Bug#353277: Call for vote: ndiswrapper: Move to contrib
On Thu, Mar 29, 2007 at 10:16:52AM -0600, Bdale Garbee wrote: > As Anthony noted in his recent summary of open issues, there were four votes > on his earlier proposal, in favour from Anthony and Manoj, against from Ian > and Raul. Time has passed and additional discussion has occurred, so what > I'd like to ask is that we treat this as a fresh vote of the current TC > members in hopes of finally bringing this issue to closure, perhaps still in > time for our decision to be reflected in the etch release. Only if the decision is in favor of the status quo ;) > - - - -=-=-=-=-=- Don't Delete Anything Between These Lines =-=-=-=-=-=-=-=- > [ 2 ] Choice 1: ndiswrapper should move to contrib as per bugs #353277, > #353278 > [ 1 ] Choice 2: ndiswrapper should remain in main despite bugs #353277, > #353278 > [ 3 ] Choice 3: Further discussion > - - - -=-=-=-=-=- Don't Delete Anything Between These Lines =-=-=-=-=-=-=-=- -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ signature.asc Description: Digital signature
Bug#417869: marked as done (kernel-image-2.6.8-3-686: Depends on initrd-tools, which has been removed from unstable, uninstallable)
Your message dated Wed, 4 Apr 2007 22:37:46 -0700 with message-id <[EMAIL PROTECTED]> and subject line Bug#417869: kernel-image-2.6.8-3-686: Depends on initrd-tools, which has been removed from unstable, uninstallable has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: kernel-image-2.6.8-3-686 Severity: grave Justification: renders package unusable Due to initrd-tools being removed from unstable, this kernel line is no longer installable. -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-4-686 Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) --- End Message --- --- Begin Message --- On Wed, Apr 04, 2007 at 09:53:50PM -0700, Jesse Molina wrote: > Package: kernel-image-2.6.8-3-686 > Severity: grave > Justification: renders package unusable > Due to initrd-tools being removed from unstable, this kernel line is no > longer installable. It's also not *in* unstable. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ --- End Message ---
Bug#417869: kernel-image-2.6.8-3-686: Depends on initrd-tools, which has been removed from unstable, uninstallable
Package: kernel-image-2.6.8-3-686 Severity: grave Justification: renders package unusable Due to initrd-tools being removed from unstable, this kernel line is no longer installable. -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-4-686 Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Debian bug #399761: lib3ds.a need recompilation
Processing commands for [EMAIL PROTECTED]: > severity 399761 serious Bug#399761: lib3ds.a need recompilation Severity set to `serious' from `normal' > tags 399761 patch Bug#399761: lib3ds.a need recompilation There were no tags set. Tags added: patch > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#417327: marked as done (spurious use of debconf)
Your message dated Thu, 05 Apr 2007 03:32:03 + with message-id <[EMAIL PROTECTED]> and subject line Bug#417327: fixed in libcwd 0.99.44-0.2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: libcwd-dev Version: 0.99.44-0.1 Severity: serious Usertags: postrm-depends-nonessential Justification: Policy violation, see section 7.2 hi, while running archive wide piuparts tests your package failed on install because of debconf beeing unavailable during postinst: Setting up libcwd-dev (0.99.44-0.1) ... /var/lib/dpkg/info/libcwd-dev.postinst: line 13: /usr/share/debconf/confmodule: No such file or directory dpkg: error processing libcwd-dev (--configure): subprocess post-installation script returned error exit status 1 Errors were encountered while processing: libcwd-dev E: Sub-process /usr/bin/dpkg returned an error code (1) the full log can be found here: http://people.debian.org/~abi/piuparts/ please add proper depends for debconf. bye, - michael --- End Message --- --- Begin Message --- Source: libcwd Source-Version: 0.99.44-0.2 We believe that the bug you reported is fixed in the latest version of libcwd, which is due to be installed in the Debian FTP archive: libcwd-dev_0.99.44-0.2_i386.deb to pool/non-free/libc/libcwd/libcwd-dev_0.99.44-0.2_i386.deb libcwd-doc_0.99.44-0.2_all.deb to pool/non-free/libc/libcwd/libcwd-doc_0.99.44-0.2_all.deb libcwd0-dbg_0.99.44-0.2_i386.deb to pool/non-free/libc/libcwd/libcwd0-dbg_0.99.44-0.2_i386.deb libcwd0_0.99.44-0.2_i386.deb to pool/non-free/libc/libcwd/libcwd0_0.99.44-0.2_i386.deb libcwd_0.99.44-0.2.diff.gz to pool/non-free/libc/libcwd/libcwd_0.99.44-0.2.diff.gz libcwd_0.99.44-0.2.dsc to pool/non-free/libc/libcwd/libcwd_0.99.44-0.2.dsc A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Steve Langasek <[EMAIL PROTECTED]> (supplier of updated libcwd package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Wed, 04 Apr 2007 20:14:20 -0700 Source: libcwd Binary: libcwd-doc libcwd0 libcwd-dev libcwd0-dbg Architecture: source all i386 Version: 0.99.44-0.2 Distribution: unstable Urgency: high Maintainer: Matt T Galvin <[EMAIL PROTECTED]> Changed-By: Steve Langasek <[EMAIL PROTECTED]> Description: libcwd-dev - c++ debugging support library libcwd-doc - c++ debugging support library libcwd0- c++ debugging support library libcwd0-dbg - c++ debugging support library Closes: 417327 Changes: libcwd (0.99.44-0.2) unstable; urgency=high . * Non-maintainer upload. * High-urgency upload for RC bugfix. * Drop dangling reference to /usr/share/debconf/module in libcwd-dev.postinst, nothing in this package uses debconf. Closes: #417327. Files: 5c0f75ebecdf5910136d9b55a07c6150 717 non-free/libs optional libcwd_0.99.44-0.2.dsc c9cffde5f3e4c88a020fa462a143e374 21717 non-free/libs optional libcwd_0.99.44-0.2.diff.gz 421ed2515616c3d1b7d0a1f4bbda12fe 629132 non-free/doc optional libcwd-doc_0.99.44-0.2_all.deb 69a2210ceb4f53549233cc37546b352b 62964 non-free/libdevel optional libcwd-dev_0.99.44-0.2_i386.deb 15f6dfcc846aad1fbcf7f5cb2691ce5f 311944 non-free/libs optional libcwd0_0.99.44-0.2_i386.deb 51011998950ab269cbd3a249fa6d3d74 1470586 non-free/libdevel optional libcwd0-dbg_0.99.44-0.2_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGFGsGKN6ufymYLloRAgI3AJ9B5eoXDVbGzohOlZElONAO3JnqwwCgxg0Z NKc0BQT82TFbmgfmk+T3aek= =GM8G -END PGP SIGNATURE- --- End Message ---
Bug#417327: missing dependency on debconf
retitle 417327 spurious use of debconf tags 417327 patch thanks This is not a missing dependency on debconf, the package doesn't use debconf at all and should not be sourcing confmodule in the postinst. The attached trivial patch corrects this. Since we are only three days out from locking the archive down for the etch release, I'm going ahead with a 0-day NMU on this package using the attached patch. The NMU will be uploaded to incoming shortly. Thanks, -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ diff -u libcwd-0.99.44/debian/libcwd-dev.postinst libcwd-0.99.44/debian/libcwd-dev.postinst --- libcwd-0.99.44/debian/libcwd-dev.postinst +++ libcwd-0.99.44/debian/libcwd-dev.postinst @@ -10,7 +10,6 @@ #`removing' # -. /usr/share/debconf/confmodule test $DEBIAN_SCRIPT_DEBUG && set -v -x case "$1" in diff -u libcwd-0.99.44/debian/changelog libcwd-0.99.44/debian/changelog --- libcwd-0.99.44/debian/changelog +++ libcwd-0.99.44/debian/changelog @@ -1,3 +1,12 @@ +libcwd (0.99.44-0.2) unstable; urgency=high + + * Non-maintainer upload. + * High-urgency upload for RC bugfix. + * Drop dangling reference to /usr/share/debconf/module in +libcwd-dev.postinst, nothing in this package uses debconf. Closes: #417327. + + -- Steve Langasek <[EMAIL PROTECTED]> Wed, 04 Apr 2007 20:14:20 -0700 + libcwd (0.99.44-0.1) unstable; urgency=low * Non-maintainer upload.
Processed: Re: missing dependency on debconf
Processing commands for [EMAIL PROTECTED]: > retitle 417327 spurious use of debconf Bug#417327: missing dependency on debconf Changed Bug title to spurious use of debconf from missing dependency on debconf. > tags 417327 patch Bug#417327: spurious use of debconf There were no tags set. Tags added: patch > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#417539: upstream references
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 tags 417539 patch thanks Issue according to the changelog: http://www.tinymux.org/changes.txt - -- Fix buffer overflow in fun_ladd (Issue 282) BTS in upstream is: http://code.google.com/p/tinymux/issues/detail?q=282&can=2&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary&id=282 and claims the issue is fixed in revision 1004. Upstream patch is attached. - -- Regards, EddyP = "Imagination is more important than knowledge" A.Einstein -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGFGTSY8Chqv3NRNoRAuusAJ9khzkdquRyBWKC0sXtsK4nhG49iQCbBxKQ +M2AKZGsXEV6an5HGXjl2kw= =H/fk -END PGP SIGNATURE- Index: mux/src/funmath.cpp === --- mux/src/funmath.cpp (revision 1003) +++ mux/src/funmath.cpp (revision 1004) @@ -314,7 +314,8 @@ } char *cp = trim_space_sep(fargs[0], &sep); -while (cp) +while ( cp + && n < (LBUF_SIZE+1)/2) { char *curr = split_token(&cp, &sep); g_aDoubles[n++] = mux_atof(curr); Index: mux/CHANGES === --- mux/CHANGES (revision 1003) +++ mux/CHANGES (revision 1004) @@ -57,6 +57,7 @@ -- Fix signed / unsigned warning in dump_info() (Issue 276). -- Corrected minor typo in @comon section of help.txt. (Issue 275) -- Restore newline skipping in wrap(), broken in 2.7.0.2 (Issue 278). + -- Fix potential buffer overflow in ladd() (Issue 282). Thanks Jake. Performance Enhancements:
Processed: upstream references
Processing commands for [EMAIL PROTECTED]: > tags 417539 patch Bug#417539: tinymux: Buffer overflow in fun_ladd of funmath.cpp with security implications. Tags were: security Tags added: patch > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#414045: [EMAIL PROTECTED]: graphicsmagick and bug 414045]
clone 414045 -1 reopen -1 reassign -1 graphicsmagick notforwarded -1 thanks Hi Larry, On Tue, Apr 03, 2007 at 10:36:40PM -0700, [EMAIL PROTECTED] wrote: > I suspect the RMs are ignoring it because it's tagged > security, and "we can always put out security fixes > post-release". > This bug sits in a misleading status, though, because > the patches I posted apply to both graphicsmagick and > libx11. So the BTS doesn't currently have an RC bug > applied to graphicsmagick. > I suggest you do the following: > - clone the bug to graphicsmagick > - add "patched" tags > - post clarifications (and links, maybe with md5sums) as to > what image files generate the two bugs. > I don't want to take those first two steps myself, > since IANADD, and I'd probably bungle them. If you want > to delegate the last step to me, I can do that. Well, you don't have to be a DD to make those changes; and anyway, there are plenty of eyeballs on the release-critical bugs who will help if you do misstep. :) Anyway, I've done the first two bits, the third seems like something for someone closer to the bug. I don't see any particular reason that graphicsmagick should be specially discriminated against by the security team when it comes to segfaults on untrusted input, so I'm leaving the severity at 'grave' for now. Thanks, -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Re: [EMAIL PROTECTED]: graphicsmagick and bug 414045]
Processing commands for [EMAIL PROTECTED]: > clone 414045 -1 Bug#414045: libX11: Buffer overflow in XGetPixel(). Bug 414045 cloned as bug 417862. > reopen -1 Bug#417862: libX11: Buffer overflow in XGetPixel(). 'reopen' may be inappropriate when a bug has been closed with a version; you may need to use 'found' to remove fixed versions. Bug reopened, originator not changed. > reassign -1 graphicsmagick Bug#417862: libX11: Buffer overflow in XGetPixel(). Bug reassigned from package `libx11' to `graphicsmagick'. > notforwarded -1 Bug#417862: libX11: Buffer overflow in XGetPixel(). Removed annotation that Bug had been forwarded to [EMAIL PROTECTED] > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#404148: kernel: data corruption with nvidia chipsets and IDE/SATA drives // memory hole mapping
On Sat, Mar 31, 2007 at 11:29:23PM +0200, Christoph Anton Mitterer wrote: > Steve Langasek wrote: > > Well, there's no reason that someone can't use iommu=soft when booting the > > installer, as well. So perhaps it would be best to clone that bug and > > include this information in the installation guide or errata? > Yes that's a good idea. > I assume it would be also a problem, too just set the installer to > iomm=soft (e.g. via the bootloader)? Yes, it is a problem; there is no window of opportunity for making such a change before release (there was even less of one than for the kernel), and the fix properly belongs in the kernel package, not in the installer or bootloaders. > One last thing perhaps. I'd include a link to the kernel.org bug report > in your release notes text and maybe some information that systems might > already have some data corruption (as this bug is not new). Link to kernel.org is included; "systems might already have some data corruption" is not relevant to the release notes that I can see, the release notes are about upgrades from sarge which did not have this problem (because it didn't support hw iommu at all). > btw: Is the kernel team now aware of your patch and will it use it in > following linux-* packages? i.e. in unstable? The kernel team is aware of it, but no decision has been made yet to include it in the kernel packages, since the verdict is still out upstream. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#417407: debian-installer: d-i destroyed existing raid device
severity 417407 important thanks At this point, there is a lack of evidence showing that this data loss was caused by os-prober. There is, however, evidence that the RAID was in an inconsistent state before debian-installer ever looked at it -- more inconsistent than the d-i team was able to forcibly achieve in testing. Since we no one seems to have any leads on a way forward on this issue, I don't think it's reasonable to treat it as "critical". Of course, if someone does identify a cause for this bug in debian-installer, it would be reasonable to fix it at the next possible moment. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Re: debian-installer: d-i destroyed existing raid device
Processing commands for [EMAIL PROTECTED]: > severity 417407 important Bug#417407: debian-installer: d-i destroyed existing raid device Severity set to `important' from `critical' > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#417859: banshee crashes when I try to create a intelligent list
Package: banshee Version: 0.11.3+dfsg-2 Severity: grave Justification: renders package unusable Banshee crashs when I try to create an intelligent list whith the next options: coincidence unchecket, limit to 25 songs aleatory -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.20.120207 Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8) Versions of packages banshee depends on: ii boo0.7.6.2237-6 a python-like language and compile ii gconf2 2.18.0.1-2GNOME configuration database syste ii gstreamer0.10-gnomevfs 0.10.12-1 GStreamer plugin for GnomeVFS ii gstreamer0.10-plugins-base 0.10.12-1 GStreamer plugins from the "base" ii gstreamer0.10-plugins-good 0.10.5-4 GStreamer plugins from the "good" ii libatk1.0-01.18.0-1 The ATK accessibility toolkit ii libbonobo2-0 2.18.0-1 Bonobo CORBA interfaces library ii libc6 2.5-0exp6 GNU C Library: Shared libraries ii libcairo2 1.4.2-1 The Cairo 2D vector graphics libra ii libdbus-1-31.0.2-1 simple interprocess messaging syst ii libdbus-glib-1-2 0.73-1simple interprocess messaging syst ii libfontconfig1 2.4.2-1.2 generic font configuration library ii libgconf2-42.18.0.1-2GNOME configuration database syste ii libgconf2.0-cil2.16.0-1 CLI binding for GConf 2.16 ii libglade2.0-cil2.10.0-1 CLI binding for the Glade librarie ii libglib2.0-0 2.12.11-1 The GLib library of C routines ii libglib2.0-cil 2.10.0-1 CLI binding for the GLib utility l ii libgnome2.0-cil2.16.0-1 CLI binding for Gnome 2.16 ii libgnomevfs2-0 1:2.18.0.1-1 GNOME Virtual File System (runtime ii libgstreamer0.10-0 0.10.12-2 Core GStreamer libraries and eleme ii libgtk2.0-02.10.11-1 The GTK+ graphical user interface ii libgtk2.0-cil 2.10.0-1 CLI binding for the GTK+ toolkit 2 ii libipoddevice0 0.5.2-1 library for retrieving information ii libmono-cairo2.0-cil 1.2.2.1-2 Mono Cairo library ii libmono-corlib1.0-cil 1.2.3.1-3 Mono core library (1.0) ii libmono-corlib2.0-cil 1.2.3.1-3 Mono core library (2.0) ii libmono-security2.0-cil1.2.3.1-3 Mono Security library ii libmono-sqlite2.0-cil 1.2.3.1-3 Mono Sqlite library ii libmono-system-data2.0-cil 1.2.3.1-3 Mono System.Data Library ii libmono-system-web2.0-cil 1.2.3.1-3 Mono System.Web Library ii libmono-system2.0-cil 1.2.3.1-3 Mono System libraries (2.0) ii libmono1.0-cil 1.2.3.1-3 Mono libraries (1.0) ii libmono2.0-cil 1.2.3.1-3 Mono libraries (2.0) ii libmusicbrainz4c2a 2.1.4-1 Second generation incarnation of t ii libnautilus-burn3 2.14.3-8+b1 Nautilus Burn Library - runtime ve ii libnjb52.2.5-4.1 Creative Labs Nomad Jukebox librar ii liborbit2 1:2.14.4-1libraries for ORBit2 - a CORBA ORB ii libpango1.0-0 1.16.1-1 Layout and rendering of internatio ii libusb-0.1-4 2:0.1.12-6userspace USB programming library ii libx11-6 2:1.1.1-1 X11 client-side library ii libxcursor11:1.1.8-1 X cursor management library ii libxext6 1:1.0.3-1 X11 miscellaneous extension librar ii libxfixes3 1:4.0.3-1 X11 miscellaneous 'fixes' extensio ii libxi6 2:1.1.0-2 X11 Input extension library ii libxinerama1 1:1.0.1-4.1 X11 Xinerama extension library ii libxml22.6.27.dfsg-1 GNOME XML library ii libxrandr2 2:1.2.0-4 X11 RandR extension library ii libxrender11:0.9.1-3 X Rendering Extension client libra ii mono-runtime 1.2.3.1-3 Mono runtime Versions of packages banshee recommends: ii gstreamer0.10-plugins-ugly0.10.5-1 GStreamer plugins from the "ugly" -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#416824: klaptopdaemon: lock & hibernate allowing unauthorised access
forwarded 416824 https://bugs.kde.org/show_bug.cgi?id=143859 thanks El Martes, 3 de Abril de 2007 00:01, Sune Vuorela escribió: > > > Hi, I'm using Etch RC2 and I use klaptopdaemon to lock and hibernate my > > > laptop when I noticed an interesting little bug. I access lock and > > > hibernate by right-clicking on the system tray icon and clicking on the > > > option there. > > I have absolutely only very little clue about this, but I took a look at > the klaptopdaemon sources - and it seems it invokes the lock command and > after that it invokes hibernate. > > It might be that the lock command returns immediately while the locking can > be delayed for some reasons. > After some conversation on #kde they pointed me the reason is indeed that, but instead of carrying out the test Sune proposed it suggested me a "smarter kde way" (TM) which consists of substituing the asynchronous "send" dcop API call by a "call" which is synchronous. I also opened a bug on kde and there is a proposed patch -- Raúl Sánchez Siles ->Proud Debian user<- Linux registered user #416098 pgpbZPswyoP3Q.pgp Description: PGP signature
Bug#416374: marked as done (kernel: data corruption with nvidia chipsets and IDE/SATA drives // memory hole mapping related bug?!)
