On 2015-02-04 19:48:27 [+], Adam D. Barratt wrote:
Please go ahead.
Done, thanks.
Regards,
Adam
Sebastian
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
0.5alpha has been just released [0] with this issue fixed. If you
package that one you get rid of all currently known bugs :)
[0] http://www.cabextract.org.uk/libmspack/libmspack-0.5alpha.tar.gz
Sebastian
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of
Package: wnpp
Owner: Sebastian Andrzej Siewior sebast...@breakpoint.cc
Severity: wishlist
* Package name: libtomsfastmath0
Version : 0.12
Upstream Author : Tom St Denis
* URL :
http://www.libtom.net/?page=featuresnewsitems=5whatfile=tfm
* License : Public
Control: -1 tags + pending
On 2015-01-11 23:06:47 [+0100], Andreas Cadhalpun wrote:
Hi Sebastian,
Hi Andreas,
As the file is apparently usable and havp needlessly blocks downloading it,
I'm not sure anymore, whether we should wait with this fix.
I guess this depends on how many archives out
: Sebastian Andrzej Siewior sebast...@breakpoint.cc
Date: Sun, 18 Jan 2015 22:47:45 +0100
Subject: [PATCH] mspack/chmd: check p end also after we left
Jakub's AFL produced a case where p reads the name_len just just at the
end of the buffer. The macro increases p and makes it bigger than end
Sep 17 00:00:00 2001
From: Sebastian Andrzej Siewior sebast...@breakpoint.cc
Date: Fri, 16 Jan 2015 21:07:23 +0100
Subject: [PATCH] dupload.conf: make ftp-master use passive FTP
Signed-off-by: Sebastian Andrzej Siewior sebast...@breakpoint.cc
---
dupload.conf | 1 +
1 file changed, 1 insertion
Mon Sep 17 00:00:00 2001
From: Sebastian Andrzej Siewior sebast...@breakpoint.cc
Date: Fri, 16 Jan 2015 21:14:55 +0100
Subject: [PATCH] dupload.conf: drop volatile
Signed-off-by: Sebastian Andrzej Siewior sebast...@breakpoint.cc
---
dupload.conf | 9 -
1 file changed, 9 deletions(-)
diff
On 2015-01-15 23:50:02 [+0100], Andreas Cadhalpun wrote:
Hi,
Hi,
Indeed, it works for most, so I'm reducing the severity.
thanks.
I can reproduce this in a minimal jessie chroot with:
# apt install clamav-base
# apt remove clamav-base
# apt install clamav-base
Hah. How so? After my
On 2015-01-16 21:45:35 [+0100], Sebastian Andrzej Siewior wrote:
I can reproduce this in a minimal jessie chroot with:
# apt install clamav-base
# apt remove clamav-base
# apt install clamav-base
Hah. How so? After my remove, /var/lib/clamav/ was still owned by
clamav:clamav
On Fri, Jan 16, 2015 at 11:59:23PM +0100, Andreas Cadhalpun wrote:
Hi Sebastian,
Hi Andreas,
The directory /var/lib/clamav is only removed by dpkg if it is empty.
I just learned that…
Debconf can only be used to change under which user clamd is run.
The dbowner is hardcoded to clamav in
On 2015-01-14 19:45:18 [+], Adam D. Barratt wrote:
Please go ahead; thanks.
thanks, uploaded. Its been my first upload so if something went wrong
please let me know (the upload has been accepted however).
Regards,
Adam
Sebastian
--
To UNSUBSCRIBE, email to
On Thu, Jan 15, 2015 at 10:13:27AM +0100, Ulrich Schmidt wrote:
Package: clamav-freshclam
Version: 0.98.5+dfsg-3
Severity: grave
Tags: newcomer
Why newcommer?
Justification: renders package unusable
Not unter normal circumstances. Atleast I hope so :)
Hi.
I did a fresh Jessie install
On 2015-01-10 15:51:19 [+0100], Andreas Cadhalpun wrote:
Hi Sebastian,
Hi Andreas,
If I understand correctly, this problem only affects scanning (partially)
broken archives and thus shouldn't have a major impact.
