Bug#781896: marked as done (baloo4: Baloo needs to depend on libqt4-sql-sqlite to start indexing)
Your message dated Wed, 22 Apr 2015 16:18:56 + with message-id e1ykxmw-0007ic...@franck.debian.org and subject line Bug#781896: fixed in baloo 4:4.14.2-1.1 has caused the Debian Bug report #781896, regarding baloo4: Baloo needs to depend on libqt4-sql-sqlite to start indexing to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 781896: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781896 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: baloo4 Version: 4:4.14.2-1 Severity: serious Justification: Policy 3.5 Dear Maintainer, * What led up to the situation? Installing the package plasma-desktop and then installing baloo4. * What exactly did you do (or not do) that was effective (or ineffective)? Installing libqt4-sql-sqlite was effective since it made baloo4 start indexing files as it should do when it is enabled. * What outcome did you expect instead? That the installation of baloo4 installed libqt4-sql-sqlite as dependency, so it started indexing automatically. -- System Information: Debian Release: 8.0 APT prefers testing-updates APT policy: (500, 'testing-updates'), (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages baloo4 depends on: ii baloo-utils4:4.14.2-1 ii libbaloocore4 4:4.14.2-1 ii libbaloofiles4 4:4.14.2-1 ii libbalooxapian44:4.14.2-1 ii libc6 2.19-17 ii libgcc11:4.9.2-10 ii libkdecore54:4.14.2-5 ii libkdeui5 4:4.14.2-5 ii libkfilemetadata4 4:4.14.0-1+b2 ii libkidletime4 4:4.14.2-5 ii libkio54:4.14.2-5 ii libqjson0 0.8.1-3 ii libqt4-dbus4:4.8.6+git64-g5dc8b2b+dfsg-3 ii libqt4-sql 4:4.8.6+git64-g5dc8b2b+dfsg-3 ii libqtcore4 4:4.8.6+git64-g5dc8b2b+dfsg-3 ii libqtgui4 4:4.8.6+git64-g5dc8b2b+dfsg-3 ii libsolid4 4:4.14.2-5 ii libstdc++6 4.9.2-10 ii libxapian221.2.19-1 baloo4 recommends no packages. baloo4 suggests no packages. -- no debconf information ---End Message--- ---BeginMessage--- Source: baloo Source-Version: 4:4.14.2-1.1 We believe that the bug you reported is fixed in the latest version of baloo, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 781...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Balint Reczey bal...@balintreczey.hu (supplier of updated baloo package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 21 Apr 2015 17:23:58 +0200 Source: baloo Binary: baloo4 baloo baloo-utils libbaloocore4 libbaloofiles4 libbaloopim4 libbalooqueryparser4 libbalooxapian4 baloo-dev baloo-dbg Architecture: source amd64 Version: 4:4.14.2-1.1 Distribution: unstable Urgency: medium Maintainer: Debian/Ubuntu Qt/KDE Maintainers debian-qt-...@lists.debian.org Changed-By: Balint Reczey bal...@balintreczey.hu Description: baloo - transitional package for baloo4 baloo-dbg - debugging symbols for Baloo baloo-dev - development files for Baloo baloo-utils - utilities for Baloo baloo4 - framework for searching and managing metadata libbaloocore4 - core functionality for Baloo libbaloofiles4 - files functionality for Baloo libbaloopim4 - PIM functionality for Baloo libbalooqueryparser4 - query Parser for Baloo libbalooxapian4 - Xapian functionality for Baloo Closes: 765084 781896 Changes: baloo (4:4.14.2-1.1) unstable; urgency=medium . * Non-maintainer upload. * Depend on libqt4-sql-sqlite (Closes: #781896, #765084) Checksums-Sha1: f6057cb2e9f691f534fde4e4ef06ee8778419820 2748 baloo_4.14.2-1.1.dsc 7914aae4c69d9d946c2a9e5f8f100132987bfc1d 9940 baloo_4.14.2-1.1.debian.tar.xz 4c0fdb7af8f081333892153f42c33469cfa51e03 155330 baloo4_4.14.2-1.1_amd64.deb c4c7cf9fb2cc8ddec126458dce4084d5159d5198 5056 baloo_4.14.2-1.1_amd64.deb de5e409d075bebbb3e794c9b6b6b15cfabfe64e9 164134 baloo-utils_4.14.2-1.1_amd64.deb 0bc4582a0d534aa22ff56df042e2da0d8cad11cd 35692
Processed: merging 783099 783107
Processing commands for cont...@bugs.debian.org: merge 783099 783107 Bug #783099 [src:php5] php5: Fileinfo on specific file causes spurious OOM and/or segfault Bug #783107 [src:php5] php5: Fileinfo on specific file causes spurious OOM and/or segfault Merged 783099 783107 thanks Stopping processing here. Please contact me if you need assistance. -- 783099: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783099 783107: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783107 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#760449: marked as done (harden: outdated info)
Your message dated Wed, 22 Apr 2015 13:28:03 + with message-id e1ykuh9-0004rz...@franck.debian.org and subject line Bug#782978: Removed package(s) from unstable has caused the Debian Bug report #760449, regarding harden: outdated info to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 760449: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=760449 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- package: harden severity: serious Hi, The information in harden is seriously outdated. The last upload was my NMU to fix issues for the wheezy release (if we had auto-removals back then, it would not have been in wheezy). It clains to 'make your system hardened', but that's obviously not the case. It's probably better to keep it out of jessie. Cheers, Ivo ---End Message--- ---BeginMessage--- Version: 0.1.38+nmu1+rm Dear submitter, as the package harden has just been removed from the Debian archive unstable we hereby close the associated bug reports. We are sorry that we couldn't deal with your issue properly. For details on the removal, please see https://bugs.debian.org/782978 The version of this package that was in Debian prior to this removal can still be found using http://snapshot.debian.org/. This message was generated automatically; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org. Debian distribution maintenance software pp. Scott Kitterman (the ftpmaster behind the curtain)---End Message---