Your message dated Wed, 4 Apr 2007 17:05:02 -0700 with message-id <[EMAIL PROTECTED]> and subject line kernel: data corruption with nvidia chipsets and IDE/SATA drives // memory hole mapping related bug?! has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: kernel Severity: critical Justification: causes serious data loss Hi everybody. I'm currently (together with others) investigating in a severe data corruption problem that at least many users might suffer from. A short description, when you validate lots of GBs over and over with md5sums (or another hash) there are errors found. We do not yet know the real reson for the problems but it might relate to Opteron (and perhaps Athlon) CPUs and/or Nvidia chipsets (mainboard). So it might be a hardware design error (but even a kernel error could be possible). This is definitely not a single hardware issue of my system as many other users on lkml reported the problem (and we all did very extensive hardware tests). The error occurs only if on has so much memory that the system uses memory mapping (and the hardware iommu). At lkml we currently found two "solutions" (I consider them more workarounds, as we don't know exactly why they're solving the problem): 1) Disabling memory hole mapping in the system BIOS. The downside is that there is no memory hole mapping at all, and the users looses much of his main memory (in my case 1,5 GB) 2) Setting iommu=soft. The users keeps it full memory, and in all our tests (at least as far as I am informed), and we do very much tests as I and someone else administer some big linux clusters,... the error did _not_ occur. Windows users do generally not suffer from this corruption, as Windows (at least until Vista) was not able to make use of the hardware iommu, and always uses the software iommu. The Intel CPUs with EMT64/Intel64 don't suffer from that problem either, as they don't have an hwiommu, too (at least as far as I know). We are not yet sure if this is a large scale problem or affects only some special hardware combinations. We do however think that the issue occurs only with PCI-DMA accesses. (Tests showed, that when disabling dma or at least using slower dma modes on the disks, the issue disappeared). The problem is vendors (at least Nvidia) does not help very much, they even didn't answer my mails. And most "normal" users won't recognise this problem, as they don't have enought main memory and even it they have the error occurs very rarely (perhaps some 100 bytes every 30 GB <- only a very imprecise scale). What I suggest know: As this is a very grave I suggest - to configure all the default kernels for etch that may be affected (as far as I know that are the amd64-k8 and amd64-generic kernels. Perhaps the i386 packages too, have a look at lkml for this) to use iommu=soft. - to update all packages in sarge and woody (as far as they might be affected) - put some warnings in the packages where users might configure their own kernel and the boot-loaders. Have a look at this thread at lkml http://marc.theaimsgroup.com/?t=11650212181&r=1&w=2 for in-depth information. It also contains links to some previous threads. There are also some posts to lkml about this topics in separate threads (e.g. "amd64 iommu causing corruption? (was Re: data corruption with nvidia chipsets and IDE/SATA drives // memory hole mapping related bug?!)"). Best wishes, Chris. btw: please CC me as I'm off-list at the moment. PS: I'll also write this the debian-kernel mailinglist. -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Shell: /bin/sh linked to /bin/dash Kernel: Linux 2.6.18 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=UTF-8) begin:vcard fn:Mitterer, Christoph Anton n:Mitterer;Christoph Anton email;internet:[EMAIL PROTECTED] x-mozilla-html:TRUE version:2.1 end:vcard --- End Message --- --- Begin Message --- clone 416374 -1 reassign -1 installation-guide-amd64 reopen -1 found -1 20070319 severity -1 important thanks The following explanatory text has been added to the release notes in CVS: 5.1.7 Data corruption with Hardware IOMMU on Nvidia chipsets A problem has been identified on AMD64 systems with Nvidia chipsets and more than 3GB of RAM that causes sporadic data corruption when the hardware IOMMU is used. This problem is still under investigation by the Linux kernel developers and the hardware manufacturers, and no official upstream fix has been
Processed: Re: kernel: data corruption with nvidia chipsets and IDE/SATA drives // memory hole mapping related bug?!
Processing commands for [EMAIL PROTECTED]: > clone 416374 -1 Bug#416374: kernel: data corruption with nvidia chipsets and IDE/SATA drives // memory hole mapping related bug?! Bug 416374 cloned as bug 417853. > reassign -1 installation-guide-amd64 Bug#417853: kernel: data corruption with nvidia chipsets and IDE/SATA drives // memory hole mapping related bug?! Bug reassigned from package `release-notes' to `installation-guide-amd64'. > reopen -1 Bug#417853: kernel: data corruption with nvidia chipsets and IDE/SATA drives // memory hole mapping related bug?! Bug is already open, cannot reopen. > found -1 20070319 Bug#417853: kernel: data corruption with nvidia chipsets and IDE/SATA drives // memory hole mapping related bug?! Bug marked as found in version 20070319. > severity -1 important Bug#417853: kernel: data corruption with nvidia chipsets and IDE/SATA drives // memory hole mapping related bug?! Severity set to `important' from `serious' > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#417848: gclcvs: FTBFS: Error: FLOATING-POINT-OVERFLOW
Package: gclcvs Version: 2.7.0-66 Severity: serious Hi, Your package failed to build with the following error: >echo "(compile-file \"demos/gc-monitor.lisp\" :c-file nil :c-debug nil)" | >../unixport/saved_gcl GCL (GNU Common Lisp) 2.7.0 CLtL1Apr 4 2007 22:39:43 Source License: LGPL(gcl,gmp,pargcl), GPL(unexec,bfd,xgcl) Binary License: GPL due to GPL'ed components: (XGCL READLINE BFD UNEXEC) Modifications of this banner must retain notice of a compatible license Dedicated to the memory of W. Schelter Use (help) to get some basic information on how to use GCL. Temporary directory for compiler files set to /tmp/ > ;; Compiling demos/gc-monitor.lisp. ;; Loading ./gcl_cmpinit.lsp ;; Loading tk-package.lsp ;; Finished loading tk-package.lsp ;; Finished loading ./gcl_cmpinit.lsp Error: FLOATING-POINT-OVERFLOW :OPERATION * :OPERANDS (-6.45636043S19 -9223372036854775808) NIL Fast links are on: do (si::use-fast-links nil) for debugging Signalled by COMPILER::COMPILE-FILE1. FLOATING-POINT-OVERFLOW :OPERATION * :OPERANDS (-6.45636043S19 -9223372036854775808) NIL Broken at COMPILER::COMPILE-FILE1. Type :H for Help. TK>>make[2]: *** [demos/gc-monitor.o] Error 255 make[2]: Leaving directory `/build/buildd/gclcvs-2.7.0/gcl-tk' Kurt -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#417844: gobby: symbol lookup error: gobby: undefined symbol: _ZN3Gtk6Window16set_urgency_hintEb
severity 417844 normal reassign 417844 libgtkmm-2.4-1c2a thanks On Wed, Apr 04, 2007 at 02:58:48PM -0700, Kingsley G. Morse Jr. wrote: > Package: gobby > Version: 0.4.1-2 > Severity: grave > Justification: renders package unusable > Thanks for maintaining gobby. I'm looking forward > to white-boarding. > I noticed that the first time I ran gobby, it > crashed with: > gobby: symbol lookup error: gobby: undefined symbol: > _ZN3Gtk6Window16set_urgency_hintEb > This was fixed by upgrading libgtkmm-2.4-1c2a from > version 1:2.6.5-1 to 1:2.8.8-1. > Perhaps gobby's dependencies should say > libgtkmm-2.4-1c2a (>= 1:2.8.8-1). Yes, they should, but this is an automatically generated dependency based on the shlibs provided by libgtkmm-2.4-1c2a, so this is a bug in that package for not providing correctly versioned shlibs. However, as 1:2.8.8-1 is the only version of libgtkmm-2.4-1c2a in the archive since June 2006 (and hence the only version formally supported by Debian), this is not a grave bug. Downgrading and reassigning. Thanks, -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#417844: gobby: symbol lookup error: gobby: undefined symbol: _ZN3Gtk6Window16set_urgency_hintEb
Processing commands for [EMAIL PROTECTED]: > severity 417844 normal Bug#417844: gobby: symbol lookup error: gobby: undefined symbol: _ZN3Gtk6Window16set_urgency_hintEb Severity set to `normal' from `grave' > reassign 417844 libgtkmm-2.4-1c2a Bug#417844: gobby: symbol lookup error: gobby: undefined symbol: _ZN3Gtk6Window16set_urgency_hintEb Bug reassigned from package `gobby' to `libgtkmm-2.4-1c2a'. > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#417049: marked as done (gclcvs: ./saved_pre_gcl: No such file or directory)
Your message dated Wed, 04 Apr 2007 22:32:08 + with message-id <[EMAIL PROTECTED]> and subject line Bug#417049: fixed in gclcvs 2.7.0-66 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: gclcvs Version: 2.7.0-65 Severity: serious Hi, Your package is failing to build on 64 bit arches with the following error: Lisp initialization failed. rm -f tmp_image rm raw_pre_gcl pre_init.lsp post_init.lsp make[2]: Leaving directory `/build/buildd/gclcvs-2.7.0/unixport' cd unixport && echo '(si::use-fast-links nil)(load "boot.lisp")' | ./saved_pre_gcl && /usr/bin/make saved_gcl && mv saved_gcl saved_pre_gcl /bin/sh: ./saved_pre_gcl: No such file or directory make[1]: *** [unixport/saved_pre_gcl] Error 127 make[1]: Leaving directory `/build/buildd/gclcvs-2.7.0' make: *** [build-trad-stamp] Error 2 Kurt --- End Message --- --- Begin Message --- Source: gclcvs Source-Version: 2.7.0-66 We believe that the bug you reported is fixed in the latest version of gclcvs, which is due to be installed in the Debian FTP archive: gclcvs-doc_2.7.0-66_all.deb to pool/main/g/gclcvs/gclcvs-doc_2.7.0-66_all.deb gclcvs_2.7.0-66.dsc to pool/main/g/gclcvs/gclcvs_2.7.0-66.dsc gclcvs_2.7.0-66.tar.gz to pool/main/g/gclcvs/gclcvs_2.7.0-66.tar.gz gclcvs_2.7.0-66_i386.deb to pool/main/g/gclcvs/gclcvs_2.7.0-66_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Camm Maguire <[EMAIL PROTECTED]> (supplier of updated gclcvs package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Wed, 04 Apr 2007 14:01:28 -0400 Source: gclcvs Binary: gclcvs gclcvs-doc Architecture: source i386 all Version: 2.7.0-66 Distribution: unstable Urgency: low Maintainer: Camm Maguire <[EMAIL PROTECTED]> Changed-By: Camm Maguire <[EMAIL PROTECTED]> Description: gclcvs - GNU Common Lisp compiler, CVS snapshot gclcvs-doc - Documentation for GNU Common Lisp, CVS snapshot Closes: 417049 Changes: gclcvs (2.7.0-66) unstable; urgency=low . * clisp-style directory;fix multiple-setq-expander * fix 64bit array sizes, Closes: #417049 * fix name-char on control characters * fix reading and printing of random-states * fix reading and printing of floats * fix equalp on random-states Files: 419757d675c02f335d05295a3147e1ce 686 interpreters optional gclcvs_2.7.0-66.dsc b286753920599127cb1f17218ba5b4e6 23286707 interpreters optional gclcvs_2.7.0-66.tar.gz 185c6fb354733bec67bf8da58fd7d264 2352558 doc optional gclcvs-doc_2.7.0-66_all.deb 0dd4a3b6c5513b8b0967e1db82fe0738 39539636 interpreters optional gclcvs_2.7.0-66_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGFCFlczG1wFfwRdwRAkr9AKC0nd2bekwGQvBxtgOws/jYnZEbJwCgiGLu ozFVmVRs+y/SUXoESjw2b78= =WWCz -END PGP SIGNATURE- --- End Message ---
Bug#401010: evolution: Evolution hangs when i try to read a mail
2007/4/4, WaVeR <[EMAIL PROTECTED]>: But still have the same problem, as u can see on the gdb backtrace Ok. Thanks for reporting back. The bug is fixed upstream. The bug we had to revert was my attempt at a backport. Since we're so close to a release, we'll wait until the release and evolution 2.8 is pushed from experimental to unstable. Then we'll upload 2.10, which has this fixed. I've already built 2.10, so it shouldn't take too long. Give me a hint if you want to try 2.10. Øystein
