open /usr/lib/python2.7/config/Makefile to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 603237: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603237 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: python2.7-minimal Version: 2.7-9 Severity: grave Stock experimental system. python2.6 is already installed and working great. Trying to investigate [1], I hope to install python2.7: # cupt install python2.7 [...] (Reading database ... 118078 files and directories currently installed.) Unpacking python2.7-minimal (from .../python2.7-minimal_2.7-9_i386.deb) ... Setting up python2.7-minimal (2.7-9) ... Traceback (most recent call last): File /usr/lib/python2.7/site.py, line 552, in module main() File /usr/lib/python2.7/site.py, line 534, in main known_paths = addusersitepackages(known_paths) File /usr/lib/python2.7/site.py, line 261, in addusersitepackages user_site = getusersitepackages() File /usr/lib/python2.7/site.py, line 236, in getusersitepackages user_base = getuserbase() # this will also set USER_BASE File /usr/lib/python2.7/site.py, line 226, in getuserbase USER_BASE = get_config_var('userbase') File /usr/lib/python2.7/sysconfig.py, line 558, in get_config_var return get_config_vars().get(name) File /usr/lib/python2.7/sysconfig.py, line 457, in get_config_vars _init_posix(_CONFIG_VARS) File /usr/lib/python2.7/sysconfig.py, line 310, in _init_posix raise IOError(msg) IOError: invalid Python installation: unable to open /usr/lib/python2.7/config/Makefile (No such file or directory) dpkg: error processing python2.7-minimal (--configure): subprocess installed post-installation script returned error exit status 1 Indeed, there is no /usr/lib/python2.7/config directory. Unpacking python2.7 with an explicit dpkg invocation allows the installation to continue, so all is well. [1] http://bugs.python.org/issue1736483 ---End Message--- ---BeginMessage--- Source: python2.7 Source-Version: 2.7.1~rc1-2 We believe that the bug you reported is fixed in the latest version of python2.7, which is due to be installed in the Debian FTP archive: idle-python2.7_2.7.1~rc1-2_all.deb to main/p/python2.7/idle-python2.7_2.7.1~rc1-2_all.deb libpython2.7_2.7.1~rc1-2_i386.deb to main/p/python2.7/libpython2.7_2.7.1~rc1-2_i386.deb python2.7-dbg_2.7.1~rc1-2_i386.deb to main/p/python2.7/python2.7-dbg_2.7.1~rc1-2_i386.deb python2.7-dev_2.7.1~rc1-2_i386.deb to main/p/python2.7/python2.7-dev_2.7.1~rc1-2_i386.deb python2.7-doc_2.7.1~rc1-2_all.deb to main/p/python2.7/python2.7-doc_2.7.1~rc1-2_all.deb python2.7-examples_2.7.1~rc1-2_all.deb to main/p/python2.7/python2.7-examples_2.7.1~rc1-2_all.deb python2.7-minimal_2.7.1~rc1-2_i386.deb to main/p/python2.7/python2.7-minimal_2.7.1~rc1-2_i386.deb python2.7_2.7.1~rc1-2.diff.gz to main/p/python2.7/python2.7_2.7.1~rc1-2.diff.gz python2.7_2.7.1~rc1-2.dsc to main/p/python2.7/python2.7_2.7.1~rc1-2.dsc python2.7_2.7.1~rc1-2_i386.deb to main/p/python2.7/python2.7_2.7.1~rc1-2_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 603...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Matthias Klose d...@debian.org (supplier of updated python2.7 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 14 Nov 2010 09:40:09 +0100 Source: python2.7 Binary: python2.7 python2.7-minimal libpython2.7 python2.7-examples python2.7-dev idle-python2.7 python2.7-doc python2.7-dbg Architecture: source all i386 Version: 2.7.1~rc1-2 Distribution: experimental Urgency: low Maintainer: Matthias Klose d...@debian.org Changed-By: Matthias Klose d...@debian.org Description: idle-python2.7 - An IDE for Python (v2.7) using Tkinter libpython2.7 - Shared Python runtime library (version 2.7) python2.7 - An interactive high-level object-oriented language (version 2.7)
Bug#590418: libxr: FTBFS: make[2]: *** [doxy] Segmentation fault
Package: libxr Severity: normal Hi, I can reproduce this seg fault in a random way. It seems the seg fault occurs when generating man pages. Thoses pages are not relevant and I plan to simply avoid the build of man pages by doxygen. Best Regards Fabien -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.32-5-686 (SMP w/1 CPU core) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#603371: Please Reassign to Package tar
I have isolated this issue to upgrading tar from 1.23-3 to 1.24-1. The bug still exists in the latest version 1.25-2. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601802: marked as done (sun-java6-jre: update 22 not available in lenny is a security issue)
Your message dated Sun, 14 Nov 2010 19:59:30 + with message-id e1phija-0001qm...@franck.debian.org and subject line Bug#601802: fixed in sun-java6 6-22-0lenny1 has caused the Debian Bug report #601802, regarding sun-java6-jre: update 22 not available in lenny is a security issue to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 601802: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601802 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: sun-java6-jre Version: 6-20-0lenny1 Some time ago Oracle released Java 6 update 22 patching a critical security issue. Is it possible to make this version available to Debian Lenny? ---End Message--- ---BeginMessage--- Source: sun-java6 Source-Version: 6-22-0lenny1 We believe that the bug you reported is fixed in the latest version of sun-java6, which is due to be installed in the Debian FTP archive: ia32-sun-java6-bin_6-22-0lenny1_amd64.deb to non-free/s/sun-java6/ia32-sun-java6-bin_6-22-0lenny1_amd64.deb sun-java6-bin_6-22-0lenny1_amd64.deb to non-free/s/sun-java6/sun-java6-bin_6-22-0lenny1_amd64.deb sun-java6-bin_6-22-0lenny1_i386.deb to non-free/s/sun-java6/sun-java6-bin_6-22-0lenny1_i386.deb sun-java6-demo_6-22-0lenny1_amd64.deb to non-free/s/sun-java6/sun-java6-demo_6-22-0lenny1_amd64.deb