Processed: unarchiving 679671, reopening 679671, found 679671 in 1:0.2
Processing commands for cont...@bugs.debian.org: unarchive 679671 Bug #679671 {Done: Goswin von Brederlow goswin-...@web.de} [ia32-libs-i386] ia32-libs-i386: depends on removed package libdb4.8 Unarchived Bug 679671 reopen 679671 Bug #679671 {Done: Goswin von Brederlow goswin-...@web.de} [ia32-libs-i386] ia32-libs-i386: depends on removed package libdb4.8 'reopen' may be inappropriate when a bug has been closed with a version; all fixed versions will be cleared, and you may need to re-add them. Bug reopened No longer marked as fixed in versions ia32-libs/20120701. # dependency on libdb4.8 is back found 679671 1:0.2 Bug #679671 [ia32-libs-i386] ia32-libs-i386: depends on removed package libdb4.8 Marked as found in versions ia32-libs/1:0.2. thanks Stopping processing here. Please contact me if you need assistance. -- 679671: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=679671 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#688229: Burning data DVD looks successful but mounting fails with ISOFS: Unable to identify CD-ROM format.
Dear Thomas, Am Sonntag, den 23.09.2012, 16:40 +0200 schrieb Paul Menzel: Am Sonntag, den 23.09.2012, 13:03 +0200 schrieb Thomas Schmitt: […] Another way to exercise DVD-R is to use DVD-RW. They need to get blanked before re-use. E.g. by xorriso -outdev /dev/sr1 -blank deformat -eject all This lasts as long as writing the full capacity of 4.7 GB. (Fast blanking is possible but the DVD-RW would afterwards refuse to perform the write type Incremental which is used by Brasero.) Some numbers from your reports are against my theory of a missing start piece: libisofs reported: brasero (libisofs)DEBUG : Processed 2119108 of 2119108 KB (100 %) dvd+rw-mediainfo and xorriso -toc report a track size of 1059568*2KB The overall sizeis of image and track would match. 2 * 1059568 - 2119108 = 28 The track size is aligned to a DVD ECC block of 32 KiB. The track was written by write type Incremental. I.e. it is supposed to bear only the bytes which were actually written, rounded up to the next multiple of 16 blocks (= 32 KiB). If a start piece of the image would be missing, then the track would have to be shorter. Gr. That really is strange. […] Everything worked fine with `xorriso`. $ xorriso -md5 on -outdev /dev/sr1 -map ~/test / Well ... Yay and G at the same time. Yay for xorriso and the drive, Grrr for my inability to explain what went wrong with the Brsaero DVD-R. Grrr³ from my side to not understanding anything. ;-) Thanks to Michael Biebl stepping up and looking into it, in #debian-gnome he wrote to have bisected this issue to commit upstream commit 5ff86b48 [1] which supposedly fixes GNOME bug 630651 [2]. Though, judging from this, it looks like the ISO image creation problem then. As this is done on the fly the created ISO image cannot be checked, right? He uploaded packages for testing with one more patch applied [3][4]. I am going to try those as soon as possible. Thanks, Paul [1] http://git.gnome.org/browse/brasero/commit/?id=5ff86b48 [2] https://bugzilla.gnome.org/show_bug.cgi?id=630651 [3] http://people.debian.org/~biebl/brasero/amd64/ [4] http://people.debian.org/~biebl/brasero/i386/ signature.asc Description: This is a digitally signed message part
Bug#690124: mahara: directory vs. symlink messup after squeeze-wheezy upgrade
Package: mahara Version: 1.5.1-2 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Hi, during a test with piuparts I noticed your package produces a lot of debsums errors after a squeeze-wheezy upgrade: 2m3.4s ERROR: FAIL: debsums reports modifications inside the chroot: /usr/share/php/dwoo/Dwoo.php /usr/share/php/dwoo/plugins/builtin/functions/math.php /usr/share/php/dwoo/plugins/builtin/functions/extendsCheck.php /usr/share/php/dwoo/plugins/builtin/functions/tif.php /usr/share/php/dwoo/plugins/builtin/functions/load_templates.php /usr/share/php/dwoo/plugins/builtin/blocks/block.php /usr/share/php/dwoo/plugins/builtin/blocks/textformat.php /usr/share/php/dwoo/plugins/builtin/blocks/section.php /usr/share/php/dwoo/plugins/builtin/blocks/for.php /usr/share/php/dwoo/plugins/builtin/blocks/template.php /usr/share/php/dwoo/Dwoo/Adapters/CodeIgniter/controllers/dwoowelcome.php /usr/share/php/dwoo/Dwoo/Adapters/CakePHP/dwoo.php /usr/share/php/dwoo/Dwoo/Adapters/ZendFramework/View.php /usr/share/php/dwoo/Dwoo/Compiler.php /usr/share/php/dwoo/Dwoo/Data.php /usr/share/php/dwoo/Dwoo/ITemplate.php /usr/share/php/dwoo/Dwoo/Smarty/Adapter.php This is probably caused by some symlink mess: 1m55.4s INFO: dirname part contains a symlink: /usr/share/mahara/lib/dwoo/dwoo/CHANGELOG != /usr/share/php/dwoo/CHANGELOG (mahara) /usr/share/mahara/lib/dwoo/dwoo/Dwoo != /usr/share/php/dwoo/Dwoo (mahara) /usr/share/mahara/lib/dwoo/dwoo/Dwoo.compiled.php != /usr/share/php/dwoo/Dwoo.compiled.php (mahara) /usr/share/mahara/lib/dwoo/dwoo/Dwoo.php != /usr/share/php/dwoo/Dwoo.php (mahara) /usr/share/mahara/lib/dwoo/dwoo/Dwoo/Adapters != /usr/share/php/dwoo/Dwoo/Adapters (mahara) /usr/share/mahara/lib/dwoo/dwoo/Dwoo/Adapters/Agavi != /usr/share/php/dwoo/Dwoo/Adapters/Agavi (mahara) /usr/share/mahara/lib/dwoo/dwoo/Dwoo/Adapters/Agavi/DwooRenderer.php != /usr/share/php/dwoo/Dwoo/Adapters/Agavi/DwooRenderer.php (mahara) /usr/share/mahara/lib/dwoo/dwoo/Dwoo/Adapters/Agavi/dwoo_plugins != /usr/share/php/dwoo/Dwoo/Adapters/Agavi/dwoo_plugins (mahara) /usr/share/mahara/lib/dwoo/dwoo/Dwoo/Adapters/Agavi/dwoo_plugins/t.php != /usr/share/php/dwoo/Dwoo/Adapters/Agavi/dwoo_plugins/t.php (mahara) [...] /usr/share/mahara/lib/dwoo/dwoo/plugins/builtin/functions/reverse.php != /usr/share/php/dwoo/plugins/builtin/functions/reverse.php (mahara) /usr/share/mahara/lib/dwoo/dwoo/plugins/builtin/functions/safe.php != /usr/share/php/dwoo/plugins/builtin/functions/safe.php (mahara) /usr/share/mahara/lib/dwoo/dwoo/plugins/builtin/functions/spacify.php != /usr/share/php/dwoo/plugins/builtin/functions/spacify.php (mahara) /usr/share/mahara/lib/dwoo/dwoo/plugins/builtin/functions/string_format.php != /usr/share/php/dwoo/plugins/builtin/functions/string_format.php (mahara) /usr/share/mahara/lib/dwoo/dwoo/plugins/builtin/functions/strip_tags.php != /usr/share/php/dwoo/plugins/builtin/functions/strip_tags.php (mahara) /usr/share/mahara/lib/dwoo/dwoo/plugins/builtin/functions/tif.php != /usr/share/php/dwoo/plugins/builtin/functions/tif.php (mahara) /usr/share/mahara/lib/dwoo/dwoo/plugins/builtin/functions/truncate.php != /usr/share/php/dwoo/plugins/builtin/functions/truncate.php (mahara) /usr/share/mahara/lib/dwoo/dwoo/plugins/builtin/functions/upper.php != /usr/share/php/dwoo/plugins/builtin/functions/upper.php (mahara) /usr/share/mahara/lib/dwoo/dwoo/plugins/builtin/functions/whitespace.php != /usr/share/php/dwoo/plugins/builtin/functions/whitespace.php (mahara) /usr/share/mahara/lib/dwoo/dwoo/plugins/builtin/functions/wordwrap.php != /usr/share/php/dwoo/plugins/builtin/functions/wordwrap.php (mahara) /usr/share/mahara/lib/dwoo/dwoo/plugins/builtin/helper.array.php != /usr/share/php/dwoo/plugins/builtin/helper.array.php (mahara) /usr/share/mahara/lib/dwoo/dwoo/plugins/builtin/processors != /usr/share/php/dwoo/plugins/builtin/processors (mahara) /usr/share/mahara/lib/dwoo/dwoo/plugins/builtin/processors/pre.smarty_compat.php != /usr/share/php/dwoo/plugins/builtin/processors/pre.smarty_compat.php (mahara) This looks like stuff is getting installed over an existing symlink, overwriting other files ... dpk intentionally does not replace directories with syminks and vice versa. You need to use maintainer scripts to support this properly, usually: * link becomes dir: preinst: delete symlink that shall become a directory * dir becomes link: postinst: delete empty directory and create symlink manually Andreas mahara_1.5.1-2.log.gz Description: GNU Zip compressed data
Bug#690128: inn2: conffile disappearing during squeeze-wheezy upgrade: /etc/news/motd.news
Package: inn2 Version: 2.5.3-1 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Hi, during a test with piuparts I noticed your package deletes a conffile during the upgrade from squeeze to wheezy, debsums reports an error afterwards: 1m24.8s ERROR: FAIL: debsums reports modifications inside the chroot: debsums: missing file /etc/news/motd.news (from inn2 package) I couldn't find the deletion in the maintainer scripts, so it's probably done by something something that is run from the maintainer scripts. As the wheezy package no longer ships this file as a conffile, this looks like an intentional deletion, but to do this properly and record it in dpkg's database accordingly, please use dpkg-maintscript-helper rm_conffile (ideally via debian/inn2.maintscript). Andreas inn2_2.5.3-1.log.gz Description: GNU Zip compressed data
Bug#688229: Burning data DVD looks successful but mounting fails
Hi, i think i can spot a byte eating problem in http://git.gnome.org/browse/brasero/commit/?id=5ff86b48 resp. the master-branch commit http://git.gnome.org/browse/brasero/commit/?id=1b8397ee252df2d554682ca2d694d5937fbf6e39 - @@ -200,6 +198,7 @@ brasero_libisofs_write_image_to_fd_thread (BraseroLibisofs *self) brasero_job_get_fd_out (BRASERO_JOB (self), fd); BRASERO_JOB_LOG (self, Writing to pipe); + read_bytes = priv-libburn_src-read_xt (priv-libburn_src, buf, sector_size); while (priv-libburn_src-read_xt (priv-libburn_src, buf, sector_size) == sector_size) { if (priv-cancel) break; - Variable read_bytes is set by a call of libisofs' resp. libburn's burn_source.read_xt() which consumes data (one sector ?) into buf. The call in the while() statement consumes another sector and thus overwrites the previously read buffer without having done anything else with that first buffer content. Further down i see a similar change that looks more plausible to me: - @@ -254,7 +261,8 @@ brasero_libisofs_write_image_to_file_thread (BraseroLibisofs *self) priv = BRASERO_LIBISOFS_PRIVATE (self); brasero_job_start_progress (BRASERO_JOB (self), FALSE); - while (priv-libburn_src-read_xt (priv-libburn_src, buf, sector_size) == sector_size) { + read_bytes = priv-libburn_src-read_xt (priv-libburn_src, buf, sector_size); + while (read_bytes == sector_size) { if (priv-cancel) break; - It appears to me that this information is not yet known in https://bugzilla.gnome.org/show_bug.cgi?id=630651 Feel free to add my technical opinion to that bug report. I will try to contact Philippe Rouquier directly on this issue. Swallowing the first sector is enough to make the image not mountable. But regrettably a single lost sector does not yet explain the fact that we find Joliet data at block 16. The normal layout of an ISO 9660 image with Joliet (and no El Torito boot equipment) would be Block 16: ISO (660/ECMA-119 Primary Volume Descriptor Block 17: Joliet Volume Descriptor (which would not contain names of payload files like IMG_2428.JPG) Block 18: Volume Descriptor Set Terminator libisofs will then pad up to 64 KB and first write the ISO 9660 + Rock Ridge tree. Several blocks to be expected. Only then comes the Joliet directory tree with those entries which we found at block 16. So we look for a byte eater that swallows at least a few dozen sectors and not only the first one. Nevertheless, the code pieces, where above change was made, look much like the place where the emerging damage of an ISO 9660 image can be watched ... if it is not caused there. A very good starting point for debugging, i'd say. Telling from the function names, i would say the change which i deem bad is in charge for writing to optical media, whereas the good one is in charge for writing image to a file in hard disk. An according difference in success can be found in several Brasero bug reports of the last years. Have a nice day :) Thomas -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#690130: tryton: maintainer address still bounces
Source: tryton-modules-account-statement Severity: serious The maintainer address still bounces... Ansgar On 10/10/2012 11:19 AM, Mail Delivery System wrote: This is the mail system at host debian.tryton.org. I'm sorry to have to inform you that your message could not be delivered to one or more recipients. It's attached below. For further assistance, please send mail to postmaster. If you do so, please include this problem report. You can delete your own text from the attached returned message. The mail system try...@lists.debian-maintainers.org (expanded from maintain...@debian.tryton.org): Host or domain name not found. Name service error for name=lists.debian-maintainers.org type=MX: Host not found, try again Reporting-MTA: dns; debian.tryton.org X-Postfix-Queue-ID: D014F121F48 X-Postfix-Sender: rfc822; d...@franck.debian.org Arrival-Date: Fri, 5 Oct 2012 09:02:08 + (UTC) Final-Recipient: rfc822; try...@lists.debian-maintainers.org Original-Recipient: rfc822;maintain...@debian.tryton.org Action: failed Status: 4.4.3 Diagnostic-Code: X-Postfix; Host or domain name not found. Name service error for name=lists.debian-maintainers.org type=MX: Host not found, try again -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: found 689121 in 5.10.4-4, affects 685468, affects 689835, user debian...@lists.debian.org ...
