Rastplatzsex - Hier geht was ab !
18137 - dloaswod - 048 - badmx --- Parkplatzsex auch in deiner Nähe http://www.rastplatzsex.tk
Bug#449838: marked as done (gringotts: debian/watch fails to report upstream's version)
Your message dated Mon, 11 Feb 2008 18:32:05 + with message-id <[EMAIL PROTECTED]> and subject line Bug#449838: fixed in gringotts 1.2.10~pre1-2 has caused the Debian Bug report #449838, regarding gringotts: debian/watch fails to report upstream's version to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 449838: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=449838 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Source: gringotts Version: 1.2.8+1.2.9pre1-16 Severity: minor Usertags: dehs-no-upstream Hello maintainer, The debian/watch file of your package on the unstable distribution fails to report upstream's version. Uscan's message follows: uscan warning: In watchfile /tmp/gringotts_watchrgcfEZ, reading webpage http://devel.pluto.linux.it/projects/Gringotts/index.php?page=downloads failed: 404 Not Found Please note that this message is auto-generated by extracting the information from the Debian External Health Status (a.k.a. DEHS) no_upstream page[1]. At the moment of running the package version found is the one indicated in the report. If you have already fixed this issue please ignore and close this report. If you belive this message can be improved in any way don't hesitate to contact me by replying to [EMAIL PROTECTED] (where N is the number of this bug report). If you wish not to be notified in the future contact me so I add you to the ignore list. [1] http://dehs.alioth.debian.org/no_upstream.html Kind regards, Raphael Geissert. --- End Message --- --- Begin Message --- Source: gringotts Source-Version: 1.2.10~pre1-2 We believe that the bug you reported is fixed in the latest version of gringotts, which is due to be installed in the Debian FTP archive: gringotts_1.2.10~pre1-2.diff.gz to pool/main/g/gringotts/gringotts_1.2.10~pre1-2.diff.gz gringotts_1.2.10~pre1-2.dsc to pool/main/g/gringotts/gringotts_1.2.10~pre1-2.dsc gringotts_1.2.10~pre1-2_i386.deb to pool/main/g/gringotts/gringotts_1.2.10~pre1-2_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Wesley J. Landaker <[EMAIL PROTECTED]> (supplier of updated gringotts package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 11 Feb 2008 11:16:48 -0700 Source: gringotts Binary: gringotts Architecture: source i386 Version: 1.2.10~pre1-2 Distribution: unstable Urgency: low Maintainer: Wesley J. Landaker <[EMAIL PROTECTED]> Changed-By: Wesley J. Landaker <[EMAIL PROTECTED]> Description: gringotts - secure password and data storage manager Closes: 374358 434519 443900 449838 459892 Changes: gringotts (1.2.10~pre1-2) unstable; urgency=low . * Slightly updated translations to reflect copyright updates. . gringotts (1.2.10~pre1-1) unstable; urgency=low . * New maintainer, adopting orphaned package (closes: #434519) * Updated Homepage field to point to current development site * Fixed watch file (closes: #449838) * New upstream release (closes: #459892) * Install in a usable manner by default (closes: #443900) * Validated that running forwarded over X works (closes: #374358) * Cleaned up package short description * Changed section to utils; this is not an admin package * Updated copyright information to include all authors * Rewrote debian/rules; no longer using cdbs or dpatch * Updated to Debian Policy 3.7.3 Files: 35cadcfdd28aace6f2d8f06f57ea2e12 734 utils optional gringotts_1.2.10~pre1-2.dsc 4ab9c64a44722a50cec0832f203c8af8 82055 utils optional gringotts_1.2.10~pre1-2.diff.gz b82e17794140618ba75227a5f52070ab 126312 utils optional gringotts_1.2.10~pre1-2_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHsJPB8KmKTEzW49IRArACAJ4iTDB79fsQG8jMC1fxe3/BsremzgCfVA+4 P1Y6ta96j/2yfWw8iY4/7dI= =pTZ+ -END PGP SIGNATURE- --- End Message ---
Bug#459892: marked as done (New upstream version 1.2.9pre4)
Your message dated Mon, 11 Feb 2008 18:17:02 + with message-id <[EMAIL PROTECTED]> and subject line Bug#459892: fixed in gringotts 1.2.10~pre1-1 has caused the Debian Bug report #459892, regarding New upstream version 1.2.9pre4 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 459892: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=459892 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Package: gringotts Severity: wishlist Usertags: origin-ubuntu hardy Hi! There is a new upstream version, please update to it. Last changes: * Applied a patch from wwp to remember the main window size better invocations. * Fixed "configure.ac" (and by implication - "configure") to require gtk+ version 2.12.0 and above, to avoid compilation problems with older and incompatible gtk+'s. * Integrated the README.Debian into the README with a note of my own. * Added a note about the SUID-root problem to the error message of the mlock-memory. Thanks -- Marco Rodrigues http://Marco.Tondela.org --- End Message --- --- Begin Message --- Source: gringotts Source-Version: 1.2.10~pre1-1 We believe that the bug you reported is fixed in the latest version of gringotts, which is due to be installed in the Debian FTP archive: gringotts_1.2.10~pre1-1.diff.gz to pool/main/g/gringotts/gringotts_1.2.10~pre1-1.diff.gz gringotts_1.2.10~pre1-1.dsc to pool/main/g/gringotts/gringotts_1.2.10~pre1-1.dsc gringotts_1.2.10~pre1-1_i386.deb to pool/main/g/gringotts/gringotts_1.2.10~pre1-1_i386.deb gringotts_1.2.10~pre1.orig.tar.gz to pool/main/g/gringotts/gringotts_1.2.10~pre1.