Bug#412502: libcgicc1-dev: fails to compile most programs because constructors are implemented in #pragma interface headers

2007-02-26 Thread Helmut Grohne
Package: libcgicc1-dev Version: 3.2.3-3 Severity: grave Justification: renders package unusable Tag: patch Almost all headers contain #pragma interface and at the same time implement constructors like inline CgiInput() {} which just doesn't fit together. Trying to compile things with g++ will

Bug#382482: kde: Alt+Tab stops working after a while.

2007-02-26 Thread Helmut Grohne
to be started or other things. You should also create a new user and verify if you can reproduce this behaviour with another user. Helmut Grohne signature.asc Description: Digital signature

Bug#352139: getopt optional arg does not work as documented

2007-02-27 Thread Helmut Grohne
tag 352139 wontfix thanks However, this does not seem to be the case. Actually it works quite similar. When run: [EMAIL PROTECTED]:/tmp$ a.out -a a arg is: (null) Correct behaviour. $ ./a.out -afoo a arg is: foo [EMAIL PROTECTED]:/tmp$ a.out -a hello a arg is: (null) Now.

Bug#160683: date: long timezone offset sighlently changed

2007-02-27 Thread Helmut Grohne
tag 160683 moreinfo thanks On Thu, Sep 12, 2002 at 12:10:48PM -0700, Blars Blarson wrote: Gnu date apperently siglently limits the timezone offset to 23, so the above command will SOMETIMES show todays date instead with no error message. (The SOMETIMES makes this even harder to debug.) This

Bug#286825: fixed in experimental

2007-03-06 Thread Helmut Grohne
tags 286825 = fixed-in-experimental thanks This bug seems to be fixed in experimental. Helmut Grohne signature.asc Description: Digital signature

Bug#310445: More information needed

2007-03-06 Thread Helmut Grohne
tag 310445 moreinfo severity 310445 normal thanks There are new versions of glibc available. Could you perhaps recheck whether this bug is reproducible? Furthermore the source for that binary would be helpful if available. Helmut Grohne signature.asc Description: Digital signature

Bug#336843: adduser: removes user from group if /etc/group file ends with :

2007-03-06 Thread Helmut Grohne
does here is within the specs. The function could also segfault at that point. This could maybe reported to the upstream but they'll probably think the same way. Helmut Grohne signature.asc Description: Digital signature

Bug#331405: Accidential activation of nscd is too simple

2007-03-06 Thread Helmut Grohne
their behaviour since there are only 5 packages in apt-cache rdepends nscd of which at least one is a conflict. So maybe libpam-ldap could suggest nscd instead of recommending it. Otherwise this bug should be tagged wontfix. Helmut Grohne signature.asc Description: Digital signature

Bug#352139: getopt optional arg does not work as documented

2007-03-06 Thread Helmut Grohne
be adapted. Thanks to Aurelien Jarno for pointing this out. Helmut Grohne signature.asc Description: Digital signature

Bug#416211: sunbird: FTBFS on amd64

2007-03-25 Thread Helmut Grohne
make[5]: Leaving directory `/tmp/buildd/sunbird-0.2.99+0.3alpha1/build-dir/mozilla/xpcom/build' Helmut Grohne -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Shell: /bin/sh linked to /bin/bash Kernel

Bug#416211: sunbird: FTBFS on amd64

2007-03-25 Thread Helmut Grohne
tag 416211 patch thanks c++ [...] Looks like it should have been build with g++-3.4. Adding export CC=gcc-3.4 export CXX=g++-3.4 to debian/rules seems solve the problem. Helmut Grohne signature.asc Description: Digital signature

Bug#416618: cpufreqd: I'd like to see acpi lid support

2007-03-29 Thread Helmut Grohne
to cpufreqd_acpi_lid.c and modify some names. Maybe there is a better way. Please tell me if you'd like to have a patch for that (maybe tag -1 patch?). Helmut Grohne -- System Information: Debian Release: 4.0 APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Shell

Bug#415383: pcmcia-cs: firmwares not found by udev

2007-03-18 Thread Helmut Grohne
. [an ugly hack] This bug seems to be fixed in recent SuSE packages. So may be a fix could be inspired there. Please contact me if you need further information. Helmut Grohne -- System Information: Debian Release: 4.0 APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686

Bug#385911: more information

2007-01-28 Thread Helmut Grohne
Package: xorg Version: 7.1.0-11 My Xorg.log of a similar segfault is attached and maybe it helps. An amd64 nvidia (proprietary) X segfaultet while running fluxbox, xterm and a wine with a broken google earth. Interaction with google earth was probably the cause of the segfault as it created

Bug#421783: xorg: human interface freeze with nv driver while running glx applications

2007-05-01 Thread Helmut Grohne
it might already have disappeared. A short answer of other who can or cannot reproduce this bug would be helpful, so if you happen to have a similar setup, please just try! Helmut Grohne -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (1