sun-java6-demo_6-22-0lenny1_i386.deb to non-free/s/sun-java6/sun-java6-demo_6-22-0lenny1_i386.deb sun-java6-doc_6-22-0lenny1_all.deb to non-free/s/sun-java6/sun-java6-doc_6-22-0lenny1_all.deb sun-java6-fonts_6-22-0lenny1_all.deb to non-free/s/sun-java6/sun-java6-fonts_6-22-0lenny1_all.deb sun-java6-javadb_6-22-0lenny1_all.deb to non-free/s/sun-java6/sun-java6-javadb_6-22-0lenny1_all.deb sun-java6-jdk_6-22-0lenny1_amd64.deb to non-free/s/sun-java6/sun-java6-jdk_6-22-0lenny1_amd64.deb sun-java6-jdk_6-22-0lenny1_i386.deb to non-free/s/sun-java6/sun-java6-jdk_6-22-0lenny1_i386.deb sun-java6-jre_6-22-0lenny1_all.deb to non-free/s/sun-java6/sun-java6-jre_6-22-0lenny1_all.deb sun-java6-plugin_6-22-0lenny1_amd64.deb to non-free/s/sun-java6/sun-java6-plugin_6-22-0lenny1_amd64.deb sun-java6-plugin_6-22-0lenny1_i386.deb to non-free/s/sun-java6/sun-java6-plugin_6-22-0lenny1_i386.deb sun-java6-source_6-22-0lenny1_all.deb to non-free/s/sun-java6/sun-java6-source_6-22-0lenny1_all.deb sun-java6_6-22-0lenny1.diff.gz to non-free/s/sun-java6/sun-java6_6-22-0lenny1.diff.gz sun-java6_6-22-0lenny1.dsc to non-free/s/sun-java6/sun-java6_6-22-0lenny1.dsc sun-java6_6-22.orig.tar.gz to non-free/s/sun-java6/sun-java6_6-22.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 601...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Torsten Werner twer...@debian.org (supplier of updated sun-java6 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sat, 06 Nov 2010 10:56:16 +0100 Source: sun-java6 Binary: sun-java6-jre sun-java6-bin sun-java6-plugin ia32-sun-java6-bin ia32-sun-java6-plugin sun-java6-fonts sun-java6-jdk sun-java6-demo sun-java6-source sun-java6-doc sun-java6-javadb Architecture: all amd64 i386 source Version: 6-22-0lenny1 Distribution: stable Urgency: low Maintainer: Matthias Klose d...@ubuntu.com Changed-By: Torsten Werner twer...@debian.org Closes: 601802 Description: ia32-sun-java6-bin - Sun Java(TM) Runtime Environment (JRE) 6 (32-bit) ia32-sun-java6-plugin - The Java(TM) Plug-in, Java SE 6 (32-bit) sun-java6-bin - Sun Java(TM) Runtime Environment (JRE) 6 (architecture dependent sun-java6-demo - Sun Java(TM) Development Kit (JDK) 6 demos and examples sun-java6-doc - Sun JDK(TM) Documention -- integration installer sun-java6-fonts - Lucida TrueType fonts (from the Sun JRE) sun-java6-javadb - Java(TM) DB, Sun Microsystems' distribution of Apache Derby sun-java6-jdk - Sun Java(TM) Development Kit (JDK) 6 sun-java6-jre - Sun Java(TM) Runtime Environment (JRE) 6 (architecture independen sun-java6-plugin - The Java(TM) Plug-in, Java SE 6 sun-java6-source - Sun Java(TM) Development Kit (JDK) 6 source files Changes: sun-java6 (6-22-0lenny1) stable; urgency=low . * New upstream release (Closes: #601802) * SECURITY UPDATE: multiple upstream vulnerabilities. Upstream fixes: -
Bug#603371: Update
I have made progress isolating the problem by using manual invocations of GNU tar. Apparently the semantics of .tar .one-file-system. has changed. If I remove this option from my test invocation, the dump proceeds normally. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#565738: drupal: shouldn't enable on all sites by default
I agree with Gunnar. This big is not realy security relevant, it would be, if there were open security issues with.. Users could deactivate drupal easily by just removing the symlink and this method is used by several other packages, so that they work after installation. Sure it would be nice to get asked by debconf if it should be activated, but that is something like wishlist IMHO. I recommend, that the submitter of this report or the package maintainer will downgrade this bug to something != release critical. -- /* Mit freundlichem Gruß / With kind regards, Patrick Matthäi GNU/Linux Debian Developer E-Mail: pmatth...@debian.org patr...@linux-dev.org Comment: Always if we think we are right, we were maybe wrong. */ signature.asc Description: OpenPGP digital signature
Bug#585392: mysql-server: MySQL Server segfaults after upgrade
What happens if you decrease this values: * key_buffer_size * read_buffer_size * sort_buffer_size * max_connections (to something like 30) Jun 10 09:46:06 gir mysqld[25223]: and this may fail. Jun 10 09:46:06 gir mysqld[25223]: Jun 10 09:46:06 gir mysqld[25223]: key_buffer_size=16777216 Jun 10 09:46:06 gir mysqld[25223]: read_buffer_size=131072 Jun 10 09:46:06 gir mysqld[25223]: max_used_connections=1 Jun 10 09:46:06 gir mysqld[25223]: max_connections=100 Jun 10 09:46:06 gir mysqld[25223]: threads_connected=1 Jun 10 09:46:06 gir mysqld[25223]: It is possible that mysqld could use up to Jun 10 09:46:06 gir mysqld[25223]: key_buffer_size + (read_buffer_size + sort_buffer_size)*max_connections = 233983 K Jun 10 09:46:06 gir mysqld[25223]: bytes of memory Jun 10 09:46:06 gir mysqld[25223]: Hope that's ok; if not, decrease some variables in the equation. -- /* Mit freundlichem Gruß / With kind regards, Patrick Matthäi GNU/Linux Debian Developer E-Mail: pmatth...@debian.org patr...@linux-dev.org Comment: Always if we think we are right, we were maybe wrong. */ signature.asc Description: OpenPGP digital signature
Processed: reassign 603371 tar 1.24-1
Processing commands for cont...@bugs.debian.org: reassign 603371 tar 1.24-1 Bug #603371 [amanda-server] amanda-server: Cannot guntar dump local volumes on server Bug reassigned from package 'amanda-server' to 'tar'. Bug No longer marked as found in versions amanda/1:3.1.0-1. Bug #603371 [tar] amanda-server: Cannot guntar dump local volumes on server Bug Marked as found in versions tar/1.24-1. End of message, stopping processing here. Please contact me if you need assistance. -- 603371: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603371 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: scummvm: FTBFS on kfreebsd-*: undefined reference to alsa stuff
