Bug#778555: icewm: fails to upgrade from 'sid' - trying to overwrite /usr/share/xsessions/icewm-session.desktop

2015-02-16 Thread Andreas Beckmann
Package: icewm
Version: 1.3.8+githubmod+20150214+d373d98-1
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package fails to upgrade from
'sid' to 'experimental'.
It installed fine in 'sid', then the upgrade to 'experimental' fails
because it tries to overwrite other packages files without declaring a
Breaks+Replaces relation.

See policy 7.6 at
https://www.debian.org/doc/debian-policy/ch-relationships.html#s-replaces

From the attached log (scroll to the bottom...):

  Preparing to unpack .../icewm_1.3.8+githubmod+20150214+d373d98-1_amd64.deb ...
  Unpacking icewm (1.3.8+githubmod+20150214+d373d98-1) over (1.3.8-2) ...
  dpkg: error processing archive 
/var/cache/apt/archives/icewm_1.3.8+githubmod+20150214+d373d98-1_amd64.deb 
(--unpack):
   trying to overwrite '/usr/share/xsessions/icewm-session.desktop', which is 
also in package icewm-common 1.3.8-2
  Preparing to unpack 
.../icewm-common_1.3.8+githubmod+20150214+d373d98-1_amd64.deb ...
  Unpacking icewm-common (1.3.8+githubmod+20150214+d373d98-1) over (1.3.8-2) ...
  Errors were encountered while processing:
   /var/cache/apt/archives/icewm_1.3.8+githubmod+20150214+d373d98-1_amd64.deb


cheers,

Andreas


icewm_1.3.8+githubmod+20150214+d373d98-1.log.gz
Description: application/gzip


Bug#778336: pastebinit: fails in the default configuration

2015-02-16 Thread Andrew Starr-Bochicchio
This could be fixed by fixing #760341 so that pastebinit defaults to
paste.debian.net The root cause of that is lsb-release doesn't support
Python 3, breaking the distro detection.

The attached patch works around that by using platform to detect the
distribution instead.

Thanks,

-- Andrew Starr-Bochicchio

   Ubuntu Developer https://launchpad.net/~andrewsomething
   Debian Developer http://qa.debian.org/developer.php?login=asb
   PGP/GPG Key ID: D53FDCB1
From c8d33415abf8d07b3b2bcb41bb088a03b882a7cb Mon Sep 17 00:00:00 2001
From: Andrew Starr-Bochicchio a...@debian.org
Date: Mon, 16 Feb 2015 12:45:05 -0500
Subject: [PATCH] detect_distro_with_python3.patch: Use platform instead of
 lsb_release to detect the distro as lsb_release is not available under Python
 3 (Closes: #760341). pastebinit will now default to using paste.debian.net on
 Debian (Closes: #778336).

---
 debian/changelog| 11 +++
 debian/patches/detect_distro_with_python3.patch | 15 +++
 debian/patches/series   |  1 +
 3 files changed, 27 insertions(+)
 create mode 100644 debian/patches/detect_distro_with_python3.patch

diff --git a/debian/changelog b/debian/changelog
index 7de6407..c2d3758 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,14 @@
+pastebinit (1.4-3.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * detect_distro_with_python3.patch: Use platform instead of
+lsb_release to detect the distro as lsb_release is not
+available under Python 3 (Closes: #760341). pastebinit
+will now default to using paste.debian.net on Debian
+(Closes: #778336).
+
+ -- Andrew Starr-Bochicchio a...@debian.org  Mon, 16 Feb 2015 12:40:55 -0500
+
 pastebinit (1.4-3) unstable; urgency=low
 
   * bump debhelper to version 9
diff --git a/debian/patches/detect_distro_with_python3.patch b/debian/patches/detect_distro_with_python3.patch
new file mode 100644
index 000..e0737c3
--- /dev/null
+++ b/debian/patches/detect_distro_with_python3.patch
@@ -0,0 +1,15 @@
+Index: pastebinit/pastebinit
+===
+--- pastebinit.orig/pastebinit	2015-02-16 12:37:04.434846203 -0500
 pastebinit/pastebinit	2015-02-16 12:39:22.709104460 -0500
+@@ -37,8 +37,8 @@
+ 
+ # Now try to override it with a distributor pastebin
+ try:
+-import lsb_release
+-release = lsb_release.get_distro_information()['ID'].lower()
++import platform
++release = platform.linux_distribution()[0].lower()
+ if release == 'debian':
+ defaultPB = http://paste.debian.net;
+ elif release == 'fedora':
diff --git a/debian/patches/series b/debian/patches/series
index 986704d..b17e68f 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -1,2 +1,3 @@
 upstream-r205_r201.patch
 increase_timeout.patch
+detect_distro_with_python3.patch
-- 
2.1.0



Processed: tagging 774748

2015-02-16 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 774748 + patch
Bug #774748 [ruby-redcloth] ruby-redcloth: CVE-2012-6684
Added tag(s) patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
774748: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774748
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#777540: The libhtp SONAME mismatch *is* a policy violation.

2015-02-16 Thread Julien Cristau
On Fri, Feb 13, 2015 at 22:13:21 +0100, Hilko Bengen wrote:

 control: severity -1 grave
 control: block 772551 by -1
 control: tag -1 patch
 
 In the current state of the libhtp source package, every new upstream
 release of changes the SONAME and thus requires that reverse
 dependencies (currently only suricata) are rebuilt. As long as the name
 of the binary package stays the same, eventual breakage is guaranteed,
 see #772551.
 
 The current state defeats the purpose of shared libraries and violates
 section 8.1 (Run-time shared libraries) of the Debian Policy Manual.
 
 I see three possible solutions:
 
 1. Override upstream's decision to change the SONAME with every release.
I am not entirelysure how stable libhtp's API/ABI should be
considered -- looking at changes and deciding on compatibility issues
making those decisions would certainly put a burden on the maintainer
in the future (although the .symbols mechanism helps for obvious
cases such as removed APIs.)
 
I am attaching a patch to drop the -release parameter from the
libtool call, libhtp.so.1.0.0 (instead of libhtp-0.5.15.so.1.0.0) is
generated. The .symbols file would need to be updated to reflect that
change, too, of course.
 
 2. Since suricata is the only reverse dependency of libhtp and contains
a copy of libhtp within its source tarball, so we could drop the
libhtp package altogether and use that embedded copy instead, at
least for the jessie release.
 
 3. Change the binary package name to reflect the SONAME -- for instance
libhtp-0.5.15. I believe that we are too late in the freeze to be
adding new binary package names.
 
For jessie, 2 sounds like the best way to go IMO.

Cheers,
Julien


signature.asc
Description: Digital signature


Processed: tagging 778336

2015-02-16 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 778336 + patch
Bug #778336 [pastebinit] pastebinit: fails in the default configuration
Added tag(s) patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
778336: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778336
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: tagging 777607

2015-02-16 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 777607 + patch
Bug #777607 [puppet-module-puppetlabs-postgresql] 
puppet-module-puppetlabs-postgresql: Module tries to install postgresql-9.3 on 
jessie and fails
Added tag(s) patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
777607: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777607
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#777607: puppet-module-puppetlabs-postgresql: Module tries to install postgresql-9.3 on jessie and fails

2015-02-16 Thread Andrew Starr-Bochicchio
Hi,

I can confirm that the upstream commit resolves the issue. The
attached patch backports it.

Thanks,

-- Andrew Starr-Bochicchio

   Ubuntu Developer https://launchpad.net/~andrewsomething
   Debian Developer http://qa.debian.org/developer.php?login=asb
   PGP/GPG Key ID: D53FDCB1
From 5a16c4afd05617763b584e79de21bb137978da7c Mon Sep 17 00:00:00 2001
From: Andrew Starr-Bochicchio a...@debian.org
Date: Mon, 16 Feb 2015 13:09:55 -0500
Subject: [PATCH] use_postgresql-9.4_on_jessie.patch: Backport upstream commit
 to correctly use postgresql 9.4 on Jessie (Closes: #777607).

