Bug#703081: emacs23-bin-common: emacsclient launches emacs with the wrong arg0

2013-03-15 Thread Christian Hofstaedtler
Package: emacs23-bin-common
Version: 23.4+1-4
Severity: important

Dear Maintainer,

I have $EDITOR set to /usr/bin/emacsclient -c. When there is no
(server) emacs running, emacsclient starts a new emacs, but places
-c as the arg0 (instead of the emacs binary name).

Example emacsclient invocation:
sh -c /usr/bin/emacsclient -c +6 
'/tmp/reportbug-emacs23-bin-common-20130315-13844-cG7qgW'

Results in:
-c +6 /tmp/reportbug-emacs23-bin-common-20130315-13844-cG7qgW

I consider this important because it hides which process is actually
running.

Version info:
% /usr/bin/emacsclient --version
emacsclient 23.4

Env vars:
ALTERNATE_EDITOR=emacs
EDITOR=/usr/bin/emacsclient -c

The same bug manifests itself in the emacs24 packages from sid.

Thanks,
Christian

-- 
   Christian Hofstaedtler   | design, deploy, scale
http://christian.hofstaedtler.name/ | phone +43 720 699846


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703082: linux: Please change path in which dtb is installed

2013-03-15 Thread Nobuhiro Iwamatsu
Source: linux
Version: 3.8.2-1~experimental.1
Severity: normal
Tags: patch

Dear Maintainer,

From linux 3.8, the directory where dtb is created was changed.  
Therefore, we need to change the script for package building.
I created a patch which fix this problem.
Please check and apply.

Best regards,
  Nobuhiro

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=ja_JP.UTF-8, LC_CTYPE=ja_JP.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff --git a/debian/rules.real b/debian/rules.real
index f4b61f5..2b77891 100644
--- a/debian/rules.real
+++ b/debian/rules.real
@@ -384,7 +384,7 @@ install-image_$(ARCH)_$(FEATURESET)_$(FLAVOUR)_plain_image: DTB_INSTALL_DIR = /u
 install-image_$(ARCH)_$(FEATURESET)_$(FLAVOUR)_plain_image:
 	install -m644 '$(DIR)/arch/$(KERNEL_ARCH)/boot/zImage' $(INSTALL_DIR)/vmlinuz-$(REAL_VERSION)
 	+$(MAKE_CLEAN) -C $(DIR) dtbs
-	shopt -s nullglob ; for i in $(DIR)/arch/arm/boot/*.dtb ; do \
+	shopt -s nullglob ; for i in $(DIR)/arch/arm/boot/dts/*.dtb ; do \
 		install -D -m644 $$i '$(PACKAGE_DIR)'/'$(DTB_INSTALL_DIR)'/$$(basename $$i) ; \
 	done
 endif
-- 
1.7.10.4



Bug#703083: linux: Please add support armel/Plat'Home OpenBlocks A6

2013-03-15 Thread Nobuhiro Iwamatsu
Package: linux
Version: 3.8.2-1~experimental.1
Severity: wishlist
Tags: patch

Dear Maintainer,

Please add support Plat'Home OpenBlocks A6 of armel.
This board was supported from 3.8.

I attached the patch which supports this.
Please check and apply.

Best regards,
  Nobuhiro

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=ja_JP.UTF-8, LC_CTYPE=ja_JP.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff --git a/debian/config/armel/config.kirkwood b/debian/config/armel/config.kirkwood
index 1e8790a..0d07c9a 100644
--- a/debian/config/armel/config.kirkwood
+++ b/debian/config/armel/config.kirkwood
@@ -60,6 +60,7 @@ CONFIG_MACH_GURUPLUG=y
 CONFIG_ARCH_KIRKWOOD_DT=y
 CONFIG_MACH_DREAMPLUG_DT=y
 CONFIG_MACH_ICONNECT_DT=y
+CONFIG_MACH_OPENBLOCKS_A6_DT=y
 CONFIG_MACH_TS219=y
 CONFIG_MACH_TS41X=y
 CONFIG_MACH_DOCKSTAR=y


Bug#703084: owncloud: should not be shipped with wheezy

2013-03-15 Thread Michael Gilbert
package: src:owncloud
version: 4.0.4debian2-3.3
severity: grave

This package should not be shipped with wheezy.  The biggest problem
is lack of upstream security support.  See:
https://lists.debian.org/debian-release/2013/03/msg00535.html

Removal request already filed:
http://bugs.debian.org/702186


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703085: keepalived: Version 1.2.6 simply do not work with chk_script, please upgrade to 1.2.7 stable

2013-03-15 Thread Jerome Benoit
Package: keepalived
Version: 1.2.6
Severity: important

Dear Maintainer,

Please upgrade to 1.2.7 because of the upstream bug and patch.

Thks.


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703086: bugs.debian.org: non-ASCII characters appear as \xHH on bugs pages

2013-03-15 Thread Vincent Lefevre
Package: bugs.debian.org
Severity: normal

Non-ASCII characters appear as \xHH on bugs pages. AFAIK, this problem
is new.

For instance,

  http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=35;bug=399875

or

  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=399875#35

contains the line:

Vincent Lef\xE8vre vinc...@vinc17.net - Web: http://www.vinc17.net/

with \xE8 instead of 'e' with a grave accent.

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 
'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.8-trunk-amd64 (SMP w/2 CPU cores)
Locale: LANG=POSIX, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703087: php-xml-rss: Requires PHPunit but does not Depend on it

2013-03-15 Thread robert pogson
Package: php-xml-rss
Version: 1.0.2-3
Severity: important

Dear Maintainer,


attempting to run an included test revealed that a required package was not
installed:
   php /usr/share/php/tests/XML_RSS/tests/XML_RSS_Infrastructure_Test.php
   PHP Warning:  require_once(PHPUnit/Autoload.php): failed to open stream:
  No such file or directory in /usr/share/php/tests/XML_RSS/tests/
   XML_RSS_Infrastructure_Test.php on line 21
   PHP Fatal error:  require_once(): Failed opening required
 'PHPUnit/Autoload.php'
(include_path='.:/usr/share/php:/usr/share/pear')
 in /usr/share/php/tests/XML_RSS/tests/
   XML_RSS_Infrastructure_Test.php on line 21

after installing phpunit, the system gives:
php /usr/share/php/tests/XML_RSS/tests/XML_RSS_Infrastructure_Test.php
PHPUnit 3.6.10 by Sebastian Bergmann.

..

Time: 0 seconds, Memory: 2.75Mb

OK (2 tests, 4 assertions)
===
Perhaps the package should be made to depend on phpunit or at least to
recommend phpunit. Thanks.

-- System Information:
Debian Release: 7.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.8.2 (SMP w/4 CPU cores)
Locale: LANG=en_CA.UTF8, LC_CTYPE=en_CA.UTF8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages php-xml-rss depends on:
ii  php-pear5.4.4-14
ii  php-xml-parser  1.3.4-6
ii  php55.4.4-14

php-xml-rss recommends no packages.

php-xml-rss suggests no packages.

-- no debconf information

-- 
Robert Pogson
Have server, will travel...


Bug#703088: ITP: ruby-remcached -- Ruby EventMachine memCACHED client implementation

2013-03-15 Thread Praveen A
package: wnpp
severity: wishlist

* Homepage: http://rubygems.org/gems/remcached
* Version: 0.4.1
* Upstream Author: Stephan Maka
* Programming Language: Ruby
* License: unknown (asking the author to clarify
https://github.com/astro/remcached/issues/4)
* Description:

* **Ruby EventMachine memCACHED client implementation**
* provides a direct interface to the memcached protocol and its
  semantics
* uses the memcached `binary protocol`_ to reduce parsing overhead on
  the server side (requires memcached = 1.3)
* supports multiple servers with simple round-robin key hashing
  (**TODO:** implement the libketama algorithm) in a fault-tolerant
  way
* writing your own abstraction layer is recommended
* uses RSpec
* partially documented in RDoc-style


-- 
പ്രവീണ്‍ അരിമ്പ്രത്തൊടിയില്‍
You have to keep reminding your government that you don't get your
rights from them; you give them permission to rule, only so long as
they follow the rules: laws and constitution.


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703089: arb_edit4 broken in BioLinux (Ubuntu12.04)

2013-03-15 Thread German Bonilla Rosso
Package: arb
Version: 5.3-private-8210

Nothing happens when trying to open the ARB_EDIT4 sequence editor, but a file 
not found error in the terminal:

sh: 1: arb_edit4: not found

The file is indeed not found under /usr/local/bin, /usr/lib/arb, 
/usr/lib/arb/bin or anywhere else in the system. A similar file is found under 
/usr/lib/arb/bin/arb_edit. Softlinking this file to arb_edit4 has still no 
effect but a message referring to the opening of the old ARB editor. 

Already checked the correct paths in the environmental variables, and 
softlinked the libmotif libraries from 3 to 4. 

This error is not reproduced when installing the latest arb version 
5.5-org-9167 from source, but this is not available through the repositories 
and version 5.3 is still the one being shipped with BioLinux. And I don't 
really know what went wrong.  

I'm using the preinstalled arb in Biolinux (Ubuntu 12.04 precise), kernel 
3.2.0-38-generic #61-Ubuntu SMP , libc6 2.15-0ubuntu10.3. 

This error is replicated in another BioLinux7 installation on an i7x4 laptop. 

cheers.

Germän Bonilla-Rosso
---
Inst för mikrobiologi
Box 7025
BioCentrum
750 07 UPPSALA
(+46) 018-673204

--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703091: python-tweepy-doc: wrong paragraph separation

2013-03-15 Thread Mirco Scottà
Package: python-tweepy-doc
Severity: minor

Dear Maintainer,
I've found an error in the Debian Package Description of this package:
the separation of the two paragraph has a . preceded by a space; this way 
the two paragraph are not separated correctly. 
Also the second paragraph start with a space.

Bye.
Mirco aka scottmir

--
If you can't explain it simply,
you don't understand it well enough.
(A.Einstein)
GNU/Linux User: 410619 (https://linuxcounter.net/)


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703093: RFS: beret/1.2.1-1 [ITP]

2013-03-15 Thread Alfonso Sabato Siciliano
Package: sponsorship-requests
  Severity: normal [important for RC bugs, wishlist for new packages]

  Dear mentors,

  I am looking for a sponsor for my package beret

 * Package name: beret
   Version : 1.2.1-1
 * URL : http://http://kiwisauce.com/beret/
 * License : LGPL
   Section : games

  It builds those binary packages:

beret - 2D puzzle platformer game
 beret-data - 2D puzzle platformer game (data)

  To access further information about this package, please visit the
following URL:

  http://mentors.debian.net/package/beret


  Alternatively, one can download the package with dget using this command:

dget -x http://mentors.debian.net/debian/pool/main/b/beret/beret_1.2.1-1.dsc



  Regards,
   Alfonso Sabato Siciliano

thanks


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703094: owncloud: multiple vulnerabilities (oC-SA-2013-009, oC-SA-2013-010)

2013-03-15 Thread Salvatore Bonaccorso
Package: owncloud
Severity: grave
Tags: security

Hi,

the following vulnerabilities were published for owncloud.

CVE-2013-1851[0]:
user_migrate: Local file disclosure

CVE-2013-1850[1]:
Contacts: Bypass of file blacklist

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities  Exposures) ids in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1851
http://security-tracker.debian.org/tracker/CVE-2013-1851
http://owncloud.org/about/security/advisories/oC-SA-2013-010
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1850
http://security-tracker.debian.org/tracker/CVE-2013-1850
http://owncloud.org/about/security/advisories/oC-SA-2013-009

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703092: dpkg --set-selections ignores available packages never installed or removed by dpkg

2013-03-15 Thread Agustin Martin
Package: dpkg
Version: 1.16.9
Severity: normal

Dear Maintainers,

I recently noticed that the workflow to install in a basic box the
list of extra packages present in other more complete box seems to
no longer work

full-box#  dpkg --get-selections  desired-selections.txt
basic-box# dpkg --get-selections  desired-selections.txt
basic-box# apt-get upgrade

This is better seen in a chroot with following sequence

# debootstrap sid mychroot http://http.debian.net/debian
# chroot mychroot

In the chroot:

mychroot# apt-get update
mychroot# echo joe install | dpkg --set-selections
... dpkg: warning: package not in database at line 1: joe
mychroot# apt-get upgrade
... 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
mychroot# dpkg --get-selections | grep joe

Selection seems lost. Trying with apt-get dselect-upgrade does not help

mychroot# apt-get install dselect
mychroot# apt-get dselect-upgrade
... 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
mychroot# dselect update
mychroot# apt-get dselect-upgrade
... 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.

Only if I set selections again after dselect update things work (althouch
only for apt-get dselect-upgrade). After previous commands

mychroot# echo joe install | dpkg --set-selections
mychroot# apt-get upgrade
... 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.

mychroot# apt-get dselect-upgrade
... 0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded.
... Setting up joe (3.7-2.3) ...



Seems that dpkg ignores setting values for packages that were never installed
or removed in the system, although they are available and can be retrieved
with apt-get. I guess dselect update adds apropriate entries to database
that can later be set.

IIRC this workflow is described in a number of places to clone a system, so
behavior should be fixed or clarified. If this change is intentional, some
comment should be added to dpkg man page or to README file. 

Regards,

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (200, 'unstable'), (1,
'experimental')
Architecture: i386 (i686)

Kernel: Linux 3.2.0-4-686-pae (SMP w/1 CPU core)
Locale: LANG=es_ES.ISO-8859-1, LC_CTYPE=es_ES.ISO-8859-1
(charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/bash

Versions of packages dpkg depends on:
ii  libbz2-1.0   1.0.6-4
ii  libc62.13-38
ii  liblzma5 5.1.1alpha+20120614-2
ii  libselinux1  2.1.9-5
ii  tar  1.26+dfsg-0.1
ii  zlib1g   1:1.2.7.dfsg-13

dpkg recommends no packages.

Versions of packages dpkg suggests:
ii  apt  0.9.7.8

-- no debconf information

-- 
Agustin


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703095: RFS: fonts-sil-averia/1.01-1 [ITP]

2013-03-15 Thread Alfonso Sabato Siciliano
Package: sponsorship-requests
  Severity: wishlist

  Dear mentors,

  I am looking for a sponsor for my package fonts-sil-averia

 * Package name: fonts-sil-averia
   Version : 1.01-1
 * URL : http://iotic.com/averia
 * License : SIL Open Font License
   Section : fonts

  It builds those binary packages:

fonts-sil-averia - Avería is a Unicode typeface family

  To access further information about this package, please visit the
following URL:

  http://mentors.debian.net/package/fonts-sil-averia


  Alternatively, one can download the package with dget using this command:

dget -x 
http://mentors.debian.net/debian/pool/main/f/fonts-sil-averia/fonts-sil-averia_1.01-1.dsc


  Regards,
   Alfonso Sabato Siciliano

thanks


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703096: libguestfs-tools: too many stramge dependencies

2013-03-15 Thread W. Martin Borgert

Package: libguestfs-tools
Version: 1:1.18.1-1+deb7u1

In need of virt-resize, I'm about to install libguestfs-tools,
however the amount of dependencies is a little bit strange:

# apt-get install libguestfs-tools
...
0 upgraded, 87 newly installed, 0 to remove and 0 not upgraded.
Need to get 38.4 MB of archives.
After this operation, 120 MB of additional disk space will be used.

While 120 MB is not much nowadays, I wonder whether indirect
dependencies on e.g. aptitude, fonts-droid, ghostscript,
ico-utils, or netpbm can be avoided somehow? Maybe the
package could be split accordingly? TIA!


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703097: upstream 1.10-RC1 packaging

2013-03-15 Thread Barak A. Pearlmutter
Package: liferea
Version: 1.8.6

For my own nefarious purposes, I packaged 1.10-RC1 based upon the tip of
the experimental branch in the collab-maint repo, in the process making
some other random updates.

Available in git://git.debian.org/~bap/liferea.git

You are welcome to pick anything of use from it, as you wish.

Cheers,

--Barak.
--
Barak A. Pearlmutter
 Hamilton Institute  Dept Comp Sci, NUI Maynooth, Co. Kildare, Ireland
 http://www.bcl.hamilton.ie/~barak/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703098: Fwd: Bug in 7z documentation

2013-03-15 Thread Mohammed Adnène TROJETTE

Package: p7zip
Severity: minor

Merci.

