Bug#781896: marked as done (baloo4: Baloo needs to depend on libqt4-sql-sqlite to start indexing)

2015-04-22 Thread Debian Bug Tracking System
Your message dated Wed, 22 Apr 2015 16:18:56 +
with message-id e1ykxmw-0007ic...@franck.debian.org
and subject line Bug#781896: fixed in baloo 4:4.14.2-1.1
has caused the Debian Bug report #781896,
regarding baloo4: Baloo needs to depend on libqt4-sql-sqlite to start indexing
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
781896: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781896
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: baloo4
Version: 4:4.14.2-1
Severity: serious
Justification: Policy 3.5

Dear Maintainer,

   * What led up to the situation? Installing the package plasma-desktop and
then installing baloo4.
   * What exactly did you do (or not do) that was effective (or
 ineffective)? Installing libqt4-sql-sqlite was effective since it made
baloo4 start indexing files as it should do when it is enabled.
   * What outcome did you expect instead? That the installation of baloo4
installed libqt4-sql-sqlite as dependency, so it started indexing
automatically.



-- System Information:
Debian Release: 8.0
  APT prefers testing-updates
  APT policy: (500, 'testing-updates'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages baloo4 depends on:
ii  baloo-utils4:4.14.2-1
ii  libbaloocore4  4:4.14.2-1
ii  libbaloofiles4 4:4.14.2-1
ii  libbalooxapian44:4.14.2-1
ii  libc6  2.19-17
ii  libgcc11:4.9.2-10
ii  libkdecore54:4.14.2-5
ii  libkdeui5  4:4.14.2-5
ii  libkfilemetadata4  4:4.14.0-1+b2
ii  libkidletime4  4:4.14.2-5
ii  libkio54:4.14.2-5
ii  libqjson0  0.8.1-3
ii  libqt4-dbus4:4.8.6+git64-g5dc8b2b+dfsg-3
ii  libqt4-sql 4:4.8.6+git64-g5dc8b2b+dfsg-3
ii  libqtcore4 4:4.8.6+git64-g5dc8b2b+dfsg-3
ii  libqtgui4  4:4.8.6+git64-g5dc8b2b+dfsg-3
ii  libsolid4  4:4.14.2-5
ii  libstdc++6 4.9.2-10
ii  libxapian221.2.19-1

baloo4 recommends no packages.

baloo4 suggests no packages.

-- no debconf information
---End Message---
---BeginMessage---
Source: baloo
Source-Version: 4:4.14.2-1.1

We believe that the bug you reported is fixed in the latest version of
baloo, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 781...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Balint Reczey bal...@balintreczey.hu (supplier of updated baloo package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 21 Apr 2015 17:23:58 +0200
Source: baloo
Binary: baloo4 baloo baloo-utils libbaloocore4 libbaloofiles4 libbaloopim4 
libbalooqueryparser4 libbalooxapian4 baloo-dev baloo-dbg
Architecture: source amd64
Version: 4:4.14.2-1.1
Distribution: unstable
Urgency: medium
Maintainer: Debian/Ubuntu Qt/KDE Maintainers debian-qt-...@lists.debian.org
Changed-By: Balint Reczey bal...@balintreczey.hu
Description:
 baloo  - transitional package for baloo4
 baloo-dbg  - debugging symbols for Baloo
 baloo-dev  - development files for Baloo
 baloo-utils - utilities for Baloo
 baloo4 - framework for searching and managing metadata
 libbaloocore4 - core functionality for Baloo
 libbaloofiles4 - files functionality for Baloo
 libbaloopim4 - PIM functionality for Baloo
 libbalooqueryparser4 - query Parser for Baloo
 libbalooxapian4 - Xapian functionality for Baloo
Closes: 765084 781896
Changes:
 baloo (4:4.14.2-1.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Depend on libqt4-sql-sqlite (Closes: #781896, #765084)
Checksums-Sha1:
 f6057cb2e9f691f534fde4e4ef06ee8778419820 2748 baloo_4.14.2-1.1.dsc
 7914aae4c69d9d946c2a9e5f8f100132987bfc1d 9940 baloo_4.14.2-1.1.debian.tar.xz
 4c0fdb7af8f081333892153f42c33469cfa51e03 155330 baloo4_4.14.2-1.1_amd64.deb
 c4c7cf9fb2cc8ddec126458dce4084d5159d5198 5056 baloo_4.14.2-1.1_amd64.deb
 de5e409d075bebbb3e794c9b6b6b15cfabfe64e9 164134 
baloo-utils_4.14.2-1.1_amd64.deb
 0bc4582a0d534aa22ff56df042e2da0d8cad11cd 35692 

Processed: merging 783099 783107

2015-04-22 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 merge 783099 783107
Bug #783099 [src:php5] php5: Fileinfo on specific file causes spurious OOM 
and/or segfault
Bug #783107 [src:php5] php5: Fileinfo on specific file causes spurious OOM 
and/or segfault
Merged 783099 783107
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
783099: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783099
783107: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783107
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#760449: marked as done (harden: outdated info)

2015-04-22 Thread Debian Bug Tracking System
Your message dated Wed, 22 Apr 2015 13:28:03 +
with message-id e1ykuh9-0004rz...@franck.debian.org
and subject line Bug#782978: Removed package(s) from unstable
has caused the Debian Bug report #760449,
regarding harden: outdated info
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
760449: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=760449
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
package: harden
severity: serious

Hi,

The information in harden is seriously outdated. The last upload was my NMU to
fix issues for the wheezy release (if we had auto-removals back then, it would
not have been in wheezy). It clains to 'make your system hardened', but that's
obviously not the case. It's probably better to keep it out of jessie.

Cheers,

Ivo
---End Message---
---BeginMessage---
Version: 0.1.38+nmu1+rm

Dear submitter,

as the package harden has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/782978

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmas...@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Scott Kitterman (the ftpmaster behind the curtain)---End Message---


Bug#776987: nmu patch

2015-04-22 Thread Ben Carrillo
apologies, the previous patch didn't apply cleanly.
I'm attaching a new one, against the sqlcipher git repo.

