Processed: severity of 780675 is important

2015-03-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 780675 important
Bug #780675 [systemd] systemd: segfault in systemd when running systemctl 
daemon-reload
Severity set to 'important' from 'critical'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
780675: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780675
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: tagging 780703

2015-03-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 780703 + pending
Bug #780703 [src:eclipse-pydev] eclipse-pydev fails to build from source
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
780703: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780703
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: your mail

2015-03-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 780565 grave
Bug #780565 [capnproto] capnproto: CVE-2015-2310: Integer overflow in pointer 
validation
Severity set to 'grave' from 'critical'
> severity 780566 grave
Bug #780566 [capnproto] capnproto: CVE-2015-2311: Integer underflow in pointer 
validation
Severity set to 'grave' from 'critical'
> severity 780567 grave
Bug #780567 [capnproto] capnproto: CVE-2015-2312: CPU usage amplification attack
Severity set to 'grave' from 'critical'
> severity 780568 grave
Bug #780568 [capnproto] capnproto: CVE-2015-2313: CPU usage amplification 
attack #2
Severity set to 'grave' from 'critical'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
780565: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780565
780566: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780566
780567: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780567
780568: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780568
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#780703: eclipse-pydev fails to build from source

2015-03-17 Thread Matthias Klose
Package: src:eclipse-pydev
Version: 3.9.2-1
Severity: serious
Tags: sid stretch

see the debian buildds for the binary-arch build failures,

for the binary-indep build failure see
https://launchpad.net/ubuntu/+source/eclipse-pydev/3.9.2-1

BUILD FAILED
/usr/lib/eclipse/dropins/sdk/plugins/org.eclipse.pde.build_3.8.1.dist/scripts/build.xml:35:
The following error occurred while executing this line:
/usr/lib/eclipse/dropins/sdk/plugins/org.eclipse.pde.build_3.8.1.dist/scripts/build.xml:91:
The following error occurred while executing this line:
/usr/lib/eclipse/dropins/sdk/plugins/org.eclipse.pde.build_3.8.1.dist/templates/package-build/customTargets.xml:19:
The following error occurred while executing this line:
/usr/lib/eclipse/dropins/sdk/plugins/org.eclipse.pde.build_3.8.1.dist/scripts/genericTargets.xml:111:
Processing inclusion from feature org.python.pydev.feature: Bundle
org.python.pydev.jython_3.9.2.dist failed to resolve.:
Missing required plug-in org.python_0.0.0.


Total time: 2 seconds
An error has occurred. See the log file


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#775733: xemacs21-gnome-*: hangs during upgrade from squeeze -> wheezy -> jessie

2015-03-17 Thread Andreas Beckmann
On 2015-03-17 11:21, Mark Brown wrote:
> OK, thanks for the command lines.  How about the analysis for the patch?
> I'm not keen on just applying random changes without understanding.

The Conflicts against the old transitional packages ensure they get
removed before the new versions are unpacked.

Circular package dependencies are problematic, since they need to be
broken arbitrarily to form a dag in order to perform topsort to get a
possible package configuration order.
circular deps often exhibit problems during upgrades in some corner
cases - recently the ancient one between perl and perl-modules removed
since it caused upgrade issues (reproducible ones, but there were
probably a lot of spurious ones in the past).
Since there are at least 2 points where the dependency can be broken, a
subtle change in the system can cause apt to do the break elsewhere -
maybe doing a much worse decision than before.

As I understood #735268, the strict dependency xemacs21-support ->
xemacs21 is no longer needed, so I removed that as well to break the
circular dependency and always have a deterministic configuration order
of the xemacs21 packages - that would simplify further debugging (which
luckily was not needed). All xemacs21* packages passed my piuparts tests
after applying this patch - no more hangs :-)

Hope that helps.


Andreas


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#780139: marked as done (CVE-2015-0885)

2015-03-17 Thread Debian Bug Tracking System
Your message dated Tue, 17 Mar 2015 22:17:05 +
with message-id 
and subject line Bug#780139: fixed in checkpw 1.02-1+deb7u1
has caused the Debian Bug report #780139,
regarding CVE-2015-0885
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
780139: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780139
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: checkpw
Severity: grave
Tags: security

Hi Gerrit,
please see
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0885
(feel free to lower the severity, I don't know checkpw myself)

I'm attaching a cleaned-up diff between the 1.03 and 1.02 releases.

Cheers,
Moritz
diff -Naur checkpw-1.02/checkapoppw.c checkpw-1.03/checkapoppw.c
--- checkpw-1.02/checkapoppw.c	2002-01-07 08:25:10.0 +0100
+++ checkpw-1.03/checkapoppw.c	2015-02-21 00:42:57.0 +0100
@@ -85,7 +85,7 @@
 pw = getpwnam(login);
 if (pw) break;
 if (errno == error_txtbsy) die(111);
-for (; ext != login && *ext != '-'; --ext);
+do {--ext;} while (ext != login && *ext != '-');
 if (ext == login) die(1);
 if (i) login[i] = '-';
 i = ext - login;
diff -Naur checkpw-1.02/checkpw.c checkpw-1.03/checkpw.c
--- checkpw-1.02/checkpw.c	2002-01-07 08:23:51.0 +0100
+++ checkpw-1.03/checkpw.c	2015-02-21 00:42:33.0 +0100
@@ -71,7 +71,7 @@
 pw = getpwnam(login);
 if (pw) break;
 if (errno == error_txtbsy) die(111);
-for (; ext != login && *ext != '-'; --ext);
+do {--ext;} while (ext != login && *ext != '-');
 if (ext == login) die(1);
 if (i) login[i] = '-';
 i = ext - login;
--- End Message ---
--- Begin Message ---
Source: checkpw
Source-Version: 1.02-1+deb7u1

We believe that the bug you reported is fixed in the latest version of
checkpw, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 780...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso  (supplier of updated checkpw package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 16 Mar 2015 13:20:09 +0100
Source: checkpw
Binary: checkpw
Architecture: source amd64
Version: 1.02-1+deb7u1
Distribution: wheezy-security
Urgency: high
Maintainer: Gerrit Pape 
Changed-By: Salvatore Bonaccorso 
Description: 
 checkpw- checks password which is stored in ~/Maildir/.password
Closes: 780139
Changes: 
 checkpw (1.02-1+deb7u1) wheezy-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * CVE-2015-0885: Fix denial of service via -- in usernames (Closes: #780139)
Checksums-Sha1: 
 e0eeb81fd87be9aba1148d70ca359d4dfc2f215a 1592 checkpw_1.02-1+deb7u1.dsc
 6a290aedf75f34401efc329c9eb1eb650e3181df 28631 checkpw_1.02.orig.tar.gz
 0f68be23961de2f489ceaeb3b8276124b45dbcd0 6867 checkpw_1.02-1+deb7u1.diff.gz
 4fef9a749cb0a99bb97cb4aea8b56015c947f91d 19572 checkpw_1.02-1+deb7u1_amd64.deb
Checksums-Sha256: 
 b96dcacae34fd526b84e437f41465cfa1505fa58c201e0c7004ebc514f9ef63b 1592 
checkpw_1.02-1+deb7u1.dsc
 685a7fd4f4c783d0dcee342d109b0e492d3251e3c0cbc0ef77d33613cac6bced 28631 
checkpw_1.02.orig.tar.gz
 d3fb6b5c43d0728c691997000e848c51b6a406fb7e817dca986ddda4992d0478 6867 
checkpw_1.02-1+deb7u1.diff.gz
 2fc5946c28e5dba5b117fcb1b9978b377115b20397db07bf5eb26b418e7bc612 19572 
checkpw_1.02-1+deb7u1_amd64.deb
Files: 
 251c2ce9afa9eae7318cfeb182c9cedb 1592 mail optional checkpw_1.02-1+deb7u1.dsc
 0f71643b3e4f6b856f44d1fedd6ceb38 28631 mail optional checkpw_1.02.orig.tar.gz
 8c25c507688045224ad4713129f880d5 6867 mail optional 
checkpw_1.02-1+deb7u1.diff.gz
 09e9c6b8aa22bf0549e3e5e4d32e143f 19572 mail optional 
checkpw_1.02-1+deb7u1_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIcBAEBCgAGBQJVBs1KAAoJEAVMuPMTQ89EeKYP/0Jj65jWl2AWPM4OrtaBJ1jR
iI0avosHvpFtqmVdPgrS8VQjFwjvIfJb1x2QoQDro/S16RZEcv1avLfkak3XG/3k
hL6KI2A6KDxmpCQlNCDfaYEv14zeopu44v/ju+x3DmiqlpCpFjdV4Q6x0SI4xCad
A1VXlPiCJEupFq3nQ0TiR8BD95qLe0GFfZB6Flz2HAAP3oszVyEnqIPo98ysIohA
8LP8ji83SLbT74k8v3cC1HOCL2nNJLXz/w9/AMs+HSCmpFpxAy7Kx23wRgvwSEB7
Gwd+BoD+JJV3e4UUqKXeWPIAkbmvDZEnOzbkyBt+XK/Uqi0CQF6+LpZC3VkFI3s7
+CCJYvT44oYdD4EZmEz2e1EpuPDEic1aZFykENYDT0f6KaqJ564gt8n2cTk

Bug#780410: marked as done (osc: CVE-2015-0778: osc _service file shell injection flaw)

2015-03-17 Thread Debian Bug Tracking System
Your message dated Tue, 17 Mar 2015 22:18:15 +
with message-id 
and subject line Bug#780410: fixed in osc 0.134.1-2+deb7u1
has caused the Debian Bug report #780410,
regarding osc: CVE-2015-0778: osc _service file shell injection flaw
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
780410: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780410
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: osc
Version: 0.134.1-1
Severity: grave
Tags: security upstream patch fixed-upstream

Hi,

the following vulnerability was published for osc. Note that I have
choosen severity grave since it allows client side arbitrary command
execution via a crafted service file, but I don't know osc well
enough, so please adjust severity if you disagree.

CVE-2015-0778[0]:
shell command injection via crafted _service files

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2015-0778
[1] https://bugzilla.novell.com/show_bug.cgi?id=901643
[2] https://bugzilla.novell.com/attachment.cgi?id=626334

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: osc
Source-Version: 0.134.1-2+deb7u1

We believe that the bug you reported is fixed in the latest version of
osc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 780...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michal Čihař  (supplier of updated osc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 17 Mar 2015 09:19:04 +0100
Source: osc
Binary: osc
Architecture: source all
Version: 0.134.1-2+deb7u1
Distribution: stable
Urgency: high
Maintainer: Michal Čihař 
Changed-By: Michal Čihař 
Description: 
 osc- OpenSUSE (buildsystem) commander
Closes: 780410
Changes: 
 osc (0.134.1-2+deb7u1) stable; urgency=high
 .
   * Fix shell injection (Closes: #780410, CVE-2015-0778).
Checksums-Sha1: 
 a12360403780bd1c7a95533a91bcc89a0edaf931 1981 osc_0.134.1-2+deb7u1.dsc
 1af7a5b96131b0fbe2e928a2eb4fe1d9becfa5b7 5761 
osc_0.134.1-2+deb7u1.debian.tar.gz
 69266de67a7fbfcbb4f872aaa1bdcfddc1f7b96c 226038 osc_0.134.1-2+deb7u1_all.deb
Checksums-Sha256: 
 aaa45062a5f3f2daecbdb6f1d3b55a91f6352f38b66a0d5eace5c2108ef370d3 1981 
osc_0.134.1-2+deb7u1.dsc
 bd9748dfd288f900f880b610cf8ec6269f85d70fd13639c2317f88db355b0e52 5761 
osc_0.134.1-2+deb7u1.debian.tar.gz
 e45220dd342aca140dca1e55590895abc17510e23745f95fcd0db8e871b85442 226038 
osc_0.134.1-2+deb7u1_all.deb
Files: 
 245ca1c949a159360b98d53f4d82840f 1981 devel extra osc_0.134.1-2+deb7u1.dsc
 cddf3dfe7118d7c29fa199a8b502be0e 5761 devel extra 
osc_0.134.1-2+deb7u1.debian.tar.gz
 09c34f3acc66bb1419fa6eb5fc47d145 226038 devel extra 
osc_0.134.1-2+deb7u1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=enQM
-END PGP SIGNATURE End Message ---


Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload

2015-03-17 Thread Michael Biebl
Am 17.03.2015 um 23:02 schrieb Robert Pumphrey:

> I have identified a duff init.d script (one of our own that previously
> worked in wheezy) that is at the root of this problem. I have removed
> the script, rebooted and the I can now run systemctl daemon-reload
> withough a seg fault.
> This bug may just indicate that systemd poorly handles a bad init
> script. Please let me know if you would like details of our broken
> script, otherwise, I am happy for this to be closed.