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Wesley J. Landaker <[EMAIL PROTECTED]> (supplier of updated gringotts package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 11 Feb 2008 11:01:26 -0700 Source: gringotts Binary: gringotts Architecture: source i386 Version: 1.2.10~pre1-1 Distribution: unstable Urgency: low Maintainer: Wesley J. Landaker <[EMAIL PROTECTED]> Changed-By: Wesley J. Landaker <[EMAIL PROTECTED]> Description: gringotts - secure password and data storage manager Closes: 374358 434519 443900 449838 459892 Changes: gringotts (1.2.10~pre1-1) unstable; urgency=low . * New maintainer, adopting orphaned package (closes: #434519) * Updated Homepage field to point to current development site * Fixed watch file (closes: #449838) * New upstream release (closes: #459892) * Install in a usable manner by default (closes: #443900) * Validated that running forwarded over X works (closes: #374358) * Cleaned up package short description * Changed section to utils; this is not an admin package * Updated copyright information to include all authors * Rewrote debian/rules; no longer using cdbs or dpatch * Updated to Debian Policy 3.7.3 Files: be14036c03b5cda19b5cae14bc8cfd8f 734 utils optional gringotts_1.2.10~pre1-1.dsc 87e0a246ca5353c6fde5da5b9353c669 235698 utils optional gringotts_1.2.10~pre1.orig.tar.gz 30008581a1840ae522f23d42e1a15a46 49855 utils optional gringotts_1.2.10~pre1-1.diff.gz 92c82c49d2b811de8e88858eeae23a7c 128704 utils optional gringotts_1.2.10~pre1-1_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHsI738KmKTEzW49IRAteRAJ97AXtZfyNt7IMLUxl2thLwUPmylgCeI7QZ lf2y4616xTychavdsDgEuvw= =qfzO -END PGP SIGNATURE- --- End Message ---
Bug#459892: marked as done (New upstream version 1.2.9pre4)
Your message dated Mon, 11 Feb 2008 18:32:05 + with message-id <[EMAIL PROTECTED]> and subject line Bug#459892: fixed in gringotts 1.2.10~pre1-2 has caused the Debian Bug report #459892, regarding New upstream version 1.2.9pre4 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 459892: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=459892 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Package: gringotts Severity: wishlist Usertags: origin-ubuntu hardy Hi! There is a new upstream version, please update to it. Last changes: * Applied a patch from wwp to remember the main window size better invocations. * Fixed "configure.ac" (and by implication - "configure") to require gtk+ version 2.12.0 and above, to avoid compilation problems with older and incompatible gtk+'s. * Integrated the README.Debian into the README with a note of my own. * Added a note about the SUID-root problem to the error message of the mlock-memory. Thanks -- Marco Rodrigues http://Marco.Tondela.org --- End Message --- --- Begin Message --- Source: gringotts Source-Version: 1.2.10~pre1-2 We believe that the bug you reported is fixed in the latest version of gringotts, which is due to be installed in the Debian FTP archive: gringotts_1.2.10~pre1-2.diff.gz to pool/main/g/gringotts/gringotts_1.2.10~pre1-2.diff.gz gringotts_1.2.10~pre1-2.dsc to pool/main/g/gringotts/gringotts_1.2.10~pre1-2.dsc gringotts_1.2.10~pre1-2_i386.deb to pool/main/g/gringotts/gringotts_1.2.10~pre1-2_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Wesley J. Landaker <[EMAIL PROTECTED]> (supplier of updated gringotts package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 11 Feb 2008 11:16:48 -0700 Source: gringotts Binary: gringotts Architecture: source i386 Version: 1.2.10~pre1-2 Distribution: unstable Urgency: low Maintainer: Wesley J. Landaker <[EMAIL PROTECTED]> Changed-By: Wesley J. Landaker <[EMAIL PROTECTED]> Description: gringotts - secure password and data storage manager Closes: 374358 434519 443900 449838 459892 Changes: gringotts (1.2.10~pre1-2) unstable; urgency=low . * Slightly updated translations to reflect copyright updates. . gringotts (1.2.10~pre1-1) unstable; urgency=low . * New maintainer, adopting orphaned package (closes: #434519) * Updated Homepage field to point to current development site * Fixed watch file (closes: #449838) * New upstream release (closes: #459892) * Install in a usable manner by default (closes: #443900) * Validated that running forwarded over X works (closes: #374358) * Cleaned up package short description * Changed section to utils; this is not an admin package * Updated copyright information to include all authors * Rewrote debian/rules; no longer using cdbs or dpatch * Updated to Debian Policy 3.7.3 Files: 35cadcfdd28aace6f2d8f06f57ea2e12 734 utils optional gringotts_1.2.10~pre1-2.dsc 4ab9c64a44722a50cec0832f203c8af8 82055 utils optional gringotts_1.2.10~pre1-2.diff.gz b82e17794140618ba75227a5f52070ab 126312 utils optional gringotts_1.2.10~pre1-2_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHsJPB8KmKTEzW49IRArACAJ4iTDB79fsQG8jMC1fxe3/BsremzgCfVA+4 P1Y6ta96j/2yfWw8iY4/7dI= =pTZ+ -END PGP SIGNATURE- --- End Message ---
Bug#443900: marked as done (Gringotts actually does not start under Debian Sid 32 Bit)
