Bug#299500: lincvs failed to start
Frank Lichtenheld a écrit : Adding a little piece of information: On Mon, Mar 14, 2005 at 03:21:33PM +0100, Mathieu Laurent wrote: Error when lincvs start: lincvs: Symbol `FamErrlist' has different size in shared object, consider re-linking Ok, the error message is definetly gamin specific, but I can't reproduce the extended CPU usage in either case. lincvs use 98% of cpu usage Gruesse, I had this usage of cpu on 2 different computer with debian/sid. The 2 cases came when I launch lincvs from the gnome-panel. Lincvs didn't start from a xterm. I get the old version of lincvs 1.3.2-4 and it works. Regards Mathieu -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299572: ntp-server: Fails to start after upgrade.
Same here. I bet we are bitten by bug 220 Segmentation fault: http://bugzilla.ntp.org/show_bug.cgi?id=220 It is marked as verified fixed since 2004-11-05. To switch to a cvs version is maybe not what you want at this time. On the other hand, this bug is really grave. I have to admit that I had segmentation faults (you can see them by running ntpd -n) already back in December and I missed to file a bug report. It was only on 2 experimental servers. I made a quick fix by using cvs version ntp-dev-4.2.0a-20041207, which just worked. This time, the segmentation fault is on my main workstation (current sid PowerBook), which otherwise runs very reliably. BTW, this Debian bug is probably related: #272511 ntp-server: Restart sometimes fails http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=272511 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#299525: libidn11 problem
Processing commands for [EMAIL PROTECTED]: severity 299525 important Bug#299525: ImportError: undefined symbol Severity set to `important'. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299525: libidn11 problem
severity 299525 important thanks On Tue, Mar 15, 2005 at 08:46:27AM +0100, Daniel Stenberg wrote: This problem is claimed to be fixed with libidn11 0.5.13-1.0 (http://packages.qa.debian.org/libi/libidn/news/1.html) ... since that closes #299319: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=299319 ... which this report is just a duplicate of. That would make this a non-RC bug in libcurl3, which has an insufficiently strict dependency on libidn11 that was induced by the libidn11 shlibs bug. (Non-RC because libidn11 was not in woody, so this doesn't affect upgrades from stable.) John, upgrading to the version of libidn11 in unstable should fix this problem for you. Thanks, -- Steve Langasek postmodern programmer signature.asc Description: Digital signature
Bug#299572: cannot find user `ntp'
Same thing here. But I get in logs the following line : Mar 15 09:06:35 nez-casse ntpd[12022]: Cannot find user `ntp' User ntp is present in /etc/passwd. -- Erwan David -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#292258: libgtksourceview-cil: Will have file clash with upcoming libgtksourceview-common (1.1.2)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 the fix is as simple as removing that file from the debian/install file... i might provide an NMU... if i see that this issue doesn't get solved. - -Pascal -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.0 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCNpy71Lfd97FsypURAhZLAJ4lNJpeuMPUU6m1Zo6ZrasZnfeT6wCeJSWL A0AwDQ/DwOvtLuICT4juL/I= =Ms2J -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299532: mysql-server: upgrade to 4.0.24-1 hangs up and init.d script goes to the neverland when called at startup
On Mon, Mar 14, 2005 at 07:19:06PM -0500, sean finney wrote: hi francesco, On Mon, Mar 14, 2005 at 07:57:37PM +0100, Francesco P. Lovergine wrote: Upgrading from 4.0.23-7 hangs up (apparently after stopping and trying starting, pinging the server does not return with pending processes running). This is true on two different boxes. This causes serious trouble if the box restarts, because startup at level 2 holds on at /etc/init.d/mysql run. Reinstalling 5.0.23-7 of course solves the issue. do you by any chance use ldap or anything else in nsswitch.conf? NIS client on one of the box. The other is a laptop with local accounts only. So nothing in nsswitch.conf for that one. I could set DEBIAN_SCRIPT_DEBUG=1 and provide you a report, anyway it hangs on $MYADMIN ping for ever. -- Francesco P. Lovergine -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299601: widelands hangs and grab keyboard and mouse
Package: widelands Version: build9-3 Severity: serious Justification: unknow After long play widelands cause hang all system and grab keyboard and mouse. It's not possible to do any thing so you must hard restrart computer. It's show occasionally but i got it 3 times. Marcin -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.8-2-686 Locale: LANG=pl_PL, LC_CTYPE=pl_PL (charmap=ISO-8859-2) Versions of packages widelands depends on: ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii libgcc1 1:3.4.3-6 GCC support library ii libsdl-image1 1.2.4-1image loading library for Simple D ii libsdl-net1.2 1.2.5-3network library for Simple DirectM ii libsdl-ttf2.0 2.0.6-5ttf library for Simple DirectMedia ii libsdl1.2debi 1.2.7+1.2.8cvs20041007-4.1 Simple DirectMedia Layer ii libstdc++51:3.3.5-8 The GNU Standard C++ Library v3 ii widelands-dat build9-3 fantasy real-time strategy game (d -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299572: ntp-server: ntpd Fails to start after upgrade
Package: ntp-server Version: 1:4.2.0a+stable-2 Followup-For: Bug #299572 Last log entry vefore crash: 15 Mar 09:36:08 ntpd[17732]: too many recvbufs allocated (40) 15 Mar 09:36:08 ntpd[17732]: too many recvbufs allocated (40) 15 Mar 09:36:08 ntpd[17732]: too many recvbufs allocated (40) 15 Mar 09:36:08 ntpd[17732]: too many recvbufs allocated (40) -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.4.29-C3EZRA Locale: LANG=it_IT, LC_CTYPE=it_IT (charmap=ISO-8859-1) Versions of packages ntp-server depends on: ii ntp1:4.2.0a+stable-4 Network Time Protocol: network uti ii ntp-simple 1:4.2.0a+stable-2 Network Time Protocol: daemon for -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Could you provide some more imformation
Processing commands for [EMAIL PROTECTED]: tags 299584 + moreinfo unreproducible Bug#299584: nautilus: Nautilus crashes on Gnome startup. There were no tags set. Tags added: moreinfo, unreproducible severity 299584 important Bug#299584: nautilus: Nautilus crashes on Gnome startup. Severity set to `important'. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299602: error from cron job after Sarge upgrade
Package: rss2email Version: 1:2.54-1 Severity: grave After upgrading (Mon 14 at 20:13 UTC) a Sarge installation, this rss2email crontab: */10 * * * * if [ -x /usr/bin/r2e ]; then /usr/bin/r2e run; fi report the following output. -- === SEND THE FOLLOWING TO [EMAIL PROTECTED] === E: nonnumeric port: ' ' http://www.osvdb.org/backend/rss.php {'feed': {}, 'encoding': 'utf-8', 'bozo': 1, 'version': None, 'entries': [], 'bozo_exception': httplib.InvalidURL instance at 0xb74d1fcc} rss2email 2.54 feedparser 3.3 html2text 2.2 Python 2.3.5 (#2, Feb 9 2005, 00:38:15) [GCC 3.3.5 (Debian 1:3.3.5-8)] === END HERE === === SEND THE FOLLOWING TO [EMAIL PROTECTED] === E: nonnumeric port: ' ' http://www.debianplanet.org/module.php?mod=nodeop=feed {'feed': {}, 'encoding': 'utf-8', 'bozo': 1, 'version': None, 'entries': [], 'bozo_exception': httplib.InvalidURL instance at 0xb74d1c8c} rss2email 2.54 feedparser 3.3 html2text 2.2 Python 2.3.5 (#2, Feb 9 2005, 00:38:15) [GCC 3.3.5 (Debian 1:3.3.5-8)] === END HERE === === SEND THE FOLLOWING TO [EMAIL PROTECTED] === E: nonnumeric port: ' ' http://lwn.net/headlines/newrss {'feed': {}, 'encoding': 'utf-8', 'bozo': 1, 'version': None, 'entries': [], 'bozo_exception': httplib.InvalidURL instance at 0xb74d178c} rss2email 2.54 feedparser 3.3 html2text 2.2 Python 2.3.5 (#2, Feb 9 2005, 00:38:15) [GCC 3.3.5 (Debian 1:3.3.5-8)] === END HERE === -- Lorenzo Iannuzzi -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299584: Could you provide some more imformation
tags 299584 + moreinfo unreproducible severity 299584 important After my last update nautilus crashes on Gnome startup. Could you please try to run nautilus from the command line and tell us what error message you get? I'm downgrading this bug to important until you provide more information, as I can not reproduce it on my system. Thanks Stewart -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299572: ntp-server: strace and ltrace output
Package: ntp-server Version: 1:4.2.0a+stable-2 Followup-For: Bug #299572 I'm not a coder, but I hope this is usefull... strace.ntpd execve(/usr/sbin/ntpd, [/usr/sbin/ntpd], [/* 13 vars */]) = 0 uname({sys=Linux, node=vortex, ...}) = 0 brk(0) = 0x80bad24 old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40017000 access(/etc/ld.so.nohwcap, F_OK) = -1 ENOENT (No such file or directory) open(/etc/ld.so.preload, O_RDONLY)= -1 ENOENT (No such file or directory) open(/etc/ld.so.cache, O_RDONLY) = 3 fstat64(3, {st_mode=S_IFREG|0644, st_size=20669, ...}) = 0 old_mmap(NULL, 20669, PROT_READ, MAP_PRIVATE, 3, 0) = 0x40018000 close(3)= 0 access(/etc/ld.so.nohwcap, F_OK) = -1 ENOENT (No such file or directory) open(/lib/libm.so.6, O_RDONLY)= 3 read(3, [EMAIL PROTECTED]..., 512) = 512 fstat64(3, {st_mode=S_IFREG|0644, st_size=134464, ...}) = 0 old_mmap(NULL, 136944, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0x4001e000 old_mmap(0x4003f000, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 3, 0x2) = 0x4003f000 close(3)= 0 access(/etc/ld.so.nohwcap, F_OK) = -1 ENOENT (No such file or directory) open(/usr/lib/libcrypto.so.0.9.7, O_RDONLY) = 3 read(3, \177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0p\300\2..., 512) = 512 fstat64(3, {st_mode=S_IFREG|0644, st_size=1054888, ...}) = 0 old_mmap(NULL, 1072824, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0x4004 old_mmap(0x40131000, 73728, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 3, 0xf) = 0x40131000 old_mmap(0x40143000, 11960, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x40143000 close(3)= 0 access(/etc/ld.so.nohwcap, F_OK) = -1 ENOENT (No such file or directory) open(/lib/libcap.so.1, O_RDONLY) = 3 read(3, \177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0\20\r\0..., 512) = 512 fstat64(3, {st_mode=S_IFREG|0644, st_size=11024, ...}) = 0 old_mmap(NULL, 14676, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0x40146000 old_mmap(0x40149000, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 3, 0x2000) = 0x40149000 close(3)= 0 access(/etc/ld.so.nohwcap, F_OK) = -1 ENOENT (No such file or directory) open(/lib/libc.so.6, O_RDONLY)= 3 read(3, \177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0\200^\1..., 512) = 512 fstat64(3, {st_mode=S_IFREG|0644, st_size=1244016, ...}) = 0 old_mmap(NULL, 1254180, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0x4014a000 old_mmap(0x40272000, 32768, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 3, 0x127000) = 0x40272000 old_mmap(0x4027a000, 8996, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x4027a000 close(3)= 0 access(/etc/ld.so.nohwcap, F_OK) = -1 ENOENT (No such file or directory) open(/lib/libdl.so.2, O_RDONLY) = 3 read(3, \177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0p\34\0\000..., 512) = 512 fstat64(3, {st_mode=S_IFREG|0644, st_size=9872, ...}) = 0 old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x4027d000 old_mmap(NULL, 8632, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0x4027e000 old_mmap(0x4028, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 3, 0x2000) = 0x4028 close(3)= 0 munmap(0x40018000, 20669) = 0 umask(0)= 022 umask(022) = 0 getuid32() = 0 gettimeofday({1110880314, 424293}, NULL) = 0 fork() = 1933 exit_group(0) = ? ltrace.ntp __libc_start_main(0x8051750, 1, 0xbe34, 0x806f660, 0x806f6c0 unfinished ... umask(00)= 022 umask(022) = 00 getuid() = 0 gettimeofday(0xbcd8, NULL) = 0 srand48(0x580fe95f, 0xbe34, 7, 0x4027d2e0, 0x4027d320) = 0 daemon(0, 0, 7, 0x4027d2e0, 0x4027d320 unfinished ... +++ exited (status 0) +++ -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.4.29-C3EZRA Locale: LANG=it_IT, LC_CTYPE=it_IT (charmap=ISO-8859-1) Versions of packages ntp-server depends on: ii ntp1:4.2.0a+stable-4 Network Time Protocol: network uti ii ntp-simple 1:4.2.0a+stable-2 Network Time Protocol: daemon for -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#288246: marked as done (CAN-2004-1059: Cross site scripting vulnerability)
Your message dated Tue, 15 Mar 2005 11:19:30 +0100 with message-id [EMAIL PROTECTED] and subject line Bugs closed has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 2 Jan 2005 17:37:45 + From [EMAIL PROTECTED] Sun Jan 02 09:37:37 2005 Return-path: [EMAIL PROTECTED] Received: from luonnotar.infodrom.org [195.124.48.78] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1Cl9fd-0006G7-00; Sun, 02 Jan 2005 09:37:37 -0800 Received: by luonnotar.infodrom.org (Postfix, from userid 10) id F0A23366B89; Sun, 2 Jan 2005 18:37:38 +0100 (CET) Received: at Infodrom Oldenburg (/\##/\ Smail-3.2.0.102 1998-Aug-2 #2) from infodrom.org by finlandia.Infodrom.North.DE via smail from stdin id [EMAIL PROTECTED] for [EMAIL PROTECTED]; Sun, 2 Jan 2005 18:30:38 +0100 (CET) Date: Sun, 2 Jan 2005 18:30:38 +0100 From: Martin Schulze [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: CAN-2004-1059: Cross site scripting vulnerability Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: multipart/mixed; boundary=4ybNbZnZ8tziJ7D6 Content-Disposition: inline User-Agent: Mutt/1.5.6+20040907i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: --4ybNbZnZ8tziJ7D6 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Package: mnogosearch Version: 3.2.18-2.1 Severity: grave Tags: security sid sarge patch Michael Krax discovered XSS problems in several programs, mnogosearch is among them. For details please see: http://lists.netsys.com/pipermail/full-disclosure/2004-December/030222.html The attached patch should fix this problem, as does a newer version such as 3.2.29. Woody escapes properly, and hence is not vulnerable. Regards, Joey -- There are lies, statistics and benchmarks. Please always Cc to me when replying to me on the lists. --4ybNbZnZ8tziJ7D6 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: attachment; filename=patch.CAN-2004-1059.mnogosearch.3.2.18 diff -u -p -Nur mnogosearch-3.2.18/src/search.c mnogosearch-3.2.18.new/src/search.c --- mnogosearch-3.2.18/src/search.c Mon May 31 01:56:57 2004 +++ mnogosearch-3.2.18.new/src/search.c Sun Jan 2 10:45:23 2005 @@ -62,6 +62,131 @@ static void ParseQStringUnescaped(UDM_VA } } +/* Copied from version 3.2.29:src/url.c */ + +static const char *hexd= 0123456789ABCDEF; + + +static int ch2x(int ch) +{ + if (ch = '0' ch = '9') +return ch - '0'; + + if (ch = 'a' ch = 'f') +return 10 + ch - 'a'; + + if (ch = 'A' ch = 'F') +return 10 + ch - 'A'; + + return -1; +} + + +/* + 0 == safe and reserved characters + 1 == control characters + 2 == unsafe characters: space ; ? [ \ ] ^ + 3 == non-graph ascii characters + + TODO: + + .txt - amp;.txt (only in file name) + :.txt - ./:.txt (only in file name) + #.txt - %22.txt (only in file name) + ?.txt - %3f.txt (only in file name) +*/ + +static char path_enc_type[256]= +{ +/*00*/ 1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1, +/*10*/ 1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1, +/*20*/ 2,0,2,2,0,2,4,0,0,0,0,0,0,0,0,0, /* !#$%'()*+,-./ */ +/*30*/ 0,0,0,0,0,0,0,0,0,0,0,2,2,0,2,2, /* 0123456789:;=? */ +/*40*/ 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0, /* @ABCDEFGHIJKLMNO */ +/*50*/ 0,0,0,0,0,0,0,0,0,0,0,2,2,2,2,0, /* PQRSTUVWXYZ[\]^_ */ +/*60*/ 2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0, /* `abcdefghijklmno */ +/*70*/ 0,0,0,0,0,0,0,0,0,0,0,2,2,2,0,1, /* pqrstuvwxyz{|}~ */ +/*80*/ 3,3,3,3,3,3,3,3,3,3,3,3,3,3,3,3, +/*90*/ 3,3,3,3,3,3,3,3,3,3,3,3,3,3,3,3, +/*A0*/ 3,3,3,3,3,3,3,3,3,3,3,3,3,3,3,3, +/*B0*/ 3,3,3,3,3,3,3,3,3,3,3,3,3,3,3,3, +/*C0*/ 3,3,3,3,3,3,3,3,3,3,3,3,3,3,3,3, +/*D0*/ 3,3,3,3,3,3,3,3,3,3,3,3,3,3,3,3, +/*E0*/ 3,3,3,3,3,3,3,3,3,3,3,3,3,3,3,3, +/*F0*/ 3,3,3,3,3,3,3,3,3,3,3,3,3,3,3,3 +}; + + +/* + Convert escaped characters to upper case: 0xea - 0xEA + Unescape safe characters + Escape unsafe characters + dst should be 3+strlen(src)+1 bytes long +*/ +size_t UdmURLCanonizePath(char *dst, size_t dstsize, const char *src) +{ + char *d0= dst; + char *de= dst + dstsize; + int query = 0; + + for ( ; src[0] dst de ; src++) + { +int code; + +if (src[0] == '%' ch2x(src[1]) = 0 ch2x(src[2]) =
