Interestingly,... it DOES seem to work, when using their test PDF (which
contains the same images)... so WTF?! is going on here? ^^
smime.p7s
Description: S/MIME cryptographic signature
Package: eog
Version: 3.12.0-1
Severity: normal
Hi.
It seems that eog ignores any ICC profiles on TIFF files:
$ export EOG_DEBUG_LCMS=100
$ eog 48_Epson_ECI_ECI.tif
[0,127549 (0,127549)] eog-image.c:700 (eog_image_apply_display_profile) Image
has no ICC profile. Assuming sRGB.
It does work ho
On Tue, 2014-04-01 at 09:49 +0200, Sylvestre Ledru wrote:
> Could you define what you mean by "doesn't work" ?
Well the images on ICC's test site are displayed in exactly the same way
as they would be when there was no v4 support.
> I tried with iceweasel, firefox 29 and chromium and I have basica
And it does neither work, when I convert the test JPGs to TIFF (e.g.
with eog, color support works with JPG, but not with TIFF)...
Cheers,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
On Tue, 2014-04-01 at 19:10 +0200, Bastien ROUCARIES wrote:
> ImageMagick dépends on liblcms. Have you installed the non free
> profiles?
I have but that shouldn't change anything, should it? Cause the profiles
are embedded in the images themselves and should be loaded from there.
The icc-profiles
Hey.
While being in favour of re-inclusion of CAcert certificates, for the
reasons I've mentioned in the respective bug,... and while I'm not a
legal expert... I wonder:
Do we really want to open that box of Pandora?
I mean do we really accept that there are "copyrights" on public keys?
To my un
Package: xserver-xorg-input-synaptics
Version: 1.7.3-1+b1
Severity: wishlist
Hi.
A new upstream version (which also fixes #722006) is available.
Chris.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.de
Package: gimp
Version: 2.8.10-0.1
Severity: normal
Hi.
Currently, support for ICC v4 color profiles is broken in GIMP.
It seems that this would be resolved by lcms2, which GIMP should work with
since over a year:
https://bugzilla.gnome.org/show_bug.cgi?id=662739
Can Debian's gimp be build agai
Package: dcraw
Version: 9.19-1.1
Severity: normal
Hi.
As far as I can see on the upstream website, dcraw would build as well
against lcms2.
Could you please use that instead of lcms1, since the newer v2 supports much
more (e.g. ICC v4 profiles).
Cheers,
Chris.
-- System Information:
Debian Re
Package: dcraw
Version: 9.19-1.1
Severity: wishlist
Hi.
A new upstream version seems to be available (9.20).
Cheers,
Chris.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Hey.
Anything new here? This is nearly two years old now,... it blocks
several other really annoying bugs,.. a fix seems quite simple and a
patch was even provided.
What keeps it from being merged?
Cheers,
Chris.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subj
Package: rkhunter
Version: 1.4.0-3
Severity: wishlist
Hi.
There's a new upstream version 1.4.2.
Cheers,
Chris.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Package: policykit-1
Version: 0.105-5
Severity: critical
Justification: breaks unrelated software
Hi.
While I'm actualla in favour of systemd, I don't thinkt it's mature enough yet
to be used on
my servers (and actually I have tons of non-critical bugs on the desktop with
it as well).
Anyway,
Hi.
Shouldn't have this some much higher severity? The modules might be
required for booting the system... with systemd the long standing way of
how /etc/modules worked breaks and it's also still documented as it
should work.
Also I don't agree with upstream and what Michael wrote in #15:
Not hav
Package: evolution
Version: 3.12.2-1
Severity: important
Tags: security upstream
Apparently Evolution silently introduced the "feature" of querying
Gravatar for images of your email contacts.
AFAICS this is on by default and I wouldn't have found a way to
disable it.
This basically discloses al
Package: cmake
Version: 2.8.12.1-1.4
Severity: minor
Hi.
Is there any special reason why codeblock/eclipse are suggested?