Processing commands for cont...@bugs.debian.org: found 689121 5.10.4-4 Bug #689121 {Done: Євгеній Мещеряков eu...@debian.org} [swi-prolog-nox] swi-prolog-nox: should not ship /usr/lib/swi-prolog/library/INDEX.pl Marked as found in versions swi-prolog/5.10.4-4. affects 685468 + autofs5 Bug #685468 {Done: Michael Tokarev m...@tls.msk.ru} [autofs] autofs: fails to purge - command ucf in postrm not found Added indication that 685468 affects autofs5 affects 689835 + sendfile Bug #689835 [base-files] base-files: please add md5sums for /etc/profile as modified by sendfile package Ignoring request to set affects of bug 689835 to the same value previously set user debian...@lists.debian.org Setting user to debian...@lists.debian.org (was deb...@abeckmann.de). affects 689785 + fgfs-atlas Bug #689785 [fgfs-base] fgfs-base: missing Breaks: fgfs-atlas due to /u/s/g/FlightGear - /u/s/g/flightgear rename Added indication that 689785 affects fgfs-atlas usertags 689785 piuparts There were no usertags set. Usertags are now: piuparts. affects 688288 + freehdl Bug #688288 {Done: Andreas Beckmann deb...@abeckmann.de} [src:guile-1.6] guile-1.6: modifies *.la after calling dh_md5sums, resulting in md5sum-mismatch lintian error Added indication that 688288 affects freehdl affects 681147 + diffmon mcron Bug #681147 [libmilter-dev] libmilter-dev: /u/s/d/libmilter-dev is a symlink to sendmail, but ships files in /u/s/d/libmilter-dev Added indication that 681147 affects diffmon and mcron usertags 690067 piuparts There were no usertags set. Usertags are now: piuparts. unblock 690067 with 421346 Bug #690067 [syslog-ng-core] symlink conffiles are not supported, causing problems for dpkg on upgrade/removal and incorrect debsums reports 690067 was blocked by: 421346 690067 was blocking: 421346 Removed blocking bug(s) of 690067: 421346 unblock 421346 with 690067 Bug #421346 [debhelper] debhelper: should automatically mark symlinks in /etc as conffiles 421346 was blocked by: 690051 421344 421346 was not blocking any bugs. Removed blocking bug(s) of 421346: 690067 affects 690067 = none Bug #690067 [syslog-ng-core] symlink conffiles are not supported, causing problems for dpkg on upgrade/removal and incorrect debsums reports Added indication that 690067 affects none affects 689249 + mediawiki-math Bug #689249 [mediawiki-extensions-math] mediawiki-extensions-math: installs files in /usr/share/mediawiki/extensions which is a symlink in the mediawiki package Added indication that 689249 affects mediawiki-math thanks Stopping processing here. Please contact me if you need assistance. -- 421346: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=421346 681147: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681147 685468: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685468 688288: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688288 689121: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689121 689249: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689249 689785: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689785 689835: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689835 690067: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690067 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#690132: libtexttools-doc: needs to handle /usr/share/doc/libtexttools-doc symlink to directory transition on upgrades from squeeze
Package: libtexttools-doc Version: 2.1.0-1 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Hi, during a test with piuparts I noticed your package does install files over existing symlinks on upgrades from squeeze. dpkg intentionally does not replace directories with symlinks or vice versa. This causes overwriting of unrelated files that cannot be detected by dpkg. You probably need to delete the obsolete link in the preinst script. From the attached log: 0m54.5s INFO: dirname part contains a symlink: /usr/share/doc/libtexttools-doc/README != /usr/share/doc/libtexttools4/README (libtexttools-doc) /usr/share/doc/libtexttools-doc/TODO != /usr/share/doc/libtexttools4/TODO (libtexttools-doc) /usr/share/doc/libtexttools-doc/changelog.Debian.gz != /usr/share/doc/libtexttools4/changelog.Debian.gz (libtexttools-doc) /usr/share/doc/libtexttools-doc/copyright != /usr/share/doc/libtexttools4/copyright (libtexttools-doc) /usr/share/doc/libtexttools-doc/examples != /usr/share/doc/libtexttools4/examples (libtexttools-doc) /usr/share/doc/libtexttools-doc/examples/alert.adb != /usr/share/doc/libtexttools4/examples/alert.adb (libtexttools-doc) /usr/share/doc/libtexttools-doc/examples/basic.adb != /usr/share/doc/libtexttools4/examples/basic.adb (libtexttools-doc) /usr/share/doc/libtexttools-doc/examples/basic2.adb != /usr/share/doc/libtexttools4/examples/basic2.adb (libtexttools-doc) /usr/share/doc/libtexttools-doc/examples/examples.gpr.sed != /usr/share/doc/libtexttools4/examples/examples.gpr.sed (libtexttools-doc) /usr/share/doc/libtexttools-doc/examples/listinfo.adb != /usr/share/doc/libtexttools4/examples/listinfo.adb (libtexttools-doc) /usr/share/doc/libtexttools-doc/examples/listinfo.txt != /usr/share/doc/libtexttools4/examples/listinfo.txt (libtexttools-doc) /usr/share/doc/libtexttools-doc/examples/listinfo2.adb != /usr/share/doc/libtexttools4/examples/listinfo2.adb (libtexttools-doc) /usr/share/doc/libtexttools-doc/examples/os_demo.adb != /usr/share/doc/libtexttools4/examples/os_demo.adb (libtexttools-doc) /usr/share/doc/libtexttools-doc/examples/scrollable.adb != /usr/share/doc/libtexttools4/examples/scrollable.adb (libtexttools-doc) /usr/share/doc/libtexttools-doc/examples/try_unix.adb != /usr/share/doc/libtexttools4/examples/try_unix.adb (libtexttools-doc) /usr/share/doc/libtexttools-doc/examples/uio2_demo.adb != /usr/share/doc/libtexttools4/examples/uio2_demo.adb (libtexttools-doc) /usr/share/doc/libtexttools-doc/examples/uio_demo.adb != /usr/share/doc/libtexttools4/examples/uio_demo.adb (libtexttools-doc) /usr/share/doc/libtexttools-doc/refmanual.html != /usr/share/doc/libtexttools4/refmanual.html (libtexttools-doc) /usr/share/doc/libtexttools-doc/usermanual.html != /usr/share/doc/libtexttools4/usermanual.html (libtexttools-doc) 0m55.0s ERROR: FAIL: debsums reports modifications inside the chroot: /usr/share/doc/libtexttools4/changelog.Debian.gz /usr/share/doc/libtexttools4/copyright Andreas libtexttools-doc_2.1.0-1.log.gz Description: GNU Zip compressed data
Bug#690133: mozilla-plugin-vlc: installs files over existing /usr/share/doc/mozilla-plugin-vlc - vlc-nox symlink, overwriting files from vlc-nox
Package: mozilla-plugin-vlc Version: 2.0.0-1 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Hi, during a test with piuparts I noticed your package overwrites files from vlc-nox on upgrades from squeeze because it does not handle an old /usr/share/doc/mozilla-plugin-vlc symlink properly. This symlink should be removed in the preinst script on upgrades. dpkg intentioanlly does not replace directories with symlinks or vice versa. From the attached log: 1m2.5s INFO: dirname part contains a symlink: /usr/share/doc/mozilla-plugin-vlc/changelog.Debian.gz != /usr/share/doc/vlc-nox/changelog.Debian.gz (mozilla-plugin-vlc) /usr/share/doc/mozilla-plugin-vlc/changelog.gz != /usr/share/doc/vlc-nox/changelog.gz (mozilla-plugin-vlc) /usr/share/doc/mozilla-plugin-vlc/copyright != /usr/share/doc/vlc-nox/copyright (mozilla-plugin-vlc) 1m3.6s ERROR: FAIL: debsums reports modifications inside the chroot: /usr/share/doc/mozilla-plugin-vlc/changelog.Debian.gz /usr/share/doc/mozilla-plugin-vlc/changelog.gz /usr/share/doc/mozilla-plugin-vlc/copyright cheers, Andreas mozilla-plugin-vlc_2.0.0-1.log.gz Description: GNU Zip compressed data
Bug#690128: inn2: conffile disappearing during squeeze-wheezy upgrade: /etc/news/motd.news
On 2012-10-10 12:37, Julien ÉLIE wrote: The file /etc/news/motd.news is renamed to /etc/news/motd.nnrpd by the innupgrade script shipped by upstream. Should this renaming by upstream be marked as a removal in the maintainter scripts? /etc/news/motd.nnrpd is no longer shipped as a conffile? How is it generated (if at all)? I don't see it in my sid chroot (pbuilder, policy-rc.d forbids starting any service). If it were still a conffile shipped by inn2, dpkg-maint-script-helper mv_conffile would be the correct tool. And how is the new file being cleaned up on purge if it exists? Andreas -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#690128: inn2: conffile disappearing during squeeze-wheezy upgrade: /etc/news/motd.news
Hi Andreas, 1m24.8s ERROR: FAIL: debsums reports modifications inside the chroot: debsums: missing file /etc/news/motd.news (from inn2 package) I couldn't find the deletion in the maintainer scripts, so it's probably done by something something that is run from the maintainer scripts. As the wheezy package no longer ships this file as a conffile, this looks like an intentional deletion, but to do this properly and record it in dpkg's database accordingly, please use dpkg-maintscript-helper rm_conffile (ideally via debian/inn2.maintscript). The file /etc/news/motd.news is renamed to /etc/news/motd.nnrpd by the innupgrade script shipped by upstream. According to changelog for INN 2.5.3 : Add support for LIST MOTD in innd. Consequently, the motd.news configuration file which was previously used only by nnrpd is renamed to motd.nnrpd (innupgrade takes care of the rename). innd uses the new motd.innd file in pathetc for its message of the day. Should this renaming by upstream be marked as a removal in the maintainter scripts? -- Julien ÉLIE -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#690142: remote named DoS on recursor (CVE-2012-5166)
Package: bind9 Tags: security Severity: grave A security relevant bug on all versions of bind9 has been discovered. Only recursive servers are vulnerable. To mitigate the effects of a possible attack it should be sufficient to set minimal-responses yes; in the global options {} section. As information on that bug already leaked (and even got mailed to full-disclosure by Mandriva), I am reporting to the Debian bugtracker. See http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5166 and https://kb.isc.org/article/AA-00801 for details. best regards, Adi Kriegisch signature.asc Description: Digital signature
Bug#681147: marking for classification by piuparts-analyze
Control: found -1 diffmon/20020222-2.5 Control: found -1 kuvert/2.0.7 Control: found -1 mcron/1.0.6-1 Marking this bug as found in some package/version combinations where it is detected by piuparts to allow automatic classification by piuparts-analyze. These packages depend on mail-transport-agent, and because there exist non-buggy packages that provide this dependency, piuparts-master lets the slave check this package, but during the test the buggy sendmail mail-transport-agent will be used ... making this bug show up elsewhere. Andreas -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: marking for classification by piuparts-analyze
Processing control commands: found -1 diffmon/20020222-2.5 Bug #681147 [libmilter-dev] libmilter-dev: /u/s/d/libmilter-dev is a symlink to sendmail, but ships files in /u/s/d/libmilter-dev Marked as found in versions diffmon/20020222-2.5. found -1 kuvert/2.0.7 Bug #681147 [libmilter-dev] libmilter-dev: /u/s/d/libmilter-dev is a symlink to sendmail, but ships files in /u/s/d/libmilter-dev Marked as found in versions kuvert/2.0.7. found -1 mcron/1.0.6-1 Bug #681147 [libmilter-dev] libmilter-dev: /u/s/d/libmilter-dev is a symlink to sendmail, but ships files in /u/s/d/libmilter-dev Marked as found in versions mcron/1.0.6-1. -- 681147: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681147 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#690147: cyrus-common-2.2: missing copyright file after upgrade from squeeze
Package: cyrus-common-2.2 Version: 2.4.16-1 Severity: serious User: debian...@lists.debian.org Usertags: piuparts A test with piuparts revealed that your package misses the copyright file after an upgrade from squeeze to wheezy, which is a violation of Policy 12.5 : http://www.debian.org/doc/debian-policy/ch-docs.html#s-copyrightfile After the upgrade /usr/share/doc/$package/ is just an empty directory. Additional info may be available here: http://wiki.debian.org/MissingCopyrightFile There is something bad going on with the symlink to directory conversion that is needed if the xmame-common or xmess-common package was installed. From the attached logfile (scroll to the bottom): MISSING COPYRIGHT FILE: /usr/share/doc/cyrus-common-2.2/copyright drwxr-xr-x 2 root root 40 Oct 10 09:54 /usr/share/doc/cyrus-common-2.2 total 0 drwxr-xr-x 2 root root 40 Oct 10 09:54 . drwxr-xr-x 120 root root 2560 Oct 10 09:54 .. cheers, Andreas cyrus-common-2.2_2.4.16-1.log.gz Description: GNU Zip compressed data
Bug#690148: gcc-mingw32: missing copyright file after upgrade from squeeze
Package: gcc-mingw32 Version: 4.6.3-8+7 Severity: serious User: debian...@lists.debian.org Usertags: piuparts A test with piuparts revealed that your package misses the copyright file after an upgrade from squeeze to wheezy, which is a violation of Policy 12.5 : http://www.debian.org/doc/debian-policy/ch-docs.html#s-copyrightfile After the upgrade /usr/share/doc/$package/ is just an empty directory. Additional info may be available here: http://wiki.debian.org/MissingCopyrightFile There is something bad going on with the symlink to directory conversion that is needed if the xmame-common or xmess-common package was installed. From the attached logfile (scroll to the bottom): MISSING COPYRIGHT FILE: /usr/share/doc/gcc-mingw32/copyright drwxr-xr-x 2 root root 40 Oct 10 04:16 /usr/share/doc/gcc-mingw32 total 0 drwxr-xr-x 2 root root 40 Oct 10 04:16 . drwxr-xr-x 91 root root 2100 Oct 10 04:16 .. cheers, Andreas gcc-mingw32_4.6.3-8+7.log.gz Description: GNU Zip compressed data
Bug#690128: inn2: conffile disappearing during squeeze-wheezy upgrade: /etc/news/motd.news
Hi Andreas, The file /etc/news/motd.news is renamed to /etc/news/motd.nnrpd by the innupgrade script shipped by upstream. Should this renaming by upstream be marked as a removal in the maintainter scripts? /etc/news/motd.nnrpd is no longer shipped as a conffile? /etc/news/motd.nnrpd and /etc/news/motd.innd are two new conf files shipped with INN 2.5.3. /etc/news/motd.news is no longer used. How is it generated (if at all)? During a fresh install, motd.nnrpd and motd.innd are the two files shipped in the inn2 tarball. During an update, motd.innd is not installed. And motd.news (if present) is moved to motd.nnrpd. So motd.nnrpd can be present or not. INN works fine without the two files, don't worry. They are just message of the day informative files. If it were still a conffile shipped by inn2, dpkg-maint-script-helper mv_conffile would be the correct tool. And how is the new file being cleaned up on purge if it exists? I do not know. I do not know much about Debian scripts. I bet Marco will answer better! -- Julien ÉLIE -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669278: marking for automatic classification by piuparts-analyze
