Bug#506008: [grub-invaders] Fails to boot
Hello Robert, please have a look at #506008. I remember that we have discussed the affected lines before I asked you to upload the package. Can you imagine what went wrong? If you like, please NMU. Cheers, Fabian -- Dipl.-Phys. Fabian Greffrath Ruhr-Universität Bochum Lehrstuhl für Energieanlagen und Energieprozesstechnik (LEAT) Universitätsstr. 150, IB 3/134 D-44780 Bochum Telefon: +49 (0)234 / 32-26334 Fax: +49 (0)234 / 32-14227 E-Mail: [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#505446: mlocate always creates empty database
Sebastian Andrzej Siewior wrote: * Nigel Horne | 2008-11-18 21:35:14 [+]: According to your strace output it seems that mlocate skips your root device. Could you start |/usr/bin/updatedb.mlocate --debug-pruning and paste what you get? conf_block: prune_bind_mounts\000 you remove all bind mounts --- Rebuilding bind_mount_paths: `/', opts `rw,noatime,errors=remount-ro' `/lib/init/rw', opts `rw,nosuid,mode=0755' `/proc', opts `rw,noexec,nosuid,nodev' `/sys', opts `rw,noexec,nosuid,nodev' `/proc/bus/usb', opts `rw' `/dev', opts `rw,mode=0755' `/dev/shm', opts `rw,nosuid,nodev' `/dev/pts', opts `rw,noexec,nosuid,gid=5,mode=620' `/sys/fs/fuse/connections', opts `rw' `/home', opts `rw,noatime' `/mnt/c', opts `rw,allow_other,blksize=4096' `/mnt/d', opts `rw,allow_other,blksize=4096' `/', opts `rw,bind' = adding `/' `/home', opts `rw,bind' = adding `/home' `/var/lib/nfs/rpc_pipefs', opts `rw' `/net', opts `rw,fd=4,pgrp=3012,minproto=2,maxproto=4' `/smb', opts `rw,fd=4,pgrp=2980,minproto=2,maxproto=4' ...done Skipping `/': bind mount and your root is bind mounted. Your setup may be be broken somehow. I guess your / mount point is twice in /etc/mtab with ext3 and with a bind mount. Once you get rid of this, your mlocate will work again. Do you have a special fstab, initrd hooks or something else that would explain it? Maybe it is a leftover from an earlier install and will work once you remove that line. Its a clean installation, the disc was formatted before installation. If something is wrong it's nothing I've done! Here is my /etc/mtab /dev/sda6 / ext3 rw,noatime,errors=remount-ro 0 0 tmpfs /lib/init/rw tmpfs rw,nosuid,mode=0755 0 0 proc /proc proc rw,noexec,nosuid,nodev 0 0 sysfs /sys sysfs rw,noexec,nosuid,nodev 0 0 procbususb /proc/bus/usb usbfs rw 0 0 udev /dev tmpfs rw,mode=0755 0 0 tmpfs /dev/shm tmpfs rw,nosuid,nodev 0 0 devpts /dev/pts devpts rw,noexec,nosuid,gid=5,mode=620 0 0 fusectl /sys/fs/fuse/connections fusectl rw 0 0 /dev/sdb2 /home ext3 rw,noatime 0 0 /dev/sda2 /mnt/c fuseblk rw,allow_other,blksize=4096 0 0 /dev/sdb1 /mnt/d fuseblk rw,allow_other,blksize=4096 0 0 / / bind rw,bind 0 0 /home /home bind rw,bind 0 0 rpc_pipefs /var/lib/nfs/rpc_pipefs rpc_pipefs rw 0 0 automount(pid3573) /net autofs rw,fd=4,pgrp=3573,minproto=2,maxproto=4 0 0 automount(pid3544) /smb autofs rw,fd=4,pgrp=3544,minproto=2,maxproto=4 0 0 Sebastian -- Nigel Horne ClamAV, The Open-Source GPL Multi-Platform Anti-Virus tool-kit -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: unarchiving 495655
Processing commands for [EMAIL PROTECTED]: unarchive 495655 Bug 495655 [cpufreqd] cpufreqd: Fails to read battery info Unarchived Bug 495655 End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495655: not fixed in cpufreqd 2.3.3-3
reopen 495655 found 495655 2.3.3-3 thanks error messages: cpufreqd: get_class_device_attribute: couldn't open /sys/class/power_supply/C1ED/energy_full (No such file or directory) cpufreqd: get_class_device_attribute: couldn't open /sys/class/power_supply/C1ED/energy_now (No such file or directory) under /sys/class/power_supply/C1ED I can find charge_full and charge_now. Package Information: Package: cpufreqd Priority: optional Section: admin Installed-Size: 376 Maintainer: Mattia Dongili [EMAIL PROTECTED] Architecture: amd64 Version: 2.3.3-3 Depends: libc6 (= 2.7-1), libcpufreq0, libsensors3 (= 1:2.10.3-1), libsysfs2, lsb-base (= 3.0) Recommends: acpid Suggests: cpufrequtils Conflicts: cpudyn, powernowd Filename: pool/main/c/cpufreqd/cpufreqd_2.3.3-3_amd64.deb Size: 86048 MD5sum: a7586d4ecf39a083dc6352723c2f0c11 SHA1: 26f70179357ff135ebc7290dbf3a2871ee71c203 SHA256: 33fd69d99b1eed663c18fd096006c054330a0dd4838eaa4031acfd9071f69f1f -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Bug#495655: not fixed in cpufreqd 2.3.3-3
Processing commands for [EMAIL PROTECTED]: reopen 495655 Bug#495655: cpufreqd: Fails to read battery info 'reopen' may be inappropriate when a bug has been closed with a version; you may need to use 'found' to remove fixed versions. Bug reopened, originator not changed. found 495655 2.3.3-3 Bug#495655: cpufreqd: Fails to read battery info Bug marked as found in version 2.3.3-3. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#504373: Please unblock libtemplate-plugin-dbi-perl/2.64-1
On Tue, Nov 04, 2008 at 02:13:16PM -0600, Gunnar Wolf wrote: Dominic Hargreaves dijo [Tue, Nov 04, 2008 at 01:07:50PM +]: It was a deliberate decision not to proactively package Template::DBI based on the fact that no package used that functionality at the time (and presumably still doesn't). If it's now considered essential, then another option would be to repackage Template::DBI inside the main TT package as a high-urgency upload (and preparing a package for NEW) if that would make it more likely to be accepted by the release team. I am happy to do the work either as a NEW package for lenny or as described above, if there is consensus. Umh, IMHO it would be way cleaner and better to make this a new package. After all, the release team are not robots, and I guess that making this a clean solution will look much better in their eyes than clumping (hiding even?) a full module inside this package. Dear release team, As above, please could you unblock the humble new package libtemplate-plugin-dbi-perl/2.64-1 to help fix RC bug #504373. libtemplate-perl in etch contains version 2.63 of this module, and 2.64 contains only trivial changes, so I believe the possibility for regressions by including this module is very slight. Once you have confirmed this, an upload of libtemplate-perl to t-p-u will follow, adding the dependency on libtemplate-plugin-dbi-perl. Thanks, Dominic. -- Dominic Hargreaves | http://www.larted.org.uk/~dom/ PGP key 5178E2A5 from the.earth.li (keyserver,web,email) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#504528: libghc6-configfile-dev: Fails to configure: MissingH-1.0.1 doesn't exist
Hi John, On Tue, Nov 11, 2008 at 09:51:01PM +0100, Stefan Potyra wrote: simply rebuilding will make the maintainer scripts pickup the newer missingh dependency, and hence will fix this bug. However I haven't tested yet if haskell-configfile will still be functional with the later missingh (though doubt it isn't). adding calls to dh_haskell_depends would prevent further bug reports of this kind. It looks like it fixes the problem also in this case properly (i.e. adding sensible binary dependencies). Would you mind to add such calls to your debian/rules or look into adding it to dh_haskell? Kind regards, Philipp Kern signature.asc Description: Digital signature
Bug#502346: not fixed
This bug is _not_ fixed. Bastian -- Prepare for tomorrow -- get ready. -- Edith Keeler, The City On the Edge of Forever, stardate unknown -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#506008: [grub-invaders] Fails to boot
Le mercredi 19 novembre 2008 11:26:05, vous avez écrit : Hi! The proposed patch is wrong. I have no idea how it is supposed to fix the problem, but grub isn't supposed to perform UUID search for a partition unless it is going to be accessed (i.e. after user selection). Hi, I tend to agree and I still wonder why it didn't work, but note that this is what is done in /etc/grub.d/10_linux . That's why I proposed a patch doing the same. See my attached /boot/grub/grub.cfg and its relevant parts in 10_linux : set root=(hd0,1) search --fs-uuid --set 055ce214-7182-4b61-84e8-c831372d5e64 menuentry Debian GNU/Linux, linux 2.6.27-1-amd64 { (...) On Mon, Nov 17, 2008 at 07:11:02PM +0100, Didier Raboud wrote: While trying grub-pc, I went over grub-invaders. Installation went fine, but it failed to boot with an error like multiboot unknown (can't remember exactly). I need a better description of the problem before I can figure out what causes it. Please provide exact error, and a copy of your grub.cfg. You'll find attached a picture of my screen after having tried to boot invaders. You'll see (good eyes needed ;) ) : Booting 'GRUB Invaders' error: unknown command 'multiboot' Press any key to continue With my patch (even if wrong though), I am able to play 'GRUB invaders' with sound, colors and fullscreen ;) Regards, OdyX -- Didier Raboud, proud Debian user. CH-1802 Corseaux [EMAIL PROTECTED] # # DO NOT EDIT THIS FILE # # It is automatically generated by /usr/sbin/update-grub using templates # from /etc/grub.d and settings from /etc/default/grub # ### BEGIN /etc/grub.d/00_header ### set default=0 set timeout=5 set root=(hd0,1) search --fs-uuid --set 055ce214-7182-4b61-84e8-c831372d5e64 if font /grub/ascii.pff ; then set gfxmode=640x480 insmod gfxterm insmod vbe terminal gfxterm fi ### END /etc/grub.d/00_header ### ### BEGIN /etc/grub.d/05_debian_theme ### set root=(hd0,1) search --fs-uuid --set 055ce214-7182-4b61-84e8-c831372d5e64 insmod png if background_image /grub/moreblue-orbit-grub.png ; then set color_normal=black/black set color_highlight=magenta/black else set menu_color_normal=cyan/blue set menu_color_highlight=white/blue fi ### END /etc/grub.d/05_debian_theme ### ### BEGIN /etc/grub.d/10_hurd ### ### END /etc/grub.d/10_hurd ### ### BEGIN /etc/grub.d/10_linux ### set root=(hd0,1) search --fs-uuid --set 055ce214-7182-4b61-84e8-c831372d5e64 menuentry Debian GNU/Linux, linux 2.6.27-1-amd64 { linux /vmlinuz-2.6.27-1-amd64 root=/dev/mapper/Tamino-Root ro quiet vga=792 initrd /initrd.img-2.6.27-1-amd64 } menuentry Debian GNU/Linux, linux 2.6.27-1-amd64 (single-user mode) { linux /vmlinuz-2.6.27-1-amd64 root=/dev/mapper/Tamino-Root ro single quiet vga=792 initrd /initrd.img-2.6.27-1-amd64 } menuentry Debian GNU/Linux, linux 2.6.26-1-xen-amd64 { linux /vmlinuz-2.6.26-1-xen-amd64 root=/dev/mapper/Tamino-Root ro quiet vga=792 initrd /initrd.img-2.6.26-1-xen-amd64 } menuentry Debian GNU/Linux, linux 2.6.26-1-xen-amd64 (single-user mode) { linux /vmlinuz-2.6.26-1-xen-amd64 root=/dev/mapper/Tamino-Root ro single quiet vga=792 initrd /initrd.img-2.6.26-1-xen-amd64 } menuentry Debian GNU/Linux, linux 2.6.26-1-amd64 { linux /vmlinuz-2.6.26-1-amd64 root=/dev/mapper/Tamino-Root ro quiet vga=792 initrd /initrd.img-2.6.26-1-amd64 } menuentry Debian GNU/Linux, linux 2.6.26-1-amd64 (single-user mode) { linux /vmlinuz-2.6.26-1-amd64 root=/dev/mapper/Tamino-Root ro single quiet vga=792 initrd /initrd.img-2.6.26-1-amd64 } ### END /etc/grub.d/10_linux ### ### BEGIN /etc/grub.d/22_invaders ### menuentry GRUB Invaders { set root=(hd0,1) search --fs-uuid --set 055ce214-7182-4b61-84e8-c831372d5e64 multiboot /invaders } ### END /etc/grub.d/22_invaders ### ### BEGIN /etc/grub.d/30_os-prober ### ### END /etc/grub.d/30_os-prober ### attachment: 8AI90059.jpg signature.asc Description: This is a digitally signed message part.
