Bug#700002: curl: CVE-2013-0249
Package: curl Severity: grave Tags: security Justification: user security hole http://curl.haxx.se/docs/adv_20130206.html Remember we're in freeze, so please upload only the minimal security fix. Cheers, Moritz -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#685251: marked as done (quantum-plugin-ryu-agent: ImportError: No module named ryu.agent.ryu_quantum_agent / ryu.app)
Your message dated Thu, 07 Feb 2013 10:02:32 + with message-id e1u3ojm-00059w...@franck.debian.org and subject line Bug#685251: fixed in quantum 2012.1-5+deb70u1 has caused the Debian Bug report #685251, regarding quantum-plugin-ryu-agent: ImportError: No module named ryu.agent.ryu_quantum_agent / ryu.app to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 685251: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685251 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: quantum-plugin-ryu-agent Version: 2012.1-6 Severity: grave Justification: renders package unusable If quantum-plugin-ryu is not installed, quantum-ryu-agent doesn't start: # /usr/bin/quantum-ryu-agent Traceback (most recent call last): File /usr/bin/quantum-ryu-agent, line 22, in module from quantum.plugins.ryu.agent.ryu_quantum_agent import main ImportError: No module named ryu.agent.ryu_quantum_agent If quantum-plugin-ryu is installed, quantum-ryu-agent doesn't start either, but with a different error: # /usr/bin/quantum-ryu-agent Traceback (most recent call last): File /usr/bin/quantum-ryu-agent, line 22, in module from quantum.plugins.ryu.agent.ryu_quantum_agent import main File /usr/lib/python2.7/dist-packages/quantum/plugins/ryu/agent/ryu_quantum_agent.py, line 32, in module from ryu.app import rest_nw_id ImportError: No module named ryu.app (Disclaimer: I have no idea what quantum-ryu-agent is about. I discovered that it doesn't work by running some semi-automatic tests.) -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (990, 'unstable') Architecture: i386 (i686) Kernel: Linux 3.2.0-3-686-pae (SMP w/1 CPU core) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Versions of packages quantum-plugin-ryu-agent depends on: ii python 2.7.3-2 ii python-quantum 2012.1-6 ii python2.7 2.7.3-3 -- Jakub Wilk ---End Message--- ---BeginMessage--- Source: quantum Source-Version: 2012.1-5+deb70u1 We believe that the bug you reported is fixed in the latest version of quantum, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 685...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Ola Lundqvist o...@debian.org (supplier of updated quantum package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 07 Jan 2013 10:29:07 +0200 Source: quantum Binary: quantum-server quantum-plugin-cisco quantum-plugin-openvswitch quantum-plugin-sample quantum-plugin-nicira quantum-plugin-linuxbridge quantum-plugin-openvswitch-agent quantum-plugin-linuxbridge-agent python-quantum Architecture: source all Version: 2012.1-5+deb70u1 Distribution: testing-proposed-updates Urgency: high Maintainer: PKG OpenStack openstack-de...@lists.alioth.debian.org Changed-By: Ola Lundqvist o...@debian.org Description: python-quantum - Quantum is a virutal network service for Openstack. (python libra quantum-plugin-cisco - OpenStack Virtual network service - cisco plugin quantum-plugin-linuxbridge - OpenStack Virtual network service - linux bridge plugin quantum-plugin-linuxbridge-agent - OpenStack Virtual network service - linuxbridge agent quantum-plugin-nicira - OpenStack Virtual network service - nicira NVP plugin quantum-plugin-openvswitch - OpenStack Virtual network service - openvswitch plugin quantum-plugin-openvswitch-agent - OpenStack Virtual network service - openvswitch agent quantum-plugin-sample - OpenStack Virtual network service - sample plugin quantum-server - OpenStack Virtual network service - server Closes: 685251 Changes: quantum (2012.1-5+deb70u1) testing-proposed-updates; urgency=high . * Non-maintainer upload. * Backport of the removal of ryu app from upcoming 2012.1-7. This needs to go directly to testing as the changes in 2012.1-6 is too excessive. Closes: #685251. Checksums-Sha1: 5a8573aba7664ea5bf42cae1267f0be4dfe7dd8f 2218 quantum_2012.1-5+deb70u1.dsc 39ed59ce24f7916dd7ff886e598fc33b2b456818 6980 quantum_2012.1-5+deb70u1.debian.tar.gz 38f5c4aa705509ae679039a952ec812c10b1ca39 7258
Bug#694473: Fix doesn't work for me
Hello on my testing system which also updated yesterday and today I get the same error again. So for me it isn't solved. Kind regards Mechtilde signature.asc Description: OpenPGP digital signature
Bug#694473: [php-maint] Bug#694473: Fix doesn't work for me
Please provide a backtrace. And if you can please test with PHP from experimental. Thanks, Ondrej On Thu, Feb 7, 2013 at 11:11 AM, Mechtilde o...@mechtilde.de wrote: Hello on my testing system which also updated yesterday and today I get the same error again. So for me it isn't solved. Kind regards Mechtilde ___ pkg-php-maint mailing list pkg-php-ma...@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-php-maint -- Ondřej Surý ond...@sury.org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#699852: syncevolution-http: sync from nokia e51 to syncevo-http-server not possible invalid server [ERROR] twisted: Unhandled Error
Hi, following the advice of Patrick Ohly, I compiled the latest version of syncevolution (1.3.99.2) on this machine and the issue is resolved. Please upgrade syncevolution to this version. Regards Christof -- () ascii ribbon campaign - against html e-mail /\ www.asciiribbon.org - against proprietary attachments signature.asc Description: This is a digitally signed message part.
Bug#700008: FTBFS: strip.c:24:28: fatal error: linux/if_strip.h: No such file or directory
Package: src:net-tools Version: 1.60-24.2 Severity: serious Tags: patch Justification: fails to build from source (but built successfully in the past) Apparently, STRIP support is now an unthing, and kernel headers no longer have it. Ubuntu have already patched it; from their patch: diff -pruN 1.60-24.2/debian/config.h 1.60-24.2ubuntu1/debian/config.h --- 1.60-24.2/debian/config.h 2012-12-04 01:05:53.0 + +++ 1.60-24.2ubuntu1/debian/config.h2012-12-04 01:05:54.0 + @@ -49,8 +49,8 @@ #define HAVE_HWSLIP 1 #define HAVE_HWPPP 1 #define HAVE_HWTUNNEL 1 -#define HAVE_HWSTRIP 1 -#define HAVE_HWTR 1 +#define HAVE_HWSTRIP 0 +#define HAVE_HWTR 0 #define HAVE_HWAX25 1 #define HAVE_HWROSE 1 #define HAVE_HWNETROM 1 diff -pruN 1.60-24.2/debian/config.make 1.60-24.2ubuntu1/debian/config.make --- 1.60-24.2/debian/config.make2012-12-04 01:05:53.0 + +++ 1.60-24.2ubuntu1/debian/config.make 2012-12-04 01:05:54.0 + @@ -16,8 +16,8 @@ HAVE_HWARC=1 HAVE_HWSLIP=1 HAVE_HWPPP=1 HAVE_HWTUNNEL=1 -HAVE_HWSTRIP=1 -HAVE_HWTR=1 +HAVE_HWSTRIP=0 +HAVE_HWTR=0 HAVE_HWAX25=1 HAVE_HWROSE=1 HAVE_HWNETROM=1 which makes net-tools build again. -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (150, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.7.1-x32 (SMP w/6 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#699596: syslinux-common: vesamenu.c32 is not a valid com32 image
On jeu., 2013-02-07 at 08:37 +0100, Daniel Baumann wrote: On 02/06/2013 10:03 PM, Yves-Alexis Perez wrote: There's no such thing as libcom32.c32 in /boot so that'd explain why. you might want to look at the bug it was merged with, specifically: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699382#40 And? I'm not especially saying it's not the same bug, just that: - my system is not unbootable - I have no idea if it's syslinux or syslinux-themes-debian fault - the bug is still present in 2:5.01+dfsg-1 / 12-1.1 If it needs manual tuning in some scripts to port it to the new syslinux, then fine, you seem to be the de factor maintainer of both packages so everything's under your control. Regards, -- Yves-Alexis signature.asc Description: This is a digitally signed message part
Bug#699596: syslinux-common: vesamenu.c32 is not a valid com32 image
On 02/07/2013 01:02 PM, Yves-Alexis Perez wrote: - I have no idea if it's syslinux or syslinux-themes-debian fault did you read the other bug? usually, opening a duplicate bug doesn't mean that the maintainer will re-tell the whole story again, and that pointing to the first bug about the same issue should be enough, so that the bug reporter would read it there when being pointed at it. - the bug is still present in 2:5.01+dfsg-1 / 12-1.1 that's why it's open and not closed yet. If it needs manual tuning in some scripts to port it to the new syslinux, then fine, you seem to be the de factor maintainer of both packages so everything's under your control. look at the live-build commit and replicate it in /usr/share/syslinux/theme/$your_theme, or wait until the theme in debian is fixed. -- Address:Daniel Baumann, Donnerbuehlweg 3, CH-3012 Bern Email: daniel.baum...@progress-technologies.net Internet: http://people.progress-technologies.net/~daniel.baumann/ -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#693208: Bug#699899: tpu: clang/3.0-6.1+deb7u0
Hi Adam, Adam D. Barratt a...@adam-barratt.org.uk writes: I wasn't particularly suggesting re-introducing 3.0 to unstable. However, given that packages from tpu get essentially no testing at all (no pun intended) before hitting testing, being able to prove a patch in unstable first avoids a number of (admittedly not all) potential issues. Now I understand what your point was, thanks for clarifying. Looking at the proposed tpu diff and the 3.0 - 3.1 diff, it looks like the armhf changes should apply as is to 3.1; has anyone tried that? I have ported the patches from 3.0 to 3.1 and successfully built the package on amd64, where it works. Therefore, I will now build it on armhf, which will take around a day. Sylvestre: Are you okay with me NMUing clang 3.1-8.1 to unstable in order to expose my changes to a wider audience before we do the fix via t-p-u? -- Best regards, Michael -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#591199: marked as done (yui: does not build swf files from source)
Your message dated Thu, 07 Feb 2013 12:19:08 + with message-id e1u3qry-00054k...@franck.debian.org and subject line Bug#591199: fixed in yui 2.9.0.dfsg.0.1-0.1 has caused the Debian Bug report #591199, regarding yui: does not build swf files from source to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 591199: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591199 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: yui Version: 2.8.1-1 Severity: serious Hi, yui ships multiple swf files but does not build them from source. Cheers, -- Raphael Geissert - Debian Developer www.debian.org - get.debian.net ---End Message--- ---BeginMessage--- Source: yui Source-Version: 2.9.0.dfsg.0.1-0.1 We believe that the bug you reported is fixed in the latest version of yui, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 591...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Dominic Hargreaves d...@earth.li (supplier of updated yui package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 03 Feb 2013 11:54:19 + Source: yui Binary: libjs-yui libjs-yui-doc Architecture: source all Version: 2.9.0.dfsg.0.1-0.1 Distribution: unstable Urgency: low Maintainer: Debian Javascript Maintainers pkg-javascript-de...@lists.alioth.debian.org Changed-By: Dominic Hargreaves d...@earth.li Description: libjs-yui - Yahoo User Interface Library libjs-yui-doc - Documentation and examples for the Yahoo User Interface Library Closes: 591199 692434 Changes: yui (2.9.0.dfsg.0.1-0.1) unstable; urgency=low . * Non-maintainer upload. * Disable installation of uploader.swf and swfstore.swf as examples owing to unfixed security issues (Closes: #692434) * Repack orig.tar.gz to remove all SWF files, including those without source (Closes: #591199) Checksums-Sha1: e7945d332e3a9deba6acc5f19d032609372c9b11 1443 yui_2.9.0.dfsg.0.1-0.1.dsc 4602442034cf4b0a9ab12370ba94f7e6fce80649 10944741 yui_2.9.0.dfsg.0.1.orig.tar.gz ecad33d65a1968cc80d495456e0d5ef3fec85037 24422 yui_2.9.0.dfsg.0.1-0.1.debian.tar.gz 6e312ccd553ef1eb33760c663248a2557b066b13 2478182 libjs-yui_2.9.0.dfsg.0.1-0.1_all.deb 16c824112ef7c4da3dae97cacf52ce528d016c62 7670202 libjs-yui-doc_2.9.0.dfsg.0.1-0.1_all.deb Checksums-Sha256: 5d39440dbf4da7a57b77441599c09a0513267a319f4ae623754ca4b948595596 1443 yui_2.9.0.dfsg.0.1-0.1.dsc aa3a2f09edb65cf0b6261164bece9f4f7784f2eb2c9363fa2c5f111d452169aa 10944741 yui_2.9.0.dfsg.0.1.orig.tar.gz d61ebf8154b54868805535a1ba0175ff90c07d84f0bdc46356056a69c38f84a6 24422 yui_2.9.0.dfsg.0.1-0.1.debian.tar.gz 6281b3dbc0a13ba1e455d4841e7df95d49c2ff1cb9a02bde50bc35042337d5bf 2478182 libjs-yui_2.9.0.dfsg.0.1-0.1_all.deb df795b752c806bccc05d957fbb9c04061487cf5e2b3140333c7fd71195f25d5c 7670202 libjs-yui-doc_2.9.0.dfsg.0.1-0.1_all.deb Files: a3363dd5c7386ec8979e29ec1b22cde0 1443 web optional yui_2.9.0.dfsg.0.1-0.1.dsc b6e5418833e342e9dcaaf7b451657346 10944741 web optional yui_2.9.0.dfsg.0.1.orig.tar.gz a58439ee57db6cd2641652fec8e40811 24422 web optional yui_2.9.0.dfsg.0.1-0.1.debian.tar.gz 0deff15a4a40ba4f03e34e66e271e88c 2478182 web optional libjs-yui_2.9.0.dfsg.0.1-0.1_all.deb a03aa9a7315e5b92db238a3e5cd5bac3 7670202 doc optional libjs-yui-doc_2.9.0.dfsg.0.1-0.1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFRDlC/YzuFKFF44qURAlo7AJ9V8NZHNEdPfDlxkv4nCkql3215oQCdGf5W eWHQrU4WTBbwfbMg8jHE9uc= =enZY -END PGP SIGNATUREEnd Message---
Bug#692434: marked as done (CVE-2012-5883, CVE-2012-5882, CVE-2012-5881 - YUI 2.x security issue regarding embedded SWF files)
