Hey,
Thanks for your kind offer to help! I uploaded a new version to unstable today
that adds the patch, so if you could double check that things are good now (and
maybe close the bug if it works for you now) that would be great!
Thanks,
Michael
On Thu, May 23, 2024, at 14:45, Charles Suprin
Hey Doko,
thanks for your bugreport. This is should be fixed in the git repo at github,
at least a test-build with the python3 from experimental on debian/unstable
build fine. I will look into a new release.
Cheers,
Michael
On Mon, Jan 29, 2024, at 13:54, Matthias Klose wrote:
> Package:
Hey,
thanks for reaching out. Julian was kind enough to merge the fix in
https://salsa.debian.org/apt-team/apt/-/merge_requests/249
so as soon as apt gets a new upload this issue should be fixed.
Cheers,
Michael
On Sat, Jul 23, 2022, at 23:33, Boyuan Yang wrote:
> X-Debbugs-CC: m...@debian.org
Hey,
just wanted to send a quick THANK YOU note for the NMU diff. I uploaded a new
version of synaptic with it and various other collected fixes/changes. But I
realized I did not reply with a thank you :)
Cheers,
Michael
Hey Boyuan Yang,
thank you so much your NMU and the diff. I will merge it into the git tree and
may do a new upload with some more pending github fixes merged. Hope that is
okay with you.
Thanks again for your help!
Michael
Thanks for reaching out and reporting this bug. Fwiw, I did reply to the
original mail too bug for some reason it seems that the reply did not made it
to you, not sure what happened here, sorry for that.
I am preparing an upload of the latest 2.54.1 release of snapd that partly
addresses the
Hi,
thanks for your bugreport. I can reproduce the issue and it seems like
it is triggered by the recent move to apparmor 3 in unstable. The
profile loading for snaps used to be done directly by apparmor but
with apparmor3 we need a patch in snapd to do it ourselfs. I will push
a fix ASAP
Just a quick update - we looked at this and we think the apparmor
support in Debian is sufficient to enable it in snaps by
default.
This is being worked on in https://github.com/snapcore/snapd/pull/9936
and once that lands I will upload to Debian. The goal is within this
week.
In addition to the
On Sun, Oct 13, 2019 at 05:58:30AM +0200, intrigeri wrote:
> Hi,
Hi,
> shirish शिरीष:
> > Dunno if this is the right place to discuss it or not. Integri asked
> > hence sharing.
[..]
> AFAICT:
>
> - The synaptic codebase does not use libgtk2-perl directly.
> - This Recommends is historically
Hi Axel,
thanks for the NMU diff - the proposed patch looks good.
Cheers,
Michael
Hi,
I tried this from a fresh git build and can not reproduce it. Could you
please double check that
"Settings/Preferences/Marking Changes/Ask to confirm changes that also
affect other packages"
is set?
Cheers,
Michael
based on the git commit message)
---
commit e133bb5e81b10bf059b3abeab2d9e41f7206e446
Author: Michael Vogt <m...@ubuntu.com>
Date: Wed Nov 9 15:09:44 2016 +0100
Do not (re)start "apt-daily.system"
This unit runs unattended-upgrades. If apt itself is part of the
u
On Sun, Oct 23, 2016 at 01:55:37PM +0200, Alexandre Detiste wrote:
> Le dimanche 23 octobre 2016, 13 h 43 min 59 s CEST Santiago Vila a écrit :
> > Aha! I can reproduce this too. On the machines where this happens,
> > I believe I answered "yes" to a debconf question about restarting
> > services
On Sat, Aug 29, 2015 at 12:15:16PM +0200, Egmont Koblinger wrote:
> Hi,
Hi,
[..]
> - The big piece is spawning a process for the terminal, and here my
> patch is definitely incomplete as it'd require more thorough
> understanding of the code:
>
> -- argv needs to be populated with the command to
On Thu, Oct 02, 2014 at 06:29:45PM +0200, Guillem Jover wrote:
Package: apt
Version: 0.8.7
Severity: serious
Tags: security patch
Thanks for your bugreport and your patch!