Bug#427786: qemubuilder: mke2fs not in $PATH, invalid pointer and other things

2007-06-06 Thread Helmut Grohne
Package: qemubuilder Version: 0.30 Severity: important Hi. I tried to use qemubuilder and somewhat failed. The only portion of documentation I could find was the manpage which does not mention qemubuilder --create should be run as root, so I tried as a normal user with a ~/.pbuilderrc copied from

Bug#431301: denyhosts: logfiles are not readable by group adm

2007-07-01 Thread Helmut Grohne
Package: denyhosts Version: 2.6-1 Severity: wishlist The log files created by denyhosts are - unlike most other logfiles - not owned by the group adm, but instead by the group root. The policy does not explicitly state that this should be the case. However most other daemons follow this line. As

Bug#432208: jackd: jack_impulse_grabber -d 1 -f gnuplot # instantly segfaults

2007-07-08 Thread Helmut Grohne
Package: jackd Version: 0.103.0-6 Severity: normal $ jackd -d alsa jackd 0.103.0 Copyright 2001-2005 Paul Davis and others. jackd comes with ABSOLUTELY NO WARRANTY This is free software, and you are welcome to redistribute it under certain conditions; see the file COPYING for details JACK

Bug#432516: xbacklight: randomizes brightnesses on i810

2007-07-10 Thread Helmut Grohne
Package: xbacklight Version: 1.1-1 Severity: important First of all: It does something! Great work! Unfortunately it's not really ready to use on my system yet. Especially I don't really know which package this bugreport really applies to, so please forward it to whatever package you think to be

Bug#430158: uswsusp and cryptoswap

2007-06-22 Thread Helmut Grohne
Package: cryptsetup Version: 2:1.0.4+svn29-1 Severity: wishlist (a similar mail already went to [EMAIL PROTECTED]) I tried to use luks to encrypt swapspace for uswsusp, because this will also encrypt normal swapping activity and not only hibernation. After reading and experimenting with

Bug#424517: xserver-xephyr: xephyr now segfaults when closing an xterm

2007-05-16 Thread Helmut Grohne
Package: xserver-xephyr Version: 2:1.3.0.0.dfsg-4 Severity: normal First of all thanks for fixing #405928! I however managed to find a new bug. (Sorry) Steps to reproduce: Start Xephyr display :n, start xterm on :n, terminating the xterm should result in the segfault below.

Bug#425006: renpy: dse game results in ScriptError

2007-05-18 Thread Helmut Grohne
Package: renpy Version: 6.2.0.ds1-1 Severity: normal I tried to use renpy and the demo works well, however the game dse doesn't seem to work. Pressing the start game button results in a ScriptError: $ renpy --game=/usr/share/games/renpy/dse File /usr/share/games/renpy/renpy/bootstrap.py, line

Bug#424516: xserver-xorg: xserver segfault when closing keyjnote using nv driver

2007-05-18 Thread Helmut Grohne
Might be related to #420860 (but the whole stack is not exactely the same). To get a nice backtrace, you should install xserver-xorg-core-dbg and attach a gdb through ssh before the crash: Got a better one: Attaching to program: /usr/bin/Xorg, process 11216 ... Program received signal

Bug#425006: renpy: dse game results in ScriptError

2007-05-18 Thread Helmut Grohne
Wow. Fastest response to a bugreport I've received! I don't think gse is supposed to be a game, but an engine. The only game distributed with the engine for the moment is the demo. I guess the doc should state more clearly what is a game and what is not. Oops. I misinterpreted the hint on the

Bug#419671: spelling mistake in /usr/share/doc/alex/html/introduction.html

2007-04-17 Thread Helmut Grohne
Package: alex Version: 2.1.0~rc1-1 Severity: minor Tag: patch The html file contains the line: the action functions to be passed the appriate where appropriate is probably meant instead of appriate. -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500,

Bug#420171: apt-listbugs: NameError: global name 'R_OK' is not defined

2007-04-20 Thread Helmut Grohne
Package: apt-listbugs Version: 0.0.75 Severity: important Tags: patch Traceback (most recent call last): File /usr/bin/apt-listchanges, line 226, in ? main() File /usr/bin/apt-listchanges, line 58, in main if os.access('/dev/tty', R_OK): NameError: global name 'R_OK' is not defined

Bug#288554: mozilla-firefox: Firefox sometimes hangs within futex() calls for a long time.

