Processed: portmap severity 490893 important
Processing commands for [EMAIL PROTECTED]: > severity 490893 important Bug#490893: Debian unstable: umountroot does not unmount root Severity set to `important' from `grave' > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#501151: Preparing packaging for ocfs2-tools 1.4.1-1
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Frederik, Joel, I have started putting together the packaging for ocfs2-tools here: https://svn.jerryweb.org/public/packages/ocfs2-tools/ What would you think of applying for some space on alioth so that we can maintain ocfs2-tools collaboratively and finally upload a recent version of ocfs2-tools? Cheers, Jeremy -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkkmZVoACgkQ4mJJZqJp2Se/tACffFdlJQ+gIhVuX1q/ztuLSP0Y /NgAoMpRSXywkX+p7DkOf65e36nQhKcH =KhPU -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506373: [Evolution] Bug#506373: evolution email crashes when receiving a specific invitation from Google Calendar
On ven, 2008-11-21 at 00:08 +0100, Cyrille Chépélov wrote: > It then crashes again at boot, when trying > again to display the last received (same) message. NOt arguing about the other stuff, but when evo crash here, at restart it asks if it can display the offending message. Cheers, -- Yves-Alexis signature.asc Description: This is a digitally signed message part
Bug#506391: kover_1:3-1(hppa/experimental): FTBFS: qmultilinedit.h: No such file or directory
Package: kover Version: 1:3-1 Severity: serious Hi, your package failed to build from source. | Automatic build of kover_1:3-1 on lofn by sbuild/hppa 98-farm | Build started at 20081121-0336 | ** | Checking available source versions... | Fetching source files... | Reading package lists... | Building dependency tree... | Need to get 688kB of source archives. | Get:1 http://sinclair.farm.ftbfs.de experimental/main kover 1:3-1 (dsc) [995B] | Get:2 http://sinclair.farm.ftbfs.de experimental/main kover 1:3-1 (tar) [681kB] | Get:3 http://sinclair.farm.ftbfs.de experimental/main kover 1:3-1 (diff) [5928B] | Fetched 688kB in 0s (994kB/s) | Download complete and in download only mode | ** Using build dependencies supplied by package: | Build-Depends: autotools-dev, kdelibs4-dev (>= 3.4.2), debhelper (>= 5.0.51~), dbs, imagemagick, libcdio-cdda-dev, libcddb2-dev, chrpath | Checking for already installed source dependencies... [...] | g++ -DHAVE_CONFIG_H -I. -I.. -I/usr/include/kde -I/usr/include/kde -I/usr/include/qt3 -I.-DQT_THREAD_SUPPORT -D_REENTRANT -Wnon-virtual-dtor -Wno-long-long -Wundef -ansi -D_XOPEN_SOURCE=500 -D_BSD_SOURCE -Wcast-align -Wconversion -Wchar-subscripts -Wall -W -Wpointer-arith -Wwrite-strings -O2 -Wnon-virtual-dtor -Wno-long-long -Wundef -ansi -D_XOPEN_SOURCE=500 -D_BSD_SOURCE -Wcast-align -Wconversion -Wchar-subscripts -Wall -W -Wpointer-arith -Wwrite-strings -O2 -g -O2 -std=gnu++98 -Wformat-security -Wmissing-format-attribute -fno-exceptions -fno-check-new -fno-common -Wformat-security -Wmissing-format-attribute -fno-exceptions -fno-check-new -fno-common -MT kover.all_cc.o -MD -MP -MF .deps/kover.all_cc.Tpo -c -o kover.all_cc.o kover.all_cc.cc | In file included from kovertop.moc:11, | from kovertop.cc:22, | from kover.all_cc.cc:5: | kovertop.h:41:27: error: qmultilinedit.h: No such file or directory | In file included from /usr/include/qt3/qwindowdefs.h:47, | from /usr/include/qt3/qwidget.h:45, | from imagedlg.h:35, | from imagedlg.moc:11, | from imagedlg.cc:32, | from kover.all_cc.cc:2: | /usr/include/qt3/qstring.h: In member function 'char QChar::latin1() const': | /usr/include/qt3/qstring.h:197: warning: conversion to 'char' from 'int' may alter its value | /usr/include/qt3/qstring.h: In member function 'void QChar::setCell(uchar)': | /usr/include/qt3/qstring.h:222: warning: conversion to 'ushort' from 'int' may alter its value | /usr/include/qt3/qstring.h: In member function 'void QChar::setRow(uchar)': | /usr/include/qt3/qstring.h:223: warning: conversion to 'ushort' from 'int' may alter its value | /usr/include/qt3/qstring.h: In constructor 'QChar::QChar(uchar, uchar)': | /usr/include/qt3/qstring.h:267: warning: conversion to 'ushort' from 'int' may alter its value | /usr/include/qt3/qstring.h: In constructor 'QStringData::QStringData(QChar*, uint, uint)': | /usr/include/qt3/qstring.h:365: warning: conversion to 'unsigned int:30' from 'uint' may alter its value | /usr/include/qt3/qstring.h:365: warning: conversion to 'unsigned int:30' from 'uint' may alter its value | In file included from /usr/include/qt3/qobject.h:48, | from /usr/include/qt3/qwidget.h:46, | from imagedlg.h:35, | from imagedlg.moc:11, | from imagedlg.cc:32, | from kover.all_cc.cc:2: | /usr/include/qt3/qevent.h: In member function 'void QDropEvent::setAction(QDropEvent::Action)': | /usr/include/qt3/qevent.h:523: warning: conversion to 'unsigned char' from 'uint' may alter its value | In file included from /usr/include/qt3/qwidget.h:52, | from imagedlg.h:35, | from imagedlg.moc:11, | from imagedlg.cc:32, | from kover.all_cc.cc:2: | /usr/include/qt3/qsizepolicy.h: In member function 'void QSizePolicy::transpose()': | /usr/include/qt3/qsizepolicy.h:125: warning: conversion to 'uchar' from 'uint' may alter its value | /usr/include/qt3/qsizepolicy.h:125: warning: conversion to 'uchar' from 'uint' may alter its value | In file included from imagedlg.h:39, | from imagedlg.moc:11, | from imagedlg.cc:32, | from kover.all_cc.cc:2: | /usr/include/qt3/qpushbutton.h: In member function 'virtual void QPushButton::setIsMenuButton(bool)': | /usr/include/qt3/qpushbutton.h:94: warning: conversion to 'unsigned char:1' from 'int' may alter its value | In file included from kover.all_cc.cc:3: | cddb_fill.cc: In member function 'bool cddb_fill::read_cdtext()': | cddb_fill.cc:84: warning: conversion to 'track_t' from 'int' may alter its value | cddb_fill.cc:86: warning: conversion to 'short unsigned int' from 'int' may alter its value | In file included from kover.all_cc.cc:4: | koverfile.cc: In member functi
Bug#506393: xcb-util_0.3.1-1(hppa/experimental): FTBFS: ./autogen.sh: Permission denied
Package: xcb-util Version: 0.3.1-1 Severity: serious Hi, your package failed to build from source. | Automatic build of xcb-util_0.3.1-1 on lofn by sbuild/hppa 98-farm | Build started at 20081121-0249 | ** | Checking available source versions... | Fetching source files... | Reading package lists... | Building dependency tree... | Need to get 825kB of source archives. | Get:1 http://sinclair.farm.ftbfs.de experimental/main xcb-util 0.3.1-1 (dsc) [1654B] | Get:2 http://sinclair.farm.ftbfs.de experimental/main xcb-util 0.3.1-1 (tar) [417kB] | Get:3 http://sinclair.farm.ftbfs.de experimental/main xcb-util 0.3.1-1 (diff) [406kB] | Fetched 825kB in 0s (1063kB/s) | Download complete and in download only mode | ** Using build dependencies supplied by package: | Build-Depends: cdbs, debhelper (>= 5), autotools-dev, libxcb-render0-dev, libxcb1-dev, gperf, pkg-config, libxcb-shm0-dev, m4, autoconf, automake, libtool, x11proto-core-dev (>= 7.0.12) | Checking for already installed source dependencies... [...] | ./autogen.sh --build=hppa-linux-gnu --prefix=/usr --includedir="\${prefix}/include" --mandir="\${prefix}/share/man" --infodir="\${prefix}/share/info" --sysconfdir=/etc --localstatedir=/var --libexecdir="\${prefix}/lib/xcb-util" --disable-maintainer-mode --disable-dependency-tracking --srcdir=. | /bin/sh: ./autogen.sh: Permission denied | make: *** [configure-stamp] Error 126 | dpkg-buildpackage: failure: debian/rules build gave error exit status 2 | ** | Build finished at 20081121-0252 | FAILED [dpkg-buildpackage died] Full build log(s): http://experimental.ftbfs.de/build.php?&ver=0.3.1-1&pkg=xcb-util&arch=hppa Gruesse, -- Frank Lichtenheld <[EMAIL PROTECTED]> www: http://www.djpig.de/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506323: #506323
Am Donnerstag, 20. November 2008 16:20 schrieb Bastian Blank: > severity 506323 important > thanks > > First, make sure you have the last version installed, this is 2.6.26-10. > Second, make sure you have the latest firmware installed, both for the > machine and the raid controller. Ok, we've updated to 2.6.26-10 and will give it a try. Firmware for all components had been checked and updated. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#504894: [Pkg-nagios-devel] Bug#504894: SA32610: Nagios "cmd.cgi" Cross-Site Request Forgery
Raphael Geissert schrieb am Thursday, den 20. November 2008: > retitle 504894 CVE-2008-5028: Nagios "cmd.cgi" cross-site request forgery > thanks > > 2008/11/7 Raphael Geissert <[EMAIL PROTECTED]>: > [...] > > > > A proposed patch is available at [2]. > > > > If you fix the vulnerability please also make sure to include the SA id (or > > the CVE id when one is assigned) in the changelog entry. > > This issue has been assigned the following id: CVE-2008-5028, please > use it instead of the Secunia Advisory when fixing/referring to this > bug. > > Btw, what's the ETA? If I don't find any new bugs in my patch: Today :). Alex -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#494936: firmware-bnx2: latest lenny requires manual reload of bnx2 driver
Sorry!!! I just realized /boot was mapped wrong! Problem solved. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#502761: I suggest removing the call to emacspeakconfig and add a mention in README.Debian
On Thu, Nov 20, 2008 at 09:48:55PM -0500, James R. Van Zandt wrote: > However, I do have a problem with this one: > > > * Use Christian Perrier's patch for stopping the call to > >emacspeakconfig. (Closes: #502761) > > The purpose of the emacspeak package is to make emacs accessible to a > blind user. I think configuration during installation is particularly > important for this package. Without configuration, the user is left > with a broken package. Ordinarily that would not be a serious problem > - he only has to read the emacspeak.info documentation and edit > /etc/emacspeak.conf, or else read the comments in README.Debian and > run emacspeakconfig. However, in this case we may have broken the > tool he would use for those tasks. With 26.0-3, he may be annoyed at > answering configuration questions while packages are being unpacked, > but he finishes with a working program. > > The emacspeak-28.0-4 package: > - has all the above mentioned bugs fixed > - is configured using debconf > - has an extra year's worth of upstream development. > > I would like to have emacspeak-28.0-4 and emacspeak-ss-1.12-2 unblocked. > Failing that, I'll try to backport the debconf changes to the 26.0 > package. Thanks for the explanation, James. I guess it's up to the release team to decide the next course of action. Kumar -- Kumar Appaiah -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#502761: I suggest removing the call to emacspeakconfig and add a mention in README.Debian
Kumar - Fixes for the symlink attacks (#496431) and the info file syntax problem (#500638) are fine. However, I do have a problem with this one: > * Use Christian Perrier's patch for stopping the call to >emacspeakconfig. (Closes: #502761) The purpose of the emacspeak package is to make emacs accessible to a blind user. I think configuration during installation is particularly important for this package. Without configuration, the user is left with a broken package. Ordinarily that would not be a serious problem - he only has to read the emacspeak.info documentation and edit /etc/emacspeak.conf, or else read the comments in README.Debian and run emacspeakconfig. However, in this case we may have broken the tool he would use for those tasks. With 26.0-3, he may be annoyed at answering configuration questions while packages are being unpacked, but he finishes with a working program. The emacspeak-28.0-4 package: - has all the above mentioned bugs fixed - is configured using debconf - has an extra year's worth of upstream development. I would like to have emacspeak-28.0-4 and emacspeak-ss-1.12-2 unblocked. Failing that, I'll try to backport the debconf changes to the 26.0 package. - Jim Van Zandt > Date: Wed, 19 Nov 2008 21:33:28 -0600 > From: Kumar Appaiah <[EMAIL PROTECTED]> > Cc: Christian Perrier <[EMAIL PROTECTED]> > > On Wed, Nov 19, 2008 at 10:09:15PM -0500, James R. Van Zandt wrote: > > Yes, I realize that my first package of version 28.0 missed the > > deadline for Lenny by a few days. The functional difference from > > version 26.0 is not great. (Dr. Raman just increments the version > > number every six months.) However, that does make it a year newer > > than the version currently in testing. > > Thanks James. While you are at it, I hope you didn't mind my upload to > testing to fix a few bugs: > > http://packages.qa.debian.org/e/emacspeak/news/20081112T004707Z.html > > Do voice your concerns if you have any, but I did check with some > emacspeak users before actually going ahead with the uploads for the > RC bug fixes. > > Thanks! > > Kumar > --=20 > Kumar Appaiah -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#502140: restarting xscreensaver
On Thu, Nov 20, 2008 at 11:47:49PM +0100, Moritz Muehlenhoff wrote: > On Sat, Nov 15, 2008 at 11:55:55PM -0800, Steve Langasek wrote: > > On Wed, Oct 22, 2008 at 08:49:27AM +0200, Thomas Viehmann wrote: > > Well, that sounds better than the current state, but a) the code for it > > isn't written and I'm not familiar enough with xscreensaver to be confident > > of getting it right on the first try myself, b) we have to cover more than > > just xscreensaver (xlockmore is also affected AIUI), c) I'm not sure if > > peeking in /proc is going to work if the user has SELinux turned on. > > It also seems to introduce a race condition where the display is unlocked > > and vulnerable to attack during the upgrade, which I'd prefer not to have > > pam itself be responsible for. I think advising the user to disable the > > screensaver for the duration of the upgrade is a choice I'd be more > > comfortable with, rather than forcibly restarting the screensaver. > I've filed a bug against release-notes which such an advise (bug number > not yet available). > | During the upgrade of the Pluggable Authentication Modules system, the > | authentication modes need to be restarted. Some services used for locking > | a user session cannot be restarted, e.g. xscreensaver, gnome-screensaver > | or xlockmore. It is recommended to stop them before starting the update. > So we can downgrade this to something not-RC. The release managers can override of course, but I disagree. I think it's important that this be documented in-line when you perform the upgrade itself; I'm working on updating libpam0g to do that. I've mostly been delayed because libpam0g is the wrong place for this question - it belongs to libpam-modules, but libpam-modules would need to ask in the package preinst and is a transitively-essential package, so I'm trying to make sure I get the semantics right here before uploading anything. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. Ubuntu Developerhttp://www.debian.org/ [EMAIL PROTECTED] [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506179: marked as done (no-ip: remote code execution vulnerability)
Your message dated Fri, 21 Nov 2008 01:47:03 + with message-id <[EMAIL PROTECTED]> and subject line Bug#506179: fixed in no-ip 2.1.7-11 has caused the Debian Bug report #506179, regarding no-ip: remote code execution vulnerability to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 506179: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506179 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Source: no-ip Severity: grave Version: 2.1.1-4 Tags: security Hi, An exploit[1] has been published for the no-ip DUC. At the moment there's no much other information than the one provided in the exploit, which I can summarise as: The exploit relies on DNS poisoning or man in the middle attacks to fake the server's response. Once this has been done the exploit waits for an IP check, to then prepare the shellcode to send which is requires the knowledge of the memory offset of the buffer which must of course be static and determined for each build. After the client receives a faked IP to force a update the exploit delivers the shellcode, which is executed because of a buffer overflow when processing the server's response. If you fix the vulnerability please also make sure to include the CVE id when one is assigned in the changelog entry. [1]http://www.milw0rm.com/exploits/7151 Cheers, -- Raphael Geissert - Debian Maintainer www.debian.org - get.debian.net signature.asc Description: This is a digitally signed message part. --- End Message --- --- Begin Message --- Source: no-ip Source-Version: 2.1.7-11 We believe that the bug you reported is fixed in the latest version of no-ip, which is due to be installed in the Debian FTP archive: no-ip_2.1.7-11.diff.gz to pool/main/n/no-ip/no-ip_2.1.7-11.diff.gz no-ip_2.1.7-11.dsc to pool/main/n/no-ip/no-ip_2.1.7-11.dsc noip2_2.1.7-11_i386.deb to pool/main/n/no-ip/noip2_2.1.7-11_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Andres Mejia <[EMAIL PROTECTED]> (supplier of updated no-ip package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 20 Nov 2008 19:25:31 -0500 Source: no-ip Binary: noip2 Architecture: source i386 Version: 2.1.7-11 Distribution: unstable Urgency: high Maintainer: Otavio Salvador <[EMAIL PROTECTED]> Changed-By: Andres Mejia <[EMAIL PROTECTED]> Description: noip2 - client for dynamic DNS service Closes: 506179 Changes: no-ip (2.1.7-11) unstable; urgency=high . [ Avi Rozen ] * Fixed grave bug: remote code execution vulnerability. (Closes: #506179) Checksums-Sha1: e5638fbd316614435c4292668b44a5d9faa0e479 1203 no-ip_2.1.7-11.dsc 850c0be4085e780227d3fb9058b5f4791b9ffd95 20579 no-ip_2.1.7-11.diff.gz cd1cab0704ade07afd75688d7170f9cb300f0156 74284 noip2_2.1.7-11_i386.deb Checksums-Sha256: a9495f5b9d10421b0f554eee4396774cdfa79eaafdffd15d53c4ab39cb2d4cb3 1203 no-ip_2.1.7-11.dsc 1714618c7a096e83b43df6d6f126705fa411a93b6adf5e2926445b3c8e712eb1 20579 no-ip_2.1.7-11.diff.gz 0150ca40510dea4cf6a5a484ef51774d040da098f857ad5554360d1ac5f8bf7b 74284 noip2_2.1.7-11_i386.deb Files: 2ec242cee97ce90ce47d96ac13d99208 1203 net optional no-ip_2.1.7-11.dsc 6a276b86a434503feaaed058d4c3afd9 20579 net optional no-ip_2.1.7-11.diff.gz 517fb1245e07e3acb120ba96d148d46b 74284 net optional noip2_2.1.7-11_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkkmEa0ACgkQgsFbAuXxMZa0uwCfV5SMR2nhArMLjNEgsYX48K4u 2moAoKL+z+kI8SsM8vi0XbD3oA27iijI =OBs0 -END PGP SIGNATURE- --- End Message ---
Bug#506179: Fwd: Bug#506179: no-ip: remote code execution vulnerability
I'll upload to unstable. Will someone be handling the upload to stable? -- Regards, Andres signature.asc Description: This is a digitally signed message part.