Bug#776987: nmu patch
apologies, the previous patch didn't apply cleanly. I'm attaching a new one, against the sqlcipher git repo. I think this is ready for nmu, if we're still on time. From 675ede1eff7d271d82695ff2598b4af28399c330 Mon Sep 17 00:00:00 2001 From: Ben Carrillo b...@futeisha.org Date: Wed, 22 Apr 2015 10:15:04 -0400 Subject: [PATCH] Add a different variable for SQLCIPHER version Closes: #776987 The version substitution of the patch 20-change-name-to-sqlcipher was breaking code that relied on the base sqlite library versioning, since this version is made public in the library and some extensions do a hardcoded version check that expects the right sqlite version, instead of the sqlcipher one. This patch changes the behavior of the mentioned debian patch, and allows to version the sqlcipher library number separately (used when configuring the library symbols in the system). --- debian/changelog | 8 + debian/patches/20-change-name-to-sqlcipher.patch | 43 debian/patches/32-fix-pkgconfig-libname.patch| 2 +- 3 files changed, 46 insertions(+), 7 deletions(-) diff --git a/debian/changelog b/debian/changelog index eca50f3..ce265e4 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,11 @@ +sqlcipher (3.2.0-1.1) unstable; urgency=medium + + [ Ben Carrillo ] + * Non-maintainer upload. + * use a separate variable to track SQLCIPHER version (Closes: #776987) + + -- Micah Anderson mi...@debian.org Wed, 22 Apr 2015 10:38:05 -0400 + sqlcipher (3.2.0-1) unstable; urgency=low * updated to latest upstream: v3.2.0 diff --git a/debian/patches/20-change-name-to-sqlcipher.patch b/debian/patches/20-change-name-to-sqlcipher.patch index 4d02dda..64b10c9 100644 --- a/debian/patches/20-change-name-to-sqlcipher.patch +++ b/debian/patches/20-change-name-to-sqlcipher.patch @@ -1,7 +1,38 @@ a/VERSION -+++ b/VERSION -@@ -1 +1 @@ --3.8.6 -\ No newline at end of file +--- a/Makefile.in b/Makefile.in +@@ -89,6 +89,7 @@ TCC += $(OPTS) + VERSION = @VERSION@ + VERSION_NUMBER = @VERSION_NUMBER@ + RELEASE = @RELEASE@ ++SQLCIPHER_VERSION = @SQLCIPHER_VERSION@ + + # Filename extensions + # +--- /dev/null b/VERSION_SQLCIPHER +@@ -0,0 +1 @@ +3.2.0 -\ No newline at end of file +--- a/configure.ac b/configure.ac +@@ -179,6 +179,10 @@ VERSION_NUMBER=[`cat $srcdir/VERSION \ + AC_MSG_NOTICE(Version number set to $VERSION_NUMBER) + AC_SUBST(VERSION_NUMBER) + ++SQLCIPHER_VERSION=[`cat $srcdir/VERSION_SQLCIPHER | sed 's/^\([0-9]*\.*[0-9]*\).*/\1/'`] ++AC_MSG_NOTICE(SQLCipher Version set to $SQLCIPHER_VERSION) ++AC_SUBST(SQLCIPHER_VERSION) ++ + # + # Check to see if the --with-hints=FILE option is used. If there is none, + # then check for a files named $host.hints and ../$hosts.hints where +--- a/sqlcipher.pc.in b/sqlcipher.pc.in +@@ -7,7 +7,7 @@ includedir=@includedir@ + + Name: SQLCipher + Description: SQL database engine +-Version: @PACKAGE_VERSION@ ++Version: @SQLCIPHER_VERSION@ + Libs: -L${libdir} -lsqlcipher + Libs.private: @LIBS@ + Cflags: -I${includedir} diff --git a/debian/patches/32-fix-pkgconfig-libname.patch b/debian/patches/32-fix-pkgconfig-libname.patch index 5a9a920..44c8dfb 100644 --- a/debian/patches/32-fix-pkgconfig-libname.patch +++ b/debian/patches/32-fix-pkgconfig-libname.patch @@ -1,7 +1,7 @@ --- a/sqlcipher.pc.in +++ b/sqlcipher.pc.in @@ -10,4 +10,4 @@ Description: SQL database engine - Version: @PACKAGE_VERSION@ + Version: @SQLCIPHER_VERSION@ Libs: -L${libdir} -lsqlcipher Libs.private: @LIBS@ -Cflags: -I${includedir} -- 2.1.4
Bug#783130: r-base: FTBFS when setting TZ environmental variable
Package: r-base Version: 3.2.0-2 Severity: serious Tags: upstream Justification: fails to build from source (but built successfully in the past) Hi Dirk, I was trying to understand why GNU R FTBFS in the reproducible build env[1] while building fine on the buildds. It turns out that setting the TZ environmental variable[2] crashes the build. *** stack smashing detected ***: /tmp/buildd/r-base-3.2.0/bin/exec/R terminated for a BT see [1] ... The offending command is: echo tools:::sysdata2LazyLoadDB(\./R/sysdata.rda\,\../../../library/tools/R\) | R_DEFAULT_PACKAGES=NULL LC_ALL=C ../../../bin/R --vanilla --slave To reproduce: I followed the steps in https://wiki.debian.org/ReproducibleBuilds/ExperimentalToolchain#Usage_example and used the rebuild.sh from http://anonscm.debian.org/cgit/reproducible/misc.git/tree/prebuilder But I guess just using sudo TZ=/usr/share/zoneinfo/Etc/GMT+12 pbuilder ... should also do the trick. I don't have a clue why this happens - probably something for upstream? Best, Philip [1] https://reproducible.debian.net/rbuild/unstable/amd64/r-base_3.2.0-2.rbuild.log [2] http://www.gnu.org/software/libc/manual/html_node/TZ-Variable.html -- System Information: Debian Release: 8.0 APT prefers testing APT policy: (600, 'testing'), (550, 'unstable'), (500, 'testing-updates'), (450, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#783130: r-base: FTBFS when setting TZ environmental variable
severity 783130 normal thanks Ups, that wasn't intended to be 'serious' Philip -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: r-base: FTBFS when setting TZ environmental variable
Processing commands for cont...@bugs.debian.org: severity 783130 normal Bug #783130 [r-base] r-base: FTBFS when setting TZ environmental variable Severity set to 'normal' from 'serious' thanks Stopping processing here. Please contact me if you need assistance. -- 783130: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783130 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#771203: marked as done (lnav: FTBFS on mips, powerpc and s390x)
