Bug#699021: src:sigx: FTBFS against newer GLib: invalid conversion from 'const volatile void*' to 'volatile void*'
retitle 699021 src:sigx: FTBFS against glib2.0/wheezy: invalid conversion from 'const volatile void*' to 'volatile void*' tags 699021 + sid thanks On Sat, 26 Jan 2013 at 16:34:36 +, Simon McVittie wrote: Using g_atomic_pointer_get ((volatile void *) (blah blah)) would probably resolve this for now. I'll open a GLib bug suggesting that it should take a const volatile void * parameter. I fixed this in GLib for 2.36[1] so this can be closed when glib2.0/experimental reaches unstable after the wheezy release. S [1] https://bugzilla.gnome.org/show_bug.cgi?id=692583 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#699021: src:sigx: FTBFS against newer GLib: invalid conversion from 'const volatile void*' to 'volatile void*'
Processing commands for cont...@bugs.debian.org: retitle 699021 src:sigx: FTBFS against glib2.0/wheezy: invalid conversion from 'const volatile void*' to 'volatile void*' Bug #699021 [src:sigx] src:sigx: FTBFS against newer GLib: invalid conversion from 'const volatile void*' to 'volatile void*' Changed Bug title to 'src:sigx: FTBFS against glib2.0/wheezy: invalid conversion from 'const volatile void*' to 'volatile void*'' from 'src:sigx: FTBFS against newer GLib: invalid conversion from 'const volatile void*' to 'volatile void*'' tags 699021 + sid Bug #699021 [src:sigx] src:sigx: FTBFS against glib2.0/wheezy: invalid conversion from 'const volatile void*' to 'volatile void*' Added tag(s) sid. thanks Stopping processing here. Please contact me if you need assistance. -- 699021: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699021 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#704457: gd extension broken due new embedded libgd functions not added to gd_compat layer
I also had this problem, so I was happy to see it was already fixed. Though i noticed on php.net that another php beta release should be available in a few days, I was hoping that this an interim version (5.5.0~beta2-2 perhaps?) could be uploaded already, because the owncloud 5.0.3 package was uploaded yesterday and it seems to require gd to work. So this is no longer a matter of merely having persistent error notifications. If this is not possible, I will just have to wait a little while longer (it's all from experimental anyway, so it's to be expected). It might still be useful to communicate this to the owncloud maintainers though.
Bug#695224: Locale::Maketext versioning in perl package
On 2013-04-02 21:15, Niko Tyni wrote: On Sun, Mar 31, 2013 at 05:46:12PM +0100, Dominic Hargreaves wrote: There is a problem with the perl package, as discussed in http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695224#55 onwards, whereby the application of the security fix in that ticket now causes double-escaping problems where people workaround the problem by escaping themselves, when they detect an earlier Locale::Maketext by version number. I am slightly wary about importing the new (1.23) version of Locale::Maketext as I mentioned in that bug already, but my fears may be unfounded. Could you comment about whether you would accept such a change in wheezy at this time? (I can't really decide whether it's RC or not). FWIW, it looks clear to me that the only functional changes in the patch are the $VERSION increments in the .pm files. The rest is documentation and test cases, and the only important $VERSION is most probably the main one in Locale/Maketext.pm. Indeed. While that change itself is trivial, it has action-at-distance effects - otherwise this wouldn't be an issue at all. I think the risk potential is mostly in breaking something that's trusting Module::CoreList (dh-make-perl and lintian come to mind, CPAN.pm and CPANPLUS.pm might be affected somehow too?), and that it's not a very big risk but still a real one. Lintian uses a precomputed static list. It would at worst lead to false-negatives for package-superseded-by-perl (i.e. no tag when one should have been there). I suspect dh-make-perl will have a similar case with using the cpan variant instead of the core variant in dependencies (though I only gave it a quick scan). I would suspect that any application code using Module::CoreList would still have to account for the cpan version being present? [...] In this specific case, upgrading Locale::Maketext fully to 1.23 in wheezy would probably have been the right thing to do if we had anticipated these issues. But we didn't, and it seems very late in the release process to do it now. Also, I can't really see us applying anything but the targeted fix for squeeze. I am tempted to take this fix for Wheezy and be done with it. Can (one of) you please check up on CPAN.pm/CPANPLUS.pm ? I see Fedora/RedHat also upgraded their Locale::Maketext modules without incrementing $VERSION (I checked the patches in RHEL 6 / Perl 5.10.1 and Fedora Core 16 17 / Perl 5.14.3). So it looks like even if we do try to fix this for wheezy, applications still have to check for features rather than versions to stay on the safe side. Okay, sounds like it will be fine with leaving Squeeze as is then. ~Niels -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#677795: Bug#704520: RM: midgard2-core/10.05.7.1-1 php5-midgard2/10.05.7-1
user release.debian@packages.debian.org usertags 677795 + wheezy-will-remove thanks On 2013-04-02 13:13, Didier Raboud wrote: Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: rm Hi dear Release Team, hi dear midgard2-core and php5-midgard2 maintainers, as explained in http://bugs.debian.org/677795#67 , I think midgard2-core (and it's only build-rdep, php5-midgard2) should get removed from testing: As I read it, the package had several packaging-related issues summing up to that serious bug, filed two weeks before the freeze. Since then, in September, a package supposedly fixing these issues has been uploaded and queued in NEW [0]; it hasn't been liberated from NEW yet. From here, I see three ways forward: a) a new package enters unstable, and then Wheezy, but that seems unlikely; b) midgard2-core and php5-midgard2 are removed from Wheezy, thereby removing the RC bug. c) that bug either gets downgraded to non-RC severity, or tagged wheezy-ignore by the release team. As I think the concerns originally leading to the severity of that bug are correct, I would rather be of the opinion to drop the two packages. As you see, I think that as this point, b) is the only reasonable choice. Cheers, OdyX [...] We have not accepted new (binary) packages in Wheezy for quite a while. So option a) is indeed very unlikely. As it is, I am inclined to agree with OdyX's observations, so I am tagging the bug as will-remove for now. ~Niels -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#704870: opus: cve-2013-0899
On Sat, 06 Apr 2013 20:00:56 -0400, Michael Gilbert wrote: CVE-2013-0899[0]: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0899 http://security-tracker.debian.org/tracker/CVE-2013-0899 Clicking through the links in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0899 I came upon https://code.google.com/p/chromium/issues/detail?id=160480 which points to a commit http://git.xiph.org/?p=opus.git;a=commitdiff;h=9345aaa5ca1c2fb7d62981b2a538e0ce20612c38 Same in https://codereview.chromium.org/11575026 which points to https://codereview.chromium.org/download/issue11575026_5001_6001.diff (Please note that I haven't checked if this applies to the opus version in Debian.) Cheers, gregor -- .''`. Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06 : :' : Debian GNU/Linux user, admin, and developer - http://www.debian.org/ `. `' Member of VIBE!AT SPI, fellow of the Free Software Foundation Europe `- NP: Tom Waits: Poncho's Lament signature.asc Description: Digital signature
Bug#683008: marked as done (FTBFS on kfreebsd-*: zipfile.BadZipfile: File is not a zip file)
Your message dated Sun, 07 Apr 2013 15:55:23 +0200 with message-id 51617acb.2010...@thykier.net and subject line libgui-commands-java removed from Debian has caused the Debian Bug report #683008, regarding FTBFS on kfreebsd-*: zipfile.BadZipfile: File is not a zip file to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 683008: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683008 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: libgui-commands-java Version: 1.1.43-6 Severity: serious Justification: fails to build from source libgui-commands-java fails to build from source on kfreebsd-*, but built in the past: File /usr/lib/gcc/aotcompile.py, line 184, in find_jobs job = JarJob(path) File /usr/lib/gcc/aotcompile.py, line 320, in __init__ self._walk(zipfile.ZipFile(path, r)) File /usr/lib/gcc/aotcompile.py, line 326, in _walk self._walk(zipfile.ZipFile(StringIO.StringIO(bytes))) File /usr/lib/python2.7/zipfile.py, line 714, in __init__ self._GetContents() File /usr/lib/python2.7/zipfile.py, line 748, in _GetContents self._RealGetContents() File /usr/lib/python2.7/zipfile.py, line 763, in _RealGetContents raise BadZipfile, File is not a zip file zipfile.BadZipfile: File is not a zip file dh_nativejava: aot-compile -L /usr/lib/gcj -c -fsource-filename=/tmp/filepSnHJg debian/libgui-commands-java debian/libgui-commands-java-gcj/usr/lib/gcj returned exit code 1 make: *** [install/libgui-commands-java-gcj] Error 25 https://buildd.debian.org/status/fetch.php?pkg=libgui-commands-javaarch=kfreebsd-amd64ver=1.1.43-6stamp=1334855746 https://buildd.debian.org/status/fetch.php?pkg=libgui-commands-javaarch=kfreebsd-i386ver=1.1.43-6stamp=1334855764 ---End Message--- ---BeginMessage--- Version: 1.1.43-6+rm Hi, I am closing these bugs now as libgui-commands-java was removed from Debian unstable (and by now testing as well). Please refer to #701724 for more information about why the package was removed. The bugs (if marked as affecting the version in stable) will remain open for the libgui-commands-java in stable. Unless these are RC (i.e. severity = serious), then it is unlikely these bugs will be fixed. Sorry for the delay and the inconvenience. ~Niels---End Message---
Bug#701793: marked as done (php-horde-sesha fails to build from source)
