Bug#767037: Grub EFI fallback - patches for review

2014-12-02 Thread Ian Campbell
On Mon, 2014-12-01 at 13:57 +, Steve McIntyre wrote:

Starting with grub-install-fallback.patch:

 From e384e597914b6e1b1dcbf96ef6782cf9bcc2313b Mon Sep 17 00:00:00 2001
  debian/patches/grub-install-extra-removable.patch | 115 
 ++

Could you send this to grub-de...@gnu.org? Or at least provide a commit
log for the upstream bit inline in the patch for whoever does end up
forwarding it.

 +@@ -829,6 +838,27 @@ fill_core_services (const char *core_ser
 +   free (sysv_plist);
 + }
 + 
 ++static void
 ++also_install_removable(const char *src, const char *base_efidir, const char 
 *efi_suffix_upper)
 ++{
 ++  char *efi_file = NULL;
 ++  char *dst = NULL;
 ++  char *dir = NULL;
 ++  
 ++  if (!efi_suffix_upper)
 ++grub_util_error (%s, _(You've found a bug));

There are one or two of these in the upstream code base already, but it
is a bit unfriendly to the bug-reported/triagger.

I see an existing instance of
_(you found a bug ... (%s:%d)\n), file, line)
which is a bit nicer at least. Plain old assert() sees some usage too.

The Debian-specific bits all look sensible to me, FWIW. There will be a
minor conflict with the patches in #770412 but nothing insurmountable.

 [...]
 + also depend on this path. If so, uou will need to ensure that GRUB is

Typo: uou.

Ian.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#767037: Grub EFI fallback - patches for review

2014-12-02 Thread Ian Campbell
On Mon, 2014-12-01 at 13:57 +, Steve McIntyre wrote:

grub-installer-rescue-UEFI-removable.patch:

 diff --git a/debian/grub-installer.templates b/debian/grub-installer.templates
 index e439ad0..a6af2ec 100644
 --- a/debian/grub-installer.templates
 +++ b/debian/grub-installer.templates
 @@ -209,6 +209,21 @@ Type: text
  # :sl1:
  _Description: Updating /etc/kernel-img.conf...
  
 +Template: grub-installer/progress/step_force_efi

Perhaps add _removable at the end of the name?

I didn't review the text since that seems to have been done already.

 diff --git a/rescue.d/81grub-efi-force-removable 
 b/rescue.d/81grub-efi-force-removable

I don't know much about rescue mode, is this offering an automatic fixup
for this issue? Does it appear in a menu to be selected rather than
asking everyone booting rescue on an EFI system? 

 +mountvirtfs () {
 +   fstype=$1
 +   path=$2
 +   if grep -q [[:space:]]$fstype\$ /proc/filesystems  \
 +  ! grep -q ^[^ ]\+ \+$path  /proc/mounts; then
 +   mkdir -p $path || \
 +   die grub-installer/mounterr Error creating $path
 +   mount -t $fstype $fstype $path || \
 +   die grub-installer/mounterr Error mounting $path
 +   trap umount $path HUP INT QUIT KILL PIPE TERM EXIT

trap doesn't stack, does it? You call mountvirtfs twice, so only the
second umount will actually happen on error.

Also you umount explicitly on the exit path, but don't cancel this trap,
so I guess you'll see some noise from umount the second time.

I know we've established that in-target isn't widely used in this
particular bit of code -- but it does take care of all this sort of
thing automatically and (presumably!) correctly, as well as being only a
single place to fix if it is wrong (e.g. in-target handles BSD
explicitly too).
 
 +log Mounting filesystems
 +# If we're installing grub-efi, it wants /sys mounted in the
 +# target. Maybe /proc too?
 +mountvirtfs proc /target/proc
 +mountvirtfs sysfs /target/sys
 +chroot /target mount /boot/efi || true
 +
 +db_progress STEP 1
 +db_progress INFO grub-installer/progress/step_install_loader
 +# Do the installation now
 +log Running grub-install
 +if ! chroot /target grub-install --force-extra-removable; then

The main invocation would invoke this with a --target=foo-efi. Not
sure if this matters or not.

In order to avoid having to repeat all the logic twice perhaps you could
arrange to do the debconf-set-selections thing first and then run
dpkg-reconfigure or something in the target to force the main postinst
to rerun and reinstall?

 +   db_input critical grub-installer/grub-install-failed || true
 +   db_go || true
 +   db_progress STOP
 +   exit 1

You don't umount /target/boot/efi on this path.

Ian.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771719: tcplay: does not support discs with 4k sectors

2014-12-02 Thread Ralf Jung
Hi László,

  Yes, it seems it was fixed in 2.0, but it has a somewhat unclear
 license.

Ouch. Do you have a pointer to the issue?

 I've backported the fix for 1.1. But don't have any 4k discs
 nearby, can you test it for me? You should build it for yourself[1]
 and only in the last chance use my own binary packages for amd64[2] or
 i386[3].

Since I'm going to run this stuff as root, I'd prefer to have some
cryptographic evidence that this is actually the version you are trying
to send me. Your server doesn't seem to do https. I tried getting the
source of the package as it is currently in Debian (to verify the
upstream part, and then diff the debian part), but dget says
verification failed.

Once I got it build, I can sure test it, but it may be until Thursday
that I have access to the disc *and* time to do this.

Kind regards
Ralf


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#770918: marked as done (flac: CVE-2014-8962/CVE-2014-9028: heap buffer overflows)

2014-12-02 Thread Debian Bug Tracking System
Your message dated Tue, 02 Dec 2014 09:20:39 +
with message-id e1xvjdp-0001bu...@franck.debian.org
and subject line Bug#770918: fixed in flac 1.3.1-1
has caused the Debian Bug report #770918,
regarding flac: CVE-2014-8962/CVE-2014-9028: heap buffer overflows
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
770918: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770918
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: flac
Version: 1.3.0-2+b1
Severity: serious
Tags: security

From: http://lists.xiph.org/pipermail/flac-dev/2014-November/005226.html

 Google Security Team member, Michele Spagnuolo, recently found two potential
 problems in the FLAC code base. They are :
 
 
 CVE-2014-9028 : Heap buffer write overflow
 CVE-2014-8962 : Heap buffer read overflow
 
 For Linux distributions, the specific fixes for these two CVEs are available
 from Git here:
 
 
 https://git.xiph.org/?p=flac.git;a=commit;h=fcf0ba06ae12ccd7c67cee3c8d948df15f946b85
 
 https://git.xiph.org/?p=flac.git;a=commit;h=5b3033a2b355068c11fe637e14ac742d273f076e
 
 and are simple enough that they should apply cleanly to the last official
 release 1.3.0 and possibly even the previous one, 1.2.1.
 
 A pre-release (version 1.3.1pre1) for the next version which includes these
 fixes and more is available here:
 
 http://downloads.xiph.org/releases/flac/beta/
 
 A full release (version 1.3.1) will be available in the next couple of days.


-- System Information:
Debian Release: jessie/sid
  APT prefers testing
  APT policy: (900, 'testing'), (800, 'unstable'), (500, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.17-rc5-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_AU.UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages flac depends on:
ii  libc6 2.19-13
ii  libflac8  1.3.0-2+b1

flac recommends no packages.

flac suggests no packages.

-- no debconf information
---End Message---
---BeginMessage---
Source: flac
Source-Version: 1.3.1-1

We believe that the bug you reported is fixed in the latest version of
flac, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 770...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Fabian Greffrath fabian+deb...@greffrath.com (supplier of updated flac 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 01 Dec 2014 18:32:57 +0100
Source: flac
Binary: flac libflac8 libflac-doc libflac-dev libflac++6 libflac++-dev
Architecture: source amd64 all
Version: 1.3.1-1
Distribution: experimental
Urgency: medium
Maintainer: Debian Multimedia Maintainers 
pkg-multimedia-maintain...@lists.alioth.debian.org
Changed-By: Fabian Greffrath fabian+deb...@greffrath.com
Description:
 flac   - Free Lossless Audio Codec - command line tools
 libflac++-dev - Free Lossless Audio Codec - C++ development library
 libflac++6 - Free Lossless Audio Codec - C++ runtime library
 libflac-dev - Free Lossless Audio Codec - C development library
 libflac-doc - Free Lossless Audio Codec - library documentation
 libflac8   - Free Lossless Audio Codec - runtime C library
Closes: 770918
Changes:
 flac (1.3.1-1) experimental; urgency=medium
 .
   [ Jackson Doak ]
   * Disable silent rules
   * Enable hardening
   * Add symbols files
 .
   [ Fabian Greffrath ]
   * Adapt debian/watch file to reflect actual upstream versioning scheme.
   * Imported Upstream version 1.3.1
 + Fixes CVE-2014-8962 and CVE-2014-9028 (Closes: #770918).
 + Support for 3DNOW! optimizations has been removed.
 + Localized RU documentation has been removed.
   * Drop patches applied upstream.
   * Backport patch from upstream GIT to fix another input validation bug.
   * Fix privacy-breach-logo and privacy-breach-w3c-valid-html
 lintian errors.
   * In debian/rules, remove the override_dh_makeshlibs rule
 for the symbols files to have effect.
   * Update, improve and convert debian/copyright to machine-readable format.
   * Bump Standards-Version to 3.9.6.
Checksums-Sha1:
 

Bug#766308: marked as done (Fails to purge: /var/lib/dpkg/info/mdadm.postrm: 9: /usr/share/debconf/confmodule: DEBIAN_HAS_FRONTEND: parameter not set)

2014-12-02 Thread Debian Bug Tracking System
Your message dated Tue, 02 Dec 2014 09:22:07 +
with message-id e1xvjep-0001ub...@franck.debian.org
and subject line Bug#766308: fixed in mdadm 3.3.2-3
has caused the Debian Bug report #766308,
regarding Fails to purge: /var/lib/dpkg/info/mdadm.postrm: 9: 
/usr/share/debconf/confmodule: DEBIAN_HAS_FRONTEND: parameter not set
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
766308: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766308
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: mdadm
Version: 3.3.2-2
Severity: serious

SUMMARY: set -u breaks debconf. You can't have it in effect in your
postrm when sourcing it.

DETAILS:

root@Heisenberg:~# dpkg --purge mdadm
(Reading database ... 313312 files and directories currently installed.)
Removing mdadm (3.3.2-2) ...
Purging configuration files for mdadm (3.3.2-2) ...
/var/lib/dpkg/info/mdadm.postrm: 9: /usr/share/debconf/confmodule: 
DEBIAN_HAS_FRONTEND: parameter not set
dpkg: error processing package mdadm (--purge):
 subprocess installed post-removal script returned error exit status 2
Errors were encountered while processing:
 mdadm
root@Heisenberg:~#

Adding set -x to the top of the postrm (editing the file in
/var/lib/dpkg/info), shows that it's blowing up here:

   # Automatically added by dh_installdebconf
   if [ $1 = purge ]  [ -e /usr/share/debconf/confmodule ]; then
---   . /usr/share/debconf/confmodule   ---
   db_purge
   fi

And that's because you have set -ue at the top of the script, the -u
being the problem. Once I remove that, the package purges successfully.

-- System Information:
Debian Release: jessie/sid
  APT prefers testing
  APT policy: (500, 'testing'), (150, 'unstable'), (125, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16-3-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages mdadm depends on:
ii  debconf  1.5.53
ii  initscripts  2.88dsf-53.4
ii  libc62.19-11
ii  lsb-base 4.1+Debian13
ii  udev 215-5+b1

Versions of packages mdadm recommends:
ii  exim4-daemon-light [mail-transport-agent]  4.84-2
ii  module-init-tools  18-3

mdadm suggests no packages.
---End Message---
---BeginMessage---
Source: mdadm
Source-Version: 3.3.2-3

We believe that the bug you reported is fixed in the latest version of
mdadm, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 766...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Tokarev m...@tls.msk.ru (supplier of updated mdadm package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Fri, 28 Nov 2014 09:55:14 +0300
Source: mdadm
Binary: mdadm mdadm-udeb
Architecture: source amd64
Version: 3.3.2-3
Distribution: unstable
Urgency: medium
Maintainer: Debian mdadm maintainers pkg-mdadm-de...@lists.alioth.debian.org
Changed-By: Michael Tokarev m...@tls.msk.ru
Description:
 mdadm  - tool to administer Linux MD arrays (software RAID)
 mdadm-udeb - tool to administer Linux MD arrays (software RAID) (udeb)
Closes: 764036 764647 766308 766416
Changes:
 mdadm (3.3.2-3) unstable; urgency=medium
 .
   * remove /var/lib/mdadm dir in postinst to clean up from old pkg,
 remove config files on purge (restore extraneous cleanup from
 last change)  (Closes: #764036)
   * remove set -u (error on unset variables) from maintscripts
 (Closes: #766308)
   * rebuildmap-strip-local-host-name-from-device-name.patch - a patch
 from upstream fixing a bug when mdadm have to re-create device
 nodes after assembling arrays (eg, when switching from initramfs
 without preserving /dev and /run), to choose the same device names
 as when doing inital assembly
   * readlink-path.patch: readlink is in /bin not /usr/bin on debian
 (Closes: #766416)
   * mdmonitor-service-simplify.diff: simplify mdmonitor.service
 systemd file, do not try to read non-existing files (Closes: #764647)
Checksums-Sha1:
 b35d0b9ae4391a5cff56722b4907749c672a1b58 1626 mdadm_3.3.2-3.dsc
 

Processed: notfound 771739 in 215-7

2014-12-02 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 notfound 771739 215-7
Bug #771739 [systemd] could not start nodm with systemd 217-1 or 217-2
Ignoring request to alter found versions of bug #771739 to the same values 
previously set
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
771739: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771739
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771778: squid3: Pinger segfault with libc

2014-12-02 Thread Louis
Package: squid3
Version: 3.4.8-2
Severity: critical
Justification: breaks the whole system

Dear Maintainer,
*** Please consider answering these questions, where appropriate ***

   * What led up to the situation?
   * What exactly did you do (or not do) that was effective (or
 ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?

*** End of the template - remove these lines ***


-- System Information:
Debian Release: 7.7
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages squid3 depends on:
ii  adduser  3.113+nmu3
ii  libc62.13-38+deb7u6
ii  libcap2  1:2.22-1.2
ii  libcomerr2   1.42.5-1.1
ii  libdb5.1 5.1.29-5
ii  libecap2 0.2.0-1
ii  libexpat12.1.0-1+deb7u1
ii  libgcc1  1:4.7.2-5
ii  libgssapi-krb5-2 1.10.1+dfsg-5+deb7u2
ii  libk5crypto3 1.10.1+dfsg-5+deb7u2
ii  libkrb5-31.10.1+dfsg-5+deb7u2
ii  libldap-2.4-22.4.31-1+nmu2
ii  libltdl7 2.4.2-1.1
ii  libnetfilter-conntrack3  1.0.1-1
ii  libnettle4   2.7.1-3
ii  libpam0g 1.1.3-7.1
ii  libsasl2-2   2.1.25.dfsg1-6+deb7u1
ii  libstdc++6   4.7.2-5
ii  libxml2  2.8.0+dfsg1-7+wheezy2
ii  logrotate3.8.1-4
ii  lsb-base 4.1+Debian8+deb7u1
ii  netbase  5.0
ii  squid3-common3.4.8-2

squid3 recommends no packages.

Versions of packages squid3 suggests:
pn  resolvconf   none
pn  smbclientnone
ii  squid-cgi3.4.8-2
ii  squid-purge  3.4.8-2
ii  squidclient  3.4.8-2
ii  ufw  0.31.1-2
pn  winbindd none

-- Configuration Files:
/etc/logrotate.d/squid3 changed:
/var/log/squid3/*.log {
daily
compress
delaycompress
rotate 14
missingok
nocreate
sharedscripts
postrotate
test ! -e /var/run/squid3.pid || test ! -x /usr/sbin/squid3 || 
/usr/sbin/squid3 -k rotate
endscript
}

/etc/squid3/errorpage.css changed:
/*
 Stylesheet for Squid Error pages
 Adapted from design by Free CSS Templates
 http://www.freecsstemplates.org
 Released for free under a Creative Commons Attribution 2.5 License
*/
/* Page basics */
* {
font-family: verdana, sans-serif;
}
html body {
margin: 0;
padding: 0;
background: #efefef;
font-size: 12px;
color: #1e1e1e;
}
/* Page displayed title area */
margin-left: 15px;
padding: 10px;
padding-left: 100px;
background: url('http://rtd-proxy1.rotterdam.bazuin.nl/Artwork/SN.png') 
no-repeat left;
}
/* initial title */
color: #00;
}
color: #00;
}
/* special event: FTP success page titles */
background-color:#00ff00;
width:100%;
}
/* Page displayed body content area */
padding: 10px;
background: #ff;
}
/* General text */
p {
}
/* error brief description */
}
/* some data which may have caused the problem */
}
/* the error message received from the system or other software */
}
pre {
font-family:sans-serif;
}
/* special event: FTP / Gopher directory listing */
font-family: courier;
color: black;
font-size: 10pt;
}
margin-left: 2%;
margin-right: 2%;
}
border-bottom: groove;
}
width: 50px;
text-align: right;
padding-right: 5px;
}
/* horizontal lines */
hr {
margin: 0;
}
/* page displayed footer area */
font-size: 9px;
padding-left: 10px;
}

/etc/squid3/squid.conf changed:
include /etc/squid3/conf.d/*.conf

/etc/ufw/applications.d/squid3 changed:
[Squid]
title=Squid proxy cache
description=Internet object cache (WWW proxy cache)
ports=2048,3128,3130,3401,4827,8080/tcp


-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#728113: smartmontools still broken

2014-12-02 Thread Thomas Prokosch
I have just tried running smartctl with the updated binutils version 
2.24.90.20141201-1, however the bug is still there.


$ smartctl -a /dev/sda
Inconsistency detected by ld.so: dl-version.c: 224: 
_dl_check_map_versions: Assertion `needed != ((void *)0)' failed!



br,
Thomas


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#728113: smartmontools still broken

2014-12-02 Thread Kurt Roeckx
On Tue, Dec 02, 2014 at 11:02:27AM +0100, Thomas Prokosch wrote:
 I have just tried running smartctl with the updated binutils version
 2.24.90.20141201-1, however the bug is still there.
 
 $ smartctl -a /dev/sda
 Inconsistency detected by ld.so: dl-version.c: 224: _dl_check_map_versions:
 Assertion `needed != ((void *)0)' failed!

Please note that you need to rebuild the package for the error to
go away.


Kurt


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771779: libc6: dpkg error trying to install libc6:mips and libc6:mipsel together

2014-12-02 Thread James Cowgill
Package: libc6
Version: 2.19-13
Severity: serious

Hi,

When I try to install libc6:mips and libc6:mipsel together, I get the
following error:

 Preconfiguring packages ...
 Selecting previously unselected package libc6:mips.
 (Reading database ... 216565 files and directories currently installed.)
 Preparing to unpack .../libc6_2.19-13_mips.deb ...
 Unpacking libc6:mips (2.19-13) ...
 Selecting previously unselected package libgcc1:mips.
 Preparing to unpack .../libgcc1_1%3a4.9.2-4_mips.deb ...
 Unpacking libgcc1:mips (1:4.9.2-4) ...
 Preparing to unpack .../libc6_2.19-13_mipsel.deb ...
 Unpacking libc6:mipsel (2.19-13) ...
 dpkg: error processing archive 
 /var/cache/apt/archives/libc6_2.19-13_mipsel.deb (--unpack):
  trying to overwrite shared '/lib/ld.so.1', which is different from other 
 instances of package libc6:mipsel
 Selecting previously unselected package libgcc1:mipsel.
 Preparing to unpack .../libgcc1_1%3a4.9.2-4_mipsel.deb ...
 Unpacking libgcc1:mipsel (1:4.9.2-4) ...
 Errors were encountered while processing:
  /var/cache/apt/archives/libc6_2.19-13_mipsel.deb
 E: Sub-process /usr/bin/dpkg returned an error code (1)
 Failed to perform requested operation on package.  Trying to recover:
 dpkg: dependency problems prevent configuration of libgcc1:mipsel:
  libgcc1:mipsel depends on libc6 (= 2.2.4); however:
   Package libc6:mipsel is not installed.
 
 dpkg: error processing package libgcc1:mipsel (--configure):
  dependency problems - leaving unconfigured
 Setting up libc6:mips (2.19-13) ...
 Setting up libgcc1:mips (1:4.9.2-4) ...
 Processing triggers for libc-bin (2.19-13) ...
 Errors were encountered while processing:
  libgcc1:mipsel

Thanks,
James

-- System Information:
Debian Release: 8.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386 mips mipsel

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771778: Acknowledgement (squid3: Pinger segfault with libc)

2014-12-02 Thread L . P . H . van Belle
extra info. 

This is on debian wheezy, squid recompiled from jesse with icap and i did 
rebuild to a deb : squidclamav 6.11 
bug 760303, which looks like it. 

