Processed: Re: Bug#296824: sbcl: Stale fasls
Processing commands for [EMAIL PROTECTED]: severity 296824 normal Bug#296824: sbcl: Stale fasls Severity set to `normal'. retitle 296824 Please upload new version of sbcl to fix bug Bug#296824: sbcl: Stale fasls Changed Bug title. tags 296824 + pending Bug#296824: Please upload new version of sbcl to fix bug Tags were: moreinfo Tags added: pending thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#296824: sbcl: Stale fasls
severity 296824 normal retitle 296824 Please upload new version of sbcl to fix bug tags 296824 + pending thanks Alan Shields wrote: The issue was that the fasls weren't recognized as incompatible. I put in the recompile-stale-fasls code and it thought everything was fine. I was given to believe this was because 0.8.19.29 was a prerelease version and thus the version number wasn't incremented for each change before release. I'm way out of my depth here, only trying to help as best I can. The fasls were from an asdf-install'd package, so I wouldn't expect those to be current, but I would expect them to be recognized as stale. Or is this the ass-end of an assumption? Thanks for the additional information. Incompatible fasls from a previous version of a lisp compile (stale fasls) are a problem with all lisp compilers: allegro, lispworks, cmucl, clisp, and sbcl. As time as gone on, lisp compilers have become better at recognizing stale fasls and reporting them. But as this sbcl incident has shown, sometimes incompatibilities are added but the fasl-version-number is not incremented. So, while you assumption is rather reasonable these days, it's not a very safe assumption. Because your bug report was marked as grave (package is not usable), I thought you were stating that the sbcl package itself did not work rather than there were errors loading fasls created by previous versions of sbcl. I'm currently building a new version of sbcl to upload, so I've tag the bug as pending. -- Kevin Rosenberg [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#293471: marked as done (xemacs21: XEmacs 21.4.16 withdrawn by upstream, 21.4.17 will be released Feb 6)
Your message dated Fri, 25 Feb 2005 16:54:40 +0900 (JST) with message-id [EMAIL PROTECTED] and subject line Processed: still present in sarge has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 3 Feb 2005 17:34:35 + From [EMAIL PROTECTED] Thu Feb 03 09:34:35 2005 Return-path: [EMAIL PROTECTED] Received: from idmailgate2.unizh.ch [130.60.68.106] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CwksE-0005kU-00; Thu, 03 Feb 2005 09:34:35 -0800 Received: from alhambra.kuesterei.ch ([130.60.169.112]) by idmailgate2.unizh.ch (8.12.10/8.12.10/Debian-2) with ESMTP id j13HY2fC022121 for [EMAIL PROTECTED]; Thu, 3 Feb 2005 18:34:02 +0100 Received: from frank by alhambra.kuesterei.ch with local (Exim 3.35 #1 (Debian)) id 1Cwkri-0006eu-00 for [EMAIL PROTECTED]; Thu, 03 Feb 2005 18:34:02 +0100 To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: xemacs21: XEmacs 21.4.16 withdrawn by upstream, 21.4.16 will be released Feb 6 X-Debbugs-CC: Frank Küster [EMAIL PROTECTED] MIME-version: 1.0 Content-type: text/plain; charset=iso-8859-15 Message-Id: [EMAIL PROTECTED] From: =?iso-8859-1?Q?Frank_K=FCster?= [EMAIL PROTECTED] Date: Thu, 03 Feb 2005 18:34:02 +0100 X-Virus-Scanned: by amavisd-new Content-Transfer-Encoding: 8bit Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE, X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: xemacs21 Version: 21.4.16-1 Severity: serious Quoting Vin Shelton: , | From: Vin Shelton [EMAIL PROTECTED] | Subject: Re: Need some bug/version info | To: David Kastrup [EMAIL PROTECTED] | Cc: [EMAIL PROTECTED], Stephen J. Turnbull [EMAIL PROTECTED], [EMAIL PROTECTED] | Date: Thu, 03 Feb 2005 10:31:50 -0500 | Organization: The XEmacs Development Team | | Hello David, | | I don't know if you know me - I am Vin Shelton, the Release Engineer | for the stable branch of XEmacs. Therefore, the 21.4.16 and 21.4.17 | releases are my responsibility. | | You raise a number of points below. I agree with the gist of your | argument: XEmacs 21.4.16 should be withdrawn and 21.4.17 should be | released as soon as possible. XEmacs 21.4.17 will be released on | February 6. ` The mail has been sent to the XEmacs and AUCTeX development lists and is not yet archived by Gmane. Regards, Frank -- System Information Debian Release: 3.0-bunk-2 Architecture: i386 Kernel: Linux alhambra 2.4.27 #1 Sam Sep 25 11:29:41 CEST 2004 i686 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] Versions of packages xemacs21 depends on: ii xemacs21-mule 21.4.6-8 Editor and kitchen sink -- Mule bi --- Received: (at 293471-done) by bugs.debian.org; 25 Feb 2005 07:55:05 + From [EMAIL PROTECTED] Thu Feb 24 23:55:05 2005 Return-path: [EMAIL PROTECTED] Received: from mx.kyoto-u.ac.jp (omls-1a.kuins.net) [130.54.130.66] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D4aJU-0006o2-00; Thu, 24 Feb 2005 23:55:05 -0800 Received: from imls-1c.kuins.net (imls-1c.imail.kuins.net [10.224.253.5]) by omls-1a.kuins.net (8.12.10/8.12.7) with ESMTP id j1P7t2Z5005677; Fri, 25 Feb 2005 16:55:02 +0900 Received: from ling.bun.kyoto-u.ac.jp (localhost [127.0.0.1]) by imls-1c.kuins.net (8.12.10/8.12.7) with ESMTP id j1P7t0UU031862; Fri, 25 Feb 2005 16:55:01 +0900 Received: from penold (h108.86.228.10.30035.vlan.kuins.net [10.228.86.108]) by ling.bun.kyoto-u.ac.jp (Postfix) with ESMTP id 509E9AB08D; Fri, 25 Feb 2005 16:55:00 +0900 (JST) Received: from localhost (penold [127.0.0.1]) by penold (Postfix) with ESMTP id AF47F111B; Fri, 25 Feb 2005 16:54:59 +0900 (JST) Date: Fri, 25 Feb 2005 16:54:40 +0900 (JST) Message-Id: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: Re: Processed: still present in sarge From: OHURA Makoto [EMAIL PROTECTED] In-Reply-To: [EMAIL PROTECTED] References: [EMAIL PROTECTED] [EMAIL PROTECTED] Organization: LILO-POPPY X-Mailer: Mew version 4.2 on XEmacs 21.4.17 (Jumbo Shrimp) Mime-Version: 1.0 Content-Type: Multipart/Signed; protocol=application/pgp-signature; micalg=pgp-sha1; boundary=--Security_Multipart(Fri_Feb_25_16_54_40_2005_134)--
Bug#295428: marked as done (FTBFS: autoconf bug?)
Your message dated Fri, 25 Feb 2005 04:17:14 -0500 with message-id [EMAIL PROTECTED] and subject line Bug#295428: fixed in apache2 2.0.53-5 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 15 Feb 2005 19:08:30 + From [EMAIL PROTECTED] Tue Feb 15 11:08:30 2005 Return-path: [EMAIL PROTECTED] Received: from public2-cosh5-6-cust60933.cosh.broadband.ntl.com (eames.methody.org) [80.4.152.5] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D183h-0005ub-00; Tue, 15 Feb 2005 11:08:30 -0800 Received: from henry.methody.org (henry.methody.org [:::10.10.10.13]) by eames.methody.org with esmtp; Tue, 15 Feb 2005 19:07:54 + id 00052DB3.4212488A.3AF8 Received: from l4545 by henry.methody.org with local (Exim 3.36 #1 (Debian)) id 1D1839-0007rz-00; Tue, 15 Feb 2005 19:07:55 + Date: Tue, 15 Feb 2005 19:07:55 + From: Martin Orr [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: FTBFS: autoconf bug? Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Content-Disposition: inline X-Reportbug-Version: 3.7.1 User-Agent: Mutt/1.5.6+20040907i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: apache2 Severity: serious Justification: no longer builds from source I have built recently built versions 2.0.53-{1,2,3} of apache2 successfully. However version 2.0.53-4 fails, the output ending with: checking whether we are using GNU C... yes checking whether gcc accepts -g... (cached) yes checking how to run the C preprocessor... gcc -E checking for external PCRE library... /home/l4545/src/henry-packages/apache2/apache2-2.0.53-4.henry.1/build-tree/apache2/configure: line 2675: syntax error near unexpected token AC_LANG_PROGRAM' /home/l4545/src/henry-packages/apache2/apache2-2.0.53-4.henry.1/build-tree/apache2/configure: line 2675: AC_COMPILE_IFELSE(AC_LANG_PROGRAM([[#include pcre.h]],' make[1]: Entering directory /home/l4545/src/henry-packages/apache2/apache2-2.0.53-4.henry.1/build-tree/apache2-build/prefork' make[1]: *** No targets specified and no makefile found. Stop. make[1]: Leaving directory /home/l4545/src/henry-packages/apache2/apache2-2.0.53-4.henry.1/build-tree/apache2-build/prefork' touch debian/stampdir/build-mpms (In fact, a similar error occurs when running configure for every MPM, but these errors do not lead to make exiting since the various steps in configuring/building each MPM are chained together with ; instead of ). I include the full output of buildconf since I think the undefined macro AC_LANG_PROGRAM is relevant: rebuilding srclib/apr/configure buildconf: checking installation... buildconf: autoconf version 2.59 (ok) buildconf: libtool version 1.5.6 (ok) Copying libtool helper files ... buildconf: Using libtool.m4 at /usr/share/aclocal/libtool.m4. Creating include/arch/unix/apr_private.h.in ... autoheader2.50: WARNING: Using auxiliary files such as acconfig.h', config.h.bot' autoheader2.50: WARNING: and config.h.top', to define templates for config.h.in' autoheader2.50: WARNING: is deprecated and discouraged. autoheader2.50: autoheader2.50: WARNING: Using the third argument of AC_DEFINE' and autoheader2.50: WARNING: AC_DEFINE_UNQUOTED' allows to define a template without autoheader2.50: WARNING: acconfig.h': autoheader2.50: autoheader2.50: WARNING: AC_DEFINE([NEED_FUNC_MAIN], 1, autoheader2.50: [Define if a function main' is needed.]) autoheader2.50: autoheader2.50: WARNING: More sophisticated templates can also be produced, see the autoheader2.50: WARNING: documentation. Creating configure ... rebuilding rpm spec file rebuilding srclib/apr-util/configure Looking for apr source in ../apr Creating include/private/apu_config.h ... Creating configure ... Invoking xml/expat/buildconf.sh ... Incorporating /usr/share/aclocal/libtool.m4 into aclocal.m4 ... Copying libtool helper files ... Creating config.h.in ... autoheader2.50: WARNING: Using auxiliary files such as acconfig.h', config.h.bot' autoheader2.50: WARNING: and config.h.top', to define templates for config.h.in' autoheader2.50: WARNING: is deprecated and discouraged. autoheader2.50:
Bug#296863: libgnomedb: FTBFS: Errors processing docs
Package: libgnomedb Severity: serious Version: 1.0.4-8 From my build log, using pbuilder in an i386 chroot: ... *** Building HTML *** test -d ./html || mkdir ./html cd ./html gtkdoc-mkhtml libgnomedb ../libgnomedb-docs.sgml /usr/bin/jade:../sgml/gnome-db-config.sgml:68:69:E: character : is not allowed in the value of attribute LINKEND /usr/bin/jade:../sgml/gnome-db-config.sgml:69:63:E: character : is not allowed in the value of attribute LINKEND ... /usr/bin/jade:../sgml/gnome-db-stock.sgml:149:39:E: character : is not allowed in the value of attribute ID /usr/bin/jade:../sgml/gnome-db-stock.sgml:156:52:E: character : is not allowed in the value of attribute ID make[3]: *** [html-build.stamp] Error 1 make[3]: Leaving directory `/tmp/buildd/libgnomedb-1.0.4/build-tree/libgnomedb-1.0.4/doc/C' make[2]: *** [all-recursive] Error 1 make[2]: Leaving directory `/tmp/buildd/libgnomedb-1.0.4/build-tree/libgnomedb-1.0.4/doc' make[1]: *** [all-recursive] Error 1 make[1]: Leaving directory `/tmp/buildd/libgnomedb-1.0.4/build-tree/libgnomedb-1.0.4' make: *** [debian/stampdir/build-stamp] Error 2 -- System Information: Debian Release: 3.1 Architecture: amd64 (x86_64) Kernel: Linux 2.6.9-9-amd64-k8 Locale: LANG=C, LC_CTYPE=C (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8) -- Daniel Schepler Please don't disillusion me. I [EMAIL PROTECTED]haven't had breakfast yet. -- Orson Scott Card -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#276964: phpbb2-conf-mysql: I reported same problem