Processed: reopening 401010, found 401010 in 1.8.2-3
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.2 > reopen 401010 WaVeR <[EMAIL PROTECTED]> Bug#401010: evolution: Evolution hangs when i try to read a mail 'reopen' may be inappropriate when a bug has been closed with a version; you may need to use 'found' to remove fixed versions. Bug reopened, originator set to WaVeR <[EMAIL PROTECTED]>. > found 401010 1.8.2-3 Bug#401010: evolution: Evolution hangs when i try to read a mail Bug marked as found in version 1.8.2-3. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#417844: gobby: symbol lookup error: gobby: undefined symbol: _ZN3Gtk6Window16set_urgency_hintEb
Package: gobby Version: 0.4.1-2 Severity: grave Justification: renders package unusable Thanks for maintaining gobby. I'm looking forward to white-boarding. I noticed that the first time I ran gobby, it crashed with: gobby: symbol lookup error: gobby: undefined symbol: _ZN3Gtk6Window16set_urgency_hintEb This was fixed by upgrading libgtkmm-2.4-1c2a from version 1:2.6.5-1 to 1:2.8.8-1. Perhaps gobby's dependencies should say libgtkmm-2.4-1c2a (>= 1:2.8.8-1). Thanks, Kingsley -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-4-k7 Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) Versions of packages gobby depends on: ii libart-2.0-2 2.3.16-5 Library of functions for 2D graphi ii libatk1.0-0 1.12.2-1 The ATK accessibility toolkit ii libavahi-compat-howl0 0.6.16-5 Avahi Howl compatibility library ii libbonobo2-0 2.14.0-1 Bonobo CORBA interfaces library ii libc6 2.3.6-7GNU C Library: Shared libraries ii libcairo2 1.2.4-1The Cairo 2D vector graphics libra ii libfontconfig12.4.1-2generic font configuration library ii libgcc1 1:4.1.1-18 GCC support library ii libgconf2-4 2.14.0-4 GNOME configuration database syste ii libglib2.0-0 2.12.4-2 The GLib library of C routines ii libglibmm-2.4-1c2a2.8.2-2C++ wrapper for the GLib toolkit ( ii libgnomeprint2.2-02.12.1-6 The GNOME 2.2 print architecture - ii libgnomevfs2-02.14.2-2+b1GNOME virtual file-system (runtime ii libgnutls13 1.4.4-1the GNU TLS library - runtime libr ii libgtk2.0-0 2.8.10-1 The GTK+ graphical user interface ii libgtkmm-2.4-1c2a 1:2.8.8-1 C++ wrappers for GTK+ 2.4 (shared ii libgtksourceview1.0-0 1.8.1-2shared libraries for the GTK+ synt ii libnet6-1.3-0 1:1.3.1-3 Network access framework for IPv4/ ii libobby-0.4-0 0.4.1-2Synced document buffers ii liborbit2 1:2.14.3-0.1 libraries for ORBit2 - a CORBA ORB ii libpango1.0-0 1.14.8-2 Layout and rendering of internatio ii libsigc++-2.0-0c2a2.0.16-2 type-safe Signal Framework for C++ ii libstdc++64.1.1-18 The GNU Standard C++ Library v3 ii libx11-6 2:1.0.3-4 X11 client-side library ii libxcursor1 1.1.3-1X cursor management library ii libxext6 1:1.0.1-2 X11 miscellaneous extension librar ii libxfixes31:4.0.1-5 X11 miscellaneous 'fixes' extensio ii libxi61:1.0.1-4 X11 Input extension library ii libxinerama1 6.8.2.dfsg.1-7 X Window System multi-head display ii libxml++2.6-2 2.14.0-0.1 A C++ interface to the GNOME XML l ii libxml2 2.6.27.dfsg-1 GNOME XML library ii libxrandr24.3.0.dfsg.1-1 X Window System Resize, Rotate and ii libxrender1 1:0.9.0.2-1X Rendering Extension client libra ii zlib1g1:1.2.1-2 compression library - runtime gobby recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#401010: evolution: Evolution hangs when i try to read a mail
Hi Øystein, I update my evolution-data-server 23:42 [EMAIL PROTECTED] ~% dpkg -l \*evolution\* | grep ^ii ii evolution 2.8.2.1-1 groupware suite with mail client and organizer ii evolution-common 2.8.2.1-1 architecture independent files for Evolution ii evolution-data-server 1.8.2-3 evolution database backend server ii evolution-data-server-common 1.8.2-3 architecture independent files for Evolution D ii openoffice.org-evolution 2.0.4.dfsg.2-7 Evolution Addressbook support for OpenOffice.o But still have the same problem, as u can see on the gdb backtrace: (evolution-2.8:26329): camel-WARNING **: Camel operation status stack non empty: I/O error : Too many open files I/O warning : failed to load external entity "/home/waver/.evolution/mail/config/et-expanded-maildir:___home_waver_Maildir#._23evolution_Trash" I/O error : Too many open files I/O warning : failed to load external entity "/usr/share/evolution/2.8/views/mail/galview.xml" I/O error : Too many open files I/O warning : failed to load external entity "/home/waver/.evolution/mail/views/current_view-maildir:___home_waver_Maildir#._23evolution_Trash.xml" [New Thread -1301283920 (LWP 26359)] (evolution-2.8:26329): camel-WARNING **: camel_exception_get_id called with NULL parameter. (evolution-2.8:26329): camel-WARNING **: camel_exception_get_id called with NULL parameter. (evolution-2.8:26329): camel-WARNING **: camel_exception_get_id called with NULL parameter. (evolution-2.8:26329): camel-WARNING **: camel_exception_get_id called with NULL parameter. (evolution-2.8:26329): e-table-CRITICAL **: e_table_state_duplicate: assertion `state != NULL' failed Program received signal SIGSEGV, Segmentation fault. [Switching to Thread -1232451904 (LWP 26329)] 0xb7e7b7fe in e_table_state_load_from_node () from /usr/lib/evolution/2.8/libetable.so.0 (gdb) backtrace #0 0xb7e7b7fe in e_table_state_load_from_node () from /usr/lib/evolution/2.8/libetable.so.0 #1 0xb7e7ba71 in e_table_state_load_from_file () from /usr/lib/evolution/2.8/libetable.so.0 #2 0xb6551aa8 in ?? () from /usr/lib/evolution/2.8/libmenus.so.0 #3 0x in ?? () Regards, Le mercredi 04 avril 2007 à 15:29 +0200, Øystein Gisnås a écrit : > A patch which supposedly should fix this problem was uploaded, but > created consistent crashes. I've reverted the patch and Loïc has > reoploaded. Do you have a chance to see if the problem is existent > with the newly uploaded 1.8.2-3 version of evolution-data-server (and > its libraries)? > > Cheers, > Øystein >
Bug#417763: marked as done (monodevelop-versioncontrol: uninstalable because wrong dependencies on libapr0 and libsvn0)
Your message dated Wed, 04 Apr 2007 20:32:08 + with message-id <[EMAIL PROTECTED]> and subject line Bug#417763: fixed in monodevelop 0.13.1+dfsg-2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: monodevelop-versioncontrol Version: 0.13.1+dfsg-1 Severity: grave Justification: renders package unusable Package is uninstalable, depends are wrong, libapr0 >= 2.0.55 and libsvn0 >= 1.4.0 don't exist on Debian archive. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (99, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-4-k7 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) --- End Message --- --- Begin Message --- Source: monodevelop Source-Version: 0.13.1+dfsg-2 We believe that the bug you reported is fixed in the latest version of monodevelop, which is due to be installed in the Debian FTP archive: monodevelop-boo_0.13.1+dfsg-2_all.deb to pool/main/m/monodevelop/monodevelop-boo_0.13.1+dfsg-2_all.deb monodevelop-java_0.13.1+dfsg-2_all.deb to pool/main/m/monodevelop/monodevelop-java_0.13.1+dfsg-2_all.deb monodevelop-nunit_0.13.1+dfsg-2_all.deb to pool/main/m/monodevelop/monodevelop-nunit_0.13.1+dfsg-2_all.deb monodevelop-query_0.13.1+dfsg-2_all.deb to pool/main/m/monodevelop/monodevelop-query_0.13.1+dfsg-2_all.deb monodevelop-versioncontrol_0.13.1+dfsg-2_all.deb to pool/main/m/monodevelop/monodevelop-versioncontrol_0.13.1+dfsg-2_all.deb monodevelop_0.13.1+dfsg-2.diff.gz to pool/main/m/monodevelop/monodevelop_0.13.1+dfsg-2.diff.gz monodevelop_0.13.1+dfsg-2.dsc to pool/main/m/monodevelop/monodevelop_0.13.1+dfsg-2.dsc monodevelop_0.13.1+dfsg-2_all.deb to pool/main/m/monodevelop/monodevelop_0.13.1+dfsg-2_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Mirco Bauer <[EMAIL PROTECTED]> (supplier of updated monodevelop package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Wed, 04 Apr 2007 22:00:22 +0200 Source: monodevelop Binary: monodevelop-versioncontrol monodevelop-nunit monodevelop-java monodevelop-boo monodevelop monodevelop-query Architecture: source all Version: 0.13.1+dfsg-2 Distribution: unstable Urgency: low Maintainer: Mirco Bauer <[EMAIL PROTECTED]> Changed-By: Mirco Bauer <[EMAIL PROTECTED]> Description: monodevelop - C#/Boo/Java/Nemerle/ILasm/ASP.NET Development Environment monodevelop-boo - Boo plugin for MonoDevelop monodevelop-java - Java plugin for MonoDevelop monodevelop-nunit - NUnit plugin for MonoDevelop monodevelop-query - MonoQuery plugin for MonoDevelop monodevelop-versioncontrol - VersionControl plugin for MonoDevelop Closes: 417763 Changes: monodevelop (0.13.1+dfsg-2) unstable; urgency=low . * debian/patches/use_libsvn1.dpatch: debian/patches/use_libapr1.dpatch: + Remove references in the code that pulls libsvn0 and libapr0 in. (Closes: #417763) Files: e49f0eafdfd0161ac63ee43374eeb103 1730 devel optional monodevelop_0.13.1+dfsg-2.dsc d5343fb4a9f1ca23eb406636795cc359 18222 devel optional monodevelop_0.13.1+dfsg-2.diff.gz 63b5766c9cee507ccae0128aecb9d5d0 2041174 devel optional monodevelop_0.13.1+dfsg-2_all.deb 2de7412c13a09f208c67a9b317918aeb 60194 devel optional monodevelop-boo_0.13.1+dfsg-2_all.deb 5ea7330b25e8d541fe973df063bb474c 51526 devel optional monodevelop-java_0.13.1+dfsg-2_all.deb c56d127dbc55754192549e9dd9c5dfdf 52768 devel optional monodevelop-nunit_0.13.1+dfsg-2_all.deb e267cc92146add1f841afa513e2974ca 96754 devel optional monodevelop-versioncontrol_0.13.1+dfsg-2_all.deb a0b5c37ae567546e3526b7102fdb666c 68382 devel optional monodevelop-query_0.13.1+dfsg-2_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iQEVAwUBRhQE4nEn5avu+UbIAQKGzAf8DZMNl9/cISMgDmDTRRG3BcsK/a1ZlixX wk3etkHbO1RwDUTQGIvJodmzZiM57ycnBmbiR7+a/nyR7jmPmPqD+Iff1XYMuLKa XntiuWsjHWf44/LxtRByhQSHJb1c2b2RJU+eQMRvyXrDfF4W/xAEA1rU8EtoFEX5 s7O7RR79nqh3MQ+UJKonUfdRwPFwmDDTp+wxja3R9ilZAnDci6HjLrZ336cSYXPe taQFF2El/XB2eqNgLkOnTBf1QmQkIBq7yOid6PA2bkYGSxVVsAt
Bug#417649: 100% cpu utilization with kdelibs 4:3.5.5a.dfsg.1-8
On Wed, Apr 04, 2007 at 05:24:25PM +0100, Ana Guerrero wrote: > > >Can you try to upgrade again to -8 and see if still happens? > > The problem persisted; when I downgrade to a previous version the > > problem disappear. Please notice that I'm not only upgrading > > (downgrading) kdelibs, I've also upgrading (downgrading) kdelibs4c2a > > and kdelibs-data. > Yes, all those packages are built from the same source. > > I'm using 8859-1 as my locale (probably it doesn't matter, but the > > patch is about a problem with utf-8, I'm bringing this to your > > attention just in case it would matter). > Yes, that is the *only* change between versions, so i do not understand > where you problem come from. As a test, it might be a good idea for the user to rebuild local copies of both -7 and -8 to see if the bug follows the source or the binary. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#417789: this doesn't seem like a security issue
Processing commands for [EMAIL PROTECTED]: > tags 417789 security Bug#417789: elinks: elinks uses untrusted gettext catalog Tags were: patch Tags added: security > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#417789: this doesn't seem like a security issue
tags 417789 security thanks On Wed, Apr 04, 2007 at 08:04:52PM +0300, Eddy Petrișor wrote: > > I tagged this bug as grave+security because it can be used to make > > elinks load any corrupted file, and possibly execute arbitrary code. > How? Those are only strings. Nothing is executed from po/mo/gmo files. You've audited the code and proven that the segfault in elinks2 can't be exploited into an arbitrary code execution bug? -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/
Bug#417673: /sbin/fsck.vfat: Incorrectly truncates files of 4294966784 bytes length during boot.