Bug#506008: [grub-invaders] Fails to boot
On Wed, Nov 19, 2008 at 11:52:22AM +0100, Didier Raboud wrote: Le mercredi 19 novembre 2008 11:26:05, vous avez écrit : Hi! The proposed patch is wrong. I have no idea how it is supposed to fix the problem, but grub isn't supposed to perform UUID search for a partition unless it is going to be accessed (i.e. after user selection). Hi, I tend to agree and I still wonder why it didn't work, but note that this is what is done in /etc/grub.d/10_linux . That's why I proposed a patch doing the same. See my attached /boot/grub/grub.cfg and its relevant parts in 10_linux : set root=(hd0,1) search --fs-uuid --set 055ce214-7182-4b61-84e8-c831372d5e64 menuentry Debian GNU/Linux, linux 2.6.27-1-amd64 { (...) Note that this was a bug. It was fixed in: 2008-08-01 Robert Millan [EMAIL PROTECTED] * util/grub.d/10_linux.in: Use prepare_grub_to_access_device() from within menuentries, not before them. util/grub.d/10_hurd.in: Likewise. Not sure if it made it to Lenny. -- Robert Millan The DRM opt-in fallacy: Your data belongs to us. We will decide when (and how) you may access your data; but nobody's threatening your freedom: we still allow you to remove your data and not access it at all. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#505576: marked as done (lacks dependency on procps)
Your message dated Wed, 19 Nov 2008 11:47:05 + with message-id [EMAIL PROTECTED] and subject line Bug#505576: fixed in buffycli 0.2.1-3 has caused the Debian Bug report #505576, regarding lacks dependency on procps to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 505576: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505576 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: buffycli Version: 0.2.1-1 Severity: serious Tags: patch Commit 0c4e5e20a4c64231d612c24e88efe86e62f151fd in the Git repo fixes this. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.26-1-amd64 (SMP w/1 CPU core) Locale: LANG=en_GB, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages buffycli depends on: ii libbuffy-perl 0.9Perl wrapper for the libbuffy libr ii libtext-formattable-perl 1.01-3 Format text tables ii libtie-ixhash-perl1.21-2 ordered associative arrays for Per ii perl 5.10.0-17 Larry Wall's Practical Extraction buffycli recommends no packages. Versions of packages buffycli suggests: ii mutt 1.5.18-4 text-based mailreader supporting M ii offlineimap 6.0.3 IMAP/Maildir synchronization and r -- no debconf information -- .''`. martin f. krafft [EMAIL PROTECTED] : :' : proud Debian developer, author, administrator, and user `. `'` http://people.debian.org/~madduck - http://debiansystem.info `- Debian - when you have better things to do than fixing systems digital_signature_gpg.asc Description: Digital signature (see http://martin-krafft.net/gpg/) ---End Message--- ---BeginMessage--- Source: buffycli Source-Version: 0.2.1-3 We believe that the bug you reported is fixed in the latest version of buffycli, which is due to be installed in the Debian FTP archive: buffycli_0.2.1-3.diff.gz to pool/main/b/buffycli/buffycli_0.2.1-3.diff.gz buffycli_0.2.1-3.dsc to pool/main/b/buffycli/buffycli_0.2.1-3.dsc buffycli_0.2.1-3_all.deb to pool/main/b/buffycli/buffycli_0.2.1-3_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. martin f. krafft [EMAIL PROTECTED] (supplier of updated buffycli package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 19 Nov 2008 12:30:03 +0100 Source: buffycli Binary: buffycli Architecture: source all Version: 0.2.1-3 Distribution: unstable Urgency: low Maintainer: Penny Leach [EMAIL PROTECTED] Changed-By: martin f. krafft [EMAIL PROTECTED] Description: buffycli - a text mode alternative to Buffy Closes: 505576 Changes: buffycli (0.2.1-3) unstable; urgency=low . * Tame the drunken GNOMES in my computer and show them who's the real boss. Due to some _inexplicable_ reason, commits 1,3,4 of the four commits between -1 and -2 ended up in the source package, but the second commit, the one actually fixing the RC bug and adding the procps dependency, didn't. If this happens again, I will quit computers and take up gardening, or somesuch. Hm, tempting. Maybe the gnomes will think alike and come up again with something supernatural to prevent that this upload actually closes: #505576. Maybe they'll come staying up my chimney, and we'll be living on caviar and honey, hooray! Checksums-Sha1: 4d99222fc284109f3f99e84d9947aac91e3d 1110 buffycli_0.2.1-3.dsc b0543f37514418b98cba1fff528f3d247e616404 2623 buffycli_0.2.1-3.diff.gz 4d0ee79f77078a1253445ea69696219693d259de 10148 buffycli_0.2.1-3_all.deb Checksums-Sha256: 4bae57a8972eb2ac3f1d4bfae44461ddac42c44988d0a4406b9ce6484bc0cdab 1110 buffycli_0.2.1-3.dsc 547a868b53d107335fe5c99b786202d2febe12084ae934d4849691f8ba1ef4c7 2623 buffycli_0.2.1-3.diff.gz 105abd9622e4996ae0d1fd1734c7c5544a4d0b0a92160d5b081203dac38a7d9c 10148 buffycli_0.2.1-3_all.deb Files: 969126bbefcdd81059226a78ddef0177 1110 mail optional buffycli_0.2.1-3.dsc a634bfa2f23827a803fcd080c60fc603 2623 mail optional
Processed: severity of 506181 is important, tagging 506181
Processing commands for [EMAIL PROTECTED]: severity 506181 important Bug#506181: cups: Can't add local printers Severity set to `important' from `grave' tags 506181 unreproducible moreinfo Bug#506181: cups: Can't add local printers There were no tags set. Tags added: unreproducible, moreinfo End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#504167: T60
On Tue, Nov 04, 2008 at 04:37:25PM +0100, Jan Korbel wrote: Hmm after cca 10 compilations i can't resume even with vanilla 2.6.26.6 :( I'll try another one and 2.6.26.5 too. Can you try to use this patch? It is not nearly nice but the best guess. | --- a/kernel/time/tick-broadcast.c | +++ b/kernel/time/tick-broadcast.c | @@ -508,7 +508,7 @@ static void tick_broadcast_init_next_event(cpumask_t *mask, ktime_t expires) | void tick_broadcast_setup_oneshot(struct clock_event_device *bc) | { | /* Set it up only once ! */ | - if (bc-event_handler != tick_handle_oneshot_broadcast) { | + { | int was_periodic = bc-mode == CLOCK_EVT_MODE_PERIODIC; | int cpu = smp_processor_id(); | cpumask_t mask; Bastian -- The joys of love made her human and the agonies of love destroyed her. -- Spock, Requiem for Methuselah, stardate 5842.8 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#502346: [Pkg-virtualbox-devel] Bug#502346: not fixed
On Wed, Nov 19, 2008 at 12:26:24PM +0100, Bastian Blank wrote: This bug is _not_ fixed. Great email! Would you care to explain? This bug is about virtualbox-ose-modules package older than virtualbox-ose right? Sid atm has: virtualbox-ose 1.6.6-dfsg-3 virtualbox-ose-modules 2.6.26+1.6.6-dfsg-5 So where's the problem? Both are 1.6.6-dfsg. What do I miss? I do agree that we have to move the modules out of lme, but this is not what this bug is about. Okay, you could rename and all, but I'd prefer to report a new one for that. Also I'd very much prefer to make this change past Lenny. Michael -- Michael Meskes Michael at Fam-Meskes dot De, Michael at Meskes dot (De|Com|Net|Org) Michael at BorussiaFan dot De, Meskes at (Debian|Postgresql) dot Org ICQ: 179140304, AIM/Yahoo: michaelmeskes, Jabber: [EMAIL PROTECTED] Go VfL Borussia! Go SF 49ers! Use Debian GNU/Linux! Use PostgreSQL! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#504167: T60
On Wed, Nov 19, 2008 at 01:33:08PM +0100, Bastian Blank wrote: On Tue, Nov 04, 2008 at 04:37:25PM +0100, Jan Korbel wrote: Hmm after cca 10 compilations i can't resume even with vanilla 2.6.26.6 :( I'll try another one and 2.6.26.5 too. Can you try to use this patch? It is not nearly nice but the best guess. Better, try to apply aa276e1cafb3ce9d01d1e837bcd67e92616013ac. Bastian -- I have never understood the female capacity to avoid a direct answer to any question. -- Spock, This Side of Paradise, stardate 3417.3 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#506008: [grub-invaders] Fails to boot
Le mercredi 19 novembre 2008 12:45:03 Robert Millan, vous avez écrit : On Wed, Nov 19, 2008 at 11:52:22AM +0100, Didier Raboud wrote: Le mercredi 19 novembre 2008 11:26:05, vous avez écrit : Hi! The proposed patch is wrong. I have no idea how it is supposed to fix the problem, but grub isn't supposed to perform UUID search for a partition unless it is going to be accessed (i.e. after user selection). Hi, I tend to agree and I still wonder why it didn't work, but note that this is what is done in /etc/grub.d/10_linux . That's why I proposed a patch doing the same. See my attached /boot/grub/grub.cfg and its relevant parts in 10_linux : set root=(hd0,1) search --fs-uuid --set 055ce214-7182-4b61-84e8-c831372d5e64 menuentry Debian GNU/Linux, linux 2.6.27-1-amd64 { (...) Note that this was a bug. It was fixed in: 2008-08-01 Robert Millan [EMAIL PROTECTED] * util/grub.d/10_linux.in: Use prepare_grub_to_access_device() from within menuentries, not before them. util/grub.d/10_hurd.in: Likewise. Not sure if it made it to Lenny. Hi again, from reading the changelog.gz, I confirm that this should have made it to Lenny. After purging and reinstalling grub-pc from Lenny, 10_linux is still producing a similar entry as above. The mentioned bug (number ?) is then still open. I fear to try the change because if invaders fails, what tells me that my boot won't fail too ? What I see here on my laptop is that with the prepare_grub_to_access_device() outside of the entries, it works and with it being inside the entry for invaders, it fails. So ? Regards, OdyX -- Didier Raboud, proud Debian user. CH-1802 Corseaux [EMAIL PROTECTED] signature.asc Description: This is a digitally signed message part.
Bug#506008: [grub-invaders] Fails to boot
tags 506008 - patch thanks On Wed, Nov 19, 2008 at 08:57:54AM +0100, Fabian Greffrath wrote: Hello Robert, please have a look at #506008. I remember that we have discussed the affected lines before I asked you to upload the package. Can you imagine what went wrong? If you like, please NMU. Hi! The proposed patch is wrong. I have no idea how it is supposed to fix the problem, but grub isn't supposed to perform UUID search for a partition unless it is going to be accessed (i.e. after user selection). On Mon, Nov 17, 2008 at 07:11:02PM +0100, Didier Raboud wrote: While trying grub-pc, I went over grub-invaders. Installation went fine, but it failed to boot with an error like multiboot unknown (can't remember exactly). I need a better description of the problem before I can figure out what causes it. Please provide exact error, and a copy of your grub.cfg. -- Robert Millan The DRM opt-in fallacy: Your data belongs to us. We will decide when (and how) you may access your data; but nobody's threatening your freedom: we still allow you to remove your data and not access it at all. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#506170: marked as done (libfontconfig1: does not install)
Your message dated Wed, 19 Nov 2008 08:20:29 -0200 with message-id [EMAIL PROTECTED] and subject line #506170 isn't a bug has caused the Debian Bug report #506170, regarding libfontconfig1: does not install to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 506170: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506170 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: libfontconfig1 Severity: grave Justification: renders package unusable The following packages have unmet dependencies: libfontconfig1: Depends: fontconfig-config (= 2.6.0-2) but 2.6.0-3 is to be installed E: Broken packages -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash ---End Message--- ---BeginMessage--- Hi! You can't install libfontconfig1 because the new version of it is still not built yet on i386. Soon it will be available for your arch. This is not a bug, thus closing it. Best regards, Nelson ---End Message---
Processed: Re: [grub-invaders] Fails to boot
Processing commands for [EMAIL PROTECTED]: tags 506008 - patch Bug#506008: [grub-invaders] Fails to boot Tags were: patch Tags removed: patch thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#506181: [Pkg-cups-devel] Bug#506181: Various backends have the wrong permissions
Hello Chanoch, Chanoch (Ken) Bloom [2008-11-18 23:23 -0600]: After spending some time learning what the rootbackends-worldreadable.dpatch in expermental does, and learning what the code behind it does, I understand the problem. Please note that this patch has never been in unstable/testing, and I don't plan to upload it there before Lenny's release. The patch previously broke the backends which were supposed to run as root, such as lpd and ipp, but it never broke usb. It is fully fixed in experimental now. So rootbackends-worldreadable.dpatch is entirely unrelated to your problem, especially since you reported it against the unstable/lenny version. crw-rw 1 root lp6, 0 2008-11-18 08:10 /dev/lp0 crw-rw 1 root dialout 4, 64 2008-11-18 08:09 /dev/ttyS0 crw-rw 1 root dialout 4, 65 2008-11-18 08:09 /dev/ttyS1 crw-rw 1 root dialout 4, 66 2008-11-18 08:09 /dev/ttyS2 crw-rw 1 root dialout 4, 67 2008-11-18 08:09 /dev/ttyS3 crw-rw 1 root lp 180, 0 2008-11-18 08:09 /dev/usb/lp0 That looks normal. CUPS default permissions for running filters (including the backends) is to run in group lpadmin. No, it's lp, not lpadmin. Filters are always run as lp, backends installed with permissions 0755 are run as lp, and backends with permissions 0700 (or 0744 in experimental) are run as root. If I change the group that filters run in (adding the line Group lp in /etc/cups/cupsd.conf) then I can make the usb and parallel backends work. (But I can't make usb and parallel work at the same time as serial because they require different groups to run) I do see the issue with the serial backends. For that we probably need to make the serial backend run as root. Did you previously have a different Group statement in cupsd.conf? On a standard Debian system, the backends *are* run as lp, thus usb and parallel printers work. Therefore I downgrade this to important, since it does not affect all Debian users. Let's do a test whether backend permissions are wedged up for you. Please do this as root: echo -e '!/bin/sh\nid /tmp/cups-backend.txt' /usr/lib/cups/backend/test chmod 755 /usr/lib/cups/backend/test lpinfo -v Then please give me the output of cat /tmp/cups-backend.txt. It should say user/group lp, but maybe it is lpadmin for you for some reason. Also, what does id lp give for you? Afterwards, please remove the test backend again: rm /usr/lib/cups/backend/test Thanks, Martin -- Martin Pitt| http://www.piware.de Ubuntu Developer (www.ubuntu.com) | Debian Developer (www.debian.org) signature.asc Description: Digital signature
Bug#506206: haskell-configfile - needs to use dh_haskell_depends
Package: haskell-configfile Version: 1.0.4.3 Severity: serious According to several people haskell-configfile lacks calls to dh_haskell_depends to generate proper dependencies. Bastian -- No one may kill a man. Not for any purpose. It cannot be condoned. -- Kirk, Spock's Brain, stardate 5431.6 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: reopening 502346
Processing commands for [EMAIL PROTECTED]: reopen 502346 Bug#502346: virtualbox-ose-modules package older than virtualbox-ose Bug#502539: virtualbox-ose-modules-2.6.26-1-686 contains outdated module for VirtualBox Bug#504353: virtualbox-ose-modules-2.6.26-1-amd64 version mismatch on Lenny Bug reopened, originator not changed. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#504087: netmaze: FTBFS on ia64 (using -O2 for allmove.c, works)
* peter green [Wed, 19 Nov 2008 02:47:07 +]: Thanks, peter. John uploaded a fixed package with your patch. The good news is it built sucessfully on ia64 The bad news is it failed on alpha arm mips s390 and sparc due to a failure to install the build-depends. libfontconfig1: Depends: fontconfig-config (= 2.6.0-2) but 2.6.0-3 is to be installed Release team could you requeue it on those architectures with a dep-wait on libfontconfig1 = 2.6.0-3 Done, thanks. I have reproduced this failure on my qemu arm system and the culprit seems to be Should you not have had a qemu system handy, there are other means, eg.: http://chistera.yi.org/~adeodato/blog/106_fakeapt.html -- Adeodato Simó dato at net.com.org.es Debian Developer adeodato at debian.org Listening to: Dar Williams - What Do You Love More Than Love -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#504528: libghc6-configfile-dev: Fails to configure: MissingH-1.0.1 doesn't exist
Philipp Kern wrote: Hi John, On Tue, Nov 11, 2008 at 09:51:01PM +0100, Stefan Potyra wrote: simply rebuilding will make the maintainer scripts pickup the newer missingh dependency, and hence will fix this bug. However I haven't tested yet if haskell-configfile will still be functional with the later missingh (though doubt it isn't). adding calls to dh_haskell_depends would prevent further bug reports of this kind. It looks like it fixes the problem also in this case properly (i.e. adding sensible binary dependencies). Would you mind to add such calls to your debian/rules or look into adding it to dh_haskell? Hi Philipp, I hadn't actually noticed that command had been added. I'll take a look. I no longer maintain dh_haskell, FWIW. -- John Kind regards, Philipp Kern -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#504167: T60