Your message dated Mon, 11 Feb 2008 18:32:05 + with message-id <[EMAIL PROTECTED]> and subject line Bug#443900: fixed in gringotts 1.2.10~pre1-2 has caused the Debian Bug report #443900, regarding Gringotts actually does not start under Debian Sid 32 Bit to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 443900: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443900 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Package: gringotts Version: 1.2.8+1.2.9pre1-15 Severity: normal --- Please enter the report below this line. --- --- System information. --- Architecture: i386 Kernel: Linux 2.6.23-rc7-git3-slh-smp-1 Debian Release: lenny/sid 500 unstablewww.debian-multimedia.org 500 unstablesidux.com 500 unstableftp.de.debian.org 500 unstabledeb.opera.com 500 testing ftp.de.debian.org 1 experimentalftp.de.debian.org --- Package information. --- Depends (Version) | Installed =-+-=== libatk1.0-0 (>= 1.13.2) | 1.20.0-1 libc6 (>= 2.6-1) | 2.6.1-5 libcairo2 (>= 1.4.0) | 1.4.10-1 libfontconfig1 (>= 2.4.0) | 2.4.2-1.2 libglib2.0-0 (>= 2.12.9) | 2.14.1-3 libgringotts2 | 1.2.1-11 libgtk2.0-0(>= 2.10.12-3) | 2.12.0-2 libpango1.0-0 (>= 1.16.4) | 1.18.2-1 libpopt0(>= 1.10) | 1.10-3 libx11-6 | 2:1.0.3-7 libxcursor1(>> 1.1.2) | 1:1.1.9-1 libxext6 | 1:1.0.3-2 libxfixes3 (>= 1:4.0.1) | 1:4.0.3-2 libxi6| 2:1.1.3-1 libxinerama1 | 1:1.0.2-1 libxrandr2 (>= 2:1.2.0) | 2:1.2.2-1 libxrender1 | 1:0.9.4-1 -- Armin Störmer Hornstraße 18 D-10963 Berlin Fon:+49 30 32899069 Mobil: +49 1577 3839970 [EMAIL PROTECTED] --- End Message --- --- Begin Message --- Source: gringotts Source-Version: 1.2.10~pre1-2 We believe that the bug you reported is fixed in the latest version of gringotts, which is due to be installed in the Debian FTP archive: gringotts_1.2.10~pre1-2.diff.gz to pool/main/g/gringotts/gringotts_1.2.10~pre1-2.diff.gz gringotts_1.2.10~pre1-2.dsc to pool/main/g/gringotts/gringotts_1.2.10~pre1-2.dsc gringotts_1.2.10~pre1-2_i386.deb to pool/main/g/gringotts/gringotts_1.2.10~pre1-2_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Wesley J. Landaker <[EMAIL PROTECTED]> (supplier of updated gringotts package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 11 Feb 2008 11:16:48 -0700 Source: gringotts Binary: gringotts Architecture: source i386 Version: 1.2.10~pre1-2 Distribution: unstable Urgency: low Maintainer: Wesley J. Landaker <[EMAIL PROTECTED]> Changed-By: Wesley J. Landaker <[EMAIL PROTECTED]> Description: gringotts - secure password and data storage manager Closes: 374358 434519 443900 449838 459892 Changes: gringotts (1.2.10~pre1-2) unstable; urgency=low . * Slightly updated translations to reflect copyright updates. . gringotts (1.2.10~pre1-1) unstable; urgency=low . * New maintainer, adopting orphaned package (closes: #434519) * Updated Homepage field to point to current development site * Fixed watch file (closes: #449838) * New upstream release (closes: #459892) * Install in a usable manner by default (closes: #443900) * Validated that running forwarded over X works (closes: #374358) * Cleaned up package short description * Changed section to utils; this is not an admin package * Updated copyright information to include all authors * Rewrote debian/rules; no longer using cdbs or dpatch * Updated to Debian Policy 3.7.3 Files: 35cadcfdd28aace6f2d8f06f57ea2e12 734 utils optional gringotts_1.2.10~pre1-2.dsc 4ab9c64a44722a50cec0832f203c8af8 82055 utils optional gringotts_1.2.10~pre1-2.diff.gz b82e17794140618ba75227a5f52070ab 126312 utils optional gringotts_1.2.10~pre1-2_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHsJPB8KmKTEzW49IRArACAJ4iTD
Bug#443900: marked as done (Gringotts actually does not start under Debian Sid 32 Bit)
Your message dated Mon, 11 Feb 2008 18:17:02 + with message-id <[EMAIL PROTECTED]> and subject line Bug#443900: fixed in gringotts 1.2.10~pre1-1 has caused the Debian Bug report #443900, regarding Gringotts actually does not start under Debian Sid 32 Bit to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 443900: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443900 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Package: gringotts Version: 1.2.8+1.2.9pre1-15 Severity: normal --- Please enter the report below this line. --- --- System information. --- Architecture: i386 Kernel: Linux 2.6.23-rc7-git3-slh-smp-1 Debian Release: lenny/sid 500 unstablewww.debian-multimedia.org 500 unstablesidux.com 500 unstableftp.de.debian.org 500 unstabledeb.opera.com 500 testing ftp.de.debian.org 1 experimentalftp.de.debian.org --- Package information. --- Depends (Version) | Installed =-+-=== libatk1.0-0 (>= 1.13.2) | 1.20.0-1 libc6 (>= 2.6-1) | 2.6.1-5 libcairo2 (>= 1.4.0) | 1.4.10-1 libfontconfig1 (>= 2.4.0) | 2.4.2-1.2 libglib2.0-0 (>= 2.12.9) | 2.14.1-3 libgringotts2 | 1.2.1-11 libgtk2.0-0(>= 2.10.12-3) | 2.12.0-2 libpango1.0-0 (>= 1.16.4) | 1.18.2-1 libpopt0(>= 1.10) | 1.10-3 libx11-6 | 2:1.0.3-7 libxcursor1(>> 1.1.2) | 1:1.1.9-1 libxext6 | 1:1.0.3-2 libxfixes3 (>= 1:4.0.1) | 1:4.0.3-2 libxi6| 2:1.1.3-1 libxinerama1 | 1:1.0.2-1 libxrandr2 (>= 2:1.2.0) | 2:1.2.2-1 libxrender1 | 1:0.9.4-1 -- Armin Störmer Hornstraße 18 D-10963 Berlin Fon:+49 30 32899069 Mobil: +49 1577 3839970 [EMAIL PROTECTED] --- End Message --- --- Begin Message --- Source: gringotts Source-Version: 1.2.10~pre1-1 We believe that the bug you reported is fixed in the latest version of gringotts, which is due to be installed in the Debian FTP archive: gringotts_1.2.10~pre1-1.diff.gz to pool/main/g/gringotts/gringotts_1.2.10~pre1-1.diff.gz gringotts_1.2.10~pre1-1.dsc to pool/main/g/gringotts/gringotts_1.2.10~pre1-1.dsc gringotts_1.2.10~pre1-1_i386.deb to pool/main/g/gringotts/gringotts_1.2.10~pre1-1_i386.deb gringotts_1.2.10~pre1.orig.tar.gz to pool/main/g/gringotts/gringotts_1.2.10~pre1.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Wesley J. Landaker <[EMAIL PROTECTED]> (supplier of updated gringotts package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 11 Feb 2008 11:01:26 -0700 Source: gringotts Binary: gringotts Architecture: source i386 Version: 1.2.10~pre1-1 Distribution: unstable Urgency: low Maintainer: Wesley J. Landaker <[EMAIL PROTECTED]> Changed-By: Wesley J. Landaker <[EMAIL PROTECTED]> Description: gringotts - secure password and data storage manager Closes: 374358 434519 443900 449838 459892 Changes: gringotts (1.2.10~pre1-1) unstable; urgency=low . * New maintainer, adopting orphaned package (closes: #434519) * Updated Homepage field to point to current development site * Fixed watch file (closes: #449838) * New upstream release (closes: #459892) * Install in a usable manner by default (closes: #443900) * Validated that running forwarded over X works (closes: #374358) * Cleaned up package short description * Changed section to utils; this is not an admin package * Updated copyright information to include all authors * Rewrote debian/rules; no longer using cdbs or dpatch * Updated to Debian Policy 3.7.3 Files: be14036c03b5cda19b5cae14bc8cfd8f 734 utils optional gringotts_1.2.10~pre1-1.dsc 87e0a246ca5353c6fde5da5b9353c669 235698 utils optional gringotts_1.2.10~pre1.orig.tar.gz 30008581a1840ae522f23d42e1a15a46 49855 utils optional gringotts_1.2.10~pre1-1.diff.gz 92c82c49d2b811de8e88858eeae23a7c 128704 utils optional gringotts_1.2.10~pre1-1_i386.deb -BEGIN PGP SIGNATURE- Ver
