Processed: portmap severity 490893 important

2008-11-20 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 490893 important
Bug#490893: Debian unstable: umountroot does not unmount root
Severity set to `important' from `grave'

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#501151: Preparing packaging for ocfs2-tools 1.4.1-1

2008-11-20 Thread Jeremy Lainé
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Frederik, Joel,

I have started putting together the packaging for ocfs2-tools here:

https://svn.jerryweb.org/public/packages/ocfs2-tools/

What would you think of applying for some space on alioth so that we can 
maintain
ocfs2-tools collaboratively and finally upload a recent version of ocfs2-tools?

Cheers,
Jeremy
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkkmZVoACgkQ4mJJZqJp2Se/tACffFdlJQ+gIhVuX1q/ztuLSP0Y
/NgAoMpRSXywkX+p7DkOf65e36nQhKcH
=KhPU
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506373: [Evolution] Bug#506373: evolution email crashes when receiving a specific invitation from Google Calendar

2008-11-20 Thread Yves-Alexis Perez
On ven, 2008-11-21 at 00:08 +0100, Cyrille Chépélov wrote:
> It then crashes again at boot, when trying
> again to display the last received (same) message.

NOt arguing about the other stuff, but when evo crash here, at restart
it asks if it can display the offending message.

Cheers,
-- 
Yves-Alexis


signature.asc
Description: This is a digitally signed message part


Bug#506391: kover_1:3-1(hppa/experimental): FTBFS: qmultilinedit.h: No such file or directory

2008-11-20 Thread Frank Lichtenheld
Package: kover
Version: 1:3-1
Severity: serious

Hi,

your package failed to build from source.

| Automatic build of kover_1:3-1 on lofn by sbuild/hppa 98-farm
| Build started at 20081121-0336
| **
| Checking available source versions...
| Fetching source files...
| Reading package lists...
| Building dependency tree...
| Need to get 688kB of source archives.
| Get:1 http://sinclair.farm.ftbfs.de experimental/main kover 1:3-1 (dsc) [995B]
| Get:2 http://sinclair.farm.ftbfs.de experimental/main kover 1:3-1 (tar) 
[681kB]
| Get:3 http://sinclair.farm.ftbfs.de experimental/main kover 1:3-1 (diff) 
[5928B]
| Fetched 688kB in 0s (994kB/s)
| Download complete and in download only mode
| ** Using build dependencies supplied by package:
| Build-Depends: autotools-dev, kdelibs4-dev (>= 3.4.2), debhelper (>= 
5.0.51~), dbs, imagemagick, libcdio-cdda-dev, libcddb2-dev, chrpath
| Checking for already installed source dependencies...
[...]
| g++ -DHAVE_CONFIG_H -I. -I.. -I/usr/include/kde -I/usr/include/kde 
-I/usr/include/qt3 -I.-DQT_THREAD_SUPPORT  -D_REENTRANT  -Wnon-virtual-dtor 
-Wno-long-long -Wundef -ansi -D_XOPEN_SOURCE=500 -D_BSD_SOURCE -Wcast-align 
-Wconversion -Wchar-subscripts -Wall -W -Wpointer-arith -Wwrite-strings -O2 
-Wnon-virtual-dtor -Wno-long-long -Wundef -ansi -D_XOPEN_SOURCE=500 
-D_BSD_SOURCE -Wcast-align -Wconversion -Wchar-subscripts -Wall -W 
-Wpointer-arith -Wwrite-strings -O2 -g -O2 -std=gnu++98 -Wformat-security 
-Wmissing-format-attribute -fno-exceptions -fno-check-new -fno-common 
-Wformat-security -Wmissing-format-attribute -fno-exceptions -fno-check-new 
-fno-common  -MT kover.all_cc.o -MD -MP -MF .deps/kover.all_cc.Tpo -c -o 
kover.all_cc.o kover.all_cc.cc
| In file included from kovertop.moc:11,
|  from kovertop.cc:22,
|  from kover.all_cc.cc:5:
| kovertop.h:41:27: error: qmultilinedit.h: No such file or directory
| In file included from /usr/include/qt3/qwindowdefs.h:47,
|  from /usr/include/qt3/qwidget.h:45,
|  from imagedlg.h:35,
|  from imagedlg.moc:11,
|  from imagedlg.cc:32,
|  from kover.all_cc.cc:2:
| /usr/include/qt3/qstring.h: In member function 'char QChar::latin1() const':
| /usr/include/qt3/qstring.h:197: warning: conversion to 'char' from 'int' may 
alter its value
| /usr/include/qt3/qstring.h: In member function 'void QChar::setCell(uchar)':
| /usr/include/qt3/qstring.h:222: warning: conversion to 'ushort' from 'int' 
may alter its value
| /usr/include/qt3/qstring.h: In member function 'void QChar::setRow(uchar)':
| /usr/include/qt3/qstring.h:223: warning: conversion to 'ushort' from 'int' 
may alter its value
| /usr/include/qt3/qstring.h: In constructor 'QChar::QChar(uchar, uchar)':
| /usr/include/qt3/qstring.h:267: warning: conversion to 'ushort' from 'int' 
may alter its value
| /usr/include/qt3/qstring.h: In constructor 'QStringData::QStringData(QChar*, 
uint, uint)':
| /usr/include/qt3/qstring.h:365: warning: conversion to 'unsigned int:30' from 
'uint' may alter its value
| /usr/include/qt3/qstring.h:365: warning: conversion to 'unsigned int:30' from 
'uint' may alter its value
| In file included from /usr/include/qt3/qobject.h:48,
|  from /usr/include/qt3/qwidget.h:46,
|  from imagedlg.h:35,
|  from imagedlg.moc:11,
|  from imagedlg.cc:32,
|  from kover.all_cc.cc:2:
| /usr/include/qt3/qevent.h: In member function 'void 
QDropEvent::setAction(QDropEvent::Action)':
| /usr/include/qt3/qevent.h:523: warning: conversion to 'unsigned char' from 
'uint' may alter its value
| In file included from /usr/include/qt3/qwidget.h:52,
|  from imagedlg.h:35,
|  from imagedlg.moc:11,
|  from imagedlg.cc:32,
|  from kover.all_cc.cc:2:
| /usr/include/qt3/qsizepolicy.h: In member function 'void 
QSizePolicy::transpose()':
| /usr/include/qt3/qsizepolicy.h:125: warning: conversion to 'uchar' from 
'uint' may alter its value
| /usr/include/qt3/qsizepolicy.h:125: warning: conversion to 'uchar' from 
'uint' may alter its value
| In file included from imagedlg.h:39,
|  from imagedlg.moc:11,
|  from imagedlg.cc:32,
|  from kover.all_cc.cc:2:
| /usr/include/qt3/qpushbutton.h: In member function 'virtual void 
QPushButton::setIsMenuButton(bool)':
| /usr/include/qt3/qpushbutton.h:94: warning: conversion to 'unsigned char:1' 
from 'int' may alter its value
| In file included from kover.all_cc.cc:3:
| cddb_fill.cc: In member function 'bool cddb_fill::read_cdtext()':
| cddb_fill.cc:84: warning: conversion to 'track_t' from 'int' may alter its 
value
| cddb_fill.cc:86: warning: conversion to 'short unsigned int' from 'int' may 
alter its value
| In file included from kover.all_cc.cc:4:
| koverfile.cc: In member functi

