Processed: Reopening 696051
Processing control commands: > reopen -1 Bug #696051 {Done: Michael Tokarev } [src:qemu] potential guest-side buffer overflow caused by e1000 device emulation and large incoming packets 'reopen' may be inappropriate when a bug has been closed with a version; all fixed versions will be cleared, and you may need to re-add them. Bug reopened No longer marked as fixed in versions qemu/1.1.2+dfsg-3 and qemu-kvm/1.1.2+dfsg-3. > retitle -1 potential guest-side buffer overflow caused by e1000 device > emulation and large incoming packets - CVE-2012-6075 Bug #696051 [src:qemu] potential guest-side buffer overflow caused by e1000 device emulation and large incoming packets Changed Bug title to 'potential guest-side buffer overflow caused by e1000 device emulation and large incoming packets - CVE-2012-6075' from 'potential guest-side buffer overflow caused by e1000 device emulation and large incoming packets' > tags -1 + patch pending upstream Bug #696051 [src:qemu] potential guest-side buffer overflow caused by e1000 device emulation and large incoming packets - CVE-2012-6075 Added tag(s) pending. -- 696051: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696051 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#696051: Reopening 696051
Control: reopen -1 Control: retitle -1 potential guest-side buffer overflow caused by e1000 device emulation and large incoming packets - CVE-2012-6075 Control: tags -1 + patch pending upstream There is another half of the same issue. Current patch/fix which has been applied is about the case when no jumbo frames are enabled at all - in this case the maximum packet size is 1522 bytes. But the re's another case - when jumbo frames are actully enabled but not any size (there's another bit that enables very large packets, in this case receiving method is different). In this case, maximum packet size a guest can handle is 16384 bytes. In both cases old code allowed larger packets to be received, and in both cases it will result in guest-side buffer overflow with potential to execute any code in guest. Reopening this bug now and updating the subject, mentioning meanwhile-assigned CVE#. Thanks, /mjt -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: tagging 568362
Processing commands for cont...@bugs.debian.org: > tags 568362 + pending Bug #568362 {Done: Ben Hutchings } [usbip-source] usbip-source: fails to build on 2.6.32 Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 568362: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=568362 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#646704: Bug severity is too high
Quoting Christian PERRIER (bubu...@debian.org): > release and that it's not planned to happen in 2012, I'll be fine with s/2012/2014 signature.asc Description: Digital signature
Bug#646704: Bug severity is too high
Quoting Daniel Baumann (daniel.baum...@progress-technologies.net): > since you put yourself into uploaders of live-installer some time ago, > maybe you want to look at it yourself too? You know the reasons for this: be able to do l10n upload when needed without them to be considered NMUs. That's it and mostly it and, no, I can't (understand I don't have the skills) try finding a fix. > > > Sorry, I'm still deeply convinced that this issue is mostly a case > > that doesn't deserve an RC severity. I'll downgrade this bug again > > in 4 weeks if nothing happened in the meantime. > > should that be the case, i'll restore the original severity of course. Well, as long as you remember that we're currently working on a release and that it's not planned to happen in 2012, I'll be fine with that. But, still, this bug is not release critical as it doesn't fit the definition of "serious". signature.asc Description: Digital signature
Processed: found 654341 in 0.48.3.1-1.1
Processing commands for cont...@bugs.debian.org: > found 654341 0.48.3.1-1.1 Bug #654341 {Done: John Paul Adrian Glaubitz } [inkscape] [CVE-2012-6076] inkscape reads .eps files from /tmp instead of the current directory Marked as found in versions inkscape/0.48.3.1-1.1. > thanks Stopping processing here. Please contact me if you need assistance. -- 654341: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=654341 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#654341: inkscape reads .eps files from /tmp instead of the
Processing control commands: > retitle -1 [CVE-2012-6076] inkscape reads .eps files from /tmp instead of the > current directory Bug #654341 {Done: John Paul Adrian Glaubitz } [inkscape] inkscape reads .eps files from /tmp instead of the current directory Changed Bug title to '[CVE-2012-6076] inkscape reads .eps files from /tmp instead of the current directory' from 'inkscape reads .eps files from /tmp instead of the current directory' > retitle 696915 unblock: inkscape/0.48.3.1-1.3 Bug #696915 [release.debian.org] unblock: inkscape/0.48.3.1-1.2 Changed Bug title to 'unblock: inkscape/0.48.3.1-1.3' from 'unblock: inkscape/0.48.3.1-1.2' -- 654341: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=654341 696915: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696915 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#654341: inkscape reads .eps files from /tmp instead of the
Control: retitle -1 [CVE-2012-6076] inkscape reads .eps files from /tmp instead of the current directory Control: retitle 696915 unblock: inkscape/0.48.3.1-1.3 Hi On Sat, Dec 29, 2012 at 09:48:42PM +0100, John Paul Adrian Glaubitz wrote: > Hi, > > I have just uploaded inkscape 0.48.3.1-1.3 which includes a patch by > Michael Karcher to address this issue. > > We have thoroughly tested the patch and the bug is now > fixed. Further checks show that the patch doesn't have any negative > impact on other areas of the script engine. > > The patch makes sure that the relative file names are expanded before > they are passed to external scripts. EPS files are imported by > inkscape by means of an external Python script. The bug is caused by > the script engine assuming the filename passed is absolute and then it > changes the current working directory to the script directory first, > then into /tmp to make sure it is possible to write to disk. > > I am attaching a series of patches against the git repository for the > Debian packaging [1]. The packaging repository is currently at version > 0.48.3.1-1, the following three NMUs are therefore not in the > repository and I am attaching all patches necessary to update the > repository to version 0.48.3.1-1.3. Thanks for your update. It was assigned now a CVE for this issue: CVE-2012-6076. Regards, Salvatore signature.asc Description: Digital signature
Bug#696920: briquolo: incomplete debian/copyright
Hi Markus, On Sat, Dec 29, 2012 at 11:00:59PM +0100, Markus Koschany wrote: > The DejaVuSans.ttf file gets removed during > build time in debian/rules. Therefore the package depends on ttf-dejavu > and just links to usr/share/fonts/truetype/ttf-dejavu/DejaVuSans.ttf > accordingly. I presume the copyright file in ttf-dejavu covers the issue. A source package is also a package, and "every package must be accompanied by a verbatim copy of its copyright information and distribution license (...)". http://www.debian.org/doc/debian-policy/ch-docs.html#s-copyrightfile > > Alternatively i can remove the font file completely from the sources. > What do you prefer? When I read the reasons for repackaging the orig file, then I think that in this case the copyright and license should be added to debian/copyright, but I don't it's a big problem if you would choose to repackage the orig. http://www.debian.org/doc/manuals/developers-reference/best-pkging-practices.html#bpp-origtargz Regards, Bart Martens -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#696816: jenkins: Security issues were found in Jenkins core
Processing commands for cont...@bugs.debian.org: > clone 696816 -1 Bug #696816 [jenkins] jenkins: Security issues were found in Jenkins core Bug 696816 cloned as bug 696974 > reassign -1 jenkins-winstone 0.9.10-jenkins-37+dfsg-1 Bug #696974 [jenkins] jenkins: Security issues were found in Jenkins core Bug reassigned from package 'jenkins' to 'jenkins-winstone'. No longer marked as found in versions jenkins/1.447.2+dfsg-2. Ignoring request to alter fixed versions of bug #696974 to the same values previously set Bug #696974 [jenkins-winstone] jenkins: Security issues were found in Jenkins core There is no source info for the package 'jenkins-winstone' at version '0.9.10-jenkins-37+dfsg-1' with architecture '' Unable to make a source version for version '0.9.10-jenkins-37+dfsg-1' Marked as found in versions 0.9.10-jenkins-37+dfsg-1. > thanks Stopping processing here. Please contact me if you need assistance. -- 696816: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696816 696974: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696974 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#696816: jenkins: Security issues were found in Jenkins core
clone 696816 -1 reassign -1 jenkins-winstone 0.9.10-jenkins-37+dfsg-1 thanks Dear Maintainer, I found upstream "SECURITY-44" (aka CVE-2012-6072) was from Winstone, and it might be fixed in 0.9.10-jenkins-40. https://github.com/jenkinsci/jenkins/commit/ad084edb571555e7c5a9bc5b27aba09aac8da98d >[FIXED SECURITY-44] > Picked up a new version of Winstone https://github.com/jenkinsci/winstone/commit/62e890b9589a844553d837d91b5f68eb3dba334e >[FIXED SECURITY-44] > Do not allow the webapp to split HTTP header values into multiple lines. > Since there's no obvious escaping semantics here, we just drop those > characters, which is what Jetty does. Regards, Nobuhiro -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#695717: cpio: diff for NMU version 2.11+dfsg-0.1
tags 695717 + patch thanks Dear maintainer, I've prepared an NMU for cpio (versioned as 2.11+dfsg-0.1) and uploaded it to DELAYED/2. Please feel free to tell me if I should delay it longer. Regards. David diff -Nru cpio-2.11/debian/changelog cpio-2.11+dfsg/debian/changelog --- cpio-2.11/debian/changelog 2012-06-12 07:41:45.0 -0400 +++ cpio-2.11+dfsg/debian/changelog 2012-12-29 22:02:32.0 -0400 @@ -1,3 +1,12 @@ +cpio (2.11+dfsg-0.1) unstable; urgency=low + + * Non-maintainer upload. + * Remove non DFSG-compliant doc/cpio.info and doc/cpio.texi from source. +Closes: #695717 + * Do not build nor ship cpio.info because of the above. + + -- David Prévot Sat, 29 Dec 2012 22:02:30 -0400 + cpio (2.11-8) unstable; urgency=low * Enable hardened build flags diff -Nru cpio-2.11/debian/patches/695717-no-cpio.info.patch cpio-2.11+dfsg/debian/patches/695717-no-cpio.info.patch --- cpio-2.11/debian/patches/695717-no-cpio.info.patch 1969-12-31 20:00:00.0 -0400 +++ cpio-2.11+dfsg/debian/patches/695717-no-cpio.info.patch 2012-12-29 21:57:54.0 -0400 @@ -0,0 +1,17 @@ +Description: Do not build cpio.info anymore +Author: David Prévot +Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695717 +Applied-Upstream: not-needed +Last-Update: 2012-12-29 +--- +This patch header follows DEP-3: http://dep.debian.net/deps/dep3/ +--- a/doc/Makefile.in b/doc/Makefile.in +@@ -149,7 +149,6 @@ + am__v_at_0 = @ + SOURCES = + DIST_SOURCES = +-INFO_DEPS = $(srcdir)/cpio.info + TEXINFO_TEX = $(top_srcdir)/build-aux/texinfo.tex + am__TEXINFO_TEX_DIR = $(top_srcdir)/build-aux + DVIS = cpio.dvi diff -Nru cpio-2.11/debian/patches/series cpio-2.11+dfsg/debian/patches/series --- cpio-2.11/debian/patches/series 2012-06-12 07:30:10.0 -0400 +++ cpio-2.11+dfsg/debian/patches/series 2012-12-29 21:51:52.0 -0400 @@ -6,3 +6,4 @@ 218086-reporting-bugs.patch 588020-manpages-see-also.patch 627444-invalid-redefinition-of-stat.patch +695717-no-cpio.info.patch diff -Nru cpio-2.11/debian/rules cpio-2.11+dfsg/debian/rules --- cpio-2.11/debian/rules 2012-06-12 07:40:49.0 -0400 +++ cpio-2.11+dfsg/debian/rules 2012-12-29 22:28:56.0 -0400 @@ -123,8 +123,7 @@ debian/tmp/usr/share/doc/$(package)/changelog.Debian gzip -9v debian/tmp/usr/share/doc/$(package)/* gzip -9v debian/tmp/usr/share/man/*/* - gzip -9v debian/tmp/usr/share/info/* - rm -f debian/tmp/usr/share/info/dir.gz + rm -rf debian/tmp/usr/share/info install -m 644 debian/copyright debian/tmp/usr/share/doc/$(package)/. # Determine shared library dependencies dpkg-shlibdeps debian/tmp/bin/cpio debian/tmp/bin/mt-gnu diff -Nru cpio-2.11/doc/cpio.info cpio-2.11+dfsg/doc/cpio.info --- cpio-2.11/doc/cpio.info 2010-03-11 01:01:40.0 -0400 +++ cpio-2.11+dfsg/doc/cpio.info 1969-12-31 20:00:00.0 -0400 @@ -1,562 +0,0 @@ -This is cpio.info, produced by makeinfo version 4.13 from cpio.texi. - -INFO-DIR-SECTION Archiving -START-INFO-DIR-ENTRY -* Cpio: (cpio). Copy-in-copy-out archiver to tape or disk. -END-INFO-DIR-ENTRY - - This manual documents GNU cpio (version 2.11, 12 February 2010). - - Copyright (C) 1995, 2001, 2002, 2004, 2010 Free Software Foundation, -Inc. - - Permission is granted to copy, distribute and/or modify this - document under the terms of the GNU Free Documentation License, - Version 1.2 or any later version published by the Free Software - Foundation; with no Invariant Sections, with the Front-Cover texts - being "A GNU Manual", and with the Back-Cover Texts as in (a) - below. A copy of the license is included in the section entitled - "GNU Free Documentation License". - - (a) The FSF's Back-Cover Text is: "You have freedom to copy and - modify this GNU Manual, like GNU software. Copies published by - the Free Software Foundation raise funds for GNU development." - - -File: cpio.info, Node: Top, Next: Introduction, Prev: (dir), Up: (dir) - -cpio - - -GNU cpio is a tool for creating and extracting archives, or copying -files from one place to another. It handles a number of cpio formats as -well as reading and writing tar files. This is the first edition of the -GNU cpio documentation and is consistent with 2.11. - -* Menu: - -* Introduction:: -* Tutorial::Getting started. -* Invoking cpio:: How to invoke `cpio'. -* Media:: Using tapes and other archive media. -* Reports:: Reporting bugs or suggestions -* Concept Index:: Concept index. - - --- The Detailed Node Listing --- - -Invoking cpio - -* Copy-out mode:: -* Copy-in mode:: -* Copy-pass mode:: -* Options:: - - -File: cpio.info, Node: Introduction, Next: Tutorial, Prev: Top, Up: Top - -1 Introduction -** - -GNU cpio copies files into or out of a cpio or tar archive, The archive -can be another file on the disk, a magnetic tape, or a pipe. - - GNU cpio s
Processed: cpio: diff for NMU version 2.11+dfsg-0.1
Processing commands for cont...@bugs.debian.org: > tags 695717 + patch Bug #695717 [src:cpio] cpio: includes non-free documentation (GFDL with unmodifiable sections) Added tag(s) patch. > thanks Stopping processing here. Please contact me if you need assistance. -- 695717: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695717 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: limit source to cpio, tagging 695717
Processing commands for cont...@bugs.debian.org: > #cpio (2.11+dfsg-0.1) unstable; urgency=low > # > # * Remove non DFSG-compliant doc/cpio.info and doc/cpio.texi from source. > #Closes: #695717 > # > limit source cpio Limiting to bugs with field 'source' containing at least one of 'cpio' Limit currently set to 'source':'cpio' > tags 695717 + pending Bug #695717 [src:cpio] cpio: includes non-free documentation (GFDL with unmodifiable sections) Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 695717: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695717 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: bash: diff for NMU version 4.2+dfsg-0.1