* Andrew Vaughan ([EMAIL PROTECTED]) [070404 08:54]: > The file system on /dev/hda8 was checked immediately before reboot using the > GUI tool > in Windows 2000. As the output /var/log/fsck/checkfs shows /sbin/fsck.vfat > decided > during boot that the filesystem was inconsistent and automatically truncated > the file. > Note that it hasn't actually released the clusters yet. The clusters seem to > be freed > during when fsck is run at the next boot. > > Also shown below is the result of manually copying an equivalant file, and > manually > running fsck.vfat is sufficent to reproduce the problem. > > A quick test shows that Sarge does not truncate the file during boot. The only difference between these versions is: --- dosfstools-2.11.orig/dosfsck/boot.c +++ dosfstools-2.11/dosfsck/boot.c @@ -40,7 +40,7 @@ ({ \ unsigned short __v; \ memcpy( &__v, &f, sizeof(__v) );\ - CF_LE_W( *(unsigned short *)&f ); \ + CF_LE_W( *(unsigned short *)&__v ); \ }) #else #define GET_UNALIGNED_W(f) CF_LE_W( *(unsigned short *)&f ) Cheers, Andi -- http://home.arcor.de/andreas-barth/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#400218: marked as done (havp: install directory in /var/tmp)
Your message dated Wed, 04 Apr 2007 19:32:03 + with message-id <[EMAIL PROTECTED]> and subject line Bug#400218: fixed in havp 0.85-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: havp Version: 0.82-1 Severity: serious Justification: FHS violation Hello Rene, havp includes a directory in /var/tmp. dpkg-deb -c havp_0.82-1_i386.deb | grep /var/tmp drwxrwxr-x root/root 0 2006-08-02 22:21:47 ./var/tmp/ drwxr-xr-x root/root 0 2006-08-02 22:21:47 ./var/tmp/havp/ You should rather use /var/lib/havp or create the directory at run-time. Cheers, -- Bill. <[EMAIL PROTECTED]> Imagine a large blue swirl here. --- End Message --- --- Begin Message --- Source: havp Source-Version: 0.85-1 We believe that the bug you reported is fixed in the latest version of havp, which is due to be installed in the Debian FTP archive: havp_0.85-1.diff.gz to pool/main/h/havp/havp_0.85-1.diff.gz havp_0.85-1.dsc to pool/main/h/havp/havp_0.85-1.dsc havp_0.85-1_i386.deb to pool/main/h/havp/havp_0.85-1_i386.deb havp_0.85.orig.tar.gz to pool/main/h/havp/havp_0.85.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Rene Mayrhofer <[EMAIL PROTECTED]> (supplier of updated havp package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 16 Mar 2007 11:43:14 + Source: havp Binary: havp Architecture: source i386 Version: 0.85-1 Distribution: unstable Urgency: low Maintainer: Rene Mayrhofer <[EMAIL PROTECTED]> Changed-By: Rene Mayrhofer <[EMAIL PROTECTED]> Description: havp - HTTP Anti Virus Proxy Closes: 350681 381113 400218 400218 409690 Changes: havp (0.85-1) unstable; urgency=low . This is the "two Austrians independently submit patches to the slacking Austrian maintainer" release. Thanks for the help, which was surprisingly nearly orthogonal so that I could integrate both patches! * New upstream release, fixes compilation with libclamav 0.90. Now build-depend on libclamav-dev instead of libclamav1-dev. Closes: #409690: FTBFS: 'cl_loaddbdir' was not declared in this scope * Move run-time files from /var/tmp/havp to /var/spool/havp, which is still not ideal but my current interpretation of FHS 2.3 in the context of what havp is doing with these files (temporary storage for the scanner threads). Closes: #400218: havp: install directory in /var/tmp * Add debconf question about automatic creation of loopback filesystem. This creates a filesystem of user-defined size under /var/lib/state and mounts it at /var/spool/havp with mandatory locking support. In my interpretation of FHS 2.3, this is the best placement, but please feel free to comment. Now pre-depend on debconf and build-depend on po-debconf. Closes: #400218: havp: install directory in /var/tmp Closes: #381113 Problem removing havp * Make init script support the status command and only try to stop havp when it is considered to be running. Prevents future instances of: #381113 Problem removing havp Integrate parts of a patch by Michael Fladischer, many thanks! * Bump Standards-Version to 3.7.2.1, no changes. * Add suggests: squid. * Fix my messed up long description formatting. Closes: #350681: havp: poorly formatted description * Fix typo in LSB header of init script. * Add a manual page, now build-depend on docbook-to-man. * Also migrate this package to use dpatch, now build-depend on dpatch. Integrate and rework parts of a patch by Harald Jenny, many thanks! * Support automatic creation of a loopback filesystem to solve the problem of required mandatory locks for temporary files. However, mounting and unmounting is done by the init script and not via fstab, which seems "safer" to me (havp mount errors for its temporary storage should not prevent the whole system but just havp from starting). * Enable SSL passing support (--enable-ssl-tunnel configure option). Files: 9b2197d625a675f8d2a5e1267e46919f 638 net optional havp_0.85-1.dsc 6f05
Bug#409690: marked as done (FTBFS: 'cl_loaddbdir' was not declared in this scope)
Your message dated Wed, 04 Apr 2007 19:32:03 + with message-id <[EMAIL PROTECTED]> and subject line Bug#409690: fixed in havp 0.85-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: havp Version: 0.82-1 Severity: serious This package fails to compile: > Automatic build of havp_0.82-1 on em64t by sbuild/amd64 0.52 ... > x86_64-linux-gnu-g++ -Wall -g -O2 -O2 -I/usr/include -g -O2 -Wall > -DUSECLAMLIB -c -o scanners/clamlibscanner.o scanners/clamlibscanner.cpp > scanners/clamlibscanner.cpp: In member function 'virtual bool > ClamLibScanner::InitDatabase()': > scanners/clamlibscanner.cpp:32: error: 'cl_loaddbdir' was not declared in > this scope > scanners/clamlibscanner.cpp: In member function 'virtual bool > ClamLibScanner::ReloadDatabase()': > scanners/clamlibscanner.cpp:68: error: 'cl_loaddbdir' was not declared in > this scope > make[2]: *** [scanners/clamlibscanner.o] Error 1 > make[2]: Leaving directory `/build/tbm/havp-0.82/havp' -- Martin Michlmayr http://www.cyrius.com/ --- End Message --- --- Begin Message --- Source: havp Source-Version: 0.85-1 We believe that the bug you reported is fixed in the latest version of havp, which is due to be installed in the Debian FTP archive: havp_0.85-1.diff.gz to pool/main/h/havp/havp_0.85-1.diff.gz havp_0.85-1.dsc to pool/main/h/havp/havp_0.85-1.dsc havp_0.85-1_i386.deb to pool/main/h/havp/havp_0.85-1_i386.deb havp_0.85.orig.tar.gz to pool/main/h/havp/havp_0.85.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Rene Mayrhofer <[EMAIL PROTECTED]> (supplier of updated havp package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 16 Mar 2007 11:43:14 + Source: havp Binary: havp Architecture: source i386 Version: 0.85-1 Distribution: unstable Urgency: low Maintainer: Rene Mayrhofer <[EMAIL PROTECTED]> Changed-By: Rene Mayrhofer <[EMAIL PROTECTED]> Description: havp - HTTP Anti Virus Proxy Closes: 350681 381113 400218 400218 409690 Changes: havp (0.85-1) unstable; urgency=low . This is the "two Austrians independently submit patches to the slacking Austrian maintainer" release. Thanks for the help, which was surprisingly nearly orthogonal so that I could integrate both patches! * New upstream release, fixes compilation with libclamav 0.90. Now build-depend on libclamav-dev instead of libclamav1-dev. Closes: #409690: FTBFS: 'cl_loaddbdir' was not declared in this scope * Move run-time files from /var/tmp/havp to /var/spool/havp, which is still not ideal but my current interpretation of FHS 2.3 in the context of what havp is doing with these files (temporary storage for the scanner threads). Closes: #400218: havp: install directory in /var/tmp * Add debconf question about automatic creation of loopback filesystem. This creates a filesystem of user-defined size under /var/lib/state and mounts it at /var/spool/havp with mandatory locking support. In my interpretation of FHS 2.3, this is the best placement, but please feel free to comment. Now pre-depend on debconf and build-depend on po-debconf. Closes: #400218: havp: install directory in /var/tmp Closes: #381113 Problem removing havp * Make init script support the status command and only try to stop havp when it is considered to be running. Prevents future instances of: #381113 Problem removing havp Integrate parts of a patch by Michael Fladischer, many thanks! * Bump Standards-Version to 3.7.2.1, no changes. * Add suggests: squid. * Fix my messed up long description formatting. Closes: #350681: havp: poorly formatted description * Fix typo in LSB header of init script. * Add a manual page, now build-depend on docbook-to-man. * Also migrate this package to use dpatch, now build-depend on dpatch. Integrate and rework parts of a patch by Harald Jenny, many thanks! * Support automatic creation of a loopback filesystem to solve the problem of required mandatory locks for temporary files. However, moun
Processed: Unmark as forwarded
Processing commands for [EMAIL PROTECTED]: > notforwarded 416374 Bug#416374: kernel: data corruption with nvidia chipsets and IDE/SATA drives // memory hole mapping related bug?! Removed annotation that Bug had been forwarded to http://bugzilla.kernel.org/show_bug.cgi?id=7768. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#416824: klaptopdaemon: lock & hibernate allowing unauthorised access
El Miércoles, 4 de Abril de 2007 11:34, Marc Haber escribió: > On Wed, Apr 04, 2007 at 08:55:19AM +0200, Raúl Sánchez Siles wrote: > > El Lunes, 2 de Abril de 2007 20:42, Marc Haber escribió: > > > On Mon, Apr 02, 2007 at 04:48:04PM +0100, Ana Guerrero wrote: > > > > anyone has experiment something like this: > > > > > > > > On Fri, Mar 30, 2007 at 03:39:02PM +0100, Sheridan Hutchinson wrote: > > > > > Depending on the load on the system, klaptopdaemon appears to be > > > > > allowing somone unhibernating a locked & hibernated system, brief > > > > > access to the desktop. > > > > I think the first step step is knowing what procedure is used in order > > to hibernate. Is this guy using the hibernate scripts? is he using > > suspend or suspend2 method ? > > How do I find out what I use? > > > True, so if we want kdelaptop solves the problem we should use a > > solution as the one proposed by Sune, or alternatively we would need to > > get a verbose hibernate log and analyse it, increasing the LogVerbosity > > value up to 9 in the hibernate common.conf located at /etc/hibernate. > > I do not have an /etc/hibernate directory. > > Greetings > Marc > From this I guess you are using uswsusp. please check that package hibernate is _not_ installed and that uswsusp _is_. If you don't know how to do this check the existance of the dirs /usr/share/doc/uswsusp and /usr/share/doc/hibernate. If the dir doesn't exist, then the package is not installed. Unfortunately I thing I ran out of ideas, so maybe tweaking klaptopdaemon code would be the only solution. In this case, maybe some chat with kde people would help to do a sensible thing with this. -- Raúl Sánchez Siles ->Proud Debian user<- Linux registered user #416098 pgpFARq5bCPc2.pgp Description: PGP signature
Processed: this doesn't seem like a security issue
Processing commands for [EMAIL PROTECTED]: > tags 417789 -security Bug#417789: elinks: elinks uses untrusted gettext catalog Tags were: patch security Tags removed: security > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#417789: this doesn't seem like a security issue
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 tags 417789 -security thanks > I tagged this bug as grave+security because it can be used to make > elinks load any corrupted file, and possibly execute arbitrary code. How? Those are only strings. Nothing is executed from po/mo/gmo files. > Imagine an evil user placing some specially crafted files in > "/tmp/po/". Then, another user (root for example) runs elinks from a > directory "/tmp/foo/", and thus loads the bad file(s). If they are loaded, that doesn't mean they are executed. I won't deny that the relative path thingie leads to segfault (I haven't tested), but the security tag doesn't seem justified. - -- Regards, EddyP = "Imagination is more important than knowledge" A.Einstein -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGE9qzY8Chqv3NRNoRAgS4AJ9QhbdIeovqdFZlmKqVhDREcxhGkQCfeZi1 Ru7qVfge1S0ofWGjCwj8fwc= =bLEZ -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#417618: marked as done (hf: FTBFS: error: 'rdtsc_ok' undeclared (first use in this function))
Your message dated Wed, 04 Apr 2007 15:47:03 + with message-id <[EMAIL PROTECTED]> and subject line Bug#417618: fixed in hf 0.8-3 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: hf Version: 0.8-2 Severity: serious Hi, Your package is failing to build with the following error: refclock.c: In function 'refclock_current': refclock.c:228: error: 'rdtsc_ok' undeclared (first use in this function) refclock.c:228: error: (Each undeclared identifier is reported only once refclock.c:228: error: for each function it appears in.) refclock.c:217: warning: label 'time_known' defined but not used make[4]: *** [refclock.o] Error 1 Kurt --- End Message --- --- Begin Message --- Source: hf Source-Version: 0.8-3 We believe that the bug you reported is fixed in the latest version of hf, which is due to be installed in the Debian FTP archive: hf_0.8-3.diff.gz to pool/main/h/hf/hf_0.8-3.diff.gz hf_0.8-3.dsc to pool/main/h/hf/hf_0.8-3.dsc hf_0.8-3_i386.deb to pool/main/h/hf/hf_0.8-3_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Joop Stakenborg <[EMAIL PROTECTED]> (supplier of updated hf package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Wed, 04 Apr 2007 17:42:27 +0200 Source: hf Binary: hf Architecture: source i386 Version: 0.8-3 Distribution: unstable Urgency: low Maintainer: Debian Hamradio Maintainers Changed-By: Joop Stakenborg <[EMAIL PROTECTED]> Description: hf - amateur-radio protocol suite using a soundcard as a modem Closes: 417618 Changes: hf (0.8-3) unstable; urgency=low . * Compilation fix. Closes: #417618. Thanks Kurt Roeckx for reporting. Files: 77241eb4d958919a0f26f5c415faa08f 844 hamradio optional hf_0.8-3.dsc 5dc6f409389f5eb5d106b7785c33877a 119478 hamradio optional hf_0.8-3.diff.gz 9335db609a1e90c6a3b08e0f8b277ddf 637060 hamradio optional hf_0.8-3_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGE8iT/CqtjGLxpX8RAovNAJ9/q2w857Red8zgtIAEjjMHzZ3bKQCgpeam FPJ8xBjopyNYKgUlpKxdi7U= =CZo1 -END PGP SIGNATURE- --- End Message ---
Bug#417649: 100% cpu utilization with kdelibs 4:3.5.5a.dfsg.1-8
> > > >Can you try to upgrade again to -8 and see if still happens? > > > > The problem persisted; when I downgrade to a previous version the > problem disappear. Please notice that I'm not only upgrading > (downgrading) kdelibs, I've also upgrading (downgrading) kdelibs4c2a > and kdelibs-data. > Yes, all those packages are built from the same source. > I'm using 8859-1 as my locale (probably it doesn't matter, but the > patch is about a problem with utf-8, I'm bringing this to your > attention just in case it would matter). > Yes, that is the *only* change between versions, so i do not understand where you problem come from. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#417789: elinks: elinks uses untrusted gettext catalog
