Bug#1078721: iproute2: removing /sbin/ip link breaks other packages and possibly user scripts

2024-08-15 Thread G. Branden Robinson
ar in two different paths is a higher priority than > keeping systems working. "Move fast and break as much stuff as possible, or Debian will be doomed to irrelevance. I'll be SABDFL someday!" The creed of the _impactful_ developer. Regards, Branden signature.asc Description: PGP signature

Bug#1041731: Hyphens in man pages

2023-10-15 Thread G. Branden Robinson
Hi Russ, At 2023-10-15T12:06:14-0700, Russ Allbery wrote: > Minor point, but since you posted it No worries! > "G. Branden Robinson" writes: > > > ... > > > \- Minus sign or basic Latin hyphen‐minus. \- produces the > > Uni

Bug#1041731: Hyphens in man pages

2023-10-15 Thread G. Branden Robinson
and I'd prefer not to see additional cargo cult techniques piled on top of it. https://git.savannah.gnu.org/cgit/groff.git/tree/PROBLEMS?h=1.23.0#n82 Regards, Branden [1] Just like the omission of bounds checks on array types. What a brilliant efficiency that was. Jean Ichbiah saw

Bug#1041731: Hyphens in man pages

2023-10-15 Thread G. Branden Robinson
2C6 (modifier letter circumflex accent) or similar. \(rs Reverse solidus (backslash). The backslash is the default escape character in the roff language, so it does not represent itself in output. Also see \e above. \(ti Basic Latin tilde. Some output devices format “~” as U+02DC (small tilde) or similar. > Hope that's helpful. I hope this message goes some way toward relieving your frustration. Regards, Branden signature.asc Description: PGP signature

Bug#1041731: Hyphens in man pages

2023-10-14 Thread G. Branden Robinson
79), this is a bigger challenge to achieve with HTML than you might suppose. If you want only a rough approximation thereof, my guess is that there are many straightforward and valid approaches one could take. The challenge would then be in persuading others to adopt your one obviously optimal soluti

Bug#1052675: man-db: renders dashes as U+2010 breaking copy/paste of --long-options from man pages

2023-09-25 Thread G. Branden Robinson
you might apply the patch documented in groff's PROBLEMS file to your /etc/groff/man.local. --- start --- .if '\*[.T]'utf8' \{\ . char ' \[aq] . char - \- . char ^ \[ha] . char ` \[ga] . char ~ \[ti] .\} --- end --- As that file notes, you may also wish to d

Bug#1041317: dgit: table too wide in man page, trashes autopkgtests

2023-07-21 Thread G. Branden Robinson
e measure - determine some nroff formatting parameters Description. The width of a character cell (1 en) is 24 basic units. The page offset is 0 (0n). The line length is 1560 (65n). The indentation is 120 (5n). Bye! Printed 9/22/882023-07-21 1 $ exit Regards, Branden signature.asc Description: PGP signature

Bug#1041317: dgit: table too wide in man page, trashes autopkgtests

2023-07-17 Thread G. Branden Robinson
Hi Ian, At 2023-07-17T14:32:40+0100, Ian Jackson wrote: > Hi. Thanks for your comprehensive, detailed and helpful email. You're most welcome. > G. Branden Robinson writes ("Bug#1041317: dgit: table too wide in man > page, trashes autopkgtests"): > > I noticed that

Bug#923298: chromium: file overlap with chromium-sandbox without Conficts and/or Replaces

2019-02-25 Thread G. Branden Robinson
Package: chromium Version: 72.0.3626.96-1~deb9u1 Severity: grave Justification: renders package unusable I have been tracking testing for several months. This looks to me like a missing or insufficiently versioned Replaces declaration, but I did not dig deeply into this except to check the BTS to

