Bug#587749: Upstream fixes available

2012-09-02 Thread Koichi Akabe
Hi,

How is the status of this bug now?
The version of the upstream package is 0.8.2 and I think it works good.

-- 
Koichi Akabe
 vbkaisetsu at {gmail.com, debian.or.jp}


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#682233: mpt2sas: kernel crash under load with hanged disks

2012-09-02 Thread Jonathan Nieder
George Shuklin wrote:

> I think that problem is specific to LSI drivers, not to linux-raid,
> because same tests with Adaptec (aacraid) and few onboard HBAs show
> no signs of crashing (hanged disks is just marked as 'failed' and
> all systems behave as expected).

Thanks.  Very useful.

[...]
> linux-3.0 do have mpt2sas 08.100.00.02  and linux-3.2 do have 10.100.00.00

Between 3.0 and 3.2.12, the mpt2sas driver had 30 patches.  That would
be an interesting test: could you try a current kernel with the
mpt2sas driver from 3.0.y?  It works like this:

 0. prerequisites:

apt-get install git build-essential

 1. get the kernel history, if you don't already have it:

git clone \
  git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git

 2. fetch point releases:

cd linux
git remote add stable \
  git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
git fetch stable

 3. configure, build, test:

git checkout origin/master
cp /boot/config-$(uname -r) .config; # current configuration
scripts/config --disable DEBUG_INFO
make localmodconfig; # optional: minimize configuration
make deb-pkg; # optionally with -j for parallel build
dpkg -i ../; # as root
reboot
... test test test ...

Hopefully it reproduces the bug.  So

 4. try the mpt2sas driver from 3.0.y:

cd linux
git checkout stable/linux-3.0.y -- drivers/scsi/mpt2sas
make deb-pkg; # maybe with -j4
dpkg -i ../
reboot
... test ...

Jonathan


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#686524: qemu-kvm: guests won't start until input to console is made

2012-09-02 Thread Michael Tokarev
Control: tag 686524 + unreproducible

On 03.09.2012 01:58, Timo Weingärtner wrote:
[]
>> Please try reproducing it without libvirt. Maybe removing -M pc-0.12
>> will help with that.
> 
> Without the libvirt magic it doesn't use 100% CPU but it won't boot either.
> 
> I removed pc-0.12 from libvirt's config, now it uses pc-1.1 and still hangs 
> until console input.

I can't reproduce this problem here.  For me, it always starts booting.
I tried previous version (1.1.0) and there it works too.

What's the "minimal" command line to trigger this?  Will it happen with
simple

  kvm -nodefaults -serial file:/tmp/serial -nographics -kernel .. -append 
console=ttyS0

?

Also, does it happen with different guest kernel (-kernel option) ?

Marking as unreproducible for now...

Thanks!

/mjt


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#686524: qemu-kvm: guests won't start until input to console is made

2012-09-02 Thread Debian Bug Tracking System
Processing control commands:

> tag 686524 + unreproducible
Bug #686524 [qemu-kvm] qemu-kvm: guests won't start until input to console is 
made
Added tag(s) unreproducible.

-- 
686524: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686524
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#685743: marked as done (pax-britannica: broken freedesktop menu file)

2012-09-02 Thread Debian Bug Tracking System
Your message dated Mon, 03 Sep 2012 04:02:36 +
with message-id 
and subject line Bug#685743: fixed in pax-britannica 1.0.0-2
has caused the Debian Bug report #685743,
regarding pax-britannica: broken freedesktop menu file
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
685743: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685743
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: pax-britannica
Version: 1.0.0-1
Severity: important

The freedesktop menu file is completely broken, it refers to a file that
does not exist and isn't even related to the package:

guest@morrison:~$ grep Exec /usr/share/applications/pax-britannica.desktop
Exec=/usr/games/fooview
guest@morrison:~$ ls /usr/games/fooview
ls: cannot access /usr/games/fooview: No such file or directory
guest@morrison:~$ apt-file  search fooview
guest@morrison:~$ 

In addition the desktop file is not a valid freedesktop menu file:

guest@morrison:~$ desktop-file-validate 
/usr/share/applications/pax-britannica.desktop
/usr/share/applications/pax-britannica.desktop: error: value "Game;ActionGame" 
for string list key "Categories" in group "Desktop Entry" does not have a 
semicolon (';') as trailing character

-- 
bye,
pabs

http://wiki.debian.org/PaulWise


signature.asc
Description: This is a digitally signed message part
--- End Message ---
--- Begin Message ---
Source: pax-britannica
Source-Version: 1.0.0-2

We believe that the bug you reported is fixed in the latest version of
pax-britannica, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 685...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joe Nahmias  (supplier of updated pax-britannica package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sun, 02 Sep 2012 23:26:33 -0400
Source: pax-britannica
Binary: pax-britannica pax-britannica-data
Architecture: source amd64 all
Version: 1.0.0-2
Distribution: unstable
Urgency: low
Maintainer: Joe Nahmias 
Changed-By: Joe Nahmias 
Description: 
 pax-britannica - one-button multi-player real-time strategy game
 pax-britannica-data - data files for pax-britannica game
Closes: 685743
Changes: 
 pax-britannica (1.0.0-2) unstable; urgency=low
 .
   * fix desktop entry, closes: #685743.
   * enhance menu to include icon and hints
Checksums-Sha1: 
 7b8bac2b91abb5ec77aa4d09e506fa7a418bf0e1 2492 pax-britannica_1.0.0-2.dsc
 2542c57f7b1dbab26605e39580abc29b337feb00 52019 
pax-britannica_1.0.0-2.debian.tar.gz
 ea3c6d8f39616fa80295fb35d1c7f1303834d098 156170 
pax-britannica_1.0.0-2_amd64.deb
 c00ddd8b82996403017e57ceab1b23cbcaeca39c 8790756 
pax-britannica-data_1.0.0-2_all.deb
Checksums-Sha256: 
 a73d1dff4a2d11dcbd55a6997f9f85e4e60acb36f459e8a100c2d9ed20dc5a28 2492 
pax-britannica_1.0.0-2.dsc
 b7f1252a4fa25a2bc5372d468573153ece4f322d3e00a695d4e728486e0f7073 52019 
pax-britannica_1.0.0-2.debian.tar.gz
 303934a60ada516971fb50f4c5b98d8632f52e93020040a7d1c29c47a094c0a5 156170 
pax-britannica_1.0.0-2_amd64.deb
 b3ddd914557fcdbebcd7f6a442825436ee643f69bcc897ac5b60d927df1dca75 8790756 
pax-britannica-data_1.0.0-2_all.deb
Files: 
 91f8995e49250cf35ab551a52fc8a43d 2492 games optional pax-britannica_1.0.0-2.dsc
 2169f16ffa89bc35257021f7aa0df752 52019 games optional 
pax-britannica_1.0.0-2.debian.tar.gz
 84e5ad1d4cda3383f28799f25ee87f45 156170 games optional 
pax-britannica_1.0.0-2_amd64.deb
 f619420b6318e5d485fb65b2292592aa 8790756 games optional 
pax-britannica-data_1.0.0-2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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Bug#682233: mpt2sas: kernel crash under load with hanged disks

2012-09-02 Thread George Shuklin
I think that problem is specific to LSI drivers, not to linux-raid, 
because same tests with Adaptec (aacraid) and few onboard HBAs show no 
signs of crashing (hanged disks is just marked as 'failed' and all 
systems behave as expected).