In particular the provided sample seems to be broken completely, because
On 2015-01-11 16:31:30 [+], Stuart Caie wrote:
This is an accurate summary. There are two cab files found, the second of
Sorry for the inaccurate summary.
This is now fixed in the repository version of cabextract / libmspack. New
releases will be made soon.
Thank you.
Are you also aware
severity 774686 important
tags 774686 + patch
thanks
* Sebastian Andrzej Siewior | 2015-01-08 15:33:19 [+0100]:
* =?UTF-8?Q?B=C3=bcsc...@buxtehude.debian.org | 2015-01-06 10:09:21 [+0100]:
On some files clamav reports an error.
Example:
root@host:~# clamscan projectlibre-1.5.9.msi
projectlibre
* =?UTF-8?Q?B=C3=bcsc...@buxtehude.debian.org | 2015-01-06 10:09:21 [+0100]:
On some files clamav reports an error.
Example:
root@host:~# clamscan projectlibre-1.5.9.msi
projectlibre-1.5.9.msi: Can't create new file ERROR
If you start with --debug you see
| LibClamAV debug: CAB/CAB-SFX
* Jakub Wilk | 2015-01-06 21:18:30 [+0100]:
Two sample CHM files that trigger segfaults, which are caused by the
overflows, are also attached.
This bug does affect ClamAV.
How do you trigger this? I tried both files with cabextract -t,
clamdscan, clamscan and chmd_md5. None of those segfaulted,
-arithmetic-on-32bit to avoid overflow
+in pointer arithmetic causing a segfault on 32bit (Closes: #774767).
+
+ -- Sebastian Andrzej Siewior sebast...@breakpoint.cc Wed, 07 Jan 2015
21:56:21 +0100
+
clamav (0.98.5+dfsg-0+deb7u2) stable; urgency=medium
* Add libmspack-qtmd-fix-frame_end
* Sebastian Andrzej Siewior | 2015-01-07 13:13:57 [+0100]:
* Jakub Wilk | 2015-01-06 21:18:30 [+0100]:
Two sample CHM files that trigger segfaults, which are caused by the
overflows, are also attached.
This bug does affect ClamAV.
How do you trigger this?
got it. 32bit arch is the key
* Jakub Wilk | 2014-12-21 18:35:36 [+0100]:
Package: cabextract
Version: 1.4-4+b1
Usertags: afl
cabextract crashes (trying to dereference null pointed) on the attached
crafted CAB file:
Jakub, please fill future bugs against libmspack and CC the clamav team. I
am interrested in getting those
2015-01-03 22:44:52.0 +0100
@@ -1,3 +1,12 @@
+clamav (0.98.5+dfsg-0+deb7u2) stable; urgency=medium
+
+ [ Sebastian Andrzej Siewior ]
+ * Add libmspack-qtmd-fix-frame_end-overflow to avoid endless-loop on
+special crafted quantum compressed cab files. Patch suggested by Andreas
unattended-upgrades running, how does
he get clamd restarted after a libmspack update?
From a0449d2079c4ba5822e6567ad7094c10108f16cd Mon Sep 17 00:00:00 2001
From: Sebastian Andrzej Siewior sebast...@breakpoint.cc
Date: Tue, 23 Dec 2014 21:20:43 +0100
Subject: libmspack: qtmd: fix frame_end overflow
Debian
* Marc Dequènes (duck) | 2014-12-22 02:52:02 [+0100]:
Coin,
On 2014-12-21 22:16, Sebastian Andrzej Siewior wrote:
On 2014-12-20 12:12:13 [+0100], Andreas Cadhalpun wrote:
As it shows that clamd hangs in libmspack, I think this is bug #773041
[1].
A possible fix is mentioned in [2].
I can upload
9041fefc0d48aa3c307baa20c5cc4b7eceafe616 Mon Sep 17 00:00:00 2001
From: Sebastian Andrzej Siewior sebast...@breakpoint.cc
Date: Mon, 22 Dec 2014 22:10:47 +0100
Subject: [PATCH] make frame_end off_t
Debian bts #773041, #772891 contains a report of a .cab file which
causes an endless loop.