 Message original 
Objet: Bug in 7z documentation
Date: 2013-03-15 18:07
De: Guillaume MULLER g...@presans.com
À: adn+...@diwi.org

Dear Mohammed,

The man page of 7z (at least, in Ubuntu 12.10) says the synopsis is:
   7z [adeltux] [-] [SWITCH] ARCHIVE_NAME ARGUMENTS...

I've just tested, it does not work. However, the following sysopsis 
works:

   7z [adeltux] ARCHIVE_NAME [-] [SWITCH] ARGUMENTS...

The exact command I just used was:
 7z x JNI_SVM-light-6.01-64bit.zip  -- -x '*.dll' 
JNI_SVM-light-6.01-64bit/lib/


Cheers

--
Mohammed Adnène TROJETTE


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703100: pwman3: Please, upgrade to the latest version

2013-03-15 Thread Guilherme Gondim
Package: pwman3
Version: 0.0.8-1
Severity: wishlist

Dear Maintainer,

There is just a new pwman3 release (0.3.0). Would be great if you could upgrade
it in Debian.

https://pypi.python.org/pypi/Pwman3/0.3.0

Thank you very much!
Guilherme


-- System Information:
Debian Release: 7.0
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages pwman3 depends on:
ii  python  2.7.3-4
ii  python-crypto   2.6-4
ii  python-support  1.0.15

Versions of packages pwman3 recommends:
ii  python-mysqldb   1.2.3-1+b1
ii  python-pygresql  1:4.0-3

Versions of packages pwman3 suggests:
ii  mysql-server  5.5.28+dfsg-1

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703101: missing /usr/share/javascript/jquery-ui/themes/base/images/ui-anim_basic_16x16.gif

2013-03-15 Thread Rob J. Epping
Package: libjs-jquery-ui
Version: 1.8.ooops.21+dfsg-2
Severity: normal

After upgrade from squeeze to wheezy the ui-anim_basic_16x16.gif is missing.

Please re-add, THNX

-- System Information:
Debian Release: 7.0
  APT prefers testing-updates
  APT policy: (500, 'testing-updates'), (500, 'testing'), (400, 
'testing-proposed-updates')
Architecture: armel (armv5tel)

Kernel: Linux 3.2.0-4-kirkwood
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages libjs-jquery-ui depends on:
ii  libjs-jquery  1.7.2+dfsg-1

Versions of packages libjs-jquery-ui recommends:
ii  javascript-common  7

Versions of packages libjs-jquery-ui suggests:
ii  libjs-jquery-ui-docs  1.8.ooops.21+dfsg-2

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703102: PidFile /dev/null replaces /dev/null with a real file if run as root

2013-03-15 Thread Josh Triplett
Package: apache2.2-bin
Version: 2.2.22-13
Severity: normal

As part of a test setup, I ran Apache within a cgroup to contain it, so
I didn't need Apache to manage a PID file.  I set PidFile /dev/null,
but when I ran Apache as root (so that it could drop privileges and
change to another user/group), it overwrite /dev/null with a real file.
That caused no end of havoc on my system.

Perhaps Apache could truncate the existing file but not remove it?

- Josh Triplett

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.8-trunk-amd64 (SMP w/4 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages apache2.2-bin depends on:
ii  libapr1  1.4.6-3
ii  libaprutil1  1.4.1-3
ii  libaprutil1-dbd-sqlite3  1.4.1-3
ii  libaprutil1-ldap 1.4.1-3
ii  libc62.13-38
ii  libcap2  1:2.22-1.2
ii  libldap-2.4-22.4.31-1
ii  libpcre3 1:8.31-2
ii  libssl1.0.0  1.0.1e-1
ii  zlib1g   1:1.2.7.dfsg-13

apache2.2-bin recommends no packages.

apache2.2-bin suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703103: base: System boots to an apparently random tty

2013-03-15 Thread Riccardo Boninsegna
Package: base
Severity: minor

I've recently installed an AGP ATI Radeon 100 graphics card to get advantage of 
an high resolution console. (I believe this is relevant as the problem was 
nonexistant while using the integrated Intel i810 video):

(lspci output:
00:01.0 PCI bridge: Intel Corporation 82815 815 Chipset AGP Bridge (rev 02)
00:1e.0 PCI bridge: Intel Corporation 82801AA PCI Bridge (rev 02)
[...]
02:00.0 VGA compatible controller: Advanced Micro Devices [AMD] nee ATI RV100 
QY [Radeon 7000/VE]
)

I used `aptitude install linux-firmware-nonfree` to fix some warnings printed 
at early boot, but this problem was preexisting.
In fact, the problem manifested immediately after installing Sid via a tutorial 
found on a popular Italian fansite (install stable base system, edit 
sources.list, apt-get update/upgrade/install apt dpkg aptitude, aptitude 
dist-upgrade).
At this moment, the system is fully upgraded as the packages available at 
2013-3-15 13:00 GMT were.

After booting, the login prompt appears on an apparently random virtual console 
(most often tty3). While this isn't clearly correct behavior, it does not 
impair usability on a standard setup as all consoles are equal (this might not 
apply if inittab is edited to use autologin, but I haven't tried this scenario 
or any display manager).

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 3.2.0-4-686-pae (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703099: claws-mail-tools: please don't compress bundled scripts

2013-03-15 Thread Andrew Shadura
Package: claws-mail-tools
Version: 3.9.0-1
Severity: normal

Currently, scripts such as /usr/share/doc/claws-mail/tools/fix_date.sh.gz
are compressed, which makes it impossible to use them as is without
decompressing prior to that. Please add /usr/share/doc/claws-mail/tools/
to the -X of dh_compress. Thanks.

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 3.2.0-4-686-pae (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_GB.UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages claws-mail-tools depends on:
ii  claws-mail  3.9.0cvs61-1
ii  perl5.14.2-16
ii  python  2.7.3~rc2-1

claws-mail-tools recommends no packages.

claws-mail-tools suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703104: ITP: ruby-multipart-parser -- simple parser for multipart MIME messages

2013-03-15 Thread Jérémy Bobbio
Package: wnpp
Severity: wishlist
Owner: Jérémy Bobbio lu...@debian.org

* Package name: ruby-multipart-parser
  Version : 0.1.1
  Upstream Author : Daniel Abrahamsson hams...@gmail.com
* URL : https://github.com/danabr/multipart-parser
* License : Expat
  Programming Lang: Ruby
  Description : simple parser for multipart MIME messages

multipart-parser is a simple parser for multipart MIME messages, written
in Ruby, based on felixge/node-formidable's parser.

Some things to note:
 - pure Ruby
 - event-driven API
 - only supports one level of multipart parsing: another parser needs
   to be invoked to handle nested messages
 - does not perform I/O
 - does not depend on any other library

-- 
Jérémy Bobbio.''`. 
lu...@debian.org: :Ⓐ  :  # apt-get install anarchism
`. `'` 
  `-   


signature.asc
Description: Digital signature


Bug#703105: ITP: ruby-upr -- Upload Progress for Rack

2013-03-15 Thread Jérémy Bobbio
Package: wnpp
Severity: wishlist
Owner: Jérémy Bobbio lu...@debian.org

* Package name: ruby-upr
  Version : 0.2.0
  Upstream Author : upr hackers u...@librelist.com
* URL : http://www.example.org/
* License : Ruby or GPL-2
  Programming Lang: Ruby
  Description : Upload Progress for Rack

upr is Rack middleware that allows browser-side upload progress
monitoring. It is based on (and should be client-side compatible with)
several upload progress modules including ones used by leading web
servers. It allows any Moneta backing store in addition to DRb.

-- 
Jérémy Bobbio.''`. 
lu...@debian.org: :Ⓐ  :  # apt-get install anarchism
`. `'` 
  `-   


signature.asc
Description: Digital signature


Bug#703106: nautilus fails to start with missing 'org.gnome.desktop.privacy'

2013-03-15 Thread Praveen A
package: nautilus
version: 3.7.91-1
severity: grave

$ nautilus

(nautilus:5290): GLib-GIO-ERROR **: Settings schema
'org.gnome.desktop.privacy' is not installed

Trace/breakpoint trap

after installing gsettings-desktop-schemas 3.7.90-1 I was able to
start nautilus, so a versioned dependency on gsettings-desktop-schemas
should fix this.
-- 
പ്രവീണ്‍ അരിമ്പ്രത്തൊടിയില്‍
You have to keep reminding your government that you don't get your
rights from them; you give them permission to rule, only so long as
they follow the rules: laws and constitution.


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703107: ITP: rainbows -- HTTP server for sleepy Rack applications

2013-03-15 Thread Jérémy Bobbio
Package: wnpp
Severity: wishlist
Owner: Jérémy Bobbio lu...@debian.org

* Package name: rainbows
  Version : 4.5.0
  Upstream Author : Rainbows! Hackers rainbows-t...@rubyforge.org
* URL : http://rainbows.rubyforge.org/
* License : Ruby or GPL-2 or GPL-3
  Programming Lang: Ruby
  Description : HTTP server for sleepy Rack applications

Rainbows! is an HTTP server for sleepy Rack applications.  It is based
on Unicorn, but designed to handle applications that expect long
request/response times and/or slow clients.

-- 
Jérémy Bobbio.''`. 
lu...@debian.org: :Ⓐ  :  # apt-get install anarchism
`. `'` 
  `-   


signature.asc
Description: Digital signature


Bug#703108: live-config.noroot does not work due to a missing/extra underscore in config.sh

2013-03-15 Thread Chris Malton
Package: live-config
Version: 3.0.21-1
Severity: important

Dear Maintainer,

The config.sh script in live-config does not apply the noroot parameter
correctly.

In Line 74 it performs the command:
_NOROOT=true

Then on line 100, it performs a select case on it:
case ${_NO_ROOT} in

There is either an extra underscore on line 100, or a missing one on line 74.

This causes sudo  policykit to be configured when noroot is specified.
As a workaround, I'm applying this using noconfig=sudo,policykit

Please could this be fixed.

Many thanks in advance.

Regards,

Chris Malton



-- System Information:
Debian Release: 7.0
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703110: Navit crashes while setting destination

2013-03-15 Thread Ldten K
Package: navit   
Version: 0.5.0~svn5126+dfsg.1-2
Severity: important

Navit crashes while clicking on the map (a reasonable travel destination point) 
and then selecting Set as destination option. Set as position, Add as 
bookmark and POIs seem to work. Some months ago Set as destination was 
working fine for me as well with the same maps 
(data=/opt/osm/osm_bbox_-80.2,36.8,-68.2,46.2.bin) and the same navit.xml. I 
was hoping maybe it was some bad change in testing and navit would fix itself 
but apparently no.

Tried to download navit package again and then reinstalling it. The problem is 
still there.

Any ideas? Thanks



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703109: DateTime-modify('tomorrow') Bug in PHP 5.3 in Debian Squeeze 4.3.5-4

2013-03-15 Thread Christian Stoller
Package: php5
Version: 5.3.3-7+squeeze15
Tags: squeeze


I have a strange bug with DateTime-modify('tomorrow') in PHP 5.3.
Code to reproduce:

?php
$d = new DateTime('2013-02-05 06:33:33');
echo $d-format('Y-m-d H:i:s').\n;

$d-modify('tomorrow');
echo $d-format('Y-m-d H:i:s').\n;
?

Current output on Windows with PHP 5.3.14:
2013-02-05 06:33:33
2013-02-06 00:00:00

Current output on Linux (Debian) with PHP 5.3.3-7+squeeze15:
2013-02-05 06:33:33
2013-02-06 06:33:33

I have asked the PHP internals mailinglist (see 
http://www.mail-archive.com/internals@lists.php.net/msg64587.html) and got this 
answer:

 The 5.3.14 result is correct. It was apparently a bug in earlier 5.3 
 versions.
 
 cheers,
 Derick
http://www.mail-archive.com/internals@lists.php.net/msg64588.html

So it seems like the patch has not been integrated into Debian. It would be 
nice if this could be done.

Best regards
Christian Stoller


Bug#529680: O: php-net-dime -- class that implements DIME encoding

2013-03-15 Thread Prach Pongpanich
Control: retitle -1 ITA: php-net-dime -- class that implements DIME encoding
Control: owner -1 !

--
Prach


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#574725: chromium-browser: Adobe flashplugin-nonfree usage spawns: XID collision trouble ahead errors to console

2013-03-15 Thread Jonathan Nieder
Bart Martens wrote:
 On Thu, Mar 14, 2013 at 10:00:06PM -0700, Jonathan Nieder wrote:

  I don't know if this is caused
 by Adobe Flash player or something else.

 Then I guess you don't mind that I revert the reassignment.

In fact I do mind, since this almost certainly has nothing to do with
chromium and I have no desire to debug anything touching Flash.

[...]
 for example by letting the
 reporter know how to report it to Adobe

 That can be found on Adobe's website.

For future reference: I assume you'd prefer that I not refer future
bugs reported through the BTS about Flash's behavior on Debian when
installed using flashplayer-nonfree to its maintainers in the future?

Thanks for your work,
Jonathan


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#575873: sigar: change from RFP to ITP

2013-03-15 Thread Apollon Oikonomopoulos
retitle 575873 ITP: sigar -- A cross-platform API for collecting software 
inventory data
owner 575873 !
thanks

Hi,

I have started packaging sigar to ship at least the C, Java and Python 
libraries. This is an intermediate step for packaging elasticsearch for 
Debian.

Regards,
Apollon


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#603757: kde-plasma-desktop: Similar problem, although in my case the widgets got moved to small screen size

2013-03-15 Thread Alan Chandler
Package: kde-plasma-desktop
Version: 5:77
Followup-For: Bug #603757

Dear Maintainer,

I ran lincity-ng (for the first time) and it seemed to take over my
main monitor, forcing everything to the secondary monitor.  I tried to
shut down KDE, but nothing happened after hitting the red
log-off/shutdown button on the file menu and the show desktop widget.
In the end I had to do a power switch reboot falled by control-alt-del
to restart the whole system from scratch.

When I returned to the orginal dual monitor desktop, all the widgets
on the larger sceen had been moved from the right edge towards the
centre (seemingly forgetting their original settings - instead
remembering the settings as a result of running on the smaller screen)

What made me attach to this bug report however is that the task bar
was orginally placed on my secondary screen  (at the bottom) and seems
to have moved without reason to the main screen as a result of the
activities above.



-- System Information:
Debian Release: 7.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages kde-plasma-desktop depends on:
ii  kde-baseapps4:4.8.4-2
ii  kde-runtime 4:4.8.4-2
ii  kde-workspace   4:4.8.4-6
ii  plasma-desktop  4:4.8.4-6
ii  udisks  1.0.4-7
ii  upower  0.9.17-1

Versions of packages kde-plasma-desktop recommends:
pn  kdm   none
ii  xserver-xorg  1:7.7+2

Versions of packages kde-plasma-desktop suggests:
pn  kde-l10n  none

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#622960: Freeplane package + JMapViewer dependency

2013-03-15 Thread Andrew Harvey
On 15/03/13 04:29, Felix Natter wrote:
 For the upcoming 1.3.x Freeplane release (upstream in a few months) I
 also need the JMapViewer dependency.
 
 I saw this bug report regarding JMapViewer (which I cc:):
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649226
 
 Is someone taking care of JMapViewer for Debian?
 (there is no activity since 2011:
 http://anonscm.debian.org/gitweb/?p=pkg-osm/jmapviewer.git;a=summary)

I've just pushed some updates to the packaging to clean it up and
updated to the latest upstream version.

I'm happy to maintain it (unless upstream makes big changes which make
harder to package). However a DD will need to sponsor it's upload if we
want it included in Debian.

Lastly, my apologies to Laszlo who offered to sponsor it's upload back
in August last year, but I never got around to fixing up the package.
Hopefully the latest updates I've made will mean it can be sponsored and
uploaded into Debian.