mma_0.12-2_i386.changes ACCEPTED
Accepted: mma_0.12-2.diff.gz to pool/main/m/mma/mma_0.12-2.diff.gz mma_0.12-2.dsc to pool/main/m/mma/mma_0.12-2.dsc mma_0.12-2_all.deb to pool/main/m/mma/mma_0.12-2_all.deb Override entries for your package: mma_0.12-2.dsc - source sound mma_0.12-2_all.deb - optional sound Announcing to [EMAIL PROTECTED] Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#449843: marked as done (libgringotts: debian/watch fails to report upstream's version)
Your message dated Mon, 11 Feb 2008 21:02:09 + with message-id <[EMAIL PROTECTED]> and subject line Bug#449843: fixed in libgringotts 1.2.1-12 has caused the Debian Bug report #449843, regarding libgringotts: debian/watch fails to report upstream's version to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 449843: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=449843 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Source: libgringotts Version: 1.2.1-11 Severity: minor Usertags: dehs-no-upstream Hello maintainer, The debian/watch file of your package on the unstable distribution fails to report upstream's version. Uscan's message follows: uscan warning: In watchfile /tmp/libgringotts_watchVoV3iI, reading webpage http://devel.pluto.linux.it/projects/libGringotts/index.php?page=downloads failed: 404 Not Found Please note that this message is auto-generated by extracting the information from the Debian External Health Status (a.k.a. DEHS) no_upstream page[1]. At the moment of running the package version found is the one indicated in the report. If you have already fixed this issue please ignore and close this report. If you belive this message can be improved in any way don't hesitate to contact me by replying to [EMAIL PROTECTED] (where N is the number of this bug report). If you wish not to be notified in the future contact me so I add you to the ignore list. [1] http://dehs.alioth.debian.org/no_upstream.html Kind regards, Raphael Geissert. --- End Message --- --- Begin Message --- Source: libgringotts Source-Version: 1.2.1-12 We believe that the bug you reported is fixed in the latest version of libgringotts, which is due to be installed in the Debian FTP archive: libgringotts-dev_1.2.1-12_i386.deb to pool/main/libg/libgringotts/libgringotts-dev_1.2.1-12_i386.deb libgringotts2_1.2.1-12_i386.deb to pool/main/libg/libgringotts/libgringotts2_1.2.1-12_i386.deb libgringotts_1.2.1-12.diff.gz to pool/main/libg/libgringotts/libgringotts_1.2.1-12.diff.gz libgringotts_1.2.1-12.dsc to pool/main/libg/libgringotts/libgringotts_1.2.1-12.dsc A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Wesley J. Landaker <[EMAIL PROTECTED]> (supplier of updated libgringotts package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 11 Feb 2008 12:33:25 -0700 Source: libgringotts Binary: libgringotts2 libgringotts-dev Architecture: source i386 Version: 1.2.1-12 Distribution: unstable Urgency: low Maintainer: Wesley J. Landaker <[EMAIL PROTECTED]> Changed-By: Wesley J. Landaker <[EMAIL PROTECTED]> Description: libgringotts-dev - development files for the gringotts data encapsulation library libgringotts2 - gringotts data encapsulation and encryption library Closes: 434517 449843 Changes: libgringotts (1.2.1-12) unstable; urgency=low . * New maintainer, adopting orphaned package (closes: #434517) * Updated Homepage field to point to current development site * Fixed watch file (closes: #449843) * Cleaned up package short description * Updated copyright information to include all authors * Rewrote debian/rules; no longer using cdbs or dpatch * Updated to Debian Policy 3.7.3 Files: 2999f40475ba24c3a62d147800c747c9 719 libs optional libgringotts_1.2.1-12.dsc a52ead0204fe3f0d6f8de0b9fac7bc88 390289 libs optional libgringotts_1.2.1-12.diff.gz 1d460b6fd0123ca0986e61d0905b2e5d 15792 libs optional libgringotts2_1.2.1-12_i386.deb be2ed499d52bcab45698046b6be4d20f 25858 libdevel optional libgringotts-dev_1.2.1-12_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHsK748KmKTEzW49IRAieuAJ9t/FrIE+rc+d7Ul6ETzT/Z5pfjHACfUVcw 20xHt/uYz8KTk3LXpnlKOCE= =7vzz -END PGP SIGNATURE- --- End Message ---
Bug#465376: varkon: bashism in /bin/sh script
