Bug#684426: marked as done ([owncloud] Users can overwrite read-only shared files owned by other users via WebDAV)
Your message dated Fri, 10 Aug 2012 06:03:21 + with message-id e1szijd-00060h...@franck.debian.org and subject line Bug#684426: fixed in owncloud 4.0.5debian2-2 has caused the Debian Bug report #684426, regarding [owncloud] Users can overwrite read-only shared files owned by other users via WebDAV to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 684426: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684426 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: owncloud Version: 4.0.5debian2-1 Severity: grave Tags: patch security X-Debbugs-CC: secure-testing-t...@lists.alioth.debian.org --- Please enter the report below this line. --- Hi, I stumbled over a security bug in owncloud with the result of data loss or modification, depending on the configuration of owncloud. It is possible for regular users of owncloud to overwrite files that are shared by another owncloud user via WebDAV. If version control is activated user1 could revert the file to its previous state, but if it's not activated, user1's data is lost. Find attached a patch that should fix the security flaw for owncloud 4.0.5debian2-1. Cheers - Fuddl --- System information. --- Architecture: amd64 Kernel: Linux 3.2.0-3-amd64 Debian Release: wheezy/sid 500 unstableftp.de.debian.org 1 experimentalftp.de.debian.org --- Package information. --- Package's Depends field is empty. Package's Recommends field is empty. Package's Suggests field is empty. From 05648dac619942dfccc76180d30fcd79364355ec Mon Sep 17 00:00:00 2001 From: Michael Gapczynski mt...@owncloud.com Date: Wed, 8 Aug 2012 11:25:24 -0400 Subject: [PATCH] Don't return file handle if the mode supports writing and the file is not writable --- apps/files_sharing/sharedstorage.php | 19 +++ 1 file changed, 19 insertions(+) Index: owncloud-4.0.5debian2/apps/files_sharing/sharedstorage.php === --- owncloud-4.0.5debian2.orig/apps/files_sharing/sharedstorage.php 2012-07-19 18:50:49.0 +0200 +++ owncloud-4.0.5debian2/apps/files_sharing/sharedstorage.php 2012-08-09 11:29:58.0 +0200 @@ -416,6 +416,25 @@ public function fopen($path, $mode) { $source = $this-getSource($path); if ($source) { + switch ($mode) { + case 'r+': + case 'rb+': + case 'w+': + case 'wb+': + case 'x+': + case 'xb+': + case 'a+': + case 'ab+': + case 'w': + case 'wb': + case 'x': + case 'xb': + case 'a': + case 'ab': + if (!$this-is_writable($path)) { + return false; + } + } $storage = OC_Filesystem::getStorage($source); return $storage-fopen($this-getInternalPath($source), $mode); } signature.asc Description: This is a digitally signed message part ---End Message--- ---BeginMessage--- Source: owncloud Source-Version: 4.0.5debian2-2 We believe that the bug you reported is fixed in the latest version of owncloud, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 684...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thomas Mueller thomas.muel...@tmit.eu (supplier of updated owncloud package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 09 Aug 2012 23:29:25 +0200 Source: owncloud Binary: owncloud owncloud-mysql owncloud-sqlite Architecture: source all Version: 4.0.5debian2-2 Distribution: unstable Urgency: high Maintainer: ownCloud for Debian maintainers pkg-owncloud-maintain...@lists.alioth.debian.org Changed-By: Thomas Mueller thomas.muel...@tmit.eu Description: owncloud - cloud storage
Bug#684454: ruby-actionpack-3.2: CVE-2012-3463 / CVE-2012-3464 / CVE-2012-3465
Package: ruby-actionpack-3.2 Severity: grave Tags: security Justification: user security hole Please see CVE-2012-3465 http://www.openwall.com/lists/oss-security/2012/08/09/9 CVE-2012-3464 http://www.openwall.com/lists/oss-security/2012/08/09/10 CVE-2012-3463 http://www.openwall.com/lists/oss-security/2012/08/09/8 Since Wheezy is frozen, please use the isolated patches instead of updating to 3.2.8 Cheers, Moritz -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#684456: qpid-cpp: CVE-2012-3467
Package: qpid-cpp Severity: grave Tags: security Justification: user security hole Please see http://www.openwall.com/lists/oss-security/2012/08/09/6 Since we're in freeze, please fix this with an isolated patch. Cheers, Moritz -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#680845: derivations: FTBFS: Can't create output index file /«PKGBUILDDIR»/tex/main.ind.
Hi, On 09/08/12 18:09, Hilmar Preusse wrote: Benjamin Mako Hill provided a patch, which probably solves the problem. I've uploaded new packages here, do you have a chance to test if they do? http://wagner.debian.org/~hilmar-guest/rubber/ derivations built for me with the patched package. Didn't try anything else. Cheers -- Sebastian Ramacher signature.asc Description: OpenPGP digital signature
Bug#684463: condor fails to install if condor user already exists
Package: condor Version: 7.8.1~dfsg.1-1~nd12.04+1 Severity: grave Justification: renders package unusable Hi! when I try to install condor on a machine where the condor user already exists (either because the machine uses LDAP authentication and condor user is in LDAP or because I am just re-installing or upgrading condor), the configuration step fails with: Setting up condor (7.8.1~dfsg.1-1~nd60+1) ... adduser: The user `condor' already exists. Exiting. dpkg: error processing condor (--configure): subprocess installed post-installation script returned error exit status 1 configured to not write apport reports Errors were encountered while processing: condor E: Sub-process /usr/bin/dpkg returned an error code (1) A package failed to install. Trying to recover: Setting up condor (7.8.1~dfsg.1-1~nd60+1) ... adduser: The user `condor' already exists. Exiting. dpkg: error processing condor (--configure): subprocess installed post-installation script returned error exit status 1 Errors were encountered while processing: condor I am somehow unsure what is happening, because I have this also on a machine where condor is already installed and working, but: hamxxx ~ # dpkg-reconfigure condor /usr/sbin/dpkg-reconfigure: condor is broken or not fully installed hamxxx ~ # condor_q -- Submitter: hamxxx : 172.29.xxx.xxx:40590 : hamxxx ID OWNERSUBMITTED RUN_TIME ST PRI SIZE CMD 2586.0 xxx 8/9 15:50 0+05:36:39 R 0 43.9 bash_lc_var_5 2586 2586.1 xxx 8/9 15:50 0+05:36:39 R 0 43.9 bash_lc_var_5 2586 [...] this happens on squeeze, wheezy and ubuntu precise... am I doing something wrong? thank you, tiziano -- System Information: Debian Release: wheezy/sid APT prefers precise-updates APT policy: (500, 'precise-updates'), (500, 'precise-security'), (500, 'precise') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-27-generic (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages condor depends on: ii adduser 3.113ubuntu2 ii debconf [debconf-2.0] 1.5.42ubuntu1 ii libc6 2.15-0ubuntu10 ii libclassad3 7.8.1~dfsg.1-1~nd12.04+1 ii libcomerr2 1.42-1ubuntu2 ii libcurl37.22.0-3ubuntu4 ii libdate-manip-perl 6.25-1 ii libexpat1 2.0.1-7.2ubuntu1 ii libgcc1 1:4.6.3-1ubuntu5 ii libglobus-common0 14.5-1 ii libglobus-ftp-control1 4.2-1 ii libglobus-gass-transfer27.1-1 ii libglobus-gram-client3 12.3-2 ii libglobus-gsi-credential1 5.1-1 ii libglobus-gsi-proxy-core0 6.1-1 ii libglobus-gsi-sysconfig15.1-1 ii libglobus-gss-assist3 8.1-1 ii libglobus-gssapi-gsi4 10.2-1 ii libglobus-io3 9.2-1 ii libglobus-rsl2 9.1-2 ii libglobus-xio0 3.2-1 ii libgsoap1 2.8.4-2 ii libk5crypto31.10+dfsg~beta1-2ubuntu0.3 ii libkrb5-3 1.10+dfsg~beta1-2ubuntu0.3 ii libldap-2.4-2 2.4.28-1.1ubuntu4.1 ii libpcre38.12-4 ii libssl1.0.0 1.0.1-4ubuntu5.3 ii libstdc++6 4.6.3-1ubuntu5 ii libuuid12.20.1-1ubuntu3 ii libvirt00.9.8-2ubuntu17.3 ii neurodebian-popularity-contest 0.28~nd12.04+1 ii perl5.14.2-6ubuntu2 ii python 2.7.3-0ubuntu2 Versions of packages condor recommends: ii dmtcp 1.2.5-1~nd12.04+1 Versions of packages condor suggests: pn coop-computing-tools none -- debconf information excluded -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#668721: Any reason to not upload the patched package to close #668721
Hi Joey, lacking any answer from you I NMUed to DELAYED/10. Hope you like this Andreas. On Mon, Aug 06, 2012 at 12:08:34PM +0200, Andreas Tille wrote: Hi Joey, following the advise to look into RC bugs before reading Bits from DPL I stumbled over this one. Could you give any reason why you do not upload with the provided patch? Please give some signal what to do (I'd volunteer to NMU in case you might have some time issues). Kind regards Andreas. -- http://fam-tille.de -- http://fam-tille.de -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: [bts-link] source package gnome-keyring
Processing commands for cont...@bugs.debian.org: # # bts-link upstream status pull for source package gnome-keyring # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html # user bts-link-upstr...@lists.alioth.debian.org Setting user to bts-link-upstr...@lists.alioth.debian.org (was bts-link-de...@lists.alioth.debian.org). # remote status report for #683655 (http://bugs.debian.org/683655) # Bug title: gnome-keyring: gpg passphrase cached forever # * http://bugzilla.gnome.org/show_bug.cgi?id=681081 # * remote status changed: UNCONFIRMED - RESOLVED # * remote resolution changed: (?) - FIXED # * closed upstream tags 683655 + fixed-upstream Bug #683655 [gnome-keyring] gnome-keyring: gpg passphrase cached forever Added tag(s) fixed-upstream. usertags 683655 - status-UNCONFIRMED Usertags were: status-UNCONFIRMED. Usertags are now: . usertags 683655 + status-RESOLVED resolution-FIXED There were no usertags set. Usertags are now: status-RESOLVED resolution-FIXED. thanks Stopping processing here. Please contact me if you need assistance. -- 683655: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683655 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#684479: wheezy: Network File Services are major issue in Wheezy.