Your message dated Thu, 07 Feb 2013 12:19:08 + with message-id e1u3qry-00054o...@franck.debian.org and subject line Bug#692434: fixed in yui 2.9.0.dfsg.0.1-0.1 has caused the Debian Bug report #692434, regarding CVE-2012-5883, CVE-2012-5882, CVE-2012-5881 - YUI 2.x security issue regarding embedded SWF files to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 692434: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692434 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: yui Severity: grave Tags: security Justification: user security hole Hi, please see : http://www.yuiblog.com/blog/2012/10/30/security-announcement-swf-vulnerability- in-yui-2/ Are vulnerable versions in Debian? Cheers, luciano ---End Message--- ---BeginMessage--- Source: yui Source-Version: 2.9.0.dfsg.0.1-0.1 We believe that the bug you reported is fixed in the latest version of yui, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 692...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Dominic Hargreaves d...@earth.li (supplier of updated yui package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 03 Feb 2013 11:54:19 + Source: yui Binary: libjs-yui libjs-yui-doc Architecture: source all Version: 2.9.0.dfsg.0.1-0.1 Distribution: unstable Urgency: low Maintainer: Debian Javascript Maintainers pkg-javascript-de...@lists.alioth.debian.org Changed-By: Dominic Hargreaves d...@earth.li Description: libjs-yui - Yahoo User Interface Library libjs-yui-doc - Documentation and examples for the Yahoo User Interface Library Closes: 591199 692434 Changes: yui (2.9.0.dfsg.0.1-0.1) unstable; urgency=low . * Non-maintainer upload. * Disable installation of uploader.swf and swfstore.swf as examples owing to unfixed security issues (Closes: #692434) * Repack orig.tar.gz to remove all SWF files, including those without source (Closes: #591199) Checksums-Sha1: e7945d332e3a9deba6acc5f19d032609372c9b11 1443 yui_2.9.0.dfsg.0.1-0.1.dsc 4602442034cf4b0a9ab12370ba94f7e6fce80649 10944741 yui_2.9.0.dfsg.0.1.orig.tar.gz ecad33d65a1968cc80d495456e0d5ef3fec85037 24422 yui_2.9.0.dfsg.0.1-0.1.debian.tar.gz 6e312ccd553ef1eb33760c663248a2557b066b13 2478182 libjs-yui_2.9.0.dfsg.0.1-0.1_all.deb 16c824112ef7c4da3dae97cacf52ce528d016c62 7670202 libjs-yui-doc_2.9.0.dfsg.0.1-0.1_all.deb Checksums-Sha256: 5d39440dbf4da7a57b77441599c09a0513267a319f4ae623754ca4b948595596 1443 yui_2.9.0.dfsg.0.1-0.1.dsc aa3a2f09edb65cf0b6261164bece9f4f7784f2eb2c9363fa2c5f111d452169aa 10944741 yui_2.9.0.dfsg.0.1.orig.tar.gz d61ebf8154b54868805535a1ba0175ff90c07d84f0bdc46356056a69c38f84a6 24422 yui_2.9.0.dfsg.0.1-0.1.debian.tar.gz 6281b3dbc0a13ba1e455d4841e7df95d49c2ff1cb9a02bde50bc35042337d5bf 2478182 libjs-yui_2.9.0.dfsg.0.1-0.1_all.deb df795b752c806bccc05d957fbb9c04061487cf5e2b3140333c7fd71195f25d5c 7670202 libjs-yui-doc_2.9.0.dfsg.0.1-0.1_all.deb Files: a3363dd5c7386ec8979e29ec1b22cde0 1443 web optional yui_2.9.0.dfsg.0.1-0.1.dsc b6e5418833e342e9dcaaf7b451657346 10944741 web optional yui_2.9.0.dfsg.0.1.orig.tar.gz a58439ee57db6cd2641652fec8e40811 24422 web optional yui_2.9.0.dfsg.0.1-0.1.debian.tar.gz 0deff15a4a40ba4f03e34e66e271e88c 2478182 web optional libjs-yui_2.9.0.dfsg.0.1-0.1_all.deb a03aa9a7315e5b92db238a3e5cd5bac3 7670202 doc optional libjs-yui-doc_2.9.0.dfsg.0.1-0.1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFRDlC/YzuFKFF44qURAlo7AJ9V8NZHNEdPfDlxkv4nCkql3215oQCdGf5W eWHQrU4WTBbwfbMg8jHE9uc= =enZY -END PGP SIGNATUREEnd Message---
Bug#591383: marked as done (libjs-yui: does not build .swf files from source)
Your message dated Thu, 07 Feb 2013 12:19:08 + with message-id e1u3qry-00054k...@franck.debian.org and subject line Bug#591199: fixed in yui 2.9.0.dfsg.0.1-0.1 has caused the Debian Bug report #591199, regarding libjs-yui: does not build .swf files from source to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 591199: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591199 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: otrs2 Version: 2.4.7-5 Severity: serious Hi, otrs2 ships multiple swf files which are not built from source. Cheers, -- Raphael Geissert - Debian Developer www.debian.org - get.debian.net ---End Message--- ---BeginMessage--- Source: yui Source-Version: 2.9.0.dfsg.0.1-0.1 We believe that the bug you reported is fixed in the latest version of yui, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 591...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Dominic Hargreaves d...@earth.li (supplier of updated yui package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 03 Feb 2013 11:54:19 + Source: yui Binary: libjs-yui libjs-yui-doc Architecture: source all Version: 2.9.0.dfsg.0.1-0.1 Distribution: unstable Urgency: low Maintainer: Debian Javascript Maintainers pkg-javascript-de...@lists.alioth.debian.org Changed-By: Dominic Hargreaves d...@earth.li Description: libjs-yui - Yahoo User Interface Library libjs-yui-doc - Documentation and examples for the Yahoo User Interface Library Closes: 591199 692434 Changes: yui (2.9.0.dfsg.0.1-0.1) unstable; urgency=low . * Non-maintainer upload. * Disable installation of uploader.swf and swfstore.swf as examples owing to unfixed security issues (Closes: #692434) * Repack orig.tar.gz to remove all SWF files, including those without source (Closes: #591199) Checksums-Sha1: e7945d332e3a9deba6acc5f19d032609372c9b11 1443 yui_2.9.0.dfsg.0.1-0.1.dsc 4602442034cf4b0a9ab12370ba94f7e6fce80649 10944741 yui_2.9.0.dfsg.0.1.orig.tar.gz ecad33d65a1968cc80d495456e0d5ef3fec85037 24422 yui_2.9.0.dfsg.0.1-0.1.debian.tar.gz 6e312ccd553ef1eb33760c663248a2557b066b13 2478182 libjs-yui_2.9.0.dfsg.0.1-0.1_all.deb 16c824112ef7c4da3dae97cacf52ce528d016c62 7670202 libjs-yui-doc_2.9.0.dfsg.0.1-0.1_all.deb Checksums-Sha256: 5d39440dbf4da7a57b77441599c09a0513267a319f4ae623754ca4b948595596 1443 yui_2.9.0.dfsg.0.1-0.1.dsc aa3a2f09edb65cf0b6261164bece9f4f7784f2eb2c9363fa2c5f111d452169aa 10944741 yui_2.9.0.dfsg.0.1.orig.tar.gz d61ebf8154b54868805535a1ba0175ff90c07d84f0bdc46356056a69c38f84a6 24422 yui_2.9.0.dfsg.0.1-0.1.debian.tar.gz 6281b3dbc0a13ba1e455d4841e7df95d49c2ff1cb9a02bde50bc35042337d5bf 2478182 libjs-yui_2.9.0.dfsg.0.1-0.1_all.deb df795b752c806bccc05d957fbb9c04061487cf5e2b3140333c7fd71195f25d5c 7670202 libjs-yui-doc_2.9.0.dfsg.0.1-0.1_all.deb Files: a3363dd5c7386ec8979e29ec1b22cde0 1443 web optional yui_2.9.0.dfsg.0.1-0.1.dsc b6e5418833e342e9dcaaf7b451657346 10944741 web optional yui_2.9.0.dfsg.0.1.orig.tar.gz a58439ee57db6cd2641652fec8e40811 24422 web optional yui_2.9.0.dfsg.0.1-0.1.debian.tar.gz 0deff15a4a40ba4f03e34e66e271e88c 2478182 web optional libjs-yui_2.9.0.dfsg.0.1-0.1_all.deb a03aa9a7315e5b92db238a3e5cd5bac3 7670202 doc optional libjs-yui-doc_2.9.0.dfsg.0.1-0.1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFRDlC/YzuFKFF44qURAlo7AJ9V8NZHNEdPfDlxkv4nCkql3215oQCdGf5W eWHQrU4WTBbwfbMg8jHE9uc= =enZY -END PGP SIGNATUREEnd Message---
Bug#693608: marked as done (CVE-2012-5883, CVE-2012-5882, CVE-2012-5881 - YUI 2.x security issue regarding embedded SWF files)
Your message dated Thu, 07 Feb 2013 12:19:08 + with message-id e1u3qry-00054o...@franck.debian.org and subject line Bug#692434: fixed in yui 2.9.0.dfsg.0.1-0.1 has caused the Debian Bug report #692434, regarding CVE-2012-5883, CVE-2012-5882, CVE-2012-5881 - YUI 2.x security issue regarding embedded SWF files to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 692434: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692434 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: yui Severity: grave Tags: security Hi, the following vulnerabilities were published for yui. CVE-2012-5883[0]: | Cross-site scripting (XSS) vulnerability in the Flash component | infrastructure in YUI 2.8.0 through 2.9.0, as used in Bugzilla 3.7.x | and 4.0.x before 4.0.9, 4.1.x and 4.2.x before 4.2.4, and 4.3.x and | 4.4.x before 4.4rc1, allows remote attackers to inject arbitrary web | script or HTML via vectors related to swfstore.swf, a similar issue to | CVE-2010-4209. CVE-2012-5882[1]: | Cross-site scripting (XSS) vulnerability in the Flash component | infrastructure in YUI 2.5.0 through 2.9.0 allows remote attackers to | inject arbitrary web script or HTML via vectors related to | uploader.swf, a similar issue to CVE-2010-4208. CVE-2012-5881[2]: | Cross-site scripting (XSS) vulnerability in the Flash component | infrastructure in YUI 2.4.0 through 2.9.0 allows remote attackers to | inject arbitrary web script or HTML via vectors related to charts.swf, | a similar issue to CVE-2010-4207. If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities Exposures) ids in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5883 http://security-tracker.debian.org/tracker/CVE-2012-5883 [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5882 http://security-tracker.debian.org/tracker/CVE-2012-5882 [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5881 http://security-tracker.debian.org/tracker/CVE-2012-5881 http://yuilibrary.com/support/20121030-vulnerability/ Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 pgpiYlJW3T9ty.pgp Description: PGP signature ---End Message--- ---BeginMessage--- Source: yui Source-Version: 2.9.0.dfsg.0.1-0.1 We believe that the bug you reported is fixed in the latest version of yui, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 692...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Dominic Hargreaves d...@earth.li (supplier of updated yui package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 03 Feb 2013 11:54:19 + Source: yui Binary: libjs-yui libjs-yui-doc Architecture: source all Version: 2.9.0.dfsg.0.1-0.1 Distribution: unstable Urgency: low Maintainer: Debian Javascript Maintainers pkg-javascript-de...@lists.alioth.debian.org Changed-By: Dominic Hargreaves d...@earth.li Description: libjs-yui - Yahoo User Interface Library libjs-yui-doc - Documentation and examples for the Yahoo User Interface Library Closes: 591199 692434 Changes: yui (2.9.0.dfsg.0.1-0.1) unstable; urgency=low . * Non-maintainer upload. * Disable installation of uploader.swf and swfstore.swf as examples owing to unfixed security issues (Closes: #692434) * Repack orig.tar.gz to remove all SWF files, including those without source (Closes: #591199) Checksums-Sha1: e7945d332e3a9deba6acc5f19d032609372c9b11 1443 yui_2.9.0.dfsg.0.1-0.1.dsc 4602442034cf4b0a9ab12370ba94f7e6fce80649 10944741 yui_2.9.0.dfsg.0.1.orig.tar.gz ecad33d65a1968cc80d495456e0d5ef3fec85037 24422 yui_2.9.0.dfsg.0.1-0.1.debian.tar.gz 6e312ccd553ef1eb33760c663248a2557b066b13 2478182 libjs-yui_2.9.0.dfsg.0.1-0.1_all.deb 16c824112ef7c4da3dae97cacf52ce528d016c62 7670202 libjs-yui-doc_2.9.0.dfsg.0.1-0.1_all.deb Checksums-Sha256: 5d39440dbf4da7a57b77441599c09a0513267a319f4ae623754ca4b948595596 1443 yui_2.9.0.dfsg.0.1-0.1.dsc aa3a2f09edb65cf0b6261164bece9f4f7784f2eb2c9363fa2c5f111d452169aa 10944741 yui_2.9.0.dfsg.0.1.orig.tar.gz
Bug#699596: syslinux-common: vesamenu.c32 is not a valid com32 image
On jeu., 2013-02-07 at 13:19 +0100, Daniel Baumann wrote: On 02/07/2013 01:02 PM, Yves-Alexis Perez wrote: - I have no idea if it's syslinux or syslinux-themes-debian fault did you read the other bug? Actually yes, even without being bitten by the bug it'd be hard to miss. usually, opening a duplicate bug doesn't mean that the maintainer will re-tell the whole story again, and that pointing to the first bug about the same issue should be enough, so that the bug reporter would read it there when being pointed at it. - the bug is still present in 2:5.01+dfsg-1 / 12-1.1 that's why it's open and not closed yet. Yeah, I was merely pointing out that version tracking was definitely confusing here (because of the reassigns) If it needs manual tuning in some scripts to port it to the new syslinux, then fine, you seem to be the de factor maintainer of both packages so everything's under your control. look at the live-build commit and replicate it in /usr/share/syslinux/theme/$your_theme, Actually it's $your_theme, but eh. or wait until the theme in debian is fixed. I'm waiting. -- Yves-Alexis signature.asc Description: This is a digitally signed message part
Bug#699596: syslinux-common: vesamenu.c32 is not a valid com32 image
On 02/07/2013 01:25 PM, Yves-Alexis Perez wrote: Actually it's $your_theme, but eh. i ment '$your_theme' as in 'the one you've chosen from the ones that are available in the package', but whatever. -- Address:Daniel Baumann, Donnerbuehlweg 3, CH-3012 Bern Email: daniel.baum...@progress-technologies.net Internet: http://people.progress-technologies.net/~daniel.baumann/ -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#693208: Bug#699899: tpu: clang/3.0-6.1+deb7u0
Le 02/07/13 13:15, Michael Stapelberg a écrit : Hi Adam, Adam D. Barratt a...@adam-barratt.org.uk writes: Looking at the proposed tpu diff and the 3.0 - 3.1 diff, it looks like the armhf changes should apply as is to 3.1; has anyone tried that? I have ported the patches from 3.0 to 3.1 and successfully built the package on amd64, where it works. Therefore, I will now build it on armhf, which will take around a day. Sylvestre: Are you okay with me NMUing clang 3.1-8.1 to unstable in order to expose my changes to a wider audience before we do the fix via t-p-u? Please go ahread. :) Thanks again, Sylvestre -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#699859: PlayOnLinux doesn't start
Hello, i'm not sure if the creators of PlayOnLinux have ever considered the software to be used on kfreeBSD. However can you confirm that the software is otherwise usable if you modify the check for a Linux system in /usr/share/playonlinux/playonlinux? If this is the case then a simple solution would be to improve the check and to test whether a Linux kernel or a kFreeBSD kernel is in use. If you cannot use playonlinux although you have removed the check then it's probably better to state in README.Debian that kfreeBSD is not supported. Regards, Markus signature.asc Description: OpenPGP digital signature
Bug#694473: [php-maint] Bug#694473: Fix doesn't work for me
Hello Ondrej, Can you provide me an exact description what you need as backtrace. then I will send you the data I have. I I repeated the test under an actual Sid with php5 from experimental in the same virtual machine as I did the first test writing this bugreport. I get the same error message as before. Kind regards Mechtilde Am 07.02.2013 11:21, schrieb Ondřej Surý: Please provide a backtrace. And if you can please test with PHP from experimental. Thanks, Ondrej On Thu, Feb 7, 2013 at 11:11 AM, Mechtilde o...@mechtilde.de wrote: Hello on my testing system which also updated yesterday and today I get the same error again. So for me it isn't solved. Kind regards Mechtilde signature.asc Description: OpenPGP digital signature
Bug#700027: kfreebsd-kernel-headers: Redefinition of struct termios
Package: kfreebsd-kernel-headers Version: 0.82 Severity: serious Control: affects -1 inetutils Hi! I just uploaded a new inetutils version (with a minimal change) which FTBFS, but it built fine before. Just for reference, here's the build log: https://buildd.debian.org/status/fetch.php?pkg=inetutilsarch=kfreebsd-amd64ver=2%3A1.9-2stamp=1360207021 The problem is a redefinition of struct termios, that can be reproduced with something like: ,--- termios.c #include sys/tty.h #include termios.h int main() { return 0; } `--- I'm filing this to track the issue, and because I have to do some other stuff, if no one else has dealt with it by then I'll look into fixing and uploading the package. Thanks, Guillem -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: kfreebsd-kernel-headers: Redefinition of struct termios
Processing control commands: affects -1 inetutils Bug #700027 [kfreebsd-kernel-headers] kfreebsd-kernel-headers: Redefinition of struct termios Added indication that 700027 affects inetutils -- 700027: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700027 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#693208: Bug#699899: tpu: clang/3.0-6.1+deb7u0
Hi Adam, Michael Stapelberg stapelb...@debian.org writes: Therefore, I will now build it on armhf, which will take around a day. Update: the armhf build failed because about 100 testcases fail. I have no clue on how to fix this and can’t spend much more time on debugging this either. Given that the 3.0 version works — it passed all the clang tests and can compile non-trivial software on armhf and amd64 — can we just upload that? Or, as a last resort, re-introduce 3.0 in unstable, even if switching to an epoch is ugly? -- Best regards, Michael -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#675684: closing 675684
