Bug#441360: locales 2.6.1-2 ships /etc/default/locale as a conffile
Package: locales Version: 2.6.1-2 Severity: serious The most recent version of locales includes /etc/default/locale as a conffile. According to Policy 10.7.3, [a conffile] is appropriate only if it is possible to distribute a default version that will work for most installations, although some system administrators may choose to modify it. This implies that the default version will be part of the package distribution, and must not be modified by the maintainer scripts during installation (or at any other time). Treating /etc/default/locale as a conffile therefore fails Policy on two points: - there is no sensible default that can be used by the majority of systems - this config file *has already been created and modified by other package scripts*, and the locales package has no business asserting ownership of the file after the fact Please fix this serious bug that will cause inappropriate conffile prompts when upgrading any Debian system installed in the past 4 years. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#439117: [EMAIL PROTECTED]: Bug#439117: Re-build with current GCC needed]
Hi Kilian, On Sat, Sep 08, 2007 at 02:49:09PM +0200, Kilian Krause wrote: retitle 439117 libcommoncpp2-dev: needs binary-only upload It seems that simply rebuilding libcommoncpp2 package helps. I think we should request binary-only upload to solve this. This problem makes clamfs (and probably other packages that depends on libcommoncpp2) FTBFS (see #441163). requesting rebuild as proposed by submitter, i.e.: rebuild libcommoncpp2 on alpha amd64 arm hppa hurd-i386 i386 ia64 m68k mips mipsel powerpc s390 sparc version 1.5.7-1 binary rebuild #1 reason: rebuild against GCC 4.2 This is a sourceful bug; libcommoncpp2 should not have been directly including headers under bits/, as explained in the header of /usr/include/c++/4.1.3/bits/atomicity.h: /** @file atomicity.h * This is an internal header file, included by other library headers. * You should not attempt to use it directly. */ Please fix this in the source of the package so that libcommoncpp2 correctly does not include bits/atomicity.h regardless of whether it's available in the search path at build time. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#441352: tramp: FTBFS: emacs not found with xemacs21
Tatsuya Kinoshita [EMAIL PROTECTED] writes: At build time, tramp depends on `emacs | xemacs21', but when xemacs21 is installed and other emacsen are not installed, tramp fails to build from the source, because tramp requires the `emacs' command which is not provided by xemacs21. Sorry, my mistake. I thought that xemacs21 registered itself in the emacs alternative. Will fix. -- ,''`. : :' :Romain Francoise [EMAIL PROTECTED] `. `' http://people.debian.org/~rfrancoise/ `- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#441363: gnucash: does not start
Package: gnucash Version: 2.0.5-2 Severity: grave Justification: renders package unusable After upgrade to 2.0.5-2 gnucash fails to start with the following message: ERROR: Could not find slib/require.scm in (/usr/share/guile/site /usr/share/gnucash/guile-modules /usr/share/gnucash/scm /usr/share/guile/site /usr/share/guile/1.8 /usr/share/guile) There exists /usr/share/slib/require.scm but indeed no such file in any of the directiories on the list. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (990, 'unstable'), (500, 'experimental'), (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.22-2-k7 (SMP w/1 CPU core) Locale: LANG=pl_PL, LC_CTYPE=pl_PL (charmap=ISO-8859-2) Shell: /bin/sh linked to /bin/dash Versions of packages gnucash depends on: ii gconf2 2.18.0.1-3 GNOME configuration database syste ii gnucash-common 2.0.5-2 A personal finance tracking progra ii guile-1.6-slib 1.6.8-6 Guile SLIB support ii guile-1.8-libs 1.8.2+1-2Main Guile libraries ii guile-g-wrap1.9.9-1 scripting interface generator for ii libart-2.0-22.3.19-3 Library of functions for 2D graphi ii libatk1.0-0 1.18.0-2 The ATK accessibility toolkit ii libbonobo2-02.18.0-2 Bonobo CORBA interfaces library ii libbonoboui2-0 2.18.0-5 The Bonobo UI library ii libc6 2.6.1-2 GNU C Library: Shared libraries ii libcairo2 1.4.10-1 The Cairo 2D vector graphics libra ii libcrypt-ssleay-perl0.55-1 Support for https protocol in LWP ii libdate-manip-perl 5.44-5 a perl library for manipulating da ii libffi4 4.2.1-5 Foreign Function Interface library ii libfinance-quote-perl 1.13-1 Perl module for retrieving stock q ii libfontconfig1 2.4.2-1.2generic font configuration library ii libfreetype62.3.5-1+b1 FreeType 2 font engine, shared lib ii libgconf2-4 2.18.0.1-3 GNOME configuration database syste ii libglade2-0 1:2.6.2-1library to load .glade files at ru ii libglib2.0-02.14.0-2 The GLib library of C routines ii libgmp3c2 2:4.2.1+dfsg-5 Multiprecision arithmetic library ii libgnome-keyring0 0.8.1-2 GNOME keyring services library ii libgnome2-0 2.18.0-4 The GNOME 2 library - runtime file ii libgnomecanvas2-0 2.14.0-3 A powerful object-oriented display ii libgnomeprint2.2-0 2.18.1-1 The GNOME 2.2 print architecture - ii libgnomeprintui2.2-02.18.0-2 GNOME 2.2 print architecture User ii libgnomeui-02.18.1-2 The GNOME 2 libraries (User Interf ii libgnomevfs2-0 1:2.18.1-3+b1GNOME Virtual File System (runtime ii libgoffice-1-2 0.2.1-4 Document centric objects library - ii libgsf-1-1141.14.7-1 Structured File Library - runtime ii libgsf-gnome-1-114 1.14.7-1 Structured File Library - runtime ii libgtk2.0-0 2.10.13-1The GTK+ graphical user interface ii libgtkhtml3.8-153.12.3-2 HTML rendering/editing library - r ii libgwrap-runtime2 1.9.9-1 scripting interface generator for ii libice6 2:1.0.4-1X11 Inter-Client Exchange library ii libltdl31.5.24-1 A system independent dlopen wrappe ii libofx3 1:0.8.2-3+b3 library to support Open Financial ii liborbit2 1:2.14.7-0.1 libraries for ORBit2 - a CORBA ORB ii libpango1.0-0 1.18.1-1 Layout and rendering of internatio ii libpng12-0 1.2.15~beta5-2 PNG library - runtime ii libpopt01.10-3 lib for parsing cmdline parameters ii libsm6 2:1.0.3-1+b1 X11 Session Management library ii libx11-62:1.0.3-7X11 client-side library ii libxcursor1 1:1.1.9-1X cursor management library ii libxext61:1.0.3-2X11 miscellaneous extension librar ii libxfixes3 1:4.0.3-2X11 miscellaneous 'fixes' extensio ii libxi6 2:1.1.3-1X11 Input extension library ii libxinerama11:1.0.2-1X11 Xinerama extension library ii libxml2 2.6.30.dfsg-2GNOME XML library ii libxrandr2 2:1.2.2-1X11 RandR extension library ii libxrender1 1:0.9.3-1X Rendering Extension client libra ii psfontmgr 0.11.10-0.1 PostScript font manager -- part of ii slib3a4-4Portable Scheme library ii x-ttcidfont-conf25.1 Configure TrueType and CID
Bug#441352: marked as done (tramp: FTBFS: emacs not found with xemacs21)
Your message dated Sun, 09 Sep 2007 08:47:21 + with message-id [EMAIL PROTECTED] and subject line Bug#441352: fixed in tramp 1:2.0.55-3 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: tramp Version: 1:2.0.55-2 Severity: serious At build time, tramp depends on `emacs | xemacs21', but when xemacs21 is installed and other emacsen are not installed, tramp fails to build from the source, because tramp requires the `emacs' command which is not provided by xemacs21. [...] debian/rules build dh_testdir ./configure --prefix=/usr --with-contrib configure: Tramp 2.0.55 checking for gmake... no checking for make... make checking for reasonable make version... ok checking whether make sets $(MAKE)... yes checking for emacs... no configure: error: emacs not found make: *** [configure-stamp] Error 1 Please use `emacs' or `emacs | emacs22 | emacs21' in Build-Depends-Indep to use the `emacs' command at build time. Thanks, -- Tatsuya Kinoshita pgpGgTFlWvZiI.pgp Description: PGP signature ---End Message--- ---BeginMessage--- Source: tramp Source-Version: 1:2.0.55-3 We believe that the bug you reported is fixed in the latest version of tramp, which is due to be installed in the Debian FTP archive: tramp_2.0.55-3.diff.gz to pool/main/t/tramp/tramp_2.0.55-3.diff.gz tramp_2.0.55-3.dsc to pool/main/t/tramp/tramp_2.0.55-3.dsc tramp_2.0.55-3_all.deb to pool/main/t/tramp/tramp_2.0.55-3_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Romain Francoise [EMAIL PROTECTED] (supplier of updated tramp package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 09 Sep 2007 10:16:31 +0200 Source: tramp Binary: tramp Architecture: source all Version: 1:2.0.55-3 Distribution: unstable Urgency: low Maintainer: Debian QA Group [EMAIL PROTECTED] Changed-By: Romain Francoise [EMAIL PROTECTED] Description: tramp - remote file access in Emacs Closes: 441352 441353 Changes: tramp (1:2.0.55-3) unstable; urgency=low . * QA upload. * debian/control: + xemacs21 doesn't provide the 'emacs' command, so adjust build-depends accordingly, thanks to Tatsuya Kinoshita (closes: #441352). + Mention in long description that this package is not necessary for emacs22 users (closes: #441353). Files: de8c39bcf6f2fa42c5aa376a0fa238fb 629 editors optional tramp_2.0.55-3.dsc 6425a9d458d3b0e89046be942e8446c2 7949 editors optional tramp_2.0.55-3.diff.gz 5bc2992ed14bc39d132cda3013a54d6f 266156 editors optional tramp_2.0.55-3_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFG46w1ogN2vsA8Vt8RAtbvAJ9SlGJ3wxMKm2pWYA/WLFGNte8kHACfXSYq U1hqVKp/gezXzhpb7v9SNNM= =ec3Z -END PGP SIGNATURE- ---End Message---
Bug#441367: Not installable due to versionned depends on libgtksourceview2.0-cil
Package: monodevelop Version: 0.14+dfsg-1 Severity: serious Hi, monodevelop depends on: libgtksourceview2.0-cil (= 0.10), libgtksourceview2.0-cil ( 0.11) The version of libgtksourceview2.0-cil in sid is now 0.11-1 so monodevelop is not installable in sid anymore. Bye, -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.22-2-686 (SMP w/2 CPU cores) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages monodevelop depends on: ii gnome-icon-theme 2.18.0-3 GNOME Desktop icon theme ii gnome-terminal [x-term 2.18.1-1 The GNOME 2 terminal emulator appl ii libgconf2.0-cil2.16.0-7 CLI binding for GConf 2.16 ii libgecko2.0-cil0.11-3CLI binding for the GtkMozEmbed li ii libglade2.0-cil2.10.2-1 CLI binding for the Glade librarie ii libglib2.0-0 2.14.0-2 The GLib library of C routines ii libglib2.0-cil 2.10.2-1 CLI binding for the GLib utility l ii libgnome-vfs2.0-cil2.16.0-7 CLI binding for GnomeVFS 2.16 ii libgnome2.0-cil2.16.0-7 CLI binding for Gnome 2.16 ii libgtk2.0-cil 2.10.2-1 CLI binding for the GTK+ toolkit 2 ii libgtkhtml2.0-cil 2.16.0-7 CLI binding for GtkHTML 3.8 ii libgtksourceview1.0-0 1.8.5-1 shared libraries for the GTK+ synt ii libgtksourceview2.0-ci 0.10-3.1 CLI binding for the gtksourceview ii liblog4net1.2-cil 1.2.8+1.2.9beta-1 highly configurable logging API fo ii libmetacity0 1:2.18.5-1library of lightweight GTK2 based ii libmono-addins-gui0.2- 0.2-2 GTK# frontend library for Mono.Add ii libmono-addins0.2-cil 0.2-2 addin framework for creating exten ii libmono-cairo2.0-cil 1.2.5-2 Mono Cairo library ii libmono-cecil0.5-cil 0.5-2 library to generate and inspect CI ii libmono-corlib1.0-cil 1.2.5-2 Mono core library (1.0) ii libmono-corlib2.0-cil 1.2.5-2 Mono core library (2.0) ii libmono-sharpzip2.84-c 1.2.5-2 Mono SharpZipLib library ii libmono-system-runtime 1.2.5-2 Mono System.Runtime Library ii libmono-system-web2.0- 1.2.5-2 Mono System.Web Library ii libmono-system1.0-cil 1.2.5-2 Mono System libraries (1.0) ii libmono-system2.0-cil 1.2.5-2 Mono System libraries (2.0) ii libmono-winforms2.0-ci 1.2.5-2 Mono System.Windows.Forms library ii libmono1.0-cil 1.2.5-2 Mono libraries (1.0) ii libmono2.0-cil 1.2.5-2 Mono libraries (2.0) ii mono-mcs 1.2.5-2 Mono C# compiler ii mono-runtime 1.2.5-2 Mono runtime ii monodoc-base 1.2.5-1 shared MonoDoc binaries ii monodoc-manual 1.2.5-1 compiled XML documentation from th ii pkg-config 0.22-1manage compile and link flags for ii xterm [x-terminal-emul 229-1 X terminal emulator monodevelop recommends no packages. -- no debconf information -- Loïc Minier
Bug#441363: gnucash: does not start
On Sun, 9 Sep 2007 09:59:07 +0100, Neil Williams wrote: [...] That points to an upstream bugzilla report http://bugzilla.gnome.org/show_bug.cgi?id=347922 where gnucash upstream comment: Steve: I bet you a dollar to a dime that /usr/share/slib isn't in the default guile load path, and that you didn't add a symlink from /usr/share/guile/slib - /usr/share/slib Create that symlink and try again. You can test slib by hand by running: guile -c (use-modules (ice-9 slib)) (require 'printf) Michal, if such a symlink fixes the issue for you, this bug needs to be blocked by 441110 and 441110 bumped to grave severity. Symlink only changed the error to ERROR: Unbound variable: slib:features -- Michał Politowski Talking has been known to lead to communication if practiced carelessly. signature.asc Description: Digital signature
Bug#441370: stellarium-data: Contain architecture specific files in 'all' package
Package: stellarium-data Version: 0.8.1-2 Severity: serious Justification: arch all packages must be arch neutral Tags: l10n The stellarium-data package contain architecture specific files. The generated .mo files are binary, architecture and endian specific, and need to be in an architecture specific package. These are the files in this package at the moment: /usr/share/locale/ca/LC_MESSAGES/stellarium.mo /usr/share/locale/da/LC_MESSAGES/stellarium.mo /usr/share/locale/en_GB/LC_MESSAGES/stellarium.mo /usr/share/locale/es/LC_MESSAGES/stellarium.mo /usr/share/locale/fa/LC_MESSAGES/stellarium.mo /usr/share/locale/fr/LC_MESSAGES/stellarium.mo /usr/share/locale/hu/LC_MESSAGES/stellarium.mo /usr/share/locale/ja/LC_MESSAGES/stellarium.mo /usr/share/locale/lv/LC_MESSAGES/stellarium.mo /usr/share/locale/nl/LC_MESSAGES/stellarium.mo /usr/share/locale/pt/LC_MESSAGES/stellarium.mo /usr/share/locale/pt_BR/LC_MESSAGES/stellarium.mo /usr/share/locale/ro/LC_MESSAGES/stellarium.mo /usr/share/locale/zh_CN/LC_MESSAGES/stellarium.mo /usr/share/locale/zh_TW/LC_MESSAGES/stellarium.mo /usr/share/locale/zh_HK/LC_MESSAGES/stellarium.mo /usr/share/locale/cs/LC_MESSAGES/stellarium.mo /usr/share/locale/de/LC_MESSAGES/stellarium.mo /usr/share/locale/en/LC_MESSAGES/stellarium.mo /usr/share/locale/fi/LC_MESSAGES/stellarium.mo /usr/share/locale/it/LC_MESSAGES/stellarium.mo /usr/share/locale/ko/LC_MESSAGES/stellarium.mo /usr/share/locale/nb/LC_MESSAGES/stellarium.mo /usr/share/locale/nn/LC_MESSAGES/stellarium.mo /usr/share/locale/pl/LC_MESSAGES/stellarium.mo /usr/share/locale/ru/LC_MESSAGES/stellarium.mo /usr/share/locale/tr/LC_MESSAGES/stellarium.mo /usr/share/locale/uk/LC_MESSAGES/stellarium.mo /usr/share/locale/sk/LC_MESSAGES/stellarium.mo /usr/share/locale/ga/LC_MESSAGES/stellarium.mo /usr/share/locale/sv/LC_MESSAGES/stellarium.mo /usr/share/locale/el/LC_MESSAGES/stellarium.mo /usr/share/locale/az/LC_MESSAGES/stellarium.mo /usr/share/locale/id/LC_MESSAGES/stellarium.mo -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-5-686 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#441363: gnucash: does not start
On Sun, 9 Sep 2007 10:12:50 +0200 Michal Politowski [EMAIL PROTECTED] wrote: Package: gnucash Version: 2.0.5-2 Severity: grave Justification: renders package unusable After upgrade to 2.0.5-2 gnucash fails to start with the following message: ERROR: Could not find slib/require.scm in (/usr/share/guile/site /usr/share/gnucash/guile-modules /usr/share/gnucash/scm /usr/share/guile/site /usr/share/guile/1.8 /usr/share/guile) Damn. No other word for it. I did see this but I thought I'd worked around it. Sorry Thomas - this is a manifestation of #441110 guile-1.8: Could not find slib/require.scm - regression from guile-1.6 breaks gnucash build That points to an upstream bugzilla report http://bugzilla.gnome.org/show_bug.cgi?id=347922 where gnucash upstream comment: Steve: I bet you a dollar to a dime that /usr/share/slib isn't in the default guile load path, and that you didn't add a symlink from /usr/share/guile/slib - /usr/share/slib Create that symlink and try again. You can test slib by hand by running: guile -c (use-modules (ice-9 slib)) (require 'printf) Michal, if such a symlink fixes the issue for you, this bug needs to be blocked by 441110 and 441110 bumped to grave severity. There exists /usr/share/slib/require.scm but indeed no such file in any of the directiories on the list. All that is needed is for guile-1.8 to be able to do what guile-1.6 did and locate that file via /usr/share/guile/ or one of the other guile paths. It may be possible to ship a different symlink in gnucash: ln -s /usr/share/slib/require.scm /usr/share/gnucash/scm/slib (creating /usr/share/gnucash/scm/slib beforehand) Thomas: is this related to the lack of a guile-1.8-slib package? -- Neil Williams = http://www.data-freedom.org/ http://www.nosoftwarepatents.com/ http://www.linux.codehelp.co.uk/ pgpMVwGz4WJEi.pgp Description: PGP signature
Bug#441363: gnucash: does not start
On Sun, 9 Sep 2007 11:43:33 +0200 Michal Politowski [EMAIL PROTECTED] wrote: Create that symlink and try again. You can test slib by hand by running: guile -c (use-modules (ice-9 slib)) (require 'printf) Michal, if such a symlink fixes the issue for you, this bug needs to be blocked by 441110 and 441110 bumped to grave severity. Symlink only changed the error to ERROR: Unbound variable: slib:features Was that error on starting gnucash or on running the test command above? guile -c (use-modules (ice-9 slib)) (require 'printf) -- Neil Williams = http://www.data-freedom.org/ http://www.nosoftwarepatents.com/ http://www.linux.codehelp.co.uk/ pgpv1Q8z0EJES.pgp Description: PGP signature
Bug#441363: Debugging the error cause
After manually adding symlink: odin:/usr/share/guile/1.8% ls -l slib lrwxrwxrwx 1 root root 10 Sep 9 10:42 slib - ../../slib This is what happens with test command: odin:~% guile -c (use-modules (ice-9 slib)) (require 'printf) ERROR: Unbound variable: slib:features So the real error seems to be somewhere in guile/slib front. -- Mika Boström +358-40-525-7347 -=- The flogging will continue [EMAIL PROTECTED]www.iki.fi/bostik -=- until morale improves GPG: 0x039F188E; EC67 5B3A E6E3 6A84 9CB2 94D3 BFCD BD57 039F 188E signature.asc Description: Digital signature
Bug#441380: openoffice.org_1:2.3.0~rc2-1(sparc/experimental): FTBFS: FATAL ERROR, could not mmap a file for executable memory
Package: openoffice.org Version: 1:2.3.0~rc2-1 Severity: serious Hi, your package failed to build from source. Despite the contents of the error message I don't think this is a local configuration problem since it failed the same way on at least two architectures (sparc and amd64). | Automatic build of openoffice.org_1:2.3.0~rc2-1 on odin by sbuild/sparc 98-farm | Build started at 20070909-0820 | ** | Checking available source versions... | Fetching source files... | Reading package lists... | Building dependency tree... | Need to get 383MB of source archives. | Get:1 http://sinclair.farm.ftbfs.de experimental/main openoffice.org 1:2.3.0~rc2-1 (dsc) [8637B] | Get:2 http://sinclair.farm.ftbfs.de experimental/main openoffice.org 1:2.3.0~rc2-1 (tar) [301MB] | Get:3 http://sinclair.farm.ftbfs.de experimental/main openoffice.org 1:2.3.0~rc2-1 (diff) [81.2MB] | Fetched 383MB in 2m15s (2832kB/s) | Download complete and in download only mode | ** Using build dependencies supplied by package: | Build-Depends: lsb-release, bzip2, bison (= 1:1.875a-1) [i386 powerpc sparc amd64 ppc64], flex [i386 powerpc sparc amd64 ppc64], libpam0g-dev [i386 powerpc sparc amd64 ppc64], libxaw7-dev [i386 powerpc sparc amd64 ppc64], unzip [i386 powerpc sparc amd64 ppc64], zip [i386 powerpc sparc amd64 ppc64], autoconf [i386 powerpc sparc amd64 ppc64], sharutils [i386 powerpc sparc amd64 ppc64], pkg-config [i386 powerpc sparc amd64 ppc64], xutils [i386 powerpc sparc amd64 ppc64], libfontconfig1-dev [i386 powerpc sparc amd64 ppc64], binutils (= 2.14.90.0.6-3) [sparc], libc6 (= 2.3.2-1) [powerpc], zlib1g-dev [i386 powerpc sparc amd64 ppc64], libfreetype6-dev [i386 powerpc sparc amd64 ppc64], libx11-dev [i386 powerpc sparc amd64 ppc64], libsm-dev [i386 powerpc sparc amd64 ppc64], libxt-dev [i386 powerpc sparc amd64 ppc64], libxext-dev [i386 powerpc sparc amd64 ppc64], libice-dev [i386 powerpc sparc amd64 ppc64], libsane-dev [i386 powerpc sparc amd64 ppc64], libxrender-dev [i386 powerpc sparc amd64 ppc64], libcupsys2-dev [i386 powerpc sparc amd64 ppc64], libarchive-zip-perl [i386 powerpc sparc amd64 ppc64], libstartup-notification0-dev [i386 powerpc sparc amd64 ppc64], libpng12-dev [i386 powerpc sparc amd64 ppc64], libjpeg62-dev [i386 powerpc sparc amd64 ppc64], libxml2-dev [i386 powerpc sparc amd64 ppc64], libldap2-dev [i386 powerpc sparc amd64 ppc64], libexpat1-dev [i386 powerpc sparc amd64 ppc64], libgnomevfs2-dev [i386 powerpc sparc amd64 ppc64], fastjar [i386 powerpc sparc amd64 ppc64], libsndfile1-dev [i386 powerpc sparc amd64 ppc64], xsltproc [i386 powerpc sparc amd64 ppc64], graphicsmagick [i386 powerpc sparc amd64 ppc64], netpbm [i386 powerpc sparc amd64 ppc64], fdupes [i386 powerpc sparc amd64 ppc64], xml-core [i386 powerpc sparc amd64 ppc64], libxkbfile-dev [i386 powerpc sparc amd64 ppc64], libxinerama-dev [i386 powerpc sparc amd64 ppc64], x11proto-render-dev [i386 powerpc sparc amd64 ppc64], unixodbc-dev (= 2.2.11) [i386 powerpc sparc amd64 ppc64], libxml-parser-perl [i386 powerpc sparc amd64 ppc64], gperf [i386 powerpc sparc amd64 ppc64], libpq-dev [i386 powerpc sparc amd64 ppc64], libcurl4-gnutls-dev [i386 powerpc sparc amd64 ppc64], libdb4.5-dev [i386 powerpc sparc amd64 ppc64], python-central (= 0.5) [i386 powerpc sparc amd64 ppc64], debhelper (= 5.0.37.2), python-dev (= 2.4) [i386 powerpc sparc amd64 ppc64], java-gcj-compat-dev (= 1.0.56) [i386 powerpc sparc amd64 ppc64], ant (= 1.6.5) [i386 powerpc sparc amd64 ppc64], libxt-java (= 0.20050823) [i386 powerpc sparc amd64 ppc64], libxerces2-java [i386 powerpc sparc amd64 ppc64], libxalan2-java (= 2.6.0-1) [i386 powerpc sparc amd64 ppc64], mingw32 [i386 powerpc sparc amd64 ppc64], libxul-dev [i386 powerpc sparc amd64 ppc64], libnss3-dev [i386 powerpc sparc amd64 ppc64], dmake (= 1:4.7) [i386 powerpc sparc amd64 ppc64], mono-mcs (= 1.2.3) [i386 amd64], mono-gmcs (= 1.2.3) [i386 amd64], libmono-dev (= 1.2.3) [i386 amd64], mono-utils (= 1.2.3) [i386 amd64], cli-common-dev (= 0.4.4) [i386 amd64], libhunspell-dev (= 1.1.5-2) [i386 powerpc sparc amd64 ppc64], libaltlinuxhyph-dev (= 0.1.1-11) [i386 powerpc sparc amd64 ppc64], libstlport4.6-dev (= 4.6.2-3) [i386 powerpc sparc amd64 ppc64], libboost-dev [i386 powerpc sparc amd64 ppc64], libvigraimpex-dev [i386 powerpc sparc amd64 ppc64], portaudio19-dev [i386 powerpc sparc amd64 ppc64], libwpd8-dev (= 0.8.3-3) [i386 powerpc sparc amd64 ppc64], libwps-dev [i386 powerpc sparc amd64 ppc64], libwpg-dev [i386 powerpc sparc amd64 ppc64], libsvg-dev [i386 powerpc sparc amd64 ppc64], libicu-dev [i386 powerpc sparc amd64 ppc64], libxslt1-dev [i386 powerpc sparc amd64 ppc64], libcairo2-dev [i386 powerpc sparc amd64 ppc64], libglitz-glx1-dev [i386 powerpc sparc amd64 ppc64], kdelibs4-dev (= 4:3.4.3-2) [i386 powerpc sparc amd64 ppc64], libhsqldb-java (= 1.8.0.8-1) [i386 powerpc sparc amd64 ppc64], bsh (= 2.0b4-1
Bug#441370: stellarium-data: Contain architecture specific files in 'all' package
Petter Reinholdtsen [EMAIL PROTECTED] wrote: The stellarium-data package contain architecture specific files. The generated .mo files are binary, architecture and endian specific, and need to be in an architecture specific package. These are the files in this package at the moment: AFAIK gettext can handle big endian mo files on little endian machines and vice versa. I've never had any problem with that. If gettext wasn't able to handle that, the mo files should really be under /usr/lib and not /usr/share and that would have been fixed long ago already. I guess you're raising a non-issue. JB. -- Julien BLACHE - Debian GNU/Linux Developer - [EMAIL PROTECTED] Public key available on http://www.jblache.org - KeyID: F5D6 5169 GPG Fingerprint : 935A 79F1 C8B3 3521 FD62 7CC7 CD61 4FD7 F5D6 5169 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#422855: marked as done (Should use gtk#2)
Your message dated Sun, 09 Sep 2007 12:58:36 +0200 with message-id [EMAIL PROTECTED] and subject line fixed in prj2make-sharp 0.95-4 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: prj2make-sharp Version: 0.95-3 Severity: serious Hi, prj2make-sharp should use gtk#2. This is in all cases a very simple port. As gtk# is unsupported upstream and I filed a removal request let's get this done fast. Thanks and Bye signature.asc Description: Dies ist ein digital signierter Nachrichtenteil ---End Message--- ---BeginMessage--- Version: 0.95-4 This bug is fixed in the current version of prj2make-sharp in debian/unstable, thus closing this bugreport now. -- Regards, Mirco 'meebey' Bauer PGP-Key ID: 0xEEF946C8 FOSS Developer[EMAIL PROTECTED] http://www.meebey.net/ PEAR Developer[EMAIL PROTECTED] http://pear.php.net/ Debian Developer [EMAIL PROTECTED] http://www.debian.org/ signature.asc Description: This is a digitally signed message part ---End Message---
Bug#439277: cloning 439277, setting package to -1 nasm, found -1 in 0.99.01-1 ...
