Processing commands for cont...@bugs.debian.org:
> severity 699877 serious
Bug #699877 [src:postfix] postfix: maintainer address bounces
Severity set to 'serious' from 'normal'
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
699877: http://bugs.debian.org/cgi-bin/
Your message dated Tue, 5 Feb 2013 23:08:15 -0800
with message-id <20130206070815.ga15...@callisto.home.lan>
and subject line Re: Bug#696386: makedumpfile fails with elf_readall error :
more information
has caused the Debian Bug report #696386,
regarding makedumpfile fails with elf_readall error
t
Processing commands for cont...@bugs.debian.org:
> tag 696386 + unreproducible
Bug #696386 [makedumpfile] makedumpfile fails with elf_readall error
Added tag(s) unreproducible.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
696386: http://bugs.debian.org/cgi-bin/
Because the mpd package is missing from the Wheezy archives, I built
0.16.7 today on a fresh Wheezy amd64 install, using the source package
and building with debian/rules binary. This problem is not present in
0.16.7 as packaged for Wheezy, so it's a regression in 0.16.8.
--
To UNSUBSCRIBE, ema
Your message dated Wed, 06 Feb 2013 02:47:37 +
with message-id
and subject line Bug#699835: fixed in keystone 2012.1.1-12
has caused the Debian Bug report #699835,
regarding keystone: CVE-2013-0247: Keystone denial of service through invalid
token requests
to be marked as done.
This means th
Package: clang
Version: 3.0-6
Severity: grave
Justification: renders package unusable
Dear Maintainer,
compiling this program
---8<---
#include
int main ( int argc, char * argv[] )
{
int * i = new int (100);
int j = (*i) + 4;
delete i;
return j;
}
---8<---
ca
On Wed, Feb 06, 2013 at 12:49:02AM +0100, Michael Stapelberg wrote:
> On Tue, 6 Nov 2012 20:46:25 +0100
> Andreas Beckmann wrote:
> > On Wednesday, 19. September 2012 21:05:03 Piotr Borkowski wrote:
> > > File-rc doesn't restore rcX.d dirs at remove. This breaks sysv-rc
> > > legacy_bootordering p
On Tuesday, 5. February 2013 01:01:43 Vagrant Cascadian wrote:
> As far as I can tell, /etc/nagios3/stylesheets/* were introduced in the
> squeeze nagios3-cgi package. /etc/nagios3/cgi.cfg was a conffile with
> nagios3-common in wheezy, and transitioned to nagios3-cgi for wheezy. My
> guess is some
On Tue, 6 Nov 2012 20:46:25 +0100
Andreas Beckmann wrote:
> On Wednesday, 19. September 2012 21:05:03 Piotr Borkowski wrote:
> > File-rc doesn't restore rcX.d dirs at remove. This breaks sysv-rc
> > legacy_bootordering postinst function. After sysv-rc installation
> > this leads to empty rcX.d dir
Hi,
thanks for a huge work on this issue! I will be glad to upload it,
if the release team agree to give a freeze exception for this upload.
As far as I know, the package will not go to a NEW queue, because
the binary package was deleted, not added.
Thanks,
Anton
2013/2/5 Boris Pek :
> Hi,
>
>
Your message dated Tue, 05 Feb 2013 22:47:32 +
with message-id
and subject line Bug#699856: fixed in dynalogin 0.9.14-2
has caused the Debian Bug report #699856,
regarding incorrectly refuses to authenticate in some circumstances
to be marked as done.
This means that you claim that the proble
Your message dated Tue, 05 Feb 2013 22:33:04 +
with message-id
and subject line Bug#696187: fixed in squid3 3.1.20-2.1
has caused the Debian Bug report #696187,
regarding CVE-2012-5643: cachemgr.cgi denial of service
to be marked as done.
This means that you claim that the problem has been de
Package: libdynalogin-1-0
Version: 0.9.14-1
Severity: serious
In some circumstances, the algorithm fails to authenticate a valid user
presenting a valid code.