Bug#506393: xcb-util_0.3.1-1(hppa/experimental): FTBFS: ./autogen.sh: Permission denied

2008-11-20 Thread Frank Lichtenheld
Package: xcb-util
Version: 0.3.1-1
Severity: serious

Hi,

your package failed to build from source.

| Automatic build of xcb-util_0.3.1-1 on lofn by sbuild/hppa 98-farm
| Build started at 20081121-0249
| **
| Checking available source versions...
| Fetching source files...
| Reading package lists...
| Building dependency tree...
| Need to get 825kB of source archives.
| Get:1 http://sinclair.farm.ftbfs.de experimental/main xcb-util 0.3.1-1 (dsc) 
[1654B]
| Get:2 http://sinclair.farm.ftbfs.de experimental/main xcb-util 0.3.1-1 (tar) 
[417kB]
| Get:3 http://sinclair.farm.ftbfs.de experimental/main xcb-util 0.3.1-1 (diff) 
[406kB]
| Fetched 825kB in 0s (1063kB/s)
| Download complete and in download only mode
| ** Using build dependencies supplied by package:
| Build-Depends: cdbs, debhelper (>= 5), autotools-dev, libxcb-render0-dev, 
libxcb1-dev, gperf, pkg-config, libxcb-shm0-dev, m4, autoconf, automake, 
libtool, x11proto-core-dev (>= 7.0.12)
| Checking for already installed source dependencies...
[...]
| ./autogen.sh --build=hppa-linux-gnu --prefix=/usr 
--includedir="\${prefix}/include" --mandir="\${prefix}/share/man" 
--infodir="\${prefix}/share/info" --sysconfdir=/etc --localstatedir=/var 
--libexecdir="\${prefix}/lib/xcb-util" --disable-maintainer-mode 
--disable-dependency-tracking --srcdir=.
| /bin/sh: ./autogen.sh: Permission denied
| make: *** [configure-stamp] Error 126
| dpkg-buildpackage: failure: debian/rules build gave error exit status 2
| **
| Build finished at 20081121-0252
| FAILED [dpkg-buildpackage died]

Full build log(s): 
http://experimental.ftbfs.de/build.php?&ver=0.3.1-1&pkg=xcb-util&arch=hppa

Gruesse,
-- 
Frank Lichtenheld <[EMAIL PROTECTED]>
www: http://www.djpig.de/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506323: #506323

2008-11-20 Thread Werner Opriel
Am Donnerstag, 20. November 2008 16:20 schrieb Bastian Blank:
> severity 506323 important
> thanks
>
> First, make sure you have the last version installed, this is 2.6.26-10.
> Second, make sure you have the latest firmware installed, both for the
> machine and the raid controller.
Ok, we've updated to 2.6.26-10 and will give it a try.
Firmware for all components had been checked and updated.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504894: [Pkg-nagios-devel] Bug#504894: SA32610: Nagios "cmd.cgi" Cross-Site Request Forgery

2008-11-20 Thread Alexander Wirt
Raphael Geissert schrieb am Thursday, den 20. November 2008:

> retitle 504894 CVE-2008-5028: Nagios "cmd.cgi" cross-site request forgery
> thanks
> 
> 2008/11/7 Raphael Geissert <[EMAIL PROTECTED]>:
> [...]
> >
> > A proposed patch is available at [2].
> >
> > If you fix the vulnerability please also make sure to include the SA id (or
> > the CVE id when one is assigned) in the changelog entry.
> 
> This issue has been assigned the following id: CVE-2008-5028, please
> use it instead of the Secunia Advisory when fixing/referring to this
> bug.
> 
> Btw, what's the ETA?
If I don't find any new bugs in my patch: Today :). 

Alex




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#494936: firmware-bnx2: latest lenny requires manual reload of bnx2 driver

2008-11-20 Thread Brendon Baumgartner
Sorry!!!
I just realized /boot was mapped wrong!
Problem solved.




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#502761: I suggest removing the call to emacspeakconfig and add a mention in README.Debian

2008-11-20 Thread Kumar Appaiah
On Thu, Nov 20, 2008 at 09:48:55PM -0500, James R. Van Zandt wrote:
> However, I do have a problem with this one:
> 
> >  * Use Christian Perrier's patch for stopping the call to
> >emacspeakconfig. (Closes: #502761)
> 
> The purpose of the emacspeak package is to make emacs accessible to a
> blind user.  I think configuration during installation is particularly
> important for this package.  Without configuration, the user is left
> with a broken package.  Ordinarily that would not be a serious problem
> - he only has to read the emacspeak.info documentation and edit
> /etc/emacspeak.conf, or else read the comments in README.Debian and
> run emacspeakconfig.  However, in this case we may have broken the
> tool he would use for those tasks.  With 26.0-3, he may be annoyed at
> answering configuration questions while packages are being unpacked,
> but he finishes with a working program.
> 
> The emacspeak-28.0-4 package:
>  - has all the above mentioned bugs fixed
>  - is configured using debconf
>  - has an extra year's worth of upstream development.
> 
> I would like to have emacspeak-28.0-4 and emacspeak-ss-1.12-2 unblocked.
> Failing that, I'll try to backport the debconf changes to the 26.0
> package.

Thanks for the explanation, James. I guess it's up to the release team
to decide the next course of action.

Kumar
-- 
Kumar Appaiah



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#502761: I suggest removing the call to emacspeakconfig and add a mention in README.Debian

2008-11-20 Thread James R. Van Zandt


Kumar -

Fixes for the symlink attacks (#496431) and the info file syntax
problem (#500638) are fine.

However, I do have a problem with this one:

>  * Use Christian Perrier's patch for stopping the call to
>emacspeakconfig. (Closes: #502761)

The purpose of the emacspeak package is to make emacs accessible to a
blind user.  I think configuration during installation is particularly
important for this package.  Without configuration, the user is left
with a broken package.  Ordinarily that would not be a serious problem
- he only has to read the emacspeak.info documentation and edit
/etc/emacspeak.conf, or else read the comments in README.Debian and
run emacspeakconfig.  However, in this case we may have broken the
tool he would use for those tasks.  With 26.0-3, he may be annoyed at
answering configuration questions while packages are being unpacked,
but he finishes with a working program.

The emacspeak-28.0-4 package:
 - has all the above mentioned bugs fixed
 - is configured using debconf
 - has an extra year's worth of upstream development.

I would like to have emacspeak-28.0-4 and emacspeak-ss-1.12-2 unblocked.
Failing that, I'll try to backport the debconf changes to the 26.0
package.