Bug#860347: xserver-xorg-core: can't produce script.log for running X server

2017-04-14 Thread G. Branden Robinson
ens fd 3, directs it to a file, and then executes the bug script. $ cat > bugwrap #!/bin/sh exec 3> /tmp/script.log exec /usr/share/bug/xorg/script ^D $ chmod 600 bugwrap $ sudo ./bugwrap Regards, Branden [1] in the manpages-dev package signature.asc Description: PGP signature

Bug#511645: Bug #511645: xtrs: Can hang on startup: marking grave

2017-03-23 Thread G. Branden Robinson
ending tag because I need to, ah, generate a fresh GPG key pair and get myself back in the ranks of active Debian developers. That may take time, and Stretch should not ship with this nonfunctional package. Regards, Branden

Bug#382175: cleanup this bug

2006-08-17 Thread Branden Robinson
submitter 382175 Branden Robinson <[EMAIL PROTECTED]> thanks On Mon, Aug 14, 2006 at 06:45:08PM +, Brian M. Carlson wrote: > On Sun, Aug 13, 2006 at 10:51:54PM -0400, Branden Robinson wrote: > > On Wed, Aug 09, 2006 at 09:56:53PM +, Brian M. Carlson wrote: > > >

Bug#382175: cleanup this bug

2006-08-13 Thread Branden Robinson
ify potential team members for a re-implementation under the LGPL or a GPL-compatible non-copyleft like the MIT/X11 license or 2-clause BSD. > And yes, Branden, I Cc'd you, but this isn't a mailing list, it is a > bug. I will not Cc you further unless instructed otherwise. I do no

Bug#375240: patch

2006-07-20 Thread Branden Robinson
lick and see the TWM menu as specified in the > -submitter's .twmrc, and it no longer causes the window manager to > crash. Thanks for the improved backtrace, and the patch! It's my intention to work on this over the weekend at the latest, but if I fail to have

Bug#338537: renaming

2006-05-21 Thread Branden Robinson
Package: mffm-fftw1c2 Version: 1.6-1 Followup-For: Bug #338537 > To be clear, if packages could work with the new library without having to > be recompiled, it would have been inappropriate to rename the lib package at > all... In this case, yeah, but there are other reasons to rename packages.

Bug#338537: mffm-fftw1c2 should Conflicts: and Replaces: mffm-fftw1

2006-05-20 Thread Branden Robinson
Package: mffm-fftw1c2 Version: 1.6-1 Followup-For: Bug #338537 mffm-fftw1c2 needs to do both of the following: Conflicts: mffm-fmtw1 Replaces: mffm-fftw1 Ordinarily when a package is renamed, it Provides: the former name as well, but in this case it doesn't actually "provide" the previous name b

Bug#362063: bug still exists

2006-05-17 Thread Branden Robinson
Package: mesa-common-dev Version: 6.4.1-0.4 Followup-For: Bug #362063 Here's the error message in English. Unpacking mesa-common-dev (from .../mesa-common-dev_6.4.1-0.4_all.deb) ... dpkg: error processing /var/cache/apt/archives/mesa-common-dev_6.4.1-0.4_all.deb (--unpack): trying to overwrite

Bug#210496: getting to know you

2006-04-26 Thread Branden
Hire, i am here s!itting in the internet caffe. Found your email anda decided to write. I might be coming to your place in !14 days, so I decided to email you. May be we can meet? I am 25 y.o. girl. I have a picture if you want. No need to reply here as this ais not my email. Write me at [EMAIL P

Bug#341650: udev: postinst dies upon upgrade from 0.76-2 to 0.76-3

2005-12-01 Thread Branden Robinson
Package: udev Version: 0.076-3 Severity: grave The postinst is apparently unhappy upon upgrading. Preparing to replace udev 0.076-2 (using .../udev_0.076-3_powerpc.deb) ... Unpacking replacement udev ... [...] Setting up udev (0.076-3) ... Installing new version of config file /etc/modpro

Bug#336775: marked as done (read-edid does not provide any binary)

