Package: amarok
Version: 2.9.0-1+b1
Followup-For: Bug #921194
Seems to have lost support upstream, it's unfortunate as it's still the best
linux music player.
Package: nvidia-driver
Followup-For: Bug #934344
The 4.30 driver from experimental installs ok against the 5.2 kernel, tried a
few games, seems to work fine.
I would like to see libapache2-mod-auth-mysql compiled against apache2.2
and depend on apache2.2-common instead of apache2-common.
Thank you for your help!
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
It looks like on July 14th you said it was going to be fixed, but I just
has this problem again today. I back ported Version: 2.5.9-10sarge2
to get squid up and running temporarily.
--
Geoff Cummins
IT Administrator
Sno Falls Credit Union
http://www.snofalls.com
[EMAIL PROTECTED]
Phone: (425
Ack.
A fixed has been commited to alioth git repo.
Le 27/05/2016 21:50, Andreas Beckmann a écrit :
Package: mpd-sima
Version: 0.14.1-1
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts
Hi,
during a test with piuparts I noticed your package fails to
install, purge, and ins
using schroot for instance).
I'm wondering then if this is actually an issue in glances packaging.
I believe '/etc/mtab' should exist on regular environment.
I'm ready to change glances packaging to fix this FTBFS, though I'm not sure
this is actually necessary.
Can you tell me if glances is supposed to build in a mtab-less environment?
Cheers,
Geoff
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
:
http://deb.kaliko.me/debian/pool/main/g/glances/
Cheers,
Geoff
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
I'm pretty sure this is related to psutils version in Debian (ie. > 2.0).
cf. https://github.com/nicolargo/glances/issues/333
Could you please try the new version I prepared:
deb: http://media.kaliko.me/src/glances/glances_1.7.6-1_all.deb
src: http://media.kaliko.me/src/glances/gla
this problem with my Gigabyte GA-H87-HD3 mother board.
The bios was on version F3.
I have updated to F8 and kernel 3.14 now boots ok.
Geoff
-- Package-specific info:
** Version:
Linux version 3.14-1-amd64 (debian-ker...@lists.debian.org) (gcc version 4.8.2
(Debian 4.8.2-21) ) #1 SMP Debian 3.14.4
Thanks,
Glances 2.0 is on its way, I'll try to have latest version of branch 1 uploaded
in the meantime.
Thnaks fot your report and testing.
Cheers
Geoff
On 15/05/2014 00:20, Carsten Kosthorst wrote:
>> deb: http://media.kaliko.me/src/glances/glances_1.7.6-1_all.deb
&g
On 26/06/14 18:52, Axel Beckert wrote:
You can find it http://snapshot.debian.org/package/perl/5.14.2-21/
A first glance at /usr/share/doc/perl/changelog.Debian.gz of
5.14.2-21+deb7u1 didn't reveal any changes which _obviously_ cause
such breakage. But it would be nice if you could check if the
X-Debbugs-Cc: ge...@infradead.org
Package: firmware-nonfree
Version: 20170823-1
Severity: grave
Tags: d-i
Justification: renders package unusable
The current firmware-nonfree package is out of date and does not include
firmware files the drivers in the Buster kernel require.
Specifically, the Bus
oot-directory=/mnt /dev/sda
reboot
This worked and the system now boots.
/boot is the only ext type file system, the others are all handled by LVM
Geoff
Sorry, I forgot to mention that this occurs with the stable security
updates.
Geoff
cal/physical): 512 bytes / 4096 bytes
I/O size (minimum/optimal): 4096 bytes / 4096 bytes
Disk /dev/mapper/SSD0-home: 38.6 GiB, 41473277952 bytes, 81002496 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Geoff
Package: scponly
Severity: grave
Justification: user security hole
As seen at http://www.securityfocus.com/bid/16369, there is a vulnerability
that allows arbitary shell commands to be run.
More details at:
http://bugzilla.mindrot.org/show_bug.cgi?id=1094
--
To UNSUBSCRIBE, email to [EMAIL PRO
Package: dnsmasq
Version: 2.22-2
Severity: grave
Justification: user security hole
According to securityfocus dnsmasq will crash if it gets a broadcast reply
packet:
http://www.securityfocus.com/bid/17662
This DoS affects sarge. Any idea if a DSA is in the works?
-- System Information:
Debian Re
Hi,
The problem seems to be that dvdread/Makefile.in is not updated
after the patch is applied to dvdread/Makefile.am so the old value
is used to decide the exports.
After fixing that manually dvdbackup seems to be working again.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of
Package: horde2
Severity: grave
Justification: user security hole
Security focus http://www.securityfocus.com/bid/15409 reports an
unspecidied problem with Horde.