Processing commands for cont...@bugs.debian.org: tags #600655 + patch Bug #600655 [src:scummvm] scummvm: FTBFS on kfreebsd-*: undefined reference to alsa stuff Added tag(s) patch. thanks Stopping processing here. Please contact me if you need assistance. -- 600655: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600655 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#600655: scummvm: FTBFS on kfreebsd-*: undefined reference to alsa stuff
tags #600655 + patch thanks Hello, kfbsd does not support alsa, so I have patched (see attachment) debian/rules to use --disable-alsa, if the build os is kfreebsd. I have didn't tested, if there are other FTBFS, but for this bug it should do it's job. -- /* Mit freundlichem Gruß / With kind regards, Patrick Matthäi GNU/Linux Debian Developer E-Mail: pmatth...@debian.org patr...@linux-dev.org Comment: Always if we think we are right, we were maybe wrong. */ diff -Naur scummvm-1.2.0.orig/debian/rules scummvm-1.2.0/debian/rules --- scummvm-1.2.0.orig/debian/rules 2010-10-17 16:01:38.0 +0200 +++ scummvm-1.2.0/debian/rules 2010-11-14 21:18:15.0 +0100 @@ -4,7 +4,8 @@ dh $@ override_dh_auto_configure: +ifeq ($(DEB_BUILD_ARCH_OS),kfreebsd) + ./configure --prefix=/usr --datadir=/usr/share/scummvm --disable-alsa +else ./configure --prefix=/usr --datadir=/usr/share/scummvm - - - +endif signature.asc Description: OpenPGP digital signature
Bug#601115: marked as done (adabrowse: FTBFS in squeeze: error: (/usr/lib/ada/adalib/asis/a4g-contt-dp.ali is obsolete and read-only))
Your message dated Sun, 14 Nov 2010 21:20:30 +0100 with message-id 8739r3r71t@ludovic-brenta.org and subject line Re: Bug#601115: adabrowse: FTBFS in squeeze: error: (/usr/lib/ada/adalib/asis/a4g-contt-dp.ali is obsolete and read-only) has caused the Debian Bug report #601115, regarding adabrowse: FTBFS in squeeze: error: (/usr/lib/ada/adalib/asis/a4g-contt-dp.ali is obsolete and read-only) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 601115: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601115 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: adabrowse Version: 4.0.3-4 Severity: serious Tags: squeeze sid User: debian...@lists.debian.org Usertags: qa-ftbfs-20101023 qa-ftbfs Justification: FTBFS on amd64 Hi, During a rebuild of all packages in a squeeze chroot, your package failed to build on amd64. Relevant part: /usr/bin/fakeroot debian/rules clean QUILT_PATCHES=debian/patches \ quilt --quiltrc /dev/null pop -a -R || test $? = 2 No patch removed rm -rf .pc debian/stamp-patched dh_testdir dh_testroot rm -rf obj adabrowse sdefault.adb ad-projects-impl_yes-get_parent.adb rm -f build-stamp dh_clean dpkg-source -b adabrowse-4.0.3 dpkg-source: warning: no source format specified in debian/source/format, see dpkg-source(1) dpkg-source: info: using source format `1.0' dpkg-source: info: building adabrowse using existing adabrowse_4.0.3.orig.tar.gz dpkg-source: info: building adabrowse in adabrowse_4.0.3-4.diff.gz dpkg-source: warning: ignoring deletion of file ad-projects-impl_yes-get_parent.adb dpkg-source: warning: ignoring deletion of file sdefault.adb dpkg-source: info: building adabrowse in adabrowse_4.0.3-4.dsc debian/rules build QUILT_PATCHES=debian/patches \ quilt --quiltrc /dev/null push -a || test $? = 2 Applying patch 01-gnatmake.patch patching file ad-driver.adb patching file ad-projects.ads Applying patch 02-use-gnatgcc.patch patching file ad-setup.ads Now at patch 02-use-gnatgcc.patch touch debian/stamp-patched dh_testdir mkdir -p obj gcc -c util-nl.c -o obj/util-nl.o -O2 gnatmake -j8 -Pdebian/misc/adabrowse.gpr gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/adabrowse.adb gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad.ads gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad-driver.adb ad-driver.adb:699:27: warning: VERBOSITY is already use-visible through package use clause at line 158 ad-driver.adb:1145:30: warning: FILE_ACCESS is already use-visible through package use clause at line 156 gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad-compiler.adb gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad-config.adb gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad-crossrefs.adb gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad-environment.adb gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad-exclusions.adb gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad-file_ops.adb gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad-filters.adb gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad-html.adb ad-crossrefs.adb:50:06: warning: redundant with clause in body ad-crossrefs.adb:52:06: warning: redundant with clause in body ad-crossrefs.adb:65:06: warning: redundant with clause in body ad-exclusions.adb:78:07: warning: K is not modified, could be declared constant gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad-indices.adb ad-html.adb:63:06: warning: redundant with clause in body gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA
Bug#601117: marked as done (adacontrol: FTBFS in squeeze: error: (/usr/lib/ada/adalib/asis/a4g-contt-dp.ali is obsolete and read-only))