Bug#266024: marked as done (conflict between mnogosearch-mysql and mguesser)
Your message dated Tue, 15 Mar 2005 11:19:30 +0100 with message-id [EMAIL PROTECTED] and subject line Bugs closed has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 16 Aug 2004 11:03:46 + From [EMAIL PROTECTED] Mon Aug 16 04:03:46 2004 Return-path: [EMAIL PROTECTED] Received: from merkur.wsr.ac.at [143.130.50.112] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1BwfHG-00039l-00; Mon, 16 Aug 2004 04:03:46 -0700 Received: from bernon.wsr.ac.at (bernon.wsr.ac.at [143.130.50.123]) by merkur.wsr.ac.at (Postfix) with ESMTP id 8821ED90 for [EMAIL PROTECTED]; Mon, 16 Aug 2004 13:03:44 +0200 (CEST) Received: by bernon.wsr.ac.at (Postfix, from userid 1010) id 80E5A824D; Mon, 16 Aug 2004 13:03:44 +0200 (CEST) Date: Mon, 16 Aug 2004 13:03:44 +0200 From: Peter J. Holzer [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: conflict between mnogosearch-mysql and mguesser Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-md5; protocol=application/pgp-signature; boundary=2hMgfIw2X+zgXrFs Content-Disposition: inline User-Agent: Mutt/1.4.1i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: --2hMgfIw2X+zgXrFs Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Package: mnogosearch-mysql Version: 3.2.18-2 When I try to install both mguesser and mnogosearch-mysql, installing mnogosearch-mysql fails: | Selecting previously deselected package mnogosearch-mysql. | Unpacking mnogosearch-mysql (from .../mnogosearch-mysql_3.2.18-2_i386.deb= ) ... | dpkg: error processing /var/cache/apt/archives/mnogosearch-mysql_3.2.18-2= _i386.deb (--unpack): | trying to overwrite `/usr/bin/mguesser', which is also in package mguess= er = ^^ | dpkg-deb: subprocess paste killed by signal (Broken pipe) | Selecting previously deselected package mnogosearch-common. | Unpacking mnogosearch-common (from .../mnogosearch-common_3.2.18-2_all.de= b) ... | Errors were encountered while processing: | /var/cache/apt/archives/mnogosearch-mysql_3.2.18-2_i386.deb | E: Sub-process /usr/bin/dpkg returned an error code (1) Installing mnogosearch alone works fine.=20 The mnogosearch-mysql package should either not include the mguesser binary (and instead require or suggest the mguesser package) or include mguesser in the Conflicts: line. hp --=20 _ | Peter J. Holzer | Shooting the users in the foot is bad.=20 |_|_) | Sysadmin WSR / LUGA | Giving them a gun isn't. | | | [EMAIL PROTECTED]| -- Gordon Schumacher, __/ | http://www.hjp.at/ | mozilla bug #84128 --2hMgfIw2X+zgXrFs Content-Type: application/pgp-signature Content-Disposition: inline -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.4 (GNU/Linux) iQDQAwUBQSCUkFLjemazOuKpAQGjXAXSA6KlBv3/CiQ17wmXDCGRqwOAYtqhPilb k/yozNoLfHswVbg6f/jbHy7CxOMp6woXIse0OKtBZLorUCtGpLpUGedGJ7EoRooZ bhGODp8ixlklON7K15vagjFGqyLEic5TTUgXlhFnZcgsTMicOqWw2jA7kAGqxhp0 vGC6rakoF34VLKVWM8dOjKRAsUmPgvPkMfjseGc4YHEPq2C1TDabN1iKb+Tq/pCH oZ6OWZnuwlIvsdhcEbFVd7gN8w== =7izq -END PGP SIGNATURE- --2hMgfIw2X+zgXrFs-- --- Received: (at 266024-done) by bugs.debian.org; 15 Mar 2005 10:19:35 + From [EMAIL PROTECTED] Tue Mar 15 02:19:34 2005 Return-path: [EMAIL PROTECTED] Received: from postman.abacus.ch [193.246.101.142] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DB995-0001nN-00; Tue, 15 Mar 2005 02:19:28 -0800 Received: from postman.abacus.ch by postman.abacus.ch via smtpd (for spohr.debian.org [128.193.0.4]) with ESMTP; Tue, 15 Mar 2005 11:19:27 +0100 Received: from localhost (localhost [127.0.0.1]) by postman.abacus.ch (Postfix) with ESMTP id 7796112F8D3; Tue, 15 Mar 2005 11:19:25 +0100 (CET) Received: from postman.abacus.ch ([127.0.0.1]) by localhost (postman [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 22469-03; Tue, 15 Mar 2005 11:19:22 +0100 (CET) Received: from [172.16.34.83] (unknown [172.16.34.83]) by postman.abacus.ch (Postfix) with ESMTP id
Bug#274760: marked as done (mnogosearch and m17n-lib have several conflicting packages)
Your message dated Tue, 15 Mar 2005 11:19:30 +0100 with message-id [EMAIL PROTECTED] and subject line Bugs closed has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 4 Oct 2004 01:05:48 + From [EMAIL PROTECTED] Sun Oct 03 18:05:48 2004 Return-path: [EMAIL PROTECTED] Received: from mail.lenk.info [217.160.169.191] (Debian-exim) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CEHIR-0007vX-00; Sun, 03 Oct 2004 18:05:48 -0700 Received: from mail.sorgfalt.net ([217.160.134.107]) by mail.lenk.info with esmtp (Cipher TLS-1.0:RSA_ARCFOUR_SHA:16) (Exim 4.34 1) id 1CEHLW-0007oo-4T; Mon, 04 Oct 2004 03:08:58 +0200 Received: from pd9e39cb5.dip.t-dialin.net ([217.227.156.181] helo=feynman.djpig.de) by mail.sorgfalt.net with asmtp (Cipher TLS-1.0:RSA_ARCFOUR_SHA:16) (Exim 4.34 1) id 1CEHJD-ub-Va; Mon, 04 Oct 2004 03:06:36 +0200 Received: from djpig by feynman.djpig.de with local (Exim 4.34) id 1CEHHZ-0003CE-KZ; Mon, 04 Oct 2004 03:04:53 +0200 Content-Type: text/plain; charset=us-ascii MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Frank Lichtenheld [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: mnogosearch and m17n-lib have several conflicting packages X-Mailer: reportbug 2.63 Date: Mon, 04 Oct 2004 03:04:53 +0200 Message-Id: [EMAIL PROTECTED] Sender: Frank Lichtenheld [EMAIL PROTECTED] Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_PACKAGE, RCVD_IN_DSBL autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Package: m17n-lib,mnogosearch Severity: serious The mnogosearch{-sqlite,-pgsql,-mysql} packages conflict with the m17n-lib{-bin,-doc} packages. I identified at least the following conflicting files: usr/bin/mconv (m17n-lib-bin) usr/share/man/man1/mconv.1.gz (m17n-lib-doc) I have filled the bug against both packages, the maintainers should sort that out. Gruesse, Frank Lichtenheld -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (990, 'testing'), (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.8-1-k7-smp Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 --- Received: (at 274760-done) by bugs.debian.org; 15 Mar 2005 10:19:34 + From [EMAIL PROTECTED] Tue Mar 15 02:19:34 2005 Return-path: [EMAIL PROTECTED] Received: from postman.abacus.ch [193.246.101.142] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DB995-0001nN-00; Tue, 15 Mar 2005 02:19:28 -0800 Received: from postman.abacus.ch by postman.abacus.ch via smtpd (for spohr.debian.org [128.193.0.4]) with ESMTP; Tue, 15 Mar 2005 11:19:27 +0100 Received: from localhost (localhost [127.0.0.1]) by postman.abacus.ch (Postfix) with ESMTP id 7796112F8D3; Tue, 15 Mar 2005 11:19:25 +0100 (CET) Received: from postman.abacus.ch ([127.0.0.1]) by localhost (postman [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 22469-03; Tue, 15 Mar 2005 11:19:22 +0100 (CET) Received: from [172.16.34.83] (unknown [172.16.34.83]) by postman.abacus.ch (Postfix) with ESMTP id 35E7F12F8D1; Tue, 15 Mar 2005 11:19:22 +0100 (CET) From: Philipp Hug [EMAIL PROTECTED] To: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Bugs closed Date: Tue, 15 Mar 2005 11:19:30 +0100 User-Agent: KMail/1.7.1 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: [EMAIL PROTECTED] X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at abacus.ch Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: X-CrossAssassin-Score: 2 Bugs closed by new upload 3.2.31-1... -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299066: marked as done (MySQL Privilege Escalation and Command Execution Vulnerabilities)
Your message dated Tue, 15 Mar 2005 11:25:56 +0100 with message-id [EMAIL PROTECTED] and subject line Fixed has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 11 Mar 2005 14:53:55 + From [EMAIL PROTECTED] Fri Mar 11 06:53:54 2005 Return-path: [EMAIL PROTECTED] Received: from baloney.puettmann.net [194.97.54.34] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D9lWU-Gh-00; Fri, 11 Mar 2005 06:53:54 -0800 Received: from ruben by baloney.puettmann.net with local (ID ruben) (Exim 3.36 #1) id 1D9lS5-0004FX-00 for [EMAIL PROTECTED]; Fri, 11 Mar 2005 15:49:21 +0100 Date: Fri, 11 Mar 2005 15:49:21 +0100 To: [EMAIL PROTECTED] Subject: MySQL Privilege Escalation and Command Execution Vulnerabilities Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol=application/pgp-signature; boundary=SUk9VBj82R8Xhb8H Content-Disposition: inline User-Agent: Mutt/1.5.6+20040907i From: Ruben Puettmann [EMAIL PROTECTED] X-Scanner: exiscan *1D9lS5-0004FX-00*jvWyh48B2N.* (Puettmann.NeT, Germany) Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.5 required=4.0 tests=BAYES_10,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: --SUk9VBj82R8Xhb8H Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Package: mysql-server-4.1 Version: 4.1.10-1 Severity: critical Tags: security Several vulnerabilities were identified in MySQL, which may be exploited by local attackers to execute arbitrary commands or obtain elevated privileges. - The first flaw is due to an insecure (predictable name) temporary file creation with CREATE TEMPORARY TABLE, which may be exploited by an attacker that has CREATE TEMPORARY TABLE privileges to conduct symlink attacks. - The second vulnerability is due to an arbitrary library injection error and resides in the udf_init() function (sql_udf.cc), which may be exploited by an attacker (with INSERT and DELETE privileges) to load/execute a malicious library with MySQL privileges. - The third flaw occurs when handling specially crafted CREATE FUNCTION commands, which may be exploited by a malicious user (with INSERT and DELETE privileges) to execute arbitrary code with MySQL privileges. Fro the complete Advisory see: http://www.k-otik.com/english/advisories/2005/0252 --=20 Ruben Puettmann [EMAIL PROTECTED] http://www.puettmann.net --SUk9VBj82R8Xhb8H Content-Type: application/pgp-signature; name=signature.asc Content-Description: Digital signature Content-Disposition: inline -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (GNU/Linux) iD8DBQFCMa/xgHHssbUmOEIRAnEMAKCK+pMdvMwGvNVbBc6xfC4QNhLGIQCgoAG9 ZjjlNWBlEBStRY9xZDF5qIk= =HK0H -END PGP SIGNATURE- --SUk9VBj82R8Xhb8H-- --- Received: (at 299066-done) by bugs.debian.org; 15 Mar 2005 10:26:04 + From ch@westend.com Tue Mar 15 02:26:03 2005 Return-path: ch@westend.com Received: from mail3b.westend.com (mail3b1.westend.com) [212.117.79.78] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DB9FT-0002s3-00; Tue, 15 Mar 2005 02:26:03 -0800 Received: from localhost (localhost [127.0.0.1]) by mail3b1.westend.com (Postfix) with ESMTP id F16D7BEFF for [EMAIL PROTECTED]; Tue, 15 Mar 2005 11:26:01 +0100 (CET) Received: from mail3b1.westend.com ([127.0.0.1]) by localhost (mail3b [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 20211-07 for [EMAIL PROTECTED]; Tue, 15 Mar 2005 11:25:56 +0100 (CET) Received: by mail3b1.westend.com (Postfix, from userid 1000) id E3A99BF14; Tue, 15 Mar 2005 11:25:56 +0100 (CET) Date: Tue, 15 Mar 2005 11:25:56 +0100 From: Christian Hammers [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Fixed Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-15 Content-Disposition: inline User-Agent: Mutt/1.3.28i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-2.0 required=4.0 tests=BAYES_00,ONEWORD autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: This
Bug#297203: kernel-source-2.6.8: race which could allow for privilege escalation on Radeon
On Sun, Feb 27, 2005 at 10:59:03PM +0100, Stefan Fritsch wrote: Package: kernel-source-2.6.8 Version: 2.6.8-13 Severity: critical Tags: security Justification: root security hole There is a race condition in the radeon driver which has been fixed in 2.6.11-rc4. This is part of BID-12555: http://www.securityfocus.com/bid/12555 The same code is already in 2.6.8 The corresponding changeset is at: http://linux.bkbits.net:8080/linux-2.6/cset%4042088d17CO1mOAfgW4R46WRTm9gkwA?nav=index.html|[EMAIL PROTECTED] Thanks, I have added this to SVN for 2.6.8 and should appear in the next release. For the record: The patch seems to already be present in 2.6.11. And the bug does not seem to be present in 2.4.27. -- Horms -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#297481: hotplug: Fails to load firmware for ipw2200 after upgrade
On Tue, Mar 01, 2005 at 09:41:29PM +0100, Kay Sievers wrote: On Tue, 2005-03-01 at 21:26 +0100, Marco d'Itri wrote: reassign 297481 kernel-image-2.6.8-i386 thanks On Mar 01, Kay Sievers [EMAIL PROTECTED] wrote: This kernel will not work correctly with managed events. It has holes in the sequence numbers. You need at least 2.6.10 if I remember correctly. This sucks, because the next Debian release will ship 2.6.8 as the default 2.6 kernel. Do you know what needs to be backported to fix this? It's all in lib/kobject_uevent.c and should be trivial. It was changed to increment the seqnum counter only if the kset wants to emit the event. Sounds suspiciously like it will alter the kernel ABI, but if you have a patch please send it here. -- Horms -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299040: marked as done (Mysql CREATE FUNCTION libc arbitrary code execution.)
