Bug#669951: Obsolete conffile /etc/bash_completion.d/systemctl-bash-completion.sh not cleaned up on upgrade
Hi, On Sun, 22 Apr 2012, Michael Biebl wrote: Personally, I would prefer, if dpkg-maintscript would use first-fixed-version instead of priorversion (i.e. instead =), as you know exactly the version when the conffile was (re)moved, but you can't be sure about value of priorversion, since this might change (e.g. by a binNMU). Raphael, what was the reasoning for choosing the current syntax? The difference between the two is dim and the latest version of the manual page already advises to build up the biggest possible unfixed version for similar reasons: priorversion defines the latest version of the package whose upgrade should trigger the removal. It is important to calculate priorversion correctly so that conffiles are correctly removed even if the user rebuilt the package with a local version. For example, for a conffile removed in version 2.0-1 of a package, priorversion should be set to 2.0-1~. This will cause the conffile to be removed even if the user rebuilt the previous version 1.0-1 as 1.0-1local1. Maybe should have used 43-1~~ instead of 37-1. This is ugly, but it would have avoided this particular problem and it even would be backport-safe. 43-1~ 43-1~bpo60 so 43-1~ should be enough Cheers, -- Raphaël Hertzog ◈ Debian Developer Pre-order a copy of the Debian Administrator's Handbook and help liberate it: http://debian-handbook.info/liberation/ -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670055: cups-filters: Printing a text file fails when Liberation is the only TrueType font available
Am Sonntag, den 22.04.2012, 17:16 +0100 schrieb Brian Potkin: From comment #55 in bug report #662660 I'd expect a text file to be printed with the mono-spaced Liberation font. Using a backend similar to the one described in the cups-filters README the output file in /tmp was empty and the error_log (which is attached) reported No usable font available. Adding the ttf-dejavu-core package restores the capability to print text files. Indeed, it is expected to print the page with LiberationSans. I assume that we are talking about regular text here, with no special or e.g. Chinese glyphs? What does fc-match -s FreeMono give on your system? - Fabian -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670064: (no subject)
the logs may be removed. The binaries in the 2.0 and 4.0 directories may not since they are used in the build to remake them. As for the log,the latest version is an adaptation of a previous version released in a ppa. The full log can be found in the package. Regards, Dylan Borg borgdy...@hotmail.com borgdyl...@gmail.com dbor0...@um.edu.mt +0035699214902
Bug#668967: awn-extras-applets: NMU patch to fix 9/13 + unreported bugs by updating to bzr1539
Hello: I made a possible NMU patch which closes 9/13 of the current bugs, some unreported bugs and updated to bzr1539 in the process. I have used this locally for a while so I just created a patch for it. I doubt it can get uploaded as an NMU since it's has many changes. I had to create a local git repo since this info is outdated and could not find a recent repo with awn-extras or avant-window-manager: Vcs-Git: git://github.com/gilir/awn-extras-debian.git Vcs-Browser: http://github.com/gilir/awn-extras-debian/tree For the remaining 4 bugs: Important bugs: #626729: python-gtkmozembed no longer exists. #639726: I get it sometimes but only 1 or 2 extra columns not infinite in my case. Normal bugs: #604931: copy/paste works fine in 0.4.0-5 and 0.4.1~bzr15XX. Can't reproduce. #607335: Can't reproduce. Possibly the user missing that icon which is unrelated to awn-extras or the package needed a rebuild which already fixed it. Hope this helps, Miguel -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#667444: Bug not fixed ?
Hello Tanguy, I've updated my package to 1.8-2 version, but I still have the same problem. I get : $ apt-cache show xul-ext-debianbuttons Package: xul-ext-debianbuttons Source: debianbuttons Version: 1.8-2 Installed-Size: 109 Maintainer: Mozilla Extension Packaging Team pkg-mozext-maintain...@lists.alioth.debian.org Architecture: all Provides: debianbuttons, iceweasel-debianbuttons Depends: iceweasel Enhances: iceweasel Breaks: iceweasel ( 10.+) Description-en: Buttons for querying Debian-related pages with Iceweasel/Firefox Debian buttons is an extension that provides several new buttons for quick access to information about Debian packages, bug reports, mailing list messages or developers on the web using text from the X11 clipboard. Homepage: http://icedeb.ktnx.net/ Description-md5: 17fd30952f1ce1d09a424c4f97fcd424 Section: web Priority: extra Filename: pool/main/d/debianbuttons/xul-ext-debianbuttons_1.8-2_all.deb Size: 22686 MD5sum: b4b4b187d50b009925db76840044049a SHA1: 90ddeb09ea58f0f2f6e4641c7f00ebdf4cd7705b SHA256: 2c200a9094be319941391f6965dc4c06c2141b396d58610721b21385e3e8a732 and the sentence « Breaks: iceweasel ( 10.+) » is still there, and I can't upgrade yet Iceweasel without removing this package... with regards, Fred. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669990: libcairo2-dbg: arch-dependent files in multiarch: same package
On So, 2012-04-22 at 15:18 +0200, Julien Cristau wrote: Package: libcairo2-dbg Version: 1.12.0-2 Severity: important User: multiarch-de...@lists.alioth.debian.org Usertags: multiarch Hi, libcairo2-dbg is marked as Multi-Arch: same, but contains files in arch-independent paths with arch-specific contents: [libcairo2-dbg 1.12.0-2] usr/lib/debug/usr/bin/cairo-perf-chart usr/lib/debug/usr/bin/cairo-perf-compare-backends usr/lib/debug/usr/bin/cairo-perf-diff-files usr/lib/debug/usr/bin/cairo-perf-micro usr/lib/debug/usr/bin/cairo-perf-print usr/lib/debug/usr/bin/cairo-perf-trace Hi Julien, what would be the correct solution for this? The debug package is created like this by dh_strip. Is Multi-Arch: same wrong for debug packages, if so, what would be the correct section? Thanks signature.asc Description: This is a digitally signed message part
Bug#657011: gst-plugins-bad0.10: Please drop the build-dependency on libmusicbrainz4-dev
On 22.04.2012 13:20, Julien Cristau wrote: On Mon, Jan 23, 2012 at 15:10:03 +0200, Timo Aaltonen wrote: Please drop the build-dep and libgsttrm.so from the installed files. The plugin supports an obsolete version of musicbrainz web API, which has been unavailable for years. The package providing that -dev package (libmusicbrainz-2.1) is in transition of being removed from the archive. Ping? I actually made this change in git, after realizing I had the power to do so :) -- t -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#658873: pass-by-reference has been removed from php5 (= 5.4)
On Thu, Apr 19, 2012 at 11:36:26AM +0200, Ondřej Surý wrote: do you think you can release fixed version of php-openid? It currently blocks PHP from entering testing, so it would be a nice to have a fixed (patched) version soon. Sorry, Ondřej, I didn't realize we're there already. I discussed the issue with upstream, they were open to changes, I proposed patches, and then it got stalled... I'll recheck with them and prepare an upload including my own patches in case they don't get back to me real soon. IOW, you'll see an upload from me soon. Hauke -- .''`. Jan Hauke Rahm j...@debian.org www.jhr-online.de : :' : Debian Developer www.debian.org `. `'` Member of the Linux Foundationwww.linux.com `- Fellow of the Free Software Foundation Europe www.fsfe.org signature.asc Description: Digital signature
Bug#670081: dpkg-source: expected [ +-] at start of line
jaalto wrote: It looks like Emacs diff-mode does something to it on save. That makes sense and is analagous to Guillem's mangling-by-mail- client guess. Thanks and sorry for the noise. (I was trying to see if git had started misbehaving in some circumstance.) Jonathan -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#615492: Users connected to server cannot hear each other
Dear All, Device info :I am using the Seagate DockStar machine, and Debian Squeeze as my OS. This device is using a ARM CPU Detail : http://archlinuxarm.org/platforms/armv5/seagate-dockstar And I have the mentioned bug too. Install Command :I install the mumble server by the following command : apt-get update apt-get install mumble-server Problem Scenario:When some users are connected , The users already in the server list may not receive the correct update from the server list. Endup the current users cannot notice the new user connected. And they cannot see the new users from the server list. However, some users can received the update. For those users can receive the update, they can listen and talk to the new commer, other wise they cannot see or talk to them. When some users disconnected from the server. The some current user cannot see them disconnected from the server list. And they will see the zombie users. I am willing to test the new compilation, please let me know what i can do thanks :Regards, Heimo.
Bug#670081: dpkg: dpkg-source: expected [ +-] at start of line
On Mon, 23 Apr 2012, jaalto wrote: | Hmm, well quilt just makes use of patch. And yes, patch seems to | assume that when there's a '\t' or '\n' on the first line character | the space got eaten, in pch.c (another_hunk():1646), so given this I | guess I'll be adding support for these kinds of patches, Up to now, we closed those reports because the patch files are bogus and we want to ensure that what is shipped in a Debian source package is clean. | but it seems | to me those are just somewhat bogus anyway, did you manually create | that patch or maybe it was extracted from a mail client that mangles | the body (evolution for example)? It was straight diff from git 1.7.10: git COMMIT COMMIT -- FILE output.patch I doubt it. I bet that you have some editor hook that cleans up mixes of spaces and tabs at the start of a line... or something similar. But I have never seen git generate this kind of patch. On the contrary, I often see some red highlight in my git log/show commands when I stumble upon such patches. Cheers, -- Raphaël Hertzog ◈ Debian Developer Pre-order a copy of the Debian Administrator's Handbook and help liberate it: http://debian-handbook.info/liberation/ -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#662382: jigzo: diff for NMU version 0.6.1-5.1
Hi Gregor, On Sun, Apr 22, 2012 at 03:51:01PM +0200, gregor herrmann wrote: tags 662382 + patch tags 662382 + pending tags 667216 + pending thanks Dear maintainer, I've prepared an NMU for jigzo (versioned as 0.6.1-5.1) and uploaded it to DELAYED/10. Please feel free to tell me if I should delay it longer. Regards. First all thanks for your interest. I was thinking fix these 2 bugs and also #649839 in the next release. Maybe you can help me sponsorizing :) Best regards, -- ElÃas Alejandro -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#586995: KMS not working on ATI Technologies Inc M56P [Radeon Mobility X1600]
Teodor MICU wrote: 2012/4/23 Jonathan Nieder jrnie...@gmail.com: dpkg -l firmware-linux [...] It has always been installed. Just to be clear, always means for the past year or so rather than some period going back to June 2010, right? Sorry for the probably annoying questions. If at all possible, I would like to get this fixed in squeeze for the sake of others using the same graphics card. Thanks, Jonathan -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#641615: Please convert to multiarch
Package: orbit2 Version: 1:2.14.19-0.1 Followup-For: Bug #641615 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu precise ubuntu-patch Hi there, Please find attached an updated patch to orbit2 to implement the additional requested fixes for multiarch support. I'm intending to include this fix in Ubuntu 12.04 LTS. Thanks for considering the patch. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. Ubuntu Developerhttp://www.debian.org/ slanga...@ubuntu.com vor...@debian.org === modified file 'debian/control' --- debian/control 2011-10-18 01:09:32 + +++ debian/control 2012-04-23 07:02:45 + @@ -3,11 +3,13 @@ Priority: optional Maintainer: Sebastian Rittau srit...@debian.org Standards-Version: 3.8.3 -Build-Depends: libglib2.0-dev (= 2.8.0), libidl-dev (= 0.8.10), pkg-config (= 0.20), cdbs, debhelper (= 7.0.0), docbook-xsl, gtk-doc-tools (= 1.6-2), autotools-dev, dh-autoreconf +Build-Depends: libglib2.0-dev (= 2.8.0), libidl-dev (= 0.8.10), pkg-config (= 0.20), cdbs (= 0.4.93), debhelper (= 8.1.3), docbook-xsl, gtk-doc-tools (= 1.6-2), autotools-dev, dh-autoreconf Package: liborbit2 Architecture: any +Multi-Arch: same Section: libs +Pre-Depends: ${misc:Pre-Depends} Depends: ${shlibs:Depends}, ${misc:Depends} Replaces: liborbit2-dev ( 2.8.1-1) Conflicts: liborbit2-dev ( 2.8.1-1), liblinc1 ( 1.0.3-4), libbonobo-activation4 ( 1:2.4.0) @@ -26,6 +28,7 @@ Architecture: any Section: devel Depends: ${shlibs:Depends}, ${misc:Depends} +Multi-Arch: foreign Description: a CORBA ORB ORBit2 is a high-performance CORBA (Common Object Request Broker Architecture) ORB (Object Request Broker). It allows programs to send @@ -41,6 +44,7 @@ Architecture: any Section: devel Depends: ${shlibs:Depends}, ${misc:Depends} +Multi-Arch: foreign Description: a CORBA name server ORBit2 is a high-performance CORBA (Common Object Request Broker Architecture) ORB (Object Request Broker). It allows programs to send === modified file 'debian/liborbit2-dev.install' --- debian/liborbit2-dev.install 2005-11-10 22:07:52 + +++ debian/liborbit2-dev.install 2012-04-20 04:20:20 + @@ -2,11 +2,9 @@ debian/tmp/usr/share/aclocal/ORBit2.m4 debian/tmp/usr/share/idl/orbit-2.0 debian/tmp/usr/share/doc/liborbit2-dev/ORBit2 -debian/tmp/usr/lib/*.so -debian/tmp/usr/lib/*.la -debian/tmp/usr/lib/*.a -debian/tmp/usr/lib/orbit-2.0/Everything_module.la -debian/tmp/usr/lib/orbit-2.0/Everything_module.a -debian/tmp/usr/lib/pkgconfig +debian/tmp/usr/lib/*/*.so +debian/tmp/usr/lib/*/*.a +debian/tmp/usr/lib/*/orbit-2.0/Everything_module.a +debian/tmp/usr/lib/*/pkgconfig debian/tmp/usr/bin/orbit2-config debian/tmp/usr/bin/orbit-idl-2 === modified file 'debian/liborbit2.install' --- debian/liborbit2.install 2005-04-19 16:01:06 + +++ debian/liborbit2.install 2012-04-20 04:16:45 + @@ -1,2 +1,2 @@ -debian/tmp/usr/lib/lib*.so.* -debian/tmp/usr/lib/orbit-2.0/Everything_module.so +debian/tmp/usr/lib/*/lib*.so.* +debian/tmp/usr/lib/*/orbit-2.0/Everything_module.so === added file 'debian/patches/pre-multiarch-compatibility.patch' --- debian/patches/pre-multiarch-compatibility.patch 1970-01-01 00:00:00 + +++ debian/patches/pre-multiarch-compatibility.patch 2012-04-20 23:34:22 + @@ -0,0 +1,16 @@ +Author: Steve Langasek steve.langa...@ubuntu.com +Description: Support pre-multiarch directory as a compatibility fallback +Bug-Debian: http://bugs.debian.org/641615 +Bug-Ubuntu: https://bugs.launchpad.net/bugs/977966 + +diff -Nur -x '*.orig' -x '*~' trunk/src/orb/orb-core/orbit-typelib.c trunk.new/src/orb/orb-core/orbit-typelib.c +--- trunk/src/orb/orb-core/orbit-typelib.c 2012-04-18 20:39:57.0 + trunk.new/src/orb/orb-core/orbit-typelib.c 2012-04-20 23:27:57.969753251 + +@@ -218,6 +218,7 @@ + paths = g_ptr_array_sized_new (8); + + g_ptr_array_add (paths, g_strdup (ORBIT_TYPELIB_DIR)); ++ g_ptr_array_add (paths, g_strdup (/usr/lib/orbit-2.0)); + + if ((path = g_getenv (ORBIT_TYPELIB_PATH))) { + char **strv; === modified file 'debian/rules' --- debian/rules 2011-10-18 01:09:32 + +++ debian/rules 2012-04-20 04:19:31 + @@ -13,7 +13,7 @@ DEB_DH_MAKESHLIBS_ARGS_liborbit2 := -V 'liborbit2 $(shlibver)' -DEB_CONFIGURE_EXTRA_FLAGS := --enable-purify --enable-gtk-doc --with-html-dir=/usr/share/doc/liborbit2-dev +DEB_CONFIGURE_EXTRA_FLAGS := --enable-purify --enable-gtk-doc --with-html-dir=/usr/share/doc/liborbit2-dev --libdir=\$${prefix}/lib/$(DEB_HOST_MULTIARCH) # # Man page generation (from Docbook source) @@ -30,4 +30,4 @@ rm -f debian/name-client-2.1 debian/orbit-name-server-2.1 install/liborbit2-dev:: - sed -i /dependency_libs/ s/'.*'/''/ `find . -name '*.la'` + rm `find debian/tmp -name '*.la'`
Bug#669557: ocropus: FTBFS: configure: error: Could not find tesseract! Choose --without-tesseract if you do not want to use it.
