Bug#783374: last NMU patch breaks gparted completely (on my system)

2015-05-25 Thread Aníbal Monsalve Salazar
On Fri, 2015-05-01 05:05:10 +0200, Guillem Jover wrote:
 Control: tag -1 - patch

 Hi!

 On Sun, 2015-04-26 at 12:09:16 -0400, Michael Gilbert wrote:
 On Sun, Apr 26, 2015 at 9:46 AM, Felix Zielcke wrote:
 Just tried out the newest upload of gparted. Which fails completely
 The one before which is in jessie works fine.
 I.e. 0.19.0-2 without the NMU fix

 gparted needs a newer udisks2, see #782838.  Proposed patch attached.

 diff -Nru gparted-0.19.0/debian/control gparted-0.19.0/debian/control
 --- gparted-0.19.0/debian/control2014-06-11 14:50:55.0 +
 +++ gparted-0.19.0/debian/control2015-04-26 16:02:28.0 +
 @@ -11,7 +11,7 @@

  Package: gparted
  Architecture: any
 -Depends: ${shlibs:Depends}, ${misc:Depends}
 +Depends: ${shlibs:Depends}, ${misc:Depends}, udisks2 (= 2.1.5-1)
  Suggests: xfsprogs, reiserfsprogs, reiser4progs, jfsutils, ntfs-3g,
   dosfstools, mtools, yelp, kpartx, dmraid, dmsetup, gpart
  Description: GNOME partition editor

 As pointed out in #783397 this fix is incorrect. The correct fix is to
 use a Breaks, so that there's no unnecessary Depends introduced.

 Thanks,
 Guillem

Hello Guillem,

Just to clarify this. ;)

I agree there is no need for an unnecessary dependency.

As I can see, gparted doesn't break udisks2.

Do you mean to add

Breaks: udisks2 ( 2.1.5)

to gparted's debian/control?

Regards,

Aníbal


signature.asc
Description: Digital signature


Processed: severity of 786741 is grave

2015-05-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 # update severity since this might lead to priviledge escalation if an 
 admistrator is tricked into load the update metadata page.
 severity 786741 grave
Bug #786741 [src:horizon] horizon: CVE-2015-3988: Persistent XSS in Horizon 
metadata dashboard
Severity set to 'grave' from 'important'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
786741: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786741
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#713624: marked as done (libsyncml: FTBFS: ld: /usr/lib/gcc/x86_64-linux-gnu/4.8/../../../x86_64-linux-gnu/libcheck_pic.a(check_pack.o): undefined reference to symbol '__pthread_unregister_cancel@@

2015-05-25 Thread Debian Bug Tracking System
Your message dated Mon, 25 May 2015 07:49:06 +
with message-id e1ywn8e-0004ii...@franck.debian.org
and subject line Bug#713624: fixed in libsyncml 0.5.4-2.2
has caused the Debian Bug report #713624,
regarding libsyncml: FTBFS: ld: 
/usr/lib/gcc/x86_64-linux-gnu/4.8/../../../x86_64-linux-gnu/libcheck_pic.a(check_pack.o):
 undefined reference to symbol '__pthread_unregister_cancel@@GLIBC_2.3.3'
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
713624: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713624
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Source: libsyncml
Version: 0.5.4-2.1
Severity: serious
Tags: jessie sid
User: debian...@lists.debian.org
Usertags: qa-ftbfs-20130620 qa-ftbfs
Justification: FTBFS on amd64

Hi,

During a rebuild of all packages in sid, your package failed to build on
amd64.

Maybe you need to add explicitly the offending lib to LD flags.

Relevant part:
 /usr/bin/cc  -Wall -g -O2CMakeFiles/datastore.dir/check_ds.o  -o 
 datastore -rdynamic libsupport.a ../libsyncml/libsyncml.so.2.4.0 -lglib-2.0 
 -lgthread-2.0 -lgobject-2.0 -lxml2 -lbluetooth -lwbxml2 -lsoup-2.4 -lgio-2.0 
 -lglib-2.0 -lgthread-2.0 -lgobject-2.0 -lxml2 -lbluetooth -lwbxml2 -lsoup-2.4 
 -lgio-2.0 -lopenobex -lcheck_pic -lrt -lm 
 /usr/bin/ld: 
 /usr/lib/gcc/x86_64-linux-gnu/4.8/../../../x86_64-linux-gnu/libcheck_pic.a(check_pack.o):
  undefined reference to symbol '__pthread_unregister_cancel@@GLIBC_2.3.3'
 /lib/x86_64-linux-gnu/libpthread.so.0: error adding symbols: DSO missing from 
 command line
 collect2: error: ld returned 1 exit status

The full build log is available from:
   
http://aws-logs.debian.net/ftbfs-logs/2013/06/20/libsyncml_0.5.4-2.1_unstable.log

A list of current common problems and possible solutions is available at 
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.
---End Message---
---BeginMessage---
Source: libsyncml
Source-Version: 0.5.4-2.2

We believe that the bug you reported is fixed in the latest version of
libsyncml, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 713...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
YunQiang Su s...@debian.org (supplier of updated libsyncml package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 25 May 2015 14:54:31 +0800
Source: libsyncml
Binary: libsyncml2 libsyncml-utils libsyncml-dev libsyncml-doc libsyncml2-dbg
Architecture: source amd64 all
Version: 0.5.4-2.2
Distribution: unstable
Urgency: medium
Maintainer: Michael Banck mba...@debian.org
Changed-By: YunQiang Su s...@debian.org
Description:
 libsyncml-dev - SyncML protocol development library
 libsyncml-doc - SyncML protocol library documentation
 libsyncml-utils - SyncML protocol library utilities
 libsyncml2 - SyncML protocol library
 libsyncml2-dbg - Debug symbols for libsyncml2
Closes: 713624
Changes:
 libsyncml (0.5.4-2.2) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Link pthread explicitly (Closes: #713624)
Checksums-Sha1:
 6b2b9e0ff9ecac4bebc8716da44137cce7bb9fb2 1691 libsyncml_0.5.4-2.2.dsc
 9958398f8338225be30ceb1bf08084f1b10bf9c3 5722 libsyncml_0.5.4-2.2.diff.gz
 a2a0a82c0eef3a6fb901e7ba658b6c6cee1ff93e 22744 
libsyncml-dev_0.5.4-2.2_amd64.deb
 589bf0124310a30ff206ad503882452b0939b023 538396 libsyncml-doc_0.5.4-2.2_all.deb
 f1aefbabf81c5eca9d195930828eb889b74a06e1 22782 
libsyncml-utils_0.5.4-2.2_amd64.deb
 6bf2a7e32c53b05bfd1961f1f2bef9a9e0ed341c 296696 
libsyncml2-dbg_0.5.4-2.2_amd64.deb
 2a32ee49e690ad00865525fbe63044ed60fce511 167572 libsyncml2_0.5.4-2.2_amd64.deb
Checksums-Sha256:
 9434660873df16509f490e8245af4bacd3d8b104484e6f3815dc93249cca9bba 1691 
libsyncml_0.5.4-2.2.dsc
 89e5ae9fbcb24dcdbca9c9ded44a6279d6b6e75d030a6db7356f93c5e00fbee1 5722 
libsyncml_0.5.4-2.2.diff.gz
 ad8ff7bc16d63dd1b2ffac711fadb38491efebde24af8b1723471dfb415db59e 22744 
libsyncml-dev_0.5.4-2.2_amd64.deb
 

Bug#786743: obnam: ftbfs, git command not found

2015-05-25 Thread Holger Levsen
source: obnam
version: 1.8-1
Severity: serious
x-debbugs-cc: reproducible-bui...@lists.alioth.debian.org

Hi Lars,

While working on the “reproducible builds” effort [1], we have noticed that 
obnam fails to build from source:

[...]
running build_scripts
creating build/scripts-2.7
copying and adjusting obnam - build/scripts-2.7
copying and adjusting obnam-viewprof - build/scripts-2.7
changing mode of build/scripts-2.7/obnam from 644 to 755
changing mode of build/scripts-2.7/obnam-viewprof from 644 to 755
building manpages
make -C manual
make[2]: Entering directory '/tmp/buildd/obnam-1.8/manual'
/bin/sh: 1: git: not found
./format-pdf obnam-manual.en.pdf Backups with Obnam Lars Wirzenius 
(l...@liw.fi) Version 1.8 en/010-introduction.mdwn en/020-concepts.mdwn 
en/040-installing.mdwn 
en/050-quick-tour.mdwn en/060-backing-up.mdwn en/070-restoring.mdwn 
en/080-forgetting.mdwn en/090-verifiying.mdwn en/100-many-clients.mdwn 
en/110-encryption.mdwn en/120-
misc.mdwn en/130-case-studies.mdwn en/140-troubleshooting.mdwn 
en/150-config.mdwn en/900-see-also.mdwn en/980-legalese.mdwn en/990-blurb.mdwn
pandoc: Duplicate link reference `[libgfshare]' source (line 1237, column 1)
! LaTeX Error: Command \textquotesingle unavailable in encoding T1.

See the LaTeX manual or LaTeX Companion for explanation.
Type  H return  for immediate help.
 ...  
  
l.709 ...\textbackslash{}.mp3\$\textquotesingle{}}

pandoc: Error producing PDF from TeX source
Makefile:36: recipe for target 'obnam-manual.en.pdf' failed
make[2]: *** [obnam-manual.en.pdf] Error 43
make[2]: Leaving directory '/tmp/buildd/obnam-1.8/manual'
debian/rules:6: recipe for target 'override_dh_auto_build' failed
make[1]: *** [override_dh_auto_build] Error 2
make[1]: Leaving directory '/tmp/buildd/obnam-1.8'
debian/rules:3: recipe for target 'build' failed
make: *** [build] Error 2
dpkg-buildpackage: error: debian/rules build gave error exit status 2


The full log is available at 
https://reproducible.debian.net/rbuild/unstable/amd64/obnam_1.8-1.rbuild.log

I could also reproduce this issue locally on my laptop with pbuilder.


cheers,
Holger

 [1]: https://wiki.debian.org/ReproducibleBuilds


signature.asc
Description: This is a digitally signed message part.


Bug#786749: libdist-zilla-plugin-podspellingtests-perl: Has been deprecated and replaced upstream, should be replaced with libdist-zilla-plugin-test-podspelling-perl

2015-05-25 Thread Axel Beckert
Package: libdist-zilla-plugin-podspellingtests-perl
Version: 1.111520-1
Severity: serious
Justification: Maintainer's opinion, deprecated and replaced upstream
User: debian-p...@lists.debian.org
Usertags: bcn2015

DUCK reports for libdist-zilla-plugin-podspellingtests-perl that
https://metacpan.org/release/Dist-Zilla-Plugin-PodSpellingTests as
listed in debian/copyright no more exists.

The home page of the package already points to
https://metacpan.org/release/Dist-Zilla-Plugin-Test-PodSpelling which is
the successor module.

But this package does not contain the successor modules, they don't seem
to be packaged yet.

There seem to be no reverse dependencies and popcon is rather low ( 30
installed), so migrating to Dist::Zilla::Plugin::Test::PodSpelling in
form of libdist-zilla-plugin-test-podspelling-perl should cause no harm.

I'll soon file the according ITP for
libdist-zilla-plugin-test-podspelling-perl.

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (600, 'testing'), (111, 'buildd-unstable'), 
(111, 'buildd-experimental'), (110, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 4.0.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages libdist-zilla-plugin-podspellingtests-perl depends on:
ii  libdist-zilla-perl 5.020-2
ii  libmoose-perl  2.1213-1
ii  libpod-wordlist-hanekomu-perl  1.132680-2
ii  libtest-spelling-perl  0.20-1
ii  perl   5.20.2-6

libdist-zilla-plugin-podspellingtests-perl recommends no packages.

libdist-zilla-plugin-podspellingtests-perl suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#785305: keepass2: option to lock workspace on suspend does not work

2015-05-25 Thread Peter Spiess-Knafl
Hi!

Is there any progress on this bug? I really loose Keepass2 a lot and I
saw that is marked for removal because of this bug.

Can I help you somehow? Has it been forwared to upstream yet?

Greetings
Peter


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#786758: doomsday: segfault on startup

2015-05-25 Thread Adam Borowski
Package: doomsday
Version: 1.14.5-1
Severity: grave
Justification: renders package unusable

When trying to start doomsday, it pops up a dialog which says:
.[ Doomsday Engine ]
App init failed:
 [NotFoundError] (Record::subrecord) Subrecord 'alert' not found 
`
then crashes with a segmentation fault.

I've tried on three different machines (one armhf), same results, which
means it's not something related to a particular machine's setup.


