Bug#698211: segfault when start

2013-01-15 Thread Elagin Petr
Package: chromium
Version: 22.0.1229.94~r161065+dfsg-0.1
Severity: grave


romium  
[1]3051 segmentation fault  chromium

i Using Linux foothold.ru 2.6.32-5-amd64 #1 SMP Sun May 6 04:00:17 UTC 2012 
x86_64 GNU/Linux



Debug Report:
__

$ chromium --debug
# Env:
# LD_LIBRARY_PATH=/usr/lib/chromium:/usr/lib/xulrunner-1.9.1
#
PATH=/usr/lib/chromium:/usr/local/bin:/usr/bin:/bin:/usr/bin/X11:/usr/games
#GTK_PATH=
# CHROMIUM_USER_FLAGS=
#  CHROMIUM_FLAGS=--password-store=detect
/usr/bin/gdb /usr/lib/chromium/chromium -x /tmp/chromiumargs.WEcehK
GNU gdb (GDB) 7.4.1-debian
Copyright (C) 2012 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type show copying
and show warranty for details.
This GDB was configured as x86_64-linux-gnu.
For bug reporting instructions, please see:
http://www.gnu.org/software/gdb/bugs/...
Reading symbols from /usr/lib/chromium/chromium...(no debugging symbols 
found)...done.

(gdb) r
Starting program: /usr/lib/chromium/chromium --password-store=detect 
[Thread debugging using libthread_db enabled]
Using host libthread_db library /lib/x86_64-linux-gnu/libthread_db.so.1.
[New Thread 0x7fffe5126700 (LWP 3816)]
[New Thread 0x7fffe42d0700 (LWP 3817)]
[New Thread 0x7fffe3acf700 (LWP 3818)]
[New Thread 0x7fffe32ce700 (LWP 3819)]
[New Thread 0x73678700 (LWP 3820)]
[New Thread 0x7fffe2200700 (LWP 3821)]
[New Thread 0x7fffe19ff700 (LWP 3822)]
[New Thread 0x7fffe11fe700 (LWP 3823)]
[New Thread 0x7fffe09fd700 (LWP 3824)]
[New Thread 0x7fffdbfff700 (LWP 3825)]
[New Thread 0x7fffdb7fe700 (LWP 3826)]
[New Thread 0x7fffdaffd700 (LWP 3827)]
[New Thread 0x7fffe01fc700 (LWP 3828)]
[New Thread 0x7fffe01db700 (LWP 3829)]
[New Thread 0x7fffe01ba700 (LWP 3830)]
[New Thread 0x7fffda7fc700 (LWP 3832)]
[New Thread 0x7fffd960f700 (LWP 3833)]

Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 0x7fffe01ba700 (LWP 3830)]
0x7fffec3ef0f5 in ?? () from /lib/x86_64-linux-gnu/libc.so.6

(gdb) bt full
#0  0x7fffec3ef0f5 in ?? () from /lib/x86_64-linux-gnu/libc.so.6
No symbol table info available.
#1  0x7fffec3ef2aa in ?? () from /lib/x86_64-linux-gnu/libc.so.6
No symbol table info available.
#2  0x7fffec3abd67 in getaddrinfo () from /lib/x86_64-linux-gnu/libc.so.6
No symbol table info available.
#3  0x7458e6ef in ?? ()
No symbol table info available.
#4  0x74586ac7 in ?? ()
No symbol table info available.
#5  0x7452e500 in ?? ()
No symbol table info available.
#6  0x74528011 in ?? ()
No symbol table info available.
#7  0x7fffedd92b50 in start_thread () from 
/lib/x86_64-linux-gnu/libpthread.so.0
No symbol table info available.
#8  0x7fffec3cd70d in clone () from /lib/x86_64-linux-gnu/libc.so.6
No symbol table info available.
#9  0x in ?? ()
No symbol table info available.

(gdb) info register
rax0x4c01216
rbx0x3e 62
rcx0x0  0
rdx0x7fffe01b8e40   140736953290304
rsi0x7fffe01b8e5c   140736953290332
rdi0x7fffe019afe0   140736953167840
rbp0x7fffe01b9620   0x7fffe01b9620
rsp0x7fffe019afe0   0x7fffe019afe0
r8 0x0  0
r9 0x7fffe01b8e50   140736953290320
r100x0  0
r110x2  2
r120x7fffe01b9570   140736953292144
r130x7fffe01b95e0   140736953292256
r140x7fffe01b8500   140736953287936
r150xfef8179b   4277671835
rip0x7fffec3ef0f5   0x7fffec3ef0f5
eflags 0x10246  [ PF ZF IF RF ]
cs 0x33 51
ss 0x2b 43
ds 0x0  0
es 0x0  0
fs 0x0  0
gs 0x0  0

-- System Information:
Debian Release: 6.0.5
  APT prefers testing-proposed-updates
  APT policy: (500, 'testing-proposed-updates'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-amd64 (SMP w/24 CPU cores)
Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages chromium depends on:
ii  chromium-inspector  21.0.1180.89~r154005-1
ii  gconf-service   3.2.5-1+build1
ii  libasound2  1.0.25-4
ii  libatk1.0-0 2.4.0-2
ii  libbz2-1.0  1.0.6-4
ii  libc6   2.13-35
ii  libcairo2   1.12.2-2
ii  libcups21.5.3-1
ii  libdbus-1-3 1.6.0-1
ii  libevent-2.0-5  2.0.19-stable-3
ii  libexpat1   2.1.0-1
ii  libflac81.2.1-6
ii  libfontconfig1  2.9.0-7
ii  libfreetype62.4.9-1
ii  libgcc1 1:4.7.2-4
ii  libgconf-2-43.2.5-1+build1
ii  libgcrypt11 1.5.0-3
ii  libgdk-pixbuf2.0-0  2.26.1-1
ii  libglib2.0-02.32.3-1
ii  libgnome-keyring0   

Bug#697901: marked as done (c2html and scheme9: error when trying to install together)

2013-01-15 Thread Debian Bug Tracking System
Your message dated Tue, 15 Jan 2013 09:17:41 +
with message-id e1tv2el-0006cc...@franck.debian.org
and subject line Bug#697901: fixed in scheme9 2013.01.09-2
has caused the Debian Bug report #697901,
regarding c2html and scheme9: error when trying to install together
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
697901: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697901
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: scheme9,c2html
Version: scheme9/2012.12.17-1
Version: c2html/0.9.6-3
Severity: serious
User: trei...@debian.org
Usertags: edos-file-overwrite

Date: 2013-01-10
Architecture: amd64
Distribution: sid

Hi,

automatic installation tests of packages that share a file and at the
same time do not conflict by their package dependency relationships has
detected the following problem:


WARNING: The following packages cannot be authenticated!
  c2html scheme9
Authentication warning overridden.
Can not write log, openpty() failed (/dev/pts not mounted?)
Selecting previously unselected package c2html.
(Reading database ... 10762 files and directories currently installed.)
Unpacking c2html (from .../c2html_0.9.6-3_amd64.deb) ...
Selecting previously unselected package scheme9.
Unpacking scheme9 (from .../scheme9_2012.12.17-1_amd64.deb) ...
dpkg: error processing /var/cache/apt/archives/scheme9_2012.12.17-1_amd64.deb 
(--unpack):
 trying to overwrite '/usr/bin/c2html', which is also in package c2html 0.9.6-3
dpkg-deb: error: subprocess paste was killed by signal (Broken pipe)
Processing triggers for man-db ...
Errors were encountered while processing:
 /var/cache/apt/archives/scheme9_2012.12.17-1_amd64.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)


This is a serious bug as it makes installation fail, and violates
sections 7.6.1 and 10.1 of the policy. An optimal solution would
consist in only one of the packages installing that file, and renaming
or removing the file in the other package. Depending on the
circumstances you might also consider Replace relations or file
diversions. If the conflicting situation cannot be resolved then, as a
last resort, the two packages have to declare a mutual
Conflict. Please take into account that Replaces, Conflicts and
diversions should only be used when packages provide different
implementations for the same functionality.

Here is a list of files that are known to be shared by both packages
(according to the Contents file for sid/amd64, which may be
slightly out of sync):

  /usr/bin/c2html

This bug has been filed against both packages. If you, the maintainers of
the two packages in question, have agreed on which of the packages will
resolve the problem please reassign the bug to that package. You may then
also register in the BTS that the other package is affected by the bug.

-Ralf.

