Package: libcgicc1-dev
Version: 3.2.3-3
Severity: grave
Justification: renders package unusable
Tag: patch
Almost all headers contain
#pragma interface
and at the same time implement constructors like
inline CgiInput() {}
which just doesn't fit together. Trying to compile things with g++ will
to be started or other things.
You should also create a new user and verify if you can reproduce this
behaviour with another user.
Helmut Grohne
signature.asc
Description: Digital signature
tag 352139 wontfix
thanks
However, this does not seem to be the case.
Actually it works quite similar.
When run:
[EMAIL PROTECTED]:/tmp$ a.out -a
a arg is: (null)
Correct behaviour.
$ ./a.out -afoo
a arg is: foo
[EMAIL PROTECTED]:/tmp$ a.out -a hello
a arg is: (null)
Now.
tag 160683 moreinfo
thanks
On Thu, Sep 12, 2002 at 12:10:48PM -0700, Blars Blarson wrote:
Gnu date apperently siglently limits the timezone offset to 23, so the
above command will SOMETIMES show todays date instead with no error
message. (The SOMETIMES makes this even harder to debug.) This
tags 286825 = fixed-in-experimental
thanks
This bug seems to be fixed in experimental.
Helmut Grohne
signature.asc
Description: Digital signature
tag 310445 moreinfo
severity 310445 normal
thanks
There are new versions of glibc available. Could you perhaps recheck
whether this bug is reproducible? Furthermore the source for that binary
would be helpful if available.
Helmut Grohne
signature.asc
Description: Digital signature
does here is within the specs. The function could also segfault at that
point. This could maybe reported to the upstream but they'll probably
think the same way.
Helmut Grohne
signature.asc
Description: Digital signature
their
behaviour since there are only 5 packages in apt-cache rdepends nscd of
which at least one is a conflict. So maybe libpam-ldap could suggest
nscd instead of recommending it. Otherwise this bug should be tagged
wontfix.
Helmut Grohne
signature.asc
Description: Digital signature
be adapted.
Thanks to Aurelien Jarno for pointing this out.
Helmut Grohne
signature.asc
Description: Digital signature
make[5]: Leaving directory
`/tmp/buildd/sunbird-0.2.99+0.3alpha1/build-dir/mozilla/xpcom/build'
Helmut Grohne
-- System Information:
Debian Release: 4.0
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Shell: /bin/sh linked to /bin/bash
Kernel
tag 416211 patch
thanks
c++ [...]
Looks like it should have been build with g++-3.4. Adding
export CC=gcc-3.4
export CXX=g++-3.4
to debian/rules seems solve the problem.
Helmut Grohne
signature.asc
Description: Digital signature
to cpufreqd_acpi_lid.c and modify
some names. Maybe there is a better way. Please tell me if you'd like
to have a patch for that (maybe tag -1 patch?).
Helmut Grohne
-- System Information:
Debian Release: 4.0
APT prefers testing
APT policy: (500, 'testing')
Architecture: i386 (i686)
Shell
. [an ugly hack]
This bug seems to be fixed in recent SuSE packages. So may be a fix
could be inspired there.
Please contact me if you need further information.
Helmut Grohne
-- System Information:
Debian Release: 4.0
APT prefers testing
APT policy: (500, 'testing')
Architecture: i386 (i686
Package: xorg
Version: 7.1.0-11
My Xorg.log of a similar segfault is attached and maybe it helps.
An amd64 nvidia (proprietary) X segfaultet while running fluxbox, xterm
and a wine with a broken google earth. Interaction with google earth was
probably the cause of the segfault as it created
it might already have
disappeared.
A short answer of other who can or cannot reproduce this bug would be
helpful, so if you happen to have a similar setup, please just try!