The bugcheck is : 

2014/12/02 06:00:10 kid1| NETDB state saved; 633 entries, 2 msec
2014/12/02 06:25:04 kid1| Closing Pinger socket on FD 26
2014/12/02 06:25:18| Pinger exiting.
*** glibc detected *** (pinger): free(): invalid next size (normal): 
0x7fb19ba45df0 ***
=== Backtrace: =
/lib/x86_64-linux-gnu/libc.so.6(+0x76a16)[0x7fb1987b6a16]
/lib/x86_64-linux-gnu/libc.so.6(cfree+0x6c)[0x7fb1987bb7bc]
/usr/lib/x86_64-linux-gnu/libstdc++.so.6(_ZNSt19basic_ostringstreamIcSt11char_traitsIcESaIcEED0Ev+0xa6)[0x7fb19900dae6]
(pinger)(+0x8d99)[0x7fb19a108d99]
(pinger)(+0x59c5)[0x7fb19a1059c5]
(pinger)(main+0x2a0)[0x7fb19a104550]
/lib/x86_64-linux-gnu/libc.so.6(__libc_start_main+0xfd)[0x7fb19875eead]
(pinger)(+0x50a9)[0x7fb19a1050a9]
=== Memory map: 
7fb19400-7fb194021000 rw-p  00:00 0
7fb194021000-7fb19800 ---p  00:00 0
7fb19811-7fb198116000 r-xp  ca:01 134270 
/usr/lib/libnfnetlink.so.0.2.0
7fb198116000-7fb198315000 ---p 6000 ca:01 134270 
/usr/lib/libnfnetlink.so.0.2.0
7fb198315000-7fb198316000 rw-p 5000 ca:01 134270 
/usr/lib/libnfnetlink.so.0.2.0
7fb198318000-7fb19831c000 r-xp  ca:01 44 
/lib/x86_64-linux-gnu/libattr.so.1.1.0
7fb19831c000-7fb19851b000 ---p 4000 ca:01 44 
/lib/x86_64-linux-gnu/libattr.so.1.1.0
7fb19851b000-7fb19851c000 r--p 3000 ca:01 44 
/lib/x86_64-linux-gnu/libattr.so.1.1.0
7fb19851c000-7fb19851d000 rw-p 4000 ca:01 44 
/lib/x86_64-linux-gnu/libattr.so.1.1.0
7fb19852-7fb198537000 r-xp  ca:01 64 
/lib/x86_64-linux-gnu/libpthread-2.13.so
7fb198537000-7fb198736000 ---p 00017000 ca:01 64 
/lib/x86_64-linux-gnu/libpthread-2.13.so
7fb198736000-7fb198737000 r--p 00016000 ca:01 64 
/lib/x86_64-linux-gnu/libpthread-2.13.so
7fb198737000-7fb198738000 rw-p 00017000 ca:01 64 
/lib/x86_64-linux-gnu/libpthread-2.13.so
7fb198738000-7fb19873c000 rw-p  00:00 0
7fb19873f000-7fb19874 rw-p  00:00 0
7fb19874-7fb1988c2000 r-xp  ca:01 3330   
/lib/x86_64-linux-gnu/libc-2.13.so
7fb1988c2000-7fb198ac2000 ---p 00182000 ca:01 3330   
/lib/x86_64-linux-gnu/libc-2.13.so
7fb198ac2000-7fb198ac6000 r--p 00182000 ca:01 3330   
/lib/x86_64-linux-gnu/libc-2.13.so
7fb198ac6000-7fb198ac7000 rw-p 00186000 ca:01 3330   
/lib/x86_64-linux-gnu/libc-2.13.so
7fb198ac7000-7fb198acc000 rw-p  00:00 0
7fb198ad-7fb198ae5000 r-xp  ca:01 15 
/lib/x86_64-linux-gnu/libgcc_s.so.1
7fb198ae5000-7fb198ce5000 ---p 00015000 ca:01 15 
/lib/x86_64-linux-gnu/libgcc_s.so.1
7fb198ce5000-7fb198ce6000 rw-p 00015000 ca:01 15 
/lib/x86_64-linux-gnu/libgcc_s.so.1
7fb198ce8000-7fb198d69000 r-xp  ca:01 3335   
/lib/x86_64-linux-gnu/libm-2.13.so
7fb198d69000-7fb198f68000 ---p 00081000 ca:01 3335   
/lib/x86_64-linux-gnu/libm-2.13.so
7fb198f68000-7fb198f69000 r--p 0008 ca:01 3335   
/lib/x86_64-linux-gnu/libm-2.13.so
7fb198f69000-7fb198f6a000 rw-p 00081000 ca:01 3335   
/lib/x86_64-linux-gnu/libm-2.13.so
7fb198f7-7fb199058000 r-xp  ca:01 133196 
/usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.17
7fb199058000-7fb199258000 ---p 000e8000 ca:01 133196 
/usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.17
7fb199258000-7fb19926 r--p 000e8000 ca:01 133196 
/usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.17
7fb19926-7fb199262000 rw-p 000f ca:01 133196 
/usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.17
7fb199262000-7fb199277000 rw-p  00:00 0
7fb199278000-7fb19927a000 r-xp  ca:01    
/lib/x86_64-linux-gnu/libdl-2.13.so
7fb19927a000-7fb19947a000 ---p 2000 ca:01    
/lib/x86_64-linux-gnu/libdl-2.13.so
7fb19947a000-7fb19947b000 r--p 2000 ca:01    
/lib/x86_64-linux-gnu/libdl-2.13.so
7fb19947b000-7fb19947c000 rw-p 3000 ca:01    
/lib/x86_64-linux-gnu/libdl-2.13.so
7fb19948-7fb199487000 r-xp  ca:01 3348   
/lib/x86_64-linux-gnu/librt-2.13.so
7fb199487000-7fb199686000 ---p 7000 ca:01 3348   
/lib/x86_64-linux-gnu/librt-2.13.so
7fb199686000-7fb199687000 r--p 6000 ca:01 3348   
/lib/x86_64-linux-gnu/librt-2.13.so
7fb199687000-7fb199688000 rw-p 7000 ca:01 3348   

Processed: closing 768369

2014-12-02 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 close 768369
Bug #768369 [libjpeg62-turbo] libjpeg-turbo: CVE-2014-9092: [DOS] Stack smashing
Marked Bug as done
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
768369: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768369
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771739: could not start nodm with systemd 217-1 or 217-2

2014-12-02 Thread Michael Biebl
Am 02.12.2014 um 06:48 schrieb Martin Pitt:
 積丹尼 Dan Jacobson [2014-12-02 13:36 +0800]:
 # cat /etc/X11/default-display-manager
 cat: /etc/X11/default-display-manager: No such file or directory
 
 Indeed, nodm doesn't use this file at all, nor does it conflict with
 any other window manager. So installing nodm together with gdm,
 lightdm, kdm, etc. will just result in a disaster :-(
 
 Didier, I'm afraid we have to exclude nodm from your DM masking -- I
 don't see a way how we can fix this without actually fixing nodm.

I'm not sure if the generator is a good idea. I played around with that
idea a long time ago but discarded it again.
It also changes the behaviour of the insserv generator, which no longer
generates dependencies if native units exist.

At the current stage, I don't think these patches should be merged as is
for master.

Didier, Martin: could you elaborate what those patches try to fix?



-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Processed: moreinfo

2014-12-02 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + moreinfo
Bug #771685 [lvm2] lvm2: system fails to boot when using lvm2 with upstart
Added tag(s) moreinfo.

-- 
771685: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771685
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: moreinfo

2014-12-02 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + moreinfo
Bug #771685 [lvm2] lvm2: system fails to boot when using lvm2 with upstart
Ignoring request to alter tags of bug #771685 to the same tags previously set

-- 
771685: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771685
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771685: moreinfo

2014-12-02 Thread Holger Levsen
control: tags -1 + moreinfo

Hi,

why did you mark this bug as found in the wheezy version of lvm2 if you found 
this bug on jessie?


cheers,
Holger


signature.asc
Description: This is a digitally signed message part.


Bug#771739: could not start nodm with systemd 217-1 or 217-2

2014-12-02 Thread Didier Roche

Le 02/12/2014 12:28, Michael Biebl a écrit :

Am 02.12.2014 um 06:48 schrieb Martin Pitt:

積丹尼 Dan Jacobson [2014-12-02 13:36 +0800]:

# cat /etc/X11/default-display-manager
cat: /etc/X11/default-display-manager: No such file or directory

Indeed, nodm doesn't use this file at all, nor does it conflict with
any other window manager. So installing nodm together with gdm,
lightdm, kdm, etc. will just result in a disaster :-(

Didier, I'm afraid we have to exclude nodm from your DM masking -- I
don't see a way how we can fix this without actually fixing nodm.

I'm not sure if the generator is a good idea. I played around with that
idea a long time ago but discarded it again.


It seems the way Lennart advertised the use of a default configuration 
(like in /e/X/d-d-m) keeping in sync with Aliases like 
display-manager.service.

It also changes the behaviour of the insserv generator, which no longer
generates dependencies if native units exist.


systemd does that itself as well anyway (I didn't put that on the 
overriding stack on purpose). I can condition that masking for 
display-manager only if you feel more comfortable that way.
Note that this patch modification is for jessie-only and should be 
removed as being useless as soon as all dms ship systemd units.


At the current stage, I don't think these patches should be merged as is
for master.

Didier, Martin: could you elaborate what those patches try to fix?


This is to fix multiple bug reports where people don't have (or have 
multiple) dm services starting. Also, it enables people changing 
manually /e/X/d-d-m to not reboot in a state where no dm is started.
The use case is to ensure that display-manager.service will always 
points to a systemd service that will be runnable (if any). Meaning that 
we won't have failing units due to ExecStartPre failing and having that 
shell execution, or disable them if there is an init dm matching. It's 
going to enable us as well to migrate to Alias=display-manager.service 
one dm service after another instead in jessie+1 than doing the 
transition in a batch.


Precise behavior in coordination to the 2 generators is:
- if /etc/X11/default-display-manager matches a systemd unit and matches 
display-manager.service:
  - noop on the systemd side, mask all dms sysvinit not matching a 
systemd unit
- if /etc/X11/default-display-manager matches systemd unit and but 
doesn't match what's pointed by display-manager.service:
  - we ensure display-manager.service transiantly points to correct 
systemd unit, we mask all dms sysvinit not matching a systemd unit

- if /etc/X11/default-display-manager matches a non systemd unit:
  - we transiently mask display-manager.service (so no systemd unit 
startup) and mask all sysvinit dm scripts, but the one matching 
/etc/X11/default-display-manager

- if no /etc/X11/default-display-manager:
   - we even don't look at the systemd side (we hope there will be one 
display-manager.service matching at least one), we mask all sysvinit dm 
scripts


The last case is what is at fault here. I would suggest that we change 
the patch:
- if /etc/X11/default-display-manager matches anything at all or doesn't 
exist, we avoid masking any sysvinit dm script if there is no 
display-manager.service matching a real service file.


Didier


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771789: libpcp-pmda-perl: uninstallable on i386: depends on perlapi-5.18.2

2014-12-02 Thread Jakub Wilk

Package: libpcp-pmda-perl
Version: 3.10.1
Severity: grave

This package cannot be installed on i386:

# apt-get install -q libpcp-pmda-perl
Reading package lists...
Building dependency tree...
Reading state information...
Some packages could not be installed. This may mean that you have
requested an impossible situation or if you are using the unstable
distribution that some required packages have not yet been created
or been moved out of Incoming.
The following information may help to resolve the situation:

The following packages have unmet dependencies:
libpcp-pmda-perl : Depends: perlapi-5.18.2 but it is not installable
E: Unable to correct problems, you have held broken packages.

--
Jakub Wilk


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#770174: salt-common: service module doesn't work for init scripts

2014-12-02 Thread Hermann Lauer
Package: salt-minion
Version: 2014.1.13+ds-2
Followup-For: Bug #770174

Dear Maintainer,

after fixing service.status (many thanks) service.enabled seems to need also a 
fix: 

# salt-call service.enabled shinken
[INFO] Executing command 'systemctl is-enabled shinken.service' in 
directory '/root'
[ERROR   ] Command 'systemctl is-enabled shinken.service' failed with return 
code: 1
[ERROR   ] output: Failed to get unit file state for shinken.service: No such 
file or directory
local:
False

As after a reboot shinken is running and this is also told by service shinken 
status,
the above result is wrong and should be True.

Thanks,
 greetins
  Hermann

-- System Information:
Debian Release: jessie/sid
  APT prefers testing-updates
  APT policy: (500, 'testing-updates'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages salt-minion depends on:
ii  dctrl-tools  2.23
ii  init-system-helpers  1.22
ii  python-crypto2.6.1-5+b2
ii  python-m2crypto  0.21.1-3
ii  python-msgpack   0.4.2-1
ii  python-zmq   14.4.0-1
pn  python:any   none
ii  salt-common  2014.1.13+ds-2

Versions of packages salt-minion recommends:
ii  debconf-utils  1.5.54
ii  dmidecode  2.12-3

Versions of packages salt-minion suggests:
pn  python-augeas  none

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#770133: stable affected

2014-12-02 Thread Christian Hilgers
found 2.1-2
thanks

gcalcli --version
gcalcli v2.1 (Eric Davis)

gcalcli list
Traceback (most recent call last):
  File /usr/bin/gcalcli, line 1524, in module
BowChickaWowWow()
  File /usr/bin/gcalcli, line 1426, in BowChickaWowWow
borderColor=borderColor)
  File /usr/bin/gcalcli, line 345, in __init__
self.allCals = self.gcal.GetAllCalendarsFeed()
  File /usr/lib/python2.7/dist-packages/gdata/calendar/service.py,
line 81, in GetAllCalendarsFeed
return self.Get(uri,
converter=gdata.calendar.CalendarListFeedFromString)
  File /usr/lib/python2.7/dist-packages/gdata/service.py, line
1107, in Get
'reason': server_response.reason, 'body': result_body}
gdata.service.RequestError: {'status': 403, 'body':
'HTML\nHEAD\nTITLEForbidden/TITLE\n/HEAD\nBODY
BGCOLOR=#FF TEXT=#00\nH1Forbidden/H1\nH2Error
403/H2\n/BODY\n/HTML\n', 'reason': 'Forbidden'}

No LSB modules are available.
Distributor ID: Debian
Description:Debian GNU/Linux 7.7 (wheezy)
Release:7.7
Codename:   wheezy

-- 
Christian Hilgers   ch...@familie-hilgers.com


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: found 770133 in 2.1-2

2014-12-02 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 found 770133 2.1-2
Bug #770133 [gcalcli] gcalcli 2.x is no longer compatible with google's api
Marked as found in versions gcalcli/2.1-2.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
770133: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770133
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771739: could not start nodm with systemd 217-1 or 217-2

2014-12-02 Thread Michael Biebl
Am 02.12.2014 um 13:06 schrieb Didier Roche:
 This is to fix multiple bug reports where people don't have (or have
 multiple) dm services starting.

Can you provide links to such bug reports so we have a bit of a context?




-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#771792: xul-ext-gcontactsync: gContactSync fails with Please login before trying to sync contacts

2014-12-02 Thread L. Guruprasad
Package: xul-ext-gcontactsync
Version: 1.0.0-1
Severity: grave
Justification: renders package unusable

Dear Maintainer,

After the recent upgrade to the xul-ext-gnome-keyring package, Icedove
appears to be storing the credentials of its account in the GNOME keyring
and once the keyring is created and the passwords are stored in it, this
gcontactsync add-on throws the error Please login before trying to sync
contacts and fails.

Version of

xul-ext-gnome-keyring: 0.6.11-3
icedove: 31.2.0-1


-- System Information:
Debian Release: 8.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_IN.utf8, LC_CTYPE=en_IN.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages xul-ext-gcontactsync depends on:
ii  icedove  31.2.0-1

xul-ext-gcontactsync recommends no packages.

xul-ext-gcontactsync suggests no packages.

-- debconf-show failed


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Severity fix

2014-12-02 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 770313 important
Bug #770313 [dolibarr] dolibarr: CVE-2014-7137
Severity set to 'important' from 'grave'
 --
Stopping processing here.

Please contact me if you need assistance.
-- 
770313: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770313
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771126: libav/tests/lena.pnm: also not mentioned in debian/copyright

2014-12-02 Thread Reinhard Tartler
On Fri, Nov 28, 2014 at 1:34 AM, Niels Thykier ni...@thykier.net wrote:
 Control: tags -1 -wheezy-ignore

 On 2014-11-27 23:23, Jonas Smedegaard wrote:
 Quoting Niels Thykier (2014-11-27 22:14:25)
 [...]

 In prior similar bugreport https://bugs.debian.org/760171#10 -
 referenced from https://bugs.debian.org/771191#10 - distribution is
 documented as permitted only for research and education which I
 interpret as unacceptable for Debian.

 [...]

  - Jonas


FTR, this whole business feel incredibly silly. lena.pnm  has become
the *de-facto* standard image for every CS student to do his graphics
courses homework on, and is generally considered to public domain,
even without proper documentation. The copyright holder is going to
have a very hard time enforcing his right if he wanted to prevent
distribution of the image, in particular the low-quality scan that is
being used in the Libav source package. Also, even according to
https://en.wikipedia.org/wiki/File:Lenna.png#Licensing, the holder is
not interested in that to begin with. - I mean, really, don't we have
more important things to do?

Nevertheless, lena.pnm lacks proper licensing and some argue it
violates the DFSG, so I've taken the effort (and ridicule!) to replace
lena.pnm upstream with a new image reference.pnm, which I have
personally taken this summer and upon Jonas' suggestion provide it
under the expat license. This required to update all test reference
patterns, which took  most of the effort and is basically not
verifiable.

Jonas, would you mind taking over from here and upload
https://libav.org/releases/libav-11.1.tar.xz

to unstable?

Otherwise I can see if I can get to that this weekend.

Regarding stable: I've backported this change back to release/0.8
upstream. In the past, the security team has accepted libav point
releases in wheezy-security, and I trust that this is also an
acceptable change. It will be part of the next upload to
stable-security. (this may take some more weeks, as libav has been
notified about a couple of more CVEs, which need to be tested, fixed
and verified, which is incredibly laborsome to do correctly).

Does this plan work for everyone?

-- 
regards,
Reinhard


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771739: could not start nodm with systemd 217-1 or 217-2

2014-12-02 Thread Didier Roche

Le 02/12/2014 13:44, Michael Biebl a écrit :

Am 02.12.2014 um 13:06 schrieb Didier Roche:

This is to fix multiple bug reports where people don't have (or have
multiple) dm services starting.

Can you provide links to such bug reports so we have a bit of a context?


Sure:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=748668
and
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770404
in particular.

Those generators will enable in jessie+1 to implement something like in 
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=764607 without needing 
all DM to transition to this scheme.



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#770941: nova-common - Overrides database config in nova.conf

2014-12-02 Thread Bastian Blank
Control: tags -1 patch
Control: reopen 770944

On Tue, Nov 25, 2014 at 12:37:56PM +0100, Bastian Blank wrote:
 This violates §10.7.3 of the Debian policy: local changes must be
 preserved.

Patch that never resets the connection setting on upgrade.

Bastian

-- 
Bastian Blank
Berater
Telefon: +49 2161 / 4643-194
E-Mail: bastian.bl...@credativ.de
credativ GmbH, HRB Mönchengladbach 12080, USt-ID-Nummer: DE204566209
Hohenzollernstr. 133, 41061 Mönchengladbach
Geschäftsführung: Dr. Michael Meskes, Jörg Folz, Sascha Heuer
diff -Nru nova-2014.1.3/debian/changelog nova-2014.1.3/debian/changelog
--- nova-2014.1.3/debian/changelog  2014-11-11 20:52:52.0 +
+++ nova-2014.1.3/debian/changelog  2014-12-02 12:20:03.0 +
@@ -1,3 +1,9 @@
+nova (2014.1.3-6dbc1) UNRELEASED; urgency=medium
+
+  * Don't reset database config.
+
+ -- Bastian Blank wa...@debian.org  Tue, 02 Dec 2014 12:19:45 +
+
 nova (2014.1.3-6) unstable; urgency=high
 
   [ Mehdi Abaakouk ]
diff -Nru nova-2014.1.3/debian/nova-common.postinst.in 
nova-2014.1.3/debian/nova-common.postinst.in
--- nova-2014.1.3/debian/nova-common.postinst.in2014-11-11 
20:52:52.0 +
+++ nova-2014.1.3/debian/nova-common.postinst.in2014-12-02 
12:27:36.0 +
@@ -76,7 +76,9 @@
pkgos_write_new_conf nova logging.conf
 
# Tweak config files depending on debconf answers
-   pkgos_dbc_postinst /etc/nova/nova.conf database connection nova $@
+   if [ -z $2 ] || [ $1 = reconfigure ]; then
+   pkgos_dbc_postinst /etc/nova/nova.conf database connection nova 
$@
+   fi
pkgos_rabbit_write_conf /etc/nova/nova.conf DEFAULT nova
manage_nova_api_field
manage_nova_my_ip_field


Processed: Re: nova-common - Overrides database config in nova.conf

2014-12-02 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 patch
Bug #770941 [nova-common] nova-common - Overrides database config in nova.conf
Added tag(s) patch.
 reopen 770944
Bug #770944 {Done: Thomas Goirand z...@debian.org} [neutron-common] Overrides 
database config in nova.conf
Bug reopened
Ignoring request to alter fixed versions of bug #770944 to the same values 
previously set

-- 
770941: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770941
770944: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770944
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771739: could not start nodm with systemd 217-1 or 217-2

2014-12-02 Thread Michael Biebl
Am 02.12.2014 um 14:17 schrieb Didier Roche:
 Le 02/12/2014 13:44, Michael Biebl a écrit :
 Am 02.12.2014 um 13:06 schrieb Didier Roche:
 This is to fix multiple bug reports where people don't have (or have
 multiple) dm services starting.
 Can you provide links to such bug reports so we have a bit of a context?

 Sure:
 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=748668
 and
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770404
 in particular.

Those are bugs in the lxdm and slim packages and need to be fixed there.
Trying to workaround that in systemd looks like the wrong approach.

 Those generators will enable in jessie+1 to implement something like in
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=764607 without needing
 all DM to transition to this scheme.

What exactly do you mean with this scheme? Are you referring to having
native .service files ship an Alias=display-manager.service in their
[Install] section?

-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#771739: could not start nodm with systemd 217-1 or 217-2

2014-12-02 Thread Didier Roche

Le 02/12/2014 14:33, Michael Biebl a écrit :

Am 02.12.2014 um 14:17 schrieb Didier Roche:

Le 02/12/2014 13:44, Michael Biebl a écrit :

Am 02.12.2014 um 13:06 schrieb Didier Roche:

This is to fix multiple bug reports where people don't have (or have
multiple) dm services starting.

Can you provide links to such bug reports so we have a bit of a context?


Sure:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=748668
and
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770404
in particular.

Those are bugs in the lxdm and slim packages and need to be fixed there.
Trying to workaround that in systemd looks like the wrong approach.