Your message dated Wed, 22 Apr 2015 18:20:20 + with message-id e1ykzg0-0003nr...@franck.debian.org and subject line Bug#771203: fixed in lnav 0.7.3-1 has caused the Debian Bug report #771203, regarding lnav: FTBFS on mips, powerpc and s390x to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 771203: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771203 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: lnav Version: 0.7.1-1 Severity: serious Justification: FTBFS lnav/0.7.1-1 uploaded to experimental FTBFS on mips, powerpc and s390x. https://buildd.debian.org/status/fetch.php?pkg=lnavarch=mipsver=0.7.1-1stamp=1417091917 https://buildd.debian.org/status/fetch.php?pkg=lnavarch=powerpcver=0.7.1-1stamp=1417089688 https://buildd.debian.org/status/fetch.php?pkg=lnavarch=s390xver=0.7.1-1stamp=1417089614 ---End Message--- ---BeginMessage--- Source: lnav Source-Version: 0.7.3-1 We believe that the bug you reported is fixed in the latest version of lnav, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 771...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Salvatore Bonaccorso car...@debian.org (supplier of updated lnav package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 22 Apr 2015 19:36:20 +0200 Source: lnav Binary: lnav Architecture: source Version: 0.7.3-1 Distribution: experimental Urgency: medium Maintainer: Salvatore Bonaccorso car...@debian.org Changed-By: Salvatore Bonaccorso car...@debian.org Description: lnav - ncurses-based log file viewer Closes: 771203 Changes: lnav (0.7.3-1) experimental; urgency=medium . * Imported Upstream version 0.7.3 - Fixes FTBFS on big-endian architectures (Closes: #771203) * Update copyright years for upstream files * Add copyright stanzas for new files in source. Add copyright stanzas in debian/copyright for three new files in the sources: m4/lnav_with_readline.m4, m4/lnav_with_sqlite3.m4 and m4/lnav_with_yajl.m4. * debian/copyright: cleanup trailing whitespaces * Fix typo in override target for dh_clean in debian/rules * Referesh default-to-var-log-syslog-on-Debian.patch patch (offset) * Add disable-network-accessing-tests.patch patch. Disable tests which will try to access network. Checksums-Sha1: d67c07fcf4cb1f3a6a21634283d56382464df77b 1922 lnav_0.7.3-1.dsc 522e9482aa1f8f5996e1209ee5f5c2b828b2f48f 499651 lnav_0.7.3.orig.tar.gz 4c1e3b25c752fd3b5c3b7088b78ed36ed54a5c85 5764 lnav_0.7.3-1.debian.tar.xz Checksums-Sha256: 11b3a963bdcf632e59160b35eee5c06bdfe6dda71cf3991230f2e896a040b80c 1922 lnav_0.7.3-1.dsc 501ceec4156347f8ca9e2ed1b31ce9a94075748f8d45b07fb9fbbc239e95 499651 lnav_0.7.3.orig.tar.gz 4a902d96368edf0b644a2ab355635d37a2e86d5fd92054077f64b05428dc83a5 5764 lnav_0.7.3-1.debian.tar.xz Files: fb5cdd6e9d9439a3301d32f9d1a377fb 1922 admin optional lnav_0.7.3-1.dsc 27420c80ee35f3ea0b0808512ae2623b 499651 admin optional lnav_0.7.3.orig.tar.gz 1161b0578526c65701e3d9ea251e1ab9 5764 admin optional lnav_0.7.3-1.debian.tar.xz -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBCgAGBQJVN+E0AAoJEAVMuPMTQ89EY/0P/0en90Q9YTcdpw1QulmBaDer kUrzZKQKOoqoBT5sGss0odRb8kBhZai+16uHNgwMVo4GDXWMCTjAMqo6mvIEl40y ce1nqKOP2jaTCkhRmK3Qon7FLT1pXWUwS5l/oCOccEsGzAiwTVPz18HYGVp/95aR TysyF7DjoUCKVxugES6GHGBC4NTKMMrIYncylrZcUaL3KeSSGO1+BsEwU6pn11ye 7KmGE15xSIoV+2LH1bwHuvq/w7tSW8LwXISZAmmHbV2rb9OcpL6ykK1H9DwU19dO 3MdvynA+r0Nb09qq1U0G136LAprD2ckP4xdQjfTdYsn03zBtX0/hnci6iiWnMIgw 9h4Ws0ZnLSyxcE7rnzTpTme+GxJYqXOk+a1r/P+JYCPsbwxtnNF+YYe1/DIutRhq RUy7TdpvcFflSj1IfHI56BasUJv3o3rLIDN+T4CYXYJWPBMyDBWmedYfsmQ9Iyn/ F9lDxc1tv71sMZjWdKe3sq3TEKLU2v8bAWbLrxsjR0LBWg81sjVhDvDRwH5hc5TE B7wk510xu8TAkIBxItnpw2P3hwFv6mngcs6eFEW5Uc58ddlWvrk10rDY0heHB4st EZ9Gh6bFG8MIgXF9Bojzbi0ZL5gFVyTa3TFHM/+PlpnzajgAXrYo1rRWe/yaeIt/ ImRZrBcLnaUFMsIhE4qb =eGV9 -END PGP SIGNATUREEnd Message---
Bug#779154: marked as done (CVE-2015-2058)
Your message dated Wed, 22 Apr 2015 21:33:15 +0200 with message-id 20150422213315.3ef10...@latte.josefsson.org and subject line Re: CVE-2015-2058 has caused the Debian Bug report #779154, regarding CVE-2015-2058 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 779154: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779154 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: jabberd2 Severity: grave Tags: security This has been assigned CVE-2015-2058: https://github.com/jabberd2/jabberd2/issues/85 Cheers, Moritz ---End Message--- ---BeginMessage--- Should be fixed with the new 2.3.3 upstream upload, alas we forgot to put a Closes changelog entry in it. /Simon pgpD7j8dvXy4w.pgp Description: OpenPGP digital signatur ---End Message---
Processed: found 779154 in 2.2.17+dfsg1-2, fixed 779154 in 2.3.3-1
Processing commands for cont...@bugs.debian.org: found 779154 2.2.17+dfsg1-2 Bug #779154 {Done: Simon Josefsson si...@josefsson.org} [jabberd2] CVE-2015-2058 Marked as found in versions jabberd2/2.2.17+dfsg1-2 and reopened. fixed 779154 2.3.3-1 Bug #779154 [jabberd2] CVE-2015-2058 Marked as fixed in versions jabberd2/2.3.3-1. thanks Stopping processing here. Please contact me if you need assistance. -- 779154: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779154 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#783141: lnav: FTBFS on all architectures on buildds
Source: lnav Version: 0.7.3-1 Severity: serious Justification: FTBFS lnav/0.7.3-1 builded locally in a pbuilder based build environment, but the build seems to hang during tests on all architectures: https://buildd.debian.org/status/package.php?p=lnavsuite=experimental Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#781888: [pkg-cinnamon] Bug#781888: cinnamon-session: session does not start