Helmut Grohne
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT policy: (500, 'unstable'), (1
Package: qemubuilder
Version: 0.30
Severity: important
Hi. I tried to use qemubuilder and somewhat failed. The only portion of
documentation I could find was the manpage which does not mention
qemubuilder --create should be run as root, so I tried as a normal user
with a ~/.pbuilderrc copied from
Package: denyhosts
Version: 2.6-1
Severity: wishlist
The log files created by denyhosts are - unlike most other logfiles -
not owned by the group adm, but instead by the group root. The policy
does not explicitly state that this should be the case. However most
other daemons follow this line. As
Package: jackd
Version: 0.103.0-6
Severity: normal
$ jackd -d alsa
jackd 0.103.0
Copyright 2001-2005 Paul Davis and others.
jackd comes with ABSOLUTELY NO WARRANTY
This is free software, and you are welcome to redistribute it
under certain conditions; see the file COPYING for details
JACK
Package: xbacklight
Version: 1.1-1
Severity: important
First of all: It does something! Great work! Unfortunately it's not
really ready to use on my system yet. Especially I don't really know
which package this bugreport really applies to, so please forward it to
whatever package you think to be
Package: cryptsetup
Version: 2:1.0.4+svn29-1
Severity: wishlist
(a similar mail already went to [EMAIL PROTECTED])
I tried to use luks to encrypt swapspace for uswsusp, because this will
also encrypt normal swapping activity and not only hibernation. After
reading and experimenting with
Package: xserver-xephyr
Version: 2:1.3.0.0.dfsg-4
Severity: normal
First of all thanks for fixing #405928!
I however managed to find a new bug. (Sorry)
Steps to reproduce:
Start Xephyr display :n, start xterm on :n, terminating the xterm should
result in the segfault below.
Package: renpy
Version: 6.2.0.ds1-1
Severity: normal
I tried to use renpy and the demo works well, however the game dse
doesn't seem to work. Pressing the start game button results in a
ScriptError:
$ renpy --game=/usr/share/games/renpy/dse
File /usr/share/games/renpy/renpy/bootstrap.py, line
Might be related to #420860 (but the whole stack is not exactely the
same). To get a nice backtrace, you should install xserver-xorg-core-dbg
and attach a gdb through ssh before the crash:
Got a better one:
Attaching to program: /usr/bin/Xorg, process 11216
...
Program received signal
Wow. Fastest response to a bugreport I've received!
I don't think gse is supposed to be a game, but an engine. The only game
distributed with the engine for the moment is the demo. I guess the doc should
state more clearly what is a game and what is not.
Oops. I misinterpreted the hint on the
Package: alex
Version: 2.1.0~rc1-1
Severity: minor
Tag: patch
The html file contains the line:
the action functions to be passed the appriate
where appropriate is probably meant instead of appriate.
-- System Information:
Debian Release: lenny/sid
APT prefers testing
APT policy: (500,
Package: apt-listbugs
Version: 0.0.75
Severity: important
Tags: patch
Traceback (most recent call last):
File /usr/bin/apt-listchanges, line 226, in ?
main()
File /usr/bin/apt-listchanges, line 58, in main
if os.access('/dev/tty', R_OK):
NameError: global name 'R_OK' is not defined
This bug seems to be fixed in 1.0.5-1. I cannot reproduce the described
behaviour anymore. The bug should therefore be marked as closed.
Helmut
signature.asc
Description: Digital signature
Package: mozilla-firefox-webdeveloper
Version: 0.9.3-4
Severity: grave
Justification: renders package unusable
During aptitude upgrade:
Setting up mozilla-firefox-webdeveloper (0.9.3-4) ...
/var/lib/dpkg/info/mozilla-firefox-webdeveloper.postinst: line 8:
update-mozilla-firefox-chrome: command
forwarded 323126 [EMAIL PROTECTED]
thanks
cd /build/buildd/slate-0.3.4.3 echo repl reset. Image saveNamed:
'slate.image'. quit. | ./vm `debian/endianess`.image
/bin/sh: line 1: 15728 Doneecho repl reset. Image
saveNamed: 'slate.image'. quit.
15729 Bus error
Package: libmailtools-perl
Version: 1.62-1
Severity: normal
man 3pm Mail::Mailer lists qmail twice in the description.