-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (150, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 4.0.0-x32 (SMP w/6 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages doomsday depends on:
ii  libc6 2.19-18
ii  libfluidsynth11.1.6-2
ii  libgcc1   1:5.1.1-7
ii  libgl1-mesa-glx [libgl1]  10.5.5-1
ii  libqt4-network4:4.8.6+git155-g716fbae+dfsg-2
ii  libqt4-opengl 4:4.8.6+git155-g716fbae+dfsg-2
ii  libqtcore44:4.8.6+git155-g716fbae+dfsg-2
ii  libqtgui4 4:4.8.6+git155-g716fbae+dfsg-2
ii  libsdl-mixer1.2   1.2.12-11+b1
ii  libsdl1.2debian   1.2.15-11
ii  libstdc++65.1.1-7
ii  libx11-6  2:1.6.3-1
ii  libxrandr22:1.4.2-1+b1
ii  libxxf86vm1   1:1.1.4-1
ii  zlib1g1:1.2.8.dfsg-2+b1

Versions of packages doomsday recommends:
pn  fluid-soundfont-gm  none
ii  game-data-packager  41

doomsday suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#783915: marked as done (whohas: maintainer required)

2015-05-25 Thread Debian Bug Tracking System
Your message dated Mon, 25 May 2015 11:19:20 +
with message-id e1ywqpg-ei...@franck.debian.org
and subject line Bug#783915: fixed in whohas 0.29.1-1
has caused the Debian Bug report #783915,
regarding whohas: maintainer required
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
783915: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783915
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: whohas
Version: 0.29-0.3
Severity: serious

whohas upstream is at best dormant; an ITA bug remains outstanding since
January 2013. This bug is to prevent migration to Stretch.

If it remains open past 1st June 2015 I will request removal from sid as well
(it can easily be reintroduced).

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697137


-- System Information:
Debian Release: 8.0
  APT prefers stable
  APT policy: (990, 'stable'), (500, 'testing-proposed-updates'), (500, 
'unstable'), (500, 'oldstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
---End Message---
---BeginMessage---
Source: whohas
Source-Version: 0.29.1-1

We believe that the bug you reported is fixed in the latest version of
whohas, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 783...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Paul Wise p...@debian.org (supplier of updated whohas package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 25 May 2015 18:57:19 +0800
Source: whohas
Binary: whohas
Architecture: source all
Version: 0.29.1-1
Distribution: unstable
Urgency: low
Maintainer: Paul Wise p...@debian.org
Changed-By: Paul Wise p...@debian.org
Description:
 whohas - query multiple distributions' package archives
Closes: 515510 523497 619992 626138 632976 676471 697137 766473 774271 783915
Changes:
 whohas (0.29.1-1) unstable; urgency=low
 .
   * New upstream release (Closes: #783915)
 - Fixes memory issue using forks module (Closes: #523497, LP: #690796)
 - Fixes all existing distro support
   (Closes: #766473, #774271, #619992, #676471)
 - Fixes FreeBSD URLs (Closes: #626138)
 - Adds links for Fedora packages (Closes: #515510)
 - Adds config file for distro selection/versions (Closes: #632976)
   * New maintainers (Closes: #697137)
   * Move git repository to collab-maint
   * Drop quilt build-dep since it isn't needed with dpkg-source v3
   * Add new forks dependency
   * Adapt packaging to new upstream build system
   * Bump package to debhelper 9
   * Update description to match supported sites
   * Recommend libsys-cpu-perl for auto-job-count
   * Adapt watch file to new upstream git repo
   * Check new upstream OpenPGP signatures
   * Add some DEP-12 upstream metadata
   * Use https and cgit for Vcs-* headers
   * Bump Standards-Version, no changes needed
   * Remove merged and superseded patches
   * Switch to Priority optional
   * 40-improve-fetchdoc:
 - update for new paths
 - disable at request of upstream
   * Re-write debian/copyright in machine-readable form
   * Remove unneeded libxml-simple-perl dep
   * Add build-dependencies for the tests
Checksums-Sha1:
 453c6289c691f5c8ed7215aadc4f73c22733c250 1904 whohas_0.29.1-1.dsc
 671a0caaac3ce89d156edff211a1999ebe4a1167 196217 whohas_0.29.1.orig.tar.gz
 dbe02f632042320737db4ca159577b4c0dbdefe3 9200 whohas_0.29.1-1.debian.tar.xz
 052c22a50762b5488415b8c55d77245f1f9d7319 184478 whohas_0.29.1-1_all.deb
Checksums-Sha256:
 92ac54310a8f03d7cb92346349361e7b064a7976f16633b426bcc01a33fd5aaf 1904 
whohas_0.29.1-1.dsc
 dbf2396838cb0f97726041213c04426b818d48cc510bd529faf30a8411682878 196217 
whohas_0.29.1.orig.tar.gz
 6696e56be9989a33a5144a3a4ff87dcc47a76759ca79b0a24e74c2ead4772b43 9200 
whohas_0.29.1-1.debian.tar.xz
 6e15d5e211992da33f929802bd146fb26e2287edc143f539c3c4e461c1ee6430 184478 
whohas_0.29.1-1_all.deb
Files:
 c1c5dec84fdcddcb97e0a9ccd1af07bf 1904 utils optional whohas_0.29.1-1.dsc
 

Bug#786436: ncurses FTBFS: configure loops

2015-05-25 Thread Sven Joachim
On 2015-05-24 03:26 +0200, Thomas Dickey wrote:

 - Original Message -
 | From: Helmut Grohne hel...@subdivi.de
 | To: 786...@bugs.debian.org
 | Sent: Thursday, May 21, 2015 1:48:24 PM
 | Subject: Bug#786436: ncurses FTBFS: configure loops
 | 
 | Control: tags -1 - moreinfo
 | Control: severity -1 serious
 | 
 | On Thu, May 21, 2015 at 07:24:18PM +0200, Helmut Grohne wrote:
 |  | Looking for ncursesw-config
 |  | checking for ncursesw-config... no
 |  | checking for ncursesw6-config... no
 |  | checking for ncursesw5-config... no
 | 
 | There is a notable difference to successful builds here. Those say:
 | 
 | | checking for ncursesw5-config... ncursesw5-config
 | 
 | Now where does that come from? ncurses-bin. Well, it came from there,
 | but it no longer does.

 On the other hand, I have the impression that Debian packagers would prefer 
 to use .pc files.
 The log shows that there is no suitable pkg-config for the cross-compiler, so 
 it falls through
 to the script looking for ncurses*-config

Cross-compiler or not, the pkg-config files only work correctly for a
library that's already installed in the right place.

 I did that recently, and verified that the script works with the pkg-config 
 which is part of
 the MinGW cross-compilers.  (If there is something I've overlooked, that 
 would be nice to know).

 Perhaps the proper fix for your build is to ensure that there is a pkg-config 
 for the cross-build,
 rather than restoring the ncurses*-config scripts to your build-environment.

Since the pkg-config files are only created at make install.libs, we
currently need to install the library into a temporary location.  I've
come up with the following patch:

--8---cut here---start-8---
diff --git a/debian/rules b/debian/rules
index a52135b..c3b7d6e 100755
--- a/debian/rules
+++ b/debian/rules
@@ -275,8 +275,9 @@ $(wobjdir-32)/config.status: config.guess-stamp
 
 $(objdir-test)/config.status: build-wide config.guess-stamp
test -d $(objdir-test) || mkdir $(objdir-test)
-   cd $(objdir-test)  CFLAGS=$(CFLAGS) $(srcdir)/test/configure \
-   $(CONFARGS-TEST)
+   cd $(objdir-test)  CFLAGS=$(CFLAGS) \
+   
PKG_CONFIG_LIBDIR=$(wobjdir)/usr/lib/$(DEB_HOST_MULTIARCH)/pkgconfig \
+   $(srcdir)/test/configure $(CONFARGS-TEST)
 
 build-arch build-indep: build
 
@@ -308,8 +309,7 @@ build-debug: $(objdir-debug)/config.status
 build-wide: $(wobjdir)/config.status
cd $(wobjdir)  $(MAKE)
# needed for building the examples
-   mv $(wobjdir)/lib/libncursesw.so $(wobjdir)/lib/libncursesw.so.saved
-   echo INPUT(libncursesw.so.5 -ltinfo)  $(wobjdir)/lib/libncursesw.so
+   $(MAKE) -C $(wobjdir) DESTDIR=$(wobjdir) install.libs
touch $@
 
 build-wide-static: $(wobjdir-static)/config.status
--8---cut here---end---8---

Only tested that debian/rules build-test works in a native build, will
need to check full native and cross builds later on.

Cheers,
   Sven


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#786741: [PKG-Openstack-devel] Bug#786741: horizon: CVE-2015-3988: Persistent XSS in Horizon metadata dashboard

2015-05-25 Thread Martin Zobel-Helas
Hi, 

On Mon May 25, 2015 at 07:36:15 +0200, Salvatore Bonaccorso wrote:
 Source: horizon
 Version: 2015.1.0-1
 Severity: important
 Tags: security upstream
 
 Hi,
 
 the following vulnerability was published for horizon.
 
 CVE-2015-3988[0]:
 | Multiple cross-site scripting (XSS) vulnerabilities in OpenStack
 | Dashboard (Horizon) 2015.1.0 allow remote authenticated users to
 | inject arbitrary web script or HTML via the metadata to a (1) Glance
 | image, (2) Nova flavor or (3) Host Aggregate.

The patch seems to be
https://git.openstack.org/cgit/openstack/horizon/commit/?id=6c944b5013acb0dce7cf3d8717e58f7f2427be07

Cheers,
Martin

-- 
 Martin Zobel-Helas zo...@debian.orgDebian System Administrator
 Debian  GNU/Linux Developer   Debian Listmaster
 http://about.me/zobel   Debian Webmaster
 GPG Fingerprint:  6B18 5642 8E41 EC89 3D5D  BDBB 53B1 AC6D B11B 627B 


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed (with 1 errors): limit source to whohas, tagging 676471, tagging 619992, tagging 626138, tagging 515510 ...

2015-05-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 limit source whohas
Limiting to bugs with field 'source' containing at least one of 'whohas'
Limit currently set to 'source':'whohas'

 tags 676471 + pending
Bug #676471 [whohas] whohas: wrong search address for Fedora packages
Ignoring request to alter tags of bug #676471 to the same tags previously set
 tags 619992 + pending
Bug #619992 [whohas] whohas: broken URL to sophie.zarb.org search
Ignoring request to alter tags of bug #619992 to the same tags previously set
 tags 626138 + pending
Bug #626138 [whohas] whohas: FreeBSD URLs are wrong
Ignoring request to alter tags of bug #626138 to the same tags previously set
 tags 515510 + pending
Bug #515510 [whohas] whohas: please add links for Fedora packages
Ignoring request to alter tags of bug #515510 to the same tags previously set
 tags 523497 + pending
Bug #523497 [whohas] whohas: memory pig for some queries (such as sqlite)
Bug #560897 [whohas] whohas: massive memory consumption for searches (0.5G per 
run)
Ignoring request to alter tags of bug #523497 to the same tags previously set
Ignoring request to alter tags of bug #560897 to the same tags previously set
 tags 774271 + pending
Bug #774271 [whohas] whohas: outdated search references
Ignoring request to alter tags of bug #774271 to the same tags previously set
 tags 783915 + pending
Bug #783915 [whohas] whohas: maintainer required
Ignoring request to alter tags of bug #783915 to the same tags previously set
 tags 632976 + pending
Bug #632976 [whohas] Configuration mechanism for distro selection.
Ignoring request to alter tags of bug #632976 to the same tags previously set
 tags 697137 + pending
source: ' does not match at least one of whohas
Failed to alter tags of Bug 697137: limit failed for bugs: 697137.

 tags 766473 + pending
Bug #766473 [whohas] whohas: Outdated or non-functional URLs for several distros
Ignoring request to alter tags of bug #766473 to the same tags previously set
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
515510: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=515510
523497: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=523497
560897: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560897
619992: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=619992
626138: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=626138
632976: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632976
676471: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=676471
766473: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766473
774271: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774271
783915: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783915
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: limit source to whohas, tagging 619992, tagging 766473, tagging 523497, tagging 783915 ...

2015-05-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 limit source whohas
Limiting to bugs with field 'source' containing at least one of 'whohas'
Limit currently set to 'source':'whohas'

 tags 619992 + pending
Bug #619992 [whohas] whohas: broken URL to sophie.zarb.org search
Added tag(s) pending.
 tags 766473 + pending
Bug #766473 [whohas] whohas: Outdated or non-functional URLs for several distros
Added tag(s) pending.
 tags 523497 + pending
Bug #523497 [whohas] whohas: memory pig for some queries (such as sqlite)
Bug #560897 [whohas] whohas: massive memory consumption for searches (0.5G per 
run)
Added tag(s) pending.
Added tag(s) pending.
 tags 783915 + pending
Bug #783915 [whohas] whohas: maintainer required
Added tag(s) pending.
 tags 626138 + pending
Bug #626138 [whohas] whohas: FreeBSD URLs are wrong
Added tag(s) pending.
 tags 632976 + pending
Bug #632976 [whohas] Configuration mechanism for distro selection.
Added tag(s) pending.
 tags 515510 + pending
Bug #515510 [whohas] whohas: please add links for Fedora packages
Added tag(s) pending.
 tags 676471 + pending
Bug #676471 [whohas] whohas: wrong search address for Fedora packages
Added tag(s) pending.
 tags 774271 + pending
Bug #774271 [whohas] whohas: outdated search references
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
515510: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=515510
523497: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=523497
560897: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560897
619992: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=619992
626138: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=626138
632976: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632976
676471: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=676471
766473: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766473
774271: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774271
783915: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783915
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#785305: [pkg-cli-apps-team] Bug#785305: keepass2: option to lock workspace on suspend does not work

2015-05-25 Thread Chow Loong Jin
On Mon, May 25, 2015 at 11:13:02AM +0200, Peter Spiess-Knafl wrote:
 Hi!
 