2005-07-18 Thread Helmut Grohne
This bug seems to be fixed in 1.0.5-1. I cannot reproduce the described behaviour anymore. The bug should therefore be marked as closed. Helmut signature.asc Description: Digital signature

Bug#329413: mozilla-firefox-webdeveloper: postinst is broken (update-mozilla-firefox-chrome: command not found)

2005-09-21 Thread Helmut Grohne
Package: mozilla-firefox-webdeveloper Version: 0.9.3-4 Severity: grave Justification: renders package unusable During aptitude upgrade: Setting up mozilla-firefox-webdeveloper (0.9.3-4) ... /var/lib/dpkg/info/mozilla-firefox-webdeveloper.postinst: line 8: update-mozilla-firefox-chrome: command

Bug#323126: slate: ftbfs [sparc] Bus error

2005-08-16 Thread Helmut Grohne
forwarded 323126 [EMAIL PROTECTED] thanks cd /build/buildd/slate-0.3.4.3 echo repl reset. Image saveNamed: 'slate.image'. quit. | ./vm `debian/endianess`.image /bin/sh: line 1: 15728 Doneecho repl reset. Image saveNamed: 'slate.image'. quit. 15729 Bus error

Bug#316160: libmailtools-perl: qmail is listed twice in man 3pm Mail::Mailer

2005-06-28 Thread Helmut Grohne
Package: libmailtools-perl Version: 1.62-1 Severity: normal man 3pm Mail::Mailer lists qmail twice in the description. Suggested fix: Remove the second one as it is exactly the same as above. As we are already fixing bugs, please use built in instead of build in (environment section). Thanks to

Bug#316724: libao: oss plugin assumes malloc not to return NULL

2005-07-03 Thread Helmut Grohne
Package: libao Severity: normal The function _open_default_oss_device is a whole mess. It has some unneeded maybe historical variables and doesn't handle strdup to return NULL. A suggested fix is attached. -- System Information: Debian Release: testing/unstable APT prefers unstable APT

Bug#316747: apt-key: the update command is broken and not mentioned by manpage

2005-07-03 Thread Helmut Grohne
Package: apt Version: 0.6.38 Severity: normal The manpage of apt-key should mention the update command. Using apt-key help we can see it exists. Another problem might be that apt-key update currently does not work. # apt-key help Usage: apt-key [command] [arguments] Manage apt's list of trusted

Bug#484522: djview4: the searchbox disappears once it is closed after searching

2008-06-04 Thread Helmut Grohne
Package: djview4 Version: 4.3-3 Severity: normal Steps to reproduce: 1) Start djview4 on an arbitrary .djvu file. 2) Press ctrl-f to open the search box. 3) Search for an arbitrary string not matching the document. 4) Close the searchbox (for instance by pressing ESC). 5) Try to open the search

Bug#481192: openssh-server: openssl update with blacklists possibly breaks the system when the admin didn't read dsa mail

2008-05-14 Thread Helmut Grohne
Package: openssh-server Version: 1:4.7p1-9 Severity: important The recent update has two big problems: 1) Yes it tells the admin that it will replace the host key, but does not allow him to stop and do that step later. 2) It disables weak keys without further notice. This was both documented

Bug#481192: openssh-server: openssl update with blacklists possibly breaks the system when the admin didn't read dsa mail

2008-05-14 Thread Helmut Grohne
# doesn't break the system in general, and even when it does is totally # justifiable; see below We seem to disagree about breaking a system is justifiable. (I'd say: After all do no harm.) I was aware of this problem but considered it absolutely acceptable given the severity of the bug. I

Bug#481721: openssh-server: sshd does not include a remote address when logging usage of blacklisted keys

2008-05-18 Thread Helmut Grohne
Package: openssh-server Version: 1:4.7p1-10 Severity: wishlist Hi, sshd[0]: Public key 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 blacklisted (see ssh-vulnkey(1)) That's a line from sshd when one tries to use a blacklisted key. In order to reduce the load on a server it would be great

Bug#478009: details

2008-06-07 Thread Helmut Grohne
subscribe 478009 ! severity 478009 important thanks Hi, I also observe this bug (on amd64). Here are the details: (Comments from me start with a #). # command line copied from mozilla-plugin-gnash invocation $ gnash - -j 480 -k 385 -u http://s.ytimg.com/yt/swf/watch-vfl42309.swf -U

Bug#490834: gnuplot: plot window moves over the screen on graph updates (terminal=wxt)

2008-07-14 Thread Helmut Grohne
Package: gnuplot Version: 4.2.2-1.1 Severity: normal How to reproduce: * Start a terminal=wxt gnuplot. * plot a graph or better splot it, for example splot 0. * Then perform actions on the graph like zooming for plot or rotating for splot. Observation: On updating the graph the plot window

Bug#478280: /usr/bin/lppasswd: lppasswd is installed setuid 0

2008-04-28 Thread Helmut Grohne
Package: cupsys-client Version: 1.3.7-5 Severity: normal File: /usr/bin/lppasswd $ man lppasswd ... SECURITY ISSUES The lppasswd command is installed setuid to root. While every attempt has been made to make it secure against exploits that could grant super-user privileges

Bug#475709: gnash: Can't play sound.