Your message dated Tue, 15 Mar 2005 12:40:36 +0100 with message-id [EMAIL PROTECTED] and subject line fixed in last upload has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 11 Mar 2005 09:35:18 + From [EMAIL PROTECTED] Fri Mar 11 01:35:18 2005 Return-path: [EMAIL PROTECTED] Received: from moutng.kundenserver.de [212.227.126.171] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D9gY9-0005Ra-00; Fri, 11 Mar 2005 01:35:18 -0800 Received: from bitz8.bitz.briteline.de[195.90.9.8] (helo=anton) by mrelayeu.kundenserver.de with ESMTP (Nemesis), id 0ML29c-1D9gY44ARj-0003tW; Fri, 11 Mar 2005 10:35:12 +0100 Received: by anton (Postfix, from userid 2028) id D748AB72BC; Fri, 11 Mar 2005 10:35:12 +0100 (CET) Content-Type: text/plain; charset=us-ascii MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Moritz Muehlenhoff [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: Mysql CREATE FUNCTION libc arbitrary code execution. X-Mailer: reportbug 2.26.1.1.200308291454 Date: Fri, 11 Mar 2005 10:35:12 +0100 Message-Id: [EMAIL PROTECTED] X-Provags-ID: kundenserver.de [EMAIL PROTECTED] login:4ad79d65ac46f2345c6ef2e856c1d9ef Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: mysql-dfsg Version: 4.0.23-10 Severity: grave Tags: security Stefano Di Paola discovered that it's possible to gain extended MySQL user privileges by abusing the interaction between MySQL's CREATE FUNCTION functionality and the libc. This only applies for authenticated users with INSERT and DELETE privileges on the 'mysql' administrative database. There does not seem to be a CVE assignment yet. The full advisory can be found at: http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0084.html The advisory claims that MySQL has released a fix, and new upstream releases (4.0.24 and 4.1.10a), which haven't appeared on mysql.com yet. Cheers, Moritz -- System Information: Debian Release: 3.0 Architecture: i386 Kernel: Linux anton 2.4.29-univention.1 #1 SMP Thu Jan 27 17:08:46 CET 2005 i686 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] --- Received: (at 299040-done) by bugs.debian.org; 15 Mar 2005 11:40:43 + From ch@westend.com Tue Mar 15 03:40:43 2005 Return-path: ch@westend.com Received: from mail3b.westend.com (mail3b1.westend.com) [212.117.79.78] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DBAPi-0004tU-00; Tue, 15 Mar 2005 03:40:42 -0800 Received: from localhost (localhost [127.0.0.1]) by mail3b1.westend.com (Postfix) with ESMTP id 9F02BBF0D; Tue, 15 Mar 2005 12:40:41 +0100 (CET) Received: from mail3b1.westend.com ([127.0.0.1]) by localhost (mail3b [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 07561-07; Tue, 15 Mar 2005 12:40:36 +0100 (CET) Received: by mail3b1.westend.com (Postfix, from userid 1000) id 4AD3ABF09; Tue, 15 Mar 2005 12:40:36 +0100 (CET) Date: Tue, 15 Mar 2005 12:40:36 +0100 From: Christian Hammers [EMAIL PROTECTED] To: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: fixed in last upload Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-15 Content-Disposition: inline User-Agent: Mutt/1.3.28i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: X-CrossAssassin-Score: 3 Those bugs have been fixed in the 4.1.10a upload. bye, -christian- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299038: marked as done (Mysql insecure temporary file creation with CREATE TEMPORARY TABLE privilege escalation)
Your message dated Tue, 15 Mar 2005 12:40:36 +0100 with message-id [EMAIL PROTECTED] and subject line fixed in last upload has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 11 Mar 2005 09:23:28 + From [EMAIL PROTECTED] Fri Mar 11 01:23:27 2005 Return-path: [EMAIL PROTECTED] Received: from moutng.kundenserver.de [212.227.126.186] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D9gMg-0003eP-00; Fri, 11 Mar 2005 01:23:27 -0800 Received: from bitz8.bitz.briteline.de[195.90.9.8] (helo=anton) by mrelayeu.kundenserver.de with ESMTP (Nemesis), id 0ML21M-1D9gMf2xsC-0003BV; Fri, 11 Mar 2005 10:23:25 +0100 Received: by anton (Postfix, from userid 2028) id 38EB7B72BC; Fri, 11 Mar 2005 10:23:25 +0100 (CET) Content-Type: text/plain; charset=us-ascii MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Moritz Muehlenhoff [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: Mysql insecure temporary file creation with CREATE TEMPORARY TABLE privilege escalation X-Mailer: reportbug 2.26.1.1.200308291454 Date: Fri, 11 Mar 2005 10:23:25 +0100 Message-Id: [EMAIL PROTECTED] X-Provags-ID: kundenserver.de [EMAIL PROTECTED] login:4ad79d65ac46f2345c6ef2e856c1d9ef Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: mysql-dfsg Version: unavailable; reported 2005-03-11 Severity: grave Tags: security Stefano Di Paola discovered that MySQL is vulnerable to a symlink attack if an authenticated user has CREATE TEMPORARY TABLE privileges on any existent database. There does not seem to be a CVE assignment yet. The full advisory can be found at: http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0082.html The advisory claims that MySQL has released a fix, and new upstream releases (4.0.24 and 4.1.10a), which haven't appeared on mysql.com yet. Cheers, Moritz -- System Information: Debian Release: 3.0 Architecture: i386 Kernel: Linux anton 2.4.29-univention.1 #1 SMP Thu Jan 27 17:08:46 CET 2005 i686 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] --- Received: (at 299038-done) by bugs.debian.org; 15 Mar 2005 11:40:43 + From ch@westend.com Tue Mar 15 03:40:43 2005 Return-path: ch@westend.com Received: from mail3b.westend.com (mail3b1.westend.com) [212.117.79.78] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DBAPi-0004tU-00; Tue, 15 Mar 2005 03:40:42 -0800 Received: from localhost (localhost [127.0.0.1]) by mail3b1.westend.com (Postfix) with ESMTP id 9F02BBF0D; Tue, 15 Mar 2005 12:40:41 +0100 (CET) Received: from mail3b1.westend.com ([127.0.0.1]) by localhost (mail3b [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 07561-07; Tue, 15 Mar 2005 12:40:36 +0100 (CET) Received: by mail3b1.westend.com (Postfix, from userid 1000) id 4AD3ABF09; Tue, 15 Mar 2005 12:40:36 +0100 (CET) Date: Tue, 15 Mar 2005 12:40:36 +0100 From: Christian Hammers [EMAIL PROTECTED] To: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: fixed in last upload Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-15 Content-Disposition: inline User-Agent: Mutt/1.3.28i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Those bugs have been fixed in the 4.1.10a upload. bye, -christian- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299030: marked as done (Mysql CREATE FUNCTION mysql.func table arbitrary library injection)
Your message dated Tue, 15 Mar 2005 12:38:57 +0100 with message-id [EMAIL PROTECTED] and subject line Fixed in last upload has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 11 Mar 2005 09:27:36 + From [EMAIL PROTECTED] Fri Mar 11 01:27:36 2005 Return-path: [EMAIL PROTECTED] Received: from moutng.kundenserver.de [212.227.126.187] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D9gQh-0004B8-00; Fri, 11 Mar 2005 01:27:36 -0800 Received: from bitz8.bitz.briteline.de[195.90.9.8] (helo=anton) by mrelayeu.kundenserver.de with ESMTP (Nemesis), id 0MKwpI-1D9gQf0HpH-0003Ta; Fri, 11 Mar 2005 10:27:33 +0100 Received: by anton (Postfix, from userid 2028) id 9E1AEB72BC; Fri, 11 Mar 2005 10:27:32 +0100 (CET) Content-Type: text/plain; charset=us-ascii MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Moritz Muehlenhoff [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: Mysql CREATE FUNCTION mysql.func table arbitrary library injection X-Mailer: reportbug 2.26.1.1.200308291454 Date: Fri, 11 Mar 2005 10:27:32 +0100 Message-Id: [EMAIL PROTECTED] X-Provags-ID: kundenserver.de [EMAIL PROTECTED] login:4ad79d65ac46f2345c6ef2e856c1d9ef Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: mysql-dfsg Version: 4.0.23-10 Severity: grave Tags: security Stefano Di Paola discovered that it's possible to use a library located in an arbitrary directory, if an authenticated user has INSERT and DELETE privileges on the 'mysql' administrative database. There does not seem to be a CVE assignment yet. The full advisory can be found at: http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0083.html The advisory claims that MySQL has released a fix, and new upstream releases (4.0.24 and 4.1.10a), which haven't appeared on mysql.com yet. Cheers, Moritz -- System Information: Debian Release: 3.0 Architecture: i386 Kernel: Linux anton 2.4.29-univention.1 #1 SMP Thu Jan 27 17:08:46 CET 2005 i686 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] --- Received: (at 299030-done) by bugs.debian.org; 15 Mar 2005 11:39:14 + From ch@westend.com Tue Mar 15 03:39:14 2005 Return-path: ch@westend.com Received: from mail3b.westend.com (mail3b1.westend.com) [212.117.79.78] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DBAOI-0004mc-00; Tue, 15 Mar 2005 03:39:14 -0800 Received: from localhost (localhost [127.0.0.1]) by mail3b1.westend.com (Postfix) with ESMTP id C8E04BF0D for [EMAIL PROTECTED]; Tue, 15 Mar 2005 12:39:07 +0100 (CET) Received: from mail3b1.westend.com ([127.0.0.1]) by localhost (mail3b [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 06432-09 for [EMAIL PROTECTED]; Tue, 15 Mar 2005 12:38:57 +0100 (CET) Received: by mail3b1.westend.com (Postfix, from userid 1000) id 7050BBE32; Tue, 15 Mar 2005 12:38:57 +0100 (CET) Date: Tue, 15 Mar 2005 12:38:57 +0100 From: Christian Hammers [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Fixed in last upload Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-15 Content-Disposition: inline User-Agent: Mutt/1.3.28i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: The security bug has been fixed in the last upload (this bug duplicate was just forgotten to mention in the changelog) -christian- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299039: marked as done (Mysql CREATE FUNCTION mysql.func table arbitrary library injection)
Your message dated Tue, 15 Mar 2005 12:40:36 +0100 with message-id [EMAIL PROTECTED] and subject line fixed in last upload has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 11 Mar 2005 09:27:36 + From [EMAIL PROTECTED] Fri Mar 11 01:27:36 2005 Return-path: [EMAIL PROTECTED] Received: from moutng.kundenserver.de [212.227.126.187] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D9gQh-0004B8-00; Fri, 11 Mar 2005 01:27:36 -0800 Received: from bitz8.bitz.briteline.de[195.90.9.8] (helo=anton) by mrelayeu.kundenserver.de with ESMTP (Nemesis), id 0MKwpI-1D9gQf0HpH-0003Ta; Fri, 11 Mar 2005 10:27:33 +0100 Received: by anton (Postfix, from userid 2028) id 9E1AEB72BC; Fri, 11 Mar 2005 10:27:32 +0100 (CET) Content-Type: text/plain; charset=us-ascii MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Moritz Muehlenhoff [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: Mysql CREATE FUNCTION mysql.func table arbitrary library injection X-Mailer: reportbug 2.26.1.1.200308291454 Date: Fri, 11 Mar 2005 10:27:32 +0100 Message-Id: [EMAIL PROTECTED] X-Provags-ID: kundenserver.de [EMAIL PROTECTED] login:4ad79d65ac46f2345c6ef2e856c1d9ef Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: mysql-dfsg Version: 4.0.23-10 Severity: grave Tags: security Stefano Di Paola discovered that it's possible to use a library located in an arbitrary directory, if an authenticated user has INSERT and DELETE privileges on the 'mysql' administrative database. There does not seem to be a CVE assignment yet. The full advisory can be found at: http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0083.html The advisory claims that MySQL has released a fix, and new upstream releases (4.0.24 and 4.1.10a), which haven't appeared on mysql.com yet. Cheers, Moritz -- System Information: Debian Release: 3.0 Architecture: i386 Kernel: Linux anton 2.4.29-univention.1 #1 SMP Thu Jan 27 17:08:46 CET 2005 i686 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] --- Received: (at 299039-done) by bugs.debian.org; 15 Mar 2005 11:40:43 + From ch@westend.com Tue Mar 15 03:40:43 2005 Return-path: ch@westend.com Received: from mail3b.westend.com (mail3b1.westend.com) [212.117.79.78] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DBAPi-0004tU-00; Tue, 15 Mar 2005 03:40:42 -0800 Received: from localhost (localhost [127.0.0.1]) by mail3b1.westend.com (Postfix) with ESMTP id 9F02BBF0D; Tue, 15 Mar 2005 12:40:41 +0100 (CET) Received: from mail3b1.westend.com ([127.0.0.1]) by localhost (mail3b [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 07561-07; Tue, 15 Mar 2005 12:40:36 +0100 (CET) Received: by mail3b1.westend.com (Postfix, from userid 1000) id 4AD3ABF09; Tue, 15 Mar 2005 12:40:36 +0100 (CET) Date: Tue, 15 Mar 2005 12:40:36 +0100 From: Christian Hammers [EMAIL PROTECTED] To: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: fixed in last upload Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-15 Content-Disposition: inline User-Agent: Mutt/1.3.28i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: X-CrossAssassin-Score: 2 Those bugs have been fixed in the 4.1.10a upload. bye, -christian- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299572: ntp-server: strace log
, F_GETFD)= 0 fcntl64(12, F_SETFD, FD_CLOEXEC)= 0 _llseek(12, 0, [0], SEEK_CUR) = 0 fstat64(12, {st_mode=S_IFREG|0644, st_size=2018, ...}) = 0 mmap2(NULL, 2018, PROT_READ, MAP_SHARED, 12, 0) = 0x40018000 _llseek(12, 2018, [2018], SEEK_SET) = 0 munmap(0x40018000, 2018)= 0 close(12) = 0 socket(PF_FILE, SOCK_STREAM, 0) = 12 connect(12, {sa_family=AF_FILE, path=/var/run/.nscd_socket}, 110) = -1 ENOENT (No such file or directory) close(12) = 0 open(/etc/group, O_RDONLY)= 12 fcntl64(12, F_GETFD)= 0 fcntl64(12, F_SETFD, FD_CLOEXEC)= 0 _llseek(12, 0, [0], SEEK_CUR) = 0 fstat64(12, {st_mode=S_IFREG|0644, st_size=755, ...}) = 0 mmap2(NULL, 755, PROT_READ, MAP_SHARED, 12, 0) = 0x40018000 _llseek(12, 755, [755], SEEK_SET) = 0 munmap(0x40018000, 755) = 0 close(12) = 0 setgid32(111) = 0 setresgid32(-1, 111, -1)= 0 setuid32(111) = 0 setresuid32(-1, 111, -1)= 0 capset(0x19980330, 0, {CAP_SYS_TIME, CAP_SYS_TIME, }) = 0 select(12, [6 8 9 10 11], NULL, NULL, NULL) = ? ERESTARTNOHAND (To be restarted) --- SIGALRM (Alarm clock) @ 0 (0) --- sigreturn() = ? (mask now []) gettimeofday({1110885721, 995364}, NULL) = 0 sendto(11, \343\0\6\363\0\0\0\0\0\0\0\0INIT\0\0\0\0\0\0\0\0\0\0\0..., 48, 0, {sa_family=AF_INET, sin_port=htons(123), sin_addr=inet_addr(129.132.178.194)}, 16) = 48 gettimeofday({1110885721, 995924}, NULL) = 0 select(12, [6 8 9 10 11], NULL, NULL, NULL) = 1 (in [11]) gettimeofday({1110885722, 43377}, NULL) = 0 select(12, [6 8 9 10 11], NULL, NULL, {0, 0}) = 1 (in [11], left {0, 0}) recvfrom(11, [EMAIL PROTECTED]..., 1092, 0, {sa_family=AF_INET, sin_port=htons(123), sin_addr=inet_addr(129.132.178.194)}, [16]) = 48 select(12, [11], NULL, NULL, {0, 0})= 0 (Timeout) gettimeofday({1110885722, 44317}, NULL) = 0 gettimeofday({1110885722, 44427}, NULL) = 0 gettimeofday({1110885722, 44561}, NULL) = 0 time(NULL) = 1110885722 time(NULL) = 1110885722 stat64(/var/log/ntpstats/peerstats, {st_mode=S_IFREG|0644, st_size=63257, ...}) = 0 unlink(/var/log/ntpstats/peerstats) = 0 open(/var/log/ntpstats/peerstats.20050315, O_WRONLY|O_APPEND|O_CREAT, 0666) = 12 fstat64(12, {st_mode=S_IFREG|0644, st_size=63257, ...}) = 0 mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40018000 fstat64(12, {st_mode=S_IFREG|0644, st_size=63257, ...}) = 0 _llseek(12, 63257, [63257], SEEK_SET) = 0 link(/var/log/ntpstats/peerstats.20050315, /var/log/ntpstats/peerstats) = 0 write(12, 53444 40922.045 129.132.178.194 ..., 86) = 86 select(12, [6 8 9 10 11], NULL, NULL, NULL) = ? ERESTARTNOHAND (To be restarted) --- SIGALRM (Alarm clock) @ 0 (0) --- sigreturn() = ? (mask now []) gettimeofday({1110885722, 996159}, NULL) = 0 sendto(11, \343\0\6\363\0\0\0\0\0\0\0\1INIT\0\0\0\0\0\0\0\0\0\0\0..., 48, 0, {sa_family=AF_INET, sin_port=htons(123), sin_addr=inet_addr(193.5.216.14)}, 16) = 48 select(12, [6 8 9 10 11], NULL, NULL, NULL) = 1 (in [11]) gettimeofday({1110885723, 204823}, NULL) = 0 select(12, [6 8 9 10 11], NULL, NULL, {0, 0}) = 1 (in [11], left {0, 0}) recvfrom(11, $\2\6\357\0\0\5o\0\0\4\316\3005gg\305\341C\207\363\350..., 1092, 0, {sa_family=AF_INET, sin_port=htons(123), sin_addr=inet_addr(193.5.216.14)}, [16]) = 48 select(12, [11], NULL, NULL, {0, 0})= 0 (Timeout) gettimeofday({1110885723, 205733}, NULL) = 0 gettimeofday({1110885723, 205846}, NULL) = 0 gettimeofday({1110885723, 205979}, NULL) = 0 time(NULL) = 1110885723 write(12, 53444 40923.206 193.5.216.14 901..., 82) = 82 select(12, [6 8 9 10 11], NULL, NULL, NULL) = ? ERESTARTNOHAND (To be restarted) --- SIGALRM (Alarm clock) @ 0 (0) --- sigreturn() = ? (mask now []) gettimeofday({1110885723, 996929}, NULL) = 0 sendto(11, \343\0\6\363\0\0\0\0\0\0\0\2INIT\0\0\0\0\0\0\0\0\0\0\0..., 48, 0, {sa_family=AF_INET, sin_port=htons(123), sin_addr=inet_addr(217.150.242.8)}, 16) = 48 select(12, [6 8 9 10 11], NULL, NULL, NULL) = 1 (in [11]) gettimeofday({1110885724, 63062}, NULL) = 0 select(12, [6 8 9 10 11], NULL, NULL, {0, 0}) = 1 (in [11], left {0, 0}) recvfrom(11, $\2\6\354\0\0\5\305\0\0\r\244\203\274\3\336\305\341\33..., 1092, 0, {sa_family=AF_INET, sin_port=htons(123), sin_addr=inet_addr(217.150.242.8)}, [16]) = 48 select(12, [11], NULL, NULL, {0, 0})= 0 (Timeout) gettimeofday({1110885724, 63970}, NULL) = 0 gettimeofday({1110885724, 64080}, NULL) = 0 gettimeofday({1110885724, 64215}, NULL) = 0 time(NULL) = 1110885724 write(12, 53444 40924.064 217.150.242.8 90..., 84) = 84 select(12, [6 8 9 10 11], NULL, NULL, NULL) = ? ERESTARTNOHAND (To be restarted
Bug#299621: ntp broken after update (segmentation fault)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Package: ntp Version: 1:4.2.0a+stable-4 Severity: grave After updating ntp today a pe in ntpq makes it to break with segmentation fault. (I did not update the ntp-server as the bug - well I did and revert as I saw the same behavior than descripted in 299572) - -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (800, 'unstable'), (700, 'testing') Architecture: i386 (i686) Kernel: Linux 2.4.28 Locale: LANG=de_DE, LC_CTYPE=de_DE (charmap=ISO-8859-1) (ignored: LC_ALL set to de_DE) Versions of packages ntp depends on: ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii libcap1 1:1.10-14support for getting/setting POSIX. ii libreadline55.0-10 GNU readline and history libraries ii libssl0.9.7 0.9.7e-3 SSL shared libraries ii perl-modules5.8.4-8 Core Perl modules ii psmisc 21.6-1 Utilities that use the proc filesy - -- no debconf information - -- Klaus Ethgenhttp://www.ethgen.de/ pub 2048R/D1A4EDE5 2000-02-26 Klaus Ethgen [EMAIL PROTECTED] Fingerprint: D7 67 71 C4 99 A6 D4 FE EA 40 30 57 3C 88 26 2B -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.0 (GNU/Linux) iQEVAwUBQjbZPJ+OKpjRpO3lAQI0VAf/f+E0We/f45BaR4iYHZw+ExA+IG7gRk4y xX8KfkHDCXobnC2D9gbXAc8kr9N2jG8/7UzWPnco8FR7J0gf+auiU+1wBZ4l1foB dr9C787U05f1J6PTpZtiakNMV4iP0GwBaU7aIm8JDuNDc0yrzlBZFRfV1rjgmlyq h4vS0D/s+W4Pz6lC6P43N4GJjfmnMml3Rm8RABz86psZ2QKcSPRwikvJOUoazpuW LOrKs/JYi5ksDj6r/yu74T60gbDWTMAKQQX9tRzBeRrGBMUjuH081I6kPCtzyrw/ MLIljZy83NnDHmM9zlCxhwcijXJQVOYsn+9VeXB91Du9e92bnBgwFA== =IjEX -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299223: better idea
Am Montag, den 14.03.2005, 18:19 -0500 schrieb Justin Pryzby: On Mon, Mar 14, 2005 at 06:08:39PM -0500, pryzbyj wrote: On second thought, I'm not sure where you are seeing the reported error (in a logfile?). In Webmin. mkfifo /tmp/fifo; tee -a /tmp/iptables.out 0/tmp/fifo echo -en \n$(date)\n$0 $@ /tmp/fifo; exec 1/tmp/fifo 21 Where to put? init_d load? Also, what steps are you taking in webmin to cause the error? I don't know what specific caused the output of the error any more. I will, though mail the specifics if I meet the error again. -- http://www.alternativ.net/~vinci Jabber: [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299624: dstooltk: Crashes when printing plots
Package: dstooltk Version: 2.0-4 Severity: grave Justification: renders package unusable Dstootk crashes when I try to print any plot in a postscript format. Invoking /usr/lib/dstooltk/bin/linux/dstool_tk DsTool% filesl: save test.ps in progress... /usr/bin/dstooltk: line 67: 19130 Segmentation fault ${prog} ${1+$@} However the snapshot command works properly (print in gif tiff ...). Please also consider the other bug concerning the 3D panels that uses geomview. Thanks and long life to th QA team. -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (990, 'testing'), (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.4.18-bf2.4 Locale: [EMAIL PROTECTED], LC_CTYPE=fr_FR (charmap=ISO-8859-1) Versions of packages dstooltk depends on: ii libc62.3.2.ds1-20GNU C Library: Shared libraries an ii tcl8.0 8.0.5-8 Tcl (the Tool Command Language) v8 ii tk8.08.0.5-11Tk toolkit for Tcl and X11, v8.0 - ii xlibs4.3.0.dfsg.1-10 X Keyboard Extension (XKB) configu -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: your mail
Processing commands for [EMAIL PROTECTED]: package revelation Ignoring bugs not assigned to: revelation tags 297612 + confirmed Bug#297612: revelation: Revelation stopped to work after upgrade Tags were: sid Tags added: confirmed severity 297612 serious Bug#297612: revelation: Revelation stopped to work after upgrade Severity set to `serious'. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#297612: revelation: xnest Test
Hi, I've got a workaround. thanks for the tip, another person had the same problem with his window manager (wmi) and could also start revelatoin after running gnome-theme-manager. I'll try to get hold of the gnome maintainers... regards Stefan -- Stefan Völkel[EMAIL PROTECTED] Millenux GmbH mobile: +49.170.79177.17 Lilienthalstraße 2 phone: +49.711.88770.300 70825 Stuttgart-Korntal fax: +49.711.88770.349 -= linux without limits -=- http://linux.zSeries.org/ =-
Bug#299634: lapack-doc: Upgrade failed due to conflict.