Your message dated Sun, 14 Nov 2010 21:20:30 +0100 with message-id 8739r3r71t@ludovic-brenta.org and subject line Re: Bug#601115: adabrowse: FTBFS in squeeze: error: (/usr/lib/ada/adalib/asis/a4g-contt-dp.ali is obsolete and read-only) has caused the Debian Bug report #601117, regarding adacontrol: FTBFS in squeeze: error: (/usr/lib/ada/adalib/asis/a4g-contt-dp.ali is obsolete and read-only) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 601117: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601117 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: adacontrol Version: 1.12r4-1 Severity: serious Tags: squeeze sid User: debian...@lists.debian.org Usertags: qa-ftbfs-20101023 qa-ftbfs Justification: FTBFS on amd64 Hi, During a rebuild of all packages in a squeeze chroot, your package failed to build on amd64. Relevant part: /usr/bin/fakeroot debian/rules clean QUILT_PATCHES=debian/patches \ quilt --quiltrc /dev/null pop -a -R || test $? = 2 No patch removed rm -rf .pc debian/stamp-patched rm -rf adactl pfni ptree obj dh_clean dpkg-source -b adacontrol-1.12r4 dpkg-source: warning: no source format specified in debian/source/format, see dpkg-source(1) dpkg-source: info: using source format `1.0' dpkg-source: info: building adacontrol using existing adacontrol_1.12r4.orig.tar.gz dpkg-source: info: building adacontrol in adacontrol_1.12r4-1.diff.gz dpkg-source: info: building adacontrol in adacontrol_1.12r4-1.dsc debian/rules build QUILT_PATCHES=debian/patches \ quilt --quiltrc /dev/null push -a || test $? = 2 Applying patch info-dir-section.patch patching file doc/adacontrol_pm.info patching file doc/adacontrol_ug.info-1 Applying patch gps-integration.patch patching file GPS/zadactl.xml Applying patch build.patch patching file src/build.gpr Now at patch build.patch touch debian/stamp-patched gnatmake -j8 -p -Psrc/build.gpr object directory /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/../obj created gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/adactl.adb gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/adactl_options.adb gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/framework.adb gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/framework-language.adb gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/framework-reports.adb gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/framework-rules_manager.adb gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/thick_queries.adb gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/units_list.adb gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/utilities.adb utilities.adb:91:18: warning: others choice is redundant utilities.adb:91:18: warning: previous choices cover all values gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/a4g_bugs.adb gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/linear_queue.adb gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/framework-control_manager.adb gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/adactl_constants.ads gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/binary_map.adb gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/framework-control_manager-generic_context_iterator.ads gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA
Bug#603511: proftpd: cve-2010-4221 remote code execution vulnerability
Package: proftpd-dfsg Version: 1.3.1-17lenny4 Severity: grave Tags: security , patch Hi, the following CVE (Common Vulnerabilities Exposures) id was published for proftpd-dfsg. CVE-2010-4221[0]: | Multiple stack-based buffer overflows in the pr_netio_telnet_gets | function in netio.c in ProFTPD before 1.3.3c allow remote attackers to | execute arbitrary code via vectors involving a TELNET IAC escape | character to a (1) FTP or (2) FTPS server. Patch available: http://bugs.proftpd.org/show_bug.cgi?id=3521 If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4221 http://security-tracker.debian.org/tracker/CVE-2010-4221 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#603513: yui: multiple xss issues in included swf files
Package: yui Version: 2.5.0-1 Severity: grave Tags: security Hi, the following CVE (Common Vulnerabilities Exposures) ids were published for yui. CVE-2010-4207[0]: | Cross-site scripting (XSS) vulnerability in the Flash component | infrastructure in YUI 2.4.0 through 2.8.1, as used in Bugzilla, | Moodle, and other products, allows remote attackers to inject | arbitrary web script or HTML via vectors related to | charts/assets/charts.swf. CVE-2010-4208[1]: | Cross-site scripting (XSS) vulnerability in the Flash component | infrastructure in YUI 2.5.0 through 2.8.1, as used in Bugzilla, | Moodle, and other products, allows remote attackers to inject | arbitrary web script or HTML via vectors related to | uploader/assets/uploader.swf. CVE-2010-4209[2]: | Cross-site scripting (XSS) vulnerability in the Flash component | infrastructure in YUI 2.8.0 through 2.8.1, as used in Bugzilla 3.7.1 | through 3.7.3 and 4.1, allows remote attackers to inject arbitrary web | script or HTML via vectors related to swfstore/swfstore.swf. These are fixed in upstream 2.8.2. I couldn't find the patches, and you're going to need source for the affected swf files anyway (i.e. fix bug #591199 first). If you fix the vulnerabilities please also make sure to include the CVE ids in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4207 http://security-tracker.debian.org/tracker/CVE-2010-4207 [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4208 http://security-tracker.debian.org/tracker/CVE-2010-4208 [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4209 http://security-tracker.debian.org/tracker/CVE-2010-4209 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#600571: perl: Fails to complete unpack during installation
