Bug#698112: asterisk: Segfault when making a call after update to 1.6.2.9-2+squeeze9
Package: asterisk Version: 1:1.6.2.9-2+squeeze8 Severity: grave Justification: renders package unusable asterisk crashes when placing a call after a update to recent versions with apt-get Upgrade: asterisk:i386 (1.6.2.9-2+squeeze8, 1.6.2.9-2+squeeze9), asterisk-sounds-main:i386 (1.6.2.9-2+squeeze8, 1.6.2.9-2+squeeze9), asterisk-config:i386 (1.6.2.9-2+squeeze8, 1.6.2.9-2+squeeze9) Error: [9058168.846934] asterisk[2585]: segfault at 1 ip b7493b77 sp b5415684 error 4 in libc-2.11.3.so[b741e000+14] [9058212.632085] asterisk[2709]: segfault at 1 ip b748db77 sp b540f684 error 4 in libc-2.11.3.so[b7418000+14] -- System Information: Debian Release: 6.0.6 Architecture: i386 (i686) Kernel: Linux 2.6.32-5-686 (SMP w/4 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages asterisk depends on: ii adduser3.112+nmu2add and remove users and groups ii asterisk-config1:1.6.2.9-2+squeeze8 Configuration files for Asterisk ii asterisk-sounds-ma 1:1.6.2.9-2+squeeze8 Core Sound files for Asterisk (Eng ii dahdi 1:2.2.1.1-1 utilities for using the DAHDI kern ii libasound2 1.0.23-2.1shared library for ALSA applicatio ii libc-client2007e 8:2007e~dfsg-3.1 c-client library for mail protocol ii libc6 2.11.3-4 Embedded GNU C Library: Shared lib ii libcap21:2.19-3 support for getting/setting POSIX. ii libcurl3 7.21.0-2.1+squeeze2 Multi-protocol file transfer libra ii libgcc11:4.4.5-8 GCC support library ii libglib2.0-0 2.24.2-1 The GLib library of C routines ii libgmime-2.0-2a2.2.25-2 MIME library ii libgsm11.0.13-3 Shared libraries for GSM speech co ii libiksemel31.2-4 C library for the Jabber IM platfo ii libjack-jackd2-0 [ 1.9.6~dfsg.1-2JACK Audio Connection Kit (librari ii libldap-2.4-2 2.4.23-7.2OpenLDAP libraries ii liblua5.1-05.1.4-5 Simple, extensible, embeddable pro ii libncurses55.7+20100313-5shared libraries for terminal hand ii libnewt0.520.52.11-1 Not Erik's Windowing Toolkit - tex ii libogg01.2.0~dfsg-1 Ogg bitstream library ii libopenais31.1.2-2 Standards-based cluster framework ii libopenr2-31.3.0-2 MFC/R2 (telephony) call setup libr ii libpopt0 1.16-1lib for parsing cmdline parameters ii libpq5 8.4.13-0squeeze1 PostgreSQL C client library ii libpri1.4 1.4.11.3-1Primary Rate ISDN specification li ii libradiusclient-ng 0.5.6-1.1 Enhanced RADIUS client library ii libresample1 0.1.3-3 real-time audio resampling library ii libsdl1.2debian1.2.14-6.1Simple DirectMedia Layer ii libsnmp15 5.4.3~dfsg-2 SNMP (Simple Network Management Pr ii libspandsp20.0.6~pre12-1 Telephony signal processing librar ii libspeex1 1.2~rc1-1 The Speex codec runtime library ii libspeexdsp1 1.2~rc1-1 The Speex extended runtime library ii libsqlite0 2.8.17-6 SQLite shared library ii libss7-1 1.0.2-1 Signalling System 7 (ss7) library ii libssl0.9.80.9.8o-4squeeze13 SSL shared libraries ii libstdc++6 4.4.5-8 The GNU Standard C++ Library v3 ii libsybdb5 0.82-7libraries for connecting to MS SQL ii libtiff4 3.9.4-5+squeeze8 Tag Image File Format (TIFF) libra ii libtonezone2.0 1:2.2.1.1-1 tonezone library (runtime) ii libvorbis0a1.3.1-1+squeeze1 The Vorbis General Audio Compressi ii libvorbisenc2 1.3.1-1+squeeze1 The Vorbis General Audio Compressi ii libvpb04.2.52-2 Voicetronix telephony hardware use ii libx11-6 2:1.3.3-4 X11 client-side library ii libxml22.7.8.dfsg-2+squeeze6 GNOME XML library ii unixodbc 2.2.14p2-1ODBC tools libraries ii zlib1g 1:1.2.3.4.dfsg-3 compression library - runtime Versions of packages asterisk recommends: ii sox 14.3.1-1 Swiss army knife of sound processi Versions of packages asterisk suggests: pn asterisk-dev none (no description available) pn asterisk-doc none (no description available) pn asterisk-h323 none (no description available) -- Configuration Files: /etc/default/asterisk changed [not included] /etc/logrotate.d/asterisk changed [not included] -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of
Bug#698115: dcap and dicom3tools: error when trying to install together
Package: dicom3tools,dcap Version: dicom3tools/1.0~20121227-1 Version: dcap/2.47.7-1 Severity: serious User: trei...@debian.org Usertags: edos-file-overwrite Date: 2013-01-14 Architecture: amd64 Distribution: sid Hi, automatic installation tests of packages that share a file and at the same time do not conflict by their package dependency relationships has detected the following problem: WARNING: The following packages cannot be authenticated! libdcap1 dcap dicom3tools Authentication warning overridden. Can not write log, openpty() failed (/dev/pts not mounted?) Selecting previously unselected package libdcap1. (Reading database ... 10762 files and directories currently installed.) Unpacking libdcap1 (from .../libdcap1_2.47.7-1_amd64.deb) ... Selecting previously unselected package dcap. Unpacking dcap (from .../dcap_2.47.7-1_amd64.deb) ... Selecting previously unselected package dicom3tools. Unpacking dicom3tools (from .../dicom3tools_1.0~20121227-1_amd64.deb) ... dpkg: error processing /var/cache/apt/archives/dicom3tools_1.0~20121227-1_amd64.deb (--unpack): trying to overwrite '/usr/share/man/man1/dccp.1.gz', which is also in package dcap 2.47.7-1 dpkg-deb: error: subprocess paste was killed by signal (Broken pipe) Processing triggers for man-db ... Errors were encountered while processing: /var/cache/apt/archives/dicom3tools_1.0~20121227-1_amd64.deb E: Sub-process /usr/bin/dpkg returned an error code (1) This is a serious bug as it makes installation fail, and violates sections 7.6.1 and 10.1 of the policy. An optimal solution would consist in only one of the packages installing that file, and renaming or removing the file in the other package. Depending on the circumstances you might also consider Replace relations or file diversions. If the conflicting situation cannot be resolved then, as a last resort, the two packages have to declare a mutual Conflict. Please take into account that Replaces, Conflicts and diversions should only be used when packages provide different implementations for the same functionality. Here is a list of files that are known to be shared by both packages (according to the Contents file for sid/amd64, which may be slightly out of sync): /usr/bin/dccp /usr/share/man/man1/dccp.1.gz This bug has been filed against both packages. If you, the maintainers of the two packages in question, have agreed on which of the packages will resolve the problem please reassign the bug to that package. You may then also register in the BTS that the other package is affected by the bug. -Ralf. PS: for more information about the detection of file overwrite errors of this kind see http://edos.debian.net/file-overwrites/. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698108: jdk7u11 not supported
Hi, This problem seems related to http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=597294. For oracle jdk 1.6 2 digits update numbers are supported, but for 1.7 only 1 digits is supported. /usr/share/java-package/oracle-j2sdk.sh contains 'jdk-7u[0-9]-linux-i586.tar.gz' instead of 'jdk-7u[0-9][0-9]-linux-i586.tar.gz' and 'jdk-7u[0-9][0-9]-linux-x64.tar.gz' instead of 'jdk-7u[0-9]-linux-x64.tar.gz'.
Bug#693577: libfso-glib: not properly built from source (actual source is in fso-specs)
On 13/01/13 00:25, Paul Wise wrote: On Sat, 2013-01-12 at 21:44 +, Simon McVittie wrote: This sounds very familiar. I considered this approach for Telepathy, but rejected it because of problems like this. BTW, Debian strongly discourages embedded code copies: https://wiki.debian.org/EmbeddedCodeCopies I know, but D-Bus interface XML is pretty far from being code - the closest equivalent that you'd call code would be C headers that don't have any inline functions or macros. It can't have bugs other than design flaws and feature requests, and the closest it can get to a security bug is implementations of this method that obey its documentation can't be secure (which would still be a bug in the implementation, IMO). Personally, I think the solution is to merge the specs into the library source package and drop the specs source package. If there's only one library, this is functionally equivalent; in Debian, telepathy-spec is only provided as documentation. Unless the specs are used in multiple source packages, then the solution is the one used by libshr-glib (use Built-Using and don't ship pre-generated files). Not shipping pre-generated files, sure. Telepathy doesn't do that either; we do the code-generation at build-time. I still think importing D-Bus interfaces from another source package, if they affect your ABI, is actively harmful: it makes the ABI of the current source package depend on an external factor. To make the ABI predictable you'd need a (= something) dependency, at which point you'd have to do sourceful uploads of every affected package in lockstep. S -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698112: asterisk: Segfault when making a call after update to 1.6.2.9-2+squeeze9
On Mon, Jan 14, 2013 at 08:38:35AM +0100, Dennis Rech wrote: Package: asterisk Version: 1:1.6.2.9-2+squeeze8 Severity: grave Justification: renders package unusable asterisk crashes when placing a call after a update to recent versions with apt-get Upgrade: asterisk:i386 (1.6.2.9-2+squeeze8, 1.6.2.9-2+squeeze9), asterisk-sounds-main:i386 (1.6.2.9-2+squeeze8, 1.6.2.9-2+squeeze9), asterisk-config:i386 (1.6.2.9-2+squeeze8, 1.6.2.9-2+squeeze9) Error: [9058168.846934] asterisk[2585]: segfault at 1 ip b7493b77 sp b5415684 error 4 in libc-2.11.3.so[b741e000+14] [9058212.632085] asterisk[2709]: segfault at 1 ip b748db77 sp b540f684 error 4 in libc-2.11.3.so[b7418000+14] How asy is this issue to reproduce? What type of call? SIP? TCP? Could you please install asterisk-dbg and gdb, run asterisk as: cd /var/spool/asterisk asterisk -U asterisk -g -c and reproduce the issue Then run: gdb -c core /usr/sbin/asterisk and in the prompt of gdb run: bt bt full and provide the output here. -- Tzafrir Cohen icq#16849755 jabber:tzafrir.co...@xorcom.com +972-50-7952406 mailto:tzafrir.co...@xorcom.com http://www.xorcom.com iax:gu...@local.xorcom.com/tzafrir -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698118: asterisk: version 1:1.6.2.9-2+squeeze9 crashes on SIP call, +squeeze6 does not
Package: asterisk Version: 1:1.6.2.9-2+squeeze9 Severity: grave Justification: renders package unusable I have a production, fully working asterisk server. I use many Siemens C470IP cordless phones on the office, they are SIP peers in my asterisk installation. I had asterisk and asterisk-config version 1:1.6.2.9-2+squeeze6 installed, and all was working nicely. Today, I updated to 1.6.2.9-2+squeeze9 and found out that asterisk seems working, but as soon as I do a SIP call with the cordless, asterisk crashes suddenly. I reverted to 1.6.2.9-2+squeeze6 since this is a production asterisk and I can't have downtimes. This is Debian Stable! A package should not break like this :( Cheers, Diego Guella -- System Information: Debian Release: 6.0.6 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/4 CPU cores) Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages asterisk depends on: ii adduser3.112+nmu2add and remove users and groups ii asterisk-config1:1.6.2.9-2+squeeze9 Configuration files for Asterisk ii asterisk-core-soun 1.4.19-1 asterisk PBX sound files - English ii dahdi 1:2.2.1.1-1 utilities for using the DAHDI kern ii libasound2 1.0.23-2.1shared library for ALSA applicatio ii libc-client2007e 8:2007e~dfsg-3.1 c-client library for mail protocol ii libc6 2.11.3-4 Embedded GNU C Library: Shared lib ii libcap21:2.19-3 support for getting/setting POSIX. ii libcurl3 7.21.0-2.1+squeeze2 Multi-protocol file transfer libra ii libgcc11:4.4.5-8 GCC support library ii libglib2.0-0 2.24.2-1 The GLib library of C routines ii libgmime-2.0-2a2.2.25-2 MIME library ii libgsm11.0.13-3 Shared libraries for GSM speech co ii libiksemel31.2-4 C library for the Jabber IM platfo ii libjack-jackd2-0 [ 1.9.6~dfsg.1-2JACK Audio Connection Kit (librari ii libldap-2.4-2 2.4.23-7.2OpenLDAP libraries ii liblua5.1-05.1.4-5 Simple, extensible, embeddable pro ii libncurses55.7+20100313-5shared libraries for terminal hand ii libnewt0.520.52.11-1 Not Erik's Windowing Toolkit - tex ii libogg01.2.0~dfsg-1 Ogg bitstream library ii libopenais31.1.2-2 Standards-based cluster framework ii libopenr2-31.3.0-2 MFC/R2 (telephony) call setup libr ii libpopt0 1.16-1lib for parsing cmdline parameters ii libpq5 8.4.13-0squeeze1 PostgreSQL C client library ii libpri1.4 1.4.11.3-1Primary Rate ISDN specification li ii libradiusclient-ng 0.5.6-1.1 Enhanced RADIUS client library ii libresample1 0.1.3-3 real-time audio resampling library ii libsdl1.2debian1.2.14-6.1Simple DirectMedia Layer ii libsnmp15 5.4.3~dfsg-2 SNMP (Simple Network Management Pr ii libspandsp20.0.6~pre12-1 Telephony signal processing librar ii libspeex1 1.2~rc1-1 The Speex codec runtime library ii libspeexdsp1 1.2~rc1-1 The Speex extended runtime library ii libsqlite0 2.8.17-6 SQLite shared library ii libss7-1 1.0.2-1 Signalling System 7 (ss7) library ii libssl0.9.80.9.8o-4squeeze13 SSL shared libraries ii libstdc++6 4.4.5-8 The GNU Standard C++ Library v3 ii libsybdb5 0.82-7libraries for connecting to MS SQL ii libtiff4 3.9.4-5+squeeze8 Tag Image File Format (TIFF) libra ii libtonezone2.0 1:2.2.1.1-1 tonezone library (runtime) ii libvorbis0a1.3.1-1+squeeze1 The Vorbis General Audio Compressi ii libvorbisenc2 1.3.1-1+squeeze1 The Vorbis General Audio Compressi ii libvpb04.2.52-2 Voicetronix telephony hardware use ii libx11-6 2:1.3.3-4 X11 client-side library ii libxml22.7.8.dfsg-2+squeeze6 GNOME XML library ii unixodbc 2.2.14p2-1ODBC tools libraries ii zlib1g 1:1.2.3.4.dfsg-3 compression library - runtime Versions of packages asterisk recommends: ii sox 14.3.1-1+b1 Swiss army knife of sound processi Versions of packages asterisk suggests: pn asterisk-dev none (no description available) pn asterisk-doc none (no description available) pn asterisk-h323 none (no description available) -- Configuration Files: /etc/logrotate.d/asterisk changed:
Bug#698112: asterisk: Segfault when making a call after update to 1.6.2.9-2+squeeze9
I've tried it on another system. Heres the output: Core was generated by `asterisk -U asterisk -g -c'. Program terminated with signal 11, Segmentation fault. #0 0xb74e8b77 in strchrnul () from /lib/i686/cmov/libc.so.6 (gdb) bt #0 0xb74e8b77 in strchrnul () from /lib/i686/cmov/libc.so.6 #1 0xb74afd78 in vfprintf () from /lib/i686/cmov/libc.so.6 #2 0xb74d2e30 in vsnprintf () from /lib/i686/cmov/libc.so.6 #3 0x080a683a in ast_devstate_changed (state=AST_DEVICE_UNKNOWN, cachable=AST_DEVSTATE_CACHABLE, fmt=0x1 Address 0x1 out of bounds) at devicestate.c:524 #4 0xb5b7d4be in update_call_counter (fup=value optimized out, event=value optimized out) at chan_sip.c:5914 #5 0xb5baa61b in handle_request_invite (p=value optimized out, req=value optimized out, debug=0, seqno=38802, sin=0xb54a822c, recount=0xb54a7cbc, e=0xb4f97793 sip:3...@obelisk.wikon.de;user=phone, nounlock=0xb54a7cb8) at chan_sip.c:20297 #6 0xb5bb1000 in handle_incoming (p=value optimized out, req=value optimized out, sin=0xb54a822c, recount=0xb54a7cbc, nounlock=0xb54a7cb8) at chan_sip.c:21984 #7 0xb5bb22e0 in handle_request_do (req=value optimized out, sin=value optimized out) at chan_sip.c:22296 #8 0xb5bb3af0 in sipsock_read (id=0x878a388, fd=13, events=1, ignore=0x0) at chan_sip.c:22185 #9 0x080cf2e5 in ast_io_wait (ioc=0x8750b60, howlong=1000) at io.c:288 #10 0xb5b8a273 in do_monitor (data=0x0) at chan_sip.c:22757 #11 0x0812ddc7 in dummy_start (data=0x878a7a0) at utils.c:967 #12 0xb732d955 in start_thread () from /lib/i686/cmov/libpthread.so.0 #13 0xb753f1de in clone () from /lib/i686/cmov/libc.so.6 (gdb) bt full #0 0xb74e8b77 in strchrnul () from /lib/i686/cmov/libc.so.6 No symbol table info available. #1 0xb74afd78 in vfprintf () from /lib/i686/cmov/libc.so.6 No symbol table info available. #2 0xb74d2e30 in vsnprintf () from /lib/i686/cmov/libc.so.6 No symbol table info available. #3 0x080a683a in ast_devstate_changed (state=AST_DEVICE_UNKNOWN, cachable=AST_DEVSTATE_CACHABLE, fmt=0x1 Address 0x1 out of bounds) at devicestate.c:524 buf = \000mJ\265\000mJ\265\340lJ\265\270\207\371\264\Marco Spann\ sip:65\000ob`\030L\267\370mJ\265w\376\062\267\000\000\000\000i\022\063\267phon\324\302M\267ag=c\023\034\000\000\364_[\267 #4 0xb5b7d4be in update_call_counter (fup=value optimized out, event=value optimized out) at chan_sip.c:5914 name = 65, '\000' repeats 78 times, P3x\b\000\000\000\000xnJ\265\024}J\265\000\000\000\000\360|J\265\000\000\000\000\200w\371\264\017\000\000\000\224@\273\265\f\000\000\000rz\371\264, '\000' repeats 12 times, p\206\274\265\241z\371\264\000\000\000\000\310nJ\265\246.\265\265\274nJ\265\002\000\023\242\254\036\325\005p\206\274\265\241z\371\264\242\023\000\000\000\000\000\000\005\000\000\000\001\000\000\000\377\377\377\377\000\000\000\000\003, '\000' repeats 23 times, \017\001\000\000\001\000\000\000\016, '\000' repeats 11 times, XvJ\265p\206\274\265 outgoing = 0 p = 0x8796368 __PRETTY_FUNCTION__ = update_call_counter #5 0xb5baa61b in handle_request_invite (p=value optimized out, req=value optimized out, debug=0, seqno=38802, sin=0xb54a822c, recount=0xb54a7cbc, e=0xb4f97793 sip:3...@obelisk.wikon.de;user=phone, nounlock=0xb54a7cb8) at chan_sip.c:20297 res = value optimized out gotdest = -1253413064 p_replaces = value optimized out replace_id = value optimized out refer_locked = 0 required = 0xb5bb779a required_profile = value optimized out c = value optimized out reinvite = -1245936016 rtn = value optimized out p_uac_se_hdr = value optimized out p_uac_min_se = value optimized out uac_max_se = -1 uac_min_se = -1 st_active = value optimized out st_interval = -1246005350 st_ref = SESSION_TIMER_REFRESHER_AUTO dlg_min_se = value optimized out pickup = {exten = '\000' repeats 79 times, context = '\000' repeats 79 times} __PRETTY_FUNCTION__ = handle_request_invite #6 0xb5bb1000 in handle_incoming (p=value optimized out, req=value optimized out, sin=0xb54a822c, recount=0xb54a7cbc, nounlock=0xb54a7cb8) at chan_sip.c:21984 cmd = value optimized out cseq = value optimized out useragent = value optimized out seqno = 38802 len = value optimized out respid = value optimized out res = value optimized out debug = 0 e = value optimized out oldmethod = 6 acked = value optimized out __PRETTY_FUNCTION__ = handle_incoming #7 0xb5bb22e0 in handle_request_do (req=value optimized out, sin=value optimized out) at chan_sip.c:22296 p = value optimized out recount = 0 nounlock = 0 lockretry = 10 __PRETTY_FUNCTION__ = handle_request_do #8 0xb5bb3af0 in sipsock_read (id=0x878a388, fd=13, events=1, ignore=0x0) at chan_sip.c:22185 req = {rlPart1 = 0,