PS: for more information about the detection of file overwrite errors
of this kind see http://edos.debian.net/file-overwrites/.
---End Message---
---BeginMessage---
Source: scheme9
Source-Version: 2013.01.09-2

We believe that the bug you reported is fixed in the latest version of
scheme9, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 697...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Barak A. Pearlmutter b...@debian.org (supplier of updated scheme9 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 15 Jan 2013 09:06:11 +
Source: scheme9
Binary: scheme9
Architecture: source amd64
Version: 2013.01.09-2
Distribution: unstable
Urgency: low
Maintainer: Barak A. Pearlmutter b...@debian.org
Changed-By: Barak A. Pearlmutter b...@debian.org
Description: 
 scheme9- Scheme 9 from Empty Space R4RS Scheme interpreter
Closes: 697901
Changes: 
 scheme9 (2013.01.09-2) unstable; urgency=low
 .
   * Add s9 prefix to names of generically named binaries:
 - /usr/bin/advgen  to /usr/bin/s9advgen
 - /usr/bin/c2html  to /usr/bin/s9c2html (closes: #697901)
 - /usr/bin/colsto /usr/bin/s9cols
 - /usr/bin/dupes   to /usr/bin/s9dupes
 - /usr/bin/edocto /usr/bin/s9edoc
 - /usr/bin/htmlify to /usr/bin/s9htmlify
 - /usr/bin/scm2html 

Processed: found 689119 in 1.25-6~exp1, affects 697085, found 695898 in 4.0.1-3, found 695899 in .log ...

2013-01-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 found 689119 1.25-6~exp1
Bug #689119 [njam] njam: highscore file munging deletes a shipped file during 
installation
Marked as found in versions njam/1.25-6~exp1.
 affects 697085 + qemu
Bug #697085 [qemu-system] qemu-system: tries to overwrite 
doc/qemu/qemu-doc.html from qemu (missing Breaks+Replaces?)
Added indication that 697085 affects qemu
 found 695898 4.0.1-3
Bug #695898 [php-horde-passwd] php-horde-passwd: not installable in sid, 
depends on old php-horde
Marked as found in versions php-horde-passwd/4.0.1-3.
 found 695899 .log
Bug #695899 [php-horde-whups] php-horde-whups: not installable in sid, depends 
on old php-horde
There is no source info for the package 'php-horde-whups' at version '.log' 
with architecture ''
Unable to make a source version for version '.log'
Marked as found in versions .log.
 found 695900 1.0.2-3
Bug #695900 [php-horde-wicked] php-horde-wicked: not installable in sid, 
depends on old php-horde
Marked as found in versions php-horde-wicked/1.0.2-3.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
689119: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689119
695898: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695898
695899: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695899
695900: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695900
697085: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697085
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: tagging 697085

2013-01-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 697085 + confirmed pending
Bug #697085 [qemu-system] qemu-system: tries to overwrite 
doc/qemu/qemu-doc.html from qemu (missing Breaks+Replaces?)
Added tag(s) confirmed and pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
697085: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697085
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: notfound 695899 in .log, found 695899 in 2.0.2-3

2013-01-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 notfound 695899 .log
Bug #695899 [php-horde-whups] php-horde-whups: not installable in sid, depends 
on old php-horde
There is no source info for the package 'php-horde-whups' at version '.log' 
with architecture ''
Unable to make a source version for version '.log'
No longer marked as found in versions .log.
 found 695899 2.0.2-3
Bug #695899 [php-horde-whups] php-horde-whups: not installable in sid, depends 
on old php-horde
Marked as found in versions php-horde-whups/2.0.2-3.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
695899: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695899
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: RE: sudo: setresuid(ROOT_UID, ROOT_UID, ROOT_UID): Operation not permitted

2013-01-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 found 658896 1.8.5p2-1
Bug #658896 [sudo] sudo: setresuid(ROOT_UID, ROOT_UID, ROOT_UID): Operation not 
permitted
Marked as found in versions sudo/1.8.5p2-1.
 severity 658896 serious
Bug #658896 [sudo] sudo: setresuid(ROOT_UID, ROOT_UID, ROOT_UID): Operation not 
permitted
Severity set to 'serious' from 'important'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
658896: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=658896
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#696424: Possible patch

2013-01-15 Thread David Weber
Hi Salvatore

 Hi David
 
 On Thu, Jan 10, 2013 at 10:16:35AM +, David Weber wrote:
   Hi David
   
   On Mon, Jan 07, 2013 at 09:06:53AM +, David Weber wrote:
 Attached is the debdiff contianing these three refreshed for the
 version in unstable and testing. But I'm not yet ready to propose a
 NMU. Testing of the resulting package is welcome!

Thanks for the debdiff!

It works as expected: It creates the files with the right 
permissions without breaking functionality.

A problem could be that the files aren't freshly created by a simple
restart of the daemon. Should something be done about that?

Some options could be:
- Notify the user to stop libvirtd and sanlock and run 
rm /var/run/sanlock/sanlock.sock; rm /var/log/sanlock.log

- Change the file permissions through the package update

- Do nothing because most likely nobody uses sanlock on Debain atm.
   
   I have not a final answer here, but it might be easy to implement like
   libvirt-bin does in postint, mabye only conditionally checking (so
   doing it during package update from a 'broken' version):
   
  [...]
if ! dpkg-statoverride --list /var/log/sanlock.log /dev/null 21; 
then
   # fix permissions
   fi
   [...]
   
   and the same for /var/run/sanlock/sanlock.sock.
  
  Great hint. I modified the patch in that way and also added the 
  fix for #689696
 
 Btw, after thinking about further on it: As both /var/log/sanlock.log
 and /var/run/sanlock/sanlock.sock are not files installed by the
 package, I think the check with dpkg-statoverride is in this case
 wrong! Sorry about the wrong suggestion.
 
 So I think it's best to remove this again.

Ops, thats right. I now check the permissions and change
them in case they are wrong


 
 Regarding the second: I suggest to include in this upload only fixes
 compliant with the freeze policy: 
 
 [1]: http://release.debian.org/wheezy/freeze_policy.html
 
 (but I have not looked if #689696 can be considered RC).

Since it is a build fix, I guess it classifys

 
 +sanlock (2.2-1.1) unstable; urgency=low
 +
 + * Fix CVE-2012-5638 sanlock world writable /var/log/sanlock.log. Thanks to 
 Salvatore Bonaccorso  (Closes: #696424)
 
  would wrap this line
 
 + Add patches cherry-picked from git repository:
 + - 0001-sanlock-remove-umask-0.patch
 + - 0001-sanlock-use-lockfile-mode-644.patch
 + - 0001-wdmd-use-lockfile-mode-644.patch
 + * Replace restrict field name (Closes: #689696)
 + Add patche cherry.picked from git repository:
 
 ^ s{patche}{patch} and s{cherry.picked}{cherry picked}

Ops, fixed

 
 Again thanks for your work!

Thank you too!

 
 Regards,
 Salvatore
Cheers,
David

To: car...@debian.org
696...@bugs.debian.org
Cc: martin.quin...@loria.fr
j...@inutil.org
a...@sigxcpu.org


sanlock_cve2.debdiff
Description: Binary data


Processed: usertagging 697665, tagging 697665

2013-01-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 usertag 697665 depends-on-fuse-utils
User is pra...@yahoo.com
There were no usertags set.
Usertags are now: depends-on-fuse-utils.
 tags 697665 + sid
Bug #697665 [fusesmb] fusesmb: Impossible to install package due to unmet 
dependencies
Added tag(s) sid.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
697665: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697665
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698108: java-package: diff for NMU version 0.50+nmu2

2013-01-15 Thread tony mancill
On 01/14/2013 11:48 PM, Niels Thykier wrote:
 On 2013-01-15 00:57, David Prévot wrote:
 tags 698108 + patch
 thanks

 Dear maintainer,

 I've prepared an NMU for java-package (versioned as 0.50+nmu2) and
 uploaded it to DELAYED/2. Please feel free to tell me if I
 should delay it longer (or even if I should dcut it to 0-day, given the
 security matter).

 If you prefer to fix it in another not intrusive way (not c1fb4d0), I'm
 happy to (quickly) sponsor your package too.

 Regards.

 David

 [...]
 
 Seems to me your patch will prevent anyone from using java-package on
 the older Java7 binaries.  If we do remove this support because they are
 infested with security issues making them unsuitable for anything at
 all[1], I think it should have a nice little error message saying Nope,
 won't do this - That version is vulnerable/unsupported/$whatever.
   Just so people are aware it is a deliberate choice from our side and
 not a buggy script crashing.  (Particularly people have been using it
 with older versions before.  They might be surprised to see that
 non-descriptive error message the reporter included in the original mail).

I had the same thought - there may be a valid reason for someone to want
to run jdk-7u9.  This issue already appears to be addressed in the 0.51
package (but with a different patch).  I'm assuming we want to keep the
patch minimal - can we use this these patterns instead?

jdk-7u+([0-9])-linux-i586.tar.gz
jdk-7u+([0-9])-linux-x64.tar.gz

David, if you'd prefer not to upload again, could you remove the upload
and I'll prepare the update.  (But thank you for taking the initiative
in the first place!)

Thank you,
tony





signature.asc
Description: OpenPGP digital signature


Bug#698231: memcached: CVE-2013-0179

2013-01-15 Thread Moritz Muehlenhoff
Package: memcached
Severity: grave
Tags: security
Justification: user security hole

A minor security issue was found in memcached:
http://www.openwall.com/lists/oss-security/2013/01/14/6

This doesn't warrant a DSA, but you could fix it through a point update.