On Thu, Feb 24, 2005 at 09:07:50PM +, Gerrit Pape wrote: A subshell forked in eval or a dot file within an or list does not return, causing the parent shell to block: Good catch. We need to check whether the EXEVAL is thrown by a subshell and if so relay it to the top. Please try these two patches instead. Cheers, -- Visit Openswan at http://www.openswan.org/ Email: Herbert Xu ~{PmVHI~} [EMAIL PROTECTED] Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt = jobs.c 1.61 vs edited = --- 1.61/src/jobs.c 2004-08-07 13:48:42 +10:00 +++ edited/jobs.c 2005-02-25 11:48:15 +11:00 @@ -838,19 +838,19 @@ STATIC inline void forkchild(struct job *jp, union node *n, int mode) { - int wasroot; + int oldlvl; pid_t pgrp; TRACE((Child shell %d\n, getpid())); - wasroot = rootshell; - rootshell = 0; + oldlvl = shlvl; + shlvl++; closescript(); clear_traps(); #if JOBS /* do job control only in root shell */ jobctl = 0; - if (mode != FORK_NOJOB jp-jobctl wasroot) { + if (mode != FORK_NOJOB jp-jobctl !oldlvl) { if (jp-nprocs == 0) pgrp = getpid(); else @@ -872,7 +872,7 @@ error(Can't open %s, _PATH_DEVNULL); } } - if (wasroot iflag) { + if (!oldlvl iflag) { setsignal(SIGINT); setsignal(SIGQUIT); setsignal(SIGTERM); = main.c 1.33 vs edited = --- 1.33/src/main.c 2003-10-29 21:22:45 +11:00 +++ edited/main.c 2005-02-25 11:48:52 +11:00 @@ -85,7 +85,7 @@ #define PROFILE 0 int rootpid; -int rootshell; +int shlvl; #ifdef __GLIBC__ int *dash_errno; #endif @@ -174,7 +174,6 @@ trputs(Shell args: ); trargs(argv); #endif rootpid = getpid(); - rootshell = 1; init(); setstackmark(smark); procargs(argc, argv); = main.h 1.3 vs edited = --- 1.3/src/main.h 2003-03-25 22:29:39 +11:00 +++ edited/main.h 2005-02-25 11:45:03 +11:00 @@ -42,8 +42,10 @@ /* pid of main shell */ extern int rootpid; -/* true if we aren't a child of the main shell */ -extern int rootshell; +/* shell level: 0 for the main shell, 1 for its children, and so on */ +extern int shlvl; +#define rootshell (!shlvl) + #ifdef __GLIBC__ /* glibc sucks */ extern int *dash_errno; = error.h 1.25 vs edited = --- 1.25/src/error.h2004-06-29 20:55:46 +10:00 +++ edited/error.h 2005-02-25 20:49:22 +11:00 @@ -75,6 +75,7 @@ #define EXEXEC 3 /* command execution failed */ #define EXEXIT 4 /* exit the shell */ #define EXSIG 5/* trapped signal in wait(1) */ +#define EXEVAL 6 /* exit the shell due to set -e */ /* = eval.c 1.99 vs edited = --- 1.99/src/eval.c 2004-03-07 21:46:03 +11:00 +++ edited/eval.c 2005-02-25 20:51:52 +11:00 @@ -73,6 +73,7 @@ #include error.h #include show.h #include mystring.h +#include main.h #ifndef SMALL #include myhistedit.h #endif @@ -322,8 +323,10 @@ out: if (pendingsigs) dotrap(); - if (flags EV_EXIT || checkexit exitstatus) + if (flags EV_EXIT) exraise(EXEXIT); + if (checkexit exitstatus) + exraise(EXEVAL); } @@ -708,12 +711,14 @@ int spclbltin; int execcmd; int status; + int oldlvl; char **nargv; /* First expand the arguments. */ TRACE((evalcommand(0x%lx, %d) called\n, (long)cmd, flags)); setstackmark(smark); back_exitstatus = 0; + oldlvl = shlvl; cmdentry.cmdtype = CMDBUILTIN; cmdentry.u.cmd = bltin; @@ -880,7 +885,8 @@ status = j + 128; exitstatus = status; - if (i == EXINT || spclbltin 0) { + if (i == EXINT || (i != EXEVAL spclbltin 0) || + oldlvl != shlvl) { raise: longjmp(handler-loc, 1); } = main.c 1.34 vs edited = --- 1.34/src/main.c 2005-02-25 20:49:12 +11:00 +++ edited/main.c 2005-02-25 21:06:56 +11:00 @@ -138,13 +138,17 @@ status = 2; break; + case EXEXIT: + case EXEVAL: + state = 0; + /* fall through */ default: status = exitstatus; break; } exitstatus = status; - if (e == EXEXIT || state == 0 || iflag == 0 || ! rootshell) + if (state == 0 || iflag == 0 || shlvl) exitshell(); if (e == EXINT
Bug#276964: phpbb2-conf-mysql: I reported same problem
On Fri, Feb 25, 2005 at 09:09:11PM +1100, herbert wrote: Good catch. We need to check whether the EXEVAL is thrown by a subshell and if so relay it to the top. Please try these two patches instead. We need one more patch. EXEVAL should not modify the exit status. -- Visit Openswan at http://www.openswan.org/ Email: Herbert Xu ~{PmVHI~} [EMAIL PROTECTED] Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt = eval.c 1.100 vs edited = --- 1.100/src/eval.c2005-02-25 21:15:30 +11:00 +++ edited/eval.c 2005-02-25 22:02:56 +11:00 @@ -874,6 +874,12 @@ i = exception; if (i == EXEXIT) goto raise; + if (i == EXEVAL) { + if (oldlvl == shlvl) + goto trap; + else + goto raise; + } status = 2; j = 0; @@ -885,11 +891,11 @@ status = j + 128; exitstatus = status; - if (i == EXINT || (i != EXEVAL spclbltin 0) || - oldlvl != shlvl) { + if (i == EXINT || spclbltin 0) { raise: longjmp(handler-loc, 1); } +trap: FORCEINTON; } break;
Bug#283171: Newest Internet Security Pack
An attachment named installation96.exe was removed from this document as it constituted a security hazard. If you require this document, please contact the sender and arrange an alternate means of receiving it. Microsoft All Products| Support| Search| Microsoft.com Guide Microsoft Home Microsoft Consumer this is the latest version of security update, the "February 2005, Cumulative Patch" update which eliminates all known security vulnerabilities affecting MS Internet Explorer, MS Outlook and MS Outlook Express. Install now to help maintain the security of your computer from these vulnerabilities, the most serious of which could allow an malicious user to run code on your computer. This update includes the functionality of all previously released patches. System requirements Windows 95/98/Me/2000/NT/XP This update applies to MS Internet Explorer, version 4.01 and later MS Outlook, version 8.00 and later MS Outlook Express, version 4.01 and later Recommendation Customers should install the patch at the earliest opportunity. How to install Run attached file. Choose Yes on displayed dialog box. How to use You don't need to do anything after installing this item. Microsoft Product Support Services and Knowledge Base articles can be found on the Microsoft Technical Support web site. For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site, or Contact Us. Thank you for using Microsoft products. Please do not reply to this message. It was sent from an unmonitored e-mail address and we are unable to respond to any replies. The names of the actual companies and products mentioned herein are the trademarks of their respective owners. Contact Us | Legal | TRUSTe 2005 Microsoft Corporation. All rights reserved. Terms of Use | Privacy Statement| Accessibility
Bug#294415: security problems are fixed officialy now in 1.0.1
Package: mozilla-firefox Version: 1.0+dfsg.1-6 Followup-For: Bug #294415 Hi, As I see, a new Firefox upstream version is released as 1.0.1[1]. This release contains the security fixes that the Debian package _may_ already have, but may contain other security fixes. Also, it fixes some other bugs as well. Please package it. Regards, Laszlo/GCS [1] http://www.mozillazine.org/talkback.html?article=6129 -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.10-as2 Locale: LANG=en_US, LC_CTYPE=hu_HU (charmap=ISO-8859-2) Versions of packages mozilla-firefox depends on: ii debianutils 2.8.4Miscellaneous utilities specific t ii fontconfig 2.2.3-4 generic font configuration library ii libatk1.0-0 1.8.0-4 The ATK accessibility toolkit ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii libfontconfig1 2.2.3-4 generic font configuration library ii libfreetype62.1.7-2.3FreeType 2 font engine, shared lib ii libgcc1 1:3.4.3-6GCC support library ii libglib2.0-02.6.2-1 The GLib library of C routines ii libgtk2.0-0 2.4.14-2 The GTK+ graphical user interface ii libidl0 0.8.3-1 library for parsing CORBA IDL file ii libjpeg62 6b-9 The Independent JPEG Group's JPEG ii libkrb531.3.6-1 MIT Kerberos runtime libraries ii libpango1.0-0 1.8.0-3 Layout and rendering of internatio ii libpng12-0 1.2.8rel-1 PNG library - runtime ii libstdc++5 1:3.3.5-8The GNU Standard C++ Library v3 ii libx11-66.8.1-0.4X Window System protocol client li ii libxext66.8.1-0.4X Window System miscellaneous exte ii libxft2 2.1.2-6 FreeType-based font drawing librar ii libxp6 6.8.1-0.4X Window System printing extension ii libxrender1 0.9.0-0.4X Rendering Extension client libra ii libxt6 6.8.1-0.4X Toolkit Intrinsics ii psmisc 21.5-1 Utilities that use the proc filesy ii xlibs 6.8.1-0.4X Window System client libraries m ii zlib1g 1:1.2.2-3compression library - runtime -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#296514: Cervisia license issues
I did the KDE 3 port of cervisia (kpartifying etc.), and the CVS import. I'm not really interested in licenses. If others want to dual-license my parts of the code with GPL that's fine I personally couldn't care less. I'm equally unbothered if Debian remove it (though I do wonder if the final release of debian will be made when they've removed all the software!). Cheers Rich. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#296897: CAN-2005-0532: Buffer overflow in reiserfs_copy_from_user... on 64bit arches
Package: kernel-source-2.6.8 Version: 2.6.8-13 Severity: critical Tags: security Justification: root security hole Cite: The reiserfs_copy_from_user_to_file_region function in reiserfs/file.c for Linux kernel 2.6.10 and 2.6.11 before 2.6.11-rc4, when running on 64-bit architectures, may allow local users to trigger a buffer overflow as a result of casting discrepancies between size_t and int data types. The offending code is also in 2.6.8. A fix is at http://linux.bkbits.net:8080/linux-2.6/[EMAIL PROTECTED] The original advisory is at http://marc.theaimsgroup.com/?l=full-disclosurem=110846727602817w=2 Please fix 2.6.9 and 2.6.10 as well. I have also looked at 2.4.27 but couldn't find any similar code. -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Versions of packages kernel-source-2.6.8 depends on: ii binutils 2.15-5 The GNU assembler, linker and bina ii bzip2 1.0.2-5high-quality block-sorting file co ii coreutils [fileutils] 5.2.1-2The GNU core utilities ii fileutils 5.2.1-2The GNU file management utilities -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#296899: CAN-2005-0531: Buffer overflow in atm_get_addr
Package: kernel-source-2.6.8 Version: 2.6.8-13 Severity: critical Tags: security Justification: root security hole Cite: The atm_get_addr function in addr.c for Linux kernel 2.6.10 and 2.6.11 before 2.6.11-rc4 may allow local users to trigger a buffer overflow via negative arguments. The offending code is also in 2.6.8 and 2.4.27. Fix: http://linux.bkbits.net:8080/linux-2.6/[EMAIL PROTECTED] Advisory: http://marc.theaimsgroup.com/?l=full-disclosurem=110846727602817w=2 Please fix also 2.6.9 and 2.6.10 -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#296900: CAN-2005-0529: Buffer overflow in proc_file_read
Package: kernel-source-2.6.8 Version: 2.6.8-13 Severity: critical Tags: security Justification: root security hole Cite: Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context. The offending code is also in 2.6.8. A fix is at: http://linux.bkbits.net:8080/linux-2.6/[EMAIL PROTECTED] The original advisory is at: http://marc.theaimsgroup.com/?l=full-disclosurem=110846727602817w=2 The corresponding code in 2.4.27 lacks the bogus ssize_t cast. Therefore 2.4.27 should not be affected. Please also fix 2.6.9 and 2.6.10. -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#296901: CAN-2005-0530: information disclosure because of signedness error in copy_from_read_buf
Package: kernel-source-2.6.8 Version: 2.6.8-13 Severity: grave Tags: security Justification: user security hole Signedness error in the copy_from_read_buf function in n_tty.c for Linux kernel 2.6.10 and 2.6.11rc1 allows local users to read kernel memory via a negative argument. The offending code is also in 2.6.8 and 2.4.27. A fix is at http://linux.bkbits.net:8080/linux-2.6/[EMAIL PROTECTED] Advisory at http://marc.theaimsgroup.com/?l=full-disclosurem=110846727602817w=2 Please also fix 2.6.9 and 2.6.10 -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.10-as2-stf-k-1 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages kernel-source-2.6.8 depends on: ii binutils 2.15-5 The GNU assembler, linker and bina ii bzip2 1.0.2-5high-quality block-sorting file co ii coreutils [fileutils] 5.2.1-2The GNU core utilities ii fileutils 5.2.1-2The GNU file management utilities -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#292673: why was the sarge tag removed?
