Processed: severity of 780675 is important
Processing commands for cont...@bugs.debian.org: > severity 780675 important Bug #780675 [systemd] systemd: segfault in systemd when running systemctl daemon-reload Severity set to 'important' from 'critical' > thanks Stopping processing here. Please contact me if you need assistance. -- 780675: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780675 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: tagging 780703
Processing commands for cont...@bugs.debian.org: > tags 780703 + pending Bug #780703 [src:eclipse-pydev] eclipse-pydev fails to build from source Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 780703: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780703 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: your mail
Processing commands for cont...@bugs.debian.org: > severity 780565 grave Bug #780565 [capnproto] capnproto: CVE-2015-2310: Integer overflow in pointer validation Severity set to 'grave' from 'critical' > severity 780566 grave Bug #780566 [capnproto] capnproto: CVE-2015-2311: Integer underflow in pointer validation Severity set to 'grave' from 'critical' > severity 780567 grave Bug #780567 [capnproto] capnproto: CVE-2015-2312: CPU usage amplification attack Severity set to 'grave' from 'critical' > severity 780568 grave Bug #780568 [capnproto] capnproto: CVE-2015-2313: CPU usage amplification attack #2 Severity set to 'grave' from 'critical' > thanks Stopping processing here. Please contact me if you need assistance. -- 780565: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780565 780566: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780566 780567: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780567 780568: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780568 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#780703: eclipse-pydev fails to build from source
Package: src:eclipse-pydev Version: 3.9.2-1 Severity: serious Tags: sid stretch see the debian buildds for the binary-arch build failures, for the binary-indep build failure see https://launchpad.net/ubuntu/+source/eclipse-pydev/3.9.2-1 BUILD FAILED /usr/lib/eclipse/dropins/sdk/plugins/org.eclipse.pde.build_3.8.1.dist/scripts/build.xml:35: The following error occurred while executing this line: /usr/lib/eclipse/dropins/sdk/plugins/org.eclipse.pde.build_3.8.1.dist/scripts/build.xml:91: The following error occurred while executing this line: /usr/lib/eclipse/dropins/sdk/plugins/org.eclipse.pde.build_3.8.1.dist/templates/package-build/customTargets.xml:19: The following error occurred while executing this line: /usr/lib/eclipse/dropins/sdk/plugins/org.eclipse.pde.build_3.8.1.dist/scripts/genericTargets.xml:111: Processing inclusion from feature org.python.pydev.feature: Bundle org.python.pydev.jython_3.9.2.dist failed to resolve.: Missing required plug-in org.python_0.0.0. Total time: 2 seconds An error has occurred. See the log file -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#775733: xemacs21-gnome-*: hangs during upgrade from squeeze -> wheezy -> jessie
On 2015-03-17 11:21, Mark Brown wrote: > OK, thanks for the command lines. How about the analysis for the patch? > I'm not keen on just applying random changes without understanding. The Conflicts against the old transitional packages ensure they get removed before the new versions are unpacked. Circular package dependencies are problematic, since they need to be broken arbitrarily to form a dag in order to perform topsort to get a possible package configuration order. circular deps often exhibit problems during upgrades in some corner cases - recently the ancient one between perl and perl-modules removed since it caused upgrade issues (reproducible ones, but there were probably a lot of spurious ones in the past). Since there are at least 2 points where the dependency can be broken, a subtle change in the system can cause apt to do the break elsewhere - maybe doing a much worse decision than before. As I understood #735268, the strict dependency xemacs21-support -> xemacs21 is no longer needed, so I removed that as well to break the circular dependency and always have a deterministic configuration order of the xemacs21 packages - that would simplify further debugging (which luckily was not needed). All xemacs21* packages passed my piuparts tests after applying this patch - no more hangs :-) Hope that helps. Andreas -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#780139: marked as done (CVE-2015-0885)
Your message dated Tue, 17 Mar 2015 22:17:05 + with message-id and subject line Bug#780139: fixed in checkpw 1.02-1+deb7u1 has caused the Debian Bug report #780139, regarding CVE-2015-0885 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 780139: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780139 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: checkpw Severity: grave Tags: security Hi Gerrit, please see https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0885 (feel free to lower the severity, I don't know checkpw myself) I'm attaching a cleaned-up diff between the 1.03 and 1.02 releases. Cheers, Moritz diff -Naur checkpw-1.02/checkapoppw.c checkpw-1.03/checkapoppw.c --- checkpw-1.02/checkapoppw.c 2002-01-07 08:25:10.0 +0100 +++ checkpw-1.03/checkapoppw.c 2015-02-21 00:42:57.0 +0100 @@ -85,7 +85,7 @@ pw = getpwnam(login); if (pw) break; if (errno == error_txtbsy) die(111); -for (; ext != login && *ext != '-'; --ext); +do {--ext;} while (ext != login && *ext != '-'); if (ext == login) die(1); if (i) login[i] = '-'; i = ext - login; diff -Naur checkpw-1.02/checkpw.c checkpw-1.03/checkpw.c --- checkpw-1.02/checkpw.c 2002-01-07 08:23:51.0 +0100 +++ checkpw-1.03/checkpw.c 2015-02-21 00:42:33.0 +0100 @@ -71,7 +71,7 @@ pw = getpwnam(login); if (pw) break; if (errno == error_txtbsy) die(111); -for (; ext != login && *ext != '-'; --ext); +do {--ext;} while (ext != login && *ext != '-'); if (ext == login) die(1); if (i) login[i] = '-'; i = ext - login; --- End Message --- --- Begin Message --- Source: checkpw Source-Version: 1.02-1+deb7u1 We believe that the bug you reported is fixed in the latest version of checkpw, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 780...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Salvatore Bonaccorso (supplier of updated checkpw package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 16 Mar 2015 13:20:09 +0100 Source: checkpw Binary: checkpw Architecture: source amd64 Version: 1.02-1+deb7u1 Distribution: wheezy-security Urgency: high Maintainer: Gerrit Pape Changed-By: Salvatore Bonaccorso Description: checkpw- checks password which is stored in ~/Maildir/.password Closes: 780139 Changes: checkpw (1.02-1+deb7u1) wheezy-security; urgency=high . * Non-maintainer upload by the Security Team. * CVE-2015-0885: Fix denial of service via -- in usernames (Closes: #780139) Checksums-Sha1: e0eeb81fd87be9aba1148d70ca359d4dfc2f215a 1592 checkpw_1.02-1+deb7u1.dsc 6a290aedf75f34401efc329c9eb1eb650e3181df 28631 checkpw_1.02.orig.tar.gz 0f68be23961de2f489ceaeb3b8276124b45dbcd0 6867 checkpw_1.02-1+deb7u1.diff.gz 4fef9a749cb0a99bb97cb4aea8b56015c947f91d 19572 checkpw_1.02-1+deb7u1_amd64.deb Checksums-Sha256: b96dcacae34fd526b84e437f41465cfa1505fa58c201e0c7004ebc514f9ef63b 1592 checkpw_1.02-1+deb7u1.dsc 685a7fd4f4c783d0dcee342d109b0e492d3251e3c0cbc0ef77d33613cac6bced 28631 checkpw_1.02.orig.tar.gz d3fb6b5c43d0728c691997000e848c51b6a406fb7e817dca986ddda4992d0478 6867 checkpw_1.02-1+deb7u1.diff.gz 2fc5946c28e5dba5b117fcb1b9978b377115b20397db07bf5eb26b418e7bc612 19572 checkpw_1.02-1+deb7u1_amd64.deb Files: 251c2ce9afa9eae7318cfeb182c9cedb 1592 mail optional checkpw_1.02-1+deb7u1.dsc 0f71643b3e4f6b856f44d1fedd6ceb38 28631 mail optional checkpw_1.02.orig.tar.gz 8c25c507688045224ad4713129f880d5 6867 mail optional checkpw_1.02-1+deb7u1.diff.gz 09e9c6b8aa22bf0549e3e5e4d32e143f 19572 mail optional checkpw_1.02-1+deb7u1_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBCgAGBQJVBs1KAAoJEAVMuPMTQ89EeKYP/0Jj65jWl2AWPM4OrtaBJ1jR iI0avosHvpFtqmVdPgrS8VQjFwjvIfJb1x2QoQDro/S16RZEcv1avLfkak3XG/3k hL6KI2A6KDxmpCQlNCDfaYEv14zeopu44v/ju+x3DmiqlpCpFjdV4Q6x0SI4xCad A1VXlPiCJEupFq3nQ0TiR8BD95qLe0GFfZB6Flz2HAAP3oszVyEnqIPo98ysIohA 8LP8ji83SLbT74k8v3cC1HOCL2nNJLXz/w9/AMs+HSCmpFpxAy7Kx23wRgvwSEB7 Gwd+BoD+JJV3e4UUqKXeWPIAkbmvDZEnOzbkyBt+XK/Uqi0CQF6+LpZC3VkFI3s7 +CCJYvT44oYdD4EZmEz2e1EpuPDEic1aZFykENYDT0f6KaqJ564gt8n2cTk
Bug#780410: marked as done (osc: CVE-2015-0778: osc _service file shell injection flaw)
Your message dated Tue, 17 Mar 2015 22:18:15 + with message-id and subject line Bug#780410: fixed in osc 0.134.1-2+deb7u1 has caused the Debian Bug report #780410, regarding osc: CVE-2015-0778: osc _service file shell injection flaw to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 780410: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780410 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: osc Version: 0.134.1-1 Severity: grave Tags: security upstream patch fixed-upstream Hi, the following vulnerability was published for osc. Note that I have choosen severity grave since it allows client side arbitrary command execution via a crafted service file, but I don't know osc well enough, so please adjust severity if you disagree. CVE-2015-0778[0]: shell command injection via crafted _service files If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2015-0778 [1] https://bugzilla.novell.com/show_bug.cgi?id=901643 [2] https://bugzilla.novell.com/attachment.cgi?id=626334 Please adjust the affected versions in the BTS as needed. Regards, Salvatore --- End Message --- --- Begin Message --- Source: osc Source-Version: 0.134.1-2+deb7u1 We believe that the bug you reported is fixed in the latest version of osc, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 780...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Michal Čihař (supplier of updated osc package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Tue, 17 Mar 2015 09:19:04 +0100 Source: osc Binary: osc Architecture: source all Version: 0.134.1-2+deb7u1 Distribution: stable Urgency: high Maintainer: Michal Čihař Changed-By: Michal Čihař Description: osc- OpenSUSE (buildsystem) commander Closes: 780410 Changes: osc (0.134.1-2+deb7u1) stable; urgency=high . * Fix shell injection (Closes: #780410, CVE-2015-0778). Checksums-Sha1: a12360403780bd1c7a95533a91bcc89a0edaf931 1981 osc_0.134.1-2+deb7u1.dsc 1af7a5b96131b0fbe2e928a2eb4fe1d9becfa5b7 5761 osc_0.134.1-2+deb7u1.debian.tar.gz 69266de67a7fbfcbb4f872aaa1bdcfddc1f7b96c 226038 osc_0.134.1-2+deb7u1_all.deb Checksums-Sha256: aaa45062a5f3f2daecbdb6f1d3b55a91f6352f38b66a0d5eace5c2108ef370d3 1981 osc_0.134.1-2+deb7u1.dsc bd9748dfd288f900f880b610cf8ec6269f85d70fd13639c2317f88db355b0e52 5761 osc_0.134.1-2+deb7u1.debian.tar.gz e45220dd342aca140dca1e55590895abc17510e23745f95fcd0db8e871b85442 226038 osc_0.134.1-2+deb7u1_all.deb Files: 245ca1c949a159360b98d53f4d82840f 1981 devel extra osc_0.134.1-2+deb7u1.dsc cddf3dfe7118d7c29fa199a8b502be0e 5761 devel extra osc_0.134.1-2+deb7u1.debian.tar.gz 09c34f3acc66bb1419fa6eb5fc47d145 226038 devel extra osc_0.134.1-2+deb7u1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBCAAGBQJVB+jyAAoJEGo39bHX+xdN/BAP/jlneekMTEsDFm3Wgtpev6Hi zjVmeJs9O2ssyBOnHGMDv8zTVP4go8acAUS6hNdcAbfRA53jBynqkLiOMFDEnlXD ja5A2w7tu5sB99b0bStlnkOrb8NrE/i31UbIL5H0YCI5+zJ+3+QQ5GDgM9zhTK3R 1uppkjuVdcDaMnXX8QZoQT1A/Y2b1OTy5+vWDoQE+k7MmdzBmfXVKXXE73CHY2Sf sMY6MuDZmSc7trBWK5+hISmBQwOA3YeCYp9XJbfSeqhnYQ/ryOzZqkVhlkcFEEwv HnwfpvbOJ/4AeC9Zdf3PdCBRcZb+8BSr5Y/irt3V9/EhOl56JK7Frip1vjyNwqcN M+XmEanADJSf2uHDUUjzb5HuB7z/8eRc/VYKrocuTl6+Qs2pZHzMbTj83tmVDFzp WY/c85xyCz2wNsVWQxPyRfy7pBX5kxO1W7R6wVgT5nasgeY9YjzXDDY5hiik7qlV 1KiXf9ZjT6+kQoyvoq51jvCPounQfhtiLLD4yj4OwfBZLPCS5716HOg3uEA5CEzu ROXZwQw7pUspGLcyHeKcI5GBIaVJdme4gkpycnrURPrNXBkqYAp12ERs5ovlgdp7 L0J/TWk+iVAAwOzG8jjEm3tM5fb22Uj3nR35ELB0vdOAEMSZ5EA9hpk7NZ/xWI7s 8RnwECKhibzDPDMDfcuJ =enQM -END PGP SIGNATURE End Message ---
Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload
Am 17.03.2015 um 23:02 schrieb Robert Pumphrey: > I have identified a duff init.d script (one of our own that previously > worked in wheezy) that is at the root of this problem. I have removed > the script, rebooted and the I can now run systemctl daemon-reload > withough a seg fault. > This bug may just indicate that systemd poorly handles a bad init > script. Please let me know if you would like details of our broken > script, otherwise, I am happy for this to be closed. If you can share this init script, this would be appreciated. systemd certainly shouldn't die because of such a faulty init script and I'm actually surprised it does, since the SysV support is basically done in an external generator. So there must be something very fishy with the generated unit. As said, if you can attach the faulty init script, that would be great. Michael -- Why is it that all of the instruments seeking intelligent life in the universe are pointed away from Earth? signature.asc Description: OpenPGP digital signature
Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload
On 17/03/15 21:07, Michael Biebl wrote: Am 17.03.2015 um 19:35 schrieb Michael Biebl: Am 17.03.2015 um 19:05 schrieb Robert Pumphrey: #0 0x7f8d3e06779b in raise (sig=11) at ../nptl/sysdeps/unix/sysv/linux/pt-raise.c:37 resultvar = 0 pid = #1 0x7f8d3e4bd3d8 in ?? () No symbol table info available. #2 No locals. #3 0x7f8d3e4422a0 in ?? () No symbol table info available. #4 0x7f8d3e4f8caa in ?? () No symbol table info available. #5 0x7f8d3e56777f in ?? () No symbol table info available. #6 0x7f8d3e55f558 in ?? () No symbol table info available. #7 0x7f8d3e4bac6b in ?? () No symbol table info available. #8 0x7f8d3dcd0b45 in __libc_start_main (main=0x7f8d3e4b6dd0, argc=1, argv=0x7ffd3c533ea8, init=, fini=, rtld_fini=, stack_end=0x7ffd3c533e98) at libc-start.c:287 result = unwind_buf = {cancel_jmp_buf = {{jmp_buf = {0, 5361389912737802513, 140244612264611, 140725615541920, 0, 0, -5360124553165444847, -5369135033269130991}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x7ffd3c533eb8, 0x7f8d3e4971a8}, data = {prev = 0x0, cleanup = 0x0, canceltype = 1012088504}}} not_first_call = #9 0x7f8d3e4bb2cc in ?? () No symbol table info available. Hm, nothing interesting/relevant in there. Almost as if the symbols do not match the binary/core dump or the crash is not in systemd itself. Do you have systemd-dbg installed? I have identified a duff init.d script (one of our own that previously worked in wheezy) that is at the root of this problem. I have removed the script, rebooted and the I can now run systemctl daemon-reload withough a seg fault. This bug may just indicate that systemd poorly handles a bad init script. Please let me know if you would like details of our broken script, otherwise, I am happy for this to be closed. Thank you for your patience in helping me report this problem. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload
On 17/03/15 21:07, Michael Biebl wrote: Am 17.03.2015 um 19:35 schrieb Michael Biebl: Am 17.03.2015 um 19:05 schrieb Robert Pumphrey: #0 0x7f8d3e06779b in raise (sig=11) at ../nptl/sysdeps/unix/sysv/linux/pt-raise.c:37 resultvar = 0 pid = #1 0x7f8d3e4bd3d8 in ?? () No symbol table info available. #2 No locals. #3 0x7f8d3e4422a0 in ?? () No symbol table info available. #4 0x7f8d3e4f8caa in ?? () No symbol table info available. #5 0x7f8d3e56777f in ?? () No symbol table info available. #6 0x7f8d3e55f558 in ?? () No symbol table info available. #7 0x7f8d3e4bac6b in ?? () No symbol table info available. #8 0x7f8d3dcd0b45 in __libc_start_main (main=0x7f8d3e4b6dd0, argc=1, argv=0x7ffd3c533ea8, init=, fini=, rtld_fini=, stack_end=0x7ffd3c533e98) at libc-start.c:287 result = unwind_buf = {cancel_jmp_buf = {{jmp_buf = {0, 5361389912737802513, 140244612264611, 140725615541920, 0, 0, -5360124553165444847, -5369135033269130991}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x7ffd3c533eb8, 0x7f8d3e4971a8}, data = {prev = 0x0, cleanup = 0x0, canceltype = 1012088504}}} not_first_call = #9 0x7f8d3e4bb2cc in ?? () No symbol table info available. Hm, nothing interesting/relevant in there. Almost as if the symbols do not match the binary/core dump or the crash is not in systemd itself. Do you have systemd-dbg installed? Sorry for failing to follow simple instructions. I have now installed systemd-dbg #0 0x7f89d974f79b in raise (sig=11) at ../nptl/sysdeps/unix/sysv/linux/pt-raise.c:37 resultvar = 0 pid = #1 0x7f89d9ba53d8 in crash.lto_priv.234 (sig=11) at ../src/core/main.c:158 rl = {rlim_cur = 18446744073709551615, rlim_max = 18446744073709551615} sa = {__sigaction_handler = {sa_handler = 0x0, sa_sigaction = 0x0}, sa_mask = {__val = {0 }}, sa_flags = 0, sa_restorer = 0x0} __func__ = "crash" __PRETTY_FUNCTION__ = "crash" #2 No locals. #3 0x7f89d9b262e0 in ?? () No symbol table info available. #4 0x7f89d9be0caa in bucket_hash () at ../src/shared/hashmap.c:168 p = 0x7f89da3efbe0 h = 0x7f89d9b0a860 #5 hashmap_remove (h=0x7f89d9b0a860, key=key@entry=0x7f89da3efbe0) at ../src/shared/hashmap.c:574 e = data = #6 0x7f89d9c00f15 in set_remove (s=, value=value@entry=0x7f89da3efbe0) at ../src/shared/set.c:75 No locals. #7 0x7f89d9c4f77f in bidi_set_free (s=0x7f89d9b0a9a0, u=0x7f89da3efbe0) at ../src/core/unit.c:372 d = i = 0x other = 0x7f89da3efbe0 #8 unit_free (u=0x7f89da3efbe0) at ../src/core/unit.c:484 d = i = 0x t = __PRETTY_FUNCTION__ = "unit_free" #9 0x7f89d9c47558 in manager_clear_jobs_and_units.lto_priv.948 ( m=0x7f89da36e6a0) at ../src/core/manager.c:759 u = __PRETTY_FUNCTION__ = "manager_clear_jobs_and_units" #10 0x7f89d9ba2c6b in manager_reload (m=0x7f89da36e6a0) at ../src/core/manager.c:2413 q = fds = r = 0 f = 0x7f89da43a070 #11 main (argc=1, argv=) at ../src/core/main.c:1758 m = 0x7f89da36e6a0 r = retval = 1 before_startup = after_startup = timespan = "f\336\b`\330qX\034Q\343\061\256\272\343\222|s\302x\356.cx\204\221U_\025J=G\363BE\325\354/cx\204\060cx\204\221x\251ݹ\373\062\000\362?\355s\240sU\241\063S\247\273" fds = 0x0 reexecute = false shutdown_verb = 0x0 initrd_timestamp = {realtime = 0, monotonic = 0} userspace_timestamp = {realtime = 1426610793563272, monotonic = 5250159} kernel_timestamp = {realtime = , monotonic = 0} security_start_timestamp = {realtime = 1426610793568857, monotonic = 5255744} security_finish_timestamp = {realtime = 1426610793569662, monotonic = 5256549} systemd = "systemd" skip_setup = false j = loaded_policy = arm_reboot_watchdog = false queue_default_job = empty_etc = switch_root_dir = 0x0 switch_root_init = 0x0 __func__ = "main" __PRETTY_FUNCTION__ = "main" debsums indicates everything is operating as expected. memtester has not yet thrown up any errors. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#779081: open-vm-dkms: vmhfgs module fails to compile with kernel 3.2.65-1+deb7u2
Hi, too bad, seems the kernel maintainers backported some patches which break the open-vm-tools-dkms modules in stable. You have two options until I can fix the open-vm-tools package in stable: - do not use the open-vm-tools-dkms package. Unless you are using vmware player or need the old vmxnet module, chances are low you need it at all. - use the open-vm-tools backport from wheezy-backports I'll provide a fixed package with the upcoming point releases. Cheers, Bernd -- Bernd ZeimetzDebian GNU/Linux Developer http://bzed.dehttp://www.debian.org GPG Fingerprint: ECA1 E3F2 8E11 2432 D485 DD95 EB36 171A 6FF9 435F -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload
Am 17.03.2015 um 19:35 schrieb Michael Biebl: > Am 17.03.2015 um 19:05 schrieb Robert Pumphrey: >> #0 0x7f8d3e06779b in raise (sig=11) at >> ../nptl/sysdeps/unix/sysv/linux/pt-raise.c:37 >> resultvar = 0 >> pid = >> #1 0x7f8d3e4bd3d8 in ?? () >> No symbol table info available. >> #2 >> No locals. >> #3 0x7f8d3e4422a0 in ?? () >> No symbol table info available. >> #4 0x7f8d3e4f8caa in ?? () >> No symbol table info available. >> #5 0x7f8d3e56777f in ?? () >> No symbol table info available. >> #6 0x7f8d3e55f558 in ?? () >> No symbol table info available. >> #7 0x7f8d3e4bac6b in ?? () >> No symbol table info available. >> #8 0x7f8d3dcd0b45 in __libc_start_main (main=0x7f8d3e4b6dd0, >> argc=1, argv=0x7ffd3c533ea8, init=, fini=, >> rtld_fini=, stack_end=0x7ffd3c533e98) >> at libc-start.c:287 >> result = >> unwind_buf = {cancel_jmp_buf = {{jmp_buf = {0, >> 5361389912737802513, 140244612264611, 140725615541920, 0, 0, >> -5360124553165444847, -5369135033269130991}, mask_was_saved = 0}}, priv >> = {pad = {0x0, 0x0, >> 0x7ffd3c533eb8, 0x7f8d3e4971a8}, data = {prev = 0x0, >> cleanup = 0x0, canceltype = 1012088504}}} >> not_first_call = >> #9 0x7f8d3e4bb2cc in ?? () >> No symbol table info available. > > Hm, nothing interesting/relevant in there. Almost as if the symbols do > not match the binary/core dump or the crash is not in systemd itself. Do you have systemd-dbg installed? -- Why is it that all of the instruments seeking intelligent life in the universe are pointed away from Earth? signature.asc Description: OpenPGP digital signature
Bug#778828: dmsetup: please add Breaks: live-tools (<< 4.0.1-1)
Control: severity -1 wishlist On Fri, Feb 20, 2015 at 12:50:44PM +0100, Andreas Beckmann wrote: > In order to ensure smooth upgrades from wheezy to jessie dmsetup needs > to break the wheezy version of live-tools. live-tools/wheezy diverts > update-initramfs in a way that breaks dmsetup's postinst. This is fixed > in live-tools/jessie, so we just need to ensure that the new live-tools > gets unpacked first. Please remove the diversion first. I don't think about adding this conflict. Bastian -- What kind of love is that? Not to be loved; never to have shown love. -- Commissioner Nancy Hedford, "Metamorphosis", stardate 3219.8 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#778828: dmsetup: please add Breaks: live-tools (<< 4.0.1-1)