Does anyone have any objections to fixing this by uploaded 0.4.4 from experimental to unstable? -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670119: debianutils: ischroot can be made to work as non-root on Linux
Source: debianutils Source-Version: 4.3 Severity: normal Hi, ischroot currently fails on Linux if run as non-root, but it can be made to work by using /proc/1/mountinfo and /proc/self/mountinfo instead which can be read by any user. This file is documented in: http://kernel.org/doc/Documentation/filesystems/proc.txt If outside a chroot both mountinfo files will be equal and as such the / mount ID will be equal, if inside a chroot /proc/self/mountinfo will either have no entry for / or will have an entry (if it's a distinct mount point) but will have a different mount ID from the one in PID 1. regards, guillem -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#668967: awn-extras-applets: NMU patch to fix 9/13 + unreported bugs by updating to bzr1539 (with patch now)
Forgot to actually attach the patch. 0001-NMU-bzr1539.patch Description: Binary data
Bug#670120: offlineimap ignores SIGHUP, causes shutdown delays if left running
Package: offlineimap Version: 6.3.4-1 Severity: normal I run offlineimap from a terminal under my X session; it has several frontends that encourage this behavior. When my X session closes for a system shutdown, the terminals exit, after sending SIGHUP to their children. Every process I run in a terminal handles SIGHUP by shutting down, except for one. offlineimap handles SIGHUP by immediately waking up and polling the configured servers. This means that offlineimap slows down my shutdown, because it hangs around and has to be killed by sendsigs - in my experience, it's the last process to terminate. It also slows things down by engaging in network I/O at exactly the wrong time. Wake up and talk to the servers is not an appropriate action for a console program to take on SIGHUP. Since this behavior is not at all documented in the manpage (which says that offlineimap listens to SIGUSR1 and SIGUSR2), I think offlineimap should drop this signal handler. -- System Information: Debian Release: wheezy/sid APT prefers precise-updates APT policy: (500, 'precise-updates'), (500, 'precise-security'), (500, 'precise') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-23-generic (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages offlineimap depends on: ii python 2.7.3-0ubuntu2 ii python-support 1.0.14ubuntu2 offlineimap recommends no packages. Versions of packages offlineimap suggests: pn doc-base 0.10.3 pn python-kerberos none -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#642745: bug 642745 is forwarded to http://rt.cpan.org/Public/Bug/Display.html?id=76743
Hi Gregor On Sat, Apr 21, 2012 at 06:47:40PM +0200, gregor herrmann wrote: On Sat, 21 Apr 2012 15:15:53 +0200, gregor herrmann wrote: forwarded 642745 http://rt.cpan.org/Public/Bug/Display.html?id=76743 thanks After forwarding I received a private mail from upstrea, where he told me that he has oprhaned the module 12 years ago and is not going to work on it again. (Only a thought): If so, and as it does not have any rdepends or build-rdeps (and low popcon): Do we want to ask for removal of this module? (As a possible option). Regards, Salvatore signature.asc Description: Digital signature
Bug#586995: KMS not working on ATI Technologies Inc M56P [Radeon Mobility X1600]
Jonathan Nieder wrote: Teodor MICU wrote: It has always been installed. Just to be clear, always means [...] Ah, found the answer in an earlier comment (#22). Sorry for the noise. I installed it but it shouldn't matter since the two dependencies were already installed. Next steps that would be useful, if you have the time: - a full kernel log (using the dmesg command or /var/log/dmesg) from booting an affected kernel in recovery mode with the word drm.debug=0xe appended to the kernel command line and then running modprobe radeon - a photograph or screenshot of the garbled screen - which pre-compiled kernels between 2.6.32 and 2.6.36-rc5 listed at http://snapshot.debian.org/package/linux-2.6/ reproduce the big. In other words, a narrower range to search for the fix. If you don't have time for it, that's fine, too. Just let us know and we can let you know when there is a specific patch to try or wait until someone else is able to reproduce it, depending on your preference. Thanks again. Jonathan -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669992: [pkg-db-devel] Bug#669992: libdb5.3-java: arch-dependent files in multiarch: same package
On Sun, Apr 22, 2012 at 15:19, Julien Cristau jcris...@debian.org wrote: libdb5.3-java is marked as Multi-Arch: same, but contains files in arch-independent paths with arch-specific contents: [libdb5.3-java 5.3.15-3] usr/share/java/db-5.3.15.jar Hmm, I always thought that JAR files are arch-independent. If that's not the case, could you please point me to packaging instructions (or existing package) how to pack multiarch java archives? O. -- Ondřej Surý ond...@sury.org -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670040: pax do not work at all
Hi Norbert, On Mon, Apr 23, 2012 at 08:05:32AM +0900, Norbert Preining wrote: we got a bug report in Debian that pax does not work, and the reason is that pdfbox is much newer in Debian, namely 1.6.0 from Apache: On So, 22 Apr 2012, Hilmar Preusse wrote: http://ftp3.gwdg.de/pub/ctan/macros/latex/contrib/pax/README (I'm Interesting ... pdfbox in Debian is the one from apache http://pdfbox.apache.org/index.html while pax uses the one from pdfbox.org which is an empty wordpress, and one download. I don't know what the history of that is, maybe pdfbox was later taken over into apache and further developped. I am quite sure that the pdfbox from pdfbox.org will not be packaged in Debian. Heiko, do you see any problem in porting your pax to the recent pdfbox by apache? pax works with pdfbox 0.7.2 or 0.7.3. The download page for pdfbox http://pdfbox.apache.org/download.html contains a section Download old releases and a link to the old sourceforge page: http://sourceforge.net/project/showfiles.php?group_id=78314 There both 0.7.2 or 0.7.3 can be downloaded. Currently I don't have time to update pax to the new pdfbox. TL freeze is nearing and my bundle update is more important to me. At least the update of README is on the way to CTAN. Yours sincerely Heiko Oberdiek -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669059: webkit-1.8.0-2: FTBFS on hurd-*
On Mon, 2012-04-23 at 08:18 +0200, Svante Signell wrote: On Mon, 2012-04-23 at 07:54 +0200, Guillem Jover wrote: On Wed, 2012-04-18 at 08:35:23 +0200, Svante Signell wrote: Attached is an updated patch. This patch together with the one in #664810 would enable a successful build of webkit-1.8.0 for GNU/Hurd. ... As mentioned on the list this code will not work on the Hurd, a new implementation needs to be done for OS(HURD) just before OS(UNIX), because OS(UNIX) will match for the Hurd too. I gave a hint on how this can be implemented on the list. I'm working on that now. It will be sent to to the D-H ML for review before submitted to this bug report. Yes, I know, a new OS(HURD) case has to be created. Trying to find out where to make that change, it would be a configure.ac somewhere. Then that case could use the code construct you pointed to. Depending on timing for releasing an updated webkit (also solving the kfree build problems, and #664810 for Hurd) the attached patch works until a fully functional one is available after the review. --- a/Source/ThirdParty/ANGLE/src/compiler/osinclude.h 2012-02-19 18:47:57.0 +0100 +++ b/Source/ThirdParty/ANGLE/src/compiler/osinclude.h 2012-04-15 09:20:30.0 +0200 @@ -16,7 +16,7 @@ #define ANGLE_OS_WIN #elif defined(__APPLE__) || defined(__linux__) || \ defined(__FreeBSD__) || defined(__OpenBSD__) || \ - defined(__sun) || defined(ANDROID) + defined(__sun) || defined(ANDROID) || defined(__GNU__) #define ANGLE_OS_POSIX #else #error Unsupported platform. --- a/Source/JavaScriptCore/wtf/gobject/GlibUtilities.cpp 2012-02-19 18:45:45.0 +0100 +++ b/Source/JavaScriptCore/wtf/gobject/GlibUtilities.cpp 2012-04-19 22:06:41.0 +0200 @@ -37,8 +37,10 @@ return CString(); return CString(readLinkBuffer, result); } -#elif OS(UNIX) +#elif OS(HURD) CString getCurrentExecutablePath() + return CString(); +#elif OS(UNIX) { static char readLinkBuffer[PATH_MAX]; ssize_t result = readlink(/proc/curproc/file, readLinkBuffer, PATH_MAX);
Bug#650951: Patch for the l10n upload of slapos.core
Quoting Christian PERRIER (bubu...@debian.org): Dear maintainer of slapos.core, On Friday, April 06, 2012 I sent you a notice announcing my intent to upload an NMU of your package to fix its pending l10n issues, after an initial notice sent on Sunday, April 01, 2012. We finally agreed that you would do the update yourself at the end of the l10n update round. Arnaud, ping? As you mentioned that I could do the NMU *or you could do the upload within the next week*, I left you with priority...but I can upload as well: your call. signature.asc Description: Digital signature
Bug#669059: webkit-1.8.0-2: FTBFS on hurd-*
On Mon, 2012-04-23 at 08:18:46 +0200, Svante Signell wrote: On Mon, 2012-04-23 at 07:54 +0200, Guillem Jover wrote: On Wed, 2012-04-18 at 08:35:23 +0200, Svante Signell wrote: Attached is an updated patch. This patch together with the one in #664810 would enable a successful build of webkit-1.8.0 for GNU/Hurd. --- a/Source/JavaScriptCore/wtf/gobject/GlibUtilities.cpp 2012-02-19 18:45:45.0 +0100 +++ b/Source/JavaScriptCore/wtf/gobject/GlibUtilities.cpp 2012-04-18 08:18:39.0 +0200 @@ -40,11 +42,21 @@ #elif OS(UNIX) #elif OS(WINDOWS) As mentioned on the list this code will not work on the Hurd, a new implementation needs to be done for OS(HURD) just before OS(UNIX), because OS(UNIX) will match for the Hurd too. I gave a hint on how this can be implemented on the list. Yes, I know, a new OS(HURD) case has to be created. Trying to find out where to make that change, it would be a configure.ac somewhere. Then that case could use the code construct you pointed to. OS(HURD) is already defined by Source/JavaScriptCore/wtf/Platform.h you just need to add the case for the actual function, nothing more. thanks, guillem -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669059: webkit-1.8.0-2: FTBFS on hurd-*
On Mon, 2012-04-23 at 07:54 +0200, Guillem Jover wrote: On Wed, 2012-04-18 at 08:35:23 +0200, Svante Signell wrote: Attached is an updated patch. This patch together with the one in #664810 would enable a successful build of webkit-1.8.0 for GNU/Hurd. --- a/Source/JavaScriptCore/wtf/gobject/GlibUtilities.cpp 2012-02-19 18:45:45.0 +0100 +++ b/Source/JavaScriptCore/wtf/gobject/GlibUtilities.cpp 2012-04-18 08:18:39.0 +0200 @@ -40,11 +42,21 @@ #elif OS(UNIX) #elif OS(WINDOWS) As mentioned on the list this code will not work on the Hurd, a new implementation needs to be done for OS(HURD) just before OS(UNIX), because OS(UNIX) will match for the Hurd too. I gave a hint on how this can be implemented on the list. Yes, I know, a new OS(HURD) case has to be created. Trying to find out where to make that change, it would be a configure.ac somewhere. Then that case could use the code construct you pointed to. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670081: dpkg-source: expected [ +-] at start of line
On 2012-04-22 17:03, Jonathan Nieder wrote: | jaalto wrote: | On 2012-04-22 21:52, Guillem Jover wrote: | | | but it seems | | to me those are just somewhat bogus anyway, did you manually create | | that patch or maybe it was extracted from a mail client that mangles | | the body (evolution for example)? | | It was straight diff from git 1.7.10: | | git COMMIT COMMIT -- FILE output.patch | | Are you sure? Can you send the exact command line and git config -l | | grep diff output? Unfortunately I'm not sure, now that I think of it. The diff was combination of git + filterdiff + editing the headers in Emacs. It looks like Emacs diff-mode does something to it on save. Here is test without any personal Emacs setup: emacs -Q -ne file add space, delete space (to flag modified); then save with new name I'm attaching the result below, which I think exhibits the changes as in original bug report *.patch file. Jari [*] The new, saved, file is still fine for patch(1) and quilt(1). 13c13$ ^I${COMPILE} -o bcrypt ${OBJS} ${LDFLAGS}$ ---$ ^I${COMPILE} -o bcrypt ${OBJS} ${LDFLAGS}$ 16c16$ ^Imkdir -p ${PREFIX}/bin;\$ ---$ ^Imkdir -p ${PREFIX}/bin;\$ 19c19$ ^Icp bcrypt ${PREFIX}/bin;\$ ---$ ^Icp bcrypt ${PREFIX}/bin;\$ 22c22$ ^Ichmod 755 ${PREFIX}/bin/bcrypt;\$ ---$ ^Ichmod 755 ${PREFIX}/bin/bcrypt;\$ 27c27$ ^I${COMPILE} -c main.c$ ---$ ^I${COMPILE} -c main.c$ 30c30$ ^I${COMPILE} -c endian.c$ ---$ ^I${COMPILE} -c endian.c$ 35c35$ ^Irm -rf *.o bcrypt bcrypt.core core bcrypt.tgz $ ---$ ^Irm -rf *.o bcrypt bcrypt.core core bcrypt.tgz $ diff --git a/Makefile b/Makefile index b84da0f..8924de4 100644 --- a/Makefile +++ b/Makefile @@ -4,18 +4,18 @@ CFLAGS = -O2 -Wall COMPILE = ${CC} ${CFLAGS} OBJS = main.o blowfish.o rwfile.o keys.o wrapbf.o endian.o wrapzl.o LDFLAGS = -L/usr/local/lib -lz -PREFIX = /usr/local +PREFIX = ${DESTDIR}/usr/ bcrypt: ${OBJS} Makefile ${COMPILE} -o bcrypt ${OBJS} ${LDFLAGS} install: bcrypt Makefile mkdir -p ${PREFIX}/bin;\ - mkdir -p ${PREFIX}/man/man1;\ + mkdir -p ${PREFIX}/share/man/man1;\ cp bcrypt ${PREFIX}/bin;\ - cp bcrypt.1 ${PREFIX}/man/man1;\ + cp bcrypt.1 ${PREFIX}/share/man/man1;\ chmod 755 ${PREFIX}/bin/bcrypt;\ - chmod 644 ${PREFIX}/man/man1/bcrypt.1 + chmod 644 ${PREFIX}/share/man/man1/bcrypt.1 main.o: main.c ${DEFAULTS} ${COMPILE} -c main.c @@ -38,6 +38,8 @@ wrapzl.o: wrapzl.c ${DEFAULTS} endian.o: endian.c ${DEFAULTS} ${COMPILE} -c endian.c +distclean: clean + clean: rm -rf *.o bcrypt bcrypt.core core bcrypt.tgz
Bug#661958: transition: apache2
On Sat, Apr 21, 2012 at 15:13, Arno Töll a...@debian.org wrote: Hi, On 21.04.2012 15:10, Julien Cristau wrote: One way to avoid this is to get a php5 uploaded to experimental built against the new apache. We already requested PHP maintainers to do so. Alternatively PHP web applications can test by using a (Fast-)CGI alternative. I'll take care of it within 1(ish) week (I will be outside internet access from Thu to Sun, so if I don't make it I will have to wait to next Mon-Tue). O. -- Ondřej Surý ond...@sury.org -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670118: [PATCHv2] Add support for logging cron job output to syslog
[Resending with the correct set of patches this time.] The attached patches make it possible for cron to log cron job output to syslog. Patch 1 adds a new log level 16, which unconditionally logs cron job output. Patch 2 adds a new log level 32, which logs cron job output if and only if the output will not get mailed, such as if the system has no MTA. Using this log level will ensure that cron job output won't get discarded. Patch 3 enables log level 32 by default in the Debian package via /etc/default/cron. This will ensure that the Debian package of cron automatically uses an MTA if available, or syslog if not. Patch 4 updates the Suggests and Recommends of the Debian packages, to suggest both a syslog daemon and a mail-transport-agent, but recommend just one or the other; thus, the recommended configuration will always capture cron job output in one way or another. This patch also updates cron to use default-mta rather than hardcoded MTAs. I included corresponding updates to debian/changelog for convenience, but if updates occur to the changelog before the application of these patches, they'll probably fail to apply; however, merging should prove trivial if so. Please consider applying these patches. Thanks, Josh Triplett From acb04be1e5d49f72b6bf6513b294c393b68f18f9 Mon Sep 17 00:00:00 2001 From: Josh Triplett j...@joshtriplett.org Date: Sun, 22 Apr 2012 19:20:54 -0700 Subject: [PATCH 1/4] Add a new log level to log all cron job output. --- cron.8 |5 ++-- cron.h |1 + debian/changelog|4 +++ debian/cron.default |1 + do_command.c| 70 ++- 5 files changed, 45 insertions(+), 36 deletions(-) diff --git a/cron.8 b/cron.8 index 586d9e5..5985700 100644 --- a/cron.8 +++ b/cron.8 @@ -54,11 +54,12 @@ will log the end of all cron jobs will log all failed jobs (exit status != 0) .IP \fB8\fR will log the process number of all cron jobs +.IP \fB16\fR +will log the full output of all cron jobs .RE .IP The default is to log the start of all jobs (1). Logging will be disabled -if \fIlevels\fR is set to zero (0). A value of fifteen (15) will select all -options. +if \fIlevels\fR is set to zero (0). A value of 31 will select all options. .SH NOTES .PP .I cron diff --git a/cron.h b/cron.h index d1b2bcf..d0cf070 100644 --- a/cron.h +++ b/cron.h @@ -139,6 +139,7 @@ typedef int time_min; #define CRON_LOG_JOBEND 0x02 #define CRON_LOG_JOBFAILED 0x04 #define CRON_LOG_JOBPID 0x08 +#define CRON_LOG_JOBOUTPUT 0x10 #define SECONDS_PER_MINUTE 60 diff --git a/debian/changelog b/debian/changelog index 139c800..99891b5 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,11 +1,15 @@ cron (3.0pl1-122) UNRELEASED; urgency=low + [ Javier Fernández-Sanguino Peña ] * debian/standard.daily: Apply patch from Steve Allison to prevent checking two times the same filesystem. This prevents bogus warnings about missing lost+found in schroot bind mounts (Closes: #660879) * debian/rules: Apply patch from Steve Langasek to add cross compiler support to cron (Closes: #666892) + [ Josh Triplett ] + * Add a new log level to log all cron job output. + -- Javier Fernández-Sanguino Peña j...@debian.org Mon, 09 Apr 2012 17:23:01 +0200 cron (3.0pl1-121) unstable; urgency=low diff --git a/debian/cron.default b/debian/cron.default index c69934f..ed4383d 100644 --- a/debian/cron.default +++ b/debian/cron.default @@ -23,6 +23,7 @@ READ_ENV=yes # 2 log end of jobs # 4 log jobs with exit status != 0 # 8 log the process identifier of child process (in all logs) +# 16 log the full output of all cron jobs # #EXTRA_OPTS= diff --git a/do_command.c b/do_command.c index 18d097d..c2fc9f7 100644 --- a/do_command.c +++ b/do_command.c @@ -511,6 +511,7 @@ child_process(e, u) // since sendmail may time out, and to write info about the exit // status. + register FILE *mail = NULL; long pos; struct stat mcsb; int statret; @@ -522,26 +523,25 @@ child_process(e, u) Debug(DPROC|DEXT, ([%d] got %ld bytes data from grandchild tmpfile\n, getpid(), (long) pos)) if (pos == 0) - goto mail_finished; + goto output_finished; // get name of recipient. if (mailto == NULL) mailto = usernm; else if (!*mailto) -goto mail_finished; +goto mail_headers_finished; /* Don't send mail if MAILCMD is not available */ if ((statret = stat(MAILCMD, mcsb)) != 0) { Debug(DPROC|DEXT, (%s not found, not sending mail\n, MAILCMD)) if (pos 0) { - log_it(CRON, getpid(), info, No MTA installed, discarding output); + log_it(CRON, getpid(), info, No MTA installed, not mailing output); } - goto mail_finished; + goto mail_headers_finished; } else { Debug(DPROC|DEXT, (%s found, will send mail\n, MAILCMD)) } - register FILE *mail = NULL; register int bytes = 1; register char **env; @@ -556,7 +556,7 @@ child_process(e,