Your message dated Sun, 07 Apr 2013 14:51:14 + with message-id e1uoqw6-00039v...@franck.debian.org and subject line Bug#701793: fixed in php-horde-sesha 1.0.0~beta1-3 has caused the Debian Bug report #701793, regarding php-horde-sesha fails to build from source to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 701793: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701793 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: php-horde-sesha Version: 1.0.0~beta1-2 Severity: serious Tags: sid Seen on the Ubuntu buildds, however this is reproducible in Debian unstable too: This package contains role horde and requires package horde/Role to be used Parsing of package.xml from file ./sesha-1.0.0beta1/package.xml failed Cannot download non-local package ./sesha-1.0.0beta1/package.xml install failed dh_auto_install: /usr/bin/pear -c debian/pearrc -d download_dir=/tmp -d include_path=/usr/share/php -d php_bin=/usr/bin/php -d bin_dir=/usr/bin -d php_dir=/usr/share/php -d data_dir=/usr/share/php/data -d doc_dir=/usr/share/doc/php-horde-sesha -d test_dir=/usr/share/php/tests install --offline --nodeps -P /scratch/packages/tmp/php-horde-sesha-1.0.0~beta1/debian/php-horde-sesha ./sesha-1.0.0beta1/package.xml returned exit code 1 make: *** [binary] Error 1 this looks like a missing build dependency, because if you install php-horde-sesha itself, the build succeeds. Removing php-horde-sesha again still lets the build succeed, so it must be some package which php-horde-sesha depends on. ---End Message--- ---BeginMessage--- Source: php-horde-sesha Source-Version: 1.0.0~beta1-3 We believe that the bug you reported is fixed in the latest version of php-horde-sesha, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 701...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Mathieu Parent sath...@debian.org (supplier of updated php-horde-sesha package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 07 Apr 2013 15:50:59 +0200 Source: php-horde-sesha Binary: php-horde-sesha Architecture: source all Version: 1.0.0~beta1-3 Distribution: unstable Urgency: low Maintainer: Horde Maintainers pkg-horde-hack...@lists.alioth.debian.org Changed-By: Mathieu Parent sath...@debian.org Description: php-horde-sesha - ${phppear:summary} Closes: 701793 Changes: php-horde-sesha (1.0.0~beta1-3) unstable; urgency=low . * Add B-D on php-horde-role. Fix FTBFS (Closes: #701793) Checksums-Sha1: 85d889de91eb1fa59d1ded8235b06e9ab6f59fb4 1435 php-horde-sesha_1.0.0~beta1-3.dsc 22548b64f7aae753357836cb8e61807382d42515 2277 php-horde-sesha_1.0.0~beta1-3.debian.tar.gz 975ec7bf78f3f8d117b796c2eb9810ea939bc2b3 238474 php-horde-sesha_1.0.0~beta1-3_all.deb Checksums-Sha256: 6191f222f78a3a0a2ffc0de98d7eb663dbdfe37e6199fed2921ed17498bb0bef 1435 php-horde-sesha_1.0.0~beta1-3.dsc 52c44c94d9c7d261f6a49d2a6cf3f29684dad4bd1ff74caa9b70302b61dd0a4d 2277 php-horde-sesha_1.0.0~beta1-3.debian.tar.gz 9d3ae5e721308f68ba8cbd1aac84c81d822b744b2248066cfeb6a8a6013836fc 238474 php-horde-sesha_1.0.0~beta1-3_all.deb Files: a025cafab0d5e656d56152796a216e4c 1435 php extra php-horde-sesha_1.0.0~beta1-3.dsc 37a8cd7ccc39ba845a62ac6647e49920 2277 php extra php-horde-sesha_1.0.0~beta1-3.debian.tar.gz 04c2ec0de5535e0032e6e4abda86b9f3 238474 php extra php-horde-sesha_1.0.0~beta1-3_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iEYEARECAAYFAlFheekACgkQOW2jYf5fHX8VZwCgnCZpmB1SeI+n/mE3R2OJ8Evf 0RAAnRYrGzo2NVE+541pqhSU8SlIowEJ =6B0l -END PGP SIGNATUREEnd Message---
Bug#704914: glx-alternatives: The libGL diversion does not work
Source: glx-alternatives Version: 0.2.90 Severity: grave Justification: renders package unusable There is a severe problem with the libGL diversion strategy as exists at present. The desktop is rendered inoperable after any change in the packaging, due to the diversion in glx-diversions being replaced by the actual lib from libgl1-mesa-glx. This is because gnome- session-bin and other current parts of the gnome desktop have a hardcoded dependency on libgl1-mesa-glx (or the virtual libgl1). This means the gnome desktop in 3.8 is NOT co-installable with nvidia graphics drivers, a situation this diversion was meant to prevent. The only fix is to re-run update-alternatives --configure glx, which re- replaces the symlink diversion however, if gnome is about to progress beyond experimental, it is likely this is about to become a critical pain point. I read bug 389971, on the reasons the nvidia-glx* packages don't directly provide libgl1, but it may be that unless the gnome team changes their libgl deps, this might be the only solution (or, alternatively, making the glx-alternatives packages provide libgl1?) It should be noted, that the nvidia alternative clearly *works*, however, making it so is pretty challenging. Info on my system as it stands at present: # dpkg --search /usr/lib/x86_64-linux-gnu/libGL.so.1 diversion by glx-diversions from: /usr/lib/x86_64-linux-gnu/libGL.so.1 diversion by glx-diversions to: /usr/lib/mesa-diverted/x86_64-linux- gnu/libGL.so.1 libgl1-mesa-glx:amd64: /usr/lib/x86_64-linux-gnu/libGL.so.1 # dpkg --remove libgl1-mesa-glx:amd64 dpkg: dependency problems prevent removal of libgl1-mesa-glx:amd64: gnome-session-bin depends on libgl1-mesa-glx | libgl1; however: Package libgl1-mesa-glx:amd64 is to be removed. Package libgl1 is not installed. Package libgl1-mesa-glx:amd64 which provides libgl1 is to be removed. libvisual-0.4-plugins:amd64 depends on libgl1-mesa-glx | libgl1; however: Package libgl1-mesa-glx:amd64 is to be removed. Package libgl1 is not installed. Package libgl1-mesa-glx:amd64 which provides libgl1 is to be removed. libglew1.7:amd64 depends on libgl1-mesa-glx | libgl1; however: Package libgl1-mesa-glx:amd64 is to be removed. Package libgl1 is not installed. Package libgl1-mesa-glx:amd64 which provides libgl1 is to be removed. enblend depends on libgl1-mesa-glx | libgl1; however: Package libgl1-mesa-glx:amd64 is to be removed. Package libgl1 is not installed. Package libgl1-mesa-glx:amd64 which provides libgl1 is to be removed. mplayer depends on libgl1-mesa-glx | libgl1; however: Package libgl1-me dpkg: error processing libgl1-mesa-glx:amd64 (--remove): dependency problems - not removing Errors were encountered while processing: libgl1-mesa-glx:amd64 Thanks Christian -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (501, 'unstable'), (499, 'testing'), (399, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.8-trunk-amd64 (SMP w/8 CPU cores) Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#704915: auctex: Fails to install
Package: auctex Version: 11.85-1 Severity: grave Justification: renders package unusable Debian Squeeze AMD64. The package in subject fails to install (fresh install). This is the output from terminal: # LC_ALL=C aptitude install auctex The following NEW packages will be installed: auctex 0 packages upgraded, 1 newly installed, 0 to remove and 0 not upgraded. Need to get 0 B/1305 kB of archives. After unpacking 4678 kB will be used. Preconfiguring packages ... Selecting previously deselected package auctex. (Reading database ... 254909 files and directories currently installed.) Unpacking auctex (from .../auctex_11.85-1_all.deb) ... Processing triggers for install-info ... Processing triggers for man-db ... Processing triggers for doc-base ... Processing 2 added doc-base file(s)... Registering documents with scrollkeeper... Setting up auctex (11.85-1) ... install/auctex: Setting up for emacs23 (log file: /usr/share/emacs23/site- lisp/auctex//CompilationLog)... emacs-package-install: /usr/lib/emacsen- common/packages/install/auctex emacs23 emacs23 failed at /usr/lib/emacsen- common/emacs-package-install line 30, TSORT line 1. dpkg: error processing auctex (--configure): subprocess installed post-installation script returned error exit status 1 configured to not write apport reports Errors were encountered while processing: auctex E: Sub-process /usr/bin/dpkg returned an error code (1) A package failed to install. Trying to recover: Setting up auctex (11.85-1) ... install/auctex: Setting up for emacs23 (log file: /usr/share/emacs23/site- lisp/auctex//CompilationLog)... emacs-package-install: /usr/lib/emacsen- common/packages/install/auctex emacs23 emacs23 failed at /usr/lib/emacsen- common/emacs-package-install line 30, TSORT line 1. dpkg: error processing auctex (--configure): subprocess installed post-installation script returned error exit status 1 Errors were encountered while processing: auctex Thank you very much in advance, Domenico -- Package-specific info: Content of '/usr/share/emacs/site-lisp/auctex/' 4445a5aa5b0c6dd4eeb5d6a7b214b9a7 /usr/share/emacs/site-lisp/auctex/ChangeLog 7a5ac7b2ea13114a7237cad95ce9e127 /usr/share/emacs/site-lisp/auctex/Makefile 94b8353848c014c5aad9e29b149ff931 /usr/share/emacs/site-lisp/auctex/Makefile.in f86b3412ef7d2947d5ab37ab13f2200d /usr/share/emacs/site-lisp/auctex/aclocal.m4 c515b501a8d5009537edfb0348d3f14e /usr/share/emacs/site-lisp/auctex/auctex.el e23e60e9de6051db5156aecaaaea11e7 /usr/share/emacs/site-lisp/auctex/auctex.el.in 3366a99dd44e27fa57e0bcc130c4fa1c /usr/share/emacs/site-lisp/auctex/bib-cite.el 542b9f88e6d102b497e17c104de7568a /usr/share/emacs/site-lisp/auctex/confdefs.h 683dbf2998518f1d182da52f12bd1d63 /usr/share/emacs/site-lisp/auctex/config.log dbb7f49fb883815b70b880b1c047d6b7 /usr/share/emacs/site-lisp/auctex/config.status 8f868ec2c03618542b54b36547f83afd /usr/share/emacs/site-lisp/auctex/configure 9ad8e6370c812d9a54f4b76b7b6ccfcd /usr/share/emacs/site-lisp/auctex/configure.ac bc74f7b5fa3e81249059523bda2af187 /usr/share/emacs/site-lisp/auctex/context-en.el 7e5fea718848deb6b66d2f2050c4c4d9 /usr/share/emacs/site-lisp/auctex/context-nl.el 66cdeaf725eadcbd25f55cefa4fdce88 /usr/share/emacs/site-lisp/auctex/context.el 2b11f4f8c3a4189bf7cc8fec5a51e8c0 /usr/share/emacs/site-lisp/auctex/doc/Makefile 2b11f4f8c3a4189bf7cc8fec5a51e8c0 /usr/share/emacs/site-lisp/auctex/doc/Makefile.in 6f9d9372928534a7b6549aca174f026e /usr/share/emacs/site-lisp/auctex/font-latex.el f176261b5a5511cbe1401ee72ffb8947 /usr/share/emacs/site-lisp/auctex/images/amstex.xpm d33121019448617a3ad3bcafdeb8db40 /usr/share/emacs/site-lisp/auctex/images/bibtex.xpm 1a43d6438010bceb374ab0a5f2bd05a8 /usr/share/emacs/site-lisp/auctex/images/dropdown.xpm 41f1ae0341ae2e307d92a7b8b815f868 /usr/share/emacs/site-lisp/auctex/images/dvipdf.xpm 2e4b8669b0168f32247411be3f999437 /usr/share/emacs/site-lisp/auctex/images/dvips.xpm 55f7600cadc3a209e94bacf6bbc42a7c /usr/share/emacs/site-lisp/auctex/images/error.xpm c29ad797273fd27201a40bd939a95fe0 /usr/share/emacs/site-lisp/auctex/images/exec.xpm 79b958849511c67d6b13ef9f5b3673e8 /usr/share/emacs/site-lisp/auctex/images/execbibtex.xpm a8570e26e9f96b6f527cdbe218d6c55f /usr/share/emacs/site-lisp/auctex/images/execdvips.xpm e647bc601aef2dc71b134a989df1adff /usr/share/emacs/site-lisp/auctex/images/execerror.xpm 4610ec6133f89ceb441c43dfee077361 /usr/share/emacs/site-lisp/auctex/images/execpdftex.xpm c9cd1fc9fe4fd122cbf900fae654a67b /usr/share/emacs/site-lisp/auctex/images/exectex.xpm 6a6b9af945d4735f048ea8e475f8d9b8 /usr/share/emacs/site-lisp/auctex/images/execviewdvi.xpm 466466f6d1867510b058a9c184ffce5d /usr/share/emacs/site-lisp/auctex/images/execviewpdf.xpm 39d8ccaffb40b0c118e000f45272db05
Bug#704914: glx-alternatives: The libGL diversion does not work