close 675684 thanks -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: closing 675684
Processing commands for cont...@bugs.debian.org: close 675684 Bug #675684 [src:haskell-github] Needs to bump http-conduit dependency Marked Bug as done thanks Stopping processing here. Please contact me if you need assistance. -- 675684: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=675684 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: severity of 699848 is serious
Processing commands for cont...@bugs.debian.org: # raising severity since I think the package is actually useless like this severity 699848 serious Bug #699848 [sks] sks: sks_build.sh hangs Severity set to 'serious' from 'normal' thanks Stopping processing here. Please contact me if you need assistance. -- 699848: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699848 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#693208: Bug#699899: tpu: clang/3.0-6.1+deb7u0
Le 02/07/13 18:07, Michael Stapelberg a écrit : Hi Adam, Michael Stapelberg stapelb...@debian.org writes: Therefore, I will now build it on armhf, which will take around a day. Update: the armhf build failed because about 100 testcases fail. I have no clue on how to fix this and can’t spend much more time on debugging this either. Given that the 3.0 version works — it passed all the clang tests and can compile non-trivial software on armhf and amd64 — can we just upload that? Or, as a last resort, re-introduce 3.0 in unstable, even if switching to an epoch is ugly? Don't bother too much about the epoch, clang source package is going to be removed anyway... (I am working on a LLVM toolchain package including llvm + clang + other stuff). Sylvestre -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#700037: libgo-perl: libgraphviz-perl dependency missing
Package: libgo-perl Version: 0.13-1 Severity: grave Justification: renders package unusable Dear Maintainer, Deb Med Team, so myself as well, /usr/share/perl5/GO/IO/Dotty.pm:24: 'use GraphViz;'. However d/control does not Depends: libgraphviz-perl. Module fails to load when libgraphviz-perl is not installed. I am fixing this in an upload to upstable as soon as I get the bug number. Laszlo -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (990, 'unstable'), (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF8, LC_CTYPE=en_US.UTF8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF8) Shell: /bin/sh linked to /bin/dash Versions of packages libgo-perl depends on: ii libdata-stag-perl 0.11-2 ii perl 5.14.2-17 ii perl-modules 5.14.2-17 Versions of packages libgo-perl recommends: ii libxml-checker-perl 0.13-5 ii libxml-libxml-perl 2.0010+dfsg-1 ii libxml-libxslt-perl 1.78-1 ii libxml-writer-perl 0.615-1 ii xsltproc 1.1.26-14 Versions of packages libgo-perl suggests: ii bioperl 1.6.901-3 -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#673038: Re: [Pkg-openldap-devel] Bug#673038: Bug#673038: slapd: slapcat output truncated every now and then
tags 673038 + patch fixed-upstream thanks Hi All, 2013/1/28 Bálint Réczey bal...@balintreczey.hu: ... I think we're all in agreement that the code should be fixed. Please help to do that, if you can. Upstream has rejected the proposed fix. Since it seems I'm not familiar enough with upstream's plans and coding practices I'm not the best person to provide a fix. Upstream (Howard Chu, thanks!) has committed and alternate fix [1] [2]. Please consider back-porting it to Debian instead of using my patch. Cheers, Balint [1]: http://www.openldap.org/lists/openldap-bugs/201302/msg00016.html [2]: http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=blobdiff;f=servers/slapd/back-bdb/init.c;h=57690fc532a3c3c803ceeb1b404ad5952b5df734;hp=1d8527332a956d4c4122ae94a69f07ba9f4da9a1;hb=HEAD;hpb=1c99711ede25860b24750aab9c529a49c53756ae -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Re: [Pkg-openldap-devel] Bug#673038: Bug#673038: slapd: slapcat output truncated every now and then
Processing commands for cont...@bugs.debian.org: tags 673038 + patch fixed-upstream Bug #673038 [slapd] slapd: slapcat output truncated every now and then Added tag(s) fixed-upstream and patch. thanks Stopping processing here. Please contact me if you need assistance. -- 673038: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=673038 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#672524: [Pkg-bitcoin-devel] Bug#672524: upload of bitcoin package
Uploaded, thanks so much for your help! Here is the results from the buildlog. Debug output for #672524 pwd /build/buildd-bitcoin_0.7.2-3-kfreebsd-i386-Os85sN/bitcoin-0.7.2 ls -Rl . {SNIP} ./src/test/data: total 96 -rw-r--r-- 1 buildd sbuild 438 Dec 10 14:47 base58_encode_decode.json -rw-r--r-- 1 buildd sbuild 4195 Dec 10 14:47 base58_keys_invalid.json -rw-r--r-- 1 buildd sbuild 12618 Dec 10 14:47 base58_keys_valid.json -rw-r--r-- 1 buildd sbuild 20645 Dec 10 14:47 script_invalid.json -rw-r--r-- 1 buildd sbuild 33360 Dec 10 14:47 script_valid.json -rw-r--r-- 1 buildd sbuild 7507 Dec 10 14:47 tx_invalid.json -rw-r--r-- 1 buildd sbuild 9525 Dec 10 14:47 tx_valid.json ok so it is there. Later on: HOME=/build/buildd-bitcoin_0.7.2-3-kfreebsd-i386-Os85sN/bitcoin-0.7.2/debian/home src/test_bitcoin Running 70 test cases... Trying to open /build/buildd-bitcoin_0.7.2-3-kfreebsd-1-Os85sN/bitcoin-0.7.2/src/test/data/base58_encode_decode.json test/script_tests.cpp(109): error in base58_EncodeBase58: Cound not find/open base58_encode_decode.json Trying to open /build/buildd-bitcoin_0.7.2-3-kfreebsd-1-Os85sN/bitcoin-0.7.2/src/test/data/base58_encode_decode.json test/script_tests.cpp(109): error in base58_DecodeBase58: Cound not find/open base58_encode_decode.json Trying to open /build/buildd-bitcoin_0.7.2-3-kfreebsd-1-Os85sN/bitcoin-0.7.2/src/test/data/base58_keys_valid.json test/script_tests.cpp(109): error in base58_keys_valid_parse: Cound not find/open base58_keys_valid.json Trying to open /build/buildd-bitcoin_0.7.2-3-kfreebsd-1-Os85sN/bitcoin-0.7.2/src/test/data/base58_keys_valid.json test/script_tests.cpp(109): error in base58_keys_valid_gen: Cound not find/open base58_keys_valid.json Trying to open /build/buildd-bitcoin_0.7.2-3-kfreebsd-1-Os85sN/bitcoin-0.7.2/src/test/data/base58_keys_invalid.json test/script_tests.cpp(109): error in base58_keys_invalid: Cound not find/open base58_keys_invalid.json Trying to open /build/buildd-bitcoin_0.7.2-3-kfreebsd-1-Os85sN/bitcoin-0.7.2/src/test/data/script_valid.json test/script_tests.cpp(109): error in script_valid: Cound not find/open script_valid.json Trying to open /build/buildd-bitcoin_0.7.2-3-kfreebsd-1-Os85sN/bitcoin-0.7.2/src/test/data/script_invalid.json test/script_tests.cpp(109): error in script_invalid: Cound not find/open script_invalid.json Trying to open /build/buildd-bitcoin_0.7.2-3-kfreebsd-1-Os85sN/bitcoin-0.7.2/src/test/data/tx_valid.json test/script_tests.cpp(109): error in tx_valid: Cound not find/open tx_valid.json Trying to open /build/buildd-bitcoin_0.7.2-3-kfreebsd-1-Os85sN/bitcoin-0.7.2/src/test/data/tx_invalid.json test/script_tests.cpp(109): error in tx_invalid: Cound not find/open tx_invalid.json *** 9 failures detected in test suite Bitcoin Test Suite make: *** [debian/stamps-perpkg-build/bitcoind] Error 201 In summary: i386 and kfreebsd-i386 builds fail on buildd machines. They don't fail on other machines, pbuilder chroots, or Ubuntu builders. The failure comes from he test suite not being able to find a file, but our debugging shows that the file exists and that it is attempting to open the correct file. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#673038: Re: [Pkg-openldap-devel] Bug#673038: Bug#673038: slapd: slapcat output truncated every now and then
2013/2/7 Quanah Gibson-Mount qua...@zimbra.com: --On Thursday, February 07, 2013 7:45 PM +0100 Bálint Réczey bal...@balintreczey.hu wrote: tags 673038 + patch fixed-upstream thanks ... Upstream (Howard Chu, thanks!) has committed and alternate fix [1] [2]. Please consider back-porting it to Debian instead of using my patch. As noted in the follow up, this fix needs to be *tested* by someone who is affected. Not just grabbed and applied. Usually the considering part includes waiting for testers or testing the fix. ;-) I just wanted to note that the proposed patch (for which I set the patch tag again) is not the one I submitted. Cheers, Balint -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#673038: Re: [Pkg-openldap-devel] Bug#673038: Bug#673038: slapd: slapcat output truncated every now and then
--On Thursday, February 07, 2013 7:45 PM +0100 Bálint Réczey bal...@balintreczey.hu wrote: tags 673038 + patch fixed-upstream thanks Hi All, 2013/1/28 Bálint Réczey bal...@balintreczey.hu: ... I think we're all in agreement that the code should be fixed. Please help to do that, if you can. Upstream has rejected the proposed fix. Since it seems I'm not familiar enough with upstream's plans and coding practices I'm not the best person to provide a fix. Upstream (Howard Chu, thanks!) has committed and alternate fix [1] [2]. Please consider back-porting it to Debian instead of using my patch. As noted in the follow up, this fix needs to be *tested* by someone who is affected. Not just grabbed and applied. --Quanah -- Quanah Gibson-Mount Sr. Member of Technical Staff Zimbra, Inc A Division of VMware, Inc. Zimbra :: the leader in open source messaging and collaboration -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#699889: [Pkg-openssl-devel] Bug#699889: several issues in Security Advisory 5 Feb 2013
On Wed, Feb 06, 2013 at 11:59:18AM +0100, Thijs Kinkhorst wrote: Package: openssl Severity: serious Tags: security Hi, Several issues were announced in the OpenSSL security advisory of 05 Feb 2013 (http://www.openssl.org/news/secadv_20130205.txt): SSL, TLS and DTLS Plaintext Recovery Attack (CVE-2013-0169) TLS 1.1 and 1.2 AES-NI crash (CVE-2012-2686) (does not affect stable) It seems people are having issues with this patch. commit 125093b59f3c2a2d33785b5563d929d0472f1721 is the problematic commit, but is also the one that fixes both CVEs as far as I can tell. I understand that 1.0 isn't affected, so 0.9.8 probably also isn't. I might be able to fix the 2nd one by disabling the AES-NI part. OCSP invalid key DoS issue (CVE-2013-0166) I don't see this as being urgent. So I'm waiting upstream to fix the 1.0.1d version before uploading to unstable. I think I'll also wait to see if this applies to other versions or not. Kurt -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#672524: [Pkg-bitcoin-devel] Bug#672524: upload of bitcoin package
Hi all! Scott Howard showard...@gmail.com writes: In summary: i386 and kfreebsd-i386 builds fail on buildd machines. They don't fail on other machines, pbuilder chroots, or Ubuntu builders. The failure comes from he test suite not being able to find a file, but our debugging shows that the file exists and that it is attempting to open the correct file. Not necessarily. ifstream ifs(testFile.string().c_str(), ifstream::in); Value v; if (!read_stream(ifs, v)) { if (ifs.fail()) BOOST_ERROR(Cound not find/open filename); else BOOST_ERROR(JSON syntax error in filename); return Array(); } The error is printed if the istream signals a fail() *after* parsing the whole json context. [0] indicates this might just be someone trying to read an invalid type from the stream (like an int while the next word in facht is a name). I stopped digging the source after the first few wrappers around wrappers around wrappers so no further analysis there. Regards Christoph [0] http://en.cppreference.com/w/cpp/io/basic_ios/fail -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#672524: [Pkg-bitcoin-devel] Bug#672524: upload of bitcoin package
[Christoph Egger] The error is printed if the istream signals a fail() *after* parsing the whole json context. [0] indicates this might just be someone trying to read an invalid type from the stream (like an int while the next word in facht is a name). I stopped digging the source after the first few wrappers around wrappers around wrappers so no further analysis there. But how can this only happen when the Debian autobuilders, and not when building manually or built by Ubuntu? The types should be the same both places. Any idea how to further debug this? It is hard to pinpoint when it do not show up during manual build. -- Happy hacking Petter Reinholdtsen -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#672524: [Pkg-bitcoin-devel] Bug#672524: upload of bitcoin package
Petter Reinholdtsen p...@hungry.com writes: [Christoph Egger] The error is printed if the istream signals a fail() *after* parsing the whole json context. [0] indicates this might just be someone trying to read an invalid type from the stream (like an int while the next word in facht is a name). I stopped digging the source after the first few wrappers around wrappers around wrappers so no further analysis there. But how can this only happen when the Debian autobuilders, and not when building manually or built by Ubuntu? The types should be the same both places. Any idea how to further debug this? It is hard to pinpoint when it do not show up during manual build. One thing that is rather easy to test is to see if the ifstream is actually bad() and not only fail(). If it is not bad() (and therefor no IO error has occured) I fear it quickly gets to debugging the boost::spririt parser which is -- I guess -- about impossible especially without a way to reproduce it outside the buildds. Regards Christoph -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#700037: marked as done (libgo-perl: libgraphviz-perl dependency missing)
