Bug#778555: icewm: fails to upgrade from 'sid' - trying to overwrite /usr/share/xsessions/icewm-session.desktop
Package: icewm Version: 1.3.8+githubmod+20150214+d373d98-1 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Hi, during a test with piuparts I noticed your package fails to upgrade from 'sid' to 'experimental'. It installed fine in 'sid', then the upgrade to 'experimental' fails because it tries to overwrite other packages files without declaring a Breaks+Replaces relation. See policy 7.6 at https://www.debian.org/doc/debian-policy/ch-relationships.html#s-replaces From the attached log (scroll to the bottom...): Preparing to unpack .../icewm_1.3.8+githubmod+20150214+d373d98-1_amd64.deb ... Unpacking icewm (1.3.8+githubmod+20150214+d373d98-1) over (1.3.8-2) ... dpkg: error processing archive /var/cache/apt/archives/icewm_1.3.8+githubmod+20150214+d373d98-1_amd64.deb (--unpack): trying to overwrite '/usr/share/xsessions/icewm-session.desktop', which is also in package icewm-common 1.3.8-2 Preparing to unpack .../icewm-common_1.3.8+githubmod+20150214+d373d98-1_amd64.deb ... Unpacking icewm-common (1.3.8+githubmod+20150214+d373d98-1) over (1.3.8-2) ... Errors were encountered while processing: /var/cache/apt/archives/icewm_1.3.8+githubmod+20150214+d373d98-1_amd64.deb cheers, Andreas icewm_1.3.8+githubmod+20150214+d373d98-1.log.gz Description: application/gzip
Bug#778336: pastebinit: fails in the default configuration
This could be fixed by fixing #760341 so that pastebinit defaults to paste.debian.net The root cause of that is lsb-release doesn't support Python 3, breaking the distro detection. The attached patch works around that by using platform to detect the distribution instead. Thanks, -- Andrew Starr-Bochicchio Ubuntu Developer https://launchpad.net/~andrewsomething Debian Developer http://qa.debian.org/developer.php?login=asb PGP/GPG Key ID: D53FDCB1 From c8d33415abf8d07b3b2bcb41bb088a03b882a7cb Mon Sep 17 00:00:00 2001 From: Andrew Starr-Bochicchio a...@debian.org Date: Mon, 16 Feb 2015 12:45:05 -0500 Subject: [PATCH] detect_distro_with_python3.patch: Use platform instead of lsb_release to detect the distro as lsb_release is not available under Python 3 (Closes: #760341). pastebinit will now default to using paste.debian.net on Debian (Closes: #778336). --- debian/changelog| 11 +++ debian/patches/detect_distro_with_python3.patch | 15 +++ debian/patches/series | 1 + 3 files changed, 27 insertions(+) create mode 100644 debian/patches/detect_distro_with_python3.patch diff --git a/debian/changelog b/debian/changelog index 7de6407..c2d3758 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,14 @@ +pastebinit (1.4-3.1) UNRELEASED; urgency=medium + + * Non-maintainer upload. + * detect_distro_with_python3.patch: Use platform instead of +lsb_release to detect the distro as lsb_release is not +available under Python 3 (Closes: #760341). pastebinit +will now default to using paste.debian.net on Debian +(Closes: #778336). + + -- Andrew Starr-Bochicchio a...@debian.org Mon, 16 Feb 2015 12:40:55 -0500 + pastebinit (1.4-3) unstable; urgency=low * bump debhelper to version 9 diff --git a/debian/patches/detect_distro_with_python3.patch b/debian/patches/detect_distro_with_python3.patch new file mode 100644 index 000..e0737c3 --- /dev/null +++ b/debian/patches/detect_distro_with_python3.patch @@ -0,0 +1,15 @@ +Index: pastebinit/pastebinit +=== +--- pastebinit.orig/pastebinit 2015-02-16 12:37:04.434846203 -0500 pastebinit/pastebinit 2015-02-16 12:39:22.709104460 -0500 +@@ -37,8 +37,8 @@ + + # Now try to override it with a distributor pastebin + try: +-import lsb_release +-release = lsb_release.get_distro_information()['ID'].lower() ++import platform ++release = platform.linux_distribution()[0].lower() + if release == 'debian': + defaultPB = http://paste.debian.net; + elif release == 'fedora': diff --git a/debian/patches/series b/debian/patches/series index 986704d..b17e68f 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -1,2 +1,3 @@ upstream-r205_r201.patch increase_timeout.patch +detect_distro_with_python3.patch -- 2.1.0
Processed: tagging 774748
Processing commands for cont...@bugs.debian.org: tags 774748 + patch Bug #774748 [ruby-redcloth] ruby-redcloth: CVE-2012-6684 Added tag(s) patch. thanks Stopping processing here. Please contact me if you need assistance. -- 774748: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774748 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#777540: The libhtp SONAME mismatch *is* a policy violation.
On Fri, Feb 13, 2015 at 22:13:21 +0100, Hilko Bengen wrote: control: severity -1 grave control: block 772551 by -1 control: tag -1 patch In the current state of the libhtp source package, every new upstream release of changes the SONAME and thus requires that reverse dependencies (currently only suricata) are rebuilt. As long as the name of the binary package stays the same, eventual breakage is guaranteed, see #772551. The current state defeats the purpose of shared libraries and violates section 8.1 (Run-time shared libraries) of the Debian Policy Manual. I see three possible solutions: 1. Override upstream's decision to change the SONAME with every release. I am not entirelysure how stable libhtp's API/ABI should be considered -- looking at changes and deciding on compatibility issues making those decisions would certainly put a burden on the maintainer in the future (although the .symbols mechanism helps for obvious cases such as removed APIs.) I am attaching a patch to drop the -release parameter from the libtool call, libhtp.so.1.0.0 (instead of libhtp-0.5.15.so.1.0.0) is generated. The .symbols file would need to be updated to reflect that change, too, of course. 2. Since suricata is the only reverse dependency of libhtp and contains a copy of libhtp within its source tarball, so we could drop the libhtp package altogether and use that embedded copy instead, at least for the jessie release. 3. Change the binary package name to reflect the SONAME -- for instance libhtp-0.5.15. I believe that we are too late in the freeze to be adding new binary package names. For jessie, 2 sounds like the best way to go IMO. Cheers, Julien signature.asc Description: Digital signature
Processed: tagging 778336
Processing commands for cont...@bugs.debian.org: tags 778336 + patch Bug #778336 [pastebinit] pastebinit: fails in the default configuration Added tag(s) patch. thanks Stopping processing here. Please contact me if you need assistance. -- 778336: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778336 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: tagging 777607
Processing commands for cont...@bugs.debian.org: tags 777607 + patch Bug #777607 [puppet-module-puppetlabs-postgresql] puppet-module-puppetlabs-postgresql: Module tries to install postgresql-9.3 on jessie and fails Added tag(s) patch. thanks Stopping processing here. Please contact me if you need assistance. -- 777607: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777607 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#777607: puppet-module-puppetlabs-postgresql: Module tries to install postgresql-9.3 on jessie and fails
