Bug#931574: nftables: kernel BUG at lib/list_debug.c:53

2019-07-17 Thread Vincent Tondellier

Control: reassign -1 linux

(reassigning to the linux package because it's a kernel bug)

On sunday 7 july 2019 21:26:40 CEST, Tim Duesterhus wrote:

I performed a test upgrade of a cloud VM running Debian Stretch
to buster. After the upgrade the VM does not boot any longer if
the `nftables.service` is enabled and the 4.19 kernel is used,
because a kernel assertion is violated.

The old 4.9 kernel from stretch works fine. 


Same here. I tried to update a VM with a moderatly complex firewall (and an 
untainted kernel), and it randomly crashs when loading nftables rules with 
a similar trace. No problems with 4.9. Fails with 4.19 from backports.


[...]


It looks like (one of) the two `flow table` lines are at fault,
but I am not able to confirm this for sure, because the assertion
is not 100% reliably triggered.


I can reproduce your crash quite reliably, maybe because I have kernel 
hardening enabled (page_poison=1 slab_nomerge).


Can you try removing the anonymous sets from your configuration ?
Replacing "tcp dport { 22 }" with "tcp dport 22" in your example seems 
to resolve the crash.

Unfortunatly, doing the same in my config is almost a full rewrite ...

I think it's fixed by this patch:
https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/plain/releases/4.19.38/netfilter-nf_tables-fix-set-double-free-in-abort-pat.patch
https://bugzilla.kernel.org/show_bug.cgi?id=203039

There were some critical bugfixes for nftables in 4.19.38 and 4.19.44, 
but buster is still using 4.19.37.


I tried building a vanilla 4.19.59 and excepting a (harmless ?) warning 
("WARNING: CPU: 0 PID: 176 at net/netfilter/nf_tables_api.c:3588 
nft_set_destroy+0x45/0x50 [nf_tables]) when the nf_tables_set module

is not loaded before using nftables, everything seems to work fine.

Kernel team: can we get an update in testing/s-p-u/... before the next 
point 
release to confirm it's fixed for good ? nftables is almost unusable with 
anything but the most simple configuration right now.


Thanks.



Bug#932103: RFP: fuidshift -- remap a filesystem tree to shift one set of UID/GID ranges to another

2019-07-16 Thread Vincent Tondellier
On Tuesday 16 July 2019 23:11:24 Florian Weimer wrote:
> * Nicholas D. Steeves:
> > Package name: fuidshift
> > Version : 3.0
> > Upstream Author : Name 
> > URL : https://github.com/lxc/lxd/tree/master/fuidshift
> > License : Apache 2.0
> > Programming Lang: Go
> > Description : remap a filesystem tree to shift one set of UID/GID
> > ranges to another

...

> How does this compare to (or interact with) newuidmap and newgidmap
> from uidmap?

They do very different things.

Let me try a short description :
newuidmap - set the uid mapping of a user namespace (from manpage)
fuidshift - shift the uid/gid of files *on disk*

fuidshift is basically a recursive
chown $(( $(stat -c '%u' "$path") + $uidshift )) "$path"

It does not use or configure user namespaces or containers.

It's useful for the creation of containers images, for example when the 
container root filesystem is read-only (squashfs) and the container engine 
can't change the uids at runtime (see for example systemd-nspawn --private-
users=pick / --private-users-chown).

So fuidshift may be used to prepare a directory for later use by newuidmap, 
but that's about it.

> There's a push to force uidmap on everyone, with tight integration
> into NSS.  If there's a competing scheme, it would be helpful to know
> about it.



Bug#929067: reopen

2019-06-04 Thread Vincent Tondellier
Hi,

The patch enable-md-clear.patch in the deb9u6 update for stretch is wrong.
It defines md-clear to the 26th bit of FEAT_6_EAX instead of the 10th bit 
of FEAT_7_0_EDX because the offset is wrong in the patch and the first line 
does not match.

