ar in two different paths is a higher priority than
> keeping systems working.
"Move fast and break as much stuff as possible, or Debian will be doomed
to irrelevance. I'll be SABDFL someday!"
The creed of the _impactful_ developer.
Regards,
Branden
signature.asc
Description: PGP signature
Hi Russ,
At 2023-10-15T12:06:14-0700, Russ Allbery wrote:
> Minor point, but since you posted it
No worries!
> "G. Branden Robinson" writes:
>
> > ...
>
> > \- Minus sign or basic Latin hyphen‐minus. \- produces the
> > Uni
and I'd prefer not to see additional cargo cult
techniques piled on top of it.
https://git.savannah.gnu.org/cgit/groff.git/tree/PROBLEMS?h=1.23.0#n82
Regards,
Branden
[1] Just like the omission of bounds checks on array types. What a
brilliant efficiency that was. Jean Ichbiah saw
2C6 (modifier letter circumflex accent) or
similar.
\(rs Reverse solidus (backslash). The backslash is the default
escape character in the roff language, so it does not
represent itself in output. Also see \e above.
\(ti Basic Latin tilde. Some output devices format “~” as U+02DC
(small tilde) or similar.
> Hope that's helpful.
I hope this message goes some way toward relieving your frustration.
Regards,
Branden
signature.asc
Description: PGP signature
79), this is a bigger challenge to achieve with HTML than
you might suppose. If you want only a rough approximation thereof, my
guess is that there are many straightforward and valid approaches one
could take. The challenge would then be in persuading others to adopt
your one obviously optimal soluti
you might
apply the patch documented in groff's PROBLEMS file to your
/etc/groff/man.local.
--- start ---
.if '\*[.T]'utf8' \{\
. char ' \[aq]
. char - \-
. char ^ \[ha]
. char ` \[ga]
. char ~ \[ti]
.\}
--- end ---
As that file notes, you may also wish to d
e
measure - determine some nroff formatting parameters
Description.
The width of a character cell (1 en) is 24 basic units.
The page offset is 0 (0n).
The line length is 1560 (65n).
The indentation is 120 (5n).
Bye!
Printed 9/22/882023-07-21 1
$ exit
Regards,
Branden
signature.asc
Description: PGP signature
Hi Ian,
At 2023-07-17T14:32:40+0100, Ian Jackson wrote:
> Hi. Thanks for your comprehensive, detailed and helpful email.
You're most welcome.
> G. Branden Robinson writes ("Bug#1041317: dgit: table too wide in man
> page, trashes autopkgtests"):
> > I noticed that
Package: chromium
Version: 72.0.3626.96-1~deb9u1
Severity: grave
Justification: renders package unusable
I have been tracking testing for several months.
This looks to me like a missing or insufficiently versioned Replaces
declaration, but I did not dig deeply into this except to check the BTS
to
ens fd 3, directs it to a
file, and then executes the bug script.
$ cat > bugwrap
#!/bin/sh
exec 3> /tmp/script.log
exec /usr/share/bug/xorg/script
^D
$ chmod 600 bugwrap
$ sudo ./bugwrap
Regards,
Branden
[1] in the manpages-dev package
signature.asc
Description: PGP signature
ending tag because I need to, ah, generate a fresh GPG
key pair and get myself back in the ranks of active Debian developers.
That may take time, and Stretch should not ship with this nonfunctional
package.
Regards,
Branden
submitter 382175 Branden Robinson <[EMAIL PROTECTED]>
thanks
On Mon, Aug 14, 2006 at 06:45:08PM +, Brian M. Carlson wrote:
> On Sun, Aug 13, 2006 at 10:51:54PM -0400, Branden Robinson wrote:
> > On Wed, Aug 09, 2006 at 09:56:53PM +, Brian M. Carlson wrote:
> > >
ify potential team members for a re-implementation under
the LGPL or a GPL-compatible non-copyleft like the MIT/X11 license or
2-clause BSD.