Control: reassign -1 glx-diversions 0.2.90 Control: tag -1 moreinfo On 2013-04-07 17:43, Christian Weeks wrote: There is a severe problem with the libGL diversion strategy as exists at present. The desktop is rendered inoperable after any change in the packaging, due to the diversion in glx-diversions being replaced by the actual lib from libgl1-mesa-glx. This is because gnome- session-bin and other current parts of the gnome desktop have a hardcoded dependency on libgl1-mesa-glx (or the virtual libgl1). I'm sorry, but what exactly is the problem you experienced? The only fix is to re-run update-alternatives --configure glx, which re- replaces the symlink diversion however, if gnome is about to progress beyond experimental, it is likely this is about to become a critical pain point. So what is broken before this command and fixed afterwards? # dpkg --remove libgl1-mesa-glx:amd64 and why would you want to do that? Unfortunately you reported this against the source package, so no scripts were run that could collect additional information. I've reassigned this bug to the glx-diversions package, please run reportbug -N 704914 on the *broken* system, that should collect some helpful information. Andreas -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#704914: glx-alternatives: The libGL diversion does not work
Processing control commands: reassign -1 glx-diversions 0.2.90 Bug #704914 [src:glx-alternatives] glx-alternatives: The libGL diversion does not work Bug reassigned from package 'src:glx-alternatives' to 'glx-diversions'. No longer marked as found in versions glx-alternatives/0.2.90. Ignoring request to alter fixed versions of bug #704914 to the same values previously set Bug #704914 [glx-diversions] glx-alternatives: The libGL diversion does not work Marked as found in versions glx-alternatives/0.2.90. tag -1 moreinfo Bug #704914 [glx-diversions] glx-alternatives: The libGL diversion does not work Added tag(s) moreinfo. -- 704914: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704914 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#704914: glx-alternatives: The libGL diversion does not work
On 07/04/13 12:17 PM, Andreas Beckmann wrote: Control: reassign -1 glx-diversions 0.2.90 Control: tag -1 moreinfo On 2013-04-07 17:43, Christian Weeks wrote: There is a severe problem with the libGL diversion strategy as exists at present. The desktop is rendered inoperable after any change in the packaging, due to the diversion in glx-diversions being replaced by the actual lib from libgl1-mesa-glx. This is because gnome- session-bin and other current parts of the gnome desktop have a hardcoded dependency on libgl1-mesa-glx (or the virtual libgl1). I'm sorry, but what exactly is the problem you experienced? libGL is brokenly referring to the libgl from mesa whereas it should be referring to the libGL from the nvidia packages. This breaks the gnome desktop. Gnome shell fails to start with an error, or any gnome application fails to launch, as the link is gone, replaced by the actual lib from that libgl-mesa-glx package. This affects almost all desktop applications that are linked against gnome. This is with the current gnome 3.8 environment in experimental. The only fix is to re-run update-alternatives --configure glx, which re- replaces the symlink diversion however, if gnome is about to progress beyond experimental, it is likely this is about to become a critical pain point. So what is broken before this command and fixed afterwards? Before: (This is reset after almost any packaging change on the system): The link to libGL isn't a link to the diversions anymore. It is a link to somewhere else: # ls -l /usr/lib/x86_64-linux-gnu/libGL.so.1 lrwxrwxrwx 1 root root 14 Apr 7 11:36 /usr/lib/x86_64-linux-gnu/libGL.so.1 - libGL.so.1.2.0 # ls -l /usr/lib/x86_64-linux-gnu/libGL.so.1.2.0 -rw-r--r-- 1 root root 414328 Dec 29 22:24 /usr/lib/x86_64-linux-gnu/libGL.so.1.2.0 # dpkg --search /usr/lib/x86_64-linux-gnu/libGL.so.1.2.0 libgl1-mesa-glx:amd64: /usr/lib/x86_64-linux-gnu/libGL.so.1.2.0 Running the command: # update-alternatives --config glx There is only one alternative in link group glx (providing /usr/lib/glx): /usr/lib/nvidia Nothing to configure. update-alternatives: warning: forcing reinstallation of alternative /usr/lib/nvidia because link group glx is broken After: # ls -l /usr/lib/x86_64-linux-gnu/libGL.so.1 lrwxrwxrwx 1 root root 50 Apr 7 12:23 /usr/lib/x86_64-linux-gnu/libGL.so.1 - /etc/alternatives/glx--libGL.so.1-x86_64-linux-gnu If I do not run this command, after any package installation or update, Gnome is completely broken, because mesa isn't functional on this system, because it is using the NVIDIA libraries. # dpkg --remove libgl1-mesa-glx:amd64 and why would you want to do that? Because it's the wrong thing for this system? It keeps replacing the nvidia GL with it's own? But I added it here because it shows how the libgl1 virtual dependency has crept from the base packages into the gnome packages. Unfortunately you reported this against the source package, so no scripts were run that could collect additional information. I've reassigned this bug to the glx-diversions package, please run reportbug -N 704914 on the *broken* system, that should collect some helpful information. Acknowledged. That'll be run forthwith. Andreas -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#704914: glx-diversions: More system information
Package: glx-diversions Version: 0.2.90 Followup-For: Bug #704914 Data from reportbug -- Package-specific info: Diversions: diversion of /usr/lib/i386-linux-gnu/libGL.so to /usr/lib/mesa-diverted/i386-linux-gnu/libGL.so by glx-diversions diversion of /usr/lib/i386-linux-gnu/libGL.so.1 to /usr/lib/mesa-diverted/i386-linux-gnu/libGL.so.1 by glx-diversions diversion of /usr/lib/i386-linux-gnu/libGL.so.1.2 to /usr/lib/mesa-diverted/i386-linux-gnu/libGL.so.1.2 by glx-diversions diversion of /usr/lib/libGL.so to /usr/lib/mesa-diverted/libGL.so by glx-diversions diversion of /usr/lib/libGL.so.1 to /usr/lib/mesa-diverted/libGL.so.1 by glx-diversions diversion of /usr/lib/libGL.so.1.2 to /usr/lib/mesa-diverted/libGL.so.1.2 by glx-diversions diversion of /usr/lib/x86_64-linux-gnu/libGL.so to /usr/lib/mesa-diverted/x86_64-linux-gnu/libGL.so by glx-diversions diversion of /usr/lib/x86_64-linux-gnu/libGL.so.1 to /usr/lib/mesa-diverted/x86_64-linux-gnu/libGL.so.1 by glx-diversions diversion of /usr/lib/x86_64-linux-gnu/libGL.so.1.2 to /usr/lib/mesa-diverted/x86_64-linux-gnu/libGL.so.1.2 by glx-diversions diversion of /usr/lib32/libGL.so to /usr/lib32/nvidia/diversions/libGL.so by libgl1-nvidia-alternatives-ia32 diversion of /usr/lib32/libGL.so.1 to /usr/lib32/nvidia/diversions/libGL.so.1 by libgl1-nvidia-alternatives-ia32 diversion of /usr/lib32/libGL.so.1.2 to /usr/lib32/nvidia/diversions/libGL.so.1.2 by libgl1-nvidia-alternatives-ia32 /usr/lib/mesa-diverted: total 64 drwxr-xr-x 4 root root 4096 Oct 1 2012 . drwxr-xr-x 236 root root 49152 Apr 7 11:36 .. drwxr-xr-x 2 root root 4096 Mar 18 12:30 i386-linux-gnu drwxr-xr-x 2 root root 4096 Mar 18 12:31 x86_64-linux-gnu /usr/lib/mesa-diverted/i386-linux-gnu/: total 8 drwxr-xr-x 2 root root 4096 Mar 18 12:30 . drwxr-xr-x 4 root root 4096 Oct 1 2012 .. lrwxrwxrwx 1 root root 14 Dec 29 23:03 libGL.so.1 - libGL.so.1.2.0 /usr/lib/mesa-diverted/x86_64-linux-gnu/: total 8 drwxr-xr-x 2 root root 4096 Mar 18 12:31 . drwxr-xr-x 4 root root 4096 Oct 1 2012 .. lrwxrwxrwx 1 root root 14 Dec 29 22:24 libGL.so - libGL.so.1.6.0 lrwxrwxrwx 1 root root 14 Dec 29 22:24 libGL.so.1 - libGL.so.1.2.0 Alternative 'glx': glx - auto mode link currently points to /usr/lib/nvidia /usr/lib/nvidia - priority 100 slave glx--libGL.so.1-i386-linux-gnu: /usr/lib/i386-linux-gnu/nvidia/libGL.so.1 slave glx--libGL.so.1-x86_64-linux-gnu: /usr/lib/x86_64-linux-gnu/nvidia/libGL.so.1 slave glx--libnvidia-cfg.so.1-i386-linux-gnu: /usr/lib/i386-linux-gnu/nvidia/libnvidia-cfg.so.1 slave glx--libnvidia-cfg.so.1-x86_64-linux-gnu: /usr/lib/x86_64-linux-gnu/nvidia/libnvidia-cfg.so.1 slave glx--linux-libglx.so: /usr/lib/nvidia/libglx.so slave glx--nvidia-blacklists-nouveau.conf: /etc/nvidia/nvidia-blacklists-nouveau.conf slave glx--nvidia-bug-report.sh: /usr/lib/nvidia/nvidia-bug-report.sh slave glx--nvidia_drv.so: /usr/lib/nvidia/nvidia_drv.so Current 'best' version is '/usr/lib/nvidia'. lrwxrwxrwx 1 root root 15 Apr 7 12:23 /etc/alternatives/glx - /usr/lib/nvidia lrwxrwxrwx 1 root root 41 Apr 7 12:23 /etc/alternatives/glx--libGL.so.1-i386-linux-gnu - /usr/lib/i386-linux-gnu/nvidia/libGL.so.1 lrwxrwxrwx 1 root root 43 Apr 7 12:23 /etc/alternatives/glx--libGL.so.1-x86_64-linux-gnu - /usr/lib/x86_64-linux-gnu/nvidia/libGL.so.1 lrwxrwxrwx 1 root root 49 Apr 7 12:23 /etc/alternatives/glx--libnvidia-cfg.so.1-i386-linux-gnu - /usr/lib/i386-linux-gnu/nvidia/libnvidia-cfg.so.1 lrwxrwxrwx 1 root root 51 Apr 7 12:23 /etc/alternatives/glx--libnvidia-cfg.so.1-x86_64-linux-gnu - /usr/lib/x86_64-linux-gnu/nvidia/libnvidia-cfg.so.1 lrwxrwxrwx 1 root root 25 Apr 7 12:23 /etc/alternatives/glx--linux-libglx.so - /usr/lib/nvidia/libglx.so lrwxrwxrwx 1 root root 42 Apr 7 12:23 /etc/alternatives/glx--nvidia-blacklists-nouveau.conf - /etc/nvidia/nvidia-blacklists-nouveau.conf lrwxrwxrwx 1 root root 36 Apr 7 12:23 /etc/alternatives/glx--nvidia-bug-report.sh - /usr/lib/nvidia/nvidia-bug-report.sh lrwxrwxrwx 1 root root 29 Apr 7 12:23 /etc/alternatives/glx--nvidia_drv.so - /usr/lib/nvidia/nvidia_drv.so File System: lrwxrwxrwx 1 root root 21 Apr 7 09:54 /usr/lib/glx - /etc/alternatives/glx lrwxrwxrwx 1 root root 48 Apr 7 12:23 /usr/lib/i386-linux-gnu/libGL.so.1 - /etc/alternatives/glx--libGL.so.1-i386-linux-gnu -rw-r--r-- 1 root root 387532 Dec 29 23:03 /usr/lib/i386-linux-gnu/libGL.so.1.2.0 lrwxrwxrwx 1 root root 50 Apr 7 12:23 /usr/lib/x86_64-linux-gnu/libGL.so.1 - /etc/alternatives/glx--libGL.so.1-x86_64-linux-gnu -rw-r--r-- 1 root root 414328 Dec 29 22:24 /usr/lib/x86_64-linux-gnu/libGL.so.1.2.0 -rw-r--r-- 1 root root 431600 Feb 23 09:57 /usr/lib/xorg/modules/extensions/libglx.so -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (501, 'unstable'), (499, 'testing'), (399, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.8-trunk-amd64 (SMP w/8 CPU cores) Locale:
Bug#704647: krb5: rdns=false does not work
It looks like this patch is redundant with what's actually pending. I think all I need to do is upload the tip of master. If I missed anything let me know. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#704876: hothasktags: FTBFS: cabal: Command not found
