Bug#869626: (no subject)
I believe this is still very much needed. Currently, the latest node-ws package [1] available for stretch depends on nodejs-abi-46. However, the latest nodejs package [2] available for stretch does not provide this virtual. Thus, currently there is no installable version of node-ws available on my system. [1]: https://packages.debian.org/stretch/node-ws [2]: https://packages.debian.org/stretch-backports/nodejs signature.asc Description: This is a digitally signed message part.
Bug#905226: Acknowledgement (openssh-server: SSH AuthorizedKeysCommand hangs when output is too large)
I confirm that the patch [1] to the upstream bug report [2] solves the issue for us. I proceeded as follows: * Download the OpenSSH original sources (.orig.tar.gz) and the debian scripts (.debian.tar.xz) from "Download Source Package" on the right hand side of the Debian package page [3] * `tar -xzf openssh_7.4p1.orig.tar.gz` * `cd openssh-7.4p1` * `tar -xJf ../openssh_7.4p1-10+deb9u3.debian.tar.xz` * Download the upstream patch [1] into debian/patches/ * Modify debian/patches/series, adding the downloaded patch to the end * Follow the package building guide [4] - Enter the command `dpkg-buildpackage -us -uc` - Follow the instructions to install missing dependencies * `cd ..` (parent directory of the original sources directory) * `dpkg -i openssh-client_7.4p1-10+deb9u3_amd64.deb openssh-server_7.4p1-10+deb9u3_amd64.deb openssh-sftp-server_7.4p1-10+deb9u3_amd64.deb` [1]: https://github.com/openssh/openssh-portable/commit/ ddd3d34e5c7979ca6f4a3a98a7d219a4ed3d98c2 [2]: https://bugzilla.mindrot.org/show_bug.cgi?id=2655 [3]: https://packages.debian.org/stretch/openssh-server [4]: https://www.debian.org/doc/manuals/maint-guide/build.en.html signature.asc Description: This is a digitally signed message part.
Bug#905227: openssh-server: SSH AuthorizedKeysCommand hangs when output is too large
Package: openssh-server Version: 1:7.4p1-10+deb9u3 Severity: important Tags: patch upstream Dear Maintainer, when sshd's AuthorizedKeysCommand outputs a lot of keys and the match is close to the beginning of the output sshd will deadlock. Upstream has a patch ready to fix this issue, which would need to be backported to OpenSSH 7.4 as used by Debian 9. Patch: https://github.com/openssh/openssh-portable/commit/ddd3d34e5c7979ca6f4a3a98a7d219a4ed3d98c2 See-Also: https://bugzilla.mindrot.org/show_bug.cgi?id=2655 See-Also: https://bugzilla.redhat.com/show_bug.cgi?id=1496467 -- System Information: Debian Release: 9.5 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 4.9.0-6-amd64 (SMP w/2 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages openssh-server depends on: ii adduser3.115 ii debconf [debconf-2.0] 1.5.61 ii dpkg 1.18.25 ii init-system-helpers1.48 ii libaudit1 1:2.6.7-2 ii libc6 2.24-11+deb9u3 ii libcomerr2 1.43.4-2 ii libgssapi-krb5-2 1.15-1+deb9u1 ii libkrb5-3 1.15-1+deb9u1 ii libpam-modules 1.1.8-3.6 ii libpam-runtime 1.1.8-3.6 ii libpam0g 1.1.8-3.6 ii libselinux12.6-3+b3 ii libssl1.0.21.0.2l-2+deb9u3 ii libsystemd0232-25+deb9u4 ii libwrap0 7.6.q-26 ii lsb-base 9.20161125 ii openssh-client 1:7.4p1-10+deb9u3 ii openssh-sftp-server1:7.4p1-10+deb9u3 ii procps 2:3.3.12-3+deb9u1 ii ucf3.0036 ii zlib1g 1:1.2.8.dfsg-5 Versions of packages openssh-server recommends: ii libpam-systemd 232-25+deb9u4 ii ncurses-term6.0+20161126-1+deb9u2 ii xauth 1:1.0.9-1+b2 Versions of packages openssh-server suggests: pn molly-guard pn monkeysphere pn rssh pn ssh-askpass pn ufw -- debconf information: openssh-server/permit-root-login: true >From ddd3d34e5c7979ca6f4a3a98a7d219a4ed3d98c2 Mon Sep 17 00:00:00 2001 From: "d...