Processing commands for cont...@bugs.debian.org: > tags 695709 + patch Bug #695709 [src:bash] bash: includes non-free documentation (GFDL with unmodifiable sections) Added tag(s) patch. > tags 695709 + pending Bug #695709 [src:bash] bash: includes non-free documentation (GFDL with unmodifiable sections) Ignoring request to alter tags of bug #695709 to the same tags previously set > thanks Stopping processing here. Please contact me if you need assistance. -- 695709: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695709 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: limit source to bash, tagging 695709
Processing commands for cont...@bugs.debian.org: > #bash (4.2+dfsg-0.1) unstable; urgency=low > # > # * Remove unused and non DFSG-compliant bash-4.2/lib/readline/doc from > #source. (Closes: #695709) > # > limit source bash Limiting to bugs with field 'source' containing at least one of 'bash' Limit currently set to 'source':'bash' > tags 695709 + pending Bug #695709 [src:bash] bash: includes non-free documentation (GFDL with unmodifiable sections) Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 695709: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695709 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#696971: cdO;FTBFS: configure fails
Package: src:cdo Version: 1.5.9+dfsg.1-1 Severity: serious Justification: fails to build from source (but built successfully in the past) Hi! Your package failed to build on the buildds: checking for gcc... gcc checking whether the C compiler works... no configure: error: in `/build/buildd-cdo_1.5.9+dfsg.1-1-amd64-SRhBVs/cdo-1.5.9+dfsg.1': configure: error: C compiler cannot create executables See `config.log' for more details make[1]: *** [override_dh_auto_configure] Error 77 Full build log at https://buildd.debian.org/status/package.php?p=cdo Regards Christoph -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#696962: marked as done (grub-efi-{amd64, ia32}: fails to install: cp: cannot create regular file '/boot/grub/': Not a directory)
Your message dated Sun, 30 Dec 2012 01:18:44 + with message-id and subject line Bug#696962: fixed in grub2 2.00-9 has caused the Debian Bug report #696962, regarding grub-efi-{amd64, ia32}: fails to install: cp: cannot create regular file '/boot/grub/': Not a directory to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 696962: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696962 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: grub-efi-amd64,grub-efi-ia32 Version: 1.99-24 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Hi, during a test with piuparts I noticed your package failed to install. As per definition of the release team this makes the package too buggy for a release, thus the severity. >From the attached log (scroll to the bottom...): Selecting previously unselected package grub-efi-amd64. (Reading database ... 7077 files and directories currently installed.) Unpacking grub-efi-amd64 (from .../grub-efi-amd64_1.99-24_amd64.deb) ... Setting up grub-efi-amd64 (1.99-24) ... Creating config file /etc/default/grub with new version cp: cannot create regular file '/boot/grub/': Not a directory dpkg: error processing grub-efi-amd64 (--configure): subprocess installed post-installation script returned error exit status 1 Errors were encountered while processing: grub-efi-amd64 cheers, Andreas grub-efi-amd64_1.99-24.log.gz Description: GNU Zip compressed data --- End Message --- --- Begin Message --- Source: grub2 Source-Version: 2.00-9 We believe that the bug you reported is fixed in the latest version of grub2, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 696...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Colin Watson (supplier of updated grub2 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 29 Dec 2012 23:44:51 + Source: grub2 Binary: grub2 grub-linuxbios grub-efi grub-common grub2-common grub-emu grub-emu-dbg grub-pc-bin grub-pc-dbg grub-pc grub-rescue-pc grub-coreboot-bin grub-coreboot-dbg grub-coreboot grub-efi-ia32-bin grub-efi-ia32-dbg grub-efi-ia32 grub-efi-amd64-bin grub-efi-amd64-dbg grub-efi-amd64 grub-efi-ia64-bin grub-efi-ia64-dbg grub-efi-ia64 grub-ieee1275-bin grub-ieee1275-dbg grub-ieee1275 grub-firmware-qemu grub-yeeloong-bin grub-yeeloong-dbg grub-yeeloong grub-theme-starfield grub-mount-udeb Architecture: source i386 Version: 2.00-9 Distribution: experimental Urgency: low Maintainer: GRUB Maintainers Changed-By: Colin Watson Description: grub-common - GRand Unified Bootloader (common files) grub-coreboot - GRand Unified Bootloader, version 2 (Coreboot version) grub-coreboot-bin - GRand Unified Bootloader, version 2 (Coreboot binaries) grub-coreboot-dbg - GRand Unified Bootloader, version 2 (Coreboot debug files) grub-efi - GRand Unified Bootloader, version 2 (dummy package) grub-efi-amd64 - GRand Unified Bootloader, version 2 (EFI-AMD64 version) grub-efi-amd64-bin - GRand Unified Bootloader, version 2 (EFI-AMD64 binaries) grub-efi-amd64-dbg - GRand Unified Bootloader, version 2 (EFI-AMD64 debug files) grub-efi-ia32 - GRand Unified Bootloader, version 2 (EFI-IA32 version) grub-efi-ia32-bin - GRand Unified Bootloader, version 2 (EFI-IA32 binaries) grub-efi-ia32-dbg - GRand Unified Bootloader, version 2 (EFI-IA32 debug files) grub-efi-ia64 - GRand Unified Bootloader, version 2 (IA64 version) grub-efi-ia64-bin - GRand Unified Bootloader, version 2 (IA64 binaries) grub-efi-ia64-dbg - GRand Unified Bootloader, version 2 (IA64 debug files) grub-emu - GRand Unified Bootloader, version 2 (emulated version) grub-emu-dbg - GRand Unified Bootloader, version 2 (emulated debug files) grub-firmware-qemu - GRUB firmware image for QEMU grub-ieee1275 - GRand Unified Bootloader, version 2 (Open Firmware version) grub-ieee1275-bin - GRand Unified Bootloader, version 2 (Open Firmware binaries) grub-ieee1275-dbg - GRand Unified Bootloader, version 2 (Open Firmware debug files) grub-linuxbios - GRand Unified Bootloader, version 2 (dummy package) grub-mount-udeb - export GRUB filesyste
Processed: severity of 696939 is wishlist
Processing commands for cont...@bugs.debian.org: > # support for jabber accounts = feature request, hence severity wishlist > severity 696939 wishlist Bug #696939 [gnome-online-accounts] can't create jabber accounts Severity set to 'wishlist' from 'serious' > End of message, stopping processing here. Please contact me if you need assistance. -- 696939: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696939 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#696962: marked as done (grub-efi-{amd64, ia32}: fails to install: cp: cannot create regular file '/boot/grub/': Not a directory)
Your message dated Sun, 30 Dec 2012 00:33:52 + with message-id and subject line Bug#696962: fixed in grub2 1.99-25 has caused the Debian Bug report #696962, regarding grub-efi-{amd64, ia32}: fails to install: cp: cannot create regular file '/boot/grub/': Not a directory to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 696962: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696962 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: grub-efi-amd64,grub-efi-ia32 Version: 1.99-24 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Hi, during a test with piuparts I noticed your package failed to install. As per definition of the release team this makes the package too buggy for a release, thus the severity. >From the attached log (scroll to the bottom...): Selecting previously unselected package grub-efi-amd64. (Reading database ... 7077 files and directories currently installed.) Unpacking grub-efi-amd64 (from .../grub-efi-amd64_1.99-24_amd64.deb) ... Setting up grub-efi-amd64 (1.99-24) ... Creating config file /etc/default/grub with new version cp: cannot create regular file '/boot/grub/': Not a directory dpkg: error processing grub-efi-amd64 (--configure): subprocess installed post-installation script returned error exit status 1 Errors were encountered while processing: grub-efi-amd64 cheers, Andreas grub-efi-amd64_1.99-24.log.gz Description: GNU Zip compressed data --- End Message --- --- Begin Message --- Source: grub2 Source-Version: 1.99-25 We believe that the bug you reported is fixed in the latest version of grub2, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 696...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Colin Watson (supplier of updated grub2 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 29 Dec 2012 23:45:01 + Source: grub2 Binary: grub2 grub-linuxbios grub-efi grub-common grub2-common grub-emu grub-pc-bin grub-pc grub-rescue-pc grub-coreboot-bin grub-coreboot grub-efi-ia32-bin grub-efi-ia32 grub-efi-amd64-bin grub-efi-amd64 grub-ieee1275-bin grub-ieee1275 grub-firmware-qemu grub-yeeloong-bin grub-yeeloong grub-mount-udeb Architecture: source i386 Version: 1.99-25 Distribution: unstable Urgency: low Maintainer: GRUB Maintainers Changed-By: Colin Watson Description: grub-common - GRand Unified Bootloader (common files) grub-coreboot - GRand Unified Bootloader, version 2 (Coreboot version) grub-coreboot-bin - GRand Unified Bootloader, version 2 (Coreboot binaries) grub-efi - GRand Unified Bootloader, version 2 (dummy package) grub-efi-amd64 - GRand Unified Bootloader, version 2 (EFI-AMD64 version) grub-efi-amd64-bin - GRand Unified Bootloader, version 2 (EFI-AMD64 binaries) grub-efi-ia32 - GRand Unified Bootloader, version 2 (EFI-IA32 version) grub-efi-ia32-bin - GRand Unified Bootloader, version 2 (EFI-IA32 binaries) grub-emu - GRand Unified Bootloader, version 2 (emulated version) grub-firmware-qemu - GRUB firmware image for QEMU grub-ieee1275 - GRand Unified Bootloader, version 2 (Open Firmware version) grub-ieee1275-bin - GRand Unified Bootloader, version 2 (Open Firmware binaries) grub-linuxbios - GRand Unified Bootloader, version 2 (dummy package) grub-mount-udeb - export GRUB filesystems using FUSE (udeb) grub-pc- GRand Unified Bootloader, version 2 (PC/BIOS version) grub-pc-bin - GRand Unified Bootloader, version 2 (PC/BIOS binaries) grub-rescue-pc - GRUB bootable rescue images, version 2 (PC/BIOS version) grub-yeeloong - GRand Unified Bootloader, version 2 (Yeeloong version) grub-yeeloong-bin - GRand Unified Bootloader, version 2 (Yeeloong binaries) grub2 - GRand Unified Bootloader, version 2 (dummy package) grub2-common - GRand Unified Bootloader (common files for version 2) Closes: 696962 Changes: grub2 (1.99-25) unstable; urgency=low . * Ensure /boot/grub exists before copying files to it for EFI installs (closes: #696962). Checksums-Sha1: a0c39f27bfb97f3ab2596af0ce924f80db50f88a 3757 grub2_1.99-25.dsc 9ecf5631b9cb63aac2ad02d9ab8d0d42c30d00e9 420
Bug#685625: libgeom: may cause segfault of grub-probe
On 29/12/12 23:56, Christoph Egger wrote: > Steven, SVN has fixes for #694374 and #695679 > already. do you intent these for wheezy? Yes, please. They are not RC severity but sufficiently important for release, and in particular #695679 should be fixed for people doing squeeze->wheezy upgrades of jail systems. > If so let's add #696514 and > potentially the implicit declarations and get it uploaded as well. I think it is beneficial, yes. And as minimal as it can be. There are some remaining implicit declarations, but are more complex, therefore I'm leaving those as they are and I haven't enabled the -Werror flag for this package yet. Thanks! Regards, -- Steven Chamberlain ste...@pyro.eu.org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#685625: marked as done ([kfreebsd] libgeom: may cause segfault of grub-probe)
Your message dated Sun, 30 Dec 2012 00:02:58 + with message-id and subject line Bug#685625: fixed in freebsd-libs 9.0+ds1-4 has caused the Debian Bug report #685625, regarding [kfreebsd] libgeom: may cause segfault of grub-probe to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 685625: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685625 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: kfreebsd-image-9.0-2-amd64 Version: 9.0-5 Severity: important Dear Maintainer, When using "apt-get upgrade" to get the latest version of kfreebsd-image-9.0-2-amd64, the package segfaults in the "configure" stage. , | # dpkg --configure kfreebsd-image-9.0-2-amd64 | Setting up kfreebsd-image-9.0-2-amd64 (9.0-5) ... | run-parts: executing /etc/kernel/postinst.d/apt-dater-host_reboot 9.0-2-amd64 /boot/kfreebsd-9.0-2-amd64.gz | run-parts: executing /etc/kernel/postinst.d/zz-update-grub 9.0-2-amd64 /boot/kfreebsd-9.0-2-amd64.gz | Segmentation fault | Segmentation fault | Generating grub.cfg ... | Found kernel of FreeBSD: /boot/kfreebsd-9.0-2-amd64.gz | Found kernel module directory: /lib/modules/9.0-2-amd64 | Segmentation fault | Segmentation fault | Segmentation fault | ls: cannot access /lib/modules/9.0-2-amd64/unknown.ko: No such file or directory | run-parts: /etc/kernel/postinst.d/zz-update-grub exited with return code 2 | dpkg: error processing kfreebsd-image-9.0-2-amd64 (--configure): | subprocess installed post-installation script returned error exit status 1 | Errors were encountered while processing: | kfreebsd-image-9.0-2-amd64 ` Not sure if I dare reboot, but will assist with debugging if needed. Thanks -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (500, 'testing') Architecture: kfreebsd-amd64 (x86_64) Kernel: kFreeBSD 9.0-1-amd64 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages kfreebsd-image-9.0-2-amd64 depends on: ii devd 9.0+ds1-7 ii freebsd-utils 9.0+ds1-7 ii kbdcontrol 9.0+ds1-7 ii kldutils 9.0+ds1-7 kfreebsd-image-9.0-2-amd64 recommends no packages. kfreebsd-image-9.0-2-amd64 suggests no packages. -- no debconf information --- End Message --- --- Begin Message --- Source: freebsd-libs Source-Version: 9.0+ds1-4 We believe that the bug you reported is fixed in the latest version of freebsd-libs, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 685...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Christoph Egger (supplier of updated freebsd-libs package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 29 Dec 2012 15:49:19 -0800 Source: freebsd-libs Binary: libsbuf6 libsbuf6-udeb libsbuf-dev libcam6 libcam-dev libgeom1 libgeom-dev libgeom1-udeb libusbhid4debian libusbhid-common libusbhid-dev libusb2debian libusb2-dev libusb2debian-udeb libkvm0 libkvm-dev libdevstat7 libdevstat-dev libmemstat3 libmemstat-dev libnetgraph4 libnetgraph-dev libipx2 libipx-dev libipx2-udeb libkiconv4 libkiconv-dev libjail1 libjail-dev libalias7 libalias-dev Architecture: source kfreebsd-amd64 all Version: 9.0+ds1-4 Distribution: unstable Urgency: low Maintainer: GNU/kFreeBSD Maintainers Changed-By: Christoph Egger Description: libalias-dev - Development files for libalias libalias7 - FreeBSD packet aliasing library libcam-dev - Development files for libcam libcam6- FreeBSD CAM (Common Access Method) library libdevstat-dev - Development files for libdevstat libdevstat7 - FreeBSD devstat (kernel interface) library libgeom-dev - Development files for libgeom libgeom1 - FreeBSD GEOM library libgeom1-udeb - FreeBSD GEOM library (udeb) (udeb) libipx-dev - Development files for libipx libipx2- FreeBSD IPX address conversion support library libipx2-udeb - FreeBSD IPX address conversion support library (udeb) (udeb) libjail-dev - Development files for libjail libjail1 - FreeBSD jail library libkiconv-dev - Development files for libkiconv libkiconv4 - FreeBSD kernel side iconv library (udeb) libkvm-dev - Development files for libkvm libk
Processed: autoconf2.59: diff for NMU version 2.59+dfsg-0.1
Processing commands for cont...@bugs.debian.org: > tags 695704 + patch Bug #695704 [src:autoconf2.59] autoconf2.59: includes non-free documentation (GFDL with unmodifiable sections) Added tag(s) patch. > thanks Stopping processing here. Please contact me if you need assistance. -- 695704: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695704 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#685625: libgeom: may cause segfault of grub-probe