Hi Joey, Am Samstag, den 06.04.2013, 21:55 -0400 schrieb Aaron M. Ucko: Builds of hothasktags in minimal environments, as on the autobuilders, have been failing: cabal clean make[1]: cabal: Command not found make[1]: *** [override_dh_auto_clean] Error 127 Could you please declare a build dependency on cabal-install and confirm with pbuilder or the like that no others were missing? it seems you are trying to build a cabal package without haskell-devscripts. I know you are the author of debhelper, but is there any other reason? In the next version of haskell-devscripts even supports the installation of cabal-built binaries in a declarative way, i.e. without modifying debian/rules. I can upload 0.8.14 if you want to use it for hothasktags. If you want to avoid cdbs, I’d be happy to see dh support Haskell, but it should use the same building steps as haskell-devscripts now, I’d think. Also, I don’t think we should ever use cabal in the packaging scripts, it would be similar to using aptitude instead of dpkg when building packages. Just use the Setup.lhs in every package. Greetings, Joachim -- Joachim nomeata Breitner Debian Developer nome...@debian.org | ICQ# 74513189 | GPG-Keyid: 4743206C JID: nome...@joachim-breitner.de | http://people.debian.org/~nomeata signature.asc Description: This is a digitally signed message part
Bug#704914: glx-alternatives: The libGL diversion does not work
Control: severity -1 wishlist Control: retitle -1 does not divert libGL.so.1.2.0 from mesa 9.0.1-1 On 2013-04-07 18:26, Christian Weeks wrote: Before: (This is reset after almost any packaging change on the system): The link to libGL isn't a link to the diversions anymore. It is a link to somewhere else: # ls -l /usr/lib/x86_64-linux-gnu/libGL.so.1 lrwxrwxrwx 1 root root 14 Apr 7 11:36 /usr/lib/x86_64-linux-gnu/libGL.so.1 - libGL.so.1.2.0 # ls -l /usr/lib/x86_64-linux-gnu/libGL.so.1.2.0 -rw-r--r-- 1 root root 414328 Dec 29 22:24 /usr/lib/x86_64-linux-gnu/libGL.so.1.2.0 # dpkg --search /usr/lib/x86_64-linux-gnu/libGL.so.1.2.0 libgl1-mesa-glx:amd64: /usr/lib/x86_64-linux-gnu/libGL.so.1.2.0 This is not the Debian libgl1-mesa-glx. That would contain /usr/lib/x86_64-linux-gnu/libGL.so.1.2 which is properly diverted. On 2013-04-07 18:30, Christian Weeks wrote: Versions of packages glx-diversions is related to: ii libgl1-mesa-glx [libgl1] 9.0.1-1 Exactly :-) $ rmadison --arch amd64 libgl1-mesa-glx libgl1-mesa-glx | 7.7.1-5 | squeeze | amd64 libgl1-mesa-glx | 7.10.3-4~bpo60+1 | squeeze-backports | amd64 libgl1-mesa-glx | 8.0.5-4 | wheezy| amd64 libgl1-mesa-glx | 8.0.5-4 | sid | amd64 Andreas -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#704914: glx-alternatives: The libGL diversion does not work
Processing control commands: severity -1 wishlist Bug #704914 [glx-diversions] glx-alternatives: The libGL diversion does not work Severity set to 'wishlist' from 'grave' retitle -1 does not divert libGL.so.1.2.0 from mesa 9.0.1-1 Bug #704914 [glx-diversions] glx-alternatives: The libGL diversion does not work Changed Bug title to 'does not divert libGL.so.1.2.0 from mesa 9.0.1-1' from 'glx-alternatives: The libGL diversion does not work' -- 704914: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704914 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#704647: marked as done (krb5: rdns=false does not work)
Your message dated Sun, 07 Apr 2013 17:03:14 + with message-id e1uoszq-0004xj...@franck.debian.org and subject line Bug#704647: fixed in krb5 1.10.1+dfsg-5 has caused the Debian Bug report #704647, regarding krb5: rdns=false does not work to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 704647: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704647 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: krb5 Version: 1.10.1+dfsg-3 Severity: wishlist User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu raring Dear Maintainer, This bug report was also filed in Ubuntu and can be found at http://launchpad.net/bugs/1095757 The description, from nomike, follows: There is a bug within eglibc [1] and [2] which breaks kerberos authentication functionality for ssh-servers behind NAT gateways as glibc does a rDNS cannonicalization of hostnames even if you specify rdns=false in krb5.conf. There is a workaround implemented in MIT krb5 v. 1.10.2. [3]. The current maintenance release is 1.10.3. As the bug is still not fixed in eglibc, krb5 should be updated to at least 1.10.3 to fix this issue. [1] https://bugzilla.redhat.com/show_bug.cgi?id=714823 [2] https://bugs.launchpad.net/ubuntu/+source/eglibc/+bug/1057526 [3] http://krbdev.mit.edu/rt/Ticket/Display.html?id=7124 -- System Information: Debian Release: wheezy/sid APT prefers raring-updates APT policy: (500, 'raring-updates'), (500, 'raring-security'), (500, 'raring'), (100, 'raring-backports') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.7.0-7-generic (SMP w/1 CPU core) ---End Message--- ---BeginMessage--- Source: krb5 Source-Version: 1.10.1+dfsg-5 We believe that the bug you reported is fixed in the latest version of krb5, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 704...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Benjamin Kaduk ka...@mit.edu (supplier of updated krb5 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 05 Apr 2013 14:36:50 -0400 Source: krb5 Binary: krb5-user krb5-kdc krb5-kdc-ldap krb5-admin-server krb5-multidev libkrb5-dev libkrb5-dbg krb5-pkinit krb5-doc libkrb5-3 libgssapi-krb5-2 libgssrpc4 libkadm5srv-mit8 libkadm5clnt-mit8 libk5crypto3 libkdb5-6 libkrb5support0 krb5-gss-samples krb5-locales Architecture: source all amd64 Version: 1.10.1+dfsg-5 Distribution: unstable Urgency: high Maintainer: Sam Hartman hartm...@debian.org Changed-By: Benjamin Kaduk ka...@mit.edu Description: krb5-admin-server - MIT Kerberos master server (kadmind) krb5-doc - Documentation for MIT Kerberos krb5-gss-samples - MIT Kerberos GSS Sample applications krb5-kdc - MIT Kerberos key server (KDC) krb5-kdc-ldap - MIT Kerberos key server (KDC) LDAP plugin krb5-locales - Internationalization support for MIT Kerberos krb5-multidev - Development files for MIT Kerberos without Heimdal conflict krb5-pkinit - PKINIT plugin for MIT Kerberos krb5-user - Basic programs to authenticate using MIT Kerberos libgssapi-krb5-2 - MIT Kerberos runtime libraries - krb5 GSS-API Mechanism libgssrpc4 - MIT Kerberos runtime libraries - GSS enabled ONCRPC libk5crypto3 - MIT Kerberos runtime libraries - Crypto Library libkadm5clnt-mit8 - MIT Kerberos runtime libraries - Administration Clients libkadm5srv-mit8 - MIT Kerberos runtime libraries - KDC and Admin Server libkdb5-6 - MIT Kerberos runtime libraries - Kerberos database libkrb5-3 - MIT Kerberos runtime libraries libkrb5-dbg - Debugging files for MIT Kerberos libkrb5-dev - Headers and development libraries for MIT Kerberos libkrb5support0 - MIT Kerberos runtime libraries - Support library Closes: 703457 704647 704775 Changes: krb5 (1.10.1+dfsg-5) unstable; urgency=high . * Import workaround for getaddrinfo bug from upstream. Described in upstream's RT 7124, Closes: #704647 * Correct CVE number for CVE-2012-1016 in changelog and patches, Closes: #703457 * Import upstream's fix for CVE-2013-1416, Closes: #704775 Checksums-Sha1: 96c8b1bae8895213219f4ba35f71c601b4369e92 2287 krb5_1.10.1+dfsg-5.dsc
Bug#704775: marked as done (krb5: KDC TGS-REQ null deref (CVE-2013-1416))
Your message dated Sun, 07 Apr 2013 17:03:14 + with message-id e1uoszq-0004xp...@franck.debian.org and subject line Bug#704775: fixed in krb5 1.10.1+dfsg-5 has caused the Debian Bug report #704775, regarding krb5: KDC TGS-REQ null deref (CVE-2013-1416) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 704775: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704775 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: krb5-kdc Version: 1.10.1+dfsg-4+nmu1 Severity: serious Upstream has patched against CVE-2013-1416; Debian should as well. By sending an unusual but valid TGS-REQ, an authenticated remote attacker can cause the KDC process to crash by dereferencing a null pointer. Only krb5 releases 1.7 to 1.10 are affected; the code in question was rewritten for 1.11. ---End Message--- ---BeginMessage--- Source: krb5 Source-Version: 1.10.1+dfsg-5 We believe that the bug you reported is fixed in the latest version of krb5, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 704...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Benjamin Kaduk ka...@mit.edu (supplier of updated krb5 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 05 Apr 2013 14:36:50 -0400 Source: krb5 Binary: krb5-user krb5-kdc krb5-kdc-ldap krb5-admin-server krb5-multidev libkrb5-dev libkrb5-dbg krb5-pkinit krb5-doc libkrb5-3 libgssapi-krb5-2 libgssrpc4 libkadm5srv-mit8 libkadm5clnt-mit8 libk5crypto3 libkdb5-6 libkrb5support0 krb5-gss-samples krb5-locales Architecture: source all amd64 Version: 1.10.1+dfsg-5 Distribution: unstable Urgency: high Maintainer: Sam Hartman hartm...@debian.org Changed-By: Benjamin Kaduk ka...@mit.edu Description: krb5-admin-server - MIT Kerberos master server (kadmind) krb5-doc - Documentation for MIT Kerberos krb5-gss-samples - MIT Kerberos GSS Sample applications krb5-kdc - MIT Kerberos key server (KDC) krb5-kdc-ldap - MIT Kerberos key server (KDC) LDAP plugin krb5-locales - Internationalization support for MIT Kerberos krb5-multidev - Development files for MIT Kerberos without Heimdal conflict krb5-pkinit - PKINIT plugin for MIT Kerberos krb5-user - Basic programs to authenticate using MIT Kerberos libgssapi-krb5-2 - MIT Kerberos runtime libraries - krb5 GSS-API Mechanism libgssrpc4 - MIT Kerberos runtime libraries - GSS enabled ONCRPC libk5crypto3 - MIT Kerberos runtime libraries - Crypto Library libkadm5clnt-mit8 - MIT Kerberos runtime libraries - Administration Clients libkadm5srv-mit8 - MIT Kerberos runtime libraries - KDC and Admin Server libkdb5-6 - MIT Kerberos runtime libraries - Kerberos database libkrb5-3 - MIT Kerberos runtime libraries libkrb5-dbg - Debugging files for MIT Kerberos libkrb5-dev - Headers and development libraries for MIT Kerberos libkrb5support0 - MIT Kerberos runtime libraries - Support library Closes: 703457 704647 704775 Changes: krb5 (1.10.1+dfsg-5) unstable; urgency=high . * Import workaround for getaddrinfo bug from upstream. Described in upstream's RT 7124, Closes: #704647 * Correct CVE number for CVE-2012-1016 in changelog and patches, Closes: #703457 * Import upstream's fix for CVE-2013-1416, Closes: #704775 Checksums-Sha1: 96c8b1bae8895213219f4ba35f71c601b4369e92 2287 krb5_1.10.1+dfsg-5.dsc c4c35fd67f163ed82cb1426e05854eb2bbbcbadb 135076 krb5_1.10.1+dfsg-5.debian.tar.gz 5140d04910eb7903a07f6409214cdf53dec4337f 2668656 krb5-doc_1.10.1+dfsg-5_all.deb a5fe28590d87acc3b6cc1f95714ac828c9f165d4 1502290 krb5-locales_1.10.1+dfsg-5_all.deb 7f788cdebfc288a6fa6bba1602d8bb9046fc379f 153590 krb5-user_1.10.1+dfsg-5_amd64.deb bc79a3ae0868e8ea8e6ff773c53cefafe167bb55 224496 krb5-kdc_1.10.1+dfsg-5_amd64.deb 3949c4adff4140439a3d237e07e12e0a402a05d5 119982 krb5-kdc-ldap_1.10.1+dfsg-5_amd64.deb 9dff1602d65cb2a8804bad82ac0c9e23a3e97926 121756 krb5-admin-server_1.10.1+dfsg-5_amd64.deb 6825190576a7d7c8478f6d4c003a9b6b3173485a 153444 krb5-multidev_1.10.1+dfsg-5_amd64.deb 91eff6975c7e88c791952e9996ef2efa2e7c2d37 39762 libkrb5-dev_1.10.1+dfsg-5_amd64.deb 8249b60cae4400b5317a02ceec55b46fe031e5b7 2203582