I think this is ready for nmu, if we're still on time.
From 675ede1eff7d271d82695ff2598b4af28399c330 Mon Sep 17 00:00:00 2001
From: Ben Carrillo b...@futeisha.org
Date: Wed, 22 Apr 2015 10:15:04 -0400
Subject: [PATCH] Add a different variable for SQLCIPHER version

Closes: #776987

The version substitution of the patch 20-change-name-to-sqlcipher was
breaking code that relied on the base sqlite library versioning, since
this version is made public in the library and some extensions do a
hardcoded version check that expects the right sqlite version, instead
of the sqlcipher one.

This patch changes the behavior of the mentioned debian patch, and
allows to version the sqlcipher library number separately (used when
configuring the library symbols in the system).
---
 debian/changelog |  8 +
 debian/patches/20-change-name-to-sqlcipher.patch | 43 
 debian/patches/32-fix-pkgconfig-libname.patch|  2 +-
 3 files changed, 46 insertions(+), 7 deletions(-)

diff --git a/debian/changelog b/debian/changelog
index eca50f3..ce265e4 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+sqlcipher (3.2.0-1.1) unstable; urgency=medium
+
+  [ Ben Carrillo ]
+  * Non-maintainer upload.
+  * use a separate variable to track SQLCIPHER version (Closes: #776987)
+
+ -- Micah Anderson mi...@debian.org  Wed, 22 Apr 2015 10:38:05 -0400
+
 sqlcipher (3.2.0-1) unstable; urgency=low
 
   * updated to latest upstream: v3.2.0
diff --git a/debian/patches/20-change-name-to-sqlcipher.patch b/debian/patches/20-change-name-to-sqlcipher.patch
index 4d02dda..64b10c9 100644
--- a/debian/patches/20-change-name-to-sqlcipher.patch
+++ b/debian/patches/20-change-name-to-sqlcipher.patch
@@ -1,7 +1,38 @@
 a/VERSION
-+++ b/VERSION
-@@ -1 +1 @@
--3.8.6
-\ No newline at end of file
+--- a/Makefile.in
 b/Makefile.in
+@@ -89,6 +89,7 @@ TCC += $(OPTS)
+ VERSION = @VERSION@
+ VERSION_NUMBER = @VERSION_NUMBER@
+ RELEASE = @RELEASE@
++SQLCIPHER_VERSION = @SQLCIPHER_VERSION@
+ 
+ # Filename extensions
+ #
+--- /dev/null
 b/VERSION_SQLCIPHER
+@@ -0,0 +1 @@
 +3.2.0
-\ No newline at end of file
+--- a/configure.ac
 b/configure.ac
+@@ -179,6 +179,10 @@ VERSION_NUMBER=[`cat $srcdir/VERSION \
+ AC_MSG_NOTICE(Version number set to $VERSION_NUMBER)
+ AC_SUBST(VERSION_NUMBER)
+ 
++SQLCIPHER_VERSION=[`cat $srcdir/VERSION_SQLCIPHER | sed 's/^\([0-9]*\.*[0-9]*\).*/\1/'`]
++AC_MSG_NOTICE(SQLCipher Version set to $SQLCIPHER_VERSION)
++AC_SUBST(SQLCIPHER_VERSION)
++
+ #
+ # Check to see if the --with-hints=FILE option is used.  If there is none,
+ # then check for a files named $host.hints and ../$hosts.hints where
+--- a/sqlcipher.pc.in
 b/sqlcipher.pc.in
+@@ -7,7 +7,7 @@ includedir=@includedir@
+ 
+ Name: SQLCipher
+ Description: SQL database engine
+-Version: @PACKAGE_VERSION@
++Version: @SQLCIPHER_VERSION@
+ Libs: -L${libdir} -lsqlcipher
+ Libs.private: @LIBS@
+ Cflags: -I${includedir}
diff --git a/debian/patches/32-fix-pkgconfig-libname.patch b/debian/patches/32-fix-pkgconfig-libname.patch
index 5a9a920..44c8dfb 100644
--- a/debian/patches/32-fix-pkgconfig-libname.patch
+++ b/debian/patches/32-fix-pkgconfig-libname.patch
@@ -1,7 +1,7 @@
 --- a/sqlcipher.pc.in
 +++ b/sqlcipher.pc.in
 @@ -10,4 +10,4 @@ Description: SQL database engine
- Version: @PACKAGE_VERSION@
+ Version: @SQLCIPHER_VERSION@
  Libs: -L${libdir} -lsqlcipher
  Libs.private: @LIBS@
 -Cflags: -I${includedir}
-- 
2.1.4



Bug#783130: r-base: FTBFS when setting TZ environmental variable

2015-04-22 Thread Philip Rinn
Package: r-base
Version: 3.2.0-2
Severity: serious
Tags: upstream
Justification: fails to build from source (but built successfully in the past)

Hi Dirk,

I was trying to understand why GNU R FTBFS in the reproducible build env[1]
while building fine on the buildds.
It turns out that setting the TZ environmental variable[2] crashes the build.

*** stack smashing detected ***: /tmp/buildd/r-base-3.2.0/bin/exec/R terminated

 for a BT see [1] ...

The offending command is:

echo
tools:::sysdata2LazyLoadDB(\./R/sysdata.rda\,\../../../library/tools/R\)
| R_DEFAULT_PACKAGES=NULL LC_ALL=C ../../../bin/R --vanilla --slave



To reproduce:

I followed the steps in
https://wiki.debian.org/ReproducibleBuilds/ExperimentalToolchain#Usage_example

and used the rebuild.sh from
http://anonscm.debian.org/cgit/reproducible/misc.git/tree/prebuilder

But I guess just using

sudo TZ=/usr/share/zoneinfo/Etc/GMT+12 pbuilder ...

should also do the trick.

I don't have a clue why this happens - probably something for upstream?