Christoph Egger writes: > I'd like to hear -release@'s opinion on that. Do you prefer the > smaller patch only fixing the implicit declarations/includes where we > know it has caused this segfaults or can I upload the full change below? Oh sorry I should read more carefull. That's of course a diff for a different package (-utils vs -libs). I'm still inclined to also upload -utils with that diff. Steven, SVN has fixes for #694374 and #695679 already. do you intent these for wheezy? If so let's add #696514 and potentially the implicit declarations and get it uploaded as well. Regards Christoph -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: limit source to autoconf2.59, tagging 695704
Processing commands for cont...@bugs.debian.org: > #autoconf2.59 (2.59+dfsg-0.1) UNRELEASED; urgency=low > # > # * Remove non DFSG-compliant doc/autoconf.* from source. (Closes: #695704) > # > limit source autoconf2.59 Limiting to bugs with field 'source' containing at least one of 'autoconf2.59' Limit currently set to 'source':'autoconf2.59' > tags 695704 + pending Bug #695704 [src:autoconf2.59] autoconf2.59: includes non-free documentation (GFDL with unmodifiable sections) Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 695704: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695704 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#675845: marked as done (adanaxisgpl: FTBFS:)
Your message dated Sat, 29 Dec 2012 23:47:34 + with message-id and subject line Bug#675845: fixed in adanaxisgpl 1.2.5.dfsg.1-5 has caused the Debian Bug report #675845, regarding adanaxisgpl: FTBFS: to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 675845: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=675845 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: src:adanaxisgpl Version: 1.2.5.dfsg.1-4.1 Severity: serious Tags: sid wheezy User: debian-...@lists.debian.org Usertags: kfreebsd X-Debbugs-Cc: debian-...@lists.debian.org Justification: fails to build from source (but built successfully in the past) Hi! Your package failed to build on the kfreebsd-* buildds: gcc -DHAVE_CONFIG_H -I. -I.. -DMUSH_DATA_DIR=\"/usr/share/games\" -I/usr/include/SDL -D_GNU_SOURCE=1 -D_REENTRANT -I. -I./API -DNDEBUG -I./Platform/X11 -DMUSH_DATA_DIR=\"/usr/share/games\" -g -O2 -I. -I./API -DNDEBUG -c -o io.o `test -f 'MushRuby/io.c' || echo './'`MushRuby/io.c In file included from /usr/include/sys/kern/param.h:67:0, from /usr/include/osreldate.h:1, from /usr/include/i386-kfreebsd-gnu/sys/param.h:39, from MushRuby/io.c:91: /usr/include/sys/kern/types.h:189:18: error: two or more data types in declaration specifiers Full build log at https://buildd.debian.org/status/fetch.php?pkg=adanaxisgpl&arch=kfreebsd-i386&ver=1.2.5.dfsg.1-4.1&stamp=1338283407 Regards Christoph If you have further questions please mail debian-...@lists.debian.org -- 9FED 5C6C E206 B70A 5857 70CA 9655 22B9 D49A E731 Debian Developer | Lisp Hacker | CaCert Assurer --- End Message --- --- Begin Message --- Source: adanaxisgpl Source-Version: 1.2.5.dfsg.1-5 We believe that the bug you reported is fixed in the latest version of adanaxisgpl, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 675...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Christoph Egger (supplier of updated adanaxisgpl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 29 Dec 2012 14:20:57 -0800 Source: adanaxisgpl Binary: adanaxisgpl adanaxisgpl-data Architecture: source kfreebsd-amd64 all Version: 1.2.5.dfsg.1-5 Distribution: unstable Urgency: low Maintainer: Debian Games Team Changed-By: Christoph Egger Description: adanaxisgpl - Action game in four spatial dimensions adanaxisgpl-data - Action game in four spatial dimensions Closes: 675845 Changes: adanaxisgpl (1.2.5.dfsg.1-5) unstable; urgency=low . * Team Upload * Fix FTBFS on kFreeBSD (Closes: #675845) Thanks to Steven Chamberlain for the patch Checksums-Sha1: f082f76bd1c423caea43f5c6c107073131800d6b 2273 adanaxisgpl_1.2.5.dfsg.1-5.dsc 276b377988836eec440f8c94aafff4ff7c0acb49 16886 adanaxisgpl_1.2.5.dfsg.1-5.debian.tar.gz a15f2d132abd73aed009237e69734bb190ce4622 1546362 adanaxisgpl_1.2.5.dfsg.1-5_kfreebsd-amd64.deb e89caaefa7899c05aa15c399eb5652f0146de4ec 18349320 adanaxisgpl-data_1.2.5.dfsg.1-5_all.deb Checksums-Sha256: 6aeb7b9f5938053f3e5ffc61224857333a573aeca6f44c8ec9a2140d6bde7574 2273 adanaxisgpl_1.2.5.dfsg.1-5.dsc 13991bc9dbf55b466a373d191585d3e41eee7ddcd86b8f07aa95d77ab9c0c3c1 16886 adanaxisgpl_1.2.5.dfsg.1-5.debian.tar.gz 3a4be99ee1830e39b836c37a7d25f358dd41efca9605d9a2e3009541edff4234 1546362 adanaxisgpl_1.2.5.dfsg.1-5_kfreebsd-amd64.deb 395a4965bd46b7701d064f9d96a23d2f1ce36897fa9b039f616a594b2629f862 18349320 adanaxisgpl-data_1.2.5.dfsg.1-5_all.deb Files: 7106d4f26875a9db8384d02c81844ede 2273 games optional adanaxisgpl_1.2.5.dfsg.1-5.dsc 4193fc49aed9ec554cf7f03b13953d91 16886 games optional adanaxisgpl_1.2.5.dfsg.1-5.debian.tar.gz 61a2293b95eeb377e7589161cfcdefad 1546362 games optional adanaxisgpl_1.2.5.dfsg.1-5_kfreebsd-amd64.deb e412ac4eec60dd8f86bdf5c7076aa76d 18349320 games optional adanaxisgpl-data_1.2.5.dfsg.1-5_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/kFreeBSD) iQIcBAEBCAAGBQJQ335OAAoJEKv/7bJACMb5WCsQALFjnKMOs3MuNbrwrMt2l1pF /zIQzMdWUbKKAbkvkRG33R1DGMy4hjbPAUuBoSy7QDEb9up+H753y73KWf/F9DQL yuHGlg5BHZZKSEepNbR95FIPObEny4pd/D4oB6z/33sQwnne3w+lCx/UmiJK/deo tyXj
Processed: found 696962 in 2.00-8
Processing commands for cont...@bugs.debian.org: > found 696962 2.00-8 Bug #696962 [grub-efi-amd64,grub-efi-ia32] grub-efi-{amd64, ia32}: fails to install: cp: cannot create regular file '/boot/grub/': Not a directory Marked as found in versions grub2/2.00-8. > thanks Stopping processing here. Please contact me if you need assistance. -- 696962: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696962 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#696962: grub-efi-{amd64, ia32}: fails to install: cp: cannot create regular file '/boot/grub/': Not a directory
Package: grub-efi-amd64,grub-efi-ia32 Version: 1.99-24 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Hi, during a test with piuparts I noticed your package failed to install. As per definition of the release team this makes the package too buggy for a release, thus the severity. >From the attached log (scroll to the bottom...): Selecting previously unselected package grub-efi-amd64. (Reading database ... 7077 files and directories currently installed.) Unpacking grub-efi-amd64 (from .../grub-efi-amd64_1.99-24_amd64.deb) ... Setting up grub-efi-amd64 (1.99-24) ... Creating config file /etc/default/grub with new version cp: cannot create regular file '/boot/grub/': Not a directory dpkg: error processing grub-efi-amd64 (--configure): subprocess installed post-installation script returned error exit status 1 Errors were encountered while processing: grub-efi-amd64 cheers, Andreas grub-efi-amd64_1.99-24.log.gz Description: GNU Zip compressed data
Processed: tagging 695701
Processing commands for cont...@bugs.debian.org: > tags 695701 - pending Bug #695701 [src:kdesdk] kdesdk: includes non-free documentation (GFDL with invariant sections) Removed tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 695701: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695701 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#696446: nmap: Errors out at startup if running as root and there is a network interface in monitor mode
Hilko Bengen writes off-list: > I have attached the .diff.gz. Are you able to build binary .deb packages > or should I provide a .deb? I've built and tested it. It works. Note: the errors below from sendto are normal. They're caused by a firewall rule on my router. root@cascade:/home/dfranke# ifconfig mon.wlan0 mon.wlan0 Link encap:UNSPEC HWaddr F8-D1-11-19-DD-F6-B0-6E-00-00-00-00-00-00-00-00 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:7226684 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:1048411222 (999.8 MiB) TX bytes:0 (0.0 B) root@cascade:/home/dfranke# apt-get purge nmap Reading package lists... Done Building dependency tree Reading state information... Done The following packages will be REMOVED: nmap* 0 upgraded, 0 newly installed, 1 to remove and 0 not upgraded. After this operation, 17.4 MB disk space will be freed. Do you want to continue [Y/n]? (Reading database ... 93326 files and directories currently installed.) Removing nmap ... Processing triggers for man-db ... root@cascade:/home/dfranke# dpkg --install nmap_6.00-0.3_amd64.deb Selecting previously unselected package nmap. (Reading database ... 92696 files and directories currently installed.) Unpacking nmap (from nmap_6.00-0.3_amd64.deb) ... Setting up nmap (6.00-0.3) ... Processing triggers for man-db ... root@cascade:/home/dfranke# nmap --version Nmap version 6.00 ( http://nmap.org ) Platform: x86_64-unknown-linux-gnu Compiled with: liblua-5.1.5 openssl-1.0.1c libpcre-8.30 libpcap-1.3.0 nmap-libdnet-1.12 ipv6 Compiled without: root@cascade:/home/dfranke# nmap scanme.nmap.org Starting Nmap 6.00 ( http://nmap.org ) at 2012-12-29 18:01 EST sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, 74.207.244.221, 16) => Operation not permitted Offending packet: TCP 98.110.150.34:42418 > 74.207.244.221:25 S ttl=46 id=39742 iplen=44 seq=3342432888 win=1024 sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, 74.207.244.221, 16) => Operation not permitted Offending packet: TCP 98.110.150.34:42419 > 74.207.244.221:25 S ttl=37 id=980 iplen=44 seq=3342367353 win=1024 sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, 74.207.244.221, 16) => Operation not permitted Offending packet: TCP 98.110.150.34:42420 > 74.207.244.221:25 S ttl=55 id=26664 iplen=44 seq=3342563962 win=1024 Nmap scan report for scanme.nmap.org (74.207.244.221) Host is up (0.090s latency). Not shown: 996 closed ports PORT STATESERVICE 22/tcp open ssh 25/tcp filtered smtp 80/tcp open http 9929/tcp open nping-echo Nmap done: 1 IP address (1 host up) scanned in 4.36 seconds -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#696820: Acknowledgement (Error: open(/var/mail/USER) failed: Permission denied)
Actually it didnt exist, the directory is empty: nveber@pyre[4761:~]$ ls -al /var/mail total 8 drwxrwsr-x 2 root mail 4096 Jul 8 2010 . drwxr-xr-x 13 root root 4096 Nov 4 22:22 .. nveber@pyre[4762:~]$ It seems the default mail_location doesnt work for some reason at least on my system. On Fri, Dec 28, 2012 at 08:10:55PM -0500, Jaldhar H. Vyas wrote: > Normally it would be a non-fatal error but your /var/mail/%u did > exist but didn't have write permission. > > Set mail_location appropriately and everything should work properly > now and in the future. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#696420: python-gmsh: undefined symbol: mca_base_param_reg_int
Processing commands for cont...@bugs.debian.org: > severity 696420 normal Bug #696420 [python-gmsh] python-gmsh: undefined symbol: mca_base_param_reg_int Severity set to 'normal' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 696420: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696420 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: limit source to kdesdk, tagging 695701
Processing commands for cont...@bugs.debian.org: > #kdesdk (4:4.8.4+dfsg-0.1) unstable; urgency=low > # > # * Remove unused and non DFSG-compliant > scripts/kde-emacs/kde-emacs-tips.texi > #from source. (Closes: #695701) > # > limit source kdesdk Limiting to bugs with field 'source' containing at least one of 'kdesdk' Limit currently set to 'source':'kdesdk' > tags 695701 + pending Bug #695701 [src:kdesdk] kdesdk: includes non-free documentation (GFDL with invariant sections) Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 695701: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695701 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#696420: python-gmsh: undefined symbol: mca_base_param_reg_int
severity 696420 normal thanks As Christophe said, the information about using this package is in README.Debian. We know about this problem as it persists since the beginning of this binary. And we would be happy to get a suggestion, how can it be fixed without this workaround. Thanks, Anton -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: Re: virtualbox-source: Virtualbox does not compile with 3.7 kernels
Processing control commands: > severity -1 important Bug #696953 [virtualbox-source] virtualbox-source: Virtualbox does not compile with 3.7 kernels Severity set to 'important' from 'serious' -- 696953: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696953 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#696953: virtualbox-source: Virtualbox does not compile with 3.7 kernels
Control: severity -1 important Hi, On Sat, Dec 29, 2012 at 10:33:28PM +0100, Isaac Jurado wrote: > Severity: serious > Justification: fails to build from source (but built successfully in the past) As there is currently no 3.7 kernel in wheezy or sid, this justification is not correct. Downgrading. Cheers, Ivo -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#654341: marked as done (inkscape reads .eps files from /tmp instead of the current directory)
Your message dated Sat, 29 Dec 2012 22:17:43 + with message-id and subject line Bug#654341: fixed in inkscape 0.48.3.1-1.3 has caused the Debian Bug report #654341, regarding inkscape reads .eps files from /tmp instead of the current directory to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 654341: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=654341 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: inkscape Version: 0.48.1-2.1+b1 Severity: grave Tags: security Justification: user security hole When I want to open a .eps file with something like inkscape file.eps inkscape tries to open the file from /tmp instead of the current directory (if the file doesn't exist, I get a ghostscript error from ps2pdf, which is the same error as when ps2pdf is run manually). According to strace, inkscape does a chdir to /tmp before running ps2pdf on the argument, hence the problem. The security problem is that the user A may open a file belonging to some user B from /tmp, which can contain incorrect data, an offensive image and so on. It can also be a symbolic link to some protected file of user A (which may inadvertently diffused to other users) or to some other special file that shouldn't be read, such as /proc//fd/0, which can make program behave incorrectly. -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.1.0-1-amd64 (SMP w/2 CPU cores) Locale: LANG=POSIX, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages inkscape depends on: ii libaspell15 0.60.7~20110707-1 ii libatk1.0-0 2.2.0-2 ii libatkmm-1.6-1 2.22.6-1 ii libc6 2.13-24 ii libcairo2 1.10.2-6.2 ii libcairomm-1.0-11.10.0-1 ii libfontconfig1 2.8.0-3 ii libfreetype62.4.8-1 ii libgc1c21:7.1-8 ii libgcc1 1:4.6.2-9 ii libgconf2-4 3.2.3-1 ii libgdk-pixbuf2.0-0 2.24.0-2 ii libglib2.0-02.30.2-4 ii libglibmm-2.4-1c2a 2.30.0-2 ii libgnomevfs2-0 1:2.24.4-1 ii libgomp14.6.2-9 ii libgsl0ldbl 1.15+dfsg-1 ii libgtk2.0-0 2.24.8-2 ii libgtkmm-2.4-1c2a 1:2.24.2-1 ii libgtkspell02.0.16-1 ii liblcms11.19.dfsg-1+b1 ii libmagick++48:6.6.9.7-5+b2 ii libmagickcore4 8:6.6.9.7-5+b2 ii libpango1.0-0 1.29.4-2 ii libpangomm-1.4-12.28.4-1 ii libpng12-0 1.2.46-3 ii libpoppler-glib60.16.7-2+b1 ii libpoppler130.16.7-2+b1 ii libpopt01.16-3 ii libsigc++-2.0-0c2a 2.2.9-1.1 ii libstdc++6 4.6.2-9 ii libwpd-0.9-90.9.4-1 ii libwpg-0.2-20.2.1-1 ii libx11-62:1.4.4-4 ii libxml2 2.7.8.dfsg-5.1 ii libxslt1.1 1.1.26-8 ii zlib1g 1:1.2.3.4.dfsg-3 Versions of packages inkscape recommends: ii aspell 0.60.7~20110707-1 ii imagemagick 8:6.6.9.7-5+b2 ii libwmf-bin ii perlmagick ii pstoedit 3.60-1 Versions of packages inkscape suggests: pn dia | dia-gnome pn libgnomevfs2-extra 1:2.24.4-1 pn libsvg-perl pn libxml-xql-perl pn python 2.7.2-9 pn python-lxml pn python-numpy 1:1.5.1-3 pn python-uniconvertor pn ruby 4.8 pn ruby1.8 [ruby] 1.8.7.352-2 pn skencil -- no debconf information --- End Message --- --- Begin Message --- Source: inkscape Source-Version: 0.48.3.1-1.3 We believe that the bug you reported is fixed in the latest version of inkscape, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 654...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. John Paul Adrian Glaubitz (supplier of updated inkscape package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 29 Dec 2012 19:15:46 +0100 Source: inkscape Binary: inkscape Architecture: source amd64 Version: 0.48.3.1-1.3 Distribution: unstable Urgency: low Maintainer: Wolfram Quester Changed-By: John Pau