Bug#504894: SA32610: Nagios "cmd.cgi" Cross-Site Request Forgery
retitle 504894 CVE-2008-5028: Nagios "cmd.cgi" cross-site request forgery thanks 2008/11/7 Raphael Geissert <[EMAIL PROTECTED]>: [...] > > A proposed patch is available at [2]. > > If you fix the vulnerability please also make sure to include the SA id (or > the CVE id when one is assigned) in the changelog entry. This issue has been assigned the following id: CVE-2008-5028, please use it instead of the Secunia Advisory when fixing/referring to this bug. Btw, what's the ETA? > > [1]http://secunia.com/Advisories/32610/ > [2]http://git.op5.org/git/?p=nagios.git;a=commit;h=814d8d4d1a73f7151eeed187c0667585d79fea18 > > Cheers, Cheers, -- Raphael Geissert - Debian Maintainer www.debian.org - get.debian.net Alfred Hitchcock - "Television has brought back murder into the home - where it belongs." -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Re: SA32610: Nagios "cmd.cgi" Cross-Site Request Forgery
Processing commands for [EMAIL PROTECTED]: > retitle 504894 CVE-2008-5028: Nagios "cmd.cgi" cross-site request forgery Bug#504894: SA32610: Nagios "cmd.cgi" Cross-Site Request Forgery Changed Bug title to `CVE-2008-5028: Nagios "cmd.cgi" cross-site request forgery' from `SA32610: Nagios "cmd.cgi" Cross-Site Request Forgery'. > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506258: dpkg doesn't handle symlinks to directories as directory
Hi, On Thu, 2008-11-20 at 13:02:54 +0100, Carl Fürstenberg wrote: > Thanks for the information Guillem, though I'm wonder if this fix is > going to be applied to etch as well, or will I need to apply the fix > my self locally? As discussed on IRC, I'll be contacting the stable release team and ask if an update for etch for this would be fine with them. regards, guillem -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506377: CVE-2008-4829: Streamripper multiple buffer overflow vulnerabilities
Package: streamripper Version: 1.63.5-1 Severity: grave Tags: security patch Hi, The following CVE (Common Vulnerabilities & Exposures) id was published for streamripper. CVE-2008-4829/SA32562[1]: > Secunia Research has discovered some vulnerabilities in Streamripper, which > can be exploited by malicious people to compromise a user's system. > > 1) A boundary error exists within the function "http_parse_sc_header()" in > lib/http.c when parsing an overly long HTTP header starting with > "Zwitterion v". > > 2) A boundary error exists within the function "http_get_pls()" in > lib/http.c when parsing a specially crafted pls playlist containing an > overly long entry. > > 3) A boundary error exists within the function "http_get_m3u()" in > lib/http.c when parsing a specially crafted m3u playlist containing an > overly long "File" entry. > > Successful exploitation allows the execution of arbitrary code, but > requires that a user is tricked into connecting to a malicious server. > > The vulnerabilities are confirmed in version 1.63.5. Other versions may > also be affected. The patch by upstream to fix the vulnerabilities can be found at [2]. It would be great if you could verify whether the version in etch is also affected. If you fix the vulnerability please also make sure to include the CVE id in the changelog entry. [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4829 http://security-tracker.debian.net/tracker/CVE-2008-4829 http://secunia.com/Advisories/32562/ [2]http://streamripper.cvs.sourceforge.net/viewvc/streamripper/sripper_1x/lib/http.c?view=patch&r1=1.50&r2=1.51&pathrev=sripper-1_64_0 Cheers, -- Raphael Geissert - Debian Maintainer www.debian.org - get.debian.net signature.asc Description: This is a digitally signed message part.
Bug#506376: does not honour changes to /etc/default/watchdog
Package: watchdog Version: 5.4-9 Severity: serious On upgrades, the package overwrites /etc/default/watchdog with values from debconf without initialising them in postinst. The effect is that changes to /etc/default/watchdog get overwritten. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.26-1-amd64 (SMP w/1 CPU core) Locale: LANG=en_GB, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages watchdog depends on: ii debconf [debconf-2.0] 1.5.24 Debian configuration management sy ii libc6 2.7-16 GNU C Library: Shared libraries ii makedev 2.3.1-88 creates device files in /dev ii udev 0.125-7/dev/ and hotplug management daemo watchdog recommends no packages. watchdog suggests no packages. -- debconf-show failed -- .''`. martin f. krafft <[EMAIL PROTECTED]> : :' : proud Debian developer, author, administrator, and user `. `'` http://people.debian.org/~madduck - http://debiansystem.info `- Debian - when you have better things to do than fixing systems digital_signature_gpg.asc Description: Digital signature (see http://martin-krafft.net/gpg/)
Bug#506354: lvm2: system fails to boot after upgrade
21 листопада 2008 о 00:45 +0100 Bastian Blank написав(-ла): > On Fri, Nov 21, 2008 at 12:21:43AM +0100, Eugeniy Meshcheryakov wrote: > > 21 листопада 2008 о 00:09 +0100 Bastian Blank написав(-ла): > > > You have /var/lock on a different filesystem than /? > > Yes, /var is on an LV. > > > Seems that it needs to use /lib/init/rw. > > Can you please change the locking_dir setting in /etc/lvm/lvm.conf to > /lib/init/rw? I did. It fixed the problem. Thanks, Eugeniy Meshcheryakov signature.asc Description: Digital signature
Bug#506261: marked as done (enscript: Buffer overflows)
Your message dated Thu, 20 Nov 2008 23:32:04 + with message-id <[EMAIL PROTECTED]> and subject line Bug#506261: fixed in enscript 1.6.4-13 has caused the Debian Bug report #506261, regarding enscript: Buffer overflows to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 506261: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506261 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Package: enscript Version: 1.6.4-12 Severity: grave Tags: security Justification: user security hole Hi, buffer overflows have been discovered in enscript: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3863 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4306 I'm attaching a patch by Werner Fink of SuSE covering these issues. Cheers, Moritz -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core) Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) Shell: /bin/sh linked to /bin/bash Versions of packages enscript depends on: ii libc62.7-15 GNU C Library: Shared libraries ii libpaper11.1.23+nmu1 library for handling paper charact enscript recommends no packages. Versions of packages enscript suggests: ii ghostscript [postscript- 8.62.dfsg.1-3.1 The GPL Ghostscript PostScript/PDF ii lpr 1:2008.05.17BSD lpr/lpd line printer spooling -- no debconf information --- src/psgen.c +++ src/psgen.c 2008-10-29 10:43:08.512598143 +0100 @@ -24,6 +24,7 @@ * Boston, MA 02111-1307, USA. */ +#include #include "gsint.h" /* @@ -124,7 +125,7 @@ struct gs_token_st double xscale; double yscale; int llx, lly, urx, ury; /* Bounding box. */ - char filename[512]; + char filename[PATH_MAX]; char *skipbuf; unsigned int skipbuf_len; unsigned int skipbuf_pos; @@ -135,11 +136,11 @@ struct gs_token_st Color bgcolor; struct { - char name[512]; + char name[PATH_MAX]; FontPoint size; InputEncoding encoding; } font; - char filename[512]; + char filename[PATH_MAX]; } u; }; @@ -248,7 +249,7 @@ static int do_print = 1; static int user_fontp = 0; /* The user [EMAIL PROTECTED] font. */ -static char user_font_name[256]; +static char user_font_name[PATH_MAX]; static FontPoint user_font_pt; static InputEncoding user_font_encoding; @@ -978,7 +979,8 @@ large for page\n"), FATAL ((stderr, _("user font encoding can be only the system's default or `ps'"))); - strcpy (user_font_name, token.u.font.name); + memset (user_font_name, 0, sizeof(user_font_name)); + strncpy (user_font_name, token.u.font.name, sizeof(user_font_name) - 1); user_font_pt.w = token.u.font.size.w; user_font_pt.h = token.u.font.size.h; user_font_encoding = token.u.font.encoding; @@ -1444,7 +1446,7 @@ read_special_escape (InputStream *is, To buf[i] = ch; if (i + 1 >= sizeof (buf)) FATAL ((stderr, _("too long argument for %s escape:\n%.*s"), - escapes[i].name, i, buf)); + escapes[e].name, i, buf)); } buf[i] = '\0'; @@ -1452,7 +1454,8 @@ read_special_escape (InputStream *is, To switch (escapes[e].escape) { case ESC_FONT: - strcpy (token->u.font.name, buf); + memset (token->u.font.name, 0, sizeof(token->u.font.name)); + strncpy (token->u.font.name, buf, sizeof(token->u.font.name) - 1); /* Check for the default font. */ if (strcmp (token->u.font.name, "default") == 0) @@ -1465,7 +1468,8 @@ read_special_escape (InputStream *is, To FATAL ((stderr, _("malformed font spec for [EMAIL PROTECTED] escape: %s"), token->u.font.name)); - strcpy (token->u.font.name, cp); + memset (token->u.font.name, 0, sizeof(token->u.font.name)); + strncpy (token->u.font.name, cp, sizeof(token->u.font.name) - 1); xfree (cp); } token->type = tFONT; @@ -1544,7 +1548,8 @@ read_special_escape (InputStream *is, To break; case ESC_SETFILENAME: - strcpy (token->u.filename, buf); + memset (token->u.filename, 0, sizeof(token->u.font.name)); + strncpy (token->u.filename, buf, sizeof(token->u.filename) - 1); token->type = tSETFILENAME; break; --- End Message --- --- Begin Message --- Source: enscript Source-Version: 1.6.4-13 We believe that the bug you reported is fixed in the latest version of enscript, which is due to be installed in the Debian FTP archive: enscript_1.6.4-13.diff.gz to pool/main/e/enscript/enscript_1.6.4-13
Bug#505847: marked as done (ttf-mathematica4.1: can't install, can't uninstall...)