Thanks all for chasing up with me on this, hopefully my original
packaging effort will not have been in vain after all.



signature.asc
Description: OpenPGP digital signature


Bug#622960: Freeplane package + JMapViewer dependency

2013-03-15 Thread Laszlo Boszormenyi (GCS)
On Fri, 2013-03-15 at 21:13 +1100, Andrew Harvey wrote:
 I've just pushed some updates to the packaging to clean it up and
 updated to the latest upstream version.
 Cool! I was beginning to think about hijacking it.

 I'm happy to maintain it (unless upstream makes big changes which make
 harder to package). However a DD will need to sponsor it's upload if we
 want it included in Debian.
 
 Lastly, my apologies to Laszlo who offered to sponsor it's upload back
 in August last year, but I never got around to fixing up the package.
 Hopefully the latest updates I've made will mean it can be sponsored and
 uploaded into Debian.
 Sure, it looks OK. Still, there's some things to fix. Why do you use
Java 6? Java 7 is in Debian now, see the openjdk-7-jre package.
Copyright format is now official, please use its format line[1].
BSD-2 license text lines are too long, please use a 80 chars width one.
It would be nice to 'beautify' debian/rules . The second line can show
the file format if set to: '# -*- makefile -*-'. Override targets should
be listed in the '.PHONY: ...' line at the end.
The debian/watch is essentially empty, delete it or make use of it.
Worst is that JMapViewer_Demo.jar is empty, contains only MANIFEST.MF .
Is it an upstream build problem?

Cheers,
Laszlo/GCS
[1] http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#631366: include progress logo

2013-03-15 Thread Alexander Wirt
tag 631366 -patch
thanks

On Thu, 23 Jun 2011, Daniel Baumann wrote:

 tag 631366 patch
 thanks
 
 fixed with this commit, feel free to merge:
 
 http://vcs.progress-linux.org/?p=packages/nagios-images.git;a=commitdiff;h=44b4335bb976ea097d8abb5d62e977dabb48d406
Unfortunatly that link is borken. Could you please attach the files?

Thanks
Alex


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#630617: May be decision

2013-03-15 Thread i5anov64
It seems kmix application is responsible for system tray troubles. When
it starts, I have a message
QDBusConnection: session D-Bus connection created before
QCoreApplication. Application may misbehave.. When KDE started first
time after boot, systray becomes crazy , no klipper icon and network
manager applet not responding to mouse buttons press. Removing
kmix.desktop from /usr/share/autostart helps, and when I put  it into
/home/user/.kde/Autostart, KDE desktop starts normally. Current Wheezy
and KDE.Sorry for my English.


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#631366: include progress logo

2013-03-15 Thread Daniel Baumann
tag 631366 patch
thanks

On 03/15/2013 08:43 AM, Alexander Wirt wrote:
 http://vcs.progress-linux.org/?p=packages/nagios-images.git;a=commitdiff;h=44b4335bb976ea097d8abb5d62e977dabb48d406
 Unfortunatly that link is borken.

http://sources.progress-linux.org/gitweb/?p=releases/baureo/packages/nagios-images.git;a=commitdiff;h=4f54a47fe76bdf9bb6dbb94e2821c570c75a819d

-- 
Address:Daniel Baumann, Donnerbuehlweg 3, CH-3012 Bern
Email:  daniel.baum...@progress-technologies.net
Internet:   http://people.progress-technologies.net/~daniel.baumann/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#668020: Getting remmina patched for wheezy

2013-03-15 Thread Bernhard Schmidt

Hello Luca,

there is a nasty bug in remmina that (sometimes) breaks the WM when 
setting the window size, which could lead to data loss. Or sometimes it 
just don't work without breaking the desktop environment.


There is an upstream patch (one line) that fixes the issue and at least 
four (merged) bugs marked important are verified to be fixed by this. So 
I would consider this a candidate to get into wheezy, even this late in 
the release cycle.


Bugs:   668020 677001 700369 702500

Would you be willing to move forward with this? If you do not have time 
I can prepare a package, but I cannot upload it. I could search for a 
sponsor though.


Best Regards,
Bernhard


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#668020: Getting remmina patched for wheezy

2013-03-15 Thread Luca Falavigna
2013/3/15 Bernhard Schmidt be...@birkenwald.de:
 Bugs:   668020 677001 700369 702500

Thanks a lot for your work on those bugs!

 Would you be willing to move forward with this? If you do not have time I
 can prepare a package, but I cannot upload it. I could search for a sponsor
 though.

I'm currently out for work, and don't have any chance to prepare an
upload from here, I'll try to see whether I'll have a chance next
week. If you don't hear from me within a couple of days, feel free to
prepare an NMU (I can eventually sponsor it, if I get the time, and
the GPG key with me).

Thanks again!


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#675345: Merge

2013-03-15 Thread Jürgen Fuchsberger
On 03/13/2013 09:40 PM, Anton Gladky wrote:
 forcemerge 675345 702809
 thanks
 
 I am merging bugs. No reasons to duplicate them, sorry.

Sorry for the double report - hat problems with reportbug (first time it
seemed that it didn't work)

Best
Juergen.
 
 On 03/13/2013 09:30 PM, Sven Joachim wrote:

 The OP has already reported problems in #675345, FWIW.
 
 Thanks,
 
 Anton
 




signature.asc
Description: OpenPGP digital signature


Bug#692830: preliminary Nemo package

2013-03-15 Thread Laszlo Boszormenyi (GCS)
Hi Tao,

Long time no see. But to answer your question, the preliminary package
is available from the git tree[1]. It contains 1.7.1 ATM, the source
tar.gz is available from upstream[2].
Package builds and works as expected.

Laszlo/GCS
[1] git clone git://anonscm.debian.org/pkg-cinnamon/nemo.git
[2] https://github.com/linuxmint/nemo/tags


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#688045: Installation report for Wheezy beta 2 installer

2013-03-15 Thread Samuel Thibault
Fabian Rodriguez, le Sun 10 Mar 2013 22:26:18 -0400, a écrit :
 On 2012-09-18 18:46, Samuel Thibault wrote:
  Fabian Rodriguez, le Tue 18 Sep 2012 12:51:09 -0400, a écrit :
  - - While installing the base system more optional detail
  (when downloading updates for example) could be useful .
  
  Most people do not care about such details, that is why we
  don't show them. If you really care, see the documentation:
  
  “ Error messages and logs are redirected to the fourth console.
  You can access this console by pressing Left Alt-F4 (hold the
  left Alt key while pressing the F4 function key); get back to
  the main installer process with Left Alt-F1. ”
  I appreciate Alt-F4 gives access to this but there isn't a hint
  about it when it would be useful (specially low-bandwidth
  conditions come to mind).
  
  Well, we can't really provide all kinds of hints for all possible 
  conditions.  That's why there is documentation.
 
 This is not about all possible conditions, just a very specific use
 case.

That's precisely my point. If we give a hint for that very specific use
case, it means we should do the same for all other very specific use
cases etc. and thus completely clutter the installer with all kinds of
hints, making it unusable.

 At the time I followed this documentation, which doesn't mention
 anything about the console use:
 http://d-i.debian.org/manual/en.i386/apa.html

If you only have a look at a howto, you indeed can not expect to have
this kind of details. A howto is meant to be as concise as possible.
Whenever getting into trouble, a howto is not the answer. The proper
documentation is. The actual installer documentation does have an
introduction to such details, see
http://d-i.debian.org/manual/en.i386/ch06s01.html

  Odd behavior (not show-stopper): - - Clock/timezone setup
  wasn't automatic even though a network connection was
  present
  
  Do you mean that the clock was not adjusted, or just that the
  timezone was not asked? When the country has only one timezone,
  the timezone question is not asked, that's normal.
  
  Timezone was asked but could have been guessed (GeoIP?),
  
  GeoIP is not really a safe bet. Which country did you select? I
  actually wonder whether GeoIP can even help for the countries which
  have several timezones.
 
 There wasn't a choice for country,

Which language had you chosen?  I don't see how you could not be
presented with the country choice. Did you perhaps preseed some things?

 only for timezones (Eastern, etc.)

We do already have the support for automatically choosing the proper
timezone once the country is properly selected. The information we use
for that comes from /usr/share/zoneinfo/zone.tab Since that didn't
happen, that's where we have to concentrate debugging: please tell us
exactly how you got to that situation.

 which makes the assumption such information is known/understood.

We only ask the timezone for countries which have several timezones.
People in such countries do know about them.

 Geolocation helps a lot with this.

Sure, and we already do it. When you mentioned GeoIP, I thought you
meant guessing the timezone from the public IP address that the
installer gets. That's broken at best, see for instance the thread here:

http://stackoverflow.com/questions/743505/how-to-get-time-zone-through-ip-address-in-php

Samuel


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#695588: RFS: jitsi/1.1.4365-1 [ITP]

2013-03-15 Thread Damian Minkov
Hi,

we've just updated the package on mentors.debian.net following the
comments we recieved:
The dsc file can be found at:
http://mentors.debian.net/debian/pool/main/j/jitsi/jitsi_2.0.4506.10553-1.dsc

Regards
Damian

On Mon, Dec 10, 2012 at 3:13 PM, Damian Minkov damen...@jitsi.org wrote:
   Package: sponsorship-requests
   Severity: wishlist


   Dear mentors,

   We are looking for a sponsor for our package jitsi

  * Package name: jitsi
Version : 1.1.4365-1
Upstream Author : Jitsi Community d...@jitsi.java.net
  * URL : https://jitsi.org/
  * License : LGPL v2
Section : net

   It builds those binary packages:

 jitsi - Java VoIP and Instant Messaging client
  jitsi-jni  - Jitsi JNI library

   To access further information about this package, please visit the
 following URL:

   http://mentors.debian.net/package/jitsi

   Alternatively, one can download the package with dget using this command:

 dget -x
 http://mentors.debian.net/debian/pool/main/j/jitsi/jitsi_1.1.4365-1.dsc

   More information about Jitsi can be obtained from https://jitsi.org and
 the developers mailinglist: d...@jitsi.java.net.

   Regards,
Damian Minkov


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#696234: apt: Signed Debian control block parsing can be fooled

2013-03-15 Thread David Kalnischkies
(Disclaimer: I am not arguing that we don't need to fix this – we are working
 on it – the following just outlines why I think that it is a bug in
 gpgv and/or other implementations that we have to fix to use them …)

On Thu, Mar 14, 2013 at 7:31 PM, Guillem Jover guil...@debian.org wrote:
 I think you might have been confused by the nomenclature, and my lack
 of more explicit detail, perhaps? Or I missunderstood your comment.

Yeah, I messed up the naming a bit … guilty as pledged.


 So (from what I wrote on the initial bug report) SigVerify::RunGPGV()
 would not be able to parse something like:

 -BEGIN PGP SIGNATURE-   \t \n

For the signature, this might to be a problem, for the message
(which I thought you are referring to) I still think §7 is the authority
as it not an amored header (line) but a cleartext header (line).

Yet, as §7.1 says that any trailing whitespace […] at the end of
 any line is removed when the cleartext signature is generated.
I question even why I should expect to see such a signature.

And given that paragraph §6.2 is referring to formatting ASCII Amor
which a clear-text message is not as §7 is so quick to outline I
question if §6.2 should have relevance in §7 at all without special
invocation by name, but this might destroy everything.

 And in additiona SourcesWriter::DoPackage() should not be able to
 handle an OpenPGP message starting with stuff like:

 -BEGIN PGP MESSAGE-   \t \n
 Hash: SHA1\n
\n
 SIGNED MESSAGE\n

Beside again invoking §7.1 and repeating that cleartext header isn't
mentioned as a possible Amored Header line, §7 also says about
the line following the Hash Armor Header(s):
Exactly one empty line not included into the message digest,

For me an empty line is in fact empty and not just a short way of
saying doesn't contain printable characters. gpgv obviously
has a more relaxed interpretation …


 (I wonder now how someone is supposed to sign a message
  containing whitespace sourcecode …)

 I don't think trailing whitespace is in this context usually (ever?)
 significant anyway?

https://en.wikipedia.org/wiki/Whitespace_%28programming_language%29
(the remark was a joke)


 APT code also doesn't support dash-escaped text so far.

 Neither does dpkg, but that should be fine because they only accept
 deb822 (?) which only allows message lines starting with fields names
 or spaces, and field names cannot start with a dash.

I agree in theory, its just that §7.1 says:
An implementation MAY dash-escape any line
and an attacker might use this to disable fields, but if my testing is
correct gpgv doesn't allows at least this currently …
(which would be a bug if I am right, but I am not complaining)


Best regards

David Kalnischkies


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698534: Infos on A ...

2013-03-15 Thread Mathieu Parent
2013/3/14 Christoph Anton Mitterer cales...@scientia.net:
 Hi.

 On Thu, 2013-03-14 at 20:23 +0100, Mathieu Parent wrote:
 Isn't it https://bugzilla.redhat.com/show_bug.cgi?id=748528?
 I just tried what they suggest in comment 4, adding
  [libdefaults]
  default_tkt_enctypes = rc4-hmac des-cbc-crc des-cbc-md5
  default_tgs_enctypes = rc4-hmac des-cbc-crc des-cbc-md5

 and with that... everything works with the CERN kerberos...

 So you seem to be right and it's this issue.

Digging further i found the upstream bug:
http://krbdev.mit.edu/rt/Ticket/Display.html?id=2131


I won't have time to test soon.


--
Mathieu


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698472: FTBFS clang-3.2 (compiler-rt) on i386

2013-03-15 Thread Sylvestre Ledru
On 19/01/2013 03:39, Andrey Gursky wrote:
 Source: clang
 Version: 3.2-1~exp5
 Severity: normal
 
 Here is the relevant output building package on wheezy i386:

Well, as you can see here:
https://buildd.debian.org/status/logs.php?pkg=clangarch=i386
it works fine on a debian clean system.

Sylvestre


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699361: linux-image-3.2.0-0.bpo.4-amd64: nfsd4 RELEASE_LOCKOWNER is slow and, CPU intensive

2013-03-15 Thread Chris Boot

On 05/03/13 09:36, Chris Boot wrote:

On 03/03/13 01:56, Ben Hutchings wrote:

Control: tag -1 moreinfo fixed-upstream

On Thu, 2013-02-28 at 15:28 +, Chris Boot wrote:

We are also seeing this on an NFS server hosing home directories for a
fairly large deployment of Debian desktop systems. The symptoms and perf
top agree perfectly with what the reporter is experiencing.

Please consider backporting said patch to the 3.2 kernel for
wheezy/squeeze-backports.

Please test the attached backport as explained here:
http://kernel-handbook.alioth.debian.org/ch-common-tasks.html#s-common-official

Hi Ben,

I have been testing a 3.2 kernel with both the patch you backported as
well as 64a284d07c7d84299a90826950079a8ef11e8204 from upstream (nfsd4:
maintain one seqid stream per (lockowner, file)). These patches
together appear to have resolved the issues our client has been seeing,
though this is not running in a production environment just yet.

I think the other patch (64a284d07c7d84299a90826950079a8ef11e8204) is
also quite important in resolving this problem, as it reduces the number
of entries in the lockowner hash table. Would this be a patch you would
entertain to backport as well?


Hi Ben,

Did you have any further thoughts about the other patch I mentioned 
above? I still don't have this running in a production environment, but 
the testing I have performed looks good with both patches applied.


Best regards,
Chris

--
|Chris Boot
|Tiger Computing Ltd
|Linux for Business
|
|Tel: 033 0088 1511
|Web: http://www.tiger-computing.co.uk
|
|Registered in England. Company number: 3389961
|Registered address: Wyastone Business Park,
| Wyastone Leys, Monmouth, NP25 3SR


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699888: new nss packages fixing cve-2013-1620

2013-03-15 Thread Salvatore Bonaccorso
Hi!

On Fri, Mar 15, 2013 at 03:33:05PM +0100, Yves-Alexis Perez wrote:
 On jeu., 2013-03-14 at 22:48 -0400, Michael Gilbert wrote:
  Hi,
  
  I've prepared new nss packages fixing the lucky 13 issue:
  http://people.debian.org/~mgilbert
  
  For the mozilla team, this is a new upstream, so would you be ok with
  it uploaded as an nmu, or would you like to upload?
 
 It seems the BTS never received your mail, not sure why (at least it
 doesn't appear on the BTS web interface). So I'm not sure mozilla people
 received it either. Hopefully this mail will reach them.