Horde at http://www.securityfocus.com/advisories/9756 describes:
>By enticing a user to read a specially-crafted e-mail or using a
>m
by dh_installinit
if [ "$1" = "purge" ] ; then
update-rc.d apache remove >/dev/null
fi
# End automatically added section
--
Geoff Crompton
Debian System Administrator
Strategic Data
+61 3 9340 9000
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Adam Conrad wrote:
> Geoff Crompton wrote:
>
>>ii apache 1.3.33-6sarge1 versatile, high-performance HTTP server
>>pc apache-perl1.3.9-13.1-1.2 Versatile, high-performance HTTP
>
>
> There's nothing I can do to fix the potato (!) versio
Adam Conrad wrote:
> Geoff Crompton wrote:
>
>>Do you have any recommendations on how to safely purge apache-perl? I
>>thought it'd be good to have it documented in this bug report, for
>>future people that might stumble across this.
>>
>> * manually e
Hi, did DSA 985-1 close this?
--
Geoff Crompton
Debian System Administrator
Strategic Data
+61 3 9340 9000
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
g, or that
another DSA might be needed.
Cheers
Thomas Wana wrote:
> Steve Kemp wrote:
>
>>On Wed, Feb 15, 2006 at 02:01:51PM +1100, Geoff Crompton wrote:
>>
>>
>>
>>>This bug has been closed for unstable (see bug 350964) with the 4.6
>>>upload, but
Package: libpng
Severity: grave
Justification: user security hole
As seen on http://www.securityfocus.com/bid/16626, there is a buffer overflow.
Redhat have a patch available at:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179455
However security focus lists versions 1.0.16, 1.0.17, 1.2
Just wondering if their will be a fix for this?
--
Geoff Crompton
Debian System Administrator
Strategic Data
+61 3 9340 9000
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
This bug has been closed for unstable (see bug 350964) with the 4.6
upload, but will it be fixed for sarge?
--
Geoff Crompton
Debian System Administrator
Strategic Data
+61 3 9340 9000
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Cont
Package: firebird2
Severity: grave
Justification: user security hole
Apparently firebird 1.5.3 fixes a buffer overflow. I saw it at
http://www.securityfocus.com/bid/17077. More details at
http://www.securityfocus.com/archive/1/427480
The researcher has a patch for the specific problem he found in
Package: samba
Version: 3.0.14a-3sarge1
Severity: grave
Samba have announced http://www.samba.org/samba/security/CAN-2006-3403.html,
and have a patch available. It affects all samba configurations, hence I
consider this grave.
I wouldn't be surprised if the security team is already aware of this.
.
--
Geoff Crompton
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Is sarge affected by this bug?
--
Geoff Crompton
Debian System Administrator
Strategic Data
+61 3 9340 9000
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Package: kernel-source-2.6.8
Version: 2.6.8-16
Severity: critical
Justification: root security hole
SecurityFocus http://www.securityfocus.com/bid/14477 mentions an array index
buffer overflow.
In short, the suspect it can cause a denial of service attack, but
aren't sure whether or not it allows
Package: mozilla-thunderbird
Version: 1.0.2-2.sarge1.0.6
Severity: grave
Justification: user security hole
Thunderbird reverts to plain authentication for SMTP, in order to
provide more compatability for SMTP servers that don't support crypt
auth. However no warning is given to user, and there is
Package: gaim
Version: 1:1.2.1-1.4
Severity: grave
Justification: user security hole
This info from http://www.securityfocus.com/bid/14531. Seems ubuntu have
released usn-168-1 to announce their fix:
http://www.ubuntulinux.org/support/documentation/usn/usn-168-1
CAN-2005-2102 is about an attacker
Package: mozilla-firefox
Version: 1.0.4-2sarge2
Severity: grave
Justification: renders package unusable
firefox 1.0.4-2sarge2 segfaults when I try to open the history window,
either using the short cut key, or the menu to open it. It leaves behind
a core file that is 56M.
Backtrace is:
(gdb) bt
ying to open the history still crashes the browser.
Cheers
--
Geoff Crompton
Debian System Administrator
Strategic Data
+61 3 9340 9000
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
I can confirm that 1.0.4-2sarge3 fixes the history crashing bug for me.
Thanks!
--
Geoff Crompton
Debian System Administrator
Strategic Data
+61 3 9340 9000
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Package: imagemagick
Version: 6:6.0.6.2-2.2
Severity: grave
Justification: user security hole
See http://www.securityfocus.com/bid/12873 for more information. In
summary:
> ImageMagick is prone to a heap-based buffer overflow vulnerability.
