Bug#453632: (pas de sujet)
I've found a workaround : I started iceape on profile manager, created a new profile, then started with this profile without any problem, then I restarted with my previous profile, which worked without problem, so I removed the new profile and now everything is ok ;) -- Ce message a été vérifié par MailScanner pour des virus ou des polluriels et rien de suspect n'a été trouvé. For all your IT requirements visit: http://www.transtec.co.uk
Processed: notfound 367740 in 1.0.0-4, found 367740 in 1.0.0-4
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.11 > notfound 367740 1.0.0-4 Bug#367740: dict-gazetteer2k-zips: must use invoke-rc.d Bug no longer marked as found in version 1.0.0-4. (By the way, this Bug is currently marked as done.) > found 367740 1.0.0-4 Bug#367740: dict-gazetteer2k-zips: must use invoke-rc.d Bug marked as found in version 1.0.0-4. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#451818: intel graphics the reason?
Hi! I have this behaviour a little bit longer than 18 days, probably one or two month. The most notable difference is that I'm on xf86-video-intel git since some time. Is everyone affected by this issue using the intel driver? Please report. Willi -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#451818: intel graphics the reason?
> "Willi" == Willi Mann <[EMAIL PROTECTED]> writes: Willi> Is everyone affected by this issue using the intel driver? Willi> Please report. I'm using xserver-xorg-video-intel 2:2.2.0-1. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#454114: gpe-shield: wrong iptables location in init script - break install and removal
Package: gpe-shield Version: 0.9-1 Severity: grave Justification: renders package unusable the init script uses IPTABLES=/usr/sbin/iptables instead of IPTABLES=/sbin/iptables Preparing to replace gpe-shield 0.9-1 (using .../gpe-shield_0.31-2_i386.deb) ... Stopping GPE desktop firewall: gpe-shield/etc/init.d/gpe-shield: line 63: /usr/sbin/iptables: No such file or directory invoke-rc.d: initscript gpe-shield, action "stop" failed. dpkg: warning - old pre-removal script returned error exit status 1 dpkg - trying script from the new package instead ... Stopping GPE desktop firewall: gpe-shield/etc/init.d/gpe-shield: line 63: /usr/sbin/iptables: No such file or directory invoke-rc.d: initscript gpe-shield, action "stop" failed. dpkg: error processing /var/cache/apt/archives/gpe-shield_0.31-2_i386.deb (--unpack): subprocess new pre-removal script returned error exit status 1 Starting GPE desktop firewall: gpe-shieldChain INPUT (policy ACCEPT) target prot opt source destination Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination OK . May be the old initscript from 0.9 if so please close the bug report as I do not believe gpe-shield was in etch before so no need for upgrade path. Best regards Alban -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.22-3-686 (SMP w/1 CPU core) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages gpe-shield depends on: ii gpe-su 0.19-2 root shell for GPE ii iptables1.3.8.0debian1-1 administration tools for packet fi ii libatk1.0-0 1.20.0-1 The ATK accessibility toolkit ii libc6 2.7-3GNU C Library: Shared libraries ii libcairo2 1.4.10-1 The Cairo 2D vector graphics libra ii libfontconfig1 2.5.0-2 generic font configuration library ii libglib2.0-02.14.4-2 The GLib library of C routines ii libgpewidget1 0.115-3 GPE Palmtop Environment widget lib ii libgtk2.0-0 2.12.2-1 The GTK+ graphical user interface ii libpango1.0-0 1.18.3-1 Layout and rendering of internatio ii libx11-62:1.0.3-7X11 client-side library ii libxcursor1 1:1.1.9-1X cursor management library ii libxext61:1.0.3-2X11 miscellaneous extension librar ii libxfixes3 1:4.0.3-2X11 miscellaneous 'fixes' extensio ii libxi6 2:1.1.3-1X11 Input extension library ii libxinerama11:1.0.2-1X11 Xinerama extension library ii libxrandr2 2:1.2.2-1X11 RandR extension library ii libxrender1 1:0.9.4-1X Rendering Extension client libra gpe-shield recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#451818: anyone willing to to a git bisect on the intel driver?
Hi! As it seems, the bug is caused by the intel driver. Anyone willing to test the latest 2.1 version from snapshot.debian.net and then do a git bisect? For me, this is very unfunny, as the 2.1 versions crash very often on my 855GM. Willi -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#451818: kuickshow: Intel driver
Package: kuickshow Version: 4:3.5.8-2 Followup-For: Bug #451818 I also suspect the Intel driver. After the last update kuickshow started giving me garbage and the whole graphics performance decreased. #apt-show-versions xserver-xorg-video-intel xserver-xorg-video-intel/sid uptodate 2:2.2.0-1 -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.22-3-686 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages kuickshow depends on: ii imlib11 1.9.15-3 Imlib is an imaging library for X ii kdelibs4c2a 4:3.5.8.dfsg.1-4 core libraries and binaries for al ii libc6 2.7-3GNU C Library: Shared libraries ii libgcc1 1:4.2.2-4GCC support library ii libice6 2:1.0.4-1X11 Inter-Client Exchange library ii libjpeg62 6b-14The Independent JPEG Group's JPEG ii libpng12-0 1.2.15~beta5-3 PNG library - runtime ii libsm6 2:1.0.3-1+b1 X11 Session Management library ii libstdc++6 4.2.2-4 The GNU Standard C++ Library v3 ii libtiff43.8.2-7 Tag Image File Format (TIFF) libra ii libungif4g 4.1.4-5 shared library for GIF images ii libx11-62:1.0.3-7X11 client-side library ii libxext61:1.0.3-2X11 miscellaneous extension librar ii zlib1g 1:1.2.3.3.dfsg-7 compression library - runtime kuickshow recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#451818: anyone willing to to a git bisect on the intel driver?
On Mon, Dec 3, 2007 at 10:31:48 +0100, Willi Mann wrote: > Hi! > > As it seems, the bug is caused by the intel driver. Anyone willing to > test the latest 2.1 version from snapshot.debian.net and then do a git > bisect? > > For me, this is very unfunny, as the 2.1 versions crash very often on my > 855GM. > Can you try with Option "AccelMethod" "XAA" in xorg.conf (in the Device section)? Thanks, Julien -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#451818: intel graphics the reason?
Le Monday 03 December 2007 09.53:34 Willi Mann, vous avez écrit : > > Is everyone affected by this issue using the intel driver? Please report. > > Willi I'm using the intel Driver. signature.asc Description: This is a digitally signed message part.
Bug#451818: anyone willing to to a git bisect on the intel driver?
> Can you try with Option "AccelMethod" "XAA" in xorg.conf (in the Device > section)? With this option, corruption gone. Willi -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#454133: pwlib: CVE-2007-4897 remote denial of service
Package: pwlib Version: 1.10.2-1 Severity: grave Tags: security Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for pwlib. CVE-2007-4897[0]: | pwlib, as used by Ekiga 2.0.5 and possibly other products, allows | remote attackers to cause a denial of service (application crash) via | a long argument to the PString::vsprintf function, related to a | "memory management flaw". NOTE: this issue was originally reported as | being in the SIPURL::GetHostAddress function in Ekiga (formerly | GnomeMeeting). If you fix this vulnerability please also include the CVE id in your changelog entry. For further information: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4897 Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. pgpHqO5yfACAu.pgp Description: PGP signature
Processed: found 452963 in 48+dfsg-1
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.11 > found 452963 48+dfsg-1 Bug#452963: kvm: Don't include blobs Bug marked as found in version 48+dfsg-1. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Re: pwlib: CVE-2007-4897 remote denial of service
Processing commands for [EMAIL PROTECTED]: > tags 454133 + patch Bug#454133: pwlib: CVE-2007-4897 remote denial of service Tags were: security Tags added: patch > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#454133: pwlib: CVE-2007-4897 remote denial of service
Hi, the first patch was not the correct one, correct one attached. Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. diff -u pwlib-1.10.10/debian/patches/00list pwlib-1.10.10/debian/patches/00list --- pwlib-1.10.10/debian/patches/00list +++ pwlib-1.10.10/debian/patches/00list @@ -4,0 +5 @@ +CVE-2007-4897 diff -u pwlib-1.10.10/debian/changelog pwlib-1.10.10/debian/changelog --- pwlib-1.10.10/debian/changelog +++ pwlib-1.10.10/debian/changelog @@ -1,3 +1,12 @@ +pwlib (1.10.10-1.1) unstable; urgency=high + + * Non-maintainer upload by testing-security team. + * Fix remote denial of service vulnerability caused +by a call to PString::vsprintf if the used object already +contained more than 1000 characters (CVE-2007-4897; bug #454133). + + -- Nico Golde <[EMAIL PROTECTED]> Mon, 03 Dec 2007 13:17:34 +0100 + pwlib (1.10.10-1) unstable; urgency=low * New upstream release. (gcc-4.2 clean. Yeah!) only in patch2: unchanged: --- pwlib-1.10.10.orig/debian/patches/CVE-2007-4897.dpatch +++ pwlib-1.10.10/debian/patches/CVE-2007-4897.dpatch @@ -0,0 +1,19 @@ +#! /bin/sh /usr/share/dpatch/dpatch-run +## CVE-2007-4897.dpatch by Nico Golde <[EMAIL PROTECTED]> +## +## All lines beginning with `## DP:' are a description of the patch. +## DP: No description. + [EMAIL PROTECTED]@ +diff -urNad pwlib-1.10.10~/src/ptlib/common/contain.cxx pwlib-1.10.10/src/ptlib/common/contain.cxx +--- pwlib-1.10.10~/src/ptlib/common/contain.cxx 2005-11-30 13:47:41.0 +0100 pwlib-1.10.10/src/ptlib/common/contain.cxx 2007-12-03 13:45:00.0 +0100 +@@ -2465,7 +2465,7 @@ + PAssert(SetSize(2000), POutOfMemory); + ::vsprintf(theArray+len, fmt, arg); + #else +- PINDEX size = 0; ++ PINDEX size = len; + do { + size += 1000; + PAssert(SetSize(size), POutOfMemory); pgp0FEn2ugjG8.pgp Description: PGP signature
Bug#454139: pwlib-titan: CVE-2007-4897 remote denial of service
tags 454139 + patch thanks Hi, attached is a patch for an NMU to fix this problem. Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. diff -u pwlib-titan-1.11.2/debian/changelog pwlib-titan-1.11.2/debian/changelog --- pwlib-titan-1.11.2/debian/changelog +++ pwlib-titan-1.11.2/debian/changelog @@ -1,3 +1,12 @@ +pwlib-titan (1.11.2-1.1) unstable; urgency=high + + * Non-maintainer upload by testing-security team. + * Fix remote denial of service vulnerability caused +by a call to PString::vsprintf if the used object already +contained more than 1000 characters (CVE-2007-4897; bug #454139). + + -- Nico Golde <[EMAIL PROTECTED]> Mon, 03 Dec 2007 13:20:05 +0100 + pwlib-titan (1.11.2-1) unstable; urgency=low * New upstream release (unstable branch). diff -u pwlib-titan-1.11.2/debian/patches/00list pwlib-titan-1.11.2/debian/patches/00list --- pwlib-titan-1.11.2/debian/patches/00list +++ pwlib-titan-1.11.2/debian/patches/00list @@ -4,0 +5 @@ +CVE-2007-4897 only in patch2: unchanged: --- pwlib-titan-1.11.2.orig/debian/patches/CVE-2007-4897.dpatch +++ pwlib-titan-1.11.2/debian/patches/CVE-2007-4897.dpatch @@ -0,0 +1,19 @@ +#! /bin/sh /usr/share/dpatch/dpatch-run +## CVE-2007-4897.dpatch by Nico Golde <[EMAIL PROTECTED]> +## +## All lines beginning with `## DP:' are a description of the patch. +## DP: No description. + [EMAIL PROTECTED]@ +diff -urNad pwlib-1.10.10~/src/ptlib/common/contain.cxx pwlib-1.10.10/src/ptlib/common/contain.cxx +--- pwlib-1.10.10~/src/ptlib/common/contain.cxx 2005-11-30 13:47:41.0 +0100 pwlib-1.10.10/src/ptlib/common/contain.cxx 2007-12-03 13:45:00.0 +0100 +@@ -2465,7 +2465,7 @@ + PAssert(SetSize(2000), POutOfMemory); + ::vsprintf(theArray+len, fmt, arg); + #else +- PINDEX size = 0; ++ PINDEX size = len; + do { + size += 1000; + PAssert(SetSize(size), POutOfMemory); pgpAwbCzl1vL9.pgp Description: PGP signature
Processed: setting package to libpt-1.11.2 libpt-1.11.2-dbg libpt-1.11.2-dev libpt-1.11.2-develop libpt-1.11.2-doc libpt-1.11.2-plugins-alsa libpt-1.11.2-plugins-avc libpt-1.11.2-plugins-dc libpt-1.11
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.9.26 > package libpt-1.11.2 libpt-1.11.2-dbg libpt-1.11.2-dev libpt-1.11.2-develop > libpt-1.11.2-doc libpt-1.11.2-plugins-alsa libpt-1.11.2-plugins-avc > libpt-1.11.2-plugins-dc libpt-1.11.2-plugins-oss libpt-1.11.2-plugins-v4l > libpt-1.11.2-plugins-v4l2 libpt-1.11.2-ptrace pwlib-titan Ignoring bugs not assigned to: libpt-1.11.2-plugins-v4l libpt-1.11.2-plugins-avc libpt-1.11.2-dbg libpt-1.11.2-develop libpt-1.11.2-ptrace libpt-1.11.2-dev libpt-1.11.2-plugins-oss pwlib-titan libpt-1.11.2-doc libpt-1.11.2-plugins-alsa libpt-1.11.2 libpt-1.11.2-plugins-v4l2 libpt-1.11.2-plugins-dc > tags 453595 + pending Bug#453595: pwlib-titan: debian/watch fails to report upstream's version There were no tags set. Tags added: pending > tags 454139 + pending Bug#454139: pwlib-titan: CVE-2007-4897 remote denial of service Tags were: security Tags added: pending > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#454133: pwlib: CVE-2007-4897 remote denial of service
Hi Faidon, * Faidon Liambotis <[EMAIL PROTECTED]> [2007-12-03 13:57]: > Nico Golde wrote: > > Package: pwlib > > Version: 1.10.2-1 > > Severity: grave > > Tags: security > Have you checked if this affects stable and oldstable? Yes, both are affected and there will be no DSA for them. I am currently chatting with kilian in IRC to clarify the rest :) Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. pgpCGtPpEd0Eo.pgp Description: PGP signature
Processed: setting package to libpt-1.10.10 libpt-1.10.10-dbg libpt-1.10.10-develop libpt-1.10.10-plugins-alsa libpt-1.10.10-plugins-avc libpt-1.10.10-plugins-dc libpt-1.10.10-plugins-oss libpt-1.10.1
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.9.26 > package libpt-1.10.10 libpt-1.10.10-dbg libpt-1.10.10-develop > libpt-1.10.10-plugins-alsa libpt-1.10.10-plugins-avc libpt-1.10.10-plugins-dc > libpt-1.10.10-plugins-oss libpt-1.10.10-plugins-v4l > libpt-1.10.10-plugins-v4l2 libpt-1.10.10-ptrace libpt-dev libpt-doc pwlib Ignoring bugs not assigned to: libpt-1.10.10-plugins-v4l libpt-1.10.10-dbg libpt-1.10.10-plugins-v4l2 libpt-1.10.10-plugins-dc libpt-1.10.10-plugins-alsa libpt-dev libpt-1.10.10-ptrace libpt-1.10.10-plugins-avc pwlib libpt-1.10.10 libpt-doc libpt-1.10.10-develop libpt-1.10.10-plugins-oss > tags 453139 + pending Bug#453139: Watch file broken Tags were: patch Bug#453539: pwlib: debian/watch fails to report upstream's version Tags added: pending > tags 453539 + pending Bug#453539: pwlib: debian/watch fails to report upstream's version Tags were: pending patch Bug#453139: Watch file broken Tags added: pending > tags 454133 + pending Bug#454133: pwlib: CVE-2007-4897 remote denial of service Tags were: patch security Tags added: pending > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: retitle 454139 to pwlib-titan: CVE-2007-4897 remote denial of service
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.11 > retitle 454139 pwlib-titan: CVE-2007-4897 remote denial of service Bug#454139: pwlib: CVE-2007-4897 remote denial of service Changed Bug title to `pwlib-titan: CVE-2007-4897 remote denial of service' from `pwlib: CVE-2007-4897 remote denial of service'. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#454133: pwlib: CVE-2007-4897 remote denial of service
tags 454133 + patch thanks Hi, attached is a patch for an NMU which fixes this bug. It will be also archived on: http://people.debian.org/~nion/nmu-diff/pwlib-1-10.10-1_1.10.10-1.1.patch Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. diff -u pwlib-1.10.10/debian/patches/00list pwlib-1.10.10/debian/patches/00list --- pwlib-1.10.10/debian/patches/00list +++ pwlib-1.10.10/debian/patches/00list @@ -4,0 +5 @@ +CVE-2007-4897 diff -u pwlib-1.10.10/debian/changelog pwlib-1.10.10/debian/changelog --- pwlib-1.10.10/debian/changelog +++ pwlib-1.10.10/debian/changelog @@ -1,3 +1,12 @@ +pwlib (1.10.10-1.1) unstable; urgency=high + + * Non-maintainer upload by testing-security team. + * Fix remote denial of service vulnerability caused +by a call to PString::vsprintf if the used object already +contained more than 1000 characters (CVE-2007-4897; bug #454133). + + -- Nico Golde <[EMAIL PROTECTED]> Mon, 03 Dec 2007 13:17:34 +0100 + pwlib (1.10.10-1) unstable; urgency=low * New upstream release. (gcc-4.2 clean. Yeah!) only in patch2: unchanged: --- pwlib-1.10.10.orig/debian/patches/CVE-2007-4897.dpatch +++ pwlib-1.10.10/debian/patches/CVE-2007-4897.dpatch @@ -0,0 +1,19 @@ +#! /bin/sh /usr/share/dpatch/dpatch-run +## CVE-2007-4897.dpatch by Nico Golde <[EMAIL PROTECTED]> +## +## All lines beginning with `## DP:' are a description of the patch. +## DP: No description. + [EMAIL PROTECTED]@ +diff -urNad pwlib-1.10.2~/src/ptlib/common/contain.cxx pwlib-1.10.2/src/ptlib/common/contain.cxx +--- pwlib-1.10.2~/src/ptlib/common/contain.cxx 2005-11-30 13:47:41.0 +0100 pwlib-1.10.2/src/ptlib/common/contain.cxx 2007-12-03 12:45:19.0 +0100 +@@ -1084,7 +1084,7 @@ + + void PCharArray::ReadFrom(istream &strm) + { +- PINDEX size = 0; ++ PINDEX size = len; + SetSize(size+100); + + while (strm.good()) { pgp8m5xFsUMxg.pgp Description: PGP signature
Processed: cloning
Processing commands for [EMAIL PROTECTED]: > clone 454133 -1 Bug#454133: pwlib: CVE-2007-4897 remote denial of service Bug 454133 cloned as bug 454139. > reassign -1 pwlib-titan Bug#454139: pwlib: CVE-2007-4897 remote denial of service Bug reassigned from package `pwlib' to `pwlib-titan'. > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: reassign 451818 to xserver-xorg-video-intel ...
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.11 > reassign 451818 xserver-xorg-video-intel 2:2.2.0-1 Bug#451818: kuickshow displays garbage Bug reassigned from package `kuickshow' to `xserver-xorg-video-intel'. > retitle 451818 display corruption with EXA in kuickshow Bug#451818: kuickshow displays garbage Changed Bug title to `display corruption with EXA in kuickshow' from `kuickshow displays garbage'. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: severity of 452739 is important
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.11 > severity 452739 important Bug#452739: xserver-xorg-video-intel: X crashes on i915GM with intel(0): ESR is 0x0010, page table error Severity set to `important' from `critical' > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#454133: pwlib: CVE-2007-4897 remote denial of service
Nico Golde wrote: > Package: pwlib > Version: 1.10.2-1 > Severity: grave > Tags: security Have you checked if this affects stable and oldstable? Regards, Faidon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#454141: opal: CVE-2007-4924 remote denial of service
Package: opal Version: 2.2.3.dfsg-1 Severity: grave Tags: security patch Hi, as you wanted a bug report, here it comes: the following CVE (Common Vulnerabilities & Exposures) id was published for opal. CVE-2007-4924[0]: | The Open Phone Abstraction Library (opal), as used by (1) Ekiga before | 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause | a denial of service (crash) via an invalid Content-Length header field | in Session Initiation Protocol (SIP) packets, which causes a 0 byte | to be written to an "attacker-controlled address." If you fix this vulnerability please also include the CVE id in your changelog entry. http://people.debian.org/~nion/CVE-2007-4924.dpatch should fix this, I also attached it. For further information: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4924 Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. #! /bin/sh /usr/share/dpatch/dpatch-run ## CVE-2007-4924.dpatch by Nico Golde <[EMAIL PROTECTED]> ## ## All lines beginning with `## DP:' are a description of the patch. ## DP: No description. @DPATCH@ diff -urNad opal-2.2.3.dfsg~/src/sip/sippdu.cxx opal-2.2.3.dfsg/src/sip/sippdu.cxx --- opal-2.2.3.dfsg~/src/sip/sippdu.cxx 2006-08-07 22:07:46.0 +0200 +++ opal-2.2.3.dfsg/src/sip/sippdu.cxx 2007-12-02 23:12:31.0 +0100 @@ -656,7 +656,7 @@ else addr += hostname; - if (port != 0) + if (port > 0) addr.sprintf(":%u", port); return addr; @@ -1815,8 +1815,18 @@ // if no content length is specified (which is not the same as zero length) // then read until plausible end of header marker PINDEX contentLength = mime.GetContentLength(); - if (contentLength > 0) + // assume entity bodies can't be longer than a UDP packet + if (contentLength > 1500) { + PTRACE(2, "SIP\tImplausibly long Content-Length " << contentLength << " received on " << transport); + return FALSE; + } + else if (contentLength < 0) { + PTRACE(2, "SIP\tImpossible negative Content-Length on " << transport); + return FALSE; + } + if (contentLength > 0){ transport.read(entityBody.GetPointer(contentLength+1), contentLength); + } else if (!mime.IsContentLengthPresent()) { PBYTEArray pp; pgpDDE4wJ119h.pgp Description: PGP signature
Processed: fixed 454141 in 2.2.11~dfsg1-3
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.11 > fixed 454141 2.2.11~dfsg1-3 Bug#454141: opal: CVE-2007-4924 remote denial of service Bug marked as fixed in version 2.2.11~dfsg1-3. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#454143: rapidsvn: Rapidsvn crashs when diff'ing on remote server.