Package: elinks Version: 0.11.1-1.2 Severity: grave Tags: security, patch Hi, Elinks loads untrusted gettext catalog from the relative directory "../po/", and crashes (SIGSEGV) if the loaded file is corrupted. You can check by yourself with with the following commands: $ mkdir -p /tmp/elinks/{run,po} $ cp /usr/share/locale/fr/LC_MESSAGES/elinks.mo /tmp/elinks/po/fr.gmo $ dd if=/dev/urandom of=/tmp/elinks/po/fr.gmo bs=1024 seek=1 count=200 $ cd /tmp/elinks/run $ LANG=fr_FR strace -eopen -otrace elinks [...] open("/usr/lib/locale/locale-archive", O_RDONLY|O_LARGEFILE) = 3 open("/usr/share/locale/locale.alias", O_RDONLY|O_LARGEFILE) = 3 open("../po/fr_FR.gmo", O_RDONLY|O_LARGEFILE) = -1 ENOENT (No such file or directory) open("/usr/share/locale/fr_FR/LC_MESSAGES/messages.mo", O_RDONLY|O_LARGEFILE) = -1 ENOENT (No such file or directory) open("../po/fr.gmo", O_RDONLY|O_LARGEFILE) = 3 --- SIGSEGV (Segmentation fault) @ 0 (0) --- +++ killed by SIGSEGV (core dumped) +++ Process 29917 detached A gdb backtrace is included at the end of the message. I tagged this bug as grave+security because it can be used to make elinks load any corrupted file, and possibly execute arbitrary code. Imagine an evil user placing some specially crafted files in "/tmp/po/". Then, another user (root for example) runs elinks from a directory "/tmp/foo/", and thus loads the bad file(s). A quick grep for '\.\./po' in the elinks sources gives the culprit function : add_filename_to_string() around line 216 of file "elinks-0.11.1/src/intl/gettext/loadmsgcat.c". IMHO, changing this function to return NULL unconditionally should fix the problem (I did not want to download all the build dependencies to verify). Regards, Arnaud Giersch $ gdb -q /usr/bin/elinks -c core (no debugging symbols found) Using host libthread_db library "/lib/tls/i686/cmov/libthread_db.so.1". warning: Can't read pathname for load map: Input/output error. Reading symbols from /usr/lib/libgnutls.so.13...(no debugging symbols found)...done. Loaded symbols for /usr/lib/libgnutls.so.13 Reading symbols from /usr/lib/liblua50.so.5.0...(no debugging symbols found)...done. Loaded symbols for /usr/lib/liblua50.so.5.0 Reading symbols from /usr/lib/liblualib50.so.5.0...(no debugging symbols found)...done. Loaded symbols for /usr/lib/liblualib50.so.5.0 Reading symbols from /lib/tls/i686/cmov/libm.so.6... (no debugging symbols found)...done. Loaded symbols for /lib/tls/i686/cmov/libm.so.6 Reading symbols from /usr/lib/libperl.so.5.8...(no debugging symbols found)...done. Loaded symbols for /usr/lib/libperl.so.5.8 Reading symbols from /lib/tls/i686/cmov/libdl.so.2...(no debugging symbols found)...done. Loaded symbols for /lib/tls/i686/cmov/libdl.so.2 Reading symbols from /lib/tls/i686/cmov/libpthread.so.0... (no debugging symbols found)...done. Loaded symbols for /lib/tls/i686/cmov/libpthread.so.0 Reading symbols from /lib/tls/i686/cmov/libc.so.6...(no debugging symbols found)...done. Loaded symbols for /lib/tls/i686/cmov/libc.so.6 Reading symbols from /lib/tls/i686/cmov/libcrypt.so.1...(no debugging symbols found)...done. Loaded symbols for /lib/tls/i686/cmov/libcrypt.so.1 Reading symbols from /usr/lib/libgpm.so.1... (no debugging symbols found)...done. Loaded symbols for /usr/lib/libgpm.so.1 Reading symbols from /usr/lib/libz.so.1...(no debugging symbols found)...done. Loaded symbols for /usr/lib/libz.so.1 Reading symbols from /lib/libbz2.so.1.0...(no debugging symbols found)...done. Loaded symbols for /lib/libbz2.so.1.0 Reading symbols from /usr/lib/libexpat.so.1... (no debugging symbols found)...done. Loaded symbols for /usr/lib/libexpat.so.1 Reading symbols from /usr/lib/libgnutls-openssl.so.13...(no debugging symbols found)...done. Loaded symbols for /usr/lib/libgnutls-openssl.so.13 Reading symbols from /usr/lib/libtasn1.so.3...(no debugging symbols found)...done. Loaded symbols for /usr/lib/libtasn1.so.3 Reading symbols from /usr/lib/libgcrypt.so.11... (no debugging symbols found)...done. Loaded symbols for /usr/lib/libgcrypt.so.11 Reading symbols from /usr/lib/libgpg-error.so.0...(no debugging symbols found)...done. Loaded symbols for /usr/lib/libgpg-error.so.0 Reading symbols from /lib/ld-linux.so.2...Reading symbols from /usr/lib/debug/lib/ld-2.3.6.so...(no debugging symbols found)...done. (no debugging symbols found)...done. Loaded symbols for /lib/ld-linux.so.2 Reading symbols from /lib/tls/i686/cmov/libnsl.so.1...(no debugging symbols found)...done. Loaded symbols for /lib/tls/i686/cmov/libnsl.so.1 (no debugging symbols found) Core was generated by `elinks'. Program terminated with signal 11, Segmentation fault. #0 0x0809da6c in _nl_find_msg () (gdb) where #0 0x0809da6c in _nl_find_msg () #1 0x0809f4fe in _nl_init_domain_conv () #2 0x0809fc28 in _nl_load_domain () #3 0x0809e896 in _nl_find_domain () #4 0x0809de99 in dcigettext__ () #5 0x0809d4c1 in dcgettext__ () #6 0x0809e8c2 in gettext__ () #7 0x080a356e in get_dyn_full_ver
Bug#417763: monodevelop-versioncontrol: uninstalable because wrong dependencies on libapr0 and libsvn0
Package: monodevelop-versioncontrol Version: 0.13.1+dfsg-1 Severity: grave Justification: renders package unusable Package is uninstalable, depends are wrong, libapr0 >= 2.0.55 and libsvn0 >= 1.4.0 don't exist on Debian archive. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (99, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-4-k7 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: notfound 405186 in 0.12-5
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.9.26 > notfound 405186 0.12-5 Bug#405186: docbook2x: FTBFS: reference to nonexistent nodes Bug marked as not found in version 0.12-5. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#401010: evolution: Evolution hangs when i try to read a mail
A patch which supposedly should fix this problem was uploaded, but created consistent crashes. I've reverted the patch and Loïc has reoploaded. Do you have a chance to see if the problem is existent with the newly uploaded 1.8.2-3 version of evolution-data-server (and its libraries)? Cheers, Øystein
Bug#417656: marked as done (evolution: Crashes when run)
Your message dated Wed, 04 Apr 2007 13:17:05 + with message-id <[EMAIL PROTECTED]> and subject line Bug#417656: fixed in evolution-data-server 1.8.2-3 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: evolution Version: 2.8.2.1-1 Severity: grave Justification: renders package unusable -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Maybe this is actually the fault of e-d-s since I just upgraded it from 1.8.2-1 to 1.8.2-2. Anyway, here's a backtrace: (gdb) run Starting program: /usr/bin/evolution Failed to read a valid object file image from memory. [Thread debugging using libthread_db enabled] [New Thread 16384 (LWP 4988)] CalDAV Eplugin starting up ... evolution-shell-Message: Killing old version of evolution-data-server... (evolution-2.8:4988): evolution-mail-WARNING **: ignored this junk plugin: not enabled or we have already loaded one (evolution-2.8:4988): e-utils-WARNING **: Plugin 'Spamassassin junk plugin' failed to load hook 'org.gnome.evolution.mail.junk:1.0' [New Thread 32769 (LWP 5015)] [New Thread 16386 (LWP 5016)] [New Thread 32771 (LWP 5017)] Program received signal SIGSEGV, Segmentation fault. [Switching to Thread 16386 (LWP 5016)] 0xb6272e5a in mail_msg_received (e=0x81d7638, msg=0x81db938, data=0x0) at mail-mt.c:561 561 mail-mt.c: No such file or directory. in mail-mt.c (gdb) bt full #0 0xb6272e5a in mail_msg_received (e=0x81d7638, msg=0x81db938, data=0x0) at mail-mt.c:561 No locals. #1 0xb7be292f in thread_dispatch (din=0x81d7638) at e-msgport.c:1025 e = m = (EMsg *) 0x81db938 info = self = 16386 #2 0xb7699c51 in pthread_start_thread (arg=0x81dec00) at manager.c:310 ldt_entry = {entry_number = 6, base_addr = 136178688, limit = 1048575, seg_32bit = 1, contents = 0, read_exec_only = 0, limit_in_pages = 1, seg_not_present = 0, useable = 1, empty = 0} request = {req_thread = 0x0, req_kind = REQ_CREATE, req_args = { create = {attr = 0x0, fn = 0, arg = 0x0, mask = {__val = { 0 , 3077158621, 3077189620, 3077199008, 136178688, 3055169464, 3077169544, 136178688, 1, 3077169806, 1, 136178688}}}, free = {thread_id = 0}, exit = {code = 0}, post = 0x0, for_each = {fn = 0, arg = 0x0}}} outcome = #3 0xb7699db4 in pthread_start_thread_event (arg=0x81dec00) at manager.c:334 ldt_entry = {entry_number = 6, base_addr = 136178688, limit = 1048575, seg_32bit = 1, contents = 0, read_exec_only = 0, limit_in_pages = 1, seg_not_present = 0, useable = 1, empty = 0} #4 0xb6c3f38a in clone () from /usr/lib/debug/libc.so.6 fstab_state = {fs_fp = 0x0, fs_buffer = 0x0, fs_mntres = { mnt_fsname = 0x0, mnt_dir = 0x0, mnt_type = 0x0, mnt_opts = 0x0, mnt_freq = 0, mnt_passno = 0}, fs_ret = {fs_spec = 0x0, fs_file = 0x0, fs_vfstype = 0x0, fs_mntops = 0x0, fs_type = 0x0, fs_freq = 0, fs_passno = 0}} __elf_set___libc_subfreeres_element_fstab_free__ = ( const void *) 0xb6c7a040 (gdb) quit - -- System Information: Debian Release: 4.0 APT prefers testing APT policy: (530, 'testing'), (520, 'unstable'), (510, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-4-k7 Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Versions of packages evolution depends on: ii dbus 1.0.2-1simple interprocess messaging syst ii evolution-common 2.8.2.1-1 architecture independent files for ii evolution-data-server 1.8.2-2evolution database backend server ii gconf22.16.1-1 GNOME configuration database syste ii gnome-icon-theme 2.18.0-1 GNOME Desktop icon theme ii gtkhtml3.83.12.1-2 HTML rendering/editing library - b ii libart-2.0-2 2.3.17-1 Library of functions for 2D graphi ii libatk1.0-0 1.18.0-1 The ATK accessibility toolkit ii libaudiofile0 0.2.6-6Open-source version of SGI's audio ii libavahi-client3 0.6.16-3etch1 Avahi client library ii libavahi-common3 0.6.16-3etch1 Avahi common library ii libavahi-glib10.6.16-3etch1 Avahi glib integration library ii libbonobo2-0 2.18.0-1 Bonobo CORBA interfaces library ii libbonoboui2-02.18.0-1 The Bonobo UI library ii libc6 2.3.6.ds1-13 GNU C Library: Shared libraries ii libcairo2 1
Bug#417747: Overwrites custom crontab
Package: planet Version: 2.0-8 Severity: serious Hi on package upgrade postinst overwrites /etc/cron.d/planet regardless it had some local modifications. This is IMHO against 10.7.3 of Debian Policy Manual and should be fixed. Maybe you can consider using ucf, which was built for such purpose. -- Michal Čihař | http://cihar.com | http://blog.cihar.com -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Shell: /bin/sh linked to /bin/dash Kernel: Linux 2.6.18-4-vserver-amd64 Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Versions of packages planet depends on: ii debconf 1.5.13 Debian configuration management sy ii lighttpd [httpd] 1.4.13-10 A fast webserver with minimal memo ii python2.4.4-2An interactive high-level object-o ii python-support0.6.3 automated rebuilding support for p planet recommends no packages. -- debconf information excluded -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: debconf bug is in yada
Processing commands for [EMAIL PROTECTED]: > block 417557 with 417739 Bug#417739: depends on non-essential package debconf in postrm Bug#417557: depends on non-essential package debconf in postrm Was not blocked by any bugs. Blocking bugs of 417557 added: 417739 > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#417018: depends on non-essential package debconf in postrm
Processing commands for [EMAIL PROTECTED]: > clone 417018 -1 Bug#417018: depends on non-essential package debconf in postrm Bug 417018 cloned as bug 417739. > reassign -1 yada Bug#417739: depends on non-essential package debconf in postrm Bug reassigned from package `phpmyadmin' to `yada'. > block 417018 by -1 Bug#417739: depends on non-essential package debconf in postrm Bug#417018: depends on non-essential package debconf in postrm Was not blocked by any bugs. Blocking bugs of 417018 added: 417739 > # other package that also uses yada > block 416744 by -1 Bug#417739: depends on non-essential package debconf in postrm Bug#416744: depends on non-essential package debconf in postrm Was not blocked by any bugs. Blocking bugs of 416744 added: 417739 > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#417018: depends on non-essential package debconf in postrm
clone 417018 -1 reassign -1 yada block 417018 by -1 # other package that also uses yada block 416744 by -1 thanks Hi Michael, On Sun, 2007-04-01 at 10:41 +0200, Michael Ablassmeier wrote: > while running archive wide piuparts tests your package failed on purge > because of debconf beeing unavailable during postrm: > >Removing phpmyadmin ... > Purging configuration files for phpmyadmin ... > rmdir: /var/lib/phpmyadmin: No such file or directory > rmdir: /etc/phpmyadmin: No such file or directory > /var/lib/dpkg/info/phpmyadmin.postrm: line 86: db_stop: command not found This is yada-generated code. I hence think that this bug should be fixed in yada and then a rebuild of phpmyadmin should be done. I'm cloning this bug for yada. The db_stop should indeed be called only conditionally. Thanks for your work in researching this. Thijs signature.asc Description: This is a digitally signed message part
Bug#416755: marked as done (depends on non-essential package adduser in postrm)
Your message dated Wed, 04 Apr 2007 13:02:03 + with message-id <[EMAIL PROTECTED]> and subject line Bug#416755: fixed in git-core 1:1.5.1-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: git-daemon-run Version: 1:1.5.0.3-1, 1:1.4.4.4-2 Severity: serious Justification: Policy violation hi, while running archive wide piuparts tests your package failed on purge because of adduser beeing unavailable during postrm: Purging configuration files for git-daemon-run ... /var/lib/dpkg/info/git-daemon-run.postrm: line 7: deluser: command not found dpkg: error processing git-daemon-run (--purge): subprocess post-removal script returned error exit status 127 Errors were encountered while processing: git-daemon-run the full log can be found here: http://people.debian.org/~abi/piuparts/ please be sure to use a conditional call in your postrm. bye, - michael --- End Message --- --- Begin Message --- Source: git-core Source-Version: 1:1.5.1-1 We believe that the bug you reported is fixed in the latest version of git-core, which is due to be installed in the Debian FTP archive: git-arch_1.5.1-1_all.deb to pool/main/g/git-core/git-arch_1.5.1-1_all.deb git-core_1.5.1-1.diff.gz to pool/main/g/git-core/git-core_1.5.1-1.diff.gz git-core_1.5.1-1.dsc to pool/main/g/git-core/git-core_1.5.1-1.dsc git-core_1.5.1.orig.tar.gz to pool/main/g/git-core/git-core_1.5.1.orig.tar.gz git-cvs_1.5.1-1_all.deb to pool/main/g/git-core/git-cvs_1.5.1-1_all.deb git-daemon-run_1.5.1-1_all.deb to pool/main/g/git-core/git-daemon-run_1.5.1-1_all.deb git-doc_1.5.1-1_all.deb to pool/main/g/git-core/git-doc_1.5.1-1_all.deb git-email_1.5.1-1_all.deb to pool/main/g/git-core/git-email_1.5.1-1_all.deb git-gui_1.5.1-1_all.deb to pool/main/g/git-core/git-gui_1.5.1-1_all.deb git-svn_1.5.1-1_all.deb to pool/main/g/git-core/git-svn_1.5.1-1_all.deb gitk_1.5.1-1_all.deb to pool/main/g/git-core/gitk_1.5.1-1_all.deb gitweb_1.5.1-1_all.deb to pool/main/g/git-core/gitweb_1.5.1-1_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Gerrit Pape <[EMAIL PROTECTED]> (supplier of updated git-core package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Wed, 4 Apr 2007 11:56:18 + Source: git-core Binary: git-email git-core git-daemon-run git-doc git-cvs git-svn gitk gitweb git-arch git-gui Architecture: all source Version: 1:1.5.1-1 Distribution: unstable Urgency: low Maintainer: Gerrit Pape <[EMAIL PROTECTED]> Changed-By: Gerrit Pape <[EMAIL PROTECTED]> Description: git-arch - fast, scalable, distributed revision control system (arch interop git-core - fast, scalable, distributed revision control system git-cvs- fast, scalable, distributed revision control system (cvs interope git-daemon-run - fast, scalable, distributed revision control system (git-daemon s git-doc- fast, scalable, distributed revision control system (documentatio git-email - fast, scalable, distributed revision control system (email add-on git-gui- fast, scalable, distributed revision control system (GUI) git-svn- fast, scalable, distributed revision control system (svn interope gitk - fast, scalable, distributed revision control system (revision tre gitweb - fast, scalable, distributed revision control system (web interfac Closes: 416372 416755 Changes: git-core (1:1.5.1-1) unstable; urgency=low . * new upstream release. * git-svn got almost a rewrite (closes: #416372). * debian/diff/git-cvsserver-update-hook.diff: remove; included upstream. * debian/diff/Documentation-git-svnimport.txt-fix-typo.diff, debian/diff/http-fetch-don-t-use-double-slash-as-directory-sepa.diff, debian/diff/Documentation-git-rev-parse.txt-fix-example-in-SPEC.diff: remove; applied upstream. * debian/diff/GNU-Hurd.diff: remove; obsolete. * debian/git-daemon-run.postrm: check for deluser being available, if not, print warning and don't remove system user (closes: #416755). * debian/changelog.upstream: upstream changes taken from mailin
