Bug#368297: How to check if the application forgot to initialize Libgcrypt?
Whether the OpenLDAP code that depends on GnuTLS is in a separate process from the application or not, it might still need to set Libgcrypt thread support callbacks when it initializes GnuTLS. Werner Koch makes the point that ideally the application (nss-pam-ldapd or whatever) would initialize Libgcrypt. Meanwhile everyone seems to agree that a library which introduces an indirect dependency on Libgcrypt (i.e. GnuTLS) should be failsafe and initialize Libgcrypt itself if the application forgot to do that. Then how should it check if the application forgot to initialize Libgcrypt? Testing GCRYCTL_ANY_INITIALIZATION_P is consistent with Libgcrypt documentation... -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#368297: Blog post about Libgcrypt issue
Hi, here is a blog post about this issue: http://jdbates.blogspot.ca/2013/04/its-crazy-how-much-time-and-effort-one.html -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#368297: About the libgcrypt and OpenLDAP issue
On 03/04/13 10:43 AM, Carlos Alberto Lopez Perez wrote: Furthermore libgcrypt upstream seems to be ok with this change, isn't it? [3] Thanks for finding this upstream thread Carlos! And for your work earlier where you spotted the 2005 upstream commit. [3] http://thread.gmane.org/gmane.comp.encryption.gpg.libgcrypt.devel/2198 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#368297: Initializing Libgcrypt
I contributed a fix for the regression caused by the solution in Ubuntu [1]. The Python wrapper for the GnuTLS library doesn't initialize Libgcrypt properly. One addition to Carlos' analysis: The problem is that when OpenLDAP calls gnutls_global_init(), this function does nothing because OpenLDAP had previously already initialized libgcrypt at some point on the stack (probably by mistake). My understanding of Howard Chu in LP: #423252 comment #72 [2] is that OpenLDAP doesn't initialize Libgcrypt (it doesn't invoke gcry_check_version which the manual states must be invoked before any other function in the library, and which is correctly invoked by gnutls_global_init). OpenLDAP is required to initialize Libgcrypt's thread callbacks with GCRYCTL_SET_THREAD_CBS and prior to Libgcrypt version 1.3.X GCRYCTL_SET_THREAD_CBS didn't invoke global_init. So the solution in Ubuntu [3] is consistent with the Libgcrypt manual (gcry_check_version must be invoked before any other function in the library, with the exception of the GCRYCTL_SET_THREAD_CBS command) and with the original behavior of the library. [1] https://code.launchpad.net/~nottheoilrig/ubuntu/quantal/python-gnutls/fix-for-1013798/+merge/154767 [2] https://bugs.launchpad.net/bugs/423252 [3] https://launchpadlibrarian.net/45701569/dif1.txt -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#472849: more descriptive error
I was just bitten by this and it took me a while to locate this bug report. Could Rhythmbox please report a more descriptive warning to the user? For example, when I start Rhythmbox without python-gst, I simply get a warning that the cover art etc. failed to load. Could it please instead explain that the Python generic media-playing framework is not installed? Thanks for maintaining Rhythmbox in Debian, Jack signature.asc Description: This is a digitally signed message part
Bug#470291: Intend to NMU
Thank you for addressing this bug Jan, and for fixing the trailing whitespace. Your patch looks great to me, please upload at your earliest convenience. Thank you for your NMU Best wishes, Jack On Sat, 2008-03-22 at 01:13 +0100, Jan Wagner wrote: tags 470291 +patch Hi Jack, I intend to NMU your package to fix #470291 and some formating bugs. The patch is attached and can be found at [1], the package at [2]. Please integrate the changes into your new package. If the bug is left open in 10 days, I'll upload the package to DELAYED/7-day (or sooner, if requested by the you). If you do not wish for this NMU to occur, please send a follow-up in the bug report stating as such or, better yet, fix it in an MU :) With kind regards, Jan. [1] http://ftp.cyconet.org/debian/nmu-diff/php-codesniffer_1.0.1-1.1.patch [2] http://ftp.cyconet.org/debian/archive/official/php-codesniffer/1.0.1-1.1/php-codesniffer_1.0.1-1.1.dsc signature.asc Description: This is a digitally signed message part
Bug#458555: same error
Same error here... Jack signature.asc Description: This is a digitally signed message part
Bug#430186: upload
Thanks for releasing Net::DBus::Perl 33.5 so quickly Daniel. I prepared packages and am ready to upload to Debian: http://cgi.sfu.ca/~jdbates/debian/pool/libnet-dbus-perl/ Thanks everyone who provided feedback on this bug and Daniel's fix! Do you have an opportunity to upload the new version of this package Ryan? Thanks, Jack signature.asc Description: Digital signature
Bug#430186: new package with upstream patches
I prepared a new package with Daniel's patches applied. If someone can confirm that it resolves this bug, I will upload the new package: http://cgi.sfu.ca/~jdbates/debian/pool/libnet-dbus-perl/ Thanks, Jack signature.asc Description: Digital signature