Eric Sharkey diagnosed the problem
On 2014-12-16 12:48:16 [-0500], Eric Sharkey wrote:
On Sat, Dec 13, 2014 at 9:44 AM, Sebastian Ramacher
sramac...@debian.org wrote:
This issue also affects libmspack. I noticed this while clamav was
scanning Jakub's mail for malware and it was stuck in an infinite loop.
I'm planning not
On 2014-12-20 12:12:13 [+0100], Andreas Cadhalpun wrote:
As it shows that clamd hangs in libmspack, I think this is bug #773041 [1].
A possible fix is mentioned in [2]. We'll have to include it in the
libmspack copy embedded in clamav, which is used in wheezy.
Oh great. So for clamav we have
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package xchat. Its been 16 days in unstable after an NMU
upload by Sven Hoexter. Sven fixed #766005 (severity important) which
allows users to connect via SSL to IRC servers which have SSLv3
Package: debian-maintainers
Severity: normal
Please add Sebastian Andrzej Siewior (myself) to the Debian
Maintainers keyring. I'm attaching the jetring changeset.
Sebastian
Comment: Add Sebastian Andrzej Siewior sebast...@breakpoint.cc as a Debian
Maintainer
Date: Wed, 26 Nov 2014 23:06:08
On Tue, Nov 25, 2014 at 07:07:30PM +0100, Ralf Hildebrandt wrote:
Version: 0.98.1+dfsg-1+deb6u3
A heap buffer overflow was reported in [1] in ClamAV when scanning a
specially crafted y0da Crypter obfuscated PE file.
Note that this is remotely exploitable when ClamAV is used as a mail
gateway
almost two years since the bug was created. Any chance that something
happens on xmas?
I would guess the problem is that the (current) hoster is not providing
any ipv6 connectivity (atleast I can't find any ipv6 addresses assigned
to AS3701).
Sebastian
--
To UNSUBSCRIBE, email to
On 2014-11-24 21:22:14 [+], Adam D. Barratt wrote:
On Mon, 2014-11-24 at 22:03 +0100, Sebastian Andrzej Siewior wrote:
almost two years since the bug was created. Any chance that something
happens on xmas?
I would guess the problem is that the (current) hoster is not providing
any
Package: libclamunrar
Version: 0.96.4-1
Severity: serious
Tags: security pending
The debian security tracker references a problem (clamav: double-free
error libclamunrar_iface/unrar_iface.c) which it learned from
http://www.openwall.com/lists/oss-security/2013/11/29/6
This got marked as fixed in
On 2014-11-21 08:59:43 [+0900], Olaf Meeuwissen wrote:
Dear Maintainer,
Hi Olaf,
Since upgrading from 0.98.4+dfsg-2+b1 to 0.98.5~rc1+dfsg-2 on
2014-10-30, freshclam has been sending progress indication messages to
syslog. The last time I made any changes below /etc/clamav was on
2014-06-10.
On 2014-11-13 01:16:25 [-0700], Jesse Molina wrote:
Severity: grave
I would downgrade it to important. Scott?
Fails on start. I imagine this wasn't tested?
You imagine wrong. But this case in particular wasn't.
Setting up clamav-freshclam (0.98.5~rc1+dfsg-3) ...
[] Starting ClamAV virus
severity 769384 serious
tags 769384 + pending
thanks.
On 2014-11-13 05:23:09 [-0800], Jesse Molina wrote:
Sorry, I opened this bug when I was tired. My apologies for the lack of
detail.
No problem, it all worked out :)
I did a global upgrade, which is how I ended up in that situation.
* Andreas Cadhalpun | 2014-10-30 17:20:55 [+0100]:
Hi Santiago,
Hi Andreas,
On 30.10.2014 13:23, Santiago Vila wrote:
The subject says it all. This may affect the ability of sysvinit to
start or stop the process (but I may be wrong), hence the serious severity.
In fact, this error message only
package: ircd-hybrid
version: 1:7.2.2.dfsg.2-10
tags: security patch
Control: fixed -1 1:8.0.4.dfsg.1-1
So I looked how to disable SSLv3 in ircd-hybrid and didn't find
anything. It seems that in the v8 version they disable SSLv2 and SSLv3
while in the v7 version they only disable SSLv2.
