Bug#698211: segfault when start
Package: chromium Version: 22.0.1229.94~r161065+dfsg-0.1 Severity: grave romium [1]3051 segmentation fault chromium i Using Linux foothold.ru 2.6.32-5-amd64 #1 SMP Sun May 6 04:00:17 UTC 2012 x86_64 GNU/Linux Debug Report: __ $ chromium --debug # Env: # LD_LIBRARY_PATH=/usr/lib/chromium:/usr/lib/xulrunner-1.9.1 # PATH=/usr/lib/chromium:/usr/local/bin:/usr/bin:/bin:/usr/bin/X11:/usr/games #GTK_PATH= # CHROMIUM_USER_FLAGS= # CHROMIUM_FLAGS=--password-store=detect /usr/bin/gdb /usr/lib/chromium/chromium -x /tmp/chromiumargs.WEcehK GNU gdb (GDB) 7.4.1-debian Copyright (C) 2012 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type show copying and show warranty for details. This GDB was configured as x86_64-linux-gnu. For bug reporting instructions, please see: http://www.gnu.org/software/gdb/bugs/... Reading symbols from /usr/lib/chromium/chromium...(no debugging symbols found)...done. (gdb) r Starting program: /usr/lib/chromium/chromium --password-store=detect [Thread debugging using libthread_db enabled] Using host libthread_db library /lib/x86_64-linux-gnu/libthread_db.so.1. [New Thread 0x7fffe5126700 (LWP 3816)] [New Thread 0x7fffe42d0700 (LWP 3817)] [New Thread 0x7fffe3acf700 (LWP 3818)] [New Thread 0x7fffe32ce700 (LWP 3819)] [New Thread 0x73678700 (LWP 3820)] [New Thread 0x7fffe2200700 (LWP 3821)] [New Thread 0x7fffe19ff700 (LWP 3822)] [New Thread 0x7fffe11fe700 (LWP 3823)] [New Thread 0x7fffe09fd700 (LWP 3824)] [New Thread 0x7fffdbfff700 (LWP 3825)] [New Thread 0x7fffdb7fe700 (LWP 3826)] [New Thread 0x7fffdaffd700 (LWP 3827)] [New Thread 0x7fffe01fc700 (LWP 3828)] [New Thread 0x7fffe01db700 (LWP 3829)] [New Thread 0x7fffe01ba700 (LWP 3830)] [New Thread 0x7fffda7fc700 (LWP 3832)] [New Thread 0x7fffd960f700 (LWP 3833)] Program received signal SIGSEGV, Segmentation fault. [Switching to Thread 0x7fffe01ba700 (LWP 3830)] 0x7fffec3ef0f5 in ?? () from /lib/x86_64-linux-gnu/libc.so.6 (gdb) bt full #0 0x7fffec3ef0f5 in ?? () from /lib/x86_64-linux-gnu/libc.so.6 No symbol table info available. #1 0x7fffec3ef2aa in ?? () from /lib/x86_64-linux-gnu/libc.so.6 No symbol table info available. #2 0x7fffec3abd67 in getaddrinfo () from /lib/x86_64-linux-gnu/libc.so.6 No symbol table info available. #3 0x7458e6ef in ?? () No symbol table info available. #4 0x74586ac7 in ?? () No symbol table info available. #5 0x7452e500 in ?? () No symbol table info available. #6 0x74528011 in ?? () No symbol table info available. #7 0x7fffedd92b50 in start_thread () from /lib/x86_64-linux-gnu/libpthread.so.0 No symbol table info available. #8 0x7fffec3cd70d in clone () from /lib/x86_64-linux-gnu/libc.so.6 No symbol table info available. #9 0x in ?? () No symbol table info available. (gdb) info register rax0x4c01216 rbx0x3e 62 rcx0x0 0 rdx0x7fffe01b8e40 140736953290304 rsi0x7fffe01b8e5c 140736953290332 rdi0x7fffe019afe0 140736953167840 rbp0x7fffe01b9620 0x7fffe01b9620 rsp0x7fffe019afe0 0x7fffe019afe0 r8 0x0 0 r9 0x7fffe01b8e50 140736953290320 r100x0 0 r110x2 2 r120x7fffe01b9570 140736953292144 r130x7fffe01b95e0 140736953292256 r140x7fffe01b8500 140736953287936 r150xfef8179b 4277671835 rip0x7fffec3ef0f5 0x7fffec3ef0f5 eflags 0x10246 [ PF ZF IF RF ] cs 0x33 51 ss 0x2b 43 ds 0x0 0 es 0x0 0 fs 0x0 0 gs 0x0 0 -- System Information: Debian Release: 6.0.5 APT prefers testing-proposed-updates APT policy: (500, 'testing-proposed-updates'), (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/24 CPU cores) Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages chromium depends on: ii chromium-inspector 21.0.1180.89~r154005-1 ii gconf-service 3.2.5-1+build1 ii libasound2 1.0.25-4 ii libatk1.0-0 2.4.0-2 ii libbz2-1.0 1.0.6-4 ii libc6 2.13-35 ii libcairo2 1.12.2-2 ii libcups21.5.3-1 ii libdbus-1-3 1.6.0-1 ii libevent-2.0-5 2.0.19-stable-3 ii libexpat1 2.1.0-1 ii libflac81.2.1-6 ii libfontconfig1 2.9.0-7 ii libfreetype62.4.9-1 ii libgcc1 1:4.7.2-4 ii libgconf-2-43.2.5-1+build1 ii libgcrypt11 1.5.0-3 ii libgdk-pixbuf2.0-0 2.26.1-1 ii libglib2.0-02.32.3-1 ii libgnome-keyring0
Bug#697901: marked as done (c2html and scheme9: error when trying to install together)
Your message dated Tue, 15 Jan 2013 09:17:41 + with message-id e1tv2el-0006cc...@franck.debian.org and subject line Bug#697901: fixed in scheme9 2013.01.09-2 has caused the Debian Bug report #697901, regarding c2html and scheme9: error when trying to install together to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 697901: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697901 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: scheme9,c2html Version: scheme9/2012.12.17-1 Version: c2html/0.9.6-3 Severity: serious User: trei...@debian.org Usertags: edos-file-overwrite Date: 2013-01-10 Architecture: amd64 Distribution: sid Hi, automatic installation tests of packages that share a file and at the same time do not conflict by their package dependency relationships has detected the following problem: WARNING: The following packages cannot be authenticated! c2html scheme9 Authentication warning overridden. Can not write log, openpty() failed (/dev/pts not mounted?) Selecting previously unselected package c2html. (Reading database ... 10762 files and directories currently installed.) Unpacking c2html (from .../c2html_0.9.6-3_amd64.deb) ... Selecting previously unselected package scheme9. Unpacking scheme9 (from .../scheme9_2012.12.17-1_amd64.deb) ... dpkg: error processing /var/cache/apt/archives/scheme9_2012.12.17-1_amd64.deb (--unpack): trying to overwrite '/usr/bin/c2html', which is also in package c2html 0.9.6-3 dpkg-deb: error: subprocess paste was killed by signal (Broken pipe) Processing triggers for man-db ... Errors were encountered while processing: /var/cache/apt/archives/scheme9_2012.12.17-1_amd64.deb E: Sub-process /usr/bin/dpkg returned an error code (1) This is a serious bug as it makes installation fail, and violates sections 7.6.1 and 10.1 of the policy. An optimal solution would consist in only one of the packages installing that file, and renaming or removing the file in the other package. Depending on the circumstances you might also consider Replace relations or file diversions. If the conflicting situation cannot be resolved then, as a last resort, the two packages have to declare a mutual Conflict. Please take into account that Replaces, Conflicts and diversions should only be used when packages provide different implementations for the same functionality. Here is a list of files that are known to be shared by both packages (according to the Contents file for sid/amd64, which may be slightly out of sync): /usr/bin/c2html This bug has been filed against both packages. If you, the maintainers of the two packages in question, have agreed on which of the packages will resolve the problem please reassign the bug to that package. You may then also register in the BTS that the other package is affected by the bug. -Ralf. PS: for more information about the detection of file overwrite errors of this kind see http://edos.debian.net/file-overwrites/. ---End Message--- ---BeginMessage--- Source: scheme9 Source-Version: 2013.01.09-2 We believe that the bug you reported is fixed in the latest version of scheme9, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 697...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Barak A. Pearlmutter b...@debian.org (supplier of updated scheme9 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 15 Jan 2013 09:06:11 + Source: scheme9 Binary: scheme9 Architecture: source amd64 Version: 2013.01.09-2 Distribution: unstable Urgency: low Maintainer: Barak A. Pearlmutter b...@debian.org Changed-By: Barak A. Pearlmutter b...@debian.org Description: scheme9- Scheme 9 from Empty Space R4RS Scheme interpreter Closes: 697901 Changes: scheme9 (2013.01.09-2) unstable; urgency=low . * Add s9 prefix to names of generically named binaries: - /usr/bin/advgen to /usr/bin/s9advgen - /usr/bin/c2html to /usr/bin/s9c2html (closes: #697901) - /usr/bin/colsto /usr/bin/s9cols - /usr/bin/dupes to /usr/bin/s9dupes - /usr/bin/edocto /usr/bin/s9edoc - /usr/bin/htmlify to /usr/bin/s9htmlify - /usr/bin/scm2html
Processed: found 689119 in 1.25-6~exp1, affects 697085, found 695898 in 4.0.1-3, found 695899 in .log ...