Suggested fix: Remove the second one as it is exactly the same as above.
As we are already fixing bugs, please use built in instead of build
in (environment section). Thanks to
Package: libao
Severity: normal
The function _open_default_oss_device is a whole mess. It has some
unneeded maybe historical variables and doesn't handle strdup to return
NULL. A suggested fix is attached.
-- System Information:
Debian Release: testing/unstable
APT prefers unstable
APT
Package: apt
Version: 0.6.38
Severity: normal
The manpage of apt-key should mention the update command. Using apt-key
help we can see it exists. Another problem might be that apt-key update
currently does not work.
# apt-key help
Usage: apt-key [command] [arguments]
Manage apt's list of trusted
Package: djview4
Version: 4.3-3
Severity: normal
Steps to reproduce:
1) Start djview4 on an arbitrary .djvu file.
2) Press ctrl-f to open the search box.
3) Search for an arbitrary string not matching the document.
4) Close the searchbox (for instance by pressing ESC).
5) Try to open the search
Package: openssh-server
Version: 1:4.7p1-9
Severity: important
The recent update has two big problems:
1) Yes it tells the admin that it will replace the host key, but does
not allow him to stop and do that step later.
2) It disables weak keys without further notice.
This was both documented
# doesn't break the system in general, and even when it does is totally
# justifiable; see below
We seem to disagree about breaking a system is justifiable. (I'd say:
After all do no harm.)
I was aware of this problem but considered it absolutely acceptable
given the severity of the bug.
I
Package: openssh-server
Version: 1:4.7p1-10
Severity: wishlist
Hi,
sshd[0]: Public key 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
blacklisted (see ssh-vulnkey(1))
That's a line from sshd when one tries to use a blacklisted key. In
order to reduce the load on a server it would be great
subscribe 478009 !
severity 478009 important
thanks
Hi,
I also observe this bug (on amd64). Here are the details: (Comments from
me start with a #).
# command line copied from mozilla-plugin-gnash invocation
$ gnash - -j 480 -k 385 -u http://s.ytimg.com/yt/swf/watch-vfl42309.swf -U
Package: gnuplot
Version: 4.2.2-1.1
Severity: normal
How to reproduce:
* Start a terminal=wxt gnuplot.
* plot a graph or better splot it, for example splot 0.
* Then perform actions on the graph like zooming for plot or rotating
for splot.
Observation:
On updating the graph the plot window
Package: cupsys-client
Version: 1.3.7-5
Severity: normal
File: /usr/bin/lppasswd
$ man lppasswd
...
SECURITY ISSUES
The lppasswd command is installed setuid to root. While every
attempt has been made to make it secure against exploits that
could grant super-user privileges
It seems that gnash can't play any sound for me. No version of gnash
was ever able to play sound. The sound is enabled if I right click with
my mouse.
I also had this problem. It was gone after installing
gstreamer0.10-plugins-good. I therefore strongly suggest that gnash
depends on this
Package: munin-node
Version: 1.2.6-1
Severity: important
The exim_mailqueue plugin finds out where the $SPOOLDIR is just to
forget that value in line 39. It then runs find on which evaluates to
the current working directory being /. This causes high io load and
wrong numbers.
Helmut
--
To
Package: munin-node
Version: 1.2.6-1
Severity: normal
Tags: patch
You forgot a
return tail_close($LOGFILE);
in parseEximfile. Upstream svn is a good start for this.
Helmut
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Package: munin-node
Version: 1.2.6-1
Severity: important
$ /usr/share/munin/plugins/ntp_offset
/bin/sh: Illegal option -w
$
Helmut
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Package: filelight
Version: 1.0-2
Severity: important
In order to reproduce start filelight on a non-/ directory (for me /home
worked), click Settings, Configure Filelight ..., Appearance,
Show small files. Toggling the last setting eventually results in a
segfault.
