Bug#783374: last NMU patch breaks gparted completely (on my system)
On Fri, 2015-05-01 05:05:10 +0200, Guillem Jover wrote: Control: tag -1 - patch Hi! On Sun, 2015-04-26 at 12:09:16 -0400, Michael Gilbert wrote: On Sun, Apr 26, 2015 at 9:46 AM, Felix Zielcke wrote: Just tried out the newest upload of gparted. Which fails completely The one before which is in jessie works fine. I.e. 0.19.0-2 without the NMU fix gparted needs a newer udisks2, see #782838. Proposed patch attached. diff -Nru gparted-0.19.0/debian/control gparted-0.19.0/debian/control --- gparted-0.19.0/debian/control2014-06-11 14:50:55.0 + +++ gparted-0.19.0/debian/control2015-04-26 16:02:28.0 + @@ -11,7 +11,7 @@ Package: gparted Architecture: any -Depends: ${shlibs:Depends}, ${misc:Depends} +Depends: ${shlibs:Depends}, ${misc:Depends}, udisks2 (= 2.1.5-1) Suggests: xfsprogs, reiserfsprogs, reiser4progs, jfsutils, ntfs-3g, dosfstools, mtools, yelp, kpartx, dmraid, dmsetup, gpart Description: GNOME partition editor As pointed out in #783397 this fix is incorrect. The correct fix is to use a Breaks, so that there's no unnecessary Depends introduced. Thanks, Guillem Hello Guillem, Just to clarify this. ;) I agree there is no need for an unnecessary dependency. As I can see, gparted doesn't break udisks2. Do you mean to add Breaks: udisks2 ( 2.1.5) to gparted's debian/control? Regards, Aníbal signature.asc Description: Digital signature
Processed: severity of 786741 is grave
Processing commands for cont...@bugs.debian.org: # update severity since this might lead to priviledge escalation if an admistrator is tricked into load the update metadata page. severity 786741 grave Bug #786741 [src:horizon] horizon: CVE-2015-3988: Persistent XSS in Horizon metadata dashboard Severity set to 'grave' from 'important' thanks Stopping processing here. Please contact me if you need assistance. -- 786741: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786741 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#713624: marked as done (libsyncml: FTBFS: ld: /usr/lib/gcc/x86_64-linux-gnu/4.8/../../../x86_64-linux-gnu/libcheck_pic.a(check_pack.o): undefined reference to symbol '__pthread_unregister_cancel@@
Your message dated Mon, 25 May 2015 07:49:06 + with message-id e1ywn8e-0004ii...@franck.debian.org and subject line Bug#713624: fixed in libsyncml 0.5.4-2.2 has caused the Debian Bug report #713624, regarding libsyncml: FTBFS: ld: /usr/lib/gcc/x86_64-linux-gnu/4.8/../../../x86_64-linux-gnu/libcheck_pic.a(check_pack.o): undefined reference to symbol '__pthread_unregister_cancel@@GLIBC_2.3.3' to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 713624: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713624 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: libsyncml Version: 0.5.4-2.1 Severity: serious Tags: jessie sid User: debian...@lists.debian.org Usertags: qa-ftbfs-20130620 qa-ftbfs Justification: FTBFS on amd64 Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Maybe you need to add explicitly the offending lib to LD flags. Relevant part: /usr/bin/cc -Wall -g -O2CMakeFiles/datastore.dir/check_ds.o -o datastore -rdynamic libsupport.a ../libsyncml/libsyncml.so.2.4.0 -lglib-2.0 -lgthread-2.0 -lgobject-2.0 -lxml2 -lbluetooth -lwbxml2 -lsoup-2.4 -lgio-2.0 -lglib-2.0 -lgthread-2.0 -lgobject-2.0 -lxml2 -lbluetooth -lwbxml2 -lsoup-2.4 -lgio-2.0 -lopenobex -lcheck_pic -lrt -lm /usr/bin/ld: /usr/lib/gcc/x86_64-linux-gnu/4.8/../../../x86_64-linux-gnu/libcheck_pic.a(check_pack.o): undefined reference to symbol '__pthread_unregister_cancel@@GLIBC_2.3.3' /lib/x86_64-linux-gnu/libpthread.so.0: error adding symbols: DSO missing from command line collect2: error: ld returned 1 exit status The full build log is available from: http://aws-logs.debian.net/ftbfs-logs/2013/06/20/libsyncml_0.5.4-2.1_unstable.log A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! About the archive rebuild: The rebuild was done on EC2 VM instances from Amazon Web Services, using a clean, minimal and up-to-date chroot. Every failed build was retried once to eliminate random failures. ---End Message--- ---BeginMessage--- Source: libsyncml Source-Version: 0.5.4-2.2 We believe that the bug you reported is fixed in the latest version of libsyncml, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 713...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. YunQiang Su s...@debian.org (supplier of updated libsyncml package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Mon, 25 May 2015 14:54:31 +0800 Source: libsyncml Binary: libsyncml2 libsyncml-utils libsyncml-dev libsyncml-doc libsyncml2-dbg Architecture: source amd64 all Version: 0.5.4-2.2 Distribution: unstable Urgency: medium Maintainer: Michael Banck mba...@debian.org Changed-By: YunQiang Su s...@debian.org Description: libsyncml-dev - SyncML protocol development library libsyncml-doc - SyncML protocol library documentation libsyncml-utils - SyncML protocol library utilities libsyncml2 - SyncML protocol library libsyncml2-dbg - Debug symbols for libsyncml2 Closes: 713624 Changes: libsyncml (0.5.4-2.2) unstable; urgency=medium . * Non-maintainer upload. * Link pthread explicitly (Closes: #713624) Checksums-Sha1: 6b2b9e0ff9ecac4bebc8716da44137cce7bb9fb2 1691 libsyncml_0.5.4-2.2.dsc 9958398f8338225be30ceb1bf08084f1b10bf9c3 5722 libsyncml_0.5.4-2.2.diff.gz a2a0a82c0eef3a6fb901e7ba658b6c6cee1ff93e 22744 libsyncml-dev_0.5.4-2.2_amd64.deb 589bf0124310a30ff206ad503882452b0939b023 538396 libsyncml-doc_0.5.4-2.2_all.deb f1aefbabf81c5eca9d195930828eb889b74a06e1 22782 libsyncml-utils_0.5.4-2.2_amd64.deb 6bf2a7e32c53b05bfd1961f1f2bef9a9e0ed341c 296696 libsyncml2-dbg_0.5.4-2.2_amd64.deb 2a32ee49e690ad00865525fbe63044ed60fce511 167572 libsyncml2_0.5.4-2.2_amd64.deb Checksums-Sha256: 9434660873df16509f490e8245af4bacd3d8b104484e6f3815dc93249cca9bba 1691 libsyncml_0.5.4-2.2.dsc 89e5ae9fbcb24dcdbca9c9ded44a6279d6b6e75d030a6db7356f93c5e00fbee1 5722 libsyncml_0.5.4-2.2.diff.gz ad8ff7bc16d63dd1b2ffac711fadb38491efebde24af8b1723471dfb415db59e 22744 libsyncml-dev_0.5.4-2.2_amd64.deb
Bug#786743: obnam: ftbfs, git command not found
source: obnam version: 1.8-1 Severity: serious x-debbugs-cc: reproducible-bui...@lists.alioth.debian.org Hi Lars, While working on the “reproducible builds” effort [1], we have noticed that obnam fails to build from source: [...] running build_scripts creating build/scripts-2.7 copying and adjusting obnam - build/scripts-2.7 copying and adjusting obnam-viewprof - build/scripts-2.7 changing mode of build/scripts-2.7/obnam from 644 to 755 changing mode of build/scripts-2.7/obnam-viewprof from 644 to 755 building manpages make -C manual make[2]: Entering directory '/tmp/buildd/obnam-1.8/manual' /bin/sh: 1: git: not found ./format-pdf obnam-manual.en.pdf Backups with Obnam Lars Wirzenius (l...@liw.fi) Version 1.8 en/010-introduction.mdwn en/020-concepts.mdwn en/040-installing.mdwn en/050-quick-tour.mdwn en/060-backing-up.mdwn en/070-restoring.mdwn en/080-forgetting.mdwn en/090-verifiying.mdwn en/100-many-clients.mdwn en/110-encryption.mdwn en/120- misc.mdwn en/130-case-studies.mdwn en/140-troubleshooting.mdwn en/150-config.mdwn en/900-see-also.mdwn en/980-legalese.mdwn en/990-blurb.mdwn pandoc: Duplicate link reference `[libgfshare]' source (line 1237, column 1) ! LaTeX Error: Command \textquotesingle unavailable in encoding T1. See the LaTeX manual or LaTeX Companion for explanation. Type H return for immediate help. ... l.709 ...\textbackslash{}.mp3\$\textquotesingle{}} pandoc: Error producing PDF from TeX source Makefile:36: recipe for target 'obnam-manual.en.pdf' failed make[2]: *** [obnam-manual.en.pdf] Error 43 make[2]: Leaving directory '/tmp/buildd/obnam-1.8/manual' debian/rules:6: recipe for target 'override_dh_auto_build' failed make[1]: *** [override_dh_auto_build] Error 2 make[1]: Leaving directory '/tmp/buildd/obnam-1.8' debian/rules:3: recipe for target 'build' failed make: *** [build] Error 2 dpkg-buildpackage: error: debian/rules build gave error exit status 2 The full log is available at https://reproducible.debian.net/rbuild/unstable/amd64/obnam_1.8-1.rbuild.log I could also reproduce this issue locally on my laptop with pbuilder. cheers, Holger [1]: https://wiki.debian.org/ReproducibleBuilds signature.asc Description: This is a digitally signed message part.