Processing commands for cont...@bugs.debian.org: found 689119 1.25-6~exp1 Bug #689119 [njam] njam: highscore file munging deletes a shipped file during installation Marked as found in versions njam/1.25-6~exp1. affects 697085 + qemu Bug #697085 [qemu-system] qemu-system: tries to overwrite doc/qemu/qemu-doc.html from qemu (missing Breaks+Replaces?) Added indication that 697085 affects qemu found 695898 4.0.1-3 Bug #695898 [php-horde-passwd] php-horde-passwd: not installable in sid, depends on old php-horde Marked as found in versions php-horde-passwd/4.0.1-3. found 695899 .log Bug #695899 [php-horde-whups] php-horde-whups: not installable in sid, depends on old php-horde There is no source info for the package 'php-horde-whups' at version '.log' with architecture '' Unable to make a source version for version '.log' Marked as found in versions .log. found 695900 1.0.2-3 Bug #695900 [php-horde-wicked] php-horde-wicked: not installable in sid, depends on old php-horde Marked as found in versions php-horde-wicked/1.0.2-3. thanks Stopping processing here. Please contact me if you need assistance. -- 689119: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689119 695898: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695898 695899: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695899 695900: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695900 697085: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697085 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: tagging 697085
Processing commands for cont...@bugs.debian.org: tags 697085 + confirmed pending Bug #697085 [qemu-system] qemu-system: tries to overwrite doc/qemu/qemu-doc.html from qemu (missing Breaks+Replaces?) Added tag(s) confirmed and pending. thanks Stopping processing here. Please contact me if you need assistance. -- 697085: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697085 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: notfound 695899 in .log, found 695899 in 2.0.2-3
Processing commands for cont...@bugs.debian.org: notfound 695899 .log Bug #695899 [php-horde-whups] php-horde-whups: not installable in sid, depends on old php-horde There is no source info for the package 'php-horde-whups' at version '.log' with architecture '' Unable to make a source version for version '.log' No longer marked as found in versions .log. found 695899 2.0.2-3 Bug #695899 [php-horde-whups] php-horde-whups: not installable in sid, depends on old php-horde Marked as found in versions php-horde-whups/2.0.2-3. thanks Stopping processing here. Please contact me if you need assistance. -- 695899: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695899 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: RE: sudo: setresuid(ROOT_UID, ROOT_UID, ROOT_UID): Operation not permitted
Processing commands for cont...@bugs.debian.org: found 658896 1.8.5p2-1 Bug #658896 [sudo] sudo: setresuid(ROOT_UID, ROOT_UID, ROOT_UID): Operation not permitted Marked as found in versions sudo/1.8.5p2-1. severity 658896 serious Bug #658896 [sudo] sudo: setresuid(ROOT_UID, ROOT_UID, ROOT_UID): Operation not permitted Severity set to 'serious' from 'important' thanks Stopping processing here. Please contact me if you need assistance. -- 658896: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=658896 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#696424: Possible patch
Hi Salvatore Hi David On Thu, Jan 10, 2013 at 10:16:35AM +, David Weber wrote: Hi David On Mon, Jan 07, 2013 at 09:06:53AM +, David Weber wrote: Attached is the debdiff contianing these three refreshed for the version in unstable and testing. But I'm not yet ready to propose a NMU. Testing of the resulting package is welcome! Thanks for the debdiff! It works as expected: It creates the files with the right permissions without breaking functionality. A problem could be that the files aren't freshly created by a simple restart of the daemon. Should something be done about that? Some options could be: - Notify the user to stop libvirtd and sanlock and run rm /var/run/sanlock/sanlock.sock; rm /var/log/sanlock.log - Change the file permissions through the package update - Do nothing because most likely nobody uses sanlock on Debain atm. I have not a final answer here, but it might be easy to implement like libvirt-bin does in postint, mabye only conditionally checking (so doing it during package update from a 'broken' version): [...] if ! dpkg-statoverride --list /var/log/sanlock.log /dev/null 21; then # fix permissions fi [...] and the same for /var/run/sanlock/sanlock.sock. Great hint. I modified the patch in that way and also added the fix for #689696 Btw, after thinking about further on it: As both /var/log/sanlock.log and /var/run/sanlock/sanlock.sock are not files installed by the package, I think the check with dpkg-statoverride is in this case wrong! Sorry about the wrong suggestion. So I think it's best to remove this again. Ops, thats right. I now check the permissions and change them in case they are wrong Regarding the second: I suggest to include in this upload only fixes compliant with the freeze policy: [1]: http://release.debian.org/wheezy/freeze_policy.html (but I have not looked if #689696 can be considered RC). Since it is a build fix, I guess it classifys +sanlock (2.2-1.1) unstable; urgency=low + + * Fix CVE-2012-5638 sanlock world writable /var/log/sanlock.log. Thanks to Salvatore Bonaccorso (Closes: #696424) would wrap this line + Add patches cherry-picked from git repository: + - 0001-sanlock-remove-umask-0.patch + - 0001-sanlock-use-lockfile-mode-644.patch + - 0001-wdmd-use-lockfile-mode-644.patch + * Replace restrict field name (Closes: #689696) + Add patche cherry.picked from git repository: ^ s{patche}{patch} and s{cherry.picked}{cherry picked} Ops, fixed Again thanks for your work! Thank you too! Regards, Salvatore Cheers, David To: car...@debian.org 696...@bugs.debian.org Cc: martin.quin...@loria.fr j...@inutil.org a...@sigxcpu.org sanlock_cve2.debdiff Description: Binary data
Processed: usertagging 697665, tagging 697665
Processing commands for cont...@bugs.debian.org: usertag 697665 depends-on-fuse-utils User is pra...@yahoo.com There were no usertags set. Usertags are now: depends-on-fuse-utils. tags 697665 + sid Bug #697665 [fusesmb] fusesmb: Impossible to install package due to unmet dependencies Added tag(s) sid. thanks Stopping processing here. Please contact me if you need assistance. -- 697665: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697665 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698108: java-package: diff for NMU version 0.50+nmu2
On 01/14/2013 11:48 PM, Niels Thykier wrote: On 2013-01-15 00:57, David Prévot wrote: tags 698108 + patch thanks Dear maintainer, I've prepared an NMU for java-package (versioned as 0.50+nmu2) and uploaded it to DELAYED/2. Please feel free to tell me if I should delay it longer (or even if I should dcut it to 0-day, given the security matter). If you prefer to fix it in another not intrusive way (not c1fb4d0), I'm happy to (quickly) sponsor your package too. Regards. David [...] Seems to me your patch will prevent anyone from using java-package on the older Java7 binaries. If we do remove this support because they are infested with security issues making them unsuitable for anything at all[1], I think it should have a nice little error message saying Nope, won't do this - That version is vulnerable/unsupported/$whatever. Just so people are aware it is a deliberate choice from our side and not a buggy script crashing. (Particularly people have been using it with older versions before. They might be surprised to see that non-descriptive error message the reporter included in the original mail). I had the same thought - there may be a valid reason for someone to want to run jdk-7u9. This issue already appears to be addressed in the 0.51 package (but with a different patch). I'm assuming we want to keep the patch minimal - can we use this these patterns instead? jdk-7u+([0-9])-linux-i586.tar.gz jdk-7u+([0-9])-linux-x64.tar.gz David, if you'd prefer not to upload again, could you remove the upload and I'll prepare the update. (But thank you for taking the initiative in the first place!) Thank you, tony signature.asc Description: OpenPGP digital signature
Bug#698231: memcached: CVE-2013-0179
Package: memcached Severity: grave Tags: security Justification: user security hole A minor security issue was found in memcached: http://www.openwall.com/lists/oss-security/2013/01/14/6 This doesn't warrant a DSA, but you could fix it through a point update. For Wheezy a minimal fix should be made instead of updating to a new upstream release. Cheers, Moritz -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#692948: Why is this apparently easy to fix bug....not yet fixed?