Best,
Philip


[1]
https://reproducible.debian.net/rbuild/unstable/amd64/r-base_3.2.0-2.rbuild.log
[2] http://www.gnu.org/software/libc/manual/html_node/TZ-Variable.html



-- System Information:
Debian Release: 8.0
  APT prefers testing
  APT policy: (600, 'testing'), (550, 'unstable'), (500, 'testing-updates'), 
(450, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#783130: r-base: FTBFS when setting TZ environmental variable

2015-04-22 Thread Philip Rinn
severity 783130 normal
thanks

Ups, that wasn't intended to be 'serious'

Philip


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: r-base: FTBFS when setting TZ environmental variable

2015-04-22 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 783130 normal
Bug #783130 [r-base] r-base: FTBFS when setting TZ environmental variable
Severity set to 'normal' from 'serious'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
783130: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783130
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771203: marked as done (lnav: FTBFS on mips, powerpc and s390x)

2015-04-22 Thread Debian Bug Tracking System
Your message dated Wed, 22 Apr 2015 18:20:20 +
with message-id e1ykzg0-0003nr...@franck.debian.org
and subject line Bug#771203: fixed in lnav 0.7.3-1
has caused the Debian Bug report #771203,
regarding lnav: FTBFS on mips, powerpc and s390x
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
771203: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771203
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Source: lnav
Version: 0.7.1-1
Severity: serious
Justification: FTBFS

lnav/0.7.1-1 uploaded to experimental FTBFS on mips, powerpc and
s390x.

https://buildd.debian.org/status/fetch.php?pkg=lnavarch=mipsver=0.7.1-1stamp=1417091917
https://buildd.debian.org/status/fetch.php?pkg=lnavarch=powerpcver=0.7.1-1stamp=1417089688
https://buildd.debian.org/status/fetch.php?pkg=lnavarch=s390xver=0.7.1-1stamp=1417089614
---End Message---
---BeginMessage---
Source: lnav
Source-Version: 0.7.3-1

We believe that the bug you reported is fixed in the latest version of
lnav, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 771...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso car...@debian.org (supplier of updated lnav package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 22 Apr 2015 19:36:20 +0200
Source: lnav
Binary: lnav
Architecture: source
Version: 0.7.3-1
Distribution: experimental
Urgency: medium
Maintainer: Salvatore Bonaccorso car...@debian.org
Changed-By: Salvatore Bonaccorso car...@debian.org
Description:
 lnav   - ncurses-based log file viewer
Closes: 771203
Changes:
 lnav (0.7.3-1) experimental; urgency=medium
 .
   * Imported Upstream version 0.7.3
 - Fixes FTBFS on big-endian architectures (Closes: #771203)
   * Update copyright years for upstream files
   * Add copyright stanzas for new files in source.
 Add copyright stanzas in debian/copyright for three new files in the
 sources: m4/lnav_with_readline.m4, m4/lnav_with_sqlite3.m4 and
 m4/lnav_with_yajl.m4.
   * debian/copyright: cleanup trailing whitespaces
   * Fix typo in override target for dh_clean in debian/rules
   * Referesh default-to-var-log-syslog-on-Debian.patch patch (offset)
   * Add disable-network-accessing-tests.patch patch.
 Disable tests which will try to access network.
Checksums-Sha1:
 d67c07fcf4cb1f3a6a21634283d56382464df77b 1922 lnav_0.7.3-1.dsc
 522e9482aa1f8f5996e1209ee5f5c2b828b2f48f 499651 lnav_0.7.3.orig.tar.gz
 4c1e3b25c752fd3b5c3b7088b78ed36ed54a5c85 5764 lnav_0.7.3-1.debian.tar.xz
Checksums-Sha256:
 11b3a963bdcf632e59160b35eee5c06bdfe6dda71cf3991230f2e896a040b80c 1922 
lnav_0.7.3-1.dsc
 501ceec4156347f8ca9e2ed1b31ce9a94075748f8d45b07fb9fbbc239e95 499651 
lnav_0.7.3.orig.tar.gz
 4a902d96368edf0b644a2ab355635d37a2e86d5fd92054077f64b05428dc83a5 5764 
lnav_0.7.3-1.debian.tar.xz
Files:
 fb5cdd6e9d9439a3301d32f9d1a377fb 1922 admin optional lnav_0.7.3-1.dsc
 27420c80ee35f3ea0b0808512ae2623b 499651 admin optional lnav_0.7.3.orig.tar.gz
 1161b0578526c65701e3d9ea251e1ab9 5764 admin optional lnav_0.7.3-1.debian.tar.xz

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=eGV9
-END PGP SIGNATUREEnd Message---


Bug#779154: marked as done (CVE-2015-2058)

2015-04-22 Thread Debian Bug Tracking System
Your message dated Wed, 22 Apr 2015 21:33:15 +0200
with message-id 20150422213315.3ef10...@latte.josefsson.org
and subject line Re: CVE-2015-2058
has caused the Debian Bug report #779154,
regarding CVE-2015-2058
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
779154: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779154
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: jabberd2
Severity: grave
Tags: security

This has been assigned CVE-2015-2058:
https://github.com/jabberd2/jabberd2/issues/85

Cheers,
Moritz
---End Message---
---BeginMessage---
Should be fixed with the new 2.3.3 upstream upload, alas we forgot to
put a Closes changelog entry in it.

/Simon


pgpD7j8dvXy4w.pgp
Description: OpenPGP digital signatur
---End Message---


Processed: found 779154 in 2.2.17+dfsg1-2, fixed 779154 in 2.3.3-1

2015-04-22 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 found 779154 2.2.17+dfsg1-2
Bug #779154 {Done: Simon Josefsson si...@josefsson.org} [jabberd2] 
CVE-2015-2058
Marked as found in versions jabberd2/2.2.17+dfsg1-2 and reopened.
 fixed 779154 2.3.3-1
Bug #779154 [jabberd2] CVE-2015-2058
Marked as fixed in versions jabberd2/2.3.3-1.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
779154: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779154
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#783141: lnav: FTBFS on all architectures on buildds

2015-04-22 Thread Salvatore Bonaccorso
Source: lnav
Version: 0.7.3-1
Severity: serious
Justification: FTBFS

lnav/0.7.3-1 builded locally in a pbuilder based build environment,
but the build seems to hang during tests on all architectures:

https://buildd.debian.org/status/package.php?p=lnavsuite=experimental

Regards,
Salvatore


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#781888: [pkg-cinnamon] Bug#781888: cinnamon-session: session does not start

2015-04-22 Thread Norbert Preining
Hi Maximiliano,

thanks for coming back to that.