Your message dated Thu, 07 Feb 2013 19:47:34 + with message-id e1u3xrw-0007bo...@franck.debian.org and subject line Bug#700037: fixed in libgo-perl 0.13-2 has caused the Debian Bug report #700037, regarding libgo-perl: libgraphviz-perl dependency missing to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 700037: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700037 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: libgo-perl Version: 0.13-1 Severity: grave Justification: renders package unusable Dear Maintainer, Deb Med Team, so myself as well, /usr/share/perl5/GO/IO/Dotty.pm:24: 'use GraphViz;'. However d/control does not Depends: libgraphviz-perl. Module fails to load when libgraphviz-perl is not installed. I am fixing this in an upload to upstable as soon as I get the bug number. Laszlo -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (990, 'unstable'), (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF8, LC_CTYPE=en_US.UTF8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF8) Shell: /bin/sh linked to /bin/dash Versions of packages libgo-perl depends on: ii libdata-stag-perl 0.11-2 ii perl 5.14.2-17 ii perl-modules 5.14.2-17 Versions of packages libgo-perl recommends: ii libxml-checker-perl 0.13-5 ii libxml-libxml-perl 2.0010+dfsg-1 ii libxml-libxslt-perl 1.78-1 ii libxml-writer-perl 0.615-1 ii xsltproc 1.1.26-14 Versions of packages libgo-perl suggests: ii bioperl 1.6.901-3 -- no debconf information ---End Message--- ---BeginMessage--- Source: libgo-perl Source-Version: 0.13-2 We believe that the bug you reported is fixed in the latest version of libgo-perl, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 700...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Laszlo Kajan lka...@debian.org (supplier of updated libgo-perl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 07 Feb 2013 19:24:51 +0100 Source: libgo-perl Binary: libgo-perl Architecture: source all Version: 0.13-2 Distribution: unstable Urgency: low Maintainer: Debian Med Packaging Team debian-med-packag...@lists.alioth.debian.org Changed-By: Laszlo Kajan lka...@debian.org Description: libgo-perl - perl modules for GO and other OBO ontologies Closes: 700037 Changes: libgo-perl (0.13-2) unstable; urgency=low . * Added missing libgraphviz-perl dependency (Closes: #700037). Checksums-Sha1: 0b322a59b13089e0914677a35a1e5eae6d9be9cb 2073 libgo-perl_0.13-2.dsc c6b9f2c091c6a09a14f37cc9dc390d90b868b0b1 47141 libgo-perl_0.13-2.diff.gz 6045548d17b4191da6a30f20da15dfe5f7c24416 358372 libgo-perl_0.13-2_all.deb Checksums-Sha256: 73f7556c884ce5516f6bccdbe20b567eb1c2e76d6295fb45f11612d033bdfe56 2073 libgo-perl_0.13-2.dsc 26507509e5ef78b4fc60ae38ff973cb64f720c28b385cc85c06aee26b26447ed 47141 libgo-perl_0.13-2.diff.gz 52ac09ecadadfd1fef07409f50a57474cfd7b1bc8999031a7fae99362513e890 358372 libgo-perl_0.13-2_all.deb Files: 4543e9f00404bf568b018858ae3bb89e 2073 perl optional libgo-perl_0.13-2.dsc b4c8d26ba5059d41410fd23eb0768c86 47141 perl optional libgo-perl_0.13-2.diff.gz 2d84281b3dee5e7d9be575e2f5ee423d 358372 perl optional libgo-perl_0.13-2_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBAgAGBQJRFADrAAoJEJvS1kCaDFL6FiQQAKKkKHS+mQoe0ak/DBR4edx7 hihNI49U1oGy32t5fanxnnlvQsCwk4z/vR0SrdLPz+AsxRTAlQIpRPE3HxvdkCMp VolC30Iq1kQIhNMqXVy1RJTliT1bp44mrPRTfVk3i1ma7VbhFZ4/f/y4iYqBqbP0 J9UiPbj8RuGqii+ADpq/xRB2E1bzn96I67AiSpB6yybHOoPWPw5q1tzte4UvFaDn 4NEr1lcKY5cnQowQFDxv1NIcW8196KheBSXgfW85a3mxjblqmOtphxaAaMzrg5ic P5GRipqIvS+VzmJdieOU+9vd9cwSr3Cn1GvLrvBMCzrqN8lyblUKWwncBdczxTKq /AasCx3nWSvtSl0jSajwc3g7VvUaOvXOlEfwH0wuHfncSGTyB8bWjuDEQCGYBN86 jGcANCVo5MJyD4QKlDZn9v48SJjD38ksiR4DvDa/wlUYQJ5bHelhQyAkc/+sc/YX 88d0buv6utwfPuWXuzFJMURI2bSjG5ly1YNN9o/8FdthppekYrR/UiQ/E03CWqv5 XEY2rBKC31ZJThSBR9dHPmAvfwpcDYc8nxUKUYRoHvaUYZH7kXOCbZEoLOqSaRRC cLIcXk90mI1nNTd4+ShZEAwBHeZzubgdl/zIdOn4SkNY1PFCfjvwxfDeBnAtGgYx HcbNyWctiQzu6avezOwv =tH4x -END PGP
Bug#700037: libgo-perl: libgraphviz-perl dependency missing
On Thu, 2013-02-07 at 19:33 +0100, Laszlo Kajan wrote: /usr/share/perl5/GO/IO/Dotty.pm:24: 'use GraphViz;'. However d/control does not Depends: libgraphviz-perl. Module fails to load when libgraphviz-perl is not installed. I was looking at this for a potential unblock, but had a query... why does the debdiff contain this? t/data/GO.defs.obo_xml | 2361 +++ t/data/GO.defs.obo_xml.go_def| 987 + t/data/go-truncated.obo.obo_xml | 494 t/data/go-truncated.obo.obo_xml.obo_text | 230 ++ t/data/sample.ncbi_taxonomy.obo | 1154 +++ t/data/test-function.dat.obo_text| 469 t/data/test-function.dat.obo_text.obo_xml| 538 + t/data/test-function.dat.obo_text.obo_xml.go_ont | 72 t/data/test-function.dat.obo_text.pathlist | 80 t/data/test-function.dat.obo_text.prolog | 399 +++ t/data/test-function.dat.obo_text.rdf| 451 t/data/test-function.dat.obo_xml | 535 + t/data/test-function.dat.pathlist| 80 t/data/test-function.dat.prolog | 398 +++ t/data/test-function.dat.rdf | 451 Regards, Adam -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#700047: sysvinit: fails to create /etc/inittab from a fresh debootstrap
Package: sysvinit Version: 2.88dsf-40 Severity: critical Hello. It appears that with the new package that has been pushed to sid/unstable [sysvinit 2.88dsf-40], performing a debootstrap install results in an installation with no /etc/inittab. This appears to occur due to a section of sysvinit.postinst not running, due to being in a fakeroot/chroot/install environment, and having no init process to reinitialize. That section of the postinst looks like it doesn't execute [do_restart()], which unfortunately also includes: if [ ! -f /etc/inittab ] then cp -p /usr/share/sysvinit/inittab /etc/inittab fi This results in a debootstrap that has no /etc/inittab, and fails: Begin: Running /scripts/init-bottom ... done. INIT: version 2.88 booting INIT: No inittab file found Enter runlevel: David Comeau -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#700037: [Debian-med-packaging] Bug#700037: libgo-perl: libgraphviz-perl dependency missing
On Thu, 2013-02-07 at 21:53 +0100, Laszlo Kajan wrote: /usr/share/perl5/GO/IO/Dotty.pm:24: 'use GraphViz;'. However d/control does not Depends: libgraphviz-perl. Module fails to load when libgraphviz-perl is not installed. I was looking at this for a potential unblock, but had a query... why does the debdiff contain this? t/data/GO.defs.obo_xml | 2361 +++ t/data/GO.defs.obo_xml.go_def| 987 + Thank you Adam for pointing this out! That is my mistake. My build directory got dirty, appaently, and I forgot to check the debdiff before uploading. I've rebuilt it again, clean, 0.13-3, and uploaded. Debdiff now looks ok. Please unblock. Thank you! Done; thanks. Regards, Adam -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#700037: [Debian-med-packaging] Bug#700037: libgo-perl: libgraphviz-perl dependency missing
/usr/share/perl5/GO/IO/Dotty.pm:24: 'use GraphViz;'. However d/control does not Depends: libgraphviz-perl. Module fails to load when libgraphviz-perl is not installed. I was looking at this for a potential unblock, but had a query... why does the debdiff contain this? t/data/GO.defs.obo_xml | 2361 +++ t/data/GO.defs.obo_xml.go_def| 987 + Thank you Adam for pointing this out! That is my mistake. My build directory got dirty, appaently, and I forgot to check the debdiff before uploading. I've rebuilt it again, clean, 0.13-3, and uploaded. Debdiff now looks ok. Please unblock. Thank you! Best regards, Laszlo -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#699616: gosa: diff for NMU version 2.7.4-4.2
tags 699616 + pending thanks Dear maintainer, I've prepared an NMU for gosa (versioned as 2.7.4-4.2) and uploaded it to DELAYED/2. Please feel free to tell me if I should delay it longer. Regards. -- Jonathan Wiltshire j...@debian.org Debian Developer http://people.debian.org/~jmw 4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51 directhex i have six years of solaris sysadmin experience, from 8-10. i am well qualified to say it is made from bonghits layered on top of bonghits diff -Nru gosa-2.7.4/debian/changelog gosa-2.7.4/debian/changelog --- gosa-2.7.4/debian/changelog 2013-01-27 14:15:25.0 + +++ gosa-2.7.4/debian/changelog 2013-02-07 20:28:31.0 + @@ -1,3 +1,14 @@ +gosa (2.7.4-4.2) unstable; urgency=low + + [ Jonathan Wiltshire ] + * Non-maintainer upload. + + [ Vagrant Cascadian ] + * debian/gosa.postinst, debian/gosa.postrm: Only restart apache2 or lighttpd +when binary is present. (Closes: #699616) + + -- Jonathan Wiltshire j...@debian.org Thu, 07 Feb 2013 20:28:29 + + gosa (2.7.4-4.1) unstable; urgency=low * Non-maintainer upload. diff -Nru gosa-2.7.4/debian/gosa.postinst gosa-2.7.4/debian/gosa.postinst --- gosa-2.7.4/debian/gosa.postinst 2013-01-27 12:28:42.0 + +++ gosa-2.7.4/debian/gosa.postinst 2013-02-07 20:27:07.0 + @@ -59,11 +59,13 @@ fi # Finally restart servers + if [ -x /usr/sbin/apache2 ]; then if [ -x /usr/sbin/invoke-rc.d ]; then invoke-rc.d apache2 reload else /etc/init.d/apache2 reload fi + fi fi if [ -d /etc/lighttpd/conf-available ]; then @@ -85,11 +87,13 @@ fi # Finally restart servers + if [ -x /usr/sbin/lighttpd ]; then if [ -x /usr/sbin/invoke-rc.d ]; then invoke-rc.d lighttpd reload else /etc/init.d/lighttpd reload fi + fi fi diff -Nru gosa-2.7.4/debian/gosa.postrm gosa-2.7.4/debian/gosa.postrm --- gosa-2.7.4/debian/gosa.postrm 2012-06-19 07:47:42.0 +0100 +++ gosa-2.7.4/debian/gosa.postrm 2013-02-07 20:27:07.0 + @@ -27,11 +27,13 @@ [ -L /etc/apache2/conf.d/gosa.conf ] rm -f /etc/apache2/conf.d/gosa.conf # Restart servers + if [ -x /usr/sbin/apache2 ]; then if [ -x /usr/sbin/invoke-rc.d ]; then invoke-rc.d apache2 restart else /etc/init.d/apache2 restart fi + fi fi if [ -d /etc/lighttpd/conf-available ]; then @@ -39,11 +41,13 @@ [ -L /etc/lighttpd/conf-enabled/99gosa-lighttpd.conf ] rm -f /etc/lighttpd/conf-enabled/99gosa-lighttpd.conf # Restart servers + if [ -x /usr/sbin/lighttpd ]; then if [ -x /usr/sbin/invoke-rc.d ]; then invoke-rc.d lighttpd restart else /etc/init.d/lighttpd restart fi + fi fi ;; signature.asc Description: Digital signature
Processed: gosa: diff for NMU version 2.7.4-4.2
Processing commands for cont...@bugs.debian.org: tags 699616 + pending Bug #699616 [src:gosa] gosa: postinst/rm uses -d /etc/apache2/conf.d as guard across calls to Apache Added tag(s) pending. thanks Stopping processing here. Please contact me if you need assistance. -- 699616: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699616 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698632: rstatd: Patch 03-627217-netio.patch breaks RPC protocol compatibility for rstatd
On Tue, Feb 05, 2013 at 03:43:56PM +0100, Salvatore Bonaccorso wrote: At this stage of the freeze this option (droping the patch for 627217) looks the best to me, what do you think Anibal? Hello Salvatore, I'll prepare a new package without it. Cheers, Aníbal -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#699887: marked as done (TLS timing attack in polarssl (Lucky 13))
Your message dated Thu, 07 Feb 2013 21:32:47 + with message-id e1u3z5l-0003z2...@franck.debian.org and subject line Bug#699887: fixed in polarssl 1.1.4-2 has caused the Debian Bug report #699887, regarding TLS timing attack in polarssl (Lucky 13) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 699887: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699887 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: polarssl Severity: serious Tags: security Hi, Nadhem Alfardan and Kenny Paterson have discovered a weakness in the handling of CBC ciphersuites in SSL, TLS and DTLS. Their attack exploits timing differences arising during MAC processing. Details of this attack can be found at: http://www.isg.rhul.ac.uk/tls/ The problems are addressed in PolarSSL 1.2.5: https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released The generic protocol issue has been assigned CVE name CVE-2013-0169. The specific fix in PolarSSL is known as CVE-2013-1621 and CVE-2013-1622. Please mention these identifiers in the changelog. Can you see to it that this issue is addressed in unstable and testing? And are you available to create an update for stable-security? Cheers, Thijs signature.asc Description: This is a digitally signed message part. ---End Message--- ---BeginMessage--- Source: polarssl Source-Version: 1.1.4-2 We believe that the bug you reported is fixed in the latest version of polarssl, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 699...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Roland Stigge sti...@antcom.de (supplier of updated polarssl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 07 Feb 2013 22:08:26 +0100 Source: polarssl Binary: libpolarssl-dev libpolarssl-runtime libpolarssl0 Architecture: source amd64 Version: 1.1.4-2 Distribution: unstable Urgency: high Maintainer: Roland Stigge sti...@antcom.de Changed-By: Roland Stigge sti...@antcom.de Description: libpolarssl-dev - lightweight crypto and SSL/TLS library libpolarssl-runtime - lightweight crypto and SSL/TLS library libpolarssl0 - lightweight crypto and SSL/TLS library Closes: 699887 Changes: polarssl (1.1.4-2) unstable; urgency=high . * Security fix for CVE-2013-0169: Lucky 13 TLS protocol timing flaw including CVE-2013-1621 and CVE-2013-1622, backported from upstream diff from 1.2.4 to 1.2.5. (Closes: #699887) Checksums-Sha1: 0ceeecc6928708ddf74bb44265bad12924689879 1174 polarssl_1.1.4-2.dsc 4c25d337b584bcb26ad418b43079ce70128e1f94 5849 polarssl_1.1.4-2.debian.tar.gz 0aa5b67d60a2918f7355ee7eab616aad74a4006a 206866 libpolarssl-dev_1.1.4-2_amd64.deb aaeaa2f91c185bebc1dfb0e834ec7664a9488ac1 1944546 libpolarssl-runtime_1.1.4-2_amd64.deb eb9de163c3dc7a8e93225db1115e5f89ea251691 142912 libpolarssl0_1.1.4-2_amd64.deb Checksums-Sha256: 36e70fcdeb68c86c7260c2a71dcb7f0a2eaa03fb7053967b5515bcf940dd2959 1174 polarssl_1.1.4-2.dsc bd1de8901201e1b26a6306ddb17616652bc80f5e47b4adc3d3cba63b80bc5733 5849 polarssl_1.1.4-2.debian.tar.gz 97ff477e462545a51671849c4eb85f9953a529aea3ce50522d4c2865e724dbcb 206866 libpolarssl-dev_1.1.4-2_amd64.deb 00f9071ab31f1e39c2b99866f167c5e94e659a613c64cf87b8c2ab88e6786bd0 1944546 libpolarssl-runtime_1.1.4-2_amd64.deb 95595fee55cfcb52eb32af0fbe0a9823e202b946c7b1bef2993cf6bb75d97f38 142912 libpolarssl0_1.1.4-2_amd64.deb Files: f79178372844636920a7d9a92e50e580 1174 libs optional polarssl_1.1.4-2.dsc 22871443cc0256937a8de1fcecf1d130 5849 libs optional polarssl_1.1.4-2.debian.tar.gz 59327ef471269ff056b9cd0603229979 206866 libdevel optional libpolarssl-dev_1.1.4-2_amd64.deb eed5ee8d290e0dd37596c14c5727bb5a 1944546 libdevel optional libpolarssl-runtime_1.1.4-2_amd64.deb 4cf74101610259a5380747441493459d 142912 libs optional libpolarssl0_1.1.4-2_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFRFBpOcaH/YBv43g8RAry0AJ0Qf9+Ko5/L+Nei6Ufo5kq5LZK99wCgvJD0 UZn6nIxM2EfKc1qM3VGjLY8= =ISr+ -END PGP SIGNATUREEnd Message---
Bug#700050: libflickcurl0: New version available (and needed for new oAuth scheme)
Package: libflickcurl0 Version: 1.22-1 Severity: grave Justification: renders package unusable A new version (1.23) is available, and adds support for oAuth, which is needed right now to authenticate in Flickr. The old method has been dropped now. -- System Information: Debian Release: wheezy/sid APT prefers quantal-updates APT policy: (500, 'quantal-updates'), (500, 'quantal-security'), (500, 'quantal'), (100, 'quantal-backports') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.5.0-23-generic (SMP w/2 CPU cores) Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages libflickcurl0 depends on: ii libc62.15-0ubuntu20 ii libcurl3-gnutls 7.27.0-1ubuntu1 ii libxml2 2.8.0+dfsg1-5ubuntu2.1 libflickcurl0 recommends no packages. libflickcurl0 suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#700047: sysvinit: fails to create /etc/inittab from a fresh debootstrap