Bug#586995: KMS not working on ATI Technologies Inc M56P [Radeon Mobility X1600]
2012/4/23 Jonathan Nieder jrnie...@gmail.com: Great, thanks for testing. How about the second question --- is the radeon firmware installed? You can find out with dpkg -l firmware-linux Just to be clear, if the bug is only reproducible when the radeon firmware is not installed, it would still be an important bug. That would just help us to know where to look. It has always been installed. I don't think its worth further investigations unless it affects someone else, I've moved on a long time ago. Thanks -- -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670121: OpenSSL ASN1 BIO vulnerability (CVE-2012-2110)
Package: libssl0.9.8 Version: 0.9.8o-4squeeze7 OpenSSL Security Advisory [19 Apr 2012] === ASN1 BIO vulnerability (CVE-2012-2110) === A potentially exploitable vulnerability has been discovered in the OpenSSL function asn1_d2i_read_bio. Any application which uses BIO or FILE based functions to read untrusted DER format data is vulnerable. Affected functions are of the form d2i_*_bio or d2i_*_fp, for example d2i_X509_bio or d2i_PKCS12_fp. Applications using the memory based ASN1 functions (d2i_X509, d2i_PKCS12 etc) are not affected. In particular the SSL/TLS code of OpenSSL is *not* affected. Applications only using the PEM routines are not affected. S/MIME or CMS applications using the built in MIME parser SMIME_read_PKCS7 or SMIME_read_CMS *are* affected. The OpenSSL command line utility is also affected if used to process untrusted data in DER format. Note: although an application using the SSL/TLS portions of OpenSSL is not automatically affected it might still call a function such as d2i_X509_bio on untrusted data and be vulnerable. Thanks to Tavis Ormandy, Google Security Team, for discovering this issue and to Adam Langley a...@chromium.org for fixing it. Affected users should upgrade to OpenSSL 1.0.1a, 1.0.0i or 0.9.8v. References == URL for this Security Advisory: http://www.openssl.org/news/secadv_20120419.txt Aki Tuomi signature.asc Description: Digital signature
Bug#670066: python-openturns is unusable
Le 23 avril 2012 07:14, Christophe Prud'homme prudh...@debian.org a écrit : Denis This work(debian packaging) is also done by Phimeca who maintains openturns, or did you use their work ? I do not have preferences for the soname I did not use their packaging, mostly because it was simpler for me to work on 0.15-3 (dh vs. cdbs). I will have a look tonight. Denis -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#499386: [etch] NULL pointer dereference in sys_exit_group
Hi Shai, Four years ago, you wrote[1]: After several cases of kernel panic which we blamed on just using old hardware, we caught this one in the log. The system is Etch, it serves as a firewall dhcp server on one card, and the other is connected to an ADSL modem/router for uplink. [...] tarante kernel: BUG: unable to handle kernel NULL pointer dereference at virtual address 0045 tarante kernel: printing eip: tarante kernel: c0751ce0 tarante kernel: *pde = tarante kernel: Oops: [#1] tarante kernel: Modules linked in: ipt_LOG xt_tcpudp xt_multiport ipt_MASQUERADE iptable_nat xt_state ip6table_filter ip6_tables iptable_filter ip_tables x_tables ip_nat_tftp ip_nat_snmp_basic ip_nat_sip ip_nat_pptp ip_nat_irc ip_nat_h323 ip_nat_ftp ip_nat_amanda ip_conntrack_tftp ip_conntrack_sip ip_conntrack_proto_sctp ip_conntrack_pptp ip_conntrack_netlink ip_nat ip_conntrack_netbios_ns ip_conntrack_irc ip_conntrack_h323 ip_conntrack_ftp ts_kmp ip_conntrack_amanda ip_conntrack nfnetlink ipv6 dm_snapshot dm_mirror dm_mod parport_pc parport psmouse floppy rtc serio_raw pcspkr evdev ext3 jbd ide_generic ide_cd cdrom ide_disk piix generic ide_core 8139cp 8139too mii processor tarante kernel: CPU:0 tarante kernel: EIP:0060:[c0751ce0]Not tainted VLI tarante kernel: EFLAGS: 00010083 (2.6.18-5-486 #1) tarante kernel: EIP is at 0xc0751ce0 tarante kernel: eax: c18bde2c ebx: c18bde2c ecx: edx: 0003 tarante kernel: esi: c100de04 edi: 0001 ebp: c10a5e80 esp: c10a5e60 tarante kernel: ds: 007b es: 007b ss: 0068 tarante kernel: Process named (pid: 1812, ti=c10a4000 task=c1b5e030 task.ti=c10a4000) tarante kernel: Stack: c01114ed 0003 c18bdeb8 00c000ff 0246 c1be93b4 c1b5e030 tarante kernel:c10a5e94 c0112414 c1be9380 c10a5ec8 c0115a84 000b tarante kernel:c1b5e030 c0116c3c 000b bfc5e6e4 c10a5f14 c1b5e030 000b tarante kernel: Call Trace: tarante kernel: [c01114ed] __wake_up_common+0x2e/0x4d tarante kernel: [c0112414] complete+0x1f/0x28 tarante kernel: [c0115a84] exit_mm+0x57/0xa3 tarante kernel: [c0116c3c] do_exit+0x18e/0x65f tarante kernel: [c0117169] sys_exit_group+0x0/0xd tarante kernel: [c011d91c] get_signal_to_deliver+0x310/0x320 [...] tarante kernel: Code: 81 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 63 07 00 00 00 00 00 00 da 8b d1 48 00 00 00 00 81 47 ec 45 00 00 00 00 3e d3 b1 45 00 00 00 00 0c 00 00 00 00 10 00 00 01 00 00 00 08 tarante kernel: EIP: [c0751ce0] 0xc0751ce0 SS:ESP 0068:c10a5e60 tarante kernel: 1Fixing recursive fault but reboot is needed! Alas, we missed this and then lost track of it. Now I am curious: - do you still have access to this machine? - did you ever figure out what was causing the kernel panics? was there a workaround or fix? - was the backtrace always the same when the bug was encountered? If you can still reproduce this, I would be especially interested to learn whether squeeze or wheezy is affected, so we can make sure it gets fixed. Sorry for the trouble, and thanks for reporting it. Sincerely, Jonathan -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#567358: network-manager-openconnect: dbus warning at boot for unknown username nm-openconnect
found 567358 network-manager-openconnect/0.9.4.0-3 thanks The problem is still present in the current testing version of the package. Kind regards, Ralf -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669716: dblatex 0.3.3
Hello, I would like to see dblatex 0.3.3 in unstable ASAP since I need several changes that were made in that version. Let me know if you need help. I will happily sponsor the upload if you want. Cheers, -- Raphaël Hertzog ◈ Debian Developer Pre-order a copy of the Debian Administrator's Handbook and help liberate it: http://debian-handbook.info/liberation/ -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669949: sysvinit: Break X11: no more mouse and keyboard
On Sun, Apr 22, 2012 at 11:57:07AM +0100, Roger Leigh wrote: On Sun, Apr 22, 2012 at 11:15:29AM +0200, valette wrote: After upgrade, X11 does not report any keybord or mouse on my laptop. If I plug a USB mouse its detected. If the USB mouse is plugged before X starts its not detected either. Probably related to hal/udev but... I'm not sure. I'm seeing the same thing; but it's fine until the start of X. However, in my case the mouse and keyboard are plugged into a USB hub on my monitor, and unplugging and reconnecting the hub to the main system results in them working again. NB: I modified the /etc/defalt/tmpfs to get /tmp as a normal fs. Does this alter the behaviour at all? I can't see what has changed here that could affect this, so a bit more information would be appreciated if possible. I'm not sure how USB device availability is related to /tmp, but hopefully some more investigation will help here. This is due to /lib/init/bootclean.sh cleaning (I think) /run and removing some udev stuff early on. I've added .clean flag files to prevent the cleaning of tmpfses, but haven't quite yet got it to stop. However, we now know what the cause is, so should have this fixed tonight. Regards, Roger -- .''`. Roger Leigh : :' : Debian GNU/Linuxhttp://people.debian.org/~rleigh/ `. `' schroot and sbuild http://alioth.debian.org/projects/buildd-tools `-GPG Public Key F33D 281D 470A B443 6756 147C 07B3 C8BC 4083 E800 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#667014: I hit the same problem
On Sun, Apr 22, 2012 at 03:57:51PM +0200, Kurt Roeckx wrote: So it's my understanding that this happens: - openssl sends a ClientHello, and says it supports TLS 1.0 - 1.2 - the server sends backa ServerHello saying to use TLS 1.1 - openssl has TLS 1.1 disabled and the connection fails. And I think we won't be able to do much about this, without breaking more things. Do you think it is a problem in OpenSSL or in GnuTLS? Anyway, even if there's no easy solution from the SSL side, I think at least we can recompile irssi against the latest libssl, since that would fix the issue. Gerfried, what do you think? Berto -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670056: qpid-cpp: FTBFS on s390 (error: ambiguous overload for 'operator=' )
Yes, I've seen that in the build logs already. These issues have been fixed upstream and there's a 0.16 in approximately 5 days. It fixes the other build failures (armel, etc.), too. I tend to just wait for that one. Am 22.04.2012 18:19, schrieb Adam D. Barratt: Source: qpid-cpp Version: 0.14-2 Severity: serious Tags: wheezy sid Hi, qpid-cpp FTBFS on s390. From the most recent build log: /bin/bash ../libtool --tag=CXX --mode=compile g++ -DHAVE_CONFIG_H -I. -I../include -I../include -I. -I=. -D_FORTIFY_SOURCE=2 -Werror -pedantic -Wall -Wextra -Wno-shadow -Wpointer-arith -Wcast-qual -Wcast-align -Wno-long-long -Wvolatile-register-var -Winvalid-pch -Wno-system-headers -Woverloaded-virtual -DQPID_LIBEXEC_DIR=\/usr/lib/qpid\ -DBOOST_FILESYSTEM_VERSION=2 -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Wformat-security -Werror=format-security -c -o qpid/broker/MessageGroupManager.lo qpid/broker/MessageGroupManager.cpp libtool: compile: g++ -DHAVE_CONFIG_H -I. -I../include -I../include -I. -I=. -D_FORTIFY_SOURCE=2 -Werror -pedantic -Wall -Wextra -Wno-shadow -Wpointer-arith -Wcast-qual -Wcast-align -Wno-long-long -Wvolatile-register-var -Winvalid-pch -Wno-system-headers -Woverloaded-virtual -DQPID_LIBEXEC_DIR=\/usr/lib/qpid\ -DBOOST_FILESYSTEM_VERSION=2 -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Wformat-security -Werror=format-security -c qpid/broker/MessageGroupManager.cpp -fPIC -DPIC -o qpid/broker/.libs/MessageGroupManager.o qpid/broker/MessageGroupManager.cpp: In member function 'virtual void qpid::broker::MessageGroupManager::query(qpid::types::Variant::Map) const': qpid/broker/MessageGroupManager.cpp:283:56: error: ambiguous overload for 'operator=' in 'info.std::map_Key, _Tp, _Compare, _Alloc::operator[] [with _Key = std::basic_stringchar, _Tp = qpid::types::Variant, _Compare = std::lessstd::basic_stringchar , _Alloc = std::allocatorstd::pairconst std::basic_stringchar, qpid::types::Variant , std::map_Key, _Tp, _Compare, _Alloc::mapped_type = qpid::types::Variant, std::map_Key, _Tp, _Compare, _Alloc::key_type = std::basic_stringchar]((* {anonymous}::GROUP_MSG_COUNT)) = g.std::tr1::__detail::_Hashtable_const_iterator_Value, __constant_iterators, __cache::operator- [with _Value = std::pairconst std::basic_stringchar, qpid::broker::MessageGroupManager::GroupState, bool __constant_iterators = false, bool __cache = false, std::tr1::__detail::_Hashtable_const_iterator_Value, __constant_iterators, __cache::pointer = const std::pairconst std::basic_stringchar, qpid::broker::MessageGroupManager::GroupState*]()-std::pairconst std::basic_stringchar, qpid::broker::MessageGroupManager::GroupState::second.qpid::broker::MessageGroupManager::GroupState::members.std::deque_Tp, _Alloc::size [with _Tp = qpid::framing::SequenceNumber, _Alloc = std::allocatorqpid::framing::SequenceNumber, std::deque_Tp, _Alloc::size_type = long unsigned int]()' qpid/broker/MessageGroupManager.cpp:283:56: note: candidates are: ../include/qpid/types/Variant.h:100:32: note: qpid::types::Variant qpid::types::Variant::operator=(bool) ../include/qpid/types/Variant.h:101:32: note: qpid::types::Variant qpid::types::Variant::operator=(uint8_t) ../include/qpid/types/Variant.h:102:32: note: qpid::types::Variant qpid::types::Variant::operator=(uint16_t) ../include/qpid/types/Variant.h:103:32: note: qpid::types::Variant qpid::types::Variant::operator=(uint32_t) ../include/qpid/types/Variant.h:104:32: note: qpid::types::Variant qpid::types::Variant::operator=(uint64_t) ../include/qpid/types/Variant.h:105:32: note: qpid::types::Variant qpid::types::Variant::operator=(int8_t) ../include/qpid/types/Variant.h:106:32: note: qpid::types::Variant qpid::types::Variant::operator=(int16_t) ../include/qpid/types/Variant.h:107:32: note: qpid::types::Variant qpid::types::Variant::operator=(int32_t) ../include/qpid/types/Variant.h:108:32: note: qpid::types::Variant qpid::types::Variant::operator=(int64_t) ../include/qpid/types/Variant.h:109:32: note: qpid::types::Variant qpid::types::Variant::operator=(float) ../include/qpid/types/Variant.h:110:32: note: qpid::types::Variant qpid::types::Variant::operator=(double) ../include/qpid/types/Variant.h:115:32: note: qpid::types::Variant qpid::types::Variant::operator=(const qpid::types::Variant) ../include/qpid/types/Variant.h:116:32: note: qpid::types::Variant qpid::types::Variant::operator=(const qpid::types::Uuid) make[4]: *** [qpid/broker/MessageGroupManager.lo] Error 1 make[4]: Leaving directory `/build/buildd-qpid-cpp_0.14-2-s390-V8Rr8u/qpid-cpp-0.14/src' make[3]: *** [all-recursive] Error 1 make[3]: Leaving directory `/build/buildd-qpid-cpp_0.14-2-s390-V8Rr8u/qpid-cpp-0.14/src' make[2]: *** [all] Error 2 make[2]: Leaving directory `/build/buildd-qpid-cpp_0.14-2-s390-V8Rr8u/qpid-cpp-0.14/src' make[1]: *** [all-recursive] Error 1 make[1]: Leaving directory `/build/buildd-qpid-cpp_0.14-2-s390-V8Rr8u/qpid-cpp-0.14' dh_auto_build: make -j1 returned exit code 2 make: ***
Bug#669935: Debian Installer does apply keymap used during installation to resulting initramfs
Quoting Sebastian Pipping (sebast...@pipping.org): Thanks for that explanation. For that keyboard hook to do its work, KEYMAP=y needs to be set in the initramfs configuration (see the code of the hook itself). What can be done to set KEYMAP=y in a controlled manner from within the installer? The currently resulting KEYMAP=n does not work. It should IMHO be the default value. Hence keeping this bug report affected to initramfs-tools. I guess the package maintainer(s) may have a rationale for this default value but we need to hear it. By design, the installer should *not* change default settings of installed tools and packages. signature.asc Description: Digital signature
Bug#669647: ITP: hurd-cvsfs -- CVS virtual filesystem for the GNU Hurd
Le vendredi 20 avril 2012 à 20:23 +0200, Samuel Thibault a écrit : * Package name: hurd-cvsfs Aren’t you late by 19 days? -- .''`. Josselin Mouette : :' : `. `' `- -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670122: libsdl1.2-dev – Missing dependencies on libcaca-dev and libpulse-dev
Package: libsdl1.2-dev Severity: serious Hi, libsdl1.2-dev must depend on libcaca-dev and libpulse-dev as 'sdl-config --libs --static-libs' adds both libraries to the linker flags. Also all remaining other libraries that might be missing from the -dev package dependencies from that list must be added. Thanks signature.asc Description: This is a digitally signed message part
Bug#670123: epm: FTBFS: g++: error: /usr/lib/x86_64-linux-gnu/libfltk_images.a: No such file or directory