Processing control commands: > severity -1 wishlist Bug #778828 [dmsetup] dmsetup: please add Breaks: live-tools (<< 4.0.1-1) Severity set to 'wishlist' from 'serious' -- 778828: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778828 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: tagging 776987
Processing commands for cont...@bugs.debian.org: > tags 776987 + help Bug #776987 [libsqlcipher0] libsqlcipher0: change in VERSION affects code depending on SQLITE_VERSION_NUMBER Added tag(s) help. > thanks Stopping processing here. Please contact me if you need assistance. -- 776987: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776987 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#780439: tcl8.6: upgrade issues switching from tcl8.4/wheezy to tcl/jessie
Processing control commands: > severity -1 normal Bug #780439 [tcl8.6] tcl8.6: upgrade issues switching from tcl8.4/wheezy to tcl/jessie Severity set to 'normal' from 'serious' -- 780439: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780439 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#780439: tcl8.6: upgrade issues switching from tcl8.4/wheezy to tcl/jessie
Control: severity -1 normal On Fri, Mar 13, 2015 at 23:06:59 +0100, Andreas Beckmann wrote: > Package: tcl8.6 > Version: 8.6.2+dfsg-1 > Severity: serious > Tags: patch > User: debian...@lists.debian.org > Usertags: piuparts > > Hi, > > analyzing some piuparts logs in depth showed an issue with fsl being > hold at the wheezy version rather than being upgraded. > Andreas, please stop filing such bugs at RC severity. A package being held back on dist-upgrade is *not* serious. A serious bug would be if the upgrade *fails* for some reason. Thanks, Julien signature.asc Description: Digital signature
Bug#755202: [Pkg-utopia-maintainers] Bug#755202: network-manager: keeps creating and using new connection "eth0" that does not work
Am 13.03.2015 um 22:18 schrieb Stefano Zacchiroli: > On Fri, Mar 13, 2015 at 10:06:42PM +0100, Michael Biebl wrote: >> So, it would be immensly helpful, if someone can provide me with a >> detailed description of his network setup (what interfaces are managed >> by NetworkManager, what by ifupdown, what's the individual configuration >> and available interfaces, etc.). >> Then the exact circumstances, when this happens and if this happens >> reliably and how it can be triggered. > > Hey Michael, I've since then commented out the following lines in my > /etc/network/interfaces: > > # # The primary network interface > # allow-hotplug eth0 > # iface eth0 inet dhcp > # # This is an autoconfigured IPv6 interface > # iface eth0 inet6 auto > > after doing that I've not been able to reproduce this bug. > > Not sure if this info helps or not... > Well, this sounds like you have an eth0 configuration, which is enabled always, even if there is not link. Eventually, dhclient times out and you get a link-local address and most likely, the default route is set via eth0. I don't see that as a bug in NM, or do you disagree? On could argue, that this is a misconfiguration and you should use ifplugd to activate your connection when a link is available, or teach ifup to fail if there is no link (or simply use NM for eth0 as well). Michael -- Why is it that all of the instruments seeking intelligent life in the universe are pointed away from Earth? signature.asc Description: OpenPGP digital signature
Bug#780255: openconnect: kmod update from version 18 to 20 breaks openconnect
Am 17.03.2015 um 19:58 schrieb Michael Biebl: > On Wed, 11 Mar 2015 10:29:27 -0400 Mike Miller wrote: >> Control: reassign -1 kmod 20-1 >> Control: forcemerge 780256 -1 >> >> On Wed, Mar 11, 2015 at 10:55:16 +0200, Matti Koskimies wrote: >>> kmod update from version 18 to 20 >>> >>> Connection failed with the error messages: >>> >>> TUNSETIFF failed: inappropriate ioctl for device >>> set up tun device failed >> >> Confirmed, this is because kmod 20 no longer sets up the /dev/net/tun >> device at init. See bugs #780256 and #780263. >> >> If you 'modprobe kmod' before attempting to run openconnect it works as >> expected. >> >> Merging this into #780256. > > This should actually only happen for users, which still use sysvinit, > since the udev SysV init script doesn't deal with '!' syntax. > > Matti is apparently using systemd as PID1. > So either, he filed this bug on a different machine or this is a > different bug. I need to correct that. While systemd-tmpfiles does indeed support the '!' syntax, in v215 it doesn't yet call systemd-tmpfiles with the --boot parameter, which is apparently necessary to allow that [1]. This means, we'll need to cherry-pick that commit and also fix the SysV init script. (Sorry for the confusion, I'm running the v219 package) Michael [1] http://cgit.freedesktop.org/systemd/systemd/commit/?id=8c94052ee543c3598a3c7b0c46688150aa2c6168 -- Why is it that all of the instruments seeking intelligent life in the universe are pointed away from Earth? signature.asc Description: OpenPGP digital signature
Bug#780256: Stopped auto-loading tun module
Am 17.03.2015 um 19:55 schrieb Michael Biebl: > Hi Joachim, > > On Wed, 11 Mar 2015 10:00:54 +0100 Joachim Breitner > wrote: >> Package: kmod >> Version: 20-1 >> Severity: normal >> >> Hi, >> >> yesterday I upgraded a few packages; today tinc (a VPN daemon) would not >> start because /dev/net/tun was no longer available. A "modprobe tun" >> would fix the problem. >> >> Since it worked before, and the only module-related upgrade wa kmod: >> 2015-03-10 11:07:32 upgrade kmod:amd64 18-3 20-1 >> I am assuming something broke here. >> >> If this terse report is not sufficent to track down the problem, let me >> know. > >> Init: systemd (via /run/systemd/system) > > This bug should not affect systems running systemd. > Did you experience this issue on another system running sysvinit using > the udev SysV init script? I need to correct that. While systemd-tmpfiles does indeed support the '!' syntax, in v215 it doesn't yet call systemd-tmpfiles with the --boot parameter, which is apparently necessary to allow that [1]. This means, we'll need to cherry-pick that commit and also fix the SysV init script. (Sorry for the confusion, I'm running the v219 package) Michael [1] http://cgit.freedesktop.org/systemd/systemd/commit/?id=8c94052ee543c3598a3c7b0c46688150aa2c6168 -- Why is it that all of the instruments seeking intelligent life in the universe are pointed away from Earth? signature.asc Description: OpenPGP digital signature
Bug#780680: libpam-modules: pam_userdb.so depends on a library in /usr
package: libpam-modules Version: 1.1.3-7.1 Severity: serious A library in /lib shouldn't depend on a library in /usr/lib. However, pam_userdb.so has such an issue. == root@zoot:~# ldd /lib/x86_64-linux-gnu/security/pam_userdb.so linux-vdso.so.1 (0x76081000) libpam.so.0 => /lib/x86_64-linux-gnu/libpam.so.0 (0x7f22218a3000) libdb-5.1.so => /usr/lib/x86_64-linux-gnu/libdb-5.1.so (0x7f222152) libcrypt.so.1 => /lib/x86_64-linux-gnu/libcrypt.so.1 (0x7f22212e8000) libc.so.6 => /lib/x86_64-linux-gnu/libc.so.6 (0x7f2220f3f000) libdl.so.2 => /lib/x86_64-linux-gnu/libdl.so.2 (0x7f2220d3b000) libpthread.so.0 => /lib/x86_64-linux-gnu/libpthread.so.0 (0x7f2220b1d000) /lib64/ld-linux-x86-64.so.2 (0x7f2221cc4000) == This problem also seems to still be around in version 1.1.8-3.1, which is in jessie. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#780256: Stopped auto-loading tun module
Hi Joachim, On Wed, 11 Mar 2015 10:00:54 +0100 Joachim Breitner wrote: > Package: kmod > Version: 20-1 > Severity: normal > > Hi, > > yesterday I upgraded a few packages; today tinc (a VPN daemon) would not > start because /dev/net/tun was no longer available. A "modprobe tun" > would fix the problem. > > Since it worked before, and the only module-related upgrade wa kmod: > 2015-03-10 11:07:32 upgrade kmod:amd64 18-3 20-1 > I am assuming something broke here. > > If this terse report is not sufficent to track down the problem, let me > know. > Init: systemd (via /run/systemd/system) This bug should not affect systems running systemd. Did you experience this issue on another system running sysvinit using the udev SysV init script? -- Why is it that all of the instruments seeking intelligent life in the universe are pointed away from Earth? signature.asc Description: OpenPGP digital signature
Bug#780255: openconnect: kmod update from version 18 to 20 breaks openconnect
On Wed, 11 Mar 2015 10:29:27 -0400 Mike Miller wrote: > Control: reassign -1 kmod 20-1 > Control: forcemerge 780256 -1 > > On Wed, Mar 11, 2015 at 10:55:16 +0200, Matti Koskimies wrote: > > kmod update from version 18 to 20 > > > > Connection failed with the error messages: > > > > TUNSETIFF failed: inappropriate ioctl for device > > set up tun device failed > > Confirmed, this is because kmod 20 no longer sets up the /dev/net/tun > device at init. See bugs #780256 and #780263. > > If you 'modprobe kmod' before attempting to run openconnect it works as > expected. > > Merging this into #780256. This should actually only happen for users, which still use sysvinit, since the udev SysV init script doesn't deal with '!' syntax. Matti is apparently using systemd as PID1. So either, he filed this bug on a different machine or this is a different bug. Michael -- Why is it that all of the instruments seeking intelligent life in the universe are pointed away from Earth? signature.asc Description: OpenPGP digital signature
Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload
Am 17.03.2015 um 19:05 schrieb Robert Pumphrey: > > > On 17/03/15 17:52, Michael Biebl wrote: >> control: tags -1 moreinfo >> control: tags -1 unreproducible >> >> Am 17.03.2015 um 18:14 schrieb Robert Pumphrey: >>> Package: systemd >>> Version: 215-12 >>> Severity: critical >>> Justification: breaks the whole system >>> >>> Dear Maintainer, >>> >>> running systemctl daemon-reload causes systemd to segfault : >>> >>> root@host:~# systemctl daemon-reload >>> >>> Message from syslogd@host at Mar 17 16:41:53 ... >>> kernel:[ 758.716467] systemd[1]: segfault at 7f8d3e4422a0 ip >>> 7f8d3e4422a0 sp 7ffd3c533458 error 15 >>> Failed to execute operation: Connection reset by peer >>> >>> I have disabled as many services as possible, but still get the error. >>> I have not been able to reproduce on another machine >> >> Can you reproduce the step, how you got this crash? Did this happen once >> or multiple times? > > This problem happens every time I run systemctl daemon-reload on this > particular machine. I have installed jessie on another machine and not > been able to reproduce it, but the hardware is not the same. > Could you check for faulty RAM (with memtest) and run debsums over your installed packages. -- Why is it that all of the instruments seeking intelligent life in the universe are pointed away from Earth? signature.asc Description: OpenPGP digital signature
Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload
Am 17.03.2015 um 19:05 schrieb Robert Pumphrey: > > > On 17/03/15 17:52, Michael Biebl wrote: >> control: tags -1 moreinfo >> control: tags -1 unreproducible >> >> Am 17.03.2015 um 18:14 schrieb Robert Pumphrey: >>> Package: systemd >>> Version: 215-12 >>> Severity: critical >>> Justification: breaks the whole system >>> >>> Dear Maintainer, >>> >>> running systemctl daemon-reload causes systemd to segfault : >>> >>> root@host:~# systemctl daemon-reload >>> >>> Message from syslogd@host at Mar 17 16:41:53 ... >>> kernel:[ 758.716467] systemd[1]: segfault at 7f8d3e4422a0 ip >>> 7f8d3e4422a0 sp 7ffd3c533458 error 15 >>> Failed to execute operation: Connection reset by peer >>> >>> I have disabled as many services as possible, but still get the error. >>> I have not been able to reproduce on another machine >> >> Can you reproduce the step, how you got this crash? Did this happen once >> or multiple times? > > This problem happens every time I run systemctl daemon-reload on this > particular machine. I have installed jessie on another machine and not > been able to reproduce it, but the hardware is not the same. Even after you've rebooted? > > #0 0x7f8d3e06779b in raise (sig=11) at > ../nptl/sysdeps/unix/sysv/linux/pt-raise.c:37 > resultvar = 0 > pid = > #1 0x7f8d3e4bd3d8 in ?? () > No symbol table info available. > #2 > No locals. > #3 0x7f8d3e4422a0 in ?? () > No symbol table info available. > #4 0x7f8d3e4f8caa in ?? () > No symbol table info available. > #5 0x7f8d3e56777f in ?? () > No symbol table info available. > #6 0x7f8d3e55f558 in ?? () > No symbol table info available. > #7 0x7f8d3e4bac6b in ?? () > No symbol table info available. > #8 0x7f8d3dcd0b45 in __libc_start_main (main=0x7f8d3e4b6dd0, > argc=1, argv=0x7ffd3c533ea8, init=, fini=, > rtld_fini=, stack_end=0x7ffd3c533e98) > at libc-start.c:287 > result = > unwind_buf = {cancel_jmp_buf = {{jmp_buf = {0, > 5361389912737802513, 140244612264611, 140725615541920, 0, 0, > -5360124553165444847, -5369135033269130991}, mask_was_saved = 0}}, priv > = {pad = {0x0, 0x0, > 0x7ffd3c533eb8, 0x7f8d3e4971a8}, data = {prev = 0x0, > cleanup = 0x0, canceltype = 1012088504}}} > not_first_call = > #9 0x7f8d3e4bb2cc in ?? () > No symbol table info available. Hm, nothing interesting/relevant in there. Almost as if the symbols do not match the binary/core dump or the crash is not in systemd itself. -- Why is it that all of the instruments seeking intelligent life in the universe are pointed away from Earth? signature.asc Description: OpenPGP digital signature
Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload
On 17/03/15 17:52, Michael Biebl wrote: control: tags -1 moreinfo control: tags -1 unreproducible Am 17.03.2015 um 18:14 schrieb Robert Pumphrey: Package: systemd Version: 215-12 Severity: critical Justification: breaks the whole system Dear Maintainer, running systemctl daemon-reload causes systemd to segfault : root@host:~# systemctl daemon-reload Message from syslogd@host at Mar 17 16:41:53 ... kernel:[ 758.716467] systemd[1]: segfault at 7f8d3e4422a0 ip 7f8d3e4422a0 sp 7ffd3c533458 error 15 Failed to execute operation: Connection reset by peer I have disabled as many services as possible, but still get the error. I have not been able to reproduce on another machine Can you reproduce the step, how you got this crash? Did this happen once or multiple times? This problem happens every time I run systemctl daemon-reload on this particular machine. I have installed jessie on another machine and not been able to reproduce it, but the hardware is not the same. I have not been able to change the settings on this machine to allow daemon-reload to work Once the segfault happens, systemd not longer responsds to systemctl status Unable to get systemd back into a state where it will respond to systemctl status without a reboot This has been triggered by attempting to upgrade some packages (eg. sudo) whose postrm script calls systemctl --system daemon-reload If systemd dies, it will freeze and no longer reacts to any requests. So systemctl status etc no longer working, is expected. You should still be able to reboot in a somewhat ordered fashion via "reboot --force" I will try that next time I am able to systemd should have generated a core dump as /core. it has Please install systemd-dbg and gdb and then run gdb --core=/core /lib/systemd/systemd The type "set logging on" and run "bt full" afterwards and attach gdb.txt to the bug report. #0 0x7f8d3e06779b in raise (sig=11) at ../nptl/sysdeps/unix/sysv/linux/pt-raise.c:37 resultvar = 0 pid = #1 0x7f8d3e4bd3d8 in ?? () No symbol table info available. #2 No locals. #3 0x7f8d3e4422a0 in ?? () No symbol table info available. #4 0x7f8d3e4f8caa in ?? () No symbol table info available. #5 0x7f8d3e56777f in ?? () No symbol table info available. #6 0x7f8d3e55f558 in ?? () No symbol table info available. #7 0x7f8d3e4bac6b in ?? () No symbol table info available. #8 0x7f8d3dcd0b45 in __libc_start_main (main=0x7f8d3e4b6dd0, argc=1, argv=0x7ffd3c533ea8, init=, fini=, rtld_fini=, stack_end=0x7ffd3c533e98) at libc-start.c:287 result = unwind_buf = {cancel_jmp_buf = {{jmp_buf = {0, 5361389912737802513, 140244612264611, 140725615541920, 0, 0, -5360124553165444847, -5369135033269130991}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x7ffd3c533eb8, 0x7f8d3e4971a8}, data = {prev = 0x0, cleanup = 0x0, canceltype = 1012088504}}} not_first_call = #9 0x7f8d3e4bb2cc in ?? () No symbol table info available. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload
Am 17.03.2015 um 18:52 schrieb Michael Biebl: > gdb --core=/core /lib/systemd/systemd > > The type "set logging on" and run "bt full" afterwards, hit return until the gdb prompt shows up again and attach > gdb.txt to the bug report. -- Why is it that all of the instruments seeking intelligent life in the universe are pointed away from Earth? signature.asc Description: OpenPGP digital signature
Processed: Re: Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload
Processing control commands: > tags -1 moreinfo Bug #780675 [systemd] systemd: segfault in systemd when running systemctl daemon-reload Added tag(s) moreinfo. > tags -1 unreproducible Bug #780675 [systemd] systemd: segfault in systemd when running systemctl daemon-reload Added tag(s) unreproducible. -- 780675: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780675 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload
control: tags -1 moreinfo control: tags -1 unreproducible Am 17.03.2015 um 18:14 schrieb Robert Pumphrey: > Package: systemd > Version: 215-12 > Severity: critical > Justification: breaks the whole system > > Dear Maintainer, > > running systemctl daemon-reload causes systemd to segfault : > > root@host:~# systemctl daemon-reload > > Message from syslogd@host at Mar 17 16:41:53 ... > kernel:[ 758.716467] systemd[1]: segfault at 7f8d3e4422a0 ip > 7f8d3e4422a0 sp 7ffd3c533458 error 15 > Failed to execute operation: Connection reset by peer > > I have disabled as many services as possible, but still get the error. > I have not been able to reproduce on another machine Can you reproduce the step, how you got this crash? Did this happen once or multiple times? > I have not been able to change the settings on this machine to allow > daemon-reload to work > > Once the segfault happens, systemd not longer responsds to systemctl status > Unable to get systemd back into a state where it will respond to systemctl > status without a reboot > > This has been triggered by attempting to upgrade some packages (eg. sudo) > whose postrm script calls systemctl --system daemon-reload If systemd dies, it will freeze and no longer reacts to any requests. So systemctl status etc no longer working, is expected. You should still be able to reboot in a somewhat ordered fashion via "reboot --force" systemd should have generated a core dump as /core. Please install systemd-dbg and gdb and then run gdb --core=/core /lib/systemd/systemd The type "set logging on" and run "bt full" afterwards and attach gdb.txt to the bug report. -- Why is it that all of the instruments seeking intelligent life in the universe are pointed away from Earth? signature.asc Description: OpenPGP digital signature
Bug#780675: systemd: segfault in systemd when running systemctl daemon-reload
Package: systemd Version: 215-12 Severity: critical Justification: breaks the whole system Dear Maintainer, running systemctl daemon-reload causes systemd to segfault : root@host:~# systemctl daemon-reload Message from syslogd@host at Mar 17 16:41:53 ... kernel:[ 758.716467] systemd[1]: segfault at 7f8d3e4422a0 ip 7f8d3e4422a0 sp 7ffd3c533458 error 15 Failed to execute operation: Connection reset by peer I have disabled as many services as possible, but still get the error. I have not been able to reproduce on another machine I have not been able to change the settings on this machine to allow daemon-reload to work Once the segfault happens, systemd not longer responsds to systemctl status Unable to get systemd back into a state where it will respond to systemctl status without a reboot This has been triggered by attempting to upgrade some packages (eg. sudo) whose postrm script calls systemctl --system daemon-reload -- Package-specific info: -- System Information: Debian Release: 8.0 APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.16.0-4-amd64 (SMP w/12 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages systemd depends on: ii acl 2.2.52-2 ii adduser 3.113+nmu3 ii initscripts 2.88dsf-58 ii libacl1 2.2.52-2 ii libaudit1 1:2.4-1+b1 ii libblkid1 2.25.2-5 ii libc6 2.19-15 ii libcap2 1:2.24-6 ii libcap2-bin 1:2.24-6 ii libcryptsetup4 2:1.6.6-5 ii libgcrypt20 1.6.2-4+b1 ii libkmod218-3 ii liblzma55.1.1alpha+20120614-2+b3 ii libpam0g1.1.8-3.1 ii libselinux1 2.3-2 ii libsystemd0 215-12 ii mount 2.25.2-5 ii sysv-rc 2.88dsf-58 ii udev215-12 ii util-linux 2.25.2-5 Versions of packages systemd recommends: ii dbus1.8.16-1 ii libpam-systemd 215-12 Versions of packages systemd suggests: pn systemd-ui -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#780624: marked as done (libmpeg2-4: introduces new symbols)