On Tue, 21 Apr 2015, Maximiliano Curia wrote:
 You seem to have an incomplete upgrade, so my guess is that you are
 missing to upgrade gir1.2-cinnamondesktop-3.0. If not, let me know
 if you find which package you were missing to upgrade.
 
 ii  cinnamon-session-common  2.2.2-5
 
 Well, that's an unexpected missing source:Version

I have retried the upgrade, and made sure anything related to cinnamon
is at experimenta, at least I hope:


ii  cinnamon  2.4.8-1 
amd64Innovative and comfortable desktop
ii  cinnamon-common   2.4.8-1 
all  Innovative and comfortable desktop (Common data files)
ii  cinnamon-control-center   2.4.2-1 
amd64utilities to configure the Cinnamon desktop
ii  cinnamon-control-center-data  2.4.2-1 
all  configuration applets for Cinnamon - data files
ii  cinnamon-desktop-data 2.4.2-1 
all  Common files for Cinnamon desktop apps
ii  cinnamon-l10n 2.4.4-1 
all  Translation files for the Cinnamon desktop
ii  cinnamon-screensaver  2.4.2-1 
amd64Cinnamon screen saver and locker
ii  cinnamon-session  2.4.3-1 
amd64Cinnamon Session Manager - Minimal runtime
ii  cinnamon-session-common   2.4.3-1 
all  Cinnamon Session Manager - common files
ii  cinnamon-settings-daemon  2.4.3-1 
amd64daemon handling the Cinnamon session settings
ii  gir1.2-cinnamondesktop-3.02.4.2-1 
amd64Introspection data for CinnamonDesktop
ii  libcinnamon-control-center1:amd64 2.4.2-1 
amd64utilities to configure the Cinnamon desktop
ii  libcinnamon-desktop4:amd642.4.2-1 
amd64Cinnamon library for loading .desktop files
ii  libcinnamon-menu-3-0  2.4.2-1 
amd64Cinnamon implementation of the freedesktop menu specification

(forgot to include, nemo and nemo-data is at 2.4.5-1)

BUt I still get the following errors when logging in from lightdm
into my cinnamon session. At the point where I sent the xsession-errors
the X screen contains a window
Cinnamon crashed. You are currently running in Fallback Mode.
Do you want to restart Cinnamon?

here the xsession-errors:

Xsession: X session started for norbert at Thu Apr 23 09:32:08 JST 2015
localuser:norbert being added to access control list
I: Script for fcitx started at run_im.
I: Script for auto started at run_im.
I: Script for default started at run_im.
I: Script for fcitx started at run_im.
(INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon 
Config File:fcitx-anthy.conf
(INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon 
Config File:fcitx-skk.conf
(INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon 
Config File:fcitx-mozc.conf
(INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon 
Config File:fcitx-spell.conf
(INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon 
Config File:fcitx-unicode.conf
(INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon 
Config File:fcitx-remote-module.conf
(INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon 
Config File:fcitx-quickphrase.conf
(INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon 
Config File:fcitx-punc.conf
(INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon 
Config File:fcitx-keyboard.conf
(INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon 
Config File:fcitx-imselector.conf
(INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon 
Config File:fcitx-fullwidth-char.conf
(INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon 
Config File:fcitx-clipboard.conf
(INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon 
Config File:fcitx-chttrans.conf
(INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon 
Config File:fcitx-autoeng.conf
(INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon 
Config File:fcitx-freedesktop-notify.conf
(INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon 
Config File:fcitx-ipc.conf
(INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon 
Config File:fcitx-dbus.conf
(INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon 
Config 

Bug#783082: linux-image-3.16.0-4-586: video players/browsers crash with 'illegal instruction' on i586

2015-04-22 Thread Bernhard Übelacker
Hello hikaru,
just saw your report and tried if I could reproduce your issue.

But probably you want to reproduce these steps on your hardware to verify
that this is really the issue on real hardware.


These steps I tried to reproduce:
- install a qemu virtual machine with current jessie with some desktop
  environment and following packages: gdb vlc-dbg libav-dbg
- shut down the VM and restarted with forcing it to i586 with these
  parameters: qemu-system-i386 -cpu pentium ...
- started vlc without starting a video
- started in a terminal gdb: gdb --pid 984
- issue the command cont
- play in vlc a video
- at some point I came to the following exception
- the command bt shows you the call stack which led to the exception
- (to end the crashed vlc issue commands kill and quit)


Stack without having debug symbols installed:
Program received signal SIGILL, Illegal instruction.
[Switching to Thread 0xb17ffb40 (LWP 545)]
0xaf282c93 in ?? () from /usr/lib/i386-linux-gnu/libavcodec.so.56
(gdb) bt
#0  0xaf282c93 in ?? () from /usr/lib/i386-linux-gnu/libavcodec.so.56
#1  0xaf2b9680 in ?? () from /usr/lib/i386-linux-gnu/libavcodec.so.56
#2  0xaf2bd816 in ?? () from /usr/lib/i386-linux-gnu/libavcodec.so.56
#3  0xaf274c86 in ?? () from /usr/lib/i386-linux-gnu/libavcodec.so.56
#4  0xaf4e9c9c in avcodec_decode_video2 () from 
/usr/lib/i386-linux-gnu/libavcodec.so.56
#5  0xb1582801 in ?? () from /usr/lib/vlc/plugins/codec/libavcodec_plugin.so
#6  0xb743928e in ?? () from /usr/lib/libvlccore.so.8
#7  0xb743ae57 in ?? () from /usr/lib/libvlccore.so.8
#8  0xb76a0d97 in start_thread (arg=0xb17ffb40) at pthread_create.c:309
#9  0xb75f7dfe in clone () at ../sysdeps/unix/sysv/linux/i386/clone.S:129
(gdb)