Bug#696483: Uploaded to DELAYED/7
Hi, > I've uploaded a NMU with the patch above to DELAYED/7. Thanks for your patch and the work and sorry for delayed answer. Christmas holidays and family ;) Now, i am sitting on a patch for stable/squeeze. regards, Frank -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#695963: marked as done (magics++: FTBFS: configure error)
Your message dated Sat, 29 Dec 2012 22:03:00 + with message-id and subject line Bug#695963: fixed in magics++ 2.18.7-2 has caused the Debian Bug report #695963, regarding magics++: FTBFS: configure error to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 695963: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695963 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: src:magics++ Version: 2.18.7-1 Severity: serious Justification: fails to build from source (but built successfully in the past) Hi! Your package failed to build on the buildds: checking for pbopen in -lemosR64... yes Emoslib found. checking for pj_init in -lproj... no configure: error: Proj4 could not be linked! "tail -v -n +0 config.log" Full build log at https://buildd.debian.org/status/fetch.php?pkg=magics%2B%2B&arch=amd64&ver=2.18.7-1&stamp=1355221432 Regards Christoph -- --- End Message --- --- Begin Message --- Source: magics++ Source-Version: 2.18.7-2 We believe that the bug you reported is fixed in the latest version of magics++, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 695...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Alastair McKinstry (supplier of updated magics++ package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Tue, 18 Dec 2012 11:54:23 + Source: magics++ Binary: libmagplus3 libmagics++-dev magics++ python-magics++ libmagics++-data Architecture: source i386 all Version: 2.18.7-2 Distribution: unstable Urgency: low Maintainer: Alastair McKinstry Changed-By: Alastair McKinstry Description: libmagics++-data - Data files needed for magics++ library libmagics++-dev - Development files for ECMWF plotting software MAGICS++ libmagplus3 - ECMWF meteorological plotting software library magics++ - Executables for the magics++ library python-magics++ - python support for Magics++ Closes: 695963 Changes: magics++ (2.18.7-2) unstable; urgency=low . * libproj-dev is now a requirement, not optional. Include it. Closes: #695963. * Enable hardening. * Don't ship empty dir /usr/share/magics in -dev package. * -data package is now M-A: foreign to satisfy m-a dependencies. Checksums-Sha1: 52481da5dcabd869271a275ebd4a58ff75fdb4a3 2422 magics++_2.18.7-2.dsc ed3b1a105ff28cd4f9730b31fb01795237714e23 12296 magics++_2.18.7-2.debian.tar.xz dbee9a6c35d02b0b0e2ad5c40d27f6fafa0e222d 3406268 libmagplus3_2.18.7-2_i386.deb b96cb22a4d079ff2531486cdbaf08dd611da3378 8765812 libmagics++-dev_2.18.7-2_i386.deb e552f5f20017b00f3954bcabb13475c7db8f40f7 38448 magics++_2.18.7-2_i386.deb d9f4778d9b4bd69b2da54c4fed8cbc74def2dd0e 83970 python-magics++_2.18.7-2_i386.deb 3e637344c5bd23935fba489a33c20be6b34af08e 25340222 libmagics++-data_2.18.7-2_all.deb Checksums-Sha256: edab7eb429ba58c45d825585a531dfad6743c715923e51c0f90988d02399e6e6 2422 magics++_2.18.7-2.dsc 2ae9d507833c5b88d3a24bef4e5c3879c2b23216ee59323805184de7a4395363 12296 magics++_2.18.7-2.debian.tar.xz a488f64199b36dd3b0f60571bbf974d5812ace72db3773665d7b86072b3b7102 3406268 libmagplus3_2.18.7-2_i386.deb b578074441204d09255f805f05e3738e0cd257376fdc646bd2b1f97b7a187f45 8765812 libmagics++-dev_2.18.7-2_i386.deb 9355b5283ac03852926a97db4d500fe56ffb4a94039d19a2a54d0e70dd8139bf 38448 magics++_2.18.7-2_i386.deb 63fdc93f19accad629eaff3132e9b4b46fc87bf26c4eb36e55b4c238dfeb07ec 83970 python-magics++_2.18.7-2_i386.deb 02ebf23c78274fbde31e0555d33d520ea870283b330abe2d0bed0ed9045f79a9 25340222 libmagics++-data_2.18.7-2_all.deb Files: 0a86aa579f681188e1c69285dbf588e5 2422 utils optional magics++_2.18.7-2.dsc 5c888189e4d6e3e235297c5012982e73 12296 utils optional magics++_2.18.7-2.debian.tar.xz 6f44c52b5efd44e3c7ad585cbcae9a9c 3406268 libs optional libmagplus3_2.18.7-2_i386.deb aa762e77a3a3424761c809b468cab288 8765812 libdevel optional libmagics++-dev_2.18.7-2_i386.deb 59964d7b2c640013814a3bed567ee11d 38448 utils optional magics++_2.18.7-2_i386.deb 46b109308051e1cfed7fab08a946eb89 83970 python optional python-magics++_2.18.7-2_i386.deb c335e628fabd9b1b4c02026e6c0e1329 25340222 utils optional libmagics++-data_2.18.7-2_a
Bug#685625: libgeom: may cause segfault of grub-probe
Hi all! I'd like to hear -release@'s opinion on that. Do you prefer the smaller patch only fixing the implicit declarations/includes where we know it has caused this segfaults or can I upload the full change below? Regards Christoph Steven Chamberlain writes: > This is a multi-part message in MIME format. > --030202080401090604090105 > Content-Type: text/plain; charset=ISO-8859-1 > Content-Transfer-Encoding: 7bit > > On 29/12/12 16:47, Steven Chamberlain wrote: >> I can provide a similar patch for freebsd-utils which has the same >> issues, but the only problem I could confirm yet was a segfault in >> ifconfig bridge configuration (#696514) due to it. > > Attached is a similar patch for freebsd-utils, fixing implicit > declarations that are due to libbsd no longer being used. Should we > apply it? > > The warnings are potentially serious, but I don't know of any specific > bugs that this will fix. (#696514 turned out not to be due to these). > > Regards, > -- > Steven Chamberlain > ste...@pyro.eu.org > > --030202080401090604090105 > Content-Type: text/x-patch; > name="implicit-declaration.patch" > Content-Transfer-Encoding: 7bit > Content-Disposition: attachment; > filename="implicit-declaration.patch" > > Index: freebsd-utils-9.0+ds1/usr.sbin/mountd/mountd.c > === > --- freebsd-utils-9.0+ds1.orig/usr.sbin/mountd/mountd.c 2012-12-29 > 19:56:58.0 + > +++ freebsd-utils-9.0+ds1/usr.sbin/mountd/mountd.c2012-12-29 > 20:05:01.478673213 + > @@ -80,6 +80,8 @@ > #include > #include > #include > +#include > + > #include "pathnames.h" > #include "mntopts.h" > > Index: freebsd-utils-9.0+ds1/usr.sbin/vidcontrol/vidcontrol.c > === > --- freebsd-utils-9.0+ds1.orig/usr.sbin/vidcontrol/vidcontrol.c > 2010-03-29 21:12:44.0 +0100 > +++ freebsd-utils-9.0+ds1/usr.sbin/vidcontrol/vidcontrol.c2012-12-29 > 20:05:04.610607859 + > @@ -48,6 +48,8 @@ > #include > #include > #include > +#include > + > #include "path.h" > #include "decode.h" > > Index: freebsd-utils-9.0+ds1/usr.sbin/ppp/defs.c > === > --- freebsd-utils-9.0+ds1.orig/usr.sbin/ppp/defs.c2004-09-05 > 02:46:52.0 +0100 > +++ freebsd-utils-9.0+ds1/usr.sbin/ppp/defs.c 2012-12-29 20:00:01.091748618 > + > @@ -47,6 +47,7 @@ > #include > #endif > #include > +#include > > #if defined(__FreeBSD__) && !defined(NOKLDLOAD) > #include "id.h" > Index: freebsd-utils-9.0+ds1/usr.sbin/nfsd/nfsd.c > === > --- freebsd-utils-9.0+ds1.orig/usr.sbin/nfsd/nfsd.c 2012-12-29 > 19:56:58.0 + > +++ freebsd-utils-9.0+ds1/usr.sbin/nfsd/nfsd.c2012-12-29 > 20:00:04.194641584 + > @@ -71,6 +71,7 @@ > #include > #include > #include > +#include > > /* Global defs */ > #ifdef DEBUG > Index: freebsd-utils-9.0+ds1/usr.sbin/arp/arp.c > === > --- freebsd-utils-9.0+ds1.orig/usr.sbin/arp/arp.c 2012-12-29 > 19:56:58.0 + > +++ freebsd-utils-9.0+ds1/usr.sbin/arp/arp.c 2012-12-29 20:00:07.442606898 > + > @@ -80,6 +80,7 @@ > #include > #include > #include > +#include > > typedef void (action_fn)(struct sockaddr_dl *sdl, > struct sockaddr_inarp *s_in, struct rt_msghdr *rtm); > Index: freebsd-utils-9.0+ds1/usr.sbin/rpc.lockd/kern.c > === > --- freebsd-utils-9.0+ds1.orig/usr.sbin/rpc.lockd/kern.c 2012-12-29 > 19:56:58.0 + > +++ freebsd-utils-9.0+ds1/usr.sbin/rpc.lockd/kern.c 2012-12-29 > 20:00:14.848822213 + > @@ -52,6 +52,7 @@ > #include > #include > #include > +#include > > #include > #include > Index: freebsd-utils-9.0+ds1/usr.sbin/pppctl/pppctl.c > === > --- freebsd-utils-9.0+ds1.orig/usr.sbin/pppctl/pppctl.c 2004-12-13 > 14:50:13.0 + > +++ freebsd-utils-9.0+ds1/usr.sbin/pppctl/pppctl.c2012-12-29 > 20:00:17.754640690 + > @@ -48,6 +48,7 @@ > #include > #include > #include > +#include > > #define LINELEN 2048 > > Index: freebsd-utils-9.0+ds1/usr.bin/kdump/kdump.c > === > --- freebsd-utils-9.0+ds1.orig/usr.bin/kdump/kdump.c 2012-12-29 > 19:56:58.0 + > +++ freebsd-utils-9.0+ds1/usr.bin/kdump/kdump.c 2012-12-29 > 20:05:19.540626059 + > @@ -83,6 +83,8 @@ > #include > #include > #include > +#include > + > #include "ktrace.h" > #include "kdump_subr.h" > > Index: freebsd-utils-9.0+ds1/sbin/geom/core/geom.c > === > --- freebsd-utils-9.0+d
Bug#696920: briquolo: incomplete debian/copyright
Hi Bart, thanks for your report. The DejaVuSans.ttf file gets removed during build time in debian/rules. Therefore the package depends on ttf-dejavu and just links to usr/share/fonts/truetype/ttf-dejavu/DejaVuSans.ttf accordingly. I presume the copyright file in ttf-dejavu covers the issue. Alternatively i can remove the font file completely from the sources. What do you prefer? You are right regarding the intl directory and the LGPL license. I will prepare a NMU for briquolo and ask for sponsorship at mentors soon. Regards, Markus signature.asc Description: OpenPGP digital signature
Bug#664225: Bug reproducible
I can reproduce this bug. No idea what are those "Google gadgets" aboutbut definitely trying to "download" some makes plasma-desktop crash very consistently. -- signature.asc Description: Digital signature
Bug#696446: nmap: Errors out at startup if running as root and there is a network interface in monitor mode
Hilko Bengen writes: > I have just uploaded 6.00-0.3 to DELAYED/5. If/when it hits unstable, > I'll ask the release team for a freeze exception. Thanks Hilko. I'll install this package on my wireless router and verify that it works for me. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#646704: Bug severity is too high
On 12/29/2012 10:33 PM, Samuel Thibault wrote: > As Christian said, it's not just a bug "in live-installer", but "with > crypted volume", which makes it much less grave. the purpose of live-installer is to be able to use d-i to install live-images. like i said, if that fails (by an original bug in live-installer or by lacking a workaround in live-installer for something else in d-i), it's serious. if the bug is not to be fixed (or workarounded) in live-installer, the bug needs to be reassigned (please do so; and then i don't care about the severity, as it's none of the packages i'm looking after). -- Address:Daniel Baumann, Donnerbuehlweg 3, CH-3012 Bern Email: daniel.baum...@progress-technologies.net Internet: http://people.progress-technologies.net/~daniel.baumann/ -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#646704: Bug severity is too high
On 12/29/2012 10:10 PM, Christian PERRIER wrote: > Which probably explains why you haven't done anything since > September, I guess. i for my part have clearly said publicly many times when i'm going to work on live-installer parts (when the other live-* parts are done, that is), so that's no surprise there. since you put yourself into uploaders of live-installer some time ago, maybe you want to look at it yourself too? > Sorry, I'm still deeply convinced that this issue is mostly a case > that doesn't deserve an RC severity. I'll downgrade this bug again > in 4 weeks if nothing happened in the meantime. should that be the case, i'll restore the original severity of course. -- Address:Daniel Baumann, Donnerbuehlweg 3, CH-3012 Bern Email: daniel.baum...@progress-technologies.net Internet: http://people.progress-technologies.net/~daniel.baumann/ -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#696953: virtualbox-source: Virtualbox does not compile with 3.7 kernels
Package: virtualbox-source Version: 4.1.18-dfsg-1.1 Severity: serious Tags: upstream Justification: fails to build from source (but built successfully in the past) Please send upstream: The virtualbox-source package, version 4.1.18-dfsg-1.1, fails to build with a 3.7.x kernel. It complains about an undefined symbol VM_RESERVED. This constant was replaced in 3.7, see: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=314e51b9851b4f4e8ab302243ff5a6fc6147f379 Which is mentioned by: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=547b1e81afe3119f7daf702cc03b158495535a25 Find an attached patch (generated with quilt) to fix this issue. -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.6.10 (SMP w/4 CPU cores) Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages virtualbox-source depends on: ii build-essential 11.5 ii bzip21.0.6-4 ii debhelper9.20120909 ii kbuild 1:0.1.9998svn2543-2 Versions of packages virtualbox-source recommends: pn module-assistant virtualbox-source suggests no packages. -- no debconf information Index: modules/virtualbox/r0drv/linux/memobj-r0drv-linux.c === --- modules.orig/virtualbox/r0drv/linux/memobj-r0drv-linux.c 2012-12-29 20:05:16.153098332 +0100 +++ modules/virtualbox/r0drv/linux/memobj-r0drv-linux.c 2012-12-29 20:12:14.170179009 +0100 @@ -1448,7 +1448,11 @@ #if defined(VBOX_USE_INSERT_PAGE) && LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 22) rc = vm_insert_page(vma, ulAddrCur, pMemLnxToMap->apPages[iPage]); +# if LINUX_VERSION_CODE >= KERNEL_VERSION(3, 7, 0) +vma->vm_flags |= VM_DONTEXPAND | VM_DONTDUMP; /* This flag helps making 100% sure some bad stuff wont happen (swap, core, ++). */ +# else vma->vm_flags |= VM_RESERVED; /* This flag helps making 100% sure some bad stuff wont happen (swap, core, ++). */ +# endif #elif LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 11) rc = remap_pfn_range(vma, ulAddrCur, page_to_pfn(pMemLnxToMap->apPages[iPage]), PAGE_SIZE, fPg); #elif defined(VBOX_USE_PAE_HACK) Index: modules/virtualbox/vboxpci/VBoxPciInternal.h === --- modules.orig/virtualbox/vboxpci/VBoxPciInternal.h 2012-10-18 22:46:48.0 +0200 +++ modules/virtualbox/vboxpci/VBoxPciInternal.h 2012-12-29 20:13:55.157199146 +0100 @@ -30,6 +30,7 @@ #endif #ifdef VBOX_WITH_IOMMU +#include #include #include #endif
Bug#646704: Bug severity is too high
Daniel Baumann, le Sat 29 Dec 2012 20:16:57 +0100, a écrit : > On 12/29/2012 0502 PM, Christian PERRIER wrote: > > This bug doesn't fit the definition of "serious" as it only shows up > > for a precise set of installation types, those not being the most > > common, particularly when people use the Live CD to install. > > a bug in live-installer which leads to an incomplete installation is > serious. As Christian said, it's not just a bug "in live-installer", but "with crypted volume", which makes it much less grave. Samuel -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: Bug severity overflated?