Result: the guest does not see the cpu flag:

# dmesg | grep -i mds
[0.131153] MDS: Vulnerable: Clear CPU buffers attempted, no microcode
# grep md_clear /proc/cpuinfo
# cat /sys/devices/system/cpu/vulnerabilities/mds
Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown


Please find a fixed patch attached. With my patch:

# dmesg | grep -i mds
[0.132439] MDS: Mitigation: Clear CPU buffers
# grep md_clear /proc/cpuinfo
flags   : [...] md_clear
# cat /sys/devices/system/cpu/vulnerabilities/mds
Mitigation: Clear CPU buffers; SMT Host state unknown


A correctly patched target-i386/cpu.c should look like this around line 452:
[FEAT_7_0_EDX] = {
.feat_names = {
NULL, NULL, "avx512-4vnniw", "avx512-4fmaps",
NULL, NULL, NULL, NULL,
NULL, NULL, "md-clear", NULL,
NULL, NULL, NULL, NULL,
NULL, NULL, NULL, NULL,
NULL, NULL, NULL, NULL,
NULL, NULL, "spec-ctrl", NULL,
NULL, NULL, NULL, "ssbd",
},
.cpuid_eax = 7,
.cpuid_needs_ecx = true, .cpuid_ecx = 0,
.cpuid_reg = R_EDX,
.tcg_features = TCG_7_0_EDX_FEATURES,
},


How to test:

With libvirt, you have to patch /usr/share/libvirt/cpu_map.xml to add the 
feature:

 
  


Add the feature to the virtual machine xml:

  
...

  

qemu will now start with the flag (or will not start if the microcode is not 
patched):

qemu-system-x86_64 ... -cpu ...,+md-clear ...

Then, check for the presence of the cpu flag and mds status in an up to date 
virtual machine.



Thanks.From: Paolo Bonzini 
Date: Fri, 1 Mar 2019 21:40:52 +0100
Subject: target/i386: define md-clear bit
Bug-Debian: http://bugs.debian.org/929067

md-clear is a new CPUID bit which is set when microcode provides the
mechanism to invoke a flush of various exploitable CPU buffers by invoking
the VERW instruction.  Add the new feature, and pass it down to
Hypervisor.framework guests.

Signed-off-by: Paolo Bonzini 

[Backported to qemu 2.8 mjt]

CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
---
 target-i386/cpu.c | 2 +-
 target-i386/cpu.h | 1 +
 2 files changed, 2 insertions(+), 1 deletion(-)

diff --git a/target-i386/cpu.c b/target-i386/cpu.c
index de1f30eeda6..bbb4526a043 100644
--- a/target-i386/cpu.c
+++ b/target-i386/cpu.c
@@ -449,7 +449,7 @@ static FeatureWordInfo feature_word_info
 .feat_names = {
 NULL, NULL, "avx512-4vnniw", "avx512-4fmaps",
 NULL, NULL, NULL, NULL,
-NULL, NULL, NULL, NULL,
+NULL, NULL, "md-clear", NULL,
 NULL, NULL, NULL, NULL,
 NULL, NULL, NULL, NULL,
 NULL, NULL, NULL, NULL,
diff --git a/target-i386/cpu.h b/target-i386/cpu.h
index c6057240227..c9c7f60a54d 100644
--- a/target-i386/cpu.h
+++ b/target-i386/cpu.h
@@ -632,6 +632,7 @@ typedef uint32_t FeatureWordArray[FEATURE_WORDS];

 #define CPUID_7_0_EDX_AVX512_4VNNIW (1U << 2) /* AVX512 Neural Network Instructions */
 #define CPUID_7_0_EDX_AVX512_4FMAPS (1U << 3) /* AVX512 Multiply Accumulation Single Precision */
+#define CPUID_7_0_EDX_MD_CLEAR  (1U << 10) /* Microarchitectural Data Clear */
 #define CPUID_7_0_EDX_SPEC_CTRL (1U << 26) /* Speculation Control */
 #define CPUID_7_0_EDX_SPEC_CTRL_SSBD  (1U << 31) /* Speculative Store Bypass Disable */

--
2.11.0


Bug#911259: ruby-httpclient: Please use the system ca-certificates instead of bundling one

2018-10-17 Thread Vincent Tondellier

Package: ruby-httpclient
Version: 2.8.3-1
Severity: normal

Dear Maintainer,

ruby-httpclient bundles a copy of the root certificate authorities:

$ dpkg -L ruby-httpclient | grep pem
/usr/lib/ruby/vendor_ruby/httpclient/cacert.pem
/usr/lib/ruby/vendor_ruby/httpclient/cacert1024.pem
...

Thus, the local CAs configured by the local system administrator (by adding
a .crt file in /usr/local/share/ca-certificates/) are ignored, the 
explicitly

untrusted CAs are still valid, etc ...