I'll try to bisect it at 3.5, but I think it's kinda simple to say where 
problem is:


linux-3.0 do have mpt2sas 08.100.00.02  and linux-3.2 do have 10.100.00.00

And note, that mpt2sas do have strange behavior in linux-2.6.32 (version 
02.100.03.00) under highload.


On 03.09.2012 06:30, Jonathan Nieder wrote:

George Shuklin wrote:


We've tested it with vanilla 3.2.12, problem was same.

Thanks for the quick feedback.  Please send a summary of symptoms to
linux-r...@vger.kernel.org, cc-ing Neil Brown  and
either me or this bug log so we can track it.

Be sure to mention:

  - steps to reproduce, expected result, actual result, and how
the difference indicates a bug (should be simple enough ---
the summary you sent here would work fine)

  - which kernel versions you have tested and what happened with
each

  - full "dmesg" output from booting and reproducing the bug, as
an attachment

  - any other weird symptoms or observations

  - what you would be able to do to track it down (can you run commands
if provided? try patches? bisect to find which commit introduced
the regression?)

If we're lucky, the symptoms will ring a bell for Neil or someone else
on-list or someone will have an idea for a test to try to track it
down further.  Otherwise, the best we can do is probably to bisect to
find which specific change introduced the bug, as described at [1].

Regards,
Jonathan

[1] http://kernel-handbook.alioth.debian.org/ch-bugs.html#s9.2.1



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#682233: mpt2sas: kernel crash under load with hanged disks

2012-09-02 Thread Jonathan Nieder
George Shuklin wrote:

> We've tested it with vanilla 3.2.12, problem was same.

Thanks for the quick feedback.  Please send a summary of symptoms to
linux-r...@vger.kernel.org, cc-ing Neil Brown  and
either me or this bug log so we can track it.

Be sure to mention:

 - steps to reproduce, expected result, actual result, and how
   the difference indicates a bug (should be simple enough ---
   the summary you sent here would work fine)

 - which kernel versions you have tested and what happened with
   each

 - full "dmesg" output from booting and reproducing the bug, as
   an attachment

 - any other weird symptoms or observations

 - what you would be able to do to track it down (can you run commands
   if provided? try patches? bisect to find which commit introduced
   the regression?)

If we're lucky, the symptoms will ring a bell for Neil or someone else
on-list or someone will have an idea for a test to try to track it
down further.  Otherwise, the best we can do is probably to bisect to
find which specific change introduced the bug, as described at [1].

Regards,
Jonathan

[1] http://kernel-handbook.alioth.debian.org/ch-bugs.html#s9.2.1


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: Re: mpt2sas: kernel crash under load with hanged disks

2012-09-02 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> # upstream 3.2.12 actually, but close enough
> found 682233 linux-2.6/3.2.12-1
Bug #682233 [src:linux] mpt2sas: kernel crash under load with hanged disks
Marked as found in versions linux-2.6/3.2.12-1.
>
End of message, stopping processing here.

Please contact me if you need assistance.
-- 
682233: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=682233
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#682233: mpt2sas: kernel crash under load with hanged disks

2012-09-02 Thread George Shuklin

We've tested it with vanilla 3.2.12, problem was same.


On 03.09.2012 06:01, Jonathan Nieder wrote:

Hi George,

George Shuklin wrote:


Tags: upstream

Which upstream version did you test?

[...]

That bug found in 3.2 and 3.3 versions of kernel, but not
reproducing in 3.0.

[...]

1) Set up large raid10.
2) Start it rebuild
3) run addition io on raid (dd if=/dev/md0 of=/dev/md0)
4) Somehow make to slow down IO on two or more disks. We found that
bug in wild with normal load, but following scripts allows to see it
in few minutes:

[...]

end_request: I/O error, dev sdf, sector 729088
[ cut here ]
kernel BUG at [...]/linux-3.4.4/drivers/scsi/scsi_lib.c:1154!

[...]

Pid: 343, comm: kworker/5:1 Not tainted 3.4-trunk-amd64 #1 Supermicro 
X8DTN+-F/X8DTN+-F

[...]

Call Trace:
  [] ? sd_prep_fn+0x2e9/0xb8e [sd_mod]
  [] ? cfq_dispatch_requests+0x722/0x880
  [] ? create_io_context+0x5a/0x5a
  [] ? blk_peek_request+0xcf/0x1ac

[...]

Code: 85 c0 74 1d 48 8b 00 48 85 c0 74 15 48 8b 40 48 48 85 c0 74 0c 48 89 ee 48 89 
df ff d0 85 c0 75 44 66 83 bd e0 00 00 00 00 75 02<0f>  0b 48 89 ee 48 89 df e8 
62 ec ff ff 48 85 c0 48 89 c2 74 20
RIP  [] scsi_setup_fs_cmnd+0x45/0x83 [scsi_mod]

Thanks for a clear report, and sorry for the slow reply.

This is "BUG_ON(!req->nr_phys_segments)".  Smells similar to [1],
which bisected to v3.1-rc1~131^2~31 and was fixed by v3.2.2~91
(md/raid1: perform bad-block tests for WriteMostly devices too,
2012-01-09), aka v3.3-rc3~3^2~2.

But that wouldn't explain triggering the same trace in a 3.4.y kernel.

Is this reproducible with 3.5.2 or newer from experimental?  Which
3.2.y kernel did you use to experience it?

Curious,
Jonathan

[1] http://thread.gmane.org/gmane.linux.raid/36732



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#682233: mpt2sas: kernel crash under load with hanged disks

2012-09-02 Thread Jonathan Nieder
Hi George,

George Shuklin wrote:

> Tags: upstream

Which upstream version did you test?

[...]
> That bug found in 3.2 and 3.3 versions of kernel, but not
> reproducing in 3.0.
[...]
> 1) Set up large raid10.
> 2) Start it rebuild
> 3) run addition io on raid (dd if=/dev/md0 of=/dev/md0)
> 4) Somehow make to slow down IO on two or more disks. We found that
> bug in wild with normal load, but following scripts allows to see it
> in few minutes:
[...]
> end_request: I/O error, dev sdf, sector 729088
> [ cut here ]
> kernel BUG at [...]/linux-3.4.4/drivers/scsi/scsi_lib.c:1154!
[...]
> Pid: 343, comm: kworker/5:1 Not tainted 3.4-trunk-amd64 #1 Supermicro 
> X8DTN+-F/X8DTN+-F
[...]
> Call Trace:
>  [] ? sd_prep_fn+0x2e9/0xb8e [sd_mod]
>  [] ? cfq_dispatch_requests+0x722/0x880
>  [] ? create_io_context+0x5a/0x5a
>  [] ? blk_peek_request+0xcf/0x1ac
[...]
> Code: 85 c0 74 1d 48 8b 00 48 85 c0 74 15 48 8b 40 48 48 85 c0 74 0c 48 89 ee 
> 48 89 df ff d0 85 c0 75 44 66 83 bd e0 00 00 00 00 75 02 <0f> 0b 48 89 ee 48 
> 89 df e8 62 ec ff ff 48 85 c0 48 89 c2 74 20 
> RIP  [] scsi_setup_fs_cmnd+0x45/0x83 [scsi_mod]

Thanks for a clear report, and sorry for the slow reply.