I've found an instance of insecure temporary filenames handling. The
problem is that the code correctly creates a
On Mon, Jun 16, 2014 at 11:18:27AM +0200, Jakub Wilk wrote:
* Michael Vogt m...@debian.org, 2014-06-16, 09:35:
+ _error-Warning(_(The data from '%s' is not signed. All packages from
+ that repository can not be authenticated.),
s/can not/cannot/
Also, All
On Fri, May 30, 2014 at 03:21:20PM +0200, Michael Vogt wrote:
[..]
Hmm. There is no warning suggesting that anything fishy is going on,
and the exit code indicates success. (Perhaps the Igns could raise
suspicion of an observant sysadmin. But who knows what Ign exactly
means? At least
On Mon, Jun 16, 2014 at 02:58:28PM +0200, Christoph Anton Mitterer wrote:
On Mon, 2014-06-16 at 09:35 +0200, Michael Vogt wrote:
I think for the future we actually should not allow a apt-get update
of untrusted repos without --allow-unauthenticated or
[trusted=no]. But this will probably
On Thu, Jun 12, 2014 at 11:44:20AM +0200, Thijs Kinkhorst wrote:
Hi,
apt: no authentication checks for source packages
The Debian security team has assigned CVE-2014-0478 to this issue.
APT developers: we should fix this in wheezy. Are you able to provide an
update for wheezy for this
/changelog 2013-11-16 12:47:12.0 +0100
+++ apt-0.9.7.9+deb7u2/debian/changelog 2014-06-12 13:22:44.0 +0200
@@ -1,3 +1,10 @@
+apt (0.9.7.9+deb7u2) wheezy; urgency=low
+
+ * SECURITY UPDATE: apt-get source validation
+- CVE-2014-0478
+
+ -- Michael Vogt m...@debian.org Thu, 12 Jun 2014
source validation (closes: #749795)
+- CVE-2014-0478
+ * SECURITY UPDATE: sensitive information disclosure via incorrect
+hostname validation (LP: #868353)
+- methods/https.cc: properly set CURLOPT_SSL_VERIFYHOST.
+- CVE-2011-3634
+
+ -- Michael Vogt m...@debian.org Thu, 12 Jun 2014
On Sat, May 31, 2014 at 12:07:48AM +0200, David Kalnischkies wrote:
On Fri, May 30, 2014 at 03:21:20PM +0200, Michael Vogt wrote:
From b7f501b5cc8583f61467f0c7a0282acbb88e4b29 Mon Sep 17 00:00:00 2001
From: Michael Vogt m...@debian.org
Date: Fri, 30 May 2014 14:47:56 +0200
Subject: [PATCH
that needs fixing. Attached is a patch that
addresses the issue.
Cheers,
Michael
From b7f501b5cc8583f61467f0c7a0282acbb88e4b29 Mon Sep 17 00:00:00 2001
From: Michael Vogt m...@debian.org
Date: Fri, 30 May 2014 14:47:56 +0200
Subject: [PATCH] Show unauthenticated warning for source packages as well
On Fri, Feb 14, 2014 at 10:51:58AM +0100, AndresBurbano wrote:
Package: synaptic
Version: 0.75.13
Severity: grave
Tags: d-i
Justification: causes non-serious data loss
Thanks for your bugreport.
Dear Maintainer,
* What led up to the situation?
I always develop in Debian, so I got a
On Mon, Nov 25, 2013 at 04:51:12PM +, Colin Watson wrote:
Package: apt
Version: 0.9.13
Severity: grave
Justification: breaks d-i
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu ubuntu-patch trusty
Thanks for your bugreport and your patch.
This bug originated
On Tue, Jul 23, 2013 at 01:59:47AM +0100, Ben Hutchings wrote:
Package: apt
Version: 0.9.9.2
Severity: serious
The configuration file /etc/apt/apt.conf.d/01autoremove-kernels is
only created when a kernel package is installed. It must be created
on upgrade of apt, otherwise all kernel
On Fri, May 24, 2013 at 08:49:25AM +0200, Roman Stingler wrote:
Package: synaptic
Version: 0.80.1
Severity: critical
Thanks for your bugreport.