 - Jim Van Zandt

> Date: Wed, 19 Nov 2008 21:33:28 -0600
> From: Kumar Appaiah <[EMAIL PROTECTED]>
> Cc: Christian Perrier <[EMAIL PROTECTED]>
>
> On Wed, Nov 19, 2008 at 10:09:15PM -0500, James R. Van Zandt wrote:
> > Yes, I realize that my first package of version 28.0 missed the
> > deadline for Lenny by a few days.  The functional difference from
> > version 26.0 is not great.  (Dr. Raman just increments the version
> > number every six months.)  However, that does make it a year newer
> > than the version currently in testing.
>
> Thanks James. While you are at it, I hope you didn't mind my upload to
> testing to fix a few bugs:
>
> http://packages.qa.debian.org/e/emacspeak/news/20081112T004707Z.html
>
> Do voice your concerns if you have any, but I did check with some
> emacspeak users before actually going ahead with the uploads for the
> RC bug fixes.
>
> Thanks!
>
> Kumar
> --=20
> Kumar Appaiah



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#502140: restarting xscreensaver

2008-11-20 Thread Steve Langasek
On Thu, Nov 20, 2008 at 11:47:49PM +0100, Moritz Muehlenhoff wrote:
> On Sat, Nov 15, 2008 at 11:55:55PM -0800, Steve Langasek wrote:
> > On Wed, Oct 22, 2008 at 08:49:27AM +0200, Thomas Viehmann wrote:

> > Well, that sounds better than the current state, but a) the code for it
> > isn't written and I'm not familiar enough with xscreensaver to be confident
> > of getting it right on the first try myself, b) we have to cover more than
> > just xscreensaver (xlockmore is also affected AIUI), c) I'm not sure if
> > peeking in /proc is going to work if the user has SELinux turned on.

> > It also seems to introduce a race condition where the display is unlocked
> > and vulnerable to attack during the upgrade, which I'd prefer not to have
> > pam itself be responsible for.  I think advising the user to disable the
> > screensaver for the duration of the upgrade is a choice I'd be more
> > comfortable with, rather than forcibly restarting the screensaver.

> I've filed a bug against release-notes which such an advise (bug number
> not yet available). 

> | During the upgrade of the Pluggable Authentication Modules system, the
> | authentication modes need to be restarted. Some services used for locking
> | a user session cannot be restarted, e.g. xscreensaver, gnome-screensaver
> | or xlockmore. It is recommended to stop them before starting the update.

> So we can downgrade this to something not-RC.

The release managers can override of course, but I disagree.  I think it's
important that this be documented in-line when you perform the upgrade
itself; I'm working on updating libpam0g to do that.

I've mostly been delayed because libpam0g is the wrong place for this
question - it belongs to libpam-modules, but libpam-modules would need to
ask in the package preinst and is a transitively-essential package, so I'm
trying to make sure I get the semantics right here before uploading
anything.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
Ubuntu Developerhttp://www.debian.org/
[EMAIL PROTECTED] [EMAIL PROTECTED]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506179: marked as done (no-ip: remote code execution vulnerability)

2008-11-20 Thread Debian Bug Tracking System

Your message dated Fri, 21 Nov 2008 01:47:03 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#506179: fixed in no-ip 2.1.7-11
has caused the Debian Bug report #506179,
regarding no-ip: remote code execution vulnerability
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
506179: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506179
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Source: no-ip
Severity: grave
Version: 2.1.1-4
Tags: security

Hi,

An exploit[1] has been published for the no-ip DUC.

At the moment there's no much other information than the one provided in the 
exploit, which I can summarise as:

The exploit relies on DNS poisoning or man in the middle attacks to fake the 
server's response.
Once this has been done the exploit waits for an IP check, to then prepare the 
shellcode to send which is requires the knowledge of the memory offset of the 
buffer which must of course be static and determined for each build. 
After the client receives a faked IP to force a update the exploit delivers 
the shellcode, which is executed because of a buffer overflow when processing 
the server's response.

If you fix the vulnerability please also make sure to include the CVE id when 
one is assigned in the changelog entry.

[1]http://www.milw0rm.com/exploits/7151

Cheers,
-- 
Raphael Geissert - Debian Maintainer
www.debian.org - get.debian.net


signature.asc
Description: This is a digitally signed message part.
--- End Message ---
--- Begin Message ---
Source: no-ip
Source-Version: 2.1.7-11

We believe that the bug you reported is fixed in the latest version of
no-ip, which is due to be installed in the Debian FTP archive:

no-ip_2.1.7-11.diff.gz
  to pool/main/n/no-ip/no-ip_2.1.7-11.diff.gz
no-ip_2.1.7-11.dsc
  to pool/main/n/no-ip/no-ip_2.1.7-11.dsc
noip2_2.1.7-11_i386.deb
  to pool/main/n/no-ip/noip2_2.1.7-11_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andres Mejia <[EMAIL PROTECTED]> (supplier of updated no-ip package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 20 Nov 2008 19:25:31 -0500
Source: no-ip
Binary: noip2
Architecture: source i386
Version: 2.1.7-11
Distribution: unstable
Urgency: high
Maintainer: Otavio Salvador <[EMAIL PROTECTED]>
Changed-By: Andres Mejia <[EMAIL PROTECTED]>
Description: 
 noip2  - client for dynamic DNS service
Closes: 506179
Changes: 
 no-ip (2.1.7-11) unstable; urgency=high
 .
   [ Avi Rozen ]
   * Fixed grave bug: remote code execution vulnerability. (Closes: #506179)
Checksums-Sha1: 
 e5638fbd316614435c4292668b44a5d9faa0e479 1203 no-ip_2.1.7-11.dsc
 850c0be4085e780227d3fb9058b5f4791b9ffd95 20579 no-ip_2.1.7-11.diff.gz
 cd1cab0704ade07afd75688d7170f9cb300f0156 74284 noip2_2.1.7-11_i386.deb
Checksums-Sha256: 
 a9495f5b9d10421b0f554eee4396774cdfa79eaafdffd15d53c4ab39cb2d4cb3 1203 
no-ip_2.1.7-11.dsc
 1714618c7a096e83b43df6d6f126705fa411a93b6adf5e2926445b3c8e712eb1 20579 
no-ip_2.1.7-11.diff.gz
 0150ca40510dea4cf6a5a484ef51774d040da098f857ad5554360d1ac5f8bf7b 74284 
noip2_2.1.7-11_i386.deb
Files: 
 2ec242cee97ce90ce47d96ac13d99208 1203 net optional no-ip_2.1.7-11.dsc
 6a276b86a434503feaaed058d4c3afd9 20579 net optional no-ip_2.1.7-11.diff.gz
 517fb1245e07e3acb120ba96d148d46b 74284 net optional noip2_2.1.7-11_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkmEa0ACgkQgsFbAuXxMZa0uwCfV5SMR2nhArMLjNEgsYX48K4u
2moAoKL+z+kI8SsM8vi0XbD3oA27iijI
=OBs0
-END PGP SIGNATURE-


--- End Message ---


Bug#506179: Fwd: Bug#506179: no-ip: remote code execution vulnerability

2008-11-20 Thread Andres Mejia
I'll upload to unstable. Will someone be handling the upload to stable?

-- 
Regards,
Andres


signature.asc
Description: This is a digitally signed message part.


Bug#504894: SA32610: Nagios "cmd.cgi" Cross-Site Request Forgery

2008-11-20 Thread Raphael Geissert
retitle 504894 CVE-2008-5028: Nagios "cmd.cgi" cross-site request forgery
thanks

2008/11/7 Raphael Geissert <[EMAIL PROTECTED]>:
[...]
>
> A proposed patch is available at [2].
>
> If you fix the vulnerability please also make sure to include the SA id (or
> the CVE id when one is assigned) in the changelog entry.

This issue has been assigned the following id: CVE-2008-5028, please
use it instead of the Secunia Advisory when fixing/referring to this
bug.

Btw, what's the ETA?

>
> [1]http://secunia.com/Advisories/32610/
> [2]http://git.op5.org/git/?p=nagios.git;a=commit;h=814d8d4d1a73f7151eeed187c0667585d79fea18
>
> Cheers,

Cheers,
-- 
Raphael Geissert - Debian Maintainer
www.debian.org - get.debian.net

Alfred Hitchcock  - "Television has brought back murder into the home
- where it belongs."