I applied
forwarded 763300 https://bugzilla.clamav.net/show_bug.cgi?id=11127
thanks
the bug is handled upstream. Will update BTS once we have a patch
available.
Sebastian
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact
retitle 763300 clamscan -a -i -r -z --remove causes a segfault
thanks
* Joe Gumbosky | 2014-09-28 19:53:34 [-0400]:
I'm a user, not a maintainer. I've tried running as root
don't run it as root, never.
and user. No luck. I've posted to Debian Forum
Hi,
hereby I close this bug (and its dupes). Almost three weeks passed with
a little feedback from the bug reported. The discussion is documented in
#760219.
The problem, as I understand it, is that certain kFreeBSD jails do not
expose the name of process matching a certain PID. The reporter
On 2014-09-06 09:35:09 [-0400], Daniel Dickinson wrote:
This can be downgraded to lowest, maybe even wishlist priorty as, at
least in the scenario I'm in, which is the only one I have sufficient
information to base an assessment on, the jail wasn't using linprocfs
(freebsd linux compability
On 2014-08-31 22:04:33 [-0400], Daniel Dickinson wrote:
/etc/init.d/clamav-deamon uses --name in it's start-stop-daemon calls for
stop and restart.
This fails when process names are not available due to use of certain
virtualized environments
use as kfreebsd in freebsd jail (others have
On 2014-08-11 14:31:08 [-0400], Jérémie Galarneau wrote:
It seems you don't have the following patch applied:
commit 6a0b6cd5133db9e3c72914d4e5dd7fc792360934
Author: Mathieu Desnoyers mathieu.desnoy...@efficios.com
Date: Wed Jul 16 10:58:48 2014 -0400
Fix: don't perform unaligned
Package: babeltrace
Version: 1.2.2-2
Severity: wishlist
I've been looking at the sparc issue and this is just a tracker bug.
One patch that helps passing half the testsuite is cae67efbd9 (Fix:
Align buffers from objstack_alloc on sizeof(void *)) [0].
I would suggest to use an alignment of 8 even
On 2014-08-05 16:14:12 [-0400], Jon Bernard wrote:
This may also work as well:
diff --git a/configure.ac b/configure.ac
index 80eba33..248044e 100644
--- a/configure.ac
+++ b/configure.ac
@@ -50,6 +50,17 @@ AC_C_INLINE
AC_TYPE_PID_T
AC_TYPE_SIZE_T
+#
tags 751336 + patch upstream fixed-upstream
thanks.
On 2014-06-11 22:29:48 [+0200], Julien Cristau wrote:
See the build log at
https://buildd.debian.org/status/fetch.php?pkg=babeltracearch=armelver=1.2.1-2stamp=1395846913
There's also a build failure on sparc which may or may not be related:
does not build KFreeBSD
due to missing HOST_NAME_MAX.
The test suite passed.
Signed-off-by: Sebastian Andrzej Siewior sebast...@breakpoint.cc
---
tests/lib/Makefile.am | 3 +-
tests/lib/test_ctf_writer.c | 10 --
tests/lib/xgethostname.c| 76
the severity to grave since havp can't be used without clamav.
Sebastian
From 45b1edab07d76fc331c4dc0a47d8ecc3a5438a27 Mon Sep 17 00:00:00 2001
From: Sebastian Andrzej Siewior sebast...@breakpoint.cc
Date: Wed, 2 Jul 2014 21:12:37 +0200
Subject: [PATCH] update to current (0.94.4) clamav
As of 0.94.4
.
This affects the plugname = 'clamav' method of the package.
Sebastian
From 75bf67fe1568ffcbb488f4e7026883b39dd1a3eb Mon Sep 17 00:00:00 2001
From: Sebastian Andrzej Siewior sebast...@breakpoint.cc
Date: Wed, 2 Jul 2014 22:06:30 +0200
Subject: [PATCH] update dansguardian
Signed-off-by: Sebastian
* Guido Günther | 2014-06-26 21:54:40 [+0200]:
Already in VCS as 9321997cddf7bb5b030d6328d9db67eb4f5830f6 since May.