For Wheezy a minimal fix should be made instead of updating to a new
upstream release.

Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#692948: Why is this apparently easy to fix bug....not yet fixed?

2013-01-15 Thread Damyan Ivanov
Hi Christian,

I am rather busy lately, sorry for the late reply.

-=| Christian PERRIER, 01.01.2013 19:31:04 +0100 |=-
 I wonder why this RC bug isn't fixed yet, as you apparently pushed a
 fix in the package's GIT repository.
 
 I would be happy to NMU the package with the fix you committed, but
 why not upload it yourself?

The fix there was incomplete. I still need to actually /test/ the 
implemented fixes (pushed another yesterday) and time appears to be 
sparse. Add to that my hopes to see #693216 approved by the release 
team and a bit of uncertainity how to proceed with two unblock 
requests and you get a recipe for stalled work :/

All help is certainly welcome, especially if the original reporter's 
situation can be tested for all (nine!) binary packages -- upgrade 
from lenny to squeeze to wheezy. The two commits can be cherry-picked 
in wheezy-rooted branch.

Cheers!
dam


signature.asc
Description: Digital signature


Bug#698236: bitlbee: FTBFS: build-depends on virtual package

2013-01-15 Thread Christoph Egger
Package: src:bitlbee
Version: 3.2-1
Severity: serious
Tags: sid wheezy
Justification: fails to build from source (but built successfully in the past)

Hi!

Your package failed to build on the buildds:

 Package gnutls-dev is a virtual package provided by:
   libgnutls28-dev 3.0.22-2
   libgnutls-dev 2.12.20-3

Build-Depending on virtual packages with more than one provider is not
supported (on purpose to make the set of installed packages on the
buildd less random)

Regards

Christoph

-- 


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698211: segfault when start

2013-01-15 Thread John Paul Adrian Glaubitz
tags 698211 unreproducible
tags 698211 moreinfo
severity normal
thanks

Hi Petr,

 romium  
 [1]3051 segmentation fault  chromium
 
 i Using Linux foothold.ru 2.6.32-5-amd64 #1 SMP Sun May 6 04:00:17 UTC
 2012 x86_64 GNU/Linux
 
 
 
 Debug Report:

I'm afraid but you did not provide information to be able to reproduce
this bug. I just installed the current version of the chromium package
from the unstable archives and it runs without any problems on my
machine.

 -- System Information:
 Debian Release: 6.0.5
   APT prefers testing-proposed-updates
   APT policy: (500, 'testing-proposed-updates'), (500, 'testing')
 Architecture: amd64 (x86_64)
 
 Kernel: Linux 2.6.32-5-amd64 (SMP w/24 CPU cores)
 Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8)
 Shell: /bin/sh linked to /bin/dash

Also, I am not sure whether it is justified to report a bug in this
context as you are installing packages from testing onto a stable
machine running Squeeze. The version of Chromium in squeeze is much
older and the version from testing/unstable works on these systems
without problems. There is no version in squeeze-backports either.

Please resort to using Google Chrome or upgrade your system to Wheezy.

I am also downgrading this bug to normal since you shouldn't set the
severity to grave when using an unsupported configuration. If you
disagree, please feel free to provide more information which would
help reproducing the bug and also some proof that the problem is
actually a bug and not a problem with your setup.

Cheers,

Adrian

-- 
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer - glaub...@debian.org
`. `'   Freie Universitaet Berlin - glaub...@physik.fu-berlin.de
  `-GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed (with 1 errors): segfault when start

2013-01-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 698211 unreproducible
Bug #698211 [chromium] segfault when start
Added tag(s) unreproducible.
 tags 698211 moreinfo
Bug #698211 [chromium] segfault when start
Added tag(s) moreinfo.
 severity normal
Unknown command or malformed arguments to command.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
698211: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698211
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: severity of 698211 is normal

2013-01-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 698211 normal
Bug #698211 [chromium] segfault when start
Severity set to 'normal' from 'grave'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
698211: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698211
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698108: java-package: diff for NMU version 0.50+nmu2

2013-01-15 Thread David Prévot
Hi,

Thanks Niels and Tony for your reviews and advices!

Le 15/01/2013 11:38, tony mancill a écrit :
 On 01/14/2013 11:48 PM, Niels Thykier wrote:

 Seems to me your patch will prevent anyone from using java-package on
 the older Java7 binaries.

Right, I didn't thought it would worth the trouble to support “infested
with security issues making them unsuitable”-versions.

 I think it should have a nice little error message saying Nope,
 won't do this - That version is vulnerable/unsupported/$whatever.

Right, I did bother to update the (multiple duplicates of the same)
documentation, but a better handling of such error would have indeed be
worthwhile.

 I had the same thought - there may be a valid reason for someone to want
 to run jdk-7u9.

OK, so let's just continue to support its building then.

 This issue already appears to be addressed in the 0.51
 package (but with a different patch).  I'm assuming we want to keep the
 patch minimal

That was the idea (both because we're in freeze, and because it's an NMU
to fix an issue opened yesterday). If the release team is fine with
0.51, I guess it could be uploaded to unstable ;).

 can we use this these patterns instead?
 
 jdk-7u+([0-9])-linux-i586.tar.gz
 jdk-7u+([0-9])-linux-x64.tar.gz

I'm afraid it won't cope with the ${archive_name:6:1} versus
${archive_name:6:2} expansion currently used in the scripts (or would
need some more intrusive changes that may not be desirable).

 David, if you'd prefer not to upload again, could you remove the upload
 and I'll prepare the update.  (But thank you for taking the initiative
 in the first place!)

I've prepared another one, debdiff attached. It explicitly adds support
for two digits version, without touching to the one digit version
support nor the documentation (since it's still accurate with that change).

I'll upload it to DELAYED/1 in about four hours (that is one day after
after the initial DELAYED/2 upload), unless we find something else that
need fixing in the mean time or if someone prefers to take care of it
another way.

Regards.

David

diff -Nru java-package-0.50+nmu1/debian/changelog 
java-package-0.50+nmu2/debian/changelog
--- java-package-0.50+nmu1/debian/changelog 2012-09-06 18:38:09.0 
-0400
+++ java-package-0.50+nmu2/debian/changelog 2013-01-15 15:07:11.0 
-0400
@@ -1,3 +1,10 @@
+java-package (0.50+nmu2) unstable; urgency=high
+
+  * Non-maintainer upload.
+  * Allow two digits in Java 7 updates. Closes: #597294, #698108
+
+ -- David Prévot taf...@debian.org  Tue, 15 Jan 2013 15:06:26 -0400
+
 java-package (0.50+nmu1) unstable; urgency=low
 
   * Non-maintainer upload.
diff -Nru java-package-0.50+nmu1/lib/oracle-j2re.sh 
java-package-0.50+nmu2/lib/oracle-j2re.sh
--- java-package-0.50+nmu1/lib/oracle-j2re.sh   2012-01-21 08:21:00.0 
-0400
+++ java-package-0.50+nmu2/lib/oracle-j2re.sh   2013-01-15 15:03:51.0 
-0400
@@ -18,6 +18,12 @@
j2se_priority=316
found=true
;;
+   jre-7u[0-9][0-9]-linux-i586.tar.gz) # SUPPORTED
+   j2se_version=1.7.0+update${archive_name:6:2}${revision}
+   j2se_expected_min_size=94 #Mb
+   j2se_priority=316
+   found=true
+   ;;
   esac
   ;;
 amd64|x86_64-linux-gnu)
@@ -33,6 +39,12 @@
j2se_expected_min_size=88 #Mb
j2se_priority=316
found=true
+   ;;
+   jre-7u[0-9][0-9]-linux-x64.tar.gz) # SUPPORTED
+   j2se_version=1.7.0+update${archive_name:6:2}${revision}
+   j2se_expected_min_size=88 #Mb
+   j2se_priority=316
+   found=true
;;
   esac
   ;;
diff -Nru java-package-0.50+nmu1/lib/oracle-j2sdk-doc.sh 
java-package-0.50+nmu2/lib/oracle-j2sdk-doc.sh
--- java-package-0.50+nmu1/lib/oracle-j2sdk-doc.sh  2012-01-21 
08:21:00.0 -0400
+++ java-package-0.50+nmu2/lib/oracle-j2sdk-doc.sh  2013-01-15 
15:02:36.0 -0400
@@ -12,6 +12,11 @@
j2se_expected_min_size=290 #Mb
found=true
;;
+   jdk-7u[0-9][0-9]-apidocs.zip) # SUPPORTED
+   j2se_version=1.7.0+update${archive_name:6:2}${revision}
+   j2se_expected_min_size=290 #Mb
+   found=true
+   ;;
   esac
   if [[ -n $found ]]; then
cat  EOF
diff -Nru java-package-0.50+nmu1/lib/oracle-j2sdk.sh 
java-package-0.50+nmu2/lib/oracle-j2sdk.sh
--- java-package-0.50+nmu1/lib/oracle-j2sdk.sh  2012-01-21 08:21:00.0 
-0400
+++ java-package-0.50+nmu2/lib/oracle-j2sdk.sh  2013-01-15 15:02:05.0 
-0400
@@ -18,6 +18,12 @@
j2se_priority=317
found=true
;;
+   jdk-7u[0-9][0-9]-linux-i586.tar.gz) # SUPPORTED
+   j2se_version=1.7.0+update${archive_name:6:2}${revision}
+   j2se_expected_min_size=190 #Mb
+   j2se_priority=317
+   found=true
+   ;;
   esac
   ;;
 amd64|x86_64-linux-gnu)
@@ -33,6 +39,12 @@

Bug#697848: [Pkg-ace-devel] Bug#697848: non-free files in main

2013-01-15 Thread Thomas Girard
Hello,

thanks for the report.