Package: rapidsvn Version: 0.9.4-1 Severity: grave Justification: renders package unusable -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.22-3-686 (SMP w/1 CPU core) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages rapidsvn depends on: ii libapr1 1.2.11-1The Apache Portable Runtime Librar ii libaprutil1 1.2.7+dfsg-2+b1 The Apache Portable Runtime Utilit ii libc62.7-3 GNU C Library: Shared libraries ii libgcc1 1:4.2.2-4 GCC support library ii libneon260.26.4-2An HTTP and WebDAV client library ii libstdc++6 4.2.2-4 The GNU Standard C++ Library v3 ii libsvn1 1.4.4dfsg1-1Shared libraries used by Subversio ii libsvncpp0c2a0.9.4-1 Subversion C++ shared library ii libuuid1 1.40.2-1universally unique id library ii libwxbase2.6-0 2.6.3.2.2-1 wxBase library (runtime) - non-GUI ii libwxgtk2.6-02.6.3.2.2-1 wxWidgets Cross-platform C++ GUI t rapidsvn recommends no packages. -- no debconf information (gdb) run Starting program: /usr/bin/rapidsvn [Thread debugging using libthread_db enabled] [New Thread 0xb65b96c0 (LWP 5703)] [New Thread 0xb6274b90 (LWP 5706)] Program received signal SIGSEGV, Segmentation fault. [Switching to Thread 0xb6274b90 (LWP 5706)] 0xb7f88491 in svn::Status::entry () from /usr/lib/libsvncpp.so.0 (gdb) bt #0 0xb7f88491 in svn::Status::entry () from /usr/lib/libsvncpp.so.0 #1 0x08074b97 in ?? () #2 0x080749e2 in ?? () #3 0x080c3ef9 in ?? () #4 0x080c4258 in ?? () #5 0xb78bdef6 in wxThreadInternal::PthreadStart () from /usr/lib/libwx_baseu-2.6.so.0 #6 0xb78bdf7d in wxPthreadStart () from /usr/lib/libwx_baseu-2.6.so.0 #7 0xb7e47383 in start_thread () from /lib/libpthread.so.0 #8 0xb765b63e in clone () from /lib/libc.so.6 (gdb) quit RapidSVN Version 0.9.4
Bug#451818: reassign 451818 to imlib, forcibly merging 448360 451818, severity of 448360 is grave
# Automatically generated email from bts, devscripts version 2.10.11 reassign 451818 imlib forcemerge 448360 451818 # EXA is used by default with the intel driver now severity 448360 grave -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: reassign 451818 to imlib, forcibly merging 448360 451818, severity of 448360 is grave
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.11 > reassign 451818 imlib Bug#451818: display corruption with EXA in kuickshow Bug reassigned from package `xserver-xorg-video-intel' to `imlib'. > forcemerge 448360 451818 Bug#448360: Doesn't deal correctly with MIT-SHM extension not supporting shared pixmaps Bug#451818: display corruption with EXA in kuickshow Forcibly Merged 448360 451818. > # EXA is used by default with the intel driver now > severity 448360 grave Bug#448360: Doesn't deal correctly with MIT-SHM extension not supporting shared pixmaps Bug#451818: display corruption with EXA in kuickshow Severity set to `grave' from `important' > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#453189: centerim: Bug 39: icq contacts all show as offline
tags 453189 - patch thanks Hi Dmitry, * Dmitry E. Oboukhov <[EMAIL PROTECTED]> [2007-11-28 01:22]: > Package: centerim > Version: 4.22.1.20071022-1 > Severity: important > Tags: patch > > already fixed in upstream: > http://bugzilla.centerim.org/show_bug.cgi?id=39 > > > patch: > http://repo.or.cz/w/centerim.git?a=commitdiff;h=43ea42e1c8c34e9694a342121ad82c3d9119b2dc Please have a look at the comments in the upstream bugzilla. This patch does _not_ fix this problem. Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. pgpZXgB8y97UR.pgp Description: PGP signature
Processed: tagging 451849
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.11 > tags 451849 + pending Bug#451849: openoffice.org-gnome: wiping out contents of files on shared drives when opening Tags were: moreinfo Tags added: pending > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#423322: swi-prolog: should this package be orphaned?
Processing commands for [EMAIL PROTECTED]: > severity 423322 normal Bug#423322: swi-prolog: should this package be orphaned? Severity set to `normal' from `serious' > reassign 423322 wnpp Bug#423322: swi-prolog: should this package be orphaned? Bug reassigned from package `swi-prolog' to `wnpp'. > retitle 423322 O: swi-prolog -- Prolog interpreter Bug#423322: swi-prolog: should this package be orphaned? Changed Bug title to `O: swi-prolog -- Prolog interpreter' from `swi-prolog: should this package be orphaned?'. > clone 423322 -1 Bug#423322: O: swi-prolog -- Prolog interpreter Bug 423322 cloned as bug 454148. > retitle -1 O: swi-prolog-doc -- Documentation for SWI-Prolog interpreter and > XPCE Bug#454148: O: swi-prolog -- Prolog interpreter Changed Bug title to `O: swi-prolog-doc -- Documentation for SWI-Prolog interpreter and XPCE' from `O: swi-prolog -- Prolog interpreter'. > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#423322: swi-prolog: should this package be orphaned?
severity 423322 normal reassign 423322 wnpp retitle 423322 O: swi-prolog -- Prolog interpreter clone 423322 -1 retitle -1 O: swi-prolog-doc -- Documentation for SWI-Prolog interpreter and XPCE thanks On 11/05/07 at 01:20 -0600, Michael Ablassmeier wrote: > While reviewing packages that were not included in Etch, your package came > up as a package that should maybe be orphaned by its maintainer, because: > > * Outdated > * RC Buggy > * Maintainer seems MIA Hi, Since the maintainer never answered this mail, and there's a potential adopter, I am now orphaning swi-prolog. I'm also orphaning swi-prolog-doc, since it seems like a good idea to have them both maintained by the same person. -- | Lucas Nussbaum | [EMAIL PROTECTED] http://www.lucas-nussbaum.net/ | | jabber: [EMAIL PROTECTED] GPG: 1024D/023B3F4F | -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Re: [Pkg-mono-group] Bug#454136: libmono-addins0.2-cil: Tomboy crashes due to absent Mono.Addins 0.2.0.0 assembly
Processing commands for [EMAIL PROTECTED]: > severity 454136 serious Bug#454136: libmono-addins0.2-cil: Tomboy crashes due to absent Mono.Addins 0.2.0.0 assembly Severity set to `serious' from `normal' > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#453189: centerim: Bug 39: icq contacts all show as offline
Processing commands for [EMAIL PROTECTED]: > tags 453189 - patch Bug#453189: centerim: Bug 39: icq contacts all show as offline Tags were: patch Tags removed: patch > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#448360: marked as done (Doesn't deal correctly with MIT-SHM extension not supporting shared pixmaps)
Your message dated Mon, 03 Dec 2007 14:32:08 + with message-id <[EMAIL PROTECTED]> and subject line Bug#448360: fixed in imlib 1.9.15-4 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: imlib Version: 1.9.15-3 Severity: important Tags: patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 * The boolean value returned via the last parameter to XShmQueryVersion() isn't honoured everywhere. * The init functions that take parameters allow the caller to enable shared pixmaps when they aren't supported (or disabled by configuration files). These result in incorrect rendering when the MIT-SHM extension doesn't support shared pixmaps, e.g. using EXA with current versions of Xorg. I wonder if bug #414886 could be related to this as well. The attached patch fixes these problems. - -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable'), (102, 'experimental'), (101, 'gutsy-security'), (101, 'gutsy') Architecture: powerpc (ppc) Kernel: Linux 2.6.22-2-powerpc Locale: LANG=de_CH.UTF-8, LC_CTYPE=de_CH.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHJIvfWoGvjmrbsgARAjzeAJ4lRlU51siRJqZ0F31O7gQ3gaB4MQCghFuP 69tNXBdrxUBKM0apVhGqquI= =2rTi -END PGP SIGNATURE- diff -up -ru imlib-1.9.15.orig/gdk_imlib/misc.c imlib-1.9.15/gdk_imlib/misc.c --- imlib-1.9.15.orig/gdk_imlib/misc.c 2002-03-04 18:06:32.0 +0100 +++ imlib-1.9.15/gdk_imlib/misc.c 2007-10-28 14:00:04.0 +0100 @@ -674,6 +674,10 @@ gdk_imlib_init_params(GdkImlibInitParams visual = gdk_rgb_get_visual(); id->x.visual = GDK_VISUAL_XVISUAL(visual); /* the visual type */ id->x.depth = visual->depth; /* the depth of the screen in bpp */ + + id->x.shm = 0; + id->x.shmp = 0; + id->max_shm = 0; #ifdef HAVE_SHM if (XShmQueryExtension(id->x.disp)) { @@ -689,17 +693,14 @@ gdk_imlib_init_params(GdkImlibInitParams id->x.last_xim = NULL; id->x.last_sxim = NULL; id->max_shm = 0x7fff; - if (XShmPixmapFormat(id->x.disp) == ZPixmap) + if ((XShmPixmapFormat(id->x.disp) == ZPixmap) && + (pm == True)) id->x.shmp = 1; } } } - else #endif -{ - id->x.shm = 0; - id->x.shmp = 0; -} + id->cache.on_image = 0; id->cache.size_image = 0; id->cache.num_image = 0; @@ -935,8 +936,8 @@ gdk_imlib_init_params(GdkImlibInitParams } if (p->flags & PARAMS_SHAREDPIXMAPS) { - if (id->x.shm) - id->x.shmp = p->sharedpixmaps; + if (!p->sharedpixmaps) + id->x.shmp = 0; } if (p->flags & PARAMS_PALETTEOVERRIDE) override = p->paletteoverride; diff -up -ru imlib-1.9.15.orig/Imlib/misc.c imlib-1.9.15/Imlib/misc.c --- imlib-1.9.15.orig/Imlib/misc.c 2004-09-21 02:22:59.0 +0200 +++ imlib-1.9.15/Imlib/misc.c 2007-10-28 14:00:23.0 +0100 @@ -675,6 +675,10 @@ Imlib_init_with_params(Display * disp, I id->x.root = DefaultRootWindow(disp); /* the root window id */ id->x.visual = DefaultVisual(disp, id->x.screen); /* the visual type */ id->x.depth = DefaultDepth(disp, id->x.screen); /* the depth of the screen in bpp */ + + id->x.shm = 0; + id->x.shmp = 0; + id->max_shm = 0; #ifdef HAVE_SHM if (XShmQueryExtension(id->x.disp)) { @@ -690,17 +694,14 @@ Imlib_init_with_params(Display * disp, I id->x.last_xim = NULL; id->x.last_sxim = NULL; id->max_shm = 0x7fff; - if (XShmPixmapFormat(id->x.disp) == ZPixmap) + if ((XShmPixmapFormat(id->x.disp) == ZPixmap && + (pm == True))) id->x.shmp = 1; } } } - else #endif -{ - id->x.shm = 0; - id->x.shmp = 0; -} + id->cache.on_image = 0; id->cache.size_image = 0; id->cache.num_image = 0; @@ -952,8 +953,8 @@ Imlib_init_with_params(Display * disp, I } if (p->flags & PARAMS_SHAREDPIXMAPS) { - if (id->x.shm) - id->x.shmp = p->sharedpixmaps; + if (!p->sharedpixmaps) + id->x.shmp = 0; } if (p->flags & PARAMS_PALETTEOVERRIDE) override = p->paletteoverride; --- End Message --- --- Begin Message --- Source: imlib Source-Version: 1.9.15-4 We believe that the bug you reported is fixed in the latest version of imlib, which is due to be installed in the Debian FTP archive: gdk-imlib11-dev_1.9.15-4_i386.deb to pool/main/i/imlib/gdk-imlib11-dev_1.9.15-4_i386.deb gdk-imlib11_1.9.15-4_i386.deb to pool/main/i/imlib/gdk-imlib11_1.9.15-4_i386.deb gdk-imlib
Processed: Bug#453189: centerim: Bug 39: icq contacts all show as offline
Processing commands for [EMAIL PROTECTED]: > submitter 453189 ! Bug#453189: centerim: Bug 39: icq contacts all show as offline Changed Bug submitter from "Dmitry E. Oboukhov" <[EMAIL PROTECTED]> to "Dmitry E. Oboukhov" <[EMAIL PROTECTED]>. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: retitle 453652 to rsync: CVE-2007-6199, CVE-2007-6200 insecure handling of temporary files
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.11 > retitle 453652 rsync: CVE-2007-6199, CVE-2007-6200 insecure handling of > temporary files Bug#453652: rsync: prone to symlink attacks Changed Bug title to `rsync: CVE-2007-6199, CVE-2007-6200 insecure handling of temporary files' from `rsync: prone to symlink attacks'. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#451818: marked as done (display corruption with EXA in kuickshow)
Your message dated Mon, 03 Dec 2007 14:32:08 + with message-id <[EMAIL PROTECTED]> and subject line Bug#448360: fixed in imlib 1.9.15-4 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: kuickshow Version: 4:3.5.8-2 Severity: grave Justification: renders package unusable Hello, Since the last 3.5.8, kuikshow displays total garbage when opening a JPEG file. The same file works fine under GIMP. It also works file inside Konqueror, so I assume the problem is not KDE-wide. Alas downgrading to testing (4:3.5.7-4+lenny1) does not seem to fix the problem either ?! -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (100, 'unstable'), (100, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.23.1 (SMP w/2 CPU cores) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages kuickshow depends on: ii imlib11 1.9.15-3 Imlib is an imaging library for X ii kdelibs4c2a 4:3.5.8.dfsg.1-4 core libraries and binaries for al ii libc6 2.6.1-6 GNU C Library: Shared libraries ii libgcc1 1:4.2.2-3GCC support library ii libice6 2:1.0.4-1X11 Inter-Client Exchange library ii libjpeg62 6b-14The Independent JPEG Group's JPEG ii libpng12-0 1.2.15~beta5-3 PNG library - runtime ii libsm6 2:1.0.3-1+b1 X11 Session Management library ii libstdc++6 4.2.2-3 The GNU Standard C++ Library v3 ii libtiff43.8.2-7 Tag Image File Format (TIFF) libra ii libungif4g 4.1.4-5 shared library for GIF images ii libx11-62:1.0.3-7X11 client-side library ii libxext61:1.0.3-2X11 miscellaneous extension librar ii zlib1g 1:1.2.3.3.dfsg-7 compression library - runtime kuickshow recommends no packages. -- no debconf information -- Rémi Denis-Courmont http://www.remlab.net/ --- End Message --- --- Begin Message --- Source: imlib Source-Version: 1.9.15-4 We believe that the bug you reported is fixed in the latest version of imlib, which is due to be installed in the Debian FTP archive: gdk-imlib11-dev_1.9.15-4_i386.deb to pool/main/i/imlib/gdk-imlib11-dev_1.9.15-4_i386.deb gdk-imlib11_1.9.15-4_i386.deb to pool/main/i/imlib/gdk-imlib11_1.9.15-4_i386.deb gdk-imlib1_1.9.15-4_all.deb to pool/main/i/imlib/gdk-imlib1_1.9.15-4_all.deb imlib-base_1.9.15-4_all.deb to pool/main/i/imlib/imlib-base_1.9.15-4_all.deb imlib11-dev_1.9.15-4_i386.deb to pool/main/i/imlib/imlib11-dev_1.9.15-4_i386.deb imlib11_1.9.15-4_i386.deb to pool/main/i/imlib/imlib11_1.9.15-4_i386.deb imlib_1.9.15-4.diff.gz to pool/main/i/imlib/imlib_1.9.15-4.diff.gz imlib_1.9.15-4.dsc to pool/main/i/imlib/imlib_1.9.15-4.dsc A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Julien Cristau <[EMAIL PROTECTED]> (supplier of updated imlib package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 03 Dec 2007 14:55:26 +0100 Source: imlib Binary: gdk-imlib1 gdk-imlib11-dev gdk-imlib11 imlib11 imlib-base imlib11-dev Architecture: source i386 all Version: 1.9.15-4 Distribution: unstable Urgency: low Maintainer: Debian QA Group <[EMAIL PROTECTED]> Changed-By: Julien Cristau <[EMAIL PROTECTED]> Description: gdk-imlib1 - compatibility package for gdk-imlib11 gdk-imlib11 - imaging library for use with gtk gdk-imlib11-dev - Header files needed for Gdk-Imlib development imlib-base - Common files needed by the Imlib/Gdk-Imlib packages imlib11- Imlib is an imaging library for X and X11 imlib11-dev - Imlib is an imaging library for X and X11 Closes: 448360 Changes: imlib (1.9.15-4) unstable; urgency=low . * QA upload. . [ Michel Dänzer ] * Fix incorrect rendering when the MIT-SHM extension doesn't support shared pixmaps, e.g. using EXA with current versions of Xorg: + the boolean value returned
Processed: Bug#452751: does not compile under linux-source-2.6.22
Processing commands for [EMAIL PROTECTED]: > severity 452751 minor Bug#452751: does not compile under linux-source-2.6.22 Severity set to `minor' from `serious' > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#452751: does not compile under linux-source-2.6.22
severity 452751 minor thanks On Sat, 24 Nov 2007 17:57:04 -0500 "Brent S. Elmer, Ph.D." <[EMAIL PROTECTED]> wrote: > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol usb_put_intf > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol usb_alloc_urb > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol usb_free_urb > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol v4l_compat_ioctl32 > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol usb_ifnum_to_if > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol usb_register_driver > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol v4l_compat_translate_ioctl > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol usb_get_intf > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol usb_put_dev > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol video_devdata > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol usb_get_dev > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol usb_submit_urb > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol v4l_printk_ioctl > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol usb_driver_claim_interface > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol usb_control_msg > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol usb_set_interface > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol video_unregister_device > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol usb_deregister > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol video_device_alloc > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol usb_string > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol video_register_device > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol usb_kill_urb > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol usb_buffer_free > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol video_usercopy > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol video_device_release > WARNING: > /usr/local/src/modules/linux-uvc/debian/linux-uvc-modules-2.6.22.071124/lib/modules/2.6.22.071124/usb/media/uvcvideo.ko > needs unknown symbol usb_buffer_alloc I think that CONFIG_VIDEO_DEV is not enable in your kernel. Please check your config. My config: # # Multimedia devices # CONFIG_VIDEO_DEV=y CONFIG_VIDEO_V4L1=y CONFIG_VIDEO_V4L1_COMPAT=y CONFIG_VIDEO_V4L2=y CONFIG_VIDEO_CAPTURE_DRIVERS=y # CONFIG_VIDEO_ADV_DEBUG is not set # CONFIG_VIDEO_HELPER_CHIPS_AUTO is not set regards, No
Bug#453652: rsync: prone to symlink attacks
Hi, the following CVE ids were assigned to these vulnerabilities: CVE-2007-6200[0]: | Unspecified vulnerability in rsync before 3.0.0pre6, when running a writable | rsync daemon, allows remote attackers to bypass exclude, exclude_from, and | filter and read or write hidden files via (1) symlink, (2) partial-dir, (3) | backup-dir, and unspecified (4) dest options. and CVE-2007-6199[1]: | rsync before 3.0.0pre6, when running a writable rsync daemon that is not using | chroot, allows remote attackers to access restricted files via unknown vectors | that cause rsync to create a symlink that points outside of the module's | hierarchy. Please mention those CVE ids in the changelog. Do you need me to NMU this or are you going to upload now? Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. pgpRmaAMstl88.pgp Description: PGP signature
Bug#453189: centerim: Bug 39: icq contacts all show as offline
hi guys. > > > > already fixed in upstream: > > http://bugzilla.centerim.org/show_bug.cgi?id=39 > > > > > > patch: > > http://repo.or.cz/w/centerim.git?a=commitdiff;h=43ea42e1c8c34e9694a342121ad82c3d9119b2dc > > Please have a look at the comments in the upstream bugzilla. > This patch does _not_ fix this problem. I'm checking this. I don't have the problem on ICQ. I'm not sure why. But I'm building the new release based in the 20071103 tarball with some patches (from the master brnach) while the upstreams releases the new official version. I was waiting centerim comming to testing to do a backporting to stable too. Nico, could you upload it when it be ready, please? :P Regards. -- Anibal Avelar (FixXxeR) http://fixxxer.cc GPG: 83B64656 - C143 4AD8 B017 53FA B742 D6AA CEEA F9F3 83B6 4656 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#453189: centerim: Bug 39: icq contacts all show as offline
Hi Anibal, * Anibal Avelar <[EMAIL PROTECTED]> [2007-12-03 16:30]: > > > already fixed in upstream: > > > http://bugzilla.centerim.org/show_bug.cgi?id=39 > > > > > > > > > patch: > > > http://repo.or.cz/w/centerim.git?a=commitdiff;h=43ea42e1c8c34e9694a342121ad82c3d9119b2dc > > > > Please have a look at the comments in the upstream bugzilla. > > This patch does _not_ fix this problem. > > I'm checking this. I don't have the problem on ICQ. I'm not sure why. Strange, I have :) > But I'm building the new release based in the 20071103 tarball with > some patches (from the master brnach) while the upstreams releases the > new official version. Ok. > I was waiting centerim comming to testing to do a backporting to stable too. > > Nico, could you upload it when it be ready, please? :P Yes sure, just ping me on jabber or mail. Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. pgp7bD42paeCa.pgp Description: PGP signature
Bug#451235: marked as done (CVE-2007-5925 Denial of Service vulnerability in innodb via crafted query)
Your message dated Mon, 03 Dec 2007 16:02:21 + with message-id <[EMAIL PROTECTED]> and subject line Bug#451235: fixed in mysql-dfsg-5.0 5.0.45-1+lenny1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: mysql-dfsg-5.0 Version: 5.0.32-7etch1 Severity: grave Tags: security Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for mysql-dfsg-5.0. CVE-2007-5925[0]: | The convert_search_mode_to_innobase function in ha_innodb.cc in the | InnoDB engine in MySQL 5.1.23-BK and earlier allows remote | authenticated users to cause a denial of service (database crash) via | a certain CONTAINS operation on an indexed column, which triggers an | assertion error. If you fix this vulnerability please also include the CVE id in your changelog entry. For further information: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5925 Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. pgpZaf584PdO5.pgp Description: PGP signature --- End Message --- --- Begin Message --- Source: mysql-dfsg-5.0 Source-Version: 5.0.45-1+lenny1 We believe that the bug you reported is fixed in the latest version of mysql-dfsg-5.0, which is due to be installed in the Debian FTP archive: libmysqlclient15-dev_5.0.45-1+lenny1_i386.deb to pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.45-1+lenny1_i386.deb libmysqlclient15off_5.0.45-1+lenny1_i386.deb to pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.45-1+lenny1_i386.deb mysql-client-5.0_5.0.45-1+lenny1_i386.deb to pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.45-1+lenny1_i386.deb mysql-client_5.0.45-1+lenny1_all.deb to pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.45-1+lenny1_all.deb mysql-common_5.0.45-1+lenny1_all.deb to pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.45-1+lenny1_all.deb mysql-dfsg-5.0_5.0.45-1+lenny1.diff.gz to pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.45-1+lenny1.diff.gz mysql-dfsg-5.0_5.0.45-1+lenny1.dsc to pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.45-1+lenny1.dsc mysql-server-5.0_5.0.45-1+lenny1_i386.deb to pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.45-1+lenny1_i386.deb mysql-server_5.0.45-1+lenny1_all.deb to pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.45-1+lenny1_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Nico Golde <[EMAIL PROTECTED]> (supplier of updated mysql-dfsg-5.0 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 02 Dec 2007 16:39:21 + Source: mysql-dfsg-5.0 Binary: libmysqlclient15-dev mysql-client mysql-client-5.0 mysql-server mysql-server-5.0 mysql-common libmysqlclient15off Architecture: source all i386 Version: 5.0.45-1+lenny1 Distribution: testing-security Urgency: high Maintainer: Debian MySQL Maintainers <[EMAIL PROTECTED]> Changed-By: Nico Golde <[EMAIL PROTECTED]> Description: libmysqlclient15-dev - MySQL database development files libmysqlclient15off - MySQL database client library mysql-client - MySQL database client (meta package depending on the latest versi mysql-client-5.0 - MySQL database client binaries mysql-common - MySQL database common files mysql-server - MySQL database server (meta package depending on the latest versi mysql-server-5.0 - MySQL database server binaries Closes: 451235 Changes: mysql-dfsg-5.0 (5.0.45-1+lenny1) testing-security; urgency=high . * Non-maintainer upload by testing-security team. * This update addresses the following security issue: CVE-2007-5925: The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error (Closes: #451235). Files: 6aa93c0634a525b4d2ec0230ac7c7652 1206 misc optional mysql-dfsg-5.0_5.0.45-1+lenny1.dsc ab450aa2e9b89f3b4e01fd12375b1bee 17801680 misc optional mysql-dfsg-5.0_5.0.45