2008-05-28 Thread Helmut Grohne
It seems that gnash can't play any sound for me. No version of gnash was ever able to play sound. The sound is enabled if I right click with my mouse. I also had this problem. It was gone after installing gstreamer0.10-plugins-good. I therefore strongly suggest that gnash depends on this

Bug#486865: munin-node: upgrade broke exim_mailqueue plugin

2008-06-18 Thread Helmut Grohne
Package: munin-node Version: 1.2.6-1 Severity: important The exim_mailqueue plugin finds out where the $SPOOLDIR is just to forget that value in line 39. It then runs find on which evaluates to the current working directory being /. This causes high io load and wrong numbers. Helmut -- To

Bug#486868: munin-node: upgrade also broke exim_mailstats

2008-06-18 Thread Helmut Grohne
Package: munin-node Version: 1.2.6-1 Severity: normal Tags: patch You forgot a return tail_close($LOGFILE); in parseEximfile. Upstream svn is a good start for this. Helmut -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#486887: munin-node: ntp_offset does not work with /bin/dash

2008-06-18 Thread Helmut Grohne
Package: munin-node Version: 1.2.6-1 Severity: important $ /usr/share/munin/plugins/ntp_offset /bin/sh: Illegal option -w $ Helmut -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#480017: filelight: segfaults on toggling Show small files

2008-05-07 Thread Helmut Grohne
Package: filelight Version: 1.0-2 Severity: important In order to reproduce start filelight on a non-/ directory (for me /home worked), click Settings, Configure Filelight ..., Appearance, Show small files. Toggling the last setting eventually results in a segfault. Helmut -- System

Bug#418068: scons: manpage uses incorrect example env = Environment(ENV = os.environ['PATH'])

2007-04-06 Thread Helmut Grohne
Package: scons Version: 0.96.93-2 Severity: minor Tag: patch The manpage of scons says: Or you may explicitly propagate the invoking user's complete external environment: import os env = Environment(ENV = os.environ['PATH']) This is wrong as

Bug#416618: cpufreqd: I'd like to see acpi lid support

2007-04-06 Thread Helmut Grohne
as well. Maybe forwarding to upstream might be a good idea too. By the way, you will need to add some lines to cpufreqd_acpi.c too. Good point. I had to adapt it a bit. Helmut Grohne diff -ruN cpufreqd-2.2.1/configure cpufreqd-2.2.1.1/configure --- cpufreqd-2.2.1/configure 2006-11-21 22:25

Bug#362586: foomatic-db-engine: foomatic-combo-xml -O -l /usr/share/foomatic aborts

2006-04-14 Thread Helmut Grohne
Package: foomatic-db-engine Version: 3.0.2-20060318-1 Severity: important The printconf package is unusable because foomatic-combo-xml does not work. # foomatic-combo-xml -O -l /usr/share/foomatic /dev/null *** glibc detected *** double free or corruption (!prev): 0x006474a0 ***Aborted

Bug#288554: mozilla-firefox: Firefox sometimes hangs within futex() calls for a long time.

2005-01-22 Thread Helmut Grohne
be achieved by putting sleep() calls into the source. As I said it hangs within futex() this is probably a locking problem. Greetings Helmut Grohne signature.asc Description: Digital signature

Bug#355918: siege --h segfaults

2006-03-08 Thread Helmut Grohne
Package: siege Version: 2.61-3 Severity: normal After a typingmistake I discovered that siege --h segfaults. This seems to be true for any invalid option. gdb shows that it segfaults in strncmp. Not having looked at the source I think that siege iterates over a list of options and compares to

Bug#360950: robotour segfaults running any robot

2006-04-05 Thread Helmut Grohne
Package: robotour Version: 3.2.1-2 Severity: important Selecting any robot (especially from /usr/share/doc/robotour/examples) and running them results in a segfault. (gdb) bt #0 0x2b1bc670d4b0 in strlen () from /lib/libc.so.6 #1 0x2b1bc66df22b in vfprintf () from /lib/libc.so.6 #2

Bug#372285: manpages-dev: makecontext manpage should mention maximum size of additional parameters

2006-06-09 Thread Helmut Grohne
Package: manpages-dev Version: 2.33-2 Severity: normal POSIX specifies that parameters passed to makecontext after argc must be of type int. As the glibc implementation also assumes this it should be mentioned in man 3 makecontext. See

Bug#373779: libc6: assertion failure in gconv_db.c with smbclient

2006-06-15 Thread Helmut Grohne
Package: libc6 Version: 2.3.999.2-4 Severity: normal # smbclient smbclient: gconv_db.c:232: __gconv_release_step: Assertion `step-__end_fct == ((void *)0)' failed. Aborted # This does not happen with 2.3.6-9. The bug seems to occur while loading shared libraries as different options to