I mean I'd understand if you'd suggest a special cmake editor, or
plugin for cmake builds or so... but these are just normal IDEs...
You could as well suggest all others like
reopen 749795
stop
Hi.
I'm reopening this for now, even if the issue is solved from a technical
point of view (see below why).
In my opinion this is really some horrible bug... probably it could have
been very easily found by others, and we have no idea whether it was
exploited already or not.
Source: airspy
Version: 0.2.13.9350af1-1
Severity: minor
Hi.
Shouldn't the command line tools package airspy go to some other section
i.e. != libs ?
Cheers,
Chris.
-- System Information:
Debian Release: jessie/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: amd64 (x86
Package: openssh-server
Version: 1:6.6p1-5
Severity: normal
Hi.
Since openssh-server comes with systemd support, whenever a host
is shut down or restarted, ssh connections to that host just hang
and are no longer cleanly terminated (one also doesn't see the
shutdown message anymore).
I'd suspec
See Also:
https://bugzilla.redhat.com/show_bug.cgi?id=626477
smime.p7s
Description: S/MIME cryptographic signature
Package: libreoffice-accessodf
Version: 0.1-4
Severity: grave
Justification: renders package unusable
Hi.
The package can't be installed with the current libreoffice version in sid.
Cheers,
Chris.
-- System Information:
Debian Release: jessie/sid
APT prefers unstable
APT policy: (500, 'un
Package: iceweasel
Version: 29.0.1-1
Severity: important
As the title says... well but this is just one of the dozens of things
that seems to be broken in the 29 version of iceweasel...
Cheers,
Chris.
-- Package-specific info:
-- Extensions information
Name: Adblock Plus
Location:
/usr/share
Just found out that this actually only happens on some we pages...
e.g. I open Google + in a tab... then it seals my ctrl+page up/down
evens...
I mean this makes the whole thing even more disturbing and actually
kinda security critical... if websites can arbitrarily choose to steal
keyboard input,
On Mon, 2014-05-12 at 09:32 +0900, Mike Hommey wrote:
> Well, I just reproduced, and in fact, it only happens when the focus
> *is* in the website. If you focus on the address bar (which you can do
> with ctrl+l), it works again as expected.
So that's an upstream "feature"? Well it's quite annoyin
Package: xul-ext-status4evar
Version: 0.2013.10.31.22-1
Severity: grave
Justification: renders package unusable
Hi.
With FF29 Mozilla decided to go the GNOME way and remove all kinds of
functionallity
amongst others the add-on bar (which breaks this plugin)...
There's a new version which shoul
Package: kernel-package
Version: 13.008
Severity: normal
Hi.
kernel-package depends on the no existing "grub" package and the
transistional "grub2" package... so perhaps drop it altogether
(why does kernel-package need it anyway) or suggest:
grub-pc | grub-coreboot | grub-efi-amd64 |
Chee
Package: iceweasel
Version: 29.0.1-1
Severity: normal
Hi.
It seems that since v29 browser.tabs.onTop doesn't work anymore
and reagardless of it's value, the tabs are crazily above the
address (and bookmarks) bar.
Cheers,
Chris.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debia
Package: apt-listchanges
Version: 2.85.13
Severity: important
Hi.
I've think we've had that bug before...
apt-listchanges doesn't show changes for all packages.
It used to do so for util-linux* and I've just seem it again for
lvm2/dmcrypt, which I also remember used to be affected by that.
Ch
Hey Ted.
Isn't this fixed now by 1.42.10-1's:
* The mke2fs program will now ask for confirmation before wiping out a
pre-existing file system, partition label, or physical volume
Cheers,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
Package: clamav-freshclam
Version: 0.98.4~rc1+dfsg-2
Severity: important
Hi.
Since one or two upgrades ago, freshclam upgrades don't work anymore:
Setting up clamav-freshclam (0.98.4~rc1+dfsg-2) ...
To check for updates more often than hourly, please run freshclam as a daemon.