This is "BUG_ON(!req->nr_phys_segments)".  Smells similar to [1],
which bisected to v3.1-rc1~131^2~31 and was fixed by v3.2.2~91
(md/raid1: perform bad-block tests for WriteMostly devices too,
2012-01-09), aka v3.3-rc3~3^2~2.

But that wouldn't explain triggering the same trace in a 3.4.y kernel.

Is this reproducible with 3.5.2 or newer from experimental?  Which
3.2.y kernel did you use to experience it?

Curious,
Jonathan

[1] http://thread.gmane.org/gmane.linux.raid/36732


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#686356: aspcud and clasp 2.1

2012-09-02 Thread Ralf Treinen
On Sat, Sep 01, 2012 at 01:17:12PM +0200, Roland Kaminski wrote:

> In fact this is trivial. It is just an option that has slightly changed and 
> is  
> no longer recognized by clasp-2.1.

Thanks a lot for the patch!

> Benjamin takes the version numbering 
> seriously: if the minor or major version changes, then there might be changes 
> that break backwards compatibility.

This is a very good practice! 

> Btw. our latest competition submission should (hopefully) be much better than 
> the old aspcud and I guess we can drop clasp 2.0 support then. 

yes, newer versions of aspcud would go into sid, and there we will have
clasp 2.1, so the support for clasp 2.0 will be no longer needed then.

Thanks -Ralf.
-- 
Ralf Treinen
Laboratoire Preuves, Programmes et Systèmes
Université Paris Diderot, Paris, France.
http://www.pps.univ-paris-diderot.fr/~treinen/
=> New email address: trei...@pps.univ-paris-diderot.fr <=


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#686543: netcat.c:1797:16: error: expected ')' before 'DEBIAN_VERSION'

2012-09-02 Thread Tech
Package: netcat-traditional
Version: 1.10-40
Severity: serious
Justification: fails to build from source (but built successfully in the past)

The source package `netcat-traditional' does not build, make dies this way:

  $ make linux
  make -e nc  XFLAGS='-DLINUX' STATIC=-static
  make[1]: Entering directory `/tmp/build/netcat-1.10'
  gcc -O  -DLINUX -static -o nc netcat.c 
  netcat.c: In function 'helpme':
  netcat.c:1797:16: error: expected ')' before 'DEBIAN_VERSION'
  make[1]: *** [nc] Error 1
  make[1]: Leaving directory `/tmp/build/netcat-1.10'
  make: *** [linux] Error 2

I am not very familiar with the Debian package build process. In debian/rules
a DFLAGS='... -DDEBIAN_VERSION...' is used, if I try that one, the error ist
the same:

  $ make linux DFLAGS='-DDEBIAN_VERSION="foo"'
  ...
  netcat.c: In function 'helpme':
  netcat.c:1783:3: error: expected ')' before 'foo'
  ...

So maybe DEBIAN_VERSION usually contains some magic to concatenate the strings
with the constant (rather not), or this patch is broken.


Cheers,

Tech

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.0-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=ANSI_X3.4-1968) 
(ignored: LC_ALL set to C)
Shell: /bin/sh linked to /bin/dash

Versions of packages netcat-traditional depends on:
ii  libc6  2.13-35

netcat-traditional recommends no packages.

netcat-traditional suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#686524: qemu-kvm: guests won't start until input to console is made

2012-09-02 Thread Timo Weingärtner
Hallo Michael Tokarev,

2012-09-02 um 20:55:36 schriebst Du:
> Control: tag 686524 + moreinfo
> 
> On 02.09.2012 22:34, Timo Weingärtner wrote:
> > Package: qemu-kvm
> > Version: 1.1.1+dfsg-1
> > Severity: grave
> > Justification: renders package unusable
> 
> Well, it is usable for lots of people.
> 
> > After starting the guest with "virsh start router" the kvm process uses
> > 100% CPU. In "virsh console router" nothing happens until I press enter,
> > then the guest starts booting. "echo > /dev/pts/$number" also works
> > here.
> > 
> > When bootet the guest's clock is behind by the time between the "virsh
> > start" and the input to the guest's console.
> 
> How this bug is different from #685314 and #680719 (which is the same
> thing)?  Note both are fixed in the version you're reporting this bug
> against, and verified.  I'm not saying it is the same bug and it is
> fixed, I'm trying to understand how your is different.
> 
> > kvm command (libvirt-generated):

> Please try reproducing it without libvirt. Maybe removing -M pc-0.12
> will help with that.

Without the libvirt magic it doesn't use 100% CPU but it won't boot either.

I removed pc-0.12 from libvirt's config, now it uses pc-1.1 and still hangs 
until console input.


Grüße
Timo


signature.asc
Description: This is a digitally signed message part.


Processed: fparser will be removed

2012-09-02 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 683021 - help
Bug #683021 [src:fparser] FTBFS on arm*: multiple definition of `typeinfo for 
FunctionParserBase::FunctionWrapper'
Removed tag(s) help.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
683021: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683021
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#682905: can't import signatures

2012-09-02 Thread Daniel Pocock


Some further observations.  I tried running strace against the icedove
process

This is what I see after clicking `Import OpenPGP signature'

Notice that between the open() and close(), there is no write operation?



access("/tmp", W_OK)= 0
open("/tmp/0x6C6580E77BD756C4.3.signed-by-0xD929F2992BEF0A33",
O_WRONLY|O_CREAT|O_EXCL|O_TRUNC, 0600) = 68
close(68)   = 0
poll([{fd=5, events=POLLIN|POLLOUT}], 1, -1) = 1 ([{fd=5,
revents=POLLIN|POLLOUT}])




I've also referred to the icedove troubleshooting wiki
http://wiki.debian.org/Icedove#Debugging

but running in debug mode didn't reveal anything else about the problem.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#682905: can't import signatures from caff

2012-09-02 Thread Daniel Pocock


Hi,

People are sending me signatures with caff and I can't import them

Enigmail prompts for my password and decrypts the messages OK

When I click the attachment, right click, and select "Import OpenPGP
key" I just get the error "key importing failed" and "No valid armored
OpenPGP data block found"

In the mail window, it says that the attachment is 2.3KB

If I right click the attachment and save it, a file is created with
about 2.3KB of OpenPGP data in it.

All the debug logs have already been sent in a Debian bug report - can
anyone comment on this or suggesting anything else I can try?
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=682905

Regards,

Daniel


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#674324: ruby-net-sftp: FTBFS: test failed

2012-09-02 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> forwarded 674324 
> http://net-ssh.lighthouseapp.com/projects/36253-net-ssh/tickets/62-net-sftp-fails-with-mocha-0113
Bug #674324 [src:ruby-net-sftp] ruby-net-sftp: FTBFS: test failed
Set Bug forwarded-to-address to 
'http://net-ssh.lighthouseapp.com/projects/36253-net-ssh/tickets/62-net-sftp-fails-with-mocha-0113'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
674324: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=674324
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#674324: ruby-net-sftp: FTBFS: test failed

2012-09-02 Thread Lucas Nussbaum
forwarded 674324 
http://net-ssh.lighthouseapp.com/projects/36253-net-ssh/tickets/62-net-sftp-fails-with-mocha-0113
thanks

On 01/09/12 at 10:20 +0200, Emanuele Rocca wrote:
> It looks like the changes introduced in recent upstream versions of
> ruby-mocha are breaking ruby-net-sftp's tests.

