Bug#601741: openoffice.org-impress: OOo freeze and after some minutes freeze Xorg
Package: openoffice.org-impress Version: 1:3.2.1-7 Severity: grave Justification: causes non-serious data loss Open http://media.eduscol.education.fr/file/seminaire_STI2D/56/7/STI2D_BacSTI2D_157567.odp Export in PDF/A-1a. The message export to PDF is displaying in status bar and OOo freezes with an high CPU activity. After some minutes, Xorg freezes (with no possible activity of the mouse). -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.32-5-686 (SMP w/1 CPU core) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages openoffice.org-impress depends on: ii libc6 2.11.2-6+squeeze1 Embedded GNU C Library: Shared lib ii libgcc11:4.4.5-4 GCC support library ii libstdc++6 4.4.5-4 The GNU Standard C++ Library v3 ii libstlport4.6ldbl 4.6.2-7 STLport C++ class library ii openoffice.org-core1:3.2.1-7 office productivity suite -- arch- ii openoffice.org-draw1:3.2.1-7 office productivity suite -- drawi ii ure1.6.1+OOo3.2.1-7 OpenOffice.org UNO runtime environ openoffice.org-impress recommends no packages. openoffice.org-impress suggests no packages. Versions of packages openoffice.org-core depends on: ii fontconfig 2.8.0-2.1 generic font configuration library ii libc6 2.11.2-6+squeeze1 Embedded GNU C Library: Shared lib ii libcairo2 1.8.10-6 The Cairo 2D vector graphics libra ii libcurl3-gnutls7.21.0-1 Multi-protocol file transfer libra ii libdb4.8 4.8.30-2 Berkeley v4.8 Database Libraries [ ii libexpat1 2.0.1-7 XML parsing C library - runtime li ii libfreetype6 2.4.2-1 FreeType 2 font engine, shared lib ii libgcc11:4.4.5-4 GCC support library ii libglib2.0-0 2.24.2-1 The GLib library of C routines ii libgraphite3 1:2.3.1-0.2 SILGraphite - a smart font rende ii libgstreamer-plugins-b 0.10.30-1 GStreamer libraries from the base ii libgstreamer0.10-0 0.10.30-1 Core GStreamer libraries and eleme ii libgtk2.0-02.20.1-2 The GTK+ graphical user interface ii libhunspell-1.2-0 1.2.11-1 spell checker and morphological an ii libhyphen0 2.5-1 ALTLinux hyphenation library - sha ii libice62:1.0.6-1 X11 Inter-Client Exchange library ii libicu44 4.4.1-6 International Components for Unico ii libjpeg62 6b1-1 The Independent JPEG Group's JPEG ii libmythes-1.2-02:1.2.1-1 simple thesaurus library ii libneon27-gnutls 0.29.3-2 An HTTP and WebDAV client library ii libnspr4-0d4.8.6-1 NetScape Portable Runtime Library ii libnss3-1d 3.12.8-1 Network Security Service libraries ii librdf01.0.10-3 Redland Resource Description Frame ii libsm6 2:1.1.1-1 X11 Session Management library ii libssl0.9.80.9.8o-2 SSL shared libraries ii libstdc++6 4.4.5-4 The GNU Standard C++ Library v3 ii libstlport4.6ldbl 4.6.2-7 STLport C++ class library ii libx11-6 2:1.3.3-3 X11 client-side library ii libxaw72:1.0.7-1 X11 Athena Widget library ii libxext6 2:1.1.2-1 X11 miscellaneous extension librar ii libxinerama1 2:1.1-3 X11 Xinerama extension library ii libxml22.7.7.dfsg-4 GNOME XML library ii libxrandr2 2:1.3.0-3 X11 RandR extension library ii libxrender11:0.9.6-1 X Rendering Extension client libra ii libxslt1.1 1.1.26-6 XSLT 1.0 processing library - runt ii libxt6 1:1.0.7-1 X11 toolkit intrinsics library ii openoffice.org-common 1:3.2.1-7 office productivity suite -- arch- ii ttf-opensymbol 1:3.2.1-7 OpenSymbol TrueType font ii ure1.6.1+OOo3.2.1-7 OpenOffice.org UNO runtime environ ii zlib1g 1:1.2.3.4.dfsg-3 compression library - runtime Versions of packages openoffice.org-draw depends on: ii libc6 2.11.2-6+squeeze1 Embedded GNU C Library: Shared lib ii libgcc11:4.4.5-4 GCC support library ii libstdc++6 4.4.5-4 The GNU Standard C++ Library v3 ii libstlport4.6ldbl 4.6.2-7 STLport C++ class library ii libwpd8c2a 0.8.14-1 Library for handling WordPerfect d ii libwpg-0.1-1 0.1.3-1 WordPerfect graphics import/conver ii
Bug#595446: Re: ntop: diff for NMU version 3:3.3-14.1
Hi Alexander, On 01/-10/-28163 11:59 AM, Alexander Reichle-Schmehl wrote: Sure, I rescheduled them to delayed/15. But if you would rather provide backports and not release the package, wouldn't it make sense to cancel it alltogether? I am going to co-maintain ntop with Jordan. As you have probably seen, we have just uploaded a new version of ntop changing the maintainers and fixing the RC bug, as a temporary package until ntop 4 is ready. We are are now going to ask removal from squeeze though. Thanks for you patch and NMU! Cheers, Ludovico -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601430: gdebi-kde: gdebi gui ask for password but will not install package
Could you please try to launch gdebi-kde in a console window to eventually get a backtrace, or a meaningful log? Thanks! -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
Bug#588696: Attempted to update that package and failed :(
Hi! I just tried to bring this package in shape for the release. Changelog reads as follows: iceowl-l10n (1.0~b1+debian.1-1) unstable; urgency=medium * QA upload. * New upstream release: * These languages packs support iceowl 1.0~bX (Closes: #566396, #588696, #595621, #588897) * Drop iceowl-l10n-gl-ES, iceowl-l10n-mk, iceowl-l10n-mn, iceowl-l10n-sl, iceowl-l10n-sv-SE, ceowl-l10n-uk, and iceowl-l10n-zh-TW as these languages doesn't seem to be supported anymore * Added new translations iceowl-l10n-et, iceowl-l10n-fy-NL, iceowl-l10n-gl, iceowl-l10n-he, iceowl-l10n-id, iceowl-l10n-si, iceowl-l10n-ta-lk, iceowl-l10n-vi * Adjust dependencies accordingly * Also recommend hunspell dictionaries, fi they exist (Closes: #593582) * Bump debhelper build depends to (= 7.0.50~) as dh overrider are * used * Bump standards to 3.9.1 (no changes needed) * Don't build as native package -- Alexander Reichle-Schmehl toli...@debian.org Thu, 28 Oct 2010 16:05:43 +0200 I basically downloaded the new files from http://releases.mozilla.org/pub/mozilla.org/calendar/sunbird/releases/1.0b1/linux-i686/xpi/ dropped no longer supported languages (http://www.mancomun.org/raquo-descargas/software-libre/produtos-mozilla/sunbird/traducion-galego-sunbird.html doesn't seem to work anymore) and added packages for the new languages. The package builds cleanly, can be installed and is also recognized by iceowl: If I install one of the packages, it will be shown in the Addon-Menu of iceowl. I think it also fixes #546189 (installation problem with Italian language pack); at least I wasn't able to reproduce it. However, iceowl doesn't use the installed langauge packs, all menus and everything are still shown in English. I don't see anything on iceowls error console, nor any usefull console output. I have no idea, why the new language packs are not used and don't know enough about mozilla stuff to find it out. FWIW I upload the results I had so far to http://people.debian.org/~tolimar/tmp/iceowl-l10n/ in case someone would like to work on them. Dmitry, Christop, as you maintain similar packages for iceweasel and icedove, or Daniel as former maintainer, do you have any idea or hints where I should look at? Best Regards, Alexander signature.asc Description: Digital signature
Bug#601747: RDS protocol vulnerability
Package: linux-2.6 Version: 2.6.32-26 Severity: critical Tags: security, patch Hi, You know, RDS protocol vulnerability was found in Linux kernel. US-Cert says (http://www.kb.cert.org/vuls/id/362983) The RDS protocol implementation of Linux kernels 2.6.30 through 2.6.38-rc8 contain a local privilege escalation vulnerability. And the patch from upstream git http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff_plain;h=799c10559d60f159ab2232203f222f18fa3c4a5f can apply to 2.6.32-26 with 1 hunk, please check it. thanks. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#591457: status update
xapt is in the NEW queue, aimed at experimental, but a lot of changes needed to be made to the version that is currently part of pdebuild-cross. Therefore, I do not think it suitable to push xapt as a replacement for apt-cross as a fix for this particular bug. The two programs are trying to do a similar task but are not equivalent. xapt is a new codebase, it is a different approach. To make things a little easier for users of apt-cross, xapt has been uploaded to the Emdebian toolchain repository: http://www.emdebian.org/toolchains/search.php?arch=i386distro=sidpackage=xapt apt-cross was only ever useful when allied to a cross-building toolchain on a Debian system, so this means that users of such toolchains can now get xapt directly. This should minimise the problems of removing apt-cross from Squeeze without having a direct replacement in Debian itself. I'll be seeking the removal of apt-cross from Squeeze this weekend. -- Neil Williams = http://www.data-freedom.org/ http://www.linux.codehelp.co.uk/ http://e-mail.is-not-s.ms/ pgpPNlTXz3HkW.pgp Description: PGP signature
Processed: bug is not new
Processing commands for cont...@bugs.debian.org: found 600826 23.2+1-4 Bug #600826 [src:emacs23] emacs23: FTBFS: E: Package 'mailx' has no installation candidate Bug Marked as found in versions emacs23/23.2+1-4. thanks Stopping processing here. Please contact me if you need assistance. -- 600826: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600826 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: tagging 601747
Processing commands for cont...@bugs.debian.org: # Automatically generated email from bts, devscripts version 2.10.35lenny7 tags 601747 + pending Bug #601747 [linux-2.6] RDS protocol vulnerability Added tag(s) pending. End of message, stopping processing here. Please contact me if you need assistance. -- 601747: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601747 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#600826: emacs23: FTBFS: E: Package 'mailx' has no installation candidate
Processing commands for cont...@bugs.debian.org: tags 600826 + patch Bug #600826 [src:emacs23] emacs23: FTBFS: E: Package 'mailx' has no installation candidate Added tag(s) patch. thanks Stopping processing here. Please contact me if you need assistance. -- 600826: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600826 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#600826: emacs23: FTBFS: E: Package 'mailx' has no installation candidate
tags 600826 + patch thanks On 2010-10-20 14:25 +0200, Cyril Brulebois wrote: Source: emacs23 Version: 23.2+1-5 Severity: serious Justification: FTBFS Hi, you're build-depending on a virtual package, mailx, which isn't blessed by policy. That's not supported by the buildds (#595934), so depending on the installed packages in the chroots and on the running version of sbuild running, your package may be given back again and again. This can trivially be avoided by preferring bsd-mailx over mailx as build dependency. I've attached a diff in case somebody wants to NMU. Cheers, Sven diff -Nru emacs23-23.2+1/debian/changelog emacs23-23.2+1/debian/changelog --- emacs23-23.2+1/debian/changelog 2010-10-18 07:17:56.0 +0200 +++ emacs23-23.2+1/debian/changelog 2010-10-29 11:31:54.0 +0200 @@ -1,3 +1,11 @@ +emacs23 (23.2+1-5.1) unstable; urgency=low + + * Non-maintainer upload. + * Prefer bsd-mailx over mailx as build dependency, since the latter +is a pure virtual package (Closes: #600826). + + -- Sven Joachim svenj...@gmx.de Fri, 29 Oct 2010 11:31:54 +0200 + emacs23 (23.2+1-5) unstable; urgency=low * Apply upstream patches to prevent the string and unibyte-string diff -Nru emacs23-23.2+1/debian/control emacs23-23.2+1/debian/control --- emacs23-23.2+1/debian/control 2010-10-18 07:19:32.0 +0200 +++ emacs23-23.2+1/debian/control 2010-10-29 11:36:47.0 +0200 @@ -2,7 +2,7 @@ Section: editors Priority: optional Maintainer: Rob Browning r...@defaultvalue.org -Build-Depends: mailx, libncurses5-dev, texinfo, liblockfile-dev, librsvg2-dev, +Build-Depends: bsd-mailx | mailx, libncurses5-dev, texinfo, liblockfile-dev, librsvg2-dev, libgif-dev | libungif4-dev, libtiff4-dev | libtiff-dev, xaw3dg-dev, libpng12-dev, libjpeg62-dev, libm17n-dev, libotf-dev, libgpm-dev [!hurd-i386 !kfreebsd-i386 !kfreebsd-amd64], libdbus-1-dev, diff -Nru emacs23-23.2+1/debian/control.in emacs23-23.2+1/debian/control.in --- emacs23-23.2+1/debian/control.in2010-08-14 18:54:18.0 +0200 +++ emacs23-23.2+1/debian/control.in2010-10-29 11:31:38.0 +0200 @@ -2,7 +2,7 @@ Section: editors Priority: optional Maintainer: Rob Browning r...@defaultvalue.org -Build-Depends: mailx, libncurses5-dev, texinfo, liblockfile-dev, librsvg2-dev, +Build-Depends: bsd-mailx | mailx, libncurses5-dev, texinfo, liblockfile-dev, librsvg2-dev, libgif-dev | libungif4-dev, libtiff4-dev | libtiff-dev, xaw3dg-dev, libpng12-dev, libjpeg62-dev, libm17n-dev, libotf-dev, libgpm-dev [!hurd-i386 !kfreebsd-i386 !kfreebsd-amd64], libdbus-1-dev,