Cheers,
It seems to be part of the experimental branch which also has new v1.2.5
in it. Please add the Closes tag to finally close the bug :)
-- Guido
Sebastian
--
To
Package: src:lzo2
Version: 2.03-2
Severity: important
Tags: security
From http://www.oberhumer.com/opensource/lzo/:
|LZO 2.07 has been released:
|
|Fixed a potential integer overflow condition in the safe decompressor
|variants which could result in a possible buffer overrun when processing
On 2014-05-17 15:09:00 [+0200], Guido Günther wrote:
which dependency are you still seeing?
-- Guido
I think he meant:
From b19ba46d6a9c3b67a8a70457ed1970924bb97489 Mon Sep 17 00:00:00 2001
From: Sebastian Andrzej Siewior sebast...@breakpoint.cc
Date: Thu, 26 Jun 2014 20:08:04 +0200
Subject
tags 750075 + patch pending
thanks
On 2014-06-01 11:34:14 [+0100], Michael Tautschnig wrote:
fixed upstream by commit e0f667e7f1 (bb11023 - Wrong declaration of
function destroy_ctx to cause undefined behavior).
Best,
Michael
Sebastian
From e0f667e7f12ec561e6b87a3664f6f673c12908d3 Mon Sep 17
On 2014-06-02 14:49:50 [-0400], Scott Kitterman wrote:
The fix for this will be in 0.98.4. No need for a separate patch.
Yes, I just learned that and that they will release 0.98.4 any time
soon.
Sebastian
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of
=medium
+
+ * cherry pick upstream patches to fix a crash while using clamscan. Added
+patches: c6f5ef98d (bb #10970 - Force a filesize limit of UINT_MAX - 2)
+and 99ee2138c (Key off INT_MAX) (Closes: #749715).
+
+ -- Sebastian Andrzej Siewior sebast...@breakpoint.cc Fri, 30 May 2014 20:46
On 2014-05-29 23:28:56 [-0400], Scott Kitterman wrote:
Thanks. If I do UNRELEASED/unstable and make a source package and then
debdiff
7u3 to 7u4 I get the attached diff, which is more than we want. For
resolving
this bug we want the minimal change. I can produce a reduced change
On 2014-05-29 18:37:40 [+0200], Andreas Cadhalpun wrote:
As I don't know, when the PowerPC failure will be fixed, it's probably best
to cherry-pick this fix for wheezy.
Scott, what do you think?
I'm going to cherry-pick it for wheezy soon.
Best regards,
Andreas
Sebastian
--
To
On 2014-05-29 18:42:15 [+0200], Sebastian Andrzej Siewior wrote:
On 2014-05-29 18:37:40 [+0200], Andreas Cadhalpun wrote:
As I don't know, when the PowerPC failure will be fixed, it's probably best
to cherry-pick this fix for wheezy.
Scott, what do you think?
I'm going to cherry-pick
Package: src:babeltrace
Version: 1.2.1-2
Tags: patch
Severity: wishlist
Please enable python3 bindings in the babeltrace package. Patch
attached.
Sebastian
From 52db172006200d97e3da7e3b87d1f29af0a9 Mon Sep 17 00:00:00 2001
From: Sebastian Andrzej Siewior sebast...@breakpoint.cc
Date: Tue, 27
On 2014-05-23 20:13:54 [+0800], Jim Barber wrote:
So the sequence of events was the upgrade on the 19th; freshclam on the
20th;
then the first hang on the 21st.
I see. Could you please go back to 0.98.3 and see if the issue goes
away? It might be a regression in the comming up 0.98.4 of
On 2014-05-15 11:54:23 [+0800], Paul Wise wrote:
99%: Checks: 960, Failures: 1, Errors: 1
check_bytecode.c:136:F:arithmetic:test_bswap_jit:0: Invalid return value from
bytecode run, expected: beef, have: dead1
check_bytecode.c:111:E:arithmetic:test_inflate_int:0: (after this point)
tags 748180 + upstream
forwarded 748180
https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=10;mbox=yes;bug=748180
thanks
On 2014-05-15 14:19:10 [+0200], Sebastian Andrzej Siewior wrote:
Yesterday I tried to bring the in-tree llvm-back and build it. The build
failed, too. The log is available
On 2009-07-17 11:06:16 [+0100], Joao Paulo Serrachinha wrote:
Sorry for my frustration, but this is an upstream problem. All i want is all
old command line options have a new On* directive. Meanwhile stick with
stable.