Processed: limit source to krb5, tagging 703457, tagging 704775
Processing commands for cont...@bugs.debian.org: #krb5 (1.10.1+dfsg-5) unstable; urgency=high # # * Correct CVE number for CVE-2012-1016 in changelog and patches, Closes: ##703457 # * Import upstream's fix for CVE-2013-1416, Closes: #704775 # limit source krb5 Limiting to bugs with field 'source' containing at least one of 'krb5' Limit currently set to 'source':'krb5' tags 703457 + pending Bug #703457 {Done: Benjamin Kaduk ka...@mit.edu} [src:krb5] krb5: fix retrospectively CVE entry in 1.10.1+dfsg-4+nmu1 and patch name Added tag(s) pending. tags 704775 + pending Bug #704775 {Done: Benjamin Kaduk ka...@mit.edu} [krb5-kdc] krb5: KDC TGS-REQ null deref (CVE-2013-1416) Added tag(s) pending. thanks Stopping processing here. Please contact me if you need assistance. -- 703457: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=703457 704775: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704775 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#704876: hothasktags: FTBFS: cabal: Command not found
Joachim Breitner wrote: If you want to avoid cdbs, I’d be happy to see dh support Haskell, but it should use the same building steps as haskell-devscripts now, I’d think. I don't know if it's worth putting in the time to make debhelper support haskell library packages, but it certianly makes sense for it to automatically handle packages that simply build binaries from a cabal file. I hope to see an increasing number of such packages in Debian. -- see shy jo signature.asc Description: Digital signature
Bug#704876: marked as done (hothasktags: FTBFS: cabal: Command not found)
Your message dated Sun, 07 Apr 2013 17:47:34 + with message-id e1uotgk-00078z...@franck.debian.org and subject line Bug#704876: fixed in hothasktags 0.3.1-1 has caused the Debian Bug report #704876, regarding hothasktags: FTBFS: cabal: Command not found to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 704876: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704876 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: hothasktags Version: 0.3.0-1 Severity: serious Justification: fails to build from source Builds of hothasktags in minimal environments, as on the autobuilders, have been failing: cabal clean make[1]: cabal: Command not found make[1]: *** [override_dh_auto_clean] Error 127 Could you please declare a build dependency on cabal-install and confirm with pbuilder or the like that no others were missing? Thanks! ---End Message--- ---BeginMessage--- Source: hothasktags Source-Version: 0.3.1-1 We believe that the bug you reported is fixed in the latest version of hothasktags, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 704...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Joey Hess jo...@debian.org (supplier of updated hothasktags package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sun, 07 Apr 2013 13:32:05 -0400 Source: hothasktags Binary: hothasktags Architecture: source i386 Version: 0.3.1-1 Distribution: unstable Urgency: low Maintainer: Debian Haskell Group pkg-haskell-maintain...@lists.alioth.debian.org Changed-By: Joey Hess jo...@debian.org Description: hothasktags - Haskell ctags generator Closes: 704876 Changes: hothasktags (0.3.1-1) unstable; urgency=low . * New upstream release. * Avoid running cabal in the build process; among other problems cabal writes to $HOME. Closes: #704876 Checksums-Sha1: b45cc84bc095769c3c5f306c944a5d239cfae3bd 1971 hothasktags_0.3.1-1.dsc cf6d23dcf4df364aefdddeda154d72ccabcab876 4377 hothasktags_0.3.1.orig.tar.gz ddf8e7d15fc357b43062a0fa085121194edf59c9 2200 hothasktags_0.3.1-1.diff.gz 926bd1d19a56dc8e09a156ee54f306623f6616a2 1349434 hothasktags_0.3.1-1_i386.deb Checksums-Sha256: 2bbf6659a11f49eb23a0903580c97c4a261314b1753f5462928606537105aba2 1971 hothasktags_0.3.1-1.dsc 6bce99bd91b76c1850a1cd1a6eec029a63fcd0554c6c8f1e9fca6ebc31b545f3 4377 hothasktags_0.3.1.orig.tar.gz 2d95232bf5da43c524f319c40f5643cbc31ce2aef63c07d49b91aababedc 2200 hothasktags_0.3.1-1.diff.gz 6b46f4df4696e11c3beacbca0cd3247c9547256956aa1ab0c0af8c0326002e88 1349434 hothasktags_0.3.1-1_i386.deb Files: f325cf5c508347fdae49dfee2c5f9f8d 1971 net optional hothasktags_0.3.1-1.dsc e4cde70444b03fc8e69cd4d326680351 4377 net optional hothasktags_0.3.1.orig.tar.gz 9a40d552bad0afd28eb4b998243a1886 2200 net optional hothasktags_0.3.1-1.diff.gz b7fe812254193362b18d7d380472a2dd 1349434 net optional hothasktags_0.3.1-1_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQIVAwUBUWGua8kQ2SIlEuPHAQgq7BAAj+DOErM42rUz5qQ4Hpnf4DRSEbq0MakJ O3jyPsV2lZyLalZynTF7ox38WkaJD42Eb8U39gvlZqoeNMExnG6IMoHLhnv2rFOv X7QMi6swuI0QkNUab7Hg83aN09gpdeGH76pct2Oc5dCAlKmOfmIVr5GYg0PqSc2Q pRNojpmVP+4XeDMQiTBKEGvhSuDnhk/N0v5gKMSeACadJ4S2Aj/Cbh8bYoxnaOmM q8sTle6OJPbZVDrydwjydN+mb5DNievRE9ZaWK0m5LyB8tkWvZAUX2juIky3FHjk pP8HGBjpjnxrKgXOlaJKPc6+RLf472Ywce7YMJ3gUWTZxnPcFcPnbEkXr2ufq/GB +WJ9JS82BxTO3JjKysFT9/HZGQsDtAFRmJCPrU8EX1ETKWgKYAxyxmUYIWYumZqB UuXPrjTcOuJcP6D2vHJnRSkVWx438FwRbQhiGBOx4Lvy/uy4gf3OA5LwlH4Ol+T3 2AUYiD36VpFJNW53uM06hs/ZG9HihFLszASoeNmZ8xlSpdozIMP9rVbUUcN3y9MN e0t3ldRe5lC8RrpvABrR+5ID1j1TPOMFQZypyhvL6aUxEqs1ScabfXSg5Ngo2j+c by7ShDWstk/LZaxFg7qXw+ML8JKNxstFrfrp4Sk7se22O0sa2RqQjCpxWJ32c/rk DQXzgZ6U1sw= =oSCi -END PGP SIGNATUREEnd Message---
Bug#704876: [Pkg-haskell-maintainers] Bug#704876: hothasktags: FTBFS: cabal: Command not found
Hi, Am Sonntag, den 07.04.2013, 13:40 -0400 schrieb Joey Hess: Joachim Breitner wrote: If you want to avoid cdbs, I’d be happy to see dh support Haskell, but it should use the same building steps as haskell-devscripts now, I’d think. I don't know if it's worth putting in the time to make debhelper support haskell library packages, but it certianly makes sense for it to automatically handle packages that simply build binaries from a cabal file. I hope to see an increasing number of such packages in Debian. I don’t think that there is such a big difference there. The commands called are the same (compile Setup.*hs, configure, build, install with --destdir), and the library-sepecifc stuff is already in dh_haskell_* commands that should go well with dh. OTOH thinks work well now, so there is no pressing need to change the running system. Greetings, Joachim -- Joachim nomeata Breitner Debian Developer nome...@debian.org | ICQ# 74513189 | GPG-Keyid: 4743206C JID: nome...@joachim-breitner.de | http://people.debian.org/~nomeata signature.asc Description: This is a digitally signed message part
Bug#704876: marked as done (hothasktags: FTBFS: cabal: Command not found)
Hi, --- a/debian/rules +++ b/debian/rules @@ -2,14 +2,16 @@ %: dh $@ +export CABAL=runghc Setup.lhs + This does not work well on architectures without ghci support. Not sure if any of the dependencies of hothasktags prevent these architectures anyways, but this is not a general solution either. I don’t think there is a good way to avoid having to compile Setup first. (One might argue that on such architectures, runghc should compile to a temporary location. But I’m not sure that we want such differing behavior depending on the architectures). Greetings, Joachim -- Joachim nomeata Breitner Debian Developer nome...@debian.org | ICQ# 74513189 | GPG-Keyid: 4743206C JID: nome...@joachim-breitner.de | http://people.debian.org/~nomeata signature.asc Description: This is a digitally signed message part
Bug#704484: Upgrading from Squeeze to Wheezy breaks proftpd
mod_vroot used to be in proftpd-basic in squeeze, it's moved to a separate package in wheezy. and to be honest I would avoid to add proftpd-mod-vroot as a strict dependency. It is an optional (and experimental) module and the problem would be simply resolved by installing it by hand after a dist-upgrade. -- Francesco P. Lovergine -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#704704: Acknowledgement (incompatible with iceweasel 20.0)
[Please CC the bug submitter in your reply, if you expected them to answer] FWIW, a simple recompilation against xulrunner 20.0 was sufficient to make the extension work again, so requesting a binNMU could be all that is needed. That said, I still think it's a bug, that an upgrade of xulrunner/iceweasel breaks the extension without apt preventing that situation. Cheers, Michael -- Why is it that all of the instruments seeking intelligent life in the universe are pointed away from Earth? signature.asc Description: OpenPGP digital signature
Bug#704647: krb5: rdns=false does not work
On Sun, Apr 7, 2013 at 12:33 PM, Sam Hartman wrote: It looks like this patch is redundant with what's actually pending. I think all I need to do is upload the tip of master. If I missed anything let me know. That is correct. I was going to cancel the nmu, but it looks like Benjamin just did an upload. Best wishes, Mike -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: severity of 704154 is important
Processing commands for cont...@bugs.debian.org: severity 704154 important Bug #704154 [vdr] vdr - Fails if started without any of CAP_SYS_TIME, CAP_SYS_NICE or CAP_NET_RAW Severity set to 'important' from 'serious' thanks Stopping processing here. Please contact me if you need assistance. -- 704154: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704154 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#704114: asterisk: asterisk security advisories: AST-2013-001 / AST-2013-002 / AST-2013-003
Hi Tzafrir On Sat, Apr 06, 2013 at 03:25:20PM +0300, Tzafrir Cohen wrote: Update: AST-2013-001 (CVE-2013-2685): Not applicable to either Stable or Testing/Unstable: new code not included yet even in 1.8. AST-2013-002 (CVE-2013-2686): Applies to Testing/Unstable but not to Stable: Testing/Unstable: see patch from Upstream. Stable: httpd code does not read HTTP POST variables. AST-2013-003 (CVE-2013-2264): Applies to both Testing and Unstable. Testing/Unstable: see patch from Upstream. Stable: Patch backported. For Unstable/Testing I include two other simple bug fixes. Both trivial backports from later 1.8.x reevisions. Thanks a lot for your updated information. I have updated according to this and the closing version in unstable the security tracker. [Btw, I think there where two typos for the CVE's in the latest changelog for unstable, which might be worth fixing in a future upload to unstable (only to keep the references correct, should have been CVE-2013-2686 and CVE-2013-2264).] Thanks for your work! Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#704931: chroot_cleanup should not unmount /proc