# Automatically generated email from bts, devscripts version 2.10.7 # it is indeed a nasm error - the package compiled successfully with nasm 0.99.02 clone 439277 -1 package -1 nasm found -1 0.99.01-1 retitle -1 nasm build errors: invalid operands in non-64-bit mode -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#441363: gnucash: does not start
On Sun, 9 Sep 2007 10:53:47 +0100, Neil Williams wrote: On Sun, 9 Sep 2007 11:43:33 +0200 Michal Politowski [EMAIL PROTECTED] wrote: Create that symlink and try again. You can test slib by hand by running: guile -c (use-modules (ice-9 slib)) (require 'printf) Michal, if such a symlink fixes the issue for you, this bug needs to be blocked by 441110 and 441110 bumped to grave severity. Symlink only changed the error to ERROR: Unbound variable: slib:features Was that error on starting gnucash or on running the test command above? Starting gnucash. But now I checked the test command and it gives the same error. -- Michał Politowski Talking has been known to lead to communication if practiced carelessly. signature.asc Description: Digital signature
Processed: tagging 441360
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.9.26 tags 441360 + pending Bug#441360: locales 2.6.1-2 ships /etc/default/locale as a conffile There were no tags set. Tags added: pending End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#430984: pthreads issue with libc6
Processing commands for [EMAIL PROTECTED]: severity 430984 grave Bug#430984: pthreads issue with libc6 Severity set to `grave' from `important' reassign 430984 linux-2.6 Bug#430984: pthreads issue with libc6 Bug reassigned from package `libc6' to `linux-2.6'. forcemerge 433187 430984 Bug#433187: linux-2.6 - [sparc64-smp] produces unkillable processes Bug#430984: pthreads issue with libc6 Forcibly Merged 430984 433187. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#441367: marked as done (Not installable due to versionned depends on libgtksourceview2.0-cil)
Your message dated Sun, 09 Sep 2007 11:47:05 + with message-id [EMAIL PROTECTED] and subject line Bug#441367: fixed in monodevelop 0.14+dfsg-2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: monodevelop Version: 0.14+dfsg-1 Severity: serious Hi, monodevelop depends on: libgtksourceview2.0-cil (= 0.10), libgtksourceview2.0-cil ( 0.11) The version of libgtksourceview2.0-cil in sid is now 0.11-1 so monodevelop is not installable in sid anymore. Bye, -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.22-2-686 (SMP w/2 CPU cores) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages monodevelop depends on: ii gnome-icon-theme 2.18.0-3 GNOME Desktop icon theme ii gnome-terminal [x-term 2.18.1-1 The GNOME 2 terminal emulator appl ii libgconf2.0-cil2.16.0-7 CLI binding for GConf 2.16 ii libgecko2.0-cil0.11-3CLI binding for the GtkMozEmbed li ii libglade2.0-cil2.10.2-1 CLI binding for the Glade librarie ii libglib2.0-0 2.14.0-2 The GLib library of C routines ii libglib2.0-cil 2.10.2-1 CLI binding for the GLib utility l ii libgnome-vfs2.0-cil2.16.0-7 CLI binding for GnomeVFS 2.16 ii libgnome2.0-cil2.16.0-7 CLI binding for Gnome 2.16 ii libgtk2.0-cil 2.10.2-1 CLI binding for the GTK+ toolkit 2 ii libgtkhtml2.0-cil 2.16.0-7 CLI binding for GtkHTML 3.8 ii libgtksourceview1.0-0 1.8.5-1 shared libraries for the GTK+ synt ii libgtksourceview2.0-ci 0.10-3.1 CLI binding for the gtksourceview ii liblog4net1.2-cil 1.2.8+1.2.9beta-1 highly configurable logging API fo ii libmetacity0 1:2.18.5-1library of lightweight GTK2 based ii libmono-addins-gui0.2- 0.2-2 GTK# frontend library for Mono.Add ii libmono-addins0.2-cil 0.2-2 addin framework for creating exten ii libmono-cairo2.0-cil 1.2.5-2 Mono Cairo library ii libmono-cecil0.5-cil 0.5-2 library to generate and inspect CI ii libmono-corlib1.0-cil 1.2.5-2 Mono core library (1.0) ii libmono-corlib2.0-cil 1.2.5-2 Mono core library (2.0) ii libmono-sharpzip2.84-c 1.2.5-2 Mono SharpZipLib library ii libmono-system-runtime 1.2.5-2 Mono System.Runtime Library ii libmono-system-web2.0- 1.2.5-2 Mono System.Web Library ii libmono-system1.0-cil 1.2.5-2 Mono System libraries (1.0) ii libmono-system2.0-cil 1.2.5-2 Mono System libraries (2.0) ii libmono-winforms2.0-ci 1.2.5-2 Mono System.Windows.Forms library ii libmono1.0-cil 1.2.5-2 Mono libraries (1.0) ii libmono2.0-cil 1.2.5-2 Mono libraries (2.0) ii mono-mcs 1.2.5-2 Mono C# compiler ii mono-runtime 1.2.5-2 Mono runtime ii monodoc-base 1.2.5-1 shared MonoDoc binaries ii monodoc-manual 1.2.5-1 compiled XML documentation from th ii pkg-config 0.22-1manage compile and link flags for ii xterm [x-terminal-emul 229-1 X terminal emulator monodevelop recommends no packages. -- no debconf information -- Loïc Minier ---End Message--- ---BeginMessage--- Source: monodevelop Source-Version: 0.14+dfsg-2 We believe that the bug you reported is fixed in the latest version of monodevelop, which is due to be installed in the Debian FTP archive: monodevelop-boo_0.14+dfsg-2_all.deb to pool/main/m/monodevelop/monodevelop-boo_0.14+dfsg-2_all.deb monodevelop-java_0.14+dfsg-2_all.deb to pool/main/m/monodevelop/monodevelop-java_0.14+dfsg-2_all.deb monodevelop-nunit_0.14+dfsg-2_all.deb to pool/main/m/monodevelop/monodevelop-nunit_0.14+dfsg-2_all.deb monodevelop-query_0.14+dfsg-2_all.deb to pool/main/m/monodevelop/monodevelop-query_0.14+dfsg-2_all.deb monodevelop-versioncontrol_0.14+dfsg-2_all.deb to pool/main/m/monodevelop/monodevelop-versioncontrol_0.14+dfsg-2_all.deb monodevelop_0.14+dfsg-2.diff.gz to pool/main/m/monodevelop/monodevelop_0.14+dfsg-2.diff.gz monodevelop_0.14+dfsg-2.dsc to pool/main/m/monodevelop/monodevelop_0.14+dfsg-2.dsc monodevelop_0.14+dfsg-2_all.deb to
Bug#441390: CVE-2007-2024, CVE-2007-2025: Unrestricted file upload vulnerability
Package: phpwiki Severity: serious Version: 1.3.12p3-5 Tags: security patch Hi, The following has been reported: CVE-2007-2024, CVE-2007-2025: Unrestricted file upload vulnerability in the UpLoad feature (lib/plugin/UpLoad.php) in PhpWiki 1.3.11p1 allows remote attackers to upload arbitrary PHP files with a double extension, as demonstrated by .php.3, which is interpreted by Apache as being a valid PHP file. The patch is attached. I'm already preparing an NMU as per your permission in #429201. Thanks! Thijs diff -ur phpwiki-1.3.12p3.orig/lib/plugin/UpLoad.php phpwiki-1.3.12p3/lib/plugin/UpLoad.php --- phpwiki-1.3.12p3.orig/lib/plugin/UpLoad.php 2006-06-18 13:19:23.0 +0200 +++ phpwiki-1.3.12p3/lib/plugin/UpLoad.php 2007-09-09 13:37:48.0 +0200 @@ -136,7 +136,7 @@ $userfile_name = trim(basename($userfile_name)); $userfile_tmpname = $userfile-getTmpName(); $err_header = HTML::h2(fmt(ERROR uploading '%s': , $userfile_name)); -if (preg_match(/(\. . join(|\., $this-disallowed_extensions) . )\$/, +if (preg_match(/(\. . join(|\., $this-disallowed_extensions) . )(\.|\$)/i, $userfile_name)) { $message-pushContent($err_header); pgpwA6yTthCUk.pgp Description: PGP signature
Bug#440333: marked as done (padevchooser: fails to start)
Your message dated Sun, 09 Sep 2007 12:02:04 + with message-id [EMAIL PROTECTED] and subject line Bug#440333: fixed in padevchooser 0.9.3-2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: padevchooser Version: 0.9.3-1 Severity: grave Justification: renders package unusable padevchooser fails to startup with the following error msg: ** (padevchooser:2470): WARNING **: pa_browser_new() failed. searching the web revealed this bug report: http://www.pulseaudio.org/ticket/29 where they claim it's a dbus startup problem, however i do have dbus started up automagically by gnome so i'm not sure what to do. All other PulseAudio 'utils' are working but this seemingly essential one does not. Thanks for your help. -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.22-1-k7 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages padevchooser depends on: ii libatk1.0-01.18.0-2 The ATK accessibility toolkit ii libc6 2.6.1-1+b1GNU C Library: Shared libraries ii libcairo2 1.4.10-1 The Cairo 2D vector graphics libra ii libdbus-1-31.1.1-3 simple interprocess messaging syst ii libdbus-glib-1-2 0.74-1simple interprocess messaging syst ii libfontconfig1 2.4.2-1.2 generic font configuration library ii libgconf2-42.18.0.1-3GNOME configuration database syste ii libglade2-01:2.6.2-1 library to load .glade files at ru ii libglib2.0-0 2.14.0-2 The GLib library of C routines ii libgtk2.0-02.10.13-1 The GTK+ graphical user interface ii libnotify1 0.4.4-3 sends desktop notifications to a n ii liborbit2 1:2.14.7-0.1 libraries for ORBit2 - a CORBA ORB ii libpango1.0-0 1.16.5-1 Layout and rendering of internatio ii libpulse-browse0 0.9.5-7lenny2 PulseAudio client libraries ii libpulse-mainloop-glib00.9.5-7lenny2 PulseAudio client libraries ii libpulse0 0.9.6-1 PulseAudio client libraries ii libx11-6 2:1.0.3-7 X11 client-side library ii libxcursor11:1.1.8-2 X cursor management library ii libxext6 1:1.0.3-2 X11 miscellaneous extension librar ii libxfixes3 1:4.0.3-2 X11 miscellaneous 'fixes' extensio ii libxi6 2:1.1.2-1 X11 Input extension library ii libxinerama1 1:1.0.2-1 X11 Xinerama extension library ii libxml22.6.29.dfsg-1 GNOME XML library ii libxrandr2 2:1.2.1-1 X11 RandR extension library ii libxrender11:0.9.2-1 X Rendering Extension client libra Versions of packages padevchooser recommends: ii paman 0.9.3-1PulseAudio Manager ii paprefs 0.9.5-1PulseAudio Preferences ii pavucontrol 0.9.4-1PulseAudio Volume Control ii pavumeter 0.9.2-1PulseAudio Volume Meter -- no debconf information ---End Message--- ---BeginMessage--- Source: padevchooser Source-Version: 0.9.3-2 We believe that the bug you reported is fixed in the latest version of padevchooser, which is due to be installed in the Debian FTP archive: padevchooser_0.9.3-2.diff.gz to pool/main/p/padevchooser/padevchooser_0.9.3-2.diff.gz padevchooser_0.9.3-2.dsc to pool/main/p/padevchooser/padevchooser_0.9.3-2.dsc padevchooser_0.9.3-2_i386.deb to pool/main/p/padevchooser/padevchooser_0.9.3-2_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. CJ van den Berg [EMAIL PROTECTED] (supplier of updated padevchooser package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 02 Sep 2007 20:13:20 +0200 Source: padevchooser Binary:
Bug#441370: stellarium-data: Contain architecture specific files in 'all' package
[Julien Blache] If gettext wasn't able to handle that, the mo files should really be under /usr/lib and not /usr/share and that would have been fixed long ago already. I guess you're raising a non-issue. I guess I learned something new, then. I thought the .mo files was mmapped into the programs and looked up using fast and arch-specific methos. If this is not true, I can change my packaging practice. :) Happy hacking, -- Petter Reinholdtsen -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#441390: marked as done (CVE-2007-2024, CVE-2007-2025: Unrestricted file upload vulnerability)
Your message dated Sun, 09 Sep 2007 12:32:06 + with message-id [EMAIL PROTECTED] and subject line Bug#441390: fixed in phpwiki 1.3.12p3-6.1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: phpwiki Severity: serious Version: 1.3.12p3-5 Tags: security patch Hi, The following has been reported: CVE-2007-2024, CVE-2007-2025: Unrestricted file upload vulnerability in the UpLoad feature (lib/plugin/UpLoad.php) in PhpWiki 1.3.11p1 allows remote attackers to upload arbitrary PHP files with a double extension, as demonstrated by .php.3, which is interpreted by Apache as being a valid PHP file. The patch is attached. I'm already preparing an NMU as per your permission in #429201. Thanks! Thijs diff -ur phpwiki-1.3.12p3.orig/lib/plugin/UpLoad.php phpwiki-1.3.12p3/lib/plugin/UpLoad.php --- phpwiki-1.3.12p3.orig/lib/plugin/UpLoad.php 2006-06-18 13:19:23.0 +0200 +++ phpwiki-1.3.12p3/lib/plugin/UpLoad.php 2007-09-09 13:37:48.0 +0200 @@ -136,7 +136,7 @@ $userfile_name = trim(basename($userfile_name)); $userfile_tmpname = $userfile-getTmpName(); $err_header = HTML::h2(fmt(ERROR uploading '%s': , $userfile_name)); -if (preg_match(/(\. . join(|\., $this-disallowed_extensions) . )\$/, +if (preg_match(/(\. . join(|\., $this-disallowed_extensions) . )(\.|\$)/i, $userfile_name)) { $message-pushContent($err_header); pgpdnGT8UeT5J.pgp Description: PGP signature ---End Message--- ---BeginMessage--- Source: phpwiki Source-Version: 1.3.12p3-6.1 We believe that the bug you reported is fixed in the latest version of phpwiki, which is due to be installed in the Debian FTP archive: phpwiki_1.3.12p3-6.1.diff.gz to pool/main/p/phpwiki/phpwiki_1.3.12p3-6.1.diff.gz phpwiki_1.3.12p3-6.1.dsc to pool/main/p/phpwiki/phpwiki_1.3.12p3-6.1.dsc phpwiki_1.3.12p3-6.1_all.deb to pool/main/p/phpwiki/phpwiki_1.3.12p3-6.1_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thijs Kinkhorst [EMAIL PROTECTED] (supplier of updated phpwiki package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 09 Sep 2007 14:10:57 +0200 Source: phpwiki Binary: phpwiki Architecture: source all Version: 1.3.12p3-6.1 Distribution: unstable Urgency: high Maintainer: Matt Brown [EMAIL PROTECTED] Changed-By: Thijs Kinkhorst [EMAIL PROTECTED] Description: phpwiki- informal collaborative website manager Closes: 429201 441390 Changes: phpwiki (1.3.12p3-6.1) unstable; urgency=high . * NMU by the testing security team, with maintainer approval. * CVE-2007-3193: lib/WikiUser/LDAP.php in PhpWiki before 1.3.13p1, when the configuration lacks a nonzero PASSWORD_LENGTH_MINIMUM, might allow remote attackers to bypass authentication via an empty password, which causes ldap_bind to return true when used with certain LDAP implementations. (Closes: #429201) * CVE-2007-2024, CVE-2007-2025: Unrestricted file upload vulnerability in the UpLoad feature (lib/plugin/UpLoad.php) in PhpWiki 1.3.11p1 allows remote attackers to upload arbitrary PHP files with a double extension, as demonstrated by .php.3, which is interpreted by Apache as being a valid PHP file. (Closes: #441390) Files: 602ff85abf15b44168a96db76e039d6f 934 web optional phpwiki_1.3.12p3-6.1.dsc 26fd9260ce97813898cf78267982186c 50786 web optional phpwiki_1.3.12p3-6.1.diff.gz fa7efaa0bbc83817d92923bed0a33e0e 2858092 web optional phpwiki_1.3.12p3-6.1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iQEVAwUBRuPjs2z0hbPcukPfAQLbtAf/Z7sddZw2Euo3LyAvYfpfSbF4gHNSDCk+ ID83jEmJZUDl6tSloeB9dazYnEbTIqS9DpSaS3XGdu+wZKGbVn6OmUlZX3T+FVGx nvk8cNL2Xl45FYox2fwqOvDk9vYG/WAaPfeleMs/OG5tZEzUgsRmtofCfBEaMRfP WrRACRyiB6YsC9SIbqkTH7gW568OrHVQe0zsT2CMJGOSXMPY7rt5lyRmeHal9cwA tIqiHve2TuKEqKjTpJtrN0Sg40Fplth+5rl027P4XgDXlb1Fe1ef1DqMXT6aIxe2 tgMwwNltFh+zd0Ry9KNIb3gGw2G0QwJgQW84LXUQjlTv3JOQomm4sw== =Y6Tg -END PGP SIGNATURE- ---End Message---
Bug#441393: CVE-2007-4743 Incorrect fix for CVE-2007-3999 DoS and arbitary code execution
Package: librpcsecgss Version: 0.14-3 Severity: grave Tags: security Hi, a CVE has been issued against this package: CVE-2007-3999: Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message. CVE-2007-4743 The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, does not correctly check the buffer length in some environments and architectures, which might allow remote attackers to conduct a buffer overflow attack. Please include the CVE id (CVE-2007-4743) in the changelog if you fix this bug. I have an NMU ready for this bug, please ping me if I have your ok to upload, otherwise I will wait 2 days on reaction. Kind regards Nico -- Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. pgpNr2ZEZGmhE.pgp Description: PGP signature
Bug#439585: marked as done (libtunepimp - FTBFS: cannot find -lssh2)
Your message dated Sun, 09 Sep 2007 14:41:51 +0200 with message-id [EMAIL PROTECTED] and subject line (pas de sujet) has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: libtunepimp Version: 0.5.3-5 Severity: serious There was an error while trying to autobuild your package: Automatic build of libtunepimp_0.5.3-5 on lxdebian.bfinv.de by sbuild/s390 98 [...] s390-linux-gnu-g++ -DHAVE_CONFIG_H -I. -I. -I.. -I../include/tunepimp-0.5 -Ithreads/posix -Wall -O2 -g -O2 -MT protocol.lo -MD -MP -MF .deps/protocol.Tpo -c protocol.cpp -o protocol.o /dev/null 21 /bin/sh ../libtool --tag=CXX --mode=link s390-linux-gnu-g++ -g -O2 -o libtunepimp.la -rpath /usr/lib -version-info 5:3:0 tunepimp.lo filecache.lo analyzer.lo dirsearch.lo metadata.lo astrcmp.lo track.lo write.lo c_wrapper.lo watchdog.lo plugins.lo readmeta.lo fileio.lo protocol.lo threads/posix/libtpthread.la utf8/libutf8.la ../libltdl/libltdlc.la -lm -lofa -lexpat -lcurl -lofa -lmusicbrainz s390-linux-gnu-g++ -shared -nostdlib /usr/lib/gcc/s390-linux-gnu/4.1.3/../../../../lib/crti.o /usr/lib/gcc/s390-linux-gnu/4.1.3/crtbeginS.o .libs/tunepimp.o .libs/filecache.o .libs/analyzer.o .libs/dirsearch.o .libs/metadata.o .libs/astrcmp.o .libs/track.o .libs/write.o .libs/c_wrapper.o .libs/watchdog.o .libs/plugins.o .libs/readmeta.o .libs/fileio.o .libs/protocol.o -Wl,--whole-archive threads/posix/.libs/libtpthread.a utf8/.libs/libutf8.a ../libltdl/.libs/libltdlc.a -Wl,--no-whole-archive -lpthread -L/usr/lib -lgssapi_krb5 /usr/lib/libidn.so -lssh2 /usr/lib/libgnutls.so /usr/lib/libtasn1.so -lz /usr/lib/libgcrypt.so /usr/lib/libgpg-error.so -lnsl /usr/lib/libfftw3.so -ldl /usr/lib/libexpat.so /usr/lib/libcurl-gnutls.so /usr/lib/libofa.so /usr/lib/libmusicbrainz.so -L/usr/lib/gcc/s390-linux-gnu/4.1.3 -L/usr/lib/gcc/s390-linux-gnu/4.1.3/../../../../lib -L/lib/../lib -L/usr/lib/../lib -lstdc++ -lm -lc -lgcc_s /usr/lib/gcc/s390-linux-gnu/4.1.3/crtendS.o /usr/lib/gcc/s390-linux-gnu/4.1.3/../../../../lib/crtn.o -Wl,-soname -Wl,libtunepimp.so.5 -o .libs/libtunepimp.so.5.0.3 /usr/bin/ld: cannot find -lssh2 collect2: ld returned 1 exit status make[4]: *** [libtunepimp.la] Error 1 make[4]: Leaving directory `/build/buildd/libtunepimp-0.5.3/lib' make[3]: *** [all-recursive] Error 1 make[3]: Leaving directory `/build/buildd/libtunepimp-0.5.3/lib' make[2]: *** [all-recursive] Error 1 make[2]: Leaving directory `/build/buildd/libtunepimp-0.5.3' make[1]: *** [all] Error 2 make[1]: Leaving directory `/build/buildd/libtunepimp-0.5.3' make: *** [build-stamp] Error 2 ** Build finished at 20070825-1752 FAILED [dpkg-buildpackage died] ---End Message--- ---BeginMessage--- ---End Message---