Bug#786749: libdist-zilla-plugin-podspellingtests-perl: Has been deprecated and replaced upstream, should be replaced with libdist-zilla-plugin-test-podspelling-perl
Package: libdist-zilla-plugin-podspellingtests-perl Version: 1.111520-1 Severity: serious Justification: Maintainer's opinion, deprecated and replaced upstream User: debian-p...@lists.debian.org Usertags: bcn2015 DUCK reports for libdist-zilla-plugin-podspellingtests-perl that https://metacpan.org/release/Dist-Zilla-Plugin-PodSpellingTests as listed in debian/copyright no more exists. The home page of the package already points to https://metacpan.org/release/Dist-Zilla-Plugin-Test-PodSpelling which is the successor module. But this package does not contain the successor modules, they don't seem to be packaged yet. There seem to be no reverse dependencies and popcon is rather low ( 30 installed), so migrating to Dist::Zilla::Plugin::Test::PodSpelling in form of libdist-zilla-plugin-test-podspelling-perl should cause no harm. I'll soon file the according ITP for libdist-zilla-plugin-test-podspelling-perl. -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (990, 'unstable'), (600, 'testing'), (111, 'buildd-unstable'), (111, 'buildd-experimental'), (110, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 4.0.0-1-amd64 (SMP w/4 CPU cores) Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages libdist-zilla-plugin-podspellingtests-perl depends on: ii libdist-zilla-perl 5.020-2 ii libmoose-perl 2.1213-1 ii libpod-wordlist-hanekomu-perl 1.132680-2 ii libtest-spelling-perl 0.20-1 ii perl 5.20.2-6 libdist-zilla-plugin-podspellingtests-perl recommends no packages. libdist-zilla-plugin-podspellingtests-perl suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#785305: keepass2: option to lock workspace on suspend does not work
Hi! Is there any progress on this bug? I really loose Keepass2 a lot and I saw that is marked for removal because of this bug. Can I help you somehow? Has it been forwared to upstream yet? Greetings Peter -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#786758: doomsday: segfault on startup
Package: doomsday Version: 1.14.5-1 Severity: grave Justification: renders package unusable When trying to start doomsday, it pops up a dialog which says: .[ Doomsday Engine ] App init failed: [NotFoundError] (Record::subrecord) Subrecord 'alert' not found ` then crashes with a segmentation fault. I've tried on three different machines (one armhf), same results, which means it's not something related to a particular machine's setup. -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable'), (150, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 4.0.0-x32 (SMP w/6 CPU cores) Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) Versions of packages doomsday depends on: ii libc6 2.19-18 ii libfluidsynth11.1.6-2 ii libgcc1 1:5.1.1-7 ii libgl1-mesa-glx [libgl1] 10.5.5-1 ii libqt4-network4:4.8.6+git155-g716fbae+dfsg-2 ii libqt4-opengl 4:4.8.6+git155-g716fbae+dfsg-2 ii libqtcore44:4.8.6+git155-g716fbae+dfsg-2 ii libqtgui4 4:4.8.6+git155-g716fbae+dfsg-2 ii libsdl-mixer1.2 1.2.12-11+b1 ii libsdl1.2debian 1.2.15-11 ii libstdc++65.1.1-7 ii libx11-6 2:1.6.3-1 ii libxrandr22:1.4.2-1+b1 ii libxxf86vm1 1:1.1.4-1 ii zlib1g1:1.2.8.dfsg-2+b1 Versions of packages doomsday recommends: pn fluid-soundfont-gm none ii game-data-packager 41 doomsday suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#783915: marked as done (whohas: maintainer required)
Your message dated Mon, 25 May 2015 11:19:20 + with message-id e1ywqpg-ei...@franck.debian.org and subject line Bug#783915: fixed in whohas 0.29.1-1 has caused the Debian Bug report #783915, regarding whohas: maintainer required to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 783915: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783915 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: whohas Version: 0.29-0.3 Severity: serious whohas upstream is at best dormant; an ITA bug remains outstanding since January 2013. This bug is to prevent migration to Stretch. If it remains open past 1st June 2015 I will request removal from sid as well (it can easily be reintroduced). https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697137 -- System Information: Debian Release: 8.0 APT prefers stable APT policy: (990, 'stable'), (500, 'testing-proposed-updates'), (500, 'unstable'), (500, 'oldstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) ---End Message--- ---BeginMessage--- Source: whohas Source-Version: 0.29.1-1 We believe that the bug you reported is fixed in the latest version of whohas, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 783...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Paul Wise p...@debian.org (supplier of updated whohas package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 25 May 2015 18:57:19 +0800 Source: whohas Binary: whohas Architecture: source all Version: 0.29.1-1 Distribution: unstable Urgency: low Maintainer: Paul Wise p...@debian.org Changed-By: Paul Wise p...@debian.org Description: whohas - query multiple distributions' package archives Closes: 515510 523497 619992 626138 632976 676471 697137 766473 774271 783915 Changes: whohas (0.29.1-1) unstable; urgency=low . * New upstream release (Closes: #783915) - Fixes memory issue using forks module (Closes: #523497, LP: #690796) - Fixes all existing distro support (Closes: #766473, #774271, #619992, #676471) - Fixes FreeBSD URLs (Closes: #626138) - Adds links for Fedora packages (Closes: #515510) - Adds config file for distro selection/versions (Closes: #632976) * New maintainers (Closes: #697137) * Move git repository to collab-maint * Drop quilt build-dep since it isn't needed with dpkg-source v3 * Add new forks dependency * Adapt packaging to new upstream build system * Bump package to debhelper 9 * Update description to match supported sites * Recommend libsys-cpu-perl for auto-job-count * Adapt watch file to new upstream git repo * Check new upstream OpenPGP signatures * Add some DEP-12 upstream metadata * Use https and cgit for Vcs-* headers * Bump Standards-Version, no changes needed * Remove merged and superseded patches * Switch to Priority optional * 40-improve-fetchdoc: - update for new paths - disable at request of upstream * Re-write debian/copyright in machine-readable form * Remove unneeded libxml-simple-perl dep * Add build-dependencies for the tests Checksums-Sha1: 453c6289c691f5c8ed7215aadc4f73c22733c250 1904 whohas_0.29.1-1.dsc 671a0caaac3ce89d156edff211a1999ebe4a1167 196217 whohas_0.29.1.orig.tar.gz dbe02f632042320737db4ca159577b4c0dbdefe3 9200 whohas_0.29.1-1.debian.tar.xz 052c22a50762b5488415b8c55d77245f1f9d7319 184478 whohas_0.29.1-1_all.deb Checksums-Sha256: 92ac54310a8f03d7cb92346349361e7b064a7976f16633b426bcc01a33fd5aaf 1904 whohas_0.29.1-1.dsc dbf2396838cb0f97726041213c04426b818d48cc510bd529faf30a8411682878 196217 whohas_0.29.1.orig.tar.gz 6696e56be9989a33a5144a3a4ff87dcc47a76759ca79b0a24e74c2ead4772b43 9200 whohas_0.29.1-1.debian.tar.xz 6e15d5e211992da33f929802bd146fb26e2287edc143f539c3c4e461c1ee6430 184478 whohas_0.29.1-1_all.deb Files: c1c5dec84fdcddcb97e0a9ccd1af07bf 1904 utils optional whohas_0.29.1-1.dsc
Bug#786436: ncurses FTBFS: configure loops
On 2015-05-24 03:26 +0200, Thomas Dickey wrote: - Original Message - | From: Helmut Grohne hel...@subdivi.de | To: 786...@bugs.debian.org | Sent: Thursday, May 21, 2015 1:48:24 PM | Subject: Bug#786436: ncurses FTBFS: configure loops | | Control: tags -1 - moreinfo | Control: severity -1 serious | | On Thu, May 21, 2015 at 07:24:18PM +0200, Helmut Grohne wrote: | | Looking for ncursesw-config | | checking for ncursesw-config... no | | checking for ncursesw6-config... no | | checking for ncursesw5-config... no | | There is a notable difference to successful builds here. Those say: | | | checking for ncursesw5-config... ncursesw5-config | | Now where does that come from? ncurses-bin. Well, it came from there, | but it no longer does. On the other hand, I have the impression that Debian packagers would prefer to use .pc files. The log shows that there is no suitable pkg-config for the cross-compiler, so it falls through to the script looking for ncurses*-config Cross-compiler or not, the pkg-config files only work correctly for a library that's already installed in the right place. I did that recently, and verified that the script works with the pkg-config which is part of the MinGW cross-compilers. (If there is something I've overlooked, that would be nice to know). Perhaps the proper fix for your build is to ensure that there is a pkg-config for the cross-build, rather than restoring the ncurses*-config scripts to your build-environment. Since the pkg-config files are only created at make install.libs, we currently need to install the library into a temporary location. I've come up with the following patch: --8---cut here---start-8--- diff --git a/debian/rules b/debian/rules index a52135b..c3b7d6e 100755 --- a/debian/rules +++ b/debian/rules @@ -275,8 +275,9 @@ $(wobjdir-32)/config.status: config.guess-stamp $(objdir-test)/config.status: build-wide config.guess-stamp test -d $(objdir-test) || mkdir $(objdir-test) - cd $(objdir-test) CFLAGS=$(CFLAGS) $(srcdir)/test/configure \ - $(CONFARGS-TEST) + cd $(objdir-test) CFLAGS=$(CFLAGS) \ + PKG_CONFIG_LIBDIR=$(wobjdir)/usr/lib/$(DEB_HOST_MULTIARCH)/pkgconfig \ + $(srcdir)/test/configure $(CONFARGS-TEST) build-arch build-indep: build @@ -308,8 +309,7 @@ build-debug: $(objdir-debug)/config.status build-wide: $(wobjdir)/config.status cd $(wobjdir) $(MAKE) # needed for building the examples - mv $(wobjdir)/lib/libncursesw.so $(wobjdir)/lib/libncursesw.so.saved - echo INPUT(libncursesw.so.5 -ltinfo) $(wobjdir)/lib/libncursesw.so + $(MAKE) -C $(wobjdir) DESTDIR=$(wobjdir) install.libs touch $@ build-wide-static: $(wobjdir-static)/config.status --8---cut here---end---8--- Only tested that debian/rules build-test works in a native build, will need to check full native and cross builds later on. Cheers, Sven -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#786741: [PKG-Openstack-devel] Bug#786741: horizon: CVE-2015-3988: Persistent XSS in Horizon metadata dashboard
Hi, On Mon May 25, 2015 at 07:36:15 +0200, Salvatore Bonaccorso wrote: Source: horizon Version: 2015.1.0-1 Severity: important Tags: security upstream Hi, the following vulnerability was published for horizon. CVE-2015-3988[0]: | Multiple cross-site scripting (XSS) vulnerabilities in OpenStack | Dashboard (Horizon) 2015.1.0 allow remote authenticated users to | inject arbitrary web script or HTML via the metadata to a (1) Glance | image, (2) Nova flavor or (3) Host Aggregate. The patch seems to be https://git.openstack.org/cgit/openstack/horizon/commit/?id=6c944b5013acb0dce7cf3d8717e58f7f2427be07 Cheers, Martin -- Martin Zobel-Helas zo...@debian.orgDebian System Administrator Debian GNU/Linux Developer Debian Listmaster http://about.me/zobel Debian Webmaster GPG Fingerprint: 6B18 5642 8E41 EC89 3D5D BDBB 53B1 AC6D B11B 627B -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed (with 1 errors): limit source to whohas, tagging 676471, tagging 619992, tagging 626138, tagging 515510 ...
Processing commands for cont...@bugs.debian.org: limit source whohas Limiting to bugs with field 'source' containing at least one of 'whohas' Limit currently set to 'source':'whohas' tags 676471 + pending Bug #676471 [whohas] whohas: wrong search address for Fedora packages Ignoring request to alter tags of bug #676471 to the same tags previously set tags 619992 + pending Bug #619992 [whohas] whohas: broken URL to sophie.zarb.org search Ignoring request to alter tags of bug #619992 to the same tags previously set tags 626138 + pending Bug #626138 [whohas] whohas: FreeBSD URLs are wrong Ignoring request to alter tags of bug #626138 to the same tags previously set tags 515510 + pending Bug #515510 [whohas] whohas: please add links for Fedora packages Ignoring request to alter tags of bug #515510 to the same tags previously set tags 523497 + pending Bug #523497 [whohas] whohas: memory pig for some queries (such as sqlite) Bug #560897 [whohas] whohas: massive memory consumption for searches (0.5G per run) Ignoring request to alter tags of bug #523497 to the same tags previously set Ignoring request to alter tags of bug #560897 to the same tags previously set tags 774271 + pending Bug #774271 [whohas] whohas: outdated search references Ignoring request to alter tags of bug #774271 to the same tags previously set tags 783915 + pending Bug #783915 [whohas] whohas: maintainer required Ignoring request to alter tags of bug #783915 to the same tags previously set tags 632976 + pending Bug #632976 [whohas] Configuration mechanism for distro selection. Ignoring request to alter tags of bug #632976 to the same tags previously set tags 697137 + pending source: ' does not match at least one of whohas Failed to alter tags of Bug 697137: limit failed for bugs: 697137. tags 766473 + pending Bug #766473 [whohas] whohas: Outdated or non-functional URLs for several distros Ignoring request to alter tags of bug #766473 to the same tags previously set thanks Stopping processing here. Please contact me if you need assistance. -- 515510: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=515510 523497: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=523497 560897: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560897 619992: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=619992 626138: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=626138 632976: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632976 676471: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=676471 766473: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766473 774271: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774271 783915: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783915 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: limit source to whohas, tagging 619992, tagging 766473, tagging 523497, tagging 783915 ...