Helmut
-- System
Package: scons
Version: 0.96.93-2
Severity: minor
Tag: patch
The manpage of scons says:
Or you may explicitly propagate the invoking user's complete external
environment:
import os
env = Environment(ENV = os.environ['PATH'])
This is wrong as
as well. Maybe forwarding to upstream might
be a good idea too.
By the way, you will need to add some lines to cpufreqd_acpi.c too.
Good point. I had to adapt it a bit.
Helmut Grohne
diff -ruN cpufreqd-2.2.1/configure cpufreqd-2.2.1.1/configure
--- cpufreqd-2.2.1/configure 2006-11-21 22:25
Package: foomatic-db-engine
Version: 3.0.2-20060318-1
Severity: important
The printconf package is unusable because foomatic-combo-xml does not
work.
# foomatic-combo-xml -O -l /usr/share/foomatic /dev/null
*** glibc detected *** double free or corruption (!prev): 0x006474a0
***Aborted
be achieved by putting sleep()
calls into the source. As I said it hangs within futex() this is
probably a locking problem.
Greetings
Helmut Grohne
signature.asc
Description: Digital signature
Package: siege
Version: 2.61-3
Severity: normal
After a typingmistake I discovered that siege --h segfaults. This seems
to be true for any invalid option. gdb shows that it segfaults in
strncmp. Not having looked at the source I think that siege iterates
over a list of options and compares to
Package: robotour
Version: 3.2.1-2
Severity: important
Selecting any robot (especially from /usr/share/doc/robotour/examples)
and running them results in a segfault.
(gdb) bt
#0 0x2b1bc670d4b0 in strlen () from /lib/libc.so.6
#1 0x2b1bc66df22b in vfprintf () from /lib/libc.so.6
#2
Package: manpages-dev
Version: 2.33-2
Severity: normal
POSIX specifies that parameters passed to makecontext after argc must
be of type int. As the glibc implementation also assumes this it should
be mentioned in man 3 makecontext. See
Package: libc6
Version: 2.3.999.2-4
Severity: normal
# smbclient
smbclient: gconv_db.c:232: __gconv_release_step: Assertion `step-__end_fct ==
((void *)0)' failed.
Aborted
#
This does not happen with 2.3.6-9. The bug seems to occur while loading
shared libraries as different options to
Package: python2.3
Version: 2.3.5-14
Severity: normal
python2.3 -c 'int(buffer(__import__(array).array(c)))' segfaults
This was discussed on the python mailing list but should be fixed
anyway as python should never segfault. This bug is reproducible on i386
stable and with python2.4, too.
See
Package: tremulous
Version: 1.1.0-1
Severity: wishlist
I was able to successfully build tremulous using pdebuild on
unstable/amd64. So please add that architecture in debian/rules.
Also could you provide a source package for tremulous-data?
-- System Information:
Debian Release: testing/unstable
Package: freecraft
Version: 1:1.18-2.2
Severity: normal
Clicking on Singleplayer results in a segmentation fault. This is a full
backtrace from gdb:
#0 0x0042075d in strcasestr ()
No symbol table info available.
#1 0x004ba390 in strcasestr ()
No symbol table info available.
#2
Hi,
I think something more is broken.
$ ls -la /usr/share/doc/darcs/manual/index.html
-rw-r--r-- 1 root root 0 2006-07-03 11:05 /usr/share/doc/darcs/manual/index.html
$ dpkg -l darcs
...
ii darcs 1.0.8-1an advanced revision control system
$ uname -a
Linux alf 2.6.17 #1 SMP Tue
For more information about this package's removal, read
http://bugs.debian.org/474073 . That bug might give the reasons why
this package was removed, and suggestions of possible replacements.
This bug log does not contain possible replacements. The silc package
contains a usable replacement
Package: irssi-plugin-silc
Version: 1.1.4-1
Severity: normal
When someone (or oneself) does /me did bar it appears like
* foo did bar
* foo did bar
This behaviour is wrong.
