Bug#449348: le: please rebuild against libncursesw5
Package: le Version: 1.13.4-1 Severity: normal Tags: l10n The upstream package description and freshmeat.net article mention that le is able to edit text in multibyte encodings. This is important, because Debian defaults to UTF-8 based locales now. However, the Debian "le" package cannot do this, because it is built against libncurses5, not libncursesw5. If the libncursesw5-dev package is installed, the package is built correctly with UTF-8 support, so this is just a simple matter of changing libncurses5-dev to libncursesw5-dev in Build-Depends. -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.22-2-686 (SMP w/2 CPU cores) Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages le depends on: ii libc6 2.6.1-1+b1 GNU C Library: Shared libraries ii libgcc1 1:4.2.2-3 GCC support library ii libncurses5 5.6+20071013-1 Shared libraries for terminal hand le recommends no packages. -- no debconf information -- Alexander E. Patrakov -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#448587: xmp new version available
I'd like to pick this... http://gnu.ethz.ch/debian/xmp/xmp_2.4.1-1.dsc http://gnu.ethz.ch/debian/xmp/xmp_2.4.1.orig.tar.gz http://gnu.ethz.ch/debian/xmp/xmp_2.4.1-1.diff.gz Cheers, Guerkan -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#449368: axel: segmentation fault when FTP CWD fails
Package: axel Version: 1.0b-3 Severity: normal $ axel -n 4 http://www.mirrorservice.org/sites/releases.ubuntu.com/edgy/ubuntu-6.10-alternate-i386.iso Initializing download: http://www.mirrorservice.org/sites/releases.ubuntu.com/edgy/ubuntu-6.10-alternate-i386.iso [1]13980 segmentation fault (core dumped) axel -n 4 Running a debug build ... [snip...] 230 Logged in for anonymous FTP fd(3)<--TYPE I fd(3)-->200 Type set to I fd(3)<--CWD /sites/releases.ubuntu.com/edgy/ fd(3)-->550 Can't access /sites/releases.ubuntu.com/edgy: No such file or directory fd(-1)<--RETR ubuntu-6.10-alternate-i386.iso [1]14433 segmentation fault (core dumped) ./axel -n 4 -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (900, 'testing'), (800, 'unstable'), (700, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.22-2-686 (SMP w/1 CPU core) Locale: LANG=en_IN, LC_CTYPE=en_IN (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages axel depends on: ii libc6 2.6.1-1+b1 GNU C Library: Shared libraries axel recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#449368: axel: segmentation fault when FTP CWD fails
tags 449368 +patch thanks On 07/11/05 17:56 +0530, Y Giridhar Appaji Nag said ... > fd(3)-->200 Type set to I > fd(3)<--CWD /sites/releases.ubuntu.com/edgy/ > fd(3)-->550 Can't access /sites/releases.ubuntu.com/edgy: No such file or > directory > fd(-1)<--RETR ubuntu-6.10-alternate-i386.iso > [1]14433 segmentation fault (core dumped) ./axel -n 4 Patch attached to fix this. Giridhar -- Y Giridhar Appaji Nag | http://www.appaji.net/ diff -Nur original/axel-1.0b/conn.c axel-1.0b/conn.c --- original/axel-1.0b/conn.c 2005-04-06 23:48:28.0 +0530 +++ axel-1.0b/conn.c 2007-11-05 18:05:14.870237000 +0530 @@ -313,7 +313,8 @@ do { conn->currentbyte = 1; - conn_setup( conn ); + if( !conn_setup( conn ) ) +return( 0 ); conn_exec( conn ); conn_disconnect( conn ); /* Code 3xx == redirect*/ diff -Nur original/axel-1.0b/ftp.c axel-1.0b/ftp.c --- original/axel-1.0b/ftp.c 2001-12-15 23:29:03.0 +0530 +++ axel-1.0b/ftp.c 2007-11-05 18:00:26.236616000 +0530 @@ -87,7 +87,10 @@ ftp_command( conn, "CWD %s", cwd ); if( ftp_wait( conn ) / 100 != 2 ) + { + fprintf( stderr, _("Can't change directory to %s\n"), cwd ); return( 0 ); + } strncpy( conn->cwd, cwd, MAX_STRING ); signature.asc Description: Digital signature
Processed: Re: Bug#449368: axel: segmentation fault when FTP CWD fails
Processing commands for [EMAIL PROTECTED]: > tags 449368 +patch Bug#449368: axel: segmentation fault when FTP CWD fails There were no tags set. Tags added: patch > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#401855: marked as done (scheme48: FTBFS on kfreebsd-i386: kfreebsd-i386 not in the architecture list)
Your message dated Mon, 5 Nov 2007 14:36:05 +0100 (CET) with message-id <[EMAIL PROTECTED]> and subject line scheme48: FTBFS on kfreebsd-i386 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --- Begin Message --- Package: scheme48 Severity: important Version: 1.3-4 The current version fails to build on GNU/kFreeBSD, because kfreebsd-i386 is not listed in the Architecture: field. Could you please add kfreebsd-i386 to the list of the supported architectures? Thanks in advance Petr --- End Message --- --- Begin Message --- Version: 1.3-8 --- End Message ---
Bug#449507: axel: should use strncpy