Control: found -1 digikam/4:2.6.0-1 Control: found -1 kdebase-workspace-bin/4:4.8.4-3 Control: found -1 kopete/4:4.8.4-1 Control: found -1 kdeutils/4:4.8.4+5.77 Control: found -1 konversation/1.4-1 Marking this bug as being found in some foreign $package/$version combinations. That will allow piuparts-analyze to automatically classify the failed logs. Andreas -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: marking for automatic classification by piuparts-analyze
Processing control commands: found -1 digikam/4:2.6.0-1 Bug #669278 [libqt4-dbus] please add phonon-backend-xine transitional package Bug #655382 [libqt4-dbus] libqt4-dbus has circular Depends on qdbus Bug #669878 [libqt4-dbus] Could not perform immediate configuration on 'phonon-backend-vlc' Marked as found in versions digikam/4:2.6.0-1. Marked as found in versions digikam/4:2.6.0-1. Marked as found in versions digikam/4:2.6.0-1. found -1 kdebase-workspace-bin/4:4.8.4-3 Bug #669278 [libqt4-dbus] please add phonon-backend-xine transitional package Bug #655382 [libqt4-dbus] libqt4-dbus has circular Depends on qdbus Bug #669878 [libqt4-dbus] Could not perform immediate configuration on 'phonon-backend-vlc' The source kdebase-workspace-bin and version 4:4.8.4-3 do not appear to match any binary packages Marked as found in versions kdebase-workspace-bin/4:4.8.4-3. Marked as found in versions kdebase-workspace-bin/4:4.8.4-3. Marked as found in versions kdebase-workspace-bin/4:4.8.4-3. found -1 kopete/4:4.8.4-1 Bug #669278 [libqt4-dbus] please add phonon-backend-xine transitional package Bug #655382 [libqt4-dbus] libqt4-dbus has circular Depends on qdbus Bug #669878 [libqt4-dbus] Could not perform immediate configuration on 'phonon-backend-vlc' The source kopete and version 4:4.8.4-1 do not appear to match any binary packages Marked as found in versions kopete/4:4.8.4-1. Marked as found in versions kopete/4:4.8.4-1. Marked as found in versions kopete/4:4.8.4-1. found -1 kdeutils/4:4.8.4+5.77 Bug #669278 [libqt4-dbus] please add phonon-backend-xine transitional package Bug #655382 [libqt4-dbus] libqt4-dbus has circular Depends on qdbus Bug #669878 [libqt4-dbus] Could not perform immediate configuration on 'phonon-backend-vlc' The source kdeutils and version 4:4.8.4+5.77 do not appear to match any binary packages Marked as found in versions kdeutils/4:4.8.4+5.77. Marked as found in versions kdeutils/4:4.8.4+5.77. Marked as found in versions kdeutils/4:4.8.4+5.77. found -1 konversation/1.4-1 Bug #669278 [libqt4-dbus] please add phonon-backend-xine transitional package Bug #655382 [libqt4-dbus] libqt4-dbus has circular Depends on qdbus Bug #669878 [libqt4-dbus] Could not perform immediate configuration on 'phonon-backend-vlc' Marked as found in versions konversation/1.4-1. Marked as found in versions konversation/1.4-1. Marked as found in versions konversation/1.4-1. -- 655382: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655382 669278: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669278 669878: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669878 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#690151: claws-mail: CVE-2012-4507
Package: claws-mail Severity: grave Tags: security Justification: user security hole Please see https://bugzilla.redhat.com/show_bug.cgi?id=862578 for details and a patch. Since we're in freeze, please upload a minimal fix to unstable and request an unblock. Cheers, Moritz -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#690150: libphone-ui-dev: missing copyright file after upgrade from squeeze
Package: libphone-ui-dev Version: 1:0.0.1+git20110825-2 Severity: serious User: debian...@lists.debian.org Usertags: piuparts A test with piuparts revealed that your package misses the copyright file after an upgrade from squeeze to wheezy, which is a violation of Policy 12.5 : http://www.debian.org/doc/debian-policy/ch-docs.html#s-copyrightfile After the upgrade /usr/share/doc/$package/ is just an empty directory. Additional info may be available here: http://wiki.debian.org/MissingCopyrightFile There is something bad going on with the symlink to directory conversion that is needed if the xmame-common or xmess-common package was installed. From the attached logfile (scroll to the bottom): MISSING COPYRIGHT FILE: /usr/share/doc/libphone-ui-dev/copyright drwxr-xr-x 2 root root 40 Oct 10 07:45 /usr/share/doc/libphone-ui-dev total 0 drwxr-xr-x 2 root root 40 Oct 10 07:45 . drwxr-xr-x 136 root root 2960 Oct 10 07:45 .. cheers, Andreas libphone-ui-dev_1:0.0.1+git20110825-2.log.gz Description: GNU Zip compressed data
Bug#690152: bsaf: FTBFS: Test org.jdesktop.application.TaskMonitorTest failed
Source: bsaf Version: 1.9-3 Severity: serious Tags: wheezy sid User: debian...@lists.debian.org Usertags: qa-ftbfs-20121010 qa-ftbfs Justification: FTBFS in wheezy on amd64 Hi, During a rebuild of all packages in *wheezy*, your package failed to build on amd64. Relevant part: debian/rules build dh build --with javahelper dh_testdir dh_auto_configure jh_linkjars dh_auto_build Buildfile: /«PKGBUILDDIR»/build.xml init: [mkdir] Created dir: /«PKGBUILDDIR»/build [mkdir] Created dir: /«PKGBUILDDIR»/dist [mkdir] Created dir: /«PKGBUILDDIR»/test compile: [javac] /«PKGBUILDDIR»/build.xml:37: warning: 'includeantruntime' was not set, defaulting to build.sysclasspath=last; set to false for repeatable builds [javac] Compiling 38 source files to /«PKGBUILDDIR»/build [javac] Note: Some input files use unchecked or unsafe operations. [javac] Note: Recompile with -Xlint:unchecked for details. [copy] Copying 6 files to /«PKGBUILDDIR»/build jar: [jar] Building jar: /«PKGBUILDDIR»/dist/bsaf-1.9.jar compile-test: [javac] /«PKGBUILDDIR»/build.xml:49: warning: 'includeantruntime' was not set, defaulting to build.sysclasspath=last; set to false for repeatable builds [javac] Compiling 26 source files to /«PKGBUILDDIR»/test [javac] Note: Some input files use or override a deprecated API. [javac] Note: Recompile with -Xlint:deprecation for details. [javac] Note: Some input files use unchecked or unsafe operations. [javac] Note: Recompile with -Xlint:unchecked for details. [copy] Copying 28 files to /«PKGBUILDDIR»/test check-display: test: [junit] Running org.jdesktop.application.AbstractBeanTest [junit] Testsuite: org.jdesktop.application.AbstractBeanTest [junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 0.044 sec [junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 0.044 sec [junit] [junit] Running org.jdesktop.application.ApplicationActionMapTest [junit] Testsuite: org.jdesktop.application.ApplicationActionMapTest [junit] Tests run: 13, Failures: 0, Errors: 0, Time elapsed: 0.17 sec [junit] Tests run: 13, Failures: 0, Errors: 0, Time elapsed: 0.17 sec [junit] [junit] Running org.jdesktop.application.ApplicationDefaultLNFResourceTest [junit] Testsuite: org.jdesktop.application.ApplicationDefaultLNFResourceTest [junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 0.149 sec [junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 0.149 sec [junit] [junit] Running org.jdesktop.application.ApplicationEndTest [junit] Testsuite: org.jdesktop.application.ApplicationEndTest [junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 0.158 sec [junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 0.158 sec [junit] [junit] Running org.jdesktop.application.ApplicationMotifLNFResourceTest [junit] Testsuite: org.jdesktop.application.ApplicationMotifLNFResourceTest [junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 0.149 sec [junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 0.149 sec [junit] [junit] Running org.jdesktop.application.ApplicationNimbusLNFResourceTest [junit] Testsuite: org.jdesktop.application.ApplicationNimbusLNFResourceTest [junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 0.197 sec [junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 0.197 sec [junit] [junit] Running org.jdesktop.application.ApplicationNoLNFResourceTest [junit] Testsuite: org.jdesktop.application.ApplicationNoLNFResourceTest [junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 0.15 sec [junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 0.15 sec [junit] [junit] Running org.jdesktop.application.ApplicationPrivateCtorTest [junit] Testsuite: org.jdesktop.application.ApplicationPrivateCtorTest [junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 0.144 sec [junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 0.144 sec [junit] [junit] Running org.jdesktop.application.ApplicationSystemLNFResourceTest [junit] Testsuite: org.jdesktop.application.ApplicationSystemLNFResourceTest [junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 0.158 sec [junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 0.158 sec [junit] [junit] Running org.jdesktop.application.LocalStorageTest [junit] Testsuite: org.jdesktop.application.LocalStorageTest [junit] Creating LocalStorage tmp directory /«PKGBUILDDIR»/build/local-storage.tmp [junit] LocalStorage tmp directory: /«PKGBUILDDIR»/build/local-storage.tmp [junit] Tests run: 2, Failures: 0, Errors: 0, Time elapsed: 0.118 sec [junit] Tests run: 2, Failures: 0, Errors: 0, Time elapsed: 0.118 sec [junit] [junit
Bug#690153: jscribble: FTBFS: tests timeout
Source: jscribble Version: 1.7.7-1.1 Severity: serious Tags: wheezy sid User: debian...@lists.debian.org Usertags: qa-ftbfs-20121010 qa-ftbfs Justification: FTBFS in wheezy on amd64 Hi, During a rebuild of all packages in *wheezy*, your package failed to build on amd64. Relevant part: make[2]: Entering directory `/«PKGBUILDDIR»' javac -encoding UTF-8 -classpath /usr/share/java/junit.jar -sourcepath .:jscribble tests/jscribble/notebook/WriteoutThreadTest.java javac -encoding UTF-8 -classpath /usr/share/java/junit.jar -sourcepath .:jscribble tests/jscribble/notebook/NoteSheetTest.java javac -encoding UTF-8 -classpath /usr/share/java/junit.jar -sourcepath .:jscribble tests/jscribble/notebook/NoteSheetFileFilterTest.java javac -encoding UTF-8 -classpath /usr/share/java/junit.jar -sourcepath .:jscribble tests/jscribble/notebook/NoteBookTest.java javac -encoding UTF-8 -classpath /usr/share/java/junit.jar -sourcepath .:jscribble tests/jscribble/notebook/NoteBookCompressorTest.java javac -encoding UTF-8 -classpath /usr/share/java/junit.jar -sourcepath .:jscribble tests/jscribble/helpers/FileComparatorTest.java javac -encoding UTF-8 -classpath /usr/share/java/junit.jar -sourcepath .:jscribble tests/jscribble/drawPanel/HelpItemTest.java javac -encoding UTF-8 -classpath /usr/share/java/junit.jar -sourcepath .:jscribble tests/jscribble/VersionNameTest.java javac -encoding UTF-8 -classpath /usr/share/java/junit.jar -sourcepath .:jscribble tests/JscribbleTestSuite.java junit -text tests.JscribbleTestSuite make[1]: *** wait: No child processes. Stop. make[1]: *** Waiting for unfinished jobs make[1]: *** wait: No child processes. Stop. make: *** wait: No child processes. Stop. make: *** Waiting for unfinished jobs make: *** wait: No child processes. Stop. make[2]: *** [test] Error 1 Build killed with signal TERM after 60 minutes of inactivity Build finished at 20121010-0542 The full build log is available from: http://people.debian.org/~lucas/logs/2012/10/10/jscribble_1.7.7-1.1_wheezy.log A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! About the archive rebuild: The rebuild was done on EC2 VM instances from Amazon Web Services, using a clean, minimal and up-to-date chroot. Every failed build was retried once to eliminate random failures. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#689257: only remove the initscripts and symlinks on purge
tags 689257 + patch thanks Hi Kai Note I have not taken any upload action, only attaching here a patch. The postrm removes the two initscripts, but these should only be removed on purge. If I'm correctly it should suffice here, moving all the action to only the purge call, and do nothing else on remove, abort-install and disappear. Note: I only had a really quick look and this should/can maybe further improved. Regards, Salvatore diff -Nru roundup-1.4.20/debian/changelog roundup-1.4.20/debian/changelog --- roundup-1.4.20/debian/changelog 2012-06-18 23:01:34.0 +0200 +++ roundup-1.4.20/debian/changelog 2012-10-10 16:25:12.0 +0200 @@ -1,3 +1,14 @@ +roundup (1.4.20-1.1) unstable; urgency=low + + * Non-maintainer upload. + * Remove conffiles only on purge. +Fix deletes conffiles during postrm remove (policy 10.7.3) as roundup +removed /etc/init.d/roundup, /etc/init.d/roundup-dirs and init script +links also on remove, abort-install and disappear calls to postrm. +(Closes: #689257) + + -- Salvatore Bonaccorso car...@debian.org Wed, 10 Oct 2012 16:07:43 +0200 + roundup (1.4.20-1) unstable; urgency=low * New upstream release. diff -Nru roundup-1.4.20/debian/roundup.postrm roundup-1.4.20/debian/roundup.postrm --- roundup-1.4.20/debian/roundup.postrm2012-06-18 15:52:46.0 +0200 +++ roundup-1.4.20/debian/roundup.postrm2012-10-10 16:25:12.0 +0200 @@ -16,22 +16,24 @@ case $1 in - remove|purge|abort-install|disappear) + purge) rm -f /etc/init.d/roundup /etc/init.d/roundup-dirs update-rc.d roundup remove /dev/null update-rc.d roundup-dirs remove /dev/null - if [ $1 = purge ]; then - # handle a dpkg bug - [ -d /etc/roundup ] rmdir --ignore-fail-on-non-empty /etc/roundup /dev/null 21 - [ -d /var/lib/roundup/trackers ] rmdir --ignore-fail-on-non-empty /var/lib/roundup/trackers /dev/null 21 - [ -d /var/lib/roundup ] rmdir --ignore-fail-on-non-empty /var/lib/roundup /dev/null 21 - rm -f /var/service/roundup /dev/null 21 - rm -fr /etc/roundup/service /dev/null 21 - rm -fr /var/run/roundup /dev/null 21 - check_and_delete_user - check_and_delete_group - fi + # handle a dpkg bug + [ -d /etc/roundup ] rmdir --ignore-fail-on-non-empty /etc/roundup /dev/null 21 + [ -d /var/lib/roundup/trackers ] rmdir --ignore-fail-on-non-empty /var/lib/roundup/trackers /dev/null 21 + [ -d /var/lib/roundup ] rmdir --ignore-fail-on-non-empty /var/lib/roundup /dev/null 21 + rm -f /var/service/roundup /dev/null 21 + rm -fr /etc/roundup/service /dev/null 21 + rm -fr /var/run/roundup /dev/null 21 + check_and_delete_user + check_and_delete_group ;; + remove|abort-install|disappear) +# do nothing +;; + upgrade) # do nothing ;; signature.asc Description: Digital signature
Processed: only remove the initscripts and symlinks on purge
Processing commands for cont...@bugs.debian.org: tags 689257 + patch Bug #689257 [roundup] roundup: deletes conffiles during postrm remove (policy 10.7.3) Added tag(s) patch. thanks Stopping processing here. Please contact me if you need assistance. -- 689257: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689257 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#688229: 688229: hack to emulate drive (was: Burning data DVD looks successful but mounting fails with ISOFS: Unable to identify CD-ROM format.)