> This vulnerability exists in the SGI image file parser.
Package: kernel-source-2.6.8
Version: 2.6.8-15
Severity: critical
Justification: root security hole
USN-103-1 says this:
> Ilja van Sprundel discovered that the bluez_sock_create() function did
> not check its "protocol" argument for negative values. A local
> attacker could exploit this to execut
Package: kmail
Severity: grave
Justification: user security hole
For more information see:
http://www.securityfocus.com/bid/13085
In summary:
> A remote email message content spoofing vulnerability affects KDE
> KMail. This issue is due to a failure of the application to properly
> sanitize HTML
Package: squid
Severity: grave
Justification: user security hole
More info at http://www.securityfocus.com/bid/13166, but in summary:
> A remote denial of service vulnerability affects the Squid Proxy.
> This issue is due to a failure of the application to properly handle
> exceptional network re
Package: kernel-source-2.6.8
Version: 2.6.8-13
Severity: critical
Justification: root security hole
There is a local integer overflow vulnerability in the sys_epoll_wait()
call. See following for detail:
http://www.securityfocus.com/bid/12763/
Apologies if already reported.
--
To UNSUBSCRIBE,
le to find a diff between 1.0.2 and 1.0.3 from
upsteam.
I've marked this RC as it can hose a system, but if others think the
likely hood of exploit is fairly small, I've no problems with it being
reclassified.
--
Geoff Crompton
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subj
Package: sudo
Version: 1.6.8p7-1.1
Followup-For: Bug #315115
Just for information, this bug refers to CAN-2005-1993, and corresponds
to security focus BID 13993.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Package: tuxguitar
Version: 0.9.99~1.0rc3-1
Followup-For: Bug #479668
Hi,
I also have the problem of no plugins being available unless I change to
/usr/bin first.
Actually I just noticed it will pick up the plugins if I am in any
directory other than ~/ .
[21:43:[EMAIL PROTECTED] ~]
$ tuxguit
;t see any difference when run from home or not.
> ok I see you're on i386 like me and julian
>
> now let's investigate ...
Sure, would be good to see this fixed.
Geoff
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
.jar
tuxguitar-musicxml.jar tuxguitar-pdf.jar tuxguitar-tef.jar
Thanks,
Geoff
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
0\1\0\0\0\1\0\0\0\f\0\0\0\1\1\1\1\1"..., 97) = 97
[pid 20365] --- SIGSEGV (Segmentation fault) @ 0 (0) ---
[pid 20365] unlink("/home/geoff/.mozi
Package: iceweasel
Version: 3.0~rc1-1
Followup-For: Bug #484270
Hi,
I just tried 3.0~rc1-1 but it has the same problem :(
Let me know what I can do to help.
Thanks,
Geoff
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT policy: (500, 'unstable&
Hi Eric,
Looks like it's a socket. The whole strace output is 1.2M, I've put it here:
http://home.pacific.net.au/~reidygh/iceweasel-strace.txt
Regards,
Geoff
socket(PF_FILE, SOCK_STREAM, 0) = 25
fcntl64(25, F_SETFL, O_RDONLY|O_NONBLOCK) = 0
fcntl64(25, F_SETFD, FD_CLOEXEC)
thing that had a libxul.so and now it's working.
Pretty lame I know but I'm really not sure what did it. Also there
aren't too many other people getting seg faults so it must have been
something a bit odd with my install.
Sorry to Eric for wasting your time.
Regards,
Geoff
-- S
.1).
The severity of this bug should also be reduced, it is "important" at
the most.
Geoff
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
ded the squeeze grub-pc and grub-common packages (version
1.98~20100115-1)
* installing them
* bind mounting /dev and /proc into the chroot
* running upgrade-grub and grub-install '(hd0)' (I suspect if I'd
already mounted /dev and /proc when installing the packages I wouldn
fwiw, I can reproduce this.
$ apt-get install octave-symbolic
...
$ octave
GNU Octave, version 3.0.1
Copyright (C) 2008 John W. Eaton and others.
This is free software; see the source code for copying conditions.
There is ABSOLUTELY NO WARRANTY; not even for MERCHANTIBILITY or
FITNESS FOR A PARTIC
I am Geoff Stearns, the author of qtobject, and I permit its use under
the MIT License.
The MIT License
Copyright (c)
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to
deal
in th
Package: libnss-sss
Version: 1.8.1-1
Severity: grave
Justification: renders package unusable
I'm currently authenticating against an LDAP server and I have the follwoing
packages installed and working:
libnss-ldapd
libpam-ldapd
libpam-ccreds
unscd
nslcd
I am trying to make use of sssd instead so
2.6.35 [1]. As PCI_HERMES depends on
HERMES_PRISM, this module was not built.
