Bug#492282: "seahorse-agent --execute" leaks file descriptors

2008-07-26 Thread Josselin Mouette
clone 492282 -1
severity -1 normal
tag -1 - security
retitle -1 gpgme leaves unused open file descriptors
reassign -1 libgpgme11
tag 492282 + pending
thanks

Le jeudi 24 juillet 2008 à 22:56 +0200, Stefan Fritsch a écrit :
> Seahorse leaks file descriptors to processes started with "seahorse-agent
> --execute", including the gpg agent listening socket. For the default setup,
> this means that all processes started from the desktop inherit those FDs and 
> can
> possibly use them. This can be a security issue because the FDs are also
> inherited to processes started with su as a different user which normally 
> would
> not have access to gpg key and gpg agent socket.
> 
> Seahorse should use fcntl to set FD_CLOEXEC on its FDs.

I’ve patched seahorse in our svn to set FD_CLOEXEC on the agent socket.
Other open fds seem to be pipes opened by gpgme to talk to gpg that are
not closed after use. AIUI this is not a security issue.

Cheers,
-- 
 .''`.
: :' :  We are debian.org. Lower your prices, surrender your code.
`. `'   We will add your hardware and software distinctiveness to
  `-our own. Resistance is futile.


signature.asc
Description: Ceci est une partie de message	numériquement signée


Processed: Re: Bug#492282: "seahorse-agent --execute" leaks file descriptors

2008-07-26 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> clone 492282 -1
Bug#492282: "seahorse-agent --execute" leaks file descriptors
Bug 492282 cloned as bug 492551.

> severity -1 normal
Bug#492551: "seahorse-agent --execute" leaks file descriptors
Severity set to `normal' from `serious'

> tag -1 - security
Bug#492551: "seahorse-agent --execute" leaks file descriptors
Tags were: security
Tags removed: security

> retitle -1 gpgme leaves unused open file descriptors
Bug#492551: "seahorse-agent --execute" leaks file descriptors
Changed Bug title to `gpgme leaves unused open file descriptors' from 
`"seahorse-agent --execute" leaks file descriptors'.

> reassign -1 libgpgme11
Bug#492551: gpgme leaves unused open file descriptors
Bug reassigned from package `seahorse' to `libgpgme11'.

> tag 492282 + pending
Bug#492282: "seahorse-agent --execute" leaks file descriptors
Tags were: security
Tags added: pending

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492469: marked as done (hugin 0.7.x requires make (even for invoking nona) but does not depend on it)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sun, 27 Jul 2008 04:47:03 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#492469: fixed in hugin 0.7.0~svn3191+beta5-1
has caused the Debian Bug report #492469,
regarding hugin 0.7.x requires make (even for invoking nona) but does not 
depend on it
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
492469: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492469
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: hugin
Version: 0.7.0~svn3191-1
Severity: serious
Justification: Policy 3.5

hugin (the graphical frontend at least) now requires make for aligning
and stitching. Using the "Stitch Now" button for regular stitching (no
HDR) without make installed results in

| execvp(make, -f, /tmp/huginmk_bUjuKS, all, clean) failed with error 2!

before running nona.

This is also documented on http://hugin.sourceforge.net/download/:
| make. hugin-0.7.0 or later uses GNU 'make' to oversee the
| stitching process, i.e. 'make' is required to run hugin as well as
| build it.

cu andreas
-- 
`What a good friend you are to him, Dr. Maturin. His other friends are
so grateful to you.'
`I sew his ears on from time to time, sure'


--- End Message ---
--- Begin Message ---
Source: hugin
Source-Version: 0.7.0~svn3191+beta5-1

We believe that the bug you reported is fixed in the latest version of
hugin, which is due to be installed in the Debian FTP archive:

hugin-data_0.7.0~svn3191+beta5-1_all.deb
  to pool/main/h/hugin/hugin-data_0.7.0~svn3191+beta5-1_all.deb
hugin-tools_0.7.0~svn3191+beta5-1_i386.deb
  to pool/main/h/hugin/hugin-tools_0.7.0~svn3191+beta5-1_i386.deb
hugin_0.7.0~svn3191+beta5-1.diff.gz
  to pool/main/h/hugin/hugin_0.7.0~svn3191+beta5-1.diff.gz
hugin_0.7.0~svn3191+beta5-1.dsc
  to pool/main/h/hugin/hugin_0.7.0~svn3191+beta5-1.dsc
hugin_0.7.0~svn3191+beta5-1_i386.deb
  to pool/main/h/hugin/hugin_0.7.0~svn3191+beta5-1_i386.deb
hugin_0.7.0~svn3191+beta5.orig.tar.gz
  to pool/main/h/hugin/hugin_0.7.0~svn3191+beta5.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Cyril Brulebois <[EMAIL PROTECTED]> (supplier of updated hugin package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sun, 27 Jul 2008 05:40:02 +0200
Source: hugin
Binary: hugin hugin-tools hugin-data
Architecture: source i386 all
Version: 0.7.0~svn3191+beta5-1
Distribution: unstable
Urgency: low
Maintainer: Debian PhotoTools Maintainers <[EMAIL PROTECTED]>
Changed-By: Cyril Brulebois <[EMAIL PROTECTED]>
Description: 
 hugin  - GUI tools for Hugin
 hugin-data - data files for Hugin
 hugin-tools - CLI tools for Hugin
Closes: 394647 491227 491335 491539 491562 492469
Changes: 
 hugin (0.7.0~svn3191+beta5-1) unstable; urgency=low
 .
   * New upstream release candidate: 0.7.0_beta5. The exact revision wasn't
 specified but that's mostly the same as svn r3191.
   * Adjust dependencies, thanks to several reporters, and especially to
 Andreas Metzler for the checks on enblend and the pointers:
  - Add make to hugin's Depends (Closes: #492469).
  - Move enblend from hugin-tools's Recommends to hugin's Depends, as
it is now a requirement (Closes: #394647, #491539).
  - Also add libimage-exiftool-perl since upstream specifies that the
the exiftool binary (from the Image::ExifTool Perl module) is
needed.
  - Version the Build-Depends on libexiv2-dev: “>= 0.12”. With former
versions, an FTBFS is triggered due to undefined references to
Jpeg-related functions (Closes: #491335).
   * Add autopano-sift-c as alternative to autopano-sift to the suggested
 packages. As a reminder, patent issues prevent the inclusion of those
 packages in Debian.
   * Fix manpage mismatch: /usr/bin/autooptimizer versus autooptimizer(1),
 (spotted by Julien Valroff, thanks):
  - debian/rules: Copy generated doc/autooptimizer.1 into
doc/autooptimiser.1, and remember it for cleanup.
  - debian/hugin-tools.manpages: Replace the z version with the s one.
   * Disable enblend compression, since Debian has enblend 3.0 for now and
 this option would require enblend 3.1 or 

Bug#492530: marked as done (jbidwatcher: is this DFSG compatible ?)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sun, 27 Jul 2008 06:51:38 +0200
with message-id <[EMAIL PROTECTED]>
and subject line Re: Bug#492530: jbidwatcher: is this DFSG compatible ?
has caused the Debian Bug report #492530,
regarding jbidwatcher: is this DFSG compatible ?
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
492530: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492530
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: jbidwatcher
Severity: serious
Justification: Policy 2.2.2

Hi,

while searching for an ebay tool, I found that :

http://www.jbidwatcher.com/commercial_resale.shtml

Doesn't that make jbidwatcher non-free ?

Thanks,
-- 
Rémi

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.25-2-686 (SMP w/2 CPU cores)
Locale: LANG=fr_BE.UTF-8, LC_CTYPE=fr_BE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash


--- End Message ---
--- Begin Message ---
Le Saturday 26 July 2008 23:53:06 Rémi Letot, vous avez écrit :
> while searching for an ebay tool, I found that :
>
> http://www.jbidwatcher.com/commercial_resale.shtml
>
> Doesn't that make jbidwatcher non-free ?

Hi !

I don't think so:
"As several people have asked, this isn't an addendum to the license"


Romain
-- 
Everyday is just a holiday, 
I don't care what the crowd may say. 
I live the life I love with you, 
Having fun while they are feeling blue.

--- End Message ---


Bug#492389: marked as done ([kcheckgmail] fails to login, Gmail's loging procedure has changed)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 23:07:14 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#492389: fixed in kcheckgmail 0.5.7.5-1
has caused the Debian Bug report #492389,
regarding [kcheckgmail] fails to login, Gmail's loging procedure has changed
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
492389: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492389
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: kcheckgmail
Version: 0.5.7.4-1
Severity: grave


I've tried on a couple of different machines now, one that uses kcheckgmail
compiled from source, the other is using the Debian package, and both fail to
login saying that the login procedure has changed.

Thanks,
Cameron



--- System information. ---
Architecture: amd64
Kernel:   Linux 2.6.25-2-amd64

Debian Release: lenny/sid
  990 unstablesteveholt.hopto.org
  990 unstablelocalhost
  990 unstabledebian.camrdale.org
  500 testing debian.camrdale.org
  500 stable  debian.camrdale.org
1 experimentalftp.us.debian.org

--- Package information. ---
Depends  (Version) | Installed
==-+-===
kdebase-bin   (>= 3.2) | 4:3.5.9.dfsg.1-4
kdelibs4c2a (>= 4:3.5.8-1) | 4:3.5.9.dfsg.1-6
libc6   (>= 2.7-1) | 2.7-12
libgcc1   (>= 1:4.2.1) | 1:4.3.1-6
libqt3-mt (>= 3:3.3.7) | 3:3.3.8b-5
libstdc++6  (>= 4.2.1) | 4.3.1-6



--- End Message ---
--- Begin Message ---
Source: kcheckgmail
Source-Version: 0.5.7.5-1
 
 We believe that the bug you reported is fixed in the latest version of
 kcheckgmail, which is due to be installed in the Debian FTP archive:
 
 kcheckgmail_0.5.7.5-1.diff.gz
  to pool/main/k/kcheckgmail/kcheckgmail_0.5.7.5-1.diff.gz
 kcheckgmail_0.5.7.5-1.dsc
  to pool/main/k/kcheckgmail/kcheckgmail_0.5.7.5-1.dsc
 kcheckgmail_0.5.7.5-1_amd64.deb
  to pool/main/k/kcheckgmail/kcheckgmail_0.5.7.5-1_amd64.deb
 kcheckgmail_0.5.7.5.orig.tar.gz
  to pool/main/k/kcheckgmail/kcheckgmail_0.5.7.5.orig.tar.gz
 
 
 
 A summary of the changes between this version and the previous one is
 attached.
 
 Thank you for reporting the bug, which will now be closed.  If you
 have further comments please address them to [EMAIL PROTECTED],
 and the maintainer will reopen the bug report if appropriate.
 
 Debian distribution maintenance software
 pp.
 Raphael Geissert <[EMAIL PROTECTED]> (supplier of updated kcheckgmail package)
 
 (This message was generated automatically at their request; if you
 believe that there is a problem with it please contact the archive
 administrators by mailing [EMAIL PROTECTED])
 
 
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 Format: 1.8
 Date: Sat, 26 Jul 2008 19:25:51 -0500
 Source: kcheckgmail
 Binary: kcheckgmail
 Architecture: source amd64
 Version: 0.5.7.5-1
 Distribution: unstable
 Urgency: high
 Maintainer: Debian KDE Extras Team <[EMAIL PROTECTED]>
 Changed-By: Raphael Geissert <[EMAIL PROTECTED]>
 Description:
  kcheckgmail - A Gmail notifier-like notifier for KDE
 Closes: 460478
 Changes:
  kcheckgmail (0.5.7.5-1) unstable; urgency=high
  .
   * New upstream release
 - Fix the redirection detection routine to fix issues at log in time
   hence the urgency
 - Add support for \xXX in convertEntities
 - Backport minimised memory leak fix
 - Backport fix for GAP4D login
 - French translation bug fixed (MailArrived notification)
 - Really build and install the Walloon translation
 - Added Czech translation, thanks to Jirka Vilim
   * debian/README.Debian: useless file gone
   * debian/control:
 + Update the Vcs- headers to reflect new location
 + Change maintainer to Debian KDE Extras Team and add myself as uploader
 + Remove Jose Luis Tallon from uploaders: thanks for all your work!
 + Remove useless dependency on kdebase-bin (Closes: #460478)
 + Bump standards version to 3.8.0, no changes needed
   * debian/docs: don't install the useless TODO file
   * debian/dirs: useless file gone
   * debian/compat: bump to 5
   * debian/rules: rewritten, using cdbs now
 Checksums-Sha1:
  2788eb0bcde6b6f38dad229963133e1e07f44255 1355 kcheckgmail_0.5.7.5-1.dsc
  0074f1d69c9c84ce0238630beb3a84258d8196b5 704116 
kcheckgmail_0.5.7.5.orig.tar.gz
  0bb2f1d33bb743c52bfc2a2bd45be4c8dde83eb8 3404 kcheckgmail_0.5.7.5-1.diff.gz
  a3c0b3112a28985a081a5cc0be6a9b372b414d5e 178444 
kcheckgmail_0.5.7.5-1_amd64.deb
 Checksums-Sha256:
  8f5e1f47249104781b7131b05c9d0dcabbbc1e6b0b76a2c0df4d97b12b76ceb3 1355 
kcheckgmail_0.5.7.5-1.dsc
  a261

Bug#492483: marked as done (pcx_1.1.18-1(hppa/unstable): FTBFS: build depends on g77)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 22:54:42 -0400
with message-id <[EMAIL PROTECTED]>
and subject line g77 dependency
has caused the Debian Bug report #492483,
regarding pcx_1.1.18-1(hppa/unstable): FTBFS: build depends on g77
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
492483: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492483
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: pcx
Version: 1.1.18-1
Severity: serious

Hi,

your package failed to build from source.

| Automatic build of pcx_1.1.18-1 on lofn by sbuild/hppa 98-farm
| Build started at 20080726-1404
| **
| Checking available source versions...
| Fetching source files...
| Reading package lists...
| Building dependency tree...
| Need to get 465kB of source archives.
| Get:1 http://sinclair.farm.ftbfs.de sid/non-free pcx 1.1.18-1 (dsc) [1090B]
| Get:2 http://sinclair.farm.ftbfs.de sid/non-free pcx 1.1.18-1 (tar) [450kB]
| Get:3 http://sinclair.farm.ftbfs.de sid/non-free pcx 1.1.18-1 (diff) [14.3kB]
| Fetched 465kB in 0s (802kB/s)
| Download complete and in download only mode
| ** Using build dependencies supplied by package:
| Build-Depends: debhelper (>= 4.0), csh | c-shell, g77
| Checking for already installed source dependencies...
| debhelper: missing
| Using default version 7.0.16 (Priority: 500)
| csh: missing
| Using default version 20070713-1 (Priority: 500)
| c-shell: missing
| No default version. Virtual package?
| g77: missing
| No default version. Virtual package?
| Checking for source dependency conflicts...
|   /usr/bin/sudo /usr/bin/apt-get --purge $CHROOT_OPTIONS -q -y install 
debhelper csh g77
| Reading package lists...
| Building dependency tree...
| E: Package g77 has no installation candidate
| Package g77 is not available, but is referred to by another package.
| This may mean that the package is missing, has been obsoleted, or
| is only available from another source
| apt-get failed.
| Package installation failed
| Trying to reinstall removed packages:
| Trying to uninstall newly installed packages:
| Source-dependencies not satisfied; skipping pcx
| **
| Finished at 20080726-1404
| Build needed 00:00:00, 0k disk space

Full build log(s): 
http://experimental.ftbfs.de/build.php?&ver=1.1.18-1&pkg=pcx&arch=hppa

Gruesse,
-- 
Frank Lichtenheld <[EMAIL PROTECTED]>
www: http://www.djpig.de/


--- End Message ---
--- Begin Message ---

build-depends entry fixed in 1.1.18-2, per following entry in
debian/changelog (though the version uploaded neglected the "closes"
note):

pcx (1.1.18-2) unstable; urgency=low

  * debian/control: build-depends on gfortran instead of g77
(closes:Bug#492483)

 -- James R. Van Zandt <[EMAIL PROTECTED]>  Sat, 26 Jul 2008 22:38:52 -0400


--- End Message ---


Bug#490217: Revised Etch Debdiff

2008-07-26 Thread Scott Kitterman

diff -u python-dns-2.3.0/debian/changelog python-dns-2.3.0/debian/changelog
--- python-dns-2.3.0/debian/changelog
+++ python-dns-2.3.0/debian/changelog
@@ -1,3 +1,11 @@
+python-dns (2.3.0-5.2) stable-security; urgency=high
+
+  * SECURITY UPDATE: Modify DNS/Base.py to randomize both Transaction ID
+(TID) and source port (Closes: #490217)
+- CVE-2008-1447 DNS source port guessable
+
+ -- Scott Kitterman <[EMAIL PROTECTED]>  Sat, 26 Jul 2008 21:46:00 -0400
+
 python-dns (2.3.0-5.1) unstable; urgency=low
 
   * Non-maintainer upload.
only in patch2:
unchanged:
--- python-dns-2.3.0.orig/DNS/Base.py
+++ python-dns-2.3.0/DNS/Base.py
@@ -12,6 +12,11 @@
 import socket, string, types, time
 import Type,Class,Opcode
 import asyncore
+try:
+  from random import SystemRandom
+  random = SystemRandom()
+except:
+  import random
 
 class DNSError(Exception): pass
 
@@ -58,6 +63,7 @@
 self.defaults = {}
 self.argparse(name,args)
 self.defaults = self.args
+self.tid = 0
 
 def argparse(self,name,args):
 if not name and self.defaults.has_key('name'):
@@ -87,7 +93,7 @@
 r,w,e = select.select([self.s],[],[],self.args['timeout'])
 if not len(r):
 raise DNSError, 'Timeout'
-self.reply = self.s.recv(1024)
+(self.reply, self.from_address) = self.s.recvfrom(65535)
 self.time_finish=time.time()
 self.args['server']=self.ns
 return self.processReply()
@@ -133,7 +139,21 @@
 #u = Lib.Munpacker(reply)
 #Lib.dumpM(u)
 
+def getSource(self):
+# Get random source port to avoid DNS cache poisoning attack.
+try:
+source = random.randint(1024,65535)
+self.s.bind(('', source))
+except socket.error, msg: 
+# Error 98, 'Address already in use'
+if msg[0] == 98:
+self.getSource()
+else:
+raise
+
 def conn(self):
+# Source is source port we'll take a reply from.
+self.getSource()
 self.s.connect((self.ns,self.port))
 
 def req(self,*name,**args):
@@ -144,6 +164,7 @@
 #raise DNSError,'reinitialize request before reuse'
 protocol = self.args['protocol']
 self.port = self.args['port']
+self.tid = random.randint(0,65535)
 opcode = self.args['opcode']
 rd = self.args['rd']
 server=self.args['server']
@@ -164,7 +185,7 @@
 #print 'QTYPE %d(%s)' % (qtype, Type.typestr(qtype))
 m = Lib.Mpacker()
 # jesus. keywords and default args would be good. TODO.
-m.addHeader(0,
+m.addHeader(self.tid,
   0, opcode, 0, 0, rd, 0, 0, 0,
   1, 0, 0, 0)
 m.addQuestion(qname, qtype, Class.IN)
@@ -184,34 +205,52 @@
 self.socketInit(socket.AF_INET, socket.SOCK_DGRAM)
 for self.ns in server:
 try:
-# TODO. Handle timeouts &c correctly (RFC)
-#self.s.connect((self.ns, self.port))
-self.conn()
-self.time_start=time.time()
-if not self.async:
-self.s.send(self.request)
-self.response=self.processUDPReply()
-#except socket.error:
-except None:
-continue
+try:
+# TODO. Handle timeouts &c correctly (RFC)
+#self.s.connect((self.ns, self.port))
+self.conn()
+self.s.setblocking(0)
+self.time_start=time.time()
+if not self.async:
+self.s.send(self.request)
+r=self.processUDPReply()
+# Since we bind to the source port, we don't need to check that
+# here, but do make sure it's actually a DNS request that the packet
+# is in reply to.
+while r.header['id'] != self.tid or self.from_address[1] != 53:
+  r=self.processUDPReply()
+self.response = r
+# FIXME: check waiting async queries
+#except socket.error:
+except None:
+continue
+finally:
+self.s.close()
 break
 if not self.response:
 if not self.async:
-raise DNSError,'no working nameservers found'
+raise DNSError,('no working nameservers found')
 
 def sendTCPRequest(self, server):
 " do the work of sending a TCP request "
 self.response=None
 for self.ns in server:
 try:
-self.socketInit(socket.AF_INET, socket.SOCK_STREAM)
-self.time_start=time.time()
-self.conn()
-self.s.send(Lib.pack16bit(len(self.request))+self.request

Bug#492539: Egg cannot connect to jserver if egg is running on an amd64 system.

2008-07-26 Thread kumon
Package: egg
Version: 4.0.6+0.20041122cvs-11
Severity: grave
Justification: renders package unusable

Egg doesn't work on amd64 system.

I shortly investigate and found the following facts:

"wnn-open" fails because "wnnrpc-open" fails.

"wnnrpc-open" should try several protocols with the server for
negotiation, but actually it tries only Wnn8 then fails.

I don't investigate the details but, at least, "wnnrpc-get-result" has
bug.

The following code shows the problem:

(defmacro wnnrpc-get-result (&rest body)
  `(let (result)
 (comm-unpack (u) result)
 (if (< result 0)
   (progn
 (comm-unpack (u) result)
 (- result))
 ,@(or body '(result)

"comm-unpack" converts the contents of the communication buffer to the
lisp objects. In this case, "u" conversion means 32bit unsigned
integer. Thus it never becomes negative, but the code expected that.


If the system is 32bit integer, the number may become negative, but
amd64 has longer width, perhaps this may cause the problems.



-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.24-1-amd64
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages egg depends on:
ii  emacs21   21.4a+1-3etch1 The GNU Emacs editor
ii  emacs22   22.2+2-3   The GNU Emacs editor
ii  make  3.81-2 The GNU version of the "make" util

egg recommends no packages.

-- no debconf information

--
K.Kumon




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#453337: marked as done (ktranslator: Failes to load different kinds of dictionaries)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sun, 27 Jul 2008 00:32:03 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#453337: fixed in ktranslator 0.4-2
has caused the Debian Bug report #453337,
regarding ktranslator: Failes to load different kinds of dictionaries
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
453337: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=453337
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: ktranslator
Version: 0.4-1
Severity: important


Whatever dictionaries I try to load, all fail to be loaded into
KTranslator.

Dictionaries I tried:

* German-English Freedict dictionary [1], plain text dict referenced from the
  projects website (unzipped)
* HanDeDict [2], Sdictionary dict from the Sdict community website
* Babylon English to Frech dictionary [3], babylon dict referenced from the
  projects website (unzipped)
* cedict-gb dictionary(zh_CN - en) [4], stardict from the stardict website
(unzipped, used .ifo)

[1] http://ktranslator.sourceforge.net/freedict-deu-eng.dic.gz
[2] http://sdict.com/en/view.php?file=chinese-german.dct
[3] ftp://ftp.ac-grenoble.fr/ge/languages/babylon_dict/EngtoFre.dic.gz
[4] http://stardict.sourceforge.net/Dictionaries_zh_CN.php

Output on the command line (e.g.):

ktranslator: ktranslator::ktranslator()
ktranslator: ktranslatorDock::ktranslatorDock()
ktranslator: Dictionaries (freedict en_de)
ktranslator: Dictionary freedict en_de
ktranslator: Failed to load freedict en_de
ktranslator: ktranslatorDock::mousePressEvent()

The config later on includes the dict entry but it's not shown in the app's
config dialog.

Up to now I couldn't load any dictionary into KTranslator.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.16 (PREEMPT)
Locale: [EMAIL PROTECTED], LC_CTYPE=zh_CN.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages ktranslator depends on:
ii  kdelibs4c2a 4:3.5.8.dfsg.1-4 core libraries and binaries for al
ii  libacl1 2.2.45-1 Access control list shared library
ii  libart-2.0-22.3.19-3 Library of functions for 2D graphi
ii  libattr11:2.4.39-1   Extended attribute shared library
ii  libaudio2   1.9.1-1  Network Audio System - shared libr
ii  libc6   2.7-2GNU C Library: Shared libraries
ii  libfam0 2.7.0-13 Client library to control the FAM 
ii  libfontconfig1  2.5.0-2  generic font configuration library
ii  libfreetype62.3.5-1+b1   FreeType 2 font engine, shared lib
ii  libgcc1 1:4.2.2-4GCC support library
ii  libice6 2:1.0.4-1X11 Inter-Client Exchange library
ii  libidn111.1-1GNU libidn library, implementation
ii  libjpeg62   6b-14The Independent JPEG Group's JPEG 
ii  libpng12-0  1.2.15~beta5-3   PNG library - runtime
ii  libqt3-mt   3:3.3.7-9Qt GUI Library (Threaded runtime v
ii  libsm6  2:1.0.3-1+b1 X11 Session Management library
ii  libstdc++6  4.2.2-4  The GNU Standard C++ Library v3
ii  libx11-62:1.0.3-7X11 client-side library
ii  libxcursor1 1:1.1.9-1X cursor management library
ii  libxext61:1.0.3-2X11 miscellaneous extension librar
ii  libxft2 2.1.12-2 FreeType-based font drawing librar
ii  libxi6  2:1.1.3-1X11 Input extension library
ii  libxinerama11:1.0.2-1X11 Xinerama extension library
ii  libxrandr2  2:1.2.2-1X11 RandR extension library
ii  libxrender1 1:0.9.4-1X Rendering Extension client libra
ii  libxt6  1:1.0.5-3X11 toolkit intrinsics library
ii  zlib1g  1:1.2.3.3.dfsg-7 compression library - runtime

ktranslator recommends no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Source: ktranslator
Source-Version: 0.4-2

We believe that the bug you reported is fixed in the latest version of
ktranslator, which is due to be installed in the Debian FTP archive:

ktranslator_0.4-2.diff.gz
  to pool/main/k/ktranslator/ktranslator_0.4-2.diff.gz
ktranslator_0.4-2.dsc
  to pool/main/k/ktranslator/ktranslator_0.4-2.dsc
ktranslator_0.4-2_i386.deb
  to pool/main/k/ktranslator/ktranslator_0.4-2_i38

Bug#492530: jbidwatcher: is this DFSG compatible ?

2008-07-26 Thread peter green

http://www.jbidwatcher.com/commercial_resale.shtml

"Doesn't that make jbidwatcher non-free ?"
Afaict no because it is not a part of the license just a request.

"In addition, although /not/ as a legal license addendum"
"As several people have asked, this isn't an addendum to the license"

Looks like jbidwatcher 2.0 will be non-free though.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492537: marked as done (depends on libswt-gtk-3.3-java which is not in testing (or even sid))

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sun, 27 Jul 2008 02:22:29 +0200
with message-id <[EMAIL PROTECTED]>
and subject line fixed in sid
has caused the Debian Bug report #492537,
regarding depends on libswt-gtk-3.3-java which is not in testing (or even sid)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
492537: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492537
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: azureus
Version: 3.0.3.4-3
Severity: serious

Not installable in testing, because it depends on libswt-gtk-3.3-java which is
not in testing (or even sid).

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.18-6-amd64 (SMP w/2 CPU cores)
Locale: LANG=ca_AD.UTF-8, LC_CTYPE=ca_AD.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash


--- End Message ---
--- Begin Message ---
Version: 3.1.1.0-1

which is fixed in the sid version of azureus, of course.

-- 
Robert Millan

 I know my rights; I want my phone call!
 What good is a phone call… if you are unable to speak?
(as seen on /.)

--- End Message ---


Bug#492537: depends on libswt-gtk-3.3-java which is not in testing (or even sid)

2008-07-26 Thread Robert Millan
Package: azureus
Version: 3.0.3.4-3
Severity: serious

Not installable in testing, because it depends on libswt-gtk-3.3-java which is
not in testing (or even sid).

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.18-6-amd64 (SMP w/2 CPU cores)
Locale: LANG=ca_AD.UTF-8, LC_CTYPE=ca_AD.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492532: (no subject)

2008-07-26 Thread Ryan Niebur
fixed 492532 1.3.2+dfsg-1
severity 492532 normal
forcemerge 481976 492532
thanks

-- 
_
Ryan Niebur
[EMAIL PROTECTED]


signature.asc
Description: Digital signature


Processed: your mail

2008-07-26 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> fixed 492532 1.3.2+dfsg-1
Bug#492532: apt-get also removes apache2 when i just wanted to remove 
mysql-server
Bug marked as fixed in version 1.3.2+dfsg-1.

> severity 492532 normal
Bug#492532: apt-get also removes apache2 when i just wanted to remove 
mysql-server
Severity set to `normal' from `critical'

> forcemerge 481976 492532
Bug#481976: libaprutil1: do we really need mysql stuff
Bug#492532: apt-get also removes apache2 when i just wanted to remove 
mysql-server
Forcibly Merged 481976 492532.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492532: Processed: Re: Bug#: apt-get also removes apache2 when i just wanted to remove mysql-server

2008-07-26 Thread Ryan Niebur
reassign 492532 libaprutil1
fixed 1.3.2+dfsg-1
thanks

apache2 depends on libaprutil1 which depends on libmysqlclient15off which 
depends on mysql-common.
This problem will be solved in Lenny+1 by splitting up libaprutil1 into 
libaprutil1-{dbd-{mysql,pgsql,sqlite3},ldap}.
Packages that do that are in experimental, though they FTBFS.

-- 
_
Ryan Niebur
[EMAIL PROTECTED]


signature.asc
Description: Digital signature


Processed (with 1 errors): Re: Processed: Re: Bug#: apt-get also removes apache2 when i just wanted to remove mysql-server

2008-07-26 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> reassign 492532 libaprutil1
Bug#492532: apt-get also removes apache2 when i just wanted to remove 
mysql-server
Bug reassigned from package `general' to `libaprutil1'.