Hi Christian, I am rather busy lately, sorry for the late reply. -=| Christian PERRIER, 01.01.2013 19:31:04 +0100 |=- I wonder why this RC bug isn't fixed yet, as you apparently pushed a fix in the package's GIT repository. I would be happy to NMU the package with the fix you committed, but why not upload it yourself? The fix there was incomplete. I still need to actually /test/ the implemented fixes (pushed another yesterday) and time appears to be sparse. Add to that my hopes to see #693216 approved by the release team and a bit of uncertainity how to proceed with two unblock requests and you get a recipe for stalled work :/ All help is certainly welcome, especially if the original reporter's situation can be tested for all (nine!) binary packages -- upgrade from lenny to squeeze to wheezy. The two commits can be cherry-picked in wheezy-rooted branch. Cheers! dam signature.asc Description: Digital signature
Bug#698236: bitlbee: FTBFS: build-depends on virtual package
Package: src:bitlbee Version: 3.2-1 Severity: serious Tags: sid wheezy Justification: fails to build from source (but built successfully in the past) Hi! Your package failed to build on the buildds: Package gnutls-dev is a virtual package provided by: libgnutls28-dev 3.0.22-2 libgnutls-dev 2.12.20-3 Build-Depending on virtual packages with more than one provider is not supported (on purpose to make the set of installed packages on the buildd less random) Regards Christoph -- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698211: segfault when start
tags 698211 unreproducible tags 698211 moreinfo severity normal thanks Hi Petr, romium [1]3051 segmentation fault chromium i Using Linux foothold.ru 2.6.32-5-amd64 #1 SMP Sun May 6 04:00:17 UTC 2012 x86_64 GNU/Linux Debug Report: I'm afraid but you did not provide information to be able to reproduce this bug. I just installed the current version of the chromium package from the unstable archives and it runs without any problems on my machine. -- System Information: Debian Release: 6.0.5 APT prefers testing-proposed-updates APT policy: (500, 'testing-proposed-updates'), (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/24 CPU cores) Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Also, I am not sure whether it is justified to report a bug in this context as you are installing packages from testing onto a stable machine running Squeeze. The version of Chromium in squeeze is much older and the version from testing/unstable works on these systems without problems. There is no version in squeeze-backports either. Please resort to using Google Chrome or upgrade your system to Wheezy. I am also downgrading this bug to normal since you shouldn't set the severity to grave when using an unsupported configuration. If you disagree, please feel free to provide more information which would help reproducing the bug and also some proof that the problem is actually a bug and not a problem with your setup. Cheers, Adrian -- .''`. John Paul Adrian Glaubitz : :' : Debian Developer - glaub...@debian.org `. `' Freie Universitaet Berlin - glaub...@physik.fu-berlin.de `-GPG: 62FF 8A75 84E0 2956 9546 0006 7426 3B37 F5B5 F913 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed (with 1 errors): segfault when start
Processing commands for cont...@bugs.debian.org: tags 698211 unreproducible Bug #698211 [chromium] segfault when start Added tag(s) unreproducible. tags 698211 moreinfo Bug #698211 [chromium] segfault when start Added tag(s) moreinfo. severity normal Unknown command or malformed arguments to command. thanks Stopping processing here. Please contact me if you need assistance. -- 698211: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698211 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: severity of 698211 is normal
Processing commands for cont...@bugs.debian.org: severity 698211 normal Bug #698211 [chromium] segfault when start Severity set to 'normal' from 'grave' thanks Stopping processing here. Please contact me if you need assistance. -- 698211: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698211 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698108: java-package: diff for NMU version 0.50+nmu2
Hi, Thanks Niels and Tony for your reviews and advices! Le 15/01/2013 11:38, tony mancill a écrit : On 01/14/2013 11:48 PM, Niels Thykier wrote: Seems to me your patch will prevent anyone from using java-package on the older Java7 binaries. Right, I didn't thought it would worth the trouble to support “infested with security issues making them unsuitable”-versions. I think it should have a nice little error message saying Nope, won't do this - That version is vulnerable/unsupported/$whatever. Right, I did bother to update the (multiple duplicates of the same) documentation, but a better handling of such error would have indeed be worthwhile. I had the same thought - there may be a valid reason for someone to want to run jdk-7u9. OK, so let's just continue to support its building then. This issue already appears to be addressed in the 0.51 package (but with a different patch). I'm assuming we want to keep the patch minimal That was the idea (both because we're in freeze, and because it's an NMU to fix an issue opened yesterday). If the release team is fine with 0.51, I guess it could be uploaded to unstable ;). can we use this these patterns instead? jdk-7u+([0-9])-linux-i586.tar.gz jdk-7u+([0-9])-linux-x64.tar.gz I'm afraid it won't cope with the ${archive_name:6:1} versus ${archive_name:6:2} expansion currently used in the scripts (or would need some more intrusive changes that may not be desirable). David, if you'd prefer not to upload again, could you remove the upload and I'll prepare the update. (But thank you for taking the initiative in the first place!) I've prepared another one, debdiff attached. It explicitly adds support for two digits version, without touching to the one digit version support nor the documentation (since it's still accurate with that change). I'll upload it to DELAYED/1 in about four hours (that is one day after after the initial DELAYED/2 upload), unless we find something else that need fixing in the mean time or if someone prefers to take care of it another way. Regards. David diff -Nru java-package-0.50+nmu1/debian/changelog java-package-0.50+nmu2/debian/changelog --- java-package-0.50+nmu1/debian/changelog 2012-09-06 18:38:09.0 -0400 +++ java-package-0.50+nmu2/debian/changelog 2013-01-15 15:07:11.0 -0400 @@ -1,3 +1,10 @@ +java-package (0.50+nmu2) unstable; urgency=high + + * Non-maintainer upload. + * Allow two digits in Java 7 updates. Closes: #597294, #698108 + + -- David Prévot taf...@debian.org Tue, 15 Jan 2013 15:06:26 -0400 + java-package (0.50+nmu1) unstable; urgency=low * Non-maintainer upload. diff -Nru java-package-0.50+nmu1/lib/oracle-j2re.sh java-package-0.50+nmu2/lib/oracle-j2re.sh --- java-package-0.50+nmu1/lib/oracle-j2re.sh 2012-01-21 08:21:00.0 -0400 +++ java-package-0.50+nmu2/lib/oracle-j2re.sh 2013-01-15 15:03:51.0 -0400 @@ -18,6 +18,12 @@ j2se_priority=316 found=true ;; + jre-7u[0-9][0-9]-linux-i586.tar.gz) # SUPPORTED + j2se_version=1.7.0+update${archive_name:6:2}${revision} + j2se_expected_min_size=94 #Mb + j2se_priority=316 + found=true + ;; esac ;; amd64|x86_64-linux-gnu) @@ -33,6 +39,12 @@ j2se_expected_min_size=88 #Mb j2se_priority=316 found=true + ;; + jre-7u[0-9][0-9]-linux-x64.tar.gz) # SUPPORTED + j2se_version=1.7.0+update${archive_name:6:2}${revision} + j2se_expected_min_size=88 #Mb + j2se_priority=316 + found=true ;; esac ;; diff -Nru java-package-0.50+nmu1/lib/oracle-j2sdk-doc.sh java-package-0.50+nmu2/lib/oracle-j2sdk-doc.sh --- java-package-0.50+nmu1/lib/oracle-j2sdk-doc.sh 2012-01-21 08:21:00.0 -0400 +++ java-package-0.50+nmu2/lib/oracle-j2sdk-doc.sh 2013-01-15 15:02:36.0 -0400 @@ -12,6 +12,11 @@ j2se_expected_min_size=290 #Mb found=true ;; + jdk-7u[0-9][0-9]-apidocs.zip) # SUPPORTED + j2se_version=1.7.0+update${archive_name:6:2}${revision} + j2se_expected_min_size=290 #Mb + found=true + ;; esac if [[ -n $found ]]; then cat EOF diff -Nru java-package-0.50+nmu1/lib/oracle-j2sdk.sh java-package-0.50+nmu2/lib/oracle-j2sdk.sh --- java-package-0.50+nmu1/lib/oracle-j2sdk.sh 2012-01-21 08:21:00.0 -0400 +++ java-package-0.50+nmu2/lib/oracle-j2sdk.sh 2013-01-15 15:02:05.0 -0400 @@ -18,6 +18,12 @@ j2se_priority=317 found=true ;; + jdk-7u[0-9][0-9]-linux-i586.tar.gz) # SUPPORTED + j2se_version=1.7.0+update${archive_name:6:2}${revision} + j2se_expected_min_size=190 #Mb + j2se_priority=317 + found=true + ;; esac ;; amd64|x86_64-linux-gnu) @@ -33,6 +39,12 @@
