Processed: Re: Bug#296824: sbcl: Stale fasls

2005-02-25 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 296824 normal
Bug#296824: sbcl: Stale fasls
Severity set to `normal'.

 retitle 296824 Please upload new version of sbcl to fix bug
Bug#296824: sbcl: Stale fasls
Changed Bug title.

 tags 296824 + pending
Bug#296824: Please upload new version of sbcl to fix bug
Tags were: moreinfo
Tags added: pending

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#296824: sbcl: Stale fasls

2005-02-25 Thread Kevin Rosenberg
severity 296824 normal
retitle 296824 Please upload new version of sbcl to fix bug
tags 296824 + pending
thanks

Alan Shields wrote:
 The issue was that the fasls weren't recognized as incompatible. I put
 in the recompile-stale-fasls code and it thought everything was fine. I
 was given to believe this was because 0.8.19.29 was a prerelease
 version and thus the version number wasn't incremented for each change
 before release. I'm way out of my depth here, only trying to help as best I
 can.
 
 The fasls were from an asdf-install'd package, so I wouldn't expect
 those to be current, but I would expect them to be recognized as stale.
 Or is this the ass-end of an assumption?

Thanks for the additional information. Incompatible fasls from a
previous version of a lisp compile (stale fasls) are a problem with
all lisp compilers: allegro, lispworks, cmucl, clisp, and sbcl. As
time as gone on, lisp compilers have become better at recognizing
stale fasls and reporting them. But as this sbcl incident has shown,
sometimes incompatibilities are added but the fasl-version-number is
not incremented. So, while you assumption is rather reasonable these
days, it's not a very safe assumption.

Because your bug report was marked as grave (package is not usable),
I thought you were stating that the sbcl package itself did not work
rather than there were errors loading fasls created by previous
versions of sbcl.

I'm currently building a new version of sbcl to upload, so I've tag
the bug as pending.

-- 
Kevin Rosenberg
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#293471: marked as done (xemacs21: XEmacs 21.4.16 withdrawn by upstream, 21.4.17 will be released Feb 6)

2005-02-25 Thread Debian Bug Tracking System
Your message dated Fri, 25 Feb 2005 16:54:40 +0900 (JST)
with message-id [EMAIL PROTECTED]
and subject line Processed: still present in sarge
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 3 Feb 2005 17:34:35 +
From [EMAIL PROTECTED] Thu Feb 03 09:34:35 2005
Return-path: [EMAIL PROTECTED]
Received: from idmailgate2.unizh.ch [130.60.68.106] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CwksE-0005kU-00; Thu, 03 Feb 2005 09:34:35 -0800
Received: from alhambra.kuesterei.ch ([130.60.169.112])
by idmailgate2.unizh.ch (8.12.10/8.12.10/Debian-2) with ESMTP id 
j13HY2fC022121
for [EMAIL PROTECTED]; Thu, 3 Feb 2005 18:34:02 +0100
Received: from frank by alhambra.kuesterei.ch with local (Exim 3.35 #1 (Debian))
id 1Cwkri-0006eu-00
for [EMAIL PROTECTED]; Thu, 03 Feb 2005 18:34:02 +0100
To: Debian Bug Tracking System [EMAIL PROTECTED]
Subject: xemacs21: XEmacs 21.4.16 withdrawn by upstream, 21.4.16 will be 
released Feb 6
X-Debbugs-CC: Frank Küster [EMAIL PROTECTED]
MIME-version: 1.0
Content-type: text/plain; charset=iso-8859-15
Message-Id: [EMAIL PROTECTED]
From: =?iso-8859-1?Q?Frank_K=FCster?= [EMAIL PROTECTED]
Date: Thu, 03 Feb 2005 18:34:02 +0100
X-Virus-Scanned: by amavisd-new
Content-Transfer-Encoding: 8bit
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: xemacs21
Version: 21.4.16-1
Severity: serious

Quoting Vin Shelton:

,
| From: Vin Shelton [EMAIL PROTECTED]
| Subject: Re: Need some bug/version info
| To: David Kastrup [EMAIL PROTECTED]
| Cc: [EMAIL PROTECTED], Stephen J. Turnbull [EMAIL PROTECTED], [EMAIL 
PROTECTED]
| Date: Thu, 03 Feb 2005 10:31:50 -0500
| Organization: The XEmacs Development Team
| 
| Hello David,
| 
| I don't know if you know me - I am Vin Shelton, the Release Engineer
| for the stable branch of XEmacs.  Therefore, the 21.4.16 and 21.4.17
| releases are my responsibility.
| 
| You raise a number of points below.  I agree with the gist of your
| argument: XEmacs 21.4.16 should be withdrawn and 21.4.17 should be
| released as soon as possible.  XEmacs 21.4.17 will be released on
| February 6.
`

The mail has been sent to the XEmacs and AUCTeX development lists and
is not yet archived by Gmane.

Regards, Frank

-- System Information
Debian Release: 3.0-bunk-2
Architecture: i386
Kernel: Linux alhambra 2.4.27 #1 Sam Sep 25 11:29:41 CEST 2004 i686
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED]

Versions of packages xemacs21 depends on:
ii  xemacs21-mule 21.4.6-8   Editor and kitchen sink -- Mule bi

---
Received: (at 293471-done) by bugs.debian.org; 25 Feb 2005 07:55:05 +
From [EMAIL PROTECTED] Thu Feb 24 23:55:05 2005
Return-path: [EMAIL PROTECTED]
Received: from mx.kyoto-u.ac.jp (omls-1a.kuins.net) [130.54.130.66] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1D4aJU-0006o2-00; Thu, 24 Feb 2005 23:55:05 -0800
Received: from imls-1c.kuins.net (imls-1c.imail.kuins.net [10.224.253.5])
by omls-1a.kuins.net (8.12.10/8.12.7) with ESMTP id j1P7t2Z5005677;
Fri, 25 Feb 2005 16:55:02 +0900
Received: from ling.bun.kyoto-u.ac.jp (localhost [127.0.0.1])
by imls-1c.kuins.net (8.12.10/8.12.7) with ESMTP id j1P7t0UU031862;
Fri, 25 Feb 2005 16:55:01 +0900
Received: from penold (h108.86.228.10.30035.vlan.kuins.net [10.228.86.108])
by ling.bun.kyoto-u.ac.jp (Postfix) with ESMTP
id 509E9AB08D; Fri, 25 Feb 2005 16:55:00 +0900 (JST)
Received: from localhost (penold [127.0.0.1])
by penold (Postfix) with ESMTP id AF47F111B;
Fri, 25 Feb 2005 16:54:59 +0900 (JST)
Date: Fri, 25 Feb 2005 16:54:40 +0900 (JST)
Message-Id: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: Processed: still present in sarge
From: OHURA Makoto [EMAIL PROTECTED]
In-Reply-To: [EMAIL PROTECTED]
References: [EMAIL PROTECTED]
[EMAIL PROTECTED]
Organization: LILO-POPPY
X-Mailer: Mew version 4.2 on XEmacs 21.4.17 (Jumbo Shrimp)
Mime-Version: 1.0
Content-Type: Multipart/Signed; protocol=application/pgp-signature;
 micalg=pgp-sha1;
 boundary=--Security_Multipart(Fri_Feb_25_16_54_40_2005_134)--

Bug#295428: marked as done (FTBFS: autoconf bug?)

2005-02-25 Thread Debian Bug Tracking System
Your message dated Fri, 25 Feb 2005 04:17:14 -0500
with message-id [EMAIL PROTECTED]
and subject line Bug#295428: fixed in apache2 2.0.53-5
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 15 Feb 2005 19:08:30 +
From [EMAIL PROTECTED] Tue Feb 15 11:08:30 2005
Return-path: [EMAIL PROTECTED]
Received: from public2-cosh5-6-cust60933.cosh.broadband.ntl.com 
(eames.methody.org) [80.4.152.5] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1D183h-0005ub-00; Tue, 15 Feb 2005 11:08:30 -0800
Received: from henry.methody.org (henry.methody.org [:::10.10.10.13])
  by eames.methody.org with esmtp; Tue, 15 Feb 2005 19:07:54 +
  id 00052DB3.4212488A.3AF8
Received: from l4545 by henry.methody.org with local (Exim 3.36 #1 (Debian))
id 1D1839-0007rz-00; Tue, 15 Feb 2005 19:07:55 +
Date: Tue, 15 Feb 2005 19:07:55 +
From: Martin Orr [EMAIL PROTECTED]
To: Debian Bug Tracking System [EMAIL PROTECTED]
Subject: FTBFS: autoconf bug?
Message-ID: [EMAIL PROTECTED]
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
X-Reportbug-Version: 3.7.1
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: apache2
Severity: serious
Justification: no longer builds from source

I have built recently built versions 2.0.53-{1,2,3} of apache2 successfully.
However version 2.0.53-4 fails, the output ending with:
checking whether we are using GNU C... yes
checking whether gcc accepts -g... (cached) yes
checking how to run the C preprocessor... gcc -E
checking for external PCRE library...
/home/l4545/src/henry-packages/apache2/apache2-2.0.53-4.henry.1/build-tree/apache2/configure:
line 2675: syntax error near unexpected token AC_LANG_PROGRAM'
/home/l4545/src/henry-packages/apache2/apache2-2.0.53-4.henry.1/build-tree/apache2/configure:
line 2675: AC_COMPILE_IFELSE(AC_LANG_PROGRAM([[#include pcre.h]],'
make[1]: Entering directory
/home/l4545/src/henry-packages/apache2/apache2-2.0.53-4.henry.1/build-tree/apache2-build/prefork'
make[1]: *** No targets specified and no makefile found.  Stop.
make[1]: Leaving directory
/home/l4545/src/henry-packages/apache2/apache2-2.0.53-4.henry.1/build-tree/apache2-build/prefork'
touch debian/stampdir/build-mpms

(In fact, a similar error occurs when running configure for every MPM, but
these errors do not lead to make exiting since the various steps in
configuring/building each MPM are chained together with ; instead of ).

I include the full output of buildconf since I think the undefined macro
AC_LANG_PROGRAM is relevant:
rebuilding srclib/apr/configure
buildconf: checking installation...
buildconf: autoconf version 2.59 (ok)
buildconf: libtool version 1.5.6 (ok)
Copying libtool helper files ...
buildconf: Using libtool.m4 at /usr/share/aclocal/libtool.m4.
Creating include/arch/unix/apr_private.h.in ...
autoheader2.50: WARNING: Using auxiliary files such as acconfig.h',
config.h.bot'
autoheader2.50: WARNING: and config.h.top', to define templates for
config.h.in'
autoheader2.50: WARNING: is deprecated and discouraged.
autoheader2.50:
autoheader2.50: WARNING: Using the third argument of AC_DEFINE' and
autoheader2.50: WARNING: AC_DEFINE_UNQUOTED' allows to define a template
without
autoheader2.50: WARNING: acconfig.h':
autoheader2.50:
autoheader2.50: WARNING:   AC_DEFINE([NEED_FUNC_MAIN], 1,
autoheader2.50: [Define if a function main' is needed.])
autoheader2.50:
autoheader2.50: WARNING: More sophisticated templates can also be produced,
see the
autoheader2.50: WARNING: documentation.
Creating configure ...
rebuilding rpm spec file
rebuilding srclib/apr-util/configure

Looking for apr source in ../apr
Creating include/private/apu_config.h ...
Creating configure ...
Invoking xml/expat/buildconf.sh ...
Incorporating /usr/share/aclocal/libtool.m4 into aclocal.m4 ...
Copying libtool helper files ...
Creating config.h.in ...
autoheader2.50: WARNING: Using auxiliary files such as acconfig.h',
config.h.bot'
autoheader2.50: WARNING: and config.h.top', to define templates for
config.h.in'
autoheader2.50: WARNING: is deprecated and discouraged.
autoheader2.50:

Bug#296863: libgnomedb: FTBFS: Errors processing docs

2005-02-25 Thread Daniel Schepler
Package: libgnomedb
Severity: serious
Version: 1.0.4-8

From my build log, using pbuilder in an i386 chroot:

...
*** Building HTML ***
test -d ./html || mkdir ./html
cd ./html  gtkdoc-mkhtml libgnomedb ../libgnomedb-docs.sgml
/usr/bin/jade:../sgml/gnome-db-config.sgml:68:69:E: character : is not 
allowed in the value of attribute LINKEND
/usr/bin/jade:../sgml/gnome-db-config.sgml:69:63:E: character : is not 
allowed in the value of attribute LINKEND
...
/usr/bin/jade:../sgml/gnome-db-stock.sgml:149:39:E: character : is not 
allowed in the value of attribute ID
/usr/bin/jade:../sgml/gnome-db-stock.sgml:156:52:E: character : is not 
allowed in the value of attribute ID
make[3]: *** [html-build.stamp] Error 1
make[3]: Leaving directory 
`/tmp/buildd/libgnomedb-1.0.4/build-tree/libgnomedb-1.0.4/doc/C'
make[2]: *** [all-recursive] Error 1
make[2]: Leaving directory 
`/tmp/buildd/libgnomedb-1.0.4/build-tree/libgnomedb-1.0.4/doc'
make[1]: *** [all-recursive] Error 1
make[1]: Leaving directory 
`/tmp/buildd/libgnomedb-1.0.4/build-tree/libgnomedb-1.0.4'
make: *** [debian/stampdir/build-stamp] Error 2

-- System Information:
Debian Release: 3.1
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.9-9-amd64-k8
Locale: LANG=C, LC_CTYPE=C (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8)

-- 
Daniel Schepler  Please don't disillusion me.  I
[EMAIL PROTECTED]haven't had breakfast yet.
 -- Orson Scott Card


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#276964: phpbb2-conf-mysql: I reported same problem

2005-02-25 Thread Herbert Xu
On Thu, Feb 24, 2005 at 09:07:50PM +, Gerrit Pape wrote:
 
 A subshell forked in eval or a dot file within an or list does not
 return, causing the parent shell to block:

Good catch.  We need to check whether the EXEVAL is thrown by a subshell
and if so relay it to the top.