If you can share this init script, this would be appreciated.
systemd certainly shouldn't die because of such a faulty init script and
I'm actually surprised it does, since the SysV support is basically done
in an external generator. So there must be something very fishy with the
generated unit.

As said, if you can attach the faulty init script, that would be great.

Michael


-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload

2015-03-17 Thread Robert Pumphrey



On 17/03/15 21:07, Michael Biebl wrote:

Am 17.03.2015 um 19:35 schrieb Michael Biebl:

Am 17.03.2015 um 19:05 schrieb Robert Pumphrey:



#0  0x7f8d3e06779b in raise (sig=11) at
../nptl/sysdeps/unix/sysv/linux/pt-raise.c:37
 resultvar = 0
 pid = 
#1  0x7f8d3e4bd3d8 in ?? ()
No symbol table info available.
#2  
No locals.
#3  0x7f8d3e4422a0 in ?? ()
No symbol table info available.
#4  0x7f8d3e4f8caa in ?? ()
No symbol table info available.
#5  0x7f8d3e56777f in ?? ()
No symbol table info available.
#6  0x7f8d3e55f558 in ?? ()
No symbol table info available.
#7  0x7f8d3e4bac6b in ?? ()
No symbol table info available.
#8  0x7f8d3dcd0b45 in __libc_start_main (main=0x7f8d3e4b6dd0,
argc=1, argv=0x7ffd3c533ea8, init=, fini=,
rtld_fini=, stack_end=0x7ffd3c533e98)
 at libc-start.c:287
 result = 
 unwind_buf = {cancel_jmp_buf = {{jmp_buf = {0,
5361389912737802513, 140244612264611, 140725615541920, 0, 0,
-5360124553165444847, -5369135033269130991}, mask_was_saved = 0}}, priv
= {pad = {0x0, 0x0,
   0x7ffd3c533eb8, 0x7f8d3e4971a8}, data = {prev = 0x0,
cleanup = 0x0, canceltype = 1012088504}}}
 not_first_call = 
#9  0x7f8d3e4bb2cc in ?? ()
No symbol table info available.


Hm, nothing interesting/relevant in there. Almost as if the symbols do
not match the binary/core dump or the crash is not in systemd itself.


Do you have systemd-dbg installed?



I have identified a duff init.d script (one of our own that previously 
worked in wheezy) that is at the root of this problem. I have removed 
the script, rebooted and the I can now run systemctl daemon-reload 
withough a seg fault.
This bug may just indicate that systemd poorly handles a bad init 
script. Please let me know if you would like details of our broken 
script, otherwise, I am happy for this to be closed.


Thank you for your patience in helping me report this problem.


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload

2015-03-17 Thread Robert Pumphrey



On 17/03/15 21:07, Michael Biebl wrote:

Am 17.03.2015 um 19:35 schrieb Michael Biebl:

Am 17.03.2015 um 19:05 schrieb Robert Pumphrey:



#0  0x7f8d3e06779b in raise (sig=11) at
../nptl/sysdeps/unix/sysv/linux/pt-raise.c:37
 resultvar = 0
 pid = 
#1  0x7f8d3e4bd3d8 in ?? ()
No symbol table info available.
#2  
No locals.
#3  0x7f8d3e4422a0 in ?? ()
No symbol table info available.
#4  0x7f8d3e4f8caa in ?? ()
No symbol table info available.
#5  0x7f8d3e56777f in ?? ()
No symbol table info available.
#6  0x7f8d3e55f558 in ?? ()
No symbol table info available.
#7  0x7f8d3e4bac6b in ?? ()
No symbol table info available.
#8  0x7f8d3dcd0b45 in __libc_start_main (main=0x7f8d3e4b6dd0,
argc=1, argv=0x7ffd3c533ea8, init=, fini=,
rtld_fini=, stack_end=0x7ffd3c533e98)
 at libc-start.c:287
 result = 
 unwind_buf = {cancel_jmp_buf = {{jmp_buf = {0,
5361389912737802513, 140244612264611, 140725615541920, 0, 0,
-5360124553165444847, -5369135033269130991}, mask_was_saved = 0}}, priv
= {pad = {0x0, 0x0,
   0x7ffd3c533eb8, 0x7f8d3e4971a8}, data = {prev = 0x0,
cleanup = 0x0, canceltype = 1012088504}}}
 not_first_call = 
#9  0x7f8d3e4bb2cc in ?? ()
No symbol table info available.


Hm, nothing interesting/relevant in there. Almost as if the symbols do
not match the binary/core dump or the crash is not in systemd itself.


Do you have systemd-dbg installed?



Sorry for failing to follow simple instructions.
I have now installed systemd-dbg

#0  0x7f89d974f79b in raise (sig=11)
at ../nptl/sysdeps/unix/sysv/linux/pt-raise.c:37
resultvar = 0
pid = 
#1  0x7f89d9ba53d8 in crash.lto_priv.234 (sig=11) at 
../src/core/main.c:158
rl = {rlim_cur = 18446744073709551615, rlim_max = 
18446744073709551615}

sa = {__sigaction_handler = {sa_handler = 0x0, sa_sigaction = 0x0},
  sa_mask = {__val = {0 }}, sa_flags = 0,
  sa_restorer = 0x0}
__func__ = "crash"
__PRETTY_FUNCTION__ = "crash"
#2  
No locals.
#3  0x7f89d9b262e0 in ?? ()
No symbol table info available.
#4  0x7f89d9be0caa in bucket_hash () at ../src/shared/hashmap.c:168
p = 0x7f89da3efbe0
h = 0x7f89d9b0a860
#5  hashmap_remove (h=0x7f89d9b0a860, key=key@entry=0x7f89da3efbe0)
at ../src/shared/hashmap.c:574
e = 
data = 
#6  0x7f89d9c00f15 in set_remove (s=,
value=value@entry=0x7f89da3efbe0) at ../src/shared/set.c:75
No locals.
#7  0x7f89d9c4f77f in bidi_set_free (s=0x7f89d9b0a9a0, u=0x7f89da3efbe0)
at ../src/core/unit.c:372
d = 
i = 0x
other = 0x7f89da3efbe0
#8  unit_free (u=0x7f89da3efbe0) at ../src/core/unit.c:484
d = 
i = 0x
t = 
__PRETTY_FUNCTION__ = "unit_free"
#9  0x7f89d9c47558 in manager_clear_jobs_and_units.lto_priv.948 (
m=0x7f89da36e6a0) at ../src/core/manager.c:759
u = 
__PRETTY_FUNCTION__ = "manager_clear_jobs_and_units"
#10 0x7f89d9ba2c6b in manager_reload (m=0x7f89da36e6a0)
at ../src/core/manager.c:2413
q = 
fds = 
r = 0
f = 0x7f89da43a070
#11 main (argc=1, argv=) at ../src/core/main.c:1758
m = 0x7f89da36e6a0
r = 
retval = 1
before_startup = 
after_startup = 
timespan = 
"f\336\b`\330qX\034Q\343\061\256\272\343\222|s\302x\356.cx\204\221U_\025J=G\363BE\325\354/cx\204\060cx\204\221x\251ݹ\373\062\000\362?\355s\240sU\241\063S\247\273"

fds = 0x0
reexecute = false
shutdown_verb = 0x0
initrd_timestamp = {realtime = 0, monotonic = 0}
userspace_timestamp = {realtime = 1426610793563272,
  monotonic = 5250159}
kernel_timestamp = {realtime = , monotonic = 0}
security_start_timestamp = {realtime = 1426610793568857,
  monotonic = 5255744}
security_finish_timestamp = {realtime = 1426610793569662,
  monotonic = 5256549}
systemd = "systemd"
skip_setup = false
j = 
loaded_policy = 
arm_reboot_watchdog = false
queue_default_job = 
empty_etc = 
switch_root_dir = 0x0
switch_root_init = 0x0
__func__ = "main"
__PRETTY_FUNCTION__ = "main"





debsums indicates everything is operating as expected.
memtester has not yet thrown up any errors.


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#779081: open-vm-dkms: vmhfgs module fails to compile with kernel 3.2.65-1+deb7u2

2015-03-17 Thread Bernd Zeimetz
Hi,

too bad, seems the kernel maintainers backported some patches which break the
open-vm-tools-dkms modules in stable.

You have two options until I can fix the open-vm-tools package in stable:

- do not use the open-vm-tools-dkms package. Unless you are using vmware player
or need the old vmxnet module, chances are low you need it at all.

- use the open-vm-tools backport from wheezy-backports


I'll provide a fixed package with the upcoming point releases.

Cheers,

Bernd


-- 
 Bernd ZeimetzDebian GNU/Linux Developer
 http://bzed.dehttp://www.debian.org
 GPG Fingerprint: ECA1 E3F2 8E11 2432 D485  DD95 EB36 171A 6FF9 435F


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload

2015-03-17 Thread Michael Biebl
Am 17.03.2015 um 19:35 schrieb Michael Biebl:
> Am 17.03.2015 um 19:05 schrieb Robert Pumphrey:

>> #0  0x7f8d3e06779b in raise (sig=11) at
>> ../nptl/sysdeps/unix/sysv/linux/pt-raise.c:37
>> resultvar = 0
>> pid = 
>> #1  0x7f8d3e4bd3d8 in ?? ()
>> No symbol table info available.
>> #2  
>> No locals.
>> #3  0x7f8d3e4422a0 in ?? ()
>> No symbol table info available.
>> #4  0x7f8d3e4f8caa in ?? ()
>> No symbol table info available.
>> #5  0x7f8d3e56777f in ?? ()
>> No symbol table info available.
>> #6  0x7f8d3e55f558 in ?? ()
>> No symbol table info available.
>> #7  0x7f8d3e4bac6b in ?? ()
>> No symbol table info available.
>> #8  0x7f8d3dcd0b45 in __libc_start_main (main=0x7f8d3e4b6dd0,
>> argc=1, argv=0x7ffd3c533ea8, init=, fini=,
>> rtld_fini=, stack_end=0x7ffd3c533e98)
>> at libc-start.c:287
>> result = 
>> unwind_buf = {cancel_jmp_buf = {{jmp_buf = {0,
>> 5361389912737802513, 140244612264611, 140725615541920, 0, 0,
>> -5360124553165444847, -5369135033269130991}, mask_was_saved = 0}}, priv
>> = {pad = {0x0, 0x0,
>>   0x7ffd3c533eb8, 0x7f8d3e4971a8}, data = {prev = 0x0,
>> cleanup = 0x0, canceltype = 1012088504}}}
>> not_first_call = 
>> #9  0x7f8d3e4bb2cc in ?? ()
>> No symbol table info available.
> 
> Hm, nothing interesting/relevant in there. Almost as if the symbols do
> not match the binary/core dump or the crash is not in systemd itself.

Do you have systemd-dbg installed?



-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#778828: dmsetup: please add Breaks: live-tools (<< 4.0.1-1)

2015-03-17 Thread Bastian Blank
Control: severity -1 wishlist

On Fri, Feb 20, 2015 at 12:50:44PM +0100, Andreas Beckmann wrote:
> In order to ensure smooth upgrades from wheezy to jessie dmsetup needs
> to break the wheezy version of live-tools. live-tools/wheezy diverts
> update-initramfs in a way that breaks dmsetup's postinst. This is fixed
> in live-tools/jessie, so we just need to ensure that the new live-tools
> gets unpacked first.

Please remove the diversion first.  I don't think about adding this
conflict.