Helmut
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500,
found 438438 0.14.0-2
tags 438438 +patch
thanks
I believe that this bug is not fixed in the latest version of pylint.
See for example:
E:5:some_function: Undefined variable 'all'
The problem is easy to work around though. The file /usr/bin/pylint
looks like this:
$ cat /usr/bin/pylint
Please launch python2.5 /usr/bin/pylint if you want to check code with a
version of python different from the default one.
That is a good suggestion. Feel free to mark this bug as wontfix.
I don't want to use python2.5 in the shebang stanza by default, as I
feel it is useful to be able to
found 447526 2:1.4.1~git20080131-2
thanks
The problem that Xorg uses a lot more memory than listed in xrestop and
does not free this memory on closing persists. This behaviour seriously
degrades usage as it is now required to regularly restart Xorg. I
therefore ask to increase severity to get
Try Xserver 1.4.99.901 from
deb http://pkg-xorg.alioth.debian.org/7.4/ ./
May I ask for a signed repository?
Helmut
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Package: splint
Version: 3.1.2.dfsg-6
Severity: important
Declaring
struct foo *(bar[baz]);
makes splint spit out tons of warnings when accessing bar[qux]-quux,
because it thinks foo is of type struct foo * whereas it really is
struct foo **. This behaviour is wrong and makes checking some
Package: acon
Version: 1.0.5-5
Severity: critical
Tags: security
Justification: root security hole
The package has a setuid binary acon. The binary never drops setuid. The
source code contains the following lines: (acon.c)
char tmp[300];
...
if((env=getenv(HOME)))
Package: tss
Version: 0.8.1-3
Severity: critical
Tags: security
Justification: root security hole
tss has a setuid binary. The source code is src/main.c:
sprintf(glob_string, %s/.tss/*, getenv(HOME));
(before dropping setuid, needless to say)
Helmut
-- System Information:
Debian Release:
From the source code:
35 int main(int argc,char **argv)
36 {
37 int i,tty,useunicode=0;
38 char *fontf=0,*translationf=0,*keymapf=0;
39
40 get_ids();
41 set_user_id();
...
301 int user_id;
302 int
Actually I am pretty sure this one is not exploitable. For
sure you are able to corrupt memory here and overwriting EIP
but this will likely segfault in glob() one line after the
line you quoted. Thus removing the security tag and setting
the severity to minor.
OK.
However your bug
thank you for your patch; I will upload a fixed package tomorrow. Sorry
for the long delay; i've been on work and was not able to access my gpg
key nor did I find time to answer.
NMU uploaded to delayed/4 by Sune Vuorela.
Helmut
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject
So why do you think it does not drop setuid root, the code does?
$ cat debian/patches/05_setuid.diff
Index: acon-1.0.5/acon.c
Commented a statement that returns the user id to non-root. That made
some control keys to not work.
===
found 475733 1.0.5-6
thanks
* Dropped 05_setuid.diff as it can cause a root exploit. (Closes: #475733)
This is not enough, because it still has seved set userid and is
exploitable:
The package has a setuid binary acon. The binary never drops setuid. The
source code contains the following
# Automatically generated email from bts, devscripts version 2.10.25
# should be fixed yesterday
severity 475736 serious
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Hi Jonas,
No. Testing takes time and I want to do that in one chunk. Furthermore I
need to rewrite the patch first. The patch doesn't permit an infinite
number of retries by setting tries=0. I'll tell you when I'm finished.
I verified that the attached patch works as expected.