Replacing config f
On Mon, 2014-05-19 at 09:57 -0400, Theodore Ts'o wrote:
> Yes, thanks for pointing that out!
Thank YOU... for implementing it :-)
Perhaps you can add it (the Closes:) to the changelog.
Cheers,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
Package: qemu-system-x86
Version: 1.7.0+dfsg-4
Severity: grave
Justification: renders package unusable
Hey there.
Unpacking qemu-system-x86 (1.7.0+dfsg-4) over (1.7.0+dfsg-3) ...
dpkg: error processing archive
/var/cache/apt/archives/qemu-system-x86_1.7.0+dfsg-4_amd64.deb (--unpack):
trying to
Package: cups
Version: 1.7.1-8
Severity: critical
Justification: breaks the whole system
Hi.
Yesterday I've upgraded to the current version of the cups packages.
After rebooting systemd founds an ordering cycle which it cannot resolve and
it infinitely prints
systemd: Job dbus.socket/start delet
I doubt that the removal of CAcert was a good decision...
We include such doubtful CAs as CNNIC, TURKTRUST, and all the
(ultimately) NSA controlled US-based CAs... so whether the audit of
CAcert looks promising now or not does not really matter that much, if
you compare it to the others.
And we ju
On Thu, 2014-03-13 at 23:09 +0100, Axel Beckert wrote:
> With the exception that you think that ca-certificates
> is merely the Mozilla CA package
Well of course I know that the Mozilla/NSS packages (iceweasel, etc.pp.)
do actually not even use ca-certificates... but looking at it, the only
additio
On Fri, 2014-03-14 at 06:31 +0100, Thomas R. Koll wrote:
> In a nutshell, if you want CACert to be re-added you must prove
> CACert and its infrastructure is trustworthy.
> Something CACert has attempted but even their internal audits have failed.
Well but to be honest... that is plain stupid and m
On Fri, 2014-03-14 at 09:59 +0100, Raphael Geissert wrote:
> We are closely watching the transition from SPI certificates to the
> ones provided by Gandi.
Which btw is another really bad idea...
Debian should have it's own CA (if X.509 is used in places to secure
it's services)... and that CA shoul
On Fri, 2014-03-14 at 11:22 +0100, Thomas R. Koll wrote:
> Those certificates packaged by and copied over from Mozilla do fullfil their
> policy which can be found here:
> http://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/
>
> In the inclusion section your can fin
On Sat, 2014-03-22 at 13:42 +, Ivan Shmakov wrote:
> First of all, accepting some
> “random” certificates may give the users some false sense of
> security.
This is true, and also a reason why I'm really convinced of the argument
encrypt/sign,... even if it's not trusted...
Especially the arg
On Mon, 2014-03-24 at 04:27 +0100, Bas Wijnen wrote:
> On Sun, Mar 23, 2014 at 02:50:04AM +0100, Christoph Anton Mitterer wrote:
> > On Sat, 2014-03-22 at 13:42 +, Ivan Shmakov wrote:
> > > First of all, accepting some
> > > “random” certificates may give th
Hi.
In some... development branch or so... Mozilla has removed apparently
_all_ Turktrust certs, at least for now.
Cheers,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
Package: krb5-user
Version: 1.10.1+dfsg-3
Severity: important
Hi
(@Russ: This is partially also, what I wrote you already in private).
It seems that Debians Kerberos have some problems with using keytabs,
at least with some remote KDCs.
What I do is always about this.
1) Creating a keytab with
Package: pcscd
Version: 1.8.8-1
Severity: normal
Hi.
In the last changelog entry you mentioned that the pcscd group
is no longer used.
Shouldn't it be removed then?
Cheers,
Chris.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble
Package: libopenjpeg2
Version: 1.3+dfsg-4.6
Severity: wishlist
Hi.
This seems to be highly outdated... the last changelog entry for 1.3 is from
2007.
There were some other bugs, which were marked closed but it seems no newer
version is in sid or experimental.
In the meantime, we have version
Hi Sam.