Source: epm Version: 4.2-4 Severity: serious Justification: fails to build from source Hi, epm FTBFS in the architecture other than amd64. https://buildd.debian.org/status/package.php?p=epmsuite=sid - ./mantohtml setup.man setup.html /bin/rm -f epm.list.html ./mantohtml epm.list.man epm.list.html /bin/rm -f setup.types.html ./mantohtml setup.types.man setup.types.html mantohtml: Unknown man page command '.in' on line 39! mantohtml: Unknown man page command '.in' on line 52! /usr/bin/htmldoc --batch epm-book.book -f epm-book.html BYTES: 132251 make[1]: Leaving directory `/build/buildd-epm_4.2-4-armel-13StdS/epm-4.2/doc' # Rebuild setup and uninst to be as static as possible g++ -fPIE -pie -Wl,-z,relro -Wl,-z,now -Os -o setup setup.o setup2.o gui-common.o libepm.a /usr/lib/x86_64-linux-gnu/libfltk_images.a -Wl,-Bstatic -lpng -lz -ljpeg /usr/lib/x86_64-linux-gnu/libfltk.a -Wl,-Bdynamic -lXft -lfontconfig -lXinerama -lm -lX11 g++: error: /usr/lib/x86_64-linux-gnu/libfltk_images.a: No such file or directory g++: error: /usr/lib/x86_64-linux-gnu/libfltk.a: No such file or directory make: *** [build-stamp] Error 1 - I created a patch which revise this problem. Please check and apply this patch? Best regards, Nobuhiro -- Nobuhiro Iwamatsu iwamatsu at {nigauri.org / debian.org} GPG ID: 40AD1FA6 epm-4.2.debdiff Description: Binary data
Bug#615492: Users connected to server cannot hear each other
Am 23.04.2012 09:10, schrieb heimo chan: Dear All, Device info : I am using the Seagate DockStar machine, and Debian Squeeze as my OS. This device is using a ARM CPU Detail : http://archlinuxarm.org/platforms/armv5/seagate-dockstar And I have the mentioned bug too. Install Command : I install the mumble server by the following command : apt-get update apt-get install mumble-server Problem Scenario:When some users are connected , The users already in the server list may not receive the correct update from the server list. Endup the current users cannot notice the new user connected. And they cannot see the new users from the server list. However, some users can received the update. For those users can receive the update, they can listen and talk to the new commer, other wise they cannot see or talk to them. When some users disconnected from the server. The some current user cannot see them disconnected from the server list. And they will see the zombie users. I am willing to test the new compilation, please let me know what i can do thanks : Did you tested 1.2.3-313-ge5c4657-1 ? -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#615492: Users connected to server cannot hear each other
Heimo, I got around this problem by switching from murmur(mumble-server) to umurmur (http://code.google.com/p/umurmur/). I think the error is not the murmur code but in qt (a library that murmur uses), umurmur doesn't use qt and it works fine, it's not as feature rich as murmur, but your clients will probably not notice anything :) On Mon, Apr 23, 2012 at 9:10 AM, heimo chan heimoc...@yahoo.com.hk wrote: Dear All, Device info : I am using the Seagate DockStar machine, and Debian Squeeze as my OS. This device is using a ARM CPU Detail : http://archlinuxarm.org/platforms/armv5/seagate-dockstar And I have the mentioned bug too. Install Command : I install the mumble server by the following command : apt-get update apt-get install mumble-server Problem Scenario:When some users are connected , The users already in the server list may not receive the correct update from the server list. Endup the current users cannot notice the new user connected. And they cannot see the new users from the server list. However, some users can received the update. For those users can receive the update, they can listen and talk to the new commer, other wise they cannot see or talk to them. When some users disconnected from the server. The some current user cannot see them disconnected from the server list. And they will see the zombie users. I am willing to test the new compilation, please let me know what i can do thanks : Regards, Heimo. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#658483: Georg is now a QXmpp committer
Hi Boris, Georg Rudoy is now a QXmpp committer, so I am sure we can get whatever features are required for LeechCraft into QXmpp core (LeechCraft-specific stuff can still live inside LeechCraft). I would really rather there only be a single QXmpp, otherwise it'll make life difficult for developers. On a side note, QXmpp trunk is now built as a shared library by default, which is probably something you'd want. Cheers, Jeremy -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670124: wordpress: Security fixes in version 3.3.2
Package: wordpress Version: 3.3.1+dfsg-1 Severity: important Tags: security Page http://codex.wordpress.org/Version_3.3.2 says: Three external libraries included in WordPress received security updates: Plupload (version 1.5.4), which WordPress uses for uploading media. SWFUpload, which WordPress previously used for uploading media, and may still be in use by plugins. SWFObject, which WordPress previously used to embed Flash content, and may still be in use by plugins and themes. WordPress 3.3.2 also addresses: Limited privilege escalation where a site administrator could deactivate network-wide plugins when running a WordPress network under particular circumstances. Cross-site scripting vulnerability when making URLs clickable. Cross-site scripting vulnerabilities in redirects after posting comments in older browsers, and when filtering URLs. A full log of the changes made for 3.3.2 can be found at http://core.trac.wordpress.org/changeset?new=20554%40branches%2F3.3old=20087%40branches%2F3.3 -- System Information: Debian Release: 6.0.4 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/8 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages wordpress depends on: ii apache22.2.16-6+squeeze7 Apache HTTP Server metapackage ii apache2-mpm-prefork [h 2.2.16-6+squeeze7 Apache HTTP Server - traditional n ii libapache2-mod-php55.3.3-7+squeeze8 server-side, HTML-embedded scripti pn libjs-cropper none(no description available) ii libjs-jquery 1.4.2-2 JavaScript library for dynamic web pn libjs-prototypenone(no description available) pn libjs-scriptaculousnone(no description available) pn libphp-phpmailer none(no description available) pn libphp-snoopy none(no description available) pn mysql-client none(no description available) pn php-gettextnone(no description available) ii php5 5.3.3-7+squeeze8 server-side, HTML-embedded scripti ii php5-gd5.3.3-7+squeeze8 GD module for php5 ii php5-mysql 5.3.3-7+squeeze8 MySQL module for php5 pn tinymcenone(no description available) Versions of packages wordpress recommends: pn wordpress-l10nnone (no description available) Versions of packages wordpress suggests: pn mysql-server none (no description available) -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669184: qemu-kvm: Virtio network drops in case of a heavy load - Follow-up on virtio_net drop
Here is a basic outline of my configuration that I have made specifically for this case: I have reset everything on the host and created two new guest machines running off two COW containers derived from one baseline freshly made qcow2 container. Networking is following: Tap interface called tap2 is used to connect VDE2 switch to it. Than both guest being connected via VDE switch while WAN routing is performed by the host. For simplicity I have called one of the guests client-system another one is a server-system. I can't seem to find any error reports/logs on my host or any of the guests. If you could please advice me on any further debugging I'll try to provide as much data as possible. How did I test connection between my guests? I've simply created a 4 GB file on the server-system guest than I would try to perform shhfs, http or NFS file transfer from the client-system guest. I have created a dummy file filled up with zeroes: user@server-system$ dd if=/dev/zero of=/home/test_big_file_4GB bs=1M count=4K At this stage the most reliable connection I could make is via sshfs mount. During one of my test I've managed to squeeze 1.6 GB transfer on it... though it still failed on me. It seems that by removing the vitio_net module (and reloading it again) I can remedy this issue till the next transfer... Than it fails in the same manner. Once again I do; user@client-system$ modprobe -r vitio_net modprobe vitio_net Interesting thing is that it fails only on the guest that is doing transfer TO. So the system that is being transferred FROM doesn't loos its connection at all. Please find attached Host and guests Network config files. I don't know if they are of any use to you, but you never know I guess... As I have previously mentioned I don't get any issues if I have e1000 nic model enabled instead of virtio. Is there anything else I can do here to help with this? Thank you. KVM-Virtio-Bug-669184.tar.bz Description: application/bzip-compressed-tar
Bug#670125: pass arguments to dpkg-deb
Package: alien Version: 8.87 Severity: wishlist It would be very nice to pass arguments to dpkg-deb on converting a *.tgz archive to *.deb. For example, I would like to tell it to use 'dpkg-deb -z3'. Many thanx in advance Harri -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669583: OSError: [Errno 1] Operation not permitted
On Fri, Apr 20, 2012 at 04:11:16PM +0300, Teodor MICU wrote: 2012/4/20 Michael Vogt m...@debian.org: Sure, the setsid() call makes the process a session leader and removes the controlling tty. The rational is that if you run unattended-upgrades in a shell and then shutdown your tty goes away and unattended-upgrades gets killed even if its in the middle of a operation (like a upgrade). The unattended-upgrades-shutdown script is there to avoid that and keep the system running long enough to finish the upgrade - but for that unattended-upgrades must not be terminated by the tty going away. I think this protection is necessary only if U-A::Automatic-Reboot is set to true, right? If affirmative, why not wait until u-a finish the pkgs upgrade and then do the reboot? Thanks for your mail! It protects against e.g. a user manually running unattended-upgrade in a terminal and then someone shuting down the machine. In this case the running unattended-upgades would get killed even if its in the middle of the upgrade leaving the system in a bad state. It will also help if cron does not put u-n into its own process-group (I don't know if it will do that or not, but I assume it will) and on shutdown cron might get killed and with it the running u-n. The goal is to keep u-n alive and let the unattended-upgrades-shutdown script deal with stopping it or waiting until its finished. Given that I think that cron puts it into its own process group already its just a minor protection, but AFAICT there are no downsides either :) Cheers, Michael -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669059: webkit-1.8.0-2: FTBFS on hurd-*
Alle lunedì 23 aprile 2012, Svante Signell ha scritto: -#elif OS(UNIX) +#elif OS(HURD) CString getCurrentExecutablePath() + return CString(); +#elif OS(UNIX) This won't ever compile (missing curly brackets). Svante, instead of flooding the bug reports with reviews about unfinished patches, can you please just do all the discussion on d-hurd@ and only when the patch is okay send it to the bug report? -- Pino Toscano signature.asc Description: This is a digitally signed message part.
Bug#670126: [curl] Bad handling of IPv6 literal addresses
Package: curl Version: 7.25.0-1 Severity: normal $ curl -v 2a02:1788:4fd:cd::c742:cde2 * About to connect() to 2a02:1788:4fd:cd::c742 port 80 (#0) * Trying 2a02:1788:4fd:cd::c742... $ curl -v [2a02:1788:4fd:cd::c742:cde2] curl: (3) [globbing] error: bad range specification after pos 2 Globbing is whatever, but the behavior in the first example is completely wrong and unexpected. --- System information. --- Architecture: amd64 Kernel: Linux 3.2.12-rm1 Debian Release: wheezy/sid 990 testing wheezy.natsu.romanrm.ru 500 unstablewww.emdebian.org 500 stable stable.natsu.romanrm.ru --- Package information. --- Depends (Version) | Installed =-+-= libc6(= 2.7) | 2.13-27 libcurl3 (= 7.23.1) | 7.25.0-1 zlib1g (= 1:1.1.4) | 1:1.2.6.dfsg-2 Package's Recommends field is empty. Package's Suggests field is empty. -- With respect, Roman ~~~ Stallman had a printer, with code he could not see. So he began to tinker, and set the software free. signature.asc Description: PGP signature
Bug#670127: sfdisk: no room for partition descriptor in some situations with large disks
Package: util-linux Version: 2.20.1-4 Severity: important Tags: upstream patch fixed-upstream Hi, Please consider the following patch for sid and squeeze. At my workplace we have had something like this patch applied for the past couple of years, until we upgraded to squeeze and experienced the bug again. :) If you have any questions, please don't hesitate to ask. The patch is commit 9c45d49fe01c upstream. Thanks, Jonathan -- 8 -- From: Petr Uzel petr.u...@suse.cz Date: Fri, 6 Apr 2012 16:53:13 +0200 Subject: sfdisk: fix calculation due to type mismatch (ix86) Instructing sfdisk to create one partition spanning across entire disk (,,) on 32bit system, if the disk is sufficiently large (~2TB) leads to wrong calculation in compute_start_sect() due to type mismatch. Can be reproduced as: -- linux-3ln5:~ # modprobe scsi_debug virtual_gb=2000 linux-3ln5:~ # sfdisk /dev/sda ',,' Checking that no-one is using this disk right now ... OK Disk /dev/sda: 261083 cylinders, 255 heads, 63 sectors/track sfdisk: ERROR: sector 0 does not have an msdos signature sfdisk: /dev/sda: unrecognized partition table type Old situation: sfdisk: No partitions found no room for partition descriptor sfdisk: bad input -- Addresses: https://bugzilla.novell.com/show_bug.cgi?id=754789 Reported-by: Dan Mares dan.ma...@norcrossgroup.com Signed-off-by: Petr Uzel petr.u...@suse.cz Signed-off-by: Jonathan Nieder jrnie...@gmail.com --- fdisk/sfdisk.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/fdisk/sfdisk.c b/fdisk/sfdisk.c index 2729af18..eb2efe85 100644 --- a/fdisk/sfdisk.c +++ b/fdisk/sfdisk.c @@ -1995,7 +1995,7 @@ static int compute_start_sect(struct part_desc *p, struct part_desc *ep) { unsigned long long base; int inc = (DOS B.sectors) ? B.sectors : 1; -int delta; +long long delta; if (ep p-start + p-size = ep-start + 1) delta = p-start - ep-start - inc; @@ -2010,7 +2010,7 @@ compute_start_sect(struct part_desc *p, struct part_desc *ep) { p-size += delta; if (is_extended(p-p.sys_type) boxes == ONESECTOR) p-size = inc; - else if ((ssize_t) old_size = (ssize_t) - delta) { + else if ((long long) old_size = -delta) { my_warn(_(no room for partition descriptor\n)); return 0; } -- 1.7.10 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#499386: [etch] NULL pointer dereference in sys_exit_group
Hi Jonathan, On Monday, April 23, 2012 10:40:22 AM Jonathan Nieder wrote: Four years ago, you wrote[1]: Alas, we missed this and then lost track of it. Now I am curious: - do you still have access to this machine? - did you ever figure out what was causing the kernel panics? was there a workaround or fix? - was the backtrace always the same when the bug was encountered? If you can still reproduce this, I would be especially interested to learn whether squeeze or wheezy is affected, so we can make sure it gets fixed. Sorry for the trouble, and thanks for reporting it. Sorry, the old box has long been decommissioned. Next time I'm in the office, I'll try to see if it still exists physically, but I doubt it. Per your questions: * In most kernel crashes, I could find nothing in the log. * I never figured out the cause, or a workaround preventing the crashes. Eventually, we got tired of resetting it manually a-couple-times-a-month, and shilled a couple dozen bucks for a router box. Thanks for following up after all this time, Shai. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#668967: awn-extras-applets: NMU patch to fix 9/13 + unreported bugs by updating to bzr1539
Thanks. I already have an update with a bzr snapshot, I will try to update the package ASAP. Regards, Julien Lavergne Le 23 avr. 2012 à 09:02, Miguel A. Colón Vélezdebian.mic...@gmail.com a écrit : Hello: I made a possible NMU patch which closes 9/13 of the current bugs, some unreported bugs and updated to bzr1539 in the process. I have used this locally for a while so I just created a patch for it. I doubt it can get uploaded as an NMU since it's has many changes. I had to create a local git repo since this info is outdated and could not find a recent repo with awn-extras or avant-window-manager: Vcs-Git: git://github.com/gilir/awn-extras-debian.git Vcs-Browser: http://github.com/gilir/awn-extras-debian/tree For the remaining 4 bugs: Important bugs: #626729: python-gtkmozembed no longer exists. #639726: I get it sometimes but only 1 or 2 extra columns not infinite in my case. Normal bugs: #604931: copy/paste works fine in 0.4.0-5 and 0.4.1~bzr15XX. Can't reproduce. #607335: Can't reproduce. Possibly the user missing that icon which is unrelated to awn-extras or the package needed a rebuild which already fixed it. Hope this helps, Miguel -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669722: RFS: gnunet/0.9.2-1 [ITA]
Hello Christoph, Thank you for your answer. First of all, you are right: GNUnet has 2 dependencies in experimental (libextractor and libmicrohttpd). I intend to adopt and upload both to unstable (see RFS #669717 and #669719). With these, GNUnet shouldn't FTBFS. uscan warning: In debian/watch no matching files for watch line ftp://ftp.gnu.org/gnu/gnunet/gnunet-(\d.+).tar.gz I checked again last night, and it works fine for me. dpkg-source: info: local changes detected, the modified files are: /home/christoph/code/debian/sponsoring/gnunet-0.9.2/config.log dpkg-source: info: you can integrate the local changes with dpkg-source --commit I faced this issue a few weeks ago but I thought I fixed it. Do you think I should add config.log to the extend-diff-ignore option or to the clean target of debian/rules ? Regards, Bertrand -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670128: mboxcheck: defined(%hash) is deprecated warning