Bug#697848: [Pkg-ace-devel] Bug#697848: non-free files in main
Hello, thanks for the report. On 10/01/2013 12:30, Ansgar Burchardt wrote: Package: src:ace Severity: serious [...] the following license conditions (from 6.1.2-1's d/copyright) look quite non-free as they restrict how the program may be modified: I assume you are referring to DFSG#3 here? Or DFSG#1? [...] You may copy and extend functionality (but may not remove functionality) of the Interface Definition Language CFE without charge, but you are not authorized to license or distribute it to anyone else except as part of a product or program developed by you or with the express written consent of Sun Microsystems, Inc. (Sun). My reading of the text above is that it's possible to license or distribute IDL CFE to anyone if: - the licensee has express written consent of Sun Microsystems, Inc. (Sun); or - it's part of a product or program developed by the licensee While first condition is impossible to meet, the second one looks similar (to me) to DFSG#1. But maybe the issue here is the /but may not remove functionality/ sentence? You may copy, modify, distribute, or sublicense the LICENSED PRODUCT without charge as part of a product or software program developed by you, so long as you preserve the functionality of interoperating with the Object Management Group's Internet Inter-ORB Protocol version one. However, any uses other than the foregoing uses shall require the express written consent of Sun Microsystems, Inc. Likewise, I don't see what's wrong here, except maybe for /so long as you preserve the functionality of interoperating with the Object Management Group's Internet Inter-ORB Protocol/ Is this the part that triggered this bug report? There's also a license allowing only educational and commercial use, but no redistribution or modification: All of the files in these directories are copyright Addison Wesley, and they come with absolutely no warranty whatsoever. Permission is hereby granted to use these programs for educational or commercial purposes. Ack. Repackaging would solve this one. Thanks, Regards, Thomas -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#697465: apache2.2-common: initial install fails: Could not read /etc/apache2/envvars
severity 697465 normal thanks On Tue, 8 Jan 2013, Jonas Smedegaard wrote: I think you are right that what I experience might be unrelated to apache packaging - I suspect however that it is not multistrap but fakechroot. I will reassing accordingly. I am downgrading this until then. No idea what severity this should have in Cheers, Stefan -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#697465: apache2.2-common: initial install fails: Could not read /etc/apache2/envvars
Processing commands for cont...@bugs.debian.org: severity 697465 normal Bug #697465 [apache2.2-common] apache2.2-common: initial install fails: Could not read /etc/apache2/envvars Severity set to 'normal' from 'serious' thanks Stopping processing here. Please contact me if you need assistance. -- 697465: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697465 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698243: gnucash: Fails to open data file from version 1:2.4.10-5
Package: gnucash Version: 1:2.4.10-6 Severity: critical Tags: upstream Justification: causes serious data loss Upon openeing gnucash there is an error parsing input file. This happened after a upgrade to 1:2.4.10-6. I have downgraded to version 1:2.4.10-5 to get work done. The data below reflects the downgrade to 1:2.4.10-5. The only packages changed were the gnucash-common and gnucash. -- System Information: Debian Release: 7.0 APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 3.2.0-4-686-pae (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages gnucash depends on: ii gconf-service 3.2.5-1+build1 ii gnucash-common 1:2.4.10-5 ii guile-1.8 1.8.8+1-8 ii guile-1.8-libs 1.8.8+1-8 ii libaqbanking34 5.0.24-3 ii libc6 2.13-37 ii libcairo2 1.12.2-2 ii libcrypt-ssleay-perl 0.58-1 ii libdate-manip-perl 6.32-1 ii libdbi10.8.4-6 ii libfinance-quote-perl 1.17+git20120506-1 ii libgconf-2-4 3.2.5-1+build1 ii libgdk-pixbuf2.0-0 2.26.1-1 ii libglade2-01:2.6.4-1 ii libglib2.0-0 2.33.12+really2.32.4-3 ii libgnome-keyring0 3.4.1-1 ii libgnome2-02.32.1-2 ii libgnomecanvas2-0 2.30.3-1.2 ii libgnomeui-0 2.24.5-2 ii libgoffice-0.8-8 0.8.17-1.2 ii libgtk2.0-02.24.10-2 ii libgwengui-gtk2-0 4.3.3-1 ii libgwenhywfar604.3.3-1 ii libhtml-tableextract-perl 2.11-1 ii libhtml-tree-perl 5.02-1 ii libktoblzcheck1c2a 1.39-1 ii libofx41:0.9.4-2.1 ii libpango1.0-0 1.30.0-1 ii libwebkitgtk-1.0-0 1.8.1-3.3 ii libwww-perl6.04-1 ii libx11-6 2:1.5.0-1 ii libxml22.8.0+dfsg1-7 ii perl 5.14.2-16 ii slib 3b1-3.1 ii zlib1g 1:1.2.7.dfsg-13 Versions of packages gnucash recommends: ii gnucash-docs 2.4.1-3 ii yelp 3.4.2-1+b1 Versions of packages gnucash suggests: pn libdbd-mysqlnone pn libdbd-pgsqlnone pn libdbd-sqlite3 none -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#698243: gnucash: Fails to open data file from version 1:2.4.10-5
Processing control commands: tags -1 + moreinfo Bug #698243 [gnucash] gnucash: Fails to open data file from version 1:2.4.10-5 Added tag(s) moreinfo. -- 698243: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698243 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698243: gnucash: Fails to open data file from version 1:2.4.10-5
Control: tags -1 + moreinfo Le mardi 15 janvier 2013 à 16:20 -0500, Bob Weber a écrit : Package: gnucash Version: 1:2.4.10-6 Severity: critical Tags: upstream Justification: causes serious data loss Upon openeing gnucash there is an error parsing input file. This happened after a upgrade to 1:2.4.10-6. I have downgraded to version 1:2.4.10-5 to get work done. The data below reflects the downgrade to 1:2.4.10-5. The only packages changed were the gnucash-common and gnucash. Between 1:2.4.10-5 and 1:2.4.10-6 we enforced a stricter verification of the XML file, because GnuCash was ignoring XML errors (see http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=658732 ). Ignoring XML errors could lead to data losses, as explained in the bug report; our patch was also applied by upstream, and will be incorporated in upstream GnuCash 2.4.12. Therefore, if gnucash 1:2.4.10-6 refuses to open your file, it probably means that it is invalid XML. I encourage you to pass it through xmllint --noout to find the error. Please confirm that your file is invalid XML, and I will close this bug report. If the XML is valid (which I think is unlikely), please describe a way to reproduce the problem (for example by sending an example data file). Regards, -- .''`.Sébastien Villemot : :' :Debian Developer `. `' http://www.dynare.org/sebastien `- GPG Key: 4096R/381A7594 signature.asc Description: This is a digitally signed message part
Bug#698248: odbcinst apparently ignores the -l option when used to uninstall a DSN
Package: odbcinst Version: 2.2.14p2-5 Severity: serious Justification: makes odbcinst not very suitable for use in maintainer scripts Hello, while I'm filing this bug as serious, feel free to downgrade the severity of this bug if you think it's appropiate. In any case imho a fix for this bug is worth to be included in wheezy. I've been working on the Virtuoso debian package. The maintainer scripts relies on odbc, the prerm script uses odbcinst with the -l option, thus: odbcinst -u -s -l -n VOS however, apparently it doesn't perform the operation like if VOS where a system DSN, but an user DSN. So I've just workarounded this bug using an evironnment variable which, according to a comment in the odbcinst source code, is suposed to override the program arguments: ODBCSEARCH=ODBC_SYSTEM_DSN odbcinst -u -s -l -n VOS When used this way I think it works as expected. We noticed this bug when we where trying to fix a a piuparts error, for more information, see: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677286 Also note that the reported gave kindly a quick list of other packages which _might_ be affected: http://codesearch.debian.net/search?q=odbcinst.*-l+filetype%3Ashell Thank you for your time looking into this. signature.asc Description: This is a digitally signed message part.