Dear Thomas and other folks, Am Sonntag, den 23.09.2012, 16:40 +0200 schrieb Paul Menzel: Am Sonntag, den 23.09.2012, 13:03 +0200 schrieb Thomas Schmitt: […] Is there some way to simulate a burner to find out what happened? libburn would accept burner addresses like stdio:/tmp/my_emulated_drive which would behave like DVD-RAM or DVD+RW. I.e. quite different from DVD-R or DVD+R. Nevertheless such an emulated drive would allow to exercise the communications between libisofs and libburn, as done by Brasero. I do not know how to make Brasero use such a drive address. Probably one would have to hack its source. I will take a look. And I did and came up with the attached patch. So for anyone wanting to try it if he can reproduce the problems with this also go ahead. It seems to even emulate the slow writing speed. ;-) […] Thanks, Paul From a95089b51414b86466b0a74d1e91ebaf71f5c5d9 Mon Sep 17 00:00:00 2001 From: Paul Menzel paulepan...@users.sourceforge.net Date: Wed, 10 Oct 2012 11:09:59 +0200 Subject: [PATCH] burn-libburn-common.c: Use std:/tmp/my_emulated_drive --- plugins/libburnia/burn-libburn-common.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/plugins/libburnia/burn-libburn-common.c b/plugins/libburnia/burn-libburn-common.c index 1965b86..ec9ec8b 100644 --- a/plugins/libburnia/burn-libburn-common.c +++ b/plugins/libburnia/burn-libburn-common.c @@ -164,7 +164,7 @@ brasero_libburn_common_ctx_new (BraseroJob *job, /* we just want to scan the drive proposed by drive */ brasero_job_get_device (job, device); - res = burn_drive_convert_fs_adr (device, libburn_device); + res = burn_drive_convert_fs_adr (stdio:/tmp/my_emulated_drive, libburn_device); g_free (device); if (res = 0) { g_set_error (error, -- 1.7.10.4 signature.asc Description: This is a digitally signed message part
Bug#690155: libsvn-{dev, java, ruby1.8}: missing copyright file after upgrade from squeeze
Package: libsvn-dev,libsvn-java,libsvn-ruby1.8 Version: 1.7.5-1 Severity: serious User: debian...@lists.debian.org Usertags: piuparts A test with piuparts revealed that your package misses the copyright file after an upgrade from squeeze to wheezy, which is a violation of Policy 12.5 : http://www.debian.org/doc/debian-policy/ch-docs.html#s-copyrightfile After the upgrade /usr/share/doc/$package/ is just an empty directory. Additional info may be available here: http://wiki.debian.org/MissingCopyrightFile There is something bad going on with the symlink to directory conversion that is needed if the xmame-common or xmess-common package was installed. From the attached logfile (scroll to the bottom): MISSING COPYRIGHT FILE: /usr/share/doc/libsvn-dev/copyright drwxr-xr-x 2 root root 40 Oct 3 18:58 /usr/share/doc/libsvn-dev total 0 drwxr-xr-x 2 root root 40 Oct 3 18:58 . drwxr-xr-x 132 root root 2760 Oct 3 18:58 .. Please check the other packages built from src:subversion, too, as piuparts might have skipped checking them if dependencies have failed. cheers, Andreas libsvn-dev_1.7.5-1.log.gz Description: GNU Zip compressed data
Bug#688229: 688229: hack to emulate drive
Hi, + res = burn_drive_convert_fs_adr (stdio:/tmp/my_emulated_drive, libburn_device); Isn't there a quotation mark missing before the comma ? Have a nice day :) Thomas -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#679671: marked as done (ia32-libs-i386: depends on removed package libdb4.8)
Your message dated Wed, 10 Oct 2012 15:17:38 + with message-id e1tly2u-0001ru...@franck.debian.org and subject line Bug#679671: fixed in ia32-libs 1:0.3 has caused the Debian Bug report #679671, regarding ia32-libs-i386: depends on removed package libdb4.8 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 679671: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=679671 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: ia32-libs-i386 Version: 20120616 Severity: serious Your package depends on libdb4.8 which is no longer available in unstable. -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (101, 'experimental') Architecture: i386 (x86_64) Kernel: Linux 3.4.4-nouveau (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash ---End Message--- ---BeginMessage--- Source: ia32-libs Source-Version: 1:0.3 We believe that the bug you reported is fixed in the latest version of ia32-libs, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 679...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thijs Kinkhorst th...@debian.org (supplier of updated ia32-libs package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 10 Oct 2012 16:54:20 +0200 Source: ia32-libs Binary: ia32-libs ia32-libs-i386 Architecture: amd64 i386 source Version: 1:0.3 Distribution: unstable Urgency: medium Maintainer: Debian ia32-libs Team pkg-ia32-libs-maintain...@lists.alioth.debian.org Changed-By: Thijs Kinkhorst th...@debian.org Closes: 679671 Description: ia32-libs-i386 - Transitional package to migrate ia32-libs to multiarch ia32-libs - Transitional package to migrate ia32-libs to multiarch Changes: ia32-libs (1:0.3) unstable; urgency=medium . * Drop dependency on removed libdb4.8 [ROM] (Closes: #679671) Checksums-Sha1: 25f36d2f70ce558e370ecf8b92d21847279ed0c7 1397 ia32-libs_0.3.dsc c20c106211d3b0cd40ca1dcf27f49fe129504d34 115574 ia32-libs_0.3.tar.gz 723f6ee7f4b3d61497c7dcc949e7fa836aeec9dd 113502 ia32-libs_0.3_amd64.deb 693b5e245504f5acbdf7e3cbbc63a7cdfb690da4 115022 ia32-libs-i386_0.3_i386.deb Checksums-Sha256: 16445406934886aa8bd47646f10b1fbf9007471eb451f30b0c365a5436c482ef 1397 ia32-libs_0.3.dsc 21bf6829ffe9b99e029539c8433967ae11b80ad366031d132387ee622bfb7ed1 115574 ia32-libs_0.3.tar.gz 40e2852c664c716ec92d4e921f70afd02f4d455696313c77ba36a5463ceff1d4 113502 ia32-libs_0.3_amd64.deb 2c5ee217cd7fdb6987e75a621b681075d42d89ccbaaa40d4b7c7c8ec8469d06b 115022 ia32-libs-i386_0.3_i386.deb Files: 4a793c8a8f65aeb2e5a62d60d71b0c81 1397 oldlibs extra ia32-libs_0.3.dsc 3767541b067a63a970d33cd17626efd8 115574 oldlibs extra ia32-libs_0.3.tar.gz 4a87b4847ea92b12587114e1e96f594b 113502 oldlibs extra ia32-libs_0.3_amd64.deb be285f1b9daf914d23a87b72db0b1bf0 115022 oldlibs extra ia32-libs-i386_0.3_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBAgAGBQJQdZBTAAoJEFb2GnlAHawEPygH+QHMKRdXJqcxE7tYhR3LK1NZ 7FsFb5gP8WgPGMfeiYoxRZ+WAXvwN/XaoiXdqjVFFKLCOfgsWJRxNRhZXyEyWG53 bs6aubUcA45eAr/dPs7l57YOw+RzRtJJvuUJlETy9ihoUggcxMMBUtmxvRor8K7w CYujmCvUul550sTBNVV00ypC9/7MRgPsI4Z6Ized7LDPc7FMwMHsw6UGGlpDyWoA PT4/h92+89NsDpuUV/rFMxM+uaaSsUwH6bpwwGIDoUWArhhIM1S5I/9ZQR1MdQkS ESvgtPE6KACrdKajJRxTBZRGY/HZmavnpFZ45ZcJZb35c0YvmewiQDtXSY103TY= =sB2J -END PGP SIGNATUREEnd Message---
Bug#690158: ettercap: unconditionally sets net.ipv4.ip_forward=0
Package: ettercap Version: 1:0.7.3-2.1 Severity: grave Justification: causes non-serious data loss Hi, I've just found that running 'ettercap' on gateway system (were ip_forward is a must) will unconditionally disable the kernel flag. This affects both Debian 6.0 (squeeze) and Debian 7.0 (wheezy). Cheers -- System Information: Debian Release: 6.0.6 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/24 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages ettercap depends on: ii ettercap-common1:0.7.3-2.1 Common support files and plugins f ii libc6 2.11.3-4 Embedded GNU C Library: Shared lib ii libltdl7 2.2.6b-2 A system independent dlopen wrappe ii libncurses55.7+20100313-5shared libraries for terminal hand ii libnet11.1.4-2 library for the construction and h ii libpcap0.8 1.1.1-2+squeeze1 system interface for user-level pa ii libpcre3 8.02-1.1 Perl 5 Compatible Regular Expressi ii libssl0.9.80.9.8o-4squeeze13 SSL shared libraries ii zlib1g 1:1.2.3.4.dfsg-3 compression library - runtime ettercap recommends no packages. ettercap suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#690142: remote named DoS on recursor (CVE-2012-5166)
Tags: security, patch find the Ubuntu patch attached. best regards, Adi Kriegisch === modified file 'bin/named/query.c' --- bin/named/query.c 2011-11-16 14:22:11 + +++ bin/named/query.c 2012-10-05 09:45:39 + @@ -1024,13 +1024,6 @@ mname = NULL; } - /* - * If the dns_name_t we're looking up is already in the message, - * we don't want to trigger the caller's name replacement logic. - */ - if (name == mname) - mname = NULL; - *mnamep = mname; CTRACE(query_isduplicate: false: done); @@ -1228,6 +1221,7 @@ if (dns_rdataset_isassociated(rdataset) !query_isduplicate(client, fname, type, mname)) { if (mname != NULL) { + INSIST(mname != fname); query_releasename(client, fname); fname = mname; } else @@ -1288,11 +1282,13 @@ mname = NULL; if (!query_isduplicate(client, fname, dns_rdatatype_a, mname)) { -if (mname != NULL) { - query_releasename(client, fname); - fname = mname; -} else - need_addname = ISC_TRUE; +if (mname != fname) { + if (mname != NULL) { + query_releasename(client, fname); + fname = mname; + } else + need_addname = ISC_TRUE; +} ISC_LIST_APPEND(fname-list, rdataset, link); added_something = ISC_TRUE; if (sigrdataset != NULL @@ -1331,11 +1327,13 @@ mname = NULL; if (!query_isduplicate(client, fname, dns_rdatatype_, mname)) { -if (mname != NULL) { - query_releasename(client, fname); - fname = mname; -} else - need_addname = ISC_TRUE; +if (mname != fname) { + if (mname != NULL) { + query_releasename(client, fname); + fname = mname; + } else + need_addname = ISC_TRUE; +} ISC_LIST_APPEND(fname-list, rdataset, link); added_something = ISC_TRUE; if (sigrdataset != NULL @@ -1846,22 +1844,24 @@ crdataset-type == dns_rdatatype_) { if (!query_isduplicate(client, fname, crdataset-type, mname)) { -if (mname != NULL) { - /* - * A different type of this name is - * already stored in the additional - * section. We'll reuse the name. - * Note that this should happen at most - * once. Otherwise, fname-link could - * leak below. - */ - INSIST(mname0 == NULL); +if (mname != fname) { + if (mname != NULL) { + /* + * A different type of this name is + * already stored in the additional + * section. We'll reuse the name. + * Note that this should happen at most + * once. Otherwise, fname-link could + * leak below. + */ + INSIST(mname0 == NULL); - query_releasename(client, fname); - fname = mname; - mname0 = mname; -} else - need_addname = ISC_TRUE; + query_releasename(client, fname); + fname = mname; + mname0 = mname; + } else + need_addname = ISC_TRUE; +} ISC_LIST_UNLINK(cfname.list, crdataset, link); ISC_LIST_APPEND(fname-list, crdataset, link); added_something = ISC_TRUE; === modified file 'debian/changelog' --- debian/changelog 2012-09-12 16:16:57 + +++ debian/changelog 2012-10-05 09:45:39 + @@ -1,3 +1,12 @@ +bind9 (1:9.7.3.dfsg-1ubuntu4.5) oneiric-security; urgency=low + + * SECURITY UPDATE: denial of service via specific combinations of RDATA +- bin/named/query.c: fix logic +- Patch backported from 9.8.3-P4 +- CVE-2012-5166 + + -- Marc Deslauriers marc.deslauri...@ubuntu.com Fri, 05 Oct 2012 09:45:39 -0400 + bind9 (1:9.7.3.dfsg-1ubuntu4.4) oneiric-security; urgency=low * SECURITY UPDATE: denial of service via large crafted resource record signature.asc Description: Digital signature
Bug#690155: libsvn-{dev, java, ruby1.8}: missing copyright file after upgrade from squeeze
[Andreas Beckmann] A test with piuparts revealed that your package misses the copyright file after an upgrade from squeeze to wheezy, which is a violation of Policy 12.5 : Thanks - yeah, looks like a dpkg bug: during the upgrade, the old /usr/share/doc/$pkg directory disappears, but dpkg forgets to remove it before unpacking the new package, where /usr/share/doc/$pkg is a symlink; therefore it fails to add the symlink. Of course dpkg should be careful when replacing symlinks with directories, because it's possible for a local admin to replace a directory with a symlink for filesystem layout reasons. But this is the opposite case, and dpkg certainly has enough information to know it is safe. I'm guessing this dpkg bug hits a lot more packages than just mine. Do you know if it is expected to be fixed soon, or do I need to work around it? Thanks, Peter -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#690155: libsvn-{dev, java, ruby1.8}: missing copyright file after upgrade from squeeze
On 2012-10-10 17:55, Peter Samuelson wrote: [Andreas Beckmann] A test with piuparts revealed that your package misses the copyright file after an upgrade from squeeze to wheezy, which is a violation of Policy 12.5 : Thanks - yeah, looks like a dpkg bug: during the upgrade, the old /usr/share/doc/$pkg directory disappears, but dpkg forgets to remove it before unpacking the new package, where /usr/share/doc/$pkg is a symlink; therefore it fails to add the symlink. I don't think it works that way. The old package is not removed before the new package gets unpacked, so the filesystem object at /usr/share/doc/$pkg never disappears. http://www.debian.org/doc/debian-policy/ch-maintainerscripts.html#s-unpackphase Of course dpkg should be careful when replacing symlinks with directories, because it's possible for a local admin to replace a directory with a symlink for filesystem layout reasons. But this is the opposite case, and dpkg certainly has enough information to know it is safe. No, dpkg has not enough information about what was a symlink or directory in the package. This will probably change with 1.17.x as Guillem plans to extend the metadata stored in the dpkg database. I'm guessing this dpkg bug hits a lot more packages than just mine. Do you know if it is expected to be fixed soon, or do I need to work around it? This is not an easy fix. And your package needs to be processable with old versions of dpkg (unless you add a pre-depends on a future dpkg version, which would stop backportability). This has hit a lot of packages: http://piuparts.debian.org/squeeze2wheezy/unknown_failures.html Nearly everything in in bugged state with a bug number of #68[78]xxx should be such a problem (and that does no longer include the already fixed ones). There was also some discussion on debian-devel@ in September So for going from directory to a link you will need to add a postinst script that does something like this if [ $1 = configure ]; then if dpkg --compare-versions $2 -lt FIXEDVERSION~ ; then if [ ! -l /u/s/d/$pkg ] [ -d /u/s/d/$pkg ]; then rmdir /u/s/d/$pkg # bombs if not empty ln -s $target /u/s/d/$pkg fi fi fi But this way is much easier to solve than recovering from a improper link-to-dir switch where you install files over an existing symlink and overwrite files from another package, not noticed by dpkg. Even if subversion 1.7 is not going into wheezy (is it?), this would become a problem for wheezy-jessie upgrades. Andreas -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#690153: jscribble: FTBFS: tests timeout