Hi Maximiliano, thanks for coming back to that. On Tue, 21 Apr 2015, Maximiliano Curia wrote: You seem to have an incomplete upgrade, so my guess is that you are missing to upgrade gir1.2-cinnamondesktop-3.0. If not, let me know if you find which package you were missing to upgrade. ii cinnamon-session-common 2.2.2-5 Well, that's an unexpected missing source:Version I have retried the upgrade, and made sure anything related to cinnamon is at experimenta, at least I hope: ii cinnamon 2.4.8-1 amd64Innovative and comfortable desktop ii cinnamon-common 2.4.8-1 all Innovative and comfortable desktop (Common data files) ii cinnamon-control-center 2.4.2-1 amd64utilities to configure the Cinnamon desktop ii cinnamon-control-center-data 2.4.2-1 all configuration applets for Cinnamon - data files ii cinnamon-desktop-data 2.4.2-1 all Common files for Cinnamon desktop apps ii cinnamon-l10n 2.4.4-1 all Translation files for the Cinnamon desktop ii cinnamon-screensaver 2.4.2-1 amd64Cinnamon screen saver and locker ii cinnamon-session 2.4.3-1 amd64Cinnamon Session Manager - Minimal runtime ii cinnamon-session-common 2.4.3-1 all Cinnamon Session Manager - common files ii cinnamon-settings-daemon 2.4.3-1 amd64daemon handling the Cinnamon session settings ii gir1.2-cinnamondesktop-3.02.4.2-1 amd64Introspection data for CinnamonDesktop ii libcinnamon-control-center1:amd64 2.4.2-1 amd64utilities to configure the Cinnamon desktop ii libcinnamon-desktop4:amd642.4.2-1 amd64Cinnamon library for loading .desktop files ii libcinnamon-menu-3-0 2.4.2-1 amd64Cinnamon implementation of the freedesktop menu specification (forgot to include, nemo and nemo-data is at 2.4.5-1) BUt I still get the following errors when logging in from lightdm into my cinnamon session. At the point where I sent the xsession-errors the X screen contains a window Cinnamon crashed. You are currently running in Fallback Mode. Do you want to restart Cinnamon? here the xsession-errors: Xsession: X session started for norbert at Thu Apr 23 09:32:08 JST 2015 localuser:norbert being added to access control list I: Script for fcitx started at run_im. I: Script for auto started at run_im. I: Script for default started at run_im. I: Script for fcitx started at run_im. (INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon Config File:fcitx-anthy.conf (INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon Config File:fcitx-skk.conf (INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon Config File:fcitx-mozc.conf (INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon Config File:fcitx-spell.conf (INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon Config File:fcitx-unicode.conf (INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon Config File:fcitx-remote-module.conf (INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon Config File:fcitx-quickphrase.conf (INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon Config File:fcitx-punc.conf (INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon Config File:fcitx-keyboard.conf (INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon Config File:fcitx-imselector.conf (INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon Config File:fcitx-fullwidth-char.conf (INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon Config File:fcitx-clipboard.conf (INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon Config File:fcitx-chttrans.conf (INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon Config File:fcitx-autoeng.conf (INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon Config File:fcitx-freedesktop-notify.conf (INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon Config File:fcitx-ipc.conf (INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon Config File:fcitx-dbus.conf (INFO-10763 /tmp/buildd/fcitx-4.2.8.5/src/lib/fcitx/addon.c:151) Load Addon Config
Bug#783082: linux-image-3.16.0-4-586: video players/browsers crash with 'illegal instruction' on i586
Hello hikaru, just saw your report and tried if I could reproduce your issue. But probably you want to reproduce these steps on your hardware to verify that this is really the issue on real hardware. These steps I tried to reproduce: - install a qemu virtual machine with current jessie with some desktop environment and following packages: gdb vlc-dbg libav-dbg - shut down the VM and restarted with forcing it to i586 with these parameters: qemu-system-i386 -cpu pentium ... - started vlc without starting a video - started in a terminal gdb: gdb --pid 984 - issue the command cont - play in vlc a video - at some point I came to the following exception - the command bt shows you the call stack which led to the exception - (to end the crashed vlc issue commands kill and quit) Stack without having debug symbols installed: Program received signal SIGILL, Illegal instruction. [Switching to Thread 0xb17ffb40 (LWP 545)] 0xaf282c93 in ?? () from /usr/lib/i386-linux-gnu/libavcodec.so.56 (gdb) bt #0 0xaf282c93 in ?? () from /usr/lib/i386-linux-gnu/libavcodec.so.56 #1 0xaf2b9680 in ?? () from /usr/lib/i386-linux-gnu/libavcodec.so.56 #2 0xaf2bd816 in ?? () from /usr/lib/i386-linux-gnu/libavcodec.so.56 #3 0xaf274c86 in ?? () from /usr/lib/i386-linux-gnu/libavcodec.so.56 #4 0xaf4e9c9c in avcodec_decode_video2 () from /usr/lib/i386-linux-gnu/libavcodec.so.56 #5 0xb1582801 in ?? () from /usr/lib/vlc/plugins/codec/libavcodec_plugin.so #6 0xb743928e in ?? () from /usr/lib/libvlccore.so.8 #7 0xb743ae57 in ?? () from /usr/lib/libvlccore.so.8 #8 0xb76a0d97 in start_thread (arg=0xb17ffb40) at pthread_create.c:309 #9 0xb75f7dfe in clone () at ../sysdeps/unix/sysv/linux/i386/clone.S:129 (gdb) With debug symbols installed: Program received signal SIGILL, Illegal instruction. [Switching