Could you please try running synaptic with gdb ?
$ sudo -s
# gdb synaptic
(gdb) run
[wait for crash]
(gdb) backtrace
and send me the output of the
On Wed, May 01, 2013 at 10:33:17AM +0200, Felix Geyer wrote:
Source: squid-deb-proxy
Version: 0.7
Severity: serious
Tags: patch
Justification: fails to build from source
Thanks for your bugreport and your patch!
squid-deb-proxy calls lsb_release without build-depending on lsb-release.
On Thu, Mar 07, 2013 at 04:43:03PM +0100, g0to wrote:
Package: unattended-upgrades
Version: 0.79.4
Severity: grave
Tags: security
Justification: renders package unusable
Thanks for your bugreport.
after trying to make it run by myself and googling and make a few questions
here[1] and
On Sun, Jan 20, 2013 at 01:13:52PM +0100, Bastian Blank wrote:
Package: unattended-upgrades
Version: 0.79.3
Severity: grave
Thanks for your bugreport.
unattended-upgrades fails completely with xz compressed debs:
| # unattended-upgrade
|
On Thu, Dec 13, 2012 at 08:49:42AM +0100, Moritz Muehlenhoff wrote:
Package: apt
Severity: grave
Tags: security
Justification: user security hole
This was assigned CVE-2012-0961:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/975199
Stable is not affected, the logging as done as
On Mon, Apr 23, 2012 at 12:41:01PM +0300, Teodor wrote:
Package: unattended-upgrades
Version: 0.76.2
Severity: grave
Justification: renders package unusable
Thanks for your bugreport.
This should work with current sid but it will not work with older
version of python-apt. I added a check
On Fri, Apr 20, 2012 at 04:11:16PM +0300, Teodor MICU wrote:
2012/4/20 Michael Vogt m...@debian.org:
Sure, the setsid() call makes the process a session leader and removes
the controlling tty. The rational is that if you run
unattended-upgrades in a shell and then shutdown your tty goes
B1;3100;0cOn Fri, Apr 20, 2012 at 08:48:49AM +0300, Teodor wrote:
Package: unattended-upgrades
Version: 0.76.1
Severity: grave
Justification: renders package unusable
Hi,
The os.setsid() changes makes u-a abort on every invocation:
| root@r2:~# unattended-upgrade
| Traceback
On Fri, Apr 20, 2012 at 12:57:29PM +0300, Teodor MICU wrote:
2012/4/20 Michael Vogt m...@debian.org:
Thanks for your bugreport. I fixed that now. I guess in your case it
was already the session-leader for some reason (maybe because of
systemd?).
Yes, I use «systemd» but I don't know what
On Thu, Feb 16, 2012 at 09:12:44PM +0100, Santiago Garcia Mantinan wrote:
Hi!
Hi,
thanks for your bugreport.
I was revising other servers and found severl others having the same issue,
this one is a bit extrange as the upgrade that took place is the same as the
one on the i686 server I
On Thu, Mar 08, 2012 at 01:38:22AM +0100, Hans-Georg Bork wrote:
Package: synaptic
Version: 0.75.5
Severity: grave
Thanks for your bugreport!