Hi, I can confirm that the upstream commit resolves the issue. The attached patch backports it. Thanks, -- Andrew Starr-Bochicchio Ubuntu Developer https://launchpad.net/~andrewsomething Debian Developer http://qa.debian.org/developer.php?login=asb PGP/GPG Key ID: D53FDCB1 From 5a16c4afd05617763b584e79de21bb137978da7c Mon Sep 17 00:00:00 2001 From: Andrew Starr-Bochicchio a...@debian.org Date: Mon, 16 Feb 2015 13:09:55 -0500 Subject: [PATCH] use_postgresql-9.4_on_jessie.patch: Backport upstream commit to correctly use postgresql 9.4 on Jessie (Closes: #777607). --- debian/changelog | 8 ++ debian/patches/series | 1 + debian/patches/use_postgresql-9.4_on_jessie.patch | 31 +++ 3 files changed, 40 insertions(+) create mode 100644 debian/patches/series create mode 100644 debian/patches/use_postgresql-9.4_on_jessie.patch diff --git a/debian/changelog b/debian/changelog index 2e35323..5be8118 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,11 @@ +puppet-module-puppetlabs-postgresql (4.0.0-1.1) UNRELEASED; urgency=medium + + * Non-maintainer upload. + * use_postgresql-9.4_on_jessie.patch: Backport upstream commit +to correctly use postgresql 9.4 on Jessie (Closes: #777607). + + -- Andrew Starr-Bochicchio a...@debian.org Mon, 16 Feb 2015 13:07:26 -0500 + puppet-module-puppetlabs-postgresql (4.0.0-1) unstable; urgency=medium * Imported upstream relase 4.0.0 diff --git a/debian/patches/series b/debian/patches/series new file mode 100644 index 000..479d051 --- /dev/null +++ b/debian/patches/series @@ -0,0 +1 @@ +use_postgresql-9.4_on_jessie.patch diff --git a/debian/patches/use_postgresql-9.4_on_jessie.patch b/debian/patches/use_postgresql-9.4_on_jessie.patch new file mode 100644 index 000..1325c5c --- /dev/null +++ b/debian/patches/use_postgresql-9.4_on_jessie.patch @@ -0,0 +1,31 @@ +From 9bb1c5e491463fe64beff663be156d6724b4e06e Mon Sep 17 00:00:00 2001 +From: Armin ranjbar z...@zoup.org +Date: Fri, 21 Nov 2014 22:26:18 +0330 +Subject: [PATCH] Fixing autodetected version for Debian Jessie, which uses + postgresql 9.4 + +--- + manifests/globals.pp | 3 ++- + 1 file changed, 2 insertions(+), 1 deletion(-) + +Index: puppet-module-puppetlabs-postgresql/manifests/globals.pp +=== +--- puppet-module-puppetlabs-postgresql.orig/manifests/globals.pp 2015-02-16 13:06:53.515483692 -0500 puppet-module-puppetlabs-postgresql/manifests/globals.pp 2015-02-16 13:06:53.511483620 -0500 +@@ -67,7 +67,7 @@ + 'Debian' = $::operatingsystemrelease ? { + /^6\./ = '8.4', + /^(wheezy|7\.)/ = '9.1', +-/^(jessie|8\.)/ = '9.3', ++/^(jessie|8\.)/ = '9.4', + default = undef, + }, + 'Ubuntu' = $::operatingsystemrelease ? { +@@ -102,6 +102,7 @@ + '91'= '1.5', + '9.2' = '2.0', + '9.3' = '2.1', ++'9.4' = '2.1', + default = undef, + } + $globals_postgis_version = pick($postgis_version, $default_postgis_version) -- 2.1.0
Bug#774700: Cryptsetup tools are not included by update-initramfs command
Hello Jonas! We run into this bug, too. There is mkinitramfs_debug.log you requested at message #25. Installation was performed from debian testing amd64 netinst ISO image built on unknown date, and apt-get dist-upgraded to jessie. cryptsetup version is 2:1.6.6-5. Thanks in advance! + PREREQ= + prereqs + echo + exit 0 + PREREQ= + . /usr/share/initramfs-tools/hook-functions + setup=no + rootdevs= + usrdevs= + resumedevs= + [ -n ] + [ -r /etc/crypttab ] + get_fs_devices / + local device mount type options dump pass + local wantmount=/ + [ ! -r /etc/fstab ] + read device mount type options dump pass + grep -s ^[^#] /etc/fstab + [ / = / ] + local devices + [ ext4 = btrfs ] + canonical_device UUID=9feb0db8-5828-48eb-b43f-63cbd141122d + local dev altdev original + dev=UUID=9feb0db8-5828-48eb-b43f-63cbd141122d + opt= + altdev=UUID=9feb0db8-5828-48eb-b43f-63cbd141122d + [ UUID=9feb0db8-5828-48eb-b43f-63cbd141122d != UUID=9feb0db8-5828-48eb-b43f-63cbd141122d ] + altdev=9feb0db8-5828-48eb-b43f-63cbd141122d + [ 9feb0db8-5828-48eb-b43f-63cbd141122d != UUID=9feb0db8-5828-48eb-b43f-63cbd141122d ] + dev=/dev/disk/by-uuid/9feb0db8-5828-48eb-b43f-63cbd141122d + original=/dev/disk/by-uuid/9feb0db8-5828-48eb-b43f-63cbd141122d + [ -h /dev/disk/by-uuid/9feb0db8-5828-48eb-b43f-63cbd141122d ] + readlink -e /dev/disk/by-uuid/9feb0db8-5828-48eb-b43f-63cbd141122d + dev=/dev/sda1 + [ = --no-simplify ] + [ x/dev/sda1 = x ] + altdev=/dev/sda1 + [ /dev/sda1 != /dev/sda1 ] + [ x = x ] + echo 9feb0db8-5828-48eb-b43f-63cbd141122d + return 0 + devices=9feb0db8-5828-48eb-b43f-63cbd141122d + echo 9feb0db8-5828-48eb-b43f-63cbd141122d + return + rootdevs=9feb0db8-5828-48eb-b43f-63cbd141122d + [ -z 9feb0db8-5828-48eb-b43f-63cbd141122d ] + get_fs_devices /usr + local device mount type options dump pass + local wantmount=/usr + [ ! -r /etc/fstab ] + read device mount type options dump pass + grep -s ^[^#] /etc/fstab + [ / = /usr ] + read device mount type options dump pass + usrdevs= + get_resume_devices + local device opt count dupe candidates devices derived + candidates= + [ -e /etc/uswsusp.conf ] + [ -e /etc/suspend.conf ] + cat /proc/cmdline + [ -e /etc/initramfs-tools/conf.d/resume ] + devices= + count=0 + [ 0 -gt 1 ] + [ 0 -gt 0 ] + return 0 + resumedevs= + get_initramfs_devices + local device opt count dupe target source key options candidates devices derived + read target source key options + grep -s ^[^#] /etc/crypttab + candidates= + devices= + count=0 + [ 0 -gt 0 ] + return 0 + initramfsdevs= + add_device 9feb0db8-5828-48eb-b43f-63cbd141122d + local node nodes opts lastopts i count + nodes=9feb0db8-5828-48eb-b43f-63cbd141122d + opts= + lastopts= + [ -z 9feb0db8-5828-48eb-b43f-63cbd141122d ] + grep -q \b9feb0db8-5828-48eb-b43f-63cbd141122d\b + echo 9feb0db8-5828-48eb-b43f-63cbd141122d + [ -z ] + opts=rootdev + node_is_in_crypttab 9feb0db8-5828-48eb-b43f-63cbd141122d + local node + node=9feb0db8-5828-48eb-b43f-63cbd141122d + grep -q ^9feb0db8-5828-48eb-b43f-63cbd141122d\b /etc/crypttab + return 1 + get_lvm_deps 9feb0db8-5828-48eb-b43f-63cbd141122d + local node deps maj min depnode + node=9feb0db8-5828-48eb-b43f-63cbd141122d + [ -z 9feb0db8-5828-48eb-b43f-63cbd141122d ] + cut -d: -f1 + dmsetup --noheadings splitname 9feb0db8-5828-48eb-b43f-63cbd141122d + vgs --noheadings -o pv_name 9feb0db8 + deps= + return 0 + lvmnodes= + [ -z ] + return 0 + modules= + [ -n ] + [ no = no ] + continue + [ most != dep ] + [ no = yes ] + [ no = yes ] + exit 0
Processed: unarchive 764275
Processing commands for cont...@bugs.debian.org: unarchive 764275 Bug #764275 {Done: Michael Gilbert mgilb...@debian.org} [chromium] chromium: Segfaults on Startup Unarchived Bug 764275 End of message, stopping processing here. Please contact me if you need assistance. -- 764275: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=764275 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#764275: chromium: Segfaults on Startup
Package: chromium Version: 37.0.2062.120 Built on Debian 7.6, running on Debian 7.8 (281580) (64-bit) when I start chromium from command line, I get following error: ERROR:sandbox_linux.cc(308)] InitializeSandbox() called with multiple threads in process gpu-process while googling, I found bug 764275, where the OP has similar error. Unlike the OP, I don't get segmentation fault/crash. But the error seems worrying nevertheless. I have therefore requested this bug to be unarchived. I will be happy to provide more information, if needed Regards, Martin -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#776719: Bug#776264: icu security upload