Your message dated Tue, 17 Mar 2015 17:33:58 + with message-id and subject line Bug#780624: fixed in mpeg2dec 0.5.1-7 has caused the Debian Bug report #780624, regarding libmpeg2-4: introduces new symbols to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 780624: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780624 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: libmpeg2-4 Version: 0.5.1-6 Severity: serious Hi, Between wheezy and jessie libmpeg2-4 introduced at least one new symbol, mpeg2_guess_aspect, without even including a shlibs or symbols files. The result being that some applications using libmpeg2-4 that use the new symbols, perhaps directly, perhaps picked up?, do not have a proper versioned dependency on libmpeg2-4. One such package is gstreamer1.0-plugins-ugly, though there might be others. Cheers, -- Raphael Geissert - Debian Developer www.debian.org - get.debian.net --- End Message --- --- Begin Message --- Source: mpeg2dec Source-Version: 0.5.1-7 We believe that the bug you reported is fixed in the latest version of mpeg2dec, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 780...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Sebastian Ramacher (supplier of updated mpeg2dec package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Tue, 17 Mar 2015 18:24:46 +0100 Source: mpeg2dec Binary: libmpeg2-4-dev libmpeg2-4 mpeg2dec Architecture: source Version: 0.5.1-7 Distribution: unstable Urgency: medium Maintainer: Debian Multimedia Maintainers Changed-By: Sebastian Ramacher Description: libmpeg2-4 - MPEG1 and MPEG2 video decoder library libmpeg2-4-dev - libmpeg2 development libraries and headers mpeg2dec - Simple libmpeg2 video decoder application Closes: 780624 Changes: mpeg2dec (0.5.1-7) unstable; urgency=medium . * Team upload. * debian/rules: Bump shlibs version. (Closes: #780624) Checksums-Sha1: 7c21cee938525d37a16a27f3378edc438c347273 2200 mpeg2dec_0.5.1-7.dsc 933a948af4e18bd67abf17f87321e91ccb22d962 10208 mpeg2dec_0.5.1-7.debian.tar.xz Checksums-Sha256: 342e596ed67cc885d5601900d8cdbdb5ea4e3da7f00a39bd598f5e6876352d05 2200 mpeg2dec_0.5.1-7.dsc 2e2cd0bfbe90de977ffb26f2dc6bb85bb7f74ce30049cfda400d0eefae806f46 10208 mpeg2dec_0.5.1-7.debian.tar.xz Files: cf4856975d07db364b26e4d1d7faffb2 2200 libs optional mpeg2dec_0.5.1-7.dsc eb85b853bd418231f67fd8e3dd11ab78 10208 libs optional mpeg2dec_0.5.1-7.debian.tar.xz -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBCAAGBQJVCGQaAAoJEGny/FFupxmTq9YP/1s1PFJLOxTD15TNE7pGruUX wlKc35XSkgvd3aAsahcsAvSGJb1cgQaePI1aZoGwNKhdXzOsA8mB5L4WWddsrWRJ MmFj00xEOSq7blPCZUq84D6eVzTAsop4lK41G/6+gbCA7nFTXqdmhoDhQfABwfWc oj60uLu+MmGS4HZuTaeICyQWZkm5s5WAol0cYXoR4X/dVERXCTzVCyDrQ2SQFYPp T71vpAYoXmxHP6Lc4vxK07Suglpju7LjHao9qPvUYbVtsCX0/f1IAJNFtQl0+cKZ mte/5Ny+rPcku4UA1yN1IcgmdlTYrFQoeeXCt1QNNcgR+Nu2rne6KXi9GHwugGDW cAZXPRMnyACq3lLB4mde7V4f1I+iKim2Jh7UtFpbTVXCa1JUVYHS/a9OTC+UVg7E p+q6Y22oJ/802c469FFQ1At/XfS3vUmJtVgNqIMLSNn1XRjRb9YhsK9wRhwi5J/V 5hWodU01rb53Sd0/sRk6yCccGUxTKiv3m4thRO29qzGBWr9VcEITDD81mXoryZN8 WaVJmqk3ZokeTvwpD6Yr/bUrRXCT4BOxC0W7o9emszozekUfjtcHpD4MZpgk7LGY NsKHULfdrJXqulbF5oY8y4raf7aSyVrPfHphGOVHBqAiwttwps9rRpZnVzcDPjYJ Nt+5xX+MDtnTLFkEn+IB =5N9+ -END PGP SIGNATURE End Message ---
Bug#780503: marked as done (icu: incomplete fix for CVE-2014-7940)
Your message dated Tue, 17 Mar 2015 16:48:50 + with message-id and subject line Bug#780503: fixed in icu 52.1-8 has caused the Debian Bug report #780503, regarding icu: incomplete fix for CVE-2014-7940 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 780503: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780503 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- package: src:icu version: 52.1-7.1 severity: serious tags: security Google added another check in a later patch for this issue, which wasn't included in the previous nmu: https://chromium.googlesource.com/chromium/deps/icu/+/a626a75aad2675254073366fcaa9465dacf17100/patches/col.patch Best wishes, Mike --- End Message --- --- Begin Message --- Source: icu Source-Version: 52.1-8 We believe that the bug you reported is fixed in the latest version of icu, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 780...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Laszlo Boszormenyi (GCS) (supplier of updated icu package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Tue, 17 Mar 2015 11:14:15 + Source: icu Binary: libicu52 libicu52-dbg libicu-dev icu-devtools icu-doc Architecture: source all amd64 Version: 52.1-8 Distribution: unstable Urgency: high Maintainer: Laszlo Boszormenyi (GCS) Changed-By: Laszlo Boszormenyi (GCS) Description: icu-devtools - Development utilities for International Components for Unicode icu-doc- API documentation for ICU classes and functions libicu-dev - Development files for International Components for Unicode libicu52 - International Components for Unicode libicu52-dbg - International Components for Unicode Closes: 777694 780503 Changes: icu (52.1-8) unstable; urgency=high . * New maintainer (closes: #777694). * Update Standars-Version to 3.9.6 . . [ Michael Gilbert ] * Apply a more complete fix for CVE-2014-7940 (closes: #780503). - Thanks to Marc Deslauriers. Checksums-Sha1: 7ed5b80a43b8fbdbf133e5093af9948dc793bb07 1973 icu_52.1-8.dsc 7aa226dc990a1eb7619169d4e5a397b1a215102a 25656 icu_52.1-8.debian.tar.xz ceb5eccc2b9f7f5aeea711a784fa2acdba771d96 2630968 icu-doc_52.1-8_all.deb 403f298543859860c8ebb0cda42e96d7ff484221 6779698 libicu52_52.1-8_amd64.deb 57a7571ac75d8c13b690bb58a385f4815ff563c4 5925222 libicu52-dbg_52.1-8_amd64.deb e2ca4b9090e5aae55eb82b70a6be8fc107ff4405 7644878 libicu-dev_52.1-8_amd64.deb 42bac1b0a29361d5f2075930139adf7003585dff 172092 icu-devtools_52.1-8_amd64.deb Checksums-Sha256: 6847d36df92098042b0b5f2377289e34ed8fa9175b1d74989d9fbd7a025d664d 1973 icu_52.1-8.dsc aacc6e4c1a91a7c39b0e69e858ddb320c0c75096a19757ae67da9cc52997dcd5 25656 icu_52.1-8.debian.tar.xz a08a86a7dd6b21a4d961ae65eecb6cbb38955e379d2717bf56e6b06f7160f1a4 2630968 icu-doc_52.1-8_all.deb 342b83af920393e5132d0bd9f6fb03fadd27389f089ed094f788b6ca42d0310c 6779698 libicu52_52.1-8_amd64.deb 110a055af4216bb330192a24c5e3207d21aaa7b3ffee077704694f4146f125a1 5925222 libicu52-dbg_52.1-8_amd64.deb b804d0035608732ea47716a481581e23b953995caa1df1c9a6a8d736ddcc838e 7644878 libicu-dev_52.1-8_amd64.deb 7eb72050d8d44ac0d5462f53af8bacf8c8bc82bddec669820672ef605493bab9 172092 icu-devtools_52.1-8_amd64.deb Files: 856eb10182615c6b8eb235121a451a1a 1973 libs optional icu_52.1-8.dsc 0f51c9efbe92ecee196c89dfe6b6cd9b 25656 libs optional icu_52.1-8.debian.tar.xz e9813a5bc787093c6488e2bae4f7e3ac 2630968 doc optional icu-doc_52.1-8_all.deb 765ca2590b3f14a9e8c332ac715123c5 6779698 libs optional libicu52_52.1-8_amd64.deb 2ce23a45c89cc858d8950573efef9da8 5925222 debug extra libicu52-dbg_52.1-8_amd64.deb 5ecec0bb4482c143dafa3655f4007cfa 7644878 libdevel optional libicu-dev_52.1-8_amd64.deb 559cce7061289e94a010fb8479b72817 172092 libdevel optional icu-devtools_52.1-8_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBCAAGBQJVCFiOAAoJENzjEOeGTMi/7wIP/1Avxw4ePdZAxvQJ/v0CTyoM iEEZjymW4LiOPwOrzKthN2qNECvFbOCKZ6FVfXtzW2mnl5Yx3hy1j3iKxwYT2S0z kfWy6vnYX/M2N3vH8WNfulRakjOHA98GbuN+UIw+mO5bpaoL9w3Np/hyjZ3yYpFV W/HVSA/dA/HcQDhS+knSIv+O2ktHpYBVE8xxIAt0XtaEI7tkLywjuCFR7KcetSyZ lAWWnCC9puU65RFfPh/lB+S
Processed: retitle 780613 to diakonos: needs unpackaged curses binding to work
Processing commands for cont...@bugs.debian.org: > retitle 780613 diakonos: needs unpackaged curses binding to work Bug #780613 [diakonos] diakonos: completely broken in jessie Changed Bug title to 'diakonos: needs unpackaged curses binding to work' from 'diakonos: completely broken in jessie' > thanks Stopping processing here. Please contact me if you need assistance. -- 780613: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780613 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#758600: marked as done (shibboleth-sp2-utils: postinst fails on initial installation)
Your message dated Tue, 17 Mar 2015 15:48:24 +0100 with message-id <87oanrn0hz@lant.ki.iif.hu> and subject line fix is in bpo, closing has caused the Debian Bug report #758600, regarding shibboleth-sp2-utils: postinst fails on initial installation to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 758600: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=758600 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: shibboleth-sp2-utils Version: 2.5.3+dfsg-1~bpo70+1 Severity: normal Hi, Installing libapache2-mod-shib2 from wheezy backports. shibboleth-sp2-utils postinst fails on initial installation, because it tries to enable the apache module, but libapache2-mod-shib2 is not yet configured so /etc/apache2/mods-available/ contains only shib2.load.dpkg-new. Attached is a log of the install. -- System Information: Debian Release: 7.6 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=fi_FI.UTF-8, LC_CTYPE=fi_FI.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages shibboleth-sp2-utils depends on: ii adduser3.113+nmu3 ii libc6 2.13-38+deb7u3 ii libfcgi0ldbl 2.4.0-8.1 ii libgcc11:4.7.2-5 ii liblog4shib1 1.0.4-1 ii libsaml8 2.5.3-2~bpo70+1 ii libshibsp-plugins 2.5.3+dfsg-1~bpo70+1 ii libshibsp6 2.5.3+dfsg-1~bpo70+1 ii libstdc++6 4.7.2-5 ii libxerces-c3.1 3.1.1-3 ii libxmltooling6 1.5.3-2~bpo70+1 Versions of packages shibboleth-sp2-utils recommends: ii openssl 1.0.1e-2+deb7u12 shibboleth-sp2-utils suggests no packages. -- no debconf information mika@y-moodle:~$ sudo aptitude install -t wheezy-backports libapache2-mod-shib2 The following NEW packages will be installed: libapache2-mod-shib2 libfcgi0ldbl{a} liblog4shib1{a} libmemcached10{a} libodbc1{a} libsaml8{a} libshibsp-plugins{a} libshibsp6{a} libxerces-c3.1{a} libxml-security-c17{a} libxmltooling6{a} opensaml2-schemas{a} shibboleth-sp2-common{a} shibboleth-sp2-utils{a} xmltooling-schemas{a} 0 packages upgraded, 15 newly installed, 0 to remove and 34 not upgraded. Need to get 5 547 kB of archives. After unpacking 28,8 MB will be used. Do you want to continue? [Y/n/?] Get: 1 http://ftp.fi.debian.org/debian/ wheezy/main libmemcached10 amd64 1.0.8-1 [117 kB] Get: 2 http://ftp.fi.debian.org/debian/ wheezy/main libodbc1 amd64 2.2.14p2-5 [2 52 kB] Get: 3 http://ftp.fi.debian.org/debian/ wheezy/main libxerces-c3.1 amd64 3.1.1-3 [1 139 kB] Get: 4 http://ftp.fi.debian.org/debian/ wheezy/main liblog4shib1 amd64 1.0.4-1 [ 95,7 kB] Get: 5 http://ftp.fi.debian.org/debian/ wheezy-backports/main libxml-security-c1 7 amd64 1.7.2-2~bpo70+1 [290 kB] Get: 6 http://ftp.fi.debian.org/debian/ wheezy-backports/main libxmltooling6 amd 64 1.5.3-2~bpo70+1 [613 kB] Get: 7 http://ftp.fi.debian.org/debian/ wheezy-backports/main libsaml8 amd64 2.5 .3-2~bpo70+1 [940 kB] Get: 8 http://ftp.fi.debian.org/debian/ wheezy-backports/main opensaml2-schemas all 2.5.3-2~bpo70+1 [25,8 kB] Get: 9 http://ftp.fi.debian.org/debian/ wheezy-backports/main shibboleth-sp2-com mon all 2.5.3+dfsg-1~bpo70+1 [48,8 kB] Get: 10 http://ftp.fi.debian.org/debian/ wheezy-backports/main xmltooling-schema s all 1.5.3-2~bpo70+1 [15,9 kB] Get: 11 http://ftp.fi.debian.org/debian/ wheezy-backports/main libshibsp6 amd64 2.5.3+dfsg-1~bpo70+1 [1 307 kB] Get: 12 http://ftp.fi.debian.org/debian/ wheezy/main libfcgi0ldbl amd64 2.4.0-8. 1 [281 kB] Get: 13 http://ftp.fi.debian.org/debian/ wheezy-backports/main libshibsp-plugins amd64 2.5.3+dfsg-1~bpo70+1 [247 kB] Get: 14 http://ftp.fi.debian.org/debian/ wheezy-backports/main shibboleth-sp2-ut ils amd64 2.5.3+dfsg-1~bpo70+1 [103 kB] Get: 15 http://ftp.fi.debian.org/debian/ wheezy-backports/main libapache2-mod-sh ib2 amd64 2.5.3+dfsg-1~bpo70+1 [72,2 kB] Fetched 5 547 kB in 0s (6 051 kB/s) Selecting previously unselected package libmemcached10:amd64. (Reading database ... 34023 files and directories currently installed.) Unpacking libmemcached10:amd64 (from .../libmemcached10_1.0.8-1_amd64.deb) ... Selecting previously unselected package libodbc1:amd64. Unpacking libodbc1:amd64 (from .../libodbc1_2.2.14p2-5_amd64.deb) ... Selecting previously unselected package libxerces-c3.1:amd64. Unpacking libxerces-c3.1:amd64 (from .../libxerces-c3.1_3.1.1-3_amd64.deb) ... Selecting previously unselected package liblog4shib1:amd64. Unpacking liblog4shib1:amd64 (from .../liblog4shib1_1.0.4-1_amd64.deb) ... Selecting previously unselected package li