to Thread 0xb227fb40 (LWP 1002)] 0xafcd9c93 in mid_pred (c=0, b=0, a=0) at /build/libav-H9AQHK/libav-11.3/libavcodec/x86/mathops.h:77 77 /build/libav-H9AQHK/libav-11.3/libavcodec/x86/mathops.h: Datei oder Verzeichnis nicht gefunden. (gdb) bt #0 0xafcd9c93 in mid_pred (c=0, b=0, a=0) at /build/libav-H9AQHK/libav-11.3/libavcodec/x86/mathops.h:77 #1 pred_motion (my=synthetic pointer, mx=synthetic pointer, ref=0, list=0, part_width=4, n=0, h=0xb233e4c0) at /build/libav-H9AQHK/libav-11.3/libavcodec/h264_mvpred.h:140 #2 ff_h264_decode_mb_cavlc (h=0xb233e4c0) at /build/libav-H9AQHK/libav-11.3/libavcodec/h264_cavlc.c:959 #3 0xafd10680 in decode_slice (avctx=0xb2338ea0, arg=0xb227f050) at /build/libav-H9AQHK/libav-11.3/libavcodec/h264_slice.c:2275 #4 0xafd14816 in ff_h264_execute_decode_slices (h=0xb233e4c0, context_count=1) at /build/libav-H9AQHK/libav-11.3/libavcodec/h264_slice.c:2369 #5 0xafccbc86 in decode_nal_units (parse_extradata=0, buf_size=74, buf=0xb2302500 , h=0xb233e4c0) at /build/libav-H9AQHK/libav-11.3/libavcodec/h264.c:1662 #6 h264_decode_frame (avctx=0xb2338ea0, data=0xb2303040, got_frame=0xb227f1a8, avpkt=0xb227f1d4) at /build/libav-H9AQHK/libav-11.3/libavcodec/h264.c:1782 #7 0xaff40c9c in avcodec_decode_video2 (avctx=0xb2338ea0, picture=0xb2303040, got_picture_ptr=0xb227f1a8, avpkt=0xb227f1d4) at /build/libav-H9AQHK/libav-11.3/libavcodec/utils.c:1600 #8 0xb2003801 in DecodeVideo (p_dec=0xb2335180, pp_block=0xb227f1a8) at codec/avcodec/video.c:631 #9 0xb74d428e in DecoderDecodeVideo (p_dec=0xb2335180, p_block=0xb2302490) at input/decoder.c:1385 #10 0xb74d5e57 in DecoderProcessVideo (b_flush=optimized out, p_block=0xb2302490, p_dec=optimized out) at input/decoder.c:1631 #11 DecoderProcess (p_block=optimized out, p_dec=optimized out) at input/decoder.c:1810 #12 DecoderThread (p_data=0xb2335180) at input/decoder.c:909 #13 0xb773bd97 in start_thread (arg=0xb227fb40) at pthread_create.c:309 #14 0xb7692dfe in clone () at ../sysdeps/unix/sysv/linux/i386/clone.S:129 (gdb) Current instruction: (gdb) display/i $pc 1: x/i $pc = 0xafc39c93 ff_h264_decode_mb_cavlc+11395: cmovg %edx,%edi libavcodec/x86/mathops.h:77 There we find some inline assembly guarded by an #if HAVE_I686. It looks like that the package libavcodec56 has exactly for this use case 2 version of the shared object packaged: /usr/lib/i386-linux-gnu/libavcodec.so.56.1.0 /usr/lib/i386-linux-gnu/i686/cmov/libavcodec.so.56.1.0 So I started up a local package build for libav which is still running with following lines in: libav-11.3/debian-shared/config.h #define LIBAV_CONFIGURATION --arch=i386 ... --cpu=586 #define HAVE_I686 1 So probably this upstream commit could already be sufficient? [1] configure: Disable i686 for i586 and lower CPUs Kind regards, Bernhard [1] https://git.libav.org/?p=libav.git;a=commit;h=9030c58a780a02fb8256cb75cd39275eaad786d1 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble?
Bug#783154: libwine-development: cannot be installed - try to overwrite ...
Package: libwine-development Version: 1.7.41-1 Severity: grave Justification: renders package unusable Hi there seems to be some replace are missing: Unpacking libwine-development:amd64 (1.7.41-1) over (1.7.29-4) ... dpkg: error processing archive /var/cache/apt/archives/libwine-development_1.7.41-1_amd64.deb (--unpack): trying to overwrite shared '/usr/share/wine-development/wine/fonts/sseriffe.fon', which is different from other instances of package libwine-development:amd64 -- System Information: Debian Release: 8.0 APT prefers unstable APT policy: (500, 'unstable'), (200, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.0.0 (SMP w/4 CPU cores; PREEMPT) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#783154: libwine-development: cannot be installed - try to overwrite ...
Control: forcemerge 781557 -1 Hi, this was already reported, merging the bugs. It should be fixed in 1.7.41-2, which is currently in the new queue: https://ftp-master.debian.org/new/wine-development_1.7.41-2.html Greets jre -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: severity of 783082 is important, reassign 783082 to src:libav
Processing commands for cont...@bugs.debian.org: severity 783082 important Bug #783082 [src:linux] linux-image-3.16.0-4-586: video players/browsers crash with 'illegal instruction' on i586 Severity set to 'important' from 'critical' reassign 783082 src:libav Bug #783082 [src:linux] linux-image-3.16.0-4-586: video players/browsers crash with 'illegal instruction' on i586 Bug reassigned from package 'src:linux' to 'src:libav'. No longer marked as found in versions linux/3.16.7-ckt9-2. Ignoring request to alter fixed versions of bug #783082 to the same values previously set thanks Stopping processing here. Please contact me if you need assistance. -- 783082: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783082 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#783148: wpa: CVE-2015-1863: wpa_supplicant P2P SSID processing vulnerability