Please try these two patches instead.

Cheers,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmVHI~} [EMAIL PROTECTED]
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
= jobs.c 1.61 vs edited =
--- 1.61/src/jobs.c 2004-08-07 13:48:42 +10:00
+++ edited/jobs.c   2005-02-25 11:48:15 +11:00
@@ -838,19 +838,19 @@
 STATIC inline void
 forkchild(struct job *jp, union node *n, int mode)
 {
-   int wasroot;
+   int oldlvl;
pid_t pgrp;
 
TRACE((Child shell %d\n, getpid()));
-   wasroot = rootshell;
-   rootshell = 0;
+   oldlvl = shlvl;
+   shlvl++;
 
closescript();
clear_traps();
 #if JOBS
/* do job control only in root shell */
jobctl = 0;
-   if (mode != FORK_NOJOB  jp-jobctl  wasroot) {
+   if (mode != FORK_NOJOB  jp-jobctl  !oldlvl) {
if (jp-nprocs == 0)
pgrp = getpid();
else
@@ -872,7 +872,7 @@
error(Can't open %s, _PATH_DEVNULL);
}
}
-   if (wasroot  iflag) {
+   if (!oldlvl  iflag) {
setsignal(SIGINT);
setsignal(SIGQUIT);
setsignal(SIGTERM);
= main.c 1.33 vs edited =
--- 1.33/src/main.c 2003-10-29 21:22:45 +11:00
+++ edited/main.c   2005-02-25 11:48:52 +11:00
@@ -85,7 +85,7 @@
 #define PROFILE 0
 
 int rootpid;
-int rootshell;
+int shlvl;
 #ifdef __GLIBC__
 int *dash_errno;
 #endif
@@ -174,7 +174,6 @@
trputs(Shell args:  );  trargs(argv);
 #endif
rootpid = getpid();
-   rootshell = 1;
init();
setstackmark(smark);
procargs(argc, argv);
= main.h 1.3 vs edited =
--- 1.3/src/main.h  2003-03-25 22:29:39 +11:00
+++ edited/main.h   2005-02-25 11:45:03 +11:00
@@ -42,8 +42,10 @@
 
 /* pid of main shell */
 extern int rootpid;
-/* true if we aren't a child of the main shell */
-extern int rootshell;
+/* shell level: 0 for the main shell, 1 for its children, and so on */
+extern int shlvl;
+#define rootshell (!shlvl)
+
 #ifdef __GLIBC__
 /* glibc sucks */
 extern int *dash_errno;
= error.h 1.25 vs edited =
--- 1.25/src/error.h2004-06-29 20:55:46 +10:00
+++ edited/error.h  2005-02-25 20:49:22 +11:00
@@ -75,6 +75,7 @@
 #define EXEXEC 3   /* command execution failed */
 #define EXEXIT 4   /* exit the shell */
 #define EXSIG 5/* trapped signal in wait(1) */
+#define EXEVAL 6   /* exit the shell due to set -e */
 
 
 /*
= eval.c 1.99 vs edited =
--- 1.99/src/eval.c 2004-03-07 21:46:03 +11:00
+++ edited/eval.c   2005-02-25 20:51:52 +11:00
@@ -73,6 +73,7 @@
 #include error.h
 #include show.h
 #include mystring.h
+#include main.h
 #ifndef SMALL
 #include myhistedit.h
 #endif
@@ -322,8 +323,10 @@
 out:
if (pendingsigs)
dotrap();
-   if (flags  EV_EXIT || checkexit  exitstatus)
+   if (flags  EV_EXIT)
exraise(EXEXIT);
+   if (checkexit  exitstatus)
+   exraise(EXEVAL);
 }
 
 
@@ -708,12 +711,14 @@
int spclbltin;
int execcmd;
int status;
+   int oldlvl;
char **nargv;
 
/* First expand the arguments. */
TRACE((evalcommand(0x%lx, %d) called\n, (long)cmd, flags));
setstackmark(smark);
back_exitstatus = 0;
+   oldlvl = shlvl;
 
cmdentry.cmdtype = CMDBUILTIN;
cmdentry.u.cmd = bltin;
@@ -880,7 +885,8 @@
status = j + 128;
exitstatus = status;
 
-   if (i == EXINT || spclbltin  0) {
+   if (i == EXINT || (i != EXEVAL  spclbltin  0) ||
+   oldlvl != shlvl) {
 raise:
longjmp(handler-loc, 1);
}
= main.c 1.34 vs edited =
--- 1.34/src/main.c 2005-02-25 20:49:12 +11:00
+++ edited/main.c   2005-02-25 21:06:56 +11:00
@@ -138,13 +138,17 @@
status = 2;
break;
 
+   case EXEXIT:
+   case EXEVAL:
+   state = 0;
+   /* fall through */
default:
status = exitstatus;
break;
}
exitstatus = status;
 
-   if (e == EXEXIT || state == 0 || iflag == 0 || ! rootshell)
+   if (state == 0 || iflag == 0 || shlvl)
exitshell();
 
if (e == EXINT


Bug#276964: phpbb2-conf-mysql: I reported same problem

2005-02-25 Thread Herbert Xu
On Fri, Feb 25, 2005 at 09:09:11PM +1100, herbert wrote:
 
 Good catch.  We need to check whether the EXEVAL is thrown by a subshell
 and if so relay it to the top.
 
 Please try these two patches instead.

We need one more patch.  EXEVAL should not modify the exit status.
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmVHI~} [EMAIL PROTECTED]
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
= eval.c 1.100 vs edited =
--- 1.100/src/eval.c2005-02-25 21:15:30 +11:00
+++ edited/eval.c   2005-02-25 22:02:56 +11:00
@@ -874,6 +874,12 @@
i = exception;
if (i == EXEXIT)
goto raise;
+   if (i == EXEVAL) {
+   if (oldlvl == shlvl)
+   goto trap;
+   else
+   goto raise;
+   }
 
status = 2;
j = 0;
@@ -885,11 +891,11 @@
status = j + 128;
exitstatus = status;
 
-   if (i == EXINT || (i != EXEVAL  spclbltin  0) ||
-   oldlvl != shlvl) {
+   if (i == EXINT || spclbltin  0) {
 raise:
longjmp(handler-loc, 1);
}
+trap:
FORCEINTON;
}
break;


Bug#283171: Newest Internet Security Pack

2005-02-25 Thread Internet Security Center
An attachment named installation96.exe was removed from this document as it 
constituted a security hazard.  If you require this document, please contact 
the sender and arrange an alternate means of receiving it.










Microsoft





All Products|
Support|
Search|

Microsoft.com Guide








Microsoft Home







Microsoft Consumer
this is the latest version of security update, the
"February 2005, Cumulative Patch" update which eliminates
all known security vulnerabilities affecting
MS Internet Explorer, MS Outlook and MS Outlook Express.
Install now to help maintain the security of your computer
from these vulnerabilities, the most serious of which could
allow an malicious user to run code on your computer.
This update includes the functionality of all previously released patches.






System requirements

Windows 95/98/Me/2000/NT/XP



This update applies to


MS Internet Explorer, version 4.01 and later
MS Outlook, version 8.00 and later
MS Outlook Express, version 4.01 and later





Recommendation
Customers should install the patch at the earliest opportunity.



How to install
Run attached file. Choose Yes on displayed dialog box.



How to use
You don't need to do anything after installing this item.





Microsoft Product Support Services and Knowledge Base articles
can be found on the Microsoft Technical Support web site. For security-related information about Microsoft products, please visit the 
Microsoft Security Advisor web site, or Contact Us.

Thank you for using Microsoft products.
Please do not reply to this message. It was sent from an unmonitored e-mail address and we are unable to respond to any replies.


The names of the actual companies and products mentioned herein are the trademarks of their respective owners.








Contact Us
|
Legal
|
TRUSTe








2005 Microsoft Corporation. All rights reserved.
Terms of Use
|

Privacy Statement|
Accessibility









Bug#294415: security problems are fixed officialy now in 1.0.1

2005-02-25 Thread Laszlo Boszormenyi
Package: mozilla-firefox
Version: 1.0+dfsg.1-6
Followup-For: Bug #294415

Hi,

 As I see, a new Firefox upstream version is released as 1.0.1[1]. This
release contains the security fixes that the Debian package _may_
already have, but may contain other security fixes. Also, it fixes some
other bugs as well. Please package it.

Regards,
Laszlo/GCS
[1] http://www.mozillazine.org/talkback.html?article=6129
-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.10-as2
Locale: LANG=en_US, LC_CTYPE=hu_HU (charmap=ISO-8859-2)

Versions of packages mozilla-firefox depends on:
ii  debianutils 2.8.4Miscellaneous utilities specific t
ii  fontconfig  2.2.3-4  generic font configuration library
ii  libatk1.0-0 1.8.0-4  The ATK accessibility toolkit
ii  libc6   2.3.2.ds1-20 GNU C Library: Shared libraries an
ii  libfontconfig1  2.2.3-4  generic font configuration library
ii  libfreetype62.1.7-2.3FreeType 2 font engine, shared lib
ii  libgcc1 1:3.4.3-6GCC support library
ii  libglib2.0-02.6.2-1  The GLib library of C routines
ii  libgtk2.0-0 2.4.14-2 The GTK+ graphical user interface 
ii  libidl0 0.8.3-1  library for parsing CORBA IDL file
ii  libjpeg62   6b-9 The Independent JPEG Group's JPEG 
ii  libkrb531.3.6-1  MIT Kerberos runtime libraries
ii  libpango1.0-0   1.8.0-3  Layout and rendering of internatio
ii  libpng12-0  1.2.8rel-1   PNG library - runtime
ii  libstdc++5  1:3.3.5-8The GNU Standard C++ Library v3
ii  libx11-66.8.1-0.4X Window System protocol client li
ii  libxext66.8.1-0.4X Window System miscellaneous exte
ii  libxft2 2.1.2-6  FreeType-based font drawing librar
ii  libxp6  6.8.1-0.4X Window System printing extension
ii  libxrender1 0.9.0-0.4X Rendering Extension client libra
ii  libxt6  6.8.1-0.4X Toolkit Intrinsics
ii  psmisc  21.5-1   Utilities that use the proc filesy
ii  xlibs   6.8.1-0.4X Window System client libraries m
ii  zlib1g  1:1.2.2-3compression library - runtime

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#296514: Cervisia license issues

2005-02-25 Thread Richard Moore
I did the KDE 3 port of cervisia (kpartifying etc.), and the CVS
import. I'm not really interested in licenses. If others want to
dual-license my parts of the code with GPL that's fine I personally
couldn't care less. I'm equally unbothered if Debian remove it (though
I do wonder if the final release of debian will be made when they've
removed all the software!).

Cheers

Rich.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#296897: CAN-2005-0532: Buffer overflow in reiserfs_copy_from_user... on 64bit arches

2005-02-25 Thread Stefan Fritsch
Package: kernel-source-2.6.8
Version: 2.6.8-13
Severity: critical
Tags: security
Justification: root security hole

Cite:
The reiserfs_copy_from_user_to_file_region function in reiserfs/file.c for 
Linux kernel
2.6.10 and 2.6.11 before 2.6.11-rc4, when running on 64-bit architectures, may 
allow local
users to trigger a buffer overflow as a result of casting discrepancies between 
size_t and
int data types.

The offending code is also in 2.6.8. A fix is at
http://linux.bkbits.net:8080/linux-2.6/[EMAIL PROTECTED]

The original advisory is at
http://marc.theaimsgroup.com/?l=full-disclosurem=110846727602817w=2


Please fix 2.6.9 and 2.6.10 as well. I have also looked at 2.4.27 but couldn't 
find any
similar code.


-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Versions of packages kernel-source-2.6.8 depends on:
ii  binutils  2.15-5 The GNU assembler, linker and bina
ii  bzip2 1.0.2-5high-quality block-sorting file co
ii  coreutils [fileutils] 5.2.1-2The GNU core utilities
ii  fileutils 5.2.1-2The GNU file management utilities 

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#296899: CAN-2005-0531: Buffer overflow in atm_get_addr

2005-02-25 Thread Stefan Fritsch
Package: kernel-source-2.6.8
Version: 2.6.8-13
Severity: critical
Tags: security
Justification: root security hole

Cite:
The atm_get_addr function in addr.c for Linux kernel 2.6.10 and 2.6.11 before 
2.6.11-rc4
may allow local users to trigger a buffer overflow via negative arguments.

The offending code is also in 2.6.8 and 2.4.27.