> fixed 1.3.2+dfsg-1
Unknown command or malformed arguments to command.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#486335: marked as done (kdepimlibs: FTPBS on my machine: undefined reference to `KDirWatch::stopScan()')

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sun, 27 Jul 2008 01:03:37 +0200
with message-id <[EMAIL PROTECTED]>
and subject line Re: Bug#486335: kdepimlibs: FTPBS on my machine: undefined 
reference to `KDirWatch::stopScan()'
has caused the Debian Bug report #486335,
regarding kdepimlibs: FTPBS on my machine: undefined reference to 
`KDirWatch::stopScan()'
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
486335: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=486335
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: kdepimlibs
Version: 4:4.0.82+svn819867-1
Severity: normal


When I try to build kdepimlibs on my machine, I get this at the end of log:

Linking CXX shared library ../../../lib/libkabc_file_core.so
cd 
/home/jezuch/se/build-kde4/kdepimlibs-4.0.82+svn819867/obj-x86_64-linux-gnu/kabc/plugins/file
 && /usr/bin/cmake -P CMakeFiles/kabc_file_core.dir/cmake_clean_target.cmake
cd 
/home/jezuch/se/build-kde4/kdepimlibs-4.0.82+svn819867/obj-x86_64-linux-gnu/kabc/plugins/file
 && /usr/bin/cmake -E cmake_link_script CMakeFiles/kabc_file_core.dir/link.txt 
--verbose=1
/usr/bin/g++  -fPIC -g -O2 -g -Wall -O2 -Wnon-virtual-dtor -Wno-long-long -ansi 
-Wundef -Wcast-align -Wchar-subscripts -Wall -W -Wpointer-arith 
-Wformat-security -fno-exceptions -fno-check-new -fno-common 
-Woverloaded-virtual -fno-threadsafe-statics -fvisibility=hidden 
-fvisibility-inlines-hidden -DNDEBUG -Wl,--enable-new-dtags 
-Wl,--fatal-warnings -Wl,--no-undefined -lc -Wl,--no-undefined -Wl,--as-needed 
-shared -Wl,-soname,libkabc_file_core.so.4 -o 
../../../lib/libkabc_file_core.so.4.1.0 
"CMakeFiles/kabc_file_core.dir/kabc_file_core_automoc.o" 
"CMakeFiles/kabc_file_core.dir/resourcefile.o" 
"CMakeFiles/kabc_file_core.dir/resourcefileconfig.o" 
-L/home/jezuch/se/build-kde4/kdepimlibs-4.0.82+svn819867/obj-x86_64-linux-gnu/lib
 -lkutils -lQtCore -lQtGui -lQtSvg -lkdecore -lkdeui -lkabc -lkresources 
-lkldap -lQtCore -lQtGui -lQtSvg -lkdecore -lkdeui -lldap -llber -lsasl2 
-lQtCore -lQtNetwork -lQtXml -lkdecore -lkde3support -lQtDBus 
CMakeFiles/kabc_file_core.dir/resourcefile.o: In function 
`KABC::ResourceFile::setFileName(QString const&)':
/home/jezuch/se/build-kde4/kdepimlibs-4.0.82+svn819867/kabc/plugins/file/resourcefile.cpp:384:
 undefined reference to `KDirWatch::stopScan()'
/home/jezuch/se/build-kde4/kdepimlibs-4.0.82+svn819867/kabc/plugins/file/resourcefile.cpp:385:
 undefined reference to `KDirWatch::contains(QString const&) const'
/home/jezuch/se/build-kde4/kdepimlibs-4.0.82+svn819867/kabc/plugins/file/resourcefile.cpp:386:
 undefined reference to `KDirWatch::removeFile(QString const&)'
/home/jezuch/se/build-kde4/kdepimlibs-4.0.82+svn819867/kabc/plugins/file/resourcefile.cpp:391:
 undefined reference to `KDirWatch::addFile(QString const&)'
CMakeFiles/kabc_file_core.dir/resourcefile.o: In function `~ResourceFile':
/home/jezuch/se/build-kde4/kdepimlibs-4.0.82+svn819867/kabc/plugins/file/resourcefile.cpp:116:
 undefined reference to `KDirWatch::~KDirWatch()'
/home/jezuch/se/build-kde4/kdepimlibs-4.0.82+svn819867/kabc/plugins/file/resourcefile.cpp:116:
 undefined reference to `KDirWatch::~KDirWatch()'
/home/jezuch/se/build-kde4/kdepimlibs-4.0.82+svn819867/kabc/plugins/file/resourcefile.cpp:116:
 undefined reference to `KDirWatch::~KDirWatch()'
CMakeFiles/kabc_file_core.dir/resourcefile.o: In function 
`KABC::ResourceFile::init(QString const&, QString const&)':
/home/jezuch/se/build-kde4/kdepimlibs-4.0.82+svn819867/kabc/plugins/file/resourcefile.cpp:105:
 undefined reference to `KDirWatch::addFile(QString const&)'
CMakeFiles/kabc_file_core.dir/resourcefile.o: In function `ResourceFile':
/home/jezuch/se/build-kde4/kdepimlibs-4.0.82+svn819867/kabc/plugins/file/resourcefile.cpp:82:
 undefined reference to `KDirWatch::KDirWatch(QObject*)'
/home/jezuch/se/build-kde4/kdepimlibs-4.0.82+svn819867/kabc/plugins/file/resourcefile.cpp:82:
 undefined reference to `KDirWatch::KDirWatch(QObject*)'
/home/jezuch/se/build-kde4/kdepimlibs-4.0.82+svn819867/kabc/plugins/file/resourcefile.cpp:69:
 undefined reference to `KDirWatch::KDirWatch(QObject*)'
/home/jezuch/se/build-kde4/kdepimlibs-4.0.82+svn819867/kabc/plugins/file/resourcefile.cpp:69:
 undefined reference to `KDirWatch::KDirWatch(QObject*)'
/home/jezuch/se/build-kde4/kdepimlibs-4.0.82+svn819867/kabc/plugins/file/resourcefile.cpp:57:
 undefined reference to `KDirWatch::KDirWatch(QObject*)'
CMakeFiles/kabc_file_core.dir/resourcefile.o:/home/jezuch/se/build-kde4/kdepimlibs-4.0.82+svn819867/kabc/plugins/file/resourcefile.cpp:57:
 more undefined references to `KDirWatch::KDirWatch(QObject*)' follow
C

Processed: Re: Bug#492532: apt-get also removes apache2 when i just wanted to remove mysql-server

2008-07-26 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> reassign 492532 general
Bug#492532: apt-get also removes apache2 when i just wanted to remove 
mysql-server
Warning: Unknown package 'apt-get'
Bug reassigned from package `apt-get' to `general'.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492532: apt-get also removes apache2 when i just wanted to remove mysql-server

2008-07-26 Thread Martin Michlmayr
reassign 492532 general
thanks

* Star Liu <[EMAIL PROTECTED]> [2008-07-27 06:30]:
> Package: apt-get
> Version: dpkg

This has nothing to do with dpkg or apt-get.  apt-get simply looks at
dependencies.

Although it's strange that removing mysql would remove all this stuff.
Someone needs to investigate.
-- 
Martin Michlmayr
http://www.cyrius.com/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492533: Uninstallable due to dependency on libdc1394-13-dev (direct) and libdc1394-22-dev (indirect)

2008-07-26 Thread Luk Claes
Package: libplayerdrivers2-dev
Version: 2.0.4-3.2
Severity: serious

Hi

Your package is not installable as it depends on libdc1394-13-dev while
it also depends indirectly on libdc1394-22-dev.

Please consider changing the dependency to libdc1394-dev.

Cheers

Luk



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#490368: Patch for Bug 490368

2008-07-26 Thread Martin Meredith
On Sun, 2008-07-27 at 00:14 +0200, Julien Cristau wrote:
> On Sat, Jul 26, 2008 at 23:05:57 +0100, Martin Meredith wrote:
> 
> > Please Note: As I've done this properly, and used dpatch to fix this, it
> > will cause lintian errors (as it already does) because of previous
> > changes being against the source, rather than using a patch system.
> > 
> There's nothing "proper" about using dpatch.  If you introduce changes
> in an NMU, and there isn't already a patch system, then you shouldn't
> add one.

Might just have been the way that I've been taught to package. I've
always been taught never to touch the original source unless it's for
DFSG reasons.

Attached is a debdiff without the dpatch stuff.


diff -u yum-3.2.12/yum/misc.py yum-3.2.12/yum/misc.py
--- yum-3.2.12/yum/misc.py
+++ yum-3.2.12/yum/misc.py
@@ -16,7 +16,7 @@
 import fnmatch
 import bz2
 from stat import *
-import pyme.gpgme
+import pyme.pygpgme
 
 from Errors import MiscError
 
diff -u yum-3.2.12/debian/changelog yum-3.2.12/debian/changelog
--- yum-3.2.12/debian/changelog
+++ yum-3.2.12/debian/changelog
@@ -1,3 +1,11 @@
+yum (3.2.12-1.2) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Changed yum/misc.py to include pyme.pygpgme instead of pyme.gpgme
+  * Changed depends for python-pyme in control
+
+ -- Martin Meredith <[EMAIL PROTECTED]>  Sat, 26 Jul 2008 23:30:42 +0100
+
 yum (3.2.12-1.1) unstable; urgency=medium
 
   * Non-maintainer upload.
diff -u yum-3.2.12/debian/control yum-3.2.12/debian/control
--- yum-3.2.12/debian/control
+++ yum-3.2.12/debian/control
@@ -8,7 +8,7 @@
 
 Package: yum
 Architecture: all
-Depends: ${shlibs:Depends}, ${misc:Depends}, ${python:Depends}, python-celementtree, python-libxml2, python-urlgrabber, rpm (>= 4.4.1), python-rpm, python-pyme, python-sqlitecachec, python-sqlite
+Depends: ${shlibs:Depends}, ${misc:Depends}, ${python:Depends}, python-celementtree, python-libxml2, python-urlgrabber, rpm (>= 4.4.1), python-rpm, python-pyme (>= 0.8.0), python-sqlitecachec, python-sqlite
 Description: Advanced front-end for rpm
  Yum (Yellow dog Updater, Modified) is an automatic updater and package 
  installer/remover for rpm systems. It automatically computes dependencies 


Bug#492532: apt-get also removes apache2 when i just wanted to remove mysql-server

2008-07-26 Thread Star Liu
Package: apt-get
Version: dpkg
Severity: critical
Justification: breaks unrelated software

I wanted to remove mysql-server, so i use this command:
StarLiuLenny64:~# apt-get remove --purge mysql-admin mysql-client-5.0 
mysql-common mysql-gui-tools-common mysql-query-browser mysql-server-5.0

then it says:
The following packages will be REMOVED:
  apache2* apache2-mpm-worker* apache2-utils* apache2.2-common* gda2-mysql*
  gmysqlcc* libapache2-mod-mono* libapache2-mod-perl2* libapache2-mod-python*
  libaprutil1* libdbd-mysql-perl* libgda3-mysql* libgmyth0*
  libmysqlclient15off* libserf-0-0* libsvn1* mysql-admin* mysql-client-5.0*
  mysql-common* mysql-gui-tools-common* mysql-query-browser* mysql-server-5.0*
  subversion* totem* totem-plugins*
0 upgraded, 0 newly installed, 25 to remove and 95 not upgraded.
After this operation, 142MB disk space will be freed.
Do you want to continue [Y/n]? 

i answered Y, and after the operation ended, i found my apache2 server is 
removed! it's not i want!

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.25-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_HK.UTF-8, LC_CTYPE=en_HK.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492531: network-manager-gnome: network-manager failed to connect invisible accesspoint

2008-07-26 Thread Tobias

Package: network-manager-gnome
Version: 0.6.6-2
Severity: grave
Justification: renders package unusable
Tags: l10n

*** Please type your report below this line ***
information about access-point:

ssid= H3ll$gat3
encrypted= WPA-PSK

mode who fails:
network are invisible
Jul 26 23:39:12 tlap NetworkManager:   Activation (eth2) started...
Jul 26 23:39:12 tlap NetworkManager:   Activation (eth2) Stage 1 
of 5 (Device Prepare) scheduled...
Jul 26 23:39:12 tlap NetworkManager:   Activation (eth2) Stage 1 
of 5 (Device Prepare) started...
Jul 26 23:39:12 tlap NetworkManager:   Activation (eth2) Stage 2 
of 5 (Device Configure) scheduled...
Jul 26 23:39:12 tlap NetworkManager:   Activation (eth2) Stage 1 
of 5 (Device Prepare) complete.
Jul 26 23:39:12 tlap NetworkManager:   Activation (eth2) Stage 2 
of 5 (Device Configure) starting...
Jul 26 23:39:12 tlap NetworkManager:   Activation (eth2/wireless): 
access point 'H3ll$gat3' is encrypted, but NO

valid key exists.  New key needed.
Jul 26 23:39:12 tlap NetworkManager:   Activation (eth2) New 
wireless user key requested for network

'H3ll$gat3'.
Jul 26 23:39:12 tlap NetworkManager:   Activation (eth2) Stage 2 
of 5 (Device Configure) complete.
Jul 26 23:39:12 tlap NetworkManager:   Activation (eth2) New 
wireless user key for network 'H3ll$gat3' received.
Jul 26 23:39:12 tlap NetworkManager:   Activation (eth2) Stage 1 
of 5 (Device Prepare) scheduled...
Jul 26 23:39:12 tlap NetworkManager:   Activation (eth2) Stage 1 
of 5 (Device Prepare) started...
Jul 26 23:39:12 tlap NetworkManager:   Activation (eth2) Stage 2 
of 5 (Device Configure) scheduled...
Jul 26 23:39:12 tlap NetworkManager:   Activation (eth2) Stage 1 
of 5 (Device Prepare) complete.
Jul 26 23:39:12 tlap NetworkManager:   Activation (eth2) Stage 2 
of 5 (Device Configure) starting...
Jul 26 23:39:12 tlap NetworkManager:   Activation (eth2/wireless): 
access point 'H3ll$gat3' is encrypted, and a

key exists.  No new key needed.
Jul 26 23:39:13 tlap NetworkManager:   SUP: sending command 
'INTERFACE_ADD

eth2^I^Iwext^I/var/run/wpa_supplicant^I'
Jul 26 23:39:13 tlap NetworkManager:   SUP: response was 'OK'
Jul 26 23:39:13 tlap NetworkManager:   SUP: sending command 
'AP_SCAN 1'

Jul 26 23:39:13 tlap NetworkManager:   SUP: response was 'OK'
Jul 26 23:39:13 tlap NetworkManager:   SUP: sending command 
'ADD_NETWORK'

Jul 26 23:39:13 tlap NetworkManager:   SUP: response was '0'
Jul 26 23:39:13 tlap NetworkManager:   SUP: sending command 
'SET_NETWORK 0 ssid 48336c6c2467617433'

Jul 26 23:39:13 tlap NetworkManager:   SUP: response was 'OK'
Jul 26 23:39:13 tlap NetworkManager:   SUP: sending command 
'SET_NETWORK 0 scan_ssid 1'

Jul 26 23:39:13 tlap NetworkManager:   SUP: response was 'OK'
Jul 26 23:39:13 tlap NetworkManager:   SUP: sending command 
'SET_NETWORK 0 proto WPA'

Jul 26 23:39:13 tlap NetworkManager:   SUP: response was 'OK'
Jul 26 23:39:13 tlap NetworkManager:   SUP: sending command 
'SET_NETWORK 0 key_mgmt WPA-PSK'

Jul 26 23:39:13 tlap NetworkManager:   SUP: response was 'OK'
Jul 26 23:39:13 tlap NetworkManager:   SUP: sending command 
'SET_NETWORK 0 psk '

Jul 26 23:39:13 tlap NetworkManager:   SUP: response was 'OK'
Jul 26 23:39:13 tlap NetworkManager:   SUP: sending command 
'ENABLE_NETWORK 0'

Jul 26 23:39:13 tlap NetworkManager:   SUP: response was 'OK'
Jul 26 23:39:13 tlap NetworkManager:   Activation (eth2) Stage 2 
of 5 (Device Configure) complete.
Jul 26 23:39:18 tlap NetworkManager:   Old device 'eth2' 
activating, won't change.

Jul 26 23:39:49 tlap last message repeated 6 times
Jul 26 23:40:09 tlap last message repeated 4 times
Jul 26 23:40:13 tlap NetworkManager:   Activation (eth2/wireless): 
association took too long (>60s), failing

activation.
Jul 26 23:40:13 tlap NetworkManager:   Activation (eth2) failed 
for access point (H3ll$gat3)

Jul 26 23:40:13 tlap NetworkManager:   Activation (eth2) failed.
Jul 26 23:40:13 tlap NetworkManager:   Deactivating device eth2.
Jul 26 23:40:13 tlap NetworkManager:   Activation (eth2) failure 
scheduled...
Jul 26 23:40:13 tlap NetworkManager:   nm_signal_handler(): Caught 
signal 11.  Generating backtrace...
Jul 26 23:40:13 tlap NetworkManager: *** START 
**

Jul 26 23:40:14 tlap NetworkManager: (no debugging symbols found)
Jul 26 23:40:14 tlap last message repeated 13 times
Jul 26 23:40:14 tlap NetworkManager: [Thread debugging using 
libthread_db enabled]

Jul 26 23:40:14 tlap NetworkManager: [New Thread 0xb7b58720 (LWP 2691)]
Jul 26 23:40:14 tlap NetworkManager: [New Thread 0xb6b55b90 (LWP 3669)]
Jul 26 23:40:14 tlap NetworkManager: [New Thread 0xb7356b90 (LWP 2711)]
Jul 26 23:40:14 tlap NetworkManager: [New Thread 0xb7b57b90 (LWP 2707)]
Jul 26 23:40:14 tlap NetworkManager: (no debugging symbols found)
Jul 26 23:40:14 tlap last message repeated 7 times
Jul 26 23:40:14 tlap NetworkManager: 0xb7f79424 in __kernel_vsyscall ()
Jul 26 23:40:14 tlap NetworkManager: *** END 
***

Bug#490368: Patch for Bug 490368

2008-07-26 Thread Julien Cristau
On Sat, Jul 26, 2008 at 23:05:57 +0100, Martin Meredith wrote:

> Please Note: As I've done this properly, and used dpatch to fix this, it
> will cause lintian errors (as it already does) because of previous
> changes being against the source, rather than using a patch system.
> 
There's nothing "proper" about using dpatch.  If you introduce changes
in an NMU, and there isn't already a patch system, then you shouldn't
add one.

Cheers,
Julien



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#490368: Patch for Bug 490368

2008-07-26 Thread Martin Meredith
tags 490368 patch
thanks

Attached is a debdiff for an NMU for yum to fix this issue.

You can also find the .dsc for this at

http://mentors.debian.net/debian/pool/main/y/yum/yum_3.2.12-1.2.dsc

Please Note: As I've done this properly, and used dpatch to fix this, it
will cause lintian errors (as it already does) because of previous
changes being against the source, rather than using a patch system.

There are already lintian warnings though :(

By request of dilinger, I have only included the changes to fix the RC
bug, I would, at some point, also like to do a QA upload for this to fix
some of the packaging issues.
diff -u yum-3.2.12/debian/rules yum-3.2.12/debian/rules
--- yum-3.2.12/debian/rules
+++ yum-3.2.12/debian/rules
@@ -34,7 +34,7 @@
 endif
 
 configure: configure-stamp
-configure-stamp:
+configure-stamp: patch
 	dh_testdir
 	# Add here commands to configure the package.
 
@@ -59,7 +59,8 @@
 	$(MAKE) 
 	touch build-indep-stamp
 
-clean:
+clean: clean-patched unpatch
+clean-patched:
 	dh_testdir
 	dh_testroot
 	rm -f build-arch-stamp build-indep-stamp #CONFIGURE-STAMP#
@@ -98,6 +99,15 @@
 
 	dh_install -s
 
+patch: patch-stamp
+patch-stamp:
+	dpatch apply-all
+	dpatch cat-all >patch-stamp
+
+unpatch:
+	dpatch deapply-all
+	rm -rf patch-stamp debian/patched
+
 # Must not depend on anything. This is to be called by
 # binary-arch/binary-indep
 # in another 'make' thread.
diff -u yum-3.2.12/debian/changelog yum-3.2.12/debian/changelog
--- yum-3.2.12/debian/changelog
+++ yum-3.2.12/debian/changelog
@@ -1,3 +1,12 @@
+yum (3.2.12-1.2) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Added dpatch rules
+  * Added patch to load correct gpgme module (Closes: #490368)
+  * Changed rules so as to change dependency for python-pyme
+
+ -- Martin Meredith <[EMAIL PROTECTED]>  Sat, 26 Jul 2008 22:34:15 +0100
+
 yum (3.2.12-1.1) unstable; urgency=medium
 
   * Non-maintainer upload.
diff -u yum-3.2.12/debian/control yum-3.2.12/debian/control
--- yum-3.2.12/debian/control
+++ yum-3.2.12/debian/control
@@ -3,12 +3,12 @@
 Priority: extra
 Maintainer: Anand Kumria <[EMAIL PROTECTED]>
 Uploaders: Andres Salomon <[EMAIL PROTECTED]>
-Build-Depends: debhelper (>= 4.0.0), python-dev, python-support (>= 0.4), intltool
+Build-Depends: debhelper (>= 4.0.0), python-dev, python-support (>= 0.4), intltool, dpatch
 Standards-Version: 3.7.3
 
 Package: yum
 Architecture: all
-Depends: ${shlibs:Depends}, ${misc:Depends}, ${python:Depends}, python-celementtree, python-libxml2, python-urlgrabber, rpm (>= 4.4.1), python-rpm, python-pyme, python-sqlitecachec, python-sqlite
+Depends: ${shlibs:Depends}, ${misc:Depends}, ${python:Depends}, python-celementtree, python-libxml2, python-urlgrabber, rpm (>= 4.4.1), python-rpm, python-pyme (>= 0.8.0), python-sqlitecachec, python-sqlite
 Description: Advanced front-end for rpm
  Yum (Yellow dog Updater, Modified) is an automatic updater and package 
  installer/remover for rpm systems. It automatically computes dependencies 
only in patch2:
unchanged:
--- yum-3.2.12.orig/debian/patches/00list
+++ yum-3.2.12/debian/patches/00list
@@ -0,0 +1 @@
+01_fix_gpgme_include
only in patch2:
unchanged:
--- yum-3.2.12.orig/debian/patches/01_fix_gpgme_include.dpatch
+++ yum-3.2.12/debian/patches/01_fix_gpgme_include.dpatch
@@ -0,0 +1,19 @@
+#! /bin/sh /usr/share/dpatch/dpatch-run
+## 01_fix_gpgme_include.dpatch by Martin Meredith <[EMAIL PROTECTED]>
+##
+## All lines beginning with `## DP:' are a description of the patch.
+## DP: Update yum/misc.py to work with pygpgme >= 0.8
+
[EMAIL PROTECTED]@
+diff -urNad yum-3.2.12~/yum/misc.py yum-3.2.12/yum/misc.py
+--- yum-3.2.12~/yum/misc.py	2008-07-26 22:10:40.0 +0100
 yum-3.2.12/yum/misc.py	2008-07-26 22:25:01.0 +0100
+@@ -16,7 +16,7 @@
+ import fnmatch
+ import bz2
+ from stat import *
+-import pyme.gpgme
++import pyme.pygpgme
+ 
+ from Errors import MiscError
+ 


Processed: Patch for Bug 490368

2008-07-26 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 490368 patch
Bug#490368: yum fails: 'No module named gpgme'
There were no tags set.
Tags added: patch

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492530: jbidwatcher: is this DFSG compatible ?

2008-07-26 Thread Rémi Letot
Package: jbidwatcher
Severity: serious
Justification: Policy 2.2.2

Hi,

while searching for an ebay tool, I found that :

http://www.jbidwatcher.com/commercial_resale.shtml

Doesn't that make jbidwatcher non-free ?

Thanks,
-- 
Rémi

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.25-2-686 (SMP w/2 CPU cores)
Locale: LANG=fr_BE.UTF-8, LC_CTYPE=fr_BE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#483989: xserver-xorg-video-savage: system freeze while starting X

2008-07-26 Thread Julien Cristau
On Sun, Jun  1, 2008 at 20:45:54 +0200, Stefan Lippers-Hollmann wrote:

> Hi
> 
> On Sonntag, 1. Juni 2008, you wrote:
> [...]
> > Is the machine completely dead with the plain 2.2.1 driver? Can you
> > ping? ssh? catch the log?
> 
> Yes, it is completely dead, open ssh connections trying to gather last bits
> from tail -f /var/log/messages stall immediately (unfortunately the 
> notebook has no serial connectors for a serial console), pings get no 
> answer - a hard poweroff is the only recovery.
>  
Hi,

could you try to find out where the hang occurs?  You can put some calls
to ErrorF() at various points in the driver, and add Option "Log" "sync"
in the ServerFlags section of xorg.conf.
If we don't manage to track this down soon, I'd be tempted to revert to
an earlier version of the savage driver for lenny.

Cheers,
Julien



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492199: marked as done (file conflicts between packages)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 21:02:56 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#492199: fixed in libbsd 0.0.1-1
has caused the Debian Bug report #492199,
regarding file conflicts between packages
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
492199: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492199
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: libbsd-dev, libbsd0
Severity: serious
Justification: policy violation

hi,

both libbsd-dev and libbsd0 ship
 `/usr/share/man/man3/md5.3.gz'
but do neither conflict, nor add a diversion, thus fail to be installed in the
same environment:

 > dpkg: error processing /var/cache/apt/archives/libcgi-dev_1.0-6_amd64.deb 
 > (--unpack):
 >  trying to overwrite `/usr/share/man/man3/md5.3.gz', which is also in 
 > package libbsd-dev
 > Processing triggers for man-db ...
 > Errors were encountered while processing:
 >  /var/cache/apt/archives/libcgi-dev_1.0-6_amd64.deb
 > E: Sub-process /usr/bin/dpkg returned an error code (1)

bye,
- michael


--- End Message ---
--- Begin Message ---
Source: libbsd
Source-Version: 0.0.1-1

We believe that the bug you reported is fixed in the latest version of
libbsd, which is due to be installed in the Debian FTP archive:

libbsd-dev_0.0.1-1_i386.deb
  to pool/main/libb/libbsd/libbsd-dev_0.0.1-1_i386.deb
libbsd0-dbg_0.0.1-1_i386.deb
  to pool/main/libb/libbsd/libbsd0-dbg_0.0.1-1_i386.deb
libbsd0_0.0.1-1_i386.deb
  to pool/main/libb/libbsd/libbsd0_0.0.1-1_i386.deb
libbsd_0.0.1-1.diff.gz
  to pool/main/libb/libbsd/libbsd_0.0.1-1.diff.gz
libbsd_0.0.1-1.dsc
  to pool/main/libb/libbsd/libbsd_0.0.1-1.dsc
libbsd_0.0.1.orig.tar.gz
  to pool/main/libb/libbsd/libbsd_0.0.1.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Guillem Jover <[EMAIL PROTECTED]> (supplier of updated libbsd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sat, 26 Jul 2008 22:57:42 +0300
Source: libbsd
Binary: libbsd-dev libbsd0 libbsd0-dbg
Architecture: source i386
Version: 0.0.1-1
Distribution: unstable
Urgency: low
Maintainer: Debian GNU/kFreeBSD <[EMAIL PROTECTED]>
Changed-By: Guillem Jover <[EMAIL PROTECTED]>
Description: 
 libbsd-dev - utility functions from BSD systems - development files
 libbsd0- utility functions from BSD systems - shared library
 libbsd0-dbg - utility functions from BSD systems - debugging symbols
Closes: 492199
Changes: 
 libbsd (0.0.1-1) unstable; urgency=low
 .
   * New upstream release.
 - Install md5.3 man page as md5.3bsd to avoid conflicting with commonly
   provided file. (Closes: #492199)
   * Install upstream ChangeLog.
Checksums-Sha1: 
 60d79ad520a963431f3b2203d7706c206a44b291 1249 libbsd_0.0.1-1.dsc
 d1ce6736f9967842a860db1b71df166092af3aa2 46871 libbsd_0.0.1.orig.tar.gz
 53c7e2778a283720b13daa760839f6626a9e1f93 5247 libbsd_0.0.1-1.diff.gz
 305260a92a00b34a0e8ba9f5ffe4b02e9c0adba0 49560 libbsd-dev_0.0.1-1_i386.deb
 f6a435a3b52b32bb935b83e3c075c979b350fcee 26728 libbsd0_0.0.1-1_i386.deb
 d8141754210408537f995fc7fd391a63a8ac443f 32630 libbsd0-dbg_0.0.1-1_i386.deb
Checksums-Sha256: 
 dccdc685e9f7b9bc923afcecbb6a7889c479f5ea080642fc3cfd4ae9097e1592 1249 
libbsd_0.0.1-1.dsc
 fd58634ad3d0d3c56040ef16a4465c1656207e240ef95cc311549b96ca1055d3 46871 
libbsd_0.0.1.orig.tar.gz
 b1c03dc4df05f2fe6ce95e10cc7e8e41fbe1bcd8264a305952d298dbf34169fb 5247 
libbsd_0.0.1-1.diff.gz
 17f382ce1f78da1fa31afd79fb465c99621a36d56e65e15746b3af79be0a553e 49560 
libbsd-dev_0.0.1-1_i386.deb
 cc14f29a1acc0b56df766ae819a58b9880281b78f9560ace2fc3ae0aa12f426d 26728 
libbsd0_0.0.1-1_i386.deb
 5e5cf3ebf4dc25d6c8b6a988cd1bfbcd41e1b7ab23c3f5013de86fc596a9dba8 32630 
libbsd0-dbg_0.0.1-1_i386.deb
Files: 
 3cb6f045517c820d171bf45ccf3b79fa 1249 libs optional libbsd_0.0.1-1.dsc
 c5c31ce402405d26cb4a6bd6f684e539 46871 libs optional libbsd_0.0.1.orig.tar.gz
 879ac564a5f527eb50096cbe2f5a0af9 5247 libs optional libbsd_0.0.1-1.diff.gz
 dc0d4c69e32c507c02fb3d9b6c1e71fe 49560 libdevel optional 
libbsd-dev_0.0.1-1_i386.deb
 ece493b62daa927cfb0f745732703de0 26728 libs optional libbsd0_0.0.1-1_i386.deb
 da3f02b6b3de04214a5b23be359ea1ca 

Bug#491633: marked as done (fails to install, attempted to use shell library)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 21:17:06 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#491633: fixed in xft 2.1.13-2
has caused the Debian Bug report #491633,
regarding fails to install, attempted to use shell library
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
491633: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=491633
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: libxft-dev
Version: 2.1.13-1
Severity: grave

The package can't be installed. dpkg fails with the following message:

Preparing to replace libxft-dev 2.1.12-3 (using 
.../libxft-dev_2.1.13-1_i386.deb) ...
Error: package maintainer script attempted to use shell library without
definining $THIS_PACKAGE shell variable.  Please report the package name,
version, and the text of this error message to the Debian Bug Tracking System.
Visit  on the World Wide Web for
instructions, read the file /usr/share/doc/debian/bug-reporting.txt from the
"doc-debian" package, or install the "reportbug" package and use the command of
the same name to file a report against version 2.1.13-1 of this package.
dpkg: error processing /var/cache/apt/archives/libxft-dev_2.1.13-1_i386.deb 
(--unpack):
 subprocess pre-installation script returned error exit status 99
Errors were encountered while processing:
 /var/cache/apt/archives/libxft-dev_2.1.13-1_i386.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-mactel (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages libxft-dev depends on:
ii  libc6-dev [libc-dev]   2.7-12GNU C Library: Development Librari
ii  libfontconfig1-dev 2.6.0-1   generic font configuration library
ii  libfreetype6-dev   2.3.7-1   FreeType 2 font engine, developmen
ii  libx11-dev 2:1.1.4-2 X11 client-side library (developme
ii  libxft22.1.13-1  FreeType-based font drawing librar
ii  libxrender-dev 1:0.9.4-2 X Rendering Extension client libra
ii  x11-common 1:7.3+14  X Window System (X.Org) infrastruc
ii  zlib1g-dev [libz-dev]  1:1.2.3.3.dfsg-12 compression library - development

libxft-dev recommends no packages.

libxft-dev suggests no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Source: xft
Source-Version: 2.1.13-2

We believe that the bug you reported is fixed in the latest version of
xft, which is due to be installed in the Debian FTP archive:

libxft-dev_2.1.13-2_i386.deb
  to pool/main/x/xft/libxft-dev_2.1.13-2_i386.deb
libxft2-dbg_2.1.13-2_i386.deb
  to pool/main/x/xft/libxft2-dbg_2.1.13-2_i386.deb
libxft2_2.1.13-2_i386.deb
  to pool/main/x/xft/libxft2_2.1.13-2_i386.deb
xft_2.1.13-2.diff.gz
  to pool/main/x/xft/xft_2.1.13-2.diff.gz
xft_2.1.13-2.dsc
  to pool/main/x/xft/xft_2.1.13-2.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Julien Cristau <[EMAIL PROTECTED]> (supplier of updated xft package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sat, 26 Jul 2008 23:02:21 +0200
Source: xft
Binary: libxft2 libxft2-dbg libxft-dev
Architecture: source i386
Version: 2.1.13-2
Distribution: experimental
Urgency: low
Maintainer: Debian X Strike Force <[EMAIL PROTECTED]>
Changed-By: Julien Cristau <[EMAIL PROTECTED]>
Description: 
 libxft-dev - FreeType-based font drawing library for X (development files)
 libxft2- FreeType-based font drawing library for X
 libxft2-dbg - FreeType-based font drawing library for X (unstripped)
Closes: 491633
Changes: 
 xft (2.1.13-2) experimental; urgency=low
 .
   * Delete obsolete libxft-dev preinst (closes: #491633).
Checksums-Sha1: 
 6d7abe482ea220cd85220a956f3a18cf271f7558 1328 xft_2.1.13-2.dsc
 b69102eb788c22f1a9808d1f6c853f4e5abce5fc 21059 xft_2.1.13-2.diff.gz
 108799e7ef0d716036a5ff41748bc0f9f0e74798 50424 libxft2_2.1.13-2_i386.deb
 39b22a3

Bug#479607: marked as done (lilo fails to boot 2.6.25 kernel image due to wrongly passing initramfs)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 21:02:58 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#479607: fixed in lilo 1:22.8-6
has caused the Debian Bug report #479607,
regarding lilo fails to boot 2.6.25 kernel image due to wrongly passing 
initramfs
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
479607: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=479607
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---

Subject: linux-image-2.6.25-1-amd64: Kernel panic: Unable to mount root
Package: linux-image-2.6.25-1-amd64
Version: 2.6.25-1
Severity: normal

*** Please type your report below this line ***
Hi,

The new kernel 2.6.25-1 panics on my amd64 MacBookPro machine.
Previous kernels worked.  The output is:
[...]
NET: Registered protocol family 1
NET: Registered protocol family 17
registered taskstats version 1
RAMDISK: coulndn't find valid RAM disk image starting at 0
List of all partitions:
... ram0 (driver?)
...
... ram15 (driver?)
No filesystem could mount root, tried:
Kernel panic - not syncing: VFS: Unable to mount root fs on
unknown-block (8,3)

I tried the ideas of http://wiki.debian.org/InitramfsDebug:
with rootdelay=9, it does wait for 9 seconds, afterwards it panics
with the same message.