 Is there any progress on this bug? I really loose Keepass2 a lot and I
 saw that is marked for removal because of this bug.
 
 Can I help you somehow? Has it been forwared to upstream yet?

Odd, isn't this the role of GNOME, rather than Keepass2? I'm on Ubuntu and my
screen is locked when going into sleep mode under normal circumstances. This
is without using Keepass2.

-- 
Kind regards,
Loong Jin


signature.asc
Description: Digital signature


Processed: ITP: libdist-zilla-plugin-test-podspelling-perl -- Author tests for POD spelling

2015-05-25 Thread Debian Bug Tracking System
Processing control commands:

 block 786749 by -1
Bug #786749 [libdist-zilla-plugin-podspellingtests-perl] 
libdist-zilla-plugin-podspellingtests-perl: Has been deprecated and replaced 
upstream, should be replaced with libdist-zilla-plugin-test-podspelling-perl
786749 was not blocked by any bugs.
786749 was not blocking any bugs.
Added blocking bug(s) of 786749: 786753

-- 
786749: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786749
786753: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786753
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: tagging 786749

2015-05-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 786749 + stretch sid
Bug #786749 [libdist-zilla-plugin-podspellingtests-perl] 
libdist-zilla-plugin-podspellingtests-perl: Has been deprecated and replaced 
upstream, should be replaced with libdist-zilla-plugin-test-podspelling-perl
Added tag(s) sid and stretch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
786749: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786749
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#785305: [pkg-cli-apps-team] Bug#785305: keepass2: option to lock workspace on suspend does not work

2015-05-25 Thread Peter Spiess-Knafl
On 05/25/2015 12:02 PM, Chow Loong Jin wrote:
 On Mon, May 25, 2015 at 11:13:02AM +0200, Peter Spiess-Knafl wrote:
 Hi!

 Is there any progress on this bug? I really loose Keepass2 a lot and I
 saw that is marked for removal because of this bug.

 Can I help you somehow? Has it been forwared to upstream yet?
 
 Odd, isn't this the role of GNOME, rather than Keepass2? I'm on Ubuntu and my
 screen is locked when going into sleep mode under normal circumstances. This
 is without using Keepass2.
 

I think there is a misunderstanding of the word workspace. An opened
keepass file is also called workspace.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#786741: [PKG-Openstack-devel] Bug#786741: Bug#786741: horizon: CVE-2015-3988: Persistent XSS in Horizon metadata dashboard

2015-05-25 Thread Martin Zobel-Helas
Hi, 

On Mon May 25, 2015 at 11:47:17 +0200, Martin Zobel-Helas wrote:
 Hi, 
 
 On Mon May 25, 2015 at 07:36:15 +0200, Salvatore Bonaccorso wrote:
  Source: horizon
  Version: 2015.1.0-1
  Severity: important
  Tags: security upstream
  
  Hi,
  
  the following vulnerability was published for horizon.
  
  CVE-2015-3988[0]:
  | Multiple cross-site scripting (XSS) vulnerabilities in OpenStack
  | Dashboard (Horizon) 2015.1.0 allow remote authenticated users to
  | inject arbitrary web script or HTML via the metadata to a (1) Glance
  | image, (2) Nova flavor or (3) Host Aggregate.
 
 The patch seems to be
 https://git.openstack.org/cgit/openstack/horizon/commit/?id=6c944b5013acb0dce7cf3d8717e58f7f2427be07

The above link was for Juno, which is not in Debian. The correct link is
https://review.openstack.org/#/c/183656/

Cheers,
Martin
-- 
 Martin Zobel-Helas zo...@debian.orgDebian System Administrator
 Debian  GNU/Linux Developer   Debian Listmaster
 http://about.me/zobel   Debian Webmaster
 GPG Fingerprint:  6B18 5642 8E41 EC89 3D5D  BDBB 53B1 AC6D B11B 627B 


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#786436: ncurses FTBFS: configure loops

2015-05-25 Thread Helmut Grohne
On Mon, May 25, 2015 at 01:37:17PM +0200, Sven Joachim wrote:
 Since the pkg-config files are only created at make install.libs, we
 currently need to install the library into a temporary location.  I've
 come up with the following patch:
 
 --8---cut here---start-8---
 diff --git a/debian/rules b/debian/rules
 index a52135b..c3b7d6e 100755
 --- a/debian/rules
 +++ b/debian/rules
 @@ -275,8 +275,9 @@ $(wobjdir-32)/config.status: config.guess-stamp
  
  $(objdir-test)/config.status: build-wide config.guess-stamp
   test -d $(objdir-test) || mkdir $(objdir-test)
 - cd $(objdir-test)  CFLAGS=$(CFLAGS) $(srcdir)/test/configure \
 - $(CONFARGS-TEST)
 + cd $(objdir-test)  CFLAGS=$(CFLAGS) \
 + 
 PKG_CONFIG_LIBDIR=$(wobjdir)/usr/lib/$(DEB_HOST_MULTIARCH)/pkgconfig \
 + $(srcdir)/test/configure $(CONFARGS-TEST)
  
  build-arch build-indep: build
  
 @@ -308,8 +309,7 @@ build-debug: $(objdir-debug)/config.status
  build-wide: $(wobjdir)/config.status
   cd $(wobjdir)  $(MAKE)
   # needed for building the examples
 - mv $(wobjdir)/lib/libncursesw.so $(wobjdir)/lib/libncursesw.so.saved
 - echo INPUT(libncursesw.so.5 -ltinfo)  $(wobjdir)/lib/libncursesw.so
 + $(MAKE) -C $(wobjdir) DESTDIR=$(wobjdir) install.libs
   touch $@
  
  build-wide-static: $(wobjdir-static)/config.status
 --8---cut here---end---8---

If ncurses uses any external pkg-config files, then this patch breaks
cross building, because the pkg-config cross wrapper only sets
PKG_CONFIG_LIBDIR when it is unset.

Given that libgpm-dev does not ship a .pc file, it seems likely that
this is not the case.

Arguably, it is a limitation in the cross wrapper that you cannot extend
PKG_CONFIG_LIBDIR. So if ncurses needs this functionality, then a new
bug against pkg-config needs to be raised to accommodate this.

Helmut


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#776094: dovecot-imapd: corrupts mailbox after trying to retrieve it

2015-05-25 Thread Santiago Vila
Jaldhar, Jelmer:

This is serious data corruption bug, and we have a fix for it since 12
days ago. Is there any hope that a fix for this bug is included in
Debian 8.1? Release managers say the queue for fixes will be frozen
next weekend.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#786715: stellarium: Uses private copies of external headers

2015-05-25 Thread Tomasz Buchert
Hi,
thanks for the report. The upstream is already looking at this.
I'll also mention a relevant bug: https://bugreports.qt.io/browse/QTBUG-3897

Tomasz


signature.asc
Description: Digital signature


Bug#786436: ncurses FTBFS: configure loops

2015-05-25 Thread Sven Joachim
Am 25.05.2015 um 13:43 schrieb Helmut Grohne:

 On Mon, May 25, 2015 at 01:37:17PM +0200, Sven Joachim wrote:
 Since the pkg-config files are only created at make install.libs, we
 currently need to install the library into a temporary location.  I've
 come up with the following patch:
 
 --8---cut here---start-8---
 diff --git a/debian/rules b/debian/rules
 index a52135b..c3b7d6e 100755
 --- a/debian/rules
 +++ b/debian/rules
 @@ -275,8 +275,9 @@ $(wobjdir-32)/config.status: config.guess-stamp
  
  $(objdir-test)/config.status: build-wide config.guess-stamp
  test -d $(objdir-test) || mkdir $(objdir-test)
 -cd $(objdir-test)  CFLAGS=$(CFLAGS) $(srcdir)/test/configure \
 -$(CONFARGS-TEST)
 +cd $(objdir-test)  CFLAGS=$(CFLAGS) \
 +
 PKG_CONFIG_LIBDIR=$(wobjdir)/usr/lib/$(DEB_HOST_MULTIARCH)/pkgconfig \
 +$(srcdir)/test/configure $(CONFARGS-TEST)
  
  build-arch build-indep: build
  
 @@ -308,8 +309,7 @@ build-debug: $(objdir-debug)/config.status
  build-wide: $(wobjdir)/config.status
  cd $(wobjdir)  $(MAKE)
  # needed for building the examples
 -mv $(wobjdir)/lib/libncursesw.so $(wobjdir)/lib/libncursesw.so.saved
 -echo INPUT(libncursesw.so.5 -ltinfo)  $(wobjdir)/lib/libncursesw.so
 +$(MAKE) -C $(wobjdir) DESTDIR=$(wobjdir) install.libs
  touch $@
  
  build-wide-static: $(wobjdir-static)/config.status
 --8---cut here---end---8---

 If ncurses uses any external pkg-config files, then this patch breaks
 cross building, because the pkg-config cross wrapper only sets
 PKG_CONFIG_LIBDIR when it is unset.

 Given that libgpm-dev does not ship a .pc file, it seems likely that
 this is not the case.

It surely is not, but the cross build is broken anyway:

,
| checking for specific curses-directory... /tmp/ncurses-5.9+20150516/obj-wide
| checking for specified curses library type... ncursesw
| checking for multibyte character support... yes
| checking pkg-config for ncursesw... yes
| checking if the ncursesw package files work... configure: error: cannot run 
test program while cross compiling
`

Sounds like something for Thomas to look at.

Cheers,
   Sven


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#776094: dovecot-imapd: corrupts mailbox after trying to retrieve it

2015-05-25 Thread Jelmer Vernooij
Hi Santiago,

On Mon, May 25, 2015 at 01:43:10PM +0200, Santiago Vila wrote:
 Jaldhar, Jelmer:
 
 This is serious data corruption bug, and we have a fix for it since 12
 days ago. Is there any hope that a fix for this bug is included in
 Debian 8.1? Release managers say the queue for fixes will be frozen
 next weekend.
Agreed that we should really try to get this fixed for 8.1.

I've just uploaded 2.2.18. I will try to do a stable update as well, but
am unfortunately low on Debian time. Help welcome.

Cheers,

Jelmer


signature.asc
Description: Digital signature


Bug#786741: marked as done (horizon: CVE-2015-3988: Persistent XSS in Horizon metadata dashboard)

2015-05-25 Thread Debian Bug Tracking System
Your message dated Mon, 25 May 2015 12:34:28 +
with message-id e1ywrao-0005ez...@franck.debian.org
and subject line Bug#786741: fixed in horizon 2015.1.0-2
has caused the Debian Bug report #786741,
regarding horizon: CVE-2015-3988: Persistent XSS in Horizon metadata dashboard
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
786741: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786741
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Source: horizon
Version: 2015.1.0-1
Severity: important
Tags: security upstream

Hi,

the following vulnerability was published for horizon.

CVE-2015-3988[0]:
| Multiple cross-site scripting (XSS) vulnerabilities in OpenStack
| Dashboard (Horizon) 2015.1.0 allow remote authenticated users to
| inject arbitrary web script or HTML via the metadata to a (1) Glance
| image, (2) Nova flavor or (3) Host Aggregate.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities  Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2015-3988

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
---End Message---
---BeginMessage---
Source: horizon
Source-Version: 2015.1.0-2

We believe that the bug you reported is fixed in the latest version of
horizon, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 786...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thomas Goirand z...@debian.org (supplier of updated horizon package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 12 May 2015 23:23:46 +0200
Source: horizon
Binary: python-django-horizon openstack-dashboard openstack-dashboard-apache
Architecture: source all
Version: 2015.1.0-2
Distribution: unstable
Urgency: high
Maintainer: PKG OpenStack openstack-de...@lists.alioth.debian.org
Changed-By: Thomas Goirand z...@debian.org
Description:
 openstack-dashboard - web application to control an OpenStack cloud
 openstack-dashboard-apache - OpenStack Dashboard - Apache support
 python-django-horizon - Django module providing web interaction with OpenStack
Closes: 781680 786741
Changes:
 horizon (2015.1.0-2) unstable; urgency=high
 .
   * Added update for the sv.po debconf translations (Closes: #781680).
   * Added upstream patch for CVE-2015-3988 (Closes: #786741):
 Persistent_XSS_in_Horizon_metadata_dashboard.patch
Checksums-Sha1:
 4b6f92bdbd8654eca05f1535ff904f6857de6fdb 4018 horizon_2015.1.0-2.dsc
 2b70850a8835e1a42f581e16201238854a74bcd7 16200 horizon_2015.1.0-2.debian.tar.xz
 7f6b57eac9320b7830a366837173bf9e24adefb7 1811472 
python-django-horizon_2015.1.0-2_all.deb
 d4201d5e862605f4ab0926c0d4fee65b31524f04 1613944 
openstack-dashboard_2015.1.0-2_all.deb
 305d587ebffd1aa8a338f28829a7e4c2d4409c49 11194 
openstack-dashboard-apache_2015.1.0-2_all.deb
Checksums-Sha256:
 44046c5dfa41a2e1d9dd07c1173a2567d10c3032674681c81391d3d03e129d06 4018 
horizon_2015.1.0-2.dsc
 5fe81ed700a8f33b1dcc2a26dd787ed7f87e46891279b2371a5f4370c2abf58b 16200 
horizon_2015.1.0-2.debian.tar.xz
 c0c09bcc82fc24fb92e8eb886a91a47b10b66dfe50ac5ff974bd97deb57c2b76 1811472 
python-django-horizon_2015.1.0-2_all.deb
 ac7c712cf7ab005a74a5b8aa63207f8bb1aa6a19fb62ffb4701b0844b0b998f7 1613944 
openstack-dashboard_2015.1.0-2_all.deb
 2d098bc4ca11f4861d6c00f40f0299caf6e779a18a88c86c66f489da9888b823 11194 
openstack-dashboard-apache_2015.1.0-2_all.deb
Files:
 fdbdd29c193aa1a2d2f168a2575cab53 4018 net extra horizon_2015.1.0-2.dsc
 bffc6678189858a13ada0df22603f40a 16200 net extra 
horizon_2015.1.0-2.debian.tar.xz
 dda1d3433827ee5cc35f2379eab2e021 1811472 python extra 
python-django-horizon_2015.1.0-2_all.deb
 708d4c7e322a1eba7752840838415d5f 1613944 net extra 
openstack-dashboard_2015.1.0-2_all.deb
 ba5b7bf126bdfe953cac06bb81299aee 11194 net extra 
openstack-dashboard-apache_2015.1.0-2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIcBAEBCAAGBQJVYxQoAAoJENQWrRWsa0P+EFYQAI7jMqj45zMigH1E9FHYJifk
To/p20b+ktBEWZIpz3VIV8qc75007+cvvrYm8G7waOzqqgnOtVV8jifPOgzd1t5C
AtSYc2sAfAK4sJD9zExHhoaITD4e6OI+rfFEghFErigoTq5Em50hgkrR+cA1q4Iv

Bug#776094: dovecot-imapd: corrupts mailbox after trying to retrieve it

2015-05-25 Thread Santiago Vila
Ok. This is my proposal to fix this in stable:

https://people.debian.org/~sanvila/dovecot/

Try:

debdiff dovecot_2.2.13-11.dsc dovecot_2.2.13-11~deb8u1.dsc

and of course feel free to add anything I may have missed.

