Re: fixing in oldstable before unstable (was Re: Wheezy update of tre?)

2016-10-21 Thread Ola Lundqvist
Hi

That is a good practice, yes.

// Ola

On 21 October 2016 at 01:43, Holger Levsen  wrote:

> On Thu, Oct 20, 2016 at 11:21:14PM +0200, Bálint Réczey wrote:
> > I think it would be a good approach to file bugs against unstable, offer
> > help in updating the version and if we don't get a response NMU the
> > affected package in unstable according to NMU rules.
>
> yes, that.
>
> or at least amend LTS-policies to always file a bug if one fixes a bug
> in LTS which is still open in sid.
>
>
> --
> cheers,
> Holger
>



-- 
 --- Inguza Technology AB --- MSc in Information Technology 
/  o...@inguza.comFolkebogatan 26\
|  o...@debian.org   654 68 KARLSTAD|
|  http://inguza.com/Mobile: +46 (0)70-332 1551 |
\  gpg/f.p.: 7090 A92B 18FE 7994 0C36 4FE4 18A1 B1CF 0FE5 3DD9  /
 ---


Re: graphicsmagick security update

2016-10-21 Thread Brian May
Luciano Bello  writes:

> On Wednesday 19 October 2016 09.07.42 László Böszörményi wrote:
>> In short, I didn't have enough time and information of the individual
>> fixes. Yesterday fixed other three vulnerabilities for Sid, will apply
>> those to Jessie as well.
>
> Hi Laszlo (and Brian)
>Brian mentioned that he was working in some patches for stable. Is there 
> any repo where he can merge them?

No, not stable, oldstable (LTS). I uploaded an update for oldstable
several days ago, however there are more security issues that I haven't
patched yet.

> The security tracker are link to each other. Usually it is up to the 
> maintainer to get the patches around. But it's true, we should find a better 
> way to share patches with derivatives.

In this case I am part of the LTS team. However, yes, I agree, it would
be good if both security teams and LTS teams had a better way of sharing
patches. Unfortunately, I have no good ideas on how to do this.
-- 
Brian May 



Wheezy update of dwarfutils?

2016-10-21 Thread Chris Lamb
Hello dear maintainer(s),

the Debian LTS team would like to fix the security issues which are
currently open in the Wheezy version of dwarfutils:
https://security-tracker.debian.org/tracker/source-package/dwarfutils

Note that these appear to be a new round of issues not covered by the
recent DLA 669-1 announcement:

  https://lists.debian.org/debian-lts-announce/2016/10/msg00024.html

Would you like to take care of this yourself?

If yes, please follow the workflow we have defined here:
https://wiki.debian.org/LTS/Development

If that workflow is a burden to you, feel free to just prepare an
updated source package and send it to debian-lts@lists.debian.org
(via a debdiff, or with an URL pointing to the source package,
or even with a pointer to your packaging repository), and the members
of the LTS team will take care of the rest. Indicate clearly whether you
have tested the updated package or not.

If you don't want to take care of this update, it's not a problem, we
will do our best with your package. Just let us know whether you would
like to review and/or test the updated package before it gets released.

You can also opt-out from receiving future similar emails in your
answer and then the LTS Team will take care of dwarfutils updates
for the LTS releases. (In case we don't get any answer for months,
we may also take it as an opt-out, too.)

Thank you very much.

Chris Lamb,
  on behalf of the Debian LTS team.

PS: A member of the LTS team might start working on this update at
any point in time. You can verify whether someone is registered
on this update in this file:
https://anonscm.debian.org/viewvc/secure-testing/data/dla-needed.txt?view=markup


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-



Re: fixing in oldstable before unstable (was Re: Wheezy update of tre?)

2016-10-21 Thread Guido Günther
Hi Holger,
On Thu, Oct 20, 2016 at 11:43:06PM +, Holger Levsen wrote:
> On Thu, Oct 20, 2016 at 11:21:14PM +0200, Bálint Réczey wrote:
> > I think it would be a good approach to file bugs against unstable, offer
> > help in updating the version and if we don't get a response NMU the
> > affected package in unstable according to NMU rules.
> 
> yes, that.
> 
> or at least amend LTS-policies to always file a bug if one fixes a bug
> in LTS which is still open in sid.

I think the later part is already LTS policy since at latest
Debconf 16. It's up to us to handle things like that.