On Wed, Oct 10, 2012 at 11:46 AM, gregor herrmann gre...@debian.org wrote: Hrmpf. Obviously it built fine before for Andrew and me (in a sid chroot) (and probably Hideki), according to #687406. I still can't reproduce it (4 tries, logs attached: sid and wheezy, with and without -j4). A fifth try with exporting HOME to a non-existant directory also succeeds. I assume the Amazon build setup doesn't have general problems with xfvb (otherwise we'd see tons of build failures) ... Cc'ing the java group, maybe someone over there could look into this test suite and why it might fail? Maybe the diff between Lucas' and my build helps? Just as another data point, it built fine when it was synced into Ubuntu quantal as well: https://launchpad.net/ubuntu/+source/jscribble/1.7.7-1.1/+build/3883902/+files/buildlog_ubuntu-quantal-i386.jscribble_1.7.7-1.1_BUILDING.txt.gz -- Andrew Starr-Bochicchio Ubuntu Developer https://launchpad.net/~andrewsomething Debian Maintainer http://qa.debian.org/developer.php?login=a.starr.b%40gmail.com PGP/GPG Key ID: D53FDCB1 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#688997: youtube-dl: Needs update to newer version to fix youtube downloading
Hi, Julien. On Tue, Oct 9, 2012 at 3:40 PM, Julien Cristau jcris...@debian.org wrote: On Tue, Oct 9, 2012 at 15:25:44 -0300, Rogério Brito wrote: Too many changes? Which ones? Compared to my last upload, there aren't really. Compared to the version currently in wheezy. I see. Well, those are about 7 months of development (not so active, but...) But that is, in a sense, the nature of packages/programs that deal with web scrapping: all of them are highly subject to drastic changes. (Unfortunate, I know). But that affects youtube-dl, clive, cclive, get-flash-videos and many, many other packages in a similar vein. I want to work with you in getting youtube-dl in wheezy and, also, not breaking other programs like freevo. What can we do? Regards, -- Rogério Brito : rbrito@{ime.usp.br,gmail.com} : GPG key 4096R/BCFC http://rb.doesntexist.org/blog : Projects : https://github.com/rbrito/ DebianQA: http://qa.debian.org/developer.php?login=rbrito%40ime.usp.br -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#688206: marked as done (pure-ftpd-common: modifies conffiles (policy 10.7.3): /etc/default/pure-ftpd-common)
Your message dated Wed, 10 Oct 2012 16:32:43 + with message-id e1tlzd9-00087c...@franck.debian.org and subject line Bug#688206: fixed in pure-ftpd 1.0.36-1.1 has caused the Debian Bug report #688206, regarding pure-ftpd-common: modifies conffiles (policy 10.7.3): /etc/default/pure-ftpd-common to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 688206: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688206 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: pure-ftpd-common Version: 1.0.36-1 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Hi, during a test with piuparts I noticed your package modifies conffiles. This is forbidden by the policy, see http://www.debian.org/doc/debian-policy/ch-files.html#s-config-files 10.7.3: [...] The easy way to achieve this behavior is to make the configuration file a conffile. [...] This implies that the default version will be part of the package distribution, and must not be modified by the maintainer scripts during installation (or at any other time). Note that once a package ships a modified version of that conffile, dpkg will prompt the user for an action how to handle the upgrade of this modified conffile (that was not modified by the user). Further in 10.7.3: [...] must not ask unnecessary questions (particularly during upgrades) [...] If a configuration file is customized by a maintainer script after having asked some debconf questions, it may not be marked as a conffile. Instead a template could be installed in /usr/share and used by the postinst script to fill in the custom values and create (or update) the configuration file (preserving any user modifications!). This file must be removed during postrm purge. ucf(1) may help with these tasks. See also http://wiki.debian.org/DpkgConffileHandling In https://lists.debian.org/debian-devel/2012/09/msg00412.html and followups it has been agreed that these bugs are to be filed with severity serious. debsums reports modification of the following files, from the attached log (scroll to the bottom...): /etc/default/pure-ftpd-common cheers, Andreas pure-ftpd-common_1.0.36-1.log.gz Description: GNU Zip compressed data ---End Message--- ---BeginMessage--- Source: pure-ftpd Source-Version: 1.0.36-1.1 We believe that the bug you reported is fixed in the latest version of pure-ftpd, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 688...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. gregor herrmann gre...@debian.org (supplier of updated pure-ftpd package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Mon, 08 Oct 2012 18:09:21 +0200 Source: pure-ftpd Binary: pure-ftpd-common pure-ftpd pure-ftpd-mysql pure-ftpd-postgresql pure-ftpd-ldap Architecture: source all amd64 Version: 1.0.36-1.1 Distribution: unstable Urgency: low Maintainer: Stefan Hornburg (Racke) ra...@linuxia.de Changed-By: gregor herrmann gre...@debian.org Description: pure-ftpd - Secure and efficient FTP server pure-ftpd-common - Pure-FTPd FTP server (Common Files) pure-ftpd-ldap - Secure and efficient FTP server with LDAP user authentication pure-ftpd-mysql - Secure and efficient FTP server with MySQL user authentication pure-ftpd-postgresql - Secure and efficient FTP server with PostgreSQL user authenticati Closes: 688206 Changes: pure-ftpd (1.0.36-1.1) unstable; urgency=low . * Non-maintainer upload. * Fix modifies conffiles (policy 10.7.3): /etc/default/pure-ftpd-common: - don't ship /etc/default/pure-ftpd-common - create it in .postinst if it doesn't exist - remove it in .postrm/purge - restructure .postinst a bit (Closes: #688206) Checksums-Sha1: 9e2075a2db1f49a4e41b964dd6aaa035d3c23a16 2244 pure-ftpd_1.0.36-1.1.dsc ab52f0b99526f3cb2368cdb0e52d3f45b5d2f913 48605 pure-ftpd_1.0.36-1.1.diff.gz e2dd3a940d6a80aeeb2eee66298f9c6f01501229 185332 pure-ftpd-common_1.0.36-1.1_all.deb 325a38cdec9576dab95e61dd35de2a5d5112b79a 208830 pure-ftpd_1.0.36-1.1_amd64.deb a5e23a014ca23f3fc5adb522541243632d01cb10 228736 pure-ftpd-mysql_1.0.36-1.1_amd64.deb
Processed: Re: Bug#683676: missing /usr/share/doc/cython-dbg/copyright
Processing control commands: severity -1 serious Bug #683676 [cython-dbg] /usr/share/doc/cython-dbg/cython is a broken symlink Severity set to 'serious' from 'minor' found -1 0.17.1-1 Bug #683676 [cython-dbg] /usr/share/doc/cython-dbg/cython is a broken symlink Marked as found in versions cython/0.17.1-1. -- 683676: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683676 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#689718: marked as done (xmame-sdl,xmess-sdl: missing copyright file after upgrade from squeeze)
Your message dated Wed, 10 Oct 2012 17:03:05 + with message-id e1tlzgx-00062r...@franck.debian.org and subject line Bug#689718: fixed in mame 0.146-4 has caused the Debian Bug report #689718, regarding xmame-sdl,xmess-sdl: missing copyright file after upgrade from squeeze to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 689718: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689718 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: xmame-sdl,xmess-sdl Version: 0.146-2 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Control: affects -1 + xmame-common xmess-common A test with piuparts revealed that package $package misses the copyright file after an upgrade from squeeze to wheezy, which is a violation of Policy 12.5 : http://www.debian.org/doc/debian-policy/ch-docs.html#s-copyrightfile After the upgrade /usr/share/doc/$package/ is just an empty directory. Additional info may be available here: http://wiki.debian.org/MissingCopyrightFile There is something bad going on with the symlink to directory conversion that is needed if the xmame-common or xmess-common package was installed. From the attached logfile (scroll to the bottom): 1m2.1s INFO: dirname part contains a symlink: /usr/share/doc/xmess-sdl/changelog.Debian.gz != /usr/share/doc/xmess-common/changelog.Debian.gz (xmess-sdl) /usr/share/doc/xmess-sdl/changelog.gz != /usr/share/doc/xmess-common/changelog.gz (xmess-sdl) /usr/share/doc/xmess-sdl/copyright != /usr/share/doc/xmess-common/copyright (xmess-sdl) 1m3.2s ERROR: FAIL: debsums reports modifications inside the chroot: debsums: missing file /usr/share/doc/xmess-sdl/changelog.Debian.gz (from xmess-sdl package) debsums: missing file /usr/share/doc/xmess-sdl/changelog.gz (from xmess-sdl package) debsums: missing file /usr/share/doc/xmess-sdl/copyright (from xmess-sdl package) cheers, Andreas xmess-common_None.log.gz Description: GNU Zip compressed data ---End Message--- ---BeginMessage--- Source: mame Source-Version: 0.146-4 We believe that the bug you reported is fixed in the latest version of mame, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 689...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Emmanuel Kasper emman...@libera.cc (supplier of updated mame package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Tue, 09 Oct 2012 19:45:03 +0200 Source: mame Binary: mame xmame-sdl xmame-svga xmame-x sdlmame Architecture: source amd64 all Version: 0.146-4 Distribution: unstable Urgency: low Maintainer: Debian Games Team pkg-games-de...@lists.alioth.debian.org Changed-By: Emmanuel Kasper emman...@libera.cc Description: mame - Multiple Arcade Machine Emulator (MAME) sdlmame- Transitional package for sdlmame xmame-sdl - Transitional package for xmame-sdl xmame-svga - Transitional package for xmame-svga xmame-x- Transitional package for xmame-x Closes: 687654 689718 Changes: mame (0.146-4) unstable; urgency=low . * Removes danglink symlink after xmame-sdl,xmame-x,xmame-svga update. closes: bug#687654, #689718 Checksums-Sha1: d88527d1438078467af17f766678a65c0551e56e 2636 mame_0.146-4.dsc ef0691fd5648c08abd7424f810a8801e179791b4 46272 mame_0.146-4.debian.tar.xz 3e4aa47a49bb2023305aed013b35f0508acd02a2 20025544 mame_0.146-4_amd64.deb b41ff98549ab45d6aeceef12991061f07bbc6914 43004 xmame-sdl_0.146-4_all.deb 833e1d58bac68b223e7c5a6ddad721da0608fadd 43008 xmame-x_0.146-4_all.deb 0482dbe2871ade02fce4969aaa46d3b55bb365da 42866 sdlmame_0.146-4_amd64.deb Checksums-Sha256: 8012df2b9eec8bb8be3f597c0b43ab0b861377f0eeff1e238ef329ea61e609c2 2636 mame_0.146-4.dsc 8587cd648b0cd342f76c6b25c5784badc2f2fde63dd021be8d9b78ed6a499421 46272 mame_0.146-4.debian.tar.xz d6d56912f9ab7a5425448d2af158a72072e3a4aa6bf07ee703e5389ea6eb720c 20025544 mame_0.146-4_amd64.deb 9fd9516aec502d4e9157785c1eed03af707cdd5e14800f48c16eac00beec61f2 43004 xmame-sdl_0.146-4_all.deb 902a2d5e73430ce071c02c224ad04c705f35f721e274410c53aa296867845d08 43008 xmame-x_0.146-4_all.deb d55a2b0b5f1804cab0952c8eac98c04b9edc960858e3394626ec67dda57f3ebc 42866
Bug#687654: marked as done (xmame-sdl,xmame-x: copyright file missing after squeeze-wheezy upgrade)
Your message dated Wed, 10 Oct 2012 17:03:05 + with message-id e1tlzgx-00062o...@franck.debian.org and subject line Bug#687654: fixed in mame 0.146-4 has caused the Debian Bug report #687654, regarding xmame-sdl,xmame-x: copyright file missing after squeeze-wheezy upgrade to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 687654: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687654 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: xmame-sdl,xmame-x Version: 0.146-2 Severity: serious Justification: Policy 12.5 User: debian...@lists.debian.org Usertags: piuparts Control: found -1 mame/0.146-2 Hi, during a test with piuparts I noticed that the copyright file of your package is missing after an upgrade from squeeze to wheezy. Andreas ---End Message--- ---BeginMessage--- Source: mame Source-Version: 0.146-4 We believe that the bug you reported is fixed in the latest version of mame, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 687...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Emmanuel Kasper emman...@libera.cc (supplier of updated mame package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Tue, 09 Oct 2012 19:45:03 +0200 Source: mame Binary: mame xmame-sdl xmame-svga xmame-x sdlmame Architecture: source amd64 all Version: 0.146-4 Distribution: unstable Urgency: low Maintainer: Debian Games Team pkg-games-de...@lists.alioth.debian.org Changed-By: Emmanuel Kasper emman...@libera.cc Description: mame - Multiple Arcade Machine Emulator (MAME) sdlmame- Transitional package for sdlmame xmame-sdl - Transitional package for xmame-sdl xmame-svga - Transitional package for xmame-svga xmame-x- Transitional package for xmame-x Closes: 687654 689718 Changes: mame (0.146-4) unstable; urgency=low . * Removes danglink symlink after xmame-sdl,xmame-x,xmame-svga update. closes: bug#687654, #689718 Checksums-Sha1: d88527d1438078467af17f766678a65c0551e56e 2636 mame_0.146-4.dsc ef0691fd5648c08abd7424f810a8801e179791b4 46272 mame_0.146-4.debian.tar.xz 3e4aa47a49bb2023305aed013b35f0508acd02a2 20025544 mame_0.146-4_amd64.deb b41ff98549ab45d6aeceef12991061f07bbc6914 43004 xmame-sdl_0.146-4_all.deb 833e1d58bac68b223e7c5a6ddad721da0608fadd 43008 xmame-x_0.146-4_all.deb 0482dbe2871ade02fce4969aaa46d3b55bb365da 42866 sdlmame_0.146-4_amd64.deb Checksums-Sha256: 8012df2b9eec8bb8be3f597c0b43ab0b861377f0eeff1e238ef329ea61e609c2 2636 mame_0.146-4.dsc 8587cd648b0cd342f76c6b25c5784badc2f2fde63dd021be8d9b78ed6a499421 46272 mame_0.146-4.debian.tar.xz d6d56912f9ab7a5425448d2af158a72072e3a4aa6bf07ee703e5389ea6eb720c 20025544 mame_0.146-4_amd64.deb 9fd9516aec502d4e9157785c1eed03af707cdd5e14800f48c16eac00beec61f2 43004 xmame-sdl_0.146-4_all.deb 902a2d5e73430ce071c02c224ad04c705f35f721e274410c53aa296867845d08 43008 xmame-x_0.146-4_all.deb d55a2b0b5f1804cab0952c8eac98c04b9edc960858e3394626ec67dda57f3ebc 42866 sdlmame_0.146-4_amd64.deb Files: 21535a3b925cbf4d69713524e87230b8 2636 non-free/games optional mame_0.146-4.dsc 8f749c6aa380a6916663389a0d4d81aa 46272 non-free/games optional mame_0.146-4.debian.tar.xz caaf1ec233a6c58d6420eb058fbba71c 20025544 non-free/games optional mame_0.146-4_amd64.deb 824c029026d4f099bbd99f2133a4058c 43004 non-free/oldlibs extra xmame-sdl_0.146-4_all.deb d77192638d36d48ad4fea402c2a0706a 43008 non-free/oldlibs extra xmame-x_0.146-4_all.deb 3b25ce61d511a6b471a180d3fb6b47da 42866 non-free/oldlibs extra sdlmame_0.146-4_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBCAAGBQJQdaPLAAoJEAZFbdeR6VeRN/wP/23JEXuyQkeakfBLMyRDEQR6 gDEhatX0mmZnNgGcNed2uXpFDSsvXi8lXZ40p3v4OORKTQE8BpRVg51zZF1ZfzKn +Ce16HoqrHE0hrYbNZB9pZx/BCxaK7d6Gn0az6CFGFxqUUCwuTx5KHHcZ6MkgUGf QeBkcQ3MWtTf+m3Fj3AowLrgKse3NUGWAUtBuBXHERM5gDB21dbXsf0lFI6WvSP8 jCXDL+ssrgR8HQneSSdOaD+j1g7HM/gTucVQVBnjsS6LZKebwZBwluw/Xu2MFDDC 9NF1aBqyamf0nLW8/pXgPSDoXVXesZlGbEKi/IMXk1DLfwPJ0wTLhcSj502jQH0U LBFIGMbqB3bnM35ee2AEWplmGBfLCmJ5DrwPnigPhpJMAKTL932sDZSqibhnNPCx LJxYfj1rmDN6plchU9h7LEnElEYQVQj8VEiD5SnRVEG9XRI38tABYZWyAUuHlhnT