Bastian

-- 
What kind of love is that?  Not to be loved; never to have shown love.
-- Commissioner Nancy Hedford, "Metamorphosis",
   stardate 3219.8


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#778828: dmsetup: please add Breaks: live-tools (<< 4.0.1-1)

2015-03-17 Thread Debian Bug Tracking System
Processing control commands:

> severity -1 wishlist
Bug #778828 [dmsetup] dmsetup: please add Breaks: live-tools (<< 4.0.1-1)
Severity set to 'wishlist' from 'serious'

-- 
778828: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778828
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: tagging 776987

2015-03-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 776987 + help
Bug #776987 [libsqlcipher0] libsqlcipher0: change in VERSION affects code 
depending on SQLITE_VERSION_NUMBER
Added tag(s) help.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
776987: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776987
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#780439: tcl8.6: upgrade issues switching from tcl8.4/wheezy to tcl/jessie

2015-03-17 Thread Debian Bug Tracking System
Processing control commands:

> severity -1 normal
Bug #780439 [tcl8.6] tcl8.6: upgrade issues switching from tcl8.4/wheezy to 
tcl/jessie
Severity set to 'normal' from 'serious'

-- 
780439: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780439
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#780439: tcl8.6: upgrade issues switching from tcl8.4/wheezy to tcl/jessie

2015-03-17 Thread Julien Cristau
Control: severity -1 normal

On Fri, Mar 13, 2015 at 23:06:59 +0100, Andreas Beckmann wrote:

> Package: tcl8.6
> Version: 8.6.2+dfsg-1
> Severity: serious
> Tags: patch
> User: debian...@lists.debian.org
> Usertags: piuparts
> 
> Hi,
> 
> analyzing some piuparts logs in depth showed an issue with fsl being
> hold at the wheezy version rather than being upgraded.
> 
Andreas, please stop filing such bugs at RC severity.  A package being
held back on dist-upgrade is *not* serious.  A serious bug would be if
the upgrade *fails* for some reason.

Thanks,
Julien


signature.asc
Description: Digital signature


Bug#755202: [Pkg-utopia-maintainers] Bug#755202: network-manager: keeps creating and using new connection "eth0" that does not work

2015-03-17 Thread Michael Biebl
Am 13.03.2015 um 22:18 schrieb Stefano Zacchiroli:
> On Fri, Mar 13, 2015 at 10:06:42PM +0100, Michael Biebl wrote:
>> So, it would be immensly helpful, if someone can provide me with a
>> detailed description of his network setup (what interfaces are managed
>> by NetworkManager, what by ifupdown, what's the individual configuration
>> and available interfaces, etc.).
>> Then the exact circumstances, when this happens and if this happens
>> reliably and how it can be triggered.
> 
> Hey Michael, I've since then commented out the following lines in my
> /etc/network/interfaces:
> 
>   # # The primary network interface
>   # allow-hotplug eth0
>   # iface eth0 inet dhcp
>   # # This is an autoconfigured IPv6 interface
>   # iface eth0 inet6 auto
> 
> after doing that I've not been able to reproduce this bug.
> 
> Not sure if this info helps or not...
> 

Well, this sounds like you have an eth0 configuration, which is enabled
always, even if there is not link. Eventually, dhclient times out and
you get a link-local address and most likely, the default route is set
via eth0.

I don't see that as a bug in NM, or do you disagree?
On could argue, that this is a misconfiguration and you should use
ifplugd to activate your connection when a link is available, or teach
ifup to fail if there is no link (or simply use NM for eth0 as well).


Michael


-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#780255: openconnect: kmod update from version 18 to 20 breaks openconnect

2015-03-17 Thread Michael Biebl
Am 17.03.2015 um 19:58 schrieb Michael Biebl:
> On Wed, 11 Mar 2015 10:29:27 -0400 Mike Miller  wrote:
>> Control: reassign -1 kmod 20-1
>> Control: forcemerge 780256 -1
>>
>> On Wed, Mar 11, 2015 at 10:55:16 +0200, Matti Koskimies wrote:
>>> kmod update from version 18 to 20
>>>
>>> Connection failed with the error messages:
>>>
>>> TUNSETIFF failed: inappropriate ioctl for device
>>> set up tun device failed
>>
>> Confirmed, this is because kmod 20 no longer sets up the /dev/net/tun
>> device at init. See bugs #780256 and #780263.
>>
>> If you 'modprobe kmod' before attempting to run openconnect it works as
>> expected.
>>
>> Merging this into #780256.
> 
> This should actually only happen for users, which still use sysvinit,
> since the udev SysV init script doesn't deal with '!' syntax.
> 
> Matti is apparently using systemd as PID1.
> So either, he filed this bug on a different machine or this is a
> different bug.

I need to correct that.
While systemd-tmpfiles does indeed support the '!' syntax, in v215 it
doesn't yet call systemd-tmpfiles with the --boot parameter, which is
apparently necessary to allow that [1].

This means, we'll need to cherry-pick that commit and also fix the SysV
init script.

(Sorry for the confusion, I'm running the v219 package)


Michael

[1]
http://cgit.freedesktop.org/systemd/systemd/commit/?id=8c94052ee543c3598a3c7b0c46688150aa2c6168


-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#780256: Stopped auto-loading tun module

2015-03-17 Thread Michael Biebl
Am 17.03.2015 um 19:55 schrieb Michael Biebl:
> Hi Joachim,
> 
> On Wed, 11 Mar 2015 10:00:54 +0100 Joachim Breitner 
> wrote:
>> Package: kmod
>> Version: 20-1
>> Severity: normal
>>
>> Hi,
>>
>> yesterday I upgraded a few packages; today tinc (a VPN daemon) would not
>> start because /dev/net/tun was no longer available. A "modprobe tun"
>> would fix the problem.
>>
>> Since it worked before, and the only module-related upgrade wa kmod:
>> 2015-03-10 11:07:32 upgrade kmod:amd64 18-3 20-1
>> I am assuming something broke here.
>>
>> If this terse report is not sufficent to track down the problem, let me
>> know.
> 
>> Init: systemd (via /run/systemd/system)
> 
> This bug should not affect systems running systemd.
> Did you experience this issue on another system running sysvinit using
> the udev SysV init script?

I need to correct that.
While systemd-tmpfiles does indeed support the '!' syntax, in v215 it
doesn't yet call systemd-tmpfiles with the --boot parameter, which is
apparently necessary to allow that [1].

This means, we'll need to cherry-pick that commit and also fix the SysV
init script.

(Sorry for the confusion, I'm running the v219 package)

Michael

[1]
http://cgit.freedesktop.org/systemd/systemd/commit/?id=8c94052ee543c3598a3c7b0c46688150aa2c6168
-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#780680: libpam-modules: pam_userdb.so depends on a library in /usr

2015-03-17 Thread Adam Heath

package: libpam-modules
Version: 1.1.3-7.1
Severity: serious

A library in /lib shouldn't depend on a library in /usr/lib. However, 
pam_userdb.so has such an issue.


==
root@zoot:~# ldd /lib/x86_64-linux-gnu/security/pam_userdb.so
linux-vdso.so.1 (0x76081000)
libpam.so.0 => /lib/x86_64-linux-gnu/libpam.so.0 
(0x7f22218a3000)
libdb-5.1.so => /usr/lib/x86_64-linux-gnu/libdb-5.1.so 
(0x7f222152)
libcrypt.so.1 => /lib/x86_64-linux-gnu/libcrypt.so.1 
(0x7f22212e8000)

libc.so.6 => /lib/x86_64-linux-gnu/libc.so.6 (0x7f2220f3f000)
libdl.so.2 => /lib/x86_64-linux-gnu/libdl.so.2 (0x7f2220d3b000)
libpthread.so.0 => /lib/x86_64-linux-gnu/libpthread.so.0 
(0x7f2220b1d000)

/lib64/ld-linux-x86-64.so.2 (0x7f2221cc4000)
==

This problem also seems to still be around in version 1.1.8-3.1, which 
is in jessie.



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#780256: Stopped auto-loading tun module

2015-03-17 Thread Michael Biebl
Hi Joachim,

On Wed, 11 Mar 2015 10:00:54 +0100 Joachim Breitner 
wrote:
> Package: kmod
> Version: 20-1
> Severity: normal
> 
> Hi,
> 
> yesterday I upgraded a few packages; today tinc (a VPN daemon) would not
> start because /dev/net/tun was no longer available. A "modprobe tun"
> would fix the problem.
> 
> Since it worked before, and the only module-related upgrade wa kmod:
> 2015-03-10 11:07:32 upgrade kmod:amd64 18-3 20-1
> I am assuming something broke here.
> 
> If this terse report is not sufficent to track down the problem, let me
> know.

> Init: systemd (via /run/systemd/system)

This bug should not affect systems running systemd.
Did you experience this issue on another system running sysvinit using
the udev SysV init script?


-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#780255: openconnect: kmod update from version 18 to 20 breaks openconnect

2015-03-17 Thread Michael Biebl
On Wed, 11 Mar 2015 10:29:27 -0400 Mike Miller  wrote:
> Control: reassign -1 kmod 20-1
> Control: forcemerge 780256 -1
> 
> On Wed, Mar 11, 2015 at 10:55:16 +0200, Matti Koskimies wrote:
> > kmod update from version 18 to 20
> > 
> > Connection failed with the error messages:
> > 
> > TUNSETIFF failed: inappropriate ioctl for device
> > set up tun device failed
> 
> Confirmed, this is because kmod 20 no longer sets up the /dev/net/tun
> device at init. See bugs #780256 and #780263.
> 
> If you 'modprobe kmod' before attempting to run openconnect it works as
> expected.
> 
> Merging this into #780256.

This should actually only happen for users, which still use sysvinit,
since the udev SysV init script doesn't deal with '!' syntax.

Matti is apparently using systemd as PID1.
So either, he filed this bug on a different machine or this is a
different bug.

Michael


-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload

2015-03-17 Thread Michael Biebl
Am 17.03.2015 um 19:05 schrieb Robert Pumphrey:
> 
> 
> On 17/03/15 17:52, Michael Biebl wrote:
>> control: tags -1 moreinfo
>> control: tags -1 unreproducible
>>
>> Am 17.03.2015 um 18:14 schrieb Robert Pumphrey:
>>> Package: systemd
>>> Version: 215-12
>>> Severity: critical
>>> Justification: breaks the whole system
>>>
>>> Dear Maintainer,
>>>
>>> running systemctl daemon-reload causes systemd to segfault :
>>>
>>> root@host:~# systemctl daemon-reload
>>>
>>> Message from syslogd@host at Mar 17 16:41:53 ...
>>>   kernel:[  758.716467] systemd[1]: segfault at 7f8d3e4422a0 ip
>>> 7f8d3e4422a0 sp 7ffd3c533458 error 15
>>> Failed to execute operation: Connection reset by peer
>>>
>>> I have disabled as many services as possible, but still get the error.
>>> I have not been able to reproduce on another machine
>>
>> Can you reproduce the step, how you got this crash? Did this happen once
>> or multiple times?
> 
> This problem happens every time I run systemctl daemon-reload on this
> particular machine. I have installed jessie on another machine and not
> been able to reproduce it, but the hardware is not the same.
> 

Could you check for faulty RAM (with memtest) and run debsums over your
installed packages.


-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload

2015-03-17 Thread Michael Biebl
Am 17.03.2015 um 19:05 schrieb Robert Pumphrey:
> 
> 
> On 17/03/15 17:52, Michael Biebl wrote:
>> control: tags -1 moreinfo
>> control: tags -1 unreproducible
>>
>> Am 17.03.2015 um 18:14 schrieb Robert Pumphrey:
>>> Package: systemd
>>> Version: 215-12
>>> Severity: critical
>>> Justification: breaks the whole system
>>>
>>> Dear Maintainer,
>>>
>>> running systemctl daemon-reload causes systemd to segfault :
>>>
>>> root@host:~# systemctl daemon-reload
>>>
>>> Message from syslogd@host at Mar 17 16:41:53 ...
>>>   kernel:[  758.716467] systemd[1]: segfault at 7f8d3e4422a0 ip
>>> 7f8d3e4422a0 sp 7ffd3c533458 error 15
>>> Failed to execute operation: Connection reset by peer
>>>
>>> I have disabled as many services as possible, but still get the error.
>>> I have not been able to reproduce on another machine
>>
>> Can you reproduce the step, how you got this crash? Did this happen once
>> or multiple times?
> 
> This problem happens every time I run systemctl daemon-reload on this
> particular machine. I have installed jessie on another machine and not
> been able to reproduce it, but the hardware is not the same.