Bug#377329: python2.3 -c 'int(buffer(__import__(array).array(c)))' segfaults

2006-07-08 Thread Helmut Grohne
Package: python2.3 Version: 2.3.5-14 Severity: normal python2.3 -c 'int(buffer(__import__(array).array(c)))' segfaults This was discussed on the python mailing list but should be fixed anyway as python should never segfault. This bug is reproducible on i386 stable and with python2.4, too. See

Bug#377471: tremulous: please add amd64 to Architecture: in debian/rules

2006-07-09 Thread Helmut Grohne
Package: tremulous Version: 1.1.0-1 Severity: wishlist I was able to successfully build tremulous using pdebuild on unstable/amd64. So please add that architecture in debian/rules. Also could you provide a source package for tremulous-data? -- System Information: Debian Release: testing/unstable

Bug#371165: freecraft: segfaults on amd64 when trying to play

2006-06-07 Thread Helmut Grohne
Package: freecraft Version: 1:1.18-2.2 Severity: normal Clicking on Singleplayer results in a segmentation fault. This is a full backtrace from gdb: #0 0x0042075d in strcasestr () No symbol table info available. #1 0x004ba390 in strcasestr () No symbol table info available. #2

Bug#294459: /usr/share/doc/darcs/manual/index.html is empty

2006-08-16 Thread Helmut Grohne
Hi, I think something more is broken. $ ls -la /usr/share/doc/darcs/manual/index.html -rw-r--r-- 1 root root 0 2006-07-03 11:05 /usr/share/doc/darcs/manual/index.html $ dpkg -l darcs ... ii darcs 1.0.8-1an advanced revision control system $ uname -a Linux alf 2.6.17 #1 SMP Tue

Bug#407181: closed by Lucas Nussbaum [EMAIL PROTECTED] (silky has been removed from Debian, closing #407181)

2008-04-14 Thread Helmut Grohne
For more information about this package's removal, read http://bugs.debian.org/474073 . That bug might give the reasons why this package was removed, and suggestions of possible replacements. This bug log does not contain possible replacements. The silc package contains a usable replacement

Bug#476177: irssi-plugin-silc: prints /actions twice like * foo did bar\n * foo did bar\n

2008-04-14 Thread Helmut Grohne
Package: irssi-plugin-silc Version: 1.1.4-1 Severity: normal When someone (or oneself) does /me did bar it appears like * foo did bar * foo did bar This behaviour is wrong. Helmut -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (500,

Bug#438438: please really support python2.5

2008-03-06 Thread Helmut Grohne
found 438438 0.14.0-2 tags 438438 +patch thanks I believe that this bug is not fixed in the latest version of pylint. See for example: E:5:some_function: Undefined variable 'all' The problem is easy to work around though. The file /usr/bin/pylint looks like this: $ cat /usr/bin/pylint

Bug#438438: please really support python2.5

2008-03-30 Thread Helmut Grohne
Please launch python2.5 /usr/bin/pylint if you want to check code with a version of python different from the default one. That is a good suggestion. Feel free to mark this bug as wontfix. I don't want to use python2.5 in the shebang stanza by default, as I feel it is useful to be able to

Bug#447526: this should be a rc bug

2008-03-31 Thread Helmut Grohne
found 447526 2:1.4.1~git20080131-2 thanks The problem that Xorg uses a lot more memory than listed in xrestop and does not free this memory on closing persists. This behaviour seriously degrades usage as it is now required to regularly restart Xorg. I therefore ask to increase severity to get

Bug#447526: this should be a rc bug

2008-03-31 Thread Helmut Grohne
Try Xserver 1.4.99.901 from deb http://pkg-xorg.alioth.debian.org/7.4/ ./ May I ask for a signed repository? Helmut -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#475675: within struct foo *(bar[baz]); splint thinks that bar is of type struct foo* whereas it is a **

2008-04-12 Thread Helmut Grohne
Package: splint Version: 3.1.2.dfsg-6 Severity: important Declaring struct foo *(bar[baz]); makes splint spit out tons of warnings when accessing bar[qux]-quux, because it thinks foo is of type struct foo * whereas it really is struct foo **. This behaviour is wrong and makes checking some

Bug#475733: acon: local root exploit

2008-04-12 Thread Helmut Grohne
Package: acon Version: 1.0.5-5 Severity: critical Tags: security Justification: root security hole The package has a setuid binary acon. The binary never drops setuid. The source code contains the following lines: (acon.c) char tmp[300]; ... if((env=getenv(HOME)))

Bug#475736: tss: local root exploit

2008-04-12 Thread Helmut Grohne
Package: tss Version: 0.8.1-3 Severity: critical Tags: security Justification: root security hole tss has a setuid binary. The source code is src/main.c: sprintf(glob_string, %s/.tss/*, getenv(HOME)); (before dropping setuid, needless to say) Helmut -- System Information: Debian Release:

