Package: libglib2.0-0
Version: 2.30.2-4
Severity: critical
Justification: breaks unrelated software
Hi.
Since the most recent uploads to unstalbe I see problems like the following:
$ eog Untitled\ 1.png
GLib-ERROR **: /tmp/buildd/glib2.0-2.30.2/./glib/gmem.c:170: failed to allocate
546343776 b
Hi Laurent.
It seems this has been fixed in their repo,... can you cherry pick that
patch?
https://red.libssh.org/issues/60
Chris.
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
reassign 631950 libssh-4
forwarded 631950 https://red.libssh.org/issues/60
stop
Ok, reassigning this back then to libssh-4 for now, and marking it as
forwarded.
Chris.
smime.p7s
Description: S/MIME cryptographic signature
On Thu, 2011-09-01 at 10:18 +0200, Laurent Bigonville wrote:
> But I've the feeling that libssh shouldn't change his behavior like
> that.
Guess you're not alone with your feeling ;)
Chris.
smime.p7s
Description: S/MIME cryptographic signature
reassign 631950 remmina-plugin-nx
stop
Hi Vic.
Thanks for tracing this up :)
Laurent, thanks for you help, too. I'm reassign this now to
remmina-plugin-nx.
Luca, could you please apply the patches from Vic (or take a new
upstream version, if there's already one)?,
Thanks all,
Chris.
smime.p
On Wed, 31 Aug 2011 22:39:48 +0800, Vic Lee wrote:
> In main window, please open Help->Debug Window menu, then connecting to
> the server. You should be able to see many NX related output.
With 0.5.1:
[NX] HELLO NXSERVER - Version 3.2.0-74-SVN OS (GPL, using backend: 3.5.0)
[NX] NX> 105
(after
Hi Vic.
We have some problems with the NX plugin and current versions of libssh
(0.5.1) as you can read in this bug report:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631950
Can you help or have you got any idea what could cause the troubles?
Cheers,
Chris.
btw: It seems that the NX plu
On Mon, 29 Aug 2011 09:41:39 +0200, Laurent Bigonville
wrote:
> Could you try to rebuild remmina-plugin-nx package and see if it fix
> the issue?
Rebuilt both, remmina itself (which also has a dep on libssh-4) and
-plugin-nx,... doesn't seem to help though :-(
Cheers,
Chris.
--
To UNSUBSCRIBE
forcemerge 637796 638449
stop
(My original report made it through now ^^... therefore merging)
Nico,
iptables-persistent loads the iptables rules at boot, and thus it should
be quite clear, why this can be security critical.
Just imagine that for some reasons you have rsh, or telnet or something
Package: iptables-persistent
Version: 0.5.2
Severity: critical
Tags: security
Justification: root security hole
Hi.
Since the most recent upload, rules aren't loaded any more at all:
Wed Aug 17 13:17:07 2011: Mounting local filesystems...done.
Wed Aug 17 13:17:07 2011: Activating swapfile swap..
Hi.
Yeah I've seen it...
Still doesn't work however :(
Chris.
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
On Fri, 2011-08-12 at 16:42 +0300, O. Andrew wrote:
> Well, that's exactly what I suspected to happen. Tomorrow I will
> prepare a new release which should fix this issue.
Thx in advance,
Cheers,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
On Thu, 2011-08-11 at 20:41 +0300, Andrew O. Shadoura wrote:
> Sorry, can't reproduce. I've just installed a clean unstable system,
> and it just doesn't happen.
>
> Please provide more details.
Well during ifupdown-clean on boot i get a
cannot remove /etc/network/run/ifstate ... ro filesystem
(sh
On Thu, 11 Aug 2011 16:12:04 +0200, Laurent Bigonville
wrote:
>> Not sure why it doesn't show the names,... do you drop the debug info?
> Be sure you have libc6-dbg and libssh-dbg installed
I had...