With debug symbols installed:
Program received signal SIGILL, Illegal instruction.
[Switching to Thread 0xb227fb40 (LWP 1002)]
0xafcd9c93 in mid_pred (c=0, b=0, a=0) at 
/build/libav-H9AQHK/libav-11.3/libavcodec/x86/mathops.h:77
77  /build/libav-H9AQHK/libav-11.3/libavcodec/x86/mathops.h: Datei oder 
Verzeichnis nicht gefunden.
(gdb) bt
#0  0xafcd9c93 in mid_pred (c=0, b=0, a=0) at 
/build/libav-H9AQHK/libav-11.3/libavcodec/x86/mathops.h:77
#1  pred_motion (my=synthetic pointer, mx=synthetic pointer, ref=0, 
list=0, part_width=4, n=0, h=0xb233e4c0) at 
/build/libav-H9AQHK/libav-11.3/libavcodec/h264_mvpred.h:140
#2  ff_h264_decode_mb_cavlc (h=0xb233e4c0) at 
/build/libav-H9AQHK/libav-11.3/libavcodec/h264_cavlc.c:959
#3  0xafd10680 in decode_slice (avctx=0xb2338ea0, arg=0xb227f050) at 
/build/libav-H9AQHK/libav-11.3/libavcodec/h264_slice.c:2275
#4  0xafd14816 in ff_h264_execute_decode_slices (h=0xb233e4c0, 
context_count=1) at /build/libav-H9AQHK/libav-11.3/libavcodec/h264_slice.c:2369
#5  0xafccbc86 in decode_nal_units (parse_extradata=0, buf_size=74, 
buf=0xb2302500 , h=0xb233e4c0) at 
/build/libav-H9AQHK/libav-11.3/libavcodec/h264.c:1662
#6  h264_decode_frame (avctx=0xb2338ea0, data=0xb2303040, 
got_frame=0xb227f1a8, avpkt=0xb227f1d4) at 
/build/libav-H9AQHK/libav-11.3/libavcodec/h264.c:1782
#7  0xaff40c9c in avcodec_decode_video2 (avctx=0xb2338ea0, 
picture=0xb2303040, got_picture_ptr=0xb227f1a8, avpkt=0xb227f1d4) at 
/build/libav-H9AQHK/libav-11.3/libavcodec/utils.c:1600
#8  0xb2003801 in DecodeVideo (p_dec=0xb2335180, pp_block=0xb227f1a8) at 
codec/avcodec/video.c:631
#9  0xb74d428e in DecoderDecodeVideo (p_dec=0xb2335180, p_block=0xb2302490) 
at input/decoder.c:1385
#10 0xb74d5e57 in DecoderProcessVideo (b_flush=optimized out, 
p_block=0xb2302490, p_dec=optimized out) at input/decoder.c:1631
#11 DecoderProcess (p_block=optimized out, p_dec=optimized out) at 
input/decoder.c:1810
#12 DecoderThread (p_data=0xb2335180) at input/decoder.c:909
#13 0xb773bd97 in start_thread (arg=0xb227fb40) at pthread_create.c:309
#14 0xb7692dfe in clone () at ../sysdeps/unix/sysv/linux/i386/clone.S:129
(gdb)

Current instruction:
   (gdb) display/i $pc
   1: x/i $pc
   = 0xafc39c93 ff_h264_decode_mb_cavlc+11395:  cmovg  %edx,%edi


libavcodec/x86/mathops.h:77
There we find some inline assembly guarded by an #if HAVE_I686.


It looks like that the package libavcodec56 has exactly for
this use case 2 version of the shared object packaged:
/usr/lib/i386-linux-gnu/libavcodec.so.56.1.0
/usr/lib/i386-linux-gnu/i686/cmov/libavcodec.so.56.1.0


So I started up a local package build for libav which is still
running with following lines in:

libav-11.3/debian-shared/config.h
  #define LIBAV_CONFIGURATION --arch=i386 ... --cpu=586
  #define HAVE_I686 1


So probably this upstream commit could already be sufficient?
  [1] configure: Disable i686 for i586 and lower CPUs


Kind regards,
Bernhard


[1] 
https://git.libav.org/?p=libav.git;a=commit;h=9030c58a780a02fb8256cb75cd39275eaad786d1


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? 

Bug#783154: libwine-development: cannot be installed - try to overwrite ...

2015-04-22 Thread Norbert Preining
Package: libwine-development
Version: 1.7.41-1
Severity: grave
Justification: renders package unusable

Hi

there seems to be some replace are missing:
Unpacking libwine-development:amd64 (1.7.41-1) over (1.7.29-4) ...
dpkg: error processing archive 
/var/cache/apt/archives/libwine-development_1.7.41-1_amd64.deb (--unpack):
 trying to overwrite shared 
'/usr/share/wine-development/wine/fonts/sseriffe.fon', which is different from 
other instances of package libwine-development:amd64



-- System Information:
Debian Release: 8.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (200, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.0.0 (SMP w/4 CPU cores; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#783154: libwine-development: cannot be installed - try to overwrite ...

2015-04-22 Thread jre
Control: forcemerge 781557 -1

Hi,

this was already reported, merging the bugs.

It should be fixed in 1.7.41-2, which is currently in the new queue:
https://ftp-master.debian.org/new/wine-development_1.7.41-2.html

Greets
jre


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: severity of 783082 is important, reassign 783082 to src:libav

2015-04-22 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 783082 important
Bug #783082 [src:linux] linux-image-3.16.0-4-586: video players/browsers crash 
with 'illegal instruction' on i586
Severity set to 'important' from 'critical'
 reassign 783082 src:libav
Bug #783082 [src:linux] linux-image-3.16.0-4-586: video players/browsers crash 
with 'illegal instruction' on i586
Bug reassigned from package 'src:linux' to 'src:libav'.
No longer marked as found in versions linux/3.16.7-ckt9-2.
Ignoring request to alter fixed versions of bug #783082 to the same values 
previously set
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
783082: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783082
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#783148: wpa: CVE-2015-1863: wpa_supplicant P2P SSID processing vulnerability

2015-04-22 Thread Salvatore Bonaccorso
Source: wpa
Version: 2.3-1
Severity: grave
Tags: security upstream patch
Justification: user security hole

Hi,

the following vulnerability was published for wpa.