--- Please enter the report below this line. ---
Hi,
after upgrade from 0.75.4 to current 0.75.5, synaptic gives a segfault
at start (see
-02-28 10:48:18 +
@@ -5,6 +5,8 @@
* test improvements
* fix mispelled Unattended-Upgrade::MinimalSteps (and add compat
mode)
+ * unattended-upgrade:
+- cleanup FDs to hopefully fix zombies (closes: #646620)
-- Michael Vogt michael.v...@ubuntu.com Mon, 02 Jan 2012 14:00:03
On Mon, Nov 21, 2011 at 06:57:41PM +0100, Julian Andres Klode wrote:
On Mon, Nov 21, 2011 at 01:03:08PM +0100, David Kalnischkies wrote:
On Mon, Nov 21, 2011 at 01:26, Steve McIntyre st...@einval.com wrote:
I've just added support for translated description files into
debian-cd, creating
On Wed, Nov 23, 2011 at 04:09:23PM +, Steve McIntyre wrote:
On Wed, Nov 23, 2011 at 05:01:13PM +0100, Michael Vogt wrote:
On Mon, Nov 21, 2011 at 06:57:41PM +0100, Julian Andres Klode wrote:
On Mon, Nov 21, 2011 at 01:03:08PM +0100, David Kalnischkies wrote:
On Mon, Nov 21, 2011 at 01
On Wed, Nov 09, 2011 at 06:06:07PM +0100, Paul Menzel wrote:
Package: unattended-upgrades
Version: 0.74.1
Severity: grave
Justification: renders package unusable
Thanks for your bugreport.
Dear Debian folks,
running `sudo aptitude safe-upgrade` and upgrading to version 0.74.1 I get
On Tue, Nov 08, 2011 at 12:16:41PM +0100, Santiago Garcia Mantinan wrote:
Do you need any other info to help solve this bug?
Sorry for the slow reply, I was traveling.
I am currently a bit lost what might cause this TBH.
I tried to reproduce this in a clean VM and have apache upgraded from
On Tue, Nov 01, 2011 at 01:04:54PM +0200, Teodor MICU wrote:
2011/10/31 Michael Vogt m...@debian.org:
I think I found the issue now and fixed it in trunk. The issue is that
the init scripts are run on upgrade, but they really should only run
on actual shutdown. Its a bit confusing why
On Mon, Oct 31, 2011 at 06:46:43AM +0200, Teodor MICU wrote:
severity 645919 grave
stop
Thanks for your bugreport.
I think I found the issue now and fixed it in trunk. The issue is that
the init scripts are run on upgrade, but they really should only run
on actual shutdown. Its a bit confusing
On Tue, Oct 25, 2011 at 09:11:17PM +0200, Santiago Garcia Mantinan wrote:
Package: unattended-upgrades
Version: 0.62.2
Severity: critical
Thanks for your bugreport.
This is the status of this machine right now:
root 1718 0.0 0.0 22912 1040 ?Ss Sep13 0:02
On Thu, Apr 28, 2011 at 08:51:15AM -0500, John Goerzen wrote:
On 04/28/2011 02:36 AM, Michael Vogt wrote:
The code in unattended-upgrades should catch conffile changes like
this, so this looks like you hit a bug in that detection. Or the
[..]
I ultimately sent it here because I don't think
On Mon, Apr 25, 2011 at 08:05:17PM -0500, John Goerzen wrote:
Package: asterisk-config
Version: 1:1.6.2.9-2+squeeze2
Severity: grave
Justification: renders package unusable
Thanks for your bugreport.
I use unattended-upgrades to provide security updates. This normally works
fine,
and
On Thu, Apr 28, 2011 at 08:51:15AM -0500, John Goerzen wrote:
On 04/28/2011 02:36 AM, Michael Vogt wrote:
The code in unattended-upgrades should catch conffile changes like
this, so this looks like you hit a bug in that detection. Or the
Hi Michael,
Yeah, I wasn't sure exactly where
On Thu, Feb 17, 2011 at 08:46:29PM +0100, Jakub Wilk wrote:
Source: python-apt
Version: 0.7.100.1
Severity: serious
Justification: fails to build from source
Tags: sid
Thanks for your bugreport.