2005-11-14 Thread Branden Robinson
for catching it, Stefan! -- G. Branden Robinson|I've made up my mind. Don't try to Debian GNU/Linux |confuse me with the facts. [EMAIL PROTECTED] |-- Indiana Senator Earl Landgrebe http://people.debian.org/~branden/ | signature.asc Description: Digital signature

Bug#338669: gnumeric: FTBFS on powerpc

2005-11-11 Thread Branden Robinson
Package: gnumeric Version: 1.6.0-2 Severity: serious Justification: no longer builds from source Even after the libgsf-1{,-common} problem is cleared up by using more recent versions of the package, gnumeric still has a problem building from source. Log attached. -- System Information: Debian Re

Bug#337791: librplay3-dev: should depend on libc6-dev

2005-11-08 Thread Branden Robinson
On Sun, Nov 06, 2005 at 04:18:11PM +0100, Frank Lichtenheld wrote: > On Sun, Nov 06, 2005 at 09:55:07AM -0500, Branden Robinson wrote: > > Package: librplay3-dev > > Version: 3.3.2-9 > > Severity: serious > > File: /usr/include/rplay.h > > > > Per Policy §3.

Bug#337791: librplay3-dev: should depend on libc6-dev

2005-11-06 Thread Branden Robinson
Package: librplay3-dev Version: 3.3.2-9 Severity: serious File: /usr/include/rplay.h Per Policy §3.5, librplay3-dev should depend on libc6-dev | libc6-dev. Its header file references C library headers, and if those are not installed, the compilation of source code which #includes rplay.h will fai

Bug#203598: Information about Hoodia the new diet wonder

2005-10-20 Thread Branden Guthrie
I work in an office where there is always food to snack on. I kept trying different diet pills to lose the extra pounds but none of them worked because I was always hungry. Within two weeks of taking Hoodia Maximum Strength I not only lose the extra pounds but can walk by the snack machine with

Bug#334659: tetex-doc: uninstallable due to file overlap with tetex-base

2005-10-18 Thread Branden Robinson
Package: tetex-doc Version: 3.0-9 Severity: grave Preparing to replace tetex-doc 2.0.2c-9 (using .../tetex-doc_3.0-9_all.deb) ... Unpacking replacement tetex-doc ... dpkg: error processing /var/cache/apt/archives/tetex-doc_3.0-9_all.deb (--unpack): trying to overwrite `/usr/share/doc/texmf/Makef

Bug#330474: mutt: opens of same mbox by multiple mutt processes erase message bodies

2005-09-29 Thread Branden Robinson
ew the new folder again. 14) WHERE THE HELL ARE THE MESSAGE BODIES? Retitled bug accordingly. I stand by the severity of this report. I don't know if it's specific to mbox folders; that's just the only format I ever use. -- G. Branden Robinson| You are not a

Bug#330474: mutt: opens of same mbox by multiple mutt processes erase message bodies

2005-09-28 Thread Branden Robinson
Package: mutt Version: 1.5.11-1 Severity: critical This is awful. For years I have performed multiple opens of mbox files, using multiple mutt processes. For years it worked. Now it doesn't. Now, if you do this, message bodies will be nuked out of the folder and the Content-Length: header rewr

Bug#328121: Linuxsampler license

2005-09-20 Thread Branden Robinson
emoglen.law.columbia.edu/publications/lu-12.html [2] http://emoglen.law.columbia.edu/publications/lu-13.html [3] http://gpl-violations.org/news/20050414-fortinet-injunction.html -- G. Branden Robinson|Build a fire for a man, and he'll Debian GNU/Linux |

Bug#327190: #327190: seen here as well

2005-09-10 Thread Branden Robinson
Package: libdjvulibre15 Version: 3.5.15-1 Followup-For: Bug #327190 (Reading database ... 146148 files and directories currently installed.) Unpacking libdjvulibre15 (from .../libdjvulibre15_3.5.15-1_powerpc.deb) ... dpkg: error processing /var/cache/apt/archives/libdjvulibre15_3.5.15-1_powerpc.d