CVE-2015-1863[0]:
| P2P SSID processing vulnerability:
| A vulnerability was found in how wpa_supplicant uses SSID information
| parsed from management frames that create or update P2P peer entries
| (e.g., Probe Response frame or number of P2P Public Action frames). SSID
| field has valid length range of 0-32 octets. However, it is transmitted
| in an element that has a 8-bit length field and potential maximum
| payload length of 255 octets. wpa_supplicant was not sufficiently
| verifying the payload length on one of the code paths using the SSID
| received from a peer device.
|
| This can result in copying arbitrary data from an attacker to a fixed
| length buffer of 32 bytes (i.e., a possible overflow of up to 223
| bytes). The SSID buffer is within struct p2p_device that is allocated
| from heap. The overflow can override couple of variables in the struct,
| including a pointer that gets freed. In addition about 150 bytes (the
| exact length depending on architecture) can be written beyond the end of
| the heap allocation.
|
| This could result in corrupted state in heap, unexpected program
| behavior due to corrupted P2P peer device information, denial of service
| due to wpa_supplicant process crash, exposure of memory contents during
| GO Negotiation, and potentially arbitrary code execution.
|
| Vulnerable versions/configurations
|
| wpa_supplicant v1.0-v2.4 with CONFIG_P2P build option enabled
|
| Attacker (or a system controlled by the attacker) needs to be within
| radio range of the vulnerable system to send a suitably constructed
| management frame that triggers a P2P peer device information to be
| created or updated.
|
| The vulnerability is easiest to exploit while the device has started an
| active P2P operation (e.g., has ongoing P2P_FIND or P2P_LISTEN control
| interface command in progress). However, it may be possible, though
| significantly more difficult, to trigger this even without any active
| P2P operation in progress.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities  Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2015-1863
[1] http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt
[2] 
http://w1.fi/security/2015-1/0001-P2P-Validate-SSID-element-length-before-copying-it-C.patch

Regards,
Salvatore


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: reassign 783041 to installation-reports, reassign 782877 to libgtk2-appindicator-perl, affects 782098

2015-04-22 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 reassign 783041 installation-reports
Bug #783041 [installation-reports (debian 8 jessie di-rc3 installer amd64 dvd)] 
Advanced Options in Debian 8 Jessie DI-rc3 installer (Debian 8 Jessie DI-rc3 
installer AMD64 DVD ( Re-submited)
Warning: Unknown package 'debian'
Warning: Unknown package '8'
Warning: Unknown package 'jessie'
Warning: Unknown package 'di-rc3'
Warning: Unknown package 'installer'
Warning: Unknown package 'amd64'
Warning: Unknown package 'dvd'
Bug reassigned from package 'installation-reports (debian 8 jessie di-rc3 
installer amd64 dvd)' to 'installation-reports'.
Ignoring request to alter found versions of bug #783041 to the same values 
previously set
Ignoring request to alter fixed versions of bug #783041 to the same values 
previously set
 reassign 782877 libgtk2-appindicator-perl
Bug #782877 [src:libgtk-appindicator] libgtk-appindicator: please make the 
build reproducible
Warning: Unknown package 'src:libgtk-appindicator'
Bug reassigned from package 'src:libgtk-appindicator' to 
'libgtk2-appindicator-perl'.
No longer marked as found in versions libgtk-appindicator/0.15-1.
Ignoring request to alter fixed versions of bug #782877 to the same values 
previously set
 affects 782098 + libgazebo5-dev
Bug #782098 [openexr,libopenexr-dev] openexr, libopenexr-dev: directory vs. 
symlink conflict: /usr/share/doc/{openexr, libopenexr-dev} - 
/usr/share/doc/libopenexr6
Added indication that 782098 affects libgazebo5-dev
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
782098: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782098
782877: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782877
783041: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783041
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#783155: hspec-discover: fails to upgrade from 'sid' - trying to overwrite /usr/bin/hspec-discover

2015-04-22 Thread Andreas Beckmann
Package: hspec-discover
Version: 2.1.5-1
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package fails to upgrade from
'sid' to 'experimental'.
It installed fine in 'sid', then the upgrade to 'experimental' fails
because it tries to overwrite other packages files without declaring a
Breaks+Replaces relation.

See policy 7.6 at
https://www.debian.org/doc/debian-policy/ch-relationships.html#s-replaces

From the attached log (scroll to the bottom...):

  Selecting previously unselected package hspec-discover.
  Preparing to unpack .../hspec-discover_2.1.5-1_amd64.deb ...
  Unpacking hspec-discover (2.1.5-1) ...
  dpkg: error processing archive 
/var/cache/apt/archives/hspec-discover_2.1.5-1_amd64.deb (--unpack):
   trying to overwrite '/usr/bin/hspec-discover', which is also in package 
libghc-hspec-dev 1.11.0-1
  dpkg-deb: error: subprocess paste was killed by signal (Broken pipe)
  Errors were encountered while processing:
   /var/cache/apt/archives/hspec-discover_2.1.5-1_amd64.deb


cheers,

Andreas


libghc-hspec-dev=1.11.0-1_hspec-discover=2.1.5-1.log.gz
Description: application/gzip


Processed: Re: libwine-development: cannot be installed - try to overwrite ...

2015-04-22 Thread Debian Bug Tracking System
Processing control commands:

 forcemerge 781557 -1
Bug #781557 [libwine-development] libwine-development: upgrade failure: file 
overwrite
Bug #783154 [libwine-development] libwine-development: cannot be installed - 
try to overwrite ...
Severity set to 'serious' from 'grave'
Marked as found in versions wine-development/1.7.39-1 and 
wine-development/1.7.38-1.
Merged 781557 783154

-- 
781557: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781557
783154: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783154
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#779154: CVE-2015-2058

2015-04-22 Thread Simon Josefsson
Willem and I are in the process of packaging/uploading the 2.3.3 release
which should take care of this.