Package: src:debian-installer-utils Severity: serious For a reason unknown to me, helpers like in-target and apt-install, by way of chroot_setup and chroot_cleanup, might actually cause /target/proc to be unmounted. This then breaks grub-install. Arguably, commit 795bfde of grub-installer hacks around this problem, when actually I don't think there is any reason why /target/proc (or /target/sys, etc.) should ever be unmounted before it's time to unmount the /target tree. In my case, I was experimenting with preseeding when suddenly, grub-install failed. The reason was a missing /target/proc. Thinking that /target/proc should not have been unmounted, I used the console to chdir() to it, thereby causing umount to fail. Here is what syslog documented: Apr 7 15:05:07 in-target: Setting up popularity-contest (1.56) ... Apr 7 15:05:08 pkgsel: umount: can't umount /target/proc: Device or resource busy Apr 7 15:05:08 /bin/in-target: warning: Unable to umount '/target/proc' Apr 7 15:05:08 in-target: (Reading database ...· Apr 7 15:05:08 in-target: 14789 files and directories currently installed.) Apr 7 15:05:08 in-target: Removing popularity-contest ... Apr 7 15:05:08 in-target: Purging configuration files for popularity-contest ... Later, I used network-console and a while loop to track the state of /proc/mounts and I found that /target/proc randomly appeared and disappeared. By the time grub-install is run, it isn't present. I don't know whether the above, popcon-associated instance of umount is at fault, but I do question why /target/proc ever gets unmounted. The version of d-i I am using doesn't have Steve's commit yet, so grub-install just fails. I can reproduce this, I can even give network-console access to the host I am using for testing, and stand by on IRC for debugging. It's a KVM instance provisioned by virt-install and preseeded, so it's trivial to work with… -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.8-trunk-amd64 (SMP w/4 CPU cores) Locale: LANG=en_NZ, LC_CTYPE=en_NZ.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- .''`. martin f. krafft madduck@d.o Related projects: : :' : proud Debian developer http://debiansystem.info `. `'` http://people.debian.org/~madduckhttp://vcs-pkg.org `- Debian - when you have better things to do than fixing systems digital_signature_gpg.asc Description: Digital signature (see http://martin-krafft.net/gpg/sig-policy/999bbcc4/current)
Bug#704931: chroot_cleanup should not unmount /proc
Control: severity -1 normal martin f krafft madd...@debian.org (07/04/2013): Package: src:debian-installer-utils Severity: serious For a reason unknown to me, helpers like in-target and apt-install, by way of chroot_setup and chroot_cleanup, might actually cause /target/proc to be unmounted. This then breaks grub-install. Arguably, commit 795bfde of grub-installer hacks around this problem, when actually I don't think there is any reason why /target/proc (or /target/sys, etc.) should ever be unmounted before it's time to unmount the /target tree. In my case, I was experimenting with preseeding when suddenly, grub-install failed. The reason was a missing /target/proc. Thinking that /target/proc should not have been unmounted, I used the console to chdir() to it, thereby causing umount to fail. Here is what syslog documented: […] The version of d-i I am using doesn't have Steve's commit yet, so grub-install just fails. AFAICT you're the only one having such an issue with the mount/umount dance (it might be suboptimal as far as “performances” are concerned, but that's certainly not serious); having that issue with grub-installer, which already got a fix-or-workaround in the meanwhile, makes me think it's nowhere like a serious bug. Downgrading accordingly. Mraw, KiBi. signature.asc Description: Digital signature
Processed: Re: Bug#704931: chroot_cleanup should not unmount /proc
Processing control commands: severity -1 normal Bug #704931 [src:debian-installer-utils] chroot_cleanup should not unmount /proc Severity set to 'normal' from 'serious' -- 704931: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704931 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: system hangs when initializing primary video card (3.2.39-2 - 3.2.41-2 regression)
Processing commands for cont...@bugs.debian.org: # Stepan Golosunov wrote: # # Severity: grave # Justification: renders package unusable # # True, on affected systems. # # regression, hardware support severity 704933 important Bug #704933 [linux-image-3.2.0-4-amd64] linux-image-3.2.0-4-amd64:amd64: system hangs when initializing primary video card (3.2.39-2 - 3.2.41-2 regression) Severity set to 'important' from 'grave' End of message, stopping processing here. Please contact me if you need assistance. -- 704933: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704933 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: severity of 704935 is important
Processing commands for cont...@bugs.debian.org: severity 704935 important Bug #704935 [src:mypaint] mypaint: FTBFS with DEB_BUILD_OPTIONS=noopt Severity set to 'important' from 'serious' thanks Stopping processing here. Please contact me if you need assistance. -- 704935: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704935 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#704936: openmpi1.6: FTBFS: inconsistency in debian/libopenmpi1.6.install
Source: openmpi1.6 Version: 1.6.4-1 Severity: serious Tags: patch sid Justification: FTBFS There is inconsistency in debian/libopenmpi1.6.install. Patch is attached. Regards, -- Hiroyuki Yamamoto A75D B285 7050 4BF9 AEDA 91AC 3A10 59C6 5203 04DC diff -Nurd openmpi1.6-1.6.4.orig/debian/libopenmpi1.6.install openmpi1.6-1.6.4/debian/libopenmpi1.6.install --- openmpi1.6-1.6.4.orig/debian/libopenmpi1.6.install 2013-02-22 18:35:48.0 +0900 +++ openmpi1.6-1.6.4/debian/libopenmpi1.6.install 2013-04-07 22:04:22.0 +0900 @@ -8,93 +8,6 @@ usr/lib/openmpi/lib/libopen-pal.so.4.0.4 usr/lib/openmpi/lib/libopen-rte.so.4.0.3 ## Plugins -usr/lib/openmpi/lib/openmpi/libompi_dbg_msgq.so -usr/lib/openmpi/lib/openmpi/mca_allocator_basic.so -usr/lib/openmpi/lib/openmpi/mca_allocator_bucket.so -usr/lib/openmpi/lib/openmpi/mca_bml_r2.so -usr/lib/openmpi/lib/openmpi/mca_btl_ofud.so -usr/lib/openmpi/lib/openmpi/mca_btl_openib.so -usr/lib/openmpi/lib/openmpi/mca_btl_self.so -usr/lib/openmpi/lib/openmpi/mca_btl_sm.so -usr/lib/openmpi/lib/openmpi/mca_btl_tcp.so -usr/lib/openmpi/lib/openmpi/mca_carto_auto_detect.so -usr/lib/openmpi/lib/openmpi/mca_carto_file.so -usr/lib/openmpi/lib/openmpi/mca_coll_basic.so -usr/lib/openmpi/lib/openmpi/mca_coll_hierarch.so -usr/lib/openmpi/lib/openmpi/mca_coll_inter.so -usr/lib/openmpi/lib/openmpi/mca_coll_self.so -usr/lib/openmpi/lib/openmpi/mca_coll_sm.so -usr/lib/openmpi/lib/openmpi/mca_coll_sync.so -usr/lib/openmpi/lib/openmpi/mca_coll_tuned.so -usr/lib/openmpi/lib/openmpi/mca_crcp_bkmrk.so -usr/lib/openmpi/lib/openmpi/mca_crs_blcr.so -usr/lib/openmpi/lib/openmpi/mca_crs_none.so -usr/lib/openmpi/lib/openmpi/mca_crs_self.so -usr/lib/openmpi/lib/openmpi/mca_dpm_orte.so -usr/lib/openmpi/lib/openmpi/mca_errmgr_default.so -usr/lib/openmpi/lib/openmpi/mca_ess_env.so -usr/lib/openmpi/lib/openmpi/mca_ess_hnp.so -usr/lib/openmpi/lib/openmpi/mca_ess_singleton.so -usr/lib/openmpi/lib/openmpi/mca_ess_slave.so -usr/lib/openmpi/lib/openmpi/mca_ess_slurmd.so -usr/lib/openmpi/lib/openmpi/mca_ess_slurm.so -usr/lib/openmpi/lib/openmpi/mca_ess_tm.so -usr/lib/openmpi/lib/openmpi/mca_ess_tool.so -usr/lib/openmpi/lib/openmpi/mca_filem_rsh.so -usr/lib/openmpi/lib/openmpi/mca_grpcomm_bad.so -usr/lib/openmpi/lib/openmpi/mca_grpcomm_basic.so -usr/lib/openmpi/lib/openmpi/mca_iof_hnp.so -usr/lib/openmpi/lib/openmpi/mca_iof_orted.so -usr/lib/openmpi/lib/openmpi/mca_iof_tool.so -usr/lib/openmpi/lib/openmpi/mca_maffinity_first_use.so -usr/lib/openmpi/lib/openmpi/mca_maffinity_hwloc.so -usr/lib/openmpi/lib/openmpi/mca_mpool_fake.so -usr/lib/openmpi/lib/openmpi/mca_mpool_rdma.so -usr/lib/openmpi/lib/openmpi/mca_mpool_sm.so -usr/lib/openmpi/lib/openmpi/mca_notifier_command.so -usr/lib/openmpi/lib/openmpi/mca_notifier_syslog.so -usr/lib/openmpi/lib/openmpi/mca_odls_default.so -usr/lib/openmpi/lib/openmpi/mca_oob_tcp.so -usr/lib/openmpi/lib/openmpi/mca_osc_pt2pt.so -usr/lib/openmpi/lib/openmpi/mca_osc_rdma.so -usr/lib/openmpi/lib/openmpi/mca_paffinity_hwloc.so -usr/lib/openmpi/lib/openmpi/mca_plm_rsh.so -usr/lib/openmpi/lib/openmpi/mca_plm_slurm.so -usr/lib/openmpi/lib/openmpi/mca_plm_tm.so -usr/lib/openmpi/lib/openmpi/mca_pml_bfo.so -usr/lib/openmpi/lib/openmpi/mca_pml_cm.so -usr/lib/openmpi/lib/openmpi/mca_pml_crcpw.so -usr/lib/openmpi/lib/openmpi/mca_pml_csum.so -usr/lib/openmpi/lib/openmpi/mca_pml_ob1.so -usr/lib/openmpi/lib/openmpi/mca_pml_v.so -usr/lib/openmpi/lib/openmpi/mca_pstat_linux.so -usr/lib/openmpi/lib/openmpi/mca_pubsub_orte.so -usr/lib/openmpi/lib/openmpi/mca_ras_cm.so -usr/lib/openmpi/lib/openmpi/mca_ras_gridengine.so -usr/lib/openmpi/lib/openmpi/mca_ras_loadleveler.so -usr/lib/openmpi/lib/openmpi/mca_ras_slurm.so -usr/lib/openmpi/lib/openmpi/mca_ras_tm.so -usr/lib/openmpi/lib/openmpi/mca_rcache_vma.so -usr/lib/openmpi/lib/openmpi/mca_rmaps_load_balance.so -usr/lib/openmpi/lib/openmpi/mca_rmaps_rank_file.so -usr/lib/openmpi/lib/openmpi/mca_rmaps_resilient.so -usr/lib/openmpi/lib/openmpi/mca_rmaps_round_robin.so -usr/lib/openmpi/lib/openmpi/mca_rmaps_seq.so -usr/lib/openmpi/lib/openmpi/mca_rmaps_topo.so -usr/lib/openmpi/lib/openmpi/mca_rml_ftrm.so -usr/lib/openmpi/lib/openmpi/mca_rml_oob.so -usr/lib/openmpi/lib/openmpi/mca_routed_binomial.so -usr/lib/openmpi/lib/openmpi/mca_routed_cm.so -usr/lib/openmpi/lib/openmpi/mca_routed_direct.so -usr/lib/openmpi/lib/openmpi/mca_routed_linear.so -usr/lib/openmpi/lib/openmpi/mca_routed_radix.so -usr/lib/openmpi/lib/openmpi/mca_routed_slave.so -usr/lib/openmpi/lib/openmpi/mca_shmem_mmap.so -usr/lib/openmpi/lib/openmpi/mca_shmem_posix.so -usr/lib/openmpi/lib/openmpi/mca_shmem_sysv.so -usr/lib/openmpi/lib/openmpi/mca_snapc_full.so -usr/lib/openmpi/lib/openmpi/mca_sysinfo_linux.so -usr/lib/openmpi/lib/openmpi/mca_topo_unity.so -usr/lib/openmpi/lib/openmpi/mca_vprotocol_pessimist.so +usr/lib/openmpi/lib/openmpi/*.so ## Other files usr/lib/openmpi/lib/mpi.mod diff -Nurd openmpi1.6-1.6.4.orig/debian/libopenmpi1.6.install.armel
Processed: your mail
Processing commands for cont...@bugs.debian.org: tag 683188 patch Bug #683188 [python-subversion] API change in python-subversion breaks trac Added tag(s) patch. thanks Stopping processing here. Please contact me if you need assistance. -- 683188: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683188 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#704744: pbuilder: umounts /{dev,run}/shm of the *host* system