Test (with ca-cacert installed):
$ ruby -rhttpclient -e 'p HTTPClient.get("https://www.cacert.org";)'
...
/usr/lib/ruby/vendor_ruby/httpclient/ssl_socket.rb:103:in `connect': 
SSL_connect returned=1 errno=0 state=error: certificate verify failed 
(unable to get local issuer certificate) (OpenSSL::SSL::SSLError)


Expected:
$ curl https://www.cacert.org


Please find attached a debdiff to use the system CA bundle instead.
Some comments:
- the file "cacert1024.pem" is not used by the code: removed
- the ca-certificates package is already pulled by rubygems-integration,
 but a direct dependency may be better


Thanks.

-- System Information:
Debian Release: buster/sid
 APT prefers testing
 APT policy: (500, 'testing'), (50, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.18.0-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE= 
(charmap=UTF-8)

Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages ruby-httpclient depends on:
ii  ruby1:2.5.1
ii  ruby-http-cookie1.0.2-1
ii  ruby2.1 [ruby-interpreter]  2.1.5-4
ii  ruby2.2 [ruby-interpreter]  2.2.4-1

ruby-httpclient recommends no packages.

ruby-httpclient suggests no packages.

-- no debconf information
diff -Nru ruby-httpclient-2.8.3/debian/changelog ruby-httpclient-2.8.3/debian/changelog
--- ruby-httpclient-2.8.3/debian/changelog	2017-07-31 16:40:48.0 +0200
+++ ruby-httpclient-2.8.3/debian/changelog	2018-10-17 19:30:30.0 +0200
@@ -1,3 +1,9 @@
+ruby-httpclient (2.8.3-2) UNRELEASED; urgency=medium
+
+  * Unbundle the root CA list, use the one from ca-certificates
+
+ -- Vincent Tondellier   Wed, 17 Oct 2018 19:30:30 +0200
+
 ruby-httpclient (2.8.3-1) unstable; urgency=medium
 
   * Team upload
diff -Nru ruby-httpclient-2.8.3/debian/ruby-httpclient.links ruby-httpclient-2.8.3/debian/ruby-httpclient.links
--- ruby-httpclient-2.8.3/debian/ruby-httpclient.links	1970-01-01 01:00:00.0 +0100
+++ ruby-httpclient-2.8.3/debian/ruby-httpclient.links	2018-10-17 13:32:19.0 +0200
@@ -0,0 +1 @@
+usr/lib/ssl/certs/ca-certificates.crt  usr/lib/ruby/vendor_ruby/httpclient/cacert.pem
diff -Nru ruby-httpclient-2.8.3/debian/rules ruby-httpclient-2.8.3/debian/rules
--- ruby-httpclient-2.8.3/debian/rules	2017-07-31 16:40:48.0 +0200
+++ ruby-httpclient-2.8.3/debian/rules	2018-10-17 13:32:13.0 +0200
@@ -6,3 +6,8 @@
 
 %:
 	dh $@ --buildsystem=ruby --with ruby
+
+override_dh_auto_install:
+	dh_auto_install
+	rm -f debian/ruby-httpclient/usr/lib/ruby/vendor_ruby/httpclient/cacert1024.pem
+	rm -f debian/ruby-httpclient/usr/lib/ruby/vendor_ruby/httpclient/cacert.pem


Bug#764738: sendfax fails with "ALLO: Command not implemented" with recent perl

2014-10-10 Thread Vincent Tondellier
Package: libfax-hylafax-client-perl
Version: 1.02-2
Severity: important

Hello,

When using the sendfax function with perl 5.20, an error is returned:
"Fax::Hylafax::Client: Communication error: ALLO: Command not
implemented."

This is due to this change in Net::FTP :
https://github.com/steve-m-hay/perl-libnet/commit/0d616e68

It was fixed recently by
https://github.com/steve-m-hay/perl-libnet/commit/d3f979bc

I tested the patch, and can confirm that the fix works also for Hylafax.

perl-modules is the package that needs to be fixed, but
libfax-hylafax-client-perl is broken and may also need a Conflicts:,
so I am filling the bug on libfax-hylafax-client-perl.

Feel free to reassign if needed.

Severity important because sendfax is an important functionality of
the package.

Thanks.

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to fr_FR.UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages libfax-hylafax-client-perl depends on:
ii  perl  5.20.1-1

libfax-hylafax-client-perl recommends no packages.

libfax-hylafax-client-perl suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#741667: oops in nf_nat_setup_info

2014-05-29 Thread Vincent Tondellier
Hello,

I got the same oops on 3.12, 3.13, and 3.14 (bpo), without fglrx and 
xtables-addons :

http://thread.gmane.org/gmane.comp.security.firewalls.netfilter.devel/52821

But 3.11.10-1~bpo70+1 works for me. It's unrelated to r8169.