Even after you've rebooted?

> 
> #0  0x7f8d3e06779b in raise (sig=11) at
> ../nptl/sysdeps/unix/sysv/linux/pt-raise.c:37
> resultvar = 0
> pid = 
> #1  0x7f8d3e4bd3d8 in ?? ()
> No symbol table info available.
> #2  
> No locals.
> #3  0x7f8d3e4422a0 in ?? ()
> No symbol table info available.
> #4  0x7f8d3e4f8caa in ?? ()
> No symbol table info available.
> #5  0x7f8d3e56777f in ?? ()
> No symbol table info available.
> #6  0x7f8d3e55f558 in ?? ()
> No symbol table info available.
> #7  0x7f8d3e4bac6b in ?? ()
> No symbol table info available.
> #8  0x7f8d3dcd0b45 in __libc_start_main (main=0x7f8d3e4b6dd0,
> argc=1, argv=0x7ffd3c533ea8, init=, fini=,
> rtld_fini=, stack_end=0x7ffd3c533e98)
> at libc-start.c:287
> result = 
> unwind_buf = {cancel_jmp_buf = {{jmp_buf = {0,
> 5361389912737802513, 140244612264611, 140725615541920, 0, 0,
> -5360124553165444847, -5369135033269130991}, mask_was_saved = 0}}, priv
> = {pad = {0x0, 0x0,
>   0x7ffd3c533eb8, 0x7f8d3e4971a8}, data = {prev = 0x0,
> cleanup = 0x0, canceltype = 1012088504}}}
> not_first_call = 
> #9  0x7f8d3e4bb2cc in ?? ()
> No symbol table info available.

Hm, nothing interesting/relevant in there. Almost as if the symbols do
not match the binary/core dump or the crash is not in systemd itself.



-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload

2015-03-17 Thread Robert Pumphrey



On 17/03/15 17:52, Michael Biebl wrote:

control: tags -1 moreinfo
control: tags -1 unreproducible

Am 17.03.2015 um 18:14 schrieb Robert Pumphrey:

Package: systemd
Version: 215-12
Severity: critical
Justification: breaks the whole system

Dear Maintainer,

running systemctl daemon-reload causes systemd to segfault :

root@host:~# systemctl daemon-reload

Message from syslogd@host at Mar 17 16:41:53 ...
  kernel:[  758.716467] systemd[1]: segfault at 7f8d3e4422a0 ip 
7f8d3e4422a0 sp 7ffd3c533458 error 15
Failed to execute operation: Connection reset by peer

I have disabled as many services as possible, but still get the error.
I have not been able to reproduce on another machine


Can you reproduce the step, how you got this crash? Did this happen once
or multiple times?


This problem happens every time I run systemctl daemon-reload on this 
particular machine. I have installed jessie on another machine and not 
been able to reproduce it, but the hardware is not the same.





I have not been able to change the settings on this machine to allow 
daemon-reload to work

Once the segfault happens, systemd not longer responsds to systemctl status
Unable to get systemd back into a state where it will respond to systemctl 
status without a reboot

This has been triggered by attempting to upgrade some packages (eg. sudo) whose 
postrm script calls systemctl --system daemon-reload


If systemd dies, it will freeze and no longer reacts to any requests. So
systemctl status etc no longer working, is expected.
You should still be able to reboot in a somewhat ordered fashion via
"reboot --force"


I will try that next time I am able to



systemd should have generated a core dump as /core.


it has



Please install systemd-dbg and gdb and then run

gdb --core=/core /lib/systemd/systemd

The type "set logging on" and run "bt full" afterwards and attach
gdb.txt to the bug report.




#0  0x7f8d3e06779b in raise (sig=11) at 
../nptl/sysdeps/unix/sysv/linux/pt-raise.c:37

resultvar = 0
pid = 
#1  0x7f8d3e4bd3d8 in ?? ()
No symbol table info available.
#2  
No locals.
#3  0x7f8d3e4422a0 in ?? ()
No symbol table info available.
#4  0x7f8d3e4f8caa in ?? ()
No symbol table info available.
#5  0x7f8d3e56777f in ?? ()
No symbol table info available.
#6  0x7f8d3e55f558 in ?? ()
No symbol table info available.
#7  0x7f8d3e4bac6b in ?? ()
No symbol table info available.
#8  0x7f8d3dcd0b45 in __libc_start_main (main=0x7f8d3e4b6dd0, 
argc=1, argv=0x7ffd3c533ea8, init=, fini=, 
rtld_fini=, stack_end=0x7ffd3c533e98)

at libc-start.c:287
result = 
unwind_buf = {cancel_jmp_buf = {{jmp_buf = {0, 
5361389912737802513, 140244612264611, 140725615541920, 0, 0, 
-5360124553165444847, -5369135033269130991}, mask_was_saved = 0}}, priv 
= {pad = {0x0, 0x0,
  0x7ffd3c533eb8, 0x7f8d3e4971a8}, data = {prev = 0x0, 
cleanup = 0x0, canceltype = 1012088504}}}

not_first_call = 
#9  0x7f8d3e4bb2cc in ?? ()
No symbol table info available.


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload

2015-03-17 Thread Michael Biebl
Am 17.03.2015 um 18:52 schrieb Michael Biebl:

> gdb --core=/core /lib/systemd/systemd
> 
> The type "set logging on" and run "bt full" afterwards,


hit return until the gdb prompt shows up again

 and attach
> gdb.txt to the bug report.


-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Processed: Re: Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload

2015-03-17 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 moreinfo
Bug #780675 [systemd] systemd: segfault in systemd when running systemctl 
daemon-reload
Added tag(s) moreinfo.
> tags -1 unreproducible
Bug #780675 [systemd] systemd: segfault in systemd when running systemctl 
daemon-reload
Added tag(s) unreproducible.

-- 
780675: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780675
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload

2015-03-17 Thread Michael Biebl
control: tags -1 moreinfo
control: tags -1 unreproducible

Am 17.03.2015 um 18:14 schrieb Robert Pumphrey:
> Package: systemd
> Version: 215-12
> Severity: critical
> Justification: breaks the whole system
> 
> Dear Maintainer,
> 
> running systemctl daemon-reload causes systemd to segfault :
> 
> root@host:~# systemctl daemon-reload
> 
> Message from syslogd@host at Mar 17 16:41:53 ...
>  kernel:[  758.716467] systemd[1]: segfault at 7f8d3e4422a0 ip 
> 7f8d3e4422a0 sp 7ffd3c533458 error 15
> Failed to execute operation: Connection reset by peer
> 
> I have disabled as many services as possible, but still get the error.
> I have not been able to reproduce on another machine

Can you reproduce the step, how you got this crash? Did this happen once
or multiple times?

> I have not been able to change the settings on this machine to allow 
> daemon-reload to work
> 
> Once the segfault happens, systemd not longer responsds to systemctl status
> Unable to get systemd back into a state where it will respond to systemctl 
> status without a reboot
> 
> This has been triggered by attempting to upgrade some packages (eg. sudo) 
> whose postrm script calls systemctl --system daemon-reload

If systemd dies, it will freeze and no longer reacts to any requests. So
systemctl status etc no longer working, is expected.
You should still be able to reboot in a somewhat ordered fashion via
"reboot --force"

systemd should have generated a core dump as /core.

Please install systemd-dbg and gdb and then run

gdb --core=/core /lib/systemd/systemd

The type "set logging on" and run "bt full" afterwards and attach
gdb.txt to the bug report.


-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload

2015-03-17 Thread Robert Pumphrey
Package: systemd
Version: 215-12
Severity: critical
Justification: breaks the whole system

Dear Maintainer,

running systemctl daemon-reload causes systemd to segfault :

root@host:~# systemctl daemon-reload

Message from syslogd@host at Mar 17 16:41:53 ...
 kernel:[  758.716467] systemd[1]: segfault at 7f8d3e4422a0 ip 7f8d3e4422a0 
sp 7ffd3c533458 error 15
Failed to execute operation: Connection reset by peer

I have disabled as many services as possible, but still get the error.
I have not been able to reproduce on another machine
I have not been able to change the settings on this machine to allow 
daemon-reload to work

Once the segfault happens, systemd not longer responsds to systemctl status
Unable to get systemd back into a state where it will respond to systemctl 
status without a reboot

This has been triggered by attempting to upgrade some packages (eg. sudo) whose 
postrm script calls systemctl --system daemon-reload

-- Package-specific info:

-- System Information:
Debian Release: 8.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/12 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages systemd depends on:
ii  acl 2.2.52-2
ii  adduser 3.113+nmu3
ii  initscripts 2.88dsf-58
ii  libacl1 2.2.52-2
ii  libaudit1   1:2.4-1+b1
ii  libblkid1   2.25.2-5
ii  libc6   2.19-15
ii  libcap2 1:2.24-6
ii  libcap2-bin 1:2.24-6
ii  libcryptsetup4  2:1.6.6-5
ii  libgcrypt20 1.6.2-4+b1
ii  libkmod218-3
ii  liblzma55.1.1alpha+20120614-2+b3
ii  libpam0g1.1.8-3.1
ii  libselinux1 2.3-2
ii  libsystemd0 215-12
ii  mount   2.25.2-5
ii  sysv-rc 2.88dsf-58
ii  udev215-12
ii  util-linux  2.25.2-5

Versions of packages systemd recommends:
ii  dbus1.8.16-1
ii  libpam-systemd  215-12

Versions of packages systemd suggests:
pn  systemd-ui  

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#780624: marked as done (libmpeg2-4: introduces new symbols)

2015-03-17 Thread Debian Bug Tracking System
Your message dated Tue, 17 Mar 2015 17:33:58 +
with message-id 
and subject line Bug#780624: fixed in mpeg2dec 0.5.1-7
has caused the Debian Bug report #780624,
regarding libmpeg2-4: introduces new symbols
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
780624: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780624
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libmpeg2-4
Version: 0.5.1-6
Severity: serious

Hi,

Between wheezy and jessie libmpeg2-4 introduced at least one new symbol, 
mpeg2_guess_aspect, without even including a shlibs or symbols files.
The result being that some applications using libmpeg2-4 that use the new 
symbols, perhaps directly, perhaps picked up?, do not have a proper 
versioned dependency on libmpeg2-4.

One such package is gstreamer1.0-plugins-ugly, though there might be others.