This appears to be occurring because the expected behavior of the
oath_strcmp function is not identical to regular strcmp, negative return
On Tue, 22 Jan 2013 17:37:10 +0100
Moritz Muehlenhoff wrote:
> Note that the initial fix was incorrect:
> https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-0189
I have integrated this upstream patch (which adresses
CVE-2012-5643 and CVE-2013-0189):
http://www.squid-cache.org/Versions/v3/3.1/cha
Processing commands for cont...@bugs.debian.org:
> tags 697588 + wheezy sid
Bug #697588 {Done: Colin Watson } [pyparted] Breaks
python-parted
Added tag(s) sid and wheezy.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
697588: http://bugs.debian.org/cgi-bin/bugre
Package: icedove-gcontactsync
Version: 0.2.8-1
Severity: grave
Justification: renders package unusable
unable to use this addon after upgrading icedove to 10.0.12 from squeeze-
backports. Icedove complains that this version is incompatible.
-- System Information:
Debian Release: 6.0.6
APT pre
Package: syncevolution-http
Version: 1.2.99.1-1
Severity: grave
Justification: renders package unusable
Dear Maintainer,
* What led up to the situation?
1. set up synceo-http-server according to
https://syncevolution.org/wiki/http-server-howto including https.
2. trigger sync from my phone (no
Your message dated Tue, 05 Feb 2013 20:47:53 +
with message-id
and subject line Bug#699379: fixed in gdcm 2.2.1-1.1
has caused the Debian Bug report #699379,
regarding gdcm: remove armhf from mono archs
to be marked as done.
This means that you claim that the problem has been dealt with.
If t
Your message dated Tue, 05 Feb 2013 20:47:38 +
with message-id
and subject line Bug#699379: fixed in gdcm 2.2.0-14.1
has caused the Debian Bug report #699379,
regarding gdcm: remove armhf from mono archs
to be marked as done.
This means that you claim that the problem has been dealt with.
If
Hi,
>> Did you try to send your messages directly to email
>> or another?
>
> No, I didn't.
>
> I am under the impression that OCE (OpenCASCADE Community Edition)
> is a project to enhance Open CASCADE Technology with external
> contributions not (yet) accepted by Open CASCADE S.A.S. into the
>
Hi,
> I propose to remove executable ElmerGUI.real from the package. Anyway,
> it is better, than to remove the whole package.
>
> But we need to get a pre-approval permission from release-managers.
> Could you, please, provide a patch?
I prepared updated package with changes described above. Dif
Hi Jakub,
Since you intend to adopt the sendmail package, can you have a look at
the patch which Tim posted at
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684645#43 please?
If you need a sponsor for your upload, I can help you with that.
--
Best regards,
Michael
--
To UNSUBSCRIBE, email
Hi Mathieu,
I've prepared an NMU for gdcm for wheezy (versioned as 2.2.0-14.1) and
will upload shortly (well, once it's finished building anyway). Diff
against the current tpu version attached.
Cheers,
Julien
diff -Nru gdcm-2.2.0/debian/changelog gdcm-2.2.0/debian/changelog
--- gdcm-2.2.0/debian
Your message dated Tue, 5 Feb 2013 20:35:00 +0100
with message-id <20130205193500.GA18755@localhost>
and subject line Done: [flush] Starting Flush failed:
has caused the Debian Bug report #699564,
regarding [flush] Starting Flush failed:
to be marked as done.
This means that you claim that the pro
Processing commands for cont...@bugs.debian.org:
> # Package is built now; no longer seems RC for wheezy
> tags 699785 = sid
Bug #699785 [src:virtuoso-opensource] virtuoso-opensource: may FTBFS depending
on time of day
Added tag(s) sid; removed tag(s) patch.
> thanks
Stopping processing here.
P
Processing commands for cont...@bugs.debian.org:
> tags 699379 + patch
Bug #699379 [src:gdcm] gdcm: remove armhf from mono archs
Added tag(s) patch.
> tags 699379 + pending
Bug #699379 [src:gdcm] gdcm: remove armhf from mono archs
Added tag(s) pending.
> thanks
Stopping processing here.
Please co
Processing control commands:
> tags -1 - wheezy
Bug #699785 [src:virtuoso-opensource] virtuoso-opensource: may FTBFS depending
on time of day
Ignoring request to alter tags of bug #699785 to the same tags previously set
--
699785: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699785
Debian B
Control: tags -1 - wheezy
The package is built on all arches for now. But if there is going to be
another upload, please fix this issue to avoid stalling the buildds.
It is a recurrence of this problem: http://bugs.debian.org/581267#5
(Shortening the timeouts made it less likely to happen, but
tags 699379 + patch
tags 699379 + pending
thanks
Hi Mathieu,
I've prepared an NMU for gdcm (versioned as 2.2.1-1.1) and
will upload it shortly.