Bug#454136: [Pkg-mono-group] Bug#454136: libmono-addins0.2-cil: Tomboy crashes due to absent Mono.Addins 0.2.0.0 assembly
On Mon, 2007-12-03 at 16:46 +0100, Paul van Tilburg wrote: > % gacutil -l policy.0.2.Mono.Addins > The following assemblies are installed into the GAC: > Number of items = 0 So that's the cause of the problem, the policy file was not installed. Let's see why: ls /usr/share/cli-common/policies.d/ cat /var/lib/dpkg/info/libmono-addins0.2-cil.* -- Regards, Mirco 'meebey' Bauer PGP-Key ID: 0xEEF946C8 FOSS Developer[EMAIL PROTECTED] http://www.meebey.net/ PEAR Developer[EMAIL PROTECTED] http://pear.php.net/ Debian Developer [EMAIL PROTECTED] http://www.debian.org/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#453652: patch for NMU
Hi, attached is an updated patch for an NMU. It will be also archived on: http://people.debian.org/~nion/nmu-diff/rsync-2.6.9-5_2.6.9-5.1.patch Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. diff -u rsync-2.6.9/debian/changelog rsync-2.6.9/debian/changelog --- rsync-2.6.9/debian/changelog +++ rsync-2.6.9/debian/changelog @@ -1,3 +1,16 @@ +rsync (2.6.9-5.1) unstable; urgency=high + + * Non-maintainer upload by testing-security team. + * This update addresses the following security issues (Closes: #453652): +- When "use chroot" option is disabled, a programming error + can be exploited by a user to trick rsync into creating a + symlink that points outside the module's hierarchy. +- A programming error within the "exclude", "exclude from" and "filter" + options can be exploited via a symlink attack to gain access + to hidden files if the filename is known. + + -- Nico Golde <[EMAIL PROTECTED]> Mon, 03 Dec 2007 17:00:37 +0100 + rsync (2.6.9-5) unstable; urgency=high * fix two off-by-one errors leading to potential buffer overflow which may only in patch2: unchanged: --- rsync-2.6.9.orig/debian/patches/CVE-2007-6200-6199.patch +++ rsync-2.6.9/debian/patches/CVE-2007-6200-6199.patch @@ -0,0 +1,349 @@ +diff -Nurad rsync-2.6.9/clientserver.c rsync-2.6.9.new/clientserver.c +--- rsync-2.6.9/clientserver.c 2006-10-24 02:36:42.0 +0200 rsync-2.6.9.new/clientserver.c 2007-11-30 18:26:25.0 +0100 +@@ -55,6 +55,7 @@ + char *auth_user; + int read_only = 0; + int module_id = -1; ++int munge_symlinks = 0; + struct chmod_mode_struct *daemon_chmod_modes; + + /* Length of lp_path() string when in daemon mode & not chrooted, else 0. */ +@@ -524,6 +525,18 @@ + sanitize_paths = 1; + } + ++ if ((munge_symlinks = lp_munge_symlinks(i)) < 0) ++ munge_symlinks = !use_chroot; ++ if (munge_symlinks) { ++ STRUCT_STAT st; ++ if (stat(SYMLINK_PREFIX, &st) == 0 && S_ISDIR(st.st_mode)) { ++ rprintf(FLOG, "Symlink munging is unsupported when a %s directory exists.\n", ++SYMLINK_PREFIX); ++ io_printf(f_out, "@ERROR: daemon security issue -- contact admin\n", name); ++ exit_cleanup(RERR_UNSUPPORTED); ++ } ++ } ++ + if (am_root) { + /* : You could argue that if the daemon is started + * by a non-root user and they explicitly specify a +diff -Nurad rsync-2.6.9/flist.c rsync-2.6.9.new/flist.c +--- rsync-2.6.9/flist.c 2006-10-14 03:17:36.0 +0200 rsync-2.6.9.new/flist.c 2007-11-30 18:26:25.0 +0100 +@@ -53,6 +53,7 @@ + extern int copy_unsafe_links; + extern int protocol_version; + extern int sanitize_paths; ++extern int munge_symlinks; + extern struct stats stats; + extern struct file_list *the_file_list; + +@@ -174,6 +175,11 @@ + } + return do_stat(path, stp); + } ++ if (munge_symlinks && am_sender && llen > SYMLINK_PREFIX_LEN ++ && strncmp(linkbuf, SYMLINK_PREFIX, SYMLINK_PREFIX_LEN) == 0) { ++ memmove(linkbuf, linkbuf + SYMLINK_PREFIX_LEN, ++llen - SYMLINK_PREFIX_LEN + 1); ++ } + } + return 0; + #else +@@ -591,6 +597,8 @@ + linkname_len - 1); + overflow_exit("receive_file_entry"); + } ++ if (munge_symlinks) ++ linkname_len += SYMLINK_PREFIX_LEN; + } + else + #endif +@@ -658,10 +666,17 @@ + #ifdef SUPPORT_LINKS + if (linkname_len) { + file->u.link = bp; ++ if (munge_symlinks) { ++ strlcpy(bp, SYMLINK_PREFIX, linkname_len); ++ bp += SYMLINK_PREFIX_LEN; ++ linkname_len -= SYMLINK_PREFIX_LEN; ++ } + read_sbuf(f, bp, linkname_len - 1); +- if (sanitize_paths) ++ if (sanitize_paths && !munge_symlinks) { + sanitize_path(bp, bp, "", lastdir_depth, NULL); +- bp += linkname_len; ++ bp += strlen(bp) + 1; ++ } else ++ bp += linkname_len; + } + #endif + +diff -Nurad rsync-2.6.9/loadparm.c rsync-2.6.9.new/loadparm.c +--- rsync-2.6.9/loadparm.c 2006-10-13 08:49:44.0 +0200 rsync-2.6.9.new/loadparm.c 2007-11-30 18:26:25.0 +0100 +@@ -153,6 +153,7 @@ + BOOL ignore_errors; + BOOL ignore_nonreadable; + BOOL list; ++ BOOL munge_symlinks; + BOOL read_only; + BOOL strict_modes; + BOOL transfer_logging; +@@ -200,6 +201,7 @@ + /* ignore_errors; */ False, + /* ignore_nonreadable; */ False, + /* list; */ True, ++ /* munge_symlinks; */ (BOOL)-1, + /* read_only; */ True, + /* strict_modes; */ True, + /* transfer_logging; */ False, +@@ -313,6 +315,7 @@ + {"log format",P_STRING, P_LOCAL, &sDefault.log_format,NULL,0}, + {"max connections", P_INTEGER,P_LOCAL, &sDefault.max_connections, NULL,0}, + {"max verbosity", P_INTEGER,P_LOCAL, &sDefault.max_verbosity, NULL,0}, ++ {"munge symlinks",P_BOOL, P_LOCAL, &sDefault.munge_symlinks,NULL,0}, + {"name", P_STRING, P_LOCAL, &sDefault.name, NULL,0}, + {"outgoing chmod",P_STRING, P_LOCAL, &sDefault.outgoing_chmod,NULL,0}, + {"path",
Bug#454158: Unhandled Exception on startup, tomboy won't start
Package: tomboy Version: 0.8.2-1 Severity: grave --- Please enter the report below this line. --- $ tomboy [DEBUG]: NoteManager created with note path "/home/ondra/.tomboy". ** (Tomboy:30324): WARNING **: The following assembly referenced from /usr/lib/tomboy/Tomboy.exe could not be loaded: Assembly: Mono.Addins(assemblyref_index=7) Version:0.2.0.0 Public Key: 0738eb9f132ed756 The assembly was not found in the Global Assembly Cache, a path listed in the MONO_PATH environment variable, or in the location of the executing assembly (/usr/lib/tomboy). ** (Tomboy:30324): WARNING **: Could not load file or assembly 'Mono.Addins, Version=0.2.0.0, Culture=neutral, PublicKeyToken=0738eb9f132ed756' or one of its dependencies. ** (Tomboy:30324): WARNING **: Missing method .ctor in assembly /usr/lib/tomboy/Tomboy.exe, type Mono.Addins.AddinEventHandler Unhandled Exception: System.IO.FileNotFoundException: Could not load file or assembly 'Mono.Addins, Version=0.2.0.0, Culture=neutral, PublicKeyToken=0738eb9f132ed756' or one of its dependencies. File name: 'Mono.Addins, Version=0.2.0.0, Culture=neutral, PublicKeyToken=0738eb9f132ed756' at <0x0> at Tomboy.AddinManager..ctor (System.String tomboy_conf_dir) [0x0] at Tomboy.NoteManager.CreateAddinManager () [0x0] at Tomboy.NoteManager..ctor (System.String directory, System.String backup_directory) [0x0] at Tomboy.NoteManager..ctor (System.String directory) [0x0] at Tomboy.Tomboy.Main (System.String[] args) [0x0] I was using tomboy for managing my notes, but today I am not able to start it up. :( --- System information. --- Architecture: i386 Kernel: Linux 2.6.21-1-686 Debian Release: lenny/sid 500 unstableftp.cz.debian.org --- Package information. --- Depends (Version) | Installed ===-+-== gconf2(>= 2.10.1-2) | 2.20.1-1 libart-2.0-2(>= 2.3.18) | 2.3.19-3 libatk1.0-0 (>= 1.20.0) | 1.20.0-1 libc6(>= 2.7-1) | 2.7-3 libcairo2(>= 1.4.0) | 1.4.10-1 libgconf2.0-cil (>= 2.16.0) | 2.16.0-7 libglib2.0-0(>= 2.14.0) | 2.14.4-2 libglib2.0-cil (>= 2.10.2) | 2.10.2-1 libgmime2.2-cil (>= 2.2.11) | 2.2.11-1 libgnome2.0-cil (>= 2.16.0) | 2.16.0-7 libgnomecanvas2-0 (>= 2.11.1) | 2.20.1.1-1 libgnomeprint2.2-0 (>= 2.17.0) | 2.18.2-1 libgnomeprintui2.2-0(>= 2.17.0) | 2.18.1-1 libgtk2.0-0 (>= 2.12.0) | 2.12.2-1 libgtk2.0-cil (>= 2.10.2) | 2.10.2-1 libgtkspell0 (>= 2.0.2) | 2.0.10-3+b1 libmono-addins-gui0.2-cil(>= 0.2-4) | 0.3~svn.r90520-1 libmono-addins0.2-cil(>= 0.2-4) | 0.3~svn.r90520-1 libmono-corlib2.0-cil(>= 1.2.5) | 1.2.5.1-2 libmono-system2.0-cil(>= 1.2.5) | 1.2.5.1-2 libmono2.0-cil (>= 1.2.5) | 1.2.5.1-2 libndesk-dbus-glib1.0-cil(>= 0.4.0) | 0.4.1-1 libndesk-dbus1.0-cil (>= 0.6.0) | 0.6.0-1 libpanel-applet2-0 (>= 2.19.3) | 2.20.2-2 libpango1.0-0 (>= 1.18.3) | 1.18.3-1 libxml2 | 2.6.30.dfsg-3 mono-runtime (>= 1.1.8.1) | 1.2.5.1-2 zlib1g(>= 1:1.2.3.3.dfsg-1) | 1:1.2.3.3.dfsg-7 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#454136: [Pkg-mono-group] Bug#454136: libmono-addins0.2-cil: Tomboy crashes due to absent Mono.Addins 0.2.0.0 assembly
On Mon, Dec 03, 2007 at 02:58:43PM +0100, Mirco Bauer wrote: > Please execute the following commands and give me the output of them: % gacutil -l Mono.Addins The following assemblies are installed into the GAC: Mono.Addins, Version=0.3.0.0, Culture=neutral, PublicKeyToken=0738eb9f132ed756 Number of items = 1 % gacutil -l policy.0.2.Mono.Addins The following assemblies are installed into the GAC: Number of items = 0 % monodis --assemblyref /usr/lib/tomboy/Tomboy.exe AssemblyRef Table 1: Version=2.0.0.0 Name=mscorlib Flags=0x Public Key: 0x: B7 7A 5C 56 19 34 E0 89 2: Version=2.10.0.0 Name=gtk-sharp Flags=0x Public Key: 0x: 35 E1 01 95 DA B3 C9 9F 3: Version=2.16.0.0 Name=gnome-sharp Flags=0x Public Key: 0x: 35 E1 01 95 DA B3 C9 9F 4: Version=2.0.0.0 Name=Mono.Posix Flags=0x Public Key: 0x: 07 38 EB 9F 13 2E D7 56 5: Version=2.10.0.0 Name=glib-sharp Flags=0x Public Key: 0x: 35 E1 01 95 DA B3 C9 9F 6: Version=2.10.0.0 Name=gdk-sharp Flags=0x Public Key: 0x: 35 E1 01 95 DA B3 C9 9F 7: Version=2.0.0.0 Name=System.Xml Flags=0x Public Key: 0x: B7 7A 5C 56 19 34 E0 89 8: Version=0.2.0.0 Name=Mono.Addins Flags=0x Public Key: 0x: 07 38 EB 9F 13 2E D7 56 9: Version=2.0.0.0 Name=System Flags=0x Public Key: 0x: B7 7A 5C 56 19 34 E0 89 10: Version=2.16.0.0 Name=gconf-sharp Flags=0x Public Key: 0x: 35 E1 01 95 DA B3 C9 9F 11: Version=2.10.0.0 Name=pango-sharp Flags=0x Public Key: 0x: 35 E1 01 95 DA B3 C9 9F 12: Version=2.16.0.0 Name=gconf-sharp-peditors Flags=0x Public Key: 0x: 35 E1 01 95 DA B3 C9 9F 13: Version=0.2.0.0 Name=Mono.Addins.Gui Flags=0x Public Key: 0x: 07 38 EB 9F 13 2E D7 56 14: Version=0.2.0.0 Name=Mono.Addins.Setup Flags=0x Public Key: 0x: 07 38 EB 9F 13 2E D7 56 15: Version=1.0.0.0 Name=NDesk.DBus Flags=0x Public Key: 0x: F6 71 6E 4F 9B 2E D0 99 16: Version=1.0.0.0 Name=NDesk.DBus.GLib Flags=0x Public Key: 0x: F6 71 6E 4F 9B 2E D0 99 Paul -- PhD Student @ Eindhoven | email: [EMAIL PROTECTED] University of Technology, The Netherlands | JID: [EMAIL PROTECTED] >>> Using the Power of Debian GNU/Linux <<< | GnuPG key ID: 0x50064181 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Upstream
Processing commands for [EMAIL PROTECTED]: > severity 454164 important Bug#454164: broke X on mobility firegl T2 Severity set to `important' from `critical' > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#453686: cairo: CVE-2007-5503 integer overflow possibly leading to arbitrary code execution
Hi, attached is a patch to fix this vulnerability. I'd like to upload it tomorrow since you didn't react on this bug report. It will be also archived on: http://people.debian.org/~nion/nmu-diff/libcairo-1.4.10_1.4.10-1.1.patch Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. diff -u libcairo-1.4.10/debian/changelog libcairo-1.4.10/debian/changelog --- libcairo-1.4.10/debian/changelog +++ libcairo-1.4.10/debian/changelog @@ -1,3 +1,11 @@ +libcairo (1.4.10-1.1) unstable; urgency=high + + * Non-maintainer upload by testing-security team. + * Fix multiple integer overflows leading to arbitrary code +execution (CVE-2007-5503; Closes: #453686). + + -- Nico Golde <[EMAIL PROTECTED]> Mon, 03 Dec 2007 17:20:59 +0100 + libcairo (1.4.10-1) unstable; urgency=low * New upstream release only in patch2: unchanged: --- libcairo-1.4.10.orig/src/cairo-atsui-font.c +++ libcairo-1.4.10/src/cairo-atsui-font.c @@ -809,7 +809,7 @@ *num_glyphs = glyphCount - 1; *glyphs = - (cairo_glyph_t *) malloc(*num_glyphs * (sizeof (cairo_glyph_t))); + (cairo_glyph_t *) _cairo_malloc_ab(*num_glyphs, sizeof (cairo_glyph_t)); if (*glyphs == NULL) { return CAIRO_STATUS_NO_MEMORY; } only in patch2: unchanged: --- libcairo-1.4.10.orig/src/cairo-ft-font.c +++ libcairo-1.4.10/src/cairo-ft-font.c @@ -742,7 +742,7 @@ data = bitmap->buffer; assert (stride == bitmap->pitch); } else { - data = malloc (stride * height); + data = _cairo_malloc_ab (height, stride); if (!data) { _cairo_error (CAIRO_STATUS_NO_MEMORY); return CAIRO_STATUS_NO_MEMORY; @@ -792,7 +792,7 @@ if (own_buffer) { data = bitmap->buffer; } else { - data = malloc (stride * height); + data = _cairo_malloc_ab (height, stride); if (!data) { _cairo_error (CAIRO_STATUS_NO_MEMORY); return CAIRO_STATUS_NO_MEMORY; only in patch2: unchanged: --- libcairo-1.4.10.orig/src/cairo-bentley-ottmann.c +++ libcairo-1.4.10/src/cairo-bentley-ottmann.c @@ -754,7 +754,7 @@ * or stop events, so this allocation is safe. XXX: make the * event type a union so it doesn't always contain the skip * elt? */ -events = malloc (num_events * (sizeof (cairo_bo_event_t) + sizeof(cairo_bo_event_t*))); +events = _cairo_malloc_ab (num_events, sizeof (cairo_bo_event_t) + sizeof(cairo_bo_event_t*)); if (events == NULL) return CAIRO_STATUS_NO_MEMORY; @@ -1436,7 +1436,7 @@ if (polygon->num_edges < ARRAY_LENGTH (stack_edges)) { edges = stack_edges; } else { - edges = malloc (polygon->num_edges * sizeof (cairo_bo_edge_t)); + edges = _cairo_malloc_ab (polygon->num_edges, sizeof (cairo_bo_edge_t)); if (edges == NULL) return CAIRO_STATUS_NO_MEMORY; } @@ -1757,7 +1757,7 @@ while (intersections) { int num_edges = _cairo_array_num_elements (&intersected_edges); passes++; - edges = malloc (num_edges * sizeof (cairo_bo_edge_t)); + edges = _cairo_malloc_ab (num_edges, sizeof (cairo_bo_edge_t)); assert (edges != NULL); memcpy (edges, _cairo_array_index (&intersected_edges, 0), num_edges * sizeof (cairo_bo_edge_t)); _cairo_array_fini (&intersected_edges); only in patch2: unchanged: --- libcairo-1.4.10.orig/src/cairo-traps.c +++ libcairo-1.4.10/src/cairo-traps.c @@ -260,11 +260,12 @@ return traps->status; if (traps->traps == traps->traps_embedded) { - new_traps = malloc (new_size * sizeof (cairo_trapezoid_t)); + new_traps = _cairo_malloc_ab (new_size, sizeof (cairo_trapezoid_t)); if (new_traps) memcpy (new_traps, traps->traps, sizeof (traps->traps_embedded)); } else { - new_traps = realloc (traps->traps, new_size * sizeof (cairo_trapezoid_t)); + new_traps = _cairo_realloc_ab (traps->traps, +new_size, sizeof (cairo_trapezoid_t)); } if (new_traps == NULL) { only in patch2: unchanged: --- libcairo-1.4.10.orig/src/cairo-malloc-private.h +++ libcairo-1.4.10/src/cairo-malloc-private.h @@ -0,0 +1,126 @@ +/* -*- Mode: c; tab-width: 8; c-basic-offset: 4; indent-tabs-mode: t; -*- */ +/* Cairo - a vector graphics library with display and print output + * + * Copyright © 2007 Mozilla Corporation + * + * This library is free software; you can redistribute it and/or + * modify it either under the terms of the GNU Lesser General Public + * License version 2.1 as published by the Free Software Foundation + * (the "LGPL") or, at your option, under the terms of the Mozilla + * Public License Version 1.1 (the "MPL"). If you do not alter this + * notice, a recipient may use your version of this file under either + * the MPL or the LGPL. + * + * You should have received a copy of the LGPL along with this library + * in the file COPYING-LGPL-2.1; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA + * You should have received a copy of the MPL along with this library + * in
Processed (with 1 errors): Ack
Processing commands for [EMAIL PROTECTED]: > severity 454163 whishlist Severity level `whishlist' is not known. Recognized are: critical, grave, serious, important, normal, minor, wishlist, fixed. > retitle 454163 "Cannot downgrade to 8.40.4 or below" Bug#454163: 8.43.2-1 broke X and can't revert to 8.40.4 Changed Bug title to `"Cannot downgrade to 8.40.4 or below"' from `8.43.2-1 broke X and can't revert to 8.40.4'. > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#454163: 8.43.2-1 broke X and can't revert to 8.40.4
Package: fglrx-driver Version: 8.43.2-1 Severity: serious --- Please enter the report below this line. --- Can't revert to previous fglrx version after 8.43.2 breaks X because of whatever 8.43 does to libGL.so. belmer:/var/cache/apt/archives# dpkg -i fglrx-driver_8.40.4-2_i386.deb dpkg - warning: downgrading fglrx-driver from 8.43.2-1 to 8.40.4-2. (Reading database ... 174619 files and directories currently installed.) Preparing to replace fglrx-driver 8.43.2-1 (using fglrx-driver_8.40.4-2_i386.deb) ... Stopping atieventsd: done. Unpacking replacement fglrx-driver ... dpkg: error processing fglrx-driver_8.40.4-2_i386.deb (--install): trying to overwrite `/usr/lib/libGL.so.1.2', which is also in package libgl1-mesa-glx dpkg-deb: subprocess paste killed by signal (Broken pipe) Starting atieventsd: done. Errors were encountered while processing: fglrx-driver_8.40.4-2_i386.deb --- System information. --- Architecture: i386 Kernel: Linux 2.6.22.071203 Debian Release: lenny/sid 500 testing www.debian-multimedia.org 500 testing olymp.hursley.ibm.com 500 testing debian.linux.ibm.com 500 stable olymp.hursley.ibm.com 500 edgypokgsa.ibm.com --- Package information. --- Depends (Version) | Installed ===-+-=== libc6 (>= 2.6.1-1) | 2.6.1-1+b1 libgcc1(>= 1:4.2.1) | 1:4.2.2-3 libstdc++5 (>= 1:3.3.4-1) | 1:3.3.6-15 libx11-6| 2:1.0.3-7 libxext6| 1:1.0.3-2 libxrandr2 (>= 2:1.2.0) | 2:1.2.2-1 libxrender1 | 1:0.9.4-1 xserver-xorg (>= 1:7.1.0) | 1:7.2-5 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#454164: broke X on mobility firegl T2
Package: fglrx-driver Version: 8.43.2-1 Severity: critical --- Please enter the report below this line. --- I moved from 8.40.4-2 to this version and it broke X. Even worse is that I cannot revert to the previous version. You can see my ATI card in the following: [EMAIL PROTECTED]:/var/cache/apt/archives$ lspci 00:00.0 Host bridge: Intel Corporation 82855PM Processor to I/O Controller (rev 03) 00:01.0 PCI bridge: Intel Corporation 82855PM Processor to AGP Controller (rev 03) 00:1d.0 USB Controller: Intel Corporation 82801DB/DBL/DBM (ICH4/ICH4-L/ICH4-M) USB UHCI Controller #1 (rev 01) 00:1d.1 USB Controller: Intel Corporation 82801DB/DBL/DBM (ICH4/ICH4-L/ICH4-M) USB UHCI Controller #2 (rev 01) 00:1d.2 USB Controller: Intel Corporation 82801DB/DBL/DBM (ICH4/ICH4-L/ICH4-M) USB UHCI Controller #3 (rev 01) 00:1d.7 USB Controller: Intel Corporation 82801DB/DBM (ICH4/ICH4-M) USB2 EHCI Controller (rev 01) 00:1e.0 PCI bridge: Intel Corporation 82801 Mobile PCI Bridge (rev 81) 00:1f.0 ISA bridge: Intel Corporation 82801DBM (ICH4-M) LPC Interface Bridge (rev 01) 00:1f.1 IDE interface: Intel Corporation 82801DBM (ICH4-M) IDE Controller (rev 01) 00:1f.3 SMBus: Intel Corporation 82801DB/DBL/DBM (ICH4/ICH4-L/ICH4-M) SMBus Controller (rev 01) 00:1f.5 Multimedia audio controller: Intel Corporation 82801DB/DBL/DBM (ICH4/ICH4-L/ICH4-M) AC'97 Audio Controller (rev 01) 00:1f.6 Modem: Intel Corporation 82801DB/DBL/DBM (ICH4/ICH4-L/ICH4-M) AC'97 Modem Controller (rev 01) 01:00.0 VGA compatible controller: ATI Technologies Inc M10 NT [FireGL Mobility T2] (rev 80) 02:00.0 CardBus bridge: Texas Instruments PCI4520 PC card Cardbus Controller (rev 01) 02:00.1 CardBus bridge: Texas Instruments PCI4520 PC card Cardbus Controller (rev 01) 02:01.0 Ethernet controller: Intel Corporation 82540EP Gigabit Ethernet Controller (Mobile) (rev 03) 02:02.0 Ethernet controller: Atheros Communications, Inc. AR5212 802.11abg NIC (rev 01) Here is my X log file: X Window System Version 1.3.0 Release Date: 19 April 2007 X Protocol Version 11, Revision 0, Release 1.3 Build Operating System: Linux Debian (xorg-server 2:1.3.0.0.dfsg-12) Current Operating System: Linux belmer 2.6.22.071203 #1 PREEMPT Mon Dec 3 08:54:03 EST 2007 i686 Build Date: 09 August 2007 Before reporting problems, check http://wiki.x.org to make sure that you have the latest version. Module Loader present Markers: (--) probed, (**) from config file, (==) default setting, (++) from command line, (!!) notice, (II) informational, (WW) warning, (EE) error, (NI) not implemented, (??) unknown. (==) Log file: "/var/log/Xorg.0.log", Time: Mon Dec 3 09:52:55 2007 (==) Using config file: "/etc/X11/xorg.conf" (==) ServerLayout "Default Layout" (**) |-->Screen "Default Screen" (0) (**) | |-->Monitor "Generic Monitor" (**) | |-->Device "ATI Technologies Inc M10 NT [FireGL Mobility T2]" (**) |-->Input Device "Generic Keyboard" (**) |-->Input Device "Configured Mouse" (**) |-->Input Device "Synaptics Touchpad" (WW) The directory "/usr/share/fonts/X11/cyrillic" does not exist. Entry deleted from font path. (==) FontPath set to: /usr/share/fonts/X11/misc, /usr/share/fonts/X11/100dpi/:unscaled, /usr/share/fonts/X11/75dpi/:unscaled, /usr/share/fonts/X11/Type1, /usr/share/fonts/X11/100dpi, /usr/share/fonts/X11/75dpi, /var/lib/defoma/x-ttcidfont-conf.d/dirs/TrueType (==) RgbPath set to "/etc/X11/rgb" (==) ModulePath set to "/usr/lib/xorg/modules" (II) Open ACPI successful (/var/run/acpid.socket) (II) Loader magic: 0x81e5140 (II) Module ABI versions: X.Org ANSI C Emulation: 0.3 X.Org Video Driver: 1.2 X.Org XInput driver : 0.7 X.Org Server Extension : 0.3 X.Org Font Renderer : 0.5 (II) Loader running on linux (II) LoadModule: "pcidata" (II) Loading /usr/lib/xorg/modules//libpcidata.so (II) Module pcidata: vendor="X.Org Foundation" compiled for 1.3.0, module version = 1.0.0 ABI class: X.Org Video Driver, version 1.2 (++) using VT number 7 (II) PCI: PCI scan (all values are in hex) (II) PCI: 00:00:0: chip 8086,3340 card 1014,0529 rev 03 class 06,00,00 hdr 00 (II) PCI: 00:01:0: chip 8086,3341 card , rev 03 class 06,04,00 hdr 01 (II) PCI: 00:1d:0: chip 8086,24c2 card 1014,052d rev 01 class 0c,03,00 hdr 80 (II) PCI: 00:1d:1: chip 8086,24c4 card 1014,052d rev 01 class 0c,03,00 hdr 00 (II) PCI: 00:1d:2: chip 8086,24c7 card 1014,052d rev 01 class 0c,03,00 hdr 00 (II) PCI: 00:1d:7: chip 8086,24cd card 1014,052e rev 01 class 0c,03,20 hdr 00 (II) PCI: 00:1e:0: chip 8086,2448 card , rev 81 class 06,04,00 hdr 01 (II) PCI: 00:1f:0: chip 8086,24cc card , rev 01 class 06,01,00 hdr 80 (II) PCI: 00:1f:1: chip 8086,24ca card 1014,052d rev 01 class 01,01,8a hdr 00 (II) PCI: 00:1f:3: chip 8086,24c3 card 1014,052d rev 01 class 0c,05,00 hdr 00 (II) PCI: 00:1f:5: chip 8086,24c5 card 1014,0537 rev 01 class 04,01,00 hdr 00 (II) PC