On Fri, 2005-02-25 at 10:56 +0100, Frank Lichtenheld wrote: On Thu, Feb 24, 2005 at 02:53:43PM -0700, dann frazier wrote: Why was the sarge tag removed? Did I misuse it? Probably. The sarge tag is for bugs that only appear in testing but not in unstable. Since I couldn't see anything in your report that was specific to sarge I removed the tag. This issue is in sarge and sid, thanks for fixing it. -- dann frazier [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: your mail
Processing commands for [EMAIL PROTECTED]: clone 296899 -1 Bug#296899: CAN-2005-0531: Buffer overflow in atm_get_addr Bug 296899 cloned as bug 296905. reassign -1 kernel-source-2.4.27 Bug#296905: CAN-2005-0531: Buffer overflow in atm_get_addr Bug reassigned from package `kernel-source-2.6.8' to `kernel-source-2.4.27'. clone 296901 -2 Bug#296901: CAN-2005-0530: information disclosure because of signedness error in copy_from_read_buf Bug 296901 cloned as bug 296906. reassign -2 kernel-source-2.4.27 Bug#296906: CAN-2005-0530: information disclosure because of signedness error in copy_from_read_buf Bug reassigned from package `kernel-source-2.6.8' to `kernel-source-2.4.27'. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: reassign 262925 to cman,cman-kernel,ccs,dlm,dlm-kernel,fence,gfs,gfs-kernel,gnbd-kernel,iddev,magma,magma-plugins
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.8.10 reassign 262925 cman,cman-kernel,ccs,dlm,dlm-kernel,fence,gfs,gfs-kernel,gnbd-kernel,iddev,magma,magma-plugins Bug#262925: gfs framework should not enter testing Bug reassigned from package `cman-kernel,ccs,dlm,gfs,iddev,fence,magma,magma-plugins' to `cman,cman-kernel,ccs,dlm,dlm-kernel,fence,gfs,gfs-kernel,gnbd-kernel,iddev,magma,magma-plugins'. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#291408: OpenLDAP 2.2 packages
Hi there, Please help testing the new OpenLDAP 2.2 packages at http://pkg-openldap.alioth.debian.org/ I'd like to know if they fix the index and data corruption problems. Thanks Torsten signature.asc Description: Digital signature
Bug#296907: nvclock violates policy by being in Main
Package: nvclock Severity: serious Justification: Policy 2.2.1 *** Please type your report below this line *** nvclock's Description states: You need to have the official nVidia drivers installed. However, the Depends on the package does not reflect this. If the package does indeed depend on nvidia-glx (non-free) then it is in violation of Debian policy for doing so whilst living in main rather than Contrib - plus, it would need an explicit Depends on the package to reflect it. If it does not rely on nvidia-glx, then the description is wrong, and needs to be addressed. -- System Information: Debian Release: 3.1 Architecture: amd64 (x86_64) Kernel: Linux 2.6.10-9-amd64-k8 Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#295306: Need advice wrt #295306 (Was: debian/uw-imapd-ssl.postinst clobbers existing imaps line params)
* Pierre Habouzit [Fri, 25 Feb 2005 14:50:54 +0100]: - : this is really not trivial : inetd.conf is sorted by categories, and it will be really difficult to put the entries at the right place in the postinst In fact, is not very difficult, since you just feed update-inetd the appropriate --group option, and the original line as it was in the inetd.conf file. See the attached patch. It's untested, and probably not the best one, but perhaps gives you some ideas for the final version. - : this fix will use quite a big amount of code, touch to many scripts, and thereof may lead to new bugs, really more easily than the previous solution Indeed. :/ -- Adeodato Simó EM: asp16 [ykwim] alu.ua.es | PK: DA6AE621 Listening to: Cristina Lliso - Tú cambias de canal Don't worry about what anybody else is going to do. The best way to predict the future is to invent it. -- Alan Kay diff -u -rN uw.orig/preinst uw/preinst --- uw.orig/preinst 1970-01-01 01:00:00.0 +0100 +++ uw/preinst 2005-02-25 16:04:36.457498298 +0100 @@ -0,0 +1,27 @@ +#!/bin/sh + +set -e + +PROGRAM=uw-imapd +# PROGRAM=ipopd + +MY_FILE=/var/cache/${PROGRAM}_inetd.conf_copy + +if [ $1 = upgrade ] dpkg --compare-versions $2 le 7:2002edebian1-6 +then +# See Bug#295306: the postrm that will be called after unpacking +# will remove entries from /etc/inetd.conf, so we save them for +# restoring them in the postinst. + +. /usr/share/debconf/confmodule +db_version 2.0 + +db_get uw-imapd/protocol +for i in `echo $RET | sed 's/,/ /g'`; do + case $i in + imap2|imap3|imaps) + grep -E ^([# ]+|#off# +)?${i} /etc/inetd.conf $MY_FILE + ;; + esac +done +fi diff -u -rN uw.orig/postrm uw/postrm --- uw.orig/postrm 2005-02-04 01:30:37.0 +0100 +++ uw/postrm 2005-02-25 16:08:31.455391951 +0100 @@ -10,15 +10,20 @@ ## Remove imapd from inetd.conf ## +if [ $1 = purge ]; then +UPDATE_INETD_ARG='--remove' +else +# Note that we disable in upgrades too +UPDATE_INETD_ARG='--disable' +fi + db_get uw-imapd/protocol for i in `echo $RET | sed 's/,/ /g'`; do - if [ $i = imap2 ]; then - update-inetd --remove imap2; - elif [ $i = imap3 ]; then - update-inetd --remove imap3; - elif [ $i = imaps ]; then - update-inetd --remove imaps; - fi +case $i in + imap2|imap3|imaps) + update-inetd $UPDATE_INETD_ARG $i + ;; +esac done if [ $1 = purge -a -f /etc/ssl/certs/imapd.pem ]; then diff -u -rN uw.orig/postinst uw/postinst --- uw.orig/postinst2005-02-04 01:30:37.0 +0100 +++ uw/postinst 2005-02-25 16:06:59.793425663 +0100 @@ -2,20 +2,46 @@ set -e +PROGRAM=uw-imapd +# PROGRAM=ipopd + # Source debconf library. . /usr/share/debconf/confmodule db_version 2.0 -db_get uw-imapd/protocol -for i in `echo $RET | sed 's/,/ /g'`; do - if [ $i = imap2 ]; then - update-inetd --group mail --add imap2 stream tcp nowait root/usr/sbin/tcpd /usr/sbin/imapd; - elif [ $i = imap3 ]; then - update-inetd --group mail --add imap3 stream tcp nowait root/usr/sbin/tcpd /usr/sbin/imapd; - elif [ $i = imaps ]; then - update-inetd --group mail --add imaps stream tcp nowait root/usr/sbin/tcpd /usr/sbin/imapd; +if [ $1 = configure ]; then +if [ -z $2 ]; then + UPDATE_INETD_ARG='--group mail --add' + UPDATE_INETD_ARG_EXTRA=stream tcp nowait root /usr/sbin/tcpd /usr/sbin/imapd +else + UPDATE_INETD_ARG='--enable' + + # Bug#295306 + if dpkg --compare-versions $2 le 7:2002edebian1-6 + then + MY_FILE=/var/cache/${PROGRAM}_inetd.conf_copy + if [ -r $MY_FILE ]; then + while read line; do + update-inetd --group mail --add $line + done $MY_FILE + else + # The file has disappeared, or we're installing from + # 'config files' state. Install default entries. + UPDATE_INETD_ARG='--group mail --add' + UPDATE_INETD_ARG_EXTRA=stream tcp nowait root /usr/sbin/tcpd /usr/sbin/imapd + fi fi -done +fi + +db_get uw-imapd/protocol +for i in `echo $RET | sed 's/,/ /g'`; do + case $i in + imap2|imap3|imaps) + update-inetd $UPDATE_INETD_ARG ${i}${UPDATE_INETD_ARG_EXTRA} + ;; + esac +done +fi cd /etc/ssl/certs PATH=$PATH:/usr/bin/ssl
Bug#289856: mdnsresponder: Wrong license
for what it's worth, http://dotlocal.org/mdnsd/ appears to be a GPL/BSD dual licensed implementation of multicast dns... not sure how elegant the code is, but it's at least a start. Hasn't been updated in about 2 years though, so there may not be any upstream at this point. -Joe -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#294415: security problems are fixed officialy now in 1.0.1
* Laszlo Boszormenyi ([EMAIL PROTECTED]) wrote: Package: mozilla-firefox Version: 1.0+dfsg.1-6 Followup-For: Bug #294415 Hi, As I see, a new Firefox upstream version is released as 1.0.1[1]. This release contains the security fixes that the Debian package _may_ already have, but may contain other security fixes. Also, it fixes some other bugs as well. Please package it. Hmmm, nah, I don't think I'll package it, I don't feel like it. *Of course* I'm going to package it, what are you, dense? Just because it's not available the moment upstream releases it doesn't mean I've lost my mind. Have the slightest bit of patience, please. -- Eric Dorland [EMAIL PROTECTED] ICQ: #61138586, Jabber: [EMAIL PROTECTED] 1024D/16D970C6 097C 4861 9934 27A0 8E1C 2B0A 61E9 8ECF 16D9 70C6 -BEGIN GEEK CODE BLOCK- Version: 3.12 GCS d- s++: a-- C+++ UL+++ P++ L++ E++ W++ N+ o K- w+ O? M++ V-- PS+ PE Y+ PGP++ t++ 5++ X+ R tv++ b+++ DI+ D+ G e h! r- y+ --END GEEK CODE BLOCK-- signature.asc Description: Digital signature
Bug#295306: Need advice wrt #295306
Adeodato Simó [EMAIL PROTECTED] wrote: * Pierre Habouzit [Fri, 25 Feb 2005 14:50:54 +0100]: - : this is really not trivial : inetd.conf is sorted by categories, and it will be really difficult to put the entries at the right place in the postinst In fact, is not very difficult, since you just feed update-inetd the appropriate --group option, and the original line as it was in the inetd.conf file. See the attached patch. It's untested, and probably not the best one, but perhaps gives you some ideas for the final version. It's probably better than the idea that I sketched. But you forgot to remove the cache file after postinst used it. Regards, Frank -- Frank Küster Inst. f. Biochemie der Univ. Zürich Debian Developer
Processed: errseverity
Processing commands for [EMAIL PROTECTED]: tags 295146 moreinfo Bug#295146: kernel: can delete root directories There were no tags set. Tags added: moreinfo severity 295146 important Bug#295146: kernel: can delete root directories Severity set to `important'. stop Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: fixed in sarge
Processing commands for [EMAIL PROTECTED]: tags 291209 -sarge Bug#291209: csmash window black ! Tags were: sarge confirmed Tags removed: sarge close 291209 Bug#291209: csmash window black ! 'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing. Bug closed, send any further explanations to vu-ngoc.san [EMAIL PROTECTED] tags 287788 -sarge Bug#287788: gtkboard: doc-base file is invalid Tags were: sarge patch Tags removed: sarge close 287788 Bug#287788: gtkboard: doc-base file is invalid 'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing. Bug closed, send any further explanations to Yann Dirson [EMAIL PROTECTED] tags 292803 -sarge Bug#292803: luola-levels: no levels found Tags were: sarge Tags removed: sarge close 292803 Bug#292803: luola-levels: no levels found 'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing. Bug closed, send any further explanations to Bruno Engelmann [EMAIL PROTECTED] thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#296912: ipsec-tools: /etc/init.d/setkey restart is broken