Processing commands for cont...@bugs.debian.org: > severity 655757 important Bug #655757 [korganizer] korganizer: Korganizer Reminder Daemon does not stop reminding Severity set to 'important' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 655757: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655757 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#655757: Bug severity overflated?
severity 655757 important thanks Once again, I think we have here a bug severity that is overflated. Let's re-read the definition of "grave": makes the package in question unusable or mostly so, or causes data loss, or introduces a security hole allowing access to the accounts of users who use the package. On the other hand, let's read the definition of "important": a bug which has a major effect on the usability of a package, without rendering it completely unusable to everyone. I think this bug deserves to have "important" severity. -- signature.asc Description: Digital signature
Bug#696446: nmap: Errors out at startup if running as root and there is a network interface in monitor mode
I have just uploaded 6.00-0.3 to DELAYED/5. If/when it hits unstable, I'll ask the release team for a freeze exception. The patch I applied is attached below. Cheers, -Hilko diff --git a/libdnet-stripped/include/dnet/arp.h b/libdnet-stripped/include/dnet/arp.h index bfb4a64..2f3d0bf 100644 --- a/libdnet-stripped/include/dnet/arp.h +++ b/libdnet-stripped/include/dnet/arp.h @@ -39,6 +39,8 @@ struct arp_hdr { #define ARP_HRD_ETH 0x0001 /* ethernet hardware */ #define ARP_HRD_IEEE802 0x0006 /* IEEE 802 hardware */ +#define ARP_HRD_IEEE80211_RADIOTAP 0x0323 /* IEEE 802.11 + radiotap header */ + /* * Protocol address format */ Modified libdnet-stripped/src/addr.c diff --git a/libdnet-stripped/src/addr.c b/libdnet-stripped/src/addr.c index 7a71345..392d44f 100644 --- a/libdnet-stripped/src/addr.c +++ b/libdnet-stripped/src/addr.c @@ -318,6 +318,7 @@ addr_ston(const struct sockaddr *sa, struct addr *a) #endif case AF_UNSPEC: case ARP_HRD_ETH: /* XXX- Linux arp(7) */ + case ARP_HRD_IEEE80211_RADIOTAP: /* IEEE 802.11 + radiotap header */ a->addr_type = ADDR_TYPE_ETH; a->addr_bits = ETH_ADDR_BITS; memcpy(&a->addr_eth, sa->sa_data, ETH_ADDR_LEN);
Bug#646704: Bug severity is too high
Quoting Daniel Baumann (daniel.baum...@progress-technologies.net): > severity 646704 serious > thanks > > On 12/29/2012 0502 PM, Christian PERRIER wrote: > > This bug doesn't fit the definition of "serious" as it only shows up > > for a precise set of installation types, those not being the most > > common, particularly when people use the Live CD to install. > > a bug in live-installer which leads to an incomplete installation is > serious. Which probably explains why you haven't done anything since September, I guess. Sorry, I'm still deeply convinced that this issue is mostly a case that doesn't deserve an RC severity. I'll downgrade this bug again in 4 weeks if nothing happened in the meantime. signature.asc Description: Digital signature
Bug#654341: inkscape reads .eps files from /tmp instead of the
Hi, I have just uploaded inkscape 0.48.3.1-1.3 which includes a patch by Michael Karcher to address this issue. We have thoroughly tested the patch and the bug is now fixed. Further checks show that the patch doesn't have any negative impact on other areas of the script engine. The patch makes sure that the relative file names are expanded before they are passed to external scripts. EPS files are imported by inkscape by means of an external Python script. The bug is caused by the script engine assuming the filename passed is absolute and then it changes the current working directory to the script directory first, then into /tmp to make sure it is possible to write to disk. I am attaching a series of patches against the git repository for the Debian packaging [1]. The packaging repository is currently at version 0.48.3.1-1, the following three NMUs are therefore not in the repository and I am attaching all patches necessary to update the repository to version 0.48.3.1-1.3. I will file an unblock request to the release team for version 0.48.3.1-1.3. The bug should be closed by my upload anytime soon. Cheers, Adrian > [1] git://git.debian.org/git/collab-maint/inkscape.git -- .''`. John Paul Adrian Glaubitz : :' : Debian Developer - glaub...@debian.org `. `' Freie Universitaet Berlin - glaub...@physik.fu-berlin.de `-GPG: 62FF 8A75 84E0 2956 9546 0006 7426 3B37 F5B5 F913 >From fd837b10f2fb8c48a308c4a3ddba8dd79609418d Mon Sep 17 00:00:00 2001 From: Pino Toscano Date: Sat, 29 Dec 2012 18:34:12 +0100 Subject: [PATCH 1/6] - switch the libpng12-dev build dependency to libpng-dev - add the libpoppler-private-dev build dependency --- debian/control |3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/debian/control b/debian/control index f54b02e..50990b7 100644 --- a/debian/control +++ b/debian/control @@ -22,7 +22,8 @@ Build-Depends: autoconf, liblcms1-dev, libmagick++-dev, libpango1.0-dev, - libpng12-dev, + libpng-dev, + libpoppler-private-dev, libpoppler-glib-dev, libpopt-dev, libsigc++-2.0-dev (>= 2.0.16-2), -- 1.7.10.4 >From 0cc17c45fbfd0ca198d61f86a49e082f2499eaa2 Mon Sep 17 00:00:00 2001 From: Pino Toscano Date: Sat, 29 Dec 2012 19:00:14 +0100 Subject: [PATCH 2/6] Update Debian changelog for 0.48.3.1-1.1. --- debian/changelog |8 1 file changed, 8 insertions(+) diff --git a/debian/changelog b/debian/changelog index 4f92cf4..d1fdf41 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,11 @@ +inkscape (0.48.3.1-1.1) unstable; urgency=low + + * Non-maintainer upload. + * Switch the libpng12-dev build dependency to libpng-dev (closes: #662378) + * Add the libpoppler-private-dev build dependency (closes: #660987) + + -- Pino Toscano Fri, 15 Jun 2012 16:40:22 +0200 + inkscape (0.48.3.1-1) unstable; urgency=low * [cb1a6e2] delete 01-libwpg0.2.dpatch since proper patch appied upstream -- 1.7.10.4 >From f74d957bdac1a39e62d2e12bc8dfd1e191afedaa Mon Sep 17 00:00:00 2001 From: John Paul Adrian Glaubitz Date: Sat, 29 Dec 2012 19:04:14 +0100 Subject: [PATCH 3/6] Add Debian patch to fix vulnerability CVE-2012-5656. --- debian/patches/03-CVE-2012-5656.diff | 75 ++ debian/patches/series|1 + 2 files changed, 76 insertions(+) create mode 100644 debian/patches/03-CVE-2012-5656.diff diff --git a/debian/patches/03-CVE-2012-5656.diff b/debian/patches/03-CVE-2012-5656.diff new file mode 100644 index 000..c787ed4 --- /dev/null +++ b/debian/patches/03-CVE-2012-5656.diff @@ -0,0 +1,75 @@ +From eaa98e6b71d66195f0ca76358b85cca64d611fd9 Mon Sep 17 00:00:00 2001 +From: John Paul Adrian Glaubitz +Date: Sun, 23 Dec 2012 18:22:16 +0100 +Subject: [PATCH] Apply changes from upstream svn commit 11931 to fix + CVE-2012-5656. + +--- + src/preferences-skeleton.h|4 + src/ui/dialog/ocaldialogs.cpp | 10 -- + src/xml/repr-io.cpp |8 +++- + 3 files changed, 19 insertions(+), 3 deletions(-) + +diff --git a/src/preferences-skeleton.h b/src/preferences-skeleton.h +index 32f4b7c..e4dd2c8 100644 +--- a/src/preferences-skeleton.h b/src/preferences-skeleton.h +@@ -315,6 +315,10 @@ static char const preferences_skeleton[] = + " clips=\"16711935\"" // 00ff00ff + " masks=\"65535\"/>\n" // 0x + "\n" ++"\n" ++" \n" ++"\n" + "\n" + "\n" + "\n" +diff --git a/src/ui/dialog/ocaldialogs.cpp b/src/ui/dialog/ocaldialogs.cpp +index 2ae7d69..63c56f7 100644 +--- a/src/ui/dialog/ocaldialogs.cpp b/src/ui/dialog/ocaldialogs.cpp +@@ -468,9 +468,14 @@ void FileImportFromOCALDialog::searchTagEntryChangedCallback() + xmlDoc *doc = NULL; + xmlNode *root_element = NULL; + ++int parse_options = XML_PARSE_RECOVER + XML_PARSE_NOWARNING + XML_PARSE_NOERROR; // do not use XML_PARSE_NO
Bug#685625: libgeom: may cause segfault of grub-probe
On 29/12/12 16:47, Steven Chamberlain wrote: > I can provide a similar patch for freebsd-utils which has the same > issues, but the only problem I could confirm yet was a segfault in > ifconfig bridge configuration (#696514) due to it. Attached is a similar patch for freebsd-utils, fixing implicit declarations that are due to libbsd no longer being used. Should we apply it? The warnings are potentially serious, but I don't know of any specific bugs that this will fix. (#696514 turned out not to be due to these). Regards, -- Steven Chamberlain ste...@pyro.eu.org Index: freebsd-utils-9.0+ds1/usr.sbin/mountd/mountd.c === --- freebsd-utils-9.0+ds1.orig/usr.sbin/mountd/mountd.c 2012-12-29 19:56:58.0 + +++ freebsd-utils-9.0+ds1/usr.sbin/mountd/mountd.c 2012-12-29 20:05:01.478673213 + @@ -80,6 +80,8 @@ #include #include #include +#include + #include "pathnames.h" #include "mntopts.h" Index: freebsd-utils-9.0+ds1/usr.sbin/vidcontrol/vidcontrol.c === --- freebsd-utils-9.0+ds1.orig/usr.sbin/vidcontrol/vidcontrol.c 2010-03-29 21:12:44.0 +0100 +++ freebsd-utils-9.0+ds1/usr.sbin/vidcontrol/vidcontrol.c 2012-12-29 20:05:04.610607859 + @@ -48,6 +48,8 @@ #include #include #include +#include + #include "path.h" #include "decode.h" Index: freebsd-utils-9.0+ds1/usr.sbin/ppp/defs.c === --- freebsd-utils-9.0+ds1.orig/usr.sbin/ppp/defs.c 2004-09-05 02:46:52.0 +0100 +++ freebsd-utils-9.0+ds1/usr.sbin/ppp/defs.c 2012-12-29 20:00:01.091748618 + @@ -47,6 +47,7 @@ #include #endif #include +#include #if defined(__FreeBSD__) && !defined(NOKLDLOAD) #include "id.h" Index: freebsd-utils-9.0+ds1/usr.sbin/nfsd/nfsd.c === --- freebsd-utils-9.0+ds1.orig/usr.sbin/nfsd/nfsd.c 2012-12-29 19:56:58.0 + +++ freebsd-utils-9.0+ds1/usr.sbin/nfsd/nfsd.c 2012-12-29 20:00:04.194641584 + @@ -71,6 +71,7 @@ #include #include #include +#include /* Global defs */ #ifdef DEBUG Index: freebsd-utils-9.0+ds1/usr.sbin/arp/arp.c === --- freebsd-utils-9.0+ds1.orig/usr.sbin/arp/arp.c 2012-12-29 19:56:58.0 + +++ freebsd-utils-9.0+ds1/usr.sbin/arp/arp.c 2012-12-29 20:00:07.442606898 + @@ -80,6 +80,7 @@ #include #include #include +#include typedef void (action_fn)(struct sockaddr_dl *sdl, struct sockaddr_inarp *s_in, struct rt_msghdr *rtm); Index: freebsd-utils-9.0+ds1/usr.sbin/rpc.lockd/kern.c === --- freebsd-utils-9.0+ds1.orig/usr.sbin/rpc.lockd/kern.c 2012-12-29 19:56:58.0 + +++ freebsd-utils-9.0+ds1/usr.sbin/rpc.lockd/kern.c 2012-12-29 20:00:14.848822213 + @@ -52,6 +52,7 @@ #include #include #include +#include #include #include Index: freebsd-utils-9.0+ds1/usr.sbin/pppctl/pppctl.c === --- freebsd-utils-9.0+ds1.orig/usr.sbin/pppctl/pppctl.c 2004-12-13 14:50:13.0 + +++ freebsd-utils-9.0+ds1/usr.sbin/pppctl/pppctl.c 2012-12-29 20:00:17.754640690 + @@ -48,6 +48,7 @@ #include #include #include +#include #define LINELEN 2048 Index: freebsd-utils-9.0+ds1/usr.bin/kdump/kdump.c === --- freebsd-utils-9.0+ds1.orig/usr.bin/kdump/kdump.c 2012-12-29 19:56:58.0 + +++ freebsd-utils-9.0+ds1/usr.bin/kdump/kdump.c 2012-12-29 20:05:19.540626059 + @@ -83,6 +83,8 @@ #include #include #include +#include + #include "ktrace.h" #include "kdump_subr.h" Index: freebsd-utils-9.0+ds1/sbin/geom/core/geom.c === --- freebsd-utils-9.0+ds1.orig/sbin/geom/core/geom.c 2011-03-24 19:11:05.0 + +++ freebsd-utils-9.0+ds1/sbin/geom/core/geom.c 2012-12-29 20:06:16.428605677 + @@ -46,6 +46,8 @@ #include #include #include +#include + #include #include Index: freebsd-utils-9.0+ds1/sbin/geom/class/eli/geom_eli.c === --- freebsd-utils-9.0+ds1.orig/sbin/geom/class/eli/geom_eli.c 2010-11-22 20:10:48.0 + +++ freebsd-utils-9.0+ds1/sbin/geom/class/eli/geom_eli.c 2012-12-29 20:00:30.210625738 + @@ -43,6 +43,7 @@ #include #include #include +#include #include #include Index: freebsd-utils-9.0+ds1/sbin/geom/class/stripe/geom_stripe.c === --- freebsd-utils-9.0+ds1.orig/sbin/geom/class/stripe/geom_stripe.c 2010-10-09 21:20:27.0 +0100 +++ freebsd-utils-9.0+ds1/sbin/geom/class/stripe/geom_stripe.c 2012-12-29 20:02:33.016673155 + @@ -36,6 +36,8 @@ #incl
Processed: Re: Bug#696514: freebsd-net-tools: /sbin/ifconfig: segfaults getting bridge status
Processing control commands: > tags -1 + patch Bug #696514 [freebsd-net-tools] freebsd-net-tools: /sbin/ifconfig: segfaults getting bridge status Added tag(s) patch. > unblock -1 by 685625 Bug #696514 [freebsd-net-tools] freebsd-net-tools: /sbin/ifconfig: segfaults getting bridge status 696514 was blocked by: 685625 696514 was not blocking any bugs. Removed blocking bug(s) of 696514: 685625 -- 696514: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696514 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#694908: [Debian-med-packaging] Bug#694908: Contains non-free data
- Ursprüngliche Nachricht - Von: Julien Cristau Gesendet: 29.12.12 18:46 Uhr An: Charles Plessy, 694...@bugs.debian.org Betreff: [Debian-med-packaging] Bug#694908: Contains non-free data On Sun, Dec 2, 2012 at 09:39:14 +0900, Charles Plessy wrote: > Package: emboss > Version: 6.4.0-4 > Severity: serious > > As discussed in the following message, EMBOSS contains non-free data. > > https://lists.debian.org/20120918045219.ga26...@falafel.plessy.net > > We need to consider short- and long-term solutions to this problem. For the > short-term solution, I think that I will not have time to split free and > non-free parts of EMBOSS, so we need again to consider to move it altogether to > non-free. In contrary to the UniProt files which were in the test suite, the > Gene Ontology files are needed by EMBOSS to run some of its programs. > Does that mean emboss and embassy-* need to be removed from wheezy? The GO license I read as "scientific integrity". Yes, as a consequence you cannot modify the database at will or it is not GO any more and you cite it where you use it. IIRC some two GO terms or so I had at some point suggested myself, so changes _can_ be made and one is even helped to get it done consistently. For other views on the world, have all the freedom of the world to start your own ontologies, and many are doing so. In my mind, having it all shipping together is just fine enough for Wheezy. A hard core alternative would be to substitute it with a mockup GO with the only entries explaining how to install the real thing. One could also just remove the database and see a few tools fail. To me, it is a small side issue and I suggest to demote the bug from Serious to Wishlist. Steffen
Processed: Re: live-installer: installer doesn't write /etc/crypttab for crypt+LVM
Processing commands for cont...@bugs.debian.org: > tag 646704 - confirmed Bug #646704 [live-installer] live-installer: installer doesn't write /etc/crypttab for crypt+LVM Removed tag(s) confirmed. > thanks Stopping processing here. Please contact me if you need assistance. -- 646704: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646704 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#646704: live-installer: installer doesn't write /etc/crypttab for crypt+LVM
tag 646704 - confirmed thanks usage of the tag 'confirmed' is reserved for the maintainer to indicate that he could reproduce it, not users (re)reporting it. -- Address:Daniel Baumann, Donnerbuehlweg 3, CH-3012 Bern Email: daniel.baum...@progress-technologies.net Internet: http://people.progress-technologies.net/~daniel.baumann/ -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#646704: Bug severity is too high
Processing commands for cont...@bugs.debian.org: > severity 646704 serious Bug #646704 [live-installer] live-installer: installer doesn't write /etc/crypttab for crypt+LVM Severity set to 'serious' from 'important' > thanks Stopping processing here. Please contact me if you need assistance. -- 646704: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646704 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#696947: biojava3-live: FTBFS without Internet access