Package: wheezy Version: Wheezy Severity: serious Justification: required Dear Maintainer, *** Please consider answering these questions, where appropriate *** * What led up to the situation? Network File services hung up the fresh Wheezy startup. * What exactly did you do (or not do) that was effective (or ineffective)? I had to boot in rescue mode, then removed NFS related packages. * What was the outcome of this action? Wheezy boots up like Squeeze did before * What outcome did you expect instead? *** End of the template - remove these lines *** Also /etc/pm/sleep.d/56nfs script file that I made for NFS months ago prevented pm-suspend. On Squeeze it won't affect suspend action at all. Simply removing the file from /etc/pm/sleep.d directory solved non-suspend problem at least in my system. -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-3-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#684480: libjs-wax: Missing html4-defs.js
Package: libjs-wax Version: 5.0.1+ds1-1 Justification: renders package unusable Severity: grave Dear Maintainer, Upon trying to use wax.leaf.js the browser reports html4 is not defined from wax.leaf.js:842. The html4 object which it mentions is provided by the html4 package within google-caja. More specifically in debian/rules the get-orig-source target removes the third-party embedded libs for the google-caja html-sanitizer from the source package (ext/html-sanitizer-bundle.js) and re-pulls this file from http://google-caja.googlecode.com/svn/trunk/src/com/google/caja/plugin/html-sanitizer.js. However, the two files are not the same. Specifically the one you pull in doesn't provide html4, whereas the one included in the upstream source package did. This is furthermore complicated by the fact that upstream removed the html4-defs.js file (which is the one we need) from the upstream source tree in r3013 because it is now build as part of the build process of google-caja, so we can't simply pull it in. I see two options to fix this issue. Option 1 is to leave the included ext/html-sanitizer-bundle.js from the upstream source tarball in tact and use it. However I don't think this is a viable option as it is probably against Debian policy. Option two is to package google-caja in Debian. Doing so will build the required html4-defs.js file from source and provide it for use within Debian, allowing libjs-wax to simply Depend on google-caja and use it's html4-defs.js file. Until such time as this is fixed, unless there is some other way to use wax, I think the package should be removed from Debian since it is not usable in it's current form (happy to be proven wrong). Thanks. signature.asc Description: OpenPGP digital signature
Bug#608981: Crash with long GGI_DISPLAY environment variable
Package: libggi Dear maintainer, Recently you fixed one or more security problems and as a result you closed this bug. These problems were not serious enough for a Debian Security Advisory, so they are now on my radar for fixing in the following suites through point releases: squeeze (6.0.6) - use target stable Please prepare a minimal-changes upload targetting each of these suites, and submit a debdiff to the Release Team [0] for consideration. They will offer additional guidance or instruct you to upload your package. I will happily assist you at any stage if the patch is straightforward and you need help. Please keep me in CC at all times so I can track [1] the progress of this request. For details of this process and the rationale, please see the original announcement [2] and my blog post [3]. 0: debian-rele...@lists.debian.org 1: http://prsc.debian.net/tracker/608981/ 2: 201101232332.11736.th...@debian.org 3: http://deb.li/prsc Thanks, with his security hat on: -- Jonathan Wiltshire j...@debian.org Debian Developer http://people.debian.org/~jmw 4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#684423: live-tools: Broken link ( /usr/sbin/update-initramfs - ../bin/live-update-initramfs )
Processing commands for cont...@bugs.debian.org: severity 684423 grave Bug #684423 [live-tools] live-tools: Broken link ( /usr/sbin/update-initramfs - ../bin/live-update-initramfs ) Severity set to 'grave' from 'important' thanks Stopping processing here. Please contact me if you need assistance. -- 684423: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684423 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#684423: update-initramfs workaround
The following hook can be used to work around this bug. $ cat config/hooks/fix-update-initramfs.chroot #!/bin/sh set -eu ln -sf ../../bin/live-update-initramfs /usr/sbin/update-initramfs -- Sam Morris s...@robots.org.uk -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#682905: can't import signatures
You could also try with another local user account on that machine, to rule out that it is due to specific settings in your home directory. I created a new UNIX user, new email address and new PGP key ... snip ... Therefore, it appears to be good for a completely clean user account That's partially good news. Let's narrow it down further. Please create a new icedove profile within your existing user account (icedove -ProfileManager on the command-line, when no instance of icedove is running). and do essentially the same you did within the new user account. That way, we make sure that it is your icedove profile, not your whole user account that accounts for these problems. I've tried this. I created a completely different profile using ProfileManager and then I set up my account in the profile. I didn't set up everything, I have a lot of settings. I just put my main email identity (dan...@pocock.com.au) I was able to successfully import signatures attached to emails - no error message I am willing to try swapping out my own user profile somehow to isolate the problem, but (a) I do want to preserve my settings and (b) that won't be a good solution for all users upgrading from squeeze-wheezy Particular features of my user account: - was working fine with squeeze - gpg: includes an old 1024 bit key, now revoked - icedove: includes enigmail and iceowl-extension I think it is unlikely that iceowl causes incompatibilities, but to be sure about it, you could temporarily disable all extensions except enigmail. I tried that too, it didn't fix the problem BTW: Did you ever install enigmail as a local extension (i.e. downloaded it as xpi file from enigmail.mozdez.org or addons.mozilla.org)? I can't remember if I have ever done that. I believe I started using the enigmail package from about 2010 I have used icedove for a long time, and each time I upgrade Debian and Icedove, I keep using the same profile. The oldest file under the ~/.icedove/profile directory is from 2007, but I may have had this profile since before that, I can't remember. On squeeze, I last used 3.0.11-1+squeeze11 with Enigmail 2:1.0.1-5. I stopped using squeeze to run icedove a few weeks ago. On wheezy, I have 10.0.5-1 and Enigmail 2:1.4.1-2 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#684488: puppet-lint not working with ruby1.9.1
Package: puppet-lint Version: 0.1.13-1 Severity: serious Tags: sid wheezy Hi, it seems that puppet-lint is not working with ruby1.9.1 which is the default version in wheezy. /usr/lib/ruby/1.9.1/rubygems/custom_require.rb:36:in `require': iconv will be deprecated in the future, use String#encode instead. /usr/bin/puppet-lint:88:in `main': undefined method `each' for config.pp:String (NoMethodError) Using ruby1.8 is working flawlessly. Cheers Laurent Bigonville -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.4-trunk-amd64 (SMP w/4 CPU cores) Locale: LANG=fr_BE.utf8, LC_CTYPE=fr_BE.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages puppet-lint depends on: ii puppet-common 2.7.18-1 ii ruby 4.9 ii ruby1.8 [ruby-interpreter]1.8.7.358-4 ii ruby1.9.1 [ruby-interpreter] 1.9.3.194-1 puppet-lint recommends no packages. Versions of packages puppet-lint suggests: pn rake none -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#684489: gksu-polkit: CVE-2011-0703
Package: gksu-polkit Severity: grave Tags: security Justification: user security hole I just noticed that this never made it to the BTS: http://www.openwall.com/lists/oss-security/2011/03/15/8 It was assiged CVE-2011-0703 Cheers, Moritz -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#682574: tagging 672870, tagging 664261, tagging 682382, tagging 682499, found 682574 in live-utils/3.0.3-1 ...
On Mon, Jul 23, 2012 at 10:45:30PM +0200, Andreas Beckmann wrote: found 682574 live-utils/3.0.3-1 You surely meant live-tools/3.0.3-1 here, right? Which makes live-tools/3.0.3-1 in Wheezy RC-buggy? -- Bruce Schneier can read and understand Perl programs. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#684423: live-tools: Broken link ( /usr/sbin/update-initramfs - ../bin/live-update-initramfs )
On 08/10/2012 01:58 PM, Evgeni Golov wrote: Thank you *so* much for breaking stuff, again. you should work on your attitude. of course i don't break things on purpose. besides, it's sid. you should know that. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: affects 681960, affects 681218
Processing commands for cont...@bugs.debian.org: affects 681960 - wheezy unstable Bug #681960 {Done: Scott Kitterman sc...@kitterman.com} [clamav-freshclam] clamav-freshclam: removes directories that were installed by another package: /var/{lib, log}/clamav/ Removed indication that 681960 affects wheezy and unstable affects 681218 - sid wheezy squeeze Bug #681218 {Done: Debian FTP Masters ftpmas...@ftp-master.debian.org} [kcheckgmail] kcheckgmail: Google authentication has changed - kcheckgmail is no more usable Removed indication that 681218 affects sid, wheezy, and squeeze thanks Stopping processing here. Please contact me if you need assistance. -- 681218: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681218 681960: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681960 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#682634: Bug#682631: linaro-image-tools: FTBFS: AttributeError: 'tuple' object has no attribute 'major'