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscri
On Thu, 11 Aug 2011 15:54:26 +0200, Laurent Bigonville
wrote:
> Is anybody still able to reproduce this?
Yes.
> If so could you please provide me a backtrace?
NX: detected keyboard type pc105/de
Remmina plugin NX (type=Protocol) registered.
Remmina plugin SFTP (type=Protocol) registered.
Remmina
Hi.
Well could someone then please rebuild this?
Cheers,
Chris.
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Hi.
Any news with respect to this?
Cheers,
Chris.
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Package: qtnx
Version: 0.9-3
Severity: grave
Tags: security
Justification: user security hole
Hi.
It seems that qtnx stores any non-custom ssh keys world-readable:
$ ls -al ~/.qtnx/
total 12
drwxr-xr-x 2 user user 4096 Aug 11 15:01 .
drwx-- 51 user user 4096 Aug 11 15:01 ..
-rw-r--r-- 1 us
Package: ifupdown
Version: 0.7~alpha5+really0.6.11
Severity: critical
Justification: breaks the whole system
Hi.
Since the recent upload to unstable, ifupdown seems to no longer bring up
any interfaces, not even lo.
$ ifconfig
shows nothing,...
after bringing down and then up lo,... it appears
Hi Colin.
On Sun, 2011-07-24 at 11:02 +0100, Colin Watson wrote:
> Did this work as you expect in some previous version? Which one?
Yes definitely,.. but unfortunately,.. I don not remember which one..
> If you use 'LogLevel VERBOSE', does that help?
>
> Can you provide some examples of log me
Package: openssh-server
Version: 1:5.8p1-4
Severity: grave
Tags: security
Justification: user security hole
Hi.
For *some* failed connections ssh seems to put no logging into auth.log anymore.
This can be quite security relevant when using e.g. fail2ban which relies on
this.
Only some (types?)
Package: isc-dhcp-client
Version: 4.1.1-P1-16
Severity: critical
Tags: security
Justification: root security hole
Hi.
CVE-2011-0997 has been found
(http://www.isc.org/software/dhcp/advisories/cve-2011-0997),
which allows a DHCP server to execute shell commands on the clients.
Cheers,
Chris.
On Sat, 2011-01-29 at 18:47 +0100, Stefan Fritsch wrote:
> This has to be balanced between compatibility and security. Currently
> less than 50% of the servers on the internet are patched. So it is
> sensible to not deny renegotiation for unpatched servers.
>
> Patched servers usually won't all
Package: iceweasel
Version: 3.5.16-4
Severity: grave
Tags: security
Justification: user security hole
Hi.
It seems that iceweasel still is vulnerable to the SSL renegotiation attack,
as simply is configured per default to allow the vulnerable renegotiation:
security.ssl.require_safe_negotiation;
Package: pidgin
Version: 2.7.7-1
Severity: grave
Tags: security
Justification: user security hole
Hi.
A newer upstream version 2.7.9 is available, fixing a security issue.
Cheers,
Chris.
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Tr
I haven't fully looked at this so perhaps it's unrelated,...
But one main problem I see here (that may be related), is that lvm's
init-scripts are simply wrong, and abusing some things.
I've already told Bastian this and there are even several bugs open.
The problem is that lvm's init script simp
Package: python-apt
Version: 0.7.98
Severity: grave
Justification: renders package unusable
Hi.
Upgrading to the most recent version fails with:
Setting up python-apt (0.7.98) ...
Traceback (most recent call last):
File "/usr/bin/pycentral", line 2334, in
main()
File "/usr/bin/pycentral
On Mon, 2010-09-20 at 12:55 +0400, Dmitry E. Oboukhov wrote:
> CAM> less /usr/share/doc/cryptsetup/NEWS.Debian.gz
>
> It is a wrong way.
> If a user upgrades his system from lenny to squeeze, he wont be able
> to read *all* changed packages' news.