Bug#601754: Psql binary license incompatibility
Package: postgresql-client Version: 8.3.12-0lenny1 Severity: serious During a general conversation about readline licensing, I noticed that psql links to both libreadline (GPL v2+) and libssl (BSD-like, incompatible with the GPL), thus ending up with the terms of both licenses applying. My reasoning is that since the licenses are incompatible with each other, the binary is technically undistributable. The consensus on #debian-devel was that this reasoning is correct. Upstream claims that it should be possible to replace readline with libedit, and I noticed that libeditline is another option. It would of course be preferable to use one of those instead of disabling the functionality completely. I decided to file this against the version of the package in lenny, since it in my understanding applies to all versions currently distributed by Debian (the one in lenny being the oldest). -- Arto Jantunen -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#592024: marked as done (glib2.0: FTBFS on kfreebsd-*: /bin/bash: C: command not found)
Your message dated Fri, 29 Oct 2010 10:32:21 + with message-id e1pbmfx-0006bo...@franck.debian.org and subject line Bug#592024: fixed in glib2.0 2.27.1-1 has caused the Debian Bug report #592024, regarding glib2.0: FTBFS on kfreebsd-*: /bin/bash: C: command not found to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 592024: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=592024 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: glib2.0 Version: 2.25.12-2 Severity: serious Justification: FTBFS User: debian-...@lists.debian.org Usertags: kfreebsd Hi, your package no longer builds on kfreebsd-*: | make[3]: Entering directory `/build/buildd-glib2.0_2.25.12-2-kfreebsd-amd64-1vI2PE/glib2.0-2.25.12/debian/build/deb/glib' | cd .. \ | /bin/bash ./config.status glib/glibconfig.h | config.status: executing glib/glibconfig.h commands | config.status: glib/glibconfig.h is unchanged | C -h -s /build/buildd-glib2.0_2.25.12-2-kfreebsd-amd64-1vI2PE/glib2.0-2.25.12/glib/glib_probes.d -o glib_probes.h.tmp | /bin/bash: C: command not found | make[3]: [glib_probes.h] Error 127 (ignored) | sed -e s,define STAP_HAS_SEMAPHORES 1,undef STAP_HAS_SEMAPHORES, glib_probes.h.tmp glib_probes.h rm -f glib_probes.h.tmp | /bin/bash: glib_probes.h.tmp: No such file or directory | make[3]: *** [glib_probes.h] Error 1 Full build logs: https://buildd.debian.org/status/package.php?p=glib2.0suite=experimental Mraw, KiBi. ---End Message--- ---BeginMessage--- Source: glib2.0 Source-Version: 2.27.1-1 We believe that the bug you reported is fixed in the latest version of glib2.0, which is due to be installed in the Debian FTP archive: glib2.0_2.27.1-1.diff.gz to main/g/glib2.0/glib2.0_2.27.1-1.diff.gz glib2.0_2.27.1-1.dsc to main/g/glib2.0/glib2.0_2.27.1-1.dsc glib2.0_2.27.1.orig.tar.gz to main/g/glib2.0/glib2.0_2.27.1.orig.tar.gz libglib2.0-0-dbg_2.27.1-1_amd64.deb to main/g/glib2.0/libglib2.0-0-dbg_2.27.1-1_amd64.deb libglib2.0-0-refdbg_2.27.1-1_amd64.deb to main/g/glib2.0/libglib2.0-0-refdbg_2.27.1-1_amd64.deb libglib2.0-0_2.27.1-1_amd64.deb to main/g/glib2.0/libglib2.0-0_2.27.1-1_amd64.deb libglib2.0-bin_2.27.1-1_amd64.deb to main/g/glib2.0/libglib2.0-bin_2.27.1-1_amd64.deb libglib2.0-data_2.27.1-1_all.deb to main/g/glib2.0/libglib2.0-data_2.27.1-1_all.deb libglib2.0-dev_2.27.1-1_amd64.deb to main/g/glib2.0/libglib2.0-dev_2.27.1-1_amd64.deb libglib2.0-doc_2.27.1-1_all.deb to main/g/glib2.0/libglib2.0-doc_2.27.1-1_all.deb libglib2.0-udeb_2.27.1-1_amd64.udeb to main/g/glib2.0/libglib2.0-udeb_2.27.1-1_amd64.udeb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 592...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Sebastian Dröge sl...@debian.org (supplier of updated glib2.0 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 29 Oct 2010 11:32:02 +0200 Source: glib2.0 Binary: libglib2.0-0 libglib2.0-udeb libglib2.0-bin libglib2.0-dev libglib2.0-0-dbg libglib2.0-data libglib2.0-doc libgio-fam libglib2.0-0-refdbg Architecture: source all amd64 Version: 2.27.1-1 Distribution: experimental Urgency: low Maintainer: Loic Minier l...@dooz.org Changed-By: Sebastian Dröge sl...@debian.org Description: libgio-fam - GLib Input, Output and Streaming Library (fam module) libglib2.0-0 - The GLib library of C routines libglib2.0-0-dbg - The GLib libraries and debugging symbols libglib2.0-0-refdbg - The GLib library of C routines - refdbg library libglib2.0-bin - The programs for the GLib library libglib2.0-data - Common files for GLib library libglib2.0-dev - Development files for the GLib library libglib2.0-doc - Documentation files for the GLib library libglib2.0-udeb - The GLib library of C routines - minimal runtime (udeb) Closes: 592024 599743 Changes: glib2.0 (2.27.1-1) experimental; urgency=low . [ Josselin Mouette ] * Drop lynx dependency in the -doc package. Suggest devhelp instead. Closes: #599743. . [ Sebastian Dröge ] * New upstream development release: + debian/patches/70_fix-header-cleaup-fallout.patch: - Dropped, merged upstream. + debian/patches/*: - Refreshed. +
Bug#601760: Does not work with new Xapian libs
Package: fuss-launcher Version: 0.4-1 Severity: serious Hello, fuss-launcher does not work with python-xapian currently in squeeze. Trying to search anything gives no reply and this on stderr: Traceback (most recent call last): File /usr/lib/pymodules/python2.6/fusslauncher/ui.py, line 529, in update_filter desktops = [x[1] for x in self.engine.documents()] File /usr/lib/pymodules/python2.6/fusslauncher/engine.py, line 348, in documents for score, doc in self.db.documents(first, count): File /usr/lib/pymodules/python2.6/fusslauncher/engine.py, line 189, in documents score = m[xapian.MSET_PERCENT] TypeError: 'MSetItem' object does not support indexing I'll now prepare an updated version which uses the new Python Xapian API. Ciao, Enrico -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages fuss-launcher depends on: ii app-install-data2010.08.21 Application Installer Data Files ii apt-xapian-index0.40 maintenance and search tools for a ii python 2.6.6-3+squeeze1 interactive high-level object-orie ii python-gconf2.28.1-1 Python bindings for the GConf conf ii python-gtk2 2.17.0-4 Python bindings for the GTK+ widge ii python-support 1.0.10 automated rebuilding support for P ii python-xapian 1.2.3-3 Xapian search engine interface for ii python-xdg 0.19-2 Python library to access freedeskt fuss-launcher recommends no packages. fuss-launcher suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601762: freeimage: hardcodes arch-specific values from i386
Package: freeimage Version: 3.10.0-2 Severity: grave Source/LibTIFF/tif_config.h has: #define SIZEOF_LONG 4 tif_config.h is generated by tiff's configure script, and as such is arch-specific. Cheers, Julien signature.asc Description: Digital signature
Bug#601760: marked as done (Does not work with new Xapian libs)
Your message dated Fri, 29 Oct 2010 11:32:07 + with message-id e1pbnbn-0001l1...@franck.debian.org and subject line Bug#601760: fixed in fuss-launcher 0.5-1 has caused the Debian Bug report #601760, regarding Does not work with new Xapian libs to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 601760: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601760 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: fuss-launcher Version: 0.4-1 Severity: serious Hello, fuss-launcher does not work with python-xapian currently in squeeze. Trying to search anything gives no reply and this on stderr: Traceback (most recent call last): File /usr/lib/pymodules/python2.6/fusslauncher/ui.py, line 529, in update_filter desktops = [x[1] for x in self.engine.documents()] File /usr/lib/pymodules/python2.6/fusslauncher/engine.py, line 348, in documents for score, doc in self.db.documents(first, count): File /usr/lib/pymodules/python2.6/fusslauncher/engine.py, line 189, in documents score = m[xapian.MSET_PERCENT] TypeError: 'MSetItem' object does not support indexing I'll now prepare an updated version which uses the new Python Xapian API. Ciao, Enrico -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages fuss-launcher depends on: ii app-install-data2010.08.21 Application Installer Data Files ii apt-xapian-index0.40 maintenance and search tools for a ii python 2.6.6-3+squeeze1 interactive high-level object-orie ii python-gconf2.28.1-1 Python bindings for the GConf conf ii python-gtk2 2.17.0-4 Python bindings for the GTK+ widge ii python-support 1.0.10 automated rebuilding support for P ii python-xapian 1.2.3-3 Xapian search engine interface for ii python-xdg 0.19-2 Python library to access freedeskt fuss-launcher recommends no packages. fuss-launcher suggests no packages. -- no debconf information ---End Message--- ---BeginMessage--- Source: fuss-launcher Source-Version: 0.5-1 We believe that the bug you reported is fixed in the latest version of fuss-launcher, which is due to be installed in the Debian FTP archive: fuss-launcher_0.5-1.diff.gz to main/f/fuss-launcher/fuss-launcher_0.5-1.diff.gz fuss-launcher_0.5-1.dsc to main/f/fuss-launcher/fuss-launcher_0.5-1.dsc fuss-launcher_0.5-1_all.deb to main/f/fuss-launcher/fuss-launcher_0.5-1_all.deb fuss-launcher_0.5.orig.tar.gz to main/f/fuss-launcher/fuss-launcher_0.5.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 601...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Enrico Zini enr...@debian.org (supplier of updated fuss-launcher package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 29 Oct 2010 12:55:13 +0200 Source: fuss-launcher Binary: fuss-launcher Architecture: source all Version: 0.5-1 Distribution: unstable Urgency: low Maintainer: Enrico Zini enr...@debian.org Changed-By: Enrico Zini enr...@debian.org Description: fuss-launcher - a simple application launcher Closes: 601760 Changes: fuss-launcher (0.5-1) unstable; urgency=low . * Port to new Xapian API. Closes: #601760 Checksums-Sha1: 71f75abe5a028768ed0302a48d04bf463b84fb09 1930 fuss-launcher_0.5-1.dsc 7b1b37e4766f564e016b6eecac8c4da4c8a8287c 27034 fuss-launcher_0.5.orig.tar.gz 206f80b1a31b5e50815287c1095021aa05afe7f2 3235 fuss-launcher_0.5-1.diff.gz ef46b94f8d2789c18ce7520a5f56efec52101faf 22136 fuss-launcher_0.5-1_all.deb Checksums-Sha256: 133ed6718d5b87ca50972fcf3f61c5c5600110c20cec038a44599a70be7fb312 1930 fuss-launcher_0.5-1.dsc 94e957c124d2ef32c0eb60b5fe97b42146c449a9bdd61728301878f16cb0b293 27034 fuss-launcher_0.5.orig.tar.gz 43ac9d73b997a115777d5a4e2d4740ffc5982740197cd2da715a9ac8fffcc6cd 3235 fuss-launcher_0.5-1.diff.gz
Bug#601685: libbsf-java: package does not support optional libs (as the description claims)
severity 601685 important On 29/10/10 06:17, tony mancill wrote: I've applied the patch and committed the update to the packaging repo. cool, thanks :) I'm not sure I agree with the severity - the current package isn't completely unusable, is it? (Your bug report says mostly useless.) Would severity important be more appropriate? oh, I picked that based on the fact that only 1/5 of the options are supported. after playing around with the package, i've found that this issue currently only affects js on java 5, so I guess important is better. (the other three libs are not supported by debian anyway, and js/bsf is included with java 6.) X -- GPG: 4096R/5FBBDBCE -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed (with 5 errors): Re: Bug#601685: libbsf-java: package does not support optional libs (as the description claims)
Processing commands for cont...@bugs.debian.org: severity 601685 important Bug #601685 [libbsf-java] libbsf-java: package does not support optional libs (as the description claims) Severity set to 'important' from 'grave' On 29/10/10 06:17, tony mancill wrote: Unknown command or malformed arguments to command. I've applied the patch and committed the update to the packaging repo. Unknown command or malformed arguments to command. cool, thanks :) Unknown command or malformed arguments to command. I'm not sure I agree with the severity - the current package isn't completely Unknown command or malformed arguments to command. unusable, is it? (Your bug report says mostly useless.) Would severity Unknown command or malformed arguments to command. Too many unknown commands, stopping here. Please contact me if you need assistance. -- 601685: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601685 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601768: does not configure during upgrade