severity 600571 important thanks On Tue, Oct 19, 2010 at 09:35:28AM +0300, Niko Tyni wrote: On Mon, Oct 18, 2010 at 10:33:57AM +0100, Roger Leigh wrote: Package: perl Version: 5.10.1-15 Severity: serious Justification: Breaks installation While dist-upgrading my system today, the perl package failed to unpack/configure (transcript below) and hung for over an hour until I killed the dpkg process. After running dpkg --configure -a and apt-get -f install the package then continued to configure correctly. It looks like it was somehow stuck between unpacking and configuring. There was no response in the terminal to any keys (I tried hitting enter, but there was no response to the input, so maybe apt-get was doing something odd with termios if this wasn't a deliberate action by the perl maintainer scripts). This is very weird. No, the maintainer scripts of the perl package certainly don't mess with ptys in any way and actually do nothing at the unpack stage of an upgrade. There are no conffiles and no debconf usage either. The package seems to work for other people (10 days in unstable without other reports) and the changes in 5.10.1-15 seem unlikely to cause something like this. My best guess is that this is either a problem with your system or some corner case in apt-get / dpkg interaction but this is all just handwaving. Tagging as unreproducible, let's wait a while for any other reports. The package just migrated to squeeze so there should be plenty of people upgrading in the next few days. Now that we've seen 5.10.1-16 migrate to squeeze too after ten days in unstable and no other reports of anything like this, I think it's clear this is not an issue with the perl package. I'm downgrading the severity so that RC bughunters can concentrate on other things. TBH, I don't see much point in keeping the bug open at all. Roger, please let me know if you're OK with closing this or if you want it reassigned somewhere else. Personally I doubt the dpkg or apt maintainers can do much about it either. -- Niko Tyni nt...@debian.org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#600571: perl: Fails to complete unpack during installation
Processing commands for cont...@bugs.debian.org: severity 600571 important Bug #600571 [perl] perl: Fails to complete unpack during installation Severity set to 'important' from 'serious' thanks Stopping processing here. Please contact me if you need assistance. -- 600571: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600571 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#594119: marked as done (Upgrade path from Lenny to Squeeze is broken)
Your message dated Sun, 14 Nov 2010 20:53:31 + with message-id e1phjzr-00073k...@franck.debian.org and subject line Bug#594119: fixed in sympa 6.0.1+dfsg-3 has caused the Debian Bug report #594119, regarding Upgrade path from Lenny to Squeeze is broken to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 594119: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594119 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: sympa Version: 6.0.1+dfsg-2 Severity: critical {,family,bounce}queue binaries are now installed in /usr/lib/sympa/lib/sympa/ instead of /usr/lib/sympa/bin before. It will breaks mail aliases used by SYMPA during the upgrade from Lenny to Squeeze. It also means that the snippet installed in /etc/aliases can't work for now. M. -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, 'unstable'), (101, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.33-2-686 (SMP w/2 CPU cores) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash ---End Message--- ---BeginMessage--- Source: sympa Source-Version: 6.0.1+dfsg-3 We believe that the bug you reported is fixed in the latest version of sympa, which is due to be installed in the Debian FTP archive: sympa_6.0.1+dfsg-3.debian.tar.gz to main/s/sympa/sympa_6.0.1+dfsg-3.debian.tar.gz sympa_6.0.1+dfsg-3.dsc to main/s/sympa/sympa_6.0.1+dfsg-3.dsc sympa_6.0.1+dfsg-3_amd64.deb to main/s/sympa/sympa_6.0.1+dfsg-3_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 594...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Stefan Hornburg (Racke) ra...@linuxia.de (supplier of updated sympa package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 14 Nov 2010 21:16:36 +0100 Source: sympa Binary: sympa Architecture: source amd64 Version: 6.0.1+dfsg-3 Distribution: testing-proposed-updates Urgency: low Maintainer: Debian Sympa team pkg-sympa-de...@lists.alioth.debian.org Changed-By: Stefan Hornburg (Racke) ra...@linuxia.de Description: sympa - Modern mailing list manager Closes: 583307 583852 586821 590225 590337 590590 594119 Changes: sympa (6.0.1+dfsg-3) testing-proposed-updates; urgency=low . [ Stefan Hornburg (Racke) ] * Provide symbolic links for queue binaries to prevent broken mail aliases on upgrades from Lenny (Closes: #594119). . [ Emmanuel Bouthenot ] * Add or Update debconf translations: - Portuguese: Thanks to Miguel Figueiredo (Closes: #583307). - Spanish: Thanks to Francisco Javier Cuadrado (Closes: #583852). - Swedish: Thanks to Martin Bagge (Closes: #586821). - Japanese: Thanks to Hideki Yamane (Closes: #590225). - Czech: Thanks to Miroslav Kure (Closes: #590337). - Basque: Thanks to Iñaki Larrañaga Murgoitio (Closes: 590590). * Update copyright file with new and updated debconf translations. * Add a patch to disable the build of PO files previously removed from the DFSG sources (fix a FTBFS). Checksums-Sha1: 01e547999b119a71b53400b4b71a0714618b0321 1984 sympa_6.0.1+dfsg-3.dsc dfb40318b0b602c3af480e75f938d20acb1758f6 108701 sympa_6.0.1+dfsg-3.debian.tar.gz 8766ed4f5f650fb234428d4af501f54d516401f5 1153294 sympa_6.0.1+dfsg-3_amd64.deb Checksums-Sha256: 5b93155b9615b9216e6868ce660ac92158b0b56da3b64d1b7b9a6dee40c053ae 1984 sympa_6.0.1+dfsg-3.dsc 6d48fd1e76075edbb5e8b33e4b7778b2d679622c8b0bfdab93ce1cd1826f92a9 108701 sympa_6.0.1+dfsg-3.debian.tar.gz c18e5adfb0e0d8840129ff18f126ce488df21a4c876a051e73d5360c082ef5ec 1153294 sympa_6.0.1+dfsg-3_amd64.deb Files: 29aa78655c8d44f9742e6f60479d3168 1984 mail optional sympa_6.0.1+dfsg-3.dsc 04de41a5a9a2487b9678f57973558663 108701 mail optional sympa_6.0.1+dfsg-3.debian.tar.gz f887eb37acdde133127c0ae3a7ebacff 1153294 mail optional sympa_6.0.1+dfsg-3_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAkzgRa8ACgkQjgVfE5tya3GMWQCcDpLuh6ZDgrdx+oWYuhkPmv00 PJoAoIW9/rAqghmcw2egMMfLV9Vpjqiq =943A -END PGP SIGNATURE- ---End Message---