Can you try this patch :

http://git.kernel.org/cgit/linux/kernel/git/stable/stable-queue.git/plain/queue-3.14/netfilter-nf_conntrack-reserve-two-bytes-for-nf_ct_ext-len.patch

or 3.15-rc7 (in experimental) ?


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#503152: icemon (in icecc-monitor) displays nothing when compiled with icecc 0.9.0

2008-10-22 Thread Vincent Tondellier
Package: icecc
Version: 0.9.1-1
Severity: normal
Tags: patch

The problem is in the libicecc.a: the function
DiscoverSched::try_get_scheduler always return NULL because connect
always returns EINPROGRESS (the socket is non-blocking).

With the attached patch, we use a blocking sockect to connect to
scheduler. Tested on a 25 nodes cluster with no problems.

This bug is present in icecc-monitor=1.1-3 (compiled against icecc 0.9)
but was not present in icecc-monitor=1.1-2 (compiled against icecc 0.8).

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (550, 'testing'), (25, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.27 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages icecc depends on:
ii  adduser   3.110  add and remove users and groups
ii  debconf [debconf-2.0] 1.5.24 Debian configuration management sy
ii  dpkg  1.14.22Debian package management system
ii  g++ [c++-compiler]4:4.3.2-2  The GNU C++ compiler
ii  g++-4.3 [c++-compiler]4.3.2-2~exp1   The GNU C++ compiler
ii  gcc [c-compiler]  4:4.3.2-2  The GNU C compiler
ii  gcc-4.3 [c-compiler]  4.3.2-2~exp1   The GNU C compiler
ii  libc6 2.8+20080809-2 GNU C Library: Shared libraries
ii  libgcc1   1:4.3.2-2~exp1 GCC support library
ii  libstdc++64.3.2-2~exp1   The GNU Standard C++ Library v3
ii  lsb-base  3.2-20 Linux Standard Base 3.2 init scrip

icecc recommends no packages.

Versions of packages icecc suggests:
ii  icecc-monitor 1.1-3  icecc monitor for KDE

-- debconf information excluded

*** 12_fix_nonblocking_sockets_for_icemon.diff
--- icecc-0.9.1.orig/services/comm.cpp  2008-05-12 19:57:14.0 +0200
+++ icecc-0.9.1/services/comm.cpp   2008-10-20 15:43:23.0 +0200
@@ -1160,14 +1160,21 @@
 
   if (ask_fd >= 0)
 {
+  fcntl(ask_fd, F_SETFL, 0);
   int status = connect (ask_fd, (struct sockaddr*) &remote_addr, 
sizeof(remote_addr) );
-  if (status == 0 || (status < 0 && errno == EISCONN))
+  int connect_errno = errno;
+  fcntl(ask_fd, F_SETFL, O_NONBLOCK);
+  if (status == 0 || (status < 0 && connect_errno == EISCONN))
 {
   int fd = ask_fd;
   ask_fd = -1;
   return Service::createChannel(fd,
   (struct sockaddr*) &remote_addr, sizeof(remote_addr));
 }
+  else
+{
+  log_error() << "connect failed : " << strerror(connect_errno) << 
endl;
+}
 }
   return 0;
 }
--- icecc-0.9.1.orig/services/comm.cpp  2008-05-12 19:57:14.0 +0200
+++ icecc-0.9.1/services/comm.cpp   2008-10-20 15:43:23.0 +0200
@@ -1160,14 +1160,21 @@
 
   if (ask_fd >= 0)
 {
+  fcntl(ask_fd, F_SETFL, 0);
   int status = connect (ask_fd, (struct sockaddr*) &remote_addr, 
sizeof(remote_addr) );
-  if (status == 0 || (status < 0 && errno == EISCONN))
+  int connect_errno = errno;
+  fcntl(ask_fd, F_SETFL, O_NONBLOCK);
+  if (status == 0 || (status < 0 && connect_errno == EISCONN))
 {
   int fd = ask_fd;
   ask_fd = -1;
   return Service::createChannel(fd,
   (struct sockaddr*) &remote_addr, sizeof(remote_addr));
 }
+  else
+{
+  log_error() << "connect failed : " << strerror(connect_errno) << 
endl;
+}
 }
   return 0;
 }