Michael Gilbert mgilb...@debian.org wrote: I uploaded an nmu to delayed/5 fixing all of the known security issues. Please let me know if I should delay longer. From my perspective, this is fine. I think this provides a good opportunity for the next maintainer (presumably László though I've seen some discussion in the ITA about collaborative maintenance) to grab the repo, incorporate the fixes, and do a new upload that completes the adoption process of the package. I won't plan on taking any action, so if the new maintainer doesn't act within the number of days, the NMU will go through. Thanks for taking care of it. I can do a quick review if desired, but I would only be reviewing mechanics, not correctness of the patches, as I haven't and won't have time to look into the details of the problems or their solutions. -- Jay Berkenbilt q...@debian.org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#770492: [RFC PATCH RESEND] vfs: Move security_inode_killpriv() after permission checks
On Sat, Jan 17, 2015 at 6:26 PM, Ben Hutchings b...@decadent.org.uk wrote: chown() and write() should clear all privilege attributes on a file - setuid, setgid, setcap and any other extended privilege attributes. However, any attributes beyond setuid and setgid are managed by the LSM and not directly by the filesystem, so they cannot be set along with the other attributes. Currently we call security_inode_killpriv() in notify_change(), but in case of a chown() this is too early - we have not called inode_change_ok() or made any filesystem-specific permission/sanity checks. Add a new function setattr_killpriv() which calls security_inode_killpriv() if necessary, and change the setattr() implementation to call this in each filesystem that supports xattrs. This assumes that extended privilege attributes are always stored in xattrs. Compile-tested only. XXX This is a silent change to the VFS API, but we should probably change something so OOT filesystems fail to compile if they aren't updated to call setattr_killpriv(). Reported-by: Ben Harris bj...@cam.ac.uk References: https://bugs.debian.org/770492 This seems to have stalled. I don't see it in linux-next or anywhere else I can find. The issue has a shiny CVE now, so it makes people that follow those nervous. Is there any further feedback or follow-up here? josh --- drivers/staging/lustre/lustre/llite/llite_lib.c | 4 fs/9p/vfs_inode.c | 4 fs/9p/vfs_inode_dotl.c | 4 fs/attr.c | 32 + fs/btrfs/inode.c| 4 fs/ceph/inode.c | 4 fs/cifs/inode.c | 11 - fs/ext2/inode.c | 4 fs/ext3/inode.c | 4 fs/ext4/inode.c | 4 fs/f2fs/file.c | 4 fs/fuse/dir.c | 15 +++- fs/fuse/file.c | 3 ++- fs/fuse/fuse_i.h| 2 +- fs/gfs2/inode.c | 3 +++ fs/hfs/inode.c | 4 fs/hfsplus/inode.c | 4 fs/jffs2/fs.c | 4 fs/jfs/file.c | 4 fs/kernfs/inode.c | 17 + fs/libfs.c | 3 +++ fs/nfs/inode.c | 11 +++-- fs/ocfs2/file.c | 6 - fs/reiserfs/inode.c | 4 fs/ubifs/file.c | 4 fs/xfs/xfs_acl.c| 3 ++- fs/xfs/xfs_file.c | 2 +- fs/xfs/xfs_ioctl.c | 2 +- fs/xfs/xfs_iops.c | 16 ++--- fs/xfs/xfs_iops.h | 10 ++-- include/linux/fs.h | 1 + mm/shmem.c | 4 32 files changed, 176 insertions(+), 25 deletions(-) diff --git a/drivers/staging/lustre/lustre/llite/llite_lib.c b/drivers/staging/lustre/lustre/llite/llite_lib.c index a8bcc51..2a714b2 100644 --- a/drivers/staging/lustre/lustre/llite/llite_lib.c +++ b/drivers/staging/lustre/lustre/llite/llite_lib.c @@ -1434,6 +1434,10 @@ int ll_setattr_raw(struct dentry *dentry, struct iattr *attr, bool hsm_import) spin_unlock(lli-lli_lock); } + rc = setattr_killpriv(dentry, attr); + if (rc) + return rc; + /* We always do an MDS RPC, even if we're only changing the size; * only the MDS knows whether truncate() should fail with -ETXTBUSY */ diff --git a/fs/9p/vfs_inode.c b/fs/9p/vfs_inode.c index 296482f..735cbf84 100644 --- a/fs/9p/vfs_inode.c +++ b/fs/9p/vfs_inode.c @@ -1130,6 +1130,10 @@ static int v9fs_vfs_setattr(struct dentry *dentry, struct iattr *iattr) if (S_ISREG(dentry-d_inode-i_mode)) filemap_write_and_wait(dentry-d_inode-i_mapping); + retval = setattr_killpriv(dentry, iattr); + if (retval) + return retval; + retval = p9_client_wstat(fid, wstat); if (retval 0) return retval; diff --git a/fs/9p/vfs_inode_dotl.c b/fs/9p/vfs_inode_dotl.c index 02b64f4..f3ca76d 100644 --- a/fs/9p/vfs_inode_dotl.c +++ b/fs/9p/vfs_inode_dotl.c @@ -583,6 +583,10 @@ int v9fs_vfs_setattr_dotl(struct dentry *dentry, struct iattr *iattr) if (S_ISREG(inode-i_mode)) filemap_write_and_wait(inode-i_mapping); + retval =
Bug#769155: kde-workspace-bin: laptop does not go to sleep when critical battery level is reached
Package: kde-workspace-bin Version: 4:4.11.13-2 Followup-For: Bug #769155 Dear Maintainer, Confirming this bug with version 4.11.13-2. I tested booting with linux-image-3.2.0-4-amd64 (3.2.65-1+deb7u1) and the laptop has gone to hibernate when passing the critical level, so I think is related with kernel behaviour. Thank you. Felipe Sologuren -- System Information: Debian Release: 8.0 APT prefers testing APT policy: (600, 'testing'), (500, 'testing-updates'), (500, 'stable-updates'), (500, 'stable'), (100, 'unstable'), (40, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=es_CL.UTF-8, LC_CTYPE=es_CL.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to es_CL.UTF-8) Shell: /bin/sh linked to /bin/bash Init: systemd (via /run/systemd/system) Versions of packages kde-workspace-bin depends on: ii iso-codes 3.57-1 ii kde-runtime 4:4.14.2-2 ii kde-style-oxygen 4:4.11.13-2 ii kde-workspace-data4:4.11.13-2 ii kde-workspace-kgreet-plugins 4:4.11.13-2 ii kscreen 1.0.2.1-1 ii libc6 2.19-13 ii libcln6 1.3.4-1 ii libdbusmenu-qt2 0.9.2-1 ii libfontconfig12.11.0-6.3 ii libfreetype6 2.5.2-2 ii libgcc1 1:4.9.1-19 ii libgl1-mesa-glx [libgl1] 10.3.2-1 ii libice6 2:1.0.9-1+b1 ii libjpeg62-turbo 1:1.3.1-11 ii libkactivities6 4:4.13.3-1 ii libkcmutils4 4:4.14.2-5 ii libkdeclarative5 4:4.14.2-5 ii libkdecore5 4:4.14.2-5 ii libkdesu5 4:4.14.2-5 ii libkdeui5 4:4.14.2-5 ii libkfile4 4:4.14.2-5 ii libkidletime4 4:4.14.2-5 ii libkio5 4:4.14.2-5 ii libknewstuff3-4 4:4.14.2-5 ii libknotifyconfig4 4:4.14.2-5 ii libkparts44:4.14.2-5 ii libkpty4 4:4.14.2-5 ii libkscreensaver5 4:4.11.13-2 ii libkworkspace4abi24:4.11.13-2 ii libnepomukcore4 4:4.14.0-1+b2 ii libpam0g 1.1.8-3.1 ii libphonon44:4.8.0-4 ii libplasma34:4.14.2-5 ii libplasmagenericshell44:4.11.13-2 ii libpng12-01.2.50-2+b2 ii libprocesscore4abi1 4:4.11.13-2 ii libprocessui4a4:4.11.13-2 ii libqalculate5 0.9.7-9 ii libqimageblitz4 1:0.0.6-4 ii libqjson0 0.8.1-3 ii libqt4-dbus 4:4.8.6+git64-g5dc8b2b+dfsg-2+b1 ii libqt4-declarative4:4.8.6+git64-g5dc8b2b+dfsg-2+b1 ii libqt4-sql4:4.8.6+git64-g5dc8b2b+dfsg-2+b1 ii libqt4-xml4:4.8.6+git64-g5dc8b2b+dfsg-2+b1 ii libqtcore44:4.8.6+git64-g5dc8b2b+dfsg-2+b1 ii libqtgui4 4:4.8.6+git64-g5dc8b2b+dfsg-2+b1 ii libsm62:1.2.2-1+b1 ii libsolid4 4:4.14.2-5 ii libsoprano4 2.9.4+dfsg-1.1 ii libstdc++64.9.1-19 ii libstreamanalyzer00.7.8-1.2+b2 ii libudev1 215-11 ii libusb-0.1-4 2:0.1.12-25 ii libx11-6 2:1.6.2-3 ii libxcursor1 1:1.1.14-1+b1 ii libxext6 2:1.3.3-1 ii libxfixes31:5.0.1-2+b2 ii libxft2 2.3.2-1 ii libxi62:1.7.4-1+b2 ii libxinerama1 2:1.1.3-1+b1 ii libxkbfile1 1:1.0.8-1 ii libxrandr22:1.4.2-1+b1 ii libxrender1 1:0.9.8-1+b1 ii libxtst6 2:1.2.2-1+b1 ii phonon4:4.8.0-4 ii plasma-desktop4:4.11.13-2 ii qdbus 4:4.8.6+git64-g5dc8b2b+dfsg-2+b1 ii x11-utils 7.7+2 ii x11-xserver-utils 7.7+3+b1 Versions of packages kde-workspace-bin recommends: ii plasma-scriptengines 4:4.11.13-2 ii policykit-1-gnome 0.105-2 ii polkit-kde-1 0.99.1-1 ii upower0.99.1-3.1 Versions of packages kde-workspace-bin suggests: ii x11-xkb-utils 7.7+1 -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#776611: marked as done ([dirmngr] segfaults)