---
 debian/changelog  |  8 ++
 debian/patches/series |  1 +
 debian/patches/use_postgresql-9.4_on_jessie.patch | 31 +++
 3 files changed, 40 insertions(+)
 create mode 100644 debian/patches/series
 create mode 100644 debian/patches/use_postgresql-9.4_on_jessie.patch

diff --git a/debian/changelog b/debian/changelog
index 2e35323..5be8118 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+puppet-module-puppetlabs-postgresql (4.0.0-1.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * use_postgresql-9.4_on_jessie.patch: Backport upstream commit
+to correctly use postgresql 9.4 on Jessie (Closes: #777607).
+
+ -- Andrew Starr-Bochicchio a...@debian.org  Mon, 16 Feb 2015 13:07:26 -0500
+
 puppet-module-puppetlabs-postgresql (4.0.0-1) unstable; urgency=medium
 
   * Imported upstream relase 4.0.0
diff --git a/debian/patches/series b/debian/patches/series
new file mode 100644
index 000..479d051
--- /dev/null
+++ b/debian/patches/series
@@ -0,0 +1 @@
+use_postgresql-9.4_on_jessie.patch
diff --git a/debian/patches/use_postgresql-9.4_on_jessie.patch b/debian/patches/use_postgresql-9.4_on_jessie.patch
new file mode 100644
index 000..1325c5c
--- /dev/null
+++ b/debian/patches/use_postgresql-9.4_on_jessie.patch
@@ -0,0 +1,31 @@
+From 9bb1c5e491463fe64beff663be156d6724b4e06e Mon Sep 17 00:00:00 2001
+From: Armin ranjbar z...@zoup.org
+Date: Fri, 21 Nov 2014 22:26:18 +0330
+Subject: [PATCH] Fixing autodetected version for Debian Jessie, which uses
+ postgresql 9.4
+
+---
+ manifests/globals.pp | 3 ++-
+ 1 file changed, 2 insertions(+), 1 deletion(-)
+
+Index: puppet-module-puppetlabs-postgresql/manifests/globals.pp
+===
+--- puppet-module-puppetlabs-postgresql.orig/manifests/globals.pp	2015-02-16 13:06:53.515483692 -0500
 puppet-module-puppetlabs-postgresql/manifests/globals.pp	2015-02-16 13:06:53.511483620 -0500
+@@ -67,7 +67,7 @@
+   'Debian' = $::operatingsystemrelease ? {
+ /^6\./ = '8.4',
+ /^(wheezy|7\.)/ = '9.1',
+-/^(jessie|8\.)/ = '9.3',
++/^(jessie|8\.)/ = '9.4',
+ default = undef,
+   },
+   'Ubuntu' = $::operatingsystemrelease ? {
+@@ -102,6 +102,7 @@
+ '91'= '1.5',
+ '9.2'   = '2.0',
+ '9.3'   = '2.1',
++'9.4'   = '2.1',
+ default = undef,
+   }
+   $globals_postgis_version = pick($postgis_version, $default_postgis_version)
-- 
2.1.0



Bug#774700: Cryptsetup tools are not included by update-initramfs command

2015-02-16 Thread Musy Bite
Hello Jonas!

We run into this bug, too.  There is mkinitramfs_debug.log you requested at
message #25.
Installation was performed from debian testing amd64 netinst ISO image
built on unknown date, and apt-get dist-upgraded to jessie. cryptsetup
version is 2:1.6.6-5.

Thanks in advance!
+ PREREQ=
+ prereqs
+ echo 
+ exit 0
+ PREREQ=
+ . /usr/share/initramfs-tools/hook-functions
+ setup=no
+ rootdevs=
+ usrdevs=
+ resumedevs=
+ [ -n  ]
+ [ -r /etc/crypttab ]
+ get_fs_devices /
+ local device mount type options dump pass
+ local wantmount=/
+ [ ! -r /etc/fstab ]
+ read device mount type options dump pass
+ grep -s ^[^#] /etc/fstab
+ [ / = / ]
+ local devices
+ [ ext4 = btrfs ]
+ canonical_device UUID=9feb0db8-5828-48eb-b43f-63cbd141122d
+ local dev altdev original
+ dev=UUID=9feb0db8-5828-48eb-b43f-63cbd141122d
+ opt=
+ altdev=UUID=9feb0db8-5828-48eb-b43f-63cbd141122d
+ [ UUID=9feb0db8-5828-48eb-b43f-63cbd141122d != UUID=9feb0db8-5828-48eb-b43f-63cbd141122d ]
+ altdev=9feb0db8-5828-48eb-b43f-63cbd141122d
+ [ 9feb0db8-5828-48eb-b43f-63cbd141122d != UUID=9feb0db8-5828-48eb-b43f-63cbd141122d ]
+ dev=/dev/disk/by-uuid/9feb0db8-5828-48eb-b43f-63cbd141122d
+ original=/dev/disk/by-uuid/9feb0db8-5828-48eb-b43f-63cbd141122d
+ [ -h /dev/disk/by-uuid/9feb0db8-5828-48eb-b43f-63cbd141122d ]
+ readlink -e /dev/disk/by-uuid/9feb0db8-5828-48eb-b43f-63cbd141122d
+ dev=/dev/sda1
+ [  = --no-simplify ]
+ [ x/dev/sda1 = x ]
+ altdev=/dev/sda1
+ [ /dev/sda1 != /dev/sda1 ]
+ [ x = x ]
+ echo 9feb0db8-5828-48eb-b43f-63cbd141122d
+ return 0
+ devices=9feb0db8-5828-48eb-b43f-63cbd141122d
+ echo 9feb0db8-5828-48eb-b43f-63cbd141122d
+ return
+ rootdevs=9feb0db8-5828-48eb-b43f-63cbd141122d
+ [ -z 9feb0db8-5828-48eb-b43f-63cbd141122d ]
+ get_fs_devices /usr
+ local device mount type options dump pass
+ local wantmount=/usr
+ [ ! -r /etc/fstab ]
+ read device mount type options dump pass
+ grep -s ^[^#] /etc/fstab
+ [ / = /usr ]
+ read device mount type options dump pass
+ usrdevs=
+ get_resume_devices
+ local device opt count dupe candidates devices derived
+ candidates=
+ [ -e /etc/uswsusp.conf ]
+ [ -e /etc/suspend.conf ]
+ cat /proc/cmdline
+ [ -e /etc/initramfs-tools/conf.d/resume ]
+ devices=
+ count=0
+ [ 0 -gt 1 ]
+ [ 0 -gt 0 ]
+ return 0
+ resumedevs=
+ get_initramfs_devices
+ local device opt count dupe target source key options candidates devices derived
+ read target source key options
+ grep -s ^[^#] /etc/crypttab
+ candidates=
+ devices=
+ count=0
+ [ 0 -gt 0 ]
+ return 0
+ initramfsdevs=
+ add_device 9feb0db8-5828-48eb-b43f-63cbd141122d
+ local node nodes opts lastopts i count
+ nodes=9feb0db8-5828-48eb-b43f-63cbd141122d
+ opts=
+ lastopts=
+ [ -z 9feb0db8-5828-48eb-b43f-63cbd141122d ]
+ grep -q \b9feb0db8-5828-48eb-b43f-63cbd141122d\b
+ echo 9feb0db8-5828-48eb-b43f-63cbd141122d
+ [ -z  ]
+ opts=rootdev
+ node_is_in_crypttab 9feb0db8-5828-48eb-b43f-63cbd141122d
+ local node
+ node=9feb0db8-5828-48eb-b43f-63cbd141122d
+ grep -q ^9feb0db8-5828-48eb-b43f-63cbd141122d\b /etc/crypttab
+ return 1
+ get_lvm_deps 9feb0db8-5828-48eb-b43f-63cbd141122d
+ local node deps maj min depnode
+ node=9feb0db8-5828-48eb-b43f-63cbd141122d
+ [ -z 9feb0db8-5828-48eb-b43f-63cbd141122d ]
+ cut -d: -f1
+ dmsetup --noheadings splitname 9feb0db8-5828-48eb-b43f-63cbd141122d
+ vgs --noheadings -o pv_name 9feb0db8
+ deps=
+ return 0
+ lvmnodes=
+ [ -z  ]
+ return 0
+ modules=
+ [ -n  ]
+ [ no = no ]
+ continue
+ [ most != dep ]
+ [ no = yes ]
+ [ no = yes ]
+ exit 0


Processed: unarchive 764275

2015-02-16 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 unarchive 764275
Bug #764275 {Done: Michael Gilbert mgilb...@debian.org} [chromium] chromium: 
Segfaults on Startup
Unarchived Bug 764275

End of message, stopping processing here.

Please contact me if you need assistance.
-- 
764275: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=764275
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#764275: chromium: Segfaults on Startup

2015-02-16 Thread Martin Vegter
Package: chromium
Version: 37.0.2062.120 Built on Debian 7.6, running on Debian 7.8
(281580) (64-bit)

when I start chromium from command line, I get following error:

ERROR:sandbox_linux.cc(308)] InitializeSandbox() called with multiple
threads in process gpu-process

while googling, I found bug 764275, where the OP has similar error.
Unlike the OP, I don't get segmentation fault/crash. But the error seems
worrying nevertheless. I have therefore requested this bug to be unarchived.