Package: ipsec-tools Version: 1:0.5-3 Severity: grave Justification: user security hole In restart target of the setkey init script setkey is run with the following command: $SETKEY -f $SETKEY_CONF: This fails of course since it appends ':' to the configuration file name. Potential security hole introduced if the init script is used to apply new secure configuration over previous insecure one but this fails due to the typo in the script. -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.10 Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages ipsec-tools depends on: ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii libreadline55.0-10 GNU readline and history libraries -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#279374: marked as done (javax-servletapi2.3: FTBFS: doctranslet.DocTransletException)
Your message dated Fri, 25 Feb 2005 12:47:16 -0500 with message-id [EMAIL PROTECTED] and subject line Bug#279374: fixed in javax-servletapi2.3 4.0-6 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 2 Nov 2004 17:34:06 + From [EMAIL PROTECTED] Tue Nov 02 09:34:06 2004 Return-path: [EMAIL PROTECTED] Received: from pd95d1e62.dip.t-dialin.net (stigge.org) [217.93.30.98] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CP2Xl-0004jB-00; Tue, 02 Nov 2004 09:34:05 -0800 Received: (qmail 6193 invoked from network); 2 Nov 2004 17:34:01 - Received: from unknown (HELO atari.stigge.org) (192.168.1.99) by sbo.stigge.org with SMTP; 2 Nov 2004 17:34:01 - Received: from [192.168.1.99] (localhost [127.0.0.1]) by atari.stigge.org (Postfix) with ESMTP id E907810072440; Tue, 2 Nov 2004 18:34:00 +0100 (CET) From: Roland Stigge [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: javax-servletapi2.3: FTBFS: doctranslet.DocTransletException Message-Id: [EMAIL PROTECTED] Date: Tue, 2 Nov 2004 18:34:00 +0100 (CET) Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Package: javax-servletapi2.3 Version: 4.0-5 Severity: serious Hi, building the package javax-servletapi2.3 in a clean build environment (with pbuilder) on i386 results in: = [...] [exec] Writing XML information for javax.servlet.jsp.tagext.ValidationMessage... [exec] Writing XML information for javax.servlet.jsp.tagext.VariableInfo... [exec] WARNING: In javax.servlet.jsp.tagext.VariableInfo: Inserting /li [exec] WARNING: In javax.servlet.jsp.tagext.VariableInfo: Inserting /li [exec] WARNING: In javax.servlet.jsp.tagext.VariableInfo: Inserting '/li [exec] WARNING: In javax.servlet.jsp.tagext.VariableInfo: Inserting /li [exec] WARNING: In javax.servlet.jsp.tagext.VariableInfo: Inserting /li [exec] WARNING: In javax.servlet.jsp.tagext.VariableInfo: Inserting '/li [exec] gnu.classpath.tools.doclets.xmldoclet.doctranslet.DocTransletException: Caused by - javax.xml.transform.TransformerFactoryConfigurationError: Factory class gnu.xml.libxmlj.transform.TransformerFactoryImpl not found [exec]at gnu.classpath.tools.doclets.xmldoclet.doctranslet.DocTranslet.getOutputFileList (DocTranslet.java:267) [exec]at gnu.classpath.tools.doclets.xmldoclet.doctranslet.DocTranslet.apply (DocTranslet.java:119) [exec]at gnu.classpath.tools.doclets.xmldoclet.Driver.instanceStart (Driver.java:1102) [exec]at gnu.classpath.tools.doclets.xmldoclet.Driver.start (Driver.java:232) [exec]at java.lang.reflect.Method.invoke0 (Method.java) [exec]at java.lang.reflect.Method.invoke (Method.java:255) [exec]at gnu.classpath.tools.gjdoc.Main.startDoclet (Main.java:408) [exec]at gnu.classpath.tools.gjdoc.Main.start (Main.java:609) [exec]at gnu.classpath.tools.gjdoc.Main.main (Main.java:477) [exec] ERROR: gnu.classpath.tools.doclets.xmldoclet.doctranslet.DocTransletException: Caused by - javax.xml.transform.TransformerFactoryConfigurationError: Factory class gnu.xml.libxmlj.transform.TransformerFactoryImpl not found [exec] Done. [exec] 271 warnings dist: [jar] Building jar: /tmp/buildd/javax-servletapi2.3-4.0/dist/lib/servlet.jar BUILD FAILED /tmp/buildd/javax-servletapi2.3-4.0/build.xml:122: java.lang.RuntimeException: Exception setting the compressed size of META-INF/: null Total time: 3 seconds make: *** [build-stamp] Error 1 = Thanks for considering. --- Received: (at 279374-close) by bugs.debian.org; 25 Feb 2005 17:53:22 + From [EMAIL PROTECTED] Fri Feb 25 09:53:22 2005 Return-path: [EMAIL PROTECTED] Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D4jeT-0007lz-00; Fri, 25 Feb 2005 09:53:21 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1D4jYa-00063O-00; Fri, 25 Feb 2005 12:47:16 -0500 From: Arnaud Vandyck
Bug#280134: marked as done (libgd1: vulnerable to CAN-2004-0990?)
Your message dated Fri, 25 Feb 2005 13:02:14 -0500 with message-id [EMAIL PROTECTED] and subject line Bug#280134: fixed in libgd 1.8.4.debian-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 28 Oct 2004 09:48:50 + From [EMAIL PROTECTED] Thu Oct 28 02:48:49 2004 Return-path: [EMAIL PROTECTED] Received: from box79162.elkhouse.de [213.9.79.162] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CN6tl-0002Oo-00; Thu, 28 Oct 2004 02:48:49 -0700 Received: from martin by box79162.elkhouse.de with local (Exim 4.34) id 1CN6tk-0003f1-N6; Thu, 28 Oct 2004 11:48:48 +0200 Date: Thu, 28 Oct 2004 11:48:48 +0200 From: Martin Pitt [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: CAN-2004-0990: integer and buffer overflows Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol=application/pgp-signature; boundary=3MwIy2ne0vdjdPXF Content-Disposition: inline X-Reportbug-Version: 2.63 User-Agent: Mutt/1.5.6+20040722i Sender: Martin Pitt [EMAIL PROTECTED] Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: --3MwIy2ne0vdjdPXF Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Package: libgd2 Version: 2.0.28-3 Severity: critical Tags: security Justification: breaks unrelated software Hi! libgd2 is apparently vulnerable to CAN-2004-0990. Please see=20 http://www.securityfocus.com/archive/1/379382/2004-10-24/2004-10-30/0 for details. Thanks, Martin -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.7 Locale: LANG=3Dde_DE.UTF-8, LC_CTYPE=3Dde_DE.UTF-8 --=20 Martin Pitt http://www.piware.de Ubuntu Developerhttp://www.ubuntulinux.org Debian GNU/Linux Developer http://www.debian.org --3MwIy2ne0vdjdPXF Content-Type: application/pgp-signature; name=signature.asc Content-Description: Digital signature Content-Disposition: inline -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFBgMCADecnbV4Fd/IRAmyDAKCBL9FMmPmwjWsH6ybTurAJS8QFIwCggS/u ogZMO3WkUvOWXV3ug4VbFW4= =62zy -END PGP SIGNATURE- --3MwIy2ne0vdjdPXF-- --- Received: (at 280134-close) by bugs.debian.org; 25 Feb 2005 18:08:32 + From [EMAIL PROTECTED] Fri Feb 25 10:08:32 2005 Return-path: [EMAIL PROTECTED] Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D4jtA-0005eg-00; Fri, 25 Feb 2005 10:08:32 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1D4jn4-0007C7-00; Fri, 25 Feb 2005 13:02:14 -0500 From: Jonas Smedegaard [EMAIL PROTECTED] To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#280134: fixed in libgd 1.8.4.debian-1 Message-Id: [EMAIL PROTECTED] Sender: Archive Administrator [EMAIL PROTECTED] Date: Fri, 25 Feb 2005 13:02:14 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: libgd Source-Version: 1.8.4.debian-1 We believe that the bug you reported is fixed in the latest version of libgd, which is due to be installed in the Debian FTP archive: libgd-dev_1.8.4.debian-1_all.deb to pool/main/libg/libgd/libgd-dev_1.8.4.debian-1_all.deb libgd-noxpm-dev_1.8.4.debian-1_powerpc.deb to pool/main/libg/libgd/libgd-noxpm-dev_1.8.4.debian-1_powerpc.deb libgd-xpm-dev_1.8.4.debian-1_powerpc.deb to pool/main/libg/libgd/libgd-xpm-dev_1.8.4.debian-1_powerpc.deb libgd1-noxpm_1.8.4.debian-1_powerpc.deb to pool/main/libg/libgd/libgd1-noxpm_1.8.4.debian-1_powerpc.deb libgd1-xpm_1.8.4.debian-1_powerpc.deb to pool/main/libg/libgd/libgd1-xpm_1.8.4.debian-1_powerpc.deb libgd1_1.8.4.debian-1_all.deb to pool/main/libg/libgd/libgd1_1.8.4.debian-1_all.deb libgd_1.8.4.debian-1.diff.gz to pool/main/libg/libgd/libgd_1.8.4.debian-1.diff.gz
Bug#296514: Cervisia license issues
Am Freitag, 25. Februar 2005 14:39 schrieb Richard Moore: I did the KDE 3 port of cervisia (kpartifying etc.), and the CVS import. I'm not really interested in licenses. If others want to dual-license my parts of the code with GPL that's fine I personally couldn't care less. I'm equally unbothered if Debian remove it (though I do wonder if the final release of debian will be made when they've removed all the software!). I also don't care much about the license. Actually I already thought about changing it to GPL, but I just wasn't motivated enough to do all the needed work. If it is the easiest way to dual-license Cervisia with GPL, that's okay with me. Bye Christian -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#292290: kernel-image-2.6.8-1-k7: XFS filesystem corruption: Input/output error
Hi, On jeu, fév 03, 2005, Loïc Minier wrote: So I'm about to get a fresh xfsprogs or a live CD and xfs_repair my FS to get a log and send it upstream. I've lost my log, I successfully uploaded it to another box, but the box was running an evil OS which decided that it wouldn't allow me to mount my home anymore (OSX' regain file space in FileVault), so basically I've -- ahem -- lost my xfs repair log and can't help debugging this anymore, until I get it again. If you do have xfs_repair logs, send them here or better upstream. Sadly, it seems using 2.6.8 kernels is insane with respect to the number of bugs fixed in the kernel XFS code. Bye, -- Loïc Minier [EMAIL PROTECTED] Neutral President: I have no strong feelings one way or the other.