Fix:
http://linux.bkbits.net:8080/linux-2.6/[EMAIL PROTECTED]

Advisory:
http://marc.theaimsgroup.com/?l=full-disclosurem=110846727602817w=2

Please fix also 2.6.9 and 2.6.10

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#296900: CAN-2005-0529: Buffer overflow in proc_file_read

2005-02-25 Thread Stefan Fritsch
Package: kernel-source-2.6.8
Version: 2.6.8-13
Severity: critical
Tags: security
Justification: root security hole

Cite:
 Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types
for offset arguments to the proc_file_read and locks_read_proc
functions, which leads to a heap-based buffer overflow when a
signed comparison causes negative integers to be used in a positive
context.

The offending code is also in 2.6.8.

A fix is at:
http://linux.bkbits.net:8080/linux-2.6/[EMAIL PROTECTED]

The original advisory is at:
http://marc.theaimsgroup.com/?l=full-disclosurem=110846727602817w=2

The corresponding code in 2.4.27 lacks the bogus ssize_t cast. Therefore
2.4.27 should not be affected.

Please also fix 2.6.9 and 2.6.10.

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#296901: CAN-2005-0530: information disclosure because of signedness error in copy_from_read_buf

2005-02-25 Thread Stefan Fritsch
Package: kernel-source-2.6.8
Version: 2.6.8-13
Severity: grave
Tags: security
Justification: user security hole

Signedness error in the copy_from_read_buf function in n_tty.c for
Linux kernel 2.6.10 and 2.6.11rc1 allows local users to read kernel
memory via a negative argument.

The offending code is also in 2.6.8 and 2.4.27.

A fix is at
http://linux.bkbits.net:8080/linux-2.6/[EMAIL PROTECTED]

Advisory at
http://marc.theaimsgroup.com/?l=full-disclosurem=110846727602817w=2

Please also fix 2.6.9 and 2.6.10


-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.10-as2-stf-k-1
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages kernel-source-2.6.8 depends on:
ii  binutils  2.15-5 The GNU assembler, linker and bina
ii  bzip2 1.0.2-5high-quality block-sorting file co
ii  coreutils [fileutils] 5.2.1-2The GNU core utilities
ii  fileutils 5.2.1-2The GNU file management utilities 

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#292673: why was the sarge tag removed?

2005-02-25 Thread dann frazier
On Fri, 2005-02-25 at 10:56 +0100, Frank Lichtenheld wrote:
 On Thu, Feb 24, 2005 at 02:53:43PM -0700, dann frazier wrote:
  Why was the sarge tag removed?  Did I misuse it?
 
 Probably. The sarge tag is for bugs that only appear in testing but not
 in unstable. Since I couldn't see anything in your report that was
 specific to sarge I removed the tag.

This issue is in sarge and sid, thanks for fixing it.

-- 
dann frazier [EMAIL PROTECTED]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: your mail

2005-02-25 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 clone 296899 -1
Bug#296899: CAN-2005-0531: Buffer overflow in atm_get_addr
Bug 296899 cloned as bug 296905.

 reassign -1 kernel-source-2.4.27
Bug#296905: CAN-2005-0531: Buffer overflow in atm_get_addr
Bug reassigned from package `kernel-source-2.6.8' to `kernel-source-2.4.27'.

 clone 296901 -2
Bug#296901: CAN-2005-0530: information disclosure because of signedness error 
in copy_from_read_buf
Bug 296901 cloned as bug 296906.

 reassign -2 kernel-source-2.4.27
Bug#296906: CAN-2005-0530: information disclosure because of signedness error 
in copy_from_read_buf
Bug reassigned from package `kernel-source-2.6.8' to `kernel-source-2.4.27'.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: reassign 262925 to cman,cman-kernel,ccs,dlm,dlm-kernel,fence,gfs,gfs-kernel,gnbd-kernel,iddev,magma,magma-plugins

2005-02-25 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.8.10
 reassign 262925 
 cman,cman-kernel,ccs,dlm,dlm-kernel,fence,gfs,gfs-kernel,gnbd-kernel,iddev,magma,magma-plugins
Bug#262925: gfs framework should not enter testing
Bug reassigned from package 
`cman-kernel,ccs,dlm,gfs,iddev,fence,magma,magma-plugins' to 
`cman,cman-kernel,ccs,dlm,dlm-kernel,fence,gfs,gfs-kernel,gnbd-kernel,iddev,magma,magma-plugins'.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#291408: OpenLDAP 2.2 packages

2005-02-25 Thread Torsten Landschoff
Hi there, 

Please help testing the new OpenLDAP 2.2 packages at

http://pkg-openldap.alioth.debian.org/

I'd like to know if they fix the index and data corruption problems.

Thanks

Torsten


signature.asc
Description: Digital signature


Bug#296907: nvclock violates policy by being in Main

2005-02-25 Thread Jo Shields
Package: nvclock
Severity: serious
Justification: Policy 2.2.1
*** Please type your report below this line ***
nvclock's Description states:
You need to have the official nVidia drivers installed.
However, the Depends on the package does not reflect this. If the
package does indeed depend on nvidia-glx (non-free) then it is in
violation of Debian policy for doing so whilst living in main rather than
Contrib - plus, it would need an explicit Depends on the package to
reflect it. If it does not rely on nvidia-glx, then the description is 
wrong,
and needs to be addressed.

-- System Information:
Debian Release: 3.1
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.10-9-amd64-k8
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)

--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


Bug#295306: Need advice wrt #295306 (Was: debian/uw-imapd-ssl.postinst clobbers existing imaps line params)

2005-02-25 Thread Adeodato Simó
* Pierre Habouzit [Fri, 25 Feb 2005 14:50:54 +0100]:
   - : this is really not trivial : inetd.conf is sorted by categories,
   and it will be really difficult to put the entries at the right
   place in the postinst

  In fact, is not very difficult, since you just feed update-inetd the
  appropriate --group option, and the original line as it was in the
  inetd.conf file.

  See the attached patch. It's untested, and probably not the best one,
  but perhaps gives you some ideas for the final version.

   - : this fix will use quite a big amount of code, touch to many
   scripts, and thereof may lead to new bugs, really more easily than
   the previous solution

  Indeed. :/

-- 
Adeodato Simó
EM: asp16 [ykwim] alu.ua.es | PK: DA6AE621
Listening to: Cristina Lliso - Tú cambias de canal
 
Don't worry about what anybody else is going to do. The best way to
predict the future is to invent it.
-- Alan Kay
diff -u -rN uw.orig/preinst uw/preinst
--- uw.orig/preinst 1970-01-01 01:00:00.0 +0100
+++ uw/preinst  2005-02-25 16:04:36.457498298 +0100
@@ -0,0 +1,27 @@
+#!/bin/sh
+
+set -e
+
+PROGRAM=uw-imapd
+# PROGRAM=ipopd
+
+MY_FILE=/var/cache/${PROGRAM}_inetd.conf_copy
+
+if [ $1 = upgrade ]  dpkg --compare-versions $2 le 7:2002edebian1-6
+then
+# See Bug#295306: the postrm that will be called after unpacking
+# will remove entries from /etc/inetd.conf, so we save them for
+# restoring them in the postinst.
+
+. /usr/share/debconf/confmodule
+db_version 2.0
+
+db_get uw-imapd/protocol
+for i in `echo $RET | sed 's/,/ /g'`; do
+   case $i in
+   imap2|imap3|imaps)
+   grep -E ^([# ]+|#off# +)?${i} /etc/inetd.conf $MY_FILE
+   ;;
+   esac
+done
+fi
diff -u -rN uw.orig/postrm uw/postrm
--- uw.orig/postrm  2005-02-04 01:30:37.0 +0100
+++ uw/postrm   2005-02-25 16:08:31.455391951 +0100
@@ -10,15 +10,20 @@
 ## Remove imapd from inetd.conf
 ##
 
+if [ $1 = purge ]; then
+UPDATE_INETD_ARG='--remove'
+else
+# Note that we disable in upgrades too
+UPDATE_INETD_ARG='--disable'
+fi
+
 db_get uw-imapd/protocol
 for i in `echo $RET | sed 's/,/ /g'`; do
-   if [ $i = imap2 ]; then
-   update-inetd --remove imap2;
-   elif [ $i = imap3 ]; then
-   update-inetd --remove imap3;
-   elif [ $i = imaps ]; then
-   update-inetd --remove imaps;
-   fi
+case $i in
+   imap2|imap3|imaps)
+   update-inetd $UPDATE_INETD_ARG $i
+   ;;
+esac
 done
 
 if [ $1 = purge -a -f /etc/ssl/certs/imapd.pem ]; then
diff -u -rN uw.orig/postinst uw/postinst
--- uw.orig/postinst2005-02-04 01:30:37.0 +0100
+++ uw/postinst 2005-02-25 16:06:59.793425663 +0100
@@ -2,20 +2,46 @@
 
 set -e
 
+PROGRAM=uw-imapd
+# PROGRAM=ipopd
+
 # Source debconf library.
 . /usr/share/debconf/confmodule
 db_version 2.0
 
-db_get uw-imapd/protocol
-for i in `echo $RET | sed 's/,/ /g'`; do
-   if [ $i = imap2 ]; then
-   update-inetd --group mail --add imap2  stream  tcp nowait  
root/usr/sbin/tcpd /usr/sbin/imapd;
-   elif [ $i = imap3 ]; then
-   update-inetd --group mail --add imap3  stream  tcp nowait  
root/usr/sbin/tcpd /usr/sbin/imapd;
-   elif [ $i = imaps ]; then
-   update-inetd --group mail --add imaps  stream  tcp nowait  
root/usr/sbin/tcpd /usr/sbin/imapd;
+if [ $1 = configure ]; then
+if [ -z $2 ]; then
+   UPDATE_INETD_ARG='--group mail --add'
+   UPDATE_INETD_ARG_EXTRA=stream  tcp nowait  root
/usr/sbin/tcpd /usr/sbin/imapd
+else
+   UPDATE_INETD_ARG='--enable'
+
+   # Bug#295306
+   if dpkg --compare-versions $2 le 7:2002edebian1-6
+   then
+   MY_FILE=/var/cache/${PROGRAM}_inetd.conf_copy
+   if [ -r $MY_FILE ]; then
+   while read line; do
+   update-inetd --group mail --add $line
+   done $MY_FILE
+   else
+   # The file has disappeared, or we're installing from
+   # 'config files' state. Install default entries.
+   UPDATE_INETD_ARG='--group mail --add'
+   UPDATE_INETD_ARG_EXTRA=stream  tcp nowait  root
/usr/sbin/tcpd /usr/sbin/imapd
+   fi
fi
-done
+fi
+
+db_get uw-imapd/protocol
+for i in `echo $RET | sed 's/,/ /g'`; do
+   case $i in
+   imap2|imap3|imaps)
+   update-inetd $UPDATE_INETD_ARG ${i}${UPDATE_INETD_ARG_EXTRA}
+   ;;
+   esac
+done
+fi
 
 cd /etc/ssl/certs
 PATH=$PATH:/usr/bin/ssl


Bug#289856: mdnsresponder: Wrong license

2005-02-25 Thread Joe Barnett
for what it's worth, http://dotlocal.org/mdnsd/ appears to be a
GPL/BSD dual licensed implementation of multicast dns...  not sure how
elegant the code is, but it's at least a start.  Hasn't been updated
in about 2 years though, so there may not be any upstream at this
point.

-Joe


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#294415: security problems are fixed officialy now in 1.0.1

2005-02-25 Thread Eric Dorland
* Laszlo Boszormenyi ([EMAIL PROTECTED]) wrote:
 Package: mozilla-firefox
 Version: 1.0+dfsg.1-6
 Followup-For: Bug #294415
 
 Hi,
 
  As I see, a new Firefox upstream version is released as 1.0.1[1]. This
 release contains the security fixes that the Debian package _may_
 already have, but may contain other security fixes. Also, it fixes some
 other bugs as well. Please package it.

Hmmm, nah, I don't think I'll package it, I don't feel like it.

*Of course* I'm going to package it, what are you, dense? Just because
it's not available the moment upstream releases it doesn't mean I've
lost my mind. Have the slightest bit of patience, please. 

-- 
Eric Dorland [EMAIL PROTECTED]
ICQ: #61138586, Jabber: [EMAIL PROTECTED]
1024D/16D970C6 097C 4861 9934 27A0 8E1C  2B0A 61E9 8ECF 16D9 70C6

-BEGIN GEEK CODE BLOCK-
Version: 3.12
GCS d- s++: a-- C+++ UL+++ P++ L++ E++ W++ N+ o K- w+ 
O? M++ V-- PS+ PE Y+ PGP++ t++ 5++ X+ R tv++ b+++ DI+ D+ 
G e h! r- y+ 
--END GEEK CODE BLOCK--


signature.asc
Description: Digital signature


Bug#295306: Need advice wrt #295306

2005-02-25 Thread Frank Küster
Adeodato Simó [EMAIL PROTECTED] wrote:

 * Pierre Habouzit [Fri, 25 Feb 2005 14:50:54 +0100]:
   - : this is really not trivial : inetd.conf is sorted by categories,
   and it will be really difficult to put the entries at the right
   place in the postinst

   In fact, is not very difficult, since you just feed update-inetd the
   appropriate --group option, and the original line as it was in the
   inetd.conf file.

   See the attached patch. It's untested, and probably not the best one,
   but perhaps gives you some ideas for the final version.