>
> I think that tests must show warning and then
Quoting Matthias Kirschner :
Just upgraded a friend's machine, and had the same problem. I also had
to change "check=ext2" to "check=blkid". (I was lucky as it only affected
the home partition, so I did not have to use a live system to make this
changes.)
less /usr/share/doc/cryptsetup/NEWS.Debi
Hi Marco.
Sorry for the late reply,... had to prepare a lecture for next week...
On Thu, 2 Sep 2010 10:46:51 +0200, m...@linux.it (Marco d'Itri) wrote:
> On Sep 01, Marco d'Itri wrote:
>
>> > Maybe this is the same as #593375.
>> You can easily verify this: apply this pseudo-patch to the init s
Package: udev
Version: 161-1
Severity: critical
Justification: breaks unrelated software
Hi.
Maybe this is the same as #593375.
Since some recent version, udev does not longer create the symlinks in
/dev/disk/by-label and by-uuid for some cases.
E.g. I have non of the by-label/by-uuid links cre
severity 591607 critical
stop
Can confirm this.
IMO it deserves a much higher severity, as it enabling _ALL_ CAs might be
a security hole for many setups.
Downgrading to 20090814 (in testing) and everything seems to be fine.
Cheers,
Chris.
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@l
On Sun, 2010-08-08 at 16:30 -0400, Laurence J. Lane wrote:
> Of course, I think /lib/xtables/libxt_TEE.so should be
> removed from xtables-addon-common. If that's a bother,
> I'll gladly remove from iptables and pretend it does not
> exist.
Sorry,.. I've missed that this was added in the main iptab
On Sat, 2010-08-07 at 21:27 +0200, Julian Andres Klode wrote:
> As everyone should know, dpkg unpacks the source packages and verifies
> them using gpg. APT knows that the package is secure, because the source
> is secure.
Ah I've missed that this is from the debsig, and not from checking the
integ
Package: apt
Version: 0.7.20.2+lenny2
Severity: grave
Tags: security
Justification: user security hole
Hi.
I found out some strange issue, which IMO might be used for security attacks on
secure-apt:
I've only tested it with "apt-get source", but maybe other actions or aptitude
are also affected
Then I guess we can close this or mark it wontfix.
Cheers,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
+0200, gregor herrmann wrote:
> On Fri, 04 Jun 2010 15:30:29 +0200, Christoph Anton Mitterer wrote:
>
> > Changing severity to grave ("makes the package in question unusable or
> > mostly so") as it seems that also 2.6.32 kernels are affected, which are
> > now in
Package: evolution
Version: 2.30.2-1
Severity: grave
Justification: renders package unusable
Hi.
Not sure whether this is an upstream issue, as it seems that there are glibc
problems?
The issue appears (but not always) when opening my folder that holds the
debian-devel list archive.
Then evolu
On Thu, 2010-07-15 at 17:13 -0600, Bdale Garbee wrote:
> I interpret "corresponding subsystem is installed" to mean that the
> kernel knows how to mount and use the filesystem type in question.
Well I'm not sure whether this is actually meant... but this doesn't
mean I think it's wrong ;)
> To
>
On Fri, 2010-07-16 at 11:18 +0200, Mike Hommey wrote:
> So until the program actually does what it is intended to, I'm not
> exactly sure it is safe to put it in /sbin. OTOH, I could rename it, but
> except for nitpicking, what exactly would be the point?
So then let's downgrade the severity and le
Package: lustre-utils
Severity: serious
Justification: Policy 9.1.1
Hi.
I might have spotted a policy violation here (therefore the sevirity serious).
Policy section 9.1.1. specifies:
"The location of all installed files and directories must comply with the
Filesystem Hierarchy
Standard (FHS),
Package: vmfs-tools
Severity: serious
Justification: Policy 9.1.1
Hi.
I might have spotted a policy violation here (therefore the sevirity serious).