Vanilla 2.6.26.6 with this patch is ok. I can resume notebook (and there is no delay). J. Bastian Blank wrote: Can you try to use this patch? It is not nearly nice but the best guess. | --- a/kernel/time/tick-broadcast.c | +++ b/kernel/time/tick-broadcast.c | @@ -508,7 +508,7 @@ static void tick_broadcast_init_next_event(cpumask_t *mask, ktime_t expires) | void tick_broadcast_setup_oneshot(struct clock_event_device *bc) | { | /* Set it up only once ! */ | - if (bc-event_handler != tick_handle_oneshot_broadcast) { | + { | int was_periodic = bc-mode == CLOCK_EVT_MODE_PERIODIC; | int cpu = smp_processor_id(); | cpumask_t mask; Bastian smime.p7s Description: S/MIME Cryptographic Signature
Bug#506222: open-vm-tools does not work with vmware v6.5
Package: open-vm-tools Version: 2008.10.10-123053-2 Severity: grave Justification: renders package unusable Hi Daniel, I found that the latest open-vm-tools does not work, at least with vmware v6.5. Neither clipboard copy/paste, nor host-share mounting work. As posted in, http://article.gmane.org/gmane.linux.debian.user/339037/ I had been able to use Open VMware Tools to copy/paste x-selections between VMware host and client via clipboard without any specify setup in other distros before. But not now. Also, host-share mounting does not work either. root:~# vmware-hgfsmounter .host:/ /mnt/hgfs/ Error: cannot mount filesystem: No such device root:~# vmware-hgfsclient share root:~# vmware-hgfsmounter .host:/share /mnt/hgfs/ Error: cannot mount filesystem: No such device My VMware: $ vmware -v VMware Workstation 6.5.0 build-118166 -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (300, 'testing'), (50, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.26-grml (SMP w/1 CPU core; PREEMPT) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/bash Versions of packages open-vm-tools depends on: ii libc6 2.7-13 GNU C Library: Shared libraries ii libdumbnet1 1.8-1.5A dumb, portable networking librar ii libgcc1 1:4.3.2-1 GCC support library ii libicu38 3.8.1-3International Components for Unico ii libstdc++64.3.2-1The GNU Standard C++ Library v3 ii procps1:3.2.7-8 /proc file system utilities Versions of packages open-vm-tools recommends: pn ethtool none (no description available) pn open-vm-sourcenone (no description available) pn zerofree none (no description available) Versions of packages open-vm-tools suggests: pn open-vm-toolbox none (no description available) -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#506206: haskell-configfile - needs to use dh_haskell_depends
severity 506206 important thanks You are correct, but that doesn't mean that the dependencies of the packages now existing in the archive are broken for lenny. Really, this just needs to be fixed for lenny+1. -- John Bastian Blank wrote: Package: haskell-configfile Version: 1.0.4.3 Severity: serious According to several people haskell-configfile lacks calls to dh_haskell_depends to generate proper dependencies. Bastian -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#499336: Delayed upload done
I asked a debian developer (kov) to upload the package, it fixes some serious known and unknown bugs and makes lintian happy =) It was a Delayed upload (4) and I taken the maintainership of the package. Thank you, -- Lincoln de Sousa - AlfaiaTI/MinasLivre xmpp:[EMAIL PROTECTED] http://alfaiati.net http://minaslivre.org +55 31 9209 4987 signature.asc Description: Digital signature
Processed: forcibly merging 504167 504761
Processing commands for [EMAIL PROTECTED]: forcemerge 504167 504761 Bug#504167: linux-2.6 - regression: fails to unblank on resume Bug#504761: linux-image-2.6.26-1-686: Usually fails to resume from suspend to ram on eeepc 1000 Forcibly Merged 504167 504761. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: reassign 504761 to linux-2.6, forcibly merging 504167 504761
Processing commands for [EMAIL PROTECTED]: reassign 504761 linux-2.6 Bug#504761: linux-image-2.6.26-1-686: Usually fails to resume from suspend to ram on eeepc 1000 Bug#504167: linux-2.6 - regression: fails to unblank on resume Bug reassigned from package `linux-image-2.6.26-1-686' to `linux-2.6'. forcemerge 504167 504761 Bug#504167: linux-2.6 - regression: fails to unblank on resume Bug#504761: linux-image-2.6.26-1-686: Usually fails to resume from suspend to ram on eeepc 1000 Forcibly Merged 504167 504761. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Changing severity of all ndiswrapper crashes to important
Processing commands for [EMAIL PROTECTED]: package ndiswrapper ndiswrapper-source ndiswrapper-utils-1.9 Ignoring bugs not assigned to: ndiswrapper-utils-1.9 ndiswrapper-source ndiswrapper # Setting them to important severity 505096 important Bug#505096: ndiswrapper-source: system freezes shortly after loading module Severity set to `important' from `critical' severity 431951 important Bug#431951: Module Crash Severity set to `important' from `normal' severity 465267 important Bug#465267: Ndiswrapper fails on resume with kernels = 2.6.23 Severity set to `important' from `normal' severity 471012 important Bug#471012: ndiswrapper module crash kernel amd64 2.6.24 and SMP Severity set to `important' from `normal' severity 494089 important Bug#494089: ndiswrapper module with USB 802.11b/g/n wireless crashes after a few minutes Severity set to `important' from `normal' # Bug related to the kernel module reassign 494089 ndiswrapper-source Bug#494089: ndiswrapper module with USB 802.11b/g/n wireless crashes after a few minutes Bug reassigned from package `ndiswrapper' to `ndiswrapper-source'. # Bug related to the utils reassign 356769 ndiswrapper-utils-1.9 Bug#356769: ndiswrapper-utils: Fails to detect manufaturer names in inf-file rendering unusable Bug reassigned from package `ndiswrapper' to `ndiswrapper-utils-1.9'. # I can confirm it, maybe we should get a # list of all affected versions, too. tag 356769 confirmed Bug#356769: ndiswrapper-utils: Fails to detect manufaturer names in inf-file rendering unusable There were no tags set. Tags added: confirmed found 356769 1.53-1 Bug#356769: ndiswrapper-utils: Fails to detect manufaturer names in inf-file rendering unusable Bug marked as found in version 1.53-1. found 356769 1.53-2 Bug#356769: ndiswrapper-utils: Fails to detect manufaturer names in inf-file rendering unusable Bug marked as found in version 1.53-2. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: tagging 504167
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.9.26 tags 504167 + pending Bug#504167: linux-2.6 - regression: fails to unblank on resume There were no tags set. Bug#504761: linux-image-2.6.26-1-686: Usually fails to resume from suspend to ram on eeepc 1000 Tags added: pending End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495655: marked as done (cpufreqd: Fails to read battery info)
Your message dated Thu, 20 Nov 2008 00:17:53 +0900 with message-id [EMAIL PROTECTED] and subject line Re: Bug#495655: not fixed in cpufreqd 2.3.3-3 has caused the Debian Bug report #495655, regarding cpufreqd: Fails to read battery info to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 495655: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495655 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: cpufreqd Version: 2.3.2-2 Severity: important cpufreqd fails to read battery info on my system because it tries to read files named energy_full and energy_now while the files are named charge_full and charge_now. The attached patch fixes this by trying the charge_* names of reading energy_* fails. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core) Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to pt_BR.UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages cpufreqd depends on: ii libc6 2.7-13 GNU C Library: Shared libraries ii libcpufreq0 004-2 shared library to deal with the cp ii libsensors3 1:2.10.7-1 library to read temperature/voltag ii libsysfs2 2.1.0-4interface library to sysfs ii lsb-base 3.2-19 Linux Standard Base 3.2 init scrip Versions of packages cpufreqd recommends: ii acpid 1.0.6-10 Utilities for using ACPI power man Versions of packages cpufreqd suggests: ii cpufrequtils 004-2 utilities to deal with the cpufreq -- no debconf information --- cpufreqd-2.3.2.orig/src/cpufreqd_acpi_battery.c +++ cpufreqd-2.3.2/src/cpufreqd_acpi_battery.c @@ -31,6 +31,8 @@ #define BATTERY_TYPE Battery #define ENERGY_FULL energy_full #define ENERGY_NOW energy_now +#define CHARGE_FULL charge_full +#define CHARGE_NOW charge_now #define PRESENT present #define STATUS status #define CURRENT_NOW current_now @@ -123,11 +125,20 @@ binfo-open = 1; binfo-energy_full = get_class_device_attribute(binfo-cdev, ENERGY_FULL); - if (!binfo-energy_full) - return -1; + if (!binfo-energy_full) { + /* try the charge_full name */ + binfo-energy_full = get_class_device_attribute(binfo-cdev, + CHARGE_FULL); + if (!binfo-energy_full) + return -1; + } binfo-energy_now = get_class_device_attribute(binfo-cdev, ENERGY_NOW); - if (!binfo-energy_now) - return -1; + if (!binfo-energy_now) { + /* try the charge_now name */ + binfo-energy_now = get_class_device_attribute(binfo-cdev, CHARGE_NOW); + if (!binfo-energy_now) + return -1; + } binfo-present = get_class_device_attribute(binfo-cdev, PRESENT); if (!binfo-present) return -1; ---End Message--- ---BeginMessage--- On Wed, Nov 19, 2008 at 10:09:38AM +0100, Dirk Mueller wrote: reopen 495655 found 495655 2.3.3-3 thanks error messages: cpufreqd: get_class_device_attribute: couldn't open /sys/class/power_supply/C1ED/energy_full (No such file or directory) cpufreqd: get_class_device_attribute: couldn't open /sys/class/power_supply/C1ED/energy_now (No such file or directory) under /sys/class/power_supply/C1ED I can find charge_full and charge_now. cpufrequd might be too verbose but it actually opens charge_now and charge_full after failing energy_* run it with -V7 and check yourself. thanks -- mattia :wq! ---End Message---
Bug#506008: [grub-invaders] Fails to boot
On Wed, Nov 19, 2008 at 02:19:38PM +0100, Didier Raboud wrote: Hi again, from reading the changelog.gz, I confirm that this should have made it to Lenny. After purging and reinstalling grub-pc from Lenny, 10_linux is still producing a similar entry as above. The mentioned bug (number ?) is then still open. I fear to try the change because if invaders fails, what tells me that my boot won't fail too ? It doesn't matter. It's a small bugfix, not worth backporting it. What I see here on my laptop is that with the prepare_grub_to_access_device() outside of the entries, it works and with it being inside the entry for invaders, it fails. Sounds like a GRUB bug to me. What version of grub-pc are you using? (make sure you have run grub-install on that version) Also, check: grep multiboot /boot/grub/command.lst -- Robert Millan The DRM opt-in fallacy: Your data belongs to us. We will decide when (and how) you may access your data; but nobody's threatening your freedom: we still allow you to remove your data and not access it at all. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#506008: [grub-invaders] Fails to boot
Le mercredi 19 novembre 2008 16:30:11 Robert Millan, vous avez écrit : On Wed, Nov 19, 2008 at 02:19:38PM +0100, Didier Raboud wrote: Hi again, from reading the changelog.gz, I confirm that this should have made it to Lenny. After purging and reinstalling grub-pc from Lenny, 10_linux is still producing a similar entry as above. The mentioned bug (number ?) is then still open. I fear to try the change because if invaders fails, what tells me that my boot won't fail too ? It doesn't matter. It's a small bugfix, not worth backporting it. It is in the changelog.gz, but the change is not in my package (my 10_linux is attached). What I see here on my laptop is that with the prepare_grub_to_access_device() outside of the entries, it works and with it being inside the entry for invaders, it fails. Sounds like a GRUB bug to me. What version of grub-pc are you using? (make sure you have run grub-install on that version) Done. $ LANG=C apt-cache policy grub-pc grub-pc: Installed: 1.96+20080724-12 Candidate: 1.96+20080724-12 Version table: 1.96+20081108-1 0 50 ftp://mirror.switch.ch experimental/main Packages *** 1.96+20080724-12 0 700 ftp://mirror.switch.ch testing/main Packages 600 ftp://mirror.switch.ch unstable/main Packages 100 /var/lib/dpkg/status Also, check: grep multiboot /boot/grub/command.lst $ grep multiboot /boot/grub/command.lst module: multiboot multiboot: multiboot After a closer look... The changed 10_linux is in the grub-common package in experimental. What stays is that in the actual state of things, grub-invaders is not bootable with grub-pc in Lenny. Regards, OdyX -- Didier Raboud, proud Debian user. CH-1802 Corseaux [EMAIL PROTECTED] 10_linux Description: application/shellscript signature.asc Description: This is a digitally signed message part.
Bug#506008: [grub-invaders] Fails to boot
Le mercredi 19 novembre 2008 16:30:11 Robert Millan, vous avez écrit : On Wed, Nov 19, 2008 at 02:19:38PM +0100, Didier Raboud wrote: Hi again, from reading the changelog.gz, I confirm that this should have made it to Lenny. After purging and reinstalling grub-pc from Lenny, 10_linux is still producing a similar entry as above. The mentioned bug (number ?) is then still open. I fear to try the change because if invaders fails, what tells me that my boot won't fail too ? It doesn't matter. It's a small bugfix, not worth backporting it. What I see here on my laptop is that with the prepare_grub_to_access_device() outside of the entries, it works and with it being inside the entry for invaders, it fails. Sounds like a GRUB bug to me. What version of grub-pc are you using? (make sure you have run grub-install on that version) Also, check: grep multiboot /boot/grub/command.lst OK. I begin to understand... ( #497791 ) The problem is that if you only run update-grub, grub-install device is not run automagically and will then put grub in a weird state. grub-install device should be run after each update-grub if I understand correctly - right ? Regards, OdyX -- Didier Raboud, proud Debian user. CH-1802 Corseaux [EMAIL PROTECTED] signature.asc Description: This is a digitally signed message part.
Bug#504726: marked as done (insecure /tmp dir)
Your message dated Wed, 19 Nov 2008 17:02:07 + with message-id [EMAIL PROTECTED] and subject line Bug#504726: fixed in universalindentgui 0.8.1-1.2 has caused the Debian Bug report #504726, regarding insecure /tmp dir to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 504726: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504726 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- X-Debbugs-CC: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package: universalindentgui Severity: serious Version: 0.8.1-1 Hi, as discussed for other packages and on debian-devel at great lengths, using fixed dirs in /tmp is not a good idea. Please be sure to fix this when you take care of #486577. Overall it might be more prudent to have universalindentgui wait for squeeze if it had little testing exposure (evidenced by the #486577, there must not have been a whole lot of testing going on). Kind regards T. -- Thomas Viehmann, http://thomas.viehmann.net/ ---End Message--- ---BeginMessage--- Source: universalindentgui Source-Version: 0.8.1-1.2 We believe that the bug you reported is fixed in the latest version of universalindentgui, which is due to be installed in the Debian FTP archive: universalindentgui_0.8.1-1.2.diff.gz to pool/main/u/universalindentgui/universalindentgui_0.8.1-1.2.diff.gz universalindentgui_0.8.1-1.2.dsc to pool/main/u/universalindentgui/universalindentgui_0.8.1-1.2.dsc universalindentgui_0.8.1-1.2_i386.deb to pool/main/u/universalindentgui/universalindentgui_0.8.1-1.2_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Eddy Petrișor [EMAIL PROTECTED] (supplier of updated universalindentgui package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 12 Nov 2008 01:34:23 +0200 Source: universalindentgui Binary: universalindentgui Architecture: source i386 Version: 0.8.1-1.2 Distribution: unstable Urgency: low Maintainer: Sebastian Pipping [EMAIL PROTECTED] Changed-By: Eddy Petrișor [EMAIL PROTECTED] Description: universalindentgui - GUI frontend for several code beautifiers Closes: 504726 Changes: universalindentgui (0.8.1-1.2) unstable; urgency=low . * Non-maintainer upload. * Avoid symlink attacks by using mkdtemp (Closes: 504726) Checksums-Sha1: 89585d95356d409cb28331bed427f9993cf3a3d6 1184 universalindentgui_0.8.1-1.2.dsc 69c190aabd5fb112e8cab85ea5b4c73b51c2c314 21866 universalindentgui_0.8.1-1.2.diff.gz 6440922465225ee0b20a53a78726825d1c67a719 576700 universalindentgui_0.8.1-1.2_i386.deb Checksums-Sha256: 562d180ebeadb8bf9ecb0bf04a04b1a1e9dc4aedcd37e78b0026587d18421183 1184 universalindentgui_0.8.1-1.2.dsc 9b480fbe5fde6002ed12d5edec6ad716b38db9df457df319b2b441d9a4a2a409 21866 universalindentgui_0.8.1-1.2.diff.gz 164869dbf48002947eb92008c8ff187d227ce4173e9ab5960c81cab73c593426 576700 universalindentgui_0.8.1-1.2_i386.deb Files: 33d0505d3bb65450231e0d7dc4169b9b 1184 devel optional universalindentgui_0.8.1-1.2.dsc 2d3fffe656b31d9dae4a0f0753faf4a8 21866 devel optional universalindentgui_0.8.1-1.2.diff.gz 8ab41a4d0d30be81ced1aa05232c151b 576700 devel optional universalindentgui_0.8.1-1.2_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkkkQv8ACgkQ5ItltUs5T34xyACgyjE1VyY+7Fj+N8hgc4ysTJ6w Mu8AmgJXaudoDXE4T6nwCA+aR/7M2WHC =sYeB -END PGP SIGNATURE- ---End Message---