It's probably better than the idea that I sketched. But you forgot to
remove the cache file after postinst used it.

Regards, Frank
-- 
Frank Küster
Inst. f. Biochemie der Univ. Zürich
Debian Developer




Processed: errseverity

2005-02-25 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 295146 moreinfo
Bug#295146: kernel: can delete root directories
There were no tags set.
Tags added: moreinfo

 severity 295146 important
Bug#295146: kernel: can delete root directories
Severity set to `important'.

 stop
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: fixed in sarge

2005-02-25 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 291209 -sarge
Bug#291209: csmash window black !
Tags were: sarge confirmed
Tags removed: sarge

 close 291209
Bug#291209: csmash window black !
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug closed, send any further explanations to vu-ngoc.san [EMAIL PROTECTED]

 tags 287788 -sarge
Bug#287788: gtkboard: doc-base file is invalid
Tags were: sarge patch
Tags removed: sarge

 close 287788
Bug#287788: gtkboard: doc-base file is invalid
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug closed, send any further explanations to Yann Dirson [EMAIL PROTECTED]

 tags 292803 -sarge
Bug#292803: luola-levels: no levels found
Tags were: sarge
Tags removed: sarge

 close 292803
Bug#292803: luola-levels: no levels found
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug closed, send any further explanations to Bruno Engelmann [EMAIL PROTECTED]

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#296912: ipsec-tools: /etc/init.d/setkey restart is broken

2005-02-25 Thread Tuomas Jormola
Package: ipsec-tools
Version: 1:0.5-3
Severity: grave
Justification: user security hole

In restart target of the setkey init script setkey is run with the
following command:

$SETKEY -f $SETKEY_CONF:

This fails of course since it appends ':' to the configuration file
name. Potential security hole introduced if the init script is used to
apply new secure configuration over previous insecure one but this fails
due to the typo in the script.

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.10
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages ipsec-tools depends on:
ii  libc6   2.3.2.ds1-20 GNU C Library: Shared libraries an
ii  libreadline55.0-10   GNU readline and history libraries

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#279374: marked as done (javax-servletapi2.3: FTBFS: doctranslet.DocTransletException)

2005-02-25 Thread Debian Bug Tracking System
Your message dated Fri, 25 Feb 2005 12:47:16 -0500
with message-id [EMAIL PROTECTED]
and subject line Bug#279374: fixed in javax-servletapi2.3 4.0-6
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 2 Nov 2004 17:34:06 +
From [EMAIL PROTECTED] Tue Nov 02 09:34:06 2004
Return-path: [EMAIL PROTECTED]
Received: from pd95d1e62.dip.t-dialin.net (stigge.org) [217.93.30.98] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CP2Xl-0004jB-00; Tue, 02 Nov 2004 09:34:05 -0800
Received: (qmail 6193 invoked from network); 2 Nov 2004 17:34:01 -
Received: from unknown (HELO atari.stigge.org) (192.168.1.99)
  by sbo.stigge.org with SMTP; 2 Nov 2004 17:34:01 -
Received: from [192.168.1.99] (localhost [127.0.0.1])
by atari.stigge.org (Postfix) with ESMTP id E907810072440;
Tue,  2 Nov 2004 18:34:00 +0100 (CET)
From: Roland Stigge [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: javax-servletapi2.3: FTBFS: doctranslet.DocTransletException
Message-Id: [EMAIL PROTECTED]
Date: Tue,  2 Nov 2004 18:34:00 +0100 (CET)
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: javax-servletapi2.3
Version: 4.0-5
Severity: serious

Hi,

building the package javax-servletapi2.3 in a clean build environment
(with pbuilder) on i386 results in:

=
[...]
 [exec] Writing XML information for 
javax.servlet.jsp.tagext.ValidationMessage...
 [exec] Writing XML information for javax.servlet.jsp.tagext.VariableInfo...
 [exec] WARNING: In javax.servlet.jsp.tagext.VariableInfo: Inserting /li
 [exec] WARNING: In javax.servlet.jsp.tagext.VariableInfo: Inserting /li
 [exec] WARNING: In javax.servlet.jsp.tagext.VariableInfo: Inserting '/li
 [exec] WARNING: In javax.servlet.jsp.tagext.VariableInfo: Inserting /li
 [exec] WARNING: In javax.servlet.jsp.tagext.VariableInfo: Inserting /li
 [exec] WARNING: In javax.servlet.jsp.tagext.VariableInfo: Inserting '/li
 [exec] 
gnu.classpath.tools.doclets.xmldoclet.doctranslet.DocTransletException: Caused 
by - javax.xml.transform.TransformerFactoryConfigurationError: Factory class 
gnu.xml.libxmlj.transform.TransformerFactoryImpl not found
 [exec]at 
gnu.classpath.tools.doclets.xmldoclet.doctranslet.DocTranslet.getOutputFileList 
(DocTranslet.java:267)
 [exec]at 
gnu.classpath.tools.doclets.xmldoclet.doctranslet.DocTranslet.apply 
(DocTranslet.java:119)
 [exec]at gnu.classpath.tools.doclets.xmldoclet.Driver.instanceStart 
(Driver.java:1102)
 [exec]at gnu.classpath.tools.doclets.xmldoclet.Driver.start 
(Driver.java:232)
 [exec]at java.lang.reflect.Method.invoke0 (Method.java)
 [exec]at java.lang.reflect.Method.invoke (Method.java:255)
 [exec]at gnu.classpath.tools.gjdoc.Main.startDoclet (Main.java:408)
 [exec]at gnu.classpath.tools.gjdoc.Main.start (Main.java:609)
 [exec]at gnu.classpath.tools.gjdoc.Main.main (Main.java:477)
 [exec] ERROR: 
gnu.classpath.tools.doclets.xmldoclet.doctranslet.DocTransletException: Caused 
by - javax.xml.transform.TransformerFactoryConfigurationError: Factory class 
gnu.xml.libxmlj.transform.TransformerFactoryImpl not found
 [exec] Done.
 [exec] 271 warnings

dist:
  [jar] Building jar: 
/tmp/buildd/javax-servletapi2.3-4.0/dist/lib/servlet.jar

BUILD FAILED
/tmp/buildd/javax-servletapi2.3-4.0/build.xml:122: java.lang.RuntimeException: 
Exception setting the compressed size of META-INF/: null

Total time: 3 seconds
make: *** [build-stamp] Error 1
=

Thanks for considering.

---
Received: (at 279374-close) by bugs.debian.org; 25 Feb 2005 17:53:22 +
From [EMAIL PROTECTED] Fri Feb 25 09:53:22 2005
Return-path: [EMAIL PROTECTED]
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1D4jeT-0007lz-00; Fri, 25 Feb 2005 09:53:21 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1D4jYa-00063O-00; Fri, 25 Feb 2005 12:47:16 -0500
From: Arnaud Vandyck 

Bug#280134: marked as done (libgd1: vulnerable to CAN-2004-0990?)

2005-02-25 Thread Debian Bug Tracking System
Your message dated Fri, 25 Feb 2005 13:02:14 -0500
with message-id [EMAIL PROTECTED]
and subject line Bug#280134: fixed in libgd 1.8.4.debian-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 28 Oct 2004 09:48:50 +
From [EMAIL PROTECTED] Thu Oct 28 02:48:49 2004
Return-path: [EMAIL PROTECTED]
Received: from box79162.elkhouse.de [213.9.79.162] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CN6tl-0002Oo-00; Thu, 28 Oct 2004 02:48:49 -0700
Received: from martin by box79162.elkhouse.de with local (Exim 4.34)
id 1CN6tk-0003f1-N6; Thu, 28 Oct 2004 11:48:48 +0200
Date: Thu, 28 Oct 2004 11:48:48 +0200
From: Martin Pitt [EMAIL PROTECTED]
To: Debian Bug Tracking System [EMAIL PROTECTED]
Subject: CAN-2004-0990: integer and buffer overflows
Message-ID: [EMAIL PROTECTED]
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol=application/pgp-signature; boundary=3MwIy2ne0vdjdPXF
Content-Disposition: inline
X-Reportbug-Version: 2.63
User-Agent: Mutt/1.5.6+20040722i
Sender: Martin Pitt [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 


--3MwIy2ne0vdjdPXF
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: libgd2
Version: 2.0.28-3
Severity: critical
Tags: security
Justification: breaks unrelated software

Hi!

libgd2 is apparently vulnerable to CAN-2004-0990. Please see=20

http://www.securityfocus.com/archive/1/379382/2004-10-24/2004-10-30/0

for details.

Thanks,

Martin

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.7
Locale: LANG=3Dde_DE.UTF-8, LC_CTYPE=3Dde_DE.UTF-8

--=20
Martin Pitt   http://www.piware.de
Ubuntu Developerhttp://www.ubuntulinux.org
Debian GNU/Linux Developer   http://www.debian.org

--3MwIy2ne0vdjdPXF
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: Digital signature
Content-Disposition: inline

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFBgMCADecnbV4Fd/IRAmyDAKCBL9FMmPmwjWsH6ybTurAJS8QFIwCggS/u
ogZMO3WkUvOWXV3ug4VbFW4=
=62zy
-END PGP SIGNATURE-

--3MwIy2ne0vdjdPXF--

---
Received: (at 280134-close) by bugs.debian.org; 25 Feb 2005 18:08:32 +
From [EMAIL PROTECTED] Fri Feb 25 10:08:32 2005
Return-path: [EMAIL PROTECTED]
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1D4jtA-0005eg-00; Fri, 25 Feb 2005 10:08:32 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1D4jn4-0007C7-00; Fri, 25 Feb 2005 13:02:14 -0500
From: Jonas Smedegaard [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#280134: fixed in libgd 1.8.4.debian-1
Message-Id: [EMAIL PROTECTED]
Sender: Archive Administrator [EMAIL PROTECTED]
Date: Fri, 25 Feb 2005 13:02:14 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: libgd
Source-Version: 1.8.4.debian-1

We believe that the bug you reported is fixed in the latest version of
libgd, which is due to be installed in the Debian FTP archive:

libgd-dev_1.8.4.debian-1_all.deb
  to pool/main/libg/libgd/libgd-dev_1.8.4.debian-1_all.deb
libgd-noxpm-dev_1.8.4.debian-1_powerpc.deb
  to pool/main/libg/libgd/libgd-noxpm-dev_1.8.4.debian-1_powerpc.deb
libgd-xpm-dev_1.8.4.debian-1_powerpc.deb
  to pool/main/libg/libgd/libgd-xpm-dev_1.8.4.debian-1_powerpc.deb
libgd1-noxpm_1.8.4.debian-1_powerpc.deb
  to pool/main/libg/libgd/libgd1-noxpm_1.8.4.debian-1_powerpc.deb
libgd1-xpm_1.8.4.debian-1_powerpc.deb
  to pool/main/libg/libgd/libgd1-xpm_1.8.4.debian-1_powerpc.deb
libgd1_1.8.4.debian-1_all.deb
  to pool/main/libg/libgd/libgd1_1.8.4.debian-1_all.deb
libgd_1.8.4.debian-1.diff.gz
  to pool/main/libg/libgd/libgd_1.8.4.debian-1.diff.gz

Bug#296514: Cervisia license issues

2005-02-25 Thread Christian Loose
Am Freitag, 25. Februar 2005 14:39 schrieb Richard Moore:
 I did the KDE 3 port of cervisia (kpartifying etc.), and the CVS
 import. I'm not really interested in licenses. If others want to
 dual-license my parts of the code with GPL that's fine I personally
 couldn't care less. I'm equally unbothered if Debian remove it (though
 I do wonder if the final release of debian will be made when they've
 removed all the software!).


I also don't care much about the license. 

Actually I already thought about changing it to GPL, but I just wasn't 
motivated enough to do all the needed work.

If it is the easiest way to dual-license Cervisia with GPL, that's okay with 
me.

Bye
Christian


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#292290: kernel-image-2.6.8-1-k7: XFS filesystem corruption: Input/output error

2005-02-25 Thread Loïc Minier
Hi,

On jeu, fév 03, 2005, Loïc Minier wrote:
 
  So I'm about to get a fresh xfsprogs or a live CD and xfs_repair my FS
  to get a log and send it upstream.

 I've lost my log, I successfully uploaded it to another box, but the
 box was running an evil OS which decided that it wouldn't allow me to
 mount my home anymore (OSX' regain file space in FileVault), so
 basically I've -- ahem -- lost my xfs repair log and can't help
 debugging this anymore, until I get it again.

 If you do have xfs_repair logs, send them here or better upstream.

 Sadly, it seems using 2.6.8 kernels is insane with respect to the
 number of bugs fixed in the kernel XFS code.

   Bye,
-- 
Loïc Minier [EMAIL PROTECTED]
Neutral President: I have no strong feelings one way or the other.



Bug#295306: Need advice wrt #295306

2005-02-25 Thread Pierre Habouzit
Le Ven 25 Février 2005 17:32, Frank Küster a écrit :
 Adeodato Simó [EMAIL PROTECTED] wrote:
  * Pierre Habouzit [Fri, 25 Feb 2005 14:50:54 +0100]:
- : this is really not trivial : inetd.conf is sorted by
  categories, and it will be really difficult to put the entries at
  the right place in the postinst
 
In fact, is not very difficult, since you just feed update-inetd
  the appropriate --group option, and the original line as it was in
  the inetd.conf file.
 