Policy section 9.1.1. specifies:
"The location of all installed files and directories must comply with the
Filesystem Hierarchy
Standard (FHS), v
Package: mtd-utils
Version: 20090606-1
Severity: serious
Justification: Policy 9.1.1
Hi.
I might have spotted a policy violation here (therefore the sevirity serious).
Policy section 9.1.1. specifies:
"The location of all installed files and directories must comply with the
Filesystem Hierarchy
Package: cpmtools
Severity: serious
Justification: Policy 9.1.1
Hi.
I might have spotted a policy violation here (therefore the sevirity serious).
Policy section 9.1.1. specifies:
"The location of all installed files and directories must comply with the
Filesystem Hierarchy
Standard (FHS), ver
Package: gzip
Version: 1.3.12-9
Severity: serious
Justification: Policy 9.1.1
Hi.
I might have spotted a policy violation here (therefore the sevirity serious).
Policy section 9.1.1. specifies:
"The location of all installed files and directories must comply with the
Filesystem Hierarchy
Stand
Hi.
I'm not sure whether it's a good idea to make such exceptions to FHS.
I mean that would dilute it more and more.
Alasdair, could you please tell us which concrete problems you've had?
btw: /boot is not always on non-LVM or really available. I for example
have my /boot on an USB-stick... (
On Sat, 2010-06-05 at 13:34 +0100, Colin Watson wrote:
> > *** BEGIN /boot/grub/device.map
> > (hd0) /dev/sda
> > (hd1) /dev/sdb
> > *** END /boot/grub/device.map
> Does this device.map match the devices you actually have? In
> particular, check
Package: grub-pc
Version: 1.98+20100602-2
Severity: grave
Justification: renders package unusable
Hi.
When upgrading the package with the current version, I got the following:
Installing new version of config file /etc/grub.d/00_header ...
Setting up grub-pc (1.98+20100602-2) ...
Generating grub.
On Sun, 2010-05-23 at 15:12 +0200, Giovanni Mascellani wrote:
> Sorry for the delayed reply.
No problem.
> The licensing problems were solved, now we're just waiting for a
> dependency the pass the NEW queue (libjgrapht0.8-java).
Great :)
> As soon as that package is accepted, josm-plugns shoul
On Wed, 2010-05-19 at 22:05 +0200, Yves-Alexis Perez wrote:
> Could you precise your configuration?
What exactly do you want?
> Does that happens everytime?
Yes,.. a few seconds after the window opens up...
> Can
> you try in offline mode?
No help,... neither when disabling the plugins.
I've s
Package: evolution
Version: 2.30.1.2-2
Severity: grave
Justification: renders package unusable
Hi.
Immediately after starting evolution I get:
$ evolution
(evolution:9428): evolution-network-manager-WARNING **: The name
org.freedesktop.NetworkManager was not provided by any .service files
***
On Tue, 2010-05-18 at 22:23 +0200, Moritz Muehlenhoff wrote:
> Upstream is still very actively working towards a release, so we should
> leave vegastrike in sid. We should keep it in sid for now.
Great :)
Wasn't there an email some days ago,... where it was considered to be
dropped from Debian?
C
Hi.
Two questions:
1) Are we sure that this only affected gnupg 2.0.14? Werner does not
mention concretely whether versions before are affected or not
(http://marc.info/?l=gnupg-users&m=126451730710129&w=2).
When entered 2.0.14 testing, and do we need to release a DSA?
Has the security tea
Hi again.
I might have completely overestimated the criticality of that issue...
if so, sorry in advance for making noise.
Was it "just" that the number iteration was wrongly written, or was it
also, that s2k was _always_ only iterated 65536?
The first would mean that the key itself is co
Package: vegastrike
Version: 0.5~svn12126-2
Severity: grave
Justification: renders package unusable
Hi.
The package can't be installed due to unsatisfied dependencies.
Has this package, and the corresponding -data and -music packages, been
orphaned?
Cheers,
Chris.
-- System Information:
Debi
Hi
In order to make this progress,... wouldn't it be possible to simply
drop those plugins whit problematic license?