Bug#698112: Segfault when making a call after update to 1.6.2.9-2+squeeze9
Package: asterisk Severity: normal Got more details with gdb, using asterisk debugging procedure (bt, bt full, and thread apply all bt): #0 0xb74fbb77 in strchrnul () from /lib/i686/cmov/libc.so.6 #1 0xb74c2d78 in vfprintf () from /lib/i686/cmov/libc.so.6 #2 0xb74e5e30 in vsnprintf () from /lib/i686/cmov/libc.so.6 #3 0x080a683a in ast_devstate_changed () #4 0xb69384be in ?? () from /usr/lib/asterisk/modules/chan_sip.so #5 0xb696561b in ?? () from /usr/lib/asterisk/modules/chan_sip.so #6 0xb696c000 in ?? () from /usr/lib/asterisk/modules/chan_sip.so #7 0xb696d2e0 in ?? () from /usr/lib/asterisk/modules/chan_sip.so #8 0xb696eaf0 in ?? () from /usr/lib/asterisk/modules/chan_sip.so #9 0x080cf2e5 in ast_io_wait () #10 0xb6945273 in ?? () from /usr/lib/asterisk/modules/chan_sip.so #11 0x0812ddc7 in ?? () #12 0xb7340955 in start_thread () from /lib/i686/cmov/libpthread.so.0 #13 0xb75521de in clone () from /lib/i686/cmov/libc.so.6 #0 0xb74fbb77 in strchrnul () from /lib/i686/cmov/libc.so.6 No symbol table info available. #1 0xb74c2d78 in vfprintf () from /lib/i686/cmov/libc.so.6 No symbol table info available. #2 0xb74e5e30 in vsnprintf () from /lib/i686/cmov/libc.so.6 No symbol table info available. #3 0x080a683a in ast_devstate_changed () No symbol table info available. #4 0xb69384be in ?? () from /usr/lib/asterisk/modules/chan_sip.so No symbol table info available. #5 0xb696561b in ?? () from /usr/lib/asterisk/modules/chan_sip.so No symbol table info available. #6 0xb696c000 in ?? () from /usr/lib/asterisk/modules/chan_sip.so No symbol table info available. #7 0xb696d2e0 in ?? () from /usr/lib/asterisk/modules/chan_sip.so No symbol table info available. #8 0xb696eaf0 in ?? () from /usr/lib/asterisk/modules/chan_sip.so No symbol table info available. #9 0x080cf2e5 in ast_io_wait () No symbol table info available. #10 0xb6945273 in ?? () from /usr/lib/asterisk/modules/chan_sip.so No symbol table info available. #11 0x0812ddc7 in ?? () No symbol table info available. #12 0xb7340955 in start_thread () from /lib/i686/cmov/libpthread.so.0 No symbol table info available. #13 0xb75521de in clone () from /lib/i686/cmov/libc.so.6 No symbol table info available. Thread 37 (Thread 7401): #0 0xb777b424 in __kernel_vsyscall () #1 0xb7344fcf in pthread_cond_wait@@GLIBC_2.3.2 () from /lib/i686/cmov/libpthread.so.0 #2 0xb755f14d in pthread_cond_wait () from /lib/i686/cmov/libc.so.6 #3 0x080d552c in ?? () #4 0x0812ddc7 in ?? () #5 0xb7340955 in start_thread () from /lib/i686/cmov/libpthread.so.0 #6 0xb75521de in clone () from /lib/i686/cmov/libc.so.6 Thread 36 (Thread 7427): #0 0xb777b424 in __kernel_vsyscall () #1 0xb75449a6 in poll () from /lib/i686/cmov/libc.so.6 #2 0x080cf27c in ast_io_wait () #3 0xb6646ac3 in ?? () from /usr/lib/asterisk/modules/chan_iax2.so #4 0x0812ddc7 in ?? () #5 0xb7340955 in start_thread () from /lib/i686/cmov/libpthread.so.0 #6 0xb75521de in clone () from /lib/i686/cmov/libc.so.6 Thread 35 (Thread 7398): #0 0xb777b424 in __kernel_vsyscall () #1 0xb754309b in read () from /lib/i686/cmov/libc.so.6 #2 0x0813adf6 in ?? () #3 0x08136458 in el_getc () #4 0x0813665f in el_gets () #5 0x08078770 in main () Thread 34 (Thread 7431): #0 0xb777b424 in __kernel_vsyscall () #1 0xb751d2a6 in nanosleep () from /lib/i686/cmov/libc.so.6 #2 0xb67ef86b in ?? () from /usr/lib/asterisk/modules/func_lock.so #3 0x0812ddc7 in ?? () #4 0xb7340955 in start_thread () from /lib/i686/cmov/libpthread.so.0 #5 0xb75521de in clone () from /lib/i686/cmov/libc.so.6 Thread 33 (Thread 7430): #0 0xb777b424 in __kernel_vsyscall () #1 0xb75449a6 in poll () from /lib/i686/cmov/libc.so.6 #2 0x080cf27c in ast_io_wait () #3 0xb6772a9e in ?? () from /usr/lib/asterisk/modules/chan_unistim.so #4 0x0812ddc7 in ?? () #5 0xb7340955 in start_thread () from /lib/i686/cmov/libpthread.so.0 #6 0xb75521de in clone () from /lib/i686/cmov/libc.so.6 Thread 32 (Thread 7429): #0 0xb777b424 in __kernel_vsyscall () #1 0xb754b361 in select () from /lib/i686/cmov/libc.so.6 #2 0xb62456a3 in ?? () from /usr/lib/asterisk/modules/chan_phone.so #3 0x0812ddc7 in ?? () #4 0xb7340955 in start_thread () from /lib/i686/cmov/libpthread.so.0 #5 0xb75521de in clone () from /lib/i686/cmov/libc.so.6 Thread 31 (Thread 7428): #0 0xb777b424 in __kernel_vsyscall () #1 0xb75449a6 in poll () from /lib/i686/cmov/libc.so.6 #2 0xb602d0c4 in ?? () from /usr/lib/asterisk/modules/chan_dahdi.so #3 0x0812ddc7 in ?? () #4 0xb7340955 in start_thread () from /lib/i686/cmov/libpthread.so.0 #5 0xb75521de in clone () from /lib/i686/cmov/libc.so.6 Thread 30 (Thread 7426): #0 0xb777b424 in __kernel_vsyscall () #1 0xb7344fcf in pthread_cond_wait@@GLIBC_2.3.2 () from /lib/i686/cmov/libpthread.so.0 #2 0xb755f14d in pthread_cond_wait () from /lib/i686/cmov/libc.so.6 #3 0xb66713b6 in ?? () from /usr/lib/asterisk/modules/chan_iax2.so #4 0x0812ddc7 in ?? () #5 0xb7340955 in start_thread () from /lib/i686/cmov/libpthread.so.0
Processed: affects 698118
Processing commands for cont...@bugs.debian.org: affects 698118 + security.debian.org release.debian.org Bug #698118 [asterisk] asterisk: version 1:1.6.2.9-2+squeeze9 crashes on SIP call, +squeeze6 does not Added indication that 698118 affects security.debian.org and release.debian.org thanks Stopping processing here. Please contact me if you need assistance. -- 698118: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698118 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698112: confirmation
Hi, I can confirm this on i386 virtual machine: Jan 14 09:13:28 ipbx kernel: [8686326.314568] asterisk[21321]: segfault at 1 ip b7501b77 sp b53dd684 error 4 in libc-2.11.3.so[b748c000+14] Jan 14 09:29:12 ipbx kernel: [ 167.335659] asterisk[1181]: segfault at 1 ip b751ab77 sp b53ba684 error 4 in libc-2.11.3.so[b74a5000+14] Jan 14 09:33:51 ipbx kernel: [ 36.331820] asterisk[1001]: segfault at 1 ip b7477b77 sp b5319684 error 4 in libc-2.11.3.so[b7402000+14] I have downgraded to revision 2+squeeze8 Regards -- Zito -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: tagging 697150
Processing commands for cont...@bugs.debian.org: tags 697150 + sid Bug #697150 [mtpfs] mtpfs should not depends on fuse-utils but on fuse Added tag(s) sid. thanks Stopping processing here. Please contact me if you need assistance. -- 697150: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697150 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: severity of 697150 is serious
Processing commands for cont...@bugs.debian.org: severity 697150 serious Bug #697150 [mtpfs] mtpfs should not depends on fuse-utils but on fuse Severity set to 'serious' from 'important' thanks Stopping processing here. Please contact me if you need assistance. -- 697150: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697150 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698112: Segfault when making a call after update to 1.6.2.9-2+squeeze9
Hello. Same thing here. When I make a call from my SIP phone (UDP) asterisk (1.6.2.9-2+squeeze9, arch amd64) crashes and segfaults : Jan 13 23:18:23 hestia kernel: [42381160.134024] asterisk[2811]: segfault at 0 ip 7fdaa3213f2a sp 7fda7bbf4968 error 4 in libc-2.11.3.so[7fdaa3193000+159000] Regards, Pierre Tourbeaux -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#697150: mtpfs should not depends on fuse-utils but on fuse
Hi This now implies that mtpfs is not installable anymore in sid, as fuse-utils transitional package was droppen in unstable. I have increased thus the severity. Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698112: asterisk: Segfault when making a call after update to 1.6.2.9-2+squeeze9
Dear Mr. Cohen, after the update to squeeze9, the asterisk process restarts fine. When someone does a SIP call, the asterisk process immediately terminates with the described segmentation fault (according to dmesg). As the software is running on our production server infrastructure, I have performed a downgrade to squeeze8 again to ensure proper operation during our office hours. That's also the reason why I won't be able to upgrade again and debug the system now because I have to keep the telephony operational during office hours. Maybe I can reproduce it with a test system, I'll keep you informed. Regards, Dennis Rech Am 14.01.2013 09:36, schrieb Tzafrir Cohen: On Mon, Jan 14, 2013 at 08:38:35AM +0100, Dennis Rech wrote: Package: asterisk Version: 1:1.6.2.9-2+squeeze8 Severity: grave Justification: renders package unusable asterisk crashes when placing a call after a update to recent versions with apt-get Upgrade: asterisk:i386 (1.6.2.9-2+squeeze8, 1.6.2.9-2+squeeze9), asterisk-sounds-main:i386 (1.6.2.9-2+squeeze8, 1.6.2.9-2+squeeze9), asterisk-config:i386 (1.6.2.9-2+squeeze8, 1.6.2.9-2+squeeze9) Error: [9058168.846934] asterisk[2585]: segfault at 1 ip b7493b77 sp b5415684 error 4 in libc-2.11.3.so[b741e000+14] [9058212.632085] asterisk[2709]: segfault at 1 ip b748db77 sp b540f684 error 4 in libc-2.11.3.so[b7418000+14] How asy is this issue to reproduce? What type of call? SIP? TCP? Could you please install asterisk-dbg and gdb, run asterisk as: cd /var/spool/asterisk asterisk -U asterisk -g -c and reproduce the issue Then run: gdb -c core /usr/sbin/asterisk and in the prompt of gdb run: bt bt full and provide the output here. -- Mit freundlichen Grüßen / Best regards, Dennis Rech Dipl.-Inf. (TU) WIKON Kommunikationstechnik GmbH Entwicklung / IT Luxemburger Str. 1-3, D-67657 Kaiserslautern mailto:d...@wikon.de * http://www.wikon.de Tel: +49-631-205777-64 * Fax: +49-631-205777-99 Haftungsausschluss: http://www.wikon.de/cms/de/kontakt-impressum/impressum.html HR B-Nr: 2561, Kaiserslautern Geschäftsführer: Joachim Molz und Andreas Konzelmann == WIKON - Fernwirksysteme über GSM == -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: severity of 694987 is serious
Processing commands for cont...@bugs.debian.org: severity 694987 serious Bug #694987 [obexfs] obexfs: depends on transitional package fuse-utils Severity set to 'serious' from 'normal' thanks Stopping processing here. Please contact me if you need assistance. -- 694987: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694987 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698121: djmount: Depends on fuse-utils; uninstallable in sid
Package: djmount Version: 0.71-5 Severity: serious Tags: sid User: car...@debian.org Usertags: depends-on-fuse-utils Hi djmount 0.71-5 has a Depends on fuse-utils. In unstable fuse-utils was dropped. This makes djmount uninstallable in sid. Wheezy is not directly affected as the transitional package fuse-utils is still present there, so tagging this 'sid' only. Please change this dependency to fuse. Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698120: acetoneiso: Depends on fuse-utils; uninstallable in sid
Package: acetoneiso Version: 2.3-2 Severity: serious Tags: sid User: car...@debian.org Usertags: depends-on-fuse-utils Hi acetoneiso 2.3-2 has a Depends on fuse-utils. In unstable fuse-utils was dropped. This makes acetoneiso uninstallable in sid. Wheezy is not directly affected as the transitional package fuse-utils is still present there, so tagging this 'sid' only. Please change this dependency to fuse. Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698122: fuseext2: Depends on fuse-utils; uninstallable in sid
Package: fuseext2 Version: 0.4-1 Severity: serious Tags: sid User: car...@debian.org Usertags: depends-on-fuse-utils Hi fuseext2 0.4-1 has a Depends on fuse-utils. In unstable fuse-utils was dropped. This makes fuseext2 uninstallable in sid. Wheezy is not directly affected as the transitional package fuse-utils is still present there, so tagging this 'sid' only. Please change this dependency to fuse. Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698123: fusefat: Depends on fuse-utils; uninstallable in sid
Package: fusefat Version: 0.1a-1 Severity: serious Tags: sid User: car...@debian.org Usertags: depends-on-fuse-utils Hi fusefat 0.1a-1 has a Depends on fuse-utils. In unstable fuse-utils was dropped. This makes fusefat uninstallable in sid. Wheezy is not directly affected as the transitional package fuse-utils is still present there, so tagging this 'sid' only. Please change this dependency to fuse. Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698124: fuseiso9660: Depends on fuse-utils; uninstallable in sid
Package: fuseiso9660 Version: 0.3-1 Severity: serious Tags: sid User: car...@debian.org Usertags: depends-on-fuse-utils Hi fuseiso9660 0.3-1 has a Depends on fuse-utils. In unstable fuse-utils was dropped. This makes fuseiso9660 uninstallable in sid. Wheezy is not directly affected as the transitional package fuse-utils is still present there, so tagging this 'sid' only. Please change this dependency to fuse. Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698125: glusterfs-client: Depends on fuse-utils; uninstallable in sid
Package: glusterfs-client Version: 3.2.7-3 Severity: serious Tags: sid User: car...@debian.org Usertags: depends-on-fuse-utils Hi glusterfs-client 3.2.7-3 has a Depends on fuse-utils. In unstable fuse-utils was dropped. This makes glusterfs-client uninstallable in sid. Wheezy is not directly affected as the transitional package fuse-utils is still present there, so tagging this 'sid' only. Please change this dependency to fuse. Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698126: ifuse: Depends on fuse-utils; uninstallable in sid
Package: ifuse Version: 1.0.0-1 Severity: serious Tags: sid User: car...@debian.org Usertags: depends-on-fuse-utils Hi ifuse 1.0.0-1 has a Depends on fuse-utils. In unstable fuse-utils was dropped. This makes ifuse uninstallable in sid. Wheezy is not directly affected as the transitional package fuse-utils is still present there, so tagging this 'sid' only. Please change this dependency to fuse. Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698127: ltspfs: Depends on fuse-utils; uninstallable in sid
Package: ltspfs Version: 1.1-2 Severity: serious Tags: sid User: car...@debian.org Usertags: depends-on-fuse-utils Hi ltspfs 1.1-2 has a Depends on fuse-utils. In unstable fuse-utils was dropped. This makes ltspfs uninstallable in sid. Wheezy is not directly affected as the transitional package fuse-utils is still present there, so tagging this 'sid' only. Please change this dependency to fuse. Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698128: mhddfs: Depends on fuse-utils; uninstallable in sid