Hmm, this is probably due to:

Topic for #debian-devel: BROKEN: mailhandling of bugs.debian.org

Current mailhandling for bugs.debian.org is not working.

Regards,
Salvatore


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699888: new nss packages fixing cve-2013-1620

2013-03-15 Thread Mike Hommey
On Fri, Mar 15, 2013 at 05:50:08PM +0100, Yves-Alexis Perez wrote:
 On jeu., 2013-03-14 at 22:48 -0400, Michael Gilbert wrote:
  Hi,
  
  I've prepared new nss packages fixing the lucky 13 issue:
  http://people.debian.org/~mgilbert
  
  For the mozilla team, this is a new upstream, so would you be ok with
  it uploaded as an nmu, or would you like to upload?
  
  For the security team, these fixes are so large that I think a
  backport is likely impossible.  Should (can) we attempt to convince
  the release team to jump from 3.13.6 to 3.14.3 in testing, or is that
  crazy at this point in the freeze?  If not, then what?
  
 Manually adding Mike in the loop because of the broken BTS.

I was considering we should get 3.14.x in both testing and
stable-security, actually, but it needs some work to make it on par with
the versions in testing and stable, because in its current state it
breaks some things people might expect not to be broken with a stable
update (most notoriously, md5 signature of certificates are rejected,
and there are a few other things like that)

Mike


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699888: new nss packages fixing cve-2013-1620

2013-03-15 Thread Yves-Alexis Perez
On jeu., 2013-03-14 at 22:48 -0400, Michael Gilbert wrote:
 Hi,
 
 I've prepared new nss packages fixing the lucky 13 issue:
 http://people.debian.org/~mgilbert
 
 For the mozilla team, this is a new upstream, so would you be ok with
 it uploaded as an nmu, or would you like to upload?

It seems the BTS never received your mail, not sure why (at least it
doesn't appear on the BTS web interface). So I'm not sure mozilla people
received it either. Hopefully this mail will reach them.
 
 For the security team, these fixes are so large that I think a
 backport is likely impossible.  Should (can) we attempt to convince
 the release team to jump from 3.13.6 to 3.14.3 in testing, or is that
 crazy at this point in the freeze?  If not, then what?

Well, starting by asking them their pov might be a good idea. And what
about Squeeze?

Regards,
-- 
Yves-Alexis


signature.asc
Description: This is a digitally signed message part


Bug#700700: approx: never logs cache hits even when $verbose is true

2013-03-15 Thread Helmut Grohne
On Thu, Mar 14, 2013 at 08:01:12AM -0400, Eric Cooper wrote:
 Sorry, I just realized you were asking for cache hit notification when
 $verbose, but not $debug, is true.

Thanks for bearing with me!

 I'm willing to reconsider that, along with client information in each
 log message.  I'll look into how squid does it and see if that would
 be appropriate.

I am not sure whether the squid log messages are that useful to look
into. So I summarize the properties that I find useful about them:
 * one line per request
 * fixed set of fields
   + time of day (syslog already does this)
   + source (currently only with $debug)
   + length (absent)
   + service time (absent, not that useful for approx)
   + hit/miss (only misses logged atm)
   + uri (present)

Another example of such a log is apache. It has a different format, but
the general idea is the same. Using a common format has the additional
benefit of being able to reuse existing tools, but likely comes at the
cost of no longer being able to use syslog. I am not sure whether this
is really worth the effort. As a compromise I'd suggest to keep logging
to syslog, but prefix all per-request messages with a common string such
that they are easily recognizable (for a log analyzer).

Helmut


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699888: new nss packages fixing cve-2013-1620

2013-03-15 Thread Yves-Alexis Perez
On jeu., 2013-03-14 at 22:48 -0400, Michael Gilbert wrote:
 Hi,
 
 I've prepared new nss packages fixing the lucky 13 issue:
 http://people.debian.org/~mgilbert
 
 For the mozilla team, this is a new upstream, so would you be ok with
 it uploaded as an nmu, or would you like to upload?
 
 For the security team, these fixes are so large that I think a
 backport is likely impossible.  Should (can) we attempt to convince
 the release team to jump from 3.13.6 to 3.14.3 in testing, or is that
 crazy at this point in the freeze?  If not, then what?
 
Manually adding Mike in the loop because of the broken BTS.
-- 
Yves-Alexis


signature.asc
Description: This is a digitally signed message part


Bug#701649: Fix for stable

2013-03-15 Thread Guido Günther
On Fri, Mar 15, 2013 at 10:17:29AM +0100, Guido Günther wrote:
 On Fri, Mar 15, 2013 at 08:15:15AM +0100, Yves-Alexis Perez wrote:
  On sam., 2013-03-09 at 19:54 +0100, Guido Günther wrote:
   Hi,
   sorry for the delay but attached is the diff for the stable update.
   This
   addrsses #701649 (CVE-2013-1766) as well as #699224 (kind of
   CVE-2013-0170). Is this enough for the security team to issue the DSA?
   Let me know if I can help further.
  
  Just a comment. Does the package still need to create/remove the kvm
  group? Shouldn't only the kvm package do that?
 
 I think so. We need to put the user in that group to access /dev/kvm.
 We could use a trigger but that would certainly be more fragile.
 
  What about the permissions on devices (there's something abou tit on the
  bug report)?
 
 Devices will be changed to libvirt-qemu:libvirt-qemu when accessed to
 make sure the process has the necessary permission.

Permissions of disks are currently set to 0600.
 -- Guido

 Cheers,
  -- Guido


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#701649: Fix for stable

2013-03-15 Thread Yves-Alexis Perez
On sam., 2013-03-09 at 19:54 +0100, Guido Günther wrote:
 Hi,
 sorry for the delay but attached is the diff for the stable update.
 This
 addrsses #701649 (CVE-2013-1766) as well as #699224 (kind of
 CVE-2013-0170). Is this enough for the security team to issue the DSA?
 Let me know if I can help further.

Allright, please upload to security-master, I'll try to prepare and
issue a DSA.

Regards,
-- 
Yves-Alexis


signature.asc
Description: This is a digitally signed message part


Bug#701823: installation-report: Encrypted LVM assisted install failed on Lenovo T430s

2013-03-15 Thread Raphaël Walther
Hi Gaudenz,
On Mon, Mar 11, 2013 at 10:24:17PM +0100, Gaudenz Steinlin wrote:
 Raphaël Walther raphael.walt...@gmail.com writes:
 
  I reproduce the same issue on the same computer with the new
  motherboard. I tried to encrypt a partition and it failed again at the
  same step.
 
 Can you please post the logs of this attempt. Without any logs it's hard
 to tell why it failed. The logs you previously posted really look like
 it's a hardware issue. Maybe it was not the motherboard which is at
 fault after all. If the logs still contain similar kernel errors like:

Unfortunatly, an USB key failed with the logs on it. But when I looked
at it, it was the same type of errors.

 I suggest you also run a comprehensive harddisk test with some testing
 tool like badblocks from a Live CD or from a testing CD provided by your
 hardware vendor. Just to be sure that the hardware issue is indeed fixed.

I did two tests which were all successful :
badblocks -nvs /dev/sda - no bad blocks
smartctl -H /dev/sda - PASSED

My guess is that  SSD disk works properly. At least, it works as long as
I don't try to encrypt it (I use the disk on a daily basis).

What is the command the installer is using to shred the partion or the
disk?

Cheers,
Raphaël


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#701293: guitarix: ftbfs with GCC-4.8

2013-03-15 Thread Roland Stigge
Hi!

On 02/23/2013 12:20 PM, Matthias Klose wrote:
 Package: src:guitarix

What actually happens is:

In file included from /usr/include/c++/4.8/ctime:42:0,
 from /usr/include/boost/date_time/c_time.hpp:17,
 from /usr/include/boost/date_time/time_clock.hpp:16,
 from /usr/include/boost/thread/thread_time.hpp:9,
 from /usr/include/boost/thread/xtime.hpp:14,
 from test1.cpp:1:
/usr/include/boost/thread/xtime.hpp:23:5: error: expected identifier
before numeric constant
 TIME_UTC=1
 ^
/usr/include/boost/thread/xtime.hpp:23:5: error: expected '}' before
numeric constant
/usr/include/boost/thread/xtime.hpp:23:5: error: expected unqualified-id
before numeric constant

I'm identifying this as #701377.

But keeping open this one here for guitarix in case someone notices the
same. Marking #701377 as blocking #701293.

Thanks,

Roland


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702633: CVE-2012-1016: NULL pointer dereference (DoS) in plugins/preauth/pkinit/pkinit_srv.c

2013-03-15 Thread Arnaud Fontaine
tags 702633 + patch
thanks

Hello,

After checking the source  code, this part of the code  does not seem to
have changed  between 1.10.1 and  1.10.4, so  AFAIU this bug  affects at
least the  version available in  testing and unstable. The  current code
is:

if ((rep9 != NULL 
 rep9-choice == choice_pa_pk_as_rep_draft9_dhSignedData) ||
(rep != NULL  rep-choice == choice_pa_pk_as_rep_dhInfo)) {

/* If mutually supported KDFs were found, use the alg agility KDF */
if (rep-u.dh_Info.kdfID) {

Thus,  rep could  be  NULL which  has been  addressed  by the  following
upstream patch:

https://github.com/krb5/krb5/commit/cd5ff932c9d1439c961b0cf9ccff979356686aff

I  also  prepared  a NMU[0]  in  case  it  helps  (it builds  fine  with
cowbuilder but I could not test it though) and attached the diff to this
email.

Cheers,
-- 
Arnaud Fontaine

[0] http://people.debian.org/~arnau/packages/krb5/

diff -Nru krb5-1.10.1+dfsg/debian/changelog krb5-1.10.1+dfsg/debian/changelog
--- krb5-1.10.1+dfsg/debian/changelog	2013-02-20 10:54:44.0 +0900
+++ krb5-1.10.1+dfsg/debian/changelog	2013-03-15 17:03:05.0 +0900
@@ -1,3 +1,10 @@
+krb5 (1.10.1+dfsg-4.1) unstable; urgency=high
+
+  * Non-maintainer upload.
+  * KDC null pointer dereference with PKINIT, CVE-2012-1016. Closes: #702633.
+
+ -- Arnaud Fontaine ar...@debian.org  Fri, 15 Mar 2013 17:01:29 +0900
+
 krb5 (1.10.1+dfsg-4) unstable; urgency=high
 
   * KDC null pointer dereference with PKINIT, CVE-2013-1415
diff -Nru krb5-1.10.1+dfsg/debian/patches/0022-PKINIT-null-pointer-deref-CVE-2012-1016.patch krb5-1.10.1+dfsg/debian/patches/0022-PKINIT-null-pointer-deref-CVE-2012-1016.patch
--- krb5-1.10.1+dfsg/debian/patches/0022-PKINIT-null-pointer-deref-CVE-2012-1016.patch	1970-01-01 09:00:00.0 +0900
+++ krb5-1.10.1+dfsg/debian/patches/0022-PKINIT-null-pointer-deref-CVE-2012-1016.patch	2013-03-15 16:59:56.0 +0900
@@ -0,0 +1,38 @@
+commit cd5ff932c9d1439c961b0cf9ccff979356686aff
+Author: Nalin Dahyabhai na...@redhat.com
+Date:   Thu Dec 13 14:26:07 2012 -0500
+
+PKINIT (draft9) null ptr deref [CVE-2012-1016]
+
+Don't check for an agility KDF identifier in the non-draft9 reply
+structure when we're building a draft9 reply, because it'll be NULL.
+
+The KDC plugin for PKINIT can dereference a null pointer when handling
+a draft9 request, leading to a crash of the KDC process.  An attacker
+would need to have a valid PKINIT certificate, or an unauthenticated
+attacker could execute the attack if anonymous PKINIT is enabled.
+
+CVSSv2 vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:P/RL:O/RC:C
+
+[t...@mit.edu: reformat comment and edit log message]
+
+ticket: 7506 (new)
+target_version: 1.11
+tags: pullup
+
+Index: krb5-1.10.1+dfsg/src/plugins/preauth/pkinit/pkinit_srv.c
+===
+--- krb5-1.10.1+dfsg.orig/src/plugins/preauth/pkinit/pkinit_srv.c	2013-03-15 16:52:57.703154249 +0900
 krb5-1.10.1+dfsg/src/plugins/preauth/pkinit/pkinit_srv.c	2013-03-15 16:58:58.971037553 +0900
+@@ -1016,8 +1016,9 @@
+  rep9-choice == choice_pa_pk_as_rep_draft9_dhSignedData) ||
+ (rep != NULL  rep-choice == choice_pa_pk_as_rep_dhInfo)) {
+ 
+-/* If mutually supported KDFs were found, use the alg agility KDF */
+-if (rep-u.dh_Info.kdfID) {
++/* If we're not doing draft 9, and mutually supported KDFs were found,
++ * use the algorithm agility KDF. */
++if (rep != NULL  rep-u.dh_Info.kdfID) {
+ secret.data = server_key;
+ secret.length = server_key_len;
+ 
diff -Nru krb5-1.10.1+dfsg/debian/patches/series krb5-1.10.1+dfsg/debian/patches/series
--- krb5-1.10.1+dfsg/debian/patches/series	2013-02-20 10:54:44.0 +0900
+++ krb5-1.10.1+dfsg/debian/patches/series	2013-03-15 16:52:26.0 +0900
@@ -19,3 +19,4 @@
 upstream/0019-Null-pointer-deref-in-kadmind-CVE-2012-1013.patch
 0020-gssapi-never-unload-mechanisms.patch
 0021-PKINIT-null-pointer-deref-CVE-2013-1415.patch
+0022-PKINIT-null-pointer-deref-CVE-2012-1016.patch


Bug#701951: libecj-java-gcj: Not installable with /var on 9p(non-hdd) filesystem

2013-03-15 Thread Eric Lavarde - Debian
Hi,

Daniel Dickinson said:
 This appears to be due to a permissions problem of some kind due to use a
 9p filesystem rather than native ext4 or the like.  Probably fails on nfs
 too, but I haven't tried that.  Or maybe use of extended attributes (not
 sure 9p supports them or not)?
I don't know what the policy is in such a case (best effort? Implement if
patch provided?) but according to [1] 9p is not even part of the standard
Debian kernel (and I suspect that there might be a reason for this).

Cheers, Eric

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696292

-- 
Eric de France, d'Allemagne et de Navarre


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702729: valgrind: build on kfreebsd-amd64

2013-03-15 Thread Jeff Epler
On Thu, Mar 14, 2013 at 06:30:43PM +0100, Alessandro Ghedini wrote:
 I'll have a look as soon as I have some free time. I was also thinking that 
 the
 patch may be applied only in the kfreebsd builds, so it wouldn't interfere 
 with
 the linux builds.

That sounds great, but I do not yet have the debian expertise to know
how to express this in debian/rules (or whereever the appropriate
location is)

 What did you do to see if the build actually works?

I ran some very simple (certainly by comparison to iceweasel or
libreoffice), non-interactive programs of my own.

 A simple
 stress-test for the MemCheck tool would be to run it on firefox/iceaweasel and
 libreoffice and see what happens.

Unfortunately, firefox doesn't work, possibly due to an unimplemented
syscall.
 
 --51670-- WARNING: unhandled syscall: 330
 --51670-- You may be able to write your own handler.
 --51670-- Read the file README_MISSING_SYSCALL_OR_IOCTL.
 --51670-- Nevertheless we consider this a bug.  Please report
 --51670-- it at http://valgrind.org/support/bug_reports.html.

this is apparently SYS_sched_getscheduler, so its dear neighbor
SYS_sched_setscheduler will probably also need implementation.  I'll
try to devote some time to this item this weekend.

 Also, does it work on kfreebsd-i386 too?

I have not tested this.  I suspect it at least has the
sysarch(I386_SET_GSBASE) problem in addition to any problems in the
amd64 build.  I don't have a kfreebsd-i386 installation at the moment,
and due to some compile-time bug I encountered, the kfreebsd-amd64 build
is 64bitonly.