Package: isdnutils-base Version: 1:3.9.20060704+dfsg.2-5 Severity: grave Hi. During upgrade and configure, the following happens: Setting up isdnutils-base (1:3.9.20060704+dfsg.2-5) ... dpkg: error processing isdnutils-base (--configure): subprocess installed post-installation script returned error exit status 30 dpkg: dependency problems prevent configuration of isdnlog: isdnlog depends on isdnutils-base (= 1:3.9.20060704+dfsg.2-5); however: Package isdnutils-base is not configured yet. dpkg: error processing isdnlog (--configure): dependency problems - leaving unconfigured dpkg: dependency problems prevent configuration of isdnvboxserver: isdnvboxserver depends on isdnutils-base (= 1:3.9.20060704+dfsg.2-5); however: Package isdnutils-base is not configured yet. dpkg: error processing isdnvboxserver (--configure): dependency problems - leaving unconfigured isdnutils-base isdnlog isdnvboxserver This is the same as bug 554537. Maybe reopen that old one and merge these two bugs? Grüße, Sven. -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (200, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.32.3-221 Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages isdnutils-base depends on: ii debconf [debconf-2.0] 1.5.36 Debian configuration management sy ii libc6 2.11.2-6 Embedded GNU C Library: Shared lib ii libncurses5 5.7+20100313-4 shared libraries for terminal hand ii lsb-base 3.2-26 Linux Standard Base 3.2 init scrip ii makedev 2.3.1-89 creates device files in /dev ii udev 164-1 /dev/ and hotplug management daemo isdnutils-base recommends no packages. Versions of packages isdnutils-base suggests: pn ipppdnone (no description available) pn isdnlog none (no description available) pn isdnutils-docnone (no description available) pn isdnutils-xtools none (no description available) ii isdnvboxclient 1:3.9.20060704+dfsg.2-5 ISDN utilities - answering machine pn isdnvboxserver none (no description available) -- debconf-show failed -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#553502: gdb'ing
Did apt-get source autolog make 1) could reproduce the problem with ./autolog -d -o 2) could NOT reproduce the problem with gdb --args ./autolog -d -o :-( Anything else I should do? -- Marcos Marado -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601768: does not configure during upgrade
severity 601768 normal thanks Sven, thank you for the bug report. I've only just taken over isdnutils with this release. There's still many things that need to be worked out in isdnutils and I'm sure there'll be more breakage before that's done. Please bear with me. I'll turn off abort on error again to allow for the upgrades to happen. I've put a small FIXME note in the maintenance scripts to remind Jan and me to fix this properly, pointing to this ticket. As such, I won't close this ticket although the upgrade breakage should be fixed with the next release, but the underlying issue isn't. I'll downgrade severity since it's no longer an RC bug. Regards Rolf -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#601768: does not configure during upgrade
Processing commands for cont...@bugs.debian.org: severity 601768 normal Bug #601768 [isdnutils-base] does not configure during upgrade Severity set to 'normal' from 'grave' thanks Stopping processing here. Please contact me if you need assistance. -- 601768: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601768 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601617: Installed into /lib, but depends on libraries from /usr/lib
On Oct 29, Julien Cristau jcris...@debian.org wrote: On Wed, Oct 27, 2010 at 23:02:23 +0200, Josselin Mouette wrote: Apparently libgpod-common is using libgobject too, in a binary run from udev rules. So that makes another reason for moving libgobject to /lib - maybe even in squeeze, if this is considered RC. There's no way we're moving all that crap to /lib... Agreed. At least for these programs the correct solution is to use wait_for_file in a wrapper, like /lib/udev/alsa-utils. Unless anybody has a better idea, in the next upload (is there any hurry?) I will move the library back to /usr for the time being. -- ciao, Marco signature.asc Description: Digital signature
Bug#601617: Installed into /lib, but depends on libraries from /usr/lib
On Wed, Oct 27, 2010 at 23:02:23 +0200, Josselin Mouette wrote: Apparently libgpod-common is using libgobject too, in a binary run from udev rules. So that makes another reason for moving libgobject to /lib - maybe even in squeeze, if this is considered RC. The way to fix that for squeeze would be to fix it in libgpod imo (to either not use this stuff from udev rules, or not use gobject), not in glib. /lib/udev/ipod-set-info and /lib/udev/iphone-set-info are utterly screwed up, and not just wrt glib: $ ldd /lib/udev/ipod-set-info |grep -c usr 17 $ ldd /lib/udev/iphone-set-info |grep -c usr 10 There's no way we're moving all that crap to /lib... Cheers, Julien signature.asc Description: Digital signature
Bug#385760: The dspam daemon should NOT be run by user dspam or default port needs to move
On Thu, Oct 28, 2010 at 06:45:52 +0200, Julien Valroff wrote: tags 385760 + pending thanks Le jeudi 28 oct. 2010 à 00:55:18 (+0200), Martin Zobel-Helas a écrit : Hi, Hi Martin, in the default configuration of dspam, if daemon gets enabled, the daemon wants to listen on tcp port 24. Starting dspam per default as user dspam then will just not work. Linux prevents direct “reserved port” assignments by any process other than system root. So you either let it run by root or fix the default port for this application. Interim-Solution: fix the init-script to blow up if user tries this. This is already fixed in git. The default port is now 1024. 1024 really doesn't sound like a good idea either, imo, there's every chance somebody else will choose the first non-privileged port for some other use. Cheers, Julien signature.asc Description: Digital signature
Bug#553502: gdb'ing
Hi On Fri, Oct 29, 2010 at 01:01:17PM +0100, Marcos Marado wrote: Did apt-get source autolog make 1) could reproduce the problem with ./autolog -d -o 2) could NOT reproduce the problem with gdb --args ./autolog -d -o :-( Anything else I should do? Same to me. I follow the instructions on http://wiki.debian.org/HowToGetABacktrace and https://wiki.ubuntu.com/Backtrace volatile:~# file /usr/sbin/autolog /usr/sbin/autolog: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.18, not stripped -- Luis http://eviled.org signature.asc Description: Digital signature
Bug#595559: marked as done (freeimage: should this package be orphaned?)
Your message dated Fri, 29 Oct 2010 13:32:12 + with message-id e1pbp40-00039v...@franck.debian.org and subject line Bug#595559: fixed in freeimage 3.10.0-3 has caused the Debian Bug report #595559, regarding freeimage: should this package be orphaned? to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 595559: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=595559 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: freeimage Version: 3.10.0-2 Severity: grave Hi, The package hasn't seen any upload since September last year and is six releases behind. Given that the package uses multiple embedded libraries, it needs to be actively maintained (it should use the system libraries too.) Unless somebody steps up to maintain it, it should probably be dropped from Squeeze. Cheers, -- Raphael Geissert - Debian Developer www.debian.org - get.debian.net ---End Message--- ---BeginMessage--- Source: freeimage Source-Version: 3.10.0-3 We believe that the bug you reported is fixed in the latest version of freeimage, which is due to be installed in the Debian FTP archive: freeimage_3.10.0-3.diff.gz to main/f/freeimage/freeimage_3.10.0-3.diff.gz freeimage_3.10.0-3.dsc to main/f/freeimage/freeimage_3.10.0-3.dsc libfreeimage-dev_3.10.0-3_amd64.deb to main/f/freeimage/libfreeimage-dev_3.10.0-3_amd64.deb libfreeimage3-dbg_3.10.0-3_amd64.deb to main/f/freeimage/libfreeimage3-dbg_3.10.0-3_amd64.deb libfreeimage3_3.10.0-3_amd64.deb to main/f/freeimage/libfreeimage3_3.10.0-3_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 595...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Julien Cristau jcris...@debian.org (supplier of updated freeimage package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 29 Oct 2010 14:46:46 +0200 Source: freeimage Binary: libfreeimage-dev libfreeimage3 libfreeimage3-dbg Architecture: source amd64 Version: 3.10.0-3 Distribution: unstable Urgency: low Maintainer: Debian QA Group packa...@qa.debian.org Changed-By: Julien Cristau jcris...@debian.org Description: libfreeimage-dev - Support library for graphics image formats (development files) libfreeimage3 - Support library for graphics image formats (library) libfreeimage3-dbg - Support library for graphics image formats (debugging symbols) Closes: 558857 595559 595560 601002 601762 Changes: freeimage (3.10.0-3) unstable; urgency=low . * Don't use embedded copies of various libraries, add build-deps on their packaged versions (closes: #595560): - libjpeg 6b - libmng 1.0.9 - libopenjpeg 1.2.0 - libpng 1.2.23 + CVE-2010-2249, CVE-2010-1205, CVE-2010-0205, CVE-2009-2042, CVE-2008-6218, CVE-2008-5907, CVE-2009-0040, CVE-2008-3964, CVE-2008-1382 - openexr 1.6.1 + CVE-2009-1720, CVE-2009-1721 - zlib 1.2.3 * The embedded libtiff copy is still used, because freeimage uses its internals and I couldn't figure out how to unentangle this. Update the tiff copy to 3.9.4-5, though: CVE-2010-3087, CVE-2010-2483, CVE-2010-2482, CVE-2010-2481, CVE-2010-2443, CVE-2010-2233, CVE-2010-2067, CVE-2010-2065, CVE-2010-1411, CVE-2009-2347, CVE-2008-2327. * Add tiff copyright and license to debian/copyright (closes: #601002) * Link with -lm (closes: #558857). * Try to avoid arch-specific values in our copy of tif_config.h and tiffconf.h (closes: #601762) * Set LFS CFLAGS in Makefile.gnu. * Orphan package (closes: #595559). Checksums-Sha1: 11e6b0d0e1eaf7413f64e1ce00e478006fd4cb81 1966 freeimage_3.10.0-3.dsc 542471c11ecc15facf712c218416d2a5a41b3335 535198 freeimage_3.10.0-3.diff.gz 0905735a7e997ed078f54f0d08064646b0261c8e 8057990 libfreeimage-dev_3.10.0-3_amd64.deb 078e561ca29d262f14a58e04a86109f725485ab0 801806 libfreeimage3_3.10.0-3_amd64.deb 39add70677607e057efc8dde26748dd51a2e5e44 2493874 libfreeimage3-dbg_3.10.0-3_amd64.deb Checksums-Sha256: c821fbdcb7662c8e26b4e9938f96444197af2e7069007451c54e9d6cd86180e2 1966 freeimage_3.10.0-3.dsc 948f293e48478b73124ad21d37c75036287dabf2344b42e528965930eb49f98b 535198 freeimage_3.10.0-3.diff.gz
Bug#595560: marked as done (freeimage: multiple vulnerabilities in embedded code copies)
Your message dated Fri, 29 Oct 2010 13:32:12 + with message-id e1pbp40-00039a...@franck.debian.org and subject line Bug#595560: fixed in freeimage 3.10.0-3 has caused the Debian Bug report #595560, regarding freeimage: multiple vulnerabilities in embedded code copies to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 595560: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=595560 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: freeimage Version: 3.10.0-1 Severity: grave Tags: security Hi, At least the tiff, libpng, and openexr embedded copies have multiple vulnerabilities each. You should refer to the following pages to determine what vulnerabilities affect freeimage: http://security-tracker.debian.org/tracker/source-package/libpng http://security-tracker.debian.org/tracker/source-package/tiff http://security-tracker.debian.org/tracker/source-package/openexr Regards, -- Raphael Geissert - Debian Developer www.debian.org - get.debian.net ---End Message--- ---BeginMessage--- Source: freeimage Source-Version: 3.10.0-3 We believe that the bug you reported is fixed in the latest version of freeimage, which is due to be installed in the Debian FTP archive: freeimage_3.10.0-3.diff.gz to main/f/freeimage/freeimage_3.10.0-3.diff.gz freeimage_3.10.0-3.dsc to main/f/freeimage/freeimage_3.10.0-3.dsc libfreeimage-dev_3.10.0-3_amd64.deb to main/f/freeimage/libfreeimage-dev_3.10.0-3_amd64.deb libfreeimage3-dbg_3.10.0-3_amd64.deb to main/f/freeimage/libfreeimage3-dbg_3.10.0-3_amd64.deb libfreeimage3_3.10.0-3_amd64.deb to main/f/freeimage/libfreeimage3_3.10.0-3_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 595...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Julien Cristau jcris...@debian.org (supplier of updated freeimage package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 29 Oct 2010 14:46:46 +0200 Source: freeimage Binary: libfreeimage-dev libfreeimage3 libfreeimage3-dbg Architecture: source amd64 Version: 3.10.0-3 Distribution: unstable Urgency: low Maintainer: Debian QA Group packa...