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: SA32610: Nagios "cmd.cgi" Cross-Site Request Forgery

2008-11-20 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> retitle 504894 CVE-2008-5028: Nagios "cmd.cgi" cross-site request forgery
Bug#504894: SA32610: Nagios "cmd.cgi" Cross-Site Request Forgery
Changed Bug title to `CVE-2008-5028: Nagios "cmd.cgi" cross-site request 
forgery' from `SA32610: Nagios "cmd.cgi" Cross-Site Request Forgery'.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506258: dpkg doesn't handle symlinks to directories as directory

2008-11-20 Thread Guillem Jover
Hi,

On Thu, 2008-11-20 at 13:02:54 +0100, Carl Fürstenberg wrote:
> Thanks for the information Guillem, though I'm wonder if this fix is
> going to be applied to etch as well, or will I need to apply the fix
> my self locally?

As discussed on IRC, I'll be contacting the stable release team and ask
if an update for etch for this would be fine with them.

regards,
guillem



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506377: CVE-2008-4829: Streamripper multiple buffer overflow vulnerabilities

2008-11-20 Thread Raphael Geissert
Package: streamripper
Version: 1.63.5-1
Severity: grave
Tags: security patch

Hi,

The following CVE (Common Vulnerabilities & Exposures) id was published for 
streamripper.

CVE-2008-4829/SA32562[1]:
> Secunia Research has discovered some vulnerabilities in Streamripper, which
> can be exploited by malicious people to compromise a user's system.
>
> 1) A boundary error exists within the function "http_parse_sc_header()" in
> lib/http.c when parsing an overly long HTTP header starting with
> "Zwitterion v".
>
> 2) A boundary error exists within the function "http_get_pls()" in
> lib/http.c when parsing a specially crafted pls playlist containing an
> overly long entry.
>
> 3) A boundary error exists within the function "http_get_m3u()" in
> lib/http.c when parsing a specially crafted m3u playlist containing an
> overly long "File" entry.
>
> Successful exploitation allows the execution of arbitrary code, but
> requires that a user is tricked into connecting to a malicious server.
>
> The vulnerabilities are confirmed in version 1.63.5. Other versions may
> also be affected.

The patch by upstream to fix the vulnerabilities can be found at [2].

It would be great if you could verify whether the version in etch is also 
affected.

If you fix the vulnerability please also make sure to include the CVE id in 
the changelog entry.

[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4829
     http://security-tracker.debian.net/tracker/CVE-2008-4829
 http://secunia.com/Advisories/32562/
[2]http://streamripper.cvs.sourceforge.net/viewvc/streamripper/sripper_1x/lib/http.c?view=patch&r1=1.50&r2=1.51&pathrev=sripper-1_64_0

Cheers,
-- 
Raphael Geissert - Debian Maintainer
www.debian.org - get.debian.net


signature.asc
Description: This is a digitally signed message part.


Bug#506376: does not honour changes to /etc/default/watchdog

2008-11-20 Thread martin f krafft
Package: watchdog
Version: 5.4-9
Severity: serious

On upgrades, the package overwrites /etc/default/watchdog with
values from debconf without initialising them in postinst. The
effect is that changes to /etc/default/watchdog get overwritten.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-1-amd64 (SMP w/1 CPU core)
Locale: LANG=en_GB, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages watchdog depends on:
ii  debconf [debconf-2.0] 1.5.24 Debian configuration management sy
ii  libc6 2.7-16 GNU C Library: Shared libraries
ii  makedev   2.3.1-88   creates device files in /dev
ii  udev  0.125-7/dev/ and hotplug management daemo

watchdog recommends no packages.

watchdog suggests no packages.

-- debconf-show failed


-- 
 .''`.   martin f. krafft <[EMAIL PROTECTED]>
: :'  :  proud Debian developer, author, administrator, and user
`. `'`   http://people.debian.org/~madduck - http://debiansystem.info
  `-  Debian - when you have better things to do than fixing systems


digital_signature_gpg.asc
Description: Digital signature (see http://martin-krafft.net/gpg/)


Bug#506354: lvm2: system fails to boot after upgrade

2008-11-20 Thread Eugeniy Meshcheryakov
21 листопада 2008 о 00:45 +0100 Bastian Blank написав(-ла):
> On Fri, Nov 21, 2008 at 12:21:43AM +0100, Eugeniy Meshcheryakov wrote:
> > 21 листопада 2008 о 00:09 +0100 Bastian Blank написав(-ла):
> > > You have /var/lock on a different filesystem than /?
> > Yes, /var is on an LV.
> > > Seems that it needs to use /lib/init/rw.
> 
> Can you please change the locking_dir setting in /etc/lvm/lvm.conf to
> /lib/init/rw?
I did. It fixed the problem.

Thanks,
Eugeniy Meshcheryakov


signature.asc
Description: Digital signature


Bug#506261: marked as done (enscript: Buffer overflows)

2008-11-20 Thread Debian Bug Tracking System

Your message dated Thu, 20 Nov 2008 23:32:04 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#506261: fixed in enscript 1.6.4-13
has caused the Debian Bug report #506261,
regarding enscript: Buffer overflows
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
506261: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506261
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: enscript
Version: 1.6.4-12
Severity: grave
Tags: security
Justification: user security hole

Hi, 
buffer overflows have been discovered in enscript:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3863
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4306

I'm attaching a patch by Werner Fink of SuSE covering these
issues.

Cheers,
Moritz

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core)
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash

Versions of packages enscript depends on:
ii  libc62.7-15  GNU C Library: Shared libraries
ii  libpaper11.1.23+nmu1 library for handling paper charact

enscript recommends no packages.

Versions of packages enscript suggests:
ii  ghostscript [postscript- 8.62.dfsg.1-3.1 The GPL Ghostscript PostScript/PDF
ii  lpr  1:2008.05.17BSD lpr/lpd line printer spooling 

-- no debconf information
--- src/psgen.c
+++ src/psgen.c	2008-10-29 10:43:08.512598143 +0100
@@ -24,6 +24,7 @@
  * Boston, MA 02111-1307, USA.
  */
 
+#include 
 #include "gsint.h"
 
 /*
@@ -124,7 +125,7 @@ struct gs_token_st
 	  double xscale;
 	  double yscale;
 	  int llx, lly, urx, ury; /* Bounding box. */
-	  char filename[512];
+	  char filename[PATH_MAX];
 	  char *skipbuf;
 	  unsigned int skipbuf_len;
 	  unsigned int skipbuf_pos;
@@ -135,11 +136,11 @@ struct gs_token_st
   Color bgcolor;
   struct
 	{
-	  char name[512];
+	  char name[PATH_MAX];
 	  FontPoint size;
 	  InputEncoding encoding;
 	} font;
-  char filename[512];
+  char filename[PATH_MAX];
 } u;
 };
 
@@ -248,7 +249,7 @@ static int do_print = 1;
 static int user_fontp = 0;
 
 /* The user [EMAIL PROTECTED] font. */
-static char user_font_name[256];
+static char user_font_name[PATH_MAX];
 static FontPoint user_font_pt;
 static InputEncoding user_font_encoding;
 