I will be happy to provide more information, if needed

Regards,
Martin


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#776719: Bug#776264: icu security upload

2015-02-16 Thread Jay Berkenbilt
Michael Gilbert mgilb...@debian.org wrote:

 I uploaded an nmu to delayed/5 fixing all of the known security
 issues.  Please let me know if I should delay longer.

From my perspective, this is fine. I think this provides a good
opportunity for the next maintainer (presumably László though I've seen
some discussion in the ITA about collaborative maintenance) to grab the
repo, incorporate the fixes, and do a new upload that completes the
adoption process of the package. I won't plan on taking any action, so
if the new maintainer doesn't act within the number of days, the NMU
will go through. Thanks for taking care of it.

I can do a quick review if desired, but I would only be reviewing
mechanics, not correctness of the patches, as I haven't and won't have
time to look into the details of the problems or their solutions.

-- 
Jay Berkenbilt q...@debian.org


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#770492: [RFC PATCH RESEND] vfs: Move security_inode_killpriv() after permission checks

2015-02-16 Thread Josh Boyer
On Sat, Jan 17, 2015 at 6:26 PM, Ben Hutchings b...@decadent.org.uk wrote:
 chown() and write() should clear all privilege attributes on
 a file - setuid, setgid, setcap and any other extended
 privilege attributes.

 However, any attributes beyond setuid and setgid are managed by the
 LSM and not directly by the filesystem, so they cannot be set along
 with the other attributes.

 Currently we call security_inode_killpriv() in notify_change(),
 but in case of a chown() this is too early - we have not called
 inode_change_ok() or made any filesystem-specific permission/sanity
 checks.

 Add a new function setattr_killpriv() which calls
 security_inode_killpriv() if necessary, and change the setattr()
 implementation to call this in each filesystem that supports xattrs.
 This assumes that extended privilege attributes are always stored in
 xattrs.

 Compile-tested only.

 XXX This is a silent change to the VFS API, but we should probably
 change something so OOT filesystems fail to compile if they aren't
 updated to call setattr_killpriv().

 Reported-by: Ben Harris bj...@cam.ac.uk
 References: https://bugs.debian.org/770492

This seems to have stalled.  I don't see it in linux-next or anywhere
else I can find.  The issue has a shiny CVE now, so it makes people
that follow those nervous.  Is there any further feedback or follow-up
here?

josh

 ---
  drivers/staging/lustre/lustre/llite/llite_lib.c |  4 
  fs/9p/vfs_inode.c   |  4 
  fs/9p/vfs_inode_dotl.c  |  4 
  fs/attr.c   | 32 
 +
  fs/btrfs/inode.c|  4 
  fs/ceph/inode.c |  4 
  fs/cifs/inode.c | 11 -
  fs/ext2/inode.c |  4 
  fs/ext3/inode.c |  4 
  fs/ext4/inode.c |  4 
  fs/f2fs/file.c  |  4 
  fs/fuse/dir.c   | 15 +++-
  fs/fuse/file.c  |  3 ++-
  fs/fuse/fuse_i.h|  2 +-
  fs/gfs2/inode.c |  3 +++
  fs/hfs/inode.c  |  4 
  fs/hfsplus/inode.c  |  4 
  fs/jffs2/fs.c   |  4 
  fs/jfs/file.c   |  4 
  fs/kernfs/inode.c   | 17 +
  fs/libfs.c  |  3 +++
  fs/nfs/inode.c  | 11 +++--
  fs/ocfs2/file.c |  6 -
  fs/reiserfs/inode.c |  4 
  fs/ubifs/file.c |  4 
  fs/xfs/xfs_acl.c|  3 ++-
  fs/xfs/xfs_file.c   |  2 +-
  fs/xfs/xfs_ioctl.c  |  2 +-
  fs/xfs/xfs_iops.c   | 16 ++---
  fs/xfs/xfs_iops.h   | 10 ++--
  include/linux/fs.h  |  1 +
  mm/shmem.c  |  4 
  32 files changed, 176 insertions(+), 25 deletions(-)

 diff --git a/drivers/staging/lustre/lustre/llite/llite_lib.c 
 b/drivers/staging/lustre/lustre/llite/llite_lib.c
 index a8bcc51..2a714b2 100644
 --- a/drivers/staging/lustre/lustre/llite/llite_lib.c
 +++ b/drivers/staging/lustre/lustre/llite/llite_lib.c
 @@ -1434,6 +1434,10 @@ int ll_setattr_raw(struct dentry *dentry, struct iattr 
 *attr, bool hsm_import)
 spin_unlock(lli-lli_lock);
 }

 +   rc = setattr_killpriv(dentry, attr);
 +   if (rc)
 +   return rc;
 +
 /* We always do an MDS RPC, even if we're only changing the size;
  * only the MDS knows whether truncate() should fail with -ETXTBUSY */

 diff --git a/fs/9p/vfs_inode.c b/fs/9p/vfs_inode.c
 index 296482f..735cbf84 100644
 --- a/fs/9p/vfs_inode.c
 +++ b/fs/9p/vfs_inode.c
 @@ -1130,6 +1130,10 @@ static int v9fs_vfs_setattr(struct dentry *dentry, 
 struct iattr *iattr)
 if (S_ISREG(dentry-d_inode-i_mode))
 filemap_write_and_wait(dentry-d_inode-i_mapping);

 +   retval = setattr_killpriv(dentry, iattr);
 +   if (retval)
 +   return retval;
 +
 retval = p9_client_wstat(fid, wstat);
 if (retval  0)
 return retval;
 diff --git a/fs/9p/vfs_inode_dotl.c b/fs/9p/vfs_inode_dotl.c
 index 02b64f4..f3ca76d 100644
 --- a/fs/9p/vfs_inode_dotl.c
 +++ b/fs/9p/vfs_inode_dotl.c
 @@ -583,6 +583,10 @@ int v9fs_vfs_setattr_dotl(struct dentry *dentry, struct 
 iattr *iattr)
 if (S_ISREG(inode-i_mode))
 filemap_write_and_wait(inode-i_mapping);

 +   retval = 

Bug#769155: kde-workspace-bin: laptop does not go to sleep when critical battery level is reached

2015-02-16 Thread Felipe Sologuren Gutiérrez
Package: kde-workspace-bin
Version: 4:4.11.13-2
Followup-For: Bug #769155

Dear Maintainer,

Confirming this bug with version 4.11.13-2.

I tested booting with linux-image-3.2.0-4-amd64 (3.2.65-1+deb7u1) and the 
laptop has gone to hibernate when passing the critical level, so I think is 
related with kernel behaviour.

Thank you.
Felipe Sologuren

-- System Information:
Debian Release: 8.0
  APT prefers testing
  APT policy: (600, 'testing'), (500, 'testing-updates'), (500, 
'stable-updates'), (500, 'stable'), (100, 'unstable'), (40, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=es_CL.UTF-8, LC_CTYPE=es_CL.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to es_CL.UTF-8)
Shell: /bin/sh linked to /bin/bash
Init: systemd (via /run/systemd/system)