> And yes, Branden, I Cc'd you, but this isn't a mailing list, it is a
> bug. I will not Cc you further unless instructed otherwise.
I do no
lick and see the TWM menu as specified in the
> -submitter's .twmrc, and it no longer causes the window manager to
> crash.
Thanks for the improved backtrace, and the patch! It's my intention to
work on this over the weekend at the latest, but if I fail to have
Package: mffm-fftw1c2
Version: 1.6-1
Followup-For: Bug #338537
> To be clear, if packages could work with the new library without having to
> be recompiled, it would have been inappropriate to rename the lib package at
> all...
In this case, yeah, but there are other reasons to rename packages.
Package: mffm-fftw1c2
Version: 1.6-1
Followup-For: Bug #338537
mffm-fftw1c2 needs to do both of the following:
Conflicts: mffm-fmtw1
Replaces: mffm-fftw1
Ordinarily when a package is renamed, it Provides: the former name as well,
but in this case it doesn't actually "provide" the previous name b
Package: mesa-common-dev
Version: 6.4.1-0.4
Followup-For: Bug #362063
Here's the error message in English.
Unpacking mesa-common-dev (from .../mesa-common-dev_6.4.1-0.4_all.deb) ...
dpkg: error processing
/var/cache/apt/archives/mesa-common-dev_6.4.1-0.4_all.deb (--unpack):
trying to overwrite
Hire,
i am here s!itting in the internet caffe. Found your email anda
decided to write. I might be coming to your place in !14 days,
so I decided to email you. May be we can meet? I am 25 y.o.
girl. I have a picture if you want. No need to reply here as
this ais not my email. Write me at [EMAIL P
Package: udev
Version: 0.076-3
Severity: grave
The postinst is apparently unhappy upon upgrading.
Preparing to replace udev 0.076-2 (using .../udev_0.076-3_powerpc.deb) ...
Unpacking replacement udev ...
[...]
Setting up udev (0.076-3) ...
Installing new version of config file /etc/modpro
for catching it, Stefan!
--
G. Branden Robinson|I've made up my mind. Don't try to
Debian GNU/Linux |confuse me with the facts.
[EMAIL PROTECTED] |-- Indiana Senator Earl Landgrebe
http://people.debian.org/~branden/ |
signature.asc
Description: Digital signature
Package: gnumeric
Version: 1.6.0-2
Severity: serious
Justification: no longer builds from source
Even after the libgsf-1{,-common} problem is cleared up by using more
recent versions of the package, gnumeric still has a problem building from
source.
Log attached.
-- System Information:
Debian Re
On Sun, Nov 06, 2005 at 04:18:11PM +0100, Frank Lichtenheld wrote:
> On Sun, Nov 06, 2005 at 09:55:07AM -0500, Branden Robinson wrote:
> > Package: librplay3-dev
> > Version: 3.3.2-9
> > Severity: serious
> > File: /usr/include/rplay.h
> >
> > Per Policy §3.
Package: librplay3-dev
Version: 3.3.2-9
Severity: serious
File: /usr/include/rplay.h
Per Policy §3.5, librplay3-dev should depend on libc6-dev | libc6-dev.
Its header file references C library headers, and if those are not
installed, the compilation of source code which #includes rplay.h will
fai
I work in an office where there is always food to snack on.
I kept trying different diet pills to lose the extra pounds but none of them
worked
because I was always hungry. Within two weeks of taking Hoodia Maximum Strength
I not only lose the extra pounds but can walk by the snack machine with
Package: tetex-doc
Version: 3.0-9
Severity: grave
Preparing to replace tetex-doc 2.0.2c-9 (using .../tetex-doc_3.0-9_all.deb) ...
Unpacking replacement tetex-doc ...
dpkg: error processing /var/cache/apt/archives/tetex-doc_3.0-9_all.deb
(--unpack):
trying to overwrite `/usr/share/doc/texmf/Makef
ew the new folder again.