With 2.6.24, ls /proc/cmdline prints:
BOOT_IMAGE=LinuxOLD ro root=803

I executed, with no luck:
dpkg-reconfigure linux-image-2.6.25-1-amd64
dpkg-reconfigure initramfs-tools

ls -l /boot gives:
total 33111
-rw-r--r-- 1 root root 512 2007-10-07 18:32 boot.0800
-rw-r--r-- 1 root root 512 2007-10-07 18:48 boot.0803
-rw-r--r-- 1 root root  308326 2008-03-15 22:44 coffee.bmp
-rw-r--r-- 1 root root   79389 2008-04-19 01:13 config-2.6.24-1-amd64
-rw-r--r-- 1 root root   81924 2008-04-25 17:07 config-2.6.25-1-amd64
lrwxrwxrwx 1 root root  15 2007-10-07 18:32 debian.bmp ->
/boot/sarge.bmp
-rw-r--r-- 1 root root  153720 2008-03-15 22:44 debianlilo.bmp
lrwxrwxrwx 1 root root  25 2008-04-29 10:57 initrd.img ->
initrd.img-2.6.25-1-amd64
-rw-r--r-- 1 root root 6831589 2008-04-19 23:53
initrd.img-2.6.24-1-amd64
-rw-r--r-- 1 root root 6597033 2008-03-27 22:57
initrd.img-2.6.24-1-amd64.bak
-rw-r--r-- 1 root root 6989209 2008-05-02 13:15
initrd.img-2.6.25-1-amd64
-rw-r--r-- 1 root root 6990195 2008-04-29 10:57
initrd.img-2.6.25-1-amd64.bak
lrwxrwxrwx 1 root root  25 2008-01-29 22:15 initrd.img.old ->
initrd.img-2.6.24-1-amd64
-rw--- 1 root root   18944 2008-05-02 13:16 map
-rw-r--r-- 1 root root   23662 2008-03-15 22:44 sarge.bmp
-rw-r--r-- 1 root root   24116 2008-03-15 22:44 sid.bmp
-rw-r--r-- 1 root root 1158727 2008-04-19 01:13
System.map-2.6.24-1-amd64
-rw-r--r-- 1 root root 1185722 2008-04-25 17:07
System.map-2.6.25-1-amd64
lrwxrwxrwx 1 root root  22 2008-04-29 10:57 vmlinuz ->
vmlinuz-2.6.25-1-amd64
-rw-r--r-- 1 root root 1668120 2008-04-19 01:12 vmlinuz-2.6.24-1-amd64
-rw-r--r-- 1 root root 1727008 2008-04-25 17:07 vmlinuz-2.6.25-1-amd64
lrwxrwxrwx 1 root root  22 2008-01-29 22:15 vmlinuz.old ->
vmlinuz-2.6.24-1-amd64

Here is the diff of initramfs content between 2.6.25 and 2.6.24 (I
replaced 2.6.24 with 2.6.25 to have only the useful differences), as
suggested by http://wiki.debian.org/InitramfsDebug:

--- initramfs-old.content   2008-05-02 20:36:47.0 +0200
+++ initramfs.content   2008-05-02 20:35:12.0 +0200
@@ -52,13 +52,11 @@
 ./etc/udev/rules.d/z25_persistent-cd.rules
 ./etc/udev/rules.d/z20_persistent-input.rules
 ./etc/udev/rules.d/45-hplip.rules
-./etc/udev/rules.d/z60_libsane-extras.rules.dpkg-new
 ./etc/udev/rules.d/z60_alsa-utils.rules
 ./etc/udev/rules.d/85-pcmcia.rules
 ./etc/udev/rules.d/z55_hotplug.rules
 ./etc/udev/rules.d/z60_libccid.rules
 ./etc/udev/rules.d/z60_hdparm.rules
-./etc/udev/rules.d/z60_libsane.rules.dpkg-new
 ./etc/udev/rules.d/z60_libsane.rules
 ./etc/udev/rules.d/z99_hal.rules
 ./etc/udev/rules.d/z50_run.rules
@@ -90,7 +88,6 @@
 ./etc/modprobe.d/arch-aliases
 ./etc/modprobe.d/thinkpad_acpi.modprobe
 ./etc/modprobe.d/oss-compat
-./etc/modprobe.d/libsane.dpkg-new
 ./etc/modprobe.d/alsa-base-blacklist
 ./etc/modprobe.d/display_class
 ./etc/modprobe.d/pnp-hotplug
@@ -122,6 +119,8 @@
 ./lib/modules/2.6.25-1-amd64/kernel/fs/jfs/jfs.ko
 ./lib/modules/2.6.25-1-amd64/kernel/fs/nfs
 ./lib/modules/2.6.25-1-amd64/kernel/fs/nfs/nfs.ko
+./lib/modules/2.6.25-1-amd64/kernel/fs/nls
+./lib/modules/2.6.25-1-amd64/kernel/fs/nls/nls_base.ko
 ./lib/modules/2.6.25-1-amd64/kernel/fs/xfs
 ./lib/modules/2.6.25-1-amd64/kernel/fs/xfs/xfs.ko
 ./lib/modules/2.6.25-1-amd64/kernel/fs/ext2
@@ -192,15 +191,16 @@
 ./lib/modules/2.6.25-1-amd64/kernel/dr

Bug#488637: NMU for xine-plugin

2008-07-26 Thread Darren Salt
I demand that Christopher Martin may or may not have written...

> I've prepared a NMU for xine-plugin, which updates it to the long-ago 
> released 1.0.1 version, and fixes the crashes with Iceweasel 3 and
> Epiphany, as far as I can tell.

> Please test this and let me know if it makes a difference for you.

> http://people.debian.org/~chrsmrtn

> The file 'debian.diff' contains the changes within the debian directory
> only; look at the .diff.gz for the source changes against upstream release
> 1.0.1.

> I've done a little more housecleaning than is normally encouraged for a
> NMU, so Darren, let me know what you think! I'd like to get a bit of
> feedback before uploading.

NAK. This isn't based on our hg packaging repository (OTOH, you couldn't know
about that); and I've just released 1.0.2.

http://alioth.debian.org/~dsalt-guest/sponsored/xine-plugin/

This should be uploaded as is (due to time constraints); however, I've not
examined your diff.gz in any great detail, so if there's any cleanup work
which hasn't been done and which you feel is important, send me patches or
changesets...

http://hg.debian.org/hg/xine-lib/pkg/xine-plugin-deb

-- 
| Darren Salt| linux or ds at  | nr. Ashington, | Toon
| RISC OS, Linux | youmustbejoking,demon,co,uk | Northumberland | Army
| + Generate power using sun, wind, water, nuclear.  FORGET COAL AND OIL.

Support local search and rescue. GET LOST!



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: fix submitter

2008-07-26 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> submitter 492009 Joost van Baal <[EMAIL PROTECTED]>
Bug#492009: eekboek: should not be shipped with lenny
Warning: Unknown package 'eekboek'
Changed Bug submitter from Martin Michlmayr <[EMAIL PROTECTED]> to Joost van 
Baal <[EMAIL PROTECTED]>.

> --
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492479: marked as done (texlife-base: error during upgrade)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 22:28:45 +0200
with message-id <[EMAIL PROTECTED]>
and subject line Re: Processed: Re: Bug#492479: texlife-base: error during 
upgrade
has caused the Debian Bug report #492479,
regarding texlife-base: error during upgrade
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
492479: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492479
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: texlife-base
Version: 2007.dfsg.1-3
Severity: grave
Justification: renders package unusable

I get the following error when upgrading:
etting up texlive-base (2007.dfsg.1-3) ...
Running mktexlsr. This may take some time... done.
Building format(s) --all.
This may take some time... 
fmtutil-sys failed. Output has been stored in
/tmp/fmtutil.kSb17790
Please include this file if you report a bug.

dpkg: error processing texlive-base (--configure):
 subprocess post-installation script returned error exit status 1


the contents of /tmp/fmtutil.kSb17790

% cat /tmp/fmtutil.kSb17790
% [16:10]
fmtutil: running `mf-nowin -ini   -jobname=mf -progname=mf
-translate-file=cp227.tcx mf.ini' ...
This is METAFONT, Version 2.71828 (Web2C 7.5.6) (INIMF)
(/usr/share/texmf-texlive/web2c/cp227.tcx)
(/usr/share/texmf-texlive/metafont/config/mf.ini
(/usr/share/texmf-texlive/metafont/base/plain.mf
Preloading the plain base, version 2.71: preliminaries,
 basic constants and mathematical macros,
 macros for converting from device-independent units to pixels,
 macros and tables for various modes of operation,
 macros for drawing and filling,
 macros for proof labels and rules,
 macros for character and font administration,
and a few last-minute items.) (/etc/texmf/metafont/misc/modes.mf) )
Beginning to dump on file mf.base
 (base=mf 2008.7.26)
2224 strings of total length 29910
11865 memory locations dumped; current usage is 3658&7845
1003 symbolic tokens
Transcript written on mf.log.
fmtutil: /var/lib/texmf/web2c/metafont/mf.base installed.
fmtutil: running `pdftex -ini   -jobname=etex -progname=etex
-translate-file=cp227.tcx *etex.ini' ...
This is pdfTeXk, Version 3.141592-1.40.3 (Web2C 7.5.6) (INITEX)
 %&-line parsing enabled.
 (/usr/share/texmf-texlive/web2c/cp227.tcx)
entering extended mode
(/usr/share/texmf-texlive/tex/plain/config/etex.ini
(/usr/share/texmf-texlive/tex/plain/etex/etex.src
(/usr/share/texmf-texlive/tex/plain/base/plain.tex
Preloading the plain format: codes, registers, parameters, fonts, more
fonts,
macros, math definitions, output routines, hyphenation
(/usr/share/texmf-texlive/tex/generic/hyphen/hyphen.tex
[skipping from \patterns to end-of-file...]))
(/usr/share/texmf-texlive/tex/plain/etex/etexdefs.lib
Skipping module "grouptypes"; Loading module "interactionmodes";
Skipping module "nodetypes"; Skipping module "iftypes";)
(/usr/share/texmf-texlive/tex/plain/config/language.def
(/usr/share/texmf-texlive/tex/generic/hyphen/hyphen.tex))
Augmenting the Plain TeX definitions: \tracingall;
Adding new e-TeX definitions: \eTeX, \loggingall, \tracingnone,
register allocation; extended register allocation; 
Recycling: \addlanguage, [EMAIL PROTECTED] (not defined), [EMAIL PROTECTED], 
[EMAIL PROTECTED],
[EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], 
[EMAIL PROTECTED],
[EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], 
[EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED] (not defined), [EMAIL PROTECTED] (not defined), [EMAIL 
PROTECTED] (not defined),
[EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], 
Retaining: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL 
PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED]@@d, [EMAIL PROTECTED]@ad, [EMAIL PROTECTED], [EMAIL 
PROTECTED], [EMAIL PROTECTED], \eTeX,
\etexhdrchk,
\etexstatus, \module, \uselanguage, [EMAIL PROTECTED], [EMAIL PROTECTED],) )
Beginning to dump on file etex.fmt
 (format=etex 2008.7.26)
2836 strings of total length 41448
7953 memory locations dumped; current usage is 197&7289
1247 multiletter control sequences
\font\nullfont=nullfont
\font\tenrm=cmr10
\font\preloaded=cmr9
\font\preloaded=cmr8
\font\sevenrm=cmr7
\font\preloaded=cmr6
\font\fiverm=cmr5
\font\teni=cmmi10
\font\preloaded=cmmi9
\font\preloaded=cmmi8
\font\seveni=cmmi7
\font\preloaded=cmmi6
\font\fivei=cmmi5
\font\tensy=cmsy10
\font\preloaded=cmsy9
\font\preloaded=cmsy8
\font\sevensy=cmsy7
\font\preloaded=cmsy6
\font\fivesy=cmsy5
\font\tenex=cmex10
\font\preloaded=cmss10
\font\preloaded=cmssq8
\font\preloaded=cmssi10
\font\preloaded=cmssqi8

Processed: retitle 492519 to vim-runtime: netrw explorer potentially deletes wrong files

2008-07-26 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.9.26
> retitle 492519 vim-runtime: netrw explorer potentially deletes wrong files
Bug#492519: vim-runtime: newrw explorer potentially deletes wrong files
Changed Bug title to `vim-runtime: netrw explorer potentially deletes wrong 
files' from `vim-runtime: newrw explorer potentially deletes wrong files'.

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#479607: large-memory did fix the problem for me

2008-07-26 Thread Carl Witty
I installed from debian-LennyBeta2-amd64-netinst.iso, which worked; I
then upgraded to linux-image-2.6.25-2-amd64, which failed (it did not
even try to run /init from initrd.img).

I then added large-memory to /etc/lilo.conf (at the global level), and
now it works.  (I did not try MODULES=dep.)

Maybe there are two different problems?  Or maybe large-memory only
helps on certain systems?  I've got a SuperMicro X7DCA-i motherboard
with 2x Core 2 Quad and 8GB RAM.

Some people have wanted to know file sizes.  Here are the file sizes
for the initial 2.6.24 kernel:
[EMAIL PROTECTED]:~$ ls -lL /vmlinuz.old /initrd.img.old
-rw-r--r-- 1 root root 7760701 2008-07-25 22:01 /initrd.img.old
-rw-r--r-- 1 root root 1668248 2008-05-10 02:32 /vmlinuz.old

And for the new kernel:
[EMAIL PROTECTED]:~$ ls -lL /vmlinuz /initrd.img
-rw-r--r-- 1 root root 8031788 2008-07-26 08:56 /initrd.img
-rw-r--r-- 1 root root 1727456 2008-07-14 05:16 /vmlinuz

Carl



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: tagging as pending bugs that are closed by packages in NEW

2008-07-26 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Sat Jul 26 20:03:15 UTC 2008
> # Tagging as pending bugs that are closed by packages in NEW
> # http://ftp-master.debian.org/new.html
> #
> # Source package in NEW: ogre
> tags 479280 + pending
Bug#479280: Ogre 1.4.7 Released
There were no tags set.
Tags added: pending

> # Source package in NEW: ogre
> tags 485899 + pending
Bug#485899: ogre-doc: API and Manual under non-free CC-BY-SA-2.5 license
There were no tags set.
Tags added: pending

> # Source package in NEW: phamm
> tags 487754 + pending
Bug#487754: [INTL:sv] Swedish strings for debconf template
Tags were: l10n patch
Tags added: pending

> # Source package in NEW: ganyremote
> tags 483679 + pending
Bug#483679: ITP: ganyremote -- GTK frontend for anyRemote
There were no tags set.
Tags added: pending

> # Source package in NEW: kanyremote
> tags 486546 + pending
Bug#486546: ITP: kanyremote -- KDE frontend for anyRemote
There were no tags set.
Tags added: pending

> # Source package in NEW: libcsfml
> tags 481665 + pending
Bug#481665: ITP: libcsfml -- Simple and Fast Multimedia Library for C
There were no tags set.
Tags added: pending

> # Source package in NEW: gourmet
> tags 427474 + pending
Bug#427474: RFP: gourmet -- Gourmet Recipe Manager manages your recipes, 
generate shopping lists, and more
Tags were: help
Tags added: pending

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#491889: meep not in Lenny anymore

2008-07-26 Thread Thorsten Alteholz

Hi,

I don't agree with your reasoning.
Upstream recommends using the Debian package on their website 
(http://ab-initio.mit.edu/wiki/index.php/Meep_Download):
"We highly recommend using Debian or Ubuntu, as in Debian or Ubuntu the 
Meep software and all of its dependencies can be installed simply by 
typing one line: [...]"

So the removal does might annoy one or the other.

Anyway I tried to adopt this package and uploaded a new version to 
mentors.debian.net. Unfortunately I did not find a sponsor yet.


Best regards
Thorsten




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#490559: notfixed 490559 in 5.8-1

2008-07-26 Thread Nico Golde
# Automatically generated email from bts, devscripts version 2.10.34
# 5.8 still contains this issue
notfixed 490559 5.8-1




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: notfixed 490559 in 5.8-1

2008-07-26 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.10.34
> # 5.8 still contains this issue
> notfixed 490559 5.8-1
Bug#490559: drupal5: Security Updates Released 2008-07-09
Bug no longer marked as fixed in version 5.8-1.

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492519: vim-runtime: newrw explorer potentially deletes wrong files

2008-07-26 Thread Teemu Likonen
Package: vim-runtime
Version: 1:7.1.314-3
Severity: serious

Netrw explorer currently shipped with Debian Sid can potentially cause
data loss since in certain situations it may delete unintended files.
The problem is in the short listing mode. How to reproduce:

$ mkdir tmpdir
$ cd tmpdir
$ touch foo1 foo2 foo3
$ vim .

Change to short listing mode by pressing "i" a couple of times. Hide all 
the dot files (Ctrl-H and enter ^\.). The directory should look like 
this:

" 

" Netrw Directory Listing(netrw 
v125)
"   /home/dtw/tmp
"   Sorted by  name
"   Sort sequence: 
[\/]$,\.h$,\.c$,\.cpp$,*,\.o$,\.obj$,\.info$,\.swp$,\.bak$,\~$
"   Hiding:^\.
"   Quick Help: :help  -:go up dir  D:delete  R:rename  s:sort-by  
x:exec
" 

foo1  foo2  foo3

Now move the cursor to either file "foo2" or "foo3" and press "D" 
(delete). You'll see a question which asks if you want to delete _foo1_:

Confirm deletion of file [{y(es)},n(o),a(ll),q(uit)]

If user don't pay attention a wrong file gets deleted.




-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.18-6-k7 (SMP w/1 CPU core)
Locale: LANG=fi_FI.UTF-8, LC_CTYPE=fi_FI.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

vim-runtime depends on no packages.

Versions of packages vim-runtime recommends:
ii  vim-gtk [vim] 1:7.1.314-3+b1 Vi IMproved - enhanced vi editor -

vim-runtime suggests no packages.

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#475036: kernel-package still very important

2008-07-26 Thread Jose Calhariz

I need kernel-package to do a group of tasks very important.  Please
maintain kernel-package 11.00x the best you can, while you rewrite the
new version.

I promise whenever I find a bug I try to find a fix and send it with the
bug report.

Jose Calhariz

-- 
--

O que é conservacionismo? Não é aderir ao velho e já tentado, contra o novo e 
não tentado?

--Abraham Lincoln


signature.asc
Description: Digital signature


Bug#492513: [digikam] does not start :: symbol lookup error: digikam: undefined symbol

2008-07-26 Thread Nadav Kavalerchik
Package: digikam
Version: 2:0.9.4-1
Severity: critical

--- Please enter the report below this line. ---
after upgrade 0.9.3 --> 0.9.4 i get:
laptop:~# digikam
digikam: symbol lookup error: digikam: undefined symbol: 
_ZN4KIPI9Interface7versionEv

and it does not start :-(

--- System information. ---
Architecture: i386
Kernel:   Linux 2.6.25-trunk-686

Debian Release: lenny/sid
  500 unstablewww.debian-multimedia.org 
  500 unstablemirror.isoc.org.il 
  500 testing mirror.isoc.org.il 
  500 kernel-dists-trunk kernel-archive.buildserver.net 
  500 experimentalwww.debian-multimedia.org 
1 experimentalmirror.isoc.org.il 

--- Package information. ---
Depends (Version) | Installed
=-+-==
kdelibs4c2a  (>= 4:3.5.9) | 4:3.5.9.dfsg.1-4
libc6  (>= 2.7-1) | 2.7-12
libgcc1  (>= 1:4.1.1) | 1:4.3.1-2
libgphoto2-2   (>= 2.4.0) | 2.4.0-8
libgphoto2-port0   (>= 2.4.0) | 2.4.0-8
libjasper1   (>= 1.900.1) | 1.900.1-5
libjpeg62 | 6b-14
libkdcraw3| 0.1.4-2
libkexiv2-3   | 0.1.7-1
libkipi0  | 0.1.5-2
liblcms1  (>= 1.15-1) | 1.16-10
libpng12-0  (>= 1.2.13-4) | 1.2.27-1
libqt3-mt   (>= 3:3.3.8b) | 3:3.3.8b-2
libsqlite3-0   (>= 3.5.9) | 3.5.9-2
libstdc++6 (>= 4.2.1) | 4.3.1-2
libtiff4  | 3.8.2-7
libx11-6  | 2:1.1.4-2
kdebase-kio-plugins   | 4:3.5.9.dfsg.1-4





-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492490: marked as done ([reportbug] Crash)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 17:32:03 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#492490: fixed in reportbug 3.44
has caused the Debian Bug report #492490,
regarding [reportbug] Crash
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
492490: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492490
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: reportbug
Version: 3.43
Severity: critical

--- Please enter the report below this line. ---

Hi.

Trying to run the program:

$ reportbug
Traceback (most recent call last):
  File "/usr/bin/reportbug", line 1823, in ?
main()
  File "/usr/bin/reportbug", line 832, in main
lib_package = __import__('reportbuglib', fromlist=[iface])
TypeError: __import__() takes no keyword arguments


[I had to install "reportbug-ng" to report this. :-/ ]

Best regards,
Gilles

--- System information. ---
Architecture: amd64
Kernel:   Linux 2.6.25.11-vs2.3.0.34.14+g1

Debian Release: lenny/sid
  500 unstabledebian.inode.at 
  500 testing security.debian.org 
  500 testing debian.inode.at 
  500 stable  security.debian.org 
  500 stable  debian.inode.at 
  500 stable  debian-multimedia.informatik.uni-erlangen.de 

--- Package information. ---
Depends (Version) | Installed
=-+-===
python   (>= 2.4) | 2.4.4-6
python-central (>= 0.6.7) | 0.6.8
apt   | 0.7.14+b1


--- End Message ---
--- Begin Message ---
Source: reportbug
Source-Version: 3.44

We believe that the bug you reported is fixed in the latest version of
reportbug, which is due to be installed in the Debian FTP archive:

reportbug_3.44.dsc
  to pool/main/r/reportbug/reportbug_3.44.dsc
reportbug_3.44.tar.gz
  to pool/main/r/reportbug/reportbug_3.44.tar.gz
reportbug_3.44_all.deb
  to pool/main/r/reportbug/reportbug_3.44_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sandro Tosi <[EMAIL PROTECTED]> (supplier of updated reportbug package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sat, 26 Jul 2008 19:17:44 +0200
Source: reportbug
Binary: reportbug
Architecture: source all
Version: 3.44
Distribution: unstable
Urgency: medium
Maintainer: Reportbug Maintainers <[EMAIL PROTECTED]>
Changed-By: Sandro Tosi <[EMAIL PROTECTED]>
Description: 
 reportbug  - reports bugs in the Debian distribution
Closes: 492240 492490
Changes: 
 reportbug (3.44) unstable; urgency=medium
 .
   [ Chris Lawrence ]
   * reportbug
 + Yet another character set issue fix.  (Closes: #492240)
 .
   [ Sandro Tosi ]
   * debian/control
 - changed build-dep-indep from python-dev to python
 - bump required Python version to >= 2.5; thanks to Gilles Sadowski for
   the report; Closes: #492490 (RC bug, hence urgency set to medium)
Checksums-Sha1: 
 618f4bed4eed9b5f594040ff24b5e08991f22903 1170 reportbug_3.44.dsc
 1a92decb661e9b0802b254bee64eb10475671102 175176 reportbug_3.44.tar.gz
 9cdf48fb1c3db6f245f59f8806c92535cd5218db 157346 reportbug_3.44_all.deb
Checksums-Sha256: 
 68130157e302f22d5c418a993707340f7c3ea7db5167bd6bd19bd3db8e980283 1170 
reportbug_3.44.dsc
 f4743c8e99afc00fc3088e9064f68078729c6f6a3680046c0aa510767865b8d4 175176 
reportbug_3.44.tar.gz
 b7c100be341c487066d822c219dfe3e76d253f1a1d7ba8d4d4d4335ef463fbcc 157346 
reportbug_3.44_all.deb
Files: 
 b69519d543f8de59da6075fc320c696a 1170 utils standard reportbug_3.44.dsc
 34f64c01e42b48183cafc1c68378750f 175176 utils standard reportbug_3.44.tar.gz
 b4b5e99e93ba95deefaf4b3dee8d970b 157346 utils standard reportbug_3.44_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkiLXXkACgkQAukwV0RN2VAM0ACaAroFLZDIBDpgCb+vvLMkWcsk
b/IAn0kWC8m1V7GwRfnNy1yOJPSJudTy
=O3je
-END PGP SIGNATURE-


--- End Message ---


Bug#488637: NMU for xine-plugin

2008-07-26 Thread Christopher Martin
Hello,

I've prepared a NMU for xine-plugin, which updates it to the long-ago 
released 1.0.1 version, and fixes the crashes with Iceweasel 3 and 
Epiphany, as far as I can tell. 

Please test this and let me know if it makes a difference for you.

http://people.debian.org/~chrsmrtn

The file 'debian.diff' contains the changes within the debian directory 
only; look at the .diff.gz for the source changes against upstream 
release 1.0.1.

I've done a little more housecleaning than is normally encouraged for a 
NMU, so Darren, let me know what you think! I'd like to get a bit of 
feedback before uploading.

Thanks,
Christopher Martin


signature.asc
Description: This is a digitally signed message part.


Processed (with 1 errors): your mail

2008-07-26 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 474909 patch
Bug#474909: maxima: FTBFS: /bin/sh: ./maxima: No such file or directory
There were no tags set.
Tags added: patch

> kthanksbye
Unknown command or malformed arguments to command.