Indeed. It fails with ruby-mocha 0.11.3, but works with 0.10.3 and
0.10.5.

I'm not very familiar with ruby-mocha, so I don't know if the package is
actually doing something wrong. Could someone in debian-ruby@ take a
closer look?

I've fowarded the bug upstream (to net-sftp) in the meantime.

Lucas


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#657751: gdm3: 657751: patch to fix purging when gdm3 is running

2012-09-02 Thread Salvatore Bonaccorso
Hi

Looking at wheezy bugs to be fixed I stumbled over #657751 in gdm3.
Sergio, are you able to repoduce this with current version in wheezy?

I tried to reproduce this via an installation in a VM, login in a user
and then purging gdm3. The removal went without the problems
described.

[But anyway, Paul already did an analysis which in any case (even not
triggered here) should further 'stabilize' the possible purge process
for gdm3.]

Thoughts?

Regards,
Salvatore


signature.asc
Description: Digital signature


Processed: Re: Processed: fixed 686524 in 1.0+dfsg-11

2012-09-02 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> notfixed 686524 1.0+dfsg-11
Bug #686524 [qemu-kvm] qemu-kvm: guests won't start until input to console is 
made
No longer marked as fixed in versions qemu-kvm/1.0+dfsg-11.
> notfound 686524 1.0+dfsg-11
Bug #686524 [qemu-kvm] qemu-kvm: guests won't start until input to console is 
made
Ignoring request to alter found versions of bug #686524 to the same values 
previously set
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
686524: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686524
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: fixed 686524 in 1.0+dfsg-11

2012-09-02 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> fixed 686524 1.0+dfsg-11
Bug #686524 [qemu-kvm] qemu-kvm: guests won't start until input to console is 
made
Marked as fixed in versions qemu-kvm/1.0+dfsg-11.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
686524: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686524
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#686524: qemu-kvm: guests won't start until input to console is made

2012-09-02 Thread Debian Bug Tracking System
Processing control commands:

> tag 686524 + moreinfo
Bug #686524 [qemu-kvm] qemu-kvm: guests won't start until input to console is 
made
Added tag(s) moreinfo.

-- 
686524: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686524
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#686524: qemu-kvm: guests won't start until input to console is made

2012-09-02 Thread Michael Tokarev
Control: tag 686524 + moreinfo

On 02.09.2012 22:34, Timo Weingärtner wrote:
> Package: qemu-kvm
> Version: 1.1.1+dfsg-1
> Severity: grave
> Justification: renders package unusable

Well, it is usable for lots of people.

> After starting the guest with "virsh start router" the kvm process uses
> 100% CPU. In "virsh console router" nothing happens until I press enter,
> then the guest starts booting. "echo > /dev/pts/$number" also works
> here.
> 
> When bootet the guest's clock is behind by the time between the "virsh
> start" and the input to the guest's console.

How this bug is different from #685314 and #680719 (which is the same
thing)?  Note both are fixed in the version you're reporting this bug
against, and verified.  I'm not saying it is the same bug and it is
fixed, I'm trying to understand how your is different.

> kvm command (libvirt-generated):
> /usr/bin/kvm -S -M pc-0.12 -enable-kvm -m 128 -smp 
> 1,sockets=1,cores=1,threads=1 -name router -uuid 
> d24ccdfa-201a-eda6-65e7-43b0b29c94ba -nographic -nodefconfig -nodefaults 
> -chardev 
> socket,id=charmonitor,path=/var/lib/libvirt/qemu/router.monitor,server,nowait 
> -mon chardev=charmonitor,id=monitor,mode=control -rtc base=utc -no-shutdown 
> -kernel /boot/kvm-router/vmlinuz -append  root=/dev/vda ro console=ttyS0 
> -device piix3-usb-uhci,id=usb,bus=pci.0,addr=0x1.0x2 -drive 
> file=/dev/vg/vm_router_root,if=none,id=drive-virtio-disk0,format=raw -device 
> virtio-blk-pci,scsi=off,bus=pci.0,addr=0x4,drive=drive-virtio-disk0,id=virtio-disk0,bootindex=1
>  -drive file=/dev/vg/vm_router_swap,if=none,id=drive-virtio-disk1,format=raw 
> -device 
> virtio-blk-pci,scsi=off,bus=pci.0,addr=0x5,drive=drive-virtio-disk1,id=virtio-disk1
>  -netdev tap,ifname=vm_router,script=/bin/true,id=hostnet0 -device 
> virtio-net-pci,netdev=hostnet0,id=net0,mac=02:84:00:00:00:01,bus=pci.0,addr=0x3
>  -chardev pty,id=charserial0 -device isa-s
e
>  rial,chardev=charserial0,id=serial0 -device 
> i6300esb,id=watchdog0,bus=pci.0,addr=0x7 -watchdog-action reset -device 
> virtio-balloon-pci,id=balloon0,bus=pci.0,addr=0x6

Please try reproducing it without libvirt. Maybe removing -M pc-0.12
will help with that.

Thanks,

/mjt


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: found 686524 in 1.1.0+dfsg-3, notfound 686524 in 1.0+dfsg-11

2012-09-02 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> found 686524 1.1.0+dfsg-3
Bug #686524 [qemu-kvm] qemu-kvm: guests won't start until input to console is 
made
Marked as found in versions qemu-kvm/1.1.0+dfsg-3.
> notfound 686524 1.0+dfsg-11
Bug #686524 [qemu-kvm] qemu-kvm: guests won't start until input to console is 
made
Ignoring request to alter found versions of bug #686524 to the same values 
previously set
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
686524: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686524
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#686524: qemu-kvm: guests won't start until input to console is made

2012-09-02 Thread Timo Weingärtner
Package: qemu-kvm
Version: 1.1.1+dfsg-1
Severity: grave
Justification: renders package unusable

After starting the guest with "virsh start router" the kvm process uses
100% CPU. In "virsh console router" nothing happens until I press enter,
then the guest starts booting. "echo > /dev/pts/$number" also works
here.