Versions of packages kde-workspace-bin depends on:
ii  iso-codes 3.57-1
ii  kde-runtime   4:4.14.2-2
ii  kde-style-oxygen  4:4.11.13-2
ii  kde-workspace-data4:4.11.13-2
ii  kde-workspace-kgreet-plugins  4:4.11.13-2
ii  kscreen   1.0.2.1-1
ii  libc6 2.19-13
ii  libcln6   1.3.4-1
ii  libdbusmenu-qt2   0.9.2-1
ii  libfontconfig12.11.0-6.3
ii  libfreetype6  2.5.2-2
ii  libgcc1   1:4.9.1-19
ii  libgl1-mesa-glx [libgl1]  10.3.2-1
ii  libice6   2:1.0.9-1+b1
ii  libjpeg62-turbo   1:1.3.1-11
ii  libkactivities6   4:4.13.3-1
ii  libkcmutils4  4:4.14.2-5
ii  libkdeclarative5  4:4.14.2-5
ii  libkdecore5   4:4.14.2-5
ii  libkdesu5 4:4.14.2-5
ii  libkdeui5 4:4.14.2-5
ii  libkfile4 4:4.14.2-5
ii  libkidletime4 4:4.14.2-5
ii  libkio5   4:4.14.2-5
ii  libknewstuff3-4   4:4.14.2-5
ii  libknotifyconfig4 4:4.14.2-5
ii  libkparts44:4.14.2-5
ii  libkpty4  4:4.14.2-5
ii  libkscreensaver5  4:4.11.13-2
ii  libkworkspace4abi24:4.11.13-2
ii  libnepomukcore4   4:4.14.0-1+b2
ii  libpam0g  1.1.8-3.1
ii  libphonon44:4.8.0-4
ii  libplasma34:4.14.2-5
ii  libplasmagenericshell44:4.11.13-2
ii  libpng12-01.2.50-2+b2
ii  libprocesscore4abi1   4:4.11.13-2
ii  libprocessui4a4:4.11.13-2
ii  libqalculate5 0.9.7-9
ii  libqimageblitz4   1:0.0.6-4
ii  libqjson0 0.8.1-3
ii  libqt4-dbus   4:4.8.6+git64-g5dc8b2b+dfsg-2+b1
ii  libqt4-declarative4:4.8.6+git64-g5dc8b2b+dfsg-2+b1
ii  libqt4-sql4:4.8.6+git64-g5dc8b2b+dfsg-2+b1
ii  libqt4-xml4:4.8.6+git64-g5dc8b2b+dfsg-2+b1
ii  libqtcore44:4.8.6+git64-g5dc8b2b+dfsg-2+b1
ii  libqtgui4 4:4.8.6+git64-g5dc8b2b+dfsg-2+b1
ii  libsm62:1.2.2-1+b1
ii  libsolid4 4:4.14.2-5
ii  libsoprano4   2.9.4+dfsg-1.1
ii  libstdc++64.9.1-19
ii  libstreamanalyzer00.7.8-1.2+b2
ii  libudev1  215-11
ii  libusb-0.1-4  2:0.1.12-25
ii  libx11-6  2:1.6.2-3
ii  libxcursor1   1:1.1.14-1+b1
ii  libxext6  2:1.3.3-1
ii  libxfixes31:5.0.1-2+b2
ii  libxft2   2.3.2-1
ii  libxi62:1.7.4-1+b2
ii  libxinerama1  2:1.1.3-1+b1
ii  libxkbfile1   1:1.0.8-1
ii  libxrandr22:1.4.2-1+b1
ii  libxrender1   1:0.9.8-1+b1
ii  libxtst6  2:1.2.2-1+b1
ii  phonon4:4.8.0-4
ii  plasma-desktop4:4.11.13-2
ii  qdbus 4:4.8.6+git64-g5dc8b2b+dfsg-2+b1
ii  x11-utils 7.7+2
ii  x11-xserver-utils 7.7+3+b1

Versions of packages kde-workspace-bin recommends:
ii  plasma-scriptengines  4:4.11.13-2
ii  policykit-1-gnome 0.105-2
ii  polkit-kde-1  0.99.1-1
ii  upower0.99.1-3.1

Versions of packages kde-workspace-bin suggests:
ii  x11-xkb-utils  7.7+1

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#776611: marked as done ([dirmngr] segfaults)

2015-02-16 Thread Debian Bug Tracking System
Your message dated Tue, 17 Feb 2015 00:03:43 +
with message-id e1ynvdf-0007up...@franck.debian.org
and subject line Bug#776611: fixed in dirmngr 1.1.1-5
has caused the Debian Bug report #776611,
regarding [dirmngr] segfaults
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
776611: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776611
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: dirmngr
Version: 1.1.1-4
Severity: serious

--- Please enter the report below this line. ---

i really do not know how to debug it, but .. it always segfaults.

[   14.070905] dirmngr[2239]: segfault at 2 ip 7f5cda9b9ff6 sp
7d09e130 error 4 in libc-2.19.so[7f5cda981000+19f000]
[   15.425365] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
[   15.425369] Bluetooth: BNEP filters: protocol multicast
[   15.425377] Bluetooth: BNEP socket layer initialized
[   15.461603] Bluetooth: RFCOMM TTY layer initialized
[   15.461616] Bluetooth: RFCOMM socket layer initialized
[   15.461620] Bluetooth: RFCOMM ver 1.11
[  411.311408] systemd-default-display-manager-generator[3432]: No
default display manager unit service enabled, setup is manual or a
sysvinit file
[  411.524582] systemd-default-display-manager-generator[3463]: No
default display manager unit service enabled, setup is manual or a
sysvinit file
[  444.650080] systemd-default-display-manager-generator[5152]: No
default display manager unit service enabled, setup is manual or a
sysvinit file
[  444.735631] dirmngr[5172]: segfault at 2 ip 7fadea76fff6 sp
7fff21acd780 error 4 in libc-2.19.so[7fadea737000+19f000]





--- System information. ---
Architecture: amd64
Kernel:   Linux 3.16.0-4-amd64

Debian Release: 8.0
  500 wheezy-3.0  debian.tryton.org
  500 testing ftp.de.debian.org
  500 stable  ftp.de.debian.org
  500 stable  apt.multi24.com
  500 jessie-3.2  debian.tryton.org

--- Package information. ---
Depends (Version) | Installed
=-+-
adduser   | 3.113+nmu3
lsb-base  (= 3.2-13) | 4.1+Debian13+nmu1
libassuan0 (= 2.0.2) | 2.1.2-2
libc6   (= 2.15) |
libgcrypt11(= 1.5.1) |
libgpg-error0   (= 1.10) |
libksba8   (= 1.2.0) |
libldap-2.4-2  (= 2.4.7) |
libpth20   (= 2.0.7) |


Package's Recommends field is empty.

Package's Suggests field is empty.




-- 
Dipl.-Inf. Univ. Florian Reitmeir
E-Mail: n...@multi24.com
Tel: +43 650 2661660
Fax: +43 650 2661660

HP: http://net.multi24.com
Amraserstr 23
6020 Innsbruck / Austria
---End Message---
---BeginMessage---
Source: dirmngr
Source-Version: 1.1.1-5

We believe that the bug you reported is fixed in the latest version of
dirmngr, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 776...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Daniel Kahn Gillmor d...@fifthhorseman.net (supplier of updated dirmngr 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 16 Feb 2015 18:40:55 -0500
Source: dirmngr
Binary: dirmngr
Architecture: source
Version: 1.1.1-5
Distribution: unstable
Urgency: medium
Maintainer: Debian GnuPG-Maintainers pkg-gnupg-ma...@lists.alioth.debian.org
Changed-By: Daniel Kahn Gillmor d...@fifthhorseman.net
Description:
 dirmngr- server for managing certificate revocation lists
Closes: 776611
Changes:
 dirmngr (1.1.1-5) unstable; urgency=medium
 .
   * Avoid segfault when DIR.txt is empty (Closes: #776611)
Checksums-Sha1:
 b6aaa39138cd2f08210f89a210f44a0a3bf2d1b0 2253 dirmngr_1.1.1-5.dsc
 53cc6f6b5af8cd4d4d61f28912225f0486db45bd 9952 dirmngr_1.1.1-5.debian.tar.xz
Checksums-Sha256:
 8e463fd2f85009035424aecd3b1893ae78ff996f53db45e578a8718e11258b95 2253 
dirmngr_1.1.1-5.dsc
 8b3005a890cc9ffed63c8e65209aaefe68a73b20b830b5f5c1a2e0d2dd6ce65d 9952 
dirmngr_1.1.1-5.debian.tar.xz
Files:
 54b762adf7842084d7621d5c13c0af08 2253 utils optional dirmngr_1.1.1-5.dsc
 5fa4d5973daf1f01e4f72ccdbc963a20 9952 utils optional 
dirmngr_1.1.1-5.debian.tar.xz

-BEGIN PGP SIGNATURE-
Version: GnuPG v1


Processed: Re: [Pkg-gnupg-maint] Bug#776611: [dirmngr] segfaults

2015-02-16 Thread Debian Bug Tracking System
Processing control commands:

 tags 776611 - moreinfo unreproducible
Bug #776611 [dirmngr] [dirmngr] segfaults
Removed tag(s) unreproducible and moreinfo.

-- 
776611: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776611
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#776611: [Pkg-gnupg-maint] Bug#776611: [dirmngr] segfaults

2015-02-16 Thread Daniel Kahn Gillmor
Control: tags 776611 - moreinfo unreproducible

Hi Florian--

Sorry for taking a little while to get to this...

On Thu 2015-02-05 02:59:28 -0500, Florian Reitmeir wrote:
  cat /var/log/dirmngr/dirmngr.log
 2015-02-02 06:36:34 dirmngr[3324.0] permanently loaded certificates: 0
 2015-02-02 06:36:34 dirmngr[3324.0] runtime cached certificates: 0
 2015-02-02 16:02:48 dirmngr[2517.0] permanently loaded certificates: 0
 2015-02-02 16:02:48 dirmngr[2517.0] runtime cached certificates: 0
 2015-02-03 22:48:20 dirmngr[2384.0] permanently loaded certificates: 0
 2015-02-03 22:48:20 dirmngr[2384.0] runtime cached certificates: 0
 [...]
 attached is a stack trace, ..

Thanks for this information!  It looks to me like the errors are related
to loading the CRL cache. (in particular, in open_dir() in
src/crlcache.c).  I think i'm now able to reproduce this.