Processed: retitle
Processing commands for cont...@bugs.debian.org: retitle 696681 falconpl: CVE-2012-6070: possible security issue due to misuse of the libcurl API Bug #696681 {Done: Kartik Mistry kar...@debian.org} [falconpl] falconpl: possible security issue due to misuse of the libcurl API Changed Bug title to 'falconpl: CVE-2012-6070: possible security issue due to misuse of the libcurl API' from 'falconpl: possible security issue due to misuse of the libcurl API' retitle 696707 nusoap: CVE-2012-6071: wrong CURLOPT_SSL_VERIFYHOST: do not check hostname of cert Bug #696707 {Done: Thomas Goirand z...@debian.org} [libnusoap-php] Wrong CURLOPT_SSL_VERIFYHOST: do not check hostname of cert Changed Bug title to 'nusoap: CVE-2012-6071: wrong CURLOPT_SSL_VERIFYHOST: do not check hostname of cert' from 'Wrong CURLOPT_SSL_VERIFYHOST: do not check hostname of cert' End of message, stopping processing here. Please contact me if you need assistance. -- 696681: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696681 696707: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696707 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#669278: please add phonon-backend-xine transitional package
Followup-For: Bug #669278 Control: reassign -1 src:phonon 4.6.0.0-2 Hi, since fixing this via qtdbus did not work, I'm giving this bug back to phonon. Unless someone has a better idea, adding back phonon-backend-xine as a transitional package is a solution to fix upgrades from squeeze to wheezy with the buggy apt from squeeze. I updated my patch to re-add phonon-backend-xine as a transitional package and verified that the upgrade path from squeeze is clean with the new phonon-backend-xine being available. I offer to NMU phonon (with the attached patch) if someone wnats to sponsor this NMU. Andreas diffstat for phonon-4.6.0.0 phonon-4.6.0.0 changelog | 10 ++ control |9 - 2 files changed, 18 insertions(+), 1 deletion(-) diff -Nru phonon-4.6.0.0/debian/changelog phonon-4.6.0.0/debian/changelog --- phonon-4.6.0.0/debian/changelog 2012-05-02 13:55:41.0 +0200 +++ phonon-4.6.0.0/debian/changelog 2013-01-15 23:27:32.0 +0100 @@ -1,3 +1,13 @@ +phonon (4:4.6.0.0-2.1) unstable; urgency=low + + * Non-maintainer upload. + * Add phonon-backend-xine transitional package, transition to the vlc +backend. This fixes the Could not perform immediate configuration on +'phonon-backend-vlc' apt error on upgrades from squeeze. +(Closes: #669278) + + -- Andreas Beckmann deb...@abeckmann.de Tue, 15 Jan 2013 23:27:32 +0100 + phonon (4:4.6.0.0-2) unstable; urgency=low [ Debconf translation updates ] diff -Nru phonon-4.6.0.0/debian/control phonon-4.6.0.0/debian/control --- phonon-4.6.0.0/debian/control 2012-05-02 13:55:41.0 +0200 +++ phonon-4.6.0.0/debian/control 2013-01-15 23:24:03.0 +0100 @@ -26,7 +26,7 @@ Suggests: phonon-backend-gstreamer, phonon-backend-mplayer, ${phonon:Recommended-Backend} -Conflicts: phonon-backend-xine +Breaks: phonon-backend-xine ( 4:4.6.0.0) Description: multimedia framework from KDE - metapackage Phonon is the Qt 4 multimedia API, which provides a task-oriented abstraction layer for capturing, mixing, processing, and playing audio and video content. @@ -126,3 +126,10 @@ This package contains debugging symbols for the Phonon library and its main back-ends. Install it if you want to report a crash or debug a problem with Phonon or its back-ends. + +Package: phonon-backend-xine +Architecture: all +Depends: phonon-backend-vlc +Description: transitional package to aid switching to phonon-backend-vlc + This is a transitional dummy package to aid switching to phonon-backend-vlc. + It can be safely removed if nothing depends on it.
Processed: Re: please add phonon-backend-xine transitional package
Processing control commands: reassign -1 src:phonon 4.6.0.0-2 Bug #669278 [libqt4-dbus] please add phonon-backend-xine transitional package Bug #669878 [libqt4-dbus] Could not perform immediate configuration on 'phonon-backend-vlc' Bug reassigned from package 'libqt4-dbus' to 'src:phonon'. Bug reassigned from package 'libqt4-dbus' to 'src:phonon'. No longer marked as found in versions konversation/1.4-1, kdebase-workspace-bin/4:4.8.4-3, kopete/4:4.8.4-1, qt4-x11/4:4.7.4-2, kdebase-workspace-bin/4:4.8.4-4, kdebase-workspace-bin/4:4.8.4-5, kdeutils/4:4.8.4+5.77, kraft/0.45-2, and digikam/4:2.6.0-1. No longer marked as found in versions konversation/1.4-1, kdebase-workspace-bin/4:4.8.4-3, kopete/4:4.8.4-1, qt4-x11/4:4.7.4-2, kdebase-workspace-bin/4:4.8.4-4, kdebase-workspace-bin/4:4.8.4-5, kraft/0.45-2, kdeutils/4:4.8.4+5.77, and digikam/4:2.6.0-1. Ignoring request to alter fixed versions of bug #669278 to the same values previously set Ignoring request to alter fixed versions of bug #669878 to the same values previously set Bug #669278 [src:phonon] please add phonon-backend-xine transitional package Bug #669878 [src:phonon] Could not perform immediate configuration on 'phonon-backend-vlc' The source 'phonon' and version '4.6.0.0-2' do not appear to match any binary packages Marked as found in versions phonon/4.6.0.0-2. Marked as found in versions phonon/4.6.0.0-2. -- 669278: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669278 669878: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669878 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: tagging 697439, forcibly merging 668444 692930, tagging 669278
Processing commands for cont...@bugs.debian.org: tags 697439 + pending Bug #697439 [fglrx-driver] fglrx-driver: dkms fails to build with kernel 3.7 Added tag(s) pending. forcemerge 668444 692930 Bug #668444 [icedtea-netx] icedtea-netx: leaves alternatives after purge Bug #692930 [icedtea-netx] icedtea-netx: doesn't remove alternative on purge Severity set to 'important' from 'normal' Marked as found in versions icedtea-web/1.2-2 and icedtea-web/1.3.1-1. Merged 668444 692930 tags 669278 + patch Bug #669278 [src:phonon] please add phonon-backend-xine transitional package Bug #669878 [src:phonon] Could not perform immediate configuration on 'phonon-backend-vlc' Added tag(s) patch. Added tag(s) patch. thanks Stopping processing here. Please contact me if you need assistance. -- 668444: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668444 669278: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669278 669878: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669878 692930: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692930 697439: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697439 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#698248: odbcinst apparently ignores the -l option when used to uninstall a DSN
Processing commands for cont...@bugs.debian.org: severity 698248 normal Bug #698248 [odbcinst] odbcinst apparently ignores the -l option when used to uninstall a DSN Severity set to 'normal' from 'serious' thanks Stopping processing here. Please contact me if you need assistance. -- 698248: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698248 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698248: odbcinst apparently ignores the -l option when used to uninstall a DSN