@@ -978,7 +979,8 @@ large for page\n"),
 			FATAL ((stderr,
 _("user font encoding can be only the system's default or `ps'")));
 
-		  strcpy (user_font_name, token.u.font.name);
+		  memset  (user_font_name, 0, sizeof(user_font_name));
+		  strncpy (user_font_name, token.u.font.name, sizeof(user_font_name) - 1);
 		  user_font_pt.w = token.u.font.size.w;
 		  user_font_pt.h = token.u.font.size.h;
 		  user_font_encoding = token.u.font.encoding;
@@ -1444,7 +1446,7 @@ read_special_escape (InputStream *is, To
 	  buf[i] = ch;
 	  if (i + 1 >= sizeof (buf))
 	FATAL ((stderr, _("too long argument for %s escape:\n%.*s"),
-		escapes[i].name, i, buf));
+		escapes[e].name, i, buf));
 	}
   buf[i] = '\0';
 
@@ -1452,7 +1454,8 @@ read_special_escape (InputStream *is, To
   switch (escapes[e].escape)
 	{
 	case ESC_FONT:
-	  strcpy (token->u.font.name, buf);
+	  memset  (token->u.font.name, 0, sizeof(token->u.font.name));
+	  strncpy (token->u.font.name, buf, sizeof(token->u.font.name) - 1);
 
 	  /* Check for the default font. */
 	  if (strcmp (token->u.font.name, "default") == 0)
@@ -1465,7 +1468,8 @@ read_special_escape (InputStream *is, To
 		FATAL ((stderr, _("malformed font spec for [EMAIL PROTECTED] escape: %s"),
 			token->u.font.name));
 
-	  strcpy (token->u.font.name, cp);
+	  memset  (token->u.font.name, 0, sizeof(token->u.font.name));
+	  strncpy (token->u.font.name, cp, sizeof(token->u.font.name) - 1);
 	  xfree (cp);
 	}
 	  token->type = tFONT;
@@ -1544,7 +1548,8 @@ read_special_escape (InputStream *is, To
 	  break;
 
 	case ESC_SETFILENAME:
-	  strcpy (token->u.filename, buf);
+	  memset  (token->u.filename, 0, sizeof(token->u.font.name));
+	  strncpy (token->u.filename, buf, sizeof(token->u.filename) - 1);
 	  token->type = tSETFILENAME;
 	  break;
 
--- End Message ---
--- Begin Message ---
Source: enscript
Source-Version: 1.6.4-13

We believe that the bug you reported is fixed in the latest version of
enscript, which is due to be installed in the Debian FTP archive:

enscript_1.6.4-13.diff.gz
  to pool/main/e/enscript/enscript_1.6.4-13

Bug#505847: marked as done (ttf-mathematica4.1: can't install, can't uninstall...)

2008-11-20 Thread Debian Bug Tracking System

Your message dated Thu, 20 Nov 2008 23:47:05 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#505847: fixed in ttf-mathematica4.1 6
has caused the Debian Bug report #505847,
regarding ttf-mathematica4.1: can't install, can't uninstall...
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
505847: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505847
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: ttf-mathematica4.1
Version: 5
Severity: grave
Justification: renders package unusable


feel free to alter priority if i labelled it too high.

/* trying to install */
>sudo http_proxy=www-proxy.cse.unsw.edu.au:3128 apt-get install 
ttf-mathematica4.1
Reading package lists... Done
Building dependency tree   
Reading state information... Done
ttf-mathematica4.1 is already the newest version.
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
1 not fully installed or removed.
After this operation, 0B of additional disk space will be used.
Setting up ttf-mathematica4.1 (5) ...
--2008-11-16 17:27:45--  
http://support.wolfram.com/mathematica/systems/windows/general/files/MathFonts_TrueType_41.exe
Resolving www-proxy.cse.unsw.edu.au... 129.94.242.38, 129.94.242.47
Connecting to www-proxy.cse.unsw.edu.au|129.94.242.38|:3128... 
connected.
Proxy request sent, awaiting response... 301 Moved Permanently
Location: http://support.wolfram.com/index.en.html [following]
--2008-11-16 17:27:46--  http://support.wolfram.com/index.en.html
Connecting to www-proxy.cse.unsw.edu.au|129.94.242.38|:3128... 
connected.
Proxy request sent, awaiting response... 200 OK
Length: unspecified [text/html]
Saving to: `./index.en.html'

[ <=>   ] 19,186  --.-K/s   in 
0.02s   

2008-11-16 17:27:46 (858 KB/s) - `./index.en.html' saved [19186]

checking MathFonts_TrueType_41.exe
Downloaded file looks corrupted!
dpkg: error processing ttf-mathematica4.1 (--configure):
 subprocess post-installation script returned error exit status 1
Errors were encountered while processing:
 ttf-mathematica4.1
E: Sub-process /usr/bin/dpkg returned an error code (1)

/* trying to remove */
>sudo apt-get remove ttf-mathematica4.1
Reading package lists... Done
Building dependency tree   
Reading state information... Done
The following packages were automatically installed and are no longer 
required:
  latex-xft-fonts xfonts-mathml
Use 'apt-get autoremove' to remove them.
The following packages will be REMOVED:
  ttf-mathematica4.1
0 upgraded, 0 newly installed, 1 to remove and 0 not upgraded.
1 not fully installed or removed.
After this operation, 111kB disk space will be freed.
Do you want to continue [Y/n]? 
(Reading database ... 223093 files and directories currently installed.)
Removing ttf-mathematica4.1 ...
W: /usr/share/fonts/truetype/mathml/math4b__.ttf: not registered.
W: /usr/share/fonts/truetype/mathml/math1b__.ttf: not registered.
W: /usr/share/fonts/truetype/mathml/math2b__.ttf: not registered.
W: /usr/share/fonts/truetype/mathml/math3b__.ttf: not registered.
W: /usr/share/fonts/truetype/mathml/math3m__.ttf: not registered.
W: /usr/share/fonts/truetype/mathml/math4mb_.ttf: not registered.
W: /usr/share/fonts/truetype/mathml/math3___.ttf: not registered.
W: /usr/share/fonts/truetype/mathml/math1___.ttf: not registered.
W: /usr/share/fonts/truetype/mathml/math2mb_.ttf: not registered.
W: /usr/share/fonts/truetype/mathml/math2m__.ttf: not registered.
W: /usr/share/fonts/truetype/mathml/math4___.ttf: not registered.
W: /usr/share/fonts/truetype/mathml/math1mb_.ttf: not registered.
W: /usr/share/fonts/truetype/mathml/math2___.ttf: not registered.
W: /usr/share/fonts/truetype/mathml/math4m__.ttf: not registered.
W: /usr/share/fonts/truetype/mathml/math3mb_.ttf: not registered.
W: /usr/share/fonts/truetype/mathml/math1m__.ttf: not registered.
dpkg: error processing ttf-mathematica4.1 (--remove):
 subprocess pre-removal script returned error exit status 1
Errors were encountered while processing:
 ttf-mathematica4.1
E: Sub-process /usr/bin/dpkg returned an error code (1)

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: powerpc (ppc)

Kernel: Linux 2.6.26-1-powerpc
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages ttf-mathematica4.1 depends on:
ii  debconf [debconf-2.0]1.5.22  Debian configuration management sy
ii  defoma   0.11.10-0.2 Debian Font Manager -- automatic f
ii  unzip5.5

Bug#506354: lvm2: system fails to boot after upgrade

2008-11-20 Thread Bastian Blank
On Fri, Nov 21, 2008 at 12:21:43AM +0100, Eugeniy Meshcheryakov wrote:
> 21 листопада 2008 о 00:09 +0100 Bastian Blank написав(-ла):
> > You have /var/lock on a different filesystem than /?
> Yes, /var is on an LV.
> > Seems that it needs to use /lib/init/rw.