Processing commands for cont...@bugs.debian.org: limit source whohas Limiting to bugs with field 'source' containing at least one of 'whohas' Limit currently set to 'source':'whohas' tags 619992 + pending Bug #619992 [whohas] whohas: broken URL to sophie.zarb.org search Added tag(s) pending. tags 766473 + pending Bug #766473 [whohas] whohas: Outdated or non-functional URLs for several distros Added tag(s) pending. tags 523497 + pending Bug #523497 [whohas] whohas: memory pig for some queries (such as sqlite) Bug #560897 [whohas] whohas: massive memory consumption for searches (0.5G per run) Added tag(s) pending. Added tag(s) pending. tags 783915 + pending Bug #783915 [whohas] whohas: maintainer required Added tag(s) pending. tags 626138 + pending Bug #626138 [whohas] whohas: FreeBSD URLs are wrong Added tag(s) pending. tags 632976 + pending Bug #632976 [whohas] Configuration mechanism for distro selection. Added tag(s) pending. tags 515510 + pending Bug #515510 [whohas] whohas: please add links for Fedora packages Added tag(s) pending. tags 676471 + pending Bug #676471 [whohas] whohas: wrong search address for Fedora packages Added tag(s) pending. tags 774271 + pending Bug #774271 [whohas] whohas: outdated search references Added tag(s) pending. thanks Stopping processing here. Please contact me if you need assistance. -- 515510: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=515510 523497: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=523497 560897: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560897 619992: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=619992 626138: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=626138 632976: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632976 676471: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=676471 766473: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766473 774271: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774271 783915: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783915 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#785305: [pkg-cli-apps-team] Bug#785305: keepass2: option to lock workspace on suspend does not work
On Mon, May 25, 2015 at 11:13:02AM +0200, Peter Spiess-Knafl wrote: Hi! Is there any progress on this bug? I really loose Keepass2 a lot and I saw that is marked for removal because of this bug. Can I help you somehow? Has it been forwared to upstream yet? Odd, isn't this the role of GNOME, rather than Keepass2? I'm on Ubuntu and my screen is locked when going into sleep mode under normal circumstances. This is without using Keepass2. -- Kind regards, Loong Jin signature.asc Description: Digital signature
Processed: ITP: libdist-zilla-plugin-test-podspelling-perl -- Author tests for POD spelling
Processing control commands: block 786749 by -1 Bug #786749 [libdist-zilla-plugin-podspellingtests-perl] libdist-zilla-plugin-podspellingtests-perl: Has been deprecated and replaced upstream, should be replaced with libdist-zilla-plugin-test-podspelling-perl 786749 was not blocked by any bugs. 786749 was not blocking any bugs. Added blocking bug(s) of 786749: 786753 -- 786749: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786749 786753: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786753 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: tagging 786749
Processing commands for cont...@bugs.debian.org: tags 786749 + stretch sid Bug #786749 [libdist-zilla-plugin-podspellingtests-perl] libdist-zilla-plugin-podspellingtests-perl: Has been deprecated and replaced upstream, should be replaced with libdist-zilla-plugin-test-podspelling-perl Added tag(s) sid and stretch. thanks Stopping processing here. Please contact me if you need assistance. -- 786749: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786749 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#785305: [pkg-cli-apps-team] Bug#785305: keepass2: option to lock workspace on suspend does not work
On 05/25/2015 12:02 PM, Chow Loong Jin wrote: On Mon, May 25, 2015 at 11:13:02AM +0200, Peter Spiess-Knafl wrote: Hi! Is there any progress on this bug? I really loose Keepass2 a lot and I saw that is marked for removal because of this bug. Can I help you somehow? Has it been forwared to upstream yet? Odd, isn't this the role of GNOME, rather than Keepass2? I'm on Ubuntu and my screen is locked when going into sleep mode under normal circumstances. This is without using Keepass2. I think there is a misunderstanding of the word workspace. An opened keepass file is also called workspace. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#786741: [PKG-Openstack-devel] Bug#786741: Bug#786741: horizon: CVE-2015-3988: Persistent XSS in Horizon metadata dashboard
Hi, On Mon May 25, 2015 at 11:47:17 +0200, Martin Zobel-Helas wrote: Hi, On Mon May 25, 2015 at 07:36:15 +0200, Salvatore Bonaccorso wrote: Source: horizon Version: 2015.1.0-1 Severity: important Tags: security upstream Hi, the following vulnerability was published for horizon. CVE-2015-3988[0]: | Multiple cross-site scripting (XSS) vulnerabilities in OpenStack | Dashboard (Horizon) 2015.1.0 allow remote authenticated users to | inject arbitrary web script or HTML via the metadata to a (1) Glance | image, (2) Nova flavor or (3) Host Aggregate. The patch seems to be https://git.openstack.org/cgit/openstack/horizon/commit/?id=6c944b5013acb0dce7cf3d8717e58f7f2427be07 The above link was for Juno, which is not in Debian. The correct link is https://review.openstack.org/#/c/183656/ Cheers, Martin -- Martin Zobel-Helas zo...@debian.orgDebian System Administrator Debian GNU/Linux Developer Debian Listmaster http://about.me/zobel Debian Webmaster GPG Fingerprint: 6B18 5642 8E41 EC89 3D5D BDBB 53B1 AC6D B11B 627B -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#786436: ncurses FTBFS: configure loops
On Mon, May 25, 2015 at 01:37:17PM +0200, Sven Joachim wrote: Since the pkg-config files are only created at make install.libs, we currently need to install the library into a temporary location. I've come up with the following patch: --8---cut here---start-8--- diff --git a/debian/rules b/debian/rules index a52135b..c3b7d6e 100755 --- a/debian/rules +++ b/debian/rules @@ -275,8 +275,9 @@ $(wobjdir-32)/config.status: config.guess-stamp $(objdir-test)/config.status: build-wide config.guess-stamp test -d $(objdir-test) || mkdir $(objdir-test) - cd $(objdir-test) CFLAGS=$(CFLAGS) $(srcdir)/test/configure \ - $(CONFARGS-TEST) + cd $(objdir-test) CFLAGS=$(CFLAGS) \ + PKG_CONFIG_LIBDIR=$(wobjdir)/usr/lib/$(DEB_HOST_MULTIARCH)/pkgconfig \ + $(srcdir)/test/configure $(CONFARGS-TEST) build-arch build-indep: build @@ -308,8 +309,7 @@ build-debug: $(objdir-debug)/config.status build-wide: $(wobjdir)/config.status cd $(wobjdir) $(MAKE) # needed for building the examples - mv $(wobjdir)/lib/libncursesw.so $(wobjdir)/lib/libncursesw.so.saved - echo INPUT(libncursesw.so.5 -ltinfo) $(wobjdir)/lib/libncursesw.so + $(MAKE) -C $(wobjdir) DESTDIR=$(wobjdir) install.libs touch $@ build-wide-static: $(wobjdir-static)/config.status --8---cut here---end---8--- If ncurses uses any external pkg-config files, then this patch breaks cross building, because the pkg-config cross wrapper only sets PKG_CONFIG_LIBDIR when it is unset. Given that libgpm-dev does not ship a .pc file, it seems likely that this is not the case. Arguably, it is a limitation in the cross wrapper that you cannot extend PKG_CONFIG_LIBDIR. So if ncurses needs this functionality, then a new bug against pkg-config needs to be raised to accommodate this. Helmut -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#776094: dovecot-imapd: corrupts mailbox after trying to retrieve it
Jaldhar, Jelmer: This is serious data corruption bug, and we have a fix for it since 12 days ago. Is there any hope that a fix for this bug is included in Debian 8.1? Release managers say the queue for fixes will be frozen next weekend. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#786715: stellarium: Uses private copies of external headers
Hi, thanks for the report. The upstream is already looking at this. I'll also mention a relevant bug: https://bugreports.qt.io/browse/QTBUG-3897 Tomasz signature.asc Description: Digital signature
Bug#786436: ncurses FTBFS: configure loops
Am 25.05.2015 um 13:43 schrieb Helmut Grohne: On Mon, May 25, 2015 at 01:37:17PM +0200, Sven Joachim wrote: Since the pkg-config files are only created at make install.libs, we currently need to install the library into a temporary location. I've come up with the following patch: --8---cut here---start-8--- diff --git a/debian/rules b/debian/rules index a52135b..c3b7d6e 100755 --- a/debian/rules +++ b/debian/rules @@ -275,8 +275,9 @@ $(wobjdir-32)/config.status: config.guess-stamp $(objdir-test)/config.status: build-wide config.guess-stamp test -d $(objdir-test) || mkdir $(objdir-test) -cd $(objdir-test) CFLAGS=$(CFLAGS) $(srcdir)/test/configure \ -$(CONFARGS-TEST) +cd $(objdir-test) CFLAGS=$(CFLAGS) \ + PKG_CONFIG_LIBDIR=$(wobjdir)/usr/lib/$(DEB_HOST_MULTIARCH)/pkgconfig \ +$(srcdir)/test/configure $(CONFARGS-TEST) build-arch build-indep: build @@ -308,8 +309,7 @@ build-debug: $(objdir-debug)/config.status build-wide: $(wobjdir)/config.status cd $(wobjdir) $(MAKE) # needed for building the examples -mv $(wobjdir)/lib/libncursesw.so $(wobjdir)/lib/libncursesw.so.saved -echo INPUT(libncursesw.so.5 -ltinfo) $(wobjdir)/lib/libncursesw.so +$(MAKE) -C $(wobjdir) DESTDIR=$(wobjdir) install.libs touch $@ build-wide-static: $(wobjdir-static)/config.status --8---cut here---end---8--- If ncurses uses any external pkg-config files, then this patch breaks cross building, because the pkg-config cross wrapper only sets PKG_CONFIG_LIBDIR when it is unset. Given that libgpm-dev does not ship a .pc file, it seems likely that this is not the case. It surely is not, but the cross build is broken anyway: , | checking for specific curses-directory... /tmp/ncurses-5.9+20150516/obj-wide | checking for specified curses library type... ncursesw | checking for multibyte character support... yes | checking pkg-config for ncursesw... yes | checking if the ncursesw package files work... configure: error: cannot run test program while cross compiling ` Sounds like something for Thomas to look at. Cheers, Sven -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#776094: dovecot-imapd: corrupts mailbox after trying to retrieve it
Hi Santiago, On Mon, May 25, 2015 at 01:43:10PM +0200, Santiago Vila wrote: Jaldhar, Jelmer: This is serious data corruption bug, and we have a fix for it since 12 days ago. Is there any hope that a fix for this bug is included in Debian 8.1? Release managers say the queue for fixes will be frozen next weekend. Agreed that we should really try to get this fixed for 8.1. I've just uploaded 2.2.18. I will try to do a stable update as well, but am unfortunately low on Debian time. Help welcome. Cheers, Jelmer signature.asc Description: Digital signature
Bug#786741: marked as done (horizon: CVE-2015-3988: Persistent XSS in Horizon metadata dashboard)