Source: wpa Version: 2.3-1 Severity: grave Tags: security upstream patch Justification: user security hole Hi, the following vulnerability was published for wpa. CVE-2015-1863[0]: | P2P SSID processing vulnerability: | A vulnerability was found in how wpa_supplicant uses SSID information | parsed from management frames that create or update P2P peer entries | (e.g., Probe Response frame or number of P2P Public Action frames). SSID | field has valid length range of 0-32 octets. However, it is transmitted | in an element that has a 8-bit length field and potential maximum | payload length of 255 octets. wpa_supplicant was not sufficiently | verifying the payload length on one of the code paths using the SSID | received from a peer device. | | This can result in copying arbitrary data from an attacker to a fixed | length buffer of 32 bytes (i.e., a possible overflow of up to 223 | bytes). The SSID buffer is within struct p2p_device that is allocated | from heap. The overflow can override couple of variables in the struct, | including a pointer that gets freed. In addition about 150 bytes (the | exact length depending on architecture) can be written beyond the end of | the heap allocation. | | This could result in corrupted state in heap, unexpected program | behavior due to corrupted P2P peer device information, denial of service | due to wpa_supplicant process crash, exposure of memory contents during | GO Negotiation, and potentially arbitrary code execution. | | Vulnerable versions/configurations | | wpa_supplicant v1.0-v2.4 with CONFIG_P2P build option enabled | | Attacker (or a system controlled by the attacker) needs to be within | radio range of the vulnerable system to send a suitably constructed | management frame that triggers a P2P peer device information to be | created or updated. | | The vulnerability is easiest to exploit while the device has started an | active P2P operation (e.g., has ongoing P2P_FIND or P2P_LISTEN control | interface command in progress). However, it may be possible, though | significantly more difficult, to trigger this even without any active | P2P operation in progress. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2015-1863 [1] http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt [2] http://w1.fi/security/2015-1/0001-P2P-Validate-SSID-element-length-before-copying-it-C.patch Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: reassign 783041 to installation-reports, reassign 782877 to libgtk2-appindicator-perl, affects 782098
Processing commands for cont...@bugs.debian.org: reassign 783041 installation-reports Bug #783041 [installation-reports (debian 8 jessie di-rc3 installer amd64 dvd)] Advanced Options in Debian 8 Jessie DI-rc3 installer (Debian 8 Jessie DI-rc3 installer AMD64 DVD ( Re-submited) Warning: Unknown package 'debian' Warning: Unknown package '8' Warning: Unknown package 'jessie' Warning: Unknown package 'di-rc3' Warning: Unknown package 'installer' Warning: Unknown package 'amd64' Warning: Unknown package 'dvd' Bug reassigned from package 'installation-reports (debian 8 jessie di-rc3 installer amd64 dvd)' to 'installation-reports'. Ignoring request to alter found versions of bug #783041 to the same values previously set Ignoring request to alter fixed versions of bug #783041 to the same values previously set reassign 782877 libgtk2-appindicator-perl Bug #782877 [src:libgtk-appindicator] libgtk-appindicator: please make the build reproducible Warning: Unknown package 'src:libgtk-appindicator' Bug reassigned from package 'src:libgtk-appindicator' to 'libgtk2-appindicator-perl'. No longer marked as found in versions libgtk-appindicator/0.15-1. Ignoring request to alter fixed versions of bug #782877 to the same values previously set affects 782098 + libgazebo5-dev Bug #782098 [openexr,libopenexr-dev] openexr, libopenexr-dev: directory vs. symlink conflict: /usr/share/doc/{openexr, libopenexr-dev} - /usr/share/doc/libopenexr6 Added indication that 782098 affects libgazebo5-dev thanks Stopping processing here. Please contact me if you need assistance. -- 782098: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782098 782877: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782877 783041: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783041 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#783155: hspec-discover: fails to upgrade from 'sid' - trying to overwrite /usr/bin/hspec-discover
Package: hspec-discover Version: 2.1.5-1 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Hi, during a test with piuparts I noticed your package fails to upgrade from 'sid' to 'experimental'. It installed fine in 'sid', then the upgrade to 'experimental' fails because it tries to overwrite other packages files without declaring a Breaks+Replaces relation. See policy 7.6 at https://www.debian.org/doc/debian-policy/ch-relationships.html#s-replaces From the attached log (scroll to the bottom...): Selecting previously unselected package hspec-discover. Preparing to unpack .../hspec-discover_2.1.5-1_amd64.deb ... Unpacking hspec-discover (2.1.5-1) ... dpkg: error processing archive /var/cache/apt/archives/hspec-discover_2.1.5-1_amd64.deb (--unpack): trying to overwrite '/usr/bin/hspec-discover', which is also in package libghc-hspec-dev 1.11.0-1 dpkg-deb: error: subprocess paste was killed by signal (Broken pipe) Errors were encountered while processing: /var/cache/apt/archives/hspec-discover_2.1.5-1_amd64.deb cheers, Andreas libghc-hspec-dev=1.11.0-1_hspec-discover=2.1.5-1.log.gz Description: application/gzip
Processed: Re: libwine-development: cannot be installed - try to overwrite ...
Processing control commands: forcemerge 781557 -1 Bug #781557 [libwine-development] libwine-development: upgrade failure: file overwrite Bug #783154 [libwine-development] libwine-development: cannot be installed - try to overwrite ... Severity set to 'serious' from 'grave' Marked as found in versions wine-development/1.7.39-1 and wine-development/1.7.38-1. Merged 781557 783154 -- 781557: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781557 783154: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783154 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#779154: CVE-2015-2058
Willem and I are in the process of packaging/uploading the 2.3.3 release which should take care of this. /Simon signature.asc Description: PGP signature