Package: mboxcheck Version: 0.2.0 Severity: normal Dear Maintainer, Hi, after a dist-upgrade I am seeing these warnings: defined(%hash) is deprecated at /usr/bin/mboxcheck line 266. (Maybe you should just omit the defined()?) defined(%hash) is deprecated at /usr/bin/mboxcheck line 272. (Maybe you should just omit the defined()?) which I think are due to the change in Perl syntax. Many thanks for your work on this packaged. Kind regards, CT. -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (990, 'testing'), (500, 'unstable'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 3.2.0-2-686-pae (SMP w/4 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/bash Versions of packages mboxcheck depends on: ii perl 5.14.2-9 mboxcheck recommends no packages. mboxcheck suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#666828: libapache2-mod-rivet bug #666828 reopened
severity 666828 serious thanks On 23.04.2012 09:36, Massimo Manghi wrote: The .postinst script fails because a2enmod (called via the apache2-maintscript-helper script) is missing. Since the script is shipped within apache2 it seems either Andreas' setup has an outdated apache2 package or ${misc:Depends} expansion in libapache2-mod-rivet doesn't list apache2. That's all correct. It's you to call a2enmod manually in your maintainer script. By purpose a module depends on apache2-bin only which does not provide apache2. You must not call a2enmod unconditionally. That said, I do not understand why you use maintscript helper correctly, but you do use a2enmod _too_. The former replaces the latter. -- with kind regards, Arno Töll IRC: daemonkeeper on Freenode/OFTC GnuPG Key-ID: 0x9D80F36D signature.asc Description: OpenPGP digital signature
Bug#660786: closed by Andres Mejia amejia...@gmail.com (Re: Bug#660786: ffmpeg: please migrate /etc/ffserver.conf to /etc/avserver.conf)
notfixed 660786 4:0.8.1-1 thanks Hi there! On Sun, 22 Apr 2012 17:39:13 +0200, Debian Bug Tracking System wrote: This is an automatic notification regarding your Bug report which was filed against the ffmpeg package: #660786: ffmpeg: please migrate /etc/ffserver.conf to /etc/avserver.conf It has been closed by Andres Mejia amejia...@gmail.com. [...] From: Andres Mejia amejia...@gmail.com Subject: Re: Bug#660786: ffmpeg: please migrate /etc/ffserver.conf to /etc/avserver.conf To: 660786-d...@bugs.debian.org, cont...@bugs.debian.org Date: Sun, 22 Apr 2012 11:36:29 -0400 fixed 660786 4:0.8.1-1 stop [...] This has since been fixed in version 4:0.8.1-1. No, it is not: = root@gismo:/etc# ls -l /etc/ffserver.conf /etc/avserver.conf -rw-r--r-- 1 root root 9085 Feb 5 23:43 /etc/avserver.conf -rw-r--r-- 1 root root 9085 Sep 1 2011 /etc/ffserver.conf root@gismo:/etc# dpkg-query -W ffmpeg ffmpeg 5:0.8.1-4 root@gismo:/etc# dpkg-query -W libav\* libav-tools 5:0.8.1-4 libavahi-client3:amd64 0.6.31-1 libavahi-common-data:amd64 0.6.31-1 libavahi-common3:amd64 0.6.31-1 libavahi-core7:amd640.6.31-1 libavahi-glib1:amd640.6.31-1 libavcodec-extra-53 libavcodec53:amd64 5:0.8.1-4 libavdevice-extra-53 libavdevice53:amd64 5:0.8.1-4 libavfilter-extra-2 libavfilter2:amd64 5:0.8.1-4 libavformat-extra-53 libavformat53:amd64 5:0.8.1-4 libavutil-extra-51 libavutil51:amd64 5:0.8.1-4 root@gismo:/etc# = And 4:0.8.1-1 debian/changelog does not contain any hint about this issue. Thx, bye, Gismo / Luca pgpGWEVJwWOQX.pgp Description: PGP signature
Bug#658483: Georg is now a QXmpp committer
Hi Jeremy, Georg Rudoy is now a QXmpp committer, so I am sure we can get whatever features are required for LeechCraft into QXmpp core (LeechCraft-specific stuff can still live inside LeechCraft). I would really rather there only be a single QXmpp, otherwise it'll make life difficult for developers. This is great news! And it was very suddenly. On a side note, QXmpp trunk is now built as a shared library by default, which is probably something you'd want. This is good news too. I have already used it as a shared library in my packages: https://github.com/tehnick/qxmpp-lc-debian/tree/launchpad/debian This draft could be useful for you. Best regards, Boris -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669425: openturns: new upstream version
[Moving discussion from 670066] Do we want to build python-openturns against all available python versions (which is smarter, but builds will take much longer), or do we build only against the default version? In the latter case, we should not let python-openturns Provides: ${python:Provides}. IMO we can use the latter and see if builds run much faster with CMake, in which case we may enable other python versions. Denis -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669647: ITP: hurd-cvsfs -- CVS virtual filesystem for the GNU Hurd
On Mon, Apr 23, 2012 at 09:18:30AM +0200, Josselin Mouette wrote: Le vendredi 20 avril 2012 à 20:23 +0200, Samuel Thibault a écrit : * Package name: hurd-cvsfs Aren’t you late by 19 days? (This isn't intended as a criticism of this specific ITP.) While it's great that Hurd can support all of these esoteric translators, in terms of making Hurd a viable *Debian* port, we really only need a few specific ones: - tmpfs - procfs - sysfs - ext?fs Speaking from the perspective of initscripts, we are carrying around a large amount of Hurd-specific code, which as far as I understand is probably actually unused. Example: All other platforms have /etc/mtab as a symlink. Yet we are carrying around large amounts of code and extra initscripts to generate mtab for the only system which does not support /proc/mounts (Hurd). A procfs translator (even an incomplete one) would allow all this (barely tested) cruft to be dropped. It would be really great if the efforts of the Hurd developers could be directed to getting the translators which are of direct benefit to the distribution as a whole functional, rather than features such as this--who uses CVS nowadays anyway, let along through a translator? It's neat, but not really useful (from the POV of the distribution as a whole). Thanks, Roger -- .''`. Roger Leigh : :' : Debian GNU/Linuxhttp://people.debian.org/~rleigh/ `. `' schroot and sbuild http://alioth.debian.org/projects/buildd-tools `-GPG Public Key F33D 281D 470A B443 6756 147C 07B3 C8BC 4083 E800 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670055: cups-filters: Printing a text file fails when Liberation is the only TrueType font available
On Mon 23 Apr 2012 at 07:59:03 +0200, Fabian Greffrath wrote: Indeed, it is expected to print the page with LiberationSans. I assume that we are talking about regular text here, with no special or e.g. Chinese glyphs? No, nothing out of the ordinary. Bash scripts, mail from Mutt etc. What does fc-match -s FreeMono give on your system? brian@dektop3:~$ fc-match -s FreeMono n022003l.pfb: Nimbus Mono L Regular LiberationMono-Regular.ttf: Liberation Mono Regular LiberationSans-Regular.ttf: Liberation Sans Regular LiberationSerif-Regular.ttf: Liberation Serif Regular d05l.pfb: Dingbats Regular s05l.pfb: Standard Symbols L Regular LiberationSansNarrow-Regular.ttf: Liberation Sans Narrow Regular n022003l.pfb is from gsfonts. Cheers, Brian. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669059: webkit-1.8.0-2: FTBFS on hurd-*
On Mon, 2012-04-23 at 10:00 +0200, Pino Toscano wrote: Alle lunedì 23 aprile 2012, Svante Signell ha scritto: -#elif OS(UNIX) +#elif OS(HURD) CString getCurrentExecutablePath() + return CString(); +#elif OS(UNIX) This won't ever compile (missing curly brackets). Sorry for that, updated patch attached! This one will compile. I think the Debian-Maintainer would have found out too, since the first part of the patch is common to the build problems for kfreebsd, so it has to be merged. Svante, instead of flooding the bug reports with reviews about unfinished patches, can you please just do all the discussion on d-hurd@ and only when the patch is okay send it to the bug report? Yes, I will do that in the future. This updated patch will be the last one until a functional (non-dummy) one is accepted by the reviewers on d-h@. I just wanted to get a quick fix into the bug report as a follow-up to Guillems mail. The fix was too quick, sorry for that. Normally I check by building the patched packages, but in this case compiling takes days... --- a/Source/ThirdParty/ANGLE/src/compiler/osinclude.h 2012-02-19 18:47:57.0 +0100 +++ b/Source/ThirdParty/ANGLE/src/compiler/osinclude.h 2012-04-15 09:20:30.0 +0200 @@ -16,7 +16,7 @@ #define ANGLE_OS_WIN #elif defined(__APPLE__) || defined(__linux__) || \ defined(__FreeBSD__) || defined(__OpenBSD__) || \ - defined(__sun) || defined(ANDROID) + defined(__sun) || defined(ANDROID) || defined(__GNU__) #define ANGLE_OS_POSIX #else #error Unsupported platform. --- a/Source/JavaScriptCore/wtf/gobject/GlibUtilities.cpp 2012-02-19 18:45:45.0 +0100 +++ b/Source/JavaScriptCore/wtf/gobject/GlibUtilities.cpp 2012-04-23 10:24:41.0 +0200 @@ -37,9 +37,13 @@ return CString(); return CString(readLinkBuffer, result); } -#elif OS(UNIX) +#elif OS(HURD) CString getCurrentExecutablePath() { + return CString(); +} +#elif OS(UNIX) +{ static char readLinkBuffer[PATH_MAX]; ssize_t result = readlink(/proc/curproc/file, readLinkBuffer, PATH_MAX); if (result == -1)
Bug#670126: [curl] Bad handling of IPv6 literal addresses
On Mon, 23 Apr 2012, Roman Mamedov wrote: FYI: This is known bug #30 in curl upstream: http://curl.haxx.se/docs/knownbugs.html Feel free to work on it! -- / daniel.haxx.se -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670126: [curl] Bad handling of IPv6 literal addresses
On Mon, 23 Apr 2012 10:41:31 +0200 (CEST) Daniel Stenberg dan...@haxx.se wrote: This is known bug #30 in curl upstream: http://curl.haxx.se/docs/knownbugs.html Feel free to work on it! Oh thank you very much, but please feel free to read my bug report a bit more closely! Okay, with -g $ curl -gv 2a02:1788:4fd:cd::c742:cde2 * About to connect() to 2a02:1788:4fd:cd::c742 port 80 (#0) * Trying 2a02:1788:4fd:cd::c742... Nothing changed. Note the IPv6 address specified and to where it actually tries to connect. It seems to be a recent regression, this works properly in at least version 7.21. -- With respect, Roman ~~~ Stallman had a printer, with code he could not see. So he began to tinker, and set the software free. signature.asc Description: PGP signature
Bug#670129: doc-rfc-std-proposed: dhelp can't convert rfc1277.ps
Package: doc-rfc-std-proposed Version: 20120225-2 Severity: normal Hi, Please fix this, re-assigning to dhelp if necessary. From: Anacron To: root Subject: Anacron job 'cron.weekly' /etc/cron.weekly/dhelp: Error converting file: /var/lib/dhelp/tmp/rfc1277.ps thanks, sez -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 3.2.0-2-686-pae (SMP w/4 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670126: [curl] Bad handling of IPv6 literal addresses
On Mon, 23 Apr 2012, Roman Mamedov wrote: Okay, with -g $ curl -gv 2a02:1788:4fd:cd::c742:cde2 Eeek. That's an invalid URL syntax. curl should probably flat out reject it. * About to connect() to 2a02:1788:4fd:cd::c742 port 80 (#0) * Trying 2a02:1788:4fd:cd::c742... Nothing changed. It changed drastically. Now it didn't complain on bad globbing. So your original stated problem was exactly what I pointed to. It seems to be a recent regression, this works properly in at least version 7.21. You mean you could pass in an illegal URL back then and it happened to guess what you meant? If so, that was mostly good luck. We can possibly change this to work like before (as I can't recall the exact reason for the change of behavior), but you should never *expect* badly formatted URLs to work. -- / daniel.haxx.se -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669905: Analysis
Hi, It's pretty clear why the unaligned access happens. At js/xpconnect/src/xpcprivate.h:1335 a new XPCCallContext object is created using mCcxToDestroy = mCcx = new (mData) XPCCallContext(mCallerLanguage, mCx, mCallBeginRequest == CALL_BEGINREQUEST, mObj, mFlattenedJSObject, mWrapper, mTearOff); Memory for the object (pointed to by mData) is allocated at line 1363 using char mData[sizeof(XPCCallContext)]; Char array has no alignment requirements. Best regards, -- Jurij Smakov ju...@wooyd.org Key: http://www.wooyd.org/pgpkey/ KeyID: C99E03CC -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669335: [2.6.32.y][PATCH] fix pgd_lock deadlock
Hello, On Wednesday 16 February 2011 15:49:47 Andrea Arcangeli wrote: Subject: fix pgd_lock deadlock From: Andrea Arcangeli aarca...@redhat.com It's forbidden to take the page_table_lock with the irq disabled or if there's contention the IPIs (for tlb flushes) sent with the page_table_lock held will never run leading to a deadlock. Apparently nobody takes the pgd_lock from irq so the _irqsave can be removed. Signed-off-by: Andrea Arcangeli aarca...@redhat.com This patch (original commit Id for 2.6.38 a79e53d85683c6dd9f99c90511028adc2043031f) needs to be back-ported to 2.6.32.x as well. I observed a dead-lock problem when running a PAE enabled Debian 2.6.32.46+ kernel with 6 VCPUs as a KVM on (2.6.32, 3.2, 3.3) kernel, which showed the following behaviour: 1 VCPU is stuck in pgd_alloc() → pgd_prepopulate_pmb() →... → flush_tlb_others_ipi() while (!cpumask_empty(to_cpumask(f-flush_cpumask))) cpu_relax(); (gdb) print f-flush_cpumask $5 = {1} while all other VCPUs are stuck in pgd_alloc() → spin_lock_irqsave(pgd_lock) I tracked it down to the commit 2.6.39-rc1: 4981d01eada5354d81c8929d5b2836829ba3df7b 2.6.32.34: ba456fd7ec1bdc31a4ad4a6bd02802dcaa730a33 x86: Flush TLB if PGD entry is changed in i386 PAE mode which when reverted made the bug disappear. Comparing 3.2 to 2.6.32.34 showed that the 'pgd-deadlock'-patch went into 2.6.38, that is before the 'PAE correctness'-patch, so the problem was probably never observed in the main development branch. But for 2.6.32 the 'pgd-deadlock' patch is still missing, so the 'PAE corretness'-patch made the problem worse with 2.6.32. The Patch was also back-ported to the OpenSUSE Kernel http://kernel.opensuse.org/cgit/kernel-source/commit/?id=ac27c01aa880c65d17043ab87249c613ac4c3635, Since the patch didn't apply cleanly on the current Debian kernel, I had to backport it for us and Debian. The patch is also available from our (German) Bugzilla https://forge.univention.org/bugzilla/show_bug.cgi?id=26661 or from the Debian BTS at http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669335. I have no easy test case, but running multiple parallel builds inside the VM normally triggers the bug within seconds to minutes. With the patch applied the VM survived a night building packages without any problem. Signed-off-by: Philipp Hahn h...@univention.de Sincerely Philipp -- Philipp Hahn Open Source Software Engineer h...@univention.de Univention GmbHbe open. fon: +49 421 22 232- 0 Mary-Somerville-Str.1 D-28359 Bremen fax: +49 421 22 232-99 http://www.univention.de/ It's forbidden to take the page_table_lock with the irq disabled or if there's contention the IPIs (for tlb flushes) sent with the page_table_lock held will never run leading to a deadlock. Nobody takes the pgd_lock from irq context so the _irqsave can be removed. Signed-off-by: Andrea Arcangeli aarca...@redhat.com Acked-by: Rik van Riel r...@redhat.com Tested-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com Signed-off-by: Andrew Morton a...@linux-foundation.org Cc: Peter Zijlstra pet...@infradead.org Cc: Linus Torvalds torva...@linux-foundation.org Cc: sta...@kernel.org LKML-Reference: 201102162345.p1gnjmjm021...@imap1.linux-foundation.org Signed-off-by: Ingo Molnar mi...@elte.hu Git-commit: a79e53d85683c6dd9f99c90511028adc2043031f --- a/arch/x86/mm/fault.c +++ b/arch/x86/mm/fault.c @@ -223,15 +223,14 @@ void vmalloc_sync_all(void) address = TASK_SIZE address FIXADDR_TOP; address += PMD_SIZE) { - unsigned long flags; struct page *page; - spin_lock_irqsave(pgd_lock, flags); + spin_lock(pgd_lock); list_for_each_entry(page, pgd_list, lru) { if (!vmalloc_sync_one(page_address(page), address)) break; } - spin_unlock_irqrestore(pgd_lock, flags); + spin_unlock(pgd_lock); } } @@ -331,13 +330,12 @@ void vmalloc_sync_all(void) address += PGDIR_SIZE) { const pgd_t *pgd_ref = pgd_offset_k(address); - unsigned long flags; struct page *page; if (pgd_none(*pgd_ref)) continue; - spin_lock_irqsave(pgd_lock, flags); + spin_lock(pgd_lock); list_for_each_entry(page, pgd_list, lru) { pgd_t *pgd; pgd = (pgd_t *)page_address(page) + pgd_index(address); @@ -346,7 +344,7 @@ void vmalloc_sync_all(void) else BUG_ON(pgd_page_vaddr(*pgd) != pgd_page_vaddr(*pgd_ref)); } - spin_unlock_irqrestore(pgd_lock, flags); + spin_unlock(pgd_lock); } } --- a/arch/x86/mm/pageattr.c +++ b/arch/x86/mm/pageattr.c @@ -56,12 +56,10 @@ static unsigned long direct_pages_count[ void update_page_count(int level, unsigned long pages) { - unsigned long flags; - /* Protect against CPA */ - spin_lock_irqsave(pgd_lock, flags); + spin_lock(pgd_lock); direct_pages_count[level] += pages; - spin_unlock_irqrestore(pgd_lock, flags); + spin_unlock(pgd_lock); } static void split_page_count(int level) @@ -354,7
Bug#669620: duplicate of 651640