Cheers,
-- 
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
--- End Message ---
--- Begin Message ---
Source: mpeg2dec
Source-Version: 0.5.1-7

We believe that the bug you reported is fixed in the latest version of
mpeg2dec, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 780...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sebastian Ramacher  (supplier of updated mpeg2dec package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 17 Mar 2015 18:24:46 +0100
Source: mpeg2dec
Binary: libmpeg2-4-dev libmpeg2-4 mpeg2dec
Architecture: source
Version: 0.5.1-7
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers 

Changed-By: Sebastian Ramacher 
Description:
 libmpeg2-4 - MPEG1 and MPEG2 video decoder library
 libmpeg2-4-dev - libmpeg2 development libraries and headers
 mpeg2dec   - Simple libmpeg2 video decoder application
Closes: 780624
Changes:
 mpeg2dec (0.5.1-7) unstable; urgency=medium
 .
   * Team upload.
   * debian/rules: Bump shlibs version. (Closes: #780624)
Checksums-Sha1:
 7c21cee938525d37a16a27f3378edc438c347273 2200 mpeg2dec_0.5.1-7.dsc
 933a948af4e18bd67abf17f87321e91ccb22d962 10208 mpeg2dec_0.5.1-7.debian.tar.xz
Checksums-Sha256:
 342e596ed67cc885d5601900d8cdbdb5ea4e3da7f00a39bd598f5e6876352d05 2200 
mpeg2dec_0.5.1-7.dsc
 2e2cd0bfbe90de977ffb26f2dc6bb85bb7f74ce30049cfda400d0eefae806f46 10208 
mpeg2dec_0.5.1-7.debian.tar.xz
Files:
 cf4856975d07db364b26e4d1d7faffb2 2200 libs optional mpeg2dec_0.5.1-7.dsc
 eb85b853bd418231f67fd8e3dd11ab78 10208 libs optional 
mpeg2dec_0.5.1-7.debian.tar.xz

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=5N9+
-END PGP SIGNATURE End Message ---


Bug#780503: marked as done (icu: incomplete fix for CVE-2014-7940)

2015-03-17 Thread Debian Bug Tracking System
Your message dated Tue, 17 Mar 2015 16:48:50 +
with message-id 
and subject line Bug#780503: fixed in icu 52.1-8
has caused the Debian Bug report #780503,
regarding icu: incomplete fix for CVE-2014-7940
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
780503: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780503
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
package: src:icu
version: 52.1-7.1
severity: serious
tags: security

Google added another check in a later patch for this issue, which
wasn't included in the previous nmu:
https://chromium.googlesource.com/chromium/deps/icu/+/a626a75aad2675254073366fcaa9465dacf17100/patches/col.patch

Best wishes,
Mike
--- End Message ---
--- Begin Message ---
Source: icu
Source-Version: 52.1-8

We believe that the bug you reported is fixed in the latest version of
icu, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 780...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Laszlo Boszormenyi (GCS)  (supplier of updated icu package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 17 Mar 2015 11:14:15 +
Source: icu
Binary: libicu52 libicu52-dbg libicu-dev icu-devtools icu-doc
Architecture: source all amd64
Version: 52.1-8
Distribution: unstable
Urgency: high
Maintainer: Laszlo Boszormenyi (GCS) 
Changed-By: Laszlo Boszormenyi (GCS) 
Description:
 icu-devtools - Development utilities for International Components for Unicode
 icu-doc- API documentation for ICU classes and functions
 libicu-dev - Development files for International Components for Unicode
 libicu52   - International Components for Unicode
 libicu52-dbg - International Components for Unicode
Closes: 777694 780503
Changes:
 icu (52.1-8) unstable; urgency=high
 .
   * New maintainer (closes: #777694).
   * Update Standars-Version to 3.9.6 .
 .
   [ Michael Gilbert  ]
   * Apply a more complete fix for CVE-2014-7940 (closes: #780503).
 - Thanks to Marc Deslauriers.
Checksums-Sha1:
 7ed5b80a43b8fbdbf133e5093af9948dc793bb07 1973 icu_52.1-8.dsc
 7aa226dc990a1eb7619169d4e5a397b1a215102a 25656 icu_52.1-8.debian.tar.xz
 ceb5eccc2b9f7f5aeea711a784fa2acdba771d96 2630968 icu-doc_52.1-8_all.deb
 403f298543859860c8ebb0cda42e96d7ff484221 6779698 libicu52_52.1-8_amd64.deb
 57a7571ac75d8c13b690bb58a385f4815ff563c4 5925222 libicu52-dbg_52.1-8_amd64.deb
 e2ca4b9090e5aae55eb82b70a6be8fc107ff4405 7644878 libicu-dev_52.1-8_amd64.deb
 42bac1b0a29361d5f2075930139adf7003585dff 172092 icu-devtools_52.1-8_amd64.deb
Checksums-Sha256:
 6847d36df92098042b0b5f2377289e34ed8fa9175b1d74989d9fbd7a025d664d 1973 
icu_52.1-8.dsc
 aacc6e4c1a91a7c39b0e69e858ddb320c0c75096a19757ae67da9cc52997dcd5 25656 
icu_52.1-8.debian.tar.xz
 a08a86a7dd6b21a4d961ae65eecb6cbb38955e379d2717bf56e6b06f7160f1a4 2630968 
icu-doc_52.1-8_all.deb
 342b83af920393e5132d0bd9f6fb03fadd27389f089ed094f788b6ca42d0310c 6779698 
libicu52_52.1-8_amd64.deb
 110a055af4216bb330192a24c5e3207d21aaa7b3ffee077704694f4146f125a1 5925222 
libicu52-dbg_52.1-8_amd64.deb
 b804d0035608732ea47716a481581e23b953995caa1df1c9a6a8d736ddcc838e 7644878 
libicu-dev_52.1-8_amd64.deb
 7eb72050d8d44ac0d5462f53af8bacf8c8bc82bddec669820672ef605493bab9 172092 
icu-devtools_52.1-8_amd64.deb
Files:
 856eb10182615c6b8eb235121a451a1a 1973 libs optional icu_52.1-8.dsc
 0f51c9efbe92ecee196c89dfe6b6cd9b 25656 libs optional icu_52.1-8.debian.tar.xz
 e9813a5bc787093c6488e2bae4f7e3ac 2630968 doc optional icu-doc_52.1-8_all.deb
 765ca2590b3f14a9e8c332ac715123c5 6779698 libs optional 
libicu52_52.1-8_amd64.deb
 2ce23a45c89cc858d8950573efef9da8 5925222 debug extra 
libicu52-dbg_52.1-8_amd64.deb
 5ecec0bb4482c143dafa3655f4007cfa 7644878 libdevel optional 
libicu-dev_52.1-8_amd64.deb
 559cce7061289e94a010fb8479b72817 172092 libdevel optional 
icu-devtools_52.1-8_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIcBAEBCAAGBQJVCFiOAAoJENzjEOeGTMi/7wIP/1Avxw4ePdZAxvQJ/v0CTyoM
iEEZjymW4LiOPwOrzKthN2qNECvFbOCKZ6FVfXtzW2mnl5Yx3hy1j3iKxwYT2S0z
kfWy6vnYX/M2N3vH8WNfulRakjOHA98GbuN+UIw+mO5bpaoL9w3Np/hyjZ3yYpFV
W/HVSA/dA/HcQDhS+knSIv+O2ktHpYBVE8xxIAt0XtaEI7tkLywjuCFR7KcetSyZ
lAWWnCC9puU65RFfPh/lB+S

Processed: retitle 780613 to diakonos: needs unpackaged curses binding to work

2015-03-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> retitle 780613 diakonos: needs unpackaged curses binding to work
Bug #780613 [diakonos] diakonos: completely broken in jessie
Changed Bug title to 'diakonos: needs unpackaged curses binding to work' from 
'diakonos: completely broken in jessie'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
780613: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780613
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#758600: marked as done (shibboleth-sp2-utils: postinst fails on initial installation)

2015-03-17 Thread Debian Bug Tracking System
Your message dated Tue, 17 Mar 2015 15:48:24 +0100
with message-id <87oanrn0hz@lant.ki.iif.hu>
and subject line fix is in bpo, closing
has caused the Debian Bug report #758600,
regarding shibboleth-sp2-utils: postinst fails on initial installation
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
758600: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=758600
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: shibboleth-sp2-utils
Version: 2.5.3+dfsg-1~bpo70+1
Severity: normal

Hi,

Installing libapache2-mod-shib2 from wheezy backports. shibboleth-sp2-utils
postinst fails on initial installation, because it tries to enable the apache
module, but libapache2-mod-shib2 is not yet configured so
/etc/apache2/mods-available/ contains only shib2.load.dpkg-new.

Attached is a log of the install.

-- System Information:
Debian Release: 7.6
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=fi_FI.UTF-8, LC_CTYPE=fi_FI.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages shibboleth-sp2-utils depends on:
ii  adduser3.113+nmu3
ii  libc6  2.13-38+deb7u3
ii  libfcgi0ldbl   2.4.0-8.1
ii  libgcc11:4.7.2-5
ii  liblog4shib1   1.0.4-1
ii  libsaml8   2.5.3-2~bpo70+1
ii  libshibsp-plugins  2.5.3+dfsg-1~bpo70+1
ii  libshibsp6 2.5.3+dfsg-1~bpo70+1
ii  libstdc++6 4.7.2-5
ii  libxerces-c3.1 3.1.1-3
ii  libxmltooling6 1.5.3-2~bpo70+1

Versions of packages shibboleth-sp2-utils recommends:
ii  openssl  1.0.1e-2+deb7u12

shibboleth-sp2-utils suggests no packages.

-- no debconf information
mika@y-moodle:~$ sudo aptitude install -t wheezy-backports libapache2-mod-shib2
The following NEW packages will be installed:
  libapache2-mod-shib2 libfcgi0ldbl{a} liblog4shib1{a} libmemcached10{a}
  libodbc1{a} libsaml8{a} libshibsp-plugins{a} libshibsp6{a}
  libxerces-c3.1{a} libxml-security-c17{a} libxmltooling6{a}
  opensaml2-schemas{a} shibboleth-sp2-common{a} shibboleth-sp2-utils{a}
  xmltooling-schemas{a}
0 packages upgraded, 15 newly installed, 0 to remove and 34 not upgraded.
Need to get 5 547 kB of archives. After unpacking 28,8 MB will be used.
Do you want to continue? [Y/n/?]
Get: 1 http://ftp.fi.debian.org/debian/ wheezy/main libmemcached10 amd64 1.0.8-1
 [117 kB]
Get: 2 http://ftp.fi.debian.org/debian/ wheezy/main libodbc1 amd64 2.2.14p2-5 [2
52 kB]
Get: 3 http://ftp.fi.debian.org/debian/ wheezy/main libxerces-c3.1 amd64 3.1.1-3
 [1 139 kB]
Get: 4 http://ftp.fi.debian.org/debian/ wheezy/main liblog4shib1 amd64 1.0.4-1 [
95,7 kB]
Get: 5 http://ftp.fi.debian.org/debian/ wheezy-backports/main libxml-security-c1
7 amd64 1.7.2-2~bpo70+1 [290 kB]
Get: 6 http://ftp.fi.debian.org/debian/ wheezy-backports/main libxmltooling6 amd
64 1.5.3-2~bpo70+1 [613 kB]
Get: 7 http://ftp.fi.debian.org/debian/ wheezy-backports/main libsaml8 amd64 2.5
.3-2~bpo70+1 [940 kB]
Get: 8 http://ftp.fi.debian.org/debian/ wheezy-backports/main opensaml2-schemas
all 2.5.3-2~bpo70+1 [25,8 kB]
Get: 9 http://ftp.fi.debian.org/debian/ wheezy-backports/main shibboleth-sp2-com
mon all 2.5.3+dfsg-1~bpo70+1 [48,8 kB]
Get: 10 http://ftp.fi.debian.org/debian/ wheezy-backports/main xmltooling-schema
s all 1.5.3-2~bpo70+1 [15,9 kB]
Get: 11 http://ftp.fi.debian.org/debian/ wheezy-backports/main libshibsp6 amd64
2.5.3+dfsg-1~bpo70+1 [1 307 kB]
Get: 12 http://ftp.fi.debian.org/debian/ wheezy/main libfcgi0ldbl amd64 2.4.0-8.
1 [281 kB]
Get: 13 http://ftp.fi.debian.org/debian/ wheezy-backports/main libshibsp-plugins
 amd64 2.5.3+dfsg-1~bpo70+1 [247 kB]
Get: 14 http://ftp.fi.debian.org/debian/ wheezy-backports/main shibboleth-sp2-ut
ils amd64 2.5.3+dfsg-1~bpo70+1 [103 kB]
Get: 15 http://ftp.fi.debian.org/debian/ wheezy-backports/main libapache2-mod-sh
ib2 amd64 2.5.3+dfsg-1~bpo70+1 [72,2 kB]
Fetched 5 547 kB in 0s (6 051 kB/s)
Selecting previously unselected package libmemcached10:amd64.
(Reading database ... 34023 files and directories currently installed.)
Unpacking libmemcached10:amd64 (from .../libmemcached10_1.0.8-1_amd64.deb) ...
Selecting previously unselected package libodbc1:amd64.
Unpacking libodbc1:amd64 (from .../libodbc1_2.2.14p2-5_amd64.deb) ...
Selecting previously unselected package libxerces-c3.1:amd64.
Unpacking libxerces-c3.1:amd64 (from .../libxerces-c3.1_3.1.1-3_amd64.deb) ...
Selecting previously unselected package liblog4shib1:amd64.
Unpacking liblog4shib1:amd64 (from .../liblog4shib1_1.0.4-1_amd64.deb) ...
Selecting previously unselected package li

Bug#773136: debsums: modified files of arch-qualified (multiarch) packages are not being reported

2015-03-17 Thread Axel Beckert
Control: owner -1 !