Bug#439585: (pas de sujet)
COULD YOU PLEASE STOP RE-OPENING THIS BUG ? LIBTUNEPIMP HAS BEEN BUILT ON S390. ... http://buildd.debian.org/build.php?pkg=libtunepimp -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#437621: CVE-2007-2030: unsecure tempfile handling
Hi, I am going to 0-day NMU this package. The attached bug fixes this issue. It will be also archived on: http://people.debian.org/~nion/nmu-diff/lha_1.14i-10.1_1.14i-10.2.patch Kind regards Nico -- Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. diff -u lha-1.14i/debian/changelog lha-1.14i/debian/changelog --- lha-1.14i/debian/changelog +++ lha-1.14i/debian/changelog @@ -1,3 +1,11 @@ +lha (1.14i-10.2) unstable; urgency=high + + * Non-maintainer upload by testing security team. + * Included patch.CVE-2007-2030.patch to fix insecure handling of +temporary files (CVE-2007-2030) (Closes: #437621). + + -- Nico Golde [EMAIL PROTECTED] Sun, 09 Sep 2007 14:49:16 +0200 + lha (1.14i-10.1) unstable; urgency=high * Security NMU for vulnerabilities inherited from GNU Gzip: diff -u lha-1.14i/debian/rules lha-1.14i/debian/rules --- lha-1.14i/debian/rules +++ lha-1.14i/debian/rules @@ -19,6 +19,7 @@ patch -p0 debian/patch.header-overflow patch -p1 debian/patch.redhat-sec2 patch -p1 debian/patch.CVE-2006-4335-CVE-2006-4337-CVE-2006-4338 + patch -p1 debian/patch.CVE-2007-2030.patch touch configure-stamp only in patch2: unchanged: --- lha-1.14i.orig/debian/patch.CVE-2007-2030.patch +++ lha-1.14i/debian/patch.CVE-2007-2030.patch @@ -0,0 +1,86 @@ +--- lha-114i/src/lhadd.c lha-114i/src/lhadd.c +@@ -35,6 +35,8 @@ add_one(fp, nafp, hdr) + if ((hdr-unix_mode UNIX_FILE_SYMLINK) == UNIX_FILE_SYMLINK) { + charbuf[256], *b1, *b2; + if (!quiet) { ++ /* make sure we use a zero-terminated buffer */ ++ hdr-name[255] = 0; + strcpy(buf, hdr-name); + b1 = strtok(buf, |); + b2 = strtok(NULL, |); +@@ -211,8 +213,11 @@ find_update_files(oafp) + add_sp(sp, hdr.name, strlen(hdr.name) + 1); + } + else if ((hdr.unix_mode UNIX_FILE_TYPEMASK) == UNIX_FILE_DIRECTORY) { ++ /* make sure we use a zero-terminated buffer */ ++ hdr.name[sizeof(hdr.name)-1] = 0; + strcpy(name, hdr.name); + len = strlen(name); ++ /* XXX thomas: what about multiple '/' or about .. */ + if (len 0 name[len - 1] == '/') + name[--len] = '\0'; /* strip tail '/' */ + if (stat(name, stbuf) = 0) /* exist ? */ +@@ -237,17 +242,21 @@ delete(oafp, nafp) + + old_header_pos = ftell(oafp); + while (get_header(oafp, ahdr)) { ++ /* make sure we use a zero-terminated buffer */ ++ ahdr.name[sizeof(ahdr.name)-1] = 0; + strcpy(lpath, ahdr.name); + b1 = strtok(lpath, |); + b2 = strtok(NULL, |); + if (need_file(b1)) { /* skip */ + fseek(oafp, ahdr.packed_size, SEEK_CUR); + if (noexec || !quiet) ++ { + if (b2 != NULL) + printf(delete %s - %s\n, b1, b2); + else + printf(delete %s\n, b1); + } ++ } + else { /* copy */ + if (noexec) { + fseek(oafp, ahdr.packed_size, SEEK_CUR); +@@ -276,7 +285,7 @@ build_temporary_file() + signal(SIGHUP, interrupt); + + old_umask = umask(077); +- afp = xfopen(temporary_name, WRITE_BINARY); ++ afp = xfopen(temporary_name, ! WRITE_BINARY); + remove_temporary_at_error = TRUE; + temporary_fp = afp; + umask(old_umask); +--- lha-114i/src/lharc.c lha-114i/src/lharc.c +@@ -1005,10 +1005,18 @@ FILE * + xfopen(name, mode) + char *name, *mode; + { +- FILE *fp; ++ FILE *fp = NULL; ++ ++ if (mode[0] == '!') { ++ int fd; + ++ fd = open(name, O_RDWR|O_CREAT|O_EXCL, 0600); ++ if (fd 0 || (fp = fdopen(fd, mode + 1)) == NULL) ++ fatal_error(name); ++ } else { + if ((fp = fopen(name, mode)) == NULL) + fatal_error(name); ++ } + + return fp; + } +--- lha-114i/src/lhext.c lha-114i/src/lhext.c +@@ -360,7 +360,6 @@ extract_one(afp, hdr) + } + + unlink(bb1); +-make_parent_path(bb1); + l_code = symlink(bb2, bb1); + if (l_code 0) { + if (quiet != TRUE) pgpDRiKf2U875.pgp Description: PGP signature
Bug#441380: marked as forwarded (openoffice.org_1:2.3.0~rc2-1(sparc/experimental): FTBFS: FATAL ERROR, could not mmap a file for executable memory)
Your message dated Sun, 9 Sep 2007 15:29:39 +0200 with message-id [EMAIL PROTECTED] has caused the Debian Bug report #441380, regarding openoffice.org_1:2.3.0~rc2-1(sparc/experimental): FTBFS: FATAL ERROR, could not mmap a file for executable memory to be marked as having been forwarded to the upstream software author(s) [EMAIL PROTECTED] (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- [ please keep [EMAIL PROTECTED] in the loop ] Hi Caolan, any idea with this? Seems to be caused by ooo80816.selinux.bridges.. It's in clean chroots. It also failed on ppc the same way. Regards, Rene - Forwarded message from Frank Lichtenheld [EMAIL PROTECTED] - Subject: Bug#441380: openoffice.org_1:2.3.0~rc2-1(sparc/experimental): FTBFS: FATAL ERROR, could not mmap a file for executable memory Reply-To: Frank Lichtenheld [EMAIL PROTECTED], [EMAIL PROTECTED] Date: Sun, 9 Sep 2007 12:46:24 +0200 From: Frank Lichtenheld [EMAIL PROTECTED] To: [EMAIL PROTECTED] User-Agent: Mutt/1.5.16 (2007-06-11) Package: openoffice.org Version: 1:2.3.0~rc2-1 Severity: serious Hi, your package failed to build from source. Despite the contents of the error message I don't think this is a local configuration problem since it failed the same way on at least two architectures (sparc and amd64). | Automatic build of openoffice.org_1:2.3.0~rc2-1 on odin by sbuild/sparc 98-farm | Build started at 20070909-0820 | ** | Checking available source versions... | Fetching source files... | Reading package lists... | Building dependency tree... | Need to get 383MB of source archives. | Get:1 http://sinclair.farm.ftbfs.de experimental/main openoffice.org 1:2.3.0~rc2-1 (dsc) [8637B] | Get:2 http://sinclair.farm.ftbfs.de experimental/main openoffice.org 1:2.3.0~rc2-1 (tar) [301MB] | Get:3 http://sinclair.farm.ftbfs.de experimental/main openoffice.org 1:2.3.0~rc2-1 (diff) [81.2MB] | Fetched 383MB in 2m15s (2832kB/s) | Download complete and in download only mode | ** Using build dependencies supplied by package: | Build-Depends: lsb-release, bzip2, bison (= 1:1.875a-1) [i386 powerpc sparc amd64 ppc64], flex [i386 powerpc sparc amd64 ppc64], libpam0g-dev [i386 powerpc sparc amd64 ppc64], libxaw7-dev [i386 powerpc sparc amd64 ppc64], unzip [i386 powerpc sparc amd64 ppc64], zip [i386 powerpc sparc amd64 ppc64], autoconf [i386 powerpc sparc amd64 ppc64], sharutils [i386 powerpc sparc amd64 ppc64], pkg-config [i386 powerpc sparc amd64 ppc64], xutils [i386 powerpc sparc amd64 ppc64], libfontconfig1-dev [i386 powerpc sparc amd64 ppc64], binutils (= 2.14.90.0.6-3) [sparc], libc6 (= 2.3.2-1) [powerpc], zlib1g-dev [i386 powerpc sparc amd64 ppc64], libfreetype6-dev [i386 powerpc sparc amd64 ppc64], libx11-dev [i386 powerpc sparc amd64 ppc64], libsm-dev [i386 powerpc sparc amd64 ppc64], libxt-dev [i386 powerpc sparc amd64 ppc64], libxext-dev [i386 powerpc sparc amd64 ppc64], libice-dev [i386 powerpc sparc amd64 ppc64], libsane-dev [i386 powerpc sparc amd64 ppc64], libxrender-dev [i386 powerpc sparc amd64 ppc64], libcupsys2-dev [i386 powerpc sparc amd64 ppc64], libarchive-zip-perl [i386 powerpc sparc amd64 ppc64], libstartup-notification0-dev [i386 powerpc sparc amd64 ppc64], libpng12-dev [i386 powerpc sparc amd64 ppc64], libjpeg62-dev [i386 powerpc sparc amd64 ppc64], libxml2-dev [i386 powerpc sparc amd64 ppc64], libldap2-dev [i386 powerpc sparc amd64 ppc64], libexpat1-dev [i386 powerpc sparc amd64 ppc64], libgnomevfs2-dev [i386 powerpc sparc amd64 ppc64], fastjar [i386 powerpc sparc amd64 ppc64], libsndfile1-dev [i386 powerpc sparc amd64 ppc64], xsltproc [i386 powerpc sparc amd64 ppc64], graphicsmagick [i386 powerpc sparc amd64 ppc64], netpbm [i386 powerpc sparc amd64 ppc64], fdupes [i386 powerpc sparc amd64 ppc64], xml-core [i386 powerpc sparc amd64 ppc64], libxkbfile-dev [i386 powerpc sparc amd64 ppc64], libxinerama-dev [i386 powerpc sparc amd64 ppc64], x11proto-render-dev [i386 powerpc sparc amd64 ppc64], unixodbc-dev (= 2.2.11) [i386 powerpc sparc amd64 ppc64], libxml-parser-perl [i386 powerpc sparc amd64 ppc64], gperf [i386 powerpc sparc amd64 ppc64], libpq-dev [i386 powerpc sparc amd64 ppc64], libcurl4-gnutls-dev [i386 powerpc sparc amd64 ppc64], libdb4.5-dev [i386 powerpc sparc amd64 ppc64], python-central (= 0.5) [i386 powerpc sparc amd64 ppc64], debhelper (= 5.0.37.2), python-dev (= 2.4) [i386 powerpc sparc amd64 ppc64], java-gcj-compat-dev (= 1.0.56) [i386 powerpc sparc amd64 ppc64], ant (= 1.6.5) [i386 powerpc sparc amd64 ppc64], libxt-java (= 0.20050823) [i386 powerpc sparc amd64 ppc64], libxerces2-java [i386 powerpc sparc amd64 ppc64], libxalan2-java (= 2.6.0-1) [i386 powerpc sparc amd64 ppc64
Bug#441403: Incorrect versioned symlink
Package: libjsch-java Version: 0.1.34-1 Severity: serious Hi! I just observed that the symlink provided in libjsch-java points to the old version, and this causes many problems. Please consider fixing it. I am unable to contribute a patch because I am unable to build the package now, even on pbuilder, so you may be in foran FTBFS as well. For the record: [EMAIL PROTECTED] ~] ls -l /usr/share/java/jsch* -rw-r--r-- 1 root root 165603 2007-09-03 18:11 /usr/share/java/jsch-0.1.34.jar lrwxrwxrwx 1 root root 15 2007-09-09 19:06 /usr/share/java/jsch.jar - jsch-0.1.28.jar Thanks! Kumar -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (990, 'unstable'), (500, 'testing'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.22.1 (SMP w/2 CPU cores; PREEMPT) Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) (ignored: LC_ALL set to en_US) Shell: /bin/sh linked to /bin/bash Versions of packages libjsch-java depends on: ii gij [java-virtual-machine 4:4.2.1-6 The GNU Java bytecode interpreter ii gij-4.1 [java-virtual-mac 4.1.2-16 The GNU Java bytecode interpreter ii gij-4.2 [java-virtual-mac 4.2.1-5The GNU Java bytecode interpreter ii java-gcj-compat 1.0.76-5 Java runtime environment using GIJ ii kaffe-pthreads [java-virt 2:1.1.7-4 A POSIX threads enabled version of ii sun-j2sdk1.5 [java-virtua 1.5.0+update06 Java(TM) 2 SDK, Standard Edition, ii sun-java5-jre [java-virtu 1.5.0-12-2 Sun Java(TM) Runtime Environment ( libjsch-java recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#441370: stellarium-data: Contain architecture specific files in 'all' package
Petter Reinholdtsen [EMAIL PROTECTED] wrote: Hi, I guess I learned something new, then. I thought the .mo files was mmapped into the programs and looked up using fast and arch-specific methos. If this is not true, I can change my packaging practice. :) I don't know the specifics on gettext's implementation, but this file from the gettext manual offers some hindsight on the file format: http://www.gnu.org/software/gettext/manual/html_node/MO-Files.html I don't see anything arch-specific at first glance, and they discuss a couple of issues like hash tables and alignment mostly to end up telling that it doesn't buy much in the end :) JB. -- Julien BLACHE - Debian GNU/Linux Developer - [EMAIL PROTECTED] Public key available on http://www.jblache.org - KeyID: F5D6 5169 GPG Fingerprint : 935A 79F1 C8B3 3521 FD62 7CC7 CD61 4FD7 F5D6 5169 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#440868: smc: unplayable with r300
Processing commands for [EMAIL PROTECTED]: reassign 440868 xserver-xorg-video-ati Bug#440868: smc: unplayable with r300 Bug reassigned from package `smc' to `xserver-xorg-video-ati'. retitle 440868 r300: disable low-impact fallback needs documentation, or should be default Bug#440868: smc: unplayable with r300 Changed Bug title to `r300: disable low-impact fallback needs documentation, or should be default' from `smc: unplayable with r300'. severity 440868 important Bug#440868: r300: disable low-impact fallback needs documentation, or should be default Severity set to `important' from `serious' tags 440868 - patch Bug#440868: r300: disable low-impact fallback needs documentation, or should be default Tags were: patch Tags removed: patch thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#440868: smc: unplayable with r300
reassign 440868 xserver-xorg-video-ati retitle 440868 r300: disable low-impact fallback needs documentation, or should be default severity 440868 important tags 440868 - patch thanks I demand that Muammar El Khatib may or may not have written... On 9/4/07, Darren Salt [EMAIL PROTECTED] wrote: smc is unplayably slow when using the R300 driver due to the lack of Render acceleration. This lack requires that operations such as anti-aliased line drawing are done in software. Thanks for reporting, and the best of all for providing a patch to try to fix the problem. I've found a few other games which suffer from the same problem. It turns out that enabling the disable low-impact fallback option (using driconf) is sufficient. Reassigning retitling accordingly. -- | Darren Salt| linux or ds at | nr. Ashington, | Toon | RISC OS, Linux | youmustbejoking,demon,co,uk | Northumberland | Army | + Burn less waste. Use less packaging. Waste less. USE FEWER RESOURCES. It's not in the manual... -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#437148: [scponly] svn support in scponly is unsafe
On 07.09.2007, at 11:01, Joachim Breitner wrote: Hi, Am Freitag, den 07.09.2007, 10:59 +0200 schrieb Florian Weimer: * Joachim Breitner: I think mounting the file system no-exec covers that. IIRC, Subversion directly executes the hook scripts, and this will fail in that case. Then this should be mentioned in the file. I also think that this is quite a high hurdle: Admins that want that can surely re-compile scponly. It's mentioned in the file (item 7), but I agree that this is not the target group of the Debian package. Sorry, didn’t read it all. For the rest, the debian package should come without svn support. The README.Debian could describe the disabled features, and under what circumstances they are save, and how best to recompile scponly. The package could create two binaries, one that supports just scp/sftp, and another one for the rest. Sounds good, but that’s up to the maintainer. Thomas, are you reading this? I am, I'm doing an overhaul of the package soon. Tom For the stable security update, it's probably best to just disable Subversion/Unison/rsync. I agree. Greetings, Joachim -- Joachim nomeata Breitner Debian Developer [EMAIL PROTECTED] | ICQ# 74513189 | GPG-Keyid: 4743206C JID: [EMAIL PROTECTED] | http://people.debian.org/~nomeata
Bug#441405: Several Firebird vulnerabilities discovered
Package: firebird2.0 Severity: grave Tags: security Hi, Several new vulnerabilities have been discovered and fixed in Firebird. The following are reported: CVE-2007-3527: Integer overflow in Firebird 2.0.0 allows remote authenticated users to cause a denial of service (CPU consumption) via certain database operations with multi-byte character sets that trigger an attempt to use the value 65536 for a 16-bit integer, which is treated as 0 and causes an infinite loop on zero-length data. CVE-2007-4664: Unspecified vulnerability in the (1) attach database and (2) create database functionality in Firebird before 2.0.2, when a filename exceeds MAX_PATH_LEN, has unknown impact and attack vectors, aka CORE-1405. CVE-2007-4665: Unspecified vulnerability in the server in Firebird before 2.0.2 allows remote attackers to cause a denial of service (daemon crash) via an XNET session that makes multiple simultaneous requests to register events, aka CORE-1403. CVE-2007-4666: Unspecified vulnerability in the server in Firebird before 2.0.2, when a Superserver/TCP/IP environment is configured, allows remote attackers to cause a denial of service (CPU and memory consumption) via large network packets with garbage, aka CORE-1397. CVE-2007-4667: Unspecified vulnerability in the Services API in Firebird before 2.0.2 allows remote attackers to cause a denial of service, aka CORE-1149. CVE-2007-4668: Unspecified vulnerability in the server in Firebird before 2.0.2 allows remote attackers to determine the existence of arbitrary files, and possibly obtain other file access, via unknown vectors, aka CORE-1312. CVE-2007-4669: The Services API in Firebird before 2.0.2 allows remote authenticated users without SYSDBA privileges to read the server log (firebird.log), aka CORE-1148. Please see: http://security-tracker.debian.net/tracker/source-package/firebird2.0 http://security-tracker.debian.net/tracker/source-package/firebird2 http://security-tracker.debian.net/tracker/source-package/firebird1.5 and the links from there, for detailed information on these issues. As I see it, these are all or mostly all fixed upstream. For unstable, you could therefore probably suffice with uploading this new upstream release. Please mention any CVE id's when fixing these issues. For sarge and etch, it needs to be verified which ones apply and how they can be fixed. thanks Thijs pgpsUXTHuJ2ml.pgp Description: PGP signature
Processed: reassign 441383 to nasm, retitle 441383 to nasm build errors: invalid operands in non-64-bit mode ...