On Thu, 09 Aug 2012 17:37:01 +0200, gregor herrmann wrote: I'm no python expert and only did the NMU upload for nautilus-image-manipulator recently, but I have found that e.g. google-apps-manager does [1,2] for python2.6 'compatibility': [1]: http://code.google.com/p/google-apps-manager/issues/detail?id=61 [2]: https://code.google.com/p/google-apps-manager/source/detail?r=253# Nice, I'm learning something about python by looking at bug reports :) https://code.google.com/p/google-apps-manager/source/diff?spec=svn253r=253format=sidepath=/trunk/gam.py shows the diff. But: The error | WARNING: the following files are not recognized by DistUtilsExtra.auto: | Traceback (most recent call last): | File setup.py, line 86, in module | cmdclass={'install': InstallAndUpdateDataDirectory} | File /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py, line 107, in setup | if(sys.version_info.major 3): | AttributeError: 'tuple' object has no attribute 'major' | dh_auto_clean: python2.6 setup.py clean -a returned exit code 1 | make: *** [clean] Error 1 in sid or in wheezy: | Traceback (most recent call last): | File setup.py, line 86, in module | cmdclass={'install': InstallAndUpdateDataDirectory} | File /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py, line 98, in setup | __requires(attrs, src_all) | File /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py, line 458, in __requires | __add_imports(imports, s, attrs) | File /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py, line 383, in __add_imports | if(sys.version_info.major 3): | AttributeError: 'tuple' object has no attribute 'major' | dh_auto_build: python2.6 setup.py build --force returned exit code 1 | make: *** [build] Error 1 doesn't happen in these packages themselves but: # ls -l /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py lrwxrwxrwx 1 root root 49 Aug 3 11:57 /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py - ../../../../share/pyshared/DistUtilsExtra/auto.py # readlink -f /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py /usr/share/pyshared/DistUtilsExtra/auto.py # dpkg -S /usr/share/pyshared/DistUtilsExtra/auto.py python-distutils-extra: /usr/share/pyshared/DistUtilsExtra/auto.py Should the bugs be reassigned? Someone with python knowledge needed here :) Cheers, gregor -- .''`. Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06 : :' : Debian GNU/Linux user, admin, and developer - http://www.debian.org/ `. `' Member of VIBE!AT SPI, fellow of the Free Software Foundation Europe `- NP: Beatles: Sgt. Pepper's Lonely Hearts Club Band signature.asc Description: Digital signature
Bug#684421: [DRE-maint] Bug#684421: FTBFS: tests require internet connectivity
Hi, On 10.08.2012 02:04, Gunnar Wolf wrote: Hi Felix, Thanks for the report - I also am not sure of the action to take, so I'm asking the rest of the team for input here. Looking at the source, I see quite often the mention of: c = @http.connection_for @uri where @uri is often defined as 'https://example.com/path'. I am surprised the tests failed for you only three times — How are you checking for network connectivity? Just running in an environment with no networking defined? FWIW, I tested the build killing my default gateway, and the tests now succeed (or are skipped). I recently switched from iptables rules that reject packets from the pbuilder user to network namespaces. So pbuilder only has access to a virtual network device where it can reach my apt-cacher-ng instance. With the patch you attached the package builds fine for me as well. It would be good to build with network access. But it is sometimes impossible. And the network is a changing thing outside our control. So, yes, not having network access should not make the test fail - and the only way out is to report it as such. Ideally the package would start a local HTTP(S) server and do s/example.com/localhost/ in the tests. Felix signature.asc Description: OpenPGP digital signature
Bug#681756: cannot reproduce
On Mon, 30 Jul 2012 09:24:39 -0300, gustavo panizzo gfa wrote: i cannot reproduce this bug using piuparts Me neither, with piuparts 0.45. Log attached, the piuparts call should be sufficiently similar to what Andreas used. Cheers, gregor -- .''`. Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06 : :' : Debian GNU/Linux user, admin, and developer - http://www.debian.org/ `. `' Member of VIBE!AT SPI, fellow of the Free Software Foundation Europe `- NP: Flying Pickets canna.log.gz Description: Binary data signature.asc Description: Digital signature
Bug#682631: Bug#682634: Bug#682631: linaro-image-tools: FTBFS: AttributeError: 'tuple' object has no attribute 'major'
Hi Gregor (Adding python-distutils-ex...@packages.debian.org to recipients) On Fri, Aug 10, 2012 at 03:35:31PM +0200, gregor herrmann wrote: But: The error | WARNING: the following files are not recognized by DistUtilsExtra.auto: | Traceback (most recent call last): | File setup.py, line 86, in module | cmdclass={'install': InstallAndUpdateDataDirectory} | File /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py, line 107, in setup | if(sys.version_info.major 3): | AttributeError: 'tuple' object has no attribute 'major' | dh_auto_clean: python2.6 setup.py clean -a returned exit code 1 | make: *** [clean] Error 1 in sid or in wheezy: | File setup.py, line 86, in module | cmdclass={'install': InstallAndUpdateDataDirectory} | File /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py, line 98, in setup | __requires(attrs, src_all) | File /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py, line 458, in __requires | __add_imports(imports, s, attrs) | File /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py, line 383, in __add_imports | if(sys.version_info.major 3): | AttributeError: 'tuple' object has no attribute 'major' | dh_auto_build: python2.6 setup.py build --force returned exit code 1 | make: *** [build] Error 1 doesn't happen in these packages themselves but: # ls -l /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py lrwxrwxrwx 1 root root 49 Aug 3 11:57 /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py - ../../../../share/pyshared/DistUtilsExtra/auto.py # readlink -f /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py /usr/share/pyshared/DistUtilsExtra/auto.py # dpkg -S /usr/share/pyshared/DistUtilsExtra/auto.py python-distutils-extra: /usr/share/pyshared/DistUtilsExtra/auto.py Should the bugs be reassigned? Someone with python knowledge needed here :) Yes, this is true, this does not happen in the respective packages, see my initial comment for #682634[1], but I was not fully clear there :). In the commit referenced there, it was introduced the test for sys.version_info.major 3. [1]: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=682634#10 [2]: http://bazaar.launchpad.net/~python-distutils-extra-hackers/python-distutils-extra/debian/revision/295 What I do not yet understand, is why it still uses python2.6 for both packages: at least nautilus-image-manipulator depends on python, which now defaults to 2.7, so some other dependencies brings in python2.6? [I did a rebuild of all packages which build-depends on python-distutils-extra, and these two seem the only two FTBFS with the above.] But again, I only did a first look so my initial disclaimer still holds :) Thanks for looking too at it Gregor. Regards, Salvatore signature.asc Description: Digital signature
Processed: closing 683151
Processing commands for cont...@bugs.debian.org: close 683151 Bug #683151 [telepathy-mission-control-5] telepathy-mission-control-5: Random crashes due to access to freed memory Marked Bug as done thanks Stopping processing here. Please contact me if you need assistance. -- 683151: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683151 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#682631: Bug#682634: Bug#682631: linaro-image-tools: FTBFS: AttributeError: 'tuple' object has no attribute 'major'
On Fri, 10 Aug 2012 15:52:43 +0200, Salvatore Bonaccorso wrote: What I do not yet understand, is why it still uses python2.6 for both packages: at least nautilus-image-manipulator depends on python, which now defaults to 2.7, so some other dependencies brings in python2.6? In the chroot when the build fails: # aptitude why python2.6 i pbuilder-satisfydepends-dummy Depends python-nose i A python-nose Depends python2.6 But then again, it also shouldn't fail if python2.6 is installed by accident on the build system. But again, I only did a first look so my initial disclaimer still holds :) Same here :) Thanks for looking too at it Gregor. The perl group makes an expidition into python land? Let's see if this is successful :) Cheers, gregor -- .''`. Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06 : :' : Debian GNU/Linux user, admin, and developer - http://www.debian.org/ `. `' Member of VIBE!AT SPI, fellow of the Free Software Foundation Europe `- NP: Pink Floyd: Time signature.asc Description: Digital signature
Bug#684506: FTBFS: quilt patches don't apply after unpack
Package: accountsservice Version: 0.6.21-6 Severity: serious In an attempt to rebuild your package, a simple dget -x fails: dget -qx http://cdn.debian.net/debian/pool/main/a/accountsservice/accountsservice_0.6.21-6.dsc 2012-08-10 16:18:07 URL:http://cdn.debian.net/debian/pool/main/a/accountsservice/accountsservice_0.6.21-6.dsc [2419/2419] - accountsservice_0.6.21-6.dsc [1] 2012-08-10 16:18:07 URL:http://cdn.debian.net/debian/pool/main/a/accountsservice/accountsservice_0.6.21.orig.tar.gz [99198/99198] - accountsservice_0.6.21.orig.tar.gz [1] 2012-08-10 16:18:07 URL:http://cdn.debian.net/debian/pool/main/a/accountsservice/accountsservice_0.6.21-6.debian.tar.gz [38824/38824] - accountsservice_0.6.21-6.debian.tar.gz [1] accountsservice_0.6.21-6.dsc: Good signature found validating accountsservice_0.6.21.orig.tar.gz validating accountsservice_0.6.21-6.debian.tar.gz All files validated successfully. dpkg-source: info: extracting accountsservice in accountsservice-0.6.21 dpkg-source: info: unpacking accountsservice_0.6.21.orig.tar.gz dpkg-source: info: unpacking accountsservice_0.6.21-6.debian.tar.gz dpkg-source: info: applying 0001-formats-locale-property.patch dpkg-source: info: applying 0002-create-and-manage-groups-like-on-a-ubuntu-system.patch dpkg-source: info: applying 0005-gdm_config_file_path_ubuntu.patch dpkg-source: info: applying 0006-adduser_instead_of_useradd.patch dpkg-source: info: applying 0007-add-lightdm-support.patch dpkg-source: info: applying 0008-nopasswdlogin-group.patch dpkg-source: info: applying 0009-language-tools.patch dpkg-source: info: applying 0010-set-language.patch patching file src/user.c Hunk #1 FAILED at 114. Hunk #2 succeeded at 1852 (offset 1659 lines). Hunk #3 FAILED at 1091. Hunk #4 FAILED at 1098. Hunk #5 FAILED at . Hunk #6 FAILED at 1162. Hunk #7 FAILED at 1175. 6 out of 7 hunks FAILED -- saving rejects to file src/user.c.rej dpkg-source: error: LC_ALL=C patch -t -F 0 -N -p1 -u -V never -g0 -E -b -B .pc/0010-set-language.patch/ accountsservice-0.6.21/debian/patches/0010-set-language.patch gave error exit status 1 Best, Michael pgpaBw3OFrgou.pgp Description: PGP signature