Bug#603511: marked as done (proftpd: cve-2010-4221 remote code execution vulnerability)
Your message dated Sun, 14 Nov 2010 22:10:12 +0100 with message-id 20101114211012.gq5...@radis.liafa.jussieu.fr and subject line Re: Bug#603511: proftpd: cve-2010-4221 remote code execution vulnerability has caused the Debian Bug report #603511, regarding proftpd: cve-2010-4221 remote code execution vulnerability to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 603511: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603511 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: proftpd-dfsg Version: 1.3.1-17lenny4 Severity: grave Tags: security , patch Hi, the following CVE (Common Vulnerabilities Exposures) id was published for proftpd-dfsg. CVE-2010-4221[0]: | Multiple stack-based buffer overflows in the pr_netio_telnet_gets | function in netio.c in ProFTPD before 1.3.3c allow remote attackers to | execute arbitrary code via vectors involving a TELNET IAC escape | character to a (1) FTP or (2) FTPS server. Patch available: http://bugs.proftpd.org/show_bug.cgi?id=3521 If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4221 http://security-tracker.debian.org/tracker/CVE-2010-4221 ---End Message--- ---BeginMessage--- On Sun, Nov 14, 2010 at 15:46:09 -0500, Michael Gilbert wrote: Package: proftpd-dfsg Version: 1.3.1-17lenny4 Severity: grave Tags: security , patch Hi, the following CVE (Common Vulnerabilities Exposures) id was published for proftpd-dfsg. CVE-2010-4221[0]: | Multiple stack-based buffer overflows in the pr_netio_telnet_gets | function in netio.c in ProFTPD before 1.3.3c allow remote attackers to | execute arbitrary code via vectors involving a TELNET IAC escape | character to a (1) FTP or (2) FTPS server. Sounds like a dupe of 602279, which is fixed in sid/squeeze and doesn't affect lenny. Please reopen if that's wrong. Cheers, Julien signature.asc Description: Digital signature ---End Message---
Bug#599333: marked as done (request-tracker3.8: $WebPath debconf variable is reset to its default value when upgrading package)
Your message dated Sun, 14 Nov 2010 21:28:13 + with message-id e1phk7r-0005ec...@franck.debian.org and subject line Bug#599333: fixed in request-tracker3.8 3.8.8-6 has caused the Debian Bug report #599333, regarding request-tracker3.8: $WebPath debconf variable is reset to its default value when upgrading package to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 599333: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599333 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: request-tracker3.8 Version: 3.8.8-5 Severity: normal We have $WebPath set to an empty string as we're hosting RT using virtual hosts (and hence no path dispatching is needed). The variable is set using debconf dialog. When upgrading the package this variable is reset to its default value, /rt. Other variables survive upgrading. I first faced this when I was upgrading stock request-tracking3.8 from Squeeze to the set of throw-away packages provided by Dominic to test his fix for #595054 (race condition), and now I encountered it again when upgrading to the actual version (containing the said fix). I'm not sure but possibly an empty string is treated in a somehow special manner by the debconf machinery or RT maintainer scripts. By the way when I was setting RT for the first time, I tried to set that variable to / as I thought it was a sensible way to specify no path component but it turned out RT disliked it and failed to find various resources such as images, styles and scripts, so I figured out an empty string works OK. -- Package-specific info: Changed files: There are locally modified files in /usr/local/share/request-tracker3.8/, these may (or may not) be the source of the problem. -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (990, 'testing'), (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.32-5-686 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages request-tracker3.8 depends on: ii dbconfig-common 1.8.46 common framework for packaging dat ii debconf [debconf-2.0] 1.5.35 Debian configuration management sy ii libapache-session-perl 1.87-1 Perl modules for keeping persisten ii libcache-simple-timedexpiry 0.27-2 Perl module to cache and expire ke ii libcalendar-simple-perl 1.21-1 module for producing simple calend ii libcgi-fast-perl5.10.1-14CGI::Fast Perl module ii libcgi-pm-perl 3.49-1 module for Common Gateway Interfac ii libclass-returnvalue-perl 0.55-1 A return-value object that lets yo ii libcss-squish-perl 0.09-1 module to compact many CSS files i ii libdata-ical-perl 0.16+dfsg-1 Perl module for manipulating iCale ii libdbi-perl 1.612-1 Perl Database Interface (DBI) ii libdbix-searchbuilder-perl 1.56-1 Perl implementation of a simple OR ii libdevel-stacktrace-perl1.2100-1 Perl module containing stack trace ii libemail-address-perl 1.889-2 RFC 2822 Address Parsing and Creat ii libfcgi-procmanager-perl0.18-2 Functions for managing FastCGI app ii libfile-sharedir-perl 1.00-0.1 Locate per-dist and per-module sha ii libgd-graph-perl1.44-3 Graph Plotting Module for Perl 5 ii libgd-text-perl 0.86-5 Text utilities for use with GD ii libgnupg-interface-perl 0.42-3 Perl interface to GnuPG ii libgraphviz-perl2.04-1 Perl interface to the GraphViz gra ii libhtml-mason-perl 1:1.44-1 HTML::Mason Perl module ii libhtml-parser-perl 3.66-1 collection of modules that parse H ii libhtml-rewriteattributes-p 0.03-1 concise attribute rewriting ii libhtml-scrubber-perl 0.08-4 Perl extension for scrubbing/sanit ii libipc-run-safehandles-perl 0.02-1 Use IPC::Run and IPC::Run3 safely ii libjs-prototype 1.6.1-1 JavaScript Framework for dynamic w ii libjs-scriptaculous 1.8.3-1 JavaScript library for dynamic web ii liblocale-maketext-fuzzy-pe 0.10-1 Maketext from already interpolated ii liblocale-maketext-lexicon- 0.82-1 lexicon-handling backends for Loca ii liblog-dispatch-perl2.22-1 Dispatches messages to multiple Lo ii libmailtools-perl 2.06-1 Manipulate email in perl programs ii libmime-tools-perl [libmime 5.428-1 Perl5 modules for MIME-compliant m ii