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.10.7 reassign 441383 nasm 0.99.01-1 Bug#441383: flac: FTBFS on i386: fixed_asm.nasm:106: error: invalid operands in non-64-bit mode Bug reassigned from package `flac' to `nasm'. retitle 441383 nasm build errors: invalid operands in non-64-bit mode Bug#441383: flac: FTBFS on i386: fixed_asm.nasm:106: error: invalid operands in non-64-bit mode Changed Bug title to `nasm build errors: invalid operands in non-64-bit mode' from `flac: FTBFS on i386: fixed_asm.nasm:106: error: invalid operands in non-64-bit mode'. block 439277 with 441383 Bug#441383: nasm build errors: invalid operands in non-64-bit mode Bug#439277: flac: FTBFS on i386: fixed_asm.nasm:106: error: invalid operands in non-64-bit mode Was not blocked by any bugs. Blocking bugs of 439277 added: 441383 End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#441149: marked as done (FTBFS: missing build-dependencies on libboost development packages)
Your message dated Sun, 09 Sep 2007 14:17:03 + with message-id [EMAIL PROTECTED] and subject line Bug#441149: fixed in asio 0.3.8~rc3-2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: asio Version: 0.3.8~rc3-1 Severity: serious Tags: patch asio fails to build from source because it cannot find the header files provided by libboost-dev, libboost-date-time-dev, libboost-regex-dev, and libboost-test-dev. The attached patch adds these packages to its build-dependencies so that the header files can be found. -- Matt diff -ru asio-0.3.8~rc3~/debian/control asio-0.3.8~rc3/debian/control --- asio-0.3.8~rc3~/debian/control 2007-09-06 08:29:01.0 -0700 +++ asio-0.3.8~rc3/debian/control 2007-09-06 22:12:12.0 -0700 @@ -2,7 +2,7 @@ Section: devel Priority: optional Maintainer: Simon Richter [EMAIL PROTECTED] -Build-Depends: debhelper (= 5), autoconf, automake, doxygen, graphviz +Build-Depends: debhelper (= 5), autoconf, automake, doxygen, graphviz, libboost-dev, libboost-date-time-dev, libboost-regex-dev, libboost-test-dev Standards-Version: 3.7.2 Package: libasio-dev ---End Message--- ---BeginMessage--- Source: asio Source-Version: 0.3.8~rc3-2 We believe that the bug you reported is fixed in the latest version of asio, which is due to be installed in the Debian FTP archive: asio_0.3.8~rc3-2.diff.gz to pool/main/a/asio/asio_0.3.8~rc3-2.diff.gz asio_0.3.8~rc3-2.dsc to pool/main/a/asio/asio_0.3.8~rc3-2.dsc libasio-dev_0.3.8~rc3-2_all.deb to pool/main/a/asio/libasio-dev_0.3.8~rc3-2_all.deb libasio-doc_0.3.8~rc3-2_all.deb to pool/main/a/asio/libasio-doc_0.3.8~rc3-2_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Simon Richter [EMAIL PROTECTED] (supplier of updated asio package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 07 Sep 2007 11:10:41 +0200 Source: asio Binary: libasio-doc libasio-dev Architecture: source all Version: 0.3.8~rc3-2 Distribution: unstable Urgency: low Maintainer: Simon Richter [EMAIL PROTECTED] Changed-By: Simon Richter [EMAIL PROTECTED] Description: libasio-dev - cross-platform C++ library for network programming libasio-doc - cross-platform C++ library for network programming Closes: 441149 Changes: asio (0.3.8~rc3-2) unstable; urgency=low . * Add missing build dependencies, thanks Matt Kraai for noticing (Closes: #441149) Files: ec0a6565a8e1e2dd8a914101306b0c55 691 devel optional asio_0.3.8~rc3-2.dsc ceba29eed331e3616e49c7fbf524a178 3215 devel optional asio_0.3.8~rc3-2.diff.gz 056c2d49568f23a72d161e80ed3a6d9f 153930 devel optional libasio-dev_0.3.8~rc3-2_all.deb aa68687e43549fdbc4a3e7da41f3a17c 3051106 devel optional libasio-doc_0.3.8~rc3-2_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFG4/xoGKDMjVcGpLQRAjjFAJ4qC+ouXskfixxuYy/gjiZIY3d1WwCfRqSp 2L5jCfyAOWmQYVNk8mK8XW0= =4YO4 -END PGP SIGNATURE- ---End Message---
Bug#439392: Updates for etch and sarge?
Hi, Thanks for fixing this promptly. Do you intend to supply fixed packages for etch and sarge, or are they not vulnerable? Thanks Thijs -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: block 439451 with 441383
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.10.7 block 439451 with 441383 Bug#441383: nasm build errors: invalid operands in non-64-bit mode Bug#439451: zsnes: FTBFS: error: invalid operands in non-64-bit mode Was not blocked by any bugs. Blocking bugs of 439451 added: 441383 End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#439277: regarding nasm build error: invalid operands in non-64-bit mode
Hi, it seems that more than one package is hit by this bug. I tested nasm 0.99.02 and compiled the flac source successfully. Christian Henz also reported success for the zsnes package using a nasm CSV version, and I suspect 0.99.02 would also work fine in his case. I filed bug #441383 to the nasm package for these build errors. Once nasm 0.99.02 hits the archives I suggest to build-depend on nasm (= 0.99.02-1) and close the bugs. Kind regards, Bastian signature.asc Description: This is a digitally signed message part.
Bug#441407: CVE-2007-4650: security bugs in the WebDAV and Reupload modules
Package: gallery2 Version: 2.1.2-2 Severity: serious Tags: security Hi, As you know Gallery 2.2.3 has been released which fixes several security bugs in the WebDAV and Reupload modules. Could you please assess whether an update for etch is necessary? Also, please retroactively add CVE id CVE-2007-4650 to your changelog for 2.2.3-1. As I see it, gallery 1.x is not affected, can you confirm that? Thanks, Thijs pgpsxNN5pET8M.pgp Description: PGP signature
Bug#441193: marked as done (win32-loader - FTBFS: ./win32-loader.sh: line 26: /etc/locale.gen: No such file or directory)
Your message dated Sun, 09 Sep 2007 14:32:11 + with message-id [EMAIL PROTECTED] and subject line Bug#441193: fixed in win32-loader 0.6.0~pre2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: win32-loader Version: 0.6.0~pre1 Severity: serious User: [EMAIL PROTECTED] Usertags: qa-ftbfs-20070905 hi, while doing an archive wide package rebuild your package failed to build from source for the following reason: make[1]: Entering directory `/build/user/win32-loader-0.6.0~pre1' i586-mingw32msvc-gcc -Os -Wl,--file-alignment,512 plugins/cpuid/cpuid.c plugins/cpuid/plugin.c -shared -o plugins/cpuid/test64.dll i586-mingw32msvc-strip plugins/cpuid/test64.dll i586-mingw32msvc-gcc -Os -Wl,--file-alignment,512 plugins/systeminfo/systeminfo.c -shared -o plugins/systeminfo/systeminfo.dll i586-mingw32msvc-strip plugins/systeminfo/systeminfo.dll i586-mingw32msvc-gcc -Os -Wl,--file-alignment,512 plugins/string.c -shared -o plugins/string.dll i586-mingw32msvc-strip plugins/string.dll sed -e s/@VERSION@/0.6.0~pre1/g license.in license /usr/bin/make -C l10n make[2]: Entering directory `/build/user/win32-loader-0.6.0~pre1/l10n' gcc -DTEXTDOMAINDIR=\/build/user/win32-loader-0.6.0~pre1/l10n/locale\ win32-loader.c -o win32-loader mkdir -p templates locale/bg/LC_MESSAGES msgmerge -U po/bg.po po/messages.pot . done. msgfmt -c --statistics -o locale/bg/LC_MESSAGES/win32-loader.mo po/bg.po 23 translated messages, 6 fuzzy translations, 17 untranslated messages. LANGUAGE=bg ./win32-loader.sh templates/bg.nsh ./win32-loader.sh: line 26: /etc/locale.gen: No such file or directory make[2]: *** [templates/bg.nsh] Error 1 make[2]: Leaving directory `/build/user/win32-loader-0.6.0~pre1/l10n' make[1]: *** [win32-loader.exe] Error 2 make[1]: Leaving directory `/build/user/win32-loader-0.6.0~pre1' make: *** [debian/stamp-makefile-build] Error 2 The Full Build log is available and can be viewed at: http://people.debian.org/~lucas/logs/2007/09/05/ bye, - michael ---End Message--- ---BeginMessage--- Source: win32-loader Source-Version: 0.6.0~pre2 We believe that the bug you reported is fixed in the latest version of win32-loader, which is due to be installed in the Debian FTP archive: win32-loader_0.6.0~pre2.dsc to pool/main/w/win32-loader/win32-loader_0.6.0~pre2.dsc win32-loader_0.6.0~pre2.tar.gz to pool/main/w/win32-loader/win32-loader_0.6.0~pre2.tar.gz win32-loader_0.6.0~pre2_all.deb to pool/main/w/win32-loader/win32-loader_0.6.0~pre2_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Robert Millan [EMAIL PROTECTED] (supplier of updated win32-loader package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 9 Sep 2007 16:06:51 +0200 Source: win32-loader Binary: win32-loader Architecture: source all Version: 0.6.0~pre2 Distribution: unstable Urgency: low Maintainer: Debian Install System Team [EMAIL PROTECTED] Changed-By: Robert Millan [EMAIL PROTECTED] Description: win32-loader - Debian-Installer loader for win32 Closes: 440471 441193 Changes: win32-loader (0.6.0~pre2) unstable; urgency=low . * Add reference to /usr/share/common-licenses. - debian/copyright - debian/control (Depends): Add base-files (= 4.0.1). * Put debian-boot as Maintainer, and myself in Uploaders. * Support for using a different charset in NTLDR. Defaults to cp437, which works for languages with latin charset. Other translations will need to change this setting in their respective PO files. (Closes: #440471) * Misc fixes in l10n infrastructure that will enable build on any system where locales-all (added to Build-Depends) is installed, no matter the locale setup. (Closes: #441193) * Get rid of hardcoded language lists in main.nsi. All this cruft is now generated dynamicaly by l10n/Makefile (based on $(LINGUAS)). . [ Updated translations ] * Catalan (ca.po) by Robert Millan * Basque (eu.po) by Piarres Beobide * French (fr.po) by Christian Perrier *
Bug#437621: marked as done (CVE-2007-2030: unsecure tempfile handling)
Your message dated Sun, 09 Sep 2007 13:17:07 + with message-id [EMAIL PROTECTED] and subject line Bug#437621: fixed in lha 1.14i-10.2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: lha Severity: grave Tags: security Justification: user security hole Hi There is a CVE[0] issued against lha. It also leads to a patch[1], which apparently fixes the problem. Could you please investigate this. The CVE text says: lharc.c in lha does not securely create temporary files, which might allow local users to read or write files by creating a file before LHA is invoked. Please remember mentioning the CVE number in your changelog entry. Thanks for your efforts. Cheers Steffen [0]: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2030 [1]: https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=152702 ---End Message--- ---BeginMessage--- Source: lha Source-Version: 1.14i-10.2 We believe that the bug you reported is fixed in the latest version of lha, which is due to be installed in the Debian FTP archive: lha_1.14i-10.2.diff.gz to pool/non-free/l/lha/lha_1.14i-10.2.diff.gz lha_1.14i-10.2.dsc to pool/non-free/l/lha/lha_1.14i-10.2.dsc lha_1.14i-10.2_i386.deb to pool/non-free/l/lha/lha_1.14i-10.2_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Nico Golde [EMAIL PROTECTED] (supplier of updated lha package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 09 Sep 2007 14:49:16 +0200 Source: lha Binary: lha Architecture: source i386 Version: 1.14i-10.2 Distribution: unstable Urgency: high Maintainer: GOTO Masanori [EMAIL PROTECTED] Changed-By: Nico Golde [EMAIL PROTECTED] Description: lha- lzh archiver Closes: 437621 Changes: lha (1.14i-10.2) unstable; urgency=high . * Non-maintainer upload by testing security team. * Included patch.CVE-2007-2030.patch to fix insecure handling of temporary files (CVE-2007-2030) (Closes: #437621). Files: 37e64d7059aeb7c688184de2196f9744 550 non-free/utils optional lha_1.14i-10.2.dsc 8af038a486067313a26ce0687264bf38 46360 non-free/utils optional lha_1.14i-10.2.diff.gz 9d3ec0d02ec1ce0aa96504d84fbd4b7a 59530 non-free/utils optional lha_1.14i-10.2_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFG4+/UHYflSXNkfP8RAjyyAKCQxoOtDrtLwRv2B3UHrKEBTx0UmgCfZO8V cucGFNHjx5QjdILlD0TZ9HU= =oggm -END PGP SIGNATURE- ---End Message---
Bug#439117: marked as done (libcommoncpp2-dev: needs binary-only upload)
Your message dated Sun, 09 Sep 2007 15:17:03 + with message-id [EMAIL PROTECTED] and subject line Bug#439117: fixed in libcommoncpp2 1.5.7-2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: libcommoncpp2-dev Version: 1.5.7-1 Severity: normal Hi, I've got no idea wether this is solvable without rebuilding common C++ against gcc 4.2, anyway it should be noted that the common c++ package that is shipped with debian unstable doesn't work with gcc 4.2. The reason is config.h line 1088, it tries to #include bits/atomic.h which doesn't exist in gcc 4.2 anymore. A workaround is to set a #undef HAVE_GCC_BITS_ATOMIC and #undef HAVE_GCC_CXX_BITS_ATOMIC 3 lines above. A real solution might be to configure the common c++ package to _not_ use bits/atomic at all while building it (don't know wether thats possible). Andreas -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (990, 'unstable'), (500, 'oldstable'), (500, 'experimental'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.22.1 Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages libcommoncpp2-dev depends on: ii libcommoncpp2-1.5.3-0 1.5.7-1 A GNU package for creating portabl ii libgcrypt11-dev [libgcr 1.2.4-2 LGPL Crypto library - development ii libgnutls-dev 1.6.3-1 the GNU TLS library - development ii pkg-config 0.22-1 manage compile and link flags for ii zlib1g-dev 1:1.2.3.3.dfsg-5 compression library - development libcommoncpp2-dev recommends no packages. -- no debconf information ---End Message--- ---BeginMessage--- Source: libcommoncpp2 Source-Version: 1.5.7-2 We believe that the bug you reported is fixed in the latest version of libcommoncpp2, which is due to be installed in the Debian FTP archive: libcommoncpp2-1.5.3-0_1.5.7-2_i386.deb to pool/main/libc/libcommoncpp2/libcommoncpp2-1.5.3-0_1.5.7-2_i386.deb libcommoncpp2-dev_1.5.7-2_i386.deb to pool/main/libc/libcommoncpp2/libcommoncpp2-dev_1.5.7-2_i386.deb libcommoncpp2-doc_1.5.7-2_all.deb to pool/main/libc/libcommoncpp2/libcommoncpp2-doc_1.5.7-2_all.deb libcommoncpp2_1.5.7-2.diff.gz to pool/main/libc/libcommoncpp2/libcommoncpp2_1.5.7-2.diff.gz libcommoncpp2_1.5.7-2.dsc to pool/main/libc/libcommoncpp2/libcommoncpp2_1.5.7-2.dsc A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Kilian Krause [EMAIL PROTECTED] (supplier of updated libcommoncpp2 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 09 Sep 2007 12:33:14 +0200 Source: libcommoncpp2 Binary: libcommoncpp2-doc libcommoncpp2-1.5.3-0 libcommoncpp2-dev Architecture: source all i386 Version: 1.5.7-2 Distribution: unstable Urgency: high Maintainer: Debian VoIP Team [EMAIL PROTECTED] Changed-By: Kilian Krause [EMAIL PROTECTED] Description: libcommoncpp2-1.5.3-0 - A GNU package for creating portable C++ programs libcommoncpp2-dev - Header files and static libraries for Common C++ 2 libcommoncpp2-doc - Documentation files for Common C++ 2 Closes: 439117 441163 Changes: libcommoncpp2 (1.5.7-2) unstable; urgency=high . * Urgency high for fixing RC bug. * Remove bits/atomicity.h detection from sources (Closes: #439117, #441163) * Bump Standards-Version to 3.7.2. Files: 4595989554c8accbefba4929a376e428 1013 devel optional libcommoncpp2_1.5.7-2.dsc 2578d8f716628d0a780ef6c5d7b4ca27 10850 devel optional libcommoncpp2_1.5.7-2.diff.gz 46fd73bc43bcb99cd4ae11f9de72c80b 1367662 doc optional libcommoncpp2-doc_1.5.7-2_all.deb 5e1bb247707a567c4e9e26ab956e8079 362940 libdevel optional libcommoncpp2-dev_1.5.7-2_i386.deb 842d224e29722f4ef899bae14a1c5ce2 246470 libs optional libcommoncpp2-1.5.3-0_1.5.7-2_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFG5Ay4vdkzt4X+wX8RAoIJAJ9qZqQ3dgxKxtwaHpzuq5JSzojf6gCdGAOg r1FxeUhmOC/SdpydrokoYBk= =4t8V -END PGP SIGNATURE- ---End Message---
Bug#441163: marked as done (clamfs - FTBFS: /usr/include/cc++/config.h:1088:28: error: bits/atomicity.h: No such file or directory)
Your message dated Sun, 09 Sep 2007 15:17:03 + with message-id [EMAIL PROTECTED] and subject line Bug#441163: fixed in libcommoncpp2 1.5.7-2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: clamfs Version: 0.9.1-2 Severity: serious User: [EMAIL PROTECTED] Usertags: qa-ftbfs-20070905 hi, while doing an archive wide package rebuild your package failed to build from source for the following reason: make[3]: Entering directory `/build/user/clamfs-0.9.1/src' if i486-linux-gnu-g++ -DHAVE_CONFIG_H -I. -I. -I.. -D_FILE_OFFSET_BITS=64 -D_REENTRANT -DFUSE_USE_VERSION=25 -DRLOG_COMPONENT=clamfs -D_GNU_SOURCE -I/usr/include -Wall -O2 -DNDEBUG -g -O2 -MT clamfs.o -MD -MP -MF .deps/clamfs.Tpo -c -o clamfs.o clamfs.cxx; \ then mv -f .deps/clamfs.Tpo .deps/clamfs.Po; else rm -f .deps/clamfs.Tpo; exit 1; fi In file included from /usr/include/cc++/file.h:47, from ./rlog.hxx:32, from ./clamfs.hxx:38, from clamfs.cxx:51: /usr/include/cc++/config.h:1088:28: error: bits/atomicity.h: No such file or directory clamfs.cxx: In function 'int clamfs::main(int, char**)': clamfs.cxx:928: warning: deprecated conversion from string constant to 'char*' clamfs.cxx:931: warning: deprecated conversion from string constant to 'char*' clamfs.cxx:933: warning: deprecated conversion from string constant to 'char*' clamfs.cxx:937: warning: deprecated conversion from string constant to 'char*' clamfs.cxx:938: warning: deprecated conversion from string constant to 'char*' clamfs.cxx:943: warning: deprecated conversion from string constant to 'char*' clamfs.cxx:947: warning: deprecated conversion from string constant to 'char*' make[3]: *** [clamfs.o] Error 1 make[3]: Leaving directory `/build/user/clamfs-0.9.1/src' make[2]: *** [all-recursive] Error 1 make[2]: Leaving directory `/build/user/clamfs-0.9.1' make[1]: *** [all] Error 2 make[1]: Leaving directory `/build/user/clamfs-0.9.1' make: *** [build-stamp] Error 2 The Full Build log is available and can be viewed at: http://people.debian.org/~lucas/logs/2007/09/05/ bye, - michael ---End Message--- ---BeginMessage--- Source: libcommoncpp2 Source-Version: 1.5.7-2 We believe that the bug you reported is fixed in the latest version of libcommoncpp2, which is due to be installed in the Debian FTP archive: libcommoncpp2-1.5.3-0_1.5.7-2_i386.deb to pool/main/libc/libcommoncpp2/libcommoncpp2-1.5.3-0_1.5.7-2_i386.deb libcommoncpp2-dev_1.5.7-2_i386.deb to pool/main/libc/libcommoncpp2/libcommoncpp2-dev_1.5.7-2_i386.deb libcommoncpp2-doc_1.5.7-2_all.deb to pool/main/libc/libcommoncpp2/libcommoncpp2-doc_1.5.7-2_all.deb libcommoncpp2_1.5.7-2.diff.gz to pool/main/libc/libcommoncpp2/libcommoncpp2_1.5.7-2.diff.gz libcommoncpp2_1.5.7-2.dsc to pool/main/libc/libcommoncpp2/libcommoncpp2_1.5.7-2.dsc A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Kilian Krause [EMAIL PROTECTED] (supplier of updated libcommoncpp2 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 09 Sep 2007 12:33:14 +0200 Source: libcommoncpp2 Binary: libcommoncpp2-doc libcommoncpp2-1.5.3-0 libcommoncpp2-dev Architecture: source all i386 Version: 1.5.7-2 Distribution: unstable Urgency: high Maintainer: Debian VoIP Team [EMAIL PROTECTED] Changed-By: Kilian Krause [EMAIL PROTECTED] Description: libcommoncpp2-1.5.3-0 - A GNU package for creating portable C++ programs libcommoncpp2-dev - Header files and static libraries for Common C++ 2 libcommoncpp2-doc - Documentation files for Common C++ 2 Closes: 439117 441163 Changes: libcommoncpp2 (1.5.7-2) unstable; urgency=high . * Urgency high for fixing RC bug. * Remove bits/atomicity.h detection from sources (Closes: #439117, #441163) * Bump Standards-Version to 3.7.2. Files: 4595989554c8accbefba4929a376e428 1013 devel optional libcommoncpp2_1.5.7-2.dsc 2578d8f716628d0a780ef6c5d7b4ca27 10850 devel optional libcommoncpp2_1.5.7-2.diff.gz
Bug#439117: marked as done (libcommoncpp2-dev: needs binary-only upload)