 Anyway, as I mentioned on the debian-bsd list the real problem here is not
 really the patch itself, but finding someone willing to maintain it in the
 future (at least until it gets merged upstream) since I'm not qualified (nor
 really interested) in the kfreebsd ports. So would you be willing to continue
 to maintain the patch in the future? If so you are welcome to push your 
 changes
 to the collab-maint git repository where valgrind is maintained [0] in a
 separate branch called, say, kfreebsd (possibily without the d/changelog
 changes).

I have some level of committment to doing software development on
debian-kfreebsd, and I find valgrind to be a useful tool.  That being
the case I have some stake in whether it works or not.  I'm not yet a DD
so I can't yet do things like push branches onto anonscm.debian.org, but
it's becoming clear that I should go ahead and become one.

I assume that for the moment it's appropriate to attach any updated
patches to this bug report.  If that's inappropriate, please let me
know.

Thanks,
Jeff


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702790: FTBFS: local changes detected

2013-03-15 Thread gregor herrmann
On Thu, 14 Mar 2013 22:22:26 -0700, tony mancill wrote:

  My line of thought was: d/copyright requires to include the origin of
  the upstream source, which means that for repacked tarballs a note
  about what/why/how was changed should be included. [0]- But in this
  case -- as you say -- it's only a one-time fix, and in order to bring
  back the pristine tarball.
 Agreed, it will definitely require explanation.  I'll take care of that.

Thanks!

  However, I'm not able get the package to build even the first time (at
 least not using git-builder).  

Weird; what errors do you get?

 So I went back and pulled the original
 upstream tarball and it appears that the .orig.tag.gz currently in the
 archive is the result of packing it up after an build (the diff is
 attached).  

Sounds plausible.

 I think probably the course of action most defensible is to
 start with the clean upstream tarball (obviously renamed) and iron out
 the FTBFS from there.

Ack, sounds like a good idea.
(I just wasn't sure where the upstream tarball came from since there
is, IIRC, no debian/watch file :))
 

Cheers,
gregor

-- 
 .''`.  Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06
 : :' : Debian GNU/Linux user, admin, and developer  -  http://www.debian.org/
 `. `'  Member of VIBE!AT  SPI, fellow of the Free Software Foundation Europe
   `-   NP: Rod Stewart: Lost In You


signature.asc
Description: Digital signature


Bug#702809: Opinion

2013-03-15 Thread Jürgen Fuchsberger
On 03/13/2013 08:47 PM, Anton Gladky wrote:
 I think, it is not easy to triage the bug, using only the information,
 provided in the bugreport. It can be connected with video-drivers or
 something else.
 
 If nobody confirms the same issue, I would suggest to lower the bug's
 severity.

Yes, good idea, since it seems nobody else was affected. I myself did
not experience more problems since that day - wonder what was the
problem since it happened on two different systems with two different
users, but both Wheezy.

Best,
Juergen.
 
 Cheers,
 
 Anton
 



signature.asc
Description: OpenPGP digital signature


Bug#702734: [nvidia-detect] please move nvidia-detect out of non-free

2013-03-15 Thread Andreas Beckmann
On 2013-03-13 03:48, Filipus Klutiero wrote:
 I don't mind the license. I'm just saying if we split nvidia-detect,
 we'll have to clarify its license. It doesn't have a clear license
 (which is technically already a small problem) today, but that won't be
 a problem, as I'll happily license it under any terms requested.

I've now added
+# Copyright © 2008-2011 Filipus Klutiero chea...@gmail.com
+# Copyright © 2011-2013 Andreas Beckmann a...@debian.org
and put it under the GPL2+ (as the current packaging is GPL2+, too)

 So you're saying changing the section requires splitting from n-g-d?

I don't think a (binary) package in contrib can be built from a source
package in non-free as that is a different archive area

 I suspected that splitting the source packages would make updates more
 complicated, although I can't appreciate the cost.

Probably have the pciids shipped in some package and have nvidia-detect
build-depend on this and just copy the current file.


 I agree it's fine. I really meant it would be *better* to keep
 nvidia-detect up-to-date.
 I'm not sure a backport for nvidia-detect is the intended use. I see
 backports as appropriate for updates which could introduce breakage. If
 we do ourselves a risk-free update, I think it should go directly in
 stable.

I don't think this qualifies for a stable update. There is
stable-updates for packages that require frequent updates to stay
useful in a stable release (e.g. virus scanners, tzdata, ...) without
being security updates (that would be stable/updates).
Anything else could only go via stable-proposed-updates into the next
point release and that should be important or serious bugfixes, not new
features.

 But if we keep updates in backports anyway, then we could at
 least prepare stable's nvidia-detect to suggest upgrading to backports
 if the card is unknown (or refer to the wiki's version, or to NVIDIA's
 website).

Hmm, that could be an option for now.

+ echo Newer driver releases may be available in backports.


Andreas


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702824: calligrasheets: crash when entering double-quotes and some other special characters in formula

2013-03-15 Thread Adrien
tag 702824 confirmed
thanks

Hi,

The bug is corrected for calligra 2.6.1, which will be soon in experimental.

Concering wheezy, I will try to have the patch accepted.

Regards,

Adrien Grellier


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702862: Assertion `m_pid = 100000' failed

2013-03-15 Thread Harald Dunkel
On 03/12/13 13:04, Arnout Engelen wrote:
 Oops! Do you happen to know what the max PID is at Oracle?
 

On my Oracle servers it says

# cat /proc/sys/kernel/pid_max
131072

This is a local configuration setting (independent from
Oracle), so on the next host it might be 100. On
AIX I saw PIDs = 23003370.

I would assume its a signed 32bit integer.


Regards
Harri


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702729: valgrind: build on kfreebsd-amd64

2013-03-15 Thread Alessandro Ghedini
On Fri, Mar 15, 2013 at 07:30:11AM -0500, Jeff Epler wrote:
 On Thu, Mar 14, 2013 at 06:30:43PM +0100, Alessandro Ghedini wrote:
  I'll have a look as soon as I have some free time. I was also thinking that 
  the
  patch may be applied only in the kfreebsd builds, so it wouldn't interfere 
  with
  the linux builds.
 
 That sounds great, but I do not yet have the debian expertise to know
 how to express this in debian/rules (or whereever the appropriate
 location is)

That would be done by calling quilt pop before building on every platform
except from kfreebsd-* (or something like that), with the freebsd patch being
the last one in the series. But I can take care of this one.

  Anyway, as I mentioned on the debian-bsd list the real problem here is not
  really the patch itself, but finding someone willing to maintain it in the
  future (at least until it gets merged upstream) since I'm not qualified (nor
  really interested) in the kfreebsd ports. So would you be willing to 
  continue
  to maintain the patch in the future? If so you are welcome to push your 
  changes
  to the collab-maint git repository where valgrind is maintained [0] in a
  separate branch called, say, kfreebsd (possibily without the d/changelog
  changes).
 
 I have some level of committment to doing software development on
 debian-kfreebsd, and I find valgrind to be a useful tool.  That being
 the case I have some stake in whether it works or not.  I'm not yet a DD
 so I can't yet do things like push branches onto anonscm.debian.org, but
 it's becoming clear that I should go ahead and become one.
 
 I assume that for the moment it's appropriate to attach any updated
 patches to this bug report.  If that's inappropriate, please let me
 know.

No worries, you don't need to be a DD to push to collab-maint repositories
(like valgrind's). You just need an acount on alioth.debian.org and request to
join collab-maint [0], then I'll sponsor your request (also see [1]).

Cheers

[0] http://alioth.debian.org/projects/collab-maint/
[1] https://lists.debian.org/debian-devel-announce/2012/01/msg6.html

-- 
perl -E '$_=q;$/= @{[@_]};and s;\S+;inidehG ordnasselA;eg;say~~reverse'


signature.asc
Description: Digital signature


Bug#702877: Uploaded to unstable; please unblock

2013-03-15 Thread Mika Pflüger
Hi release team,

Thomas Goirand was so nice to upload the fixed package to unstable. He
added a small change to fix building twice in a row, such that the full
changelog now reads:

  [ Mika Pflüger ]
  * Team upload.
  * debian/patches/05_ssl.patch: Add upstream patch to force building
SSL support with newer MySQL client libraries. Thanks to Eldon Koyle
for isolating the fix in the upstream VCS. (Closes: #678169)
  * Delete now obsolete debian/patches/README.source which referred to
dpatch.

  [ Thomas Goirand ]
  * Added a debian/rules clean: rm MySQL_python.egg-info/PKG-INFO, so
  it is possible to build the package twice.

The debdiff between the version in testing and stable is attached,
it would be very nice if you could unblock it.

Cheers,

Mika

unblock python-mysqldb/1.2.3-2

-- 

diff -Nru python-mysqldb-1.2.3/debian/changelog python-mysqldb-1.2.3/debian/changelog
--- python-mysqldb-1.2.3/debian/changelog	2011-10-18 12:46:05.0 +0200
+++ python-mysqldb-1.2.3/debian/changelog	2013-03-15 07:02:21.0 +0100
@@ -1,3 +1,19 @@
+python-mysqldb (1.2.3-2) unstable; urgency=low
+
+  [ Mika Pflüger ]
+  * Team upload.
+  * debian/patches/05_ssl.patch: Add upstream patch to force building
+SSL support with newer MySQL client libraries. Thanks to Eldon Koyle
+for isolating the fix in the upstream VCS. (Closes: #678169)
+  * Delete now obsolete debian/patches/README.source which referred to
+dpatch.
+
+  [ Thomas Goirand ]
+  * Added a debian/rules clean: rm MySQL_python.egg-info/PKG-INFO, so it is
+possible to build the package twice.
+
+ -- Mika Pflüger deb...@mikapflueger.de  Mon, 11 Mar 2013 18:03:06 +0100
+
 python-mysqldb (1.2.3-1) unstable; urgency=low
 
   * Merge with package from Ubuntu, thanks to Mario Limonciello.
diff -Nru python-mysqldb-1.2.3/debian/patches/05_ssl.patch python-mysqldb-1.2.3/debian/patches/05_ssl.patch
--- python-mysqldb-1.2.3/debian/patches/05_ssl.patch	1970-01-01 01:00:00.0 +0100
+++ python-mysqldb-1.2.3/debian/patches/05_ssl.patch	2013-03-15 06:51:49.0 +0100
@@ -0,0 +1,21 @@
+Description: Force HAVE_OPENSSL if the client library is 5.5 or newer.
+Origin: http://sourceforge.net/p/mysql-python/svn/656/tree//branches/MySQLdb-1.2/MySQLdb/_mysql.c?diff=5059d1f5bfc09e26e1a66617:655
+Bug: http://sourceforge.net/p/mysql-python/bugs/323/
+Reviewed-by: Eldon Koyle eko...@gmail.com
+Last-Update: 2013-03-11
+
+Index: python-mysqldb-argh/_mysql.c
+===
+--- python-mysqldb-argh.orig/_mysql.c	2010-06-17 09:21:56.0 +0200
 python-mysqldb-argh/_mysql.c	2013-03-11 18:30:38.839269635 +0100
+@@ -102,6 +102,10 @@
+ #define check_server_init(x) if (!_mysql_server_init_done) _mysql_server_init_done = 1
+ #endif
+ 
++#if MYSQL_VERSION_ID = 50500
++#define HAVE_OPENSSL 1
++#endif
++
+ PyObject *
+ _mysql_Exception(_mysql_ConnectionObject *c)
+ {
diff -Nru python-mysqldb-1.2.3/debian/patches/series python-mysqldb-1.2.3/debian/patches/series
--- python-mysqldb-1.2.3/debian/patches/series	2011-10-18 11:38:40.0 +0200
+++ python-mysqldb-1.2.3/debian/patches/series	2013-03-15 06:51:49.0 +0100
@@ -1,2 +1,3 @@
 01_converters_boolean.patch
 03_converters_set2str.patch
+05_ssl.patch
diff -Nru python-mysqldb-1.2.3/debian/rules python-mysqldb-1.2.3/debian/rules
--- python-mysqldb-1.2.3/debian/rules	2011-10-18 12:53:10.0 +0200
+++ python-mysqldb-1.2.3/debian/rules	2013-03-15 07:02:45.0 +0100
@@ -17,7 +17,7 @@
 	python$* setup.py clean
 	find . -name *.py[co] -exec rm -f {} \;
 	dh_testroot
-	rm -fr build build-python$*
+	rm -fr build build-python$* MySQL_python.egg-info/PKG-INFO
 	dh_clean
 
 build: $(PYVERS:%=build-python%)


signature.asc
Description: PGP signature


Bug#702821: perl/hash_attack.t fails with 5.10.1 + CVE-2013-1667 fix

2013-03-15 Thread Steve Hay
Steve Hay wrote on 2013-03-14:
 Niko Tyni wrote on 2013-03-13:
 On Wed, Mar 13, 2013 at 09:13:15AM -, Steve Hay wrote:
 Dominic Hargreaves wrote on 2013-03-12:
 
 When trying to fix this issue in Debian stable, I found that the
 patch at
 
 http://svn.apache.org/viewvc?view=revisionrevision=1455340
 
 does not stop the test failing when applied to 2.0.4 (as currently
 found in Debian stable) and built against the current perl package
 in Debian stable (5.10 + the rehashing fix).
 
 I haven't looked at the Debian package, or tried anything with
 mod_perl-2.0.4, but I've just checked out origin/maint-5.10 from
 the Perl git repo (in fact, I took the snapshot at
 
 

http://perl5.git.perl.org/perl.git/snapshot/f14269908e5f8b4cab4b55643d
 7d d9de577e7918.tar.gz) and tried that with Apache 2.2.22 and
mod_perl
 from trunk and the tests all pass for me... (This is on Windows 7
x64
 with VC++ 2010.)
 
 Thanks for checking.
 
 FWIW, I can reproduce the failure with the Debian perl 5.10.1 package
 and mod_perl2 2.0.7 with just the above test fix. So it doesn't seem
to
 be a Debian change that breaks it. Maybe -Dusethreads or something
like
 that.
 
 I'll keep looking and send an update when I know more.
 
 
 The perl I built and tested with was made with ithreads enabled.
 
 There is an alternative patch to fix this test, submitted to
 mod_perl's rt.cpan.org queue after I'd applied the patch from the
 perl5-security queue on rt.perl.org:
 
 https://rt.cpan.org/Ticket/Display.html?id=83916
 
 I haven't tried it myself yet, but is that any better for you?

Zefram has now come up with an even better patch (on the same RT
ticket), after reproducing the Debian 5.10.1 failure himself.

Please take a look (I've also attached it here for your convenience) and
let me know whether this works for you. If so then I hope to apply it to
SVN over the weekend.


hattack_synthesis.patch
Description: hattack_synthesis.patch


Bug#702908: PTS: upload signature parsing patch

2013-03-15 Thread Markus Wanner
Paul,

On 03/15/2013 03:02 AM, Paul Wise wrote:
 I would have done this:
 
 [2012-05-10] Accepted 1.0-6 in unstable (low) (Markus Wanner, signed
 by Ludovic Brenta)

Looks better, agreed.

 [2012-05-10] Accepted 1.0-6 in unstable (low) (Markus Wanner, signed
 by someone else)

That's utterly misleading in case someone else is Markus Wanner.

The point is, the existence of a signature is not an indication of
sponsorship. We really need to have the pubkey of the signer to be able
to distinguish between proper self-signed and sponsored uploads.

What we can do is distinguish three cases, i.e. (just to stick with the
example above):

In case we have the pubkey and its UID matches ChangedBy:
  ..in unstable (low) (Markus Wanner)

(This would imply a signature of myself, i.e. no sponsorship.)

In case we have the pubkey and its UID does not match ChangedBy:
  ..in unstable (low) (Markus Wanner, signed by Ludovic Brenta)

In case we do not know the pubkey:
  ..in unstable (low) (Markus Wanner, unknown signature)

(This doesn't imply anything about sponsorship. It could still
 be a valid signature of mine, or of a sponsor, PTS just cannot
 tell.)

 It could be sponsorship or co-maintainence, maybe the signer made some
 changes and put their name in the changelog too.

Exactly, so let's keep with signed by rather than trying to identify
what exactly we call sponsorship and what not.

 As these scripts seem to be called from cron, does a simple `print
 WARNING...` do the trick of notifying the admin about a missing public
 key? (Or failure to retrieve from the keyserver or some such.)
 