Now, almost 5years later. Is this problem still there? I don't quite
On 2009-08-22 15:01:00 [+0200], nutzteil wrote:
I made rar-archives with the compression-levels '-m0' to '-m5'.
('-m0' is RAR-Archive v14, the others are v1d)
Put eicar / clamav-testfiles in it.
When ther are small number of files, all is ok.
But with a big number of files ( ~ 50 MB ~ 360
tags 745754 + pending
thanks
On 2014-04-24 19:37:26 [+0100], Américo Monteiro wrote:
Updated Portuguese translation for clamav's debconf messages.
(1 String updated)
Translator: Américo Monteiro a_monte...@gmx.com
Feel free to use it.
Thanks you.
Sebastian
--
To UNSUBSCRIBE, email to
tags 744314 - patch
thanks
On 2014-04-13 21:06:49 [+0200], Holger Wansing wrote:
Hi,
Hi Holger,
Can someone then review and improve it?
Will be done.
Good. In the meantime I remove the patch tag.
Thanks
Holger
Sebastian
--
To UNSUBSCRIBE, email to
tags 740059 + upstream
forwarded 740059 https://bugzilla.clamav.net/show_bug.cgi?id=10971
thanks
On 2014-03-15 20:37:01 [+0100], Sebastian Andrzej Siewior wrote:
On 2014-03-16 00:16:38 [+0700], Ста Деюс wrote:
Здравствуй, Sebastian.
Hello Ста,
the patch below is what I sent to clamav's
tags 743874 +pending
thanks.
On 2014-04-08 03:03:07 [+0900], victory wrote:
Dear clamav package maintainer,
Here's Japanese po-debconf template translation (ja.po) file that
reviewed by several Japanese Debian developers and users.
Could you apply it, please?
Yes, thank you.
found 669287 0.97.3+dfsg-1
fixed 669287 0.98.1+dfsg-4
thanks.
On 2012-04-11 22:46:06 [+0200], Ruud Baart wrote:
I configured to run clamav with User = amavis. This means that the logfiles
in /var/log/clamav should be owned
by amavis. However in /etc/logrotate.d/clamav-daemon is create 640
On 2014-03-16 00:16:38 [+0700], Ста Деюс wrote:
Здравствуй, Sebastian.
Hello Ста,
You have guessed right: i less than 2.7 GB of RAM, while i was
scanning file of 2.7 GB in size.
What kind of file is it? Is this some kind of raw data or an archive?
So, you can assuredly close my report.
On 2007-03-10 10:58:23 [+0100], Marc Haber wrote:
It would be great if this were configurable.
Upstream suggests [0] to use OnUpdateExecute to alter the permisions
after the update.
Does this work for you?
[0] https://bugzilla.clamav.net/show_bug.cgi?id=470#c3
Greetings
Marc
Sebastian
--
On 2014-03-13 19:37:22 [-0400], Scott Kitterman wrote:
Does it drop privileges itself somehow? Given clamav's security history and
what it does, I don't think running as root is a good idea.
Yes it does but only if you specify User in clamav-milter.conf. I could
alter it to refuse to start if
On 2014-03-14 15:08:41 [-0400], Scott Kitterman wrote:
In principle, we could check during configure if a User was specified in the
.conf (and set it if it wasn't). That would be, I believe, a sane transition
from starting as user to starting as root and letting the milter itself drop
: Sebastian Andrzej Siewior sebast...@breakpoint.cc
Date: Tue, 11 Mar 2014 21:09:32 +0100
Subject: [PATCH] clamav-milter: setup socket before dropping root permission
If the milter socket should be setup as
|User clamav
|MilterSocket /var/run/clamav/clamav-milter.ctl
|MilterSocketGroup postfix
.
There is no need for that SOCKET_RWGROUP hack including waiting until
clamav-milter is up so that we can alter the permissions of the socket.