On Sun, 2013-01-20 at 17:41 -0500, Sam Hartman wrote:
> My guess is that you have the wrong kvno.
That would be strange, cause I use the very same kvno on Scientific
Linux (where it works).
Also some of the CERN guys told me, it would be ignored for TGTs, but
I'm by no means an expert in k
Package: krb5-user
Version: 1.10.1+dfsg-3
Severity: wishlist
Tags: upstream
Hi.
Just noted that the help text from kvno:
$ kvno
usage: kvno [-C] [-u] [-c ccache] [-e etype]
[-k keytab] [-S sname] [-U for_user [-P]]
service1 service2 ...
Lists options (-C, -u, -k) which are not d
Hi Ludovic.
On Sun, 2013-01-20 at 16:30 +0100, Ludovic Rousseau wrote:
> You can remove the pcscd group if you want.
Yeah of course...
> I don't think it is safe to automatically remove the existing group.
> So I don't plan to do that in the package.
I always have a bad feeling when packages leav
Hi.
> > tags 698536 wontfix
I don't quite understand why you close this (especially as it's not
fixed yet, and likely other people will report the same "bug", too).
Especially it's surely not a wontfix...
> > openjpeg 1.5 transition was scheduled, see #669348. However it occured
> > too late in
Hi Sam.
On Tue, 2013-01-22 at 15:19 -0500, Sam Hartman wrote:
> So, if you type kinit foo@REALM
> then run kvno foo@REALM
That doesn't work:
$ kinit mitte...@cern.ch
Password for mitte...@cern.ch:
$ kvno mitte...@cern.ch
kvno: Server not found in Kerberos database while getting credentials
for mi
Hi.
Has anything happened here? Do we have to escalate this to the security
team?
The upstream bug was closed, but it doesn't look as if the issue was
really solved, rather hidden away by a
close-everything-older-than-14-days-robot.
Cheers,
Chris.
smime.p7s
Description: S/MIME cryptographic s
Package: libpurple0
Version: 2.10.6-2
Severity: wishlist
Hi.
In a way,.. this issue is kinda upstream, well at least it's blocked by an
upstram
issue which I've reported (https://developer.pidgin.im/ticket/15485) and closely
related to it.
In Debian, packages should ideally use the certificate
Package: wnpp
Severity: wishlist
* Package name: wallpapoz
Version : 0.6.1
Upstream Author : Vajrasky Akbar Kok
* URL : https://vajrasky.wordpress.com/wallpapoz/
* License : GPL2+
Programming Lang: Python
Description : GNOME Desktop Wallpapers Configura
Package: libglib2.0-0
Version: 2.30.2-4
Severity: critical
Justification: breaks unrelated software
Hi.
Since the most recent uploads to unstalbe I see problems like the following:
$ eog Untitled\ 1.png
GLib-ERROR **: /tmp/buildd/glib2.0-2.30.2/./glib/gmem.c:170: failed to allocate
546343776 b
Package: gnupg2
Version: 2.0.19-1
Severity: critical
Tags: security
Justification: root security hole
Hi.
This is a follow up for #697108 and CVE-2012-6085.
While it seems that all world fixes this only for gpg 1.4.x Werner's
bug entry[0,1] implies that 2.x is also affected.
Could you please ha
The previously attached script is still buggy in some situations,... and
doesn't detect whether reload can be done without problems.
I'm in the process of writing an ipset-restore which will handle all
this gracefully.
Cheers,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
btw: The corresponding redhat bug[0] seems to already contain some
backported patches till 2.0.20 comes out.
[0] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-6085
smime.p7s
Description: S/MIME cryptographic signature
uration Parameter “logtarget” ***
#****
fail2ban-client set logtarget "${logtarget}"
#Copyright © 2013, Christoph Anton Mitterer .
#All rights reserved.
#
#
#This program is free software: you ca
Package: ca-certificates
Version: 20121114
Severity: important
Tags: security
Hi.