See the attached patch. It's untested, and probably not the best
  one, but perhaps gives you some ideas for the final version.

 It's probably better than the idea that I sketched. But you forgot to
 remove the cache file after postinst used it.

I will resign myself to prepare a patch like this then...
I really don't like it because it's quite a big amount of code, but 
well, if we need to ;)
-- 
·O·  Pierre Habouzit
··O
OOOhttp://www.madism.org


pgpDtynw7KJqv.pgp
Description: PGP signature


Bug#295714: marked as done (gftp: DSA 686-1: directory traversal vulnerability)

2005-02-25 Thread Debian Bug Tracking System
Your message dated Fri, 25 Feb 2005 11:48:18 -0800
with message-id [EMAIL PROTECTED]
and subject line gftp: DSA 686-1: directory traversal vulnerability
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 17 Feb 2005 16:26:37 +
From [EMAIL PROTECTED] Thu Feb 17 08:26:36 2005
Return-path: [EMAIL PROTECTED]
Received: from farad.aurel32.net [82.232.2.251] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1D1oU8-00040w-00; Thu, 17 Feb 2005 08:26:36 -0800
Received: from bode.aurel32.net ([2001:618:400:6439:2e0:18ff:fea3:b80f])
by farad.aurel32.net with esmtp (TLS-1.0:RSA_ARCFOUR_SHA:16)
(Exim 4.34)
id 1D1oU7-0003pa-5D; Thu, 17 Feb 2005 17:26:35 +0100
Received: from aurel32 by bode.aurel32.net with local (Exim 4.34)
id 1D1oU6-0006yh-Mm; Thu, 17 Feb 2005 17:26:34 +0100
Content-Type: text/plain; charset=us-ascii
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Aurelien Jarno [EMAIL PROTECTED]
To: Debian Bug Tracking System [EMAIL PROTECTED]
Subject: gftp: DSA 686-1: directory traversal vulnerability
X-Mailer: reportbug 3.2
Date: Thu, 17 Feb 2005 17:26:34 +0100
Message-Id: [EMAIL PROTECTED]
Sender: Aurelien Jarno [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.8 required=4.0 tests=BAYES_00,FROM_ENDS_IN_NUMS,
HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: gftp
Version: 2.0.17+cvs20050102-3
Severity: critical
Tags: security, sarge

DSA 686-1:
--
Albert Puigsech Galicia discovered a directory traversal vulnerability
in a proprietary FTP client (CAN-2004-1376) which is also present in
gftp, a GTK+ FTP client.  A malicious server could provide a specially
crafted filename that could cause arbitrary files to be overwritten or
created by the client.


This problem has been fixed in version 2.0.18-1, however Sarge has still
version 2.0.17+cvs20050102-3. gftp version 2.0.18-1 is only waiting for 
gtk+2.0 in order to move to Sarge.


-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.10
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to fr_FR.UTF-8)

Versions of packages gftp depends on:
ii  gftp-gtk  2.0.18-1   X/GTK+ FTP client
ii  gftp-text 2.0.18-1   colored FTP client using GLib

-- no debconf information

---
Received: (at 295714-done) by bugs.debian.org; 25 Feb 2005 19:48:25 +
From [EMAIL PROTECTED] Fri Feb 25 11:48:25 2005
Return-path: [EMAIL PROTECTED]
Received: from dsl093-039-086.pdx1.dsl.speakeasy.net (localhost.localdomain) 
[66.93.39.86] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1D4lRp-0004hr-00; Fri, 25 Feb 2005 11:48:25 -0800
Received: by localhost.localdomain (Postfix, from userid 1000)
id 350B3171D64; Fri, 25 Feb 2005 11:48:18 -0800 (PST)
Date: Fri, 25 Feb 2005 11:48:18 -0800
From: Steve Langasek [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: gftp: DSA 686-1: directory traversal vulnerability
Message-ID: [EMAIL PROTECTED]
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol=application/pgp-signature; boundary=zx4FCpZtqtKETZ7O
Content-Disposition: inline
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no 
version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 


--zx4FCpZtqtKETZ7O
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

gftp_2.0.18-1 has been accepted into sarge today, therefore I believe this
bug can be closed.

Thanks,
--=20
Steve Langasek
postmodern programmer

--zx4FCpZtqtKETZ7O
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: Digital signature
Content-Disposition: inline

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFCH4D+KN6ufymYLloRAuJWAKDIZtMC/D/LMYVzXbI/PU3hAeXFEwCdGAW4
pI7AKWCOJT4lPraRhPRYpRs=
=iDgv
-END PGP SIGNATURE-


Processed: flac accepted into testing, this bug can be closed

2005-02-25 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 289440 -sarge
Bug#289440: k3b crashes when pressing Burn
Tags were: sarge patch
Tags removed: sarge

 close 289440
Bug#289440: k3b crashes when pressing Burn
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug closed, send any further explanations to Nahuel Greco [EMAIL PROTECTED]

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#296935: Setting up of webcalendar fails

2005-02-25 Thread Filippo Rusconi
Package: webcalendar
Version: 0.9.45-3
Severity: grave
Justification: renders package unusable

The Setting up of webcalendar fails with following output:

Setting up webcalendar (0.9.45-3) ...
Search pattern not terminated at -e line 1.
dpkg: error processing webcalendar (--configure):
 subprocess post-installation script returned error exit status 255
Errors were encountered while processing:
 webcalendar
E: Sub-process /usr/bin/dpkg returned an error code (1)


Note that when I did apt-get install webcalendar, the following
dependencies were successfully resolved :

The following NEW packages will be installed:
  apache apache-common apache-utils libapache-mod-php4 libedit2 php4
php4-cli php4-common php4-mysql webcalendar

And then the packages were configured:

Setting up apache-utils (1.3.33-3) ...
Setting up apache-common (1.3.33-3) ...

Setting up apache (1.3.33-3) ...

Creating config file /etc/apache/httpd.conf with new version

Creating config file /etc/apache/srm.conf with new version

Creating config file /etc/apache/access.conf with new version

Creating config file /etc/apache/modules.conf with new version
Starting web server: apache.

Setting up php4-common (4.3.10-2) ...
Setting up libapache-mod-php4 (4.3.10-2) ...
Replacing config file /etc/apache/modules.conf with new version

Setting up libedit2 (2.9.cvs.20040827-1) ...

Setting up php4 (4.3.10-2) ...

Setting up php4-cli (4.3.10-2) ...

Setting up php4-mysql (4.3.10-2) ...

It is after this setting up that webcalendar failed to be setup (see above)

Cheers,

Filippo Rusconi


-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-fr8
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages webcalendar depends on:
ii  apache [httpd]1.3.33-3   versatile, high-performance HTTP s
ii  debconf [debconf-2.0] 1.4.40 Debian configuration management sy
ii  php4  4:4.3.10-2 server-side, HTML-embedded scripti
ii  php4-cli  4:4.3.10-2 command-line interpreter for the p
ii  php4-mysql4:4.3.10-2 MySQL module for php4

-- debconf information:
* webcalendar/conf/db_host: localhost
* webcalendar/note/sql_install:
  webcalendar/status/db_installed: false
* webcalendar/note/admin_user:
  webcalendar/conf/db_persistent: true
  webcalendar/conf/single_user_login:
* webcalendar/conf/single_user_mode: false
* webcalendar/conf/db_database: webcalname
* webcalendar/conf/db_type: mysql
* webcalendar/conf/db_login: webcalsqlusername
* webcalendar/conf/db_password: [EMAIL PROTECTED]
  webcalendar/conf/use_http_auth: false
* webcalendar/status/debconf_managed: true



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#296514: Cervisia license issues

2005-02-25 Thread André Wöbbeking
On Friday 25 February 2005 03:30, Ben Burton wrote:
 Hi.

 Currently cervisia is licensed under the QPL.  As the maintainer of
 kdesdk in debian, I am unfortunately faced with having to remove
 cervisia from the debian distribution since the QPL does not meet
 with debian's free software guidelies.  Of course this is debian's
 decision, but nevertheless it seems worth bringing up the two
 specific issues that concern us:

Sometimes I don't know if I should laugh or cry when I hear about 
Debian's license issues. If this will become too anoying people will 
just switch their distribution.

BTW, about which KDE version do we talk? Is it enough if we change the 
license in CVS HEAD aka KDE 4 (maybe 3.5)?

 Given these issues, is it possible to consider altering the licensing
 for cervisia in any way?  Possibilities are as follows:

 2. Alternatively it might be worth considering a dual license for
 cervisia, similar to what Trolltech has done with Qt.

I'm fine with the GPL too. Do we really need/want a dual license?


Cheers,
André



Bug#288829: marked as done (apt-proxy - opens database files as root)

2005-02-25 Thread Debian Bug Tracking System
Your message dated Fri, 25 Feb 2005 16:02:17 -0500
with message-id [EMAIL PROTECTED]
and subject line Bug#288829: fixed in apt-proxy 1.9.27
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 5 Jan 2005 21:28:49 +
From [EMAIL PROTECTED] Wed Jan 05 13:28:49 2005
Return-path: [EMAIL PROTECTED]
Received: from wavehammer.waldi.eu.org [82.139.196.55] (postfix)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CmIi0-00055L-00; Wed, 05 Jan 2005 13:28:49 -0800
Received: by wavehammer.waldi.eu.org (Postfix, from userid 1000)
id 727463C025; Wed,  5 Jan 2005 22:28:44 +0100 (CET)
Date: Wed, 5 Jan 2005 22:28:44 +0100
From: Bastian Blank [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: apt-proxy - opens database files as root
Message-ID: [EMAIL PROTECTED]
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol=application/pgp-signature; boundary=W/nzBZO5zC0uMSeA
Content-Disposition: inline
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 


--W/nzBZO5zC0uMSeA
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: apt-proxy
Version: 1.9.24
Severity: grave

I deleted the database as it was out of sync and the new is owned by
root.

Bastian

--=20
I'm a soldier, not a diplomat.  I can only tell the truth.
-- Kirk, Errand of Mercy, stardate 3198.9

--W/nzBZO5zC0uMSeA
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: Digital signature
Content-Disposition: inline

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (GNU/Linux)

iEYEARECAAYFAkHcXAwACgkQnw66O/MvCNFBhQCfVMWZD5f/9yTIuhhhSuq9OvdM
5IYAoKAC04SNchNYgBFzrVZyKuZ2WCfH
=HRVz
-END PGP SIGNATURE-

--W/nzBZO5zC0uMSeA--

---
Received: (at 288829-close) by bugs.debian.org; 25 Feb 2005 21:08:07 +
From [EMAIL PROTECTED] Fri Feb 25 13:08:07 2005
Return-path: [EMAIL PROTECTED]
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1D4mgx-0008LL-00; Fri, 25 Feb 2005 13:08:07 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1D4mbJ-0005ZJ-00; Fri, 25 Feb 2005 16:02:17 -0500
From: Chris Halls [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#288829: fixed in apt-proxy 1.9.27
Message-Id: [EMAIL PROTECTED]
Sender: Archive Administrator [EMAIL PROTECTED]
Date: Fri, 25 Feb 2005 16:02:17 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: apt-proxy
Source-Version: 1.9.27

We believe that the bug you reported is fixed in the latest version of
apt-proxy, which is due to be installed in the Debian FTP archive:

apt-proxy_1.9.27.dsc
  to pool/main/a/apt-proxy/apt-proxy_1.9.27.dsc
apt-proxy_1.9.27.tar.gz
  to pool/main/a/apt-proxy/apt-proxy_1.9.27.tar.gz
apt-proxy_1.9.27_all.deb
  to pool/main/a/apt-proxy/apt-proxy_1.9.27_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Chris Halls [EMAIL PROTECTED] (supplier of updated apt-proxy package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 25 Feb 2005 20:53:20 +
Source: apt-proxy
Binary: apt-proxy
Architecture: source all
Version: 1.9.27
Distribution: unstable
Urgency: low
Maintainer: Otavio Salvador [EMAIL PROTECTED]
Changed-By: Chris Halls [EMAIL PROTECTED]
Description: 
 apt-proxy  - Debian archive proxy and partial mirror builder 

Bug#296935: Setting up of webcalendar fails

2005-02-25 Thread Justin Pryzby
On Fri, Feb 25, 2005 at 09:42:43PM +0100, Filippo Rusconi wrote:
 Package: webcalendar
 Version: 0.9.45-3
 Severity: grave
 Justification: renders package unusable
 
 The Setting up of webcalendar fails with following output:
 
 Setting up webcalendar (0.9.45-3) ...
 Search pattern not terminated at -e line 1.
Could you edit /var/lib/dpkg/info/webcalendar.postinst and add the
following as line #2: set -x.  Then try to complete the webcalendar
configuration.  Send the output to me, and Cc: the bug.

FWIW, this works for me on a new installation.  I suspect that the
perl script is causing problems, but can't see how (and I'd like to
confirm this first of all).

Justin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#296935: Setting up of webcalendar fails

2005-02-25 Thread Filippo Rusconi
Hello, 

thanks for answering the bug report.