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#474909: patch for SBCL NMU

2008-07-26 Thread David Bremner

Here is a patch to convert to SBCL

diff -u maxima-5.13.0/debian/README.Debian maxima-5.13.0/debian/README.Debian
--- maxima-5.13.0/debian/README.Debian
+++ maxima-5.13.0/debian/README.Debian
@@ -1,6 +1,14 @@
 maxima for Debian
 --
 
+What's new in 5.15.0
+
+I (David Bremner <[EMAIL PROTECTED]>) have packaged this version of
+maxima using sbcl instead of gcl. Currently we lose the nice header
+when maxima starts up, and you have to use rmaxima (or emacs :-) ) for
+command line editing. On the plus side, it now passes the test suite, 
+at least on i386.
+
 What's new in 5.9.1:
 
 
@@ -41 +49 @@
- -- Camm Maguire <[EMAIL PROTECTED]>, Wed Feb 23 19:37:03 2005
+ -- David Bremner <[EMAIL PROTECTED]>, Thu, 24 Jul 2008 22:30:12 -0300
diff -u maxima-5.13.0/debian/rules maxima-5.13.0/debian/rules
--- maxima-5.13.0/debian/rules
+++ maxima-5.13.0/debian/rules
@@ -10,6 +10,9 @@
 # This is the debhelper compatability version to use.
 #export DH_COMPAT=3
 
+# choose LISP to use
+LISP=sbcl
+
 NO_STRIP:=
 #ALT_LINK:=
 #ifeq ($(DEB_BUILD_ARCH),mips)
@@ -37,29 +40,35 @@
 build-stamp: 
dh_testdir
 
-   for i in aclocal.m4 src/sys-proclaim.lisp configure ; do [ -e $$i.ori ] 
|| cp $$i $$i.ori; done
+   # .ori trick does not work so well here because they are clobbered by 
make clean
+   mkdir debian/info-backup && cp -a doc/info/maxima.info* 
debian/info-backup
+   for i in aclocal.m4 src/sys-proclaim.lisp configure; do [ -e $$i.ori ] 
|| cp $$i $$i.ori; done
 
aclocal
+   autoconf
automake
 
-   GCL_ANSI=t ./configure --enable-gcl $$(gcl -batch -eval 
'#-native-reloc(princ "--enable-gcl-alt-link")(bye)') \
+   ./configure --enable-$(LISP)\
--prefix=/usr \
--libexec=/usr/lib \
--mandir=/usr/share/man \
--infodir=/usr/share/info 
 
-   GCL_ANSI=t $(MAKE)
+   $(MAKE)
 
 # This sets up some reasonable readline command completion by default
 
-   cd src/binary-gcl && echo ':lisp (setq si::*readline-prefix* 
"maxima::$$")(when (fboundp (quote si::sgc-on)) (si::sgc-on t))(setq 
maxima::*maxima-started* nil)(si::putprop (quote 
cl-info::cause-maxima-index-to-load) 
"/usr/share/doc/maxima-doc/info/maxima-index.lisp"  (quote 
autoload))(si::save-system "foo")' | ./maxima -eval '(run)' && mv foo maxima
 
+#  cd src/binary-gcl && echo ':lisp (setq si::*readline-prefix* 
"maxima::$$")(when (fboundp (quote si::sgc-on)) (si::sgc-on t))(setq 
maxima::*maxima-started* nil)(si::putprop (quote 
cl-info::cause-maxima-index-to-load) 
"/usr/share/doc/maxima-doc/info/maxima-index.lisp"  (quote 
autoload))(si::save-system "foo")' | ./maxima -eval '(run)' && mv foo maxima
+
+# this adds about 1M to the image, which is not great, but means 44M vs 43M 
+   echo ':lisp (progn (load "doc/info/maxima-index.lisp") 
(sb-ext:save-lisp-and-die "newmaxima.core"))'| ./maxima-local -eval && mv 
newmaxima.core src/binary-sbcl/maxima.core
 
 # Reenable if/when gcl uses __mulsi et. al. on m68k, now configured for (020) 
unoptimally
 #  [ "$$(dpkg --print-architecture)" != "m68k" ] || cp 
debian/rtest8.mac.m68k tests/rtest8.mac
 
chmod +x ./maxima-local
-   ./maxima-local --lisp=gcl --batch-string="run_testsuite(true,true);"  
>tmp 2>&1 & \
+   ./maxima-local --lisp=$(LISP) 
--batch-string="run_testsuite(true,true);"  >tmp 2>&1 & \
j=$$! ; echo Waiting on pid $$j ; \
tail -f --pid=$$j --retry tests/tests-gcl.log tmp & wait $$j
 
@@ -109,7 +118,8 @@
rm -f $(BOOK) config.log config.status plotting/mgnuplot \
src/maxima.bat src/rmaxima maxima-local xmaxima-local 
maxima.spec maxima.iss
rm -rf src/numerical/slatec/fortran/CVS src/*gazonk* 
interfaces/xmaxima/win32/Makefile
-   for i in aclocal.m4 src/sys-proclaim.lisp configure ; do ! [ -e $$i.ori 
] || mv $$i.ori $$i; done
+   ! [ -d debian/info-backup ] || mv debian/info-backup/maxima.info* 
doc/info && rm -rf debian/info-backup
+   for i in aclocal.m4 src/sys-proclaim.lisp configure; do ! [ -e $$i.ori 
] || mv $$i.ori $$i; done
dh_clean
 
 
@@ -220,7 +230,8 @@
dh_installchangelogs  -i
dh_link -i
dh_strip -i
-   dh_compress -i -X.shtml -X.hh -Xmaxima-index.lisp
+   # maxima.info is read directly by maxima and  shouldn't (?) be 
compressed
+   dh_compress -i -X.shtml -X.hh -Xmaxima-index.lisp -Xmaxima.info
dh_fixperms -i
dh_installdeb -i
dh_shlibdeps -i
diff -u maxima-5.13.0/debian/control maxima-5.13.0/debian/control
--- maxima-5.13.0/debian/control
+++ maxima-5.13.0/debian/control
@@ -2,13 +2,13 @@
 Section: math
 Priority: optional
 Maintainer: Camm Maguire <[EMAIL PROTECTED]>
-Build-Depends: gcl ( >= 2.6.7-36 ) , texinfo, libgmp3-dev, libreadline5-dev | 
libreadline-dev, locales, automake1.9, debhelper ( >=4.1.0 ) , libncurses5-dev, 
autoconf2.13, gawk | awk, texlive-late

Bug#492490: [Reportbug-maint] Bug#492490: Bug#492490: [reportbug] Crash

2008-07-26 Thread Sandro Tosi
Hi Gilles,

>> > --- Package information. ---
>> > Depends (Version) | Installed
>> > =-+-===
>> > python   (>= 2.4) | 2.4.4-6
>>
>> Is this version the default on your machine?
>
> So it seemed.  But, in the middle of bigger problems (hence the need of
> "bugreport"), I just did an "aptitude safe-upgrade", and now "bugreport"
> just works again. And now here is what I obtain:
>
> --- Package information. ---
> Depends (Version) | Installed
> =-+-===
> python   (>= 2.4) | 2.5.2-2
> python-central (>= 0.6.7) | 0.6.8
> apt   | 0.7.14+b1
>
>> Here is:
>>
>> $ python -V
>> Python 2.5.2
>>
>> Could you please exec the same command and let me know the result?
>
> The same.
> So, in the end, we won't know in what strange state was the python
> install...

Yeah, I supposed so: python 2.5 is the default on sid/lenny, so there
was something weird on your system, in this case a missing upgrade,
now fixed ;)

> Sorry for the (now wrong) report.

Well, indeed this is a bug, so I'm releasing a new version with
dependency on python (>= 2.5)

Thanks for the report.

Sandro

-- 
Sandro Tosi (aka morph, Morpheus, matrixhasu)
My website: http://matrixhasu.altervista.org/
Me at Debian: http://wiki.debian.org/SandroTosi



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492490: [Reportbug-maint] Bug#492490: [reportbug] Crash

2008-07-26 Thread Gilles Sadowski
Hi.

That was a quick reply; thanks!

[And it was too quick a report too (see below).]

> > --- Package information. ---
> > Depends (Version) | Installed
> > =-+-===
> > python   (>= 2.4) | 2.4.4-6
> 
> Is this version the default on your machine?

So it seemed.  But, in the middle of bigger problems (hence the need of
"bugreport"), I just did an "aptitude safe-upgrade", and now "bugreport"
just works again. And now here is what I obtain:

--- Package information. ---
Depends (Version) | Installed
=-+-===
python   (>= 2.4) | 2.5.2-2
python-central (>= 0.6.7) | 0.6.8
apt   | 0.7.14+b1
 
> Here is:
> 
> $ python -V
> Python 2.5.2
> 
> Could you please exec the same command and let me know the result?

The same.
So, in the end, we won't know in what strange state was the python
install...

Sorry for the (now wrong) report.

Best,
Gilles



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#491977: grub-probe fails with "Cannot find a GRUB drive for /dev/dm-N."

2008-07-26 Thread Felix Zielcke
Am Samstag, den 26.07.2008, 18:00 +0200 schrieb Moritz Naumann:
> 
> debby:~# dpkg-query -W -f '${Package} ${Status} ${Version}\n' grub\*
> grub-common install ok installed 1.96+20080724-1

> Am I missing something? Should I take additional measures before retrying?
> 

Please see the message above in the report, The patch from Robert is in
1.96+20080724-2 not -1 which you have installed.




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492490: [Reportbug-maint] Bug#492490: [reportbug] Crash

2008-07-26 Thread Sandro Tosi
Hello Gilles

On Sat, Jul 26, 2008 at 17:45, Gilles Sadowski
<[EMAIL PROTECTED]> wrote:
> --- Package information. ---
> Depends (Version) | Installed
> =-+-===
> python   (>= 2.4) | 2.4.4-6

Is this version the default on your machine?

Here is:

$ python -V
Python 2.5.2

Could you please exec the same command and let me know the result?

Thanks,
Sandro

-- 
Sandro Tosi (aka morph, Morpheus, matrixhasu)
My website: http://matrixhasu.altervista.org/
Me at Debian: http://wiki.debian.org/SandroTosi



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#491977: grub-probe fails with "Cannot find a GRUB drive for /dev/dm-N."

2008-07-26 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Robert Millan wrote:
> [..] Simply run from your build dir:
> 
>   ./grub-probe -t device /
>   ./grub-probe -t device /boot
> 
> Instead of /dev/dm-X, it should print /dev/md0 or /dev/md2.

While this worked, installing the new grub-common package (from
unstable) didn't change anything. Just to be sure, I also upgraded grub
to the latest legacy version and moved /boot/grub/device.map out of the way.


debby:~# dpkg-query -W -f '${Package} ${Status} ${Version}\n' grub\*
grub install ok installed 0.97-42
grub-choose-default purge ok not-installed
grub-common install ok installed 1.96+20080724-1
grub-efi unknown ok not-installed
grub-ieee1275 unknown ok not-installed
grub-legacy-doc unknown ok not-installed
grub-linuxbios unknown ok not-installed
grub-pc purge ok not-installed
grub2 purge ok not-installed

debby:~# dpkg --configure -a
Setting up linux-image-2.6.25-2-686 (2.6.25-7) ...
Running depmod.
Finding valid ramdisk creators.
Using mkinitramfs-kpkg to build the ramdisk.
Other valid candidates: mkinitramfs-kpkg mkinitrd.yaird
initrd.img(/boot/initrd.img-2.6.25-2-686
) points to /boot/initrd.img-2.6.25-2-686
 (/boot/initrd.img-2.6.25-2-686) -- doing nothing at
/var/lib/dpkg/info/linux-image-2.6.25-2-686.postinst line 569.
vmlinuz(/boot/vmlinuz-2.6.25-2-686
) points to /boot/vmlinuz-2.6.25-2-686
 (/boot/vmlinuz-2.6.25-2-686) -- doing nothing at
/var/lib/dpkg/info/linux-image-2.6.25-2-686.postinst line 569.
Running postinst hook script /usr/sbin/update-grub.
Searching for GRUB installation directory ... found: /boot/grub
grub-probe: error: Cannot find a GRUB drive for /dev/dm-5.  Check your
device.map.

User postinst hook script [/usr/sbin/update-grub] exited with value 1
dpkg: error processing linux-image-2.6.25-2-686 (--configure):
 subprocess post-installation script returned error exit status 1
dpkg: dependency problems prevent configuration of linux-image-2.6-686:
 linux-image-2.6-686 depends on linux-image-2.6.25-2-686; however:
  Package linux-image-2.6.25-2-686 is not configured yet.
dpkg: error processing linux-image-2.6-686 (--configure):
 dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of linux-image-686:
 linux-image-686 depends on linux-image-2.6-686; however:
  Package linux-image-2.6-686 is not configured yet.
dpkg: error processing linux-image-686 (--configure):
 dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of linux-image-2.6-k7:
 linux-image-2.6-k7 depends on linux-image-2.6-686; however:
  Package linux-image-2.6-686 is not configured yet.
dpkg: error processing linux-image-2.6-k7 (--configure):
 dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of linux-image-k7:
 linux-image-k7 depends on linux-image-686; however:
  Package linux-image-686 is not configured yet.
dpkg: error processing linux-image-k7 (--configure):
 dependency problems - leaving unconfigured
Errors were encountered while processing:
 linux-image-2.6.25-2-686
 linux-image-2.6-686
 linux-image-686
 linux-image-2.6-k7
 linux-image-k7
debby:~#

debby:~# /usr/sbin/grub-probe -t device /
/dev/md2
debby:~# /usr/sbin/grub-probe -t device /boot
/dev/md0
debby:~#


Am I missing something? Should I take additional measures before retrying?

Thank in advance.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEAREKAAYFAkiLSiEACgkQn6GkvSd/BgxoQwCeJTmSo6YC8wM+/heQmeyUuvke
bp4AoI4APyNYhxdOu0VQEZMoeWrUA8De
=QSO6
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#492479: texlife-base: error during upgrade

2008-07-26 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> reassign 492479 texlive-base
Bug#492479: texlife-base: error during upgrade
Warning: Unknown package 'texlife-base'
Bug reassigned from package `texlife-base' to `texlive-base'.

> --
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492490: [reportbug] Crash

2008-07-26 Thread Gilles Sadowski
Package: reportbug
Version: 3.43
Severity: critical

--- Please enter the report below this line. ---

Hi.

Trying to run the program:

$ reportbug
Traceback (most recent call last):
  File "/usr/bin/reportbug", line 1823, in ?
main()
  File "/usr/bin/reportbug", line 832, in main
lib_package = __import__('reportbuglib', fromlist=[iface])
TypeError: __import__() takes no keyword arguments


[I had to install "reportbug-ng" to report this. :-/ ]

Best regards,
Gilles

--- System information. ---
Architecture: amd64
Kernel:   Linux 2.6.25.11-vs2.3.0.34.14+g1

Debian Release: lenny/sid
  500 unstabledebian.inode.at 
  500 testing security.debian.org 
  500 testing debian.inode.at 
  500 stable  security.debian.org 
  500 stable  debian.inode.at 
  500 stable  debian-multimedia.informatik.uni-erlangen.de 

--- Package information. ---
Depends (Version) | Installed
=-+-===
python   (>= 2.4) | 2.4.4-6
python-central (>= 0.6.7) | 0.6.8
apt   | 0.7.14+b1



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492488: iceweasel: crashes on startup (x64)

2008-07-26 Thread Michele Baldessari
Package: iceweasel
Version: 3.0.1-1
Severity: grave
Justification: renders package unusable

Hi,

I just dist-upgraded to sid and now iceweasel crashes on startup.
I removed all traces of system or user plugins, and .mozilla profiles,
and still the problem persists. 
Even trying with "iceweasel -safe-mode" does not help.

I'm attaching the backtrace [1]

Let me know if you need further info.

regards,
Michele

[1]:

System: Linux 2.6.25-2-amd64 #1 SMP Mon Jul 14 11:05:23 UTC 2008 x86_64
X Vendor: The X.Org Foundation
X Vendor Release: 10402000
Selinux: No
Accessibility: Disabled
GTK+ Theme: Clearlooks
Icon Theme: gnome

Memory status: size: 379949056 vsize: 379949056 resident: 33644544 share: 
20262912 rss: 33644544 rss_rlim: 18446744073709551615
CPU usage: start_time: 1217085639 rtime: 80 utime: 70 stime: 10 cutime:0 
cstime: 0 timeout: 0 it_real_value: 0 frequency: 100

Backtrace was generated from '/usr/lib/bug-buddy/firefox-bin'

[Thread debugging using libthread_db enabled]
[New Thread 0x7f292e16f6f0 (LWP 5339)]
[New Thread 0x430c6950 (LWP 5349)]
[New Thread 0x420c4950 (LWP 5346)]
[New Thread 0x418c3950 (LWP 5345)]
0x7f292d7b2b9f in waitpid () from /lib/libc.so.6
#0  0x7f292d7b2b9f in waitpid () from /lib/libc.so.6
#1  0x7f2928faa719 in g_spawn_sync () from /usr/lib/libglib-2.0.so.0
#2  0x7f2928faaa28 in g_spawn_command_line_sync ()
   from /usr/lib/libglib-2.0.so.0
#3  0x7f2923b6c4b3 in ?? ()
   from /usr/lib/gtk-2.0/modules/libgnomebreakpad.so
#4  0x7f292bcdffdb in nsProfileLock::FatalSignalHandler (signo=11)
at nsProfileLock.cpp:216
#5  
#6  0x7f292be59b0a in nsFrame::BoxReflow (this=0x257f838, 
[EMAIL PROTECTED], aPresContext=0x2579e30, 
[EMAIL PROTECTED], aRenderingContext=0x25d4ae0, aX=6000, 
aY=6000, aWidth=0, aHeight=0, aMoveFrame=1) at nsFrame.cpp:6302
#7  0x7f292be59f70 in nsFrame::DoLayout (this=0x257f3e0, 
[EMAIL PROTECTED]) at nsFrame.cpp:6108
#8  0x7f292bf148fd in nsIFrame::Layout (this=0x257f838, 
[EMAIL PROTECTED]) at nsBox.cpp:561
#9  0x7f292be6862e in LayoutAndInvalidate ([EMAIL PROTECTED], 
aBox=0x257f838, [EMAIL PROTECTED]) at nsGfxScrollFrame.cpp:2480
#10 0x7f292be691f8 in nsGfxScrollFrameInner::LayoutScrollbars (
this=0x257f458, [EMAIL PROTECTED], [EMAIL PROTECTED], 
[EMAIL PROTECTED], [EMAIL PROTECTED])
at nsGfxScrollFrame.cpp:2542
#11 0x7f292be6befd in nsHTMLScrollFrame::Reflow (this=0x257f3e0, 
aPresContext=, [EMAIL PROTECTED], 
[EMAIL PROTECTED], [EMAIL PROTECTED])
at nsGfxScrollFrame.cpp:823
#12 0x7f292be577cb in nsContainerFrame::ReflowChild (
this=, aKidFrame=0x257f3e0, aPresContext=0x2579e30, 
[EMAIL PROTECTED], [EMAIL PROTECTED], aX=0, aY=0, 
aFlags=0, [EMAIL PROTECTED], aTracker=0x0)
at nsContainerFrame.cpp:771
#13 0x7f292be9d3c6 in ViewportFrame::Reflow (this=0x257f0b0, 
aPresContext=0x2579e30, [EMAIL PROTECTED], 
[EMAIL PROTECTED], [EMAIL PROTECTED])
at nsViewportFrame.cpp:286
#14 0x7f292be3a05b in PresShell::DoReflow (this=0x257d4c0, 
target=0x257f0b0) at nsPresShell.cpp:6280
#15 0x7f292be3d56f in PresShell::ProcessReflowCommands (this=0x257d4c0, 
aInterruptible=1) at nsPresShell.cpp:6386
#16 0x7f292be3d6a2 in PresShell::DoFlushPendingNotifications (
this=0x257d4c0, aType=Flush_Layout, aInterruptibleReflow=1)
at nsPresShell.cpp:4574
#17 0x7f292be3d722 in PresShell::ReflowEvent::Run (
this=) at nsPresShell.cpp:6145
#18 0x7f292c41286e in nsThread::ProcessNextEvent (this=0x1d40cb0, 
mayWait=1, result=0x7fff3619141c) at nsThread.cpp:510
#19 0x7f292c3e837e in NS_ProcessNextEvent_P (thread=0x257f3e0, mayWait=1)
at nsThreadUtils.cpp:230
#20 0x7f292c36c87d in nsBaseAppShell::Run (this=0x234af50)
at nsBaseAppShell.cpp:170
#21 0x7f292c24ef71 in nsAppStartup::Run (this=0x23ac2c0)
at nsAppStartup.cpp:181
#22 0x7f292bcd9ae9 in XRE_main (argc=, 
argv=, aAppData=)
at nsAppRunner.cpp:3182
#23 0x004015b1 in main (argc=3, argv=0x7fff36192a38)
at nsXULStub.cpp:421

Thread 4 (Thread 0x418c3950 (LWP 5345)):
#0  0x7f292d7dbd26 in poll () from /lib/libc.so.6
No symbol table info available.
#1  0x7f292cdb1667 in _pr_poll_with_poll (pds=0x1e0b408, npds=1, 
timeout=4294967295) at ptio.c:3895
stack_syspoll = {{fd = 21, events = 1, revents = 0}, {fd = 386, 
events = 1, revents = 0}, {fd = 0, events = 0, revents = 0}, {
fd = 30233592, events = 0, revents = 0}, {fd = 1099705920, events = 0, 
revents = 0}, {fd = 1099705864, events = 0, revents = 0}, {
fd = -1538124099, events = 0, revents = 0}, {fd = 1099705840, events = 0, 
revents = 0}, {fd = 0, events = 0, revents = 0}, {fd = 771237342, 
events = 32553, revents = 0}, {fd = 0, events = 0, revents = 0}, {fd = 0, 
events = 0, revents = 0}, {fd = 5, events = 0, revents = 0}, {fd = 0, 
events = 0, revents = 0}, {fd = 1, events = 0, revents = 0}, {
fd = 30326832, events =

Bug#480307: notfixed 480307 in fp-ide/2.2.0-dfsg1-8

2008-07-26 Thread Lucas Nussbaum
# Automatically generated email from bts, devscripts version 2.10.33
# fix versioning
notfixed 480307 fp-ide/2.2.0-dfsg1-8




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: notfixed 480307 in fp-ide/2.2.0-dfsg1-8

2008-07-26 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.10.33
> # fix versioning
> notfixed 480307 fp-ide/2.2.0-dfsg1-8
Bug#480307: fp-ide: Crashes on startup...still.
Bug no longer marked as fixed in version fp-ide/2.2.0-dfsg1-8.

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#492484: Sould be available for other architectures in addition to AMD64

2008-07-26 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 492484 wishlist
Bug#492484: Sould be available for other architectures in addition to AMD64
Severity set to `wishlist' from `grave'

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: setting package to audio-cd libaudio-cd-perl, tagging 486073

2008-07-26 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.10.34
> # via tagpending
> #
> # audio-cd (0.05-7) UNRELEASED; urgency=low
> #
> #  * debian/rules
> #- replaced pwd with $(CURDIR); thanks to Niko Tyni for the report; 
> Closes:
> #  #486073
> #
> package audio-cd libaudio-cd-perl
Ignoring bugs not assigned to: audio-cd libaudio-cd-perl

> tags 486073 + pending
Bug#486073: libaudio-cd-perl: empty package on several architectures [sudo and 
$(PWD)]
There were no tags set.
Tags added: pending

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#486073: setting package to audio-cd libaudio-cd-perl, tagging 486073

2008-07-26 Thread Sandro Tosi
# Automatically generated email from bts, devscripts version 2.10.34
# via tagpending 
#
# audio-cd (0.05-7) UNRELEASED; urgency=low
#
#  * debian/rules
#- replaced pwd with $(CURDIR); thanks to Niko Tyni for the report; Closes:
#  #486073
#

package audio-cd libaudio-cd-perl
tags 486073 + pending




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492484: Sould be available for other architectures in addition to AMD64

2008-07-26 Thread Juhapekka Tolvanen

Package: icedtea-gcjwebplugin
Version: 1.0-2
Severity: grave


I have a computer of IA32-architecture. Binarypackages of this plugin
are only available for AMD64. But I really can build this package in my
computer and actually use it. So, what's up?


-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (1100, 'testing'), (990, 'stable'), (500, 
'testing-proposed-updates'), (500, 'proposed-updates'), (101, 'testing'), (99, 
'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.25-2-686 (SMP w/1 CPU core)
Locale: LANG=fi_FI.utf8, LC_CTYPE=fi_FI.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages icedtea-gcjwebplugin depends on:
ii  libatk1.0-0   1.22.0-1   The ATK accessibility toolkit
ii  libc6 2.7-12 GNU C Library: Shared libraries
ii  libcairo2 1.6.4-6The Cairo 2D vector graphics libra
ii  libgcc1   1:4.3.1-7  GCC support library
ii  libglib2.0-0  2.16.4-2   The GLib library of C routines
ii  libgtk2.0-0   2.12.11-3  The GTK+ graphical user interface 
ii  libnspr4-0d   4.7.1-3NetScape Portable Runtime Library
ii  libpango1.0-0 1.20.5-1   Layout and rendering of internatio
ii  libstdc++64.3.1-7The GNU Standard C++ Library v3
ii  openjdk-6-jre 6b11-2 OpenJDK Java runtime

icedtea-gcjwebplugin recommends no packages.

icedtea-gcjwebplugin suggests no packages.

-- no debconf information

-- 
Juhapekka "naula" Tolvanen * http colon slash slash iki dot fi slash juhtolv
"Boku wa ongakuka dentaku katate ni. Tashitari. Hiitari. Sousa shite.
Sakkyoku suru. Kono botan oseba ongaku kanaderu."  Kraftwerk



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: notfixed 490160 in libqt4-webkit/4.4.0-4

2008-07-26 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.10.33
> # clean up versioning
> notfixed 490160 libqt4-webkit/4.4.0-4
Bug#490160: libqt4-webkit / arora: SIGBUS on sparc
Bug no longer marked as fixed in version libqt4-webkit/4.4.0-4.

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#490160: notfixed 490160 in libqt4-webkit/4.4.0-4

2008-07-26 Thread Lucas Nussbaum
# Automatically generated email from bts, devscripts version 2.10.33
# clean up versioning
notfixed 490160 libqt4-webkit/4.4.0-4




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#486354: iceweasel: Iceweasel rc2 does not start

2008-07-26 Thread Jan van de W
Package: iceweasel
Version: 3.0.1-1

--- Please enter the report below this line. ---

Same here after 3.0 arrived in testing. On startup Iceweasel reports a
segmentation fault. I upgraded to the version from unstable but no luck.
Whether I use -safe-mode or remove my .mozilla profile does not make a
difference. However, when I run iceweasel -g, it apparently runs without
problems and I can use the browser. There seems to be a difference
between running iceweasel with or without gdb.

bye,
Jan

--- System information. ---
Architecture: i386
Kernel:   Linux 2.6.25-2-686

Debian Release: lenny/sid
  700 testing ftp.nl.debian.org

--- Package information. ---
Depends(Version) | Installed
-+-===
fontconfig   | 2.6.0-1
psmisc   | 22.6-1
procps   | 1:3.2.7-8
debianutils(>= 1.16) | 2.30
libc6 (>= 2.7-1) | 2.7-10
libgcc1 (>= 1:4.1.1) | 1:4.3.1-2
libglib2.0-0 (>= 2.12.0) | 2.16.4-2
libgtk2.0-0  (>= 2.12.0) | 2.12.10-2
libnspr4-0d(>= 1.8.0.10) | 4.7.1-3
libstdc++6(>= 4.1.1) | 4.3.1-2
xulrunner-1.9 (>> 1.9~rc2-5) | 1.9.0.1-1





-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492483: pcx_1.1.18-1(hppa/unstable): FTBFS: build depends on g77

2008-07-26 Thread Frank Lichtenheld
Package: pcx
Version: 1.1.18-1
Severity: serious

Hi,

your package failed to build from source.

| Automatic build of pcx_1.1.18-1 on lofn by sbuild/hppa 98-farm
| Build started at 20080726-1404
| **
| Checking available source versions...
| Fetching source files...
| Reading package lists...
| Building dependency tree...
| Need to get 465kB of source archives.
| Get:1 http://sinclair.farm.ftbfs.de sid/non-free pcx 1.1.18-1 (dsc) [1090B]
| Get:2 http://sinclair.farm.ftbfs.de sid/non-free pcx 1.1.18-1 (tar) [450kB]
| Get:3 http://sinclair.farm.ftbfs.de sid/non-free pcx 1.1.18-1 (diff) [14.3kB]
| Fetched 465kB in 0s (802kB/s)
| Download complete and in download only mode
| ** Using build dependencies supplied by package:
| Build-Depends: debhelper (>= 4.0), csh | c-shell, g77
| Checking for already installed source dependencies...
| debhelper: missing
| Using default version 7.0.16 (Priority: 500)
| csh: missing
| Using default version 20070713-1 (Priority: 500)
| c-shell: missing
| No default version. Virtual package?
| g77: missing
| No default version. Virtual package?
| Checking for source dependency conflicts...
|   /usr/bin/sudo /usr/bin/apt-get --purge $CHROOT_OPTIONS -q -y install 
debhelper csh g77
| Reading package lists...
| Building dependency tree...
| E: Package g77 has no installation candidate
| Package g77 is not available, but is referred to by another package.
| This may mean that the package is missing, has been obsoleted, or
| is only available from another source
| apt-get failed.
| Package installation failed
| Trying to reinstall removed packages:
| Trying to uninstall newly installed packages:
| Source-dependencies not satisfied; skipping pcx
| **
| Finished at 20080726-1404
| Build needed 00:00:00, 0k disk space

Full build log(s): 
http://experimental.ftbfs.de/build.php?&ver=1.1.18-1&pkg=pcx&arch=hppa

Gruesse,
-- 
Frank Lichtenheld <[EMAIL PROTECTED]>
www: http://www.djpig.de/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492482: texlive-base: error with fmtutil-sys when upgrading to -3

2008-07-26 Thread Julien Langer
Package: texlive-base
Version: 2007.dfsg.1-3
Severity: grave
Justification: renders package unusable

I get the following error when upgrading to -3:
setting up texlive-base (2007.dfsg.1-3) ...
Running mktexlsr. This may take some time... done.
Building format(s) --all.
This may take some time... 
fmtutil-sys failed. Output has been stored in
/tmp/fmtutil.kSb17790
Please include this file if you report a bug.

dpkg: error processing texlive-base (--configure):
 subprocess post-installation script returned error exit status 1


the contents of /tmp/fmtutil.kSb17790

% cat /tmp/fmtutil.kSb17790
% [16:10]
fmtutil: running `mf-nowin -ini   -jobname=mf -progname=mf
-translate-file=cp227.tcx mf.ini' ...
This is METAFONT, Version 2.71828 (Web2C 7.5.6) (INIMF)
(/usr/share/texmf-texlive/web2c/cp227.tcx)
(/usr/share/texmf-texlive/metafont/config/mf.ini
(/usr/share/texmf-texlive/metafont/base/plain.mf
Preloading the plain base, version 2.71: preliminaries,
 basic constants and mathematical macros,
 macros for converting from device-independent units to pixels,
 macros and tables for various modes of operation,
 macros for drawing and filling,
 macros for proof labels and rules,
 macros for character and font administration,
and a few last-minute items.) (/etc/texmf/metafont/misc/modes.mf) )
Beginning to dump on file mf.base
 (base=mf 2008.7.26)
2224 strings of total length 29910
11865 memory locations dumped; current usage is 3658&7845
1003 symbolic tokens
Transcript written on mf.log.
fmtutil: /var/lib/texmf/web2c/metafont/mf.base installed.
fmtutil: running `pdftex -ini   -jobname=etex -progname=etex
-translate-file=cp227.tcx *etex.ini' ...
This is pdfTeXk, Version 3.141592-1.40.3 (Web2C 7.5.6) (INITEX)
 %&-line parsing enabled.
 (/usr/share/texmf-texlive/web2c/cp227.tcx)
entering extended mode
(/usr/share/texmf-texlive/tex/plain/config/etex.ini
(/usr/share/texmf-texlive/tex/plain/etex/etex.src
(/usr/share/texmf-texlive/tex/plain/base/plain.tex
Preloading the plain format: codes, registers, parameters, fonts, more
fonts,
macros, math definitions, output routines, hyphenation
(/usr/share/texmf-texlive/tex/generic/hyphen/hyphen.tex
[skipping from \patterns to end-of-file...]))
(/usr/share/texmf-texlive/tex/plain/etex/etexdefs.lib
Skipping module "grouptypes"; Loading module "interactionmodes";
Skipping module "nodetypes"; Skipping module "iftypes";)
(/usr/share/texmf-texlive/tex/plain/config/language.def
(/usr/share/texmf-texlive/tex/generic/hyphen/hyphen.tex))
Augmenting the Plain TeX definitions: \tracingall;
Adding new e-TeX definitions: \eTeX, \loggingall, \tracingnone,
register allocation; extended register allocation; 
Recycling: \addlanguage, [EMAIL PROTECTED] (not defined), [EMAIL PROTECTED], 
[EMAIL PROTECTED],
[EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], 
[EMAIL PROTECTED],
[EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], 
[EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED] (not defined), [EMAIL PROTECTED] (not defined), [EMAIL 
PROTECTED] (not defined),
[EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], 
Retaining: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL 
PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED]@@d, [EMAIL PROTECTED]@ad, [EMAIL PROTECTED], [EMAIL 
PROTECTED], [EMAIL PROTECTED], \eTeX,
\etexhdrchk,
\etexstatus, \module, \uselanguage, [EMAIL PROTECTED], [EMAIL PROTECTED],) )
Beginning to dump on file etex.fmt
 (format=etex 2008.7.26)
2836 strings of total length 41448
7953 memory locations dumped; current usage is 197&7289
1247 multiletter control sequences
\font\nullfont=nullfont
\font\tenrm=cmr10
\font\preloaded=cmr9
\font\preloaded=cmr8
\font\sevenrm=cmr7
\font\preloaded=cmr6
\font\fiverm=cmr5
\font\teni=cmmi10
\font\preloaded=cmmi9
\font\preloaded=cmmi8
\font\seveni=cmmi7
\font\preloaded=cmmi6
\font\fivei=cmmi5
\font\tensy=cmsy10
\font\preloaded=cmsy9
\font\preloaded=cmsy8
\font\sevensy=cmsy7
\font\preloaded=cmsy6
\font\fivesy=cmsy5
\font\tenex=cmex10
\font\preloaded=cmss10
\font\preloaded=cmssq8
\font\preloaded=cmssi10
\font\preloaded=cmssqi8
\font\tenbf=cmbx10
\font\preloaded=cmbx9
\font\preloaded=cmbx8
\font\sevenbf=cmbx7
\font\preloaded=cmbx6
\font\fivebf=cmbx5
\font\tentt=cmtt10
\font\preloaded=cmtt9
\font\preloaded=cmtt8
\font\preloaded=cmsltt10
\font\tensl=cmsl10
\font\preloaded=cmsl9
\font\preloaded=cmsl8
\font\tenit=cmti10
\font\preloaded=cmti9
\font\preloaded=cmti8
\font\preloaded=cmti7
\font\preloaded=cmu10
\font\preloaded=cmmib10
\font\preloaded=cmbsy10
\font\preloaded=cmcsc10
\font\preloaded=cmssbx10
\font\preloaded=cmdunh10
\font\preloaded=cmr7 at 14.51799pt
\font\preloaded=cmtt10 at 14.4pt
\font\preloaded=cmssbx10 at 14.4pt
\font\preloaded=manfnt
14787 words of font info for 50 preloaded fonts
14 hyphenation exceptions
Hyphenation trie of length 6075 has 181 ops out of 35111
  181 for language 0
No pages of output.
Transcript written on etex.log.