Your message dated Thu, 20 Nov 2008 23:47:05 + with message-id <[EMAIL PROTECTED]> and subject line Bug#505847: fixed in ttf-mathematica4.1 6 has caused the Debian Bug report #505847, regarding ttf-mathematica4.1: can't install, can't uninstall... to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 505847: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505847 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Package: ttf-mathematica4.1 Version: 5 Severity: grave Justification: renders package unusable feel free to alter priority if i labelled it too high. /* trying to install */ >sudo http_proxy=www-proxy.cse.unsw.edu.au:3128 apt-get install ttf-mathematica4.1 Reading package lists... Done Building dependency tree Reading state information... Done ttf-mathematica4.1 is already the newest version. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 1 not fully installed or removed. After this operation, 0B of additional disk space will be used. Setting up ttf-mathematica4.1 (5) ... --2008-11-16 17:27:45-- http://support.wolfram.com/mathematica/systems/windows/general/files/MathFonts_TrueType_41.exe Resolving www-proxy.cse.unsw.edu.au... 129.94.242.38, 129.94.242.47 Connecting to www-proxy.cse.unsw.edu.au|129.94.242.38|:3128... connected. Proxy request sent, awaiting response... 301 Moved Permanently Location: http://support.wolfram.com/index.en.html [following] --2008-11-16 17:27:46-- http://support.wolfram.com/index.en.html Connecting to www-proxy.cse.unsw.edu.au|129.94.242.38|:3128... connected. Proxy request sent, awaiting response... 200 OK Length: unspecified [text/html] Saving to: `./index.en.html' [ <=> ] 19,186 --.-K/s in 0.02s 2008-11-16 17:27:46 (858 KB/s) - `./index.en.html' saved [19186] checking MathFonts_TrueType_41.exe Downloaded file looks corrupted! dpkg: error processing ttf-mathematica4.1 (--configure): subprocess post-installation script returned error exit status 1 Errors were encountered while processing: ttf-mathematica4.1 E: Sub-process /usr/bin/dpkg returned an error code (1) /* trying to remove */ >sudo apt-get remove ttf-mathematica4.1 Reading package lists... Done Building dependency tree Reading state information... Done The following packages were automatically installed and are no longer required: latex-xft-fonts xfonts-mathml Use 'apt-get autoremove' to remove them. The following packages will be REMOVED: ttf-mathematica4.1 0 upgraded, 0 newly installed, 1 to remove and 0 not upgraded. 1 not fully installed or removed. After this operation, 111kB disk space will be freed. Do you want to continue [Y/n]? (Reading database ... 223093 files and directories currently installed.) Removing ttf-mathematica4.1 ... W: /usr/share/fonts/truetype/mathml/math4b__.ttf: not registered. W: /usr/share/fonts/truetype/mathml/math1b__.ttf: not registered. W: /usr/share/fonts/truetype/mathml/math2b__.ttf: not registered. W: /usr/share/fonts/truetype/mathml/math3b__.ttf: not registered. W: /usr/share/fonts/truetype/mathml/math3m__.ttf: not registered. W: /usr/share/fonts/truetype/mathml/math4mb_.ttf: not registered. W: /usr/share/fonts/truetype/mathml/math3___.ttf: not registered. W: /usr/share/fonts/truetype/mathml/math1___.ttf: not registered. W: /usr/share/fonts/truetype/mathml/math2mb_.ttf: not registered. W: /usr/share/fonts/truetype/mathml/math2m__.ttf: not registered. W: /usr/share/fonts/truetype/mathml/math4___.ttf: not registered. W: /usr/share/fonts/truetype/mathml/math1mb_.ttf: not registered. W: /usr/share/fonts/truetype/mathml/math2___.ttf: not registered. W: /usr/share/fonts/truetype/mathml/math4m__.ttf: not registered. W: /usr/share/fonts/truetype/mathml/math3mb_.ttf: not registered. W: /usr/share/fonts/truetype/mathml/math1m__.ttf: not registered. dpkg: error processing ttf-mathematica4.1 (--remove): subprocess pre-removal script returned error exit status 1 Errors were encountered while processing: ttf-mathematica4.1 E: Sub-process /usr/bin/dpkg returned an error code (1) -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: powerpc (ppc) Kernel: Linux 2.6.26-1-powerpc Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages ttf-mathematica4.1 depends on: ii debconf [debconf-2.0]1.5.22 Debian configuration management sy ii defoma 0.11.10-0.2 Debian Font Manager -- automatic f ii unzip5.5
Bug#506354: lvm2: system fails to boot after upgrade
On Fri, Nov 21, 2008 at 12:21:43AM +0100, Eugeniy Meshcheryakov wrote: > 21 листопада 2008 о 00:09 +0100 Bastian Blank написав(-ла): > > You have /var/lock on a different filesystem than /? > Yes, /var is on an LV. > > Seems that it needs to use /lib/init/rw. Can you please change the locking_dir setting in /etc/lvm/lvm.conf to /lib/init/rw? Bastian -- The man on tops walks a lonely street; the "chain" of command is often a noose. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#505847: How to remove package?
On Thu, 20 Nov 2008 12:28:51 -0500, Peter Jay Salzman <[EMAIL PROTECTED]> wrote: > How can this package be removed? Dpkg won't let me uninstall it due to > unregistered fonts. Hi Peter, I just uploaded the new version and I believe you can remove the new package. Please update first and remove it. Regards,2008-11-21(Fri) -- Debian Developer - much more I18N of Debian Atsuhito Kohda Department of Math., Univ. of Tokushima -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506373: complement on the subject line & body
retitle 506373 Evolution recklessy ignores the charset on text/html email fragments and causes glib's death by ana-utf8-phylactic shock thanks Although the subject line is (correclty) encoded in windows-1252 and appears to contain the offending string, it does not appear to be the cause of trouble. The offending string can be found in the scrap of html sent by Google as the first MIME part of the message body; quoting the bit: [EMAIL PROTECTED], vous êtes invité(e) à participer à Concert Paris-Novembre (Réxx Vé) (here, gedit did automatically convert that from ISO-8859-15 to UTF-8, hence none of the diacritics appear mutilated. hexdumping the MIME bit does confirm the ISO-8859-15 encoding: 01c0 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 | style="margin:0| 01d0 3b 63 6f 6c 6f 72 3a 23 30 22 3e 63 79 72 69 6c |;color:#0">cyril| 01e0 6c 65 40 63 68 65 70 65 6c 6f 76 2e 6f 72 67 2c | [EMAIL PROTECTED],| 01f0 0a 76 6f 75 73 20 ea 74 65 73 20 69 6e 76 69 74 |.vous .tes invit| 0200 e9 28 65 29 20 e0 20 70 61 72 74 69 63 69 70 65 |.(e) . participe| 0210 72 20 e0 3c 2f 70 3e 0a 3c 68 32 20 73 74 79 6c |r ..Conce| 0260 72 74 20 50 61 72 69 73 2d 4e 6f 76 65 6d 62 72 |rt Paris-Novembr| 0270 65 20 28 52 e9 78 78 20 56 79 79 79 79 e9 29 3c |e (R.xx V.)<| Inspecting the raw RFC-2822 message, it appears that the bit of HTML does have content-type Content-Type: text/html; charset=windows-1252. While I regret that Google did not include redundant metadata within the text/html bit, there not only there was proper warning that utf-8 this was not, but also the default encoding was set to be 8859-15. Therefore, what happened is that Evolution failed to properly convert this fragment into proper UTF-8 before handing it over to glib (and in any case, it definitely should have bleached it to not provide an invalid UTF-8 fragment down the HTML renderer). Assigning the blame on Evolution for sure. I will gladly provide the raw RFC-2822 offending message, but on a non-disclosure basis. Thanks in advance. -- Cyrille
Processed (with 1 errors): complement on the subject line & body
Processing commands for [EMAIL PROTECTED]: > retitle 506373 Evolution recklessy ignores the charset on text/html Bug#506373: evolution email crashes when receiving a specific invitation from Google Calendar Changed Bug title to `Evolution recklessy ignores the charset on text/html' from `evolution email crashes when receiving a specific invitation from Google Calendar'. > email fragments and causes glib's death by ana-utf8-phylactic shock Unknown command or malformed arguments to command. > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506264: closed by Daniel Baumann <[EMAIL PROTECTED]> (Bug#506264: fixed in gnunet 0.8.0b-4)
Just FYI, After the most recent attempt to run gnunet-update, I resorted to killing the controlling shell (su'd) reverting to another shell. I have come back to this tty some 24 hrs later to find 'Starting datastore conversion (this may take a while).' followed by 'Completed datastore conversion.' The freeze being temporary but -at-least- 30 minutes in duration before even the first message being displayed (ie. starting message). I will try the update now. Regards, On Thu, Nov 20, 2008 at 09:38:38PM +, Debian Bug Tracking System wrote: > > This is an automatic notification regarding your Bug report > which was filed against the gnunet-server package: > > #506264: gnunet-server: freeze in gnunet-update > > It has been closed by Daniel Baumann <[EMAIL PROTECTED]>. > > Their explanation is attached below along with your original report. > If this explanation is unsatisfactory and you have not received a > better one in a separate message then please contact Daniel Baumann <[EMAIL > PROTECTED]> by > replying to this email. > > > -- > 506264: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506264 > Debian Bug Tracking System > Contact [EMAIL PROTECTED] with problems > X-Spam-Checker-Version: SpamAssassin 3.2.3-bugs.debian.org_2005_01_02 > (2007-08-08) on rietz.debian.org > X-Spam-Level: > X-Spam-Bayes: score:0. Tokens: new, 86; hammy, 151; neutral, 131; spammy, > 0. spammytokens: hammytokens:0.000-+--HX-Debian:DAK, > [EMAIL PROTECTED], 0.000-+--H*RU:128.148.34.103, > 0.000-+--UD:diff.gz, 0.000-+--H*rp:D*ries.debian.org > X-Spam-Status: No, score=-13.9 required=4.0 tests=AWL,BAYES_00,FROMDEVELOPER, > FVGT_m_MULTI_ODD,HAS_BUG_NUMBER,HEADER_X_KATIE,IMPRONONCABLE_1, > IMPRONONCABLE_2,MURPHY_WRONG_WORD1,MURPHY_WRONG_WORD2,PGPSIGNATURE > autolearn=ham version=3.2.3-bugs.debian.org_2005_01_02 > From: Daniel Baumann <[EMAIL PROTECTED]> > To: [EMAIL PROTECTED] > X-DAK: dak process-unchecked > X-Katie: $Revision: 1.65 $ > X-Debian: DAK > X-Debian-Package: gnunet > Subject: Bug#506264: fixed in gnunet 0.8.0b-4 > Date: Thu, 20 Nov 2008 21:02:09 + > > Source: gnunet > Source-Version: 0.8.0b-4 > > We believe that the bug you reported is fixed in the latest version of > gnunet, which is due to be installed in the Debian FTP archive: > > gnunet-client_0.8.0b-4_i386.deb > to pool/main/g/gnunet/gnunet-client_0.8.0b-4_i386.deb > gnunet-common_0.8.0b-4_i386.deb > to pool/main/g/gnunet/gnunet-common_0.8.0b-4_i386.deb > gnunet-dbg_0.8.0b-4_i386.deb > to pool/main/g/gnunet/gnunet-dbg_0.8.0b-4_i386.deb > gnunet-dev_0.8.0b-4_i386.deb > to pool/main/g/gnunet/gnunet-dev_0.8.0b-4_i386.deb > gnunet-server_0.8.0b-4_i386.deb > to pool/main/g/gnunet/gnunet-server_0.8.0b-4_i386.deb > gnunet-tools_0.8.0b-4_i386.deb > to pool/main/g/gnunet/gnunet-tools_0.8.0b-4_i386.deb > gnunet_0.8.0b-4.diff.gz > to pool/main/g/gnunet/gnunet_0.8.0b-4.diff.gz > gnunet_0.8.0b-4.dsc > to pool/main/g/gnunet/gnunet_0.8.0b-4.dsc > gnunet_0.8.0b-4_all.deb > to pool/main/g/gnunet/gnunet_0.8.0b-4_all.deb > > > > A summary of the changes between this version and the previous one is > attached. > > Thank you for reporting the bug, which will now be closed. If you > have further comments please address them to [EMAIL PROTECTED], > and the maintainer will reopen the bug report if appropriate. > > Debian distribution maintenance software > pp. > Daniel Baumann <[EMAIL PROTECTED]> (supplier of updated gnunet package) > > (This message was generated automatically at their request; if you > believe that there is a problem with it please contact the archive > administrators by mailing [EMAIL PROTECTED]) > > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Format: 1.8 > Date: Thu, 20 Nov 2008 07:16:00 +0100 > Source: gnunet > Binary: gnunet gnunet-client gnunet-common gnunet-dbg gnunet-server > gnunet-dev gnunet-tools > Architecture: source all i386 > Version: 0.8.0b-4 > Distribution: unstable > Urgency: low > Maintainer: Daniel Baumann <[EMAIL PROTECTED]> > Changed-By: Daniel Baumann <[EMAIL PROTECTED]> > Description: > gnunet - secure, trust-based peer-to-peer framework (meta) > gnunet-client - secure, trust-based peer-to-peer framework (client) > gnunet-common - secure, trust-based peer-to-peer framework (common) > gnunet-dbg - secure, trust-based peer-to-peer framework (debug) > gnunet-dev - secure, trust-based peer-to-peer framework (development) > gnunet-server - secure, trust-based peer-to-peer framework (server) > gnunet-tools - secure, trust-based peer-to-peer framework (tools) > Closes: 506264 > Changes: > gnunet (0.8.0b-4) unstable; urgency=low > . >* Removing config.guess and config.sub in clean target of rules. >* Adding db_stop call in gnunet-server.postinst to properly stop > debconf interactions. >* Replacing obsolete dh_clean -k with dh_prep. >* Adding '|| true' to gnunet-update call, this way a hanging gnunet- >
Bug#506354: lvm2: system fails to boot after upgrade
21 листопада 2008 о 00:09 +0100 Bastian Blank написав(-ла): > You have /var/lock on a different filesystem than /? > Yes, /var is on an LV. > Seems that it needs to use /lib/init/rw. signature.asc Description: Digital signature
Bug#506261: enscript: Buffer overflows
On Wed, 2008-11-19 at 23:29 +0100, Moritz Muehlenhoff wrote: > Package: enscript > Version: 1.6.4-12 > Severity: grave > Tags: security > Justification: user security hole > > Hi, > buffer overflows have been discovered in enscript: > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3863 > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4306 > > I'm attaching a patch by Werner Fink of SuSE covering these > issues. Right, lamby is sponsoring this for me. I added the CVE numbers to the changelog entry and the patch header. Would you like a package for stable-security? -- Tim Retout <[EMAIL PROTECTED]> -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506373: evolution email crashes when receiving a specific invitation from Google Calendar