Bug#417649: 100% cpu utilization with kdelibs 4:3.5.5a.dfsg.1-8
> > Package: kdelibs > > Version: 4:3.5.5a.dfsg.1-7 > > Severity: grave > > Justification: renders package unusable > > > > > > When KDE starts, kded daemon takes almost 100% of the cpu; it usually > > happens when kdewallet asked for the passphrase to open the passwords, > > it makes the system unusable because it never opens the kdewallet > > passwords. Killing kded (and restarting kded after that) helps with the > > CPU utilization, but kdewallet won't work anymore. > > Is this issue specific to the -8 version? i.e. does it not apply on the -7 > version? Exactly. I forgot to mention that I downgraded to -7 and the problem disappeared. Can you try to upgrade again to -8 and see if still happens? The problem persisted; when I downgrade to a previous version the problem disappear. Please notice that I'm not only upgrading (downgrading) kdelibs, I've also upgrading (downgrading) kdelibs4c2a and kdelibs-data. I'm using 8859-1 as my locale (probably it doesn't matter, but the patch is about a problem with utf-8, I'm bringing this to your attention just in case it would matter). Regards, -- Toshiro http://www.perlhowto.com
Bug#417656: [Evolution] Bug#417656: evolution: Crashes when run
On Wed, Apr 04, 2007 at 01:05:08PM +0200, Øystein Gisnås wrote: > 2007/4/4, Loïc Minier <[EMAIL PROTECTED]>: > >On Wed, Apr 04, 2007, Øystein Gisnås wrote: > >> > The patch isn't present in the unstable version, I suppose it's not > >> > affected and I'll request migration to etch if you're ok with that. > >> > >> I'll do a build and report the results tonight.. > > > >02:04 < cortana> who broke evolution! :) > >10:07 <@lool> cortana: I did, trying to fix it; can you try rebuilding > >e-d-s > > with the mentionned patch removed? > >11:32 < cortana> lool: FYI reverting e-d-s does not fix the crash > >11:35 <@lool> cortana: Reverting the patch? > > > > (That's all I got.) > > I want you to double-double check that downgrading doesn't help. I can > reproduce the crash with 1.8.2-2. I can start it with 'evolution -c > $COMPONENT' with $COMPONENT != mail and it will crash and burn when I > change to mail view. Oops, it seems I have libedataserver1.2-7 version 1.8.2-2 installed--I just blindly downloaded & installed the package files you listed in your original email :) > When you downgrade, make sure you downgrade libedataserver1.2-7 to > 1.8.2-1, as that's the library causing the crash. If it still crashes > after the first attempt, run evolution --force-shutdown or kill e-d-s > manually and try again. Downloading _just_ libedataserver1.2-7 causes another crash, backtrace following in case it's relevant to anything. I then downgraded _all_ of e-d-s' binary packages to version 1.8.2-1, and Evolution started working again--thanks :) Starting program: /usr/bin/evolution Failed to read a valid object file image from memory. [Thread debugging using libthread_db enabled] [New Thread 16384 (LWP 28240)] CalDAV Eplugin starting up ... evolution-shell-Message: Killing old version of evolution-data-server... (evolution-2.8:28240): evolution-mail-WARNING **: ignored this junk plugin: not enabled or we have already loaded one (evolution-2.8:28240): e-utils-WARNING **: Plugin 'Spamassassin junk plugin' failed to load hook 'org.gnome.evolution.mail.junk:1.0' [New Thread 32769 (LWP 28268)] [New Thread 16386 (LWP 28269)] [New Thread 32771 (LWP 28270)] [New Thread 49156 (LWP 28271)] [New Thread 65541 (LWP 28272)] [Thread 49156 (LWP 28271) exited] camel-ERROR **: file camel-operation.c: line 205 (camel_operation_unref): assertion failed: (cc->refcount > 0) aborting... Program received signal SIGABRT, Aborted. [Switching to Thread 16386 (LWP 28269)] 0xb6b71b01 in kill () from /usr/lib/debug/libc.so.6 (gdb) where #0 0xb6b71b01 in kill () from /usr/lib/debug/libc.so.6 #1 0xb7660f65 in pthread_kill (thread=16386, signo=6) at signals.c:69 #2 0xb7660fab in __pthread_raise (sig=6) at signals.c:200 #3 0xb6b71894 in *__GI_raise (sig=6) at ../linuxthreads/sysdeps/unix/sysv/linux/raise.c:38 #4 0xb6b72ccc in *__GI_abort () at ../sysdeps/generic/abort.c:88 #5 0xb6cac074 in IA__g_logv (log_domain=, log_level=G_LOG_LEVEL_ERROR, format=0xb6cd6800 "file %s: line %d (%s): assertion failed: (%s)", args1=0xb6166d1c "hmҷ�") at gmessages.c:497 #6 0xb6cac0a9 in IA__g_log (log_domain=0xb7d21894 "camel", log_level=G_LOG_LEVEL_ERROR, format=0xb6cd6800 "file %s: line %d (%s): assertion failed: (%s)") at gmessages.c:517 #7 0xb6cac127 in IA__g_assert_warning (log_domain=0xb7d21894 "camel", file=0xb7d26d68 "camel-operation.c", line=205, pretty_function=0xb7d26da7 "camel_operation_unref", expression=0xb7d26d57 "cc->refcount > 0") at gmessages.c:552 #8 0xb7d155cf in camel_operation_unref () from /usr/lib/libcamel-1.2.so.8 #9 0xb623e8ba in ms_thread_msg_new (session=0x819cac8, ops=0xb6185af0, size=52) at mail-session.c:555 #10 0xb7d5f865 in camel_session_thread_msg_new () from /usr/lib/libcamel-provider-1.2.so.8 #11 0xb617a1ed in get_folder_info_online (store=0x8237000, top=0xb6182b52 "", flags=, ex=0x82433b0) at camel-imap-store.c:2691 #12 0xb7d3f2aa in ?? () from /usr/lib/libcamel-provider-1.2.so.8 #13 0x08237000 in ?? () #14 0xb6182b52 in ?? () from /usr/lib/evolution-data-server-1.2/camel-providers-8/libcamelimap.so #15 0x0007 in ?? () #16 0x082433b0 in ?? () #17 0x in ?? () -- Sam Morris http://robots.org.uk/ PGP key id 1024D/5EA01078 3412 EA18 1277 354B 991B C869 B219 7FDB 5EA0 1078 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#417160: marked as done (postgresql-8.2_8.2.3-2(sparc/experimental): FTBFS: test error)
Your message dated Wed, 04 Apr 2007 11:47:03 + with message-id <[EMAIL PROTECTED]> and subject line Bug#417160: fixed in postgresql-8.2 8.2.3-3 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: postgresql-8.2 Version: 8.2.3-2 Severity: serious Hi, your package failed to build from source. | Automatic build of postgresql-8.2_8.2.3-2 on odin by sbuild/sparc 98-farm | Build started at 20070331-1633 | ** | Checking available source versions... | Fetching source files... | Reading Package Lists... | Building Dependency Tree... | Need to get 12.2MB of source archives. | Get:1 http://sinclair.farm.ftbfs.de experimental/main postgresql-8.2 8.2.3-2 (dsc) [1104B] | Get:2 http://sinclair.farm.ftbfs.de experimental/main postgresql-8.2 8.2.3-2 (tar) [12.2MB] | Get:3 http://sinclair.farm.ftbfs.de experimental/main postgresql-8.2 8.2.3-2 (diff) [27.4kB] | Fetched 12.2MB in 1s (10.1MB/s) | Download complete and in download only mode | ** Using build dependencies supplied by package: | Build-Depends: debhelper (>= 5.0.37.2), cdbs (>= 0.4.43), bison, perl (>= 5.8), libperl-dev, tk8.4-dev, flex, libreadline5-dev (>= 4.2), libssl-dev, zlib1g-dev | libz-dev, libpam0g-dev | libpam-dev, libxml2-dev, libkrb5-dev, libxslt1-dev, python-dev, python-central (>= 0.5), gettext, bzip2 | Checking for already installed source dependencies... | debhelper: missing | Using default version 5.0.42 (Priority: 990) | cdbs: missing | Using default version 0.4.48 (Priority: 990) | bison: missing | Using default version 1:2.3.dfsg-4 (Priority: 990) | perl: already installed (5.8.8-7 >= 5.8 is satisfied) | libperl-dev: missing | Using default version 5.8.8-7 (Priority: 990) | tk8.4-dev: missing | Using default version 8.4.12-1 (Priority: 990) | flex: missing | Using default version 2.5.33-11 (Priority: 990) | libreadline5-dev: missing | Using default version 5.2-2 (Priority: 990) | libssl-dev: missing | Using default version 0.9.8e-4 (Priority: 990) | zlib1g-dev: missing | Using default version 1:1.2.3-13 (Priority: 990) | libz-dev: missing | No default version. Virtual package? | libpam0g-dev: missing | Using default version 0.79-4 (Priority: 990) | libpam-dev: missing | No default version. Virtual package? | libxml2-dev: missing | Using default version 2.6.27.dfsg-1 (Priority: 990) | libkrb5-dev: missing | Using default version 1.4.4-7 (Priority: 990) | libxslt1-dev: missing | Using default version 1.1.19-1 (Priority: 990) | python-dev: missing | Using default version 2.4.4-2 (Priority: 990) | python-central: missing | Using default version 0.5.12 (Priority: 990) | gettext: missing | Using default version 0.16.1-1 (Priority: 990) | bzip2: already installed (1.0.3-6) | Checking for source dependency conflicts... [...] | STATEMENT: alter table anothertab alter column atcol1 type boolean | using case when atcol1 % 2 = 0 then true else false end; | NOTICE: CREATE TABLE will create implicit sequence "t1_f1_seq" for serial column "t1.f1" | NOTICE: CREATE TABLE / PRIMARY KEY will create implicit index "t1_pkey" for table "t1" | NOTICE: drop cascades to composite type alter2.ctype | NOTICE: drop cascades to type alter2.ctype | NOTICE: drop cascades to type alter2.posint | NOTICE: drop cascades to function alter2.plus1(integer) | NOTICE: drop cascades to view alter2.v1 | NOTICE: drop cascades to rule _RETURN on view alter2.v1 | NOTICE: drop cascades to sequence alter2.t1_f1_seq | NOTICE: drop cascades to default for table alter2.t1 column f1 | NOTICE: drop cascades to table alter2.t1 | NOTICE: drop cascades to constraint t1_f2_check on table alter2.t1 | ERROR: could not set permissions on directory "/no/such/location": No such file or directory | STATEMENT: CREATE TABLESPACE badspace LOCATION '/no/such/location'; | ERROR: tablespace "nosuchspace" does not exist | STATEMENT: CREATE TABLE bar (i int) TABLESPACE nosuchspace; | ERROR: tablespace "testspace" is not empty | STATEMENT: DROP TABLESPACE testspace; | NOTICE: drop cascades to table testschema.asexecute | NOTICE: drop cascades to table testschema.asselect | NOTICE: drop cascades to table testschema.foo | LOG: received fast shutdown request | LOG: shutting down | LOG: database system is shut down | make: *** [binary-predeb/postgresql-8.2] Error 1 | ** | Build finished at 20070331-1712 | FAILED [dpkg-buildpackage died]
Bug#416824: Further Info
Just for the sake of further info, I'm using the innate 'in-kernel' support for suspend and hibernate and have *not* installed the hibernate script nor suspend2, as I've never had to. For whatever reason in-kernel support works like a charm on this laptop. -- Regards, Sheridan Hutchinson [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#417656: evolution: confirmed : downgrading to 1.8.2-1 works
Package: evolution Followup-For: Bug #417656 Hi, Downgrading e-d-s didn't suffice, downgrading the libraries as well sorted this out. Cheers, Eamonn -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (990, 'unstable'), (300, 'stable'), (50, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.20 Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Versions of packages evolution depends on: ii dbus 1.0.2-1simple interprocess messaging syst ii evolution-common 2.8.2.1-1 architecture independent files for ii evolution-data-server 1.8.2-1evolution database backend server ii gconf22.18.0.1-2 GNOME configuration database syste ii gnome-icon-theme 2.18.0-1 GNOME Desktop icon theme ii gtkhtml3.83.12.2-1 HTML rendering/editing library - b ii libart-2.0-2 2.3.19-2 Library of functions for 2D graphi ii libatk1.0-0 1.18.0-1 The ATK accessibility toolkit ii libaudiofile0 0.2.6-6Open-source version of SGI's audio ii libavahi-client3 0.6.17-1 Avahi client library ii libavahi-common3 0.6.17-1 Avahi common library ii libavahi-glib10.6.17-1 Avahi glib integration library ii libbonobo2-0 2.18.0-1 Bonobo CORBA interfaces library ii libbonoboui2-02.18.0-1 The Bonobo UI library ii libc6 2.5-0exp6 GNU C Library: Shared libraries ii libcairo2 1.4.2-1The Cairo 2D vector graphics libra ii libcamel1.2-8 1.8.2-1The Evolution MIME message handlin ii libdbus-1-3 1.0.2-1simple interprocess messaging syst ii libdbus-glib-1-2 0.73-1 simple interprocess messaging syst ii libebook1.2-9 1.8.2-1Client library for evolution addre ii libecal1.2-7 1.8.2-1Client library for evolution calen ii libedataserver1.2-7 1.8.2-1Utility library for evolution data ii libedataserverui1.2-8 1.8.2-1GUI utility library for evolution ii libegroupwise1.2-12 1.8.2-2Client library for accessing group ii libesd-alsa0 [libesd0]0.2.36-3 Enlightened Sound Daemon (ALSA) - ii libexchange-storage1.2-2 1.8.2-2Backend library for evolution cale ii libfontconfig12.4.2-1.2 generic font configuration library ii libfreetype6 2.2.1-5FreeType 2 font engine, shared lib ii libgconf2-4 2.18.0.1-2 GNOME configuration database syste ii libgcrypt11 1.2.4-1LGPL Crypto library - runtime libr ii libglade2-0 1:2.6.0-4 library to load .glade files at ru ii libglib2.0-0 2.12.11-1 The GLib library of C routines ii libgnome-keyring0 0.8-1 GNOME keyring services library ii libgnome-pilot2 2.0.15-2 Support libraries for gnome-pilot ii libgnome2-0 2.18.0-2 The GNOME 2 library - runtime file ii libgnomecanvas2-0 2.14.0-2 A powerful object-oriented display ii libgnomeprint2.2-02.18.0-1 The GNOME 2.2 print architecture - ii libgnomeprintui2.2-0 2.18.0-1 GNOME 2.2 print architecture User ii libgnomeui-0 2.18.1-1 The GNOME 2 libraries (User Interf ii libgnomevfs2-01:2.18.0.1-1 GNOME Virtual File System (runtime ii libgnutls13 1.6.1-1the GNU TLS library - runtime libr ii libgpg-error0 1.4-2 library for common error values an ii libgtk2.0-0 2.10.11-1 The GTK+ graphical user interface ii libgtkhtml3.8-15 3.12.2-1 HTML rendering/editing library - r ii libhal1 0.5.8.1-9 Hardware Abstraction Layer - share ii libice6 1:1.0.3-1 X11 Inter-Client Exchange library ii libjpeg62 6b-13 The Independent JPEG Group's JPEG ii libldap2 2.1.30-13.4OpenLDAP libraries ii libnm-glib0 0.6.4-7network management framework (GLib ii libnotify10.4.4-2sends desktop notifications to a n ii libnspr4-0d 1.8.0.11-2 NetScape Portable Runtime Library ii libnss3-0d1.8.0.11-2 Network Security Service libraries ii liborbit2 1:2.14.4-1 libraries for ORBit2 - a CORBA ORB ii libpango1.0-0 1.16.1-1 Layout and rendering of internatio ii libpisock90.12.2-9 library for communicating with a P ii libpisync00.12.2-9 synchronization library for PalmOS ii libpng12-01.2.15~beta5-1 PNG library - runtime ii libpopt0 1.10-3 lib for parsi