Cheers,
 -- Guido



Re: fixing in oldstable before unstable (was Re: Wheezy update of tre?)

2016-10-21 Thread Chris Lamb
Guido Günther wrote:

> > or at least amend LTS-policies to always file a bug if one fixes a bug
> > in LTS which is still open in sid.
> 
> I think the later part is already LTS policy since at latest
> Debconf 16. It's up to us to handle things like that.

Let's make this more concrete. Do we have a template? If not, how about:


  To: sub...@bugs.debian.org
  Subject: ${SOURCE}: CVE-2016-1234: ${CVE_DESCRIPTION}

  Source: ${SOURCE}
  Version: ${VERSION}
  Severity: serious
  Tags: security
  X-Debbugs-Cc: debian-lts@lists.debian.org

  Hi,

  The following vulnerabilities have been published for ${SOURCE}:

  https://security-tracker.debian.org/tracker/CVE-2016-1234
  ${CVE_DESCRIPTION}

  If you fix the vulnerability please also make sure to include the
  CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

  Please adjust the affected versions in the BTS as needed.


Open questions for me are:

a) What Version we submit with? Wheezy's? Or unstable's, and then follow-up
with "found"?


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-



Re: fixing in oldstable before unstable (was Re: Wheezy update of tre?)

2016-10-21 Thread Guido Günther
On Fri, Oct 21, 2016 at 11:14:24AM +0100, Chris Lamb wrote:
> Guido Günther wrote:
> 
> > > or at least amend LTS-policies to always file a bug if one fixes a bug
> > > in LTS which is still open in sid.
> > 
> > I think the later part is already LTS policy since at latest
> > Debconf 16. It's up to us to handle things like that.
> 
> Let's make this more concrete. Do we have a template? If not, how about:
> 
> 
>   To: sub...@bugs.debian.org
>   Subject: ${SOURCE}: CVE-2016-1234: ${CVE_DESCRIPTION}
> 
>   Source: ${SOURCE}
>   Version: ${VERSION}
>   Severity: serious
>   Tags: security
>   X-Debbugs-Cc: debian-lts@lists.debian.org
> 
>   Hi,
> 
>   The following vulnerabilities have been published for ${SOURCE}:
> 
>   https://security-tracker.debian.org/tracker/CVE-2016-1234
>   ${CVE_DESCRIPTION}
> 
>   If you fix the vulnerability please also make sure to include the
>   CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
>   Please adjust the affected versions in the BTS as needed.

I'd just use bin/report-vuln ?

> Open questions for me are:
> 
> a) What Version we submit with? Wheezy's? Or unstable's, and then follow-up
> with "found"?

I'd say unstable and then "found".
Cheers,
 -- Guido



Re: fixing in oldstable before unstable (was Re: Wheezy update of tre?)

2016-10-21 Thread Ola Lundqvist
Hi

Do we really want LTS mailinglist filled with a lot of unstable bug updates?

I think we should file a bug with unstable version number, but write that
the origin is that it was found in wheezy. Is that the same as "found"
follow up?
The other alternative is that we file the bug with wheezy version number
and then close that one in wheezy-security upload.

If we file the bug with wheezy version number and not closing it in wheezy
upload, then it will look like the issue is still there in bts.

// Ola

On 21 October 2016 at 12:27, Guido Günther  wrote:

> On Fri, Oct 21, 2016 at 11:14:24AM +0100, Chris Lamb wrote:
> > Guido Günther wrote:
> >
> > > > or at least amend LTS-policies to always file a bug if one fixes a
> bug
> > > > in LTS which is still open in sid.
> > >
> > > I think the later part is already LTS policy since at latest
> > > Debconf 16. It's up to us to handle things like that.
> >
> > Let's make this more concrete. Do we have a template? If not, how about:
> >
> >
> >   To: sub...@bugs.debian.org
> >   Subject: ${SOURCE}: CVE-2016-1234: ${CVE_DESCRIPTION}
> >
> >   Source: ${SOURCE}
> >   Version: ${VERSION}
> >   Severity: serious
> >   Tags: security
> >   X-Debbugs-Cc: debian-lts@lists.debian.org
> >
> >   Hi,
> >
> >   The following vulnerabilities have been published for ${SOURCE}:
> >
> >   https://security-tracker.debian.org/tracker/CVE-2016-1234
> >   ${CVE_DESCRIPTION}
> >
> >   If you fix the vulnerability please also make sure to include the
> >   CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> >
> >   Please adjust the affected versions in the BTS as needed.
>
> I'd just use bin/report-vuln ?
>
> > Open questions for me are:
> >
> > a) What Version we submit with? Wheezy's? Or unstable's, and then
> follow-up
> > with "found"?
>
> I'd say unstable and then "found".
> Cheers,
>  -- Guido
>
>