Package: axel Version: 1.0b-3 Severity: normal Tags: patch axel copies filenames, URLs etc. into fixed size (MAX_STRING in axel.h) buffers. It should use strncpy instead of strcpy. This will avoid some problems like those reported in #196431 Giridhar -- Y Giridhar Appaji Nag | http://www.appaji.net/ -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (900, 'testing'), (800, 'unstable'), (700, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.22-2-686 (SMP w/1 CPU core) Locale: LANG=en_IN, LC_CTYPE=en_IN (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages axel depends on: ii libc6 2.6.1-1+b1 GNU C Library: Shared libraries axel recommends no packages. -- no debconf information diff -Nur original/axel-1.0b/axel.c axel-1.0b/axel.c --- original/axel-1.0b/axel.c 2002-05-03 18:15:11.0 +0530 +++ axel-1.0b/axel.c 2007-11-06 12:23:14.596683000 +0530 @@ -64,7 +64,7 @@ { axel->url = malloc( sizeof( url_t ) ); axel->url->next = axel->url; - strcpy( axel->url->text, (char *) url ); + strncpy( axel->url->text, (char *) url, MAX_STRING ); } else { @@ -72,7 +72,7 @@ u = axel->url = malloc( sizeof( url_t ) ); for( i = 0; i < count; i ++ ) { - strcpy( u->text, res[i].url ); + strncpy( u->text, res[i].url, MAX_STRING ); if( i < count - 1 ) { u->next = malloc( sizeof( url_t ) ); @@ -96,10 +96,10 @@ axel->conn[0].local_if = axel->conf->interfaces->text; axel->conf->interfaces = axel->conf->interfaces->next; - strcpy( axel->filename, axel->conn[0].file ); + strncpy( axel->filename, axel->conn[0].file, MAX_STRING ); http_decode( axel->filename ); if( *axel->filename == 0 ) /* Index page == no fn */ - strcpy( axel->filename, axel->conf->default_filename ); + strncpy( axel->filename, axel->conf->default_filename, MAX_STRING ); if( ( s = strchr( axel->filename, '?' ) ) != NULL && axel->conf->strip_cgi_parameters ) *s = 0; /* Get rid of CGI parameters */ @@ -119,7 +119,7 @@ return( axel ); } s = conn_url( axel->conn ); - strcpy( axel->url->text, s ); + strncpy( axel->url->text, s, MAX_STRING ); if( ( axel->size = axel->conn[0].size ) != INT_MAX ) { if( axel->conf->verbose > 0 ) @@ -128,7 +128,7 @@ /* Wildcards in URL --> Get complete filename */ if( strchr( axel->filename, '*' ) || strchr( axel->filename, '?' ) ) - strcpy( axel->filename, axel->conn[0].file ); + strncpy( axel->filename, axel->conn[0].file, MAX_STRING ); return( axel ); } diff -Nur original/axel-1.0b/conn.c axel-1.0b/conn.c --- original/axel-1.0b/conn.c 2005-04-06 23:48:28.0 +0530 +++ axel-1.0b/conn.c 2007-11-06 12:16:05.675314000 +0530 @@ -74,12 +74,12 @@ *j = '?'; if( i == NULL ) { - strcpy( conn->file, conn->dir ); + strncpy( conn->file, conn->dir, MAX_STRING ); strcpy( conn->dir, "/" ); } else { - strcpy( conn->file, i + 1 ); + strncpy( conn->file, i + 1, MAX_STRING ); strcat( conn->dir, "/" ); } @@ -89,7 +89,7 @@ strncpy( conn->user, conn->host, MAX_STRING ); i = strrchr( conn->user, '@' ); *i = 0; - strcpy( conn->host, i + 1 ); + strncpy( conn->host, i + 1, MAX_STRING ); *conn->pass = 0; } /* If not: Fill in defaults */ @@ -112,7 +112,7 @@ if( ( i = strchr( conn->user, ':' ) ) != NULL ) { *i = 0; - strcpy( conn->pass, i + 1 ); + strncpy( conn->pass, i + 1, MAX_STRING ); } /* Port number? */ if( ( i = strchr( conn->host, ':' ) ) != NULL )
Bug#196431: axel crashes on long urls
tags 196431 +patch thanks On 07/09/14 15:55 +0530, Y Giridhar Appaji Nag said ... > Axel currently cannot handle strings of length over 256 (MAX_STRING in > axel.h) and should exit gracefully. Fix forthcoming. Attached patch ... 1. Exits if the URL is over MAX_STRING in length 2. Increases MAX_STRING to 1024 from 256 to be more useful :) Giridhar -- Y Giridhar Appaji Nag | http://www.appaji.net/ diff -Nur original/axel-1.0b/axel.h axel-1.0b/axel.h --- original/axel-1.0b/axel.h 2002-05-03 18:15:18.0 +0530 +++ axel-1.0b/axel.h 2007-11-06 12:46:50.600754000 +0530 @@ -64,7 +64,7 @@ #endif /* Compiled-in settings */ -#define MAX_STRING 256 +#define MAX_STRING 1024 #define MAX_REDIR 5 #define AXEL_VERSION_STRING "1.0b" #define USER_AGENT "Axel " AXEL_VERSION_STRING " (" ARCH ")" diff -Nur original/axel-1.0b/text.c axel-1.0b/text.c --- original/axel-1.0b/text.c 2002-02-20 01:15:55.0 +0530 +++ axel-1.0b/text.c 2007-11-06 12:52:54.054674000 +0530 @@ -164,11 +164,16 @@ else if( strcmp( argv[optind], "-" ) == 0 ) { s = malloc( MAX_STRING ); - scanf( "%127[^\n]s", s ); + scanf( "%1024[^\n]s", s ); } else { s = argv[optind]; + if( strlen( s ) > MAX_STRING ) + { + fprintf( stderr, _("Can't handle URLs of length over %d\n" ), MAX_STRING ); + return( 1 ); + } } printf( _("Initializing download: %s\n"), s ); signature.asc Description: Digital signature
Processed: Re: Bug#196431: axel crashes on long urls
Processing commands for [EMAIL PROTECTED]: > tags 196431 +patch Bug#196431: axel crashes on long urls Tags were: confirmed upstream Tags added: patch > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]