Hence my first patch about it, however, bigon asked the release team 
which nacked doing this for jessie. That's why I'm telling this patch is 
intended to be a bandaid until we get there.



Those generators will enable in jessie+1 to implement something like in
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=764607 without needing
all DM to transition to this scheme.

What exactly do you mean with this scheme? Are you referring to having
native .service files ship an Alias=display-manager.service in their
[Install] section?


Exactly, as intended upstream and done in other distributions.


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771685: moreinfo

2014-12-02 Thread a a
Hello

Sorry I did not properly checked the version that was written in the bug
report. It was caused by writing report from computer with debian wheezy.

I have tried to create logical volume on instalation done without lvm a
then i used one noncritical partition as base for lvm. After change of
partition type with fdisk to LVM partition i used pvcreate to initialize i
for creating virtual group a then logical volume. The i used mke2fs to
create filesystem on created lv volume. Reboot with this configuration had
stopped on unknown reason. Debug on kernel command line did not show
information to leading to solving this problem. I also tried lvm2.conf file
from
https://bitbucket.org/CameronNemo/upstart-jobs/src/2090612200fa588412e3fe22aec5ba3747ae88d2/lvm2.conf?at=master,
creating script in initramfs-tools with vgchange -ay. Other solution may be
that i write jobs for upstart my self, but first i want to know if there is
a other solution or bug in packages involved in boot process.

I really dont know which component is causing this.

Hope this helps in solving this issue.

Thank You

Have a nice day

ewew

2014-12-02 12:51 GMT+01:00 Holger Levsen hol...@layer-acht.org:

 control: tags -1 + moreinfo

 Hi,

 why did you mark this bug as found in the wheezy version of lvm2 if you
 found
 this bug on jessie?


 cheers,
 Holger



Bug#771794: pip silently removes/updates system provided python packages

2014-12-02 Thread Matthias Klose

Package: python-pip
Version: 1.5.6-3
Severity: serious
Tags: sid jessie

pip currently silently removes/updates system provided python packages when used 
on the system python.  This is only seen when a user calls pip with 
administrator rights, but it makes debian python packages somehow useless. 
Upstream is aware of the issue.  With distutils and setuptools patched to 
install into safe locations in the distro, it is unfortunate that the next tool 
adds such features, and doesn't even warn the user.


For jessie I suggest to just disable pip when used on the system python, unless 
a new option --yes-i-want-to-screw-up-my-system-python is given.



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771685: moreinfo

2014-12-02 Thread Holger Levsen
control: notfound -1 2.02.95-8
control: found -1 2.02.111-2
control: tags -1 - moreinfo

On Dienstag, 2. Dezember 2014, a a wrote:
 Sorry I did not properly checked the version that was written in the bug
 report. It was caused by writing report from computer with debian wheezy.
 
 I have tried to create logical volume on instalation done without lvm a
 then i used one noncritical partition as base for lvm. After change of
 partition type with fdisk to LVM partition i used pvcreate to initialize i
 for creating virtual group a then logical volume. The i used mke2fs to
 create filesystem on created lv volume. Reboot with this configuration had
 stopped on unknown reason. Debug on kernel command line did not show
 information to leading to solving this problem. I also tried lvm2.conf file
 from
 https://bitbucket.org/CameronNemo/upstart-jobs/src/2090612200fa588412e3fe22
 aec5ba3747ae88d2/lvm2.conf?at=master, creating script in initramfs-tools
 with vgchange -ay. Other solution may be that i write jobs for upstart my
 self, but first i want to know if there is a other solution or bug in
 packages involved in boot process.
 
 I really dont know which component is causing this.
 Hope this helps in solving this issue.
 Thank You
 Have a nice day

thanks for the updates!  have a nice day too! :)


signature.asc
Description: This is a digitally signed message part.


Processed: Re: Bug#771685: moreinfo

2014-12-02 Thread Debian Bug Tracking System
Processing control commands:

 notfound -1 2.02.95-8
Bug #771685 [lvm2] lvm2: system fails to boot when using lvm2 with upstart
No longer marked as found in versions lvm2/2.02.95-8.
 found -1 2.02.111-2
Bug #771685 [lvm2] lvm2: system fails to boot when using lvm2 with upstart
Marked as found in versions lvm2/2.02.111-2.
 tags -1 - moreinfo
Bug #771685 [lvm2] lvm2: system fails to boot when using lvm2 with upstart
Removed tag(s) moreinfo.

-- 
771685: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771685
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771797: liblldb-3.5: does not ship SONAME link /usr/lib/triplet/liblldb.so.1 - liblldb-3.5.so.1

2014-12-02 Thread Andreas Beckmann
Package: liblldb-3.5
Version: 1:3.5-6
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package does not ship the
SONAME link for its library (Policy 8.1).
That link got created later by ldconfig.

The package ships

liblldb-3.5.so - liblldb-3.5.so.1
liblldb-3.5.so.1

but the SONAME is liblldb.so.1

Setting the severity to serious since this file was previously shipped
by at least one other package (lldb-3.3) but liblldb-3.5 misses
appropriate Breaks/Conflicts+Replaces. (#769113)
https://packages.debian.org/search?suite=sidarch=anymode=pathsearchon=contentskeywords=liblldb.so.1

The LLVM SONAMES look quite messy, but this seems to be resolved finally
in 3.6 which changes the SONAME to liblldb-3.6.so.

In this context it is even more important to ship that link and
have appropriate Conflicts.

From the attached log (scroll to the bottom...):

0m48.2s DEBUG: Starting command: ['chroot', '/tmp/piupartss/tmpkOV8jD', 
'tmp/scripts/pre_remove_40_find_unowned_lib_links']
0m51.6s DUMP: 
  UNOWNED SYMLINK /usr/lib/x86_64-linux-gnu/liblldb.so.1 - liblldb-3.5.so.1
0m51.6s DEBUG: Command ok: ['chroot', '/tmp/piupartss/tmpkOV8jD', 
'tmp/scripts/pre_remove_40_find_unowned_lib_links']


cheers,

Andreas


liblldb-3.5_1:3.5-6.log.gz
Description: application/gzip


Bug#771794: [Python-modules-team] Bug#771794: pip silently removes/updates system provided python packages

2014-12-02 Thread W. Martin Borgert

Quoting Matthias Klose d...@debian.org:
For jessie I suggest to just disable pip when used on the system  
python, unless a new option  
--yes-i-want-to-screw-up-my-system-python is given.


How about disabling pip for uid 0 altogether?


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#770425: Fixes for debian stable ?

2014-12-02 Thread Rodrigo Campos
Hi,

The upstream release was on Nov 20, it's been almost 2 weeks and the bug seem
kind of serious. Any chance to do a quick fix and then continue to discuss
changing wordpress version in stable ? Or any ETA on when the fixes will come to
stable ?

I've manually applied the workaround suggested here[1], although it doesn't seem
ideal. But seems to fix the attacks reported here[2] and here[3] at least.






Thanks a lot,
Rodrigo

[1]: http://klikki.fi/adv/wordpress.html
[2]: http://klikki.fi/unquote/
[3]: http://klikki.fi/adv/wordpress_update.html


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771126: libav/tests/lena.pnm: also not mentioned in debian/copyright

2014-12-02 Thread Jonas Smedegaard
Quoting Reinhard Tartler (2014-12-02 14:11:19)

 On 2014-11-27 23:23, Jonas Smedegaard wrote:
 In prior similar bugreport https://bugs.debian.org/760171#10 - 
 referenced from https://bugs.debian.org/771191#10 - distribution 
 is documented as permitted only for research and education which I 
 interpret as unacceptable for Debian.

 FTR, this whole business feel incredibly silly.

Welcome to the Real World: Some stuff is incredibly stupid, yet Real.


 lena.pnm has become the *de-facto* standard image for every CS student 
 to do his graphics courses homework on,

Proprietary operating systems, word processors and spreadsheet editors 
have become the *de-facto* standard e.g. for most public servants in the 
World.  Incredibly silly as free (and technically superior) alternatives 
exist.  But this bugreport is about DFSG...


 The copyright holder is going to have a very hard time enforcing his 
 right if he wanted to prevent distribution of the image,

DFSG is is about Debian respecting copyright and licensing (no matter if 
difficult for copyright holders to defend or enforce their rights).

(perhaps you confuse copyright and licensing with trademarks or patents, 
in some cases considered irrelevant for Debian to care about)


 Jonas, would you mind taking over from here and upload 
 https://libav.org/releases/libav-11.1.tar.xz

 to unstable?

I don't mind doing the technical work of packaging, but prefer if 
someone else takes to dialogue with release team about freeze exception, 
as I don't have the stomach for that (no blame on the release team for 
that!).

I also don't mind doing the additional technical work of cherry-picking 
only the fix for this bug and apply to 6:11-2 currently targeted Jessie.

Which of those to do would probably need input from the person willing 
to do the negotiation with release team, however.  So I await someone 
volunteering for that (and while waiting will prepare that new upstream 
release, and if noone have appeared before done release it targeted 
experimental).


 - Jonas

-- 
 * Jonas Smedegaard - idealist  Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private


signature.asc
Description: signature


Bug#771800: designate-central: fails to purge: ucfr: Association belongs to designate-common, not cinder-common

2014-12-02 Thread Andreas Beckmann
Package: designate-central
Version: 2014.1-12
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package failed to purge.

From the attached log (scroll to the bottom...):

  Removing designate-common (2014.1-12) ...
  Purging configuration files for designate-common (2014.1-12) ...
  ucfr: Association belongs to designate-common, not cinder-common
  ucfr: Aborting
  dpkg: error processing package designate-common (--purge):
   subprocess installed post-removal script returned error exit status 5
  Errors were encountered while processing:
   designate-common

Setting the severity to serious since that cannot be worked around (like
having ucf installed at purge time which obviously is the case here).

cheers,

Andreas


designate-central_2014.1-12.log.gz
Description: application/gzip


Bug#768998: marked as done (kadu-mime-tex: FTBFS on all arches)

2014-12-02 Thread Debian Bug Tracking System
Your message dated Tue, 2 Dec 2014 15:32:32 +0100
with message-id b2d079f5-c445-49cc-a017-1c01434e5...@prezu.one.pl
and subject line Closing bug
has caused the Debian Bug report #768998,
regarding kadu-mime-tex: FTBFS on all arches
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
768998: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768998
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Source: kadu-mime-tex
Version: 1.0-2
Severity: serious
Justification: FTBFS



*** /home/zumbi/bin/ftbfs-armel
Hello,

  Your package fails to build from source on Debian autobuilder network.

  Please check your package build logs at:
  https://buildd.debian.org/status/package.php?p=kadu-mime-texsuite=sid

Best regards


-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (900, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 3.14-2-686-pae (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
---End Message---
---BeginMessage---
Version: 1.0-2

This bug was caused by #767010, which has been dealt with recently.

---
Patryk Cisek---End Message---


Bug#771797: liblldb-3.5: does not ship SONAME link /usr/lib/triplet/liblldb.so.1 - liblldb-3.5.so.1

2014-12-02 Thread Sylvestre Ledru
On 02/12/2014 06:13, Andreas Beckmann wrote:
 Package: liblldb-3.5
 Version: 1:3.5-6
 Severity: serious
 User: debian...@lists.debian.org
 Usertags: piuparts

 Hi,

 during a test with piuparts I noticed your package does not ship the
 SONAME link for its library (Policy 8.1).
 That link got created later by ldconfig.

 The package ships

   liblldb-3.5.so - liblldb-3.5.so.1
   liblldb-3.5.so.1

 but the SONAME is liblldb.so.1

 Setting the severity to serious since this file was previously shipped
 by at least one other package (lldb-3.3) but liblldb-3.5 misses
 appropriate Breaks/Conflicts+Replaces. (#769113)
Not sure I understand the severity. This is a different package from
lldb-3.3.

Thanks
Sylvestre


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#771749: cyrus-{common, imapd}-2.4: unhandled symlink to directory conversion: /usr/share/doc/PACKAGE

2014-12-02 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 +help
Bug #771749 [cyrus-imapd-2.4,cyrus-common-2.4] cyrus-{common, imapd}-2.4: 
unhandled symlink to directory conversion: /usr/share/doc/PACKAGE
Added tag(s) help.

-- 
771749: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771749
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771749: cyrus-{common, imapd}-2.4: unhandled symlink to directory conversion: /usr/share/doc/PACKAGE

2014-12-02 Thread Ondřej Surý
Control: tags -1 +help

Hi Andreas,

I am out of clues how to fix that in a general manner. I guess I just
can't support upgrades from testing versions and from wheezy versions at
the same time.

I will just aim to have the upgrades from wheezy right and fix the most
of jessie-to-jessie upgrades. And I just regret of ever using --link-doc
more and more.

Would you be able to test upgrades from wheezy to unstable with -10
quickly?

O.

On Tue, Dec 2, 2014, at 02:58, Andreas Beckmann wrote:
 Package: cyrus-imapd-2.4,cyrus-common-2.4
 Version: 2.4.17+caldav~beta10-8
 Severity: serious
 User: debian...@lists.debian.org
 Usertags: piuparts
 
 Hi,
 
 an upgrade test with piuparts revealed that your package installs files
 over existing symlinks and possibly overwrites files owned by other
 packages. This usually means an old version of the package shipped a
 symlink but that was later replaced by a real (and non-empty)
 directory. This kind of overwriting another package's files cannot be
 detected by dpkg.
 
 This was observed on the following upgrade paths:
 
   wheezy - jessie (2.4.17+caldav~beta10-8)
   wheezy - sid (2.4.17+caldav~beta10-9)
 
 For /usr/share/doc/PACKAGE this may not be problematic as long as both
 packages are installed, ship byte-for-byte identical files and are
 upgraded in lockstep. But once one of the involved packages gets
 removed, the other one will lose its documentation files, too,
 including the copyright file, which is a violation of Policy 12.5:
 https://www.debian.org/doc/debian-policy/ch-docs.html#s-copyrightfile
 
 For other overwritten locations anything interesting may happen.
 
 Note that dpkg intentionally does not replace directories with symlinks
 and vice versa, you need the maintainer scripts to do this.
 See in particular the end of point 4 in
 https://www.debian.org/doc/debian-policy/ch-maintainerscripts.html#s-unpackphase
 
 It is recommended to use the dpkg-maintscript-helper commands
 'dir_to_symlink' and 'symlink_to_dir' (available since dpkg 1.17.2)
 to perform the conversion, ideally using d/$PACKAGE.mainstscript.
 See dpkg-maintscript-helper(1) and dh_installdeb(1) for details.
 
 
 From the attached log (usually somewhere in the middle...):
 
 4m16.8s ERROR: FAIL: silently overwrites files via directory symlinks:
   /usr/share/doc/cyrus-common-2.4/changelog.Debian.gz (cyrus-common-2.4)
   != /usr/share/doc/cyrus-common/changelog.Debian.gz (cyrus-common)
   /usr/share/doc/cyrus-common-2.4/copyright (cyrus-common-2.4) !=
   /usr/share/doc/cyrus-common/copyright (cyrus-common)
   /usr/share/doc/cyrus-imapd-2.4/copyright (cyrus-imapd-2.4) !=
   /usr/share/doc/cyrus-common/copyright (cyrus-common)
 
 
 There may be more packages failing, but these cannot be tested by
 piuparts
 due to cyrus-common-2.4 already failing ...
 
 cheers,
 
 Andreas
 ___
 Pkg-Cyrus-imapd-Debian-devel mailing list
 pkg-cyrus-imapd-debian-de...@lists.alioth.debian.org
 http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-cyrus-imapd-debian-devel
 Email had 1 attachment:
 + cyrus-imapd-2.4_2.4.17+caldav~beta10-8.log.gz
   42k (application/gzip)


-- 
Ondřej Surý ond...@sury.org
Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#719943: marked as done (makedumpfile: fails to dump kernel log, continually appends the line [ 0.000000] to dmesg file)

2014-12-02 Thread Debian Bug Tracking System
Your message dated Tue, 02 Dec 2014 15:19:40 +
with message-id e1xvpeq-kl...@franck.debian.org
and subject line Bug#719943: fixed in makedumpfile 1:1.5.3-2
has caused the Debian Bug report #719943,
regarding makedumpfile: fails to dump kernel log, continually appends the line 
[0.00]  to dmesg file
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
719943: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719943
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: makedumpfile
Version: 1.5.4-1
Severity: grave
Justification: renders package unusable

Dear Maintainer,

There seems to be a serious issue with makedumpfile that causes it to fail to
dump the kernel log when collecting crash dump information. Instead, the
program continues to run indefinitely, continually appending the line [
0.00]  to the file as it seems to attempt to dump the log, which, if left
alone for any considerable length of time, can rapidly result in a very large,
entirely useless dmesg dump file.

I have been trying to collect crash dump information for a crash that's
triggered whenever Folding@Home's FahCore_a4 attempts to resume an in-progress
work unit, however, every crash dump I've collected has had this problem. The
main dump file seems to be dumped without a problem (though crash identifies it
as a partial dump, possibly due to the kernel log being dumped into a separate
file).

I hope you can look into this issue and hopefully it can be sorted out soon.



-- System Information:
Debian Release: jessie/sid
  APT prefers experimental
  APT policy: (650, 'experimental'), (650, 'unstable'), (600, 'testing'), (500, 
'saucy-updates'), (500, 'saucy-security'), (500, 'saucy')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.11-rc4-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_CA.utf8, LC_CTYPE=en_CA.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages makedumpfile depends on:
ii  libbz2-1.0  1.0.6-5
ii  libc6   2.17-92
ii  libdw1  0.156-1
ii  libelf1 0.156-1
ii  perl5.14.2-21
ii  zlib1g  1:1.2.8.dfsg-1

Versions of packages makedumpfile recommends:
ii  crash7.0.1-3
ii  kexec-tools  1:2.0.3-4

makedumpfile suggests no packages.

-- no debconf information
---End Message---
---BeginMessage---
Source: makedumpfile
Source-Version: 1:1.5.3-2

We believe that the bug you reported is fixed in the latest version of
makedumpfile, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 719...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Louis Bouchard louis.bouch...@ubuntu.com (supplier of updated makedumpfile 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 02 Dec 2014 15:17:43 +0100
Source: makedumpfile
Binary: makedumpfile kdump-tools
Architecture: source amd64 all
Version: 1:1.5.3-2
Distribution: unstable
Urgency: medium
Maintainer: John Wright j...@debian.org
Changed-By: Louis Bouchard louis.bouch...@ubuntu.com
Description:
 kdump-tools - scripts and tools for automating kdump (Linux crash dumps)
 makedumpfile - VMcore extraction tool
Closes: 719943 771210
Changes:
 makedumpfile (1:1.5.3-2) unstable; urgency=medium
 .
   * Adapt to kernel 3.16 changes in symbols :
 - Work around removal of struct vmlist in kernel 3.16
 - Fix dump_dmesg accordingly
 - Backported commits are : 759b78c, cee64e3, 8145e41, e203095,
   150b58eb, 846ab2e, 1202589, 8a0236c, 9d38132, e24dc53
 Closes: #719943
   * Implement systemd service and correct mechanism
 to capture kernel dumps under systemd control
 Closes: #771210
Checksums-Sha1:
 1d1e08dfdcd89eedf75e92f55c1c8bb83fa181c3 2075 makedumpfile_1.5.3-2.dsc
 1480ffa900407f15c006ac9eecc8a4201c33d489 18196 
makedumpfile_1.5.3-2.debian.tar.xz
 541c4d2fc385ddf917629b625f9f89c89c06b25c 120874 makedumpfile_1.5.3-2_amd64.deb
 23bcfc8aa8bc3ffcc6336ffa70465f5e69d7da2b 18192 kdump-tools_1.5.3-2_all.deb
Checksums-Sha256:
 842e60fc9b47ee39bb32ad60d1a50b18a6d94f16a762f038ca53dd68c1c72d2b 2075 
makedumpfile_1.5.3-2.dsc
 dbec4ded6a209b7beadb832266851de4f3380faa0505cc4995c7cdb7ce0b9942 18196 

Bug#771749: cyrus-{common, imapd}-2.4: unhandled symlink to directory conversion: /usr/share/doc/PACKAGE

2014-12-02 Thread Andreas Beckmann
On 2014-12-02 16:05, Ondřej Surý wrote:
 I am out of clues how to fix that in a general manner. I guess I just
 can't support upgrades from testing versions and from wheezy versions at
 the same time.

That should not be impossible ...

At least for one of the packages (IIRC -imapd-2.4) I had checked and
there were no dpkg-maint-script-helper calls ... so that wasn't an
erroneus use. There must have been some added to other packages for the
missing copyright files ...

 I will just aim to have the upgrades from wheezy right and fix the most
 of jessie-to-jessie upgrades. And I just regret of ever using --link-doc
 more and more.

When did you start and stop using it? And on which packages?

 Would you be able to test upgrades from wheezy to unstable with -10
 quickly?

If you put the .debs (amd64) together with a Packages file somewhere I
can start my piuparts engine on it :-)
(I can test upgrades from any release in the archive to any other
release but using the new packages instead. Release includes testing,
sid, ...)

Andreas


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#769236: marked as done (android-platform-frameworks-base: FTBFS in jessie/i386: libutils.so: undefined reference to `android_atomic_or')

2014-12-02 Thread Debian Bug Tracking System
Your message dated Tue, 02 Dec 2014 15:19:28 +
with message-id e1xvpee-gb...@franck.debian.org
and subject line Bug#769236: fixed in android-platform-frameworks-base 21-2
has caused the Debian Bug report #769236,
regarding android-platform-frameworks-base: FTBFS in jessie/i386: libutils.so: 
undefined reference to `android_atomic_or'
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
769236: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769236
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Source: android-platform-frameworks-base
Version: 21-1
Severity: serious
Tags: jessie sid
User: debian...@lists.debian.org
Usertags: qa-ftbfs-20141112 qa-ftbfs
Justification: FTBFS in jessie on i386

Hi,

During a rebuild of all packages in jessie (in a jessie chroot, not a
sid chroot), your package failed to build on i386.