Bug#492479: texlife-base: error during upgrade

2008-07-26 Thread Julien Langer
Package: texlife-base
Version: 2007.dfsg.1-3
Severity: grave
Justification: renders package unusable

I get the following error when upgrading:
etting up texlive-base (2007.dfsg.1-3) ...
Running mktexlsr. This may take some time... done.
Building format(s) --all.
This may take some time... 
fmtutil-sys failed. Output has been stored in
/tmp/fmtutil.kSb17790
Please include this file if you report a bug.

dpkg: error processing texlive-base (--configure):
 subprocess post-installation script returned error exit status 1


the contents of /tmp/fmtutil.kSb17790

% cat /tmp/fmtutil.kSb17790
% [16:10]
fmtutil: running `mf-nowin -ini   -jobname=mf -progname=mf
-translate-file=cp227.tcx mf.ini' ...
This is METAFONT, Version 2.71828 (Web2C 7.5.6) (INIMF)
(/usr/share/texmf-texlive/web2c/cp227.tcx)
(/usr/share/texmf-texlive/metafont/config/mf.ini
(/usr/share/texmf-texlive/metafont/base/plain.mf
Preloading the plain base, version 2.71: preliminaries,
 basic constants and mathematical macros,
 macros for converting from device-independent units to pixels,
 macros and tables for various modes of operation,
 macros for drawing and filling,
 macros for proof labels and rules,
 macros for character and font administration,
and a few last-minute items.) (/etc/texmf/metafont/misc/modes.mf) )
Beginning to dump on file mf.base
 (base=mf 2008.7.26)
2224 strings of total length 29910
11865 memory locations dumped; current usage is 3658&7845
1003 symbolic tokens
Transcript written on mf.log.
fmtutil: /var/lib/texmf/web2c/metafont/mf.base installed.
fmtutil: running `pdftex -ini   -jobname=etex -progname=etex
-translate-file=cp227.tcx *etex.ini' ...
This is pdfTeXk, Version 3.141592-1.40.3 (Web2C 7.5.6) (INITEX)
 %&-line parsing enabled.
 (/usr/share/texmf-texlive/web2c/cp227.tcx)
entering extended mode
(/usr/share/texmf-texlive/tex/plain/config/etex.ini
(/usr/share/texmf-texlive/tex/plain/etex/etex.src
(/usr/share/texmf-texlive/tex/plain/base/plain.tex
Preloading the plain format: codes, registers, parameters, fonts, more
fonts,
macros, math definitions, output routines, hyphenation
(/usr/share/texmf-texlive/tex/generic/hyphen/hyphen.tex
[skipping from \patterns to end-of-file...]))
(/usr/share/texmf-texlive/tex/plain/etex/etexdefs.lib
Skipping module "grouptypes"; Loading module "interactionmodes";
Skipping module "nodetypes"; Skipping module "iftypes";)
(/usr/share/texmf-texlive/tex/plain/config/language.def
(/usr/share/texmf-texlive/tex/generic/hyphen/hyphen.tex))
Augmenting the Plain TeX definitions: \tracingall;
Adding new e-TeX definitions: \eTeX, \loggingall, \tracingnone,
register allocation; extended register allocation; 
Recycling: \addlanguage, [EMAIL PROTECTED] (not defined), [EMAIL PROTECTED], 
[EMAIL PROTECTED],
[EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], 
[EMAIL PROTECTED],
[EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], 
[EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED] (not defined), [EMAIL PROTECTED] (not defined), [EMAIL 
PROTECTED] (not defined),
[EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], 
Retaining: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL 
PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED]@@d, [EMAIL PROTECTED]@ad, [EMAIL PROTECTED], [EMAIL 
PROTECTED], [EMAIL PROTECTED], \eTeX,
\etexhdrchk,
\etexstatus, \module, \uselanguage, [EMAIL PROTECTED], [EMAIL PROTECTED],) )
Beginning to dump on file etex.fmt
 (format=etex 2008.7.26)
2836 strings of total length 41448
7953 memory locations dumped; current usage is 197&7289
1247 multiletter control sequences
\font\nullfont=nullfont
\font\tenrm=cmr10
\font\preloaded=cmr9
\font\preloaded=cmr8
\font\sevenrm=cmr7
\font\preloaded=cmr6
\font\fiverm=cmr5
\font\teni=cmmi10
\font\preloaded=cmmi9
\font\preloaded=cmmi8
\font\seveni=cmmi7
\font\preloaded=cmmi6
\font\fivei=cmmi5
\font\tensy=cmsy10
\font\preloaded=cmsy9
\font\preloaded=cmsy8
\font\sevensy=cmsy7
\font\preloaded=cmsy6
\font\fivesy=cmsy5
\font\tenex=cmex10
\font\preloaded=cmss10
\font\preloaded=cmssq8
\font\preloaded=cmssi10
\font\preloaded=cmssqi8
\font\tenbf=cmbx10
\font\preloaded=cmbx9
\font\preloaded=cmbx8
\font\sevenbf=cmbx7
\font\preloaded=cmbx6
\font\fivebf=cmbx5
\font\tentt=cmtt10
\font\preloaded=cmtt9
\font\preloaded=cmtt8
\font\preloaded=cmsltt10
\font\tensl=cmsl10
\font\preloaded=cmsl9
\font\preloaded=cmsl8
\font\tenit=cmti10
\font\preloaded=cmti9
\font\preloaded=cmti8
\font\preloaded=cmti7
\font\preloaded=cmu10
\font\preloaded=cmmib10
\font\preloaded=cmbsy10
\font\preloaded=cmcsc10
\font\preloaded=cmssbx10
\font\preloaded=cmdunh10
\font\preloaded=cmr7 at 14.51799pt
\font\preloaded=cmtt10 at 14.4pt
\font\preloaded=cmssbx10 at 14.4pt
\font\preloaded=manfnt
14787 words of font info for 50 preloaded fonts
14 hyphenation exceptions
Hyphenation trie of length 6075 has 181 ops out of 35111
  181 for language 0
No pages of output.
Transcript written on etex.log.
fmtuti

Bug#492455: fix for 492455

2008-07-26 Thread peter green

tags 492455 +patch
thanks

The attatched debian/rules file has been modified to only build that 
plugin on i386 only (I don't think any via chips support amd64 and even 
if they do the current padlock code won't build on it)



#!/usr/bin/make -f
# Sample debian/rules that uses debhelper.
# GNU copyright 1997 to 1999 by Joey Hess.

# Uncomment this to turn on verbose mode.
#export DH_VERBOSE=1

export DH_OPTIONS

# this is a security-critical package, set all the options we can
export DEB_BUILD_HARDENING=1

CONFIGUREARGS := --prefix=/usr --sysconfdir=/etc --localstatedir=/var \
--libexecdir=/usr/lib \
--enable-http --enable-ldap \
--enable-nonblocking --enable-thread \
--enable-smartcard --enable-cisco-quirks \
--with-default-pkcs11=/usr/lib/opensc-pkcs11.so \
--enable-xml \
--enable-p2p --enable-manager \
--enable-openssl
# Could enable --enable-nat-transport, but this is actually insecure,
# so don't!
# And for --enable-eap-sim we would need the library, which we don't
# have right now.

DEB_BUILD_ARCH_CPU ?=$(shell dpkg-architecture -qDEB_BUILD_ARCH_CPU)

#the padlock plugin only makes sense on i386 
ifeq ($(DEB_BUILD_ARCH_CPU),i386)
  CONFIGUREARGS += --enable-padlock
endif


configure: configure-stamp
configure-stamp: patch
dh_testdir
# Add here commands to configure the package.
./configure $(CONFIGUREARGS)

touch configure-stamp

patch:
dh_testdir
dpatch apply-all

unpatch:
dpatch deapply-all

build: build-stamp
build-stamp: configure-stamp
$(MAKE)

touch build-stamp

clean: unpatch
dh_testdir
dh_testroot
rm -f build-stamp configure-stamp

-$(MAKE) clean
#-$(MAKE) -C programs/fswcert/ clean
# after a make clean, no binaries _should_ be left, but 
-find $(CURDIR) -name "*.o" | xargs --no-run-if-empty rm
-find $(CURDIR)/lib/libcrypto -name "*.a" | xargs --no-run-if-empty rm

# Really clean (#356716)
# This is a hack: should be better implemented
rm -f lib/libstrongswan/libstrongswan.a || true
rm -f lib/libstrongswan/liboswlog.a || true

# just in case something went wrong
rm -f $(CURDIR)/debian/ipsec.secrets

# and make sure that template are up-to-date
debconf-updatepo

dh_clean

install-strongswan: DH_OPTIONS=-a
install-strongswan: build-stamp
dh_testdir
dh_testroot
dh_installdirs

# Add here commands to install the package into debian/tmp.
$(MAKE) install DESTDIR=$(CURDIR)/debian/strongswan
install --mode=0600 $(CURDIR)/debian/ipsec.secrets.proto 
$(CURDIR)/debian/strongswan/etc/ipsec.secrets
# also "patch" ipsec.conf to include the debconf-managed file
echo >> $(CURDIR)/debian/strongswan/etc/ipsec.conf
echo "include /var/lib/strongswan/ipsec.conf.inc" >> 
$(CURDIR)/debian/strongswan/etc/ipsec.conf
# and to enable both IKEv1 and IKEv2 by default
sed -r 's/^[ \t]+# *plutostart=(yes|no) */\tplutostart=yes/;s/^[ \t]+# 
*charonstart=(yes|no) */\tcharonstart=yes/' < 
$(CURDIR)/debian/strongswan/etc/ipsec.conf > 
$(CURDIR)/debian/strongswan/etc/ipsec.conf.tmp
mv $(CURDIR)/debian/strongswan/etc/ipsec.conf.tmp 
$(CURDIR)/debian/strongswan/etc/ipsec.conf

# this is handled by update-rc.d
rm -rf $(CURDIR)/debian/strongswan/etc/rc?.d

dh_installdocs -pstrongswan -n
# change the paths in the installed doc files (but only in regular 
# files, not in links to the outside of the build tree !)
# TODO: check if we still need this
( cd $(CURDIR)/debian/strongswan/; \
  for f in `grep "/usr/local/" --recursive --files-with-match *`; \
  do \
if [ -f $$f -a ! -L $$f ]; then \
cp $$f $$f.old; \
sed 's/\/usr\/local\//\/usr\//' $$f.old > $$f; \
rm $$f.old; \
fi; \
  done )

# the logcheck ignore files
install -D --mode=0600 $(CURDIR)/debian/logcheck.ignore.paranoid 
$(CURDIR)/debian/strongswan/etc/logcheck/ignore.d.paranoid/strongswan
install -D --mode=0600 $(CURDIR)/debian/logcheck.ignore.server 
$(CURDIR)/debian/strongswan/etc/logcheck/ignore.d.server/strongswan
install -D --mode=0600 $(CURDIR)/debian/logcheck.ignore.server 
$(CURDIR)/debian/strongswan/etc/logcheck/ignore.d.workstation/strongswan
install -D --mode=0600 $(CURDIR)/debian/logcheck.violations.ignore 
$(CURDIR)/debian/strongswan/etc/logcheck/violations.ignore.d/strongswan

# set permissions on ipsec.secrets
chmod 600 $(CURDIR)/debian/strongswan/etc/ipsec.secrets
#chmod 644 $(CURDIR)/debian/strongswan/etc/ipsec.conf
chmod 700 -R $(CURDIR)/debian/stron

Processed: fix for 492455

2008-07-26 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 492455 +patch
Bug#492455: strongswan: FTBFS: Uses i386 assembler on non-i386 arches.
There were no tags set.
Tags added: patch

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#490305: kazehakase: Segfault on startup; ruby-related

2008-07-26 Thread narcan

with my Debian Sid ("dist-upgraded") same issue.

But on testing and on Sid with root account I can start several times 
kazehakase without issue.

just this message :

(kazehakase:4778): Kazehakase-WARNING **: While connecting to session 
manager:
Authentication Rejected, reason : None of the authentication protocols 
specified are supported and host-based authentication failed.


I checked if clip.xml was in /root/.kazehakase/
the answer was YES :)

I hope my messages will can help the package maintainer.





--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492364: marked as done (swi-prolog-xpce: file conflict(s?) with spi-prolog)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 11:47:34 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#492364: fixed in swi-prolog 5.6.58-2
has caused the Debian Bug report #492364,
regarding swi-prolog-xpce: file conflict(s?) with spi-prolog
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
492364: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492364
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: swi-prolog-xpce
Version: 5.6.58-1
Severity: grave
Justification: renders package unusable (uninstallable)

Presumably as a side effect of switching to dh_install,
swi-prolog-xpce now contains at least one file already present in
swi-prolog:

Preparing to replace swi-prolog-xpce 5.6.57-1 (using 
.../swi-prolog-xpce_5.6.58-1_amd64.deb) ...
Unpacking replacement swi-prolog-xpce ...
dpkg: error processing 
/var/cache/apt/archives/swi-prolog-xpce_5.6.58-1_amd64.deb (--unpack):
 trying to overwrite `/usr/lib/swi-prolog/swipl', which is also in package 
swi-prolog
dpkg-deb: subprocess paste killed by signal (Broken pipe)

Could you please refine swi-prolog-xpce.install appropriately?

Thanks!

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.25.11 (SMP w/2 CPU cores)
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/dash


--- End Message ---
--- Begin Message ---
Source: swi-prolog
Source-Version: 5.6.58-2

We believe that the bug you reported is fixed in the latest version of
swi-prolog, which is due to be installed in the Debian FTP archive:

swi-prolog-clib_5.6.58-2_i386.deb
  to pool/main/s/swi-prolog/swi-prolog-clib_5.6.58-2_i386.deb
swi-prolog-http_5.6.58-2_i386.deb
  to pool/main/s/swi-prolog/swi-prolog-http_5.6.58-2_i386.deb
swi-prolog-odbc_5.6.58-2_i386.deb
  to pool/main/s/swi-prolog/swi-prolog-odbc_5.6.58-2_i386.deb
swi-prolog-semweb_5.6.58-2_i386.deb
  to pool/main/s/swi-prolog/swi-prolog-semweb_5.6.58-2_i386.deb
swi-prolog-sgml_5.6.58-2_i386.deb
  to pool/main/s/swi-prolog/swi-prolog-sgml_5.6.58-2_i386.deb
swi-prolog-table_5.6.58-2_i386.deb
  to pool/main/s/swi-prolog/swi-prolog-table_5.6.58-2_i386.deb
swi-prolog-xpce_5.6.58-2_i386.deb
  to pool/main/s/swi-prolog/swi-prolog-xpce_5.6.58-2_i386.deb
swi-prolog_5.6.58-2.diff.gz
  to pool/main/s/swi-prolog/swi-prolog_5.6.58-2.diff.gz
swi-prolog_5.6.58-2.dsc
  to pool/main/s/swi-prolog/swi-prolog_5.6.58-2.dsc
swi-prolog_5.6.58-2_i386.deb
  to pool/main/s/swi-prolog/swi-prolog_5.6.58-2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Chris Lamb <[EMAIL PROTECTED]> (supplier of updated swi-prolog package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Fri, 25 Jul 2008 22:59:28 +0100
Source: swi-prolog
Binary: swi-prolog swi-prolog-clib swi-prolog-http swi-prolog-semweb 
swi-prolog-sgml swi-prolog-table swi-prolog-odbc swi-prolog-xpce
Architecture: source i386
Version: 5.6.58-2
Distribution: unstable
Urgency: low
Maintainer: Chris Lamb <[EMAIL PROTECTED]>
Changed-By: Chris Lamb <[EMAIL PROTECTED]>
Description: 
 swi-prolog - ISO/Edinburgh-style Prolog interpreter
 swi-prolog-clib - SWI-Prolog interface to system libraries
 swi-prolog-http - HTTP libraries for SWI-Prolog
 swi-prolog-odbc - ODBC library for SWI-Prolog
 swi-prolog-semweb - SWI-Prolog library for manipulating RDF triples
 swi-prolog-sgml - SGML/XML/HTML parser for SWI-Prolog
 swi-prolog-table - External table library for SWI-Prolog
 swi-prolog-xpce - User interface library for SWI-Prolog
Closes: 492364
Changes: 
 swi-prolog (5.6.58-2) unstable; urgency=low
 .
   * Fix regression when moving from dh_movefiles to dh_install. dh_install
 only copies the specifies files whilst dh_movefiles moves them - this was
 resulting in the contents of the binary "swi-prolog" package being
 duplicated inside "swi-prolog-xpce", causing file conflicts at
 installation. (Closes: #492364)
   * Don't build the CHR package on arm and armel to prevent FTBFS on these
 archictures.
   * Add 04_fix_hyphens_being_used_as_minus_signs_in

Bug#487014: marked as done (libtest-tap-htmlmatrix-perl: FTBFS: Test returned status 255 (wstat 65280, 0xff00))

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 11:47:17 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#487014: fixed in libtest-tap-htmlmatrix-perl 0.09-1
has caused the Debian Bug report #487014,
regarding libtest-tap-htmlmatrix-perl: FTBFS: Test returned status 255 (wstat 
65280, 0xff00)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
487014: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487014
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: libtest-tap-htmlmatrix-perl
Version: 0.04-1
Severity: serious
User: [EMAIL PROTECTED]
Usertags: qa-ftbfs-20080619 qa-ftbfs
Justification: FTBFS on i386

Hi,

During a rebuild of all packages in sid, your package failed to build on
i386.

Relevant part:
>  /usr/bin/fakeroot debian/rules binary
> dh_testdir
> dh_testroot
> dh_clean -k
> /usr/bin/perl Build test
> t/00_dist...skipped
> all skipped: Test::Distribution must be installed
> t/basic.ok
> t/colorful..ok
> t/file_visual...Can't call method "skip_all" on unblessed reference at 
> /usr/share/perl5/Test/TAP/Model/File.pm line 33.
> # Looks like you planned 15 tests but only ran 8.
> # Looks like your test died just after 8.
> dubious
>   Test returned status 255 (wstat 65280, 0xff00)
> DIED. FAILED tests 9-15
>   Failed 7/15 tests, 53.33% okay
> t/model_visual..ok
> t/paths.ok
> t/subtest_visualok
> t/templ_output..ok
> t/uri...ok
> Failed Test Stat Wstat Total Fail  List of Failed
> ---
> t/file_visual.t  255 6528015   14  9-15
> 1 test skipped.
> Failed 1/9 test scripts. 7/70 subtests failed.
> Files=9, Tests=70,  1 wallclock secs ( 0.62 cusr +  0.06 csys =  0.68 CPU)
> Failed 1/9 test programs. 7/70 subtests failed.
> make: *** [install-stamp] Error 255

The full build log is available from:
   http://people.debian.org/~lucas/logs/2008/06/19

This rebuild was done with gcc 4.3 instead of gcc 4.2, because gcc 4.3
is now the default on most architectures (even if it's not the case on
i386 yet).  Consequently, many failures are caused by the switch to gcc
4.3.
If you determine that this failure is caused by gcc 4.3, feel free to
downgrade this bug to 'important' if your package is only built on i386,
and this bug is specific to gcc 4.3 (i.e the package builds fine with
gcc 4.2).

A list of current common problems and possible solutions is available at 
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on about 50 AMD64 nodes
of the Grid'5000 platform, using a clean chroot containing a sid i386
environment.  Internet was not accessible from the build systems.

-- 
| Lucas Nussbaum
| [EMAIL PROTECTED]   http://www.lucas-nussbaum.net/ |
| jabber: [EMAIL PROTECTED] GPG: 1024D/023B3F4F |


--- End Message ---
--- Begin Message ---
Source: libtest-tap-htmlmatrix-perl
Source-Version: 0.09-1

We believe that the bug you reported is fixed in the latest version of
libtest-tap-htmlmatrix-perl, which is due to be installed in the Debian FTP 
archive:

libtest-tap-htmlmatrix-perl_0.09-1.diff.gz
  to 
pool/main/libt/libtest-tap-htmlmatrix-perl/libtest-tap-htmlmatrix-perl_0.09-1.diff.gz
libtest-tap-htmlmatrix-perl_0.09-1.dsc
  to 
pool/main/libt/libtest-tap-htmlmatrix-perl/libtest-tap-htmlmatrix-perl_0.09-1.dsc
libtest-tap-htmlmatrix-perl_0.09-1_all.deb
  to 
pool/main/libt/libtest-tap-htmlmatrix-perl/libtest-tap-htmlmatrix-perl_0.09-1_all.deb
libtest-tap-htmlmatrix-perl_0.09.orig.tar.gz
  to 
pool/main/libt/libtest-tap-htmlmatrix-perl/libtest-tap-htmlmatrix-perl_0.09.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
gregor herrmann <[EMAIL PROTECTED]> (supplier of updated 
libtest-tap-htmlmatrix-perl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sat, 26 Jul 2008 13:43:11 +0200
Source: libtest-tap-htmlmatrix-perl
Binary: libtest-tap-htmlmatrix-perl
Architecture: source all
Version: 0.09-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Perl Group <[EMAI

Bug#492469: hugin 0.7.x requires make (even for invoking nona) but does not depend on it

2008-07-26 Thread Andreas Metzler
Package: hugin
Version: 0.7.0~svn3191-1
Severity: serious
Justification: Policy 3.5

hugin (the graphical frontend at least) now requires make for aligning
and stitching. Using the "Stitch Now" button for regular stitching (no
HDR) without make installed results in

| execvp(make, -f, /tmp/huginmk_bUjuKS, all, clean) failed with error 2!

before running nona.

This is also documented on http://hugin.sourceforge.net/download/:
| make. hugin-0.7.0 or later uses GNU 'make' to oversee the
| stitching process, i.e. 'make' is required to run hugin as well as
| build it.

cu andreas
-- 
`What a good friend you are to him, Dr. Maturin. His other friends are
so grateful to you.'
`I sew his ears on from time to time, sure'



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#492465: python-dnspython: appears to be vulnerable to cache poisoning attack CVE-2008-1447

2008-07-26 Thread Thijs Kinkhorst
Package: python-dnspython
Version: 1.3.5-3.1 1.6.0-1
Severity: grave
Tags: security

Hi,

>From inspecting the code of dnspython, it seems that it is not using the
recommended source port randomisation for countering the cache poisoning
attack as discovered by Dan Kaminski and referenced as CVE-2008-1447.

Could you please look into this and see whether updated packages can and
should be created for etch/lenny/sid?


thanks,
Thijs

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/dash
Kernel: Linux 2.6.18-6-686
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#474322: marked as done (RM: glimpse/stable RoSRM; license problem)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 10:16:22 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#474322: fixed
has caused the Debian Bug report #474322,
regarding RM: glimpse/stable RoSRM; license problem
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
474322: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=474322
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: glimpse
Version: 4.18.5-1
Severity: serious
Justification: License to redistribute possibly expired


please investigate; according to debian/copyright:

...
Debian may redistribute binaries of glimpse built from modified source code
(under the same COPYRIGHT as the original).
Internet WorkShop, as per license agreement with Arizona Board of Regents,
valid until January 1 2008.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.22-2-686 (SMP w/1 CPU core)
Locale: LANG=en_DK.UTF-8, LC_CTYPE=en_DK.UTF-8 (charmap=ANSI_X3.4-1968) 
(ignored: LC_ALL set to C)
Shell: /bin/sh linked to /bin/dash

Versions of packages glimpse depends on:
ii  libc6 2.7-8  GNU C Library: Shared libraries

glimpse recommends no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
We believe that the bug you reported is now fixed; the following
package(s) have been removed from stable:

   glimpse |   4.18.5-1 | source, alpha, amd64, arm, hppa, i386, ia64, mips, 
mipsel, powerpc, sparc

Note that the package(s) have simply been removed from the tag
database and may (or may not) still be in the pool; this is not a bug.
The package(s) will be physically removed automatically when no suite
references them (and in the case of source, when no binary references
it).  Please also remember that the changes have been done on the
master archive (ftp-master.debian.org) and will not propagate to any
mirrors (ftp.debian.org included) until the next cron.daily run at the
earliest.

Packages are never removed from testing by hand.  Testing tracks
unstable and will automatically remove packages which were removed
from unstable when removing them from testing causes no dependency
problems.

Bugs which have been reported against this package are not automatically
removed from the Bug Tracking System.  Please check all open bugs and
close them or re-assign them to another package if the removed package
was superseded by another one.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED]

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
[EMAIL PROTECTED]

Debian distribution maintenance software
pp.
Joerg Jaspert (the ftpmaster behind the curtain)

--- End Message ---


Bug#481164: marked as done (python-django: CVE-2008-2302 cross-site scripting vulnerability)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:57:54 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#481164: fixed in python-django 0.95.1-1etch1
has caused the Debian Bug report #481164,
regarding python-django: CVE-2008-2302 cross-site scripting vulnerability
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
481164: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=481164
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: python-django
Version: 0.97~svn7189-1
Severity: grave
Tags: security
Justification: user security hole

http://www.djangoproject.com/weblog/2008/may/14/security/

Updates need to be prepared for etch, sid/lenny, and experimental.