Processed: bug 680806 is forwarded to http://rt.cpan.org/Public/Bug/Display.html?id=78891
Processing commands for cont...@bugs.debian.org: forwarded 680806 http://rt.cpan.org/Public/Bug/Display.html?id=78891 Bug #680806 [src:libio-async-loop-glib-perl] libio-async-loop-glib-perl: FTBFS: tests failed Set Bug forwarded-to-address to 'http://rt.cpan.org/Public/Bug/Display.html?id=78891'. thanks Stopping processing here. Please contact me if you need assistance. -- 680806: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680806 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#684463: condor fails to install if condor user already exists
Hi, On Fri, Aug 10, 2012 at 10:30:36AM +0200, Tiziano Zito wrote: Package: condor Version: 7.8.1~dfsg.1-1~nd12.04+1 Where does this version come from? Debian has 7.8.1~dfsg.1-2 in Wheezy and Sid. when I try to install condor on a machine where the condor user already exists (either because the machine uses LDAP authentication and condor user is in LDAP or because I am just re-installing or upgrading condor), the configuration step fails with: Setting up condor (7.8.1~dfsg.1-1~nd60+1) ... adduser: The user `condor' already exists. Exiting. dpkg: error processing condor (--configure): subprocess installed post-installation script returned error exit status 1 This does not happen with 7.8.1~dfsg.1-2 on my machine. The user is created once and then adduser silently ignores the calls because of the --system switch. this happens on squeeze, wheezy and ubuntu precise... Squeeze and Precise do not even have a condor package... I would close the bug as non-existing, but awaiting your reply first. Regards Evgeni -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: bug 680790 is forwarded to http://rt.cpan.org/Public/Bug/Display.html?id=78892
Processing commands for cont...@bugs.debian.org: forwarded 680790 http://rt.cpan.org/Public/Bug/Display.html?id=78892 Bug #680790 [src:libio-async-loop-epoll-perl] libio-async-loop-epoll-perl: FTBFS: tests failed Set Bug forwarded-to-address to 'http://rt.cpan.org/Public/Bug/Display.html?id=78892'. thanks Stopping processing here. Please contact me if you need assistance. -- 680790: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680790 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#680790: Update for libio-async-loop-*-perl bugs
1) I've forwarded both bug reports upstream now. 2) Both packages have no reverse (build) dependencies and a low popcon, so removing them from wheezy would be no desaster. Cheers, gregor -- .''`. Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06 : :' : Debian GNU/Linux user, admin, and developer - http://www.debian.org/ `. `' Member of VIBE!AT SPI, fellow of the Free Software Foundation Europe `- NP: Bob Dylan: Lonesome Day Blues signature.asc Description: Digital signature
Bug#684463: condor fails to install if condor user already exists
On Fri, Aug 10, 2012 at 05:41:21PM +0200, Evgeni Golov wrote: Hi, On Fri, Aug 10, 2012 at 10:30:36AM +0200, Tiziano Zito wrote: Package: condor Version: 7.8.1~dfsg.1-1~nd12.04+1 Where does this version come from? Debian has 7.8.1~dfsg.1-2 in Wheezy and Sid. It seems to come from http://neuro.debian.net and to be a backport of 7.8.1~dfsg.1-1. It has the very same postinst script as the Debian version and it should really not fail. Unless the user is not a system user. Is your condor user a regular LDAP user? -- Bruce Schneier can read and understand Perl programs. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#684454: ruby-actionpack-3.2: CVE-2012-3463 / CVE-2012-3464 / CVE-2012-3465
clone 684454 -1 reassign -1 ruby-activesupport-3.2 retitle -1 ruby-activesupport-3.2: CVE-2012-3464 thanks Moritz Muehlenhoff escreveu isso aí: Package: ruby-actionpack-3.2 Severity: grave Tags: security Justification: user security hole Please see CVE-2012-3465 http://www.openwall.com/lists/oss-security/2012/08/09/9 CVE-2012-3464 http://www.openwall.com/lists/oss-security/2012/08/09/10 CVE-2012-3463 http://www.openwall.com/lists/oss-security/2012/08/09/8 Since Wheezy is frozen, please use the isolated patches instead of updating to 3.2.8 the patch for CVE-2012-3464 has to be split between ruby-actionpack-3.2 and ruby-activesupport-3.2. I am working on this, expect uploads RSN. -- Antonio Terceiro terce...@debian.org signature.asc Description: Digital signature
Processed: Bug#684454: ruby-actionpack-3.2: CVE-2012-3463 / CVE-2012-3464 / CVE-2012-3465
Processing commands for cont...@bugs.debian.org: clone 684454 -1 Bug #684454 [ruby-actionpack-3.2] ruby-actionpack-3.2: CVE-2012-3463 / CVE-2012-3464 / CVE-2012-3465 Bug 684454 cloned as bug 684517 reassign -1 ruby-activesupport-3.2 Bug #684517 [ruby-actionpack-3.2] ruby-actionpack-3.2: CVE-2012-3463 / CVE-2012-3464 / CVE-2012-3465 Bug reassigned from package 'ruby-actionpack-3.2' to 'ruby-activesupport-3.2'. Ignoring request to alter found versions of bug #684517 to the same values previously set Ignoring request to alter fixed versions of bug #684517 to the same values previously set retitle -1 ruby-activesupport-3.2: CVE-2012-3464 Bug #684517 [ruby-activesupport-3.2] ruby-actionpack-3.2: CVE-2012-3463 / CVE-2012-3464 / CVE-2012-3465 Changed Bug title to 'ruby-activesupport-3.2: CVE-2012-3464' from 'ruby-actionpack-3.2: CVE-2012-3463 / CVE-2012-3464 / CVE-2012-3465' thanks Stopping processing here. Please contact me if you need assistance. -- 684454: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684454 684517: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684517 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: severity of 682034 is grave
Processing commands for cont...@bugs.debian.org: severity 682034 grave Bug #682034 [src:python2.7] Add Breaks 2:7.3.547-4 for vim-{nox,gtk,gnome,athena} Severity set to 'grave' from 'important' thanks Stopping processing here. Please contact me if you need assistance. -- 682034: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=682034 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#682034: Bug#681599: vim/python2.7: symbol lookup error: vim: undefined symbol: init_hashlib
On Tuesday, July 24, 2012 06:52:13 AM James McCoy wrote: On Wed, Jul 18, 2012 at 09:35:28AM +0200, Jakub Wilk wrote: Plan B == In any order: - Fix vim build not to link config.c into the binary. (I attached a proposed patch.) I've uploaded Vim 2:7.3.547-4. - Fix python2.7 symbols. Add Breaks for each provider of vim-python. Please add Breaks for vim-nox, vim-athena, vim-gtk, and vim-gnome accordingly in your next python2.7 upload. This is more than just breaks, it's also identifying the changes that caused the symbol issues and getting them resolved. Bumped to grave since this breaks other packages. Scott K signature.asc Description: This is a digitally signed message part.
Bug#684454: marked as done (ruby-actionpack-3.2: CVE-2012-3463 / CVE-2012-3464 / CVE-2012-3465)
Your message dated Fri, 10 Aug 2012 17:32:14 + with message-id e1szt4i-0003je...@franck.debian.org and subject line Bug#684454: fixed in ruby-actionpack-3.2 3.2.6-4 has caused the Debian Bug report #684454, regarding ruby-actionpack-3.2: CVE-2012-3463 / CVE-2012-3464 / CVE-2012-3465 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 684454: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684454 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: ruby-actionpack-3.2 Severity: grave Tags: security Justification: user security hole Please see CVE-2012-3465 http://www.openwall.com/lists/oss-security/2012/08/09/9 CVE-2012-3464 http://www.openwall.com/lists/oss-security/2012/08/09/10 CVE-2012-3463 http://www.openwall.com/lists/oss-security/2012/08/09/8 Since Wheezy is frozen, please use the isolated patches instead of updating to 3.2.8 Cheers, Moritz ---End Message--- ---BeginMessage--- Source: ruby-actionpack-3.2 Source-Version: 3.2.6-4 We believe that the bug you reported is fixed in the latest version of ruby-actionpack-3.2, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 684...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Antonio Terceiro terce...@debian.org (supplier of updated ruby-actionpack-3.2 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 10 Aug 2012 13:08:08 -0300 Source: ruby-actionpack-3.2 Binary: ruby-actionpack-3.2 Architecture: source all Version: 3.2.6-4 Distribution: unstable Urgency: high Maintainer: Debian Ruby Extras Maintainers pkg-ruby-extras-maintain...@lists.alioth.debian.org Changed-By: Antonio Terceiro terce...@debian.org Description: ruby-actionpack-3.2 - web-flow and rendering framework putting the VC in MVC (part of R Closes: 684454 Changes: ruby-actionpack-3.2 (3.2.6-4) unstable; urgency=high . * Add patches for security problems (Closes: #684454): + CVE-2012-3463 - Ruby on Rails Potential XSS Vulnerability in select_tag prompt + CVE-2012-3465 - XSS Vulnerability in strip_tags + Both patches were edited from their original versions in two ways: - the leading a/ and b/ from the filenames were stripped - changes over test files were removed, since the Debian package contains no test files. Checksums-Sha1: 38d9541007135c215ea4a6c3de5517638d33e6e8 1683 ruby-actionpack-3.2_3.2.6-4.dsc c598b0bc82b33735f7061846ebee54a212eb2808 4307 ruby-actionpack-3.2_3.2.6-4.debian.tar.gz d1ecf1fe0596cc5e714a28fd9e93c4dd5dd3f85f 387618 ruby-actionpack-3.2_3.2.6-4_all.deb Checksums-Sha256: f110bcba58e48a2aad548830c892d661c63113fb5a1c5b182d9741dfd66fc697 1683 ruby-actionpack-3.2_3.2.6-4.dsc 2e1266853a1ffd22e456bbad283b0fdcf1eb04b1f1b92fe9f863f164b588844a 4307 ruby-actionpack-3.2_3.2.6-4.debian.tar.gz c5bd73bbf085d8059fb3ff4459d19aa97380aa0a6ae9442f41184ec27aaa0d21 387618 ruby-actionpack-3.2_3.2.6-4_all.deb Files: d1b71c00580f03e8d8bd9c9140d0a51a 1683 ruby optional ruby-actionpack-3.2_3.2.6-4.dsc 9baaa0b914285aef6f15de0c52ad78a5 4307 ruby optional ruby-actionpack-3.2_3.2.6-4.debian.tar.gz 5029f55804c25a69d7fcf345d1439a8b 387618 ruby optional ruby-actionpack-3.2_3.2.6-4_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iEYEARECAAYFAlAlQtMACgkQDOM8kQ+cso8q3QCdGRsTvclVtO4dTxFfFgKxDZol AQwAnj3QNOWjvuluYm/xKviLrlpZZSLG =ZyG4 -END PGP SIGNATUREEnd Message---