On 10/01/2013 12:30, Ansgar Burchardt wrote:
 Package: src:ace
 Severity: serious

[...]

 the following license conditions (from 6.1.2-1's d/copyright) look quite
 non-free as they restrict how the program may be modified:

I assume you are referring to DFSG#3 here? Or DFSG#1?

 
  [...] You
  may copy and extend functionality (but may not remove functionality)
  of the Interface Definition Language CFE without charge, but you are
  not authorized to license or distribute it to anyone else except as
  part of a product or program developed by you or with the express
  written consent of Sun Microsystems, Inc. (Sun).
 

My reading of the text above is that it's possible to license or
distribute IDL CFE to anyone if:

 - the licensee has express written consent of Sun Microsystems, Inc.
   (Sun); or
 - it's part of a product or program developed by the licensee

While first condition is impossible to meet, the second one looks
similar (to me) to DFSG#1.

But maybe the issue here is the /but may not remove functionality/
sentence?

 
  You may copy, modify, distribute, or sublicense the LICENSED PRODUCT
  without charge as part of a product or software program developed by
  you, so long as you preserve the functionality of interoperating with
  the Object Management Group's Internet Inter-ORB Protocol version
  one.  However, any uses other than the foregoing uses shall require
  the express written consent of Sun Microsystems, Inc.
 

Likewise, I don't see what's wrong here, except maybe for /so long as
you preserve the functionality of interoperating with the Object
Management Group's Internet Inter-ORB Protocol/

Is this the part that triggered this bug report?

 There's also a license allowing only educational and commercial use, but no
 redistribution or modification:
 
 
  All of the files in these directories are copyright Addison Wesley,
  and they come with absolutely no warranty whatsoever.  Permission is
  hereby granted to use these programs for educational or commercial
  purposes.
 

Ack. Repackaging would solve this one.


Thanks,
Regards,

Thomas


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#697465: apache2.2-common: initial install fails: Could not read /etc/apache2/envvars

2013-01-15 Thread Stefan Fritsch

severity 697465 normal
thanks

On Tue, 8 Jan 2013, Jonas Smedegaard wrote:



I think you are right that what I experience might be unrelated to
apache packaging - I suspect however that it is not multistrap but
fakechroot.  I will reassing accordingly.


I am downgrading this until then. No idea what severity this should have 
in


Cheers,
Stefan


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#697465: apache2.2-common: initial install fails: Could not read /etc/apache2/envvars

2013-01-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 697465 normal
Bug #697465 [apache2.2-common] apache2.2-common: initial install fails: Could 
not read /etc/apache2/envvars
Severity set to 'normal' from 'serious'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
697465: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697465
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698243: gnucash: Fails to open data file from version 1:2.4.10-5

2013-01-15 Thread Bob Weber
Package: gnucash
Version: 1:2.4.10-6
Severity: critical
Tags: upstream
Justification: causes serious data loss

Upon openeing gnucash there is an error parsing input file.   This 
happened after a upgrade to 1:2.4.10-6.  I have downgraded to 
version 1:2.4.10-5 to get work done. 

The data below reflects the downgrade to 1:2.4.10-5.  The only packages changed
were the gnucash-common and gnucash.


-- System Information:
Debian Release: 7.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 3.2.0-4-686-pae (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages gnucash depends on:
ii  gconf-service  3.2.5-1+build1
ii  gnucash-common 1:2.4.10-5
ii  guile-1.8  1.8.8+1-8
ii  guile-1.8-libs 1.8.8+1-8
ii  libaqbanking34 5.0.24-3
ii  libc6  2.13-37
ii  libcairo2  1.12.2-2
ii  libcrypt-ssleay-perl   0.58-1
ii  libdate-manip-perl 6.32-1
ii  libdbi10.8.4-6
ii  libfinance-quote-perl  1.17+git20120506-1
ii  libgconf-2-4   3.2.5-1+build1
ii  libgdk-pixbuf2.0-0 2.26.1-1
ii  libglade2-01:2.6.4-1
ii  libglib2.0-0   2.33.12+really2.32.4-3
ii  libgnome-keyring0  3.4.1-1
ii  libgnome2-02.32.1-2
ii  libgnomecanvas2-0  2.30.3-1.2
ii  libgnomeui-0   2.24.5-2
ii  libgoffice-0.8-8   0.8.17-1.2
ii  libgtk2.0-02.24.10-2
ii  libgwengui-gtk2-0  4.3.3-1
ii  libgwenhywfar604.3.3-1
ii  libhtml-tableextract-perl  2.11-1
ii  libhtml-tree-perl  5.02-1
ii  libktoblzcheck1c2a 1.39-1
ii  libofx41:0.9.4-2.1
ii  libpango1.0-0  1.30.0-1
ii  libwebkitgtk-1.0-0 1.8.1-3.3
ii  libwww-perl6.04-1
ii  libx11-6   2:1.5.0-1
ii  libxml22.8.0+dfsg1-7
ii  perl   5.14.2-16
ii  slib   3b1-3.1
ii  zlib1g 1:1.2.7.dfsg-13

Versions of packages gnucash recommends:
ii  gnucash-docs  2.4.1-3
ii  yelp  3.4.2-1+b1

Versions of packages gnucash suggests:
pn  libdbd-mysqlnone
pn  libdbd-pgsqlnone
pn  libdbd-sqlite3  none

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#698243: gnucash: Fails to open data file from version 1:2.4.10-5

2013-01-15 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + moreinfo
Bug #698243 [gnucash] gnucash: Fails to open data file from version 1:2.4.10-5
Added tag(s) moreinfo.

-- 
698243: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698243
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698243: gnucash: Fails to open data file from version 1:2.4.10-5

2013-01-15 Thread Sébastien Villemot
Control: tags -1 + moreinfo

Le mardi 15 janvier 2013 à 16:20 -0500, Bob Weber a écrit :
 Package: gnucash
 Version: 1:2.4.10-6
 Severity: critical
 Tags: upstream
 Justification: causes serious data loss
 
 Upon openeing gnucash there is an error parsing input file.   This 
 happened after a upgrade to 1:2.4.10-6.  I have downgraded to 
 version 1:2.4.10-5 to get work done. 
 
 The data below reflects the downgrade to 1:2.4.10-5.  The only packages 
 changed
 were the gnucash-common and gnucash.

Between 1:2.4.10-5 and 1:2.4.10-6 we enforced a stricter verification of
the XML file, because GnuCash was ignoring XML errors (see
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=658732 ). Ignoring XML
errors could lead to data losses, as explained in the bug report; our
patch was also applied by upstream, and will be incorporated in upstream
GnuCash 2.4.12.

Therefore, if gnucash 1:2.4.10-6 refuses to open your file, it probably
means that it is invalid XML. I encourage you to pass it through
xmllint --noout to find the error.

Please confirm that your file is invalid XML, and I will close this bug
report. If the XML is valid (which I think is unlikely), please describe
a way to reproduce the problem (for example by sending an example data
file).

Regards,

-- 
 .''`.Sébastien Villemot
: :' :Debian Developer
`. `' http://www.dynare.org/sebastien
  `-  GPG Key: 4096R/381A7594



signature.asc
Description: This is a digitally signed message part


Bug#698248: odbcinst apparently ignores the -l option when used to uninstall a DSN

2013-01-15 Thread José Manuel Santamaría Lema
Package: odbcinst
Version: 2.2.14p2-5
Severity: serious
Justification: makes odbcinst not very suitable for use in maintainer scripts


Hello,

while I'm filing this bug as serious, feel free to downgrade the severity of 
this bug if you think it's appropiate. In any case imho a fix for this bug is 
worth to be included in wheezy.

I've been working on the Virtuoso debian package. The maintainer scripts 
relies on odbc, the prerm script uses odbcinst with the -l option, thus:
odbcinst -u -s -l -n VOS
however, apparently it doesn't perform the operation like if VOS where a 
system DSN, but an user DSN. So I've just workarounded this bug using an 
evironnment variable which, according to a comment in the odbcinst source 
code, is suposed to override the program arguments:
ODBCSEARCH=ODBC_SYSTEM_DSN odbcinst -u -s -l -n VOS
When used this way I think it works as expected.