Bug#773136: debsums: modified files of arch-qualified (multiarch) packages are not being reported
Control: owner -1 ! Hi, Artem Chuprina wrote: > I confirm this bug also when only one of multiarch packages is installed (that > is, arch qualification is enough), and that it still exists in 2.0.52+nmu3. > Probably it is reasonable to consider it release-critical because of its > security implications. I already planned to do an update of debsums to fix #773136 in Jessie. I'm just quite busy with other stuff these days days. Will do the upload within a few days, maybe today in the evening, but latest earlier next week. I also already talked with nthykier (Cc'ed) of the release team (Cc'ed) on IRC about this issue and got a "go" from him. Regards, Axel -- ,''`. | Axel Beckert , http://people.debian.org/~abe/ : :' : | Debian Developer, ftp.ch.debian.org Admin `. `' | 4096R: 2517 B724 C5F6 CA99 5329 6E61 2FF9 CD59 6126 16B5 `-| 1024D: F067 EA27 26B9 C3FC 1486 202E C09E 1D89 9593 0EDE -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#773136: debsums: modified files of arch-qualified (multiarch) packages are not being reported
Processing control commands: > owner -1 ! Bug #773136 [debsums] debsums: modified files of arch-qualified (multiarch) packages are not being reported Owner recorded as Axel Beckert . -- 773136: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773136 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#774873: Circular dependency in java-headless packages
I installed openjdk-7-jre:i386 on an amd64 system and for some reason openjdk-7-jre:amd64 has been pulled as well. That's probably because of this dependency cycle: multiarch treats arch:all packages as the native architecture (https://wiki.ubuntu.com/MultiarchSpec#Dependencies_involving_Architecture:_all_packages), i.e. openjdk-7-jre:i386 -> ca-certificates-java:all <-> openjdk-7-jre:amd64 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: your mail
Processing commands for cont...@bugs.debian.org: > severity 773136 serious Bug #773136 [debsums] debsums: modified files of arch-qualified (multiarch) packages are not being reported Severity set to 'serious' from 'important' > End of message, stopping processing here. Please contact me if you need assistance. -- 773136: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773136 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#723964: devtodo: FTBFS: required file './compile' not found
Source: devtodo Followup-For: Bug #723964 Hello. The package also fails to build from source due to a missing build-dep (see bug #779551). Using the same approach as Gregor on his first patch, I just added a build-dep on libtool-bin. I also removed some dependencies that are not needed, since they are dependencies of dh-autoreconf anyway. I sent the same patch to #779551. Regards. Fernando -- System Information: Debian Release: jessie/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: ppc64el (ppc64le) Kernel: Linux 3.13-1-powerpc64le (SMP w/16 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) diff -Nru devtodo-0.1.20/debian/changelog devtodo-0.1.20/debian/changelog --- devtodo-0.1.20/debian/changelog 2012-06-19 01:38:36.0 + +++ devtodo-0.1.20/debian/changelog 2015-03-17 12:27:49.0 + @@ -1,3 +1,11 @@ +devtodo (0.1.20-6ppc64el1) UNRELEASED; urgency=medium + + * debian/control: added dh-autoreconf as build-dep, removed its dependencies +and added libtool-bin to fix ftbfs. + * debian/rules: added usage of dh-autoreconf + + -- Fernando Seiti Furusato Tue, 17 Mar 2015 12:26:35 + + devtodo (0.1.20-6) unstable; urgency=low * fix SYNOPSIS spelling in manpage (Closes: #534236) diff -Nru devtodo-0.1.20/debian/control devtodo-0.1.20/debian/control --- devtodo-0.1.20/debian/control 2012-06-19 01:32:57.0 + +++ devtodo-0.1.20/debian/control 2015-03-17 12:26:01.0 + @@ -2,7 +2,7 @@ Section: utils Priority: optional Maintainer: Ryan Niebur -Build-Depends: debhelper (>= 7.2), autotools-dev, libreadline-dev, libncurses-dev, bash-completion, automake, autoconf, libtool, dpkg-dev (>= 1.16.1~) +Build-Depends: debhelper (>= 7.2), dh-autoreconf, libreadline-dev, libncurses-dev, bash-completion, libtool-bin, dpkg-dev (>= 1.16.1~) Standards-Version: 3.9.3 Vcs-Git: git://git.debian.org/git/collab-maint/devtodo.git Vcs-Browser: http://git.debian.org/?p=collab-maint/devtodo.git;a=summary diff -Nru devtodo-0.1.20/debian/rules devtodo-0.1.20/debian/rules --- devtodo-0.1.20/debian/rules 2012-06-19 01:28:47.0 + +++ devtodo-0.1.20/debian/rules 2015-03-17 12:26:20.0 + @@ -7,15 +7,13 @@ destdir=$(CURDIR)/debian/devtodo/ override_dh_auto_configure: + dh_autoreconf dh_auto_configure -- CFLAGS="$(CFLAGS)" CPPFLAGS="$(CPPFLAGS)" CXXFLAGS="$(CXXFLAGS)" LDFLAGS="$(LDFLAGS)" build: build-arch build-indep build-arch: build-stamp build-indep: build-stamp build-stamp: - ln -sf /usr/share/misc/config.sub config.sub - ln -sf /usr/share/misc/config.guess config.guess - autoreconf dh build touch build-stamp @@ -24,6 +22,7 @@ dh_auto_build clean: + dh_autoreconf_clean dh clean install: build
Bug#779551: (no subject)
Followup-For: Bug #779551 Source: devtodo Version: 0.1.20-6 X-Debbugs-Cc: cont...@bugs.debian.org Dear Maintainer et al, This package also ftbfs on ppc64el due to the same reason reported here and in bug #723964. So I have created a patch which fixes both, by: - adding dh-autoreconf utilization to debian/rules - adding dependency on libtool-bin to debian/control. The debdiff is attached. Regards. Fernando -- System Information: Debian Release: jessie/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: ppc64el (ppc64le) Kernel: Linux 3.13-1-powerpc64le (SMP w/16 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) diff -Nru devtodo-0.1.20/debian/changelog devtodo-0.1.20/debian/changelog --- devtodo-0.1.20/debian/changelog 2012-06-19 01:38:36.0 + +++ devtodo-0.1.20/debian/changelog 2015-03-17 12:27:49.0 + @@ -1,3 +1,11 @@ +devtodo (0.1.20-6ppc64el1) UNRELEASED; urgency=medium + + * debian/control: added dh-autoreconf as build-dep, removed its dependencies +and added libtool-bin to fix ftbfs. + * debian/rules: added usage of dh-autoreconf + + -- Fernando Seiti Furusato Tue, 17 Mar 2015 12:26:35 + + devtodo (0.1.20-6) unstable; urgency=low * fix SYNOPSIS spelling in manpage (Closes: #534236) diff -Nru devtodo-0.1.20/debian/control devtodo-0.1.20/debian/control --- devtodo-0.1.20/debian/control 2012-06-19 01:32:57.0 + +++ devtodo-0.1.20/debian/control 2015-03-17 12:26:01.0 + @@ -2,7 +2,7 @@ Section: utils Priority: optional Maintainer: Ryan Niebur -Build-Depends: debhelper (>= 7.2), autotools-dev, libreadline-dev, libncurses-dev, bash-completion, automake, autoconf, libtool, dpkg-dev (>= 1.16.1~) +Build-Depends: debhelper (>= 7.2), dh-autoreconf, libreadline-dev, libncurses-dev, bash-completion, libtool-bin, dpkg-dev (>= 1.16.1~) Standards-Version: 3.9.3 Vcs-Git: git://git.debian.org/git/collab-maint/devtodo.git Vcs-Browser: http://git.debian.org/?p=collab-maint/devtodo.git;a=summary diff -Nru devtodo-0.1.20/debian/rules devtodo-0.1.20/debian/rules --- devtodo-0.1.20/debian/rules 2012-06-19 01:28:47.0 + +++ devtodo-0.1.20/debian/rules 2015-03-17 12:26:20.0 + @@ -7,15 +7,13 @@ destdir=$(CURDIR)/debian/devtodo/ override_dh_auto_configure: + dh_autoreconf dh_auto_configure -- CFLAGS="$(CFLAGS)" CPPFLAGS="$(CPPFLAGS)" CXXFLAGS="$(CXXFLAGS)" LDFLAGS="$(LDFLAGS)" build: build-arch build-indep build-arch: build-stamp build-indep: build-stamp build-stamp: - ln -sf /usr/share/misc/config.sub config.sub - ln -sf /usr/share/misc/config.guess config.guess - autoreconf dh build touch build-stamp @@ -24,6 +22,7 @@ dh_auto_build clean: + dh_autoreconf_clean dh clean install: build
Bug#779664: marked as done (ffmpeg: needs Breaks+Replaces: libav-tools (<< 6:9~))
Your message dated Tue, 17 Mar 2015 12:49:12 + with message-id and subject line Bug#779664: fixed in ffmpeg 7:2.6.1-1 has caused the Debian Bug report #779664, regarding ffmpeg: needs Breaks+Replaces: libav-tools (<< 6:9~) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 779664: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779664 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: ffmpeg Version: 7:2.5.4-1 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Hi, during a test with piuparts I noticed your package fails to co-install with libav-tools from wheezy. libav-tools installed fine in 'wheezy', then the upgrade to ffmpeg/'sid' fails because it tries to overwrite other packages files without declaring a Breaks+Replaces relation. See policy 7.6 at https://www.debian.org/doc/debian-policy/ch-relationships.html#s-replaces >From the attached log (scroll to the bottom...): Selecting previously unselected package ffmpeg. Unpacking ffmpeg (from .../ffmpeg_7%3a2.5.4-1_amd64.deb) ... dpkg: error processing /var/cache/apt/archives/ffmpeg_7%3a2.5.4-1_amd64.deb (--unpack): trying to overwrite '/usr/share/man/man1/ffplay.1.gz', which is also in package libav-tools 6:0.8.16-1 dpkg-deb: error: subprocess paste was killed by signal (Broken pipe) Errors were encountered while processing: /var/cache/apt/archives/ffmpeg_7%3a2.5.4-1_amd64.deb Since there is no ffmpeg package in jessie, adding these Breaks+Replaces would ease some upgrade paths from wheezy as well as possible backporting. In libav (6:9~beta1-1) the compatibility links for ff* tools were removed. cheers, Andreas libav-tools=6%0.8.16-1_ffmpeg=7%2.5.4-1.log.gz Description: application/gzip --- End Message --- --- Begin Message --- Source: ffmpeg Source-Version: 7:2.6.1-1 We believe that the bug you reported is fixed in the latest version of ffmpeg, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 779...