Bug#684517: marked as done (ruby-activesupport-3.2: CVE-2012-3464)
Your message dated Fri, 10 Aug 2012 17:47:10 + with message-id e1sztik-0004kk...@franck.debian.org and subject line Bug#684517: fixed in ruby-activesupport-3.2 3.2.6-4 has caused the Debian Bug report #684517, regarding ruby-activesupport-3.2: CVE-2012-3464 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 684517: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684517 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: ruby-actionpack-3.2 Severity: grave Tags: security Justification: user security hole Please see CVE-2012-3465 http://www.openwall.com/lists/oss-security/2012/08/09/9 CVE-2012-3464 http://www.openwall.com/lists/oss-security/2012/08/09/10 CVE-2012-3463 http://www.openwall.com/lists/oss-security/2012/08/09/8 Since Wheezy is frozen, please use the isolated patches instead of updating to 3.2.8 Cheers, Moritz ---End Message--- ---BeginMessage--- Source: ruby-activesupport-3.2 Source-Version: 3.2.6-4 We believe that the bug you reported is fixed in the latest version of ruby-activesupport-3.2, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 684...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Antonio Terceiro terce...@debian.org (supplier of updated ruby-activesupport-3.2 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 10 Aug 2012 14:10:41 -0300 Source: ruby-activesupport-3.2 Binary: ruby-activesupport-3.2 Architecture: source all Version: 3.2.6-4 Distribution: unstable Urgency: high Maintainer: Debian Ruby Extras Maintainers pkg-ruby-extras-maintain...@lists.alioth.debian.org Changed-By: Antonio Terceiro terce...@debian.org Description: ruby-activesupport-3.2 - Support and utility classes used by the Rails 3.2 framework Closes: 684517 Changes: ruby-activesupport-3.2 (3.2.6-4) unstable; urgency=high . * debian/patches/CVE-2012-3464.patch: fixes potential XSS vulnerability. CVE-2012-3464 (Closes: #684517). Checksums-Sha1: b14ea6293b9c2a1c0b826206509e7f905a81e22e 1601 ruby-activesupport-3.2_3.2.6-4.dsc 9d2789a1a12d777c8be2b495d33f5ef461f5e31d 3182 ruby-activesupport-3.2_3.2.6-4.debian.tar.gz 863542bd6a399a9b0c295dc4728ad0782bd21e27 322474 ruby-activesupport-3.2_3.2.6-4_all.deb Checksums-Sha256: 41dfc5cd1a23c4845ed0fe72f4cba6bca495ceb342c9ef7e2eb97357d06d5cce 1601 ruby-activesupport-3.2_3.2.6-4.dsc 602a5dd2eaac99b170af8dd44acdec3e41447fce8a2c93f24e69dd42adddf837 3182 ruby-activesupport-3.2_3.2.6-4.debian.tar.gz 3d5c9b1dfdb6103c01011b4185682d9a6670721e20eea706e20bd7b483780af6 322474 ruby-activesupport-3.2_3.2.6-4_all.deb Files: 333db4118671642ea143f9fb81e5fb20 1601 ruby optional ruby-activesupport-3.2_3.2.6-4.dsc 790bafee9f67372b209e4cb8f2f577ab 3182 ruby optional ruby-activesupport-3.2_3.2.6-4.debian.tar.gz 5f171c36977fbd3be310f101b14430cb 322474 ruby optional ruby-activesupport-3.2_3.2.6-4_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iEYEARECAAYFAlAlRMQACgkQDOM8kQ+cso+uuACbBtv+U7rLt50jpL9uvwcHoxqn yIMAn3V3m88Ut8zYwAdKkife40b6lbG9 =uAXT -END PGP SIGNATUREEnd Message---
Bug#684463: condor fails to install if condor user already exists
Package: condor Version: 7.8.1~dfsg.1-1~nd12.04+1 Where does this version come from? Debian has 7.8.1~dfsg.1-2 in Wheezy and Sid. It seems to come from http://neuro.debian.net and to be a backport of 7.8.1~dfsg.1-1. Sorry for not mentioning it, I quickly checked on two different machines, but both were using the neuro.debian repos... It has the very same postinst script as the Debian version and it should really not fail. Unless the user is not a system user. Is your condor user a regular LDAP user? Yes, it has UID 1000 as suggested by pam_ldap. Why should the condor user be a system user? for one, it requires a valid email address if you want email sent by condor not being tagged as SPAM by overzealous SPAM filters. And if you use LDAP for authentication you typically use it for email too, so the condor user naturally fits as a non-system LDAP user. Couldn't this check be lifted altogether, or at least give the possibility to set UID and GID of the condor user on installation? Thank you for your quick reply! Tiziano -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#681680: mediathekview: finds only 1376 out of 57537 movies
Here is a short summary what has happened so far. - I built mediathekview-3.0.0 successfully on Sid - Now i am trying to improve the package and i am doing some tests - I am in contact with the upstream developer of mediathekview who is responsive and helpful. - He is even working on a patch which adresses this bug report. I will try it out at the weekend and report back. signature.asc Description: OpenPGP digital signature
Bug#684463: condor fails to install if condor user already exists
Hi, On Fri, Aug 10, 2012 at 08:07:28PM +0200, Tiziano Zito wrote: Package: condor Version: 7.8.1~dfsg.1-1~nd12.04+1 Where does this version come from? Debian has 7.8.1~dfsg.1-2 in Wheezy and Sid. It seems to come from http://neuro.debian.net and to be a backport of 7.8.1~dfsg.1-1. Sorry for not mentioning it, I quickly checked on two different machines, but both were using the neuro.debian repos... About which you theoreticaly should not fill bugs into the Debian BTS, as these aren't Debian packages. But given these are rebuilds only, lets see what we can do for you :) [ condor maintainer might disagree here ] It has the very same postinst script as the Debian version and it should really not fail. Unless the user is not a system user. Is your condor user a regular LDAP user? Yes, it has UID 1000 as suggested by pam_ldap. Why should the condor user be a system user? for one, it requires a valid email address if you want email sent by condor not being tagged as SPAM by overzealous SPAM filters. And if you use LDAP for authentication you typically use it for email too, so the condor user naturally fits as a non-system LDAP user. Couldn't this check be lifted altogether, or at least give the possibility to set UID and GID of the condor user on installation? Well, users created for packages should be created as system users. No idea how the fact of being a system user might play into your spam issue. I have little clue about LDAP and no clue about condor (just stumbled over the bug while RC-bughunting), but I would say you should not have a condor user in your LDAP and let it be a lonely local user created by adduser. If you want condor@host to work, add an alias or something. However, these are my two cheap cents, maintainers might disagree here. -- Bruce Schneier can read and understand Perl programs. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#677054: nut-client: prompting due to modified conffiles which were not modified by the user
Hi, I'm tempted to close that bug as WONTFIX. The original issue is IMHO that the post-install script is modifying nut.conf in the version present in squeeze (see #684392). I see no easy way (not involving a dirty hack[0]) to fix this. Moreover it's very unlikely that the user has NOT modified that file himself already, as it controls which daemon should be started on the system. Cheers Laurent Bigonville [0] The dirty hack would involve trying to undo the change made by the postinst script of the squeeze version in the preinst script. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#684527: openssl: CVE-2011-5095 - The remote SSL/TLS server accepts a weak Diffie-Hellman public value
Package: openssl Version: 0.9.8o-4squeeze13 Severity: grave Tags: security Justification: user security hole openssl in squeeze (at least up to 0.9.8o-4squeeze13) is vulnerable to CVE-2011-5095 [1]. For reference you might have a look at [2] - the problem seems to be that fips/dh/fips_dh_key.c does not incorporate a fix in crypto/dh/dh_key.c, namely calling DH_check_pub_key, like in [3]. As far as I can see the problem is gone in 1.0.1c - but I leave this bug open for unstable/testing so that it can be doublechecked by someone more versed in openssl. [1] http://security-tracker.debian.org/tracker/CVE-2011-5095 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5095 [2] http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-5095.html [3] http://cvs.openssl.org/chngview?cn=14375 cu AW -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (500, 'testing'), (500, 'stable'), (50, 'unstable'), (40, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.2.23 (SMP w/2 CPU cores; PREEMPT) Locale: LANG=C, LC_CTYPE=de_DE (charmap=ISO-8859-1) Shell: /bin/sh linked to /bin/dash Versions of packages openssl depends on: ii libc62.13-33 ii libssl1.0.0 1.0.1c-3 ii zlib1g 1:1.2.7.dfsg-13 openssl recommends no packages. Versions of packages openssl suggests: ii ca-certificates 20120623 -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#680814: marked as done (conduit: FTBFS: unable to parse es/conduit.xml)