14) WHERE THE HELL ARE THE MESSAGE BODIES?
Retitled bug accordingly.
I stand by the severity of this report.
I don't know if it's specific to mbox folders; that's just the only format
I ever use.
--
G. Branden Robinson| You are not a
Package: mutt
Version: 1.5.11-1
Severity: critical
This is awful.
For years I have performed multiple opens of mbox files, using multiple
mutt processes.
For years it worked.
Now it doesn't.
Now, if you do this, message bodies will be nuked out of the folder and the
Content-Length: header rewr
emoglen.law.columbia.edu/publications/lu-12.html
[2] http://emoglen.law.columbia.edu/publications/lu-13.html
[3] http://gpl-violations.org/news/20050414-fortinet-injunction.html
--
G. Branden Robinson|Build a fire for a man, and he'll
Debian GNU/Linux |
Package: libdjvulibre15
Version: 3.5.15-1
Followup-For: Bug #327190
(Reading database ... 146148 files and directories currently installed.)
Unpacking libdjvulibre15 (from .../libdjvulibre15_3.5.15-1_powerpc.deb) ...
dpkg: error processing
/var/cache/apt/archives/libdjvulibre15_3.5.15-1_powerpc.d
e regular shlib package is the wrong thing to do
because anyone using dlopen() has a certain expectation about the soversion
of the object they're opening -- after all, they expect certain symbols to
be present.
Just my speculative guess, having seen a similar problem before.
--
G. Branden R
:)
--
G. Branden Robinson| When dogma enters the brain, all
Debian GNU/Linux | intellectual activity ceases.
[EMAIL PROTECTED] | -- Robert Anton Wilson
http://people.debian.org/~branden/ |
signature.asc
Description: Digital signature
t;http://ftp.x.org/pub/X11R6.8.1/patches/> are still vulnerable).
Thanks,
Matej
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
- End forwarded message -
--
G. Branden Robinson | Communi
n the
failure of s_open() to properly scrutinize its arguments as you indicate,
then please contact MITRE and ask for a CAN number, and/or ask
freedesktop.org to do so.
--
G. Branden Robinson| If atheism is a religion, then
Debian GNU/Linux | health is a
Joey,
You can write in the xfree86 DSA for CAN-2005-0609 that the sarge/sid
vulnerability will be fixed by xfree86 4.3.0.dfsg.1-13, which is currently
in preparation.
--
G. Branden Robinson| Never underestimate the power of
Debian GNU/Linux | human
cally:
http://necrotic.deadbeast.net/svn/xfree86/trunk/debian/changelog
Please go ahead and do the advisory for woody's xfree86 once you're ready.
I've been working with vorlon regarding 4.3.0.dfsg.1-13, and there's no
reason to expect that release to not fix CAN-2005-0609.
On Fri, Mar 11, 2005 at 03:35:32AM -0500, Branden Robinson wrote:
> The following URL contains source and binary packages for powerpc resolving
> CAN-2005-0605[1], which is described as:
>
> The XPM library's scan.c file may allow attackers to execute arbitrary code
> by
your closing of #298939 is in error (since it's not
accurate), and cloning a copy of it for CAN-2005-0605's affect of
lesstif1-1.
--
G. Branden Robinson|
Debian GNU/Linux | If ignorance is bliss,
[EMAIL PROTECTED] |
lity.
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0605
--
G. Branden Robinson|Somewhere, there is a .sig so funny
Debian GNU/Linux |that reading it will cause an
[EMAIL PROTECTED] |aneurysm. This is not
Package: libxpm4
Version: 4.3.0.dfsg.1-12
Severity: grave
Tags: security, upstream, fixed-upstream, patch
CAN-2005-0605 indicates that "scan.c for LibXPM may allow attackers to
execute arbitrary code via a negative bitmap_unit value that leads to a
buffer overflow."
Patch is here:
https://bugs.f
39 matches
Mail list logo