I did as you requested, and then tried an install of the package. This
is the output:

Setting up webcalendar (0.9.45-3) ...
+ Version=0.9.45-1
+ set -e
+ . /usr/share/debconf/confmodule
++ '[' '!' '' ']'
++ PERL_DL_NONLAZY=1
++ export PERL_DL_NONLAZY
++ exec /usr/share/debconf/frontend /var/lib/dpkg/info/webcalendar.postinst 
configure ''
+ Version=0.9.45-1
+ set -e
+ . /usr/share/debconf/confmodule
++ '[' '!' 1 ']'
++ '[' -z '' ']'
++ exec
++ DEBCONF_REDIR=1
++ export DEBCONF_REDIR
+ case $1 in
+ '[' '!' ']'
+ configure
+ CONF_FILE=/etc/webcalendar/settings.php
+ CF_TEMPLATE=/etc/webcalendar/settings.php.tpl
+ db_get webcalendar/status/debconf_managed
+ _db_cmd 'GET webcalendar/status/debconf_managed'
+ echo 'GET webcalendar/status/debconf_managed'
+ local 'IFS=
'
+ local _LINE
+ read -r _LINE
+ RET=true
+ return 0
+ '[' true = false ']'
+ db_get webcalendar/conf/db_type
+ _db_cmd 'GET webcalendar/conf/db_type'
+ echo 'GET webcalendar/conf/db_type'
+ local 'IFS=
'
+ local _LINE
+ read -r _LINE
+ RET=mysql
+ return 0
+ DB_TYPE=mysql
+ db_get webcalendar/conf/db_host
+ _db_cmd 'GET webcalendar/conf/db_host'
+ echo 'GET webcalendar/conf/db_host'
+ local 'IFS=
'
+ local _LINE
+ read -r _LINE
+ RET=localhost
+ return 0
+ DB_HOST=localhost
+ db_get webcalendar/conf/db_login
+ _db_cmd 'GET webcalendar/conf/db_login'
+ echo 'GET webcalendar/conf/db_login'
+ local 'IFS=
'
+ local _LINE
+ read -r _LINE
+ RET=webcalsqlusername
+ return 0
+ DB_LOGIN=webcalsqlusername
+ db_get webcalendar/conf/db_password
+ _db_cmd 'GET webcalendar/conf/db_password'
+ echo 'GET webcalendar/conf/db_password'
+ local 'IFS=
'
+ local _LINE
+ read -r _LINE
+ [EMAIL PROTECTED]
+ return 0
+ [EMAIL PROTECTED]
+ db_get webcalendar/conf/db_database
+ _db_cmd 'GET webcalendar/conf/db_database'
+ echo 'GET webcalendar/conf/db_database'
+ local 'IFS=
'
+ local _LINE
+ read -r _LINE
+ RET=webcalname
+ return 0
+ DB_DATABASE=webcalname
+ db_get webcalendar/conf/db_persistent
+ _db_cmd 'GET webcalendar/conf/db_persistent'
+ echo 'GET webcalendar/conf/db_persistent'
+ local 'IFS=
'
+ local _LINE
+ read -r _LINE
+ RET=true
+ return 0
+ DB_PERSISTENT=true
+ db_get webcalendar/conf/use_http_auth
+ _db_cmd 'GET webcalendar/conf/use_http_auth'
+ echo 'GET webcalendar/conf/use_http_auth'
+ local 'IFS=
'
+ local _LINE
+ read -r _LINE
+ RET=false
+ return 0
+ USE_HTTP_AUTH=false
+ db_get webcalendar/conf/single_user_mode
+ _db_cmd 'GET webcalendar/conf/single_user_mode'
+ echo 'GET webcalendar/conf/single_user_mode'
+ local 'IFS=
'
+ local _LINE
+ read -r _LINE
+ RET=false
+ return 0
+ SINGLE_USER_MODE=false
+ db_get webcalendar/conf/single_user_login
+ _db_cmd 'GET webcalendar/conf/single_user_login'
+ echo 'GET webcalendar/conf/single_user_login'
+ local 'IFS=
'
+ local _LINE
+ read -r _LINE
+ RET=
+ return 0
+ SINGLE_USER_LOGIN=
+ '[' false = true ']'
+ SINGLE_USER_MODE=N
+ cat /etc/webcalendar/settings.php.tpl
+ perl -e ' my %CF_REPLACE = ( '\''DB_TYPE'\''   = 
mysql, '\''DB_HOST'\''   = localhost, 
'\''DB_TYPE'\''   = mysql, '\''DB_HOST'\''   = 
localhost, '\''DB_LOGIN'\''  = webcalsqlusername,  
   '\''DB_PASSWORD'\''   = [EMAIL PROTECTED], 
'\''DB_DATABASE'\''   = webcalname, '\''DB_PERSISTENT'\'' 
= true, '\''USE_HTTP_AUTH'\'' = false, 
'\''SINGLE_USER_MODE'\''  = N,   '\''SINGLE_USER_LOGIN'\'' =  );  
   while (my $line = STDIN) { foreach my $search (keys 
%CF_REPLACE) { my $replace = $CF_REPLACE{$search};  
   $line =~ s/DEBCONF::$search/$replace/g; } print 
$line;
} '
Search pattern not terminated at -e line 1.
dpkg: error processing webcalendar (--configure):
 subprocess post-installation script returned error exit status 255
Errors were encountered while processing:
 webcalendar
E: Sub-process /usr/bin/dpkg returned an error code (1)


Hope this helps,

Ciao,

Filippo



signature.asc
Description: Digital signature


Bug#296935: Setting up of webcalendar fails

2005-02-25 Thread Justin Pryzby
On Fri, Feb 25, 2005 at 10:53:48PM +0100, Filippo Rusconi wrote:
 Hello, 
 
 thanks for answering the bug report.
 
 I did as you requested, and then tried an install of the package. This
 is the output:
Okay, it is as I suspected; perl is somehow causing the problem.

 + [EMAIL PROTECTED]
If that wasn't a temporary password before, then it should be now.

I'm including this below for reference of the maintainer.
 + cat /etc/webcalendar/settings.php.tpl

 + perl -e '
my %CF_REPLACE = ('
 \''DB_TYPE'\''= mysql,
 '\''DB_HOST'\''   = localhost,
 '\''DB_TYPE'\''   = mysql,
 '\''DB_HOST'\''   = localhost,
 '\''DB_LOGIN'\''  = webcalsqlusername,
 '\''DB_PASSWORD'\''   = [EMAIL PROTECTED],
 '\''DB_DATABASE'\''   = webcalname,
 '\''DB_PERSISTENT'\'' = true,
 '\''USE_HTTP_AUTH'\'' = false,
 '\''SINGLE_USER_MODE'\''  = N,
 '\''SINGLE_USER_LOGIN'\'' =  );

while (my $line = STDIN) {
foreach my $search (keys %CF_REPLACE) {
my $replace = $CF_REPLACE{$search};
$line =~ s/DEBCONF::$search/$replace/g;
}

print $line;
}
'

The problem may be that the DB_PASSWORD line is unable to handle an @
sign (though I cannot reproduce it).  Can you try running
dpkg-reconfigure webcalendar, and entering a purely alphanumeric
password?

It may also be that it is unable to deal with SINGLE_USER_LOGIN being
null (though I suspect that this is okay, since that how my install
should look).

Other comments for the maintainer: the s/DEBCONF::// should be
anchored, and doesn't seem to need the /g modifier:

$line =~ s/^.*?: DEBCONF/;

Also, the .tpl (template?) file should be installed into
/usr/share/webcalendar, and not into /etc/, since it is not a
configuration file.

Justin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#296732: FTBS cause found

2005-02-25 Thread David Schmitt
Hi!

3dwm has an additional Build-Dep on libxmu-dev. Without this, the configure 
test will fail. It also tests for libglut, but doesn't seem to require it.


Regards, David
-- 
- hallo... wie gehts heute?
- *hust* gut *rotz* *keuch*
- gott sei dank kommunizieren wir über ein septisches medium ;)
 -- Matthias Leeb, Uni f. angewandte Kunst, 2005-02-15



Processed: small fixes

2005-02-25 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 retitle 293195 concurrent usage of snd_cmipci and sk98lin freezes system
Bug#293195: 
=?utf-8?q?kernel-image-2=2E6=2E10-1-k7=3A_concurrent_usage_of_snd=5Fcmipc?= 
=?utf-8?q?i_and_sk98lin_freezes_system=0D=0AHello=2C?=
Changed Bug title.

 flags 295344 - unreproducible
Unknown command or malformed arguments to command.

 flags 296732 + patch
Unknown command or malformed arguments to command.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#294501: Question regarding apache-crash

2005-02-25 Thread David Schmitt
Hi Matt, *!

Do you have ulimits (max RAM, max CPU or so) enabled on your system? A friend 
of mine had apache crashing without useful errormessages after memory 
limiting apache and installing another module and thus exceeding the 
allowance...


Regards, David
-- 
- hallo... wie gehts heute?
- *hust* gut *rotz* *keuch*
- gott sei dank kommunizieren wir über ein septisches medium ;)
 -- Matthias Leeb, Uni f. angewandte Kunst, 2005-02-15



Bug#295344: reproduced on current sid

2005-02-25 Thread David Schmitt
Hi Siggi, *!

I could reproduce this on a current sid machine:

[EMAIL PROTECTED]:~$ [EMAIL PROTECTED] gxine  /tmp/gxine.out 21 
Segmentation fault
[EMAIL PROTECTED]:~$ 

Here is also the backtrace from gdb, sorry no debugging info:

Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread -1209551200 (LWP 15178)]
0x43aac4d0 in g_markup_parse_context_get_position () 
from /usr/lib/libglib-2.0.so.0
(gdb) bt full
#0  0x43aac4d0 in g_markup_parse_context_get_position () 
from /usr/lib/libglib-2.0.so.0
No symbol table info available.
#1  0x43aac5b5 in g_markup_escape_text () from /usr/lib/libglib-2.0.so.0
No symbol table info available.
#2  0x080584a3 in mediamarks_init ()
No symbol table info available.
#3  0x08058606 in mediamarks_init ()
No symbol table info available.
#4  0x08058cdb in mediamarks_init ()
No symbol table info available.
#5  0x08058f76 in preferences_init ()
No symbol table info available.
#6  0x08055bb4 in main ()
No symbol table info available.
(gdb) 


Using my default UTF-8 locale works without problem.

Regards, David

-- 
- hallo... wie gehts heute?
- *hust* gut *rotz* *keuch*
- gott sei dank kommunizieren wir über ein septisches medium ;)
 -- Matthias Leeb, Uni f. angewandte Kunst, 2005-02-15
Using netbios name ZION.
Using workgroup NETZFUERDUMMIES.

(gxine:15098): Gtk-WARNING **: Invalid input string

(gxine:15098): Gtk-WARNING **: Invalid input string

(gxine:15098): Gtk-WARNING **: Invalid input string

(gxine:15098): Gtk-WARNING **: Invalid input string

(gxine:15098): Gtk-WARNING **: Invalid input string

(gxine:15098): Gtk-WARNING **: Invalid input string

(gxine:15098): Gtk-WARNING **: Invalid input string

(gxine:15098): Gtk-WARNING **: Invalid input string

(gxine:15098): Gtk-WARNING **: Invalid input string

(gxine:15098): Gtk-WARNING **: Invalid input string

(gxine:15098): Gtk-WARNING **: Invalid input string

(gxine:15098): Gtk-WARNING **: Invalid input string

(gxine:15098): Gtk-WARNING **: Invalid input string

(gxine:15098): Gtk-WARNING **: Invalid input string

(gxine:15098): Gtk-WARNING **: Failed to set label from markup due to error 
parsing markup: Error on line 2 char 9: Invalid UTF-8 encoded text

(gxine:15098): Pango-WARNING **: Invalid UTF-8 string passed to 
pango_layout_set_text()

(gxine:15098): Gtk-WARNING **: Failed to set label from markup due to error 
parsing markup: Error on line 2 char 9: Invalid UTF-8 encoded text

(gxine:15098): Gtk-WARNING **: Failed to set label from markup due to error 
parsing markup: Error on line 2 char 9: Invalid UTF-8 encoded text

(gxine:15098): Gtk-WARNING **: Failed to set label from markup due to error 
parsing markup: Error on line 2 char 9: Invalid UTF-8 encoded text

(gxine:15098): Gtk-WARNING **: Failed to set label from markup due to error 
parsing markup: Error on line 2 char 9: Invalid UTF-8 encoded text

(gxine:15098): Gtk-WARNING **: Failed to set label from markup due to error 
parsing markup: Error on line 2 char 9: Invalid UTF-8 encoded text


Bug#294501: Question regarding apache-crash

2005-02-25 Thread Matt Brown
Hi David, 

On Sat, 2005-02-26 at 00:42 +0100, David Schmitt wrote:

 Do you have ulimits (max RAM, max CPU or so) enabled on your system? A friend 
 of mine had apache crashing without useful errormessages after memory 
 limiting apache and installing another module and thus exceeding the 
 allowance...

There are no ulimits enabled on the system that I am aware of (ie. It's
a bog standard sarge install, which afaik doesn't setup ulimits by
default, if it does there may be some, but I haven't setup any myself). 