@openbsd.org" Date: Fri, 30 Dec 2016 22:08:02 + Subject: [PATCH] upstream commit fix deadlock when keys/principals command produces a lot of output and a key is matched early; bz#2655, patch from jboning AT gmail.com Upstream-ID: e19456429bf99087ea994432c16d00a642060afe --- auth2-pubkey.c | 8 +++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/auth2-pubkey.c b/auth2-pubkey.c index 20f3309e1..70c021589 100644 --- a/auth2-pubkey.c +++ b/auth2-pubkey.c @@ -1,4 +1,4 @@ -/* $OpenBSD: auth2-pubkey.c,v 1.60 2016/11/30 02:57:40 djm Exp $ */ +/* $OpenBSD: auth2-pubkey.c,v 1.61 2016/12/30 22:08:02 djm Exp $ */ /* * Copyright (c) 2000 Markus Friedl. All rights reserved. * @@ -727,6 +727,9 @@ match_principals_command(struct passwd *user_pw, const struct sshkey *key) ok = process_principals(f, NULL, pw, cert); + fclose(f); + f = NULL; + if (exited_cleanly(pid, "AuthorizedPrincipalsCommand", command) != 0) goto out; @@ -1050,6 +1053,9 @@ user_key_command_allowed2(struct passwd *user_pw, Key *key) ok = check_authkeys_file(f, options.authorized_keys_command, key, pw); + fclose(f); + f = NULL; + if (exited_cleanly(pid, "AuthorizedKeysCommand", command) != 0) goto out;
Bug#905228: openssh-server: SSH AuthorizedKeysCommand hangs when output is too large
Package: openssh-server Version: 1:7.4p1-10+deb9u3 Severity: important Tags: patch upstream Dear Maintainer, when sshd's AuthorizedKeysCommand outputs a lot of keys and the match is close to the beginning of the output sshd will deadlock. Upstream has a patch ready to fix this issue, which would need to be backported to OpenSSH 7.4 as used by Debian 9. Patch: https://github.com/openssh/openssh-portable/commit/ddd3d34e5c7979ca6f4a3a98a7d219a4ed3d98c2 See-Also: https://bugzilla.mindrot.org/show_bug.cgi?id=2655 See-Also: https://bugzilla.redhat.com/show_bug.cgi?id=1496467 -- System Information: Debian Release: 9.5 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 4.9.0-6-amd64 (SMP w/2 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages openssh-server depends on: ii adduser3.115 ii debconf [debconf-2.0] 1.5.61 ii dpkg 1.18.25 ii init-system-helpers1.48 ii libaudit1 1:2.6.7-2 ii libc6 2.24-11+deb9u3 ii libcomerr2 1.43.4-2 ii libgssapi-krb5-2 1.15-1+deb9u1 ii libkrb5-3 1.15-1+deb9u1 ii libpam-modules 1.1.8-3.6 ii libpam-runtime 1.1.8-3.6 ii libpam0g 1.1.8-3.6 ii libselinux12.6-3+b3 ii libssl1.0.21.0.2l-2+deb9u3 ii libsystemd0232-25+deb9u4 ii libwrap0 7.6.q-26 ii lsb-base 9.20161125 ii openssh-client 1:7.4p1-10+deb9u3 ii openssh-sftp-server1:7.4p1-10+deb9u3 ii procps 2:3.3.12-3+deb9u1 ii ucf3.0036 ii zlib1g 1:1.2.8.dfsg-5 Versions of packages openssh-server recommends: ii libpam-systemd 232-25+deb9u4 pn ncurses-term pn xauth Versions of packages openssh-server suggests: pn molly-guard pn monkeysphere pn rssh pn ssh-askpass pn ufw -- debconf information: openssh-server/permit-root-login: true >From ddd3d34e5c7979ca6f4a3a98a7d219a4ed3d98c2 Mon Sep 17 00:00:00 2001 From: "d...@openbsd.org" Date: Fri, 30 Dec 2016 22:08:02 + Subject: [PATCH] upstream commit fix deadlock when keys/principals command produces a lot of output and a key is matched early; bz#2655, patch from jboning AT gmail.com Upstream-ID: e19456429bf99087ea994432c16d00a642060afe --- auth2-pubkey.c | 8 +++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/auth2-pubkey.c b/auth2-pubkey.c index 20f3309e1..70c021589 100644 --- a/auth2-pubkey.c +++ b/auth2-pubkey.c @@ -1,4 +1,4 @@ -/* $OpenBSD: auth2-pubkey.c,v 1.60 2016/11/30 02:57:40 djm Exp $ */ +/* $OpenBSD: auth2-pubkey.c,v 1.61 2016/12/30 22:08:02 djm Exp $ */ /* * Copyright (c) 2000 Markus Friedl. All rights reserved. * @@ -727,6 +727,9 @@ match_principals_command(struct passwd *user_pw, const struct sshkey *key) ok = process_principals(f, NULL, pw, cert); + fclose(f); + f = NULL; + if (exited_cleanly(pid, "AuthorizedPrincipalsCommand", command) != 0) goto out; @@ -1050,6 +1053,9 @@ user_key_command_allowed2(struct passwd *user_pw, Key *key) ok = check_authkeys_file(f, options.authorized_keys_command, key, pw); + fclose(f); + f = NULL; + if (exited_cleanly(pid, "AuthorizedKeysCommand", command) != 0) goto out;