Processed: Re: Ack
Processing commands for [EMAIL PROTECTED]: > severity 454163 wishlist Bug#454163: "Cannot downgrade to 8.40.4 or below" Severity set to `wishlist' from `serious' > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#454163: Ack
severity 454163 whishlist retitle 454163 "Cannot downgrade to 8.40.4 or below" thanks Hi ! Yes indeed, diversion support in previous packages was rather odd to my point. However, there will be no possibility to downgrade at all when X will be moved to testing since 8.40.4 and below will not be compatible at all... Romain -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#432869: marked as done (php4-ps - FTBFS: Build depends against removed package: php4-dev)
Your message dated Mon, 03 Dec 2007 17:12:43 + with message-id <[EMAIL PROTECTED]> and subject line Bug#432869: fixed in php-ps 1.3.6-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: php4-ps Version: 1.3.5-1 Severity: serious There was an error while trying to autobuild your package: > Automatic build of php4-ps_1.3.5-1 on lxdebian.bfinv.de by sbuild/s390 98 [...] > Building dependency tree... > E: Package php4-dev has no installation candidate > Package php4-dev is not available, but is referred to by another package. > This may mean that the package is missing, has been obsoleted, or > is only available from another source > apt-get failed. > Package installation failed --- End Message --- --- Begin Message --- Source: php-ps Source-Version: 1.3.6-1 We believe that the bug you reported is fixed in the latest version of php-ps, which is due to be installed in the Debian FTP archive: php-ps_1.3.6-1.diff.gz to pool/main/p/php-ps/php-ps_1.3.6-1.diff.gz php-ps_1.3.6-1.dsc to pool/main/p/php-ps/php-ps_1.3.6-1.dsc php-ps_1.3.6.orig.tar.gz to pool/main/p/php-ps/php-ps_1.3.6.orig.tar.gz php5-ps_1.3.6-1_powerpc.deb to pool/main/p/php-ps/php5-ps_1.3.6-1_powerpc.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Uwe Steinmann <[EMAIL PROTECTED]> (supplier of updated php-ps package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Tue, 27 Nov 2007 10:14:44 + Source: php-ps Binary: php5-ps Architecture: source powerpc Version: 1.3.6-1 Distribution: unstable Urgency: low Maintainer: Uwe Steinmann <[EMAIL PROTECTED]> Changed-By: Uwe Steinmann <[EMAIL PROTECTED]> Description: php5-ps- ps module for PHP 5 Closes: 418318 432869 Changes: php-ps (1.3.6-1) unstable; urgency=low . * New upstream release * Changed name of source package to php-ps and droped php4-ps binary package * No more support for php4 (Closes: #432869, #418318) Files: 80caa07582e120e5cb7615a44597f5ef 681 web optional php-ps_1.3.6-1.dsc bb29a2a42cce8ff5f3f539eb0043aea5 635835 web optional php-ps_1.3.6.orig.tar.gz 0a066f9396c7f26d0dcab96922c66ac5 7266 web optional php-ps_1.3.6-1.diff.gz 9c87f06d6dba79cfcd0e29388dc12936 23066 web optional php5-ps_1.3.6-1_powerpc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHS+TLih2Zvw18pwERAuUgAKCejKB6sCwVRqU6Uf9p12MdQT5txACfaRUq 7PdOvNKr2to3Crout0cnBQ8= =PFUb -END PGP SIGNATURE- --- End Message ---
Bug#453632: marked as done (iceape hangs up at startup on an error box)
Your message dated Mon, 3 Dec 2007 18:26:10 +0100 with message-id <[EMAIL PROTECTED]> and subject line Bug#453632: (pas de sujet) has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: iceape Version: 1.0.11~pre071022-0etch1+lenny1 Severity: grave Justification: renders package unusable Yesterday Iceape was working perfectly but today, when trying to start iceape, It hangs up showing an error message in a window : Erreur d'analyse XML : entité non définie Emplacement : chrome://navigator/content/navigator.xul Numéro de ligne 62, Colonne 1 : 2.6.3.2.2-1 2007-11-29 11:37:07 status half-installed python-wxgtk2.6 2.6.3.2.2-1 2007-11-29 11:37:08 status unpacked python-wxgtk2.6 2.6.3.2.2-1 2007-11-29 11:37:08 status unpacked python-wxgtk2.6 2.6.3.2.2-1 2007-11-29 11:37:08 install python-wxtools 2.6.3.2.2-1 2007-11-29 11:37:08 status half-installed python-wxtools 2.6.3.2.2-1 2007-11-29 11:37:08 status unpacked python-wxtools 2.6.3.2.2-1 2007-11-29 11:37:08 status unpacked python-wxtools 2.6.3.2.2-1 2007-11-29 11:37:09 status unpacked python-wxgtk2.6 2.6.3.2.2-1 2007-11-29 11:37:10 status half-configured python-wxgtk2.6 2.6.3.2.2-1 2007-11-29 11:37:14 status installed python-wxgtk2.6 2.6.3.2.2-1 2007-11-29 11:37:14 status unpacked python-wxtools 2.6.3.2.2-1 2007-11-29 11:37:14 status half-configured python-wxtools 2.6.3.2.2-1 2007-11-29 11:37:15 status installed python-wxtools 2.6.3.2.2-1 -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.8-3-686-smp (SMP w/1 CPU core) Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) (ignored: LC_ALL set to [EMAIL PROTECTED]) Shell: /bin/sh linked to /bin/bash Versions of packages iceape depends on: ii iceape-br 1.0.11~pre071022-0etch1+lenny1 Iceape Navigator (Internet browser ii iceape-ma 1.0.11~pre071022-0etch1+lenny1 Iceape Mail & Newsgroups and Addre Versions of packages iceape recommends: pn iceape-chatzilla (no description available) -- no debconf information -- Ce message a été vérifié par MailScanner pour des virus ou des polluriels et rien de suspect n'a été trouvé. For all your IT requirements visit: http://www.transtec.co.uk --- End Message --- --- Begin Message --- On Mon, Dec 03, 2007 at 09:23:02AM +0100, [EMAIL PROTECTED] wrote: > I've found a workaround : > I started iceape on profile manager, created a new profile, then started > with this profile without any problem, then I restarted with my previous > profile, which worked without problem, so I removed the new profile and now > everything is ok ;) So this looks like it was a XUL.mfasl problem, in the end... Mike --- End Message ---
Bug#418318: marked as done (Don't build a php4-specific package because of php4's removal)
Your message dated Mon, 03 Dec 2007 17:12:43 + with message-id <[EMAIL PROTECTED]> and subject line Bug#418318: fixed in php-ps 1.3.6-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: php4 Severity: serious PHP 4 should not be included in Lenny, which would require to support it at least until 2011. Cheers, Moritz -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-4-686 Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) --- End Message --- --- Begin Message --- Source: php-ps Source-Version: 1.3.6-1 We believe that the bug you reported is fixed in the latest version of php-ps, which is due to be installed in the Debian FTP archive: php-ps_1.3.6-1.diff.gz to pool/main/p/php-ps/php-ps_1.3.6-1.diff.gz php-ps_1.3.6-1.dsc to pool/main/p/php-ps/php-ps_1.3.6-1.dsc php-ps_1.3.6.orig.tar.gz to pool/main/p/php-ps/php-ps_1.3.6.orig.tar.gz php5-ps_1.3.6-1_powerpc.deb to pool/main/p/php-ps/php5-ps_1.3.6-1_powerpc.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Uwe Steinmann <[EMAIL PROTECTED]> (supplier of updated php-ps package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Tue, 27 Nov 2007 10:14:44 + Source: php-ps Binary: php5-ps Architecture: source powerpc Version: 1.3.6-1 Distribution: unstable Urgency: low Maintainer: Uwe Steinmann <[EMAIL PROTECTED]> Changed-By: Uwe Steinmann <[EMAIL PROTECTED]> Description: php5-ps- ps module for PHP 5 Closes: 418318 432869 Changes: php-ps (1.3.6-1) unstable; urgency=low . * New upstream release * Changed name of source package to php-ps and droped php4-ps binary package * No more support for php4 (Closes: #432869, #418318) Files: 80caa07582e120e5cb7615a44597f5ef 681 web optional php-ps_1.3.6-1.dsc bb29a2a42cce8ff5f3f539eb0043aea5 635835 web optional php-ps_1.3.6.orig.tar.gz 0a066f9396c7f26d0dcab96922c66ac5 7266 web optional php-ps_1.3.6-1.diff.gz 9c87f06d6dba79cfcd0e29388dc12936 23066 web optional php5-ps_1.3.6-1_powerpc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHS+TLih2Zvw18pwERAuUgAKCejKB6sCwVRqU6Uf9p12MdQT5txACfaRUq 7PdOvNKr2to3Crout0cnBQ8= =PFUb -END PGP SIGNATURE- --- End Message ---
Processed: found 454167 in 1.1-1
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.11 > found 454167 1.1-1 Bug#454167: sing: privilege escalation leading to root access when installed with suid 0 Bug marked as found in version 1.1-1. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#454167: priviledge escalation leading to root access when installed with suid 0
Package: sing Version: 1.1-15 Severity: critical Tags: security Hi, Please have a look at: http://www.securityfocus.com/archive/1/484472 This is really a critical thing if sing was installed with suid 0 it allows every user on the system to get root access and/or to overwrite arbitrary files. Please fix. A CVE id for this issue is pending, I'll add it to this bug report if I got it. Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. pgpeamSApLMrV.pgp Description: PGP signature
Bug#454164: Upstream
severity 454164 important thanks Hi ! Upstream has dropped support for those cards, there's not much I can do... Romain -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#453934: kvm-source: emulation failed (pagetable)
> I can't repoduce the problem here. Windows XP and Linux guests work ok. On my other box @work (Core2Duo based and complete debian x86_64) it is OK and I can't reproduce it there. > What are the details of your host system? CPU (/proc/cpuinfo), kernel, > Mainboard/BIOS? bastian:~# cat /proc/cpuinfo processor : 0 vendor_id : AuthenticAMD cpu family : 15 model : 75 model name : AMD Athlon(tm) 64 X2 Dual Core Processor 3800+ stepping: 2 cpu MHz : 2009.259 cache size : 512 KB physical id : 0 siblings: 2 core id : 0 cpu cores : 2 fpu : yes fpu_exception : yes cpuid level : 1 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt rdtscp lm 3dnowext 3dnow pni cx16 lahf_lm cmp_legacy svm extapic cr8_legacy bogomips: 4021.62 TLB size: 1024 4K pages clflush size: 64 cache_alignment : 64 address sizes : 40 bits physical, 48 bits virtual power management: ts fid vid ttp tm stc [Second Core Snipped] bastian:~# uname -a Linux bastian 2.6.22-3-amd64 #1 SMP Mon Nov 12 10:28:43 UTC 2007 x86_64 GNU/Linux (Unmodified from debian.org) Mainboard is an Asus M2N-E BIOS Version was 0402 and is now 1202 with same result All Packets are from debian.org and debian-multimedia.org -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#452872: marked as done (libxml-sax-perl: testfiles/xmltest.xml is non-free)
Your message dated Mon, 03 Dec 2007 17:17:06 + with message-id <[EMAIL PROTECTED]> and subject line Bug#452872: fixed in libxml-sax-perl 0.16+dfsg-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: libxml-sax-perl Version: 0.16-0.1 Severity: serious The file 'testfiles/xmltest.xml' in the source package is non-free. The copyright notice is: Copyright 1998-1999 by Sun Microsystems, Inc. All Rights Reserved. with no information on a license for redistribution or modification. The file seems to originate in the OASIS XML conformance test suite. It's a slightly modified version of the one inside a tarball found at http://www.oasis-open.org/committees/xml-conformance/suite-v1se/xmlconf-20010315.tar.gz with a readme.html file in the same directory stating: Copyright (C) 1998 James Clark. All rights reserved. Permission is granted to copy and modify this collection in any way for internal use within a company or organization. Permission is granted to redistribute the file xmltest.zip containing this collection to third parties provided that no modifications of any kind are made to this file. Note that permission to distribute the collection in any other form is not granted. The rest of the test suite is not included in libxml-sax-perl; this file seems to be just an example of a large XML document. It should be trivial to remove or replace with another one. Cheers, -- Niko Tyni [EMAIL PROTECTED] --- End Message --- --- Begin Message --- Source: libxml-sax-perl Source-Version: 0.16+dfsg-1 We believe that the bug you reported is fixed in the latest version of libxml-sax-perl, which is due to be installed in the Debian FTP archive: libxml-sax-perl_0.16+dfsg-1.diff.gz to pool/main/libx/libxml-sax-perl/libxml-sax-perl_0.16+dfsg-1.diff.gz libxml-sax-perl_0.16+dfsg-1.dsc to pool/main/libx/libxml-sax-perl/libxml-sax-perl_0.16+dfsg-1.dsc libxml-sax-perl_0.16+dfsg-1_all.deb to pool/main/libx/libxml-sax-perl/libxml-sax-perl_0.16+dfsg-1_all.deb libxml-sax-perl_0.16+dfsg.orig.tar.gz to pool/main/libx/libxml-sax-perl/libxml-sax-perl_0.16+dfsg.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Niko Tyni <[EMAIL PROTECTED]> (supplier of updated libxml-sax-perl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Tue, 27 Nov 2007 21:13:59 +0200 Source: libxml-sax-perl Binary: libxml-sax-perl Architecture: source all Version: 0.16+dfsg-1 Distribution: experimental Urgency: low Maintainer: Debian Perl Group <[EMAIL PROTECTED]> Changed-By: Niko Tyni <[EMAIL PROTECTED]> Description: libxml-sax-perl - Perl module for using and building Perl SAX2 XML processors Closes: 229178 240356 295398 332440 420867 430118 441473 452872 Changes: libxml-sax-perl (0.16+dfsg-1) experimental; urgency=low . [ Niko Tyni ] * New maintainer: Debian Perl Group + leave Jay Bonci in the Uploaders field. * Acknowledge NMUs. (Closes: #441473) * Add support for SAX parser priorities. + lower the XML::SAX::PurePerl priority so that it will not be the default parser anymore if any others are available. (Closes: #430118) * Move the /etc/perl/XML/SAX/ParserDetails.d directory under /var/lib/libxml-sax-perl, since it's not really configuration data. * Use ucf to manage local changes to /etc/perl/XML/SAX/ParserDetails.ini. * Remove the pre-sarge preinst cleanup of /etc/XML and /etc/perl/SAX introduced in 0.12-3. + Now survives systems with a leftover symlink /etc/perl/XML -> . (Closes: #240356) * Point to the compressed file in XML::SAX::save_parsers(). (Closes: #332440) * Recommend libxml-sax-expat-perl and explain this in the package description. (Closes: #420867) * Upgrade to debhelper compatibility level 5. * Upgrade to Standards-Version 3.7.2. No changes needed. * Don't install the upstream README file, there's no information in it. * Update debian/copyright. * Add explanations in the examples to clarify why they look like stray maintainer scripts. (Closes: #295398)
Bug#430118: marked as done (update-perl-sax-parsers: Depends on filesystem ordering to determine default parser)
Your message dated Mon, 03 Dec 2007 17:17:06 + with message-id <[EMAIL PROTECTED]> and subject line Bug#430118: fixed in libxml-sax-perl 0.16+dfsg-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: libxml-sax-perl Version: 0.14-0.1 Severity: serious X-Debbugs-CC: Florian Ragwitz <[EMAIL PROTECTED]> Blocks: 425928, 429902 As the subject says: update-perl-sax-parsers depends on the filesystem ordering of entries in /etc/perl/XML/SAX/ParserDetails.d to determine the order it puts entries in /etc/perl/XML/SAX/ParserDetails.ini, and the last entry in that file appears to be the one interpreted as the default parser. On new installations, or installations upgraded to enable the dir_index option on the root ext3 filesystem, this means that XML::SAX::PurePerl always ends up being the default parser, which almost certainly isn't what was intended. See e.g. #425928 and #429902 for the results of this bug, especially with XML::SAX::PurePerl broken as it is right now. My proposed fix is to assign a priority to each parser and either have update-perl-sax-parsers use that to determine an ordering, or have whatever code determines the default parser find the maximum priority parser. I'm CC'ing the libxml-libxml-perl maintainer for a heads up on this issue. --- End Message --- --- Begin Message --- Source: libxml-sax-perl Source-Version: 0.16+dfsg-1 We believe that the bug you reported is fixed in the latest version of libxml-sax-perl, which is due to be installed in the Debian FTP archive: libxml-sax-perl_0.16+dfsg-1.diff.gz to pool/main/libx/libxml-sax-perl/libxml-sax-perl_0.16+dfsg-1.diff.gz libxml-sax-perl_0.16+dfsg-1.dsc to pool/main/libx/libxml-sax-perl/libxml-sax-perl_0.16+dfsg-1.dsc libxml-sax-perl_0.16+dfsg-1_all.deb to pool/main/libx/libxml-sax-perl/libxml-sax-perl_0.16+dfsg-1_all.deb libxml-sax-perl_0.16+dfsg.orig.tar.gz to pool/main/libx/libxml-sax-perl/libxml-sax-perl_0.16+dfsg.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Niko Tyni <[EMAIL PROTECTED]> (supplier of updated libxml-sax-perl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Tue, 27 Nov 2007 21:13:59 +0200 Source: libxml-sax-perl Binary: libxml-sax-perl Architecture: source all Version: 0.16+dfsg-1 Distribution: experimental Urgency: low Maintainer: Debian Perl Group <[EMAIL PROTECTED]> Changed-By: Niko Tyni <[EMAIL PROTECTED]> Description: libxml-sax-perl - Perl module for using and building Perl SAX2 XML processors Closes: 229178 240356 295398 332440 420867 430118 441473 452872 Changes: libxml-sax-perl (0.16+dfsg-1) experimental; urgency=low . [ Niko Tyni ] * New maintainer: Debian Perl Group + leave Jay Bonci in the Uploaders field. * Acknowledge NMUs. (Closes: #441473) * Add support for SAX parser priorities. + lower the XML::SAX::PurePerl priority so that it will not be the default parser anymore if any others are available. (Closes: #430118) * Move the /etc/perl/XML/SAX/ParserDetails.d directory under /var/lib/libxml-sax-perl, since it's not really configuration data. * Use ucf to manage local changes to /etc/perl/XML/SAX/ParserDetails.ini. * Remove the pre-sarge preinst cleanup of /etc/XML and /etc/perl/SAX introduced in 0.12-3. + Now survives systems with a leftover symlink /etc/perl/XML -> . (Closes: #240356) * Point to the compressed file in XML::SAX::save_parsers(). (Closes: #332440) * Recommend libxml-sax-expat-perl and explain this in the package description. (Closes: #420867) * Upgrade to debhelper compatibility level 5. * Upgrade to Standards-Version 3.7.2. No changes needed. * Don't install the upstream README file, there's no information in it. * Update debian/copyright. * Add explanations in the examples to clarify why they look like stray maintainer scripts. (Closes: #295398) * Various improvements in debian/rules. + remove generated files in the 'clean' target. * Update debian/watch. * Move the examples under debian/, the
Processed: retitle 454167 to sing: privilege escalation leading to root access when installed with suid 0
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.11 > retitle 454167 sing: privilege escalation leading to root access when > installed with suid 0 Bug#454167: priviledge escalation leading to root access when installed with suid 0 Changed Bug title to `sing: privilege escalation leading to root access when installed with suid 0' from `priviledge escalation leading to root access when installed with suid 0'. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#454170: pidgin-libnotify: Crashes new pidgin
Package: pidgin-libnotify Version: 0.12-4 Severity: grave Justification: renders package unusable -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 This plug-in causes Pidgin 2.3.0 to crash on incoming messages that open a new window (which is the situation for which I have configured libnotify to display the notification). - -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.23.9 Locale: LANG=es_AR.UTF-8, LC_CTYPE=es_AR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages pidgin-libnotify depends on: ii libatk1.0-0 1.20.0-1 The ATK accessibility toolkit ii libc6 2.7-2 GNU C Library: Shared libraries ii libcairo2 1.4.10-1 The Cairo 2D vector graphics libra ii libdbus-1-3 1.1.2-1simple interprocess messaging syst ii libdbus-glib-1-2 0.74-1 simple interprocess messaging syst ii libfontconfig12.5.0-1generic font configuration library ii libglib2.0-0 2.14.4-1 The GLib library of C routines ii libgtk2.0-0 2.12.2-1 The GTK+ graphical user interface ii libnotify10.4.4-3sends desktop notifications to a n ii libpango1.0-0 1.18.3-1 Layout and rendering of internatio hi libx11-6 2:1.0.3-7 X11 client-side library ii libxcursor1 1:1.1.9-1 X cursor management library ii libxext6 1:1.0.3-2 X11 miscellaneous extension librar ii libxfixes31:4.0.3-2 X11 miscellaneous 'fixes' extensio ii libxi62:1.1.3-1 X11 Input extension library ii libxinerama1 1:1.0.2-1 X11 Xinerama extension library ii libxrandr22:1.2.2-1 X11 RandR extension library ii libxrender1 1:0.9.4-1 X Rendering Extension client libra ii pidgin2.3.0-1graphical multi-protocol instant m pidgin-libnotify recommends no packages. - -- no debconf information -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHVD+o823633cP2P8RAodnAJ47Gf62zjQRegX681v9Jwabhej3tACcD1RA KCjhMmWu83O5J+iI/i8JEv4= =K/Sy -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#453202: marked as done (gdb: FTBFS: make[4]: Nothing to be done for `info-am'.)