Can you please change the locking_dir setting in /etc/lvm/lvm.conf to
/lib/init/rw?

Bastian

-- 
The man on tops walks a lonely street; the "chain" of command is often a noose.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505847: How to remove package?

2008-11-20 Thread Atsuhito Kohda
On Thu, 20 Nov 2008 12:28:51 -0500, Peter Jay Salzman <[EMAIL PROTECTED]> wrote:

> How can this package be removed?  Dpkg won't let me uninstall it due to
> unregistered fonts.

Hi Peter,

I just uploaded the new version and I believe you can remove
the new package.

Please update first and remove it.

Regards,2008-11-21(Fri)

-- 
 Debian Developer - much more I18N of Debian
 Atsuhito Kohda 
 Department of Math., Univ. of Tokushima



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506373: complement on the subject line & body

2008-11-20 Thread Cyrille Chépélov
retitle 506373 Evolution recklessy ignores the charset on text/html
email fragments and causes glib's death by ana-utf8-phylactic shock
thanks

Although the subject line is (correclty) encoded in windows-1252 and
appears to contain the offending string, it does not appear to be the
cause of trouble. 

The offending string can be found in the scrap of html sent by Google as
the first MIME part of the message body; quoting  the bit:


[EMAIL PROTECTED],
vous êtes invité(e) à participer à
Concert Paris-Novembre (Réxx
Vé)


(here, gedit did automatically convert that from ISO-8859-15 to UTF-8,
hence none of the diacritics appear mutilated. hexdumping the MIME bit
does confirm the ISO-8859-15 encoding:

01c0  20 73 74 79 6c 65 3d 22  6d 61 72 67 69 6e 3a 30  |
style="margin:0|
01d0  3b 63 6f 6c 6f 72 3a 23  30 22 3e 63 79 72 69 6c
|;color:#0">cyril|
01e0  6c 65 40 63 68 65 70 65  6c 6f 76 2e 6f 72 67 2c  |
[EMAIL PROTECTED],|
01f0  0a 76 6f 75 73 20 ea 74  65 73 20 69 6e 76 69 74  |.vous .tes
invit|
0200  e9 28 65 29 20 e0 20 70  61 72 74 69 63 69 70 65  |.(e) .
participe|
0210  72 20 e0 3c 2f 70 3e 0a  3c 68 32 20 73 74 79 6c  |r ..Conce|
0260  72 74 20 50 61 72 69 73  2d 4e 6f 76 65 6d 62 72  |rt
Paris-Novembr|
0270  65 20 28 52 e9 78 78 20  56 79 79 79 79 e9 29 3c  |e (R.xx
V.)<|

Inspecting the raw RFC-2822 message, it appears that the bit of HTML
does have content-type Content-Type: text/html; charset=windows-1252.
While I regret that Google did not include redundant metadata within the
text/html bit, there not only there was proper warning that utf-8 this
was not, but also the default encoding was set to be 8859-15. Therefore,
what happened is that Evolution failed to properly convert this fragment
into proper UTF-8 before handing it over to glib (and in any case, it
definitely should have bleached it to not provide an invalid UTF-8
fragment down the HTML renderer). Assigning the blame on Evolution for
sure.

I will gladly provide the raw RFC-2822 offending message, but on a
non-disclosure basis.

Thanks in advance.

-- Cyrille



Processed (with 1 errors): complement on the subject line & body

2008-11-20 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> retitle 506373 Evolution recklessy ignores the charset on text/html
Bug#506373: evolution email crashes when receiving a specific invitation from 
Google Calendar
Changed Bug title to `Evolution recklessy ignores the charset on text/html' 
from `evolution email crashes when receiving a specific invitation from Google 
Calendar'.

> email fragments and causes glib's death by ana-utf8-phylactic shock
Unknown command or malformed arguments to command.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506264: closed by Daniel Baumann <[EMAIL PROTECTED]> (Bug#506264: fixed in gnunet 0.8.0b-4)

2008-11-20 Thread scottcm
Just FYI,

After the most recent attempt to run gnunet-update, I resorted to killing the 
controlling shell (su'd) reverting to another 
shell.  I have come back to this tty some 24 hrs later to find 'Starting 
datastore conversion (this may take a while).' 
followed by 'Completed datastore conversion.'  The freeze being temporary but 
-at-least- 30 minutes in duration before even 
the first message being displayed (ie. starting message).

I will try the update now.


Regards,


On Thu, Nov 20, 2008 at 09:38:38PM +, Debian Bug Tracking System wrote:
> 
> This is an automatic notification regarding your Bug report
> which was filed against the gnunet-server package:
> 
> #506264: gnunet-server: freeze in gnunet-update
> 
> It has been closed by Daniel Baumann <[EMAIL PROTECTED]>.
> 
> Their explanation is attached below along with your original report.
> If this explanation is unsatisfactory and you have not received a
> better one in a separate message then please contact Daniel Baumann <[EMAIL 
> PROTECTED]> by
> replying to this email.
> 
> 
> -- 
> 506264: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506264
> Debian Bug Tracking System
> Contact [EMAIL PROTECTED] with problems