Your message dated Tue, 17 Feb 2015 00:03:43 + with message-id e1ynvdf-0007up...@franck.debian.org and subject line Bug#776611: fixed in dirmngr 1.1.1-5 has caused the Debian Bug report #776611, regarding [dirmngr] segfaults to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 776611: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776611 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: dirmngr Version: 1.1.1-4 Severity: serious --- Please enter the report below this line. --- i really do not know how to debug it, but .. it always segfaults. [ 14.070905] dirmngr[2239]: segfault at 2 ip 7f5cda9b9ff6 sp 7d09e130 error 4 in libc-2.19.so[7f5cda981000+19f000] [ 15.425365] Bluetooth: BNEP (Ethernet Emulation) ver 1.3 [ 15.425369] Bluetooth: BNEP filters: protocol multicast [ 15.425377] Bluetooth: BNEP socket layer initialized [ 15.461603] Bluetooth: RFCOMM TTY layer initialized [ 15.461616] Bluetooth: RFCOMM socket layer initialized [ 15.461620] Bluetooth: RFCOMM ver 1.11 [ 411.311408] systemd-default-display-manager-generator[3432]: No default display manager unit service enabled, setup is manual or a sysvinit file [ 411.524582] systemd-default-display-manager-generator[3463]: No default display manager unit service enabled, setup is manual or a sysvinit file [ 444.650080] systemd-default-display-manager-generator[5152]: No default display manager unit service enabled, setup is manual or a sysvinit file [ 444.735631] dirmngr[5172]: segfault at 2 ip 7fadea76fff6 sp 7fff21acd780 error 4 in libc-2.19.so[7fadea737000+19f000] --- System information. --- Architecture: amd64 Kernel: Linux 3.16.0-4-amd64 Debian Release: 8.0 500 wheezy-3.0 debian.tryton.org 500 testing ftp.de.debian.org 500 stable ftp.de.debian.org 500 stable apt.multi24.com 500 jessie-3.2 debian.tryton.org --- Package information. --- Depends (Version) | Installed =-+- adduser | 3.113+nmu3 lsb-base (= 3.2-13) | 4.1+Debian13+nmu1 libassuan0 (= 2.0.2) | 2.1.2-2 libc6 (= 2.15) | libgcrypt11(= 1.5.1) | libgpg-error0 (= 1.10) | libksba8 (= 1.2.0) | libldap-2.4-2 (= 2.4.7) | libpth20 (= 2.0.7) | Package's Recommends field is empty. Package's Suggests field is empty. -- Dipl.-Inf. Univ. Florian Reitmeir E-Mail: n...@multi24.com Tel: +43 650 2661660 Fax: +43 650 2661660 HP: http://net.multi24.com Amraserstr 23 6020 Innsbruck / Austria ---End Message--- ---BeginMessage--- Source: dirmngr Source-Version: 1.1.1-5 We believe that the bug you reported is fixed in the latest version of dirmngr, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 776...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Daniel Kahn Gillmor d...@fifthhorseman.net (supplier of updated dirmngr package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 16 Feb 2015 18:40:55 -0500 Source: dirmngr Binary: dirmngr Architecture: source Version: 1.1.1-5 Distribution: unstable Urgency: medium Maintainer: Debian GnuPG-Maintainers pkg-gnupg-ma...@lists.alioth.debian.org Changed-By: Daniel Kahn Gillmor d...@fifthhorseman.net Description: dirmngr- server for managing certificate revocation lists Closes: 776611 Changes: dirmngr (1.1.1-5) unstable; urgency=medium . * Avoid segfault when DIR.txt is empty (Closes: #776611) Checksums-Sha1: b6aaa39138cd2f08210f89a210f44a0a3bf2d1b0 2253 dirmngr_1.1.1-5.dsc 53cc6f6b5af8cd4d4d61f28912225f0486db45bd 9952 dirmngr_1.1.1-5.debian.tar.xz Checksums-Sha256: 8e463fd2f85009035424aecd3b1893ae78ff996f53db45e578a8718e11258b95 2253 dirmngr_1.1.1-5.dsc 8b3005a890cc9ffed63c8e65209aaefe68a73b20b830b5f5c1a2e0d2dd6ce65d 9952 dirmngr_1.1.1-5.debian.tar.xz Files: 54b762adf7842084d7621d5c13c0af08 2253 utils optional dirmngr_1.1.1-5.dsc 5fa4d5973daf1f01e4f72ccdbc963a20 9952 utils optional dirmngr_1.1.1-5.debian.tar.xz -BEGIN PGP SIGNATURE- Version: GnuPG v1
Processed: Re: [Pkg-gnupg-maint] Bug#776611: [dirmngr] segfaults
Processing control commands: tags 776611 - moreinfo unreproducible Bug #776611 [dirmngr] [dirmngr] segfaults Removed tag(s) unreproducible and moreinfo. -- 776611: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776611 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#776611: [Pkg-gnupg-maint] Bug#776611: [dirmngr] segfaults
Control: tags 776611 - moreinfo unreproducible Hi Florian-- Sorry for taking a little while to get to this... On Thu 2015-02-05 02:59:28 -0500, Florian Reitmeir wrote: cat /var/log/dirmngr/dirmngr.log 2015-02-02 06:36:34 dirmngr[3324.0] permanently loaded certificates: 0 2015-02-02 06:36:34 dirmngr[3324.0] runtime cached certificates: 0 2015-02-02 16:02:48 dirmngr[2517.0] permanently loaded certificates: 0 2015-02-02 16:02:48 dirmngr[2517.0] runtime cached certificates: 0 2015-02-03 22:48:20 dirmngr[2384.0] permanently loaded certificates: 0 2015-02-03 22:48:20 dirmngr[2384.0] runtime cached certificates: 0 [...] attached is a stack trace, .. Thanks for this information! It looks to me like the errors are related to loading the CRL cache. (in particular, in open_dir() in src/crlcache.c). I think i'm now able to reproduce this. I suspect you have a zero-length file in /var/cache/dirmngr/crls.d/DIR.txt, is that correct? can you show me the output of: stat /var/cache/dirmngr/crls.d/DIR.txt If you move that file out of the way, can you start dirmngr without it crashing? mv /var/cache/dirmngr/crls.d/DIR.txt /var/cache/dirmngr/crls.d/DIR.txt.bak If this works, do you have any idea how dirmngr's crlcache got into this state? I'm working on a patch now. --dkg signature.asc Description: PGP signature
Processed: Re: Bug#778509: freecad crashes whis SIGSEV when attempting to save a file created in a previous session
Processing commands for cont...@bugs.debian.org: severity 778509 minor Bug #778509 [freecad] freecad crashes whis SIGSEV when attempting to save a file created in a previous session Severity set to 'minor' from 'grave' tags 778509 +unreproducible Bug #778509 [freecad] freecad crashes whis SIGSEV when attempting to save a file created in a previous session Added tag(s) unreproducible. thanks Stopping processing here. Please contact me if you need assistance. -- 778509: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778509 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#778509: freecad crashes whis SIGSEV when attempting to save a file created in a previous session
severity 778509 minor tags 778509 +unreproducible thanks I am not able to reproduce the bug too. Please try the workaround proposed by Yorik and let us know whether it works. Thanks Anton -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#774436: 774436