I suspect you have a zero-length file in
/var/cache/dirmngr/crls.d/DIR.txt, is that correct?  can you show me the
output of:

   stat /var/cache/dirmngr/crls.d/DIR.txt

If you move that file out of the way, can you start dirmngr without
it crashing?

   mv /var/cache/dirmngr/crls.d/DIR.txt  /var/cache/dirmngr/crls.d/DIR.txt.bak

If this works, do you have any idea how dirmngr's crlcache got into this
state?  I'm working on a patch now.

--dkg


signature.asc
Description: PGP signature


Processed: Re: Bug#778509: freecad crashes whis SIGSEV when attempting to save a file created in a previous session

2015-02-16 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 778509 minor
Bug #778509 [freecad] freecad crashes whis SIGSEV when attempting to save a 
file created in a previous session
Severity set to 'minor' from 'grave'
 tags 778509 +unreproducible
Bug #778509 [freecad] freecad crashes whis SIGSEV when attempting to save a 
file created in a previous session
Added tag(s) unreproducible.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
778509: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778509
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#778509: freecad crashes whis SIGSEV when attempting to save a file created in a previous session

2015-02-16 Thread Anton Gladky
severity 778509 minor
tags 778509 +unreproducible
thanks

I am not able to reproduce the bug too. Please
try the workaround proposed by Yorik and let us
know whether it works.

Thanks

Anton


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#774436: 774436

2015-02-16 Thread riesi
Hi all,

i have installed (4 days ago) debian wheezy 7.8.0 from the
i386-LXDE-live-image from here
http://cdimage.debian.org/debian-cd/current-live/i386/iso-hybrid/.

My CPU:
$: cat /proc/cpuinfo
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 13
model name : Intel(R) Pentium(R) M processor 1.70GHz
stepping : 6
microcode : 0x18
cpu MHz : 600.000
cache size : 2048 KB
fdiv_bug : no
hlt_bug : no
f00f_bug : no
coma_bug : no
fpu : yes
fpu_exception : yes
cpuid level : 2
wp : yes
flags : fpu vme de pse tsc msr mce cx8 sep mtrr pge mca cmov clflush dts
acpi mmx fxsr sse sse2 ss tm pbe up bts est tm2
bogomips : 1198.82
clflush size : 64
cache_alignment : 64
address sizes : 36 bits physical, 32 bits virtual
power management:

is inside a Thinkpad T42.

after the fresh install:
(lxde-session) suspend and hibernate, causes that the fan spinning at
maximum speed and there was no way to wakeup the system

after update and dist-ugrade (2 days ago):
(lxde-session) suspend and hibernate, put the laptop (i guess) in the
hibernation-/suspend-state and the fan goes off
now i can press the power-button, but again only the fan spinning at
maximum speed and the system remains off

Before I have installed plain debian, crunchbang was running on this
thinkpad T42. These crunchbang was also based on debian wheezy (stable).
With crunchbang (offers only suspend) suspend does the expected job.

For now, it maybe depends on my bad english/linux skills, i can not extract
from the Bug report log - #774436 a way to fix these bug for me. Please
can someone post a little bit more detailed instructions, how to fix this?
Or is there no way at present?

Thank you

Marcus


Bug#778336: marked as done (pastebinit: fails in the default configuration)

2015-02-16 Thread Debian Bug Tracking System
Your message dated Tue, 17 Feb 2015 04:48:47 +
with message-id e1yna5x-0006qm...@franck.debian.org
and subject line Bug#778336: fixed in pastebinit 1.4-4
has caused the Debian Bug report #778336,
regarding pastebinit: fails in the default configuration
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
778336: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778336
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: pastebinit
Version: 1.4-3
Severity: important

Dear Maintainer,

   * What led up to the situation?
 I wanted to paste my piece of code.

   * What exactly did you do (or not do) that was effective (or
 ineffective)?

 I've run: echo foo\nq\nb\nc | pastebinit

   * What was the outcome of this action?

 The output is:
 Bad API request, invalid api_dev_key

   * What outcome did you expect instead?

 I'd expect a link like:
 http://pastebin.com/FKViEqGi


It seems to me that http://pastebin.com, the default paste service,
became closed to anonymous pasting. The package is not usable by
default and needs some tinkering to make it work. This is a workaround:

$ echo foo\nq\nb\nc | pastebinit -b http://paste.debian.net

but remember also: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=760341

Cheers,
Tomasz



-- System Information:
Debian Release: 8.0
  APT prefers testing
  APT policy: (990, 'testing'), (200, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=es_ES.utf8, LC_CTYPE=es_ES.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages pastebinit depends on:
ii  python3  3.4.2-2

Versions of packages pastebinit recommends:
ii  lsb-release  4.1+Debian13+nmu1

pastebinit suggests no packages.

-- no debconf information
---End Message---
---BeginMessage---
Source: pastebinit
Source-Version: 1.4-4

We believe that the bug you reported is fixed in the latest version of
pastebinit, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 778...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Rolf Leggewie f...@rolf.leggewie.biz (supplier of updated pastebinit package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 17 Feb 2015 11:35:07 +0800
Source: pastebinit
Binary: pastebinit
Architecture: source all
Version: 1.4-4
Distribution: unstable
Urgency: medium
Maintainer: Rolf Leggewie f...@rolf.leggewie.biz
Changed-By: Rolf Leggewie f...@rolf.leggewie.biz
Description:
 pastebinit - command-line pastebin client
Closes: 760341 778336
Changes:
 pastebinit (1.4-4) unstable; urgency=medium
 .
   [ Andrew Starr-Bochicchio ]
   * detect_distro_with_python3.patch: Use platform instead of
 lsb_release to detect the distro as lsb_release is not
 available under Python 3 (Closes: #760341). pastebinit
 will now default again to using paste.debian.net on Debian
 (Closes: #778336).
Checksums-Sha1:
 8821af2d00036092e8ed0e33458d372c8844d1a0 1877 pastebinit_1.4-4.dsc
 1a6efbbc38a228bd49741e8edd43215a47d1fd7b 6264 pastebinit_1.4-4.debian.tar.xz
 af149b1f2dece87f1eed09ab226f3770790758e2 39290 pastebinit_1.4-4_all.deb
Checksums-Sha256:
 27228030e1f3af6eb6a8e60af91f5613d15ad0a7429b8a2579a44b61505f350f 1877 
pastebinit_1.4-4.dsc
 e907acfe2dec53ddebe7a52d580dfec35186b7fd3beb5678596ca1fe17874b76 6264 
pastebinit_1.4-4.debian.tar.xz
 f22cee9399a1690c7f2b9e36f49ef1efb53ee80fae2aee03ea13a2647ed8d7fb 39290 
pastebinit_1.4-4_all.deb
Files:
 80ae66a9a95d9affd33bc4dbbf66878c 1877 misc optional pastebinit_1.4-4.dsc
 eccbc161b385816051c8a6a963c83a53 6264 misc optional 
pastebinit_1.4-4.debian.tar.xz
 aa72cf91dadb2894e9927343f2477504 39290 misc optional pastebinit_1.4-4_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIcBAEBAgAGBQJU4sQ2AAoJEJSEK8huURwx594P/jMmKsFgmUYwwUEDWVOfyE+g
HSLxERZnk534K3cYmq/a+Lt/88x+coU1m5svLRgX8/7LoLbs5VZ2ZODOrsHBVo9/
k4UXl2NDW10GRc97Vc/oNTzR4Y6e6fPiVA272/Fx0qVE/DZkzcF97DtD+gMWOZUx
VKwsqpZKpg8ZABCR4m7gsmK4z4paT9IqzUCqib72gtJysMQRlQrT4ISVo/t7I25/

Bug#778336: pastebinit: fails in the default configuration

2015-02-16 Thread Rolf Leggewie
On 17.02.2015 01:49, Andrew Starr-Bochicchio wrote:
 This could be fixed by fixing #760341 so that pastebinit defaults to
 paste.debian.net The root cause of that is lsb-release doesn't support
 Python 3, breaking the distro detection.
 
 The attached patch works around that by using platform to detect the
 distribution instead.

Thanks, everyone, especially Andrew.  I'm preparing an upload as we speak.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#733386: I want to give you a free marketing system

2015-02-16 Thread Brenda van Rhyn
I want to give you a free marketing system.

*One that gives you all the marketing*
*resources and training you need*

If you are as smart as I think you
are, You will be one of those who
joins.

Because this is the perfect


Here's how you can easily have 1
paid signup a day.

The key word there being 'Easily'

First you need the perfect offer.
Something everyone can afford
because it's so ridiculously cheap.