> X-Spam-Checker-Version: SpamAssassin 3.2.3-bugs.debian.org_2005_01_02
>   (2007-08-08) on rietz.debian.org
> X-Spam-Level: 
> X-Spam-Bayes: score:0. Tokens: new, 86; hammy, 151; neutral, 131; spammy,
>   0. spammytokens: hammytokens:0.000-+--HX-Debian:DAK,
>   [EMAIL PROTECTED], 0.000-+--H*RU:128.148.34.103,
>   0.000-+--UD:diff.gz, 0.000-+--H*rp:D*ries.debian.org
> X-Spam-Status: No, score=-13.9 required=4.0 tests=AWL,BAYES_00,FROMDEVELOPER,
>   FVGT_m_MULTI_ODD,HAS_BUG_NUMBER,HEADER_X_KATIE,IMPRONONCABLE_1,
>   IMPRONONCABLE_2,MURPHY_WRONG_WORD1,MURPHY_WRONG_WORD2,PGPSIGNATURE
>   autolearn=ham version=3.2.3-bugs.debian.org_2005_01_02
> From: Daniel Baumann <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
> X-DAK: dak process-unchecked
> X-Katie: $Revision: 1.65 $
> X-Debian: DAK
> X-Debian-Package: gnunet
> Subject: Bug#506264: fixed in gnunet 0.8.0b-4
> Date: Thu, 20 Nov 2008 21:02:09 +
> 
> Source: gnunet
> Source-Version: 0.8.0b-4
> 
> We believe that the bug you reported is fixed in the latest version of
> gnunet, which is due to be installed in the Debian FTP archive:
> 
> gnunet-client_0.8.0b-4_i386.deb
>   to pool/main/g/gnunet/gnunet-client_0.8.0b-4_i386.deb
> gnunet-common_0.8.0b-4_i386.deb
>   to pool/main/g/gnunet/gnunet-common_0.8.0b-4_i386.deb
> gnunet-dbg_0.8.0b-4_i386.deb
>   to pool/main/g/gnunet/gnunet-dbg_0.8.0b-4_i386.deb
> gnunet-dev_0.8.0b-4_i386.deb
>   to pool/main/g/gnunet/gnunet-dev_0.8.0b-4_i386.deb
> gnunet-server_0.8.0b-4_i386.deb
>   to pool/main/g/gnunet/gnunet-server_0.8.0b-4_i386.deb
> gnunet-tools_0.8.0b-4_i386.deb
>   to pool/main/g/gnunet/gnunet-tools_0.8.0b-4_i386.deb
> gnunet_0.8.0b-4.diff.gz
>   to pool/main/g/gnunet/gnunet_0.8.0b-4.diff.gz
> gnunet_0.8.0b-4.dsc
>   to pool/main/g/gnunet/gnunet_0.8.0b-4.dsc
> gnunet_0.8.0b-4_all.deb
>   to pool/main/g/gnunet/gnunet_0.8.0b-4_all.deb
> 
> 
> 
> A summary of the changes between this version and the previous one is
> attached.
> 
> Thank you for reporting the bug, which will now be closed.  If you
> have further comments please address them to [EMAIL PROTECTED],
> and the maintainer will reopen the bug report if appropriate.
> 
> Debian distribution maintenance software
> pp.
> Daniel Baumann <[EMAIL PROTECTED]> (supplier of updated gnunet package)
> 
> (This message was generated automatically at their request; if you
> believe that there is a problem with it please contact the archive
> administrators by mailing [EMAIL PROTECTED])
> 
> 
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> Format: 1.8
> Date: Thu, 20 Nov 2008 07:16:00 +0100
> Source: gnunet
> Binary: gnunet gnunet-client gnunet-common gnunet-dbg gnunet-server 
> gnunet-dev gnunet-tools
> Architecture: source all i386
> Version: 0.8.0b-4
> Distribution: unstable
> Urgency: low
> Maintainer: Daniel Baumann <[EMAIL PROTECTED]>
> Changed-By: Daniel Baumann <[EMAIL PROTECTED]>
> Description: 
>  gnunet - secure, trust-based peer-to-peer framework (meta)
>  gnunet-client - secure, trust-based peer-to-peer framework (client)
>  gnunet-common - secure, trust-based peer-to-peer framework (common)
>  gnunet-dbg - secure, trust-based peer-to-peer framework (debug)
>  gnunet-dev - secure, trust-based peer-to-peer framework (development)
>  gnunet-server - secure, trust-based peer-to-peer framework (server)
>  gnunet-tools - secure, trust-based peer-to-peer framework (tools)
> Closes: 506264
> Changes: 
>  gnunet (0.8.0b-4) unstable; urgency=low
>  .
>* Removing config.guess and config.sub in clean target of rules.
>* Adding db_stop call in gnunet-server.postinst to properly stop
>  debconf interactions.
>* Replacing obsolete dh_clean -k with dh_prep.
>* Adding '|| true' to gnunet-update call, this way a hanging gnunet-
> 

Bug#506354: lvm2: system fails to boot after upgrade

2008-11-20 Thread Eugeniy Meshcheryakov
21 листопада 2008 о 00:09 +0100 Bastian Blank написав(-ла):
> You have /var/lock on a different filesystem than /?
> 
Yes, /var is on an LV.

> Seems that it needs to use /lib/init/rw.


signature.asc
Description: Digital signature


Bug#506261: enscript: Buffer overflows

2008-11-20 Thread Tim Retout
On Wed, 2008-11-19 at 23:29 +0100, Moritz Muehlenhoff wrote:
> Package: enscript
> Version: 1.6.4-12
> Severity: grave
> Tags: security
> Justification: user security hole
> 
> Hi, 
> buffer overflows have been discovered in enscript:
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3863
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4306
> 
> I'm attaching a patch by Werner Fink of SuSE covering these
> issues.

Right, lamby is sponsoring this for me. I added the CVE numbers to the
changelog entry and the patch header.

Would you like a package for stable-security?

-- 
Tim Retout <[EMAIL PROTECTED]>




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506373: evolution email crashes when receiving a specific invitation from Google Calendar

2008-11-20 Thread Cyrille Chépélov
Package: evolution
Version: 2.22.3.1-1
Severity: grave
Justification: security; strangers might DoS evolution causing a crash upon 
startup until other mail piles up.


When receiving a specific e-mail message containing a Google Calendar
invitation, Evolution crashes. It then crashes again at boot, when trying
again to display the last received (same) message.

The default character set might be set to either UTF-8 or ISO-8859-15; it is
unknown at this point whether the Google Calendar invite is exactly
well-formatted with respect to character encoding. What is known is that the
second-to-last character of the subject is a "lowercase eacute" (U+00E9) and
that there is also another such character in the middle of the subject
string.  From looking at the way the stack trace from gdb ends up into an
UTF-8 aware gnome-terminal, it seems some mojibake issue might be at play.
libglib2.0-0 is the place of crash, for sure, but evolution (camel) proper
might as well be charged with insufficient disinfection of incoming remote 
data (a definitive security risk)

I'll attach the stack trace here, very slightly edited to remove private
data (overstriking only ASCII characters with other ASCII characters)

-- Cyrille

-- stack dump

#0  0x7f0c55b6ae30 in IA__g_markup_escape_text (
text=0x4887000 , length=76050432)
at /build/buildd/glib2.0-2.16.6/glib/gmarkup.c:1952
#1  0x7f0c55b6c198 in IA__g_markup_vprintf_escaped (
format=, args=)
at /build/buildd/glib2.0-2.16.6/glib/gmarkup.c:2272
#2  0x7f0c55b6c2fd in IA__g_markup_printf_escaped (
format=0x4564aa0 "\020p9C\f\177")
at /build/buildd/glib2.0-2.16.6/glib/gmarkup.c:2329
#3  0x7f0c4af7aa39 in itip_view_set_summary (view=, 
summary=0x4557d80 "Concert Paris-Novembre (R�xx V�)")

^^^ ^^^ ^ ^  ^^
(note the "unknown character" boxes here, should be
 U+00E9 instead.)