Bug#459020: [php-maint] Bug#459020: 043-recode_size_t.patch is invalid for recent php versions

2008-02-07 Thread Vincent Tondellier
Steve Langasek wrote:
> On Wed, Feb 06, 2008 at 08:41:22PM +0100, Vincent Tondellier wrote:
>> The patch 043-recode_size_t.patch is broken.
> 
>> req_len and str_len should be integers, but are size_t
>> (zend_parse_parameters wants pointers to int). This is a problem for 64
>> bits arches since a part of the variables is not initialized
>> (sizof(size_t) != sizeof(int)), and recode_buffer_to_buffer is called
>> with funny values that makes librecode eat all the system's memory.
> 
> So then, PHP isn't capable of passing values whose length exceeds UINT_MAX?
> That's an annoyingly arbitrary limitation.
> 

PHP isn't designed to do large memory allocations ...

> But yes, your analysis here looks correct to me.
> 
>> An updated version of the patch witch fixes the problem for me is
>> attached to this mail and should be, IMO, applied as a security fix for
>> etch.
> 
> I don't see any evidence that this is a security issue, but it should be
> applied as a stable release update.
> 

I think this is a security issue since it can cause a Denial Of Service
by eating all the server memory. I had the problem on one of my servers
(2GB RAM / 3GB swap) and it took at least 10min for oom_killer to kill
the process, and in another case the kernel crashed (I didn't change the
memory limit settings in /etc/security/limits.conf).

And you can trigger the bug remotely by sending a mail like Sebastian
Göbel said above.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#459020: 043-recode_size_t.patch is invalid for recent php versions

2008-02-06 Thread Vincent Tondellier
The patch 043-recode_size_t.patch is broken.

req_len and str_len should be integers, but are size_t
(zend_parse_parameters wants pointers to int). This is a problem for 64
bits arches since a part of the variables is not initialized
(sizof(size_t) != sizeof(int)), and recode_buffer_to_buffer is called
with funny values that makes librecode eat all the system's memory.

The patch was messed up during the conversion from php4 (r301 of the
pkg-kde svn repository).
This patch is not needed in testing/unstable and should be removed since
the bug for this patch (PHP#41765) was fixed upstream in php 5.2.4, but
a fixed version is needed for etch.

An updated version of the patch witch fixes the problem for me is
attached to this mail and should be, IMO, applied as a security fix for
etch.



--- php-5.2.0/ext/recode/recode.c.orig	2008-02-06 19:58:51.0 +0100
+++ php-5.2.0/ext/recode/recode.c	2008-02-06 19:59:13.0 +0100
@@ -132,7 +132,7 @@
 {
 	RECODE_REQUEST request = NULL;
 	char *r = NULL;
-	int r_len = 0, r_alen = 0;
+	size_t r_len = 0, r_alen = 0;
 	int req_len, str_len;
 	char *req, *str;
 


Bug#443669: fixed with last wxwidgets update

2007-10-13 Thread Vincent Tondellier
Package: amule
Version: 2.1.3-4

I cannot reproduce this bug with wxwidgets 2.6.3.2.2-1.
See bug #441766 for more informations.

--- System information. ---
Architecture: i386
Kernel:   Linux 2.6.23-rc8

Debian Release: lenny/sid
  990 unstableftp.de.debian.org
  550 testing ftp.u-picardie.fr
  500 unstablewww.debian-multimedia.org
   25 experimentalftp.fr.debian.org

--- Package information. ---
Depends(Version) | Installed
-+-==
amule-common (= 2.1.3-4) | 2.1.3-4
libc6 (>= 2.6-1) | 2.6.1-5
libcrypto++6 | 5.5-4
libgcc1  (>= 1:4.2-20070516) | 1:4.3-20070902-1
libstdc++6 (>= 4.2-20070516) | 4.3-20070902-1
libwxbase2.6-0  (>= 2.6.3.2.1.5) | 2.6.3.2.2-1
libwxgtk2.6-0   (>= 2.6.3.2.1.5) | 2.6.3.2.2-1
zlib1g (>= 1:1.2.3.3.dfsg-1) | 1:1.2.3.3.dfsg-6




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#425166: Missing dependency on libyaml-perl

2007-05-19 Thread Vincent Tondellier
Package: ttf2tex
Version: 0.70-8
Severity: important

$ ttf2tex-mkpkg
Can't locate YAML.pm in @INC (@INC contains: /etc/perl
/usr/local/lib/perl/5.8.8 /usr/local/share/perl/5.8.8 /usr/lib/perl5
/usr/share/perl5 /usr/lib/perl/5.8 /usr/share/perl/5.8
/usr/local/lib/site_perl .) at /usr/bin/ttf2tex-mkpkg line 18.