I object
Package: python-sympy
Version: 0.5.12-1
Severity: important
$ pydoc2.5 -k foobarqux
Traceback (most recent call last):
File /usr/bin/pydoc2.5, line 5, in module
pydoc.cli()
File /usr/lib/python2.5/pydoc.py, line 2195, in cli
apropos(val)
File /usr/lib/python2.5/pydoc.py, line 1890,
Package: crm114
Version: 20060704a-5
Severity: normal
Hi,
I've got a strange segfault from crm while experimenting with it. It is
extremely hard to reproduce and happens deterministically under
conditions I do not understand. I've attached a script trigger.sh that
reproduces the bug on my stable
Package: initramfs-tools
Version: 0.91e
Severity: normal
Invoking mkinitramfs using -d conf where conf is a relative path results
in cpio bailing out:
cpoio: ./conf/initramfs.conf: Cannot stat: No such file or directory
Providing an absolute path makes this go away. I therefore suggest
adding a
Package: udev
Version: 0.114-2
Severity: minor
When running udev on rootfs (i.e. from initramfs) it fails to start
because all --bind and --move mounts from /etc/init.d/udev will fail
(the kernel gives -EINVAL). Therefore the script stops (set -x) before
udev is started resulting in more severe
Hi Maximilian,
reassign 472579 initramfs-tools
severity 472579 grave
tag 472579 patch
tag 472579 pending
stop
I think that you are horribly wrong, because I have at no point used
initramfs-tools (nor did I mention it). Yes, I am using a (slightly
larger) initramfs to boot the system, but
Hi Marco,
When running udev on rootfs (i.e. from initramfs) it fails to start
because all --bind and --move mounts from /etc/init.d/udev will fail
(the kernel gives -EINVAL). Therefore the script stops (set -x) before
udev is started resulting in more severe problems. This problem can
Hi Marco,
If you are building your own initramfs from scratch then you cannot
assume that the debian init script will work out of the box.
1) Booting a system with a disk, but without an initramfs works, so why
should a system with an initramfs, but without a disk not work?
2) As I did not
I think that you are horribly wrong, because I have at no point used
initramfs-tools (nor did I mention it). Yes, I am using a (slightly
larger) initramfs to boot the system, but this is generated by combining
cdebootstrap with cpio.
hmm is that code free?
Well depends. Actually that
As I pointed out in my first mail the init script of udev
(/etc/init.d/udev) tries to mount --bind and --move stuff. And this
fails on rootfs[1], so either the kernel or udev can be blamed and udev
is easier to blame.
Looks like I forgot my footnote:
[1] In case this has been unclear a quote
Hi Jonas,
At testing your patch I realized that $tries in initramfs is not used
like it is in the normal initscript. Instead, the default cryptsetup
(with three tries) is invoked $tries times. So if you give tries=5 in
/etc/crypttab, you have 3*5=15 tries in the initramfs.
Ah. I think I
tags 472579 patch
thanks
sooo urgss you are not using run-init!?
I am not even using klibc. Am I required to use run-init? Is there any
benefit from doing so when I do not want to mount another block device
on /? The test case I have given makes the kernel directly execute init
like it was
yes run-init is the standard way to nuke your initramfs and
the succesor of pivot_root() it is heavily audited used on
rh, suse, debian, ubuntu, ..
no point in keeping rootfs, nuking is very quick.
I agree with run-init is the standard way to nuke an initramfs.
According to the kernel
Furthermore you're totally wrong with pointing to pivot_root. With
normal (Debian) initramfs pivot_root is never called. Instead run-init
deletes all files from rootfs and then mounts the real root device over
the rootfs in order to execute init after that. However I don't have a
block
Package: syrep
Version: 0.9-4+b1
Severity: minor
$ mkdir repo
$ cd repo
$ touch good
$ mkdir bad
$ chmod 000 bad
$ syrep -zp --update . # there is no message indicating the failure
$ echo $?
1
$ ls .syrep
md-cache
$
I'd like to see some error message for non-readable directories like
there is
Package: hugin
Version: 0.7.0-2
Severity: important
The Makefiles hugin creates seem to be incompatible with -j. Having
MAKEFLAGS=-j2 on my system therefore makes hugin fail badly while
stitching. There are basically two options:
1) unset MAKEFLAGS
2) write proper Makefiles
Helmut
-- System
Hi Sam,
On Tue, Nov 30, 2010 at 10:25:57AM -0500, Sam Hartman wrote:
The 1.9 packages just made their way into experimental.