Cheers,
Julien
diff -Nru gdcm-2.2.1/debian/changelog gdcm-2.2.1/debian/changelog
--- gdcm-2.2.1/debian/changelog 2012-09-20 16:25:49.0 +0200
+++
Package: src:scrub
Version: 2.5.2-1
Severity: serious
Tags: sid wheezy
User: debian-...@lists.debian.org
Usertags: kfreebsd
X-Debbugs-Cc: debian-...@lists.debian.org
Justification: fails to build from source (but built successfully in the past)
Hi!
Your package failed to build on the kfreebsd-* b
Package: src:kshutdown
Version: 3.0~beta5-2
Severity: serious
Tags: sid wheezy
User: debian-...@lists.debian.org
Usertags: kfreebsd
X-Debbugs-Cc: debian-...@lists.debian.org
Justification: fails to build from source (but built successfully in the past)
Hi!
Your package failed to build on the kfre
Hi
One further follow up: The Security Team marked the issue as no-dsa in
the Security-Tracker[1]. So an update for Squeeze might go trough a p-u
upload.
[1] https://security-tracker.debian.org/tracker/CVE-2013-0251
Thanks for fixing this issue quickly!
Regards,
Salvatore
--
To UNSUBSCRIBE,
Processing commands for cont...@bugs.debian.org:
> tags 699564 - moreinfo unreproducible
Bug #699564 [flush] [flush] Starting Flush failed:
Removed tag(s) unreproducible and moreinfo.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
699564: http://bugs.debian.org/c
Processing commands for cont...@bugs.debian.org:
> notfound 694340 3.2.5-0ubuntu4
Bug #694340 [libgconf2-4] libgconf2-4: libgconf built with the dbus backend
requires dbus-glib to be initialized with threading
There is no source info for the package 'libgconf2-4' at version
'3.2.5-0ubuntu4' with
Package: keystone
Severity: grave
Tags: security
Justification: user security hole
Hi,
the following vulnerability was published for keystone.
CVE-2013-0247[0]:
Keystone denial of service through invalid token requests
Patches should be available via [1].
If you fix the vulnerability please al
Your message dated Tue, 05 Feb 2013 17:47:39 +
with message-id
and subject line Bug#699825: fixed in gnome-online-accounts 3.4.2-2
has caused the Debian Bug report #699825,
regarding CVE-2013-0240: fails to verify SSL certificates when creating accounts
to be marked as done.
This means that y
Hi!
Is there any plan to fix CVE-2012-3480 / #684889 in stable?
cu
AW
--
[...] If you don't want to be restricted, don't agree to it. If you are
coerced, comply as much as you must to protect yourself, just don't support
it. Noone can free you but yourself. (crag, on Debian Planet)
Arne Wichman
Package: gnome-online-accounts
Version: 3.4.2-1
Severity: grave
Tags: security pending
Justification: user security hole
I discovered this vulnerability, which was just made public on oss-security:
> it was found that Gnome Online Accounts (GOA)
> did not perform SSL certificate validation, when
>
On Tue, Feb 05, 2013 at 03:06:06PM +, Debian Bug Tracking System wrote:
> gvfs (1.12.3-4) unstable; urgency=low
> .
>* 06_metadata_nfs.patch: new patch. Disable gvfsd-metadata entirely on
> remote filesystems. It is better to miss functionality than to
> hammer the server. Close
Package: imview
Version: 1.1.9c-9
Severity: grave
Tags: security
imview has stack smashing vulnerability when parsing ics header @
io/readics.cxx:320
/* get the filename from the ICS file */
t = temp1;
while (*bp != delim2)
*t++ = *bp++;
This bug
Hi, Luciano,
On Thu, Jan 31, 2013 at 12:10:16AM +0100, Luciano Bello wrote:
> Package: xserver-xorg-video-qxl
> Severity: grave
> Tags: security patch
> Justification: user security hole
>
> Hi there,
>Take a look to http://seclists.org/oss-sec/2013/q1/204
>Please, use CVE-2013-0241 to re
Your message dated Tue, 05 Feb 2013 15:02:41 +
with message-id
and subject line Bug#624507: fixed in gvfs 1.12.3-4
has caused the Debian Bug report #624507,
regarding gvfsd-metadata: gvfsd-metadata creates a large amount of NFS network
I/O on NFS-mounted user home directory
to be marked as do
Your message dated Tue, 05 Feb 2013 15:02:41 +
with message-id
and subject line Bug#624507: fixed in gvfs 1.12.3-4
has caused the Debian Bug report #624507,
regarding Started looping and continuously rewriting metadata file
to be marked as done.