We noticed this bug when we where trying to fix a a piuparts error, for more 
information, see:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677286
Also note that the reported gave kindly a quick list of other packages which 
_might_  be affected:
http://codesearch.debian.net/search?q=odbcinst.*-l+filetype%3Ashell


Thank you for your time looking into this.


signature.asc
Description: This is a digitally signed message part.


Processed: retitle

2013-01-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 retitle 696681 falconpl: CVE-2012-6070: possible security issue due to misuse 
 of the libcurl API
Bug #696681 {Done: Kartik Mistry kar...@debian.org} [falconpl] falconpl: 
possible security issue due to misuse of the libcurl API
Changed Bug title to 'falconpl: CVE-2012-6070: possible security issue due to 
misuse of the libcurl API' from 'falconpl: possible security issue due to 
misuse of the libcurl API'
 retitle 696707 nusoap: CVE-2012-6071: wrong CURLOPT_SSL_VERIFYHOST: do not 
 check hostname of cert
Bug #696707 {Done: Thomas Goirand z...@debian.org} [libnusoap-php] Wrong 
CURLOPT_SSL_VERIFYHOST: do not check hostname of cert
Changed Bug title to 'nusoap: CVE-2012-6071: wrong CURLOPT_SSL_VERIFYHOST: do 
not check hostname of cert' from 'Wrong CURLOPT_SSL_VERIFYHOST: do not check 
hostname of cert'

End of message, stopping processing here.

Please contact me if you need assistance.
-- 
696681: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696681
696707: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696707
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#669278: please add phonon-backend-xine transitional package

2013-01-15 Thread Andreas Beckmann
Followup-For: Bug #669278
Control: reassign -1 src:phonon 4.6.0.0-2

Hi,

since fixing this via qtdbus did not work, I'm giving this bug back
to phonon. Unless someone has a better idea, adding back
phonon-backend-xine as a transitional package is a solution to fix
upgrades from squeeze to wheezy with the buggy apt from squeeze.
I updated my patch to re-add phonon-backend-xine as a transitional
package and verified that the upgrade path from squeeze is clean with
the new phonon-backend-xine being available.

I offer to NMU phonon (with the attached patch) if someone wnats to
sponsor this NMU.


Andreas
diffstat for phonon-4.6.0.0 phonon-4.6.0.0

 changelog |   10 ++
 control   |9 -
 2 files changed, 18 insertions(+), 1 deletion(-)

diff -Nru phonon-4.6.0.0/debian/changelog phonon-4.6.0.0/debian/changelog
--- phonon-4.6.0.0/debian/changelog	2012-05-02 13:55:41.0 +0200
+++ phonon-4.6.0.0/debian/changelog	2013-01-15 23:27:32.0 +0100
@@ -1,3 +1,13 @@
+phonon (4:4.6.0.0-2.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Add phonon-backend-xine transitional package, transition to the vlc
+backend. This fixes the Could not perform immediate configuration on
+'phonon-backend-vlc' apt error on upgrades from squeeze.
+(Closes: #669278)
+
+ -- Andreas Beckmann deb...@abeckmann.de  Tue, 15 Jan 2013 23:27:32 +0100
+
 phonon (4:4.6.0.0-2) unstable; urgency=low
 
   [ Debconf translation updates ]
diff -Nru phonon-4.6.0.0/debian/control phonon-4.6.0.0/debian/control
--- phonon-4.6.0.0/debian/control	2012-05-02 13:55:41.0 +0200
+++ phonon-4.6.0.0/debian/control	2013-01-15 23:24:03.0 +0100
@@ -26,7 +26,7 @@
 Suggests: phonon-backend-gstreamer,
   phonon-backend-mplayer,
   ${phonon:Recommended-Backend}
-Conflicts: phonon-backend-xine
+Breaks: phonon-backend-xine ( 4:4.6.0.0)
 Description: multimedia framework from KDE - metapackage
  Phonon is the Qt 4 multimedia API, which provides a task-oriented abstraction
  layer for capturing, mixing, processing, and playing audio and video content.
@@ -126,3 +126,10 @@
  This package contains debugging symbols for the Phonon library and its main
  back-ends. Install it if you want to report a crash or debug a problem with
  Phonon or its back-ends.
+
+Package: phonon-backend-xine
+Architecture: all
+Depends: phonon-backend-vlc
+Description: transitional package to aid switching to phonon-backend-vlc
+ This is a transitional dummy package to aid switching to phonon-backend-vlc.
+ It can be safely removed if nothing depends on it.


Processed: Re: please add phonon-backend-xine transitional package

2013-01-15 Thread Debian Bug Tracking System
Processing control commands:

 reassign -1 src:phonon 4.6.0.0-2
Bug #669278 [libqt4-dbus] please add phonon-backend-xine transitional package
Bug #669878 [libqt4-dbus] Could not perform immediate configuration on 
'phonon-backend-vlc'
Bug reassigned from package 'libqt4-dbus' to 'src:phonon'.
Bug reassigned from package 'libqt4-dbus' to 'src:phonon'.
No longer marked as found in versions konversation/1.4-1, 
kdebase-workspace-bin/4:4.8.4-3, kopete/4:4.8.4-1, qt4-x11/4:4.7.4-2, 
kdebase-workspace-bin/4:4.8.4-4, kdebase-workspace-bin/4:4.8.4-5, 
kdeutils/4:4.8.4+5.77, kraft/0.45-2, and digikam/4:2.6.0-1.
No longer marked as found in versions konversation/1.4-1, 
kdebase-workspace-bin/4:4.8.4-3, kopete/4:4.8.4-1, qt4-x11/4:4.7.4-2, 
kdebase-workspace-bin/4:4.8.4-4, kdebase-workspace-bin/4:4.8.4-5, kraft/0.45-2, 
kdeutils/4:4.8.4+5.77, and digikam/4:2.6.0-1.
Ignoring request to alter fixed versions of bug #669278 to the same values 
previously set
Ignoring request to alter fixed versions of bug #669878 to the same values 
previously set
Bug #669278 [src:phonon] please add phonon-backend-xine transitional package
Bug #669878 [src:phonon] Could not perform immediate configuration on 
'phonon-backend-vlc'
The source 'phonon' and version '4.6.0.0-2' do not appear to match any binary 
packages
Marked as found in versions phonon/4.6.0.0-2.
Marked as found in versions phonon/4.6.0.0-2.

-- 
669278: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669278
669878: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669878
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: tagging 697439, forcibly merging 668444 692930, tagging 669278

2013-01-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 697439 + pending
Bug #697439 [fglrx-driver] fglrx-driver: dkms fails to build with kernel 3.7
Added tag(s) pending.
 forcemerge 668444 692930
Bug #668444 [icedtea-netx] icedtea-netx: leaves alternatives after purge
Bug #692930 [icedtea-netx] icedtea-netx: doesn't remove alternative on purge
Severity set to 'important' from 'normal'
Marked as found in versions icedtea-web/1.2-2 and icedtea-web/1.3.1-1.
Merged 668444 692930
 tags 669278 + patch
Bug #669278 [src:phonon] please add phonon-backend-xine transitional package
Bug #669878 [src:phonon] Could not perform immediate configuration on 
'phonon-backend-vlc'
Added tag(s) patch.
Added tag(s) patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
668444: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668444
669278: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669278
669878: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669878
692930: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692930
697439: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697439
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#698248: odbcinst apparently ignores the -l option when used to uninstall a DSN

2013-01-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 698248 normal
Bug #698248 [odbcinst] odbcinst apparently ignores the -l option when used to 
uninstall a DSN
Severity set to 'normal' from 'serious'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
698248: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698248
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698248: odbcinst apparently ignores the -l option when used to uninstall a DSN

2013-01-15 Thread Steve Langasek
severity 698248 normal
thanks

On Tue, Jan 15, 2013 at 11:14:25PM +0100, José Manuel Santamaría Lema wrote:
 Package: odbcinst
 Version: 2.2.14p2-5
 Severity: serious
 Justification: makes odbcinst not very suitable for use in maintainer scripts

 while I'm filing this bug as serious, feel free to downgrade the severity
 of this bug if you think it's appropiate.  In any case imho a fix for this
 bug is worth to be included in wheezy.

I don't see anything serious about this bug.  I haven't heard of any other
packages using odbcinst for DSN registration, and I'm not sure it's really
appropriate for virtuoso to do so - how do you correctly handle the scenario
where the user has an existing system DSN named 'VOS' before installing your
package?  'VOS' is not a particularly collision-resistant name.

We allow the risk of collisions when installing drivers because drivers are
much more likely to be provided by the system, and clobbering a
locally-installed driver is much less likely to result in bugs.  Clobbering
an unrelated system DSN (with a very vague name, no less) is much more
likely to cause problems for the admin.

I would suggest that it would be more appropriate to set this up as a file
DSN; that way virtuoso has full control over it with no risk of colliding
with user settings.

