Your message dated Thu, 04 Aug 2005 01:17:05 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#321204: fixed in ethereal 0.10.12-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 4 Aug 2005 02:07:08 +0000
>From [EMAIL PROTECTED] Wed Aug 03 19:07:08 2005
Return-path: <[EMAIL PROTECTED]>
Received: from outbound04.telus.net (priv-edtnes51.telusplanet.net) 
[199.185.220.223] 
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1E0V8W-0001Zt-00; Wed, 03 Aug 2005 19:07:08 -0700
Received: from [192.168.1.105] (really [154.20.5.216])
          by priv-edtnes51.telusplanet.net
          (InterMail vM.6.01.04.04 201-2131-118-104-20050224) with ESMTP
          id <[EMAIL PROTECTED]>
          for <[EMAIL PROTECTED]>; Wed, 3 Aug 2005 20:06:37 -0600
Subject: ethereal won't start and outputs a capabilities error
From: David Meggy <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Content-Type: text/plain
Date: Wed, 03 Aug 2005 19:15:38 -0700
Message-Id: <[EMAIL PROTECTED]>
Mime-Version: 1.0
X-Mailer: Evolution 2.2.3 
Content-Transfer-Encoding: 7bit
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.5 required=4.0 tests=BAYES_00,HAS_PACKAGE,
        UPPERCASE_50_75 autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: ethereal
Version: 0.10.12-2

I think this says it all
<snip>
# ethereal
Could not set capabilities: Operation not permitted
</snip>

ethereal is version 0.10.12-2
kernel is kernel-image-2.6.11-9-amd64-k8 version 2.6.11-4 (i386 debian
system)

the tail end of strace ethereal is
capget(0x19980330, 0, {CAP_CHOWN|CAP_DAC_OVERRIDE|CAP_DAC_READ_SEARCH|
CAP_FOWNER|CAP_FSETID|CAP_KILL|CAP_SETGID|CAP_SETUID|
CAP_LINUX_IMMUTABLE|CAP_NET_BIND_SERVICE|CAP_NET_BROADCAST|
CAP_NET_ADMIN|CAP_NET_RAW|CAP_IPC_LOCK|CAP_IPC_OWNER|CAP_SYS_MODULE|
CAP_SYS_RAWIO|CAP_SYS_CHROOT|CAP_SYS_PTRACE|CAP_SYS_PACCT|CAP_SYS_ADMIN|
CAP_SYS_BOOT|CAP_SYS_NICE|CAP_SYS_RESOURCE|CAP_SYS_TIME|
CAP_SYS_TTY_CONFIG|0xf8000000, CAP_CHOWN|CAP_DAC_OVERRIDE|
CAP_DAC_READ_SEARCH|CAP_FOWNER|CAP_FSETID|CAP_KILL|CAP_SETGID|
CAP_SETUID|CAP_SETPCAP|CAP_LINUX_IMMUTABLE|CAP_NET_BIND_SERVICE|
CAP_NET_BROADCAST|CAP_NET_ADMIN|CAP_NET_RAW|CAP_IPC_LOCK|CAP_IPC_OWNER|
CAP_SYS_MODULE|CAP_SYS_RAWIO|CAP_SYS_CHROOT|CAP_SYS_PTRACE|
CAP_SYS_PACCT|CAP_SYS_ADMIN|CAP_SYS_BOOT|CAP_SYS_NICE|CAP_SYS_RESOURCE|
CAP_SYS_TIME|CAP_SYS_TTY_CONFIG|0xf8000000, 0}) = 0
capset(0x19980330, 0, {CAP_DAC_READ_SEARCH|CAP_NET_RAW,
CAP_DAC_READ_SEARCH|CAP_NET_RAW, 0}) = -1 EPERM (Operation not
permitted)
write(2, "Could not set capabilities: Oper"..., 52) = 52
exit_group(1)                           = ?

Maybe this is a Debian kernel issue. I haven't ever look into what
capabilities even are.

David


-- 
David Meggy <[EMAIL PROTECTED]>


---------------------------------------
Received: (at 321204-close) by bugs.debian.org; 4 Aug 2005 08:24:36 +0000
>From [EMAIL PROTECTED] Thu Aug 04 01:24:36 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
        id 1E0auX-0002s7-00; Thu, 04 Aug 2005 01:17:05 -0700
From: Frederic Peters <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#321204: fixed in ethereal 0.10.12-3
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Thu, 04 Aug 2005 01:17:05 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: ethereal
Source-Version: 0.10.12-3

We believe that the bug you reported is fixed in the latest version of
ethereal, which is due to be installed in the Debian FTP archive:

ethereal-common_0.10.12-3_i386.deb
  to pool/main/e/ethereal/ethereal-common_0.10.12-3_i386.deb
ethereal-dev_0.10.12-3_i386.deb
  to pool/main/e/ethereal/ethereal-dev_0.10.12-3_i386.deb
ethereal_0.10.12-3.diff.gz
  to pool/main/e/ethereal/ethereal_0.10.12-3.diff.gz
ethereal_0.10.12-3.dsc
  to pool/main/e/ethereal/ethereal_0.10.12-3.dsc
ethereal_0.10.12-3_i386.deb
  to pool/main/e/ethereal/ethereal_0.10.12-3_i386.deb
tethereal_0.10.12-3_i386.deb
  to pool/main/e/ethereal/tethereal_0.10.12-3_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Frederic Peters <[EMAIL PROTECTED]> (supplier of updated ethereal package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu,  4 Aug 2005 09:41:24 +0200
Source: ethereal
Binary: ethereal ethereal-dev tethereal ethereal-common
Architecture: source i386
Version: 0.10.12-3
Distribution: unstable
Urgency: low
Maintainer: Frederic Peters <[EMAIL PROTECTED]>
Changed-By: Frederic Peters <[EMAIL PROTECTED]>
Description: 
 ethereal   - network traffic analyzer
 ethereal-common - network traffic analyser (common files)
 ethereal-dev - network traffic analyser (development tools)
 tethereal  - network traffic analyzer (console)
Closes: 321204
Changes: 
 ethereal (0.10.12-3) unstable; urgency=low
 .
   * debian/patches/04_drop-capabilities.dpatch: don't exit on failure, simply
     skip the capabilities part; use g_warning to output messages.
     (closes: #321204)
Files: 
 0df4c0f1fec3344de3416d61a6828ddf 863 net optional ethereal_0.10.12-3.dsc
 c6d387d4ad7dda16c2735e786219ea4f 190089 net optional ethereal_0.10.12-3.diff.gz
 b88b3fb6bf10f1c6c6b6e9ff88002a45 5445188 net optional 
ethereal-common_0.10.12-3_i386.deb
 d6f72c796d0db14aaab8397e970df307 494330 net optional 
ethereal_0.10.12-3_i386.deb
 789401752f9ed223a7c93fd86d9410fa 95628 net optional 
tethereal_0.10.12-3_i386.deb
 c519f6319ad7fe0549d9a00819f9e210 160440 devel optional 
ethereal-dev_0.10.12-3_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFC8cnOoR3LsWeD7V4RAqgtAJ9KbA76NOGn/xYbv4UltRnE3PUg7ACdGddT
LV4skbjCE1rymtLLVRQalnM=
=+12G
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to