Hi all, i have installed (4 days ago) debian wheezy 7.8.0 from the i386-LXDE-live-image from here http://cdimage.debian.org/debian-cd/current-live/i386/iso-hybrid/. My CPU: $: cat /proc/cpuinfo processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 13 model name : Intel(R) Pentium(R) M processor 1.70GHz stepping : 6 microcode : 0x18 cpu MHz : 600.000 cache size : 2048 KB fdiv_bug : no hlt_bug : no f00f_bug : no coma_bug : no fpu : yes fpu_exception : yes cpuid level : 2 wp : yes flags : fpu vme de pse tsc msr mce cx8 sep mtrr pge mca cmov clflush dts acpi mmx fxsr sse sse2 ss tm pbe up bts est tm2 bogomips : 1198.82 clflush size : 64 cache_alignment : 64 address sizes : 36 bits physical, 32 bits virtual power management: is inside a Thinkpad T42. after the fresh install: (lxde-session) suspend and hibernate, causes that the fan spinning at maximum speed and there was no way to wakeup the system after update and dist-ugrade (2 days ago): (lxde-session) suspend and hibernate, put the laptop (i guess) in the hibernation-/suspend-state and the fan goes off now i can press the power-button, but again only the fan spinning at maximum speed and the system remains off Before I have installed plain debian, crunchbang was running on this thinkpad T42. These crunchbang was also based on debian wheezy (stable). With crunchbang (offers only suspend) suspend does the expected job. For now, it maybe depends on my bad english/linux skills, i can not extract from the Bug report log - #774436 a way to fix these bug for me. Please can someone post a little bit more detailed instructions, how to fix this? Or is there no way at present? Thank you Marcus
Bug#778336: marked as done (pastebinit: fails in the default configuration)
Your message dated Tue, 17 Feb 2015 04:48:47 + with message-id e1yna5x-0006qm...@franck.debian.org and subject line Bug#778336: fixed in pastebinit 1.4-4 has caused the Debian Bug report #778336, regarding pastebinit: fails in the default configuration to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 778336: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778336 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: pastebinit Version: 1.4-3 Severity: important Dear Maintainer, * What led up to the situation? I wanted to paste my piece of code. * What exactly did you do (or not do) that was effective (or ineffective)? I've run: echo foo\nq\nb\nc | pastebinit * What was the outcome of this action? The output is: Bad API request, invalid api_dev_key * What outcome did you expect instead? I'd expect a link like: http://pastebin.com/FKViEqGi It seems to me that http://pastebin.com, the default paste service, became closed to anonymous pasting. The package is not usable by default and needs some tinkering to make it work. This is a workaround: $ echo foo\nq\nb\nc | pastebinit -b http://paste.debian.net but remember also: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=760341 Cheers, Tomasz -- System Information: Debian Release: 8.0 APT prefers testing APT policy: (990, 'testing'), (200, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=es_ES.utf8, LC_CTYPE=es_ES.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages pastebinit depends on: ii python3 3.4.2-2 Versions of packages pastebinit recommends: ii lsb-release 4.1+Debian13+nmu1 pastebinit suggests no packages. -- no debconf information ---End Message--- ---BeginMessage--- Source: pastebinit Source-Version: 1.4-4 We believe that the bug you reported is fixed in the latest version of pastebinit, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 778...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Rolf Leggewie f...@rolf.leggewie.biz (supplier of updated pastebinit package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 17 Feb 2015 11:35:07 +0800 Source: pastebinit Binary: pastebinit Architecture: source all Version: 1.4-4 Distribution: unstable Urgency: medium Maintainer: Rolf Leggewie f...@rolf.leggewie.biz Changed-By: Rolf Leggewie f...@rolf.leggewie.biz Description: pastebinit - command-line pastebin client Closes: 760341 778336 Changes: pastebinit (1.4-4) unstable; urgency=medium . [ Andrew Starr-Bochicchio ] * detect_distro_with_python3.patch: Use platform instead of lsb_release to detect the distro as lsb_release is not available under Python 3 (Closes: #760341). pastebinit will now default again to using paste.debian.net on Debian (Closes: #778336). Checksums-Sha1: 8821af2d00036092e8ed0e33458d372c8844d1a0 1877 pastebinit_1.4-4.dsc 1a6efbbc38a228bd49741e8edd43215a47d1fd7b 6264 pastebinit_1.4-4.debian.tar.xz af149b1f2dece87f1eed09ab226f3770790758e2 39290 pastebinit_1.4-4_all.deb Checksums-Sha256: 27228030e1f3af6eb6a8e60af91f5613d15ad0a7429b8a2579a44b61505f350f 1877 pastebinit_1.4-4.dsc e907acfe2dec53ddebe7a52d580dfec35186b7fd3beb5678596ca1fe17874b76 6264 pastebinit_1.4-4.debian.tar.xz f22cee9399a1690c7f2b9e36f49ef1efb53ee80fae2aee03ea13a2647ed8d7fb 39290 pastebinit_1.4-4_all.deb Files: 80ae66a9a95d9affd33bc4dbbf66878c 1877 misc optional pastebinit_1.4-4.dsc eccbc161b385816051c8a6a963c83a53 6264 misc optional pastebinit_1.4-4.debian.tar.xz aa72cf91dadb2894e9927343f2477504 39290 misc optional pastebinit_1.4-4_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBAgAGBQJU4sQ2AAoJEJSEK8huURwx594P/jMmKsFgmUYwwUEDWVOfyE+g HSLxERZnk534K3cYmq/a+Lt/88x+coU1m5svLRgX8/7LoLbs5VZ2ZODOrsHBVo9/ k4UXl2NDW10GRc97Vc/oNTzR4Y6e6fPiVA272/Fx0qVE/DZkzcF97DtD+gMWOZUx VKwsqpZKpg8ZABCR4m7gsmK4z4paT9IqzUCqib72gtJysMQRlQrT4ISVo/t7I25/
Bug#778336: pastebinit: fails in the default configuration
On 17.02.2015 01:49, Andrew Starr-Bochicchio wrote: This could be fixed by fixing #760341 so that pastebinit defaults to paste.debian.net The root cause of that is lsb-release doesn't support Python 3, breaking the distro detection. The attached patch works around that by using platform to detect the distribution instead. Thanks, everyone, especially Andrew. I'm preparing an upload as we speak. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#733386: I want to give you a free marketing system
I want to give you a free marketing system. *One that gives you all the marketing* *resources and training you need* If you are as smart as I think you are, You will be one of those who joins. Because this is the perfect Here's how you can easily have 1 paid signup a day. The key word there being 'Easily' First you need the perfect offer. Something everyone can afford because it's so ridiculously cheap. *One that has No monthly auto-ship* *fees, EVER.* *One that gives you all the marketing* *resources and training you need for* *FREE.* One that's available to anyone anywhere in the world. Not just in one or two countries. *One that has a ZERO attrition rate.* *Nobody ever quits so your down line* *and income are safe.* *And one that has thousands of team* *members ready and willing to help* *you any way they can.* If you are as smart as I think you are, you will be one of those who joins. Because this is the perfect offer – http://xtremelifestylesnetwork.com/brennie See how this low ticket offer is making people a lot of money very quickly and why we have over 1000 people joining our team every week. Think BIG My Friend, Brenda brenv...@gmail.com
Bug#777540: The libhtp SONAME mismatch *is* a policy violation.