Package: mhddfs Version: 0.1.39 Severity: serious Tags: sid User: car...@debian.org Usertags: depends-on-fuse-utils Hi mhddfs 0.1.39 has a Depends on fuse-utils. In unstable fuse-utils was dropped. This makes mhddfs uninstallable in sid. Wheezy is not directly affected as the transitional package fuse-utils is still present there, so tagging this 'sid' only. Please change this dependency to fuse. Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698129: unionfs-fuse: Depends on fuse-utils; uninstallable in sid
Package: unionfs-fuse Version: 0.24-2.1 Severity: serious Tags: sid User: car...@debian.org Usertags: depends-on-fuse-utils Hi unionfs-fuse 0.24-2.1 has a Depends on fuse-utils. In unstable fuse-utils was dropped. This makes unionfs-fuse uninstallable in sid. Wheezy is not directly affected as the transitional package fuse-utils is still present there, so tagging this 'sid' only. Please change this dependency to fuse. Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698137: destroys icinga.cfg on postinst when it's a symlink
Package: icinga-common Version: 1.7.1-4 Severity: serious Tags: patch icinga-common's postinst has the following construct: | cp -a -f $conffile $conffile.tmp | sed -e ... $conffile $conffile.tmp In my case, $conffile is a symlink: } lrwxrwxrwx 1 root root 26 Nov 1 15:11 /etc/icinga/icinga.cfg - from-git/static/icinga.cfg so the postinst does effectively sed $file $file, and we all know that this doesn't work and results in $file being empty at the end. I propose to use sed's -i instead: (untested) --- ./icinga-common.postinst2012-10-01 06:20:10.0 + +++ /root/icinga-common.postinst2013-01-14 10:57:43.751049610 + @@ -65,25 +65,20 @@ false) check_external_commands=0 ;; esac - cp -a -f $conffile $conffile.tmp - # If the admin deleted or commented some variables but then set # them via debconf, (re-)add them to the config file. test -z $check_external_commands || \ grep -Eq '^ *check_external_commands=' $conffile || \ echo check_external_commands= $conffile - sed -e s|^ *check_external_commands=.*|check_external_commands=$check_external_commands| \ -$conffile $conffile.tmp - - mv -f $conffile.tmp $conffile + sed -i -e s|^ *check_external_commands=.*|check_external_commands=$check_external_commands| $conffile # Stop a not already stopped icinga instance, # debhelper will start it again automatically at the bottom status=$(/etc/init.d/icinga status /dev/null 21; echo $?) if [ $status -ne 3 ]; then Cheers, weasel -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698112: asterisk: Segfault when making a call after update to 1.6.2.9-2+squeeze9
tag 698112 pending thanks On Mon, Jan 14, 2013 at 10:03:55AM +0100, Dennis Rech wrote: I've tried it on another system. Heres the output: Thanks. Issue traced to a typo (of my part) in one of the two patches: http://anonscm.debian.org/viewvc/pkg-voip?view=revisionrevision=10073 I uploaded test packages to http://people.debian.org/~tzafrir/ast_squeeze10/ -- Tzafrir Cohen icq#16849755 jabber:tzafrir.co...@xorcom.com +972-50-7952406 mailto:tzafrir.co...@xorcom.com http://www.xorcom.com iax:gu...@local.xorcom.com/tzafrir -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#698112: asterisk: Segfault when making a call after update to 1.6.2.9-2+squeeze9
Processing commands for cont...@bugs.debian.org: tag 698112 pending Bug #698112 [asterisk] asterisk: Segfault when making a call after update to 1.6.2.9-2+squeeze9 Added tag(s) pending. thanks Stopping processing here. Please contact me if you need assistance. -- 698112: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698112 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#696169: marked as done (texlive-base: fails to upgrade from 'sid' - trying to overwrite /usr/share/texmf/web2c/texmfcnf.lua)
Your message dated Mon, 14 Jan 2013 11:34:13 + with message-id e1tuiiv-0004fo...@franck.debian.org and subject line Bug#696169: fixed in texlive-base 2012.20130111-1 has caused the Debian Bug report #696169, regarding texlive-base: fails to upgrade from 'sid' - trying to overwrite /usr/share/texmf/web2c/texmfcnf.lua to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 696169: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696169 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: texlive-base Version: 2012.20121205-1 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Control: affects -1 + context Hi, during a test with piuparts I noticed your package fails to upgrade from 'sid' to 'experimental'. It installed fine in 'sid', then the upgrade to 'experimental' fails because it tries to overwrite other packages files without declaring a Breaks+Replaces relation. See policy 7.6 at http://www.debian.org/doc/debian-policy/ch-relationships.html#s-replaces From the attached log (scroll to the bottom...): Preparing to replace texlive-base 2012.20120611-5 (using .../texlive-base_2012.20121205-1_all.deb) ... Unpacking replacement texlive-base ... dpkg: error processing /var/cache/apt/archives/texlive-base_2012.20121205-1_all.deb (--unpack): trying to overwrite '/usr/share/texmf/web2c/texmfcnf.lua', which is also in package context 2012.05.30.20120611-1 cheers, Andreas context_2012.05.30.20121209-1.log.gz Description: GNU Zip compressed data ---End Message--- ---BeginMessage--- Source: texlive-base Source-Version: 2012.20130111-1 We believe that the bug you reported is fixed in the latest version of texlive-base, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 696...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Norbert Preining prein...@debian.org (supplier of updated texlive-base package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 11 Jan 2013 08:25:20 +0900 Source: texlive-base Binary: texlive-base texlive-generic-recommended texlive-latex-base texlive-latex-recommended texlive-fonts-recommended texlive-pictures texlive-luatex texlive-metapost texlive-omega texlive-xetex texlive texlive-full texlive-common texlive-fonts-recommended-doc texlive-latex-base-doc texlive-latex-recommended-doc texlive-metapost-doc texlive-pictures-doc Architecture: source all Version: 2012.20130111-1 Distribution: experimental Urgency: low Maintainer: Debian TeX Maintainers debian-tex-ma...@lists.debian.org Changed-By: Norbert Preining prein...@debian.org Description: texlive- TeX Live: A decent selection of the TeX Live packages texlive-base - TeX Live: Essential programs and files texlive-common - TeX Live: Base component texlive-fonts-recommended - TeX Live: Recommended fonts texlive-fonts-recommended-doc - TeX Live: Documentation files for texlive-fonts-recommended texlive-full - TeX Live: metapackage pulling in all components of TeX Live texlive-generic-recommended - TeX Live: Recommended generic packages texlive-latex-base - TeX Live: Basic LaTeX packages texlive-latex-base-doc - TeX Live: Documentation files for texlive-latex-base texlive-latex-recommended - TeX Live: LaTeX recommended packages texlive-latex-recommended-doc - TeX Live: Documentation files for texlive-latex-recommended texlive-luatex - TeX Live: LuaTeX packages texlive-metapost - TeX Live: MetaPost (and Metafont) drawing packages texlive-metapost-doc - TeX Live: Documentation files for texlive-metapost texlive-omega - TeX Live: Omega packages texlive-pictures - TeX Live: Graphics packages and programs texlive-pictures-doc - TeX Live: Documentation files for texlive-pictures texlive-xetex - TeX Live: XeTeX packages Closes: 696169 Changes: texlive-base (2012.20130111-1) experimental; urgency=low . * new upstream checkout * replace/breaks with older context versions shipping texmfcnf.lua (Closes: #696169) Checksums-Sha1: a8e81dba48a575e8c1d3c521e678be492e255fdc 2348 texlive-base_2012.20130111-1.dsc ef6043414dc8a3cf116d49d938f2ecf916ba4825 206783340
Bug#697677: Processed: severity of 697150 is serious
Control: reopen 697677 Control: found 697677 1.1-3 Control: tags 697677 + sid Control: forcemerge 697677 697150 Hi Chris Thanks for your quick reply :-) On Mon, Jan 14, 2013 at 10:11:10AM +, Chris Lamb wrote: This was fixed in 1.1-3. Thanks for your work on this. Hmm, apt-cache show mtpfs still shows: Depends: libc6 (= 2.2.5), libfuse2 (= 2.8.1), libglib2.0-0 (= 2.31.8), libid3tag0 (= 0.15.1b), libmad0 (= 0.15.1b-3), libmtp9 (= 1.1.0), libusb-1.0-0 (= 2:1.0.8), zlib1g (= 1:1.1.4), fuse-utils Regards, Salvatore signature.asc Description: Digital signature
Processed: Re: Processed: severity of 697150 is serious
Processing control commands: reopen 697677 Bug #697677 {Done: Chris Lamb la...@debian.org} [mtpfs] mtpfs: Missing fuse-utils dependency 'reopen' may be inappropriate when a bug has been closed with a version; all fixed versions will be cleared, and you may need to re-add them. Bug reopened No longer marked as fixed in versions mtpfs/1.1-3. found 697677 1.1-3 Bug #697677 [mtpfs] mtpfs: Missing fuse-utils dependency Marked as found in versions mtpfs/1.1-3. tags 697677 + sid Bug #697677 [mtpfs] mtpfs: Missing fuse-utils dependency Ignoring request to alter tags of bug #697677 to the same tags previously set forcemerge 697677 697150 Bug #697677 [mtpfs] mtpfs: Missing fuse-utils dependency Bug #697150 [mtpfs] mtpfs should not depends on fuse-utils but on fuse Severity set to 'grave' from 'serious' Marked as found in versions mtpfs/1.1-3. Merged 697150 697677 -- 697150: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697150 697677: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697677 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698112: asterisk: Segfault when making a call after update to 1.6.2.9-2+squeeze9
Le lundi 14 janvier 2013 à 13:29 +0200, Tzafrir Cohen a écrit : tag 698112 pending thanks On Mon, Jan 14, 2013 at 10:03:55AM +0100, Dennis Rech wrote: I've tried it on another system. Heres the output: Thanks. Issue traced to a typo (of my part) in one of the two patches: http://anonscm.debian.org/viewvc/pkg-voip?view=revisionrevision=10073 I uploaded test packages to http://people.debian.org/~tzafrir/ast_squeeze10/ Just installed your packages, it works. Thanks, Pierre Tourbeaux -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#697931: [Pkg-nagios-devel] Bug#697931: icinga: CVE-2012-6096
tag 697931 patch thanks Alexander Wirt schrieb am Saturday, den 12. January 2013: On Fri, 11 Jan 2013, Moritz Muehlenhoff wrote: Package: icinga Severity: grave Tags: security Justification: user security hole This was assigned CVE-2012-6096: http://archives.neohapsis.com/archives/fulldisclosure/2012-12/0108.html Fix: http://nagios.svn.sourceforge.net/viewvc/nagios?view=revisionrevision=2547 As it currently seems this fix is incomplete. The severity of the problem isn't hat high, so I want to wait until the icinga team has an official patch. Ok, I backported the official patch to stable and attached it. Should I provide an updated package for security.d.o? Alex -- Alexander Wirt, formo...@formorer.de CC99 2DDD D39E 75B0 B0AA B25C D35B BC99 BC7D 020A #! /bin/sh /usr/share/dpatch/dpatch-run ## 99_fix_CVE-2012-6096.dpatch by root@ ## ## All lines beginning with `## DP:' are a description of the patch. ## DP: No description. @DPATCH@ diff -urNad '--exclude=CVS' '--exclude=.svn' '--exclude=.git' '--exclude=.arch' '--exclude=.hg' '--exclude=_darcs' '--exclude=.bzr' icinga-1.0.2~/cgi/getcgi.c icinga-1.0.2/cgi/getcgi.c --- icinga-1.0.2~/cgi/getcgi.c 2010-06-30 09:13:42.0 + +++ icinga-1.0.2/cgi/getcgi.c 2013-01-14 06:05:50.511798545 + @@ -153,15 +153,17 @@ /* check for NULL query string environment variable - 04/28/00 (Ludo Bosmans) */ if(getenv(QUERY_STRING)==NULL){ cgiinput=(char *)malloc(1); + if (cgiinput != NULL) { + cgiinput[0] = '\x0'; + } + } else + cgiinput = strdup(getenv(QUERY_STRING)); if(cgiinput==NULL){ printf(getcgivars(): Could not allocate memory for CGI input.\n); exit(1); - } - cgiinput[0]='\x0'; - } - else - cgiinput=strdup(getenv(QUERY_STRING)); - } + } + } + } else if(!strcmp(request_method,POST) || !strcmp(request_method,PUT)){ @@ -236,7 +238,11 @@ paircount=0; nvpair=strtok(cgiinput,); while(nvpair){ - pairlist[paircount++]=strdup(nvpair); + pairlist[paircount] = strdup(nvpair); + if(pairlist[paircount++] == NULL) { + printf(getcgivars(): Could not allocate memory for name-value pair element #%d.\n, paircount); + exit(1); + } if(!(paircount%256)){ pairlist=(char **)realloc(pairlist,(paircount+256)*sizeof(char **)); if(pairlist==NULL){ @@ -261,14 +267,29 @@ /* get the variable name preceding the equal (=) sign */ if((eqpos=strchr(pairlist[i],'='))!=NULL){ *eqpos='\0'; - unescape_cgi_input(cgivars[i*2+1]=strdup(eqpos+1)); - } + cgivars[i*2+1] = strdup(eqpos + 1); + if(cgivars[i*2+1] == NULL) { + printf(getcgivars(): Could not allocate memory for cgi param value #%d.\n, i); + exit(1); + } + unescape_cgi_input(cgivars[i*2+1]); + } else - unescape_cgi_input(cgivars[i*2+1]=strdup()); + cgivars[i*2+1] = strdup(); + if(cgivars[i*2+1] == NULL) { + printf(getcgivars(): Could not allocate memory for empty cgi param value #%d.\n, i); + exit(1); + } + unescape_cgi_input(cgivars[i*2+1]); /* get the variable value (or name/value of there was no real pair in the first place) */ - unescape_cgi_input(cgivars[i*2]=strdup(pairlist[i])); - } + cgivars[i*2] = strdup(pairlist[i]); + if(cgivars[i*2] == NULL) { + printf(getcgivars(): Could not allocate memory for cgi param name #%d.\n, i); + exit(1); + } + unescape_cgi_input(cgivars[i*2]); + } /* terminate the name-value list */ cgivars[paircount*2]='\x0'; diff -urNad '--exclude=CVS' '--exclude=.svn' '--exclude=.git' '--exclude=.arch' '--exclude=.hg' '--exclude=_darcs' '--exclude=.bzr' icinga-1.0.2~/cgi/history.c icinga-1.0.2/cgi/history.c --- icinga-1.0.2~/cgi/history.c 2010-06-30 09:13:42.0 + +++ icinga-1.0.2/cgi/history.c 2013-01-14 06:05:50.511798545 + @@ -808,16 +808,16 @@ else if(display_type==DISPLAY_HOSTS){
Processed: Re: [Pkg-nagios-devel] Bug#697931: icinga: CVE-2012-6096
Processing commands for cont...@bugs.debian.org: tag 697931 patch Bug #697931 {Done: Alexander Wirt formo...@debian.org} [icinga] icinga: CVE-2012-6096 Added tag(s) patch. thanks Stopping processing here. Please contact me if you need assistance. -- 697931: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697931 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#640939: Please test solution for Kerberos problem
On Mon, Jan 14, 2013 at 08:18:46AM +0100, Didier 'OdyX' Raboud wrote: I am far from confident enough in this patch to apply it so late in the freeze. So I reported the bug upstream: http://www.cups.org/str.php?L4140 As you have a working test-case, could you possibly: - test cups from unstable with the attached patch on top; - test cups from experimental (1.6.1) ? With your patch applied to the version in unstable, dpkg-buildpackage would hang (on arch amd64). IMO this is due to a minor error in your patch. Using the attached one, building succeded and -- at least for my test cases -- the reported failure doesn't occure. Will test the version in experimental later on. Wolfgang [ no need to cc me, bug subscribed ] --- working/client.c 2013-01-14 14:21:48.0 +0100 +++ orig/client.c 2013-01-14 13:31:04.0 +0100 @@ -2589,11 +2589,6 @@ #ifdef HAVE_GSSAPI else if (auth_type == CUPSD_AUTH_NEGOTIATE) { -# ifdef AF_LOCAL - if (_httpAddrFamily(con-http.hostaddr) == AF_LOCAL) -strlcpy(auth_str, Basic realm=\CUPS\, sizeof(auth_str)); - else -# endif /* AF_LOCAL */ strlcpy(auth_str, Negotiate, sizeof(auth_str)); } #endif /* HAVE_GSSAPI */ signature.asc Description: Digital signature
Bug#688847: libav: multiple CVEs in ffmpeg/libav
On Tue, Dec 25, 2012 at 11:31 AM, Moritz Mühlenhoff j...@inutil.org wrote: On Mon, Oct 15, 2012 at 05:38:37AM -0400, Reinhard Tartler wrote: None of these are merged into 0.5.x, has the code diverged so much? I arrived only today from my two week trip and will work on backports for 0.7-0.5 this week. Sorry for the delay. Merry christmas Reinhard, did you have a chance to work on this in the mean time? Later than anticipated, but 0.8.5-1 is now finally in unstable. Moritz, last time you did some extensive testing and reported the results to the RMs. Can you do so this time again? Thanks, Reinhard -- regards, Reinhard -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698151: libguestfs: FTBFS in unstable due to dropped fuse-utils (Build-Depends)