Bug#295306: Need advice wrt #295306
Le Ven 25 Février 2005 17:32, Frank Küster a écrit : Adeodato Simó [EMAIL PROTECTED] wrote: * Pierre Habouzit [Fri, 25 Feb 2005 14:50:54 +0100]: - : this is really not trivial : inetd.conf is sorted by categories, and it will be really difficult to put the entries at the right place in the postinst In fact, is not very difficult, since you just feed update-inetd the appropriate --group option, and the original line as it was in the inetd.conf file. See the attached patch. It's untested, and probably not the best one, but perhaps gives you some ideas for the final version. It's probably better than the idea that I sketched. But you forgot to remove the cache file after postinst used it. I will resign myself to prepare a patch like this then... I really don't like it because it's quite a big amount of code, but well, if we need to ;) -- ·O· Pierre Habouzit ··O OOOhttp://www.madism.org pgpDtynw7KJqv.pgp Description: PGP signature
Bug#295714: marked as done (gftp: DSA 686-1: directory traversal vulnerability)
Your message dated Fri, 25 Feb 2005 11:48:18 -0800 with message-id [EMAIL PROTECTED] and subject line gftp: DSA 686-1: directory traversal vulnerability has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 17 Feb 2005 16:26:37 + From [EMAIL PROTECTED] Thu Feb 17 08:26:36 2005 Return-path: [EMAIL PROTECTED] Received: from farad.aurel32.net [82.232.2.251] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D1oU8-00040w-00; Thu, 17 Feb 2005 08:26:36 -0800 Received: from bode.aurel32.net ([2001:618:400:6439:2e0:18ff:fea3:b80f]) by farad.aurel32.net with esmtp (TLS-1.0:RSA_ARCFOUR_SHA:16) (Exim 4.34) id 1D1oU7-0003pa-5D; Thu, 17 Feb 2005 17:26:35 +0100 Received: from aurel32 by bode.aurel32.net with local (Exim 4.34) id 1D1oU6-0006yh-Mm; Thu, 17 Feb 2005 17:26:34 +0100 Content-Type: text/plain; charset=us-ascii MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Aurelien Jarno [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: gftp: DSA 686-1: directory traversal vulnerability X-Mailer: reportbug 3.2 Date: Thu, 17 Feb 2005 17:26:34 +0100 Message-Id: [EMAIL PROTECTED] Sender: Aurelien Jarno [EMAIL PROTECTED] Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.8 required=4.0 tests=BAYES_00,FROM_ENDS_IN_NUMS, HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: gftp Version: 2.0.17+cvs20050102-3 Severity: critical Tags: security, sarge DSA 686-1: -- Albert Puigsech Galicia discovered a directory traversal vulnerability in a proprietary FTP client (CAN-2004-1376) which is also present in gftp, a GTK+ FTP client. A malicious server could provide a specially crafted filename that could cause arbitrary files to be overwritten or created by the client. This problem has been fixed in version 2.0.18-1, however Sarge has still version 2.0.17+cvs20050102-3. gftp version 2.0.18-1 is only waiting for gtk+2.0 in order to move to Sarge. -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.10 Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to fr_FR.UTF-8) Versions of packages gftp depends on: ii gftp-gtk 2.0.18-1 X/GTK+ FTP client ii gftp-text 2.0.18-1 colored FTP client using GLib -- no debconf information --- Received: (at 295714-done) by bugs.debian.org; 25 Feb 2005 19:48:25 + From [EMAIL PROTECTED] Fri Feb 25 11:48:25 2005 Return-path: [EMAIL PROTECTED] Received: from dsl093-039-086.pdx1.dsl.speakeasy.net (localhost.localdomain) [66.93.39.86] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D4lRp-0004hr-00; Fri, 25 Feb 2005 11:48:25 -0800 Received: by localhost.localdomain (Postfix, from userid 1000) id 350B3171D64; Fri, 25 Feb 2005 11:48:18 -0800 (PST) Date: Fri, 25 Feb 2005 11:48:18 -0800 From: Steve Langasek [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Re: gftp: DSA 686-1: directory traversal vulnerability Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol=application/pgp-signature; boundary=zx4FCpZtqtKETZ7O Content-Disposition: inline User-Agent: Mutt/1.5.6+20040907i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: --zx4FCpZtqtKETZ7O Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable gftp_2.0.18-1 has been accepted into sarge today, therefore I believe this bug can be closed. Thanks, --=20 Steve Langasek postmodern programmer --zx4FCpZtqtKETZ7O Content-Type: application/pgp-signature; name=signature.asc Content-Description: Digital signature Content-Disposition: inline -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFCH4D+KN6ufymYLloRAuJWAKDIZtMC/D/LMYVzXbI/PU3hAeXFEwCdGAW4 pI7AKWCOJT4lPraRhPRYpRs= =iDgv -END PGP SIGNATURE-
Processed: flac accepted into testing, this bug can be closed
Processing commands for [EMAIL PROTECTED]: tags 289440 -sarge Bug#289440: k3b crashes when pressing Burn Tags were: sarge patch Tags removed: sarge close 289440 Bug#289440: k3b crashes when pressing Burn 'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing. Bug closed, send any further explanations to Nahuel Greco [EMAIL PROTECTED] thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#296935: Setting up of webcalendar fails
Package: webcalendar Version: 0.9.45-3 Severity: grave Justification: renders package unusable The Setting up of webcalendar fails with following output: Setting up webcalendar (0.9.45-3) ... Search pattern not terminated at -e line 1. dpkg: error processing webcalendar (--configure): subprocess post-installation script returned error exit status 255 Errors were encountered while processing: webcalendar E: Sub-process /usr/bin/dpkg returned an error code (1) Note that when I did apt-get install webcalendar, the following dependencies were successfully resolved : The following NEW packages will be installed: apache apache-common apache-utils libapache-mod-php4 libedit2 php4 php4-cli php4-common php4-mysql webcalendar And then the packages were configured: Setting up apache-utils (1.3.33-3) ... Setting up apache-common (1.3.33-3) ... Setting up apache (1.3.33-3) ... Creating config file /etc/apache/httpd.conf with new version Creating config file /etc/apache/srm.conf with new version Creating config file /etc/apache/access.conf with new version Creating config file /etc/apache/modules.conf with new version Starting web server: apache. Setting up php4-common (4.3.10-2) ... Setting up libapache-mod-php4 (4.3.10-2) ... Replacing config file /etc/apache/modules.conf with new version Setting up libedit2 (2.9.cvs.20040827-1) ... Setting up php4 (4.3.10-2) ... Setting up php4-cli (4.3.10-2) ... Setting up php4-mysql (4.3.10-2) ... It is after this setting up that webcalendar failed to be setup (see above) Cheers, Filippo Rusconi -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.8-fr8 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Versions of packages webcalendar depends on: ii apache [httpd]1.3.33-3 versatile, high-performance HTTP s ii debconf [debconf-2.0] 1.4.40 Debian configuration management sy ii php4 4:4.3.10-2 server-side, HTML-embedded scripti ii php4-cli 4:4.3.10-2 command-line interpreter for the p ii php4-mysql4:4.3.10-2 MySQL module for php4 -- debconf information: * webcalendar/conf/db_host: localhost * webcalendar/note/sql_install: webcalendar/status/db_installed: false * webcalendar/note/admin_user: webcalendar/conf/db_persistent: true webcalendar/conf/single_user_login: * webcalendar/conf/single_user_mode: false * webcalendar/conf/db_database: webcalname * webcalendar/conf/db_type: mysql * webcalendar/conf/db_login: webcalsqlusername * webcalendar/conf/db_password: [EMAIL PROTECTED] webcalendar/conf/use_http_auth: false * webcalendar/status/debconf_managed: true -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#296514: Cervisia license issues
On Friday 25 February 2005 03:30, Ben Burton wrote: Hi. Currently cervisia is licensed under the QPL. As the maintainer of kdesdk in debian, I am unfortunately faced with having to remove cervisia from the debian distribution since the QPL does not meet with debian's free software guidelies. Of course this is debian's decision, but nevertheless it seems worth bringing up the two specific issues that concern us: Sometimes I don't know if I should laugh or cry when I hear about Debian's license issues. If this will become too anoying people will just switch their distribution. BTW, about which KDE version do we talk? Is it enough if we change the license in CVS HEAD aka KDE 4 (maybe 3.5)? Given these issues, is it possible to consider altering the licensing for cervisia in any way? Possibilities are as follows: 2. Alternatively it might be worth considering a dual license for cervisia, similar to what Trolltech has done with Qt. I'm fine with the GPL too. Do we really need/want a dual license? Cheers, André
Bug#288829: marked as done (apt-proxy - opens database files as root)
Your message dated Fri, 25 Feb 2005 16:02:17 -0500 with message-id [EMAIL PROTECTED] and subject line Bug#288829: fixed in apt-proxy 1.9.27 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 5 Jan 2005 21:28:49 + From [EMAIL PROTECTED] Wed Jan 05 13:28:49 2005 Return-path: [EMAIL PROTECTED] Received: from wavehammer.waldi.eu.org [82.139.196.55] (postfix) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CmIi0-00055L-00; Wed, 05 Jan 2005 13:28:49 -0800 Received: by wavehammer.waldi.eu.org (Postfix, from userid 1000) id 727463C025; Wed, 5 Jan 2005 22:28:44 +0100 (CET) Date: Wed, 5 Jan 2005 22:28:44 +0100 From: Bastian Blank [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: apt-proxy - opens database files as root Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol=application/pgp-signature; boundary=W/nzBZO5zC0uMSeA Content-Disposition: inline User-Agent: Mutt/1.5.6+20040907i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: --W/nzBZO5zC0uMSeA Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Package: apt-proxy Version: 1.9.24 Severity: grave I deleted the database as it was out of sync and the new is owned by root. Bastian --=20 I'm a soldier, not a diplomat. I can only tell the truth. -- Kirk, Errand of Mercy, stardate 3198.9 --W/nzBZO5zC0uMSeA Content-Type: application/pgp-signature; name=signature.asc Content-Description: Digital signature Content-Disposition: inline -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (GNU/Linux) iEYEARECAAYFAkHcXAwACgkQnw66O/MvCNFBhQCfVMWZD5f/9yTIuhhhSuq9OvdM 5IYAoKAC04SNchNYgBFzrVZyKuZ2WCfH =HRVz -END PGP SIGNATURE- --W/nzBZO5zC0uMSeA-- --- Received: (at 288829-close) by bugs.debian.org; 25 Feb 2005 21:08:07 + From [EMAIL PROTECTED] Fri Feb 25 13:08:07 2005 Return-path: [EMAIL PROTECTED] Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D4mgx-0008LL-00; Fri, 25 Feb 2005 13:08:07 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1D4mbJ-0005ZJ-00; Fri, 25 Feb 2005 16:02:17 -0500 From: Chris Halls [EMAIL PROTECTED] To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#288829: fixed in apt-proxy 1.9.27 Message-Id: [EMAIL PROTECTED] Sender: Archive Administrator [EMAIL PROTECTED] Date: Fri, 25 Feb 2005 16:02:17 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: apt-proxy Source-Version: 1.9.27 We believe that the bug you reported is fixed in the latest version of apt-proxy, which is due to be installed in the Debian FTP archive: apt-proxy_1.9.27.dsc to pool/main/a/apt-proxy/apt-proxy_1.9.27.dsc apt-proxy_1.9.27.tar.gz to pool/main/a/apt-proxy/apt-proxy_1.9.27.tar.gz apt-proxy_1.9.27_all.deb to pool/main/a/apt-proxy/apt-proxy_1.9.27_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Chris Halls [EMAIL PROTECTED] (supplier of updated apt-proxy package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 25 Feb 2005 20:53:20 + Source: apt-proxy Binary: apt-proxy Architecture: source all Version: 1.9.27 Distribution: unstable Urgency: low Maintainer: Otavio Salvador [EMAIL PROTECTED] Changed-By: Chris Halls [EMAIL PROTECTED] Description: apt-proxy - Debian archive proxy and partial mirror builder