Package: evolution Version: 2.22.3.1-1 Severity: grave Justification: security; strangers might DoS evolution causing a crash upon startup until other mail piles up. When receiving a specific e-mail message containing a Google Calendar invitation, Evolution crashes. It then crashes again at boot, when trying again to display the last received (same) message. The default character set might be set to either UTF-8 or ISO-8859-15; it is unknown at this point whether the Google Calendar invite is exactly well-formatted with respect to character encoding. What is known is that the second-to-last character of the subject is a "lowercase eacute" (U+00E9) and that there is also another such character in the middle of the subject string. From looking at the way the stack trace from gdb ends up into an UTF-8 aware gnome-terminal, it seems some mojibake issue might be at play. libglib2.0-0 is the place of crash, for sure, but evolution (camel) proper might as well be charged with insufficient disinfection of incoming remote data (a definitive security risk) I'll attach the stack trace here, very slightly edited to remove private data (overstriking only ASCII characters with other ASCII characters) -- Cyrille -- stack dump #0 0x7f0c55b6ae30 in IA__g_markup_escape_text ( text=0x4887000 , length=76050432) at /build/buildd/glib2.0-2.16.6/glib/gmarkup.c:1952 #1 0x7f0c55b6c198 in IA__g_markup_vprintf_escaped ( format=, args=) at /build/buildd/glib2.0-2.16.6/glib/gmarkup.c:2272 #2 0x7f0c55b6c2fd in IA__g_markup_printf_escaped ( format=0x4564aa0 "\020p9C\f\177") at /build/buildd/glib2.0-2.16.6/glib/gmarkup.c:2329 #3 0x7f0c4af7aa39 in itip_view_set_summary (view=, summary=0x4557d80 "Concert Paris-Novembre (R�xx V�)") ^^^ ^^^ ^ ^ ^^ (note the "unknown character" boxes here, should be U+00E9 instead.) at itip-view.c:597 #4 0x7f0c4af73cdb in format_itip_object (efh=0x1dfe1c0, eb=0x7f0c3d4ba6e0, pobject=) at #itip-formatter.c:2017 #5 0x7f0c4fa4218f in efh_object_requested (html=, eb=0x7f0c3d4ba6e0, efh=0x1dfe1c0) at em-format-html.c:625 #6 0x7f0c5bcca058 in html_g_cclosure_marshal_BOOLEAN__OBJECT ( closure=0x3d72780, return_value=0x7fff68ee8910, n_param_values=, param_values=0x7fff68ee8710, invocation_hint=, marshal_data=0x7f0c4fa42140) at htmlmarshal.c:83 #7 0x7f0c56001e9d in IA__g_closure_invoke (closure=0x3d72780, return_value=0x7fff68ee8910, n_param_values=2, param_values=0x7fff68ee8710, invocation_hint=0x7fff68ee8610) at /build/buildd/glib2.0-2.16.6/gobject/gclosure.c:490 #8 0x7f0c56014bfd in signal_emit_unlocked_R (node=0x3cb3040, detail=0, instance=0x3cd87e0, emission_return=0x7fff68ee8910, instance_and_params=0x7fff68ee8710) at /build/buildd/glib2.0-2.16.6/gobject/gsignal.c:2440 #9 0x7f0c56015f71 in IA__g_signal_emit_valist (instance=0x3cd87e0, signal_id=, detail=0, var_args=0x7fff68ee8970) at /build/buildd/glib2.0-2.16.6/gobject/gsignal.c:2209 #10 0x7f0c560165f3 in IA__g_signal_emit (instance=0x4564aa0, #signal_id=1, detail=3351806) at /build/buildd/glib2.0-2.16.6/gobject/gsignal.c:2243 #11 0x7f0c5bc8ab1e in html_engine_object_requested_cb ( engine=, eb=0x7f0c3d4ba6e0, data=0x3cd87e0) at gtkhtml.c:542 #12 0x7f0c5bcca058 in html_g_cclosure_marshal_BOOLEAN__OBJECT ( closure=0x3d74e40, return_value=0x7fff68ee8ef0, n_param_values=, param_values=0x7fff68ee8cf0, invocation_hint=, marshal_data=0x7f0c5bc8aad0) at htmlmarshal.c:83 #13 0x7f0c56001e9d in IA__g_closure_invoke (closure=0x3d74e40, return_value=0x7fff68ee8ef0, n_param_values=2, param_values=0x7fff68ee8cf0, invocation_hint=0x7fff68ee8bf0) at /build/buildd/glib2.0-2.16.6/gobject/gclosure.c:490 #14 0x7f0c56014bfd in signal_emit_unlocked_R (node=0x3d67470, detail=0, instance=0x3d8c080, emission_return=0x7fff68ee8ef0, instance_and_params=0x7fff68ee8cf0) at /build/buildd/glib2.0-2.16.6/gobject/gsignal.c:2440 #15 0x7f0c56015f71 in IA__g_signal_emit_valist (instance=0x3d8c080, signal_id=, detail=0, var_args=0x7fff68ee8f50) at /build/buildd/glib2.0-2.16.6/gobject/gsignal.c:2209 #16 0x7f0c560165f3 in IA__g_signal_emit (instance=0x4564aa0, #signal_id=1, detail=3351806) at /build/buildd/glib2.0-2.16.6/gobject/gsignal.c:2243 #17 0x7f0c5bcbabdf in element_parse_object (e=0x3d8c080, clue=0x454e070, attr=) at htmlengine.c:1531 #18 0x7f0c5bcb8f50 in parse_one_token (e=0x3d8c080, clue=0x454e070, str=0x45462b7 "object #classid=\"itip:///.0x201f450.91052.mixed.0.alternative.2\">") at htmlengine.c:3749 #19 0x7f0c5bcc08ee in html_engine_timer_event (e=0x3d8c080) at htmlengine.c:1347 #20 0x7f0c5bcc0978 in html_engine_flush (e=0x3d8c080) at htmlengine.c:6521 #21 0x7f0c4fa493b9 in emhs_sync_flus
Bug#506354: lvm2: system fails to boot after upgrade
On Thu, Nov 20, 2008 at 10:20:11PM +0100, Євгеній Мещеряков wrote: > My system fails to boot after upgrade to 2.02.39-3. During boot > there is error message from lvm2: > Locking type 1 initialisation failed You have /var/lock on a different filesystem than /? Seems that it needs to use /lib/init/rw. Bastian -- Immortality consists largely of boredom. -- Zefrem Cochrane, "Metamorphosis", stardate 3219.8 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#505565: Mozilla SeaMonkey Multiple Vulnerabilities
On Thu, Nov 13, 2008 at 04:13:46PM +0100, Giuseppe Iuculano wrote: > Package: iceape > Severity: critical > Tags: security Iceape still badly needs someone who's willing to care of security updates for iceape during Lenny life time and has the time to do so, as described in my mail to debian-devel from the 4th October: | From: Moritz Muehlenhoff <[EMAIL PROTECTED]> | Newsgroups: gmane.linux.debian.devel.general | Subject: Volunteer needed for Iceape security updates in Lenny | | A volunteer is needed to build and test the Iceape security updates | in Lenny. Patches are provided through a patch set for each update | round, but the Security Team and the Mozilla maintainers lack the | ressources for the proper integration work. So if you use Iceape | and want to continue to use it in Lenny please step forward and | mail [EMAIL PROTECTED] and keep | [EMAIL PROTECTED] CCed. The other option (throwing it out) will be difficult, since 17 packages build-depend on iceape-dev nowadays. Cheers, Moritz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#502140: restarting xscreensaver
On Sat, Nov 15, 2008 at 11:55:55PM -0800, Steve Langasek wrote: > On Wed, Oct 22, 2008 at 08:49:27AM +0200, Thomas Viehmann wrote: > > > probably I'm just dense, but why would (the admittedly gross hack) of > > looking at /proc/$XSCREENSAVER-PID/environ (for DISPLAY and XAUTHORITY), > > getting uid for that process, trying xscreensaver-command -exit, if the > > screensaver exited, start xscreensaver again with that uid and environ, > > otherwise (it will have been locked) killing the xscreensaver, starting > > xscreensaver, doing xscreensaver-command -lock not do the trick better > > than the current state? > > Well, that sounds better than the current state, but a) the code for it > isn't written and I'm not familiar enough with xscreensaver to be confident > of getting it right on the first try myself, b) we have to cover more than > just xscreensaver (xlockmore is also affected AIUI), c) I'm not sure if > peeking in /proc is going to work if the user has SELinux turned on. > > It also seems to introduce a race condition where the display is unlocked > and vulnerable to attack during the upgrade, which I'd prefer not to have > pam itself be responsible for. I think advising the user to disable the > screensaver for the duration of the upgrade is a choice I'd be more > comfortable with, rather than forcibly restarting the screensaver. I've filed a bug against release-notes which such an advise (bug number not yet available). | During the upgrade of the Pluggable Authentication Modules system, the | authentication modes need to be restarted. Some services used for locking | a user session cannot be restarted, e.g. xscreensaver, gnome-screensaver | or xlockmore. It is recommended to stop them before starting the update. So we can downgrade this to something not-RC. Cheers, Moritz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#496411: Closing
On Thu, Nov 06, 2008 at 09:33:54AM +0100, Jiří Paleček wrote: > Version: 20081031+dfsg-1 > > Hello, > > I've attempted to close the bug, but have written malformed closing > statement in the changelog. Therefore, I'm closing it manually. Jiri, I saw that you've adopted LTP and prepared new packages for experimental after it was orphaned. Thanks for that. I'm wondering if the current LTP in Lenny is really useful, since it's totally outdated. Shouldn't we just drop it from Lenny and start fresh with your new packages in Squeeze, the next Debian release? Cheers, Moritz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506268: CVE-2008-5160: allows remote attackers to cause a denial of service (daemon crash) via multiple invalid requests
On Thu, Nov 20, 2008 at 01:57:54PM -0600, Raphael Geissert wrote: > Hi, > > 2008/11/20 Nico Golde <[EMAIL PROTECTED]>: > > Hi, > > * Raphael Geissert <[EMAIL PROTECTED]> [2008-11-20 09:32]: > >> The following CVE (Common Vulnerabilities & Exposures) id was published for > >> msp-webserver. > >> > >> CVE-2008-5160[1]: > > [...] > > > > Did you manage to reproduce that? Not reproducible for me > > with the unstable version. > > No, I didn't have time to setup the server and attempt to reproduce it. > But I did check the changelog and the patches being applied and found > nothing relevant that could "fix" or prevent the issue. > > I have just tried to reproduce it and I succeeded. > > I made four fruitful attempts: > 1. original exploit: nothing. > 2. 200 requests: server segfaulted > 3. 2000 requests: too many childs are spawned and they start eating > the memory almost by 100MBs per sec. > 4. 3000 requests: same as with the 2000 requests. > > Note that I had to run the exploit a couple of times to reproduce the > issue triggered at 3, and when I tried to reproduce the segfault under > gdb to get a backtrace I didn't succeed to reproduce it. So let's just drop it from Lenny. We don't need the 40th minimal web server in the archive, especially not if it crashes under load. Such errors in fringe servers are not DoS vulnerabilities, but regular bugs. We're not talking about Apache here. Cheers, Moritz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#418462: mailman: Fails to upgrade from Sarge to Etch
Sorry, but I can't test this currently. It should be possible for you to check if the python-symlink is upgraded properly or not. Thanks, Christian -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506353: mailscanner: many scripts allow local users to overwrite arbitrary files, and more, via symlink attacks
Package: mailscanner Version: 4.55.10-3 Severity: grave Tags: security Hi, I have found more issues on the autoupdate scripts and other files shipped by mailscanner than those reported in CVE-2008-5140[1]. In 4.55.10-3, grepping the files throw this: /etc/MailScanner/autoupdate/: > f-prot-autoupdate:$TempDir= "/var/tmp/f-prot"; > f-prot-autoupdate:$TmpFile = "tmp-web"; > clamav-autoupdate:$LogFile = "/tmp/ClamAV.update.log"; > panda-autoupdate.new:TEMPDIR="/tmp" > trend-autoupdate.new:wget -q -O /tmp/$OPRINI $FTPSERV/opr.ini > trend-autoupdate.new:NEWVER=`grep PatternVersionNPF /tmp/opr.ini.$$ | sed s/^PatternVersionNPF=//g | cut -c 3-5` > trend-autoupdate.new:wget -q -P /tmp $FTPSERV/lpt$NEWVER.zip > trend-autoupdate.new:DATCHECK=`unzip -o -t /tmp/lpt$NEWVER.zip | > grep "No errors"` > trend-autoupdate.new:mv /tmp/lpt$NEWVER.zip /etc/iscan > trend-autoupdate.new:rm -f /tmp/lpt*.zip /tmp/$OPRINI $PackageDir/*.zip > rav-autoupdate.new:my($LockFile) = '/tmp/RavBusy.lock'; (omitting other affected files in that package version, read below) In 4.68.8-1: /etc/MailScanner/autoupdate/: > f-prot-autoupdate:$TempDir= "$FProtRoot/tmp"; > f-prot-autoupdate:$TmpFile = "tmp-web"; > clamav-autoupdate:$LogFile = "/tmp/ClamAV.update.log"; > avast-autoupdate:$LogFile = "/tmp/Avast.update.log"; > f-prot-6-autoupdate:my $logfile = "/tmp/f-prot-6-update-$$"; > f-prot-6-autoupdate: unlink "/tmp/fpavdef.lock"; /etc/MailScanner/wrapper/: > bitdefender-wrapper:LogFile=/tmp/log.bdc.$$ > kaspersky-wrapper: Report=/tmp/kavoutput.tmp.$$ > kaspersky-wrapper: Report=/tmp/kavoutput.tmp.$$ > kaspersky-wrapper: Report=/tmp/kavoutput.tmp.$$ > clamav-wrapper:TempDir="/tmp/clamav.$$" > clamav-wrapper:if [ -x "${TempDir}" ]; then > clamav-wrapper: rm -rf ${TempDir} >/dev/null 2>&1 > clamav-wrapper:mkdir "${TempDir}" >/dev/null 2>&1 > clamav-wrapper:trap "rm -rf ${TempDir}" EXIT > clamav-wrapper: ExtraScanOptions="$ExtraScanOptions --tempdir=${TempDir}" > clamav-wrapper:chown ${ClamUser}:${ClamGroup} "${TempDir}" > clamav-wrapper:if [ -x "${TempDir}" ]; then > clamav-wrapper: rm -rf ${TempDir} > rav-wrapper:my $tmpdir = '/tmp'; > rav-wrapper:my $reportfile = sprintf('%s/report.vir.%s', $tmpdir, $$); /usr/share/MailScanner/MailScanner/: > Quarantine.pm: $testfn = MailScanner::Config::Value('lockfiledir') > || '/tmp'; > TNEF.pm: require File::Temp; > TNEF.pm: mkdir "/tmp/tnef.$$", 0777; > TNEF.pm: chmod 0700, "/tmp/tnef.$$"; > TNEF.pm: output_dir => "/tmp/tnef.$$", > TNEF.pm:system("rm -rf /tmp/tnef.$$"); > TNEF.pm:system("rm -rf /tmp/tnef.$$"); > MessageBatch.pm: my $newmessage = MailScanner::Message->new(1, '/tmp', 1); > MessageBatch.pm: my $fh = new FileHandle(">/tmp/MSLint.body.$$"); > MessageBatch.pm: $newmessage->{store}->{dpath} = "/tmp/MSLint.body.$$"; > WorkArea.pm: $testfn = MailScanner::Config::Value('lockfiledir') || > '/tmp'; > WorkArea.pm: or MailScanner::Log::DieLog("Cannot create temporary Work > Dir %s. " . > SA.pm: # Create the $TMPDIR for SpamAssassin if necessary, then check we > can > SA.pm: # write to it. If not, change to /tmp. > SA.pm: my $tmpdir = MailScanner::Config::Value('spamassassintempdir'); > SA.pm: mkdir $tmpdir; > SA.pm: stat $tmpdir; # Is the directory writeable? > SA.pm: $tmpdir = '/tmp' unless -d _ && -r _ && -w _ && -x _; > SA.pm: $ENV{'TMPDIR'} = $tmpdir; > SA.pm: MailScanner::Log::InfoLog("SpamAssassin temporary working directory > is %s", > SA.pm:$tmpdir); > SA.pm: print STDERR "SpamAssassin temp dir = $tmpdir\n"; Other dirs: > /etc/MailScanner/mailscanner.conf.with.mcp:Lockfile Dir = /tmp > /usr/sbin/MailScanner: unlink "/tmp/MSLint.body.$$"; > /usr/sbin/MailScanner: $msg = MailScanner::Message->new('1','/tmp','fake'); I'm using severity grave as this package should definitely not be shipped in any release as is. A good start point to fix this mess is by checking the above mentioned files, and then grep -riE "\bte?mp[^l]" path/to/code, and carefully review the matches files. Of course, not even that would guarantee that there are no left ways to conduct symlink attacks via temporary files. A full code audition is really needed IMHO. [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5140 http://security-tracker.debian.net/tracker/CVE-2008-5140 Cheers, -- Raphael Geissert - Debian Maintainer www.debian.org - get.debian.net signature.asc Description: This is a digitally signed message part.