Source: libguestfs Version: 1:1.18.11-1 Severity: serious Tags: sid Justification: FTBFS User: car...@debian.org Usertags: depends-on-fuse-utils -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi libguestfs has a Build-Depends on fuse-utils. But fuse-utils was dropped (it was a transitional package). Thus libguestfs FTBFS in unstable. Note: this is not a problem for wheezy, as the transitional package is still present there. Regards, Salvatore -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBCgAGBQJQ9ApqAAoJEHidbwV/2GP+/Q4P/i79SZ4bdpsZFMC1vkcBjJ5g 9fwIWoRTFKzKzA4tTZtYEcoMkq51ATQoOHDRxjt/rvURLID9S/PbPGqPW6SJlrEk VVOg8+s4RPcDX3PuNbz1gPJeK5DRpKf/iGJNZp/DkRu2bP66yGm59xWh1U1KEcgK ZLjI9KSj69vFeftYYE3WO9FbmEWdAVZyoTGU/5EsQx67itCAj17Vyx4aAm6exD0Q TGmrLVzs/CAhqjbToZc7Y7D7BBedq7dxvzEKkH5fosNHwHtPN/2kYoUj7pOcF9W0 hLiS3w4KS0MOfUPS9459v+lxkco3wyx8JTn9scfPs/kdjSLR52Vc4BiXihKEP2lY UFRYNkfjYAnDsqLyAhhLCLT9h+pb7paS5gcqaTXRoYZmPmkm7vS0vSwL8LP/V8Ih A7OAo1NXUuLoTUDz3A5aN8dxPb1DMrycuL0x9Ejyn6NVWU0gU65XDQVfVNUQRi4Q tMVhsJmbP+O1aFuw+CMR5bodPdOsUNaimMNWSQN4rbc+SvK7p8m/XpTGGHcVNd/0 xkcJ77ss4rRULeuDh7cPtwWB3AzJFzlF44RUCPI6YfxZXE5GyGpwwhiY7gWokpVa DlM8adh2KHupv57hSnbvIsO8BvZm160mjz9QY9yMTSy+lKTxhdyIcJekL5BYYE7M cHDLRRK16A2zeaL94yao =5NMy -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed (with 1 errors): merging 698112 698118
Processing commands for cont...@bugs.debian.org: merge 698112 698118 Bug #698112 [asterisk] asterisk: Segfault when making a call after update to 1.6.2.9-2+squeeze9 Unable to merge bugs because: affects of #698118 is 'security.debian.org,release.debian.org' not '' Failed to merge 698112: Did not alter merged bugs Debbugs::Control::set_merged('transcript', 'GLOB(0x28dbc40)', 'requester', 'Tzafrir Cohen tzaf...@debian.org', 'request_addr', 'cont...@bugs.debian.org', 'request_msgid', '1358170350-4176-bts-tzaf...@debian.org', 'request_subject', ...) called at /usr/local/lib/site_perl/Debbugs/Control/Service.pm line 538 eval {...} called at /usr/local/lib/site_perl/Debbugs/Control/Service.pm line 537 Debbugs::Control::Service::control_line('line', undef, 'clonebugs', 'HASH(0x2855160)', 'limit', 'HASH(0x2854b48)', 'common_control_options', 'ARRAY(0x2854b90)', 'errors', ...) called at /usr/lib/debbugs/service line 474 thanks Stopping processing here. Please contact me if you need assistance. -- 698112: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698112 698118: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698118 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed (with 1 errors): your mail
Processing commands for cont...@bugs.debian.org: merge 698112 698118 Bug #698112 [asterisk] asterisk: Segfault when making a call after update to 1.6.2.9-2+squeeze9 Unable to merge bugs because: affects of #698118 is 'security.debian.org,release.debian.org' not '' Failed to merge 698112: Did not alter merged bugs Debbugs::Control::set_merged('transcript', 'GLOB(0x2cd6cd0)', 'requester', 'Tzafrir Cohen tzaf...@cohens.org.il', 'request_addr', 'cont...@bugs.debian.org', 'request_msgid', '20130114134339.gy12...@pear.tzafrir.org.il', 'request_subject', ...) called at /usr/local/lib/site_perl/Debbugs/Control/Service.pm line 538 eval {...} called at /usr/local/lib/site_perl/Debbugs/Control/Service.pm line 537 Debbugs::Control::Service::control_line('line', undef, 'clonebugs', 'HASH(0x2c50160)', 'limit', 'HASH(0x2c4fb48)', 'common_control_options', 'ARRAY(0x2c4fb90)', 'errors', ...) called at /usr/lib/debbugs/service line 474 thanks Stopping processing here. Please contact me if you need assistance. -- 698112: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698112 698118: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698118 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: limit source to asterisk, tagging 698118
Processing commands for cont...@bugs.debian.org: #asterisk (1:1.6.2.9-2+squeeze10) stable-security; urgency=high # # * Fix typo in patch AST-2012-015 (Closes: #698112, #698118). # limit source asterisk Limiting to bugs with field 'source' containing at least one of 'asterisk' Limit currently set to 'source':'asterisk' tags 698118 + pending Bug #698118 [asterisk] asterisk: version 1:1.6.2.9-2+squeeze9 crashes on SIP call, +squeeze6 does not Added tag(s) pending. thanks Stopping processing here. Please contact me if you need assistance. -- 698118: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698118 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698118: asterisk 1:1.6.2.9-2+squeeze9 segfaults
Same thing here, started segfaulting after an upgrade this morning: 2013-01-14 10:32:13 upgrade asterisk 1:1.6.2.9-2+squeeze8 1:1.6.2.9-2+squeeze9 [783312.661049] asterisk[27654]: segfault at 1 ip b748db77 sp b5319684 error 4 in libc-2.11.3.so[b7418000+14] [783442.211589] asterisk[13070]: segfault at 1 ip b74a0b77 sp b532d684 error 4 in libc-2.11.3.so[b742b000+14] [787731.493578] asterisk[13304]: segfault at 1 ip b74b6b77 sp b5344684 error 4 in libc-2.11.3.so[b7441000+14] [787933.505841] asterisk[937]: segfault at 1 ip b750fb77 sp b539c684 error 4 in libc-2.11.3.so[b749a000+14] [788010.077989] asterisk[2168]: segfault at 1 ip b745db77 sp b52eb684 error 4 in libc-2.11.3.so[b73e8000+14] [788592.836440] asterisk[2359]: segfault at 1 ip b7550b77 sp b53dc684 error 4 in libc-2.11.3.so[b74db000+14] [792704.434687] asterisk[6096]: segfault at 1 ip b746cb77 sp b52fa684 error 4 in libc-2.11.3.so[b73f7000+14] [793003.009440] asterisk[25102]: segfault at 1 ip b751db77 sp b53a9684 error 4 in libc-2.11.3.so[b74a8000+14] -- Valentin -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: tagging 698121
Processing commands for cont...@bugs.debian.org: tags 698121 + pending Bug #698121 [djmount] djmount: Depends on fuse-utils; uninstallable in sid Added tag(s) pending. thanks Stopping processing here. Please contact me if you need assistance. -- 698121: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698121 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Please consider including this patch before wheezy
Processing commands for cont...@bugs.debian.org: tags 683312 patch Bug #683312 [uif] [PATCH] uif uses depricated position of ! to negate rules Added tag(s) patch. thanks Stopping processing here. Please contact me if you need assistance. -- 683312: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683312 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#698140: Beanstalkd: OUT_OF_MEMORY after crash
Processing commands for cont...@bugs.debian.org: severity 698140 serious Bug #698140 [beanstalkd] Beanstalkd: OUT_OF_MEMORY after crash Severity set to 'serious' from 'important' thanks Stopping processing here. Please contact me if you need assistance. -- 698140: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698140 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#697892: src:virtualbox: FTBFS in sid and experimental: /usr/bin/mk_sed: file /tmp/buildd/virtualbox-4.1.8-dfsg/src/VBox/Runtime/common/err/errmsg.sed line 31: Unmatched [ or [^
Control: reassign -1 kbuild 1:0.1.9998svn2543+dfsg-0.1 Control: affects -1 src:virtualbox Control: retitle -1 kmk_sed fails to parse character classes Control: tag -1 + upstream - sid experimental Control: forwarded -1 http://svn.netlabs.org/kbuild/ticket/112 On Fri, Jan 11, 2013 at 12:26:53AM +0100, gregor herrmann wrote: While trying to rebuild virtualbox with the patch from #691169 (which works fine BTW), I noticed that the package doesn't build in a sid or experimental chroot. The error is: kBuild: Creating directory /tmp/buildd/virtualbox-4.1.18-dfsg/out/obj/Runtime/ kmk_builtin_mkdir -p -- /tmp/buildd/virtualbox-4.1.18-dfsg/out/obj/Runtime/ kBuild: Generating /tmp/buildd/virtualbox-4.1.18-dfsg/out/obj/Runtime/errmsgdata.h from /tmp/buildd/virtualbox-4.1.18-dfsg/include/iprt/err.h /tmp/buildd/virtualbox-4.1.18-dfsg/include/VBox/err.h /usr/bin/kmk_redirect -wo /tmp/buildd/virtualbox-4.1.18-dfsg/out/obj/Runtime/errmsgdata.h -- /usr/bin/kmk_sed -f /tmp/buildd/virtualbox-4.1.18-dfsg/src/VBox/Runtime/common/err/errmsg.sed /tmp/buildd/virtualbox-4.1.18-dfsg/include/iprt/err.h /tmp/buildd/virtualbox-4.1.18-dfsg/include/VBox/err.h /usr/bin/kmk_sed: file /tmp/buildd/virtualbox-4.1.18-dfsg/src/VBox/Runtime/common/err/errmsg.sed line 31: Unmatched [ or [^ kmk: *** [/tmp/buildd/virtualbox-4.1.18-dfsg/out/obj/Runtime/errmsgdata.h] Error 1 kmk: *** Deleting file `/tmp/buildd/virtualbox-4.1.18-dfsg/out/obj/Runtime/errmsgdata.h' kmk: *** Waiting for unfinished jobs The kbuild NMU, which migrated on Jan. 12th, seems to have exposed a bug in kmk_sed which is affecting the virtualbox build. I've tried rebuilding kbuild with Wheezy's gcc-4.6, since upstream indicates this is a gcc-4.7-specific problem, but that didn't make a difference. Reassigning to kbuild. Cheers, -- James GPG Key: 4096R/331BA3DB 2011-12-05 James McCoy james...@debian.org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#697892: src:virtualbox: FTBFS in sid and experimental: /usr/bin/mk_sed: file /tmp/buildd/virtualbox-4.1.8-dfsg/src/VBox/Runtime/common/err/errmsg.sed line 31: Unmatched [ or [^
Processing control commands: reassign -1 kbuild 1:0.1.9998svn2543+dfsg-0.1 Bug #697892 [src:virtualbox] src:virtualbox: FTBFS in sid and experimental: /usr/bin/kmk_sed: file /tmp/buildd/virtualbox-4.1.18-dfsg/src/VBox/Runtime/common/err/errmsg.sed line 31: Unmatched [ or [^ Bug reassigned from package 'src:virtualbox' to 'kbuild'. No longer marked as found in versions virtualbox/4.1.18-dfsg-1.1. Ignoring request to alter fixed versions of bug #697892 to the same values previously set Bug #697892 [kbuild] src:virtualbox: FTBFS in sid and experimental: /usr/bin/kmk_sed: file /tmp/buildd/virtualbox-4.1.18-dfsg/src/VBox/Runtime/common/err/errmsg.sed line 31: Unmatched [ or [^ Marked as found in versions kbuild/1:0.1.9998svn2543+dfsg-0.1. affects -1 src:virtualbox Bug #697892 [kbuild] src:virtualbox: FTBFS in sid and experimental: /usr/bin/kmk_sed: file /tmp/buildd/virtualbox-4.1.18-dfsg/src/VBox/Runtime/common/err/errmsg.sed line 31: Unmatched [ or [^ Added indication that 697892 affects src:virtualbox retitle -1 kmk_sed fails to parse character classes Bug #697892 [kbuild] src:virtualbox: FTBFS in sid and experimental: /usr/bin/kmk_sed: file /tmp/buildd/virtualbox-4.1.18-dfsg/src/VBox/Runtime/common/err/errmsg.sed line 31: Unmatched [ or [^ Changed Bug title to 'kmk_sed fails to parse character classes' from 'src:virtualbox: FTBFS in sid and experimental: /usr/bin/kmk_sed: file /tmp/buildd/virtualbox-4.1.18-dfsg/src/VBox/Runtime/common/err/errmsg.sed line 31: Unmatched [ or [^' tag -1 + upstream - sid experimental Bug #697892 [kbuild] kmk_sed fails to parse character classes Added tag(s) upstream. Bug #697892 [kbuild] kmk_sed fails to parse character classes Removed tag(s) sid and experimental. forwarded -1 http://svn.netlabs.org/kbuild/ticket/112 Bug #697892 [kbuild] kmk_sed fails to parse character classes Set Bug forwarded-to-address to 'http://svn.netlabs.org/kbuild/ticket/112'. -- 697892: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697892 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#684604: Same problem here
On 2012-09-24 21:55, Ulrich Van Den Hekke wrote: Hi, I have the same problem. I start eclipse configure some project, install ADT plugin to work, after a few restart, i have this bug (splash screen hang on Loading Workbench). Removing .eclipse resolve the problem, but i need to reinstall plugin, and configuration, until the next hang. Hi, What version of Java are you using to run Eclipse? If in doubt, running readlink -f /usr/bin/java should be a good guess. Example: $ readlink -f /usr/bin/java /usr/lib/jvm/java-6-openjdk-i386/jre/bin/java If that gives you Java 6 (examples include java-6-openjdk or java-6-sun-java), could you try with Java 7? Ensure you have openjdk-7-jdk installed and run (as root): $ update-java-alternatives --set java-1.7.0-openjdk-i386 ~Niels -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#684604: eclipse-rcp: eclipse 3.8 hangs on splash screen with Loading Workbench after update from 3.7.2
On 2013-01-02 18:13, Dave Tapesar wrote: Hello there, I had the same issue on a Debian SID x86_64. As a sid, there was no eclipse update, only an install on July: eclipse:amd64 (3.8.0~rc4-1) The only openjdk update is from October 23rd openjdk-6-jre:amd64 6b24-1.11.4-3 - 6b24-1.11.5-1 The problem appeared after the SVN plugin uninstall (because of a plugin problem) : when asked to reboot, I agreed and Eclipse would stop at the point Loading Workbench. Killing the graphic application launched what seemed to be a deadlock, as the java process was taking all CPU time. A simple kill pid stopped the process. Unfortunately, I have not kept the details (haven't made a strace) [...] Hope it helps. To be honest, it sound like you have / had a different problem[1]. That said, I am glad you have resolved it and we will keep it in mind in case others report problems with a similar set of symptoms. ~Niels [1] The fact that is solved by upgrading Java6 to Java7 make it sound like it is/was a bug in Java6. The original problem includes a configuration issue that (to my knowledge) has not been triggered by bugs in OpenJDK (yet). -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#697230: asterisk: Two security issues: AST-2012-014 / AST-2012-015
On Fri, Jan 11, 2013 at 11:00:30PM +, Tzafrir Cohen wrote: On Tue, Jan 08, 2013 at 06:49:56PM +0100, Moritz Mühlenhoff wrote: On Tue, Jan 08, 2013 at 02:45:59AM +0200, Tzafrir Cohen wrote: Hi, On Wed, Jan 02, 2013 at 10:56:43PM +0100, Salvatore Bonaccorso wrote: Package: asterisk Severity: grave Tags: security Justification: user security hole -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, the following vulnerabilities were published for asterisk. CVE-2012-5976[0]: Crashes due to large stack allocations when using TCP CVE-2012-5977[1]: Denial of Service Through Exploitation of Device State Caching If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities Exposures) ids in your changelog entry. For further information see: [0] http://security-tracker.debian.org/tracker/CVE-2012-5976 [1] http://security-tracker.debian.org/tracker/CVE-2012-5977 Please adjust the affected versions in the BTS as needed. According to the advisories all 1.8.x versions seems affected. Likewise is version 1.6.2 from Stable. I have fixes ready. Ok, please upload to security-master once tests are sufficient. Uploaded. It seems that there has been a bug with the patch for Stable (#698112, #698118): http://anonscm.debian.org/viewvc/pkg-voip?view=revisionrevision=10073 I have prepared a fix for this (1:1.6.2.9-2+squeeze10). -- Tzafrir Cohen icq#16849755 jabber:tzafrir.co...@xorcom.com +972-50-7952406 mailto:tzafrir.co...@xorcom.com http://www.xorcom.com iax:gu...@local.xorcom.com/tzafrir -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#684604: Same problem here
On 2013-01-14 15:43, Niels Thykier wrote: On 2012-09-24 21:55, Ulrich Van Den Hekke wrote: Hi, I have the same problem. I start eclipse configure some project, install ADT plugin to work, after a few restart, i have this bug (splash screen hang on Loading Workbench). Removing .eclipse resolve the problem, but i need to reinstall plugin, and configuration, until the next hang. Hi, What version of Java are you using to run Eclipse? If in doubt, running readlink -f /usr/bin/java should be a good guess. Example: $ readlink -f /usr/bin/java /usr/lib/jvm/java-6-openjdk-i386/jre/bin/java If that gives you Java 6 (examples include java-6-openjdk or java-6-sun-java), could you try with Java 7? Ensure you have openjdk-7-jdk installed and run (as root): $ update-java-alternatives --set java-1.7.0-openjdk-i386 Correction; if you are on an i386 that above command is correct, though it changes based on your architecture. Running the following command (yes, quotes in it are important) should give you a list of valid Java7 installations you can use with update-java-alternatives --set: # update-java-alternatives --list | awk '/1\.7/ { print $1 }' ~Niels -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#695275: marked as done (src:dspam: harmful actions in multiple postrm scripts of M-A:same packages)
