It works fine on my amd64 system. Can you run as root:
# strace -o strace.log /usr/bin/updatedb.mlocate
and send strace.log by mail? (Compress it if it's big, please.)
Attached (not compressed, it's not that big!)
Thanks,
-Nigel
--
Nigel Horne
ClamAV, The Open-Source GPL
tags 505490 + pending
thanks
On Thu, Nov 13, 2008 at 12:30:24AM +0100, Frank Lichtenheld wrote:
Package: ocaml-batteries
Version: 0.20081112+gitBB342A7-1
Severity: serious
Thanks, the bug it's already fixed in the git repo (as usual, I
discovered it 5 minutes after the upload, because it is
Processing commands for [EMAIL PROTECTED]:
tags 505490 + pending
Bug#505490: ocaml-batteries_0.20081112+gitBB342A7-1(hppa/experimental): FTBFS:
Failure: Cannot find ocamlbuildlib.cmxa
There were no tags set.
Tags added: pending
thanks
Stopping processing here.
Please contact me if you need
tags 504726 patch
thanks
Adeodato Simó a scris:
* Thomas Schweitzer [Wed, 12 Nov 2008 11:47:53 +0100]:
Oh, I see.
There are such evil people out there? ;-) Ok I never had such a way of
abuse on my mind, so I didn't care about that.
The next version 1.0.3 will have that fixed and I will
Processing commands for [EMAIL PROTECTED]:
tags 504726 patch
Bug#504726: insecure /tmp dir
There were no tags set.
Tags added: patch
thanks
Stopping processing here.
Please contact me if you need assistance.
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--
In the process of trying to debug this, I discovered that I can make it
boot properly if I create the file
/etc/directfbrc
and include this one line in the file
log-file=/tmp/directfb.log
I had no directfbrc file on my system.
An empty file doesn't help.
My attempt to make the log file was
Package: installation-reports
Severity: critical
Justification: breaks the whole system
When booting the Lenny RC1 installer from the normal install or graphical
installer the screen goes blank and the PC becomes unresponsive.
Cannot CTRL-ALT-DEL to reboot and have to reset the PC. Tried
Your message dated Thu, 13 Nov 2008 11:59:07 +0100
with message-id [EMAIL PROTECTED]
and subject line Re: Bug#505519: linux-image-2.6.26-1-686: after Bios check
system halt with wrong compressed format
has caused the Debian Bug report #505519,
regarding linux-image-2.6.26-1-686: after Bios check
Processing commands for [EMAIL PROTECTED]:
forwarded 489045 http://www.cups.org/str.php?L3001
Bug#489045: cups: infinite loop, 100%CPU use, while trying to print with
HPJetDirect
Bug#502100: cups: socket backend hangs in tight select/read loop (larger
printouts?)
Noted your statement that Bug
Package: drgeo
Version: 1.1.0-1
Severity: grave
Tags: patch
Justification: renders package unusable
drgeo 1.1.0-1 actually seems to work, in Lenny, just by luck, but if
recompiled with a more modern gcc, i.e. the one found in Sid (or in Ubuntu
Intrepid), it sistematically segfaults.
The bug
Hi Samuel,
Samuel Thibault [2008-11-11 14:46 +0100]:
Right but here the issue is on the input side: device_fd got to EOF,
thus select() returning it and read() on it returning 0. The attached
patch at least prevents select from returning, avoiding 100% CPU usage.
Thanks for your analysis and
Package: linux-image-2.6.26-1-686
Version: 2.6.26-10
Severity: grave
Justification: renders package unusable
after the latest update to 2.6.26-10 booting stops after the bios check with
wrong compressed format
-- Package-specific info:
-- System Information:
Debian Release: lenny/sid
APT
Glad to hear it. It's still a valid RC bug in Etch for python-dns, so I
think it must stay open for now. If nothing else, someone else with the
problem will find it more easily and know what to do.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble?
I updated to latest backports packages and it still works. I get the
expected TempError for amazon.com and aol.com.
So it is fixed for me. Guess you can close the bug.
Thanks for your work!
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL
Package: iceweasel
Version: 3.0.3-3
Severity: critical
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for Firefox 3.