@qa.debian.org Changed-By: Julien Cristau jcris...@debian.org Description: libfreeimage-dev - Support library for graphics image formats (development files) libfreeimage3 - Support library for graphics image formats (library) libfreeimage3-dbg - Support library for graphics image formats (debugging symbols) Closes: 558857 595559 595560 601002 601762 Changes: freeimage (3.10.0-3) unstable; urgency=low . * Don't use embedded copies of various libraries, add build-deps on their packaged versions (closes: #595560): - libjpeg 6b - libmng 1.0.9 - libopenjpeg 1.2.0 - libpng 1.2.23 + CVE-2010-2249, CVE-2010-1205, CVE-2010-0205, CVE-2009-2042, CVE-2008-6218, CVE-2008-5907, CVE-2009-0040, CVE-2008-3964, CVE-2008-1382 - openexr 1.6.1 + CVE-2009-1720, CVE-2009-1721 - zlib 1.2.3 * The embedded libtiff copy is still used, because freeimage uses its internals and I couldn't figure out how to unentangle this. Update the tiff copy to 3.9.4-5, though: CVE-2010-3087, CVE-2010-2483, CVE-2010-2482, CVE-2010-2481, CVE-2010-2443, CVE-2010-2233, CVE-2010-2067, CVE-2010-2065, CVE-2010-1411, CVE-2009-2347, CVE-2008-2327. * Add tiff copyright and license to debian/copyright (closes: #601002) * Link with -lm (closes: #558857). * Try to avoid arch-specific values in our copy of tif_config.h and tiffconf.h (closes: #601762) * Set LFS CFLAGS in Makefile.gnu. * Orphan package (closes: #595559). Checksums-Sha1: 11e6b0d0e1eaf7413f64e1ce00e478006fd4cb81 1966 freeimage_3.10.0-3.dsc 542471c11ecc15facf712c218416d2a5a41b3335 535198 freeimage_3.10.0-3.diff.gz 0905735a7e997ed078f54f0d08064646b0261c8e 8057990 libfreeimage-dev_3.10.0-3_amd64.deb 078e561ca29d262f14a58e04a86109f725485ab0 801806 libfreeimage3_3.10.0-3_amd64.deb 39add70677607e057efc8dde26748dd51a2e5e44 2493874 libfreeimage3-dbg_3.10.0-3_amd64.deb Checksums-Sha256: c821fbdcb7662c8e26b4e9938f96444197af2e7069007451c54e9d6cd86180e2 1966 freeimage_3.10.0-3.dsc
Bug#601002: marked as done (libfreeimage3: No mention of embedded libraries in copyright file)
Your message dated Fri, 29 Oct 2010 13:32:12 + with message-id e1pbp40-00039e...@franck.debian.org and subject line Bug#601002: fixed in freeimage 3.10.0-3 has caused the Debian Bug report #601002, regarding libfreeimage3: No mention of embedded libraries in copyright file to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 601002: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601002 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: libfreeimage3 Version: 3.10.0-2 Severity: serious Justification: Policy 12.5 Copyright Information Every package must be accompanied by a verbatim copy of its copyright information and distribution license in the file /usr/share/doc/package/copyright. FreeImage ships embedded copies of libjpeg, libmng, libopenjpeg, libpng, libtiff and openexr, but there is no mention of these works in the copyright file. -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (530, 'testing'), (520, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/4 CPU cores) Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages libfreeimage3 depends on: ii libc6 2.11.2-6 Embedded GNU C Library: Shared lib ii libgcc1 1:4.4.5-4 GCC support library ii libstdc++64.4.5-4The GNU Standard C++ Library v3 libfreeimage3 recommends no packages. libfreeimage3 suggests no packages. -- no debconf information ---End Message--- ---BeginMessage--- Source: freeimage Source-Version: 3.10.0-3 We believe that the bug you reported is fixed in the latest version of freeimage, which is due to be installed in the Debian FTP archive: freeimage_3.10.0-3.diff.gz to main/f/freeimage/freeimage_3.10.0-3.diff.gz freeimage_3.10.0-3.dsc to main/f/freeimage/freeimage_3.10.0-3.dsc libfreeimage-dev_3.10.0-3_amd64.deb to main/f/freeimage/libfreeimage-dev_3.10.0-3_amd64.deb libfreeimage3-dbg_3.10.0-3_amd64.deb to main/f/freeimage/libfreeimage3-dbg_3.10.0-3_amd64.deb libfreeimage3_3.10.0-3_amd64.deb to main/f/freeimage/libfreeimage3_3.10.0-3_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 601...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Julien Cristau jcris...@debian.org (supplier of updated freeimage package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 29 Oct 2010 14:46:46 +0200 Source: freeimage Binary: libfreeimage-dev libfreeimage3 libfreeimage3-dbg Architecture: source amd64 Version: 3.10.0-3 Distribution: unstable Urgency: low Maintainer: Debian QA Group packa...@qa.debian.org Changed-By: Julien Cristau jcris...@debian.org Description: libfreeimage-dev - Support library for graphics image formats (development files) libfreeimage3 - Support library for graphics image formats (library) libfreeimage3-dbg - Support library for graphics image formats (debugging symbols) Closes: 558857 595559 595560 601002 601762 Changes: freeimage (3.10.0-3) unstable; urgency=low . * Don't use embedded copies of various libraries, add build-deps on their packaged versions (closes: #595560): - libjpeg 6b - libmng 1.0.9 - libopenjpeg 1.2.0 - libpng 1.2.23 + CVE-2010-2249, CVE-2010-1205, CVE-2010-0205, CVE-2009-2042, CVE-2008-6218, CVE-2008-5907, CVE-2009-0040, CVE-2008-3964, CVE-2008-1382 - openexr 1.6.1 + CVE-2009-1720, CVE-2009-1721 - zlib 1.2.3 * The embedded libtiff copy is still used, because freeimage uses its internals and I couldn't figure out how to unentangle this. Update the tiff copy to 3.9.4-5, though: CVE-2010-3087, CVE-2010-2483, CVE-2010-2482, CVE-2010-2481, CVE-2010-2443, CVE-2010-2233, CVE-2010-2067, CVE-2010-2065, CVE-2010-1411, CVE-2009-2347, CVE-2008-2327. * Add tiff copyright and license to debian/copyright (closes: #601002) * Link with -lm (closes: #558857). * Try to avoid arch-specific values in our copy of tif_config.h and tiffconf.h (closes: #601762) * Set LFS CFLAGS in Makefile.gnu. * Orphan package
Bug#601762: marked as done (freeimage: hardcodes arch-specific values from i386)
Your message dated Fri, 29 Oct 2010 13:32:12 + with message-id e1pbp40-00039j...@franck.debian.org and subject line Bug#601762: fixed in freeimage 3.10.0-3 has caused the Debian Bug report #601762, regarding freeimage: hardcodes arch-specific values from i386 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 601762: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601762 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: freeimage Version: 3.10.0-2 Severity: grave Source/LibTIFF/tif_config.h has: #define SIZEOF_LONG 4 tif_config.h is generated by tiff's configure script, and as such is arch-specific. Cheers, Julien signature.asc Description: Digital signature ---End Message--- ---BeginMessage--- Source: freeimage Source-Version: 3.10.0-3 We believe that the bug you reported is fixed in the latest version of freeimage, which is due to be installed in the Debian FTP archive: freeimage_3.10.0-3.diff.gz to main/f/freeimage/freeimage_3.10.0-3.diff.gz freeimage_3.10.0-3.dsc to main/f/freeimage/freeimage_3.10.0-3.dsc libfreeimage-dev_3.10.0-3_amd64.deb to main/f/freeimage/libfreeimage-dev_3.10.0-3_amd64.deb libfreeimage3-dbg_3.10.0-3_amd64.deb to main/f/freeimage/libfreeimage3-dbg_3.10.0-3_amd64.deb libfreeimage3_3.10.0-3_amd64.deb to main/f/freeimage/libfreeimage3_3.10.0-3_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 601...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Julien Cristau jcris...@debian.org (supplier of updated freeimage package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 29 Oct 2010 14:46:46 +0200 Source: freeimage Binary: libfreeimage-dev libfreeimage3 libfreeimage3-dbg Architecture: source amd64 Version: 3.10.0-3 Distribution: unstable Urgency: low Maintainer: Debian QA Group packa...@qa.debian.org Changed-By: Julien Cristau jcris...@debian.org Description: libfreeimage-dev - Support library for graphics image formats (development files) libfreeimage3 - Support library for graphics image formats (library) libfreeimage3-dbg - Support library for graphics image formats (debugging symbols) Closes: 558857 595559 595560 601002 601762 Changes: freeimage (3.10.0-3) unstable; urgency=low . * Don't use embedded copies of various libraries, add build-deps on their packaged versions (closes: #595560): - libjpeg 6b - libmng 1.0.9 - libopenjpeg 1.2.0 - libpng 1.2.23 + CVE-2010-2249, CVE-2010-1205, CVE-2010-0205, CVE-2009-2042, CVE-2008-6218, CVE-2008-5907, CVE-2009-0040, CVE-2008-3964, CVE-2008-1382 - openexr 1.6.1 + CVE-2009-1720, CVE-2009-1721 - zlib 1.2.3 * The embedded libtiff copy is still used, because freeimage uses its internals and I couldn't figure out how to unentangle this. Update the tiff copy to 3.9.4-5, though: CVE-2010-3087, CVE-2010-2483, CVE-2010-2482, CVE-2010-2481, CVE-2010-2443, CVE-2010-2233, CVE-2010-2067, CVE-2010-2065, CVE-2010-1411, CVE-2009-2347, CVE-2008-2327. * Add tiff copyright and license to debian/copyright (closes: #601002) * Link with -lm (closes: #558857). * Try to avoid arch-specific values in our copy of tif_config.h and tiffconf.h (closes: #601762) * Set LFS CFLAGS in Makefile.gnu. * Orphan package (closes: #595559). Checksums-Sha1: 11e6b0d0e1eaf7413f64e1ce00e478006fd4cb81 1966 freeimage_3.10.0-3.dsc 542471c11ecc15facf712c218416d2a5a41b3335 535198 freeimage_3.10.0-3.diff.gz 0905735a7e997ed078f54f0d08064646b0261c8e 8057990 libfreeimage-dev_3.10.0-3_amd64.deb 078e561ca29d262f14a58e04a86109f725485ab0 801806 libfreeimage3_3.10.0-3_amd64.deb 39add70677607e057efc8dde26748dd51a2e5e44 2493874 libfreeimage3-dbg_3.10.0-3_amd64.deb Checksums-Sha256: c821fbdcb7662c8e26b4e9938f96444197af2e7069007451c54e9d6cd86180e2 1966 freeimage_3.10.0-3.dsc 948f293e48478b73124ad21d37c75036287dabf2344b42e528965930eb49f98b 535198 freeimage_3.10.0-3.diff.gz e726a8ec4bd0e3b09670205227f62570c32eb6901c3f8bd1ada955c272c36e56 8057990 libfreeimage-dev_3.10.0-3_amd64.deb 4b3e080935314281761855e9359799713eda765d07b868334aad1bf78d6ce814 801806 libfreeimage3_3.10.0-3_amd64.deb
Bug#601712: salome: FTBFS due to missing graphviz
tags 601712 pending thanks This is now fixed in alioth. I'll upload in a week or when NETGEN meshing is working, whichever comes first. -Adam On Thu, 2010-10-28 at 16:49 -0400, Adam C Powell IV wrote: Package: src:salome Version: 5.1.3-11 Severity: serious Because graphviz is only Build-Depends-Indep and not Build-Depends, dot is missing, so YACS thinks libgraphviz-dev is missing, and doesn't set GRAPHVIZ_CPPFLAGS, and the build fails when trying to #include gvc.h . -Adam -- GPG fingerprint: D54D 1AEE B11C CE9B A02B C5DD 526F 01E8 564E E4B6 Engineering consulting with open source tools http://www.opennovation.com/ signature.asc Description: This is a digitally signed message part
Bug#553502: autolog: a segfault patch
Package: autolog Severity: normal Hi, I could get a segfault by simply running './autolog -d -o', even by running './autolog -d -o -n' which does not even try to kill processes... So I don't know if this is the same case as the original submitter as I didn't have to wait for any warning before getting the segfault. Anyway, you will find a patch that fixes the one I found. About the bug: Basically it parses (using strtok by the way) the output of a ps command line by line. The line buffer has a size of 256 bytes so if the output line of ps is longer than that, it get parsed as the next line and it will of course not parse correctly. For some reasons, when ran from gdb, the ps command limits its output to 80 chars as if ps was run in a terminal, so it does not segfault ;) The patch simply read the line until it finds the ending \n so that the parser will not segfault. (by the way as the config file allows the change the ps command, the parser should probably be written in a safer way...) Regards, Julien Vdg -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores) Locale: LANG=fr_FR.utf8, LC_CTYPE=fr_FR.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash diff -au autolog-0.40.orig/autolog.c autolog-0.40/autolog.c --- autolog-0.40.orig/autolog.c 2010-10-29 16:15:11.0 +0200 +++ autolog-0.40/autolog.c 2010-10-29 16:14:27.0 +0200 @@ -1082,6 +1082,18 @@ } } } + /* Read to the end of line to avoid parsing the rest of the command + * line in next round and getting a segfault as ps_pid will be null!! + */ + i=strlen(iline); + while(iline[i-1] != '\n'){ + if(!fgets(iline, LINELEN, ps)) { + /* end of file, exit*/ + fclose(ps); + return; + } + i=strlen(iline); + } } fclose(ps); } Les sous-répertoires autolog-0.40.orig/debian et autolog-0.40/debian sont identiques. Les sous-répertoires autolog-0.40.orig/.pc et autolog-0.40/.pc sont identiques.