Your message dated Mon, 14 Jan 2013 15:17:45 + with message-id e1tulnf-0002e8...@franck.debian.org and subject line Bug#695275: fixed in dspam 3.10.2+dfsg-4 has caused the Debian Bug report #695275, regarding src:dspam: harmful actions in multiple postrm scripts of M-A:same packages to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 695275: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695275 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: src:dspam Version: 3.10.2+dfsg-2 Severity: serious Let me give an example of the general issue in libdspam7. All the other issues are of similar nature. It is possible to install libdspam7:amd64 and libdspam7:i386 in parallel. Now a user could purge libdspam7:i386, but still use libdspam7:amd64. The postrm purge script would ensure that the dspam user is now locked. This breaks libdspam7:amd64. Basically every postrm script shipped contains a similar issue. I am not aware of a general solution to the problem. Different packages have come up with different solutions (example: libwrap0). Due to the size of the problem here I suggest to remove the M-A:same headers in a t-p-u upload and defer a real solution until after wheezy. I'd expect said real solution to involve a new package Arch:all package and ship the dspam user. Helmut ---End Message--- ---BeginMessage--- Source: dspam Source-Version: 3.10.2+dfsg-4 We believe that the bug you reported is fixed in the latest version of dspam, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 695...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thomas Preud'homme robo...@debian.org (supplier of updated dspam package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 08 Jan 2013 18:50:26 +0100 Source: dspam Binary: dspam dspam-webfrontend libdspam7 libdspam7-dev libdspam7-drv-hash libdspam7-drv-pgsql libdspam7-drv-mysql libdspam7-drv-sqlite3 dspam-doc dspam-dbg libdspam7-dbg Architecture: source amd64 all Version: 3.10.2+dfsg-4 Distribution: unstable Urgency: low Maintainer: Debian DSPAM Maintainers pkg-dspam-m...@lists.alioth.debian.org Changed-By: Thomas Preud'homme robo...@debian.org Description: dspam - Scalable, fast and statistical anti-spam filter dspam-dbg - debugging symbols for dspam dspam-doc - Documentation for DSPAM anti-spam filter dspam-webfrontend - Webfrontend for DSPAM anti-spam filter libdspam7 - Core message processing and classification functionality for DSPA libdspam7-dbg - debugging symbols for DSPAM related libraries libdspam7-dev - Development headers for libdspam libdspam7-drv-hash - Hash backend for DSPAM anti-spam filter libdspam7-drv-mysql - MySQL backend for DSPAM anti-spam filter libdspam7-drv-pgsql - PostgreSQL backend for DSPAM anti-spam filter libdspam7-drv-sqlite3 - sqlite3 backend for DSPAM anti-spam filter Closes: 695275 698136 Changes: dspam (3.10.2+dfsg-4) unstable; urgency=low . * Disable multi-arch since it create many problems with regards to the handling of shared resources when a package is installed for several architectures (Closes: #695275). * Enhance 008_fix_exim_integration_doc.diff to state more explicitly in CHANGELOG which changes are backports for Debian of upstream commits. * Cherry-pick patch from upstream to fix recipient corruption when releasing a message from quarantine (Closes: #698136). * Bump Standards-Version to 3.9.4 (no changes needed). Checksums-Sha1: 84f2acdc97f055e1117739263b87818d4b157166 2602 dspam_3.10.2+dfsg-4.dsc c0a5a3e0c6d23a85f2d64c37b524d55926465283 65845 dspam_3.10.2+dfsg-4.debian.tar.gz 8d0f8f13af04052d0213b3f77af24d394f9df0a2 437134 dspam_3.10.2+dfsg-4_amd64.deb ccd0bdbdf7013cdba2de93fb355a4c3dabb07fee 202300 dspam-webfrontend_3.10.2+dfsg-4_all.deb 36ddba5fe92d199ebc039cb10bb76fd54d2467f5 150728 libdspam7_3.10.2+dfsg-4_amd64.deb b89b95ec903e9d55283a96e1d2a595fa7cd11788 309540 libdspam7-dev_3.10.2+dfsg-4_amd64.deb 6bd0467229ea639bc245d366fd5b3fbbb6e3fd21 110962 libdspam7-drv-hash_3.10.2+dfsg-4_amd64.deb 514ba838a84bc45ad5717d8085f646bec8f14e6f 126474
Bug#697230: asterisk: Two security issues: AST-2012-014 / AST-2012-015
AST-2012-014: b/channels/chan_sip.c @@ -3078,7 +3079,7 @@ static void *_sip_tcp_helper_thread(stru req.socket.fd = tcptls_session-fd; /* Read in headers one line at a time */ - while (req.len 4 || strncmp(REQ_OFFSET_TO_STR(req, len - 4), \r\n\r\n, 4)) { + while ((req.len = SIP_MAX_PACKET_SIZE) || (req.len 4 || strncmp(REQ_OFFSET_TO_STR(req, len - 4), \r\n\r\n, 4))) { if (!tcptls_session-client !authenticated ) { if ((timeout = sip_check_authtimeout(start)) 0) { goto cleanup; Are you sure? That size hint condition should be ANDed. smime.p7s Description: S/MIME cryptographic signature
Bug#697230: asterisk: Two security issues: AST-2012-014 / AST-2012-015
On Mon, Jan 14, 2013 at 04:02:22PM +0100, Javier Serrano Polo wrote: AST-2012-014: b/channels/chan_sip.c @@ -3078,7 +3079,7 @@ static void *_sip_tcp_helper_thread(stru req.socket.fd = tcptls_session-fd; /* Read in headers one line at a time */ - while (req.len 4 || strncmp(REQ_OFFSET_TO_STR(req, len - 4), \r\n\r\n, 4)) { + while ((req.len = SIP_MAX_PACKET_SIZE) || (req.len 4 || strncmp(REQ_OFFSET_TO_STR(req, len - 4), \r\n\r\n, 4))) { if (!tcptls_session-client !authenticated ) { if ((timeout = sip_check_authtimeout(start)) 0) { goto cleanup; Are you sure? That size hint condition should be ANDed. You're right. -- Tzafrir Cohen icq#16849755 jabber:tzafrir.co...@xorcom.com +972-50-7952406 mailto:tzafrir.co...@xorcom.com http://www.xorcom.com iax:gu...@local.xorcom.com/tzafrir -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698140: Beanstalkd: OUT_OF_MEMORY after crash
Hi again, On Mon, Jan 14, 2013 at 04:24:45PM +0200, Potamianos Gregory wrote: [..] If the server crashes with an empty binlog, on the next startup it answers every submitted job with out of memory error and discards it. So the service is rendered useless and requires manual intervention. Furthermore the patch is very trivial. Maybe it should be reconsidered? Sure. Preparing the release is trivial -- it's bugging the release team for a package with a small number of users I was concerned about. bye, sez -- Every great idea is worthless without someone to do the work. --Neil Williams -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#640939: Please test solution for Kerberos problem
Le lundi, 14 janvier 2013 14.36:31, Wolfgang Schweer a écrit : On Mon, Jan 14, 2013 at 08:18:46AM +0100, Didier 'OdyX' Raboud wrote: I am far from confident enough in this patch to apply it so late in the freeze. So I reported the bug upstream: http://www.cups.org/str.php?L4140 As you have a working test-case, could you possibly: - test cups from unstable with the attached patch on top; - test cups from experimental (1.6.1) ? With your patch applied to the version in unstable, dpkg-buildpackage would hang (on arch amd64). IMO this is due to a minor error in your patch. Using the attached one, building succeded and -- at least for my test cases -- the reported failure doesn't occure. Hrm weird; both patches are afaik correct. Anyway, given your report, I will probably upload a new version for this serious issue as soon as the actual version would have migrated to Wheezy. Many thanks for your investigation time and dedication! Cheers, OdyX -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#640939: Please test solution for Kerberos problem
On Mon, Jan 14, 2013 at 06:38:19PM +0100, Didier 'OdyX' Raboud wrote: Le lundi, 14 janvier 2013 14.36:31, Wolfgang Schweer a écrit : On Mon, Jan 14, 2013 at 08:18:46AM +0100, Didier 'OdyX' Raboud wrote: I am far from confident enough in this patch to apply it so late in the freeze. So I reported the bug upstream: http://www.cups.org/str.php?L4140 As you have a working test-case, could you possibly: - test cups from unstable with the attached patch on top; - test cups from experimental (1.6.1) ? With your patch applied to the version in unstable, dpkg-buildpackage would hang (on arch amd64). IMO this is due to a minor error in your patch. Using the attached one, building succeded and -- at least for my test cases -- the reported failure doesn't occure. Hrm weird; both patches are afaik correct. Anyway, given your report, I will probably upload a new version for this serious issue as soon as the actual version would have migrated to Wheezy. Same result for cups 1.6.1 in experimental: builds, reported failure gone. Wolfgang -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#683312: Please consider including this patch before wheezy
On Sun, 13 Jan 2013 19:10:00 +, Alex Owen wrote: I have regenerated the patch against uif- 1.0.6 to make it simple to review and apply to the package currently in Wheezy. Seems you didn't attach this new patch? BTW: After looking at your original patch, I have the impression that you missed moving one $not (dport, in the line with two $nots). Cheers, gregor -- .''`. Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06 : :' : Debian GNU/Linux user, admin, and developer - http://www.debian.org/ `. `' Member of VIBE!AT SPI, fellow of the Free Software Foundation Europe `- NP: REM: Half A World Away signature.asc Description: Digital signature
Bug#695001: closed by Nicholas Bamber nicho...@periapt.co.uk (Bug#695001: fixed in mysql-5.5 5.5.29+dfsg-1)
On Sat, Jan 12, 2013 at 12:30:11AM +, Debian Bug Tracking System wrote: This is an automatic notification regarding your Bug report which was filed against the mysql-5.5 package: #695001: mysql-5.5: New MySQL issues It has been closed by Nicholas Bamber nicho...@periapt.co.uk. Their explanation is attached below along with your original report. If this explanation is unsatisfactory and you have not received a better one in a separate message then please contact Nicholas Bamber nicho...@periapt.co.uk by replying to this email. The bug you closed mentioned various security issues: CVE-2012-5611 (formerly tracked as CVE-2012-5579) CVE-2012-5612 CVE-2012-5613 CVE-2012-5614 CVE-2012-5615 Is there a advisory or a changelog from Oracle, which specifies the CVE IDs fixed in 5.5.29? Cheers, Moritz -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#683312: Please consider including this patch before wheezy
On 14 January 2013 17:54, gregor herrmann gre...@debian.org wrote: On Sun, 13 Jan 2013 19:10:00 +, Alex Owen wrote: I have regenerated the patch against uif- 1.0.6 to make it simple to review and apply to the package currently in Wheezy. Seems you didn't attach this new patch? Oops! Sorry! BTW: After looking at your original patch, I have the impression that you missed moving one $not (dport, in the line with two $nots). Good catch... Here (and really attached this time) is an updated patch including Gregor's point also. Regards Alex Owen uif-pling-position-v2.patch Description: Binary data
Bug#698125: glusterfs-client: Depends on fuse-utils; uninstallable in sid
Am 14.01.2013 10:38, schrieb car...@debian.org: Package: glusterfs-client Version: 3.2.7-3 Severity: serious Tags: sid User: car...@debian.org Usertags: depends-on-fuse-utils Hi glusterfs-client 3.2.7-3 has a Depends on fuse-utils. In unstable fuse-utils was dropped. This makes glusterfs-client uninstallable in sid. Wheezy is not directly affected as the transitional package fuse-utils is still present there, so tagging this 'sid' only. Please change this dependency to fuse. Regards, Salvatore sick.. why are such changes uploaded to sid at the current time.. will be fixed in experimental with my next upload.. -- /* Mit freundlichem Gruß / With kind regards, Patrick Matthäi GNU/Linux Debian Developer E-Mail: pmatth...@debian.org patr...@linux-dev.org */ -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698037: can't log in to blogger.com
On 13/01/13 16:40, John Paul Adrian Glaubitz wrote: Hi, This is known to impact blogger.com and likely other sites Upstream has release 0.8.3 which fixes the issue Requires unblock approval for wheezy Which will not happen if it's a new upstream version. Unblocks at this time of the freeze will be granted for small fixes only. I will look at the upstream bug tracker and see if I can extract a working patch. Since you seem to be using this software, I'd like to ask you to test my patch then. Actually, I am a DD now and could potentially apply the patch on 0.8.1, but wanted some clarity from release team before uploading anything at all I also think we need upstream input on this, so I've copied Kelvin on this email. Kelvin, have you had any personal contact with Debian or Ubuntu users of SimpleID? Are you aware of other fixes in 0.8.2 or 0.8.3 that really are essential for the Debian package, or 0.8.1 + this one patch will be fine? http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698037 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#683312: Please consider including this patch before wheezy
On Mon, 14 Jan 2013 18:36:05 +, Alex Owen wrote: I have regenerated the patch against uif- 1.0.6 to make it simple to review and apply to the package currently in Wheezy. Seems you didn't attach this new patch? Oops! Sorry! No problem :) BTW: After looking at your original patch, I have the impression that you missed moving one $not (dport, in the line with two $nots). Good catch... Here (and really attached this time) is an updated patch including Gregor's point also. I think I found another one ... What I did was switching the (-)-$args and $nots with perl, and comparing the result with your patch there's one difference: #v+ -+ push (@source, $not -s $1 -m mac --mac-source $not $2); ++ push (@source, $not -s $1 -m mac $not --mac-source $2); #v- I'm attaching my complete (auto-)patch; could you please double-check? Cheers, gregor -- .''`. Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06 : :' : Debian GNU/Linux user, admin, and developer - http://www.debian.org/ `. `' Member of VIBE!AT SPI, fellow of the Free Software Foundation Europe `- NP: Tracy Chapman: Subcity diff --git a/uif.pl b/uif.pl index be60276..40fe2f1 100755 --- a/uif.pl +++ b/uif.pl @@ -984,14 +984,14 @@ sub genRuleDump { } my $range; foreach $range (@{$$rule{\u$proto}[2]}) { - push (@protocol, -p $proto -m $proto --sport $not $range); + push (@protocol, -p $proto -m $proto $not --sport $range); } foreach $range (@{$$rule{\u$proto}[3]}) { - push (@protocol, -p $proto -m $proto --dport $not $range); + push (@protocol, -p $proto -m $proto $not --dport $range); } foreach $range (@{$$rule{\u$proto}[4]}) { $range =~ /^(.+)\/(.+)$/; - push (@protocol, -p $proto -m $proto --sport $not $1 --dport $not $2); + push (@protocol, -p $proto -m $proto $not --sport $1 $not --dport $2); } } } @@ -999,16 +999,16 @@ sub genRuleDump { my $type; foreach $type (@{$$rule{'ICMP'}}) { if ($type eq 'all') { - push (@protocol, -p $not icmp); + push (@protocol, $not -p icmp); } else { - push (@protocol, -p icmp -m icmp --icmp-type $not $type); + push (@protocol, -p icmp -m icmp $not --icmp-type $type); } } } if (exists($$rule{'OtherProtocols'})) { my $proto; foreach $proto (@{$$rule{'OtherProtocols'}}) { -push (@protocol, -p $not $proto); +push (@protocol, $not -p $proto); } } if (exists($$rule{'Source'})) { @@ -1020,10 +1020,10 @@ sub genRuleDump { my $source; foreach $source (@{$$rule{'Source'}}) { if ($source =~ /(.+)=(.+)/ ($$rule{'Table'} eq 'filter')) { - push (@source, -s $not $1 -m mac --mac-source $not $2); + push (@source, $not -s $1 -m mac $not --mac-source $2); } else { $source =~ /([^=]+)/; - push (@source, -s $not $1); + push (@source, $not -s $1); } } } @@ -1036,7 +1036,7 @@ sub genRuleDump { my $destination; foreach $destination (@{$$rule{'Destination'}}) { $destination =~ /([^=]+)/; -push (@destination, -d $not $1); +push (@destination, $not -d $1); } } if (exists($$rule{'TranslatedSource'})) { @@ -1093,7 +1093,7 @@ sub genRuleDump { } my $input; foreach $input (@{$$rule{'InputInterface'}}) { -push (@inputinterface, -i $not $input); +push (@inputinterface, $not -i $input); } } if (exists($$rule{'OutputInterface'})) { @@ -1104,7 +1104,7 @@ sub genRuleDump { } my $output; foreach $output (@{$$rule{'OutputInterface'}}) { -push (@outputinterface, -o $not $output); +push (@outputinterface, $not -o $output); } } if (exists($$rule{'PhysicalInputInterface'})) { @@ -1115,7 +1115,7 @@ sub genRuleDump { } my $input; foreach $input (@{$$rule{'PhysicalInputInterface'}}) { -push (@physicalinputinterface, -m physdev --physdev-in $not $input); +push (@physicalinputinterface, -m physdev $not --physdev-in $input); } } if (exists($$rule{'PhysicalOutputInterface'})) { @@ -1126,7 +1126,7 @@ sub genRuleDump { } my $output; foreach $output (@{$$rule{'PhysicalOutputInterface'}}) { -push (@physicaloutputinterface, -m physdev --physdev-out $not $output); +push (@physicaloutputinterface, -m physdev $not --physdev-out $output); } } if (exists($$rule{'MarkMatch'})) { signature.asc Description: Digital signature
Bug#683312: Please consider including this patch before wheezy
On 14 January 2013 19:04, gregor herrmann gre...@debian.org wrote: I think I found another one ... What I did was switching the (-)-$args and $nots with perl, and comparing the result with your patch there's one difference: #v+ -+ push (@source, $not -s $1 -m mac --mac-source $not $2); ++ push (@source, $not -s $1 -m mac $not --mac-source $2); #v- I'm attaching my complete (auto-)patch; could you please double-check? Hello Gregor, I have used grep and wc -l and looked and re-looked... your patch looks complete to me. Thanks for looking at this issue and fixing my mistakes! Alex Owen -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698125: marked as done (glusterfs-client: Depends on fuse-utils; uninstallable in sid)