Installing libyaml-perl solves the problem.

--- System information. ---
Architecture: amd64
Kernel:   Linux 2.6.21.1-ck2

Debian Release: lenny/sid
  991 unstablewww.debian-multimedia.org
  990 unstableftp.fr.debian.org
   25 experimentalftp2.fr.debian.org

--- Package information. ---
Depends (Version) | Installed
=-+-===
freetype1-tools   | 1.4pre.20050518-0.5
tetex-bin |
 OR texlive-font-utils| 2007-7




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#398462: libomniorb4c2: problem with float values in 4.0.6, please update to 4.0.7

2006-11-13 Thread Vincent Tondellier
Package: libomniorb4c2
Version: 4.0.6-2.2
Severity: normal

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

There is a problem with omniorb 4.0.6 and floats. See this message for a
testcase and an explanation :
http://www.omniorb-support.com/pipermail/omniorb-list/2006-May/027745.html

Updating omniorb to 4.0.7 and python-omniorb2 to 2.7 fixes the problem.

- -- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (990, 'unstable'), (550, 'testing'), (25, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18.1-ck1
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to fr_FR.UTF-8)

Versions of packages libomniorb4c2 depends on:
ii  libc6   2.3.6.ds1-8  GNU C Library: Shared libraries
ii  libgcc1 1:4.1.1-19   GCC support library
ii  libomnithread3c24.0.6-2.2omniORB4 - CORBA ORB - libomnithre
ii  libssl0.9.8 0.9.8c-3 SSL shared libraries
ii  libstdc++6  4.1.1-19 The GNU Standard C++ Library v3

libomniorb4c2 recommends no packages.

- -- no debconf information

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFWO1SZmUHKLzaTmIRAhV8AJ9zS8PO7zQtCIfKBNZeFQWRqufNtwCgioeX
BR6xk+QpKKTZVkIBE1ilkwM=
=vAn4
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#398463: python-omniorb2: problem with float values in 2.6, please update to 2.7

2006-11-13 Thread Vincent Tondellier
Package: python-omniorb2
Version: 2.6-3.1
Severity: normal

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

There is a problem with python-omniorb 2.6 and floats. See this message for a
testcase and an explanation :
http://www.omniorb-support.com/pipermail/omniorb-list/2006-May/027745.html

Updating omniorb to 4.0.7 and python-omniorb2 to 2.7 fixes the problem.

- -- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (990, 'unstable'), (550, 'testing'), (25, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18.1-ck1
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to fr_FR.UTF-8)

Versions of packages python-omniorb2 depends on:
ii  libc6   2.3.6.ds1-8  GNU C Library: Shared libraries
ii  libgcc1 1:4.1.1-19   GCC support library
ii  libomniorb4c2   4.0.6-2.2omniORB4 - CORBA ORB - libomniorb4
ii  libomnithread3c24.0.6-2.2omniORB4 - CORBA ORB - libomnithre
ii  libstdc++6  4.1.1-19 The GNU Standard C++ Library v3
ii  python  2.4.4-1  An interactive high-level object-o
ii  python-central  0.5.10   register and build utility for Pyt

python-omniorb2 recommends no packages.

- -- no debconf information

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFWO36ZmUHKLzaTmIRArOdAJ49hNrAs8RyS7jXqwqzPIOH6TelggCglIY7
F3Rb64Az6hq7x+QtuHYCZxw=
=OoVd
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#383532: python-svn: FTBFS when locale != C

2006-08-17 Thread Vincent Tondellier
Package: python-svn
Version: 1.4.2-2
Severity: serious
Tags: patch
Justification: no longer builds from source

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

When LC_ALL != C and there is a subversion translation available, the
build system tries to compare a translated string (here 'exporté')
against the english word ('exported') (see Builder/brand_version.py
line 28).

The attached patch fix the problem.