Your message dated Mon, 03 Dec 2007 17:47:05 + with message-id <[EMAIL PROTECTED]> and subject line Bug#453202: fixed in gdb 6.7.1-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: gdb version: 6.6.dfsg.90.20070912-1 Severity: serious User: [EMAIL PROTECTED] Usertags: qa-ftbfs-20071126 qa-ftbfs Justification: FTBFS on i386 Hi, During a rebuild of all packages in sid, your package failed to build on i386. Relevant part: > make[4]: Entering directory `/build/user/gdb-6.6.dfsg.90.20070912/objdir/bfd' > make[4]: Nothing to be done for `info-am'. > make[4]: Leaving directory `/build/user/gdb-6.6.dfsg.90.20070912/objdir/bfd' > make[3]: *** [info-recursive] Error 1 > make[3]: Leaving directory `/build/user/gdb-6.6.dfsg.90.20070912/objdir/bfd' > make[2]: *** [all-bfd] Error 2 > make[2]: Leaving directory `/build/user/gdb-6.6.dfsg.90.20070912/objdir' > make[1]: *** [all] Error 2 > make[1]: Leaving directory `/build/user/gdb-6.6.dfsg.90.20070912/objdir' > make: *** [debian/stamp-makefile-build] Error 2 > dpkg-buildpackage: failure: debian/rules build gave error exit status 2 The full build log is available from: http://people.debian.org/~lucas/logs/2007/11/26 A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! About the archive rebuild: The rebuild was done on about 50 AMD64 nodes of the Grid'5000 platform, using a clean chroot containing a sid i386 environment. Internet was not accessible from the build systems. -- | Lucas Nussbaum | [EMAIL PROTECTED] http://www.lucas-nussbaum.net/ | | jabber: [EMAIL PROTECTED] GPG: 1024D/023B3F4F | --- End Message --- --- Begin Message --- Source: gdb Source-Version: 6.7.1-1 We believe that the bug you reported is fixed in the latest version of gdb, which is due to be installed in the Debian FTP archive: gdb_6.7.1-1.diff.gz to pool/main/g/gdb/gdb_6.7.1-1.diff.gz gdb_6.7.1-1.dsc to pool/main/g/gdb/gdb_6.7.1-1.dsc gdb_6.7.1-1_amd64.deb to pool/main/g/gdb/gdb_6.7.1-1_amd64.deb gdb_6.7.1.orig.tar.gz to pool/main/g/gdb/gdb_6.7.1.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Daniel Jacobowitz <[EMAIL PROTECTED]> (supplier of updated gdb package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 03 Dec 2007 10:12:27 -0500 Source: gdb Binary: gdb64 gdb Architecture: source amd64 Version: 6.7.1-1 Distribution: unstable Urgency: low Maintainer: Daniel Jacobowitz <[EMAIL PROTECTED]> Changed-By: Daniel Jacobowitz <[EMAIL PROTECTED]> Description: gdb- The GNU Debugger Closes: 254270 414887 443080 453202 Changes: gdb (6.7.1-1) unstable; urgency=low . * New upstream release. - Correct makeinfo version check (Closes: #453202). * Merge Ubuntu support for a gdb64 package (Closes: #254270). * Run the testsuite on all GNU/Linux platforms. * Remove old support for skipping thread tests. * Add an expat build dependency and add --with-expat. * Update copyright notice. * Do not freeze on division by zero (Closes: #414887). * Rewrite HPPA kernel offsets patch to support HPPA64. * Include Vladimir Prus's varobj fix for kdevelop (Closes: #443080). Files: 23b409424b97b43e81507932ebf02867 1468 devel optional gdb_6.7.1-1.dsc 65943c9c436e604906bf813af57248cf 18876645 devel optional gdb_6.7.1.orig.tar.gz c6f18e8f07a2deb7226ac10ab9389ba2 31970 devel optional gdb_6.7.1-1.diff.gz 7b20ca9304e1ea6d9055f119d478784c 2932850 devel optional gdb_6.7.1-1_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHVD8kbgOPXuCjg3cRAiM+AKCwAOi/rnHMU/wro6+YoiGfZZEm4ACgumsw VZsBTs6TYo891PATus1VQBY= =7O+2 -END PGP SIGNATURE- --- End Message ---
Bug#454171: pidgin-otr: Crashes new pidgin
Package: pidgin-otr Version: 3.1.0-1 Severity: grave Justification: renders package unusable -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 This plug-in crashes Pidgin 2.3.0 when loaded and an incoming message starts a new conversation, even if no crypto is involved. I can reproduce this every time with MSN, although Gadu-Gadu seems to not be affected. - -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.23.9 Locale: LANG=es_AR.UTF-8, LC_CTYPE=es_AR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages pidgin-otr depends on: ii libc6 2.7-2 GNU C Library: Shared libraries ii libgcrypt11 1.2.4-2LGPL Crypto library - runtime libr ii libotr2 3.1.0-1Off-the-Record Messaging library ii pidgin2.3.0-1graphical multi-protocol instant m pidgin-otr recommends no packages. - -- no debconf information -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHVD/9823633cP2P8RAvCYAJ9PL5Yo9Ve8xRvIgPa8+xByfVWO1ACfdhJj /11ZyLDWvA6cVJJFxgLaTJo= =lBDv -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#453795: am-utils: FTBFS: dpkg-shlibdeps: failure: no dependency information found for debian/libamu4/usr/lib/libamu.so.4 (used by debian/am-utils/usr/sbin/amd).
On Sat, 2007-12-01 at 09:51 +0100, Lucas Nussbaum wrote: > Package: am-utils > version: 6.1.5-7 > Severity: serious > User: [EMAIL PROTECTED] > Usertags: qa-ftbfs-20071130 qa-ftbfs > Justification: FTBFS on i386 > > Hi, > > During a rebuild of all packages in sid, your package failed to build on i386. FWIW, am-utils is also failing to build on powerpc: http://people.debian.org/~damog/powerpc/build-logs/am-utils_6.1.5-7-sid-powerpc-20071203-000801.182.log -- David Moreno Garza <[EMAIL PROTECTED]> | http://www.damog.net/ We're gonna rock this motherfucker like three the hard way! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#445861: 445861: HAL problem
Thanks to everyone who tracked down and fixed this problem. HAL's a pretty basic component; it's good to have it back in action. Ross Boylan -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#446988: must compile -fno-strict-aliasing
On Thu, Nov 22, 2007 at 10:15:45AM -0400, Jose Luis Rivas Contreras wrote: > Hi Kurt & Dean, > > I'm checking right now this issue, I haven't get it and I'm using > amd64... Maybe it's related to the gcc version? I will check this > further trying to get the error. I've used upstream version 0.11.9 since 2 days ago, and it's been running without problems so far. I never ran this long with 0.11.8. Kurt -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#454179: (no subject)
Jürgen Richtsfeld schrieb: > Package: kdesvn > Version: 0.14.1-1 > Severity: serious > > --- Please enter the report below this line. --- > Whenever I start kdesvn I get > Bus error > (when starting from command line). I hope the strace output helps (find it at > http://juergen.inimeo.at/strace_kdesvn.gz ) Hi Jürgen, could you please test, if you get this error with a new/clean user account? A backtrace from a debug build would be very helpful, I can provide you with instructions, how to do it, if you need them. Cheers, Michael -- Why is it that all of the instruments seeking intelligent life in the universe are pointed away from Earth? signature.asc Description: OpenPGP digital signature
Bug#454179: (no subject)
Package: kdesvn Version: 0.14.1-1 Severity: serious --- Please enter the report below this line. --- Whenever I start kdesvn I get Bus error (when starting from command line). I hope the strace output helps (find it at http://juergen.inimeo.at/strace_kdesvn.gz ) --- System information. --- Architecture: amd64 Kernel: Linux 2.6.22-5-1 Debian Release: lenny/sid 500 unstablewww.debian-multimedia.org 500 unstablemi.mirror.garr.it 500 unstableftp.tuke.sk 500 unstableftp.debian.org 500 unstableftp.at.debian.org 500 unstabledebian.inode.at --- Package information. --- Depends (Version) | Installed =-+-=== kdelibs4c2a(>= 4:3.5.8-1) | 4:3.5.8.dfsg.1-4 libapr1 | 1.2.11-1 libaprutil1 | 1.2.7+dfsg-2+b1 libc6(>= 2.6.1-1) | 2.7-3 libgcc1 (>= 1:4.2.1) | 1:4.2.2-4 libice6 (>= 1:1.0.0) | 2:1.0.4-1 libqt3-mt(>= 3:3.3.7) | 3:3.3.7-9 libsm6| 2:1.0.3-1+b1 libstdc++6 (>= 4.2.1) | 4.2.2-4 libsvn1 (>= 1.4) | 1.4.4dfsg1-1 libsvnqt4 | 0.14.1-1 libuuid1 | 1.40.2-1 libx11-6 | 2:1.0.3-7 libxext6 | 1:1.0.3-2 kdesvn-kio-plugins (= 0.14.1-1) | 0.14.1-1 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#454136: [Pkg-mono-group] Bug#454136: Bug#454136: libmono-addins0.2-cil: Tomboy crashes due to absent Mono.Addins 0.2.0.0 assembly
[slomo: can you confirm this problem?] Seems to be some special case, for a me a package remove and then package install, installs the needed policy file. See here: [EMAIL PROTECTED]:~$ gacutil -l policy.0.2.Mono.Addins The following assemblies are installed into the GAC: Number of items = 0 [EMAIL PROTECTED]:~$ sudo apt-get install libmono-addins0.2-cil Reading package lists... Done Building dependency tree Reading state information... Done The following packages were automatically installed and are no longer required: linux-headers-2.6.22-2 libexempi2 libavahi-ui0 linux-headers-2.6.22-2-686 Use 'apt-get autoremove' to remove them. The following NEW packages will be installed: libmono-addins0.2-cil 0 upgraded, 1 newly installed, 0 to remove and 3 not upgraded. Need to get 0B/111kB of archives. After unpacking 418kB of additional disk space will be used. Selecting previously deselected package libmono-addins0.2-cil. (Reading database ... 231895 files and directories currently installed.) Unpacking libmono-addins0.2-cil (from .../libmono-addins0.2-cil_0.3~svn.r90520-1_all.deb) ... Setting up libmono-addins0.2-cil (0.3~svn.r90520-1) ... * Installing 2 assemblies from libmono-addins0.2-cil into Mono [EMAIL PROTECTED]:~$ gacutil -l policy.0.2.Mono.Addins The following assemblies are installed into the GAC: policy.0.2.Mono.Addins, Version=0.0.0.0, Culture=neutral, PublicKeyToken=0738eb9f132ed756 Number of items = 1 [EMAIL PROTECTED]:~$ -- Regards, Mirco 'meebey' Bauer PGP-Key ID: 0xEEF946C8 FOSS Developer[EMAIL PROTECTED] http://www.meebey.net/ PEAR Developer[EMAIL PROTECTED] http://pear.php.net/ Debian Developer [EMAIL PROTECTED] http://www.debian.org/ signature.asc Description: This is a digitally signed message part
Processed (with 1 errors): Re: [Pkg-mono-group] Bug#454136: Bug#454136: libmono-addins0.2-cil: Tomboy crashes due to absent Mono.Addins 0.2.0.0 assembly
Processing commands for [EMAIL PROTECTED]: > tags 454136 + verified Unknown tag/s: verified. Recognized are: patch wontfix moreinfo unreproducible fixed potato woody sid help security upstream pending sarge sarge-ignore experimental d-i confirmed ipv6 lfs fixed-in-experimental fixed-upstream l10n etch etch-ignore lenny lenny-ignore. Bug#454136: libmono-addins0.2-cil: Tomboy crashes due to absent Mono.Addins 0.2.0.0 assembly There were no tags set. Tags added: > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#454136: [Pkg-mono-group] Bug#454136: Bug#454136: libmono-addins0.2-cil: Tomboy crashes due to absent Mono.Addins 0.2.0.0 assembly
tags 454136 + verified thanks Ok, I found the issue. The installer script (/usr/share/cli-common/policy-install) is in the wrong package (cli-common-dev). That policy-install script must be in the cli-common package, as that's for runtime management. I will fix this with a cli-common 0.5.0.1 upload. -- Regards, Mirco 'meebey' Bauer PGP-Key ID: 0xEEF946C8 FOSS Developer[EMAIL PROTECTED] http://www.meebey.net/ PEAR Developer[EMAIL PROTECTED] http://pear.php.net/ Debian Developer [EMAIL PROTECTED] http://www.debian.org/ signature.asc Description: This is a digitally signed message part
Processed: retitle 454179 to kdesvn killed by SIGBUS
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.11 > retitle 454179 kdesvn killed by SIGBUS Bug#454179: (no subject) Changed Bug title to `kdesvn killed by SIGBUS' from `(no subject)'. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: setting tags
Processing commands for [EMAIL PROTECTED]: > tags 454136 + confirmed pending sid Bug#454136: libmono-addins0.2-cil: Tomboy crashes due to absent Mono.Addins 0.2.0.0 assembly There were no tags set. Tags added: confirmed, pending, sid > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#453169: marked as done (ruby-gnome2: FTBFS: rbpoppler-page.c:113: error: incompatible type for argument 2 of 'poppler_page_get_text')
Your message dated Mon, 03 Dec 2007 19:44:13 + with message-id <[EMAIL PROTECTED]> and subject line Bug#453169: fixed in ruby-gnome2 0.16.0-9 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: ruby-gnome2 version: 0.16.0-8 Severity: serious User: [EMAIL PROTECTED] Usertags: qa-ftbfs-20071126 qa-ftbfs Justification: FTBFS on i386 Hi, During a rebuild of all packages in sid, your package failed to build on i386. Relevant part: > make[3]: Entering directory `/build/user/ruby-gnome2-0.16.0/poppler/src' > cc -I. -I/build/user/ruby-gnome2-0.16.0/glib/src -I. > -I/usr/lib/ruby/1.8/i486-linux -I.././poppler -DHAVE_RB_DEFINE_ALLOC_FUNC > -DHAVE_RB_BLOCK_PROC -DHAVE_OBJECT_ALLOCATE -DHAVE_NODE_ATTRASGN > -DHAVE_RB_CAIRO_H -DHAVE_POPPLER_PAGE_RENDER_SELECTION_TO_PIXBUF > -DRUBY_POPPLER_COMPILATION -I/usr/local/lib/site_ruby/1.8/i486-linux -fPIC > -g -Wall -O2 -Wall -I/usr/include/poppler/glib -I/usr/include/poppler > -I/usr/include/gtk-2.0 -I/usr/lib/gtk-2.0/include -I/usr/include/cairo > -I/usr/include/glib-2.0 -I/usr/lib/glib-2.0/include -I/usr/include/pango-1.0 > -I/usr/include/freetype2 -I/usr/include/libpng12 -I/usr/include/cairo > -I/usr/include/freetype2 -I/usr/include/libpng12-c rbpoppler-page.c > rbpoppler-page.c: In function 'page_get_text': > rbpoppler-page.c:113: error: incompatible type for argument 2 of > 'poppler_page_get_text' > rbpoppler-page.c:113: error: too few arguments to function > 'poppler_page_get_text' > rbpoppler-page.c: In function 'page_get_selection_region': > rbpoppler-page.c:129: error: incompatible type for argument 3 of > 'poppler_page_get_selection_region' > rbpoppler-page.c:129: error: too few arguments to function > 'poppler_page_get_selection_region' > rbpoppler-page.c: In function 'page_render_selection': > rbpoppler-page.c:149: error: incompatible type for argument 5 of > 'poppler_page_render_selection' > rbpoppler-page.c:149: error: too few arguments to function > 'poppler_page_render_selection' > rbpoppler-page.c: In function 'page_render_selection_to_pixbuf': > rbpoppler-page.c:174: error: incompatible type for argument 7 of > 'poppler_page_render_selection_to_pixbuf' > rbpoppler-page.c:174: error: too few arguments to function > 'poppler_page_render_selection_to_pixbuf' > make[3]: *** [rbpoppler-page.o] Error 1 > make[3]: Leaving directory `/build/user/ruby-gnome2-0.16.0/poppler/src' > make[2]: *** [all] Error 2 > make[2]: Leaving directory `/build/user/ruby-gnome2-0.16.0/poppler' > Building of poppler failed. > make[1]: *** [all] Error 1 > make[1]: Leaving directory `/build/user/ruby-gnome2-0.16.0' > make: *** [common-build-arch] Error 2 > dpkg-buildpackage: failure: debian/rules build gave error exit status 2 The full build log is available from: http://people.debian.org/~lucas/logs/2007/11/26 A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! About the archive rebuild: The rebuild was done on about 50 AMD64 nodes of the Grid'5000 platform, using a clean chroot containing a sid i386 environment. Internet was not accessible from the build systems. -- | Lucas Nussbaum | [EMAIL PROTECTED] http://www.lucas-nussbaum.net/ | | jabber: [EMAIL PROTECTED] GPG: 1024D/023B3F4F | --- End Message --- --- Begin Message --- Source: ruby-gnome2 Source-Version: 0.16.0-9 We believe that the bug you reported is fixed in the latest version of ruby-gnome2, which is due to be installed in the Debian FTP archive: libart2-ruby1.8_0.16.0-9_amd64.deb to pool/main/r/ruby-gnome2/libart2-ruby1.8_0.16.0-9_amd64.deb libart2-ruby_0.16.0-9_all.deb to pool/main/r/ruby-gnome2/libart2-ruby_0.16.0-9_all.deb libatk1-ruby1.8_0.16.0-9_amd64.deb to pool/main/r/ruby-gnome2/libatk1-ruby1.8_0.16.0-9_amd64.deb libatk1-ruby_0.16.0-9_all.deb to pool/main/r/ruby-gnome2/libatk1-ruby_0.16.0-9_all.deb libgconf2-ruby1.8_0.16.0-9_amd64.deb to pool/main/r/ruby-gnome2/libgconf2-ruby1.8_0.16.0-9_amd64.deb libgconf2-ruby_0.16.0-9_all.deb to pool/main/r/ruby-gnome2/libgconf2-ruby_0.16.0-9_all.deb libgdk-pixbuf2-ruby1.8_0.16.0-9_amd64.deb to pool/main/r/ruby-gnome2/libgdk-pixbuf2-ruby1.8_0.16.0-9_amd64.deb libgdk-pixbuf2-ruby_0.16.0-9_all.deb to pool/main/r/ruby-gnome2/libgdk-pixbuf2-ruby_0.16.0-9_all.deb libglade2-ruby1.8_0.16.0-9_amd64.deb to pool/main/r/ruby-gnome2/libglade2-ruby1.8_0.16.0-9_amd64.deb libglade2-ruby_0.16.0-9_all.de
Bug#454184: liferea: "Segmentation fault" during startup on lenny
Package: liferea Version: 1.0.27-2 Severity: grave Justification: renders package unusable Below please find tail of output produced by liferea --debug-all --debug-verbose TRACE: + update_request_new TRACE: - update_request_new TRACE: - feedlist_auto_update GUI: Setting threePane mode: off UPDATE: download result - HTTP status: 200, error: 0, netio error:0, data: 138812600 UPDATE: request finished UPDATE: waiting for request... UPDATE: processing received request (http://art.gnome.org/backend.php) UPDATE: downloading http://art.gnome.org/backend.php GUI: Setting threePane mode: off Segmentation fault -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.22-3-686 (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages liferea depends on: ii dbus [dbus-1-utils] 1.1.1-3 simple interprocess messaging syst ii gconf2 2.20.1-1 GNOME configuration database syste ii libatk1.0-0 1.20.0-1 The ATK accessibility toolkit ii libc6 2.6.1-1+b1 GNU C Library: Shared libraries ii libcairo2 1.4.10-1 The Cairo 2D vector graphics libra ii libdbus-1-3 1.1.1-3 simple interprocess messaging syst ii libdbus-glib-1-20.74-1 simple interprocess messaging syst ii libfontconfig1 2.4.2-1.2generic font configuration library ii libgconf2-4 2.20.1-1 GNOME configuration database syste ii libglib2.0-02.14.3-1 The GLib library of C routines ii libgtk2.0-0 2.12.1-1 The GTK+ graphical user interface ii libice6 2:1.0.4-1X11 Inter-Client Exchange library ii liborbit2 1:2.14.7-0.1 libraries for ORBit2 - a CORBA ORB ii libpango1.0-0 1.18.3-1 Layout and rendering of internatio ii libsm6 2:1.0.3-1+b1 X11 Session Management library ii libx11-62:1.0.3-7X11 client-side library ii libxcursor1 1:1.1.9-1X cursor management library ii libxext61:1.0.3-2X11 miscellaneous extension librar ii libxfixes3 1:4.0.3-2X11 miscellaneous 'fixes' extensio ii libxi6 2:1.1.3-1X11 Input extension library ii libxinerama11:1.0.2-1X11 Xinerama extension library ii libxml2 2.6.30.dfsg-2GNOME XML library ii libxrandr2 2:1.2.2-1X11 RandR extension library ii libxrender1 1:0.9.4-1X Rendering Extension client libra ii liferea-xulrunner 1.0.27-2 xulrunner-based rendering library ii zlib1g 1:1.2.3.3.dfsg-6 compression library - runtime liferea recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#453689: marked as done (ruby-gnome2: CVE-2007-6183 format string vulnerability)