The hostap driver provides better support for Prism 2/2.5/3-based PCI
devices, including firmware downloading and WPA support. Consider using
the available hostap_pci module.
Geoff
[1] http://git.kernel.org
oup_id=201579&atid=978127
There is a new upstream release, 0.23, but it according to the upstream
bug report, it doesn't fix this bug.
Cheers,
Geoff Crompton
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
e Squeeze
procedure[2] on the Debian wiki for more information.
Geoff
[1] http://wiki.debian.org/brcm80211
[2] http://wiki.debian.org/wl#squeeze
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
d' database table.
I do not consider this to be a PHP 5.6 issue.
Geoff
[1] https://www.drupal.org/node/1027534
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Package: avahi-daemon
Version: 0.6.30-6
Severity: grave
Justification: renders package unusable
Dear Maintainer,
* What led up to the situation?
After a short time all .local addresses are lost
* What exactly did you do (or not do) that was effective (or
ineffective)?
Running "getent hosts w
In reply to Michael Biebl re Re: [Pkg-utopia-maintainers] Bug#657553: avahi-
daemon losing addresses:
> severity 657533 important
> thanks
>
> On 26.01.2012 23:47, Geoff Clements wrote:
> > There's nothing in the logs that I can see that suggests
> > that avahi is fl
Package: libnepomuk4
Version: 4:4.4.5-3
Severity: grave
Justification: renders package unusable
-- System Information:
Debian Release: wheezy/sid
APT prefers testing
APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.32-5-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_GB
-> 4.8.3-2
[UPGRADE] python-qt4-dbus 4.8.3-1 -> 4.8.3-2
[UPGRADE] soprano-daemon 2.5.0+dfsg.1-1 -> 2.6.0+dfsg.1-3
[UPGRADE] videotrans 1.6.0-0.2 -> 1.6.0-0.3
===
--
Geoff
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
w
The problem has turned out to be caused by a third-party plasmoid, one which I
have contributed to ... sigh!
Please close bug, sorry for the noise.
--
Geoff
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Conta
6+r2729-1) unstable; urgency=low
* Imported Upstream version 1.56+r2729
- Support for Kernels 2.6.36 - 2.6.38 (LP: #660664, Closes: #604880)
These have not migrated to testing owing to #618898.
Geoff
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a s
red while processing:
> petitboot
I confirmed this error and will make a fix.
Thanks for testing.
-Geoff
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
i"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Geoff Crompton
To: Debian Bug Tracking System
Subject: linux-image-3.2.0-4-amd64: none
X-Debbugs-Cc: none
Package: src:linux
Version: 3.2.35-2
Severity: normal
Dear Maintainer,
*** Please consider answering these questions, where appropr
code or an integration problem with other
components, I don't know but _something_ needs fixing, hence this bug.
Also I am willing to help to find it
--
Geoff
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble?
After some investigation I have found that this bug is a duplicate of 666230.
--
Geoff
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
ore you that what you suggest is
not correct. With the way we have it now when kexec-tools
works for those arches, petitboot will work for those arches
automatically.
If you want to do something I recommend you file a bug against
kexec-tools to have it fixed for those listed arches.
-Geoff
--
Hi Adam,
On Sat, 2013-05-18 at 12:47 +0100, Adam D. Barratt wrote:
> On Sat, 2013-05-18 at 17:49 +0800, Geoff Levand wrote:
> > On Fri, 2013-05-17 at 20:54 +0200, Julien Cristau wrote:
> > > kexec-tools is not available on all archs. If petitboot needs it, it
> > >
On Sun, 2 Feb 2014, Paul Gevers wrote:
On 26-01-14 19:28, Geoff Shang wrote:
It seems to happen when working in more primitive environments with
no readline.
Triggered by the mail of Jude, do you confirm that installing readline
prevents this bug from happening? Than indeed adding that as a
heezy.
Geoff.
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Package: postgrey
Version: 1.34-1.1
Severity: grave
Tags: patch
Justification: renders package unusable
Dear Maintainer,
A fresh install of postgrey on two Wheezy machines fails to start. Much like
was the case in debian bug #722136, starting the postgrey daemon on the
command
line reveals the sa
3. Paste.
4. Crash!
AFAIK, this locks the kernel and only a power cycle will fix it.
As noted previously, this only affects local sessions - even running an
ssh to localhost and doing the above will not reproduce it.
I've observed on several machines running both Squeeze and Whe
76 matches
Mail list logo