The exact error message is:
/usr/bin/python2.3 ../Builder/brand_version.py ../Builder/version.info 
pysvn_version.hpp.template
Info: revision exporté
Traceback (most recent call last):
  File "../Builder/brand_version.py", line 31, in ?
revision, modifiers = re.compile( '(\d+)(.*)' ).search( build_revision 
).groups()
AttributeError: 'NoneType' object has no attribute 'groups'

- -- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (990, 'unstable'), (550, 'testing'), (500, 'stable'), (25, 
'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.17-beyond2
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to fr_FR.UTF-8)

Versions of packages python-svn depends on:
ii  libapr0 2.0.55-4.1   The Apache Portable Runtime Librar
ii  libc6   2.3.6-19 GNU C Library: Shared libraries
ii  libgcc1 1:4.1.1-10   GCC support library
ii  libstdc++6  4.1.1-10 The GNU Standard C++ Library v3
ii  libsvn0 1.3.2-5+b1   Shared libraries used by Subversio
ii  libuuid11.39-1   universally unique id library
ii  python  2.4.3-11 An interactive high-level object-o
ii  python-central  0.5.5register and build utility for Pyt

python-svn recommends no packages.

- -- no debconf information

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE5NaOZmUHKLzaTmIRAra+AJ9GJ915I3HPpjho+pI7vLluGbFQMQCfU7ub
aNTzfy6gD4NY8Tf4gcruRhc=
=/8Sy
-END PGP SIGNATURE-
--- pysvn-1.4.2.orig/debian/rules	2006-08-17 22:37:19.0 +0200
+++ pysvn-1.4.2/debian/rules	2006-08-17 22:37:44.0 +0200
@@ -15,6 +15,7 @@
 
 # This has to be exported to make some magic below work.
 export DH_OPTIONS
+export LC_ALL=C
 
 CFLAGS	= -Wall -g #-fvisibility=hidden -fvisibility-inlines-hidden
 


Bug#383525: pysvn contains non-free material in Kit/Win32/vc6redist/

2006-08-17 Thread Vincent Tondellier
Package: pysvn
Severity: serious
Justification: Policy 2.2.1

The directory Kit/Win32/vc6redist/ in the tarball contains msvcirt.dll,
msvcp60.dll and msvcrt.dll. These files are copyrighted by microsoft and
does not meet the DFSG.

Please remove them.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (990, 'unstable'), (550, 'testing'), (500, 'stable'), (25, 
'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.17-beyond2
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to fr_FR.UTF-8)




signature.asc
Description: OpenPGP digital signature


Bug#383518: pysvn contains non-free material in Kit/Win32/vc6redist/

2006-08-17 Thread Vincent Tondellier
Package: pysvn
Severity: serious
Justification: Policy 2.2.1

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

The directory Kit/Win32/vc6redist/ in the tarball contains msvcirt.dll, 
msvcp60.dll and msvcrt.dll. These files are copyrighted by microsoft and
does not meet the DFSG.

Please remove them.

- -- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (990, 'unstable'), (550, 'testing'), (500, 'stable'), (25, 
'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.17-beyond2
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to fr_FR.UTF-8)

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE5NC9ZmUHKLzaTmIRAu1gAJ49k7Q34TX5PeDF88PnSdFyN6177wCeK/oe
HeGZySr/GEIMEIZgVJmhWLY=
=Ht/4
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#381505: avarice must not link with the shared version of libbfd

2006-08-04 Thread Vincent Tondellier
Package: avarice
Version: 2.4-2
Severity: grave
Tags: patch
Justification: renders package unusable

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

avarice is linked with the shared version of libbfd, but the
binutils-dev says :
"Note that building Debian packages which depend on the shared libbfd is
Not Allowed."
This results in a broken package in current debian unstable :

$ avarice
avarice: error while loading shared libraries: libbfd-2.16.91.so: cannot
open shared object file: No such file or directory

A fix for the problem is attached. The check for libbfd is from the Lush
project
(http://lush.cvs.sourceforge.net/*checkout*/lush/lush/configure.ac)

Remember to run autoreconf.

I've not reported this bug to upstream.