severity 698248 normal thanks On Tue, Jan 15, 2013 at 11:14:25PM +0100, José Manuel Santamaría Lema wrote: Package: odbcinst Version: 2.2.14p2-5 Severity: serious Justification: makes odbcinst not very suitable for use in maintainer scripts while I'm filing this bug as serious, feel free to downgrade the severity of this bug if you think it's appropiate. In any case imho a fix for this bug is worth to be included in wheezy. I don't see anything serious about this bug. I haven't heard of any other packages using odbcinst for DSN registration, and I'm not sure it's really appropriate for virtuoso to do so - how do you correctly handle the scenario where the user has an existing system DSN named 'VOS' before installing your package? 'VOS' is not a particularly collision-resistant name. We allow the risk of collisions when installing drivers because drivers are much more likely to be provided by the system, and clobbering a locally-installed driver is much less likely to result in bugs. Clobbering an unrelated system DSN (with a very vague name, no less) is much more likely to cause problems for the admin. I would suggest that it would be more appropriate to set this up as a file DSN; that way virtuoso has full control over it with no risk of colliding with user settings. I've been working on the Virtuoso debian package. The maintainer scripts relies on odbc, the prerm script uses odbcinst with the -l option, thus: odbcinst -u -s -l -n VOS however, apparently it doesn't perform the operation like if VOS where a system DSN, but an user DSN. So I've just workarounded this bug using an evironnment variable which, according to a comment in the odbcinst source code, is suposed to override the program arguments: ODBCSEARCH=ODBC_SYSTEM_DSN odbcinst -u -s -l -n VOS When used this way I think it works as expected. Given that a workaround is available, I definitely don't think this is a serious bug. We noticed this bug when we where trying to fix a a piuparts error, for more information, see: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677286 Also note that the reported gave kindly a quick list of other packages which _might_ be affected: http://codesearch.debian.net/search?q=odbcinst.*-l+filetype%3Ashell None of these hits are maintainer scripts. Thanks, -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. Ubuntu Developerhttp://www.debian.org/ slanga...@ubuntu.com vor...@debian.org signature.asc Description: Digital signature
Bug#696736: marked as done (Insecure permissions on database files)
Your message dated Wed, 16 Jan 2013 00:17:33 + with message-id e1tvghb-0004fh...@franck.debian.org and subject line Bug#696736: fixed in python-keyring 0.7.1-1+deb7u1 has caused the Debian Bug report #696736, regarding Insecure permissions on database files to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 696736: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696736 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: python-keyring Severity: grave Tags: security Please see http://www.openwall.com/lists/oss-security/2012/11/16/2 http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-5577.html http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-5578.html Cheers, Moritz -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash ---End Message--- ---BeginMessage--- Source: python-keyring Source-Version: 0.7.1-1+deb7u1 We believe that the bug you reported is fixed in the latest version of python-keyring, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 696...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Sebastian Ramacher sramac...@debian.org (supplier of updated python-keyring package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sun, 06 Jan 2013 22:22:33 +0100 Source: python-keyring Binary: python-keyring python3-keyring Architecture: source all Version: 0.7.1-1+deb7u1 Distribution: testing-proposed-updates Urgency: low Maintainer: Carl Chenet cha...@ohmytux.com Changed-By: Sebastian Ramacher sramac...@debian.org Description: python-keyring - store and access your passwords safely python3-keyring - store and access your passwords safely - Python 3 version of the Closes: 675379 696736 Changes: python-keyring (0.7.1-1+deb7u1) testing-proposed-updates; urgency=low . * Team upload. * debian/patches: - CVE-2012-4571.patch: backport CryptedFileKeyring from 0.9.3 to fix CVE-2012-4571. (Closes: #675379) - 696736-Fix-insecure-permissions-on-database-files.patch: backport fix from 0.9.2-1.1 to fix insecure permissions on database files. Fix CVE-2012-5578. Thanks Salvatore Bonaccorso. (Closes: #696736) Checksums-Sha1: e5fcff94564b8ebce26225c347d59986bbdc1d78 2178 python-keyring_0.7.1-1+deb7u1.dsc 7d3edbe8d31c29ed684e4907f1e7615224486783 12305 python-keyring_0.7.1-1+deb7u1.debian.tar.gz eec50b472ef8f3581278633b197d80559c78bb01 38496 python-keyring_0.7.1-1+deb7u1_all.deb 41f6ae9cdd1273442f934d5e517d91c857b58617 31576 python3-keyring_0.7.1-1+deb7u1_all.deb Checksums-Sha256: b83f1fbe3ee9fc14e1358d10d2f2150e9857b0d644103e123a61460f1eeecc73 2178 python-keyring_0.7.1-1+deb7u1.dsc ef4a62279ce089e9eb63d30b00f3e15453ef39637f21e744960d0456cf3f2e1f 12305 python-keyring_0.7.1-1+deb7u1.debian.tar.gz 9b179ec6805d4eae0790511b1298d8246cf5489fb81a20cb2893542e750826ac 38496 python-keyring_0.7.1-1+deb7u1_all.deb 90859bc94ef4fae485691ec02f4803e6cc658986bb8220f3d3be41808943738b 31576 python3-keyring_0.7.1-1+deb7u1_all.deb Files: c294b880b21aa051feda968d15c53ece 2178 python optional python-keyring_0.7.1-1+deb7u1.dsc db06d83a0a3ed96ddffb7c225513abf7 12305 python optional python-keyring_0.7.1-1+deb7u1.debian.tar.gz abad2a4a11bca5957b3dbc367358787d 38496 python optional python-keyring_0.7.1-1+deb7u1_all.deb ed9743e0fb9e26247a52cedebe7b577d 31576 python optional python3-keyring_0.7.1-1+deb7u1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBCAAGBQJQ9fBMAAoJEGny/FFupxmT814QAI/E9IOJz5WmjsJrRcR6BOLU 6aXZfsbSEFlV/bQQ/wTatb8xuISia//JsvZL2uzRM+uBIL5rnlTV6237a8Y3TQqK RvT3HLLjFCWJIsK83aBoUFVB3ZdyI/40oYemaJjhoihVXF+ojd8/g4w+Yyvxid/v mcr00I37EdqNbYSVuOsZ8RlUZmAge8SJD0oKGImPYLSgVCARltnEA6HlgqdQQBBP ox0WaLsUeP4KecTAhqJxSHts5ZjUiyzF3dEu0hir8zo0e0hx+zKzjrBjg46j+etb 1XcsWq6lrpbEY+VfgjsCiCQJJURDt8zPg0vqLazOj/SMGJlBti98ba2MM6qFQFUb
Bug#698259: guilt: Maintainer address does not accept mail
Source: guilt Version: 0.35-1 Severity: serious Justification: policy 3.3 Hi, The address iul...@linux.com seems to be out of date. Do you happen to know a more recent one? Thanks, Jonathan ---BeginMessage--- Delivery to the following recipient failed permanently: iul...@linux.com Technical details of permanent failure: Google tried to deliver your message, but it was rejected by the recipient domain. We recommend contacting the other email provider for further information about the cause of this error. The error that the other server returned was: 550 550 5.1.1 iul...@linux.com: Recipient address rejected: User unknown in virtual alias table (state 13). - Original message - DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:date:from:to:cc:subject:message-id:references :mime-version:content-type:content-disposition:in-reply-to :user-agent; bh=5R77SXo5cl/kTRPyQ+w6XB9KL6CyQ3iNYS4jGh5viJI=; b=sCTr9rFLYRw1/L0/c1tcb5qtrMYE/l9WJHx7ciNzSwpVx4ZUroI+HyL887JaTIh6AI KVH3FXascYIJkFgnHKxQIxcLSFEnQY5zwCMJ2P6UKUD9VMWp2iCJljuXRtqI6PdR4N7t MetjkGv2tbkxAOx/YU0M5rNFVkiPP5ovS0uyy/TB8UydlICHr7QUtI6EedYUdg7VrXac b+SGtfW3NXpQbcwiChYpeLU/1mx7dvcI4PWRUwH7/0dV4bYEdi+vvl2blMOLbRyBf8kq bfG5MEI+ijyReqNnRFoxUWvgpP2ZoFhlMdif5I5hodj8dInXZwBgLP0vupdL8e9kwvJT +uMw== X-Received: by 10.68.226.71 with SMTP id rq7mr270522746pbc.60.1358303508667; Tue, 15 Jan 2013 18:31:48 -0800 (PST) Return-Path: jrnie...@gmail.com Received: from google.com ([2620:0:1000:5b00:b6b5:2fff:fec3:b50d]) by mx.google.com with ESMTPS id gj1sm11299307pbc.11.2013.01.15.18.31.46 (version=TLSv1.2 cipher=RC4-SHA bits=128/128); Tue, 15 Jan 2013 18:31:47 -0800 (PST) Date: Tue, 15 Jan 2013 18:31:44 -0800 From: Jonathan Nieder jrnie...@gmail.com To: Josef 'Jeff' Sipek jef...@josefsipek.net Cc: g...@vger.kernel.org, Per Cederqvist ced...@opera.com, Theodore Ts'o ty...