When bootet the guest's clock is behind by the time between the "virsh
start" and the input to the guest's console.

kvm command (libvirt-generated):
/usr/bin/kvm -S -M pc-0.12 -enable-kvm -m 128 -smp 
1,sockets=1,cores=1,threads=1 -name router -uuid 
d24ccdfa-201a-eda6-65e7-43b0b29c94ba -nographic -nodefconfig -nodefaults 
-chardev 
socket,id=charmonitor,path=/var/lib/libvirt/qemu/router.monitor,server,nowait 
-mon chardev=charmonitor,id=monitor,mode=control -rtc base=utc -no-shutdown 
-kernel /boot/kvm-router/vmlinuz -append  root=/dev/vda ro console=ttyS0 
-device piix3-usb-uhci,id=usb,bus=pci.0,addr=0x1.0x2 -drive 
file=/dev/vg/vm_router_root,if=none,id=drive-virtio-disk0,format=raw -device 
virtio-blk-pci,scsi=off,bus=pci.0,addr=0x4,drive=drive-virtio-disk0,id=virtio-disk0,bootindex=1
 -drive file=/dev/vg/vm_router_swap,if=none,id=drive-virtio-disk1,format=raw 
-device 
virtio-blk-pci,scsi=off,bus=pci.0,addr=0x5,drive=drive-virtio-disk1,id=virtio-disk1
 -netdev tap,ifname=vm_router,script=/bin/true,id=hostnet0 -device 
virtio-net-pci,netdev=hostnet0,id=net0,mac=02:84:00:00:00:01,bus=pci.0,addr=0x3 
-chardev pty,id=charserial0 -devic
 e isa-serial,chardev=charserial0,id=serial0 -device 
i6300esb,id=watchdog0,bus=pci.0,addr=0x7 -watchdog-action reset -device 
virtio-balloon-pci,id=balloon0,bus=pci.0,addr=0x6


-- Package-specific info:


/proc/cpuinfo:

processor   : 0
vendor_id   : AuthenticAMD
cpu family  : 15
model   : 75
model name  : AMD Athlon(tm) 64 X2 Dual Core Processor 4200+
stepping: 2
microcode   : 0x62
cpu MHz : 1000.000
cache size  : 512 KB
physical id : 0
siblings: 2
core id : 0
cpu cores   : 2
apicid  : 0
initial apicid  : 0
fpu : yes
fpu_exception   : yes
cpuid level : 1
wp  : yes
flags   : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov 
pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt rdtscp lm 
3dnowext 3dnow rep_good nopl extd_apicid pni cx16 lahf_lm cmp_legacy svm 
extapic cr8_legacy
bogomips: 2009.37
TLB size: 1024 4K pages
clflush size: 64
cache_alignment : 64
address sizes   : 40 bits physical, 48 bits virtual
power management: ts fid vid ttp tm stc

processor   : 1
vendor_id   : AuthenticAMD
cpu family  : 15
model   : 75
model name  : AMD Athlon(tm) 64 X2 Dual Core Processor 4200+
stepping: 2
microcode   : 0x62
cpu MHz : 1000.000
cache size  : 512 KB
physical id : 0
siblings: 2
core id : 1
cpu cores   : 2
apicid  : 1
initial apicid  : 1
fpu : yes
fpu_exception   : yes
cpuid level : 1
wp  : yes
flags   : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov 
pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt rdtscp lm 
3dnowext 3dnow rep_good nopl extd_apicid pni cx16 lahf_lm cmp_legacy svm 
extapic cr8_legacy
bogomips: 2009.37
TLB size: 1024 4K pages
clflush size: 64
cache_alignment : 64
address sizes   : 40 bits physical, 48 bits virtual
power management: ts fid vid ttp tm stc




-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (890, 'testing'), (880, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages qemu-kvm depends on:
ii  adduser 3.113+nmu3
ii  ipxe-qemu   1.0.0+git-20120202.f6840ba-3
ii  libaio1 0.3.109-3
ii  libasound2  1.0.25-4
ii  libbluetooth3   4.99-2
ii  libbrlapi0.54.4-4
ii  libc6   2.13-35
ii  libcurl3-gnutls 7.26.0-1
ii  libglib2.0-02.32.3-1
ii  libgnutls26 2.12.20-1
ii  libiscsi1   1.4.0-3
ii  libjpeg88d-1
ii  libncurses5 5.9-10
ii  libpng12-0  1.2.49-1
ii  libpulse0   2.0-6
ii  libsasl2-2  2.1.25.dfsg1-5
ii  libsdl1.2debian 1.2.15-5
ii  libspice-server10.11.0-1
ii  libtinfo5   5.9-10
ii  libusbredirparser0  0.4.3-2
ii  libuuid12.20.1-5.1
ii  libvdeplug2 2.3.2-4
ii  libx11-62:1.5.0-1
ii  python  2.7.3~rc2-1
ii  qemu-keymaps1.1.0+dfsg-1
ii  qemu-utils  1.1.0+dfsg-1
ii  seabios 1.7.0-1
ii  vgabios 0.7a-3
ii  zlib1g  1:1.2.7.dfsg-13

Versions of packages qemu-kvm recommends:
ii  bridge-utils  1.5-4
ii  iproute   20120521-3

Versions of packages qemu-kvm suggests:
pn  debootstrap  
ii  samba

Bug#646537: marked as done (slbackup-php: please test your package with smarty3)

2012-09-02 Thread Debian Bug Tracking System
Your message dated Sun, 02 Sep 2012 17:33:20 +
with message-id 
and subject line Bug#646537: fixed in slbackup-php 0.4.3-2
has caused the Debian Bug report #646537,
regarding slbackup-php: please test your package with smarty3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
646537: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646537
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: slbackup-php
Severity: minor

Dear Maintainer,
Smarty and Smarty3 will be merged soon, please consider to test your
package with the 3.x series.
Thank you.

Cheers,


--- End Message ---
--- Begin Message ---
Source: slbackup-php
Source-Version: 0.4.3-2

We believe that the bug you reported is fixed in the latest version of
slbackup-php, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 646...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Mike Gabriel  (supplier of updated 
slbackup-php package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sat, 01 Sep 2012 21:54:58 +0200
Source: slbackup-php
Binary: slbackup-php
Architecture: source all
Version: 0.4.3-2
Distribution: unstable
Urgency: low
Maintainer: Debian Edu Packaging Team 

Changed-By: Mike Gabriel 
Description: 
 slbackup-php - Web-based administration tool for slbackup
Closes: 646537 670095
Changes: 
 slbackup-php (0.4.3-2) unstable; urgency=low
 .
   * Rebuild package based on Debian version 0.3-3, only cherry-picking
 minimal changes from Debian version 0.4.3-1 of this package, as
 requested by the Debian release team. This reduction of changes is
 to make a transition of slbackup-php 0.4.3 into wheezy possible.
   * Drop of complete patch series which was needed for 0.3-3.
   * Cherry-picks from 0.4.3-1:
 + New maintainer, package becomes team-maintained: Debian Edu Packaging
   Team.
 + New upstream version. (Closes: #646537, #670095)
 + Run debconf-updatepo during /debian/rules build, not clean. Makes
   slbackup-php buildable with git-buildpackage.
 + Let URL in /debian/slbackup-php.desktop point to
   http://localhost/slbackup-php.
Checksums-Sha1: 
 020e4c67a64796426683ef76816660fdec2a93b3 1934 slbackup-php_0.4.3-2.dsc
 8c6152b9df252c8748b8956d886e1d996c8a816c 3529 slbackup-php_0.4.3-2.diff.gz
 d18534058f195be4a56d448f01fe0d01d2481464 25720 slbackup-php_0.4.3-2_all.deb
Checksums-Sha256: 
 0c0b86471c28d2ecb8c5391efbc152637fe1deecafed490b92f424f9956e262f 1934 
slbackup-php_0.4.3-2.dsc
 3ff162ec0a670277092270fdc12dd2ee28a9994e7035e77f9bc2c74c8f52b500 3529 
slbackup-php_0.4.3-2.diff.gz
 82c1a7e8234a879d8ab960cc39f102c0ab54aa0a65fc1df019b1ae9278ffcf05 25720 
slbackup-php_0.4.3-2_all.deb
Files: 
 50a123db8a6db9c65ecda3a907051c77 1934 misc optional slbackup-php_0.4.3-2.dsc
 f37e1858b89349330e5ab5d1a252d4fe 3529 misc optional 
slbackup-php_0.4.3-2.diff.gz
 4020a559d69e0d5942ba1cfab855d32a 25720 misc optional 
slbackup-php_0.4.3-2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=dEN4
-END PGP SIGNATURE End Message ---