/Simon


signature.asc
Description: PGP signature


Processed: fileinfo

2015-04-22 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 clone 783099 -1 -2
Bug #783099 [src:php5] php5: Fileinfo on specific file causes spurious OOM 
and/or segfault
Bug 783099 cloned as bugs 783107-783108
 retitle -2 file: OOM and/or segfault
Bug #783108 [src:php5] php5: Fileinfo on specific file causes spurious OOM 
and/or segfault
Changed Bug title to 'file: OOM and/or segfault' from 'php5: Fileinfo on 
specific file causes spurious OOM and/or segfault'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
783099: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783099
783108: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783108
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: file case

2015-04-22 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 notfound 783108 php5/5.6.7+dfsg-1
Bug #783108 [src:php5] file: OOM and/or segfault
No longer marked as found in versions php5/5.6.7+dfsg-1.
 found 783108 file/1:5.22+15-2
Bug #783108 [src:php5] file: OOM and/or segfault
Marked as found in versions file/1:5.22+15-2.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
783108: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783108
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: tagging 783108

2015-04-22 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 783108 - fixed-upstream
Bug #783108 [src:php5] file: OOM and/or segfault
Removed tag(s) fixed-upstream.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
783108: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783108
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#771671: Upload pending for #771671 and #782033

2015-04-22 Thread Balint Reczey
Hi,

I have uploaded a fixed version to DELAYED/1 with the attached fix.

Cheers,
Balint
diff -Nru kexec-tools-2.0.7/debian/changelog kexec-tools-2.0.7/debian/changelog
--- kexec-tools-2.0.7/debian/changelog	2014-11-24 15:35:55.0 +0100
+++ kexec-tools-2.0.7/debian/changelog	2015-04-22 12:06:28.0 +0200
@@ -1,3 +1,11 @@
+kexec-tools (1:2.0.7-5.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Don't reboot the machine while removing the package (Closes: #782033)
+  * Fix loading kdump kernel on i386 (Closes: #771671)
+
+ -- Balint Reczey bal...@balintreczey.hu  Wed, 22 Apr 2015 12:04:44 +0200
+
 kexec-tools (1:2.0.7-5) unstable; urgency=medium
 
   * Deleted the extra -x from #!/bin/sh -x in kexec-load init
diff -Nru kexec-tools-2.0.7/debian/kexec-load.init.d kexec-tools-2.0.7/debian/kexec-load.init.d
--- kexec-tools-2.0.7/debian/kexec-load.init.d	2014-11-24 05:02:10.0 +0100
+++ kexec-tools-2.0.7/debian/kexec-load.init.d	2015-04-22 12:04:36.0 +0200
@@ -109,6 +109,9 @@
 			exit 0
 		fi
 	fi
+	if [ -x /sbin/runlevel -a $(runlevel | awk '{ print $2 }') != 6 ]; then 
+		exit 0
+	fi
 	do_stop
 	;;
   *)
diff -Nru kexec-tools-2.0.7/debian/patches/fix-callback-functions-given-to-kexec_iomem_for_each_line.patch kexec-tools-2.0.7/debian/patches/fix-callback-functions-given-to-kexec_iomem_for_each_line.patch
--- kexec-tools-2.0.7/debian/patches/fix-callback-functions-given-to-kexec_iomem_for_each_line.patch	1970-01-01 01:00:00.0 +0100
+++ kexec-tools-2.0.7/debian/patches/fix-callback-functions-given-to-kexec_iomem_for_each_line.patch	2015-04-22 11:59:37.0 +0200
@@ -0,0 +1,44 @@
+Description: Fix callback functions given to kexec_iomem_for_each_line
+Author: Bernhard Übelacker bernha...@vr-web.de
+Bug-Debian: https://bugs.debian.org/771671
+Last-Update: 2014-12-15
+
+--- kexec-tools-2.0.7.orig/kexec/arch/i386/crashdump-x86.c
 kexec-tools-2.0.7/kexec/arch/i386/crashdump-x86.c
+@@ -1041,8 +1041,8 @@ int get_max_crash_kernel_limit(uint64_t
+ 
+ static int crashkernel_mem_callback(void *UNUSED(data), int nr,
+   char *UNUSED(str),
+-  unsigned long base,
+-  unsigned long length)
++  unsigned long long base,
++  unsigned long long length)
+ {
+ 	if (nr = CRASH_RESERVED_MEM_NR)
+ 		return 1;
+--- kexec-tools-2.0.7.orig/kexec/arch/sh/crashdump-sh.c
 kexec-tools-2.0.7/kexec/arch/sh/crashdump-sh.c
+@@ -34,8 +34,8 @@ static struct memory_range crash_memory_
+ static int crash_sh_range_nr;
+ static int crash_sh_memory_range_callback(void *UNUSED(data), int UNUSED(nr),
+ 	  char *str,
+-	  unsigned long base,
+-	  unsigned long length)
++	  unsigned long long base,
++	  unsigned long long length)
+ {
+ 
+ 	struct memory_range *range = crash_memory_range;
+--- kexec-tools-2.0.7.orig/kexec/arch/sh/kexec-sh.c
 kexec-tools-2.0.7/kexec/arch/sh/kexec-sh.c
+@@ -24,8 +24,8 @@ static struct memory_range memory_range[
+ 
+ static int kexec_sh_memory_range_callback(void *UNUSED(data), int nr,
+ 	  char *UNUSED(str),
+-	  unsigned long base,
+-	  unsigned long length)
++	  unsigned long long base,
++	  unsigned long long length)
+ {
+ 	if (nr  MAX_MEMORY_RANGES) {
+ 		memory_range[nr].start = base;
diff -Nru kexec-tools-2.0.7/debian/patches/series kexec-tools-2.0.7/debian/patches/series
--- kexec-tools-2.0.7/debian/patches/series	2014-07-25 18:31:19.0 +0200
+++ kexec-tools-2.0.7/debian/patches/series	2015-04-22 12:07:00.0 +0200
@@ -6,3 +6,4 @@
 linker-option.patch
 const_string_warning.patch
 powerpcspe_support.patch
+fix-callback-functions-given-to-kexec_iomem_for_each_line.patch


Processed: reassign 783108 to file

2015-04-22 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 reassign 783108 file
Bug #783108 [src:php5] file: OOM and/or segfault
Bug reassigned from package 'src:php5' to 'file'.
No longer marked as found in versions file/1:5.22+15-2.
Ignoring request to alter fixed versions of bug #783108 to the same values 
previously set
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
783108: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783108
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: .