Your message dated Mon, 25 May 2015 12:34:28 + with message-id e1ywrao-0005ez...@franck.debian.org and subject line Bug#786741: fixed in horizon 2015.1.0-2 has caused the Debian Bug report #786741, regarding horizon: CVE-2015-3988: Persistent XSS in Horizon metadata dashboard to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 786741: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786741 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: horizon Version: 2015.1.0-1 Severity: important Tags: security upstream Hi, the following vulnerability was published for horizon. CVE-2015-3988[0]: | Multiple cross-site scripting (XSS) vulnerabilities in OpenStack | Dashboard (Horizon) 2015.1.0 allow remote authenticated users to | inject arbitrary web script or HTML via the metadata to a (1) Glance | image, (2) Nova flavor or (3) Host Aggregate. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2015-3988 Please adjust the affected versions in the BTS as needed. Regards, Salvatore ---End Message--- ---BeginMessage--- Source: horizon Source-Version: 2015.1.0-2 We believe that the bug you reported is fixed in the latest version of horizon, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 786...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thomas Goirand z...@debian.org (supplier of updated horizon package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Tue, 12 May 2015 23:23:46 +0200 Source: horizon Binary: python-django-horizon openstack-dashboard openstack-dashboard-apache Architecture: source all Version: 2015.1.0-2 Distribution: unstable Urgency: high Maintainer: PKG OpenStack openstack-de...@lists.alioth.debian.org Changed-By: Thomas Goirand z...@debian.org Description: openstack-dashboard - web application to control an OpenStack cloud openstack-dashboard-apache - OpenStack Dashboard - Apache support python-django-horizon - Django module providing web interaction with OpenStack Closes: 781680 786741 Changes: horizon (2015.1.0-2) unstable; urgency=high . * Added update for the sv.po debconf translations (Closes: #781680). * Added upstream patch for CVE-2015-3988 (Closes: #786741): Persistent_XSS_in_Horizon_metadata_dashboard.patch Checksums-Sha1: 4b6f92bdbd8654eca05f1535ff904f6857de6fdb 4018 horizon_2015.1.0-2.dsc 2b70850a8835e1a42f581e16201238854a74bcd7 16200 horizon_2015.1.0-2.debian.tar.xz 7f6b57eac9320b7830a366837173bf9e24adefb7 1811472 python-django-horizon_2015.1.0-2_all.deb d4201d5e862605f4ab0926c0d4fee65b31524f04 1613944 openstack-dashboard_2015.1.0-2_all.deb 305d587ebffd1aa8a338f28829a7e4c2d4409c49 11194 openstack-dashboard-apache_2015.1.0-2_all.deb Checksums-Sha256: 44046c5dfa41a2e1d9dd07c1173a2567d10c3032674681c81391d3d03e129d06 4018 horizon_2015.1.0-2.dsc 5fe81ed700a8f33b1dcc2a26dd787ed7f87e46891279b2371a5f4370c2abf58b 16200 horizon_2015.1.0-2.debian.tar.xz c0c09bcc82fc24fb92e8eb886a91a47b10b66dfe50ac5ff974bd97deb57c2b76 1811472 python-django-horizon_2015.1.0-2_all.deb ac7c712cf7ab005a74a5b8aa63207f8bb1aa6a19fb62ffb4701b0844b0b998f7 1613944 openstack-dashboard_2015.1.0-2_all.deb 2d098bc4ca11f4861d6c00f40f0299caf6e779a18a88c86c66f489da9888b823 11194 openstack-dashboard-apache_2015.1.0-2_all.deb Files: fdbdd29c193aa1a2d2f168a2575cab53 4018 net extra horizon_2015.1.0-2.dsc bffc6678189858a13ada0df22603f40a 16200 net extra horizon_2015.1.0-2.debian.tar.xz dda1d3433827ee5cc35f2379eab2e021 1811472 python extra python-django-horizon_2015.1.0-2_all.deb 708d4c7e322a1eba7752840838415d5f 1613944 net extra openstack-dashboard_2015.1.0-2_all.deb ba5b7bf126bdfe953cac06bb81299aee 11194 net extra openstack-dashboard-apache_2015.1.0-2_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBCAAGBQJVYxQoAAoJENQWrRWsa0P+EFYQAI7jMqj45zMigH1E9FHYJifk To/p20b+ktBEWZIpz3VIV8qc75007+cvvrYm8G7waOzqqgnOtVV8jifPOgzd1t5C AtSYc2sAfAK4sJD9zExHhoaITD4e6OI+rfFEghFErigoTq5Em50hgkrR+cA1q4Iv
Bug#776094: dovecot-imapd: corrupts mailbox after trying to retrieve it
Ok. This is my proposal to fix this in stable: https://people.debian.org/~sanvila/dovecot/ Try: debdiff dovecot_2.2.13-11.dsc dovecot_2.2.13-11~deb8u1.dsc and of course feel free to add anything I may have missed. Thanks. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#786778: zendframework: HTTP Client component doesn't work after security upgrade
Package: zendframework Version: 1.12.9+dfsg-2+deb8u2 Severity: critical Justification: breaks unrelated software Dear Maintainer, After upgrading to version 1.12.9+dfsg-2+deb8u2 following security issue in CVE-2015-3154 (https://security-tracker.debian.org/tracker/CVE-2015-3154), the HTTP Client component of the framework throws exceptions after executing a request. These crashes didn't occur before the security upgrade. Code snippet to reproduce the issue: ?php //test.php $httpClient = new \Zend_Http_Client(); $httpClient-setUri('https://www.debian.org/Bugs/'); $response = $httpClient-request('POST'); var_dump($response); Results in: Fatal error: Uncaught exception 'Zend_Http_Exception' with message 'Invalid header value detected' in /debian/zend/library/Zend/Http/Client.php:1597 Stack trace: #0 /debian/zend/library/Zend/Http/Client.php(467): Zend_Http_Client-_validateHeaderValue(0) #1 /debian/zend/library/Zend/Http/Client.php(1358): Zend_Http_Client-setHeaders('Content-Length', 0) #2 /debian/zend/library/Zend/Http/Client.php(1061): Zend_Http_Client-_prepareBody() #3 /debian/test.php(15): Zend_Http_Client-request('POST') #4 {main} thrown in /debian/zend/library/Zend/Http/Client.php on line 1597 In preparebody or setRawData method in Zend_Http_Client.php, there are some calls $this-setHeaders(self::CONTENT_LENGTH, strlen($this-raw_post_data)); the length value is a numeric, but the _validateHeaderValue method that you added in the patch doesn't accept numeric value as argument. This throw the Zend_Http_Exception('Invalid header value detected'); maybe you can cast the value before calling _validateHeaderValue. Best regards, m. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: fixed
Processing commands for cont...@bugs.debian.org: fixed 786469 sysvinit/2.88dsf-59.2 Bug #786469 {Done: Martin Pitt mp...@debian.org} [sysvinit-utils, util-linux] sysvinit-utils, util-linux: can't upgrade - 'installation run will require temporarily removing the essential package' Marked as fixed in versions sysvinit/2.88dsf-59.2. thanks Stopping processing here. Please contact me if you need assistance. -- 786469: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786469 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#786778: zendframework: HTTP Client component doesn't work after security upgrade
Processing control commands: tag -1 moreinfo Bug #786778 [zendframework] zendframework: HTTP Client component doesn't work after security upgrade Added tag(s) moreinfo. -- 786778: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786778 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#786778: zendframework: HTTP Client component doesn't work after security upgrade
Control: tag -1 moreinfo Hi Marc, Thanks for your report. Le 25/05/2015 09:52, Marc Falzon a écrit : Package: zendframework Version: 1.12.9+dfsg-2+deb8u2 the HTTP Client component of the framework throws exceptions after executing a request. These crashes didn't occur before the security upgrade. Code snippet to reproduce the issue: […] Thank you for that! Results in: Fatal error: Uncaught exception 'Zend_Http_Exception' with message I’m able to reproduce the issue with version 1.12.9+dfsg-2+deb8u1, as announced by [DSA 3265-1], but not with version 1.12.9+dfsg-2+deb8u2 that aimed at fixing this regression [1], as announced in [DSA 3265-2]. Can you please double check the actual zendframework version used and come back to us? 1: https://github.com/zendframework/zf1/commit/7d8e6c6cf59ea0b5004960b8402a39f89a9e512a Regards David signature.asc Description: OpenPGP digital signature
Bug#786715: stellarium: Uses private copies of external headers
On Monday 25 May 2015 14:14:53 Tomasz Buchert wrote: Hi, thanks for the report. The upstream is already looking at this. Great. My suggestion would be to go for KArchive on this. I'll also mention a relevant bug: https://bugreports.qt.io/browse/QTBUG-3897 Yeah. That's kind of what my option 4) describes. Likely not going to happen. The QZip classes is just good enough for what Qt internally needs, and there are better external options available. (KArchive, quazip, probably others) /Sune -- I didn’t stop pretending when I became an adult, it’s just that when I was a kid I was pretending that I fit into the rules and structures of this world. And now that I’m an adult, I pretend that those rules and structures exist. - zefrank -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#786778: zendframework: HTTP Client component doesn't work after security upgrade
Hi David On Mon, May 25, 2015 at 4:24 PM, David Prévot da...@tilapin.org wrote: Control: tag -1 moreinfo Hi Marc, Thanks for your report. Le 25/05/2015 09:52, Marc Falzon a écrit : Package: zendframework Version: 1.12.9+dfsg-2+deb8u2 the HTTP Client component of the framework throws exceptions after executing a request. These crashes didn't occur before the security upgrade. Code snippet to reproduce the issue: […] Thank you for that! Results in: Fatal error: Uncaught exception 'Zend_Http_Exception' with message I’m able to reproduce the issue with version 1.12.9+dfsg-2+deb8u1, as announced by [DSA 3265-1], but not with version 1.12.9+dfsg-2+deb8u2 that aimed at fixing this regression [1], as announced in [DSA 3265-2]. Can you please double check the actual zendframework version used and come back to us? My bad, looks like we've tested with version 1.12.9+dfsg-2+deb8u1: version 1.12.9+dfsg-2+deb8u2 seems to fix the issue. This bug can be closed, m.
Bug#786786: libmaven-compiler-plugin-java,libmaven-compiler-plugin-2.5-java: file overwrite: […]/2.5.1/maven-compiler-plugin-2.5.1.jar
Package: libmaven-compiler-plugin-java,libmaven-compiler-plugin-2.5-java Severity: serious Justification: breaks upgrade Hi, Just noticed this during a dist-upgrade: | Preparing to unpack .../libmaven-compiler-plugin-2.5-java_2.5.1-3_all.deb ... | Unpacking libmaven-compiler-plugin-2.5-java (2.5.1-3) ... | dpkg: error processing archive /var/cache/apt/archives/libmaven-compiler-plugin-2.5-java_2.5.1-3_all.deb (--unpack): | trying to overwrite '/usr/share/maven-repo/org/apache/maven/plugins/maven-compiler-plugin/2.5.1/maven-compiler-plugin-2.5.1.jar', which is also in package libmaven-compiler-plugin-java 2.5.1-1 Mraw, KiBi. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#783374: last NMU patch breaks gparted completely (on my system)
Hi! On Mon, 2015-05-25 at 19:51:57 +1000, Aníbal Monsalve Salazar wrote: On Fri, 2015-05-01 05:05:10 +0200, Guillem Jover wrote: Control: tag -1 - patch On Sun, 2015-04-26 at 12:09:16 -0400, Michael Gilbert wrote: On Sun, Apr 26, 2015 at 9:46 AM, Felix Zielcke wrote: Just tried out the newest upload of gparted. Which fails completely The one before which is in jessie works fine. I.e. 0.19.0-2 without the NMU fix gparted needs a newer udisks2, see #782838. Proposed patch attached. diff -Nru gparted-0.19.0/debian/control gparted-0.19.0/debian/control --- gparted-0.19.0/debian/control 2014-06-11 14:50:55.0 + +++ gparted-0.19.0/debian/control 2015-04-26 16:02:28.0 + @@ -11,7 +11,7 @@ Package: gparted Architecture: any -Depends: ${shlibs:Depends}, ${misc:Depends} +Depends: ${shlibs:Depends}, ${misc:Depends}, udisks2 (= 2.1.5-1) Suggests: xfsprogs, reiserfsprogs, reiser4progs, jfsutils, ntfs-3g, dosfstools, mtools, yelp, kpartx, dmraid, dmsetup, gpart Description: GNOME partition editor As pointed out in #783397 this fix is incorrect. The correct fix is to use a Breaks, so that there's no unnecessary Depends introduced. As I can see, gparted doesn't break udisks2. It seems to break in combination with older udisks2. Do you mean to add Breaks: udisks2 ( 2.1.5) to gparted's debian/control? Yes. Thanks, Guillem -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: python-urllib3: AttributeError: 'module' object has no attribute 'PROTOCOL_SSLv3'
Processing commands for cont...@bugs.debian.org: tag 786784 + moreinfo Bug #786784 {Done: Chris Bainbridge chris.bainbri...@gmail.com} [python-urllib3] python-urllib3: AttributeError: 'module' object has no attribute 'PROTOCOL_SSLv3' Added tag(s) moreinfo. thanks Stopping processing here. Please contact me if you need assistance. -- 786784: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786784 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#786784: python-urllib3: AttributeError: 'module' object has no attribute 'PROTOCOL_SSLv3'
tag 786784 + moreinfo thanks Hello Chris, thanks for this report! Chris Bainbridge wrote: Package: python-urllib3 Version: 1.9.1-3 Severity: serious $ python Python 2.7.9 (default, Mar 1 2015, 12:57:24) [GCC 4.9.2] on linux2 Type help, copyright, credits or license for more information. import requests Traceback (most recent call last): File stdin, line 1, in module File requests/__init__.py, line 53, in module from urllib3.contrib import pyopenssl File urllib3/contrib/pyopenssl.py, line 70, in module ssl.PROTOCOL_SSLv3: OpenSSL.SSL.SSLv3_METHOD, AttributeError: 'module' object has no attribute 'PROTOCOL_SSLv3' this bug seems like #781781 and as I said there I'm not able to reproduce it. Can you provide more info? Thanks! Are you using the packaged version on urllib3? If yes there is something really strange since I patched it as explained here: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781781#20 I will try on a fresh Jessie VM (I suppose you are using Jessie since urllib3 version 1.9.1-3), but any info will be very appreciated. Cheers, -- Daniele Tricoli 'Eriol' https://mornie.org signature.asc Description: This is a digitally signed message part.