SA32713[1]
Description:
Some vulnerabilities have been reported in Mozilla Firefox, which can be
Package: iceweasel
Version: 2.0.0.17-0etch1
Severity: critical
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for Firefox 2:
SA32693[1]
Description:
Some vulnerabilities have been reported in Mozilla Firefox, which can be
This is to let you know that booting with noapic fixes the issue
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Package: icedove
Severity: critical
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for Thunderbird:
SA32715[1]
Description:
Some vulnerabilities have been reported in Mozilla Thunderbird, which
can be exploited by
Package: iceape
Severity: critical
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for SeaMonkey:
SA32714[1]
Description:
Some vulnerabilities have been reported in Mozilla SeaMonkey, which can
be exploited by malicious
Please, reassign this bug to the boinc package.
Also, read
http://ubuntuforums.org/showpost.php?p=4406159postcount=10
if you want somewhere to look into the issue of the wrong PID.
Best regards,
--
Marcos Marado
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe.
James Robertson [EMAIL PROTECTED] writes:
This is to let you know that booting with noapic fixes the issue
Did you test it with RC1 and sid kernels?
--
O T A V I OS A L V A D O R
-
E-mail: [EMAIL PROTECTED] UIN: 5906116
GNU/Linux
Hi there,
Daniel Baumann [EMAIL PROTECTED] wrote:
since the description clearly states that it is experimental, it's
better to have it in than out because it makes backporting easier
(limits interdiffs), gets more attention by people.
Since the description states that it is experimental, it
Package: buffycli
Version: 0.2.1-1
Severity: serious
Tags: patch
Commit 0c4e5e20a4c64231d612c24e88efe86e62f151fd in the Git repo
fixes this.
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Your message dated Thu, 13 Nov 2008 18:30:25 +0100
with message-id [EMAIL PROTECTED]
and subject line Re: Bug#505548: Resolved using noapic
has caused the Debian Bug report #505548,
regarding installation-reports: Blank Screen using Graphical Normal Installer
to be marked as done.
This means
Quoting James Robertson ([EMAIL PROTECTED]):
Package: installation-reports
Severity: critical
Justification: breaks the whole system
When booting the Lenny RC1 installer from the normal install or graphical
installer the screen goes blank and the PC becomes unresponsive.
Cannot
Processing commands for [EMAIL PROTECTED]:
tags 490999 +help
Bug#490999: kicker: crashes on startup
Tags were: confirmed
Tags added: help
thanks
Stopping processing here.
Please contact me if you need assistance.
Debian bug tracking system administrator
(administrator, Debian Bugs database)
tags 490999 +help
thanks
Hello All:
I've been looking into the code. This is the relevant(crashing) part:
kicker/applets/clock/clock.cpp:310
void DigitalClock::updateClock()
{
static bool colon = true;
QString newStr;
QTime t(_applet-clockGetTime());
int h = t.hour();
Package: linux-image-2.6.26-1-amd64
Version: 2.6.26-10
Severity: critical
I've did an upgrade on 2008-11-09, on a new installed system, upgrading kernel
2.6.26-09 to 2.6.26.10. Apt was also upgraded.
I've seen nothing strange during upgrade and in the apt and dpkg logs. The
system is entirely
Your message dated Thu, 13 Nov 2008 19:32:04 +
with message-id [EMAIL PROTECTED]
and subject line Bug#505360: fixed in gnutls26 2.6.2-1
has caused the Debian Bug report #505360,
regarding libgnutls26: CVE-2008-4989 security flaw in certificate chain
verification
to be marked as done.
This
This bug is now officially announced as
TYPO3 Security Bulletin TYPO3-20081113-2: Cross-Site Scripting vulnerability
in TYPO3 Core
See this url for more information:
http://typo3.org/teams/security/security-bulletins/typo3-20081113-2/
--
MfG, Christian Welzel
GPG-Key: http
This bug is now officially announced as
TYPO3 Security Bulletin TYPO3-20081113-1: Cross-Site Scripting vulnerability
in TYPO3 Core
See this url for more information:
http://typo3.org/teams/security/security-bulletins/typo3-20081113-1/
--
MfG, Christian Welzel
GPG-Key: http
Package: linux-image-2.6.26-1-amd64
Version: 2.6.26-9
Severity: critical
I've downgraded my kernel from 2.6.26-10 to 2.6.26-9 after the system became
unbootable (see bug report #505609). Now the system boot, but stop before
mounting the file system and executing init. See below for the output.