- -- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (990, 'unstable'), (550, 'testing'), (25, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.17.7
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)  (ignored: 
LC_ALL set to fr_FR.UTF-8)

Versions of packages avarice depends on:
ii  binutils2.17-2   The GNU assembler, linker and bina
ii  libc6   2.3.6-18 GNU C Library: Shared libraries
ii  libgcc1 1:4.1.1-10   GCC support library
ii  libstdc++6  4.1.1-10 The GNU Standard C++ Library v3
ii  libusb-0.1-42:0.1.12-2   userspace USB programming library

Versions of packages avarice recommends:
ii  gdb-avr   6.4-1  The GNU Debugger for avr

- -- no debconf information


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE08OKZmUHKLzaTmIRAiz6AJ9YQtvo93TeXnLkBY8zDwJjobirvgCfdqF/
m6iSgK5Qfks9FT8U5bjr9jU=
=qEUx
-END PGP SIGNATURE-
--- avarice-2.4.orig/configure.ac   2006-01-11 19:16:03.0 +0100
+++ avarice-2.4/configure.ac2006-08-04 22:11:54.0 +0200
@@ -64,13 +64,82 @@
 fi
 AC_CHECK_LIB([intl], [dcgettext])
 AC_CHECK_LIB([iberty], [xmalloc])
-AC_CHECK_LIB([bfd], [bfd_init], , [ac_found_bfd=no])
-AC_CHECK_LIB([usb], [usb_get_string_simple])
+# bfd
+
+BFD_YES=''
+has_bfd=yes
+AC_CHECK_LIB(iberty, xmalloc)
+if test $ac_cv_lib_iberty_xmalloc = no; then
+  AC_CHECK_LIB(mmalloc, mmalloc)
+  AC_CHECK_LIB(iberty, xcalloc)
+fi
+AC_CHECK_HEADER(bfd.h,,has_bfd=no)
+AC_CHECK_LIB(bfd, bfd_init,,[has_bfd=no])
+AC_SUBST(BFD_YES)
+
+# Check if it compiles
+if test x$has_bfd = xyes ; then
+n_LIBS=$LIBS
+has_intl=
+AC_CHECK_LIB(intl, dcgettext, [has_intl=yes],[has_intl=no])
+i_LIBS=`echo $n_LIBS | sed -e 's/-liberty/& -lintl/'`
+sn_LIBS=`echo $n_LIBS | sed -e 's/-lbfd\( -liberty\)*/-Wl,-Bstatic & 
-Wl,-Bdynamic/'`
+si_LIBS=`echo $i_LIBS | sed -e 's/-lbfd\( -liberty\)*/-Wl,-Bstatic & 
-Wl,-Bdynamic/'`
+LIBS=$sn_LIBS
+AC_MSG_CHECKING([whether bfd works with -Bstatic])
+AC_TRY_LINK([#include "bfd.h"],
+[bfd_openr("junk1","default"); ],
+   [okay_bfd=yes],[okay_bfd=no]);
+AC_MSG_RESULT($okay_bfd)
+if test x$okay_bfd = xno ; then
+   if test x$has_intl = xyes ; then
+   LIBS=$si_LIBS
+   AC_MSG_CHECKING([whether bfd works with -Bstatic and -lintl])
+   AC_TRY_LINK([#include "bfd.h"],
+   [bfd_openr("junk1","default"); ],
+   [okay_bfd=yes],[okay_bfd=no]);
+   AC_MSG_RESULT($okay_bfd)
+   fi
+   if test x$okay_bfd = xno ; then
+   LIBS=$n_LIBS
+   AC_MSG_CHECKING([whether bfd works alone])
+   AC_TRY_LINK([#include "bfd.h"],
+   [bfd_openr("junk1","default"); ],
+   [okay_bfd=yes],[okay_bfd=no]);
+   AC_MSG_RESULT($okay_bfd)
+   if test x$okay_bfd = xno ; then
+   if test x$has_intl = xyes ; then
+   LIBS=$i_LIBS
+   AC_MSG_CHECKING([whether bfd works with -lintl])
+   AC_TRY_LINK([#include "bfd.h"],
+   [bfd_openr("junk1","default"); ],
+   [okay_bfd=yes],
+   [okay_bfd=no]);
+   AC_MSG_RESULT($okay_bfd)
+   fi
+   if test x$okay_bfd = xno ; then
+   LIBS=$n_LIBS
+   fi
+   fi
+   fi
+fi
+if test x$okay_bfd = xno ; then
+   has_bfd=no
+fi
+fi
 
-if test "x$ac_found_bfd" = "xno"; then
-  AC_MSG_ERROR([You need to install libbfd.a from binutils.])
+if test x$has_bfd = xno ; then
+AC_MSG_ERROR([Unable to locate BFD development files.
+-
+We were unable to locate required GNU binutils files.
+- Some Linux distributions do not install these by default.
+  You need to install the 'libbinutils-devel' package.
+- On other platforms, get GNU binutils on www.fsf.org.
+-])
 fi
 
+AC_CHEC