Processed: tagging 553502
Processing commands for cont...@bugs.debian.org: tags 553502 + patch Bug #553502 [autolog] autolog exits on Segmentation Fault Added tag(s) patch. thanks Stopping processing here. Please contact me if you need assistance. -- 553502: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=553502 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#601747: RDS protocol vulnerability
Processing commands for cont...@bugs.debian.org: tag 601747 + moreinfo Bug #601747 [linux-2.6] RDS protocol vulnerability Added tag(s) moreinfo. thanks Stopping processing here. Please contact me if you need assistance. -- 601747: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601747 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601747: RDS protocol vulnerability
tag 601747 + moreinfo thanks On Fri, 2010-10-29 at 18:07 +0900, Hideki Yamane wrote: Package: linux-2.6 Version: 2.6.32-26 You know, RDS protocol vulnerability was found in Linux kernel. US-Cert says (http://www.kb.cert.org/vuls/id/362983) The RDS protocol implementation of Linux kernels 2.6.30 through 2.6.38-rc8 contain a local privilege escalation vulnerability. Are you actually experiencing this in 2.6.32-26, or just assuming it's affected because the US-CERT page says it is? -26 is the upload which is intended *to fix* this issue; see the changelog and http://security-tracker.debian.org/tracker/CVE-2010-3904 Regards Adam -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601721: installation-reports: Build w/ /boot partition succeeds, but re-boot fails in fsck 445148
What I don't understand is that in squezze the fstab shows: /etc/fstab # /boot was on /dev/sda5 during installation UUID=dec79ed9-b96a-47e4-81f0-7e32735b5057 /boot ext2 defaults0 2 # /boot2 was on /dev/sdb1 during installation UUID=bb0512c5-6de6-4164-a7af-4312a4718ce3 /boot2 ext2 defaults0 2 Which means system figured out that the sda and sdb swapped, and used the UUID to mount the folders, but why am I still getting the fsck failed? Is that happening during boot, and fstab is not involved. If that's the case which file needs to be modified? I would figure that the same process that updated fstab would update the other file? (Is the other file a grub file or?) Thanks, Lucas -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#385760: The dspam daemon should NOT be run by user dspam or default port needs to move
Le vendredi 29 oct. 2010 à 15:02:37 (+0200), Julien Cristau a écrit : On Thu, Oct 28, 2010 at 06:45:52 +0200, Julien Valroff wrote: tags 385760 + pending thanks Le jeudi 28 oct. 2010 à 00:55:18 (+0200), Martin Zobel-Helas a écrit : Hi, Hi Martin, in the default configuration of dspam, if daemon gets enabled, the daemon wants to listen on tcp port 24. Starting dspam per default as user dspam then will just not work. Linux prevents direct “reserved port” assignments by any process other than system root. So you either let it run by root or fix the default port for this application. Interim-Solution: fix the init-script to blow up if user tries this. This is already fixed in git. The default port is now 1024. 1024 really doesn't sound like a good idea either, imo, there's every chance somebody else will choose the first non-privileged port for some other use. I can easily change this, what do you suggest? I also thought at 2424, what do you think? Cheers, Julien -- Julien Valroff jul...@kirya.net http://www.kirya.net GPG key: 1024D/9F71D449 17F4 93D8 746F F011 B845 9F91 210B F2AB 9F71 D449 signature.asc Description: Digital signature
Bug#601585: marked as done (weborf: DoS on malformed requests)
Your message dated Fri, 29 Oct 2010 15:32:06 + with message-id e1pbqw2-0005qa...@franck.debian.org and subject line Bug#601585: fixed in weborf 0.12.4-1 has caused the Debian Bug report #601585, regarding weborf: DoS on malformed requests to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 601585: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601585 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: weborf Version: 0.12.3-1 Severity: grave Tags: security upstream Justification: user security hole Example of exploit here: https://galileo.dmi.unict.it/wiki/weborf/doku.php?id=news:released_0.12.4 -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (990, 'unstable'), (500, 'experimental'), (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.35.7-calipso (SMP w/2 CPU cores; PREEMPT) Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages weborf depends on: ii libc6 2.11.2-6 Embedded GNU C Library: Shared lib weborf recommends no packages. Versions of packages weborf suggests: ii php5-cgi 5.3.3-2server-side, HTML-embedded scripti -- no debconf information ---End Message--- ---BeginMessage--- Source: weborf Source-Version: 0.12.4-1 We believe that the bug you reported is fixed in the latest version of weborf, which is due to be installed in the Debian FTP archive: weborf-daemon_0.12.4-1_all.deb to main/w/weborf/weborf-daemon_0.12.4-1_all.deb weborf_0.12.4-1.debian.tar.gz to main/w/weborf/weborf_0.12.4-1.debian.tar.gz weborf_0.12.4-1.dsc to main/w/weborf/weborf_0.12.4-1.dsc weborf_0.12.4-1_i386.deb to main/w/weborf/weborf_0.12.4-1_i386.deb weborf_0.12.4.orig.tar.gz to main/w/weborf/weborf_0.12.4.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 601...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Salvo 'LtWorf' Tomaselli tipos...@tiscali.it (supplier of updated weborf package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 27 Oct 2010 16:01:35 +0200 Source: weborf Binary: weborf weborf-daemon Architecture: source i386 all Version: 0.12.4-1 Distribution: unstable Urgency: high Maintainer: Salvo 'LtWorf' Tomaselli tipos...@tiscali.it Changed-By: Salvo 'LtWorf' Tomaselli tipos...@tiscali.it Description: weborf - Fast and small webserver meant to be run without root privileges weborf-daemon - init script for weborf Closes: 601585 Changes: weborf (0.12.4-1) unstable; urgency=high . * New upstream release * Fixes DoS (Closes: #601585) Checksums-Sha1: b61b8fb471ad9a798dac982ee3b426e06224ce61 1049 weborf_0.12.4-1.dsc f038df807997dc0d68f549cc325a1bb2c1a50706 58220 weborf_0.12.4.orig.tar.gz 81227144537870ff4ac9b711ad989eb49238f226 3429 weborf_0.12.4-1.debian.tar.gz 5c110fd90a98eee5b6095d02a1a6441bb197ae62 28098 weborf_0.12.4-1_i386.deb f1892468627b91f30924ef9d3c92fe25ece51893 10208 weborf-daemon_0.12.4-1_all.deb Checksums-Sha256: 70c8187678a06b6cc5d8da51a85c47dd9478a7b6002876a1e387a423c5b6748e 1049 weborf_0.12.4-1.dsc 084bed0e9a19fa76b7ad85e51530d0a4ccd554306dcfb048d311abbd8d96 58220 weborf_0.12.4.orig.tar.gz d63e3053b69cde0565ebe4612a0b5e1da3f5c478b940a73f92bae54f32a3ebe8 3429 weborf_0.12.4-1.debian.tar.gz ab2a3a423be3d3147370e24156e2ffdc5613331de611b962f10c2aecc05aa94a 28098 weborf_0.12.4-1_i386.deb c41cb4c1f0c238acbbfa0eea871e133f7dd8f81be85e4ef980be4f2942561733 10208 weborf-daemon_0.12.4-1_all.deb Files: dba90b68ee3bad2c0b10ba8f4947e968 1049 httpd optional weborf_0.12.4-1.dsc c6932626d9a477da004345332f5fd896 58220 httpd optional weborf_0.12.4.orig.tar.gz 742cbd17063365a03ae29bb7b57f053f 3429 httpd optional weborf_0.12.4-1.debian.tar.gz 044c223870ef1d76a186714f14700255 28098 httpd optional weborf_0.12.4-1_i386.deb 339a08da53ab12e5a5b7a6e989130236 10208 httpd optional weborf-daemon_0.12.4-1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAkzK540ACgkQ5qqQFxOSsXS+4wCeKDGcUHN/6Rjrk8WV1i4ZJRyX KEgAnivLN8hLGnb51crGuZFnDQcDXAJ9 =CFgr -END PGP SIGNATURE- ---End Message---
Bug#601721: installation-reports: Build w/ /boot partition succeeds, but re-boot fails in fsck 445148
It seems like Grub.cfg is also using proper drive by UUID. menuentry 'Debian GNU/Linux, with Linux 2.6.32-5-amd64' --class debian --class gnu-linux --class gnu --class os { insmod part_msdos insmod ext2 set root='(hd0,msdos5)' search --no-floppy --fs-uuid --set dec79ed9-b96a-47e4-81f0-7e32735b5057 echo'Loading Linux 2.6.32-5-amd64 ...' linux /vmlinuz-2.6.32-5-amd64 root=/dev/mapper/-root ro quiet echo'Loading initial ramdisk ...' initrd /initrd.img-2.6.32-5-amd64 But somewhere in a boot process system shows: FSCK from Util-Linux-ng 2.17.2 unable to resolve UUID=.5b5057 (I'm not sure which log after start it would be in :) It seems as the after system is starting to load the UUID is not resolved and /dev/sda and /dev/sdb get loaded incorrectly ? Thanks, Lucas On Fri, Oct 29, 2010 at 10:10 AM, Lukasz Szybalski szybal...@gmail.com wrote: What I don't understand is that in squezze the fstab shows: /etc/fstab # /boot was on /dev/sda5 during installation UUID=dec79ed9-b96a-47e4-81f0-7e32735b5057 /boot ext2 defaults 0 2 # /boot2 was on /dev/sdb1 during installation UUID=bb0512c5-6de6-4164-a7af-4312a4718ce3 /boot2 ext2 defaults 0 2 Which means system figured out that the sda and sdb swapped, and used the UUID to mount the folders, but why am I still getting the fsck failed? Is that happening during boot, and fstab is not involved. If that's the case which file needs to be modified? I would figure that the same process that updated fstab would update the other file? (Is the other file a grub file or?) Thanks, Lucas -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601386: dup of #451659?
Version: 2.0.7-1 This looks like a duplicate of #451659 which was fixed in 2.0.7-1, so I'm closing as such. Feel free to reopen if this is still reproducible with newer versions. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601386: marked as done (nano corrupts script files)
Your message dated Fri, 29 Oct 2010 10:29:37 -0600 with message-id 20101029162936.ga29...@dannf.org and subject line dup of #451659? has caused the Debian Bug report #601386, regarding nano corrupts script files to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 601386: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601386 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: nano Version: 2.0.2-1etch1 Severity: critical This breaks some systems using some scripts edited by nano. Apologies if critical is wrong - I didn't want to use it but it fits your definition ... +++-==-==- ii nano 2.0.2-1etch1 free Pico clone with some new features No error messages logged. TO REPRODUCE: Use nano to edit the script named before. Edit as follows: Insert one space as the first character of the file. Delete that space. Exit and save. The resulting file has been named after. output of diff is also included. before runs and gives output as required. after just seems not to run. Cheers. Chris Cowsley Head of ICT Hitchin Boys' School drcows...@ntlworld.com nano-bug.tar.gz Description: application/compressed-tar ---End Message--- ---BeginMessage--- Version: 2.0.7-1 This looks like a duplicate of #451659 which was fixed in 2.0.7-1, so I'm closing as such. Feel free to reopen if this is still reproducible with newer versions. ---End Message---
Bug#601786: ia32-sun-java6-bin: When the ia32 java is run to fails due to a syntax error with ( unexpected.
Package: ia32-sun-java6-bin Version: 6.22-1 Severity: grave Justification: renders package unusable I'm running a 64-bit system but I have an application that needs the 32-bit java. This application fails. When I run java -version I get ./java: 1: Syntax error: ( unexpected returned. The 64-bit java runs fine. An strace of running java -version follows: execve(/usr/bin/sudo, [sudo, /usr/lib/jvm/ia32-java-6-sun-1.6..., -version], [/* 16 vars */]) = 0 brk(0) = 0xc4b000 access(/etc/ld.so.nohwcap, F_OK) = -1 ENOENT (No such file or directory) mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f1dc1d3f000 access(/etc/ld.so.preload, R_OK) = -1 ENOENT (No such file or directory) open(/etc/ld.so.cache, O_RDONLY) = 3 fstat(3, {st_mode=S_IFREG|0644, st_size=106553, ...}) = 0 mmap(NULL, 106553, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7f1dc1d24000 close(3)= 0 access(/etc/ld.so.nohwcap, F_OK) = -1 ENOENT (No such file or directory) open(/lib/libutil.so.1, O_RDONLY) = 3 read(3, \177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\0\1\0\0\0\20\16\0\0\0\0\0\0..., 832) = 832 fstat(3, {st_mode=S_IFREG|0644, st_size=10648, ...}) = 0 mmap(NULL, 2105608, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f1dc1921000 mprotect(0x7f1dc1923000, 2093056, PROT_NONE) = 0 mmap(0x7f1dc1b22000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1000) = 0x7f1dc1b22000 close(3)= 0 access(/etc/ld.so.nohwcap, F_OK) = -1 ENOENT (No such file or directory) open(/lib/libpam.so.0, O_RDONLY) = 3 read(3, \177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\0\1\0\0\0\200%\0\0\0\0\0\0..., 832) = 832 fstat(3, {st_mode=S_IFREG|0644, st_size=49728, ...}) = 0 mmap(NULL, 2144864, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f1dc1715000 mprotect(0x7f1dc1721000, 2093056, PROT_NONE) = 0 mmap(0x7f1dc192, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xb000) = 0x7f1dc192 close(3)= 0 access(/etc/ld.so.nohwcap, F_OK) = -1 ENOENT (No such file or directory) open(/lib/libdl.so.2, O_RDONLY) = 3 read(3, \177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\0\1\0\0\0\340\r\0\0\0\0\0\0..., 832) = 832 fstat(3, {st_mode=S_IFREG|0644, st_size=14696, ...}) = 0 mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f1dc1d23000 mmap(NULL, 2109696, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f1dc1511000 mprotect(0x7f1dc1513000, 2097152, PROT_NONE) = 0 mmap(0x7f1dc1713000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0x7f1dc1713000 close(3)= 0 access(/etc/ld.so.nohwcap, F_OK) = -1 ENOENT (No such file or directory) open(/lib/libc.so.6, O_RDONLY)= 3 read(3, \177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\0\1\0\0\0`\355\1\0\0\0\0\0..., 832) = 832 fstat(3, {st_mode=S_IFREG|0755, st_size=1432968, ...}) = 0 mmap(NULL, 3541032, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f1dc11b mprotect(0x7f1dc1308000, 2093056, PROT_NONE) = 0 mmap(0x7f1dc1507000, 20480, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x157000) = 0x7f1dc1507000 mmap(0x7f1dc150c000, 18472, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f1dc150c000 close(3)= 0 access(/etc/ld.so.nohwcap, F_OK) = -1 ENOENT (No such file or directory) open(/lib/libcrypt.so.1, O_RDONLY)= 3 read(3, \177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\0\1\0\0\0P\n\0\0\0\0\0\0..., 832) = 832 fstat(3, {st_mode=S_IFREG|0644, st_size=35104, ...}) = 0 mmap(NULL, 2318784, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f1dc0f79000 mprotect(0x7f1dc0f81000, 2093056, PROT_NONE) = 0 mmap(0x7f1dc118, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x7000) = 0x7f1dc118 mmap(0x7f1dc1182000, 184768, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f1dc1182000 close(3)= 0 mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f1dc1d22000 mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f1dc1d21000 mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f1dc1d2 arch_prctl(ARCH_SET_FS, 0x7f1dc1d21700) = 0 mprotect(0x7f1dc118, 4096, PROT_READ) = 0 mprotect(0x7f1dc1507000, 16384, PROT_READ) = 0 mprotect(0x7f1dc1713000, 4096, PROT_READ) = 0 mprotect(0x7f1dc1b22000, 4096, PROT_READ) = 0 mprotect(0x7f1dc1d41000, 4096, PROT_READ) = 0 munmap(0x7f1dc1d24000, 106553) = 0 brk(0) = 0xc4b000 brk(0xc6c000) = 0xc6c000 open(/usr/lib/locale/locale-archive, O_RDONLY) = 3 fstat(3, {st_mode=S_IFREG|0644, st_size=1527584, ...}) = 0 mmap(NULL, 1527584, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7f1dc1bab000 close(3)