Regards

-- 
Matt Brown
[EMAIL PROTECTED]
Mob +64 275 611 544 www.mattb.net.nz



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: tagging 296732

2005-02-25 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.8.10
 tags 296732 patch
Bug#296732: 3dwm: FTBFS: Fails to detect OpenGL
There were no tags set.
Tags added: patch


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: tagging 295344

2005-02-25 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.8.10
 tags 295344 - unreproducible
Bug#295344: segfaults on startup
Tags were: unreproducible
Tags removed: unreproducible


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#295624: patch

2005-02-25 Thread Joey Hess
Of course I forgot the patch..

diff -ur old/kernel-image-speakup-i386-2.4.27/debian/changelog 
kernel-image-speakup-i386-2.4.27/debian/changelog
--- old/kernel-image-speakup-i386-2.4.27/debian/changelog   2004-08-19 
15:41:32.0 -0400
+++ kernel-image-speakup-i386-2.4.27/debian/changelog   2005-02-25 
15:30:28.0 -0500
@@ -1,3 +1,17 @@
+kernel-image-speakup-i386 (2.4.27-1.1) unstable; urgency=HIGH
+
+  * NMU
+  * Rebuilt with version -8 of the kernel source package to fix numerous
+security holes, including CAN-2005-0001 and CAN-2004-1235.
+Closes: #295624
+  * Warning! The security fixes introduced an ABI change in the kernel module
+interface. Kernel modules built for previous versions of this package will
+not work with the new one, nor the new kernel's modules work with older
+versions of the -speakup kernel. Please take appropriate care when
+upgrading.
+
+ -- Joey Hess [EMAIL PROTECTED]  Fri, 25 Feb 2005 15:27:22 -0500
+
 kernel-image-speakup-i386 (2.4.27-1) unstable; urgency=low
 
   * New kernel minor version (closes: #266900)
diff -ur old/kernel-image-speakup-i386-2.4.27/debian/control 
kernel-image-speakup-i386-2.4.27/debian/control
--- old/kernel-image-speakup-i386-2.4.27/debian/control 2004-08-19 
14:23:49.0 -0400
+++ kernel-image-speakup-i386-2.4.27/debian/control 2005-02-25 
15:27:18.0 -0500
@@ -3,7 +3,7 @@
 Priority: optional
 Maintainer: Mario Lang [EMAIL PROTECTED]
 Standards-Version: 3.6.1
-Build-Depends: debhelper (= 2), modutils, kernel-tree-2.4.27-3, 
kernel-package (= 8.042), kernel-patch-speakup (= 20040506-1), transfig
+Build-Depends: debhelper (= 2), modutils, kernel-tree-2.4.27-8, 
kernel-package (= 8.042), kernel-patch-speakup (= 20040506-1), transfig
 
 Package: kernel-doc-2.4.27-speakup
 Architecture: all

-- 
see shy jo


signature.asc
Description: Digital signature


Bug#295624: NMU diff

2005-02-25 Thread Joey Hess
I'm NMUing the speakup kernel so we can get the security fixes in place
in time for d-i rc3. I've attached the NMU diff.

I'm not very pleased to have to do this, since while I've tested the new
kernel in d-i, I don't have the actual hardware or knowledge to test the
speakup bits of it. The patch still applied, with some offsets, so I
hope it's ok.

-- 
see shy jo


signature.asc
Description: Digital signature


Processed: Fixed in NMU of kernel-image-speakup-i386 2.4.27-1.1

2005-02-25 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tag 295624 + fixed
Bug#295624: not yet rebuilt with security fixes
Tags were: security
Tags added: fixed

 quit
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#296395: marked as done (gmailfs: No Module Named Profile)

2005-02-25 Thread Debian Bug Tracking System
Your message dated Fri, 25 Feb 2005 18:23:36 -0800
with message-id [EMAIL PROTECTED]
and subject line 296395 is closed in 0.3-5
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 22 Feb 2005 07:57:20 +
From [EMAIL PROTECTED] Mon Feb 21 23:57:20 2005
Return-path: [EMAIL PROTECTED]
Received: from roberto-salvateri-158-25-179-208.teknofx.com 
(ns.internettico.com) [208.179.25.158] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1D3Uv2-Jk-00; Mon, 21 Feb 2005 23:57:20 -0800
Received: from root by ns.internettico.com with local (Exim 4.34 #1 (Debian))
id 1D3W2n-0002nX-S6
for [EMAIL PROTECTED]; Tue, 22 Feb 2005 01:09:25 -0800
Content-Type: text/plain; charset=us-ascii
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Roberto Salvatierra [EMAIL PROTECTED]
To: Debian Bug Tracking System [EMAIL PROTECTED]
Subject: gmailfs: No Module Named Profile
X-Mailer: reportbug 3.8
Date: Tue, 22 Feb 2005 01:09:25 -0800
Message-Id: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: gmailfs
Version: 0.2-4
Severity: grave
Justification: renders package unusable

Looks Like a dependency in python is never filled , 
the module called profile is neveer found, it's listed
as part of Phyton, but it's not in there, maybe I should have reported 
it as a phython error but it gave me the error while trying to use
gmailfs 

mount -t gmailfs none /gmail
[EMAIL PROTECTED],password=,fsname=zOlRRa
ns:/home# Traceback (most recent call last):
  File /usr/share/gmailfs/gmailfs.py, line 814, in ?
import profile
ImportError: No module named profile

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.4.27
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages gmailfs depends on:
ii  fuse-utils   1.3-1   Filesystem in USErspace (utilities
ii  python   2.3.4-5 An interactive high-level object-o
ii  python-fuse  1.3-1   Python bindings for FUSE (Filesyst
ii  python-libgmail  0.0.8+cvs20041108-2 Python bindings to access Gmail ac

-- no debconf information

---
Received: (at 296395-done) by bugs.debian.org; 26 Feb 2005 02:24:12 +
From [EMAIL PROTECTED] Fri Feb 25 18:24:12 2005
Return-path: [EMAIL PROTECTED]
Received: from pop.gmx.net (mail.gmx.net) [213.165.64.20] 
by spohr.debian.org with smtp (Exim 3.35 1 (Debian))
id 1D4rcq-dN-00; Fri, 25 Feb 2005 18:24:12 -0800
Received: (qmail invoked by alias); 26 Feb 2005 02:23:40 -
Received: from adsl-63-206-92-147.dsl.snfc21.pacbell.net (EHLO localhost) 
(63.206.92.147)
  by mail.gmx.net (mp026) with SMTP; 26 Feb 2005 03:23:40 +0100
X-Authenticated: #18275278
Received: from foo.befour.org ([10.0.0.6])
by localhost with esmtp (Exim 3.36 #1 )
id 1D4rcH-0005A3-00
for [EMAIL PROTECTED]; Fri, 25 Feb 2005 18:23:37 -0800
Received: from seb by foo.befour.org with local (Exim 3.36 #1 (Debian))
id 1D4rcG-0003aB-00
for [EMAIL PROTECTED]; Fri, 25 Feb 2005 18:23:36 -0800
Date: Fri, 25 Feb 2005 18:23:36 -0800
From: Sebastien Delafond [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: 296395 is closed in 0.3-5
Message-ID: [EMAIL PROTECTED]
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.6+20040907i
Sender: Seb [EMAIL PROTECTED]
X-Y-GMX-Trusted: 0
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-2.0 required=4.0 tests=BAYES_00,SPAMBUGNUMSUBJ 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 2

 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: reopening bug

2005-02-25 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 reopen 260808
Bug#260808: avifile-player: Crashed X
Bug reopened, originator not changed.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#260808: reopening bug

2005-02-25 Thread Erich Schubert
reopen 260808
thanks

Reopening this bug report.
You must not close bugs in changelogs if you did not *change* anything.
Please handle this bug report correclty.

Greetings,
Erich Schubert
-- 
   erich@(vitavonni.de|debian.org)--GPG Key ID: 4B3A135C(o_
 Which is worse: ignorance or apathy? Who knows? Who cares? //\
Der Anfang aller Erkenntnis ist das Staunen. --- AristotelesV_/_


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#296975: installing udev on running system left me with a /dev/null that was not a device file

2005-02-25 Thread Joey Hess
Package: udev
Version: 0.053-1
Severity: grave

I installed gnome on a running system and this pulled in udev. After the
installation was complete, I noticed that /dev/null was not a device,
was only writable by root, and probably contained some output redirected from
some program that ran during the upgrade. Unfortunatly I did not think
to examine the contents before rebooting, so I don't know what program
wrote to it.

My guess is some kind of a race between udev moving the old /dev out of
the way and creating the new /dev/null device. Either some other program on
the system or a program running as part of the upgrade opened /dev/null
in between and ended up creating a regular file in it's place.

I've set the severity to grave because this did break the system pretty
badly, for non-root users, until I rebooted it.

FWIW, after the reboot, /dev/null was a proper device created by udev.

This seems somewhat similar to the bug described in #296776, but I did
have a lot of other devices in /dev.

-- Package-specific info:
-- /etc/udev/rules.d/:
/etc/udev/rules.d/:
total 0
lrwxrwxrwx  1 root root 19 Feb 25 23:01 cd-aliases.rules - ../cd-aliases.rules
lrwxrwxrwx  1 root root 13 Feb 25 23:01 udev.rules - ../udev.rules
lrwxrwxrwx  1 root root 12 Feb 25 22:51 z_hal-plugdev.rules - ../hal.rules

-- /sys/:
/sys/block/dm-0/dev
/sys/block/dm-1/dev
/sys/block/dm-2/dev
/sys/block/dm-3/dev
/sys/block/dm-4/dev
/sys/block/fd0/dev
/sys/block/hda/dev
/sys/block/hda/hda1/dev
/sys/block/hda/hda2/dev
/sys/block/hda/hda3/dev
/sys/block/hdc/dev
/sys/block/hdd/dev
/sys/block/hdd/hdd1/dev
/sys/block/hdd/hdd2/dev
/sys/block/hdd/hdd3/dev
/sys/block/loop0/dev
/sys/block/loop1/dev
/sys/block/loop2/dev
/sys/block/loop3/dev
/sys/block/loop4/dev
/sys/block/loop5/dev
/sys/block/loop6/dev
/sys/block/loop7/dev
/sys/block/md0/dev
/sys/block/md1/dev
/sys/block/md10/dev
/sys/block/md100/dev
/sys/block/md101/dev
/sys/block/md102/dev
/sys/block/md103/dev
/sys/block/md104/dev
/sys/block/md105/dev
/sys/block/md106/dev
/sys/block/md107/dev
/sys/block/md108/dev
/sys/block/md109/dev
/sys/block/md11/dev
/sys/block/md110/dev
/sys/block/md111/dev
/sys/block/md112/dev
/sys/block/md113/dev
/sys/block/md114/dev
/sys/block/md115/dev
/sys/block/md116/dev
/sys/block/md117/dev
/sys/block/md118/dev
/sys/block/md119/dev
/sys/block/md12/dev
/sys/block/md120/dev
/sys/block/md121/dev
/sys/block/md122/dev
/sys/block/md123/dev
/sys/block/md124/dev
/sys/block/md125/dev
/sys/block/md126/dev
/sys/block/md127/dev
/sys/block/md128/dev
/sys/block/md129/dev
/sys/block/md13/dev
/sys/block/md130/dev
/sys/block/md131/dev
/sys/block/md132/dev
/sys/block/md133/dev
/sys/block/md134/dev
/sys/block/md135/dev
/sys/block/md136/dev
/sys/block/md137/dev
/sys/block/md138/dev
/sys/block/md139/dev
/sys/block/md14/dev
/sys/block/md140/dev
/sys/block/md141/dev
/sys/block/md142/dev
/sys/block/md143/dev
/sys/block/md144/dev
/sys/block/md145/dev
/sys/block/md146/dev
/sys/block/md147/dev
/sys/block/md148/dev
/sys/block/md149/dev
/sys/block/md15/dev
/sys/block/md150/dev
/sys/block/md151/dev
/sys/block/md152/dev
/sys/block/md153/dev
/sys/block/md154/dev
/sys/block/md155/dev
/sys/block/md156/dev
/sys/block/md157/dev
/sys/block/md158/dev
/sys/block/md159/dev
/sys/block/md16/dev
/sys/block/md160/dev
/sys/block/md161/dev
/sys/block/md162/dev
/sys/block/md163/dev
/sys/block/md164/dev
/sys/block/md165/dev
/sys/block/md166/dev
/sys/block/md167/dev
/sys/block/md168/dev
/sys/block/md169/dev
/sys/block/md17/dev
/sys/block/md170/dev
/sys/block/md171/dev
/sys/block/md172/dev
/sys/block/md173/dev
/sys/block/md174/dev
/sys/block/md175/dev
/sys/block/md176/dev
/sys/block/md177/dev
/sys/block/md178/dev
/sys/block/md179/dev
/sys/block/md18/dev
/sys/block/md180/dev
/sys/block/md181/dev
/sys/block/md182/dev
/sys/block/md183/dev
/sys/block/md184/dev
/sys/block/md185/dev
/sys/block/md186/dev
/sys/block/md187/dev
/sys/block/md188/dev
/sys/block/md189/dev
/sys/block/md19/dev
/sys/block/md190/dev
/sys/block/md191/dev
/sys/block/md192/dev
/sys/block/md193/dev
/sys/block/md194/dev
/sys/block/md195/dev
/sys/block/md196/dev
/sys/block/md197/dev
/sys/block/md198/dev
/sys/block/md199/dev
/sys/block/md2/dev
/sys/block/md20/dev
/sys/block/md200/dev
/sys/block/md201/dev
/sys/block/md202/dev
/sys/block/md203/dev
/sys/block/md204/dev
/sys/block/md205/dev
/sys/block/md206/dev
/sys/block/md207/dev
/sys/block/md208/dev
/sys/block/md209/dev
/sys/block/md21/dev
/sys/block/md210/dev
/sys/block/md211/dev
/sys/block/md212/dev
/sys/block/md213/dev
/sys/block/md214/dev
/sys/block/md215/dev
/sys/block/md216/dev
/sys/block/md217/dev
/sys/block/md218/dev
/sys/block/md219/dev
/sys/block/md22/dev
/sys/block/md220/dev
/sys/block/md221/dev
/sys/block/md222/dev
/sys/block/md223/dev
/sys/block/md224/dev
/sys/block/md225/dev
/sys/block/md226/dev
/sys/block/md227/dev
/sys/block/md228/dev
/sys/block/md229/dev
/sys/block/md23/dev
/sys/block/md230/dev
/sys/block/md231/dev
/sys/block/md232/dev
/sys/block/md233/dev
/sys/block/md234/dev

Bug#295112: clamsmtp requires newer start-stop-daemon, but can be installed without

2005-02-25 Thread Chad Walstrom
Brian Ristuccia wrote:
 Package: clamsmtp
 Version: 1.2-3
 Severity: serious
 
 The init.d script for clamsmtp breaks with start-stop-daemon in dpkg
 (1.9.21) because it doesn't provide the --group option. It needs to use one
 of the various dependancy mechanisms to make sure a newer dpkg providing
 this option gets upgraded on install. Clamsmtp doesn't work unless the
 init.d script is manually edited or dpkg is manually upgraded.