 I've been working on the Virtuoso debian package. The maintainer scripts 
 relies on odbc, the prerm script uses odbcinst with the -l option, thus:
 odbcinst -u -s -l -n VOS
 however, apparently it doesn't perform the operation like if VOS where a 
 system DSN, but an user DSN. So I've just workarounded this bug using an 
 evironnment variable which, according to a comment in the odbcinst source 
 code, is suposed to override the program arguments:
 ODBCSEARCH=ODBC_SYSTEM_DSN odbcinst -u -s -l -n VOS
 When used this way I think it works as expected.

Given that a workaround is available, I definitely don't think this is a
serious bug.

 We noticed this bug when we where trying to fix a a piuparts error, for more 
 information, see:
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677286
 Also note that the reported gave kindly a quick list of other packages which 
 _might_  be affected:
 http://codesearch.debian.net/search?q=odbcinst.*-l+filetype%3Ashell

None of these hits are maintainer scripts.

Thanks,
-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
Ubuntu Developerhttp://www.debian.org/
slanga...@ubuntu.com vor...@debian.org


signature.asc
Description: Digital signature


Bug#696736: marked as done (Insecure permissions on database files)

2013-01-15 Thread Debian Bug Tracking System
Your message dated Wed, 16 Jan 2013 00:17:33 +
with message-id e1tvghb-0004fh...@franck.debian.org
and subject line Bug#696736: fixed in python-keyring 0.7.1-1+deb7u1
has caused the Debian Bug report #696736,
regarding Insecure permissions on database files
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
696736: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696736
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: python-keyring
Severity: grave
Tags: security

Please see 

http://www.openwall.com/lists/oss-security/2012/11/16/2
http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-5577.html
http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-5578.html

Cheers,
Moritz

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
---End Message---
---BeginMessage---
Source: python-keyring
Source-Version: 0.7.1-1+deb7u1

We believe that the bug you reported is fixed in the latest version of
python-keyring, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 696...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sebastian Ramacher sramac...@debian.org (supplier of updated python-keyring 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sun, 06 Jan 2013 22:22:33 +0100
Source: python-keyring
Binary: python-keyring python3-keyring
Architecture: source all
Version: 0.7.1-1+deb7u1
Distribution: testing-proposed-updates
Urgency: low
Maintainer: Carl Chenet cha...@ohmytux.com
Changed-By: Sebastian Ramacher sramac...@debian.org
Description: 
 python-keyring - store and access your passwords safely
 python3-keyring - store and access your passwords safely - Python 3 version of 
the
Closes: 675379 696736
Changes: 
 python-keyring (0.7.1-1+deb7u1) testing-proposed-updates; urgency=low
 .
   * Team upload.
   * debian/patches:
 - CVE-2012-4571.patch: backport CryptedFileKeyring from 0.9.3 to fix
   CVE-2012-4571. (Closes: #675379)
 - 696736-Fix-insecure-permissions-on-database-files.patch: backport fix
   from 0.9.2-1.1 to fix insecure permissions on database files. Fix
   CVE-2012-5578. Thanks Salvatore Bonaccorso. (Closes: #696736)
Checksums-Sha1: 
 e5fcff94564b8ebce26225c347d59986bbdc1d78 2178 python-keyring_0.7.1-1+deb7u1.dsc
 7d3edbe8d31c29ed684e4907f1e7615224486783 12305 
python-keyring_0.7.1-1+deb7u1.debian.tar.gz
 eec50b472ef8f3581278633b197d80559c78bb01 38496 
python-keyring_0.7.1-1+deb7u1_all.deb
 41f6ae9cdd1273442f934d5e517d91c857b58617 31576 
python3-keyring_0.7.1-1+deb7u1_all.deb
Checksums-Sha256: 
 b83f1fbe3ee9fc14e1358d10d2f2150e9857b0d644103e123a61460f1eeecc73 2178 
python-keyring_0.7.1-1+deb7u1.dsc
 ef4a62279ce089e9eb63d30b00f3e15453ef39637f21e744960d0456cf3f2e1f 12305 
python-keyring_0.7.1-1+deb7u1.debian.tar.gz
 9b179ec6805d4eae0790511b1298d8246cf5489fb81a20cb2893542e750826ac 38496 
python-keyring_0.7.1-1+deb7u1_all.deb
 90859bc94ef4fae485691ec02f4803e6cc658986bb8220f3d3be41808943738b 31576 
python3-keyring_0.7.1-1+deb7u1_all.deb
Files: 
 c294b880b21aa051feda968d15c53ece 2178 python optional 
python-keyring_0.7.1-1+deb7u1.dsc
 db06d83a0a3ed96ddffb7c225513abf7 12305 python optional 
python-keyring_0.7.1-1+deb7u1.debian.tar.gz
 abad2a4a11bca5957b3dbc367358787d 38496 python optional 
python-keyring_0.7.1-1+deb7u1_all.deb
 ed9743e0fb9e26247a52cedebe7b577d 31576 python optional 
python3-keyring_0.7.1-1+deb7u1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQIcBAEBCAAGBQJQ9fBMAAoJEGny/FFupxmT814QAI/E9IOJz5WmjsJrRcR6BOLU
6aXZfsbSEFlV/bQQ/wTatb8xuISia//JsvZL2uzRM+uBIL5rnlTV6237a8Y3TQqK
RvT3HLLjFCWJIsK83aBoUFVB3ZdyI/40oYemaJjhoihVXF+ojd8/g4w+Yyvxid/v
mcr00I37EdqNbYSVuOsZ8RlUZmAge8SJD0oKGImPYLSgVCARltnEA6HlgqdQQBBP
ox0WaLsUeP4KecTAhqJxSHts5ZjUiyzF3dEu0hir8zo0e0hx+zKzjrBjg46j+etb
1XcsWq6lrpbEY+VfgjsCiCQJJURDt8zPg0vqLazOj/SMGJlBti98ba2MM6qFQFUb

Bug#698259: guilt: Maintainer address does not accept mail

2013-01-15 Thread Jonathan Nieder
Source: guilt
Version: 0.35-1
Severity: serious
Justification: policy 3.3

Hi,

The address iul...@linux.com seems to be out of date.  Do you happen to
know a more recent one?

Thanks,
Jonathan
---BeginMessage---
Delivery to the following recipient failed permanently:

 iul...@linux.com

Technical details of permanent failure: 
Google tried to deliver your message, but it was rejected by the recipient 
domain. We recommend contacting the other email provider for further 
information about the cause of this error. The error that the other server 
returned was: 550 550 5.1.1 iul...@linux.com: Recipient address rejected: 
User unknown in virtual alias table (state 13).

- Original message -

DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=gmail.com; s=20120113;
h=x-received:date:from:to:cc:subject:message-id:references
 :mime-version:content-type:content-disposition:in-reply-to
 :user-agent;
bh=5R77SXo5cl/kTRPyQ+w6XB9KL6CyQ3iNYS4jGh5viJI=;
b=sCTr9rFLYRw1/L0/c1tcb5qtrMYE/l9WJHx7ciNzSwpVx4ZUroI+HyL887JaTIh6AI
 KVH3FXascYIJkFgnHKxQIxcLSFEnQY5zwCMJ2P6UKUD9VMWp2iCJljuXRtqI6PdR4N7t
 MetjkGv2tbkxAOx/YU0M5rNFVkiPP5ovS0uyy/TB8UydlICHr7QUtI6EedYUdg7VrXac
 b+SGtfW3NXpQbcwiChYpeLU/1mx7dvcI4PWRUwH7/0dV4bYEdi+vvl2blMOLbRyBf8kq
 bfG5MEI+ijyReqNnRFoxUWvgpP2ZoFhlMdif5I5hodj8dInXZwBgLP0vupdL8e9kwvJT
 +uMw==
X-Received: by 10.68.226.71 with SMTP id rq7mr270522746pbc.60.1358303508667;
Tue, 15 Jan 2013 18:31:48 -0800 (PST)
Return-Path: jrnie...@gmail.com
Received: from google.com ([2620:0:1000:5b00:b6b5:2fff:fec3:b50d])
by mx.google.com with ESMTPS id gj1sm11299307pbc.11.2013.01.15.18.31.46
(version=TLSv1.2 cipher=RC4-SHA bits=128/128);
Tue, 15 Jan 2013 18:31:47 -0800 (PST)
Date: Tue, 15 Jan 2013 18:31:44 -0800
From: Jonathan Nieder jrnie...@gmail.com
To: Josef 'Jeff' Sipek jef...@josefsipek.net
Cc: g...@vger.kernel.org, Per Cederqvist ced...@opera.com,
Theodore Ts'o ty...@mit.edu, Iulian Udrea iul...@linux.com,
Axel Beckert a...@deuxchevaux.org
Subject: [GUILT]  [PATCH 7/7] Drop unneeded git version check.
Message-ID: 20130116023144.gp12...@google.com
References: 20130116022606.gi12...@google.com
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: 20130116022606.gi12...@google.com
User-Agent: Mutt/1.5.21 (2010-09-15)

Git's compatibility record is pretty good, so there's no need to worry
that newer versions of git will break the git config command.