Processing commands for [EMAIL PROTECTED]:
found 505384 0.6.1
Bug#505384: libnss-ldapd: problem with debconf configuration
Bug marked as found in version 0.6.1.
severity 505384 serious
Bug#505384: libnss-ldapd: problem with debconf configuration
Severity set to `serious' from `important'
Package: gocr
Version: 0.46
Severity: serious
Justification: http://release.debian.org/lenny/rc_policy.txt 5(c)
gocr recently started installing a file in /usr/man rather than
/usr/share/man; version 0.45-2 did not suffer from this problem. It
looks like you're using a very old version of
On Thu, 2008-11-13 at 20:54 +0100, Xavier Brochard wrote:
Package: linux-image-2.6.26-1-amd64
Version: 2.6.26-10
Severity: critical
I've did an upgrade on 2008-11-09, on a new installed system, upgrading
kernel
2.6.26-09 to 2.6.26.10. Apt was also upgraded.
I've seen nothing strange
Your message dated Thu, 13 Nov 2008 22:02:09 +
with message-id [EMAIL PROTECTED]
and subject line Bug#502357: fixed in libpam-mount 1.2+gitaa4791f-1
has caused the Debian Bug report #502357,
regarding [libpam-mount] pammount doesn't mount loopback filesystem after
upgrade
to be marked as
Your message dated Thu, 13 Nov 2008 21:32:07 +
with message-id [EMAIL PROTECTED]
and subject line Bug#505576: fixed in buffycli 0.2.1-2
has caused the Debian Bug report #505576,
regarding lacks dependency on procps
to be marked as done.
This means that you claim that the problem has been
Package: xserver-xorg-input-evdev
Version: 1:2.0.99.3-1
Severity: grave
--- Please enter the report below this line. ---
Since I upgraded xserver-xorg-input-evdev from 1:2.0.3-2 to 1:2.0.99.3-1, the
driver is completely broken for me. I used it for my USB keyboard, but since
the upgrade, every
On Thu, Nov 13, 2008 at 23:55:02 +0100, Matthias Berndt wrote:
Since I upgraded xserver-xorg-input-evdev from 1:2.0.3-2 to
1:2.0.99.3-1, the driver is completely broken for me. I used it for my
USB keyboard, but since the upgrade, every time I press a key, X acts
as if I had pressed that key
Your message dated Thu, 13 Nov 2008 23:32:03 +
with message-id [EMAIL PROTECTED]
and subject line Bug#505621: fixed in gocr 0.46-2
has caused the Debian Bug report #505621,
regarding gocr: installs file in /usr/man
to be marked as done.
This means that you claim that the problem has been
Your message dated Fri, 14 Nov 2008 00:47:06 +
with message-id [EMAIL PROTECTED]
and subject line Bug#494058: fixed in epiphany-browser 2.22.3-8
has caused the Debian Bug report #494058,
regarding epiphany-browser: Download window is broken
to be marked as done.
This means that you claim
Your message dated Fri, 14 Nov 2008 01:32:05 +
with message-id [EMAIL PROTECTED]
and subject line Bug#494058: fixed in epiphany-browser 2.24.1-1
has caused the Debian Bug report #494058,
regarding epiphany-browser: Download window is broken
to be marked as done.
This means that you claim
Processing commands for [EMAIL PROTECTED]:
tags 496334 - moreinfo
Bug#496334: mdadm segfault on --assemble --force with raid10
Tags were: fixed-upstream moreinfo patch
Bug#498505: mdadm: mdadm segfaults on superblock detection
Bug#499643: Segmentation fault when attempting re-assembly of a
Processing commands for [EMAIL PROTECTED]:
tags 498505 fixed-upstream
Bug#498505: mdadm: mdadm segfaults on superblock detection
Tags were: fixed-upstream moreinfo patch
Bug#496334: mdadm segfault on --assemble --force with raid10
Bug#499643: Segmentation fault when attempting re-assembly of a
44 matches
Mail list logo