Your message dated Mon, 14 Jan 2013 19:47:48 + with message-id e1tuq0a-0002rw...@franck.debian.org and subject line Bug#698125: fixed in glusterfs 3.4.0~qa6-2 has caused the Debian Bug report #698125, regarding glusterfs-client: Depends on fuse-utils; uninstallable in sid to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 698125: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698125 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: glusterfs-client Version: 3.2.7-3 Severity: serious Tags: sid User: car...@debian.org Usertags: depends-on-fuse-utils Hi glusterfs-client 3.2.7-3 has a Depends on fuse-utils. In unstable fuse-utils was dropped. This makes glusterfs-client uninstallable in sid. Wheezy is not directly affected as the transitional package fuse-utils is still present there, so tagging this 'sid' only. Please change this dependency to fuse. Regards, Salvatore ---End Message--- ---BeginMessage--- Source: glusterfs Source-Version: 3.4.0~qa6-2 We believe that the bug you reported is fixed in the latest version of glusterfs, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 698...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Patrick Matthäi pmatth...@debian.org (supplier of updated glusterfs package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Mon, 14 Jan 2013 19:54:10 +0100 Source: glusterfs Binary: glusterfs-client glusterfs-server glusterfs-common glusterfs-dbg Architecture: source amd64 Version: 3.4.0~qa6-2 Distribution: experimental Urgency: low Maintainer: Patrick Matthäi pmatth...@debian.org Changed-By: Patrick Matthäi pmatth...@debian.org Description: glusterfs-client - clustered file-system (client package) glusterfs-common - GlusterFS common libraries and translator modules glusterfs-dbg - GlusterFS debugging symbols glusterfs-server - clustered file-system (server package) Closes: 698125 Changes: glusterfs (3.4.0~qa6-2) experimental; urgency=low . * Set homepage to www.gluster.org. * Migrate package from cdbs to minimal debhelper. * Switch to xz compression and add a Pre-Depends on dpkg. * Depend on fuse instead of fuse-utils package. Closes: #698125 Checksums-Sha1: 086206d160fe84b614d8fa23164492f62230f926 2175 glusterfs_3.4.0~qa6-2.dsc c727f4a4e9bd6260173d7eea824edd9bb3b1ac58 11532 glusterfs_3.4.0~qa6-2.debian.tar.gz 2d34bfe42c218161d5ecaf2567eaf287316461e2 1360348 glusterfs-client_3.4.0~qa6-2_amd64.deb 5e32830727a021265d47a9862f9ded1308d8f1a6 1428858 glusterfs-server_3.4.0~qa6-2_amd64.deb 4923d03cad2b0f236de66566bed50ec0a11fefda 2837566 glusterfs-common_3.4.0~qa6-2_amd64.deb 1122736668bb09402665776b1a261d1b38b63812 7967256 glusterfs-dbg_3.4.0~qa6-2_amd64.deb Checksums-Sha256: cc4546126f28890080874c21a4ddeec04bb4db3f748ee3c88b63456c238e6dd8 2175 glusterfs_3.4.0~qa6-2.dsc 81693f8a9a73f7480a1e4ded72ecbdbb4539ae34733045f2800f437945315eb0 11532 glusterfs_3.4.0~qa6-2.debian.tar.gz 8ff399171b9eec0eff0444b6595022bf4abed65bf64b9cf26942dcf2d1fb9110 1360348 glusterfs-client_3.4.0~qa6-2_amd64.deb 2f62a355b862f325e7c2059863d6cc259773222d05e648e72633a68c5731e127 1428858 glusterfs-server_3.4.0~qa6-2_amd64.deb 2db51a84f7d11a899d8632c5145827471525cbfe89586d1281ba7e1a120bfc94 2837566 glusterfs-common_3.4.0~qa6-2_amd64.deb c86b80d50914be55b99d0014c6beb892d39af4e6e300cb006f8ed07b61fc4749 7967256 glusterfs-dbg_3.4.0~qa6-2_amd64.deb Files: 102500f76b316e4a07934a8e085b9f66 2175 admin optional glusterfs_3.4.0~qa6-2.dsc 8a95147b0d0bd57acfe54754f992e939 11532 admin optional glusterfs_3.4.0~qa6-2.debian.tar.gz 01701095f514d10a957344312fec9bd5 1360348 admin optional glusterfs-client_3.4.0~qa6-2_amd64.deb 98828a5075db6c9cf44f1e8b0629a8e6 1428858 admin optional glusterfs-server_3.4.0~qa6-2_amd64.deb 4513feb9a9e3f448906b71e3241d48dc 2837566 libs optional glusterfs-common_3.4.0~qa6-2_amd64.deb dc188a76d4f21a4949fda3c4e66a5db5 7967256 debug extra glusterfs-dbg_3.4.0~qa6-2_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBCAAGBQJQ9F0UAAoJEBLZsEqQy9jkybcP/iFTCmaKGTTl1x9Mr4g8ubGV
Bug#683312: Please consider including this patch before wheezy
On Mon, 14 Jan 2013 19:25:50 +, Alex Owen wrote: What I did was switching the (-)-$args and $nots with perl, and comparing the result with your patch there's one difference: #v+ -+ push (@source, $not -s $1 -m mac --mac-source $not $2); ++ push (@source, $not -s $1 -m mac $not --mac-source $2); #v- I'm attaching my complete (auto-)patch; could you please double-check? I have used grep and wc -l and looked and re-looked... your patch looks complete to me. Cool. Thanks for looking at this issue and fixing my mistakes! Thanks for checking. Cheers, gregor, preparing an NMU -- .''`. Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06 : :' : Debian GNU/Linux user, admin, and developer - http://www.debian.org/ `. `' Member of VIBE!AT SPI, fellow of the Free Software Foundation Europe `- NP: Die Schmetterlinge: Die Mühlen der Gerechtigkeit / Lied der Justiz signature.asc Description: Digital signature
Processed: uif: diff for NMU version 1.0.6-1.1
Processing commands for cont...@bugs.debian.org: tags 683312 + pending Bug #683312 [uif] [PATCH] uif uses depricated position of ! to negate rules Added tag(s) pending. tags 692838 + pending Bug #692838 [uif] uif: [INTL:ja] New Japanese translation Added tag(s) pending. thanks Stopping processing here. Please contact me if you need assistance. -- 683312: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683312 692838: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692838 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#683312: uif: diff for NMU version 1.0.6-1.1
tags 683312 + pending tags 692838 + pending thanks Dear maintainer, I've prepared an NMU for uif (versioned as 1.0.6-1.1) and uploaded it to DELAYED/5. Please feel free to tell me if I should delay it longer. Regards. -- .''`. Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06 : :' : Debian GNU/Linux user, admin, and developer - http://www.debian.org/ `. `' Member of VIBE!AT SPI, fellow of the Free Software Foundation Europe `- NP: Davy Graham: Stan's Guitar Binary files /home/gregoa/tmp/n_mpPpDXFI/uif-1.0.6/.git/index and /home/gregoa/tmp/LUmA9Ks3AE/uif-1.0.6/.git/index differ diff -Nru uif-1.0.6/debian/changelog uif-1.0.6/debian/changelog --- uif-1.0.6/debian/changelog 2011-08-24 08:06:18.0 +0200 +++ uif-1.0.6/debian/changelog 2013-01-14 20:49:43.0 +0100 @@ -1,3 +1,15 @@ +uif (1.0.6-1.1) unstable; urgency=low + + * Non-maintainer upload. + * Fix uif uses deprecated position of ! to negate rules: +patch uif.pl to put '!' before the parameters. +Thanks to Alex Owen for the bug report and the initial patch. +(Closes: #683312) + * Fix New Japanese translation: add ja.po, thanks to victory. +(Closes: #692838) + + -- gregor herrmann gre...@debian.org Mon, 14 Jan 2013 20:48:18 +0100 + uif (1.0.6-1) unstable; urgency=low * New upstream version. diff -Nru uif-1.0.6/debian/po/ja.po uif-1.0.6/debian/po/ja.po --- uif-1.0.6/debian/po/ja.po 1970-01-01 01:00:00.0 +0100 +++ uif-1.0.6/debian/po/ja.po 2013-01-14 20:34:51.0 +0100 @@ -0,0 +1,149 @@ +# SOME DESCRIPTIVE TITLE. +# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER +# This file is distributed under the same license as the PACKAGE package. +# victory victory@gmail.com, 2012. +# +msgid +msgstr +Project-Id-Version: uif\n +Report-Msgid-Bugs-To: \n +POT-Creation-Date: 2012-06-17 00:37+\n +PO-Revision-Date: 2012-06-17 09:37+0900\n +Last-Translator: victory victory@gmail.com\n +Language-Team: Japanese debian-japan...@lists.debian.org\n +Language: ja\n +MIME-Version: 1.0\n +Content-Type: text/plain; charset=UTF-8\n +Content-Transfer-Encoding: 8bit\n + +#. Type: select +#. Choices +#: ../templates:1001 +msgid don't touch +msgstr 触らない + +#. Type: select +#. Choices +#: ../templates:1001 +msgid workstation +msgstr ワークステーション + +#. Type: select +#. Description +#: ../templates:1002 +msgid Firewall configuration method +msgstr ファイアウォール設定方法 + +#. Type: select +#. Description +#: ../templates:1002 +msgid +The firewall can be initialized using debconf, or using information you +manually put into /etc/uif/uif.conf. +msgstr +ファイアウォールは debconf を使って、あるいは /etc/uif/uif.conf に手作業で書き +込んだ情報を元に初期設定できます。 + +#. Type: string +#. Description +#: ../templates:2001 +msgid Enter trusted hosts and/or networks: +msgstr 信頼するホストやネットワークを入力してください: + +#. Type: string +#. Description +#: ../templates:2001 +msgid +In workstation mode, you can specify some hosts or networks to be globally +trusted. All incoming traffic coming from there will be allowed. Multiple +entries have to be separate with spaces. +msgstr +ワークステーションモードでは、全体的に信頼するホストやネットワークを指定できま +す。そこからのトラフィックはすべて許可されます。エントリを複数入力する場合は、 +スペースで区切ってください。 + +#. Type: string +#. Description +#: ../templates:2001 +msgid Example: 10.1.0.0/16 trust.mydomain.com 192.168.1.55 +msgstr 例: 10.1.0.0/16 trust.mydomain.com 192.168.1.55 + +#. Type: boolean +#. Description +#: ../templates:3001 +msgid Do you want your host to be reachable via ping? +msgstr ホストを ping が到達可能にしますか? + +#. Type: boolean +#. Description +#: ../templates:3001 +msgid +Normally an Internet host should be reachable with pings. Choosing no here +will disable pings which might be somewhat confusing when analyzing network +problems. +msgstr +通常、インターネットホストは ping が到達可能であるべきです。ここで no を選択す +ると ping を無効にするため、ネットワーク問題の分析の際にやや混乱が生まれるかも +しれません。 + +#. Type: boolean +#. Description +#: ../templates:4001 +msgid Do you want your host to react to traceroutes? +msgstr ホストを traceroute に反応するようにしますか? + +#. Type: boolean +#. Description +#: ../templates:4001 +msgid +Normally an Internet host should react to traceroutes. Choosing no here will +disable this, which might be somewhat confusing when analyzing network +problems. +msgstr +通常、インターネットホストは traceroute に反応するべきです。ここで no を選択す +るとこれを無効にするため、ネットワーク問題の分析の際にやや混乱が生まれるかも +しれません。 + +#. Type: note +#. Description +#: ../templates:5001 +msgid Firewall for simple workstation setups +msgstr 単純なワークステーション用設定によるファイアウォール + +#. Type: note +#. Description +#: ../templates:5001 +msgid +Warning: This configuration provides a very simple firewall setup which is +only able to trust certain hosts and configure global ping / traceroute +behaviour. +msgstr +警告: この設定が提供するのは非常に単純なファイアウォールで、できることは特定の +ホストを信頼することと全体的な ping / traceroute の動作の設定だけです。 + +#. Type: note +#. Description +#: ../templates:5001 +msgid +If you need a more specific setup, use /etc/uif/uif.conf as a template and +choose \don't touch\ next time. +msgstr +もっと具体的な設定が必要な場合は、/etc/uif/uif.conf
Processed: python-pygame: must add versioned dependency on python-numpy following ABI change
Processing control commands: block 685812 by -1 Bug #685812 [python-numpy] ABI change in 1.6.1 version 685812 was blocked by: 698042 698039 685812 was not blocking any bugs. Added blocking bug(s) of 685812: 698169 -- 685812: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685812 698169: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698169 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698169: python-pygame: must add versioned dependency on python-numpy following ABI change
Package: python-pygame Version: 1.9.1release+dfsg-7 Severity: serious Tags: patch Control: block 685812 by -1 Dear Maintainer, python-pygame uses the PyArray_CHAR enum which has been affected by an ABI breakage in python-numpy (see #685812). Note that the version of python-pygame currently in testing and unstable (1.9.1release+dfsg-7) was built against python-numpy = 1:1.6.1 and therefore does not need to be rebuilt. However, python-pygame does not declare a versioned dependency on python-numpy. This can break partial upgrades from Squeeze to Wheezy. I am therefore attaching a patch that fixes the issue. For Jessie you might want to automatically generate the right versioned dependencies on python-numpy, as explained in /usr/share/doc/python-numpy/README.DebianMaints. This would avoid the need for sourceful uploads in such situations. Cheers, -- .''`.Sébastien Villemot : :' :Debian Developer `. `' http://www.dynare.org/sebastien `- GPG Key: 4096R/381A7594 diff -Nru pygame-1.9.1release+dfsg/debian/changelog pygame-1.9.1release+dfsg/debian/changelog --- pygame-1.9.1release+dfsg/debian/changelog 2012-09-11 00:10:20.0 +0200 +++ pygame-1.9.1release+dfsg/debian/changelog 2013-01-14 20:49:07.0 +0100 @@ -1,3 +1,12 @@ +pygame (1.9.1release+dfsg-7.1) UNRELEASED; urgency=low + + * Non-maintainer upload. + * Following the ABI change in python-numpy = 1:1.6.1 (see #685812), add +Depends on python-numpy (= 1:1.6.1) and python-numpy-abi9 in order to +support partial upgrades. (Closes: #XX) + + -- Sébastien Villemot sebast...@debian.org Mon, 14 Jan 2013 20:48:08 +0100 + pygame (1.9.1release+dfsg-7) unstable; urgency=low * Add missing licenses and copyright holders in debian/copyright. diff -Nru pygame-1.9.1release+dfsg/debian/control pygame-1.9.1release+dfsg/debian/control --- pygame-1.9.1release+dfsg/debian/control 2012-04-20 05:21:47.0 +0200 +++ pygame-1.9.1release+dfsg/debian/control 2013-01-14 20:47:55.0 +0100 @@ -27,7 +27,8 @@ Package: python-pygame Architecture: any Depends: - python-numpy, + python-numpy (= 1:1.6.1), + python-numpy-abi9, ttf-freefont, ${misc:Depends}, ${python:Depends}, signature.asc Description: Digital signature
Bug#697866: marked as done (libgtk-3-bin fails to upgrade to 3.4.2-5)
Your message dated Mon, 14 Jan 2013 21:13:31 +0100 with message-id 1358194411.6300.34.ca...@brouzouf.villemot.name and subject line Re: Bug#697866: libgtk-3-bin fails to upgrade to 3.4.2-5 has caused the Debian Bug report #697866, regarding libgtk-3-bin fails to upgrade to 3.4.2-5 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 697866: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697866 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: libgtk-3-bin Version: 3.4.2-5 Severity: serious When trying to upgrade from 3.4.2-4 to 3.4.2-5 I get following error and aptitude aborts Adding 'diversion of /usr/sbin/update-icon-caches to /usr/sbin/update-icon-caches.gtk2 by libgtk-3-bin' dpkg-divert: error: rename involves overwriting `/usr/sbin/update-icon-caches.gtk2' with different file `/usr/sbin/update-icon-caches', not allowed dpkg: error processing /var/cache/apt/archives/libgtk-3-bin_3.4.2-5_amd64.deb (--unpack): subprocess new pre-installation script returned error exit status 2 Errors were encountered while processing: /var/cache/apt/archives/libgtk-3-bin_3.4.2-5_amd64.deb This leaves the package management in broken state hence I marked the bug as serious -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 armel Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores) Locale: LANG=en_IN, LC_CTYPE=en_IN (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages libgtk-3-bin depends on: ii libgtk-3-0 3.4.2-5 ii libgtk-3-common 3.4.2-5 libgtk-3-bin recommends no packages. libgtk-3-bin suggests no packages. -- no debconf information -- Vasudev Kamath http://copyninja.info Connect on ~friendica: copyninja@{frndk.de | vasudev.homelinux.net} IRC nick: copyninja | vasudev {irc.oftc.net | irc.freenode.net} GPG Key: C517 C25D E408 759D 98A4 C96B 6C8F 74AE 8770 0B7E signature.asc Description: Digital signature ---End Message--- ---BeginMessage--- Le dimanche 13 janvier 2013 à 08:41 +0530, Vasudev Kamath a écrit : After following Michael's instruction the upgrade was successful and I guess we can close the bug now Thanks, closing. Don't hesitate to come back with more details if by chance you find what put your system in this broken state. -- .''`.Sébastien Villemot : :' :Debian Developer `. `' http://www.dynare.org/sebastien `- GPG Key: 4096R/381A7594 signature.asc Description: This is a digitally signed message part ---End Message---
Bug#698175: python-sidl: needs rebuild because of python-numpy ABI change; must add corresponding versioned dependency