Your message dated Fri, 10 Aug 2012 19:32:09 + with message-id e1szuwl-0008eh...@franck.debian.org and subject line Bug#680814: fixed in conduit 0.3.17-1.1 has caused the Debian Bug report #680814, regarding conduit: FTBFS: unable to parse es/conduit.xml to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 680814: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680814 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: conduit Version: 0.3.17-1 Severity: serious Tags: wheezy sid User: debian...@lists.debian.org Usertags: qa-ftbfs-20120708 qa-ftbfs Justification: FTBFS on amd64 Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part: make[2]: Entering directory `/«PKGBUILDDIR»/help' xsltproc -o conduit-C.omf --stringparam db2omf.basename conduit --stringparam db2omf.format 'docbook' --stringparam db2omf.dtd -//OASIS//DTD DocBook XML V4.1.2//EN --stringparam db2omf.lang C --stringparam db2omf.omf_dir /usr/share/omf --stringparam db2omf.help_dir /usr/share/gnome/help --stringparam db2omf.omf_in /«PKGBUILDDIR»/help/conduit.omf.in `/usr/bin/pkg-config --variable db2omf gnome-doc-utils` C/conduit.xml || { rm -f conduit-C.omf; exit 1; } xsltproc -o conduit-de.omf --stringparam db2omf.basename conduit --stringparam db2omf.format 'docbook' --stringparam db2omf.dtd -//OASIS//DTD DocBook XML V4.1.2//EN --stringparam db2omf.lang de --stringparam db2omf.omf_dir /usr/share/omf --stringparam db2omf.help_dir /usr/share/gnome/help --stringparam db2omf.omf_in /«PKGBUILDDIR»/help/conduit.omf.in `/usr/bin/pkg-config --variable db2omf gnome-doc-utils` de/conduit.xml || { rm -f conduit-de.omf; exit 1; } xsltproc -o conduit-el.omf --stringparam db2omf.basename conduit --stringparam db2omf.format 'docbook' --stringparam db2omf.dtd -//OASIS//DTD DocBook XML V4.1.2//EN --stringparam db2omf.lang el --stringparam db2omf.omf_dir /usr/share/omf --stringparam db2omf.help_dir /usr/share/gnome/help --stringparam db2omf.omf_in /«PKGBUILDDIR»/help/conduit.omf.in `/usr/bin/pkg-config --variable db2omf gnome-doc-utils` el/conduit.xml || { rm -f conduit-el.omf; exit 1; } xsltproc -o conduit-es.omf --stringparam db2omf.basename conduit --stringparam db2omf.format 'docbook' --stringparam db2omf.dtd -//OASIS//DTD DocBook XML V4.1.2//EN --stringparam db2omf.lang es --stringparam db2omf.omf_dir /usr/share/omf --stringparam db2omf.help_dir /usr/share/gnome/help --stringparam db2omf.omf_in /«PKGBUILDDIR»/help/conduit.omf.in `/usr/bin/pkg-config --variable db2omf gnome-doc-utils` es/conduit.xml || { rm -f conduit-es.omf; exit 1; } http://www.oasis-open.org/docbook/xml/4.1.2/dbhierx.mod:115: parser warning : PEReference: %list.class; not found %local.divcomponent.mix; ^ http://www.oasis-open.org/docbook/xml/4.1.2/dbhierx.mod:115: parser warning : PEReference: %admon.class; not found %local.divcomponent.mix; ^ http://www.oasis-open.org/docbook/xml/4.1.2/dbhierx.mod:115: parser warning : PEReference: %linespecific.class; not found %local.divcomponent.mix; ^ http://www.oasis-open.org/docbook/xml/4.1.2/dbhierx.mod:115: parser warning : PEReference: %synop.class; not found %local.divcomponent.mix; ^ http://www.oasis-open.org/docbook/xml/4.1.2/dbhierx.mod:115: parser warning : PEReference: %para.class; not found %local.divcomponent.mix; ^ http://www.oasis-open.org/docbook/xml/4.1.2/dbhierx.mod:115: parser warning : PEReference: %informal.class; not found %local.divcomponent.mix; ^ http://www.oasis-open.org/docbook/xml/4.1.2/dbhierx.mod:115: parser warning : PEReference: %formal.class; not found %local.divcomponent.mix; ^ http://www.oasis-open.org/docbook/xml/4.1.2/dbhierx.mod:115: parser warning : PEReference: %compound.class; not found %local.divcomponent.mix; ^ http://www.oasis-open.org/docbook/xml/4.1.2/dbhierx.mod:115: parser warning : PEReference: %genobj.class; not found %local.divcomponent.mix; ^ http://www.oasis-open.org/docbook/xml/4.1.2/dbhierx.mod:115: parser warning : PEReference: %descobj.class; not found
Bug#684528: elfutils: FTBFS with new dpkg-buildpackage due to build-arch split
Package: elfutils Version: 0.153-1 Severity: serious Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu quantal ubuntu-patch Due to a slight thinko (I assume), your build-arch/build-indep split leads elfutils to FTBFS with the new dpkg-buildpackage, which calls build-arch for arch-only builds. I uploaded the attached patch to Ubuntu, with the following changelog entry to resolve this: * Fix build-arch and build-indep targets to not require root. I think this follows the spirit of what you were trying to achieve, while making sure that the install target is only a dependency of targets that require root (ie: the binary* targets). ... Adam -- System Information: Debian Release: wheezy/sid APT prefers precise-updates APT policy: (500, 'precise-updates'), (500, 'precise-security'), (500, 'precise') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-27-generic (SMP w/4 CPU cores) Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash diff -Nru elfutils-0.153/debian/rules elfutils-0.153/debian/rules --- elfutils-0.153/debian/rules 2012-02-24 16:01:45.0 -0700 +++ elfutils-0.153/debian/rules 2012-08-10 13:16:08.0 -0600 @@ -87,12 +87,13 @@ rm debian/tmp/usr/include/elfutils/libebl.h # Build architecture-independent files here. -build-indep: build install -binary-indep: build-indep +build-indep: build +binary-indep: build-indep install # We have nothing to do. # Build architecture-dependent files here. -build-arch: build install +build-arch: build +binary-arch: build-arch install dh_testdir dh_testroot dh_installchangelogs ChangeLog @@ -113,7 +114,6 @@ dh_md5sums dh_builddeb -binary-arch: build-arch binary: binary-indep binary-arch maint-unpatch:
Processed: severity of 658702 is serious
Processing commands for cont...@bugs.debian.org: # breaks upgrades from squeeze severity 658702 serious Bug #658702 [libxml-sax-perl] libxml-sax-perl: update-perl-sax-parsers sometimes fails when called from old-prerm during squeeze-wheezy update Severity set to 'serious' from 'normal' thanks Stopping processing here. Please contact me if you need assistance. -- 658702: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=658702 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: severity of 658702 is normal
Processing commands for cont...@bugs.debian.org: # no, ignore me, the new prerm script does not have this problem severity 658702 normal Bug #658702 [libxml-sax-perl] libxml-sax-perl: update-perl-sax-parsers sometimes fails when called from old-prerm during squeeze-wheezy update Severity set to 'normal' from 'serious' thanks Stopping processing here. Please contact me if you need assistance. -- 658702: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=658702 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#684528: elfutils: FTBFS with new dpkg-buildpackage due to build-arch split
On Fri, Aug 10, 2012 at 01:34:39PM -0600, Adam Conrad wrote: Package: elfutils Version: 0.153-1 Severity: serious Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu quantal ubuntu-patch Due to a slight thinko (I assume), your build-arch/build-indep split leads elfutils to FTBFS with the new dpkg-buildpackage, which calls build-arch for arch-only builds. I uploaded the attached patch to Ubuntu, with the following changelog entry to resolve this: * Fix build-arch and build-indep targets to not require root. I think this follows the spirit of what you were trying to achieve, while making sure that the install target is only a dependency of targets that require root (ie: the binary* targets). So that change was part of the patch I got in #657139, and 0.152-1 (in testing) has things differently. Looking more carefully at the patch I applied, it doesn't make much sense. So I think testing is not affected. Testing it against the 0.153-1 version I can reproduce it. But the version in testing actually fails with an other error. Kurt -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#684527: [Pkg-openssl-devel] Bug#684527: openssl: CVE-2011-5095 - The remote SSL/TLS server accepts a weak Diffie-Hellman public value
On Fri, Aug 10, 2012 at 09:12:14PM +0200, Arne Wichmann wrote: Package: openssl Version: 0.9.8o-4squeeze13 Severity: grave Tags: security Justification: user security hole openssl in squeeze (at least up to 0.9.8o-4squeeze13) is vulnerable to CVE-2011-5095 [1]. For reference you might have a look at [2] - the problem seems to be that fips/dh/fips_dh_key.c does not incorporate a fix in crypto/dh/dh_key.c, namely calling DH_check_pub_key, like in [3]. This doesn't make any sense at all. This is a bug fixed in 0.9.8a in 2005. It only seem to be relavant for the fips version, which we never had. Unless someone can tell me why you think this affects anything in Debian, I'm just going to close it. Kurt As far as I can see the problem is gone in 1.0.1c - but I leave this bug open for unstable/testing so that it can be doublechecked by someone more versed in openssl. This doesn't make sense at all. You file it against the version in stable, but the version tracking will say this only affects stable because the version in testing/unstable is not based on the version in stable, they split at 0.9.8o-4. If you want to have this bug affect all versions you should have filed this against the 0.9.8o-4 version. Also, everything seems to indicate that 1.0 isn't affected at all. Kurt -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#683288: rt-authen-externalauth: privilege escalation
tag 683288 pending thanks On 30.07.2012 16:55, Yves-Alexis Perez wrote: For Wheezy, please fix this with an isolated fix instead of updating to a new upstream release (since the freeze is in effect) Fixed in git. Tom -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#684531: FTBFS: unknown type name bool
Package: cde Version: 0.1-1 Severity: serious In a recent local rebuild, your package failed to build in a wheezy build environment: Making all in tests make[4]: Entering directory `/root/build/cde/cde-0.1/strace-4.6/tests' make[4]: Nothing to be done for `all'. make[4]: Leaving directory `/root/build/cde/cde-0.1/strace-4.6/tests' make[4]: Entering directory `/root/build/cde/cde-0.1/strace-4.6' source='strace.c' object='strace.o' libtool=no \ DEPDIR=.deps depmode=gcc /bin/bash ./depcomp \ gcc -DHAVE_CONFIG_H -I. -I./linux/x86_64 -I./linux -I./linux -Wall -Wwrite-strings -Wl,--hash-style=both -g -O2 -fno-stack-protector -U_FORTIFY_SOURCE -D_GNU_SOURCE -c strace.c strace.c:128:1: error: unknown type name 'bool' strace.c: In function 'main': strace.c:836:9: warning: unused variable 'pid' [-Wunused-variable] strace.c: In function 'trace': strace.c:2792:15: warning: unused variable 'si' [-Wunused-variable] It seems that strace.c lacks a #include stdbool.h. Best, Michael pgpV8L2FUarrO.pgp Description: PGP signature
Bug#684423: marked as done (live-tools: Broken link ( /usr/sbin/update-initramfs - ../bin/live-update-initramfs ))