On Thu, Feb 07, 2013 at 03:58:16PM -0500, David Comeau (SaturnNiGHTS) wrote: It appears that with the new package that has been pushed to sid/unstable [sysvinit 2.88dsf-40], performing a debootstrap install results in an installation with no /etc/inittab. This appears to occur due to a section of sysvinit.postinst not running, due to being in a fakeroot/chroot/install environment, and having no init process to reinitialize. That section of the postinst looks like it doesn't execute [do_restart()], which unfortunately also includes: if [ ! -f /etc/inittab ] then cp -p /usr/share/sysvinit/inittab /etc/inittab fi Awfully sorry that this has happened, this is certainly wrong. I'll have a -41 upload done later this evening. Regards, Roger -- .''`. Roger Leigh : :' : Debian GNU/Linuxhttp://people.debian.org/~rleigh/ `. `' schroot and sbuild http://alioth.debian.org/projects/buildd-tools `-GPG Public Key F33D 281D 470A B443 6756 147C 07B3 C8BC 4083 E800 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#699887: Unblock request for polarssl 1.1.4-2
Hi, polarssl 1.1.4-2 just hit unstable. Fixes security bug #699887, CVE-2013-0169, so please unblock. Thanks! (Will contact the security team separately for the respective security update for the version in stable.) Roland -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#699887: Unblock request for polarssl 1.1.4-2
On Thu, 2013-02-07 at 22:53 +0100, Roland Stigge wrote: polarssl 1.1.4-2 just hit unstable. Fixes security bug #699887, CVE-2013-0169, so please unblock. Unblocked; thanks. Please consider filing a usertagged unblock tag (e.g. via reportbug) in future. They're much easier for us to keep track of. Regards, Adam -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: severity of 547092 is grave
Processing commands for cont...@bugs.debian.org: severity 547092 grave Bug #547092 [nagios-nrpe-server] nagios-nrpe-server: Insecure 'SSL' option, key identical for all debian systems Severity set to 'grave' from 'important' thanks Stopping processing here. Please contact me if you need assistance. -- 547092: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=547092 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#699887: Security fix for #699887, CVE-2013-0169
Hi, I prepared a security upload for stable (attached debdiff). Should I upload it to stable-security(security-master)? Thanks, Roland diff -ruN temp/polarssl-0.12.1/debian/changelog polarssl-0.12.1/debian/changelog --- temp/polarssl-0.12.1/debian/changelog 2013-02-07 22:54:41.0 +0100 +++ polarssl-0.12.1/debian/changelog2013-02-07 22:23:50.692035233 +0100 @@ -1,3 +1,11 @@ +polarssl (0.12.1-1squeeze1) stable-security; urgency=low + + * Security fix for CVE-2013-0169: Lucky 13 TLS protocol timing flaw +including CVE-2013-1621 and CVE-2013-1622, backported from upstream +diff from 1.2.4 to 1.2.5. (Closes: #699887) + + -- Roland Stigge sti...@antcom.de Thu, 07 Feb 2013 22:17:00 +0100 + polarssl (0.12.1-1) unstable; urgency=low * New upstream release. diff -ruN temp/polarssl-0.12.1/debian/control polarssl-0.12.1/debian/control --- temp/polarssl-0.12.1/debian/control 2013-02-07 22:54:41.0 +0100 +++ polarssl-0.12.1/debian/control 2013-02-07 22:45:29.536070015 +0100 @@ -1,7 +1,7 @@ Source: polarssl Section: libs Priority: optional -Maintainer: Arnaud Cornet acor...@debian.org +Maintainer: Roland Stigge sti...@antcom.de Standards-Version: 3.8.3 Build-Depends: debhelper (= 7.0.50~), quilt Homepage: http://polarssl.org diff -ruN temp/polarssl-0.12.1/debian/patches/CVE-2013-0169.diff polarssl-0.12.1/debian/patches/CVE-2013-0169.diff --- temp/polarssl-0.12.1/debian/patches/CVE-2013-0169.diff 1970-01-01 01:00:00.0 +0100 +++ polarssl-0.12.1/debian/patches/CVE-2013-0169.diff 2013-02-07 22:15:39.388022077 +0100 @@ -0,0 +1,125 @@ +Description: Fix for CVE-2013-0169 + This patch fixes CVE-2013-0169: Lucky 13 TLS protocol timing flaw + This also refers to CVE-2013-1621 and CVE-2013-1622. It is a backport from + upstreams diff between versions 1.2.4 to 1.2.5, doing only minimal changes + addressing the CVE. +Author: Roland Stigge sti...@antcom.de +Bug-Debian: http://bugs.debian.org/699887 + +--- polarssl-0.12.1.orig/library/ssl_tls.c polarssl-0.12.1/library/ssl_tls.c +@@ -601,7 +601,7 @@ + + static int ssl_decrypt_buf( ssl_context *ssl ) + { +-int i, padlen; ++int i, padlen = 0, correct = 1; + unsigned char tmp[20]; + + SSL_DEBUG_MSG( 2, ( = decrypt buf ) ); +@@ -616,7 +616,6 @@ + if( ssl-ivlen == 0 ) + { + #if defined(POLARSSL_ARC4_C) +-padlen = 0; + arc4_crypt( (arc4_context *) ssl-ctx_dec, + ssl-in_msg, ssl-in_msglen ); + #else +@@ -625,6 +624,7 @@ + } + else + { ++size_t minlen = 0, fake_padlen; + /* + * Decrypt and check the padding + */ +@@ -635,6 +635,17 @@ + return( POLARSSL_ERR_SSL_INVALID_MAC ); + } + ++if( ssl-minor_ver = SSL_MINOR_VERSION_2 ) ++minlen += ssl-ivlen; ++ ++if( ssl-in_msglen minlen + ssl-ivlen || ++ssl-in_msglen minlen + ssl-maclen + 1 ) ++{ ++SSL_DEBUG_MSG( 1, ( msglen (%d) max( ivlen(%d), maclen (%d) + 1 ) ( + expl IV ), ++ ssl-in_msglen, ssl-ivlen, ssl-maclen ) ); ++return( POLARSSL_ERR_SSL_INVALID_MAC ); ++} ++ + switch( ssl-ivlen ) + { + #if defined(POLARSSL_DES_C) +@@ -676,13 +687,20 @@ + + padlen = 1 + ssl-in_msg[ssl-in_msglen - 1]; + ++fake_padlen = 256 - padlen; ++ ++if( ssl-in_msglen ssl-maclen + padlen ) ++{ ++padlen = 0; ++fake_padlen = 256; ++correct = 0; ++} ++ + if( ssl-minor_ver == SSL_MINOR_VERSION_0 ) + { + if( padlen ssl-ivlen ) + { +-SSL_DEBUG_MSG( 1, ( bad padding length: is %d, +-should be no more than %d, +- padlen, ssl-ivlen ) ); ++correct = 0; + padlen = 0; + } + } +@@ -695,12 +713,18 @@ + { + if( ssl-in_msg[ssl-in_msglen - i] != padlen - 1 ) + { +-SSL_DEBUG_MSG( 1, ( bad padding byte: should be +-%02x, but is %02x, padlen - 1, +- ssl-in_msg[ssl-in_msglen - i] ) ); ++correct = 0; ++fake_padlen = 256 - i; + padlen = 0; + } + } ++for( i = 1; i = fake_padlen; i++ ) ++{ ++if( ssl-in_msg[i + 1] != fake_padlen - 1 ) ++minlen = 0; ++else ++minlen = 1; ++} + } + } + +@@ -715,7 +739,7 @@ + ssl-in_hdr[3] = (unsigned char)( ssl-in_msglen 8 ); + ssl-in_hdr[4] = (unsigned char)( ssl-in_msglen ); + +-memcpy( tmp, ssl-in_msg + ssl-in_msglen, 20 ); ++memcpy( tmp, ssl-in_msg + ssl-in_msglen, ssl-maclen ); + + if( ssl-minor_ver ==
Bug#700051: sysvinit: fails to create /etc/inittab from a fresh debootstrap
Package: sysvinit Version: 2.88dsf-40 Severity: critical Hello. It appears that with the new package that has been pushed to sid/unstable [sysvinit 2.88dsf-40], performing a debootstrap install results in an installation with no /etc/inittab. This appears to occur due to a section of sysvinit.postinst not running, due to being in a fakeroot/chroot/install environment, and having no init process to reinitialize. That section of the postinst looks like it doesn't execute [do_restart()], which unfortunately also includes: if [ ! -f /etc/inittab ] then cp -p /usr/share/sysvinit/inittab /etc/inittab fi This results in a debootstrap that has no /etc/inittab, and fails: Begin: Running /scripts/init-bottom ... done. INIT: version 2.88 booting INIT: No inittab file found Enter runlevel: -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#685469: ekg2: missing copyright file
On Sun, Feb 03, 2013 at 05:20:24AM +0100, Andreas Beckmann wrote: Followup-For: Bug #685469 Control: tag -1 patch Hi, I'm attaching my sugggested patch to fix this problem. The fixup should only be performed by ekg2.postinst - ekg2-core should have nothing to do as everything is fine within this package. You're right. My patch was confused and incorrect. -- Marcin Owsiany porri...@debian.org http://marcin.owsiany.pl/ GnuPG: 2048R/02F946FC 35E9 1344 9F77 5F43 13DD 6423 DBF4 80C6 02F9 46FC -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#547092: nrpe ssl security problem
As pointed out in a previous message to the bug, #547092 nagios-nrpe-server: Insecure 'SSL' option, key identical for all debian systems is severity grave due to the security problem it introduces in the service (but not critical since the problem is limited to the nrpe service). I have adjusted it. This bug hasn't had any activity for almost a year and was mostly shouting before that. This package shouldn't be in testing/stable until this is fixed lest others (as I did) spend a bunch of effort implementing lots of nrpe based checks before realizing they just opened a security hole on all their systems... If this can't be solved, maybe we could recommend better alternatives? Thanks, -- Matt Taggart tagg...@debian.org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#547092: nrpe ssl security problem
On Thu, 2013-02-07 at 14:13 -0800, Matt Taggart wrote: If this can't be solved, maybe we could recommend better alternatives? The better alternative is using ssh with control channel multiplexing,... which is as fast as nrpe. The only thing missing there was a restricted shell for the remote hosts where they can specify white (the check commands and their args) and blacklists (evil stuff like * or ..) in order to control the commands that the monitoring node may run (as they can do on a very, very, limited and insecure way with nrpe). Removing nrpe from testing is IMHO a bad idea... but I would suggest to add big fat warnings the nrpe is completely insecure. Cheers, Chris. smime.p7s Description: S/MIME cryptographic signature
Bug#700051: Acknowledgement (sysvinit: fails to create /etc/inittab from a fresh debootstrap)
i don't know why this created again. really sorry about that. please close as already filed. 700051:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=70005 On 02/07/2013 05:09 PM, Debian Bug Tracking System wrote: Thank you for filing a new Bug report with Debian. This is an automatically generated reply to let you know your message has been received. Your message is being forwarded to the package maintainers and other interested parties for their attention; they will reply in due course. Your message has been sent to the package maintainer(s): Debian sysvinit maintainerspkg-sysvinit-de...@lists.alioth.debian.org If you wish to submit further information on this problem, please send it to 700...@bugs.debian.org. Please do not send mail to ow...@bugs.debian.org unless you wish to report a problem with the Bug-tracking system. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#547092: [Pkg-nagios-devel] Bug#547092: nrpe ssl security problem
On Thu, 07 Feb 2013, Matt Taggart wrote: As pointed out in a previous message to the bug, #547092 nagios-nrpe-server: Insecure 'SSL' option, key identical for all debian systems is severity grave due to the security problem it introduces in the service (but not critical since the problem is limited to the nrpe service). I have adjusted it. This bug hasn't had any activity for almost a year and was mostly shouting before that. This package shouldn't be in testing/stable until this is fixed lest others (as I did) spend a bunch of effort implementing lots of nrpe based checks before realizing they just opened a security hole on all their systems... If this can't be solved, maybe we could recommend better alternatives? In fact nothing is new here and security wouldn't change much with different keys. The implementation ist just broken. But if you have an idea to improve it, feel free to send a patch. (as long as it doesn't make nrpe incompatible to upstreams nrpe). Alternatives would be check_by_ssh, check_mk, snmp. There are also some nrpe replacements flying around but I never tested one of them. Alex -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#547092: [Pkg-nagios-devel] Bug#547092: nrpe ssl security problem
Just my 2 cents (without any hat on): TLS integration in NRPE was broken from the beginning and more or less by design. The real and only security feature is to configure a appropriate allowed_hosts list, which might be enough security for internal networks in respect of TCP sessions. Question is: Do we really want to remove NRPE from testing because of it promising a incomplete feature? It should be pointed out that the TLS feature is broken, but still allowing users to use NRPE. Because the problem is: we (Debian) might not be able to change it - but I personally don't want users to use some self built stuff. 2013/2/7 Matt Taggart tagg...@debian.org: As pointed out in a previous message to the bug, #547092 nagios-nrpe-server: Insecure 'SSL' option, key identical for all debian systems is severity grave due to the security problem it introduces in the service (but not critical since the problem is limited to the nrpe service). I have adjusted it. This bug hasn't had any activity for almost a year and was mostly shouting before that. This package shouldn't be in testing/stable until this is fixed lest others (as I did) spend a bunch of effort implementing lots of nrpe based checks before realizing they just opened a security hole on all their systems... If this can't be solved, maybe we could recommend better alternatives? -- Markus Frosch mar...@lazyfrosch.de http://www.lazyfrosch.de -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#547092: [Pkg-nagios-devel] Bug#547092: Bug#547092: nrpe ssl security problem
On 08.02.2013 00:31, Markus Frosch wrote: Just my 2 cents (without any hat on): TLS integration in NRPE was broken from the beginning and more or less by design. The real and only security feature is to configure a appropriate allowed_hosts list, which might be enough security for internal networks in respect of TCP sessions. Question is: Do we really want to remove NRPE from testing because of it promising a incomplete feature? It should be pointed out that the TLS feature is broken, but still allowing users to use NRPE. Because the problem is: we (Debian) might not be able to change it - but I personally don't want users to use some self built stuff. i've tried the idea of the ssl x509 patch in an unofficial nrpe fork. lives in git here, until it dies, and will never get released, so beware: https://git.icinga.org/?p=icinga-irpe.git;a=summary the nrpe implementation as is an entire mess, and one would rather rewrite it entirely than fix the ssl issue just for sanity. besides - the dh key gets generated on each configure run. so at least only the same package revisions share the same key. you may figure, that not only nrpe is hard to maintain, but also nsca (and code wise, nagios is horrible, so is icinga 1.x). so unless there's an idea about what to fix now or likewise, a maintainer capable of managing what upstream did and does wrong, there's not much chance to fix it. in the past you already had to fix broken upstream releases of nrpe/nsca/nagios and that's not really the job of a packager to take care of upstream's fuckups. thing is - people use and depend on nrpe, with or without ssl. rather then cutting that off now enforcing people to compile nrpe once again on their debian systems, i'd rather adapt the readme. anyhow, for the alternatives - check_by_ssh or snmp. the checkmk agent is not capable of ssl itsself nor does it support ipv6 natively. you'd have to used xinetd with a ssh tunnel to make this work (and while at it, you could tunnel nrpe then too). the future in icinga regards will introduce a new agent, based on the (already in dev) existing icinga2 message protocol (native v4/v6, x509, compression). but it's not yet implemented as it's planned for a later milestone this year. kind regards, Michael -- DI (FH) Michael Friedrich mail: michael.friedr...@gmail.com twitter: https://twitter.com/dnsmichi jabber: dnsmi...@jabber.ccc.de irc: irc.freenode.net/icinga dnsmichi icinga open source monitoring position: lead core developer url: https://www.icinga.org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#547092: [Pkg-nagios-devel] Bug#547092: nrpe ssl security problem