Without this change, guilt errors out for git 1.8.  With it, all tests
pass.

Signed-off-by: Jonathan Nieder jrnie...@gmail.com
---
Thanks for reading.

 guilt | 11 ---
 1 file changed, 11 deletions(-)

diff --git a/guilt b/guilt
index 66a671a..6cb43e3 100755
--- a/guilt
+++ b/guilt
@@ -26,17 +26,6 @@ SUBDIRECTORY_OK=1
 . $(git --exec-path)/git-sh-setup
 
 #
-# Git version check
-#
-gitver=`git --version | cut -d' ' -f3 | sed -e 's/^debian\.//'`
-case $gitver in
-   1.5.*)  ;; # git config
-   1.6.*)  ;; # git config
-   1.7.*)  ;; # git config
-   *)  die Unsupported version of git ($gitver) ;;
-esac
-
-#
 # Shell library
 #
 usage()
-- 
1.8.1

---End Message---


Bug#683188: increasing severity

2013-01-15 Thread Olly Betts
On Sun, Jul 29, 2012 at 08:34:36PM +0200, Erich Schubert wrote:
 A partial bisection of python-subversion via snapshot.debian.org
 shows that the problem already existed in -3.1 but did not exist in
 -1. I did not test -2 and -3 yet.
 
 -2 has swig-related changes:
 
 * patches/swig2-compat: New patch from upstream to build with swig 2.x.
  (Closes: #634049)
 
 However, it may well be that this change is actually caused by Debian
 having migrated to Swig 2, too.

I believe this is due to a bug in SWIG which was fixed upstream in 2.0.7:

2012-05-22: szager
[python] Disambiguate SWIG_From_unsigned_SS_int and 
SWIG_From_unsigned_SS_long.

This was r13106 in SWIG's SVN repo (now migrated to git, but I don't have
the corresponding git commit hash to hand).

Testing already has SWIG 2.0.7, so rebuilding python-subversion should fix
this if SWIG is run during the build.

Cheers,
Olly


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#695721: marked as done (gcl: includes non-free documentation (GFDL with unmodifiable sections))

2013-01-15 Thread Debian Bug Tracking System
Your message dated Wed, 16 Jan 2013 02:47:58 +
with message-id e1tvj2k-0004hb...@franck.debian.org
and subject line Bug#695721: fixed in gcl 2.6.7+dfsga-1
has caused the Debian Bug report #695721,
regarding gcl: includes non-free documentation (GFDL with unmodifiable sections)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
695721: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695721
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---

Source: gcl
Version: 2.6.7-108
Severity: serious
Justification: Policy 2.2.1
Usertags: gfdl

gmp3/gmp.* contains GNU MP library documentation, with the following license:

Permission is granted to copy, distribute and/or modify this document 
under the terms of the GNU Free Documentation License, Version 1.1 or 
any later version published by the Free Software Foundation; with no 
Invariant Sections, with the Front-Cover Texts being A GNU Manual, and 
with the Back-Cover Texts being You have freedom to copy and modify 
this GNU Manual, like GNU software.



As per GR 2006-001, works licensed under GFDL with unmodifiable sections 
are not suitable for main:

http://www.debian.org/vote/2006/vote_001

--
Jakub Wilk
---End Message---
---BeginMessage---
Source: gcl
Source-Version: 2.6.7+dfsga-1

We believe that the bug you reported is fixed in the latest version of
gcl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 695...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Camm Maguire c...@debian.org (supplier of updated gcl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 15 Jan 2013 20:46:25 +
Source: gcl
Binary: gcl gcl-doc
Architecture: source all i386
Version: 2.6.7+dfsga-1
Distribution: unstable
Urgency: high
Maintainer: Camm Maguire c...@debian.org
Changed-By: Camm Maguire c...@debian.org
Description: 
 gcl- GNU Common Lisp compiler
 gcl-doc- Documentation for GNU Common Lisp
Closes: 691946 695721
Changes: 
 gcl (2.6.7+dfsga-1) unstable; urgency=high
 .
   * Acknowledge Non-maintainer upload.
   (thanks David Prévot taf...@debian.org)
   * Remove unused and non DFSG-compliant gmp3/gmp.* from source.
   (Closes: #695721)
   * Show translated debconf templates, thanks to Denis Barbier for the
 analysis and the proposed fixes. (Closes: #691946)
   * trim excess digits from printed floats
Checksums-Sha1: 
 426ac25f330157d4efda36c0e54245a553d2296f 1216 gcl_2.6.7+dfsga-1.dsc
 977b1f56bfbfb477f4a1af038336e6d7f0f45577 8147123 gcl_2.6.7+dfsga.orig.tar.gz
 93976044ece54c4fd87078fab2c75f742a1404a1 5201724 
gcl_2.6.7+dfsga-1.debian.tar.gz
 2da24e08afc4acda2865a7d63b2a54aa70bb4acd 610128 gcl-doc_2.6.7+dfsga-1_all.deb
 21fbb541e2296d16e738a09e3ae50f16c555a3d0 22204908 gcl_2.6.7+dfsga-1_i386.deb
Checksums-Sha256: 
 7743efa6460019b8735fa6e8800f0ee8ccd074322ce2d2eaa3fddae319851ebf 1216 
gcl_2.6.7+dfsga-1.dsc
 de4722d45e5c0b8b22540159b89b3ecfe6fc78e29b6b49e545822616a463d60b 8147123 
gcl_2.6.7+dfsga.orig.tar.gz
 8a22a1d0df550036dd0999e6746a77009e23af6a452d9eef0c4594fc851767ae 5201724 
gcl_2.6.7+dfsga-1.debian.tar.gz
 73a4eeac964b649c030066b3cc5868a0f8bdd61b0c70b2faa4d5c616fe0db51e 610128 
gcl-doc_2.6.7+dfsga-1_all.deb
 b160d73a72e7ff258305a3133bb4bb4475f53275182ee2841f6eac7c9b91903f 22204908 
gcl_2.6.7+dfsga-1_i386.deb
Files: 
 c1fbfe691c8b39d6f6b8dedd7d87b006 1216 lisp optional gcl_2.6.7+dfsga-1.dsc
 365e15f91285c6a67c5fb9f0503eda5a 8147123 lisp optional 
gcl_2.6.7+dfsga.orig.tar.gz
 f8189feab6bdd9392950bf34a335f5db 5201724 lisp optional 
gcl_2.6.7+dfsga-1.debian.tar.gz
 f85921956182145ec0d8060c65dd732e 610128 doc optional 
gcl-doc_2.6.7+dfsga-1_all.deb
 1b995d7db24b6acf3bec509e48350dd2 22204908 lisp optional 
gcl_2.6.7+dfsga-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlD2A0MACgkQczG1wFfwRdzZPACfQNRqfB8N+/SOT59j3dlaoCVn
f+kAniPOyaB3kV7asvIBJr8+L4BrWkXx
=8mJ7
-END PGP SIGNATUREEnd Message---


Processed: unarchiving 679717, found 679717 in 0.1-1.3

2013-01-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 unarchive 679717
Bug #679717 {Done: Rene Engelhard r...@rene-engelhard.de} [accessodf] 
accessodf: unowned files after purge (policy 6.8, 10.8)
Unarchived Bug 679717
 found 679717 0.1-1.3
Bug #679717 {Done: Rene Engelhard r...@rene-engelhard.de} [accessodf] 
accessodf: unowned files after purge (policy 6.8, 10.8)
Marked as found in versions accessodf/0.1-1.3; no longer marked as fixed in 
versions accessodf/0.1-1.3 and reopened.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
679717: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=679717
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#679717: accessodf: unowned files after purge (policy 6.8, 10.8)

2013-01-15 Thread Andreas Beckmann
Followup-For: Bug #679717

Hi,

unopkg can be really nasty :-) The HOME=$INSTDIR workaround requires the
$INSTDIR to actually exist, otherwise it will fall back to /root and
create the libreoffice/3 tree there ...

I'm attaching a patch that unifies and simplifies the creation and
removal of $INSTDIR in all three maintainer scripts. Previously there
was a possibility to create/remove INSTDIR several times per script,
leaving tempdirs behind or running unopkg without existing HOME=$INSTDIR.
Now the package nearly passes the piuparts test.

But there is still an unowned file being left after purge:

0m40.6s ERROR: FAIL: Package purging left files on system:
  /usr/lib/ure/share/config/ not owned
  /usr/lib/ure/share/config/javasettingsunopkginstall.xmlnot owned

which is probably a different issue.