Processed: fileinfo
Processing commands for cont...@bugs.debian.org: clone 783099 -1 -2 Bug #783099 [src:php5] php5: Fileinfo on specific file causes spurious OOM and/or segfault Bug 783099 cloned as bugs 783107-783108 retitle -2 file: OOM and/or segfault Bug #783108 [src:php5] php5: Fileinfo on specific file causes spurious OOM and/or segfault Changed Bug title to 'file: OOM and/or segfault' from 'php5: Fileinfo on specific file causes spurious OOM and/or segfault' thanks Stopping processing here. Please contact me if you need assistance. -- 783099: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783099 783108: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783108 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: file case
Processing commands for cont...@bugs.debian.org: notfound 783108 php5/5.6.7+dfsg-1 Bug #783108 [src:php5] file: OOM and/or segfault No longer marked as found in versions php5/5.6.7+dfsg-1. found 783108 file/1:5.22+15-2 Bug #783108 [src:php5] file: OOM and/or segfault Marked as found in versions file/1:5.22+15-2. thanks Stopping processing here. Please contact me if you need assistance. -- 783108: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783108 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: tagging 783108
Processing commands for cont...@bugs.debian.org: tags 783108 - fixed-upstream Bug #783108 [src:php5] file: OOM and/or segfault Removed tag(s) fixed-upstream. thanks Stopping processing here. Please contact me if you need assistance. -- 783108: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783108 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#771671: Upload pending for #771671 and #782033
Hi, I have uploaded a fixed version to DELAYED/1 with the attached fix. Cheers, Balint diff -Nru kexec-tools-2.0.7/debian/changelog kexec-tools-2.0.7/debian/changelog --- kexec-tools-2.0.7/debian/changelog 2014-11-24 15:35:55.0 +0100 +++ kexec-tools-2.0.7/debian/changelog 2015-04-22 12:06:28.0 +0200 @@ -1,3 +1,11 @@ +kexec-tools (1:2.0.7-5.1) unstable; urgency=medium + + * Non-maintainer upload. + * Don't reboot the machine while removing the package (Closes: #782033) + * Fix loading kdump kernel on i386 (Closes: #771671) + + -- Balint Reczey bal...@balintreczey.hu Wed, 22 Apr 2015 12:04:44 +0200 + kexec-tools (1:2.0.7-5) unstable; urgency=medium * Deleted the extra -x from #!/bin/sh -x in kexec-load init diff -Nru kexec-tools-2.0.7/debian/kexec-load.init.d kexec-tools-2.0.7/debian/kexec-load.init.d --- kexec-tools-2.0.7/debian/kexec-load.init.d 2014-11-24 05:02:10.0 +0100 +++ kexec-tools-2.0.7/debian/kexec-load.init.d 2015-04-22 12:04:36.0 +0200 @@ -109,6 +109,9 @@ exit 0 fi fi + if [ -x /sbin/runlevel -a $(runlevel | awk '{ print $2 }') != 6 ]; then + exit 0 + fi do_stop ;; *) diff -Nru kexec-tools-2.0.7/debian/patches/fix-callback-functions-given-to-kexec_iomem_for_each_line.patch kexec-tools-2.0.7/debian/patches/fix-callback-functions-given-to-kexec_iomem_for_each_line.patch --- kexec-tools-2.0.7/debian/patches/fix-callback-functions-given-to-kexec_iomem_for_each_line.patch 1970-01-01 01:00:00.0 +0100 +++ kexec-tools-2.0.7/debian/patches/fix-callback-functions-given-to-kexec_iomem_for_each_line.patch 2015-04-22 11:59:37.0 +0200 @@ -0,0 +1,44 @@ +Description: Fix callback functions given to kexec_iomem_for_each_line +Author: Bernhard Ãbelacker bernha...@vr-web.de +Bug-Debian: https://bugs.debian.org/771671 +Last-Update: 2014-12-15 + +--- kexec-tools-2.0.7.orig/kexec/arch/i386/crashdump-x86.c kexec-tools-2.0.7/kexec/arch/i386/crashdump-x86.c +@@ -1041,8 +1041,8 @@ int get_max_crash_kernel_limit(uint64_t + + static int crashkernel_mem_callback(void *UNUSED(data), int nr, + char *UNUSED(str), +- unsigned long base, +- unsigned long length) ++ unsigned long long base, ++ unsigned long long length) + { + if (nr = CRASH_RESERVED_MEM_NR) + return 1; +--- kexec-tools-2.0.7.orig/kexec/arch/sh/crashdump-sh.c kexec-tools-2.0.7/kexec/arch/sh/crashdump-sh.c +@@ -34,8 +34,8 @@ static struct memory_range crash_memory_ + static int crash_sh_range_nr; + static int crash_sh_memory_range_callback(void *UNUSED(data), int UNUSED(nr), + char *str, +- unsigned long base, +- unsigned long length) ++ unsigned long long base, ++ unsigned long long length) + { + + struct memory_range *range = crash_memory_range; +--- kexec-tools-2.0.7.orig/kexec/arch/sh/kexec-sh.c kexec-tools-2.0.7/kexec/arch/sh/kexec-sh.c +@@ -24,8 +24,8 @@ static struct memory_range memory_range[ + + static int kexec_sh_memory_range_callback(void *UNUSED(data), int nr, + char *UNUSED(str), +- unsigned long base, +- unsigned long length) ++ unsigned long long base, ++ unsigned long long length) + { + if (nr MAX_MEMORY_RANGES) { + memory_range[nr].start = base; diff -Nru kexec-tools-2.0.7/debian/patches/series kexec-tools-2.0.7/debian/patches/series --- kexec-tools-2.0.7/debian/patches/series 2014-07-25 18:31:19.0 +0200 +++ kexec-tools-2.0.7/debian/patches/series 2015-04-22 12:07:00.0 +0200 @@ -6,3 +6,4 @@ linker-option.patch const_string_warning.patch powerpcspe_support.patch +fix-callback-functions-given-to-kexec_iomem_for_each_line.patch
Processed: reassign 783108 to file
Processing commands for cont...@bugs.debian.org: reassign 783108 file Bug #783108 [src:php5] file: OOM and/or segfault Bug reassigned from package 'src:php5' to 'file'. No longer marked as found in versions file/1:5.22+15-2. Ignoring request to alter fixed versions of bug #783108 to the same values previously set thanks Stopping processing here. Please contact me if you need assistance. -- 783108: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783108 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: .