Bug#600916: can't reproduce
Hi there, I tested this and I wasn't able to see any problem. The differences: 1) some of my packages are more recent than yourse (all from squeeze, so an aptitude upgrade should put you with the same package versions as me); 2) I'm at i686, the problem might be affecting amd64. Best regards, -- Marcos Marado -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601721: installation-reports: Build w/ /boot partition succeeds, but re-boot fails in fsck 445148
On Fri, Oct 29, 2010 at 11:08:59AM -0500, Lukasz Szybalski wrote: It seems like Grub.cfg is also using proper drive by UUID. menuentry 'Debian GNU/Linux, with Linux 2.6.32-5-amd64' --class debian --class gnu-linux --class gnu --class os { insmod part_msdos insmod ext2 set root='(hd0,msdos5)' search --no-floppy --fs-uuid --set dec79ed9-b96a-47e4-81f0-7e32735b5057 echo'Loading Linux 2.6.32-5-amd64 ...' linux /vmlinuz-2.6.32-5-amd64 root=/dev/mapper/-root ro quiet echo'Loading initial ramdisk ...' initrd /initrd.img-2.6.32-5-amd64 But somewhere in a boot process system shows: FSCK from Util-Linux-ng 2.17.2 unable to resolve UUID=.5b5057 (I'm not sure which log after start it would be in :) It seems as the after system is starting to load the UUID is not resolved and /dev/sda and /dev/sdb get loaded incorrectly ? fsck uses /etc/fstab. Now my fstab has entries of UUID=xxx-xxx-xxx (no quotes). Perhaps that is the problem. It appears yours has quotes. -- Len Sorensen -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: change severity
Processing commands for cont...@bugs.debian.org: severity 568971 serious Bug #568971 [modemmanager] /usr/sbin/modem-manager: modem manager rapidly fills up daemon.log Severity set to 'serious' from 'important' thanks Stopping processing here. Please contact me if you need assistance. -- 568971: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=568971 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601721: installation-reports: Build w/ /boot partition succeeds, but re-boot fails in fsck 445148
On Fri, Oct 29, 2010 at 12:01 PM, Lennart Sorensen lsore...@csclub.uwaterloo.ca wrote: On Fri, Oct 29, 2010 at 11:08:59AM -0500, Lukasz Szybalski wrote: It seems like Grub.cfg is also using proper drive by UUID. menuentry 'Debian GNU/Linux, with Linux 2.6.32-5-amd64' --class debian --class gnu-linux --class gnu --class os { insmod part_msdos insmod ext2 set root='(hd0,msdos5)' search --no-floppy --fs-uuid --set dec79ed9-b96a-47e4-81f0-7e32735b5057 echo 'Loading Linux 2.6.32-5-amd64 ...' linux /vmlinuz-2.6.32-5-amd64 root=/dev/mapper/-root ro quiet echo 'Loading initial ramdisk ...' initrd /initrd.img-2.6.32-5-amd64 But somewhere in a boot process system shows: FSCK from Util-Linux-ng 2.17.2 unable to resolve UUID=.5b5057 (I'm not sure which log after start it would be in :) It seems as the after system is starting to load the UUID is not resolved and /dev/sda and /dev/sdb get loaded incorrectly ? fsck uses /etc/fstab. Now my fstab has entries of UUID=xxx-xxx-xxx (no quotes). Perhaps that is the problem. It appears yours has quotes. It does not. That was my typo, sorry: /etc/fstab /boot was on /dev/sda5 during installation UUID=dec79ed9-b96a-47e4-81f0-7e32735b5057 /boot ext2 defaults0 2 # /boot2 was on /dev/sdb1 during installation UUID=bb0512c5-6de6-4164-a7af-4312a4718ce3 /boot2 ext2 defaults0 2 The temporary solution right now is to change the option (pass) from 2 to 0. Not sure what that does other then checks the FS for corruption at boot. This will make sure server starts and loads all the services. UUID=dec79ed9-b96a-47e4-81f0-7e32735b5057 /boot ext2 defaults0 0 Thanks, Lucas -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#574219: Intent to NMU (dict-xdict: package removal fails)
This bug seems to be a candidate for NMU. I have some free time and I am offering to help fix it. Please let me know if this bug is already been worked on or if it's okay to NMU the package. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#598305: marked as done (teamspeak-server: CVE-2010-3383: insecure library loading)
Your message dated Fri, 29 Oct 2010 19:32:07 + with message-id e1pbugj-0008va...@franck.debian.org and subject line Bug#598305: fixed in teamspeak-server 2.0.24.1+debian-1.1 has caused the Debian Bug report #598305, regarding teamspeak-server: CVE-2010-3383: insecure library loading to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 598305: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598305 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: teamspeak-server Version: 2.0.24.1+debian-1 Severity: grave Tags: security User: t...@security.debian.org Usertags: ldpath Hello, During a review of the Debian archive, I've found your package to contain a script that can be abused by an attacker to execute arbitrary code. The vulnerability is introduced by an insecure change to LD_LIBRARY_PATH, and environment variable used by ld.so(8) to look for libraries on a directory other than the standard paths. Vulnerable code follows: /usr/bin/teamspeak-server line 5: export LD_LIBRARY_PATH=/usr/lib/teamspeak-server:$LD_LIBRARY_PATH When there's an empty item on the colon-separated list of LD_LIBRARY_PATH, ld.so treats it as '.' (i.e. CWD/$PWD.) If the given script is executed from a directory where a potential, local, attacker can write files to, there's a chance to exploit this bug. This vulnerability has been assigned the CVE id CVE-2010-3383. Please make sure you mention it when forwarding this report to upstream and when fixing this bug (everywhere: upstream and here at Debian.) [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3383 [1] http://security-tracker.debian.org/tracker/CVE-2010-3383 Sincerely, Raphael Geissert ---End Message--- ---BeginMessage--- Source: teamspeak-server Source-Version: 2.0.24.1+debian-1.1 We believe that the bug you reported is fixed in the latest version of teamspeak-server, which is due to be installed in the Debian FTP archive: teamspeak-server_2.0.24.1+debian-1.1.diff.gz to non-free/t/teamspeak-server/teamspeak-server_2.0.24.1+debian-1.1.diff.gz teamspeak-server_2.0.24.1+debian-1.1.dsc to non-free/t/teamspeak-server/teamspeak-server_2.0.24.1+debian-1.1.dsc teamspeak-server_2.0.24.1+debian-1.1_i386.deb to non-free/t/teamspeak-server/teamspeak-server_2.0.24.1+debian-1.1_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 598...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Etienne Millon etienne.mil...@gmail.com (supplier of updated teamspeak-server package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sun, 24 Oct 2010 20:02:31 +0200 Source: teamspeak-server Binary: teamspeak-server Architecture: source i386 Version: 2.0.24.1+debian-1.1 Distribution: unstable Urgency: high Maintainer: Adam Cécile (Le_Vert) gand...@le-vert.net Changed-By: Etienne Millon etienne.mil...@gmail.com Description: teamspeak-server - VoIP chat for online gaming (server) Closes: 598305 Changes: teamspeak-server (2.0.24.1+debian-1.1) unstable; urgency=high . * Non-maintainer upload. * debian/teamspeak-server.wrapper - Fix security issue CVE-2010-3383 (grave, security; Closes: #598305) - Proper quoting of $@ (thanks to Jari Aalto jari.aa...@cante.net) Checksums-Sha1: a83796adb6e5662b9b2faa95964146d113a05b0c 1794 teamspeak-server_2.0.24.1+debian-1.1.dsc a4079d43648673ffef78f71538e0bd61716da6f3 15495 teamspeak-server_2.0.24.1+debian-1.1.diff.gz 23a5a98617d98ceff90b976282a5b1292c127064 1097688 teamspeak-server_2.0.24.1+debian-1.1_i386.deb Checksums-Sha256: ee7247092104822ad63330c94b16c03c507a7ed66265a089bbf0e7a1d9c9ed40 1794 teamspeak-server_2.0.24.1+debian-1.1.dsc bdafee076bfecfb6f5da0f0b7b431cdc9dd625a7cec18b0e4c6c1bf4fe389061 15495 teamspeak-server_2.0.24.1+debian-1.1.diff.gz b726e54c8752567124c2fae2138a258f66f0412fd17ff285c08a7bdb59c5e754 1097688 teamspeak-server_2.0.24.1+debian-1.1_i386.deb Files: 71563fbfcb19b1a3435bddda2c6fe842 1794 non-free/net optional teamspeak-server_2.0.24.1+debian-1.1.dsc d00f33517ad0c28ecd9fdb6ca8c48dae 15495 non-free/net optional teamspeak-server_2.0.24.1+debian-1.1.diff.gz ffd9ae551f87916bbb26ba30cff893e3 1097688 non-free/net optional
Bug#599937: mysql-5.1: 5.1.51 fixes several vulnerabilities
tags 599937 patch thanks On Tue, Oct 12, 2010 at 05:56:38PM +0200, Moritz Muehlenhoff wrote: Package: mysql-5.1 Severity: grave Tags: security Justification: user security hole 5.1.51 fixes eight security issues. It has already been uploaded to experimental, so depending on the amount and quality of changes it needs to be checked whether this version shold be uploaded to Squeeze or fixes need to be cherry-picked: Patch against 5.1.49 attached. Cheers, Moritz diff -Naur mysql-5.1-5.1.49.orig//mysql-test/r/func_gconcat.result mysql-5.1-5.1.49/mysql-test/r/func_gconcat.result --- mysql-5.1-5.1.49.orig//mysql-test/r/func_gconcat.result 2010-07-09 15:02:55.0 +0200 +++ mysql-5.1-5.1.49/mysql-test/r/func_gconcat.result 2010-10-29 21:52:45.0 +0200 @@ -995,6 +995,7 @@ 1 1 DROP TABLE t1; +End of 5.0 tests # # Bug #52397: another crash with explain extended and group_concat # @@ -1010,4 +1011,22 @@ Warnings: Note 1003 select 1 AS `1` from (select group_concat(`test`.`t1`.`a` order by `test`.`t1`.`a` ASC separator ',') AS `GROUP_CONCAT(t1.a ORDER BY t1.a ASC)` from `test`.`t1` `t2` join `test`.`t1` group by `test`.`t1`.`a`) `d` DROP TABLE t1; -End of 5.0 tests +# +# Bug #54476: crash when group_concat and 'with rollup' in prepared statements +# +CREATE TABLE t1 (a INT); +INSERT INTO t1 VALUES (1), (2); +PREPARE stmt FROM SELECT GROUP_CONCAT(t1.a ORDER BY t1.a) FROM t1 JOIN t1 t2 GROUP BY t1.a WITH ROLLUP; +EXECUTE stmt; +GROUP_CONCAT(t1.a ORDER BY t1.a) +1,1 +2,2 +1,1,2,2 +EXECUTE stmt; +GROUP_CONCAT(t1.a ORDER BY t1.a) +1,1 +2,2 +1,1,2,2 +DEALLOCATE PREPARE stmt; +DROP TABLE t1; +End of 5.1 tests diff -Naur mysql-5.1-5.1.49.orig//mysql-test/r/func_misc.result mysql-5.1-5.1.49/mysql-test/r/func_misc.result --- mysql-5.1-5.1.49.orig//mysql-test/r/func_misc.result 2010-07-09 15:02:55.0 +0200 +++ mysql-5.1-5.1.49/mysql-test/r/func_misc.result 2010-10-29 21:52:47.0 +0200 @@ -336,4 +336,19 @@ select connection_id() 0; connection_id() 0 1 +# +# Bug #54461: crash with longblob and union or update with subquery +# +CREATE TABLE t1 (a INT, b LONGBLOB); +INSERT INTO t1 VALUES (1, '2'), (2, '3'), (3, '2'); +SELECT DISTINCT LEAST(a, (SELECT b FROM t1 LIMIT 1)) FROM t1 UNION SELECT 1; +LEAST(a, (SELECT b FROM t1 LIMIT 1)) +1 +2 +SELECT DISTINCT GREATEST(a, (SELECT b FROM t1 LIMIT 1)) FROM t1 UNION SELECT 1; +GREATEST(a, (SELECT b FROM t1 LIMIT 1)) +2 +3 +1 +DROP TABLE t1; End of tests diff -Naur mysql-5.1-5.1.49.orig//mysql-test/r/join.result mysql-5.1-5.1.49/mysql-test/r/join.result --- mysql-5.1-5.1.49.orig//mysql-test/r/join.result 2010-07-09 15:03:00.0 +0200 +++ mysql-5.1-5.1.49/mysql-test/r/join.result 2010-10-29 21:52:39.0 +0200 @@ -1184,4 +1184,55 @@ NULL 1 DROP TABLE t1, t2, mm1; +# +# Bug #55568: user variable assignments crash server when used within +# query +# +CREATE TABLE t1 (a INT); +INSERT INTO t1 VALUES (0), (1); +SELECT MULTIPOINT( +1, +( +SELECT MULTIPOINT( +MULTIPOINT( +1, +(SELECT COUNT(*) FROM (SELECT 1 FROM t1 GROUP BY a,a) d) +) +) FROM t1 +) +) != COUNT(*) q FROM t1 GROUP BY a; +q +NULL +NULL +SELECT MULTIPOINT( +1, +( +SELECT MULTIPOINT( +MULTIPOINT( +1, +(SELECT COUNT(*) FROM (SELECT 1 FROM t1 GROUP BY a,a) d) +) +) FROM t1 +) +) != COUNT(*) q FROM t1 GROUP BY a; +q +NULL +NULL +DROP TABLE t1; +# +# Bug #54468: crash after item's print() function when ordering/grouping +# by subquery +# +CREATE TABLE t1(a INT, b INT); +INSERT INTO t1 VALUES (), (); +SELECT 1 FROM t1 +GROUP BY +GREATEST(t1.a, +(SELECT 1 FROM +(SELECT t1.b FROM t1,t1 t2 +ORDER BY t1.a, t1.a LIMIT 1) AS d) +); +1 +1 +DROP TABLE t1; End of 5.1 tests diff -Naur mysql-5.1-5.1.49.orig//mysql-test/r/user_var.result mysql-5.1-5.1.49/mysql-test/r/user_var.result --- mysql-5.1-5.1.49.orig//mysql-test/r/user_var.result 2010-07-09 15:03:13.0 +0200 +++ mysql-5.1-5.1.49/mysql-test/r/user_var.result 2010-10-29 21:52:42.0 +0200 @@ -430,4 +430,21 @@ INSERT INTO t1 VALUES (1); INSERT INTO t1 VALUES (1); DROP TABLE t1; +CREATE TABLE t1(a INT); +INSERT INTO t1 VALUES (0),(0); +# BUG#55615 : should not crash +SELECT (@a:=(SELECT @a:=1 FROM t1 LIMIT 1)) AND COUNT(1) FROM t1 GROUP BY @a; +(@a:=(SELECT @a:=1 FROM t1 LIMIT 1)) AND COUNT(1) +1 +1 +# BUG#55564 : should not crash +SELECT IF( +...@v:=LEAST((SELECT 1 FROM t1 t2 LEFT JOIN t1 ON (@v) GROUP BY t1.a), a), +count(*), 1) +FROM t1 GROUP BY a LIMIT 1; +IF( +...@v:=LEAST((SELECT 1 FROM t1 t2 LEFT JOIN t1 ON (@v) GROUP BY t1.a), a), +count(*), 1) +1 +DROP TABLE t1; End of 5.1 tests diff -Naur mysql-5.1-5.1.49.orig//mysql-test/suite/innodb/r/innodb_mysql.result mysql-5.1-5.1.49/mysql-test/suite/innodb/r/innodb_mysql.result --- mysql-5.1-5.1.49.orig//mysql-test/suite/innodb/r/innodb_mysql.result 2010-07-09 15:05:40.0 +0200 +++ mysql-5.1-5.1.49/mysql-test/suite/innodb/r/innodb_mysql.result 2010-10-29 21:52:36.0 +0200 @@ -2499,4 +2499,17 @@ id select_type table