Hi,

Artem Chuprina wrote:
> I confirm this bug also when only one of multiarch packages is installed (that
> is, arch qualification is enough), and that it still exists in 2.0.52+nmu3.
> Probably it is reasonable to consider it release-critical because of its
> security implications.

I already planned to do an update of debsums to fix #773136 in Jessie.
I'm just quite busy with other stuff these days days. Will do the
upload within a few days, maybe today in the evening, but latest
earlier next week.

I also already talked with nthykier (Cc'ed) of the release team
(Cc'ed) on IRC about this issue and got a "go" from him.

Regards, Axel
-- 
 ,''`.  |  Axel Beckert , http://people.debian.org/~abe/
: :' :  |  Debian Developer, ftp.ch.debian.org Admin
`. `'   |  4096R: 2517 B724 C5F6 CA99 5329  6E61 2FF9 CD59 6126 16B5
  `-|  1024D: F067 EA27 26B9 C3FC 1486  202E C09E 1D89 9593 0EDE


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#773136: debsums: modified files of arch-qualified (multiarch) packages are not being reported

2015-03-17 Thread Debian Bug Tracking System
Processing control commands:

> owner -1 !
Bug #773136 [debsums] debsums: modified files of arch-qualified (multiarch) 
packages are not being reported
Owner recorded as Axel Beckert .

-- 
773136: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773136
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#774873: Circular dependency in java-headless packages

2015-03-17 Thread Rebecca N. Palmer

 I installed
openjdk-7-jre:i386 on an amd64 system and for some reason
openjdk-7-jre:amd64 has been pulled as well.


That's probably because of this dependency cycle: multiarch treats 
arch:all packages as the native architecture 
(https://wiki.ubuntu.com/MultiarchSpec#Dependencies_involving_Architecture:_all_packages), 
i.e.


openjdk-7-jre:i386 -> ca-certificates-java:all <-> openjdk-7-jre:amd64


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: your mail

2015-03-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 773136 serious
Bug #773136 [debsums] debsums: modified files of arch-qualified (multiarch) 
packages are not being reported
Severity set to 'serious' from 'important'
>
End of message, stopping processing here.

Please contact me if you need assistance.
-- 
773136: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773136
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#723964: devtodo: FTBFS: required file './compile' not found

2015-03-17 Thread Fernando Seiti Furusato
Source: devtodo
Followup-For: Bug #723964

Hello.
The package also fails to build from source due to a missing build-dep (see bug
#779551).
Using the same approach as Gregor on his first patch, I just added a build-dep
on libtool-bin. I also removed some dependencies that are not needed, since
they are dependencies of dh-autoreconf anyway.
I sent the same patch to #779551.

Regards.
Fernando

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: ppc64el (ppc64le)

Kernel: Linux 3.13-1-powerpc64le (SMP w/16 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)
diff -Nru devtodo-0.1.20/debian/changelog devtodo-0.1.20/debian/changelog
--- devtodo-0.1.20/debian/changelog	2012-06-19 01:38:36.0 +
+++ devtodo-0.1.20/debian/changelog	2015-03-17 12:27:49.0 +
@@ -1,3 +1,11 @@
+devtodo (0.1.20-6ppc64el1) UNRELEASED; urgency=medium
+
+  * debian/control: added dh-autoreconf as build-dep, removed its dependencies
+and added libtool-bin to fix ftbfs.
+  * debian/rules: added usage of dh-autoreconf 
+
+ -- Fernando Seiti Furusato   Tue, 17 Mar 2015 12:26:35 +
+
 devtodo (0.1.20-6) unstable; urgency=low
 
   * fix SYNOPSIS spelling in manpage (Closes: #534236)
diff -Nru devtodo-0.1.20/debian/control devtodo-0.1.20/debian/control
--- devtodo-0.1.20/debian/control	2012-06-19 01:32:57.0 +
+++ devtodo-0.1.20/debian/control	2015-03-17 12:26:01.0 +
@@ -2,7 +2,7 @@
 Section: utils
 Priority: optional
 Maintainer: Ryan Niebur 
-Build-Depends: debhelper (>= 7.2), autotools-dev, libreadline-dev, libncurses-dev, bash-completion, automake, autoconf, libtool, dpkg-dev (>= 1.16.1~)
+Build-Depends: debhelper (>= 7.2), dh-autoreconf, libreadline-dev, libncurses-dev, bash-completion, libtool-bin, dpkg-dev (>= 1.16.1~)
 Standards-Version: 3.9.3
 Vcs-Git: git://git.debian.org/git/collab-maint/devtodo.git
 Vcs-Browser: http://git.debian.org/?p=collab-maint/devtodo.git;a=summary
diff -Nru devtodo-0.1.20/debian/rules devtodo-0.1.20/debian/rules
--- devtodo-0.1.20/debian/rules	2012-06-19 01:28:47.0 +
+++ devtodo-0.1.20/debian/rules	2015-03-17 12:26:20.0 +
@@ -7,15 +7,13 @@
 destdir=$(CURDIR)/debian/devtodo/
 
 override_dh_auto_configure:
+	dh_autoreconf
 	dh_auto_configure -- CFLAGS="$(CFLAGS)" CPPFLAGS="$(CPPFLAGS)" CXXFLAGS="$(CXXFLAGS)" LDFLAGS="$(LDFLAGS)"
 
 build: build-arch build-indep
 build-arch: build-stamp
 build-indep: build-stamp
 build-stamp:
-	ln -sf /usr/share/misc/config.sub config.sub
-	ln -sf /usr/share/misc/config.guess config.guess
-	autoreconf
 	dh build
 	touch build-stamp
 
@@ -24,6 +22,7 @@
 	dh_auto_build
 
 clean:
+	dh_autoreconf_clean
 	dh clean
 
 install: build


Bug#779551: (no subject)

2015-03-17 Thread Fernando Seiti Furusato
Followup-For: Bug #779551
Source: devtodo
Version: 0.1.20-6
X-Debbugs-Cc: cont...@bugs.debian.org

Dear Maintainer et al,
This package also ftbfs on ppc64el due to the same reason reported here and in
bug #723964.
So I have created a patch which fixes both, by:

 - adding dh-autoreconf utilization to debian/rules
 - adding dependency on libtool-bin to debian/control.

The debdiff is attached.

Regards.
Fernando

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: ppc64el (ppc64le)

Kernel: Linux 3.13-1-powerpc64le (SMP w/16 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)
diff -Nru devtodo-0.1.20/debian/changelog devtodo-0.1.20/debian/changelog
--- devtodo-0.1.20/debian/changelog	2012-06-19 01:38:36.0 +
+++ devtodo-0.1.20/debian/changelog	2015-03-17 12:27:49.0 +
@@ -1,3 +1,11 @@
+devtodo (0.1.20-6ppc64el1) UNRELEASED; urgency=medium
+
+  * debian/control: added dh-autoreconf as build-dep, removed its dependencies
+and added libtool-bin to fix ftbfs.
+  * debian/rules: added usage of dh-autoreconf 
+
+ -- Fernando Seiti Furusato   Tue, 17 Mar 2015 12:26:35 +
+
 devtodo (0.1.20-6) unstable; urgency=low
 
   * fix SYNOPSIS spelling in manpage (Closes: #534236)
diff -Nru devtodo-0.1.20/debian/control devtodo-0.1.20/debian/control
--- devtodo-0.1.20/debian/control	2012-06-19 01:32:57.0 +
+++ devtodo-0.1.20/debian/control	2015-03-17 12:26:01.0 +
@@ -2,7 +2,7 @@
 Section: utils
 Priority: optional
 Maintainer: Ryan Niebur 
-Build-Depends: debhelper (>= 7.2), autotools-dev, libreadline-dev, libncurses-dev, bash-completion, automake, autoconf, libtool, dpkg-dev (>= 1.16.1~)
+Build-Depends: debhelper (>= 7.2), dh-autoreconf, libreadline-dev, libncurses-dev, bash-completion, libtool-bin, dpkg-dev (>= 1.16.1~)
 Standards-Version: 3.9.3
 Vcs-Git: git://git.debian.org/git/collab-maint/devtodo.git
 Vcs-Browser: http://git.debian.org/?p=collab-maint/devtodo.git;a=summary
diff -Nru devtodo-0.1.20/debian/rules devtodo-0.1.20/debian/rules
--- devtodo-0.1.20/debian/rules	2012-06-19 01:28:47.0 +
+++ devtodo-0.1.20/debian/rules	2015-03-17 12:26:20.0 +
@@ -7,15 +7,13 @@
 destdir=$(CURDIR)/debian/devtodo/
 
 override_dh_auto_configure:
+	dh_autoreconf
 	dh_auto_configure -- CFLAGS="$(CFLAGS)" CPPFLAGS="$(CPPFLAGS)" CXXFLAGS="$(CXXFLAGS)" LDFLAGS="$(LDFLAGS)"
 
 build: build-arch build-indep
 build-arch: build-stamp
 build-indep: build-stamp
 build-stamp:
-	ln -sf /usr/share/misc/config.sub config.sub
-	ln -sf /usr/share/misc/config.guess config.guess
-	autoreconf
 	dh build
 	touch build-stamp
 
@@ -24,6 +22,7 @@
 	dh_auto_build
 
 clean:
+	dh_autoreconf_clean
 	dh clean
 
 install: build


Bug#779664: marked as done (ffmpeg: needs Breaks+Replaces: libav-tools (<< 6:9~))

2015-03-17 Thread Debian Bug Tracking System
Your message dated Tue, 17 Mar 2015 12:49:12 +
with message-id 
and subject line Bug#779664: fixed in ffmpeg 7:2.6.1-1
has caused the Debian Bug report #779664,
regarding ffmpeg: needs Breaks+Replaces: libav-tools (<< 6:9~)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
779664: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779664
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: ffmpeg
Version: 7:2.5.4-1
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package fails to co-install
with libav-tools from wheezy.
libav-tools installed fine in 'wheezy', then the upgrade to ffmpeg/'sid' fails
because it tries to overwrite other packages files without declaring a
Breaks+Replaces relation.

See policy 7.6 at
https://www.debian.org/doc/debian-policy/ch-relationships.html#s-replaces

>From the attached log (scroll to the bottom...):

  Selecting previously unselected package ffmpeg.
  Unpacking ffmpeg (from .../ffmpeg_7%3a2.5.4-1_amd64.deb) ...
  dpkg: error processing /var/cache/apt/archives/ffmpeg_7%3a2.5.4-1_amd64.deb 
(--unpack):
   trying to overwrite '/usr/share/man/man1/ffplay.1.gz', which is also in 
package libav-tools 6:0.8.16-1
  dpkg-deb: error: subprocess paste was killed by signal (Broken pipe)
  Errors were encountered while processing:
   /var/cache/apt/archives/ffmpeg_7%3a2.5.4-1_amd64.deb

Since there is no ffmpeg package in jessie, adding these Breaks+Replaces
would ease some upgrade paths from wheezy as well as possible backporting.