Processing commands for cont...@bugs.debian.org: tags 771671 pending Bug #771671 [kexec-tools] /sbin/kexec: Unable to load kdump kernel on i386 Added tag(s) pending. tags 782033 pending Bug #782033 [kexec-tools] kexec-tools: Reboots the machine while removing the package Added tag(s) pending. thanks Stopping processing here. Please contact me if you need assistance. -- 771671: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771671 782033: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782033 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#782363: multipath-tools-boot: include dm-service-time in initramfs (new default path selector)
Hi Ritesh, On 04/21/2015 10:14 AM, Ritesh Raj Sarraf wrote: On Saturday 11 April 2015 04:29 AM, Mauricio Faria de Oliveira wrote: May you please consider the attached patch for an upload for jessie? Sorry. I haven't been on top of it. I'll push it for unstable for now. Later we'll do an s-p-u and propose it for jessie. Great, thanks! -- Mauricio Faria de Oliveira IBM Linux Technology Center -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: tagging 780673
Processing commands for cont...@bugs.debian.org: tags 780673 + moreinfo Bug #780673 [gitolite3] gitolite3: git-annex shell is not working: FATAL: bad git-annex-shell command - patch available Added tag(s) moreinfo. thanks Stopping processing here. Please contact me if you need assistance. -- 780673: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780673 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#782400: multipath-tools: libmultipath: fix discovery of devices with empty rev sysfs attribute
Hey Ritesh, On 04/21/2015 10:23 AM, Ritesh Raj Sarraf wrote: Is this been merged upstream ? No, I haven't seen any reply to it on dm-devel nor commits. I have the impression there's some delay between those 2 points. I just pinged Hannes on the mailing list, in case he has some time to check/acknowledge it, so we may have an idea if that's eventually going upstream or requires more changes, before including in Debian. Thanks! -- Mauricio Faria de Oliveira IBM Linux Technology Center -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#783099: php5: Fileinfo on specific file causes spurious OOM and/or segfault
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Source: php5 Version: 5.6.7+dfsg-1 Severity: grave Tags: security, upstream, fixed-upstream Hi, the following vulnerability was published for PHP5, When calling finfo::file() or finfo::buffer() with a crafted string, PHP will crash by either segfaulting or trying to allocate an large amount of memory (4GiB). This was found in the wild when a user uploaded a file (running finfo on arbitrary files uploaded by users is one of its main use cases.). I've since anonymised the file, and made it more minimal. At this stage, very small changes to the string make it produce different behaviour - removing the remaining 'a', 's', or 'y' characters, for instance, will allow finfo to process it fine. For further information see: https://bugs.php.net/bug.php?id=68819 https://git.php.net/?p=php-src.git;a=commitdiff;h=f938112c495b0d26572435c0be73ac0bfe642ecd - -- Henri Salo -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBAgAGBQJVN11hAAoJECet96ROqnV0NFwP/1WyM6/jYhMkuyyjIDuGJLR6 5agci0HcM64R5It7Dvoy7HPtP431Qg5XvtJBn2P5YRq9Kgh1g0T7NeA4jbQIQEQs lj/zO4zfBSnhCvkCbsqhLDYDASx1M2esXgfXy4EDejBPvVMSPtSr3GjVt9Ptufty /GgA3FRf+XDDNNDebGsDVvkKH5pAvK7QN8R8UsmG8uiEYP9+vdlwdAK5pykrWsGa yZEm7x/OXjETTnjIoz+0p89ExFBBuNyryhMQGVfiJxivTMHaHMBuZ/2BlBhIM0S2 VTf42JtlLTmG6NZW71OplY2kN1f+p+ADXy/OUtwbV700tuk58wIwt+r5Ymqa9wmA crO2xyNm2CgA0K6Vew0vEYBWVc7fFQQuGhQX6lKOwng3OXaM3Xo9BzEvrOGVrTgz sw7ilWb4kfUTjtZoAYVOqL0YTafMi3CzjmH3MzeFMyxMRtYlqgc7S+KrqJXWMX2A TlqA2WhAOMIHNG8xxuXdwlzzVRoPakY0Jkgx5XdUlU9QdNmeIljcxdPAIXHAeEAj IPSBQFUjAZABB7GWKgZcyJv6p2Z9nc5GkQ9RYm297QtGbPVYGUfmBZsJOloJfXIF V4dRZWkVoonbaC5WtjaGPyOIHnl35AZ7Hl4MkQ5JMzScbN3u1BooY1+NXNBsHTPL JLN2O58YQiTodP1AZWfx =y0h8 -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#765577: (no subject)
reopen 765577 ! found 765577 215-14 thanks On Mon, Mar 30, 2015 at 06:06:47AM +0200, Marco d'Itri wrote: I see that we have independently devised the same fix, I am attaching a test case and a more refined version of your patch. I tried Jessie RC3 today and immediately found that the fix is, unfortunately, buggy. Your patch constructs a regexp and takes care to escape metacharacters ? and * with a sed but does not escape { and } that are also metacharacters in the extended set of POSIX regexps. These are always found in the string-to-be-matched here with 'ATTR{dev_id}==0x0' and 'ATTR{type}==1', so the if always fails. This was likely not caught by your test case (and was harder to debug and figure out!) because GNU grep's -E mode handles { as both a literal and a metacharacter heuristically for historic reasons (consult grep's manpage for that) but busybox grep does not: $ echo 'foo{bar}' test $ egrep 'foo{bar}' test foo{bar} $ busybox egrep 'foo{bar}' test egrep: bad regex 'foo{bar}' $ egrep 'fo{1,2}' test foo{bar} $ busybox egrep 'fo{1,2}' test foo{bar} Note that this is NOT a bug in busybox; foo{bar} is indeed an invalid extended POSIX regexp and busybox is right to complain and error out. The very minimal last-minute fix below did the trick for me but I have to say... constructing regexps in shell is tricky and the whole escaping-with-sed logic feels like a hack. I think a literal grep (i.e. -F) would be better here, especially since I don't see the point of an exact match (even if the file was modified by the sysadmin, the right thing would to not write a new rule anyway). This is probably something to be considered post-jessie. Thanks, Faidon diff --git a/debian/extra/write_net_rules b/debian/extra/write_net_rules index 38a3ca0..fedc0f1 100644 --- a/debian/extra/write_net_rules +++ b/debian/extra/write_net_rules @@ -118,7 +118,7 @@ basename=${INTERFACE%%[0-9]*} match=$match, KERNEL==\$basename*\ # build a regular expression that matches the new rule that we want to write -new_rule_pattern=$(echo ^SUBSYSTEM==\net\, ACTION==\add\$match | sed -re 's/([\?\*])/\\\1/g') +new_rule_pattern=$(echo ^SUBSYSTEM==\net\, ACTION==\add\$match | sed -re 's/([\?\*\{\}])/\\\1/g') # Double check if the new rule has already been written. This happens if # multiple add events are generated before the script returns and udevd -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#765577: (no subject)
Processing commands for cont...@bugs.debian.org: reopen 765577 ! Bug #765577 {Done: Martin Pitt mp...@debian.org} [udev-udeb] netboot install writes duplicates to 70-persistent-net.rules Bug #777126 {Done: Martin Pitt mp...@debian.org} [udev-udeb] udev: duplicate eth? entries 'reopen' may be inappropriate when a bug has been closed with a version; all fixed versions will be cleared, and you may need to re-add them. Bug reopened Changed Bug submitter to 'Faidon Liambotis parav...@debian.org' from 'Petter Reinholdtsen p...@hungry.com' No longer marked as fixed in versions systemd/219-6 and systemd/215-14. No longer marked as fixed in versions systemd/219-6 and systemd/215-14. found 765577 215-14 Bug #765577 [udev-udeb] netboot install writes duplicates to 70-persistent-net.rules Bug #777126 [udev-udeb] udev: duplicate eth? entries Marked as found in versions systemd/215-14. Marked as found in versions systemd/215-14. thanks Stopping processing here. Please contact me if you need assistance. -- 765577: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765577 777126: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777126 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org