Your message dated Mon, 03 Dec 2007 19:44:13 + with message-id <[EMAIL PROTECTED]> and subject line Bug#453689: fixed in ruby-gnome2 0.16.0-10 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: ruby-gnome2 Version: 0.12.0-2 Severity: grave Tags: security patch Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for ruby-gnome2. CVE-2007-6183[0]: | Format string vulnerability in the mdiag_initialize function in | gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN | versions before 20071127, allows context-dependent attackers to execute | arbitrary code via format string specifiers in the message parameter. until now this seems to be reserved, in the meantime check: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6183 instead of the mitre site. A patch for this can be found on: http://ruby-gnome2.svn.sourceforge.net/viewvc/ruby-gnome2/ruby-gnome2/trunk/gtk/src/rbgtkmessagedialog.c?r1=2275&r2=2720&view=patch If you fix this vulnerability please also include the CVE id in your changelog entry. For further information: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6183 Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. pgp28g2HqyRQ3.pgp Description: PGP signature --- End Message --- --- Begin Message --- Source: ruby-gnome2 Source-Version: 0.16.0-10 We believe that the bug you reported is fixed in the latest version of ruby-gnome2, which is due to be installed in the Debian FTP archive: libart2-ruby1.8_0.16.0-10_amd64.deb to pool/main/r/ruby-gnome2/libart2-ruby1.8_0.16.0-10_amd64.deb libart2-ruby_0.16.0-10_all.deb to pool/main/r/ruby-gnome2/libart2-ruby_0.16.0-10_all.deb libatk1-ruby1.8_0.16.0-10_amd64.deb to pool/main/r/ruby-gnome2/libatk1-ruby1.8_0.16.0-10_amd64.deb libatk1-ruby_0.16.0-10_all.deb to pool/main/r/ruby-gnome2/libatk1-ruby_0.16.0-10_all.deb libgconf2-ruby1.8_0.16.0-10_amd64.deb to pool/main/r/ruby-gnome2/libgconf2-ruby1.8_0.16.0-10_amd64.deb libgconf2-ruby_0.16.0-10_all.deb to pool/main/r/ruby-gnome2/libgconf2-ruby_0.16.0-10_all.deb libgdk-pixbuf2-ruby1.8_0.16.0-10_amd64.deb to pool/main/r/ruby-gnome2/libgdk-pixbuf2-ruby1.8_0.16.0-10_amd64.deb libgdk-pixbuf2-ruby_0.16.0-10_all.deb to pool/main/r/ruby-gnome2/libgdk-pixbuf2-ruby_0.16.0-10_all.deb libglade2-ruby1.8_0.16.0-10_amd64.deb to pool/main/r/ruby-gnome2/libglade2-ruby1.8_0.16.0-10_amd64.deb libglade2-ruby_0.16.0-10_all.deb to pool/main/r/ruby-gnome2/libglade2-ruby_0.16.0-10_all.deb libglib2-ruby1.8_0.16.0-10_amd64.deb to pool/main/r/ruby-gnome2/libglib2-ruby1.8_0.16.0-10_amd64.deb libglib2-ruby_0.16.0-10_all.deb to pool/main/r/ruby-gnome2/libglib2-ruby_0.16.0-10_all.deb libgnome2-ruby1.8_0.16.0-10_amd64.deb to pool/main/r/ruby-gnome2/libgnome2-ruby1.8_0.16.0-10_amd64.deb libgnome2-ruby_0.16.0-10_all.deb to pool/main/r/ruby-gnome2/libgnome2-ruby_0.16.0-10_all.deb libgnomecanvas2-ruby1.8_0.16.0-10_amd64.deb to pool/main/r/ruby-gnome2/libgnomecanvas2-ruby1.8_0.16.0-10_amd64.deb libgnomecanvas2-ruby_0.16.0-10_all.deb to pool/main/r/ruby-gnome2/libgnomecanvas2-ruby_0.16.0-10_all.deb libgnomeprint2-ruby1.8_0.16.0-10_amd64.deb to pool/main/r/ruby-gnome2/libgnomeprint2-ruby1.8_0.16.0-10_amd64.deb libgnomeprint2-ruby_0.16.0-10_all.deb to pool/main/r/ruby-gnome2/libgnomeprint2-ruby_0.16.0-10_all.deb libgnomeprintui2-ruby1.8_0.16.0-10_amd64.deb to pool/main/r/ruby-gnome2/libgnomeprintui2-ruby1.8_0.16.0-10_amd64.deb libgnomeprintui2-ruby_0.16.0-10_all.deb to pool/main/r/ruby-gnome2/libgnomeprintui2-ruby_0.16.0-10_all.deb libgnomevfs2-ruby1.8_0.16.0-10_amd64.deb to pool/main/r/ruby-gnome2/libgnomevfs2-ruby1.8_0.16.0-10_amd64.deb libgnomevfs2-ruby_0.16.0-10_all.deb to pool/main/r/ruby-gnome2/libgnomevfs2-ruby_0.16.0-10_all.deb libgtk-mozembed-ruby1.8_0.16.0-10_amd64.deb to pool/main/r/ruby-gnome2/libgtk-mozembed-ruby1.8_0.16.0-10_amd64.deb libgtk-mozembed-ruby_0.16.0-10_all.deb to pool/main/r/ruby-gnome2/libgtk-mozembed-ruby_0.16.0-10_all.deb libgtk2-ruby1.8_0.16.0-10_amd64.deb to pool/main/r/ruby-gnome2/libgtk2-ruby1.8_0.16.0-10_amd64.deb libgtk2-ruby_0.16.0-10_all.deb to pool/main/r/ruby-gnome2/libgtk2-ruby_0.16.0-10_all.deb libgtkglext1-ruby1.8_0.16.0-10_amd64.deb to pool/main/r/ruby-gnome2/libgtkglext1-ruby1.8_0.16.0-10_amd64.deb libgtkglext1-ruby_0.16.0-10_all.deb to pool/main/r/ruby-gnome2/libgtkglext1-ruby_0.16.0-10_all.deb li
Bug#432740: marked as done (player: FTBFS: Nested quantifiers in regex)
Your message dated Mon, 03 Dec 2007 19:23:25 + with message-id <[EMAIL PROTECTED]> and subject line Bug#432740: fixed in player 2.0.4-3 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: player Version: 2.0.4-1 Severity: serious Hi, Your package is failing to build with the following error: Nested quantifiers in regex; marked by <-- HERE in m/^debian/libplayerc++ <-- HERE 2/usr/share/doc// at /usr/bin/dh_pycentral line 191. make[1]: *** [binary-common] Error 2 make[1]: Leaving directory `/build/buildd/player-2.0.4' make: *** [binary-arch] Error 2 Kurt --- End Message --- --- Begin Message --- Source: player Source-Version: 2.0.4-3 We believe that the bug you reported is fixed in the latest version of player, which is due to be installed in the Debian FTP archive: liblodo0-dev_2.0.4-3_i386.deb to pool/main/p/player/liblodo0-dev_2.0.4-3_i386.deb liblodo0_2.0.4-3_i386.deb to pool/main/p/player/liblodo0_2.0.4-3_i386.deb libplayerc++2-dev_2.0.4-3_i386.deb to pool/main/p/player/libplayerc++2-dev_2.0.4-3_i386.deb libplayerc++2_2.0.4-3_i386.deb to pool/main/p/player/libplayerc++2_2.0.4-3_i386.deb libplayerc2-dev_2.0.4-3_i386.deb to pool/main/p/player/libplayerc2-dev_2.0.4-3_i386.deb libplayerc2_2.0.4-3_i386.deb to pool/main/p/player/libplayerc2_2.0.4-3_i386.deb libplayercore2-dev_2.0.4-3_i386.deb to pool/main/p/player/libplayercore2-dev_2.0.4-3_i386.deb libplayercore2_2.0.4-3_i386.deb to pool/main/p/player/libplayercore2_2.0.4-3_i386.deb libplayerdrivers2-dev_2.0.4-3_i386.deb to pool/main/p/player/libplayerdrivers2-dev_2.0.4-3_i386.deb libplayerdrivers2_2.0.4-3_i386.deb to pool/main/p/player/libplayerdrivers2_2.0.4-3_i386.deb libplayererror2-dev_2.0.4-3_i386.deb to pool/main/p/player/libplayererror2-dev_2.0.4-3_i386.deb libplayererror2_2.0.4-3_i386.deb to pool/main/p/player/libplayererror2_2.0.4-3_i386.deb libplayerjpeg2-dev_2.0.4-3_i386.deb to pool/main/p/player/libplayerjpeg2-dev_2.0.4-3_i386.deb libplayerjpeg2_2.0.4-3_i386.deb to pool/main/p/player/libplayerjpeg2_2.0.4-3_i386.deb libplayertcp2-dev_2.0.4-3_i386.deb to pool/main/p/player/libplayertcp2-dev_2.0.4-3_i386.deb libplayertcp2_2.0.4-3_i386.deb to pool/main/p/player/libplayertcp2_2.0.4-3_i386.deb libplayerxdr2-dev_2.0.4-3_i386.deb to pool/main/p/player/libplayerxdr2-dev_2.0.4-3_i386.deb libplayerxdr2_2.0.4-3_i386.deb to pool/main/p/player/libplayerxdr2_2.0.4-3_i386.deb libpmap0-dev_2.0.4-3_i386.deb to pool/main/p/player/libpmap0-dev_2.0.4-3_i386.deb libpmap0_2.0.4-3_i386.deb to pool/main/p/player/libpmap0_2.0.4-3_i386.deb player_2.0.4-3.diff.gz to pool/main/p/player/player_2.0.4-3.diff.gz player_2.0.4-3.dsc to pool/main/p/player/player_2.0.4-3.dsc python-playerc_2.0.4-3_i386.deb to pool/main/p/player/python-playerc_2.0.4-3_i386.deb robot-player-dev_2.0.4-3_all.deb to pool/main/p/player/robot-player-dev_2.0.4-3_all.deb robot-player-doc_2.0.4-3_all.deb to pool/main/p/player/robot-player-doc_2.0.4-3_all.deb robot-player_2.0.4-3_i386.deb to pool/main/p/player/robot-player_2.0.4-3_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Michael Janssen <[EMAIL PROTECTED]> (supplier of updated player package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Tue, 27 Nov 2007 00:12:14 -0600 Source: player Binary: libplayerxdr2-dev libplayertcp2-dev libpmap0-dev libplayererror2-dev libplayererror2 libplayerdrivers2-dev libplayerc2-dev libplayerjpeg2 robot-player-dev libplayerjpeg2-dev libplayerxdr2 libplayerc++2-dev libplayertcp2 robot-player libplayerc++2 liblodo0-dev libpmap0 robot-player-doc libplayercore2-dev libplayercore2 liblodo0 python-playerc libplayerc2 libplayerdrivers2 Architecture: source i386 all Version: 2.0.4-3 Distribution: unstable Urgency: low Maintainer: Michael Janssen <[EMAIL PROTECTED]> Changed-By: Michael Janssen <[EMAIL PROTECTED]> Description: liblodo0 - Networked server for robots and sensors - laser-based odometry li liblodo0-dev - Networked server for robots and sensors - laser odometry dev file libplayerc++2 - Netwo
Bug#312115: marked as done (SIGSEGVs make libdbi unuseable)
Your message dated Mon, 03 Dec 2007 19:45:26 + with message-id <[EMAIL PROTECTED]> and subject line Bug#312115: fixed in libdbi 0.8.2-3 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: libdbi Severity: grave I try to create tables in the existing mysqldb test or in a nonexisting sqlitedb. Later creates the db file on the fly. With mysql I get SEGV on dbi_conn_get_table_list() function. With sqlite the first table tbl_auth in first db file blogdb_auth is created fine. In a 2nd loop run a 2nd table tbl_user in a 2nd db file blogdb_user should be created. The db file blogdb_user is created with 0 size but then there is a SEGV in dbi_conn_select_db() function at open("/home/makolb/devel/blog/tests/db/build/./db/blogdb_user", O_RDWR|O_CREAT|O_LARGEFILE, 0644) = 3 fstat64(3, {st_mode=S_IFREG|0644, st_size=0, ...}) = 0 getpid()= 9161 --- SIGSEGV (Segmentation fault) @ 0 (0) --- +++ killed by SIGSEGV +++ Eletricfence reports a 0 allocation: $ LD_LIBRARY_PATH="." LD_PRELOAD="libefence.so.0" ./dbtest Electric Fence 2.1 Copyright (C) 1987-1998 Bruce Perens. ElectricFence Aborting: Allocating 0 bytes, probably a bug. Illegal instruction All package versions are latest from Sid. Here is debugging and ltrace output, first for mysql and afterwards for sqlite. = MYSQL 4.0.24-10 = [Thread debugging using libthread_db enabled] [New Thread 16384 (LWP 8988)] Program received signal SIGSEGV, Segmentation fault. [Switching to Thread 16384 (LWP 8988)] 0x4019d580 in mysql_send_query () from /usr/lib/libmysqlclient.so.12 (gdb) where #0 0x4019d580 in mysql_send_query () from /usr/lib/libmysqlclient.so.12 #1 0x4019d9e0 in mysql_real_query () from /usr/lib/libmysqlclient.so.12 #2 0x4019d355 in mysql_query () from /usr/lib/libmysqlclient.so.12 #3 0x4001f279 in dbd_query () from /usr/lib/dbd/libmysql.so #4 0x4001f1a5 in dbd_list_tables () from /usr/lib/dbd/libmysql.so #5 0x4002a1d9 in dbi_conn_get_table_list () from /usr/lib/libdbi.so.0 #6 0x08049495 in db_tbl_exist (conn=0x804e028, dbname=0x804de08 "test", tblname=0x804e138 "tbl_auth") at ../../src/db.c:107 #7 0x080497c7 in db_generate (conn=0x804e028, tbl=0 '\0') at ../../src/db.c:185 #8 0x080498d5 in db_install () at ../../src/db.c:220 #9 0x08048bd9 in main (argc=1, argv=0xba74) at main.c:25 (gdb) $ LD_LIBRARY_PATH="." ltrace ./dbtest __libc_start_main(0x8048b74, 1, 0xbaa4, 0x804ae90, 0x804aef0 confpars_readconf(0x804afa8, 0x804daa0, 11, 0x40016ca0, 0x804ae90) = 0x804dd38 malloc(44) = 0x804dda8 strlen("./templates")= 11 malloc(12) = 0x804ddd8 strcpy(0x804ddd8, "./templates") = 0x804ddd8 strlen("mysql") = 5 malloc(6)= 0x804dde8 strcpy(0x804dde8, "mysql") = 0x804dde8 strlen("localhost") = 9 malloc(10) = 0x804ddf8 strcpy(0x804ddf8, "localhost") = 0x804ddf8 atoi(0x804df70, 0x804df60, 11, 0x40016ca0, 0x804ae90) = 0 strlen("test") = 4 malloc(5)= 0x804de08 strcpy(0x804de08, "test")= 0x804de08 strlen("root") = 4 malloc(5)= 0x804de18 strcpy(0x804de18, "root")= 0x804de18 strlen("") = 0 malloc(1)= 0x804de28 strcpy(0x804de28, "")= 0x804de28 strlen("./db") = 4 malloc(5)= 0x804de38 strcpy(0x804de38, "./db")= 0x804de38 strlen("test") = 4 malloc(5)= 0x804de48 strcpy(0x804de48, "test")= 0x804de48 atoi(0x804dfd0, 0x804df90, 11, 0x40016ca0, 0x804ae90) = 1 strlen("") = 0 malloc(1)= 0x804de58 strcpy(0x804de58, "")
Bug#453035: marked as done (gnutls cli binaries linked against both SO versions)
Your message dated Mon, 03 Dec 2007 19:45:59 + with message-id <[EMAIL PROTECTED]> and subject line Bug#453035: fixed in gnutls26 2.1.7-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: gnutls-bin Version: 2.1.6-1 Tags: experimental Hi, there's a problem with gnutls-{cli,serv} in the new gnutls-bin: ] [EMAIL PROTECTED]:~$ ldd /usr/bin/gnutls-cli ] linux-gate.so.1 => (0xb7f6f000) ]>>> libgnutls.so.25 => /usr/lib/libgnutls.so.25 (0xb7ee4000) ]>>> libgnutls-extra.so.25 => /usr/lib/libgnutls-extra.so.25 (0xb7ed8000) ] libtasn1.so.3 => /usr/lib/libtasn1.so.3 (0xb7ec9000) ] libgcrypt.so.11 => /usr/lib/libgcrypt.so.11 (0xb7e63000) ] libgpg-error.so.0 => /usr/lib/libgpg-error.so.0 (0xb7e5f000) ] libc.so.6 => /lib/libc.so.6 (0xb7d12000) ] libz.so.1 => /usr/lib/libz.so.1 (0xb7cfc000) ] libopencdk.so.10 => /usr/lib/libopencdk.so.10 (0xb7cda000) ] libnsl.so.1 => /lib/libnsl.so.1 (0xb7cc2000) ] liblzo2.so.2 => /usr/lib/liblzo2.so.2 (0xb7ca2000) ]>>> libgnutls.so.13 => /usr/lib/libgnutls.so.13 (0xb7c2b000) ] /lib/ld-linux.so.2 (0xb7f7) ] [EMAIL PROTECTED]:~$ /usr/bin/gnutls-cli ] global_init_extra: The GnuTLS library version does not match the GnuTLS-extra library version. Regards, Jan signature.asc Description: Digital signature --- End Message --- --- Begin Message --- Source: gnutls26 Source-Version: 2.1.7-1 We believe that the bug you reported is fixed in the latest version of gnutls26, which is due to be installed in the Debian FTP archive: gnutls-bin_2.1.7-1_i386.deb to pool/main/g/gnutls26/gnutls-bin_2.1.7-1_i386.deb gnutls-doc_2.1.7-1_all.deb to pool/main/g/gnutls26/gnutls-doc_2.1.7-1_all.deb gnutls26_2.1.7-1.diff.gz to pool/main/g/gnutls26/gnutls26_2.1.7-1.diff.gz gnutls26_2.1.7-1.dsc to pool/main/g/gnutls26/gnutls26_2.1.7-1.dsc gnutls26_2.1.7.orig.tar.gz to pool/main/g/gnutls26/gnutls26_2.1.7.orig.tar.gz guile-gnutls_2.1.7-1_i386.deb to pool/main/g/gnutls26/guile-gnutls_2.1.7-1_i386.deb libgnutls-dev_2.1.7-1_i386.deb to pool/main/g/gnutls26/libgnutls-dev_2.1.7-1_i386.deb libgnutls26-dbg_2.1.7-1_i386.deb to pool/main/g/gnutls26/libgnutls26-dbg_2.1.7-1_i386.deb libgnutls26_2.1.7-1_i386.deb to pool/main/g/gnutls26/libgnutls26_2.1.7-1_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Andreas Metzler <[EMAIL PROTECTED]> (supplier of updated gnutls26 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sat, 1 Dec 2007 10:40:17 +0100 Source: gnutls26 Binary: libgnutls26-dbg libgnutls-dev gnutls-bin libgnutls26 guile-gnutls gnutls-doc Architecture: source i386 all Version: 2.1.7-1 Distribution: experimental Urgency: low Maintainer: Debian GnuTLS Maintainers <[EMAIL PROTECTED]> Changed-By: Andreas Metzler <[EMAIL PROTECTED]> Description: gnutls-bin - the GNU TLS library - commandline utilities gnutls-doc - the GNU TLS library - documentation and examples guile-gnutls - the GNU TLS library - GNU Guile bindings libgnutls-dev - the GNU TLS library - development files libgnutls26 - the GNU TLS library - runtime library libgnutls26-dbg - GNU TLS library - debugger symbols Closes: 453035 Changes: gnutls26 (2.1.7-1) experimental; urgency=low . * New upstream version. - Another soname bump. Packages renamed. * Continue using a repacked orig.tar.gz, instead of upstream's tar.bz2 since dak does not allow that yet. * Add Build-Conflicts: libgnutls-dev to stop libtool from linking libgnutls-extra against libgnutls.so in /usr/lib/. Closes: #453035 Files: 7705d25fd58c63daa69dee9ba437d612 1066 devel optional gnutls26_2.1.7-1.dsc 9ce516ea45df619fd55a376d32fb9fde 5954272 devel optional gnutls26_2.1.7.orig.tar.gz 3fdbe8c47ebba83c37c1ad7136fdb044 19781 devel optional gnutls26_2.1.7-1.diff.gz dc13d4bde20d6830a13c035059f164a2 2683950 doc optional gnutls-doc_2.1.7-1_all.deb fba1bea144fe634244b556b7c8c5a1b1 530474 libdevel optional libgnutls-dev_2.1.7-1_i386.deb 09339c169bcd17bb332ba920eaa2c9ed 471590 libs i
Bug#433763: marked as done (anjuta: Anjuta crashes on start with "malloc(): memory corruption")