Your message dated Sun, 09 Sep 2007 15:17:03 + with message-id [EMAIL PROTECTED] and subject line Bug#441163: fixed in libcommoncpp2 1.5.7-2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: libcommoncpp2-dev Version: 1.5.7-1 Severity: normal Hi, I've got no idea wether this is solvable without rebuilding common C++ against gcc 4.2, anyway it should be noted that the common c++ package that is shipped with debian unstable doesn't work with gcc 4.2. The reason is config.h line 1088, it tries to #include bits/atomic.h which doesn't exist in gcc 4.2 anymore. A workaround is to set a #undef HAVE_GCC_BITS_ATOMIC and #undef HAVE_GCC_CXX_BITS_ATOMIC 3 lines above. A real solution might be to configure the common c++ package to _not_ use bits/atomic at all while building it (don't know wether thats possible). Andreas -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (990, 'unstable'), (500, 'oldstable'), (500, 'experimental'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.22.1 Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages libcommoncpp2-dev depends on: ii libcommoncpp2-1.5.3-0 1.5.7-1 A GNU package for creating portabl ii libgcrypt11-dev [libgcr 1.2.4-2 LGPL Crypto library - development ii libgnutls-dev 1.6.3-1 the GNU TLS library - development ii pkg-config 0.22-1 manage compile and link flags for ii zlib1g-dev 1:1.2.3.3.dfsg-5 compression library - development libcommoncpp2-dev recommends no packages. -- no debconf information ---End Message--- ---BeginMessage--- Source: libcommoncpp2 Source-Version: 1.5.7-2 We believe that the bug you reported is fixed in the latest version of libcommoncpp2, which is due to be installed in the Debian FTP archive: libcommoncpp2-1.5.3-0_1.5.7-2_i386.deb to pool/main/libc/libcommoncpp2/libcommoncpp2-1.5.3-0_1.5.7-2_i386.deb libcommoncpp2-dev_1.5.7-2_i386.deb to pool/main/libc/libcommoncpp2/libcommoncpp2-dev_1.5.7-2_i386.deb libcommoncpp2-doc_1.5.7-2_all.deb to pool/main/libc/libcommoncpp2/libcommoncpp2-doc_1.5.7-2_all.deb libcommoncpp2_1.5.7-2.diff.gz to pool/main/libc/libcommoncpp2/libcommoncpp2_1.5.7-2.diff.gz libcommoncpp2_1.5.7-2.dsc to pool/main/libc/libcommoncpp2/libcommoncpp2_1.5.7-2.dsc A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Kilian Krause [EMAIL PROTECTED] (supplier of updated libcommoncpp2 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 09 Sep 2007 12:33:14 +0200 Source: libcommoncpp2 Binary: libcommoncpp2-doc libcommoncpp2-1.5.3-0 libcommoncpp2-dev Architecture: source all i386 Version: 1.5.7-2 Distribution: unstable Urgency: high Maintainer: Debian VoIP Team [EMAIL PROTECTED] Changed-By: Kilian Krause [EMAIL PROTECTED] Description: libcommoncpp2-1.5.3-0 - A GNU package for creating portable C++ programs libcommoncpp2-dev - Header files and static libraries for Common C++ 2 libcommoncpp2-doc - Documentation files for Common C++ 2 Closes: 439117 441163 Changes: libcommoncpp2 (1.5.7-2) unstable; urgency=high . * Urgency high for fixing RC bug. * Remove bits/atomicity.h detection from sources (Closes: #439117, #441163) * Bump Standards-Version to 3.7.2. Files: 4595989554c8accbefba4929a376e428 1013 devel optional libcommoncpp2_1.5.7-2.dsc 2578d8f716628d0a780ef6c5d7b4ca27 10850 devel optional libcommoncpp2_1.5.7-2.diff.gz 46fd73bc43bcb99cd4ae11f9de72c80b 1367662 doc optional libcommoncpp2-doc_1.5.7-2_all.deb 5e1bb247707a567c4e9e26ab956e8079 362940 libdevel optional libcommoncpp2-dev_1.5.7-2_i386.deb 842d224e29722f4ef899bae14a1c5ce2 246470 libs optional libcommoncpp2-1.5.3-0_1.5.7-2_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFG5Ay4vdkzt4X+wX8RAoIJAJ9qZqQ3dgxKxtwaHpzuq5JSzojf6gCdGAOg r1FxeUhmOC/SdpydrokoYBk= =4t8V -END PGP SIGNATURE- ---End Message---
Bug#441163: marked as done (clamfs - FTBFS: /usr/include/cc++/config.h:1088:28: error: bits/atomicity.h: No such file or directory)
Your message dated Sun, 09 Sep 2007 15:17:03 + with message-id [EMAIL PROTECTED] and subject line Bug#439117: fixed in libcommoncpp2 1.5.7-2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: clamfs Version: 0.9.1-2 Severity: serious User: [EMAIL PROTECTED] Usertags: qa-ftbfs-20070905 hi, while doing an archive wide package rebuild your package failed to build from source for the following reason: make[3]: Entering directory `/build/user/clamfs-0.9.1/src' if i486-linux-gnu-g++ -DHAVE_CONFIG_H -I. -I. -I.. -D_FILE_OFFSET_BITS=64 -D_REENTRANT -DFUSE_USE_VERSION=25 -DRLOG_COMPONENT=clamfs -D_GNU_SOURCE -I/usr/include -Wall -O2 -DNDEBUG -g -O2 -MT clamfs.o -MD -MP -MF .deps/clamfs.Tpo -c -o clamfs.o clamfs.cxx; \ then mv -f .deps/clamfs.Tpo .deps/clamfs.Po; else rm -f .deps/clamfs.Tpo; exit 1; fi In file included from /usr/include/cc++/file.h:47, from ./rlog.hxx:32, from ./clamfs.hxx:38, from clamfs.cxx:51: /usr/include/cc++/config.h:1088:28: error: bits/atomicity.h: No such file or directory clamfs.cxx: In function 'int clamfs::main(int, char**)': clamfs.cxx:928: warning: deprecated conversion from string constant to 'char*' clamfs.cxx:931: warning: deprecated conversion from string constant to 'char*' clamfs.cxx:933: warning: deprecated conversion from string constant to 'char*' clamfs.cxx:937: warning: deprecated conversion from string constant to 'char*' clamfs.cxx:938: warning: deprecated conversion from string constant to 'char*' clamfs.cxx:943: warning: deprecated conversion from string constant to 'char*' clamfs.cxx:947: warning: deprecated conversion from string constant to 'char*' make[3]: *** [clamfs.o] Error 1 make[3]: Leaving directory `/build/user/clamfs-0.9.1/src' make[2]: *** [all-recursive] Error 1 make[2]: Leaving directory `/build/user/clamfs-0.9.1' make[1]: *** [all] Error 2 make[1]: Leaving directory `/build/user/clamfs-0.9.1' make: *** [build-stamp] Error 2 The Full Build log is available and can be viewed at: http://people.debian.org/~lucas/logs/2007/09/05/ bye, - michael ---End Message--- ---BeginMessage--- Source: libcommoncpp2 Source-Version: 1.5.7-2 We believe that the bug you reported is fixed in the latest version of libcommoncpp2, which is due to be installed in the Debian FTP archive: libcommoncpp2-1.5.3-0_1.5.7-2_i386.deb to pool/main/libc/libcommoncpp2/libcommoncpp2-1.5.3-0_1.5.7-2_i386.deb libcommoncpp2-dev_1.5.7-2_i386.deb to pool/main/libc/libcommoncpp2/libcommoncpp2-dev_1.5.7-2_i386.deb libcommoncpp2-doc_1.5.7-2_all.deb to pool/main/libc/libcommoncpp2/libcommoncpp2-doc_1.5.7-2_all.deb libcommoncpp2_1.5.7-2.diff.gz to pool/main/libc/libcommoncpp2/libcommoncpp2_1.5.7-2.diff.gz libcommoncpp2_1.5.7-2.dsc to pool/main/libc/libcommoncpp2/libcommoncpp2_1.5.7-2.dsc A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Kilian Krause [EMAIL PROTECTED] (supplier of updated libcommoncpp2 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 09 Sep 2007 12:33:14 +0200 Source: libcommoncpp2 Binary: libcommoncpp2-doc libcommoncpp2-1.5.3-0 libcommoncpp2-dev Architecture: source all i386 Version: 1.5.7-2 Distribution: unstable Urgency: high Maintainer: Debian VoIP Team [EMAIL PROTECTED] Changed-By: Kilian Krause [EMAIL PROTECTED] Description: libcommoncpp2-1.5.3-0 - A GNU package for creating portable C++ programs libcommoncpp2-dev - Header files and static libraries for Common C++ 2 libcommoncpp2-doc - Documentation files for Common C++ 2 Closes: 439117 441163 Changes: libcommoncpp2 (1.5.7-2) unstable; urgency=high . * Urgency high for fixing RC bug. * Remove bits/atomicity.h detection from sources (Closes: #439117, #441163) * Bump Standards-Version to 3.7.2. Files: 4595989554c8accbefba4929a376e428 1013 devel optional libcommoncpp2_1.5.7-2.dsc 2578d8f716628d0a780ef6c5d7b4ca27 10850 devel optional libcommoncpp2_1.5.7-2.diff.gz
Bug#441418: lost sound
Package: libwine-alsa Version: 0.9.43-1 Severity: critical --- Please enter the report below this line. --- Wine losts the soundoutput, often. Wine start normal with sound, and lost it after differnt time. I did not found a spezial situation, for this. Wine writes an error message on the console. err:dsound:DSOUND_MixOne Fatal error. Under/Overflow? primary_done=61440, mixpos=7560/285356 (1736/65536), primary_mixpos=2048, writepos=6144, mixlen=14336 I play Ultima Online - ML. In the wine version 0.9.41-1 there where all fine. --- System information. --- Architecture: amd64 Kernel: Linux 2.6.21-2-amd64 Debian Release: lenny/sid 500 testing debian 500 stable debian --- Package information. --- Depends (Version) | Installed =-+-= libwine (= 0.9.43-1) | 0.9.43-1 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#441403: marked as done (Incorrect versioned symlink)
Your message dated Sun, 09 Sep 2007 16:47:02 + with message-id [EMAIL PROTECTED] and subject line Bug#441403: fixed in jsch 0.1.34ds1-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: libjsch-java Version: 0.1.34-1 Severity: serious Hi! I just observed that the symlink provided in libjsch-java points to the old version, and this causes many problems. Please consider fixing it. I am unable to contribute a patch because I am unable to build the package now, even on pbuilder, so you may be in foran FTBFS as well. For the record: [EMAIL PROTECTED] ~] ls -l /usr/share/java/jsch* -rw-r--r-- 1 root root 165603 2007-09-03 18:11 /usr/share/java/jsch-0.1.34.jar lrwxrwxrwx 1 root root 15 2007-09-09 19:06 /usr/share/java/jsch.jar - jsch-0.1.28.jar Thanks! Kumar -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (990, 'unstable'), (500, 'testing'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.22.1 (SMP w/2 CPU cores; PREEMPT) Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) (ignored: LC_ALL set to en_US) Shell: /bin/sh linked to /bin/bash Versions of packages libjsch-java depends on: ii gij [java-virtual-machine 4:4.2.1-6 The GNU Java bytecode interpreter ii gij-4.1 [java-virtual-mac 4.1.2-16 The GNU Java bytecode interpreter ii gij-4.2 [java-virtual-mac 4.2.1-5The GNU Java bytecode interpreter ii java-gcj-compat 1.0.76-5 Java runtime environment using GIJ ii kaffe-pthreads [java-virt 2:1.1.7-4 A POSIX threads enabled version of ii sun-j2sdk1.5 [java-virtua 1.5.0+update06 Java(TM) 2 SDK, Standard Edition, ii sun-java5-jre [java-virtu 1.5.0-12-2 Sun Java(TM) Runtime Environment ( libjsch-java recommends no packages. -- no debconf information ---End Message--- ---BeginMessage--- Source: jsch Source-Version: 0.1.34ds1-1 We believe that the bug you reported is fixed in the latest version of jsch, which is due to be installed in the Debian FTP archive: jsch_0.1.34ds1-1.diff.gz to pool/main/j/jsch/jsch_0.1.34ds1-1.diff.gz jsch_0.1.34ds1-1.dsc to pool/main/j/jsch/jsch_0.1.34ds1-1.dsc jsch_0.1.34ds1.orig.tar.gz to pool/main/j/jsch/jsch_0.1.34ds1.orig.tar.gz libjsch-java-doc_0.1.34ds1-1_all.deb to pool/main/j/jsch/libjsch-java-doc_0.1.34ds1-1_all.deb libjsch-java_0.1.34ds1-1_all.deb to pool/main/j/jsch/libjsch-java_0.1.34ds1-1_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Michael Koch [EMAIL PROTECTED] (supplier of updated jsch package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 09 Sep 2007 20:32:32 +0200 Source: jsch Binary: libjsch-java-doc libjsch-java Architecture: source all Version: 0.1.34ds1-1 Distribution: unstable Urgency: low Maintainer: Debian Java Maintainers [EMAIL PROTECTED] Changed-By: Michael Koch [EMAIL PROTECTED] Description: libjsch-java - java secure channel libjsch-java-doc - java secure channel examples Closes: 440590 441049 441403 Changes: jsch (0.1.34ds1-1) unstable; urgency=low . * Upload with real 0.1.34 sources. Closes: #440590. * Removed old debian/libjsch-java.links file. Closes: #441049, #441403. * Added debian/watch file. Files: 462620f84bdf9493549058c89d53270b 769 libs optional jsch_0.1.34ds1-1.dsc 2a537eaacdbccce7d37d16bebdad0d42 116304 libs optional jsch_0.1.34ds1.orig.tar.gz 67f97876a6d900f7c08347479db65be7 2799 libs optional jsch_0.1.34ds1-1.diff.gz f93b1030b0b33cb0eea77d434bff6990 201558 libs optional libjsch-java_0.1.34ds1-1_all.deb 9cd5b515c197d6bd2fba743cf425f76c 51868 doc optional libjsch-java-doc_0.1.34ds1-1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFG5D0pWSOgCCdjSDsRAu2lAJ0dv0/o+t7r9BtOIuyWZjLSJASG9QCdG715 8S3zfmR4ctbUJskhwDNEcCI= =ctbw -END PGP SIGNATURE- ---End Message---
Bug#441049: marked as done (FTBFS: Cannot build ant-jsch.jar)
Your message dated Sun, 09 Sep 2007 16:47:02 + with message-id [EMAIL PROTECTED] and subject line Bug#441049: fixed in jsch 0.1.34ds1-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: ant Version: 1.7.0-3 Severity: serious ant fails to compile because it cannot build ant-jsch.jar: Warning: skipping jar archive /tmp/buildd/ant-1.7.0/build/lib/ant-jsch.jar because no files were included. Warning: skipping jar archive /tmp/buildd/ant-1.7.0/build/lib/ant-jsch.jar because no files were included. ... [jar] Warning: skipping jar archive /tmp/buildd/ant-1.7.0/build/lib/ant-jsch.jar because no files were included. [jar] Warning: skipping jar archive /tmp/buildd/ant-1.7.0/build/lib/ant-jsch.jar because no files were included. ... dh_install -pant-optional cp: cannot stat `./build/lib/ant-jsch.jar': No such file or directory dh_install: command returned error code 256 make: *** [binary-install/ant-optional] Error 1 pbuilder: Failed autobuilding of package -- Matt ---End Message--- ---BeginMessage--- Source: jsch Source-Version: 0.1.34ds1-1 We believe that the bug you reported is fixed in the latest version of jsch, which is due to be installed in the Debian FTP archive: jsch_0.1.34ds1-1.diff.gz to pool/main/j/jsch/jsch_0.1.34ds1-1.diff.gz jsch_0.1.34ds1-1.dsc to pool/main/j/jsch/jsch_0.1.34ds1-1.dsc jsch_0.1.34ds1.orig.tar.gz to pool/main/j/jsch/jsch_0.1.34ds1.orig.tar.gz libjsch-java-doc_0.1.34ds1-1_all.deb to pool/main/j/jsch/libjsch-java-doc_0.1.34ds1-1_all.deb libjsch-java_0.1.34ds1-1_all.deb to pool/main/j/jsch/libjsch-java_0.1.34ds1-1_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Michael Koch [EMAIL PROTECTED] (supplier of updated jsch package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 09 Sep 2007 20:32:32 +0200 Source: jsch Binary: libjsch-java-doc libjsch-java Architecture: source all Version: 0.1.34ds1-1 Distribution: unstable Urgency: low Maintainer: Debian Java Maintainers [EMAIL PROTECTED] Changed-By: Michael Koch [EMAIL PROTECTED] Description: libjsch-java - java secure channel libjsch-java-doc - java secure channel examples Closes: 440590 441049 441403 Changes: jsch (0.1.34ds1-1) unstable; urgency=low . * Upload with real 0.1.34 sources. Closes: #440590. * Removed old debian/libjsch-java.links file. Closes: #441049, #441403. * Added debian/watch file. Files: 462620f84bdf9493549058c89d53270b 769 libs optional jsch_0.1.34ds1-1.dsc 2a537eaacdbccce7d37d16bebdad0d42 116304 libs optional jsch_0.1.34ds1.orig.tar.gz 67f97876a6d900f7c08347479db65be7 2799 libs optional jsch_0.1.34ds1-1.diff.gz f93b1030b0b33cb0eea77d434bff6990 201558 libs optional libjsch-java_0.1.34ds1-1_all.deb 9cd5b515c197d6bd2fba743cf425f76c 51868 doc optional libjsch-java-doc_0.1.34ds1-1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFG5D0pWSOgCCdjSDsRAu2lAJ0dv0/o+t7r9BtOIuyWZjLSJASG9QCdG715 8S3zfmR4ctbUJskhwDNEcCI= =ctbw -END PGP SIGNATURE- ---End Message---
Processed: Closing the bug
Processing commands for [EMAIL PROTECTED]: reassign 440922 libgl1-mesa-dri Bug#440922: Hangs the whole PC (can't even login via ssh) Bug reassigned from package `btanks' to `libgl1-mesa-dri'. found 440922 7.0.1-1 Bug#440922: Hangs the whole PC (can't even login via ssh) Bug marked as found in version 7.0.1-1. fixed 440922 7.0.1-2 Bug#440922: Hangs the whole PC (can't even login via ssh) Bug marked as fixed in version 7.0.1-2. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#440922: Closing the bug
reassign 440922 libgl1-mesa-dri found 440922 7.0.1-1 fixed 440922 7.0.1-2 thanks Yes, that's the thing. Upgrading to 7.0.1-2 solved the problem. If it is working now, the bug should be closed. Jiri Palecek -- Using Opera's revolutionary e-mail client: http://www.opera.com/mail/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#441075: pan segfaults on opening some messages
I have the same problem on i386 but only for messages containing attachments. text messages only can be viewed. Philippe -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#441363: gnucash: does not start
On Sun, 2007-09-09 at 10:12 +0200, Michal Politowski wrote: Package: gnucash Version: 2.0.5-2 Severity: grave Justification: renders package unusable After upgrade to 2.0.5-2 gnucash fails to start with the following message: ERROR: Could not find slib/require.scm in (/usr/share/guile/site /usr/share/gnucash/guile-modules /usr/share/gnucash/scm /usr/share/guile/site /usr/share/guile/1.8 /usr/share/guile) There exists /usr/share/slib/require.scm but indeed no such file in any of the directiories on the list. Unfortunately, guile-1.8 does not support slib yet; I thought the old 1.6 stuff would work, but unfortunately it does not. (As the bug log shows, merely creating the symlink is not a sufficient workaround.) The guile-1.6 code to glue into slib is correct, but guile-1.8 has reverted to an old version of that code which does not work properly. I have asked the Debian guile mantainer to look into fixing the slib support. Thomas -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#427439: [Pkg-emboss-devel] Bug#427439: emboss: man pages still conflict
Charles Plessy [EMAIL PROTECTED] writes: many thanks for noticing this. Do you think that it would be acceptable to add the suffix to all emboss manpages? This would solve the problem I'd think so; xscreensaver does this across the board, installing all its man pages as /usr/share/man/man6/*.6x.gz even though there's only one actual conflict to my knowledge (worm.6.gz vs. worm.6x.gz). whichever conflict would appear in future versions. Many commands in EMBOSS have quite common names... Indeed. :-/ Thanks! -- Aaron M. Ucko, KB1CJC (amu at alum.mit.edu, ucko at debian.org) http://www.mit.edu/~amu/ | http://stuff.mit.edu/cgi/finger/[EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#441363: gnucash: does not start
On Sun, 2007-09-09 at 11:43 +0200, Michal Politowski wrote: Symlink only changed the error to ERROR: Unbound variable: slib:features I know what this means and why it's happening; Rob Browning (the Debian guile guy) also should. He and I can hopefully work together to get it repaired soon. Thomas -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: #435420: mlmmj-process, in Etch, is suffuring from a known bug
Processing commands for [EMAIL PROTECTED]: severity 435420 normal Bug#435420: mlmmj-process, in Etch, is suffuring from a known bug Severity set to `normal' from `grave' # this can be safely ignored stop Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#424835: marked as done (mlmmj-php-web: affected by php4-removal)
Your message dated Sun, 09 Sep 2007 18:32:06 + with message-id [EMAIL PROTECTED] and subject line Bug#424835: fixed in mlmmj 1.2.14-2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: mlmmj-php-web Severity: serious User: [EMAIL PROTECTED] Usertags: php4-removal This package has been identified as affected by the removal of php4 in debian. As php4 will soon be removed, it is very important that we: - update the dependencies of all applicable packages to coexist with php5 - remove source and/or binary packages which have no use without php4 for more information on what may need to be done, please see http://wiki.debian.org/PHP4Removal if you have any questions, please contact the debian php maintainers [EMAIL PROTECTED] thanks! ---End Message--- ---BeginMessage--- Source: mlmmj Source-Version: 1.2.14-2 We believe that the bug you reported is fixed in the latest version of mlmmj, which is due to be installed in the Debian FTP archive: mlmmj-php-web-admin_1.2.14-2_all.deb to pool/main/m/mlmmj/mlmmj-php-web-admin_1.2.14-2_all.deb mlmmj-php-web_1.2.14-2_all.deb to pool/main/m/mlmmj/mlmmj-php-web_1.2.14-2_all.deb mlmmj_1.2.14-2.diff.gz to pool/main/m/mlmmj/mlmmj_1.2.14-2.diff.gz mlmmj_1.2.14-2.dsc to pool/main/m/mlmmj/mlmmj_1.2.14-2.dsc mlmmj_1.2.14-2_i386.deb to pool/main/m/mlmmj/mlmmj_1.2.14-2_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Daniel Walrond [EMAIL PROTECTED] (supplier of updated mlmmj package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 09 Sep 2007 17:31:24 + Source: mlmmj Binary: mlmmj-php-web mlmmj-php-web-admin mlmmj Architecture: source i386 all Version: 1.2.14-2 Distribution: unstable Urgency: low Maintainer: Daniel Walrond [EMAIL PROTECTED] Changed-By: Daniel Walrond [EMAIL PROTECTED] Description: mlmmj - mail server independent mailing list manager mlmmj-php-web - web interface for mlmmj, written in php mlmmj-php-web-admin - administrative web interface for mlmmj, written in php Closes: 424802 424835 434063 435999 Changes: mlmmj (1.2.14-2) unstable; urgency=low . * debian/po/pt.po: Add translation by Miguel Figueiredo. Closes: #434063. * Add check for mlmmj-maintd in crontab. Closes: #435999. * Depends on php5. Closes: #424802, #424835. Files: 6ba6f6dd4fcdb8b26a274115559ef708 653 mail optional mlmmj_1.2.14-2.dsc 20e0a6acf5b6dcae2066c5a344ffb648 17682 mail optional mlmmj_1.2.14-2.diff.gz f9e3356f98512f684880bba1199b48d1 156270 mail optional mlmmj_1.2.14-2_i386.deb 8fc5ddda30003d11f855476b4ba7e7fb 26640 mail optional mlmmj-php-web_1.2.14-2_all.deb 9b28551dc9163d5cfcd920571d6a7ab9 34724 mail optional mlmmj-php-web-admin_1.2.14-2_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFG5DpHqXWYex+fp+4RAgm1AJ4geMxgJh8Lg2LwzNLum7uJ0wIJsQCfV5lp FCWazFZCkFXdK2Sa6bNs3K4= =ZiFm -END PGP SIGNATURE- ---End Message---
Bug#424802: marked as done (mlmmj-php-web-admin: affected by php4-removal)