Thanks.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#786778: zendframework: HTTP Client component doesn't work after security upgrade

2015-05-25 Thread Marc Falzon
Package: zendframework
Version: 1.12.9+dfsg-2+deb8u2
Severity: critical
Justification: breaks unrelated software

Dear Maintainer,

After upgrading to version 1.12.9+dfsg-2+deb8u2 following security issue
in CVE-2015-3154 (https://security-tracker.debian.org/tracker/CVE-2015-3154),
the HTTP Client component of the framework throws exceptions after
executing a request. These crashes didn't occur before the security
upgrade.

Code snippet to reproduce the issue:

?php

//test.php
$httpClient = new \Zend_Http_Client();
$httpClient-setUri('https://www.debian.org/Bugs/');
$response = $httpClient-request('POST');
var_dump($response);

Results in:

Fatal error: Uncaught exception 'Zend_Http_Exception' with message
'Invalid header value detected' in
/debian/zend/library/Zend/Http/Client.php:1597
Stack trace:
#0 /debian/zend/library/Zend/Http/Client.php(467):
Zend_Http_Client-_validateHeaderValue(0)
#1 /debian/zend/library/Zend/Http/Client.php(1358):
Zend_Http_Client-setHeaders('Content-Length', 0)
#2 /debian/zend/library/Zend/Http/Client.php(1061):
Zend_Http_Client-_prepareBody()
#3 /debian/test.php(15): Zend_Http_Client-request('POST')
#4 {main}
  thrown in /debian/zend/library/Zend/Http/Client.php on line 1597


In preparebody or setRawData method in Zend_Http_Client.php,
there are some calls $this-setHeaders(self::CONTENT_LENGTH, 
strlen($this-raw_post_data));
the length value is a numeric, but the _validateHeaderValue method that you 
added in the
patch doesn't accept numeric value as argument.
This throw the Zend_Http_Exception('Invalid header value detected');
maybe you can cast the value before calling _validateHeaderValue.

Best regards,

m.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: fixed

2015-05-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 fixed 786469 sysvinit/2.88dsf-59.2
Bug #786469 {Done: Martin Pitt mp...@debian.org} [sysvinit-utils, util-linux] 
sysvinit-utils, util-linux: can't upgrade - 'installation run will require 
temporarily removing the essential package'
Marked as fixed in versions sysvinit/2.88dsf-59.2.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
786469: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786469
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#786778: zendframework: HTTP Client component doesn't work after security upgrade

2015-05-25 Thread Debian Bug Tracking System
Processing control commands:

 tag -1 moreinfo
Bug #786778 [zendframework] zendframework: HTTP Client component doesn't work 
after security upgrade
Added tag(s) moreinfo.

-- 
786778: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786778
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#786778: zendframework: HTTP Client component doesn't work after security upgrade

2015-05-25 Thread David Prévot
Control: tag -1 moreinfo

Hi Marc,

Thanks for your report.

Le 25/05/2015 09:52, Marc Falzon a écrit :
 Package: zendframework
 Version: 1.12.9+dfsg-2+deb8u2

 the HTTP Client component of the framework throws exceptions after
 executing a request. These crashes didn't occur before the security
 upgrade.
 
 Code snippet to reproduce the issue:
[…]

Thank you for that!

 Results in:
 
 Fatal error: Uncaught exception 'Zend_Http_Exception' with message

I’m able to reproduce the issue with version 1.12.9+dfsg-2+deb8u1, as
announced by [DSA 3265-1], but not with version 1.12.9+dfsg-2+deb8u2
that aimed at fixing this regression [1], as announced in [DSA 3265-2].

Can you please double check the actual zendframework version used and
come back to us?

1:
https://github.com/zendframework/zf1/commit/7d8e6c6cf59ea0b5004960b8402a39f89a9e512a

Regards

David



signature.asc
Description: OpenPGP digital signature


Bug#786715: stellarium: Uses private copies of external headers

2015-05-25 Thread Sune Vuorela
On Monday 25 May 2015 14:14:53 Tomasz Buchert wrote:
 Hi,
 thanks for the report. The upstream is already looking at this.

Great. My suggestion would be to go for KArchive on this.

 I'll also mention a relevant bug: https://bugreports.qt.io/browse/QTBUG-3897

Yeah. That's kind of what my option 4) describes. Likely not going to happen. 
The QZip classes is just good enough for what Qt internally needs, and there 
are better external options available. (KArchive, quazip, probably others)

/Sune
-- 
I didn’t stop pretending when I became an adult, it’s just that when I was a 
kid I was pretending that I fit into the rules and structures of this world. 
And now that I’m an adult, I pretend that those rules and structures exist.
   - zefrank


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#786778: zendframework: HTTP Client component doesn't work after security upgrade

2015-05-25 Thread Marc Falzon
Hi David

On Mon, May 25, 2015 at 4:24 PM, David Prévot da...@tilapin.org wrote:

 Control: tag -1 moreinfo

 Hi Marc,

 Thanks for your report.

 Le 25/05/2015 09:52, Marc Falzon a écrit :
  Package: zendframework
  Version: 1.12.9+dfsg-2+deb8u2

  the HTTP Client component of the framework throws exceptions after
  executing a request. These crashes didn't occur before the security
  upgrade.
 
  Code snippet to reproduce the issue:
 […]

 Thank you for that!

  Results in:
 
  Fatal error: Uncaught exception 'Zend_Http_Exception' with message

 I’m able to reproduce the issue with version 1.12.9+dfsg-2+deb8u1, as
 announced by [DSA 3265-1], but not with version 1.12.9+dfsg-2+deb8u2
 that aimed at fixing this regression [1], as announced in [DSA 3265-2].

 Can you please double check the actual zendframework version used and
 come back to us?


My bad, looks like we've tested with version 1.12.9+dfsg-2+deb8u1:
version 1.12.9+dfsg-2+deb8u2 seems to fix the issue.

This bug can be closed,

m.


Bug#786786: libmaven-compiler-plugin-java,libmaven-compiler-plugin-2.5-java: file overwrite: […]/2.5.1/maven-compiler-plugin-2.5.1.jar

2015-05-25 Thread Cyril Brulebois
Package: libmaven-compiler-plugin-java,libmaven-compiler-plugin-2.5-java
Severity: serious
Justification: breaks upgrade

Hi,

Just noticed this during a dist-upgrade:
| Preparing to unpack .../libmaven-compiler-plugin-2.5-java_2.5.1-3_all.deb ...
| Unpacking libmaven-compiler-plugin-2.5-java (2.5.1-3) ...
| dpkg: error processing archive 
/var/cache/apt/archives/libmaven-compiler-plugin-2.5-java_2.5.1-3_all.deb 
(--unpack):
|  trying to overwrite 
'/usr/share/maven-repo/org/apache/maven/plugins/maven-compiler-plugin/2.5.1/maven-compiler-plugin-2.5.1.jar',
 which is also in package libmaven-compiler-plugin-java 2.5.1-1

Mraw,
KiBi.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#783374: last NMU patch breaks gparted completely (on my system)

2015-05-25 Thread Guillem Jover
Hi!

On Mon, 2015-05-25 at 19:51:57 +1000, Aníbal Monsalve Salazar wrote:
 On Fri, 2015-05-01 05:05:10 +0200, Guillem Jover wrote:
  Control: tag -1 - patch

  On Sun, 2015-04-26 at 12:09:16 -0400, Michael Gilbert wrote:
  On Sun, Apr 26, 2015 at 9:46 AM, Felix Zielcke wrote:
  Just tried out the newest upload of gparted. Which fails completely
  The one before which is in jessie works fine.
  I.e. 0.19.0-2 without the NMU fix
 
  gparted needs a newer udisks2, see #782838.  Proposed patch attached.
 
  diff -Nru gparted-0.19.0/debian/control gparted-0.19.0/debian/control
  --- gparted-0.19.0/debian/control  2014-06-11 14:50:55.0 +
  +++ gparted-0.19.0/debian/control  2015-04-26 16:02:28.0 +
  @@ -11,7 +11,7 @@
 
   Package: gparted
   Architecture: any
  -Depends: ${shlibs:Depends}, ${misc:Depends}
  +Depends: ${shlibs:Depends}, ${misc:Depends}, udisks2 (= 2.1.5-1)
   Suggests: xfsprogs, reiserfsprogs, reiser4progs, jfsutils, ntfs-3g,
dosfstools, mtools, yelp, kpartx, dmraid, dmsetup, gpart
   Description: GNOME partition editor
 
  As pointed out in #783397 this fix is incorrect. The correct fix is to
  use a Breaks, so that there's no unnecessary Depends introduced.

 As I can see, gparted doesn't break udisks2.

It seems to break in combination with older udisks2.

 Do you mean to add
 
 Breaks: udisks2 ( 2.1.5)
 
 to gparted's debian/control?

Yes.

Thanks,
Guillem


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: python-urllib3: AttributeError: 'module' object has no attribute 'PROTOCOL_SSLv3'

2015-05-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tag 786784 + moreinfo
Bug #786784 {Done: Chris Bainbridge chris.bainbri...@gmail.com} 
[python-urllib3] python-urllib3: AttributeError: 'module' object has no 
attribute 'PROTOCOL_SSLv3'
Added tag(s) moreinfo.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
786784: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786784
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#786784: python-urllib3: AttributeError: 'module' object has no attribute 'PROTOCOL_SSLv3'

2015-05-25 Thread Daniele Tricoli
tag 786784 + moreinfo
thanks

Hello Chris,
thanks for this report!

Chris Bainbridge wrote:
 Package: python-urllib3
 Version: 1.9.1-3
 Severity: serious
 
 $ python
 Python 2.7.9 (default, Mar  1 2015, 12:57:24)
 [GCC 4.9.2] on linux2
 Type help, copyright, credits or license for more information.
 
  import requests
 
 Traceback (most recent call last):
   File stdin, line 1, in module
   File requests/__init__.py, line 53, in module
 from urllib3.contrib import pyopenssl
   File urllib3/contrib/pyopenssl.py, line 70, in module
 ssl.PROTOCOL_SSLv3: OpenSSL.SSL.SSLv3_METHOD,
 AttributeError: 'module' object has no attribute 'PROTOCOL_SSLv3'

this bug seems like #781781 and as I said there I'm not able to reproduce it. 
Can you provide more info? Thanks!
Are you using the packaged version on urllib3? If yes there is something 
really strange since I patched it as explained here:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781781#20

I will try on a fresh Jessie VM (I suppose you are using Jessie since urllib3 
version 1.9.1-3), but any info will be very appreciated.

Cheers,

-- 
 Daniele Tricoli 'Eriol'
 https://mornie.org

signature.asc
Description: This is a digitally signed message part.


Bug#786801: nfstrace: FTBFS: test suite errors (esp. #60, json_analyzer)

2015-05-25 Thread Aaron M. Ucko
Source: nfstrace
Version: 0.4.0-1
Severity: serious
Justification: fails to build from source (but built successfully in the past)

Automated builds of nfstrace have been failing with test suite
errors.  Test #60 fails everywhere:

   60/63 Test #60: unit_test_json_analyzer
   ..***Failed5.36 sec
   [==] Running 7 tests from 3 test cases.
   [--] Global test environment set-up.
   [--] 3 tests from JsonAnalyzerCase
   [ RUN  ] JsonAnalyzerCase.collectStatistics
   unknown file: Failure
   C++ exception with description Binding server socket error: Address
   already in use thrown in SetUp().
   [  FAILED  ] JsonAnalyzerCase.collectStatistics (0 ms)
   ...