I'd expect that
I'd expect
aptitude -t experimental install libkrb5-3 libgssapi-krb5-2
would work and not bring any scary dependencies in. If it does look
scary,
Thanks for still bearing with me!
On Tue, Dec 07, 2010 at 10:14:08AM -0500, Sam Hartman wrote:
Can you try turning off delegated credentials? GSSAPIDelegateCreds no
in your client config? This is a shot in the dark, but I don't think
I've ever seen a problem with the authenticator path once
On Tue, Dec 07, 2010 at 11:39:14AM -0500, Sam Hartman wrote:
There's a #kerberos?
Who knew!
On Freenode. :-)
So, I'd like to confirm.
You have a Mac OS Open Directory KDC and a lenny client.
When you authenticate to a squeeze server you get authdata verification
failure?
Correct. What
Package: libnetfilter-log-dev
Version: 0.0.13-1+b1
Severity: wishlist
Upon the package gives really no hints on how to use it. It's not as if
the documentation wasn't available, it simply is not installed. Note
that this also affects the 1.0 version of the package.
A very good start is
On Fri, Jan 28, 2011 at 12:15:29PM +0100, Cyril Brulebois wrote:
Great, closing this bug then. :)
Incidentally I just hit the 100M watermark today. :-( Worse xrestop
shows only 24M pixmap memory leaving a now implausible difference of 76M
for Xorg. Note that this is the very same Xorg process as
Package: libswscale0
Version: 4:0.5.2-6
Severity: important
$ mplayer ...
mplayer: relocation error: mplayer: symbol rgb24toyv12, version LIBSWSCALE_0
not defined in file libswscale.so.0 with link time reference
$
Downgrading libswscale0 to 4:0.5.2-6 solves the issue.
A similar bug is #611579.
Package: bash-completion
Version: 1:1.3-1
Severity: normal
After upgrading 1:1.2-3 to 1:1.3-1 mutt aliases stopped to be complete. Now it
only completes users from /etc/passwd. Thanks to etckeeper the older version
was easily recovered. The diff to /etc/bash_completion.d/mutt consists of just
On Wed, Mar 02, 2011 at 12:03:01AM +0200, Ville Skyttä wrote:
On 02/26/2011 01:36 AM, Helmut Grohne wrote:
After upgrading 1:1.2-3 to 1:1.3-1 mutt aliases stopped to be complete. Now
it
only completes users from /etc/passwd. Thanks to etckeeper the older version
was easily recovered
retitle 556460 ITP: openvpn-auth-radius -- OpenVPN RADIUS authentication module
owner 556460 !
thanks
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
On Sat, Dec 11, 2010 at 01:33:05AM +, Debian Bug Tracking System wrote:
This is an automatic notification regarding your Bug report
which was filed against the libgssapi-krb5-2 package:
#604925: Squeeze krb5 fails to work with Open Directory KDC tickets
It has been closed by Sam
Package: etckeeper
Version: 0.50
Severity: normal
If you update sudo and have local changes, you get a sudoers.dpkg-dist
which is (like sudoers) mode 0440. It is not tracked by $VCS due to the
*.dpkg-dist ignore. However the .etckeeper is wrongly updated with a
line maybe chmod 440
On Wed, Mar 02, 2011 at 09:09:20AM +0200, Ville Skyttä wrote:
On 03/02/2011 12:16 AM, Helmut Grohne wrote:
This in turn is due to the fact that the ~ is not expanded. Not quoting
$file would solve this but it would probably lead to other problems.
I played with a test case outside
Hi,
I am the submitter of the original dash upgrade bug.
On Mon, Dec 27, 2010 at 09:27:29PM +, Adam D. Barratt wrote:
diff --git a/en/issues.dbk b/en/issues.dbk
index 9498399..83f1408 100644
--- a/en/issues.dbk
+++ b/en/issues.dbk
@@ -244,6 +244,34 @@ works for literalroot/literal.
101 - 200 of 8214 matches
Mail list logo