Bug#786801: nfstrace: FTBFS: test suite errors (esp. #60, json_analyzer)
Source: nfstrace Version: 0.4.0-1 Severity: serious Justification: fails to build from source (but built successfully in the past) Automated builds of nfstrace have been failing with test suite errors. Test #60 fails everywhere: 60/63 Test #60: unit_test_json_analyzer ..***Failed5.36 sec [==] Running 7 tests from 3 test cases. [--] Global test environment set-up. [--] 3 tests from JsonAnalyzerCase [ RUN ] JsonAnalyzerCase.collectStatistics unknown file: Failure C++ exception with description Binding server socket error: Address already in use thrown in SetUp(). [ FAILED ] JsonAnalyzerCase.collectStatistics (0 ms) ... However, some other tests also fail on some architectures, as detailed at https://buildd.debian.org/status/logs.php?pkg=nfstracever=0.4.0-1. Could you please take a look? Thanks! -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: [pkg-php-pear] Bug#786778: zendframework: HTTP Client component doesn't work after security upgrade
Processing control commands: found -1 1.12.9+dfsg-2+deb8u1 Bug #786778 [zendframework] zendframework: HTTP Client component doesn't work after security upgrade Marked as found in versions zendframework/1.12.9+dfsg-2+deb8u1. notfound -1 1.12.9+dfsg-2+deb8u2 Bug #786778 [zendframework] zendframework: HTTP Client component doesn't work after security upgrade No longer marked as found in versions zendframework/1.12.9+dfsg-2+deb8u2. close -1 1.12.9+dfsg-2+deb8u2 Bug #786778 [zendframework] zendframework: HTTP Client component doesn't work after security upgrade Marked as fixed in versions zendframework/1.12.9+dfsg-2+deb8u2. Bug #786778 [zendframework] zendframework: HTTP Client component doesn't work after security upgrade Marked Bug as done -- 786778: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786778 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#786778: [pkg-php-pear] Bug#786778: zendframework: HTTP Client component doesn't work after security upgrade
Control: found -1 1.12.9+dfsg-2+deb8u1 Control: notfound -1 1.12.9+dfsg-2+deb8u2 Control: close -1 1.12.9+dfsg-2+deb8u2 Hi Marc, Le 25/05/2015 10:44, Marc Falzon a écrit : My bad, looks like we've tested with version 1.12.9+dfsg-2+deb8u1: version 1.12.9+dfsg-2+deb8u2 seems to fix the issue. Thank you for the confirmation. Regards David signature.asc Description: OpenPGP digital signature
Bug#786784: marked as done (python-urllib3: AttributeError: 'module' object has no attribute 'PROTOCOL_SSLv3')
Your message dated Mon, 25 May 2015 16:08:16 +0100 with message-id cap-bsrbukdjf-1pjrozymgqya9chqq1aavnubrezh8p3f8a...@mail.gmail.com and subject line has caused the Debian Bug report #786784, regarding python-urllib3: AttributeError: 'module' object has no attribute 'PROTOCOL_SSLv3' to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 786784: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786784 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: python-urllib3 Version: 1.9.1-3 Severity: serious $ python Python 2.7.9 (default, Mar 1 2015, 12:57:24) [GCC 4.9.2] on linux2 Type help, copyright, credits or license for more information. import requests Traceback (most recent call last): File stdin, line 1, in module File requests/__init__.py, line 53, in module from urllib3.contrib import pyopenssl File urllib3/contrib/pyopenssl.py, line 70, in module ssl.PROTOCOL_SSLv3: OpenSSL.SSL.SSLv3_METHOD, AttributeError: 'module' object has no attribute 'PROTOCOL_SSLv3' ---End Message--- ---BeginMessage--- tag 786784 unreproducible -- Invalid---End Message---
Bug#786779: v4l2loopback-dkms: fails to build with linux-4.0 kernel
Package: v4l2loopback-dkms Version: 0.8.0-5 Severity: grave Justification: renders package unusable Dear Maintainer, Installing v4l2loopback-dkms on current sid-based system with linux-image-4.0.0-1-amd64 ends up in multiple DKMS compilation errors (thus rendering package unusable), namely: CC [M] /var/lib/dkms/v4l2loopback/0.8.0/build/v4l2loopback.o /var/lib/dkms/v4l2loopback/0.8.0/build/v4l2loopback.c: In function ‘attr_store_maxopeners’: /var/lib/dkms/v4l2loopback/0.8.0/build/v4l2loopback.c:486:2: error: implicit declaration of function ‘strict_strtoul’ [-Werror=implicit-function-declaration] if (strict_strtoul(buf, 0, curr)) ^ /var/lib/dkms/v4l2loopback/0.8.0/build/v4l2loopback.c: In function ‘init_vdev’: /var/lib/dkms/v4l2loopback/0.8.0/build/v4l2loopback.c:2002:7: error: ‘struct video_device’ has no member named ‘debug’ vdev-debug = V4L2_DEBUG_IOCTL | V4L2_DEBUG_IOCTL_ARG; ^ /var/lib/dkms/v4l2loopback/0.8.0/build/v4l2loopback.c:2002:17: error: ‘V4L2_DEBUG_IOCTL’ undeclared (first use in this function) vdev-debug = V4L2_DEBUG_IOCTL | V4L2_DEBUG_IOCTL_ARG; ^ /var/lib/dkms/v4l2loopback/0.8.0/build/v4l2loopback.c:2002:17: note: each undeclared identifier is reported only once for each function it appears in /var/lib/dkms/v4l2loopback/0.8.0/build/v4l2loopback.c:2002:36: error: ‘V4L2_DEBUG_IOCTL_ARG’ undeclared (first use in this function) vdev-debug = V4L2_DEBUG_IOCTL | V4L2_DEBUG_IOCTL_ARG; ^ cc1: some warnings being treated as errors All these issues seem to be already addressed upstream, for example, missing strict_strtoul is now correctly wrapper as kstrtoul, as required by newer kernels: #if LINUX_VERSION_CODE KERNEL_VERSION(3,6,1) # define kstrtoul strict_strtoul #endif Could you please update the module in package? -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: i386, armhf Kernel: Linux 4.0.0-1-amd64 (SMP w/4 CPU cores) Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages v4l2loopback-dkms depends on: ii dkms 2.2.0.3-2 v4l2loopback-dkms recommends no packages. Versions of packages v4l2loopback-dkms suggests: ii v4l2loopback-utils 0.8.0-5 -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: found 786565 in 0.5.28-1
Processing commands for cont...@bugs.debian.org: found 786565 0.5.28-1 Bug #786565 {Done: David Prévot taf...@debian.org} [xul-ext-requestpolicy] iceweasel: breaks xul-ext-requestpolicy Marked as found in versions requestpolicy/0.5.28-1. thanks Stopping processing here. Please contact me if you need assistance. -- 786565: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786565 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#786784: python-urllib3: AttributeError: 'module' object has no attribute 'PROTOCOL_SSLv3'
Package: python-urllib3 Version: 1.9.1-3 Severity: serious $ python Python 2.7.9 (default, Mar 1 2015, 12:57:24) [GCC 4.9.2] on linux2 Type help, copyright, credits or license for more information. import requests Traceback (most recent call last): File stdin, line 1, in module File requests/__init__.py, line 53, in module from urllib3.contrib import pyopenssl File urllib3/contrib/pyopenssl.py, line 70, in module ssl.PROTOCOL_SSLv3: OpenSSL.SSL.SSLv3_METHOD, AttributeError: 'module' object has no attribute 'PROTOCOL_SSLv3' -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#753859: diodon: depends on libgee2 which is deprecated
On 21.05.2015 21:58, Emilio Pozuelo Monfort wrote: Control: severity -1 serious We want to remove libgee2 from unstable RSN, and there are only a few rdeps now, so I'm bumping the severity of the bugs. If you have questions don't hesitate to ask. Emilio Hey Emilio, I actually fixed this a couple of months ago but I couldn't find a sponsor for the new package. So I have uploaded the package again to Mentors which fixes this issue. You can find it here http://mentors.debian.net/package/diodon resp. http://mentors.debian.net/debian/pool/main/d/diodon/diodon_1.3.0-1.dsc Could you sponsor it? Thanks, Oliver -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#786758: doomsday: segfault on startup
On Mon, May 25, 2015 at 6:16 AM, Adam Borowski wrote: When trying to start doomsday, it pops up a dialog which says: .[ Doomsday Engine ] App init failed: [NotFoundError] (Record::subrecord) Subrecord 'alert' not found ` then crashes with a segmentation fault. This seems to be an incompatibility with persist.pack files from older versions. If you backup ~/.doomsday/runtime/persist.pack to somewhere else, does that work around the problem? Best wishes, Mike -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#785305: [pkg-cli-apps-team] Bug#785305: keepass2: option to lock workspace on suspend does not work
forwarded 785305 https://sourceforge.net/p/keepass/bugs/1378/ kthxbye On Mon, May 25, 2015 at 12:10:22PM +0200, Peter Spiess-Knafl wrote: On 05/25/2015 12:02 PM, Chow Loong Jin wrote: On Mon, May 25, 2015 at 11:13:02AM +0200, Peter Spiess-Knafl wrote: Hi! Is there any progress on this bug? I really loose Keepass2 a lot and I saw that is marked for removal because of this bug. Can I help you somehow? Has it been forwared to upstream yet? Odd, isn't this the role of GNOME, rather than Keepass2? I'm on Ubuntu and my screen is locked when going into sleep mode under normal circumstances. This is without using Keepass2. I think there is a misunderstanding of the word workspace. An opened keepass file is also called workspace. Hmm. I just poked at the keepass2 source code, and it looks like it depends on Windows-based system events (SessionEnding, SessionSwitch, and PowerModeChanged) which aren't implemented in Mono: https://github.com/mono/mono/blob/master/mcs/class/System/Microsoft.Win32/SystemEvents.cs#L127 ...and while looking for the upstream bug tracer, I just found an upstream bug: https://sourceforge.net/p/keepass/bugs/1378/ -- Kind regards, Loong Jin signature.asc Description: Digital signature
Processed: Re: [pkg-cli-apps-team] Bug#785305: keepass2: option to lock workspace on suspend does not work
Processing commands for cont...@bugs.debian.org: forwarded 785305 https://sourceforge.net/p/keepass/bugs/1378/ Bug #785305 [keepass2] keepass2: option to lock workspace on suspend does not work Set Bug forwarded-to-address to 'https://sourceforge.net/p/keepass/bugs/1378/'. kthxbye Stopping processing here. Please contact me if you need assistance. -- 785305: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785305 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#786819: netsurf: FTBFS with libgdk-pixbuf2.0-dev 2.31.4-1: gtk/window.c:55:14: error: unknown type name 'GdkPixdata'
Source: netsurf Version: 3.2+dfsg-2 Severity: serious Justification: fails to build from source (but built successfully in the past) Tags: stretch sid netsurf FTBFS if built against libgdk-píxbuf2.0-dev 2.31.4-1 which is currently in unstable: | COMPILE: gtk/window.c | gtk/window.c:55:14: error: unknown type name 'GdkPixdata' | extern const GdkPixdata menu_cursor_pixdata; | ^ | gtk/window.c: In function 'nsgtk_create_menu_cursor': | gtk/window.c:1057:2: warning: implicit declaration of function 'gdk_pixbuf_from_pixdata' [-Wimplicit-function-declaration] | pixbuf = gdk_pixbuf_from_pixdata(menu_cursor_pixdata, FALSE, NULL); | ^ | gtk/window.c:1057:2: warning: nested extern declaration of 'gdk_pixbuf_from_pixdata' [-Wnested-externs] | gtk/window.c:1057:9: warning: assignment makes pointer from integer without a cast | pixbuf = gdk_pixbuf_from_pixdata(menu_cursor_pixdata, FALSE, NULL); | ^ For the full log see https://buildd.debian.org/status/fetch.php?pkg=netsurfarch=amd64ver=3.2+dfsg-2+b2stamp=1432571606 Cheers -- Sebastian Ramacher signature.asc Description: Digital signature
Bug#784709: issue with os-prober