Processed: retitle

2012-09-02 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> retitle 686330 mediawiki: Multiple security issues 
> CVE-2012-4377,CVE-2012-4378,CVE-2012-4379,CVE-2012-4380,CVE-2012-4381,CVE-2012-4382
Bug #686330 [mediawiki] mediawiki: Multiple security issues
Changed Bug title to 'mediawiki: Multiple security issues 
CVE-2012-4377,CVE-2012-4378,CVE-2012-4379,CVE-2012-4380,CVE-2012-4381,CVE-2012-4382'
 from 'mediawiki: Multiple security issues'
>
End of message, stopping processing here.

Please contact me if you need assistance.
-- 
686330: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: your mail

2012-09-02 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> affects 686085 imagemagick
Bug #686085 [graphicsmagick] FTBS imagemagick build on sparc
Added indication that 686085 affects imagemagick
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
686085: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686085
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#685581: inn: CVE-2012-3523 prone to STARTTLS plaintext command injection

2012-09-02 Thread Julien ÉLIE

Hi Marco,


Or does it mean that a security release should be made for previous
versions still maintained by the Debian project?

It should be, yes. (At least, if you think that it should be fixed.)


I do not believe taking time to fix it on older versions of INN is 
worthwhile.  Not much harm can be done in NNTP when this security hole 
is exploited.  Usually, authentication and/or host checks are required 
for sensitive newsgroups.  (Also note that once a user has been 
authenticated, STARTTLS is no longer available.)


If other people think this vulnerability can be harmful, please speak up!

--
Julien ÉLIE

« – Nous parlerons quand l'interprète dormira. [Bong !]
  – Il dort. On peut parler. » (Astérix)


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#680846: marked as done (ruby-compass: FTBFS: ERROR: Test "require-rubygems" failed. Exiting.)

2012-09-02 Thread Debian Bug Tracking System
Your message dated Sun, 02 Sep 2012 13:32:42 +
with message-id 
and subject line Bug#680846: fixed in ruby-compass 0.12.2~dfsg-2
has caused the Debian Bug report #680846,
regarding ruby-compass: FTBFS: ERROR: Test "require-rubygems" failed. Exiting.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
680846: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680846
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: ruby-compass
Version: 0.12.2~dfsg-1
Severity: serious
Tags: wheezy sid
User: debian...@lists.debian.org
Usertags: qa-ftbfs-20120708 qa-ftbfs
Justification: FTBFS on amd64

Hi,

During a rebuild of all packages in sid, your package failed to build on
amd64.

Relevant part:
>  fakeroot debian/rules binary
> test -x debian/rules
> dh_testroot
> dh_prep 
> dh_installdirs -A 
> mkdir -p "."
> dh_ruby --configure
> /usr/lib/ruby/vendor_ruby/gem2deb.rb:17: warning: setting 
> Encoding.default_external
> touch debian/stamp-ruby-gem-configure
> dh_ruby --build
> /usr/lib/ruby/vendor_ruby/gem2deb.rb:17: warning: setting 
> Encoding.default_external
> touch debian/stamp-ruby-gem-build
> dh_ruby --install
> /usr/lib/ruby/vendor_ruby/gem2deb.rb:17: warning: setting 
> Encoding.default_external
>   Entering dh_ruby --install
> install -d /«PKGBUILDDIR»/debian/ruby-compass/usr/bin
> install -D -m755 bin/compass 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/bin/compass
> install -d /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby
> install -D -m644 lib/compass.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass.rb
> install -D -m644 lib/compass/frameworks.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass/frameworks.rb
> install -D -m644 lib/compass/dependencies.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass/dependencies.rb
> install -D -m644 lib/compass/validator.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass/validator.rb
> install -D -m644 lib/compass/version.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass/version.rb
> install -D -m644 lib/compass/installers/bare_installer.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass/installers/bare_installer.rb
> install -D -m644 lib/compass/installers/manifest.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass/installers/manifest.rb
> install -D -m644 lib/compass/installers/manifest_installer.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass/installers/manifest_installer.rb
> install -D -m644 lib/compass/installers/template_context.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass/installers/template_context.rb
> install -D -m644 lib/compass/installers/base.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass/installers/base.rb
> install -D -m644 lib/compass/exec/project_options_parser.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass/exec/project_options_parser.rb
> install -D -m644 lib/compass/exec/global_options_parser.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass/exec/global_options_parser.rb
> install -D -m644 lib/compass/exec/switch_ui.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass/exec/switch_ui.rb
> install -D -m644 lib/compass/exec/sub_command_ui.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass/exec/sub_command_ui.rb
> install -D -m644 lib/compass/exec/command_option_parser.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass/exec/command_option_parser.rb
> install -D -m644 lib/compass/exec/helpers.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass/exec/helpers.rb
> install -D -m644 lib/compass/sprite_importer.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass/sprite_importer.rb
> install -D -m644 lib/compass/configuration/data.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass/configuration/data.rb
> install -D -m644 lib/compass/configuration/file_data.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass/configuration/file_data.rb
> install -D -m644 lib/compass/configuration/adapters.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass/configuration/adapters.rb
> install -D -m644 lib/compass/configuration/serialization.rb 
> /«PKGBUILDDIR»/debian/ruby-compass/usr/lib/ruby/vendor_ruby/compass/configuration/serialization.rb
> install -D -m644 lib/compass/configur

Bug#679409: lightdm: Fails to start on boot, invoke-rc.d lightdm start fails

2012-09-02 Thread Yves-Alexis Perez
On dim., 2012-08-19 at 12:53 -0700, Steve Langasek wrote:
> None of the above.  It's a bug in lightdm, for shipping an upstart job with
> no start condition.  I have no idea why this is done; the upstart job used
> in Ubuntu for lightdm doesn't look anything like this.
> 
> Now, there's a good chance that "fixing" the lightdm upstart job to have a
> correct start condition still won't work, because several of the
> prerequisite events are not yet available at start time with the upstart in
> Debian.  I'm planning to fix this ASAP for wheezy, having spoken with Neil
> McGovern at DebConf and gotten provisional release team sign-off, but it's
> not absolutely certain this will go in or when.  In the meantime, I believe
> the correct fix is for the lightdm package to drop its upstart job. 

Note that the upstart job is the upstream one, untouched, afaict. I can
do the removal (pending RT upload) if it's the best way to do fix the
bug.