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Andreas Cadhalpun (supplier of updated ffmpeg package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 16 Mar 2015 23:53:34 +0100 Source: ffmpeg Binary: ffmpeg qt-faststart ffmpeg-dbg ffmpeg-doc libavcodec-ffmpeg56 libavcodec-ffmpeg-dev libavdevice-ffmpeg56 libavdevice-ffmpeg-dev libavfilter-ffmpeg5 libavfilter-ffmpeg-dev libavformat-ffmpeg56 libavformat-ffmpeg-dev libavresample-ffmpeg2 libavresample-ffmpeg-dev libavutil-ffmpeg54 libavutil-ffmpeg-dev libpostproc-ffmpeg53 libpostproc-ffmpeg-dev libswresample-ffmpeg1 libswresample-ffmpeg-dev libswscale-ffmpeg3 libswscale-ffmpeg-dev Architecture: source i386 all Version: 7:2.6.1-1 Distribution: unstable Urgency: medium Maintainer: Andreas Cadhalpun Changed-By: Andreas Cadhalpun Description: ffmpeg - Tools for transcoding, streaming and playing of multimedia files ffmpeg-dbg - Debug symbols for the FFmpeg multimedia framework ffmpeg-doc - Documentation of the FFmpeg multimedia framework libavcodec-ffmpeg-dev - FFmpeg library with de/encoders for audio/video codecs - developm libavcodec-ffmpeg56 - FFmpeg library with de/encoders for audio/video codecs - runtime libavdevice-ffmpeg-dev - FFmpeg library for handling input and output devices - developmen libavdevice-ffmpeg56 - FFmpeg library for handling input and output devices - runtime fi libavfilter-ffmpeg-dev - FFmpeg library containing media filters - development files libavfilter-ffmpeg5 - FFmpeg library containing media filters - runtime files libavformat-ffmpeg-dev - FFmpeg library with (de)muxers for multimedia containers - develo libavformat-ffmpeg56 - FFmpeg library with (de)muxers for multimedia containers - runtim libavresample-ffmpeg-dev - FFmpeg compatibility library for resampling - development files libavresample-ffmpeg2 - FFmpeg compatibility library for resampling - runtime files libavutil-ffmpeg-dev - FFmpeg library with functions for simplifying programming - devel libavutil-ffmpeg54 - FFmpeg library with functions for simplifying programming - runti libpostproc-ffmpeg-dev - FFmpeg library fo
Processed: affects all suites
Processing commands for cont...@bugs.debian.org: > tags 780519 - sid jessie Bug #780519 [src:tomcat7] tomcat7: FTBFS due to failing tests Removed tag(s) sid and jessie. > End of message, stopping processing here. Please contact me if you need assistance. -- 780519: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780519 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#780650: systemd: Sources not shipped for hwdb files
Package: systemd Severity: serious Files in ./hwdb/*.hwdb are mostly pregenerated. They are generated using ids-update.pl script from usb.ids, pci.ids, sdio.ids, oui.txt, iab.txt. I'm not sure what the license is of those .ids/.txt files. Please ship ids-update.pl and the ids/txt files as part of the source package. And possibly use them to regenerate ./hwdb/*.hwdb files at built time. Regards, Dimitri. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#761355: openjp2 2.0 -> 2.1 transition
On 2015-03-17 09:52, Mathieu Malaterre wrote: > Let me know if I misunderstood your email: > https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=46;bug=761355#46 These bugs were dangling around assigned to a not longer existing package. You should probably close them as well. The successor packages may need Breaks+Replaces against the obsolete packages to ensure clean upgrade paths on all cases. Andreas -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#780645: shinken-mod-webui: files containing password or salt are word readable
Package: shinken-mod-webui Version: 1.0-1 Severity: grave Tags: security Justification: user security hole -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 The two files referenced in README containing users+passwords and salt are world readable. Any local user can apparently gain administrator access to shinken! - Jonas -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBAgAGBQJVCAslAAoJECx8MUbBoAEhlxAP/2bvzmTfk9ZbXrlVO/9jLS98 FAQeiDK81tBmUz1ey4ZsheaSaBnysB31M8SFgNNfAa27mfQLZ2EtmPkbsaqiTcy2 SXy2k4LtTE7ccIJs5cPFdvVlwjAX/ZRVDBkaIMxt4qfpoD3BoK7kiANrO/qoVojx l03M+gyMy1lJZJXCz5rcpRnUMA7tRHOg0FjkGdff3XlQpzm/RV3SM8BzdUFOBoW0 nCo7spLbT5A83kLajv+0DXJfuAibW9ViFmY64y2hd9xew3ZK3AE+utKu2p4pBW98 9Elqa2vQ9NZzXZ8SkAsp/eeVs6SaK2XzwMyQosuIvtlmQYdh9uOC/sgy1KztoZ3g vez1NzRKSVdsx35O5L5hlZTAij6rs5wl41BOBlf5/27AoSWa9vqvT5ko+Vy4Unnv GvRAVobHjTBPeaS6Y12Njzzltr45Xl5nslY7GuoBDi9Ck//2I8vN3KZmqI/M/huV dKBoESDyRlxeannsV3YHxBDlXs9wBmtji/86acQ16gGUMj6cnRSfcmg1uCQKGLOc iIZJUlD2txPrGCnZR/WUN35oTN5Hk51SLeL/5lsiuqU5kIjzt41ebJngyt5vOfYC SSTut3aub74QJxWBPAtQvPAjXM7FHea4Fu1+CLasM8pGWG8Xyv+OYT32Ut9sPEjI x7T1b6PDquLhukInM08s =K7qm -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#780637: cloud-init: needs to be build in the cloud
Processing control commands: > severity -1 normal Bug #780637 [cloud-init] cloud-init: needs to be build in the cloud Severity set to 'normal' from 'serious' > retitle -1 cloud-init: building in pbuilder runs tests and fails Bug #780637 [cloud-init] cloud-init: needs to be build in the cloud Changed Bug title to 'cloud-init: building in pbuilder runs tests and fails' from 'cloud-init: needs to be build in the cloud' -- 780637: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780637 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#780637: cloud-init: needs to be build in the cloud
control: severity -1 normal control: retitle -1 cloud-init: building in pbuilder runs tests and fails Hi Charles, On Dienstag, 17. März 2015, Charles Plessy wrote: > it is more complicated than this: the package builds fine with sbuild. does it run the tests with sbuild too? (I assume not.) > To what extent do we need to support pbuilder ? Please adjust the severity > according to your answer if necessary. I've just tried to build the package with plain debuild and to my surprise didnt execute any tests and build fine. I currently don't understand why pbuilder runs these tests at all, maybe this bug should be reassigned to pbuilder (or qa.debian.org, usertag "jenkins".) I'm also not sure about this from debian/rules: ifeq (,$(findstring nocheck, $(DEB_BUILD_OPTIONS))) override_dh_auto_test: dh_auto_test $(MAKE) test endif So when "nocheck" is defined in DEB_BUILD_OPTIONS it should run "make test"??? I must be missing something rather obvious... help welcome. cheers, Holger signature.asc Description: This is a digitally signed message part.
Bug#780637: cloud-init: needs to be build in the cloud
Le Tue, Mar 17, 2015 at 10:15:38AM +0100, Holger Levsen a écrit : > > building the cloud-init package fails during package tests because the > hostname metadata.google.internal cannot be resolved and cloud specific URLs > like http://169.254.169.254/openstack/latest cannot be accessed, see attached > log. Hi Holger, it is more complicated than this: the package builds fine with sbuild. To what extent do we need to support pbuilder ? Please adjust the severity according to your answer if necessary. Have a nice day -- Charles -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#775733: xemacs21-gnome-*: hangs during upgrade from squeeze -> wheezy -> jessie
On Tue, Mar 17, 2015 at 01:56:34AM +0100, Andreas Beckmann wrote: > Package: > src:xemacs21,xemacs21-gnome-mule,xemacs21-gnome-nomule,xemacs21-gnome-mule-canna-wnn > Followup-For: Bug #775733 > > Attached are two new piuparts logs: > * failure due to deadlock and timeout > * success after patching xemacs > > The logfiles contain the piuparts command lines used. OK, thanks for the command lines. How about the analysis for the patch? I'm not keen on just applying random changes without understanding. signature.asc Description: Digital signature
Processed: closing 768780
Processing commands for cont...@bugs.debian.org: > # no need anymore > close 768780 Bug #768780 [pencil2d] Block migration (and release) - pencil2d is too buggy Marked Bug as done > thanks Stopping processing here. Please contact me if you need assistance. -- 768780: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768780 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#780439: [Pkg-tcltk-devel] Bug#780439: tcl8.6: upgrade issues switching from tcl8.4/wheezy to tcl/jessie
Hi Andreas, On Sat, Mar 14, 2015 at 1:06 AM, Andreas Beckmann wrote: > Hi, > > analyzing some piuparts logs in depth showed an issue with fsl being > hold at the wheezy version rather than being upgraded. > > This is caused by the switch from tcl8.4 to tcl which requires removal > of the old tcl8.4 package. This seems to work well in most upgrade > paths, but unfortunately in this case the scoring resulted in a tie, > and that is resolved in favor of the already installed package. > There may be more upgrade paths involving other packages hitting this > issue ... > > Adding some Breaks to libtcl8.6 (which has a slightly higher score than > tcl due to a higher number of rdepends) will help apt to resolve this > upgrade path in favor of the new tcl package. > The versions I've taken from the Breaks found in the tcl and tk > packages. Thank you for the analysis and for the patch. I'll upload the fixed packages shortly. Cheers! -- Sergei Golovan -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#780637: cloud-init: needs to be build in the cloud
package: cloud-init version: 0.7.6~bzr976-2 severity: serious User: reproducible-bui...@lists.alioth.debian.org Usertags: environment x-debbugs-cc: reproducible-bui...@lists.alioth.debian.org Hi, building the cloud-init package fails during package tests because the hostname metadata.google.internal cannot be resolved and cloud specific URLs like http://169.254.169.254/openstack/latest cannot be accessed, see attached log. Filing this as a serious bug as it prevents anyone from (re-)building the package outside of such cloud services... Suggestion solution: drop these tests during package build. cheers, Holger Starting to build cloud-init on 2015-02-18 00:15 The jenkins build log is/was available at https://jenkins.debian.net/job/reproducible_builder_gamma/29159//console Reading package lists... Building dependency tree... Reading state information... NOTICE: 'cloud-init' packaging is maintained in the 'Git' version control system at: git://anonscm.debian.org/collab-maint/cloud-init.git Need to get 533 kB of source archives. Get:1 http://ftp.de.debian.org/debian/ sid/main cloud-init 0.7.6~bzr976-2 (dsc) [2270 B] Get:2 http://ftp.de.debian.org/debian/ sid/main cloud-init 0.7.6~bzr976-2 (tar) [505 kB] Get:3 http://ftp.de.debian.org/debian/ sid/main cloud-init 0.7.6~bzr976-2 (diff) [26.3 kB] Fetched 533 kB in 0s (2841 kB/s) Download complete and in download only mode -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 3.0 (quilt) Source: cloud-init Binary: cloud-init Architecture: all Version: 0.7.6~bzr976-2 Maintainer: Charles Plessy Uploaders: Miguel Landaeta , Julien Danjou , Thomas Goirand Homepage: https://launchpad.net/cloud-init Standards-Version: 3.9.5 Vcs-Browser: http://anonscm.debian.org/gitweb/?p=collab-maint/cloud-init.git;a=summary Vcs-Git: git://anonscm.debian.org/collab-maint/cloud-init.git Build-Depends: debhelper (>= 9), iproute2, po-debconf, pyflakes, pylint, python, python-boto (>= 