On Thu, 21 May 2015 12:14:15 +0800 Paul Wise p...@debian.org wrote: On Wed, 20 May 2015 14:59:04 +0200 Jérôme Kieffer wrote: jerome@patagonia:~$ sudo blkid -o value -s TYPE /dev/sdb4 jerome@patagonia:~$ echo $? 0 That is strange, what about just this? sudo blkid /dev/sdb4 ; echo $? Dear Paul, # uname -a Linux patagonia 3.2.0-3-amd64 #1 SMP Mon Jul 23 02:45:17 UTC 2012 x86_64 GNU/Linux # fdisk -l /dev/sdb Disque /dev/sdb : 1,8 TiB, 2000398934016 octets, 3907029168 secteurs Unités : secteur de 1 × 512 = 512 octets Taille de secteur (logique / physique) : 512 octets / 512 octets taille d'E/S (minimale / optimale) : 512 octets / 512 octets Type d'étiquette de disque : dos Identifiant de disque : 0x9a2578f7 Device Boot StartEndSectors Size Id Type /dev/sdb1 63 33575849 33575787 16G 82 Linux swap / Solaris /dev/sdb2 33575850 243304424 209728575 100G 83 Linux /dev/sdb3243304425 453032999 209728575 100G 83 Linux /dev/sdb4453033000 3907024064 3453991065 1,6T 5 Extended /dev/sdb5453033063 557905319 104872257 50G 83 Linux /dev/sdb6557905383 662777639 104872257 50G 83 Linux /dev/sdb766203 767649959 104872257 50G 83 Linux /dev/sdb8767650023 872522279 104872257 50G 83 Linux /dev/sdb9872522343 1082250854 209728512 100G 83 Linux /dev/sdb10 1082250918 3907024064 2824773147 1,3T 83 Linux # blkid /dev/sdb? /dev/sdb1: LABEL=Swap2T UUID=b3de0b2e-9092-4d08-af8d-09fefe8e9735 TYPE=swap PARTUUID=9a2578f7-01 /dev/sdb2: LABEL=Win UUID=78d417f1-a097-4cf3-9218-32a621f78c68 TYPE=ext4 PARTUUID=9a2578f7-02 /dev/sdb3: LABEL=Root UUID=9b3d9c65-6ba2-425f-bc5a-729cb6098165 TYPE=ext4 PARTUUID=9a2578f7-03 /dev/sdb4: PTTYPE=dos PARTUUID=9a2578f7-04 /dev/sdb5: LABEL=UsrLocal UUID=dee401ac-fa36-44a5-9463-2571f8f52a84 TYPE=ext4 PARTUUID=9a2578f7-05 /dev/sdb6: LABEL=Var UUID=e49c7936-3e39-4644-b025-e943172cd218 TYPE=ext4 PARTUUID=9a2578f7-06 /dev/sdb7: LABEL=Backup UUID=251f4ed5-6114-4f19-b9c7-060eb82ececb TYPE=ext4 PARTUUID=9a2578f7-07 /dev/sdb8: LABEL=Opt UUID=8c0395c2-c9da-4ffc-a1a1-08851774182e TYPE=ext4 PARTUUID=9a2578f7-08 /dev/sdb9: LABEL=Big UUID=deab5b7f-fb85-4f0d-95ed-84d37180162d TYPE=ext4 PARTUUID=9a2578f7-09 The extended partition looks different from the other, but the result of blkid under 3.2 is the same as 3.16. Cheers, -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#786819: netsurf: FTBFS with libgdk-pixbuf2.0-dev 2.31.4-1: gtk/window.c:55:14: error: unknown type name 'GdkPixdata'
Processing control commands: tags -1 + patch Bug #786819 [src:netsurf] netsurf: FTBFS with libgdk-pixbuf2.0-dev 2.31.4-1: gtk/window.c:55:14: error: unknown type name 'GdkPixdata' Added tag(s) patch. -- 786819: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786819 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#786819: netsurf: FTBFS with libgdk-pixbuf2.0-dev 2.31.4-1: gtk/window.c:55:14: error: unknown type name 'GdkPixdata'
Control: tags -1 + patch On 2015-05-25 22:12:07, Sebastian Ramacher wrote: Source: netsurf Version: 3.2+dfsg-2 Severity: serious Justification: fails to build from source (but built successfully in the past) Tags: stretch sid netsurf FTBFS if built against libgdk-píxbuf2.0-dev 2.31.4-1 which is currently in unstable: | COMPILE: gtk/window.c | gtk/window.c:55:14: error: unknown type name 'GdkPixdata' | extern const GdkPixdata menu_cursor_pixdata; | ^ | gtk/window.c: In function 'nsgtk_create_menu_cursor': | gtk/window.c:1057:2: warning: implicit declaration of function 'gdk_pixbuf_from_pixdata' [-Wimplicit-function-declaration] | pixbuf = gdk_pixbuf_from_pixdata(menu_cursor_pixdata, FALSE, NULL); | ^ | gtk/window.c:1057:2: warning: nested extern declaration of 'gdk_pixbuf_from_pixdata' [-Wnested-externs] | gtk/window.c:1057:9: warning: assignment makes pointer from integer without a cast | pixbuf = gdk_pixbuf_from_pixdata(menu_cursor_pixdata, FALSE, NULL); | ^ This issue is almost fixed upstream in [1]. In addition to this change, the generated file also needs another include. A debdiff fixing this bug is attached. Cheers [1] http://source.netsurf-browser.org/netsurf.git/commit/?id=a29e9589f6bd54e258805bef367528a18d7b0c2b -- Sebastian Ramacher diff -Nru netsurf-3.2+dfsg/debian/changelog netsurf-3.2+dfsg/debian/changelog --- netsurf-3.2+dfsg/debian/changelog 2014-08-29 23:59:03.0 +0200 +++ netsurf-3.2+dfsg/debian/changelog 2015-05-25 22:52:12.0 +0200 @@ -1,3 +1,11 @@ +netsurf (3.2+dfsg-2.1) UNRELEASED; urgency=medium + + * Non-maintainer upload. + * debian/patches/change-how-gdk-image.patch: Fix build against +libgdk-pixbuf2.0-dev 2.31.4. (Closes: #786819) + + -- Sebastian Ramacher sramac...@debian.org Mon, 25 May 2015 22:25:10 +0200 + netsurf (3.2+dfsg-2) unstable; urgency=medium * Do not build with javascript support on s390x diff -Nru netsurf-3.2+dfsg/debian/patches/change-how-gdk-image.patch netsurf-3.2+dfsg/debian/patches/change-how-gdk-image.patch --- netsurf-3.2+dfsg/debian/patches/change-how-gdk-image.patch 1970-01-01 01:00:00.0 +0100 +++ netsurf-3.2+dfsg/debian/patches/change-how-gdk-image.patch 2015-05-25 22:54:14.0 +0200 @@ -0,0 +1,49 @@ +Description: Change how GDK image resources are compiled in + The compiled in image resources were being created as a structure in a + generated c source file. The generation of this file caused constness + warning as a guint8 * was initialised from a const char array. + . + This changes the generation and use of these compiled in resources to + use the raw inline form as suggested by the documentation removing the + const warning. + . + In addition to the changes from a29e9589f6bd54e258805bef367528a18d7b0c2b, the + include in the generated file is changed to glib.h. +Origin: upstream, + http://source.netsurf-browser.org/netsurf.git/commit/?id=a29e9589f6bd54e258805bef367528a18d7b0c2b +Bug-Debian: https://bugs.debian.org/786819 +Last-Update: 2015-05-25 + +--- a/netsurf/gtk/Makefile.target b/netsurf/gtk/Makefile.target +@@ -90,8 +90,8 @@ + S_PIXBUF += $(2) + + $(2): $(1) +- $(Q)echo #include gdk-pixbuf/gdk-pixdata.h $(2) +- $(Q)gdk-pixbuf-csource --extern --struct --name=$(3) $(1) $(2) || \ ++ $(Q)echo #include glib.h $(2) ++ $(Q)gdk-pixbuf-csource --extern --raw --name=$(3) $(1) $(2) || \ + ( rm -f $(2) false ) + + endef +--- a/netsurf/gtk/window.c b/netsurf/gtk/window.c +@@ -52,7 +52,7 @@ + #define CONNECT(obj, sig, callback, ptr) \ + g_signal_connect(G_OBJECT(obj), (sig), G_CALLBACK(callback), (ptr)) + +-extern const GdkPixdata menu_cursor_pixdata; ++extern const guint8 *menu_cursor_pixdata; + + struct gui_window { + /** The gtk scaffold object containing menu, buttons, url bar, [tabs], +@@ -1054,7 +1054,7 @@ + { + GdkCursor *cursor = NULL; + GdkPixbuf *pixbuf; +- pixbuf = gdk_pixbuf_from_pixdata(menu_cursor_pixdata, FALSE, NULL); ++ pixbuf = gdk_pixbuf_new_from_inline(-1, menu_cursor_pixdata, FALSE, NULL); + cursor = gdk_cursor_new_from_pixbuf(gdk_display_get_default(), pixbuf, 0, 3); + g_object_unref (pixbuf); + diff -Nru netsurf-3.2+dfsg/debian/patches/series netsurf-3.2+dfsg/debian/patches/series --- netsurf-3.2+dfsg/debian/patches/series 2014-08-20 10:59:40.0 +0200 +++ netsurf-3.2+dfsg/debian/patches/series 2015-05-25 22:33:13.0 +0200 @@ -1,2 +1,3 @@ set-netsurf-config.patch change-install-binary-targets +change-how-gdk-image.patch signature.asc Description: Digital signature
Processed: found 786565 in 0.5.25-1
Processing commands for cont...@bugs.debian.org: found 786565 0.5.25-1 Bug #786565 {Done: David Prévot taf...@debian.org} [xul-ext-requestpolicy] iceweasel: breaks xul-ext-requestpolicy Marked as found in versions requestpolicy/0.5.25-1. thanks Stopping processing here. Please contact me if you need assistance. -- 786565: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786565 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#786817: yash: fieldsplitting data corruption
Package: yash Version: 2.36-1 Severity: critical When doing field-splitting, fields starting with backslashes are corrupted: starting from the 2nd field, they have their initial backslashes removed. Only the first field is left intact. Given a default $IFS: testfn() { printf '%s\n' $@ } VAR='\o\ne \t\wo \th\r\ee \fo\ur' testfn $VAR Got output: \o\ne t\wo th\r\ee fo\ur Expected ouput (produced on every POSIX shell except yash): \o\ne \t\wo \th\r\ee \fo\ur Clearly, this sort of data corruption is a critical security problem. Lack of data integrity is just the beginning. Removal of backslashes might defeat quoting/escaping of critical data and lead to the execution of arbitrary commands. For instance, what if some script feeds the result of improper fieldsplitting to eval? Upstream fixed the bug in SVN after my report: http://osdn.jp/projects/yash/scm/svn/commits/3298 But the author does not treat it with urgency and has neither announced the bug nor patched/updated/withdrawn the release version, which clearly should not be used with a bug like this. So Debian should issue a patch for its packaged version in the meantime. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#786836: packaging not yet ready for mass/stable usage
Source: rustc Version: 1.0.0+dfsg1-1 Severity: serious Even though Rust recently reached the 1.0 milestone, compiler and ecosystem packaging still has to reach a ready for the masses status. As some bits are still missing (cargo, external libs) and other still under discussion (dynlibs, lang-extensions), this bug is left open in order to avoid a premature migration to testing. -- System Information: Debian Release: 8.0 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#784344: marked as done (Buggy DTB causes imx53 SATA failure)
Your message dated Mon, 25 May 2015 21:32:28 + with message-id e1ywzz2-pi...@franck.debian.org and subject line Bug#784344: fixed in linux 3.16.7-ckt11-1 has caused the Debian Bug report #784344, regarding Buggy DTB causes imx53 SATA failure to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 784344: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784344 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: src:linux Version: 3.16.7-ckt9-3~deb8u1 Severity: serious Hi guys, Just debugged on harris.debian.org (imx53, Debian porter box) - there's a missing patch that's needed for the imx53 sata controller to work. At some point, it looks like the code in drivers/ata/ahci_imx.c has changed and arch/arm/boot/dts/imx53.dtsi needed a change to match. It's a trivial change, just renaming the core SATA clock from sata_gate to sata. Upstream patch is in commit 025781539a3ccf867c1e0f2fc63f61cc8c7c5415. (Adding more info for people googling for this!) Without this patch, the SATA driver in drivers/ata/ahci_imx.c just reports [2.377276] ahci-imx 1000.sata: can't get sata clock. [2.425652] ahci-imx: probe of 1000.sata failed with error -2 at startup. Please apply ASAP, would be lovely to get this into the Jessie point release. -- System Information: Debian Release: 7.8 APT prefers oldoldstable APT policy: (500, 'oldoldstable'), (500, 'oldstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash ---End Message--- ---BeginMessage--- Source: linux Source-Version: 3.16.7-ckt11-1 We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 784...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Ben Hutchings b...@decadent.org.uk (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 24 May 2015 18:46:08 +0100 Source: linux Binary: linux-source-3.16 linux-doc-3.16 linux-manual-3.16 linux-support-3.16.0-4 linux-libc-dev linux-headers-3.16.0-4-all linux-headers-3.16.0-4-all-alpha kernel-image-3.16.0-4-alpha-generic-di nic-modules-3.16.0-4-alpha-generic-di nic-wireless-modules-3.16.0-4-alpha-generic-di nic-shared-modules-3.16.0-4-alpha-generic-di serial-modules-3.16.0-4-alpha-generic-di usb-serial-modules-3.16.0-4-alpha-generic-di ppp-modules-3.16.0-4-alpha-generic-di pata-modules-3.16.0-4-alpha-generic-di cdrom-core-modules-3.16.0-4-alpha-generic-di scsi-core-modules-3.16.0-4-alpha-generic-di scsi-modules-3.16.0-4-alpha-generic-di scsi-common-modules-3.16.0-4-alpha-generic-di scsi-extra-modules-3.16.0-4-alpha-generic-di loop-modules-3.16.0-4-alpha-generic-di btrfs-modules-3.16.0-4-alpha-generic-di ext4-modules-3.16.0-4-alpha-generic-di isofs-modules-3.16.0-4-alpha-generic-di jfs-modules-3.16.0-4-alpha-generic-di xfs-modules-3.16.0-4-alpha-generic-di fat-modules-3.16.0-4-alpha-generic-di md-modules-3.16.0-4-alpha-generic-di multipath-modules-3.16.0-4-alpha-generic-di usb-modules-3.16.0-4-alpha-generic-di usb-storage-modules-3.16.0-4-alpha-generic-di fb-modules-3.16.0-4-alpha-generic-di input-modules-3.16.0-4-alpha-generic-di event-modules-3.16.0-4-alpha-generic-di mouse-modules-3.16.0-4-alpha-generic-di nic-pcmcia-modules-3.16.0-4-alpha-generic-di pcmcia-modules-3.16.0-4-alpha-generic-di nic-usb-modules-3.16.0-4-alpha-generic-di sata-modules-3.16.0-4-alpha-generic-di core-modules-3.16.0-4-alpha-generic-di crc-modules-3.16.0-4-alpha-generic-di crypto-modules-3.16.0-4-alpha-generic-di crypto-dm-modules-3.16.0-4-alpha-generic-di ata-modules-3.16.0-4-alpha-generic-di nbd-modules-3.16.0-4-alpha-generic-di squashfs-modules-3.16.0-4-alpha-generic-di virtio-modules-3.16.0-4-alpha-generic-di zlib-modules-3.16.0-4-alpha-generic-di fuse-modules-3.16.0-4-alpha-generic-di srm-modules-3.16.0-4-alpha-generic-di linux-headers-3.16.0-4-common linux-image-3.16.0-4-alpha-generic linux-headers-3.16.0-4-alpha-generic