Bug#905226: openssh-server: SSH AuthorizedKeysCommand hangs when output is too large
Package: openssh-server Version: 1:7.4p1-10+deb9u3 Severity: important Tags: patch upstream Dear Maintainer, when sshd's AuthorizedKeysCommand outputs a lot of keys and the match is close to the beginning of the output sshd will deadlock. Upstream has a patch ready to fix this issue, which would need to be backported to OpenSSH 7.4p1 as used by Debian 9.5. Patch: https://github.com/openssh/openssh-portable/commit/ddd3d34e5c7979ca6f4a3a98a7d219a4ed3d98c2 See-Also: https://bugzilla.mindrot.org/show_bug.cgi?id=2655 See-Also: https://bugzilla.redhat.com/show_bug.cgi?id=1496467 -- System Information: Debian Release: 9.5 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 4.9.0-6-amd64 (SMP w/2 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages openssh-server depends on: ii adduser3.115 ii debconf [debconf-2.0] 1.5.61 ii dpkg 1.18.25 ii init-system-helpers1.48 ii libaudit1 1:2.6.7-2 ii libc6 2.24-11+deb9u3 ii libcomerr2 1.43.4-2 ii libgssapi-krb5-2 1.15-1+deb9u1 ii libkrb5-3 1.15-1+deb9u1 ii libpam-modules 1.1.8-3.6 ii libpam-runtime 1.1.8-3.6 ii libpam0g 1.1.8-3.6 ii libselinux12.6-3+b3 ii libssl1.0.21.0.2l-2+deb9u3 ii libsystemd0232-25+deb9u4 ii libwrap0 7.6.q-26 ii lsb-base 9.20161125 ii openssh-client 1:7.4p1-10+deb9u3 ii openssh-sftp-server1:7.4p1-10+deb9u3 ii procps 2:3.3.12-3+deb9u1 ii ucf3.0036 ii zlib1g 1:1.2.8.dfsg-5 Versions of packages openssh-server recommends: ii libpam-systemd 232-25+deb9u4 ii ncurses-term6.0+20161126-1+deb9u2 ii xauth 1:1.0.9-1+b2 Versions of packages openssh-server suggests: pn molly-guard pn monkeysphere pn rssh pn ssh-askpass pn ufw -- debconf information: openssh-server/permit-root-login: true >From ddd3d34e5c7979ca6f4a3a98a7d219a4ed3d98c2 Mon Sep 17 00:00:00 2001 From: "d...@openbsd.org" Date: Fri, 30 Dec 2016 22:08:02 + Subject: [PATCH] upstream commit fix deadlock when keys/principals command produces a lot of output and a key is matched early; bz#2655, patch from jboning AT gmail.com Upstream-ID: e19456429bf99087ea994432c16d00a642060afe --- auth2-pubkey.c | 8 +++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/auth2-pubkey.c b/auth2-pubkey.c index 20f3309e1..70c021589 100644 --- a/auth2-pubkey.c +++ b/auth2-pubkey.c @@ -1,4 +1,4 @@ -/* $OpenBSD: auth2-pubkey.c,v 1.60 2016/11/30 02:57:40 djm Exp $ */ +/* $OpenBSD: auth2-pubkey.c,v 1.61 2016/12/30 22:08:02 djm Exp $ */ /* * Copyright (c) 2000 Markus Friedl. All rights reserved. * @@ -727,6 +727,9 @@ match_principals_command(struct passwd *user_pw, const struct sshkey *key) ok = process_principals(f, NULL, pw, cert); + fclose(f); + f = NULL; + if (exited_cleanly(pid, "AuthorizedPrincipalsCommand", command) != 0) goto out; @@ -1050,6 +1053,9 @@ user_key_command_allowed2(struct passwd *user_pw, Key *key) ok = check_authkeys_file(f, options.authorized_keys_command, key, pw); + fclose(f); + f = NULL; + if (exited_cleanly(pid, "AuthorizedKeysCommand", command) != 0) goto out;
Bug#905224: openssh-server: SSH AuthorizedKeysCommand hangs when output is too large
Package: openssh-server Version: 1:7.4p1-10+deb9u3 Severity: important Tags: patch upstream Dear Maintainer, uthorizedKeysCommand outputs a lot of keys and the match is close to the beginning of the output sshd will deadlock. Upstream has a patch ready to fix this issue, which would need to be backported to OpenSSH 7.4 as used by Debian 9. Patch: https://github.com/openssh/openssh-portable/commit/ddd3d34e5c7979ca6f4a3a98a7d219a4ed3d98c2 See-Also: https://bugzilla.mindrot.org/show_bug.cgi?id=2655 See-Also: https://bugzilla.redhat.com/show_bug.cgi?id=1496467 -- System Information: Debian Release: 9.5 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 4.9.0-6-amd64 (SMP w/2 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages openssh-server depends on: ii adduser3.115 ii debconf [debconf-2.0] 1.5.61 ii dpkg 1.18.25 ii init-system-helpers1.48 ii libaudit1 1:2.6.7-2 ii libc6 2.24-11+deb9u3 ii libcomerr2 1.43.4-2 ii libgssapi-krb5-2 1.15-1+deb9u1 ii libkrb5-3 1.15-1+deb9u1 ii libpam-modules 1.1.8-3.6 ii libpam-runtime 1.1.8-3.6 ii libpam0g 1.1.8-3.6 ii libselinux12.6-3+b3 ii libssl1.0.21.0.2l-2+deb9u3 ii libsystemd0232-25+deb9u4 ii libwrap0 7.6.q-26 ii lsb-base 9.20161125 ii openssh-client 1:7.4p1-10+deb9u3 ii openssh-sftp-server1:7.4p1-10+deb9u3 ii procps 2:3.3.12-3+deb9u1 ii ucf3.0036 ii zlib1g 1:1.2.8.dfsg-5 Versions of packages openssh-server recommends: ii libpam-systemd 232-25+deb9u4 ii ncurses-term6.0+20161126-1+deb9u2 ii xauth 1:1.0.9-1+b2 Versions of packages openssh-server suggests: pn molly-guard pn monkeysphere pn rssh pn ssh-askpass pn ufw -- debconf information: openssh-server/permit-root-login: true >From ddd3d34e5c7979ca6f4a3a98a7d219a4ed3d98c2 Mon Sep 17 00:00:00 2001 From: "d...@openbsd.org" Date: Fri, 30 Dec 2016 22:08:02 + Subject: [PATCH] upstream commit fix deadlock when keys/principals command produces a lot of output and a key is matched early; bz#2655, patch from jboning AT gmail.com Upstream-ID: e19456429bf99087ea994432c16d00a642060afe --- auth2-pubkey.c | 8 +++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/auth2-pubkey.c b/auth2-pubkey.c index 20f3309e1..70c021589 100644 --- a/auth2-pubkey.c +++ b/auth2-pubkey.c @@ -1,4 +1,4 @@ -/* $OpenBSD: auth2-pubkey.c,v 1.60 2016/11/30 02:57:40 djm Exp $ */ +/* $OpenBSD: auth2-pubkey.c,v 1.61 2016/12/30 22:08:02 djm Exp $ */ /* * Copyright (c) 2000 Markus Friedl. All rights reserved. * @@ -727,6 +727,9 @@ match_principals_command(struct passwd *user_pw, const struct sshkey *key) ok = process_principals(f, NULL, pw, cert); + fclose(f); + f = NULL; + if (exited_cleanly(pid, "AuthorizedPrincipalsCommand", command) != 0) goto out; @@ -1050,6 +1053,9 @@ user_key_command_allowed2(struct passwd *user_pw, Key *key) ok = check_authkeys_file(f, options.authorized_keys_command, key, pw); + fclose(f); + f = NULL; + if (exited_cleanly(pid, "AuthorizedKeysCommand", command) != 0) goto out;
Bug#854355: Acknowledgement (/usr/bin/kmail: Unable to send emails - Could not compose message: Inappropriate ioctl for device)
Hi Maximiliano! On Monday, 13 February 2017 14:53:57 CET Maximiliano Curia wrote: > El 2017-02-13 a las 13:35 +0100, Dennis Schridde escribió: > > On Monday, 13 February 2017 11:32:00 CET Maximiliano Curia wrote: > >> El 2017-02-06 a las 13:01 +0100, Dennis Schridde escribió: > >>> The reason for this seems to be gnupg related: When I start KMail from a > >>> terminal and try to send a message, a text ssh-askpass dialogue is shown > >>> on > >>> the terminal. If I enter my gnupg key password there, the email is being > >>> send without any problems. > >> > >> The program launched by gnupg to ask the passphrase is pinentry (which is > >> an alternative). What's your pinentry and pinentry-x11? > >> > >> Is the problem reproducible for you, if you set pinentry to pinentry-qt? > > > > It is already set to that. > > Do you have any special configuration in your .gnupg/gpg.conf? I don't think so: ``` $ cat .gnupg/gpg.conf ###+++--- GPGConf ---+++### use-agent utf8-strings keyserver hkp://keys.gnupg.net debug-level basic log-file socket:///home/USER/.gnupg/log-socket ###+++--- GPGConf ---+++### Wed May 18 15:37:07 2016 CEST # GPGConf edited this configuration file. # It will disable options before this marked block, but it will # never change anything below these lines. default-key KEYID ``` --Dennis signature.asc Description: This is a digitally signed message part.