-- 
 --- Inguza Technology AB --- MSc in Information Technology 
/  o...@inguza.comFolkebogatan 26\
|  o...@debian.org   654 68 KARLSTAD|
|  http://inguza.com/Mobile: +46 (0)70-332 1551 |
\  gpg/f.p.: 7090 A92B 18FE 7994 0C36 4FE4 18A1 B1CF 0FE5 3DD9  /
 ---


Re: fixing in oldstable before unstable (was Re: Wheezy update of tre?)

2016-10-21 Thread Chris Lamb
Guido Günther wrote:

> I'd just use bin/report-vuln ?

… one of these days I'm going to look at everything in bin/* and actually
remember what it does :)

(Yay, for saving myself writing such a thing!)

> I'd say unstable and then "found".

How come, out of interest? AIUI the tradeoff here is that if the "found" step
gets skipped, the BTS does not believe it is vulnerable and thus it won't get
(correctly) kicked out of testing, etc. etc.


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-



openjdk-7 CVEs

2016-10-21 Thread Guido Günther
Hi,
openjdk-7 is unclaimed in dla-needed.txt but I wonder if you guys have
already a plans for fixing these. Cherry-picking patches or waiting for
a new Iced Tea release? Since Wheezy and Jessie currently ship the same
version I could prepare the update.
Cheers,
 -- Guido



Re: fixing in oldstable before unstable (was Re: Wheezy update of tre?)

2016-10-21 Thread Jonas Meurer
Am 20.10.2016 um 18:31 schrieb Markus Koschany:
> On 20.10.2016 17:15, Holger Levsen wrote:
>> On Thu, Oct 20, 2016 at 04:52:07PM +0200, Markus Koschany wrote:
>>> Fixing bugs in unstable or any other suite in Debian is not a part of
>>> Wheezy LTS. 
>>
>> Of course it's more work and of course it might be difficult.
> 
> It's not just about "more work", it is mainly about how you define the
> scope of a long term support release. We have paid and unpaid
> contributors. You can't force volunteers to work on something. By
> declaring it mandatory to fix bugs in unstable, you increase their
> workload and make it less likely that someone will fix a bug in Wheezy LTS.
> 
> As for paid contributors: They are paid to keep Wheezy secure and to
> support users of this distribution. Of course you can extend the scope
> of Wheezy LTS to unstable but then you need to ask all involved parties,
> especially the sponsors, if they agree with this change. You get paid
> for repairing my car if you repair my other car too, just doesn't work.

It's true that sponsors donate their money for getting security
vulnerabilites fixed in *Wheezy* (or whatever oldstable is at the
moment), but in my eyes a bugreport about these very security
vulnerabilites could be seen as part of the LTS work. I don't even think
that we explicitly have to ask for permission here.

Isn't it more about the workflow we agree on in Debian regarding
security vulnerabilites? So far the agreed practice (and prefered by the
Security Team) is to first report the bugs against the version in
unstable (if this version is vulnerable as well). And as this is the
common workflow in our project, triaging security vulnerabilites as part
of the paid LTS work should include reporting these bugs, no?

>> But if it's not been done, the fix might get lost and your work was void.
> 
> Why would the work get lost? The patch for Wheezy won't vanish and a fix
> for unstable is often a totally different issue.

The upload to wheezy-security will not get lost, but the security
vulnerability might not get tracked further. If we write a bugreport,
it's ensured that the maintainer(s) are aware of the vulnerability.

So if the Security Team doesn't disagree, I'm much in favour of doing
the bug reporting against unstable as part of the LTS Team work. If we
can use their template for doing so, even better.