Found out this bug has already been reported as: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=651640 *** Automatisch angehangener Disclaimer von SHD aufgrund der aktuellen Rechtslage *** SHD System-Haus-Dresden GmbH - Computerloesungen Geschaeftsfuehrer: Dr. Frank Karow, Dr. Falk Ambos Sitz der Gesellschaft ist Dresden Handelsregister: HRB Nr. 329 Amtsgericht Dresden Umsatzsteueridentifikationsnummer: DE140131570 ***
Bug#670126: [curl] Bad handling of IPv6 literal addresses
On Mon, 23 Apr 2012 11:04:02 +0200 (CEST) Daniel Stenberg dan...@haxx.se wrote: * About to connect() to 2a02:1788:4fd:cd::c742 port 80 (#0) * Trying 2a02:1788:4fd:cd::c742... Nothing changed. It changed drastically. Now it didn't complain on bad globbing. So your original stated problem was exactly what I pointed to. $ curl -v 2a02:1788:4fd:cd::c742:cde2 * About to connect() to 2a02:1788:4fd:cd::c742 port 80 (#0) * Trying 2a02:1788:4fd:cd::c742... ^C $ curl -gv 2a02:1788:4fd:cd::c742:cde2 * About to connect() to 2a02:1788:4fd:cd::c742 port 80 (#0) * Trying 2a02:1788:4fd:cd::c742... ^C Without the braces it never complains about bad globbing, but always chops off the last part of this address (as of version 7.25), which is what the bug report is about. You mean you could pass in an illegal URL back then and it happened to guess what you meant? If so, that was mostly good luck. With the older version: # curl --version curl 7.21.0 (x86_64-pc-linux-gnu) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3.4 libidn/1.15 libssh2/1.2.6 Protocols: dict file ftp ftps http https imap imaps ldap ldaps pop3 pop3s rtsp scp sftp smtp smtps telnet tftp Features: GSS-Negotiate IDN IPv6 Largefile NTLM SSL libz It works: # curl -v 2a02:1788:4fd:cd::c742:cde2 * About to connect() to 2a02:1788:4fd:cd::c742:cde2 port 80 (#0) * Trying 2a02:1788:4fd:cd::c742:cde2... connected * Connected to 2a02:1788:4fd:cd::c742:cde2 (2a02:1788:4fd:cd::c742:cde2) port 80 (#0) [snip] -- With respect, Roman ~~~ Stallman had a printer, with code he could not see. So he began to tinker, and set the software free. signature.asc Description: PGP signature
Bug#670113: flowcanvas: diff for NMU version 0.7.1+dfsg0-0.2
Hi Paul, an nmudiff is attached. Regards. -- Alessio Treglia | www.alessiotreglia.com Debian Developer | ales...@debian.org Ubuntu Core Developer| quadris...@ubuntu.com 0416 0004 A827 6E40 BB98 90FB E8A4 8AE5 311D 765A diffstat for flowcanvas-0.7.1+dfsg0 flowcanvas-0.7.1+dfsg0 changelog|9 + patches/0001-pkgconfig_fix.patch | 19 +++ patches/series |1 + 3 files changed, 29 insertions(+) diff -Nru flowcanvas-0.7.1+dfsg0/debian/changelog flowcanvas-0.7.1+dfsg0/debian/changelog --- flowcanvas-0.7.1+dfsg0/debian/changelog 2012-01-09 19:44:56.0 +0100 +++ flowcanvas-0.7.1+dfsg0/debian/changelog 2012-04-23 11:13:04.0 +0200 @@ -1,3 +1,12 @@ +flowcanvas (0.7.1+dfsg0-0.2) unstable; urgency=low + + * Non-maintainer upload. + * Properly fill flowcanvas.pc's Requires field rather than putting +hard-coded paths/libraries in Cflags/Libs to avoid build failures +in a multiarchified world (Closes: #670113). + + -- Alessio Treglia ales...@debian.org Mon, 23 Apr 2012 11:10:47 +0200 + flowcanvas (0.7.1+dfsg0-0.1) unstable; urgency=low * Non-maintainer upload. diff -Nru flowcanvas-0.7.1+dfsg0/debian/patches/0001-pkgconfig_fix.patch flowcanvas-0.7.1+dfsg0/debian/patches/0001-pkgconfig_fix.patch --- flowcanvas-0.7.1+dfsg0/debian/patches/0001-pkgconfig_fix.patch 1970-01-01 01:00:00.0 +0100 +++ flowcanvas-0.7.1+dfsg0/debian/patches/0001-pkgconfig_fix.patch 2012-04-23 11:10:43.0 +0200 @@ -0,0 +1,19 @@ +Subject: Strip hard-coded paths/libraries of Cflags/Libs. +Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670113 +From: http://dev.drobilla.net/changeset/3432/trunk/flowcanvas/flowcanvas.pc.in +Reviewed-by: Alessio Treglia ales...@debian.org +--- + flowcanvas.pc.in |5 +++-- + 1 file changed, 3 insertions(+), 2 deletions(-) + +--- flowcanvas-0.7.1+dfsg0.orig/flowcanvas.pc.in flowcanvas-0.7.1+dfsg0/flowcanvas.pc.in +@@ -6,5 +6,6 @@ includedir=@includedir@ + Name: flowcanvas + Version: @FLOWCANVAS_VERSION@ + Description: A Gtkmm canvas widget for graph based interfaces +-Libs: -L${libdir} -lflowcanvas @GNOMECANVASMM_LIBS@ +-Cflags: -I${includedir} @GNOMECANVASMM_CFLAGS@ ++Requires: libgnomecanvasmm-2.6 ++Libs: -L${libdir} -lflowcanvas ++Cflags: -I${includedir} diff -Nru flowcanvas-0.7.1+dfsg0/debian/patches/series flowcanvas-0.7.1+dfsg0/debian/patches/series --- flowcanvas-0.7.1+dfsg0/debian/patches/series 2011-05-20 15:27:22.0 +0200 +++ flowcanvas-0.7.1+dfsg0/debian/patches/series 2012-04-23 11:07:19.0 +0200 @@ -1 +1,2 @@ +0001-pkgconfig_fix.patch 1001-dont_run_ldconfig.patch signature.asc Description: Digital signature
Bug#669647: ITP: hurd-cvsfs -- CVS virtual filesystem for the GNU Hurd
Roger Leigh, le Mon 23 Apr 2012 09:44:32 +0100, a écrit : While it's great that Hurd can support all of these esoteric translators, in terms of making Hurd a viable *Debian* port, we really only need a few specific ones: - tmpfs - procfs - ext?fs They are already there. - sysfs Err, I don't think it's a good idea to let people think it is ok to use extremely-linuxish things there. Yet we are carrying around large amounts of code and extra initscripts to generate mtab for the only system which does not support /proc/mounts (Hurd). A procfs translator (even an incomplete one) would allow all this (barely tested) cruft to be dropped. We have an incomplete procfs already. It doesn't have /proc/mounts, because it's not a trivial thing to implement: since mounts are distributed, there is no central place where filesystems are to be recorded. There are plans to somehowe build one. In the meanwhile things are working already. I don't think spending time on a feature just to remove some existing code is the best way to spend our time, either. It would be really great if the efforts of the Hurd developers could be directed to getting the translators which are of direct benefit to the distribution as a whole functional, rather than features such as this--who uses CVS nowadays anyway, let along through a translator? It's neat, but not really useful (from the POV of the distribution as a whole). There are two answers: - Yet, this is neat. And we need such neat features to show that GNU/Hurd can have neat features, and is thus worth caring about. - See the development dates: all this code was developped before 2007. It took me very little time to make them Debian packages, to make that work actually be easily usable; it would be too bad that such nice work is not exposed. It just happens that sometimes it's what takes the least time (trivial packaging) that has the most visible effects (ITPs). On the other hand, I've spent the whole week-end fixing some bits in glibc/parted/grub, which we *DO* need for a release. Samuel -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#554387: rred segfaults during apt-get update if pkgcache.bin is corrupted
Hi, I just ran into this with apt 0.9.1, too, but during aptitude -u: [1553460.781159] rred[17543]: segfault at 123f3c8 ip 7fed222b258d sp 7fff584faa10 error 4 in libc-2.13.so[7fed2223b000+17d000] Quitting aptitude (with Ctrl-C) and running apt-get update interestingly solved the issue and another run of aptitude -u worked fine afterwards, too. So it looks to me as if there is some kind of cleanup for such things. Regards, Axel -- ,''`. | Axel Beckert a...@debian.org, http://people.debian.org/~abe/ : :' : | Debian Developer, ftp.ch.debian.org Admin `. `' | 1024D: F067 EA27 26B9 C3FC 1486 202E C09E 1D89 9593 0EDE `-| 4096R: 2517 B724 C5F6 CA99 5329 6E61 2FF9 CD59 6126 16B5 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#566900: RFH: openbox -- standards compliant, fast, light-weight, extensible window manager
Hi, I offer to adopt openbox on behalf of the Debian LXDE team. Regards, Daniel -- Address:Daniel Baumann, Donnerbuehlweg 3, CH-3012 Bern Email: daniel.baum...@progress-technologies.net Internet: http://people.progress-technologies.net/~daniel.baumann/ -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669372: apt-cacher-cleanup.pl fails to update index files by patching
On Sat, Apr 21, 2012 at 06:09:03PM +0200, Alfredo Finelli wrote: Mark Hindley: ... The full patch I have is below, perhaps you could verify it fixes it for you. I tested it with InRelease files only, then with Release and InRelease present together, with and without obsolete packages in the cache: now it behaves as expected both in the patch phase and in package removal. Thanks. I hope to have this uploaded in 1.7.4 by the end of the month. Mark -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670130: ITP: atig -- Twitter IRC gateway
Package: wnpp Owner: Youhei SASAKI uwab...@gfd-dennou.org Severity: wishlist * Package name: atig Version : 0.3.4 Upstream Author : MIZUNO mzp Hiroki (mzp%40happyabc.org) * URL or Web page : http://mzp.github.com/atig/ * License : GPL or Ruby's Description : Twitter IRC gateway Atig.rb is Twitter Irc Gateway. You can tweet via your favorite IRC client. . Features: - OAuth authentication - CTCP Action: reply, retweet, search, thread... - List, Mention, Retweet as IRC channel --- Youhei SASAKI uwab...@gfd-dennou.org uwab...@debian.or.jp GPG fingerprint: 4096/RSA: 66A4 EA70 4FE2 4055 8D6A C2E6 9394 F354 891D 7E07 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670131: AttributeError: 'Version' object has no attribute 'policy_priority'
Package: unattended-upgrades Version: 0.76.2 Severity: grave Justification: renders package unusable Hi, I upgraded u-a on one 32-bit server to test if another problem is fixed and found that it doesn't work anymore: | root@goliath:~# unattended-upgrades --debug | INFO:root:Initial blacklisted packages: locales libc6-i686 libc-bin libc6 linux-image-2.6.32-5-486 linux-image-2.6.32-5-686-bigmem firmware-linux-free linux-base libupsclient1 nut nut-cgi squid3-common squid3 | Initial blacklisted packages: locales libc6-i686 libc-bin libc6 linux-image-2.6.32-5-486 linux-image-2.6.32-5-686-bigmem firmware-linux-free linux-base libupsclient1 nut nut-cgi squid3-common squid3 | INFO:root:Starting unattended upgrades script | Starting unattended upgrades script | INFO:root:Allowed origins are: ['o=Debian,a=stable', 'o=Debian,a=stable-updates', 'o=Debian,a=proposed-updates', 'origin=Debian,archive=stable,label=Debian-Security'] | Allowed origins are: ['o=Debian,a=stable', 'o=Debian,a=stable-updates', 'o=Debian,a=proposed-updates', 'origin=Debian,archive=stable,label=Debian-Security'] | Traceback (most recent call last): | File /usr/bin/unattended-upgrades, line 920, in module | main(options) | File /usr/bin/unattended-upgrades, line 699, in main | allowed_origins=allowed_origins) | File /usr/bin/unattended-upgrades, line 70, in __init__ | self.adjust_candidate_versions() | File /usr/bin/unattended-upgrades, line 94, in adjust_candidate_versions | if ver.policy_priority 0: | AttributeError: 'Version' object has no attribute 'policy_priority' (on this system I do many u-a tests, that's why it has many packages blacklisted) Thanks -- System Information: Debian Release: 6.0.4 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'proposed-updates'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.32-5-686-bigmem (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages unattended-upgrades depends on: ii apt 0.8.10.3+squeeze1 Advanced front-end for dpkg ii apt-utils 0.8.10.3+squeeze1 APT utility programs ii debconf [debconf-2.0] 1.5.36.1 Debian configuration management sy ii lsb-release 3.2-23.2squeeze1 Linux Standard Base version report ii python2.6.6-3+squeeze6 interactive high-level object-orie ii python-apt0.7.100.1+squeeze1 Python interface to libapt-pkg ii ucf 3.0025+nmu1Update Configuration File: preserv unattended-upgrades recommends no packages. Versions of packages unattended-upgrades suggests: pn bsd-mailx none (no description available) -- Configuration Files: /etc/apt/apt.conf.d/50unattended-upgrades changed: // Automatically upgrade packages from these origin patterns Unattended-Upgrade::Origins-Pattern { // Codename based matching: // This will follow the migration of a release through different // archives (e.g. from testing to stable and later oldstable). // o=Debian,n=squeeze; // o=Debian,n=squeeze-updates; // o=Debian,n=squeeze-proposed-updates; // o=Debian,n=squeeze,l=Debian-Security; // Archive or Suite based matching: // Note that this will silently match a different release after // migration to the specified archive (e.g. testing becomes the // new stable). o=Debian,a=stable; o=Debian,a=stable-updates;; o=Debian,a=proposed-updates; origin=Debian,archive=stable,label=Debian-Security; }; // List of packages to not update Unattended-Upgrade::Package-Blacklist { // vim; // libc6; // libc6-dev; // libc6-i686; }; // This option allows you to control if on a unclean dpkg exit // unattended-upgrades will automatically run // dpkg --force-confold --configure -a // The default is true, to ensure updates keep getting installed //Unattended-Upgrade::AutoFixInterruptedDpkg false; // Split the upgrade into the smallest possible chunks so that // they can be interrupted with SIGUSR1. This makes the upgrade // a bit slower but it has the benefit that shutdown while a upgrade // is running is possible (with a small delay) //Unattended-Upgrade::MinimalSteps true; // Install all unattended-upgrades when the machine is shuting down // instead of doing it in the background while the machine is running // This will (obviously) make shutdown slower //Unattended-Upgrade::InstallOnShutdown true; // Send email to this address for problems or packages upgrades // If empty or unset then no email is sent, make sure that you // have a working mail setup on your system. A package that provides // 'mailx' must be installed. Unattended-Upgrade::Mail root; // Set this value to true to get emails only on errors. Default // is to always send a mail if Unattended-Upgrade::Mail is set
Bug#670132: Useless ...terminated. messaged at the end of su invocation
Package: login Version: 1:4.1.5-1 Severity: normal File: /bin/su $ su -c id Password: uid=0(root) gid=0(root) groups=0(root) ...terminated. $ su - Password: # ^D ...terminated. $ This ...terminated. message must be the most useless change to some core unix utility I've seen so far. When I've seen it the first time I was honestly thinking something broke or crashed due to a signal. Bring back the success = no output philosophy please. -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (900, 'unstable'), (800, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-2-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages login depends on: ii libc6 2.13-30 ii libpam-modules 1.1.3-7 ii libpam-runtime 1.1.3-7 ii libpam0g1.1.3-7 login recommends no packages. login suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669647: ITP: hurd-cvsfs -- CVS virtual filesystem for the GNU Hurd
On Mon, Apr 23, 2012 at 11:20:00AM +0200, Samuel Thibault wrote: Roger Leigh, le Mon 23 Apr 2012 09:44:32 +0100, a écrit : While it's great that Hurd can support all of these esoteric translators, in terms of making Hurd a viable *Debian* port, we really only need a few specific ones: - tmpfs - procfs - ext?fs They are already there. OK. I was informed otherwise when I was working on all the tmpfs-related code. If this is the case, I will remove all the Hurd-specific disabling, and it will be enabled shortly. You'll get a tmpfs /run etc. like everyone else. Does Hurd support ext3/4 yet? - sysfs Err, I don't think it's a good idea to let people think it is ok to use extremely-linuxish things there. kFreeBSD supports both linprocfs and linsysfs. If you're going to integrate well with the rest of the Debian system, the reality is that this stuff is needed. We shouldn't need Hurd to be gratuitously different for such basic stuff, it again causes a large maintenance burden, and means Hurd support will be lacking. Yet we are carrying around large amounts of code and extra initscripts to generate mtab for the only system which does not support /proc/mounts (Hurd). A procfs translator (even an incomplete one) would allow all this (barely tested) cruft to be dropped. We have an incomplete procfs already. It doesn't have /proc/mounts, because it's not a trivial thing to implement: since mounts are distributed, there is no central place where filesystems are to be recorded. There are plans to somehowe build one. In the meanwhile things are working already. I don't think spending time on a feature just to remove some existing code is the best way to spend our time, either. It's not just a case of working already. I spent several days writing and testing all that code. From scratch. Just for Hurd. And this is just one example. We need a dynamic mtab; a static one is plain broken, and this does have a maintenance burden which Hurd forces me to undertake. There's special code in every initscript which mounts something, plus a whole library of shell functions... which should be deleted at the earliest opportunity. Regards, Roger -- .''`. Roger Leigh : :' : Debian GNU/Linuxhttp://people.debian.org/~rleigh/ `. `' schroot and sbuild http://alioth.debian.org/projects/buildd-tools `-GPG Public Key F33D 281D 470A B443 6756 147C 07B3 C8BC 4083 E800 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#630120: iceweasel: bookmark management with drag and drop fails
This bug is not reproducible anymore in iceweasel 10.0.3esr-3 Fixed? -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669647: Hurd features [Was: ITP: hurd-cvsfs -- CVS virtual filesystem for the GNU Hurd]