Bug#475733: acon: local root exploit

2008-04-12 Thread Helmut Grohne
From the source code: 35 int main(int argc,char **argv) 36 { 37 int i,tty,useunicode=0; 38 char *fontf=0,*translationf=0,*keymapf=0; 39 40 get_ids(); 41 set_user_id(); ... 301 int user_id; 302 int

Bug#475736: tss: local root exploit

2008-04-12 Thread Helmut Grohne
Actually I am pretty sure this one is not exploitable. For sure you are able to corrupt memory here and overwriting EIP but this will likely segfault in glob() one line after the line you quoted. Thus removing the security tag and setting the severity to minor. OK. However your bug

Bug#462651: please fix or respond

2008-04-12 Thread Helmut Grohne
thank you for your patch; I will upload a fixed package tomorrow. Sorry for the long delay; i've been on work and was not able to access my gpg key nor did I find time to answer. NMU uploaded to delayed/4 by Sune Vuorela. Helmut -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject

Bug#475733: acon: local root exploit

2008-04-12 Thread Helmut Grohne
So why do you think it does not drop setuid root, the code does? $ cat debian/patches/05_setuid.diff Index: acon-1.0.5/acon.c Commented a statement that returns the user id to non-root. That made some control keys to not work. ===

Bug#475733: closed by ???????? ???????????????? (Ahmed El-Mahmoudy) [EMAIL PROTECTED] (Bug#475733: fixed in acon 1.0.5-6)

2008-04-13 Thread Helmut Grohne
found 475733 1.0.5-6 thanks * Dropped 05_setuid.diff as it can cause a root exploit. (Closes: #475733) This is not enough, because it still has seved set userid and is exploitable: The package has a setuid binary acon. The binary never drops setuid. The source code contains the following

Bug#475736: severity of 475736 is serious

2008-04-13 Thread Helmut Grohne
# Automatically generated email from bts, devscripts version 2.10.25 # should be fixed yesterday severity 475736 serious -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#430158: [Pkg-cryptsetup-devel] Bug#430158: Bug#430158: closed by Jonas Meurer [EMAIL PROTECTED] (closing because of inactivity)

2008-02-21 Thread Helmut Grohne
Hi Jonas, No. Testing takes time and I want to do that in one chunk. Furthermore I need to rewrite the patch first. The patch doesn't permit an infinite number of retries by setting tries=0. I'll tell you when I'm finished. I verified that the attached patch works as expected. I object

Bug#469848: python-sympy: breaks pydoc2.5 -k

2008-03-07 Thread Helmut Grohne
Package: python-sympy Version: 0.5.12-1 Severity: important $ pydoc2.5 -k foobarqux Traceback (most recent call last): File /usr/bin/pydoc2.5, line 5, in module pydoc.cli() File /usr/lib/python2.5/pydoc.py, line 2195, in cli apropos(val) File /usr/lib/python2.5/pydoc.py, line 1890,

Bug#470492: crm114: strange segfault with improper usage

2008-03-11 Thread Helmut Grohne
Package: crm114 Version: 20060704a-5 Severity: normal Hi, I've got a strange segfault from crm while experimenting with it. It is extremely hard to reproduce and happens deterministically under conditions I do not understand. I've attached a script trigger.sh that reproduces the bug on my stable

Bug#472409: mkinitramfs: please mention that -d config_dir option requires an absolute path

2008-03-24 Thread Helmut Grohne
Package: initramfs-tools Version: 0.91e Severity: normal Invoking mkinitramfs using -d conf where conf is a relative path results in cpio bailing out: cpoio: ./conf/initramfs.conf: Cannot stat: No such file or directory Providing an absolute path makes this go away. I therefore suggest adding a

Bug#472579: udev: fails to start on rootfs because bind and move mounts don't work

2008-03-24 Thread Helmut Grohne
Package: udev Version: 0.114-2 Severity: minor When running udev on rootfs (i.e. from initramfs) it fails to start because all --bind and --move mounts from /etc/init.d/udev will fail (the kernel gives -EINVAL). Therefore the script stops (set -x) before udev is started resulting in more severe

Bug#472579: udev: fails to start on rootfs because bind and move mounts don't work

2008-03-25 Thread Helmut Grohne
Hi Maximilian, reassign 472579 initramfs-tools severity 472579 grave tag 472579 patch tag 472579 pending stop I think that you are horribly wrong, because I have at no point used initramfs-tools (nor did I mention it). Yes, I am using a (slightly larger) initramfs to boot the system, but

Bug#472579: udev: fails to start on rootfs because bind and move mounts don't work