Bug#506354: lvm2: system fails to boot after upgrade
Package: lvm2 Version: 2.02.39-3 Severity: grave My system fails to boot after upgrade to 2.02.39-3. During boot there is error message from lvm2: Locking type 1 initialisation failed after that system activates swap (successfuly) and tries to check filesystems (all, except /, are on lvm), but devices do not exist, so this step fails. Then boot stops with root password prompt. In the root shell it is possible to run /etc/init.d/lvm2 start It finishes without errors. After exiting the root shell, system boots normally. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.28-rc5 (SMP w/2 CPU cores; PREEMPT) Locale: LANG=uk_UA.UTF-8, LC_CTYPE=uk_UA.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages lvm2 depends on: ii libc62.7-16 GNU C Library: Shared libraries ii libdevmapper1.02.1 2:1.02.27-4 The Linux Kernel Device Mapper use ii libreadline5 5.2-3 GNU readline and history libraries ii lsb-base 3.2-20 Linux Standard Base 3.2 init scrip lvm2 recommends no packages. Versions of packages lvm2 suggests: pn dmsetup(no description available) -- debconf-show failed -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506264: marked as done (gnunet-server: freeze in gnunet-update)
Your message dated Thu, 20 Nov 2008 21:02:09 + with message-id <[EMAIL PROTECTED]> and subject line Bug#506264: fixed in gnunet 0.8.0b-4 has caused the Debian Bug report #506264, regarding gnunet-server: freeze in gnunet-update to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 506264: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506264 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Package: gnunet-server Version: 0.8.0b-3 Severity: important I'm seeing a freeze in gnunet-update which is identical to as reported here https://gnunet.org/mantis/view.php?id=1349 I was only able to complete postinst by commenting out the associated line. My system is not likely to be completely up-to-date, but is clean according to dpkg. A new upstream may/may not be available as the report doesn't mention versions. Regards, -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.22 (SMP w/2 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/bash Versions of packages gnunet-server depends on: ii adduser3.47 Add and remove users and groups ii debconf [debconf-2.0] 1.5.24Debian configuration management sy ii gettext0.14.5-2 GNU Internationalization utilities ii gnunet-client 0.8.0b-3 secure, trust-based peer-to-peer f ii gnunet-common 0.8.0b-3 secure, trust-based peer-to-peer f ii guile-1.8-libs 1.8.2+1-2 Main Guile libraries ii libadns1 1.4-2 Asynchronous-capable DNS client li ii libbz2-1.0 1.0.5-1 high-quality block-sorting file co ii libc6 2.7-16GNU C Library: Shared libraries ii libcurl3-gnutls7.18.2-7 Multi-protocol file transfer libra ii libesmtp5 0.8.11-2 LibESMTP SMTP client library ii libextractor1c2a 0.5.21+dfsg-1 extracts meta-data from files of a ii libgcrypt111.4.1-2 LGPL Crypto library - runtime libr ii libglib2.0-0 2.16.6-1 The GLib library of C routines ii libgmp3c2 2:4.2.2+dfsg-3Multiprecision arithmetic library ii libgpg-error0 1.4-1 library for common error values an ii libgsf-1-114 1.14.10-3 Structured File Library - runtime ii libltdl3 1.5.6-4 A system independent dlopen wrappe ii libmicrohttpd4 0.4.0~pre0-2 library embedding HTTP server func ii libmysqlclient15off5.0.67-1 MySQL database client library ii libsqlite3-0 3.5.9-6 SQLite 3 shared library ii libssl0.9.80.9.8g-14 SSL shared libraries ii libxml22.6.32.dfsg-4 GNOME XML library ii netbase4.34 Basic TCP/IP networking system ii zlib1g 1:1.2.3.3.dfsg-12 compression library - runtime gnunet-server recommends no packages. gnunet-server suggests no packages. -- debconf information: gnunet-server/warning: * gnunet-server/gnunet_user: gnunet * gnunet-server/gnunet_group: gnunet * gnunet-server/launch_at_startup: false gnunet-server/prior_07: gnunet-server/failed: --- End Message --- --- Begin Message --- Source: gnunet Source-Version: 0.8.0b-4 We believe that the bug you reported is fixed in the latest version of gnunet, which is due to be installed in the Debian FTP archive: gnunet-client_0.8.0b-4_i386.deb to pool/main/g/gnunet/gnunet-client_0.8.0b-4_i386.deb gnunet-common_0.8.0b-4_i386.deb to pool/main/g/gnunet/gnunet-common_0.8.0b-4_i386.deb gnunet-dbg_0.8.0b-4_i386.deb to pool/main/g/gnunet/gnunet-dbg_0.8.0b-4_i386.deb gnunet-dev_0.8.0b-4_i386.deb to pool/main/g/gnunet/gnunet-dev_0.8.0b-4_i386.deb gnunet-server_0.8.0b-4_i386.deb to pool/main/g/gnunet/gnunet-server_0.8.0b-4_i386.deb gnunet-tools_0.8.0b-4_i386.deb to pool/main/g/gnunet/gnunet-tools_0.8.0b-4_i386.deb gnunet_0.8.0b-4.diff.gz to pool/main/g/gnunet/gnunet_0.8.0b-4.diff.gz gnunet_0.8.0b-4.dsc to pool/main/g/gnunet/gnunet_0.8.0b-4.dsc gnunet_0.8.0b-4_all.deb to pool/main/g/gnunet/gnunet_0.8.0b-4_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate
Bug#505237: Possible patch
Patrick Matthäi <[EMAIL PROTECTED]> writes: > Ferenc Wagner schrieb: >> Patrick Matthäi <[EMAIL PROTECTED]> writes: >> >>> I attached a diff which might fix it, could you please test it? >> >> Yes, this is what I use since the last upgrade. However, I don't >> think it's a good idea to use --oknodo on restart and reload. The >> missing process is a genuine error in those cases, isn't it? > > This should be okay, so on you can also restart if the service is not > started yet. Hi Patrick, Well yes, that excuses the initial stop action during restart, but after that the start mustn't fail. The same goes for reload: I'd expect it to fail if the service isn't running. So in the latter two cases --oknodo could only hide a real problem. Isn't this the recommended practice with init script actions? -- Cheers, Feri. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506179: no-ip: remote code execution vulnerability
Nico Golde wrote: > Looks good please upload. > Thanks, but I'm just the resident code monkey ;-) Otavio should upload. > BTW, you should use size_t instead of int for a length > field. > True. Pushed a fix. Cheers, Avi. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506268: CVE-2008-5160: allows remote attackers to cause a denial of service (daemon crash) via multiple invalid requests
Hi, * Raphael Geissert <[EMAIL PROTECTED]> [2008-11-20 21:39]: > 2008/11/20 Nico Golde <[EMAIL PROTECTED]>: > > * Raphael Geissert <[EMAIL PROTECTED]> [2008-11-20 09:32]: > >> The following CVE (Common Vulnerabilities & Exposures) id was published for > >> msp-webserver. > >> > >> CVE-2008-5160[1]: > > [...] > > > > Did you manage to reproduce that? Not reproducible for me > > with the unstable version. [...] > Note that I had to run the exploit a couple of times to reproduce the > issue triggered at 3, and when I tried to reproduce the segfault under > gdb to get a backtrace I didn't succeed to reproduce it. Hmm ok, same here, I tried it attaching gdb to it. Cheers Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. pgp4xw7GCvCer.pgp Description: PGP signature
Bug#506341: kpdf crashes when opening graphically-intensive files
Hi, > sometimes when I open certain PDFs Please provide one of them, otherwise there's very little that can be done. -- Pino Toscano signature.asc Description: This is a digitally signed message part.
Bug#506296: Works here
Michael Meskes wrote: > tag 506296 unreproducible > thanks > > I just installed spawg and tested it here on an up-to-date sid system. Granted > I only used the dvi file provided in the bug report to test, but spawg works > like a charm. > > Michael Let me update the original information then. If you perform the following steps: cd /tmp wget http://altair.sk/uploads/sample.tar.gz tar xvzf sample.tar.gz cd sample spawg ccs.dvi then you should see the problem (I am not sure about Sid but definitely on Lenny). The difference is that if the program does not find external *.EPS files, then it only prints a message Can't find EPS file: Figures/Fig/sem.eps. and works OK. However, if the file(s) are in place, it seems to go into some neverending loop. It then (after 10 seconds or so) prints gs_kill I haven't tried this on Sid (I do not have it around) but it behaves like this on Lenny. Matej -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506268: CVE-2008-5160: allows remote attackers to cause a denial of service (daemon crash) via multiple invalid requests
Hi, 2008/11/20 Nico Golde <[EMAIL PROTECTED]>: > Hi, > * Raphael Geissert <[EMAIL PROTECTED]> [2008-11-20 09:32]: >> The following CVE (Common Vulnerabilities & Exposures) id was published for >> msp-webserver. >> >> CVE-2008-5160[1]: > [...] > > Did you manage to reproduce that? Not reproducible for me > with the unstable version. No, I didn't have time to setup the server and attempt to reproduce it. But I did check the changelog and the patches being applied and found nothing relevant that could "fix" or prevent the issue. I have just tried to reproduce it and I succeeded. I made four fruitful attempts: 1. original exploit: nothing. 2. 200 requests: server segfaulted 3. 2000 requests: too many childs are spawned and they start eating the memory almost by 100MBs per sec. 4. 3000 requests: same as with the 2000 requests. Note that I had to run the exploit a couple of times to reproduce the issue triggered at 3, and when I tried to reproduce the segfault under gdb to get a backtrace I didn't succeed to reproduce it. > > Cheers > Nico > -- > Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF > For security reasons, all text in this mail is double-rot13 encrypted. > Cheers, -- Raphael Geissert - Debian Maintainer www.debian.org - get.debian.net Dan Quayle - "This President is going to lead us out of this recovery." -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506341: kpdf crashes when opening graphically-intensive files
Package: kpdf Version: 4:3.5.9-3 Severity: critical Justification: breaks the whole system Hi, sometimes when I open certain PDFs (especially, but not only when opening directly from Firefox), esp. those with few written text and complex graphics, the whole system completely crashes (i.e. doesn't react to keyboard and mouse, music player hangs and so on). syslog and dmesg don't deliver related information (at least not as far as I could figure out), so I have absolutely no clue what is the problem. Can someone help me with this? Thank you in advance for your answer! Martin Unzner -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.26-1-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages kpdf depends on: ii kdelibs4c2a 4:3.5.9.dfsg.1-6 core libraries and binaries for al ii libc6 2.7-16 GNU C Library: Shared libraries ii libfreetype62.3.7-2 FreeType 2 font engine, shared lib ii libgcc1 1:4.3.2-1GCC support library ii libpaper1 1.1.23+nmu1 library for handling paper charact ii libqt3-mt 3:3.3.8b-5 Qt GUI Library (Threaded runtime v ii libstdc++6 4.3.2-1 The GNU Standard C++ Library v3 ii libxft2 2.1.12-3 FreeType-based font drawing librar Versions of packages kpdf recommends: ii kghostview4:3.5.9-3 PostScript viewer for KDE Versions of packages kpdf suggests: ii khelpcente 4:4.0.0.really.3.5.9.dfsg.1-5 help center for KDE -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#506189: countrycodes: Uses outdated data: should be dropped or use iso-codes data
Processing commands for [EMAIL PROTECTED]: > severity 506189 wishlist Bug#506189: countrycodes: Uses outdated data: should be dropped or use iso-codes data Severity set to `wishlist' from `grave' > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506189: countrycodes: Uses outdated data: should be dropped or use iso-codes data
severity 506189 wishlist thanks Hi Christian Since when did "outdated and possibly misleading data" become a grave bug? Bug #492014 refer to montenegro, which I agree is a fault but I can hardly tell that this is a grave bug. On Wed, Nov 19, 2008 at 08:39:02AM +0100, Christian Perrier wrote: > Package: countrycodes > Version: 1.0.5-2 > Severity: grave > Justification: renders package unusable > > This package, which is apparently very loosely maintained is currently > providing outdated and possibly misleading data. Where did you get the information that it is loosely maintained from? I agree that it has not been updated for some time, but I have not had any really important bugs on it either. > The ISO-3166 codes have changed since last updates and no update for the > package came to correct this. See also #492014 for misleading data. Yes true. However as you also probably know we have had freeze for some time and during that time no corrections for "normal" bugs are accepted. This could partly be treated as documentation but I'm not sure it will be accepted. > In parallel, the iso-codes packages is providing up-to-date lists with the > ISO-3166 maintenance agency data used as reference. Yes but this is only documentation. No binary to simplify. > I think that, as is, this package should not be shipped with lenny but > either be completely dropped from the archive is noones wants to maintain > it, or modified to avoid using an internal reference list but rather > iso-codes' XML data (and then have the package depend on iso-codes). I do not agree. Countrycodes is packaged version of the "upstream" countrycodes software. This is the only intention of this package. > Please note, in the meantime, isoquery came out, which allows using > iso-codes data for either ISO 639, 3166 or 4217. I was not aware of that. If it is good then it can probably replace countrycodes in the future. We could add some kind of transition, but that should not be done in the middle of a freeze. As you can see from popcon the countrycodes package is fairly popular http://qa.debian.org/popcon.php?package=countrycodes I can see that isoquery is more popular which could vote for a drop of countrycodes but let us take that after Lenny in that case. Best regards, // Ola > -- System Information: > Debian Release: lenny/sid > APT prefers unstable > APT policy: (500, 'unstable'), (1, 'experimental') > Architecture: i386 (i686) > > Kernel: Linux 2.6.25-2-686 (SMP w/1 CPU core) > Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) > Shell: /bin/sh linked to /bin/dash > > Versions of packages countrycodes depends on: > ii libc6 2.7-16 GNU C Library: Shared libraries > > countrycodes recommends no packages. > > countrycodes suggests no packages. > > -- no debconf information > > > -- - Ola Lundqvist --- / [EMAIL PROTECTED] Annebergsslingan 37 \ | [EMAIL PROTECTED] 654 65 KARLSTAD | | http://inguza.com/ +46 (0)70-332 1551 | \ gpg/f.p.: 7090 A92B 18FE 7994 0C36 4FE4 18A1 B1CF 0FE5 3DD9 / --- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506179: no-ip: remote code execution vulnerability
Hi, * Avi Rozen <[EMAIL PROTECTED]> [2008-11-19 20:17]: [...] > [1]http://git.debian.org/?p=collab-maint/no-ip.git;a=commit;h=60ed93621ff36d9731ba5d9f9336d6eb91122302 Looks good please upload. BTW, you should use size_t instead of int for a length field. In this case it doesn't matter as you catch len = 0 before it can become negative Cheers Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. pgpCd1MZJE4mQ.pgp Description: PGP signature
Bug#506334: marked as done (yorick-curses is not 64bit-safe)
Your message dated Thu, 20 Nov 2008 18:17:03 + with message-id <[EMAIL PROTECTED]> and subject line Bug#506334: fixed in yorick-curses 0.1-3 has caused the Debian Bug report #506334, regarding yorick-curses is not 64bit-safe to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 506334: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506334 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Package: yorick-curses Version: 0.1-2 Severity: grave Justification: renders package unusable yorick-curses just won't work on amd64 (segfaults). I'm working on a fix. Regards, Thibaut. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.25.9 (SMP w/4 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Versions of packages yorick-ml4 depends on: ii libc6 2.7-16GNU C Library: Shared libraries ii libncurses5 5.6+20080907-1 shared libraries for terminal hand ii yorick 2.1.05+dfsg-6 interpreted language and scientifi yorick-curses recommends no packages. yorick-curses suggests no packages. -- no debconf information --- End Message --- --- Begin Message --- Source: yorick-curses Source-Version: 0.1-3 We believe that the bug you reported is fixed in the latest version of yorick-curses, which is due to be installed in the Debian FTP archive: yorick-curses_0.1-3.diff.gz to pool/main/y/yorick-curses/yorick-curses_0.1-3.diff.gz yorick-curses_0.1-3.dsc to pool/main/y/yorick-curses/yorick-curses_0.1-3.dsc yorick-curses_0.1-3_i386.deb to pool/main/y/yorick-curses/yorick-curses_0.1-3_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thibaut Paumard <[EMAIL PROTECTED]> (supplier of updated yorick-curses package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 20 Nov 2008 18:54:53 +0100 Source: yorick-curses Binary: yorick-curses Architecture: source i386 Version: 0.1-3 Distribution: unstable Urgency: high Maintainer: Thibaut Paumard <[EMAIL PROTECTED]> Changed-By: Thibaut Paumard <[EMAIL PROTECTED]> Description: yorick-curses - interface to the (n)curses library for the Yorick language Closes: 506334 Changes: yorick-curses (0.1-3) unstable; urgency=high . * fixed bug "yorick-curses is not 64bit-safe" (Closes: #506334). Checksums-Sha1: 2f229435ded7d53220511bea652999237af94d89 1067 yorick-curses_0.1-3.dsc 7849c7774bad1209a2b6c61baf03c761ebc20e6d 4312 yorick-curses_0.1-3.diff.gz 094f68db739bedb6c32f9a6eda800b67fbed38aa 12394 yorick-curses_0.1-3_i386.deb Checksums-Sha256: 05864762c846281c34ff12ef3a19c18aea65ccf620bc9aaba9531e8814a1cba3 1067 yorick-curses_0.1-3.dsc b6021001d110cd12360e1456acfb1f7030fd3a18033a57f8204f63010ed0ddd3 4312 yorick-curses_0.1-3.diff.gz 97182649f6dce79a240590e154eb9e872761352833873110c29dc98161e03922 12394 yorick-curses_0.1-3_i386.deb Files: 486d769f9e7c953ea37f4a21bf32955b 1067 math optional yorick-curses_0.1-3.dsc 4586e9fa77a4cff0c9cd0a9b4a0f4b16 4312 math optional yorick-curses_0.1-3.diff.gz 498d4a2d305cc17a7e6f56e3c3af9763 12394 math optional yorick-curses_0.1-3_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkklpjEACgkQ+37NkUuUiPFiOgCeMCT5jeBoqHhDYgoXB6kVZwBp zLEAnA/U5RHoH0tPn64OW0WNUhCO0e8S =xKeg -END PGP SIGNATURE- --- End Message ---
Bug#506334: yorick-curses is not 64bit-safe
Package: yorick-curses Version: 0.1-2 Severity: grave Justification: renders package unusable yorick-curses just won't work on amd64 (segfaults). I'm working on a fix. Regards, Thibaut. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.25.9 (SMP w/4 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Versions of packages yorick-ml4 depends on: ii libc6 2.7-16GNU C Library: Shared libraries ii libncurses5 5.6+20080907-1 shared libraries for terminal hand ii yorick 2.1.05+dfsg-6 interpreted language and scientifi yorick-curses recommends no packages. yorick-curses suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#505847: How to remove package?