This means that you claim that the problem has
Roger,
After some research, the best way I've found to send a signal to the correct
'init' is:
pkill --signal USR1 -P 0 -x init
You can check the PID with :
pgrep -P 0 -x init
It always return the correct process under the main machine and the LXC
containers.
HIH
--
,''`.
: :' : Cyril
On 3 Feb 2013, rle...@codelibre.net wrote:
> Please could you try upgrading with the packages at
> http://people.debian.org/~rleigh/sysvinit/
> and let me know if this solves the problem for you.
Seems to work:
3:32PM lenovo:/tmp% sudo dpkg -i sysvinit_2.88dsf-40_amd64.deb
(Reading database .
Hi Anibal
On Mon, Jan 21, 2013 at 02:50:43PM +0100, Salvatore Bonaccorso wrote:
> Reverting the patch 03-627217-netio.patch let it work in a mixed
> squeeze, wheezy environment. If 627217 can be fixed, it should probably
> without breaking the "protocol". After reverting the patch the requests
> g
Processing commands for cont...@bugs.debian.org:
> reassign 699795 libtasn1-6-dbg
Bug #699795 [libtasn1-3-dbg,libtasn1-6-dbg] libtasn1-6-dbg and libtasn1-3-dbg:
error when trying to install together
Bug reassigned from package 'libtasn1-3-dbg,libtasn1-6-dbg' to 'libtasn1-6-dbg'.
Ignoring request
On 2013-02-05 10:10, NeilBrown wrote:
| I've made a 0.9.1 release (both in git://neil.brown.name/wiggle and in
| http://neil.brown.name/wiggle) which removes the 'diff.ps' file and replaces
| it with a text file which suggests how the postscript file can be found.
|
| i.e. I've chosen not to distr
On Sat, 2 Feb 2013, Jérémy Lal wrote:
> So it would be nice to know :
> - do you have adater: pgsql in database.yml ?
Sorry, I can’t know this any more, the test machine was
deleted now.
> - was the file modified manually before the upgrade ?
No, never.
> - are you able to reproduce the bug on
Your message dated Tue, 05 Feb 2013 11:18:18 +0100
with message-id <1360059498.8280.21.camel@tomoyo>
and subject line Re: The bug is in cogl
has caused the Debian Bug report #619636,
regarding empathy: does not start
to be marked as done.
This means that you claim that the problem has been dealt w
Your message dated Tue, 05 Feb 2013 11:18:18 +0100
with message-id <1360059498.8280.21.camel@tomoyo>
and subject line Re: The bug is in cogl
has caused the Debian Bug report #619636,
regarding Clutter is not working properly with mesa software rendering
to be marked as done.
This means that you cl
Your message dated Tue, 05 Feb 2013 11:18:18 +0100
with message-id <1360059498.8280.21.camel@tomoyo>
and subject line Re: The bug is in cogl
has caused the Debian Bug report #619636,
regarding Clutter is not working properly with mesa software rendering
to be marked as done.
This means that you cl
Hi
On Tue, Feb 05, 2013 at 08:26:53AM +, Chrissie Caulfield wrote:
> On 04/02/13 22:14, Salvatore Bonaccorso wrote:
> >Hi Christine
> >
> >I noticed you already uploaded 1.31 fixing #699625 which is great,
> >thanks for working on this issue and fixing it already.
> >
> >There is however one u
Package: libtasn1-3-dbg,libtasn1-6-dbg
Version: libtasn1-3-dbg/2.13-2
Version: libtasn1-6-dbg/3.2-1
Severity: serious
User: trei...@debian.org
Usertags: edos-file-overwrite
Date: 2013-02-05
Architecture: amd64
Distribution: sid
Hi,
automatic installation tests of packages that share a file and a
On 04/02/13 22:14, Salvatore Bonaccorso wrote:
Hi Christine
I noticed you already uploaded 1.31 fixing #699625 which is great,
thanks for working on this issue and fixing it already.
There is however one unfortunate thing:
91 files changed, 28516 insertions(+), 2085 deletions(-)
This is a p
Hi,
I browsed the source archives of latd because pkgsrc still has latd 1.18,
and found that all version between and including 1.25 and 1.30 have the
bug. I wonder if that information is useful to others...
Btw, why not change the sprintf to
snprintf(error, sizeof(error),
"llogin version
56 matches
Mail list logo