Bug#709125: libunwind-setjmp0: fails to install: preinst: dpkg-architecture: not found

2013-08-04 Thread Daigo Moriwaki
#Dynamic_debian.2F.2A_files debian/%.install: debian/%.install.in + sed 's/@DEB_HOST_MULTIARCH@/$(DEB_HOST_MULTIARCH)/g' $ $@ Best regards, Daigo -- Daigo Moriwaki daigo at debian dot org

Bug#709125: libunwind-setjmp0: fails to install: preinst: dpkg-architecture: not found

2013-08-04 Thread Daigo Moriwaki
amd64 Best regards, Daigo -- Daigo Moriwaki daigo at debian dot org

Bug#712530: move libunwind7 to / on ia64/wheezy?

2013-07-27 Thread Daigo Moriwaki
This issue has been solved by e2fsprogs (#708307), which I think is the best way because a way to build fsck.ext3 is the source of the problem. I'd like to close this bug. If you find any issues in the libunwind package, please let me know. -- Daigo Moriwaki daigo at debian dot org

Bug#655818: libgsl-ruby source package is still in unstable

2012-06-09 Thread Daigo Moriwaki
picked up by the ftpmaster cruft-report tool...!? Do you have any objection to turning this into a removal request? No. gsl-ruby is superior. Could you send a removal request? Thanks in advance. Regards, Daigo -- Daigo Moriwaki   beatles at sgtpepper dot net -- To UNSUBSCRIBE, email to debian

Bug#591194: Please unblock package tdiary

2010-11-15 Thread Daigo Moriwaki
(SMP w/2 CPU cores) Locale: LANG=ja_JP.eucJP, LC_CTYPE=ja_JP.eucJP (charmap=EUC-JP) Shell: /bin/sh linked to /bin/bash -- Daigo Moriwaki daigo at debian dot org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas

Bug#591194: tdiary: does not build .swf files from source

2010-11-14 Thread Daigo Moriwaki
. I will be able to take time tomorrow. I will check and upload the package. Regards, Daigo -- Daigo Moriwaki beatles at sgtpepper dot net -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#454841: FTBFS with GCC 4.3: missing #includes

2010-03-05 Thread Daigo Moriwaki
fixed 454841 1.5-1 thanks This issue was fixed by the upstream. The patch is no longer required. Thanks to the NMU. Regards, Daigo -- Daigo Moriwaki daigo at debian dot org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact

Bug#564598: ruby1.8: WEBrick control characters vulnerability

2010-01-10 Thread Daigo Moriwaki
Package: ruby1.8 Version: 1.8.7.174-3 Severity: grave Tags: security Justification: user security hole The upstream has released a vulnerability fix in WEBrick, a part of Ruby's standard library. WEBrick lets attackers to inject malicious escap e sequences to its logs, making it possible for

Bug#543346: libunwind7 is not required on all archs but ia64

2009-08-26 Thread Daigo Moriwaki
missing unwind-info. HP-UX/IA-64: Mostly works but known to have some serious limitations. Linux/PPC64: Newly added. So, x86-64 looks reasonable for me. Moreover, the reason why I NMUed is that google-porftools requires this library for x86-64 (amd64). Regards, Daigo -- Daigo Moriwaki

Bug#543346: libunwind7 is not required on all archs but ia64

2009-08-26 Thread Daigo Moriwaki
Matthias, Matthias Klose wrote: set the priority to optional I got you! Thanks a lot, Daigo -- Daigo Moriwaki daigo at debian dot org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#543346: libunwind7 is not required on all archs but ia64

2009-08-26 Thread Daigo Moriwaki
Matthias, Matthias Klose wrote: I don't say it's not useful, just the high priority is bogus. So, what do you suggest to resolve that? Regards, Daigo -- Daigo Moriwaki daigo at debian dot org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject

Bug#543346: libunwind7 is not required on all archs but ia64

2009-08-26 Thread Daigo Moriwaki
Matthias, Matthias Klose wrote: On 26.08.2009 16:38, Daigo Moriwaki wrote: Could you elaborate the reason of restricting only to ia64? it's not needed by default on architectures other than ia64. only the unwinding in gcc on ia64 uses the library by default. it's unused on all other archs

Bug#540610: rubygems: integrity violation

2009-08-09 Thread Daigo Moriwaki
this ticket. Regards, Daigo -- Daigo Moriwaki daigo at debian dot org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#540610: rubygems: integrity violation

2009-08-09 Thread Daigo Moriwaki
/1.8/bin/less So, /usr/bin/less is not overwritten. Debian's RubyGems is patched to replace the upstream's indiscriminate default directory. Regards, Daigo -- Daigo Moriwaki daigo at debian dot org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject

Bug#532689: DoS vulnerability in BigDecimal Ruby Library

2009-06-13 Thread Daigo Moriwaki
Hi Johannes, Thank you for the report. I am preparing a new release 1.8.7.173. Reminder: CVE-2009-1904 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1904 Regards, Daigo -- Daigo Moriwaki daigo at debian dot org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org

Bug#495320: rubygems1.8: Package name change causes data loss

2008-08-31 Thread Daigo Moriwaki
, Daigo - -- Daigo Moriwaki daigo at debian dot org -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAki601cACgkQNcPj+ukc0lCgkwCgmAZ280kPdHEp2/m1V4yn23C5 zswAnAlK/SZEGtv6QLoMGdXJLQnrtNPV =VExu -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED

Bug#494402: Multiple vulnerabilities found

2008-08-08 Thread Daigo Moriwaki
Package: ruby1.9 Version: 1.9.0.2-4 Severity: grave Tags: security The upstream has announced that they fixed multiple vulnerabilities[1]. * Several vulnerabilities in safe level * DoS vulnerability in WEBrick * Lack of taintness check in dl * DNS spoofing vulnerability in resolv.rb

Bug#494401: ruby1.8: New release (1.8.7-p71) with vulnerabilities fixes

2008-08-08 Thread Daigo Moriwaki
Package: ruby1.8 Version: 1.8.7.22-2 Severity: grave Tags: security A new version (1.8.7-p71) has been released and fixed multiple vulnerabilities[1]. * Several vulnerabilities in safe level * DoS vulnerability in WEBrick * Lack of taintness check in dl * DNS spoofing vulnerability in resolv.rb

Bug#487238: ruby1.8: Arbitrary code execution vulnerability and so on

2008-06-20 Thread Daigo Moriwaki
Package: ruby1.8 Version: 1.8.6.114-2 Severity: grave Tags: security Justification: user security hole The upstream has announced multiple vulnerabilities in Ruby. They may lead to a denial of service (DoS) condition or allow execution of arbitrary code. * CVE-2008-2662 * CVE-2008-2663 *

Bug#487239: ruby1.9: Arbitrary code execution vulnerability and so on

2008-06-20 Thread Daigo Moriwaki
Package: ruby1.9 Version: 1.9.0.1-5 Severity: grave Tags: security Justification: user security hole The upstream has announced multiple vulnerabilities in Ruby. They may lead to a denial of service (DoS) condition or allow execution of arbitrary code. * CVE-2008-2662 * CVE-2008-2663 *

Bug#466232: patch for 446232: add conflict to fix etch-lenny upgrade

2008-03-05 Thread Daigo Moriwaki
tags 466232 fixed thanks Thank you for the patch. It will be included in the up-coming release. Regards, Daigo -- Daigo Moriwaki daigo at debian dot org -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#469475: ruby1.8: File access vulnerability of WEBrick

2008-03-05 Thread Daigo Moriwaki
Package: ruby1.8 Version: 1.8.6.111-4 Severity: grave Tags: security Justification: user security hole WEBrick, a standard library of Ruby to implement HTTP servers, has file access vulnerability[1]. Attackers may access private files. The fixed versions have been released by the upstream.