Your message dated Mon, 03 Dec 2007 20:01:29 + with message-id <[EMAIL PROTECTED]> and subject line Fixed has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: anjuta Version: 2:2.2.0-1 Severity: grave Justification: renders package unusable When starting Anjuta it crashes and gives a lot of output: [EMAIL PROTECTED](~)$ anjuta *** glibc detected *** anjuta: malloc(): memory corruption: 0x080943d8 *** === Backtrace: = /lib/libc.so.6[0xb72e4fe4] /lib/libc.so.6(__libc_malloc+0x7e)[0xb72e690e] /usr/lib/libglib-2.0.so.0(g_malloc+0x36)[0xb7441ec6] /usr/lib/libgobject-2.0.so.0(g_object_new_valist+0x52)[0xb74b93d2] /usr/lib/libgobject-2.0.so.0(g_object_new+0x40)[0xb74b9750] anjuta(anjuta_app_new+0x33)[0x8053303] anjuta(anjuta_new+0x22)[0x804f332] anjuta(main+0x2ee)[0x805487e] /lib/libc.so.6(__libc_start_main+0xe0)[0xb7291030] anjuta[0x804e861] === Memory map: 08048000-08057000 r-xp 03:06 150395 /usr/bin/anjuta 08057000-08058000 rw-p e000 03:06 150395 /usr/bin/anjuta 08058000-080bc000 rw-p 08058000 00:00 0 [heap] b6cf5000-b6cff000 r-xp 03:06 535079 /lib/libgcc_s.so.1 b6cff000-b6d0 rw-p 9000 03:06 535079 /lib/libgcc_s.so.1 b6d0-b6d21000 rw-p b6d0 00:00 0 b6d21000-b6e0 ---p b6d21000 00:00 0 b6e23000-b6e2a000 r--p 03:06 42560 /usr/share/locale/de/LC_MESSAGES/libgnomeui-2.0.mo b6e2a000-b6e33000 r-xp 03:06 285787 /lib/libnss_files-2.6.so b6e33000-b6e35000 rw-p 8000 03:06 285787 /lib/libnss_files-2.6.so b6e35000-b6e3d000 r-xp 03:06 396009 /lib/libnss_nis-2.6.so b6e3d000-b6e3f000 rw-p 7000 03:06 396009 /lib/libnss_nis-2.6.so b6e3f000-b6e46000 r-xp 03:06 216664 /lib/libnss_compat-2.6.so b6e46000-b6e48000 rw-p 6000 03:06 216664 /lib/libnss_compat-2.6.so b6e4e000-b6e4f000 r-xp 03:06 535920 /usr/lib/gconv/ISO8859-1.so b6e4f000-b6e51000 rw-p 03:06 535920 /usr/lib/gconv/ISO8859-1.so b6e51000-b6e61000 r--p 03:06 423726 /usr/share/locale/de/LC_MESSAGES/gtk20.mo b6e61000-b6e63000 r-xp 03:06 535925 /usr/lib/gconv/ISO8859-15.so b6e63000-b6e65000 rw-p 1000 03:06 535925 /usr/lib/gconv/ISO8859-15.so b6e65000-b6e87000 r--p 03:06 423730 /usr/share/locale/de/LC_MESSAGES/gtk20-properties.mo b6e87000-b6edd000 r--p 03:06 13041 /usr/lib/locale/locale-archive b6edd000-b6ee rw-p b6edd000 00:00 0 b6ee-b6fa1000 r-xp 03:06 54451 /usr/lib/libasound.so.2.0.0 b6fa1000-b6fa6000 rw-p 000c 03:06 54451 /usr/lib/libasound.so.2.0.0 b6fa6000-b6fa7000 rw-p b6fa6000 00:00 0 b6fa7000-b6ff6000 r-xp 03:06 163657 /usr/lib/libgcrypt.so.11.2.3 b6ff6000-b6ff8000 rw-p 0004f000 03:06 163657 /usr/lib/libgcrypt.so.11.2.3 b6ff8000-b6ffb000 r-xp 03:06 173382 /usr/lib/libgpg-error.so.0.3.0 b6ffb000-b6ffc000 rw-p 2000 03:06 173382 /usr/lib/libgpg-error.so.0.3.0 b6ffc000-b700b000 r-xp 03:06 353430 /usr/lib/libtasn1.so.3.0.9 b700b000-b700c000 rw-p e000 03:06 353430 /usr/lib/libtasn1.so.3.0.9 b700c000-b702 r-xp 03:06 216447 /lib/libnsl-2.6.so b702-b7022000 rw-p 00013000 03:06 216447 /lib/libnsl-2.6.so b7022000-b7024000 rw-p b7022000 00:00 0 b7024000-b703e000 r-xp 03:06 673160 /usr/local/lib/libanjuta-interfaces.so.0.0.0 b703e000-b704 rw-p 0001a000 03:06 673160 /usr/local/lib/libanjuta-interfaces.so.0.0.0 b704-b7041000 rw-p b704 00:00 0 b7041000-b7067000 r-xp 03:06 673045 /usr/local/lib/libanjuta-egg.so.0.0.0 b7067000-b7068000 rw-p 00026000 03:06 673045 /usr/local/lib/libanjuta-egg.so.0.0.0 b7068000-b706c000 r-xp 03:06 168759 /usr/lib/libXdmcp.so.6.0.0 b706c000-b706d000 rw-p 3000 03:06 168759 /usr/lib/libXdmcp.so.6.0.0 b706d000-b708f000 r-xp 03:06 128052 /usr/lib/libpng12.so.0.15.0 b708f000-b709 rw-p 00021000 03:06 128052 /usr/lib/libpng12.so.0.15.0 b709-b7092000 r-xp 03:06 69361 /usr/lib/libXau.so.6.0.0 b7092000-b7093000 rw-p 1000 03:06 69361 /usr/lib/libXau.so.6.0.0 b7093000-b7094000 rw-p b7093000 00:00 0 b7094000-b70b2000 r-xp 03:06 19981 /usr/lib/libexpat.so.1.0.0 b70b2000-b70b4000 rw-p 0001d000 03:06 19981 /usr/lib/libexpat.so.1.0.0 b70b4000-b70b7000 r-xp 03:06 631389 /usr/lib/libORBitCosNaming-2.so.0.1.0 b70b7000-b70b8000 rw-p 3000 03:06 631389 /usr/lib/lib
Bug#450524: marked as done (missing file /usr/lib/evolution/2.12/plugins/publish-calendar.glade makes evolution crash!)
Your message dated Mon, 03 Dec 2007 20:32:10 + with message-id <[EMAIL PROTECTED]> and subject line Bug#450524: fixed in evolution 2.12.2-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: evolution Version: 2.12.0-2 Severity: serious -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 In evolution, go to preferences -> calendar and tasks -> calendar publishing and press Add. Evolution crashes. It prints out the following: BBDB spinning up... (evolution:10017): libglade-WARNING **: could not find glade file '/usr/lib/evolution/2.12/plugins/publish-calendar.glade' (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed (evolution:10017): libglade-CRITICAL **: glade_xml_get_widget: assertion `self != NULL' failed ** (evolution:10017): CRITICAL **: url_editor_dialog_construct: assertion `gui != NULL' failed (evolution:10017): GLib-GObject-WARNING **: instance with invalid (NULL) class pointer (evolution:10017): GLib-GObject-CRITICAL **: g_signal_handlers_destroy: assertion `G_TYPE_CHECK_INSTANCE (instance)' failed (evolution:10017): GLib-GObject-WARNING **: instance with invalid (NULL) class pointer (evolution:10017): GLib-GObject-CRITICAL **: g_signal_handlers_destroy: assertion `G_TYPE_CHECK_INSTANCE (instance)' failed (evolution:10017): Gtk-CRITICAL **: gtk_dialog_run: assertion `GTK_IS_DIALOG (dialog)' failed (evolution:10017): Gtk-CRITICAL **: gtk_widget_hide_all: assertion `GTK_IS_WIDGET (widget)' failed So it looks like this is caused by the missing file. - -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (530, 'testing'), (520, 'unstable'), (510, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.22-fixdso (SMP w/1 CPU core) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages evolution depends on: ii dbus1.1.1-3 simple interprocess messaging syst ii evolution-common2.12.0-2 architecture independent files for ii evolution-data-server 1.12.1-1 evolution database backend server ii gconf2 2.20.0-1 GNOME configuration database syste ii gnome-icon-theme2.20.0-1 GNOME Desktop icon theme ii gtkhtml3.14 3.16.1-1 HTML rendering/editing library - b ii libart-2.0-22.3.19-3 Library of functions for 2D graphi ii libatk1.0-0 1.20.0-1 The ATK accessibility toolkit ii libbonobo2-02.20.0-1 Bonobo CORBA interfaces library ii libbonoboui2-0 2.20.0-1 The Bonobo
Bug#444543: marked as done (abakus: FTBFS: __str__ returned non-string (type instance))
Your message dated Mon, 03 Dec 2007 20:47:05 + with message-id <[EMAIL PROTECTED]> and subject line Bug#444204: fixed in scons 0.97.0d20071203-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: abakus version: 0.91-1 Severity: serious User: [EMAIL PROTECTED] Usertags: qa-ftbfs-20070928 qa-ftbfs Justification: FTBFS on i386 Hi, During a rebuild of all packages in sid, your package failed to build on i386. Relevant part: /usr/bin/fakeroot debian/rules clean test -x debian/rules test "`id -u`" = 0 dh_clean scons --no-cache -Q --clean Checking for kde-config : [92mkde-config was found[0m Checking for kde version : [92m3.5.7[0m Checking for the qt library : [1mqt was found as /usr[0m Checking for uic : [92muic was found as /usr/bin/uic[0m Checking for moc : [92mmoc was found as /usr/bin/moc[0m Checking for the qt includes : [1mthe qt headers were found in /usr/include/qt3/ [0m Checking for the kde includes : [1mthe kde headers were found in /usr/include/kde/[0m TypeError: __str__ returned non-string (type instance): File "/build/user/abakus-0.91/SConstruct", line 12: env = Environment(tools = tools, toolpath = toolpath) File "/usr/lib/scons/SCons/Environment.py", line 874: apply_tools(self, tools, toolpath) File "/usr/lib/scons/SCons/Environment.py", line 101: env.Tool(tool) File "/usr/lib/scons/SCons/Environment.py", line 1491: tool(self) File "/usr/lib/scons/SCons/Tool/__init__.py", line 175: apply(self.generate, ( env, ) + args, kw) File "/build/user/abakus-0.91/bksys/abakus.py", line 176: opts.Save(cachefile, env) File "/usr/lib/scons/SCons/Options/__init__.py", line 225: value = SCons.Util.to_String(value) File "/usr/lib/scons/SCons/Util.py", line 128: return str(s) make: *** [clean] Error 2 The full build log is available from http://people.debian.org/~lucas/logs/2007/09/28 A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! About the archive rebuild: The rebuild was done on about 50 AMD64 nodes of the Grid'5000 platform, using a clean chroot containing a sid i386 environment. Internet was not accessible from the build systems. -- | Lucas Nussbaum | [EMAIL PROTECTED] http://www.lucas-nussbaum.net/ | | jabber: [EMAIL PROTECTED] GPG: 1024D/023B3F4F | --- End Message --- --- Begin Message --- Source: scons Source-Version: 0.97.0d20071203-1 We believe that the bug you reported is fixed in the latest version of scons, which is due to be installed in the Debian FTP archive: scons_0.97.0d20071203-1.diff.gz to pool/main/s/scons/scons_0.97.0d20071203-1.diff.gz scons_0.97.0d20071203-1.dsc to pool/main/s/scons/scons_0.97.0d20071203-1.dsc scons_0.97.0d20071203-1_all.deb to pool/main/s/scons/scons_0.97.0d20071203-1_all.deb scons_0.97.0d20071203.orig.tar.gz to pool/main/s/scons/scons_0.97.0d20071203.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Mark Brown <[EMAIL PROTECTED]> (supplier of updated scons package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 03 Dec 2007 19:29:59 + Source: scons Binary: scons Architecture: source all Version: 0.97.0d20071203-1 Distribution: unstable Urgency: low Maintainer: Mark Brown <[EMAIL PROTECTED]> Changed-By: Mark Brown <[EMAIL PROTECTED]> Description: scons - A replacement for Make Closes: 444204 Changes: scons (0.97.0d20071203-1) unstable; urgency=low . * Unofficial upstream snapshot (SVN revision 2509). * Incorporates fix for build failures when cleaning (closes: #444204). Files: 88b0a78424ac47a7dbd93d7b75e3fc21 645 devel optional scons_0.97.0d20071203-1.dsc 28638039056e1d71cce258f25c85a8fe 508080 devel optional scons_0.97.0d20071203.orig.tar.gz 1659a45f3b5f2210721d33a8ea68ca55 3640 devel optional scons_0.97.0d20071203-1.diff.gz 6cc964973e59ba7205e3e00d2d0094d1 497904 devel optional scons_0.97.0d20071203-1_all.deb
Bug#454184: liferea: "Segmentation fault" during startup on lenny
On Mon, Dec 03, 2007 at 08:36:41PM +0100, Andrzej Filip wrote: > Below please find tail of output produced by > liferea --debug-all --debug-verbose > > TRACE: + update_request_new > TRACE: - update_request_new > TRACE: - feedlist_auto_update > GUI: Setting threePane mode: off > UPDATE: download result - HTTP status: 200, error: 0, netio error:0, > data: 138812600 > UPDATE: request finished > UPDATE: waiting for request... > UPDATE: processing received request (http://art.gnome.org/backend.php) > UPDATE: downloading http://art.gnome.org/backend.php > GUI: Setting threePane mode: off > Segmentation fault Could you test with the version from sid? Also, if you could obtain a backtrace, it would be enormously helpful. -- Rodrigo Gallardo GPG-Fingerprint: 7C81 E60C 442E 8FBC D975 2F49 0199 8318 ADC9 BC28 signature.asc Description: Digital signature
Bug#444204: marked as done (scons: version 0.97.0d20070918-1 fails to clean csound 5.06 but 0.97.0d20070809-1 doesn't)
Your message dated Mon, 03 Dec 2007 20:47:05 + with message-id <[EMAIL PROTECTED]> and subject line Bug#444204: fixed in scons 0.97.0d20071203-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: scons Version: 0.97.0d20070809-1 Severity: normal When using scons 0.97.0d20070918-1 I can't cleanup the csound 2.06 source: -- shell output % scons -c scons: Reading SConscript files ... C S O U N D 5 SCons build file for Csound 5: API library, plugin opcodes, utilities, and front ends. By Michael Gogins For custom options, run 'scons -h'. For default options, run 'scons -H'. If headers or libraries are not found, edit 'custom.py'. For Linux, run in the standard shell with standard Python and just run 'scons'. For MinGW, run in the MSys shell and use www.python.org WIN32 Python to run scons. System platform is 'linux'. Using options from 'custom.py.' Build platform is 'linux'. SCons tools on this platform: ['default', 'gnulink', 'gcc', 'g++', 'f95', 'gas', 'ar', 'CVS', 'filesystem', 'dvipdf', 'dvips', 'gs', 'jar', 'javac', 'javah', 'latex', 'lex', 'm4', 'pdflatex', 'pdftex', 'rmic', 'rpcgen', 'swig', 'tar', 'tex', 'yacc', 'zip', 'rpm'] CONFIGURATION DECISION: Using single-precision floating point for audio samples. *** Failed to compile a simple test program. The compiler is *** possibly not set up correctly, or is used with invalid flags. *** Check config.log to find out more about the error. -- end output However, config.log is empty. Reverting to version 0.97.0d20070809 fixes the issue. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.21-felipe (PREEMPT) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages scons depends on: ii python2.4.4-6An interactive high-level object-o ii python-central0.5.15 register and build utility for Pyt scons recommends no packages. -- no debconf information --- End Message --- --- Begin Message --- Source: scons Source-Version: 0.97.0d20071203-1 We believe that the bug you reported is fixed in the latest version of scons, which is due to be installed in the Debian FTP archive: scons_0.97.0d20071203-1.diff.gz to pool/main/s/scons/scons_0.97.0d20071203-1.diff.gz scons_0.97.0d20071203-1.dsc to pool/main/s/scons/scons_0.97.0d20071203-1.dsc scons_0.97.0d20071203-1_all.deb to pool/main/s/scons/scons_0.97.0d20071203-1_all.deb scons_0.97.0d20071203.orig.tar.gz to pool/main/s/scons/scons_0.97.0d20071203.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Mark Brown <[EMAIL PROTECTED]> (supplier of updated scons package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 03 Dec 2007 19:29:59 + Source: scons Binary: scons Architecture: source all Version: 0.97.0d20071203-1 Distribution: unstable Urgency: low Maintainer: Mark Brown <[EMAIL PROTECTED]> Changed-By: Mark Brown <[EMAIL PROTECTED]> Description: scons - A replacement for Make Closes: 444204 Changes: scons (0.97.0d20071203-1) unstable; urgency=low . * Unofficial upstream snapshot (SVN revision 2509). * Incorporates fix for build failures when cleaning (closes: #444204). Files: 88b0a78424ac47a7dbd93d7b75e3fc21 645 devel optional scons_0.97.0d20071203-1.dsc 28638039056e1d71cce258f25c85a8fe 508080 devel optional scons_0.97.0d20071203.orig.tar.gz 1659a45f3b5f2210721d33a8ea68ca55 3640 devel optional scons_0.97.0d20071203-1.diff.gz 6cc964973e59ba7205e3e00d2d0094d1 497904 devel optional scons_0.97.0d20071203-1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHVGdxJ2Vo11xhU60RAtp3AKCxV8u3C7ZAXTEZWsYOFYe1r+yTIwCdGBh0 w2s0n9qe4qZkLqU9HgsTKf8= =CST+ -END PGP SIGNATURE- --- End Message ---
Bug#448960: marked as done (firebird2.0: Uses ICU 3.6, creating databases that are silently incompatible with upstream)
Your message dated Mon, 03 Dec 2007 20:32:13 + with message-id <[EMAIL PROTECTED]> and subject line Bug#448960: fixed in firebird2.0 2.0.3.12981.ds1-2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: firebird2.0 Version: 2.0.0 Severity: serious I was going to use "grave", but there is no really danger of data loss, only very hard to detect, ugly and surprising incompatibility with upstream's binary database files, possibly leading to incorect query results. I (as maintainer) certainly don't want such incompatible version to be released as "stable". The thread discussing this on upstream mailing list starts at http://sourceforge.net/mailarchive/forum.php?thread_name=200710311235.13978.peshkoff%40yaroslavl.ru&forum_name=firebird-devel (approximatelly. SF mailing list web archives suck) In short, from version 2.0 Firebird uses ICU for collation. Collation means representing any given string via a binary sequence that can be easily compared (byte-by-byte). This binary representation is used in Firebird indices, in the database file. >From time to time, ICU developers find errors in the binary representations and fix them. The problem is that Debian packages of firebird2.0 use the system-wide ICU (3.6), while upstream uses an older version (3.0), bundled together with Firebird sources. So any database created by Debian packages that uses unicode collations would contain in its indices binary representations that are silently incompatible with upstream. For Debian, I'll fix this by using the bundled ICU again. This means alwo enabling rpaths. Ugly, but it will work. Users will have to backup and restore their databases. Upstream, on the other hand implemented a better approach for the next versions of Firebird (2.1+) - each collation remembers with which version of ICU it was created and any attempt to use it with incompatible ICU version results in an error. Backup&restore agains solves the incompatibility. this approach will again allow Debian packages to use system-wide ICU without uncaught incompatibilities. Instead of backup&restore, a more fine-grained method would be to re-create the affected indices: "alter index $index_name active" should do it. -- dam --- End Message --- --- Begin Message --- Source: firebird2.0 Source-Version: 2.0.3.12981.ds1-2 We believe that the bug you reported is fixed in the latest version of firebird2.0, which is due to be installed in the Debian FTP archive: firebird2.0-classic_2.0.3.12981.ds1-2_amd64.deb to pool/main/f/firebird2.0/firebird2.0-classic_2.0.3.12981.ds1-2_amd64.deb firebird2.0-common_2.0.3.12981.ds1-2_amd64.deb to pool/main/f/firebird2.0/firebird2.0-common_2.0.3.12981.ds1-2_amd64.deb firebird2.0-dev_2.0.3.12981.ds1-2_all.deb to pool/main/f/firebird2.0/firebird2.0-dev_2.0.3.12981.ds1-2_all.deb firebird2.0-doc_2.0.3.12981.ds1-2_all.deb to pool/main/f/firebird2.0/firebird2.0-doc_2.0.3.12981.ds1-2_all.deb firebird2.0-examples_2.0.3.12981.ds1-2_all.deb to pool/main/f/firebird2.0/firebird2.0-examples_2.0.3.12981.ds1-2_all.deb firebird2.0-super_2.0.3.12981.ds1-2_amd64.deb to pool/main/f/firebird2.0/firebird2.0-super_2.0.3.12981.ds1-2_amd64.deb firebird2.0_2.0.3.12981.ds1-2.diff.gz to pool/main/f/firebird2.0/firebird2.0_2.0.3.12981.ds1-2.diff.gz firebird2.0_2.0.3.12981.ds1-2.dsc to pool/main/f/firebird2.0/firebird2.0_2.0.3.12981.ds1-2.dsc libfbclient2_2.0.3.12981.ds1-2_amd64.deb to pool/main/f/firebird2.0/libfbclient2_2.0.3.12981.ds1-2_amd64.deb libfbembed2_2.0.3.12981.ds1-2_amd64.deb to pool/main/f/firebird2.0/libfbembed2_2.0.3.12981.ds1-2_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Damyan Ivanov <[EMAIL PROTECTED]> (supplier of updated firebird2.0 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 03 Dec 2007 20:43:08 +0200 Source: firebird2.0 Binary: libfbembed2 firebird2.0-dev firebird2.0-doc libfbclient2 firebird2.0-classic firebird2.0-common firebird2.0-super firebird2.0-examples Architecture: source all amd64 Version: 2.0.3.12981.ds1-2 Distribution: un
Bug#453211: marked as done (.la file references another .la file, but does not depend on it)