This can be handled by clamav-milter itself if it is started as root.
Signed-off-by: Sebastian Andrzej Siewior sebast...@breakpoint.cc
---
debian/clamav
On 2014-02-25 17:08:56 [+0700], Sthu wrote:
FYI: about three weeks (after update) i see this behavior:
/usr/bin/clamscan -r --bell --infected --detect-pua=yes --scan-elf=yes
--scan-mail=yes --algorithmic-detection=yes --scan-pe=yes --scan-ole2=yes
--scan-pdf=yes --scan-html=yes
On 2013-09-24 09:50:56 [+0200], Sebastian Andrzej Siewior wrote:
On Thu, Aug 08, 2013 at 09:53:35AM -0700, Jonathan Nieder wrote:
Yes, this is worth fixing in stable. Thanks for a clear report.
Thanks. It seems 7.2 will be released on 12.Oct. Do you think you get this in
p-u
On 26.01.14, Jose Miguel Mata wrote:
root@debian01:~# apt-get -f install
Leyendo lista de paquetes... Hecho
Creando árbol de dependencias
Leyendo la información de estado... Hecho
0 actualizados, 0 se instalarán, 0 para eliminar y 0 no actualizados.
1 no instalados del todo o eliminados.
Se
* Andi Kleen | 2014-01-04 19:18:07 [+0100]:
On Fri, Jan 03, 2014 at 02:55:48PM +0100, Sebastian Andrzej Siewior wrote:
where do I start. Let me explain what is going on here. The code
sequence
Yes the IST stacks are needed for correctness, even in more cases than
the example below. You cannot
with a 256bytes long per cpu stack and migrate to the kernel
stack before calling do_debug().
[0] x86-disable-debug-stack.patch
[1] fix-rt-int3-x86_32-3.2-rt.patch
Reported-by: Brian Silverman bsilver16...@gmail.com
Cc: Andi Kleen a...@firstfloor.org
Signed-off-by: Sebastian Andrzej Siewior bige
reassign 732323 src:linux
found 732323 3.2.53-1
forcemerge 732208 732323
thanks
this is a copy of #732208 which has been fixed in the meantime.
Sebastian
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact
On 09/25/2013 03:24 PM, Ben Hutchings wrote:
On Tue, 2013-09-24 at 13:43 -0700, Brian Silverman wrote: [...]
I got down to a really simple program that reproduces this bug:
#include sys/syscall.h #include unistd.h int main() { // I've
tried SYS_getpid, SYS_write, and SYS_read here too.
On Thu, Aug 08, 2013 at 09:53:35AM -0700, Jonathan Nieder wrote:
Yes, this is worth fixing in stable. Thanks for a clear report.
Thanks. It seems 7.2 will be released on 12.Oct. Do you think you get this in
p-u? Is there anything I can help you with?
Regards,
Jonathan
Sebastian
--
To
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu
Please binnum libuuid-perl in unstable as it currently depends on
perlapi-5.14.2 but we have perlapi-5.18.1 provided by perl-base 5.18.1-2. In
my recent dist-upgraded I ended up without a
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu
Please nmu libtext-iconv-per in unstable as it currently depends on
perlapi-5.12.2 but we have perlapi-5.18.1 provided by perl-base 5.18.1-2. In
my recent dist-upgraded I lost
On Tue, Aug 27, 2013 at 08:05:53PM +0200, gregor herrmann wrote:
Hi Sebastian,
Hi Gregor,
thanks for your bug reports.
You are right that libuuid-perl and libtext-iconv-per need binNMUs;
just like 525 other packages, as mentioned on
http://release.debian.org/transitions/html/perl5.18.html
Package: git
Version: 1:1.7.2.5-3
Severity: important
Tags: patch
Control: fixed -1 1:1.8.1~rc0-1
The following has been observed:
| $ git push ko
| ko: Counting objects: 332, done.
| Delta compression using up to 4 threads.
| Compressing objects: 100% (110/110), done.
| Writing objects: 100%
On Thu, Jun 06, 2013 at 09:49:21PM +0100, Adam D. Barratt wrote:
fwiw, as unstable also has 0.83, it would need to be fixed there first.