Package: lapack-doc Version: 3.0.2531a-25 Severity: grave Justification: renders package unusable Preparing to replace lapack-doc 3.0.2531a-25 (using .../lapack-doc_3.0.2 531a-27_all.deb) ... Document `lapack-doc.qref' is not installed, cannot remove. Document `lapack-doc.release' is not installed, cannot remove. Document `lapack-doc.faq' is not installed, cannot remove. Document `lapack-doc.lug' is not installed, cannot remove. Unpacking replacement lapack-doc ... dpkg: error processing /var/cache/apt/archives/lapack-doc_3.0.2531a-27_all.d eb (--unpack): trying to overwrite `/usr/share/man/man3/cgbequ.3.gz', which is also in package lapack3-doc -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (101, 'testing'), (99, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.8-2-686 Locale: LANG=en_GB, LC_CTYPE=en_GB (charmap=ISO-8859-1) (ignored: LC_ALL set to en_GB) -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299549: marked as done (login: upgrade from woody fails due to conflicting files)
Your message dated Tue, 15 Mar 2005 10:17:22 -0500 with message-id [EMAIL PROTECTED] and subject line Bug#299549: fixed in shadow 1:4.0.3-31sarge1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 14 Mar 2005 21:53:12 + From [EMAIL PROTECTED] Mon Mar 14 13:53:11 2005 Return-path: [EMAIL PROTECTED] Received: from main.uucpssh.org [212.27.33.224] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DAxUs-nD-00; Mon, 14 Mar 2005 13:53:10 -0800 Received: from localhost (localhost [127.0.0.1]) by main.uucpssh.org (Postfix) with ESMTP id 0BD96781CD for [EMAIL PROTECTED]; Mon, 14 Mar 2005 22:53:09 +0100 (CET) Received: by main.uucpssh.org (Postfix, from userid 10) id 8AEF478289; Mon, 14 Mar 2005 22:53:08 +0100 (CET) Received: by localhost.localdomain (Postfix, from userid 1000) id A0D0425CDD; Mon, 14 Mar 2005 22:58:42 +0100 (CET) Date: Mon, 14 Mar 2005 22:58:42 +0100 From: Denis Barbier [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: login: upgrade from woody fails due to conflicting files Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Reportbug-Version: 3.8 User-Agent: Mutt/1.5.6+20040907i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: login Version: 1:4.0.3-30.10 Severity: serious Hi Christian, I was told on a non-Debian mailing list that upgrade from woody to sarge fails because of conflicts between login/sarge and manpages-it/woody. This is similar to #284239. I wrote a script to check all conflicting files, here is the result: Manual page in login/sarge but not login/woody is also in woody /usr/share/man/fr/man1/su.1.gzdoc/manpages-fr /usr/share/man/hu/man1/login.1.gz doc/manpages-hu /usr/share/man/hu/man1/newgrp.1.gzdoc/manpages-hu /usr/share/man/it/man1/login.1.gz doc/manpages-it /usr/share/man/it/man1/newgrp.1.gzdoc/manpages-it /usr/share/man/ja/man1/login.1.gz doc/manpages-ja /usr/share/man/ja/man1/newgrp.1.gzdoc/manpages-ja /usr/share/man/ja/man1/sg.1.gzdoc/manpages-ja /usr/share/man/ja/man1/su.1.gzdoc/manpages-ja /usr/share/man/ja/man5/faillog.5.gz doc/manpages-ja /usr/share/man/ja/man5/login.defs.5.gzdoc/manpages-ja /usr/share/man/ja/man8/faillog.8.gz doc/manpages-ja /usr/share/man/ja/man8/lastlog.8.gz doc/manpages-ja /usr/share/man/ko/man1/login.1.gz doc/manpages-ko /usr/share/man/ko/man1/newgrp.1.gzdoc/manpages-ko /usr/share/man/pl/man1/newgrp.1.gzdoc/manpages-pl /usr/share/man/pl/man5/faillog.5.gz doc/manpages-pl /usr/share/man/pl/man5/login.defs.5.gzdoc/manpages-pl /usr/share/man/pl/man8/faillog.8.gz doc/manpages-pl /usr/share/man/pl/man8/lastlog.8.gz doc/manpages-pl So it seems that manpages-it and manpages-ko are missing, and manpages-de is not needed (of course you can keep it if you prefer): Replaces: shadow-login, shadow-passwd, shellutils ( 2.0-2), manpages-fr, manpages-hu, manpages-it, manpages-ja, manpages-ko, manpages-pl (= 20020406-1) Manual page in passwd/sarge but not passwd/woodyis also in woody /usr/share/man/de/man1/chsh.1.gz doc/manpages-de /usr/share/man/de/man1/passwd.1.gzdoc/manpages-de /usr/share/man/fr/man1/chsh.1.gz doc/manpages-fr /usr/share/man/fr/man1/passwd.1.gzdoc/manpages-fr /usr/share/man/fr/man5/passwd.5.gzdoc/manpages-fr /usr/share/man/fr/man5/shadow.5.gzdoc/manpages-fr /usr/share/man/fr/man8/useradd.8.gz doc/manpages-fr /usr/share/man/fr/man8/userdel.8.gz doc/manpages-fr /usr/share/man/fr/man8/usermod.8.gz
Processed: (no subject)
Processing commands for [EMAIL PROTECTED]: severity 299600 important Bug#299600: Wrong dependencies Severity set to `important'. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299223: webmin-firewall bug
Hello, RE: Debian bug #299223 [0]; is this possibly a duplicate of #283721? I had originall reassigned to iptables, then thought better of it, now I'm not sure. Without more information, I can't tell, but I thought you might have better instinct than I. Thanks, Justin References [0] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=299223 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299532: mysql-server: upgrade to 4.0.24-1 hangs up and init.d script goes to the neverland when called at startup
hi francesco, On Tue, Mar 15, 2005 at 09:43:13AM +0100, Francesco P. Lovergine wrote: NIS client on one of the box. The other is a laptop with local accounts could you try temporariliy disabling nis groups from nsswitch.conf to see if that works around the problem? NIS client on one of the box. The other is a laptop with local accounts only. So nothing in nsswitch.conf for that one. bleh. maybe not. I could set DEBIAN_SCRIPT_DEBUG=1 and provide you a report, anyway it hangs on $MYADMIN ping for ever. that would be helpful. also, could you try the latest uploaded version? i believe that 4.0.24-2 may fix this problem anyway. sean -- signature.asc Description: Digital signature
Bug#299601: widelands hangs and grab keyboard and mouse
Could you attach the logs of the game, for example, next time you reproduce this bug? The best would be to run the game from within the attached script and then attach the whole /tmp/widelands- directory to the bug repport. It would also help if you could kill the process from another machine on the network so that the coredump gets generated. (killall -SEGV widelands) Does this also happen when the game does not grab the focus? Thanks a lot, Mt. On Tue, Mar 15, 2005 at 10:30:56AM +0100, Marcin wrote: Package: widelands Version: build9-3 Severity: serious Justification: unknow After long play widelands cause hang all system and grab keyboard and mouse. It's not possible to do any thing so you must hard restrart computer. It's show occasionally but i got it 3 times. Marcin -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.8-2-686 Locale: LANG=pl_PL, LC_CTYPE=pl_PL (charmap=ISO-8859-2) Versions of packages widelands depends on: ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii libgcc1 1:3.4.3-6 GCC support library ii libsdl-image1 1.2.4-1image loading library for Simple D ii libsdl-net1.2 1.2.5-3network library for Simple DirectM ii libsdl-ttf2.0 2.0.6-5ttf library for Simple DirectMedia ii libsdl1.2debi 1.2.7+1.2.8cvs20041007-4.1 Simple DirectMedia Layer ii libstdc++51:3.3.5-8 The GNU Standard C++ Library v3 ii widelands-dat build9-3 fantasy real-time strategy game (d -- no debconf information widelands.sh Description: Bourne shell script signature.asc Description: Digital signature
Bug#299651: ippl postinst stalls upgrade.