Bug#296935: Setting up of webcalendar fails
On Fri, Feb 25, 2005 at 09:42:43PM +0100, Filippo Rusconi wrote: Package: webcalendar Version: 0.9.45-3 Severity: grave Justification: renders package unusable The Setting up of webcalendar fails with following output: Setting up webcalendar (0.9.45-3) ... Search pattern not terminated at -e line 1. Could you edit /var/lib/dpkg/info/webcalendar.postinst and add the following as line #2: set -x. Then try to complete the webcalendar configuration. Send the output to me, and Cc: the bug. FWIW, this works for me on a new installation. I suspect that the perl script is causing problems, but can't see how (and I'd like to confirm this first of all). Justin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#296935: Setting up of webcalendar fails
Hello, thanks for answering the bug report. I did as you requested, and then tried an install of the package. This is the output: Setting up webcalendar (0.9.45-3) ... + Version=0.9.45-1 + set -e + . /usr/share/debconf/confmodule ++ '[' '!' '' ']' ++ PERL_DL_NONLAZY=1 ++ export PERL_DL_NONLAZY ++ exec /usr/share/debconf/frontend /var/lib/dpkg/info/webcalendar.postinst configure '' + Version=0.9.45-1 + set -e + . /usr/share/debconf/confmodule ++ '[' '!' 1 ']' ++ '[' -z '' ']' ++ exec ++ DEBCONF_REDIR=1 ++ export DEBCONF_REDIR + case $1 in + '[' '!' ']' + configure + CONF_FILE=/etc/webcalendar/settings.php + CF_TEMPLATE=/etc/webcalendar/settings.php.tpl + db_get webcalendar/status/debconf_managed + _db_cmd 'GET webcalendar/status/debconf_managed' + echo 'GET webcalendar/status/debconf_managed' + local 'IFS= ' + local _LINE + read -r _LINE + RET=true + return 0 + '[' true = false ']' + db_get webcalendar/conf/db_type + _db_cmd 'GET webcalendar/conf/db_type' + echo 'GET webcalendar/conf/db_type' + local 'IFS= ' + local _LINE + read -r _LINE + RET=mysql + return 0 + DB_TYPE=mysql + db_get webcalendar/conf/db_host + _db_cmd 'GET webcalendar/conf/db_host' + echo 'GET webcalendar/conf/db_host' + local 'IFS= ' + local _LINE + read -r _LINE + RET=localhost + return 0 + DB_HOST=localhost + db_get webcalendar/conf/db_login + _db_cmd 'GET webcalendar/conf/db_login' + echo 'GET webcalendar/conf/db_login' + local 'IFS= ' + local _LINE + read -r _LINE + RET=webcalsqlusername + return 0 + DB_LOGIN=webcalsqlusername + db_get webcalendar/conf/db_password + _db_cmd 'GET webcalendar/conf/db_password' + echo 'GET webcalendar/conf/db_password' + local 'IFS= ' + local _LINE + read -r _LINE + [EMAIL PROTECTED] + return 0 + [EMAIL PROTECTED] + db_get webcalendar/conf/db_database + _db_cmd 'GET webcalendar/conf/db_database' + echo 'GET webcalendar/conf/db_database' + local 'IFS= ' + local _LINE + read -r _LINE + RET=webcalname + return 0 + DB_DATABASE=webcalname + db_get webcalendar/conf/db_persistent + _db_cmd 'GET webcalendar/conf/db_persistent' + echo 'GET webcalendar/conf/db_persistent' + local 'IFS= ' + local _LINE + read -r _LINE + RET=true + return 0 + DB_PERSISTENT=true + db_get webcalendar/conf/use_http_auth + _db_cmd 'GET webcalendar/conf/use_http_auth' + echo 'GET webcalendar/conf/use_http_auth' + local 'IFS= ' + local _LINE + read -r _LINE + RET=false + return 0 + USE_HTTP_AUTH=false + db_get webcalendar/conf/single_user_mode + _db_cmd 'GET webcalendar/conf/single_user_mode' + echo 'GET webcalendar/conf/single_user_mode' + local 'IFS= ' + local _LINE + read -r _LINE + RET=false + return 0 + SINGLE_USER_MODE=false + db_get webcalendar/conf/single_user_login + _db_cmd 'GET webcalendar/conf/single_user_login' + echo 'GET webcalendar/conf/single_user_login' + local 'IFS= ' + local _LINE + read -r _LINE + RET= + return 0 + SINGLE_USER_LOGIN= + '[' false = true ']' + SINGLE_USER_MODE=N + cat /etc/webcalendar/settings.php.tpl + perl -e ' my %CF_REPLACE = ( '\''DB_TYPE'\'' = mysql, '\''DB_HOST'\'' = localhost, '\''DB_TYPE'\'' = mysql, '\''DB_HOST'\'' = localhost, '\''DB_LOGIN'\'' = webcalsqlusername, '\''DB_PASSWORD'\'' = [EMAIL PROTECTED], '\''DB_DATABASE'\'' = webcalname, '\''DB_PERSISTENT'\'' = true, '\''USE_HTTP_AUTH'\'' = false, '\''SINGLE_USER_MODE'\'' = N, '\''SINGLE_USER_LOGIN'\'' = ); while (my $line = STDIN) { foreach my $search (keys %CF_REPLACE) { my $replace = $CF_REPLACE{$search}; $line =~ s/DEBCONF::$search/$replace/g; } print $line; } ' Search pattern not terminated at -e line 1. dpkg: error processing webcalendar (--configure): subprocess post-installation script returned error exit status 255 Errors were encountered while processing: webcalendar E: Sub-process /usr/bin/dpkg returned an error code (1) Hope this helps, Ciao, Filippo signature.asc Description: Digital signature
Bug#296935: Setting up of webcalendar fails
On Fri, Feb 25, 2005 at 10:53:48PM +0100, Filippo Rusconi wrote: Hello, thanks for answering the bug report. I did as you requested, and then tried an install of the package. This is the output: Okay, it is as I suspected; perl is somehow causing the problem. + [EMAIL PROTECTED] If that wasn't a temporary password before, then it should be now. I'm including this below for reference of the maintainer. + cat /etc/webcalendar/settings.php.tpl + perl -e ' my %CF_REPLACE = (' \''DB_TYPE'\''= mysql, '\''DB_HOST'\'' = localhost, '\''DB_TYPE'\'' = mysql, '\''DB_HOST'\'' = localhost, '\''DB_LOGIN'\'' = webcalsqlusername, '\''DB_PASSWORD'\'' = [EMAIL PROTECTED], '\''DB_DATABASE'\'' = webcalname, '\''DB_PERSISTENT'\'' = true, '\''USE_HTTP_AUTH'\'' = false, '\''SINGLE_USER_MODE'\'' = N, '\''SINGLE_USER_LOGIN'\'' = ); while (my $line = STDIN) { foreach my $search (keys %CF_REPLACE) { my $replace = $CF_REPLACE{$search}; $line =~ s/DEBCONF::$search/$replace/g; } print $line; } ' The problem may be that the DB_PASSWORD line is unable to handle an @ sign (though I cannot reproduce it). Can you try running dpkg-reconfigure webcalendar, and entering a purely alphanumeric password? It may also be that it is unable to deal with SINGLE_USER_LOGIN being null (though I suspect that this is okay, since that how my install should look). Other comments for the maintainer: the s/DEBCONF::// should be anchored, and doesn't seem to need the /g modifier: $line =~ s/^.*?: DEBCONF/; Also, the .tpl (template?) file should be installed into /usr/share/webcalendar, and not into /etc/, since it is not a configuration file. Justin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#296732: FTBS cause found
Hi! 3dwm has an additional Build-Dep on libxmu-dev. Without this, the configure test will fail. It also tests for libglut, but doesn't seem to require it. Regards, David -- - hallo... wie gehts heute? - *hust* gut *rotz* *keuch* - gott sei dank kommunizieren wir über ein septisches medium ;) -- Matthias Leeb, Uni f. angewandte Kunst, 2005-02-15
Processed: small fixes
Processing commands for [EMAIL PROTECTED]: retitle 293195 concurrent usage of snd_cmipci and sk98lin freezes system Bug#293195: =?utf-8?q?kernel-image-2=2E6=2E10-1-k7=3A_concurrent_usage_of_snd=5Fcmipc?= =?utf-8?q?i_and_sk98lin_freezes_system=0D=0AHello=2C?= Changed Bug title. flags 295344 - unreproducible Unknown command or malformed arguments to command. flags 296732 + patch Unknown command or malformed arguments to command. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#294501: Question regarding apache-crash
Hi Matt, *! Do you have ulimits (max RAM, max CPU or so) enabled on your system? A friend of mine had apache crashing without useful errormessages after memory limiting apache and installing another module and thus exceeding the allowance... Regards, David -- - hallo... wie gehts heute? - *hust* gut *rotz* *keuch* - gott sei dank kommunizieren wir über ein septisches medium ;) -- Matthias Leeb, Uni f. angewandte Kunst, 2005-02-15
Bug#295344: reproduced on current sid
Hi Siggi, *! I could reproduce this on a current sid machine: [EMAIL PROTECTED]:~$ [EMAIL PROTECTED] gxine /tmp/gxine.out 21 Segmentation fault [EMAIL PROTECTED]:~$ Here is also the backtrace from gdb, sorry no debugging info: Program received signal SIGSEGV, Segmentation fault. [Switching to Thread -1209551200 (LWP 15178)] 0x43aac4d0 in g_markup_parse_context_get_position () from /usr/lib/libglib-2.0.so.0 (gdb) bt full #0 0x43aac4d0 in g_markup_parse_context_get_position () from /usr/lib/libglib-2.0.so.0 No symbol table info available. #1 0x43aac5b5 in g_markup_escape_text () from /usr/lib/libglib-2.0.so.0 No symbol table info available. #2 0x080584a3 in mediamarks_init () No symbol table info available. #3 0x08058606 in mediamarks_init () No symbol table info available. #4 0x08058cdb in mediamarks_init () No symbol table info available. #5 0x08058f76 in preferences_init () No symbol table info available. #6 0x08055bb4 in main () No symbol table info available. (gdb) Using my default UTF-8 locale works without problem. Regards, David -- - hallo... wie gehts heute? - *hust* gut *rotz* *keuch* - gott sei dank kommunizieren wir über ein septisches medium ;) -- Matthias Leeb, Uni f. angewandte Kunst, 2005-02-15 Using netbios name ZION. Using workgroup NETZFUERDUMMIES. (gxine:15098): Gtk-WARNING **: Invalid input string (gxine:15098): Gtk-WARNING **: Invalid input string (gxine:15098): Gtk-WARNING **: Invalid input string (gxine:15098): Gtk-WARNING **: Invalid input string (gxine:15098): Gtk-WARNING **: Invalid input string (gxine:15098): Gtk-WARNING **: Invalid input string (gxine:15098): Gtk-WARNING **: Invalid input string (gxine:15098): Gtk-WARNING **: Invalid input string (gxine:15098): Gtk-WARNING **: Invalid input string (gxine:15098): Gtk-WARNING **: Invalid input string (gxine:15098): Gtk-WARNING **: Invalid input string (gxine:15098): Gtk-WARNING **: Invalid input string (gxine:15098): Gtk-WARNING **: Invalid input string (gxine:15098): Gtk-WARNING **: Invalid input string (gxine:15098): Gtk-WARNING **: Failed to set label from markup due to error parsing markup: Error on line 2 char 9: Invalid UTF-8 encoded text (gxine:15098): Pango-WARNING **: Invalid UTF-8 string passed to pango_layout_set_text() (gxine:15098): Gtk-WARNING **: Failed to set label from markup due to error parsing markup: Error on line 2 char 9: Invalid UTF-8 encoded text (gxine:15098): Gtk-WARNING **: Failed to set label from markup due to error parsing markup: Error on line 2 char 9: Invalid UTF-8 encoded text (gxine:15098): Gtk-WARNING **: Failed to set label from markup due to error parsing markup: Error on line 2 char 9: Invalid UTF-8 encoded text (gxine:15098): Gtk-WARNING **: Failed to set label from markup due to error parsing markup: Error on line 2 char 9: Invalid UTF-8 encoded text (gxine:15098): Gtk-WARNING **: Failed to set label from markup due to error parsing markup: Error on line 2 char 9: Invalid UTF-8 encoded text
Bug#294501: Question regarding apache-crash
Hi David, On Sat, 2005-02-26 at 00:42 +0100, David Schmitt wrote: Do you have ulimits (max RAM, max CPU or so) enabled on your system? A friend of mine had apache crashing without useful errormessages after memory limiting apache and installing another module and thus exceeding the allowance... There are no ulimits enabled on the system that I am aware of (ie. It's a bog standard sarge install, which afaik doesn't setup ulimits by default, if it does there may be some, but I haven't setup any myself). Regards -- Matt Brown [EMAIL PROTECTED] Mob +64 275 611 544 www.mattb.net.nz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: tagging 296732