Package: varkon Severity: important Version: 1.18A-3 User: [EMAIL PROTECTED] Usertags: goal-dash Hello maintainer, While performing an archive wide checkbashisms (from the 'devscripts' package) check I've found your package containing a /bin/sh script making use of a bashism. checkbashisms' output: > possible bashism in ./usr/bin/varkon line 23 (echo -e): > echo -e "\t$1" > possible bashism in ./usr/bin/varkon line 183 (echo -e): > echo -e "Configuration:\tcurrent (old)" > possible bashism in ./usr/bin/varkon line 184 (echo -e): > echo -e "`if [ "$NEW_HTML_VIEWER" != "$HTML_VIEWER" ]; then echo -n > '*'; else echo -n " "; fi`1 html_viewer:\t$NEW_HTML_VIEWER ($HTML_VIEWER)" > possible bashism in ./usr/bin/varkon line 185 (echo -e): > echo -e "`if [ "$NEW_MBS_EDITOR" != "$MBS_EDITOR" ]; then echo -n '*'; > else echo -n " "; fi`2 mbseditor:\t$NEW_MBS_EDITOR ($MBS_EDITOR)" possible > bashism in ./usr/bin/varkon line 186 (echo -e): > echo -e "`if [ "$NEW_MBS_EMULATOR" != "$MBS_EMULATOR" ]; then echo -n > '*'; else echo -n " "; fi`3 mbsemulator:\t$NEW_MBS_EMULATOR > ($MBS_EMULATOR)" possible bashism in ./usr/bin/varkon line 339 (should be > '.', not 'source'): source $SYSINI > possible bashism in ./usr/bin/varkon line 398 (should be '.', not > 'source'): source $USERINI Not using bash as /bin/sh would lead to errors or unexpected behaviours. Please be aware that although bash is currently the default /bin/sh there's a release goal for Lenny to make dash the default /bin/sh[1]. If you want more information about dash as /bin/sh, you can read: http://lists.debian.org/debian-release/2008/01/msg00189.html https://wiki.ubuntu.com/DashAsBinSh [1]http://release.debian.org/lenny/goals.txt Thank you, -- Atomo64 - Raphael Please avoid sending me Word, PowerPoint or Excel attachments. See http://www.gnu.org/philosophy/no-word-attachments.html -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processing of mma_0.12-2_i386.changes
mma_0.12-2_i386.changes uploaded successfully to localhost along with the files: mma_0.12-2.dsc mma_0.12-2.diff.gz mma_0.12-2_all.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#434457: Fixed it.
tags 434457 +patch thanks I fixed this bug. The problem was an uncaught exception when reading in sm files that contained letters. I don't know what the letters are supposed to mean, but pydance should convert unrecognized input to a sane default, ignore, or give an error, rather than crashing. The patch that I attached will cause pydance to convert unkown characters into "0"'s, which is the behavior described in the pydance docs. -Brandon diff -ur pydance-1.0.3/fileparsers.py pydance-1.0.3-5/fileparsers.py --- pydance-1.0.3/fileparsers.py 2005-04-04 13:49:22.0 -0700 +++ pydance-1.0.3-5/fileparsers.py 2008-01-29 14:49:07.0 -0800 @@ -603,13 +603,13 @@ if gametype in games.COUPLE: step1 = [note] step2 = [note] - step1.extend([SMFile.step[int(s)] for s in sd[0:count/2]]) - step2.extend([SMFile.step[int(s)] for s in sd[count/2:]]) + step1.extend([SMFile.step[util.my_int(s)] for s in sd[0:count/2]]) + step2.extend([SMFile.step[util.my_int(s)] for s in sd[count/2:]]) stepdata[0].append(step1) stepdata[1].append(step2) else: step = [note] - step.extend([SMFile.step[int(s)] for s in sd]) + step.extend([SMFile.step[util.my_int(s)] for s in sd]) stepdata.append(step) beat += note / 4.0 diff -ur pydance-1.0.3/util.py pydance-1.0.3-5/util.py --- pydance-1.0.3/util.py 2004-05-23 09:00:42.0 -0700 +++ pydance-1.0.3-5/util.py 2008-01-29 14:45:33.0 -0800 @@ -90,3 +90,11 @@ parts[i] = parts[i][0].capitalize() + oldparts[1:] return " ".join(parts) + +# This function takes a string, and returns an int. Unlike the builtin int() +# function, this function returns 0 if the string does not represent a number +def my_int(x): + try: +return int(x) + except: +return 0
Bug#454212: megahal: Confirmed in etch
Hello, * Giuliani Vito, Ivan [Sun, Feb 10, 2008 at 11:36:34PM +0100]: > The backtrace is attached. > > The megahal.brn file that it tries to open doesn't exists. Maybe it is > trying to make some read/write operation on it without checking if it > has been correctly opened? Thanks for the backtrace. Every `fopen' call I see in the code is followed by conditionals checking for errors. I think the memory situation is broken someplace else. Laurent. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processing of dfb++_1.0.0-4_i386.changes
dfb++_1.0.0-4_i386.changes uploaded successfully to localhost along with the files: dfb++_1.0.0-4.dsc dfb++_1.0.0-4.diff.gz libdfb++-1.0-0_1.0.0-4_i386.deb libdfb++-dev_1.0.0-4_i386.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processing of fusionsound_1.0.0-3_i386.changes
fusionsound_1.0.0-3_i386.changes uploaded successfully to localhost along with the files: fusionsound_1.0.0-3.dsc fusionsound_1.0.0-3.diff.gz libfusionsound-doc_1.0.0-3_all.deb libfusionsound-1.0-0_1.0.0-3_i386.deb libfusionsound-dev_1.0.0-3_i386.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#449838: marked as done (gringotts: debian/watch fails to report upstream's version)
Your message dated Mon, 11 Feb 2008 18:17:02 + with message-id <[EMAIL PROTECTED]> and subject line Bug#449838: fixed in gringotts 1.2.10~pre1-1 has caused the Debian Bug report #449838, regarding gringotts: debian/watch fails to report upstream's version to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 449838: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=449838 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Source: gringotts Version: 1.2.8+1.2.9pre1-16 Severity: minor Usertags: dehs-no-upstream Hello maintainer, The debian/watch file of your package on the unstable distribution fails to report upstream's version. Uscan's message follows: uscan warning: In watchfile /tmp/gringotts_watchrgcfEZ, reading webpage http://devel.pluto.linux.it/projects/Gringotts/index.php?page=downloads failed: 404 Not Found Please note that this message is auto-generated by extracting the information from the Debian External Health Status (a.k.a. DEHS) no_upstream page[1]. At the moment of running the package version found is the one indicated in the report. If you have already fixed this issue please ignore and close this report. If you belive this message can be improved in any way don't hesitate to contact me by replying to [EMAIL PROTECTED] (where N is the number of this bug report). If you wish not to be notified in the future contact me so I add you to the ignore list. [1] http://dehs.alioth.debian.org/no_upstream.html Kind regards, Raphael Geissert. --- End Message --- --- Begin Message --- Source: gringotts Source-Version: 1.2.10~pre1-1 We believe that the bug you reported is fixed in the latest version of gringotts, which is due to be installed in the Debian FTP archive: gringotts_1.2.10~pre1-1.diff.gz to pool/main/g/gringotts/gringotts_1.2.10~pre1-1.diff.gz gringotts_1.2.10~pre1-1.dsc to pool/main/g/gringotts/gringotts_1.2.10~pre1-1.dsc gringotts_1.2.10~pre1-1_i386.deb to pool/main/g/gringotts/gringotts_1.2.10~pre1-1_i386.deb gringotts_1.2.10~pre1.orig.tar.gz to pool/main/g/gringotts/gringotts_1.2.10~pre1.