Roger Leigh, le Mon 23 Apr 2012 10:43:00 +0100, a écrit : They are already there. OK. I was informed otherwise when I was working on all the tmpfs-related code. Things evolve, we do spend time on useful features :) Tmpfs has recently been fixed. Does Hurd support ext3/4 yet? No. - sysfs Err, I don't think it's a good idea to let people think it is ok to use extremely-linuxish things there. kFreeBSD supports both linprocfs and linsysfs. Linsysfs is extremely small: from what I see on asdfasdf, it only exposes two bits of information for each scsi host. If you're going to integrate well with the rest of the Debian system, the reality is that this stuff is needed. /sys is a moving thing, and full of a lot of details. I believe BSD people will agree that they don't want to spend time on that. Yet we are carrying around large amounts of code and extra initscripts to generate mtab for the only system which does not support /proc/mounts (Hurd). A procfs translator (even an incomplete one) would allow all this (barely tested) cruft to be dropped. We have an incomplete procfs already. It doesn't have /proc/mounts, because it's not a trivial thing to implement: since mounts are distributed, there is no central place where filesystems are to be recorded. There are plans to somehowe build one. In the meanwhile things are working already. I don't think spending time on a feature just to remove some existing code is the best way to spend our time, either. It's not just a case of working already. I spent several days writing and testing all that code. From scratch. Just for Hurd. Ah, we weren't aware of that. Samuel -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670040: pax do not work at all
Hi Heiko, thanks for the quick answer! On Mo, 23 Apr 2012, Heiko Oberdiek wrote: Currently I don't have time to update pax to the new pdfbox. TL freeze is nearing and my bundle update is more important to me. At least the update of README is on the way to CTAN. Fully understood, no problem. Thanks for all your great work! Best wishes Norbert Norbert Preiningpreining@{jaist.ac.jp, logic.at, debian.org} JAIST, Japan TeX Live Debian Developer DSA: 0x09C5B094 fp: 14DF 2E6C 0307 BE6D AD76 A9C0 D2BF 4AA3 09C5 B094 SPOFFORTH (vb.) To tidy up a room before the cleaning lady arrives. --- Douglas Adams, The Meaning of Liff -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#605334: wish feature quicklook parameter
Hello, this is fixed in gnome 3 by installing gnome-sushi: http://packages.debian.org/wheezy/gnome-sushi Does this solve your problem/wish? Should this report be closed? -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#630120: iceweasel: bookmark management with drag and drop fails
On Mon, Apr 23, 2012 at 11:50:30AM +0200, nodiscc wrote: This bug is not reproducible anymore in iceweasel 10.0.3esr-3 Were you able to reproduce, before? Mike -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#661150: dropbear: CVE-2012-0920 SSH server use-after-free vulnerability]
Hi Team, do you have any news on this pending security fix? If I can be of any help, please don't hesitate to ask. Regards, Gerrit. On Tue, Feb 28, 2012 at 10:13:07AM +, Gerrit Pape wrote: On Mon, Feb 27, 2012 at 03:54:11PM +0100, Nico Golde wrote: * Gerrit Pape p...@smarden.org [2012-02-27 15:48]: Accoring to upstream's changelog, this also affects squeeze. Are you already working on that, or shall I prepare an upload to stable? If you have the time to prepare stable updates that would be great, we currently track this in RT as #3643. Please send me the debdiff before uploading. Hi, oldstable (0.51-1) is not affected. unstable is fixed with version 2012.55-1. For stable, I backported the fix to 0.52, swiftly checked with upstream (thx Matt), and prepared theses changes (debdiff attached): Format: 1.8 Date: Tue, 28 Feb 2012 09:44:53 + Source: dropbear Binary: dropbear Architecture: source Version: 0.52-5+squeeze1 Distribution: stable-security Urgency: high Maintainer: Gerrit Pape p...@smarden.org Changed-By: Gerrit Pape p...@smarden.org Description: dropbear - lightweight SSH2 server and client Closes: 661150 Changes: dropbear (0.52-5+squeeze1) stable-security; urgency=high . * debian/diff/0003-Fix-use-after-free-bug-CVE-2012-0920.diff: new: Fix use-after-free bug (CVE-2012-0920) (closes: #661150). Checksums-Sha1: 0afb9d944048204f9ee90104334db6bde3f92c69 769 dropbear_0.52-5+squeeze1.dsc ae927e8b90059a7ba2b2b514d9824c12885b1949 1789901 dropbear_0.52.orig.tar.gz 78962f1288c833c0609ae1c97557c731465cbb96 5767 dropbear_0.52-5+squeeze1.diff.gz Checksums-Sha256: e51eba0631636c438010b9251603b7f5c9220d442e4cc757f29ff31e3e877dcc 769 dropbear_0.52-5+squeeze1.dsc e3a2ca49ed85ce562240c0ac06e2f72826d7e52a83e80d91c067c8b97bf5c108 1789901 dropbear_0.52.orig.tar.gz 67e15d4c1663a31d33b50800e169ac82787d2c62276f80186724d4d1a21df91b 5767 dropbear_0.52-5+squeeze1.diff.gz Files: de29b4652687bb752fb28b38398df336 769 net optional dropbear_0.52-5+squeeze1.dsc 1c69ec674481d7745452f68f2ea5597e 1789901 net optional dropbear_0.52.orig.tar.gz b803c37992f2e7e6e75c5d806917568f 5767 net optional dropbear_0.52-5+squeeze1.diff.gz Regards, Gerrit. diff -u dropbear-0.52/debian/changelog dropbear-0.52/debian/changelog --- dropbear-0.52/debian/changelog +++ dropbear-0.52/debian/changelog @@ -1,3 +1,10 @@ +dropbear (0.52-5+squeeze1) stable-security; urgency=high + + * debian/diff/0003-Fix-use-after-free-bug-CVE-2012-0920.diff: new: +Fix use-after-free bug (CVE-2012-0920) (closes: #661150). + + -- Gerrit Pape p...@smarden.org Tue, 28 Feb 2012 09:44:53 + + dropbear (0.52-5) unstable; urgency=low [ deb...@x.ray.net ] only in patch2: unchanged: --- dropbear-0.52.orig/debian/diff/0003-Fix-use-after-free-bug-CVE-2012-0920.diff +++ dropbear-0.52/debian/diff/0003-Fix-use-after-free-bug-CVE-2012-0920.diff @@ -0,0 +1,35 @@ +From d46b781361cae7fdbdc50ad5752d47f786f30a2b Mon Sep 17 00:00:00 2001 +From: Gerrit Pape p...@smarden.org +Date: Mon, 27 Feb 2012 16:33:55 + +Subject: [PATCH 3/3] Fix use-after-free bug (CVE-2012-0920) + +Fix use-after-free bug that could be triggered if command=... +authorized_keys restrictions are used. + +This is a backport of the upstream fix in version 2012.55 to version +0.52 + https://secure.ucc.asn.au/hg/dropbear/rev/818108bf7749 +--- + svr-authpubkeyoptions.c |6 -- + 1 files changed, 4 insertions(+), 2 deletions(-) + +diff --git a/svr-authpubkeyoptions.c b/svr-authpubkeyoptions.c +index 13a179d..324eb47 100644 +--- a/svr-authpubkeyoptions.c b/svr-authpubkeyoptions.c +@@ -90,8 +90,10 @@ int svr_pubkey_allows_pty() { + + /* Set chansession command to the one forced by 'command' public key option */ + void svr_pubkey_set_forced_command(struct ChanSess *chansess) { +-if (ses.authstate.pubkey_options) +-chansess-cmd = ses.authstate.pubkey_options-forced_command; ++if (ses.authstate.pubkey_options) { ++m_free(chansess-cmd); ++chansess-cmd = m_strdup(ses.authstate.pubkey_options-forced_command); ++} + } + + /* Free potential public key options */ +-- +1.7.9.1 + -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670133: nslcd: /etc/nslcd.conf's binddn/bindpw removed during upgrade
Package: nslcd Version: 0.8.7-1 Severity: critical Tags: patch Usertags: pca.it-authentication Hi there! Basically, with today's upgrade, my /etc/nslcd.conf was automatically changed and the LDAP setup completely broke: = root@gismo:/etc# cat /var/log/syslog [...] Apr 23 10:27:29 gismo nslcd[5209]: version 0.8.7 starting Apr 23 10:27:29 gismo nslcd[5209]: accepting connections Apr 23 10:27:37 gismo nslcd[5209]: [8b4567] group/member=luca ldap_result() failed: Insufficient access [...] root@gismo:/etc# git log -p -1 commit abc0c29950469771617ffd0be132456669b7d305 Author: Luca Capello l...@pca.it Date: Mon Apr 23 10:27:35 2012 +0200 committing changes in /etc after apt run Package changes: [...] -nslcd 0.8.6-1 +nslcd 0.8.7-1 [...] diff --git a/nslcd.conf b/nslcd.conf index 8ea8f0c..db2131d 100644 --- a/nslcd.conf +++ b/nslcd.conf @@ -16,8 +16,8 @@ base dc=pca,dc=it #ldap_version 3 # The DN to bind with for normal lookups. -binddn HIDDEN -bindpw HIDDEN +#binddn HIDDEN +#bindpw *removed* # The DN used for password modifications by root. #rootpwmoddn cn=admin,dc=example,dc=com = I was quite surprised by that and then discovered the reason: /etc/nslcd.conf is not a dpkg's conffile (it does not show up with `dpkg-query -s nslcd`), thus any modification done is not automatically preserved during upgrades, which is a bug according to debian-policy_3.9.3.1's § 10.7.3: http://www.debian.org/doc/debian-policy/ch-files.html#s10.7.3 10.7 Configuration files [...] 10.7.3 Behavior Configuration file handling must conform to the following behavior: * local changes must be preserved during a package upgrade, NB, the Severity: of this bug is critical (and not serious) because no more LDAP users can work with the system. Strangely enough, this should have already been fixed by #610117. Some debugging and the problem in my case was clear: I did not used debconf/dpkg-reconfigure to configure nslcd (which is perfectly fine, no configuration method is mandatory in Debian), thus given that debconf's nslcd/ldap-auth-type was empty /var/lib/dpkg/info/nslcd.postinst:212 thinks that there is no authentication at all. This is easily fixed with the following patch, but further investigation is still needed, given that bindpw is still removed, again if you do not use debconf/dpkg-reconfigure: --8---cut here---start-8--- --- nslcd.postinst.ORG 2012-04-23 01:22:29.0 +0200 +++ nslcd.postinst 2012-04-23 12:04:15.180373883 +0200 @@ -211,6 +211,10 @@ update_config nslcd/ldap-base base db_get nslcd/ldap-auth-type authtype=$RET + db_get nslcd/ldap-binddn + if [ -n $RET ] [ $authtype = none ]; then +authtype=simple + fi case $authtype in simple) update_config nslcd/ldap-binddn binddn --8---cut here---end---8--- The problem is present on the debconf's side as well, reproducible with: = root@gismo:/etc# debconf-show nslcd * nslcd/ldap-bindpw: (password omitted) nslcd/ldap-sasl-realm: * nslcd/ldap-starttls: false nslcd/ldap-sasl-krb5-ccname: /var/run/nslcd/nslcd.tkt nslcd/ldap-auth-type: none nslcd/ldap-reqcert: * nslcd/ldap-uris: ldap://ldap.pca.it nslcd/ldap-sasl-secprops: * nslcd/ldap-binddn: HIDDEN nslcd/ldap-sasl-authcid: nslcd/ldap-sasl-mech: * nslcd/ldap-base: dc=pca,dc=it nslcd/ldap-sasl-authzid: root@gismo:/etc# git diff diff --git a/nslcd.conf b/nslcd.conf index db2131d..2984a50 100644 --- a/nslcd.conf +++ b/nslcd.conf @@ -16,8 +16,8 @@ base dc=pca,dc=it #ldap_version 3 # The DN to bind with for normal lookups. -#binddn HIDDEN -#bindpw *removed* +binddn test +bindpw test # The DN used for password modifications by root. #rootpwmoddn cn=admin,dc=example,dc=com root@gismo:/etc# dpkg-reconfigure nslcd [...] root@gismo:/etc# git diff | less diff --git a/nslcd.conf b/nslcd.conf index db2131d..41b888f 100644 --- a/nslcd.conf +++ b/nslcd.conf @@ -16,7 +16,7 @@ base dc=pca,dc=it #ldap_version 3 # The DN to bind with for normal lookups. -#binddn HIDDEN +#binddn test #bindpw *removed* # The DN used for password modifications by root. root@gismo:/etc# debconf-show nslcd * nslcd/ldap-bindpw: (password omitted) nslcd/ldap-sasl-realm: * nslcd/ldap-starttls: false nslcd/ldap-sasl-krb5-ccname: /var/run/nslcd/nslcd.tkt * nslcd/ldap-auth-type: none nslcd/ldap-reqcert: * nslcd/ldap-uris: ldap://ldap.pca.it nslcd/ldap-sasl-secprops: * nslcd/ldap-binddn: test nslcd/ldap-sasl-authcid: nslcd/ldap-sasl-mech: * nslcd/ldap-base: dc=pca,dc=it nslcd/ldap-sasl-authzid: root@gismo:/etc# = It seems the /etc/nslcd.conf handling is in some way broken :-( Thx, bye, Gismo / Luca -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (990, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-2-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8
Bug#586995: KMS not working on ATI Technologies Inc M56P [Radeon Mobility X1600]
On Sun, Apr 22, 2012 at 08:04:36PM -0500, Jonathan Nieder wrote: Teodor MICU wrote: I just tested this (linux image from stable-proposed-updates) and there is no change: the console is fuzzy during boot. Great, thanks for testing. How about the second question --- is the radeon firmware installed? You can find out with dpkg -l firmware-linux Just to be clear, if the bug is only reproducible when the radeon firmware is not installed, it would still be an important bug. That would just help us to know where to look. I think you should check if firmware-linux-nonfree package is installed (because Radeon firmware is located there). -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670134: eigen warning with gcc 4.7
Package: libeigen3-dev Version: 3.0.5-1 Severity: minor tags: fixed-upstream Compiling with gcc4.7 I see a lot of warning: /usr/include/eigen3/Eigen/src/Core/MatrixBase.h:61:34: required from ‘class Eigen::MatrixBaseEigen::SelfCwiseBinaryOpEigen::internal::scalar_sum_opstd::complexdouble , Eigen::Matrixstd::complexdouble, -1, -1, 1, Eigen::Matrixstd::complexdouble, -1, -1, 1 ’ /usr/include/eigen3/Eigen/src/Core/SelfCwiseBinaryOp.h:58:63: required from ‘class Eigen::SelfCwiseBinaryOpEigen::internal::scalar_sum_opstd::complexdouble , Eigen::Matrixstd::complexdouble, -1, -1, 1, Eigen::Matrixstd::complexdouble, -1, -1, 1 ’ /usr/include/eigen3/Eigen/src/Core/CwiseBinaryOp.h:235:77: required from ‘Derived Eigen::MatrixBaseDerived::operator+=(const Eigen::MatrixBaseOtherDerived) [with OtherDerived = Eigen::Matrixstd::complexdouble, -1, -1, 1; Derived = Eigen::Matrixstd::complexdouble, -1, -1, 1]’ ../../src/math/matrix.h:322:18: required from here /usr/include/eigen3/Eigen/src/Core/DenseBase.h:103:10: warning: enumeral mismatch in conditional expression: ‘Eigen::internal::size_at_compile_time-1, -1::anonymous enum’ vs ‘Eigen::internal::traitsEigen::CwiseBinaryOpEigen::internal::scalar_sum_opstd::complexdouble , Eigen::Matrixstd::complexdouble, -1, -1, 1, Eigen::Matrixstd::complexdouble, -1, -1, 1 ::anonymous enum’ [enabled by default] /usr/include/eigen3/Eigen/src/Core/DenseBase.h: In instantiation of ‘class Eigen::DenseBaseEigen::SelfCwiseBinaryOpEigen::internal::scalar_difference_opstd::complexdouble , Eigen::Matrixstd::complexdouble, -1, -1, 1, Eigen::Matrixstd::complexdouble, -1, -1, 1 ’: /usr/include/eigen3/Eigen/src/Core/MatrixBase.h:61:34: required from ‘class Eigen::MatrixBaseEigen::SelfCwiseBinaryOpEigen::internal::scalar_difference_opstd::complexdouble , Eigen::Matrixstd::complexdouble, -1, -1, 1, Eigen::Matrixstd::complexdouble, -1, -1, 1 ’ /usr/include/eigen3/Eigen/src/Core/SelfCwiseBinaryOp.h:58:63: required from ‘class Eigen::SelfCwiseBinaryOpEigen::internal::scalar_difference_opstd::complexdouble , Eigen::Matrixstd::complexdouble, -1, -1, 1, Eigen::Matrixstd::complexdouble, -1, -1, 1 ’ /usr/include/eigen3/Eigen/src/Core/CwiseBinaryOp.h:221:84: required from ‘Derived Eigen::MatrixBaseDerived::operator-=(const Eigen::MatrixBaseOtherDerived) [with OtherDerived = Eigen::Matrixstd::complexdouble, -1, -1, 1; Derived = Eigen::Matrixstd::complexdouble, -1, -1, 1]’ ../../src/math/matrix.h:330:18: required from here /usr/include/eigen3/Eigen/src/Core/DenseBase.h:103:10: warning: enumeral mismatch in conditional expression: ‘Eigen::internal::size_at_compile_time-1, -1::anonymous enum’ vs ‘Eigen::internal::traitsEigen::CwiseBinaryOpEigen::internal::scalar_difference_opstd::complexdouble , Eigen::Matrixstd::complexdouble, -1, -1, 1, Eigen::Matrixstd::complexdouble, -1, -1, 1 ::anonymous enum’ [enabled by default] /usr/include/eigen3/Eigen/src/Core/DenseBase.h: In instantiation of ‘class Eigen::DenseBaseEigen::SelfCwiseBinaryOpEigen::internal::scalar_difference_opstd::complexdouble , Eigen::Matrixstd::complexdouble, -1, -1, 1, Eigen::Matrixstd::complexdouble, -1, -1, 1 ’: /usr/include/eigen3/Eigen/src/Core/MatrixBase.h:61:34: required from ‘class Eigen::MatrixBaseEigen::SelfCwiseBinaryOpEigen::internal::scalar_difference_opstd::complexdouble , Eigen::Matrixstd::complexdouble, -1, -1, 1, Eigen::Matrixstd::complexdouble, -1, -1, 1 ’ /usr/include/eigen3/Eigen/src/Core/SelfCwiseBinaryOp.h:58:63: required from ‘class Eigen::SelfCwiseBinaryOpEigen::internal::scalar_difference_opstd::complexdouble , Eigen::Matrixstd::complexdouble, -1, -1, 1, Eigen::Matrixstd::complexdouble, -1, -1, 1 ’ /usr/include/eigen3/Eigen/src/Core/CwiseBinaryOp.h:221:84: required from ‘Derived Eigen::MatrixBaseDerived::operator-=(const Eigen::MatrixBaseOtherDerived) [with OtherDerived = Eigen::Matrixstd::complexdouble, -1, -1, 1; Derived = Eigen::Matrixstd::complexdouble, -1, -1, 1]’ ../../src/math/matrix.h:330:18: required from here /usr/include/eigen3/Eigen/src/Core/DenseBase.h:103:10: warning: enumeral mismatch in conditional expression: ‘Eigen::internal::size_at_compile_time-1, -1::anonymous enum’ vs ‘Eigen::internal::traitsEigen::CwiseBinaryOpEigen::internal::scalar_difference_opstd::complexdouble , Eigen::Matrixstd::complexdouble, -1, -1, 1, Eigen::Matrixstd::complexdouble, -1, -1, 1 ::anonymous enum’ [enabled by default] mv -f .deps/iprobe.Tpo .deps/iprobe.Po /usr/include/eigen3/Eigen/src/Core/DenseBase.h: In instantiation of ‘class Eigen::DenseBaseEigen::SelfCwiseBinaryOpEigen::internal::scalar_difference_opstd::complexdouble , Eigen::Matrixstd::complexdouble, -1, -1, 1, Eigen::Matrixstd::complexdouble, -1, -1, 1 ’: /usr/include/eigen3/Eigen/src/Core/MatrixBase.h:61:34: required from ‘class Eigen::MatrixBaseEigen::SelfCwiseBinaryOpEigen::internal::scalar_difference_opstd::complexdouble , Eigen::Matrixstd::complexdouble, -1, -1, 1, Eigen::Matrixstd::complexdouble, -1, -1, 1 ’
Bug#543564: lintian check against info/dir(.gz)?