Your message dated Fri, 10 Aug 2012 21:02:46 + with message-id e1szwm2-0008tf...@franck.debian.org and subject line Bug#684423: fixed in live-tools 3.0.8-1 has caused the Debian Bug report #684423, regarding live-tools: Broken link ( /usr/sbin/update-initramfs - ../bin/live-update-initramfs ) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 684423: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684423 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: live-tools Version: 3.0.7-1 Severity: important Dear Maintainer, live-tools is shipped with broken link /usr/sbin/update-initramfs - ../bin/live-update-initramf which break an automatic initrd images generation and update. Changing the link to /usr/sbin/update-initramfs - /bin/live-update-initramf restores lost functionality. Best regards, Viktor Malyarchuk -- System Information: Debian Release: wheezy/sid APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'unstable'), (500, 'testing'), (500, 'stable'), (101, 'experimental') Architecture: i386 (i686) Kernel: Linux 3.5.0+ (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages live-tools depends on: ii initramfs-tools 0.107 ii procps 1:3.3.3-2 live-tools recommends no packages. Versions of packages live-tools suggests: ii debian-installer-launcher 13 ii perl 5.14.2-12 ii rsync 3.0.9-3 -- no debconf information ---End Message--- ---BeginMessage--- Source: live-tools Source-Version: 3.0.8-1 We believe that the bug you reported is fixed in the latest version of live-tools, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 684...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Daniel Baumann dan...@debian.org (supplier of updated live-tools package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 10 Aug 2012 22:27:08 +0200 Source: live-tools Binary: live-tools Architecture: source all Version: 3.0.8-1 Distribution: unstable Urgency: low Maintainer: Debian Live Project debian-l...@lists.debian.org Changed-By: Daniel Baumann dan...@debian.org Description: live-tools - Debian Live - System Support Scripts Closes: 684423 Changes: live-tools (3.0.8-1) unstable; urgency=low . * Moving symlink from /usr/bin to /bin where live-update-initramfs actually resides now (Closes: #684423). Checksums-Sha1: f7db7abd1b40b1d1dc100f6c7e89fdb21229d991 1259 live-tools_3.0.8-1.dsc 9350c04ac5602c973bad7a6c39bb49d5f5502df3 19104 live-tools_3.0.8.orig.tar.xz 9316ef2658fe80d17dd19716b9e6de41eae9cc46 3956 live-tools_3.0.8-1.debian.tar.xz a8b7352146e60b94c8b5bc77af4852260bdc259f 11970 live-tools_3.0.8-1_all.deb Checksums-Sha256: 372fc76f197e66020c381bf158831cd8bfe813347bf5d78a34110bf9ce36bc15 1259 live-tools_3.0.8-1.dsc 2947f8ca1874220cb65f2fe45bac06d2a12cf60c958ee68c9a535b2de4580603 19104 live-tools_3.0.8.orig.tar.xz a10aed0eb7b0fdfd6e787ebf281f2636a7e71be764105503154cf5fc607da2dd 3956 live-tools_3.0.8-1.debian.tar.xz 5cfa2d5ff0da47175c5f619afd53fe02cf53d9efd1f3b68798a00d54c1672e00 11970 live-tools_3.0.8-1_all.deb Files: b2f05343cf35134bd30b6b7efacb8ed7 1259 misc optional live-tools_3.0.8-1.dsc e6ac8987a622bf6d4c0ab1aab53a5a09 19104 misc optional live-tools_3.0.8.orig.tar.xz dd02b857e5939deef93a9afac7d1d7c7 3956 misc optional live-tools_3.0.8-1.debian.tar.xz 140b2ecdf73f6b253db0e84356975b80 11970 misc optional live-tools_3.0.8-1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAlAlcGUACgkQ+C5cwEsrK56PIwCfR0UGZjx9NQW2Q8t3VghJDfsC DiAAn3z9HGaMtgGjpG4NAT4AvK5Wy8RC =k/Yd -END PGP SIGNATUREEnd Message---
Bug#684456: marked as done (qpid-cpp: CVE-2012-3467)
Your message dated Fri, 10 Aug 2012 21:03:03 + with message-id e1szwmj-6q...@franck.debian.org and subject line Bug#684456: fixed in qpid-cpp 0.16-7 has caused the Debian Bug report #684456, regarding qpid-cpp: CVE-2012-3467 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 684456: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684456 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: qpid-cpp Severity: grave Tags: security Justification: user security hole Please see http://www.openwall.com/lists/oss-security/2012/08/09/6 Since we're in freeze, please fix this with an isolated patch. Cheers, Moritz ---End Message--- ---BeginMessage--- Source: qpid-cpp Source-Version: 0.16-7 We believe that the bug you reported is fixed in the latest version of qpid-cpp, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 684...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Cajus Pollmeier ca...@debian.org (supplier of updated qpid-cpp package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 10 Aug 2012 20:39:06 +0200 Source: qpid-cpp Binary: qpidd qpid-client libqmf1 libqmf-dev libqmf2-1 libqmf2-dev libqmfconsole2 libqmfconsole2-dev libqpidmessaging2 libqpidmessaging2-dev libsslcommon2 libsslcommon2-dev librdmawrap2 librdmawrap2-dev libqpidtypes1 libqpidtypes1-dev libqpidcommon2 libqpidcommon2-dev libqpidclient2 libqpidclient2-dev libqpidbroker2 libqpidbroker2-dev libqmfengine1 libqmfengine1-dev python-cqpid python-qmf2 python-cqmf2 python-qmf qmfgen qpid-doc ruby-qpid libqpid-ruby1.8 libqpid-perl Architecture: source amd64 all Version: 0.16-7 Distribution: unstable Urgency: low Maintainer: Cajus Pollmeier ca...@debian.org Changed-By: Cajus Pollmeier ca...@debian.org Description: libqmf-dev - enterprise messaging system - QMF development files libqmf1- enterprise messaging system - QMF libraries libqmf2-1 - enterprise messaging system - QMF2 libraries libqmf2-dev - enterprise messaging system - QMF2 development files libqmfconsole2 - enterprise messaging system - QMF console library libqmfconsole2-dev - enterprise messaging system - QMF console development files libqmfengine1 - enterprise messaging system - QMF engine libraries libqmfengine1-dev - enterprise messaging system - QMF engine development files libqpid-perl - enterprise messaging system - Perl bindings libqpid-ruby1.8 - Transitional package for ruby-qpid libqpidbroker2 - enterprise messaging system - broker libraries libqpidbroker2-dev - enterprise messaging system - broker development files libqpidclient2 - enterprise messaging system - client libraries libqpidclient2-dev - enterprise messaging system - client development files libqpidcommon2 - enterprise messaging system - common libraries libqpidcommon2-dev - enterprise messaging system - common development files libqpidmessaging2 - enterprise messaging system - AMQP messaging libraries libqpidmessaging2-dev - enterprise messaging system - AMQP messaging development files libqpidtypes1 - enterprise messaging system - API libraries libqpidtypes1-dev - enterprise messaging system - API development files librdmawrap2 - enterprise messaging system - RDMA libraries librdmawrap2-dev - enterprise messaging system - RDMA development files libsslcommon2 - enterprise messaging system - common SSL libraries libsslcommon2-dev - enterprise messaging system - common SSL development files python-cqmf2 - enterprise messaging system - Python CQMF2 bindings python-cqpid - enterprise messaging system - Python CQPID bindings python-qmf - enterprise messaging system - Python QMF module python-qmf2 - enterprise messaging system - Python QMF2 bindings qmfgen - enterprise messaging system - Python QMF interface generator qpid-client - enterprise messaging system - AMQP client qpid-doc - enterprise messaging system - documentation and examples qpidd - enterprise messaging system - AMQP broker ruby-qpid - enterprise messaging system - Ruby bindings Closes: 684456 Changes: qpid-cpp (0.16-7) unstable; urgency=low . * Fixes security issue CVE-2012-3467
Bug#684533: Fwd: RDF::TrineShortcuts - deprecation
Package: librdf-trineshortcuts-perl Version: 0.104-1 Severity: serious Please see the below email from the upstream developer. Given this, I suppose this package shouldn't make it to Wheezy when it is stable. If I'm wrong, please feel free to close. Cheers, Kjetil -- Forwarded Message -- Subject: RDF::TrineShortcuts - deprecation Date: Wednesday 30. May 2012, 09.11.32 From: Toby Inkster m...@tobyinkster.co.uk To: d...@lists.perlrdf.org RDF::TrineShortcuts is a pretty nasty hack, and many of the reasons for its existence are no longer valid. For example, at the time I wrote it, RDF::Trine didn't have support for auto-detecting the serialization of a URL or file and parsing it; now it does. Anyway, it should be considered strongly deprecated. It will be deleted from CPAN at some point later this year (though will still be available from BackPAN). I just need to rework a few modules that currently depend on it. -- Toby A Inkster mailto:m...@tobyinkster.co.uk http://tobyinkster.co.uk ___ Dev mailing list d...@lists.perlrdf.org http://lists.perlrdf.org/listinfo/dev - -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#684535: hyperestraier: FTBFS on s390x
Source: hyperestraier Version: 1.4.13-7 Severity: serious Justification: fails to build from source Hi, hyperestraier FTBFS on s390. https://buildd.debian.org/status/fetch.php?pkg=hyperestraierarch=s390xver=1.4.13-7stamp=1343612759 - ./estcmd: INFO: [325:220]: search: 0 hits ./estcmd: INFO: [332:226]: search: 0 hits ./estcmd: INFO: flushing index words: name=casket dnum=230 wnum=1 fsiz=7066382 crnum=17860 csiz=1353273 dknum=2221 ./estcmd: INFO: [342:232]: attr: file:///tmp/wicked-0267-12275.est ./estcmd: INFO: [354:243]: search: 0 hits ./estcmd: INFO: [355:243]: search: 2 hits ./estcmd: INFO: [363:247]: search: 0 hits ./estcmd: INFO: [365:248]: attr: file:///tmp/wicked-0152-12275.est ./estcmd: INFO: [367:248]: search: 0 hits ./estcmd: INFO: [370:248]: out make: *** [build-arch-stamp] Terminated ./estcmd: INFO: the termination signal 15 catched ./estcmd: INFO: the termination signal 15 catched Build killed with signal TERM after 150 minutes of inactivity Build killed with signal KILL after 5 minutes of inactivity - Please check your package. Best regards, Nobuhiro -- Nobuhiro Iwamatsu iwamatsu at {nigauri.org / debian.org} GPG ID: 40AD1FA6 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#684315: Fwd: A thinkfan 0.8 bug and a patch