This is actually a bug in python-distutils-extra, it uses a feature
not yet available for
On Mon, Jan 17, 2011 at 06:30:38PM +0100, Bjørn Mork wrote:
Package: unattended-upgrades
Version: 0.62.2
Severity: critical
Justification: breaks unrelated software
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
The hook /etc/pm/sleep.d/10_unattended-upgrades-hibernate deliberately
On Wed, Sep 29, 2010 at 08:22:56PM +0200, Julian Andres Klode wrote:
On Mi, 2010-09-29 at 19:51 +0200, Piotr Ozarowski wrote:
tags 598432 + patch
thanks
[Piotr Ożarowski, 2010-09-29]
I'll try to send you a patch this evening
attached
Luca: If python-apt maintainers will
On Wed, Sep 29, 2010 at 08:09:14PM +0200, Piotr Ożarowski wrote:
[Piotr Ozarowski, 2010-09-29]
attached
here's a version of the patch that also uses dh_python2 (so that
python-central is not needed anymore)
Many thanks for that patch! I commited it to bzr and uploaded a new
version :)
On Fri, Sep 24, 2010 at 05:05:02PM +0100, Steven Chamberlain wrote:
On 24/09/10 15:29, Anthony Callegaro wrote:
Can you try a 32 bits version or do you want me to give you a SSH access
to one test VZ ?
[..]
python-apt 0.7.96.1 works fine, but is only installable with older
packages apt-utils
On Fri, Sep 24, 2010 at 07:28:08PM +0100, Steven Chamberlain wrote:
On 24/09/10 18:33, Steven Chamberlain wrote:
python/acquire.cc: In function 'PyObject* PkgAcquireNew(PyTypeObject*,
PyObject*, PyObject*)':
python/acquire.cc:331: warning:
'pkgAcquire::pkgAcquire(pkgAcquireStatus*)' is
On Fri, Sep 24, 2010 at 07:28:08PM +0100, Steven Chamberlain wrote:
On 24/09/10 18:33, Steven Chamberlain wrote:
python/acquire.cc: In function 'PyObject* PkgAcquireNew(PyTypeObject*,
PyObject*, PyObject*)':
python/acquire.cc:331: warning:
'pkgAcquire::pkgAcquire(pkgAcquireStatus*)' is
On Fri, Sep 24, 2010 at 07:28:08PM +0100, Steven Chamberlain wrote:
On 24/09/10 18:33, Steven Chamberlain wrote:
python/acquire.cc: In function 'PyObject* PkgAcquireNew(PyTypeObject*,
PyObject*, PyObject*)':
python/acquire.cc:331: warning:
'pkgAcquire::pkgAcquire(pkgAcquireStatus*)' is
Hi,
attached is a patch that should fix the problem.
Cheers,
Michael
Index: apt-transport-debtorrent-0.1.1ubuntu1/connect.cc
===
--- apt-transport-debtorrent-0.1.1ubuntu1.orig/connect.cc 2007-11-13 15:53:38.0 +0100
+++
On Tue, Jan 19, 2010 at 10:29:24AM +, ael wrote:
This bug is still present on all my machines including on a netbook
with a freshly installed squeeze.
However, I am fairly sure that it only occurs when multiple dvds
need to be mounted (necessarily sequentially, since there is only
a
On Sun, Dec 20, 2009 at 12:31:06PM -0430, Ramon Ramos wrote:
Package: apt
Version: 0.7.25
Justification: renders package unusable
Severity: grave
Hi guys. the system show me this message when i try to update it,
Zen2:/home/ramon# apt-get update
0% [Conectando a ftp.debian.org
It turns out that the unusual size of the diff causes a the stack to
overflow, a different workaround is ulimit -s 12288 (or something
like that). Clearly its still a bug in rred.cc.
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble?
On Wed, Nov 04, 2009 at 11:12:25AM +0100, David Kalnischkies wrote:
tags 554349 + confirmed
thanks
Hello Faheem Mitha all other co-bug-reporters :)
First of all: Thanks for the report!
I have currently no time to dig into it a bit deeper,
(hopefully i can do it tonight or tomorrow)
Hi,
Thanks for the discussion and sorry that I'm so late joining it.
I like the idea of havng a netrc like file so that the sources.list
does not have to hold username/password anymore and I agree with David
that we should support the netrc file for all protcols where it makes
sense (ftp, http,
On Tue, Sep 29, 2009 at 09:52:29AM +0200, Norbert Preining wrote:
[..]
ithrandir:~# apt-get upgrade
Reading package lists... Done
Building dependency tree
Reading state information... Done
[..]