On Tue, 14 Feb 2012 10:42:47 +, Richard Kettlewell r...@greenend.org.uk wrote: Perhaps there should be some systematic approach to preventing packages shipping such toxic files? There is; bug #535566. (Omitting cc: 659...@bugs.debian.org as it's already fixed in cvs.) /* era */ -- If this were a real .signature, it would suck less. Well, maybe not. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670135: paraview: file dialog aborts if current working directory is removed
Package: paraview Version: 3.14.1-1 Severity: normal Tags: upstream Opening the file dialog (Ctrl-o) will abort paraview if the current working directory is removed: $ mkdir /tmp/asd; cd /tmp/asd; paraview # wait for paraview to start $ rmdir /tmp/asd # open file dialog with Ctrl-o in paraview No current working directory [1] + abort paraview Regards, Ansgar -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.0.0-17-generic (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages paraview depends on: ii libavcodec53 5:0.8.1-4 ii libavformat53 5:0.8.1-4 ii libavutil51 5:0.8.1-4 ii libc6 2.13-30 ii libexpat1 2.1.0-1 ii libfreetype6 2.4.9-1 ii libgcc1 1:4.7.0-3 ii libgl1-mesa-glx [libgl1] 7.11.2-1 ii libglu1-mesa [libglu1]7.11.2-1 ii libhdf5-7 [libhdf5-7] 1.8.8-9 ii libice6 2:1.0.8-2 ii libjpeg8 8d-1 ii libmysqlclient16 5.1.61-3 ii libogg0 1.2.2~dfsg-1 ii libopenmpi1.3 1.4.3-2.1 ii libpng12-01.2.49-1 ii libpq59.1.3-2 ii libpython2.7 2.7.3~rc2-2 ii libqt4-help 4:4.7.4-3 ii libqt4-network4:4.7.4-3 ii libqt4-sql4:4.7.4-3 ii libqt4-xml4:4.7.4-3 ii libqt4-xmlpatterns4:4.7.4-3 ii libqtcore44:4.7.4-3 ii libqtgui4 4:4.7.4-3 ii libqtwebkit4 2.2.0-5 ii libsm62:1.2.1-2 ii libsqlite3-0 3.7.11-2 ii libstdc++64.7.0-3 ii libswscale2 5:0.8.1-4 ii libtheora01.1.1+dfsg.1-3 ii libtiff4 3.9.6-3 ii libx11-6 2:1.4.99.901-1 ii libxext6 2:1.3.1-2 ii libxml2 2.7.8.dfsg-8 ii libxt61:1.1.1-2 ii qt4-dev-tools 4:4.7.4-3 ii tcl8.5 [tclsh]8.5.11-1 ii zlib1g1:1.2.6.dfsg-2 Versions of packages paraview recommends: ii mpi-default-bin 1.0.1 ii paraview-doc none ii paraview-python 3.14.1-1 Versions of packages paraview suggests: pn h5utils none pn hdf5-tools none -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670136: /etc/init.d/dns2tcp reload drops current connections
Package: dns2tcp Version: 0.5.2-1 Severity: normal -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, issuing /etc/init.d/dns2tcp reload over a ssh connection that runs over the tunnel stops dns2tcpd, but does not start it again (probably because the script was aborted due to the terminating connection). For restart this might be acceptable, because it an be expected; at least I was hoping that reload is safe in that respect. Not sure if it can be fixed easily, but if it can, that would be nice. Thanks, Joachim - -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (101, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-2-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages dns2tcp depends on: ii libc6 2.13-29 dns2tcp recommends no packages. dns2tcp suggests no packages. - -- no debconf information -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iEYEARECAAYFAk+UencACgkQ9ijrk0dDIGz4yQCgxlz4cp/vK1Mk6JYlCNNxbeNp 7ZoAoMzEKGO4SI+5EV6fzIwl5DLh5mre =cuY5 -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669951: Obsolete conffile /etc/bash_completion.d/systemctl-bash-completion.sh not cleaned up on upgrade
tags 669951 + patch thanks On 23.04.2012 07:59, Raphael Hertzog wrote: On Sun, 22 Apr 2012, Michael Biebl wrote: Maybe should have used 43-1~~ instead of 37-1. This is ugly, but it would have avoided this particular problem and it even would be backport-safe. 43-1~ 43-1~bpo60 so 43-1~ should be enough Thanks for your input, Raphael. Attached is a patch which bumps the min version for the systemctl-bash-completion.sh conffile to 44-2~ to ensure it is moved for users which had 37-1.1 installed and upgraded to 44-1 already. And to be consistent I've also converted the other entries in systemd.maintscript to the now recommended versioning scheme. This is under the assumption, that the next upload will be 44-2. Tollef, any plans for such an upload? We should probably make one soon, and add back the pam workaround. Cheers, Michael -- Why is it that all of the instruments seeking intelligent life in the universe are pointed away from Earth? diff --git a/debian/systemd.maintscript b/debian/systemd.maintscript index 4f51e10..a8a9f95 100644 --- a/debian/systemd.maintscript +++ b/debian/systemd.maintscript @@ -1,5 +1,5 @@ -rm_conffile /etc/lsb-base-logging.sh 20-1 systemd -rm_conffile /etc/tmpfiles.d/legacy.conf 25-2 systemd -rm_conffile /etc/tmpfiles.d/systemd.conf 25-2 systemd -rm_conffile /etc/tmpfiles.d/x11.conf 25-2 systemd -mv_conffile /etc/bash_completion.d/systemctl-bash-completion.sh /etc/bash_completion.d/systemd-bash-completion.sh 37-1 systemd +rm_conffile /etc/lsb-base-logging.sh 25-1~ systemd +rm_conffile /etc/tmpfiles.d/legacy.conf 29-1~ systemd +rm_conffile /etc/tmpfiles.d/systemd.conf 29-1~ systemd +rm_conffile /etc/tmpfiles.d/x11.conf 29-1~ systemd +mv_conffile /etc/bash_completion.d/systemctl-bash-completion.sh /etc/bash_completion.d/systemd-bash-completion.sh 44-2~ systemd signature.asc Description: OpenPGP digital signature
Bug#670090: Please ship the /sys directory
On 22.04.2012 22:41, Josh Triplett wrote: initscripts anymore. In preparation for that, please ship the /sys directory in systemd, to ensure that it exists as a mountpoint. Right now we still depend on initscripts for the /run-migration bits. So earliest we could drop that depencency post-wheezy. That said, I don't see a downside shipping the /sys directory, so we can add them now and it think it makes sense. Thanks for the bug report. Michael -- Why is it that all of the instruments seeking intelligent life in the universe are pointed away from Earth? signature.asc Description: OpenPGP digital signature
Bug#670137: [PATCH] Add support for logging cron job output to syslog
Package: anacron Version: 2.3-18 Severity: wishlist Tags: patch The attached patches make it possible for anacron to log cron job output to syslog. Patch 1 adds a new option -l to log cron job output if and only if the system has no MTA to mail it with. Patch 2 enables -l by default in the Debian package via /etc/init.d/anacron. This will ensure that the Debian package of anacron automatically uses an MTA if available, or syslog if not. I included corresponding updates to debian/changelog for convenience, but if updates occur to the changelog before the application of these patches, they'll probably fail to apply; however, merging should prove trivial if so. See bug 670118 for similar patches to cron. Thanks, Josh Triplett From c02d20411ef7d8b8aa9133e1022e40d213e0b2ae Mon Sep 17 00:00:00 2001 From: Josh Triplett j...@joshtriplett.org Date: Mon, 23 Apr 2012 00:35:40 -0700 Subject: [PATCH 1/2] Add a new -l option to log cron job output to syslog when not mailing that output. --- anacron.8|5 +++- debian/changelog |8 ++ global.h |2 +- main.c | 13 +++--- runjob.c | 74 +++--- 5 files changed, 81 insertions(+), 21 deletions(-) diff --git a/anacron.8 b/anacron.8 index 9070521..ed2ead1 100644 --- a/anacron.8 +++ b/anacron.8 @@ -2,7 +2,7 @@ .SH NAME anacron \- runs commands periodically .SH SYNOPSIS -.B anacron \fR[\fB-s\fR] [\fB-f\fR] [\fB-n\fR] [\fB-d\fR] [\fB-q\fR] +.B anacron \fR[\fB-s\fR] [\fB-f\fR] [\fB-n\fR] [\fB-l\fR] [\fB-d\fR] [\fB-q\fR] [\fB-t anacrontab\fR] [\fB-S spooldir\fR] [\fIjob\fR] ... .br .B anacron [\fB-S spooldir\fR] -u [\fB-t anacrontab\fR] \fR[\fIjob\fR] ... @@ -92,6 +92,9 @@ Run jobs now. Ignore the delay specifications in the .I /etc/anacrontab file. This options implies \fB-s\fR. .TP +.B -l +Log job output to syslog when not mailing that output. +.TP .B -d Don't fork to the background. In this mode, Anacron will output informational messages to standard error, as well as to syslog. The output of jobs diff --git a/debian/changelog b/debian/changelog index 197ed43..2626ef5 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,11 @@ +anacron (2.3-19) UNRELEASED; urgency=low + + [ Josh Triplett ] + * Add a new -l option to log cron job output to syslog when not mailing that +output. + + -- Peter Eisentraut pet...@debian.org Mon, 23 Apr 2012 00:33:44 -0700 + anacron (2.3-18) unstable; urgency=low * Set charset in mails sent by anacron based on system locale, adapted diff --git a/global.h b/global.h index d05966e..ada1fae 100644 --- a/global.h +++ b/global.h @@ -81,7 +81,7 @@ extern char *anacrontab; extern char *spooldir; extern int old_umask; extern sigset_t old_sigmask; -extern int serialize,force,update_only,now,no_daemon,quiet,testing_only; +extern int serialize,force,update_only,now,log_if_no_mail,no_daemon,quiet,testing_only; extern int day_now; extern int year,month,day_of_month; extern int in_background; diff --git a/main.c b/main.c index 936abaa..3741ea1 100644 --- a/main.c +++ b/main.c @@ -45,7 +45,8 @@ char *program_name; char *anacrontab; char *spooldir; int serialize, force, update_only, now, -no_daemon, quiet, testing_only;/* command-line options */ +log_if_no_mail, no_daemon, quiet, +testing_only; /* command-line options */ char **args; /* vector of job command-line arguments */ int nargs; /* number of these */ char *defarg = *; @@ -77,7 +78,7 @@ print_version() static void print_usage() { -printf(Usage: anacron [-s] [-f] [-n] [-d] [-q] [-t anacrontab] [-S spooldir] [job] ...\n +printf(Usage: anacron [-s] [-f] [-n] [-l] [-d] [-q] [-t anacrontab] [-S spooldir] [job] ...\n anacron [-S spooldir] -u [job] ...\n anacron [-V|-h]\n anacron -T [-t anacrontab]\n @@ -85,6 +86,7 @@ print_usage() -s Serialize execution of jobs\n -f Force execution of jobs, even before their time\n -n Run jobs with no delay, implies -s\n + -l Log job output to syslog when not mailing that output.\n -d Don't fork to the background\n -q Suppress stderr messages, only applicable with -d\n -u Update the timestamps without actually running anything\n @@ -104,9 +106,9 @@ parse_opts(int argc, char *argv[]) { int opt; -quiet = no_daemon = serialize = force = update_only = now = 0; +quiet = log_if_no_mail = no_daemon = serialize = force = update_only = now = 0; opterr = 0; -while ((opt = getopt(argc, argv, sfundqt:TS:Vh)) != EOF) +while ((opt = getopt(argc, argv, sfunldqt:TS:Vh)) != EOF) { switch (opt) { @@ -122,6 +124,9 @@ parse_opts(int argc, char *argv[]) case 'n': now = serialize = 1; break; + case 'l': + log_if_no_mail = 1; + break; case 'd': no_daemon = 1; break;
Bug#666240: crashes after closing any Compose window
reassign 666240 gtk2-engines-oxygen thanks Hi Renaud, On Sat, Apr 14, 2012 at 10:58:07PM +0200, Renaud Lacour wrote: Le Wed, 11 Apr 2012 08:55:33 +0200, Ricardo Mones mo...@debian.org a écrit : tags 666240 moreinfo unreproducible thanks Hi Renaud, On Thu, Mar 29, 2012 at 11:50:59PM +0200, Renaud Lacour wrote: Package: claws-mail Version: 3.8.0-1 Severity: important Tags: upstream Using awesome window manager. Me too, never seen that ;) The program 'claws-mail' received an X Window System error. This probably reflects a bug in the program. The error was 'BadWindow (invalid Window parameter)'. (Details: serial 56116 error_code 3 request_code 151 minor_code 3) Please install claws-mail-dbg package and try to get a backtrace of the crash. See http://www.claws-mail.org/faq/index.php/Debugging_Claws for some help on debugging if you need it. regards, I do not manage to get the backtrace. In fact, the crash seems to come from oxygen-gtk GTK2 engine, not from the wm. Well, the backtrace can still be useful to the oxygen engine maintainer, even if the problem is not in Claws Mail itself. Anyway, reassigning the bug to the right package. thanks for your feedback, -- Ricardo Mones ~ Physics is like sex: sure, it may give some practical results, but that's not why we do it.Richard Feynman signature.asc Description: Digital signature
Bug#670138: libical FTBFS on ARM
Package: libical Version: 0.48-1 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu precise Tags: patch We are now carrying this in Ubuntu. The fix is committed upstream; you may want to carry this until an upstream update. debian/patches/fix_arm_ftbfs.patch: From: Robie Basak robie.ba...@canonical.com Subject: Fix libicalss parser for non-Intel architectures The test suite fails on ARM and PowerPC because the libicalss lexer performs unput(EOF) which is not permitted. On these architectures, this gets interpreted as unput(255), creating an extra token which then causes the parser to return a syntax error. Instead, the lexer should just ignore EOF and not attempt to unput it. The input stream will remain at EOF and the lexer will return an EOF as the next token as needed. Forwarded: https://sourceforge.net/tracker/?func=detailaid=3517199group_id=16077atid=316077 Bug-Ubuntu: https://bugs.launchpad.net/bugs/979846 Last-Update: 2012-04-12 --- a/src/libicalss/icalsslexer.c +++ b/src/libicalss/icalsslexer.c @@ -936,7 +936,9 @@ YY_RULE_SETUP { int c = input(); - unput(c); + if (c != EOF) { + unput(c); + } if(c!='\''){ sslval.v_string= icalmemory_tmp_copy(sstext); return STRING; --- a/src/libicalss/icalsslexer.l +++ b/src/libicalss/icalsslexer.l @@ -111,7 +111,9 @@ \'[\@\*A-Za-z0-9\-\.\:\ ]+\' { int c = input(); - unput(c); + if (c != EOF) { + unput(c); + } if(c!='\''){ sslval.v_string= icalmemory_tmp_copy(yytext); return STRING; signature.asc Description: Digital signature
Bug#670085: insserv: update-rc.d is a dangling symlink
Hi Roger, On 22.04.2012 23:03, Eddy Petrișor wrote: On 22.04.2012 22:58, Eddy Petrișor wrote: Subject: insserv: update-rc.d is a dangling symlink Package: insserv Version: 1.14.0-3 I forgot to add this info: heidi:/home/eddy# ls -l /usr/sbin/update-rc* lrwxrwxrwx 1 root root 29 Sep 22 2009 /usr/sbin/update-rc.d - /usr/sbin/update-rc.d-insserv -rwxr-xr-x 1 root root 16894 Mar 13 09:14 /usr/sbin/update-rc.d.distrib heidi:/home/eddy# dpkg -S /usr/sbin/update-rc.d.distrib diversion by insserv from: /usr/sbin/update-rc.d diversion by insserv to: /usr/sbin/update-rc.d.distrib After trying to reinstall sysv-rc and insserv a few times to no avail, I looked into sysv-rc's postinst and suspected the problem was that the divert will be removed if only /var/run/sysv-rc.upgrade existed, so I manually ran these commands insserv (1.14.0-3) stopped shipping update-rc.d-insserv, since it was almost identical to the update-rc.d shipped by sysv-rc for quite some time now and the update-rc.d diversion should have been removed some time ago. Somehow Eddy's system still contained a diversion, could sysv-rc.postinst perhaps remove this diversion unconditionally? Or should insserv provide a postinst to do only that in your opinion? Thanks, Kel -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670139: FTBFS with parallel builds
Package: libical Version: 0.48-1 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu precise Tags: patch We are now carrying this in Ubuntu. The fix is committed upstream; you may want to carry this until an upstream update. debian/patches/fix_ftbfs_dependencies.patch: Subject: Fix dependency declarations to fix concurrent builds Author: Robie Basak robie.ba...@canonical.com Bug-Ubuntu: https://bugs.launchpad.net/bugs/978862 Forwarded: https://sourceforge.net/tracker/?func=detailaid=3516878group_id=16077atid=316077 Last-Update: 2012-04-11 --- a/src/libicalvcal/CMakeLists.txt +++ b/src/libicalvcal/CMakeLists.txt @@ -30,6 +30,9 @@ add_library(icalvcal ${LIBRARY_TYPE} ${icalvcal_LIB_SRCS}) add_library(icalvcal-static STATIC ${icalvcal_LIB_SRCS}) +add_dependencies(icalvcal ical-header) +add_dependencies(icalvcal-static ical-header) + target_link_libraries(icalvcal ical) if(MSVC) --- a/src/libicalss/CMakeLists.txt +++ b/src/libicalss/CMakeLists.txt @@ -23,9 +23,7 @@ -DICAL_FILE_H_FILE:FILEPATH=${CMAKE_BINARY_DIR}/src/libicalss/icalss.h -P ${CMAKE_CURRENT_SOURCE_DIR}/icalss_file.cmake DEPENDS - ${CMAKE_BINARY_DIR}/src/libical/icalderivedproperty.h - ${CMAKE_BINARY_DIR}/src/libical/icalderivedparameter.h - ${CMAKE_BINARY_DIR}/src/libical/icalderivedvalue.h + ical-header ) add_custom_target(icalss-header DEPENDS @@ -73,6 +71,7 @@ add_library(icalss-static STATIC ${icalss_LIB_SRCS}) add_dependencies(icalss icalss-header) +add_dependencies(icalss-static icalss-header) target_link_libraries(icalss ical) signature.asc Description: Digital signature
Bug#670140: Heap corruption bug
Package: libical Version: 0.48-1 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu precise Tags: patch There is some upstream discussion which acknowledges the problem but I don't think they have committed a fix yet. This was causing crashes on my system, so I have applied this workaround for Ubuntu. You may wish to do the same. debian/patches/fix_timezone_crash.patch: Description: work around heap corruption bug Author: Robie Basak robie.ba...@canonical.com Last-Update: 2012-04-04 Forwarded: http://sourceforge.net/mailarchive/message.php?msg_id=29084189 Bug-Ubuntu: https://bugs.launchpad.net/bugs/956843 Bug: https://sourceforge.net/tracker/?func=detailaid=3514871group_id=16077atid=116077 Index: libical-0.48/src/libical/icaltimezone.c === --- libical-0.48.orig/src/libical/icaltimezone.c2011-12-13 17:08:18.0 + +++ libical-0.48/src/libical/icaltimezone.c 2012-04-01 12:15:00.836064296 + @@ -1656,7 +1656,7 @@ icalerror_assert (builtin_timezones == NULL, Parsing zones.tab file multiple times); -builtin_timezones = icalarray_new (sizeof (icaltimezone), 32); +builtin_timezones = icalarray_new (sizeof (icaltimezone), 1024); #ifndef USE_BUILTIN_TZDATA filename_len = strlen ((char *) icaltzutil_get_zone_directory()) + strlen (ZONES_TAB_SYSTEM_FILENAME) signature.asc Description: Digital signature