Bug#486577: marked as done (universalindentgui: all indenters fail)
Your message dated Wed, 19 Nov 2008 19:37:55 +0200 with message-id [EMAIL PROTECTED] and subject line #486577 was also fixed by 0.8.1-1.2 has caused the Debian Bug report #486577, regarding universalindentgui: all indenters fail to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 486577: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=486577 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: universalindentgui Version: 0.8.1-1 Severity: normal Hello, when I tried the live preview of any file in universalindentgui, every indenter failed. The error message was always like this: Indenter returned with exit code: 255 Indent console output was: Couldn't Open Config File: /tmpUniversalIndentGUI/bcpp.cfg Read Docs For Configuration Settings Couldn't Open, or Create File indentinput.h Cleaning Up Dinner ... Done ! Callstring was: bcpp -fi indentinput.h -fnc /tmpUniversalIndentGUI/bcpp.cfg -fo indentoutput.h I think the problem is a missing slash after tmp in the path. While starting, it prints: tempDirctoryStr = /tmpUniversalIndentGUI which is probably causing the problem. Regards Jiri Palecek -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.24.3-test (SMP w/1 CPU core; PREEMPT) Locale: LANG=cs_CZ, LC_CTYPE=cs_CZ (charmap=ISO-8859-2) (ignored: LC_ALL set to cs_CZ) Shell: /bin/sh linked to /bin/dash Versions of packages universalindentgui depends on: ii libc6 2.7-3 GNU C Library: Shared libraries ii libgcc1 1:4.3.0-5 GCC support library ii libqscintilla2-3 2.2-1 The Qt4 port of the Scintilla sour ii libqt4-network4.4.0-2Qt 4 network module ii libqt4-script 4.4.0-2Qt 4 script module ii libqtcore44.4.0-2Qt 4 core module ii libqtgui4 4.4.0-2Qt 4 GUI module ii libstdc++64.3.0-5The GNU Standard C++ Library v3 Versions of packages universalindentgui recommends: ii astyle1.22-1 Source code indenter for C++/C/Jav ii bcpp 0.0.20050725-1 C(++) beautifier pn csstidy none (no description available) ii indent2.2.10-1 C language source code formatting ii tidy 20051018-1 HTML syntax checker and reformatte ii uncrustify0.44-1 C, C++, C#, D, Java and Pawn sourc -- no debconf information -- Using Opera's revolutionary e-mail client: http://www.opera.com/mail/ ---End Message--- ---BeginMessage--- Version: 0.8.1-1.2 Format: 1.8 Date: Wed, 12 Nov 2008 01:34:23 +0200 Source: universalindentgui Binary: universalindentgui Architecture: source amd64 Version: 0.8.1-1.2 Distribution: unstable Urgency: high Maintainer: Sebastian Pipping [EMAIL PROTECTED] Changed-By: Eddy Petrișor [EMAIL PROTECTED] Description: universalindentgui - GUI frontend for several code beautifiers Closes: 486577 504726 Changes: universalindentgui (0.8.1-1.2) unstable; urgency=low . * Avoid symlink attacks by using mkdtemp (Closes: 504726) . universalindentgui (0.8.1-1.1) unstable; urgency=high . * Non-maintainer upload. * urgency high since universalindentgui is actually useless by default (can be hacked to work by setting TMPDIR='/tmp/a') * fixed temporary path asamblation so indents can work (Closes: 486577) -- Regards, EddyP = Imagination is more important than knowledge A.Einstein ---End Message---
Processed: Re: Bug#506222: open-vm-tools does not work with vmware v6.5
Processing commands for [EMAIL PROTECTED]: severity 506222 important Bug#506222: open-vm-tools does not work with vmware v6.5 Severity set to `important' from `grave' thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#506008: [grub-invaders] Fails to boot
On Wed, Nov 19, 2008 at 05:03:10PM +0100, Didier Raboud wrote: OK. I begin to understand... ( #497791 ) The problem is that if you only run update-grub, grub-install device is not run automagically and will then put grub in a weird state. grub-install device should be run after each update-grub if I understand correctly - right ? grub-install should be run often, but only by the user. It's too risky to run automatically. So, to summarize, if you grub-install with the versions of grub-pc / grub-common in sid, invaders works, but if you grub-install with the ones in experimental, it doesn't? (disregard update-grub calls in this test, but make sure you're using /etc/grub.d/*_multiboot unmodified). -- Robert Millan The DRM opt-in fallacy: Your data belongs to us. We will decide when (and how) you may access your data; but nobody's threatening your freedom: we still allow you to remove your data and not access it at all. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#506031: NMU
Will upload the attached NMU fixing this problem unless the maintainer wishes otherwise. Dominic. -- Dominic Hargreaves | http://www.larted.org.uk/~dom/ PGP key 5178E2A5 from the.earth.li (keyserver,web,email) diff -u dovecot-1.0.15/debian/changelog dovecot-1.0.15/debian/changelog --- dovecot-1.0.15/debian/changelog +++ dovecot-1.0.15/debian/changelog @@ -1,3 +1,14 @@ +dovecot (1:1.0.15-2.3) unstable; urgency=medium + + * Non-maintainer upload + * Urgency medium due to RC bug fix + * Fix ManageSieve security hole virtual users can edit scripts of other +virtual users described at +http://dovecot.org/list/dovecot/2008-November/035259.html +(closes: #506031) + + -- Dominic Hargreaves [EMAIL PROTECTED] Wed, 19 Nov 2008 18:11:36 + + dovecot (1:1.0.15-2.2) unstable; urgency=medium * Non-maintainer upload diff -u dovecot-1.0.15/debian/patches/00list dovecot-1.0.15/debian/patches/00list --- dovecot-1.0.15/debian/patches/00list +++ dovecot-1.0.15/debian/patches/00list @@ -1,4 +1,5 @@ dovecot-MANAGESIEVE-9.3 +dovecot-1.0.15-managesieve-v9.3-security dovecot-example dovecot-sql dovecot-drac only in patch2: unchanged: --- dovecot-1.0.15.orig/debian/patches/dovecot-1.0.15-managesieve-v9.3-security.dpatch +++ dovecot-1.0.15/debian/patches/dovecot-1.0.15-managesieve-v9.3-security.dpatch @@ -0,0 +1,43 @@ +#! /bin/sh /usr/share/dpatch/dpatch-run +## dovecot-1.0.15-managesieve-v9.3-security.dpatch by +## Stephan Bosch [EMAIL PROTECTED] +## +## All lines beginning with `## DP:' are a description of the patch. +## DP: fix security hole in managesieve: virtual users can edit scripts +## DP: of other virtual users + [EMAIL PROTECTED]@ +diff -uNr --exclude=.hg dovecot-1.0.old/src/lib-sievestorage/sieve-save.c dovecot-1.0/src/lib-sievestorage/sieve-save.c +--- dovecot-1.0.old/src/lib-sievestorage/sieve-save.c 2008-11-17 16:45:54.0 +0100 dovecot-1.0/src/lib-sievestorage/sieve-save.c 2008-11-17 16:44:17.0 +0100 +@@ -154,6 +154,13 @@ + struct ostream *output; + const char *path; + ++ /* Disallow '/' characters in script name */ ++ if ( strchr(scriptname, '/') != NULL ) { ++ sieve_storage_set_error(storage, Invalid script name '%s'., ++ scriptname); ++ return NULL; ++ } ++ + /* Prevent overwriting the active script link when it resides in the + * sieve storage directory. + */ +diff -uNr --exclude=.hg dovecot-1.0.old/src/lib-sievestorage/sieve-script.c dovecot-1.0/src/lib-sievestorage/sieve-script.c +--- dovecot-1.0.old/src/lib-sievestorage/sieve-script.c 2008-11-17 16:45:54.0 +0100 dovecot-1.0/src/lib-sievestorage/sieve-script.c 2008-11-17 16:44:17.0 +0100 +@@ -93,6 +93,13 @@ + struct sieve_script *script; + const char *filename; + ++ /* Disallow '/' characters in script name */ ++ if ( strchr(scriptname, '/') != NULL ) { ++ sieve_storage_set_error(storage, Invalid script name '%s'., ++ scriptname); ++ return NULL; ++ } ++ + t_push(); + + filename = t_strconcat
Processed: bug 503383 is forwarded to http://rt.cpan.org/Ticket/Display.html?id=39689
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.10.35 forwarded 503383 http://rt.cpan.org/Ticket/Display.html?id=39689 Bug#503383: libkinosearch-perl - FTBFS: Expects signed char Noted your statement that Bug has been forwarded to http://rt.cpan.org/Ticket/Display.html?id=39689. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: tagging 503383
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.10.35 tags 503383 upstream Bug#503383: libkinosearch-perl - FTBFS: Expects signed char Tags were: upstream Tags added: upstream End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#506179: no-ip: remote code execution vulnerability
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I've pushed a fix[1] for this vulnerability, based on analysis of the exploit and the no-ip client code, and some limited local experiments. Note that I couldn't get a working reverse shell - I suspect the exploit itself is buggy, but I have no time to debug it... Thanks, Avi. [1]http://git.debian.org/?p=collab-maint/no-ip.git;a=commit;h=60ed93621ff36d9731ba5d9f9336d6eb91122302 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkkkYN8ACgkQwK8SobAxNVkBvgCfUlSZ6kxGrAGZYb7kfls7GzMG ZGMAoN04Qv0rHxuEtjopoK3bnx6+zFhx =RugG -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#504359: intent to NMU
Hi, I am uploading a 0-day NMU to fix this bug. debdiff attached and archived on: http://people.debian.org/~nion/nmu-diff/csound-5.08.2~dfsg-1_5.08.2~dfsg-1.1.patch Cheers Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. diff -u csound-5.08.2~dfsg/debian/changelog csound-5.08.2~dfsg/debian/changelog --- csound-5.08.2~dfsg/debian/changelog +++ csound-5.08.2~dfsg/debian/changelog @@ -1,3 +1,11 @@ +csound (1:5.08.2~dfsg-1.1) unstable; urgency=high + + * Non-maintainer upload by the Security Team. + * Fix insecure python search path by adding patch provided by +James Vega (No CVE id yet; Closes: #504359). + + -- Nico Golde [EMAIL PROTECTED] Wed, 19 Nov 2008 20:20:13 +0100 + csound (1:5.08.2~dfsg-1) unstable; urgency=low [ Jonas Smedegaard ] diff -u csound-5.08.2~dfsg/debian/patches/series csound-5.08.2~dfsg/debian/patches/series --- csound-5.08.2~dfsg/debian/patches/series +++ csound-5.08.2~dfsg/debian/patches/series @@ -3,6 +3,7 @@ 1001-fix-csoundac-amd64.diff 1002-type-punning.diff 1003-abi-plugin-dir.diff +1004-sanitize-sys.path.diff 2000-avoid-nonfree-scansyn-plugin.diff 2001-lua-link.diff 2002-csoundac.diff only in patch2: unchanged: --- csound-5.08.2~dfsg.orig/debian/patches/1004-sanitize-sys.path.diff +++ csound-5.08.2~dfsg/debian/patches/1004-sanitize-sys.path.diff @@ -0,0 +1,22 @@ +--- a/frontends/CsoundAC/Shell.cpp b/frontends/CsoundAC/Shell.cpp +@@ -211,6 +211,8 @@ namespace csound + void Shell::main(int argc, char **argv) + { + PySys_SetArgv_(argc, argv); ++/* Sanitize sys.path */ ++PyRun_SimpleString_(import sys; sys.path = filter(None, sys.path)); + } + + void Shell::initialize() +--- a/frontends/CsoundVST/ScoreGeneratorVst.cpp b/frontends/CsoundVST/ScoreGeneratorVst.cpp +@@ -427,6 +427,8 @@ + Shell::open(); + char *argv[] = {,}; + PySys_SetArgv(1, argv); ++ /* Sanitize sys.path */ ++ PyRun_SimpleString(import sys; sys.path = filter(None, sys.path)); + PyObject *mainModule = PyImport_ImportModule(__main__); + result = runScript(import sys\n); + if(result) pgp0ecTSaP2u7.pgp Description: PGP signature
Bug#505196: darcs patch: Added cl-ironclas dependency.
Wed Nov 19 20:29:46 CET 2008 Peter De Wachter [EMAIL PROTECTED] * Added cl-ironclas dependency. There's still one missing dependency: s-http-client (for the kpax-examples system), but that library isn't packaged yet. New patches: [Added cl-ironclas dependency. Peter De Wachter [EMAIL PROTECTED]**20081119192946 There's still one missing dependency: s-http-client (for the kpax-examples system), but that library isn't packaged yet. ] hunk ./debian/control 14 Package: cl-kpax Architecture: all -Depends: ${misc:Depends}, cl-who, cl-puri, cl-s-utils, cl-s-sysdeps, cl-s-base64, cl-s-http-server | cl-aserve +Depends: ${misc:Depends}, cl-who, cl-puri, cl-ironclad, cl-s-utils, cl-s-sysdeps, cl-s-base64, cl-s-http-server | cl-aserve Description: A Common Lisp Application Framework KPAX is a Common Lisp Web Application Framework. Although KPAX is quite mature and has been in production use for years, the documentation is currently not Context: [Updated Standard Version without real changes Peter Van Eynde [EMAIL PROTECTED] [Added Homepage field Peter Van Eynde [EMAIL PROTECTED] [Corrected Vcs-Darcs control field Peter Van Eynde [EMAIL PROTECTED] [Changed to group maintanance Peter Van Eynde [EMAIL PROTECTED] [TAG UPSTREAM_kpax_20080304 Peter Van Eynde [EMAIL PROTECTED] [redefined log flush logic Sven Van Caekenberghe [EMAIL PROTECTED]**20080304132247] [renamed a function Sven Van Caekenberghe [EMAIL PROTECTED]**20080304130549] [added some more deployed app maintenance code Sven Van Caekenberghe [EMAIL PROTECTED]**20080304111827] [fixes to allow pi to run without css Sven Van Caekenberghe [EMAIL PROTECTED]**20080303102624] [webapps now print full url when they start Sven Van Caekenberghe [EMAIL PROTECTED]**20080226130840] [added get-scheme and get-port to server protocol Sven Van Caekenberghe [EMAIL PROTECTED]**20080226130807] [logging changes from info to debug levels Sven Van Caekenberghe [EMAIL PROTECTED]**20080226124402] [documented logging levels Sven Van Caekenberghe [EMAIL PROTECTED]**20080226104352] [fixed example secure-login Sven Van Caekenberghe [EMAIL PROTECTED]**20080226104248] [more config stuff Sven Van Caekenberghe [EMAIL PROTECTED]**20080222183658] [fixed makefile for moved server Sven Van Caekenberghe [EMAIL PROTECTED]**20080222183538] [added response-size following s-http-server access logging changes Sven Van Caekenberghe [EMAIL PROTECTED]**20080222161312] [added response-status-translated Sven Van Caekenberghe [EMAIL PROTECTED]**20080222161041] [added some tools to manipulate a running server Sven Van Caekenberghe [EMAIL PROTECTED]**20080222133441] [changed spam protection system Sven Van Caekenberghe [EMAIL PROTECTED]**20070605120605] [bugfix added parsing protection Sven Van Caekenberghe [EMAIL PROTECTED]**20070604083954] [replaced a make-byte-vector usage Sven Van Caekenberghe [EMAIL PROTECTED]**20070601141531] [some security fixes Sven Van Caekenberghe [EMAIL PROTECTED]**20070530073701] [added cleanu-links function Sven Van Caekenberghe [EMAIL PROTECTED]**20070529131802] [added some spam proofing and cleanup features Sven Van Caekenberghe [EMAIL PROTECTED]**20070529121133] [Removed in-project md5, sha1 and hmac code and replaced it with a dependency on Ironclad Sven Van Caekenberghe [EMAIL PROTECTED]**20070524124522] [tried a patch from Nathan Froyd to no avail Sven Van Caekenberghe [EMAIL PROTECTED]**20070507090629] [added option to ignore non-ascii chars Sven Van Caekenberghe [EMAIL PROTECTED]**20070314121807] [ignore unicode chars silently Sven Van Caekenberghe [EMAIL PROTECTED]**20070314121740] [copy-stream improvements for CLISP Sven Van Caekenberghe [EMAIL PROTECTED]**20070312135822] [improved start/stop webapps logic Sven Van Caekenberghe [EMAIL PROTECTED]**2007031213] [take ignore-errors into account when stopping a webapp Sven Van Caekenberghe [EMAIL PROTECTED]**20070312135257] [lose the progn and print message earlier Sven Van Caekenberghe [EMAIL PROTECTED]**20070312135008] [we need :debug t with init-kpax also to enable all logging early on Sven Van Caekenberghe [EMAIL PROTECTED]**20070312134802] [fixed a dependency Sven Van Caekenberghe [EMAIL PROTECTED]**20070310082409] [added the case where there is no multiprocessing Sven Van Caekenberghe [EMAIL PROTECTED]**20070310082324] [improved s-http-server keep-alive and http-protocol handling Sven Van Caekenberghe [EMAIL PROTECTED]**20070307115336] [silence the s-http-server by default Sven Van Caekenberghe [EMAIL PROTECTED]**20070307112131] [changed default start-kpax behavior to use standalone s-http-server Sven Van Caekenberghe [EMAIL PROTECTED]**20070307111928] [deal better with missing backtrace Sven Van Caekenberghe [EMAIL PROTECTED]**20061127110628] [fixed get-secure-random-seed to deal correctly with missing dev random Sven Van Caekenberghe [EMAIL PROTECTED]**20061127110605] [extended error-hook with backtrace feature Sven Van Caekenberghe [EMAIL
Bug#454363: marked as done (GTK_IM_MODULE=XIM does not work)