Regards,
-- 
Yves-Alexis


signature.asc
Description: This is a digitally signed message part


Bug#685694: libmatio: diff for NMU version 1.3.4-3.1

2012-09-02 Thread Salvatore Bonaccorso
Hey Sylvestre

On Sun, Sep 02, 2012 at 10:16:09AM +0200, Sylvestre Ledru wrote:
> Le 01/09/2012 13:33, Salvatore Bonaccorso a écrit :
> > Dear Sylvestre
> >
> > A rebuild of the libmatio-doc would suffice here, as Sebastien noted.
> > Is it fine for you to upload a 'no changes' upload or would you like
> > to do it yourself?
> >
> > This would fix RC bug #685694.
> >
> OK. Sounds great. :) (even if I don't like "no-changes" upload when I
> don't know why it failed before ...
> 
> Don't hesitate to NMU with a 0 delay (or I can do the upload, no worries)

I'm fine with leaving the upload to you if you have time!

Btw, I agree with you on first part. Do you maybe still have your
build logs available from the upload? Could you check which
doxygen(-latex) version was used then at the time of the upload?

Would anyway be interesting to know :)

Regards,
Salvatore


signature.asc
Description: Digital signature


Bug#579227: Looks like we should drop jscoverage for squeeze

2012-09-02 Thread Johan Euphrosine
I'm not aware of any alternative for javascript coverage packaged in
debian. So if possible I would like to keep it in unstable.


Bug#686495: libpcre3: Very large value for re_nsub

2012-09-02 Thread Patrick Häcker
Package: libpcre3
Version: 1:8.30-5
Severity: grave
Tags: patch
Justification: causes non-serious data loss

Dear Maintainer,

when compiling the regular expression

regex_t rx;
regcomp(&rx, "^(\\(\\))? *(.*)$", 0)

I get the large value 140733193388034 for rx.re_nsub. As this value is often
used afterwards in malloc this normally leads to the termination of the
programm (either because of the segfault or due to the assumption of no free
memory), so unsaved data gets lost.

The problem is well known
(http://www.exim.org/lurker/message/20120822.143744.147fd5d2.de.html)
and a patch exists (http://bugs.exim.org/attachment.cgi?id=586). I can
confirm that the patch works.

Please consider applying the patch.

Cheers
Patrick

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (900, 'testing'), (500, 'testing-proposed-updates'), (500, 
'stable-updates'), (400, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/6 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages libpcre3 depends on:
ii  libc6  2.13-35
ii  multiarch-support  2.13-35

libpcre3 recommends no packages.

libpcre3 suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#686484: chowning pid directory and writing there as root may lead to security issue

2012-09-02 Thread Michael Tokarev
On 02.09.2012 13:40, Simon Kelley wrote:
[]
> The explanation for the current state of affairs is here:
> 
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508560

Oh.  I tried to find why/when this subdir appeared, but
failed.  The changelog mentions PID in uppercase ;)
I'm sorry about this, knowing that I'd have much more
useful bugreport.

> /var/run/dnsmasq is owned by user dnsmasq so that dnsmasq can unlink the pid 
> file when it shuts down, even though at that point it is running as user 
> "dnsmasq", not as user "root".

This is a very general issue with daemons dropping privileges
and their pidfiles.  Each package solves it in its own way.

Some forks a worker process which does setuid(), with a root-owned
babysitter waiting for it to exit and clean the pidfile.  Some
keeps the pidfile open and truncates (not unlinking) it on exit.
And some merely ignores this issue.

And I think this 3rd option is the best in this case.  The daemon
itself does not _use_ the pidfile, it merely writes the pidfile.
And tools like start-stop-daemon usually check /proc/$PID/exe or
equivalent for the right executable, so, even if we'll leave the
stale pidfile, no harm will be done at all.

#508560 has minor severity, and I think it is just cosmetic thing.

Note: having user-writable /var/run/FOO subdir, or keeping /var/run/FOO.pid
open after dropping privileges are both, well, risky, since in both
cases the process in question gains more privileges than actually
necessary.  It only needs to REMOVE (or clear) one file, but it can
fill whole /var/run, or write some garbage to the pid file to trick
the startup script (run as root) to execute some evil code.

So I think just stopping caring (and reintroducing #508560) is the
best thing to do.  And by moving the pidfile back to /var/run/ we're
back to the documented place and to no need for extra args.

(But such "moving back", if choosen, should be done carefully -- the
initscript may need to continue providing /var/run/dnsmasq/ dir, now
without chowning it, since old config may need it.  Sigh.)

Answering to the other your email: O_EXCL exist, yes, but we still
have more privs (with writable subdir in /var/run/) than necessary.
Not as dangerous as current way, but still a bit too many.

Thank you!

/mjt


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#686258: Please allow translation of all debconf templates

2012-09-02 Thread Rodolfo García Peñas (kix)
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 01/09/12 19:49, David Prévot wrote:

> Hi Rodolfo,
> 
> Le 30/08/2012 14:48, David Prévot a écrit :
>> Le 30/08/2012 13:41, "Rodolfo García Peñas (kix)" a écrit :
>>> On 30/08/2012 18:01, David Prévot wrote:
 Package: uswsusp
> 
>> I would advise to only take care of this issue, i.e, apply the
>> simple patch proposed in the bug report, run debconf-updatepo,
>> and send a call for translation (that is what I'm proposing help
>> for).
> 
> Just done that. I'll ping you back in a about a week with a
> debdiff including all up to date translations.
> 
> Regards
> 
> David
> 








Ok,

done. I will wait the translators. Thanks for your help.

OTOH I have some (2) returned emails of tranlators:

First:

The original message was received at Sun, 2 Sep 2012 11:46:41 +0200
from localhost [127.0.0.1]

   - The following addresses had permanent fatal errors -

(reason: 550 Unrouteable address)

   - Transcript of session follows -
... while talking to master.debian.org.:

>>> RCPT To:






<<< 550 Unrouteable address
550 5.1.1 ... User unknown

>>> DATA






<<< 503-All RCPT commands were rejected with this error:
<<< 503-Unrouteable address
<<< 503 valid RCPT command must precede DATA

Second:

in chào Rodolfo GarcíaPeñas (kix) ,

Chúng tôi viết thư để thông báo cho bạn biết rằng nhóm mà bạn đang cố
tìm cách liên hệ (vi-vn) có thể không tồn tại hoặc bạn có thể không
được phép đăng bài vào nhóm. Một số chi tiết khác về lý do bạn không
thể đăng bài:

 * Có thể bạn viết hoặc định dạng tên nhóm không đúng.
 * Chủ nhóm có thể đã xóa nhóm này.
 * Có thể bạn cần tham gia nhóm trước khi được phép đăng bài.
 * Nhóm này có thể không mở để đăng bài.

Nếu bạn có câu hỏi liên quan đến nhóm Google này hoặc bất kỳ nhóm
Google nào khác, hãy truy cập Trung tâm Trợ giúp tại
http://groups.google.com/support/?hl=vi_US.