How can this package be removed? Dpkg won't let me uninstall it due to unregistered fonts. Thanks! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#505237: Possible patch
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Ferenc Wagner schrieb: > Patrick Matthäi <[EMAIL PROTECTED]> writes: > >> I attached a diff which might fix it, could you please test it? > > Yes, this is what I use since the last upgrade. However, I don't > think it's a good idea to use --oknodo on restart and reload. The > missing process is a genuine error in those cases, isn't it? This should be okay, so on you can also restart if the service is not started yet. - -- /* Mit freundlichem Gruß / With kind regards, Patrick Matthäi E-Mail: [EMAIL PROTECTED] Comment: Always if we think we are right, we were maybe wrong. */ -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkklnIQACgkQ2XA5inpabMepVgCfS8a8fo6g2BPVJEm1y0si97ZP odAAn0ynLYfNMEcMqzg5evuU9yy2HKaD =uPfP -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#504167: T60
2.6.26-11~snapshot.12402 is ok Bastian Blank wrote: Can you please test a current snapshot[1]? I reverted the two patches where this change is included. Bastian [1]: http://wiki.debian.org/DebianKernel smime.p7s Description: S/MIME Cryptographic Signature
Bug#505237: Possible patch
Patrick Matthäi <[EMAIL PROTECTED]> writes: > I attached a diff which might fix it, could you please test it? Yes, this is what I use since the last upgrade. However, I don't think it's a good idea to use --oknodo on restart and reload. The missing process is a genuine error in those cases, isn't it? -- Thanks, Feri. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#503332: marked as done (iscsitarget-modules-2.6.26-1-xen-686: unable to load kernel module)
Your message dated Thu, 20 Nov 2008 17:17:18 +0100 with message-id <[EMAIL PROTECTED]> and subject line Re: Bug#503332: iscsitarget-modules-2.6.26-1-xen-686: unable to load kernel module has caused the Debian Bug report #503332, regarding iscsitarget-modules-2.6.26-1-xen-686: unable to load kernel module to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 503332: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=503332 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Package: iscsitarget-modules-2.6.26-1-xen-686 Version: 2.6.26+0.4.16+svn162-4 Severity: grave Justification: renders package unusable ../iscsitarget start Starting iSCSI enterprise target service: FATAL: Error inserting iscsi_trgt (/lib/modules/2.6.26-1-xen-686/extra/iscsitarget/kernel/iscsi_trgt.ko): Invalid module format failed - module is missing! dmesg output: iscsi_trgt: disagrees about version of symbol struct_module -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.26-1-xen-686 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages iscsitarget-modules-2.6.26-1-xen-686 depends on: ii linux-modules-2.6.26-1-xen-68 2.6.26-8 Linux 2.6.26 modules on i686 iscsitarget-modules-2.6.26-1-xen-686 recommends no packages. iscsitarget-modules-2.6.26-1-xen-686 suggests no packages. -- no debconf information --- End Message --- --- Begin Message --- Version: 2.6.26-5 Fixed. --- End Message ---
Bug#504093: marked as done (drbd8-modules-2.6.26-1-xen-686: module doesn't load)
Your message dated Thu, 20 Nov 2008 17:16:32 +0100 with message-id <[EMAIL PROTECTED]> and subject line Re: Bug#504093: drbd8-modules-2.6.26-1-xen-686: module doesn't load has caused the Debian Bug report #504093, regarding drbd8-modules-2.6.26-1-xen-686: module doesn't load to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 504093: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504093 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Package: drbd8-modules-2.6.26-1-xen-686 Version: 2.6.26+8.0.13-4 Severity: grave Justification: renders package unusable Hi, drbd8-modules-2.6.26-1-xen-686: module doesn't load Please update binary to actual kernel. -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.26-1-xen-686 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages drbd8-modules-2.6.26-1-xen-686 depends on: ii linux-modules-2.6.26-1-xen-68 2.6.26-8 Linux 2.6.26 modules on i686 drbd8-modules-2.6.26-1-xen-686 recommends no packages. drbd8-modules-2.6.26-1-xen-686 suggests no packages. -- no debconf information --- End Message --- --- Begin Message --- Version: 2.6.26-5 Fixed. --- End Message ---
Bug#505446: mlocate always creates empty database
Can you send your /etc/fstab too? I'm curious whether the / bind mount is defined there, or some script is doing it on their own. # /etc/fstab: static file system information. # # proc/proc procdefaults0 0 /dev/sda6 / ext3errors=remount-ro,noatime 0 1 /dev/sdb2 /home ext3noatime0 2 /dev/sda5 noneswapsw 0 0 /dev/hdc/media/cdrom0 udf,iso9660 user,noauto,exec,utf8 0 0 /dev/sda2/mnt/cntfs-3gdefaults,umask=0,nls-utf800 /dev/sdb1/mnt/dntfs-3gdefaults,umask=0,nls-utf800 / /./ bind bind 0 /home /home bind bind 0 -- Nigel Horne ClamAV, The Open-Source GPL Multi-Platform Anti-Virus tool-kit -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506031: marked as done (dovecot-common: ManageSieve security hole: virtual users can edit scripts of other virtual users)
Your message dated Thu, 20 Nov 2008 15:32:05 + with message-id <[EMAIL PROTECTED]> and subject line Bug#506031: fixed in dovecot 1:1.0.15-2.3 has caused the Debian Bug report #506031, regarding dovecot-common: ManageSieve security hole: virtual users can edit scripts of other virtual users to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 506031: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506031 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Package: dovecot-common Version: 1:1.0.15-2.2 Severity: grave Tags: security Justification: user security hole Stephan Bosch has reported¹ a security hole in ManageSieve implementation for Dovecot. "… clever virtual users that know the directory structure of the server can read and edit script files of other virtual users with the same system uid…" The security patch for Dovecot 1.0.15 is available at: http://www.rename-it.nl/dovecot/1.0/dovecot-1.0.15-managesieve-v9.3-security.patch Regards, Pascal 1 = http://dovecot.org/list/dovecot/2008-November/035259.html -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing'), (50, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.26-1-amd64 (SMP w/4 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages dovecot-common depends on: ii adduser 3.110 add and remove users and groups ii libc6 2.7-15 GNU C Library: Shared libraries ii libcomerr21.41.3-1 common error description library ii libkrb53 1.6.dfsg.4~beta1-4 MIT Kerberos runtime libraries ii libldap-2.4-2 2.4.11-1 OpenLDAP libraries ii libmysqlclient15off 5.0.51a-17 MySQL database client library ii libpam-runtime1.0.1-4Runtime support for the PAM librar ii libpam0g 1.0.1-4+b1 Pluggable Authentication Modules l ii libpq58.3.5-1PostgreSQL C client library ii libsqlite3-0 3.5.9-5SQLite 3 shared library ii libssl0.9.8 0.9.8g-14 SSL shared libraries ii openssl 0.9.8g-14 Secure Socket Layer (SSL) binary a ii ucf 3.0010 Update Configuration File: preserv ii zlib1g1:1.2.3.3.dfsg-12 compression library - runtime dovecot-common recommends no packages. dovecot-common suggests no packages. -- no debconf information --- End Message --- --- Begin Message --- Source: dovecot Source-Version: 1:1.0.15-2.3 We believe that the bug you reported is fixed in the latest version of dovecot, which is due to be installed in the Debian FTP archive: dovecot-common_1.0.15-2.3_i386.deb to pool/main/d/dovecot/dovecot-common_1.0.15-2.3_i386.deb dovecot-dev_1.0.15-2.3_i386.deb to pool/main/d/dovecot/dovecot-dev_1.0.15-2.3_i386.deb dovecot-imapd_1.0.15-2.3_i386.deb to pool/main/d/dovecot/dovecot-imapd_1.0.15-2.3_i386.deb dovecot-pop3d_1.0.15-2.3_i386.deb to pool/main/d/dovecot/dovecot-pop3d_1.0.15-2.3_i386.deb dovecot_1.0.15-2.3.diff.gz to pool/main/d/dovecot/dovecot_1.0.15-2.3.diff.gz dovecot_1.0.15-2.3.dsc to pool/main/d/dovecot/dovecot_1.0.15-2.3.dsc A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Dominic Hargreaves <[EMAIL PROTECTED]> (supplier of updated dovecot package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 19 Nov 2008 18:11:36 + Source: dovecot Binary: dovecot-common dovecot-dev dovecot-imapd dovecot-pop3d Architecture: source i386 Version: 1:1.0.15-2.3 Distribution: unstable Urgency: medium Maintainer: Dovecot Maintainers <[EMAIL PROTECTED]> Changed-By: Dominic Hargreaves <[EMAIL PROTECTED]> Description: dovecot-common - secure mail server that supports mbox and maildir mailboxes dovecot-dev - header files for the dovecot mail server dovecot-imapd - secure IMAP server that supports mbox and maildir mailboxes dovecot-pop3d - secure POP3 server that supports mbox and maildir mailboxes Closes: 506031 Changes: dovecot (1:1.0.1
Processed: Possible patch
Processing commands for [EMAIL PROTECTED]: > tags #505237 patch Bug#505237: /etc/init.d/snmpd start reports error if already running There were no tags set. Tags added: patch > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#505237: Possible patch
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 tags #505237 patch thanks Hello, I attached a diff which might fix it, could you please test it? Thanks. - -- /* Mit freundlichem Gruß / With kind regards, Patrick Matthäi E-Mail: [EMAIL PROTECTED] Comment: Always if we think we are right, we were maybe wrong. */ -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkklgx0ACgkQ2XA5inpabMfbjgCeJrb29uGaqblEnBuabadaQKgi hiQAoJ/aorwxGdjalN7BZ2oQKwbp6aZR =5VRO -END PGP SIGNATURE- diff -Naur net-snmp-5.4.1~dfsg.orig/debian/snmpd.init net-snmp-5.4.1~dfsg/debian/snmpd.init --- net-snmp-5.4.1~dfsg.orig/debian/snmpd.init 2008-11-20 16:27:19.0 +0100 +++ net-snmp-5.4.1~dfsg/debian/snmpd.init 2008-11-20 16:29:17.0 +0100 @@ -40,12 +40,12 @@ start) echo -n "Starting network management services:" if [ "$SNMPDRUN" = "yes" -a -f /etc/snmp/snmpd.conf ]; then - start-stop-daemon --quiet --start --exec /usr/sbin/snmpd \ + start-stop-daemon --quiet --oknodo --start --exec /usr/sbin/snmpd \ -- $SNMPDOPTS echo -n " snmpd" fi if [ "$TRAPDRUN" = "yes" -a -f /etc/snmp/snmptrapd.conf ]; then - start-stop-daemon --quiet --start --exec /usr/sbin/snmptrapd \ + start-stop-daemon --quiet --oknodo --start --exec /usr/sbin/snmptrapd \ -- $TRAPDOPTS echo -n " snmptrapd" fi @@ -66,13 +66,13 @@ # Allow the daemons time to exit completely. sleep 2 if [ "$SNMPDRUN" = "yes" -a -f /etc/snmp/snmpd.conf ]; then - start-stop-daemon --quiet --start --exec /usr/sbin/snmpd -- $SNMPDOPTS + start-stop-daemon --quiet --oknodo --start --exec /usr/sbin/snmpd -- $SNMPDOPTS echo -n " snmpd" fi if [ "$TRAPDRUN" = "yes" -a -f /etc/snmp/snmptrapd.conf ]; then # Allow snmpd time to start up. sleep 1 - start-stop-daemon --quiet --start --exec /usr/sbin/snmptrapd -- $TRAPDOPTS + start-stop-daemon --quiet --oknodo --start --exec /usr/sbin/snmptrapd -- $TRAPDOPTS echo -n " snmptrapd" fi echo "." @@ -80,7 +80,7 @@ reload|force-reload) echo -n "Reloading network management services:" if [ "$SNMPDRUN" = "yes" -a -f /etc/snmp/snmpd.conf ]; then -start-stop-daemon --quiet --stop --signal 1 \ +start-stop-daemon --quiet --oknodo --stop --signal 1 \ --pidfile /var/run/snmpd.pid --exec /usr/sbin/snmpd echo -n " snmpd" fi add_oknodo_snmpd_init.diff.sig Description: Binary data
Bug#506296: Works here
tag 506296 unreproducible thanks I just installed spawg and tested it here on an up-to-date sid system. Granted I only used the dvi file provided in the bug report to test, but spawg works like a charm. Michael -- Michael Meskes Michael at Fam-Meskes dot De, Michael at Meskes dot (De|Com|Net|Org) Michael at BorussiaFan dot De, Meskes at (Debian|Postgresql) dot Org ICQ: 179140304, AIM/Yahoo: michaelmeskes, Jabber: [EMAIL PROTECTED] Go VfL Borussia! Go SF 49ers! Use Debian GNU/Linux! Use PostgreSQL! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: severity of 504655 is important
Processing commands for [EMAIL PROTECTED]: > severity 504655 important Bug#504655: debian-installer: Kernel panic when velocity driver started Severity set to `important' from `grave' > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: tagging 505101
Processing commands for [EMAIL PROTECTED]: > tags 505101 sid Bug#505101: "libupsclient-dev points to /usr/lib not /lib" There were no tags set. Tags added: sid > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Works here
Processing commands for [EMAIL PROTECTED]: > tag 506296 unreproducible Bug#506296: spawg program runs, shows the window but always blocks afterward There were no tags set. Tags added: unreproducible > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: notfound 505101 in 2.2.2-6.2
Processing commands for [EMAIL PROTECTED]: > notfound 505101 2.2.2-6.2 Bug#505101: "libupsclient-dev points to /usr/lib not /lib" Bug no longer marked as found in version 2.2.2-6.2. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506323: #506323
severity 506323 important thanks First, make sure you have the last version installed, this is 2.6.26-10. Second, make sure you have the latest firmware installed, both for the machine and the raid controller. Also you should catch the console output either via serial console or netconsole. Bastian -- Women are more easily and more deeply terrified ... generating more sheer horror than the male of the species. -- Spock, "Wolf in the Fold", stardate 3615.4 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506058: Possible patch
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello, does the attached patch maybe help for your init script? It would be also interestend if var/run is a part of your / partition. - -- /* Mit freundlichem Gruß / With kind regards, Patrick Matthäi E-Mail: [EMAIL PROTECTED] Comment: Always if we think we are right, we were maybe wrong. */ -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkklfQ0ACgkQ2XA5inpabMdoaQCfS8TxI6RR1/3fwK5bAzlVTqzz bNMAnA1dEeD7CHajdluFk37+ZSl/aCeR =cT+A -END PGP SIGNATURE- diff -Naur gkrellm-2.3.2.orig/debian/gkrellmd.init gkrellm-2.3.2/debian/gkrellmd.init --- gkrellm-2.3.2.orig/debian/gkrellmd.init 2008-11-20 16:01:35.0 +0100 +++ gkrellm-2.3.2/debian/gkrellmd.init 2008-11-20 16:02:31.0 +0100 @@ -26,7 +26,7 @@ case "$1" in start) echo -n "Starting $DESC: " - start-stop-daemon --start --quiet \ + start-stop-daemon --start --quiet --oknodo \ --exec $DAEMON -- --pidfile /var/run/$NAME.pid $DAEMON_OPTS echo "$NAME." ;; @@ -58,7 +58,7 @@ start-stop-daemon --stop --quiet --pidfile \ /var/run/$NAME.pid --exec $DAEMON --oknodo sleep 1 - start-stop-daemon --start --quiet --pidfile \ + start-stop-daemon --start --quiet --oknodo --pidfile \ /var/run/$NAME.pid --exec $DAEMON -- --pidfile /var/run/$NAME.pid $DAEMON_OPTS echo "$NAME." ;; poss_patch_gkrellmd_init.diff.sig Description: Binary data