On Fri, 2013-02-08 at 00:26 +0100, Alexander Wirt wrote: In fact nothing is new here and security wouldn't change much with different keys. The implementation ist just broken. But if you have an idea to improve it, feel free to send a patch. (as long as it doesn't make nrpe incompatible to upstreams nrpe). Alternatives would be check_by_ssh, check_mk, snmp. There are also some nrpe replacements flying around but I never tested one of them. All agreed... but would you consider to add some big warnings about that fact? :) Cheers, Chris. smime.p7s Description: S/MIME cryptographic signature
Bug#547092: [Pkg-nagios-devel] Bug#547092: Bug#547092: nrpe ssl security problem
Off topic but... Hi Michael On Fri, 2013-02-08 at 00:55 +0100, Michael Friedrich wrote: i've tried the idea of the ssl x509 patch in an unofficial nrpe fork. lives in git here, until it dies, and will never get released, so beware: https://git.icinga.org/?p=icinga-irpe.git;a=summary If nothing speaks against ssh (and at least the performance problems are IMHO solved), that I would suggest that the long term plan should be to drop any solution as NRPE. What it does it remotely executing commands - well we already have a protocol for that: ssh ... which supports many different auth methods (certs, ssh keys, krb, etc.) the nrpe implementation as is an entire mess, and one would rather rewrite it entirely than fix the ssl issue just for sanity. besides - the dh key gets generated on each configure run. so at least only the same package revisions share the same key. That doesn't help,... still any other side with any other key can connect. the future in icinga regards will introduce a new agent, based on the (already in dev) existing icinga2 message protocol (native v4/v6, x509, compression). but it's not yet implemented as it's planned for a later milestone this year. Does it give anything that ssh doesn't have? Another protocol is just another thing to develop, maintain and another attack target. Cheers, Chris. smime.p7s Description: S/MIME cryptographic signature
Bug#700061: No usable local backends
Package: python-selenium Version: 2.2.0-1 Severity: grave Current selenium package includes the firefox webdriver, which doesn't work with recent iceweasel, and the chrome webdriver, which requires external binaries from http://code.google.com/p/chromedriver/downloads/list I cannot say anything about the remote driver, but absence of usable local drivers sounds very serious to me. -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.8.0-rc3-wrar-1+ (SMP w/4 CPU cores; PREEMPT) Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages python-selenium depends on: ii python 2.7.3-3 ii python-rdflib 2.4.2-1+b2 ii python2.6 2.6.8-1.1 ii python2.7 2.7.3-6 python-selenium recommends no packages. python-selenium suggests no packages. -- debconf-show failed -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#700051: Acknowledgement (sysvinit: fails to create /etc/inittab from a fresh debootstrap)
forcemerge 700048 700051 thanks On Thu, Feb 07, 2013 at 05:11:00PM -0500, David Comeau (SaturnNiGHTS) wrote: i don't know why this created again. really sorry about that. please close as already filed. No worries, I'll just merge them so they are closed together. -- .''`. Roger Leigh : :' : Debian GNU/Linuxhttp://people.debian.org/~rleigh/ `. `' schroot and sbuild http://alioth.debian.org/projects/buildd-tools `-GPG Public Key F33D 281D 470A B443 6756 147C 07B3 C8BC 4083 E800 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed (with 1 errors): Re: Bug#700051: Acknowledgement (sysvinit: fails to create /etc/inittab from a fresh debootstrap)
Processing commands for cont...@bugs.debian.org: forcemerge 700048 700051 Bug #700048 [src:haveged] Log for attempted build of haveged_1.4-4 on m68k (dist=unstable) Unable to merge bugs because: package of #700051 is 'sysvinit' not 'src:haveged' Failed to forcibly merge 700048: Did not alter merged bugs Debbugs::Control::set_merged('transcript', 'GLOB(0x2c6a838)', 'requester', 'Roger Leigh rle...@codelibre.net', 'request_addr', 'cont...@bugs.debian.org', 'request_msgid', '20130208003739.gd21...@codelibre.net', 'request_subject', ...) called at /usr/local/lib/site_perl/Debbugs/Control/Service.pm line 552 eval {...} called at /usr/local/lib/site_perl/Debbugs/Control/Service.pm line 551 Debbugs::Control::Service::control_line('line', undef, 'clonebugs', 'HASH(0x2be4160)', 'limit', 'HASH(0x2be3b48)', 'common_control_options', 'ARRAY(0x2be3b90)', 'errors', ...) called at /usr/lib/debbugs/service line 474 thanks Stopping processing here. Please contact me if you need assistance. -- 700048: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700048 700051: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700051 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: forcemerge 700047 700051
Processing commands for cont...@bugs.debian.org: forcemerge 700047 700051 Bug #700047 [sysvinit] sysvinit: fails to create /etc/inittab from a fresh debootstrap Bug #700051 [sysvinit] sysvinit: fails to create /etc/inittab from a fresh debootstrap Merged 700047 700051 thanks Stopping processing here. Please contact me if you need assistance. -- 700047: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700047 700051: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700051 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#700051: marked as done (sysvinit: fails to create /etc/inittab from a fresh debootstrap)
Your message dated Fri, 08 Feb 2013 00:48:23 + with message-id e1u3c8d-0001fi...@franck.debian.org and subject line Bug#700051: fixed in sysvinit 2.88dsf-41 has caused the Debian Bug report #700051, regarding sysvinit: fails to create /etc/inittab from a fresh debootstrap to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 700051: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700051 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: sysvinit Version: 2.88dsf-40 Severity: critical Hello. It appears that with the new package that has been pushed to sid/unstable [sysvinit 2.88dsf-40], performing a debootstrap install results in an installation with no /etc/inittab. This appears to occur due to a section of sysvinit.postinst not running, due to being in a fakeroot/chroot/install environment, and having no init process to reinitialize. That section of the postinst looks like it doesn't execute [do_restart()], which unfortunately also includes: if [ ! -f /etc/inittab ] then cp -p /usr/share/sysvinit/inittab /etc/inittab fi This results in a debootstrap that has no /etc/inittab, and fails: Begin: Running /scripts/init-bottom ... done. INIT: version 2.88 booting INIT: No inittab file found Enter runlevel: ---End Message--- ---BeginMessage--- Source: sysvinit Source-Version: 2.88dsf-41 We believe that the bug you reported is fixed in the latest version of sysvinit, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 700...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Roger Leigh rle...@debian.org (supplier of updated sysvinit package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 07 Feb 2013 23:32:12 + Source: sysvinit Binary: sysvinit sysvinit-utils sysv-rc initscripts bootlogd Architecture: source amd64 all Version: 2.88dsf-41 Distribution: unstable Urgency: low Maintainer: Debian sysvinit maintainers pkg-sysvinit-de...@lists.alioth.debian.org Changed-By: Roger Leigh rle...@debian.org Description: bootlogd - daemon to log boot messages initscripts - scripts for initializing and shutting down the system sysv-rc- System-V-like runlevel change mechanism sysvinit - System-V-like init utilities sysvinit-utils - System-V-like utilities Closes: 700051 Changes: sysvinit (2.88dsf-41) unstable; urgency=low . [ Roger Leigh ]: * sysvinit postinst always creates /etc/inittab if absent during configuration (Closes: #700051). Checksums-Sha1: b82dc0119bea82529ffd767b5dd77abe436bcacf 2342 sysvinit_2.88dsf-41.dsc cc799e2de4188de3fadd3d134b855b0541343076 210323 sysvinit_2.88dsf-41.debian.tar.gz 839cf3c247401653a680f1198ec397582bc37396 133118 sysvinit_2.88dsf-41_amd64.deb 84f7eb1719f5635cfd3adb391d0ee23b825c2183 99510 sysvinit-utils_2.88dsf-41_amd64.deb d1978e2ccf1cb2b1c6fa086119433aa25012601c 81390 sysv-rc_2.88dsf-41_all.deb 257d9997ee70d884988d03de81fcf481741b121a 94072 initscripts_2.88dsf-41_amd64.deb 87cf96e6cb8ea5c4261d99a3f5da89d37b04e9e0 54906 bootlogd_2.88dsf-41_amd64.deb Checksums-Sha256: 8f1d6e6219300df8233cd244e0b44378feb5deaa11d3b84230554b5f754e4d55 2342 sysvinit_2.88dsf-41.dsc 742757028aec954738ef16470269333d362b30f6016a8898f5fbb59b3bfc681e 210323 sysvinit_2.88dsf-41.debian.tar.gz 03ecb1e4301ddcaafff50f750bef4b7d12a3635cc0ac4e718cd9a37cf67e63cd 133118 sysvinit_2.88dsf-41_amd64.deb fc76469677bac36490ae64e4bb06716a483a21b6a389e9fb691666ae1d78 99510 sysvinit-utils_2.88dsf-41_amd64.deb 463121f373083f92cd8c91e2161ef3e1838e6ea18dab748056004e25cd944a77 81390 sysv-rc_2.88dsf-41_all.deb 8900ccf6a4f2af407235156694fc5ca02797cb02d3e67a9534cd7c3afc706803 94072 initscripts_2.88dsf-41_amd64.deb 71a0fd26c1648d45ed87540c95bea467e300e08e2c796a4cf41acb9e66c0dabe 54906 bootlogd_2.88dsf-41_amd64.deb Files: 6e40966960924604f69e10b9c6359799 2342 admin required sysvinit_2.88dsf-41.dsc 517972a85593ebec738a01fba0b452ab 210323 admin required sysvinit_2.88dsf-41.debian.tar.gz 1012bff33f1709cf2c655ba9e62276ab 133118 admin required sysvinit_2.88dsf-41_amd64.deb 9f6e7daff04593fe0213fa71a5668e99 99510 admin required sysvinit-utils_2.88dsf-41_amd64.deb
Bug#700047: marked as done (sysvinit: fails to create /etc/inittab from a fresh debootstrap)
Your message dated Fri, 08 Feb 2013 00:48:23 + with message-id e1u3c8d-0001fi...@franck.debian.org and subject line Bug#700051: fixed in sysvinit 2.88dsf-41 has caused the Debian Bug report #700051, regarding sysvinit: fails to create /etc/inittab from a fresh debootstrap to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 700051: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700051 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: sysvinit Version: 2.88dsf-40 Severity: critical Hello. It appears that with the new package that has been pushed to sid/unstable [sysvinit 2.88dsf-40], performing a debootstrap install results in an installation with no /etc/inittab. This appears to occur due to a section of sysvinit.postinst not running, due to being in a fakeroot/chroot/install environment, and having no init process to reinitialize. That section of the postinst looks like it doesn't execute [do_restart()], which unfortunately also includes: if [ ! -f /etc/inittab ] then cp -p /usr/share/sysvinit/inittab /etc/inittab fi This results in a debootstrap that has no /etc/inittab, and fails: Begin: Running /scripts/init-bottom ... done. INIT: version 2.88 booting INIT: No inittab file found Enter runlevel: David Comeau ---End Message--- ---BeginMessage--- Source: sysvinit Source-Version: 2.88dsf-41 We believe that the bug you reported is fixed in the latest version of sysvinit, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 700...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Roger Leigh rle...@debian.org (supplier of updated sysvinit package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 07 Feb 2013 23:32:12 + Source: sysvinit Binary: sysvinit sysvinit-utils sysv-rc initscripts bootlogd Architecture: source amd64 all Version: 2.88dsf-41 Distribution: unstable Urgency: low Maintainer: Debian sysvinit maintainers pkg-sysvinit-de...@lists.alioth.debian.org Changed-By: Roger Leigh rle...@debian.org Description: bootlogd - daemon to log boot messages initscripts - scripts for initializing and shutting down the system sysv-rc- System-V-like runlevel change mechanism sysvinit - System-V-like init utilities sysvinit-utils - System-V-like utilities Closes: 700051 Changes: sysvinit (2.88dsf-41) unstable; urgency=low . [ Roger Leigh ]: * sysvinit postinst always creates /etc/inittab if absent during configuration (Closes: #700051). Checksums-Sha1: b82dc0119bea82529ffd767b5dd77abe436bcacf 2342 sysvinit_2.88dsf-41.dsc cc799e2de4188de3fadd3d134b855b0541343076 210323 sysvinit_2.88dsf-41.debian.tar.gz 839cf3c247401653a680f1198ec397582bc37396 133118 sysvinit_2.88dsf-41_amd64.deb 84f7eb1719f5635cfd3adb391d0ee23b825c2183 99510 sysvinit-utils_2.88dsf-41_amd64.deb d1978e2ccf1cb2b1c6fa086119433aa25012601c 81390 sysv-rc_2.88dsf-41_all.deb 257d9997ee70d884988d03de81fcf481741b121a 94072 initscripts_2.88dsf-41_amd64.deb 87cf96e6cb8ea5c4261d99a3f5da89d37b04e9e0 54906 bootlogd_2.88dsf-41_amd64.deb Checksums-Sha256: 8f1d6e6219300df8233cd244e0b44378feb5deaa11d3b84230554b5f754e4d55 2342 sysvinit_2.88dsf-41.dsc 742757028aec954738ef16470269333d362b30f6016a8898f5fbb59b3bfc681e 210323 sysvinit_2.88dsf-41.debian.tar.gz 03ecb1e4301ddcaafff50f750bef4b7d12a3635cc0ac4e718cd9a37cf67e63cd 133118 sysvinit_2.88dsf-41_amd64.deb fc76469677bac36490ae64e4bb06716a483a21b6a389e9fb691666ae1d78 99510 sysvinit-utils_2.88dsf-41_amd64.deb 463121f373083f92cd8c91e2161ef3e1838e6ea18dab748056004e25cd944a77 81390 sysv-rc_2.88dsf-41_all.deb 8900ccf6a4f2af407235156694fc5ca02797cb02d3e67a9534cd7c3afc706803 94072 initscripts_2.88dsf-41_amd64.deb 71a0fd26c1648d45ed87540c95bea467e300e08e2c796a4cf41acb9e66c0dabe 54906 bootlogd_2.88dsf-41_amd64.deb Files: 6e40966960924604f69e10b9c6359799 2342 admin required sysvinit_2.88dsf-41.dsc 517972a85593ebec738a01fba0b452ab 210323 admin required sysvinit_2.88dsf-41.debian.tar.gz 1012bff33f1709cf2c655ba9e62276ab 133118 admin required sysvinit_2.88dsf-41_amd64.deb 9f6e7daff04593fe0213fa71a5668e99 99510 admin required
Bug#698632: marked as done (rstatd: Patch 03-627217-netio.patch breaks RPC protocol compatibility for rstatd)