reopen 704744 thanks Okay, I just run “sudo env DIST=sid cowbuilder --create” and it happened again. I micro-tested this and can point out where: First, debootstrap (via pbuilder --create) runs. Then debootstrap finishes, and additional magic occurs: I: Configuring dpkg-dev... I: Configuring build-essential... I know at this point /dev/shm/* files still are present. I: Base system installed successfully. I: debootstrap finished I: copying local configuration I: Installing apt-lines I: Refreshing the base.tgz I: upgrading packages I: mounting /proc filesystem I: mounting /run/shm filesystem I believe it is at *this* point where the bug is. I: mounting /dev/pts filesystem I: installing dummy policy-rc.d Hit http://ftp.hosteurope.de sid Release.gpg I know that, at this point, my /run/shm is empty (umounted). bye, //mirabilos -- 13:37⎜«Natureshadow» Deep inside, I hate mirabilos. I mean, he's a good guy. But he's always right! In every fsckin' situation, he's right. Even with his deeply perverted taste in software and borked ambition towards broken OSes - in the end, he's damn right about it :(! […] works in mksh -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: pbuilder: umounts /{dev,run}/shm of the *host* system
Processing commands for cont...@bugs.debian.org: reopen 704744 Bug #704744 {Done: Junichi Uekawa dan...@netfort.gr.jp} [pbuilder] pbuilder: umounts /{dev,run}/shm of the *host* system Bug reopened Ignoring request to alter fixed versions of bug #704744 to the same values previously set thanks Stopping processing here. Please contact me if you need assistance. -- 704744: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704744 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#704915: auctex: Fails to install
control: fixed -1 11.86-11 It's surprising that this went unnoticed for so long in squeeze. But anyway, I just did an auctex install in a clean wheezy chroot, and it went fine. So, I've marked the current version in wheezy as fixed (since that is the version I tested), but this problem was likely fixed much earlier. Best wishes, Mike -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: re: auctex: Fails to install
Processing control commands: fixed -1 11.86-11 Bug #704915 [auctex] auctex: Fails to install Marked as fixed in versions auctex/11.86-11. -- 704915: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704915 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#704744: pbuilder: umounts /{dev,run}/shm of the *host* system
reassign 704744 debootstrap found 704744 debootstrap/1.0.48 retitle 704744 debootstrap: umounts /{dev,run}/shm of the *host* system thanks Dixi quod… Okay, I just run “sudo env DIST=sid cowbuilder --create” and it happened again. I micro-tested this and can point out where: Nevermind, it’s debootstrap not pbuilder. I changed to include “set -x”, run “mount | fgrep shm” using the DEBUG trap, and commented out the call to debootstrap as I had it already… and it kept my shm. Turns out this looks like being the culprit: tglase@tglase:~ $ fgrep -ri shm /usr/share/debootstrap/* /usr/share/debootstrap/functions: umount_on_exit /dev/shm The problem here is: lrwxrwxrwx 1 root root 8 Apr 8 01:03 /var/cache/pbuilder/base.cow-sid/dev/shm - /run/shm/ The symlink is then, of course, followed. Reassigning this RC bug to debootstrap thusly. Sorry folks, but this does break unrelated software. My idea to fix this is: Move the “umount_on_exit /dev/shm” line away from /usr/share/debootstrap/functions and into the files under /usr/share/debootstrap/scripts/ and then change it to use /run/shm from wheezy onwards (this also involves breaking up the symlink from etch, etch-m68k, lenny, oldstable, squeeze and stable to sid, and then, for the wheezy release, reintroducing the symlink from stable to sid). Unless you’ve got a better one, that is. bye, //mirabilos -- Natureshadow Oh, ich hab mim Bauch Mittelklick gemacht, als ich nach dem Kaffee gegriffen habe… mirabilos Cool, ich hab ne neue eMail-Signatur Natureshadow Sag doch sowas nich, wenn ich den Kaffee in der Hand habe! Gib mir nen Lappen! Schnell! Das kommt aber nicht mit in die Signatur! -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#704744: pbuilder: umounts /{dev,run}/shm of the *host* system
Processing commands for cont...@bugs.debian.org: reassign 704744 debootstrap Bug #704744 [pbuilder] pbuilder: umounts /{dev,run}/shm of the *host* system Bug reassigned from package 'pbuilder' to 'debootstrap'. No longer marked as found in versions pbuilder/0.215. Ignoring request to alter fixed versions of bug #704744 to the same values previously set found 704744 debootstrap/1.0.48 Bug #704744 [debootstrap] pbuilder: umounts /{dev,run}/shm of the *host* system Marked as found in versions debootstrap/1.0.48. retitle 704744 debootstrap: umounts /{dev,run}/shm of the *host* system Bug #704744 [debootstrap] pbuilder: umounts /{dev,run}/shm of the *host* system Changed Bug title to 'debootstrap: umounts /{dev,run}/shm of the *host* system' from 'pbuilder: umounts /{dev,run}/shm of the *host* system' thanks Stopping processing here. Please contact me if you need assistance. -- 704744: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704744 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#704940: subversion: cve-2013-1845 cve-2013-1846 cve-2013-1847 cve-2013-1849 cve-2013-1884
package: src:subversion severity: serious version: 1.6.12dfsg-1 tag: security The following security advisories were published for subversion. I've checked, and all versions of subversion in debian are affected. http://subversion.apache.org/security/CVE-2013-1845-advisory.txt http://subversion.apache.org/security/CVE-2013-1846-advisory.txt http://subversion.apache.org/security/CVE-2013-1847-advisory.txt http://subversion.apache.org/security/CVE-2013-1849-advisory.txt http://subversion.apache.org/security/CVE-2013-1884-advisory.txt Best wishes, Mike -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#704669: marked as done (kdelibs-bin: unable to install kdelibs-bin=4:4.10.2-1 due to issues with kdelibs4c2a)
Your message dated Mon, 08 Apr 2013 00:48:36 + with message-id e1up0gc-0004xx...@franck.debian.org and subject line Bug#704669: fixed in kde4libs 4:4.10.2-2 has caused the Debian Bug report #704669, regarding kdelibs-bin: unable to install kdelibs-bin=4:4.10.2-1 due to issues with kdelibs4c2a to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 704669: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704669 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: kdelibs-bin Version: 4:4.9.5-0r1 Justification: renders package unusable Severity: grave Dear Maintainer, Please change the severity of the bug depending on what is/would be right. Anyways I tried installing the latest kdelibs-bin and got caught with this :- $ sudo aptitude install kdelibs-bin=4:4.10.2-1 libnepomukcore4=4:4.10.2-1 -y The following packages will be upgraded: kdelibs-bin libnepomukcore4 The following partially installed packages will be configured: kdelibs5-dev kdelibs5-plugins nepomuk-core-runtime 2 packages upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Need to get 0 B/475 kB of archives. After unpacking 43.0 kB will be used. The following packages have unmet dependencies: libnepomuksync4 : Depends: libnepomukcore4 (= 4:4.9.5-0r0) but 4:4.10.2-1 is to be installed. The following actions will resolve these dependencies: Remove the following packages: 1) libnepomuksync4 The following packages will be REMOVED: libnepomuksync4{a} The following packages will be upgraded: kdelibs-bin libnepomukcore4 The following partially installed packages will be configured: kdelibs5-dev kdelibs5-plugins nepomuk-core-runtime 2 packages upgraded, 0 newly installed, 1 to remove and 0 not upgraded. Need to get 0 B/475 kB of archives. After unpacking 106 kB will be freed. Retrieving bug reports... Done Parsing Found/Fixed information... Done (Reading database ... 550290 files and directories currently installed.) Preparing to replace kdelibs-bin 4:4.9.5-0r1 (using .../kdelibs-bin_4%3a4.10.2-1_amd64.deb) ... D01: process_archive oldversionstatus=installed Unpacking replacement kdelibs-bin ... dpkg: error processing /var/cache/apt/archives/kdelibs-bin_4%3a4.10.2-1_amd64.deb (--unpack): trying to overwrite '/usr/bin/ktelnetservice', which is also in package kdelibs4c2a 4:3.5.10.dfsg.1-5 dpkg-deb: error: subprocess paste was killed by signal (Broken pipe) Errors were encountered while processing: /var/cache/apt/archives/kdelibs-bin_4%3a4.10.2-1_amd64.deb adequate: skipping kdelibs5-dev because it's not installed adequate: skipping kdelibs5-plugins because it's not installed adequate: skipping nepomuk-core-runtime because it's not installed dpkg-query: no packages found matching kdeutils dpkg-query: no packages found matching libxcb-damage0:amd64 dpkg-query: no packages found matching libakonadi-calendar4:amd64 dpkg-query: no packages found matching libkalarmcal2:amd64 dpkg-query: no packages found matching libkactivities-models1:amd64 dpkg-query: no packages found matching libnepomukwidgets4:amd64 dpkg-query: no packages found matching libkmbox4:amd64 dpkg-query: no packages found matching libakonadi-notes4:amd64 dpkg-query: no packages found matching qtchooser:amd64 dpkg-query -W: failed at /usr/bin/adequate line 165. E: Problem executing scripts DPkg::Post-Invoke 'adequate --help /dev/null 21 || exit 0; DEBIAN_FRONTEND=readline exec adequate --debconf --user nobody --pending' E: Sub-process returned an error code E: Sub-process /usr/bin/dpkg returned an error code (1) A package failed to install. Trying to recover: dpkg: dependency problems prevent configuration of kdelibs5-plugins: kdelibs5-plugins depends on kdelibs-bin (= 4:4.10.2-1); however: Version of kdelibs-bin on system is 4:4.9.5-0r1. dpkg: error processing kdelibs5-plugins (--configure): dependency problems - leaving unconfigured dpkg: dependency problems prevent configuration of nepomuk-core-runtime: nepomuk-core-runtime depends on libnepomukcore4 (= 4:4.10.2-1); however: Version of libnepomukcore4 on system is 4:4.9.5-0r0. dpkg: error processing nepomuk-core-runtime (--configure): dependency problems - leaving unconfigured dpkg: dependency problems prevent configuration of kdelibs5-dev: kdelibs5-dev depends on kdelibs-bin (= 4:4.10.2-1); however: Version of kdelibs-bin on system is 4:4.9.5-0r1. dpkg: error processing kdelibs5-dev (--configure): dependency problems - leaving unconfigured Errors were encountered while processing: kdelibs5-plugins nepomuk-core-runtime kdelibs5-dev Looking at the
Bug#704775: krb5: KDC TGS-REQ null deref (CVE-2013-1416)
On Sat, 6 Apr 2013, Michael Gilbert wrote: I'm not seeing any new kerberos releases: http://web.mit.edu/kerberos/krb5-1.10 Current Kerberos Security Team policy is to not issue security advisories for null pointer dereference crashes. We assign CVE numbers for tracking, but do not delay publishing a fix until a new point release is available. Is this perhaps not meant to be public knowledge yet? The patch is intentionally public. Note that a user must be authenticated in order to trigger the crash. -Ben -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#690128: marked as done (inn2: conffile disappearing during squeeze-wheezy upgrade: /etc/news/motd.news)