Bug#785672: marked as done (Critical ext4 data corruption bug)
Your message dated Mon, 25 May 2015 21:32:29 + with message-id e1ywzz3-sc...@franck.debian.org and subject line Bug#785672: fixed in linux 3.16.7-ckt11-1 has caused the Debian Bug report #785672, regarding Critical ext4 data corruption bug to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 785672: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785672 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: src:linux Version: 4.0.2-1 Severity: critical Tags: upstream 4.0.3 includes a fix for a critical ext4 bug that can result in major data loss. I believe this is the bug I just hit on my server, resulting in massive filesystem corruption. See upstream commit d2dc317d564a46dfc683978a2e5a4f91434e9711 (ext4: fix data corruption caused by unwritten and delayed extents), which has been added to stable kernels 4.0.3 as well as much older stable kernels. Please consider incorporating this patch into the Debian kernels as soon as possible, including into the Jessie kernel. - Josh Triplett -- Package-specific info: ** Version: Linux version 4.0.0-1-amd64 (debian-ker...@lists.debian.org) (gcc version 4.9.2 (Debian 4.9.2-16) ) #1 SMP Debian 4.0.2-1 (2015-05-11) ** Command line: BOOT_IMAGE=/vmlinuz-4.0.0-1-amd64 root=/dev/mapper/data-root ro quiet ** Not tainted -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 4.0.0-1-amd64 (SMP w/4 CPU cores) Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages linux-image-4.0.0-1-amd64 depends on: ii debconf [debconf-2.0] 1.5.56 ii initramfs-tools [linux-initramfs-tool] 0.120 ii kmod20-1 ii linux-base 3.5 ii module-init-tools 20-1 Versions of packages linux-image-4.0.0-1-amd64 recommends: ii firmware-linux-free 3.3 pn irqbalance none Versions of packages linux-image-4.0.0-1-amd64 suggests: pn debian-kernel-handbook none ii grub-pc 2.02~beta2-23 pn linux-doc-4.0 none Versions of packages linux-image-4.0.0-1-amd64 is related to: pn firmware-atherosnone pn firmware-bnx2 none pn firmware-bnx2x none pn firmware-brcm80211 none pn firmware-intelwimax none pn firmware-ipw2x00none pn firmware-ivtv none ii firmware-iwlwifi0.43 pn firmware-libertas none pn firmware-linux none pn firmware-linux-nonfree none pn firmware-myricomnone pn firmware-netxen none pn firmware-qlogic none pn firmware-ralink none pn firmware-realteknone pn xen-hypervisor none -- debconf information: linux-image-4.0.0-1-amd64/postinst/depmod-error-initrd-4.0.0-1-amd64: false linux-image-4.0.0-1-amd64/prerm/removing-running-kernel-4.0.0-1-amd64: true linux-image-4.0.0-1-amd64/postinst/mips-initrd-4.0.0-1-amd64: ---End Message--- ---BeginMessage--- Source: linux Source-Version: 3.16.7-ckt11-1 We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 785...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Ben Hutchings b...@decadent.org.uk (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 24 May 2015 18:46:08 +0100 Source: linux Binary: linux-source-3.16 linux-doc-3.16 linux-manual-3.16 linux-support-3.16.0-4 linux-libc-dev linux-headers-3.16.0-4-all linux-headers-3.16.0-4-all-alpha kernel-image-3.16.0-4-alpha-generic-di nic-modules-3.16.0-4-alpha-generic-di nic-wireless-modules-3.16.0-4-alpha-generic-di nic-shared-modules-3.16.0-4-alpha-generic-di serial-modules-3.16.0-4-alpha-generic-di usb-serial-modules-3.16.0-4-alpha-generic-di ppp-modules-3.16.0-4-alpha-generic-di pata-modules-3.16.0-4-alpha-generic-di cdrom-core-modules-3.16.0-4-alpha-generic-di
Bug#786758: doomsday: segfault on startup
On Mon, May 25, 2015 at 05:11:10PM -0400, Michael Gilbert wrote: On Mon, May 25, 2015 at 6:16 AM, Adam Borowski wrote: When trying to start doomsday, it pops up a dialog which says: .[ Doomsday Engine ] App init failed: [NotFoundError] (Record::subrecord) Subrecord 'alert' not found ` then crashes with a segmentation fault. This seems to be an incompatibility with persist.pack files from older versions. If you backup ~/.doomsday/runtime/persist.pack to somewhere else, does that work around the problem? Yes, it helped, no crash. -- // If you believe in so-called intellectual property, please immediately // cease using counterfeit alphabets. Instead, contact the nearest temple // of Amon, whose priests will provide you with scribal services for all // your writing needs, for Reasonable and Non-Discriminatory prices. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#786840: dpkg-gensymbols seems to ignore #include directives
Package: dpkg-dev Version: 1.18.0 Severity: serious seen when building python3.5 in unstable: dpkg-gensymbols: warning: some new symbols appeared in the symbols file: see diff output below dpkg-gensymbols: warning: debian/libpython3.5/DEBIAN/symbols doesn't match completely debian/libpython3.5.symbols --- debian/libpython3.5.symbols (libpython3.5_3.5.0~b1-1_amd64) +++ dpkg-gensymbols49ZYTa 2015-05-25 22:52:29.084129787 + @@ -1,4 +1,1622 @@ libpython3.5m.so.1.0 libpython3.5 #MINVER# -#include libpython.symbols + PyAST_Check@Base 3.5.0~b1 + PyAST_Compile@Base 3.5.0~b1 + PyAST_CompileEx@Base 3.5.0~b1 + PyAST_CompileObject@Base 3.5.0~b1 + PyAST_FromNode@Base 3.5.0~b1 + PyAST_FromNodeObject@Base 3.5.0~b1 + PyAST_Validate@Base 3.5.0~b1 + PyAST_mod2obj@Base 3.5.0~b1 + PyAST_obj2mod@Base 3.5.0~b1 [...] apparently the include directive is ignored, and all symbols in the included files are marked as missing. downgrading to 1.17.25 fixes this issue. this causes build failures for packages calling dpkg-gensymbols with -c2 or higher. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#786784: python-urllib3: AttributeError: 'module' object has no attribute 'PROTOCOL_SSLv3'
On 25 May 2015 at 16:11, Daniele Tricoli er...@mornie.org wrote: Are you using the packaged version on urllib3? If yes there is something really strange since I patched it as explained here: Sorry for the bogus bug report (I already closed it as invalid) - it turned out Python was picking up an older install of urllib3 on this system, which still had the bug. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Processed: limit source to linux, tagging 786372, tagging 714929, tagging 785153
Processing commands for cont...@bugs.debian.org: limit source linux Limiting to bugs with field 'source' containing at least one of 'linux' Limit currently set to 'source':'linux' tags 786372 + pending Bug #786372 [src:linux] Data loss bug with RAID0 and discard Added tag(s) pending. tags 714929 + pending Bug #714929 [src:linux] linux-image-3.9-1-amd64: vmwgfx freezes console with gfx_payload Bug #736811 [src:linux] linux-image-3.12-1-amd64: Booting in VMware Fusion VM fails with module vmwgfx loaded Added tag(s) pending. Added tag(s) pending. tags 785153 + pending Bug #785153 [src:linux] [src:linux] Please enable support for DVBSky T9580 Added tag(s) pending. thanks Stopping processing here. Please contact me if you need assistance. -- 714929: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714929 736811: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736811 785153: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785153 786372: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786372 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#785065: vdso32 fails to built on ppc64el
Control: retitle -1 ppc64el kernel build requires multilib compiler Control: severity -1 normal Thanks for restoring support for 32-bit code generation. I recognise it's not something you really want to support, so I'm leaving the kernel bug open but changing the title/severity accordingly. Ben. -- Ben Hutchings Unix is many things to many people, but it's never been everything to anybody. signature.asc Description: This is a digitally signed message part
Processed: Re: Bug#785065: vdso32 fails to built on ppc64el
Processing control commands: retitle -1 ppc64el kernel build requires multilib compiler Bug #785065 [src:linux] vdso32 fails to built on ppc64el Changed Bug title to 'ppc64el kernel build requires multilib compiler' from 'vdso32 fails to built on ppc64el' severity -1 normal Bug #785065 [src:linux] ppc64el kernel build requires multilib compiler Severity set to 'normal' from 'serious' -- 785065: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785065 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#784278: marked as done (powerpc/perf: Cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH)
Your message dated Mon, 25 May 2015 21:32:28 + with message-id e1ywzz2-ox...@franck.debian.org and subject line Bug#784278: fixed in linux 3.16.7-ckt11-1 has caused the Debian Bug report #784278, regarding powerpc/perf: Cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 784278: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784278 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: linux Version: 3.16.7-ckt9-3~deb8u1 Severity: critical Tags: security patch Justification: breaks the whole system We should cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH (currently 127), otherwise we can be lost in a infinite loop when using a ppc64el machine. :-( I am attaching the fix that I tested adding it to the following directory, and adding it to the debian/patch/series. debian/patches/bugfix/ppc64el/powerpc-perf-Cap-64bits-userspace-backtraces.patch Other than that, the patch submission could be seen at: https://patchwork.ozlabs.org/patch/460955/ Thanks Breno -- System Information: Debian Release: 8.0 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: ppc64el (ppc64le) Kernel: Linux 3.16.0-4-powerpc64le (SMP w/8 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) From patchwork Mon Apr 13 21:51:03 2015 From: Anton Blanchard an...@samba.org Subject: powerpc/perf: Cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH To: linuxppc-...@lists.ozlabs.org Date: Tue, 14 Apr 2015 07:51:03 +1000 We cap 32bit userspace backtraces to PERF_MAX_STACK_DEPTH (currently 127), but we forgot to do the same for 64bit backtraces. Cc: sta...@vger.kernel.org Signed-off-by: Anton Blanchard an...@samba.org --- arch/powerpc/perf/callchain.