Bug#417160: marked as done (postgresql-8.2_8.2.3-2(sparc/experimental): FTBFS: test error)
Your message dated Wed, 4 Apr 2007 13:29:47 +0200 with message-id <[EMAIL PROTECTED]> and subject line Bug#417160: postgresql-8.2_8.2.3-2(sparc/experimental): FTBFS: test error has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: postgresql-8.2 Version: 8.2.3-2 Severity: serious Hi, your package failed to build from source. | Automatic build of postgresql-8.2_8.2.3-2 on odin by sbuild/sparc 98-farm | Build started at 20070331-1633 | ** | Checking available source versions... | Fetching source files... | Reading Package Lists... | Building Dependency Tree... | Need to get 12.2MB of source archives. | Get:1 http://sinclair.farm.ftbfs.de experimental/main postgresql-8.2 8.2.3-2 (dsc) [1104B] | Get:2 http://sinclair.farm.ftbfs.de experimental/main postgresql-8.2 8.2.3-2 (tar) [12.2MB] | Get:3 http://sinclair.farm.ftbfs.de experimental/main postgresql-8.2 8.2.3-2 (diff) [27.4kB] | Fetched 12.2MB in 1s (10.1MB/s) | Download complete and in download only mode | ** Using build dependencies supplied by package: | Build-Depends: debhelper (>= 5.0.37.2), cdbs (>= 0.4.43), bison, perl (>= 5.8), libperl-dev, tk8.4-dev, flex, libreadline5-dev (>= 4.2), libssl-dev, zlib1g-dev | libz-dev, libpam0g-dev | libpam-dev, libxml2-dev, libkrb5-dev, libxslt1-dev, python-dev, python-central (>= 0.5), gettext, bzip2 | Checking for already installed source dependencies... | debhelper: missing | Using default version 5.0.42 (Priority: 990) | cdbs: missing | Using default version 0.4.48 (Priority: 990) | bison: missing | Using default version 1:2.3.dfsg-4 (Priority: 990) | perl: already installed (5.8.8-7 >= 5.8 is satisfied) | libperl-dev: missing | Using default version 5.8.8-7 (Priority: 990) | tk8.4-dev: missing | Using default version 8.4.12-1 (Priority: 990) | flex: missing | Using default version 2.5.33-11 (Priority: 990) | libreadline5-dev: missing | Using default version 5.2-2 (Priority: 990) | libssl-dev: missing | Using default version 0.9.8e-4 (Priority: 990) | zlib1g-dev: missing | Using default version 1:1.2.3-13 (Priority: 990) | libz-dev: missing | No default version. Virtual package? | libpam0g-dev: missing | Using default version 0.79-4 (Priority: 990) | libpam-dev: missing | No default version. Virtual package? | libxml2-dev: missing | Using default version 2.6.27.dfsg-1 (Priority: 990) | libkrb5-dev: missing | Using default version 1.4.4-7 (Priority: 990) | libxslt1-dev: missing | Using default version 1.1.19-1 (Priority: 990) | python-dev: missing | Using default version 2.4.4-2 (Priority: 990) | python-central: missing | Using default version 0.5.12 (Priority: 990) | gettext: missing | Using default version 0.16.1-1 (Priority: 990) | bzip2: already installed (1.0.3-6) | Checking for source dependency conflicts... [...] | STATEMENT: alter table anothertab alter column atcol1 type boolean | using case when atcol1 % 2 = 0 then true else false end; | NOTICE: CREATE TABLE will create implicit sequence "t1_f1_seq" for serial column "t1.f1" | NOTICE: CREATE TABLE / PRIMARY KEY will create implicit index "t1_pkey" for table "t1" | NOTICE: drop cascades to composite type alter2.ctype | NOTICE: drop cascades to type alter2.ctype | NOTICE: drop cascades to type alter2.posint | NOTICE: drop cascades to function alter2.plus1(integer) | NOTICE: drop cascades to view alter2.v1 | NOTICE: drop cascades to rule _RETURN on view alter2.v1 | NOTICE: drop cascades to sequence alter2.t1_f1_seq | NOTICE: drop cascades to default for table alter2.t1 column f1 | NOTICE: drop cascades to table alter2.t1 | NOTICE: drop cascades to constraint t1_f2_check on table alter2.t1 | ERROR: could not set permissions on directory "/no/such/location": No such file or directory | STATEMENT: CREATE TABLESPACE badspace LOCATION '/no/such/location'; | ERROR: tablespace "nosuchspace" does not exist | STATEMENT: CREATE TABLE bar (i int) TABLESPACE nosuchspace; | ERROR: tablespace "testspace" is not empty | STATEMENT: DROP TABLESPACE testspace; | NOTICE: drop cascades to table testschema.asexecute | NOTICE: drop cascades to table testschema.asselect | NOTICE: drop cascades to table testschema.foo | LOG: received fast shutdown request | LOG: shutting down | LOG: database system is shut down | make: *** [binary-predeb/postgresql-8.2] Error 1 | ** | Build finished at 20070331-1712 | FA
Bug#417656: [Evolution] Bug#417656: evolution: Crashes when run
2007/4/4, Loïc Minier <[EMAIL PROTECTED]>: On Wed, Apr 04, 2007, Øystein Gisnås wrote: > > The patch isn't present in the unstable version, I suppose it's not > > affected and I'll request migration to etch if you're ok with that. > > I'll do a build and report the results tonight.. 02:04 < cortana> who broke evolution! :) 10:07 <@lool> cortana: I did, trying to fix it; can you try rebuilding e-d-s with the mentionned patch removed? 11:32 < cortana> lool: FYI reverting e-d-s does not fix the crash 11:35 <@lool> cortana: Reverting the patch? (That's all I got.) I want you to double-double check that downgrading doesn't help. I can reproduce the crash with 1.8.2-2. I can start it with 'evolution -c $COMPONENT' with $COMPONENT != mail and it will crash and burn when I change to mail view. When you downgrade, make sure you downgrade libedataserver1.2-7 to 1.8.2-1, as that's the library causing the crash. If it still crashes after the first attempt, run evolution --force-shutdown or kill e-d-s manually and try again. Øystein
Bug#417656: [Evolution] Bug#417656: evolution: Crashes when run
2007/4/4, Loïc Minier <[EMAIL PROTECTED]>: On Wed, Apr 04, 2007, =?UTF-8?Q? =C3=98ystein_?= =?UTF-8?Q?Gisn=C3=A5s ?= wrote: > I actually can reproduce this myself, and it's probably due to the > 20_too-many-open-files.patch. Downgrading e-d-s to 1.8.2-1 helps. > > We'll remove the patch, test it and reupload as soon as we can. Blah; sorry, I can't test e-d-s decently as I don't use evolution. Can you confirm removing this patch helps? If it does, I'll upload ASAP. The patch isn't present in the unstable version, I suppose it's not affected and I'll request migration to etch if you're ok with that. I think I got you right. I can confirm that 1.8.2-1 works and 1.8.2-2 crashes. I haven't built 1.8.2-2 without the 20_too-many-open-files.patch, but I can't imagine any of the two other patches create problems in mail-mt.c.. Øystein
Bug#416402: marked as done (wzdftpd-mod-avahi: unusuable)
Your message dated Wed, 04 Apr 2007 10:02:34 + with message-id <[EMAIL PROTECTED]> and subject line Bug#416402: fixed in wzdftpd 0.8.1-2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: wzdftpd-mod-avahi Version: 0.8.1-1 Severity: serious Coin, wzdftpd start, then crash 2s later with the following message: wzdftpd: libwzd_avahi.c:182: publish_reply: Assertion `g == ctx->group' failed. Regards. -- Marc Dequènes (Duck) pgpl2qDvxnP7o.pgp Description: PGP signature --- End Message --- --- Begin Message --- Source: wzdftpd Source-Version: 0.8.1-2 We believe that the bug you reported is fixed in the latest version of wzdftpd, which is due to be installed in the Debian FTP archive: wzdftpd-back-mysql_0.8.1-2_amd64.deb to pool/main/w/wzdftpd/wzdftpd-back-mysql_0.8.1-2_amd64.deb wzdftpd-back-pgsql_0.8.1-2_amd64.deb to pool/main/w/wzdftpd/wzdftpd-back-pgsql_0.8.1-2_amd64.deb wzdftpd-dev_0.8.1-2_amd64.deb to pool/main/w/wzdftpd/wzdftpd-dev_0.8.1-2_amd64.deb wzdftpd-mod-avahi_0.8.1-2_amd64.deb to pool/main/w/wzdftpd/wzdftpd-mod-avahi_0.8.1-2_amd64.deb wzdftpd-mod-perl_0.8.1-2_amd64.deb to pool/main/w/wzdftpd/wzdftpd-mod-perl_0.8.1-2_amd64.deb wzdftpd-mod-tcl_0.8.1-2_amd64.deb to pool/main/w/wzdftpd/wzdftpd-mod-tcl_0.8.1-2_amd64.deb wzdftpd_0.8.1-2.diff.gz to pool/main/w/wzdftpd/wzdftpd_0.8.1-2.diff.gz wzdftpd_0.8.1-2.dsc to pool/main/w/wzdftpd/wzdftpd_0.8.1-2.dsc wzdftpd_0.8.1-2_amd64.deb to pool/main/w/wzdftpd/wzdftpd_0.8.1-2_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Pierre Chifflier <[EMAIL PROTECTED]> (supplier of updated wzdftpd package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Wed, 04 Apr 2007 11:16:49 +0200 Source: wzdftpd Binary: wzdftpd-mod-perl wzdftpd-back-mysql wzdftpd-dev wzdftpd-mod-avahi wzdftpd-back-pgsql wzdftpd wzdftpd-mod-tcl Architecture: source amd64 Version: 0.8.1-2 Distribution: unstable Urgency: high Maintainer: Pierre Chifflier <[EMAIL PROTECTED]> Changed-By: Pierre Chifflier <[EMAIL PROTECTED]> Description: wzdftpd- A portable, modular, small and efficient ftp server wzdftpd-back-mysql - MySQL backend for wzdftpd wzdftpd-back-pgsql - PostgreSQL backend for wzdftpd wzdftpd-dev - Development files for wzdftpd wzdftpd-mod-avahi - Zeroconf module for wzdftpd wzdftpd-mod-perl - Perl module for wzdftpd wzdftpd-mod-tcl - TCL module for wzdftpd Closes: 416402 Changes: wzdftpd (0.8.1-2) unstable; urgency=high . * Fix assertion failed in avahi module (Closes: #416402) * urgency=high because of the above bug, and to reach etch * Update my email address Files: 8362ccbd4243c08f4042d1bda43f6cf7 853 net optional wzdftpd_0.8.1-2.dsc ca65ab3e90af7df515f33f12540c3c8b 11237 net optional wzdftpd_0.8.1-2.diff.gz 22185987ebc23e9e8022afafb182 273682 net optional wzdftpd_0.8.1-2_amd64.deb c2c428d20bc056b7a09f4ae190f46ddc 39708 net optional wzdftpd-back-mysql_0.8.1-2_amd64.deb b2951f217032b9439b2682ac8fcfea9c 39650 net optional wzdftpd-back-pgsql_0.8.1-2_amd64.deb cce020a796b78f76ae5e3edb356aa815 30872 net optional wzdftpd-mod-avahi_0.8.1-2_amd64.deb 0e1bc1a4896c86e1b966d9abd1ada06a 35506 net optional wzdftpd-mod-tcl_0.8.1-2_amd64.deb 19fd0ae509a9e0bdc9b14c89b5188389 52482 net optional wzdftpd-mod-perl_0.8.1-2_amd64.deb a6d778f11ef097cb89ce3a7cd0287af3 280090 libdevel optional wzdftpd-dev_0.8.1-2_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGE3YUw3ao2vG823MRAg/4AJ9gd4RNb6OztrybmXQfigwtjxsQmQCfRful 9yOaAJmsSPk20w/mZZwxvPc= =ZPLO -END PGP SIGNATURE- --- End Message ---
Bug#417649: 100% cpu utilization with kdelibs 4:3.5.5a.dfsg.1-8
> > Attached is the diff from the version -7 and -8 (fixing a security bug). As > you can see, we have not changed anything that can lead to this problem. > Attached now O) diff -u kdelibs-3.5.5a.dfsg.1/debian/changelog kdelibs-3.5.5a.dfsg.1/debian/changelog --- kdelibs-3.5.5a.dfsg.1/debian/changelog +++ kdelibs-3.5.5a.dfsg.1/debian/changelog @@ -1,3 +1,10 @@ +kdelibs (4:3.5.5a.dfsg.1-8) unstable; urgency=high + + * Add patch to fix utf8-parsing vulnerability. + * Urgency high due to security fix. + + -- Sune Vuorela <[EMAIL PROTECTED]> Thu, 29 Mar 2007 21:19:35 +0200 + kdelibs (4:3.5.5a.dfsg.1-7) unstable; urgency=high * Add patch 46_CVE-2007-1564-kdelibs-3.5.6.diff: untrusted sites that allow only in patch2: unchanged: --- kdelibs-3.5.5a.dfsg.1.orig/debian/patches/47_kdelibs-kjs-utf8-parsing.diff +++ kdelibs-3.5.5a.dfsg.1/debian/patches/47_kdelibs-kjs-utf8-parsing.diff @@ -0,0 +1,38 @@ + +r645387 | porten | 2007-03-22 15:01:13 +0100 (Thu, 22 Mar 2007) | 4 lines + +substitute some of the invalid sequences with the standard replacement +char. this matches Mozilla but not IE which leaves them unchanged (or +throws an exception) + + +--- kjs/function.cpp kjs/function.cpp +@@ -244,11 +244,15 @@ UString decodeURI(ExecState *exec, UStri + } + + // UTF-8 transform ++ const unsigned long replacementChar = 0xFFFD; + unsigned long V; + if (n == 2) { + unsigned long y = octets[0] & 0x1F; + unsigned long zz = octets[1] & 0x3F; + V = (y << 6) | zz; ++ // 2-byte sequence overlong for this value? ++ if (V < 0xFF) ++ V = replacementChar; + C = UChar((unsigned short)V); + } + else if (n == 3) { +@@ -256,6 +260,11 @@ UString decodeURI(ExecState *exec, UStri + unsigned long yy = octets[1] & 0x3F; + unsigned long zz = octets[2] & 0x3F; + V = ( << 12) | (yy << 6) | zz; ++ // 3-byte sequence overlong for this value, ++ // an invalid value or UTF-16 surrogate? ++ if (V < 0x800 || V == 0xFFFE || V == 0x || ++ (V >= 0xD800 && V <= 0xDFFF)) ++ V = replacementChar; + C = UChar((unsigned short)V); + } + else {
Bug#417656: evolution: Crashes when run
On Wed, Apr 04, 2007 at 08:34:07AM +0200, Øystein Gisnås wrote: > >Maybe this is actually the fault of e-d-s since I just upgraded it > >from 1.8.2-1 to 1.8.2-2. Anyway, here's a backtrace: > > Does this happen on every invocation? It does. > Do you have a chance to downgrade to 1.8.2-1 again and see if that's > the reason? Remember to kill your running e-d-s completely before you > start evolution. I've just done that and it doesn't seem to make a difference--I still have the same crash. :( > Cheers, > Øystein -- Sam Morris http://robots.org.uk/ PGP key id 1024D/5EA01078 3412 EA18 1277 354B 991B C869 B219 7FDB 5EA0 1078 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#417649: 100% cpu utilization with kdelibs 4:3.5.5a.dfsg.1-8
On Tue, Apr 03, 2007 at 09:48:04PM -0300, Toshiro wrote: > > > Package: kdelibs > > > Version: 4:3.5.5a.dfsg.1-7 > > > Severity: grave > > > Justification: renders package unusable > > > > > > > > > When KDE starts, kded daemon takes almost 100% of the cpu; it usually > > > happens when kdewallet asked for the passphrase to open the passwords, > > > it makes the system unusable because it never opens the kdewallet > > > passwords. Killing kded (and restarting kded after that) helps with the > > > CPU utilization, but kdewallet won't work anymore. > > > > Is this issue specific to the -8 version? i.e. does it not apply on the -7 > > version? > > Exactly. I forgot to mention that I downgraded to -7 and the problem > disappeared. > Can you try to upgrade again to -8 and see if still happens? Attached is the diff from the version -7 and -8 (fixing a security bug). As you can see, we have not changed anything that can lead to this problem. I already have been told for an user this upgrade works fine, if i get another positive answer i'm downgrading this bug severity. Ana -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: raising severity
Processing commands for [EMAIL PROTECTED]: > severity 416816 serious Bug#416816: idjc: Missing python-gtk2 dependency Severity set to `serious' from `important' > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#417652: kvm: undeclared file conflict
This one time, at band camp, Baruch Even said: > * Stephen Gran <[EMAIL PROTECTED]> [070404 02:25]: > > Package: kvm > > Version: 14-1 > > Severity: serious > > > > Unpacking replacement kvm ... > > dpkg: error processing /var/cache/apt/archives/kvm_18-1_i386.deb (--unpack): > > trying to overwrite `/usr/share/modass/packages/kvm-source', which is also > > in package kvm-source > > I've moved a symlink from kvm-source to kvm, should have figured it will > cause this problem. > > As an interim fix you can remove the kvm-souce package, install kvm and > then install kvm-source again. I'll work on a fix in the packaging for > it. It works fine if kvm-source is upgrated before kvm, which implies to me you need a versioned conflicts, as well as a replaces and so on. -- - | ,''`.Stephen Gran | | : :' :[EMAIL PROTECTED] | | `. `'Debian user, admin, and developer | |`- http://www.debian.org | - signature.asc Description: Digital signature
Bug#417673: /sbin/fsck.vfat: Incorrectly truncates files of 4294966784 bytes length during boot.