Relevant part (hopefully):
 g++ -fPIC -Wl,-rpath=/usr/lib/android -Wl,-z,relro -o aapt AaptAssets.o 
 Command.o CrunchCache.o FileFinder.o Main.o Package.o StringPool.o XMLNode.o 
 ResourceFilter.o ResourceTable.o Images.o Resource.o SourcePos.o ZipEntry.o 
 ZipFile.o -lrt -ldl -lpthread -lz -lexpat -lpng -L/usr/lib/android  -lcutils 
 -lhost -llog -lutils -L../../libs/androidfw  -landroidfw 
 /usr/lib/android/libutils.so: undefined reference to `android_atomic_or'
 /usr/lib/android/libutils.so: undefined reference to `android_atomic_dec'
 /usr/lib/android/libutils.so: undefined reference to `android_atomic_inc'
 /usr/lib/android/libutils.so: undefined reference to 
 `android_atomic_release_cas'
 /usr/lib/android/libutils.so: undefined reference to `android_atomic_add'
 collect2: error: ld returned 1 exit status

The full build log is available from:
   
http://aws-logs.debian.net/ftbfs-logs/2014/11/12/android-platform-frameworks-base_21-1_jessie-i386.log

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.
---End Message---
---BeginMessage---
Source: android-platform-frameworks-base
Source-Version: 21-2

We believe that the bug you reported is fixed in the latest version of
android-platform-frameworks-base, which is due to be installed in the Debian 
FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 769...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Hans-Christoph Steiner h...@eds.org (supplier of updated 
android-platform-frameworks-base package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 02 Dec 2014 14:36:42 +0100
Source: android-platform-frameworks-base
Binary: android-libandroidfw android-libandroidfw-dev aapt
Architecture: source amd64
Version: 21-2
Distribution: unstable
Urgency: low
Maintainer: Android tools Maintainer 
android-tools-de...@lists.alioth.debian.org
Changed-By: Hans-Christoph Steiner h...@eds.org
Description:
 aapt   - Android Asset Packaging Tool
 android-libandroidfw - Android utility library
 android-libandroidfw-dev - Android utility library - Development files
Closes: 768821 769236
Changes:
 android-platform-frameworks-base (21-2) unstable; urgency=low
 .
   * add versions to shlibs so dh can do dep detection
 (Closes: #768821) (Closes: #769236)
   * set Android Tools team as Maintainer
   * fix installation of aapt bash completion rules
Checksums-Sha1:
 9c36fa08f34d49b7de3c95fd5478063adafda958 2563 
android-platform-frameworks-base_21-2.dsc
 07669d92e0e4334a95cb6f4a0b60ea61be33d1e7 12924 
android-platform-frameworks-base_21-2.debian.tar.xz
 73180d1e66d24909db2eee6dacebdf776a424707 112644 
android-libandroidfw_21-2_amd64.deb
 e4732527500b202c377a727f9d6d7d5fe2d4f31d 158378 
android-libandroidfw-dev_21-2_amd64.deb
 c97d82c0f882351b0a1930dd0d4c5ccf98fec9bf 256488 aapt_21-2_amd64.deb
Checksums-Sha256:
 45c59f33cc66dd586dad3ca14a7da79dc9c91e4740af6ecb944a1fbdc2973faf 2563 
android-platform-frameworks-base_21-2.dsc
 ecbe456d5c3e18a15bfee0cc9900bbb18b317890b76b8469224df8b1b21fee7c 12924 

Bug#769534: marked as done (phabricator: fails to install: Usage Exception: Specify a value to set the key 'mysql.user' to.)

2014-12-02 Thread Debian Bug Tracking System
Your message dated Tue, 02 Dec 2014 15:20:13 +
with message-id e1xvpfn-so...@franck.debian.org
and subject line Bug#769534: fixed in phabricator 0~git20141130-1
has caused the Debian Bug report #769534,
regarding phabricator: fails to install: Usage Exception: Specify a value to 
set the key 'mysql.user' to.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
769534: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769534
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: phabricator
Version: 0~git20141101-1
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package failed to install. As
per definition of the release team this makes the package too buggy for
a release, thus the severity.

From the attached log (scroll to the bottom...):

  Selecting previously unselected package phabricator.
  (Reading database ... 12507 files and directories currently installed.)
  Preparing to unpack .../phabricator_0~git20141101-1_all.deb ...
  Unpacking phabricator (0~git20141101-1) ...
  Setting up phabricator (0~git20141101-1) ...
  
  Creating config file /etc/apache2/conf-available/phabricator.conf with new 
version
  
  Creating config file /etc/lighttpd/conf-available/20-phabricator.conf with 
new version
  
  Creating config file /etc/nginx/sites-available/phabricator.conf with new 
version
  adduser: Warning: The home directory `/var/lib/phabricator' does not belong 
to the user you are currently creating.
  Set 'mysql.host' in local configuration.
  Usage Exception: Specify a value to set the key 'mysql.user' to.
  dpkg: error processing package phabricator (--configure):
   subprocess installed post-installation script returned error exit status 77
  Errors were encountered while processing:
   phabricator


cheers,

Andreas


phabricator_0~git20141101-1.log.gz
Description: application/gzip
---End Message---
---BeginMessage---
Source: phabricator
Source-Version: 0~git20141130-1

We believe that the bug you reported is fixed in the latest version of
phabricator, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 769...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Richard Sellam richard.sel...@orvidia.fr (supplier of updated phabricator 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sun, 30 Nov 2014 23:52:12 +0100
Source: phabricator
Binary: libphutil arcanist phabricator
Architecture: source all
Version: 0~git20141130-1
Distribution: unstable
Urgency: medium
Maintainer: Richard Sellam richard.sel...@orvidia.fr
Changed-By: Richard Sellam richard.sel...@orvidia.fr
Description:
 arcanist   - Command line interface for Phabricator (review platform)
 libphutil  - Shared library for Arcanist and Phabricator
 phabricator - Software engineering platform
Closes: 768201 768965 769534 769615 771597
Changes:
 phabricator (0~git20141130-1) unstable; urgency=medium
 .
   * New upstream version
   * avoid mysql configuration in postinst if no credential provided
 (closes: #769534)
   * added portuguese to debconf translations (closes: #769615)
   * added german to debconf translations (closes: #768965)
   * added logrotate on phd log files
   * fixed po-debconf messages inconsistencies (closes: #768201)
   * added dutch to debconf translations (closes: #771597)
Checksums-Sha1:
 a9692c72672e6f501af81e494f3abcf1571228bc 2645 phabricator_0~git20141130-1.dsc
 36aecca928b380865c7bbf016e27d4f6fcce8241 378268 
phabricator_0~git20141130.orig-arcanist.tar.xz
 968d636995020137f67ecdfedcf53bec4c101eec 520044 
phabricator_0~git20141130.orig-libphutil.tar.xz
 19aa7f64f5dd020551cc882aa30d8047e8a72b03 3930424 
phabricator_0~git20141130.orig.tar.xz
 a182a63a9acb397a786341e172c388646ff5c445 25276 
phabricator_0~git20141130-1.debian.tar.xz
 ae7358f95cd80bbf0238817a75f1d66ae83d754a 543188 
libphutil_0~git20141130-1_all.deb
 2791f497926eb62fc75f338b1959ad3bfb44da5e 402582 
arcanist_0~git20141130-1_all.deb
 dbcf6e61c710cba948a984ab6f3334051f5f37b7 4084012 
phabricator_0~git20141130-1_all.deb
Checksums-Sha256:
 

Bug#771210: marked as done (kdump-tools fails to complete when run with systemd)

2014-12-02 Thread Debian Bug Tracking System
Your message dated Tue, 02 Dec 2014 15:19:40 +
with message-id e1xvpeq-kr...@franck.debian.org
and subject line Bug#771210: fixed in makedumpfile 1:1.5.3-2
has caused the Debian Bug report #771210,
regarding kdump-tools fails to complete when run with systemd
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
771210: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771210
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: kdump-tools
Version: 1.5.3-1
Severity: normal

Dear Maintainer,

When used in the current version of Jessie, the kdump-tools
sysVinit script fails to complete correctly. kdump-tools should
be converted to systemd to avoid this situation. It also triggers
bug #719943, since the version in testing remained at 1.5.3.


-- System Information:
Debian Release: jessie/sid
  APT prefers testing-updates
  APT policy: (500, 'testing-updates'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages kdump-tools depends on:
ii  kexec-tools   1:2.0.7-3
ii  makedumpfile  1.5.3-1

kdump-tools recommends no packages.

kdump-tools suggests no packages.

-- Configuration Files:
/etc/default/kdump-tools changed [not included]
/etc/init.d/kdump-tools [Errno 2] No such file or directory: 
u'/etc/init.d/kdump-tools'

-- no debconf information
---End Message---
---BeginMessage---
Source: makedumpfile
Source-Version: 1:1.5.3-2

We believe that the bug you reported is fixed in the latest version of
makedumpfile, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 771...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Louis Bouchard louis.bouch...@ubuntu.com (supplier of updated makedumpfile 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 02 Dec 2014 15:17:43 +0100
Source: makedumpfile
Binary: makedumpfile kdump-tools
Architecture: source amd64 all
Version: 1:1.5.3-2
Distribution: unstable
Urgency: medium
Maintainer: John Wright j...@debian.org
Changed-By: Louis Bouchard louis.bouch...@ubuntu.com
Description:
 kdump-tools - scripts and tools for automating kdump (Linux crash dumps)
 makedumpfile - VMcore extraction tool
Closes: 719943 771210
Changes:
 makedumpfile (1:1.5.3-2) unstable; urgency=medium
 .
   * Adapt to kernel 3.16 changes in symbols :
 - Work around removal of struct vmlist in kernel 3.16
 - Fix dump_dmesg accordingly
 - Backported commits are : 759b78c, cee64e3, 8145e41, e203095,
   150b58eb, 846ab2e, 1202589, 8a0236c, 9d38132, e24dc53
 Closes: #719943
   * Implement systemd service and correct mechanism
 to capture kernel dumps under systemd control
 Closes: #771210
Checksums-Sha1:
 1d1e08dfdcd89eedf75e92f55c1c8bb83fa181c3 2075 makedumpfile_1.5.3-2.dsc
 1480ffa900407f15c006ac9eecc8a4201c33d489 18196 
makedumpfile_1.5.3-2.debian.tar.xz
 541c4d2fc385ddf917629b625f9f89c89c06b25c 120874 makedumpfile_1.5.3-2_amd64.deb
 23bcfc8aa8bc3ffcc6336ffa70465f5e69d7da2b 18192 kdump-tools_1.5.3-2_all.deb
Checksums-Sha256:
 842e60fc9b47ee39bb32ad60d1a50b18a6d94f16a762f038ca53dd68c1c72d2b 2075 
makedumpfile_1.5.3-2.dsc
 dbec4ded6a209b7beadb832266851de4f3380faa0505cc4995c7cdb7ce0b9942 18196 
makedumpfile_1.5.3-2.debian.tar.xz
 6d4fc9deea6c0818ab690d9424d0a87b17e92ff24dd171d34d6beda853a60902 120874 
makedumpfile_1.5.3-2_amd64.deb
 d8ed7129a9fcb1e37ebbc6d4e36641916f03d2978f7ebd99f577526bba45403e 18192 
kdump-tools_1.5.3-2_all.deb
Files:
 04c93bd6fa96e26c326dfe58d7572174 2075 devel optional makedumpfile_1.5.3-2.dsc
 736178e15705c93c211aafac01fa8cc8 18196 devel optional 
makedumpfile_1.5.3-2.debian.tar.xz
 e8fc0ea439638f5b23cad4d38faf2c0a 120874 devel optional 
makedumpfile_1.5.3-2_amd64.deb
 83eed36d3c1d726903550ffc84de6a80 18192 devel optional 
kdump-tools_1.5.3-2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIcBAEBCAAGBQJUfczzAAoJEIs9hnyCPnphmi0QAJ6WF34n4O4q1cYhjIA8TIVF
82XpLjQt7PqphbLPYWNASKfTfAdcwBvuOdO8TlFJfsXWv+KYRKrDevPmHCcBHw/F
aYEwziBuMQ15MuhgG+q5lmReZNK1NkiPKBYRxBPxUQDzeT+Apmh5Nm/3roULf6W5

Bug#771809: missing /usr/lib/python* code renders package unusable

2014-12-02 Thread Thomas Goirand
Package: heat-cfntools
Version: 1.2.7-1
Severity: grave

We should do:
echo /usr/lib/python* debian/heat-cfntools.install, otherwise,
the command line tools don't work.

I'm uploading a fix soon.

Thomas Goirand (zigo)


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: [Pkg-mozext-maintainers] Bug#771792: xul-ext-gcontactsync: gContactSync fails with Please login before trying to sync contacts

2014-12-02 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 771792 important
Bug #771792 [xul-ext-gcontactsync] xul-ext-gcontactsync: gContactSync fails 
with Please login before trying to sync contacts
Severity set to 'important' from 'grave'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
771792: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771792
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771792: [Pkg-mozext-maintainers] Bug#771792: xul-ext-gcontactsync: gContactSync fails with Please login before trying to sync contacts

2014-12-02 Thread Michael Meskes
severity 771792 important
thanks

On Tue, Dec 02, 2014 at 06:25:17PM +0530, L. Guruprasad wrote:
 Severity: grave
 Justification: renders package unusable
 ...
 xul-ext-gnome-keyring: 0.6.11-3
 icedove: 31.2.0-1

As you're saying yourself the problem appears only when another add-on is
installed, that means the package is not unusable by itself and thus the bug is
not grave.

And yes, there are people like myself who do not use xul-ext-gnome-keyring
together with xul-ext-gcontactsync.

Michael
-- 
Michael Meskes
Michael at Fam-Meskes dot De, Michael at Meskes dot (De|Com|Net|Org)
Michael at BorussiaFan dot De, Meskes at (Debian|Postgresql) dot Org
Jabber: michael.meskes at gmail dot com
VfL Borussia! Força Barça! Go SF 49ers! Use Debian GNU/Linux, PostgreSQL


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: tagging 771739

2014-12-02 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 771739 + pending
Bug #771739 [systemd] could not start nodm with systemd 217-1 or 217-2
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
771739: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771739
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771809: marked as done (missing /usr/lib/python* code renders package unusable)

2014-12-02 Thread Debian Bug Tracking System
Your message dated Tue, 02 Dec 2014 16:03:53 +
with message-id e1xvpvd-0005tu...@franck.debian.org
and subject line Bug#771809: fixed in heat-cfntools 1.2.7-2
has caused the Debian Bug report #771809,
regarding missing /usr/lib/python* code renders package unusable
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
771809: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771809
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: heat-cfntools
Version: 1.2.7-1
Severity: grave

We should do:
echo /usr/lib/python* debian/heat-cfntools.install, otherwise,
the command line tools don't work.

I'm uploading a fix soon.

Thomas Goirand (zigo)
---End Message---
---BeginMessage---
Source: heat-cfntools
Source-Version: 1.2.7-2

We believe that the bug you reported is fixed in the latest version of
heat-cfntools, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 771...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thomas Goirand z...@debian.org (supplier of updated heat-cfntools package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 02 Dec 2014 23:41:46 +0800
Source: heat-cfntools
Binary: heat-cfntools
Architecture: source all
Version: 1.2.7-2
Distribution: unstable
Urgency: medium
Maintainer: PKG OpenStack openstack-de...@lists.alioth.debian.org
Changed-By: Thomas Goirand z...@debian.org
Description:
 heat-cfntools - Tools required to be installed on Heat provisioned cloud
Closes: 771809
Changes:
 heat-cfntools (1.2.7-2) unstable; urgency=medium
 .
   * Added missing /usr/lib/python* in the package (Closes: #771809).
Checksums-Sha1:
 392702bd482f96c87a33190703a42eb459751072 2309 heat-cfntools_1.2.7-2.dsc
 4b52fc60b32d2462bad0899bfa184655cc8d4aa1 55300 
heat-cfntools_1.2.7-2.debian.tar.xz
 32a06aeb16bba5b58001588e10c863248746a088 89966 heat-cfntools_1.2.7-2_all.deb
Checksums-Sha256:
 e5d7373cb607e9fe18b46d504ca7f9de16cbe9ce9e25bf283865909ac948258c 2309 
heat-cfntools_1.2.7-2.dsc
 b7ab9ad1b4868cc843988d0eafeda459c63ca42ee969c187b02e531b2e399a8d 55300 
heat-cfntools_1.2.7-2.debian.tar.xz
 76e958677a4c4028709ceeb09947823f0f47c045bf7523e4a095f8d544c3 89966 
heat-cfntools_1.2.7-2_all.deb
Files:
 2f25693600900d4a8688104368e77407 2309 python optional heat-cfntools_1.2.7-2.dsc
 b3b52acc1e6238716f1810650d44bdf9 55300 python optional 
heat-cfntools_1.2.7-2.debian.tar.xz
 68b1cf04f86e926510022d8eb8891085 89966 python optional 
heat-cfntools_1.2.7-2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=Nit2
-END PGP SIGNATUREEnd Message---


Bug#771739: could not start nodm with systemd 217-1 or 217-2

2014-12-02 Thread Martin Pitt
Michael Biebl [2014-12-02 14:33 +0100]:
 Those are bugs in the lxdm and slim packages and need to be fixed there.

That'd be my preference too, TBH, but it was already n'acked by the
RT. Maybe we can reopen this, though.

 Trying to workaround that in systemd looks like the wrong approach.

The whole configure your default DM has become horribly complicated
in Debian :-( sysvinit and systemd both have their own ways of
enabling/disabling services, and on top of that we still have this
/etc/X11/default-display-manager thing which potentially
collides/disagrees with those, so I don't think there ever is a way to
get this right. But with the current situation of having to support
multiple inits and multiple DMs, I think that
/etc/X11/default-display-manager should be the configuration which
trumps systemctl enable/update-rc.d disable/enable, and thus we need
some central place to tell how to translate that file to a particular
boot sequence.

So while the DM packages certainly should be fixed to get a proper
unit, that still wouldn't completely fix the problems here -- we still
need something to sync /e/X/d-d-m with the init system specific
enabling/disabling. So the idea of that generator isn't too bad or
only a workaround IMHO.

However, it's been shown to be quite complex, so before we land this
in jessie I'd like to give it some more maturing in experimental. If
it turns out to cause more damage than good, we can rip it out again
and say *sigh* don't do that then, if people try to be too clever
with configuring their DMs..

But Michael, I don't want to go over your head here. If you don't like
this at all, then let's stop this right away instead of risking more
debugging/work on this?

Thanks,

Martin
-- 
Martin Pitt| http://www.piware.de
Ubuntu Developer (www.ubuntu.com)  | Debian Developer  (www.debian.org)


signature.asc
Description: Digital signature


Bug#771573: marked as done (cups: Millions of symlinks to .ppd file created in /tmp)

2014-12-02 Thread Debian Bug Tracking System
Your message dated Tue, 02 Dec 2014 17:11:12 +0100
with message-id 3610219.L0Lm9WivlB@gyllingar
and subject line Re: Bug#771573: cups: Millions of symlinks to .ppd file 
created in /tmp
has caused the Debian Bug report #771573,
regarding cups: Millions of symlinks to .ppd file created in /tmp
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
771573: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771573
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: cups
Version: 1.7.5-5
Severity: critical
Justification: breaks the whole system

A few days ago, I was using my laptop at the house of a family member,
and needed to print something. I clicked through the add printer
dialogs (in Gnome) and the printer was detected, added, and my
document printed just fine. [And let me interrupt this bug report to
congratulate everyone involved. This operation used to be quite
painful in the past---it's great that it can go so smoothly now.]

Then, yesterday I noticed that my laptop was acting in an
uncharacteristically sluggish way. There was a strange delay of
several seconds between launching an application and its window first
appearing. It was clear that there wasn't any excessive CPU
utilization, so this felf IO related, but it wasn't obvious to me what
was going on.

Eventually, this morning I decided to see if a reboot would bring my
system back to normal. It didn't.

Instead, the system failed to boot. I was greeted with a boot message
saying:

a start job is running for Create Volatile files and directories

This message was accompanied by a timer [ 10s / no limit ] and the
timer just continued ticking off time. I let it sit for 2 or 3 minutes
before giving up and deciding it was never going to boot.

I duckduckgo'ed the message and found the following Debian forum
threads from last month:

http://forums.debian.net/viewtopic.php?f=10t=118008

I was able to at least boot to a shell by editing my linux option
within grub, changing ro to rw init=/bin/bash.

At this point I could investigate /tmp, where I found over 6 million
symlinks of apparently automatically-generated hexadecimal digits, all
linking to the same .ppd file. The target of these symlinks had the
same name as the printer model which I had added a few days ago.

I successfully got my system to reboot again after deleting all of the
symlinks:

cd /tmp
find . -name '5477*' | xargs rm

On the next reboot the a start job is running for Create Volatile
files and directories did pause and count up for a few seconds,
(perhaps 4 or 5), but then proceeded to boot. I went into the printer
settings and deleted the printer, (I'm no longer at that
family-member's house and shouldn't need to print to that queue again
any time soon).

I've also verified that /tmp/ now only contains a single symlink to a
.ppd file, (corresponding to the one remaining print queue that I do
use on a regular basis).

So I still don't know much about what process went wild and created
millions of symlinks, but it's definitely a bug that can result in
some pretty painful side effects.

I looked through the bugs in cups and didn't see any talking about
symlinks or /tmp so I hope this isn't a duplicate bug entry.

If the bug is known to be fixed in subsequent versions, that will be
great to know. If not, if there is anything I can do to debug further,
I will be happy to do so.

(If I had noticed the errant process creating the many symlinks while
my systerm was still usable, then I certainly could have done some
more investigation.)

Please let me know what further information I might be able to provide
that would be useful.