OK, I recently received a sysfs-fix.diff, which looks correct to me. I've fixed the problem in a different way though, on git.sf.net. My patches are larger, but they should waste less CPU time. The second one fixes a potential bug in the parser. I'll also make this the 0.8.1 release. Hope that works for debian^^ Original Message Subject:A thinkfan 0.8 bug and a patch Date: Sat, 14 Jul 2012 21:15:54 -0400 From: M. Vefa Bicakci m@runbox.com To: mat...@lih.rwth-aachen.de Dear Victor Matare, I have found a bug in thinkfan 0.8 regarding the handling of sysfs files. I am using a 32-bit Debian Sid installation, up-to-date as of today, on a Thinkpad T420. In summary, instead of writing only the string form of an integer to a sysfs pwm fan control file, thinkfan 0.8 writes the string level integer. As you will predict, this causes the kernel to report an error, which causes thinkfan to terminate. I am attaching a patch which fixes this issue. Even though the way I convert the level integer to a string is a bit crude, the patch fixes the bug. Thank you, M. Vefa Bicakci Index: thinkfan-0.8.0/globaldefs.h === --- thinkfan-0.8.0.orig/globaldefs.h 2012-05-10 14:37:34.0 -0400 +++ thinkfan-0.8.0/globaldefs.h 2012-07-14 20:54:27.188026323 -0400 @@ -95,7 +95,7 @@ struct tf_config *config; unsigned long int errcnt; -int *temps, tmax, last_tmax, lvl_idx, *b_tmax, line_count; +int *temps, tmax, last_tmax, cur_nlvl, lvl_idx, *b_tmax, line_count; unsigned int chk_sanity, watchdog_timeout, num_temps; char *config_file, *prefix, *rbuf, *cur_lvl, Index: thinkfan-0.8.0/system.c === --- thinkfan-0.8.0.orig/system.c 2012-05-10 14:37:34.0 -0400 +++ thinkfan-0.8.0/system.c 2012-07-14 20:56:06.332031818 -0400 @@ -249,14 +249,20 @@ * Set fan speed (sysfs interface). ***/ void setfan_sysfs() { - int fan, l = strlen(cur_lvl); + #define INT_STR_SIZE 128 + int fan, l; + char buf[INT_STR_SIZE]; - if (unlikely((fan = open(config-fan, O_WRONLY)) 0)) { + if (unlikely((l = snprintf(buf, INT_STR_SIZE, %d, cur_nlvl)) = INT_STR_SIZE)) { + report(LOG_ERR, LOG_ERR, %d is too large!\n, cur_nlvl); + errcnt++; + } + else if (unlikely((fan = open(config-fan, O_WRONLY)) 0)) { report(LOG_ERR, LOG_ERR, %s: %s\n, config-fan, strerror(errno)); errcnt++; } else { - if (unlikely(write(fan, cur_lvl, l) l)) { + if (unlikely(write(fan, buf, l) l)) { report(LOG_ERR, LOG_ERR, MSG_ERR_FANCTRL); errcnt++; } Index: thinkfan-0.8.0/thinkfan.c === --- thinkfan-0.8.0.orig/thinkfan.c 2012-05-10 14:37:34.0 -0400 +++ thinkfan-0.8.0/thinkfan.c 2012-07-14 20:54:27.191026323 -0400 @@ -37,6 +37,7 @@ unsigned int sleeptime, tmp_sleeptime; #define set_fan cur_lvl = config-limits[lvl_idx].level; \ + cur_nlvl = config-limits[lvl_idx].nlevel; \ if (!quiet nodaemon) \ report(LOG_DEBUG, LOG_DEBUG, MSG_DBG_T_STAT); \ config-setfan(); From 6de7d99e8cb95d15117454ffc5eea037bef54656 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Victor=20Matar=C3=A9?= mat...@lih.rwth-aachen.de Date: Fri, 10 Aug 2012 21:42:15 +0200 Subject: [PATCH 1/2] fix sysfs fan level string --- config.c |9 ++--- globaldefs.h |4 ++-- system.c |3 ++- thinkfan.c |3 +-- 4 files changed, 11 insertions(+), 8 deletions(-) diff --git a/config.c b/config.c index 9ccf794..2b34532 100644 --- a/config.c +++ b/config.c @@ -183,7 +183,7 @@ struct tf_config *readconfig(char* fname) { cfg_local-uninit_fan = uninit_fan_ibm; } - cur_lvl = cfg_local-limits[cfg_local-num_limits - 1].level; + lvl_idx = cfg_local-num_limits - 1; // configure sensor interface if (cfg_local-num_sensors 0 @@ -310,6 +310,8 @@ static int add_limit(struct tf_config *cfg, struct limit *limit) { long int tmp; char *end, *conv_lvl; + limit-sysfslevel = NULL; + // Check formatting of level string... tmp = strtol(limit-level, end, 0); if (tmp INT_MIN || tmp INT_MAX) { @@ -324,13 +326,13 @@ static int add_limit(struct tf_config *cfg, struct limit *limit) { } else if (*end == 0) { // just a number + limit-sysfslevel = limit-level; conv_lvl = calloc(7 + strlen(limit-level), sizeof(char)); snprintf(conv_lvl, 7 + strlen(limit-level), level %d, (int)tmp); - free(limit-level); limit-level = conv_lvl; limit-nlevel = (int)tmp; } - else if (sscanf(limit-level, level %d, (int * )tmp)) { + else if (sscanf(limit-level, level %d, (int *)tmp)) { limit-nlevel = (int)tmp; } else if
Processed: [bts-link] source package gnome-keyring
Processing commands for cont...@bugs.debian.org: # # bts-link upstream status pull for source package gnome-keyring # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html # user bts-link-upstr...@lists.alioth.debian.org Setting user to bts-link-upstr...@lists.alioth.debian.org (was bts-link-de...@lists.alioth.debian.org). # remote status report for #683655 (http://bugs.debian.org/683655) # Bug title: gnome-keyring: gpg passphrase cached forever # * http://bugzilla.gnome.org/show_bug.cgi?id=681081 # * remote status changed: UNCONFIRMED - RESOLVED # * remote resolution changed: (?) - FIXED # * closed upstream tags 683655 + fixed-upstream Bug #683655 [gnome-keyring] gnome-keyring: gpg passphrase cached forever Ignoring request to alter tags of bug #683655 to the same tags previously set usertags 683655 - status-UNCONFIRMED Usertags were: status-RESOLVED resolution-FIXED. Usertags are now: status-RESOLVED resolution-FIXED. usertags 683655 + status-RESOLVED resolution-FIXED Usertags were: status-RESOLVED resolution-FIXED. Usertags are now: status-RESOLVED resolution-FIXED. thanks Stopping processing here. Please contact me if you need assistance. -- 683655: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683655 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#684531: FTBFS: unknown type name bool
severity 684531 important tags 684531 +more-info thanks I just built it fine using cowbuilder in up-to-date amd64 wheezy and sid environments... so I guess this failure is somehow specific to your setup... full build log and build-depends versioning information would be of help. meanwhile, since failed to reproduce reducing severity It seems that strace.c lacks a #include stdbool.h. this one? $ grep -1 stdbool strace-4.6/defs.h #ifdef HAVE_STDBOOL_H #include stdbool.h #endif which ones again boils down to question why on your system ./configure decided that stdbool is empty, since in my case: $ grep stdbool cde_0.1-1_amd64.build checking for stdbool.h that conforms to C99... yes Cheers On Fri, 10 Aug 2012, Michael Tautschnig wrote: Package: cde Version: 0.1-1 Severity: serious In a recent local rebuild, your package failed to build in a wheezy build environment: Making all in tests make[4]: Entering directory `/root/build/cde/cde-0.1/strace-4.6/tests' make[4]: Nothing to be done for `all'. make[4]: Leaving directory `/root/build/cde/cde-0.1/strace-4.6/tests' make[4]: Entering directory `/root/build/cde/cde-0.1/strace-4.6' source='strace.c' object='strace.o' libtool=no \ DEPDIR=.deps depmode=gcc /bin/bash ./depcomp \ gcc -DHAVE_CONFIG_H -I. -I./linux/x86_64 -I./linux -I./linux -Wall -Wwrite-strings -Wl,--hash-style=both -g -O2 -fno-stack-protector -U_FORTIFY_SOURCE -D_GNU_SOURCE -c strace.c strace.c:128:1: error: unknown type name 'bool' strace.c: In function 'main': strace.c:836:9: warning: unused variable 'pid' [-Wunused-variable] strace.c: In function 'trace': strace.c:2792:15: warning: unused variable 'si' [-Wunused-variable] It seems that strace.c lacks a #include stdbool.h. Best, Michael -- Yaroslav O. Halchenko Postdoctoral Fellow, Department of Psychological and Brain Sciences Dartmouth College, 419 Moore Hall, Hinman Box 6207, Hanover, NH 03755 Phone: +1 (603) 646-9834 Fax: +1 (603) 646-1419 WWW: http://www.linkedin.com/in/yarik -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed (with 1 errors): Re: Bug#684531: FTBFS: unknown type name bool
Processing commands for cont...@bugs.debian.org: severity 684531 important Bug #684531 [cde] FTBFS: unknown type name bool Severity set to 'important' from 'serious' tags 684531 +more-info Unknown tag/s: more-info. Recognized are: patch wontfix moreinfo unreproducible fixed potato woody sid help security upstream pending sarge sarge-ignore experimental d-i confirmed ipv6 lfs fixed-in-experimental fixed-upstream l10n etch etch-ignore lenny lenny-ignore squeeze squeeze-ignore wheezy wheezy-ignore. Bug #684531 [cde] FTBFS: unknown type name bool Requested to add no tags; doing nothing. thanks Stopping processing here. Please contact me if you need assistance. -- 684531: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684531 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#681687: Call for votes on evince MIME entry
Ian Jackson ijack...@chiark.greenend.org.uk writes: I'm calling for votes on the following proposal. There are three options - two positive versions, and FD. In summary A. Do not overrule release team. It is too late for automation. B. Do not overrule release team. Defer to them on automation. F. Further Discussion. I vote BAF. Bdale pgpK9nA7PmkMg.pgp Description: PGP signature
Bug#684552: clementine: does not start: error while loading shared libraries: libGLEW.so.1.5
Package: clementine Version: 1.0.1+dfsg-2+b1 Severity: grave Justification: renders package unusable Dear Maintainer, Clementine is no longer starting. running clementine at the command line returns the following error clementine: error while loading shared libraries: libGLEW.so.1.5: cannot open shared object file: No such file or directory My system has libglew1.7 installed (no libglew1.5) I tried creating a symlink /usr/lib/x86_64-linux-gnu/libGLEW.so.1.5 pointing to /usr/lib/x86_64-linux-gnu/libGLEW.so.1.7, but I get the following error clementine: error while loading shared libraries: libCg.so: cannot open shared object file: No such file or directory Reinstalling clementine was ineffective. Failed to build from source with the following command: $ apt-get -b source clementine with an error in src/CMakeFiles/clementine_lib.dir/visualisations/projectmvisualisation.cpp.o Regards, James -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-3-amd64 (SMP w/2 CPU cores) Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages clementine depends on: ii gstreamer0.10-plugins-base 0.10.36-1 ii gstreamer0.10-plugins-good 0.10.31-3 ii gstreamer0.10-plugins-ugly 0.10.19-2+b2 ii libc62.13-33 ii libcdio130.83-4 ii libchromaprint0 0.6-2 ii libechonest1.2 1.2.1-1 ii libgcc1 1:4.7.1-2 ii libgdk-pixbuf2.0-0 2.26.1-1 ii libglib2.0-0 2.32.3-1 ii libgpod4 0.8.2-6 ii libgstreamer-plugins-base0.10-0 0.10.36-1 ii libgstreamer0.10-0 0.10.36-1 ii libimobiledevice21.1.1-4 ii libindicate-qt1 0.2.5.91-5 ii liblastfm0 0.4.0~git20090710-2 ii libmtp9 1.1.3-35-g0ece104-2 ii libplist11.8-1 ii libprojectm2 2.1.0+dfsg-1 ii libqjson00.7.1-6 ii libqt4-dbus 4:4.8.2-1 ii libqt4-network 4:4.8.2-1 ii libqt4-opengl4:4.8.2-1 ii libqt4-sql 4:4.8.2-1 ii libqt4-sql-sqlite4:4.8.2-1 ii libqt4-xml 4:4.8.2-1 ii libqtcore4 4:4.8.2-1 ii libqtgui44:4.8.2-1 ii libqxt-gui0 0.6.1-6 ii libstdc++6 4.7.1-2 ii libtag1c2a 1.7.2-1 ii libusb-1.0-0 2:1.0.11-1 ii libusbmuxd1 1.0.7-2 ii libx11-6 2:1.5.0-1 ii libxml2 2.8.0+dfsg1-5 ii projectm-data2.1.0+dfsg-1 ii zlib1g 1:1.2.7.dfsg-13 Versions of packages clementine recommends: ii gstreamer0.10-alsa0.10.36-1 ii gstreamer0.10-pulseaudio 0.10.31-3 clementine suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#681687: Call for votes on evince MIME entry
On Tue, Aug 07, 2012 at 06:03:17PM +0100, Ian Jackson wrote: I'm calling for votes on the following proposal. There are three options - two positive versions, and FD. In summary A. Do not overrule release team. It is too late for automation. B. Do not overrule release team. Defer to them on automation. F. Further Discussion. I vote BAF. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. Ubuntu Developerhttp://www.debian.org/ slanga...@ubuntu.com vor...@debian.org signature.asc Description: Digital signature