Cheers,
 jonas



Re: openjdk-7 CVEs

2016-10-21 Thread Roberto C . Sánchez
On Fri, Oct 21, 2016 at 02:54:18PM +0200, Guido Günther wrote:
> Hi,
> openjdk-7 is unclaimed in dla-needed.txt but I wonder if you guys have
> already a plans for fixing these. Cherry-picking patches or waiting for
> a new Iced Tea release? Since Wheezy and Jessie currently ship the same
> version I could prepare the update.
> Cheers,
>  -- Guido
> 

I also could help (once I finish the ghostscript LTS update).  I have
prepared the last several LTS updates for ICU, which have typically
involved digging through the commits to the JDK source to identify and
then backport the proper fixes.

Regards,

-Roberto

-- 
Roberto C. Sánchez
http://people.connexer.com/~roberto
http://www.connexer.com



Re: openjdk-7 CVEs

2016-10-21 Thread Markus Koschany
On 21.10.2016 14:54, Guido Günther wrote:
> Hi,
> openjdk-7 is unclaimed in dla-needed.txt but I wonder if you guys have
> already a plans for fixing these. Cherry-picking patches or waiting for
> a new Iced Tea release? Since Wheezy and Jessie currently ship the same
> version I could prepare the update.
> Cheers,
>  -- Guido

We usually backport the OpenJDK releases which are prepared in experimental.

Regards,

Markus




signature.asc
Description: OpenPGP digital signature


Re: fixing in oldstable before unstable (was Re: Wheezy update of tre?)

2016-10-21 Thread Markus Koschany
On 21.10.2016 14:57, Jonas Meurer wrote:
> Am 20.10.2016 um 18:31 schrieb Markus Koschany:
>> On 20.10.2016 17:15, Holger Levsen wrote:
[...]

>>> But if it's not been done, the fix might get lost and your work was void.
>>
>> Why would the work get lost? The patch for Wheezy won't vanish and a fix
>> for unstable is often a totally different issue.
> 
> The upload to wheezy-security will not get lost, but the security
> vulnerability might not get tracked further. If we write a bugreport,
> it's ensured that the maintainer(s) are aware of the vulnerability.
> 
> So if the Security Team doesn't disagree, I'm much in favour of doing
> the bug reporting against unstable as part of the LTS Team work. If we
> can use their template for doing so, even better.

We were talking about making it mandatory to _fix_ CVEs in unstable
first. I totally agree with submitting bug reports against affected
packages as part of the LTS workflow.

Regards,

Markus







signature.asc
Description: OpenPGP digital signature


Re: openjdk-7 CVEs

2016-10-21 Thread Guido Günther
On Fri, Oct 21, 2016 at 03:02:26PM +0200, Markus Koschany wrote:
> On 21.10.2016 14:54, Guido Günther wrote:
> > Hi,
> > openjdk-7 is unclaimed in dla-needed.txt but I wonder if you guys have
> > already a plans for fixing these. Cherry-picking patches or waiting for
> > a new Iced Tea release? Since Wheezy and Jessie currently ship the same
> > version I could prepare the update.
> > Cheers,
> >  -- Guido
> 
> We usually backport the OpenJDK releases which are prepared in experimental.

Feel free to claim it then - I'll grab another one.
Cheers,
 -- Guido



Re: openjdk-7 CVEs

2016-10-21 Thread Markus Koschany
On 21.10.2016 15:07, Guido Günther wrote:
> On Fri, Oct 21, 2016 at 03:02:26PM +0200, Markus Koschany wrote:
>> On 21.10.2016 14:54, Guido Günther wrote:
>>> Hi,
>>> openjdk-7 is unclaimed in dla-needed.txt but I wonder if you guys have
>>> already a plans for fixing these. Cherry-picking patches or waiting for
>>> a new Iced Tea release? Since Wheezy and Jessie currently ship the same
>>> version I could prepare the update.
>>> Cheers,
>>>  -- Guido
>>
>> We usually backport the OpenJDK releases which are prepared in experimental.
> 
> Feel free to claim it then - I'll grab another one.
> Cheers,
>  -- Guido

Please don't get me wrong. I just wanted to point out that we
don't/can't backport patches because Oracle is rather secretive in this
regard. Normally the OpenJDK maintainer uploads a new release to
experimental and we backport and test it then on Wheezy. So please go
ahead with the update.

PS.: I'm subscribed to debian-lts.

Cheers,

Markus




signature.asc
Description: OpenPGP digital signature


Re: Call for advice and testing of nss (and nspr) and intention to upload correction

2016-10-21 Thread Ola Lundqvist
Hi Guido

Thanks a lot for the information. I'll enable this and will also run
abi-compliance check tool.
Is it this [1] one you have used?