Thanks,

-Carl

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'oldstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages cups depends on:
ii  cups-client1.7.5-5
ii  cups-common1.7.5-5
ii  cups-core-drivers  1.7.5-5
ii  cups-daemon1.7.5-5
ii  cups-filters   1.0.61-2
ii  cups-ppdc  1.7.5-5
ii  cups-server-common 1.7.5-5
ii  debconf [debconf-2.0]  1.5.53
ii  ghostscript9.06~dfsg-1.1+b1
ii  libavahi-client3   0.6.31-4
ii  libavahi-common3   0.6.31-4
ii  libc-bin   2.19-11
ii  libc6  2.19-11
ii  libcups2   1.7.5-5
ii  libcupscgi1   

Bug#750521: acknowledgement of reception of RC bug report in scim from Debian maintainer

2014-12-02 Thread Rolf Leggewie
On 02.12.2014 15:35, Rolf Leggewie wrote:
 This is a quick heads-up to let everyone know that I am looking into
 this as well as to kindly request help from others.  I shall write more
 as I progress with this ticket.

OK, while I was not able to download a live CD for Jessie to test in a
clean environment I was able to verify the following on my main computer.

export GTK_IM_MODULE=scim;echo GETPIN | pinentry-gtk-2 fails
This is the subject of this ticket

export GTK_IM_MODULE=;echo GETPIN | pinentry-gtk-2 WORKS
because it bypasses scim completely

export GTK_IM_MODULE=scim;echo GETPIN | pinentry-qt4 WORKS
Only the GTK2 version of the program is affected which leads me to
believe this might have something to do with a GTK2/GTK3
incompatibility. I can type just fine in gjots2, though, which is also a
GTK2 program.

export GTK_IM_MODULE=;echo GETPIN | pinentry-curses FAILS
suggesting there is something essentially wrong with pinentry as well


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771749: cyrus-{common, imapd}-2.4: unhandled symlink to directory conversion: /usr/share/doc/PACKAGE

2014-12-02 Thread Ondřej Surý
Hi,

On Tue, Dec 2, 2014, at 16:17, Andreas Beckmann wrote:
 On 2014-12-02 16:05, Ondřej Surý wrote:
  I am out of clues how to fix that in a general manner. I guess I just
  can't support upgrades from testing versions and from wheezy versions at
  the same time.
 
 That should not be impossible ...
 
 At least for one of the packages (IIRC -imapd-2.4) I had checked and
 there were no dpkg-maint-script-helper calls ... so that wasn't an
 erroneus use. There must have been some added to other packages for the
 missing copyright files ...

Yeah, I noticed that too. That's probably something that got created by
testing jessie-sid migration, and I forgot to test wheezy-sid at the
same time.

  I will just aim to have the upgrades from wheezy right and fix the most
  of jessie-to-jessie upgrades. And I just regret of ever using --link-doc
  more and more.
 
 When did you start and stop using it? And on which packages?

There was so many changes back and forth that I have no idea now :).

I sort of solved it by listing all cases I was able to think of into
*.maintscript files :).

  Would you be able to test upgrades from wheezy to unstable with -10
  quickly?
 
 If you put the .debs (amd64) together with a Packages file somewhere I
 can start my piuparts engine on it :-)
 (I can test upgrades from any release in the archive to any other
 release but using the new packages instead. Release includes testing,
 sid, ...)

I found another problem. When you use absolute path for old_path it
doesn't work in case of multiple symlink indirects, e.g.
cyrus-imapd-cyrus-imapd-2.4-cyrus-common-2.4.

So I have changed this into relative path, so it triggers correctly.

wheezy-sid currently ends with:
Setting up cyrus-imapd (2.4.17+caldav~beta10-10) ...
Setting up cyrus-pop3d (2.4.17+caldav~beta10-10) ...
Setting up cyrus-replication (2.4.17+caldav~beta10-10) ...
Setting up cyrus-replication-2.4 (2.4.17+caldav~beta10-10) ...
Setting up cyrus-imapd-2.4 (2.4.17+caldav~beta10-10) ...
Setting up cyrus-pop3d-2.4 (2.4.17+caldav~beta10-10) ...
Setting up cyrus-murder (2.4.17+caldav~beta10-10) ...
Setting up cyrus-murder-2.4 (2.4.17+caldav~beta10-10) ...
Setting up libcyrus-imap-perl (2.4.17+caldav~beta10-10) ...
Setting up libcyrus-imap-perl24 (2.4.17+caldav~beta10-10) ...
Setting up cyrus-dev (2.4.17+caldav~beta10-10) ...
Setting up cyrus-dev-2.4 (2.4.17+caldav~beta10-10) ...
Setting up cyrus-nntpd (2.4.17+caldav~beta10-10) ...
Setting up cyrus-nntpd-2.4 (2.4.17+caldav~beta10-10) ...
Setting up libfile-fcntllock-perl (0.22-1+b1) ...
Setting up cyrus-admin (2.4.17+caldav~beta10-10) ...
Setting up cyrus-admin-2.4 (2.4.17+caldav~beta10-10) ...
Setting up cyrus-caldav (2.4.17+caldav~beta10-10) ...
Setting up cyrus-caldav-2.4 (2.4.17+caldav~beta10-10) ...
root@lettie:/tmp# ls -ld /usr/share/doc/*cyrus*
drwxr-xr-x 2 root root 4096 Dec  2 16:06 /usr/share/doc/cyrus-admin
drwxr-xr-x 2 root root 4096 Dec  2 16:06 /usr/share/doc/cyrus-admin-2.4
drwxr-xr-x 2 root root 4096 Dec  2 16:06 /usr/share/doc/cyrus-caldav
drwxr-xr-x 2 root root 4096 Dec  2 16:06 /usr/share/doc/cyrus-caldav-2.4
drwxr-xr-x 2 root root 4096 Dec  2 16:06 /usr/share/doc/cyrus-clients
drwxr-xr-x 2 root root 4096 Dec  2 16:06
/usr/share/doc/cyrus-clients-2.4
drwxr-xr-x 2 root root 4096 Dec  2 16:06 /usr/share/doc/cyrus-common
drwxr-xr-x 2 root root 4096 Dec  2 16:05 /usr/share/doc/cyrus-common-2.4
drwxr-xr-x 2 root root 4096 Dec  2 16:05 /usr/share/doc/cyrus-dev
drwxr-xr-x 2 root root 4096 Dec  2 16:05 /usr/share/doc/cyrus-dev-2.4
drwxr-xr-x 5 root root 4096 Dec  2 16:06 /usr/share/doc/cyrus-doc
drwxr-xr-x 2 root root 4096 Dec  2 16:06 /usr/share/doc/cyrus-doc-2.4
drwxr-xr-x 2 root root 4096 Dec  2 16:05 /usr/share/doc/cyrus-imapd
drwxr-xr-x 2 root root 4096 Dec  2 16:05 /usr/share/doc/cyrus-imapd-2.4
drwxr-xr-x 2 root root 4096 Dec  2 16:05 /usr/share/doc/cyrus-murder
drwxr-xr-x 2 root root 4096 Dec  2 16:05 /usr/share/doc/cyrus-murder-2.4
drwxr-xr-x 2 root root 4096 Dec  2 16:05 /usr/share/doc/cyrus-nntpd
drwxr-xr-x 2 root root 4096 Dec  2 16:05 /usr/share/doc/cyrus-nntpd-2.4
drwxr-xr-x 2 root root 4096 Dec  2 16:05 /usr/share/doc/cyrus-pop3d
drwxr-xr-x 2 root root 4096 Dec  2 16:05 /usr/share/doc/cyrus-pop3d-2.4
drwxr-xr-x 2 root root 4096 Dec  2 16:05
/usr/share/doc/cyrus-replication
drwxr-xr-x 2 root root 4096 Dec  2 16:05
/usr/share/doc/cyrus-replication-2.4
drwxr-xr-x 2 root root 4096 Dec  2 16:05
/usr/share/doc/libcyrus-imap-perl
drwxr-xr-x 2 root root 4096 Dec  2 16:05
/usr/share/doc/libcyrus-imap-perl24

Looks good, right? :)

O.
-- 
Ondřej Surý ond...@sury.org
Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771739: marked as done (could not start nodm with systemd 217-1 or 217-2)

2014-12-02 Thread Debian Bug Tracking System
Your message dated Tue, 02 Dec 2014 16:19:59 +
with message-id e1xvqbd-er...@franck.debian.org
and subject line Bug#771739: fixed in systemd 217-3
has caused the Debian Bug report #771739,
regarding could not start nodm with systemd 217-1 or 217-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
771739: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771739
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: systemd
Version: 217-2
Severity: grave

Could not start nodm with systemd 217-1 or 217-2.
---End Message---
---BeginMessage---
Source: systemd
Source-Version: 217-3

We believe that the bug you reported is fixed in the latest version of
systemd, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 771...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Martin Pitt mp...@debian.org (supplier of updated systemd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 02 Dec 2014 16:53:36 +0100
Source: systemd
Binary: systemd systemd-sysv libpam-systemd libsystemd0 libsystemd-dev 
libsystemd-login0 libsystemd-login-dev libsystemd-daemon0 libsystemd-daemon-dev 
libsystemd-journal0 libsystemd-journal-dev libsystemd-id128-0 
libsystemd-id128-dev udev libudev1 libudev-dev udev-udeb libudev1-udeb 
libgudev-1.0-0 gir1.2-gudev-1.0 libgudev-1.0-dev python3-systemd systemd-dbg
Architecture: source amd64
Version: 217-3
Distribution: experimental
Urgency: medium
Maintainer: Debian systemd Maintainers 
pkg-systemd-maintain...@lists.alioth.debian.org
Changed-By: Martin Pitt mp...@debian.org
Description:
 gir1.2-gudev-1.0 - libgudev-1.0 introspection data
 libgudev-1.0-0 - GObject-based wrapper library for libudev
 libgudev-1.0-dev - libgudev-1.0 development files
 libpam-systemd - system and service manager - PAM module
 libsystemd-daemon-dev - systemd utility library (transitional package)
 libsystemd-daemon0 - systemd utility library (deprecated)
 libsystemd-dev - systemd utility library - development files
 libsystemd-id128-0 - systemd 128 bit ID utility library (deprecated)
 libsystemd-id128-dev - systemd 128 bit ID utility library (transitional 
package)
 libsystemd-journal-dev - systemd journal utility library (transitional package)
 libsystemd-journal0 - systemd journal utility library (deprecated)
 libsystemd-login-dev - systemd login utility library (transitional package)
 libsystemd-login0 - systemd login utility library (deprecated)
 libsystemd0 - systemd utility library
 libudev-dev - libudev development files
 libudev1   - libudev shared library
 libudev1-udeb - libudev shared library (udeb)
 python3-systemd - Python 3 bindings for systemd
 systemd- system and service manager
 systemd-dbg - system and service manager (debug symbols)
 systemd-sysv - system and service manager - SysV links
 udev   - /dev/ and hotplug management daemon
 udev-udeb  - /dev/ and hotplug management daemon (udeb)
Closes: 771498 771739
Changes:
 systemd (217-3) experimental; urgency=medium
 .
   [ Martin Pitt ]
   * systemd.bug-script: Really capture stderr of systemd-delta.
 (Closes: #771498)
   * boot-and-services autopkgtest: Give test apparmor job some time to
 actually finish.
 .
   [ Didier Roche ]
   * updated debian/patches/insserv.conf-generator.patch:
 - if /etc/X11/default-display-manager doesn't match a systemd unit
   (or doesn't exist), be less agressive about what to mask: we let
   all sysvinit-only display-manager units enabled to fallback to previous
   behavior and let them starting. (Closes: #771739)
Checksums-Sha1:
 ab65791e6bb28d194124948f8edfb9154c786473 4103 systemd_217-3.dsc
 90f674413b3cc2e049ed669a9c8535809df75312 138460 systemd_217-3.debian.tar.xz
 eddd3713290a4a63aa720f92d1e5d01848d3dc6f 2898800 systemd_217-3_amd64.deb
 43c337780cf81974a182dddb0e4d0bc0b037ef0e 31174 systemd-sysv_217-3_amd64.deb
 7456fe898b6ca20b96dc8f479aa3c9ab7d3d01c7 121734 libpam-systemd_217-3_amd64.deb
 891c3eec012c6f292a2a522ac183be26291f5b03 85040 libsystemd0_217-3_amd64.deb
 e3e5f4b59934861ff60c8d8fba6b5b7fe34cb8fa 91792 libsystemd-dev_217-3_amd64.deb
 

Bug#771749: cyrus-{common, imapd}-2.4: unhandled symlink to directory conversion: /usr/share/doc/PACKAGE

2014-12-02 Thread Ondřej Surý
Hi again,

On Tue, Dec 2, 2014, at 16:17, Andreas Beckmann wrote:
 When did you start and stop using it? And on which packages?

I have just realized that I have:

cyrus-imapd-2.4_2.4.16-4+deb7u2_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta10-10_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta10-1_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta10-2_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta10-3_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta10-4_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta10-5_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta10-6_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta10-7_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta10-8_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta10-9_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta9-10_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta9-11_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta9-12~1.gbp72113b_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta9-12_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta9-2_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta9-3_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta9-4_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta9-5_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta9-6_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta9-7_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta9-8_amd64.changes
cyrus-imapd-2.4_2.4.17+caldav~beta9-9_amd64.changes

on my local disk, so I will try to check for possible symlinks that
could have existed in testing and sid. But not today.

O.
-- 
Ondřej Surý ond...@sury.org
Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771749: marked as done (cyrus-{common, imapd}-2.4: unhandled symlink to directory conversion: /usr/share/doc/PACKAGE)

2014-12-02 Thread Debian Bug Tracking System
Your message dated Tue, 02 Dec 2014 16:34:19 +
with message-id e1xvqp5-0002k8...@franck.debian.org
and subject line Bug#771749: fixed in cyrus-imapd-2.4 2.4.17+caldav~beta10-10
has caused the Debian Bug report #771749,
regarding cyrus-{common, imapd}-2.4: unhandled symlink to directory conversion: 
/usr/share/doc/PACKAGE
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
771749: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771749
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: cyrus-imapd-2.4,cyrus-common-2.4
Version: 2.4.17+caldav~beta10-8
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

an upgrade test with piuparts revealed that your package installs files
over existing symlinks and possibly overwrites files owned by other
packages. This usually means an old version of the package shipped a
symlink but that was later replaced by a real (and non-empty)
directory. This kind of overwriting another package's files cannot be
detected by dpkg.

This was observed on the following upgrade paths:

  wheezy - jessie (2.4.17+caldav~beta10-8)
  wheezy - sid (2.4.17+caldav~beta10-9)

For /usr/share/doc/PACKAGE this may not be problematic as long as both
packages are installed, ship byte-for-byte identical files and are
upgraded in lockstep. But once one of the involved packages gets
removed, the other one will lose its documentation files, too,
including the copyright file, which is a violation of Policy 12.5:
https://www.debian.org/doc/debian-policy/ch-docs.html#s-copyrightfile

For other overwritten locations anything interesting may happen.

Note that dpkg intentionally does not replace directories with symlinks
and vice versa, you need the maintainer scripts to do this.
See in particular the end of point 4 in
https://www.debian.org/doc/debian-policy/ch-maintainerscripts.html#s-unpackphase

It is recommended to use the dpkg-maintscript-helper commands
'dir_to_symlink' and 'symlink_to_dir' (available since dpkg 1.17.2)
to perform the conversion, ideally using d/$PACKAGE.mainstscript.
See dpkg-maintscript-helper(1) and dh_installdeb(1) for details.


From the attached log (usually somewhere in the middle...):

4m16.8s ERROR: FAIL: silently overwrites files via directory symlinks:
  /usr/share/doc/cyrus-common-2.4/changelog.Debian.gz (cyrus-common-2.4) != 
/usr/share/doc/cyrus-common/changelog.Debian.gz (cyrus-common)
  /usr/share/doc/cyrus-common-2.4/copyright (cyrus-common-2.4) != 
/usr/share/doc/cyrus-common/copyright (cyrus-common)
  /usr/share/doc/cyrus-imapd-2.4/copyright (cyrus-imapd-2.4) != 
/usr/share/doc/cyrus-common/copyright (cyrus-common)


There may be more packages failing, but these cannot be tested by piuparts
due to cyrus-common-2.4 already failing ...

cheers,

Andreas


cyrus-imapd-2.4_2.4.17+caldav~beta10-8.log.gz
Description: application/gzip
---End Message---
---BeginMessage---
Source: cyrus-imapd-2.4
Source-Version: 2.4.17+caldav~beta10-10

We believe that the bug you reported is fixed in the latest version of
cyrus-imapd-2.4, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 771...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ondřej Surý ond...@debian.org (supplier of updated cyrus-imapd-2.4 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 02 Dec 2014 15:47:18 +0100
Source: cyrus-imapd-2.4
Binary: cyrus-common cyrus-doc cyrus-imapd cyrus-pop3d cyrus-admin cyrus-murder 
cyrus-replication cyrus-nntpd cyrus-caldav cyrus-clients cyrus-dev 
libcyrus-imap-perl cyrus-common-2.4 cyrus-doc-2.4 cyrus-imapd-2.4 
cyrus-pop3d-2.4 cyrus-admin-2.4 cyrus-murder-2.4 cyrus-replication-2.4 
cyrus-nntpd-2.4 cyrus-caldav-2.4 cyrus-clients-2.4 cyrus-dev-2.4 
libcyrus-imap-perl24
Architecture: source amd64 all
Version: 2.4.17+caldav~beta10-10
Distribution: unstable
Urgency: medium
Maintainer: Debian Cyrus Team 
pkg-cyrus-imapd-debian-de...@lists.alioth.debian.org
Changed-By: Ondřej Surý ond...@debian.org
Description:
 cyrus-admin - Cyrus mail system - administration tools
 cyrus-admin-2.4 - Cyrus mail system - administration tools [dummy package]
 

Bug#750521: acknowledgement of reception of RC bug report in scim from Debian maintainer

2014-12-02 Thread Rolf Leggewie
On 03.12.2014 00:25, Rolf Leggewie wrote:
 export GTK_IM_MODULE=;echo GETPIN | pinentry-curses FAILS
 suggesting there is something essentially wrong with pinentry as well

I got confused about what Ximin had written about pinentry-curses since
later on he mentioned only pinentry-gtk2, but here is the update on
pinentry-curses.

export GTK_IM_MODULE=scim mytty=$(tty); echo GETPIN | pinentry-curses
--ttyname=$mytty
WORKS, but at least here doesn't invoke scim and thus no CJKV or other
input. Only simple entry of ASCII and similar character is possible.
Contrary to my statement above, pinentry-curses seems to be generally
working as expected.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#750521: acknowledgement of reception of RC bug report in scim from Debian maintainer

2014-12-02 Thread Rolf Leggewie
On 03.12.2014 00:25, Rolf Leggewie wrote:
 export GTK_IM_MODULE=;echo GETPIN | pinentry-curses FAILS
 suggesting there is something essentially wrong with pinentry as well

I got confused about what Ximin had written about pinentry-curses since
later on he mentioned only pinentry-gtk2, but here is the update on
pinentry-curses.

export GTK_IM_MODULE=scim mytty=$(tty); echo GETPIN | pinentry-curses
--ttyname=$mytty
WORKS, but at least here doesn't invoke scim and thus no CJKV or other
input. Only simple entry of ASCII and similar character is possible.
Contrary to my statement above, pinentry-curses seems to be generally
working as expected.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#750521: acknowledgement of reception of RC bug report in scim from Debian maintainer

2014-12-02 Thread Daniel Kahn Gillmor
On 12/02/2014 11:40 AM, Rolf Leggewie wrote:
 Contrary to my statement above, pinentry-curses seems to be generally
 working as expected.

yep, i think this report is specifically about something broken in the
interaction between pinentry-gtk2 and scim.

I note that setting the GTK_IM_MODULE environment might not be relevant
for pinentry-qt4 at all, because qt4 probably doesn't inspect the GTK_*
environment variables.

So we're left with the following narrow buggy test case:

 echo GETPIN | GTK_IM_MODULE=scim pinentry-gtk-2

thanks for tracking it down further, Rolf.

--dkg



signature.asc
Description: OpenPGP digital signature


Bug#771794: [Python-modules-team] Bug#771794: pip silently removes/updates system provided python packages

2014-12-02 Thread Donald Stufft
I'd very much prefer it if you didn't do this. This *is* going to break things
for people and it's going to cause a bunch of confusion. 

---
Donald Stufft
PGP: 7C6B 7C5D 5E2B 6356 A926 F04F 6E3C BCE9 3372 DCFA


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771749: cyrus-{common, imapd}-2.4: unhandled symlink to directory conversion: /usr/share/doc/PACKAGE

2014-12-02 Thread Ondřej Surý
Please test -11 when it hits the archive/incoming/...

debdiff looks big, but only few old links were missing, but I sorted the
maintscripts, so it can be easily compared for missing stuff.

O.

On Tue, Dec 2, 2014, at 17:28, Ondřej Surý wrote:
 Hi again,
 
 On Tue, Dec 2, 2014, at 16:17, Andreas Beckmann wrote:
  When did you start and stop using it? And on which packages?
 
 I have just realized that I have:
 
 cyrus-imapd-2.4_2.4.16-4+deb7u2_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta10-10_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta10-1_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta10-2_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta10-3_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta10-4_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta10-5_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta10-6_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta10-7_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta10-8_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta10-9_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta9-10_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta9-11_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta9-12~1.gbp72113b_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta9-12_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta9-2_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta9-3_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta9-4_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta9-5_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta9-6_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta9-7_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta9-8_amd64.changes
 cyrus-imapd-2.4_2.4.17+caldav~beta9-9_amd64.changes
 
 on my local disk, so I will try to check for possible symlinks that
 could have existed in testing and sid. But not today.
 