Yes. I tried to point out that upstream did not release a version including
this fix yet.
Now we have unstable fixed. Could the maintainer be please so kind to
Package: btrfs-tools
Version: 0.19+20130315-2
Severity: important
Just upgraded from stable to sid on a machine where rootfs is on a btrfs
partition. The machine does hangs during boot because fsck failed. The call
chain is:
| init boot
| \_ /bin/sh /etc/init.d/rc S
| \_ startpar -p 4 -t
Package: rt-tests
Version: 0.83-1
Severity: serious
Tags: patch fixed-upstream
hackbench is a major component in this package and it can't be used on armhf:
|$ hackbench
|Running in process mode with 10 groups using 40 file descriptors each (== 400
tasks)
|Each sender will pass 100 messages of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sun, Nov 18, 2012 at 07:59:39PM +, Thorsten Glaser wrote:
tg@zigo:~ $ sudo apt-get --purge dist-upgrade
Broken gcc-snapshot:amd64 Depends on libc6-dev-x32 [ amd64 ] none ( none
) (= 2.11)
This isn't that critical. A binary-NMU could
Package: intel-microcode
Version: 1.20120606.2
The cpuid driver is required for this to work, without it it fails silently:
|# iucode_tool -v -S
|iucode_tool: checked the signature of 0 processor(s)
|# echo $?
|0
This fix this, the /usr/share/initramfs-tools/hooks/intel-microcode could
be
Package: src:refdbg
Version: 1.2+git20101215+aa5cb3-2
Severity: Serious
I have here 1.2+git20101215+aa5cb3-2+b1 installed. refdbg binary ends with:
| if [ x${REFDBG_OPTIONS} == x ] ; then
| LD_PRELOAD=/usr/lib/librefdbg.so ${@:ndx}
| else
| REFDBG_OPTIONS=${REFDBG_OPTIONS}
* Ben Hutchings | 2012-06-02 18:55:17 [+0100]:
Sorry we haven't done anything about this.
No worries :)
Are you still working on powerpcspe? Can you provide a patch suitable
No, I dropped the ball.
for the current version in sid or experimental?
I haven't seen much progress here from Kyle or
On Tue, Oct 21, 2008 at 06:43:26PM +0100, WS wrote:
Still does not work. However, the error has changed:
2008-10-21 18:38:00 no IP address found for host laptop (during SMTP
connection from [192.168.1.41])
2008-10-21 18:38:07 TLS error on connection from ([192.168.1.41])
[192.168.1.41]
On Sat, May 05, 2012 at 11:17:50PM +0200, Tobias Diedrich wrote:
1.2.3-313-ge5c4657-1 seems to work fine for me now (despite
/dev/input/event* being root-owned).
OTOH I've recently installed pulseaudio (which also pulls in
policykit), maybe that makes a difference here.
Yes, I see the same
On Tue, Apr 03, 2012 at 01:49:44PM +0200, Patrick Matth?i wrote:
Could you retest your issue please with 1.2.3-309-g7176ff4-1 ?
I just installed 1.2.3-313-ge5c4657-1 and have the same problem. It went
away after I executed
chown myuid:mygid /dev/input/event*
after that I got the gtk
: Sebastian Andrzej Siewior sebast...@breakpoint.cc
Subject: [PATCH] enc: compress before compress/base64 is applied
The command
|openssl enc -pass pass:pass -iv 0 -K 0 -S 0 -aes-256-cbc -base64 file file.enc.b64
first performs the encryption followed by base64 encoding. That means the output
Package: targetcli
Version: 2.0rc1-2
Severity: minor
Please add python-urwid to package's suggest list. It does not really depend
on it but it can make use of it. For instance if don't have it installed and
enter cd then you see a backtrace. With this package installed you are able
to browse and
Package: gcc-doc-defaults
Version: 5:3
Severity: wishlist
gcc-4.6 ist in testing and I can only find gcc-4.4-doc-non-dfsg in the
archive. Mind packaging 4.6' man pages? Need a hand with this?
Sebastian
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of
1501 - 1600 of 1880 matches
Mail list logo