* Julien Cristau: 1. Override upstream's decision to change the SONAME with every release. I am not entirelysure how stable libhtp's API/ABI should be considered -- looking at changes and deciding on compatibility issues making those decisions would certainly put a burden on the maintainer in the future (although the .symbols mechanism helps for obvious cases such as removed APIs.) I am attaching a patch to drop the -release parameter from the libtool call, libhtp.so.1.0.0 (instead of libhtp-0.5.15.so.1.0.0) is generated. The .symbols file would need to be updated to reflect that change, too, of course. 2. Since suricata is the only reverse dependency of libhtp and contains a copy of libhtp within its source tarball, so we could drop the libhtp package altogether and use that embedded copy instead, at least for the jessie release. 3. Change the binary package name to reflect the SONAME -- for instance libhtp-0.5.15. I believe that we are too late in the freeze to be adding new binary package names. For jessie, 2 sounds like the best way to go IMO. Thank you. Could somebody please decide about #777042 (unblock: suricata/2.0.6-1)? A positive answer, together with the decision to use the copy of the libhtp sources shipped as part of suricata for jessie, would also take care of #777040 (unblock: libhtp/0.5.16-1), as well as security issues #774897, #777522, and #777523. Cheers, -Hilko -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#778387: marked as done (cups: CVE-2014-9679)
Your message dated Mon, 16 Feb 2015 15:35:00 + with message-id e1ynnhm-0005os...@franck.debian.org and subject line Bug#778387: fixed in cups 1.7.5-11 has caused the Debian Bug report #778387, regarding cups: CVE-2014-9679 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 778387: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778387 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: cups Severity: grave Tags: security This was assigned CVE-2014-9679 and is fixed in experimental already: https://www.cups.org/str.php?L4551 Cheers, Moritz ---End Message--- ---BeginMessage--- Source: cups Source-Version: 1.7.5-11 We believe that the bug you reported is fixed in the latest version of cups, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 778...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Didier Raboud o...@debian.org (supplier of updated cups package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Mon, 16 Feb 2015 08:19:17 +0100 Source: cups Binary: libcups2 libcupsimage2 libcupscgi1 libcupsmime1 libcupsppdc1 cups cups-core-drivers cups-daemon cups-client libcups2-dev libcupsimage2-dev libcupscgi1-dev libcupsmime1-dev libcupsppdc1-dev cups-bsd cups-common cups-server-common cups-ppdc cups-dbg Architecture: source all Version: 1.7.5-11 Distribution: unstable Urgency: medium Maintainer: Debian Printing Team debian-print...@lists.debian.org Changed-By: Didier Raboud o...@debian.org Description: cups - Common UNIX Printing System(tm) - PPD/driver support, web interfa cups-bsd - Common UNIX Printing System(tm) - BSD commands cups-client - Common UNIX Printing System(tm) - client programs (SysV) cups-common - Common UNIX Printing System(tm) - common files cups-core-drivers - Common UNIX Printing System(tm) - PPD-less printing cups-daemon - Common UNIX Printing System(tm) - daemon cups-dbg - Common UNIX Printing System(tm) - debugging symbols cups-ppdc - Common UNIX Printing System(tm) - PPD manipulation utilities cups-server-common - Common UNIX Printing System(tm) - server common files libcups2 - Common UNIX Printing System(tm) - Core library libcups2-dev - Common UNIX Printing System(tm) - Development files CUPS library libcupscgi1 - Common UNIX Printing System(tm) - CGI library libcupscgi1-dev - Common UNIX Printing System(tm) - Development files for CGI libra libcupsimage2 - Common UNIX Printing System(tm) - Raster image library libcupsimage2-dev - Common UNIX Printing System(tm) - Development files CUPS image li libcupsmime1 - Common UNIX Printing System(tm) - MIME library libcupsmime1-dev - Common UNIX Printing System(tm) - Development files MIME library libcupsppdc1 - Common UNIX Printing System(tm) - PPD manipulation library libcupsppdc1-dev - Common UNIX Printing System(tm) - Development files PPD library Closes: 778387 Changes: cups (1.7.5-11) unstable; urgency=medium . * Backport upstream patch to fix cupsRasterReadPixels buffer overflow with invalid page header and compressed raster data (STR: #4551, Closes: #778387) Checksums-Sha1: 0d06c04f7f61af881e9a100445d54aa74af09399 3422 cups_1.7.5-11.dsc bf4f69bcd046a466abe3a48c43700334a028f64a 299988 cups_1.7.5-11.debian.tar.xz 1089a8e354d35a7bd26dc1ae786b8a83a418477b 273296 cups-common_1.7.5-11_all.deb 12f8f4f912f5be905a00d56a462531a6fcb94842 617716 cups-server-common_1.7.5-11_all.deb Checksums-Sha256: 4ebab03610537e2649fb148c2cf912fb863e93d741dcf531903fc74c12013864 3422 cups_1.7.5-11.dsc 6c45561b13b1212df32c9932ee6da439e0f4b2c232b16def4b1ef4176e0d0f4f 299988 cups_1.7.5-11.debian.tar.xz 1e79213e95efdf6ab0bc271208be0511e64a312a7c0a49c469960e19327f4a49 273296 cups-common_1.7.5-11_all.deb e06c7fb0075e6ee2677052aba4befcc6a7cedf58dbd8e8b938604baac1d21dcc 617716 cups-server-common_1.7.5-11_all.deb Files: 7f2e3eea3e1d002892aa6b15d2e174c7 3422 net optional cups_1.7.5-11.dsc 8394c078f90712e4ef15fce902245247 299988 net optional cups_1.7.5-11.debian.tar.xz c650b71fccf7b0179b1bbd8724ab011b 273296 net optional cups-common_1.7.5-11_all.deb d549c0ad7d09ae9e463d91ac801527dc
Bug#773625: marked as done (nss: CVE-2014-1569 information leak)
Your message dated Mon, 16 Feb 2015 15:39:34 + with message-id e1ynnlm-000668...@franck.debian.org and subject line Bug#773625: fixed in nss 3.12.8-1+squeeze11 has caused the Debian Bug report #773625, regarding nss: CVE-2014-1569 information leak to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 773625: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773625 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- package: src:nss version: 3.12.8-1 severity: serious tag: security An information leak issue was disclosed for nss, fixed in 3.17.3: https://security-tracker.debian.org/tracker/CVE-2014-1569 Best wishes, Mike ---End Message--- ---BeginMessage--- Source: nss Source-Version: 3.12.8-1+squeeze11 We believe that the bug you reported is fixed in the latest version of nss, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 773...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Raphaël Hertzog hert...