Not sure whether Mozilla will show any action here or not.
At least I've already reported the same problem
there https://bugzilla.mozilla.org/show_bug.cgi?id=82 .
As found out by Google, Turktrust has issued
David has released the final version for 1.3:
http://lists.gnupg.org/pipermail/gnupg-users/2013-January/045887.html
smime.p7s
Description: S/MIME cryptographic signature
On Fri, 2013-01-04 at 15:46 +0100, Johan Walles wrote:
> Can you post the output of running unhide.rb (from the package of the same
> name) on the system where you're seeing false positives with aptitude?
I checked with unhide.rb ... and it shows no hidden processeds when
aptitude is running (i.e.
Hey.
On Thu, 2013-01-03 at 22:41 -0500, Yaroslav Halchenko wrote:
> but what about just adding a command to the client e.g.
>
> fail2ban-client touch logtarget
>
> which would be passed to the server to do the needed action (i.e. if
> logging is done to a file): server.setLogTarget(server.getLo
On Fri, 2013-01-04 at 10:38 -0500, Yaroslav Halchenko wrote:
> sorry that you spend the time elaborating an alternative solution
No worries :)
> arghm -- we forgotten about the elephant(s) ;)
*G*
> so -- the best resolution might be -- DOCUMENTATION in
> /etc/fail2ban/fail2ban.conf
Jep =)
> ma
As of firebug 1.10, firecookie is part of it[0].
So in addition, a new version of this package must replace
xul-ext-firecookie and the later can be removed then from the Debian
repos.
Cheers,
Chris.
[0] https://addons.mozilla.org/en-US/firefox/addon/firecookie/
smime.p7s
Description: S/MIME c
Package: maildrop
Version: 2.5.5-2
Severity: wishlist
Hi.
FYI, a new upstream version (2.6) is available.
Cheers,
Chris.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Package: lightspark-common
Version: 0.6.0.1-2
Severity: normal
Hi.
ttf-liberation is transitional dummy package, replaced by fonts-liberation.
The latter used to provide the former name, but stopped doing so in
version 1.07.2-6.
Could you please update the dependency?
Thanks,
Chris.
--
To
Package: grub-common
Version: 1.99-23.1
Severity: wishlist
Hi.
update-grub should optionally copy the background image to /boot/grub, e.g. via
some option
in /etc/default/grub.
I know this was once in place and removed later, but it's necessary for systems
where during
grub running, that file
Package: file-roller
Version: 3.4.2-1
Severity: normal
Hi.
file-roller suggests lha, which no longer exists (see bug #685050).
Maybe you can switch to a free alternative:
jlha-utils: a Java implementation
lhasa: a command-line compatible C implementation
Cheers,
Chris.
--
To UNSUBSCRIBE, e
Package: icedove
Severity: critical
Tags: upstream
Justification: causes serious data loss
Hi.
This is basically the same as Debian bugs #690741, #633799 and #691469.
I used severity critical, as the mboxo format causes irrecoverable
mail corruption, which is unknown to most users.
The details
On Mon, 2012-11-05 at 08:27 +0100, Didier 'OdyX' Raboud wrote:
> If that's not absolutely needed in
> Wheezy, I'll postpone this change until the next upstream release
Yeah of course.
Cheers,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
Source: linux
Version: 3.6.4-1~experimental.1
Severity: wishlist
Hi Ben, et all.
Yeah I know that ext4 corruption issue was a very exotic thingy...
but I guess everybody feels better if the patch for it is in Debian :)
So, while I expect that our kernel team was aware of this long before I was,
Package: tofrodos
Version: 1.7.9.debian.1-1
Severity: wishlist
Hi.
A new upstrem version exists (1.7.12).
Cheers,
Chris.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Package: dos2unix
Version: 6.0.2-1
Severity: minor
Hi Jari.
AFAIK, http://freshmeat.net/projects/dos2unix is not the canonical
homepage location, as freshmeat is just some opensource directory.