46 upgraded, 0 newly installed, 0 to remove and 12 not upgraded.
Need to get 0B/49.6MB of
On Sun, Sep 06, 2009 at 12:28:14PM -0400, Tony Freeman wrote:
I too experienced this bug but after some playing around I found that it was
a specific package causing he crash. The very last package listed in
Status: Installed (auto removable) seems to be the culprit ... in my case
it is
On Wed, Apr 08, 2009 at 05:39:37PM -0500, Jamie Strandboge wrote:
Package: apt
Version: 0.7.20.2
Severity: grave
Tags: security patch
Justification: user security hole
[..]
Thanks for the bugreport and the patch. I merged the patch into the
debian-sid bzr branch.
Cheers,
Michael
--
On Sat, 07 Feb 2009 15:50:38 +0200, Eugene V. Lyubimkin
jackyf.de...@gmail.com said:
Hello Daniel,
Daniel Leidert wrote:
Reassigning back. Fix(es) attached.
Hi guys,
xmlto reports you an error in an XML document, which is clearly a bug in
apt, not in xmlto. The recent change in
On Tue, Nov 25, 2008 at 07:08:10AM +0100, Christian Perrier wrote:
Quoting Deng Xiyue ([EMAIL PROTECTED]):
Followup-For: Bug #501253
[..]
Now apt-utils 0.7.19 brings back libdb4.4 again, at least on i386.
Hope it's just a unclean build environment. If it is the case, it'll
be great for
Hi,
I noticed that this bug got reopened. If this still affects you, could
you please:
- check if the current 0.7.16 version of apt is installed
- if it still fails with that, could you please attach your
/etc/apt/sources.list and everything in /etc/apt/sources.list.d ?
I was not able to
Hi,
I uploaded a new version of apt into experimental that hopefully fixes
the issue (its not experimental, I jut put it there because of extra
carefulness).
Please test and give me feedback.
Thanks,
Michael
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe.
Hi,
I had a look at the source and the output of apt-cache stats and it
looks like the problem is that libapt does not detect duplicated
description version. I.e. if ftp.de.debian.org and ftp.debian.org are
present in the sources.list, that doubles the amount of descrptions it
seems. I'm looking
Hi,
this bug is fixed in version 0.7.11 of apt (rev. 1585..1586 in the
debian-sid branch). If this is a problem for etch-lenny upgrades,
this change needs to be either backported to etch or a workaround
needs to be applied. There is some information in
http://launchpad.net/bugs/217435 what can be
On Sat, Jun 14, 2008 at 03:52:24PM +0200, Bas Zoetekouw wrote:
tag 475611 + pending
thanks
Hi!
I'm planning to upload an NMU to fix bug #475611 in
unattended-upgrades. The diff with the previous version is reproduced
below.
Thanks for the debdiff. I'm fine with that NMU, I can can do
Do you use gij or the original sun-java? Make sure you are using
sun-java5-jre or sun-java6-jre (see Bug #481988), and NOT gij
Greets,
Michael
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Hi,
sorry for being coming in so late. Here is a patch that should fix the
problem by making the buffer grow dynamically. Please give it testing.
Just to double the buffersize does only buy us time, the code that
deals with BigBuf is broken in serveral ways.
Cheers,
Michael
diff -Nru
On Thu, Nov 30, 2006 at 10:56:52AM +0100, Andreas Henriksson wrote:
On Thu, Nov 30, 2006 at 08:49:26AM +0100, Jens Seidel wrote:
If the buffer needs to be longer by one than Bins you probably also need
+if (Bins.length() = sizeof(Buffer))
Good catch, thanks!
Updated patch attached.