In libav (6:9~beta1-1) the compatibility links for ff* tools were removed.


cheers,

Andreas


libav-tools=6%0.8.16-1_ffmpeg=7%2.5.4-1.log.gz
Description: application/gzip
--- End Message ---
--- Begin Message ---
Source: ffmpeg
Source-Version: 7:2.6.1-1

We believe that the bug you reported is fixed in the latest version of
ffmpeg, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 779...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andreas Cadhalpun  (supplier of updated 
ffmpeg package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Mon, 16 Mar 2015 23:53:34 +0100
Source: ffmpeg
Binary: ffmpeg qt-faststart ffmpeg-dbg ffmpeg-doc libavcodec-ffmpeg56 
libavcodec-ffmpeg-dev libavdevice-ffmpeg56 libavdevice-ffmpeg-dev 
libavfilter-ffmpeg5 libavfilter-ffmpeg-dev libavformat-ffmpeg56 
libavformat-ffmpeg-dev libavresample-ffmpeg2 libavresample-ffmpeg-dev 
libavutil-ffmpeg54 libavutil-ffmpeg-dev libpostproc-ffmpeg53 
libpostproc-ffmpeg-dev libswresample-ffmpeg1 libswresample-ffmpeg-dev 
libswscale-ffmpeg3 libswscale-ffmpeg-dev
Architecture: source i386 all
Version: 7:2.6.1-1
Distribution: unstable
Urgency: medium
Maintainer: Andreas Cadhalpun 
Changed-By: Andreas Cadhalpun 
Description:
 ffmpeg - Tools for transcoding, streaming and playing of multimedia files
 ffmpeg-dbg - Debug symbols for the FFmpeg multimedia framework
 ffmpeg-doc - Documentation of the FFmpeg multimedia framework
 libavcodec-ffmpeg-dev - FFmpeg library with de/encoders for audio/video codecs 
- developm
 libavcodec-ffmpeg56 - FFmpeg library with de/encoders for audio/video codecs - 
runtime
 libavdevice-ffmpeg-dev - FFmpeg library for handling input and output devices 
- developmen
 libavdevice-ffmpeg56 - FFmpeg library for handling input and output devices - 
runtime fi
 libavfilter-ffmpeg-dev - FFmpeg library containing media filters - development 
files
 libavfilter-ffmpeg5 - FFmpeg library containing media filters - runtime files
 libavformat-ffmpeg-dev - FFmpeg library with (de)muxers for multimedia 
containers - develo
 libavformat-ffmpeg56 - FFmpeg library with (de)muxers for multimedia 
containers - runtim
 libavresample-ffmpeg-dev - FFmpeg compatibility library for resampling - 
development files
 libavresample-ffmpeg2 - FFmpeg compatibility library for resampling - runtime 
files
 libavutil-ffmpeg-dev - FFmpeg library with functions for simplifying 
programming - devel
 libavutil-ffmpeg54 - FFmpeg library with functions for simplifying programming 
- runti
 libpostproc-ffmpeg-dev - FFmpeg library fo

Processed: affects all suites

2015-03-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 780519 - sid jessie
Bug #780519 [src:tomcat7] tomcat7: FTBFS due to failing tests
Removed tag(s) sid and jessie.
>
End of message, stopping processing here.

Please contact me if you need assistance.
-- 
780519: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780519
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#780650: systemd: Sources not shipped for hwdb files

2015-03-17 Thread Dimitri John Ledkov
Package: systemd
Severity: serious

Files in ./hwdb/*.hwdb are mostly pregenerated. They are generated using
ids-update.pl script from usb.ids, pci.ids, sdio.ids, oui.txt, iab.txt.

I'm not sure what the license is of those .ids/.txt files.

Please ship ids-update.pl and the ids/txt files as part of the source
package. And possibly use them to regenerate ./hwdb/*.hwdb files at
built time.

Regards,

Dimitri.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#761355: openjp2 2.0 -> 2.1 transition

2015-03-17 Thread Andreas Beckmann
On 2015-03-17 09:52, Mathieu Malaterre wrote:
> Let me know if I misunderstood your email:
> https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=46;bug=761355#46

These bugs were dangling around assigned to a not longer existing
package. You should probably close them as well.
The successor packages may need Breaks+Replaces against the obsolete
packages to ensure clean upgrade paths on all cases.


Andreas


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#780645: shinken-mod-webui: files containing password or salt are word readable

2015-03-17 Thread Jonas Smedegaard
Package: shinken-mod-webui
Version: 1.0-1
Severity: grave
Tags: security
Justification: user security hole

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

The two files referenced in README containing users+passwords and salt
are world readable.

Any local user can apparently gain administrator access to shinken!


 - Jonas

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=K7qm
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#780637: cloud-init: needs to be build in the cloud

2015-03-17 Thread Debian Bug Tracking System
Processing control commands:

> severity -1 normal
Bug #780637 [cloud-init] cloud-init: needs to be build in the cloud
Severity set to 'normal' from 'serious'
> retitle -1 cloud-init: building in pbuilder runs tests and fails
Bug #780637 [cloud-init] cloud-init: needs to be build in the cloud
Changed Bug title to 'cloud-init: building in pbuilder runs tests and fails' 
from 'cloud-init: needs to be build in the cloud'

-- 
780637: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780637
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#780637: cloud-init: needs to be build in the cloud

2015-03-17 Thread Holger Levsen
control: severity -1 normal
control: retitle -1 cloud-init: building in pbuilder runs tests and fails

Hi Charles,

On Dienstag, 17. März 2015, Charles Plessy wrote:
> it is more complicated than this: the package builds fine with sbuild.

does it run the tests with sbuild too? (I assume not.)
 
> To what extent do we need to support pbuilder ?  Please adjust the severity
> according to your answer if necessary.

I've just tried to build the package with plain debuild and to my surprise  
didnt execute any tests and build fine.

I currently don't understand why pbuilder runs these tests at all, maybe this 
bug should be reassigned to pbuilder (or qa.debian.org, usertag "jenkins".)

I'm also not sure about this from debian/rules:

ifeq (,$(findstring nocheck, $(DEB_BUILD_OPTIONS)))
override_dh_auto_test:
dh_auto_test
$(MAKE) test
endif

So when "nocheck" is defined in DEB_BUILD_OPTIONS it should run "make test"???

I must be missing something rather obvious... help welcome.


cheers,
Holger




signature.asc
Description: This is a digitally signed message part.


Bug#780637: cloud-init: needs to be build in the cloud

2015-03-17 Thread Charles Plessy
Le Tue, Mar 17, 2015 at 10:15:38AM +0100, Holger Levsen a écrit :
> 
> building the cloud-init package fails during package tests because the 
> hostname metadata.google.internal cannot be resolved and cloud specific URLs 
> like http://169.254.169.254/openstack/latest cannot be accessed, see attached 
> log.

Hi Holger,

it is more complicated than this: the package builds fine with sbuild.

To what extent do we need to support pbuilder ?  Please adjust the severity
according to your answer if necessary.

Have a nice day

-- 
Charles


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#775733: xemacs21-gnome-*: hangs during upgrade from squeeze -> wheezy -> jessie

2015-03-17 Thread Mark Brown
On Tue, Mar 17, 2015 at 01:56:34AM +0100, Andreas Beckmann wrote:
> Package: 
> src:xemacs21,xemacs21-gnome-mule,xemacs21-gnome-nomule,xemacs21-gnome-mule-canna-wnn
> Followup-For: Bug #775733
> 
> Attached are two new piuparts logs:
> * failure due to deadlock and timeout
> * success after patching xemacs
> 
> The logfiles contain the piuparts command lines used.

OK, thanks for the command lines.  How about the analysis for the patch?
I'm not keen on just applying random changes without understanding.


signature.asc
Description: Digital signature


Processed: closing 768780

2015-03-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> # no need anymore
> close 768780
Bug #768780 [pencil2d] Block migration (and release) - pencil2d is too buggy
Marked Bug as done
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
768780: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768780
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#780439: [Pkg-tcltk-devel] Bug#780439: tcl8.6: upgrade issues switching from tcl8.4/wheezy to tcl/jessie

2015-03-17 Thread Sergei Golovan
Hi Andreas,

On Sat, Mar 14, 2015 at 1:06 AM, Andreas Beckmann  wrote:
> Hi,
>
> analyzing some piuparts logs in depth showed an issue with fsl being
> hold at the wheezy version rather than being upgraded.
>
> This is caused by the switch from tcl8.4 to tcl which requires removal
> of the old tcl8.4 package. This seems to work well in most upgrade
> paths, but unfortunately in this case the scoring resulted in a tie,
> and that is resolved in favor of the already installed package.
> There may be more upgrade paths involving other packages hitting this
> issue ...
>
> Adding some Breaks to libtcl8.6 (which has a slightly higher score than
> tcl due to a higher number of rdepends) will help apt to resolve this
> upgrade path in favor of the new tcl package.
> The versions I've taken from the Breaks found in the tcl and tk
> packages.

Thank you for the analysis and for the patch. I'll upload the fixed packages
shortly.

Cheers!
-- 
Sergei Golovan


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#780637: cloud-init: needs to be build in the cloud

2015-03-17 Thread Holger Levsen
package: cloud-init
version: 0.7.6~bzr976-2 
severity: serious
User: reproducible-bui...@lists.alioth.debian.org
Usertags: environment
x-debbugs-cc: reproducible-bui...@lists.alioth.debian.org

Hi,

building the cloud-init package fails during package tests because the 
hostname metadata.google.internal cannot be resolved and cloud specific URLs 
like http://169.254.169.254/openstack/latest cannot be accessed, see attached 
log.

Filing this as a serious bug as it prevents anyone from (re-)building the 
package outside of such cloud services...

Suggestion solution: drop these tests during package build.


cheers,
Holger
Starting to build cloud-init on 2015-02-18 00:15
The jenkins build log is/was available at https://jenkins.debian.net/job/reproducible_builder_gamma/29159//console
Reading package lists...
Building dependency tree...
Reading state information...
NOTICE: 'cloud-init' packaging is maintained in the 'Git' version control system at:
git://anonscm.debian.org/collab-maint/cloud-init.git
Need to get 533 kB of source archives.
Get:1 http://ftp.de.debian.org/debian/ sid/main cloud-init 0.7.6~bzr976-2 (dsc) [2270 B]
Get:2 http://ftp.de.debian.org/debian/ sid/main cloud-init 0.7.6~bzr976-2 (tar) [505 kB]
Get:3 http://ftp.de.debian.org/debian/ sid/main cloud-init 0.7.6~bzr976-2 (diff) [26.3 kB]
Fetched 533 kB in 0s (2841 kB/s)
Download complete and in download only mode
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 3.0 (quilt)
Source: cloud-init
Binary: cloud-init
Architecture: all
Version: 0.7.6~bzr976-2
Maintainer: Charles Plessy 
Uploaders: Miguel Landaeta , Julien Danjou , Thomas Goirand 
Homepage: https://launchpad.net/cloud-init
Standards-Version: 3.9.5
Vcs-Browser: http://anonscm.debian.org/gitweb/?p=collab-maint/cloud-init.git;a=summary
Vcs-Git: git://anonscm.debian.org/collab-maint/cloud-init.git
Build-Depends: debhelper (>= 9), iproute2, po-debconf, pyflakes, pylint, python, python-boto (>= 2.3), python-cheetah, python-configobj, python-httpretty, python-jsonpatch, python-mocker, python-nose, python-oauth, python-serial, python-setuptools, python-requests, python-yaml
Package-List:
 cloud-init deb admin optional arch=all
Checksums-Sha1:
 4b31da1c3731bac2726b9443c8f67a6f50152489 504535 cloud-init_0.7.6~bzr976.orig.tar.gz
 8a332d201ff4cabaeeb912fab267e66d7a2b40c0 26300 cloud-init_0.7.6~bzr976-2.debian.tar.xz
Checksums-Sha256:
 7f1ef50424a9731981f5aa8d1289edce24648099e41c6d98e306bb3da7c8f7f4 504535 cloud-init_0.7.6~bzr976.orig.tar.gz
 1bcd08aa84f85e8f3ceab4763567975a13c1631bfebb6f053b5df9a17a6eb683 26300 cloud-init_0.7.6~bzr976-2.debian.tar.xz
Files:
 c617becac751badac9bb17f868ee501d 504535 cloud-init_0.7.6~bzr976.orig.tar.gz
 469094154fc0f213697a6d13313e1e29 26300 cloud-init_0.7.6~bzr976-2.debian.tar.xz