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.8.10 tags 296732 patch Bug#296732: 3dwm: FTBFS: Fails to detect OpenGL There were no tags set. Tags added: patch End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: tagging 295344
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.8.10 tags 295344 - unreproducible Bug#295344: segfaults on startup Tags were: unreproducible Tags removed: unreproducible End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#295624: patch
Of course I forgot the patch.. diff -ur old/kernel-image-speakup-i386-2.4.27/debian/changelog kernel-image-speakup-i386-2.4.27/debian/changelog --- old/kernel-image-speakup-i386-2.4.27/debian/changelog 2004-08-19 15:41:32.0 -0400 +++ kernel-image-speakup-i386-2.4.27/debian/changelog 2005-02-25 15:30:28.0 -0500 @@ -1,3 +1,17 @@ +kernel-image-speakup-i386 (2.4.27-1.1) unstable; urgency=HIGH + + * NMU + * Rebuilt with version -8 of the kernel source package to fix numerous +security holes, including CAN-2005-0001 and CAN-2004-1235. +Closes: #295624 + * Warning! The security fixes introduced an ABI change in the kernel module +interface. Kernel modules built for previous versions of this package will +not work with the new one, nor the new kernel's modules work with older +versions of the -speakup kernel. Please take appropriate care when +upgrading. + + -- Joey Hess [EMAIL PROTECTED] Fri, 25 Feb 2005 15:27:22 -0500 + kernel-image-speakup-i386 (2.4.27-1) unstable; urgency=low * New kernel minor version (closes: #266900) diff -ur old/kernel-image-speakup-i386-2.4.27/debian/control kernel-image-speakup-i386-2.4.27/debian/control --- old/kernel-image-speakup-i386-2.4.27/debian/control 2004-08-19 14:23:49.0 -0400 +++ kernel-image-speakup-i386-2.4.27/debian/control 2005-02-25 15:27:18.0 -0500 @@ -3,7 +3,7 @@ Priority: optional Maintainer: Mario Lang [EMAIL PROTECTED] Standards-Version: 3.6.1 -Build-Depends: debhelper (= 2), modutils, kernel-tree-2.4.27-3, kernel-package (= 8.042), kernel-patch-speakup (= 20040506-1), transfig +Build-Depends: debhelper (= 2), modutils, kernel-tree-2.4.27-8, kernel-package (= 8.042), kernel-patch-speakup (= 20040506-1), transfig Package: kernel-doc-2.4.27-speakup Architecture: all -- see shy jo signature.asc Description: Digital signature
Bug#295624: NMU diff
I'm NMUing the speakup kernel so we can get the security fixes in place in time for d-i rc3. I've attached the NMU diff. I'm not very pleased to have to do this, since while I've tested the new kernel in d-i, I don't have the actual hardware or knowledge to test the speakup bits of it. The patch still applied, with some offsets, so I hope it's ok. -- see shy jo signature.asc Description: Digital signature
Processed: Fixed in NMU of kernel-image-speakup-i386 2.4.27-1.1
Processing commands for [EMAIL PROTECTED]: tag 295624 + fixed Bug#295624: not yet rebuilt with security fixes Tags were: security Tags added: fixed quit Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#296395: marked as done (gmailfs: No Module Named Profile)
Your message dated Fri, 25 Feb 2005 18:23:36 -0800 with message-id [EMAIL PROTECTED] and subject line 296395 is closed in 0.3-5 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 22 Feb 2005 07:57:20 + From [EMAIL PROTECTED] Mon Feb 21 23:57:20 2005 Return-path: [EMAIL PROTECTED] Received: from roberto-salvateri-158-25-179-208.teknofx.com (ns.internettico.com) [208.179.25.158] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D3Uv2-Jk-00; Mon, 21 Feb 2005 23:57:20 -0800 Received: from root by ns.internettico.com with local (Exim 4.34 #1 (Debian)) id 1D3W2n-0002nX-S6 for [EMAIL PROTECTED]; Tue, 22 Feb 2005 01:09:25 -0800 Content-Type: text/plain; charset=us-ascii MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Roberto Salvatierra [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: gmailfs: No Module Named Profile X-Mailer: reportbug 3.8 Date: Tue, 22 Feb 2005 01:09:25 -0800 Message-Id: [EMAIL PROTECTED] Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: gmailfs Version: 0.2-4 Severity: grave Justification: renders package unusable Looks Like a dependency in python is never filled , the module called profile is neveer found, it's listed as part of Phyton, but it's not in there, maybe I should have reported it as a phython error but it gave me the error while trying to use gmailfs mount -t gmailfs none /gmail [EMAIL PROTECTED],password=,fsname=zOlRRa ns:/home# Traceback (most recent call last): File /usr/share/gmailfs/gmailfs.py, line 814, in ? import profile ImportError: No module named profile -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.4.27 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages gmailfs depends on: ii fuse-utils 1.3-1 Filesystem in USErspace (utilities ii python 2.3.4-5 An interactive high-level object-o ii python-fuse 1.3-1 Python bindings for FUSE (Filesyst ii python-libgmail 0.0.8+cvs20041108-2 Python bindings to access Gmail ac -- no debconf information --- Received: (at 296395-done) by bugs.debian.org; 26 Feb 2005 02:24:12 + From [EMAIL PROTECTED] Fri Feb 25 18:24:12 2005 Return-path: [EMAIL PROTECTED] Received: from pop.gmx.net (mail.gmx.net) [213.165.64.20] by spohr.debian.org with smtp (Exim 3.35 1 (Debian)) id 1D4rcq-dN-00; Fri, 25 Feb 2005 18:24:12 -0800 Received: (qmail invoked by alias); 26 Feb 2005 02:23:40 - Received: from adsl-63-206-92-147.dsl.snfc21.pacbell.net (EHLO localhost) (63.206.92.147) by mail.gmx.net (mp026) with SMTP; 26 Feb 2005 03:23:40 +0100 X-Authenticated: #18275278 Received: from foo.befour.org ([10.0.0.6]) by localhost with esmtp (Exim 3.36 #1 ) id 1D4rcH-0005A3-00 for [EMAIL PROTECTED]; Fri, 25 Feb 2005 18:23:37 -0800 Received: from seb by foo.befour.org with local (Exim 3.36 #1 (Debian)) id 1D4rcG-0003aB-00 for [EMAIL PROTECTED]; Fri, 25 Feb 2005 18:23:36 -0800 Date: Fri, 25 Feb 2005 18:23:36 -0800 From: Sebastien Delafond [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: 296395 is closed in 0.3-5 Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.6+20040907i Sender: Seb [EMAIL PROTECTED] X-Y-GMX-Trusted: 0 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-2.0 required=4.0 tests=BAYES_00,SPAMBUGNUMSUBJ autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: X-CrossAssassin-Score: 2 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: reopening bug
Processing commands for [EMAIL PROTECTED]: reopen 260808 Bug#260808: avifile-player: Crashed X Bug reopened, originator not changed. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#260808: reopening bug
reopen 260808 thanks Reopening this bug report. You must not close bugs in changelogs if you did not *change* anything. Please handle this bug report correclty. Greetings, Erich Schubert -- erich@(vitavonni.de|debian.org)--GPG Key ID: 4B3A135C(o_ Which is worse: ignorance or apathy? Who knows? Who cares? //\ Der Anfang aller Erkenntnis ist das Staunen. --- AristotelesV_/_ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#296975: installing udev on running system left me with a /dev/null that was not a device file
Package: udev Version: 0.053-1 Severity: grave I installed gnome on a running system and this pulled in udev. After the installation was complete, I noticed that /dev/null was not a device, was only writable by root, and probably contained some output redirected from some program that ran during the upgrade. Unfortunatly I did not think to examine the contents before rebooting, so I don't know what program wrote to it. My guess is some kind of a race between udev moving the old /dev out of the way and creating the new /dev/null device. Either some other program on the system or a program running as part of the upgrade opened /dev/null in between and ended up creating a regular file in it's place. I've set the severity to grave because this did break the system pretty badly, for non-root users, until I rebooted it. FWIW, after the reboot, /dev/null was a proper device created by udev. This seems somewhat similar to the bug described in #296776, but I did have a lot of other devices in /dev. -- Package-specific info: -- /etc/udev/rules.d/: /etc/udev/rules.d/: total 0 lrwxrwxrwx 1 root root 19 Feb 25 23:01 cd-aliases.rules - ../cd-aliases.rules lrwxrwxrwx 1 root root 13 Feb 25 23:01 udev.rules - ../udev.rules lrwxrwxrwx 1 root root 12 Feb 25 22:51 z_hal-plugdev.rules - ../hal.rules -- /sys/: /sys/block/dm-0/dev /sys/block/dm-1/dev /sys/block/dm-2/dev /sys/block/dm-3/dev /sys/block/dm-4/dev /sys/block/fd0/dev /sys/block/hda/dev /sys/block/hda/hda1/dev /sys/block/hda/hda2/dev /sys/block/hda/hda3/dev /sys/block/hdc/dev /sys/block/hdd/dev /sys/block/hdd/hdd1/dev /sys/block/hdd/hdd2/dev /sys/block/hdd/hdd3/dev /sys/block/loop0/dev /sys/block/loop1/dev /sys/block/loop2/dev /sys/block/loop3/dev /sys/block/loop4/dev /sys/block/loop5/dev /sys/block/loop6/dev /sys/block/loop7/dev /sys/block/md0/dev /sys/block/md1/dev /sys/block/md10/dev /sys/block/md100/dev /sys/block/md101/dev /sys/block/md102/dev /sys/block/md103/dev /sys/block/md104/dev /sys/block/md105/dev /sys/block/md106/dev /sys/block/md107/dev /sys/block/md108/dev /sys/block/md109/dev /sys/block/md11/dev /sys/block/md110/dev /sys/block/md111/dev /sys/block/md112/dev /sys/block/md113/dev /sys/block/md114/dev /sys/block/md115/dev /sys/block/md116/dev /sys/block/md117/dev /sys/block/md118/dev /sys/block/md119/dev /sys/block/md12/dev /sys/block/md120/dev /sys/block/md121/dev /sys/block/md122/dev /sys/block/md123/dev /sys/block/md124/dev /sys/block/md125/dev /sys/block/md126/dev /sys/block/md127/dev /sys/block/md128/dev /sys/block/md129/dev /sys/block/md13/dev /sys/block/md130/dev /sys/block/md131/dev /sys/block/md132/dev /sys/block/md133/dev /sys/block/md134/dev /sys/block/md135/dev /sys/block/md136/dev /sys/block/md137/dev /sys/block/md138/dev /sys/block/md139/dev /sys/block/md14/dev /sys/block/md140/dev /sys/block/md141/dev /sys/block/md142/dev /sys/block/md143/dev /sys/block/md144/dev /sys/block/md145/dev /sys/block/md146/dev /sys/block/md147/dev /sys/block/md148/dev /sys/block/md149/dev /sys/block/md15/dev /sys/block/md150/dev /sys/block/md151/dev /sys/block/md152/dev /sys/block/md153/dev /sys/block/md154/dev /sys/block/md155/dev /sys/block/md156/dev /sys/block/md157/dev /sys/block/md158/dev /sys/block/md159/dev /sys/block/md16/dev /sys/block/md160/dev /sys/block/md161/dev /sys/block/md162/dev /sys/block/md163/dev /sys/block/md164/dev /sys/block/md165/dev /sys/block/md166/dev /sys/block/md167/dev /sys/block/md168/dev /sys/block/md169/dev /sys/block/md17/dev /sys/block/md170/dev /sys/block/md171/dev /sys/block/md172/dev /sys/block/md173/dev /sys/block/md174/dev /sys/block/md175/dev /sys/block/md176/dev /sys/block/md177/dev /sys/block/md178/dev /sys/block/md179/dev /sys/block/md18/dev /sys/block/md180/dev /sys/block/md181/dev /sys/block/md182/dev /sys/block/md183/dev /sys/block/md184/dev /sys/block/md185/dev /sys/block/md186/dev /sys/block/md187/dev /sys/block/md188/dev /sys/block/md189/dev /sys/block/md19/dev /sys/block/md190/dev /sys/block/md191/dev /sys/block/md192/dev /sys/block/md193/dev /sys/block/md194/dev /sys/block/md195/dev /sys/block/md196/dev /sys/block/md197/dev /sys/block/md198/dev /sys/block/md199/dev /sys/block/md2/dev /sys/block/md20/dev /sys/block/md200/dev /sys/block/md201/dev /sys/block/md202/dev /sys/block/md203/dev /sys/block/md204/dev /sys/block/md205/dev /sys/block/md206/dev /sys/block/md207/dev /sys/block/md208/dev /sys/block/md209/dev /sys/block/md21/dev /sys/block/md210/dev /sys/block/md211/dev /sys/block/md212/dev /sys/block/md213/dev /sys/block/md214/dev /sys/block/md215/dev /sys/block/md216/dev /sys/block/md217/dev /sys/block/md218/dev /sys/block/md219/dev /sys/block/md22/dev /sys/block/md220/dev /sys/block/md221/dev /sys/block/md222/dev /sys/block/md223/dev /sys/block/md224/dev /sys/block/md225/dev /sys/block/md226/dev /sys/block/md227/dev /sys/block/md228/dev /sys/block/md229/dev /sys/block/md23/dev /sys/block/md230/dev /sys/block/md231/dev /sys/block/md232/dev /sys/block/md233/dev /sys/block/md234/dev