Brett, can you take care of all this? (Also handling the few open bugs for
the sid/experimental upload would be nice)

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 
'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.24-1-686 (SMP w/1 CPU core)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages python-django depends on:
ii  python2.5.2-1An interactive high-level object-o
ii  python-support0.8.1  automated rebuilding support for P

Versions of packages python-django recommends:
ii  python-pysqlite2  2.4.1-1Python interface to SQLite 3

-- no debconf information


--- End Message ---
--- Begin Message ---
Source: python-django
Source-Version: 0.95.1-1etch1

We believe that the bug you reported is fixed in the latest version of
python-django, which is due to be installed in the Debian FTP archive:

python-django_0.95.1-1etch1.diff.gz
  to pool/main/p/python-django/python-django_0.95.1-1etch1.diff.gz
python-django_0.95.1-1etch1.dsc
  to pool/main/p/python-django/python-django_0.95.1-1etch1.dsc
python-django_0.95.1-1etch1_all.deb
  to pool/main/p/python-django/python-django_0.95.1-1etch1_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Raphael Hertzog <[EMAIL PROTECTED]> (supplier of updated python-django package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 20 May 2008 00:40:59 +0200
Source: python-django
Binary: python-django
Architecture: source all
Version: 0.95.1-1etch1
Distribution: stable
Urgency: low
Maintainer: Brett Parker <[EMAIL PROTECTED]>
Changed-By: Raphael Hertzog <[EMAIL PROTECTED]>
Description: 
 python-django - A high-level Python Web framework
Closes: 481164
Changes: 
 python-django (0.95.1-1etch1) stable; urgency=low
 .
   * Add new patch debian/patches/03_xss_fix.diff. Fixes cross-site
 scripting vulnerability (CVE-2008-2302). Closes: #481164
Files: 
 dcfc01be4549177a957d5a3503a00fd0 931 python optional 
python-django_0.95.1-1etch1.dsc
 c9ea4b3dfdc79ddd5f871f727c067eae 4153 python optional 
python-django_0.95.1-1etch1.diff.gz
 6d78e3c6767803d84bd8f9c22f56242d 1017214 python optional 
python-django_0.95.1-1etch1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Signed by Raphael Hertzog

iD8DBQFIMgdyvPbGD26BadIRAkOvAJ9y6syIot3/yRl5bZNXcBX3c6/7rgCcCYnY
Mp4xFgv1GE3JmCoBc7tZPdk=
=3OvF
-END PGP SIGNATURE-


--- End Message ---


Bug#478573: marked as done ([peercast] CVE-2008-2040 stack-based buffer overflow in HTTP::getAuthUserPass function)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:57:49 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#478573: fixed in peercast 0.1217.toots.20060314-1etch1
has caused the Debian Bug report #478573,
regarding [peercast] CVE-2008-2040 stack-based buffer overflow in 
HTTP::getAuthUserPass function
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
478573: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478573
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: peercast
Severity: grave
Tags: security
X-Debbugs-CC: [EMAIL PROTECTED]

I found a security issue in the peercast server in the
HTTP::getAuthUserPass function. I already contacted the upstream author 6 days
ago and didn't get an answer yet so I am publishing this now.

From core/common/http.cpp:

105 void HTTP::getAuthUserPass(char *user, char *pass)
106 {
107 if (arg)
108 {   
109 char *s = stristr(arg,"Basic");
110 if (s) 
111 {   
112 while (*s)
113 if (*s++ == ' ')
114 break;
115 String str;
116 str.set(s,String::T_BASE64);
117 str.convertTo(String::T_ASCII);
118 s = strstr(str.cstr(),":");
119 if (s) 
120 {   
121 *s = 0;
122 if (user)
123 strcpy(user,str.cstr());
124 if (pass)
125 strcpy(pass,s+1);

This function is used if authentication to the peercast server is done by basic 
http auth
rather than by a cookie. In line 116 the base64 encoded string is copied into 
str.
Note the set method is peercasts own implementation of set since it 
reimplements the String
class. set looks like this:

From core/common/sys.h:
38 MAX_LEN = 256 
...
62 void set(const char *p, TYPE t=T_ASCII)
63 {   
64 strncpy(data,p,MAX_LEN-1);
65 data[MAX_LEN-1] = 0;
66 type = t;
67 }   

In line 117 the string gets decoded and in line 118 and 
following the part before ':' in the decoded string gets copied
into user and the part after it into pass.

From core/common/servhs.cpp:
558 bool Servent::handshakeAuth(HTTP &http,const char *args,bool local)
559 {
560 char user[64],pass[64];
561 user[0] = pass[0] = 0;
...
580 while (http.nextHeader())
581 {   
582 char *arg = http.getArgStr();
583 if (!arg)
584 continue;
585
586 switch (servMgr->authType)
587 {   
588 case ServMgr::AUTH_HTTPBASIC:
589 if (http.isHeader("Authorization"))
590 http.getAuthUserPass(user,pass);
591 break;

user and pass are only declared to have 64 bytes (line 558) while the buffer 
used for 
copy can store up to MAX_LEN (256) bytes (ok minus the : here). 
Servent::handshakeAuth calls then
the getAuthUserPass function triggering a buffer overflow.
It's thus possible to crash the server and execute arbitrary code if the server
allows http-basic authentication.

I already requested a CVE id for this.

An example configuration and PoC is attached.

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

[Server]
serverPort = 7144
autoServe = Yes
forceIP = 
isRoot = No
maxBitrateOut = 0
maxRelays = 2
maxDirect = 0
maxRelaysPerChannel = 0
firewallTimeout = 30
forceNormal = No
rootMsg = 
authType = http-basic
cookiesExpire = session
htmlPath = html/en
minPGNUIncoming = 10
maxPGNUIncoming = 20
maxServIn = 50
chanLog = 
networkID = 

[Broadcast]
broadcastMsgInterval = 10
broadcastMsg = 
icyMetaInterval = 8192
broadcastID = 008145B5C0427118B595AF7D9E11
hostUpdateInterval = 180
maxControlConnections = 3
rootHost = yp.peercast.org

[Client]
refreshHTML = 5
relayBroadcast = 30
minBroadcastTTL = 1
maxBroadcastTTL = 7
pushTries = 5
pushTimeout = 60
maxPushHops = 8
autoQuery = 0
queryTTL = 7

[Privacy]
password = s0mep4ss
maxUptime = 0

[Filter]
ip = 255.255.255.255
private = Yes
ban = No
network = Yes
direct = Yes
[End]

[Notify]
PeerCast = Yes
Broadcaster

Bug#465598: marked as done (libsdl-image1.2: Security update 1.2.5-2etch1 is not installed)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:57:59 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#465598: fixed in sdl-image1.2 1.2.5-2+etch1
has caused the Debian Bug report #465598,
regarding libsdl-image1.2: Security update 1.2.5-2etch1 is not installed
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
465598: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=465598
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: libsdl-image1.2
Version: 1.2.5-2+b1
Severity: grave
Justification: user security hole
Tags: security

I am unsure where the error is, please reassign appropriately.

On Feb. 10th I got the mail about DSA 1493-1. I also "see" this DSA:
remaxp:~# env LANG=C apt-cache policy libsdl-image1.2
libsdl-image1.2:
  Installed: 1.2.5-2+b1
  Candidate: 1.2.5-2+b1
  Version table:
 *** 1.2.5-2+b1 0
500 http://127.0.0.1 etch/main Packages
100 /var/lib/dpkg/status
 1.2.5-2etch1 0
500 http://127.0.0.1 etch/updates/main Packages

But as you can see, it is not going to be installed:
remaxp:~# env LANG=C apt-get install libsdl-image1.2
Reading package lists... Done
Building dependency tree... Done
libsdl-image1.2 is already the newest version.
0 upgraded, 0 newly installed, 0 to remove and 1 not upgraded.

Thus CVE-2007-6697 and CVE-2008-0544 are not yet fixed.


-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.19.2-grsec-cz01
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages libsdl-image1.2 depends on:
ii  libc6  2.3.6.ds1-13etch4 GNU C Library: Shared libraries
ii  libpng12-0 1.2.15~beta5-1PNG library - runtime
ii  libsdl1.2debian1.2.11-8  Simple DirectMedia Layer
ii  zlib1g 1:1.2.3-13compression library - runtime

libsdl-image1.2 recommends no packages.

-- no debconf information

-- 
  Dr. Helge Kreutzmann [EMAIL PROTECTED]
   Dipl.-Phys.   http://www.helgefjell.de/debian.php
64bit GNU powered gpg signed mail preferred
   Help keep free software "libre": http://www.ffii.de/


signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---
Source: sdl-image1.2
Source-Version: 1.2.5-2+etch1

We believe that the bug you reported is fixed in the latest version of
sdl-image1.2, which is due to be installed in the Debian FTP archive:

libsdl-image1.2-dev_1.2.5-2+etch1_i386.deb
  to pool/main/s/sdl-image1.2/libsdl-image1.2-dev_1.2.5-2+etch1_i386.deb
libsdl-image1.2_1.2.5-2+etch1_i386.deb
  to pool/main/s/sdl-image1.2/libsdl-image1.2_1.2.5-2+etch1_i386.deb
sdl-image1.2_1.2.5-2+etch1.diff.gz
  to pool/main/s/sdl-image1.2/sdl-image1.2_1.2.5-2+etch1.diff.gz
sdl-image1.2_1.2.5-2+etch1.dsc
  to pool/main/s/sdl-image1.2/sdl-image1.2_1.2.5-2+etch1.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thijs Kinkhorst <[EMAIL PROTECTED]> (supplier of updated sdl-image1.2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sun, 16 Mar 2008 00:39:46 +0100
Source: sdl-image1.2
Binary: libsdl-image1.2 libsdl-image1.2-dev
Architecture: source i386
Version: 1.2.5-2+etch1
Distribution: stable-security
Urgency: low
Maintainer: Michael Koch <[EMAIL PROTECTED]>
Changed-By: Thijs Kinkhorst <[EMAIL PROTECTED]>
Description: 
 libsdl-image1.2 - image loading library for Simple DirectMedia Layer 1.2
 libsdl-image1.2-dev - development files for SDL 1.2 image loading libray
Closes: 465598
Changes: 
 sdl-image1.2 (1.2.5-2+etch1) stable-security; urgency=low
 .
   * Rebuild with higher version number than binary NMU's,
 no other changes (closes: #465598).
Files: 
 7806c149bf53c0c3fbe09603b28a9e7f 991 libs optional 
sdl-image1.2_1.2.5-2+etch1.dsc
 84411d1b20a5081531b7ecc7a8fa6b98 12288 libs optional 
sdl-image1.2_1.2.5-2+etch1.diff.gz
 fe51b351e3eb72f315ed1b74f29138eb 29632 libs optional 
libsdl-image1.2_1.2.5-2+etch1_i386.deb
 6b98b1a5fd2eeaf25feaab7418583ec9 34404 libdevel op

Bug#486340: marked as done (debian/copyright needs updating)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:58:10 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#486340: fixed in xserver-xorg-video-intel 
2:2.2.1-1~etchnhalf2
has caused the Debian Bug report #486340,
regarding debian/copyright needs updating
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
486340: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=486340
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: xserver-xorg-video-intel
Severity: serious
Version: 2:2.3.1-1

Hi,

the debian/copyright of xserver-xorg-video-intel is so outdated it has
little to do with the rest of the package when it comes to who owns
which copyrights.
It would be good to go over the source and extract the relevant
copyright notices. Note that per-file annotations are not required, so
that copyright notices of files with the same license can easily be
agglomerated.

Kind regards

T.
-- 
Thomas Viehmann, http://thomas.viehmann.net/


--- End Message ---
--- Begin Message ---
Source: xserver-xorg-video-intel
Source-Version: 2:2.2.1-1~etchnhalf2

We believe that the bug you reported is fixed in the latest version of
xserver-xorg-video-intel, which is due to be installed in the Debian FTP 
archive:

xserver-xorg-video-intel_2.2.1-1~etchnhalf2.diff.gz
  to 
pool/main/x/xserver-xorg-video-intel/xserver-xorg-video-intel_2.2.1-1~etchnhalf2.diff.gz
xserver-xorg-video-intel_2.2.1-1~etchnhalf2.dsc
  to 
pool/main/x/xserver-xorg-video-intel/xserver-xorg-video-intel_2.2.1-1~etchnhalf2.dsc
xserver-xorg-video-intel_2.2.1-1~etchnhalf2_i386.deb
  to 
pool/main/x/xserver-xorg-video-intel/xserver-xorg-video-intel_2.2.1-1~etchnhalf2_i386.deb
xserver-xorg-video-intel_2.2.1.orig.tar.gz
  to 
pool/main/x/xserver-xorg-video-intel/xserver-xorg-video-intel_2.2.1.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Julien Cristau <[EMAIL PROTECTED]> (supplier of updated 
xserver-xorg-video-intel package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 23 Jun 2008 15:26:33 +0200
Source: xserver-xorg-video-intel
Binary: xserver-xorg-video-intel
Architecture: source i386
Version: 2:2.2.1-1~etchnhalf2
Distribution: proposed-updates
Urgency: low
Maintainer: Debian X Strike Force <[EMAIL PROTECTED]>
Changed-By: Julien Cristau <[EMAIL PROTECTED]>
Description: 
 xserver-xorg-video-intel - X.Org X server -- Intel i8xx, i9xx display driver
Closes: 486340
Changes: 
 xserver-xorg-video-intel (2:2.2.1-1~etchnhalf2) proposed-updates; urgency=low
 .
   * Update debian/copyright, thanks to Thomas Viehmann for reporting, and
 Moritz Muehlenhoff for the thorough analysis (closes: #486340).
Files: 
 3abb61b26edecb19e7ae74cff693fefc 1324 x11 optional 
xserver-xorg-video-intel_2.2.1-1~etchnhalf2.dsc
 45f30487584267e37954223c0669afbc 804648 x11 optional 
xserver-xorg-video-intel_2.2.1.orig.tar.gz
 4cb228df1ddccee232830aae4f9e8260 223319 x11 optional 
xserver-xorg-video-intel_2.2.1-1~etchnhalf2.diff.gz
 b7b76aaac0a35bf00a402e1a355b63cf 343056 x11 optional 
xserver-xorg-video-intel_2.2.1-1~etchnhalf2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEUEARECAAYFAkhfpd8ACgkQmEvTgKxfcAwUDACYvqwiurvqSsg3nKR4f6ou/K4E
oACff2yXBontleic90vJmZpfoXYPh+U=
=x8eL
-END PGP SIGNATURE-


--- End Message ---


Bug#475163: marked as done (sympa: CVE-2008-1648 denial of service via crafted email)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:58:02 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#475163: fixed in sympa 5.2.3-1.2+etch1
has caused the Debian Bug report #475163,
regarding sympa: CVE-2008-1648 denial of service via crafted email
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
475163: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=475163
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: sympa
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for sympa.


CVE-2008-1648[0]:
| Sympa before 5.4 allows remote attackers to cause a denial of service
| (daemon crash) via an e-mail message with a malformed value of the
| Content-Type header and unspecified other headers.  NOTE: some of these
| details are obtained from third party information.

First apply this patch:
http://sourcesup.cru.fr/cgi/viewvc.cgi/trunk/src/PlainDigest.pm?r1=3597&r2=4834&view=patch
and then this patch:
http://sourcesup.cru.fr/cgi/viewvc.cgi/trunk/src/PlainDigest.pm?r1=4834&r2=4835&view=patch

to fix the problem.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1648
http://security-tracker.debian.net/tracker/CVE-2008-1648

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpBVwfrcIBJN.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---
Source: sympa
Source-Version: 5.2.3-1.2+etch1

We believe that the bug you reported is fixed in the latest version of
sympa, which is due to be installed in the Debian FTP archive:

sympa_5.2.3-1.2+etch1.diff.gz
  to pool/main/s/sympa/sympa_5.2.3-1.2+etch1.diff.gz
sympa_5.2.3-1.2+etch1.dsc
  to pool/main/s/sympa/sympa_5.2.3-1.2+etch1.dsc
sympa_5.2.3-1.2+etch1_amd64.deb
  to pool/main/s/sympa/sympa_5.2.3-1.2+etch1_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Steve Kemp <[EMAIL PROTECTED]> (supplier of updated sympa package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 30 Jun 2008 16:17:18 +
Source: sympa
Binary: sympa
Architecture: source amd64
Version: 5.2.3-1.2+etch1
Distribution: stable-security
Urgency: high
Maintainer: Stefan Hornburg (Racke) <[EMAIL PROTECTED]>
Changed-By: Steve Kemp <[EMAIL PROTECTED]>
Description: 
 sympa  - Modern mailing list manager
Closes: 475163
Changes: 
 sympa (5.2.3-1.2+etch1) stable-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * Fix possible denial of service attack triggered
 via a malformed email header (CVE-2008-1648; Closes: #475163).
Files: 
 c7e720e56b1c4e9778cea822ed150a19 625 mail optional sympa_5.2.3-1.2+etch1.dsc
 355cb9174841205831191c93a83da895 5102528 mail optional sympa_5.2.3.orig.tar.gz
 a93d8ec3dcbc0a0aed99e513c5749c0e 96804 mail optional 
sympa_5.2.3-1.2+etch1.diff.gz
 531781d522ad5f02e6c5b658883ed37d 3591854 mail optional 
sympa_5.2.3-1.2+etch1_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkho/OcACgkQwM/Gs81MDZ1DggCguWHsxIkq6/qH4sS2fwWoSkjK
xAcAoJ1EpG6z5ZmlVxYr5w0bvbS3/e2U
=6Xn8
-END PGP SIGNATURE-


--- End Message ---


Bug#436703: marked as done (/sbin/shutdown fails to properly spindown drive)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:58:02 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#426224: fixed in sysvinit 2.86.ds1-38+etchnhalf.1
has caused the Debian Bug report #426224,
regarding /sbin/shutdown fails to properly spindown drive
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
426224: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426224
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: sysvinit
Version: 2.86.ds1-38.1
Severity: serious

--- Please enter the report below this line. ---
/sbin/shutdown fails to properly spindown many newer sata drives before 
poweroff[0].

[0]http://linux-ata.org/shutdown.html

--- System information. ---
Architecture: i386
Kernel:   Linux 2.6.21.5

Debian Release: lenny/sid
  500 unstablemirror.switch.ch 
  500 unstablemirror.noreply.org 
  500 unstabledebian-multimedia.org 

--- Package information. ---
Depends   (Version) | Installed
===-+-
libc6(>= 2.6-1) | 2.6-5
libselinux1 (>= 2.0.15) | 2.0.15-2+b1
libsepol1(>= 2.0.3) | 2.0.3-1+b1


--- End Message ---
--- Begin Message ---
Source: sysvinit
Source-Version: 2.86.ds1-38+etchnhalf.1

We believe that the bug you reported is fixed in the latest version of
sysvinit, which is due to be installed in the Debian FTP archive:

initscripts_2.86.ds1-38+etchnhalf.1_ia64.deb
  to pool/main/s/sysvinit/initscripts_2.86.ds1-38+etchnhalf.1_ia64.deb
sysv-rc_2.86.ds1-38+etchnhalf.1_all.deb
  to pool/main/s/sysvinit/sysv-rc_2.86.ds1-38+etchnhalf.1_all.deb
sysvinit-utils_2.86.ds1-38+etchnhalf.1_ia64.deb
  to pool/main/s/sysvinit/sysvinit-utils_2.86.ds1-38+etchnhalf.1_ia64.deb
sysvinit_2.86.ds1-38+etchnhalf.1.diff.gz
  to pool/main/s/sysvinit/sysvinit_2.86.ds1-38+etchnhalf.1.diff.gz
sysvinit_2.86.ds1-38+etchnhalf.1.dsc
  to pool/main/s/sysvinit/sysvinit_2.86.ds1-38+etchnhalf.1.dsc
sysvinit_2.86.ds1-38+etchnhalf.1_ia64.deb
  to pool/main/s/sysvinit/sysvinit_2.86.ds1-38+etchnhalf.1_ia64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <[EMAIL PROTECTED]> (supplier of updated sysvinit package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 15 May 2008 01:19:23 -0600
Source: sysvinit
Binary: sysv-rc sysvinit-utils sysvinit initscripts
Architecture: source ia64 all
Version: 2.86.ds1-38+etchnhalf.1
Distribution: stable
Urgency: low
Maintainer: Debian sysvinit maintainers <[EMAIL PROTECTED]>
Changed-By: dann frazier <[EMAIL PROTECTED]>
Description: 
 initscripts - Scripts for initializing and shutting down the system
 sysv-rc- System-V-like runlevel change mechanism
 sysvinit   - System-V-like init utilities
 sysvinit-utils - System-V-like utilities
Closes: 426224
Changes: 
 sysvinit (2.86.ds1-38+etchnhalf.1) stable; urgency=low
 .
   * Include patch from Werner Fink at SuSe to handle each disk individually
 and automatically instead of guessing in the init.d script how
 to handle them collectively (Closes: #426224).
Files: 
 d266d3742f8198068f989ea398c22e02 992 admin required 
sysvinit_2.86.ds1-38+etchnhalf.1.dsc
 e7532787c42774b1bb3ab5db7004473a 135812 admin required 
sysvinit_2.86.ds1-38+etchnhalf.1.diff.gz
 e7392a6079cce9980aa2425715696f3d 136888 admin required 
sysvinit_2.86.ds1-38+etchnhalf.1_ia64.deb
 cc4b59577cd43af23578214f3e9c5a86 75590 admin required 
sysvinit-utils_2.86.ds1-38+etchnhalf.1_ia64.deb
 20a9c175a94b87459905ebe53496ab18 63898 admin required 
initscripts_2.86.ds1-38+etchnhalf.1_ia64.deb
 5fa79b20fd3a7d3289ad8e7a84913d53 56222 admin required 
sysv-rc_2.86.ds1-38+etchnhalf.1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIMasihuANDBmkLRkRAsSwAKCUDSZ4+Zk22TfW499MwGFHvm+GjgCffy+A
SGOpaz0VOGpPoto4+7zq9OY=
=RS7k
-END PGP SIGNATURE-


--- End Message ---


Bug#430497: marked as done (Please update shutdown)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:58:02 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#426224: fixed in sysvinit 2.86.ds1-38+etchnhalf.1
has caused the Debian Bug report #426224,
regarding Please update shutdown
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
426224: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426224
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: base
Severity: important



-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.22-6-generic (SMP w/1 CPU core)
Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

I am having problems with my IDE hard disks at Debian shutdown using any 
2.6.22.x kernel.
Three seconds before power off is printed the message "ata1.01 MIGHT NOT TO 
SPUN DOWN PROPERTY, UPDATE 
YOUR SHUTDOWN UTILITY" and also does reference to a website:
http://linux-ata.org/shutdown.html
There is explained what is happening.
Shutdown utility of Debian will need to be updated soon in testing/unstable and 
also in stable if you 
want to do it compatible with 2.6.22 kernel releases.

--- End Message ---
--- Begin Message ---
Source: sysvinit
Source-Version: 2.86.ds1-38+etchnhalf.1

We believe that the bug you reported is fixed in the latest version of
sysvinit, which is due to be installed in the Debian FTP archive:

initscripts_2.86.ds1-38+etchnhalf.1_ia64.deb
  to pool/main/s/sysvinit/initscripts_2.86.ds1-38+etchnhalf.1_ia64.deb
sysv-rc_2.86.ds1-38+etchnhalf.1_all.deb
  to pool/main/s/sysvinit/sysv-rc_2.86.ds1-38+etchnhalf.1_all.deb
sysvinit-utils_2.86.ds1-38+etchnhalf.1_ia64.deb
  to pool/main/s/sysvinit/sysvinit-utils_2.86.ds1-38+etchnhalf.1_ia64.deb
sysvinit_2.86.ds1-38+etchnhalf.1.diff.gz
  to pool/main/s/sysvinit/sysvinit_2.86.ds1-38+etchnhalf.1.diff.gz
sysvinit_2.86.ds1-38+etchnhalf.1.dsc
  to pool/main/s/sysvinit/sysvinit_2.86.ds1-38+etchnhalf.1.dsc
sysvinit_2.86.ds1-38+etchnhalf.1_ia64.deb
  to pool/main/s/sysvinit/sysvinit_2.86.ds1-38+etchnhalf.1_ia64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <[EMAIL PROTECTED]> (supplier of updated sysvinit package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 15 May 2008 01:19:23 -0600
Source: sysvinit
Binary: sysv-rc sysvinit-utils sysvinit initscripts
Architecture: source ia64 all
Version: 2.86.ds1-38+etchnhalf.1
Distribution: stable
Urgency: low
Maintainer: Debian sysvinit maintainers <[EMAIL PROTECTED]>
Changed-By: dann frazier <[EMAIL PROTECTED]>
Description: 
 initscripts - Scripts for initializing and shutting down the system
 sysv-rc- System-V-like runlevel change mechanism
 sysvinit   - System-V-like init utilities
 sysvinit-utils - System-V-like utilities
Closes: 426224
Changes: 
 sysvinit (2.86.ds1-38+etchnhalf.1) stable; urgency=low
 .
   * Include patch from Werner Fink at SuSe to handle each disk individually
 and automatically instead of guessing in the init.d script how
 to handle them collectively (Closes: #426224).
Files: 
 d266d3742f8198068f989ea398c22e02 992 admin required 
sysvinit_2.86.ds1-38+etchnhalf.1.dsc
 e7532787c42774b1bb3ab5db7004473a 135812 admin required 
sysvinit_2.86.ds1-38+etchnhalf.1.diff.gz
 e7392a6079cce9980aa2425715696f3d 136888 admin required 
sysvinit_2.86.ds1-38+etchnhalf.1_ia64.deb
 cc4b59577cd43af23578214f3e9c5a86 75590 admin required 
sysvinit-utils_2.86.ds1-38+etchnhalf.1_ia64.deb
 20a9c175a94b87459905ebe53496ab18 63898 admin required 
initscripts_2.86.ds1-38+etchnhalf.1_ia64.deb
 5fa79b20fd3a7d3289ad8e7a84913d53 56222 admin required 
sysv-rc_2.86.ds1-38+etchnhalf.1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIMasihuANDBmkLRkRAsSwAKCUDSZ4+Zk22TfW499MwGFHvm+GjgCffy+A
SGOpaz0VOGpPoto4+7zq9OY=
=RS7k
-END PGP SIGNATURE-


--- End Message ---


Processed: Re: Bug#492213: linux-image-2.6.25-2-686: reinstall of kernel stalls when recreating missing grub/menu.lst

2008-07-26 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 492213 grave
Bug#492213: linux-image-2.6.25-2-686: reinstall of kernel stalls when 
recreating missing grub/menu.lst
Severity set to `grave' from `normal'

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#426224: marked as done (Please update shutdown to support libata drivers in newer kernels)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:58:02 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#426224: fixed in sysvinit 2.86.ds1-38+etchnhalf.1
has caused the Debian Bug report #426224,
regarding Please update shutdown to support libata drivers in newer kernels
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
426224: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426224
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: sysvinit
Version: 2.86.ds1-38

Using current (2.6.22) kernels in Debian leads to an error when
shutting down the machine if some disks are managed by libata drivers:

DISK MIGHT NOT BE SPUN DOWN PROPERLY. UPDATE SHUTDOWN UTILITY.

The details are explained there: http://linux-ata.org/shutdown.html

I think shutdown should be updated to fix this.

The machine is a Dell Latitude C610 running testing and a git (2.6.22-rc2)
kernel, using ata_piix drivers from libata to access the ICH-3 controller.

Simon

--- End Message ---
--- Begin Message ---
Source: sysvinit
Source-Version: 2.86.ds1-38+etchnhalf.1

We believe that the bug you reported is fixed in the latest version of
sysvinit, which is due to be installed in the Debian FTP archive:

initscripts_2.86.ds1-38+etchnhalf.1_ia64.deb
  to pool/main/s/sysvinit/initscripts_2.86.ds1-38+etchnhalf.1_ia64.deb
sysv-rc_2.86.ds1-38+etchnhalf.1_all.deb
  to pool/main/s/sysvinit/sysv-rc_2.86.ds1-38+etchnhalf.1_all.deb
sysvinit-utils_2.86.ds1-38+etchnhalf.1_ia64.deb
  to pool/main/s/sysvinit/sysvinit-utils_2.86.ds1-38+etchnhalf.1_ia64.deb
sysvinit_2.86.ds1-38+etchnhalf.1.diff.gz
  to pool/main/s/sysvinit/sysvinit_2.86.ds1-38+etchnhalf.1.diff.gz
sysvinit_2.86.ds1-38+etchnhalf.1.dsc
  to pool/main/s/sysvinit/sysvinit_2.86.ds1-38+etchnhalf.1.dsc
sysvinit_2.86.ds1-38+etchnhalf.1_ia64.deb
  to pool/main/s/sysvinit/sysvinit_2.86.ds1-38+etchnhalf.1_ia64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <[EMAIL PROTECTED]> (supplier of updated sysvinit package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 15 May 2008 01:19:23 -0600
Source: sysvinit
Binary: sysv-rc sysvinit-utils sysvinit initscripts
Architecture: source ia64 all
Version: 2.86.ds1-38+etchnhalf.1
Distribution: stable
Urgency: low
Maintainer: Debian sysvinit maintainers <[EMAIL PROTECTED]>
Changed-By: dann frazier <[EMAIL PROTECTED]>
Description: 
 initscripts - Scripts for initializing and shutting down the system
 sysv-rc- System-V-like runlevel change mechanism
 sysvinit   - System-V-like init utilities
 sysvinit-utils - System-V-like utilities
Closes: 426224
Changes: 
 sysvinit (2.86.ds1-38+etchnhalf.1) stable; urgency=low
 .
   * Include patch from Werner Fink at SuSe to handle each disk individually
 and automatically instead of guessing in the init.d script how
 to handle them collectively (Closes: #426224).
Files: 
 d266d3742f8198068f989ea398c22e02 992 admin required 
sysvinit_2.86.ds1-38+etchnhalf.1.dsc
 e7532787c42774b1bb3ab5db7004473a 135812 admin required 
sysvinit_2.86.ds1-38+etchnhalf.1.diff.gz
 e7392a6079cce9980aa2425715696f3d 136888 admin required 
sysvinit_2.86.ds1-38+etchnhalf.1_ia64.deb
 cc4b59577cd43af23578214f3e9c5a86 75590 admin required 
sysvinit-utils_2.86.ds1-38+etchnhalf.1_ia64.deb
 20a9c175a94b87459905ebe53496ab18 63898 admin required 
initscripts_2.86.ds1-38+etchnhalf.1_ia64.deb
 5fa79b20fd3a7d3289ad8e7a84913d53 56222 admin required 
sysv-rc_2.86.ds1-38+etchnhalf.1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIMasihuANDBmkLRkRAsSwAKCUDSZ4+Zk22TfW499MwGFHvm+GjgCffy+A
SGOpaz0VOGpPoto4+7zq9OY=
=RS7k
-END PGP SIGNATURE-


--- End Message ---


Bug#431676: marked as done (piuparts test: fails to remove: line 4: killall: command not found)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:40:27 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#431676: fixed in dns-flood-detector 1.12-1etch1
has caused the Debian Bug report #431676,
regarding piuparts test: fails to remove: line 4: killall: command not found
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
431676: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=431676
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: dns-flood-detector
Version: 1.12-1
Severity: serious

hi,

while running archive wide piuparts tests your package failed on remove with
the following error: 

  Removing dns-flood-detector ...
  /var/lib/dpkg/info/dns-flood-detector.prerm: line 4: killall: command not 
found
  dpkg: error processing dns-flood-detector (--purge):
   subprocess pre-removal script returned error exit status 127
  dpkg: dependency problems prevent removal of libpcap0.8:
   dns-flood-detector depends on libpcap0.8 (>= 0.9.3-1).
  dpkg: error processing libpcap0.8 (--purge):
   dependency problems - not removing
  Errors were encountered while processing:
   dns-flood-detector
   libpcap0.8

the full log can be found here:

 http://people.debian.org/~lucas/logs/2007/07/01/

bye,
- michael

--- End Message ---
--- Begin Message ---
Source: dns-flood-detector
Source-Version: 1.12-1etch1

We believe that the bug you reported is fixed in the latest version of
dns-flood-detector, which is due to be installed in the Debian FTP archive:

dns-flood-detector_1.12-1etch1.diff.gz
  to pool/main/d/dns-flood-detector/dns-flood-detector_1.12-1etch1.diff.gz
dns-flood-detector_1.12-1etch1.dsc
  to pool/main/d/dns-flood-detector/dns-flood-detector_1.12-1etch1.dsc
dns-flood-detector_1.12-1etch1_i386.deb
  to pool/main/d/dns-flood-detector/dns-flood-detector_1.12-1etch1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jan Wagner <[EMAIL PROTECTED]> (supplier of updated dns-flood-detector package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 21 Mar 2008 17:21:51 +0100
Source: dns-flood-detector
Binary: dns-flood-detector
Architecture: source i386
Version: 1.12-1etch1
Distribution: stable
Urgency: low
Maintainer: Jan Wagner <[EMAIL PROTECTED]>
Changed-By: Jan Wagner <[EMAIL PROTECTED]>
Description: 
 dns-flood-detector - detect abusive usage levels on high traffic nameservers
Closes: 431676
Changes: 
 dns-flood-detector (1.12-1etch1) stable; urgency=low
 .
   * make start-stop-daemon working instead of using kill (Closes: #431676).
Files: 
 dd971e5b3ad14547963c4df5c803c13f 627 net optional 
dns-flood-detector_1.12-1etch1.dsc
 e505d3929677dfe61b2ddd48d1d90947 3886 net optional 
dns-flood-detector_1.12-1etch1.diff.gz
 8f755740d97f7d1c199837d20d303380 13646 net optional 
dns-flood-detector_1.12-1etch1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFH9AjgQUuEI2/szeARAiGbAJ9co/ldc0beh+SEV2SSrSvkmyJqlgCfdiTE
oYqdpDTPnMfpzH+XafBeDx8=
=Bc6a
-END PGP SIGNATURE-


--- End Message ---


Bug#470640: marked as done (horde3: CVE-2008-1284 file inclusion vulnerability)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:40:37 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#470640: fixed in horde3 3.1.3-4etch3
has caused the Debian Bug report #470640,
regarding horde3: CVE-2008-1284 file inclusion vulnerability
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
470640: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=470640
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: horde3
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for horde3.