Cheers,
Chris.
This message was sent using IMP, the Internet Messaging Program.
--
To UNSUBSCRIBE, email
Hi.
Anything new here in the meantime?
Lincense problems still not resolved?
Cheers,
Chris.
This message was sent using IMP, the Internet Messaging Program.
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
Hi.
I just wondered... isn't something missing here?
libao2 still contains the config/docs,... libao4 not at all,... and nobody
depends on libao-common?!
Best wishes,
Chris.
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact
Hi.
What did this exactly mean? Than any normal user on the system was able to
read the cleartext dmcrypt keys?
How can udisk know of them? Shouldn't they be just in kernel memory?
What's if I use LUKS?
Thanks,
Chris.
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a s
Package: openoffice.org
Version: 1:3.2.0-5
Severity: grave
Justification: renders package unusable
Hi.
Since 1:3.2.0-5 OOo crashes when opening a presentation document. I tried
several
of my documents but it happens with all of them, nevertheless I don't know
whether
it's something specific, so
FYI: RFC 5746 provides the solution to the renegotiation security attack.
Cheers,
Chris.
This message was sent using IMP, the Internet Messaging Program.
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with
Hi.
I think it would be a good idea if you give more information on this hole.
What it is about (break in or "just" DoS),... and perhaps some
reasonable defaults for that config option.
btw: In the news file you talk about "outgoing connections" IIRC, but
I think it's about incomming connec
Sorry for the late reply.
The uploaded fix solves the problem :)
Cheers,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
Package: gpointing-device-settings
Version: 1.5.0-1
Justification: breaks unrelated software
Severity: critical
Hi.
Upgrading to the 1.5.0-1 breaks the touchpad.
On the login-screen (gdm) the touchpad still works. As soon as logon
happened the touchpad stops working.
Downgrading to 1.3 from t
On Sun, 2010-01-10 at 12:29 -0500, Sam Varshavchik wrote:
> This depends on the maildrop configuration, but generally setgroupid won't
> have any effect if maildrop is invoked as root, since maildrop will use the
> userid specified by the -d option to set its running group and userid
> anyway.
U
Package: maildrop
Justification: user security hole
Severity: grave
Tags: security
Hi.
Not sure if this actually a hole or if I just misunderstand
something,... but:
In debian /usr/bin/maildrop ist installed:
-rwxr-sr-x 1 root mail 163k Nov 9 01:11 /usr/bin/maildrop
So I'd expect that the foll
On Tue, 2009-12-22 at 23:59 +0100, Mike Hommey wrote:
> This just confirms the diagnostic, which is that nss 3.12.5 disabled
> renegotiation because of CVE-2009-3555. Now, we need to decide how to
> allow client authentication without putting users too much at risk.
ok,.. I've already suspected thi
Hi Mike.
On Tue, 2009-12-22 at 19:37 +0100, Mike Hommey wrote:
> Can you try after setting the NSS_SSL_ENABLE_RENEGOTIATION environment
> variable to 1 ? (with nss 3.12.5-1, obviously).
Yes this "fixes" the problem.
Cheers,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
Package: libnss3-1d
Version: 3.12.5-1
Justification: renders package unusable
Severity: grave
Hi.
With the most recent version, client certificate authentication is broken.
An error occurs even before iceweasel, epiphany, etc. ask for the
certificate to select.
downgrading to 3.12.4-1 fixes t
Package: bind9
Version: 1:9.6.1.dfsg.P1-3
Severity: critical
Tags: security
Hi.
I think this is quite security critical,... if my observations should
prove wrong, decrease than please priority ;)
When bind is configured to us TSIGs between master and slave when
tranferring a zone, via a
m
Hi.
Anything that prevents this from being uploaded? This breaks so many
things...
Cheers,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
Package: tct
Justification: renders package unusable
Severity: grave
Hi.
tct depends on timeout,.. but coreutils (essential) conflicts with this.