Your message dated Sun, 09 Sep 2007 18:32:06 + with message-id [EMAIL PROTECTED] and subject line Bug#424802: fixed in mlmmj 1.2.14-2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: mlmmj-php-web-admin Severity: serious User: [EMAIL PROTECTED] Usertags: php4-removal This package has been identified as affected by the removal of php4 in debian. As php4 will soon be removed, it is very important that we: - update the dependencies of all applicable packages to coexist with php5 - remove source and/or binary packages which have no use without php4 for more information on what may need to be done, please see http://wiki.debian.org/PHP4Removal if you have any questions, please contact the debian php maintainers [EMAIL PROTECTED] thanks! ---End Message--- ---BeginMessage--- Source: mlmmj Source-Version: 1.2.14-2 We believe that the bug you reported is fixed in the latest version of mlmmj, which is due to be installed in the Debian FTP archive: mlmmj-php-web-admin_1.2.14-2_all.deb to pool/main/m/mlmmj/mlmmj-php-web-admin_1.2.14-2_all.deb mlmmj-php-web_1.2.14-2_all.deb to pool/main/m/mlmmj/mlmmj-php-web_1.2.14-2_all.deb mlmmj_1.2.14-2.diff.gz to pool/main/m/mlmmj/mlmmj_1.2.14-2.diff.gz mlmmj_1.2.14-2.dsc to pool/main/m/mlmmj/mlmmj_1.2.14-2.dsc mlmmj_1.2.14-2_i386.deb to pool/main/m/mlmmj/mlmmj_1.2.14-2_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Daniel Walrond [EMAIL PROTECTED] (supplier of updated mlmmj package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 09 Sep 2007 17:31:24 + Source: mlmmj Binary: mlmmj-php-web mlmmj-php-web-admin mlmmj Architecture: source i386 all Version: 1.2.14-2 Distribution: unstable Urgency: low Maintainer: Daniel Walrond [EMAIL PROTECTED] Changed-By: Daniel Walrond [EMAIL PROTECTED] Description: mlmmj - mail server independent mailing list manager mlmmj-php-web - web interface for mlmmj, written in php mlmmj-php-web-admin - administrative web interface for mlmmj, written in php Closes: 424802 424835 434063 435999 Changes: mlmmj (1.2.14-2) unstable; urgency=low . * debian/po/pt.po: Add translation by Miguel Figueiredo. Closes: #434063. * Add check for mlmmj-maintd in crontab. Closes: #435999. * Depends on php5. Closes: #424802, #424835. Files: 6ba6f6dd4fcdb8b26a274115559ef708 653 mail optional mlmmj_1.2.14-2.dsc 20e0a6acf5b6dcae2066c5a344ffb648 17682 mail optional mlmmj_1.2.14-2.diff.gz f9e3356f98512f684880bba1199b48d1 156270 mail optional mlmmj_1.2.14-2_i386.deb 8fc5ddda30003d11f855476b4ba7e7fb 26640 mail optional mlmmj-php-web_1.2.14-2_all.deb 9b28551dc9163d5cfcd920571d6a7ab9 34724 mail optional mlmmj-php-web-admin_1.2.14-2_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFG5DpHqXWYex+fp+4RAgm1AJ4geMxgJh8Lg2LwzNLum7uJ0wIJsQCfV5lp FCWazFZCkFXdK2Sa6bNs3K4= =ZiFm -END PGP SIGNATURE- ---End Message---
Bug#441393: CVE-2007-4743 Incorrect fix for CVE-2007-3999 DoS and arbitary code execution
Hi, If you have an NMU ready, why don't you attach the patch, so that we can upload it? Regards, Daniel -- Address:Daniel Baumann, Burgunderstrasse 3, CH-4562 Biberist Email: [EMAIL PROTECTED] Internet: http://people.panthera-systems.net/~daniel-baumann/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#441409: gimp: /app/display/gimpdisplayshell-render.c missing
Processing commands for [EMAIL PROTECTED]: severity 441409 serious Bug#441409: gimp: /app/display/gimpdisplayshell-render.c missing Severity set to `serious' from `important' retitle 441409 gimp crashes after scale operation while zoomed out Bug#441409: gimp: /app/display/gimpdisplayshell-render.c missing Changed Bug title to `gimp crashes after scale operation while zoomed out' from `gimp: /app/display/gimpdisplayshell-render.c missing'. forwarded 441409 http://bugzilla.gnome.org/show_bug.cgi?id=475214 Bug#441409: gimp crashes after scale operation while zoomed out Noted your statement that Bug has been forwarded to http://bugzilla.gnome.org/show_bug.cgi?id=475214. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#441393: marked as done (CVE-2007-4743 Incorrect fix for CVE-2007-3999 DoS and arbitary code execution)
Your message dated Sun, 09 Sep 2007 19:17:03 + with message-id [EMAIL PROTECTED] and subject line Bug#441393: fixed in librpcsecgss 0.14-4 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: librpcsecgss Version: 0.14-3 Severity: grave Tags: security Hi, a CVE has been issued against this package: CVE-2007-3999: Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message. CVE-2007-4743 The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, does not correctly check the buffer length in some environments and architectures, which might allow remote attackers to conduct a buffer overflow attack. Please include the CVE id (CVE-2007-4743) in the changelog if you fix this bug. I have an NMU ready for this bug, please ping me if I have your ok to upload, otherwise I will wait 2 days on reaction. Kind regards Nico -- Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. pgpEeeysHPWnV.pgp Description: PGP signature ---End Message--- ---BeginMessage--- Source: librpcsecgss Source-Version: 0.14-4 We believe that the bug you reported is fixed in the latest version of librpcsecgss, which is due to be installed in the Debian FTP archive: librpcsecgss-dev_0.14-4_i386.deb to pool/main/libr/librpcsecgss/librpcsecgss-dev_0.14-4_i386.deb librpcsecgss3_0.14-4_i386.deb to pool/main/libr/librpcsecgss/librpcsecgss3_0.14-4_i386.deb librpcsecgss_0.14-4.diff.gz to pool/main/libr/librpcsecgss/librpcsecgss_0.14-4.diff.gz librpcsecgss_0.14-4.dsc to pool/main/libr/librpcsecgss/librpcsecgss_0.14-4.dsc A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Daniel Baumann [EMAIL PROTECTED] (supplier of updated librpcsecgss package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 9 Sep 2007 21:03:00 +0200 Source: librpcsecgss Binary: librpcsecgss-dev librpcsecgss3 Architecture: source i386 Version: 0.14-4 Distribution: unstable Urgency: high Maintainer: Anibal Monsalve Salazar [EMAIL PROTECTED] Changed-By: Daniel Baumann [EMAIL PROTECTED] Description: librpcsecgss-dev - header files and docs for librpcsecgss librpcsecgss3 - allows secure rpc communication using the rpcsec_gss protocol Closes: 441393 Changes: librpcsecgss (0.14-4) unstable; urgency=high . [ Nico Golde ] * Fixed DoS and possible arbitary code execution due to a stack-based buffer overflow (CVE-2007-4743) (Closes: #441393). Files: 99b874c51cdb3c9e87acaf6c33f4799a 736 libs optional librpcsecgss_0.14-4.dsc fb10c38b9eb3363643820afeee49e0e9 1838 libs optional librpcsecgss_0.14-4.diff.gz 830388c9615bc4221a6cf3b84eb8bd89 41396 libdevel optional librpcsecgss-dev_0.14-4_i386.deb a178ac93862b2da4c0c89b700dd1bb3a 31308 libs standard librpcsecgss3_0.14-4_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFG5EP4+C5cwEsrK54RAid7AJ9UgdL5GKSqENLQAcr2nVn4kG20vgCgtxRA dfuAZO6W8YDOoccdVOts990= =yheK -END PGP SIGNATURE- ---End Message---
Bug#438183: no action?
is it so hard to upload fixed vesrion of a package? or maybe maintainer aint active anymore? -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#441435: warsow: Possibly contains undistributable data
Package: warsow Severity: serious Quoting from http://www.warsow.net/?page=blog: Recently acid, the mapper behind wdm2, wdm11, wctf2 and author of a number of textures on other warsow maps, has made the decision to leave the warsow team and assert his copyright over these works. The reasons why acid has left are known to himself and to the team. Whilst there is no need to go into the specific details here, it became clear that acid was unhappy with the direction that warsow has been heading. Make no mistake - acid's decision not to allow us to 'modify, reproduce, recompile, re-release or recycle' any of his content and to leave the team is a big blow to warsow, and more importantly to the players, who have enjoyed his maps and textures since the early releases. Due to these requests not being conducive to further development of the game/maps (see comment posts) the warsow team has decided to remove content created by acid (wdm2, wdm11 and wctf2) and to create new textures for maps that acid collaborated with others on (wdm6). The non-licensed state of warsow media is what has allowed this to happen - and the team is now working on rectifying this. This whole episode has been very unsatisfying and has highlighted the problems of not having a global media license for warsow. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.22-1-686 (SMP w/1 CPU core) Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) Shell: /bin/sh linked to /bin/bash -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#438183: no action?
On Sun, Sep 09, 2007 at 10:39:34PM +0300, Nick Shaforostoff wrote: is it so hard to upload fixed vesrion of a package? Bug is currently under resolution. Sorry for the delay. Pierre -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#440574: marked as done (memlockd postinst starts twice, doesn't use invoke-rc.d)
Your message dated Sun, 09 Sep 2007 20:47:18 + with message-id [EMAIL PROTECTED] and subject line Bug#440574: fixed in memlockd 0.03-0.1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: memlockd Version: 0.03 Severity: serious I just installed memlockd and saw the following output: Selecting previously deselected package memlockd. (Reading database ... 113626 files and directories currently installed.) Unpacking memlockd (from .../memlockd_0.03_amd64.deb) ... Setting up memlockd (0.03) ... Starting memlockd: memlockd. Starting memlockd: memlockd. It looks like two daemons were indeed started: 13885 ?SLs0:00 /usr/sbin/memlockd -u memlockd 13907 ?SLs0:00 /usr/sbin/memlockd -u memlockd /var/run/memlockd.pid contains only 13885. /etc/init.d/memlockd only kills the first one; the second one has to be killed by hand. In the configure stage of the postinst, /etc/init.d/memlockd restart is called directly (this is a policy violation, see #438885), and then later dh_installinit adds code to the end of the script which can call the init script again. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.22-1-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages memlockd depends on: ii libc6 2.6.1-1GNU C Library: Shared libraries ii libstdc++64.2.1-4The GNU Standard C++ Library v3 memlockd recommends no packages. -- no debconf information -- Robert Edmonds [EMAIL PROTECTED] signature.asc Description: Digital signature ---End Message--- ---BeginMessage--- Source: memlockd Source-Version: 0.03-0.1 We believe that the bug you reported is fixed in the latest version of memlockd, which is due to be installed in the Debian FTP archive: memlockd_0.03-0.1.diff.gz to pool/main/m/memlockd/memlockd_0.03-0.1.diff.gz memlockd_0.03-0.1.dsc to pool/main/m/memlockd/memlockd_0.03-0.1.dsc memlockd_0.03-0.1_amd64.deb to pool/main/m/memlockd/memlockd_0.03-0.1_amd64.deb memlockd_0.03.orig.tar.gz to pool/main/m/memlockd/memlockd_0.03.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Robert S. Edmonds [EMAIL PROTECTED] (supplier of updated memlockd package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Wed, 05 Sep 2007 19:34:22 -0400 Source: memlockd Binary: memlockd Architecture: source amd64 Version: 0.03-0.1 Distribution: unstable Urgency: low Maintainer: Russell Coker [EMAIL PROTECTED] Changed-By: Robert S. Edmonds [EMAIL PROTECTED] Description: memlockd - daemon to lock files into RAM Closes: 418666 431529 440574 Changes: memlockd (0.03-0.1) unstable; urgency=low . * Non-maintainer upload. * Use sysconf(_SC_PAGESIZE) instead of PAGE_SIZE; closes: #418666. * Add dependency on adduser; closes: #431529. * Use invoke-rc.d; closes: #440574. Files: b11b3efed777d289711e336555e2577c 559 admin optional memlockd_0.03-0.1.dsc 5651e3b8e1a337085a564c66870d00ae 7450 admin optional memlockd_0.03.orig.tar.gz b61a99cf58ad70dab7343e53e101541c 1045 admin optional memlockd_0.03-0.1.diff.gz 5b246d8f724e019790213fcd05bca9e1 10882 admin optional memlockd_0.03-0.1_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFG30aFdp+/SHMBQJERAp3DAJ94MOmvZVrRql0GYPfiQ7p1w+S5mACaAvbY a8N2lOvss7ydK1QuPXR3XQA= =HFlP -END PGP SIGNATURE- ---End Message---
Bug#418666: marked as done (memlockd_0.03(ia64/unstable): FTBFS: PAGE_SIZE not defined)
Your message dated Sun, 09 Sep 2007 20:47:18 + with message-id [EMAIL PROTECTED] and subject line Bug#418666: fixed in memlockd 0.03-0.1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: memlockd Version: 0.03 Severity: serious There was an error while trying to autobuild your package: Automatic build of memlockd_0.03 on caballero by sbuild/ia64 98 Build started at 20070410-1944 [...] ** Using build dependencies supplied by package: Build-Depends: debhelper (= 5) [...] dh_clean debian/rules build dh_testdir # Add here commands to configure the package. touch configure-stamp dh_testdir # Add here commands to compile the package. /usr/bin/make make[1]: Entering directory `/build/buildd/memlockd-0.03' gcc -O2 memlockd.cpp -o memlockd -Wall -W -Wshadow -Wpointer-arith -Wcast-align -Wwrite-strings -Wcast-qual -pedantic -ffor-scope -lstdc++ memlockd.cpp: In function 'int open_map(int, stat*, const char*)': memlockd.cpp:86: error: 'PAGE_SIZE' was not declared in this scope make[1]: *** [memlockd] Error 1 make[1]: Leaving directory `/build/buildd/memlockd-0.03' make: *** [build-stamp] Error 2 A full build log can be found at: http://buildd.debian.org/build.php?arch=ia64pkg=memlockdver=0.03 ---End Message--- ---BeginMessage--- Source: memlockd Source-Version: 0.03-0.1 We believe that the bug you reported is fixed in the latest version of memlockd, which is due to be installed in the Debian FTP archive: memlockd_0.03-0.1.diff.gz to pool/main/m/memlockd/memlockd_0.03-0.1.diff.gz memlockd_0.03-0.1.dsc to pool/main/m/memlockd/memlockd_0.03-0.1.dsc memlockd_0.03-0.1_amd64.deb to pool/main/m/memlockd/memlockd_0.03-0.1_amd64.deb memlockd_0.03.orig.tar.gz to pool/main/m/memlockd/memlockd_0.03.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Robert S. Edmonds [EMAIL PROTECTED] (supplier of updated memlockd package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Wed, 05 Sep 2007 19:34:22 -0400 Source: memlockd Binary: memlockd Architecture: source amd64 Version: 0.03-0.1 Distribution: unstable Urgency: low Maintainer: Russell Coker [EMAIL PROTECTED] Changed-By: Robert S. Edmonds [EMAIL PROTECTED] Description: memlockd - daemon to lock files into RAM Closes: 418666 431529 440574 Changes: memlockd (0.03-0.1) unstable; urgency=low . * Non-maintainer upload. * Use sysconf(_SC_PAGESIZE) instead of PAGE_SIZE; closes: #418666. * Add dependency on adduser; closes: #431529. * Use invoke-rc.d; closes: #440574. Files: b11b3efed777d289711e336555e2577c 559 admin optional memlockd_0.03-0.1.dsc 5651e3b8e1a337085a564c66870d00ae 7450 admin optional memlockd_0.03.orig.tar.gz b61a99cf58ad70dab7343e53e101541c 1045 admin optional memlockd_0.03-0.1.diff.gz 5b246d8f724e019790213fcd05bca9e1 10882 admin optional memlockd_0.03-0.1_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFG30aFdp+/SHMBQJERAp3DAJ94MOmvZVrRql0GYPfiQ7p1w+S5mACaAvbY a8N2lOvss7ydK1QuPXR3XQA= =HFlP -END PGP SIGNATURE- ---End Message---
Bug#431529: marked as done (missing dependency on adduser)
Your message dated Sun, 09 Sep 2007 20:47:18 + with message-id [EMAIL PROTECTED] and subject line Bug#431529: fixed in memlockd 0.03-0.1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: memlockd Version: 0.03 Severity: serious Justification: Policy violation, see section 7.2 hi, while running archive wide piuparts tests your package failed on install because of adduser beeing unavailable during postrm: Setting up memlockd (0.03) ... /var/lib/dpkg/info/memlockd.postinst: line 24: addgroup: command not found dpkg: error processing memlockd (--configure): subprocess post-installation script returned error exit status 127 Errors were encountered while processing: memlockd E: Sub-process /usr/bin/dpkg returned an error code (1) the full log can be found here: http://people.debian.org/~lucas/logs/2007/07/01/ bye, - michael ---End Message--- ---BeginMessage--- Source: memlockd Source-Version: 0.03-0.1 We believe that the bug you reported is fixed in the latest version of memlockd, which is due to be installed in the Debian FTP archive: memlockd_0.03-0.1.diff.gz to pool/main/m/memlockd/memlockd_0.03-0.1.diff.gz memlockd_0.03-0.1.dsc to pool/main/m/memlockd/memlockd_0.03-0.1.dsc memlockd_0.03-0.1_amd64.deb to pool/main/m/memlockd/memlockd_0.03-0.1_amd64.deb memlockd_0.03.orig.tar.gz to pool/main/m/memlockd/memlockd_0.03.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Robert S. Edmonds [EMAIL PROTECTED] (supplier of updated memlockd package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Wed, 05 Sep 2007 19:34:22 -0400 Source: memlockd Binary: memlockd Architecture: source amd64 Version: 0.03-0.1 Distribution: unstable Urgency: low Maintainer: Russell Coker [EMAIL PROTECTED] Changed-By: Robert S. Edmonds [EMAIL PROTECTED] Description: memlockd - daemon to lock files into RAM Closes: 418666 431529 440574 Changes: memlockd (0.03-0.1) unstable; urgency=low . * Non-maintainer upload. * Use sysconf(_SC_PAGESIZE) instead of PAGE_SIZE; closes: #418666. * Add dependency on adduser; closes: #431529. * Use invoke-rc.d; closes: #440574. Files: b11b3efed777d289711e336555e2577c 559 admin optional memlockd_0.03-0.1.dsc 5651e3b8e1a337085a564c66870d00ae 7450 admin optional memlockd_0.03.orig.tar.gz b61a99cf58ad70dab7343e53e101541c 1045 admin optional memlockd_0.03-0.1.diff.gz 5b246d8f724e019790213fcd05bca9e1 10882 admin optional memlockd_0.03-0.1_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFG30aFdp+/SHMBQJERAp3DAJ94MOmvZVrRql0GYPfiQ7p1w+S5mACaAvbY a8N2lOvss7ydK1QuPXR3XQA= =HFlP -END PGP SIGNATURE- ---End Message---
Processed (with 1 errors): 440855 not fixed in 2:2.2.6-2, but 2:2.2.6-3
Processing commands for [EMAIL PROTECTED]: Source: gnugk Unknown command or malformed arguments to command. notfixed 440855 2:2.2.6-2 Bug#440855: gnugk: Must build-depend on firebird2.0-dev, not firebird2-dev Bug no longer marked as fixed in version 2:2.2.6-2. fixed 440855 2:2.2.6-3 Bug#440855: gnugk: Must build-depend on firebird2.0-dev, not firebird2-dev Bug marked as fixed in version 2:2.2.6-3. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#441449: memlockd: FTBFS on multiple architectures
Package: memlockd Severity: serious Tags: patch memlockd fails to build on multiple architectures (at least arm, mips, and mipsel) due to the way the compiler is invoked: gcc -O2 memlockd.cpp -o memlockd -Wall -W -Wshadow -Wpointer-arith -Wcast-align -Wwrite-strings -Wcast-qual -pedantic -ffor-scope -lstdc++ gcc: error trying to exec 'cc1plus': execvp: No such file or directory --- memlockd-0.03.orig/Makefile +++ memlockd-0.03/Makefile @@ -5,7 +5,7 @@ memlockd: memlockd.cpp - gcc -O2 memlockd.cpp -o memlockd $(WFLAGS) -lstdc++ + g++ -O2 memlockd.cpp -o memlockd $(WFLAGS) clean: rm -f memlockd -- Robert Edmonds [EMAIL PROTECTED] signature.asc Description: Digital signature
Bug#441452: Fails to work properly on amd64
Package: flashplugin-nonfree Version: 1:1.1 Severity: grave --- Please enter the report below this line. --- My experience is similar to the one in this bug report ( https://bugs.launchpad.net/ubuntu/+source/ia32-libs/+bug/138099 ) except I have only this error : nspluginwrapper: no appropriate viewer found for /usr/lib/flashplugin-nonfree/libflashplayer.so Logically, the workaround described in this bug does not work. Happens with unstable and experimental versions of flashplugin-nonfree --- System information. --- Architecture: amd64 Kernel: Linux 2.6.22-2-amd64 Debian Release: lenny/sid 500 unstablewww.debian-multimedia.org 500 unstableftp.de.debian.org 1 experimentalftp.de.debian.org --- Package information. --- Depends (Version) | Installed ===-+- debconf | 1.5.14 OR debconf-2.0 | wget| 1.10.2-3 fontconfig | 2.4.2-1.2 ia32-libs-gtk | 2.0 lib32z1 | 1:1.2.3.3.dfsg-5 nspluginwrapper (= 0.9.91.4-3) | 0.9.91.5-1 empty-expect| 0.6.11b-2 gnupg | 1.4.6-2 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#439973: boson: Segmentation Fault on startup
On Tue, Aug 28, 2007 at 09:14:59PM +0100, Robert Hart wrote: Hello, Thank you for your report and sorry for the delay, I was too busy the last weeks to write an anwser. I think you've a problem with your graphic driver, not with boson. An user space Which card and graphic driver do you use? What does $glxinfo | head -n 5 return? Can you also give a complet back trace: apt-get install boson-dbg gdb $gdb boson $(gdb) run $(gdb) bt full Best regards, Gonéri Le Bouder signature.asc Description: Digital signature
Bug#438183: marked as done ('421 Could not go to my home directory' on 'wzdftpd' login after fresh install)