However, some other tests also fail on some architectures, as detailed
at https://buildd.debian.org/status/logs.php?pkg=nfstracever=0.4.0-1.

Could you please take a look?

Thanks!


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: [pkg-php-pear] Bug#786778: zendframework: HTTP Client component doesn't work after security upgrade

2015-05-25 Thread Debian Bug Tracking System
Processing control commands:

 found -1 1.12.9+dfsg-2+deb8u1
Bug #786778 [zendframework] zendframework: HTTP Client component doesn't work 
after security upgrade
Marked as found in versions zendframework/1.12.9+dfsg-2+deb8u1.
 notfound -1 1.12.9+dfsg-2+deb8u2
Bug #786778 [zendframework] zendframework: HTTP Client component doesn't work 
after security upgrade
No longer marked as found in versions zendframework/1.12.9+dfsg-2+deb8u2.
 close -1 1.12.9+dfsg-2+deb8u2
Bug #786778 [zendframework] zendframework: HTTP Client component doesn't work 
after security upgrade
Marked as fixed in versions zendframework/1.12.9+dfsg-2+deb8u2.
Bug #786778 [zendframework] zendframework: HTTP Client component doesn't work 
after security upgrade
Marked Bug as done

-- 
786778: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786778
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#786778: [pkg-php-pear] Bug#786778: zendframework: HTTP Client component doesn't work after security upgrade

2015-05-25 Thread David Prévot
Control: found -1 1.12.9+dfsg-2+deb8u1
Control: notfound -1 1.12.9+dfsg-2+deb8u2
Control: close -1 1.12.9+dfsg-2+deb8u2

Hi Marc,

Le 25/05/2015 10:44, Marc Falzon a écrit :

 My bad, looks like we've tested with version 1.12.9+dfsg-2+deb8u1:
 version 1.12.9+dfsg-2+deb8u2 seems to fix the issue.

Thank you for the confirmation.

Regards

David




signature.asc
Description: OpenPGP digital signature


Bug#786784: marked as done (python-urllib3: AttributeError: 'module' object has no attribute 'PROTOCOL_SSLv3')

2015-05-25 Thread Debian Bug Tracking System
Your message dated Mon, 25 May 2015 16:08:16 +0100
with message-id 
cap-bsrbukdjf-1pjrozymgqya9chqq1aavnubrezh8p3f8a...@mail.gmail.com
and subject line 
has caused the Debian Bug report #786784,
regarding python-urllib3: AttributeError: 'module' object has no attribute 
'PROTOCOL_SSLv3'
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
786784: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786784
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: python-urllib3
Version: 1.9.1-3
Severity: serious

$ python
Python 2.7.9 (default, Mar  1 2015, 12:57:24)
[GCC 4.9.2] on linux2
Type help, copyright, credits or license for more information.
 import requests
Traceback (most recent call last):
  File stdin, line 1, in module
  File requests/__init__.py, line 53, in module
from urllib3.contrib import pyopenssl
  File urllib3/contrib/pyopenssl.py, line 70, in module
ssl.PROTOCOL_SSLv3: OpenSSL.SSL.SSLv3_METHOD,
AttributeError: 'module' object has no attribute 'PROTOCOL_SSLv3'
---End Message---
---BeginMessage---
tag 786784 unreproducible
--

Invalid---End Message---


Bug#786779: v4l2loopback-dkms: fails to build with linux-4.0 kernel

2015-05-25 Thread Mikhail Yakshin
Package: v4l2loopback-dkms
Version: 0.8.0-5
Severity: grave
Justification: renders package unusable

Dear Maintainer,

Installing v4l2loopback-dkms on current sid-based system with
linux-image-4.0.0-1-amd64 ends up in multiple DKMS compilation errors
(thus rendering package unusable), namely:

  CC [M]  /var/lib/dkms/v4l2loopback/0.8.0/build/v4l2loopback.o
/var/lib/dkms/v4l2loopback/0.8.0/build/v4l2loopback.c: In function 
‘attr_store_maxopeners’:
/var/lib/dkms/v4l2loopback/0.8.0/build/v4l2loopback.c:486:2: error: implicit 
declaration of function ‘strict_strtoul’ [-Werror=implicit-function-declaration]
  if (strict_strtoul(buf, 0, curr))
  ^
/var/lib/dkms/v4l2loopback/0.8.0/build/v4l2loopback.c: In function ‘init_vdev’:
/var/lib/dkms/v4l2loopback/0.8.0/build/v4l2loopback.c:2002:7: error: ‘struct 
video_device’ has no member named ‘debug’
   vdev-debug = V4L2_DEBUG_IOCTL | V4L2_DEBUG_IOCTL_ARG;
   ^
/var/lib/dkms/v4l2loopback/0.8.0/build/v4l2loopback.c:2002:17: error: 
‘V4L2_DEBUG_IOCTL’ undeclared (first use in this function)
   vdev-debug = V4L2_DEBUG_IOCTL | V4L2_DEBUG_IOCTL_ARG;
 ^
/var/lib/dkms/v4l2loopback/0.8.0/build/v4l2loopback.c:2002:17: note: each 
undeclared identifier is reported only once for each function it appears in
/var/lib/dkms/v4l2loopback/0.8.0/build/v4l2loopback.c:2002:36: error: 
‘V4L2_DEBUG_IOCTL_ARG’ undeclared (first use in this function)
   vdev-debug = V4L2_DEBUG_IOCTL | V4L2_DEBUG_IOCTL_ARG;
^
cc1: some warnings being treated as errors

All these issues seem to be already addressed upstream, for example,
missing strict_strtoul is now correctly wrapper as kstrtoul, as
required by newer kernels:

#if LINUX_VERSION_CODE  KERNEL_VERSION(3,6,1)
# define kstrtoul strict_strtoul
#endif

Could you please update the module in package?

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, armhf

Kernel: Linux 4.0.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages v4l2loopback-dkms depends on:
ii  dkms  2.2.0.3-2

v4l2loopback-dkms recommends no packages.

Versions of packages v4l2loopback-dkms suggests:
ii  v4l2loopback-utils  0.8.0-5

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: found 786565 in 0.5.28-1

2015-05-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 found 786565 0.5.28-1
Bug #786565 {Done: David Prévot taf...@debian.org} [xul-ext-requestpolicy] 
iceweasel: breaks xul-ext-requestpolicy
Marked as found in versions requestpolicy/0.5.28-1.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
786565: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786565
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#786784: python-urllib3: AttributeError: 'module' object has no attribute 'PROTOCOL_SSLv3'

2015-05-25 Thread Chris Bainbridge
Package: python-urllib3
Version: 1.9.1-3
Severity: serious

$ python
Python 2.7.9 (default, Mar  1 2015, 12:57:24)
[GCC 4.9.2] on linux2
Type help, copyright, credits or license for more information.
 import requests
Traceback (most recent call last):
  File stdin, line 1, in module
  File requests/__init__.py, line 53, in module
from urllib3.contrib import pyopenssl
  File urllib3/contrib/pyopenssl.py, line 70, in module
ssl.PROTOCOL_SSLv3: OpenSSL.SSL.SSLv3_METHOD,
AttributeError: 'module' object has no attribute 'PROTOCOL_SSLv3'


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#753859: diodon: depends on libgee2 which is deprecated

2015-05-25 Thread Oliver Sauder
On 21.05.2015 21:58, Emilio Pozuelo Monfort wrote:
 Control: severity -1 serious
 
 We want to remove libgee2 from unstable RSN, and there are only a few rdeps 
 now,
 so I'm bumping the severity of the bugs.
 
 If you have questions don't hesitate to ask.
 
 Emilio
 

Hey Emilio,

I actually fixed this a couple of months ago but I couldn't find a
sponsor for the new package.

So I have uploaded the package again to Mentors which fixes this issue.

You can find it here http://mentors.debian.net/package/diodon resp.
http://mentors.debian.net/debian/pool/main/d/diodon/diodon_1.3.0-1.dsc

Could you sponsor it?

Thanks,
Oliver


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#786758: doomsday: segfault on startup

2015-05-25 Thread Michael Gilbert
On Mon, May 25, 2015 at 6:16 AM, Adam Borowski wrote:
 When trying to start doomsday, it pops up a dialog which says:
 .[ Doomsday Engine ]
 App init failed:
  [NotFoundError] (Record::subrecord) Subrecord 'alert' not found
 `
 then crashes with a segmentation fault.

This seems to be an incompatibility with persist.pack files from older versions.

If you backup ~/.doomsday/runtime/persist.pack to somewhere else, does
that work around the problem?

Best wishes,
Mike


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#785305: [pkg-cli-apps-team] Bug#785305: keepass2: option to lock workspace on suspend does not work

2015-05-25 Thread Chow Loong Jin
forwarded 785305 https://sourceforge.net/p/keepass/bugs/1378/
kthxbye

On Mon, May 25, 2015 at 12:10:22PM +0200, Peter Spiess-Knafl wrote:
 On 05/25/2015 12:02 PM, Chow Loong Jin wrote:
  On Mon, May 25, 2015 at 11:13:02AM +0200, Peter Spiess-Knafl wrote:
  Hi!
 
  Is there any progress on this bug? I really loose Keepass2 a lot and I
  saw that is marked for removal because of this bug.
 
  Can I help you somehow? Has it been forwared to upstream yet?
  
  Odd, isn't this the role of GNOME, rather than Keepass2? I'm on Ubuntu and 
  my
  screen is locked when going into sleep mode under normal circumstances. This
  is without using Keepass2.
  
 
 I think there is a misunderstanding of the word workspace. An opened
 keepass file is also called workspace.

Hmm. I just poked at the keepass2 source code, and it looks like it depends on
Windows-based system events (SessionEnding, SessionSwitch, and PowerModeChanged)
which aren't implemented in Mono:
https://github.com/mono/mono/blob/master/mcs/class/System/Microsoft.Win32/SystemEvents.cs#L127

...and while looking for the upstream bug tracer, I just found an upstream bug:
https://sourceforge.net/p/keepass/bugs/1378/

-- 
Kind regards,
Loong Jin


signature.asc
Description: Digital signature


Processed: Re: [pkg-cli-apps-team] Bug#785305: keepass2: option to lock workspace on suspend does not work

2015-05-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 forwarded 785305 https://sourceforge.net/p/keepass/bugs/1378/
Bug #785305 [keepass2] keepass2: option to lock workspace on suspend does not 
work
Set Bug forwarded-to-address to 'https://sourceforge.net/p/keepass/bugs/1378/'.
 kthxbye
Stopping processing here.

Please contact me if you need assistance.
-- 
785305: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785305
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#786819: netsurf: FTBFS with libgdk-pixbuf2.0-dev 2.31.4-1: gtk/window.c:55:14: error: unknown type name 'GdkPixdata'

2015-05-25 Thread Sebastian Ramacher
Source: netsurf
Version: 3.2+dfsg-2
Severity: serious
Justification: fails to build from source (but built successfully in the past)
Tags: stretch sid

netsurf FTBFS if built against libgdk-píxbuf2.0-dev 2.31.4-1 which is currently
in unstable:
|  COMPILE: gtk/window.c
| gtk/window.c:55:14: error: unknown type name 'GdkPixdata'
|  extern const GdkPixdata menu_cursor_pixdata;
|   ^
| gtk/window.c: In function 'nsgtk_create_menu_cursor':
| gtk/window.c:1057:2: warning: implicit declaration of function 
'gdk_pixbuf_from_pixdata' [-Wimplicit-function-declaration]
|   pixbuf = gdk_pixbuf_from_pixdata(menu_cursor_pixdata, FALSE, NULL);
|   ^
| gtk/window.c:1057:2: warning: nested extern declaration of 
'gdk_pixbuf_from_pixdata' [-Wnested-externs]
| gtk/window.c:1057:9: warning: assignment makes pointer from integer without a 
cast
|   pixbuf = gdk_pixbuf_from_pixdata(menu_cursor_pixdata, FALSE, NULL);
|  ^

For the full log see
https://buildd.debian.org/status/fetch.php?pkg=netsurfarch=amd64ver=3.2+dfsg-2+b2stamp=1432571606

Cheers
-- 
Sebastian Ramacher


signature.asc
Description: Digital signature


Bug#784709: issue with os-prober

2015-05-25 Thread Jérôme Kieffer
On Thu, 21 May 2015 12:14:15 +0800
Paul Wise p...@debian.org wrote:

 On Wed, 20 May 2015 14:59:04 +0200 Jérôme Kieffer wrote:
 
  jerome@patagonia:~$ sudo blkid -o value -s TYPE /dev/sdb4
  jerome@patagonia:~$ echo $?
  0
 
 That is strange, what about just this?
 
 sudo blkid /dev/sdb4 ; echo $?