Package: ippl Version: 1.4.14-4 Severity: grave Tags: patch Justification: Breaks upgrades Hi! The most recent version of ippl includes a debconf note, but fails to call db_stop in the postinst script. As a result, depending on debconf setup, the postinst script does not terminate, and the whole upgrade process is stalled. Please either apply the trivial patch below, or consider dropping the debconf note entirely in favour of a NEWS.Debian item that to me seems more appropriate for the task. Regards, Daniel. -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.4.27 Locale: LANG=C, LC_CTYPE=de_DE (charmap=ISO-8859-1) Versions of packages ippl depends on: ii debconf 1.4.46 Debian configuration management sy ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii logrotate 3.7-2Log rotation utility ii perl-base [perl5-base] 5.8.4-8 The Pathologically Eclectic Rubbis -- debconf information excluded --- postinst.orig 2005-03-15 19:15:48.0 +0100 +++ postinst2005-03-15 19:15:55.0 +0100 @@ -2,4 +2,6 @@ . /usr/share/debconf/confmodule +db_stop + #DEBHELPER#
Bug#299223: better idea
On Tue, Mar 15, 2005 at 01:47:17PM +0100, Thilo Pfennig wrote: Am Montag, den 14.03.2005, 18:19 -0500 schrieb Justin Pryzby: On Mon, Mar 14, 2005 at 06:08:39PM -0500, pryzbyj wrote: On second thought, I'm not sure where you are seeing the reported error (in a logfile?). In Webmin. I see; it just displays the output of the shell commands. mkfifo /tmp/fifo; tee -a /tmp/iptables.out 0/tmp/fifo echo -en \n$(date)\n$0 $@ /tmp/fifo; exec 1/tmp/fifo 21 Where to put? init_d load? I originally thought that it should go in /etc/init.d/iptables. Now, I think you should use a wrapper script around /sbin/iptables-save or iptables-restore. Also, what steps are you taking in webmin to cause the error? I don't know what specific caused the output of the error any more. I will, though mail the specifics if I meet the error again. That would be very useful, if you could come up with a minimal sequence of actions to reproduce the problem. Then, its easy to make a wrapper script to help diagnose the source of that problem. Also, if you can reproduce it, please try installing an updated iptables [0] which may fix the problem: Changes: iptables (1.2.11-9) unstable; urgency=medium . [...] * Bug#283721, Policy match save code puts in line feed that makes iptables-restore error, reported and fixed by Matthew Grant. Thanks. I mailed the iptables maintainer just to see if they thought that it was likely the same thing. Thanks, Justin References [0] ftp://ftp.debian.org/debian/pool/main/i/iptables/iptables-dev_1.2.11-10_i386.deb -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#287083: Maintainer agrees
The maintainer has confirmed via IRC that removal is okay, and probably the best thing to do. --Jeroen -- Jeroen van Wolffelaar [EMAIL PROTECTED] (also for Jabber MSN; ICQ: 33944357) http://Jeroen.A-Eskwadraat.nl -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#287083: marked as done (RM: 3270 -- RoQA; undistributable code in non-free)
Your message dated Tue, 15 Mar 2005 14:29:08 -0500 with message-id [EMAIL PROTECTED] and subject line Bug#287083: fixed has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 13 May 2004 13:13:05 + From [EMAIL PROTECTED] Thu May 13 06:13:05 2004 Return-path: [EMAIL PROTECTED] Received: from imap.gmx.net (mail.gmx.net) [213.165.64.20] by spohr.debian.org with smtp (Exim 3.35 1 (Debian)) id 1BOG1J-0004hz-00; Thu, 13 May 2004 06:13:05 -0700 Received: (qmail 7972 invoked by uid 65534); 13 May 2004 13:12:33 - Received: from adsl-190-101.iomart.com (EHLO Torgo) (212.38.190.101) by mail.gmx.net (mp006) with SMTP; 13 May 2004 15:12:33 +0200 X-Authenticated: #12104688 Date: Thu, 13 May 2004 15:24:39 +0100 From: Andrew Saunders [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: 3270: 5250 emulation code, all rights reserved Message-Id: [EMAIL PROTECTED] X-Mailer: Sylpheed version 0.9.6claws (GTK+ 1.2.10; i386-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_PACKAGE, SPAMBUGNUMSUBJ autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: X-CrossAssassin-Score: 1 Package: 3270 Version: all Severity: serious Justification: Policy 2.3 See the license terms here: http://packages.debian.org/changelogs/pool/non-free/3/3270/3270_3.3.2p1-1/copyright The copyright holder of the 5250 emulation code appears to have granted no permissions whatsoever; there is just the bare copyright declaration on its own. Since copyright law works on the basis that pretty much all rights are reserved (barring fair use etc) unless expressly stated otherwise, the 5250 emulation code and all code that could be considered to have been derived from it are most definitely not legally distributable by Debian. Similarly, the portions of code copyrighted by Georgia Tech Research Corporation are not distributable either, since the only right explicitly granted is that to public use (whatever that means). IMO, the 3270 packages should be removed from the archive immediately. -- Andrew Saunders --- Received: (at 287083-close) by bugs.debian.org; 15 Mar 2005 19:43:06 + From [EMAIL PROTECTED] Tue Mar 15 11:43:06 2005 Return-path: [EMAIL PROTECTED] Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DBHwY-0001NQ-00; Tue, 15 Mar 2005 11:43:06 -0800 Received: from jeroen by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DBHj2-0002W0-00; Tue, 15 Mar 2005 14:29:08 -0500 From: Debian Archive Maintenance [EMAIL PROTECTED] To: [EMAIL PROTECTED] X-Katie: melanie $Revision: 1.43 $ Cc: [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Bug#287083: fixed Message-Id: [EMAIL PROTECTED] Sender: Jeroen van Wolffelaar [EMAIL PROTECTED] Date: Tue, 15 Mar 2005 14:29:08 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: We believe that the bug you reported is now fixed; the following package(s) have been removed from unstable: 3270 | 3.3.2p1-1 | source 3270-common | 3.2.17-2 | alpha, hppa, s390 3270-common | 3.2.20-2 | ia64 3270-common | 3.3.2p1-1 | i386, mips, powerpc c3270 | 3.2.17-2 | alpha, hppa, s390 c3270 | 3.2.20-2 | ia64 c3270 | 3.3.2p1-1 | i386, mips, powerpc pr3287 | 3.2.17-2 | alpha, hppa, s390 pr3287 | 3.2.20-2 | ia64 pr3287 | 3.3.2p1-1 | i386, mips, powerpc s3270 | 3.2.17-2 | alpha, hppa, s390 s3270 | 3.2.20-2 | ia64 s3270 | 3.3.2p1-1 | i386, mips, powerpc tcl3270 | 3.2.17-2 | alpha, hppa, s390 tcl3270 | 3.2.20-2 | ia64 tcl3270 | 3.3.2p1-1 | i386, mips, powerpc x3270 | 3.2.17-2 | alpha, hppa, s390 x3270 | 3.2.20-2 | ia64 x3270 | 3.3.2p1-1 | i386, mips, powerpc x3270-htmldoc | 3.3.2p1-1 | all xfonts-x3270-misc | 3.3.2p1-1 | all Note that the package(s) have simply been removed from the tag database and may (or may not) still be in
Bug#298805: marked as done (rebuild without libhowl0 dep)
Your message dated Tue, 15 Mar 2005 14:47:21 -0500 with message-id [EMAIL PROTECTED] and subject line Bug#298805: fixed in control-center 1:2.8.2-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 10 Mar 2005 01:48:13 + From [EMAIL PROTECTED] Wed Mar 09 17:48:13 2005 Return-path: [EMAIL PROTECTED] Received: from imf25aec.mail.bellsouth.net [205.152.59.73] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D9Cmb-0003wc-00; Wed, 09 Mar 2005 17:48:13 -0800 Received: from double-helix.org ([68.154.213.225]) by imf25aec.mail.bellsouth.net (InterMail vM.5.01.06.11 201-253-122-130-111-20040605) with ESMTP id [EMAIL PROTECTED] for [EMAIL PROTECTED]; Wed, 9 Mar 2005 20:47:42 -0500 Received: by anemone (Postfix, from userid 1001) id 98CA6C6AD; Wed, 9 Mar 2005 20:45:21 -0500 (EST) Date: Wed, 9 Mar 2005 20:45:21 -0500 From: Erinn Clark [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: rebuild without libhowl0 dep Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Operating-System: Debian GNU/Linux X-GPG-Key-Server: pgp.mit.edu User-Agent: Mutt/1.5.6+20040907i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_20,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: control-center Severity: grave Justification: libhowl0 moving to non-free (on behalf on RM Steve Langasek) Please rebuild conglomerate without the libhowl0 dependency since it's moving to non-free. Thanks. -- off the chain like a rebellious guanine nucleotide --- Received: (at 298805-close) by bugs.debian.org; 15 Mar 2005 19:58:01 + From [EMAIL PROTECTED] Tue Mar 15 11:58:00 2005 Return-path: [EMAIL PROTECTED] Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DBIAy-0002gT-00; Tue, 15 Mar 2005 11:58:00 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DBI0f-0003QK-00; Tue, 15 Mar 2005 14:47:21 -0500 From: Arnaud Patard [EMAIL PROTECTED] To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#298805: fixed in control-center 1:2.8.2-1 Message-Id: [EMAIL PROTECTED] Sender: Archive Administrator [EMAIL PROTECTED] Date: Tue, 15 Mar 2005 14:47:21 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: control-center Source-Version: 1:2.8.2-1 We believe that the bug you reported is fixed in the latest version of control-center, which is due to be installed in the Debian FTP archive: capplets-data_2.8.2-1_all.deb to pool/main/c/control-center/capplets-data_2.8.2-1_all.deb capplets_2.8.2-1_i386.deb to pool/main/c/control-center/capplets_2.8.2-1_i386.deb control-center_2.8.2-1.diff.gz to pool/main/c/control-center/control-center_2.8.2-1.diff.gz control-center_2.8.2-1.dsc to pool/main/c/control-center/control-center_2.8.2-1.dsc control-center_2.8.2.orig.tar.gz to pool/main/c/control-center/control-center_2.8.2.orig.tar.gz gnome-control-center_2.8.2-1_i386.deb to pool/main/c/control-center/gnome-control-center_2.8.2-1_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Arnaud Patard [EMAIL PROTECTED] (supplier of updated control-center package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Wed, 9 Mar 2005 23:18:44 +0100 Source: control-center Binary: capplets gnome-control-center capplets-data Architecture: source all i386 Version: 1:2.8.2-1 Distribution: unstable Urgency: low
Processed: .
Processing commands for [EMAIL PROTECTED]: reopen 276964 ! Bug#276964: set -e; if eval ...; then ...; else ...; fi exits if false, rather than executing 'else' Bug#268944: sh: wrong errexit with eval Bug reopened, originator set to Gerrit Pape [EMAIL PROTECTED]. tags 276964 + sarge Bug#276964: set -e; if eval ...; then ...; else ...; fi exits if false, rather than executing 'else' Tags were: patch Bug#268944: sh: wrong errexit with eval Tags added: sarge End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299651: marked as done (ippl postinst stalls upgrade.)
Your message dated Tue, 15 Mar 2005 15:47:56 -0500 with message-id [EMAIL PROTECTED] and subject line Bug#299651: fixed in ippl 1.4.14-5 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 15 Mar 2005 18:18:25 + From [EMAIL PROTECTED] Tue Mar 15 10:18:25 2005 Return-path: [EMAIL PROTECTED] Received: from antares.tat.physik.uni-tuebingen.de [134.2.170.62] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DBGca-0007ws-00; Tue, 15 Mar 2005 10:18:24 -0800 Received: from localhost (localhost [127.0.0.1]) by antares.tat.physik.uni-tuebingen.de (Postfix) with ESMTP id 0BBDF4A634 for [EMAIL PROTECTED]; Tue, 15 Mar 2005 19:18:23 +0100 (CET) Received: from antares.tat.physik.uni-tuebingen.de ([127.0.0.1]) by localhost (antares [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 18528-01 for [EMAIL PROTECTED]; Tue, 15 Mar 2005 19:18:18 +0100 (CET) Received: by antares.tat.physik.uni-tuebingen.de (Postfix, from userid 1000) id 433074A639; Tue, 15 Mar 2005 19:18:18 +0100 (CET) Date: Tue, 15 Mar 2005 19:18:18 +0100 From: Daniel Kobras [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: ippl postinst stalls upgrade. Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: multipart/mixed; boundary=nFreZHaLTZJo0R7j Content-Disposition: inline X-Reportbug-Version: 3.8 User-Agent: Mutt/1.5.6+20040907i X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at tat.physik.uni-tuebingen.de Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: --nFreZHaLTZJo0R7j Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Package: ippl Version: 1.4.14-4 Severity: grave Tags: patch Justification: Breaks upgrades Hi! The most recent version of ippl includes a debconf note, but fails to call db_stop in the postinst script. As a result, depending on debconf setup, the postinst script does not terminate, and the whole upgrade process is stalled. Please either apply the trivial patch below, or consider dropping the debconf note entirely in favour of a NEWS.Debian item that to me seems more appropriate for the task. Regards, Daniel. -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.4.27 Locale: LANG=C, LC_CTYPE=de_DE (charmap=ISO-8859-1) Versions of packages ippl depends on: ii debconf 1.4.46 Debian configuration management sy ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii logrotate 3.7-2Log rotation utility ii perl-base [perl5-base] 5.8.4-8 The Pathologically Eclectic Rubbis -- debconf information excluded --nFreZHaLTZJo0R7j Content-Type: text/plain; charset=us-ascii Content-Disposition: inline; filename=diff2 --- postinst.orig 2005-03-15 19:15:48.0 +0100 +++ postinst2005-03-15 19:15:55.0 +0100 @@ -2,4 +2,6 @@ . /usr/share/debconf/confmodule +db_stop + #DEBHELPER# --nFreZHaLTZJo0R7j-- --- Received: (at 299651-close) by bugs.debian.org; 15 Mar 2005 20:54:22 + From [EMAIL PROTECTED] Tue Mar 15 12:54:22 2005 Return-path: [EMAIL PROTECTED] Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DBJ3V-00021Y-00; Tue, 15 Mar 2005 12:54:22 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DBIxI-0001Zp-00; Tue, 15 Mar 2005 15:47:56 -0500 From: RISKO Gergely [EMAIL PROTECTED] To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#299651: fixed in ippl 1.4.14-5 Message-Id: [EMAIL PROTECTED] Sender: Archive Administrator [EMAIL PROTECTED] Date: Tue, 15 Mar 2005 15:47:56 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: ippl Source-Version: 1.4.14-5 We believe that the bug you
Bug#299532: mysql-server: upgrade to 4.0.24-1 hangs up and init.d script goes to the neverland when called at startup
On Tue, Mar 15, 2005 at 12:08:06PM -0500, sean finney wrote: that would be helpful. also, could you try the latest uploaded version? i believe that 4.0.24-2 may fix this problem anyway. Yes, -2 seems ok, on both boxes. Feel free to close the report. -- Francesco P. Lovergine -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#248853: marked as done (3270: 5250 emulation code, all rights reserved)
Your message dated Tue, 15 Mar 2005 21:21:52 + with message-id [EMAIL PROTECTED] and subject line Removed has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 13 May 2004 13:13:05 + From [EMAIL PROTECTED] Thu May 13 06:13:05 2004 Return-path: [EMAIL PROTECTED] Received: from imap.gmx.net (mail.gmx.net) [213.165.64.20] by spohr.debian.org with smtp (Exim 3.35 1 (Debian)) id 1BOG1J-0004hz-00; Thu, 13 May 2004 06:13:05 -0700 Received: (qmail 7972 invoked by uid 65534); 13 May 2004 13:12:33 - Received: from adsl-190-101.iomart.com (EHLO Torgo) (212.38.190.101) by mail.gmx.net (mp006) with SMTP; 13 May 2004 15:12:33 +0200 X-Authenticated: #12104688 Date: Thu, 13 May 2004 15:24:39 +0100 From: Andrew Saunders [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: 3270: 5250 emulation code, all rights reserved Message-Id: [EMAIL PROTECTED] X-Mailer: Sylpheed version 0.9.6claws (GTK+ 1.2.10; i386-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_PACKAGE, SPAMBUGNUMSUBJ autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: X-CrossAssassin-Score: 1 Package: 3270 Version: all Severity: serious Justification: Policy 2.3 See the license terms here: http://packages.debian.org/changelogs/pool/non-free/3/3270/3270_3.3.2p1-1/copyright The copyright holder of the 5250 emulation code appears to have granted no permissions whatsoever; there is just the bare copyright declaration on its own. Since copyright law works on the basis that pretty much all rights are reserved (barring fair use etc) unless expressly stated otherwise, the 5250 emulation code and all code that could be considered to have been derived from it are most definitely not legally distributable by Debian. Similarly, the portions of code copyrighted by Georgia Tech Research Corporation are not distributable either, since the only right explicitly granted is that to public use (whatever that means). IMO, the 3270 packages should be removed from the archive immediately. -- Andrew Saunders --- Received: (at 248853-done) by bugs.debian.org; 15 Mar 2005 21:22:07 + From [EMAIL PROTECTED] Tue Mar 15 13:22:07 2005 Return-path: [EMAIL PROTECTED] Received: from sorrow.cyrius.com [65.19.161.204] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DBJUM-0004KF-00; Tue, 15 Mar 2005 13:22:06 -0800 Received: by sorrow.cyrius.com (Postfix, from userid 10) id C149D64D45; Tue, 15 Mar 2005 21:22:05 + (UTC) Received: by deprecation.cyrius.com (Postfix, from userid 1000) id 7FAE84EDA4; Tue, 15 Mar 2005 21:21:52 + (GMT) Date: Tue, 15 Mar 2005 21:21:52 + From: Martin Michlmayr [EMAIL PROTECTED] To: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Removed Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.6+20040907i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-2.0 required=4.0 tests=BAYES_00,ONEWORD autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: X-CrossAssassin-Score: 3 The 3270 packages have been removed because of legal issues: the code is undistributable, even in non-free. -- Martin Michlmayr http://www.cyrius.com/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299572: Cannot find user `ntp'