Bug#690167: ia32-libs-gtk: please change version number to 1:0.1
Package: ia32-libs-gtk Version: 20120709 Severity: serious Please switch the version numbering for the post-monolithic ia32-libs-gtk to 1:0.1 as it was done for ia32-libs, too. The MMDD version space will be needed for stable updates. See #688915 and some discussion on debian-release. http://bugs.debian.org/688915 start: https://lists.debian.org/debian-release/2012/09/msg01041.html ... problem: https://lists.debian.org/debian-release/2012/09/msg01107.html ... solution: https://lists.debian.org/debian-release/2012/09/msg01123.html ... Andreas -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#690155: libsvn-{dev, java, ruby1.8}: missing copyright file after upgrade from squeeze
Of course dpkg should be careful when replacing symlinks with directories, because it's possible for a local admin to replace a directory with a symlink for filesystem layout reasons. But this is the opposite case, and dpkg certainly has enough information to know it is safe. [Andreas Beckmann] No, dpkg has not enough information about what was a symlink or directory in the package. This will probably change with 1.17.x as Guillem plans to extend the metadata stored in the dpkg database. When I say it has enough information, I didn't mean the information is necessarily stored in a convenient form by dpkg. I don't know that. What I mean is: (1) the old package ships /usr/share/doc/$pkg as a dir, (2) the new package does not ship the dir, (3) no other package ships the dir, (4) the dir is empty after the old package is removed. That is enough information for dpkg to correctly remove the directory when you remove the package. Thus it should also be enough information for dpkg to remove the directory on upgrade. So for going from directory to a link you will need to add a postinst script that does something like this if [ $1 = configure ]; then if dpkg --compare-versions $2 -lt FIXEDVERSION~ ; then if [ ! -l /u/s/d/$pkg ] [ -d /u/s/d/$pkg ]; then rmdir /u/s/d/$pkg # bombs if not empty ln -s $target /u/s/d/$pkg fi fi fi I assume you mean [ -L ] rather than [ -l ] ... but other than that, looks good. I think the dpkg --compare-versions is not needed either, except for the purpose of self-documentation - to make it obvious when the postinst section can be removed from the packaging. Even if subversion 1.7 is not going into wheezy (is it?), this would become a problem for wheezy-jessie upgrades. The release team blocked subversion 1.7 from wheezy even before the freeze. (The reason was a series of new bugs in other packages which, I believe, have now been fixed for months.) Given the rather huge diff between 1.6 and 1.7, it is not worth their trouble to review it now, so I have not asked them to. But it _does_ mean that if I want to work around the dpkg bug, I'll have to go through t-p-u. Peter -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: affects 687062, affects 669278, user debian...@lists.debian.org, usertagging 645713 ...
Processing commands for cont...@bugs.debian.org: affects 687062 + wine Bug #687062 {Done: Hilko Bengen ben...@debian.org} [wine64-bin] wine64-bin: missing copyright file Added indication that 687062 affects wine affects 669278 + kipi-plugins koffice-libs kchart Bug #669278 [libqt4-dbus] please add phonon-backend-xine transitional package Bug #655382 [libqt4-dbus] libqt4-dbus has circular Depends on qdbus Bug #669878 [libqt4-dbus] Could not perform immediate configuration on 'phonon-backend-vlc' Added indication that 669278 affects kipi-plugins, koffice-libs, and kchart Added indication that 655382 affects kipi-plugins, koffice-libs, and kchart Added indication that 669878 affects kipi-plugins, koffice-libs, and kchart user debian...@lists.debian.org Setting user to debian...@lists.debian.org (was deb...@abeckmann.de). usertags 645713 piuparts Usertags were: piuparts. Usertags are now: piuparts. found 645713 gnome-core/1:3.4+4 Bug #645713 [apt] fails to upgrade a default GNOME desktop installation from squeeze â sid The source gnome-core and version 1:3.4+4 do not appear to match any binary packages Marked as found in versions gnome-core/1:3.4+4. found 657465 8.1.16-3 Bug #657465 [conserver-client] conserver-client: prompting due to modified conffiles which where not modified by the user Marked as found in versions conserver/8.1.16-3. tags 657465 + squeeze-ignore Bug #657465 [conserver-client] conserver-client: prompting due to modified conffiles which where not modified by the user Added tag(s) squeeze-ignore. affects 690124 + mahara-mediaplayer Bug #690124 [mahara] mahara: directory vs. symlink messup after squeeze-wheezy upgrade Added indication that 690124 affects mahara-mediaplayer usertags 683676 piuparts There were no usertags set. Usertags are now: piuparts. thanks Stopping processing here. Please contact me if you need assistance. -- 645713: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645713 655382: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655382 657465: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657465 669278: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669278 669878: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669878 683676: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683676 687062: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687062 690124: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690124 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#688891: psad: modifies conffiles (policy 10.7.3): /etc/psad/psad.conf
On Wed, 26 Sep 2012 18:58:50 +0200, Andreas Beckmann wrote: Package: psad Version: 2.2-2 Severity: serious Tags: squeeze-ignore User: debian...@lists.debian.org Usertags: piuparts Control: found -1 2.1.7-1 during a test with piuparts I noticed your package modifies conffiles. This is forbidden by the policy, see http://www.debian.org/doc/debian-policy/ch-files.html#s-config-files debsums reports modification of the following files, from the attached log (scroll to the bottom...): /etc/psad/psad.conf Looks like #675231. The fix in -2 (set back the variable in preinst) doesn't help against the underlying cause which is that the package ships /etc/psad/psad.conf and then modifies it in postinst. I think the way to go is: - revert the change in preinst - install psad.conf to /usr/share/psad/ or similar instead of /etc/psad - copy it to /etc/psad if /etc/psad/psad.conf doesn't exist - rm -f /etc/psad/psad.conf in postrm/purge What makes me a bit unhappy is the unconditional replacing in postinst; this will also overwrite any changes made by the admin. I guess it could be limited to the case where the file still contains _CHANGEME_, and (maybe, if this is necessary) to the case where the current value doesn't match `hostname`. Cheers, gregor -- .''`. Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06 : :' : Debian GNU/Linux user, admin, and developer - http://www.debian.org/ `. `' Member of VIBE!AT SPI, fellow of the Free Software Foundation Europe `- NP: Beach Boys: Darlin' signature.asc Description: Digital signature
Bug#690170: acgvision-agent: Prompts with shell script in postinst (policy 3.9.1)
Package: acgvision-agent Version: 5.1.4-6 Severity: serious Justification: Policy 3.9.1 Prompting in maintainer scripts -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 While looking at #688231 I discovered: in debian/postinst: configure) echo postinst script acgvision-agent-conf and in bin/acgvision-agent-conf echo -n Acgvision user email [email@provider] ? read email echo [User] $CONFIGFILE echo email=$email $CONFIGFILE echo $CONFIGFILE etc. This leads to prompting even if DEBIAN_FRONTEND=noninteractive is set, and it violates: 3.9.1 Prompting in maintainer scripts Package maintainer scripts may prompt the user if necessary. Prompting must be done by communicating through a program, such as debconf, which conforms to the Debian Configuration Management Specification, version 2 or higher. [...] Cheers, gregor -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBCAAGBQJQdbefAAoJELs6aAGGSaoGukoP/0xC4Bb1TH9oruvzqB1Xtr7c aex63vfRxNvUK+8SAlHsiaYj9BTmpEiGUTnrIoIMhf+6GN/RbAuN0uq84LkaTKmw NeSTTvAOYdAA0q1wFVkS5/bXaECk+bmy3lXdJb5VY8JkJGWelXxSQ/6TOG3vBo2m MRoXB4/qhAwkaeFQl/SpXurYmMMbG2SDwn0aKTFURMDJ1ZFUS5cIUl8qam4Gnqya Aybl5ZfxYN8oejKedyNV0xvrxNATCPLvGjA2aPZFtTtAGyursbcsLSxslGDsoxFB ujVCm9z7kUCaDoWMEaD0nFAn6qa2qX7rig6WEsncV2hBd4GwTTqIFBo5PbdfmJSQ voe0aSVC7IWMBSur6J2SiUi16qqDiI3JMj1yha0P5OEFM9CuVsGTJ+wbTemaVyLf knGFVurlWI4fSM1OLTZ+cw3mWxWq+Su4ZlzbA69XbjF8s8mgYG1CHqorMtkwJ8PO XcBC5aeIbKqaT50ZP3U15UpS35JkKyvBFVqPViRN39iKoKOFWaeO1B733eqmb+rn vrcFJHpsAT8BbvrzeVDtz1jk/UZv8L7lzMikjm6gm3b0bGRLVsm2pkFZVLQfrkNG MTbaXUvMFY6VguAd/2lI+Yxb52SSu5YCQw6ubNy+2/ednaK0Kto1tmdCBL8SH3qY bW5O1vAHo/ufG2R9CbY3 =AOF/ -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#689257: only remove the initscripts and symlinks on purge
Hi Salvatore, Thanks for your patch. Since I still have a few outstanding issues to solve, I'm delaying an upload. I'm even thinking of removing the removal of the user, and the rest seems to be there due to a bug thats probably fixed now. Regards, Kai Storbeck Salvatore Bonaccorso wrote: tags 689257 + patch thanks Hi Kai Note I have not taken any upload action, only attaching here a patch. The postrm removes the two initscripts, but these should only be removed on purge. If I'm correctly it should suffice here, moving all the action to only the purge call, and do nothing else on remove, abort-install and disappear. Note: I only had a really quick look and this should/can maybe further improved. Regards, Salvatore signature.asc Description: OpenPGP digital signature
Bug#688231: acgvision-agent: modifies conffiles (policy 10.7.3): /etc/acgvision/agent.ini
On Thu, 20 Sep 2012 16:42:31 +0200, Andreas Beckmann wrote: during a test with piuparts I noticed your package modifies conffiles. This is forbidden by the policy, see http://www.debian.org/doc/debian-policy/ch-files.html#s-config-files This should be easy to fix: - don't ship the empty(!) config/agent.ini in .install, it gets created in postinst anyway - rm -f it in postrm/purge But then there's also #690170 ... So this looks like a removal candidate to me: - last upload July 2010 - popcon: Inst: 7, Vote: 6 - no reverse (build) deps - and now 2 RC bugs Cheers, gregor -- .''`. Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06 : :' : Debian GNU/Linux user, admin, and developer - http://www.debian.org/ `. `' Member of VIBE!AT SPI, fellow of the Free Software Foundation Europe `- NP: Fats Domino: Blue Monday signature.asc Description: Digital signature
Processed: Re: Bug#689314: perl: segfaults when echoing a very long string
Processing commands for cont...@bugs.debian.org: severity 689314 grave Bug #689314 [perl] perl: segfaults when echoing a very long string Severity set to 'grave' from 'normal' retitle 689314 perl: segfaults when echoing a very long string [CVE-2012-5195] Bug #689314 [perl] perl: segfaults when echoing a very long string Changed Bug title to 'perl: segfaults when echoing a very long string [CVE-2012-5195]' from 'perl: segfaults when echoing a very long string' tag 689314 upstream security patch Bug #689314 [perl] perl: segfaults when echoing a very long string [CVE-2012-5195] Added tag(s) upstream, security, and patch. thanks Stopping processing here. Please contact me if you need assistance. -- 689314: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689314 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#690155: libsvn-{dev, java, ruby1.8}: missing copyright file after upgrade from squeeze
On 2012-10-10 19:44, Peter Samuelson wrote: When I say it has enough information, I didn't mean the information is necessarily stored in a convenient form by dpkg. I don't know that. What I mean is: (1) the old package ships /usr/share/doc/$pkg as a dir, (1) dpkg knows: the old package shipped /usr/share/doc/$pkg, nothing about the type (2) the new package does not ship the dir, (3) no other package ships (2) but the package ships a new object at /usr/share/doc/$pkg the dir, (4) the dir is empty after the old package is removed. That (4) can only be verified by trying rmdir /usr/share/doc/$pkg and you get a dignostic from dpkg if something is left in the directory dpkg does not know about. is enough information for dpkg to correctly remove the directory when you remove the package. Thus it should also be enough information for dpkg to remove the directory on upgrade. But /usr/share/doc/$pkg is not going to be removed, its being replaced by /usr/share/doc/$pkg which is a change from dir to symlink which evaluates to a skip-and-keep-the-old operation (which is well documented in policy). Replacing an empty directory by a symlink could be a rather safe operation, but how can you guarantee empty or how will you fail if not-empty? But it _does_ mean that if I want to work around the dpkg bug, I'll have to go through t-p-u. Are the 1.6.x packages buggy, too? I only saw this once 1.7 was uploaded to sid. Upgrades from squeeze to wheezy are working fine. /usr/share/doc/libsvn-dev/ is a non-empty directory in a fresh wheezy install. Andreas -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Bug #685632: liquidsoap: missing versioned depend on libcamomile-ocaml-data
Processing control commands: severity -1 serious Bug #685632 [liquidsoap] liquidsoap: missing versioned depend on libcamomile-ocaml-data Severity set to 'serious' from 'important' -- 685632: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685632 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#689314: perl: segfaults when echoing a very long string
severity 689314 grave retitle 689314 perl: segfaults when echoing a very long string [CVE-2012-5195] tag 689314 upstream security patch thanks On Mon, Oct 01, 2012 at 04:11:00PM +0200, Thorsten Glaser wrote: Package: perl Version: 5.14.2-13 Severity: normal # perl -le 'print vx(2**31+1) .=1' Segmentation fault This has security impact and has been assigned CVE-2012-5195. See http://www.nntp.perl.org/group/perl.perl5.porters/2012/10/msg193886.html http://perl5.git.perl.org/perl.git/commit/b675304e3fdbcce3ef853b06b6ebe870d99faa7e It's not quite clear yet if 5.10.1 (squeeze) is affected. I'll upload a fix to sid/wheezy shortly. -- Niko Tyni nt...@debian.org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#665064: kaya: FTBFS: dpkg-buildpackage: error: dpkg-source -b kaya-0.4.4 gave error exit status 2