Bug#854355: Acknowledgement (/usr/bin/kmail: Unable to send emails - Could not compose message: Inappropriate ioctl for device)
Hello Maximiliano! On Monday, 13 February 2017 11:32:00 CET Maximiliano Curia wrote: > El 2017-02-06 a las 13:01 +0100, Dennis Schridde escribió: > > The reason for this seems to be gnupg related: When I start KMail from a > > terminal and try to send a message, a text ssh-askpass dialogue is shown > > on > > the terminal. If I enter my gnupg key password there, the email is being > > send without any problems. > > > > My assumption is now that ksshaskpass is somewhat broken. > > > > ksshaskpass/testing,unstable,now 4:5.8.4-1 amd64 [installed,automatic] > > The program launched by gnupg to ask the passphrase is pinentry (which is an > alternative). What's your pinentry and pinentry-x11? > > $ ls -l /etc/alternatives/pinentry* ls -l /etc/alternatives/pinentry* lrwxrwxrwx 1 root root 20 Apr 29 2016 /etc/alternatives/pinentry -> /usr/bin/ pinentry-qt* lrwxrwxrwx 1 root root 20 Apr 29 2016 /etc/alternatives/pinentry-x11 -> /usr/ bin/pinentry-qt* lrwxrwxrwx 1 root root 36 Apr 29 2016 /etc/alternatives/pinentry-x11.1.gz -> /usr/share/man/man1/pinentry-qt.1.gz lrwxrwxrwx 1 root root 36 Apr 29 2016 /etc/alternatives/pinentry.1.gz -> / usr/share/man/man1/pinentry-qt.1.gz > Is the problem reproducible for you, if you set pinentry to pinentry-qt? It is already set to that. pinentry-curses/testing,unstable,now 1.0.0-2 amd64 [installed,automatic] curses-based PIN or pass-phrase entry dialog for GnuPG pinentry-qt/testing,unstable,now 1.0.0-2 amd64 [installed,automatic] Qt-based PIN or pass-phrase entry dialog for GnuPG --Dennis signature.asc Description: This is a digitally signed message part.
Bug#854355: Acknowledgement (/usr/bin/kmail: Unable to send emails - Could not compose message: Inappropriate ioctl for device)
The reason for this seems to be gnupg related: When I start KMail from a terminal and try to send a message, a text ssh-askpass dialogue is shown on the terminal. If I enter my gnupg key password there, the email is being send without any problems. My assumption is now that ksshaskpass is somewhat broken. ksshaskpass/testing,unstable,now 4:5.8.4-1 amd64 [installed,automatic] --Dennis signature.asc Description: This is a digitally signed message part.
Bug#854355: /usr/bin/kmail: Unable to send emails - Could not compose message: Inappropriate ioctl for device
Package: kmail Version: 4:16.04.3-3 Severity: grave File: /usr/bin/kmail Justification: renders package unusable Dear Maintainer, whenever I try to send an email using KMail, I get following error message right after pressing the "Send" button: Could not compose message: Inappropriate ioctl for device This situation is new since I updated my system last Friday (after a longer period without updating) and I booted it today for the first time after that. I tried to update and reboot again, in case the issue was already detected by someone else, but without luck: The problem persists after the reboot. Please don't hesitate to ask about any information you might need in addition. Best regards, Dennis -- System Information: Debian Release: 9.0 APT prefers testing APT policy: (500, 'testing'), (1, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 4.9.0-1-amd64 (SMP w/4 CPU cores) Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages kmail depends on: ii akonadi-server 4:16.04.3-4 ii kdepim-runtime 4:16.04.2-2 ii kdepimlibs-data 4:16.04.2-2 ii kf5-kdepimlibs-kio-plugins 4:16.04.2-2 ii kio 5.28.0-1 ii libc62.24-9 ii libgcc1 1:6.3.0-5 ii libkf5akonadiagentbase5 4:16.04.3-4 ii libkf5akonadicalendar5 16.04.2-2 ii libkf5akonadicontact54:16.04.2-2 ii libkf5akonadicore5 4:16.04.3-4 ii libkf5akonadimime5 4:16.04.2-2 ii libkf5akonadisearch-plugins 16.04.3-1 ii libkf5akonadisearchdebug516.04.3-1 ii libkf5akonadiwidgets54:16.04.3-4 ii libkf5alarmcalendar5 16.04.2-2 ii libkf5archive5 5.28.0-1 ii libkf5bookmarks5 5.28.0-1 ii libkf5calendarcore5 4:16.04.2-1 ii libkf5calendarsupport5 4:16.04.2-2 ii libkf5calendarutils5 16.04.3-1 ii libkf5codecs55.28.0-1 ii libkf5completion55.28.0-1 ii libkf5configcore55.28.0-1 ii libkf5configgui5 5.28.0-1 ii libkf5configwidgets5 5.28.0-1 ii libkf5contacts5 16.04.2-1 ii libkf5coreaddons55.28.0-1 ii libkf5crash5 5.28.0-1 ii libkf5dbusaddons55.28.0-1 ii libkf5followupreminder5 4:16.04.2-2 ii libkf5gpgmepp-pthread5 16.04.3-2 ii libkf5gravatar5 4:16.04.2-2 ii libkf5guiaddons5 5.28.0-1 ii libkf5i18n5 5.28.0-1 ii libkf5iconthemes55.28.0-1 ii libkf5identitymanagement516.04.2-1 ii libkf5incidenceeditor-bin16.04.2-2 ii libkf5incidenceeditor5 