@mit.edu, Iulian Udrea iul...@linux.com, Axel Beckert a...@deuxchevaux.org Subject: [GUILT] [PATCH 7/7] Drop unneeded git version check. Message-ID: 20130116023144.gp12...@google.com References: 20130116022606.gi12...@google.com MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: 20130116022606.gi12...@google.com User-Agent: Mutt/1.5.21 (2010-09-15) Git's compatibility record is pretty good, so there's no need to worry that newer versions of git will break the git config command. Without this change, guilt errors out for git 1.8. With it, all tests pass. Signed-off-by: Jonathan Nieder jrnie...@gmail.com --- Thanks for reading. guilt | 11 --- 1 file changed, 11 deletions(-) diff --git a/guilt b/guilt index 66a671a..6cb43e3 100755 --- a/guilt +++ b/guilt @@ -26,17 +26,6 @@ SUBDIRECTORY_OK=1 . $(git --exec-path)/git-sh-setup # -# Git version check -# -gitver=`git --version | cut -d' ' -f3 | sed -e 's/^debian\.//'` -case $gitver in - 1.5.*) ;; # git config - 1.6.*) ;; # git config - 1.7.*) ;; # git config - *) die Unsupported version of git ($gitver) ;; -esac - -# # Shell library # usage() -- 1.8.1 ---End Message---
Bug#683188: increasing severity
On Sun, Jul 29, 2012 at 08:34:36PM +0200, Erich Schubert wrote: A partial bisection of python-subversion via snapshot.debian.org shows that the problem already existed in -3.1 but did not exist in -1. I did not test -2 and -3 yet. -2 has swig-related changes: * patches/swig2-compat: New patch from upstream to build with swig 2.x. (Closes: #634049) However, it may well be that this change is actually caused by Debian having migrated to Swig 2, too. I believe this is due to a bug in SWIG which was fixed upstream in 2.0.7: 2012-05-22: szager [python] Disambiguate SWIG_From_unsigned_SS_int and SWIG_From_unsigned_SS_long. This was r13106 in SWIG's SVN repo (now migrated to git, but I don't have the corresponding git commit hash to hand). Testing already has SWIG 2.0.7, so rebuilding python-subversion should fix this if SWIG is run during the build. Cheers, Olly -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#695721: marked as done (gcl: includes non-free documentation (GFDL with unmodifiable sections))
Your message dated Wed, 16 Jan 2013 02:47:58 + with message-id e1tvj2k-0004hb...@franck.debian.org and subject line Bug#695721: fixed in gcl 2.6.7+dfsga-1 has caused the Debian Bug report #695721, regarding gcl: includes non-free documentation (GFDL with unmodifiable sections) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 695721: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695721 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: gcl Version: 2.6.7-108 Severity: serious Justification: Policy 2.2.1 Usertags: gfdl gmp3/gmp.* contains GNU MP library documentation, with the following license: Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, with the Front-Cover Texts being A GNU Manual, and with the Back-Cover Texts being You have freedom to copy and modify this GNU Manual, like GNU software. As per GR 2006-001, works licensed under GFDL with unmodifiable sections are not suitable for main: http://www.debian.org/vote/2006/vote_001 -- Jakub Wilk ---End Message--- ---BeginMessage--- Source: gcl Source-Version: 2.6.7+dfsga-1 We believe that the bug you reported is fixed in the latest version of gcl, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 695...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Camm Maguire c...@debian.org (supplier of updated gcl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 15 Jan 2013 20:46:25 + Source: gcl Binary: gcl gcl-doc Architecture: source all i386 Version: 2.6.7+dfsga-1 Distribution: unstable Urgency: high Maintainer: Camm Maguire c...@debian.org Changed-By: Camm Maguire c...@debian.org Description: gcl- GNU Common Lisp compiler gcl-doc- Documentation for GNU Common Lisp Closes: 691946 695721 Changes: gcl (2.6.7+dfsga-1) unstable; urgency=high . * Acknowledge Non-maintainer upload. (thanks David Prévot taf...@debian.org) * Remove unused and non DFSG-compliant gmp3/gmp.* from source. (Closes: #695721) * Show translated debconf templates, thanks to Denis Barbier for the analysis and the proposed fixes. (Closes: #691946) * trim excess digits from printed floats Checksums-Sha1: 426ac25f330157d4efda36c0e54245a553d2296f 1216 gcl_2.6.7+dfsga-1.dsc 977b1f56bfbfb477f4a1af038336e6d7f0f45577 8147123 gcl_2.6.7+dfsga.orig.tar.gz 93976044ece54c4fd87078fab2c75f742a1404a1 5201724 gcl_2.6.7+dfsga-1.debian.tar.gz 2da24e08afc4acda2865a7d63b2a54aa70bb4acd 610128 gcl-doc_2.6.7+dfsga-1_all.deb 21fbb541e2296d16e738a09e3ae50f16c555a3d0 22204908 gcl_2.6.7+dfsga-1_i386.deb Checksums-Sha256: 7743efa6460019b8735fa6e8800f0ee8ccd074322ce2d2eaa3fddae319851ebf 1216 gcl_2.6.7+dfsga-1.dsc de4722d45e5c0b8b22540159b89b3ecfe6fc78e29b6b49e545822616a463d60b 8147123 gcl_2.6.7+dfsga.orig.tar.gz 8a22a1d0df550036dd0999e6746a77009e23af6a452d9eef0c4594fc851767ae 5201724 gcl_2.6.7+dfsga-1.debian.tar.gz 73a4eeac964b649c030066b3cc5868a0f8bdd61b0c70b2faa4d5c616fe0db51e 610128 gcl-doc_2.6.7+dfsga-1_all.deb b160d73a72e7ff258305a3133bb4bb4475f53275182ee2841f6eac7c9b91903f 22204908 gcl_2.6.7+dfsga-1_i386.deb Files: c1fbfe691c8b39d6f6b8dedd7d87b006 1216 lisp optional gcl_2.6.7+dfsga-1.dsc 365e15f91285c6a67c5fb9f0503eda5a 8147123 lisp optional gcl_2.6.7+dfsga.orig.tar.gz f8189feab6bdd9392950bf34a335f5db 5201724 lisp optional gcl_2.6.7+dfsga-1.debian.tar.gz f85921956182145ec0d8060c65dd732e 610128 doc optional gcl-doc_2.6.7+dfsga-1_all.deb 1b995d7db24b6acf3bec509e48350dd2 22204908 lisp optional gcl_2.6.7+dfsga-1_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iEYEARECAAYFAlD2A0MACgkQczG1wFfwRdzZPACfQNRqfB8N+/SOT59j3dlaoCVn f+kAniPOyaB3kV7asvIBJr8+L4BrWkXx =8mJ7 -END PGP SIGNATUREEnd Message---
Processed: unarchiving 679717, found 679717 in 0.1-1.3
Processing commands for cont...@bugs.debian.org: unarchive 679717 Bug #679717 {Done: Rene Engelhard r...@rene-engelhard.de} [accessodf] accessodf: unowned files after purge (policy 6.8, 10.8) Unarchived Bug 679717 found 679717 0.1-1.3 Bug #679717 {Done: Rene Engelhard r...@rene-engelhard.de} [accessodf] accessodf: unowned files after purge (policy 6.8, 10.8) Marked as found in versions accessodf/0.1-1.3; no longer marked as fixed in versions accessodf/0.1-1.3 and reopened. thanks Stopping processing here. Please contact me if you need assistance. -- 679717: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=679717 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#679717: accessodf: unowned files after purge (policy 6.8, 10.8)