On Sun, 07 Oct 2012 11:42:39 +0100, Iain Lane wrote: On Sat, Jul 07, 2012 at 06:58:18PM +0200, Vincent Legout wrote: The attached patch should fix this. However, I'm not familiar with haskell and I've just built the package, not tested it. Does one of you fancy uploading the NMU? I eyeballed the patch (as a pkg-haskell member) and it looks reasonable to me. Thanks for checking Vincent's patch. To be honest, I'd rather someone who can also test the resulting package uploads it to the archive than me ... Cheers, gregor -- .''`. Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06 : :' : Debian GNU/Linux user, admin, and developer - http://www.debian.org/ `. `' Member of VIBE!AT SPI, fellow of the Free Software Foundation Europe `- NP: Retreat signature.asc Description: Digital signature
Bug#689064: fwknop: FTBFS on mips* (relocation R_MIPS_26 against `getenv' can not be used when making a shared object)
Hi, I have been digging at this bug, but I have not found exactly how to solve it. I am going to ask for an access to a MIPS machine in order to find out what exactly goes wrong. Regards, -- Franck -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#689519: libapt-pkg4.12: SIGSEGV when used by apt-get or aptitude
Running wheezy: I did not get such an error: == root@HDBF:/# apt-get install google-chrome-beta The following packages will be upgraded: google-chrome-beta 1 upgraded, 0 newly installed, 0 to remove and 33 not upgraded. Need to get 36.0 MB of archives. After this operation, 5,333 kB of additional disk space will be used. Preparing to replace google-chrome-beta 22.0.1229.91-r158759 (using .../google-chrome-beta_23.0.1271.22-r160452_amd64.deb) ... Unpacking replacement google-chrome-beta ... Processing triggers for desktop-file-utils ... Processing triggers for man-db ... Setting up google-chrome-beta (23.0.1271.22-r160452) ... root@HDBF:/# apt-cache policy libapt-pkg4.12 libapt-pkg4.12: Installed: 0.9.7.5 Candidate: 0.9.7.5 Version table: *** 0.9.7.5 0 500 http://ftp.de.debian.org/debian/ testing/main amd64 Packages 100 /var/lib/dpkg/status root@HDBF:/# exit === Hugo Vanwoerkom
Bug#688590: patch confuses me
Dear Christian, Thank you for checking all these Debian bugs, it is really appreciated. Yes my patch would place the NSS library in /usr/lib, I thought it was ok. And my Debian scripting expect it in /usr/lib because that is where it ends up on my amd64 box. It also built fine on a lot of Debian arch since 0.9 with this scripting. In fact I don't understand how the NSS library could end up in 2 different locations with the same GNUnet version and the same packaging. I'll fix my package so the packaging will expect the NSS library in /lib. But how could I be sure that the NSS library will end up there ? Cheers, Bertrand -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#689568: marked as done (php5-xdebug: remove dependency on libapache2-mod-php5)
Your message dated Wed, 10 Oct 2012 21:30:56 +0200 with message-id CAEsznC56GXVPTnE6icT=u-njt8NmsjHOY8_7SiNwN=ekkjp...@mail.gmail.com and subject line Re: #689568 php5-xdebug: remove dependency on libapache2-mod-php5 has caused the Debian Bug report #689568, regarding php5-xdebug: remove dependency on libapache2-mod-php5 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 689568: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689568 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: php5-xdebug Version: 2.1.0-1 Severity: critical Justification: breaks unrelated software The php5-xdebug package is configured with a dependency on libapache2-mod-php5, though there is no need to be running under apache, in order to use php5-xdebug. I run a system with nginx and fastcgi. Installing php5-xdebug installed apache, which loaded before nginx on reboot and caused a site outage. It seems unlikely that php5-xdebug users who wish to use xdebug to debug web applications will need help to install their web server, and php5-xdebug can be used with php5-cli and no web server at all. I suggest that this dependency should be removed, and not replaced with a different web related dependency. I don't see a need for this to be a recommendation or suggestion, but that would at least not break things. -- System Information: Debian Release: 6.0.6 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32.46-xenU (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages php5-xdebug depends on: ii libapache2-mod-php5 [p 5.3.3-7+squeeze14 server-side, HTML-embedded scripti ii libc6 2.11.3-4 Embedded GNU C Library: Shared lib ii php5-cgi [phpapi-20090 5.3.3-7+squeeze14 server-side, HTML-embedded scripti ii php5-cli [phpapi-20090 5.3.3-7+squeeze14 command-line interpreter for the p ii ucf3.0025+nmu1 Update Configuration File: preserv php5-xdebug recommends no packages. php5-xdebug suggests no packages. -- debconf-show failed ---End Message--- ---BeginMessage--- Version: 2.1.0-1 On Mon, Oct 8, 2012 at 12:29 AM, Lior Kaplan kaplanl...@gmail.com wrote: If there aren't any further comments, I'll close this report in a few days. Closing. Kaplan ---End Message---
Bug#689314: marked as done (perl: segfaults when echoing a very long string [CVE-2012-5195])
Your message dated Wed, 10 Oct 2012 19:33:12 + with message-id e1tm21o-0001gm...@franck.debian.org and subject line Bug#689314: fixed in perl 5.14.2-14 has caused the Debian Bug report #689314, regarding perl: segfaults when echoing a very long string [CVE-2012-5195] to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 689314: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689314 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: perl Version: 5.14.2-13 Severity: normal # perl -le 'print vx(2**31+1) .=1' Segmentation fault Trying to reproduce the error from http://git.kernel.org/?p=libs/klibc/klibc.git;a=commitdiff;h=127b17bb38dbfc95386a52b2159f059221d33497 on Debian wheezy/amd64. Interestingly enough, Debian lenny/amd64 works just fine. -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-3-amd64 (SMP w/8 CPU cores) Locale: LANG=C, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/mksh-static Versions of packages perl depends on: ii libbz2-1.01.0.6-4 ii libc6 2.13-35 ii libdb5.1 5.1.29-5 ii libgdbm3 1.8.3-11 ii perl-base 5.14.2-13 ii perl-modules 5.14.2-13 ii zlib1g1:1.2.7.dfsg-13 Versions of packages perl recommends: ii netbase 5.0 Versions of packages perl suggests: pn libterm-readline-gnu-perl | libterm-readline-perl-perl none ii make3.81-8.2 pn perl-docnone -- no debconf information ---End Message--- ---BeginMessage--- Source: perl Source-Version: 5.14.2-14 We believe that the bug you reported is fixed in the latest version of perl, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 689...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Niko Tyni nt...@debian.org (supplier of updated perl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 10 Oct 2012 21:17:36 +0300 Source: perl Binary: perl-base libcgi-fast-perl perl-doc perl-modules perl-debug libperl5.14 libperl-dev perl Architecture: source all amd64 Version: 5.14.2-14 Distribution: unstable Urgency: high Maintainer: Niko Tyni nt...@debian.org Changed-By: Niko Tyni nt...@debian.org Description: libcgi-fast-perl - CGI::Fast Perl module libperl-dev - Perl library: development files libperl5.14 - shared Perl library perl - Larry Wall's Practical Extraction and Report Language perl-base - minimal Perl system perl-debug - debug-enabled Perl interpreter perl-doc - Perl documentation perl-modules - Core Perl modules Closes: 689314 Changes: perl (5.14.2-14) unstable; urgency=high . * [SECURITY] CVE-2012-5195: fix a heap buffer overrun with the 'x' string repeat operator. (Closes: #689314) Checksums-Sha1: 0fa0a54d7edddbcba98f4d893ae6c60071ed 1729 perl_5.14.2-14.dsc 82dcf4e5bd8b2523e5c74389092ed3762e9a9da6 139457 perl_5.14.2-14.debian.tar.gz a530ee2042eeb76e7ea9238e8c4f0703cda8aee2 75536 libcgi-fast-perl_5.14.2-14_all.deb 0a506dd59b65499cfb307458c56acc4b7e525616 8167364 perl-doc_5.14.2-14_all.deb a502b2b9452a7e5ccc2f9dc6487ad4c95a694b15 3441550 perl-modules_5.14.2-14_all.deb 1205249b2f0386e0ecb037f191d86a611532b829 1535070 perl-base_5.14.2-14_amd64.deb f6f8a974387f6f73af686a251810d89664a11a08 8006206 perl-debug_5.14.2-14_amd64.deb 8e0c0b46af1a9f04db1f58b3af3e7aae57a11531 1176 libperl5.14_5.14.2-14_amd64.deb a14367becba92ad9fbe558879e6e723c8328a0af 3320866 libperl-dev_5.14.2-14_amd64.deb 5decf1dc26e86213cbe6fa6c856f7410952f6069 4424162 perl_5.14.2-14_amd64.deb Checksums-Sha256: a9de2518d0a2d66891cd8ec4bd5f0f955eed1a2082b3c3fa3067af737ca200ba 1729 perl_5.14.2-14.dsc 6dc01d6788f2208b794080e77dd6302a2b2af27f2cd67e1a14dcadddcbb7ab1e 139457 perl_5.14.2-14.debian.tar.gz 0907697ac1f5bdbc6c28abffc817dd6ce4fbbc594002baa374b9c5c1051b0d12 75536 libcgi-fast-perl_5.14.2-14_all.deb 2e6a736563187e09996585a6b84d82d4d34272ec6708e6117379844de5d3906c 8167364 perl-doc_5.14.2-14_all.deb
Bug#688891: psad: modifies conffiles (policy 10.7.3): /etc/psad/psad.conf
Hi gregor, I have to check this bug too, but I have been working on fwknop so far : CVE + FTBS on mips. I will check your proposal tommorow, and see if I can fix it as soon as possible to make it work properly. Regards, -- Franck -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#688229: 688229: hack to emulate drive
Dear Thomas, Am Mittwoch, den 10.10.2012, 16:56 +0200 schrieb Thomas Schmitt: + res = burn_drive_convert_fs_adr (stdio:/tmp/my_emulated_drive, libburn_device); Isn't there a quotation mark missing before the comma ? Yes, sorry. Forgot to `git commit -a --amend` that error. Otherwise it would not have compiled. Thanks, Paul From c47007aa04b37e600c8c21620209cd038ca6b42a Mon Sep 17 00:00:00 2001 From: Paul Menzel paulepan...@users.sourceforge.net Date: Wed, 10 Oct 2012 11:09:59 +0200 Subject: [PATCH] burn-libburn-common.c: Use std:/tmp/my_emulated_drive A medium has to be put into the burner though, so that Brasero allows you to press the burn button. --- plugins/libburnia/burn-libburn-common.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/plugins/libburnia/burn-libburn-common.c b/plugins/libburnia/burn-libburn-common.c index 1965b86..11364bd 100644 --- a/plugins/libburnia/burn-libburn-common.c +++ b/plugins/libburnia/burn-libburn-common.c @@ -164,7 +164,7 @@ brasero_libburn_common_ctx_new (BraseroJob *job, /* we just want to scan the drive proposed by drive */ brasero_job_get_device (job, device); - res = burn_drive_convert_fs_adr (device, libburn_device); + res = burn_drive_convert_fs_adr (stdio:/tmp/my_emulated_drive, libburn_device); g_free (device); if (res = 0) { g_set_error (error, -- 1.7.10.4 signature.asc Description: This is a digitally signed message part
Bug#690151: claws-mail: CVE-2012-4507
tags 690151 confirmed fixed-upstream pending thanks Hi Moritz, On Wed, Oct 10, 2012 at 04:24:52PM +0200, Moritz Muehlenhoff wrote: Package: claws-mail Severity: grave Tags: security Justification: user security hole Please see https://bugzilla.redhat.com/show_bug.cgi?id=862578 for details and a patch. Yeah, I commited the fix upstream, tagging accordingly. Since we're in freeze, please upload a minimal fix to unstable and request an unblock. There's some other minimal fixes in the oven, without CVE, this one will be added (was planned anyway). regards, -- Ricardo Mones ~ Absence of evidence is not evidence of absence. Carl Sagan signature.asc Description: Digital signature
Processed: Re: Bug#690151: claws-mail: CVE-2012-4507
Processing commands for cont...@bugs.debian.org: tags 690151 confirmed fixed-upstream pending Bug #690151 [claws-mail] claws-mail: CVE-2012-4507 Added tag(s) confirmed, pending, and fixed-upstream. thanks Stopping processing here. Please contact me if you need assistance. -- 690151: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690151 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#688891: psad: modifies conffiles (policy 10.7.3): /etc/psad/psad.conf
On Wed, 10 Oct 2012 21:30:17 +0200, Franck Joncourt wrote: I have to check this bug too, but I have been working on fwknop so far : CVE + FTBS on mips. I will check your proposal tommorow, and see if I can fix it as soon as possible to make it work properly. Cool, thanks! Cheers, gregor -- .''`. Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06 : :' : Debian GNU/Linux user, admin, and developer - http://www.debian.org/ `. `' Member of VIBE!AT SPI, fellow of the Free Software Foundation Europe `- NP: Joe Cocker: Feeling Alright signature.asc Description: Digital signature
Bug#665064: marked as done (kaya: FTBFS: dpkg-buildpackage: error: dpkg-source -b kaya-0.4.4 gave error exit status 2)
Your message dated Wed, 10 Oct 2012 20:47:49 + with message-id e1tm3c1-0006n9...@franck.debian.org and subject line Bug#665064: fixed in kaya 0.4.4-6 has caused the Debian Bug report #665064, regarding kaya: FTBFS: dpkg-buildpackage: error: dpkg-source -b kaya-0.4.4 gave error exit status 2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 665064: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=665064 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: kaya Version: 0.4.4-5 Severity: serious Tags: wheezy sid User: debian...@lists.debian.org Usertags: qa-ftbfs-20120321 qa-ftbfs Justification: FTBFS on amd64 Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part: fakeroot debian/rules clean dh_testdir dh_testroot rm -f build-stamp # Add here commands to clean up after the build process. [ ! -f Makefile ] || /usr/bin/make distclean cp -f /usr/share/misc/config.sub config.sub cp -f /usr/share/misc/config.guess config.guess dh_clean dpkg-source -b kaya-0.4.4 dpkg-source: info: using source format `3.0 (quilt)' dpkg-source: info: building kaya using existing ./kaya_0.4.4.orig.tar.gz dpkg-source: info: local changes detected, the modified files are: kaya-0.4.4/config.guess kaya-0.4.4/config.sub dpkg-source: error: aborting due to unexpected upstream changes, see /tmp/kaya_0.4.4-5.diff.KCrVwx dpkg-source: info: you can integrate the local changes with dpkg-source --commit dpkg-buildpackage: error: dpkg-source -b kaya-0.4.4 gave error exit status 2 Build finished at 20120321-2123 The full build log is available from: http://people.debian.org/~lucas/logs/2012/03/21/kaya_0.4.4-5.log A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! About the archive rebuild: The rebuild was done on about 50 AMD64 nodes of the Grid'5000 platform, using a clean chroot. Internet was not accessible from the build systems. ---End Message--- ---BeginMessage--- Source: kaya Source-Version: 0.4.4-6 We believe that the bug you reported is fixed in the latest version of kaya, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 665...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Stuart Teasdale s...@debian.org (supplier of updated kaya package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 10 Oct 2012 20:34:41 +0100 Source: kaya Binary: kaya libkaya-pgsql-dev libkaya-mysql-dev libkaya-sqlite3-dev libkaya-gd-dev libkaya-sdl-dev libkaya-ncurses-dev libkaya-gl-dev libkaya-ncursesw-dev Architecture: source i386 Version: 0.4.4-6 Distribution: unstable Urgency: low Maintainer: Stuart Teasdale s...@debian.org Changed-By: Stuart Teasdale s...@debian.org Description: kaya - A statically typed, imperative programming language libkaya-gd-dev - GD binding for kaya libkaya-gl-dev - OpenGL binding for kaya libkaya-mysql-dev - MySQL binding for kaya libkaya-ncurses-dev - Ncurses binding for kaya libkaya-ncursesw-dev - Ncurses binding for kaya libkaya-pgsql-dev - PostgreSQL binding for kaya libkaya-sdl-dev - SDL binding for kaya libkaya-sqlite3-dev - SQLite binding for kaya Closes: 665064 Changes: kaya (0.4.4-6) unstable; urgency=low . [ gregor herrmann ] * Non-maintainer upload. * Fix FTBFS: dpkg-buildpackage: error: dpkg-source -b kaya-0.4.4 gave error exit status 2: fix handling of config.{guess,sub}: - remove them from the patch - use autotools-dev helpers in debian/rules (Closes: #665064) . [ Vincent Legout ] * debian/patches/haskell.patch: Fix haskell modules import * debian/patches/gcc-4.7.patch: Fix ftbfs with gcc-4.7 * Build-Depends on libghc-random-dev Checksums-Sha1: b2bf950cc44b2e70b2d9ca87c8c939dd8ccba0c6 1768 kaya_0.4.4-6.dsc bfcd6d7aeb09694f58e7d15ae41610cef228644b 33170 kaya_0.4.4-6.debian.tar.gz c06a49181baabef15a2c9cae0eda2deb14e778f5 2940532 kaya_0.4.4-6_i386.deb d25c3631058bd2ae408c8dca12b2bb79b611b03b 28974