Dear Paul,

# uname -a
Linux patagonia 3.2.0-3-amd64 #1 SMP Mon Jul 23 02:45:17 UTC 2012 x86_64 
GNU/Linux

# fdisk -l /dev/sdb
Disque /dev/sdb : 1,8 TiB, 2000398934016 octets, 3907029168 secteurs
Unités : secteur de 1 × 512 = 512 octets
Taille de secteur (logique / physique) : 512 octets / 512 octets
taille d'E/S (minimale / optimale) : 512 octets / 512 octets
Type d'étiquette de disque : dos
Identifiant de disque : 0x9a2578f7

Device Boot  StartEndSectors  Size Id Type
/dev/sdb1   63   33575849   33575787   16G 82 Linux swap / Solaris
/dev/sdb2 33575850  243304424  209728575  100G 83 Linux
/dev/sdb3243304425  453032999  209728575  100G 83 Linux
/dev/sdb4453033000 3907024064 3453991065  1,6T  5 Extended
/dev/sdb5453033063  557905319  104872257   50G 83 Linux
/dev/sdb6557905383  662777639  104872257   50G 83 Linux
/dev/sdb766203  767649959  104872257   50G 83 Linux
/dev/sdb8767650023  872522279  104872257   50G 83 Linux
/dev/sdb9872522343 1082250854  209728512  100G 83 Linux
/dev/sdb10  1082250918 3907024064 2824773147  1,3T 83 Linux

# blkid /dev/sdb?
/dev/sdb1: LABEL=Swap2T UUID=b3de0b2e-9092-4d08-af8d-09fefe8e9735 
TYPE=swap PARTUUID=9a2578f7-01
/dev/sdb2: LABEL=Win UUID=78d417f1-a097-4cf3-9218-32a621f78c68 TYPE=ext4 
PARTUUID=9a2578f7-02
/dev/sdb3: LABEL=Root UUID=9b3d9c65-6ba2-425f-bc5a-729cb6098165 TYPE=ext4 
PARTUUID=9a2578f7-03
/dev/sdb4: PTTYPE=dos PARTUUID=9a2578f7-04
/dev/sdb5: LABEL=UsrLocal UUID=dee401ac-fa36-44a5-9463-2571f8f52a84 
TYPE=ext4 PARTUUID=9a2578f7-05
/dev/sdb6: LABEL=Var UUID=e49c7936-3e39-4644-b025-e943172cd218 TYPE=ext4 
PARTUUID=9a2578f7-06
/dev/sdb7: LABEL=Backup UUID=251f4ed5-6114-4f19-b9c7-060eb82ececb 
TYPE=ext4 PARTUUID=9a2578f7-07
/dev/sdb8: LABEL=Opt UUID=8c0395c2-c9da-4ffc-a1a1-08851774182e TYPE=ext4 
PARTUUID=9a2578f7-08
/dev/sdb9: LABEL=Big UUID=deab5b7f-fb85-4f0d-95ed-84d37180162d TYPE=ext4 
PARTUUID=9a2578f7-09

The extended partition looks different from the other, but the result of blkid 
under 3.2 is the same as 3.16.

Cheers,


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#786819: netsurf: FTBFS with libgdk-pixbuf2.0-dev 2.31.4-1: gtk/window.c:55:14: error: unknown type name 'GdkPixdata'

2015-05-25 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + patch
Bug #786819 [src:netsurf] netsurf: FTBFS with libgdk-pixbuf2.0-dev 2.31.4-1: 
gtk/window.c:55:14: error: unknown type name 'GdkPixdata'
Added tag(s) patch.

-- 
786819: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786819
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#786819: netsurf: FTBFS with libgdk-pixbuf2.0-dev 2.31.4-1: gtk/window.c:55:14: error: unknown type name 'GdkPixdata'

2015-05-25 Thread Sebastian Ramacher
Control: tags -1 + patch

On 2015-05-25 22:12:07, Sebastian Ramacher wrote:
 Source: netsurf
 Version: 3.2+dfsg-2
 Severity: serious
 Justification: fails to build from source (but built successfully in the past)
 Tags: stretch sid
 
 netsurf FTBFS if built against libgdk-píxbuf2.0-dev 2.31.4-1 which is 
 currently
 in unstable:
 |  COMPILE: gtk/window.c
 | gtk/window.c:55:14: error: unknown type name 'GdkPixdata'
 |  extern const GdkPixdata menu_cursor_pixdata;
 |   ^
 | gtk/window.c: In function 'nsgtk_create_menu_cursor':
 | gtk/window.c:1057:2: warning: implicit declaration of function 
 'gdk_pixbuf_from_pixdata' [-Wimplicit-function-declaration]
 |   pixbuf = gdk_pixbuf_from_pixdata(menu_cursor_pixdata, FALSE, NULL);
 |   ^
 | gtk/window.c:1057:2: warning: nested extern declaration of 
 'gdk_pixbuf_from_pixdata' [-Wnested-externs]
 | gtk/window.c:1057:9: warning: assignment makes pointer from integer without 
 a cast
 |   pixbuf = gdk_pixbuf_from_pixdata(menu_cursor_pixdata, FALSE, NULL);
 |  ^

This issue is almost fixed upstream in [1]. In addition to this change, the
generated file also needs another include. A debdiff fixing this bug is
attached.

Cheers

[1] 
http://source.netsurf-browser.org/netsurf.git/commit/?id=a29e9589f6bd54e258805bef367528a18d7b0c2b
-- 
Sebastian Ramacher
diff -Nru netsurf-3.2+dfsg/debian/changelog netsurf-3.2+dfsg/debian/changelog
--- netsurf-3.2+dfsg/debian/changelog   2014-08-29 23:59:03.0 +0200
+++ netsurf-3.2+dfsg/debian/changelog   2015-05-25 22:52:12.0 +0200
@@ -1,3 +1,11 @@
+netsurf (3.2+dfsg-2.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * debian/patches/change-how-gdk-image.patch: Fix build against
+libgdk-pixbuf2.0-dev 2.31.4. (Closes: #786819)
+
+ -- Sebastian Ramacher sramac...@debian.org  Mon, 25 May 2015 22:25:10 +0200
+
 netsurf (3.2+dfsg-2) unstable; urgency=medium
 
   * Do not build with javascript support on s390x
diff -Nru netsurf-3.2+dfsg/debian/patches/change-how-gdk-image.patch 
netsurf-3.2+dfsg/debian/patches/change-how-gdk-image.patch
--- netsurf-3.2+dfsg/debian/patches/change-how-gdk-image.patch  1970-01-01 
01:00:00.0 +0100
+++ netsurf-3.2+dfsg/debian/patches/change-how-gdk-image.patch  2015-05-25 
22:54:14.0 +0200
@@ -0,0 +1,49 @@
+Description: Change how GDK image resources are compiled in
+ The compiled in image resources were being created as a structure in a
+ generated c source file. The generation of this file caused constness
+ warning as a guint8 * was initialised from a const char array.
+ .
+ This changes the generation and use of these compiled in resources to
+ use the raw inline form as suggested by the documentation removing the
+ const warning.
+ .
+ In addition to the changes from a29e9589f6bd54e258805bef367528a18d7b0c2b, the
+ include in the generated file is changed to glib.h.
+Origin: upstream,
+ 
http://source.netsurf-browser.org/netsurf.git/commit/?id=a29e9589f6bd54e258805bef367528a18d7b0c2b
+Bug-Debian: https://bugs.debian.org/786819
+Last-Update: 2015-05-25
+
+--- a/netsurf/gtk/Makefile.target
 b/netsurf/gtk/Makefile.target
+@@ -90,8 +90,8 @@
+ S_PIXBUF += $(2)
+ 
+ $(2): $(1)
+-  $(Q)echo #include gdk-pixbuf/gdk-pixdata.h  $(2)
+-  $(Q)gdk-pixbuf-csource --extern --struct --name=$(3) $(1)  $(2) || \
++  $(Q)echo #include glib.h  $(2)
++  $(Q)gdk-pixbuf-csource --extern --raw --name=$(3) $(1)  $(2) || \
+   ( rm -f $(2)  false )
+ 
+ endef
+--- a/netsurf/gtk/window.c
 b/netsurf/gtk/window.c
+@@ -52,7 +52,7 @@
+ #define CONNECT(obj, sig, callback, ptr) \
+   g_signal_connect(G_OBJECT(obj), (sig), G_CALLBACK(callback), (ptr))
+ 
+-extern const GdkPixdata menu_cursor_pixdata;
++extern const guint8 *menu_cursor_pixdata;
+ 
+ struct gui_window {
+   /** The gtk scaffold object containing menu, buttons, url bar, [tabs],
+@@ -1054,7 +1054,7 @@
+ {
+   GdkCursor *cursor = NULL;
+   GdkPixbuf *pixbuf;
+-  pixbuf = gdk_pixbuf_from_pixdata(menu_cursor_pixdata, FALSE, NULL);
++  pixbuf = gdk_pixbuf_new_from_inline(-1, menu_cursor_pixdata, FALSE, 
NULL);
+   cursor = gdk_cursor_new_from_pixbuf(gdk_display_get_default(), pixbuf, 
0, 3);
+   g_object_unref (pixbuf);
+ 
diff -Nru netsurf-3.2+dfsg/debian/patches/series 
netsurf-3.2+dfsg/debian/patches/series
--- netsurf-3.2+dfsg/debian/patches/series  2014-08-20 10:59:40.0 
+0200
+++ netsurf-3.2+dfsg/debian/patches/series  2015-05-25 22:33:13.0 
+0200
@@ -1,2 +1,3 @@
 set-netsurf-config.patch
 change-install-binary-targets
+change-how-gdk-image.patch


signature.asc
Description: Digital signature


Processed: found 786565 in 0.5.25-1

2015-05-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 found 786565 0.5.25-1
Bug #786565 {Done: David Prévot taf...@debian.org} [xul-ext-requestpolicy] 
iceweasel: breaks xul-ext-requestpolicy
Marked as found in versions requestpolicy/0.5.25-1.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
786565: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786565
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#786817: yash: fieldsplitting data corruption

2015-05-25 Thread Martijn Dekker
Package: yash
Version: 2.36-1
Severity: critical

When doing field-splitting, fields starting with backslashes are
corrupted: starting from the 2nd field, they have their initial
backslashes removed. Only the first field is left intact.

Given a default $IFS:

testfn() {
   printf '%s\n' $@
}
VAR='\o\ne \t\wo \th\r\ee \fo\ur'
testfn $VAR

Got output:

\o\ne
t\wo
th\r\ee
fo\ur

Expected ouput (produced on every POSIX shell except yash):

\o\ne
\t\wo
\th\r\ee
\fo\ur

Clearly, this sort of data corruption is a critical security problem.
Lack of data integrity is just the beginning. Removal of backslashes
might defeat quoting/escaping of critical data and lead to the execution
of arbitrary commands. For instance, what if some script feeds the
result of improper fieldsplitting to eval?

Upstream fixed the bug in SVN after my report:
http://osdn.jp/projects/yash/scm/svn/commits/3298

But the author does not treat it with urgency and has neither announced
the bug nor patched/updated/withdrawn the release version, which clearly
should not be used with a bug like this. So Debian should issue a patch
for its packaged version in the meantime.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#786836: packaging not yet ready for mass/stable usage

2015-05-25 Thread Luca Bruno
Source: rustc
Version: 1.0.0+dfsg1-1
Severity: serious

Even though Rust recently reached the 1.0 milestone,
compiler and ecosystem packaging still has to reach a
ready for the masses status.

As some bits are still missing (cargo, external libs) and 
other still under discussion (dynlibs, lang-extensions), 
this bug is left open in order to avoid a premature migration
to testing.

-- System Information:
Debian Release: 8.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#784344: marked as done (Buggy DTB causes imx53 SATA failure)

2015-05-25 Thread Debian Bug Tracking System
Your message dated Mon, 25 May 2015 21:32:28 +
with message-id e1ywzz2-pi...@franck.debian.org
and subject line Bug#784344: fixed in linux 3.16.7-ckt11-1
has caused the Debian Bug report #784344,
regarding Buggy DTB causes imx53 SATA failure
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
784344: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784344
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: src:linux
Version: 3.16.7-ckt9-3~deb8u1
Severity: serious

Hi guys,

Just debugged on harris.debian.org (imx53, Debian porter box) -
there's a missing patch that's needed for the imx53 sata controller to
work. At some point, it looks like the code in drivers/ata/ahci_imx.c
has changed and arch/arm/boot/dts/imx53.dtsi needed a change to
match. It's a trivial change, just renaming the core SATA clock from
sata_gate to sata. Upstream patch is in commit
025781539a3ccf867c1e0f2fc63f61cc8c7c5415.

(Adding more info for people googling for this!)

Without this patch, the SATA driver in drivers/ata/ahci_imx.c just
reports

[2.377276] ahci-imx 1000.sata: can't get sata clock.
[2.425652] ahci-imx: probe of 1000.sata failed with error -2

at startup. Please apply ASAP, would be lovely to get this into the
Jessie point release.