[1] https://lvc.github.io/abi-compliance-checker/

Best regards

// Ola

On 20 October 2016 at 23:48, Guido Günther  wrote:

> Hi Ola,
> On Thu, Oct 20, 2016 at 11:15:29PM +0200, Ola Lundqvist wrote:
> > Hi LTS team, Mozilla maintainers, Mike and Florian
> >
> > I have been working on the security problem reported in nss (and nspr).
> > https://security-tracker.debian.org/tracker/TEMP-000-583651
> > It is about unprotected environment variables.
> >
> > I did a check on what Florian Weimer had done for jessie-security and
> > the solution there was simply to package the new upstream release. So
> > I decided to do that approach as well. The advantage with this is that
> > we will not only have this problem solved, but also a few more.
> >
> > TEMP-000-583651 (nspr and nss)
> > CVE-2014-3566
> > CVE-2014-1490
> > CVE-2013-1740
> >
> > The disadvantage is that we are not playing safe. However it looks
> > backwards compatible, but you never know.
> >
> > So all in all I have produced the following:
> >
> > nspr:
> > http://apt.inguza.net/wheezy-security/nspr
> > This is essentially a mimic of the jessie-security package changes.
> >
> > nss:
> > http://apt.inguza.net/wheezy-security/nss
> > This is essentially a re-build of the jessie-security package with
> > changes file kept and only updated with one new entry.
> >
> > Call for advice:
> > 1) Do you have an opinion about the fact that I backport new upstream
> release?
>
> See my discussion with the release team abot this:
>
>   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=824872
>
> > 2) Will we have a build problem as nss depends on the latest nspr? I
> > guess I shall upload nspr first.
>
> See my runs of the abi compliance checker in the above URL.
>
> > 3) Shall I create one DLA covering both packages or shall I just
> > produce one DLA covering both nspr and nss?
>
> The rule is one DLA per package AFAIK.
>
> >  I think one DLA is the best as both are needed to solve the problem
> > reported. But maybe that is against some practice. If you think I
> > shall write two, then please advice me what to write in the DLA for
> > nspr.
> >
> > Call for testing:
> > 4) As this package can have a rather big impact on lot of other
> > packages it would be good if all of you install the new version (nss
> > is the important one) to see if it works for you.
>
> See
>
>https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806207
>https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806639
>https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809723
>
> that enable the internal test suites and add some autopkgtests. This
> should help to gain some confidence.
> Cheers,
>  -- Guido
>
> >
> > I did not produce a debdiff as that diff was way too large to be useful.
> >
> > I have installed it myself but I have not been able to verify that the
> > tools using it is really working. Most are GUI tools and I do not have
> > a GUI environment to test wheezy in. The libnss3-tools package seems
> > to work fine to the limit I was able to check.
> >
> > I have not tried to reproduce the problem as the report was too vague
> > to give any good advice on what environment variable that could
> > actually cause a problem.
> >
> > If I do not hear any objections in four days I will upload anyway.
> >
> > Thanks in advance
> >
> > // Ola
> >
> > --
> >  --- Inguza Technology AB --- MSc in Information Technology 
> > |  o...@inguza.com  Folkebogatan 26
> > |  o...@debian.org  654 68 KARLSTAD
> > |  http://inguza.com/Mobile: +46 (0)70-332 1551
> > |  gpg/f.p.: 7090 A92B 18FE 7994 0C36 4FE4 18A1 B1CF 0FE5 3DD9
> >
>



-- 
 --- Inguza Technology AB --- MSc in Information Technology 
/  o...@inguza.comFolkebogatan 26\
|  o...@debian.org   654 68 KARLSTAD|
|  http://inguza.com/Mobile: +46 (0)70-332 1551 |
\  gpg/f.p.: 7090 A92B 18FE 7994 0C36 4FE4 18A1 B1CF 0FE5 3DD9  /
 ---


Re: Call for advice and testing of nss (and nspr) and intention to upload correction

2016-10-21 Thread Guido Günther
On Fri, Oct 21, 2016 at 11:16:54PM +0200, Ola Lundqvist wrote:
> Hi Guido
> 
> Thanks a lot for the information. I'll enable this and will also run
> abi-compliance check tool.
> Is it this [1] one you have used?
> 
> [1] https://lvc.github.io/abi-compliance-checker/