*One that has No monthly auto-ship*
*fees, EVER.*

*One that gives you all the marketing*
*resources and training you need for*
*FREE.*

One that's available to anyone
anywhere in the world. Not just in
one or two countries.

*One that has a ZERO attrition rate.*
*Nobody ever quits so your down line*
*and income are safe.*

*And one that has thousands of team*
*members ready and willing to help*
*you any way they can.*


If you are as smart as I think you
are, you will be one of those who
joins.

Because this is the perfect offer –

http://xtremelifestylesnetwork.com/brennie


See how this low ticket offer is
making people a lot of money very

quickly and why we have over 1000
people joining our team every week.


Think BIG My Friend,

Brenda
brenv...@gmail.com


Bug#777540: The libhtp SONAME mismatch *is* a policy violation.

2015-02-16 Thread Hilko Bengen
* Julien Cristau:

 1. Override upstream's decision to change the SONAME with every release.
I am not entirelysure how stable libhtp's API/ABI should be
considered -- looking at changes and deciding on compatibility issues
making those decisions would certainly put a burden on the maintainer
in the future (although the .symbols mechanism helps for obvious
cases such as removed APIs.)
 
I am attaching a patch to drop the -release parameter from the
libtool call, libhtp.so.1.0.0 (instead of libhtp-0.5.15.so.1.0.0) is
generated. The .symbols file would need to be updated to reflect that
change, too, of course.
 
 2. Since suricata is the only reverse dependency of libhtp and contains
a copy of libhtp within its source tarball, so we could drop the
libhtp package altogether and use that embedded copy instead, at
least for the jessie release.
 
 3. Change the binary package name to reflect the SONAME -- for instance
libhtp-0.5.15. I believe that we are too late in the freeze to be
adding new binary package names.
 
 For jessie, 2 sounds like the best way to go IMO.

Thank you. Could somebody please decide about #777042 (unblock:
suricata/2.0.6-1)?

A positive answer, together with the decision to use the copy of the
libhtp sources shipped as part of suricata for jessie, would also take
care of #777040 (unblock: libhtp/0.5.16-1), as well as security issues
#774897, #777522, and #777523.

Cheers,
-Hilko


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#778387: marked as done (cups: CVE-2014-9679)

2015-02-16 Thread Debian Bug Tracking System
Your message dated Mon, 16 Feb 2015 15:35:00 +
with message-id e1ynnhm-0005os...@franck.debian.org
and subject line Bug#778387: fixed in cups 1.7.5-11
has caused the Debian Bug report #778387,
regarding cups: CVE-2014-9679
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
778387: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778387
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: cups
Severity: grave
Tags: security

This was assigned CVE-2014-9679 and is fixed in experimental
already: https://www.cups.org/str.php?L4551

Cheers,
Moritz
---End Message---
---BeginMessage---
Source: cups
Source-Version: 1.7.5-11

We believe that the bug you reported is fixed in the latest version of
cups, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 778...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Didier Raboud o...@debian.org (supplier of updated cups package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 16 Feb 2015 08:19:17 +0100
Source: cups
Binary: libcups2 libcupsimage2 libcupscgi1 libcupsmime1 libcupsppdc1 cups 
cups-core-drivers cups-daemon cups-client libcups2-dev libcupsimage2-dev 
libcupscgi1-dev libcupsmime1-dev libcupsppdc1-dev cups-bsd cups-common 
cups-server-common cups-ppdc cups-dbg
Architecture: source all
Version: 1.7.5-11
Distribution: unstable
Urgency: medium
Maintainer: Debian Printing Team debian-print...@lists.debian.org
Changed-By: Didier Raboud o...@debian.org
Description:
 cups   - Common UNIX Printing System(tm) - PPD/driver support, web interfa
 cups-bsd   - Common UNIX Printing System(tm) - BSD commands
 cups-client - Common UNIX Printing System(tm) - client programs (SysV)
 cups-common - Common UNIX Printing System(tm) - common files
 cups-core-drivers - Common UNIX Printing System(tm) - PPD-less printing
 cups-daemon - Common UNIX Printing System(tm) - daemon
 cups-dbg   - Common UNIX Printing System(tm) - debugging symbols
 cups-ppdc  - Common UNIX Printing System(tm) - PPD manipulation utilities
 cups-server-common - Common UNIX Printing System(tm) - server common files
 libcups2   - Common UNIX Printing System(tm) - Core library
 libcups2-dev - Common UNIX Printing System(tm) - Development files CUPS library
 libcupscgi1 - Common UNIX Printing System(tm) - CGI library
 libcupscgi1-dev - Common UNIX Printing System(tm) - Development files for CGI 
libra
 libcupsimage2 - Common UNIX Printing System(tm) - Raster image library
 libcupsimage2-dev - Common UNIX Printing System(tm) - Development files CUPS 
image li
 libcupsmime1 - Common UNIX Printing System(tm) - MIME library
 libcupsmime1-dev - Common UNIX Printing System(tm) - Development files MIME 
library
 libcupsppdc1 - Common UNIX Printing System(tm) - PPD manipulation library
 libcupsppdc1-dev - Common UNIX Printing System(tm) - Development files PPD 
library
Closes: 778387
Changes:
 cups (1.7.5-11) unstable; urgency=medium
 .
   * Backport upstream patch to fix cupsRasterReadPixels buffer overflow with
 invalid page header and compressed raster data
 (STR: #4551, Closes: #778387)
Checksums-Sha1:
 0d06c04f7f61af881e9a100445d54aa74af09399 3422 cups_1.7.5-11.dsc
 bf4f69bcd046a466abe3a48c43700334a028f64a 299988 cups_1.7.5-11.debian.tar.xz
 1089a8e354d35a7bd26dc1ae786b8a83a418477b 273296 cups-common_1.7.5-11_all.deb
 12f8f4f912f5be905a00d56a462531a6fcb94842 617716 
cups-server-common_1.7.5-11_all.deb
Checksums-Sha256:
 4ebab03610537e2649fb148c2cf912fb863e93d741dcf531903fc74c12013864 3422 
cups_1.7.5-11.dsc
 6c45561b13b1212df32c9932ee6da439e0f4b2c232b16def4b1ef4176e0d0f4f 299988 
cups_1.7.5-11.debian.tar.xz
 1e79213e95efdf6ab0bc271208be0511e64a312a7c0a49c469960e19327f4a49 273296 
cups-common_1.7.5-11_all.deb
 e06c7fb0075e6ee2677052aba4befcc6a7cedf58dbd8e8b938604baac1d21dcc 617716 
cups-server-common_1.7.5-11_all.deb
Files:
 7f2e3eea3e1d002892aa6b15d2e174c7 3422 net optional cups_1.7.5-11.dsc
 8394c078f90712e4ef15fce902245247 299988 net optional 
cups_1.7.5-11.debian.tar.xz
 c650b71fccf7b0179b1bbd8724ab011b 273296 net optional 
cups-common_1.7.5-11_all.deb
 d549c0ad7d09ae9e463d91ac801527dc 

Bug#773625: marked as done (nss: CVE-2014-1569 information leak)

2015-02-16 Thread Debian Bug Tracking System
Your message dated Mon, 16 Feb 2015 15:39:34 +
with message-id e1ynnlm-000668...@franck.debian.org
and subject line Bug#773625: fixed in nss 3.12.8-1+squeeze11
has caused the Debian Bug report #773625,
regarding nss: CVE-2014-1569 information leak
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
773625: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773625
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
package: src:nss
version: 3.12.8-1
severity: serious
tag: security

An information leak issue was disclosed for nss, fixed in 3.17.3:
https://security-tracker.debian.org/tracker/CVE-2014-1569

Best wishes,
Mike
---End Message---
---BeginMessage---
Source: nss
Source-Version: 3.12.8-1+squeeze11