Package: dosfstools Version: 2.11-2.1 Severity: critical File: /sbin/fsck.vfat Justification: causes serious data loss /sbin/fsck.vfat truncates files of 4294966784 bytes length. The file system on /dev/hda8 was checked immediately before reboot using the GUI tool in Windows 2000. As the output /var/log/fsck/checkfs shows /sbin/fsck.vfat decided during boot that the filesystem was inconsistent and automatically truncated the file. Note that it hasn't actually released the clusters yet. The clusters seem to be freed during when fsck is run at the next boot. Also shown below is the result of manually copying an equivalant file, and manually running fsck.vfat is sufficent to reproduce the problem. A quick test shows that Sarge does not truncate the file during boot. Thanks for your work in Debian Andrew V. $ cat /var/log/fsck/checkfs Log of fsck -C -V -R -A -a Wed Apr 4 17:23:06 2007 fsck 1.40-WIP (14-Nov-2006) Checking all file systems. [/sbin/fsck.ext3 (1) -- /mnt/p4-backup-root] fsck.ext3 -a -C0 /dev/hda6 /dev/hda6: Superblock last mount time is in the future. FIXED. /dev/hda6: clean, 19738/128520 files, 313092/514048 blocks [/sbin/fsck.vfat (1) -- /mnt/p4-shared] fsck.vfat -a /dev/hda8 dosfsck 2.11, 12 Mar 2005, FAT32, LFN /Sarge Hard Disk.vhd File size is 4294966784 bytes, cluster chain length is 0 bytes. Truncating file to 0 bytes. Performing changes. /dev/hda8: 63 files, 950195/2076388 clusters fsck died with exit status 1 Wed Apr 4 17:23:07 2007 $ cp /mnt/p4-games/tmp/MS-Virtual-PC/sarge1/Sarge\ Hard\ Disk.vhd /mnt/p4-shared/sarge_test $ ll /mnt/p4-shared/ total 4194368 [...] -rwxr-xr-x 1 andrew andrew 0 2007-03-29 18:32 Sarge Hard Disk.vhd -rwxr-xr-x 1 andrew andrew 4294966784 2007-04-04 17:34 sarge_test $ sudo umount /dev/hda8 $ sudo fsck.vfat -a /dev/hda8 dosfsck 2.11, 12 Mar 2005, FAT32, LFN /sarge_test File size is 4294966784 bytes, cluster chain length is 0 bytes. Truncating file to 0 bytes. /Sarge Hard Disk.vhd File size is 0 bytes, cluster chain length is > 0 bytes. Truncating file to 0 bytes. Free cluster summary wrong (864049 vs. really 1126193) Auto-correcting. Performing changes. /dev/hda8: 64 files, 950195/2076388 clusters $ sudo fsck.vfat -a /dev/hda8 dosfsck 2.11, 12 Mar 2005, FAT32, LFN /sarge_test File size is 0 bytes, cluster chain length is > 0 bytes. Truncating file to 0 bytes. Free cluster summary wrong (1126193 vs. really 1388337) Auto-correcting. Performing changes. /dev/hda8: 64 files, 688051/2076388 clusters -- System Information: Debian Release: 4.0 APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-4-686 Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8) Versions of packages dosfstools depends on: ii libc6 2.3.6.ds1-13 GNU C Library: Shared libraries dosfstools recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#417407: debian-installer: possible workarounds for "d-i destroyed existing raid device"
Cut and paste from BTS web interface so sorry for the formatting! From: Samuel Thibault <[EMAIL PROTECTED]> Subject: Re: Bug#417407: debian-installer: d-i destroyed existing raid device Date: Tue, 3 Apr 2007 19:26:25 +0200 Hi, martin f krafft, le Tue 03 Apr 2007 10:28:24 +0200, a écrit : And the other question of course is why the kernel decided it had any business doing recovery on an fs that was marked for ro mount. Because it always do so, see linux/fs/ext3/super.c:ext3_load_journal(): even if the mount is read-only, the journal is recovered. If (but only if) the device itself is read-only, then nothing is written back to the disk. Ext3 clearly lacks xfs' norecovery mount option. I can think of two possible workarounds for this. NB: I have not looked at the code but I'm just thinking out loud. [1] at the partitioner stage configure md devices... IIRC this should recognize the preexisting device. Then mark the device to be mounted at /home (or /oldhome for the ultra paranoid) and markit to be left alone (ie not formatted). _Presumably_ os-prober would then ignore the md device and it's components when looking for other OS's. [2] wrap the mount/umount sections of code in os-prober with calls to blockdev to set the block device readonly (and restore old perms on umount). This would side step the deficiencies in the "unconditional ext3 journal recovery code". (but this would need a block-dev udeb added to util-linux source) Just some thoughts... Alex Owen
Bug#417662: wengophone_2.1.0~rc2-svn10386-1(hppa/unstable): FTBFS: bad build-depends
On Tue, Apr 03, 2007 at 09:50:43PM -0600, [EMAIL PROTECTED] wrote: > > > g++-3.4 does not exist on hppa. This is a problem. Wengophone does not work with gcc 4.1 and current boost library. http://dev.openwengo.com/pipermail/wengophone-devel/2006-December/004731.html Here you can read burgrport on opensuse https://bugzilla.novell.com/show_bug.cgi?id=228524 and on ubuntu https://launchpad.net/ubuntu/+source/gcc-4.1/+bug/75724 I need a c++ compiler >= 3.4 and != 4.1 . Is there some good candidate in hppa? Ciao -- - |Marco Nenciarini| Debian/GNU Linux Developer - Plug Member | | [EMAIL PROTECTED] | http://www.prato.linux.it/~mnencia | - Key fingerprint = FED9 69C7 9E67 21F5 7D95 5270 6864 730D F095 E5E4 signature.asc Description: Digital signature
Bug#417656: [Evolution] Bug#417656: evolution: Crashes when run
On Wed, Apr 04, 2007, =?UTF-8?Q? =C3=98ystein_?= =?UTF-8?Q?Gisn=C3=A5s ?= wrote: > I actually can reproduce this myself, and it's probably due to the > 20_too-many-open-files.patch. Downgrading e-d-s to 1.8.2-1 helps. > > We'll remove the patch, test it and reupload as soon as we can. Blah; sorry, I can't test e-d-s decently as I don't use evolution. Can you confirm removing this patch helps? If it does, I'll upload ASAP. The patch isn't present in the unstable version, I suppose it's not affected and I'll request migration to etch if you're ok with that. -- Loïc Minier
Bug#417624: marked as done (Several build bugs)
Your message dated Wed, 04 Apr 2007 07:32:07 + with message-id <[EMAIL PROTECTED]> and subject line Bug#417624: fixed in mldonkey 2.8.4-2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: mldonkey-server Version: 2.8.4-1 These bug were reported in build logs: http://buildd.debian.org/build.php?arch=hppa&pkg=mldonkey&ver=2.8.4-1 make[1]: Entering directory `/build/buildd/mldonkey-2.8.4/debian/xml-man' # Verification xmllint --nonet --noout --postvalid --xinclude mlgui.xml make[1]: xmllint: Command not found make[1]: [mlgui.1] Error 127 (ignored) --- http://buildd.debian.org/build.php?arch=arm&pkg=mldonkey&ver=2.8.4-1 dpatch apply-all applying patch 01_see to ./ ... ok. applying patch arm_dynamic_loop_delay to ./ ... failed. make: *** [patch-stamp] Error 1 ** Build finished at 20070402-0031 FAILED [dpkg-buildpackage died] Purging chroot-unstable/build/buildd/mldonkey-2.8.4 Patch arm_dynamic_loop_delay is already included in CVS --- http://buildd.debian.org/fetch.cgi?&pkg=mldonkey&ver=2.8.4-1&arch=ia64&stamp=1175467141&file=log cd debian/xml-man && /usr/bin/make all make[1]: Entering directory `/build/buildd/mldonkey-2.8.4/debian/xml-man' # Verification xmllint --nonet --noout --postvalid --xinclude mlgui.xml make[1]: xmllint: Command not found make[1]: [mlgui.1] Error 127 (ignored) _ Sie suchen E-Mails, Dokumente oder Fotos? Die neue MSN Suche Toolbar mit Windows-Desktopsuche liefert in sekundenschnelle Ergebnisse. Jetzt neu! http://desktop.msn.de/ Jetzt gratis downloaden! --- End Message --- --- Begin Message --- Source: mldonkey Source-Version: 2.8.4-2 We believe that the bug you reported is fixed in the latest version of mldonkey, which is due to be installed in the Debian FTP archive: mldonkey-gui_2.8.4-2_i386.deb to pool/main/m/mldonkey/mldonkey-gui_2.8.4-2_i386.deb mldonkey-server_2.8.4-2_i386.deb to pool/main/m/mldonkey/mldonkey-server_2.8.4-2_i386.deb mldonkey_2.8.4-2.diff.gz to pool/main/m/mldonkey/mldonkey_2.8.4-2.diff.gz mldonkey_2.8.4-2.dsc to pool/main/m/mldonkey/mldonkey_2.8.4-2.dsc A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Samuel Mimram <[EMAIL PROTECTED]> (supplier of updated mldonkey package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 02 Apr 2007 09:12:54 +0200 Source: mldonkey Binary: mldonkey-gui mldonkey-server Architecture: source i386 Version: 2.8.4-2 Distribution: unstable Urgency: low Maintainer: Debian OCaml Maintainers Changed-By: Samuel Mimram <[EMAIL PROTECTED]> Description: mldonkey-gui - Graphical frontend for mldonkey based on GTK mldonkey-server - Door to the 'donkey' network Closes: 417624 Changes: mldonkey (2.8.4-2) unstable; urgency=low . * Added a missing build-dependency on libxml2-utils which is needed for xmllint. * Removed arm_dynamic_loop_delay.dpatch, integrated upstream, closes: #417624. Files: 2c81900204f87f4e4c327a959df949eb 1186 net optional mldonkey_2.8.4-2.dsc 212c030afd9788b9a592ddc93602d0d3 124051 net optional mldonkey_2.8.4-2.diff.gz 8ad25696ec1436651235c4b9d4b26e67 2528014 net optional mldonkey-server_2.8.4-2_i386.deb e4fc98bdca94270ec017fcc17f31c069 3555414 net optional mldonkey-gui_2.8.4-2_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGE1KqIae1O4AJae8RAl7MAJ4qf7DG12xuGmLA1sMFl433I32a+gCfapS9 v8vdcFO9aeAt3hDmr5J7egA= =mYY8 -END PGP SIGNATURE- --- End Message ---
Processed: tagging 414045
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.2 > tags 414045 + patch Bug#414045: libX11: Buffer overflow in XGetPixel(). Tags were: upstream security Tags added: patch > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: severity of 417624 is serious
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.2 > severity 417624 serious Bug#417624: Several build bugs Severity set to `serious' from `normal' > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#417656: evolution: Crashes when run
2007/4/4, Øystein Gisnås <[EMAIL PROTECTED]>: > Maybe this is actually the fault of e-d-s since I just upgraded it > from 1.8.2-1 to 1.8.2-2. Anyway, here's a backtrace: Does this happen on every invocation? I actually can reproduce this myself, and it's probably due to the 20_too-many-open-files.patch. Downgrading e-d-s to 1.8.2-1 helps. We'll remove the patch, test it and reupload as soon as we can.