 O.
 -- 
 Ondřej Surý ond...@sury.org
 Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server
 
 ___
 Pkg-Cyrus-imapd-Debian-devel mailing list
 pkg-cyrus-imapd-debian-de...@lists.alioth.debian.org
 http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-cyrus-imapd-debian-devel


-- 
Ondřej Surý ond...@sury.org
Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#750521: acknowledgement of reception of RC bug report in scim from Debian maintainer

2014-12-02 Thread Rolf Leggewie
On 03.12.2014 00:49, Daniel Kahn Gillmor wrote:
 On 12/02/2014 11:40 AM, Rolf Leggewie wrote:
 Contrary to my statement above, pinentry-curses seems to be generally
 working as expected.
 
 yep, i think this report is specifically about something broken in the
 interaction between pinentry-gtk2 and scim.

Yep, and it turns out to be a VERY old problem indeed (still reading up
on it).  It's from at least 2007 or most likely even 2006!

http://thread.gmane.org/gmane.comp.encryption.gpg.devel/14423
https://bugzilla.novell.com/show_bug.cgi?id=330073

The people at Novell came to the conclusion that the problem needs to be
fixed in upstream pinentry-gtk-2.  Unfortunately the reference link is
404 now and even web.archive.org does not have a backup copy of it.

 I note that setting the GTK_IM_MODULE environment might not be relevant
 for pinentry-qt4 at all, because qt4 probably doesn't inspect the GTK_*
 environment variables.

My bad.  Obviously, that should read QT_IM_MODULE which I have set to
scim as default.  It still is the (known) case that pinentry-qt4 works.
 This provides a good workaround for anyone affected by this issue.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771794: [Python-modules-team] Bug#771794: Bug#771794: pip silently removes/updates system provided python packages

2014-12-02 Thread Daniel Kahn Gillmor
On 12/02/2014 11:51 AM, Donald Stufft wrote:
 I'd very much prefer it if you didn't do this. This *is* going to break things
 for people and it's going to cause a bunch of confusion. 

It's not clear to me which side you're arguing for.  can you clarify
which action is going to break things for people and cause a bunch of
confusion?

If pip silently removes/updates system-provided python packages, that is
likely to break things and cause a bunch of confusion, no?

alternately, if pip verbosely refuses to run as uid 0, that's at least a
non-silent failure. (though it certainly will break things and frustrate
some people)

--dkg



signature.asc
Description: OpenPGP digital signature


Bug#750521: acknowledgement of reception of RC bug report in scim from Debian maintainer

2014-12-02 Thread Rolf Leggewie
Control: reassign -1 pinentry-gtk2

On 03.12.2014 01:14, Rolf Leggewie wrote:
 yep, i think this report is specifically about something broken in the
  interaction between pinentry-gtk2 and scim.
 Yep, and it turns out to be a VERY old problem indeed (still reading up
 on it).  It's from at least 2007 or most likely even 2006!
 
 http://thread.gmane.org/gmane.comp.encryption.gpg.devel/14423
 https://bugzilla.novell.com/show_bug.cgi?id=330073
 
 The people at Novell came to the conclusion that the problem needs to be
 fixed in upstream pinentry-gtk-2.

After reading through the gnupg-devel mailing list over on gmane.org,
specifically
http://thread.gmane.org/gmane.comp.encryption.gpg.devel/14423/focus=14461 I
am reassigning this back to the pinentry package.  That thread has some
indication that some work was done upstream but there is also an entry
from 2009 indicating the problem is still present and that mail never
received a response.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: acknowledgement of reception of RC bug report in scim from Debian maintainer

2014-12-02 Thread Debian Bug Tracking System
Processing control commands:

 reassign -1 pinentry-gtk2
Bug #750521 [scim-gtk-immodule] scim-gtk-immodule breaks pinentry-gtk2 and 
impairs gnome-keyring
Bug reassigned from package 'scim-gtk-immodule' to 'pinentry-gtk2'.
No longer marked as found in versions scim/1.4.14-6.
Ignoring request to alter fixed versions of bug #750521 to the same values 
previously set

-- 
750521: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=750521
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771794: [Python-modules-team] Bug#771794: Bug#771794: pip silently removes/updates system provided python packages

2014-12-02 Thread Donald Stufft

 On Dec 2, 2014, at 12:25 PM, Daniel Kahn Gillmor d...@fifthhorseman.net 
 wrote:
 
 On 12/02/2014 11:51 AM, Donald Stufft wrote:
 I'd very much prefer it if you didn't do this. This *is* going to break 
 things
 for people and it's going to cause a bunch of confusion. 
 
 It's not clear to me which side you're arguing for.  can you clarify
 which action is going to break things for people and cause a bunch of
 confusion?
 
 If pip silently removes/updates system-provided python packages, that is
 likely to break things and cause a bunch of confusion, no?
 
 alternately, if pip verbosely refuses to run as uid 0, that's at least a
 non-silent failure. (though it certainly will break things and frustrate
 some people)
 
   --dkg
 

I’m saying don’t make the change. There are major software systems that
rely on the ability to install things as root using pip. Chef, puppet, etc.

It’s also going to cause a bunch of confusion because all of a sudden pip
is going to have a vastly different behavior if it’s running on Debian vs
if it’s running somewhere else. That’s going to blow back on us (the pip
maintainers) as we get bug reports from people who assume we broke their
use cases for pip.

We (pip maintainers) recognize this can cause issues and we’d like to 
arrive a solution that solves this issue without introducing major divergence
between various platforms and with respect towards the use cases that
need or require that ability. It’s somewhat of a thorny problems to do it
correctly, we’re a fairly small team with limited time, and we have bigger
issues of concern that have taken a front seat.

---
Donald Stufft
PGP: 7C6B 7C5D 5E2B 6356 A926 F04F 6E3C BCE9 3372 DCFA


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771830: Fails to execute at all

2014-12-02 Thread Juhapekka Tolvanen
Package: systemd-cron
Version: 1.3.1+ds1-2
Severity: grave


Here are relevant lines from output of dmesg-command:

 [   21.059257] EXT4-fs (sdb1): mounted filesystem with ordered data
 mode. Opts: (null)
  [   21.520730] systemd[1]: /usr appears to be on its own filesytem
 and is not already mounted. This is not a supported setup. Some
 things will probably break (sometimes even
   silently) in mysterious ways. Consult
 http://freedesktop.org/wiki/Software/systemd/separate-usr-is-broken
 for more information.
 *[   21.577570] systemd[123]: Failed to execute
 /lib/systemd/system-generators/systemd-crontab-generator: No such
 file or directory
 *[   21.578059] systemd[122]:
 /lib/systemd/system-generators/systemd-crontab-generator failed with
 error code 1.
  [   22.225613] fuse init (API version 7.23)


Maybe problem is this:

/usr is not mounted when it tries to run that command. That command is
actually python script. Its shebang line is this:

#!/usr/bin/python

Is it really so necessary to run that
/lib/systemd/system-generators/systemd-crontab-generator when /usr is
not mounted yet?

How about running that command by hand after boot?:

-=*[ROOT ZSH]*=- root@juhtolv | Tue 02 Dec 2014 19:43:37 | 8404 | pts/1.1
/root
# /lib/systemd/system-generators/systemd-crontab-generator
Traceback (most recent call last):
  File /lib/systemd/system-generators/systemd-crontab-generator,
line 19, in module
TARGER_DIR = sys.argv[1]
IndexError: list index out of range
[1]6032 exit 1
/lib/systemd/system-generators/systemd-crontab-generator


-=*[ROOT ZSH]*=- root@juhtolv | Tue 02 Dec 2014 19:43:59 | 8405 | pts/1.1
/root
# /lib/systemd/system-generators/systemd-crontab-generator
/etc/crontab
Traceback (most recent call last):
  File /lib/systemd/system-generators/systemd-crontab-generator,
line 32, in module
os.makedirs(TIMERS_DIR)
  File /usr/lib/python2.7/os.py, line 157, in makedirs
  mkdir(name, mode)
  OSError: [Errno 20] Not a directory:
'/etc/crontab/cron.target.wants'
[1]6094 exit 1
/lib/systemd/system-generators/systemd-crontab-generator /etc/crontab

Is that command really so stupid, that it only accepts folders and not
files? If so, why /etc/crontab is menationed in FILES-section of man
page of systemd-crontab-generator ?


-- System Information:
Debian Release: jessie/sid
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 3.16.0-4-686-pae (SMP w/1 CPU core)
Locale: LANG=fi_FI.utf8, LC_CTYPE=fi_FI.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages systemd-cron depends on:
ii  init-system-helpers  1.22
ii  python   2.7.8-2
pn  python:any   none
ii  systemd-sysv 215-6

systemd-cron recommends no packages.

systemd-cron suggests no packages.

-- Configuration Files:
/etc/crontab changed:
SHELL=/bin/sh
PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin
@reboot /usr/bin/screen -wipe  /dev/null 21 ; /usr/bin/screen -U -d -m
01 04   * * *   /root/scripts/emptypartial.sh
01 05   * * *   /root/scripts/emptypartial.sh
01 06   * * *   /root/scripts/emptypartial.sh
01 07   * * *   /root/scripts/emptypartial.sh
01 12   * * *   /root/scripts/emptypartial.sh
01 01   * * 1   /bin/echo '/usr/bin/time -v /usr/bin/nice -n 20 
/usr/local/sbin/juhtolv-backup.sh' | batch
01 02   * * 1   /bin/echo '/usr/bin/time -v /usr/bin/nice -n 20 
/usr/local/sbin/juhtolv-backup2.sh' | batch
01 01   * * 2   /bin/echo '/usr/bin/time -v /usr/bin/nice -n 20 
/usr/local/sbin/juhtolv-backup.sh' | batch
01 02   * * 2   /bin/echo '/usr/bin/time -v /usr/bin/nice -n 20 
/usr/local/sbin/juhtolv-backup2.sh' | batch
01 01   * * 3   /bin/echo '/usr/bin/time -v /usr/bin/nice -n 20 
/usr/local/sbin/juhtolv-backup.sh' | batch
01 02   * * 3   /bin/echo '/usr/bin/time -v /usr/bin/nice -n 20 
/usr/local/sbin/juhtolv-backup2.sh' | batch
01 01   * * 4   /bin/echo '/usr/bin/time -v /usr/bin/nice -n 20 
/usr/local/sbin/juhtolv-backup.sh' | batch
01 02   * * 4   /bin/echo '/usr/bin/time -v /usr/bin/nice -n 20 
/usr/local/sbin/juhtolv-backup2.sh' | batch
01 01   * * 5   /bin/echo '/usr/bin/time -v /usr/bin/nice -n 20 
/usr/local/sbin/juhtolv-backup.sh' | batch
01 02   * * 5   /bin/echo '/usr/bin/time -v /usr/bin/nice -n 20 
/usr/local/sbin/juhtolv-backup2.sh' | batch
01 01   * * 6   /bin/echo '/usr/bin/time -v /usr/bin/nice -n 20 
/usr/local/sbin/juhtolv-backup.sh' | batch
01 02   * * 6   /bin/echo '/usr/bin/time -v /usr/bin/nice -n 20 
/usr/local/sbin/juhtolv-backup2.sh' | batch
01 01   * * 7   /bin/echo '/usr/bin/time -v /usr/bin/nice -n 20 
/usr/local/sbin/juhtolv-backup.sh' | batch
01 02   * * 7   /bin/echo '/usr/bin/time -v /usr/bin/nice -n 20 
/usr/local/sbin/juhtolv-backup2.sh' | batch


-- no debconf information

-- 
Juhapekka naula Tolvanen * http colon slash slash iki dot fi slash juhtolv
Quidquid Latine dictum sit altum videtur.


-- 
To UNSUBSCRIBE, email 

Bug#771126: marked as done (libav/lena.pnm: non-DFSG free + not mentioned in copyright)

2014-12-02 Thread Debian Bug Tracking System
Your message dated Tue, 02 Dec 2014 18:04:35 +
with message-id e1xvror-0005u4...@franck.debian.org
and subject line Bug#771126: fixed in libav 6:11.1-1~exp1
has caused the Debian Bug report #771126,
regarding libav/lena.pnm: non-DFSG free + not mentioned in copyright
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
771126: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771126
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Source: libav
Severity: serious
Tags: upstream
Justification: Policy 2.2.1

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

It was made aware at lists.debian.org/54764bf5.2090...@googlemail.com
that the source of libav contains image file tests/lena.pnm which lacks
licensing (and is well known to not be in the public domain).


 - Jonas

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQF8BAEBCgBmBQJUdmaZXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ3NjQ4ODQwMTIyRTJDNTBFQzUxRDQwRTI0
RUMxQjcyMjM3NEY5QkQ2AAoJEE7BtyI3T5vW28oIAKX/xV4MUJdxjXRUjy3um6Yi
62UhjzReqwoWzZa69dZNfR1wSjIycyZVLogTQ7DARNXudW/Ov9mgl4BgU0MACE0h
EcM7eSZH21AsXEnFypzYGXVhiUSENtti7S01S7GQSGQUm+LnEYvYv9cI7saoa4y7
esytjPlkcYZRB1lQb07jsC2Qz/hjHNx3HvBqeUbgGcKMymTkFI7C2lu3NYPcmMxc
z3BHl3rcJk3q8TvrNgsbx674F91C22Cg8KwWTLZl0pTbFwTc1XuOQV1A0aBUeHx4
fFN59R31SBmsY7RBfDl9w4fvMBXmsMtEjbiE/Pie0XESCsrjrSwCOhmepTXoxSA=
=HDmN
-END PGP SIGNATURE-
---End Message---
---BeginMessage---
Source: libav
Source-Version: 6:11.1-1~exp1

We believe that the bug you reported is fixed in the latest version of
libav, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 771...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jonas Smedegaard d...@jones.dk (supplier of updated libav package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 02 Dec 2014 16:37:04 +0100
Source: libav
Binary: libav-tools libav-dbg libav-doc libavutil54 libavcodec56 libavdevice55 
libavformat56 libavfilter5 libswscale3 libavutil-dev libavcodec-dev 
libavdevice-dev libavformat-dev libavfilter-dev libswscale-dev 
libavresample-dev libavresample2 libavcodec-extra-56 libavcodec-extra
Architecture: source all amd64
Version: 6:11.1-1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Multimedia Maintainers 
pkg-multimedia-maintain...@lists.alioth.debian.org
Changed-By: Jonas Smedegaard d...@jones.dk
Description:
 libav-dbg  - Debug symbols for Libav related packages
 libav-doc  - Documentation of the Libav API
 libav-tools - Multimedia player, encoder and transcoder
 libavcodec-dev - Development files for libavcodec
 libavcodec-extra - Libav codec library (additional codecs meta-package)
 libavcodec-extra-56 - Libav codec library (additional codecs)
 libavcodec56 - Libav codec library
 libavdevice-dev - Development files for libavdevice
 libavdevice55 - Libav device handling library
 libavfilter-dev - Development files for libavfilter
 libavfilter5 - Libav video filtering library
 libavformat-dev - Development files for libavformat
 libavformat56 - Libav file format library
 libavresample-dev - Development files for libavresample
 libavresample2 - Libav audio resampling library
 libavutil-dev - Development files for libavutil
 libavutil54 - Libav utility library
 libswscale-dev - Development files for libswscale
 libswscale3 - Libav video scaling library
Closes: 771126
Changes:
 libav (6:11.1-1~exp1) experimental; urgency=medium
 .
   [ upstream ]
   * New release.
 + Replace lena.pnm.
   Closes: bug#771126.
 + Treat all '*.pnm' files as non-text file.
 + opusdec: Ensure all substreams have same number of coded samples.
 + lavu: Fix memory leaks by using a mutex instead of atomics.
 + lavu: Add wrappers for the pthreads mutex API.
 + mp3enc: Fix a triggerable assert.
 + resample: Avoid off-by-1 errors in PTS calcs.
 + imc: Fix order of operations in coefficients read.
 + hevc_mvs: Ensure to always initialize the temporal MV fully.
 + hevc_mvs: Initialize the temporal MV in case of missing ref.
 + h264: Reset ret to avoid propagating minor failures.
 + hevc: Initialize 

Bug#727800: kmail: KMail goes bonkers following Qt update

2014-12-02 Thread Diane Trout
I contacted Upstream and although they're too busy right now he offered this 
clue, in response to my bug description.

Diane

  [Diane]
  With akonadiconsole under job tracker I can see a vast number of
  SpecialCollectionsRequestJob's being scheduled and with the query browser
  see a bunch of Select ... from CollectionTable queries being generated.
  
  Screenshot of query browser posted:
  https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=40;filename=akonadi-quer
  ie
  s.png;att=1;bug=727800
  
  I can stop the loop by restarting akonadi, though I'm not sure if that's
  the
  best solution to this. Would you have any suggestions?
 
 [upstream]
 From a quick look I'd say the problem is the part when the migrator tries to
 replace the local maildir resource, created as a requirement for the
 maildispatcher, with the resource it has just created for the user's
 previously used folder structure.
 
 It might be possible to disable that through a configuration option, but I
 can't remember with certainty.



signature.asc
Description: This is a digitally signed message part.


Processed: Re: Bug#771830: Fails to execute at all

2014-12-02 Thread Debian Bug Tracking System
Processing control commands:

 tag -1 + wontfix
Bug #771830 [systemd-cron] Fails to execute at all
Added tag(s) wontfix.
 severity -1 normal
Bug #771830 [systemd-cron] Fails to execute at all
Severity set to 'normal' from 'grave'

-- 
771830: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771830
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771830: Fails to execute at all

2014-12-02 Thread Alexandre Detiste
control: tag -1 + wontfix
control: severity -1 normal

Hi,

The generator must follow a special set of rules defined here:
http://www.freedesktop.org/wiki/Software/systemd/Generators/

One of those is that they are the first thing run by systemd; even before /usr 
is mounted. 
This can't be changed.

By runnning, you can see the generator as the blue spot:
$ systemd-analyze plot  /tmp/boot.svg
$ xdg-open /tmp/boot.svg


One workaround to your problem would be to replace
/lib/systemd/system-generators/systemd-crontab-generator
by a shell script that calls the real generator 
(move it to /lib/systemd/systemd-cron/ )
only if /usr is mounted and python avaible

+ do a systemctl daemon-reload  systemctl restart cron.target
in /etc/rc.local

I could even publish this script in our 'contrib' folder
https://github.com/systemd-cron/systemd-cron/tree/master/contrib
but wouldn't made it the default.

   [   21.520730] systemd[1]: /usr appears to be on its own filesytem
  and is not already mounted. This is not a supported setup.
systemd warned you :-|

 /usr is not mounted when it tries to run that command. That command is
 actually python script. Its shebang line is this:
 
 #!/usr/bin/python
 
 Is it really so necessary to run that
 /lib/systemd/system-generators/systemd-crontab-generator when /usr is
 not mounted yet?
The first run is unconditional; 
the generator schedules a second run of itself if /var
is a separate partition (I use this setup).

 How about running that command by hand after boot?:
This should never run by hand; It should allways be called by systemctl 
daemon-reload

Alexandre Detiste


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771794: (no subject)

2014-12-02 Thread Barry Warsaw
For reference:

https://github.com/pypa/pip/issues/1668


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#765129: tcos: diff for NMU version 0.89.93+nmu1

2014-12-02 Thread Mario Izquierdo Rodríguez

El 24/11/14 a las 15:28, Jonathan Wiltshire escribió:

On Mon, Nov 24, 2014 at 12:05:21AM +0100, Mario Izquierdo Rodríguez wrote:

El 23/11/14 a las 19:40, Jonathan Wiltshire escribió:

Control: tags 765129 + pending

Dear maintainer,

I've prepared an NMU for tcos (versioned as 0.89.93+nmu1) and
uploaded it to DELAYED/2. Please feel free to tell me if I
should delay it longer.

Regards.




Hi, thanks for NMU, I'm not a DD and I have a new package but no sponsor for
upload.


How about preparing a maintainer upload and I'll sponsor it for you?



Hi Jonathan.

I had prepared new TCOS package:

http://mariodebian.com/debian-packages/tcos_0.89.97.dsc

Only sources (not binary)

Can you upload it?

Thanks in advance.


--
Mario Izquierdo Rodríguez
http://mariodebian.com


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771794: pip silently removes/updates system provided python packages

2014-12-02 Thread Scott Kitterman
On Tuesday, December 02, 2014 12:37:40 PM Donald Stufft wrote:
  On Dec 2, 2014, at 12:25 PM, Daniel Kahn Gillmor d...@fifthhorseman.net
  wrote: 
  On 12/02/2014 11:51 AM, Donald Stufft wrote:
  I'd very much prefer it if you didn't do this. This *is* going to break
  things for people and it's going to cause a bunch of confusion.
  
  It's not clear to me which side you're arguing for.  can you clarify
  which action is going to break things for people and cause a bunch of
  confusion?
  
  If pip silently removes/updates system-provided python packages, that is
  likely to break things and cause a bunch of confusion, no?
  
  alternately, if pip verbosely refuses to run as uid 0, that's at least a
  non-silent failure. (though it certainly will break things and frustrate
  some people)
  
  --dkg
 
 I’m saying don’t make the change. There are major software systems that
 rely on the ability to install things as root using pip. Chef, puppet, etc.
 
 It’s also going to cause a bunch of confusion because all of a sudden pip
 is going to have a vastly different behavior if it’s running on Debian vs
 if it’s running somewhere else. That’s going to blow back on us (the pip
 maintainers) as we get bug reports from people who assume we broke their
 use cases for pip.
 
 We (pip maintainers) recognize this can cause issues and we’d like to
 arrive a solution that solves this issue without introducing major
 divergence between various platforms and with respect towards the use cases
 that need or require that ability. It’s somewhat of a thorny problems to do
 it correctly, we’re a fairly small team with limited time, and we have
 bigger issues of concern that have taken a front seat.

In the meantime, we have a release to get out the door, so wait for upstream 
to figure it out in TBD timeframe isn't a particularly palatable option.

As package maintainers, I think we have a limited set of options available:

1.  Do nothing for now.  Maybe upstream figures out something in time to get a 
fix in for Jessie.  Maybe the release team decides to ignore the bug for 
Jessie.  Maybe the release team removes pip for Jessie.