CVE-2008-1284[0]:
| Directory traversal vulnerability in Horde 3.1.6, Groupware before
| 1.0.5, and Groupware Webmail Edition before 1.0.6, when running with
| certain configurations, allows remote authenticated users to read and
| execute arbitrary files via ".." sequences and a null byte in the
| theme name.

Patch is on:
http://ftp.horde.org/pub/horde/patches/patch-horde-3.1.6-3.1.7.gz

If you fix this vulnerability please also include the CVE id
in your changelog entry.

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1284

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpvHSsic7mEg.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---
Source: horde3
Source-Version: 3.1.3-4etch3

We believe that the bug you reported is fixed in the latest version of
horde3, which is due to be installed in the Debian FTP archive:

horde3_3.1.3-4etch3.diff.gz
  to pool/main/h/horde3/horde3_3.1.3-4etch3.diff.gz
horde3_3.1.3-4etch3.dsc
  to pool/main/h/horde3/horde3_3.1.3-4etch3.dsc
horde3_3.1.3-4etch3_all.deb
  to pool/main/h/horde3/horde3_3.1.3-4etch3_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Gregory Colpart (evolix) <[EMAIL PROTECTED]> (supplier of updated horde3 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 15 Mar 2008 19:08:56 +0100
Source: horde3
Binary: horde3
Architecture: source all
Version: 3.1.3-4etch3
Distribution: stable-security
Urgency: high
Maintainer: Horde Maintainers <[EMAIL PROTECTED]>
Changed-By: Gregory Colpart (evolix) <[EMAIL PROTECTED]>
Description: 
 horde3 - horde web application framework
Closes: 470640
Changes: 
 horde3 (3.1.3-4etch3) stable-security; urgency=high
 .
   * Fix arbitrary file inclusion through abuse of the theme preference (see
 CVE-2008-1284 for more informations). (Closes: #470640
Files: 
 f8929682acb675550e4235c62a99cbe6 974 web optional horde3_3.1.3-4etch3.dsc
 d79fbe74794a4f6c70f208ba3a55bebc 13100 web optional horde3_3.1.3-4etch3.diff.gz
 d4a9a4db3744a2cd496ed499c39ec6b3 5270328 web optional 
horde3_3.1.3-4etch3_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iQEVAwUBR9xW32z0hbPcukPfAQLDvQf/ZCo39dkZINdsUdCB3FGYfmkqESY/HhSb
GXvgv76Z8/xC/4ADRXFw9lNdrkn74ADkb4kjU36isu85KbGAZ3tp5d0FSQiTkZyj
6VmZ5EAThq+NXk2eLsQNbtV777gTkd/uRu0TwFaj/jCMkrL/25slpdK+Kw+/s5m3
ZlTCyO5QO35sOXndyrUAgBLxuq21oQZK8ictU+8dvMNCOPEitoFGTNFjOiG41Kv3
gPy9zZdLpfi4ffONE4749yFa1vCR3kDRCL3+P8rlgpuYNak1IsXEN4PHKXJMt40M
H/16hMAcaoS7RX0e82pMvfN1n5xn+XkYft8esgEGPvxJXFxsN18CBQ==
=N1YO
-END PGP SIGNATURE-


--- End Message ---


Bug#446034: marked as done (CVE-2007-5301 buffer overflow in vorbis input plugin)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:40:17 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#446034: fixed in alsaplayer 0.99.76-9+etch1
has caused the Debian Bug report #446034,
regarding CVE-2007-5301 buffer overflow in vorbis input plugin
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
446034: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446034
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: alsaplayer
Severity: grave
Tags: security

Hi,
The following was released on:
http://secunia.com/advisories/27117/

| Some vulnerabilities have been reported in AlsaPlayer, which potentially can 
be
| exploited by malicious people to compromise a user's system.
| 
| The vulnerabilities are caused due to boundary errors in the vorbis input
| plug-in when processing .OGG files. These can be exploited to cause buffer
| overflows via a specially crafted .OGG file with overly long comments.
| 
| Successful exploitation may allow execution of arbitrary code.

Kind regards
Nico

-- 
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgprILS7yCvL7.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---
Source: alsaplayer
Source-Version: 0.99.76-9+etch1

We believe that the bug you reported is fixed in the latest version of
alsaplayer, which is due to be installed in the Debian FTP archive:

alsaplayer-alsa_0.99.76-9+etch1_i386.deb
  to pool/main/a/alsaplayer/alsaplayer-alsa_0.99.76-9+etch1_i386.deb
alsaplayer-common_0.99.76-9+etch1_i386.deb
  to pool/main/a/alsaplayer/alsaplayer-common_0.99.76-9+etch1_i386.deb
alsaplayer-daemon_0.99.76-9+etch1_i386.deb
  to pool/main/a/alsaplayer/alsaplayer-daemon_0.99.76-9+etch1_i386.deb
alsaplayer-esd_0.99.76-9+etch1_i386.deb
  to pool/main/a/alsaplayer/alsaplayer-esd_0.99.76-9+etch1_i386.deb
alsaplayer-gtk_0.99.76-9+etch1_i386.deb
  to pool/main/a/alsaplayer/alsaplayer-gtk_0.99.76-9+etch1_i386.deb
alsaplayer-jack_0.99.76-9+etch1_i386.deb
  to pool/main/a/alsaplayer/alsaplayer-jack_0.99.76-9+etch1_i386.deb
alsaplayer-nas_0.99.76-9+etch1_i386.deb
  to pool/main/a/alsaplayer/alsaplayer-nas_0.99.76-9+etch1_i386.deb
alsaplayer-oss_0.99.76-9+etch1_i386.deb
  to pool/main/a/alsaplayer/alsaplayer-oss_0.99.76-9+etch1_i386.deb
alsaplayer-text_0.99.76-9+etch1_i386.deb
  to pool/main/a/alsaplayer/alsaplayer-text_0.99.76-9+etch1_i386.deb
alsaplayer-xosd_0.99.76-9+etch1_i386.deb
  to pool/main/a/alsaplayer/alsaplayer-xosd_0.99.76-9+etch1_i386.deb
alsaplayer_0.99.76-9+etch1.diff.gz
  to pool/main/a/alsaplayer/alsaplayer_0.99.76-9+etch1.diff.gz
alsaplayer_0.99.76-9+etch1.dsc
  to pool/main/a/alsaplayer/alsaplayer_0.99.76-9+etch1.dsc
libalsaplayer-dev_0.99.76-9+etch1_i386.deb
  to pool/main/a/alsaplayer/libalsaplayer-dev_0.99.76-9+etch1_i386.deb
libalsaplayer0_0.99.76-9+etch1_i386.deb
  to pool/main/a/alsaplayer/libalsaplayer0_0.99.76-9+etch1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Devin Carraway <[EMAIL PROTECTED]> (supplier of updated alsaplayer package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sun, 30 Mar 2008 07:35:43 +
Source: alsaplayer
Binary: alsaplayer-daemon alsaplayer-xosd libalsaplayer-dev alsaplayer-jack 
alsaplayer-esd alsaplayer-text alsaplayer-nas alsaplayer-oss alsaplayer-alsa 
alsaplayer-gtk libalsaplayer0 alsaplayer-common
Architecture: source i386
Version: 0.99.76-9+etch1
Distribution: stable-security
Urgency: high
Maintainer: Hubert Chan <[EMAIL PROTECTED]>
Changed-By: Devin Carraway <[EMAIL PROTECTED]>
Description: 
 alsaplayer-alsa - PCM player designed for ALSA (ALSA output module)
 alsaplayer-common - PCM player designed for ALSA (common files)
 alsaplayer-daemon - PCM player designed for ALSA (non-interactive version)
 alsaplayer-esd - PCM player designed for ALSA (EsounD output module)
 alsaplayer-gtk - PCM player designed for ALSA (GTK version)
 alsaplayer-jack - PCM player designed for ALSA (JACK output module)
 alsaplayer-nas - PCM player designed for ALSA (NAS output module)
 alsaplayer-oss - PCM player designed for ALSA (OSS output mo

Bug#457445: marked as done (libnet-dns-perl: CVE-2007-6341 possible remote denial of service vulnerability)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:40:48 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#457445: fixed in libnet-dns-perl 0.59-1etch1
has caused the Debian Bug report #457445,
regarding libnet-dns-perl: CVE-2007-6341 possible remote denial of service 
vulnerability
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
457445: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=457445
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: libnet-dns-perl
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for libnet-dns-perl.

CVE-2007-6341[0]:
| Net/DNS/RR/A.pm in Net::DNS 0.60 build 654, as used in packages such
| as SpamAssassin and OTRS, allows remote attackers to cause a denial of
| service (program "croak") via a crafted DNS response.

If you fix this vulnerability please also include the CVE id
in your changelog entry.

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6341

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpGl9tl2kYfi.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---
Source: libnet-dns-perl
Source-Version: 0.59-1etch1

We believe that the bug you reported is fixed in the latest version of
libnet-dns-perl, which is due to be installed in the Debian FTP archive:

libnet-dns-perl_0.59-1etch1.diff.gz
  to pool/main/libn/libnet-dns-perl/libnet-dns-perl_0.59-1etch1.diff.gz
libnet-dns-perl_0.59-1etch1.dsc
  to pool/main/libn/libnet-dns-perl/libnet-dns-perl_0.59-1etch1.dsc
libnet-dns-perl_0.59-1etch1_amd64.deb
  to pool/main/libn/libnet-dns-perl/libnet-dns-perl_0.59-1etch1_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Florian Weimer <[EMAIL PROTECTED]> (supplier of updated libnet-dns-perl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 07 Mar 2008 22:17:33 +0100
Source: libnet-dns-perl
Binary: libnet-dns-perl
Architecture: source amd64
Version: 0.59-1etch1
Distribution: stable-security
Urgency: high
Maintainer: Florian Hinzmann <[EMAIL PROTECTED]>
Changed-By: Florian Weimer <[EMAIL PROTECTED]>
Description: 
 libnet-dns-perl - Perform DNS queries from a Perl script
Closes: 457445
Changes: 
 libnet-dns-perl (0.59-1etch1) stable-security; urgency=high
 .
   * Malformed A records could lead to a Perl exception and program crash
 (CVE-2007-6341).  Closes: #457445.
   * A very weak random number generator was used for transaction IDs
 (CVE-2007-3377).
 Perl's rand() is used in the patch against this vulnerability--it is
 initialized from /dev/urandom, but the underlying LCG has only got 48
 bits of state, so at the very least, a brute-force attack is still
 possible if an attacker has got three subsequently generated
 transaction IDs.
   * The Perl implementation of dn_expand could recurse infinitely
 (CVE-2007-3409).  (On Debian systems, the C version is typically
 used.)
Files: 
 97a61f446273f49c42348334f5cc9ba8 915 perl optional 
libnet-dns-perl_0.59-1etch1.dsc
 d3408875f34e5fa0a313a4a21c70e832 137998 perl optional 
libnet-dns-perl_0.59.orig.tar.gz
 bfbdf3851e092853756b78e648b5af29 7584 perl optional 
libnet-dns-perl_0.59-1etch1.diff.gz
 ac599d5c037f6488e039887081d4d93b 252906 perl optional 
libnet-dns-perl_0.59-1etch1_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iQEVAwUBR9HHAb97/wQC1SS+AQKbNgf+MsUMd8TmleXs57Jnjmts57VThIfhcyWY
yYaHHPw/VXbO7bvA/Ts+Y4KeMbfpzsWB7PPXxhCLMbwsoUkwre7FaDuy5FJOUuBp
yCPItusH3krpKGnJTPB8sPCbIISk0bLFjairg3ybTKMoLQ2Ok3nv0nVbmwxXD6E3
rJHPHqfP6KmYt2imEocGZEI+chqdOKX4eYo5wv3b/HRJHyoDzW1HiREz2VJRAwE/
JD4XMcfotwCPRChU8nR1xAuiA5DPQWhgx2x+8v/eYve6CSe+yWJrgQ6s0xkf0CTX
oo4cE72rYmyPeXy88mjYx/v99p3ygRcT3473PPH4HLm3PDPxOuo7Uw==
=a+2f
-END PGP SIGNATURE-


--- End Message ---


Bug#466449: marked as done (diatheke: Diatheke allows arbitrary command execution using the range parameter)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:58:01 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#466449: fixed in sword 1.5.9-2etch1
has caused the Debian Bug report #466449,
regarding diatheke: Diatheke allows arbitrary command execution using the range 
parameter
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
466449: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=466449
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: diatheke
Severity: critical
Tags: security
Justification: root security hole

The Diatheke CGI allows arbitrary command execution in the context of 
the webserver, e.g. www-data by simply abusing the range parameter.

For example, &range=`yes` will consume tons of resources on the affected 
webserver. Escalation of privleges and command shells are left as an 
exercise to the reader.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh

Versions of packages diatheke depends on:
ii  libc6 2.7-8  GNU C Library: Shared libraries
ii  libcomerr21.40.6-1   common error description library
ii  libgcc1   1:4.3-20080202-1   GCC support library
ii  libkrb53  1.6.dfsg.3~beta1-2 MIT Kerberos runtime libraries
ii  libldap-2.4-2 2.4.7-5OpenLDAP libraries
ii  libstdc++64.3-20080202-1 The GNU Standard C++ Library v3
ii  libsword6 1.5.9-7.1  API/library for bible software
ii  zlib1g1:1.2.3.3.dfsg-11  compression library - runtime

Versions of packages diatheke recommends:
ii  apache2   2.2.8-1Next generation, scalable, extenda
ii  apache2-mpm-prefork [httpd]   2.2.8-1Traditional model for Apache HTTPD


--- End Message ---
--- Begin Message ---
Source: sword
Source-Version: 1.5.9-2etch1

We believe that the bug you reported is fixed in the latest version of
sword, which is due to be installed in the Debian FTP archive:

diatheke_1.5.9-2etch1_i386.deb
  to pool/main/s/sword/diatheke_1.5.9-2etch1_i386.deb
libsword-dev_1.5.9-2etch1_i386.deb
  to pool/main/s/sword/libsword-dev_1.5.9-2etch1_i386.deb
libsword6_1.5.9-2etch1_i386.deb
  to pool/main/s/sword/libsword6_1.5.9-2etch1_i386.deb
sword_1.5.9-2etch1.diff.gz
  to pool/main/s/sword/sword_1.5.9-2etch1.diff.gz
sword_1.5.9-2etch1.dsc
  to pool/main/s/sword/sword_1.5.9-2etch1.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thijs Kinkhorst <[EMAIL PROTECTED]> (supplier of updated sword package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 21 Feb 2008 23:35:10 +0100
Source: sword
Binary: libsword-dev libsword6 diatheke
Architecture: source i386
Version: 1.5.9-2etch1
Distribution: stable-security
Urgency: high
Maintainer: Daniel Glassey <[EMAIL PROTECTED]>
Changed-By: Thijs Kinkhorst <[EMAIL PROTECTED]>
Description: 
 diatheke   - CGI script for making bible website
 libsword-dev - Development files for libsword
 libsword6  - API/library for bible software
Closes: 466449
Changes: 
 sword (1.5.9-2etch1) stable-security; urgency=high
 .
   * Non-maintainer upload by the security team.
   * Fix remote command execution in diatheke.pl (Closes: #466449)
 with maintainer-supplied patch.
Files: 
 d93f49c3798272c9de84ec6ae5d1cbed 1026 libs optional sword_1.5.9-2etch1.dsc
 346539f31b41015161d8dd0d2f035243 1806178 libs optional sword_1.5.9.orig.tar.gz
 c39c316e9c81e54136eb02f68292c09d 82071 libs optional sword_1.5.9-2etch1.diff.gz
 95b5aaff3ccec4dcd1f77e95f6bf2da0 526314 libs optional 
libsword6_1.5.9-2etch1_i386.deb
 e3c8ec3d6dcfcfae0cddbb618353db36 701078 libdevel optional 
libsword-dev_1.5.9-2etch1_i386.deb
 0a384fecde3e4492fda105eb9d82ce35 62206 web optional 
diatheke_1.5.9-2etch1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iQEVAwUBR74B9mz0hbPcukPfAQK1vQgAslglZdmw1KrpxLpOGJFk9mPJDzX6lTDa
xL0r/4/IxFapDxUoxD0Yk/wOsVltChGM8e8Ro4955sWKabR/s0vw1mJg08l9cGy4
sk9JUsfTuQ5PhhsgqHFjZW3SZuoOdRnrG

Bug#469293: marked as done (vzctl: vzmigrate corrupts user-ids of files)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:58:06 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#469293: fixed in vzctl 3.0.11-14
has caused the Debian Bug report #469293,
regarding vzctl: vzmigrate corrupts user-ids of files
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
469293: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469293
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: vzctl
Version: 3.0.11-13
Severity: critical
Justification: causes serious data loss

Hello!

The vzmigrate script (etch Version) fails to use --numeric-ids with
rsync, causing incorrect user-ids on the destination host, and therefore
lots of broken stuff (in my case: ejabberd in the VE wouldn't start, because 
the ejabberd files were owned by another user).

As this causes lots of pain, and loss of (meta-)data, setting Severity: 
critical.

Upstream has patches for this:
http://git.openvz.org/?p=vzctl;a=commitdiff;h=3a6a52665b15225ed2d10186861c00ce3b23b6be
http://git.openvz.org/?p=vzctl;a=commitdiff;h=bb5138eb46abef2507dc0803d8f32642e44af9c3

I think this would be worth patching in etch.

Thanks,
Christian

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-028stab053-dl3xx-openvz
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_US.UTF-8)

Versions of packages vzctl depends on:
ii  iproute20061002-3Professional tools to control the
ii  libc6  2.3.6.ds1-13etch5 GNU C Library: Shared libraries
ii  vzquota3.0.8-2   server virtualization solution - q

Versions of packages vzctl recommends:
ii  rsync   2.6.9-2etch1 fast remote file copy program (lik

-- no debconf information


--- End Message ---
--- Begin Message ---
Source: vzctl
Source-Version: 3.0.11-14

We believe that the bug you reported is fixed in the latest version of
vzctl, which is due to be installed in the Debian FTP archive:

vzctl_3.0.11-14.diff.gz
  to pool/main/v/vzctl/vzctl_3.0.11-14.diff.gz
vzctl_3.0.11-14.dsc
  to pool/main/v/vzctl/vzctl_3.0.11-14.dsc
vzctl_3.0.11-14_i386.deb
  to pool/main/v/vzctl/vzctl_3.0.11-14_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ola Lundqvist <[EMAIL PROTECTED]> (supplier of updated vzctl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 10 Mar 2008 18:58:04 +0100
Source: vzctl
Binary: vzctl
Architecture: source i386
Version: 3.0.11-14
Distribution: stable
Urgency: high
Maintainer: Ola Lundqvist <[EMAIL PROTECTED]>
Changed-By: Ola Lundqvist <[EMAIL PROTECTED]>
Description: 
 vzctl  - server virtualization solution - control tools
Closes: 469293
Changes: 
 vzctl (3.0.11-14) stable; urgency=high
 .
   * Correction for serious permission problem with migration,
 closes: #469293.
Files: 
 b7759e75f82d9393132dc6365cb6626e 568 admin optional vzctl_3.0.11-14.dsc
 c7b56d327104eafd72470d33996d677d 7093 admin optional vzctl_3.0.11-14.diff.gz
 67daca400a673c49e83b461d674f91fb 162002 admin optional vzctl_3.0.11-14_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFH1XdNGKGxzw/lPdkRAu9qAJ44D/l94ss3fQnYwHqiuRAI3z6X+wCcDzd4
zkavHebJB5yelBjHsjLmwio=
=l8X/
-END PGP SIGNATURE-


--- End Message ---


Bug#459020: marked as done (php5-recode crashes on amd64, after eating up all memory)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:57:51 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#459020: fixed in php5 5.2.0-8+etch11
has caused the Debian Bug report #459020,
regarding php5-recode crashes on amd64, after eating up all memory
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
459020: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=459020
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: php5-recode
Version: 5.2.0-8+etch7
Severity: grave
Tags: patch
Justification: renders package unusable


php5-recode crashes on amd64, so all program, which need it, are unusable
(like gosa 2.5.14 from the homepage, solution there is run php4 - which
should get upgraded like stated yesterday ;)

problem is reported to php and listed in bug 41765 (
http://bugs.php.net/bug.php?id=41765 ).

patch is also listed there, it is not from me


-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-5-amd64
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages php5-recode depends on:
ii  libapache-mod-php5 [ph 5.2.0-8+etch7 server-side, HTML-embedded scripti
ii  libc6  2.3.6.ds1-13etch2 GNU C Library: Shared libraries
ii  librecode0 3.6-12Shared library on which recode is 
ii  php5-cli [phpapi-20060 5.2.0-8+etch7 command-line interpreter for the p
ii  php5-common5.2.0-8+etch7 Common files for packages built fr

php5-recode recommends no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Source: php5
Source-Version: 5.2.0-8+etch11

We believe that the bug you reported is fixed in the latest version of
php5, which is due to be installed in the Debian FTP archive:

libapache-mod-php5_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/libapache-mod-php5_5.2.0-8+etch11_i386.deb
libapache2-mod-php5_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/libapache2-mod-php5_5.2.0-8+etch11_i386.deb
php-pear_5.2.0-8+etch11_all.deb
  to pool/main/p/php5/php-pear_5.2.0-8+etch11_all.deb
php5-cgi_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-cgi_5.2.0-8+etch11_i386.deb
php5-cli_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-cli_5.2.0-8+etch11_i386.deb
php5-common_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-common_5.2.0-8+etch11_i386.deb
php5-curl_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-curl_5.2.0-8+etch11_i386.deb
php5-dev_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-dev_5.2.0-8+etch11_i386.deb
php5-gd_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-gd_5.2.0-8+etch11_i386.deb
php5-imap_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-imap_5.2.0-8+etch11_i386.deb
php5-interbase_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-interbase_5.2.0-8+etch11_i386.deb
php5-ldap_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-ldap_5.2.0-8+etch11_i386.deb
php5-mcrypt_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-mcrypt_5.2.0-8+etch11_i386.deb
php5-mhash_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-mhash_5.2.0-8+etch11_i386.deb
php5-mysql_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-mysql_5.2.0-8+etch11_i386.deb
php5-odbc_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-odbc_5.2.0-8+etch11_i386.deb
php5-pgsql_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-pgsql_5.2.0-8+etch11_i386.deb
php5-pspell_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-pspell_5.2.0-8+etch11_i386.deb
php5-recode_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-recode_5.2.0-8+etch11_i386.deb
php5-snmp_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-snmp_5.2.0-8+etch11_i386.deb
php5-sqlite_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-sqlite_5.2.0-8+etch11_i386.deb
php5-sybase_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-sybase_5.2.0-8+etch11_i386.deb
php5-tidy_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-tidy_5.2.0-8+etch11_i386.deb
php5-xmlrpc_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-xmlrpc_5.2.0-8+etch11_i386.deb
php5-xsl_5.2.0-8+etch11_i386.deb
  to pool/main/p/php5/php5-xsl_5.2.0-8+etch11_i386.deb
php5_5.2.0-8+etch11.diff.gz
  to pool/main/p/php5/php5_5.2.0-8+etch11.diff.gz
php5_5.2.0-8+etch11.dsc
  to pool/main/p/php5/php5_5.2.0-8+etch11.dsc
php5_5.2.0-8+etch11_all.deb
  to pool/main/p/php5/php5_5.2.0-8+etch11_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EM

Bug#472105: marked as done (cupsys: CVE-2008-0047 buffer overflow in cgi applications using crafted search queries)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:40:24 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#472105: fixed in cupsys 1.2.7-4etch3
has caused the Debian Bug report #472105,
regarding cupsys: CVE-2008-0047 buffer overflow in cgi applications using 
crafted search queries
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
472105: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=472105
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: cupsys
Severity: important
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for cupsys.

CVE-2008-0047[0]:
| Heap-based buffer overflow in CUPS in Apple Mac OS X 10.5.2, when
| printer sharing is enabled, allows remote attackers to execute
| arbitrary code via crafted search expressions.

Patch:
https://bugzilla.redhat.com/attachment.cgi?id=296901

If you fix this vulnerability please also include the CVE id
in your changelog entry.

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0047

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpB9ABEXobNQ.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---
Source: cupsys
Source-Version: 1.2.7-4etch3

We believe that the bug you reported is fixed in the latest version of
cupsys, which is due to be installed in the Debian FTP archive:

cupsys-bsd_1.2.7-4etch3_i386.deb
  to pool/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_i386.deb
cupsys-client_1.2.7-4etch3_i386.deb
  to pool/main/c/cupsys/cupsys-client_1.2.7-4etch3_i386.deb
cupsys-common_1.2.7-4etch3_all.deb
  to pool/main/c/cupsys/cupsys-common_1.2.7-4etch3_all.deb
cupsys-dbg_1.2.7-4etch3_i386.deb
  to pool/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_i386.deb
cupsys_1.2.7-4etch3.diff.gz
  to pool/main/c/cupsys/cupsys_1.2.7-4etch3.diff.gz
cupsys_1.2.7-4etch3.dsc
  to pool/main/c/cupsys/cupsys_1.2.7-4etch3.dsc
cupsys_1.2.7-4etch3_i386.deb
  to pool/main/c/cupsys/cupsys_1.2.7-4etch3_i386.deb
libcupsimage2-dev_1.2.7-4etch3_i386.deb
  to pool/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_i386.deb
libcupsimage2_1.2.7-4etch3_i386.deb
  to pool/main/c/cupsys/libcupsimage2_1.2.7-4etch3_i386.deb
libcupsys2-dev_1.2.7-4etch3_i386.deb
  to pool/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_i386.deb
libcupsys2-gnutls10_1.2.7-4etch3_all.deb
  to pool/main/c/cupsys/libcupsys2-gnutls10_1.2.7-4etch3_all.deb
libcupsys2_1.2.7-4etch3_i386.deb
  to pool/main/c/cupsys/libcupsys2_1.2.7-4etch3_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Martin Pitt <[EMAIL PROTECTED]> (supplier of updated cupsys package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 22 Mar 2008 13:12:42 +0100
Source: cupsys
Binary: libcupsys2-dev cupsys libcupsys2 libcupsimage2 cupsys-common 
cupsys-client cupsys-dbg cupsys-bsd libcupsys2-gnutls10 libcupsimage2-dev
Architecture: source i386 all
Version: 1.2.7-4etch3
Distribution: stable-security
Urgency: high
Maintainer: [EMAIL PROTECTED]
Changed-By: Martin Pitt <[EMAIL PROTECTED]>
Description: 
 cupsys - Common UNIX Printing System(tm) - server
 cupsys-bsd - Common UNIX Printing System(tm) - BSD commands
 cupsys-client - Common UNIX Printing System(tm) - client programs (SysV)
 cupsys-common - Common UNIX Printing System(tm) - common files
 cupsys-dbg - Common UNIX Printing System(tm) - debugging symbols
 libcupsimage2 - Common UNIX Printing System(tm) - image libs
 libcupsimage2-dev - Common UNIX Printing System(tm) - image development files
 libcupsys2 - Common UNIX Printing System(tm) - libs
 libcupsys2-dev - Common UNIX Printing System(tm) - development files
 libcupsys2-gnutls10 - Common UNIX Printing System(tm) - dummy libs for 
transition
Closes: 467653 472105
Changes: 
 cupsys (1.2.7-4etch3) stable-security; urgency=high
 .
   * Add 72_CVE-2008-0047.dpatch:  Fix buffer overflow in cgiCompileSearch()
 using crafted search expressions. Exploitable if printer sharing is
 enabled. (CVE-2008-0047, STR #2729, Closes: #472105)
   * Add 73_CVE-2008-0882.dpatch: 

Bug#483410: marked as done (CVE-2008-1105: Boundary failure when parsing SMB responses can result in a buffer overrun)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:57:58 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#483410: fixed in samba 3.0.24-6etch10
has caused the Debian Bug report #483410,
regarding CVE-2008-1105: Boundary failure when parsing SMB responses can result 
in a buffer overrun
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
483410: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=483410
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: samba
Version: 3.0.14a-3sarge11
Severity: critical
Tags: security patch
Justification: root security hole

Patch 1 is for etch
Patch 2 is the official patch released by the Samba Team. Applies cleanly on
Debian's 3.0.29. However, we'll fix unstable/testing by building samba 3.0.30

To security team: as I said, I'm unsure that I'll be able to work on
packages for etch. I'll at least try building with that patch. As usual, I
may need guidance to upload to the right place if you're OK for us to upload
for etch.