2008-03-25 Thread Helmut Grohne
Hi Marco, When running udev on rootfs (i.e. from initramfs) it fails to start because all --bind and --move mounts from /etc/init.d/udev will fail (the kernel gives -EINVAL). Therefore the script stops (set -x) before udev is started resulting in more severe problems. This problem can

Bug#472579: udev: fails to start on rootfs because bind and move mounts don't work

2008-03-25 Thread Helmut Grohne
Hi Marco, If you are building your own initramfs from scratch then you cannot assume that the debian init script will work out of the box. 1) Booting a system with a disk, but without an initramfs works, so why should a system with an initramfs, but without a disk not work? 2) As I did not

Bug#472579: udev: fails to start on rootfs because bind and move mounts don't work

2008-03-25 Thread Helmut Grohne
I think that you are horribly wrong, because I have at no point used initramfs-tools (nor did I mention it). Yes, I am using a (slightly larger) initramfs to boot the system, but this is generated by combining cdebootstrap with cpio. hmm is that code free? Well depends. Actually that

Bug#472579: udev: fails to start on rootfs because bind and move mounts don't work

2008-03-25 Thread Helmut Grohne
As I pointed out in my first mail the init script of udev (/etc/init.d/udev) tries to mount --bind and --move stuff. And this fails on rootfs[1], so either the kernel or udev can be blamed and udev is easier to blame. Looks like I forgot my footnote: [1] In case this has been unclear a quote

Bug#430158: [Pkg-cryptsetup-devel] Bug#430158: Bug#430158: closed by Jonas Meurer [EMAIL PROTECTED] (closing because of inactivity)

2008-03-25 Thread Helmut Grohne
Hi Jonas, At testing your patch I realized that $tries in initramfs is not used like it is in the normal initscript. Instead, the default cryptsetup (with three tries) is invoked $tries times. So if you give tries=5 in /etc/crypttab, you have 3*5=15 tries in the initramfs. Ah. I think I

Bug#472579: udev: fails to start on rootfs because bind and move mounts don't work

2008-03-25 Thread Helmut Grohne
tags 472579 patch thanks sooo urgss you are not using run-init!? I am not even using klibc. Am I required to use run-init? Is there any benefit from doing so when I do not want to mount another block device on /? The test case I have given makes the kernel directly execute init like it was

Bug#472579: udev: fails to start on rootfs because bind and move mounts don't work

2008-03-25 Thread Helmut Grohne
yes run-init is the standard way to nuke your initramfs and the succesor of pivot_root() it is heavily audited used on rh, suse, debian, ubuntu, .. no point in keeping rootfs, nuking is very quick. I agree with run-init is the standard way to nuke an initramfs. According to the kernel

Bug#472579: udev: fails to start on rootfs because bind and move mounts don't work

2008-03-25 Thread Helmut Grohne
Furthermore you're totally wrong with pointing to pivot_root. With normal (Debian) initramfs pivot_root is never called. Instead run-init deletes all files from rootfs and then mounts the real root device over the rootfs in order to execute init after that. However I don't have a block

Bug#525457: syrep: silently fails on non-readable directories

2009-04-24 Thread Helmut Grohne
Package: syrep Version: 0.9-4+b1 Severity: minor $ mkdir repo $ cd repo $ touch good $ mkdir bad $ chmod 000 bad $ syrep -zp --update . # there is no message indicating the failure $ echo $? 1 $ ls .syrep md-cache $ I'd like to see some error message for non-readable directories like there is

Bug#525494: hugin creates Makefiles that are not compatible with -j

2009-04-24 Thread Helmut Grohne
Package: hugin Version: 0.7.0-2 Severity: important The Makefiles hugin creates seem to be incompatible with -j. Having MAKEFLAGS=-j2 on my system therefore makes hugin fail badly while stitching. There are basically two options: 1) unset MAKEFLAGS 2) write proper Makefiles Helmut -- System

Bug#604925: /usr/lib/libgssapi_krb5.so.2: cannot login to ssh after upgrade from lenny to squeeze

2010-12-07 Thread Helmut Grohne
Hi Sam, On Tue, Nov 30, 2010 at 10:25:57AM -0500, Sam Hartman wrote: The 1.9 packages just made their way into experimental. I'd expect that I'd expect aptitude -t experimental install libkrb5-3 libgssapi-krb5-2 would work and not bring any scary dependencies in. If it does look scary,

Bug#604925: /usr/lib/libgssapi_krb5.so.2: cannot login to ssh after upgrade from lenny to squeeze

2010-12-07 Thread Helmut Grohne
Thanks for still bearing with me! On Tue, Dec 07, 2010 at 10:14:08AM -0500, Sam Hartman wrote: Can you try turning off delegated credentials? GSSAPIDelegateCreds no in your client config? This is a shot in the dark, but I don't think I've ever seen a problem with the authenticator path once

Bug#604925: /usr/lib/libgssapi_krb5.so.2: cannot login to ssh after upgrade from lenny to squeeze