Your message dated Sun, 09 Sep 2007 22:17:06 + with message-id [EMAIL PROTECTED] and subject line Bug#438183: fixed in wzdftpd 0.8.2-2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: wzdftpd Version: 0.8.2-1 Severity: grave Justification: renders package unusable what i did: dpkg -P wzdftpd rm -rf /var/log/wzdftpd #because dpkg complained apt-get install wzdftpd ftp 127.0.0.1 [type wzdftpd:wzdftpd] =login fails with '421 Could not go to my home directory' ps i did fresh install because it stopped to allow all logins (including wzdftpd) so i wanted to configure it from scratch -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (990, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.20.1-my (PREEMPT) Locale: LANG=ru_UA, LC_CTYPE=ru_UA (charmap=KOI8-U) (ignored: LC_ALL set to ru_UA.KOI8-U) Shell: /bin/sh linked to /bin/bash Versions of packages wzdftpd depends on: ii debconf [debconf-2.0] 1.5.13 Debian configuration management sy ii libc6 2.6-2 GNU C Library: Shared libraries ii libgnutls13 1.6.3-1the GNU TLS library - runtime libr ii libpam0g 0.79-4 Pluggable Authentication Modules l ii po-debconf1.0.8 manage translated Debconf template ii ucf 2.0020 Update Configuration File: preserv wzdftpd recommends no packages. -- debconf information: wzdftpd/upgrade: ---End Message--- ---BeginMessage--- Source: wzdftpd Source-Version: 0.8.2-2 We believe that the bug you reported is fixed in the latest version of wzdftpd, which is due to be installed in the Debian FTP archive: wzdftpd-back-mysql_0.8.2-2_amd64.deb to pool/main/w/wzdftpd/wzdftpd-back-mysql_0.8.2-2_amd64.deb wzdftpd-back-pgsql_0.8.2-2_amd64.deb to pool/main/w/wzdftpd/wzdftpd-back-pgsql_0.8.2-2_amd64.deb wzdftpd-dev_0.8.2-2_amd64.deb to pool/main/w/wzdftpd/wzdftpd-dev_0.8.2-2_amd64.deb wzdftpd-mod-avahi_0.8.2-2_amd64.deb to pool/main/w/wzdftpd/wzdftpd-mod-avahi_0.8.2-2_amd64.deb wzdftpd-mod-perl_0.8.2-2_amd64.deb to pool/main/w/wzdftpd/wzdftpd-mod-perl_0.8.2-2_amd64.deb wzdftpd-mod-tcl_0.8.2-2_amd64.deb to pool/main/w/wzdftpd/wzdftpd-mod-tcl_0.8.2-2_amd64.deb wzdftpd_0.8.2-2.diff.gz to pool/main/w/wzdftpd/wzdftpd_0.8.2-2.diff.gz wzdftpd_0.8.2-2.dsc to pool/main/w/wzdftpd/wzdftpd_0.8.2-2.dsc wzdftpd_0.8.2-2_amd64.deb to pool/main/w/wzdftpd/wzdftpd_0.8.2-2_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Pierre Chifflier [EMAIL PROTECTED] (supplier of updated wzdftpd package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 09 Sep 2007 22:55:03 +0200 Source: wzdftpd Binary: wzdftpd-mod-perl wzdftpd-back-mysql wzdftpd-dev wzdftpd-mod-avahi wzdftpd-back-pgsql wzdftpd wzdftpd-mod-tcl Architecture: source amd64 Version: 0.8.2-2 Distribution: unstable Urgency: low Maintainer: Pierre Chifflier [EMAIL PROTECTED] Changed-By: Pierre Chifflier [EMAIL PROTECTED] Description: wzdftpd- A portable, modular, small and efficient ftp server wzdftpd-back-mysql - MySQL backend for wzdftpd wzdftpd-back-pgsql - PostgreSQL backend for wzdftpd wzdftpd-dev - Development files for wzdftpd wzdftpd-mod-avahi - Zeroconf module for wzdftpd wzdftpd-mod-perl - Perl module for wzdftpd wzdftpd-mod-tcl - TCL module for wzdftpd Closes: 410411 422267 438183 Changes: wzdftpd (0.8.2-2) unstable; urgency=low . * Set default homedir for user wzdftpd to / (Closes: #438183) * Make zeroconf module advertise port 21 by default (Closes: #422267) * Add German debconf translation (Closes: #410411) * Update my email address Files: 53772eb86e3c50cf8067939357d478c9 871 net optional wzdftpd_0.8.2-2.dsc 54ad54a5d407a6ca3a2ff1397bb9a54e 3291 net optional wzdftpd_0.8.2-2.diff.gz 08d1ac9481dc4dcf76482ab772ba5321 281808 net optional wzdftpd_0.8.2-2_amd64.deb b1e7d8570394ae4c668de7e711b579a7 40994 net optional wzdftpd-back-mysql_0.8.2-2_amd64.deb 33682b4a534e1031a25b8a75b2ed08d7 40388
Processed: Re: Bug#437020: apt-listbugs fails with W: Mandatory parameter 'bug' missing in call to Debbugs::Status::get_bug_status
Processing commands for [EMAIL PROTECTED]: reassign 437020 debbugs Bug#437020: fails with W: Mandatory parameter 'bug' missing in call Bug reassigned from package `apt-listbugs' to `debbugs'. forcemerge 437020 441295 Bug#437020: fails with W: Mandatory parameter 'bug' missing in call Bug#441295: debbugs: apt-listbugs reportbug-ng fail at SOAP call, API broken ? Forcibly Merged 437020 441295. close 437020 Bug#437020: fails with W: Mandatory parameter 'bug' missing in call 'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing. Bug#441295: debbugs: apt-listbugs reportbug-ng fail at SOAP call, API broken ? Bug closed, send any further explanations to Bryan Donlan [EMAIL PROTECTED] thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#437020: apt-listbugs fails with W: Mandatory parameter 'bug' missing in call to Debbugs::Status::get_bug_status
reassign 437020 debbugs forcemerge 437020 441295 close 437020 thanks The problem is reoccurring, but it seems it takes a specific combination of packages to make it happen. I have no idea what's special about that combination, but it causes the server to choke with that error. I can currently reproduce this with the following command: /usr/sbin/apt-listbugs list openoffice.org-core openoffice.org-officebean HTTP/1.1 500 Internal Server Error Date: Fri, 07 Sep 2007 19:47:02 GMT Server: Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/2.3.5 SOAPServer: SOAP::Lite/Perl/0.60 Content-Length: 621 Connection: close Content-Type: text/xml; charset=utf-8 ?xml version=1.0 encoding=UTF-8?SOAP-ENV:Envelope xmlns:xsi=http://www.w3.org/2001/XMLSchema-instance; xmlns:SOAP-ENC=http://schemas.xmlsoap.org/soap/encoding/; xmlns:SOAP-ENV=http://schemas.xmlsoap.org/soap/envelope/; xmlns:xsd=http://www.w3.org/2001/XMLSchema; SOAP-ENV:encodingStyle=http://schemas.xmlsoap.org/soap/encoding/;SOAP-ENV:BodySOAP-ENV:FaultfaultcodeSOAP-ENV:Server/faultcodefaultstringMandatory parameter 'bug' missing in call to Debbugs::Status::get_bug_status at /usr/local/lib/site_perl/Debbugs/SOAP.pm line 131 /faultstring/SOAP-ENV:Fault/SOAP-ENV:Body/SOAP-ENV:Envelope! CONNECTION CLOSED regards, junichi -- [EMAIL PROTECTED],netfort.gr.jp} Debian Project -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#439973: boson: Segmentation Fault on startup
On Mon, Sep 10, 2007 at 12:24:39AM +0200, Gonéri Le Bouder wrote: On Tue, Aug 28, 2007 at 09:14:59PM +0100, Robert Hart wrote: Hello, Thank you for your report and sorry for the delay, I was too busy the last weeks to write an anwser. I think you've a problem with your graphic driver, not with boson. An user space Which card and graphic driver do you use? What does $glxinfo | head -n 5 return? It's an Intel 965gm using the intel driver. $ glxinfo | head -n 5 name of display: :0.0 display: :0 screen: 0 direct rendering: Yes server glx vendor string: SGI server glx version string: 1.2 Can you also give a complet back trace: apt-get install boson-dbg gdb $gdb boson $(gdb) run $(gdb) bt full #0 0x2ad82a8a6967 in glGetString () from /usr/lib/libGL.so No symbol table info available. #1 0x008c6a56 in boglGetOpenGLExtensions () at /build/buildd/boson-0.13/bogl/bogl.cpp:48 extensions = {static null = { static null = same as static member of an already seen type, d = 0xd2de20, static shared_null = 0xd2de20}, d = 0xd4c9a0, static shared_null = 0xd2de20} #2 0x008db8c8 in boglResolveOpenGL_1_2_Symbols ([EMAIL PROTECTED]) at /build/buildd/boson-0.13/bogl/bogl_resolve_symbols.cpp:1158 extensions = {QValueListQString = { sh = 0xd4a890}, No data fields} __PRETTY_FUNCTION__ = bool boglResolveOpenGL_1_2_Symbols(MyQLibrary) #3 0x008dc7e1 in boglResolveLibGLSymbols ([EMAIL PROTECTED]) at /build/buildd/boson-0.13/bogl/bogl_resolve_symbols.cpp:91 No locals. #4 0x008c867b in BoGL::resolveGLSymbols (this=0xd47ec0) at /build/buildd/boson-0.13/bogl/bogl_resolve.cpp:311 ret = value optimized out libGL = {static null = { static null = same as static member of an already seen type, d = 0xd2de20, static shared_null = 0xd2de20}, d = 0xd2de20, static shared_null = 0xd2de20} libGLU = {static null = { static null = same as static member of an already seen type, d = 0xd2de20, static shared_null = 0xd2de20}, d = 0xd2de20, static shared_null = 0xd2de20} gl = (MyQLibrary *) 0xd4b2d0 glu = value optimized out __PRETTY_FUNCTION__ = bool BoGL::resolveGLSymbols() #5 0x008c89d1 in boglResolveGLSymbols () at /build/buildd/boson-0.13/bogl/bogl_resolve.cpp:47 No locals. #6 0x006499f7 in main (argc=1, argv=value optimized out) at /build/buildd/boson-0.13/boson/programs/main.cpp:113 about = {mAppName = 0x98e2ba boson, mProgramName = 0x9a047f Boson, mVersion = 0x98a5f3 0.13, mShortDescription = 0x98aae0 A realtime strategy game for KDE, mLicenseKey = 1, mCopyrightStatement = 0x98a6e8 (C) 1999-2000,2001-2005 The Boson team, mOtherText = 0x0, mHomepageAddress = 0x98a31d http://boson.eu.org;, mBugEmailAddress = 0x98a309 [EMAIL PROTECTED], mAuthorList = { sh = 0xd45520}, mCreditList = {sh = 0xd45580}, mLicenseText = 0x0, d = 0xd455e0} argv0 = incomplete type eventLoop = { = {No data fields}, static metaObj = 0x0, mAdvanceObject = 0x2ad8239bb636, d = 0xb9d49ef8} app = { = {No data fields}, No data fields} args = value optimized out checkInstallation = {No data fields} errorMessage = {static null = { static null = same as static member of an already seen type, d = 0xd2de20, static shared_null = 0xd2de20}, d = 0x10100d44a60, static shared_null = 0xd2de20} iface = value optimized out gameEngine = value optimized out forceWantDirect = value optimized out top = value optimized out glDriverBroken = {static null = { static null = same as static member of an already seen type, d = 0xd2de20, static shared_null = 0xd2de20}, d = 0x7fff870f6680, static shared_null = 0xd2de20} ret = value optimized out __PRETTY_FUNCTION__ = int main(int, char**) Best regards, Gonéri Le Bouder -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#440808: marked as done (Upgrade dependency to the new kernel)
Your message dated Sun, 9 Sep 2007 17:54:41 -0700 with message-id [EMAIL PROTECTED] and subject line Upgrade dependency to the new kernel has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: linux-image-686 Version: 2.6.22+9 Severity: serious --- Please enter the report below this line. --- linux-image 2.6.22+9 has been removed from sid, so the dependency is broken. --- System information. --- Architecture: i386 Kernel: Linux 2.6.22-1-686 Debian Release: lenny/sid 990 unstable www.debian-multimedia.org 990 unstable ftp.uk.debian.org 500 stable dl.google.com 500 experimental www.debian-multimedia.org 1 experimental ftp.uk.debian.org --- Package information. --- Depends (Version) | Installed ==-+-=== linux-image-2.6-686 | 2.6.22+9 ---End Message--- ---BeginMessage--- The current version of linux-image-2.6-686 in unstable depends on linux-image-2.6.22-2-686. Closing this report. Thanks, -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ ---End Message---
Bug#440646: squid3: Incorrect content returned by pre7
On Tue, 4 Sep 2007 01:33:22 +0200 Luigi Gangitano [EMAIL PROTECTED] wrote: Hi Ian, this bug may be related to the large object (2GB) support introduced upstream between PRE6 and PRE7. Can you please try the follow: - backup your cache_dir (just move it to somewhere else) - create a new cache_dir (squid will create it automatically if you point it to an empty directory) - check if error persists I already tried clearing out the cache dir but the problems turned up again. I didn't back it up though. Did you create this cache_dir with a squid3 package or it was created with an earlier (2.x) version? I used the squid3 package, which uses a separate cache dir (/var/spool/squid3), so no it wasn't created with squid 2.x. bye signature.asc Description: PGP signature
Bug#441466: sshmenu: Missing dependency on libpanel-applet2-ruby
Package: sshmenu Version: 3.13-1 Severity: grave Justification: renders package unusable The sshmenu package includes the relevant files for running the program as a GNOME panel applet, but the libpanel-applet2-ruby package is not listed in the dependencies therefore the applet won't actually work. Both the generic standalone sshmenu and the GNOME-specific sshmenu-gome standalone apps do run. The preferred solution would be to move the gnome-specific files into their own package (e.g.: sshmenu-gnome) and add the libpanel-applet2-ruby package as a dependency to that package. This would allow non-GNOME users to install 'sshmenu' without pulling in GNOME dependencies. Further information: Kevin I've sent you a couple of emails and not had a reply so I'm not sure if you're not receiving them or I'm not getting replies. The points I was making in the emails ... 1. The SSHMenu home page has moved from my personal web site to SourceForge: http://sshmenu.sourceforge.net/ 2. The files I used when creating my informal Debian/Ubuntu packages are here: http://sshmenu.svn.sourceforge.net/viewvc/sshmenu/modules/sshmenu/trunk/deb-files/ 3. Version 3.14 of SSHMenu was released last week 4. My suggested guidelines for packaging SSHMenu are here: http://sshmenu.sourceforge.net/download/install.html You are of course free to ignore them :-) Or better yet, let me know if you think they need revising. Thanks for picking up this package for Debian. Regards Grant -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.22.1-dirk (SMP w/1 CPU core; PREEMPT) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/bash Versions of packages sshmenu depends on: ii libgtk2-ruby 0.16.0-7 GTK+ bindings for the Ruby languag ii libruby1.81.8.6.36-3 Libraries necessary to run Ruby 1. ii libyaml-ruby 1.8.2-1YAML for Ruby ii ruby 1.8.2-1An interpreter of object-oriented ii ruby1.8 1.8.6.36-3 Interpreter of object-oriented scr ii ssh-askpass-gnome [ssh-askpas 1:4.6p1-5 interactive X program to prompt us sshmenu recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#441383: marked as done (nasm build errors: invalid operands in non-64-bit mode)
Your message dated Mon, 10 Sep 2007 01:47:12 + with message-id [EMAIL PROTECTED] and subject line Bug#441383: fixed in nasm 0.99.02-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: flac Version: 1.1.4-3+b1 Severity: serious Justification: FTBFS -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, I just tried to rebuild the flac source package on my i386 (athlon XP) system and got the following error from nasm: [...] nasm -f elf -d OBJ_FORMAT_elf -i./ fixed_asm.nasm -o .libs/fixed_asm.o fixed_asm.nasm:106: error: invalid operands in non-64-bit mode fixed_asm.nasm:107: error: invalid operands in non-64-bit mode fixed_asm.nasm:108: error: invalid operands in non-64-bit mode [...] Attached is a complete build log. Regards, Bastian - -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.22-ck1treasure2 (PREEMPT) Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Shell: /bin/sh linked to /bin/bash Versions of packages flac depends on: ii libc6 2.6.1-1GNU C Library: Shared libraries ii libflac8 1.1.4-3+b1 Free Lossless Audio Codec - runtim ii libogg0 1.1.3-2Ogg Bitstream Library flac recommends no packages. - -- no debconf information -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGzev5eBwlBDLsbz4RAgaXAKCxv5yF616aGMpUcJPZ05anwlQTTwCfUMZ5 pTy7HTiTD9SZubimcciIwjQ= =39G3 -END PGP SIGNATURE- test -d debian/patched || install -d debian/patched dpatch apply-all applying patch 01_ldpath_fix to ./ ... ok. applying patch 02_doc_path to ./ ... ok. applying patch 03_cosmetic_flac_stats to ./ ... ok. applying patch 07_metaflac_error_exit to ./ ... ok. dpatch cat-all patch-stampT mv -f patch-stampT patch-stamp dh_testdir CFLAGS=-g -O2 CXXFLAGS=-g -O2 ./configure --prefix=/usr \ --mandir=/usr/share/man --disable-rpath checking for a BSD-compatible install... /usr/bin/install -c checking whether build environment is sane... yes checking for gawk... gawk checking whether make sets $(MAKE)... yes checking whether to enable maintainer-specific portions of Makefiles... no checking build system type... i686-pc-linux-gnu checking host system type... i686-pc-linux-gnu checking for style of include used by make... GNU checking for gcc... gcc checking for C compiler default output file name... a.out checking whether the C compiler works... yes checking whether we are cross compiling... no checking for suffix of executables... checking for suffix of object files... o checking whether we are using the GNU C compiler... yes checking whether gcc accepts -g... yes checking for gcc option to accept ANSI C... none needed checking dependency style of gcc... gcc3 checking for a sed that does not truncate output... /bin/sed checking for egrep... grep -E checking for ld used by gcc... /usr/bin/ld checking if the linker (/usr/bin/ld) is GNU ld... yes checking for /usr/bin/ld option to reload object files... -r checking for BSD-compatible nm... /usr/bin/nm -B checking whether ln -s works... yes checking how to recognise dependent libraries... pass_all checking how to run the C preprocessor... gcc -E checking for ANSI C header files... yes checking for sys/types.h... yes checking for sys/stat.h... yes checking for stdlib.h... yes checking for string.h... yes checking for memory.h... yes checking for strings.h... yes checking for inttypes.h... yes checking for stdint.h... yes checking for unistd.h... yes checking dlfcn.h usability... yes checking dlfcn.h presence... yes checking for dlfcn.h... yes checking for g++... g++ checking whether we are using the GNU C++ compiler... yes checking whether g++ accepts -g... yes checking dependency style of g++... gcc3 checking how to run the C++ preprocessor... g++ -E checking for g77... no checking for f77... no checking for xlf... no checking for frt... no checking for pgf77... no checking for fort77... no checking for fl32... no checking for af77... no checking for f90... no checking for xlf90... no checking for pgf90... no checking for epcf90... no checking for f95... no checking for fort... no checking for xlf95... no checking for ifc... no checking for efc... no checking for pgf95... no checking for lf95... no checking for gfortran... no checking whether we are using the GNU Fortran 77 compiler... no checking whether accepts -g... no checking the maximum length of
Bug#429052: iceweasel: mailcap entry makes user more vulnerable to Mozilla bug 230606
severity 429052 important thanks Since upstream does not consider this a critical bug, I don't think we should either. Some sort of warning to the user would be good though, I agree. I could take iceweasel out of mailcap, but this might annoy more than this exploit is a threat. A stripping script would work I suppose, but would probably be surprising to the user. Ccing pkg-mozilla-maintainer, do you guys have any opinions? * Vincent Lefevre ([EMAIL PROTECTED]) wrote: Package: iceweasel Version: 2.0.0.4-1 Severity: grave Tags: security Justification: user security hole The default /etc/mailcap entry makes iceweasel to be called directly to view HTML files with a file:// URL. Due to Mozilla bug 230606 (or 382637, on which the attached example is based), data readable by the user can be sent to a remote web server. For instance, on my machine, after saving the attached mail file and removing my personal ~/.mailcap file (to use Debian's): $ mutt -f exploit-file I type 'v', down, enter to view the attached exploit-file.html file with Iceweasel. /var/log/apache2/error.log now contains: [Fri Jun 15 17:45:11 2007] [error] [client 127.0.0.1] File does not exist: /var/www/vin This example just provides the hostname (value of /etc/hostname) to the local web server, but one can provide more private information (such as the contents of the user's .ssh/id_rsa or the contents of /etc/passwd) to any remote web server (this needs a bit more JavaScript to transform the data into a URL, though). A possible fix is to pass the data first to a wrapper that will clean up the HTML file (i.e. remove scripts), or, if one wants to still have the possibility to run scripts, store the file to some place where a http://localhost/...; URL can be used (the user must have a local web server installed). -- Eric Dorland [EMAIL PROTECTED] ICQ: #61138586, Jabber: [EMAIL PROTECTED] 1024D/16D970C6 097C 4861 9934 27A0 8E1C 2B0A 61E9 8ECF 16D9 70C6 signature.asc Description: Digital signature
Processed: Re: Bug#429052: iceweasel: mailcap entry makes user more vulnerable to Mozilla bug 230606
Processing commands for [EMAIL PROTECTED]: severity 429052 important Bug#429052: iceweasel: mailcap entry makes user more vulnerable to Mozilla bug 230606 Severity set to `important' from `grave' thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#412053: uim-xim: Makes other applications bug when using non-ascii characters.