 That will notify the folks listed here:
 
 http://anonscm.debian.org/viewvc/qa/trunk/data/cronjobs/crontab.head?view=markup

Sounds like a notification on stderr about missing pubkeys could do the
trick.

Regards

Markus Wanner



signature.asc
Description: OpenPGP digital signature


Bug#702965: procps: ps dies with SIGSEGV on kernels 3.2.29 and lots of supplementary groups

2013-03-15 Thread Craig Small
On Fri, Mar 15, 2013 at 09:50:02AM +, Karl E. Jorgensen wrote:
 I may be misreading you here, but I don't think this is a buffer
 overflow. As far as I can see, file2str() does not fill the buffer
 beyond the boundary, but the problem lies in the subsequent code which
 assumes that the entire contents of the file is available in the
 buffer - in the loop around readproc.c:293 

Sorry I meant more that the stuff needed was bigger than the buffer, not
the traditional meaning for buffer overflow (as in the program writes
beyond the buffer size).

 I have come to realise that readproc.c makes LOTS of assumptions about
 the contents of /proc/$pid/status - if the kernel decides to miss a
 space somewhere, turn spaces into tabs (or vice versa), the whole
 thing collapses, possibly accompanied by noises like SIGSEGV and similar.
It does, but then its been around for decades and is usually ok, until
they change their mind again.

 Then I heard of procps-ng, decided to investigate it further... and
 life got in the way :-S
procps-ng has greatly reduced the number of patches I've and the other
distributions have had to carry.

 - Craig

-- 
Craig Small VK2XLZ   http://enc.com.au/  csmall at : enc.com.au
Debian GNU/Linux http://www.debian.org/  csmall at : debian.org
GPG fingerprint: 5D2F B320 B825 D939 04D2  0519 3938 F96B DF50 FEA5


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703053: lastmp: switch from python-libmpdclient to python-mpd

2013-03-15 Thread Helmut Grohne
Control: tags -1 + patch

On Thu, Mar 14, 2013 at 06:22:37PM +0100, Helmut Grohne wrote:
 The lastmp package is using the python-libmpdclient (mpdclient2) module.
 This library has been abandoned upstream[1] in favour of python-mpd.
 Would it be possible to switch this tool over to the other library?

I attached a patch for this. Note that this patch is based on the
library documentation and completely untested (due to the lack of a
last.fm account). Could anyone test the patch and report back a result
to me and this bug?

The patch applies to the lastmp python script and you will have to
install python-mpd to make it work.

Thanks

Helmut
--- lastmp	2010-04-19 03:41:31.0 +0200
+++ lastmp.new	2013-03-15 09:48:42.0 +0100
@@ -5,8 +5,9 @@
 import time
 import getopt
 import signal
+import socket
 
-import mpdclient2
+import mpd
 import lastfm
 import lastfm.client
 import lastfm.config
@@ -26,11 +27,11 @@
 
 class Song:
 def __init__(self, sobj):
-self.artist = getattr(sobj, 'artist', '')
-self.title = getattr(sobj, 'title', '')
-self.album = getattr(sobj, 'album', '')
-self.length = int(getattr(sobj, 'time', 0))
-self.file = getattr(sobj, 'file', '')
+self.artist = sobj.get('artist', '')
+self.title = sobj.get('title', '')
+self.album = sobj.get('album', '')
+self.length = int(sobj.get('time', 0))
+self.file = sobj.get('file', '')
 
 def __eq__(self, other):
 if other == None:
@@ -64,6 +65,13 @@
 else:
 return d
 
+def mpd_connect(mpd_args):
+mpd = mpd.MPDClient()
+mpd.connect(mpd_args[host], mpd_args[port])
+if mpd_args[password]:
+mpd.password(mpd_args[password])
+return mpd
+
 class MPDMonitor:
 def __init__(self, cli):
 self.cli = cli
@@ -74,25 +82,25 @@
 self.mpd = None
 
 def wake(self):
-status = self.mpd.do.status()
-song = Song(self.mpd.do.currentsong())
+status = self.mpd.status()
+song = Song(self.mpd.currentsong())
 
-if not hasattr(status, 'state'):
+if 'state' not in status:
 raise MPDAuthError
 
-if not self.prevstatus or status.state != self.prevstatus.state:
-self.cli.log.debug('Changed state: %s' % status.state)
+if not self.prevstatus or status[state] != self.prevstatus[state]:
+self.cli.log.debug('Changed state: %s' % status[state])
 
-if status.state in ('play', 'pause'):
-pos, length = map(float, status.time.split(':'))
+if status[state] in ('play', 'pause'):
+pos, length = map(float, status[time].split(':'))
 if length == 0: length = lastfm.MAX_LEN
 
-if status.state == 'play':
+if status[state] == 'play':
 if song != self.prevsong or \
-self.prevstatus.state == 'stop':
+self.prevstatus[state] == 'stop':
 self.cli.log.info(u'New song: %s' % song)
 if (self.prevsong and pos  self.sleep +
-FUZZ + int(status.xfade)) or \
+FUZZ + int(status[xfade])) or \
 (self.prevsong is None and
 pos/length  lastfm.SUB_PERCENT or
 pos  lastfm.SUB_SECONDS):
@@ -141,7 +149,7 @@
 while True:
 try:
 if not self.mpd:
-self.mpd = mpdclient2.connect(**self.mpd_args)
+self.mpd = mpd_connect(self.mpd_args)
 self.cli.log.info('Connected to MPD')
 self.prevstatus = None
 self.prevsong = None
@@ -151,12 +159,12 @@
 self.played_enough = False
 if self.mpd:
 self.wake()
-except (EOFError, mpdclient2.socket.error):
+except (EOFError, socket.error):
 if not failed:
 self.cli.log.error(Can't connect or lost connection to MPD)
 self.mpd = None
 failed = True
-except MPDAuthError:
+except (MPDAuthError, mpd.CommandError):
 if not failed:
 self.cli.log.error(Can't read info from MPD (bad password?))
 failed = True


Bug#703050: www.debian.org: Please document the criteria for debian.net services to be integrated into debian.org

2013-03-15 Thread Serafeim Zanikolas
Hi Sebastian,

On Fri, Mar 15, 2013 at 03:41:40AM +0100, Sebastian Harl wrote [edited]:
 On Thu, Mar 14, 2013 at 05:08:29PM +0100, Serafeim Zanikolas wrote:
  Some debian.net services would serve their purpose better if they were
  integrated into the www.d.o namespace, but the criteria for deciding which
  services would qualify is not documented.
 
 I don't think that it makes sense to write down any such list of
 criteria. Imho, this needs to be a case-by-case decision and the exact
 criteria greatly depend on what kind of service is offered. E.g., in the
[..]

I agree that there can't be an exhaustive and general-enough list of such
criteria.

Having said that, it would be useful to set some broad expectations on what it
takes for a d.n service to graduate to an official one. Even some generic
guidelines would have the benefit of informing developers at the beginning of
a developing a service (eg. likelihood of support of certain technical
choices), and could later on be the starting point of a discussion of
promoting that service to an official one.

cheers,
sez

-- 
Every great idea is worthless without someone to do the work. --Neil Williams


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703076: Missing argument in calls to amitk_color_table_menu_new

2013-03-15 Thread Andreas Tille
Hi Andy,

due to some QA checks in Debian the Amide package received a bug report
which I would like to inform you about.  I admit we are lagging behind
your latest upstream version (because of Debian freeze for the next
release we hesitate to introduce other versions than currently beeing in
freeze) and the problem might be fixed or not but I would like to make
you aware of it in any case.

It would be great if you could issue some statement like

 - Is fixed in 1.0.4  or
 - Will be fixed in 1.0.5 or
 - Please be more verbose / provide a patch or
 - Something else

Kind regards and thanks for providing Amide as Free Software

 Andreas.

On Thu, Mar 14, 2013 at 11:33:16PM +, Michael Tautschnig wrote:
 Package: amide
 Version: 1.0.1-1
 Usertags: goto-cc
 
 Building and type-checking the linked results using our research compiler
 infrastructure showed the following wrong uses of amitk_color_table_menu_new:
 
 ./src/amitk_threshold.c:threshold-color_table_menu[i_view_mode] = 
 amitk_color_table_menu_new();
 ./src/ui_preferences_dialog.c:menu = amitk_color_table_menu_new();
 ./src/ui_render_dialog.c:menu = amitk_color_table_menu_new();
 
 This conflicts with the actual definition of amitk_color_table_menu_new:
 
 ./src/amitk_color_table_menu.c:GtkWidget * 
 amitk_color_table_menu_new(AmitkColorTable color_table) {
 
 The result will necessarily cause a stack underflow, with entirely undefined
 consequences (for any application with elevated privileges this is a possibly
 security issue).
 
 Best,
 Michael
 
 PS.: It may be wise to also adjust the declaration of
 amitk_color_table_menu_new:
 
 ./src/amitk_color_table_menu.h:GtkWidget*amitk_color_table_menu_new   
 ();
 
 (but this is actually entirely covered by the C standard and not necessarily a
 bug - it just stops the compiler from producing proper diagnostics).
 



 ___
 Debian-med-packaging mailing list
 debian-med-packag...@lists.alioth.debian.org
 http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/debian-med-packaging


-- 
http://fam-tille.de


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703111: ITP: taopm -- Software package for sound synthesis with physical models

2013-03-15 Thread Tiago B. Vaz
Package: wnpp
Severity: wishlist
Owner: Tiago B. Vaz ti...@debian.org

* Package name: taopm
  Version : 1.0
  Upstream Author : Mark Pearson m.pear...@ukonline.co.uk
* URL : http://taopm.sourceforge.net
* License : GPL
  Programming Lang: C++
  Description : Software package for sound synthesis with physical models

 Tao is a software package for sound synthesis using physical models. It
 provides a virtual acoustic material constructed from masses and springs which
 can be used as the basis for building quite complex virtual musical
 instruments.


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703112: enigmail 1.4.1-2 not decrypting mails/verifying sigs with Icedove 10.0.12-1

2013-03-15 Thread Robert Waldner
Package: enigmail
Version: 2:1.4.1-2
Severity: important

Hi,

I recently moved from i386 to amd64, and since then I can't decrypt/verify
mails with enigmail/icedove.

Debug output is:
2013-03-15 08:18:20.094 [DEBUG] enigmailMessengerOverlay.js: messageFrameUnload
2013-03-15 08:18:20.094 [DEBUG] enigmailMessengerOverlay.js: messageCleanup
2013-03-15 08:18:20.094 [DEBUG] enigmailMessengerOverlay.js: setAttachmentReveal
2013-03-15 08:18:20.094 [DEBUG] enigmailMsgHdrViewOverlay.js: this.messageUnload
2013-03-15 08:18:20.096 [DEBUG] enigmailMsgHdrViewOverlay.js: 
_listener_onStartHeaders
2013-03-15 08:18:20.096 [DEBUG] enigmailCommon.jsm: getFrame: name=messagepane
2013-03-15 08:18:20.096 [DEBUG] enigmailMsgHdrViewOverlay.js: msgFrame=[object 
Window]
2013-03-15 08:18:20.096 [DEBUG] enigmailMsgHdrViewOverlay.js: 
enigmailPrepSecurityInfo
2013-03-15 08:18:20.107 [DEBUG] enigmailMsgHdrViewOverlay.js: 
_listener_onEndHeaders
2013-03-15 08:18:20.112 [DEBUG] enigmailMessengerOverlay.js: messageDecrypt: 
[object Event]
2013-03-15 08:18:20.114 [DEBUG] enigmailCommon.jsm: dispatchEvent f=
2013-03-15 08:18:20.115 [DEBUG] enigmailCommon.jsm: dispatchEvent running 
mainEvent
2013-03-15 08:18:20.115 [DEBUG] enigmailMessengerOverlay.js: messageDecryptCb:
2013-03-15 08:18:20.115 [DEBUG] enigmailMessengerOverlay.js: header 
content-type: multipart/encrypted; boundary=--=_1363330633-19056-2; 
protocol=application/pgp-encrypted
2013-03-15 08:18:20.115 [DEBUG] enigmailMessengerOverlay.js: header 
content-transfer-encoding: 
2013-03-15 08:18:20.115 [DEBUG] enigmailMessengerOverlay.js: header 
x-enigmail-version: 
2013-03-15 08:18:20.115 [DEBUG] enigmailMessengerOverlay.js: header 
x-pgp-encoding-format: 
2013-03-15 08:18:20.115 [DEBUG] enumerateMimeParts:  - multipart/encrypted; 
boundary=--=_1363330633-19056-2; protocol=application/pgp-encrypted
2013-03-15 08:18:20.115 [DEBUG] enumerateMimeParts: 1 - multipart/encrypted; 
boundary=--=_1363330633-19056-2; protocol=application/pgp-encrypted
2013-03-15 08:18:20.115 [DEBUG] enumerateMimeParts: 1.1 - 
application/pgp-encrypted
2013-03-15 08:18:20.115 [DEBUG] enumerateMimeParts: 1.2 - 
application/octet-stream
2013-03-15 08:18:20.115 [DEBUG] enigmailMessengerOverlay.js: embedded objects: 
1.1 / 
2013-03-15 08:18:20.115 [ERROR] enigmailMessengerOverlay.js: messageDecryptCb: 
caught exception: TypeError
Message: 'Cc[NS_ENIGMIMESERVICE_CONTRACTID] is undefined'
File:
file:///usr/lib/mozilla/extensions/%7B3550f703-e582-4d05-9a08-453d09bdfdc6%7D/%7B847b3a00-7ab1-11d4-8f02-006008948af5%7D/components/enigmail.js
Line:759
Stack:   
()@file:///usr/lib/mozilla/extensions/%7B3550f703-e582-4d05-9a08-453d09bdfdc6%7D/%7B847b3a00-7ab1-11d4-8f02-006008948af5%7D/components/enigmail.js:759
([object Event],true,[object 
Object])@chrome://enigmail/content/enigmailMessengerOverlay.js:654
([object Array])@chrome://enigmail/content/enigmailMessengerOverlay.js:504
()@resource://enigmail/enigmailCommon.jsm:1207

This looks like bug# 671928, yet the enigmail/icedove versions should be
compatible (enigmail 1.4.1-2, Icedove 10). Reinstalling both packages doesn't
change anything.

Marked important because having to save each message and decrypting it on
the command line is rather making enigmail useless ;)

Please advise.

Kind regards,
Robert Waldner



-- System Information:
Debian Release: 7.0
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'testing-proposed-updates'), (500, 
'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.8-trunk-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.ISO-8859-15, LC_CTYPE=en_US.ISO-8859-15 (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/dash

Versions of packages enigmail depends on:
ii  gnupg1.4.12-7
ii  iceape   2.7.12-1
ii  icedove  10.0.12-1
ii  libc62.13-38
ii  libgcc1  1:4.7.2-5
ii  libnspr4-0d  2:4.9.5-1
ii  libstdc++6   4.7.2-5

enigmail recommends no packages.

enigmail suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703113: libsasl2-modules-gssapi-mit: Java client GSSAPI connections to OpenLDAP fail

2013-03-15 Thread Bill MacAllister
Package: libsasl2-modules-gssapi-mit
Version: 2.1.25.dfsg1-6
Severity: important

Dear Maintainer,

We are starting the process of upgrading our LDAP service to OpenLDAP
2.4.34 on wheezy.  None of the Java applications that we have tested
can connect to the LDAP server using GSSAPI.