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIcBAEBCgAGBQJTt+27AAoJEMW9bI8ildUCkPQP/RPOru3XOkZgg2mYh2Tc2XZU
2Oe89DPynn9aeadVz81XibL1H6t8EvQZdNoZlB15MbKu2jPqwfoSGfVAUnEn0nnt
/Z5dC5dauWU1afCKnZDL2g0eYrFrqK5puEdZRd/uWzIFdUTNVMH/zlSvw7B3l9tK
GVwDYaGE4gawI0hYHE591IYWvD/ALoVPsQbX2n5s8MdgZLZA1y2QJ4drHLCpMaZ2
lB0zvbkv5J9mPkURu4xqNRbfeovDPuvxbq+alYFqHmHpWySNncDQrNvHJ5YEYN7z
yQzeuKmO+n9gTdx+JVCSe7AxFWHLWGV/7plWcKXnr1ClDaUIXFRg3HsdP+g98ct0
/GCvbwe2vycYpMvuXQSSxOx0q23VWt4O/kQRLkF1DWTmUtAxRIoQSk7Fm4z51fHA
9ipQ8pL/8wDe0GRsMud+YFF6swF6AnBBLJu9QyZdgzuSSUug7JHeMOqWBP+FZ+bX
UB74fy5/vodbCz72KBuGj9e6Z4mmniAbr0WJm4woX892qqvo7vshYGoUGN0qxusr
ux0yIK9tm51F0ql8XsbQKXNJ4WYQKL7PHE8sE8v1O+sPLATWIaywGnhTLfpsfnVB
kGso9+TgzQV0qe9yf03mdO/c14w+3+j7ZvyRArejm3dAt26T3mZafqnLOEeghOd3
0N3crA/z1b9+uDJ6NPom
=aomw
-END PGP SIGNATURE-
+ timeout 12h nice ionice -c 3 sudo DEB_BUILD_OPTIONS=parallel=15 pbuilder --build --configfile /tmp/pbuilderrc_NivE --debbuildopts -b --basetgz /var/cache/pbuilder/base-reproducible.tgz --distribution sid cloud-init_0.7.6~bzr976-2.dsc
W: /root/.pbuilderrc does not exist
I: using fakeroot in build.
I: Current time: Wed Feb 18 00:15:36 UTC 2015
I: pbuilder-time-stamp: 1424218536
I: Building the build Environment
I: extracting base tarball [/var/cache/pbuilder/base-reproducible.tgz]
I: creating local configuration
I: copying local configuration
W: --override-config is not set; not updating apt.conf Read the manpage for details.
I: mounting /proc filesystem
I: mounting /dev/pts filesystem
I: Mounting /dev/shm
I: Mounting /run/shm
I: policy-rc.d already exists
I: Installing the build-deps
 -> Attempting to satisfy build-dependencies
 -> Creating pbuilder-satisfydepends-dummy package
Package: pbuilder-satisfydepends-dummy
Version: 0.invalid.0
Architecture: amd64
Maintainer: Debian Pbuilder Team 
Description: Dummy package to satisfy dependencies with aptitude - created by pbuilder
 This package was created automatically by pbuilder to satisfy the
 build-dependencies of the package being currently built.
Depends: debhelper (>= 9), iproute2, po-debconf, pyflakes, pylint, python, python-boto (>= 2.3), python-cheetah, python-configobj, python-httpretty, python-jsonpatch, python-mo

Bug#778646: Multiple issues

2015-03-17 Thread Bartosz Fenski
I contacted upstream and he's willing to fix it in a different way.
He said that he should be able to work on it later this week.

regards
Bartek

W dniu 3/17/2015 o 8:24 AM, Tomasz Buchert pisze:
> Hi all, Moritz - did you take a look at my patch? I'd really like
> to have a second opinion on that since it is fairly large for an
> NMU.
> 
> I attach NMU patch. Shall I upload it to DELAYED/5 or something
> like that?
> 
> Cheers, Tomasz
> 


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#761355: openjp2 2.0 -> 2.1 transition

2015-03-17 Thread Mathieu Malaterre
# no such package as libopenjpeg6-dev in debian
fixed 761355 2.1.0-2
# no such package as openjp3d-tools in debian
fixed 761357 2.1.0-2

Andreas,

Let me know if I misunderstood your email:
https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=46;bug=761355#46

Regards


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed (with 4 errors): openjp2 2.0 -> 2.1 transition

2015-03-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> # no such package as libopenjpeg6-dev in debian
> fixed 761355 2.1.0-2
Bug #761355 [src:openjpeg2] libopenjpeg6-dev and libopenjp2-7-dev: error when 
trying to install together
Marked as fixed in versions openjpeg2/2.1.0-2.
> # no such package as openjp3d-tools in debian
> fixed 761357 2.1.0-2
Bug #761357 [src:openjpeg2] openjp3d-tools and libopenjp3d-tools: error when 
trying to install together
Marked as fixed in versions openjpeg2/2.1.0-2.
> Andreas,
Unknown command or malformed arguments to command.
> Let me know if I misunderstood your email:
Unknown command or malformed arguments to command.
> https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=46;bug=761355#46
Unknown command or malformed arguments to command.
> Regards
Unknown command or malformed arguments to command.
>
End of message, stopping processing here.

Please contact me if you need assistance.
-- 
761355: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761355
761357: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761357
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#778646: Multiple issues

2015-03-17 Thread Tomasz Buchert
Hi all,
Moritz - did you take a look at my patch? I'd really like to have a
second opinion on that since it is fairly large for an NMU.

I attach NMU patch. Shall I upload it to DELAYED/5 or something like
that?

Cheers,
Tomasz
diff -Nru potrace-1.11/debian/changelog potrace-1.11/debian/changelog
--- potrace-1.11/debian/changelog	2015-03-17 08:16:28.0 +0100
+++ potrace-1.11/debian/changelog	2015-03-17 08:19:09.0 +0100
@@ -1,3 +1,10 @@
+potrace (1.11-2.1) testing; urgency=medium
+
+  * Non-maintainer upload.
+  * Fix multiple integer overflows (Closes: #778646)
+
+ -- Tomasz Buchert   Tue, 17 Mar 2015 08:11:24 +0100
+
 potrace (1.11-2) unstable; urgency=low
 
   * Uses dh-autoreconf instead of autotools-dev (Closes: #732923)
diff -Nru potrace-1.11/debian/patches/0002-Fix-multiple-integer-overflows.patch potrace-1.11/debian/patches/0002-Fix-multiple-integer-overflows.patch
--- potrace-1.11/debian/patches/0002-Fix-multiple-integer-overflows.patch	1970-01-01 01:00:00.0 +0100
+++ potrace-1.11/debian/patches/0002-Fix-multiple-integer-overflows.patch	2015-03-17 08:19:09.0 +0100
@@ -0,0 +1,172 @@
+From: Tomasz Buchert 
+Date: Sun, 1 Mar 2015 20:27:29 +0100
+Subject: Fix multiple integer overflows.
+
+Dimensions of a BMP file are signed, 4-byte integers. Therefore the size
+of the image may be bigger than range of (int). This is fixed in
+bitmap.h, by casting all offsets to unsigned long long int (and fixing
+another possible overflow in bm_new).
+
+In bitmap_io.c we make sure that width and height of the image are
+non-negative and in (int) range, because other functions require it.
+
+Moreover, we make sure that allocations do not overflow the range of
+size_t by having a wrapper (safe_malloc) that tests whether the
+allocation size fits in size_t.
+---
+ src/bitmap.h| 35 +++
+ src/bitmap_io.c | 30 +++---
+ 2 files changed, 54 insertions(+), 11 deletions(-)
+
+diff --git a/src/bitmap.h b/src/bitmap.h
+index 1ce13d6..7110926 100644
+--- a/src/bitmap.h
 b/src/bitmap.h
+@@ -7,6 +7,7 @@
+ 
+ #include 
+ #include 
++#include 
+ 
+ /* The bitmap type is defined in potracelib.h */
+ #include "potracelib.h"
+@@ -27,7 +28,10 @@
+ /* macros for accessing pixel at index (x,y). U* macros omit the
+bounds check. */
+ 
+-#define bm_scanline(bm, y) ((bm)->map + (y)*(bm)->dy)
++typedef unsigned long long int ulli;
++
++#define bm_allocsize(bm) ((ulli)(bm)->dy * (ulli)(bm)->h)
++#define bm_scanline(bm, y) ((bm)->map + ((ulli)(y))*(ulli)(bm)->dy)
+ #define bm_index(bm, x, y) (&bm_scanline(bm, y)[(x)/BM_WORDBITS])
+ #define bm_mask(x) (BM_HIBIT >> ((x) & (BM_WORDBITS-1)))
+ #define bm_range(x, a) ((int)(x) >= 0 && (int)(x) < (a))
+@@ -43,6 +47,16 @@
+ #define BM_INV(bm, x, y) (bm_safe(bm, x, y) ? BM_UINV(bm, x, y) : 0)
+ #define BM_PUT(bm, x, y, b) (bm_safe(bm, x, y) ? BM_UPUT(bm, x, y, b) : 0)
+ 
++/* allocates memory safely */
++static inline void* safe_malloc(ulli size) {
++  size_t maxsize = (size_t)-1;
++  if (size > maxsize) {
++errno = ENOMEM;
++return NULL;
++  }
++  return malloc((size_t)size);
++}
++
+ /* free the given bitmap. Leaves errno untouched. */
+ static inline void bm_free(potrace_bitmap_t *bm) {
+   if (bm) {
+@@ -54,16 +68,21 @@ static inline void bm_free(potrace_bitmap_t *bm) {
+ /* return new un-initialized bitmap. NULL with errno on error */
+ static inline potrace_bitmap_t *bm_new(int w, int h) {
+   potrace_bitmap_t *bm;
+-  int dy = (w + BM_WORDBITS - 1) / BM_WORDBITS;
++  int dy;
++
++  if (w % BM_WORDBITS == 0)
++dy = w / BM_WORDBITS;
++  else
++dy = (w / BM_WORDBITS) + 1;
+ 
+-  bm = (potrace_bitmap_t *) malloc(sizeof(potrace_bitmap_t));
++  bm = (potrace_bitmap_t *)safe_malloc(sizeof(potrace_bitmap_t));
+   if (!bm) {
+ return NULL;
+   }
+   bm->w = w;
+   bm->h = h;
+   bm->dy = dy;
+-  bm->map = (potrace_word *) malloc(dy * h * BM_WORDSIZE);
++  bm->map = (potrace_word *)safe_malloc(bm_allocsize(bm) * BM_WORDSIZE);
+   if (!bm->map) {
+ free(bm);
+ return NULL;
+@@ -73,7 +92,7 @@ static inline potrace_bitmap_t *bm_new(int w, int h) {
+ 
+ /* clear the given bitmap. Set all bits to c. */
+ static inline void bm_clear(potrace_bitmap_t *bm, int c) {
+-  memset(bm->map, c ? -1 : 0, bm->dy * bm->h * BM_WORDSIZE);
++  memset(bm->map, c ? -1 : 0, bm_allocsize(bm) * BM_WORDSIZE);
+ }
+ 
+ /* duplicate the given bitmap. Return NULL on error with errno set. */
+@@ -82,14 +101,14 @@ static inline potrace_bitmap_t *bm_dup(const potrace_bitmap_t *bm) {
+   if (!bm1) {
+ return NULL;
+   }
+-  memcpy(bm1->map, bm->map, bm->dy * bm->h * BM_WORDSIZE);
++  memcpy(bm1->map, bm->map, bm_allocsize(bm) * BM_WORDSIZE);
+   return bm1;
+ }
+ 
+ /* invert the given bitmap. */
+ static inline void bm_invert(potrace_bitmap_t *bm) {
+-  int i;
+-  for (i = 0; i < bm->dy * bm->h; i++) {
++  ulli i;
++  for (i = 0; i < bm_allocsize(bm); i++) {
+ bm->map[i] ^= BM_ALLBITS;
+   }
+ }
+diff --git

Bug#780599: verbiste: FTBFS on various architectures due to outdated symbols file

2015-03-17 Thread Tomasz Buchert
Hi,
Guillem in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780489
noticed that some symbols indeed changed from unsigned long to
unsigned int.  It is because size_t resolves to unsigned int instead
of unsigned long as before.  So it is rather a toolchain change that
makes size_t defined in a different way.

The funny thing is that on i386 for example, unsigned long & unsinged
int is the same thing, but it still mangles differently :).

I think that the right solution is to get rid of size_t from public
libverbiste API (replace it with unsigned long) and shield ourselves
from changes like that. I'll work on that.


Now, I also built 0.1.14-2 on testing i386 and it built fine (with
debuild -us -uc), but when I tried *exactly the same package* from git
on testing i386 (but with git-buildpackage), it fails with symbols
problem. It seems that in both cases size_t resolves to a different type!
It's rather strange.

Cheers,
Tomasz


signature.asc
Description: Digital signature