Hi. When running ntpd I get the same error that Erwan David reported. ntpd outputs Cannot find user `ntp' to syslog and then exits. This seems to be another bug than the segmentation fault. Syslog: Mar 15 21:30:35 p250 ntpd[20223]: kernel time sync status 0040 Mar 15 21:30:35 p250 ntpd[20223]: frequency initialized -160.212 PPM from /var/lib/ntp/ntp.drift Mar 15 21:30:35 p250 ntpd[20223]: Cannot find user `ntp' I think the problem has something to do with the code that drops root privileges that is new according to changelog.Debian. That message is only sent if getpwnam(user) is NULL (ntpd/ntpd.c line 890). Running ltrace confirms that getpwnamn(ntp) actually returns NULL which is strange since the user ntp does exist. I removed the --enable-linuxcaps configure options in debian/rules and recompiled the packages. With those recompiled packages I get the same segmentation fault that others have reported. :( Best regards Pär
Processed: Re: Bug#299589: per-plugin group directive apparently ignored
Processing commands for [EMAIL PROTECTED]: severity 299589 serious Bug#299589: per-plugin group directive apparently ignored Severity set to `serious'. quit Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299572: Cannot find user `ntp'
Hi, Pär Andersson: Hi. When running ntpd I get the same error that Erwan David reported. ntpd outputs Cannot find user `ntp' to syslog and then exits. This seems to be another bug than the segmentation fault. A new upload which (hopefully) fixes this problem will happen shortly. -- Matthias Urlichs | {M:U} IT Design @ m-u-it.de | [EMAIL PROTECTED] signature.asc Description: Digital signature
Bug#299709: digikam: Fails to install
Package: digikam Version: 0.7-3 Severity: grave Justification: renders package unusable Says it depends on libkexif1 which seems not to be installable. -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.8-2-k7 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages digikam depends on: ii kdelibs4 4:3.3.2-4 KDE core libraries ii libc62.3.2.ds1-20GNU C Library: Shared libraries an ii libgcc1 1:3.4.3-12 GCC support library ii libgdbm3 1.8.3-2 GNU dbm database routines (runtime ii libgphoto2-2 2.1.5-4 gphoto2 digital camera library ii libgphoto2-port0 2.1.5-4 gphoto2 digital camera port librar ii libimlib21.2.0-2.1 powerful image loading and renderi ii libimlib2-dev1.2.0-2.1 Imlib2 development files ii libjpeg626b-10 The Independent JPEG Group's JPEG ii libkexif00.1-2 KDE library to read/edit EXIF info ii libkipi0 0.1.1-2 library for apps that want to use ii libqt3c102-mt3:3.3.3-8 Qt GUI Library (Threaded runtime v ii libstdc++5 1:3.3.5-12 The GNU Standard C++ Library v3 ii libtiff4 3.7.1-4 Tag Image File Format (TIFF) libra ii libx11-6 4.3.0.dfsg.1-12.0.1 X Window System protocol client li ii xlibs4.3.0.dfsg.1-12 X Keyboard Extension (XKB) configu -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#293798: marked as done (gnucash crashes upon start-up)
Your message dated Tue, 15 Mar 2005 18:02:07 -0500 with message-id [EMAIL PROTECTED] and subject line Bug#293798: fixed in gnucash 1.8.10-9 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 5 Feb 2005 20:06:37 + From [EMAIL PROTECTED] Sat Feb 05 12:06:36 2005 Return-path: [EMAIL PROTECTED] Received: from smtp103.rog.mail.re2.yahoo.com [206.190.36.81] by spohr.debian.org with smtp (Exim 3.35 1 (Debian)) id 1CxWCS-0006GY-00; Sat, 05 Feb 2005 12:06:36 -0800 Received: from unknown (HELO joefox.quist.ca) ([EMAIL PROTECTED]@70.26.142.146 with login) by smtp103.rog.mail.re2.yahoo.com with SMTP; 5 Feb 2005 20:06:05 - Received: (qmail 10763 invoked from network); 5 Feb 2005 20:06:01 - Received: from joefox.quist.ca (192.168.1.10) by 0 with SMTP; 5 Feb 2005 20:06:01 - Content-Type: text/plain; charset=us-ascii MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Russell Sutherland [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: gnucash crashes upon start-up Bcc: Russell Sutherland [EMAIL PROTECTED] X-Mailer: reportbug 3.7.1 Date: Sat, 05 Feb 2005 15:06:01 -0500 Message-Id: [EMAIL PROTECTED] Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: gnucash Version: 1.8.10-5 Severity: normal When starting up, gnucash crashes according to the following strace: access(/home/russ/.gnucash/books/%2Fhome%2Fruss%2Fconsulting%2Fquist%2Fgnucash%2Faccounts, F_OK) = 0 open(/home/russ/.gnucash/books/%2Fhome%2Fruss%2Fconsulting%2Fquist%2Fgnucash%2Faccounts, O_RDONLY) = 9 fcntl64(9, F_GETFL) = 0 (flags O_RDONLY) lseek(9, 0, SEEK_CUR) = 0 fstat64(9, {st_mode=S_IFREG|0644, st_size=2354, ...}) = 0 select(1024, [9], [], [], {0, 0}) = 1 (in [9], left {0, 0}) read(9, ..., 4096) = 2354 times({tms_utime=548, tms_stime=24, tms_cutime=64, tms_cstime=5}) = 5738931 times({tms_utime=554, tms_stime=24, tms_cutime=64, tms_cstime=5}) = 5738940 times({tms_utime=560, tms_stime=25, tms_cutime=64, tms_cstime=5}) = 5738956 times({tms_utime=568, tms_stime=25, tms_cutime=64, tms_cstime=5}) = 5738975 times({tms_utime=576, tms_stime=25, tms_cutime=64, tms_cstime=5}) = 5738990 times({tms_utime=582, tms_stime=25, tms_cutime=64, tms_cstime=5}) = 5739003 old_mmap(NULL, 2101248, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x41eed000 brk(0) = 0x82ec000 brk(0x830e000) = 0x830e000 times({tms_utime=595, tms_stime=26, tms_cutime=64, tms_cstime=5}) = 5739042 times({tms_utime=606, tms_stime=26, tms_cutime=64, tms_cstime=5}) = 5739065 times({tms_utime=614, tms_stime=26, tms_cutime=64, tms_cstime=5}) = 5739080 times({tms_utime=620, tms_stime=26, tms_cutime=64, tms_cstime=5}) = 5739093 times({tms_utime=632, tms_stime=26, tms_cutime=64, tms_cstime=5}) = 5739112 times({tms_utime=639, tms_stime=26, tms_cutime=64, tms_cstime=5}) = 5739128 brk(0) = 0x830e000 brk(0x832f000) = 0x832f000 times({tms_utime=649, tms_stime=26, tms_cutime=64, tms_cstime=5}) = 5739153 times({tms_utime=661, tms_stime=26, tms_cutime=64, tms_cstime=5}) = 5739173 times({tms_utime=668, tms_stime=26, tms_cutime=64, tms_cstime=5}) = 5739188 brk(0) = 0x832f000 brk(0x835) = 0x835 old_mmap(NULL, 2101248, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x420ee000 brk(0) = 0x835 brk(0x8371000) = 0x8371000 times({tms_utime=682, tms_stime=27, tms_cutime=64, tms_cstime=5}) = 5739232 times({tms_utime=698, tms_stime=27, tms_cutime=64, tms_cstime=5}) = 5739258 times({tms_utime=706, tms_stime=27, tms_cutime=64, tms_cstime=5}) = 5739274 brk(0) = 0x8371000 brk(0x8392000) = 0x8392000 times({tms_utime=716, tms_stime=28, tms_cutime=64, tms_cstime=5}) = 5739301 times({tms_utime=733, tms_stime=28, tms_cutime=64, tms_cstime=5}) = 5739326 times({tms_utime=742, tms_stime=28, tms_cutime=64, tms_cstime=5}) = 5739342 brk(0) = 0x8392000 brk(0x83b3000)
Processed: Re: Bug#299702: hugs shouldn't go into sarge yet
Processing commands for [EMAIL PROTECTED]: severity 299702 serious Bug#299702: hugs shouldn't go into sarge yet Severity set to `serious'. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: retag it now
Processing commands for [EMAIL PROTECTED]: reopen 293798 Bug#293798: gnucash crashes upon start-up Bug reopened, originator not changed. tags 293798 + sarge Bug#293798: gnucash crashes upon start-up There were no tags set. Tags added: sarge thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299532: marked as done (mysql-server: upgrade to 4.0.24-1 hangs up and init.d script goes to the neverland when called at startup)
Your message dated Tue, 15 Mar 2005 18:35:49 -0500 with message-id [EMAIL PROTECTED] and subject line Bug#299532: mysql-server: upgrade to 4.0.24-1 hangs up and init.d script goes to the neverland when called at startup has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 14 Mar 2005 18:58:17 + From [EMAIL PROTECTED] Mon Mar 14 10:58:17 2005 Return-path: [EMAIL PROTECTED] Received: from egg.area.ba.cnr.it [150.145.80.53] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DAulc-0007J2-00; Mon, 14 Mar 2005 10:58:17 -0800 Received: from localhost (localhost [127.0.0.1]) by egg.area.ba.cnr.it (8.13.1/8.13.1/SuSE Linux 0.7) with ESMTP id j2EIwEu3026947 for [EMAIL PROTECTED]; Mon, 14 Mar 2005 19:58:14 +0100 Received: from klecker (klecker.ba.issia.cnr.it [150.145.84.32]) by egg.area.ba.cnr.it (8.13.1/8.13.1/SuSE Linux 0.7) with ESMTP id j2EIw5j7026936 for [EMAIL PROTECTED]; Mon, 14 Mar 2005 19:58:05 +0100 Received: from adsl-113-214.37-151.net24.it ([151.37.214.113] helo=localhost) by klecker with esmtpa (Exim 4.44) id 1DAulO-L4-Tv for [EMAIL PROTECTED]; Mon, 14 Mar 2005 19:58:03 +0100 Received: from frankie by localhost with local (Exim 4.50) id 1DAul0-0002Rx-2A for [EMAIL PROTECTED]; Mon, 14 Mar 2005 19:57:38 +0100 Content-Type: text/plain; charset=us-ascii MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Francesco P. Lovergine [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: mysql-server: upgrade to 4.0.24-1 hangs up and init.d script goes to the neverland when called at startup X-Mailer: reportbug 3.8 Date: Mon, 14 Mar 2005 19:57:37 +0100 Message-Id: [EMAIL PROTECTED] X-Virus-Scanned: by amavisd-new-20041102+Sophos at egg.area.ba.cnr.it Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: mysql-server Version: 4.0.24-1 Severity: grave Justification: renders package unusable Upgrading from 4.0.23-7 hangs up (apparently after stopping and trying starting, pinging the server does not return with pending processes running). This is true on two different boxes. This causes serious trouble if the box restarts, because startup at level 2 holds on at /etc/init.d/mysql run. Reinstalling 5.0.23-7 of course solves the issue. (frankie:~)$ sudo /etc/init.d/mysql start Starting MySQL database server: mysqld [1]+ Stopped sudo /etc/init.d/mysql start (frankie:~)$ bg [1]+ sudo /etc/init.d/mysql start (frankie:~)$ ps -fe|grep mysql root 9141 6185 0 19:56 pts/100:00:00 /bin/bash /etc/init.d/mysql start root 9156 9141 0 19:56 pts/100:00:00 /bin/sh /usr/bin/mysqld_safe root 9195 9156 0 19:56 pts/100:00:00 /bin/sh /usr/bin/mysqld_safe mysql 9196 9195 2 19:56 pts/100:00:00 /usr/sbin/mysqld --basedir=/usr --datadir=/var/lib/mysql --user=mysql --pid-file=/var/run/mysqld/mysqld.pid --skip-locking --port=3306 --socket=/var/run/mysqld/mysqld.sock root 9197 9195 0 19:56 pts/100:00:00 logger -p daemon.err -t mysqld_safe -i -t mysqld mysql 9199 9196 0 19:56 pts/100:00:00 [mysqld] defunct root 9300 9141 0 19:56 pts/100:00:00 /bin/bash /etc/init.d/mysql start root 9301 9300 0 19:56 pts/100:00:00 /usr/bin/mysqladmin --defaults-file=/etc/mysql/debian.cnf ping ... -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.10-1-686 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages mysql-server depends on: ii adduser 3.63Add and remove users and groups ii debconf 1.4.46 Debian configuration management sy ii gawk 1:3.1.4-2 GNU awk, a pattern scanning and pr ii libc62.3.2.ds1-20GNU C Library: Shared libraries an ii libdbi-perl 1.46-6 Perl5 database interface by Tim Bu ii libmysqlclient12 4.0.24-1mysql database client library ii libstdc++5 1:3.3.5-12 The GNU Standard C++ Library v3 ii mailx
Bug#164090: marked as done (FTBFS: Build failure of gsmartcard on i386)
Your message dated Tue, 15 Mar 2005 19:02:20 -0500 with message-id [EMAIL PROTECTED] and subject line Bug#164090: fixed in gsmartcard 0.1.5-2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 10 Oct 2002 06:50:50 + From [EMAIL PROTECTED] Thu Oct 10 01:50:50 2002 Return-path: [EMAIL PROTECTED] Received: from mikilab.doshisha.ac.jp [202.23.156.50] by master.debian.org with esmtp (Exim 3.12 1 (Debian)) id 17zX9l-0001Li-00; Thu, 10 Oct 2002 01:50:50 -0500 Received: from atoron.work.isl.doshisha.ac.jp (localhost [127.0.0.1]) by mikilab.doshisha.ac.jp (8.9.3/3.7W) with SMTP id PAA04142 for [EMAIL PROTECTED]; Thu, 10 Oct 2002 15:50:19 +0900 X-Authentication-Warning: mikilab.doshisha.ac.jp: Host localhost [127.0.0.1] claimed to be atoron.work.isl.doshisha.ac.jp Date: Thu, 10 Oct 2002 15:50:35 +0900 From: Junichi Uekawa [EMAIL PROTECTED] To: submit bug tracking system [EMAIL PROTECTED] Subject: FTBFS: Build failure of gsmartcard on i386 Message-Id: [EMAIL PROTECTED] Organization: Netfort project X-Mailer: Sylpheed version 0.8.3 (GTK+ 1.2.10; i386-debian-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Delivered-To: [EMAIL PROTECTED] Package: gsmartcard Version: 0.1.5-1 gsmartcard fails to build from source on i386, when doing a binary-all build. I am filing this bug to notify you that I failed to build your package from source. It is a serious problem that your source does not build from source using the information provided in your control files, and such a package should not be distributed in a stable Debian distribution. This build was done using pbuilder package. s/gdk-imlib-dev/gdk-imlib1-dev/ Build log follows: === Unpacking fakeroot (from .../fakeroot_0.4.5-2.7_i386.deb) ... Setting up fakeroot (0.4.5-2.7) ... - Building the package W: execute priv not set on file /mnt/mirror/buildd/tmp-b-atoron-12084/A[0-9][0-9]*, not executing. su: Authentication service cannot retrieve authentication info. (Ignored) dpkg-buildpackage: source package is gsmartcard dpkg-buildpackage: source version is 0.1.5-1 dpkg-buildpackage: source maintainer is Carlos Prados [EMAIL PROTECTED] dpkg-buildpackage: host architecture is i386 dpkg-checkbuilddeps: Unmet build dependencies: libgnome-dev (= 1.2.13-5) dpkg-buildpackage: Build dependencies/conflicts unsatisfied; aborting. dpkg-buildpackage: (Use -d flag to override.) === regards, junichi -- [EMAIL PROTECTED] http://www.netfort.gr.jp/~dancer --- Received: (at 164090-close) by bugs.debian.org; 16 Mar 2005 00:10:47 + From [EMAIL PROTECTED] Tue Mar 15 16:10:46 2005 Return-path: [EMAIL PROTECTED] Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DBM7a-00041v-00; Tue, 15 Mar 2005 16:10:46 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DBLzQ-0005gX-00; Tue, 15 Mar 2005 19:02:20 -0500 From: Andrew Pollock [EMAIL PROTECTED] To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#164090: fixed in gsmartcard 0.1.5-2 Message-Id: [EMAIL PROTECTED] Sender: Archive Administrator [EMAIL PROTECTED] Date: Tue, 15 Mar 2005 19:02:20 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: gsmartcard Source-Version: 0.1.5-2 We believe that the bug you reported is fixed in the latest version of gsmartcard, which is due to be installed in the Debian FTP archive: gsmartcard_0.1.5-2.diff.gz to pool/main/g/gsmartcard/gsmartcard_0.1.5-2.diff.gz gsmartcard_0.1.5-2.dsc to pool/main/g/gsmartcard/gsmartcard_0.1.5-2.dsc gsmartcard_0.1.5-2_i386.deb to pool/main/g/gsmartcard/gsmartcard_0.1.5-2_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Andrew Pollock [EMAIL PROTECTED]
Bug#299716: racoon: [CAN-2005-0398] KAME Racoon ISAKMP Header Parsing Denial of Service
Package: racoon Severity: grave Tags: sid sarge patch Justification: remote DoS Original Advisory: https://bugzilla.redhat.com/bugz...nt.cgi?id=109966action=view http://secunia.com/advisories/14584/ Description: Sebastian Krahmer has reported a vulnerability in KAME Racoon, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error when parsing ISAKMP headers and can be exploited via a specially crafted ISAKMP packet. Solution: The vulnerability has been fixed in SNAP release 2005/03/14. http://www.kame.net/snap-users/ The attached patch's changelog is, Tue Mar 8 05:31:52 JST 2005 * kame/kame/racoon/isakmp.c: one of buffer overrun problem was fixed. from ipsec-tools team. The diff is between, kame-20050307-openbsd36-snap.tgz kame-20050314-openbsd36-snap.tgz -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.10-1-k7 Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8) Versions of packages racoon depends on: ii debconf 1.4.46 Debian configuration management sy ii ipsec-tools 1:0.5-4 IPsec tools for Linux ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii libreadline55.0-10 GNU readline and history libraries ii libssl0.9.7 0.9.7e-3 SSL shared libraries ii perl5.8.4-8 Larry Wall's Practical Extraction diff -ru kame.old/kame/kame/racoon/isakmp.c kame.new/kame/kame/racoon/isakmp.c --- kame.old/kame/kame/racoon/isakmp.c 2004-03-30 21:14:39.0 -0600 +++ kame.new/kame/kame/racoon/isakmp.c 2005-03-07 14:29:58.0 -0600 @@ -1,4 +1,4 @@ -/* $KAME: isakmp.c,v 1.181 2004/03/31 03:14:39 sakane Exp $ */ +/* $KAME: isakmp.c,v 1.182 2005/03/07 20:29:58 sakane Exp $ */ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. @@ -1151,7 +1151,7 @@ p-type = np; p-len = ntohs(gen-len); - if (p-len == 0 || p-len tlen) { + if (p-len sizeof(struct isakmp_gen) || p-len tlen) { plog(LLV_DEBUG, LOCATION, NULL, invalid length of payload\n); vfree(result);
Processed: your mail
Processing commands for [EMAIL PROTECTED]: tag 299716 + security Bug#299716: racoon: [CAN-2005-0398] KAME Racoon ISAKMP Header Parsing Denial of Service Tags were: patch sarge sid Tags added: security thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299709: digikam: Fails to install