Your message dated Fri, 08 Feb 2013 01:32:31 + with message-id e1u3cpl-0002by...@franck.debian.org and subject line Bug#698632: fixed in rstatd 4.0.1-8 has caused the Debian Bug report #698632, regarding rstatd: Patch 03-627217-netio.patch breaks RPC protocol compatibility for rstatd to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 698632: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698632 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: rstatd Version: 4.0.1-7 Severity: serious Justification: Regression, mixed environments Squeeze and Wheezy -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi Anibal At our workplace we found that the patch 03-627217-netio.patch introduced in version 4.0.1-5 breaks the compatibility of rstatd in a inhomogeneous setup, where wheezy, squeeze and even solaris hosts interact. I have set the severity to serious as it introduces a 'regression' for Squeeze - - Wheezy, where one has mixed Squeeze and Wheezy setups, but can be downgraded to important if you don't agree. But IMHO should get version working in mixed environment. Here is a small example to reproduce the problem: sid 192.168.122.53 (rstatd and rstat-client 4.0.1-7) squeeze 192.168.122.54 (rstatd and rstat-client 4.0.1-4+squeeze1) - cut-cut-cut-cut-cut-cut- root@sid:~# rup 192.168.122.53 sid 12:50 up 3:58,1 user, load 0.00 0.01 0.04 root@sid:~# rup 192.168.122.54 rup: RPC: Success root@sid:~# - cut-cut-cut-cut-cut-cut- - cut-cut-cut-cut-cut-cut- root@squeeze:~# rup 192.168.122.53 192.168.122.53 1:00 up , 1358769030 load 0.00 0.01 0.04 root@squeeze:~# rup 192.168.122.54 squeeze 12:50 up 2 days,3:39,1 user, load 0.00 0.00 0.00 root@squeeze:~# - cut-cut-cut-cut-cut-cut- (Note that rup also shows wrong information on 192.168.122.53). Reverting the patch 03-627217-netio.patch let it work in a mixed squeeze, wheezy environment. If 627217 can be fixed, it should probably without breaking the protocol. After reverting the patch the requests give again correct results. - cut-cut-cut-cut-cut-cut- root@sid:~# rup 192.168.122.53 sid 14:13 up 5:22,1 user, load 0.00 0.01 0.05 root@sid:~# rup 192.168.122.54 192.168.122.5414:13 up 2 days,5:02,0 user, load 0.00 0.00 0.00 - cut-cut-cut-cut-cut-cut- - cut-cut-cut-cut-cut-cut- root@squeeze:~# rup 192.168.122.53 192.168.122.5314:14 up 5:22,0 user, load 0.00 0.01 0.05 root@squeeze:~# rup 192.168.122.54 squeeze 14:14 up 2 days,5:02,1 user, load 0.00 0.00 0.00 root@squeeze:~# - cut-cut-cut-cut-cut-cut- Could you please revert at least 03-627217-netio.patch (if fixing #627217 without creating the compatibility issue cannot be fixed)? Regards, Salvatore -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBCgAGBQJQ/UeuAAoJEHidbwV/2GP+SmsP/ivgYb8Usx1/t4L3kt1Rn6L8 Qc2wvdq92n76axAJ8XYDEyhvZH1AQHLa3SQihNbfQEtDp0Br7OP4uaqrSB+zPhE/ +VIv4iffUmKTCimAeBdQnSyrzoY2OgzKxExga0ESaK7Eld/UtrPDJdrz4DSPlcS2 XpIg6HzwNImkVjkAzOb0rWo/CP2JsQvO8yJ4I8W0Ojh+GczXFugkJ8PMh3siesxw jm2tI6Sd1uLu7dtFmb+EScLCdZy7PB8g8MoyxmXZDOAXQ+D+n+BL+T+jYC6Mentg KgJb0/URM2FO6blGYNgAEfptYP6TGK6IODlpe2217S/HUDFo3X2KUHU3mIWk0udJ JGxHZhhONaMXnjZSl4+beynl/hs1KD0PxP560A6EvkfRoeakOVaHbpCBly/88WaQ zY1+TSy/oDumcG7Tf2MBbo3NiAY9WYzni2Z6/J2P5wI3VVadIzQtbZFcZDq5nUp2 pzF/glRw1ZLc2bK6c/D8xRiMceAlTL/LnLUUkoNGcfmEjQ/I4BJGosQr4UFUmUT4 7q7za/9xhqoqxYpsayKRcCo577tOVibEn55QnIElBv0zm/9YdsgxdX0w4i4A8LXF x0Rnzy4tUitA4/8Id8rpbhixLohXrpYVvYsbfP3nixbx9KdeA4MV48AsMZcgiXjX psYM7kFTjZcA2osZ/tqd =qt2D -END PGP SIGNATURE- ---End Message--- ---BeginMessage--- Source: rstatd Source-Version: 4.0.1-8 We believe that the bug you reported is fixed in the latest version of rstatd, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 698...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian
Bug#700050: libflickcurl0: New version available (and needed for new oAuth scheme)
On Thu, Feb 07, 2013 at 10:26:51PM +0100, Jose Carlos Garcia Sogo wrote: A new version (1.23) is available, and adds support for oAuth, which is needed right now to authenticate in Flickr. The old method has been dropped now. Thanks for the report. I have checked the changes, and it looks as though the changes are too heavy to accomodate at this stage in the release process. So, I intend to request removal of this package from wheezy. Do you have any other recommendations? Thanks. Kumar -- Kumar Appaiah signature.asc Description: Digital signature
Processed: tagging 700050
Processing commands for cont...@bugs.debian.org: tags 700050 + confirmed Bug #700050 [libflickcurl0] libflickcurl0: New version available (and needed for new oAuth scheme) Added tag(s) confirmed. thanks Stopping processing here. Please contact me if you need assistance. -- 700050: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700050 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#698632: rstatd: Patch 03-627217-netio.patch breaks RPC protocol compatibility for rstatd
627217 found rstatd/4.0.1-8 stop On Mon, Jan 21, 2013 at 02:50:43PM +0100, Salvatore Bonaccorso wrote: Source: rstatd Version: 4.0.1-7 Severity: serious Justification: Regression, mixed environments Squeeze and Wheezy -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi Anibal At our workplace we found that the patch 03-627217-netio.patch introduced in version 4.0.1-5 breaks the compatibility of rstatd in a inhomogeneous setup, where wheezy, squeeze and even solaris hosts interact. I have set the severity to serious as it introduces a 'regression' for Squeeze - - Wheezy, where one has mixed Squeeze and Wheezy setups, but can be downgraded to important if you don't agree. But IMHO should get version working in mixed environment. Here is a small example to reproduce the problem: sid 192.168.122.53 (rstatd and rstat-client 4.0.1-7) squeeze 192.168.122.54 (rstatd and rstat-client 4.0.1-4+squeeze1) - cut-cut-cut-cut-cut-cut- root@sid:~# rup 192.168.122.53 sid 12:50 up 3:58,1 user, load 0.00 0.01 0.04 root@sid:~# rup 192.168.122.54 rup: RPC: Success root@sid:~# - cut-cut-cut-cut-cut-cut- - cut-cut-cut-cut-cut-cut- root@squeeze:~# rup 192.168.122.53 192.168.122.53 1:00 up , 1358769030 load 0.00 0.01 0.04 root@squeeze:~# rup 192.168.122.54 squeeze 12:50 up 2 days,3:39,1 user, load 0.00 0.00 0.00 root@squeeze:~# - cut-cut-cut-cut-cut-cut- (Note that rup also shows wrong information on 192.168.122.53). Reverting the patch 03-627217-netio.patch let it work in a mixed squeeze, wheezy environment. If 627217 can be fixed, it should probably without breaking the protocol. After reverting the patch the requests give again correct results. - cut-cut-cut-cut-cut-cut- root@sid:~# rup 192.168.122.53 sid 14:13 up 5:22,1 user, load 0.00 0.01 0.05 root@sid:~# rup 192.168.122.54 192.168.122.5414:13 up 2 days,5:02,0 user, load 0.00 0.00 0.00 - cut-cut-cut-cut-cut-cut- - cut-cut-cut-cut-cut-cut- root@squeeze:~# rup 192.168.122.53 192.168.122.5314:14 up 5:22,0 user, load 0.00 0.01 0.05 root@squeeze:~# rup 192.168.122.54 squeeze 14:14 up 2 days,5:02,1 user, load 0.00 0.00 0.00 root@squeeze:~# - cut-cut-cut-cut-cut-cut- Could you please revert at least 03-627217-netio.patch (if fixing #627217 without creating the compatibility issue cannot be fixed)? Regards, Salvatore -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBCgAGBQJQ/UeuAAoJEHidbwV/2GP+SmsP/ivgYb8Usx1/t4L3kt1Rn6L8 Qc2wvdq92n76axAJ8XYDEyhvZH1AQHLa3SQihNbfQEtDp0Br7OP4uaqrSB+zPhE/ +VIv4iffUmKTCimAeBdQnSyrzoY2OgzKxExga0ESaK7Eld/UtrPDJdrz4DSPlcS2 XpIg6HzwNImkVjkAzOb0rWo/CP2JsQvO8yJ4I8W0Ojh+GczXFugkJ8PMh3siesxw jm2tI6Sd1uLu7dtFmb+EScLCdZy7PB8g8MoyxmXZDOAXQ+D+n+BL+T+jYC6Mentg KgJb0/URM2FO6blGYNgAEfptYP6TGK6IODlpe2217S/HUDFo3X2KUHU3mIWk0udJ JGxHZhhONaMXnjZSl4+beynl/hs1KD0PxP560A6EvkfRoeakOVaHbpCBly/88WaQ zY1+TSy/oDumcG7Tf2MBbo3NiAY9WYzni2Z6/J2P5wI3VVadIzQtbZFcZDq5nUp2 pzF/glRw1ZLc2bK6c/D8xRiMceAlTL/LnLUUkoNGcfmEjQ/I4BJGosQr4UFUmUT4 7q7za/9xhqoqxYpsayKRcCo577tOVibEn55QnIElBv0zm/9YdsgxdX0w4i4A8LXF x0Rnzy4tUitA4/8Id8rpbhixLohXrpYVvYsbfP3nixbx9KdeA4MV48AsMZcgiXjX psYM7kFTjZcA2osZ/tqd =qt2D -END PGP SIGNATURE- Hello Thomas, Christian Oetzel's patch introduced a regression and I would be great if he could have look at this bug report: http://bugs.debian.org/698632 The original patches are at: http://bugs.debian.org/627217 Please pass this message on to Christian Oetzel. Cheers, Anibal -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#700067: mtpfs: did not show file in folder without subfolders
Package: mtpfs Version: 1.1-4 Severity: grave Tags: patch Justification: renders package unusable Dear Maintainer, * What led up to the situation? mount my android phone with mtpfs-1.1, it will not show files in folder that didn't have a subfolder. * What exactly did you do (or not do) that was effective (or ineffective)? 1. mount my phone to a folder: mtpfs -o rw /media/phone 2. open a terminal, cd to a folder with files but no subfolder, and run ls, nothing will show. * What was the outcome of this action? I can't found some files under the mount point. * What outcome did you expect instead? Show all my files under the mount point. Here's a patch for this bug. I've tested it, now it can show all my files. --- mtpfs-1.1/mtpfs.c 2013-02-07 17:21:31.526325953 +0800 +++ mtpfs-1.1-fix/mtpfs.c 2013-02-07 17:25:22.378680386 +0800 @@ -725,12 +725,12 @@ mtpfs_readdir (const gchar * path, void if (folder_id==-2) { DBG(Root of storage area); folder=storageArea[storageid].folders; +if (folder == NULL) return_unlock(0); } else { folder = LIBMTP_Find_Folder (storageArea[storageid].folders, folder_id); if (folder == NULL) return_unlock(0); folder = folder-child; } -if (folder == NULL) return_unlock(0); while (folder != NULL) { if ((folder-parent_id == folder_id) || One thing need to mention, I'm using the latest libmtp at sourceforge, because the version in debian cannot mount my phone. But I think it won't make any difference to this bug. -- System Information: Debian Release: 7.0 APT prefers testing APT policy: (990, 'testing'), (500, 'testing-updates'), (500, 'testing-proposed-updates'), (500, 'stable-updates'), (500, 'proposed-updates'), (500, 'stable'), (400, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages mtpfs depends on: ii fuse 2.9.0-2+deb7u1 ii libc6 2.13-37 ii libfuse2 2.9.0-2+deb7u1 ii libglib2.0-0 2.33.12+really2.32.4-3 ii libid3tag00.15.1b-10 ii libmad0 0.15.1b-7 ii libmtp9 1.1.3-35-g0ece104-4 ii libusb-1.0-0 2:1.0.11-1 ii zlib1g1:1.2.7.dfsg-13 mtpfs recommends no packages. mtpfs suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#699859: update
When removing the Linux check, playonlinux starts. However, when trying to install a windows program (7zip), it downloads a linux version of wine. This (obviously) doesn't work. Maybe recoding playonlinux to download a custom GNU/kfreeBSD version of wine would help, but I can understand that this project isn't on the front burner. Tldr: It doesn't do anything useful. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#699866: clang crashes while translating a trivial C++ program
On Wed, Feb 06, 2013 at 02:08:10AM +0100, Christian Böhme wrote: Package: clang Version: 3.0-6 Severity: grave Justification: renders package unusable Dear Maintainer, compiling this program ---8--- #include cstddef int main ( int argc, char * argv[] ) { int * i = new int (100); int j = (*i) + 4; delete i; return j; } ---8--- causes clang to crash in the lexer complaining about the execution of an Illegal instruction and suggesting to file a report with http://llvm.org/bugs/. FWIW it doesn't crash on amd64 sid and i386 wheezy. -- WBR, wRAR signature.asc Description: Digital signature
Bug#700068: xfe-themes, xfe-i18n: unhandled symlink to directory conversion: /usr/share/doc/PACKAGE
Package: xfe-themes,xfe-i18n Version: 1.32.5-1 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Hi, an upgrade test with piuparts revealed that your package installs files over existing symlinks and possibly overwrites files owned by other packages. This usually means an old version of the package shipped a symlink but that was later replaced by a real (and non-empty) directory. This kind of overwriting another package's files cannot be detected by dpkg. This was observed on the following upgrade paths: squeeze - wheezy For /usr/share/doc/PACKAGE this may not be problematic as long as both packages are installed, ship byte-for-byte identical files and are upgraded in lockstep. But once one of the involved packages gets removed, the other one will lose its documentation files, too, including the copyright file, which is a violation of Policy 12.5: http://www.debian.org/doc/debian-policy/ch-docs.html#s-copyrightfile For other overwritten locations anything interesting may happen. Note that dpkg intentionally does not replace directories with symlinks and vice versa, you need the maintainer scripts to do this. See in particular the end of point 4 in http://www.debian.org/doc/debian-policy/ch-maintainerscripts.html#s-unpackphase For switching from a symlink to a directory, the *preinst* script should do something like this: DOCDIR=/usr/share/doc/@@PACKAGE@@ if [ -L $DOCDIR ] ; then rm $DOCDIR fi From the attached log (usually somewhere in the middle...): 0m53.2s INFO: dirname part contains a symlink: /usr/share/doc/xfe-themes/changelog.Debian.gz (xfe-themes) != /usr/share/doc/xfe/changelog.Debian.gz (xfe) /usr/share/doc/xfe-themes/changelog.gz (xfe-themes) != /usr/share/doc/xfe/changelog.gz (xfe) /usr/share/doc/xfe-themes/copyright (xfe-themes) != /usr/share/doc/xfe/copyright (xfe) 1m1.7s INFO: dirname part contains a symlink: /usr/share/doc/xfe-i18n/changelog.Debian.gz (xfe-i18n) != /usr/share/doc/xfe/changelog.Debian.gz (xfe) /usr/share/doc/xfe-i18n/changelog.gz (xfe-i18n) != /usr/share/doc/xfe/changelog.gz (xfe) /usr/share/doc/xfe-i18n/copyright (xfe-i18n) != /usr/share/doc/xfe/copyright (xfe) cheers, Andreas xfe-themes_1.32.5-1.log.gz Description: GNU Zip compressed data
Bug#700069: vim-lesstif: unhandled symlink to directory conversion: /usr/share/doc/PACKAGE
Package: vim-lesstif Version: 2:7.3.547-6 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Hi, an upgrade test with piuparts revealed that your package installs files over existing symlinks and possibly overwrites files owned by other packages. This usually means an old version of the package shipped a symlink but that was later replaced by a real (and non-empty) directory. This kind of overwriting another package's files cannot be detected by dpkg. This was observed on the following upgrade paths: squeeze - wheezy For /usr/share/doc/PACKAGE this may not be problematic as long as both packages are installed, ship byte-for-byte identical files and are upgraded in lockstep. But once one of the involved packages gets removed, the other one will lose its documentation files, too, including the copyright file, which is a violation of Policy 12.5: http://www.debian.org/doc/debian-policy/ch-docs.html#s-copyrightfile For other overwritten locations anything interesting may happen. Note that dpkg intentionally does not replace directories with symlinks and vice versa, you need the maintainer scripts to do this. See in particular the end of point 4 in http://www.debian.org/doc/debian-policy/ch-maintainerscripts.html#s-unpackphase For switching from a symlink to a directory, the *preinst* script should do something like this: DOCDIR=/usr/share/doc/@@PACKAGE@@ if [ -L $DOCDIR ] ; then rm $DOCDIR fi From the attached log (usually somewhere in the middle...): 1m0.7s INFO: dirname part contains a symlink: /usr/share/doc/vim-lesstif/NEWS.Debian.gz (vim-lesstif) != /usr/share/doc/vim-gui-common/NEWS.Debian.gz (vim-gui-common) /usr/share/doc/vim-lesstif/changelog.Debian.gz (vim-lesstif) != /usr/share/doc/vim-gui-common/changelog.Debian.gz (vim-gui-common) /usr/share/doc/vim-lesstif/copyright (vim-lesstif) != /usr/share/doc/vim-gui-common/copyright (vim-gui-common) cheers, Andreas vim-lesstif_2:7.3.547-6.log.gz Description: GNU Zip compressed data