Package: python-sidl Version: 1.4.0.dfsg-8 Severity: serious Tags: patch Control: block 685812 by -1 Dear Maintainer, python-sidl uses the PyArray_CHAR enum which is affected by an ABI breakage in python-numpy (see #685812). It must therefore be rebuilt. Unfortunately a binNMU is not enough because this wouldn't produce the right versioned dependency on python-numpy (and we want to support partial upgrades). I am therefore attaching a patch for a sourceful upload. For Jessie you might want to automatically generate the right versioned dependencies on python-numpy, as explained in /usr/share/doc/python-numpy/README.DebianMaints. This would avoid the need for sourceful uploads in such situations. Regards, -- .''`.Sébastien Villemot : :' :Debian Developer `. `' http://www.dynare.org/sebastien `- GPG Key: 4096R/381A7594 diff -Nru babel-1.4.0.dfsg/debian/changelog babel-1.4.0.dfsg/debian/changelog --- babel-1.4.0.dfsg/debian/changelog 2010-08-06 23:31:03.0 +0200 +++ babel-1.4.0.dfsg/debian/changelog 2013-01-14 21:45:33.0 +0100 @@ -1,3 +1,13 @@ +babel (1.4.0.dfsg-8.1) UNRELEASED; urgency=low + + * Non-maintainer upload. + * Rebuild against python-numpy = 1:1.6.1 because of ABI change (see +#685812), and add Depends on python-numpy (= 1:1.6.1) and +python-numpy-abi9 in order to support partial upgrades. +(Closes: #XX) + + -- Sébastien Villemot sebast...@debian.org Mon, 14 Jan 2013 21:03:37 +0100 + babel (1.4.0.dfsg-8) unstable; urgency=low * Changed PYTHONINC variables for numpy package changes (closes: #590344). diff -Nru babel-1.4.0.dfsg/debian/control babel-1.4.0.dfsg/debian/control --- babel-1.4.0.dfsg/debian/control 2010-08-06 23:29:10.0 +0200 +++ babel-1.4.0.dfsg/debian/control 2013-01-14 21:45:36.0 +0100 @@ -56,7 +56,8 @@ Package: python-sidl Architecture: any Section: python -Depends: python-numpy, ${python:Depends}, ${shlibs:Depends}, ${misc:Depends} +Depends: python-numpy (= 1:1.6.1), python-numpy-abi9, ${python:Depends}, + ${shlibs:Depends}, ${misc:Depends} XB-Python-Version: ${python:Versions} Description: Scientific Interface Definition Language (SIDL) Python runtime Babel is a compiler for the Scientific Interface Definition Language (SIDL), signature.asc Description: Digital signature
Processed: python-sidl: needs rebuild because of python-numpy ABI change; must add corresponding versioned dependency
Processing control commands: block 685812 by -1 Bug #685812 [python-numpy] ABI change in 1.6.1 version 685812 was blocked by: 698042 698039 698169 685812 was not blocking any bugs. Added blocking bug(s) of 685812: 698175 -- 685812: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685812 698175: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698175 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#696909: chromium segfaults on startup on armhf
Note: adding debian-arm to cc for feedback from other porters. Jonathan Nieder wrote: Hi Peter, peter green wrote: Patch to make the package use bfd rather than gold on armel and armhf is attached. I may or may not upload this as a NMU. If you'll have time to continue working on chromium:arm in the future, it would probably be better to just add yourself to pkg-chromium on alioth Like any other package if chromium gives us problems over in raspbian I will try to get those problems fixed and will contribute what I discover back to debian where appropriate but I don't have any real knowlege of chromium's internals or build system nor do I have the time or inclination to learn them. Anyway I have some bad news. When I try to do an armel build with bfd on my imx board I get. LINK(target) out/Release/chrome /usr/bin/ld.bfd.real: failed to set dynamic section sizes: Memory exhausted collect2: ld returned 1 exit status I have plenty of swap so i'm pretty sure the real problem is not memory per-se but address space. I had the same problem with the raspbian build (but not with the debian armhf build) and for raspbian I worked arround it by building with user mode qemu on an x64 host (which provides significantly more virtual address space than any real arm system) but i'm not sure that is acceptable for debian. Thoughts on what to do for chromium on armel? leave it broken? drop it completely? upload packages built with bfd under user mode qemu (assuming that succeeds and produces usable packages) to the archive? -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: 618...@bugs.debian.org
Processing commands for cont...@bugs.debian.org: tags 618968 + patch Bug #618968 [netgen] netgen: links with both GPL-licensed and GPL-incompatible libraries Added tag(s) patch. thanks Stopping processing here. Please contact me if you need assistance. -- 618968: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618968 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#696817: dovecot destroys user ssl configuration
On Mon, 31 Dec 2012, Ian Zimmerman wrote: Ob-content: this looks like a rerun of #644121. That one got closed without ever getting resolved didn't it? I don't think it is the same problem because all the configuration files are protected by dpkg's upgrade mechanisms. The certificate stuff is a special case and it shouldn't be. -- Jaldhar H. Vyas jald...@debian.org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#696817: dovecot destroys user ssl configuration
Sorry for not responding sooner I was unexpectedly swamped during the new year. On Fri, 28 Dec 2012, Dominik George wrote: The breakage is even worse. 1. The code that causes the problem is intended to set the *new* path to the certificates. Why the f*** does it print $OLD_SSL_CERT ?? No the idea was that if you have the certs in the old location, only to update 10-ssl.conf and make sure it has the right configuration values otherwise leave them alone. 2. NEVER EVER touch user confiuration! It even breaks *own* paths set. 3. Why? 4. Why?? 5. Why??? The idea was to move the self-generated certs only. Obviously I did not consider the scenario where a user had their own certificates but did not remove the dummy certificates which leads me to... Here is a patch that leaves site-local confiuration as it is if it does not reference the default files and only touches it when it referenced the old default path before. It even uses the *new* path, sih ... did the maintainer even test this *once*? I do try and test this package as much as possible and I even had several other people test it before uploading but they didn't catch this either. The way Debians process is supposed to work is that packages get uploaded to unstable and with a wider audience problems will get caught before the package migrates to testing and mostly it works. But it seems that with dovecot people wait until it is already in testing before trying it which defeats the whole scheme. So what we really need is more testing before an upload even happens. In theory there is a team maintaining this package but in practice the others have even less free time than I do and this last year I have had next to no time at all. (I mean its been 3 weeks since this problem was reported and I'm only just responding. That would be unacceptable as a user even to me.) I try and recruit anyone who shows interest but that hasn't worked either so far. So once again, I ask anyone reading this who cares about the best possible dovecot package in Debian to pitch in. It's easy to get access to the source repository and I'll help in anyway I can even giving you ownership if you can do a better job. In the meantime I am preparing a new revision which will include your patch and better documentation of the situation. That's the best I can do for now. However, the only valid way to handle this is NOT handle it. Or do the modification in the ucf template *before* runnin ucf so it is merged into the confi file if and *only* if the user chooses to apply the chanes. Yes all this stuff needs to be moved over to ucf. I had someone offer to do this before the freeze began but then they disappeared and by that time it was too late for me to make such an invasive change. (See above.) -- Jaldhar H. Vyas jald...@debian.org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#696909: chromium segfaults on startup on armhf
It works when built with gold 2.23 on an armv6+ hardware host (bug 696284). This bug is also a dup, and was njotriced shortely after chromium 22 was made to build again on arm (ftbfs since chromium 18) due to my patches. peter green plugw...@p10link.net wrote: Note: adding debian-arm to cc for feedback from other porters. Jonathan Nieder wrote: Hi Peter, peter green wrote: Patch to make the package use bfd rather than gold on armel and armhf is attached. I may or may not upload this as a NMU. If you'll have time to continue working on chromium:arm in the future, it would probably be better to just add yourself to pkg-chromium on alioth Like any other package if chromium gives us problems over in raspbian I will try to get those problems fixed and will contribute what I discover back to debian where appropriate but I don't have any real knowlege of chromium's internals or build system nor do I have the time or inclination to learn them. Anyway I have some bad news. When I try to do an armel build with bfd on my imx board I get. LINK(target) out/Release/chrome /usr/bin/ld.bfd.real: failed to set dynamic section sizes: Memory exhausted collect2: ld returned 1 exit status I have plenty of swap so i'm pretty sure the real problem is not memory per-se but address space. I had the same problem with the raspbian build (but not with the debian armhf build) and for raspbian I worked arround it by building with user mode qemu on an x64 host (which provides significantly more virtual address space than any real arm system) but i'm not sure that is acceptable for debian. Thoughts on what to do for chromium on armel? leave it broken? drop it completely? upload packages built with bfd under user mode qemu (assuming that succeeds and produces usable packages) to the archive? -- To UNSUBSCRIBE, email to debian-arm-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/50f46ff0.6080...@p10link.net -- Sent from my Android phone with K-9 Mail. Please excuse my brevity.
Bug#681147: sendmail symlinks messed up during upgrade, copyright files missing
On 2012-11-24 13:46, Andreas Beckmann wrote: I think the patch for this issue is ready in GIT: git://github.com/anbe42/sendmail.git branch salvage (or bug-681147) I just didn't proceed to prepare a NMU and look for a sponsor since there is another RC bug (#684645) that I don't know how to fix. I intend to upload this (#681147 only) as a NMU (DELAYED/10) once my DD account got created and my key was added to the DD keyring. Andreas -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#696820: Acknowledgement (Error: open(/var/mail/USER) failed: Permission denied)
On Sat, 5 Jan 2013, Norbert Veber wrote: While I'm not 100% clear on how dovecot handles permissions, would the fix not be to set mail_access_groups=mail? Per http://wiki2.dovecot.org/Errors/ChgrpNoPerm Otherwise your default mail_location can not work unless it writes the files as root or something. This doesnt seem to be the case judging from the permission errors reported earlier. We want to avoid setting mail_access_group=mail because then a user would be able to read everyone elses mailbox. It should not in theory matter is mail_location is set appropriately but it looks like I'll have to investigate it further. -- Jaldhar H. Vyas jald...@debian.org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#696820: Error: open(/var/mail/USER) failed: Permission denied
On Sat, 29 Dec 2012, Jonas Smedegaard wrote: ...but something else must be going on as well: That change warned about in that accidentally silenced NEWS entry is way old, and what I did yesterday on multiple machines was update from 1:2.1.7-2. Seems to me that if I chose in earlier updates to keep my settings (as I suspect many would do, since that worked just fine!) the update process should have warned me about changing that file - it didn't! So regardless of that NEWS bug (which I have now reopened) I believe something is wrong here too. I'll redo the NEWS file in the next update so the various issues for upgraders are better explained and made more prominent. -- Jaldhar H. Vyas jald...@debian.org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#676841: marked as done (cairo-dock-core: segfault in cairo_dock_new_dialog() from libgldi.so3 when using log out applet)
Your message dated Mon, 14 Jan 2013 22:32:30 + with message-id e1tuszy-0008ss...@franck.debian.org and subject line Bug#676841: fixed in cairo-dock 3.0.0-2+deb7u1 has caused the Debian Bug report #676841, regarding cairo-dock-core: segfault in cairo_dock_new_dialog() from libgldi.so3 when using log out applet to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 676841: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=676841 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: cairo-dock-core Version: 3.0.0-2 Severity: important I have the log-out applet added to my dock. When I click any of the options in the Log out applet (such as Log out, Reboot, Shutdown,...), cairo-dock segfaults and is restarted automatically. No log out happens. cairo-dock is missing a -dbg package, so it seems impossible to get a complete stack trace. Program received signal SIGSEGV, Segmentation fault. 0x734c9729 in cairo_dock_new_dialog () from /usr/lib/libgldi.so.3 (gdb) thread apply all bt Thread 5 (Thread 0x7fffc6c56700 (LWP 27203)): #0 0x731caa93 in *__GI___poll (fds=optimized out, nfds=optimized out, timeout=-1) at ../sysdeps/unix/sysv/linux/poll.c:87 #1 0x7fffdcfe3e3f in ?? () from /usr/lib/x86_64-linux-gnu/libpulse.so.0 #2 0x7fffdcfd539c in pa_mainloop_poll () from /usr/lib/x86_64-linux- gnu/libpulse.so.0 #3 0x7fffdcfd59f9 in pa_mainloop_iterate () from /usr/lib/x86_64-linux- gnu/libpulse.so.0 #4 0x7fffdcfd5ab0 in pa_mainloop_run () from /usr/lib/x86_64-linux- gnu/libpulse.so.0 #5 0x7fffdcfe3def in ?? () from /usr/lib/x86_64-linux-gnu/libpulse.so.0 #6 0x7fffdcb8a423 in ?? () from /usr/lib/x86_64-linux- gnu/pulseaudio/libpulsecommon-2.0.so #7 0x72ee7b50 in start_thread (arg=optimized out) at pthread_create.c:304 #8 0x731d56dd in clone () at .../sysdeps/unix/sysv/linux/x86_64/clone.S:112 #9 0x in ?? () Thread 3 (Thread 0x7fffd71ae700 (LWP 27194)): #0 0x731caa93 in *__GI___poll (fds=optimized out, nfds=optimized out, timeout=-1) at ../sysdeps/unix/sysv/linux/poll.c:87 #1 0x751794d4 in g_main_context_poll (n_fds=1, fds=0xc05fb0, timeout=-1, context=0x7fffcc0011a0, priority=optimized out) at /tmp/buildd/glib2.0-2.32.3/./glib/gmain.c:3440 #2 g_main_context_iterate (context=0x7fffcc0011a0, block=block@entry=1, dispatch=dispatch@entry=1, self=error reading variable: Unhandled dwarf expression opcode 0xfa) at /tmp/buildd/glib2.0-2.32.3/./glib/gmain.c:3141 #3 0x75179932 in g_main_loop_run (loop=0x7fffcc000f80) at /tmp/buildd/glib2.0-2.32.3/./glib/gmain.c:3340 #4 0x772957f6 in gdbus_shared_thread_func (user_data=0x7fffcc001170) at /tmp/buildd/glib2.0-2.32.3/./gio/gdbusprivate.c:277 #5 0x7519bdf5 in g_thread_proxy (data=0xc814f0) at /tmp/buildd/glib2.0-2.32.3/./glib/gthread.c:801 #6 0x72ee7b50 in start_thread (arg=optimized out) at pthread_create.c:304 #7 0x731d56dd in clone () at .../sysdeps/unix/sysv/linux/x86_64/clone.S:112 #8 0x in ?? () Thread 2 (Thread 0x7fffd79af700 (LWP 27193)): #0 pthread_cond_timedwait@@GLIBC_2.3.2 () at .../nptl/sysdeps/unix/sysv/linux/x86_64/pthread_cond_timedwait.S:216 #1 0x751b5525 in g_cond_wait_until (cond=cond@entry=0xec2548, mutex=mutex@entry=0xec2540, end_time=end_time@entry=705083450967) at /tmp/buildd/glib2.0-2.32.3/./glib/gthread-posix.c:855 #2 0x7514fdb1 in g_async_queue_pop_intern_unlocked (queue=queue@entry=0xec2540, wait=wait@entry=1, end_time=end_time@entry=705083450967) at /tmp/buildd/glib2.0-2.32.3/./glib/gasyncqueue.c:424 #3 0x751503fa in g_async_queue_timeout_pop (queue=0xec2540, timeout=timeout@entry=1500) at /tmp/buildd/glib2.0-2.32.3/./glib/gasyncqueue.c:545 #4 0x7519c5b2 in g_thread_pool_wait_for_new_pool () at /tmp/buildd/glib2.0-2.32.3/./glib/gthreadpool.c:169 #5 g_thread_pool_thread_proxy (data=optimized out) at /tmp/buildd/glib2.0-2.32.3/./glib/gthreadpool.c:366 #6 0x7519bdf5 in g_thread_proxy (data=0x6719e0) at /tmp/buildd/glib2.0-2.32.3/./glib/gthread.c:801 #7 0x72ee7b50 in start_thread (arg=optimized out) at pthread_create.c:304 ---Type return to continue, or q return to quit--- #8 0x731d56dd in clone () at .../sysdeps/unix/sysv/linux/x86_64/clone.S:112 #9 0x in ?? () Thread 1 (Thread 0x77fb9980 (LWP 27188)): #0 0x734c9729 in cairo_dock_new_dialog () from /usr/lib/libgldi.so.3 #1 0x734ccd4a in cairo_dock_build_dialog () from /usr/lib/libgldi.so.3 #2
Processed: found 687947 in 1:4.04~dfsg-1
Processing commands for cont...@bugs.debian.org: found 687947 1:4.04~dfsg-1 Bug #687947 [wims] wims: modifies shipped files: /var/lib/wims/public_html/gifs/*, /var/lib/wims/public_html/themes/* Marked as found in versions wims/1:4.04~dfsg-1. thanks Stopping processing here. Please contact me if you need assistance. -- 687947: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687947 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: limit source to java-package, tagging 698108
Processing commands for cont...@bugs.debian.org: #java-package (0.50+nmu2) unstable; urgency=high # # * Java 7 updates now get two digits. Closes: #698108 # limit source java-package Limiting to bugs with field 'source' containing at least one of 'java-package' Limit currently set to 'source':'java-package' tags 698108 + pending Bug #698108 [java-package] jdk7u11 not supported Added tag(s) pending. thanks Stopping processing here. Please contact me if you need assistance. -- 698108: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698108 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698108: java-package: diff for NMU version 0.50+nmu2