IIRC I've used the abi-compliance-checker Debian package.
Cheers,
 -- Guido

> 
> Best regards
> 
> // Ola
> 
> On 20 October 2016 at 23:48, Guido Günther  wrote:
> 
> > Hi Ola,
> > On Thu, Oct 20, 2016 at 11:15:29PM +0200, Ola Lundqvist wrote:
> > > Hi LTS team, Mozilla maintainers, Mike and Florian
> > >
> > > I have been working on the security problem reported in nss (and nspr).
> > > https://security-tracker.debian.org/tracker/TEMP-000-583651
> > > It is about unprotected environment variables.
> > >
> > > I did a check on what Florian Weimer had done for jessie-security and
> > > the solution there was simply to package the new upstream release. So
> > > I decided to do that approach as well. The advantage with this is that
> > > we will not only have this problem solved, but also a few more.
> > >
> > > TEMP-000-583651 (nspr and nss)
> > > CVE-2014-3566
> > > CVE-2014-1490
> > > CVE-2013-1740
> > >
> > > The disadvantage is that we are not playing safe. However it looks
> > > backwards compatible, but you never know.
> > >
> > > So all in all I have produced the following:
> > >
> > > nspr:
> > > http://apt.inguza.net/wheezy-security/nspr
> > > This is essentially a mimic of the jessie-security package changes.
> > >
> > > nss:
> > > http://apt.inguza.net/wheezy-security/nss
> > > This is essentially a re-build of the jessie-security package with
> > > changes file kept and only updated with one new entry.
> > >
> > > Call for advice:
> > > 1) Do you have an opinion about the fact that I backport new upstream
> > release?
> >
> > See my discussion with the release team abot this:
> >
> >   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=824872
> >
> > > 2) Will we have a build problem as nss depends on the latest nspr? I
> > > guess I shall upload nspr first.
> >
> > See my runs of the abi compliance checker in the above URL.
> >
> > > 3) Shall I create one DLA covering both packages or shall I just
> > > produce one DLA covering both nspr and nss?
> >
> > The rule is one DLA per package AFAIK.
> >
> > >  I think one DLA is the best as both are needed to solve the problem
> > > reported. But maybe that is against some practice. If you think I
> > > shall write two, then please advice me what to write in the DLA for
> > > nspr.
> > >
> > > Call for testing:
> > > 4) As this package can have a rather big impact on lot of other
> > > packages it would be good if all of you install the new version (nss
> > > is the important one) to see if it works for you.
> >
> > See
> >
> >https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806207
> >https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806639
> >https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809723
> >
> > that enable the internal test suites and add some autopkgtests. This
> > should help to gain some confidence.
> > Cheers,
> >  -- Guido
> >
> > >
> > > I did not produce a debdiff as that diff was way too large to be useful.
> > >
> > > I have installed it myself but I have not been able to verify that the
> > > tools using it is really working. Most are GUI tools and I do not have
> > > a GUI environment to test wheezy in. The libnss3-tools package seems
> > > to work fine to the limit I was able to check.
> > >
> > > I have not tried to reproduce the problem as the report was too vague
> > > to give any good advice on what environment variable that could
> > > actually cause a problem.
> > >
> > > If I do not hear any objections in four days I will upload anyway.
> > >
> > > Thanks in advance
> > >
> > > // Ola
> > >
> > > --
> > >  --- Inguza Technology AB --- MSc in Information Technology 
> > > |  o...@inguza.com  Folkebogatan 26
> > > |  o...@debian.org  654 68 KARLSTAD
> > > |  http://inguza.com/Mobile: +46 (0)70-332 1551
> > > |  gpg/f.p.: 7090 A92B 18FE 7994 0C36 4FE4 18A1 B1CF 0FE5 3DD9
> > >
> >
> 
> 
> 
> -- 
>  --- Inguza Technology AB --- MSc in Information Technology 
> /  o...@inguza.comFolkebogatan 26\
> |  o...@debian.org   654 68 KARLSTAD|
> |  http://inguza.com/Mobile: +46 (0)70-332 1551 |
> \  gpg/f.p.: 7090 A92B 18FE 7994 0C36 4FE4 18A1 B1CF 0FE5 3DD9  /
>  ---