Bug#323140: earth3d: Failure to start

2005-08-17 Thread Branden Robinson
e regular shlib package is the wrong thing to do because anyone using dlopen() has a certain expectation about the soversion of the object they're opening -- after all, they expect certain symbols to be present. Just my speculative guess, having seen a similar problem before. -- G. Branden R

Bug#308783: xfree86 SVN trunk ready for branch merge and release

2005-05-31 Thread Branden Robinson
:) -- G. Branden Robinson| When dogma enters the brain, all Debian GNU/Linux | intellectual activity ceases. [EMAIL PROTECTED] | -- Robert Anton Wilson http://people.debian.org/~branden/ | signature.asc Description: Digital signature

Bug#308783: RFC: Bug#308783: libxpm4: problems with s_popen (CAN-2004-0914)

2005-05-18 Thread Branden Robinson
t;http://ftp.x.org/pub/X11R6.8.1/patches/> are still vulnerable). Thanks, Matej -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED] - End forwarded message - -- G. Branden Robinson | Communi

Bug#308783: libxpm4: problems with s_popen (CAN-2004-0914)

2005-05-14 Thread Branden Robinson
n the failure of s_open() to properly scrutinize its arguments as you indicate, then please contact MITRE and ask for a CAN number, and/or ask freedesktop.org to do so. -- G. Branden Robinson| If atheism is a religion, then Debian GNU/Linux | health is a

Bug#298939: Regarding xfree86 and CAN-2005-0609

2005-05-06 Thread Branden Robinson
Joey, You can write in the xfree86 DSA for CAN-2005-0609 that the sarge/sid vulnerability will be fixed by xfree86 4.3.0.dfsg.1-13, which is currently in preparation. -- G. Branden Robinson| Never underestimate the power of Debian GNU/Linux | human

Bug#298939: Regarding xfree86 and CAN-2005-0609

2005-05-06 Thread Branden Robinson
cally: http://necrotic.deadbeast.net/svn/xfree86/trunk/debian/changelog Please go ahead and do the advisory for woody's xfree86 once you're ready. I've been working with vorlon regarding 4.3.0.dfsg.1-13, and there's no reason to expect that release to not fix CAN-2005-0609.

Bug#298939: xfree86 4.1.0-16woody6 available to fix CAN-2005-0605

2005-04-20 Thread Branden Robinson
On Fri, Mar 11, 2005 at 03:35:32AM -0500, Branden Robinson wrote: > The following URL contains source and binary packages for powerpc resolving > CAN-2005-0605[1], which is described as: > > The XPM library's scan.c file may allow attackers to execute arbitrary code > by

Bug#298939: #298939 should not have been marked fixed by lesstif1-1 NMU

2005-03-12 Thread Branden Robinson
your closing of #298939 is in error (since it's not accurate), and cloning a copy of it for CAN-2005-0605's affect of lesstif1-1. -- G. Branden Robinson| Debian GNU/Linux | If ignorance is bliss, [EMAIL PROTECTED] |

Bug#298939: xfree86 4.1.0-16woody6 available to fix CAN-2005-0605

2005-03-11 Thread Branden Robinson
lity. [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0605 -- G. Branden Robinson|Somewhere, there is a .sig so funny Debian GNU/Linux |that reading it will cause an [EMAIL PROTECTED] |aneurysm. This is not

Bug#298939: libxpm4: new buffer overflow security hole (CAN-2005-0605)

2005-03-10 Thread Branden Robinson
Package: libxpm4 Version: 4.3.0.dfsg.1-12 Severity: grave Tags: security, upstream, fixed-upstream, patch CAN-2005-0605 indicates that "scan.c for LibXPM may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow." Patch is here: https://bugs.f