-- System Information:
Debian Release: 7.8
  APT prefers oldoldstable
  APT policy: (500, 'oldoldstable'), (500, 'oldstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
---End Message---
---BeginMessage---
Source: linux
Source-Version: 3.16.7-ckt11-1

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 784...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ben Hutchings b...@decadent.org.uk (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 24 May 2015 18:46:08 +0100
Source: linux
Binary: linux-source-3.16 linux-doc-3.16 linux-manual-3.16 
linux-support-3.16.0-4 linux-libc-dev linux-headers-3.16.0-4-all 
linux-headers-3.16.0-4-all-alpha kernel-image-3.16.0-4-alpha-generic-di 
nic-modules-3.16.0-4-alpha-generic-di 
nic-wireless-modules-3.16.0-4-alpha-generic-di 
nic-shared-modules-3.16.0-4-alpha-generic-di 
serial-modules-3.16.0-4-alpha-generic-di 
usb-serial-modules-3.16.0-4-alpha-generic-di 
ppp-modules-3.16.0-4-alpha-generic-di pata-modules-3.16.0-4-alpha-generic-di 
cdrom-core-modules-3.16.0-4-alpha-generic-di 
scsi-core-modules-3.16.0-4-alpha-generic-di 
scsi-modules-3.16.0-4-alpha-generic-di 
scsi-common-modules-3.16.0-4-alpha-generic-di 
scsi-extra-modules-3.16.0-4-alpha-generic-di 
loop-modules-3.16.0-4-alpha-generic-di btrfs-modules-3.16.0-4-alpha-generic-di 
ext4-modules-3.16.0-4-alpha-generic-di isofs-modules-3.16.0-4-alpha-generic-di 
jfs-modules-3.16.0-4-alpha-generic-di xfs-modules-3.16.0-4-alpha-generic-di 
fat-modules-3.16.0-4-alpha-generic-di
 md-modules-3.16.0-4-alpha-generic-di 
multipath-modules-3.16.0-4-alpha-generic-di 
usb-modules-3.16.0-4-alpha-generic-di 
usb-storage-modules-3.16.0-4-alpha-generic-di 
fb-modules-3.16.0-4-alpha-generic-di input-modules-3.16.0-4-alpha-generic-di 
event-modules-3.16.0-4-alpha-generic-di mouse-modules-3.16.0-4-alpha-generic-di 
nic-pcmcia-modules-3.16.0-4-alpha-generic-di 
pcmcia-modules-3.16.0-4-alpha-generic-di 
nic-usb-modules-3.16.0-4-alpha-generic-di 
sata-modules-3.16.0-4-alpha-generic-di core-modules-3.16.0-4-alpha-generic-di 
crc-modules-3.16.0-4-alpha-generic-di crypto-modules-3.16.0-4-alpha-generic-di 
crypto-dm-modules-3.16.0-4-alpha-generic-di 
ata-modules-3.16.0-4-alpha-generic-di nbd-modules-3.16.0-4-alpha-generic-di 
squashfs-modules-3.16.0-4-alpha-generic-di 
virtio-modules-3.16.0-4-alpha-generic-di zlib-modules-3.16.0-4-alpha-generic-di 
fuse-modules-3.16.0-4-alpha-generic-di srm-modules-3.16.0-4-alpha-generic-di 
linux-headers-3.16.0-4-common
 linux-image-3.16.0-4-alpha-generic linux-headers-3.16.0-4-alpha-generic 

Bug#785672: marked as done (Critical ext4 data corruption bug)

2015-05-25 Thread Debian Bug Tracking System
Your message dated Mon, 25 May 2015 21:32:29 +
with message-id e1ywzz3-sc...@franck.debian.org
and subject line Bug#785672: fixed in linux 3.16.7-ckt11-1
has caused the Debian Bug report #785672,
regarding Critical ext4 data corruption bug
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
785672: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785672
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: src:linux
Version: 4.0.2-1
Severity: critical
Tags: upstream

4.0.3 includes a fix for a critical ext4 bug that can result in major
data loss.  I believe this is the bug I just hit on my server, resulting
in massive filesystem corruption.  See upstream commit
d2dc317d564a46dfc683978a2e5a4f91434e9711 (ext4: fix data corruption
caused by unwritten and delayed extents), which has been added to
stable kernels 4.0.3 as well as much older stable kernels.

Please consider incorporating this patch into the Debian kernels as soon
as possible, including into the Jessie kernel.

- Josh Triplett

-- Package-specific info:
** Version:
Linux version 4.0.0-1-amd64 (debian-ker...@lists.debian.org) (gcc version 4.9.2 
(Debian 4.9.2-16) ) #1 SMP Debian 4.0.2-1 (2015-05-11)

** Command line:
BOOT_IMAGE=/vmlinuz-4.0.0-1-amd64 root=/dev/mapper/data-root ro quiet

** Not tainted

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 4.0.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages linux-image-4.0.0-1-amd64 depends on:
ii  debconf [debconf-2.0]   1.5.56
ii  initramfs-tools [linux-initramfs-tool]  0.120
ii  kmod20-1
ii  linux-base  3.5
ii  module-init-tools   20-1

Versions of packages linux-image-4.0.0-1-amd64 recommends:
ii  firmware-linux-free  3.3
pn  irqbalance   none

Versions of packages linux-image-4.0.0-1-amd64 suggests:
pn  debian-kernel-handbook  none
ii  grub-pc 2.02~beta2-23
pn  linux-doc-4.0   none

Versions of packages linux-image-4.0.0-1-amd64 is related to:
pn  firmware-atherosnone
pn  firmware-bnx2   none
pn  firmware-bnx2x  none
pn  firmware-brcm80211  none
pn  firmware-intelwimax none
pn  firmware-ipw2x00none
pn  firmware-ivtv   none
ii  firmware-iwlwifi0.43
pn  firmware-libertas   none
pn  firmware-linux  none
pn  firmware-linux-nonfree  none
pn  firmware-myricomnone
pn  firmware-netxen none
pn  firmware-qlogic none
pn  firmware-ralink none
pn  firmware-realteknone
pn  xen-hypervisor  none

-- debconf information:
  linux-image-4.0.0-1-amd64/postinst/depmod-error-initrd-4.0.0-1-amd64: false
  linux-image-4.0.0-1-amd64/prerm/removing-running-kernel-4.0.0-1-amd64: true
  linux-image-4.0.0-1-amd64/postinst/mips-initrd-4.0.0-1-amd64:
---End Message---
---BeginMessage---
Source: linux
Source-Version: 3.16.7-ckt11-1

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 785...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ben Hutchings b...@decadent.org.uk (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 24 May 2015 18:46:08 +0100
Source: linux
Binary: linux-source-3.16 linux-doc-3.16 linux-manual-3.16 
linux-support-3.16.0-4 linux-libc-dev linux-headers-3.16.0-4-all 
linux-headers-3.16.0-4-all-alpha kernel-image-3.16.0-4-alpha-generic-di 
nic-modules-3.16.0-4-alpha-generic-di 
nic-wireless-modules-3.16.0-4-alpha-generic-di 
nic-shared-modules-3.16.0-4-alpha-generic-di 
serial-modules-3.16.0-4-alpha-generic-di 
usb-serial-modules-3.16.0-4-alpha-generic-di 
ppp-modules-3.16.0-4-alpha-generic-di pata-modules-3.16.0-4-alpha-generic-di 
cdrom-core-modules-3.16.0-4-alpha-generic-di 

Bug#786758: doomsday: segfault on startup

2015-05-25 Thread Adam Borowski
On Mon, May 25, 2015 at 05:11:10PM -0400, Michael Gilbert wrote:
 On Mon, May 25, 2015 at 6:16 AM, Adam Borowski wrote:
  When trying to start doomsday, it pops up a dialog which says:
  .[ Doomsday Engine ]
  App init failed:
   [NotFoundError] (Record::subrecord) Subrecord 'alert' not found
  `
  then crashes with a segmentation fault.
 
 This seems to be an incompatibility with persist.pack files from older 
 versions.
 
 If you backup ~/.doomsday/runtime/persist.pack to somewhere else, does
 that work around the problem?

Yes, it helped, no crash.

-- 
// If you believe in so-called intellectual property, please immediately
// cease using counterfeit alphabets.  Instead, contact the nearest temple
// of Amon, whose priests will provide you with scribal services for all
// your writing needs, for Reasonable and Non-Discriminatory prices.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#786840: dpkg-gensymbols seems to ignore #include directives

2015-05-25 Thread Matthias Klose
Package: dpkg-dev
Version: 1.18.0
Severity: serious

seen when building python3.5 in unstable:

dpkg-gensymbols: warning: some new symbols appeared in the symbols file: see
diff output below
dpkg-gensymbols: warning: debian/libpython3.5/DEBIAN/symbols doesn't match
completely debian/libpython3.5.symbols
--- debian/libpython3.5.symbols (libpython3.5_3.5.0~b1-1_amd64)
+++ dpkg-gensymbols49ZYTa   2015-05-25 22:52:29.084129787 +
@@ -1,4 +1,1622 @@
 libpython3.5m.so.1.0 libpython3.5 #MINVER#
-#include libpython.symbols
+ PyAST_Check@Base 3.5.0~b1
+ PyAST_Compile@Base 3.5.0~b1
+ PyAST_CompileEx@Base 3.5.0~b1
+ PyAST_CompileObject@Base 3.5.0~b1
+ PyAST_FromNode@Base 3.5.0~b1
+ PyAST_FromNodeObject@Base 3.5.0~b1
+ PyAST_Validate@Base 3.5.0~b1
+ PyAST_mod2obj@Base 3.5.0~b1
+ PyAST_obj2mod@Base 3.5.0~b1
[...]

apparently the include directive is ignored, and all symbols in the included
files are marked as missing. downgrading to 1.17.25 fixes this issue. this
causes build failures for packages calling dpkg-gensymbols with -c2 or higher.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#786784: python-urllib3: AttributeError: 'module' object has no attribute 'PROTOCOL_SSLv3'

2015-05-25 Thread Chris Bainbridge
On 25 May 2015 at 16:11, Daniele Tricoli er...@mornie.org wrote:
 Are you using the packaged version on urllib3? If yes there is something
 really strange since I patched it as explained here:

Sorry for the bogus bug report (I already closed it as invalid) - it
turned out Python was picking up an older install of urllib3 on this
system, which still had the bug.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: limit source to linux, tagging 786372, tagging 714929, tagging 785153

2015-05-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 limit source linux
Limiting to bugs with field 'source' containing at least one of 'linux'
Limit currently set to 'source':'linux'

 tags 786372 + pending
Bug #786372 [src:linux] Data loss bug with RAID0 and discard
Added tag(s) pending.
 tags 714929 + pending
Bug #714929 [src:linux] linux-image-3.9-1-amd64: vmwgfx freezes console with 
gfx_payload
Bug #736811 [src:linux] linux-image-3.12-1-amd64: Booting in VMware Fusion VM 
fails with module vmwgfx loaded
Added tag(s) pending.
Added tag(s) pending.
 tags 785153 + pending
Bug #785153 [src:linux] [src:linux] Please enable support for DVBSky T9580
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
714929: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714929
736811: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736811
785153: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785153
786372: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786372
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#785065: vdso32 fails to built on ppc64el

2015-05-25 Thread Ben Hutchings
Control: retitle -1 ppc64el kernel build requires multilib compiler
Control: severity -1 normal

Thanks for restoring support for 32-bit code generation.  I recognise
it's not something you really want to support, so I'm leaving the kernel
bug open but changing the title/severity accordingly.

Ben.

-- 
Ben Hutchings
Unix is many things to many people,
but it's never been everything to anybody.


signature.asc
Description: This is a digitally signed message part


Processed: Re: Bug#785065: vdso32 fails to built on ppc64el

2015-05-25 Thread Debian Bug Tracking System
Processing control commands:

 retitle -1 ppc64el kernel build requires multilib compiler
Bug #785065 [src:linux] vdso32 fails to built on ppc64el
Changed Bug title to 'ppc64el kernel build requires multilib compiler' from 
'vdso32 fails to built on ppc64el'
 severity -1 normal
Bug #785065 [src:linux] ppc64el kernel build requires multilib compiler
Severity set to 'normal' from 'serious'

-- 
785065: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785065
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#784278: marked as done (powerpc/perf: Cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH)

2015-05-25 Thread Debian Bug Tracking System
Your message dated Mon, 25 May 2015 21:32:28 +
with message-id e1ywzz2-ox...@franck.debian.org
and subject line Bug#784278: fixed in linux 3.16.7-ckt11-1
has caused the Debian Bug report #784278,
regarding powerpc/perf: Cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
784278: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784278
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Source: linux
Version: 3.16.7-ckt9-3~deb8u1
Severity: critical
Tags: security patch
Justification: breaks the whole system

We should cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH
(currently 127), otherwise we can be lost in a infinite loop when using a
ppc64el machine. :-(

I am attaching the fix that I tested adding it to the following directory, and
adding it to the debian/patch/series.
debian/patches/bugfix/ppc64el/powerpc-perf-Cap-64bits-userspace-backtraces.patch

Other than that, the patch submission could be seen at:
https://patchwork.ozlabs.org/patch/460955/

Thanks
Breno

-- System Information:
Debian Release: 8.0
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: ppc64el (ppc64le)

Kernel: Linux 3.16.0-4-powerpc64le (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
From patchwork Mon Apr 13 21:51:03 2015
From: Anton Blanchard an...@samba.org
Subject: powerpc/perf: Cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH
To: linuxppc-...@lists.ozlabs.org
Date: Tue, 14 Apr 2015 07:51:03 +1000

We cap 32bit userspace backtraces to PERF_MAX_STACK_DEPTH
(currently 127), but we forgot to do the same for 64bit backtraces.