The canonical location seems to be http://waterlan.home.xs4all.nl/dos2unix.html
Cheers,
Chris.
--
Package: maildrop
Version: 2.5.5-2
Severity: wishlist
Hey guys.
Do you think it would be possible to make courier-authlib optional and
dynamically loaded
only when it is used (i.e. dovecot auth is not used)?
Cheers,
Chris.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.
Package: iptables-persistent
Version: 0.5.3+nmu1
Severity: wishlist
Hi.
Given that ipset is now parts of netfilter, it would IMHO
make sense if support was added for loading the IP sets from some
file.
For that it would probably make sense to rename iptables-persistent
to e.g. netfilter-persist
This patch alone won't work as desired
I'll force merge this bug with #693177, where I provide an explanation
why it doesn't work, and provide a better patch.
Cheers,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
tags 693177 +patch
forcemerge 693177 662743
stop
Hi.
First... when iptables-persistent should really support ipsets (which is
necessary IMHO)... then I suggest to rename the package
and /etc/iptables to netfilter-persistent respectively netfilter.
Simply, because it's no longer only iptables pers
On Thu, 2012-12-20 at 18:21 +0100, Christoph Anton Mitterer wrote:
> Second... the ipsets broken is IMHO broken
That should have read:
Second... the ipsets program is IMHO broken
smime.p7s
Description: S/MIME cryptographic signature
Hi.
I have the same problem, ... everything at sid.
Sometimes it takes multiple Ctrl+Alt+Backspace to make it start
correctly.
Sometimes it never works and "crashes" the kernel eventually.
Cheers,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
Package: haveged
Version: 1.4-4
Severity: wishlist
Hi.
A new upstream version (1.5) is available.
Cheers,
Chris.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Package: bind9
Version: 1:9.8.1.dfsg.P1-4.2
Severity: grave
Justification: renders package unusable
Hi.
Since some update (unfortunately I forgot which one,.. but it's at least months
ago)
I experiece a memory hole in named.
I don't see a certain way to reproduce it but it happens every week (
Hi.
On Fri, 2012-10-05 at 23:17 +0800, Lifeng Sun wrote:
> I'd like
> to rename this bug to RFP
> and package xrootd seperately.
Fine with me :) ... but then it's an ITP, right?!
Cheers,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
Hi Raphaël.
On Fri, 2012-10-05 at 16:37 +0200, Raphaël Hertzog wrote:
> So you have to ensure that both tools are available and for this you need
> the dependencies.
Why does it generally need to depend on them?
Keyboard input is not necessarily needed, is it?
Some time ago, when I still tried
Source: root-system
Severity: important
Tags: security
Hi folks,
AFAICS, Debian’s Apache2.2 is still vulnerable to CRIME.
Well, AFAIK, CRIME is thought to be fixed on the browser sides, by them
simply not using compression with TLS.
While this helps in many cases, IMHO it's not enough and I'd r
Great... looking forward to see it packaged :)
Please split out the client programs (like xrdcp) in their own package
if possible.
Cheers,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
On Mon, 2012-10-08 at 15:38 +0200, Ondřej Surý wrote:
> Just one last question which came to my mind. Would this all be fixed
> if we added non-magic type to mime-support (e.g.
> http://bugs.debian.org/670945) and reverting the changes done in the
> php5-cgi package?
I'm a bit unsure how/why that w
On Mon, 2012-10-08 at 07:14 +0200, Florian Weimer wrote:
> Have you configured a memory limit for the cache?
Which would you mean max-cache-size or max-acache-size?
But no,... I only have max-cache-ttl and max-ncache-ttl set...
> By default, there
> is no limit, and records are only removed from
On Mon, 2012-10-08 at 22:42 +0200, Ondřej Surý wrote:
> Basically it would bring the old behaviour back while not mangling
> with custom Set/AddHandler directives in the apache. Remember the
> php5_cgi.{load,conf} hack was introduced after decision to fix this
> only in Apache - which in turn cause
Hi Charles.