In the server log we see:

% grep conn=142291 /var/log/ldap
Mar 15 01:12:36 ldap-dev2 slapd[22102]: conn=142291 fd=16 ACCEPT from 
IP=171.64.19.165:44175 (IP=0.0.0.0:389)
Mar 15 01:12:36 ldap-dev2 slapd[22102]: conn=142291 op=0 BIND dn= method=163
Mar 15 01:12:36 ldap-dev2 slapd[22102]: conn=142291 op=0 RESULT tag=97 err=14 
text=SASL(0): successful result: 
Mar 15 01:12:36 ldap-dev2 slapd[22102]: conn=142291 op=1 BIND dn= method=163
Mar 15 01:12:36 ldap-dev2 slapd[22102]: conn=142291 op=1 BIND 
authcid=w...@stanford.edu authzid=w...@stanford.edu
Mar 15 01:12:36 ldap-dev2 slapd[22102]: conn=142291 op=1 BIND 
dn=uid=whm,cn=accounts,dc=stanford,dc=edu mech=GSSAPI sasl_ssf=56 ssf=56
Mar 15 01:12:36 ldap-dev2 slapd[22102]: conn=142291 op=1 RESULT tag=97 err=0 
text=
Mar 15 01:12:36 ldap-dev2 slapd[22102]: conn=142291 fd=16 closed (connection 
lost)

The client failure traceback from a small test program is on Java 
1.7.0_03 is:

Exception in thread main java.lang.NegativeArraySizeException
at 
sun.security.jgss.krb5.CipherHelper.aes256Encrypt(CipherHelper.java:1367)
at 
sun.security.jgss.krb5.CipherHelper.encryptData(CipherHelper.java:722)
at sun.security.jgss.krb5.WrapToken_v2.init(WrapToken_v2.java:200)
at sun.security.jgss.krb5.Krb5Context.wrap(Krb5Context.java:851)
at sun.security.jgss.GSSContextImpl.wrap(GSSContextImpl.java:385)
at com.sun.security.sasl.gsskerb.GssKrb5Base.wrap(GssKrb5Base.java:103)
at 
com.sun.jndi.ldap.sasl.SaslOutputStream.write(SaslOutputStream.java:89)
at com.sun.jndi.ldap.Connection.writeRequest(Connection.java:414)
at com.sun.jndi.ldap.LdapClient.search(LdapClient.java:547)
at com.sun.jndi.ldap.LdapCtx.doSearch(LdapCtx.java:1985)
at com.sun.jndi.ldap.LdapCtx.searchAux(LdapCtx.java:1847)
at com.sun.jndi.ldap.LdapCtx.c_search(LdapCtx.java:1772)
at 
com.sun.jndi.toolkit.ctx.ComponentDirContext.p_search(ComponentDirContext.java:386)
at 
com.sun.jndi.toolkit.ctx.PartialCompositeDirContext.search(PartialCompositeDirContext.java:356)
at 
com.sun.jndi.toolkit.ctx.PartialCompositeDirContext.search(PartialCompositeDirContext.java:339)
at 
javax.naming.directory.InitialDirContext.search(InitialDirContext.java:267)
at TestPersonQuery.performJndiOperation(TestLDAP.java:109)
at TestPersonQuery.run(TestLDAP.java:80)
at java.security.AccessController.doPrivileged(Native Method)
at javax.security.auth.Subject.doAs(Subject.java:356)
at TestLDAP.main(TestLDAP.java:53)

The failure from Apache Directory Studio on Java 1.6.0_27 is
slightly different:

  java.lang.ArrayIndexOutOfBoundsException: 9
  at sun.security.jgss.krb5.WrapToken.getPadding(WrapToken.java:395)
  at sun.security.jgss.krb5.WrapToken.init(WrapToken.java:406)
  at sun.security.jgss.krb5.Krb5Context.wrap(Krb5Context.java:826)
  at sun.security.jgss.GSSContextImpl.wrap(GSSContextImpl.java:384)
  at com.sun.security.sasl.gsskerb.GssKrb5Base.wrap(GssKrb5Base.java:103)
  at com.sun.jndi.ldap.sasl.SaslOutputStream.write(SaslOutputStream.java:89)
  at com.sun.jndi.ldap.Connection.writeRequest(Connection.java:408)
  at com.sun.jndi.ldap.Connection.writeRequest(Connection.java:383)
  at com.sun.jndi.ldap.LdapClient.search(LdapClient.java:546)
  at com.sun.jndi.ldap.LdapCtx.doSearch(LdapCtx.java:1975)
  at com.sun.jndi.ldap.LdapCtx.searchAux(LdapCtx.java:1837)
  at com.sun.jndi.ldap.LdapCtx.c_search(LdapCtx.java:1762)
  at 
com.sun.jndi.toolkit.ctx.ComponentDirContext.p_search(ComponentDirContext.java:386)
  at 
com.sun.jndi.toolkit.ctx.PartialCompositeDirContext.search(PartialCompositeDirContext.java:356)
  at 
org.apache.directory.studio.connection.core.io.jndi.JNDIConnectionWrapper$1.run(JNDIConnectionWrapper.java:356)
  at 
org.apache.directory.studio.connection.core.io.jndi.JNDIConnectionWrapper.runAndMonitor(JNDIConnectionWrapper.java:1272)
  at 
org.apache.directory.studio.connection.core.io.jndi.JNDIConnectionWrapper.checkConnectionAndRunAndMonitor(JNDIConnectionWrapper.java:1203)
  at 
org.apache.directory.studio.connection.core.io.jndi.JNDIConnectionWrapper.search(JNDIConnectionWrapper.java:398)
  at 
org.apache.directory.studio.ldapbrowser.core.jobs.SearchRunnable.search(SearchRunnable.java:500)
  at 
org.apache.directory.studio.ldapbrowser.core.jobs.ReloadSchemaRunnable.getSchemaLocation(ReloadSchemaRunnable.java:266)
  at 
org.apache.directory.studio.ldapbrowser.core.jobs.ReloadSchemaRunnable.reloadSchema(ReloadSchemaRunnable.java:147)
  at 
org.apache.directory.studio.ldapbrowser.core.BrowserConnectionListener.openBrowserConnection(BrowserConnectionListener.java:115)
  at 

Bug#703114: unblock: debian-edu-archive-keyring/2013.03.15

2013-03-15 Thread Holger Levsen
package: release.debian.org
x-debbugs-cc: debian-...@lists.debian.org, debian-b...@lists.debian.org

Hi,

please unblock debian-edu-archive-keyring/2013.03.15, which set's the the
expiration date for the debian-edu-archive key to 2019. The key in the package
currently in wheezy has an expiration date of 2014-02-20 which will obviously
cause problems as this is during wheezys lifetime.

It also contains an udeb, thus cc: to debian-boot@, even though it's not
used by d-i in Debian.

Regarding the bump to an old standard version: this was already in svn from
when I last looked at this package in 2010, so I kept it, as I knew I confirmed 
back then that it conforms to that standard version and more importantly 
as the removals from Steffen and Zobel from uploaders is a sensible change 
for this upload, so you would review the tiny changes in debian/control anyway.

$ debdiff debian-edu-archive-keyring_2010.01.05.dsc 
debian-edu-archive-keyring_2013.03.15.dsc
diff -Nru debian-edu-archive-keyring-2010.01.05/debian/changelog 
debian-edu-archive-keyring-2013.03.15/debian/changelog
--- debian-edu-archive-keyring-2010.01.05/debian/changelog  2010-01-05 
04:55:37.0 -0800
+++ debian-edu-archive-keyring-2013.03.15/debian/changelog  2013-03-15 
12:09:21.0 -0700
@@ -1,3 +1,13 @@
+debian-edu-archive-keyring (2013.03.15) unstable; urgency=low
+
+  * Include an updated version of debian-edu-archive-keyring.gpg with an
+expiration date for A26FF456 set to 2019. (Closes: #695726)
+  * Remove Martin Zobel-Helas and Steffen Joeris from uploaders, thanks for 
+your work on this package, Martin and Steffen! 
+  * Bump standards version to 3.8.4, no changes needed.
+
+ -- Holger Levsen hol...@debian.org  Fri, 15 Mar 2013 12:03:40 -0700
+
 debian-edu-archive-keyring (2010.01.05) unstable; urgency=low
 
   * Add depends to apt as apt-key is being used in postinst.
diff -Nru debian-edu-archive-keyring-2010.01.05/debian/control 
debian-edu-archive-keyring-2013.03.15/debian/control
--- debian-edu-archive-keyring-2010.01.05/debian/control2010-01-05 
04:51:37.0 -0800
+++ debian-edu-archive-keyring-2013.03.15/debian/control2013-03-15 
11:58:30.0 -0700
@@ -4,10 +4,8 @@
 Maintainer: Debian Edu Developers debian-...@lists.debian.org
 Uploaders: Holger Levsen hol...@debian.org,
  Morten Werner Olsen wer...@debian.org,
- Steffen Joeris wh...@debian.org,
- Martin Zobel-Helas zo...@ftbfs.de,
  Petter Reinholdtsen p...@debian.org
-Standards-Version: 3.8.3
+Standards-Version: 3.8.4
 
 Package: debian-edu-archive-keyring
 Architecture: all
Binary files 
/tmp/_Hj4wp9uuX/debian-edu-archive-keyring-2010.01.05/keyrings/debian-edu-archive-keyring.gpg
 and /tmp/8yUJPArv7q/debian-edu-archive-keyring-2013.03.15/keyrings/debian-edu-
archive-keyring.gpg differ

keyrings/debian-edu-archive-keyring.gpg is a valid gpg keyring file and 
contains the bit we want.


cheers,
Holger


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#631366: [Pkg-nagios-devel] Bug#631366: include progress logo

2013-03-15 Thread Alexander Wirt
On Fri, 15 Mar 2013, Daniel Baumann wrote:

 tag 631366 patch
 thanks
 
 On 03/15/2013 08:43 AM, Alexander Wirt wrote:
  http://vcs.progress-linux.org/?p=packages/nagios-images.git;a=commitdiff;h=44b4335bb976ea097d8abb5d62e977dabb48d406
  Unfortunatly that link is borken.
 
 http://sources.progress-linux.org/gitweb/?p=releases/baureo/packages/nagios-images.git;a=commitdiff;h=4f54a47fe76bdf9bb6dbb94e2821c570c75a819d
This is a patch and no images.
 
 -- 
 Address:Daniel Baumann, Donnerbuehlweg 3, CH-3012 Bern
 Email:  daniel.baum...@progress-technologies.net
 Internet:   http://people.progress-technologies.net/~daniel.baumann/
 
 ___
 Pkg-nagios-devel mailing list
 pkg-nagios-de...@lists.alioth.debian.org
 http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-nagios-devel


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#581999: rinputd: fails to install

2013-03-15 Thread Ralf Treinen
Here is an update of my patch, with randomly generated passord as suggested by
vagrand. -Ralf.
diff -ur rinputd-1.0.5.old/debian/changelog rinputd-1.0.5/debian/changelog
--- rinputd-1.0.5.old/debian/changelog	2012-04-12 20:20:15.0 +0200
+++ rinputd-1.0.5/debian/changelog	2013-03-15 17:33:19.0 +0100
@@ -1,3 +1,9 @@
+rinputd (1.0.5-3) unstable; urgency=low
+
+  * NMU to fix RC bug in wheezy.
+
+ -- Ralf Treinen trei...@debian.org  Fri, 15 Mar 2013 17:33:19 +0100
+
 rinputd (1.0.5-2) unstable; urgency=low
 
   * Convert from CDBS to debhelper
diff -ur rinputd-1.0.5.old/debian/config rinputd-1.0.5/debian/config
--- rinputd-1.0.5.old/debian/config	2012-04-12 20:06:14.0 +0200
+++ rinputd-1.0.5/debian/config	2013-03-15 17:44:54.0 +0100
@@ -2,8 +2,6 @@
 
 set -e
 
-[ `echo $DEBIAN_FRONTEND | tr '[:upper:]' '[:lower:]'` = noninteractive ]  exit 0
-
 . /usr/share/debconf/confmodule
 
 db_beginblock
@@ -13,6 +11,10 @@
 
 db_go
 
+# initialisation of USER and PASS needed in the non-interactive case
+USER=rinputd
+PASS=`openssl rand -base64 8`
+
 db_get rinputd/username
 USER=$RET
 db_get rinputd/passwd
diff -ur rinputd-1.0.5.old/debian/rinputd.postinst rinputd-1.0.5/debian/rinputd.postinst
--- rinputd-1.0.5.old/debian/rinputd.postinst	2012-04-04 06:33:44.0 +0200
+++ rinputd-1.0.5/debian/rinputd.postinst	2013-03-15 18:38:50.0 +0100
@@ -24,14 +24,13 @@
 echo Done
 fi
 
-if [ `echo $DEBIAN_FRONTEND | tr '[:upper:]' '[:lower:]'` != noninteractive ]; then
-db_get rinputd/username
-USER=$RET
-db_get rinputd/passwd
-PASS=$RET
+
+db_get rinputd/username
+USER=$RET
+db_get rinputd/passwd
+PASS=$RET
 
-echo $PASS | saslpasswd2 -p -c -u rinput $USER
-fi
+echo $PASS | saslpasswd2 -p -c -u rinput $USER
 fi
 
 #DEBHELPER#


Bug#693591: Fwd: Re: flashplugin-nonfree: weird upgrade problem with apper

2013-03-15 Thread Paul Gevers
Message came back, resending to the bts.

Paul

 Original Message 
Subject: Re: flashplugin-nonfree: weird upgrade problem with apper
Date: Fri, 15 Mar 2013 07:16:07 +0100
From: Paul Gevers elb...@debian.org
To: 693...@bugs.debian.org
CC: Matthias Klumpp matth...@tenstral.net

On 15-03-13 05:11, Bart Martens wrote:
 News on this bug ? More info from debugging ? Maybe it's time to ask help from
 Matthias Klumpp (maintains apper in Debian).

My latest info is in the bug. I mentioned to you already earlier that I
think the bug is in apper, so I my idea was: reassign.

Paul






signature.asc
Description: OpenPGP digital signature


Bug#697676: Re: Bug#697676: lvm2: cLVM binary package is missing

2013-03-15 Thread Steven Chamberlain
On 03/03/13 13:57, Vitaly Pashkov wrote:
 On Thu, 2013-02-28 at 10:08 +0100, Bastian Blank wrote:
 popcon showed exactly _zero_ installations.
 
 Probably a popcon bug or something, which is a different question. We
 are using clvm in 2 clusters currently and all of the nodes in it have
 popcon enabled. clvm works fine for us.

I think here are the correct popcon stats, around 360 installations:
http://qa.debian.org/popcon-graph.php?packages=clvm

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#700581: chromium-browser: Adobe flashplugin-nonfree usage spawns: XID collision trouble ahead errors to console

2013-03-15 Thread Bart Martens
reassign 700581 chromium-browser
found 700581 6.0.472.63~r59945-5+squeeze6
severity 700581 important
tags 700581 - upstream wontfix
stop

(The above changes are restoring the initial settings.  Feel free to change
further as you see fit.)

On Thu, Mar 14, 2013 at 10:00:06PM -0700, Jonathan Nieder wrote:
 Hi,
 
 Bart Martens wrote:
 
  If this is caused by the Adobe Flash Player (which version?) then please 
  report
  this to Adobe, not to Debian.  Anyhow, I don't think I can do anything about
  this in the flashplugin-nonfree Debian package.
 [...]
  I intend to close this bug soon.  If you want to reassign this bug to
  elsewhere, then now would be a good time.
 
 Sorry I missed your message before.

No problem at all.

  I don't know if this is caused
 by Adobe Flash player or something else.

Then I guess you don't mind that I revert the reassignment.

  Possibly related bugs:
 
  #691410 2012-10-25 iceape: crashes with Gdk-WARNING **: XID collision,
 trouble ahead
  #574725 2010-03-20 iceweasel: Gdk warning: XID collision, trouble ahead

That sounds like good info for further processing.

 
 Please deal with this report as you wish,

I'm restoring the initial settings of this bug.

 for example by letting the
 reporter know how to report it to Adobe

That can be found on Adobe's website.

 or by merging with one of the
 other bugs

That can be found on the Debian website.

 if they seem to have the same cause.

That I don't know.

Regards,

Bart Martens


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#660826: RFP: Elasticsearch -- Distributed, RESTful, Search Engine built on top of Apache Lucene

2013-03-15 Thread Radu Gheorghe
Hi Apollon,

Sorry, I didn't have the time to make any progress on this. But any kind of
help will definitely welcome :)

Best regards,
Radu

2013/3/14 Apollon Oikonomopoulos apoi...@gmail.com

 Hi Radu, Nick,

 Any news on this? We're also making heavy use of elasticsearch in our
 main service and would be glad to help package/maintain it properly.