Bug#504353: Adjusting
severity 504353 wishlist retitle 504353 Make virtualbox-ose module packages independant of linux-modules-extra tag 504353 pending thanks To solve the current problem in Lenny all we have to do is to wait for the migration of the packages already in Sid. In the long run there will be a new package taking care of this, but this move hopefully can wait until Lenny is released. Therefore I downcast the bug and tag it pending, after all the new package is already done, but not uploaded. I hope this explains it and puts the discussions to an end. Michael -- Michael Meskes Michael at Fam-Meskes dot De, Michael at Meskes dot (De|Com|Net|Org) Michael at BorussiaFan dot De, Meskes at (Debian|Postgresql) dot Org ICQ: 179140304, AIM/Yahoo: michaelmeskes, Jabber: [EMAIL PROTECTED] Go VfL Borussia! Go SF 49ers! Use Debian GNU/Linux! Use PostgreSQL! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506008: marked as done ([grub-invaders] Fails to boot)
Your message dated Thu, 20 Nov 2008 15:51:59 +0100 with message-id <[EMAIL PROTECTED]> and subject line Re: [grub-invaders] Fails to boot has caused the Debian Bug report #506008, regarding [grub-invaders] Fails to boot to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 506008: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506008 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Package: grub-invaders Version: 1.0.0-8 Severity: grave Tags: patch --- Please enter the report below this line. --- Hi, While trying grub-pc, I went over grub-invaders. Installation went fine, but it failed to boot with an error like "multiboot unknown" (can't remember exactly). The attached patch solves the issue (at least for me). It moves line 10 ( prepare_grub_to_access_device…) after line 6, so that the menuentry contains only the multiboot, which is then recognised (for an unknown reason). Regards, OdyX --- System information. --- Architecture: amd64 Kernel: Linux 2.6.27-1-amd64 Debian Release: lenny/sid 700 testing mirror.switch.ch 600 unstablepkg-fso.alioth.debian.org 600 unstablemirror.switch.ch 500 testing-proposed-updates mirror.switch.ch 50 unstablemirror.switch.ch 50 unstableftp.uni-kl.de 50 testing-proposed-updates mirror.switch.ch 50 testing mirror.switch.ch 50 testing ftp.uni-kl.de 50 kernel-dists-trunk kernel-archive.buildserver.net 50 kernel-dists-sid kernel-archive.buildserver.net 50 experimentalmirror.switch.ch 50 experimentalftp.uni-kl.de --- Package information. --- Depends (Version) | Installed ===-+-=== | -- Didier Raboud, proud Debian user. CH-1802 Corseaux [EMAIL PROTECTED] --- etc/grub.d/22_invaders 2008-08-04 11:07:08.0 +0200 +++ /etc/grub.d/22_invaders 2008-11-17 17:16:01.0 +0100 @@ -4,11 +4,10 @@ source /usr/lib/grub/update-grub_lib INVADERSPATH=$( make_system_path_relative_to_its_root "/boot/invaders" ) echo "Found GRUB Invaders image: /boot/invaders" >&2 - cat << EOF -menuentry "GRUB Invaders" { -EOF + prepare_grub_to_access_device ${GRUB_DEVICE_BOOT} | sed -e "s/^/\t/g" cat << EOF +menuentry "GRUB Invaders" { multiboot ${INVADERSPATH} } EOF signature.asc Description: This is a digitally signed message part. --- End Message --- --- Begin Message --- Le mercredi 19 novembre 2008 19:20:20 Robert Millan, vous avez écrit : > On Wed, Nov 19, 2008 at 05:03:10PM +0100, Didier Raboud wrote: > > OK. > > > > I begin to understand... ( #497791 ) > > > > The problem is that if you only run "update-grub", "grub-install > > " is not run automagically and will then put grub in a weird > > state. > > > > "grub-install " should be run after each update-grub if I > > understand correctly - right ? > > grub-install should be run often, but only by the user. It's too risky to > run automatically. OK. I think that this is not clear though : nothing in /usr/share/doc/grub-pc nor anywhere where I could find it. Maybe there is something to do… > So, to summarize, if you grub-install with the versions of grub-pc / > grub-common in sid, invaders works, but if you grub-install with the ones > in experimental, it doesn't? (disregard update-grub calls in this test, > but make sure you're using /etc/grub.d/*_multiboot unmodified). Lenny/Sid version : everything boots and works Experimental version : everything boots, but no background image The experimental version wants to use the old desktop-base image (another bug…) So, the issue was simply to run 'grub-install ' after each grub-update to be sure that everything is copied correctly in /boot. I'm closing the bug with '-done', because it was my mis-use of the package. Regards, OdyX -- Didier Raboud, proud Debian user. CH-1802 Corseaux [EMAIL PROTECTED] signature.asc Description: This is a digitally signed message part. --- End Message ---
Processed: Adjusting
Processing commands for [EMAIL PROTECTED]: > severity 504353 wishlist Bug#504353: virtualbox-ose-modules-2.6.26-1-amd64 version mismatch on Lenny Bug#502346: virtualbox-ose-modules package older than virtualbox-ose Bug#502539: virtualbox-ose-modules-2.6.26-1-686 contains outdated module for VirtualBox Severity set to `wishlist' from `serious' > retitle 504353 Make virtualbox-ose module packages independant of > linux-modules-extra Bug#504353: virtualbox-ose-modules-2.6.26-1-amd64 version mismatch on Lenny Changed Bug title to `Make virtualbox-ose module packages independant of linux-modules-extra' from `virtualbox-ose-modules-2.6.26-1-amd64 version mismatch on Lenny'. > tag 504353 pending Bug#504353: Make virtualbox-ose module packages independant of linux-modules-extra There were no tags set. Bug#502346: virtualbox-ose-modules package older than virtualbox-ose Bug#502539: virtualbox-ose-modules-2.6.26-1-686 contains outdated module for VirtualBox Tags added: pending > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#504167: T60
On Wed, Nov 19, 2008 at 03:11:09PM +0100, Jan Korbel wrote: > Vanilla 2.6.26.6 with this patch is ok. I can resume notebook (and there > is no delay). Can you please test a current snapshot[1]? I reverted the two patches where this change is included. Bastian [1]: http://wiki.debian.org/DebianKernel -- Our missions are peaceful -- not for conquest. When we do battle, it is only because we have no choice. -- Kirk, "The Squire of Gothos", stardate 2124.5 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506297: marked as done (yorick-ml4 is not 64bit-safe)
Your message dated Thu, 20 Nov 2008 14:02:03 + with message-id <[EMAIL PROTECTED]> and subject line Bug#506297: fixed in yorick-ml4 0.5.1-3 has caused the Debian Bug report #506297, regarding yorick-ml4 is not 64bit-safe to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 506297: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506297 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Package: yorick-ml4 Version: 0.5.1-2 Severity: grave Justification: renders package unusable The package is completely broken under amd64. ml4write never returns, ml4read segfaults... In ml4.c, the "info" array at the beginning of each ml4 variable must be of type int, not long. I'm working on a fix. Regards, Thibaut. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.25.9 (SMP w/4 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Versions of packages yorick-ml4 depends on: ii libc6 2.7-16GNU C Library: Shared libraries ii yorick 2.1.05+dfsg-6 interpreted language and scientifi yorick-ml4 recommends no packages. yorick-ml4 suggests no packages. -- no debconf information --- End Message --- --- Begin Message --- Source: yorick-ml4 Source-Version: 0.5.1-3 We believe that the bug you reported is fixed in the latest version of yorick-ml4, which is due to be installed in the Debian FTP archive: yorick-ml4_0.5.1-3.diff.gz to pool/main/y/yorick-ml4/yorick-ml4_0.5.1-3.diff.gz yorick-ml4_0.5.1-3.dsc to pool/main/y/yorick-ml4/yorick-ml4_0.5.1-3.dsc yorick-ml4_0.5.1-3_i386.deb to pool/main/y/yorick-ml4/yorick-ml4_0.5.1-3_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thibaut Paumard <[EMAIL PROTECTED]> (supplier of updated yorick-ml4 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 20 Nov 2008 13:58:21 +0100 Source: yorick-ml4 Binary: yorick-ml4 Architecture: source i386 Version: 0.5.1-3 Distribution: unstable Urgency: high Maintainer: Thibaut Paumard <[EMAIL PROTECTED]> Changed-By: Thibaut Paumard <[EMAIL PROTECTED]> Description: yorick-ml4 - Matlab file format support for the Yorick language Closes: 506297 Changes: yorick-ml4 (0.5.1-3) unstable; urgency=high . * Fixed bug "yorick-ml4 is not 64bit-safe" (Closes: #506297). Checksums-Sha1: d14889db8b6c07d69eadd2794192808934ba1f8a 1027 yorick-ml4_0.5.1-3.dsc 21978f13fc9cef710e73350ac1f3ebe53d60b797 4943 yorick-ml4_0.5.1-3.diff.gz f3bc6593127194b261f5688d2c1eccae132eb8e7 13558 yorick-ml4_0.5.1-3_i386.deb Checksums-Sha256: dcd81d11946a53567c70a6f569821a2a663b7fdb2d3a9f91ba76047d12c4784f 1027 yorick-ml4_0.5.1-3.dsc 6b28f329e5bcde275c58dca4e9c7d836c248fa3230738700ae4fe1515829c3ef 4943 yorick-ml4_0.5.1-3.diff.gz 5356b626b47324b914fb32c5eab4948e4e2ee6bace6ccfa6cf26d7eeb80a 13558 yorick-ml4_0.5.1-3_i386.deb Files: 774497d2a335c6af5e271f0bf70cf22e 1027 math optional yorick-ml4_0.5.1-3.dsc 6eb8f67126e522317b844e285b73a384 4943 math optional yorick-ml4_0.5.1-3.diff.gz 7b8e6a3b62765f667048e856195a9fbe 13558 math optional yorick-ml4_0.5.1-3_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkklZ6gACgkQ+37NkUuUiPHnmgCfUt79DmaVpKWXv7jUbQe8N8ej IgwAnjMNe7HuMft0aQYIr9HY6hM+Q7Jz =NG8p -END PGP SIGNATURE- --- End Message ---
Bug#505446: mlocate always creates empty database
* Nigel Horne [Wed, 19 Nov 2008 08:12:19 +]: > Here is my /etc/mtab Can you send your /etc/fstab too? I'm curious whether the / bind mount is defined there, or some script is doing it on their own. -- Adeodato Simó dato at net.com.org.es Debian Developer adeodato at debian.org The problem I have with making an intelligent statement is that some people then think that it's not an isolated occurrance. -- Simon Travaglia -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506268: CVE-2008-5160: allows remote attackers to cause a denial of service (daemon crash) via multiple invalid requests
Hi, * Raphael Geissert <[EMAIL PROTECTED]> [2008-11-20 09:32]: > The following CVE (Common Vulnerabilities & Exposures) id was published for > msp-webserver. > > CVE-2008-5160[1]: [...] Did you manage to reproduce that? Not reproducible for me with the unstable version. Cheers Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. pgp0MIXbQlzOw.pgp Description: PGP signature
Bug#506297: yorick-ml4 is not 64bit-safe
Package: yorick-ml4 Version: 0.5.1-2 Severity: grave Justification: renders package unusable The package is completely broken under amd64. ml4write never returns, ml4read segfaults... In ml4.c, the "info" array at the beginning of each ml4 variable must be of type int, not long. I'm working on a fix. Regards, Thibaut. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.25.9 (SMP w/4 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Versions of packages yorick-ml4 depends on: ii libc6 2.7-16GNU C Library: Shared libraries ii yorick 2.1.05+dfsg-6 interpreted language and scientifi yorick-ml4 recommends no packages. yorick-ml4 suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506295: xgdvi: after a window is opened, the whole program blocks
Package: xgdvi Version: 1.3.2-5 Severity: grave Justification: renders package unusable If I try to use this program, appropriate window appears but then the program does not react to any interaction. It is impossible to scroll the contents of the window, go to other pages of the document, resize the window. Nothing. Here is one of the example dvi files I tried http://altair.sk/uploads/ccs.dvi but I experienced the same behavior with any other dvi file I tried. -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages xgdvi depends on: ii libc6 2.7-15GNU C Library: Shared libraries ii libdvilib2-16 1.3.2-5 a portable DVI interpreter library ii libfreetype6 2.3.7-2 FreeType 2 font engine, shared lib ii libglib1.2ldbl 1.2.10-19 The GLib library of C routines ii libgtk1.2 1.2.10-18.1 The GIMP Toolkit set of widgets fo ii libkpathsea4 2007.dfsg.2-4 TeX Live: path search library for ii libt1-55.1.2-3 Type 1 font rasterizer library - r ii libx11-6 2:1.1.5-2 X11 client-side library ii libxext6 2:1.0.4-1 X11 miscellaneous extension librar ii libxi6 2:1.1.3-1 X11 Input extension library ii vflib3 3.6.14.dfsg-1 Versatile Font Library Versions of packages xgdvi recommends: ii texlive-extra-utils [dviut 2007.dfsg.2-4 TeX Live: TeX auxiliary programs xgdvi suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506296: spawg program runs, shows the window but always blocks afterward
Package: spawg Version: 1.3.2-5 Severity: grave Justification: renders package unusable If I try to open any dvi file with spawg, a window appears but the whole program blocks afterwards. The window does not react to any interaction (such as attempts to scroll the content of the dvi document, move to other pages etc). Here is an example dvi document I tried to open http://altair.sk/uploads/ccs.dvi but I am experiencing the same behavior with any other dvi file. -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages spawg depends on: ii libc6 2.7-15GNU C Library: Shared libraries ii libdvilib2-16 1.3.2-5 a portable DVI interpreter library ii libfreetype6 2.3.7-2 FreeType 2 font engine, shared lib ii libglib1.2ldbl 1.2.10-19 The GLib library of C routines ii libgtk1.2 1.2.10-18.1 The GIMP Toolkit set of widgets fo ii libkpathsea4 2007.dfsg.2-4 TeX Live: path search library for ii libt1-55.1.2-3 Type 1 font rasterizer library - r ii libx11-6 2:1.1.5-2 X11 client-side library ii libxext6 2:1.0.4-1 X11 miscellaneous extension librar ii libxi6 2:1.1.3-1 X11 Input extension library ii vflib3 3.6.14.dfsg-1 Versatile Font Library spawg recommends no packages. spawg suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#491621: File Your Claim !