2.3), python-cheetah, python-configobj, python-httpretty, python-jsonpatch, python-mocker, python-nose, python-oauth, python-serial, python-setuptools, python-requests, python-yaml Package-List: cloud-init deb admin optional arch=all Checksums-Sha1: 4b31da1c3731bac2726b9443c8f67a6f50152489 504535 cloud-init_0.7.6~bzr976.orig.tar.gz 8a332d201ff4cabaeeb912fab267e66d7a2b40c0 26300 cloud-init_0.7.6~bzr976-2.debian.tar.xz Checksums-Sha256: 7f1ef50424a9731981f5aa8d1289edce24648099e41c6d98e306bb3da7c8f7f4 504535 cloud-init_0.7.6~bzr976.orig.tar.gz 1bcd08aa84f85e8f3ceab4763567975a13c1631bfebb6f053b5df9a17a6eb683 26300 cloud-init_0.7.6~bzr976-2.debian.tar.xz Files: c617becac751badac9bb17f868ee501d 504535 cloud-init_0.7.6~bzr976.orig.tar.gz 469094154fc0f213697a6d13313e1e29 26300 cloud-init_0.7.6~bzr976-2.debian.tar.xz -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBCgAGBQJTt+27AAoJEMW9bI8ildUCkPQP/RPOru3XOkZgg2mYh2Tc2XZU 2Oe89DPynn9aeadVz81XibL1H6t8EvQZdNoZlB15MbKu2jPqwfoSGfVAUnEn0nnt /Z5dC5dauWU1afCKnZDL2g0eYrFrqK5puEdZRd/uWzIFdUTNVMH/zlSvw7B3l9tK GVwDYaGE4gawI0hYHE591IYWvD/ALoVPsQbX2n5s8MdgZLZA1y2QJ4drHLCpMaZ2 lB0zvbkv5J9mPkURu4xqNRbfeovDPuvxbq+alYFqHmHpWySNncDQrNvHJ5YEYN7z yQzeuKmO+n9gTdx+JVCSe7AxFWHLWGV/7plWcKXnr1ClDaUIXFRg3HsdP+g98ct0 /GCvbwe2vycYpMvuXQSSxOx0q23VWt4O/kQRLkF1DWTmUtAxRIoQSk7Fm4z51fHA 9ipQ8pL/8wDe0GRsMud+YFF6swF6AnBBLJu9QyZdgzuSSUug7JHeMOqWBP+FZ+bX UB74fy5/vodbCz72KBuGj9e6Z4mmniAbr0WJm4woX892qqvo7vshYGoUGN0qxusr ux0yIK9tm51F0ql8XsbQKXNJ4WYQKL7PHE8sE8v1O+sPLATWIaywGnhTLfpsfnVB kGso9+TgzQV0qe9yf03mdO/c14w+3+j7ZvyRArejm3dAt26T3mZafqnLOEeghOd3 0N3crA/z1b9+uDJ6NPom =aomw -END PGP SIGNATURE- + timeout 12h nice ionice -c 3 sudo DEB_BUILD_OPTIONS=parallel=15 pbuilder --build --configfile /tmp/pbuilderrc_NivE --debbuildopts -b --basetgz /var/cache/pbuilder/base-reproducible.tgz --distribution sid cloud-init_0.7.6~bzr976-2.dsc W: /root/.pbuilderrc does not exist I: using fakeroot in build. I: Current time: Wed Feb 18 00:15:36 UTC 2015 I: pbuilder-time-stamp: 1424218536 I: Building the build Environment I: extracting base tarball [/var/cache/pbuilder/base-reproducible.tgz] I: creating local configuration I: copying local configuration W: --override-config is not set; not updating apt.conf Read the manpage for details. I: mounting /proc filesystem I: mounting /dev/pts filesystem I: Mounting /dev/shm I: Mounting /run/shm I: policy-rc.d already exists I: Installing the build-deps -> Attempting to satisfy build-dependencies -> Creating pbuilder-satisfydepends-dummy package Package: pbuilder-satisfydepends-dummy Version: 0.invalid.0 Architecture: amd64 Maintainer: Debian Pbuilder Team Description: Dummy package to satisfy dependencies with aptitude - created by pbuilder This package was created automatically by pbuilder to satisfy the build-dependencies of the package being currently built. Depends: debhelper (>= 9), iproute2, po-debconf, pyflakes, pylint, python, python-boto (>= 2.3), python-cheetah, python-configobj, python-httpretty, python-jsonpatch, python-mo
Bug#778646: Multiple issues
I contacted upstream and he's willing to fix it in a different way. He said that he should be able to work on it later this week. regards Bartek W dniu 3/17/2015 o 8:24 AM, Tomasz Buchert pisze: > Hi all, Moritz - did you take a look at my patch? I'd really like > to have a second opinion on that since it is fairly large for an > NMU. > > I attach NMU patch. Shall I upload it to DELAYED/5 or something > like that? > > Cheers, Tomasz > -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#761355: openjp2 2.0 -> 2.1 transition
# no such package as libopenjpeg6-dev in debian fixed 761355 2.1.0-2 # no such package as openjp3d-tools in debian fixed 761357 2.1.0-2 Andreas, Let me know if I misunderstood your email: https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=46;bug=761355#46 Regards -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed (with 4 errors): openjp2 2.0 -> 2.1 transition
Processing commands for cont...@bugs.debian.org: > # no such package as libopenjpeg6-dev in debian > fixed 761355 2.1.0-2 Bug #761355 [src:openjpeg2] libopenjpeg6-dev and libopenjp2-7-dev: error when trying to install together Marked as fixed in versions openjpeg2/2.1.0-2. > # no such package as openjp3d-tools in debian > fixed 761357 2.1.0-2 Bug #761357 [src:openjpeg2] openjp3d-tools and libopenjp3d-tools: error when trying to install together Marked as fixed in versions openjpeg2/2.1.0-2. > Andreas, Unknown command or malformed arguments to command. > Let me know if I misunderstood your email: Unknown command or malformed arguments to command. > https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=46;bug=761355#46 Unknown command or malformed arguments to command. > Regards Unknown command or malformed arguments to command. > End of message, stopping processing here. Please contact me if you need assistance. -- 761355: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761355 761357: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761357 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#778646: Multiple issues
Hi all, Moritz - did you take a look at my patch? I'd really like to have a second opinion on that since it is fairly large for an NMU. I attach NMU patch. Shall I upload it to DELAYED/5 or something like that? Cheers, Tomasz diff -Nru potrace-1.11/debian/changelog potrace-1.11/debian/changelog --- potrace-1.11/debian/changelog 2015-03-17 08:16:28.0 +0100 +++ potrace-1.11/debian/changelog 2015-03-17 08:19:09.0 +0100 @@ -1,3 +1,10 @@ +potrace (1.11-2.1) testing; urgency=medium + + * Non-maintainer upload. + * Fix multiple integer overflows (Closes: #778646) + + -- Tomasz Buchert Tue, 17 Mar 2015 08:11:24 +0100 + potrace (1.11-2) unstable; urgency=low * Uses dh-autoreconf instead of autotools-dev (Closes: #732923) diff -Nru potrace-1.11/debian/patches/0002-Fix-multiple-integer-overflows.patch potrace-1.11/debian/patches/0002-Fix-multiple-integer-overflows.patch --- potrace-1.11/debian/patches/0002-Fix-multiple-integer-overflows.patch 1970-01-01 01:00:00.0 +0100 +++ potrace-1.11/debian/patches/0002-Fix-multiple-integer-overflows.patch 2015-03-17 08:19:09.0 +0100 @@ -0,0 +1,172 @@ +From: Tomasz Buchert +Date: Sun, 1 Mar 2015 20:27:29 +0100 +Subject: Fix multiple integer overflows. + +Dimensions of a BMP file are signed, 4-byte integers. Therefore the size +of the image may be bigger than range of (int). This is fixed in +bitmap.h, by casting all offsets to unsigned long long int (and fixing +another possible overflow in bm_new). + +In bitmap_io.c we make sure that width and height of the image are +non-negative and in (int) range, because other functions require it. + +Moreover, we make sure that allocations do not overflow the range of +size_t by having a wrapper (safe_malloc) that tests whether the +allocation size fits in size_t. +--- + src/bitmap.h| 35 +++ + src/bitmap_io.c | 30 +++--- + 2 files changed, 54 insertions(+), 11 deletions(-) + +diff --git a/src/bitmap.h b/src/bitmap.h +index 1ce13d6..7110926 100644 +--- a/src/bitmap.h b/src/bitmap.h +@@ -7,6 +7,7 @@ + + #include + #include ++#include + + /* The bitmap type is defined in potracelib.h */ + #include "potracelib.h" +@@ -27,7 +28,10 @@ + /* macros for accessing pixel at index (x,y). U* macros omit the +bounds check. */ + +-#define bm_scanline(bm, y) ((bm)->map + (y)*(bm)->dy) ++typedef unsigned long long int ulli; ++ ++#define bm_allocsize(bm) ((ulli)(bm)->dy * (ulli)(bm)->h) ++#define bm_scanline(bm, y) ((bm)->map + ((ulli)(y))*(ulli)(bm)->dy) + #define bm_index(bm, x, y) (&bm_scanline(bm, y)[(x)/BM_WORDBITS]) + #define bm_mask(x) (BM_HIBIT >> ((x) & (BM_WORDBITS-1))) + #define bm_range(x, a) ((int)(x) >= 0 && (int)(x) < (a)) +@@ -43,6 +47,16 @@ + #define BM_INV(bm, x, y) (bm_safe(bm, x, y) ? BM_UINV(bm, x, y) : 0) + #define BM_PUT(bm, x, y, b) (bm_safe(bm, x, y) ? BM_UPUT(bm, x, y, b) : 0) + ++/* allocates memory safely */ ++static inline void* safe_malloc(ulli size) { ++ size_t maxsize = (size_t)-1; ++ if (size > maxsize) { ++errno = ENOMEM; ++return NULL; ++ } ++ return malloc((size_t)size); ++} ++ + /* free the given bitmap. Leaves errno untouched. */ + static inline void bm_free(potrace_bitmap_t *bm) { + if (bm) { +@@ -54,16 +68,21 @@ static inline void bm_free(potrace_bitmap_t *bm) { + /* return new un-initialized bitmap. NULL with errno on error */ + static inline potrace_bitmap_t *bm_new(int w, int h) { + potrace_bitmap_t *bm; +- int dy = (w + BM_WORDBITS - 1) / BM_WORDBITS; ++ int dy; ++ ++ if (w % BM_WORDBITS == 0) ++dy = w / BM_WORDBITS; ++ else ++dy = (w / BM_WORDBITS) + 1; + +- bm = (potrace_bitmap_t *) malloc(sizeof(potrace_bitmap_t)); ++ bm = (potrace_bitmap_t *)safe_malloc(sizeof(potrace_bitmap_t)); + if (!bm) { + return NULL; + } + bm->w = w; + bm->h = h; + bm->dy = dy; +- bm->map = (potrace_word *) malloc(dy * h * BM_WORDSIZE); ++ bm->map = (potrace_word *)safe_malloc(bm_allocsize(bm) * BM_WORDSIZE); + if (!bm->map) { + free(bm); + return NULL; +@@ -73,7 +92,7 @@ static inline potrace_bitmap_t *bm_new(int w, int h) { + + /* clear the given bitmap. Set all bits to c. */ + static inline void bm_clear(potrace_bitmap_t *bm, int c) { +- memset(bm->map, c ? -1 : 0, bm->dy * bm->h * BM_WORDSIZE); ++ memset(bm->map, c ? -1 : 0, bm_allocsize(bm) * BM_WORDSIZE); + } + + /* duplicate the given bitmap. Return NULL on error with errno set. */ +@@ -82,14 +101,14 @@ static inline potrace_bitmap_t *bm_dup(const potrace_bitmap_t *bm) { + if (!bm1) { + return NULL; + } +- memcpy(bm1->map, bm->map, bm->dy * bm->h * BM_WORDSIZE); ++ memcpy(bm1->map, bm->map, bm_allocsize(bm) * BM_WORDSIZE); + return bm1; + } + + /* invert the given bitmap. */ + static inline void bm_invert(potrace_bitmap_t *bm) { +- int i; +- for (i = 0; i < bm->dy * bm->h; i++) { ++ ulli i; ++ for (i = 0; i < bm_allocsize(bm); i++) { + bm->map[i] ^= BM_ALLBITS; + } + } +diff --git
Bug#780599: verbiste: FTBFS on various architectures due to outdated symbols file
Hi, Guillem in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780489 noticed that some symbols indeed changed from unsigned long to unsigned int. It is because size_t resolves to unsigned int instead of unsigned long as before. So it is rather a toolchain change that makes size_t defined in a different way. The funny thing is that on i386 for example, unsigned long & unsinged int is the same thing, but it still mangles differently :). I think that the right solution is to get rid of size_t from public libverbiste API (replace it with unsigned long) and shield ourselves from changes like that. I'll work on that. Now, I also built 0.1.14-2 on testing i386 and it built fine (with debuild -us -uc), but when I tried *exactly the same package* from git on testing i386 (but with git-buildpackage), it fails with symbols problem. It seems that in both cases size_t resolves to a different type! It's rather strange. Cheers, Tomasz signature.asc Description: Digital signature