2015-04-22 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 771671 pending
Bug #771671 [kexec-tools] /sbin/kexec: Unable to load kdump kernel on i386
Added tag(s) pending.
 tags 782033 pending
Bug #782033 [kexec-tools] kexec-tools: Reboots the machine while removing the 
package
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
771671: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771671
782033: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782033
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#782363: multipath-tools-boot: include dm-service-time in initramfs (new default path selector)

2015-04-22 Thread Mauricio Faria de Oliveira

Hi Ritesh,

On 04/21/2015 10:14 AM, Ritesh Raj Sarraf wrote:

On Saturday 11 April 2015 04:29 AM, Mauricio Faria de Oliveira wrote:


May you please consider the attached patch for an upload for jessie?



Sorry. I haven't been on top of it. I'll push it for unstable for now.
Later we'll do an s-p-u and propose it for jessie.


Great, thanks!


--
Mauricio Faria de Oliveira
IBM Linux Technology Center


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: tagging 780673

2015-04-22 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 780673 + moreinfo
Bug #780673 [gitolite3] gitolite3: git-annex shell is not working: FATAL: bad  
git-annex-shell  command - patch available
Added tag(s) moreinfo.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
780673: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780673
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#782400: multipath-tools: libmultipath: fix discovery of devices with empty rev sysfs attribute

2015-04-22 Thread Mauricio Faria de Oliveira

Hey Ritesh,

On 04/21/2015 10:23 AM, Ritesh Raj Sarraf wrote:

Is this been merged upstream ?


No, I haven't seen any reply to it on dm-devel nor commits.
I have the impression there's some delay between those 2 points.

I just pinged Hannes on the mailing list, in case he has some time
to check/acknowledge it, so we may have an idea if that's eventually
going upstream or requires more changes, before including in Debian.

Thanks!

--
Mauricio Faria de Oliveira
IBM Linux Technology Center


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#783099: php5: Fileinfo on specific file causes spurious OOM and/or segfault

2015-04-22 Thread Henri Salo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Source: php5
Version: 5.6.7+dfsg-1
Severity: grave
Tags: security, upstream, fixed-upstream

Hi,

the following vulnerability was published for PHP5,


When calling finfo::file() or finfo::buffer() with a crafted string, PHP will
crash by either segfaulting or trying to allocate an large amount of memory
(4GiB).

This was found in the wild when a user uploaded a file (running finfo on
arbitrary files uploaded by users is one of its main use cases.). I've since
anonymised the file, and made it more minimal. At this stage, very small changes
to the string make it produce different behaviour - removing the remaining 'a',
's', or 'y' characters, for instance, will allow finfo to process it fine.


For further information see:
  https://bugs.php.net/bug.php?id=68819
  
https://git.php.net/?p=php-src.git;a=commitdiff;h=f938112c495b0d26572435c0be73ac0bfe642ecd

- -- 
Henri Salo
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=y0h8
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#765577: (no subject)

2015-04-22 Thread Faidon Liambotis
reopen 765577 !
found 765577 215-14
thanks

On Mon, Mar 30, 2015 at 06:06:47AM +0200, Marco d'Itri wrote:
 I see that we have independently devised the same fix, I am attaching 
 a test case and a more refined version of your patch.

I tried Jessie RC3 today and immediately found that the fix is,
unfortunately, buggy. Your patch constructs a regexp and takes care to
escape metacharacters ? and * with a sed but does not escape { and
} that are also metacharacters in the extended set of POSIX regexps.
These are always found in the string-to-be-matched here with
'ATTR{dev_id}==0x0' and 'ATTR{type}==1', so the if always fails.

This was likely not caught by your test case (and was harder to debug
and figure out!) because GNU grep's -E mode handles { as both a literal
and a metacharacter heuristically for historic reasons (consult grep's
manpage for that) but busybox grep does not:
  $ echo 'foo{bar}'  test
  $ egrep 'foo{bar}' test 
  foo{bar}
  $ busybox egrep 'foo{bar}' test 
  egrep: bad regex 'foo{bar}'
  $ egrep 'fo{1,2}' test 
  foo{bar}
  $ busybox egrep 'fo{1,2}' test 
  foo{bar}
Note that this is NOT a bug in busybox; foo{bar} is indeed an invalid
extended POSIX regexp and busybox is right to complain and error out.

The very minimal last-minute fix below did the trick for me but I have
to say... constructing regexps in shell is tricky and the whole
escaping-with-sed logic feels like a hack. I think a literal grep (i.e.
-F) would be better here, especially since I don't see the point of an
exact match (even if the file was modified by the sysadmin, the right
thing would to not write a new rule anyway). This is probably something
to be considered post-jessie.

Thanks,
Faidon

diff --git a/debian/extra/write_net_rules b/debian/extra/write_net_rules
index 38a3ca0..fedc0f1 100644
--- a/debian/extra/write_net_rules
+++ b/debian/extra/write_net_rules
@@ -118,7 +118,7 @@ basename=${INTERFACE%%[0-9]*}
 match=$match, KERNEL==\$basename*\
 
 # build a regular expression that matches the new rule that we want to write
-new_rule_pattern=$(echo ^SUBSYSTEM==\net\, ACTION==\add\$match | sed -re 
's/([\?\*])/\\\1/g')
+new_rule_pattern=$(echo ^SUBSYSTEM==\net\, ACTION==\add\$match | sed -re 
's/([\?\*\{\}])/\\\1/g')
 
 # Double check if the new rule has already been written. This happens if
 # multiple add events are generated before the script returns and udevd


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#765577: (no subject)

2015-04-22 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 reopen 765577 !
Bug #765577 {Done: Martin Pitt mp...@debian.org} [udev-udeb] netboot install 
writes duplicates to 70-persistent-net.rules
Bug #777126 {Done: Martin Pitt mp...@debian.org} [udev-udeb] udev: duplicate 
eth? entries
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
Changed Bug submitter to 'Faidon Liambotis parav...@debian.org' from 'Petter 
Reinholdtsen p...@hungry.com'
No longer marked as fixed in versions systemd/219-6 and systemd/215-14.
No longer marked as fixed in versions systemd/219-6 and systemd/215-14.
 found 765577 215-14
Bug #765577 [udev-udeb] netboot install writes duplicates to 
70-persistent-net.rules
Bug #777126 [udev-udeb] udev: duplicate eth? entries
Marked as found in versions systemd/215-14.
Marked as found in versions systemd/215-14.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
765577: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765577
777126: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777126
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org