Bug#602570: marked as done (fails to install because of /etc/cron.d/ missing)
Your message dated Sun, 14 Nov 2010 21:28:13 + with message-id e1phk7r-0005ei...@franck.debian.org and subject line Bug#602570: fixed in request-tracker3.8 3.8.8-6 has caused the Debian Bug report #602570, regarding fails to install because of /etc/cron.d/ missing to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 602570: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602570 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: request-tracker3.8 Version: 3.8.8-5 Severity: serious Hi, if cron is not installed (because rt correctly doesn't declare a depends to it), and request-tracker3.8/install-cronjobs is answered yes, then the postinst fails because /etc/cron.d/ is missing. therefore, you should always create /etc/cron.d to make sure it exists. will send patch after having recieved the bug number. Regards, Daniel -- Address:Daniel Baumann, Burgunderstrasse 3, CH-4562 Biberist Email: daniel.baum...@panthera-systems.net Internet: http://people.panthera-systems.net/~daniel-baumann/ ---End Message--- ---BeginMessage--- Source: request-tracker3.8 Source-Version: 3.8.8-6 We believe that the bug you reported is fixed in the latest version of request-tracker3.8, which is due to be installed in the Debian FTP archive: request-tracker3.8_3.8.8-6.diff.gz to main/r/request-tracker3.8/request-tracker3.8_3.8.8-6.diff.gz request-tracker3.8_3.8.8-6.dsc to main/r/request-tracker3.8/request-tracker3.8_3.8.8-6.dsc request-tracker3.8_3.8.8-6_all.deb to main/r/request-tracker3.8/request-tracker3.8_3.8.8-6_all.deb rt3.8-apache2_3.8.8-6_all.deb to main/r/request-tracker3.8/rt3.8-apache2_3.8.8-6_all.deb rt3.8-clients_3.8.8-6_all.deb to main/r/request-tracker3.8/rt3.8-clients_3.8.8-6_all.deb rt3.8-db-mysql_3.8.8-6_all.deb to main/r/request-tracker3.8/rt3.8-db-mysql_3.8.8-6_all.deb rt3.8-db-postgresql_3.8.8-6_all.deb to main/r/request-tracker3.8/rt3.8-db-postgresql_3.8.8-6_all.deb rt3.8-db-sqlite_3.8.8-6_all.deb to main/r/request-tracker3.8/rt3.8-db-sqlite_3.8.8-6_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 602...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Dominic Hargreaves d...@earth.li (supplier of updated request-tracker3.8 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 14 Nov 2010 21:00:14 + Source: request-tracker3.8 Binary: request-tracker3.8 rt3.8-clients rt3.8-apache2 rt3.8-db-postgresql rt3.8-db-mysql rt3.8-db-sqlite Architecture: source all Version: 3.8.8-6 Distribution: unstable Urgency: low Maintainer: Debian Request Tracker Group pkg-request-tracker-maintain...@lists.alioth.debian.org Changed-By: Dominic Hargreaves d...@earth.li Description: request-tracker3.8 - extensible trouble-ticket tracking system rt3.8-apache2 - Apache 2 specific files for request-tracker3.8 rt3.8-clients - mail gateway and command-line interface to request-tracker3.8 rt3.8-db-mysql - MySQL database backend for request-tracker3.8 rt3.8-db-postgresql - PostgreSQL database backend for request-tracker3.8 rt3.8-db-sqlite - SQLite database backend for request-tracker3.8 Closes: 599333 602570 603247 Changes: request-tracker3.8 (3.8.8-6) unstable; urgency=low . * Make sure /etc/cron.d exists in postinst before installing cronjob, to cater for the case where cron is not installed (Closes: #602570) * Add cron-daemon to Recommends * Allow for an empty $WebPath config variable in debconf in debian/config (Closes: #599333) * Improve documentation for rt-dump-database and add pointers to UPGRADING in NOTES.Debian (Closes: #603247) Checksums-Sha1: 80470457fd7940ca5b7d9703f6845e8155dc4a6a 1596 request-tracker3.8_3.8.8-6.dsc 9591e71b101f7ad01a7c2668d464cd0fa8f33b29 72886 request-tracker3.8_3.8.8-6.diff.gz 19094fe4f82cc1d758273529f1ce163ff0baaf0f 4652822 request-tracker3.8_3.8.8-6_all.deb b1d3693b5d35507c10a5d2fe8c70e12335cf23f5 46578 rt3.8-clients_3.8.8-6_all.deb 8833d3f1e460fb700fc30a9d08572bec55a9cbd8 11880 rt3.8-apache2_3.8.8-6_all.deb 0f682c9f328f0f7d781b94d587a39356d81e06a2 10544 rt3.8-db-postgresql_3.8.8-6_all.deb 27cef63801400ea8816eb719e2bbb7d4447d78d5 10540
Bug#579523: pkgsel - Does not detect ENOSPC errors
On Sat, Jun 19, 2010 at 02:34:53PM +0100, Martin Michlmayr wrote: * Bastian Blank wa...@debian.org [2010-04-28 12:03]: On Mon, Apr 05, 2010 at 11:09:56PM +0200, Bastian Blank wrote: - 1GiB is not longer sufficient as /var as the to be installed packages are already larger. However there is no clear error shown after aptitude via tasksel (why does it need aptitude anyway?) hits ENOSPC. This sounds like #264903 in tasksel to me. Shall we merge the bugs, then? -Steve signature.asc Description: Digital signature
Bug#603237: #603237: python2.7-minimal: fails to configure with IOError: invalid Python installation: unable to open /usr/lib/python2.7/config/Makefile
Matthias Klose wrote: * Move the pyconfig.h file into the -min package, required by sysconfig. Thanks again. It works now. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#557495: Bug #557495 pending?