@debian.org (supplier of updated nss package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Mon, 16 Feb 2015 14:49:54 +0100 Source: nss Binary: libnss3-1d libnss3-tools libnss3-dev libnss3-1d-dbg Architecture: source amd64 Version: 3.12.8-1+squeeze11 Distribution: squeeze-lts Urgency: medium Maintainer: Maintainers of Mozilla-related packages pkg-mozilla-maintain...@lists.alioth.debian.org Changed-By: Raphaël Hertzog hert...@debian.org Description: libnss3-1d - Network Security Service libraries libnss3-1d-dbg - Debugging symbols for the Network Security Service libraries libnss3-dev - Development files for the Network Security Service libraries libnss3-tools - Network Security Service tools Closes: 773625 Changes: nss (3.12.8-1+squeeze11) squeeze-lts; urgency=medium . * Non-maintainer upload by the Debian LTS team. * Fix CVE-2011-3389 by backporting the upstream patch: https://hg.mozilla.org/projects/nss/rev/7f7446fcc7ab * Fix CVE-2014-1569 by backporting the upstream patch: https://hg.mozilla.org/projects/nss/rev/a163e09dc4d5 Closes: #773625 Checksums-Sha1: 84415931f675020793b9ae8ce6a67288d501b925 1723 nss_3.12.8-1+squeeze11.dsc f8920a00e2c24ca8c0c5e629324abcf3d17253d0 130249 nss_3.12.8-1+squeeze11.debian.tar.gz 889714beb9dc62992e358158c2bdacb28898a714 1119710 libnss3-1d_3.12.8-1+squeeze11_amd64.deb b0aa028ff6432003a12a5febeeff5ca3797c1a69 449506 libnss3-tools_3.12.8-1+squeeze11_amd64.deb 3059fd5ce7979088c553aeebbfa01947010cbebb 271206 libnss3-dev_3.12.8-1+squeeze11_amd64.deb a92896123a1d8f2c05c526cbf9641a9f4d7199fa 3276408 libnss3-1d-dbg_3.12.8-1+squeeze11_amd64.deb Checksums-Sha256: 2e48201a04be617203a01e5f23ecc622c439ce226da79bc34c7ce022a69e1bc5 1723 nss_3.12.8-1+squeeze11.dsc dc8e200c7aab08c459fb5b8fc1f174ad5018473a6a81c471d409fd502d2a1280 130249 nss_3.12.8-1+squeeze11.debian.tar.gz 29e391aab31e51a25bdd88917d77c6f57327ea711ef4a6dd29ebe639545cf697 1119710 libnss3-1d_3.12.8-1+squeeze11_amd64.deb fdad9b9e128e4400f617055f3c09a5ee1e33ac044b33ee9358e17ecec6938e02 449506 libnss3-tools_3.12.8-1+squeeze11_amd64.deb 6cc7de56541c381b9b0b760f5b6609fd6154a5bd644e61a95ccc070f9a16396e 271206 libnss3-dev_3.12.8-1+squeeze11_amd64.deb 5601f7afc7de99ea68080eb2db806693748ecda6b0aaa2aae278ce654339f58c 3276408 libnss3-1d-dbg_3.12.8-1+squeeze11_amd64.deb Files: 28f5ee47ce692dc54f53897e18f0125a 1723 libs optional nss_3.12.8-1+squeeze11.dsc 18b4c79097f2a8504ca686bd9b7047b6 130249 libs optional nss_3.12.8-1+squeeze11.debian.tar.gz 108edebab11738cca4d7ea7193a75acb 1119710 libs optional libnss3-1d_3.12.8-1+squeeze11_amd64.deb 2ab095a4d9eab9c02abedc54996b1c87 449506 admin optional libnss3-tools_3.12.8-1+squeeze11_amd64.deb 45445ca987ba335504769399ac7476ed 271206 libdevel optional libnss3-dev_3.12.8-1+squeeze11_amd64.deb 3eb0bbe2f4cb8a2d29c250ff29b9e900 3276408 debug extra libnss3-1d-dbg_3.12.8-1+squeeze11_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v2 Comment: Signed by Raphael Hertzog iQEcBAEBCAAGBQJU4gTYAAoJEAOIHavrwpq5xN0H/jwmrsXYyeb3ImT7bQlo3/l1 cEi/uovfKGAisqTTt0j6cjV/2cJ996DRCMXDXRvb2Cq5ICr0HVKibwp8xIJzuCUG
Bug#778387: marked as done (cups: CVE-2014-9679)
Your message dated Mon, 16 Feb 2015 09:59:21 +0100 with message-id 5614729.fAI7Ie4HPM@gyllingar and subject line Re: Bug#778387: CVE-2014-9679 has caused the Debian Bug report #778387, regarding cups: CVE-2014-9679 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 778387: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778387 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: cups Severity: grave Tags: security This was assigned CVE-2014-9679 and is fixed in experimental already: https://www.cups.org/str.php?L4551 Cheers, Moritz ---End Message--- ---BeginMessage--- Version: 2.0.2-1 Control: tags -1 +patch Hi Moritz, and thanks for the heads'up. Le samedi, 14 février 2015 14.24:43, vous avez écrit : This was assigned CVE-2014-9679 and is fixed in experimental already: https://www.cups.org/str.php?L4551 Here would be the patch for wheezy-security, can I upload ? I'll upload to unstable straight away with the same patch. Cheers, OdyX signature.asc Description: This is a digitally signed message part. ---End Message---
Bug#775913: [Pkg-vala-maintainers] Bug#775913: vala-0.26: CVE-2014-8154: Heap-buffer overflow in vala-gstreamer bindings at Gst.MapInfo()
On 15/02/15 13:24, Andreas Henriksson wrote: Hello Moritz Muehlenhoff. I'm pretty sure this is not the answer you're wishing to hear but I though it's better to give you some reply then not answer at all... On Thu, Feb 12, 2015 at 04:41:47PM +0100, Moritz Muehlenhoff wrote: [...] Heap-buffer overflow in vala-gstreamer bindings at Gst.MapInfo() What's the status? TTBOMK: Fixed in 0.26.2 currently available from experimental. Will likely be available (first in unstable+testing then) in backports archive after the Jessie release. There's a lack of people finding it useful to redo the upstream bugfix releases badly just because of debian policies or whatever the issue is with getting them into testing during freeze. Redoing here means adding this patch: https://git.gnome.org/browse/vala/commit/?h=0.26id=22126ebad3b2133db39bcf301c29c8b78b440f1a I'll see if I can do it sometime this week, if nobody beats me to it. If any NMU-ers read this, feel free to upload without prior notice. Just remember to send a debdiff of what you upload :) Cheers, Emilio -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#775913: [Pkg-vala-maintainers] Bug#775913: vala-0.26: CVE-2014-8154: Heap-buffer overflow in vala-gstreamer bindings at Gst.MapInfo()
On Mon, Feb 16, 2015 at 09:58:09AM +0100, Emilio Pozuelo Monfort wrote: [...] Redoing here means adding this patch: https://git.gnome.org/browse/vala/commit/?h=0.26id=22126ebad3b2133db39bcf301c29c8b78b440f1a [...] And when the next bug report gets in we add another one, and then the next one, . which could all have been avoided if we just shipped already available bugfixes at once instead of waiting for bug reports to trickle in. But ofcourse feel free to NMU! Regards, Andreas Henriksson -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#758746: kde-workspace-bin: Energy saving schemes have no effect