Bug#469482: ruby1.9: File access vulnerability of WEBrick

2008-03-05 Thread Daigo Moriwaki
Package: ruby1.9 Version: 1.9.0+20071016-1 Severity: grave Tags: security Justification: user security hole WEBrick, a standard library of Ruby to implement HTTP servers, has file access vulnerability[1]. Attackers may access private files. The fixed versions have been released by the upstream.

Bug#403345: patch for 2.0.2+20060303-4.1

2007-01-12 Thread Daigo Moriwaki
+20060303-5 including the above patch, which is available at http://www.sgtpepper.net/hyspro/deb/unstable/ . Can I upload it to unstable? Thanks, Daigo - -- Daigo Moriwaki daigo at debian dot org -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFFqGcbNcPj

Bug#404001: Bug#404002: file conflicts between libgoogle-perftools0 and tau

2006-12-21 Thread Daigo Moriwaki
to select a different name - say, google-pprof. Would that seem reasonable ? Yes, it makes sense. I will change the file name. Thanks, Daigo -- Daigo Moriwaki daigo at debian dot org -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#403345: tdiary: Vulnerability has been reported

2006-12-16 Thread Daigo Moriwaki
Package: tdiary Version: 2.1.4-5 Severity: critical Tags: security Justification: root security hole Vulnerability has been reported in tDiary, which can be exploited by malicious people to run arbitary commands on web server. Input passed to unspecified parameters is not properly sanitised

Bug#397908: syscall workaround

2006-11-12 Thread Daigo Moriwaki
could not been compiled with kernel 2.6.18 about a month ago and asked the upstream, but have no response yet. I was really in trouble. I am glad to get your patch. I will try it. Thanks a lot. Yours, Daigo - -- Daigo Moriwaki daigo at debian dot org -BEGIN PGP SIGNATURE- Version: GnuPG

Bug#320325: why should security holes be blocked from testing?

2005-08-12 Thread Daigo Moriwaki
suggest downgrading this bug. The security holes were fixed in the previous version, tdiary-2.0.2-1, which I think was promoted to the testing, but not. Why is it gone? Anyway, I make this bug non-critical. Thanks, Daigo - -- Daigo Moriwaki [EMAIL PROTECTED] -BEGIN PGP SIGNATURE- Version

Bug#320325: tdiary: [dummy] Wait for the next release.

2005-07-28 Thread Daigo Moriwaki
Package: tdiary Version: 2.0.2+20050720-1 Severity: serious Justification: unknown This bug is dummy in order to keep the package from promoting to testing. As of this version a few modules have been removed because of a license issue on the upstream. It might be inconvenient for current

Bug#319315: tdiary: JVN#60776919 Cross Site Request Forgeries, CSRF

2005-07-23 Thread Daigo Moriwaki
team and do not have a reply. Thanks, Daigo - -- Daigo Moriwaki [EMAIL PROTECTED] -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFC4m2ANcPj+ukc0lARAn/1AJ9MDEZ1B47o3NuWFyixbL0ifr0biQCgxlAq yr6iJk+vXtKvNi9Ye4Y99AM= =a8gU -END PGP SIGNATURE- -- To UNSUBSCRIBE, email

Bug#307990: libzlib-ruby: Segmentation fault

2005-05-06 Thread Daigo Moriwaki
Package: libzlib-ruby Version: 0.6.0+ruby1.8.2-1 Severity: grave Justification: renders package unusable zlib of Ruby sometimes crashes with segmentation fault. Please see http://blade.nagaokaut.ac.jp/cgi-bin/scat.rb/ruby/ruby-core/4712. -- System Information: Debian Release: 3.1 APT prefers

Bug#294196: Russian manpage should move to /usr/share/man/ru

2005-02-14 Thread Daigo Moriwaki
Package: gnupg Version: 1.4.0-2 Followup-For: #294196 Tags: patch Attached a patch to rules. You feel this patch trivial. I am in the process of New Maintainer and creating a patch is my task. Thanks, Daigo -- Daigo Moriwaki [EMAIL PROTECTED] --- rules.orig 2005-02-14 19:34:17.0 +0900