Hello, The freeze is quickly deepening and as Ralf Treinen noted, the bug has been marked as pending; can that be uploaded to resolve this? If not, I can prepare an NMU that just declares the undeclared package conflict which will resolve the bug. After the squeeze release, a more sophisticated solution can be uploaded. Cheers, -Steve signature.asc Description: Digital signature
Processed: Fwd: Re: Bug#603117: roarplaylistd: ..needs a wee jump starting 'touch /tmp/.rpld '
Processing commands for cont...@bugs.debian.org: severity #603117 grave Bug #603117 [roarplaylistd] roarplaylistd: ..needs a wee jump starting 'touch /tmp/.rpld ' Severity set to 'grave' from 'minor' merge #603042 #603117 Bug#603042: roarplaylistd: /tmp/.rpld may fail to materialize Bug#603117: roarplaylistd: ..needs a wee jump starting 'touch /tmp/.rpld ' Merged 603042 603117. thanks Stopping processing here. Please contact me if you need assistance. -- 603042: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603042 603117: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603117 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#594150: Bug#594153: Bug#594150: CURLOPT_TIMEOUT defaults to zero seconds
On Sun, Nov 14, 2010 at 03:17:16PM +, Simon McVittie wrote: On Sun, 14 Nov 2010 at 12:51:34 +0100, Daniel Stenberg wrote: This turned out to be a minor bug in curl, yes, and I've fixed it upstream now. Thanks! (https://github.com/bagder/curl/commit/cbf4961bf3e42d88f6489f981efd509faa86f501 for those following the Debian bug log) Wow, thanks a heap to Daniel and Simon for investigating this issue because it's been way over my head :-) My interest is in reducing the RC bug count to get squeeze released. So let me ask the questions: 1. There was a minor bug in curl now fixed upstream and in github; is there really an RC bug here? 2. If so, is it in curl or in apt-transport-https? Cheers, -Steve signature.asc Description: Digital signature
Processed: tagging 582964
Processing commands for cont...@bugs.debian.org: tags 582964 + patch Bug #582964 [cscope] emacs-install should be moved from cscope to cscope-el too Bug #603081 [cscope] cscope-el: fails to install Added tag(s) patch. Added tag(s) patch. thanks Stopping processing here. Please contact me if you need assistance. -- 582964: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582964 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#599966: Forwarding articles to moderators is broken / FTBFS
Hi, Marco: are you actively working on these issues? If not, I can prepare an NMU. Julien: have there been any more patches upstream for the moderator issue in addition to the two you pointed to? Thanks, -Steve signature.asc Description: Digital signature
Processed: tagging 570899, tagging 592678
Processing commands for cont...@bugs.debian.org: tags 570899 + sid Bug #570899 [src:gxemul] gxemul: FTBFS on kfreebsd-i386: 1 TESTS FAILED! Added tag(s) sid. tags 592678 + sid Bug #592678 [src:gxemul] gxemul: FTBFS on mips*: ../include/cpu.h:441: error: expected unqualified-id before numeric constant Added tag(s) sid. thanks Stopping processing here. Please contact me if you need assistance. -- 592678: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=592678 570899: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=570899 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#598135: Forwarding articles to moderators is broken / FTBFS
On Sun, Nov 14, 2010 at 04:41:31PM -0600, Steve M. Robbins wrote: Hi, Marco: are you actively working on these issues? If not, I can prepare an NMU. Hi again. I did a little digging for the FTBFS (#599966) and subsequently realized it only affects sid, so it's not required to release squeeze. Moreover, the current sid version of inn2 build-depends on libdb5.0-dev, which no longer exists in unstable (was replaced by 5.1) and was never in testing. So, rather than get mixed up in a libdb transition (if there is one), what do you think about uploading a fix for #598135 targeted only for testing that drops back to libdb 4.8? Cheers, -Steve signature.asc Description: Digital signature
Bug#600374: mokomaze: uses non-free, possibly non-distributable icons
Hello, On Sat, Oct 16, 2010 at 11:18:27PM +0800, Paul Wise wrote: I've forwarded this bug upstream so hopefully they will apply my patches and replace these icons with something DSFG-free. Paul, since you have made patches, could you upload a fixed version to Debian and resolve this RC bug? Thanks, -Steve signature.asc Description: Digital signature
Bug#600374: mokomaze: uses non-free, possibly non-distributable icons
On Sun, 2010-11-14 at 17:39 -0600, Steve M. Robbins wrote: On Sat, Oct 16, 2010 at 11:18:27PM +0800, Paul Wise wrote: I've forwarded this bug upstream so hopefully they will apply my patches and replace these icons with something DSFG-free. Paul, since you have made patches, could you upload a fixed version to Debian and resolve this RC bug? I should clarify. The patches I wrote are for other issues (mostly autotools cleanup). When I sent the patches upstream I also informed the maintainer about the non-free icons. I quote from our email exchange: On Sat, 2010-10-16 at 23:26 +0800, Paul Wise wrote: In addition it appears that the Blue Velvet icons you are using are non-free anyway and you and I do not have permission to modify them or distribute them on CD or anywhere else not on the Internet: http://bugs.debian.org/600374 http://dryicons.com/terms/free/ On Sat, 2010-10-16 at 20:43 +0400, Anton Olkhovik wrote: Yes, they are needed to be replaced, but I have no skill in drawing and I'm not familiar with any artist that will draw for free. Maybe some suitable icons can be found within KDE/Gnome themes. Anton, did you make any progress in finding some replacements? -- bye, pabs http://wiki.debian.org/PaulWise signature.asc Description: This is a digitally signed message part
Processed: severity of 601568 is serious
Processing commands for cont...@bugs.debian.org: severity 601568 serious Bug #601568 {Done: Charles Plessy ple...@debian.org} [bwa] bwa: Bug in scoring matrix incurs errors in indel calling. Severity set to 'serious' from 'important' End of message, stopping processing here. Please contact me if you need assistance. -- 601568: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601568 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org