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Wesley J. Landaker <[EMAIL PROTECTED]> (supplier of updated gringotts package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 11 Feb 2008 11:01:26 -0700 Source: gringotts Binary: gringotts Architecture: source i386 Version: 1.2.10~pre1-1 Distribution: unstable Urgency: low Maintainer: Wesley J. Landaker <[EMAIL PROTECTED]> Changed-By: Wesley J. Landaker <[EMAIL PROTECTED]> Description: gringotts - secure password and data storage manager Closes: 374358 434519 443900 449838 459892 Changes: gringotts (1.2.10~pre1-1) unstable; urgency=low . * New maintainer, adopting orphaned package (closes: #434519) * Updated Homepage field to point to current development site * Fixed watch file (closes: #449838) * New upstream release (closes: #459892) * Install in a usable manner by default (closes: #443900) * Validated that running forwarded over X works (closes: #374358) * Cleaned up package short description * Changed section to utils; this is not an admin package * Updated copyright information to include all authors * Rewrote debian/rules; no longer using cdbs or dpatch * Updated to Debian Policy 3.7.3 Files: be14036c03b5cda19b5cae14bc8cfd8f 734 utils optional gringotts_1.2.10~pre1-1.dsc 87e0a246ca5353c6fde5da5b9353c669 235698 utils optional gringotts_1.2.10~pre1.orig.tar.gz 30008581a1840ae522f23d42e1a15a46 49855 utils optional gringotts_1.2.10~pre1-1.diff.gz 92c82c49d2b811de8e88858eeae23a7c 128704 utils optional gringotts_1.2.10~pre1-1_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHsI738KmKTEzW49IRAteRAJ97AXtZfyNt7IMLUxl2thLwUPmylgCeI7QZ lf2y4616xTychavdsDgEuvw= =qfzO -END PGP SIGNATURE- --- End Message ---
Bug#440789: Probably fixed in 1.2.10~pre1-1
Hi, I believe this bug may be fixed in 1.2.10~pre1-1, which I just uploaded. It would be nice if someone can try this on amd64 and post the results. -- Wesley J. Landaker <[EMAIL PROTECTED]> OpenPGP FP: 4135 2A3B 4726 ACC5 9094 0097 F0A9 8A4C 4CD6 E3D2 signature.asc Description: This is a digitally signed message part.
Processed: #432932: adding security tag
Processing commands for [EMAIL PROTECTED]: > tag 432932 security Bug#432932: metasend: Slightly exploitable MIME type setting There were no tags set. Tags added: security > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#465349: metamail: bashism in /bin/sh script
Package: metamail Severity: important Version: 2.7-53 User: [EMAIL PROTECTED] Usertags: goal-dash Hello maintainer, While performing an archive wide checkbashisms (from the 'devscripts' package) check I've found your package containing a /bin/sh script making use of a bashism. checkbashisms' output: > possible bashism in ./usr/bin/showaudio line 264 (should be 'b = a'): > if test "$thishost" == "$AUDIOPHONEHOST" \ > possible bashism in ./usr/bin/showaudio line 265 (should be 'b = a'): > -o "$thishost" == "$AUDIOPHONEHOSTLONG" Not using bash as /bin/sh would lead to errors. Please be aware that although bash is currently the default /bin/sh there's a release goal for Lenny to make dash the default /bin/sh[1]. If you want more information about dash as /bin/sh, you can read: http://lists.debian.org/debian-release/2008/01/msg00189.html https://wiki.ubuntu.com/DashAsBinSh [1]http://release.debian.org/lenny/goals.txt Thank you, -- Atomo64 - Raphael Please avoid sending me Word, PowerPoint or Excel attachments. See http://www.gnu.org/philosophy/no-word-attachments.html -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#454212: megahal segfaults as soon as it's launched
Niko Tyni wrote: Confirmed using etch i386 (though an amd64 processor). Attached output of megahal and strace. The attached patch fixes a stack corruption issue on 64-bit architectures (reading 8 bytes into a 4-byte buffer) and an off-by-one sprintf overflow in the error and status file name initialization code. The stack corruption makes megahal reliably crash for me on amd64 every time it tries to load a saved dictionary. However, the original problem is on i386 and happens earlier in the initialization code. I can't reproduce it myself, but I think it might well be caused by the sprintf overflow. Note that Neil's strace in http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=27;filename=megahal.trace.log;att=1;bug=454212 has open("/home/nmcgovern/.megahal/megahal.logi", O_WRONLY|O_APPEND|O_CREAT, 0666) = 3 and -rw-r--r-- 1 nmcgovern users 380 2007-12-19 11:37 megahal.logi? while the intended filename is "megahal.log". So there's definitely at least some corruption happening here. Could somebody (Neil?) try if the bug persists with this patch? Confirmed that this patch fixes the issue, at least on the version in Etch. This issue probably qualifies for a stable point update (-release in cc). I can prepare a package if you want. Cheers, Neil -- Neil McGovern SQA - Amino Communications -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Fixed it.