We believe that the bug you reported is fixed in the latest version of
nss, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 773...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Raphaël Hertzog hert...@debian.org (supplier of updated nss package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 16 Feb 2015 14:49:54 +0100
Source: nss
Binary: libnss3-1d libnss3-tools libnss3-dev libnss3-1d-dbg
Architecture: source amd64
Version: 3.12.8-1+squeeze11
Distribution: squeeze-lts
Urgency: medium
Maintainer: Maintainers of Mozilla-related packages 
pkg-mozilla-maintain...@lists.alioth.debian.org
Changed-By: Raphaël Hertzog hert...@debian.org
Description: 
 libnss3-1d - Network Security Service libraries
 libnss3-1d-dbg - Debugging symbols for the Network Security Service libraries
 libnss3-dev - Development files for the Network Security Service libraries
 libnss3-tools - Network Security Service tools
Closes: 773625
Changes: 
 nss (3.12.8-1+squeeze11) squeeze-lts; urgency=medium
 .
   * Non-maintainer upload by the Debian LTS team.
   * Fix CVE-2011-3389 by backporting the upstream patch:
 https://hg.mozilla.org/projects/nss/rev/7f7446fcc7ab
   * Fix CVE-2014-1569 by backporting the upstream patch:
 https://hg.mozilla.org/projects/nss/rev/a163e09dc4d5
 Closes: #773625
Checksums-Sha1: 
 84415931f675020793b9ae8ce6a67288d501b925 1723 nss_3.12.8-1+squeeze11.dsc
 f8920a00e2c24ca8c0c5e629324abcf3d17253d0 130249 
nss_3.12.8-1+squeeze11.debian.tar.gz
 889714beb9dc62992e358158c2bdacb28898a714 1119710 
libnss3-1d_3.12.8-1+squeeze11_amd64.deb
 b0aa028ff6432003a12a5febeeff5ca3797c1a69 449506 
libnss3-tools_3.12.8-1+squeeze11_amd64.deb
 3059fd5ce7979088c553aeebbfa01947010cbebb 271206 
libnss3-dev_3.12.8-1+squeeze11_amd64.deb
 a92896123a1d8f2c05c526cbf9641a9f4d7199fa 3276408 
libnss3-1d-dbg_3.12.8-1+squeeze11_amd64.deb
Checksums-Sha256: 
 2e48201a04be617203a01e5f23ecc622c439ce226da79bc34c7ce022a69e1bc5 1723 
nss_3.12.8-1+squeeze11.dsc
 dc8e200c7aab08c459fb5b8fc1f174ad5018473a6a81c471d409fd502d2a1280 130249 
nss_3.12.8-1+squeeze11.debian.tar.gz
 29e391aab31e51a25bdd88917d77c6f57327ea711ef4a6dd29ebe639545cf697 1119710 
libnss3-1d_3.12.8-1+squeeze11_amd64.deb
 fdad9b9e128e4400f617055f3c09a5ee1e33ac044b33ee9358e17ecec6938e02 449506 
libnss3-tools_3.12.8-1+squeeze11_amd64.deb
 6cc7de56541c381b9b0b760f5b6609fd6154a5bd644e61a95ccc070f9a16396e 271206 
libnss3-dev_3.12.8-1+squeeze11_amd64.deb
 5601f7afc7de99ea68080eb2db806693748ecda6b0aaa2aae278ce654339f58c 3276408 
libnss3-1d-dbg_3.12.8-1+squeeze11_amd64.deb
Files: 
 28f5ee47ce692dc54f53897e18f0125a 1723 libs optional nss_3.12.8-1+squeeze11.dsc
 18b4c79097f2a8504ca686bd9b7047b6 130249 libs optional 
nss_3.12.8-1+squeeze11.debian.tar.gz
 108edebab11738cca4d7ea7193a75acb 1119710 libs optional 
libnss3-1d_3.12.8-1+squeeze11_amd64.deb
 2ab095a4d9eab9c02abedc54996b1c87 449506 admin optional 
libnss3-tools_3.12.8-1+squeeze11_amd64.deb
 45445ca987ba335504769399ac7476ed 271206 libdevel optional 
libnss3-dev_3.12.8-1+squeeze11_amd64.deb
 3eb0bbe2f4cb8a2d29c250ff29b9e900 3276408 debug extra 
libnss3-1d-dbg_3.12.8-1+squeeze11_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v2
Comment: Signed by Raphael Hertzog

iQEcBAEBCAAGBQJU4gTYAAoJEAOIHavrwpq5xN0H/jwmrsXYyeb3ImT7bQlo3/l1
cEi/uovfKGAisqTTt0j6cjV/2cJ996DRCMXDXRvb2Cq5ICr0HVKibwp8xIJzuCUG

Bug#778387: marked as done (cups: CVE-2014-9679)

2015-02-16 Thread Debian Bug Tracking System
Your message dated Mon, 16 Feb 2015 09:59:21 +0100
with message-id 5614729.fAI7Ie4HPM@gyllingar
and subject line Re: Bug#778387: CVE-2014-9679
has caused the Debian Bug report #778387,
regarding cups: CVE-2014-9679
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
778387: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778387
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: cups
Severity: grave
Tags: security

This was assigned CVE-2014-9679 and is fixed in experimental
already: https://www.cups.org/str.php?L4551

Cheers,
Moritz
---End Message---
---BeginMessage---
Version: 2.0.2-1
Control: tags -1 +patch

Hi Moritz, and thanks for the heads'up.

Le samedi, 14 février 2015 14.24:43, vous avez écrit :
 This was assigned CVE-2014-9679 and is fixed in experimental
 already: https://www.cups.org/str.php?L4551

Here would be the patch for wheezy-security, can I upload ? I'll upload 
to unstable straight away with the same patch.

Cheers,
OdyX

signature.asc
Description: This is a digitally signed message part.
---End Message---


Bug#775913: [Pkg-vala-maintainers] Bug#775913: vala-0.26: CVE-2014-8154: Heap-buffer overflow in vala-gstreamer bindings at Gst.MapInfo()

2015-02-16 Thread Emilio Pozuelo Monfort
On 15/02/15 13:24, Andreas Henriksson wrote:
 Hello Moritz Muehlenhoff.
 
 I'm pretty sure this is not the answer you're wishing to hear but I
 though it's better to give you some reply then not answer at all...
 
 On Thu, Feb 12, 2015 at 04:41:47PM +0100, Moritz Muehlenhoff wrote:
 [...]
 Heap-buffer overflow in vala-gstreamer bindings at Gst.MapInfo()

 What's the status?
 
 TTBOMK:
 Fixed in 0.26.2 currently available from experimental. Will likely be
 available (first in unstable+testing then) in backports archive after
 the Jessie release. There's a lack of people finding it useful to redo
 the upstream bugfix releases badly just because of debian policies or
 whatever the issue is with getting them into testing during freeze.

Redoing here means adding this patch:

https://git.gnome.org/browse/vala/commit/?h=0.26id=22126ebad3b2133db39bcf301c29c8b78b440f1a

I'll see if I can do it sometime this week, if nobody beats me to it.

If any NMU-ers read this, feel free to upload without prior notice. Just
remember to send a debdiff of what you upload :)

Cheers,
Emilio


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#775913: [Pkg-vala-maintainers] Bug#775913: vala-0.26: CVE-2014-8154: Heap-buffer overflow in vala-gstreamer bindings at Gst.MapInfo()

2015-02-16 Thread Andreas Henriksson
On Mon, Feb 16, 2015 at 09:58:09AM +0100, Emilio Pozuelo Monfort wrote:
[...]
 Redoing here means adding this patch:
 
 https://git.gnome.org/browse/vala/commit/?h=0.26id=22126ebad3b2133db39bcf301c29c8b78b440f1a
[...]

And when the next bug report gets in we add another one, and then the next
one, . which could all have been avoided if we just shipped already
available bugfixes at once instead of waiting for bug reports to trickle in.

But ofcourse feel free to NMU!

Regards,
Andreas Henriksson


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#758746: kde-workspace-bin: Energy saving schemes have no effect

2015-02-16 Thread phaoost
Package: kde-workspace-bin
Version: 4:4.11.13-2
Followup-For: Bug #758746

Dear Maintainer,

I am still getting the problem. Whenever I close the lid now, the system goes 
to suspend mode.
However, my settings are just to lock the screen in case the lid is closed.