Your message dated Mon, 08 Apr 2013 03:32:43 + with message-id e1up2p1-0002up...@franck.debian.org and subject line Bug#690128: fixed in inn2 2.5.3-2 has caused the Debian Bug report #690128, regarding inn2: conffile disappearing during squeeze-wheezy upgrade: /etc/news/motd.news to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 690128: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690128 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: inn2 Version: 2.5.3-1 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Hi, during a test with piuparts I noticed your package deletes a conffile during the upgrade from squeeze to wheezy, debsums reports an error afterwards: 1m24.8s ERROR: FAIL: debsums reports modifications inside the chroot: debsums: missing file /etc/news/motd.news (from inn2 package) I couldn't find the deletion in the maintainer scripts, so it's probably done by something something that is run from the maintainer scripts. As the wheezy package no longer ships this file as a conffile, this looks like an intentional deletion, but to do this properly and record it in dpkg's database accordingly, please use dpkg-maintscript-helper rm_conffile (ideally via debian/inn2.maintscript). Andreas inn2_2.5.3-1.log.gz Description: GNU Zip compressed data ---End Message--- ---BeginMessage--- Source: inn2 Source-Version: 2.5.3-2 We believe that the bug you reported is fixed in the latest version of inn2, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 690...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Marco d'Itri m...@linux.it (supplier of updated inn2 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 07 Apr 2013 21:43:24 +0200 Source: inn2 Binary: inn2 inn2-lfs inn2-inews inn2-dev Architecture: source i386 Version: 2.5.3-2 Distribution: unstable Urgency: low Maintainer: Marco d'Itri m...@linux.it Changed-By: Marco d'Itri m...@linux.it Description: inn2 - 'InterNetNews' news server inn2-dev - libinn.a library, headers and man pages inn2-inews - NNTP client news injector, from InterNetNews (INN) inn2-lfs - 'InterNetNews' news server (LFS version) Closes: 685007 690128 Changes: inn2 (2.5.3-2) unstable; urgency=low . * Fixed the fix for #652733, which totally broke pgpverify. (Closes: #685007) * Handle upstream renaming of our conffile /etc/news/motd.news to non-conffile /etc/news/motd.nnrpd. If it has not been modified by the admin then just remove it. Patch courtesy of Nick Leverton. (Closes: #690128) Checksums-Sha1: c85bc9e34d658d817e8cec218560c805486914de 1221 inn2_2.5.3-2.dsc 61a88b3bd49fc63a39f23af916522cf0250226e2 27284 inn2_2.5.3-2.debian.tar.xz 00ff422c8eed96db0a1cc065b529a3330397fd67 4261090 inn2_2.5.3-2_i386.deb 597e84fde1708f81cf13eed34609ec420cfcc632 4356934 inn2-lfs_2.5.3-2_i386.deb 0d9768d1991f714f77f656b682fdf36140f521e0 158184 inn2-inews_2.5.3-2_i386.deb 5da223ee47fc6e6cb65d9abaef304789528d2739 323824 inn2-dev_2.5.3-2_i386.deb Checksums-Sha256: e3c0b601f66469709c0dc67fed38c9b2a43283a4a5e958db69ceac476662193a 1221 inn2_2.5.3-2.dsc 09d8e04392f5e40142d7beb5f41182ec403fafd893d714499a5793bf7a2a0344 27284 inn2_2.5.3-2.debian.tar.xz 585c971582a08a8228a454e808c63b01989c6044b048430db344f0be7e1ec56a 4261090 inn2_2.5.3-2_i386.deb 434b719b9107fa2ec7f9e7ec2158b762d9fe2be2d2d3cf5b53826defbf069157 4356934 inn2-lfs_2.5.3-2_i386.deb 0afc234c446ba757ec6f048af734fee0779e0a4e22e3bcb22fafec617a142747 158184 inn2-inews_2.5.3-2_i386.deb a12de8c4f527b2ab896bd9991c6c5abc5a542d224d59528112b28e1b22ff4fc4 323824 inn2-dev_2.5.3-2_i386.deb Files: fc5d8d8233d8b3b80e028927676d7818 1221 news extra inn2_2.5.3-2.dsc a4d7c87d787c83b747751cfc98380679 27284 news extra inn2_2.5.3-2.debian.tar.xz 00b261fd9ba9081bed9c507f79c8dc9a 4261090 news extra inn2_2.5.3-2_i386.deb 9573855382d0728631a54ab99dc7dcec 4356934 news extra inn2-lfs_2.5.3-2_i386.deb 80a3ac56a459ad7e4551bbe86a94ce59 158184 news extra inn2-inews_2.5.3-2_i386.deb 143195b8bc657aa823816d06fc7d 323824 devel extra inn2-dev_2.5.3-2_i386.deb -BEGIN PGP
Bug#704573: marked as done (libwebp: cve-2012-5127)
Your message dated Mon, 08 Apr 2013 04:03:08 + with message-id e1up3is-00049k...@franck.debian.org and subject line Bug#704573: fixed in libwebp 0.1.3-3+nmu1 has caused the Debian Bug report #704573, regarding libwebp: cve-2012-5127 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 704573: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704573 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: libwebp Severity: serious Version: 0.1.3-3 Tags: security Hi, the following vulnerability was published for libwebp. CVE-2012-5127[0]: | Integer overflow in Google Chrome before 23.0.1271.64 allows remote | attackers to cause a denial of service (out-of-bounds read) or | possibly have unspecified other impact via a crafted WebP image. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities Exposures) id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5127 http://security-tracker.debian.org/tracker/CVE-2012-5127 ---End Message--- ---BeginMessage--- Source: libwebp Source-Version: 0.1.3-3+nmu1 We believe that the bug you reported is fixed in the latest version of libwebp, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 704...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Michael Gilbert mgilb...@debian.org (supplier of updated libwebp package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Wed, 03 Apr 2013 02:54:20 + Source: libwebp Binary: libwebp-dev libwebp2 webp Architecture: source amd64 Version: 0.1.3-3+nmu1 Distribution: unstable Urgency: high Maintainer: Jeff Breidenbach j...@debian.org Changed-By: Michael Gilbert mgilb...@debian.org Description: libwebp-dev - Lossy compression of digital photographic images. libwebp2 - Lossy compression of digital photographic images. webp - Lossy compression of digital photographic images. Closes: 704573 Changes: libwebp (0.1.3-3+nmu1) unstable; urgency=high . * Non-maintainer upload by the Security Team. * Fix cve-2012-5127: integer overflows in src/dec/webp.c (closes: #704573). Checksums-Sha1: ed83641241d320bc3dfc0afac39f63d810955549 2547 libwebp_0.1.3-3+nmu1.dsc ed3e209c51c5954f52a509077a322c32a34cc7cd 3552 libwebp_0.1.3-3+nmu1.debian.tar.gz c9772f9085c62cce09e9249bfe63ecd3698cf66b 149714 libwebp-dev_0.1.3-3+nmu1_amd64.deb cc650d4f837223cad69c8d634829f408f0281d91 113976 libwebp2_0.1.3-3+nmu1_amd64.deb d738053b39511633cce3329900c800e815043532 28498 webp_0.1.3-3+nmu1_amd64.deb Checksums-Sha256: ad0d61554cfd51903ead08a4708d26a717dfbb798b726cf9cd5977b01c643d58 2547 libwebp_0.1.3-3+nmu1.dsc 992fafcfd1eff4c71922e0e59707a7cc1d24f493ac73cb0a25b140562b3e4b57 3552 libwebp_0.1.3-3+nmu1.debian.tar.gz 9c837512864884f5afbb2ea36e7eb21758ffecf0763b8996c0264671a79704af 149714 libwebp-dev_0.1.3-3+nmu1_amd64.deb f9467c3fa89086ed9f79e412ad54d407ac6bb941b5475775bf1bb16b68a1ac16 113976 libwebp2_0.1.3-3+nmu1_amd64.deb 9951fe6508ea3f18f03da37f81ba2634317f2d5ab80cf508d043e571d27e58dd 28498 webp_0.1.3-3+nmu1_amd64.deb Files: 31bd74268e6d7d8159142ec8e65ab5ac 2547 libs extra libwebp_0.1.3-3+nmu1.dsc bcf0e4990bc0af04d9f3282fd6e7a557 3552 libs extra libwebp_0.1.3-3+nmu1.debian.tar.gz 0e7498b0b1ece7c8e7cc2f3ef11bc491 149714 libdevel extra libwebp-dev_0.1.3-3+nmu1_amd64.deb 7c17b7c7310ae9b6989983cd90bbf417 113976 libs extra libwebp2_0.1.3-3+nmu1_amd64.deb e93fdd32bc9c6b0c219a46de09411e48 28498 graphics extra webp_0.1.3-3+nmu1_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQQcBAEBCAAGBQJRW6KmAAoJELjWss0C1vRzji4f/2C5/HYo0cODRLvOmBDmjAel /c2qJ3E9s46h27/29+wqsaEURQj7LsYXnd9kT3ZB9TBtF4633+7wsC9+B+r6cc5E YcoNgcMVVB15P/Sm3YbUwEUOo2+3tgRIi0486f9a3//S3g9jmiFWWaVmDjNHjs5W N36d7IHyuLjLVTU0x9HLmfJq7YYRHWt4sxxWaA8sbk0A5iXzEKSFrP9YXJQMs2Fa ZiWEyIJEg27AR7r2Dqq9j2Bo9fFls9uBdHdJMOdHFKUeQmC5aybJfs4u1i2L1Nv5 j8abq3sDO8SqmYN+OEvBE2nOdpE8U5nejHMq2TQt1+1CyQRAcrv5Wpv8CHb67ORc S5b5i4QP/mzjf45g+vX7DPqY6gGKIiIc+B7QrpqrwmYA8x6ly2ESjCezq5K4Lk/b gYYKd6uRy67Ny2eGxUW1AlA0nNA5nxYX99vxCwwtwwDcjCXWWO75Dp17ThxvocwY
Bug#690128: inn2: conffile disappearing during squeeze-wheezy upgrade: /etc/news/motd.news
Hi, I was looking at the inn2 upload for an unblock, but... On Wed, 2012-11-28 at 10:08 +, Nick Leverton wrote: Herewith the debdiff in the hope it makes reviewing easier - meant to append it previously, sorry. +dpkg-maintscript-helper rm_conffile /etc/news/motd.news 2.5.3-1~ package -- $@ That (and the other similar calls) is wrong. From dpkg-maintscript-helper(1): _package_ is the package name. If empty or omitted, the DPKG_MAINTSCRIPT_PACKAGE environment variable (as set by dpkg) will be used. Regards, Adam -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#704940: marked as done (subversion: cve-2013-1845 cve-2013-1846 cve-2013-1847 cve-2013-1849 cve-2013-1884)
Your message dated Mon, 8 Apr 2013 07:30:31 +0200 with message-id 20130408053031.GA25253@elende and subject line Re: Bug#704940: subversion: cve-2013-1845 cve-2013-1846 cve-2013-1847 cve-2013-1849 cve-2013-1884 has caused the Debian Bug report #704940, regarding subversion: cve-2013-1845 cve-2013-1846 cve-2013-1847 cve-2013-1849 cve-2013-1884 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 704940: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704940 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- package: src:subversion severity: serious version: 1.6.12dfsg-1 tag: security The following security advisories were published for subversion. I've checked, and all versions of subversion in debian are affected. http://subversion.apache.org/security/CVE-2013-1845-advisory.txt http://subversion.apache.org/security/CVE-2013-1846-advisory.txt http://subversion.apache.org/security/CVE-2013-1847-advisory.txt http://subversion.apache.org/security/CVE-2013-1849-advisory.txt http://subversion.apache.org/security/CVE-2013-1884-advisory.txt Best wishes, Mike ---End Message--- ---BeginMessage--- Source: subversion Source-Version: 1.7.9-1 Hi Mike, hi Peter On Sun, Apr 07, 2013 at 08:22:26PM -0400, Michael Gilbert wrote: The following security advisories were published for subversion. I've checked, and all versions of subversion in debian are affected. http://subversion.apache.org/security/CVE-2013-1845-advisory.txt http://subversion.apache.org/security/CVE-2013-1846-advisory.txt http://subversion.apache.org/security/CVE-2013-1847-advisory.txt http://subversion.apache.org/security/CVE-2013-1849-advisory.txt http://subversion.apache.org/security/CVE-2013-1884-advisory.txt Adding closing and version information to the bug, as these where fixed in subversion/1.7.9-1 upload. Peter are you working already also on the updates for Wheezy and Squeeze? Regards, Salvatore---End Message---