Andreas


accessodf_0.1-1.3.log.gz
Description: GNU Zip compressed data
diffstat for accessodf-0.1 accessodf-0.1

 changelog |   12 +++-
 postinst  |6 +++---
 preinst   |6 ++
 prerm |4 ++--
 4 files changed, 18 insertions(+), 10 deletions(-)

diff -Nru accessodf-0.1/debian/changelog accessodf-0.1/debian/changelog
--- accessodf-0.1/debian/changelog	2012-11-02 12:33:21.0 +0100
+++ accessodf-0.1/debian/changelog	2013-01-16 05:57:15.0 +0100
@@ -1,8 +1,18 @@
+accessodf (0.1-1.4) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * {pre,post}inst, prerm: Simplify and unify the creation and removal of
+$INSTDIR. The temporary HOME=$INSTDIR needs to exist otherwise unopkg will
+fall back to /root/ and create a libreoffice/3/ hierarchy there.
+(Closes: #679717)
+
+ -- Andreas Beckmann deb...@abeckmann.de  Wed, 16 Jan 2013 05:57:15 +0100
+
 accessodf (0.1-1.3) unstable; urgency=low
 
   * Non-maintainer upload.
   * oops, forgot a unopkg in preinst, thanks Andreas Beckmann
-(closes: #679717) 
+(closes: #679717)
 
  -- Rene Engelhard r...@rene-engelhard.de  Fri, 02 Nov 2012 12:32:50 +0100
 
diff -Nru accessodf-0.1/debian/postinst accessodf-0.1/debian/postinst
--- accessodf-0.1/debian/postinst	2012-10-23 19:53:33.0 +0200
+++ accessodf-0.1/debian/postinst	2013-01-16 05:52:25.0 +0100
@@ -9,17 +9,17 @@
 
 add_extension() {
 echo -n Adding extension $1...
-INSTDIR=`mktemp -d`
 HOME=$INSTDIR unopkg add --shared $1 \
 -env:UserInstallation=file:///$INSTDIR \
 '-env:UNO_JAVA_JFW_INSTALL_DATA=$ORIGIN/../share/config/javasettingsunopkginstall.xml' \
 -env:JFW_PLUGIN_DO_NOT_CHECK_ACCESSIBILITY=1
-if [ -n $INSTDIR ]; then rm -rf $INSTDIR; fi
 echo  done.
 }
 
-if [ $1 = configure -o $1 = upgrade ]; then
+if [ $1 = configure ]; then
+INSTDIR=`mktemp -d`
 add_extension /usr/share/accessodf/AccessODF.oxt
+rm -rf $INSTDIR
 fi
 
 #DEBHELPER#
diff -Nru accessodf-0.1/debian/preinst accessodf-0.1/debian/preinst
--- accessodf-0.1/debian/preinst	2012-11-02 12:32:32.0 +0100
+++ accessodf-0.1/debian/preinst	2013-01-16 05:52:26.0 +0100
@@ -7,19 +7,16 @@
 set -e
 
 flush_unopkg_cache() {
-	INSTDIR=`mktemp -d`
 HOME=$INSTDIR unopkg list --shared -env:JFW_PLUGIN_DO_NOT_CHECK_ACCESSIBILITY=1  /dev/null 21
 }
 
 remove_extension() {
-  INSTDIR=`mktemp -d`
   if HOME=$INSTDIR unopkg list --shared $1 /dev/null; then
 echo -n Removing extension $1...
 HOME=$INSTDIR unopkg remove --shared $1 \
   -env:UserInstallation=file://$INSTDIR \
   '-env:UNO_JAVA_JFW_INSTALL_DATA=$ORIGIN/../share/config/javasettingsunopkginstall.xml' \
   -env:JFW_PLUGIN_DO_NOT_CHECK_ACCESSIBILITY=1
-if [ -n $INSTDIR ]; then rm -rf $INSTDIR; fi
 echo  done.
 flush_unopkg_cache
   fi
@@ -27,13 +24,14 @@
 
 case $1 in
 upgrade|install)
-	INSTDIR=`mktemp -d`
+INSTDIR=`mktemp -d`
 echo Removing old accessodf extensions.
 id= 
 while [ $id !=   ]; do
 id=`HOME=$INSTDIR unopkg list --shared | egrep '^(Name|Identifier):.*accessodf' | cut -d: -f2 | head -n 1`
 if [ $id !=  ]; then remove_extension $id; fi
 done
+rm -rf $INSTDIR
 ;;
 esac
 
diff -Nru accessodf-0.1/debian/prerm accessodf-0.1/debian/prerm
--- accessodf-0.1/debian/prerm	2012-10-23 19:48:44.0 +0200
+++ accessodf-0.1/debian/prerm	2013-01-16 05:51:52.0 +0100
@@ -10,14 +10,12 @@
 }
 
 remove_extension() {
-INSTDIR=`mktemp -d`
 if HOME=$INSTDIR unopkg list --shared $1 /dev/null; then
 echo -n Removing extension $1...
 HOME=$INSTDIR unopkg remove --shared $1 \
 -env:UserInstallation=file://$INSTDIR \
 '-env:UNO_JAVA_JFW_INSTALL_DATA=$ORIGIN/../share/config/javasettingsunopkginstall.xml' \
 -env:JFW_PLUGIN_DO_NOT_CHECK_ACCESSIBILITY=1
-if [ -n $INSTDIR ]; then rm -rf $INSTDIR; fi
 echo  done.
 flush_unopkg_cache
 fi
@@ -25,7 +23,9 @@
 
 case $1 in
 remove)
+INSTDIR=`mktemp -d`
 remove_extension be.docarch.accessodf.ooo.accessodfaddon
+rm -rf 

Bug#698024: how is this done?

2013-01-15 Thread Antoine Beaupré
I don't understand why this bug report was closed. It was explicitely
about having a stable version for wheezy, and the response was to use
the version from sid - how does that help with the actual issue?

I understand that the sid version fixes issues, and that's great, but I
think this issue will really be solved when that sid version migrates to
wheezy, and from what I understand, this will require a freeze
exception.

Also note that some issues, like the rescue package list (#694823), are
still broken in sid: the package list was just removed, and the one in
live-images still has 'ettercap-text-only', not available in wheezy.

A.

-- 
Nothing incites to money-crimes like great poverty or great wealth.
- Mark Twain


pgp7aEn1NhoBY.pgp
Description: PGP signature


Bug#698024: how is this done?

2013-01-15 Thread Daniel Baumann

On 01/16/2013 06:47 AM, Antoine Beaupré wrote:

I don't understand why this bug report was closed.


as indicated when closing the bug, it doesn't serve any purpose.


the one in live-images still has 'ettercap-text-only', not available in wheezy.


'still'?

first, you didn't report that. second, ettercap was only removed on 
2013-01-10 from wheezy.


--
Address:Daniel Baumann, Donnerbuehlweg 3, CH-3012 Bern
Email:  daniel.baum...@progress-technologies.net
Internet:   http://people.progress-technologies.net/~daniel.baumann/


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: retitle 688849 to ffmpeg/squeeze/stable: multiple CVEs that need further investigation

2013-01-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 retitle 688849 ffmpeg/squeeze/stable: multiple CVEs that need further 
 investigation
Bug #688849 [src:ffmpeg] libav: multiple CVEs in ffmpeg/libav
Changed Bug title to 'ffmpeg/squeeze/stable: multiple CVEs that need further 
investigation' from 'libav: multiple CVEs in ffmpeg/libav'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
688849: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688849
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#696424: Possible patch

2013-01-15 Thread Salvatore Bonaccorso
Hi David and Guido

Thanks for the further update. Guido are you sponsoring also this
upload from David (as you might better know sanlock). If you have not
time at the moment I can try to to upload David's update in the
comming days.

Regards,
Salvatore


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed (with 1 errors): reassigning to xorg

2013-01-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 reassign 692814 xserver-xorg
Bug #692814 [gdm3] gdm3 is not staring normally
Bug reassigned from package 'gdm3' to 'xserver-xorg'.
No longer marked as found in versions gdm3/3.6.1-1 and gdm3/3.6.1-2.
Ignoring request to alter fixed versions of bug #692814 to the same values 
previously set
 reassign 692814 X crash with gdm3 on boot and with kdm on first logout
Unknown command or malformed arguments to command.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
692814: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692814
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#696424: Possible patch

2013-01-15 Thread Guido Günther
Hi Salvatore,
On Wed, Jan 16, 2013 at 08:20:26AM +0100, Salvatore Bonaccorso wrote:
 Hi David and Guido
 
 Thanks for the further update. Guido are you sponsoring also this
 upload from David (as you might better know sanlock). If you have not
 time at the moment I can try to to upload David's update in the
 comming days.

I'd be great if you could sponsor this since you ironed out all the
details with David!
Cheers,
 -- Guido

 
 Regards,
 Salvatore
 


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: retitle correctly

2013-01-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 retitle 692814 X crash with gdm3 on boot and with kdm on first logout
Bug #692814 [xserver-xorg] gdm3 is not staring normally
Changed Bug title to 'X crash with gdm3 on boot and with kdm on first logout' 
from 'gdm3 is not staring normally'
 found 692814 1:7.7+1
Bug #692814 [xserver-xorg] X crash with gdm3 on boot and with kdm on first 
logout
Marked as found in versions xorg/1:7.7+1.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
692814: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692814
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org