Processed: Re: mysql-5.1: 5.1.51 fixes several vulnerabilities
Processing commands for cont...@bugs.debian.org: tags 599937 patch Bug #599937 [mysql-5.1] mysql-5.1: 5.1.51 fixes several vulnerabilities Added tag(s) patch. thanks Stopping processing here. Please contact me if you need assistance. -- 599937: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599937 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601700: exception bug occurring with libsqlite3-0 3.7.3-1
Package: monotone Version: 0.48-2 Severity: serious I noticed this error today, too. I'm not sure if it is caused by the libsqlite3-0 upgrade (which I did two days ago), because I no longer have the old package. Here is the debug log of running test-convert-mtn.t of the Mercurial test suite: beginning commit on branch 'com.selenic.test' Encountered an error while musing upon the following: database.cc:1495: detected database error, 'E(value)' violated Encountered an error while musing upon the following: migrate_schema.cc:105: detected system error, 'E(false)' violated Encountered an error while musing upon the following: botan_pipe_cache.hh:42: detected internal error, 'I(!pipe)' violated Encountered an error while musing upon the following: botan_pipe_cache.hh:42: detected internal error, 'I(!pipe)' violated Encountered an error while musing upon the following: botan_pipe_cache.hh:42: detected internal error, 'I(!pipe)' violated Encountered an error while musing upon the following: botan_pipe_cache.hh:42: detected internal error, 'I(!pipe)' violated Encountered an error while musing upon the following: botan_pipe_cache.hh:42: detected internal error, 'I(!pipe)' violated Encountered an error while musing upon the following: botan_pipe_cache.hh:42: detected internal error, 'I(!pipe)' violated Current work set: 4 items - begin 'system_flavour' (in virtual void sanity::initialize(int, char**, const char*), at sanity.cc:112) Linux 2.6.32-5-686 #1 SMP Tue Oct 19 14:40:34 UTC 2010 i686 - end 'system_flavour' (in virtual void sanity::initialize(int, char**, const char*), at sanity.cc:112) - begin 'cmdline_string' (in virtual void sanity::initialize(int, char**, const char*), at sanity.cc:126) 'mtn', 'ci', '-m', 'divergentdirmove2' - end 'cmdline_string' (in virtual void sanity::initialize(int, char**, const char*), at sanity.cc:126) - begin 'string(lc_all)' (in virtual void sanity::initialize(int, char**, const char*), at sanity.cc:131) C - end 'string(lc_all)' (in virtual void sanity::initialize(int, char**, const char*), at sanity.cc:131) - begin 'full_version_string' (in virtual void mtn_sanity::initialize(int, char**, const char*), at mtn-sanity.cc:32) monotone 0.48 (base revision: 844268c137aaa783aa800a9c16ae61edda80ecea) Running on : Linux 2.6.32-5-686 #1 SMP Tue Oct 19 14:40:34 UTC 2010 i686 C++ compiler: GNU C++ version 4.4.4 C++ standard library: GNU libstdc++ version 20100712 Boost version : 1_42 SQLite version : 3.7.3 (compiled against 3.7.0) Lua version : Lua 5.1 PCRE version: 8.02 2010-03-19 (compiled against 8.2) Botan version : 1.8.9 (compiled against 1.8.8) Changes since base revision: format_version 1 new_manifest [86bede3ba4251594f3a0f7e0c31560f9f8ce3744] old_revision [844268c137aaa783aa800a9c16ae61edda80ecea] Generated from data cached in the distribution; further changes may have been made. - end 'full_version_string' (in virtual void mtn_sanity::initialize(int, char**, const char*), at mtn-sanity.cc:32) -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (550, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.32-5-686 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages monotone depends on: ii libbotan-1.8.2 1.8.9-1 multiplatform crypto library ii libc6 2.11.2-6+squeeze1 Embedded GNU C Library: Shared lib ii libgcc11:4.4.5-4 GCC support library ii libidn11 1.15-2GNU Libidn library, implementation ii liblua5.1-05.1.4-5 Simple, extensible, embeddable pro ii libpcre3 8.02-1.1 Perl 5 Compatible Regular Expressi ii libsqlite3-0 3.7.3-1 SQLite 3 shared library ii libstdc++6 4.4.5-4 The GNU Standard C++ Library v3 ii zlib1g 1:1.2.3.4.dfsg-3 compression library - runtime monotone recommends no packages. Versions of packages monotone suggests: pn monotone-doc none (no description available) pn monotone-server none (no description available) -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601805: viewvc: Grave python errors which can be fixed with a one liner, already upstream
Package: viewvc Version: 1.1.5-1 Severity: grave Tags: upstream patch Justification: renders package unusable Upstream version 1.1.6 includes a fix for some nasty python errors. We are hitting the bug on lots of places, which renders the package unusuable. More details can be found in the upstream bugtracker: http://viewvc.tigris.org/issues/show_bug.cgi?id=454 The fix is a oneliner included in the bug. It fixes the links like 'Copied from: ' link seen on, for example: http://websvn.kde.org/trunk/kdesupport/strigi/libstreamanalyzer/lib/analysisresult.cpp?view=log Tom Albers KDE Sysadmin -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.35.4-rscloud (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages viewvc depends on: ii python 2.6.6-3 interactive high-level object-orie ii python-subversion 1.6.12dfsg-2 Python bindings for Subversion ii python-support 1.0.10 automated rebuilding support for P ii rcs 5.7-25 The GNU Revision Control System ii subversion 1.6.12dfsg-2 Advanced version control system Versions of packages viewvc recommends: ii apache2 2.2.16-3 Apache HTTP Server metapackage ii apache2-mpm-itk [httpd-cgi] 2.2.16-3 multiuser MPM for Apache 2.2 ii python-pygments 1.3.1+dfsg-1 syntax highlighting package writte Versions of packages viewvc suggests: pn cvsgraph none (no description available) pn libapache2-mod-python none (no description available) ii mime-support 3.48-1 MIME files 'mime.types' 'mailcap pn python-tk none (no description available) pn viewvc-query none (no description available) -- Configuration Files: /etc/viewvc/mimetypes.conf changed [not included] /etc/viewvc/templates/diff.ezt changed [not included] /etc/viewvc/templates/dir_new.ezt changed [not included] /etc/viewvc/templates/file.ezt changed [not included] /etc/viewvc/templates/include/footer.ezt changed [not included] /etc/viewvc/templates/include/header.ezt changed [not included] /etc/viewvc/templates/query_form.ezt changed [not included] /etc/viewvc/templates/query_results.ezt changed [not included] /etc/viewvc/viewvc.conf changed [not included] -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601807: heartbeat: Segfault while using a failover IPv6 address
Package: heartbeat Version: 2.1.3-6lenny4 Severity: grave Justification: renders package unusable Hi, Heartbeat doesn't seem to play nice with ipv6. It segfaults while trying to add an IPv6 address. -- System Information: Debian Release: 5.0.6 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.35.420100909 (SMP w/8 CPU cores) Locale: lang=fr...@euro, lc_ctype=fr...@euro (charmap=ISO-8859-15) (ignored: LC_ALL set to fr...@euro) Shell: /bin/sh linked to /bin/bash Versions of packages heartbeat depends on: ii adduser 3.110add and remove users and groups ii gawk1:3.1.5.dfsg-4.1 GNU awk, a pattern scanning and pr ii iproute 20080725-2 networking and traffic control too ii iputils-ping3:20071127-1+lenny1 Tools to test the reachability of ii libbz2-1.0 1.0.5-1+lenny1 high-quality block-sorting file co ii libc6 2.7-18lenny4 GNU C Library: Shared libraries ii libcurl37.18.2-8lenny4 Multi-protocol file transfer libra ii libglib2.0-02.16.6-3 The GLib library of C routines ii libgnutls26 2.4.2-6+lenny2 the GNU TLS library - runtime libr ii libltdl31.5.26-4+lenny1 A system independent dlopen wrappe ii libncurses5 5.7+20081213-1 shared libraries for terminal hand ii libnet1 1.1.2.1-2library for the construction and h ii libopenhpi2 2.12.0-1 OpenHPI libraries (runtime and sup ii libpam-runtime 1.0.1-7 Runtime support for the PAM librar ii libpam0g1.0.1-7 Pluggable Authentication Modules l ii libsnmp15 5.4.1~dfsg-12SNMP (Simple Network Management Pr ii libssl0.9.8 0.9.8g-15+lenny8 SSL shared libraries ii libuuid11.41.3-1 universally unique id library ii libwrap07.6.q-16 Wietse Venema's TCP wrappers libra ii libxml2 2.6.32.dfsg-5+lenny1 GNOME XML library ii libxml2-utils 2.6.32.dfsg-5+lenny1 XML utilities ii mawk1.3.3-11.1 a pattern scanning and text proces ii psmisc 22.6-1 Utilities that use the proc filesy ii python 2.5.2-3 An interactive high-level object-o ii python-central 0.6.8register and build utility for Pyt ii zlib1g 1:1.2.3.3.dfsg-12compression library - runtime Versions of packages heartbeat recommends: ii iptables 1.4.2-6administration tools for packet fi ii logrotate 3.7.1-5Log rotation utility ii syslog-ng [system-log-daemon] 2.0.9-4.1 Next generation logging daemon heartbeat suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#600571: perl: Fails to complete unpack during installation
I could install this package without any problem. Here is the log: [humitos] [~]$ sudo apt-get upgrade Leyendo lista de paquetes... Hecho Creando árbol de dependencias Leyendo la información de estado... Hecho Los siguientes paquetes se han retenido: apt apt-utils aptitude debtags goplay libapt-pkg-perl libdpkg-ruby1.8 libept1 libtracker-client-0.8-0 python-apt synaptic xindy xserver-xorg-video-intel Se actualizarán los siguientes paquetes: libperl5.10 perl perl-base perl-suid 4 actualizados, 0 se instalarán, 0 para eliminar y 13 no actualizados. Se necesita descargar 0B/5.418kB de archivos. Se utilizarán 0B de espacio de disco adicional después de esta operación. ¿Desea continuar [S/n]? s Reading package fields... Done Reading package status... Done Retrieving bug reports... Done Parsing Found/Fixed information... Done serious bugs of perl (5.10.1-14 - 5.10.1-15) unfixed #600571 - perl: Fails to complete unpack during installation Summary: perl(1 bug) Are you sure you want to install/upgrade the above packages? [Y/n/?/...] (Leyendo la base de datos ... 299606 files and directories currently installed.) Preparando para reemplazar perl-suid 5.10.1-14 (usando .../perl-suid_5.10.1-15_i386.deb) ... Desempaquetando el reemplazo de perl-suid ... Preparando para reemplazar libperl5.10 5.10.1-14 (usando .../libperl5.10_5.10.1-15_i386.deb) ... Desempaquetando el reemplazo de libperl5.10 ... Preparando para reemplazar perl 5.10.1-14 (usando .../perl_5.10.1-15_i386.deb) ... Desempaquetando el reemplazo de perl ... Preparando para reemplazar perl-base 5.10.1-14 (usando .../perl-base_5.10.1-15_i386.deb) ... Desempaquetando el reemplazo de perl-base ... Procesando disparadores para man-db ... Configurando perl-base (5.10.1-15) ... Configurando perl (5.10.1-15) ... Configurando libperl5.10 (5.10.1-15) ... Configurando perl-suid (5.10.1-15) ... [humitos] [~]$ Thanks, -- Kaufmann Manuel Blog: http://humitos.wordpress.com/ PyAr: http://www.python.com.ar/ -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#594535: [gnome-shell] cannot start after upgrade to 2.29.0-3+b1
I don't get a blinking screen, I get the following: j...@hathor:~$ gnome-shell --replace [1] 3493 j...@hathor:~$ do_wait: drmWaitVBlank returned -1, IRQs don't seem to be working correctly. Try adjusting the vblank_mode configuration parameter. Shell killed with signal 11 Is this the same bug? -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601817: gparted crashes applying move to right of more than one logical partition
Package: gparted Version: 0.6.2-1 Severity: serious Tags: fixed-upstream At https://bugzilla.gnome.org/show_bug.cgi?id=628863 Frieder Ferlemann reported: On an IBM T42 notebook gparted reproducibly (tried 3 times with varying layouts) crashes when rearranging partitions leaving the system in an unusable state. signature.asc Description: Digital signature
Bug#601818: gparted crashes at start: glibmm-ERROR **
Package: gparted Version: 0.6.2-1 Severity: serious Tags: fixed-upstream At https://bugs.launchpad.net/ubuntu/+source/gparted/+bug/617885 Lito reported: Always that I try to open gparted from console: $ sudo gparted == libparted : 2.2 == glibmm-ERROR **: unhandled exception (type std::exception) in signal handler: what: basic_string::_S_create aborting... signature.asc Description: Digital signature