On Thu, 2012-10-11 at 09:06 +0900, Charles Plessy wrote:
> Do you think that there is a way to fix #589384 (the *.php.foo problem)
> without removing the application/x-httpd-* media types ?
I would say no, well at least not if we also want to use these media
types later on in Apache t
Oh and one more thing (even though this is PHP unrelated):
Maybe I misunderstand something but it seems both:
libapache2-mod-fcgid, which uses:
AddHandlerfcgid-script .fcgi
FcgidConnectTimeout 20
and
libapache2-mod-fastcgi, which uses:
AddHandler fastcgi-script .fcgi
#FastCgiWrapp
Package: acpi-support-base
Version: 0.141-1
Severity: normal
Hi.
This is probably difficult to trace down, especially as the VM is running
at some ISP, who likely does not want to share many details about his
infrastructure, versions, etc.
Every time, when I upgrade acpi-support-base it hangs u
Hi Michael.
On Sat, 2012-10-13 at 14:33 +0200, Michael Meskes wrote:
> Hmm, acpi-support-base calls "invoke-rc.d acpid restart" and this seems to be
> where it hangs. Could you try that command by hand?
Yep... it's that..
> Maybe strace acpid?
Now that's strange.
I run it a 2nd time with strace
Hey folks.
On Tue, 2012-10-16 at 00:16 +0200, Stefan Fritsch wrote:
> And remove the php-cgi.conf completely, right? So this would introduce
> a different fix for the multi-views problem. Are you sure that there
> is no other problem that we would re-introduce? Maybe it's worth a
> try.
> The
Package: evolution
Severity: critical
Tags: upstream
Justification: causes serious data loss
Hi.
This is rather a warning for all Debian users. the bug is already reported
upstream.
Today I found a critical bug in Evolution that corrupts any mails when using
the mbox format (either by exportin
Hi.
One thing that could be done on the Debian side though.
We should add a NEWS entry informing about that corruption, so that
users will at least learn what has happened... even when it might have
happened years ago to them, where Evolution still regularly used mbox.
Cheers,
Chris.
smime.p7
Package: iceweasel
Version: 16.0.1-1
Severity: normal
Tags: upstream
Hi.
Iceweasel 16.0.1 packages break xul-ext-tabmixplus 0.4.0.2, or vice versa.
I already reported the symtoms upstream.
Please, add a Break :)
Cheers,
Chris.
-- Package-specific info:
-- Extensions information
Name: Adblo
On Wed, 2012-10-17 at 20:48 +0200, Michael Biebl wrote:
> Which versions exactly did you test?
> Do you run squeeze, wheezy or sid?
I have it one one system that runs sid.., but is largely un-updated (because of
Evolution - long story).
There I have Evolution 2.32.3.
I have another system, most r
Hi Michael.
I had another iteration cycle with upstream, the result being basically
that they knew about the issue since 4 years already not intending to
fix it.
They claim it was not solvable... well given that all MUAs and mail
servers I know deal[0] correctly with the problem clearly identifies
Package: xul-ext-tabmixplus
Version: 0.4.0.2-1
Severity: wishlist
Hi.
There's a new stable upstream version 0.4.0.3.
Perhaps you could possibly also package the current dev-build[0] in experimental
which supposedly fixes #690180 .
Cheers,
Chris.
[0] http://tmp.garyr.net/forum/viewtopic.php?f
tags 690741 -fixed-upstream
stop
Hi.
Guess that fixed-upstream was automatically set, remove it as
ignoring/denying cannot really be called "fixed-upstream".
Anyway, Michael, have you had time to look in to the upstream ticket?
What do you think about my suggestions, i.e. putting warnings into
On Wed, 2012-10-24 at 12:42 +1300, Gregory Plummer wrote:
> Yes, I get the default background with no visible window to enter my
> credentials. However I am able to press enter and type in my password
> to log in as if the credentials window were still there. After
> entering my password and hittin
101 - 200 of 4020 matches
Mail list logo