Xin cảm ơn,

Google Groups

Thanks a lot,
Best regards,
kix
- -- 
||// //\\// Rodolfo "kix" Garcia
||\\// //\\ http://www.kix.es/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=RYFQ
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#686484: chowning pid directory and writing there as root may lead to security issue

2012-09-02 Thread Simon Kelley

On 02/09/12 08:44, Michael Tokarev wrote:

Package: dnsmasq
Version: 2.55-2
Severity: serious
Tags: security


Ignore my previous question: currently educating myself about O_EXCL


Simon.


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: your mail

2012-09-02 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> forwarded 677929 
> https://sourceforge.net/tracker/?func=detail&atid=422030&aid=3540052&group_id=38414
Bug #677929 [python-docutils] python-docutils: remote copy of MathJax needed to 
render maths
Set Bug forwarded-to-address to 
'https://sourceforge.net/tracker/?func=detail&atid=422030&aid=3540052&group_id=38414'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
677929: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677929
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#686484: chowning pid directory and writing there as root may lead to security issue

2012-09-02 Thread Simon Kelley

On 02/09/12 08:44, Michael Tokarev wrote:

Package: dnsmasq
Version: 2.55-2
Severity: serious
Tags: security

The initscript (and postinst script) of dnsmasq creates /var/run/dnsmasq
directory and chowns it to dnsmasq:nogroup.  However, dnsmasq daemon writes
the pidfile (which apparently is the only file there) as root user.  Here's
the code which does this (in src/dnsmasq.c):

   FILE *pidfile;

   /* only complain if started as root */
   if ((pidfile = fopen(daemon->runfile, "w")))
 {
   fprintf(pidfile, "%d\n", (int) getpid());
   fclose(pidfile);
 }

So there's no checking for this file to exist, being a symlink etc.

This way, we effectively making dnsmasq user equal to root: dnsmasq
user can (sym)link /var/run/dnsmasq/dnsmasq.pid to, say, /etc/shadow,
and it will be overwitten the next time dnsmasq (re)starts.  This is
obviously wrong.

The only good side of this is that dnsmasq writes only controlled data
to this file (its pid, as per above), so the damage is minimal, ie,
only a denial of service, not gain of service (hence Severity is only
"serious").

Besides, documentation says the pid file is /var/run/dnsmasq.pid, not
/var/run/dnsmasq/dnsmasq.pid - it is the initscript which sets the option
"behind the scenes".  Also, there's no mentions in the changelog about
WHY pid file is in this location.  And more, it one can change the user
dnsmasq runs as.

It looks like this pidfile stuff needs to be removed entirely (moving
it to a subdir silently and chowning that subdir to dnsmasq user).

Thanks,

/mjt



The explanation for the current state of affairs is here:

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508560

/var/run/dnsmasq is owned by user dnsmasq so that dnsmasq can unlink the 
pid file when it shuts down, even though at that point it is running as 
user "dnsmasq", not as user "root".


I can see a couple of ways of fixing this, without just removing the 
whole edifice, but neither are perfect.


1) stat the pid file and check for symlinks, etc (or just unlink it) 
just before creating the new one. There's a race between the unlink and 
the creation though - an attacker could create the symlink then.


2) Create the pid file after changing user. That works fine in this 
case, but not in the default case when dnsmasq writes to 
/var/run/dnsmasq.pid and then changes to user "nobody". The behaviour 
would therefore need to be enabled by a special config option or risk 
breaking nearly every dnsmasq installation other than Debian/Ubunutu.



Simon.


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#685694: libmatio: diff for NMU version 1.3.4-3.1

2012-09-02 Thread Sylvestre Ledru
Le 01/09/2012 13:33, Salvatore Bonaccorso a écrit :
> Dear Sylvestre
>
> A rebuild of the libmatio-doc would suffice here, as Sebastien noted.
> Is it fine for you to upload a 'no changes' upload or would you like
> to do it yourself?
>
> This would fix RC bug #685694.
>
OK. Sounds great. :) (even if I don't like "no-changes" upload when I
don't know why it failed before ...

Don't hesitate to NMU with a 0 delay (or I can do the upload, no worries)

Thanks,
S


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#579227: Looks like we should drop jscoverage for squeeze

2012-09-02 Thread Johan Euphrosine
Sure, it doesn't seem upstream is actively developing it anymore.
On Sep 2, 2012 1:39 AM, "David Prévot"  wrote:

> Control: found -1 0.3.1-1
>
> Hi,
>
> On Sat, Nov 13, 2010 at 08:51:40PM +0100, Johan Euphrosine wrote:
> > On Sat, Nov 13, 2010 at 8:39 PM, Enrico Zini 
> wrote:
> > > Hello,
> > >
> > > thank you for maintaining jscoverage.
> > >
> > > jscoverage 0.3.1-1 is currently in squeeze and sid and has RC bugs open
> > > against it.
> > >
> > > Considering that the package has a very small number of users, that
> > > we're supposed to release fairly soon, and that this issue looks not
> > > that easy to solve, it may be a good idea to just remove
> > > jscoverage from testing and deal with this comfortably in unstable.
> > >
> > > Would it make sense for you?
> >
> > Sure,
> >
> > The only RC bugs known to me is #579227,
> >
> > Last time I pinged upstream about it, he said that it would require a
> > rewrite of some key part of jscoverage in order to use the new parser
> > API in spidermonkey and remove the embedded copy.
> >
> > I think it is a good idea to remove jscoverage from testing if it
> > blocks squeeze release, and I will keep updating the unstable package
> > when upstream publish a new major version.
>
> It seems jscoverage 0.3.1-1 currently in testing (and Squeeze) also
> shipped an embedded code copy of libmozjs, so it may be sensible to
> actually remove it from testing as suggested two years ago, and maybe
> from Squeeze too.
>
> Regards
>
> David
>
>
>


Bug#686484: chowning pid directory and writing there as root may lead to security issue

2012-09-02 Thread Michael Tokarev
Package: dnsmasq
Version: 2.55-2
Severity: serious
Tags: security

The initscript (and postinst script) of dnsmasq creates /var/run/dnsmasq
directory and chowns it to dnsmasq:nogroup.  However, dnsmasq daemon writes
the pidfile (which apparently is the only file there) as root user.  Here's
the code which does this (in src/dnsmasq.c):

  FILE *pidfile;
  
  /* only complain if started as root */
  if ((pidfile = fopen(daemon->runfile, "w")))
{
  fprintf(pidfile, "%d\n", (int) getpid());
  fclose(pidfile);
}

So there's no checking for this file to exist, being a symlink etc.

This way, we effectively making dnsmasq user equal to root: dnsmasq
user can (sym)link /var/run/dnsmasq/dnsmasq.pid to, say, /etc/shadow,
and it will be overwitten the next time dnsmasq (re)starts.  This is
obviously wrong.

The only good side of this is that dnsmasq writes only controlled data
to this file (its pid, as per above), so the damage is minimal, ie,
only a denial of service, not gain of service (hence Severity is only
"serious").

Besides, documentation says the pid file is /var/run/dnsmasq.pid, not
/var/run/dnsmasq/dnsmasq.pid - it is the initscript which sets the option
"behind the scenes".  Also, there's no mentions in the changelog about
WHY pid file is in this location.  And more, it one can change the user
dnsmasq runs as.

It looks like this pidfile stuff needs to be removed entirely (moving
it to a subdir silently and chowning that subdir to dnsmasq user).

Thanks,

/mjt


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org