2010-12-07 Thread Helmut Grohne
On Tue, Dec 07, 2010 at 11:39:14AM -0500, Sam Hartman wrote: There's a #kerberos? Who knew! On Freenode. :-) So, I'd like to confirm. You have a Mac OS Open Directory KDC and a lenny client. When you authenticate to a squeeze server you get authdata verification failure? Correct. What

Bug#609014: libnetfilter-log-dev: please include any kind of documentation

2011-01-05 Thread Helmut Grohne
Package: libnetfilter-log-dev Version: 0.0.13-1+b1 Severity: wishlist Upon the package gives really no hints on how to use it. It's not as if the documentation wasn't available, it simply is not installed. Note that this also affects the 1.0 version of the package. A very good start is

Bug#447526: this should be a rc bug

2011-01-28 Thread Helmut Grohne
On Fri, Jan 28, 2011 at 12:15:29PM +0100, Cyril Brulebois wrote: Great, closing this bug then. :) Incidentally I just hit the 100M watermark today. :-( Worse xrestop shows only 24M pixmap memory leaving a now implausible difference of 76M for Xorg. Note that this is the very same Xorg process as

Bug#612292: libswscale0: upgrade from 4:0.5.2-6 to 4:0.6.1-4 breaks mplayer 2:1.0~rc3++final.dfsg1-1.1

2011-02-07 Thread Helmut Grohne
Package: libswscale0 Version: 4:0.5.2-6 Severity: important $ mplayer ... mplayer: relocation error: mplayer: symbol rgb24toyv12, version LIBSWSCALE_0 not defined in file libswscale.so.0 with link time reference $ Downgrading libswscale0 to 4:0.5.2-6 solves the issue. A similar bug is #611579.

Bug#615134: mutt: does not complete any aliases anymore

2011-02-25 Thread Helmut Grohne
Package: bash-completion Version: 1:1.3-1 Severity: normal After upgrading 1:1.2-3 to 1:1.3-1 mutt aliases stopped to be complete. Now it only completes users from /etc/passwd. Thanks to etckeeper the older version was easily recovered. The diff to /etc/bash_completion.d/mutt consists of just

Bug#615134: [Bash-completion-devel] Bug#615134: mutt: does not complete any aliases anymore

2011-03-01 Thread Helmut Grohne
On Wed, Mar 02, 2011 at 12:03:01AM +0200, Ville Skyttä wrote: On 02/26/2011 01:36 AM, Helmut Grohne wrote: After upgrading 1:1.2-3 to 1:1.3-1 mutt aliases stopped to be complete. Now it only completes users from /etc/passwd. Thanks to etckeeper the older version was easily recovered

Bug#604925: ITP: openvpn-auth-radius -- OpenVPN RADIUS authentication module

2010-12-14 Thread Helmut Grohne
retitle 556460 ITP: openvpn-auth-radius -- OpenVPN RADIUS authentication module owner 556460 ! thanks -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#604925: closed by Sam Hartman hartm...@debian.org (Bug#604925: fixed in krb5 1.9+dfsg~beta2-1)

2010-12-14 Thread Helmut Grohne
On Sat, Dec 11, 2010 at 01:33:05AM +, Debian Bug Tracking System wrote: This is an automatic notification regarding your Bug report which was filed against the libgssapi-krb5-2 package: #604925: Squeeze krb5 fails to work with Open Directory KDC tickets It has been closed by Sam

Bug#607665: etckeeper: tracks permission changes to ignored files

2010-12-20 Thread Helmut Grohne
Package: etckeeper Version: 0.50 Severity: normal If you update sudo and have local changes, you get a sudoers.dpkg-dist which is (like sudoers) mode 0440. It is not tracked by $VCS due to the *.dpkg-dist ignore. However the .etckeeper is wrongly updated with a line maybe chmod 440

Bug#615134: [Bash-completion-devel] Bug#615134: mutt: does not complete any aliases anymore

2011-03-02 Thread Helmut Grohne
On Wed, Mar 02, 2011 at 09:09:20AM +0200, Ville Skyttä wrote: On 03/02/2011 12:16 AM, Helmut Grohne wrote: This in turn is due to the fact that the ~ is not expanded. Not quoting $file would solve this but it would probably lead to other problems. I played with a test case outside

Bug#538822: dash and local diversions

2011-01-13 Thread Helmut Grohne
Hi, I am the submitter of the original dash upgrade bug. On Mon, Dec 27, 2010 at 09:27:29PM +, Adam D. Barratt wrote: diff --git a/en/issues.dbk b/en/issues.dbk index 9498399..83f1408 100644 --- a/en/issues.dbk +++ b/en/issues.dbk @@ -244,6 +244,34 @@ works for literalroot/literal.

<    1   2   3   4   5   6   7   8   9   10   >