Followup-For: Bug #679717 Hi, unopkg can be really nasty :-) The HOME=$INSTDIR workaround requires the $INSTDIR to actually exist, otherwise it will fall back to /root and create the libreoffice/3 tree there ... I'm attaching a patch that unifies and simplifies the creation and removal of $INSTDIR in all three maintainer scripts. Previously there was a possibility to create/remove INSTDIR several times per script, leaving tempdirs behind or running unopkg without existing HOME=$INSTDIR. Now the package nearly passes the piuparts test. But there is still an unowned file being left after purge: 0m40.6s ERROR: FAIL: Package purging left files on system: /usr/lib/ure/share/config/ not owned /usr/lib/ure/share/config/javasettingsunopkginstall.xmlnot owned which is probably a different issue. Andreas accessodf_0.1-1.3.log.gz Description: GNU Zip compressed data diffstat for accessodf-0.1 accessodf-0.1 changelog | 12 +++- postinst |6 +++--- preinst |6 ++ prerm |4 ++-- 4 files changed, 18 insertions(+), 10 deletions(-) diff -Nru accessodf-0.1/debian/changelog accessodf-0.1/debian/changelog --- accessodf-0.1/debian/changelog 2012-11-02 12:33:21.0 +0100 +++ accessodf-0.1/debian/changelog 2013-01-16 05:57:15.0 +0100 @@ -1,8 +1,18 @@ +accessodf (0.1-1.4) unstable; urgency=low + + * Non-maintainer upload. + * {pre,post}inst, prerm: Simplify and unify the creation and removal of +$INSTDIR. The temporary HOME=$INSTDIR needs to exist otherwise unopkg will +fall back to /root/ and create a libreoffice/3/ hierarchy there. +(Closes: #679717) + + -- Andreas Beckmann deb...@abeckmann.de Wed, 16 Jan 2013 05:57:15 +0100 + accessodf (0.1-1.3) unstable; urgency=low * Non-maintainer upload. * oops, forgot a unopkg in preinst, thanks Andreas Beckmann -(closes: #679717) +(closes: #679717) -- Rene Engelhard r...@rene-engelhard.de Fri, 02 Nov 2012 12:32:50 +0100 diff -Nru accessodf-0.1/debian/postinst accessodf-0.1/debian/postinst --- accessodf-0.1/debian/postinst 2012-10-23 19:53:33.0 +0200 +++ accessodf-0.1/debian/postinst 2013-01-16 05:52:25.0 +0100 @@ -9,17 +9,17 @@ add_extension() { echo -n Adding extension $1... -INSTDIR=`mktemp -d` HOME=$INSTDIR unopkg add --shared $1 \ -env:UserInstallation=file:///$INSTDIR \ '-env:UNO_JAVA_JFW_INSTALL_DATA=$ORIGIN/../share/config/javasettingsunopkginstall.xml' \ -env:JFW_PLUGIN_DO_NOT_CHECK_ACCESSIBILITY=1 -if [ -n $INSTDIR ]; then rm -rf $INSTDIR; fi echo done. } -if [ $1 = configure -o $1 = upgrade ]; then +if [ $1 = configure ]; then +INSTDIR=`mktemp -d` add_extension /usr/share/accessodf/AccessODF.oxt +rm -rf $INSTDIR fi #DEBHELPER# diff -Nru accessodf-0.1/debian/preinst accessodf-0.1/debian/preinst --- accessodf-0.1/debian/preinst 2012-11-02 12:32:32.0 +0100 +++ accessodf-0.1/debian/preinst 2013-01-16 05:52:26.0 +0100 @@ -7,19 +7,16 @@ set -e flush_unopkg_cache() { - INSTDIR=`mktemp -d` HOME=$INSTDIR unopkg list --shared -env:JFW_PLUGIN_DO_NOT_CHECK_ACCESSIBILITY=1 /dev/null 21 } remove_extension() { - INSTDIR=`mktemp -d` if HOME=$INSTDIR unopkg list --shared $1 /dev/null; then echo -n Removing extension $1... HOME=$INSTDIR unopkg remove --shared $1 \ -env:UserInstallation=file://$INSTDIR \ '-env:UNO_JAVA_JFW_INSTALL_DATA=$ORIGIN/../share/config/javasettingsunopkginstall.xml' \ -env:JFW_PLUGIN_DO_NOT_CHECK_ACCESSIBILITY=1 -if [ -n $INSTDIR ]; then rm -rf $INSTDIR; fi echo done. flush_unopkg_cache fi @@ -27,13 +24,14 @@ case $1 in upgrade|install) - INSTDIR=`mktemp -d` +INSTDIR=`mktemp -d` echo Removing old accessodf extensions. id= while [ $id != ]; do id=`HOME=$INSTDIR unopkg list --shared | egrep '^(Name|Identifier):.*accessodf' | cut -d: -f2 | head -n 1` if [ $id != ]; then remove_extension $id; fi done +rm -rf $INSTDIR ;; esac diff -Nru accessodf-0.1/debian/prerm accessodf-0.1/debian/prerm --- accessodf-0.1/debian/prerm 2012-10-23 19:48:44.0 +0200 +++ accessodf-0.1/debian/prerm 2013-01-16 05:51:52.0 +0100 @@ -10,14 +10,12 @@ } remove_extension() { -INSTDIR=`mktemp -d` if HOME=$INSTDIR unopkg list --shared $1 /dev/null; then echo -n Removing extension $1... HOME=$INSTDIR unopkg remove --shared $1 \ -env:UserInstallation=file://$INSTDIR \ '-env:UNO_JAVA_JFW_INSTALL_DATA=$ORIGIN/../share/config/javasettingsunopkginstall.xml' \ -env:JFW_PLUGIN_DO_NOT_CHECK_ACCESSIBILITY=1 -if [ -n $INSTDIR ]; then rm -rf $INSTDIR; fi echo done. flush_unopkg_cache fi @@ -25,7 +23,9 @@ case $1 in remove) +INSTDIR=`mktemp -d` remove_extension be.docarch.accessodf.ooo.accessodfaddon +rm -rf
Bug#698024: how is this done?
I don't understand why this bug report was closed. It was explicitely about having a stable version for wheezy, and the response was to use the version from sid - how does that help with the actual issue? I understand that the sid version fixes issues, and that's great, but I think this issue will really be solved when that sid version migrates to wheezy, and from what I understand, this will require a freeze exception. Also note that some issues, like the rescue package list (#694823), are still broken in sid: the package list was just removed, and the one in live-images still has 'ettercap-text-only', not available in wheezy. A. -- Nothing incites to money-crimes like great poverty or great wealth. - Mark Twain pgp7aEn1NhoBY.pgp Description: PGP signature
Bug#698024: how is this done?
On 01/16/2013 06:47 AM, Antoine Beaupré wrote: I don't understand why this bug report was closed. as indicated when closing the bug, it doesn't serve any purpose. the one in live-images still has 'ettercap-text-only', not available in wheezy. 'still'? first, you didn't report that. second, ettercap was only removed on 2013-01-10 from wheezy. -- Address:Daniel Baumann, Donnerbuehlweg 3, CH-3012 Bern Email: daniel.baum...@progress-technologies.net Internet: http://people.progress-technologies.net/~daniel.baumann/ -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: retitle 688849 to ffmpeg/squeeze/stable: multiple CVEs that need further investigation
Processing commands for cont...@bugs.debian.org: retitle 688849 ffmpeg/squeeze/stable: multiple CVEs that need further investigation Bug #688849 [src:ffmpeg] libav: multiple CVEs in ffmpeg/libav Changed Bug title to 'ffmpeg/squeeze/stable: multiple CVEs that need further investigation' from 'libav: multiple CVEs in ffmpeg/libav' thanks Stopping processing here. Please contact me if you need assistance. -- 688849: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688849 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#696424: Possible patch
Hi David and Guido Thanks for the further update. Guido are you sponsoring also this upload from David (as you might better know sanlock). If you have not time at the moment I can try to to upload David's update in the comming days. Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed (with 1 errors): reassigning to xorg
Processing commands for cont...@bugs.debian.org: reassign 692814 xserver-xorg Bug #692814 [gdm3] gdm3 is not staring normally Bug reassigned from package 'gdm3' to 'xserver-xorg'. No longer marked as found in versions gdm3/3.6.1-1 and gdm3/3.6.1-2. Ignoring request to alter fixed versions of bug #692814 to the same values previously set reassign 692814 X crash with gdm3 on boot and with kdm on first logout Unknown command or malformed arguments to command. thanks Stopping processing here. Please contact me if you need assistance. -- 692814: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692814 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#696424: Possible patch
Hi Salvatore, On Wed, Jan 16, 2013 at 08:20:26AM +0100, Salvatore Bonaccorso wrote: Hi David and Guido Thanks for the further update. Guido are you sponsoring also this upload from David (as you might better know sanlock). If you have not time at the moment I can try to to upload David's update in the comming days. I'd be great if you could sponsor this since you ironed out all the details with David! Cheers, -- Guido Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: retitle correctly
Processing commands for cont...@bugs.debian.org: retitle 692814 X crash with gdm3 on boot and with kdm on first logout Bug #692814 [xserver-xorg] gdm3 is not staring normally Changed Bug title to 'X crash with gdm3 on boot and with kdm on first logout' from 'gdm3 is not staring normally' found 692814 1:7.7+1 Bug #692814 [xserver-xorg] X crash with gdm3 on boot and with kdm on first logout Marked as found in versions xorg/1:7.7+1. thanks Stopping processing here. Please contact me if you need assistance. -- 692814: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692814 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org