Your message dated Wed, 19 Nov 2008 19:47:09 + with message-id [EMAIL PROTECTED] and subject line Bug#454363: fixed in fcitx 1:3.4.3-1.1 has caused the Debian Bug report #454363, regarding GTK_IM_MODULE=XIM does not work to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 454363: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454363 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: fcitx Version: 1:3.4.3-1 Severity: normal Tags: patch --- Please enter the report below this line. --- Hello, /etc/X11/xinit/xinput.d/fcitx contain `GTK_IM_MODULE=XIM', but this does not work, it should be `GTK_IM_MODULE=xim'. the patch: diff -ur fcitx-3.4.3.orig/debian/im-switch/fcitx fcitx-3.4.3/debian/im-switch/fcitx --- fcitx-3.4.3.orig/debian/im-switch/fcitx 2007-12-05 16:28:28.0 +0800 +++ fcitx-3.4.3/debian/im-switch/fcitx 2007-12-05 16:28:46.0 +0800 @@ -1,6 +1,6 @@ XIM=fcitx XIM_PROGRAM=/usr/bin/fcitx XIM_ARGS= -GTK_IM_MODULE=XIM +GTK_IM_MODULE=xim QT_IM_MODULE=XIM DEPENDS=fcitx --- System information. --- Architecture: i386 Kernel: Linux 2.6.22-3-686 Debian Release: 4.0 500 unstableanheng.com.cn 500 stable security.debian.org --- Package information. --- Depends (Version) | Installed ===-+-= libc6 (= 2.3.6-6) | 2.6.1-6 libfontconfig1 (= 2.4.0) | 2.4.91-1 libx11-6| 2:1.0.3-7 libxft2 ( 2.1.1) | 2.1.12-2 libxpm4 | 1:3.5.7-1 ---End Message--- ---BeginMessage--- Source: fcitx Source-Version: 1:3.4.3-1.1 We believe that the bug you reported is fixed in the latest version of fcitx, which is due to be installed in the Debian FTP archive: fcitx_3.4.3-1.1.diff.gz to pool/main/f/fcitx/fcitx_3.4.3-1.1.diff.gz fcitx_3.4.3-1.1.dsc to pool/main/f/fcitx/fcitx_3.4.3-1.1.dsc fcitx_3.4.3-1.1_i386.deb to pool/main/f/fcitx/fcitx_3.4.3-1.1_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Barry deFreese [EMAIL PROTECTED] (supplier of updated fcitx package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 19 Nov 2008 12:31:10 -0500 Source: fcitx Binary: fcitx Architecture: source i386 Version: 1:3.4.3-1.1 Distribution: unstable Urgency: low Maintainer: Yu Guanghui [EMAIL PROTECTED] Changed-By: Barry deFreese [EMAIL PROTECTED] Description: fcitx - Free Chinese Input Toy for X (XIM) Closes: 454363 Changes: fcitx (1:3.4.3-1.1) unstable; urgency=low . * Non-maintainer upload. [ LI Daobing ] * fix lintian error: - build-depends-on-obsolete-package build-depends: x-dev - declares-possibly-conflicting-debhelper-compat-versions rules=5 compat=5 * fix im-switch conf file (Closes: #454363) [ Barry deFreese ] * Make clean not ignore errors. * Add copyright holders in debian/copyright. * Add watch file. * Add Homepage in source stanza. * Bump Standards Version to 3.8.0. (No changes needed). Checksums-Sha1: 7a5cb9ac8a742844823147e4c00c8b6433803e4f 1022 fcitx_3.4.3-1.1.dsc 8fab291212fb4b69368aee025595d0d1dd97fb62 85066 fcitx_3.4.3-1.1.diff.gz a91a5aa57c75207dad28c6f6e902409ddc97ca05 3290676 fcitx_3.4.3-1.1_i386.deb Checksums-Sha256: 0c83e7818399739b179b232fbc071f63b3a8baa944ef984fa6c10322632d615d 1022 fcitx_3.4.3-1.1.dsc 7b334d0a47753353e95f246ce74c26c51d002d756c71abf37136cf5b75cee2c0 85066 fcitx_3.4.3-1.1.diff.gz c60e9f719b4368fa7aad502d259deec25c17bb9d58249f66362456552e080528 3290676 fcitx_3.4.3-1.1_i386.deb Files: b924d6d5d8a63e652ea4482877fb2404 1022 utils optional fcitx_3.4.3-1.1.dsc 67f9596b3454486aa7e5067d8209e202 85066 utils optional fcitx_3.4.3-1.1.diff.gz 2913f0709074be8dcdbd668359137280 3290676 utils optional fcitx_3.4.3-1.1_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkkkacgACgkQ5ItltUs5T36djgCgmapyXz5CbvQaby0biOlvai6D tsMAoI/C0G0plJRO23F7LTTAFyMmksH4 =w117 -END PGP SIGNATURE- ---End Message---
Bug#504359: marked as done (csound: Python scripts load modules from current directory)
Your message dated Wed, 19 Nov 2008 19:47:05 + with message-id [EMAIL PROTECTED] and subject line Bug#504359: fixed in csound 1:5.08.2~dfsg-1.1 has caused the Debian Bug report #504359, regarding csound: Python scripts load modules from current directory to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 504359: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504359 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: csound Version: 1:5.08.2~dfsg-1 Severity: grave Tags: security patch Justification: user security hole Usertags: pythonpath csound's python interface calls PySys_SetArgv with an argv[0] that doesn't resolve to a filename. This causes Python to prepend sys.path with an empty string which, due to the use of relative imports, allows the possibility to run arbitrary code on the user's system if a file in their working directory matches the name of a python module csound tries to import. This should be fixed by Python 2.6 as it uses absolute imports by default, but I have not been able to test it and this still needs a fix for packages built against/used with the currently supported versions of Python. -- James GPG Key: 1024D/61326D40 2003-09-02 James Vega [EMAIL PROTECTED] --- a/frontends/CsoundAC/Shell.cpp +++ b/frontends/CsoundAC/Shell.cpp @@ -211,6 +211,8 @@ namespace csound void Shell::main(int argc, char **argv) { PySys_SetArgv_(argc, argv); +/* Sanitize sys.path */ +PyRun_SimpleString_(import sys; sys.path = filter(None, sys.path)); } void Shell::initialize() --- a/frontends/CsoundVST/ScoreGeneratorVst.cpp +++ b/frontends/CsoundVST/ScoreGeneratorVst.cpp @@ -427,6 +427,8 @@ Shell::open(); char *argv[] = {,}; PySys_SetArgv(1, argv); + /* Sanitize sys.path */ + PyRun_SimpleString(import sys; sys.path = filter(None, sys.path)); PyObject *mainModule = PyImport_ImportModule(__main__); result = runScript(import sys\n); if(result) signature.asc Description: Digital signature ---End Message--- ---BeginMessage--- Source: csound Source-Version: 1:5.08.2~dfsg-1.1 We believe that the bug you reported is fixed in the latest version of csound, which is due to be installed in the Debian FTP archive: csladspa_5.08.2~dfsg-1.1_amd64.deb to pool/main/c/csound/csladspa_5.08.2~dfsg-1.1_amd64.deb csound-gui_5.08.2~dfsg-1.1_amd64.deb to pool/main/c/csound/csound-gui_5.08.2~dfsg-1.1_amd64.deb csound-utils_5.08.2~dfsg-1.1_amd64.deb to pool/main/c/csound/csound-utils_5.08.2~dfsg-1.1_amd64.deb csound_5.08.2~dfsg-1.1.diff.gz to pool/main/c/csound/csound_5.08.2~dfsg-1.1.diff.gz csound_5.08.2~dfsg-1.1.dsc to pool/main/c/csound/csound_5.08.2~dfsg-1.1.dsc csound_5.08.2~dfsg-1.1_amd64.deb to pool/main/c/csound/csound_5.08.2~dfsg-1.1_amd64.deb libcsnd-java_5.08.2~dfsg-1.1_amd64.deb to pool/main/c/csound/libcsnd-java_5.08.2~dfsg-1.1_amd64.deb libcsnd5.1_5.08.2~dfsg-1.1_amd64.deb to pool/main/c/csound/libcsnd5.1_5.08.2~dfsg-1.1_amd64.deb libcsound64-5.1_5.08.2~dfsg-1.1_amd64.deb to pool/main/c/csound/libcsound64-5.1_5.08.2~dfsg-1.1_amd64.deb libcsound64-dev_5.08.2~dfsg-1.1_all.deb to pool/main/c/csound/libcsound64-dev_5.08.2~dfsg-1.1_all.deb libcsound64-doc_5.08.2~dfsg-1.1_all.deb to pool/main/c/csound/libcsound64-doc_5.08.2~dfsg-1.1_all.deb libcsoundac5.1_5.08.2~dfsg-1.1_amd64.deb to pool/main/c/csound/libcsoundac5.1_5.08.2~dfsg-1.1_amd64.deb pd-csound_5.08.2~dfsg-1.1_amd64.deb to pool/main/c/csound/pd-csound_5.08.2~dfsg-1.1_amd64.deb python-csound_5.08.2~dfsg-1.1_amd64.deb to pool/main/c/csound/python-csound_5.08.2~dfsg-1.1_amd64.deb python-csoundac_5.08.2~dfsg-1.1_amd64.deb to pool/main/c/csound/python-csoundac_5.08.2~dfsg-1.1_amd64.deb tclcsound_5.08.2~dfsg-1.1_amd64.deb to pool/main/c/csound/tclcsound_5.08.2~dfsg-1.1_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Nico Golde [EMAIL PROTECTED] (supplier of updated csound package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 19 Nov 2008 20:20:13 +0100 Source: csound Binary: csound csound-gui csound-utils libcsound64-5.1 libcsnd-java libcsound64-dev pd-csound python-csound libcsnd5.1
Bug#506058: Tested
On Tue, 18 Nov 2008 11:59:47 +0100 Patrick Matthäi [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello, I tried to reproduce it with a pure Lenny/i386 without success, could you maybe give more informations on this? Hmmm... I did a fresh install (standard system) then added a pile of packages, including gkrellmd. When I tried to start gkrellmd it had the problems described (actually it might be the other bug that was the problem; that is failing to start when already started, but when I did ps aux|grep gkrellmd nothing came up except the grep). In order to fix it I tried to find what was wrong by running gkrellmd manually (i.e. /usr/bin/gkrellmd instead of /etc/init.d/gkrellmd start) after which /etc/init.d/gkrellmd started. I don't know what else to tell you as I can't reinstall on that system because it is in use. -- And that's my crabbing done for the day. Got it out of the way early, now I have the rest of the afternoon to sniff fragrant tea-roses or strangle cute bunnies or something. -- Michael Devore GnuPG Key Fingerprint 86 F5 81 A5 D4 2E 1F 1C http://gnupg.org The C Shore: http://www.wightman.ca/~cshore signature.asc Description: PGP signature
Bug#505197: [Pkg-trac-devel] Bug#505197: SA32652: Trac Multiple Vulnerabilities
Hi all! First, thanks for your upload. I was intended to get that done last sunday, but i got sick and only got things done again today. This shall never happen again, thank you all. Luis Matos Em 11/17/2008, Dominic Hargreaves [EMAIL PROTECTED] escreveu: On Sun, Nov 16, 2008 at 06:54:32PM +0100, Giuseppe Iuculano wrote: I've prepared a NMU to fix this bug. Debdiff in attachment. The package can be found on mentors.debian.net: - URL: http://mentors.debian.net/debian/pool/main/t/trac - Source repository: deb-src http://mentors.debian.net/debian unstable main contrib non-free - dget http://mentors.debian.net/debian/pool/main/t/trac/trac_0.11.1-2.1.dsc Uploaded to DELAYED/1-day. Cheers, Dominic. -- Dominic Hargreaves | http://www.larted.org.uk/~dom/ PGP key 5178E2A5 from the.earth.li (keyserver,web,email) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#504359: intent to NMU
El 19/11/08 16:35 Nico Golde escribió: Hi, I am uploading a 0-day NMU to fix this bug. Thanks for the NMU. I have the fixed applied in the git repository, but haven't uploaded yet due to issues with new upstream version. Note that this bug was fixed in a t-p-u upload, since this version can't migrate. Saludos, Felipe Sateler signature.asc Description: This is a digitally signed message part.
Bug#505446: mlocate always creates empty database
* Nigel Horne | 2008-11-19 08:12:19 [+]: Its a clean installation, the disc was formatted before installation. If something is wrong it's nothing I've done! Here is my /etc/mtab /dev/sda6 / ext3 rw,noatime,errors=remount-ro 0 0 tmpfs /lib/init/rw tmpfs rw,nosuid,mode=0755 0 0 proc /proc proc rw,noexec,nosuid,nodev 0 0 sysfs /sys sysfs rw,noexec,nosuid,nodev 0 0 procbususb /proc/bus/usb usbfs rw 0 0 udev /dev tmpfs rw,mode=0755 0 0 tmpfs /dev/shm tmpfs rw,nosuid,nodev 0 0 devpts /dev/pts devpts rw,noexec,nosuid,gid=5,mode=620 0 0 fusectl /sys/fs/fuse/connections fusectl rw 0 0 /dev/sdb2 /home ext3 rw,noatime 0 0 /dev/sda2 /mnt/c fuseblk rw,allow_other,blksize=4096 0 0 /dev/sdb1 /mnt/d fuseblk rw,allow_other,blksize=4096 0 0 / / bind rw,bind 0 0 /home /home bind rw,bind 0 0 rpc_pipefs /var/lib/nfs/rpc_pipefs rpc_pipefs rw 0 0 automount(pid3573) /net autofs rw,fd=4,pgrp=3573,minproto=2,maxproto=4 0 0 automount(pid3544) /smb autofs rw,fd=4,pgrp=3544,minproto=2,maxproto=4 0 0 You have your / and /home mounted onto itself + you have automount on /net and /smb. This is not part of the a standard installation. Either you have it by accident in your fstab or a chroot mount script went wrong. I guess the latter. Does your /proc/mounts contain a line like |tmpfs / tmpfs rw,size=10240k,mode=755 0 0 ? If so, than this is a *valid* bind mount. Sebastian -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#505714: libimlib2-dev: another imlib2 xpm buffer overflow
Package: libimlib2-dev Version: 1.4.0-1.1 Tags: security Followup-For: Bug #505714 This is another buffer overflow in the XPM loader. (The xpm attached to this bug report is a 32x32 image according to the header, but contains 33x32 pixels.) --- a/src/modules/loaders/loader_xpm.c +++ b/src/modules/loaders/loader_xpm.c @@ -246,8 +246,8 @@ return 0; } ptr = im-data; -end = ptr + (sizeof(DATA32) * w * h); pixels = w * h; +end = ptr + pixels; } else { -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: tagging 505196
Processing commands for [EMAIL PROTECTED]: tags 505196 + patch Bug#505196: incomplete list for dependencies for cl-kpax There were no tags set. Tags added: patch End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: tagging 505714
Processing commands for [EMAIL PROTECTED]: tags 505714 + security patch Bug#505714: Crash on loading XPM file There were no tags set. Tags added: security, patch End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#489045: cups: infinite loop, 100%CPU use, while trying to print with HPJetDirect
1.3.9-5 seems to be working for me!!! thank you very much! On Mon, 2008-11-17 at 11:44 +0100, Martin Pitt wrote: Martin Pitt [2008-11-16 16:59 +0100]: Upstream committed a different patch: http://www.cups.org/strfiles/3001/str3001.patch This patch is now included in 1.3.9-5, which just got uploaded to experimental. Can you guys please test this version? If it works, I need to push that to unstable and lenny, too, but the window for that gets smaller every day. Thank you! Martin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#506258: dpkg doesn't handle symlinks to directories as directory
Package: dpkg Version: 1.13.25 Severity: serious Justification: Policy 6.6 After mailing the dpkg mailing list, I was instructed that I should file a bug, so here it is: In the php5 package, the current situation is that /etc/php5/cgi/conf.d is a symlink to /etc/php5/conf.d; By failing to know that, we in a local package installed a file under /etc/php5/cgi/conf.d/admin.ini, which went on without any problem. But due that the php5 package had been updated, a problem arised, which resulted in following error: (Reading database ... 28064 files and directories currently installed.) Preparing to replace php5-cgi 5.2.0-8+etch11 (using /php5-cgi_5.2.0-8+etch13_powerpc.deb) ... Unpacking replacement php5-cgi ... dpkg: error processing /var/cache/apt/archives/php5-cgi_5.2.0-8+etch13_powerpc.deb (--unpack): trying to overwrite `/etc/php5/cgi/conf.d', which is also in package bubba-frontend Errors were encountered while processing: /var/cache/apt/archives/php5-cgi_5.2.0-8+etch13_powerpc.deb E: Sub-process /usr/bin/dpkg returned an error code (1) After some discussion at #debian-devel, a pinter to section 6.6 point 4 in the policy where given, and that the point in particular was in effect for etch as well, which states: A directory will never be replaced by a symbolic link to a directory or vice versa; instead, the existing state (symlink or not) will be left alone and dpkg will follow the symlink if there is one. My interpreation of the policy is that the above error shouln't arise, even though we should have installed the config file under /etc/php5/conf.d anyway, as it wouldn't make any runtime difference (somewhat a bug in the php5 packages). So I ask you if this is an bug, or that out interpreation of the poliy is lousy at best. Above is all related to Etch, and I don't know if this error is present in lenny/sid. /Carl -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core) Locale: LANG=sv_SE.UTF-8, LC_CTYPE=sv_SE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#506261: enscript: Buffer overflows
Package: enscript Version: 1.6.4-12 Severity: grave Tags: security Justification: user security hole Hi, buffer overflows have been discovered in enscript: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3863 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4306 I'm attaching a patch by Werner Fink of SuSE covering these issues. Cheers, Moritz -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core) Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) Shell: /bin/sh linked to /bin/bash Versions of packages enscript depends on: ii libc62.7-15 GNU C Library: Shared libraries ii libpaper11.1.23+nmu1 library for handling paper charact enscript recommends no packages. Versions of packages enscript suggests: ii ghostscript [postscript- 8.62.dfsg.1-3.1 The GPL Ghostscript PostScript/PDF ii lpr 1:2008.05.17BSD lpr/lpd line printer spooling -- no debconf information --- src/psgen.c +++ src/psgen.c 2008-10-29 10:43:08.512598143 +0100 @@ -24,6 +24,7 @@ * Boston, MA 02111-1307, USA. */ +#include limits.h #include gsint.h /* @@ -124,7 +125,7 @@ struct gs_token_st double xscale; double yscale; int llx, lly, urx, ury; /* Bounding box. */ - char filename[512]; + char filename[PATH_MAX]; char *skipbuf; unsigned int skipbuf_len; unsigned int skipbuf_pos; @@ -135,11 +136,11 @@ struct gs_token_st Color bgcolor; struct { - char name[512]; + char name[PATH_MAX]; FontPoint size; InputEncoding encoding; } font; - char filename[512]; + char filename[PATH_MAX]; } u; }; @@ -248,7 +249,7 @@ static int do_print = 1; static int user_fontp = 0; /* The user [EMAIL PROTECTED] font. */ -static char user_font_name[256]; +static char user_font_name[PATH_MAX]; static FontPoint user_font_pt; static InputEncoding user_font_encoding; @@ -978,7 +979,8 @@ large for page\n), FATAL ((stderr, _(user font encoding can be only the system's default or `ps'))); - strcpy (user_font_name, token.u.font.name); + memset (user_font_name, 0, sizeof(user_font_name)); + strncpy (user_font_name, token.u.font.name, sizeof(user_font_name) - 1); user_font_pt.w = token.u.font.size.w; user_font_pt.h = token.u.font.size.h; user_font_encoding = token.u.font.encoding; @@ -1444,7 +1446,7 @@ read_special_escape (InputStream *is, To buf[i] = ch; if (i + 1 = sizeof (buf)) FATAL ((stderr, _(too long argument for %s escape:\n%.*s), - escapes[i].name, i, buf)); + escapes[e].name, i, buf)); } buf[i] = '\0'; @@ -1452,7 +1454,8 @@ read_special_escape (InputStream *is, To switch (escapes[e].escape) { case ESC_FONT: - strcpy (token-u.font.name, buf); + memset (token-u.font.name, 0, sizeof(token-u.font.name)); + strncpy (token-u.font.name, buf, sizeof(token-u.font.name) - 1); /* Check for the default font. */ if (strcmp (token-u.font.name, default) == 0) @@ -1465,7 +1468,8 @@ read_special_escape (InputStream *is, To FATAL ((stderr, _(malformed font spec for [EMAIL PROTECTED] escape: %s), token-u.font.name)); - strcpy (token-u.font.name, cp); + memset (token-u.font.name, 0, sizeof(token-u.font.name)); + strncpy (token-u.font.name, cp, sizeof(token-u.font.name) - 1); xfree (cp); } token-type = tFONT; @@ -1544,7 +1548,8 @@ read_special_escape (InputStream *is, To break; case ESC_SETFILENAME: - strcpy (token-u.filename, buf); + memset (token-u.filename, 0, sizeof(token-u.font.name)); + strncpy (token-u.filename, buf, sizeof(token-u.filename) - 1); token-type = tSETFILENAME; break;