On Sat, Oct 07, 2006 at 08:27:51AM +0200, Christian Perrier wrote:
Quoting Ross Boylan ([EMAIL PROTECTED]):
http://bjorn.haxx.se/debian/testing.pl?package=apt says
trying to update apt from 0.6.46 to 0.6.46.1 (candidate is 2 days old)
* apt is only 2 days old. It must be 10 days old to go
On Sun, Oct 01, 2006 at 06:31:36PM +0200, Jeroen van Wolffelaar wrote:
On Sun, Oct 01, 2006 at 12:04:48AM +0200, Michael Vogt wrote:
--- apt-pkg/tagfile.h 2006-09-30 20:50:41 +
+++ apt-pkg/tagfile.h 2006-09-30 21:35:25 +
@@ -77,6 +77,7 @@
unsigned long Size
On Fri, Sep 22, 2006 at 12:49:22AM -0500, Manoj Srivastava wrote:
Package: apt
Version: 0.6.46
Severity: grave
Thanks for your bugreport.
#_ aptitude -u
... upgrade ...
#_ aptitude -vvv upgrade
Reading package lists... Error!
E: Unable to parse package file /var/lib/dpkg/status (1)
E:
[..]
On Fri, Sep 22, 2006 at 12:49:22AM -0500, Manoj Srivastava wrote:
#_ aptitude -u
... upgrade ...
#_ aptitude -vvv upgrade
Reading package lists... Error!
E: Unable to parse package file /var/lib/dpkg/status (1)
E: The package lists or status file could not be parsed or opened.
Reading
Just my 0.02¢
I think this packages (as it is now) is not suitable for debian anyway
and should be removed or re-done with the data of the debian archive
(instead of the data of the ubuntu archive).
The same utility that is used to extract icons/desktop files in ubuntu
could be used for the
On Fri, Jul 07, 2006 at 07:59:45PM +1000, Anthony Towns wrote:
On Wed, Jul 05, 2006 at 11:31:51PM +1000, Anthony Towns wrote:
package apt-utils
tag 376777 - help
tag 376777 + patch
thanks
I'm pretty sure this bug is simply due to misuse of auto_ptr in writer.cc
Okay, I've no idea
On Fri, Jul 14, 2006 at 04:01:46AM +0200, Jakob Bohm wrote:
Package: apt
Version: 0.6.44.2
Severity: critical
Tags: security patch
Justification: breaks the whole system
Thanks for your bugreport and your patch. I applied the patch and I
added a test in tests/hashes.cc for the sha256 code.
On Sun, May 14, 2006 at 10:11:46PM +0800, Paul Wise wrote:
reopen 355404
found 355404 1.68-1
thanks
Thanks for your bugreport.
I've started to notice that this bug is still present, perhaps a pango
or X update caused it. I get crashes trying to open the file menu and
the same crash I
On Fri, Jan 06, 2006 at 02:59:21AM +0100, Adeodato Simó wrote:
* Michael Vogt [Thu, 05 Jan 2006 23:27:40 +0100]:
but we need a better system for upgrades (see below).
Thanks for proposing this.
I think the same. My proposal is to create a new debain-server-keyring
Can I suggest
On Mon, Jan 09, 2006 at 01:13:57PM -0800, Mark Hedges wrote:
On Sun, Jan 08, 2006 at 09:28:24AM +0100, Harald Dunkel wrote:
Michael Vogt wrote:
You can run apt-get with --allow-unauthenticated or
APT::Get::AllowUnauthenticated=true in apt.conf
Thanx for the hint, but this option
On Sun, Jan 08, 2006 at 09:28:24AM +0100, Harald Dunkel wrote:
Michael Vogt wrote:
You can run apt-get with --allow-unauthenticated or
APT::Get::AllowUnauthenticated=true in apt.conf
Thanx for the hint, but this option just changed the error
message. Now I get:
W: There are no public
On Thu, Jan 05, 2006 at 12:02:53PM +0100, Harald Dunkel wrote:
[..]
Is there any way to switch this signature checking off?