Package: kde-workspace-bin Version: 4:4.11.13-2 Followup-For: Bug #758746 Dear Maintainer, I am still getting the problem. Whenever I close the lid now, the system goes to suspend mode. However, my settings are just to lock the screen in case the lid is closed. -- System Information: Debian Release: 8.0 APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) Versions of packages kde-workspace-bin depends on: ii iso-codes 3.57-1 ii kde-runtime 4:4.14.2-2 ii kde-style-oxygen 4:4.11.13-2 ii kde-workspace-data4:4.11.13-2 ii kde-workspace-kgreet-plugins 4:4.11.13-2 ii kscreen 1.0.2.1-1 ii libc6 2.19-15 ii libcln6 1.3.4-1 ii libdbusmenu-qt2 0.9.2-1 ii libfontconfig12.11.0-6.3 ii libfreetype6 2.5.2-2 ii libgcc1 1:4.9.2-10 ii libgl1-mesa-glx [libgl1] 10.4.2-2 ii libice6 2:1.0.9-1+b1 ii libjpeg62-turbo 1:1.3.1-11 ii libkactivities6 4:4.13.3-1 ii libkcmutils4 4:4.14.2-5 ii libkdeclarative5 4:4.14.2-5 ii libkdecore5 4:4.14.2-5 ii libkdesu5 4:4.14.2-5 ii libkdeui5 4:4.14.2-5 ii libkfile4 4:4.14.2-5 ii libkidletime4 4:4.14.2-5 ii libkio5 4:4.14.2-5 ii libknewstuff3-4 4:4.14.2-5 ii libknotifyconfig4 4:4.14.2-5 ii libkparts44:4.14.2-5 ii libkpty4 4:4.14.2-5 ii libkscreensaver5 4:4.11.13-2 ii libkworkspace4abi24:4.11.13-2 ii libnepomukcore4 4:4.14.0-1+b2 ii libpam0g 1.1.8-3.1 ii libphonon44:4.8.0-5 ii libplasma34:4.14.2-5 ii libplasmagenericshell44:4.11.13-2 ii libpng12-01.2.50-2+b2 ii libprocesscore4abi1 4:4.11.13-2 ii libprocessui4a4:4.11.13-2 ii libqalculate5 0.9.7-9 ii libqimageblitz4 1:0.0.6-4 ii libqjson0 0.8.1-3 ii libqt4-dbus 4:4.8.6+git64-g5dc8b2b+dfsg-2+b1 ii libqt4-declarative4:4.8.6+git64-g5dc8b2b+dfsg-2+b1 ii libqt4-sql4:4.8.6+git64-g5dc8b2b+dfsg-2+b1 ii libqt4-xml4:4.8.6+git64-g5dc8b2b+dfsg-2+b1 ii libqtcore44:4.8.6+git64-g5dc8b2b+dfsg-2+b1 ii libqtgui4 4:4.8.6+git64-g5dc8b2b+dfsg-2+b1 ii libsm62:1.2.2-1+b1 ii libsolid4 4:4.14.2-5 ii libsoprano4 2.9.4+dfsg-1.1 ii libstdc++64.9.2-10 ii libstreamanalyzer00.7.8-1.2+b2 ii libudev1 215-12 ii libusb-0.1-4 2:0.1.12-25 ii libx11-6 2:1.6.2-3 ii libxcursor1 1:1.1.14-1+b1 ii libxext6 2:1.3.3-1 ii libxfixes31:5.0.1-2+b2 ii libxft2 2.3.2-1 ii libxi62:1.7.4-1+b2 ii libxinerama1 2:1.1.3-1+b1 ii libxkbfile1 1:1.0.8-1 ii libxrandr22:1.4.2-1+b1 ii libxrender1 1:0.9.8-1+b1 ii libxtst6 2:1.2.2-1+b1 ii phonon4:4.8.0-5 ii plasma-desktop4:4.11.13-2 ii qdbus 4:4.8.6+git64-g5dc8b2b+dfsg-2+b1 ii x11-utils 7.7+2 ii x11-xserver-utils 7.7+3+b1 Versions of packages kde-workspace-bin recommends: pn plasma-scriptengines none pn polkit-kde-1 | policykit-1-gnome none ii upower0.99.1-3.1 Versions of packages kde-workspace-bin suggests: ii x11-xkb-utils 7.7+1 -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#767616: marked as done (lyx: fails to upgrade from 'testing' - trying to overwrite /usr/share/icons/hicolor/48x48/apps/lyx.png)
Your message dated Mon, 16 Feb 2015 11:33:59 + with message-id e1ynjw7-zk...@franck.debian.org and subject line Bug#767616: fixed in lyx 2.1.3-1 has caused the Debian Bug report #767616, regarding lyx: fails to upgrade from 'testing' - trying to overwrite /usr/share/icons/hicolor/48x48/apps/lyx.png to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 767616: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=767616 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: lyx Version: 2.1.2-3 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Hi, during a test with piuparts I noticed your package fails to upgrade from 'testing'. It installed fine in 'testing', then the upgrade to 'sid' fails because it tries to overwrite other packages files without declaring a Breaks+Replaces relation. See policy 7.6 at http://www.debian.org/doc/debian-policy/ch-relationships.html#s-replaces From the attached log (scroll to the bottom...): Preparing to unpack .../archives/lyx_2.1.2-3_amd64.deb ... Unpacking lyx (2.1.2-3) over (2.1.2-2) ... dpkg: error processing archive /var/cache/apt/archives/lyx_2.1.2-3_amd64.deb (--unpack): trying to overwrite '/usr/share/icons/hicolor/48x48/apps/lyx.png', which is also in package lyx-common 2.1.2-2 dpkg-deb: error: subprocess paste was killed by signal (Broken pipe) Preparing to unpack .../lyx-common_2.1.2-3_all.deb ... Unpacking lyx-common (2.1.2-3) over (2.1.2-2) ... Errors were encountered while processing: /var/cache/apt/archives/lyx_2.1.2-3_amd64.deb cheers, Andreas lyx_2.1.2-3.log.gz Description: application/gzip ---End Message--- ---BeginMessage--- Source: lyx Source-Version: 2.1.3-1 We believe that the bug you reported is fixed in the latest version of lyx, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 767...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Sven Hoexter hoex...@debian.org (supplier of updated lyx package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Mon, 16 Feb 2015 11:55:15 +0100 Source: lyx Binary: lyx lyx-common lyx-dbg fonts-lyx ttf-lyx Architecture: source amd64 all Version: 2.1.3-1 Distribution: unstable Urgency: low Maintainer: Debian LyX Maintainers pkg-lyx-de...@lists.alioth.debian.org Changed-By: Sven Hoexter hoex...@debian.org Description: fonts-lyx - TrueType versions of some TeX fonts used by LyX lyx- document processor lyx-common - architecture-independent files for LyX lyx-dbg- debugging symbols for LyX ttf-lyx- transitional package Closes: 767616 Changes: lyx (2.1.3-1) unstable; urgency=low . * New upstream release. * No longer override_dh_builddep in d/rules - xz is a default for quite some time. * Add Replaces and Breaks to the lyx binary package to support the icon move from lyx-common to lyx which was implemented in 2.1.2-3. Closes: #767616 Checksums-Sha1: a64edae9c119cb116618d17e4069f53da3613d59 2353 lyx_2.1.3-1.dsc eba2e3476967cb33a59b9f7331df472d98d635bf 10778624 lyx_2.1.3.orig.tar.xz 1beac9eb58ab5670b4854dd41e32fa7baf3183d7 28056 lyx_2.1.3-1.debian.tar.xz 80390d4d0a59846f75f9a7dbf4c23aa7d6485474 3744378 lyx_2.1.3-1_amd64.deb 7fabb41ef6e6d065d56a82ef80ac5ce27a43c0d1 6156558 lyx-common_2.1.3-1_all.deb cc1dc4ca37f71cf7c18712d02830fb416323f232 55949420 lyx-dbg_2.1.3-1_amd64.deb c477c3348af170fc77a2a572c18630aad0be31bc 201804 fonts-lyx_2.1.3-1_all.deb 4bac25efaeb06301cd8b31e37d34a2fb965b6c1a 48944 ttf-lyx_2.1.3-1_all.deb Checksums-Sha256: c51606023cef7d610de876aecd4bb5e4e2f2cc870bcd408ab408b5048229c12f 2353 lyx_2.1.3-1.dsc 2fd52e7e5ee372983eb6b0a7f04765cb0df6f8c1f3420081d9f7761acfc75682 10778624 lyx_2.1.3.orig.tar.xz cb5319dc116a3c56b886732470dbf2952e5c6b47dc2d937e9bced6c404a40358 28056 lyx_2.1.3-1.debian.tar.xz bc6a87e5c3a91b28a83afb947ee60858d3bc2dacb89ab1413d55b33260b89def 3744378 lyx_2.1.3-1_amd64.deb fb3acfcd653f14228e7a5ff861cc6936a276bfd7e1182ebeb94ea77611fe 6156558 lyx-common_2.1.3-1_all.deb d43b56cf5249df572f35076f4132a0267937328136b64455174bed409093ce02 55949420 lyx-dbg_2.1.3-1_amd64.deb
Bug#778509: freecad crashes whis SIGSEV when attempting to save a file created in a previous session
It works for me... I'm able to save/restore, no crash. This is most probably a problem related to the 3D driver (the first item of the stack trace is related to OpenGL). Disabling thumbnails in files (Menu Edit - Preferences - General - Document - uncheck Save thumbnails into project files) might solve the problem... Yorik February 16 2015 4:27 AM, Anton Gladky wrote: Hi, tanks for bugreport. What desktop environment do you use? What graphic card/driver do you have? Cheers Anton -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org