2.  Disable root/system use.

3.  Make install as --user default and require some suitable named option for 
root/system install.

4.  Install as root by default if permissions allow, but default to --user if 
not instead of just erroring out.

As upstream, do you have a preference if it's not #1?  Are there other options 
that would be better?

Scott K


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771768: antiword: CVE-2014-8123: buffer overflow of of atPPSlist[].szName[]

2014-12-02 Thread Olly Betts
On Tue, Dec 02, 2014 at 08:35:40AM +0100, Salvatore Bonaccorso wrote:
 the following vulnerability was published for antiword.
 
 CVE-2014-8123[0]:
 buffer overflow of atPPSlist[].szName[] 

We're actually already carrying a patch to address this buffer overflow
- 10_fix_buffer_overflow_wordole_c.dpatch, added in 0.37-5 back in June
2009:

http://sources.debian.net/src/antiword/0.37-10/debian/patches/10_fix_buffer_overflow_wordole_c.patch/

Reported in: https://bugs.debian.org/407015

I'm not going to just close this though, as the check in our patch is
 but the new patch uses =.  I'll dig into if the equality
condition results in an overflow, but the scope for exploiting this in
Debian is going to be rather more limited than in upstream 0.37.

Cheers,
Olly


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771794: pip silently removes/updates system provided python packages

2014-12-02 Thread Donald Stufft
I'm on my phone so forgive my formatting. 

4, 3, 2 I think in order of best to worst in my opinion. 

I have another question. If we fix this in the upcoming pip 6 release what is 
the chances of getting an exception for pip 6 in the freeze? If I can solve the 
problem in pip proper and keep the delta between different platforms smaller I 
can juggle around priorities and push the other big ticket thing I was working 
on till another release. 

I have more questions regarding what a good upstream solution looks like but 
I'll touch on those when I'm back at my desk. 


 On Dec 2, 2014, at 3:41 PM, Scott Kitterman deb...@kitterman.com wrote:
 
 On Tuesday, December 02, 2014 12:37:40 PM Donald Stufft wrote:
 On Dec 2, 2014, at 12:25 PM, Daniel Kahn Gillmor d...@fifthhorseman.net
 wrote: 
 On 12/02/2014 11:51 AM, Donald Stufft wrote:
 I'd very much prefer it if you didn't do this. This *is* going to break
 things for people and it's going to cause a bunch of confusion.
 
 It's not clear to me which side you're arguing for.  can you clarify
 which action is going to break things for people and cause a bunch of
 confusion?
 
 If pip silently removes/updates system-provided python packages, that is
 likely to break things and cause a bunch of confusion, no?
 
 alternately, if pip verbosely refuses to run as uid 0, that's at least a
 non-silent failure. (though it certainly will break things and frustrate
 some people)
 
--dkg
 
 I’m saying don’t make the change. There are major software systems that
 rely on the ability to install things as root using pip. Chef, puppet, etc.
 
 It’s also going to cause a bunch of confusion because all of a sudden pip
 is going to have a vastly different behavior if it’s running on Debian vs
 if it’s running somewhere else. That’s going to blow back on us (the pip
 maintainers) as we get bug reports from people who assume we broke their
 use cases for pip.
 
 We (pip maintainers) recognize this can cause issues and we’d like to
 arrive a solution that solves this issue without introducing major
 divergence between various platforms and with respect towards the use cases
 that need or require that ability. It’s somewhat of a thorny problems to do
 it correctly, we’re a fairly small team with limited time, and we have
 bigger issues of concern that have taken a front seat.
 
 In the meantime, we have a release to get out the door, so wait for upstream 
 to figure it out in TBD timeframe isn't a particularly palatable option.
 
 As package maintainers, I think we have a limited set of options available:
 
 1.  Do nothing for now.  Maybe upstream figures out something in time to get 
 a 
 fix in for Jessie.  Maybe the release team decides to ignore the bug for 
 Jessie.  Maybe the release team removes pip for Jessie.
 
 2.  Disable root/system use.
 
 3.  Make install as --user default and require some suitable named option for 
 root/system install.
 
 4.  Install as root by default if permissions allow, but default to --user if 
 not instead of just erroring out.
 
 As upstream, do you have a preference if it's not #1?  Are there other 
 options 
 that would be better?
 
 Scott K
 


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#770412: marked as done (grub-xen: fails to install in a chroot)

2014-12-02 Thread Debian Bug Tracking System
Your message dated Tue, 02 Dec 2014 21:19:39 +
with message-id e1xvurd-0002oh...@franck.debian.org
and subject line Bug#770412: fixed in grub2 2.02~beta2-17
has caused the Debian Bug report #770412,
regarding grub-xen: fails to install in a chroot
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
770412: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770412
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: grub-xen
Version: 2.02~beta2-16
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package failed to install. As
per definition of the release team this makes the package too buggy for
a release, thus the severity.

From the attached log (scroll to the bottom...):

  Selecting previously unselected package grub-xen.
  (Reading database ... 8098 files and directories currently installed.)
  Preparing to unpack .../grub-xen_2.02~beta2-16_amd64.deb ...
  Unpacking grub-xen (2.02~beta2-16) ...
  Setting up grub-xen (2.02~beta2-16) ...
  
  Creating config file /etc/default/grub with new version
  Installing for x86_64-xen platform.
  grub-install: error: cannot find a device for /boot/grub (is /dev mounted?).
  dpkg: error processing package grub-xen (--configure):
   subprocess installed post-installation script returned error exit status 1
  Errors were encountered while processing:
   grub-xen


cheers,

Andreas


grub-xen_2.02~beta2-16.log.gz
Description: application/gzip
---End Message---
---BeginMessage---
Source: grub2
Source-Version: 2.02~beta2-17

We believe that the bug you reported is fixed in the latest version of
grub2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 770...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ian Campbell i...@debian.org (supplier of updated grub2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sun, 30 Nov 2014 17:15:21 +
Source: grub2
Binary: grub2 grub-linuxbios grub-efi grub-common grub2-common grub-emu 
grub-emu-dbg grub-pc-bin grub-pc-dbg grub-pc grub-rescue-pc grub-coreboot-bin 
grub-coreboot-dbg grub-coreboot grub-efi-ia32-bin grub-efi-ia32-dbg 
grub-efi-ia32 grub-efi-amd64-bin grub-efi-amd64-dbg grub-efi-amd64 
grub-efi-ia64-bin grub-efi-ia64-dbg grub-efi-ia64 grub-efi-arm-bin 
grub-efi-arm-dbg grub-efi-arm grub-efi-arm64-bin grub-efi-arm64-dbg 
grub-efi-arm64 grub-ieee1275-bin grub-ieee1275-dbg grub-ieee1275 
grub-firmware-qemu grub-uboot-bin grub-uboot-dbg grub-uboot grub-xen-bin 
grub-xen-dbg grub-xen grub-xen-host grub-yeeloong-bin grub-yeeloong-dbg 
grub-yeeloong grub-theme-starfield grub-mount-udeb
Architecture: source
Version: 2.02~beta2-17
Distribution: unstable
Urgency: medium
Maintainer: GRUB Maintainers pkg-grub-de...@lists.alioth.debian.org
Changed-By: Ian Campbell i...@debian.org
Description:
 grub-common - GRand Unified Bootloader (common files)
 grub-coreboot - GRand Unified Bootloader, version 2 (Coreboot version)
 grub-coreboot-bin - GRand Unified Bootloader, version 2 (Coreboot binaries)
 grub-coreboot-dbg - GRand Unified Bootloader, version 2 (Coreboot debug files)
 grub-efi   - GRand Unified Bootloader, version 2 (dummy package)
 grub-efi-amd64 - GRand Unified Bootloader, version 2 (EFI-AMD64 version)
 grub-efi-amd64-bin - GRand Unified Bootloader, version 2 (EFI-AMD64 binaries)
 grub-efi-amd64-dbg - GRand Unified Bootloader, version 2 (EFI-AMD64 debug 
files)
 grub-efi-arm - GRand Unified Bootloader, version 2 (ARM UEFI version)
 grub-efi-arm-bin - GRand Unified Bootloader, version 2 (ARM UEFI binaries)
 grub-efi-arm-dbg - GRand Unified Bootloader, version 2 (ARM UEFI debug files)
 grub-efi-arm64 - GRand Unified Bootloader, version 2 (ARM64 UEFI version)
 grub-efi-arm64-bin - GRand Unified Bootloader, version 2 (ARM64 UEFI binaries)
 grub-efi-arm64-dbg - GRand Unified Bootloader, version 2 (ARM64 UEFI debug 
files)
 grub-efi-ia32 - GRand Unified Bootloader, version 2 (EFI-IA32 version)
 grub-efi-ia32-bin - GRand Unified Bootloader, version 2 (EFI-IA32 binaries)
 grub-efi-ia32-dbg - GRand Unified Bootloader, version 2 (EFI-IA32 debug files)
 

Bug#771852: package not installable due to postinst syntax error

2014-12-02 Thread Stefan Lippers-Hollmann
Package: mdadm
Version: 3.3.2-3
Severity: serious
Tags: patch

Hi

Installing mdadm 3.3.2-3 fails with the following error

Setting up mdadm (3.3.2-3) ...
W: mdadm: failed to load MD subsystem.
Generating mdadm.conf... done (failed to scan arrays; /proc probably not 
mounted).
rm: unrecognized option '--ignore-fail-on-non-empty'
Try 'rm --help' for more information.
dpkg: error processing package mdadm (--configure):
 subprocess installed post-installation script returned error exit status 1

as rm(1) doesn't support --ignore-fail-on-non-empty as parameter. 
However simply switching this to rmdir --ignore-fail-on-non-empty is
not successful either, as /var/lib/mdadm doesn't exist on systems where
mdadm hasn't been installed before (and rmdir 
--ignore-fail-on-non-empty does exit with an error code, if the 
directoy which it is supposed to remove doesn't exist). There are two
alternatives to fix this, either by ignoring all bugs from rmdir, e.g.

rmdir --ignore-fail-on-non-empty /var/lib/mdadm || :

or by checking if the directory in question exists beforehand.

--- mdadm-3.3.2/debian/mdadm.postinst
+++ mdadm-3.3.2/debian/mdadm.postinst
@@ -100,7 +100,9 @@
 
 if dpkg --compare-versions $2 le 3.3.2-1; then
   rm -f /var/lib/mdadm/CONF-UNCHECKED /var/lib/mdadm/mdadm.conf-generated
-  rm --ignore-fail-on-non-empty /var/lib/mdadm
+  if [ -d /var/lib/mdadm ]; then
+rmdir --ignore-fail-on-non-empty /var/lib/mdadm
+  fi
 fi
 ;;
 esac

Regards
Stefan Lippers-Hollmann

-- System Information:
Debian Release: 8.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.18.0-rc7-aptosid-amd64 (SMP w/8 CPU cores; PREEMPT)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


signature.asc
Description: This is a digitally signed message part.


Bug#767367: nvidia-opencl-icd dependencies

2014-12-02 Thread Rebecca N. Palmer

what would happen to
an Nvidia-hardware-only system with nvidia kernel module (which
blacklists the nouveau kernel module) + nouveau graphics userspace,
which under [nvidia-kernel-dkms Recommends: nvidia-driver | libcuda1]
would be the result of trying to install OpenCL on
a previously nouveau-using system.


Did you test this (i.e. apt-get install nvidia-opencl-icd libcuda1 
with Nvidia hardware but no already-installed *nvidia* packages)? 
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751082#27 suggests the 
result is no graphics.


(Having it be a Recommends: nvidia-driver rather than a hard Depends 
already allows the headless GPGPU case, and cutting nvidia-opencl-icd 
- libcuda1 is enough to fix the original accidental nvidia-opencl-icd 
on inappropriate hardware problem.)



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771794: pip silently removes/updates system provided python packages

2014-12-02 Thread Scott Kitterman
On Tuesday, December 02, 2014 04:15:05 PM Donald Stufft wrote:
...
 I have another question. If we fix this in the upcoming pip 6 release what
 is the chances of getting an exception for pip 6 in the freeze? If I can
 solve the problem in pip proper and keep the delta between different
 platforms smaller I can juggle around priorities and push the other big
 ticket thing I was working on till another release.
...
The deadline for getting Important (i.e. not Serious/Grave/Critical) bug fixes 
unblocked for Jessie is December 5th (that's uploaded to Debian and the 
release team has reviewed and unblocked it).

Unless the next release is ~nothing but fixes for important/release critical 
bugs, the chance is approximately zero.

Scott K


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#750521: acknowledgement of reception of RC bug report in scim from Debian maintainer

2014-12-02 Thread Daniel Kahn Gillmor
Control: tags 750521 + upstream
Control: forwarded 750521 https://bugs.g10code.com/gnupg/issue1777

Hi Rolf--

On 12/02/2014 12:26 PM, Rolf Leggewie wrote:
 Control: reassign -1 pinentry-gtk2
 
 On 03.12.2014 01:14, Rolf Leggewie wrote:
 yep, i think this report is specifically about something broken in the
 interaction between pinentry-gtk2 and scim.
 Yep, and it turns out to be a VERY old problem indeed (still reading up
 on it).  It's from at least 2007 or most likely even 2006!

 http://thread.gmane.org/gmane.comp.encryption.gpg.devel/14423
 https://bugzilla.novell.com/show_bug.cgi?id=330073

 The people at Novell came to the conclusion that the problem needs to be
 fixed in upstream pinentry-gtk-2.
 
 After reading through the gnupg-devel mailing list over on gmane.org,
 specifically
 http://thread.gmane.org/gmane.comp.encryption.gpg.devel/14423/focus=14461 I
 am reassigning this back to the pinentry package.  That thread has some
 indication that some work was done upstream but there is also an entry
 from 2009 indicating the problem is still present and that mail never
 received a response.

Thanks for doing the background research for this and reporting it here.
 I agree with the reassignment to pinentry-gtk2, and i've forwarded the
message to the upstream bugtracker.

Regards,

--dkg



signature.asc
Description: OpenPGP digital signature


Processed: Re: acknowledgement of reception of RC bug report in scim from Debian maintainer

2014-12-02 Thread Debian Bug Tracking System
Processing control commands:

 tags 750521 + upstream
Bug #750521 [pinentry-gtk2] scim-gtk-immodule breaks pinentry-gtk2 and impairs 
gnome-keyring
Added tag(s) upstream.
 forwarded 750521 https://bugs.g10code.com/gnupg/issue1777
Bug #750521 [pinentry-gtk2] scim-gtk-immodule breaks pinentry-gtk2 and impairs 
gnome-keyring
Set Bug forwarded-to-address to 'https://bugs.g10code.com/gnupg/issue1777'.

-- 
750521: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=750521
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771768: marked as done (antiword: CVE-2014-8123: buffer overflow of of atPPSlist[].szName[] )

2014-12-02 Thread Debian Bug Tracking System
Your message dated Tue, 2 Dec 2014 21:51:19 +
with message-id 20141202215119.ga17...@survex.com
and subject line Re: Bug#771768: antiword: CVE-2014-8123: buffer overflow of of 
atPPSlist[].szName[]
has caused the Debian Bug report #771768,
regarding antiword: CVE-2014-8123: buffer overflow of of atPPSlist[].szName[] 
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
771768: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771768
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Source: antiword
Version: 0.37-6
Severity: grave
Tags: security upstream patch

Hi,

the following vulnerability was published for antiword.

CVE-2014-8123[0]:
buffer overflow of atPPSlist[].szName[] 

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities  Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2014-8123
[1] https://bugzilla.redhat.com/show_bug.cgi?id=1169665
[2] http://seclists.org/oss-sec/2014/q4/870

Regards,
Salvatore
---End Message---
---BeginMessage---
Control: notfound -1 0.37-6
Control: found -1 0.37-1
Control: fixed -1 0.37-5

On Tue, Dec 02, 2014 at 08:59:28PM +, Olly Betts wrote:
 On Tue, Dec 02, 2014 at 08:35:40AM +0100, Salvatore Bonaccorso wrote:
  the following vulnerability was published for antiword.
  
  CVE-2014-8123[0]:
  buffer overflow of atPPSlist[].szName[] 
 
 We're actually already carrying a patch to address this buffer overflow
 - 10_fix_buffer_overflow_wordole_c.dpatch, added in 0.37-5 back in June
 2009:
 
 http://sources.debian.net/src/antiword/0.37-10/debian/patches/10_fix_buffer_overflow_wordole_c.patch/
 
 Reported in: https://bugs.debian.org/407015
 
 I'm not going to just close this though, as the check in our patch is
  but the new patch uses =.  I'll dig into if the equality
 condition results in an overflow, but the scope for exploiting this in
 Debian is going to be rather more limited than in upstream 0.37.

OK, reviewing the code, the  check we already have is fine - in fact
the new patch's check is one character too strict (but in a safe way).
Oldstable has 0.37-6, so this is already fixed in all supported Debian
versions.

I pinged carnil on IRC, and he said to just close if the patch we have
is enough.

Cheers,
Olly---End Message---


Bug#771794: pip silently removes/updates system provided python packages

2014-12-02 Thread Donald Stufft

 On Dec 2, 2014, at 4:47 PM, Scott Kitterman deb...@kitterman.com wrote:
 
 On Tuesday, December 02, 2014 04:15:05 PM Donald Stufft wrote:
 ...
 I have another question. If we fix this in the upcoming pip 6 release what
 is the chances of getting an exception for pip 6 in the freeze? If I can
 solve the problem in pip proper and keep the delta between different
 platforms smaller I can juggle around priorities and push the other big
 ticket thing I was working on till another release.
 ...
 The deadline for getting Important (i.e. not Serious/Grave/Critical) bug 
 fixes 
 unblocked for Jessie is December 5th (that's uploaded to Debian and the 
 release team has reviewed and unblocked it).
 
 Unless the next release is ~nothing but fixes for important/release critical 
 bugs, the chance is approximately zero.
 
 Scott K
 

This bug is marked “Serious” right? So if I understand correctly a new version
isn’t acceptable, even to fix a Serious issue, unless it only fixes items that
are allowed within whatever phase the release process is in?

---
Donald Stufft
PGP: 7C6B 7C5D 5E2B 6356 A926 F04F 6E3C BCE9 3372 DCFA


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: notfound 771768 in 0.37-6, found 771768 in 0.37-1, fixed 771768 in 0.37-5

2014-12-02 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 notfound 771768 0.37-6
Bug #771768 {Done: Olly Betts o...@survex.com} [src:antiword] antiword: 
CVE-2014-8123: buffer overflow of of atPPSlist[].szName[] 
No longer marked as found in versions antiword/0.37-6.
 found 771768 0.37-1
Bug #771768 {Done: Olly Betts o...@survex.com} [src:antiword] antiword: 
CVE-2014-8123: buffer overflow of of atPPSlist[].szName[] 
Marked as found in versions antiword/0.37-1 and reopened.
 fixed 771768 0.37-5
Bug #771768 [src:antiword] antiword: CVE-2014-8123: buffer overflow of of 
atPPSlist[].szName[] 
Marked as fixed in versions antiword/0.37-5.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
771768: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771768
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771794: pip silently removes/updates system provided python packages

2014-12-02 Thread Scott Kitterman
On Tuesday, December 02, 2014 04:54:37 PM Donald Stufft wrote:
  On Dec 2, 2014, at 4:47 PM, Scott Kitterman deb...@kitterman.com wrote:
  
  On Tuesday, December 02, 2014 04:15:05 PM Donald Stufft wrote:
  ...
  
  I have another question. If we fix this in the upcoming pip 6 release
  what
  is the chances of getting an exception for pip 6 in the freeze? If I can
  solve the problem in pip proper and keep the delta between different
  platforms smaller I can juggle around priorities and push the other big
  ticket thing I was working on till another release.
  
  ...
  The deadline for getting Important (i.e. not Serious/Grave/Critical) bug
  fixes unblocked for Jessie is December 5th (that's uploaded to Debian and
  the release team has reviewed and unblocked it).
  
  Unless the next release is ~nothing but fixes for important/release
  critical bugs, the chance is approximately zero.
  
  Scott K
 
 This bug is marked “Serious” right? So if I understand correctly a new
 version isn’t acceptable, even to fix a Serious issue, unless it only fixes
 items that are allowed within whatever phase the release process is in?

A new release would be acceptable if it only fixed release critical stuff.  The 
problem comes in where a new release fixes something serious and other stuff.

Scott K


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: closing 771768

2014-12-02 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 # Re-close, was re-opened by correcting found version
 close 771768
Bug #771768 [src:antiword] antiword: CVE-2014-8123: buffer overflow of of 
atPPSlist[].szName[] 
Marked Bug as done
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
771768: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771768
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#767564: marked as done (libblitz-doc: fails to upgrade from 'testing' - trying to overwrite /usr/share/info/blitz.info.gz)

2014-12-02 Thread Debian Bug Tracking System
Your message dated Tue, 02 Dec 2014 22:03:50 +
with message-id e1xvvxy-eo...@franck.debian.org
and subject line Bug#767564: fixed in blitz++ 1:0.10-3.2
has caused the Debian Bug report #767564,
regarding libblitz-doc: fails to upgrade from 'testing' - trying to overwrite 
/usr/share/info/blitz.info.gz
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
767564: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=767564
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: libblitz-doc
Version: 1:0.10-2
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package fails to upgrade from
'testing'.
It installed fine in 'testing', then the upgrade to 'sid' fails
because it tries to overwrite other packages files without declaring a
Breaks+Replaces relation.