-- System Information:
Debian Release: 8.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 
'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages kde-workspace-bin depends on:
ii  iso-codes 3.57-1
ii  kde-runtime   4:4.14.2-2
ii  kde-style-oxygen  4:4.11.13-2
ii  kde-workspace-data4:4.11.13-2
ii  kde-workspace-kgreet-plugins  4:4.11.13-2
ii  kscreen   1.0.2.1-1
ii  libc6 2.19-15
ii  libcln6   1.3.4-1
ii  libdbusmenu-qt2   0.9.2-1
ii  libfontconfig12.11.0-6.3
ii  libfreetype6  2.5.2-2
ii  libgcc1   1:4.9.2-10
ii  libgl1-mesa-glx [libgl1]  10.4.2-2
ii  libice6   2:1.0.9-1+b1
ii  libjpeg62-turbo   1:1.3.1-11
ii  libkactivities6   4:4.13.3-1
ii  libkcmutils4  4:4.14.2-5
ii  libkdeclarative5  4:4.14.2-5
ii  libkdecore5   4:4.14.2-5
ii  libkdesu5 4:4.14.2-5
ii  libkdeui5 4:4.14.2-5
ii  libkfile4 4:4.14.2-5
ii  libkidletime4 4:4.14.2-5
ii  libkio5   4:4.14.2-5
ii  libknewstuff3-4   4:4.14.2-5
ii  libknotifyconfig4 4:4.14.2-5
ii  libkparts44:4.14.2-5
ii  libkpty4  4:4.14.2-5
ii  libkscreensaver5  4:4.11.13-2
ii  libkworkspace4abi24:4.11.13-2
ii  libnepomukcore4   4:4.14.0-1+b2
ii  libpam0g  1.1.8-3.1
ii  libphonon44:4.8.0-5
ii  libplasma34:4.14.2-5
ii  libplasmagenericshell44:4.11.13-2
ii  libpng12-01.2.50-2+b2
ii  libprocesscore4abi1   4:4.11.13-2
ii  libprocessui4a4:4.11.13-2
ii  libqalculate5 0.9.7-9
ii  libqimageblitz4   1:0.0.6-4
ii  libqjson0 0.8.1-3
ii  libqt4-dbus   4:4.8.6+git64-g5dc8b2b+dfsg-2+b1
ii  libqt4-declarative4:4.8.6+git64-g5dc8b2b+dfsg-2+b1
ii  libqt4-sql4:4.8.6+git64-g5dc8b2b+dfsg-2+b1
ii  libqt4-xml4:4.8.6+git64-g5dc8b2b+dfsg-2+b1
ii  libqtcore44:4.8.6+git64-g5dc8b2b+dfsg-2+b1
ii  libqtgui4 4:4.8.6+git64-g5dc8b2b+dfsg-2+b1
ii  libsm62:1.2.2-1+b1
ii  libsolid4 4:4.14.2-5
ii  libsoprano4   2.9.4+dfsg-1.1
ii  libstdc++64.9.2-10
ii  libstreamanalyzer00.7.8-1.2+b2
ii  libudev1  215-12
ii  libusb-0.1-4  2:0.1.12-25
ii  libx11-6  2:1.6.2-3
ii  libxcursor1   1:1.1.14-1+b1
ii  libxext6  2:1.3.3-1
ii  libxfixes31:5.0.1-2+b2
ii  libxft2   2.3.2-1
ii  libxi62:1.7.4-1+b2
ii  libxinerama1  2:1.1.3-1+b1
ii  libxkbfile1   1:1.0.8-1
ii  libxrandr22:1.4.2-1+b1
ii  libxrender1   1:0.9.8-1+b1
ii  libxtst6  2:1.2.2-1+b1
ii  phonon4:4.8.0-5
ii  plasma-desktop4:4.11.13-2
ii  qdbus 4:4.8.6+git64-g5dc8b2b+dfsg-2+b1
ii  x11-utils 7.7+2
ii  x11-xserver-utils 7.7+3+b1

Versions of packages kde-workspace-bin recommends:
pn  plasma-scriptengines  none
pn  polkit-kde-1 | policykit-1-gnome  none
ii  upower0.99.1-3.1

Versions of packages kde-workspace-bin suggests:
ii  x11-xkb-utils  7.7+1

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#767616: marked as done (lyx: fails to upgrade from 'testing' - trying to overwrite /usr/share/icons/hicolor/48x48/apps/lyx.png)

2015-02-16 Thread Debian Bug Tracking System
Your message dated Mon, 16 Feb 2015 11:33:59 +
with message-id e1ynjw7-zk...@franck.debian.org
and subject line Bug#767616: fixed in lyx 2.1.3-1
has caused the Debian Bug report #767616,
regarding lyx: fails to upgrade from 'testing' - trying to overwrite 
/usr/share/icons/hicolor/48x48/apps/lyx.png
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
767616: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=767616
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: lyx
Version: 2.1.2-3
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package fails to upgrade from
'testing'.
It installed fine in 'testing', then the upgrade to 'sid' fails
because it tries to overwrite other packages files without declaring a
Breaks+Replaces relation.

See policy 7.6 at
http://www.debian.org/doc/debian-policy/ch-relationships.html#s-replaces

From the attached log (scroll to the bottom...):

  Preparing to unpack .../archives/lyx_2.1.2-3_amd64.deb ...
  Unpacking lyx (2.1.2-3) over (2.1.2-2) ...
  dpkg: error processing archive /var/cache/apt/archives/lyx_2.1.2-3_amd64.deb 
(--unpack):
   trying to overwrite '/usr/share/icons/hicolor/48x48/apps/lyx.png', which is 
also in package lyx-common 2.1.2-2
  dpkg-deb: error: subprocess paste was killed by signal (Broken pipe)
  Preparing to unpack .../lyx-common_2.1.2-3_all.deb ...
  Unpacking lyx-common (2.1.2-3) over (2.1.2-2) ...
  Errors were encountered while processing:
   /var/cache/apt/archives/lyx_2.1.2-3_amd64.deb


cheers,

Andreas


lyx_2.1.2-3.log.gz
Description: application/gzip
---End Message---
---BeginMessage---
Source: lyx
Source-Version: 2.1.3-1

We believe that the bug you reported is fixed in the latest version of
lyx, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 767...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sven Hoexter hoex...@debian.org (supplier of updated lyx package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 16 Feb 2015 11:55:15 +0100
Source: lyx
Binary: lyx lyx-common lyx-dbg fonts-lyx ttf-lyx
Architecture: source amd64 all
Version: 2.1.3-1
Distribution: unstable
Urgency: low
Maintainer: Debian LyX Maintainers pkg-lyx-de...@lists.alioth.debian.org
Changed-By: Sven Hoexter hoex...@debian.org
Description:
 fonts-lyx  - TrueType versions of some TeX fonts used by LyX
 lyx- document processor
 lyx-common - architecture-independent files for LyX
 lyx-dbg- debugging symbols for LyX
 ttf-lyx- transitional package
Closes: 767616
Changes:
 lyx (2.1.3-1) unstable; urgency=low
 .
   * New upstream release.
   * No longer override_dh_builddep in d/rules - xz is a default
 for quite some time.
   * Add Replaces and Breaks to the lyx binary package to support
 the icon move from lyx-common to lyx which was implemented in
 2.1.2-3. Closes: #767616
Checksums-Sha1:
 a64edae9c119cb116618d17e4069f53da3613d59 2353 lyx_2.1.3-1.dsc
 eba2e3476967cb33a59b9f7331df472d98d635bf 10778624 lyx_2.1.3.orig.tar.xz
 1beac9eb58ab5670b4854dd41e32fa7baf3183d7 28056 lyx_2.1.3-1.debian.tar.xz
 80390d4d0a59846f75f9a7dbf4c23aa7d6485474 3744378 lyx_2.1.3-1_amd64.deb
 7fabb41ef6e6d065d56a82ef80ac5ce27a43c0d1 6156558 lyx-common_2.1.3-1_all.deb
 cc1dc4ca37f71cf7c18712d02830fb416323f232 55949420 lyx-dbg_2.1.3-1_amd64.deb
 c477c3348af170fc77a2a572c18630aad0be31bc 201804 fonts-lyx_2.1.3-1_all.deb
 4bac25efaeb06301cd8b31e37d34a2fb965b6c1a 48944 ttf-lyx_2.1.3-1_all.deb
Checksums-Sha256:
 c51606023cef7d610de876aecd4bb5e4e2f2cc870bcd408ab408b5048229c12f 2353 
lyx_2.1.3-1.dsc
 2fd52e7e5ee372983eb6b0a7f04765cb0df6f8c1f3420081d9f7761acfc75682 10778624 
lyx_2.1.3.orig.tar.xz
 cb5319dc116a3c56b886732470dbf2952e5c6b47dc2d937e9bced6c404a40358 28056 
lyx_2.1.3-1.debian.tar.xz
 bc6a87e5c3a91b28a83afb947ee60858d3bc2dacb89ab1413d55b33260b89def 3744378 
lyx_2.1.3-1_amd64.deb
 fb3acfcd653f14228e7a5ff861cc6936a276bfd7e1182ebeb94ea77611fe 6156558 
lyx-common_2.1.3-1_all.deb
 d43b56cf5249df572f35076f4132a0267937328136b64455174bed409093ce02 55949420 
lyx-dbg_2.1.3-1_amd64.deb
 

Bug#778509: freecad crashes whis SIGSEV when attempting to save a file created in a previous session

2015-02-16 Thread Yorik van Havre
It works for me... I'm able to save/restore, no crash.

This is most probably a problem related to the 3D driver
(the first item of the stack trace is related to OpenGL).

Disabling thumbnails in files (Menu Edit - Preferences -
General - Document - uncheck Save thumbnails into project
files) might solve the problem...

Yorik

February 16 2015 4:27 AM, Anton Gladky wrote: 
 Hi,
 
 tanks for bugreport. What desktop environment do you
 use? What graphic card/driver do you have?
 
 Cheers
 
 Anton


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org