On Tuesday 15 March 2005 23:13, Benoît Deville wrote: Package: digikam Version: 0.7-3 this should be 0.7.2-1 *duck* Severity: grave Justification: renders package unusable Says it depends on libkexif1 which seems not to be installable. Yes. Sorry! It was a sad stupid accident that 0.7.2 was uploaded. Sorry! libkexif1 is pending in debians NEW queue waiting for approval. Until libkexif1(and -dev) enters sid you can o set digikam pkg to hold state to avoid error in future apt-get (dist-)upgrade runs. or o add 'deb http://www.mpe.mpg.de/~ach/debian/experimental ./' to get a set of digikam* kipi-plugins* and libkexif1 pkgs that installs. As 'soon' as libkexif1{,-dev} pkgs enters sid we'll upload this set of pkgs. [1] Sorry again for the trouble, Achim [1] showimg also needs to be rebuild against libkexif1. I've contact the DD already. So everything will ready in time. -- To me vi is Zen. To use vi is to practice zen. Every command is a koan. Profound to the user, unintelligible to the uninitiated. You discover truth everytime you use it. -- [EMAIL PROTECTED]
Bug#299717: hal: Install-time script cranks mixer up while soundcard is in use
Subject: hal: Install-time script cranks mixer up while soundcard is in use Package: hal Version: 0.4.7-2 Severity: critical *** Please type your report below this line *** While installing hal, the initscript is run and hald is started. This cuased my machine to suddenly crank all the mixer settings almost all the way to the top. Since I was actually listening to music at the time, and my mixer requires fairly low levels for safe operation, it increased the volume levels *WELL PAST* what is safe. This bug is easily capable of causing PERMANENT HEARING LOSS, not to mention permanent hardware damage. My ears are *still* ringing five minutes later. -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.10 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages hal depends on: ii adduser 3.63 Add and remove users and groups ii dbus-1 0.23.2-3 simple interprocess messaging syst ii dbus-glib-1 0.23.2-3 simple interprocess messaging syst ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii libcap1 1:1.10-14support for getting/setting POSIX. ii libexpat1 1.95.8-1 XML parsing C library - runtime li ii libglib2.0-02.6.3-1 The GLib library of C routines ii libhal-storage0 0.4.7-2 Hardware Abstraction Layer - share ii libhal0 0.4.7-2 Hardware Abstraction Layer - share ii libpopt01.7-5lib for parsing cmdline parameters ii pciutils1:2.1.11-15 Linux PCI Utilities ii udev0.054-3 /dev/ management daemon ii usbutils0.70-1 USB console utilities -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299719: libldap2.2: Trying to overwrite files from other packages
Package: libldap2.2 Severity: serious Tags: sid Unpacking libldap2.2 (from .../libldap2.2_2.2.23-0.pre3_i386.deb) ... dpkg: error processing /var/cache/apt/archives/libldap2.2_2.2.23-0.pre3_i386.deb (--unpack): trying to overwrite `/usr/lib/liblber-2.2.so.7.0.16', which is also in package libldap-2.2-7 dpkg-deb: subprocess paste killed by signal (Broken pipe) -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.10-1-k7 Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8) Versions of packages libldap2.2 depends on: ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii libldap22.1.30-3 OpenLDAP libraries ii libsasl22.1.19-1.5 Authentication abstraction library ii libssl0.9.7 0.9.7e-3 SSL shared libraries -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299424: marked as done (kernel-patch-grsecurity2: apply script only claims version 2.1.3, it applies however version 2.1.2 (on kernel 2.6.11))
Your message dated Tue, 15 Mar 2005 19:32:29 -0500 with message-id [EMAIL PROTECTED] and subject line Bug#299424: fixed in kernel-patch-grsecurity2 2.1.3-2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 14 Mar 2005 01:09:52 + From [EMAIL PROTECTED] Sun Mar 13 17:09:52 2005 Return-path: [EMAIL PROTECTED] Received: from hosted.by.hosting-skills.org (europe.hosting-skills.org) [213.131.252.208] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DAe5f-0005wu-00; Sun, 13 Mar 2005 17:09:51 -0800 Received: by europe.hosting-skills.org (Postfix, from userid 0) id E010F270FD7; Mon, 14 Mar 2005 02:09:50 +0100 (CET) Content-Type: text/plain; charset=us-ascii MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Yves Kreis [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: kernel-patch-grsecurity2: apply script only claims version 2.1.3, it applies however version 2.1.2 (on kernel 2.6.11) X-Mailer: reportbug 3.8 Date: Mon, 14 Mar 2005 02:09:50 +0100 Message-Id: [EMAIL PROTECTED] Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: kernel-patch-grsecurity2 Version: 2.1.3-1 Severity: grave Justification: renders package unusable The package includes 3 patches for kernel 2.6.11: - grsecurity-2.1.2-2.6.11 - grsecurity-2.1.3-2.6.11 - pax-linux-2.6.11-200503071330 The last one is included in the middle one, however the first one, and only the first one is applied by the apply script. -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (800, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.*-grsec Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) Versions of packages kernel-patch-grsecurity2 depends on: ii bash 3.0-12 The GNU Bourne Again SHell ii debconf [debconf-2.0] 1.4.30.11 Debian configuration management sy ii grep-dctrl2.1.8 Grep Debian package information ii patch 2.5.9-2Apply a diff file to an original -- debconf information excluded --- Received: (at 299424-close) by bugs.debian.org; 16 Mar 2005 00:52:01 + From [EMAIL PROTECTED] Tue Mar 15 16:52:00 2005 Return-path: [EMAIL PROTECTED] Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DBMlT-0007HL-00; Tue, 15 Mar 2005 16:51:59 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DBMSb-00088M-00; Tue, 15 Mar 2005 19:32:29 -0500 From: Laszlo Boszormenyi (GCS) [EMAIL PROTECTED] To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#299424: fixed in kernel-patch-grsecurity2 2.1.3-2 Message-Id: [EMAIL PROTECTED] Sender: Archive Administrator [EMAIL PROTECTED] Date: Tue, 15 Mar 2005 19:32:29 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: X-CrossAssassin-Score: 3 Source: kernel-patch-grsecurity2 Source-Version: 2.1.3-2 We believe that the bug you reported is fixed in the latest version of kernel-patch-grsecurity2, which is due to be installed in the Debian FTP archive: kernel-patch-grsecurity2_2.1.3-2.diff.gz to pool/main/k/kernel-patch-grsecurity2/kernel-patch-grsecurity2_2.1.3-2.diff.gz kernel-patch-grsecurity2_2.1.3-2.dsc to pool/main/k/kernel-patch-grsecurity2/kernel-patch-grsecurity2_2.1.3-2.dsc kernel-patch-grsecurity2_2.1.3-2_all.deb to pool/main/k/kernel-patch-grsecurity2/kernel-patch-grsecurity2_2.1.3-2_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Laszlo Boszormenyi (GCS) [EMAIL PROTECTED] (supplier of updated kernel-patch-grsecurity2 package) (This message was
Bug#299722: mldonkey-server does not start because of /var/run/mldonkey permissions
Package: mldonkey-server Version: 2.5.28-2 Severity: grave Justification: renders package unusable -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (990, 'testing'), (600, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.10-1-686 Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) Versions of packages mldonkey-server depends on: ii adduser 3.63 Add and remove users and groups ii debconf [debconf-2.0] 1.4.30.11Debian configuration management sy ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii mime-support3.28-1 MIME files 'mime.types' 'mailcap ii ucf 1.14 Update Configuration File: preserv ii zlib1g 1:1.2.2-3compression library - runtime -- debconf information: * mldonkey-server/max_hard_download_rate: 0 * mldonkey-server/launch_at_startup: false mldonkey-server/config_exist_no_options: * mldonkey-server/plugin: Directconnect, Opennap, Overnet, Soulseek, Bittorent, Gnutella * mldonkey-server/mldonkey_group: mldonkey mldonkey-server/false_password: * mldonkey-server/max_hard_upload_rate: 2 * mldonkey-server/max_alive: 24 * mldonkey-server/run_as_user: mldonkey mldonkey-server/reown_file: false * mldonkey-server/mldonkey_niceness: mldonkey-server/config_exist_no_dir: mldonkey-server/fasttrack_problem: mldonkey-server/shared_directories: share * mldonkey-server/mldonkey_dir: /var/lib/mldonkey * mldonkey-server/restart_after_upgrade: true * mldonkey-server/client_name: lightning mldonkey-server/mldonkey_move: false * mldonkey-server/mldonkey_umask: 0022 Several people in other bug reports have mentioned that /etc/init.d/mldonkey-server start does actually fail to start the server. Part of the problem might be that /var/lib/mldonkey is not actually generated on install, eventhough this dir is selected via dpkg. However, what sure is the case is the fact that /var/run/mldonkey is owned by root on install and the mldonkey-server init script simply is not able to write to it for some reason. I guess that might be because of chroot or running mldonkey by the mldonkey user. However, it is absolutely certain, that it starts after I set the ownership of the /var/run/mldonkey DIR to mldonkey user! Setting the group instead of the user to mldonkey might help as well. The other problems I still have are described in other bug reports, like the one that whatever I enter in debconf never makes it to the /etc/defaults/mldonkey-server file. I am not sure if /var/lib/mldonkey + files is actually created on first startup when set in defaults accordingly since I first thought it mldonkey does not start up for the reason of the dir + files not being there and therefore copied a working set over from another machine. I never removed it afterwards since I was so happy that it finally worked and fed up with dealing with it. I hope this bug report makes mldonkey-server usable again out of the box. (At least as soon as the startup value users set via debconf on install really makes it into the defaults file). -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299719: marked as done (libldap2.2: Trying to overwrite files from other packages)
Your message dated Wed, 16 Mar 2005 02:25:53 +0100 with message-id [EMAIL PROTECTED] and subject line Bug#299719: libldap2.2: Trying to overwrite files from other packages has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 16 Mar 2005 00:52:23 + From [EMAIL PROTECTED] Tue Mar 15 16:52:23 2005 Return-path: [EMAIL PROTECTED] Received: from polaris.galacticasoftware.com [206.45.95.222] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DBMlq-0007My-00; Tue, 15 Mar 2005 16:52:23 -0800 Received: from mira.lan.galacticasoftware.com ([2001:470:1f00:907:20d:87ff:fe3c:98c8]) by polaris.galacticasoftware.com with esmtp (Exim 4.44) id 1DBMlq-XK-GD for [EMAIL PROTECTED]; Tue, 15 Mar 2005 18:52:22 -0600 Received: from adamm by mira.lan.galacticasoftware.com with local (Exim 4.50) id 1DBMlq-0006j5-Me for [EMAIL PROTECTED]; Tue, 15 Mar 2005 18:52:22 -0600 Content-Type: text/plain; charset=us-ascii MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Adam Majer [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: libldap2.2: Trying to overwrite files from other packages X-Mailer: reportbug 3.8 Date: Tue, 15 Mar 2005 18:52:22 -0600 Message-Id: [EMAIL PROTECTED] Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: libldap2.2 Severity: serious Tags: sid Unpacking libldap2.2 (from .../libldap2.2_2.2.23-0.pre3_i386.deb) ... dpkg: error processing /var/cache/apt/archives/libldap2.2_2.2.23-0.pre3_i386.deb (--unpack): trying to overwrite `/usr/lib/liblber-2.2.so.7.0.16', which is also in package libldap-2.2-7 dpkg-deb: subprocess paste killed by signal (Broken pipe) -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.10-1-k7 Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8) Versions of packages libldap2.2 depends on: ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii libldap22.1.30-3 OpenLDAP libraries ii libsasl22.1.19-1.5 Authentication abstraction library ii libssl0.9.7 0.9.7e-3 SSL shared libraries --- Received: (at 299719-done) by bugs.debian.org; 16 Mar 2005 01:26:32 + From [EMAIL PROTECTED] Tue Mar 15 17:26:31 2005 Return-path: [EMAIL PROTECTED] Received: from tms.rz.uni-kiel.de [134.245.11.89] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DBNIt-0001dB-00; Tue, 15 Mar 2005 17:26:31 -0800 Received: from amavis by tms.rz.uni-kiel.de with scanned-ok (Exim 4.34) id 1DBNIN-0002Ie-UU for [EMAIL PROTECTED]; Wed, 16 Mar 2005 02:25:59 +0100 Received: from zaphod.gpi.uni-kiel.de ([134.245.120.1]) by tms.rz.uni-kiel.de with esmtp (Exim 4.34) id 1DBNIL-0002IW-W9 for [EMAIL PROTECTED]; Wed, 16 Mar 2005 02:25:58 +0100 Received: from localhost ([127.0.0.1] helo=stargate.galaxy) by zaphod.gpi.uni-kiel.de with esmtp (Exim 3.35 #1 (Debian)) id 1DBNIJ-VH-00 for [EMAIL PROTECTED]; Wed, 16 Mar 2005 02:25:55 +0100 Received: by stargate.galaxy (Postfix, from userid 1000) id 2A71B18830; Wed, 16 Mar 2005 02:25:54 +0100 (CET) Date: Wed, 16 Mar 2005 02:25:53 +0100 From: Torsten Landschoff [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Re: Bug#299719: libldap2.2: Trying to overwrite files from other packages Message-ID: [EMAIL PROTECTED] References: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol=application/pgp-signature; boundary=k+w/mQv8wyuph6w0 Content-Disposition: inline In-Reply-To: [EMAIL PROTECTED] User-Agent: Mutt/1.5.6+20040722i X-Virus-Scanned: by AMaViS 0.3.12 (Uni-Kiel/tms) Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: --k+w/mQv8wyuph6w0 Content-Type: text/plain;
Bug#299731: kernel-image-2.6-686-smp: SMP kernel causes krenele panic during boot
Package: kernel-image-2.6-686-smp Version: 101 Severity: critical Justification: breaks the whole system Tested on both testing and unstable. On my (old) dual-P3 system (Asus CUV4X-D), booting the SMP kernels for 2.6.8 or 2.6.10 causes a hand on boot, with the message Kernel panic: attempted to kill init! shortly after printing out some IDE bud information. Non-SMP kernels boot normally (though, of course, without SMP support). Adding noapic or acpi=no to the boot line in either LILO or GRUB makes a difference to this problem. If it helps, here is the output of lspci: :00:00.0 Host bridge: VIA Technologies, Inc. VT82C693A/694x [Apollo PRO133x] (rev c4) :00:01.0 PCI bridge: VIA Technologies, Inc. VT82C598/694x [Apollo MVP3/Pro133x AGP] :00:04.0 ISA bridge: VIA Technologies, Inc. VT82C686 [Apollo Super South] (rev 40) :00:04.1 IDE interface: VIA Technologies, Inc. VT82C586A/B/VT82C686/A/B/VT823x/A/C PIPC Bus Master IDE (rev 06) :00:04.2 USB Controller: VIA Technologies, Inc. VT82x UHCI USB 1.1 Controller (rev 16) :00:04.3 USB Controller: VIA Technologies, Inc. VT82x UHCI USB 1.1 Controller (rev 16) :00:04.4 Host bridge: VIA Technologies, Inc. VT82C686 [Apollo Super ACPI] (rev 40) :00:0a.0 Multimedia audio controller: Creative Labs SB Live! EMU10k1 (rev 08) :00:0a.1 Input device controller: Creative Labs SB Live! MIDI/Game Port (rev 08) :00:0b.0 USB Controller: NEC Corporation USB (rev 43) :00:0b.1 USB Controller: NEC Corporation USB (rev 43) :00:0b.2 USB Controller: NEC Corporation USB 2.0 (rev 04) :00:0d.0 Ethernet controller: 3Com Corporation 3c905C-TX/TX-M [Tornado] (rev 78) :01:00.0 VGA compatible controller: ATI Technologies Inc Radeon R100 QD [Radeon 7200] -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (990, 'testing'), (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.8-2-686 Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) Versions of packages kernel-image-2.6-686-smp depends on: ii kernel-image-2.6.8-2-686-smp 2.6.8-13 Linux kernel image for version 2.6 -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299734: broken on 64-bit systems
Package: goldedplus Version: 1.1.4.7+1.1.5.20031012-1 Severity: grave Justification: renders package unusable File: /usr/bin/golded There are multiple problems with goldedplus on 64-bit systems such as segfaults (see bug 251856 as well) and hanling data files. In particular, while golded starts OK here it's unable to show any messages (I use JAM message base), it shows just empty messages while message counter shows correct number of messages in each area. 'strace' shows that golded uses impossible offsets while seeking in the files like lseek(4, 18690040382214, SEEK_SET) = 18690040382214 (note this offset is even larger than my whole filesystem size) So I believe there some mess of 32- and 64- bit varibles. Moreover, it often crashes but it seems to be a consequence of the problem described above. -- System Information: Debian Release: 3.1 Architecture: amd64 (x86_64) Kernel: Linux 2.6.11.3.64 Locale: LANG=ru_RU.KOI8-R, LC_CTYPE=ru_RU.KOI8-R (charmap=KOI8-R) Versions of packages goldedplus depends on: ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii libgcc1 1:3.4.3-12 GCC support library ii libncurses5 5.4-4Shared libraries for terminal hand ii libstdc++5 1:3.3.5-12 The GNU Standard C++ Library v3 -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#284925: ????????!!?????????????