Bug#506261: enscript: Buffer overflows
* Moritz Muehlenhoff: Hi, buffer overflows have been discovered in enscript: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3863 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4306 I'm attaching a patch by Werner Fink of SuSE covering these issues. While you are at it, please update the manpage regarding the espf special escape (command execution is no longer possible). -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#506261: enscript: Buffer overflows
On Wed, 2008-11-19 at 23:29 +0100, Moritz Muehlenhoff wrote: Package: enscript Version: 1.6.4-12 Severity: grave Tags: security Justification: user security hole Hi, buffer overflows have been discovered in enscript: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3863 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4306 I'm attaching a patch by Werner Fink of SuSE covering these issues. Thanks. There go my hopes for a quiet lenny release. :) I'm just building a patched package. I can look at the manpage issue as well, but it's quite late here. -- Tim Retout [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#506261: enscript: Buffer overflows
On Wed, 2008-11-19 at 23:29 +0100, Moritz Muehlenhoff wrote: I'm attaching a patch by Werner Fink of SuSE covering these issues. How does this debdiff look? -- Tim Retout [EMAIL PROTECTED] diff -u enscript-1.6.4/debian/patches/series enscript-1.6.4/debian/patches/series --- enscript-1.6.4/debian/patches/series +++ enscript-1.6.4/debian/patches/series @@ -24,0 +25 @@ +506261-buffer-overflows diff -u enscript-1.6.4/debian/changelog enscript-1.6.4/debian/changelog --- enscript-1.6.4/debian/changelog +++ enscript-1.6.4/debian/changelog @@ -1,3 +1,11 @@ +enscript (1.6.4-13) unstable; urgency=high + + * debian/patches/506261-buffer-overflows: New patch by Werner Fink to fix +buffer overflows. (Closes: #506261) + * Urgency set to high for RC security bugfix. + + -- Tim Retout [EMAIL PROTECTED] Wed, 19 Nov 2008 22:45:35 + + enscript (1.6.4-12) unstable; urgency=low * New maintainer. (Closes: #413482) only in patch2: unchanged: --- enscript-1.6.4.orig/debian/patches/506261-buffer-overflows +++ enscript-1.6.4/debian/patches/506261-buffer-overflows @@ -0,0 +1,96 @@ +Patch by Werner Fink. See Debian bug #506261. + + +Index: enscript-1.6.4/src/psgen.c +=== +--- enscript-1.6.4.orig/src/psgen.c 2008-11-19 22:49:31.0 + enscript-1.6.4/src/psgen.c 2008-11-19 22:49:36.0 + +@@ -24,6 +24,7 @@ + * Boston, MA 02111-1307, USA. + */ + ++#include limits.h + #include gsint.h + + /* +@@ -124,7 +125,7 @@ + double xscale; + double yscale; + int llx, lly, urx, ury; /* Bounding box. */ +- char filename[512]; ++ char filename[PATH_MAX]; + char *skipbuf; + unsigned int skipbuf_len; + unsigned int skipbuf_pos; +@@ -135,11 +136,11 @@ + Color bgcolor; + struct + { +- char name[512]; ++ char name[PATH_MAX]; + FontPoint size; + InputEncoding encoding; + } font; +- char filename[512]; ++ char filename[PATH_MAX]; + } u; + }; + +@@ -248,7 +249,7 @@ + static int user_fontp = 0; + + /* The user [EMAIL PROTECTED] font. */ +-static char user_font_name[256]; ++static char user_font_name[PATH_MAX]; + static FontPoint user_font_pt; + static InputEncoding user_font_encoding; + +@@ -978,7 +979,8 @@ + FATAL ((stderr, + _(user font encoding can be only the system's default or `ps'))); + +- strcpy (user_font_name, token.u.font.name); ++ memset (user_font_name, 0, sizeof(user_font_name)); ++ strncpy (user_font_name, token.u.font.name, sizeof(user_font_name) - 1); + user_font_pt.w = token.u.font.size.w; + user_font_pt.h = token.u.font.size.h; + user_font_encoding = token.u.font.encoding; +@@ -1444,7 +1446,7 @@ + buf[i] = ch; + if (i + 1 = sizeof (buf)) + FATAL ((stderr, _(too long argument for %s escape:\n%.*s), +- escapes[i].name, i, buf)); ++ escapes[e].name, i, buf)); + } + buf[i] = '\0'; + +@@ -1452,7 +1454,8 @@ + switch (escapes[e].escape) + { + case ESC_FONT: +- strcpy (token-u.font.name, buf); ++ memset (token-u.font.name, 0, sizeof(token-u.font.name)); ++ strncpy (token-u.font.name, buf, sizeof(token-u.font.name) - 1); + + /* Check for the default font. */ + if (strcmp (token-u.font.name, default) == 0) +@@ -1465,7 +1468,8 @@ + FATAL ((stderr, _(malformed font spec for [EMAIL PROTECTED] escape: %s), + token-u.font.name)); + +- strcpy (token-u.font.name, cp); ++ memset (token-u.font.name, 0, sizeof(token-u.font.name)); ++ strncpy (token-u.font.name, cp, sizeof(token-u.font.name) - 1); + xfree (cp); + } + token-type = tFONT; +@@ -1544,7 +1548,8 @@ + break; + + case ESC_SETFILENAME: +- strcpy (token-u.filename, buf); ++ memset (token-u.filename, 0, sizeof(token-u.font.name)); ++ strncpy (token-u.filename, buf, sizeof(token-u.filename) - 1); + token-type = tSETFILENAME; + break; + signature.asc Description: This is a digitally signed message part
Processed: portmap
Processing commands for [EMAIL PROTECTED]: severity 504867 serious Bug#504867: Update to portmap_6.0-7 does not work / hangs Severity set to `serious' from `important' severity 504305 serious Bug#504305: portmap/loopback: true is not honored by init script Bug#506207: portmap is not correctly started Severity set to `serious' from `normal' tags 504867 + pending Bug#504867: Update to portmap_6.0-7 does not work / hangs There were no tags set. Tags added: pending tags 504305 + pending Bug#504305: portmap/loopback: true is not honored by init script Tags were: patch Bug#506207: portmap is not correctly started Tags added: pending End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#490893: initscripts: reboot fails to unmount '/'
On Wed, Nov 12, 2008 at 10:17:34AM +0500, Subhashis Roy wrote: I have checked that despite update of 'portmap' initscript, the Bug#490893 is still reproducible. I couldn't reproduce this bug. Please try version 6.0-8 to see if it fixes this bug. signature.asc Description: Digital signature
Bug#504305: marked as done (portmap/loopback: true is not honored by init script)
Your message dated Thu, 20 Nov 2008 00:47:04 + with message-id [EMAIL PROTECTED] and subject line Bug#506207: fixed in portmap 6.0-8 has caused the Debian Bug report #506207, regarding portmap/loopback: true is not honored by init script to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 506207: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506207 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: portmap Version: 6.0-7 Severity: normal Tags: patch *** Please type your report below this line *** Dear Anibal, the debconf setting portmap/loopback: true is not honored anymore by the init script. It is correctly applied to /etc/defaults/portmap, but portmap still binds to all interfaces. Apparently in /etc/init.d/portmap, the function pidofproc starts portmap, but does not receive the $OPTIONS variable as the start-stop-daemin does. This can be fixed by passing the option here: --- /etc/init.d/portmap 2008-10-27 00:53:10.0 +0100 +++ portmap 2008-11-02 19:01:09.0 +0100 @@ -30,7 +30,7 @@ case $1 in start) log_begin_msg Starting portmap daemon... - pid=pidofproc portmap + pid=pidofproc portmap $OPTIONS if [ -n $pid ] ; then log_begin_msg Already running. log_end_msg 0 I am not sure if this is not really a bug of init-functions, though. Cheers Jan -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (101, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.26-1-686-bigmem (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages portmap depends on: ii debconf [debconf-2.0] 1.5.24 Debian configuration management sy ii libc6 2.7-15 GNU C Library: Shared libraries ii libwrap0 7.6.q-16 Wietse Venema's TCP wrappers libra ii lsb-base 3.2-20 Linux Standard Base 3.2 init scrip portmap recommends no packages. portmap suggests no packages. -- debconf information: * portmap/loopback: true ---End Message--- ---BeginMessage--- Source: portmap Source-Version: 6.0-8 We believe that the bug you reported is fixed in the latest version of portmap, which is due to be installed in the Debian FTP archive: portmap_6.0-8.diff.gz to pool/main/p/portmap/portmap_6.0-8.diff.gz portmap_6.0-8.dsc to pool/main/p/portmap/portmap_6.0-8.dsc portmap_6.0-8_i386.deb to pool/main/p/portmap/portmap_6.0-8_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Anibal Monsalve Salazar [EMAIL PROTECTED] (supplier of updated portmap package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 20 Nov 2008 10:01:57 +1100 Source: portmap Binary: portmap Architecture: source i386 Version: 6.0-8 Distribution: unstable Urgency: high Maintainer: Anibal Monsalve Salazar [EMAIL PROTECTED] Changed-By: Anibal Monsalve Salazar [EMAIL PROTECTED] Description: portmap- RPC port mapper Closes: 504867 506207 506207 Changes: portmap (6.0-8) unstable; urgency=high . * Fix the fix for #448470; patch by Juan Cespedes; closes: #506207, #506207 * Replace pidof with pidofproc in postinst; closes: #504867 Checksums-Sha1: 7b71fdf824f9dfa15d6d5153732f91374feab794 1049 portmap_6.0-8.dsc 7315ff799568549f682d6148278c8a8ce98e22bb 26006 portmap_6.0-8.diff.gz 23ec21152eeed6c5175844722a7bb63819155139 35836 portmap_6.0-8_i386.deb Checksums-Sha256: 630d68e42649ab749243f8b3969dffabc26053b7b4df0e116daa559e8027b395 1049 portmap_6.0-8.dsc 8288379e32db7cbfa6233ee1717229bba5340dbad59007788fd0f247c747870a 26006 portmap_6.0-8.diff.gz f7cc122776627f8ddcf99a6aebc0a15d1444eb139a46099151ef4fdf6344d947 35836 portmap_6.0-8_i386.deb Files: 6bcc6b7b1f44c48e6cbf7adf4d6cb604 1049 net standard portmap_6.0-8.dsc a05422ac894a7cbd7bf0342342a40126 26006 net standard portmap_6.0-8.diff.gz 181995c2ed79e9af0163cd5f6f1415d4 35836 net standard portmap_6.0-8_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux)
Bug#506207: marked as done (portmap is not correctly started)
Your message dated Thu, 20 Nov 2008 00:47:04 + with message-id [EMAIL PROTECTED] and subject line Bug#506207: fixed in portmap 6.0-8 has caused the Debian Bug report #506207, regarding portmap is not correctly started to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 506207: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506207 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: portmap Version: 6.0-7 In file /etc/init.d/portmap, when doing a start, there is a check to see if portmap is already running. The check currently looks like this: pid=pidofproc portmap But, of course, it should be: pid=`pidofproc portmap` Right now, it always tries to start portmap in that line, without specifying any potions, even if there are in /etc/default/portmap, and even if it is already running. Thanks, -- Juan Cespedes http://www.cespedes.org/ ---End Message--- ---BeginMessage--- Source: portmap Source-Version: 6.0-8 We believe that the bug you reported is fixed in the latest version of portmap, which is due to be installed in the Debian FTP archive: portmap_6.0-8.diff.gz to pool/main/p/portmap/portmap_6.0-8.diff.gz portmap_6.0-8.dsc to pool/main/p/portmap/portmap_6.0-8.dsc portmap_6.0-8_i386.deb to pool/main/p/portmap/portmap_6.0-8_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Anibal Monsalve Salazar [EMAIL PROTECTED] (supplier of updated portmap package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 20 Nov 2008 10:01:57 +1100 Source: portmap Binary: portmap Architecture: source i386 Version: 6.0-8 Distribution: unstable Urgency: high Maintainer: Anibal Monsalve Salazar [EMAIL PROTECTED] Changed-By: Anibal Monsalve Salazar [EMAIL PROTECTED] Description: portmap- RPC port mapper Closes: 504867 506207 506207 Changes: portmap (6.0-8) unstable; urgency=high . * Fix the fix for #448470; patch by Juan Cespedes; closes: #506207, #506207 * Replace pidof with pidofproc in postinst; closes: #504867 Checksums-Sha1: 7b71fdf824f9dfa15d6d5153732f91374feab794 1049 portmap_6.0-8.dsc 7315ff799568549f682d6148278c8a8ce98e22bb 26006 portmap_6.0-8.diff.gz 23ec21152eeed6c5175844722a7bb63819155139 35836 portmap_6.0-8_i386.deb Checksums-Sha256: 630d68e42649ab749243f8b3969dffabc26053b7b4df0e116daa559e8027b395 1049 portmap_6.0-8.dsc 8288379e32db7cbfa6233ee1717229bba5340dbad59007788fd0f247c747870a 26006 portmap_6.0-8.diff.gz f7cc122776627f8ddcf99a6aebc0a15d1444eb139a46099151ef4fdf6344d947 35836 portmap_6.0-8_i386.deb Files: 6bcc6b7b1f44c48e6cbf7adf4d6cb604 1049 net standard portmap_6.0-8.dsc a05422ac894a7cbd7bf0342342a40126 26006 net standard portmap_6.0-8.diff.gz 181995c2ed79e9af0163cd5f6f1415d4 35836 net standard portmap_6.0-8_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkkksL8ACgkQgY5NIXPNpFWyyQCgzS/iWPGNuRC7jSNEnqCcaOg2 0eoAn3tHH7hrOJMaYXULTdvxAP8Vd1LV =KGQS -END PGP SIGNATURE- ---End Message---
Bug#504867: marked as done (Update to portmap_6.0-7 does not work / hangs)
Your message dated Thu, 20 Nov 2008 00:47:04 + with message-id [EMAIL PROTECTED] and subject line Bug#504867: fixed in portmap 6.0-8 has caused the Debian Bug report #504867, regarding Update to portmap_6.0-7 does not work / hangs to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 504867: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504867 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: portmap Version: 6.0-6 Severity: important If I want to upgrade my system via apt-get upgrade, apt-get hangs when trying to install the new version of portmap (6.0-7). It stops at the point Preparing to replace portmap. If I interrupt apt-get with Strg+C, it says: Warning, old pre-removal-script was killed. dpkg - try to use the script in the new package. Stopping portmap-deamon. Again, it hangs (is not able to stop the deamon). After killing it again with Strg+C dpkg reports, that there has been problem while upgrading. E: Sub-process /usr/bin/dpkg returned an error code (1) If you need any further informations, please contact me. The error-messages might not be the exactly correct ones, since I translated them from german back to english. -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.26-1-686 (SMP w/2 CPU cores) Locale: LANG=de_AT.UTF-8, LC_CTYPE=de_AT.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages portmap depends on: ii debconf [debconf-2.0] 1.5.22 Debian configuration management sy ii libc6 2.7-15 GNU C Library: Shared libraries ii libwrap0 7.6.q-16 Wietse Venema's TCP wrappers libra ii lsb-base 3.2-20 Linux Standard Base 3.2 init scrip portmap recommends no packages. portmap suggests no packages. -- debconf information: portmap/loopback: false ---End Message--- ---BeginMessage--- Source: portmap Source-Version: 6.0-8 We believe that the bug you reported is fixed in the latest version of portmap, which is due to be installed in the Debian FTP archive: portmap_6.0-8.diff.gz to pool/main/p/portmap/portmap_6.0-8.diff.gz portmap_6.0-8.dsc to pool/main/p/portmap/portmap_6.0-8.dsc portmap_6.0-8_i386.deb to pool/main/p/portmap/portmap_6.0-8_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Anibal Monsalve Salazar [EMAIL PROTECTED] (supplier of updated portmap package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 20 Nov 2008 10:01:57 +1100 Source: portmap Binary: portmap Architecture: source i386 Version: 6.0-8 Distribution: unstable Urgency: high Maintainer: Anibal Monsalve Salazar [EMAIL PROTECTED] Changed-By: Anibal Monsalve Salazar [EMAIL PROTECTED] Description: portmap- RPC port mapper Closes: 504867 506207 506207 Changes: portmap (6.0-8) unstable; urgency=high . * Fix the fix for #448470; patch by Juan Cespedes; closes: #506207, #506207 * Replace pidof with pidofproc in postinst; closes: #504867 Checksums-Sha1: 7b71fdf824f9dfa15d6d5153732f91374feab794 1049 portmap_6.0-8.dsc 7315ff799568549f682d6148278c8a8ce98e22bb 26006 portmap_6.0-8.diff.gz 23ec21152eeed6c5175844722a7bb63819155139 35836 portmap_6.0-8_i386.deb Checksums-Sha256: 630d68e42649ab749243f8b3969dffabc26053b7b4df0e116daa559e8027b395 1049 portmap_6.0-8.dsc 8288379e32db7cbfa6233ee1717229bba5340dbad59007788fd0f247c747870a 26006 portmap_6.0-8.diff.gz f7cc122776627f8ddcf99a6aebc0a15d1444eb139a46099151ef4fdf6344d947 35836 portmap_6.0-8_i386.deb Files: 6bcc6b7b1f44c48e6cbf7adf4d6cb604 1049 net standard portmap_6.0-8.dsc a05422ac894a7cbd7bf0342342a40126 26006 net standard portmap_6.0-8.diff.gz 181995c2ed79e9af0163cd5f6f1415d4 35836 net standard portmap_6.0-8_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkkksL8ACgkQgY5NIXPNpFWyyQCgzS/iWPGNuRC7jSNEnqCcaOg2 0eoAn3tHH7hrOJMaYXULTdvxAP8Vd1LV =KGQS -END PGP SIGNATURE- ---End Message---
Bug#506268: CVE-2008-5160: allows remote attackers to cause a denial of service (daemon crash) via multiple invalid requests
Package: msp-webserver Severity: grave Version: 0.8.11-2 Tags: security Hi, The following CVE (Common Vulnerabilities Exposures) id was published for msp-webserver. CVE-2008-5160[1]: Unspecified vulnerability in MyServer 0.8.11 allows remote attackers to cause a denial of service (daemon crash) via multiple invalid requests with the HTTP GET, DELETE, OPTIONS, and possibly other methods, related to a 204 No Content error. If you fix the vulnerability please also make sure to include the CVE id in the changelog entry. [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5160 http://security-tracker.debian.net/tracker/CVE-2008-5160 Cheers, -- Raphael Geissert - Debian Maintainer www.debian.org - get.debian.net signature.asc Description: This is a digitally signed message part.