Although, I agree that this is a policy error, the scope of the error
only applies to back porting the package.  In any case, I added the
dependency checking to the control file as suggested.

I've been debating whether or not to add a dedicated system user and
group for clamsmtp for a number of reasons.  Although there is no policy
mandating daemons run as their own user and group, doing so might make
things a bit more flexible and secure for the daemon.

Now that clamsmtp can actually run scripts, I'm not too comfortable
having it run as clamav:clamav.  A systems administrator may have added
the clamav user to priveleged groups for scanning protected filesystems.
A poorly written and exploited script run from clamsmtp may now have
access to these documents.  Granted, it might not be likely such an
attack would be probable or even successful, there's no reason to tempt
fate.

Essentially, if I were to add a clamsmtp:clamsmtp user/group and add
clamav to the clamsmtp group so it would have access to the quarantine
directory, I wouldn't need to worry about the --group switch to
start-stop-daemon.  As a result, the package would be easier to
back-port to sarge.

There is some fragility to this setup, in the face of system
administrator customizations.  However, we can be reasonably certain
that the user and group clamav:clamav will be install.

-- 
Chad Walstrom [EMAIL PROTECTED]   http://www.wookimus.net/
   assert(expired(knowledge)); /* core dump */


signature.asc
Description: Digital signature


Bug#295112: marked as done (clamsmtp requires newer start-stop-daemon, but can be installed without)

2005-02-25 Thread Debian Bug Tracking System
Your message dated Sat, 26 Feb 2005 01:02:09 -0500
with message-id [EMAIL PROTECTED]
and subject line Bug#295112: fixed in clamsmtp 1.2-4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 13 Feb 2005 19:55:08 +
From [EMAIL PROTECTED] Sun Feb 13 11:55:08 2005
Return-path: [EMAIL PROTECTED]
Received: from h006067091a61.ne.client2.attbi.com (osiris.978.org) 
[24.61.206.174] (qmailr)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1D0Ppj-0001zJ-00; Sun, 13 Feb 2005 11:55:08 -0800
Received: (qmail 30384 invoked by uid 1000); 13 Feb 2005 19:55:05 -
Date: Sun, 13 Feb 2005 14:55:05 -0500
From: Brian Ristuccia [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: clamsmtp requires newer start-stop-daemon, but can be installed without
Message-ID: [EMAIL PROTECTED]
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.3.28i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: clamsmtp
Version: 1.2-3
Severity: serious

The init.d script for clamsmtp breaks with start-stop-daemon in dpkg
(1.9.21) because it doesn't provide the --group option. It needs to use one
of the various dependancy mechanisms to make sure a newer dpkg providing
this option gets upgraded on install. Clamsmtp doesn't work unless the
init.d script is manually edited or dpkg is manually upgraded.

-- 
Brian Ristuccia
[EMAIL PROTECTED]

---
Received: (at 295112-close) by bugs.debian.org; 26 Feb 2005 06:08:03 +
From [EMAIL PROTECTED] Fri Feb 25 22:08:03 2005
Return-path: [EMAIL PROTECTED]
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1D4v7T-00073q-00; Fri, 25 Feb 2005 22:08:03 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1D4v1l-0007aT-00; Sat, 26 Feb 2005 01:02:09 -0500
From: Chad Walstrom [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#295112: fixed in clamsmtp 1.2-4
Message-Id: [EMAIL PROTECTED]
Sender: Archive Administrator [EMAIL PROTECTED]
Date: Sat, 26 Feb 2005 01:02:09 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 2

Source: clamsmtp
Source-Version: 1.2-4

We believe that the bug you reported is fixed in the latest version of
clamsmtp, which is due to be installed in the Debian FTP archive:

clamsmtp_1.2-4.diff.gz
  to pool/main/c/clamsmtp/clamsmtp_1.2-4.diff.gz
clamsmtp_1.2-4.dsc
  to pool/main/c/clamsmtp/clamsmtp_1.2-4.dsc
clamsmtp_1.2-4_i386.deb
  to pool/main/c/clamsmtp/clamsmtp_1.2-4_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Chad Walstrom [EMAIL PROTECTED] (supplier of updated clamsmtp package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 25 Feb 2005 22:48:15 -0600
Source: clamsmtp
Binary: clamsmtp
Architecture: source i386
Version: 1.2-4
Distribution: unstable
Urgency: low
Maintainer: Chad Walstrom [EMAIL PROTECTED]
Changed-By: Chad Walstrom [EMAIL PROTECTED]
Description: 
 clamsmtp   - virus-scanning SMTP proxy
Closes: 293614 295112 295672
Changes: 
 clamsmtp (1.2-4) unstable; urgency=low
 .
   * debian/clamsmtp.init: Corrected reference to /etc/default/clamsmtp.
 Closes: #295672
   * debian/control: Added versioned depends on dpkg.  Closes: #295112
   * debian/po/cs.po: Added Czech translation.  Thanks, Miroslav Kure
 [EMAIL PROTECTED].  Closes: #293614
Files: 
 7800739ac2210965090f97f9c0459706 600 

Bug#296976: sgml2x: FTBFS: Permission denied in ELinks

2005-02-25 Thread Daniel Schepler
Package: sgml2x
Severity: serious
Version: 1.0.0-8

From my build log, using pbuilder in an i386 chroot:

...
links -dump TODO-html/t1.htm TODO.txt
ELinks: Permission denied
make[1]: *** [TODO.txt] Error 1
make[1]: Leaving directory `/tmp/buildd/sgml2x-1.0.0'
make: *** [build-stamp] Error 2

I have no idea whether the bug is in sgml2x or elinks, so reassign if
appropriate.

-- System Information:
Debian Release: 3.1
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.9-9-amd64-k8
Locale: LANG=C, LC_CTYPE=C (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8)

-- 
Daniel Schepler  Please don't disillusion me.  I
[EMAIL PROTECTED]haven't had breakfast yet.
 -- Orson Scott Card


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#296977: gworkspace.app: GWorkspace doesn't start on a VNC 8bit display

2005-02-25 Thread Paolo
Package: gworkspace.app
Version: 0.6.5-3; reported 2005-02-26
Severity: grave
Justification: renders package unusable

hello,

well, it *might* work smoothly indeed, but the fact is that I'm accessing 
a Sarge sys via a vnc session at 8bit, and all I got is:

2005-02-26 06:59:40.000 GWorkspace[31699] NOTE: Only one display per host fully 
supported.
2005-02-26 06:59:40.000 GWorkspace[31699] WARNING - XGServer is unable to use 
the fast algorithm for writing to an 8-bit display on this host - the most 
likely reason being the StandardColormap RGB_BEST_MAP has not been installed.
2005-02-26 06:59:40.000 GWorkspace[31699] Unrecognized color masks: 
0007:0038:00c0 8
2005-02-26 06:59:40.000 GWorkspace[31699] Please report this along with details 
on your pixel format (ie. the four numbers above). (Or better yet, implement it 
and send me a patch.)

which leaves me with no other choice but use anoter filemanager, hence the
severity.

-- paolo


-- System Information
Debian Release: 3.0
Architecture: i386
Kernel: Linux npp 2.4.26-ss-fb-lm287 #1 Fri Jul 16 21:26:09 CEST 2004 i686
Locale: LANG=C, LC_CTYPE=C



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: fixed package has reached sarge

2005-02-25 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 289623 -sarge
Bug#289623: openoffice.org-thesaurus-it: should depend on openoffice.org
Tags were: patch sarge
Tags removed: sarge

 close 289623
Bug#289623: openoffice.org-thesaurus-it: should depend on openoffice.org
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug closed, send any further explanations to Rene Engelhard [EMAIL PROTECTED]

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#296912: marked as done (ipsec-tools: /etc/init.d/setkey restart is broken)

2005-02-25 Thread Debian Bug Tracking System
Your message dated Sat, 26 Feb 2005 01:47:07 -0500
with message-id [EMAIL PROTECTED]
and subject line Bug#296912: fixed in ipsec-tools 1:0.5-4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 25 Feb 2005 16:52:29 +
From [EMAIL PROTECTED] Fri Feb 25 08:52:29 2005
Return-path: [EMAIL PROTECTED]
Received: from smtp-3.hut.fi [130.233.228.93] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1D4ihZ-Eo-00; Fri, 25 Feb 2005 08:52:29 -0800
Received: from localhost (putosiko.hut.fi [130.233.228.114])
by smtp-3.hut.fi (8.12.10/8.12.10) with ESMTP id j1PGpv1H022210
for [EMAIL PROTECTED]; Fri, 25 Feb 2005 18:51:57 +0200
Received: from smtp-3.hut.fi ([130.233.228.93])
 by localhost (putosiko.hut.fi [130.233.228.114]) (amavisd-new, port 10024)
 with LMTP id 19930-25-8 for [EMAIL PROTECTED];
 Fri, 25 Feb 2005 18:51:57 +0200 (EET)
Received: from shakti.tky.hut.fi (shakti.tky.hut.fi [130.233.21.52])
by smtp-3.hut.fi (8.12.10/8.12.10) with SMTP id j1PGo6f9021957
for [EMAIL PROTECTED]; Fri, 25 Feb 2005 18:50:07 +0200
Received: (qmail 12537 invoked by uid 1000); 25 Feb 2005 16:50:06 -
Message-ID: [EMAIL PROTECTED]
Content-Type: text/plain; charset=us-ascii
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Tuomas Jormola [EMAIL PROTECTED]
To: Debian Bug Tracking System [EMAIL PROTECTED]
Subject: ipsec-tools: /etc/init.d/setkey restart is broken
X-Mailer: reportbug 3.8
Date: Fri, 25 Feb 2005 18:50:06 +0200
X-TKK-Virus-Scanned: by amavisd-new-2.1.2-hutcc at putosiko.hut.fi
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: ipsec-tools
Version: 1:0.5-3
Severity: grave
Justification: user security hole

In restart target of the setkey init script setkey is run with the
following command:

$SETKEY -f $SETKEY_CONF:

This fails of course since it appends ':' to the configuration file
name. Potential security hole introduced if the init script is used to
apply new secure configuration over previous insecure one but this fails
due to the typo in the script.

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.10
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages ipsec-tools depends on:
ii  libc6   2.3.2.ds1-20 GNU C Library: Shared libraries an
ii  libreadline55.0-10   GNU readline and history libraries

-- no debconf information

---
Received: (at 296912-close) by bugs.debian.org; 26 Feb 2005 06:53:04 +
From [EMAIL PROTECTED] Fri Feb 25 22:53:04 2005
Return-path: [EMAIL PROTECTED]
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1D4vp1-0007ex-00; Fri, 25 Feb 2005 22:53:04 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1D4vjH-0002AV-00; Sat, 26 Feb 2005 01:47:07 -0500
From: Ganesan Rajagopal [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#296912: fixed in ipsec-tools 1:0.5-4
Message-Id: [EMAIL PROTECTED]
Sender: Archive Administrator [EMAIL PROTECTED]
Date: Sat, 26 Feb 2005 01:47:07 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: ipsec-tools
Source-Version: 1:0.5-4

We believe that the bug you reported is fixed in the latest version of
ipsec-tools, which is due to be installed in the Debian FTP archive:

ipsec-tools_0.5-4.diff.gz
  to pool/main/i/ipsec-tools/ipsec-tools_0.5-4.diff.gz
ipsec-tools_0.5-4.dsc
  to pool/main/i/ipsec-tools/ipsec-tools_0.5-4.dsc
ipsec-tools_0.5-4_i386.deb
  to pool/main/i/ipsec-tools/ipsec-tools_0.5-4_i386.deb
racoon_0.5-4_i386.deb
  to pool/main/i/ipsec-tools/racoon_0.5-4_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have