You can run apt-get with --allow-unauthenticated or
APT::Get::AllowUnauthenticated=true in apt.conf
Cheers,
Michael
--
Linux is not The Answer. Yes is the answer. Linux
On Tue, Jan 03, 2006 at 11:07:37PM -0500, Joey Hess wrote:
Package: apt
Version: 0.6.43
Severity: serious
Tags: d-i
Thanks for your bugreport and sorry for my late reply.
apt needs to be updated for this year's archive key which is apparently
the one at
On Wed, Jan 04, 2006 at 01:26:26PM +0100, Jeroen van Wolffelaar wrote:
On Wed, Jan 04, 2006 at 02:41:30AM -0800, Joshua Rodman wrote:
On Wed, Jan 04, 2006 at 03:01:35AM +0100, Jeroen van Wolffelaar wrote:
Fwiw, the Release.gpg file contains two signatures now, both one with the
2005 key
On Thu, Dec 01, 2005 at 10:02:04PM -0500, Nathanael Nerode wrote:
Both 332835 and 299380 are patched. This is really slightly urgent, as there
is a package which is waiting to undergo the C++ transition which is waiting
for xdb (oleo).
Do you need an NMU?
Thanks for the reminder and for
On Wed, Nov 23, 2005 at 03:30:00PM +0100, Cedric Duval wrote:
Package: apt
Version: 0.6.42.3
Severity: serious
Justification: no longer builds from source
Backporting apt from a sarge system, the build fails with:
Compiling contrib/md5.cc to ../build/obj/apt-pkg/md5.opic
In file
On Mon, Oct 24, 2005 at 09:22:34PM -0400, [EMAIL PROTECTED] wrote:
Synaptic is still segfaulting for me despite an upgrade to 0.57.5.1. It seemed
to work fine before 0.57.5. I am running the testing distribution.
Please remove the scim package and try again. The backtrace
indicates that it
On Mon, Oct 24, 2005 at 09:29:26PM -0700, Chuck Williams wrote:
Package: synaptic
Version: 0.57.5.1
Severity: grave
Thanks for your bugreport.
I'm tracking Etch. My last regular upgrade obtained version 0.57.5.1 of
synaptic. I can no longer run the package at all as it segfaults on
On Wed, Oct 19, 2005 at 12:53:38AM -0400, Joey Hess wrote:
Package: apt
Version: 0.6.41
Severity: grave
Tags: d-i
Thanks for your bugreport.
[..]
As I understand it, there is basically no way we can build official
Debian CDs that are signed with our archive signing key. There is also
On Wed, Oct 12, 2005 at 11:04:28PM +1000, Rob Weir wrote:
Hey Michael,
Hi Rob,
these bugs have been sitting around with patches for a while now; will
you have time to do a vdk2 upload soon? Would you like someone to NMU
it for you?
Thanks for the kind offer. I found some time today and
On Sun, Aug 07, 2005 at 12:07:37AM +0200, Bin Zhang wrote:
Package: synaptic
Version: 0.57.4
Severity: grave
Justification: renders package unusable
After upgrade to 0.57.4 (powerpc), synaptic doesn't start.
I get a Segmentation fault.
Could this be a scim problem in debian? I seem to be
Hi,
wouldn't a Pre-Depends on emacsen-common solve the problem?
Cheers,
Michael
--
Linux is not The Answer. Yes is the answer. Linux is The Question. - Neo
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Hi,
I just tried to reproduce the problem and it was enough to set
the state of exim4 to 1 in /var/lib/aptitude/pkgstates.
A aptitude dist-upgrade will then remove my installed postfix and
upgrade to exim4.
This is also set in the pkgstates file of Geert.
Cheers,
Michael
--
Linux is not
Hi,
On Wed, Aug 10, 2005 at 07:50:24PM +0200, B. Zhang wrote:
I found http://wiki.debian.net/?HowToGetABacktrace and did a backtrace.
---
# MALLOC_CHECK_=2 gdb synaptic
[..]
thanks for your strace and your gdb backtrace. It looks like there is
a
Hi,
it looks like this FTBFS is caued by building it with -Os. This
seems to exclude the __buildin_* intrinsics that are used for memcmp
(#define memcmp __buildin_memcmp).
Cheers,
Michael
--
Linux is not The Answer. Yes is the answer. Linux is The Question. - Neo
--
To UNSUBSCRIBE, email
1 - 100 of 101 matches
Mail list logo