What about sarge? It is affected as well (samba is 3.0.14 there) but is it
still officially supported wrt security updates?


>From the announcement:

==
== Subject: Boundary failure when parsing SMB responses
==  can result in a buffer overrun
==
== CVE ID#: CVE-2008-1105
==
== Versions:Samba 3.0.0 - 3.0.29 (inclusive)
==
== Summary: Specifically crafted SMB responses can result
==  in a heap overflow in the Samba client code.
==  Because the server process, smbd, can itself
==  act as a client during operations such as
==  printer notification and domain authentication,
==  this issue affects both Samba client and server
==  installations.
==
==

===
Description
===

Secunia Research reported a vulnerability that allows for
the execution of arbitrary code in smbd.  This defect is
is a result of an incorrect buffer size when parsing SMB
replies in the routine receive_smb_raw().


==
Patch Availability
==

A patch addressing this defect has been posted to

  http://www.samba.org/samba/security/
  
  Additionally, Samba 3.0.30 has been issued as a security
  release to correct the defect.  Samba administrators are
  advised to upgrade to 3.0.30 or apply the patch as soon
  as possible.
  
  
  ===
  Credits
  ===
  
  This vulnerability was reported to Samba developers by
  Alin Rad Pop, Secunia Research.
  
  The time line is as follows:
  
  * May 15, 2008: Initial report to [EMAIL PROTECTED]
  * May 15, 2008: First response from Samba developers confirming
the bug along with a proposed patch.
* May 28, 2008: Public security advisory made available.


==
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
==



-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.24-1-686 (SMP w/1 CPU core)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages samba depends on:
ii  adduser3.107 add and remove users and groups
ii  debconf [debconf-2.0]  1.5.22Debian configuration management sy
ii  libacl12.2.47-2  Access control list shared library
ii  libattr1   1:2.4.41-1Extended attribute shared library
ii  libc6  2.7-11GNU C Library: Shared libraries
ii  libcomerr2 1.40.8-2  common error description library
ii  libcupsys2 1.3.7-5   Common UNIX Printing System(tm) - 
ii  libgnutls262.2.5-1   the GNU TLS library - runtime libr
ii  libkrb53   1.6.dfsg.3-2  MIT Kerberos runtime libraries
ii  libldap-2.4-2  2.4.9-1   OpenLDAP libraries
ii  libpam-modules 0.99.7.1-6Pluggable Authentication Modules f
ii  libpam-runtime 0.99.7.1-6Runtime support for the PAM librar
ii  libpam0g   0.99.7.1-6Pluggable Authentication Modules l
ii  libpopt0   1.10-3lib for parsing cmdline parameters
ii  logrotate  3.7.1-3   Log rotation utility
ii  lsb-base   3.2-12Linux Standard Base 3.

Bug#421864: marked as done (chkrootkit: false positive for Enye LKM)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:40:23 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#421864: fixed in chkrootkit 0.47-2
has caused the Debian Bug report #421864,
regarding chkrootkit: false positive for Enye LKM
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
421864: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=421864
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: chkrootkit
Version: 0.47-1.1
Severity: normal


The check for the Enye LKM seems pretty bogus as described here:

http://guru.multimedia.cx/a-few-days-ago-chkrootkit-told-me-enye-lkm-found/

I had exactly the same experience...

Chris

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (700, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-686
Locale: LANG=en_GB, LC_CTYPE=en_GB (charmap=ISO-8859-1)

Versions of packages chkrootkit depends on:
ii  binutils2.17-3   The GNU assembler, linker and bina
ii  debconf [debconf-2.0]   1.5.11   Debian configuration management sy
ii  libc6   2.3.6.ds1-13 GNU C Library: Shared libraries
ii  net-tools   1.60-17  The NET-3 networking toolkit
ii  procps  1:3.2.7-3/proc file system utilities

chkrootkit recommends no packages.

-- debconf information:
* chkrootkit/run_daily_opts: -q
* chkrootkit/run_daily: true
* chkrootkit/diff_mode: false

--- End Message ---
--- Begin Message ---
Source: chkrootkit
Source-Version: 0.47-2

We believe that the bug you reported is fixed in the latest version of
chkrootkit, which is due to be installed in the Debian FTP archive:

chkrootkit_0.47-2.diff.gz
  to pool/main/c/chkrootkit/chkrootkit_0.47-2.diff.gz
chkrootkit_0.47-2.dsc
  to pool/main/c/chkrootkit/chkrootkit_0.47-2.dsc
chkrootkit_0.47-2_amd64.deb
  to pool/main/c/chkrootkit/chkrootkit_0.47-2_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Francois Marier <[EMAIL PROTECTED]> (supplier of updated chkrootkit package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 25 Apr 2008 11:01:00 +1200
Source: chkrootkit
Binary: chkrootkit
Architecture: source amd64
Version: 0.47-2
Distribution: stable
Urgency: low
Maintainer: Francois Marier <[EMAIL PROTECTED]>
Changed-By: Francois Marier <[EMAIL PROTECTED]>
Description: 
 chkrootkit - Checks for signs of rootkits on the local system
Closes: 421864
Changes: 
 chkrootkit (0.47-2) stable; urgency=low
 .
   * Remove Enye check which was killing random applications (closes: #421864)
   * Set myself as maintainer since the package has been orphaned
Files: 
 b78884bf7fa7689da62291c756f993b4 606 misc optional chkrootkit_0.47-2.dsc
 214e4e4cdca809cfd4b6d15cc022247b 20312 misc optional chkrootkit_0.47-2.diff.gz
 8eb4c9c8dcb29b9057d3c020149fc150 292468 misc optional 
chkrootkit_0.47-2_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIERFsScUZKBnQNIYRAtayAJ9/iyclktNbocXGxIwxFm+f54+SwACeNKHe
N14v4PDS4RnGr1oJ+zr5qn4=
=vWET
-END PGP SIGNATURE-


--- End Message ---


Bug#432665: marked as done (wxmaxima: Not connected to maxima!)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:58:07 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#432665: fixed in wxmaxima 0.7.0a-1.1
has caused the Debian Bug report #432665,
regarding wxmaxima: Not connected to maxima!
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
432665: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=432665
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---

Subject: wxmaxima: Not connected to maxima!
Package: wxmaxima
Version: 0.7.0a-1
Severity: grave
Justification: renders package unusable


If I launch wxmaxima I have this message "Not connected to maxima!".

I tried a solution to change in the file /home/arnaud/.wxMaxima the line

maxima=1
with
maxima=/usr/bin/maxima
or
maxima="/usr/bin/maxima"

I read this on a reportbug for wxmaxima 0.7.1, but it does not work here.


-- System Information:
Debian Release: 4.0
 APT prefers stable
 APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-686
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)

Versions of packages wxmaxima depends on:
ii  libc6  2.3.6.ds1-13  GNU C Library: Shared libraries
ii  libgcc11:4.1.1-21GCC support library
ii  libstdc++6 4.1.1-21  The GNU Standard C++ Library v3
ii  libwxbase2.6-0 2.6.3.2.1.5   wxBase library (runtime) -
non-GUI
ii  libwxgtk2.6-0  2.6.3.2.1.5   wxWidgets Cross-platform C++
GUI t
ii  libxml22.6.27.dfsg-1 GNOME XML library
ii  maxima 5.10.0-6  A computer algebra system --
base
ii  maxima-doc 5.10.0-6  A computer algebra system --
docum

wxmaxima recommends no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: wxmaxima
Source-Version: 0.7.0a-1.1

We believe that the bug you reported is fixed in the latest version of
wxmaxima, which is due to be installed in the Debian FTP archive:

wxmaxima_0.7.0a-1.1.diff.gz
  to pool/main/w/wxmaxima/wxmaxima_0.7.0a-1.1.diff.gz
wxmaxima_0.7.0a-1.1.dsc
  to pool/main/w/wxmaxima/wxmaxima_0.7.0a-1.1.dsc
wxmaxima_0.7.0a-1.1_powerpc.deb
  to pool/main/w/wxmaxima/wxmaxima_0.7.0a-1.1_powerpc.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Charles Plessy <[EMAIL PROTECTED]> (supplier of updated wxmaxima package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sun, 27 Apr 2008 15:40:50 +0900
Source: wxmaxima
Binary: wxmaxima
Architecture: source powerpc
Version: 0.7.0a-1.1
Distribution: stable
Urgency: low
Maintainer: Rafa Rodriguez Galvan <[EMAIL PROTECTED]>
Changed-By: Charles Plessy <[EMAIL PROTECTED]>
Description: 
 wxmaxima   - a wxWidgets GUI for the computer algebra system maxima
Closes: 432665
Changes: 
 wxmaxima (0.7.0a-1.1) stable; urgency=low
 .
   * Non-maintainer upload.
   * Imported the patch from bug 1573741 in Upstream's bugtracker.
 This solves grave connexion problems. (Closes: #432665)
Files: 
 f9ef34f01497384a6f8e5305204c480e 707 math optional wxmaxima_0.7.0a-1.1.dsc
 f8608cf1d30654adcfb530f722dee49e 7551 math optional wxmaxima_0.7.0a-1.1.diff.gz
 06480f10d0d6864387a2371a56e11d03 490934 math optional 
wxmaxima_0.7.0a-1.1_powerpc.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIFCkNdYl1krr+x/IRAuvJAJ9aabaJcF2IYTOkeVhtts6bjNc/TwCfUIEV
0R8ajV0B2tDFkElH+PrbMR4=
=gskX
-END PGP SIGNATURE-


--- End Message ---


Bug#445582: marked as done (ldapscripts shows passwords in the clear on the command line)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:40:45 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#445582: fixed in ldapscripts 1.4-2etch1
has caused the Debian Bug report #445582,
regarding ldapscripts shows passwords in the clear on the command line
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
445582: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=445582
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: ldapscripts
Severity: serious
Version: 1.4-2
Tag: security

Unless you're running grsecurity or some other patched kernel, the
following cannot be good:

_changepassword () {
  if [ -z "$1" ] || [ -z "$2" ]
  then
end_die "_changepassword : missing argument(s)"
  else
if is_yes "$RECORDPASSWORDS"
then
  echo "$2 : $1" >> "$PASSWORDFILE"
fi
$LDAPPASSWDBIN -w "$BINDPWD" -D "$BINDDN" -xH "ldap://$SERVER"; -s "$1" "$2" 
2>>"$LOGFILE" 1>/dev/null
  fi
}


Don Armstrong

-- 
This message brought to you by weapons of mass destruction related
program activities, and the letter G.

http://www.donarmstrong.com  http://rzlab.ucr.edu


--- End Message ---
--- Begin Message ---
Source: ldapscripts
Source-Version: 1.4-2etch1

We believe that the bug you reported is fixed in the latest version of
ldapscripts, which is due to be installed in the Debian FTP archive:

ldapscripts_1.4-2etch1.diff.gz
  to pool/main/l/ldapscripts/ldapscripts_1.4-2etch1.diff.gz
ldapscripts_1.4-2etch1.dsc
  to pool/main/l/ldapscripts/ldapscripts_1.4-2etch1.dsc
ldapscripts_1.4-2etch1_all.deb
  to pool/main/l/ldapscripts/ldapscripts_1.4-2etch1_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thijs Kinkhorst <[EMAIL PROTECTED]> (supplier of updated ldapscripts package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 15 Mar 2008 22:03:09 +0100
Source: ldapscripts
Binary: ldapscripts
Architecture: source all
Version: 1.4-2etch1
Distribution: stable-security
Urgency: high
Maintainer: Pierre Habouzit <[EMAIL PROTECTED]>
Changed-By: Thijs Kinkhorst <[EMAIL PROTECTED]>
Description: 
 ldapscripts - Add and remove user and groups (stored in a ldap directory)
Closes: 445582
Changes: 
 ldapscripts (1.4-2etch1) stable-security; urgency=high
 .
   * Non-maintainer upload by the security team
   * Fix information disclosure (password used on command line) with
 upstream patch. Closes: #445582. CVE-2007-5373
Files: 
 dabe3144f01910f1f055a2a6d9b63148 883 admin optional ldapscripts_1.4-2etch1.dsc
 4d4fd01f12940bf2272cf9b2a27e34c5 8429 admin optional 
ldapscripts_1.4-2etch1.diff.gz
 52a069bdb720fb9d9897f96dbc150c8a 28482 admin optional 
ldapscripts_1.4-2etch1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iQEVAwUBR9w5wWz0hbPcukPfAQJnKgf8DCIRoNu2ZeW1CBLMbfJiqqwWve53IbKV
a8eWXv3h/cewz5AorqPlIJjxShu2aQ0gxo6XFRlNOw0bMdkPo1cYvIf+yH6KcHzU
/IHX+U4mGpb3mATVHYsF5PibP599ge09qJBWNC3XQwcBcQ9Jx3N2nNtnzSHNElHP
JA7b9VefiNUZIMsEkOfzCiiOV+vChYX9tSVZUyEb2/LaukA5cgSwa2ylWlD2pM7+
AmwYesLPhoZCho/KiwA8E5ZJ9/cRdC668wbvrQiXuEaT2r5xZQrPdEdpAWAbqnTj
cr4qLTek51SAugPKINuKXZ7XJcTd4hmXQOjYZGxg9KtJems1zrqcSw==
=M9Lm
-END PGP SIGNATURE-


--- End Message ---


Bug#450951: marked as done (grub can't get installed past 1TB)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:40:35 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#450951: fixed in grub 0.97-27etch1
has caused the Debian Bug report #450951,
regarding grub can't get installed past 1TB
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
450951: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450951
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: grub
Version: 0.97-28
Severity: normal

Hi,

When trying to install grub past 1TB, it fails with error 18 (18 :
Selected cylinder exceeds maximum supported by BIOS).  This is because
the HDIO_GETGEO ioctl is limited to 65535 cylinders (i.e. ~1TB), and
for bigger values Linux just returns 65535.  I'm not sure where the fix
should be done: should the kernel error out when the cylinders don't
fit, or should grub recognize 65535 as a bogus value and compute a fake
geometry by itself?  Or both?

Note: there is another bug in bochs's bios which prevents from testing
with bochs or qemu the patch is available on the bochs list, I'll
probably file a bug against the bochs package too.

Samuel

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (500, 'stable'), (1, 
'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.23
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash

Versions of packages grub depends on:
ii  libc6 2.6.1-6GNU C Library: Shared libraries
ii  libncurses5   5.6+20071013-1 Shared libraries for terminal hand

grub recommends no packages.

-- no debconf information

-- 
Samuel
 moo
 moo ?
 P: keski t'arrive? :))
 m
 moo ?
 rien le net marche je suis content :)
 -+- #ens-mim - accro du net -+-


--- End Message ---
--- Begin Message ---
Source: grub
Source-Version: 0.97-27etch1

We believe that the bug you reported is fixed in the latest version of
grub, which is due to be installed in the Debian FTP archive:

grub-disk_0.97-27etch1_all.deb
  to pool/main/g/grub/grub-disk_0.97-27etch1_all.deb
grub-doc_0.97-27etch1_all.deb
  to pool/main/g/grub/grub-doc_0.97-27etch1_all.deb
grub_0.97-27etch1.diff.gz
  to pool/main/g/grub/grub_0.97-27etch1.diff.gz
grub_0.97-27etch1.dsc
  to pool/main/g/grub/grub_0.97-27etch1.dsc
grub_0.97-27etch1_amd64.deb
  to pool/main/g/grub/grub_0.97-27etch1_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Robert Millan <[EMAIL PROTECTED]> (supplier of updated grub package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sun,  6 Apr 2008 14:37:36 +0200
Source: grub
Binary: grub-disk grub grub-doc
Architecture: source amd64 all
Version: 0.97-27etch1
Distribution: stable
Urgency: low
Maintainer: Grub Maintainers <[EMAIL PROTECTED]>
Changed-By: Robert Millan <[EMAIL PROTECTED]>
Description: 
 grub   - GRand Unified Bootloader
 grub-disk  - GRUB bootable disk image
 grub-doc   - Documentation for GRand Unified Bootloader
Closes: 450951
Changes: 
 grub (0.97-27etch1) stable; urgency=low
 .
   * 1tib_disk_limit.diff: Fix 1 TiB disk addressing limit.
 (Closes: #450951)
Files: 
 308537dbfc7f549e142baa6d99520a1d 906 admin optional grub_0.97-27etch1.dsc
 cb1f39d551a6c70159ce91d44dddccbb 76518 admin optional grub_0.97-27etch1.diff.gz
 ff193424ddf7f61f0c8194aac639a6e3 883618 admin optional 
grub_0.97-27etch1_amd64.deb
 e95f8cc654b071a9895d23b74b2aad56 245074 admin optional 
grub-disk_0.97-27etch1_all.deb
 de2c52075b4d848bdc8a20ed0fbc34c6 273244 doc optional 
grub-doc_0.97-27etch1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFH+MUbC19io6rUCv8RAsx0AJ9bzjgMz1sqzk/DEj1jii3KMB7zKgCeIbXb
8Prxws06dMaYQQk6lX/lP0w=
=8+Al
-END PGP SIGNATURE-


--- End Message ---


Bug#459961: marked as done (mt-daapd: CVE-2007-582[4,5] multiple security vulnerabilities)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:57:42 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#459961: fixed in mt-daapd 0.2.4+r1376-1.1+etch1
has caused the Debian Bug report #459961,
regarding mt-daapd: CVE-2007-582[4,5] multiple security vulnerabilities
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
459961: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=459961
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: mt-daapd
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for mt-daapd.

CVE-2007-5824[0]:
| webserver.c in mt-dappd in Firefly Media Server 0.2.4 and earlier
| allows remote attackers to cause a denial of service (NULL dereference
| and daemon crash) via a stats method action to /xml-rpc with (1) an
| empty Authorization header line, which triggers a crash in the
| ws_decodepassword function; or (2) a header line without a ':'
| character, which triggers a crash in the ws_getheaders function.

If you fix this vulnerability please also include the CVE id
in your changelog entry.

A patch extracted from upstream CVS is attached.

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5824

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
#! /bin/sh /usr/share/dpatch/dpatch-run
## CVE-2007-5825-2007-5825.dpatch by Nico Golde <[EMAIL PROTECTED]>
##
## All lines beginning with `## DP:' are a description of the patch.
## DP: No description.

@DPATCH@
diff -urNad mt-daapd-0.9~r1586~/src/webserver.c 
mt-daapd-0.9~r1586/src/webserver.c
--- mt-daapd-0.9~r1586~/src/webserver.c 2007-05-17 06:26:33.0 +0200
+++ mt-daapd-0.9~r1586/src/webserver.c  2008-01-09 22:19:22.0 +0100
@@ -758,7 +758,7 @@
 free(value);
 }
 
-if(!last) {
+if(last == first) {
 DPRINTF(E_DBG,L_WS,"Thread %d: Done parsing GET/POST args!\n",
 pwsc->threadno);
 done=1;
@@ -961,12 +961,11 @@
 if((auth_handler) && (auth_handler(pwsc,NULL,NULL)==0)) {
 /* do the auth thing */
 auth=ws_getarg(&pwsc->request_headers,"Authorization");
-if(auth) {
-ws_decodepassword(auth,&username,&password);
+if((auth) && (ws_decodepassword(auth,&username, &password))) {
 if(auth_handler(pwsc,username,password))
 can_dispatch=1;
-ws_addarg(&pwsc->request_vars,"HTTP_USER",username);
-ws_addarg(&pwsc->request_vars,"HTTP_PASSWD",password);
+ws_addarg(&pwsc->request_vars,"HTTP_USER","%s", username);
+ws_addarg(&pwsc->request_vars,"HTTP_PASSWD", "%s", 
password);
 free(username); /* this frees password too */
 }
 
@@ -1430,6 +1429,7 @@
 int pads=0;
 unsigned char *decodebuffer;
 unsigned char *pin, *pout;
+char *type,*base64;
 int lookup;
 
 *username=NULL;
@@ -1458,21 +1458,34 @@
 return -1;
 
 /* xlat table is initialized */
-while(*header != ' ')
+// Trim leading spaces
+while((*header) && (*header == ' '))
 header++;
 
-header++;
+// Should be in the form "Basic "
+type=header;
+base64 = strchr(header,' ');
+if(!base64) {
+// invalid auth header 
+ws_dprintf(L_WS_DBG,"Bad authentication header: %s\n",header);
+WS_EXIT();
+return FALSE;
+}
+
+*base64 = '\0';
+base64++;
+
+decodebuffer=(unsigned char *)malloc(strlen(base64));
 
-decodebuffer=(unsigned char *)malloc(strlen(header));
 if(!decodebuffer)
 return -1;
 
-DPRINTF(E_DBG,L_WS,"Preparing to decode %s\n",header);
+DPRINTF(E_DBG,L_WS,"Preparing to decode %s\n",base64);
 
-memset(decodebuffer,0,strlen(header));
+memset(decodebuffer,0,strlen(base64));
 len=0;
 pout=decodebuffer;
-pin=(unsigned char *)header;
+pin=(unsigned char *)base64;
 
 /* this is more than a little sloppy */
 while(pin[rack]) {


pgp2sAIyrjYJH.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---
Source: mt-daapd
Source-Version: 0.2.4+r1376-1.1+etch1

We believe that the bug you reported is fixed in the latest version of
mt-daapd, which is due to be installed in the Debian FTP archive:

mt-daapd_0.2.4+r1376-1.1+etch1.diff.gz
  to pool/main/m/mt-daapd/mt-daapd_0.2

Bug#487238: marked as done (ruby1.8: Arbitrary code execution vulnerability and so on)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:57:57 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#487238: fixed in ruby1.8 1.8.5-4etch2
has caused the Debian Bug report #487238,
regarding ruby1.8: Arbitrary code execution vulnerability and so on
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
487238: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487238
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: ruby1.8
Version: 1.8.6.114-2
Severity: grave
Tags: security
Justification: user security hole


The upstream has announced multiple vulnerabilities in Ruby. They may lead
to a denial of service (DoS) condition or allow execution of arbitrary code.
  * CVE-2008-2662
  * CVE-2008-2663
  * CVE-2008-2725
  * CVE-2008-2726
  * CVE-2008-2727
  * CVE-2008-2728
  * CVE-2008-2664

Vulnerable versions

1.8 series
  * 1.8.4 and all prior versions
  * 1.8.5-p230 and all prior versions
  * 1.8.6-p229 and all prior versions
  * 1.8.7-p21 and all prior versions

1.9 series
  * 1.9.0-1 and all prior versions

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'stable'), (90, 'unstable'), (1, 
'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.24-1-686 (SMP w/2 CPU cores)
Locale: LANG=ja_JP.eucJP, LC_CTYPE=ja_JP.eucJP (charmap=EUC-JP)
Shell: /bin/sh linked to /bin/bash

Versions of packages ruby1.8 depends on:
ii  libc62.7-10  GNU C Library: Shared libraries
ii  libruby1.8   1.8.6.114-2 Libraries necessary to run Ruby 1.

ruby1.8 recommends no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Source: ruby1.8
Source-Version: 1.8.5-4etch2

We believe that the bug you reported is fixed in the latest version of
ruby1.8, which is due to be installed in the Debian FTP archive:

irb1.8_1.8.5-4etch2_all.deb
  to pool/main/r/ruby1.8/irb1.8_1.8.5-4etch2_all.deb
libdbm-ruby1.8_1.8.5-4etch2_i386.deb
  to pool/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch2_i386.deb
libgdbm-ruby1.8_1.8.5-4etch2_i386.deb
  to pool/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch2_i386.deb
libopenssl-ruby1.8_1.8.5-4etch2_i386.deb
  to pool/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch2_i386.deb
libreadline-ruby1.8_1.8.5-4etch2_i386.deb
  to pool/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch2_i386.deb
libruby1.8-dbg_1.8.5-4etch2_i386.deb
  to pool/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch2_i386.deb
libruby1.8_1.8.5-4etch2_i386.deb
  to pool/main/r/ruby1.8/libruby1.8_1.8.5-4etch2_i386.deb
libtcltk-ruby1.8_1.8.5-4etch2_i386.deb
  to pool/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch2_i386.deb
rdoc1.8_1.8.5-4etch2_all.deb
  to pool/main/r/ruby1.8/rdoc1.8_1.8.5-4etch2_all.deb
ri1.8_1.8.5-4etch2_all.deb
  to pool/main/r/ruby1.8/ri1.8_1.8.5-4etch2_all.deb
ruby1.8-dev_1.8.5-4etch2_i386.deb
  to pool/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch2_i386.deb
ruby1.8-elisp_1.8.5-4etch2_all.deb
  to pool/main/r/ruby1.8/ruby1.8-elisp_1.8.5-4etch2_all.deb
ruby1.8-examples_1.8.5-4etch2_all.deb
  to pool/main/r/ruby1.8/ruby1.8-examples_1.8.5-4etch2_all.deb
ruby1.8_1.8.5-4etch2.diff.gz
  to pool/main/r/ruby1.8/ruby1.8_1.8.5-4etch2.diff.gz
ruby1.8_1.8.5-4etch2.dsc
  to pool/main/r/ruby1.8/ruby1.8_1.8.5-4etch2.dsc
ruby1.8_1.8.5-4etch2_i386.deb
  to pool/main/r/ruby1.8/ruby1.8_1.8.5-4etch2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
akira yamada <[EMAIL PROTECTED]> (supplier of updated ruby1.8 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 10 Jul 2008 14:58:13 +0900
Source: ruby1.8
Binary: libtcltk-ruby1.8 libruby1.8-dbg rdoc1.8 libgdbm-ruby1.8 ruby1.8-dev 
ruby1.8-elisp ruby1.8-examples libdbm-ruby1.8 irb1.8 ruby1.8 
libreadline-ruby1.8 libopenssl-ruby1.8 libruby1.8 ri1.8
Architecture: source i386 all
Version: 1.8.5-4etch2
Distribution: stable-security
Urgency: low
Maintainer: akira yamada <[EMAIL PROTECTED]>
Changed-By: akira yamada <[EMAIL PROTECTED]>
Description: 
 irb1.8 - Interactive Ruby (for Ruby 1.8)
 libdbm-ruby1.8 - DBM interface for Ruby 1.8
 libgdbm-ruby1.8 - GDBM interface for Ruby 1.8
 libopenssl-ruby1.8 - OpenSS

Bug#457828: marked as done (chkrootkit: Killing a random PID with an arbitrary signal to test whether it is a trojan is extremely unpolite)

2008-07-26 Thread Debian Bug Tracking System

Your message dated Sat, 26 Jul 2008 09:40:23 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#421864: fixed in chkrootkit 0.47-2
has caused the Debian Bug report #421864,
regarding chkrootkit: Killing a random PID with an arbitrary signal to test 
whether it is a trojan is extremely unpolite
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
421864: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=421864
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: chkrootkit
Version: 0.47-1.1
Severity: critical
Justification: breaks unrelated software

In testing for the Enye LKM, chkrootkit sends signal 58 to PID 12345.
This has a chance of hitting any one process of 1/32767.  On the
system I am typing this on in its current state, I have 350 processes
running, and it is not currently busy, so that's 1/100 chance of
hitting a process by random.

If the system is up for a while, and I run chkrootkit in a daily
cronjob, I can expect a random process to be sent signal 58 once every
100 days or so.

The other day, it killed gnuplot_x11, which I only noticed once I read
my mail saying chkrootkit had "Enye LKM found".  It certainly
explained why a script of mine got confused, and I could tell it had
killed gnuplot_x11 because it was still in a zombie state, having not
yet been reaped by gnuplot, and it was running as pid 12345.  There
are reports on the net of it killing other processes.

That signal number is not documented in 'man 7 signal', so I guess
it's not likely anything would install a signal handler than could
deal with 58.  Presumably chkrootkit is hoping that signal would be
rejected by the kernel as invalid, but that assumption is invalid
today:

$ sleep 1000 &
[1] 19277
$ kill -58 19277
[1]+  Real-time signal 24 sleep 1000
$

Incidentally, the documentation of the tests in chkproc.c needs a lot
of work: 'man 2 kill' doesn't describe kill as ever being able to
return a positive error value, but of course it must, because I got
the "Enye LKM found" message.  It took me a while to work out that
that code was trying to do anything other than detect for the presence
of pid 12345.  Perhaps the signals it is sending could be better
documented, as to the test for the error return value, and indeed the
prevous test for the Adobe LKM, using an errno magic number instead of
symbolic name.  And why it sends signal 100 to init first without
testing the result.



-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 
'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.23 (SMP w/2 CPU cores)
Locale: LANG=en_AU, LC_CTYPE=en_AU (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/bash

Versions of packages chkrootkit depends on:
ii  binutils2.18.1~cvs20071027-2 The GNU assembler, linker and bina
ii  debconf [debconf-2. 1.5.17   Debian configuration management sy
ii  libc6   2.7-5GNU C Library: Shared libraries
ii  net-tools   1.60-19  The NET-3 networking toolkit
ii  procps  1:3.2.7-5/proc file system utilities

chkrootkit recommends no packages.

-- debconf information:
  chkrootkit/run_daily: false
  chkrootkit/run_daily_opts: -q
  chkrootkit/diff_mode: false


--- End Message ---
--- Begin Message ---
Source: chkrootkit
Source-Version: 0.47-2

We believe that the bug you reported is fixed in the latest version of
chkrootkit, which is due to be installed in the Debian FTP archive:

chkrootkit_0.47-2.diff.gz
  to pool/main/c/chkrootkit/chkrootkit_0.47-2.diff.gz
chkrootkit_0.47-2.dsc
  to pool/main/c/chkrootkit/chkrootkit_0.47-2.dsc
chkrootkit_0.47-2_amd64.deb
  to pool/main/c/chkrootkit/chkrootkit_0.47-2_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Francois Marier <[EMAIL PROTECTED]> (supplier of updated chkrootkit package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 25 Apr 2008 11:01:00 +1200
Source: chkrootkit
Binary: chkrootkit
Architecture: source amd64
Version: 0.47-2
Distribution: stable
Urgency: low
Ma

  1   2   >