Thus one cannot install tct.
Regards,
Chris.
-- System Information:
Debian Release: squeeze/sid
APT prefers unstable
APT policy: (500, 'unstab
btw:
/var/run/openct is not removed either...
Always thought the policy would mandate, that packages should not left
over cruft.
Best wishes,
Chris.
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.
Package: openct
Justification: breaks the whole system
Severity: critical
Hi.
openct adds a group scard and an entry with it to dpkg-statoverride.
If openct is purged, neither the group nor the statoverride entry are
removed.
If one removes the group manually (but not the statoverride entry) many
Quoting Christian Holm Christensen :
On Sun, 2009-09-06 at 00:41 +0200, Christoph Anton Mitterer wrote:
Package: ttf-root-installer
Version: 5.18.00-2.3
Severity: critical
Tags: security
...
^^
Sorry for the critical/security,... but first of all,.. this draws
attention,... and secondly
Hi.
There is already a packaged version of the rt73 firmware in
firmware-ralink. update-rt73-firmware provides a convenient way to
download and install a newer, unpackaged version. Unfortunately there
is no way to verify an arbitrary new version of the firmware.
Why not? You could add include
Hi.
Just looked over it again...
How do you actuallly do you check?
I've seen that you include a OpenPGP key, and it seems that you're
this is from some Adobe employee and the md5.txt is also from them?
SO in this case I'd still consider this security critical, because now
"we" (Debian) fu
Quoting Nico Golde :
This is not entirely correct, actually the packages checks
md5 hashes (yes, i know this is broken).
Really?! Sorry,.. I must have overlooked this :(
Then may I suggest to switch to something better (e.g. SHA512) and
make sure, that installation fails and the user is warne
Package: rt73-common
Version: 1:1.0.3.6-cvs20090424-dfsg1-1
Severity: critical
Tags: security
Hi.
I'm currently looking at Debian packages which download and install
files from the internet (as their main content) whether they check the
validity of these files.
This package does not make a
Package: em8300
Version: 0.16.4-4
Severity: critical
Tags: security
Hi.
I'm currently looking at Debian packages which download and install
files from the internet (as their main content) whether they check the
validity of these files.
This package does not make any hashsum check (e.g. SHA
Package: susv3
Version: 6.1
Severity: critical
Tags: security
Hi.
I'm currently looking at Debian packages which download and install
files from the internet (as their main content) whether they check the
validity of these files.
This package does not make any hashsum check (e.g. SHA512, w
Package: ttf-root-installer
Version: 5.18.00-2.3
Severity: critical
Tags: security
Hi.
I'm currently looking at Debian packages which download and install
files from the internet (as their main content) whether they check the
validity of these files.
This package does not make any hashsum
Package: flashplugin-nonfree
Version: 1:2.7
Severity: critical
Tags: security
Hi.
I'm currently looking at Debian packages which download and install
files from the internet (as their main content) whether they check the
validity of these files.
This package does not make any hashsum check
Package: susv2
Version: 1.1
Severity: critical
Tags: security
Hi.
I'm currently looking at Debian packages which download and install
files from the internet (as their main content) whether they check the
validity of these files.
This package does not make any hashsum check (e.g. SHA512, w
Package: tiger
Justification: Policy 3.5
Severity: serious
Hi.
Tiger depends on diff,... which it should probably not:
Packages are not required to declare any dependencies they have on other
packages which are marked Essential (see below), and should not do so
unless they depend on a particular
Hi.
This does not only affect Quadro cards...
btw: Could you please hurry up to upload the fixed version? Or could you
please reupload the older version?
Best wishes,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
On Mon, 2009-08-17 at 13:36 +0200, Petter Reinholdtsen wrote:
> There is a medium priority debconf question being asked. The default
> is set to convert if the testing indicate that it is safe to convert,
> and the default is set to not convert if there is a problem.