Bug#600890: xul-ext-sync: firefox sync is not functional as it is too old
On Do, 21 Okt 2010, Michael Fladischer wrote: I'll contact debian-volatile and debian-release about this issue. So far I can only give this advise: Don't upgrade to 1.5 on other installations to keep compatibility. Sorry ... No, better solution - remove the xul-ext-sync package and install it from within iceweasel. Then I have a working sync across all possible platforms. I think this depends on your POV, as I'm using it to sync several Debian installations it's not really broken regarding it's status within Debian ... but that's just POV :-) Yes, from my POV you can close this bug or do whatever, I will not use the packaged version anymore, since it is a pain to keep in sync with other computers. Be reminded that firefox on other platforms automatically (by default, if not turned off) updates plugins, so keeping them at 1.4 is not practical. Case closed for me, I see no advantage in using the Debian package, so it be gone. Best wishes Norbert Norbert Preiningprein...@{jaist.ac.jp, logic.at, debian.org} JAIST, Japan TeX Live Debian Developer DSA: 0x09C5B094 fp: 14DF 2E6C 0307 BE6D AD76 A9C0 D2BF 4AA3 09C5 B094 AGGLETHORPE (n.) A dispute between two pooves in a boutique. --- Douglas Adams, The Meaning of Liff -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: reassign 601816 to network-manager, forcibly merging 530024 601816
Processing commands for cont...@bugs.debian.org: reassign 601816 network-manager Bug #601816 [network-manager-gnome] Network manager in Gnome and Wired connection Bug reassigned from package 'network-manager-gnome' to 'network-manager'. Bug No longer marked as found in versions network-manager-applet/0.8.1-1. forcemerge 530024 601816 Bug#530024: eth0 Wired interface not managed (on squeeze install/upgrade). Bug#601816: Network manager in Gnome and Wired connection Forcibly Merged 530024 601816. thanks Stopping processing here. Please contact me if you need assistance. -- 530024: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=530024 601816: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601816 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601747: RDS protocol vulnerability
On Fri, 29 Oct 2010 16:10:35 +0100 Adam D. Barratt a...@adam-barratt.org.uk wrote: Are you actually experiencing this in 2.6.32-26, or just assuming it's affected because the US-CERT page says it is? No, it's shame, I don't check debian/changelog... very sorry for all. -- Regards, Hideki Yamane henrich @ debian.or.jp/org http://wiki.debian.org/HidekiYamane -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: your mail
Processing commands for cont...@bugs.debian.org: close 601747 2.6.32-26 Bug#601747: RDS protocol vulnerability 'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing. Bug marked as fixed in version 2.6.32-26, send any further explanations to Hideki Yamane henr...@debian.or.jp thanks Stopping processing here. Please contact me if you need assistance. -- 601747: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601747 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601747: (no subject)
close 601747 2.6.32-26 thanks -- Regards, Hideki Yamane henrich @ debian.or.jp/org http://wiki.debian.org/HidekiYamane -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601817: marked as done (gparted crashes applying move to right of more than one logical partition)
Your message dated Sat, 30 Oct 2010 01:32:08 + with message-id e1pc0ii-0002e5...@franck.debian.org and subject line Bug#601817: fixed in gparted 0.7.0-1 has caused the Debian Bug report #601817, regarding gparted crashes applying move to right of more than one logical partition to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 601817: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601817 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: gparted Version: 0.6.2-1 Severity: serious Tags: fixed-upstream At https://bugzilla.gnome.org/show_bug.cgi?id=628863 Frieder Ferlemann reported: On an IBM T42 notebook gparted reproducibly (tried 3 times with varying layouts) crashes when rearranging partitions leaving the system in an unusable state. signature.asc Description: Digital signature ---End Message--- ---BeginMessage--- Source: gparted Source-Version: 0.7.0-1 We believe that the bug you reported is fixed in the latest version of gparted, which is due to be installed in the Debian FTP archive: gparted_0.7.0-1.debian.tar.bz2 to main/g/gparted/gparted_0.7.0-1.debian.tar.bz2 gparted_0.7.0-1.dsc to main/g/gparted/gparted_0.7.0-1.dsc gparted_0.7.0-1_mipsel.deb to main/g/gparted/gparted_0.7.0-1_mipsel.deb gparted_0.7.0.orig.tar.bz2 to main/g/gparted/gparted_0.7.0.orig.tar.bz2 A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 601...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Anibal Monsalve Salazar ani...@debian.org (supplier of updated gparted package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 30 Oct 2010 11:08:59 +1100 Source: gparted Binary: gparted Architecture: source mipsel Version: 0.7.0-1 Distribution: unstable Urgency: high Maintainer: Anibal Monsalve Salazar ani...@debian.org Changed-By: Anibal Monsalve Salazar ani...@debian.org Description: gparted- GNOME partition editor Closes: 601817 601818 Changes: gparted (0.7.0-1) unstable; urgency=high . * New upstream release Fix gparted crash at start with glibmm-ERROR Closes: 601818 LP: #609477, #617885 Fix crash moving more than one logical partition right Closes: 601817 Skip move/copy action because linux swap contains no data LP: #401228 Fix several memory leaks and valgrind errors Remove unnecessary null pointer checks Fix partitions moved or copied are 1 MiB larger Insert additional translator comments Add initial support for btrfs Checksums-Sha1: 720a8be54f266cba021a6eaa95fc24c6642a0072 1889 gparted_0.7.0-1.dsc 709d59d2bea01ab81a1c2fd7e4e002bcb821db5e 1374308 gparted_0.7.0.orig.tar.bz2 ecfb79431d880be47f11b75b63bb783e8c82103e 10890 gparted_0.7.0-1.debian.tar.bz2 04fb57508654d0af4c53401b522e638d16c0458c 1268214 gparted_0.7.0-1_mipsel.deb Checksums-Sha256: 590887bfb74b8c108480c70f7ff49a906b009b3843feab3f9586c51f2769df0c 1889 gparted_0.7.0-1.dsc 8c498411aeb4ec575c15ef60ac3bde2ef46ae157fa53026a7e3ce85d14ad3be7 1374308 gparted_0.7.0.orig.tar.bz2 21ef58c819149e700497acd8c64453c6c1a3c2a4512665157f7c6fbd3150c77a 10890 gparted_0.7.0-1.debian.tar.bz2 dc4608a427e9778550c86ecea735eec7fe9f4941ce30403ee75e74b6ae680d37 1268214 gparted_0.7.0-1_mipsel.deb Files: 6baf604c82043ffdbedc0c4cd04939d6 1889 gnome optional gparted_0.7.0-1.dsc 88c5b2162a7b7847c68ea80f4fcd0153 1374308 gnome optional gparted_0.7.0.orig.tar.bz2 2ad3caf99466e62954b681b4c5558910 10890 gnome optional gparted_0.7.0-1.debian.tar.bz2 e622b7ccd07c421b8eb7e579cb0f0f7d 1268214 gnome optional gparted_0.7.0-1_mipsel.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iQIcBAEBCAAGBQJMy3OdAAoJEHxWrP6UeJfY7oEQAKrdz3X4CqtXfW2+8vvDM27B R+YMI9FXcVYITnvHGiaeWu/ARyPlmuq2yjOcFryboGXHLsbZv/l71Bf0VztzlYBG r+BqtflYIF/JJCi6ByGyKVJZjYaT5UDGt6ZpcSQhFdZMXOlQRjAaw12eMoMCA2dt V6Zn2Q476abS5acAmJecHvqCEAIViWRgqdVxUuDof4RWMWyR0SwuBLnoeywGpcIL 5grfphyDL/THmKsM2tJCP593U9Ptlpn3qA6YgoKcXi4tZPdB8Gb4HfqbZp1LyDqK HF/sUAsBWapNExI7xZ62IWQ12Mf1a37UzlHGIo6/mEaLqrF/AFTh6zeUu7JwGTzS MxRzHPU2fGh9Vftx0pY2eEtAmzf450KAVhgNZ4aAOqUrsOiZquZFBAPiPGIKj2lf Op1LMZ9aBb7l/wjZm858jpO7zhYCbLWcR4pW8+YAA2KmF6ystU4iBlhLWZGGUo43
Bug#601818: marked as done (gparted crashes at start: glibmm-ERROR **)
Your message dated Sat, 30 Oct 2010 01:32:08 + with message-id e1pc0ii-0002e8...@franck.debian.org and subject line Bug#601818: fixed in gparted 0.7.0-1 has caused the Debian Bug report #601818, regarding gparted crashes at start: glibmm-ERROR ** to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 601818: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601818 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: gparted Version: 0.6.2-1 Severity: serious Tags: fixed-upstream At https://bugs.launchpad.net/ubuntu/+source/gparted/+bug/617885 Lito reported: Always that I try to open gparted from console: $ sudo gparted == libparted : 2.2 == glibmm-ERROR **: unhandled exception (type std::exception) in signal handler: what: basic_string::_S_create aborting... signature.asc Description: Digital signature ---End Message--- ---BeginMessage--- Source: gparted Source-Version: 0.7.0-1 We believe that the bug you reported is fixed in the latest version of gparted, which is due to be installed in the Debian FTP archive: gparted_0.7.0-1.debian.tar.bz2 to main/g/gparted/gparted_0.7.0-1.debian.tar.bz2 gparted_0.7.0-1.dsc to main/g/gparted/gparted_0.7.0-1.dsc gparted_0.7.0-1_mipsel.deb to main/g/gparted/gparted_0.7.0-1_mipsel.deb gparted_0.7.0.orig.tar.bz2 to main/g/gparted/gparted_0.7.0.orig.tar.bz2 A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 601...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Anibal Monsalve Salazar ani...@debian.org (supplier of updated gparted package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 30 Oct 2010 11:08:59 +1100 Source: gparted Binary: gparted Architecture: source mipsel Version: 0.7.0-1 Distribution: unstable Urgency: high Maintainer: Anibal Monsalve Salazar ani...@debian.org Changed-By: Anibal Monsalve Salazar ani...@debian.org Description: gparted- GNOME partition editor Closes: 601817 601818 Changes: gparted (0.7.0-1) unstable; urgency=high . * New upstream release Fix gparted crash at start with glibmm-ERROR Closes: 601818 LP: #609477, #617885 Fix crash moving more than one logical partition right Closes: 601817 Skip move/copy action because linux swap contains no data LP: #401228 Fix several memory leaks and valgrind errors Remove unnecessary null pointer checks Fix partitions moved or copied are 1 MiB larger Insert additional translator comments Add initial support for btrfs Checksums-Sha1: 720a8be54f266cba021a6eaa95fc24c6642a0072 1889 gparted_0.7.0-1.dsc 709d59d2bea01ab81a1c2fd7e4e002bcb821db5e 1374308 gparted_0.7.0.orig.tar.bz2 ecfb79431d880be47f11b75b63bb783e8c82103e 10890 gparted_0.7.0-1.debian.tar.bz2 04fb57508654d0af4c53401b522e638d16c0458c 1268214 gparted_0.7.0-1_mipsel.deb Checksums-Sha256: 590887bfb74b8c108480c70f7ff49a906b009b3843feab3f9586c51f2769df0c 1889 gparted_0.7.0-1.dsc 8c498411aeb4ec575c15ef60ac3bde2ef46ae157fa53026a7e3ce85d14ad3be7 1374308 gparted_0.7.0.orig.tar.bz2 21ef58c819149e700497acd8c64453c6c1a3c2a4512665157f7c6fbd3150c77a 10890 gparted_0.7.0-1.debian.tar.bz2 dc4608a427e9778550c86ecea735eec7fe9f4941ce30403ee75e74b6ae680d37 1268214 gparted_0.7.0-1_mipsel.deb Files: 6baf604c82043ffdbedc0c4cd04939d6 1889 gnome optional gparted_0.7.0-1.dsc 88c5b2162a7b7847c68ea80f4fcd0153 1374308 gnome optional gparted_0.7.0.orig.tar.bz2 2ad3caf99466e62954b681b4c5558910 10890 gnome optional gparted_0.7.0-1.debian.tar.bz2
Bug#601824: imagemagick: reads config files from cwd
Package: imagemagick Version: 7:6.3.7.9.dfsg2-1~lenny3 Severity: grave Tags: security Justification: user security hole ImageMagick reads several configuration files[0] from the current working directory. Unfortunately, this allows local attackers to execute arbitrary code if ImageMagick is run from an untrusted directory. Steps to reproduce this bug: 1. As an attacker, put the attached files in /tmp. 2. As a victim, in /tmp run: $ convert /path/to/foo.png /path/to/bar.png All your base are belong to us. convert: missing an image filename `/path/to/bar.png'. [0] http://www.imagemagick.org/script/resources.php -- Jakub Wilk coder.xml Description: XML document delegates.xml Description: XML document signature.asc Description: Digital signature
Processed: tagging 601824
Processing commands for cont...@bugs.debian.org: tags 601824 + confirmed Bug #601824 [imagemagick] imagemagick: reads config files from cwd Added tag(s) confirmed. thanks Stopping processing here. Please contact me if you need assistance. -- 601824: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601824 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601824: imagemagick: reads config files from cwd
Hi Jakub! On Fri, Oct 29, 2010 at 11:43 PM, Jakub Wilk jw...@debian.org wrote: ImageMagick reads several configuration files[0] from the current working directory. Unfortunately, this allows local attackers to execute arbitrary code if ImageMagick is run from an untrusted directory. I have confirmed it here and forwarded upstream. Thank you! Best regards, Nelson -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#574219: Intent to NMU (dict-xdict: package removal fails)
feel free to NMU. and thanks. On 10/30/10, Jari Aalto jari.aa...@cante.net wrote: This bug seems to be a candidate for NMU. I have some free time and I am offering to help fix it. Please let me know if this bug is already been worked on or if it's okay to NMU the package. -- Emfox Zhou GnuPG Public Key: 0xF7142EC2 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#601807: heartbeat: Segfault while using a failover IPv6 address
On Fri, Oct 29, 2010 at 10:54:55PM +0200, Laurent Caron wrote: Package: heartbeat Version: 2.1.3-6lenny4 Severity: grave Justification: renders package unusable Hi, Heartbeat doesn't seem to play nice with ipv6. It segfaults while trying to add an IPv6 address. Hi Laurent, could you give a little bit more detail on the configuration that you have that segfaults? -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org