16.04.2-2 ii libkf5itemmodels55.28.0-1 ii libkf5itemviews5 5.28.0-1 ii libkf5jobwidgets55.28.0-1 ii libkf5kcmutils5 5.28.0-1 ii libkf5kdelibs4support5 5.28.0-1 ii libkf5kiocore5 5.28.0-1 ii libkf5kiofilewidgets55.28.0-1 ii libkf5kiowidgets55.28.0-1 ii libkf5kmanagesieve5 4:16.04.3-2 ii libkf5kontactinterface5 16.04.2-1 ii libkf5ksieveui5 4:16.04.3-2 ii libkf5libkdepim-plugins 4:16.04.2-3 ii libkf5libkdepim5 4:16.04.2-3 ii libkf5libkleo5 4:16.04.2-1 ii libkf5mailcommon-plugins 4:16.04.2-2 ii libkf5mailcommon54:16.04.2-2 ii libkf5mailimporter5 4:16.04.2-2 ii libkf5mailtransport5 16.04.2-3 ii libkf5messagecomposer5 4:16.04.3-2 ii libkf5messagecore5 4:16.04.3-2 ii libkf5messagelist5 4:16.04.3-2 ii libkf5messageviewer5 4:16.04.3-2 ii libkf5mime5 16.04.2-1 ii libkf5notifications5 5.28.0-1 ii libkf5notifyconfig5 5.28.0-1 ii libkf5parts5 5.28.0-1 ii libkf5pimcommon-plugins 4:16.04.2-2 ii libkf5pimcommon5 4:16.04.2-2 ii libkf5pimtextedit5 16.04.2-1 ii libkf5sendlater5 4:16.04.2-2 ii libkf5service-bin5.28.0-1 ii libkf5service5 5.28.0-1 ii libkf5sonnetui5 5.28.0-1 ii libkf5templateparser54:16.04.3-2 ii libkf5textwidgets5 5.28.0-1 ii libkf5wallet-bin 5.28.0-3 ii libkf5wallet55.28.0-3 ii libkf5widgetsaddons5 5.28.0-1 ii libkf5windowsystem5 5.28.0-1 ii libkf5xmlgui55.28.0-1 ii libqt5core5a 5.7.1+dfsg-3+b1 ii libqt5dbus5 5.7.1+dfsg-3+b1 ii libqt5gui5 5.7.1+dfsg-3+b1 ii libqt5network5 5.7.1+dfsg-3+b1 ii libqt5widgets5 5.7.1+dfsg-3+b1 ii libqt5xml5 5.7.1+dfsg-3+b1 ii libstdc++6 6.3.0-5 Versions of packages kmail recommends: ii accountwizard 4:16.04.3-3 ii gnupg-agent 2.1.18-3 ii gnupg2 2.1.18-3
Bug#847448: (no subject)
bug #771980 is probably also related. signature.asc Description: This is a digitally signed message part.
Bug#847448: systemd: wrong permissions on non-persistent /run/log/journal
Package: systemd Version: 215-17+deb8u5 Severity: important Dear Maintainer, I tried to run `sudo -u nobody -g systemd-journal journalctl --unit=some-system-unit.service`, but journalctl replied "No journal files were found.". If I change the group argument to "root", I can read the journal of that unit. I would expect that some non-root user could read the journal, though, in this case to run a script as non-root that is supposed to send part of the journal via email. The cause appears to be that /run/log/journal is owned by root:root instead of root:systemd-journal. There exists an older bug (bug #746279) where this was fixed in systemd 208-6, but the issue is back in systemd-215-17. Best regards, Dennis -- Package-specific info: -- System Information: Debian Release: 8.6 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 3.16.0-4-amd64 (SMP w/2 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages systemd depends on: ii acl 2.2.52-2 ii adduser 3.113+nmu3 ii initscripts 2.88dsf-59 ii libacl1 2.2.52-2 ii libaudit1 1:2.4-1+b1 ii libblkid1 2.25.2-6 ii libc6 2.19-18+deb8u6 ii libcap2 1:2.24-8 ii libcap2-bin 1:2.24-8 ii libcryptsetup4 2:1.6.6-5 ii libgcrypt20 1.6.3-2+deb8u2 ii libkmod218-3 ii liblzma55.1.1alpha+20120614-2+b3 ii libpam0g1.1.8-3.1+deb8u1+b1 ii libselinux1 2.3-2 ii libsystemd0 215-17+deb8u5 ii mount 2.25.2-6 ii sysv-rc 2.88dsf-59 ii udev215-17+deb8u5 ii util-linux 2.25.2-6 Versions of packages systemd recommends: ii dbus1.8.20-0+deb8u1 ii libpam-systemd 215-17+deb8u5 Versions of packages systemd suggests: pn systemd-ui -- no debconf information
Bug#765498: (no subject)
I just copied the original script [1] from Redmine to my computer and am using that with minor modifications (shebang). It works fine. [1] https://github.com/redmine/redmine/blob/master/bin/rails -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#521311: (no subject)
I experienced a similar issue on our cups installation. The machine has several IPs (in the same subnet) and a hostname that matches one of them. The clients access cups via another IP, though. This IP has no reverse entry defined in DNS. When cups replies to them, it apparently tries to reverse resolve the IP address over which it was connected and replies with whatever it found. In our case it finds nothing, which causes printer-uri-supported to be ipp://:631/... - i.e. it has an empty hostname. This confuses the clients - they are unable to retrieve any printer information. The cups version is pretty old: 1.2.11 Does this issue still exist? The upstream bug might be #2184 [1], but it says that it was fixed in 1.3, which would not explain why it happens for your version 1.3.8. --Dennis [1] http://www.cups.org/str.php?L2184 signature.asc Description: This is a digitally signed message part.