=?GB2312?B?xI52gqKC3IK3guaCyyE/?= To: [EMAIL PROTECTED] Content-Type: text/plain;charset=EUC Reply-To: [EMAIL PROTECTED] Date: Wed, 16 Mar 2005 11:38:00 +0800 X-Priority: 3 X-Mailer: FoxMail 4.0 beta 2 [cn] Q/Q/Q/Q/Q/Q/Q/Q/Q/Q/Q/Q/Q/ »ñȱñÈÅGw̨bµàæle!! ªÌÐ÷ÉüêĨ¾¯ÅA éÓ¡èiªÅ«élƯ¶ç¢·²¢!! http://peach-naturalwater.com/that2v4/ ³è°È`©µÄÝæ¤!! ³è°È`¾æ!?©É·±¦¿á¤©ç!! http://peach-naturalwater.com/that2v4/ Q/Q/Q/Q/Q/Q/Q/Q/Q/Q/Q/Q/Q/ zMÛ [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#296557: marked as done (openswan requires ipsec-tools but conflicts with it)
Your message dated Wed, 16 Mar 2005 09:36:21 +0530 with message-id [EMAIL PROTECTED] and subject line Fixed in ipsec-tools 0.5-3 upload has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 23 Feb 2005 08:43:38 + From [EMAIL PROTECTED] Wed Feb 23 00:43:38 2005 Return-path: [EMAIL PROTECTED] Received: from ylpvm01-ext.prodigy.net (ylpvm01.prodigy.net) [207.115.57.32] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D3s7O-0005Eb-00; Wed, 23 Feb 2005 00:43:38 -0800 Received: from crafter (adsl-69-109-112-182.dsl.pltn13.pacbell.net [69.109.112.182]) by ylpvm01.prodigy.net (8.12.10 outbound/8.12.10) with ESMTP id j1N8havE013040 for [EMAIL PROTECTED]; Wed, 23 Feb 2005 03:43:37 -0500 From: Ian Turner [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: openswan requires ipsec-tools but conflicts with it Date: Mon, 21 Feb 2005 09:29:30 -0800 User-Agent: KMail/1.7.1 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: [EMAIL PROTECTED] Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-4.3 required=4.0 tests=BAYES_00,FORGED_YAHOO_RCVD, HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: openswan Version: 2.3.0-2 Severity: grave Justification: renders package unusable Both openswan 2.3.0-2 and ipsec-tools 1:0.5-2 include the file /etc/ipsec.conf; since openswan depends on ipsec-tools, this means that openswan cannot be installed without --force-overwrite. -- System Information Debian Release: 3.0 Architecture: i386 Kernel: Linux nemo 2.4.18-bf2.4 #1 Son Apr 14 09:53:28 CEST 2002 i686 Locale: LANG=C, LC_CTYPE=C Versions of packages openswan depends on: ii bind9-host [host] 1:9.2.1-2.woody.2 Version of 'host' bundled with BIN ii bsdmainutils 5.20020211-4.99 More utilities from FreeBSD. ii debianutils1.16.2woody1 Miscellaneous utilities specific t ii gawk 1:3.1.0-3 GNU awk, a pattern scanning and pr ii iproute20010824-8woody1 Professional tools to control the ii ipsec-tools1:0.5-2 IPsec tools for Linux ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii libgmp34.0.1-3 Multiprecision arithmetic library ii libssl0.9.70.9.7e-3 SSL shared libraries ii makedev2.3.1-58 Creates device files in /dev. ii openssl0.9.6c-2.woody.7 Secure Socket Layer (SSL) binary a --- Received: (at 296557-close) by bugs.debian.org; 16 Mar 2005 04:08:14 + From [EMAIL PROTECTED] Tue Mar 15 20:08:14 2005 Return-path: [EMAIL PROTECTED] Received: from ind-iport-1.cisco.com [64.104.129.195] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DBPpN-000432-00; Tue, 15 Mar 2005 20:08:13 -0800 Received: from india-core-1.cisco.com (64.104.129.221) by ind-iport-1.cisco.com with ESMTP; 16 Mar 2005 09:55:06 +0530 X-BrightmailFiltered: true X-Brightmail-Tracker: AA== X-IronPort-AV: i=3.90,166,1107714600; d=scan'208; a=26231884:sNHT18536584 Received: from ind-mira-01.cisco.com (IDENT:[EMAIL PROTECTED] [64.104.129.12]) by india-core-1.cisco.com (8.12.10/8.12.6) with ESMTP id j2G9aeIO029165 for [EMAIL PROTECTED]; Wed, 16 Mar 2005 09:36:41 GMT Received: from grajagop-lnx (grajagop-lnx.cisco.com [64.104.131.207]) by ind-mira-01.cisco.com (MOS 3.4.6-GR) with SMTP id AJP01715; Wed, 16 Mar 2005 09:35:52 +0530 (IST) Received: by grajagop-lnx (sSMTP sendmail emulation); Wed, 16 Mar 2005 09:36:21 +0530 Date: Wed, 16 Mar 2005 09:36:21 +0530 From: Ganesan Rajagopal [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Fixed in ipsec-tools 0.5-3 upload Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.6+20040907i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level:
Bug#299744: broken package, gimp depends on gimp-data (= 2.2.4-1)
Package: gimp Version: unstable (2.2.4-1) Severity: grave Justification: renders package unusable missing dependency for gimp-data on powerpc. thanks a lot for your work. Wolfgang -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: powerpc (ppc) Kernel: Linux 2.6.5-rc3-ben0 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages gimp depends on: ii aalib1 1.4p5-22ascii art library pn gimp-dataNot found. ii libart-2.0-2 2.3.17-1Library of functions for 2D graphi ii libatk1.0-0 1.8.0-4 The ATK accessibility toolkit ii libbz2-1.0 1.0.2-5 high-quality block-sorting file co ii libc62.3.2.ds1-20GNU C Library: Shared libraries an pn libexif9 Not found. ii libexpat11.95.8-1XML parsing C library - runtime li ii libfontconfig1 2.2.3-4 generic font configuration library ii libfreetype6 2.1.7-2.3 FreeType 2 font engine, shared lib pn libgail-common Not found. pn libgail17Not found. pn libgimp2.0 Not found. ii libgimpprint14.2.7-5 The Gimp-Print printer driver libr ii libglib2.0-0 2.6.3-1 The GLib library of C routines ii libgnomecanvas2-02.8.0-1 A powerful object-oriented display ii libgsf-1 1.11.1-1Structured File Library - runtime ii libgtk2.0-0 2.6.2-4 The GTK+ graphical user interface pn libgtkhtml2-0Not found. ii libice6 4.3.0.dfsg.1-12 Inter-Client Exchange library ii libjpeg626b-10 The Independent JPEG Group's JPEG ii liblcms1 1.13-1 Color management library ii libmng1 1.0.8-1 Multiple-image Network Graphics li ii libncurses5 5.4-4 Shared libraries for terminal hand ii libpango1.0-01.8.1-1 Layout and rendering of internatio ii libpng12-0 1.2.8rel-1 PNG library - runtime pn librsvg2-2 Not found. ii libsm6 4.3.0.dfsg.1-12 X Window System Session Management pn libtiff3gNot found. pn libwmf0.2-7 Not found. ii libx11-6 4.3.0.dfsg.1-12 X Window System protocol client li ii libxml2 2.6.16-3GNOME XML library ii libxmu6 4.3.0.dfsg.1-12 X Window System miscellaneous util ii libxpm4 4.3.0.dfsg.1-12 X pixmap library ii libxt6 4.3.0.dfsg.1-12 X Toolkit Intrinsics ii slang1 1.4.9dbs-8 The S-Lang programming library - r ii wget 1.9.1-10retrieves files from the web ii xlibs4.3.0.dfsg.1-12 X Keyboard Extension (XKB) configu ii zlib1g 1:1.2.2-4 compression library - runtime -- DSL Komplett von GMX +++ Supergünstig und stressfrei einsteigen! AKTION Kein Einrichtungspreis nutzen: http://www.gmx.net/de/go/dsl -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299589: munin-node: broken group support
Package: munin-node Version: 1.2.2-2 Followup-For: Bug #299589 The breakage is where the patch to munin-node introduces a spurious elsif with an empty block... + } + elsif (/^\s*group\s+(.+)\s*$/) + { } elsif (/^\s*group\s+(.+)\s*$/) { Removing one of the two elsif statements fixes the problem. Rob -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.4.27-1-k7 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages munin-node depends on: ii libnet-server-perl0.87-3 An extensible, general perl server ii perl 5.8.4-8Larry Wall's Practical Extraction ii procps1:3.2.5-1 /proc file system utilities -- no debconf information -- Robert Loomans -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299716: marked as done (racoon: [CAN-2005-0398] KAME Racoon ISAKMP Header Parsing Denial of Service)
Your message dated Tue, 15 Mar 2005 23:32:10 -0500 with message-id [EMAIL PROTECTED] and subject line Bug#299716: fixed in ipsec-tools 1:0.5-5 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 16 Mar 2005 00:20:02 + From [EMAIL PROTECTED] Tue Mar 15 16:20:01 2005 Return-path: [EMAIL PROTECTED] Received: from polaris.galacticasoftware.com [206.45.95.222] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DBMGW-0004jZ-00; Tue, 15 Mar 2005 16:20:01 -0800 Received: from mira.lan.galacticasoftware.com ([2001:470:1f00:907:20d:87ff:fe3c:98c8]) by polaris.galacticasoftware.com with esmtp (Exim 4.44) id 1DBMGP-Ud-MZ for [EMAIL PROTECTED]; Tue, 15 Mar 2005 18:19:53 -0600 Received: from adamm by mira.lan.galacticasoftware.com with local (Exim 4.50) id 1DBMGP-0006eR-MJ for [EMAIL PROTECTED]; Tue, 15 Mar 2005 18:19:53 -0600 Content-Type: multipart/mixed; boundary1964818240== MIME-Version: 1.0 From: Adam Majer [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: racoon: [CAN-2005-0398] KAME Racoon ISAKMP Header Parsing Denial of Service X-Mailer: reportbug 3.8 Date: Tue, 15 Mar 2005 18:19:53 -0600 Message-Id: [EMAIL PROTECTED] Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: This is a multi-part MIME message sent by reportbug. --===1964818240== Content-Type: text/plain; charset=us-ascii MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline Package: racoon Severity: grave Tags: sid sarge patch Justification: remote DoS Original Advisory: https://bugzilla.redhat.com/bugz...nt.cgi?id=109966action=view http://secunia.com/advisories/14584/ Description: Sebastian Krahmer has reported a vulnerability in KAME Racoon, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error when parsing ISAKMP headers and can be exploited via a specially crafted ISAKMP packet. Solution: The vulnerability has been fixed in SNAP release 2005/03/14. http://www.kame.net/snap-users/ The attached patch's changelog is, Tue Mar 8 05:31:52 JST 2005 * kame/kame/racoon/isakmp.c: one of buffer overrun problem was fixed. from ipsec-tools team. The diff is between, kame-20050307-openbsd36-snap.tgz kame-20050314-openbsd36-snap.tgz -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.10-1-k7 Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8) Versions of packages racoon depends on: ii debconf 1.4.46 Debian configuration management sy ii ipsec-tools 1:0.5-4 IPsec tools for Linux ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii libreadline55.0-10 GNU readline and history libraries ii libssl0.9.7 0.9.7e-3 SSL shared libraries ii perl5.8.4-8 Larry Wall's Practical Extraction --===1964818240== Content-Type: text/x-c; charset=us-ascii MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename=racoon.patch diff -ru kame.old/kame/kame/racoon/isakmp.c kame.new/kame/kame/racoon/isakmp.c --- kame.old/kame/kame/racoon/isakmp.c 2004-03-30 21:14:39.0 -0600 +++ kame.new/kame/kame/racoon/isakmp.c 2005-03-07 14:29:58.0 -0600 @@ -1,4 +1,4 @@ -/* $KAME: isakmp.c,v 1.181 2004/03/31 03:14:39 sakane Exp $*/ +/* $KAME: isakmp.c,v 1.182 2005/03/07 20:29:58 sakane Exp $*/ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. @@ -1151,7 +1151,7 @@ p-type = np; p-len = ntohs(gen-len); - if (p-len == 0 || p-len tlen) { + if (p-len sizeof(struct isakmp_gen) || p-len tlen) { plog(LLV_DEBUG, LOCATION, NULL, invalid length of payload\n); vfree(result); --===1964818240==-- --- Received: (at 299716-close) by
Processed: reprocess debian bugs for ngspice
Processing commands for [EMAIL PROTECTED]: clone 287347 -1 Bug#287347: ngspice: legal issue Bug 287347 cloned as bug 299748. reasssign -1 ftp.debian.org Unknown command or malformed arguments to command. retitle -1 Please remove ngspice; it is not distributable Bug#299748: ngspice: legal issue Changed Bug title. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: reassigning 299748 to ftp.debian.org
Processing commands for [EMAIL PROTECTED]: reassign 299748 ftp.debian.org Bug#299748: Please remove ngspice; it is not distributable Bug reassigned from package `ngspice' to `ftp.debian.org'. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299261: marked as done (RM: mozilla-firefox-locale-sv/unstable -- RoM; superseded)
Your message dated Wed, 16 Mar 2005 00:47:26 -0500 with message-id [EMAIL PROTECTED] and subject line Bug#299261: fixed has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 13 Mar 2005 00:47:51 + From [EMAIL PROTECTED] Sat Mar 12 16:47:50 2005 Return-path: [EMAIL PROTECTED] Received: from dsl093-039-086.pdx1.dsl.speakeasy.net (minbar.dodds.net) [66.93.39.86] (postfix) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DAHGo-0004gr-00; Sat, 12 Mar 2005 16:47:50 -0800 Received: by minbar.dodds.net (Postfix, from userid 1000) id 0B7D91A103; Sat, 12 Mar 2005 16:47:48 -0800 (PST) Content-Type: text/plain; charset=us-ascii MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Steve Langasek [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: mozilla-firefox-locale-sv: uninstallable in sid X-Mailer: reportbug 3.8 Date: Sat, 12 Mar 2005 16:47:48 -0800 Message-Id: [EMAIL PROTECTED] Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: mozilla-firefox-locale-sv Severity: grave The current version of mozilla-firefox-locale-sv in unstable is no longer installable: # apt-get install mozilla-firefox-locale-sv Reading Package Lists... Done Building Dependency Tree... Done Some packages could not be installed. This may mean that you have requested an impossible situation or if you are using the unstable distribution that some required packages have not yet been created or been moved out of Incoming. Since you only requested a single operation it is extremely likely that the package is simply not installable and a bug report against that package should be filed. The following information may help to resolve the situation: The following packages have unmet dependencies: mozilla-firefox-locale-sv: Depends: mozilla-firefox ( 1.0.0) but 1.0.1-2 is to be installed E: Broken packages # This makes the package unusable, and would also block the security-fixed version of mozilla-firefox from reaching testing. mozilla-firefox-locale-sv will be removed from testing until it has been updated to work with the current version of mozilla-firefox. -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.4.26-1-686 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) --- Received: (at 299261-close) by bugs.debian.org; 16 Mar 2005 05:53:05 + From [EMAIL PROTECTED] Tue Mar 15 21:53:05 2005 Return-path: [EMAIL PROTECTED] Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DBRSq-Ew-00; Tue, 15 Mar 2005 21:53:04 -0800 Received: from jeroen by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DBRNO-0004BW-00; Wed, 16 Mar 2005 00:47:26 -0500 From: Debian Archive Maintenance [EMAIL PROTECTED] To: [EMAIL PROTECTED] X-Katie: melanie $Revision: 1.43 $ Cc: [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Bug#299261: fixed Message-Id: [EMAIL PROTECTED] Sender: Jeroen van Wolffelaar [EMAIL PROTECTED] Date: Wed, 16 Mar 2005 00:47:26 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: We believe that the bug you reported is now fixed; the following package(s) have been removed from unstable: mozilla-firefox-locale-sv | 1.0-1 | source, all Note that the package(s) have simply been removed from the tag database and may (or may not) still be in the pool; this is not a bug. The package(s) will be physically removed automatically when no suite references them (and in the case of source, when no binary references it). Please also remember that the changes have been done on the master archive (ftp-master.debian.org) and will not propagate to any mirrors (ftp.debian.org included) until the next cron.daily run at the earliest. Packages are never removed from testing by hand. Testing tracks unstable and will
Bug#299734: broken on 64-bit systems
Max Alekseyev: There are multiple problems with goldedplus on 64-bit systems such as segfaults (see bug 251856 as well) and hanling data files. Yeah, this probably is the same problem as in bug 251856. The program was simply not designed for 64-bit systems. I should probably just exclude the 64-bit architectures from the supported systems list, until such a time when 64-bit support is added (which is unlikely given that the project is quite dead, much like Fidonet itself). -- \\// Peter - http://www.softwolves.pp.se/ I do not read or respond to mail with HTML attachments. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299753: Broken build-depends
Package: control-center Severity: serious The control-center build depends now contain, amongst others: libasound2-dev (= 1.0.3b-1) [] This is invalid syntax in the control file, and does not what you expect it to do -- most tools will consider this as a no-op, and not demand this package to be installed. Also, this invalid syntax breaks at least one archive tool (not too serious, but whatever). --Jeroen -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.8-2-686 Locale: LANG=nl_NL.UTF-8, LC_CTYPE=nl_NL.UTF-8 (charmap=UTF-8) -- Jeroen van Wolffelaar [EMAIL PROTECTED] http://jeroen.A-Eskwadraat.nl -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#299722: mldonkey-server does not start because of /var/run/mldonkey permissions
Hello, On Tue, Mar 15, 2005 at 08:11:00PM -0500, elias humbolt wrote: Package: mldonkey-server Version: 2.5.28-2 Severity: grave Justification: renders package unusable -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (990, 'testing'), (600, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.10-1-686 Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) Versions of packages mldonkey-server depends on: ii adduser 3.63 Add and remove users and groups ii debconf [debconf-2.0] 1.4.30.11Debian configuration management sy ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii mime-support3.28-1 MIME files 'mime.types' 'mailcap ii ucf 1.14 Update Configuration File: preserv ii zlib1g 1:1.2.2-3compression library - runtime -- debconf information: * mldonkey-server/max_hard_download_rate: 0 * mldonkey-server/launch_at_startup: false mldonkey-server/config_exist_no_options: * mldonkey-server/plugin: Directconnect, Opennap, Overnet, Soulseek, Bittorent, Gnutella * mldonkey-server/mldonkey_group: mldonkey mldonkey-server/false_password: * mldonkey-server/max_hard_upload_rate: 2 * mldonkey-server/max_alive: 24 * mldonkey-server/run_as_user: mldonkey mldonkey-server/reown_file: false * mldonkey-server/mldonkey_niceness: mldonkey-server/config_exist_no_dir: mldonkey-server/fasttrack_problem: mldonkey-server/shared_directories: share * mldonkey-server/mldonkey_dir: /var/lib/mldonkey * mldonkey-server/restart_after_upgrade: true * mldonkey-server/client_name: lightning mldonkey-server/mldonkey_move: false * mldonkey-server/mldonkey_umask: 0022 Several people in other bug reports have mentioned that /etc/init.d/mldonkey-server start does actually fail to start the server. Part of the problem might be that /var/lib/mldonkey is not actually generated on install, eventhough this dir is selected via dpkg. However, what sure is the case is the fact that /var/run/mldonkey is owned by root on install and the mldonkey-server init script simply is not able to write to it for some reason. I guess that might be because of chroot or running mldonkey by the mldonkey user. However, it is absolutely certain, that it starts after I set the ownership of the /var/run/mldonkey DIR to mldonkey user! Setting the group instead of the user to mldonkey might help as well. The other problems I still have are described in other bug reports, like the one that whatever I enter in debconf never makes it to the /etc/defaults/mldonkey-server file. I am not sure if /var/lib/mldonkey + files is actually created on first startup when set in defaults accordingly since I first thought it mldonkey does not start up for the reason of the dir + files not being there and therefore copied a working set over from another machine. I never removed it afterwards since I was so happy that it finally worked and fed up with dealing with it. I hope this bug report makes mldonkey-server usable again out of the box. (At least as soon as the startup value users set via debconf on install really makes it into the defaults file). We already talk about this issue, as far as i remember ( but it was not on a bug report ). I don't remenber if you answer my question : with which user do you launch the init script ? Concerning your options, i see that you have set up launch_at_startup to false ( see your debconf information ). It could explain why your script doesn't start. Regard Sylvain Le Gall -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]