Your message dated Mon, 03 Dec 2007 21:17:03 + with message-id <[EMAIL PROTECTED]> and subject line Bug#453211: fixed in gnokii 0.6.22.dfsg-3 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: kdepim version: 4:3.5.8-1 Severity: serious User: [EMAIL PROTECTED] Usertags: qa-ftbfs-20071126 qa-ftbfs Justification: FTBFS on i386 Hi, During a rebuild of all packages in sid, your package failed to build on i386. Relevant part: > g++ -shared -nostdlib > /usr/lib/gcc/i486-linux-gnu/4.2.3/../../../../lib/crti.o > /usr/lib/gcc/i486-linux-gnu/4.2.3/crtbeginS.o .libs/pab_xxport.o > .libs/pab_mapihd.o .libs/pab_pablib.o -Wl,--rpath > -Wl,/build/user/kdepim-3.5.8/obj-i486-linux-gnu/kaddressbook/interfaces/.libs > -Wl,--rpath -Wl,/build/user/kdepim-3.5.8/obj-i486-linux-gnu/libkdepim/.libs > -L/usr/share/qt3/lib ../../kaddressbook/interfaces/.libs/libkabinterfaces.so > ../../libkdepim/.libs/libkdepim.so -L/usr/lib/gcc/i486-linux-gnu/4.2.3 > -L/usr/lib/gcc/i486-linux-gnu/4.2.3/../../../../lib -L/lib/../lib > -L/usr/lib/../lib -L/usr/lib/gcc/i486-linux-gnu/4.2.3/../../.. -lstdc++ -lm > -lc -lgcc_s /usr/lib/gcc/i486-linux-gnu/4.2.3/crtendS.o > /usr/lib/gcc/i486-linux-gnu/4.2.3/../../../../lib/crtn.o -Wl,-soname > -Wl,libkaddrbk_pab_xxport.so -o .libs/libkaddrbk_pab_xxport.so > creating libkaddrbk_pab_xxport.la > (cd .libs && rm -f libkaddrbk_pab_xxport.la && ln -s > ../libkaddrbk_pab_xxport.la libkaddrbk_pab_xxport.la) > /usr/share/qt3/bin/moc > /build/user/kdepim-3.5.8/./kaddressbook/xxport/gnokii_xxport.h -o > gnokii_xxport.moc > /bin/sh ../../libtool --tag=CXX --mode=compile g++ -DHAVE_CONFIG_H -I. > -I/build/user/kdepim-3.5.8/./kaddressbook/xxport -I../.. > -I/build/user/kdepim-3.5.8/. > -I/build/user/kdepim-3.5.8/./kaddressbook/interfaces > -I/build/user/kdepim-3.5.8/./kaddressbook > -I/build/user/kdepim-3.5.8/./libkdenetwork > -I/build/user/kdepim-3.5.8/./libkdepim -I/usr/include/kde > -I/usr/share/qt3/include -I. -DQT_THREAD_SUPPORT -D_REENTRANT > -D_FILE_OFFSET_BITS=64 -D_LARGE_FILES=1 -DHAVE_BOOST -Wno-long-long -Wundef > -ansi -D_XOPEN_SOURCE=500 -D_BSD_SOURCE -Wcast-align -Wchar-subscripts -Wall > -W -Wpointer-arith -DNDEBUG -DNO_DEBUG -O2 -g -Wall -O2 -Wformat-security > -Wmissing-format-attribute -Wno-non-virtual-dtor -fno-exceptions > -fno-check-new -fno-common -DQT_CLEAN_NAMESPACE -DQT_NO_ASCII_CAST > -DQT_NO_STL -DQT_NO_COMPAT -DQT_NO_TRANSLATION -c -o gnokii_xxport.lo > /build/user/kdepim-3.5.8/./kaddressbook/xxport/gnokii_xxport.cpp > g++ -DHAVE_CONFIG_H -I. -I/build/user/kdepim-3.5.8/./kaddressbook/xxport > -I../.. -I/build/user/kdepim-3.5.8/. > -I/build/user/kdepim-3.5.8/./kaddressbook/interfaces > -I/build/user/kdepim-3.5.8/./kaddressbook > -I/build/user/kdepim-3.5.8/./libkdenetwork > -I/build/user/kdepim-3.5.8/./libkdepim -I/usr/include/kde > -I/usr/share/qt3/include -I. -DQT_THREAD_SUPPORT -D_REENTRANT > -D_FILE_OFFSET_BITS=64 -D_LARGE_FILES=1 -DHAVE_BOOST -Wno-long-long -Wundef > -ansi -D_XOPEN_SOURCE=500 -D_BSD_SOURCE -Wcast-align -Wchar-subscripts -Wall > -W -Wpointer-arith -DNDEBUG -DNO_DEBUG -O2 -g -Wall -O2 -Wformat-security > -Wmissing-format-attribute -Wno-non-virtual-dtor -fno-exceptions > -fno-check-new -fno-common -DQT_CLEAN_NAMESPACE -DQT_NO_ASCII_CAST > -DQT_NO_STL -DQT_NO_COMPAT -DQT_NO_TRANSLATION -c > /build/user/kdepim-3.5.8/./kaddressbook/xxport/gnokii_xxport.cpp -fPIC > -DPIC -o .libs/gnokii_xxport.o > /bin/sh ../../libtool --tag=CXX --mode=link g++ -DHAVE_BOOST -Wno-long-long > -Wundef -ansi -D_XOPEN_SOURCE=500 -D_BSD_SOURCE -Wcast-align > -Wchar-subscripts -Wall -W -Wpointer-arith -DNDEBUG -DNO_DEBUG -O2 -g -Wall > -O2 -Wformat-security -Wmissing-format-attribute -Wno-non-virtual-dtor > -fno-exceptions -fno-check-new -fno-common -DQT_CLEAN_NAMESPACE > -DQT_NO_ASCII_CAST -DQT_NO_STL -DQT_NO_COMPAT -DQT_NO_TRANSLATION -module > -avoid-version -module -no-undefined -L/usr/share/qt3/lib > -no-undefined -o libkaddrbk_gnokii_xxport.la -rpath /usr/lib/kde3 > gnokii_xxport.lo -lXpm -lX11 -lgnokii -lbluetooth > ../../kaddressbook/interfaces/libkabinterfaces.la > ../../libkdepim/libkdepim.la > g++ -shared -nostdlib > /usr/lib/gcc/i486-linux-gnu/4.2.3/../../../../lib/crti.o > /usr/lib/gcc/i486-linux-gnu/4.2.3/crtbeginS.o .libs/gnokii_xxport.o > -Wl,--rpath > -Wl,/build/user/kdepim-3.5.8/obj-i486-linux-gnu/kaddressbook/interfaces/.libs > -Wl,--rpath -Wl,/bui
Bug#454184: liferea: "Segmentation fault" during startup on lenny
On Mon, Dec 03, 2007 at 10:31:36PM +0100, Andrzej Adam Filip wrote: > Luis Rodrigo Gallardo Cruz wrote: > > Could you test with the version from sid? > > Also, if you could obtain a backtrace, it would be enormously helpful. > > I have used modified startup script to start liferea-bin under gdb. > Below please find tail of the debug output: > > Program received signal SIGSEGV, Segmentation fault. > [Switching to Thread 0xb72eab20 (LWP 21768)] > 0xb7ef4c1b in mozsupport_set_zoom () from /usr/lib/liferea/liblihtmlx.so Please send the whole backtrace as an attachment. -- Rodrigo Gallardo GPG-Fingerprint: 7C81 E60C 442E 8FBC D975 2F49 0199 8318 ADC9 BC28 signature.asc Description: Digital signature
Bug#454184: liferea: "Segmentation fault" during startup on lenny
Luis Rodrigo Gallardo Cruz wrote: > On Mon, Dec 03, 2007 at 08:36:41PM +0100, Andrzej Filip wrote: >> Below please find tail of output produced by >> liferea --debug-all --debug-verbose >> >> TRACE: + update_request_new >> TRACE: - update_request_new >> TRACE: - feedlist_auto_update >> GUI: Setting threePane mode: off >> UPDATE: download result - HTTP status: 200, error: 0, netio error:0, >> data: 138812600 >> UPDATE: request finished >> UPDATE: waiting for request... >> UPDATE: processing received request (http://art.gnome.org/backend.php) >> UPDATE: downloading http://art.gnome.org/backend.php >> GUI: Setting threePane mode: off >> Segmentation fault > > Could you test with the version from sid? > Also, if you could obtain a backtrace, it would be enormously helpful. I have used modified startup script to start liferea-bin under gdb. Below please find tail of the debug output: Program received signal SIGSEGV, Segmentation fault. [Switching to Thread 0xb72eab20 (LWP 21768)] 0xb7ef4c1b in mozsupport_set_zoom () from /usr/lib/liferea/liblihtmlx.so -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#445834: eGroupWare 1.4.002 still in experimental in Debian
Hi Peter, by chance I've seen this bug explaining why eGroupWare still sits in experimental. Is there a way to automatically subscribe me to these kind of bugs, so I or the eGroupWare project in general can react? Some first comments on the issues you mentioned: - There is no migration path from the old LDAP addressbook to the new one. The releasenotes (www.egroupware.org/wiki/releasenotes1.4) contain a link describing the changes in addressbook (www.egroupware.org/wiki/AddresbookAccountsConcept) which contains at the end a link describing how to Update an LDAP based addressbook (www.egroupware.org/egroupware/index.php?menuaction=phpbrain.uikb.view_article&art_id=57). As LDAP is used by quite a small percentage of our users (with usually a high sysadmin skill level), we choose to not provide a more automatized procedure for the upgrade. There also a readme describing the new LDAP addressbook backend, linked right where you switch the addressbook from SQL to LDAP (also offering automatized export SQL --> LDAP): www.egroupware.org/egroupware/addressbook/doc/README - Addressbook ACLs change meaning without notice, meaning people won't be able to read what they used to be able to. This might be an other documentation issue, as there are some reasons not to do an automatized conversion: it might not always do what's desired. The issues can be resolved easily by each user by moving the contacts he want to share into the appropriate group addressbook. We might have an automatic solution moving all non-private contacts which are available via a group-grant to other group-members, it the respective group addressbook. We choose not to do that automatic, as it might not always give you the expected result, eg. when you made a contact available to multiple groups, while other people made there contacts available to an other set of groups. There's been several mails on the lists describing in detail what to do: 3 clicks by each user or one line of SQL by the admin and the issue is fixed - Shared folders no longer work with Felamimail and Courier IMAP. Unfortunately the FMail developer abandoned the current FMail codebase and noone else fixed that bug so far, thought I'm not even sure there's a bug report for it in the projects bug tracker. - icalsrv is completely broken. Really. You are talking about 1.4.002? Many people reported it working better then ever (specially with Lightning/Sunbird) in 1.4.002. There was a bug with one of the other iCal clients with the content-type, which was fixed after 1.4.002 in svn and which will be included in the next maintainance release 1.4.003 How can we actively work together to resolve these issues and get a current eGroupWare versions again in Debian? Ralf eGroupWare admin -- Ralf Becker eGroupWare Training & Support ==> http://www.egroupware-support.de Outdoor Unlimited Training GmbH [www.outdoor-training.de] Handelsregister HRB Kaiserslautern 3587 Geschäftsführer Birgit und Ralf Becker Leibnizstr. 17, 67663 Kaiserslautern, Germany Telefon +49 (0)631 31657-0
Bug#454136: marked as done (libmono-addins0.2-cil: Tomboy crashes due to absent Mono.Addins 0.2.0.0 assembly)
Your message dated Mon, 03 Dec 2007 22:17:02 + with message-id <[EMAIL PROTECTED]> and subject line Bug#454136: fixed in cli-common 0.5.1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: libmono-addins0.2-cil Version: 0.3~svn.r90520-1 Severity: normal After updating libmono-addins0.2-cil this morning, Tomboy no longer starts. It reports the following: [DEBUG]: NoteManager created with note path "/home/paul/.tomboy". ** (Tomboy:5763): WARNING **: The following assembly referenced from /usr/lib/tomboy/Tomboy.exe could not be loaded: Assembly: Mono.Addins(assemblyref_index=7) Version:0.2.0.0 Public Key: 0738eb9f132ed756 The assembly was not found in the Global Assembly Cache, a path listed in the MONO_PATH environment variable, or in the location of the executing assembly (/usr/lib/tomboy). ** (Tomboy:5763): WARNING **: Could not load file or assembly 'Mono.Addins, Version=0.2.0.0, Culture=neutral, PublicKeyToken=0738eb9f132ed756' or one of its dependencies. ** (Tomboy:5763): WARNING **: Missing method .ctor in assembly /usr/lib/tomboy/Tomboy.exe, type Mono.Addins.AddinEventHandler Unhandled Exception: System.IO.FileNotFoundException: Could not load file or assembly 'Mono.Addins, Version=0.2.0.0, Culture=neutral, PublicKeyToken=0738eb9f132ed756' or one of its dependencies. File name: 'Mono.Addins, Version=0.2.0.0, Culture=neutral, PublicKeyToken=0738eb9f132ed756' at <0x0> at Tomboy.AddinManager..ctor (System.String tomboy_conf_dir) [0x0] at Tomboy.NoteManager.CreateAddinManager () [0x0] at Tomboy.NoteManager..ctor (System.String directory, System.String backup_directory) [0x0] at Tomboy.NoteManager..ctor (System.String directory) [0x0] at Tomboy.Tomboy.Main (System.String[] args) [0x0] Regards, Paul -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (102, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.22-2-amd64 (SMP w/2 CPU cores) Locale: LANG=C, LC_CTYPE=nl_NL.UTF8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages libmono-addins0.2-cil depends on: ii cli-common0.5.0 common files between all CLI packa ii libc6 2.7-3 GNU C Library: Shared libraries ii libmono-corlib1.0-cil 1.2.5.1-2 Mono core library (1.0) ii libmono-sharpzip0.84-cil 1.2.5.1-2 Mono SharpZipLib library ii libmono-system1.0-cil 1.2.5.1-2 Mono System libraries (1.0) ii mono-runtime 1.2.5.1-2 Mono runtime libmono-addins0.2-cil recommends no packages. -- no debconf information --- End Message --- --- Begin Message --- Source: cli-common Source-Version: 0.5.1 We believe that the bug you reported is fixed in the latest version of cli-common, which is due to be installed in the Debian FTP archive: cli-common-dev_0.5.1_all.deb to pool/main/c/cli-common/cli-common-dev_0.5.1_all.deb cli-common_0.5.1.dsc to pool/main/c/cli-common/cli-common_0.5.1.dsc cli-common_0.5.1.tar.gz to pool/main/c/cli-common/cli-common_0.5.1.tar.gz cli-common_0.5.1_all.deb to pool/main/c/cli-common/cli-common_0.5.1_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Mirco Bauer <[EMAIL PROTECTED]> (supplier of updated cli-common package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 03 Dec 2007 20:52:44 +0100 Source: cli-common Binary: cli-common-dev cli-common Architecture: source all Version: 0.5.1 Distribution: unstable Urgency: low Maintainer: Debian Mono Group <[EMAIL PROTECTED]> Changed-By: Mirco Bauer <[EMAIL PROTECTED]> Description: cli-common - common files between all CLI packages cli-common-dev - common files for building CLI packages Closes: 454136 Changes: cli-common (0.5.1) unstable; urgency=low . * Mirco 'meebey' Bauer: + Moved policy-install script from cli-common-dev to cli-common package, and added needed Replaces field to cli-common in debian/control. (Closes: #454136)
Bug#453804: marked as done (stellarium: segfaults on startup)
Your message dated Mon, 03 Dec 2007 22:02:09 + with message-id <[EMAIL PROTECTED]> and subject line Bug#453804: fixed in stellarium 0.9.0-2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: stellarium Version: 0.9.0-1+b1 Severity: grave Hi, I installed stellarium on my Debian box (details below) and invoked it from commandline inside gnome-terminal. The splash screen came up with a progress bar and after the progress bar hit the end, it segfaulted. Here is the info printed on gnome-terminal. I have tagged it as "grave" because the package is unusable. It segfaults at startup itself. Ramakrishnan $ stellarium --- [ This is Stellarium 0.9.0 - http://www.stellarium.org ] [ Copyright (C) 2000-2006 Fabien Chereau et al ] --- WARNING StelFileMgr::getUserDir user dir does not exist: /home/vu3rdd/.stellarium File search path set to: 1) /home/vu3rdd/.stellarium 2) /usr/share/stellarium WARNING StelFileMgr::getUserDir user dir does not exist: /home/vu3rdd/.stellarium config file is: /home/vu3rdd/.stellarium/config.ini config file "/home/vu3rdd/.stellarium/config.ini" does not exist - copying the default file. Sky language is en_IN Application language is en_IN Loading Solar System data...(loaded) Loading star data... ZoneArray::create(/usr/share/stellarium/stars/default/stars_0_0v0_0.cat): type: 0 major: 0 minor: 0 level: 0 mag_min: -2000 mag_range: 12800 mag_steps: 256; stars: 5013 ZoneArray::create(/usr/share/stellarium/stars/default/stars_1_0v0_0.cat): type: 0 major: 0 minor: 0 level: 1 mag_min: 6000 mag_range: 12800 mag_steps: 256; stars: 21999 ZoneArray::create(/usr/share/stellarium/stars/default/stars_2_0v0_0.cat): type: 0 major: 0 minor: 0 level: 2 mag_min: 7500 mag_range: 12800 mag_steps: 256; stars: 151516 ZoneArray::create(/usr/share/stellarium/stars/default/stars_3_0v0_0.cat): type: 1 major: 0 minor: 0 level: 3 mag_min: 9000 mag_range: 1500 mag_steps: 30; stars: 434064 finished, max_geodesic_level: 3 Loading location: "Paris", on EarthLoading NGC data... (13226 items loaded [3175 dropped]) Loading NGC name data... ...no position data for Barnard's galaxy ...no position data for Papillon ...no position data for γ Cas nebula( 226 names loaded) Loading Nebula Textures for set default...(109 textures loaded) Loading Constellation boundary data from /usr/share/stellarium/data/constellations_boundaries.dat ... (782 segments loaded) Load star names from /usr/share/stellarium/skycultures/western/star_names.fab Load sci names from /usr/share/stellarium/stars/default/name.fab Loading Cities data for planet Earth...(2069 cities loaded) Localizing TUI for locale: en_IN Script completed. Segmentation fault -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.23.1 (PREEMPT) Locale: LANG=en_IN, LC_CTYPE=en_IN (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages stellarium depends on: ii libc6 2.6.1-1 GNU C Library: Shared libraries ii libcurl3-gnutls 7.17.1-1 Multi-protocol file transfer libra ii libfreetype62.3.5-1+b1 FreeType 2 font engine, shared lib ii libgcc1 1:4.2.2-3GCC support library ii libgl1-mesa-glx [libgl1 7.0.2-2 A free implementation of the OpenG ii libglu1-mesa [libglu1] 7.0.2-2 The OpenGL utility library (GLU) ii libjpeg62 6b-14The Independent JPEG Group's JPEG ii libpng12-0 1.2.15~beta5-3 PNG library - runtime ii libqt4-core 4.3.2-1 Qt 4 core non-GUI functionality ru ii libqt4-gui 4.3.2-1 Qt 4 core GUI functionality runtim ii libsdl-mixer1.2 1.2.8-1 mixer library for Simple DirectMed ii libstdc++6 4.2.2-3 The GNU Standard C++ Library v3 ii libx11-62:1.0.3-7X11 client-side library ii libxext61:1.0.3-2X11 miscellaneous extension librar ii libxi6 2:1.1.3-1X11 Input extension library ii libxmu6 1:1.0.3-1X11 miscellaneous utility library ii libxt6 1:1.0.5-3X11 toolkit intrinsics library ii stellarium-data 0.9.0-1 datafiles for Stellarium, a real-t ii zlib1g 1:1.2.3.3.dfsg-6 c
Bug#454184: liferea: "Segmentation fault" during startup on lenny
Luis Rodrigo Gallardo Cruz wrote: > On Mon, Dec 03, 2007 at 10:31:36PM +0100, Andrzej Adam Filip wrote: >> Luis Rodrigo Gallardo Cruz wrote: >>> Could you test with the version from sid? >>> Also, if you could obtain a backtrace, it would be enormously helpful. >> I have used modified startup script to start liferea-bin under gdb. >> Below please find tail of the debug output: >> >> Program received signal SIGSEGV, Segmentation fault. >> [Switching to Thread 0xb72eab20 (LWP 21768)] >> 0xb7ef4c1b in mozsupport_set_zoom () from /usr/lib/liferea/liblihtmlx.so > > Please send the whole backtrace as an attachment. #0 0xb7edac1b in mozsupport_set_zoom () from /usr/lib/liferea/liblihtmlx.so #1 0x08092d6a in ui_mainwindow_finish () #2 0x0807fdba in main () -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#454205: xserver-xorg: X hangs on ALT-TAB or pull-down menu use with xorg and icewm
Processing commands for [EMAIL PROTECTED]: > severity 454205 important Bug#454205: xserver-xorg: X hangs on ALT-TAB or pull-down menu use with xorg and icewm Severity set to `important' from `grave' > kthxbye Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#454205: xserver-xorg: X hangs on ALT-TAB or pull-down menu use with xorg and icewm
severity 454205 important kthxbye On Mon, Dec 3, 2007 at 14:26:58 -0800, theklown wrote: > Package: xserver-xorg > Version: 1:7.3+7 > Severity: grave > Justification: causes non-serious data loss > well, sorry, but no. > X hangs, chewing up 99% of the CPU time on my hosts under the following > conditions (so far): > 1. The user presses ALT-TAB. > 2. The user attempts to move a window to another view (or to all > views). > 3. The user selects options from the pull-down menu. > If you can find out where the server is stuck, that would be helpful. Cheers, Julien -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]