tags 698108 + patch thanks Dear maintainer, I've prepared an NMU for java-package (versioned as 0.50+nmu2) and uploaded it to DELAYED/2. Please feel free to tell me if I should delay it longer (or even if I should dcut it to 0-day, given the security matter). If you prefer to fix it in another not intrusive way (not c1fb4d0), I'm happy to (quickly) sponsor your package too. Regards. David diff -Nru java-package-0.50+nmu1/debian/changelog java-package-0.50+nmu2/debian/changelog --- java-package-0.50+nmu1/debian/changelog 2012-09-06 18:38:09.0 -0400 +++ java-package-0.50+nmu2/debian/changelog 2013-01-14 19:31:25.0 -0400 @@ -1,3 +1,11 @@ +java-package (0.50+nmu2) unstable; urgency=high + + * Non-maintainer upload. + * Java 7 updates now get two digits. Closes: #698108 + * Update documentation accordingly. + + -- David Prévot taf...@debian.org Mon, 14 Jan 2013 19:30:55 -0400 + java-package (0.50+nmu1) unstable; urgency=low * Non-maintainer upload. diff -Nru java-package-0.50+nmu1/debian/control java-package-0.50+nmu2/debian/control --- java-package-0.50+nmu1/debian/control 2012-09-06 18:38:27.0 -0400 +++ java-package-0.50+nmu2/debian/control 2013-01-14 19:40:26.0 -0400 @@ -19,10 +19,10 @@ (with archive files downloaded from providers listed below) . Supported java binary distributions currently include: - * Oracle (http://www.oracle.com/technetwork/java/javase/downloads) : - - The J2SE Development Kit (JDK), version 6 (update = 10), 7 - - The J2SE Runtime Environment (JRE), version 6 (update = 10), 7 - - The J2SE API Javadoc, version 6 (update = 10), 7 + * Oracle (http://www.oracle.com/technetwork/java/javase/downloads): + - The J2SE Development Kit (JDK), version 6 and 7 (update = 10) + - The J2SE Runtime Environment (JRE), version 6 and 7 (update = 10) + - The J2SE API Javadoc, version 6 and 7 (update = 10) (Choose tar.gz archives or self-extracting archives, do _not_ choose the RPM!) . Please note that Debian recommends the use of openjdk-6-jdk/openjdk-6-jre diff -Nru java-package-0.50+nmu1/debian/README.Debian java-package-0.50+nmu2/debian/README.Debian --- java-package-0.50+nmu1/debian/README.Debian 2012-02-08 19:52:45.0 -0400 +++ java-package-0.50+nmu2/debian/README.Debian 2013-01-14 19:40:33.0 -0400 @@ -15,10 +15,10 @@ - installing the generated package Supported java binary distributions currently include: - * Oracle (http://www.oracle.com/technetwork/java/javase/downloads) : -- The J2SE Development Kit (JDK), version 6 (update = 10), 7 -- The J2SE Runtime Environment (JRE), version 6 (update = 10), 7 -- The J2SE API Javadoc, version 6 (update = 10), 7 + * Oracle (http://www.oracle.com/technetwork/java/javase/downloads): +- The J2SE Development Kit (JDK), version 6 and 7 (update = 10) +- The J2SE Runtime Environment (JRE), version 6 and 7 (update = 10) +- The J2SE API Javadoc, version 6 and 7 (update = 10) (Choose tar.gz archives or self-extracting archives, do _not_ choose the RPM!) All other previously supported jvm (Blackdown, IBM, ..) have been removed and diff -Nru java-package-0.50+nmu1/lib/oracle-j2re.sh java-package-0.50+nmu2/lib/oracle-j2re.sh --- java-package-0.50+nmu1/lib/oracle-j2re.sh 2012-01-21 08:21:00.0 -0400 +++ java-package-0.50+nmu2/lib/oracle-j2re.sh 2013-01-14 19:10:30.0 -0400 @@ -12,8 +12,8 @@ j2se_priority=314 found=true ;; - jre-7u[0-9]-linux-i586.tar.gz) # SUPPORTED - j2se_version=1.7.0+update${archive_name:6:1}${revision} + jre-7u[0-9][0-9]-linux-i586.tar.gz) # SUPPORTED + j2se_version=1.7.0+update${archive_name:6:2}${revision} j2se_expected_min_size=94 #Mb j2se_priority=316 found=true @@ -28,8 +28,8 @@ j2se_priority=314 found=true ;; - jre-7u[0-9]-linux-x64.tar.gz) # SUPPORTED - j2se_version=1.7.0+update${archive_name:6:1}${revision} + jre-7u[0-9][0-9]-linux-x64.tar.gz) # SUPPORTED + j2se_version=1.7.0+update${archive_name:6:2}${revision} j2se_expected_min_size=88 #Mb j2se_priority=316 found=true diff -Nru java-package-0.50+nmu1/lib/oracle-j2sdk-doc.sh java-package-0.50+nmu2/lib/oracle-j2sdk-doc.sh --- java-package-0.50+nmu1/lib/oracle-j2sdk-doc.sh 2012-01-21 08:21:00.0 -0400 +++ java-package-0.50+nmu2/lib/oracle-j2sdk-doc.sh 2013-01-14 19:09:57.0 -0400 @@ -7,8 +7,8 @@ j2se_expected_min_size=44 #Mb found=true ;; - jdk-7u[0-9]-apidocs.zip) # SUPPORTED - j2se_version=1.7.0+update${archive_name:6:1}${revision} + jdk-7u[0-9][0-9]-apidocs.zip) # SUPPORTED + j2se_version=1.7.0+update${archive_name:6:2}${revision} j2se_expected_min_size=290 #Mb found=true ;; diff -Nru java-package-0.50+nmu1/lib/oracle-j2sdk.sh java-package-0.50+nmu2/lib/oracle-j2sdk.sh --- java-package-0.50+nmu1/lib/oracle-j2sdk.sh 2012-01-21 08:21:00.0 -0400 +++ java-package-0.50+nmu2/lib/oracle-j2sdk.sh
Processed: java-package: diff for NMU version 0.50+nmu2
Processing commands for cont...@bugs.debian.org: tags 698108 + patch Bug #698108 [java-package] jdk7u11 not supported Added tag(s) patch. thanks Stopping processing here. Please contact me if you need assistance. -- 698108: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698108 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#696820: Error: open(/var/mail/USER) failed: Permission denied
[re-sending to proper addresses] Quoting Jaldhar H. Vyas (2013-01-14 21:34:10) On Sat, 29 Dec 2012, Jonas Smedegaard wrote: ...but something else must be going on as well: That change warned about in that accidentally silenced NEWS entry is way old, and what I did yesterday on multiple machines was update from 1:2.1.7-2. Seems to me that if I chose in earlier updates to keep my settings (as I suspect many would do, since that worked just fine!) the update process should have warned me about changing that file - it didn't! So regardless of that NEWS bug (which I have now reopened) I believe something is wrong here too. I'll redo the NEWS file in the next update so the various issues for upgraders are better explained and made more prominent. Sounds great! - Jonas -- * Jonas Smedegaard - idealist Internet-arkitekt * Tlf.: +45 40843136 Website: http://dr.jones.dk/ [x] quote me freely [ ] ask before reusing [ ] keep private signature.asc Description: signature
Bug#696909: chromium segfaults on startup on armhf
shawnland...@gmail.com wrote: It works when built with gold 2.23 Is anyone working on either getting that into wheezy (if it's a bugfix release that is likely to pass the release teams requirements) or to backport the required fixes? -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#696757: ecl hang: SIGNAL problem
My current guess is that ecl seems to block some signals it shouldn't be able to. However I'm somehow no longer able to run ecl_min in gdb in a usefull way it seems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#694376: dovecot-common: missing Breaks+Replaces: mailavenger ( 0.8.1-4)
Followup-For: Bug #694376 Control: retitle -1 dovecot-core: missing Breaks+Replaces: mailavenger ( 0.8.1-4) The file conflict was fixed by renaming the file in mailavenger, but dovecot-common still needs to ensure that it doesn't get installed along a mailavenger that predates the rename. Looks like the dovecot packages were reorganized since this bug was initially filed and the conflicting files are no longer in dovecot-common but are in dovecot-core nowadays. Therefore the Breaks+Replaces need to be added in dovecot-core instead. The following relationships should be added for a clean takeover (http://www.debian.org/doc/debian-policy/ch-relationships.html#s-replaces): Package: dovecot-core Breaks: mailavenger ( 0.8.1-4) Replaces: mailavenger ( 0.8.1-4) cheers, Andreas mailavenger=0.8.1-3_dovecot-core=1:2.1.7-6.log.gz Description: GNU Zip compressed data
Processed: Re: dovecot-common: missing Breaks+Replaces: mailavenger ( 0.8.1-4)
Processing control commands: retitle -1 dovecot-core: missing Breaks+Replaces: mailavenger ( 0.8.1-4) Bug #694376 {Done: jald...@debian.org (Jaldhar H. Vyas)} [dovecot-common] dovecot-common: missing Breaks+Replaces: mailavenger ( 0.8.1-4) Changed Bug title to 'dovecot-core: missing Breaks+Replaces: mailavenger ( 0.8.1-4)' from 'dovecot-common: missing Breaks+Replaces: mailavenger ( 0.8.1-4)' -- 694376: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694376 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: found 694376 in 1:2.1.7-6, found 697901 in scheme9/2012.12.17-1, found 697901 in c2html/0.9.6-3 ...
Processing commands for cont...@bugs.debian.org: found 694376 1:2.1.7-6 Bug #694376 {Done: jald...@debian.org (Jaldhar H. Vyas)} [dovecot-common] dovecot-core: missing Breaks+Replaces: mailavenger ( 0.8.1-4) Marked as found in versions dovecot/1:2.1.7-6; no longer marked as fixed in versions dovecot/1:2.1.7-6 and reopened. found 697901 scheme9/2012.12.17-1 Bug #697901 [scheme9,c2html] c2html and scheme9: error when trying to install together Marked as found in versions scheme9/2012.12.17-1. found 697901 c2html/0.9.6-3 Bug #697901 [scheme9,c2html] c2html and scheme9: error when trying to install together Marked as found in versions c2html/0.9.6-3. found 698115 dicom3tools/1.0~20121227-1 Bug #698115 [dicom3tools,dcap] dcap and dicom3tools: error when trying to install together Marked as found in versions dicom3tools/1.0~20121227-1. found 698115 dcap/2.47.7-1 Bug #698115 [dicom3tools,dcap] dcap and dicom3tools: error when trying to install together Marked as found in versions dcap/2.47.7-1. thanks Stopping processing here. Please contact me if you need assistance. -- 694376: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694376 697901: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697901 698115: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698115 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698169: marked as done (python-pygame: must add versioned dependency on python-numpy following ABI change)
Your message dated Tue, 15 Jan 2013 03:47:52 + with message-id e1tuxva-w9...@franck.debian.org and subject line Bug#698169: fixed in pygame 1.9.1release+dfsg-8 has caused the Debian Bug report #698169, regarding python-pygame: must add versioned dependency on python-numpy following ABI change to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 698169: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698169 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: python-pygame Version: 1.9.1release+dfsg-7 Severity: serious Tags: patch Control: block 685812 by -1 Dear Maintainer, python-pygame uses the PyArray_CHAR enum which has been affected by an ABI breakage in python-numpy (see #685812). Note that the version of python-pygame currently in testing and unstable (1.9.1release+dfsg-7) was built against python-numpy = 1:1.6.1 and therefore does not need to be rebuilt. However, python-pygame does not declare a versioned dependency on python-numpy. This can break partial upgrades from Squeeze to Wheezy. I am therefore attaching a patch that fixes the issue. For Jessie you might want to automatically generate the right versioned dependencies on python-numpy, as explained in /usr/share/doc/python-numpy/README.DebianMaints. This would avoid the need for sourceful uploads in such situations. Cheers, -- .''`.Sébastien Villemot : :' :Debian Developer `. `' http://www.dynare.org/sebastien `- GPG Key: 4096R/381A7594 diff -Nru pygame-1.9.1release+dfsg/debian/changelog pygame-1.9.1release+dfsg/debian/changelog --- pygame-1.9.1release+dfsg/debian/changelog 2012-09-11 00:10:20.0 +0200 +++ pygame-1.9.1release+dfsg/debian/changelog 2013-01-14 20:49:07.0 +0100 @@ -1,3 +1,12 @@ +pygame (1.9.1release+dfsg-7.1) UNRELEASED; urgency=low + + * Non-maintainer upload. + * Following the ABI change in python-numpy = 1:1.6.1 (see #685812), add +Depends on python-numpy (= 1:1.6.1) and python-numpy-abi9 in order to +support partial upgrades. (Closes: #XX) + + -- Sébastien Villemot sebast...@debian.org Mon, 14 Jan 2013 20:48:08 +0100 + pygame (1.9.1release+dfsg-7) unstable; urgency=low * Add missing licenses and copyright holders in debian/copyright. diff -Nru pygame-1.9.1release+dfsg/debian/control pygame-1.9.1release+dfsg/debian/control --- pygame-1.9.1release+dfsg/debian/control 2012-04-20 05:21:47.0 +0200 +++ pygame-1.9.1release+dfsg/debian/control 2013-01-14 20:47:55.0 +0100 @@ -27,7 +27,8 @@ Package: python-pygame Architecture: any Depends: - python-numpy, + python-numpy (= 1:1.6.1), + python-numpy-abi9, ttf-freefont, ${misc:Depends}, ${python:Depends}, signature.asc Description: Digital signature ---End Message--- ---BeginMessage--- Source: pygame Source-Version: 1.9.1release+dfsg-8 We believe that the bug you reported is fixed in the latest version of pygame, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 698...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Vincent Cheng vincentc1...@gmail.com (supplier of updated pygame package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Mon, 14 Jan 2013 19:23:48 -0800 Source: pygame Binary: python-pygame Architecture: source amd64 Version: 1.9.1release+dfsg-8 Distribution: unstable Urgency: low Maintainer: Ed Boraas e...@debian.org Changed-By: Vincent Cheng vincentc1...@gmail.com Description: python-pygame - SDL bindings for games development in Python Closes: 698169 Changes: pygame (1.9.1release+dfsg-8) unstable; urgency=low . [ Sébastien Villemot ] * Following the ABI change in python-numpy = 1:1.6.1 (see #685812), add Depends on python-numpy (= 1:1.6.1) and python-numpy-abi9 in order to support partial upgrades. (Closes: #698169) Checksums-Sha1: 7dc999a97135f73f3e2c93298dcacfd94be1d9c2 2289 pygame_1.9.1release+dfsg-8.dsc de4020dfe2a1fec81e634308771d7f5f70cd4476 2090697 pygame_1.9.1release+dfsg.orig.tar.gz 7fec19b8766e41df76fa803b5e2812d12591776a 14617 pygame_1.9.1release+dfsg-8.debian.tar.gz 9e2cda11cf722247bf6af764d0857d9432b3e942 2917154
Processed: tagging as pending bugs that are closed by packages in NEW
Processing commands for cont...@bugs.debian.org: # Monday 21 January 19:03:11 UTC 2013 # Tagging as pending bugs that are closed by packages in NEW # http://ftp-master.debian.org/new.html # # Source package in NEW: a href=http://packages.qa.debian.org/jquery-goodies;jquery-goodies/a tags 697234 + pending Bug #697234 [wnpp] ITP: libjs-jquery-slides -- Simple slideshow plugin for jQuery Added tag(s) pending. # Source package in NEW: a href=http://packages.qa.debian.org/libguestfs;libguestfs/a tags 698151 + pending Bug #698151 [src:libguestfs] libguestfs: FTBFS in unstable due to dropped fuse-utils (Build-Depends) Added tag(s) pending. End of message, stopping processing here. Please contact me if you need assistance. -- 697234: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697234 698151: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698151 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: found 697901 in scheme9/2013.01.09-1
Processing commands for cont...@bugs.debian.org: found 697901 scheme9/2013.01.09-1 Bug #697901 [scheme9,c2html] c2html and scheme9: error when trying to install together Marked as found in versions scheme9/2013.01.09-1. thanks Stopping processing here. Please contact me if you need assistance. -- 697901: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697901 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698108: java-package: diff for NMU version 0.50+nmu2
On 2013-01-15 00:57, David Prévot wrote: tags 698108 + patch thanks Dear maintainer, I've prepared an NMU for java-package (versioned as 0.50+nmu2) and uploaded it to DELAYED/2. Please feel free to tell me if I should delay it longer (or even if I should dcut it to 0-day, given the security matter). If you prefer to fix it in another not intrusive way (not c1fb4d0), I'm happy to (quickly) sponsor your package too. Regards. David [...] Seems to me your patch will prevent anyone from using java-package on the older Java7 binaries. If we do remove this support because they are infested with security issues making them unsuitable for anything at all[1], I think it should have a nice little error message saying Nope, won't do this - That version is vulnerable/unsupported/$whatever. Just so people are aware it is a deliberate choice from our side and not a buggy script crashing. (Particularly people have been using it with older versions before. They might be surprised to see that non-descriptive error message the reporter included in the original mail). ~Niels [1] Something I would find entirely plausible at this point. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org