 Regards,
 Apollon



Bug#700822: Misdetects Nexus 10 as Nexus 4

2013-03-15 Thread Anthony DeRobertis

Package: mtp-tools
Followup-For: Bug #700822


$ mtp-files
libmtp version: 1.1.3

Device 0 (VID=18d1 and PID=4ee1) is a Google Inc (for LG Electronics) Nexus 4.
â‹®

Except that the device is a Nexus 10, not a Nexus 4 (and Samsung, not
LG).

The version in experimental instead says its a:

Device 0 (VID=18d1 and PID=4ee1) is a Google Inc (for LG Electronics/Samsung) 
Nexus 4/10 (MTP).

so I guess they must have used the same product ID...

-- System Information:
Debian Release: 7.0
  APT prefers testing
  APT policy: (500, 'testing'), (150, 'unstable'), (125, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.8-trunk-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages mtp-tools depends on:
ii  libc62.13-38
ii  libmtp9  1.1.3-35-g0ece104-5

mtp-tools recommends no packages.

mtp-tools suggests no packages.

-- no debconf information


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#701649: Fix for stable

2013-03-15 Thread Yves-Alexis Perez
On sam., 2013-03-09 at 19:54 +0100, Guido Günther wrote:
 Hi,
 sorry for the delay but attached is the diff for the stable update. This
 addrsses #701649 (CVE-2013-1766) as well as #699224 (kind of
 CVE-2013-0170). Is this enough for the security team to issue the DSA?
 Let me know if I can help further.
 Cheers,
  -- Guido

Ok, I have two more questions:

- what is http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701649#43
really about? Does libvirt changes permissions on files added to the
storage pool or something?
- in http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701649#48 waldi
seems to prefer the disks group, but I don't think any other comment
replying to that. Could you elaborate about this?

Regards,
-- 
Yves-Alexis


signature.asc
Description: This is a digitally signed message part


Bug#701649: Fix for stable

2013-03-15 Thread Guido Günther
On Fri, Mar 15, 2013 at 10:40:12AM +0100, Yves-Alexis Perez wrote:
 On sam., 2013-03-09 at 19:54 +0100, Guido Günther wrote:
  Hi,
  sorry for the delay but attached is the diff for the stable update. This
  addrsses #701649 (CVE-2013-1766) as well as #699224 (kind of
  CVE-2013-0170). Is this enough for the security team to issue the DSA?
  Let me know if I can help further.
  Cheers,
   -- Guido
 
 Ok, I have two more questions:
 
 - what is http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701649#43
 really about? Does libvirt changes permissions on files added to the
 storage pool or something?

When using qemu:///system (that is running qemu via the system libvirtd
instead of the user's session libvirtd) and dynamic_ownership = 1 (the
default) libvirtd changes permissions of devices and files it needs to
open to libvirt-qemu:libvirt-qemu since it runs the qemu/kvm process
itself with these privileges. Before the change this used to be
libvirt-qemu:kvm.

 - in http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701649#48 waldi
 seems to prefer the disks group, but I don't think any other comment
 replying to that. Could you elaborate about this?

This is just not how dynamic ownership works. It consistently uses the
above for all devices accessed by the qemu process.
Cheers,
 -- Guido

 
 Regards,
 -- 
 Yves-Alexis


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702625: closed by Ben Hutchings b...@decadent.org.uk (Re: Bug#702625: linux-source-3.2: Custom kernel built from Debian source gives a package with huge size)

2013-03-15 Thread Fred
Hello Ben,

  Thanks for your explanation :-)

You could perhaps add a note in the Debian Kernel handbook about this
point ?

regards,
Fred.


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#701649: Fix for stable

2013-03-15 Thread Yves-Alexis Perez
On sam., 2013-03-09 at 19:54 +0100, Guido Günther wrote:
 Hi,
 sorry for the delay but attached is the diff for the stable update.
 This
 addrsses #701649 (CVE-2013-1766) as well as #699224 (kind of
 CVE-2013-0170). Is this enough for the security team to issue the DSA?
 Let me know if I can help further.

Just a comment. Does the package still need to create/remove the kvm
group? Shouldn't only the kvm package do that?

What about the permissions on devices (there's something abou tit on the
bug report)?

Regards,
-- 
Yves-Alexis


signature.asc
Description: This is a digitally signed message part


Bug#701663: pre-approve unblock: tryton-server/2.2.7-1

2013-03-15 Thread Jonathan Wiltshire
Control: tag -1 + moreinfo

On Mon, Feb 25, 2013 at 09:55:17PM +0100, Mathias Behrle wrote:
 Package: release.debian.org
 Severity: normal
 User: release.debian@packages.debian.org
 Usertags: unblock
 
 Dear release managers,
 
 please approve the upload of tryton-server_2.2.7-1.
 
 There were several bugfix releases in Tryton, that are out since a 
 considerable
 time and thus are well tested. I am filing this unblock request for the
 server first to know if it finds the approval of the release team. 
 
 Once it is accepted I will file the unblock requests for the client and 16
 modules. Those fixes are generally quite smaller than this one.

Your changelog doesn't indicate how serious the proposed fixes are and I
don't have time to dig through upstream commits trying to work it out. If
there were Debian bugs for them, what severity would each be?


Thanks,

-- 
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51

directhex i have six years of solaris sysadmin experience, from
8-10. i am well qualified to say it is made from bonghits
layered on top of bonghits


signature.asc
Description: Digital signature


Bug#702821: perl/hash_attack.t fails with 5.10.1 + CVE-2013-1667 fix

2013-03-15 Thread Salvatore Bonaccorso
Hi

On Fri, Mar 15, 2013 at 05:56:05PM -, Steve Hay wrote:
[...]
 Zefram has now come up with an even better patch (on the same RT
 ticket), after reproducing the Debian 5.10.1 failure himself.
 
 Please take a look (I've also attached it here for your convenience) and
 let me know whether this works for you. If so then I hope to apply it to
 SVN over the weekend.

I can confirm that the new patch works on Debian Squeeze, with Perl
(5.10.1-17squeeze6) including the security fix.

Thank you Steve for keeping us updated!

Regards,
Salvatore


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702908: PTS: upload signature parsing patch

2013-03-15 Thread Paul Wise
On Fri, 2013-03-15 at 08:41 +0100, Markus Wanner wrote:

 What we can do is distinguish three cases, i.e. (just to stick with the
 example above):

Examples look good to me.

 Exactly, so let's keep with signed by rather than trying to identify
 what exactly we call sponsorship and what not.

Agreed.

 Sounds like a notification on stderr about missing pubkeys could do the
 trick.

Yep.

-- 
bye,
pabs

http://wiki.debian.org/PaulWise


signature.asc
Description: This is a digitally signed message part


Bug#702965: procps: ps dies with SIGSEGV on kernels 3.2.29 and lots of supplementary groups

2013-03-15 Thread Karl E. Jorgensen
Hi

On Thu, Mar 14, 2013 at 09:14:21AM +1100, Craig Small wrote:
 On Wed, Mar 13, 2013 at 12:38:40PM +, Karl E. Jorgensen wrote:
  We found that under the following circumstances:
  * Kernel  3.2.29 (which shows  32 groups in /proc/${pid}/status)
  * one or more users logged in with lots of supplementary groups
 Hi Karl,
   Can you look at the change at
 https://www.gitorious.org/procps/procps/commit/7933435584aa1fd75460f4c7715a3d4855d97c1c

That patch looks good - obviously others have had the same idea as me
then :-)

 and see if that fixes (or rather works-around) the problem? The patch
 used 4k not 8k but:

Yeah - I may have gone slightly over the top by jumping to 8k.

  karl@someserver: ~$ wc --bytes  /proc/1997/status
  1810
 
 that appears to be ok for now.

Yes - but the current ps still appears to choke on it.  And it's
uncomfortably close to 2k, thus making chose at least 4k. Which
paranoia then bumped to 8k.

  I have a (temporary) patch which increases the buffer size to 8K,
  which appears sufficient in our case. But this does not fix the
  underlying problem of having a limited buffer size to start with...
 You're correct, it shouldn't be a statically defined number. It's a
 buffer overflow because the read in file2str protects it but the
 subsequent structure may be a little sad.

I may be misreading you here, but I don't think this is a buffer
overflow. As far as I can see, file2str() does not fill the buffer
beyond the boundary, but the problem lies in the subsequent code which
assumes that the entire contents of the file is available in the
buffer - in the loop around readproc.c:293 

 
 I'm thinking a size for 32 groups with a realloc/read loop might 
 be the way to go.

Absolutely.  I started working on a patch for that but realised that
this would take longer than I had available.

I have come to realise that readproc.c makes LOTS of assumptions about
the contents of /proc/$pid/status - if the kernel decides to miss a
space somewhere, turn spaces into tabs (or vice versa), the whole
thing collapses, possibly accompanied by noises like SIGSEGV and similar.

Then I heard of procps-ng, decided to investigate it further... and
life got in the way :-S

-- 
Karl E. Jorgensen


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703097: upstream 1.10-RC1 packaging

2013-03-15 Thread Paul Gevers
On 15-03-13 16:22, Barak A. Pearlmutter wrote:
 Package: liferea
 Version: 1.8.6
 
 For my own nefarious purposes, I packaged 1.10-RC1 based upon the tip of
 the experimental branch in the collab-maint repo, in the process making
 some other random updates.
 
 Available in git://git.debian.org/~bap/liferea.git
 
 You are welcome to pick anything of use from it, as you wish.

Just so it is registered. David Smith (the creator of the last NMU) is
also working on it.

Paul



signature.asc
Description: OpenPGP digital signature


Bug#703097: git repo url

2013-03-15 Thread Barak A. Pearlmutter
Oops, got the repo url wrong.  Should read:

git://anonscm.debian.org/users/bap/liferea.git


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#448638: RFP: i2p -- I2P is an anonymizing network

2013-03-15 Thread Hungry Hobo

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

KYTV has been doing an excellent job maintaining Ubuntu and Debian packages:

https://launchpad.net/~i2p-maintainers/+archive/i2p

Quote from http://www.i2p2.de/debian.html :

 For Debian Oldstable (Lenny) and Stable (Squeeze): Add the following entries 
 to
|/etc/apt/sources.list.d/i2p.list|
 |deb http://ppa.launchpad.net/i2p-maintainers/i2p/ubuntu natty main
 deb-src http://ppa.launchpad.net/i2p-maintainers/i2p/ubuntu natty
main |

 For Debian Testing (Wheezy) or Unstable (Sid), use the following:
 |deb http://ppa.launchpad.net/i2p-maintainers/i2p/ubuntu precise main
 deb-src http://ppa.launchpad.net/i2p-maintainers/i2p/ubuntu
precise main |


Regards,
HH


Am 13.03.2013 04:39, schrieb Carlos Alberto Lopez Perez:
 retitle 448638 RFP: i2p -- I2P is an anonymizing network
 noowner 448638
 thanks

 Hi


 Given the timeline, I think is pretty clear that nobody is working on
 this package.

 In the mean time another ITP was filled for this package #665450 (now
 merged on this one). So I'm retitling this bug to RFP to easily allow
 anyone that wants to take care of this to work on it.

 If anyone of you want to step in and take care of packaging I2P for
 Debian please re-title the bug back to ITP and assign it to you.

 If it happens that there is more than one person interested on packaging
 I2P, then the interested ones can talk between them to check the
 possibility of maintaining the package together.


 Thanks!


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/

iEYEARECAAYFAlFCzC4ACgkQHix7YXbc3BIe6ACfaJC7G0sQpYaJ3jU1d7iDN1g9
AsMAn1ZSbJ40bOygbounGW3Sba0/j/+8
=AJkZ
-END PGP SIGNATURE-



Bug#702821: perl/hash_attack.t fails with 5.10.1 + CVE-2013-1667 fix

2013-03-15 Thread Zefram
The patch in svn.apache.org r1455340 is not correct for Perl 5.10 due
to a slight difference in hash splitting logic.  Full explanation and
revised patch now available on the RT ticket.

-zefram


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703114: unblock: debian-edu-archive-keyring/2013.03.15

2013-03-15 Thread Adam D. Barratt
Control: tags -1 + confirmed d-i

On Fri, 2013-03-15 at 12:34 -0700, Holger Levsen wrote:
 please unblock debian-edu-archive-keyring/2013.03.15, which set's the the
 expiration date for the debian-edu-archive key to 2019. The key in the package
 currently in wheezy has an expiration date of 2014-02-20 which will obviously
 cause problems as this is during wheezys lifetime.

Unblocked.

 It also contains an udeb, thus cc: to debian-boot@, even though it's not
 used by d-i in Debian.

Tagging + CCing for that.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#703069: German tzdata debconf translation: Typo fixed, please use this file

2013-03-15 Thread Holger Wansing
I was pointed on a typo in my file provided yesterday (thanks to Sven Joachim).
Please use the attached file, which fixes that typo.
Thanks and sorry

Holger 


-- 
= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =
Created with Sylpheed 3.0.2
under  D e b i a n   G N U / L I N U X   6.0  ( S q u e e z e )
Registered LinuxUser #311290 - http://linuxcounter.net/
= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =


tzdata-2013b-2_de.po.gz
Description: Binary data


Bug#684164: ppp: rp-pppoe 3.11 allows 1500B MTU on PPPoE (RFC4638)

2013-03-15 Thread Darkhorse Winterwolf
Package: ppp
Version: 2.4.5-5.1+b1
Followup-For: Bug #684164

Hello,

Since this bug was originally reported, rp-pppoe 3.11 has been released,
which reports compliance with RFC4638 and so allows 1500B MTU on PPPoE
connections (so long as all the hardware supports the intermediate
Ethernet MTU of 1508B as well).

I grabbed the new source from [1], grabbed the PPP headers from the
Debian source package, and set it off compiling, then dropped the
resulting rp-pppoe.so into /usr/lib/pppd/2.4.5 and re-started my PPPoE
connection. It worked like a charm - the link came back up with a 1500B
MTU straight away (previously, it wouldn't negotiate more than 1492 by
LCP regardless of what was requested in the peer file).

The newly compiled rp-pppoe.so accounts for the debsums warning at the
end of this report, for reference.

The split between rp-pppoe package and ppp seems a little unusual, but I
can see why it might have been done. I think the request to update
rp-pppoe.so from rp-pppoe 3.11 should remain attached to ppp, since the
ppp package carries the resulting binaries. given how easy it was to
just compile against existing headers, I think this fix should be fairly
easy to apply to the official Debian builds, too.

Give me a shout if there's anything I can do to help.

All the best,
-Dave.

[1]: http://www.roaringpenguin.com/files/download/rp-pppoe-3.11.tar.gz

-- System Information:
Debian Release: 7.0
  APT prefers testing
  APT policy: (550, 'testing'), (450, 'unstable'), (450, 'stable'), (445, 
'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.8.2 (SMP w/2 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages ppp depends on:
ii  libc6   2.13-38
ii  libpam-modules  1.1.3-7.1
ii  libpam-runtime  1.1.3-7.1
ii  libpam0g1.1.3-7.1
ii  libpcap0.8  1.3.0-1
ii  procps  1:3.3.3-2

ppp recommends no packages.

ppp suggests no packages.

-- Configuration Files:
/etc/chatscripts/gprs [Errno 13] Permission denied: u'/etc/chatscripts/gprs'
/etc/chatscripts/pap [Errno 13] Permission denied: u'/etc/chatscripts/pap'

-- no debconf information

-- debsums errors found:
debsums: changed file /usr/lib/pppd/2.4.5/rp-pppoe.so (from ppp package)


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#701817: unblock: botan1.10/1.10.4-1

2013-03-15 Thread Jonathan Wiltshire
Control: tag -1 moreinfo

Hi Ondřej,

On Wed, Feb 27, 2013 at 02:52:52PM +0100, Ondřej Surý wrote:
 Please unblock package botan1.10
 
 Hi,
 
 I would like to pre-mediate the inclusion of 1.10.4 (e.g. new upstream 
 version).
 
 The patch is very small and fixes three issues.  Upstream changelog:

What is the impact and severity of these issues? I don't have enough
knowledge of the package to assess this from the upstream release notes,
and the BTS is lacking any clues.

Thanks,

-- 
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51

directhex i have six years of solaris sysadmin experience, from
8-10. i am well qualified to say it is made from bonghits
layered on top of bonghits


signature.asc
Description: Digital signature


  1   2   >