Bug#543245: (no subject)
> ... and it seems to be fixed in horde-webmail-1.2.6. Sorry, false information: The upgrade disabled Kolab for the Kalendar. After I reenabled it, the error comes back. Setting $conf[calendar][driver] to SQL will make the error messages vanish again. ($conf[storage][driver] does not seem to affect this) signature.asc Description: This is a digitally signed message part.
Bug#543245: [pkg-kolab] Bug#543245: (no subject)
Am Mittwoch, 9. Juni 2010, 10:06:27 schrieb Mathieu Parent: > I need to know how it has been fixed (i.e. where is the patch). No idea, sorry. --Dennis -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#543245: [pkg-kolab] Bug#543245: (no subject)
Am Dienstag, 8. Juni 2010, 16:11:09 schrieb Mathieu Parent: > On Mon, Jun 7, 2010 at 7:57 PM, Dennis Schridde wrote: > > ... and it seems to be fixed in horde-webmail-1.2.6. > > Great! Have you more info on this? Which part has been fixed? Hello Mathieu! The bug described was fixed: "Invalid shutdown callback 'Array' passed". Also an issue with Kolab and the check for IMAP CAPABILITY (previously happened before login) was fixed, but that's unrelated to this bug. --Dennis signature.asc Description: This is a digitally signed message part.
Bug#543245: (no subject)
... and it seems to be fixed in horde-webmail-1.2.6. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#543245: (no subject)
Any news on this? The exact same bug occurs to me on Gentoo, using www- apps/horde-webmail-1.2.5. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#572707: TypeError: 'Undefined' object is not callable
Am Freitag, 5. März 2010 21:01:43 schrieben Sie: > Already reported twice, and already fixed. Bugfix package still not available here, 4h after the other bug was marked fixed... signature.asc Description: This is a digitally signed message part.
Bug#572707: TypeError: 'Undefined' object is not callable
Package: wicd Version: 1.7.0+ds1-1 Severity: grave Justification: renders package unusable wicd refuses to start, wicd.log says: --- wicd initializing... --- wicd is version 1.7.0 552 setting backend to external Traceback (most recent call last): File "/usr/share/wicd/daemon/wicd-daemon.py", line 1839, in main(sys.argv) File "/usr/share/wicd/daemon/wicd-daemon.py", line 1803, in main daemon = WicdDaemon(wicd_bus, auto_connect=auto_connect) File "/usr/share/wicd/daemon/wicd-daemon.py", line 115, in __init__ self.ReadConfig() File "/usr/share/wicd/daemon/wicd-daemon.py", line 885, in ReadConfig self.SetBackend(app_conf.get("Settings", "backend", default=be_def)) File "/usr/share/wicd/daemon/wicd-daemon.py", line 220, in SetBackend self.config.set("Settings", "backend", backend, write=True) File "/usr/lib/pymodules/python2.5/wicd/configmanager.py", line 85, in set self.set_option(*args, **kargs) File "/usr/lib/pymodules/python2.5/wicd/configmanager.py", line 81, in set_option self.write() File "/usr/lib/pymodules/python2.5/wicd/configmanager.py", line 201, in write p = copy.deepcopy(self) File "/usr/lib/python2.5/copy.py", line 189, in deepcopy y = _reconstruct(x, rv, 1, memo) File "/usr/lib/python2.5/copy.py", line 337, in _reconstruct state = deepcopy(state, memo) File "/usr/lib/python2.5/copy.py", line 162, in deepcopy y = copier(x, memo) File "/usr/lib/python2.5/copy.py", line 254, in _deepcopy_dict y[deepcopy(key, memo)] = deepcopy(value, memo) File "/usr/lib/python2.5/copy.py", line 173, in deepcopy y = copier(memo) TypeError: 'Undefined' object is not callable -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.32-2-686 (SMP w/2 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages wicd depends on: ii wicd-curses [wicd-client]1.7.0+ds1-1 wired and wireless network manager ii wicd-daemon 1.7.0+ds1-1 wired and wireless network manager ii wicd-gtk [wicd-client] 1.7.0+ds1-1 wired and wireless network manager wicd recommends no packages. wicd suggests no packages. Versions of packages wicd-gtk depends on: ii python 2.5.4-9 An interactive high-level object-o ii python-glade22.16.0-2GTK+ bindings: Glade support ii python-gtk2 2.16.0-2Python bindings for the GTK+ widge ii wicd-daemon 1.7.0+ds1-1 wired and wireless network manager Versions of packages wicd-curses depends on: ii python 2.5.4-9 An interactive