See policy 7.6 at
http://www.debian.org/doc/debian-policy/ch-relationships.html#s-replaces

From the attached log (scroll to the bottom...):

  Selecting previously unselected package libblitz-doc.
  Preparing to unpack .../libblitz-doc_1%3a0.10-2_all.deb ...
  Unpacking libblitz-doc (1:0.10-2) ...
  dpkg: error processing archive 
/var/cache/apt/archives/libblitz-doc_1%3a0.10-2_all.deb (--unpack):
   trying to overwrite '/usr/share/info/blitz.info.gz', which is also in 
package libblitz0ldbl 1:0.10-1
  dpkg-deb: error: subprocess paste was killed by signal (Broken pipe)
  Errors were encountered while processing:
   /var/cache/apt/archives/libblitz-doc_1%3a0.10-2_all.deb


cheers,

Andreas


libblitz0ldbl=1%0.10-1_libblitz-doc=1%0.10-2.log.gz
Description: application/gzip
---End Message---
---BeginMessage---
Source: blitz++
Source-Version: 1:0.10-3.2

We believe that the bug you reported is fixed in the latest version of
blitz++, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 767...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jonathan Wiltshire j...@debian.org (supplier of updated blitz++ package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 02 Dec 2014 21:37:08 +
Source: blitz++
Binary: libblitz0ldbl libblitz0-dev libblitz-doc
Architecture: source all
Version: 1:0.10-3.2
Distribution: unstable
Urgency: medium
Maintainer: Debian Science Team 
debian-science-maintain...@lists.alioth.debian.org
Changed-By: Jonathan Wiltshire j...@debian.org
Description:
 libblitz-doc - C++ template class library for scientific computing
 libblitz0-dev - C++ template class library for scientific computing
 libblitz0ldbl - C++ template class library for scientific computing
Closes: 767564
Changes:
 blitz++ (1:0.10-3.2) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Add missing epoch to conflicts/replaces versions
 (really Closes: #767564)
Checksums-Sha1:
 7ebced68b148a24a82db07f925e0eff285d91b0d 2290 blitz++_0.10-3.2.dsc
 9f650a814eb5f4e4aca59cecec294c42c97f5f88 15368 blitz++_0.10-3.2.debian.tar.xz
 f40f95bca074223eaf6fc13c8513828418278c8d 876624 libblitz-doc_0.10-3.2_all.deb
Checksums-Sha256:
 bc598b559a01808c046cc00d4bcb38c7cf0c5ffcf50088b599d589cb3631aa58 2290 
blitz++_0.10-3.2.dsc
 550d1378ce408b41f8151e9e32ba00bbdc224f56caab1cb218e4e0a11c943a78 15368 
blitz++_0.10-3.2.debian.tar.xz
 26e3a72a4d2a35ab760a2a5400fda8f101d778d9cbeb761eece41f810f6351b2 876624 
libblitz-doc_0.10-3.2_all.deb
Files:
 df7b8e30dcd4c2c58bb0b33a3dd4af40 2290 devel optional blitz++_0.10-3.2.dsc
 eb3dbbe55d47868d27ac17894870ea89 15368 devel optional 
blitz++_0.10-3.2.debian.tar.xz
 c5f6317499043867031cafdace22041e 876624 doc optional 
libblitz-doc_0.10-3.2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIcBAEBAgAGBQJUfjUkAAoJEFC7AtTIpr9hYsMP/j8vp6dFZOeawXt8yN1XRoZt
BVJuyC2OkTZvXI+NHIskXiUvvlBMcN1MI4mo7pTaqfaOmj9O3sMP0xBj7NJqDvMS
qYfuR2BsF4OXWQhu77tdDpVE0Hvpa+TTYKxZzccgz+Spi06xgYFkXmijxWT+6gDc
6Ed5ZAZV/GQCW+tlNnMuwJUgwQhDbHjFT3VhOuYmmlNLM2z8NZYx8KIG7Xo5fkBt
9T8wiiKItoyhN2fwNdCcGbMNc1R0T6JWS2r6mEUaunRVmey8iFwxiC/AYj7zmXSr
L3zZK2t7l8oW3Lq5K2GFfzkSsjHetyTrxcZi9qKEIj7bJlsOiPb4Jcco97m0f+lZ
h1+DG+X0qP3FhqaCJvROkGdmSNBmdLlddYuAqI1GlNfrYaPwZMvuAEGESI/FNAah

Processed: retitle 771768 to antiword: CVE-2014-8123: buffer overflow of atPPSlist[].szName[]

2014-12-02 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 retitle 771768 antiword: CVE-2014-8123: buffer overflow of 
 atPPSlist[].szName[]
Bug #771768 {Done: Olly Betts o...@survex.com} [src:antiword] antiword: 
CVE-2014-8123: buffer overflow of of atPPSlist[].szName[] 
Changed Bug title to 'antiword: CVE-2014-8123: buffer overflow of 
atPPSlist[].szName[]' from 'antiword: CVE-2014-8123: buffer overflow of of 
atPPSlist[].szName[] '
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
771768: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771768
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771794: pip silently removes/updates system provided python packages

2014-12-02 Thread Donald Stufft

 On Dec 2, 2014, at 5:03 PM, Scott Kitterman deb...@kitterman.com wrote:
 
 On Tuesday, December 02, 2014 04:54:37 PM Donald Stufft wrote:
 On Dec 2, 2014, at 4:47 PM, Scott Kitterman deb...@kitterman.com wrote:
 
 On Tuesday, December 02, 2014 04:15:05 PM Donald Stufft wrote:
 ...
 
 I have another question. If we fix this in the upcoming pip 6 release
 what
 is the chances of getting an exception for pip 6 in the freeze? If I can
 solve the problem in pip proper and keep the delta between different
 platforms smaller I can juggle around priorities and push the other big
 ticket thing I was working on till another release.
 
 ...
 The deadline for getting Important (i.e. not Serious/Grave/Critical) bug
 fixes unblocked for Jessie is December 5th (that's uploaded to Debian and
 the release team has reviewed and unblocked it).
 
 Unless the next release is ~nothing but fixes for important/release
 critical bugs, the chance is approximately zero.
 
 Scott K
 
 This bug is marked “Serious” right? So if I understand correctly a new
 version isn’t acceptable, even to fix a Serious issue, unless it only fixes
 items that are allowed within whatever phase the release process is in?
 
 A new release would be acceptable if it only fixed release critical stuff.  
 The 
 problem comes in where a new release fixes something serious and other stuff.
 
 Scott K

Ok, so anything from upstream will need to be backported to 1.5.x then, which
might be a pain but I don’t think undoable. We reorganized some stuff but it
shouldn’t be impossible.

Would a patch for this issue need to be done and uploaded and unblocked by the
Dec 5th? Or Since it’s a “Serious” issue is there a longer deadline?

What’s the chances of accepting the status quo for Jessie and having an upstream
fix in Jessie+1? This isn’t a *new* problem, it exists in stable and oldstable
as well and it wasn’t unknown to be a problem previously (there’s another ticket
about making —user the default in BTS which references this fact over a year 
ago).
I’m not sure what would make it all of a sudden a dire problem in Jesse, so if 
we
can wait till Jesse+1 and I can get a stakeholder to sit down with me and sort
out what a solution *needs* from the Debian side of things I can make sure a
fix does land in the next pip release which will be out far in advance of 
Jessie+1.

---
Donald Stufft
PGP: 7C6B 7C5D 5E2B 6356 A926 F04F 6E3C BCE9 3372 DCFA


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771126: Bug#771191: Bug#771126: libav/tests/lena.pnm: also not mentioned in debian/copyright

2014-12-02 Thread Bastien ROUCARIES
Le 2 déc. 2014 14:15, Reinhard Tartler siret...@gmail.com a écrit :

 On Fri, Nov 28, 2014 at 1:34 AM, Niels Thykier ni...@thykier.net wrote:
  Control: tags -1 -wheezy-ignore
 
  On 2014-11-27 23:23, Jonas Smedegaard wrote:
  Quoting Niels Thykier (2014-11-27 22:14:25)
  [...]
 
  In prior similar bugreport https://bugs.debian.org/760171#10 -
  referenced from https://bugs.debian.org/771191#10 - distribution is
  documented as permitted only for research and education which I
  interpret as unacceptable for Debian.
 
  [...]
 
   - Jonas
 

 FTR, this whole business feel incredibly silly. lena.pnm  has become
 the *de-facto* standard image for every CS student to do his graphics
 courses homework on, and is generally considered to public domain,

And offencive (sexist) for 50% of the population the women...

Bastien
 even without proper documentation. The copyright holder is going to
 have a very hard time enforcing his right if he wanted to prevent
 distribution of the image, in particular the low-quality scan that is
 being used in the Libav source package. Also, even according to
 https://en.wikipedia.org/wiki/File:Lenna.png#Licensing, the holder is
 not interested in that to begin with. - I mean, really, don't we have
 more important things to do?

 Nevertheless, lena.pnm lacks proper licensing and some argue it
 violates the DFSG, so I've taken the effort (and ridicule!) to replace
 lena.pnm upstream with a new image reference.pnm, which I have
 personally taken this summer and upon Jonas' suggestion provide it
 under the expat license. This required to update all test reference
 patterns, which took  most of the effort and is basically not
 verifiable.

 Jonas, would you mind taking over from here and upload
 https://libav.org/releases/libav-11.1.tar.xz

 to unstable?

 Otherwise I can see if I can get to that this weekend.

 Regarding stable: I've backported this change back to release/0.8
 upstream. In the past, the security team has accepted libav point
 releases in wheezy-security, and I trust that this is also an
 acceptable change. It will be part of the next upload to
 stable-security. (this may take some more weeks, as libav has been
 notified about a couple of more CVEs, which need to be tested, fixed
 and verified, which is incredibly laborsome to do correctly).

 Does this plan work for everyone?

 --
 regards,
 Reinhard



Processed: severity postgres

2014-12-02 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 770941 wishlist
Bug #770941 [nova-common] nova-common - Overrides database config in nova.conf
Severity set to 'wishlist' from 'serious'
 severity 770944 wishlist
Bug #770944 [neutron-common] Overrides database config in nova.conf
Severity set to 'wishlist' from 'serious'

End of message, stopping processing here.

Please contact me if you need assistance.
-- 
770941: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770941
770944: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770944
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771647: marked as done (libphobos-4.9-dev and libphobos-4.8-dev: error when trying to install together)

2014-12-02 Thread Debian Bug Tracking System
 - Runtime library for GNU Objective-C applications (x32 debug 
symbo
 libx32quadmath0 - GCC Quad-Precision Math Library (x32)
 libx32quadmath0-dbg - GCC Quad-Precision Math Library (x32 debug symbols)
 libx32stdc++-4.9-dev - GNU Standard C++ Library v3 (development files)
 libx32stdc++6 - GNU Standard C++ Library v3 (x32)
 libx32stdc++6-4.9-dbg - GNU Standard C++ Library v3 (debugging files)
 libx32ubsan0 - UBSan -- undefined behaviour sanitizer (x32)
 libx32ubsan0-dbg - UBSan -- undefined behaviour sanitizer (x32 debug symbols)
Closes: 770843 771647 771654
Changes:
 gcc-4.9 (4.9.2-5) unstable; urgency=medium
 .
   * Update to SVN 20141202 (r218271) from the gcc-4_9-branch.
 - Fix PR middle-end/64111 (ice), PR ipa/63551 (wrong code).
   PR libstdc++/64102 (closes: #770843), PR target/64115 (powerpc).
   * Move libphobos2.a into the gcc_lib_dir. Closes: #771647.
   * Fix typo in last powerpcspe patch. Closes: #771654.
Checksums-Sha1:
 e8dfed0bd4887520a7f54de69aa60d4d79a1a405 18578 gcc-4.9_4.9.2-5.dsc
 2818bce8a8a8deddbcfca65a3307abad0dc42a49 815734 gcc-4.9_4.9.2-5.diff.gz
 9c35e9d353eaaa457ba0dbe3d5cc22fa9c7e1aeb 74263496 
gcc-4.9-source_4.9.2-5_all.deb
 65a500b9f43f364272e6d5786c2fab8061af8b12 10349114 
gcj-4.9-jre-lib_4.9.2-5_all.deb
 674f4594a04b403a9d6a04ff29521e5814b03b95 11661592 
gcj-4.9-source_4.9.2-5_all.deb
 b8e6a05383146685f3fec28a3b1fa0d454e411d5 18873500 libgcj-doc_4.9.2-5_all.deb
 ae3be66c3535455599a8da810276ff2d0b1c0178 8050176 
libstdc++-4.9-doc_4.9.2-5_all.deb
 b53ee012d911953736bdcbdb43a61de30d7eab42 1443908 
gcc-4.9-locales_4.9.2-5_all.deb
 feae279292a356aa45b80be5beee498c07b1ecb4 159090 gcc-4.9-base_4.9.2-5_amd64.deb
 e2c3782a8749cef9d8a399a06f689d9418bcb65e 39472 libgcc1_4.9.2-5_amd64.deb
 b664b84cb6fbc34b927efc8ac260e3002be0 85402 libgcc1-dbg_4.9.2-5_amd64.deb
 02479316a70debeb9056518efe1f71ecd353c08b 2066900 
libgcc-4.9-dev_4.9.2-5_amd64.deb
 59f12ca2ccb5eb81b8a0aa940e87959db490909f 47936 lib32gcc1_4.9.2-5_amd64.deb
 bef05a0cb666a89dae81f2d52ac85f8da606a6bf 84388 lib32gcc1-dbg_4.9.2-5_amd64.deb
 46114f632992259a89cd8dcadd23d0e2de6e4121 1913526 
lib32gcc-4.9-dev_4.9.2-5_amd64.deb
 0859123df9f25d35bcb38a41c88fe32117a0c4c4 38662 libx32gcc1_4.9.2-5_amd64.deb
 13a1deff5fcf0663148fc3c3f1b9a42826422d07 83210 libx32gcc1-dbg_4.9.2-5_amd64.deb
 95450dfcba52682947b9b047136fe8380939ea6d 1777660 
libx32gcc-4.9-dev_4.9.2-5_amd64.deb
 f52f53325d7565bea0913a0e56bf86faa4404d0c 129088 libquadmath0_4.9.2-5_amd64.deb
 e5d1d6d50c99c0943c2cc8375c842a1cb4430aad 146590 
libquadmath0-dbg_4.9.2-5_amd64.deb
 df4552623f6168fd130f3a6dec6ba3365846b561 193288 
lib32quadmath0_4.9.2-5_amd64.deb
 ca13d91eabe78c260743410ed12e4d4509425c2c 154124 
lib32quadmath0-dbg_4.9.2-5_amd64.deb
 a1b7cd06ce7c34185daa071a695c8c8d2053257d 131840 
libx32quadmath0_4.9.2-5_amd64.deb
 f4e1a03f3a419c68ebcda22cbc2a82670c3395fe 149660 
libx32quadmath0-dbg_4.9.2-5_amd64.deb
 5da876c2ab68ef7ee89dfbd3ca523d6951417f40 37818 libgomp1_4.9.2-5_amd64.deb
 d39bc6708c84031ba6affda9569d2e67552a58bd 86400 libgomp1-dbg_4.9.2-5_amd64.deb
 7dd679d942baddbaa4b5188ea8ed02cb874256c2 40398 lib32gomp1_4.9.2-5_amd64.deb
 45b31dd433449882eabca867935479f700f433e9 84492 lib32gomp1-dbg_4.9.2-5_amd64.deb
 e5479d84eb020c7c34bc906d7a68658b56d8fcd9 36956 libx32gomp1_4.9.2-5_amd64.deb
 62fc55bd4d84508b1c0daebea7ce8e10afca1f3b 84112 
libx32gomp1-dbg_4.9.2-5_amd64.deb
 938ff953d12e9f4ab6ee4f406a2cb0f3ee659ac8 29226 libitm1_4.9.2-5_amd64.deb
 255996b75eb793cdbee3cfa7e963b8cb02ee7005 191260 libitm1-dbg_4.9.2-5_amd64.deb
 57205aba42994ffc31eb7c37e2f9b9a80d8745f9 31294 lib32itm1_4.9.2-5_amd64.deb
 efe007bfd794d2dc66bfb61e539b9262fa6be0c2 183346 lib32itm1-dbg_4.9.2-5_amd64.deb
 b0a0d62e105c0fd371ddc0ddb71a460d407890ba 28708 libx32itm1_4.9.2-5_amd64.deb
 f15143609109a1ed3562b4d730a268905b3c36b1 181188 
libx32itm1-dbg_4.9.2-5_amd64.deb
 6fa074a95ac536f924ff0103f2eac3ed6b245a39 9002 libatomic1_4.9.2-5_amd64.deb
 b172bd530e62fd68fe6fc9ec783d2b9b4f982bf3 16054 libatomic1-dbg_4.9.2-5_amd64.deb
 fdcd3f3e31500edd40431cab2e9b585a2dffd5eb 8612 lib32atomic1_4.9.2-5_amd64.deb
 3967e8ab25d78d7fe2c298b28d0c8644d9d36ac4 13462 
lib32atomic1-dbg_4.9.2-5_amd64.deb
 1d6f09ba4addda3fe6be2c7411acd960eb5b38f1 8986 libx32atomic1_4.9.2-5_amd64.deb
 4ccd59f3377044cd897b02d6b5ea6b92799df0b6 15560 
libx32atomic1-dbg_4.9.2-5_amd64.deb
 0148699f1fd838d1bd8a0ece7f4f8ca212498453 5164474 cpp-4.9_4.9.2-5_amd64.deb
 979320467294b6917af3916532edbbb9cff81708 58026 fixincludes_4.9.2-5_amd64.deb
 c0040210669167c1c46c2f5b822f4de75cab8aae 972 
gobjc++-4.9-multilib_4.9.2-5_amd64.deb
 83a745aba1dbe4e6656d1b865136335790256ee6 5400462 gobjc++-4.9_4.9.2-5_amd64.deb
 e8f0954ee11acb2a4149d7047e2a8c0980193935 978 
gobjc-4.9-multilib_4.9.2-5_amd64.deb
 57579325e1dfc7e02c6d212b746b2befe8520cb2 4990508 gobjc-4.9_4.9.2-5_amd64.deb
 cb29638107dc3a58892c44218835fe7849a9137d 112212 libobjc4_4.9.2-5_amd64.deb
 03c00d7b42e30a289dd97ef83cee41acdad27dee 207960 libobjc4-dbg_4.9.2-5_amd64.deb
 cb7f11cd2b755c802382a9883631752c713bb643

Bug#771794: pip silently removes/updates system provided python packages

2014-12-02 Thread Scott Kitterman
On Tuesday, December 02, 2014 05:17:48 PM Donald Stufft wrote:
  On Dec 2, 2014, at 5:03 PM, Scott Kitterman deb...@kitterman.com wrote:
  
  On Tuesday, December 02, 2014 04:54:37 PM Donald Stufft wrote:
  On Dec 2, 2014, at 4:47 PM, Scott Kitterman deb...@kitterman.com
  wrote:
  
  On Tuesday, December 02, 2014 04:15:05 PM Donald Stufft wrote:
  ...
  
  I have another question. If we fix this in the upcoming pip 6 release
  what
  is the chances of getting an exception for pip 6 in the freeze? If I
  can
  solve the problem in pip proper and keep the delta between different
  platforms smaller I can juggle around priorities and push the other big
  ticket thing I was working on till another release.
  
  ...
  The deadline for getting Important (i.e. not Serious/Grave/Critical) bug
  fixes unblocked for Jessie is December 5th (that's uploaded to Debian
  and
  the release team has reviewed and unblocked it).
  
  Unless the next release is ~nothing but fixes for important/release
  critical bugs, the chance is approximately zero.
  
  Scott K
  
  This bug is marked “Serious” right? So if I understand correctly a new
  version isn’t acceptable, even to fix a Serious issue, unless it only
  fixes
  items that are allowed within whatever phase the release process is in?
  
  A new release would be acceptable if it only fixed release critical stuff.
   The problem comes in where a new release fixes something serious and
  other stuff.
  
  Scott K
 
 Ok, so anything from upstream will need to be backported to 1.5.x then,
 which might be a pain but I don’t think undoable. We reorganized some stuff
 but it shouldn’t be impossible.
 
 Would a patch for this issue need to be done and uploaded and unblocked by
 the Dec 5th? Or Since it’s a “Serious” issue is there a longer deadline?
 
 What’s the chances of accepting the status quo for Jessie and having an
 upstream fix in Jessie+1? This isn’t a *new* problem, it exists in stable
 and oldstable as well and it wasn’t unknown to be a problem previously
 (there’s another ticket about making —user the default in BTS which
 references this fact over a year ago). I’m not sure what would make it all
 of a sudden a dire problem in Jesse, so if we can wait till Jesse+1 and I
 can get a stakeholder to sit down with me and sort out what a solution
 *needs* from the Debian side of things I can make sure a fix does land in
 the next pip release which will be out far in advance of Jessie+1.

Assuming the maintainer doesn't decide to downgrade the bug (which I think is 
unlikely and a number of people would object to, so I think we can ignore it 
as a possibility), the decision to ignore the bug for Jessie belongs with the 
release team.  If we choose not to fix it (and there's no Non-Maintainer 
Upload), then they will decide to either remove the package or ignore the bug.

Since this particular issue is release critical, the December 5th deadline 
isn't relevant to a targeted fix just for this issue.

Scott K


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771789: [pcp] Bug#771789: libpcp-pmda-perl: uninstallable on i386: depends on perlapi-5.18.2

2014-12-02 Thread Nathan Scott
Hi Jakub,

- Original Message -
 [...]
 The following packages have unmet dependencies:
  libpcp-pmda-perl : Depends: perlapi-5.18.2 but it is not installable
 E: Unable to correct problems, you have held broken packages.

Oh, I have an outdated perl installation here - have upgraded it now,
will be fixed by the next upload.  Thanks!

--
Nathan


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771461: /var/state/samhain/

2014-12-02 Thread Javier Fernández-Sanguino Peña
On Tue, Dec 02, 2014 at 01:23:13AM +0100, Andrea Claudi wrote:
 Hi,
 This patch should fix the problem, moving the non-volatile state for the 
 samhain package to /var/lib/samhain.

The patch creates the directory for new installations but it is worth
noticing that the /var/state/samhain/ contains valid information that
has to be preserved over upgrades (otherwise, the integrity database would be
regenerated and not kept).

 Please, tell me if I need to fix something to make this acceptable.

I'm committing your patch to Samhain's GIT but have made some adjustments. I
will test upgrades from previous versions and if all goes well I'll upload
a new package soon.

Regards

Javier


signature.asc
Description: Digital signature


  1   2   >