Processing commands for [EMAIL PROTECTED]: > tags 434457 +patch Bug#434457: Pydance crashes. There were no tags set. Tags added: patch > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#374358: marked as done (gringotts: Gringotts crashes when running to a remote X server)
Your message dated Mon, 11 Feb 2008 18:32:05 + with message-id <[EMAIL PROTECTED]> and subject line Bug#374358: fixed in gringotts 1.2.10~pre1-2 has caused the Debian Bug report #374358, regarding gringotts: Gringotts crashes when running to a remote X server to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 374358: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=374358 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Package: gringotts Version: 1.2.8+1.2.9pre1-10 Severity: normalread(4, 0xbfcdddbc, 32) = -1 EAGAIN (Resource temporarily unavailable) Gringotts works fine when I display on the local machine, but when I make a X connection via ssh and attempt to display gringotts onto a Red Hat (RHE 4) or cygwin (current as of today) X-server, it crashes. The crash happens when I click on the "File" button to get the file menu. This is my first act, and I do it soon after the splash image disappears. I attach the tail end of a strace output: read(4, 0xbfcdddbc, 32) = -1 EAGAIN (Resource temporarily unavailable) poll([{fd=4, events=POLLIN, revents=POLLIN}], 1, -1) = 1 read(4, "\10\0\306\20\306\232\225\1:\0\0\0&\0\340\0\0\0\0\0\220"..., 32) = 32 read(4, "\7\2\306\20\306\232\225\1:\0\0\0%\0\340\0\0\0\0\0\220\0"..., 32) = 32 read(4, "\1\0\306\20\0\0\0\0(\22\0\0h\31G\20\0\0\0\0\0\0\0\0\0\0"..., 32) = 32 write(4, "+\1\1\0", 4) = 4 read(4, 0xbfcddd50, 32) = -1 EAGAIN (Resource temporarily unavailable) poll([{fd=4, events=POLLIN, revents=POLLIN}], 1, -1) = 1 read(4, "\1\1\307\20\0\0\0\0\3\0\340\0\1\0\0\0\4\0\0\0\21\0\0\0"..., 32) = 32 write(4, "\37\1\4\0%\0\340\0\0\0\0\0\1\1\0\0", 16) = 16 read(4, 0xbfcc, 32) = -1 EAGAIN (Resource temporarily unavailable) poll([{fd=4, events=POLLIN, revents=POLLIN}], 1, -1) = 1 read(4, "\n\2\310\20\3\0\340\0\1\0\0\0\204\354\"\0\210\354\"\0\0"..., 32) = 32 read(4, "\1\0\310\20\0\0\0\0\0\0\0\0\1\0\0\0\20\0\0\0\21\0\0\0\260"..., 32) = 32 write(4, "+\1\1\0", 4) = 4 read(4, 0xbfcddd70, 32) = -1 EAGAIN (Resource temporarily unavailable) poll([{fd=4, events=POLLIN, revents=POLLIN}], 1, -1) = 1 read(4, "\1\1\311\20\0\0\0\0\3\0\340\0\1\0\0\0\4\0\0\0\21\0\0\0"..., 32) = 32 write(4, "&\1\2\0:\0\0\0", 8) = 8 read(4, 0xbfcddd10, 32) = -1 EAGAIN (Resource temporarily unavailable) poll([{fd=4, events=POLLIN, revents=POLLIN}], 1, -1) = 1 read(4, "\0\3\312\20:\0\0\0\0\0&\0\1\0\0\0\10\0\0\0\21\0\0\0\260"..., 32) = 32 open("/usr/share/X11/XErrorDB", O_RDONLY) = 5 fstat64(5, {st_mode=S_IFREG|0644, st_size=37893, ...}) = 0 read(5, "! $Xorg: XErrorDB,v 1.3 2000/08/"..., 37893) = 37893 close(5)= 0 brk(0x828a000) = 0x828a000 write(2, "The program \'gringotts\' received"..., 566The program 'gringotts' received an X Window System error. This probably reflects a bug in the program. The error was 'BadWindow (invalid Window parameter)'. (Details: serial 4298 error_code 3 request_code 38 minor_code 0) (Note to programmers: normally, X errors are reported asynchronously; that is, you will receive the error a while after causing it. To debug your program, run it with the --sync command line option to change this behavior. You can then get a meaningful backtrace from your debugger if you break on the gdk_x_error() function.) ) = 566 munmap(0xb7fc9000, 4096)= 0 exit_group(1) = ? Process 12729 detached -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.15-1-686 Locale: LANG=en_GB, LC_CTYPE=en_GB (charmap=ISO-8859-1) Versions of packages gringotts depends on: ii libatk1.0-0 1.11.4-2The ATK accessibility toolkit ii libc62.3.6-13GNU C Library: Shared libraries ii libcairo21.0.4-2 The Cairo 2D vector graphics libra ii libfontconfig1 2.3.2-5.1 generic font configuration library ii libglib2.0-0 2.10.2-1The GLib library of C routines ii libgringotts11.2.1-9 encapsulate data in an encrypted a ii libgtk2.0-0 2.8.18-1The GTK+ graphical user interface ii libpango1.0-01.12.3-1Layout and rendering of internatio ii libpopt0 1.10-2 lib for parsing cmdline parameters ii libx11-6 2:1.0.0-6
Bug#432932: #432932: adding security tag