high-level object-o ii python-urwid 0.9.9.1-1 curses-based UI/widget library for ii wicd-daemon 1.7.0+ds1-1 wired and wireless network manager Versions of packages wicd-daemon depends on: ii adduser 3.112add and remove users and groups ii dbus1.2.20-2 simple interprocess messaging syst ii debconf [debconf-2.0] 1.5.28 Debian configuration management sy ii dhcpcd 1:3.2.3-5DHCP client for automatically conf ii iproute 20100224-1 networking and traffic control too ii iputils-ping3:20071127-2 Tools to test the reachability of ii lsb-base3.2-23 Linux Standard Base 3.2 init scrip ii net-tools 1.60-23 The NET-3 networking toolkit ii psmisc 22.10-1 utilities that use the proc file s ii python 2.5.4-9 An interactive high-level object-o ii python-dbus 0.83.1-1 simple interprocess messaging syst ii python-gobject 2.20.0-1+b1 Python bindings for the GObject li ii python-iniparse 0.3.1-1 Module to access and modify config ii python-wicd 1.7.0+ds1-1 wired and wireless network manager ii wireless-tools 30~pre9-4Tools for manipulating Linux Wirel ii wpasupplicant 0.6.10-2 client support for WPA and WPA2 (I Versions of packages python-wicd depends on: ii python-support1.0.6.1automated rebuilding support for P -- debconf information excluded -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#556134: (no subject)
According to freenode#maxima, the bug is in the documentation, not in maxima itself. ''sin(1) is expected to output sin(1) in the current version, float(sin(1)) would output a numerical result. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#556561: (no subject)
Confirming this bug to be still a serious issue. There was libprotobuf5 (2.2.0a) released, which should probably fix this problem. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#553043: [new package] synaptiks
Package: synaptiks Version: 0.1.0 Severity: wishlist http://www.kde-apps.org/content/show.php/synaptiks?content=114270 From the website: "synaptiks is a touchpad management tool for KDE. It provides a simple configuration interface and can automatically switch off your touchpad on keyboard activity or if mouse devices are plugged." It would be nice to have this tool packaged for Debian. signature.asc Description: This is a digitally signed message part.
Bug#551034: (no subject)
Version 5.1.2 was released. signature.asc Description: This is a digitally signed message part.
Bug#497963: (no subject)
Version: 1:3.2.3-3 signature.asc Description: This is a digitally signed message part.
Bug#551034: dhcpcd-5: New version available
Severity: wishlist signature.asc Description: This is a digitally signed message part.
Bug#497963: dhcpcd 4.0.1 is available
Version: 1:3.2.3-3 Version 5.1.1 of dhcpcd is available at http://roy.marples.name/projects/dhcpcd and should be packaged for Debian. See bug #551034. signature.asc Description: This is a digitally signed message part.
Bug#551034: (no subject)
Severity: wishlist signature.asc Description: This is a digitally signed message part.
Bug#497963: (no subject)
Version 5.1.1 of dhcpcd is available at http://roy.marples.name/projects/dhcpcd and should be packaged for Debian. See bug #551034. signature.asc Description: This is a digitally signed message part.
Bug#551034: dhcpcd-5: New version available
Package: dhcpcd Version: 1:3.2.3-3 Version 5.1.1 of dhcpcd is available at http://roy.marples.name/projects/dhcpcd and should be packaged for Debian. signature.asc Description: This is a digitally signed message part.
Bug#497963: dhcpcd 4.0.1 is available
Version 5.0.3 has been released: http://roy.marples.name/projects/dhcpcd/changeset/32f0f739d11f25a060efbf8cb6ef62528118debb -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#526335: psi locks up on writing a message
Hi! I can confirm the issue, it is related to aspell being missing on the system. Referencing the related upstream bugs: http://www.flyspray.psi-im.org/task/957 http://www.flyspray.psi-im.org/task/958 The workaround is to manually disabled spell checking via Advanced Options: options/ui/spell-check/enable = false As a conclusion the "psi" package should depend on aspell being installed until the issue is resolved upstream. Regards, Dennis signature.asc Description: This is a digitally signed message part.