Bug#699744: nagios3-cgi: prompting due to modified conffiles which were not modified by the user: /etc/nagios3/stylesheets/outages.css
Hi! On Wed, 2013-02-06 at 00:50:29 +0100, Andreas Beckmann wrote: On Tuesday, 5. February 2013 01:01:43 Vagrant Cascadian wrote: As far as I can tell, /etc/nagios3/stylesheets/* were introduced in the squeeze nagios3-cgi package. /etc/nagios3/cgi.cfg was a conffile with nagios3-common in wheezy, and transitioned to nagios3-cgi for wheezy. My guess is something wrong in the transition from nagios3-common to nagios3-cgi for cgi.cfg, but I'm not sure what exactly is needed there. OK. I see what happened here. Not nagios3's fault. Bug #689836: dpkg: md5sums incorrectly recorded for conffile takeover http://bugs.debian.org/689836 So it's broken in squeeze (dpkg database is corrupted, i.e. contains the wrong md5sums (well, it contains the correct md5sums, too, but at the wrong place)). Whether this happens depends on the configuration order. If nagios-doc is configured before nagios3-cgi it will record the new md5sum for updated conffiles for nagios3-doc instead of nagios-cgi ... even if it no longer owns these files. I have no idea how many packages are possibly affected by this or how this can be fixed ... therefore Cc:ing Guillem. TBH I'm not sure how many can be affected, my guess would be not many though. Wait, we can try this: # apt-get install --reinstall nagios3-cgi # dpkg -s nagios3-cgi [...] Great, that FIXED the DB. Right, it should just be either a matter of time, once every problematic package has been upgraded after getting a fixed dpkg, or people actively reinstalling broken packages. In any case, for wheezy I guess it would be nice to strongly recommend on the release notes to upgrade dpkg first. I also had in mind checking with the SRM if the fix for the above dpkg bug would be fine for a stable update, among some others, but only after having those in unstable and testing for a long while. But that will still not guarantee that people have upgraded to that stable dpkg version before the wheezy dist-upgrade, so... Thanks, Guillem -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#687407: marked as done (xdotool: FTBFS: cannot load such file -- xdo_test_helper)
Your message dated Fri, 08 Feb 2013 03:17:34 + with message-id e1u3et0-00055q...@franck.debian.org and subject line Bug#680824: fixed in xdotool 1:2.20100701.2961-3+deb7u2 has caused the Debian Bug report #680824, regarding xdotool: FTBFS: cannot load such file -- xdo_test_helper to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 680824: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680824 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: xdotool Version: 1:2.20100701.2961-3 Severity: serious Tags: wheezy sid User: debian...@lists.debian.org Usertags: qa-ftbfs-20120912 qa-ftbfs Justification: FTBFS in wheezy on amd64 Hi, During a rebuild of all packages in *wheezy*, your package failed to build on amd64. Relevant part: make[5]: Entering directory `/«PKGBUILDDIR»' make[5]: Nothing to be done for `all'. make[5]: Leaving directory `/«PKGBUILDDIR»' Setting up keymap on new server as us /usr/lib/ruby/1.9.1/rubygems/custom_require.rb:36:in `require': cannot load such file -- xdo_test_helper (LoadError) from /usr/lib/ruby/1.9.1/rubygems/custom_require.rb:36:in `require' from test_basic.rb:5:in `main' make[4]: *** [do-test] Error 1 The full build log is available from: http://people.debian.org/~lucas/logs/2012/09/12/xdotool_2.20100701.2961-3_wheezy.log A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! About the archive rebuild: The rebuild was done on EC2 VM instances from Amazon Web Services, using a clean, minimal and up-to-date chroot. Every failed build was retried once to eliminate random failures. ---End Message--- ---BeginMessage--- Source: xdotool Source-Version: 1:2.20100701.2961-3+deb7u2 We believe that the bug you reported is fixed in the latest version of xdotool, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 680...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Daniel Kahn Gillmor d...@fifthhorseman.net (supplier of updated xdotool package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 07 Feb 2013 22:00:34 -0500 Source: xdotool Binary: xdotool libxdo2 libxdo-dev Architecture: source amd64 Version: 1:2.20100701.2961-3+deb7u2 Distribution: testing-proposed-updates Urgency: low Maintainer: Daniel Kahn Gillmor d...@fifthhorseman.net Changed-By: Daniel Kahn Gillmor d...@fifthhorseman.net Description: libxdo-dev - library for simulating X11 keyboard/mouse input libxdo2- library for simulating X11 keyboard/mouse input xdotool- simulate X11 keyboard/mouse input Closes: 680824 Changes: xdotool (1:2.20100701.2961-3+deb7u2) testing-proposed-updates; urgency=low . * revert previous build attempt (thanks Michael Stapelberg for your work!) * build-depend on ruby1.8, build-conflict on ruby1.9.1 (Closes: #680824) * remove non-us typing tests (upstream doesn't expect them to work) Checksums-Sha1: 71990af05b1fd5f2af6557793d214277555a7175 2253 xdotool_2.20100701.2961-3+deb7u2.dsc d337ed7305f7be4527e520e60471b95114138739 6257 xdotool_2.20100701.2961-3+deb7u2.debian.tar.gz 31a6e559ffa60d4cca005563764273b104137a3d 38116 xdotool_2.20100701.2961-3+deb7u2_amd64.deb f62458f83f49c2428b9cfb7ef8264210ca519fc8 28512 libxdo2_2.20100701.2961-3+deb7u2_amd64.deb ea8551c217befcaf6d172f5b58ce1700cde40907 124284 libxdo-dev_2.20100701.2961-3+deb7u2_amd64.deb Checksums-Sha256: fcc958b895f2eeb1b8edaee03ca845d114ca536b7d2b1987ca36d1fe6280cce9 2253 xdotool_2.20100701.2961-3+deb7u2.dsc 6e1c00da7b1bff639db98f4ebcea950baaff7a15b156bbfec112f1b6b40f3195 6257 xdotool_2.20100701.2961-3+deb7u2.debian.tar.gz fa5fd24fc38485fa450b6ef496b4d952d1b6ff7ed70a67e4b470da6545204481 38116 xdotool_2.20100701.2961-3+deb7u2_amd64.deb b73d8b4d3d00412156afa7deaa91f13e692952d2b073fd0021bd73083a438187 28512 libxdo2_2.20100701.2961-3+deb7u2_amd64.deb 5b2d61c561b3389301b1be2bcd51f10ef762b88fb6d3a702683a939456ec69e4 124284 libxdo-dev_2.20100701.2961-3+deb7u2_amd64.deb Files: 12d56b6b166ee44015e97c54e7f8dc55 2253 x11 extra xdotool_2.20100701.2961-3+deb7u2.dsc
Bug#680824: marked as done (xdotool: FTBFS: /usr/lib/ruby/1.9.1/rubygems/custom_require.rb:36:in `require': cannot load such file -- xdo_test_helper (LoadError))
Your message dated Fri, 08 Feb 2013 03:17:34 + with message-id e1u3et0-00055q...@franck.debian.org and subject line Bug#680824: fixed in xdotool 1:2.20100701.2961-3+deb7u2 has caused the Debian Bug report #680824, regarding xdotool: FTBFS: /usr/lib/ruby/1.9.1/rubygems/custom_require.rb:36:in `require': cannot load such file -- xdo_test_helper (LoadError) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 680824: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680824 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: xdotool Version: 1:2.20110530.1-3 Severity: serious Tags: wheezy sid User: debian...@lists.debian.org Usertags: qa-ftbfs-20120708 qa-ftbfs Justification: FTBFS on amd64 Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part: make[6]: Entering directory `/«PKGBUILDDIR»' make[6]: Nothing to be done for `all'. make[6]: Leaving directory `/«PKGBUILDDIR»' Running test_basic.rb Setting up keymap on new server as us /usr/lib/ruby/1.9.1/rubygems/custom_require.rb:36:in `require': cannot load such file -- xdo_test_helper (LoadError) from /usr/lib/ruby/1.9.1/rubygems/custom_require.rb:36:in `require' from test_basic.rb:5:in `main' make[5]: *** [do-test] Error 1 The full build log is available from: http://people.debian.org/~lucas/logs/2012/07/08/xdotool_2.20110530.1-3_unstable.log A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! About the archive rebuild: The rebuild was done on EC2 VM instances from Amazon Web Services, using a clean, minimal and up-to-date chroot. Every failed build was retried once to eliminate random failures. ---End Message--- ---BeginMessage--- Source: xdotool Source-Version: 1:2.20100701.2961-3+deb7u2 We believe that the bug you reported is fixed in the latest version of xdotool, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 680...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Daniel Kahn Gillmor d...@fifthhorseman.net (supplier of updated xdotool package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 07 Feb 2013 22:00:34 -0500 Source: xdotool Binary: xdotool libxdo2 libxdo-dev Architecture: source amd64 Version: 1:2.20100701.2961-3+deb7u2 Distribution: testing-proposed-updates Urgency: low Maintainer: Daniel Kahn Gillmor d...@fifthhorseman.net Changed-By: Daniel Kahn Gillmor d...@fifthhorseman.net Description: libxdo-dev - library for simulating X11 keyboard/mouse input libxdo2- library for simulating X11 keyboard/mouse input xdotool- simulate X11 keyboard/mouse input Closes: 680824 Changes: xdotool (1:2.20100701.2961-3+deb7u2) testing-proposed-updates; urgency=low . * revert previous build attempt (thanks Michael Stapelberg for your work!) * build-depend on ruby1.8, build-conflict on ruby1.9.1 (Closes: #680824) * remove non-us typing tests (upstream doesn't expect them to work) Checksums-Sha1: 71990af05b1fd5f2af6557793d214277555a7175 2253 xdotool_2.20100701.2961-3+deb7u2.dsc d337ed7305f7be4527e520e60471b95114138739 6257 xdotool_2.20100701.2961-3+deb7u2.debian.tar.gz 31a6e559ffa60d4cca005563764273b104137a3d 38116 xdotool_2.20100701.2961-3+deb7u2_amd64.deb f62458f83f49c2428b9cfb7ef8264210ca519fc8 28512 libxdo2_2.20100701.2961-3+deb7u2_amd64.deb ea8551c217befcaf6d172f5b58ce1700cde40907 124284 libxdo-dev_2.20100701.2961-3+deb7u2_amd64.deb Checksums-Sha256: fcc958b895f2eeb1b8edaee03ca845d114ca536b7d2b1987ca36d1fe6280cce9 2253 xdotool_2.20100701.2961-3+deb7u2.dsc 6e1c00da7b1bff639db98f4ebcea950baaff7a15b156bbfec112f1b6b40f3195 6257 xdotool_2.20100701.2961-3+deb7u2.debian.tar.gz fa5fd24fc38485fa450b6ef496b4d952d1b6ff7ed70a67e4b470da6545204481 38116 xdotool_2.20100701.2961-3+deb7u2_amd64.deb b73d8b4d3d00412156afa7deaa91f13e692952d2b073fd0021bd73083a438187 28512 libxdo2_2.20100701.2961-3+deb7u2_amd64.deb 5b2d61c561b3389301b1be2bcd51f10ef762b88fb6d3a702683a939456ec69e4 124284 libxdo-dev_2.20100701.2961-3+deb7u2_amd64.deb Files:
Bug#677565: Bug#682518: Bug#677565: RC bugs in msva-perl
On 02/04/2013 01:28 PM, Dominic Hargreaves wrote: On Sat, Feb 02, 2013 at 03:31:33PM +0100, intrigeri wrote: FWIW, I've asked about the same on the Monkeysphere mailing-list last October, see dkg's answer there: https://lists.riseup.net/www/arc/monkeysphere/2012-10/ I've just pushed a proposed upstream msva-perl/0.8.1 targetted bugfix tag to git://lair.fifthhorseman.net/~dkg/msva-perl, and a wheezy branch that uses that and targets testing-proposed-updates. The debdiff between 0.8-2 and the proposed 0.8.1-1 is attached here. It is smaller than the previously-submitted changeset to 0.9.1-1, but it is still non-trivial, alas, due to having to accomodate the new Net::Server and the change to avoid crashing X11 sessions if the agent fails for any reason we were not able to anticipate. I've tested 0.8.1-1 on a wheezy system and it works for me. I plan to upload it to t-p-u sometime tomorrow or the next day unless i hear from anyone that it didn't work for them. Regards, --dkg diff -Nru msva-perl-0.8/Changelog msva-perl-0.8.1/Changelog --- msva-perl-0.8/Changelog 2010-12-20 16:11:39.0 -0500 +++ msva-perl-0.8.1/Changelog 2013-02-08 00:28:19.0 -0500 @@ -1,3 +1,11 @@ +msva-perl (0.8.1) upstream; + + * stable release: + - cherry-picked bugfixes from 0.9 and 0.9.1; reduced refactoring +changes to get it to work safely with wheezy. + + -- Daniel Kahn Gillmor d...@fifthhorseman.net Thu, 07 Feb 2013 23:33:46 -0500 + msva-perl (0.8) upstream; * Minor bugfix release! diff -Nru msva-perl-0.8/Crypt/Monkeysphere/MSVA/Client.pm msva-perl-0.8.1/Crypt/Monkeysphere/MSVA/Client.pm --- msva-perl-0.8/Crypt/Monkeysphere/MSVA/Client.pm 2010-12-20 16:11:39.0 -0500 +++ msva-perl-0.8.1/Crypt/Monkeysphere/MSVA/Client.pm 2013-02-08 00:28:19.0 -0500 @@ -145,7 +145,7 @@ $self-{logger} = Crypt::Monkeysphere::MSVA::Logger-new($args{log_level}); $self-{socket} = $args{socket}; -$self-{socket} = 'http://localhost:8901' +$self-{socket} = 'http://127.0.0.1:8901' if (! defined $self-{socket} or $self-{socket} eq ''); # create the user agent diff -Nru msva-perl-0.8/Crypt/Monkeysphere/MSVA/Logger.pm msva-perl-0.8.1/Crypt/Monkeysphere/MSVA/Logger.pm --- msva-perl-0.8/Crypt/Monkeysphere/MSVA/Logger.pm 2010-12-20 16:11:39.0 -0500 +++ msva-perl-0.8.1/Crypt/Monkeysphere/MSVA/Logger.pm 2013-02-08 00:28:19.0 -0500 @@ -45,6 +45,8 @@ my $self = shift; my $msglevel = shift; +$msglevel = 'error' + if (! defined($msglevel)); if ($loglevels{lc($msglevel)} = $self-{loglevel}) { printf STDERR @_; } @@ -88,7 +90,7 @@ my $class = shift; my $loglevel = shift; -my $self = {loglevel = $loglevels{lc($loglevel)}}; +my $self = {loglevel = $loglevels{defined($loglevel) ? lc($loglevel) : 'error'}}; $self-{loglevel} = $loglevels{error} if (!defined $self-{loglevel}); diff -Nru msva-perl-0.8/Crypt/Monkeysphere/MSVA/MarginalUI.pm msva-perl-0.8.1/Crypt/Monkeysphere/MSVA/MarginalUI.pm --- msva-perl-0.8/Crypt/Monkeysphere/MSVA/MarginalUI.pm 2010-12-20 16:11:39.0 -0500 +++ msva-perl-0.8.1/Crypt/Monkeysphere/MSVA/MarginalUI.pm 2013-02-08 00:28:19.0 -0500 @@ -46,7 +46,8 @@ } foreach my $keyfpr (@subvalid_key_fprs) { - my $fprx = sprintf('0x%.40s', $keyfpr-{fpr}-as_hex_string()); + $keyfpr-{fpr}-as_hex_string() =~ /([[:xdigit:]]{0,40})/; + my $fprx = '0x' . $1; $logger-log('debug', checking on %s\n, $fprx); foreach my $gpgkey ($gnupg-get_public_keys_with_sigs($fprx)) { $logger-log('debug', found key %.40s\n, $gpgkey-fingerprint-as_hex_string); diff -Nru msva-perl-0.8/Crypt/Monkeysphere/MSVA.pm msva-perl-0.8.1/Crypt/Monkeysphere/MSVA.pm --- msva-perl-0.8/Crypt/Monkeysphere/MSVA.pm2010-12-20 16:11:39.0 -0500 +++ msva-perl-0.8.1/Crypt/Monkeysphere/MSVA.pm 2013-02-08 00:28:19.0 -0500 @@ -376,7 +376,7 @@ # This is part of a spawned child process. We don't want the # child process to destroy the update monitor when it terminates. -$self-{updatemonitor}-forget(); +$self-{updatemonitor}-forget() if exists $self-{updatemonitor} defined $self-{updatemonitor}; my $clientinfo = get_client_info(select); my $clientuid = $clientinfo-{uid}; @@ -759,17 +759,22 @@ my $self = shift; my $server = shift; -$self-spawn_master_subproc($server); +$self-spawn_as_child($server); } - sub master_subprocess_died { + sub pre_accept_hook { my $self = shift; my $server = shift; -my $subproc_return = shift; -my $exitstatus = POSIX::WEXITSTATUS($subproc_return); -msvalog('verbose', Subprocess %d terminated; exiting %d.\n, $self-{child_pid}, $exitstatus); -$server-set_exit_status($exitstatus); +$self-parent_changed($server) if (defined $self-{parent_pid} getppid() != $self-{parent_pid}); + } + + sub parent_changed