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/powerpc/perf/callchain.c b/arch/powerpc/perf/callchain.c index 2396dda..ead5535 100644 --- a/arch/powerpc/perf/callchain.c +++ b/arch/powerpc/perf/callchain.c @@ -243,7 +243,7 @@ static void perf_callchain_user_64(struct perf_callchain_entry *entry, sp = regs-gpr[1]; perf_callchain_store(entry, next_ip); - for (;;) { + while (entry-nr PERF_MAX_STACK_DEPTH) { fp = (unsigned long __user *) sp; if (!valid_user_sp(sp, 1) || read_user_stack_64(fp, next_sp)) return; ---End Message--- ---BeginMessage--- Source: linux Source-Version: 3.16.7-ckt11-1 We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 784...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Ben Hutchings b...@decadent.org.uk (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 24 May 2015 18:46:08 +0100 Source: linux Binary: linux-source-3.16 linux-doc-3.16 linux-manual-3.16 linux-support-3.16.0-4 linux-libc-dev linux-headers-3.16.0-4-all linux-headers-3.16.0-4-all-alpha kernel-image-3.16.0-4-alpha-generic-di nic-modules-3.16.0-4-alpha-generic-di nic-wireless-modules-3.16.0-4-alpha-generic-di nic-shared-modules-3.16.0-4-alpha-generic-di serial-modules-3.16.0-4-alpha-generic-di usb-serial-modules-3.16.0-4-alpha-generic-di ppp-modules-3.16.0-4-alpha-generic-di pata-modules-3.16.0-4-alpha-generic-di cdrom-core-modules-3.16.0-4-alpha-generic-di scsi-core-modules-3.16.0-4-alpha-generic-di scsi-modules-3.16.0-4-alpha-generic-di scsi-common-modules-3.16.0-4-alpha-generic-di scsi-extra-modules-3.16.0-4-alpha-generic-di loop-modules-3.16.0-4-alpha-generic-di btrfs-modules-3.16.0-4-alpha-generic-di ext4-modules-3.16.0-4-alpha-generic-di isofs-modules-3.16.0-4-alpha-generic-di jfs-modules-3.16.0-4-alpha-generic-di xfs-modules-3.16.0-4-alpha-generic-di fat-modules-3.16.0-4-alpha-generic-di md-modules-3.16.0-4-alpha-generic-di multipath-modules-3.16.0-4-alpha-generic-di usb-modules-3.16.0-4-alpha-generic-di usb-storage-modules-3.16.0-4-alpha-generic-di fb-modules-3.16.0-4-alpha-generic-di
Bug#786758: marked as done (doomsday: segfault on startup)
Your message dated Mon, 25 May 2015 23:48:58 + with message-id e1yx278-mv...@franck.debian.org and subject line Bug#786758: fixed in doomsday 1.14.5-2 has caused the Debian Bug report #786758, regarding doomsday: segfault on startup to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 786758: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786758 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: doomsday Version: 1.14.5-1 Severity: grave Justification: renders package unusable When trying to start doomsday, it pops up a dialog which says: .[ Doomsday Engine ] App init failed: [NotFoundError] (Record::subrecord) Subrecord 'alert' not found ` then crashes with a segmentation fault. I've tried on three different machines (one armhf), same results, which means it's not something related to a particular machine's setup. -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable'), (150, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 4.0.0-x32 (SMP w/6 CPU cores) Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) Versions of packages doomsday depends on: ii libc6 2.19-18 ii libfluidsynth11.1.6-2 ii libgcc1 1:5.1.1-7 ii libgl1-mesa-glx [libgl1] 10.5.5-1 ii libqt4-network4:4.8.6+git155-g716fbae+dfsg-2 ii libqt4-opengl 4:4.8.6+git155-g716fbae+dfsg-2 ii libqtcore44:4.8.6+git155-g716fbae+dfsg-2 ii libqtgui4 4:4.8.6+git155-g716fbae+dfsg-2 ii libsdl-mixer1.2 1.2.12-11+b1 ii libsdl1.2debian 1.2.15-11 ii libstdc++65.1.1-7 ii libx11-6 2:1.6.3-1 ii libxrandr22:1.4.2-1+b1 ii libxxf86vm1 1:1.1.4-1 ii zlib1g1:1.2.8.dfsg-2+b1 Versions of packages doomsday recommends: pn fluid-soundfont-gm none ii game-data-packager 41 doomsday suggests no packages. -- no debconf information ---End Message--- ---BeginMessage--- Source: doomsday Source-Version: 1.14.5-2 We believe that the bug you reported is fixed in the latest version of doomsday, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 786...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Michael Gilbert mgilb...@debian.org (supplier of updated doomsday package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 25 May 2015 21:17:56 + Source: doomsday Binary: doomsday Architecture: source Version: 1.14.5-2 Distribution: unstable Urgency: medium Maintainer: Debian Games Team pkg-games-de...@lists.alioth.debian.org Changed-By: Michael Gilbert mgilb...@debian.org Description: doomsday - enhanced version of the legendary DOOM game Closes: 786758 Changes: doomsday (1.14.5-2) unstable; urgency=medium . * Update debian/copyrgiht. * Add some lintian overrides. * Fix /usr/lib installation path. * Add manpage for doomsday-compat. * Document persist.pack problem (closes: #786758). Checksums-Sha1: c9286e6717ea6d2112c382a01fde5eb00da4 2789 doomsday_1.14.5-2.dsc a19cb84fe432110f8e274a669e7f7ba0a72ca353 10308 doomsday_1.14.5-2.debian.tar.xz Checksums-Sha256: 5a3bad9c23252cc723c428ff96ba771c8f77ef8a1502ae2d47cd7168d48b2e3e 2789 doomsday_1.14.5-2.dsc b64d33ac59bdbe0f883ab2db8701985fc7f113416993dacfdab25b6e15bfd6c2 10308 doomsday_1.14.5-2.debian.tar.xz Files: 7e4c3a9537c8cf5219ea6d4484a61925 2789 games optional doomsday_1.14.5-2.dsc 9dfb94df75f66ba15ca1e57481a010cf 10308 games optional doomsday_1.14.5-2.debian.tar.xz -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQQcBAEBCgAGBQJVY7IZAAoJELjWss0C1vRzp5Qf/ieLm7rMv8moF2/aN7/grU2l cH/rDhJWks3fzUoc6pPvncG4Lbpu2XZJ1VV2H4TITJtp8KAB4xgJuiNAuZngg9KM RYFpNxyRAmrpy/b+rOgSBe7aeZI7iXhwOkjXuhzDIBfNwOVkYSC30zILXxI8uir1 029kHiqQ7IgnPt5cILtcweqs21WmReXdKRRkSpQiXpM60im2Pxat+XPJ7j7UYkux nDRdDdzflF5cM2o5axcfLts9NQt+Z92LgQi1LjljsCnjCJ8osHpLBRg7LHXi4qjp 3AiN4D3cMeHv+FLMIkBYfQnLymRDgm1Fho1k1vkL8UQXmtNqn84HxiSMISdlMN1z
Bug#786436: ncurses FTBFS: configure loops
- Original Message - | From: Sven Joachim svenj...@gmx.de | To: Helmut Grohne hel...@subdivi.de | Cc: Thomas Dickey dic...@his.com, 786...@bugs.debian.org | Sent: Monday, May 25, 2015 8:31:29 AM | Subject: Bug#786436: ncurses FTBFS: configure loops | | Am 25.05.2015 um 13:43 schrieb Helmut Grohne: | | On Mon, May 25, 2015 at 01:37:17PM +0200, Sven Joachim wrote: | Since the pkg-config files are only created at make | install.libs, we | currently need to install the library into a temporary location. | I've | come up with the following patch: | | --8---cut here---start-8--- | diff --git a/debian/rules b/debian/rules | index a52135b..c3b7d6e 100755 | --- a/debian/rules | +++ b/debian/rules | @@ -275,8 +275,9 @@ $(wobjdir-32)/config.status: | config.guess-stamp | | $(objdir-test)/config.status: build-wide config.guess-stamp | test -d $(objdir-test) || mkdir $(objdir-test) | - cd $(objdir-test) CFLAGS=$(CFLAGS) $(srcdir)/test/configure | \ | - $(CONFARGS-TEST) | + cd $(objdir-test) CFLAGS=$(CFLAGS) \ | + | PKG_CONFIG_LIBDIR=$(wobjdir)/usr/lib/$(DEB_HOST_MULTIARCH)/pkgconfig | \ | + $(srcdir)/test/configure $(CONFARGS-TEST) | | build-arch build-indep: build | | @@ -308,8 +309,7 @@ build-debug: $(objdir-debug)/config.status | build-wide: $(wobjdir)/config.status | cd $(wobjdir) $(MAKE) | # needed for building the examples | - mv $(wobjdir)/lib/libncursesw.so | $(wobjdir)/lib/libncursesw.so.saved | - echo INPUT(libncursesw.so.5 -ltinfo) | $(wobjdir)/lib/libncursesw.so | + $(MAKE) -C $(wobjdir) DESTDIR=$(wobjdir) install.libs | touch $@ | | build-wide-static: $(wobjdir-static)/config.status | --8---cut here---end---8--- | | If ncurses uses any external pkg-config files, then this patch | breaks | cross building, because the pkg-config cross wrapper only sets | PKG_CONFIG_LIBDIR when it is unset. | | Given that libgpm-dev does not ship a .pc file, it seems likely | that | this is not the case. | | It surely is not, but the cross build is broken anyway: | | , | | checking for specific curses-directory... | | /tmp/ncurses-5.9+20150516/obj-wide | | checking for specified curses library type... ncursesw | | checking for multibyte character support... yes | | checking pkg-config for ncursesw... yes | | checking if the ncursesw package files work... configure: error: | | cannot run test program while cross compiling | ` | | Sounds like something for Thomas to look at. This (cannot run...) at least is a problem in something I have changed recently. The apparent cause of the infinite loop (seen here by disabling the pkg-config and ncurses*-config checks) is a while-loop in CF_ADD_INCDIR, which has been (it seems) waiting since 2007 for someone to notice a problem... -- Thomas E. Dickey dic...@invisible-island.net http://invisible-island.net ftp://invisible-island.net -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#784709: when would blkid success but not filesystem type?
On Thu, 21 May 2015 13:07:35 +0200 Karel Zak wrote: The option '-s' does not affect return code ... we have information about all (including empty) partitions! Ok, I see. Sounds like the proposed patch is appropriate then. https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=12;filename=0001-Fix-by-forcing-fs-type-to-not-detected-if-not-named.patch;att=1;bug=784709 Note that my recommendation is to use lsblk, for example: That has the same issue: $ sudo lsblk --noheading --output FSTYPE /dev/sda2 ; echo $? 0 I think for our purposes we would need --nodeps too. -- bye, pabs https://wiki.debian.org/PaulWise signature.asc Description: This is a digitally signed message part
Bug#784709: issue with os-prober
On Mon, 2015-05-25 at 22:09 +0200, Jérôme Kieffer wrote: # uname -a ... # fdisk -l /dev/sdb ... # blkid /dev/sdb? ... /dev/sdb4: PTTYPE=dos PARTUUID=9a2578f7-04 ... The extended partition looks different from the other, but the result of blkid under 3.2 is the same as 3.16. Yep, as explained by upstream, this bug in os-prober is due to a new feature in blkid from newer util-linux versions where it can now get info from partition tables as well as filesystems, so it succeeds getting information from the partition but the returned information does not contain the filesystem type so it returns an empty string. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784709#44 -- bye, pabs https://wiki.debian.org/PaulWise signature.asc Description: This is a digitally signed message part
Processed: tagging 786602
Processing commands for cont...@bugs.debian.org: tags 786602 + sid stretch Bug #786602 {Done: Markus Wanner mar...@bluegap.ch} [flightgear] FTBFS: build-depends on libsimgear-dev = 3.0.99 but it has been superceded Added tag(s) sid and stretch. thanks Stopping processing here. Please contact me if you need assistance. -- 786602: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786602 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#784709: when would blkid success but not filesystem type?
On Tue, 2015-05-26 at 12:21 +0800, Paul Wise wrote: On Thu, 21 May 2015 13:07:35 +0200 Karel Zak wrote: The option '-s' does not affect return code ... we have information about all (including empty) partitions! Ok, I see. Sounds like the proposed patch is appropriate then. https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=12;filename=0001-Fix-by-forcing-fs-type-to-not-detected-if-not-named.patch;att=1;bug=784709 Actually the code in question already contains a code path for when blkid returns success but an empty string. Needs more investigation. -- bye, pabs https://wiki.debian.org/PaulWise signature.asc Description: This is a digitally signed message part
Processed: tagging 783915
Processing commands for cont...@bugs.debian.org: tags 783915 + sid stretch Bug #783915 {Done: Paul Wise p...@debian.org} [whohas] whohas: maintainer required Added tag(s) sid and stretch. thanks Stopping processing here. Please contact me if you need assistance. -- 783915: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783915 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org