Package: biojava3-live Version: 3.0.5-1 Severity: serious Tags: upstream Justification: fails to build from source (but built successfully in the past) biojava3-live fails to build without Internet access. One of the tests fails: test: [junit] Running org.biojava3.ronn.JronnTest [junit] Testsuite: org.biojava3.ronn.JronnTest [junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 2.203 sec [junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 2.203 sec [junit] [junit] Testcase: verifyRanges took 2.192 sec [junit] Running org.biojava3.ronn.NonstandardProteinCompoundTest [junit] Testsuite: org.biojava3.ronn.NonstandardProteinCompoundTest [junit] Tests run: 1, Failures: 1, Errors: 0, Time elapsed: 0.042 sec [junit] Tests run: 1, Failures: 1, Errors: 0, Time elapsed: 0.042 sec [junit] - Standard Error - [junit] Dec 06, 2012 5:15:54 PM org.biojava3.core.sequence.loader.UniprotProxySequenceReader getUniprotXML [junit] INFO: Loading http://www.uniprot.org/uniprot/?query=O30642&format=xml [junit] java.net.UnknownHostException: www.uniprot.org [junit] at java.net.AbstractPlainSocketImpl.connect(AbstractPlainSocketImpl.java:178) [...] Build logs can be found at https://launchpad.net/ubuntu/+source/biojava3-live/3.0.5-1 -- System Information: Debian Release: wheezy/sid APT prefers quantal-updates APT policy: (500, 'quantal-updates'), (500, 'quantal-security'), (500, 'quantal-proposed'), (500, 'quantal'), (100, 'quantal-backports') Architecture: i386 (i686) Kernel: Linux 3.5.0-21-generic (SMP w/2 CPU cores) Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#696903: [1.83->1.84 regression]: GRUB won't install to a character device
Control: tags -1 + patch Allow installing GRUB to a character device, as on GNU/kFreeBSD diff --git a/grub-installer b/grub-installer index 5d9fd77..6e2c7fc 100755 --- a/grub-installer +++ b/grub-installer @@ -651,9 +651,9 @@ if [ -z "$frdisk" ]; then # Install grub on each space separated disk in the list bootdevs="$bootdev" for bootdev in $bootdevs; do # workaround for #681227 - if [ ! -b $bootdev -a $bootdev != dummy ]; then + if [ ! -b $bootdev -a ! -c $bootdev -a $bootdev != dummy ]; then continue fi grub_install_params= if ! is_floppy "$bootdev"; then Or instead - make the logical IMHO clearer, and while here, wrap $bootdev in quotes to be paranoid: diff --git a/grub-installer b/grub-installer index 5d9fd77..552c9bc 100755 --- a/grub-installer +++ b/grub-installer @@ -651,9 +651,9 @@ if [ -z "$frdisk" ]; then # Install grub on each space separated disk in the list bootdevs="$bootdev" for bootdev in $bootdevs; do # workaround for #681227 - if [ ! -b $bootdev -a $bootdev != dummy ]; then + if ! [ "$bootdev" = dummy -o -b "$bootdev" -o -c "$bootdev" ]; then continue fi grub_install_params= if ! is_floppy "$bootdev"; then Thanks, Regards, -- Steven Chamberlain ste...@pyro.eu.org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#696903: [1.83->1.84 regression]: GRUB won't install to a character device
Processing control commands: > tags -1 + patch Bug #696903 [grub-installer] [1.83->1.84 regression]: GRUB won't install to a character device Added tag(s) patch. -- 696903: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696903 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#696895: marked as done (mosquitto: Topic access can be incorrectly granted to all clients)
Your message dated Sat, 29 Dec 2012 18:47:38 + with message-id and subject line Bug#696895: fixed in mosquitto 0.15-2 has caused the Debian Bug report #696895, regarding mosquitto: Topic access can be incorrectly granted to all clients to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 696895: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696895 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: mosquitto Version: 0.15-1 Severity: grave Tags: upstream security Justification: user security hole When the acl_file option is in use to specify topic access control, if only pattern access is used then all clients can obtain access regardless of the ACL restrictions. This allows MQTT clients to access data that they shouldn't, but does not affect security of the system. -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 3.5.0-19-generic (SMP w/4 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Versions of packages mosquitto depends on: ii adduser 3.113+nmu3 ii libc6 2.13-37 ii libwrap0 7.6.q-24 ii lsb-base 4.1+Debian9 mosquitto recommends no packages. mosquitto suggests no packages. -- no debconf information --- End Message --- --- Begin Message --- Source: mosquitto Source-Version: 0.15-2 We believe that the bug you reported is fixed in the latest version of mosquitto, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 696...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Roger A. Light (supplier of updated mosquitto package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 28 Dec 2012 22:55:03 + Source: mosquitto Binary: mosquitto libmosquitto0 libmosquitto0-dev libmosquittopp0 libmosquittopp0-dev mosquitto-clients python-mosquitto Architecture: source amd64 all Version: 0.15-2 Distribution: unstable Urgency: low Maintainer: Roger A. Light Changed-By: Roger A. Light Description: libmosquitto0 - MQTT version 3.1 client library libmosquitto0-dev - MQTT version 3.1 client library, development files libmosquittopp0 - MQTT version 3.1 client C++ library libmosquittopp0-dev - MQTT version 3.1 client C++ library, development files mosquitto - MQTT version 3.1 compatible message broker mosquitto-clients - Mosquitto command line MQTT clients python-mosquitto - MQTT version 3.1 client library, python bindings Closes: 696889 696891 696895 Changes: mosquitto (0.15-2) unstable; urgency=low . * Fix broker crash when a client connects with a bad protocol version. (Closes: #696889) * Fix the possibility of topic access being granted when only acl_patterns is in use. (Closes: #696895) * Fix persistence option reloading. (Closes: #696891) Checksums-Sha1: 189b473bc76b94146fd3af676a8fc1351e33f4aa mosquitto_0.15-2.dsc 06056fda01fe697dd5cc45b166b02cb7a9c6f02b 7237 mosquitto_0.15-2.debian.tar.gz 5e8744a81e18a73f353ca3a54e502ef5788620e0 68096 mosquitto_0.15-2_amd64.deb 0cb4330945f839e4205629307ac61a8f2d1e8ea7 25452 libmosquitto0_0.15-2_amd64.deb d804f9bdb44c79aaae2ad960e2f98aac72cbe2c5 20136 libmosquitto0-dev_0.15-2_all.deb ffe3222a7d56757d1cf66d8b405cd846ed5ce1cf 15892 libmosquittopp0_0.15-2_amd64.deb 899dcff293f6a39ece92b884ea2953e7c646f2bd 12378 libmosquittopp0-dev_0.15-2_all.deb 336757d4eb70da0e60063f2ec58ee3ad691342b9 27928 mosquitto-clients_0.15-2_amd64.deb c7fe9fc12642e5034ed60c482d411632e48d1aed 17982 python-mosquitto_0.15-2_all.deb Checksums-Sha256: a7a820b7866cf3628c2abab1a3a9d63e3d39dc5c81f463c1a3e5081194b3ddba mosquitto_0.15-2.dsc 640681cc0c53ea58be4427257a01939ab3b60f52860a3368d3fd9c6ff991 7237 mosquitto_0.15-2.debian.tar.gz 0e57f9dc95ece1f186359595253b9f0e2479deaa261dfd28fbb2cdba3e7f075c 68096 mosquitto_0.15-2_amd64.deb 6e4a80e8b1281ce241c301fd05838e3f2511fda44ed590be390bba21142e1fde 25452 libmosquitto0_0.15-2_amd64.deb cc706da3ec11dee7ea094491e6f97493ed7439b41ce3395e04e65abad9a7cda4 20136 libmosquitto0-dev_0.15-2_all.deb 5c032a206ccd0ea3c1d3437bb0e5c442959a44c6b34dc25eaea3d09de8752
Bug#696891: marked as done (mosquitto: Broker persistence settings are lost if configuration is reloaded)
Your message dated Sat, 29 Dec 2012 18:47:38 + with message-id and subject line Bug#696891: fixed in mosquitto 0.15-2 has caused the Debian Bug report #696891, regarding mosquitto: Broker persistence settings are lost if configuration is reloaded to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 696891: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696891 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: mosquitto Version: 0.15-1 Severity: grave Tags: upstream Justification: causes non-serious data loss Sending SIGHUP to the broker causes the configuration to be reloaded. If the persistence_file or persistence_location options are used they are not reloaded on SIGHUP and set to NULL. This means that persistence is effectively disabled after a reload and so persistence data will be lost. -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 3.5.0-19-generic (SMP w/4 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Versions of packages mosquitto depends on: ii adduser 3.113+nmu3 ii libc6 2.13-37 ii libwrap0 7.6.q-24 ii lsb-base 4.1+Debian9 mosquitto recommends no packages. mosquitto suggests no packages. -- no debconf information --- End Message --- --- Begin Message --- Source: mosquitto Source-Version: 0.15-2 We believe that the bug you reported is fixed in the latest version of mosquitto, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 696...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Roger A. Light (supplier of updated mosquitto package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 28 Dec 2012 22:55:03 + Source: mosquitto Binary: mosquitto libmosquitto0 libmosquitto0-dev libmosquittopp0 libmosquittopp0-dev mosquitto-clients python-mosquitto Architecture: source amd64 all Version: 0.15-2 Distribution: unstable Urgency: low Maintainer: Roger A. Light Changed-By: Roger A. Light Description: libmosquitto0 - MQTT version 3.1 client library libmosquitto0-dev - MQTT version 3.1 client library, development files libmosquittopp0 - MQTT version 3.1 client C++ library libmosquittopp0-dev - MQTT version 3.1 client C++ library, development files mosquitto - MQTT version 3.1 compatible message broker mosquitto-clients - Mosquitto command line MQTT clients python-mosquitto - MQTT version 3.1 client library, python bindings Closes: 696889 696891 696895 Changes: mosquitto (0.15-2) unstable; urgency=low . * Fix broker crash when a client connects with a bad protocol version. (Closes: #696889) * Fix the possibility of topic access being granted when only acl_patterns is in use. (Closes: #696895) * Fix persistence option reloading. (Closes: #696891) Checksums-Sha1: 189b473bc76b94146fd3af676a8fc1351e33f4aa mosquitto_0.15-2.dsc 06056fda01fe697dd5cc45b166b02cb7a9c6f02b 7237 mosquitto_0.15-2.debian.tar.gz 5e8744a81e18a73f353ca3a54e502ef5788620e0 68096 mosquitto_0.15-2_amd64.deb 0cb4330945f839e4205629307ac61a8f2d1e8ea7 25452 libmosquitto0_0.15-2_amd64.deb d804f9bdb44c79aaae2ad960e2f98aac72cbe2c5 20136 libmosquitto0-dev_0.15-2_all.deb ffe3222a7d56757d1cf66d8b405cd846ed5ce1cf 15892 libmosquittopp0_0.15-2_amd64.deb 899dcff293f6a39ece92b884ea2953e7c646f2bd 12378 libmosquittopp0-dev_0.15-2_all.deb 336757d4eb70da0e60063f2ec58ee3ad691342b9 27928 mosquitto-clients_0.15-2_amd64.deb c7fe9fc12642e5034ed60c482d411632e48d1aed 17982 python-mosquitto_0.15-2_all.deb Checksums-Sha256: a7a820b7866cf3628c2abab1a3a9d63e3d39dc5c81f463c1a3e5081194b3ddba mosquitto_0.15-2.dsc 640681cc0c53ea58be4427257a01939ab3b60f52860a3368d3fd9c6ff991 7237 mosquitto_0.15-2.debian.tar.gz 0e57f9dc95ece1f186359595253b9f0e2479deaa261dfd28fbb2cdba3e7f075c 68096 mosquitto_0.15-2_amd64.deb 6e4a80e8b1281ce241c301fd05838e3f2511fda44ed590be390bba21142e1fde 25452 libmosquitto0_0.15-2_amd64.deb cc706da3ec11dee7ea094491e6f97493ed7439b41ce3395e04e65abad9a7cda4 20136 libmosquitto0-dev_0.15-2_all.deb 5c032a206ccd0ea3c1d3437bb0e5c44295
Bug#696889: marked as done (mosquitto: Mosquitto crashes using bad version of protocol)
Your message dated Sat, 29 Dec 2012 18:47:38 + with message-id and subject line Bug#696889: fixed in mosquitto 0.15-2 has caused the Debian Bug report #696889, regarding mosquitto: Mosquitto crashes using bad version of protocol to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 696889: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696889 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: mosquitto Version: 0.15-1 Severity: grave Tags: upstream Justification: causes non-serious data loss If a client connects to the broker with an incorrect protocol version (i.e. not 3) then the broker will crash. The cause is a double free(), so there is no chance of a buffer overrun or similar vulnerability. This bug allows any client to perform a simple DoS on the broker and will result in other clients losing messages. -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 3.5.0-19-generic (SMP w/4 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Versions of packages mosquitto depends on: ii adduser 3.113+nmu3 ii libc6 2.13-37 ii libwrap0 7.6.q-24 ii lsb-base 4.1+Debian9 mosquitto recommends no packages. mosquitto suggests no packages. -- no debconf information --- End Message --- --- Begin Message --- Source: mosquitto Source-Version: 0.15-2 We believe that the bug you reported is fixed in the latest version of mosquitto, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 696...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Roger A. Light (supplier of updated mosquitto package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 28 Dec 2012 22:55:03 + Source: mosquitto Binary: mosquitto libmosquitto0 libmosquitto0-dev libmosquittopp0 libmosquittopp0-dev mosquitto-clients python-mosquitto Architecture: source amd64 all Version: 0.15-2 Distribution: unstable Urgency: low Maintainer: Roger A. Light Changed-By: Roger A. Light Description: libmosquitto0 - MQTT version 3.1 client library libmosquitto0-dev - MQTT version 3.1 client library, development files libmosquittopp0 - MQTT version 3.1 client C++ library libmosquittopp0-dev - MQTT version 3.1 client C++ library, development files mosquitto - MQTT version 3.1 compatible message broker mosquitto-clients - Mosquitto command line MQTT clients python-mosquitto - MQTT version 3.1 client library, python bindings Closes: 696889 696891 696895 Changes: mosquitto (0.15-2) unstable; urgency=low . * Fix broker crash when a client connects with a bad protocol version. (Closes: #696889) * Fix the possibility of topic access being granted when only acl_patterns is in use. (Closes: #696895) * Fix persistence option reloading. (Closes: #696891) Checksums-Sha1: 189b473bc76b94146fd3af676a8fc1351e33f4aa mosquitto_0.15-2.dsc 06056fda01fe697dd5cc45b166b02cb7a9c6f02b 7237 mosquitto_0.15-2.debian.tar.gz 5e8744a81e18a73f353ca3a54e502ef5788620e0 68096 mosquitto_0.15-2_amd64.deb 0cb4330945f839e4205629307ac61a8f2d1e8ea7 25452 libmosquitto0_0.15-2_amd64.deb d804f9bdb44c79aaae2ad960e2f98aac72cbe2c5 20136 libmosquitto0-dev_0.15-2_all.deb ffe3222a7d56757d1cf66d8b405cd846ed5ce1cf 15892 libmosquittopp0_0.15-2_amd64.deb 899dcff293f6a39ece92b884ea2953e7c646f2bd 12378 libmosquittopp0-dev_0.15-2_all.deb 336757d4eb70da0e60063f2ec58ee3ad691342b9 27928 mosquitto-clients_0.15-2_amd64.deb c7fe9fc12642e5034ed60c482d411632e48d1aed 17982 python-mosquitto_0.15-2_all.deb Checksums-Sha256: a7a820b7866cf3628c2abab1a3a9d63e3d39dc5c81f463c1a3e5081194b3ddba mosquitto_0.15-2.dsc 640681cc0c53ea58be4427257a01939ab3b60f52860a3368d3fd9c6ff991 7237 mosquitto_0.15-2.debian.tar.gz 0e57f9dc95ece1f186359595253b9f0e2479deaa261dfd28fbb2cdba3e7f075c 68096 mosquitto_0.15-2_amd64.deb 6e4a80e8b1281ce241c301fd05838e3f2511fda44ed590be390bba21142e1fde 25452 libmosquitto0_0.15-2_amd64.deb cc706da3ec11dee7ea094491e6f97493ed7439b41ce3395e04e65abad9a7cda4 20136 libmosquitto0-dev_0.15-2_all.deb 5c032a206ccd0ea3c1
Processed: Retitling this bug....and pushing for the solution
Processing commands for cont...@bugs.debian.org: > retitle 681654 kstars-data-extra-tycho2: should be moved to non-free Bug #681654 [kstars-data-extra-tycho2] kstars-data-extra-tycho2: undistributable Changed Bug title to 'kstars-data-extra-tycho2: should be moved to non-free' from 'kstars-data-extra-tycho2: undistributable' > thanks Stopping processing here. Please contact me if you need assistance. -- 681654: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681654 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#681654: Retitling this bug....and pushing for the solution
retitle 681654 kstars-data-extra-tycho2: should be moved to non-free thanks After reading this bug log, I'm convinced that the only remaining issue is the failure to comply with DFSG #6. As a consequence, the solution is obvious : this package should be moved to non-free. I'm ready to help in uploading a package fixing this. Please CC me to answers. -- signature.asc Description: Digital signature
Processed: tagging 696179
Processing commands for cont...@bugs.debian.org: > tag 696179 + squeeze Bug #696179 {Done: Thorsten Glaser } [mediawiki-extensions-base] mediawiki-extensions-base: RSS_Reader Javascript injection Added tag(s) squeeze. > thanks Stopping processing here. Please contact me if you need assistance. -- 696179: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696179 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: [1.83->1.84 regression]: GRUB won't install to a dummy device