Bug#506258: marked as done (dpkg doesn't handle symlinks to directories as directory)
Your message dated Thu, 20 Nov 2008 03:58:29 +0200 with message-id [EMAIL PROTECTED] and subject line Re: Bug#506258: dpkg doesn't handle symlinks to directories as directory has caused the Debian Bug report #506258, regarding dpkg doesn't handle symlinks to directories as directory to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 506258: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506258 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: dpkg Version: 1.13.25 Severity: serious Justification: Policy 6.6 After mailing the dpkg mailing list, I was instructed that I should file a bug, so here it is: In the php5 package, the current situation is that /etc/php5/cgi/conf.d is a symlink to /etc/php5/conf.d; By failing to know that, we in a local package installed a file under /etc/php5/cgi/conf.d/admin.ini, which went on without any problem. But due that the php5 package had been updated, a problem arised, which resulted in following error: (Reading database ... 28064 files and directories currently installed.) Preparing to replace php5-cgi 5.2.0-8+etch11 (using /php5-cgi_5.2.0-8+etch13_powerpc.deb) ... Unpacking replacement php5-cgi ... dpkg: error processing /var/cache/apt/archives/php5-cgi_5.2.0-8+etch13_powerpc.deb (--unpack): trying to overwrite `/etc/php5/cgi/conf.d', which is also in package bubba-frontend Errors were encountered while processing: /var/cache/apt/archives/php5-cgi_5.2.0-8+etch13_powerpc.deb E: Sub-process /usr/bin/dpkg returned an error code (1) After some discussion at #debian-devel, a pinter to section 6.6 point 4 in the policy where given, and that the point in particular was in effect for etch as well, which states: A directory will never be replaced by a symbolic link to a directory or vice versa; instead, the existing state (symlink or not) will be left alone and dpkg will follow the symlink if there is one. My interpreation of the policy is that the above error shouln't arise, even though we should have installed the config file under /etc/php5/conf.d anyway, as it wouldn't make any runtime difference (somewhat a bug in the php5 packages). So I ask you if this is an bug, or that out interpreation of the poliy is lousy at best. Above is all related to Etch, and I don't know if this error is present in lenny/sid. /Carl -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core) Locale: LANG=sv_SE.UTF-8, LC_CTYPE=sv_SE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash ---End Message--- ---BeginMessage--- Version: 1.14.6 On Wed, 2008-11-19 at 23:13:23 +0100, Carl Fürstenberg wrote: Package: dpkg Version: 1.13.25 Severity: serious Justification: Policy 6.6 In the php5 package, the current situation is that /etc/php5/cgi/conf.d is a symlink to /etc/php5/conf.d; By failing to know that, we in a local package installed a file under /etc/php5/cgi/conf.d/admin.ini, which went on without any problem. But due that the php5 package had been updated, a problem arised, which resulted in following error: (Reading database ... 28064 files and directories currently installed.) Preparing to replace php5-cgi 5.2.0-8+etch11 (using /php5-cgi_5.2.0-8+etch13_powerpc.deb) ... Unpacking replacement php5-cgi ... dpkg: error processing /var/cache/apt/archives/php5-cgi_5.2.0-8+etch13_powerpc.deb (--unpack): trying to overwrite `/etc/php5/cgi/conf.d', which is also in package bubba-frontend Errors were encountered while processing: /var/cache/apt/archives/php5-cgi_5.2.0-8+etch13_powerpc.deb E: Sub-process /usr/bin/dpkg returned an error code (1) After some discussion at #debian-devel, a pinter to section 6.6 point 4 in the policy where given, and that the point in particular was in effect for etch as well, which states: A directory will never be replaced by a symbolic link to a directory or vice versa; instead, the existing state (symlink or not) will be left alone and dpkg will follow the symlink if there is one. My interpreation of the policy is that the above error shouln't arise, even though we should have installed the config file under /etc/php5/conf.d anyway, as it wouldn't make any runtime difference (somewhat a bug in the php5 packages). So I ask you if this is an bug, or that out interpreation of the poliy is lousy at best. Above is all
Bug#496411: #496411: nothing was fixed at all
found 496411 20060918-3 found 496411 20081031+dfsg-1 thanks I have found all of the reported issues in BOTH versions marked as fixed. Please stop blindly closing this report and *do verify* everything is fixed. Attached are the results of a quick grep on both packages. Regards, -- Raphael Geissert - Debian Maintainer www.debian.org - get.debian.net grep -r /tmp/ -A5 -B5 usr/lib/debian-test/tests/linux/ 2/dev/null | cut -d/ -f8- rwtest01%f ns-udpsender matches test_1_to_1_nonblock matches test_1_to_1_connectx matches test_1_to_1_socket_bind_listen matches opts_e matches -- nfsstress- nfsstress-# Setting the NFS to version 2 with UDP by default nfsstress-PID=$$ nfsstress-VERSION=${VERSION:=2} nfsstress-SOCKET_TYPE=${SOCKET_TYPE:=udp} nfsstress:TESTDIR=${TESTDIR:=/tmp/$TC$PID.testdir} nfsstress-NFS_TYPE=${NFS_TYPE:=nfs} nfsstress- nfsstress-# If CLEANUP is not set; set it to ON nfsstress-CLEANUP=${CLEANUP:=ON} nfsstress- test_1_to_1_events matches test_assoc_abort matches ns-mcast_join matches open_files matches test_1_to_1_sendmsg matches -- nfs01- nfs01-VERSION=${VERSION:=2} nfs01-RHOST=${RHOST:=`hostname`} nfs01-NFILES=${NFILES:=1000} nfs01-SOCKET_TYPE=${SOCKET_TYPE:=udp} nfs01:TESTDIR=${TESTDIR:=/tmp/$TC$PID.testdir} nfs01-NFS_TYPE=${NFS_TYPE:=nfs} nfs01- nfs01-echo nfs01-echo Test Options: nfs01-echo VERSION: $VERSION test_recvmsg matches test_sockopt matches ltpServer matches test_1_to_1_send matches test_sockopt_v6 matches rpc1 matches test_1_to_1_addrs matches opts matches test_inaddr_any_v6 matches -- xinetd_tests.sh-trap cleanup 0 xinetd_tests.sh- xinetd_tests.sh-# create the temporary directory used by this testcase xinetd_tests.sh-if [ -z $TMP ] xinetd_tests.sh-then xinetd_tests.sh:LTPTMP=/tmp/tst_xinetd.$$ xinetd_tests.sh-else xinetd_tests.sh-LTPTMP=$TMP/tst_xinetd.$$ xinetd_tests.sh-fi xinetd_tests.sh- xinetd_tests.sh-mkdir -p $LTPTMP /dev/null || RC=$? -- traceroute_tests.sh-trap cleanup 0 traceroute_tests.sh- traceroute_tests.sh-# create the temporary directory used by this testcase traceroute_tests.sh-if [ -z $TMP ] traceroute_tests.sh-then traceroute_tests.sh:LTPTMP=/tmp/tst_traceroute.$$ traceroute_tests.sh-else traceroute_tests.sh-LTPTMP=$TMP/tst_traceroute.$$ traceroute_tests.sh-fi traceroute_tests.sh- traceroute_tests.sh-mkdir -p $LTPTMP /dev/null || RC=$? -- tcpdump01-#Uncomment line below for debug output. tcpdump01-#trace_logic=${trace_logic:-set -x} tcpdump01-$trace_logic tcpdump01- tcpdump01-TC=tcpdump tcpdump01:TCtmp=${TCtmp:-/tmp/$TC$$} tcpdump01-RHOST=${RHOST:-`hostname`} tcpdump01-IFNAME=${IFNAME:-$(netstat -i -n | grep ^[b-z]\{2,4\}[0-9][^*] | awk '{print $1}' | head -n1)} tcpdump01-NUMLOOPS=${NUMLOOPS:-20} tcpdump01-OUTFILE=$TCtmp/tcpdump_out tcpdump01-LTPROOT=${LTPROOT:-../../../../} test_1_to_1_connect matches nfs04_create_file matches test_1_to_1_recvmsg matches -- nfs03-PID=$$ nfs03- nfs03-# Setting the NFS to version 2 by default nfs03-VERSION=${VERSION:=2} nfs03-SOCKET_TYPE=${SOCKET_TYPE:=udp} nfs03:TESTDIR=${TESTDIR:=/tmp/$TC$PID.testdir} nfs03-NFS_TYPE=${NFS_TYPE:=nfs} nfs03- nfs03-# If CLEANUP is not set; set it to ON nfs03-CLEANUP=${CLEANUP:=ON} nfs03- test_1_to_1_sockopt matches ns-igmp_querier matches test_basic_v6 matches ns-udpclient matches test_assoc_shutdown matches ns-icmpv6_sender matches test_1_to_1_shutdown matches ns-tcpserver matches test_inaddr_any matches pingpong matches test_fragments_v6 matches -- dhcpd_tests.sh- export TCID=dhcpd # this is the init function. dhcpd_tests.sh- export TST_COUNT=0 # init identifier, dhcpd_tests.sh- dhcpd_tests.sh- if [ -z $TMP ] dhcpd_tests.sh- then dhcpd_tests.sh: LTPTMP=/tmp/tst_dhcpd.$$/ dhcpd_tests.sh- else dhcpd_tests.sh- LTPTMP=$TMP/tst_dhcpd.$$/ dhcpd_tests.sh- fi dhcpd_tests.sh- dhcpd_tests.sh- # Initialize cleanup function. -- nfsstat01- nfsstat01-PID=$$ nfsstat01- nfsstat01-TC=nfsstat01 nfsstat01-TCbin=${TCbin:=`pwd`} nfsstat01:EXPORTDIR=${EXPORTDIR:=/tmp/$TC$PID} nfsstat01-HOST=`hostname` nfsstat01-CLEANUP=${CLEANUP:=ON} nfsstat01-VERSION=${VERSION:=2} nfsstat01:TESTDIR=${TESTDIR:=/tmp/$TC$PID.testdir} nfsstat01-NFS_TYPE=${NFS_TYPE:nfs} nfsstat01- nfsstat01-if [ x$NFS_TYPE != xnfs4 ]; then nfsstat01-OPTS=${OPTS:=-o vers=$VERSION } nfsstat01-fi test_connectx matches -- nfs02-PID=$$ nfs02- nfs02-RHOST=${RHOST:=`hostname`} nfs02-VERSION=${VERSION:=2} nfs02-SOCKET_TYPE=${SOCKET_TYPE:=udp} nfs02:TESTDIR=${TESTDIR:=/tmp/$TC$PID.testdir} nfs02-CLEANUP=${CLEANUP:=ON} nfs02-NFS_TYPE=${NFS_TYPE:=nfs} nfs02- nfs02-#-# nfs02-# FUNCTION: do_setup ns-tcpclient matches test_1_to_1_recvfrom matches rpc_server matches ltpClient matches -- mc_cmds-#Uncomment line below for debug output. mc_cmds-#trace_logic=${trace_logic:-set -x} mc_cmds-$trace_logic mc_cmds-
Processed: #496411: nothing was fixed at all
Processing commands for [EMAIL PROTECTED]: found 496411 20060918-3 Bug#496411: The possibility of attack with the help of symlinks in some Debian packages Bug marked as found in version 20060918-3. found 496411 20081031+dfsg-1 Bug#496411: The possibility of attack with the help of symlinks in some Debian packages Bug marked as found in version 20081031+dfsg-1 and reopened. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#502761: I suggest removing the call to emacspeakconfig and add a mention in README.Debian
I have uploaded a new package with debconf support: emacspeak_28.0-4_all.deb. I think it is working correctly. However this is the first time I've used debconf, and I may have set some kind of record for complexity. I'd appreciate someone checking it. Assuming it checks out okay, I'd like to see that package in Lenny. Yes, I realize that my first package of version 28.0 missed the deadline for Lenny by a few days. The functional difference from version 26.0 is not great. (Dr. Raman just increments the version number every six months.) However, that does make it a year newer than the version currently in testing. - Jim Van Zandt Date: Sat, 25 Oct 2008 13:35:44 +0200 From: Christian Perrier [EMAIL PROTECTED] MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol=application/pgp-signature; boundary=jsrFa/5v3cIbBmG8 Content-Disposition: inline Resent-Sender: Debian BTS [EMAIL PROTECTED] --jsrFa/5v3cIbBmG8 Content-Type: multipart/mixed; boundary=IihjUyvzd0n5Ehsu Content-Disposition: inline --IihjUyvzd0n5Ehsu Content-Type: text/plain; charset=iso-8859-15 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable tags 502761 patch thanks Introducing debconf support in a package that doesn't use it already is IO too invasive and risking breakage. So, I recommend simply commenting the call to emacspeakconfig in postinst as of now so that this package can be released for lenny. A patch is attached. I plan to build an NMU unless the maintainer is OK to upload himself...or find another solution (but, again, hasty debconf introduction would seem too risky for me)=A0? --=20 --IihjUyvzd0n5Ehsu Content-Type: text/x-diff; charset=us-ascii Content-Disposition: attachment; filename=emacspeak.patch Content-Transfer-Encoding: quoted-printable diff -Nru emacspeak-26.0.old/debian/postinst emacspeak-26.0/debian/postinst --- emacspeak-26.0.old/debian/postinst 2008-10-25 13:29:00.194881985 +0200 +++ emacspeak-26.0/debian/postinst 2008-10-25 13:30:00.242729827 +0200 @@ -46,7 +46,9 @@ fi fi =20 -emacspeakconfig -i +# Commented as this implies prompting without using +# debconf. See #502761 +# emacspeakconfig -i =20 # dh_installdeb will replace this with shell code automatically # generated by other debhelper scripts. diff -Nru emacspeak-26.0.old/debian/README.Debian emacspeak-26.0/debian/REA= DME.Debian --- emacspeak-26.0.old/debian/README.Debian 2008-10-25 13:29:00.194881985 += 0200 +++ emacspeak-26.0/debian/README.Debian 2008-10-25 13:31:18.994729859 +0200 @@ -13,6 +13,9 @@ gets configuration parameters from /etc/emacspeak.conf and starts emacs with emacspeak support. =20 +Before it is used, Emacspeak must be configured by root, by running +'emacspeakconfig -i'. + Several flavors of emacs may be installed at the same time (emacs20, emacs21, xemacs21, etc.). In accordance with the Debian emacs policy, emacspeak is byte-compiled separately for each supported flavor - @@ -85,3 +88,5 @@ =20 James R. Van Zandt [EMAIL PROTECTED], Mon Jan 30 21:36:59 EST 2006 =20 + + -- Christian Perrier [EMAIL PROTECTED], Sat, 25 Oct 2008 13:31:18 z --IihjUyvzd0n5Ehsu-- --jsrFa/5v3cIbBmG8 Content-Type: application/pgp-signature; name=signature.asc Content-Description: Digital signature Content-Disposition: inline -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkkDBIoACgkQ1OXtrMAUPS2VGQCeKX3EntQefSRg0eyyFt4IAsJr 2vcAoJlJ5pHWvO3ZtBdDbM0EcddZd69z =9p33 -END PGP SIGNATURE- --jsrFa/5v3cIbBmG8-- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#506264: gnunet-server: freeze in gnunet-update