-- Fondazione di vitiirio Italy has choosen you among the 40 lucky recepient to receive $500.000.00USD,you are to contact Mrs Maria Carolla with the following Ref:(N-222-6747, E-900- 56).and your personal details such as names and location. Email:[EMAIL PROTECTED] With Regards. Sir Mario Domenico Fondazion Officer -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#496896: Thanks, works fine now
Hi, Trent W. Buck wrote: > As Lenny now includes libglib2.0-0=2.16.6-1, this bug should not > manifest. just wanna acknowledge that the bug is really gone now. Thanks! Regards, Axel -- Axel Beckert - [EMAIL PROTECTED], [EMAIL PROTECTED] - http://noone.org/abe/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: closing 495501
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.35 > # As Lenny now includes libglib2.0-0=2.16.6-1, this bug should not manifest. > close 495501 Bug#495501: midori: segfaults on many webpages. 'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing. Bug#496306: midori: segfault on slashdot.org Bug#496896: midori: segfaults on cuil.com results Bug closed, send any further explanations to Kapil Hari Paranjape <[EMAIL PROTECTED]> > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#505446: mlocate always creates empty database
Sebastian Andrzej Siewior wrote: * Nigel Horne | 2008-11-19 08:12:19 [+]: Its a clean installation, the disc was formatted before installation. If something is wrong it's nothing I've done! Here is my /etc/mtab /dev/sda6 / ext3 rw,noatime,errors=remount-ro 0 0 tmpfs /lib/init/rw tmpfs rw,nosuid,mode=0755 0 0 proc /proc proc rw,noexec,nosuid,nodev 0 0 sysfs /sys sysfs rw,noexec,nosuid,nodev 0 0 procbususb /proc/bus/usb usbfs rw 0 0 udev /dev tmpfs rw,mode=0755 0 0 tmpfs /dev/shm tmpfs rw,nosuid,nodev 0 0 devpts /dev/pts devpts rw,noexec,nosuid,gid=5,mode=620 0 0 fusectl /sys/fs/fuse/connections fusectl rw 0 0 /dev/sdb2 /home ext3 rw,noatime 0 0 /dev/sda2 /mnt/c fuseblk rw,allow_other,blksize=4096 0 0 /dev/sdb1 /mnt/d fuseblk rw,allow_other,blksize=4096 0 0 / / bind rw,bind 0 0 /home /home bind rw,bind 0 0 rpc_pipefs /var/lib/nfs/rpc_pipefs rpc_pipefs rw 0 0 automount(pid3573) /net autofs rw,fd=4,pgrp=3573,minproto=2,maxproto=4 0 0 automount(pid3544) /smb autofs rw,fd=4,pgrp=3544,minproto=2,maxproto=4 0 0 You have your / and /home mounted onto itself + you have automount on /net and /smb. This is not part of the a standard installation. Either you have it by accident in your fstab or a chroot mount script went wrong. I guess the latter. Does your /proc/mounts contain a line like |tmpfs / tmpfs rw,size=10240k,mode=755 0 0 ? If so, than this is a *valid* bind mount. No it doesn't. Sebastian -- Nigel Horne ClamAV, The Open-Source GPL Multi-Platform Anti-Virus tool-kit -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#495501: closing 495501
# Automatically generated email from bts, devscripts version 2.10.35 # As Lenny now includes libglib2.0-0=2.16.6-1, this bug should not manifest. close 495501 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#502100: marked as done (cups: socket backend hangs in tight select/read loop (larger printouts?))
Your message dated Thu, 20 Nov 2008 09:32:05 + with message-id <[EMAIL PROTECTED]> and subject line Bug#489045: fixed in cups 1.3.8-1lenny3 has caused the Debian Bug report #489045, regarding cups: socket backend hangs in tight select/read loop (larger printouts?) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 489045: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=489045 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Package: cups Version: 1.3.9-1 Hi, (this did occur with 1.3.8-11 as well) I have the suspicion that it seems to be larger printouts which make the socket backend lock up entirely (up to about 10 pages worked fine multiple times, however trying something larger locked up multiple times). strace -f -p gives endless: read(5, ""..., 1024)= 0 select(6, [5], [5], NULL, NULL) = 1 (in [5]) read(5, ""..., 1024)= 0 select(6, [5], [5], NULL, NULL) = 1 (in [5]) read(5, Process 9753 detached # ltrace -f -p 9753 --- SIGSTOP (Stopped (signal)) --- --- SIGSTOP (Stopped (signal)) --- (gdb) attach 9753 Attaching to program: /usr/lib/cups/backend-available/socket, process 9753 (no debugging symbols found) (no debugging symbols found) (no debugging symbols found) 0xb7eee5ae in ?? () (gdb) bt #0 0xb7eee5ae in ?? () #1 0xb7f6dff4 in ?? () #2 0xb7f6c33f in ?? () #3 0x0005 in ?? () #4 0xbfe6b768 in ?? () #5 0x0400 in ?? () #6 0x in ?? () A "fin" on frame 0 does _never_ return. disas on any frame address fails (No function contains specified address.). Corrupt stack?? Remote printer is hplj4000tn:9100, client connected via two routers (one WLAN). Routers don't display any relevant firewall logs. _no_ WLAN driver error messages (acx100). Printout was a PDF file 2-paged via pdftops/psnup/ps2pdf (61 pages). Admittedly a pretty problematic bug report, if you have some ideas to try, then just yell. Thanks, Andreas Mohr --- End Message --- --- Begin Message --- Source: cups Source-Version: 1.3.8-1lenny3 We believe that the bug you reported is fixed in the latest version of cups, which is due to be installed in the Debian FTP archive: cups-bsd_1.3.8-1lenny3_i386.deb to pool/main/c/cups/cups-bsd_1.3.8-1lenny3_i386.deb cups-client_1.3.8-1lenny3_i386.deb to pool/main/c/cups/cups-client_1.3.8-1lenny3_i386.deb cups-common_1.3.8-1lenny3_all.deb to pool/main/c/cups/cups-common_1.3.8-1lenny3_all.deb cups-dbg_1.3.8-1lenny3_i386.deb to pool/main/c/cups/cups-dbg_1.3.8-1lenny3_i386.deb cups_1.3.8-1lenny3.diff.gz to pool/main/c/cups/cups_1.3.8-1lenny3.diff.gz cups_1.3.8-1lenny3.dsc to pool/main/c/cups/cups_1.3.8-1lenny3.dsc cups_1.3.8-1lenny3_i386.deb to pool/main/c/cups/cups_1.3.8-1lenny3_i386.deb cupsys-bsd_1.3.8-1lenny3_all.deb to pool/main/c/cups/cupsys-bsd_1.3.8-1lenny3_all.deb cupsys-client_1.3.8-1lenny3_all.deb to pool/main/c/cups/cupsys-client_1.3.8-1lenny3_all.deb cupsys-common_1.3.8-1lenny3_all.deb to pool/main/c/cups/cupsys-common_1.3.8-1lenny3_all.deb cupsys-dbg_1.3.8-1lenny3_all.deb to pool/main/c/cups/cupsys-dbg_1.3.8-1lenny3_all.deb cupsys_1.3.8-1lenny3_all.deb to pool/main/c/cups/cupsys_1.3.8-1lenny3_all.deb libcups2-dev_1.3.8-1lenny3_i386.deb to pool/main/c/cups/libcups2-dev_1.3.8-1lenny3_i386.deb libcups2_1.3.8-1lenny3_i386.deb to pool/main/c/cups/libcups2_1.3.8-1lenny3_i386.deb libcupsimage2-dev_1.3.8-1lenny3_i386.deb to pool/main/c/cups/libcupsimage2-dev_1.3.8-1lenny3_i386.deb libcupsimage2_1.3.8-1lenny3_i386.deb to pool/main/c/cups/libcupsimage2_1.3.8-1lenny3_i386.deb libcupsys2-dev_1.3.8-1lenny3_all.deb to pool/main/c/cups/libcupsys2-dev_1.3.8-1lenny3_all.deb libcupsys2_1.3.8-1lenny3_all.deb to pool/main/c/cups/libcupsys2_1.3.8-1lenny3_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Martin Pitt <[EMAIL PROTECTED]> (supplier of updated cups package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 20 Nov 2008 09:05:35 +0100 Source: cups Binary: libcups2 libcupsimage2 cups cups-client libcups2-dev libcupsimage2-dev cups-
Bug#489045: marked as done (cups: infinite loop, 100%CPU use, while trying to print with HPJetDirect)
Your message dated Thu, 20 Nov 2008 09:32:05 + with message-id <[EMAIL PROTECTED]> and subject line Bug#489045: fixed in cups 1.3.8-1lenny3 has caused the Debian Bug report #489045, regarding cups: infinite loop, 100%CPU use, while trying to print with HPJetDirect to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 489045: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=489045 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems --- Begin Message --- Package: cups Version: 1.3.7-7 Severity: grave Justification: renders package unusable Hi, Nothing happens when trying to print, even the test-page, to a HP 4200 network printer through HPDirect. If I run 'top', I see a process called 'socket' owned by user 'lp' that is using 100% of computer use. I first saw this problem several months ago when I was using 'etch' on my amd64 machine, but I did not reported a bug because my laptop (running i386 'sid') could print without problems in the same printer. So, I just thought it was an incompatibility of the etch version of cups with the printer. However, I'm now runnning 'lenny' on my amd64 machine (and thus I have the same version of cups in both computers) and I still have the same problem. Since no one else is reporting this problem, I guess is something very specific to amd64. I could not find errors messages anywhere to help with the debugging... so please let me know how else can I help. Thank you very much, Patricio -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing'), (500, 'stable'), (50, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.24-1-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) Shell: /bin/sh linked to /bin/bash Versions of packages cups depends on: ii adduser 3.108 add and remove users and groups ii cups-common 1.3.7-7 Common UNIX Printing System(tm) - ii debconf [debconf-2.0]1.5.22 Debian configuration management sy pi ghostscript 8.62.dfsg.1-2.1 The GPL Ghostscript PostScript/PDF ii libavahi-compat-libdnssd 0.6.22-3Avahi Apple Bonjour compatibility ii libc62.7-10 GNU C Library: Shared libraries ii libcups2 1.3.7-7 Common UNIX Printing System(tm) - pi libcupsimage21.3.7-7 Common UNIX Printing System(tm) - ii libdbus-1-3 1.2.1-2 simple interprocess messaging syst ii libgnutls26 2.4.0-2 the GNU TLS library - runtime libr ii libkrb53 1.6.dfsg.3-2MIT Kerberos runtime libraries ii libldap-2.4-22.4.9-1 OpenLDAP libraries ii libpam0g 0.99.7.1-6 Pluggable Authentication Modules l ii libpaper11.1.23 library for handling paper charact ii libslp1 1.2.1-7.3 OpenSLP libraries ii lsb-base 3.2-12 Linux Standard Base 3.2 init scrip ii perl-modules 5.10.0-11 Core Perl modules ii procps 1:3.2.7-8 /proc file system utilities ii ssl-cert 1.0.20 simple debconf wrapper for OpenSSL ii xpdf-utils [poppler-util 3.02-1.3Portable Document Format (PDF) sui Versions of packages cups recommends: ii avahi-utils 0.6.22-3 Avahi browsing, publishing and dis ii cups-client 1.3.7-7Common UNIX Printing System(tm) - ii foomatic-filters 3.0.2-20080211-3.1 OpenPrinting printer support - fil ii smbclient 2:3.0.30-3 a LanManager-like simple client fo -- debconf information: cupsys/raw-print: true cupsys/backend: ipp, lpd, parallel, scsi, serial, socket, usb, snmp, dnssd --- End Message --- --- Begin Message --- Source: cups Source-Version: 1.3.8-1lenny3 We believe that the bug you reported is fixed in the latest version of cups, which is due to be installed in the Debian FTP archive: cups-bsd_1.3.8-1lenny3_i386.deb to pool/main/c/cups/cups-bsd_1.3.8-1lenny3_i386.deb cups-client_1.3.8-1lenny3_i386.deb to pool/main/c/cups/cups-client_1.3.8-1lenny3_i386.deb cups-common_1.3.8-1lenny3_all.deb to pool/main/c/cups/cups-common_1.3.8-1lenny3_all.deb cups-dbg_1.3.8-1lenny3_i386.deb to pool/main/c/cups/cups-dbg_1.3.8-1lenny3_i386.deb cups_1.3.8-1lenny3.diff.gz to pool/main/c/cups/cups_1.3.8-1lenny3.diff.gz cups_1.3.8-1lenny3.dsc to pool/main/c/cups/cups_1.3.8-1lenny3.dsc cups_1.3.8-1len
Processed: severity of 506286 is important
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.35 > #bashisms are a release goal, not RC > severity 506286 important Bug#506286: ocaml: FTBFS using dash Severity set to `important' from `serious' > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506286: severity of 506286 is important
# Automatically generated email from bts, devscripts version 2.10.35 #bashisms are a release goal, not RC severity 506286 important -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#506286: ocaml: FTBFS using dash
Package: ocaml Version: 3.11.0~beta1-1 Severity: serious Justification: no longer builds from source Build fails with the following message: ./configure: 1548: Syntax error: "(" unexpected (expecting ")") make: *** [config-stamp] Error 2 dpkg-buildpackage: failure: debian/rules build gave error exit status 2 Build succeeded when I use bash ("bash ./configure" in debian/rules). -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.26-1-686 (SMP w/2 CPU cores) Locale: LANG=ja_JP.UTF-8, LC_CTYPE=ja_JP.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages ocaml depends on: ii libx11-dev2:1.1.5-2 X11 client-side library (developme ii ocaml-base3.11.0~beta1-1 Runtime system for OCaml bytecode ii ocaml-nox 3.11.0~beta1-1 ML language implementation with a ocaml recommends no packages. Versions of packages ocaml suggests: ii tcl8.4-dev8.4.19-2 Tcl (the Tool Command Language) v8 ii tk8.4-dev 8.4.19-2 Tk toolkit for Tcl and X11, v8.4 - -- debconf-show failed -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]