Cc: sta...@vger.kernel.org
Signed-off-by: Anton Blanchard an...@samba.org
---
 arch/powerpc/perf/callchain.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/arch/powerpc/perf/callchain.c b/arch/powerpc/perf/callchain.c
index 2396dda..ead5535 100644
--- a/arch/powerpc/perf/callchain.c
+++ b/arch/powerpc/perf/callchain.c
@@ -243,7 +243,7 @@ static void perf_callchain_user_64(struct perf_callchain_entry *entry,
 	sp = regs-gpr[1];
 	perf_callchain_store(entry, next_ip);
 
-	for (;;) {
+	while (entry-nr  PERF_MAX_STACK_DEPTH) {
 		fp = (unsigned long __user *) sp;
 		if (!valid_user_sp(sp, 1) || read_user_stack_64(fp, next_sp))
 			return;
---End Message---
---BeginMessage---
Source: linux
Source-Version: 3.16.7-ckt11-1

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 784...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ben Hutchings b...@decadent.org.uk (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 24 May 2015 18:46:08 +0100
Source: linux
Binary: linux-source-3.16 linux-doc-3.16 linux-manual-3.16 
linux-support-3.16.0-4 linux-libc-dev linux-headers-3.16.0-4-all 
linux-headers-3.16.0-4-all-alpha kernel-image-3.16.0-4-alpha-generic-di 
nic-modules-3.16.0-4-alpha-generic-di 
nic-wireless-modules-3.16.0-4-alpha-generic-di 
nic-shared-modules-3.16.0-4-alpha-generic-di 
serial-modules-3.16.0-4-alpha-generic-di 
usb-serial-modules-3.16.0-4-alpha-generic-di 
ppp-modules-3.16.0-4-alpha-generic-di pata-modules-3.16.0-4-alpha-generic-di 
cdrom-core-modules-3.16.0-4-alpha-generic-di 
scsi-core-modules-3.16.0-4-alpha-generic-di 
scsi-modules-3.16.0-4-alpha-generic-di 
scsi-common-modules-3.16.0-4-alpha-generic-di 
scsi-extra-modules-3.16.0-4-alpha-generic-di 
loop-modules-3.16.0-4-alpha-generic-di btrfs-modules-3.16.0-4-alpha-generic-di 
ext4-modules-3.16.0-4-alpha-generic-di isofs-modules-3.16.0-4-alpha-generic-di 
jfs-modules-3.16.0-4-alpha-generic-di xfs-modules-3.16.0-4-alpha-generic-di 
fat-modules-3.16.0-4-alpha-generic-di
 md-modules-3.16.0-4-alpha-generic-di 
multipath-modules-3.16.0-4-alpha-generic-di 
usb-modules-3.16.0-4-alpha-generic-di 
usb-storage-modules-3.16.0-4-alpha-generic-di 
fb-modules-3.16.0-4-alpha-generic-di 

Bug#786758: marked as done (doomsday: segfault on startup)

2015-05-25 Thread Debian Bug Tracking System
Your message dated Mon, 25 May 2015 23:48:58 +
with message-id e1yx278-mv...@franck.debian.org
and subject line Bug#786758: fixed in doomsday 1.14.5-2
has caused the Debian Bug report #786758,
regarding doomsday: segfault on startup
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
786758: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786758
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: doomsday
Version: 1.14.5-1
Severity: grave
Justification: renders package unusable

When trying to start doomsday, it pops up a dialog which says:
.[ Doomsday Engine ]
App init failed:
 [NotFoundError] (Record::subrecord) Subrecord 'alert' not found 
`
then crashes with a segmentation fault.

I've tried on three different machines (one armhf), same results, which
means it's not something related to a particular machine's setup.


-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (150, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 4.0.0-x32 (SMP w/6 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages doomsday depends on:
ii  libc6 2.19-18
ii  libfluidsynth11.1.6-2
ii  libgcc1   1:5.1.1-7
ii  libgl1-mesa-glx [libgl1]  10.5.5-1
ii  libqt4-network4:4.8.6+git155-g716fbae+dfsg-2
ii  libqt4-opengl 4:4.8.6+git155-g716fbae+dfsg-2
ii  libqtcore44:4.8.6+git155-g716fbae+dfsg-2
ii  libqtgui4 4:4.8.6+git155-g716fbae+dfsg-2
ii  libsdl-mixer1.2   1.2.12-11+b1
ii  libsdl1.2debian   1.2.15-11
ii  libstdc++65.1.1-7
ii  libx11-6  2:1.6.3-1
ii  libxrandr22:1.4.2-1+b1
ii  libxxf86vm1   1:1.1.4-1
ii  zlib1g1:1.2.8.dfsg-2+b1

Versions of packages doomsday recommends:
pn  fluid-soundfont-gm  none
ii  game-data-packager  41

doomsday suggests no packages.

-- no debconf information
---End Message---
---BeginMessage---
Source: doomsday
Source-Version: 1.14.5-2

We believe that the bug you reported is fixed in the latest version of
doomsday, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 786...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Gilbert mgilb...@debian.org (supplier of updated doomsday package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 25 May 2015 21:17:56 +
Source: doomsday
Binary: doomsday
Architecture: source
Version: 1.14.5-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Games Team pkg-games-de...@lists.alioth.debian.org
Changed-By: Michael Gilbert mgilb...@debian.org
Description:
 doomsday   - enhanced version of the legendary DOOM game
Closes: 786758
Changes:
 doomsday (1.14.5-2) unstable; urgency=medium
 .
   * Update debian/copyrgiht.
   * Add some lintian overrides.
   * Fix /usr/lib installation path.
   * Add manpage for doomsday-compat.
   * Document persist.pack problem (closes: #786758).
Checksums-Sha1:
 c9286e6717ea6d2112c382a01fde5eb00da4 2789 doomsday_1.14.5-2.dsc
 a19cb84fe432110f8e274a669e7f7ba0a72ca353 10308 doomsday_1.14.5-2.debian.tar.xz
Checksums-Sha256:
 5a3bad9c23252cc723c428ff96ba771c8f77ef8a1502ae2d47cd7168d48b2e3e 2789 
doomsday_1.14.5-2.dsc
 b64d33ac59bdbe0f883ab2db8701985fc7f113416993dacfdab25b6e15bfd6c2 10308 
doomsday_1.14.5-2.debian.tar.xz
Files:
 7e4c3a9537c8cf5219ea6d4484a61925 2789 games optional doomsday_1.14.5-2.dsc
 9dfb94df75f66ba15ca1e57481a010cf 10308 games optional 
doomsday_1.14.5-2.debian.tar.xz

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQQcBAEBCgAGBQJVY7IZAAoJELjWss0C1vRzp5Qf/ieLm7rMv8moF2/aN7/grU2l
cH/rDhJWks3fzUoc6pPvncG4Lbpu2XZJ1VV2H4TITJtp8KAB4xgJuiNAuZngg9KM
RYFpNxyRAmrpy/b+rOgSBe7aeZI7iXhwOkjXuhzDIBfNwOVkYSC30zILXxI8uir1
029kHiqQ7IgnPt5cILtcweqs21WmReXdKRRkSpQiXpM60im2Pxat+XPJ7j7UYkux
nDRdDdzflF5cM2o5axcfLts9NQt+Z92LgQi1LjljsCnjCJ8osHpLBRg7LHXi4qjp
3AiN4D3cMeHv+FLMIkBYfQnLymRDgm1Fho1k1vkL8UQXmtNqn84HxiSMISdlMN1z

Bug#786436: ncurses FTBFS: configure loops

2015-05-25 Thread Thomas Dickey
- Original Message -
| From: Sven Joachim svenj...@gmx.de
| To: Helmut Grohne hel...@subdivi.de
| Cc: Thomas Dickey dic...@his.com, 786...@bugs.debian.org
| Sent: Monday, May 25, 2015 8:31:29 AM
| Subject: Bug#786436: ncurses FTBFS: configure loops
| 
| Am 25.05.2015 um 13:43 schrieb Helmut Grohne:
| 
|  On Mon, May 25, 2015 at 01:37:17PM +0200, Sven Joachim wrote:
|  Since the pkg-config files are only created at make
|  install.libs, we
|  currently need to install the library into a temporary location.
|   I've
|  come up with the following patch:
|  
|  --8---cut here---start-8---
|  diff --git a/debian/rules b/debian/rules
|  index a52135b..c3b7d6e 100755
|  --- a/debian/rules
|  +++ b/debian/rules
|  @@ -275,8 +275,9 @@ $(wobjdir-32)/config.status:
|  config.guess-stamp
|   
|   $(objdir-test)/config.status: build-wide config.guess-stamp
| test -d $(objdir-test) || mkdir $(objdir-test)
|  -  cd $(objdir-test)  CFLAGS=$(CFLAGS) $(srcdir)/test/configure
|  \
|  -  $(CONFARGS-TEST)
|  +  cd $(objdir-test)  CFLAGS=$(CFLAGS) \
|  +
| 
PKG_CONFIG_LIBDIR=$(wobjdir)/usr/lib/$(DEB_HOST_MULTIARCH)/pkgconfig
|  \
|  +  $(srcdir)/test/configure $(CONFARGS-TEST)
|   
|   build-arch build-indep: build
|   
|  @@ -308,8 +309,7 @@ build-debug: $(objdir-debug)/config.status
|   build-wide: $(wobjdir)/config.status
| cd $(wobjdir)  $(MAKE)
| # needed for building the examples
|  -  mv $(wobjdir)/lib/libncursesw.so
|  $(wobjdir)/lib/libncursesw.so.saved
|  -  echo INPUT(libncursesw.so.5 -ltinfo) 
|  $(wobjdir)/lib/libncursesw.so
|  +  $(MAKE) -C $(wobjdir) DESTDIR=$(wobjdir) install.libs
| touch $@
|   
|   build-wide-static: $(wobjdir-static)/config.status
|  --8---cut here---end---8---
| 
|  If ncurses uses any external pkg-config files, then this patch
|  breaks
|  cross building, because the pkg-config cross wrapper only sets
|  PKG_CONFIG_LIBDIR when it is unset.
| 
|  Given that libgpm-dev does not ship a .pc file, it seems likely
|  that
|  this is not the case.
| 
| It surely is not, but the cross build is broken anyway:
| 
| ,
| | checking for specific curses-directory...
| | /tmp/ncurses-5.9+20150516/obj-wide
| | checking for specified curses library type... ncursesw
| | checking for multibyte character support... yes
| | checking pkg-config for ncursesw... yes
| | checking if the ncursesw package files work... configure: error:
| | cannot run test program while cross compiling
| `
| 
| Sounds like something for Thomas to look at.

This (cannot run...) at least is a problem in something I have changed
recently.

The apparent cause of the infinite loop
(seen here by disabling the pkg-config and ncurses*-config checks)
is a while-loop in CF_ADD_INCDIR, which has been (it seems)
waiting since 2007 for someone to notice a problem...

-- 
Thomas E. Dickey dic...@invisible-island.net
http://invisible-island.net
ftp://invisible-island.net


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#784709: when would blkid success but not filesystem type?

2015-05-25 Thread Paul Wise
On Thu, 21 May 2015 13:07:35 +0200 Karel Zak wrote:

 The option '-s' does not affect return code ...  we have information
 about all (including empty) partitions!

Ok, I see. Sounds like the proposed patch is appropriate then.

https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=12;filename=0001-Fix-by-forcing-fs-type-to-not-detected-if-not-named.patch;att=1;bug=784709

  Note that my recommendation is to use lsblk, for example:

That has the same issue:

$ sudo lsblk --noheading --output FSTYPE /dev/sda2 ; echo $?

0

I think for our purposes we would need --nodeps too.

-- 
bye,
pabs

https://wiki.debian.org/PaulWise



signature.asc
Description: This is a digitally signed message part


Bug#784709: issue with os-prober

2015-05-25 Thread Paul Wise
On Mon, 2015-05-25 at 22:09 +0200, Jérôme Kieffer wrote:

 # uname -a
...
 # fdisk -l /dev/sdb
...
 # blkid /dev/sdb?
...
 /dev/sdb4: PTTYPE=dos PARTUUID=9a2578f7-04
...
 The extended partition looks different from the other, but the result
 of blkid under 3.2 is the same as 3.16.

Yep, as explained by upstream, this bug in os-prober is due to a new
feature in blkid from newer util-linux versions where it can now get
info from partition tables as well as filesystems, so it succeeds
getting information from the partition but the returned information does
not contain the filesystem type so it returns an empty string.

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784709#44

-- 
bye,
pabs

https://wiki.debian.org/PaulWise



signature.asc
Description: This is a digitally signed message part


Processed: tagging 786602

2015-05-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 786602 + sid stretch
Bug #786602 {Done: Markus Wanner mar...@bluegap.ch} [flightgear] FTBFS: 
build-depends on libsimgear-dev = 3.0.99 but it has been superceded
Added tag(s) sid and stretch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
786602: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786602
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#784709: when would blkid success but not filesystem type?

2015-05-25 Thread Paul Wise
On Tue, 2015-05-26 at 12:21 +0800, Paul Wise wrote:
 On Thu, 21 May 2015 13:07:35 +0200 Karel Zak wrote:
 
  The option '-s' does not affect return code ...  we have information
  about all (including empty) partitions!
 
 Ok, I see. Sounds like the proposed patch is appropriate then.
 
 https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=12;filename=0001-Fix-by-forcing-fs-type-to-not-detected-if-not-named.patch;att=1;bug=784709

Actually the code in question already contains a code path for when
blkid returns success but an empty string. Needs more investigation.

-- 
bye,
pabs

https://wiki.debian.org/PaulWise



signature.asc
Description: This is a digitally signed message part


Processed: tagging 783915

2015-05-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 783915 + sid stretch
Bug #783915 {Done: Paul Wise p...@debian.org} [whohas] whohas: maintainer 
required
Added tag(s) sid and stretch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
783915: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783915
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org