Processing commands for [EMAIL PROTECTED]: severity 506264 serious Bug#506264: gnunet-server: freeze in gnunet-update Severity set to `serious' from `important' tags 506264 +pending Bug#506264: gnunet-server: freeze in gnunet-update There were no tags set. Tags added: pending thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#506280: linux-image-2.6.26-1-versatile won't boot on AB926EJ-S
Package: linux-image-2.6.26-1-versatile Version: 2.6.26-8 Severity: critical This kernel won't boot on the ARM Versatile/AB926EJ-S evaluation board. Initially, we built an nfs-root system using a kernel and cramfs filesystem from ARM. (You can get this filesystem, kernel and the kernel config file from http://www.arm.com/products/os/linux_download.html under the RealView Versatile PB926/AB926 line in the table of images on that page.) We then did a complete Debian/lenny install using the method described in Installing Debian GNU/Linux from a Unix/Linux System, at http://www.debian.org/releases/stable/arm/apds03.html.en. After a reboot, the ARM kernel successfully runs using the Debian/lenny nfs-root filesystem. We used then used aptitude running under this ARM-kernel/Debian-filesystem to install the linux-image-2.6.26-1-versatile package. The AB926EJ-S board uses U-Boot to load the kernel. To set this up, we first use mkimage from the package uboot-mkimage (running on an x86 desktop machine) to create U-Boot images from the vmlinuz and initrd.img installed into the nfs-root by the ARM system: # mkimage -A arm -O linux -T kernel -C none -a 0x8000 -e 0x8000 \ -n vmlinuz-2.6.26-1-versatile -d /tftpboot/debian/vmlinuz \ /tftpboot/uImage # mkimage -A arm -O linux -T ramdisk -C gzip -a 0x80 -e 0x80 \ -n initrd.img-2.6.26-1-versatile -d /tftpboot/debian/initrd.img \ /tftpboot/uInitrd (Addresses in the above are from linux/arch/arm/mach-versatile/Makefile.boot.) U-Boot is configured as follows: VersatileAB # printenv bootdelay=2 baudrate=38400 bootfile=/tftpboot/uImage ipaddr=192.168.1.7 serverip=192.168.1.40 bootargs=root=/dev/ram rw mem=128M console=ttyAMA0 bootcmd=tftp 0x7fc0 uImage ; tftp 0x7fffc0 uInitrd ; bootm 0x7fc0 0x7fffc0 stdin=serial stdout=serial stderr=serial verify=n Environment size: 272/8188 bytes VersatileAB # (The tftp target addresses are chosen to place the payload of the U-Boot images at their run addresses. Loading to different addresses gives the same results as described below.) When booting from a hard reset, we see the following (CR's stripped for clarity): Reading MCI 0 No card found - Please insert memory card. ARM AB926EJ-S Boot Monitor Version:V3.4.2 Build Date: Nov 7 2006 Endian: Little %BootMonitor-Info, Creating new SYSTEM.DAT %BootMonitor-Error, Unable to open SYSTEM.DAT %Flash-Info, Creating new FLASH.DAT %Flash-Error, Unable to open FLASH.DAT flash run u-boot U-Boot 1.1.5-g58f62f5e-dirty (Nov 2 2006 - 03:06:12) DRAM: 0 kB Flash: 64 MB In:serial Out: serial Err: serial Hit any key to stop autoboot: 2 1 0 Using MAC Address 00:02:F7:00:18:54 TFTP from server 192.168.1.40; our IP address is 192.168.1.7 Filename 'uImage'. Load address: 0x7fc0 Loading: *# # # # done Bytes transferred = 1308460 (13f72c hex) Using MAC Address 00:02:F7:00:18:54 TFTP from server 192.168.1.40; our IP address is 192.168.1.7 Filename 'uInitrd'. Load address: 0x7fffc0 Loading: *# # # # # # # # # # # # done Bytes transferred = 4299935 (419c9f hex) ## Booting image at 7fc0 ... Image Name: vmlinuz-2.6.26-1-versatile Image Type: ARM Linux Kernel Image (uncompressed) Data Size:1308396 Bytes = 1.2 MB Load Address: 8000 Entry Point: 8000 OK ## Loading Ramdisk Image at 007fffc0 ... Image Name: initrd.img-2.6.26-1-versatile Image Type: ARM Linux RAMDisk Image (gzip compressed) Data Size:
Bug#506280: linux-image-2.6.26-1-versatile won't boot on AB926EJ-S
* David Querbach [EMAIL PROTECTED] [2008-11-19 22:40]: One interesting thing of note: CONFIG_VERSATILE is _not_ set in the config file for this kernel, which seems contrary to expectations. The option is called CONFIG_ARCH_VERSATILE as well as CONFIG_ARCH_VERSATILE_PB and CONFIG_MACH_VERSATILE_AB, and these are set. -- Martin Michlmayr http://www.cyrius.com/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#506280: linux-image-2.6.26-1-versatile won't boot on AB926EJ-S
Processing commands for [EMAIL PROTECTED]: severity 506280 important Bug#506280: linux-image-2.6.26-1-versatile won't boot on AB926EJ-S Severity set to `important' from `critical' thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#506280: linux-image-2.6.26-1-versatile won't boot on AB926EJ-S
* David Querbach [EMAIL PROTECTED] [2008-11-19 22:40]: Package: linux-image-2.6.26-1-versatile Version: 2.6.26-8 This kernel won't boot on the ARM Versatile/AB926EJ-S evaluation board. Aurelien, can you comment/take a look. Initially, we built an nfs-root system using a kernel and cramfs filesystem from ARM. (You can get this filesystem, kernel and the kernel config file from http://www.arm.com/products/os/linux_download.html under the RealView Versatile PB926/AB926 line in the table of images on that page.) We then did a complete Debian/lenny install using the method described in Installing Debian GNU/Linux from a Unix/Linux System, at http://www.debian.org/releases/stable/arm/apds03.html.en. After a reboot, the ARM kernel successfully runs using the Debian/lenny nfs-root filesystem. We used then used aptitude running under this ARM-kernel/Debian-filesystem to install the linux-image-2.6.26-1-versatile package. The AB926EJ-S board uses U-Boot to load the kernel. To set this up, we first use mkimage from the package uboot-mkimage (running on an x86 desktop machine) to create U-Boot images from the vmlinuz and initrd.img installed into the nfs-root by the ARM system: # mkimage -A arm -O linux -T kernel -C none -a 0x8000 -e 0x8000 \ -n vmlinuz-2.6.26-1-versatile -d /tftpboot/debian/vmlinuz \ /tftpboot/uImage # mkimage -A arm -O linux -T ramdisk -C gzip -a 0x80 -e 0x80 \ -n initrd.img-2.6.26-1-versatile -d /tftpboot/debian/initrd.img \ /tftpboot/uInitrd (Addresses in the above are from linux/arch/arm/mach-versatile/Makefile.boot.) U-Boot is configured as follows: VersatileAB # printenv bootdelay=2 baudrate=38400 bootfile=/tftpboot/uImage ipaddr=192.168.1.7 serverip=192.168.1.40 bootargs=root=/dev/ram rw mem=128M console=ttyAMA0 bootcmd=tftp 0x7fc0 uImage ; tftp 0x7fffc0 uInitrd ; bootm 0x7fc0 0x7fffc0 stdin=serial stdout=serial stderr=serial verify=n Environment size: 272/8188 bytes VersatileAB # (The tftp target addresses are chosen to place the payload of the U-Boot images at their run addresses. Loading to different addresses gives the same results as described below.) When booting from a hard reset, we see the following (CR's stripped for clarity): Reading MCI 0 No card found - Please insert memory card. ARM AB926EJ-S Boot Monitor Version:V3.4.2 Build Date: Nov 7 2006 Endian: Little %BootMonitor-Info, Creating new SYSTEM.DAT %BootMonitor-Error, Unable to open SYSTEM.DAT %Flash-Info, Creating new FLASH.DAT %Flash-Error, Unable to open FLASH.DAT flash run u-boot U-Boot 1.1.5-g58f62f5e-dirty (Nov 2 2006 - 03:06:12) DRAM: 0 kB Flash: 64 MB In:serial Out: serial Err: serial Hit any key to stop autoboot: 2 1 0 Using MAC Address 00:02:F7:00:18:54 TFTP from server 192.168.1.40; our IP address is 192.168.1.7 Filename 'uImage'. Load address: 0x7fc0 Loading: *# # # # done Bytes transferred = 1308460 (13f72c hex) Using MAC Address 00:02:F7:00:18:54 TFTP from server 192.168.1.40; our IP address is 192.168.1.7 Filename 'uInitrd'. Load address: 0x7fffc0 Loading: *# # # # # # # # # # # # done Bytes transferred = 4299935 (419c9f hex) ## Booting image at 7fc0 ... Image Name: vmlinuz-2.6.26-1-versatile Image Type: ARM Linux Kernel Image (uncompressed) Data Size:1308396 Bytes = 1.2 MB Load Address: 8000 Entry Point:
Bug#505056: marked as done (flex scanner push-back overflow)
Your message dated Thu, 20 Nov 2008 07:02:03 + with message-id [EMAIL PROTECTED] and subject line Bug#505056: fixed in flex 2.5.35-4 has caused the Debian Bug report #505056, regarding flex scanner push-back overflow to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 505056: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505056 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: flex Version: 2.5.35-3 Severity: grave Hi! The current flex in sid seems to introduce bugs. During erlang build it reports the following error message: % flex -Ca -Pmegaco_flex_scanner_drv -omegaco_flex_scanner_drv.c megaco_flex_scanner_drv.flex flex scanner push-back overflow The version currently in lenny (2.5.35-2) works fine. I'm not sure this bug is the same as #504030, so I'm openeing a new one. The flex input is attached. Cheers! -- Sergei Golovan ---End Message--- ---BeginMessage--- Source: flex Source-Version: 2.5.35-4 We believe that the bug you reported is fixed in the latest version of flex, which is due to be installed in the Debian FTP archive: flex-doc_2.5.35-4_all.deb to pool/main/f/flex/flex-doc_2.5.35-4_all.deb flex_2.5.35-4.diff.gz to pool/main/f/flex/flex_2.5.35-4.diff.gz flex_2.5.35-4.dsc to pool/main/f/flex/flex_2.5.35-4.dsc flex_2.5.35-4_amd64.deb to pool/main/f/flex/flex_2.5.35-4_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Manoj Srivastava [EMAIL PROTECTED] (supplier of updated flex package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 19 Nov 2008 23:52:09 -0600 Source: flex Binary: flex flex-doc Architecture: source amd64 all Version: 2.5.35-4 Distribution: unstable Urgency: low Maintainer: Manoj Srivastava [EMAIL PROTECTED] Changed-By: Manoj Srivastava [EMAIL PROTECTED] Description: flex - A fast lexical analyzer generator. flex-doc - Documentation for flex (a fast lexical analyzer generator). Closes: 388438 503732 504030 505056 505233 Changes: flex (2.5.35-4) unstable; urgency=low . * [f6cc9ae] Narrow buffer size changes to just IA64 Increasing the buffer size on other architectures cause problems in corner cases not caught by the test suite. So perhaps it is not better to increase the buffer size unilatereally for all architectures, but to just increase it for the architecture it is required on, namely, IA64, and leave it unchanged on other architectures. This solution should fix the new grave bugs, while not reopening the original but that cause this change to be done in the first place. Grave Bug fix: flex scanner push-back overflow, thanks to Sergei Golovan (Closes: #505056, #504030) * [debiandir:9a6d713] Fix VCS-Browser source field. Bug fix: Useless VCS-Browser control field, thanks to Vincent Fourmond (Closes: #503732) * [d58780f] Wrap ECHO macro to avoid FORTIFY warnings This change will enable flex scanners to be compiled with -D_FORTIFY_SOURCE=2, which is a good thing security wise. Bug Fix: flex causing warnings when compiled with FORTIFY_SOURCE, thanks to Kees Cook. (Closes: #505233, #388438) Checksums-Sha1: c111c2a68e499df53feb42a34d46c0531954291f 1137 flex_2.5.35-4.dsc 91b8109b8b8a6b2ba596c3c0002c43460419a451 39966 flex_2.5.35-4.diff.gz 10f0c6ab2fca9fff89b16f177ce9e9f429c83eee 326464 flex_2.5.35-4_amd64.deb c99c2ef8159574943291a569682ad03e6bbf4cdd 204414 flex-doc_2.5.35-4_all.deb Checksums-Sha256: f13a0b95df0ab93f9b8d617a634e2f7c9d9cad6580db7167306bc69794515954 1137 flex_2.5.35-4.dsc 41ec1caf3eebc4c86ebcd876396038069190764626907430e96e633c51537a75 39966 flex_2.5.35-4.diff.gz c3c334baf5e6ba26d3f1bf9c6209abb31e1b5c16b71be3f0f705a038f2bc8d40 326464 flex_2.5.35-4_amd64.deb 41b12eabf29a94ee99a7d8efceef98ed2cdfc38145a58416b8d279e8c41ad1d8 204414 flex-doc_2.5.35-4_all.deb Files: 8e2259b78e119ae95465574f631a3223 1137 devel standard flex_2.5.35-4.dsc db073b137ff1dbd2669ab746aa215e14 39966 devel standard flex_2.5.35-4.diff.gz
Bug#502761: I suggest removing the call to emacspeakconfig and add a mention in README.Debian
Quoting James R. Van Zandt ([EMAIL PROTECTED]): I have uploaded a new package with debconf support: emacspeak_28.0-4_all.deb. I think it is working correctly. However this is the first time I've used debconf, and I may have set some kind of record for complexity. I'd appreciate someone checking it. Issues: - introducing debconf templates without a prior review by debian-l10n-english is discouraged - doing this without any prior call for translations is discouraged as well. So, now, I think tha package, if you uploaded it to unstable, should enter the Smith review process (see the wiki.debian.org page about Smith reviews, that basically cover the above points). I would vote against the package entering lenny if that process hasn't been completed (which will require another upload once the review is done and translations are included). I can take care of the review but I really don't like doing this in a hurry signature.asc Description: Digital signature