reassign 412053 uim forcemerge 426221 412053 thanks So it looks like the consensus was this is uim's fault. Reassigning and merging. * Charles Plessy ([EMAIL PROTECTED]) wrote: Package: uim-xim Version: 1:1.2.1-9 Severity: important Dear uim, nautilus and iceweasel maintainers, I was suffering of iceweasel crashing (#412053) and nautilus refusing the input of tilde characters on the right half of filenames (#422758), and thanks to the sagacity of readers of debian-user-french, I think that found a common denominator: uim-xim. I think that the problem is similar to the following scim bug: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=348893 Basically, strange things happen when inputting non-ASCII characters through uim-xim, especially symbols and accented characters. I checked the behaviour of Nautilus with japanese characters, and it seems that they trigger the same problem as other non-ascii characters. Surprisingly, out of two machines, the bug only affects fresh Etch installs. I figured out that uim-anthy is not called the same way on both systems (I use im-swich). NO CRASH: (upgrade from Sarge) - XIM=uim XIM_PROGRAM=/usr/bin/uim-xim XIM_ARGS= GTK_IM_MODULE=uim ENGINE=anthy if [ -r $HOME/.uim ]; then TMPFILE=$(mktemp) || exit 1 if [ $(grep ; IM-SWITCH VALUE $HOME/.uim) ]; then sed s/(define default-im-name '[^)]*) ; IM-SWITCH VALUE/(define default-im-name '$ENGINE) ; IM-SWITCH VALUE/ $HOME/.uim $TMPFILE else cat $HOME/.uim $TMPFILE if [ $(grep -E ^\(define[[:space:]]+default-im-name[[:space:]] $HOME/.uim) ]; then echo ; (define default-im-name '$ENGINE) ; IM-SWITCH VALUE $TMPFILE else echo (define default-im-name '$ENGINE) ; IM-SWITCH VALUE $TMPFILE fi fi mv $TMPFILE $HOME/.uim else echo (define default-im-name '$ENGINE) ; IM-SWITCH VALUE $HOME/.uim fi CRASHES: (fresh Etch) # UIM with GTK systray indicator XIM=uim XIM_PROGRAM=/usr/bin/uim-xim XIM_ARGS= GTK_IM_MODULE=xim QT_IM_MODULE=xim # It seems to me that the system needs to be initialized. # Folowing trick will wait 10 seconds without slowing down X start up. XIM_PROGRAM_XTRA=(sleep 10; uim-toolbar-gtk-systray) DEPENDS=uim-xim,uim-gtk2.0|uim-qt,uim-anthy|uim-canna|uim-prime|uim-skk|uim-m17nlib -- Eric Dorland [EMAIL PROTECTED] ICQ: #61138586, Jabber: [EMAIL PROTECTED] 1024D/16D970C6 097C 4861 9934 27A0 8E1C 2B0A 61E9 8ECF 16D9 70C6 signature.asc Description: Digital signature
Bug#419757: marked as done (libxml-sax-perl: processing instruction parsing bug breaks XML::Filter::Sort)
Your message dated Mon, 10 Sep 2007 03:17:03 + with message-id [EMAIL PROTECTED] and subject line Bug#419757: fixed in libxml-sax-perl 0.16-0.1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: libxml-filter-sort-perl Version: 1.01-1 Severity: serious Justification: FTBFS on i386, very likely to fail everywhere else Usertags: grid5000 rebuild Hi, During a rebuild of all packages in sid, I discovered that your package failed to build on i386. Relevant parts: DIED. FAILED tests 7, 13 Failed 2/26 tests, 92.31% okay Failed Test Stat Wstat Total Fail Failed List of Failed --- t/1_buffer.t 1 256171 5.88% 14 t/4_workout.t2 512262 7.69% 7 13 t/6_diskworkout.t2 512262 7.69% 7 13 Failed 3/7 test scripts, 57.14% okay. 5/117 subtests failed, 95.73% okay. make[1]: *** [test_dynamic] Error 2 The full build log is available from http://people.debian.org/~lucas/logs/2007/04/rebuild.sid.i386.20070416/ About the archive rebuilt: The rebuilt was done on about 50 AMD64 nodes of the Grid'5000 platform, using a clean chroot containing a sid i386 environment. Internet was not accessible from the build systems. About Grid'5000: Grid'5000 is an highly reconfigurable experimental Grid platform gathering 9 sites and featuring a total of 5000 CPUs. It serves as a testbed for research in Grid Computing. See https://www.grid5000.fr/ -- | Lucas Nussbaum | [EMAIL PROTECTED] http://www.lucas-nussbaum.net/ | | jabber: [EMAIL PROTECTED] GPG: 1024D/023B3F4F | ---End Message--- ---BeginMessage--- Source: libxml-sax-perl Source-Version: 0.16-0.1 We believe that the bug you reported is fixed in the latest version of libxml-sax-perl, which is due to be installed in the Debian FTP archive: libxml-sax-perl_0.16-0.1.diff.gz to pool/main/libx/libxml-sax-perl/libxml-sax-perl_0.16-0.1.diff.gz libxml-sax-perl_0.16-0.1.dsc to pool/main/libx/libxml-sax-perl/libxml-sax-perl_0.16-0.1.dsc libxml-sax-perl_0.16-0.1_all.deb to pool/main/libx/libxml-sax-perl/libxml-sax-perl_0.16-0.1_all.deb libxml-sax-perl_0.16.orig.tar.gz to pool/main/libx/libxml-sax-perl/libxml-sax-perl_0.16.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Robert S. Edmonds [EMAIL PROTECTED] (supplier of updated libxml-sax-perl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 09 Sep 2007 22:20:15 -0400 Source: libxml-sax-perl Binary: libxml-sax-perl Architecture: source all Version: 0.16-0.1 Distribution: unstable Urgency: low Maintainer: Jay Bonci [EMAIL PROTECTED] Changed-By: Robert S. Edmonds [EMAIL PROTECTED] Description: libxml-sax-perl - Perl module for using and building Perl SAX2 XML processors Closes: 405186 419757 Changes: libxml-sax-perl (0.16-0.1) unstable; urgency=low . * Non-maintainer upload. * New upstream release 0.16: - Fixes PI parsing bug; closes: #419757. * Apply patch from CPAN RT#26588; closes: #405186. Files: 6b2a82260b1fc1aee032a8ed19f39d7d 648 perl optional libxml-sax-perl_0.16-0.1.dsc 4b07b6a9884f772ee07139b385661e9d 59425 perl optional libxml-sax-perl_0.16.orig.tar.gz 8631ec587b51a0ed4b76122497e4f419 18979 perl optional libxml-sax-perl_0.16-0.1.diff.gz ea989315e184d062f7e08c18592baa3b 79524 perl optional libxml-sax-perl_0.16-0.1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFG5LDxdp+/SHMBQJERAsGFAJ9jz0fAwn2aPFDR2z8OfaLQbM5fxACdFo5E wRnnt3JmZmJOsdXbP0z3DFw= =s5Sr -END PGP SIGNATURE- ---End Message---
Processed: reassign 412053 to uim, forcibly merging 426221 412053
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.10.7 reassign 412053 uim Bug#412053: iceweasel: freezes while inputting something in search toolbox Bug reassigned from package `iceweasel' to `uim'. forcemerge 426221 412053 Bug#426221: uim vs. Firefox Bug#412053: iceweasel: freezes while inputting something in search toolbox Forcibly Merged 412053 426221. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#405186: marked as done (docbook2x: FTBFS: reference to nonexistent nodes)
Your message dated Mon, 10 Sep 2007 03:17:03 + with message-id [EMAIL PROTECTED] and subject line Bug#405186: fixed in libxml-sax-perl 0.16-0.1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: docbook2x Version: 0.8.3-1 Severity: serious Hello, There was a problem while autobuilding your package: Automatic build of docbook2x_0.8.3-1 on nasya by sbuild/sparc 0.50 Build started at 20070101-0136 ** ... checking for getline... yes configure: creating ./config.status config.status: creating Makefile config.status: creating charmaps/Makefile config.status: creating xslt/Makefile config.status: creating xslt/common/Makefile config.status: creating xslt/common/text/Makefile config.status: creating xslt/man/Makefile config.status: creating xslt/texi/Makefile config.status: creating xslt/documentation/Makefile config.status: creating perl/Makefile config.status: creating libxslt/Makefile config.status: creating utf8trans/Makefile config.status: creating doc/Makefile config.status: creating test/Makefile config.status: creating test/refentry/Makefile config.status: creating test/complete-manuals/Makefile config.status: creating test/utf8trans/Makefile config.status: creating libxslt/config.h config.status: executing default-1 commands /usr/bin/make -C . make[1]: Entering directory `/build/buildd/docbook2x-0.8.3' Making all in . make[2]: Entering directory `/build/buildd/docbook2x-0.8.3' make[2]: Nothing to be done for `all-am'. make[2]: Leaving directory `/build/buildd/docbook2x-0.8.3' Making all in charmaps make[2]: Entering directory `/build/buildd/docbook2x-0.8.3/charmaps' make[2]: Nothing to be done for `all'. make[2]: Leaving directory `/build/buildd/docbook2x-0.8.3/charmaps' Making all in perl make[2]: Entering directory `/build/buildd/docbook2x-0.8.3/perl' echo '#!/usr/bin/perl' config.pl echo \$DEFAULT_UTF8TRANS_PROGRAM = q/usr/bin/`echo utf8trans | sed 's,x,x,'`; config.pl echo '$DEFAULT_UTF8TRANS_ROFFMAP = q/usr/share/docbook2X/charmaps/roff.charmap;' config.pl echo '$DEFAULT_UTF8TRANS_TEXIMAP = q/usr/share/docbook2X/charmaps/texi.charmap;' config.pl echo '$DEFAULT_ICONV_PROGRAM = q/usr/bin/iconv;' config.pl echo '$DOCBOOK2X_VERSION = q0.8.3;' config.pl echo \$DEFAULT_DB2X_XSLTPROC_PROGRAM = q/usr/bin/`echo db2x_xsltproc | sed 's,x,x,'`; config.pl echo \$DEFAULT_DB2X_MANXML_PROGRAM = q/usr/bin/`echo db2x_manxml | sed 's,x,x,'`; config.pl echo \$DEFAULT_DB2X_TEXIXML_PROGRAM = q/usr/bin/`echo db2x_texixml | sed 's,x,x,'`; config.pl echo '' config.pl rm -f db2x_manxml cat config.pl db2x_manxml.pl db2x_manxml chmod 555 db2x_manxml /usr/bin/perl -I../perl -c -w db2x_manxml db2x_manxml syntax OK rm -f db2x_texixml cat config.pl db2x_texixml.pl db2x_texixml chmod 555 db2x_texixml /usr/bin/perl -I../perl -c -w db2x_texixml db2x_texixml syntax OK rm -f docbook2man (cat config.pl ; echo '$CONVERSION_TYPE = qman;'; cat ./docbook2X.pl) docbook2man chmod 555 docbook2man /usr/bin/perl -I../perl -c -w docbook2man docbook2man syntax OK rm -f docbook2texi (cat config.pl ; echo '$CONVERSION_TYPE = qtexi;'; cat ./docbook2X.pl) docbook2texi chmod 555 docbook2texi /usr/bin/perl -I../perl -c -w docbook2texi docbook2texi syntax OK make[2]: Leaving directory `/build/buildd/docbook2x-0.8.3/perl' Making all in utf8trans make[2]: Entering directory `/build/buildd/docbook2x-0.8.3/utf8trans' cc -DHAVE_CONFIG_H -I. -I. -I../libxslt -g -Wall -O2 -Wall -c utf8trans.c cc -DHAVE_CONFIG_H -I. -I. -I../libxslt -g -Wall -O2 -Wall -c mtable.c cc -DHAVE_CONFIG_H -I. -I. -I../libxslt -g -Wall -O2 -Wall -c strings_buffer.c cc -g -Wall -O2 -Wall -o utf8trans utf8trans.o mtable.o strings_buffer.o make[2]: Leaving directory `/build/buildd/docbook2x-0.8.3/utf8trans' Making all in libxslt make[2]: Entering directory `/build/buildd/docbook2x-0.8.3/libxslt' cc -DHAVE_CONFIG_H -I. -I. -I. -I/usr/include/libxml2-g -Wall -O2 -Wall -c main.c In file included from main.c:40: /usr/include/libxml2/libxml/DOCBparser.h:22:2: warning: #warning The DOCBparser module has been deprecated in libxml2-2.6.0 main.c: In function 'parse_options': main.c:429: warning: pointer targets in passing argument 1 of 'xmlStrlen' differ in signedness main.c:430: warning: pointer targets in passing argument 1 of 'xmlStrchr' differ in signedness main.c:431: warning: pointer targets in passing
Bug#427309: marked as forwarded (sqlfairy: FTBFS: tests failed)
Your message dated Sun, 9 Sep 2007 23:23:19 -0400 with message-id [EMAIL PROTECTED] has caused the Debian Bug report #427309, regarding sqlfairy: FTBFS: tests failed to be marked as having been forwarded to the upstream software author(s) [EMAIL PROTECTED] (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Hello, I package sqlfairy in Debian and we've come across an error in the tests run at build time. The full gory details are below. PS Please preserve the Cc line when replying to this bug. -- Eric Dorland [EMAIL PROTECTED] ICQ: #61138586, Jabber: [EMAIL PROTECTED] 1024D/16D970C6 097C 4861 9934 27A0 8E1C 2B0A 61E9 8ECF 16D9 70C6 ---BeginMessage--- Package: sqlfairy version: 0.08-1 Severity: serious Justification: FTBFS on i386 Hi, During a rebuild of all packages in sid, your package failed to build on i386. Relevant part: /usr/bin/perl Build --makefile_env_macros 1 test t/02mysql-parser...ok t/03mysql-to-oracleok t/04file,fh,string.ok t/05bgep-reok t/06xsvskipped all skipped: Missing dependency: Text::RecordParser t/07p_args.ok t/08postgres-to-mysql..ok t/09sqlt-diagram...ok t/10excel..ok t/11normalize..ok t/12header_comment.ok t/13schema.ok t/14postgres-parserok t/15oracle-parser..ok t/16xml-parser.ok t/17sqlfxml-producer...ok t/18ttschema-producer.. # Failed test 'Output looks right' # in t/18ttschema-producer.t at line 57. # ++-++ # | Ln|Got |Expected | # ++-++ # | 147|Constraints |Constraints | # | 148|?|? | # | 149|type: PRIMARY KEY|type: PRIMARY KEY | # * 150|fields:\s\s\s\s\s\s\s\s\s\s\s\n |fields: id\n * # | 151|expression: |expression: | # | 152|match_type: |match_type: | # | 153|reference_fields:|reference_fields: | # ++-++ # | 160| | | # | 161|emailuniqueindex |emailuniqueindex | # | 162|type: UNIQUE |type: UNIQUE| # * 163|fields:\s\s\s\s\s\s\s\s\s\s\s\n |fields: email\n * # | 164|expression: |expression: | # | 165|match_type: |match_type: | # | 166|reference_fields:|reference_fields: | # ++-++ # | 173| | | # | 174|?|? | # | 175|type: FOREIGN KEY|type: FOREIGN KEY | # * 176|fields:\s\s\s\s\s\s\s\s\s\s\s\n |fields: another_id\n * # | 177|expression: |expression: | # | 178|match_type: |match_type: | # * 179|reference_fields:\s\n|reference_fields: id\n * # | 180|reference_table: Another|reference_table: Another | # | 181|deferrable: 1 |deferrable: 1 | # | 182|on_delete: |on_delete: | # ++-++ # | 208|Constraints |Constraints | # | 209|?|? | # | 210|type: PRIMARY KEY|type: PRIMARY KEY | # * 211|fields:\s\s\s\s\s\s\s\s\s\s\s\n |fields: id\n * # | 212|expression: |
Bug#432893: apt-get
If someone can reproduce this without using apt-get, please report. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: severity of 441275 is grave
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.10.7 # Makes the package entirely non-functional with new kernels severity 441275 grave Bug#441275: ivtv-source: ivtv-fb and the X driver ivtvdev don't work any more Severity set to `grave' from `important' End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#432893: Policy violation
Le jeudi 30 août 2007 03:18, vous avez écrit : There are more reasons than policy violations for a bug to be RC. But the behaviour of dpkg is even documented in policy, so I suggest you read policy again. Re-reading policy takes some time...which section of policy is violated here?
Bug#424478: marked as done (opreport says binaries not in usable format (please schedule binNMU of oprofile on every arch))
Your message dated Mon, 10 Sep 2007 04:47:02 + with message-id [EMAIL PROTECTED] and subject line Bug#424478: fixed in oprofile 0.9.3-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: oprofile Severity: important On Sun, May 13, 2007 at 03:23:46PM +0200, Pierre Habouzit wrote: The move of the toolchain to GNU_HASH style broke opreport and friends. A simple rebuild is enough to make it support the new way. Binutils are now able (with the last gcc as well) to produce binaries using --hash-style=gnu. The current oprofile does not understand such binaries yet, and needs a rebuild to do so (it's sufficient). Though, Steve thinks (and I agree) that it would be better to make a new sourceful upload with a version depends upon binutils, version 2.17cvs20070426-6 should do. Cheers, -- ·O· Pierre Habouzit ··O[EMAIL PROTECTED] OOOhttp://www.madism.org pgpy9sh0hqpeO.pgp Description: PGP signature ---End Message--- ---BeginMessage--- Source: oprofile Source-Version: 0.9.3-1 We believe that the bug you reported is fixed in the latest version of oprofile, which is due to be installed in the Debian FTP archive: oprofile-gui_0.9.3-1_i386.deb to pool/main/o/oprofile/oprofile-gui_0.9.3-1_i386.deb oprofile_0.9.3-1.dsc to pool/main/o/oprofile/oprofile_0.9.3-1.dsc oprofile_0.9.3-1.tar.gz to pool/main/o/oprofile/oprofile_0.9.3-1.tar.gz oprofile_0.9.3-1_i386.deb to pool/main/o/oprofile/oprofile_0.9.3-1_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Al Stone [EMAIL PROTECTED] (supplier of updated oprofile package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 09 Sep 2007 18:40:25 -0600 Source: oprofile Binary: oprofile oprofile-gui Architecture: source i386 Version: 0.9.3-1 Distribution: unstable Urgency: low Maintainer: Al Stone [EMAIL PROTECTED] Changed-By: Al Stone [EMAIL PROTECTED] Description: oprofile - system-wide profiler for Linux systems oprofile-gui - system-wide profiler for Linux systems (GUI components) Closes: 417472 424478 434003 436697 Changes: oprofile (0.9.3-1) unstable; urgency=low . * Update to latest upstream. * Convert packaging so that it now uses quilt * Remove invocation of autogen.sh -- no longer necessary to do this * Closes: bug#417472 -- should no longer FTBS with g++ 4.3 * Closes: bug#424478 -- acknowledge NMU * Closes: bug#434003 -- new upstream, armel support * Closes: bug#436697 -- simplified packaging as suggested Files: 7aea479437fb9a19f26284e05b46de80 685 devel optional oprofile_0.9.3-1.dsc 385eb1c8f4372b8a5deb901d27084ccc 2683664 devel optional oprofile_0.9.3-1.tar.gz a3c89b9dcadc4c7f8b3a4c49d5e27a8e 1296092 devel optional oprofile_0.9.3-1_i386.deb fd382ef1173c68d5c1e9713d1732e53d 90954 devel optional oprofile-gui_0.9.3-1_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFG5Mh1so6+T7qY4V0RAsQ7AJ9LDsDGqeMcBKAKgJU1gmoZsQrc9gCfaOdI +ABZixLvJiggpeoAVQh+aQw= =vQv1 -END PGP SIGNATURE- ---End Message---