Processing control commands: > block 681227 by -1 Bug #681227 [grub-installer] installation-reports: grub-install tries to install to a nonsense string 681227 was blocked by: 696903 681227 was not blocking any bugs. Added blocking bug(s) of 681227: 696942 -- 681227: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681227 696942: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696942 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#696942: [1.83->1.84 regression]: GRUB won't install to a dummy device
Package: grub-installer Version: 1.84 Severity: grave Tags: d-i X-Debbugs-Cc: paj...@gmail.com Control: block 681227 by -1 Hello, On 29/12/12 10:39, alberto fuentes wrote: > Dec 29 00:41:32 grub-installer: info: Installing grub on 'dummy' > Dec 29 00:41:32 grub-installer: error: no boot device found to install to That is new a problem affecting at least grub-efi and grub-yeeloong and was fixed in Git but I think we need a bug number for it now: http://lists.debian.org/debian-boot/2012/12/msg00463.html http://anonscm.debian.org/gitweb/?p=d-i/grub-installer.git;a=commitdiff;h=99389d59fc539c399e147eb74acedfce04da011f Does it matter that $bootdev is not in quotes? Every other use of it in the script is quoted. It can't contain spaces at least: > --- a/grub-installer > +++ b/grub-installer > @@ -651,7 +651,7 @@ if [ -z "$frdisk" ]; then > # Install grub on each space separated disk in the list > bootdevs="$bootdev" > for bootdev in $bootdevs; do > # workaround for #681227 > - if [ ! -b $bootdev ]; then > + if [ ! -b $bootdev -a $bootdev != dummy ]; then > continue > fi Regards, -- Steven Chamberlain ste...@pyro.eu.org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#680404: marked as done (fails to build comedilib documentation on mips (java.lang.IllegalArgumentException))
Your message dated Sat, 29 Dec 2012 19:18:06 +0100 with message-id <20121229181806.gv6...@mykerinos.kheops.frmug.org> and subject line Closing "fixed" bug report has caused the Debian Bug report #680404, regarding fails to build comedilib documentation on mips (java.lang.IllegalArgumentException) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 680404: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680404 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: fop Version: 1:1.0.dfsg2-6 Severity: serious Justification: fails to build from source It might be reincarnation of #580333 which was supposedly fixed. Now, comedilib documentation fails to build on mips (only): https://buildd.debian.org/status/fetch.php?pkg=comedilib&arch=mips&ver=0.10.0-2&stamp=1340692713 ,--- | Making portrait pages on a4 paper (210mmx297mm) | Element include in namespace 'http://www.w3.org/2001/XInclude' encountered in programlisting, but no template matches. | [warning] /usr/bin/fop: Unable to locate servlet-api in /usr/share/java | Exception | java.lang.IllegalArgumentException: Invalid profile data | | /tmp/xmlto.riHbLT | make[4]: Entering directory `/build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/doc' | make[4]: Nothing to be done for `install-exec-am'. | /bin/mkdir -p /build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/debian/tmp/usr/share/doc/comedilib/html | chmod u+w /build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/debian/tmp/usr/share/doc/comedilib/html | for each in ./doc_html/*.html ./*.gif ./*.css; do \ | /usr/bin/install -c -m 644 $each /build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/debian/tmp/usr/share/doc/comedilib/html ; done | /bin/mkdir -p -m 755 /build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/debian/tmp/usr/share/man/man3 | chmod u+w /build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/debian/tmp/usr/share/man/man3 | for each in `find ./man/ -name '*.3'`; do /usr/bin/install -c -m 644 $each /build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/debian/tmp/usr/share/man/man3 ; done | /usr/bin/xmlto -o ./pdf --skip-validation --with-fop pdf ./comedilib.xml | warning: failed to load external entity "/build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/demo/tut3_part.c" | /build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/doc/tutorial.xml:234: element include: XInclude error : could not load /build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/demo/tut3_part.c, and no fallback was found | Making portrait pages on a4 paper (210mmx297mm) | Element include in namespace 'http://www.w3.org/2001/XInclude' encountered in programlisting, but no template matches. | [warning] /usr/bin/fop: Unable to locate servlet-api in /usr/share/java | Exception | java.lang.IllegalArgumentException: Invalid profile data | | /tmp/xmlto.Hjq8u3 | /bin/mkdir -p '/build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/debian/tmp/usr/share/doc/comedilib' | /usr/bin/install -c -m 644 ././pdf/comedilib.pdf '/build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/debian/tmp/usr/share/doc/comedilib' | /usr/bin/install: cannot stat `././pdf/comedilib.pdf': No such file or directory | make[4]: *** [install-dist_pdfDATA] Error 1 | make[4]: Leaving directory `/build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/doc' | make[3]: *** [install-am] Error 2 `--- -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (900, 'testing'), (600, 'unstable'), (300, 'experimental'), (100, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 3.1.0-1-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages fop depends on: ii default-jre-headless [java2-runtime-headless]1:1.6-47 ii gcj-4.6-jre-headless [java2-runtime-headless]4.6.3-1 ii gcj-jre-headless [java2-runtime-headless]4:4.6.1-2 ii gij-4.3 [java2-runtime-headless] 4.3.4-1 ii libfop-java 1:1.0.dfsg2-6 ii openjdk-6-jre-headless [java2-runtime-headless] 6b24-1.11.3-2 ii sun-java5-jre [java2-runtime-headless] 1.5.0-20-1 ii sun-java6-jre [java2-runtime-headless] 6.26-3 Versions of packages fop recommends: ii libsaxon-java 1:6.5.5-7 Versions of packages fop suggests: pn fop-doc ii libservlet2.5-java 6.0.32-5 -- no debconf information --- End Message --- --- Begin Message --- Version:
Processed: Lowering bug severity
Processing commands for cont...@bugs.debian.org: > severity 679917 important Bug #679917 [korganizer] korganizer: cannot add ics calendar files Severity set to 'important' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 679917: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=679917 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#679917: Lowering bug severity
severity 679917 important thanks As there is a workaround for this bug (see bug log) and also because the bug maybe didn't deserve an RC severity from the beginning, I'm hereby downgrading this severity. -- signature.asc Description: Digital signature
Bug#696939: can't create jabber accounts
Package: gnome-online-accounts Version: 3.4.2-1 Severity: serious Click system properties and then "Online Accounts" Click to add an account The only account types supported are Windows Live, Google and Facebook It appears that open standards based account types like Jabber are not supported in a default installation. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#669918: marked as done (kmail crashes when sending an email)
Your message dated Sat, 29 Dec 2012 19:08:39 +0100 with message-id <20121229180839.gt6...@mykerinos.kheops.frmug.org> and subject line Closing bug from bug submitter's comments has caused the Debian Bug report #669918, regarding kmail crashes when sending an email to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 669918: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669918 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: kmail Version: 4:4.4.11.1+l10n-1 Severity: grave Tags: upstream Justification: renders package unusable Kmail crashes ( or more freezes) when hitting sent. +#kmail(5462) KMFolderImap::setImapPath: ignoring empty path kmail(5462) KMFolderImap::setImapPath: ignoring empty path kmail(5462)/kdeui (kdelibs): Attempt to use QAction "" with KXMLGUIFactory! kmail(5462)/kdeui (kdelibs): Attempt to use QAction "" with KXMLGUIFactory! Enchant dict for "de" 0x96c25b0 kmail(5462) KMFolderImap::setImapPath: ignoring empty path kmail(5462) KMFolderIndex::updateIndexStreamPtr: utime( "/home/claw/.kde/share/apps/kmail/imap/.1712157522.directory/.debian- list.directory/.vote.index.ids" , 0) failed (KMMsgDict::getFolderIdsLocation( *this )) kmail(5462) KMFolderIndex::updateIndexStreamPtr: utime( "/home/claw/.kde/share/apps/kmail/imap/.1712157522.directory/.debian- list.directory/.vote.index.ids" , 0) failed (KMMsgDict::getFolderIdsLocation( *this )) kmail(5462) KMFolderImap::setImapPath: ignoring empty path kmail(5462)/libakonadi Akonadi::SessionPrivate::socketError: Socket error occurred: "QLocalSocket::connectToServer: Invalid name" kmail(5462)/kio (KDirWatch) KDirWatchPrivate::removeEntry: doesn't know "/home/claw/.kde/share/apps/kabc" Enchant dict for "de" 0x98cb47 # THIS IS WHERE I HIT SENT I am able to read all my emails and i dont have any modifications made to kmail (also tried sending emails without pgp signature but did not solve the problem) The output is not really reliable so please tell me how to produce better output. Thanks for your help -- System Information: Debian Release: wheezy/sid APT prefers testing-proposed-updates APT policy: (500, 'testing-proposed-updates'), (500, 'testing') Architecture: i386 (i686) Kernel: Linux 3.2.0-2-686-pae (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages kmail depends on: ii kdebase-runtime 4:4.7.4-2 ii kdepim-runtime 4:4.4.11.1-3 ii kdepimlibs-kio-plugins 4:4.7.4-2+b1 ii libakonadi-contact4 4:4.7.4-2+b1 ii libakonadi-kde4 4:4.7.4-2+b1 ii libc6 2.13-27 ii libgcc1 1:4.7.0-1 ii libgpgme++2 4:4.7.4-2+b1 ii libkabc44:4.7.4-2+b1 ii libkcal44:4.7.4-2+b1 ii libkcmutils44:4.7.4-4 ii libkde3support4 4:4.7.4-4 ii libkdecore5 4:4.7.4-4 ii libkdepim4 4:4.4.11.1+l10n-1 ii libkdeui5 4:4.7.4-4 ii libkhtml5 4:4.7.4-4 ii libkimap4 4:4.7.4-2+b1 ii libkio5 4:4.7.4-4 ii libkldap4 4:4.7.4-2+b1 ii libkleo44:4.4.11.1+l10n-1 ii libkmime4 4:4.7.4-2+b1 ii libknotifyconfig4 4:4.7.4-4 ii libkontactinterface44:4.7.4-2+b1 ii libkparts4 4:4.7.4-4 ii libkpgp44:4.4.11.1+l10n-1 ii libkpimidentities4 4:4.7.4-2+b1 ii libkpimtextedit44:4.7.4-2+b1 ii libkpimutils4 4:4.7.4-2+b1 ii libkresources4 4:4.7.4-2+b1 ii libksieve4 4:4.4.11.1+l10n-1 ii libktnef4 4:4.7.4-2+b1 ii libmailtransport4 4:4.7.4-2+b1 ii libmessagecore4 4:4.4.11.1+l10n-1 ii libmessagelist4 4:4.4.11.1+l10n-1 ii libmimelib4 4:4.4.11.1+l10n-1 ii libnepomuk4 4:4.7.4-4 ii libphonon4 4:4.6.0.0-1 ii libqt4-dbus 4:4.7.4-2 ii libqt4-network 4:4.7.4-2 ii libqt4-qt3support 4:4.7.4-2 ii libqt4-xml 4:4.7.4-2 ii libqtcore4 4:4.7.4-2 ii libqtgui4 4:4.7.4-2 ii libstdc++6 4.7.0-1 ii libthreadweaver44:4.7.4-4 ii perl5.14.2-9 ii phonon 4:4.6.0.0-1 Versions of packages kmail recommends: ii gnupg-agent 2.0.19-1 ii gnupg22.0.19-1 ii pinentry-gtk2 [pinentry-x11] 0.8.1-1 Versions of packages kmail suggests: ii bogofilter 1.2.2+dfsg1-1+b1 ii clamav | f-prot-installer ii kaddressbook
Bug#696446: nmap: Errors out at startup if running as root and there is a network interface in monitor mode
* Hilko Bengen: > Fyodor, can you point me to the specific patch that fixed the issue? I found it, never mind. Cheers, -Hilko -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: severity of 696811 is important
Processing commands for cont...@bugs.debian.org: > severity 696811 important Bug #696811 [firmware-b43-installer] b43 wlan0 disappears when on battery Severity set to 'important' from 'serious' > thanks Stopping processing here. Please contact me if you need assistance. -- 696811: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696811 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#696179: [Pkg-mediawiki-devel] Bug#696179: mediawiki-extensions-base: RSS_Reader Javascript injection
On Wed, 26 Dec 2012, Jonathan Wiltshire wrote: > > Hello MITRE people, > Did you hear anything about this yet? Nothing. They are probably on holidays or something. bye, //mirabilos -- «MyISAM tables -will- get corrupted eventually. This is a fact of life. » “mysql is about as much database as ms access” – “MSSQL at least descends from a database” “it's a rebranded SyBase” “MySQL however was born from a flatfile and went downhill from there” – “at least jetDB doesn’t claim to be a database” (#nosec)‣‣‣ Please let MySQL and MariaDB finally die! -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: severity of 696878 is important
Processing commands for cont...@bugs.debian.org: > # there is more to empathy than video calls with jitsi > severity 696878 important Bug #696878 [empathy] Jitsi fails with Empathy on Debian Severity set to 'important' from 'serious' > thanks Stopping processing here. Please contact me if you need assistance. -- 696878: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696878 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#694908: Contains non-free data
On Sun, Dec 2, 2012 at 09:39:14 +0900, Charles Plessy wrote: > Package: emboss > Version: 6.4.0-4 > Severity: serious > > As discussed in the following message, EMBOSS contains non-free data. > > https://lists.debian.org/20120918045219.ga26...@falafel.plessy.net > > We need to consider short- and long-term solutions to this problem. For the > short-term solution, I think that I will not have time to split free and > non-free parts of EMBOSS, so we need again to consider to move it altogether > to > non-free. In contrary to the UniProt files which were in the test suite, the > Gene Ontology files are needed by EMBOSS to run some of its programs. > Does that mean emboss and embassy-* need to be removed from wheezy? Cheers, Julien signature.asc Description: Digital signature
Processed: severity of 476946 is important
Processing commands for cont...@bugs.debian.org: > # non-working preseed might be annoying, but probably not serious, especially > if it's not a regression > severity 476946 important Bug #476946 [dbconfig-common] dbconfig-common does not honor preseeded values, if priority is too low Bug #516562 [dbconfig-common] Cannot find a question for phpmyadmin/dbconfig-install Bug #619362 [dbconfig-common] phpMyAdmin package not using admin-user preseed Bug #625710 [dbconfig-common] phpmyadmin: dbconfig-install is enabled even after I've added "false" in debconf-set-selections Severity set to 'important' from 'serious' Severity set to 'important' from 'serious' Severity set to 'important' from 'serious' Severity set to 'important' from 'serious' > thanks Stopping processing here. Please contact me if you need assistance. -- 476946: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476946 516562: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=516562 619362: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=619362 625710: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=625710 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#696446: nmap: Errors out at startup if running as root and there is a network interface in monitor mode
Processing commands for cont...@bugs.debian.org: > severity 696446 grave Bug #696446 [nmap] nmap: Errors out at startup if running as root and there is a network interface in monitor mode Severity set to 'grave' from 'important' > thank you Stopping processing here. Please contact me if you need assistance. -- 696446: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696446 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#693208: clang unable to link trivial test program on armhf
On Mon, Nov 26, 2012 at 11:40:06 +0100, Sylvestre Ledru wrote: > So, to fix this issue, should I do the following ? > > * ask for a removal of clang 3.1 in unstable > * upload a version 3.0 in unstable with Peter patch > * ask for an exception > I'm not sure what the point of your first step would be. But yes, to fix this issue you need to upload a fix to sid, and then either get that fix migrated or get a fix in to tpu. Why is this so hard? Cheers, Julien signature.asc Description: Digital signature
Bug#685540: asterisk-flite: app_flite fails to load