Bug#679903: marked as done (ftp.debian.org: please create an empty wheezy-updates repository)
Your message dated Wed, 10 Oct 2012 23:07:36 +0200 with message-id 87life9gtj@deep-thought.43-1.org and subject line Re: ftp.debian.org: please create an empty wheezy-updates repository has caused the Debian Bug report #679903, regarding ftp.debian.org: please create an empty wheezy-updates repository to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 679903: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=679903 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: ftp.debian.org Severity: wishlist Hi! Now that wheezy is frozen, a number of adventureous admins are going to play with upgrading test or unimportant systems, for a number of reasons. Such upgrades start with adding wheezy to sources.list. And here's a problem: if any of repositories there don't exist yet, the error will break some automated scripts, cause cron spam, etc. This means, people will remove wheezy-updates, and that's something one is extremely likely to forget to enable back. Thus, could you please put empty files there, so the final configuration will already work? Once wheezy-updates actually launch, they'll overwrite those empty files with actual data. ---End Message--- ---BeginMessage--- wheezy-updates does now exist. Ansgar---End Message---
Bug#683058: marked as done (codename urls that enable proper next-stable sources.list)
Your message dated Wed, 10 Oct 2012 23:07:36 +0200 with message-id 87life9gtj@deep-thought.43-1.org and subject line Re: ftp.debian.org: please create an empty wheezy-updates repository has caused the Debian Bug report #679903, regarding codename urls that enable proper next-stable sources.list to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 679903: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=679903 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: ftp.debian.org Currently it does not seem possible to set up a sources.list for the next-stable release (i.e. now wheezy) such that it will remain fully appropriate after the release. From what I gathered, wheezy-updates is missing. Could you please add symlinks, empty dirs (whatever may be appropriate) for the next-stable codename (wheezy), and include this step into the release cycling procedure? ---End Message--- ---BeginMessage--- wheezy-updates does now exist. Ansgar---End Message---
Bug#683058: closed by Ansgar Burchardt ans...@debian.org (Re: ftp.debian.org: please create an empty wheezy-updates repository)
Am Wed, 10 Oct 2012 21:09:05 + schrieb ow...@bugs.debian.org (Debian Bug Tracking System): wheezy-updates does now exist. Thanks! Is the creation of the dir now included in the script/procedure for post wheezy releases? -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#688151: fwknop: Multiple security issues
Le 09/10/2012 23:30, Moritz Muehlenhoff a écrit : On Fri, Sep 21, 2012 at 01:00:18PM +0200, Moritz Muehlenhoff wrote: On Thu, Sep 20, 2012 at 08:41:26AM +0200, Franck Joncourt wrote: Hi Luciano, Le 19/09/2012 22:40, Luciano Bello a écrit :[...] The new fwknop fixes many security problems: http://seclists.org/oss-sec/2012/q3/509 It's fixed in 2.0.3. The link include the patches too. I have upgraded my working copy with the latest 2.0.3 but I was working on the perl binding, so I did not upload it by now. I am going to upload it to fix theses issues. Since testing is frozen it's better to apply the isolated security fixes in a 2.0.0rc2-2+deb7u1 upload to testing-proposed-updates to ensure these are fixed in Wheezy. Franck, this is still unfixed in Debian Wheezy since testing is frozen. Yes, I have not forgotten about wheezy. I have rebuilt a package for wheezy with patches and I have just finished to test it. The patches from upstream have been applied with some modifications to make it work properly on the 2.0.0-rc2 release. I have sent an email to the security team with the debdiff, and I am currently waiting for their approval before uploading the package. Regards, -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: [Pkg-fglrx-devel] Bug#690179: Fglrx kernel module causes system to lock up, requires reboot
Processing control commands: severity -1 important Bug #690179 [fglrx-driver] Fglrx kernel module causes system to lock up, requires reboot Severity set to 'important' from 'critical' -- 690179: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690179 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#690179: Fglrx kernel module causes system to lock up, requires reboot
control: severity -1 important Section Device Identifier Card0 Driver fglrx BusID PCI:1:0:0 EndSection Section Device Identifier Card1 Driver intel BusID PCI:0:2:0 EndSection Would you mind trying an xorg conf with this second card disabled? fglrx may be having trouble playing nice with the intel driver or vice versa. Anyway, if that fixes it, you'll need to submit an upstream bug report since we can't change their proprietary code. Best wishes, Mike -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#572072: (no subject)
For all intents and purposes, computer-janitor is abandonware. https://bugs.launchpad.net/ubuntu/+source/computer-janitor/+bug/1050071 signature.asc Description: PGP signature
Bug#687485: update
The patch did not compile as expected. I've been bogged down with other packages. However I expect to have another go next week and look at fixing the compilation errors. I find it hard to feel in a hurry as I am in doubt whether the patch will be accepted in the end anyway. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#688229: Burning data DVD looks successful but mounting fails
Dear Thomas, Am Mittwoch, den 10.10.2012, 11:42 +0200 schrieb Thomas Schmitt: i think i can spot a byte eating problem in http://git.gnome.org/browse/brasero/commit/?id=5ff86b48 resp. the master-branch commit http://git.gnome.org/browse/brasero/commit/?id=1b8397ee252df2d554682ca2d694d5937fbf6e39 - @@ -200,6 +198,7 @@ brasero_libisofs_write_image_to_fd_thread (BraseroLibisofs *self) brasero_job_get_fd_out (BRASERO_JOB (self), fd); BRASERO_JOB_LOG (self, Writing to pipe); + read_bytes = priv-libburn_src-read_xt (priv-libburn_src, buf, sector_size); while (priv-libburn_src-read_xt (priv-libburn_src, buf, sector_size) == sector_size) { if (priv-cancel) break; - Variable read_bytes is set by a call of libisofs' resp. libburn's burn_source.read_xt() which consumes data (one sector ?) into buf. The call in the while() statement consumes another sector and thus overwrites the previously read buffer without having done anything else with that first buffer content. Further down i see a similar change that looks more plausible to me: - @@ -254,7 +261,8 @@ brasero_libisofs_write_image_to_file_thread (BraseroLibisofs *self) priv = BRASERO_LIBISOFS_PRIVATE (self); brasero_job_start_progress (BRASERO_JOB (self), FALSE); - while (priv-libburn_src-read_xt (priv-libburn_src, buf, sector_size) == sector_size) { + read_bytes = priv-libburn_src-read_xt (priv-libburn_src, buf, sector_size); + while (read_bytes == sector_size) { if (priv-cancel) break; - I will try to make that adaptation tomorrow. It appears to me that this information is not yet known in https://bugzilla.gnome.org/show_bug.cgi?id=630651 Feel free to add my technical opinion to that bug report. I did so right after reading your reply in the morning. I will try to contact Philippe Rouquier directly on this issue. We can just CC him and I am doing so now. Sorry Philippe. Swallowing the first sector is enough to make the image not mountable. But regrettably a single lost sector does not yet explain the fact that we find Joliet data at block 16. The normal layout of an ISO 9660 image with Joliet (and no El Torito boot equipment) would be Block 16: ISO (660/ECMA-119 Primary Volume Descriptor Block 17: Joliet Volume Descriptor (which would not contain names of payload files like IMG_2428.JPG) Block 18: Volume Descriptor Set Terminator libisofs will then pad up to 64 KB and first write the ISO 9660 + Rock Ridge tree. Several blocks to be expected. Only then comes the Joliet directory tree with those entries which we found at block 16. So we look for a byte eater that swallows at least a few dozen sectors and not only the first one. I am also going to print out the sector size. (Or just use GDB.) Nevertheless, the code pieces, where above change was made, look much like the place where the emerging damage of an ISO 9660 image can be watched ... if it is not caused there. A very good starting point for debugging, i'd say. Telling from the function names, i would say the change which i deem bad is in charge for writing to optical media, whereas the good one is in charge for writing image to a file in hard disk. An according difference in success can be found in several Brasero bug reports of the last years. Thanks for the terrific analysis. I think we can be optimistic for tomorrow. I know also got a case where even an error is reported and the image (with the burner hack) is not mountable. BraseroBurn: (at burn-job.c:1858) BraseroLibburn called brasero_job_set_current_action BraseroBurn: (at burn-libisofs.c:312) BraseroLibisofs Getting out thread BraseroBurn: (at burn-job.c:1309) BraseroLibisofs called brasero_job_get_fd_out BraseroBurn: (at burn-job.c:1071) BraseroLibisofs Finished track successfully BraseroBurn: (at burn-task-ctx.c:354) No next track to process BraseroBurn: (at burn-job.c:862) BraseroLibisofs disconnecting BraseroLibisofs from BraseroChecksumImage BraseroBurn: (at burn-job.c:258) BraseroLibisofs deactivating BraseroBurn: (at burn-job.c:1267) BraseroChecksumImage called brasero_job_get_current_track BraseroBurn: (at burn-checksum-image.c:531) BraseroChecksumImage Setting new checksum (type = 2) 75f26d2175cb8d2a6d3370a2b7aa0164 (file:///tmp/brasero_tmp_JL20LW.md5 before) BraseroBurn: (at burn-job.c:1071) BraseroChecksumImage Finished track successfully BraseroBurn: (at burn-task-ctx.c:354) No next track to process BraseroBurn: (at burn-job.c:862) BraseroChecksumImage
Bug#690153: jscribble: FTBFS: tests timeout
On Wed, 10 Oct 2012 17:46:30 +0200 gregor herrmann gre...@debian.org wrote: Hrmpf. Obviously it built fine before for Andrew and me (in a sid chroot) (and probably Hideki), according to #687406. Yes, it built fine for me with 2 different amd64 machine. Maybe it's AWS(Xen?) issue (just wild guess without any evidence). -- Regards, Hideki Yamane henrich @ debian.or.jp/org http://wiki.debian.org/HidekiYamane -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#690152: bsaf: FTBFS: Test org.jdesktop.application.TaskMonitorTest failed
On Wed, Oct 10, 2012 at 04:22:11PM +0200, Lucas Nussbaum wrote: Source: bsaf Version: 1.9-3 Severity: serious Tags: wheezy sid User: debian...@lists.debian.org Usertags: qa-ftbfs-20121010 qa-ftbfs Justification: FTBFS in wheezy on amd64 Hi, During a rebuild of all packages in *wheezy*, your package failed to build on amd64. I couldn't reproduce this in wheezy or sid, but I was only using pbuilder to test. -- Miguel Landaeta, miguel at miguel.cc secure email with PGP 0x6E608B637D8967E9 available at http://keyserver.pgp.com/ Faith means not wanting to know what is true. -- Nietzsche signature.asc Description: Digital signature
Bug#688590: patch confuses me
On 10/10/2012 09:30 PM, Bertrand Marc wrote: Dear Christian, Thank you for checking all these Debian bugs, it is really appreciated. Yes my patch would place the NSS library in /usr/lib, I thought it was ok. And my Debian scripting expect it in /usr/lib because that is where it ends up on my amd64 box. Now _that_ is strange. I had specifically modified our Makefiles so that it would not end up in /usr/lib. Now, I don't recall in which version I fixed that and I also don't know which one you tested on your box, but SVN HEAD AFAIK goes to /lib (if it can). It also built fine on a lot of Debian arch since 0.9 with this scripting. Build OK or also installed to /lib as-it-should? In fact I don't understand how the NSS library could end up in 2 different locations with the same GNUnet version and the same packaging. That I also don't know. I'll fix my package so the packaging will expect the NSS library in /lib. But how could I be sure that the NSS library will end up there ? I think the answer is here: if HAVE_SUDO nssdir = /lib/ else nssdir = $(libdir) endif So the /lib/ installation happens if HAVE_SUDO is set. That was done because if a normal user runs 'make install' (say with prefix of $HOME), then we cannot install the nss lib to /lib/. Note that the test for 'HAVE_SUDO' in configure includes the ability to write to '/' as an alternative: AM_CONDITIONAL([HAVE_SUDO], [test x$SUDO_BINARY != x -o -w /]) So either run configure as 'root' or give it --with-sudo. I hope this helps! Christian -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org