Yeah,... I've already assumed
Im not totally sure (please correct me if I'm wrong) but isn't this "desired"?
When uninstalling insserv, the only thing it can do to recover the old
rcN.d/links is, to is the backups it made during its own installation,
right?
Of course, the ones from packages installed afterwards (like your
Hi Michael.
Is this still the case with the current version of insserv in sid?
When I've installed it a week or two ago,... I _was_ asked.
I even think that I was asked with the lenny version of sid (IIRC).
You meant that your debconf priority is set to low?
Regards,
Chris.
Package: privoxy
Version: 3.0.13-1
Justification: user security hole
Severity: grave
Tags: security
Hi.
Since the last release or so, the config template gives this as an
example for chaining privoxy with Tor:
# To chain Privoxy and Tor, both running on the same system,
# you would
Package: sks
Version: 1.1.0-5
Justification: renders package unusable
Severity: grave
Hi.
Since 1.1.0-5 sks does not longer work,.. and I see these messages in dmesg:
[80773.190585] sks[23453]: segfault at 0 ip (null) sp bfad072c error 4
in sks[8048000+db000]
[80785.802317] sks[23450]: segfault
Package: aptitude
Version: 0.4.11.11-1+b1
Justification: user security hole
Severity: grave
Tags: security
Hi.
I'm running several intrusion detection systems, e.g. rkhunter (which
in turn uses unhide). For quite some time now, unhide gave me false
positives (I'm quite sure, that my system
Package: gnome-panel
Version: 2.26.2-1
Justification: renders package unusable
Severity: grave
Hi.
I have this problem on two systems, one a normal laptop (one screen) the
other a dual head monitor system (two separate X screens, no Xinerama or
something like this):
After starting gnome, the win
Hi Sebastian.
Attached you'll find a backtrace by bugbuddy.
Some symbols are missing unfortunately,... I'm quite busy atm,.. if
you should need them,.. please ask, and I'll create it manually
(with all symbols)...
thx,
Chris.
--
On Wed, 2009-05-06 at 09:39 +0200, Sebastian Dröge wrote:
> Yes, those versions shouldn't crash
Uhm,... but it does ;)
Anything I can do to help debugging this?
Chris.
smime.p7s
Description: S/MIME cryptographic signature
Hi
On Sat, 2009-04-25 at 06:08 +0200, Sebastian Dröge wrote:
> Which version of gstreamer0.10-plugins-bad, liblrdf0 and dependending
> packages do you have installed?
I was using the most recent (unstable) versions from all packages:
gstreamer0.10-plugins-bad 0.10.11-2+b1
liblrdf0 0.4.0-1.2
librap
Hi.
Is anyone looking at this? Or is this package orphaned?
This bug is very annoying as it prevents one from installing
gnome-desktop-environment (which depends on empathy) and thus gnome.
Chris.
smime.p7s
Description: S/MIME cryptographic signature
On Wed, 2009-04-22 at 14:38 -0500, Manoj Srivastava wrote:
> I note that man make-kpkg says:
> ,
> |WARNING: Do NOT set the -j option in MAKEFLAGS directly, this
> |shall cause the build to fail. Use CONCURRENCY_LEVEL as specified
> |below.
> `
> though I t
Package: kernel-package
Version: 12.009
Justification: renders package unusable
Severity: grave
Hi.
make-kpkg --revision 0.1 --append-to-version '-heisenberg' --initrd
buildpackage fails with:
...
...
LD [M] sound/drivers/snd-serial-u16550.ko
LD [M] sound/drivers/snd-virmidi.ko
LD [M]
Package: pidgin
Version: 2.5.5-1
Justification: renders package unusable
Severity: grave
Hi.
Whenever gstreamer0.10-plugins-bad is installed, pidgin crashes with
the attached bug-report, from bug-buddy.
In the meantime it is not even easily possible to simply remove
gstreamer0.10-plugins-b
401 - 500 of 511 matches
Mail list logo