Control: tag -1 wheezy-ignore On Tue, Aug 21, 2012 at 15:08:42 -0400, Gedalya wrote: > Package: asterisk-flite > Version: 2.1-1 > Severity: grave > > Using asterisk 1:1.8.13.0~dfsg-1+b1 on wheezy. > > asterisk01-noc01*CLI> module load app_flite > Unable to load module app_flite > Command 'module load app_flite' failed. This should be worked around by the 2.1-1.1 rebuild. Leaving the bug open so it can be fixed properly, but marking is as ignored for the wheezy release. Cheers, Julien signature.asc Description: Digital signature
Processed: Re: Bug#689109: asterisk-espeak: app_espeak fails to load
Processing control commands: > tag -1 wheezy-ignore Bug #689109 [asterisk-espeak] asterisk-espeak: app_espeak fails to load Added tag(s) wheezy-ignore. -- 689109: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689109 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#689109: asterisk-espeak: app_espeak fails to load
Control: tag -1 wheezy-ignore On Sat, Sep 29, 2012 at 10:35:41 +0200, Jonas Smedegaard wrote: > Package: asterisk-espeak > Version: 2.1-1 > Severity: normal > > coreander*CLI> module load app_espeak.so > Unable to load module app_espeak.so > Command 'module load app_espeak.so ' failed. > [Sep 29 09:56:45] WARNING[5768]: loader.c:779 inspect_module: Module > 'app_espeak.so' was not compiled with the same compile-time options as this > version of Asterisk. > [Sep 29 09:56:45] WARNING[5768]: loader.c:780 inspect_module: Module > 'app_espeak.so' will not be initialized as it may cause instability. > [Sep 29 09:56:45] WARNING[5768]: loader.c:863 load_resource: Module > 'app_espeak.so' could not be loaded. > > Fix is to simply rebuild against up-to-date asterisk: apparently > asterisk provides no or too relaxed shlibs hints! > Worked around by a binNMU, so marking this as ignored for the wheezy release. Cheers, Julien signature.asc Description: Digital signature
Processed: Re: Bug#685540: asterisk-flite: app_flite fails to load
Processing control commands: > tag -1 wheezy-ignore Bug #685540 [asterisk-flite] asterisk-flite: app_flite fails to load Added tag(s) wheezy-ignore. -- 685540: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685540 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#685625: libgeom: may cause segfault of grub-probe
Hi, I agree that libbsd and freebsd-glue seem to conflict with each other, but neither one of them by itself has everything needed for freebsd-libs. So Jeff's patch is the least intrusive way to fix this, and that's what we have to go with at this late stage. It fixes a bug we're seeing now and is unlikely to introduce more... I can provide a similar patch for freebsd-utils which has the same issues, but the only problem I could confirm yet was a segfault in ifconfig bridge configuration (#696514) due to it. I propose adding the -Werror part of the patch into Wheezy as well. If it does trigger a FTBFS, it's because we missed something, or something wrong with the build environment that we need to know about. We might need to drop it someday for a new upstream release but hopefully not. Regards, -- Steven Chamberlain ste...@pyro.eu.org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: severity of 693147 is important
Processing commands for cont...@bugs.debian.org: > severity 693147 important Bug #693147 {Done: Thijs Kinkhorst } [ttytter] ttytter: Package breaks against Twitter API 1.1 Severity set to 'important' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 693147: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=693147 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#693147: marked as done (ttytter: Package breaks against Twitter API 1.1)
Your message dated Sat, 29 Dec 2012 16:33:07 + with message-id and subject line Bug#693147: fixed in ttytter 2.1.0-1 has caused the Debian Bug report #693147, regarding ttytter: Package breaks against Twitter API 1.1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 693147: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=693147 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Subject: ttytter: Package breaks against Twitter API 1.1 Package: ttytter Version: 2.0.1-1 Justification: renders package unusable Severity: grave Dear Maintainer, As of 4 October 2012, this version will no longer function properly against Twitter API 1.1 and unanticipted errors are expected to arise over time as Twitter further adjusts their API. A new version that is more API-compliant has not yet been released but is currently in beta. See: http://www.floodgap.com/software/ttytter/beta/ for more information. -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (500, 'testing') Architecture: armel (armv5tel) Kernel: Linux 3.2.0-3-kirkwood Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages ttytter depends on: ii curl 7.26.0-1 ii lynx 2.8.8dev.12-2 ii perl 5.14.2-14 Versions of packages ttytter recommends: ii libterm-readline-gnu-perl 1.20-2+b1 ii libtimedate-perl 1.2000-1 ttytter suggests no packages. -- no debconf information --- End Message --- --- Begin Message --- Source: ttytter Source-Version: 2.1.0-1 We believe that the bug you reported is fixed in the latest version of ttytter, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 693...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thijs Kinkhorst (supplier of updated ttytter package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sat, 29 Dec 2012 17:09:06 +0100 Source: ttytter Binary: ttytter Architecture: source all Version: 2.1.0-1 Distribution: unstable Urgency: low Maintainer: Thijs Kinkhorst Changed-By: Thijs Kinkhorst Description: ttytter- console Twitter client Closes: 684335 693147 Changes: ttytter (2.1.0-1) unstable; urgency=low . * New upstream release (closes: #684335). * Implements support for Twitter API 1.1 (closes: #693147). Checksums-Sha1: ebf2711c7c707f50483c5a46c1167f4a1af66823 1462 ttytter_2.1.0-1.dsc a4424b1038a743d9bdc7566e5bf71775bcded20f 125353 ttytter_2.1.0.orig.tar.gz 79069c56ba34b2f5f87f10371a264613e67f57ef 6888 ttytter_2.1.0-1.diff.gz 7fb4068e315522e27e059675feeed63c12212499 131310 ttytter_2.1.0-1_all.deb Checksums-Sha256: 95a06acadb909fc734cbc7a7fe9e8d966a7718721a2d0dd57ac596865ccd711e 1462 ttytter_2.1.0-1.dsc 732e25547f7cee697400ba79d0267a8c1235aa714c0f7fd6f83c302873babab7 125353 ttytter_2.1.0.orig.tar.gz f1d46ee051fc2590c1228a58894bee48a29a99a58a6caa8ea5cb18d5d3d258a4 6888 ttytter_2.1.0-1.diff.gz e2f281b55607cecf5a1a06c516352342b6ba92b6651a5e0189aedb0367f57dbf 131310 ttytter_2.1.0-1_all.deb Files: 26c6a49d4fb260f606cf0b1abefefebb 1462 non-free/net optional ttytter_2.1.0-1.dsc f0b26b58a9eff744fbd91bba44b11488 125353 non-free/net optional ttytter_2.1.0.orig.tar.gz 87935cd6b69dfc16c2133fbaa1cca49d 6888 non-free/net optional ttytter_2.1.0-1.diff.gz 76e9b3ec5271be14ab4839ca41ecb784 131310 non-free/net optional ttytter_2.1.0-1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBAgAGBQJQ3xfdAAoJEFb2GnlAHawE7QYH/1odCGOTGfKTx68Dr6A6abMk DHedGvbLL/rsKcInVrTy3pFbxqj8XY84kx2FdFu8kV9U4EHr3BFbOHn3fOZu2R+l HY/jHL0u2Ikjk9xHteHdZQL5fFTrv6n6UQZ7VCpqbcTLOiwxDi4ihXcw4mre2kT1 iIUzy7PKk9e9H7eCSTZ0HpF+pn27Mgr6Q2KK1Ce25Kg+GX6IPnags2UBNv/wpljY +mcZwVJIMVFoWVYjEPl0f81qJYhVrteLBv9CuGS79qHHpl79eEdXvtnj/43XIrgM a2CNtJajtoxOr3GPKn3qTEnWYAKYK8DtOfmjeVxZqy5+sEJRRGfNIlR1oLA2zgM= =ajXs -END PGP SIGNATURE End Message ---
Bug#693147: Upstream released Twitter API 1.1 version
Hi Stephen, On Fri, December 28, 2012 22:15, Stephen Michael Kellat wrote: > Okay. Cameron released TTYtter 2.1.0 as of 27 December 2012 which > complies with Twitter API 1.1.[1] Twitter notes on their calendar that > the "drop dead" date for Twitter API 1.0 is 5 March 2013.[2] Cameron > notes that all previous versions of TTYtter will cease to work with > Twitter as of that date due to Twitter's API deprecation. Also noted is > that Term::ReadLine::TTYtter, which currently is packaged with the > script in Debian, would have to be bumped up to a new version as the > currently packaged version will not play nice with the new version of > the script. > > The new upstream is done and Wheezy remains in freeze. The questions > now: > > 1. Will the Release Team grant an exception since Twitter announced the > major shift in API through an API deprecation on 16 August 2012 after > the freeze kicked off on 30 June 2012? > 2. If the Release Team will not grant an exception, can the package be > pulled from shipping with Wheezy since it will likely be unusable > shortly after Wheezy being released in 2013? > 3. Do we have any idea if the other Twitter clients that are in the > package archive are going to be ready for this API deprecation or will > other packages be encountering issues if we ship them? This would be > something more for the Release Team to consider than for the current > bug. The new TTYtter 2.1.0 release is as of now available in Debian unstable. I have considered the options for this bug. I find that option 1 seems highly unlikely since it indeed means to allow a freeze exception for not only a new upstream release but a complete upstream new branch (2.1 vs 2.0). Besides that the package also requires upgrading Term::Readline::TTYtter to 1.4. I believe we best discount this option. Option two is certainly at our disposal. I doubt however that we should ask for removal from wheezy. Firstly, because it still works now, and we can always pull it from wheezy later when the API indeed is discontinued. And secondly, because TTYtter may still be useful for non-Twitter usage. Most notably identi.ca, which is used extensively in the free software world. So I'm inclined to go for the following path: a. Fix the problem in unstable. That has now been done. b. Lower this bug to severity 'important', to not require removal of TTYtter from Wheezy now or in the future. c. Invest effort to ensure that a version that supports Twitter is available for Wheezy. This can be done after release via Debian Backports or via the Stable Updates suite. If we change our mind on the 'b' step, we can always ask for removal later, we do not lose that option. Cheers, Thijs -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: found 695784 in 6.2-8
Processing commands for cont...@bugs.debian.org: > found 695784 6.2-8 Bug #695784 [src:readline6] readline6: includes non-free documentation (GFDL with unmodifiable sections) Marked as found in versions readline6/6.2-8. > thanks Stopping processing here. Please contact me if you need assistance. -- 695784: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695784 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#688738: Fwd: Bug#688738: Unfixed RC bug and unable to install updated package
FYI Begin forwarded message: > From: Dashamir Hoxha > Subject: Re: Bug#688738: Unfixed RC bug and unable to install updated package > Date: 29 December 2012 11:27:51 PM GMT+08:00 > To: Jeremy Malcolm > > Hi Jeremy, > > Thanks for letting me know. > I think that it should be removed from Debian, because it is on a dead end. > The framework used to build it is old and can be understood and used only > by me. Which means that nobody can potentially help me for maintaining and > improving it. Which means that it cannot be fixed and improved. And also > nobody is using it anyway (not even me myself). > > Instead, I have been thinking about rewriting some parts of docbookwiki as > Drupal modules. Drupal is also old and a bloated framework, but there are > lots of developers using it, it is still being maintained and developed, > it is modular, etc. > > One thing that can be imported from docbookwiki is the wiki syntax, which > I find more powerful than the other wikis that I have seen (maybe I am > biased). > Another thing is the idea of generating and exporting documents in > docbook format. > Keeping the history of changes (revisions), permission control etc. maybe are > not so important, or maybe Drupal has its own tools for managing them. > > Best regards, > Dashamir -- Jeremy Malcolm PhD LLB (Hons) B Com Internet and Open Source lawyer, consumer advocate and geek host -t NAPTR 5.9.8.5.2.8.2.2.1.0.6.e164.org|awk -F! '{print $3}'
Processed: Bug severity is too high
Processing commands for cont...@bugs.debian.org: > severity 646704 important Bug #646704 [live-installer] live-installer: installer doesn't write /etc/crypttab for crypt+LVM Severity set to 'important' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 646704: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646704 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#646704: Bug severity is too high
severity 646704 important thanks This bug doesn't fit the definition of "serious" as it only shows up for a precise set of installation types, those not being the most common, particularly when people use the Live CD to install. Downgrading to "important" as per the definition of "improtant" severity. -- signature.asc Description: Digital signature
Bug#695770: Shouldn't builds just be reattempted for python-2.6?
Subject says it all. I'm tempted to think that at least the mips and i386 failures were just a transient failure and the builds should just be reattempted. But I may be mistaken -- signature.asc Description: Digital signature
Processed: More information needed to handle this bug...anyway, it is not release critical
Processing commands for cont...@bugs.debian.org: > tags 690902 moreinfo Bug #690902 [gnome-shell] gnome-shell: seg fault randomly Added tag(s) moreinfo. > severity 690902 normal Bug #690902 [gnome-shell] gnome-shell: seg fault randomly Severity set to 'normal' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 690902: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690902 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#690902: More information needed to handle this bug...anyway, it is not release critical
tags 690902 moreinfo severity 690902 normal thanks I don't think that gnome-shell segfaulting randomly only for one user (no other user reported this) should be RC. Anyway, if you want this bug to be dealt with, you need to follow advices that have been given in the bug log: "Check /home/YOURUSER/.xsession-errors or /home/YOURUSER/.xsession-errors.old for relevant error messages. Post them here. Take care as this log can frequently contain sensitive information logged by some applications. You could try creating a new user on the computer and try reproducing the problem with it. If the problem does not happen then it could be some settings under your other account." -- signature.asc Description: Digital signature
Bug#685625: libgeom: may cause segfault of grub-probe
On Fri, 2012-12-28 at 19:44:41 -0800, Christoph Egger wrote: > I see there's a patch in this bug report. Do you think this is a > solution for wheezy? If so I'd volunteer to upload a new version of > freebsd-libs I've checked now the interaction of the libbsd-overlay and freebsd-glue, and they do not play well. Consequently that would require way more changes than the proposed patch, so even if I've not tested it, it would seem to be the better solution for now given the freeze. Moving the -Werror line one up would reduce the diff by 1, but that's pretty much insignificant, so regardless of that: Acked-by: Guillem Jover I'll add missing stuff to libbsd, and for jessie I'll make freebsd-glue play well with the overlay, once that's fixed the other packages can be switched back to use the overlay. Thanks, Guillem -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: Bug really RC?
Processing commands for cont...@bugs.debian.org: > severity 690066 important Bug #690066 [libreoffice-writer] libreoffice-writer: silently corrupts docx file Severity set to 'important' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 690066: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690066 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#690066: Bug really RC?
severity 690066 important thanks I don't think this bug is release critical. The right severity, for me, seems to be "important". OK, one could argue about "dataloss" but someone opening a file created in a format that is not native to LO, then modifying the file, then saving it.should not yell for "dataloss" if (s)he hasn't kept a copy of the original file somewhere. Hence downgrading. Feel free to raise the severity if you disagree, but there are probably more important bugs to focus on. -- signature.asc Description: Digital signature