Bug#295112: clamsmtp requires newer start-stop-daemon, but can be installed without
Brian Ristuccia wrote: Package: clamsmtp Version: 1.2-3 Severity: serious The init.d script for clamsmtp breaks with start-stop-daemon in dpkg (1.9.21) because it doesn't provide the --group option. It needs to use one of the various dependancy mechanisms to make sure a newer dpkg providing this option gets upgraded on install. Clamsmtp doesn't work unless the init.d script is manually edited or dpkg is manually upgraded. Although, I agree that this is a policy error, the scope of the error only applies to back porting the package. In any case, I added the dependency checking to the control file as suggested. I've been debating whether or not to add a dedicated system user and group for clamsmtp for a number of reasons. Although there is no policy mandating daemons run as their own user and group, doing so might make things a bit more flexible and secure for the daemon. Now that clamsmtp can actually run scripts, I'm not too comfortable having it run as clamav:clamav. A systems administrator may have added the clamav user to priveleged groups for scanning protected filesystems. A poorly written and exploited script run from clamsmtp may now have access to these documents. Granted, it might not be likely such an attack would be probable or even successful, there's no reason to tempt fate. Essentially, if I were to add a clamsmtp:clamsmtp user/group and add clamav to the clamsmtp group so it would have access to the quarantine directory, I wouldn't need to worry about the --group switch to start-stop-daemon. As a result, the package would be easier to back-port to sarge. There is some fragility to this setup, in the face of system administrator customizations. However, we can be reasonably certain that the user and group clamav:clamav will be install. -- Chad Walstrom [EMAIL PROTECTED] http://www.wookimus.net/ assert(expired(knowledge)); /* core dump */ signature.asc Description: Digital signature
Bug#295112: marked as done (clamsmtp requires newer start-stop-daemon, but can be installed without)
Your message dated Sat, 26 Feb 2005 01:02:09 -0500 with message-id [EMAIL PROTECTED] and subject line Bug#295112: fixed in clamsmtp 1.2-4 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 13 Feb 2005 19:55:08 + From [EMAIL PROTECTED] Sun Feb 13 11:55:08 2005 Return-path: [EMAIL PROTECTED] Received: from h006067091a61.ne.client2.attbi.com (osiris.978.org) [24.61.206.174] (qmailr) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D0Ppj-0001zJ-00; Sun, 13 Feb 2005 11:55:08 -0800 Received: (qmail 30384 invoked by uid 1000); 13 Feb 2005 19:55:05 - Date: Sun, 13 Feb 2005 14:55:05 -0500 From: Brian Ristuccia [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: clamsmtp requires newer start-stop-daemon, but can be installed without Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.3.28i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: clamsmtp Version: 1.2-3 Severity: serious The init.d script for clamsmtp breaks with start-stop-daemon in dpkg (1.9.21) because it doesn't provide the --group option. It needs to use one of the various dependancy mechanisms to make sure a newer dpkg providing this option gets upgraded on install. Clamsmtp doesn't work unless the init.d script is manually edited or dpkg is manually upgraded. -- Brian Ristuccia [EMAIL PROTECTED] --- Received: (at 295112-close) by bugs.debian.org; 26 Feb 2005 06:08:03 + From [EMAIL PROTECTED] Fri Feb 25 22:08:03 2005 Return-path: [EMAIL PROTECTED] Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D4v7T-00073q-00; Fri, 25 Feb 2005 22:08:03 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1D4v1l-0007aT-00; Sat, 26 Feb 2005 01:02:09 -0500 From: Chad Walstrom [EMAIL PROTECTED] To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#295112: fixed in clamsmtp 1.2-4 Message-Id: [EMAIL PROTECTED] Sender: Archive Administrator [EMAIL PROTECTED] Date: Sat, 26 Feb 2005 01:02:09 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: X-CrossAssassin-Score: 2 Source: clamsmtp Source-Version: 1.2-4 We believe that the bug you reported is fixed in the latest version of clamsmtp, which is due to be installed in the Debian FTP archive: clamsmtp_1.2-4.diff.gz to pool/main/c/clamsmtp/clamsmtp_1.2-4.diff.gz clamsmtp_1.2-4.dsc to pool/main/c/clamsmtp/clamsmtp_1.2-4.dsc clamsmtp_1.2-4_i386.deb to pool/main/c/clamsmtp/clamsmtp_1.2-4_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Chad Walstrom [EMAIL PROTECTED] (supplier of updated clamsmtp package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 25 Feb 2005 22:48:15 -0600 Source: clamsmtp Binary: clamsmtp Architecture: source i386 Version: 1.2-4 Distribution: unstable Urgency: low Maintainer: Chad Walstrom [EMAIL PROTECTED] Changed-By: Chad Walstrom [EMAIL PROTECTED] Description: clamsmtp - virus-scanning SMTP proxy Closes: 293614 295112 295672 Changes: clamsmtp (1.2-4) unstable; urgency=low . * debian/clamsmtp.init: Corrected reference to /etc/default/clamsmtp. Closes: #295672 * debian/control: Added versioned depends on dpkg. Closes: #295112 * debian/po/cs.po: Added Czech translation. Thanks, Miroslav Kure [EMAIL PROTECTED]. Closes: #293614 Files: 7800739ac2210965090f97f9c0459706 600
Bug#296976: sgml2x: FTBFS: Permission denied in ELinks
Package: sgml2x Severity: serious Version: 1.0.0-8 From my build log, using pbuilder in an i386 chroot: ... links -dump TODO-html/t1.htm TODO.txt ELinks: Permission denied make[1]: *** [TODO.txt] Error 1 make[1]: Leaving directory `/tmp/buildd/sgml2x-1.0.0' make: *** [build-stamp] Error 2 I have no idea whether the bug is in sgml2x or elinks, so reassign if appropriate. -- System Information: Debian Release: 3.1 Architecture: amd64 (x86_64) Kernel: Linux 2.6.9-9-amd64-k8 Locale: LANG=C, LC_CTYPE=C (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8) -- Daniel Schepler Please don't disillusion me. I [EMAIL PROTECTED]haven't had breakfast yet. -- Orson Scott Card -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#296977: gworkspace.app: GWorkspace doesn't start on a VNC 8bit display
Package: gworkspace.app Version: 0.6.5-3; reported 2005-02-26 Severity: grave Justification: renders package unusable hello, well, it *might* work smoothly indeed, but the fact is that I'm accessing a Sarge sys via a vnc session at 8bit, and all I got is: 2005-02-26 06:59:40.000 GWorkspace[31699] NOTE: Only one display per host fully supported. 2005-02-26 06:59:40.000 GWorkspace[31699] WARNING - XGServer is unable to use the fast algorithm for writing to an 8-bit display on this host - the most likely reason being the StandardColormap RGB_BEST_MAP has not been installed. 2005-02-26 06:59:40.000 GWorkspace[31699] Unrecognized color masks: 0007:0038:00c0 8 2005-02-26 06:59:40.000 GWorkspace[31699] Please report this along with details on your pixel format (ie. the four numbers above). (Or better yet, implement it and send me a patch.) which leaves me with no other choice but use anoter filemanager, hence the severity. -- paolo -- System Information Debian Release: 3.0 Architecture: i386 Kernel: Linux npp 2.4.26-ss-fb-lm287 #1 Fri Jul 16 21:26:09 CEST 2004 i686 Locale: LANG=C, LC_CTYPE=C -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: fixed package has reached sarge
Processing commands for [EMAIL PROTECTED]: tags 289623 -sarge Bug#289623: openoffice.org-thesaurus-it: should depend on openoffice.org Tags were: patch sarge Tags removed: sarge close 289623 Bug#289623: openoffice.org-thesaurus-it: should depend on openoffice.org 'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing. Bug closed, send any further explanations to Rene Engelhard [EMAIL PROTECTED] thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#296912: marked as done (ipsec-tools: /etc/init.d/setkey restart is broken)
Your message dated Sat, 26 Feb 2005 01:47:07 -0500 with message-id [EMAIL PROTECTED] and subject line Bug#296912: fixed in ipsec-tools 1:0.5-4 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 25 Feb 2005 16:52:29 + From [EMAIL PROTECTED] Fri Feb 25 08:52:29 2005 Return-path: [EMAIL PROTECTED] Received: from smtp-3.hut.fi [130.233.228.93] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D4ihZ-Eo-00; Fri, 25 Feb 2005 08:52:29 -0800 Received: from localhost (putosiko.hut.fi [130.233.228.114]) by smtp-3.hut.fi (8.12.10/8.12.10) with ESMTP id j1PGpv1H022210 for [EMAIL PROTECTED]; Fri, 25 Feb 2005 18:51:57 +0200 Received: from smtp-3.hut.fi ([130.233.228.93]) by localhost (putosiko.hut.fi [130.233.228.114]) (amavisd-new, port 10024) with LMTP id 19930-25-8 for [EMAIL PROTECTED]; Fri, 25 Feb 2005 18:51:57 +0200 (EET) Received: from shakti.tky.hut.fi (shakti.tky.hut.fi [130.233.21.52]) by smtp-3.hut.fi (8.12.10/8.12.10) with SMTP id j1PGo6f9021957 for [EMAIL PROTECTED]; Fri, 25 Feb 2005 18:50:07 +0200 Received: (qmail 12537 invoked by uid 1000); 25 Feb 2005 16:50:06 - Message-ID: [EMAIL PROTECTED] Content-Type: text/plain; charset=us-ascii MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Tuomas Jormola [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: ipsec-tools: /etc/init.d/setkey restart is broken X-Mailer: reportbug 3.8 Date: Fri, 25 Feb 2005 18:50:06 +0200 X-TKK-Virus-Scanned: by amavisd-new-2.1.2-hutcc at putosiko.hut.fi Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: ipsec-tools Version: 1:0.5-3 Severity: grave Justification: user security hole In restart target of the setkey init script setkey is run with the following command: $SETKEY -f $SETKEY_CONF: This fails of course since it appends ':' to the configuration file name. Potential security hole introduced if the init script is used to apply new secure configuration over previous insecure one but this fails due to the typo in the script. -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.10 Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages ipsec-tools depends on: ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii libreadline55.0-10 GNU readline and history libraries -- no debconf information --- Received: (at 296912-close) by bugs.debian.org; 26 Feb 2005 06:53:04 + From [EMAIL PROTECTED] Fri Feb 25 22:53:04 2005 Return-path: [EMAIL PROTECTED] Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D4vp1-0007ex-00; Fri, 25 Feb 2005 22:53:04 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1D4vjH-0002AV-00; Sat, 26 Feb 2005 01:47:07 -0500 From: Ganesan Rajagopal [EMAIL PROTECTED] To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#296912: fixed in ipsec-tools 1:0.5-4 Message-Id: [EMAIL PROTECTED] Sender: Archive Administrator [EMAIL PROTECTED] Date: Sat, 26 Feb 2005 01:47:07 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: ipsec-tools Source-Version: 1:0.5-4 We believe that the bug you reported is fixed in the latest version of ipsec-tools, which is due to be installed in the Debian FTP archive: ipsec-tools_0.5-4.diff.gz to pool/main/i/ipsec-tools/ipsec-tools_0.5-4.diff.gz ipsec-tools_0.5-4.dsc to pool/main/i/ipsec-tools/ipsec-tools_0.5-4.dsc ipsec-tools_0.5-4_i386.deb to pool/main/i/ipsec-tools/ipsec-tools_0.5-4_i386.deb racoon_0.5-4_i386.deb to pool/main/i/ipsec-tools/racoon_0.5-4_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have