tag 432932 security thanks Anyone feel free to correct me if I'm wrong but this looks like a security bug. Regards, -- Atomo64 - Raphael Please avoid sending me Word, PowerPoint or Excel attachments. See http://www.gnu.org/philosophy/no-word-attachments.html -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#374358: marked as done (gringotts: Gringotts crashes when running to a remote X server)
Your message dated Mon, 11 Feb 2008 18:17:02 + with message-id <[EMAIL PROTECTED]> and subject line Bug#374358: fixed in gringotts 1.2.10~pre1-1 has caused the Debian Bug report #374358, regarding gringotts: Gringotts crashes when running to a remote X server to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 374358: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=374358 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Package: gringotts Version: 1.2.8+1.2.9pre1-10 Severity: normalread(4, 0xbfcdddbc, 32) = -1 EAGAIN (Resource temporarily unavailable) Gringotts works fine when I display on the local machine, but when I make a X connection via ssh and attempt to display gringotts onto a Red Hat (RHE 4) or cygwin (current as of today) X-server, it crashes. The crash happens when I click on the "File" button to get the file menu. This is my first act, and I do it soon after the splash image disappears. I attach the tail end of a strace output: read(4, 0xbfcdddbc, 32) = -1 EAGAIN (Resource temporarily unavailable) poll([{fd=4, events=POLLIN, revents=POLLIN}], 1, -1) = 1 read(4, "\10\0\306\20\306\232\225\1:\0\0\0&\0\340\0\0\0\0\0\220"..., 32) = 32 read(4, "\7\2\306\20\306\232\225\1:\0\0\0%\0\340\0\0\0\0\0\220\0"..., 32) = 32 read(4, "\1\0\306\20\0\0\0\0(\22\0\0h\31G\20\0\0\0\0\0\0\0\0\0\0"..., 32) = 32 write(4, "+\1\1\0", 4) = 4 read(4, 0xbfcddd50, 32) = -1 EAGAIN (Resource temporarily unavailable) poll([{fd=4, events=POLLIN, revents=POLLIN}], 1, -1) = 1 read(4, "\1\1\307\20\0\0\0\0\3\0\340\0\1\0\0\0\4\0\0\0\21\0\0\0"..., 32) = 32 write(4, "\37\1\4\0%\0\340\0\0\0\0\0\1\1\0\0", 16) = 16 read(4, 0xbfcc, 32) = -1 EAGAIN (Resource temporarily unavailable) poll([{fd=4, events=POLLIN, revents=POLLIN}], 1, -1) = 1 read(4, "\n\2\310\20\3\0\340\0\1\0\0\0\204\354\"\0\210\354\"\0\0"..., 32) = 32 read(4, "\1\0\310\20\0\0\0\0\0\0\0\0\1\0\0\0\20\0\0\0\21\0\0\0\260"..., 32) = 32 write(4, "+\1\1\0", 4) = 4 read(4, 0xbfcddd70, 32) = -1 EAGAIN (Resource temporarily unavailable) poll([{fd=4, events=POLLIN, revents=POLLIN}], 1, -1) = 1 read(4, "\1\1\311\20\0\0\0\0\3\0\340\0\1\0\0\0\4\0\0\0\21\0\0\0"..., 32) = 32 write(4, "&\1\2\0:\0\0\0", 8) = 8 read(4, 0xbfcddd10, 32) = -1 EAGAIN (Resource temporarily unavailable) poll([{fd=4, events=POLLIN, revents=POLLIN}], 1, -1) = 1 read(4, "\0\3\312\20:\0\0\0\0\0&\0\1\0\0\0\10\0\0\0\21\0\0\0\260"..., 32) = 32 open("/usr/share/X11/XErrorDB", O_RDONLY) = 5 fstat64(5, {st_mode=S_IFREG|0644, st_size=37893, ...}) = 0 read(5, "! $Xorg: XErrorDB,v 1.3 2000/08/"..., 37893) = 37893 close(5)= 0 brk(0x828a000) = 0x828a000 write(2, "The program \'gringotts\' received"..., 566The program 'gringotts' received an X Window System error. This probably reflects a bug in the program. The error was 'BadWindow (invalid Window parameter)'. (Details: serial 4298 error_code 3 request_code 38 minor_code 0) (Note to programmers: normally, X errors are reported asynchronously; that is, you will receive the error a while after causing it. To debug your program, run it with the --sync command line option to change this behavior. You can then get a meaningful backtrace from your debugger if you break on the gdk_x_error() function.) ) = 566 munmap(0xb7fc9000, 4096)= 0 exit_group(1) = ? Process 12729 detached -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.15-1-686 Locale: LANG=en_GB, LC_CTYPE=en_GB (charmap=ISO-8859-1) Versions of packages gringotts depends on: ii libatk1.0-0 1.11.4-2The ATK accessibility toolkit ii libc62.3.6-13GNU C Library: Shared libraries ii libcairo21.0.4-2 The Cairo 2D vector graphics libra ii libfontconfig1 2.3.2-5.1 generic font configuration library ii libglib2.0-0 2.10.2-1The GLib library of C routines ii libgringotts11.2.1-9 encapsulate data in an encrypted a ii libgtk2.0-0 2.8.18-1The GTK+ graphical user interface ii libpango1.0-01.12.3-1Layout and rendering of internatio ii libpopt0 1.10-2 lib for parsing cmdline parameters ii libx11-6 2:1.0.0-6