Bug#430186: [EMAIL PROTECTED]: Re: libnet-dbus-perl calls dbus_message_iter_open_container with invalid arguments]
Thanks very much for your fast response to this issue Daniel! I'm away for the Canadian long weekend, can someone please confirm that Daniel's patches fix the problem in Debian and provide feedback in the RT ticket? http://rt.cpan.org/Public/Bug/Display.html?id=27733 Thanks again, Jack - Forwarded message from Daniel P. Berrange [EMAIL PROTECTED] - X-Sieve: CMU Sieve 2.2 X-Spam-Checker-Version: SpamAssassin 3.2.0 (2007-05-01) on pop3.freezone.co.uk X-Spam-Level: X-Spam-Status: No, score=0.7 required=3.3 tests=AWL=-0.697,DATE_IN_PAST_03_06=1.394 _DCCR_ dns:berrange.com [80.68.90.122] dns:berrange.com?type=MX [10 mail.berrange.com.] autolearn=no X-Spam-Relay-Country: GB ** ** GB GB GB From: Daniel P. Berrange [EMAIL PROTECTED] To: Jack Bates [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: Re: libnet-dbus-perl calls dbus_message_iter_open_container with invalid arguments Reply-To: Daniel P. Berrange [EMAIL PROTECTED] X-Virus-Scanned: by Freezone Internet Hi Jack, On Mon, Jun 25, 2007 at 10:12:37AM -0700, Jack Bates wrote: forwarded 430186 http://rt.cpan.org//Ticket/Display.html?id=27733 thanks Hi Daniel, Debian users have recently upgraded to dbus 1.1.1 and discovered libnet-dbus-perl calls dbus_message_iter_open_container with invalid arguments: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=430186 Consequently some gnome-system-tools are inoperable. Severity: grave bugs have been filed against lib-net-dbus-perl: http://bugs.debian.org/cgi-bin/pkgreport.cgi?pkg=libnet-dbus-perl;dist=unstable Do you have any time these days to take a look at this issue? I've attached two patches to the CPAN RT ticket which address the problems with new assertion checks in DBus 1.1.1. In my tests the second patch has now solved the gnome-system-tools crash. Please comment on the CPAN ticket whether this solves the problems seen in latest Debian Regards, Dan. -- |=-GPG key: http://www.berrange.com/~dan/gpgkey.txt -=| |=- Perl modules: http://search.cpan.org/~danberr/ -=| |=- Projects: http://freshmeat.net/~danielpb/ -=| |=- [EMAIL PROTECTED] - Daniel Berrange - [EMAIL PROTECTED]-=| - End forwarded message - signature.asc Description: Digital signature
Bug#430186: [EMAIL PROTECTED]: Re: libnet-dbus-perl calls dbus_message_iter_open_container with invalid arguments]
- Forwarded message from Daniel P. Berrange [EMAIL PROTECTED] - X-Sieve: CMU Sieve 2.2 X-Spam-Checker-Version: SpamAssassin 3.2.0 (2007-05-01) on pop3.freezone.co.uk X-Spam-Level: X-Spam-Status: No, score=0.0 required=3.3 tests=none _DCCR_ dns:berrange.com [80.68.90.122] dns:berrange.com?type=MX [10 mail.berrange.com.] autolearn=no X-Spam-Relay-Country: GB ** ** GB GB GB From: Daniel P. Berrange [EMAIL PROTECTED] To: Jack Bates [EMAIL PROTECTED] Subject: Re: libnet-dbus-perl calls dbus_message_iter_open_container with invalid arguments Reply-To: Daniel P. Berrange [EMAIL PROTECTED] X-Virus-Scanned: by Freezone Internet On Mon, Jun 25, 2007 at 10:12:37AM -0700, Jack Bates wrote: forwarded 430186 http://rt.cpan.org//Ticket/Display.html?id=27733 thanks Hi Daniel, Debian users have recently upgraded to dbus 1.1.1 and discovered libnet-dbus-perl calls dbus_message_iter_open_container with invalid arguments: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=430186 Consequently some gnome-system-tools are inoperable. Severity: grave bugs have been filed against lib-net-dbus-perl: http://bugs.debian.org/cgi-bin/pkgreport.cgi?pkg=libnet-dbus-perl;dist=unstable Do you have any time these days to take a look at this issue? I can make some time :-) Do you have any stack trace for the code which causes the abort with invalid arguments. If so, I'm thinking it ought to be fairly easy to fix. Regards, Dan. -- |=-GPG key: http://www.berrange.com/~dan/gpgkey.txt -=| |=- Perl modules: http://search.cpan.org/~danberr/ -=| |=- Projects: http://freshmeat.net/~danielpb/ -=| |=- [EMAIL PROTECTED] - Daniel Berrange - [EMAIL PROTECTED]-=| - End forwarded message - signature.asc Description: Digital signature
Bug#396669: Segmentation fault
Package: libapache-mod-auth-kerb Version: 5.1-1 Severity: grave libapache-mod-auth-kerb causes apache to segfault: tor% sudo invoke-rc.d apache start Starting apache 1.3 web server.../etc/init.d/apache: line 51: 24726 Segmentation fault $ENV $SSD --start --pidfile $PIDFILE --exec $DAEMON --oknodo /dev/null failed! invoke-rc.d: initscript apache, action start failed. tor% However when I remove LoadModule auth_kerb_module /usr/lib/apache/1.3/mod_auth_kerb.so from /etc/apache/modules.conf, apache starts without incident. apache 1.3.34-4 libkrb53 1.4.4-3 I have happily run libapache-mod-auth-kerb for years. This problem manifested after I apt upgraded last time. Much thanks for maintaining libapache-mod-auth-kerb! Jack signature.asc Description: This is a digitally signed message part