at itip-view.c:597

#4  0x7f0c4af73cdb in format_itip_object (efh=0x1dfe1c0, 
eb=0x7f0c3d4ba6e0, pobject=) at
#itip-formatter.c:2017
#5  0x7f0c4fa4218f in efh_object_requested (html=, 
eb=0x7f0c3d4ba6e0, efh=0x1dfe1c0) at em-format-html.c:625
#6  0x7f0c5bcca058 in html_g_cclosure_marshal_BOOLEAN__OBJECT (
closure=0x3d72780, return_value=0x7fff68ee8910, 
n_param_values=, param_values=0x7fff68ee8710, 
invocation_hint=, marshal_data=0x7f0c4fa42140)
at htmlmarshal.c:83
#7  0x7f0c56001e9d in IA__g_closure_invoke (closure=0x3d72780, 
return_value=0x7fff68ee8910, n_param_values=2, 
param_values=0x7fff68ee8710, invocation_hint=0x7fff68ee8610)
at /build/buildd/glib2.0-2.16.6/gobject/gclosure.c:490
#8  0x7f0c56014bfd in signal_emit_unlocked_R (node=0x3cb3040, detail=0, 
instance=0x3cd87e0, emission_return=0x7fff68ee8910, 
instance_and_params=0x7fff68ee8710)
at /build/buildd/glib2.0-2.16.6/gobject/gsignal.c:2440
#9  0x7f0c56015f71 in IA__g_signal_emit_valist (instance=0x3cd87e0, 
signal_id=, detail=0, var_args=0x7fff68ee8970)
at /build/buildd/glib2.0-2.16.6/gobject/gsignal.c:2209
#10 0x7f0c560165f3 in IA__g_signal_emit (instance=0x4564aa0,
#signal_id=1, 
detail=3351806) at /build/buildd/glib2.0-2.16.6/gobject/gsignal.c:2243
#11 0x7f0c5bc8ab1e in html_engine_object_requested_cb (
engine=, eb=0x7f0c3d4ba6e0, data=0x3cd87e0)
at gtkhtml.c:542
#12 0x7f0c5bcca058 in html_g_cclosure_marshal_BOOLEAN__OBJECT (
closure=0x3d74e40, return_value=0x7fff68ee8ef0, 
n_param_values=, param_values=0x7fff68ee8cf0, 
invocation_hint=, marshal_data=0x7f0c5bc8aad0)
at htmlmarshal.c:83
#13 0x7f0c56001e9d in IA__g_closure_invoke (closure=0x3d74e40, 
return_value=0x7fff68ee8ef0, n_param_values=2, 
param_values=0x7fff68ee8cf0, invocation_hint=0x7fff68ee8bf0)
at /build/buildd/glib2.0-2.16.6/gobject/gclosure.c:490
#14 0x7f0c56014bfd in signal_emit_unlocked_R (node=0x3d67470, detail=0, 
instance=0x3d8c080, emission_return=0x7fff68ee8ef0, 
instance_and_params=0x7fff68ee8cf0)
at /build/buildd/glib2.0-2.16.6/gobject/gsignal.c:2440
#15 0x7f0c56015f71 in IA__g_signal_emit_valist (instance=0x3d8c080, 
signal_id=, detail=0, var_args=0x7fff68ee8f50)
at /build/buildd/glib2.0-2.16.6/gobject/gsignal.c:2209
#16 0x7f0c560165f3 in IA__g_signal_emit (instance=0x4564aa0,
#signal_id=1, 
detail=3351806) at /build/buildd/glib2.0-2.16.6/gobject/gsignal.c:2243
#17 0x7f0c5bcbabdf in element_parse_object (e=0x3d8c080, clue=0x454e070, 
attr=) at htmlengine.c:1531
#18 0x7f0c5bcb8f50 in parse_one_token (e=0x3d8c080, clue=0x454e070, 
str=0x45462b7 "object
#classid=\"itip:///.0x201f450.91052.mixed.0.alternative.2\">") at
htmlengine.c:3749
#19 0x7f0c5bcc08ee in html_engine_timer_event (e=0x3d8c080)
at htmlengine.c:1347
#20 0x7f0c5bcc0978 in html_engine_flush (e=0x3d8c080) at
htmlengine.c:6521
#21 0x7f0c4fa493b9 in emhs_sync_flus

Bug#506354: lvm2: system fails to boot after upgrade

2008-11-20 Thread Bastian Blank
On Thu, Nov 20, 2008 at 10:20:11PM +0100, Євгеній Мещеряков wrote:
> My system fails to boot after upgrade to 2.02.39-3. During boot
> there is error message from lvm2:
> Locking type 1 initialisation failed

You have /var/lock on a different filesystem than /?

Seems that it needs to use /lib/init/rw.

Bastian

-- 
Immortality consists largely of boredom.
-- Zefrem Cochrane, "Metamorphosis", stardate 3219.8



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505565: Mozilla SeaMonkey Multiple Vulnerabilities

2008-11-20 Thread Moritz Muehlenhoff
On Thu, Nov 13, 2008 at 04:13:46PM +0100, Giuseppe Iuculano wrote:
> Package: iceape
> Severity: critical
> Tags: security

Iceape still badly needs someone who's willing to care of security
updates for iceape during Lenny life time and has the time to do
so, as described in my mail to debian-devel from the 4th October:

| From: Moritz Muehlenhoff <[EMAIL PROTECTED]>
| Newsgroups: gmane.linux.debian.devel.general
| Subject: Volunteer needed for Iceape security updates in Lenny
|
| A volunteer is needed to build and test the Iceape security updates
| in Lenny. Patches are provided through a patch set for each update
| round, but the Security Team and the Mozilla maintainers lack the
| ressources for the proper integration work. So if you use Iceape
| and want to continue to use it in Lenny please step forward and
| mail [EMAIL PROTECTED] and keep
| [EMAIL PROTECTED] CCed.

The other option (throwing it out) will be difficult, since 17 packages
build-depend on iceape-dev nowadays.

Cheers,
Moritz



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#502140: restarting xscreensaver

2008-11-20 Thread Moritz Muehlenhoff
On Sat, Nov 15, 2008 at 11:55:55PM -0800, Steve Langasek wrote:
> On Wed, Oct 22, 2008 at 08:49:27AM +0200, Thomas Viehmann wrote:
> 
> > probably I'm just dense, but why would (the admittedly gross hack) of
> > looking at /proc/$XSCREENSAVER-PID/environ (for DISPLAY and XAUTHORITY),
> > getting uid for that process, trying xscreensaver-command -exit, if the
> > screensaver exited, start xscreensaver again with that uid and environ,
> > otherwise (it will have been locked) killing the xscreensaver, starting
> > xscreensaver, doing xscreensaver-command -lock not do the trick better
> > than the current state?
> 
> Well, that sounds better than the current state, but a) the code for it
> isn't written and I'm not familiar enough with xscreensaver to be confident
> of getting it right on the first try myself, b) we have to cover more than
> just xscreensaver (xlockmore is also affected AIUI), c) I'm not sure if
> peeking in /proc is going to work if the user has SELinux turned on.
> 
> It also seems to introduce a race condition where the display is unlocked
> and vulnerable to attack during the upgrade, which I'd prefer not to have
> pam itself be responsible for.  I think advising the user to disable the
> screensaver for the duration of the upgrade is a choice I'd be more
> comfortable with, rather than forcibly restarting the screensaver.

I've filed a bug against release-notes which such an advise (bug number
not yet available). 

| During the upgrade of the Pluggable Authentication Modules system, the
| authentication modes need to be restarted. Some services used for locking
| a user session cannot be restarted, e.g. xscreensaver, gnome-screensaver
| or xlockmore. It is recommended to stop them before starting the update.

So we can downgrade this to something not-RC.

Cheers,
Moritz



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#496411: Closing

2008-11-20 Thread Moritz Muehlenhoff
On Thu, Nov 06, 2008 at 09:33:54AM +0100, Jiří Paleček wrote:
> Version: 20081031+dfsg-1
> 
> Hello,
> 
> I've attempted to close the bug, but have written malformed closing  
> statement in the changelog. Therefore, I'm closing it manually.

Jiri, I saw that you've adopted LTP and prepared new packages for
experimental after it was orphaned. Thanks for that.

I'm wondering if the current LTP in Lenny is really useful, since
it's totally outdated. Shouldn't we just drop it from Lenny and
start fresh with your new packages in Squeeze, the next Debian
release?

Cheers,
Moritz



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506268: CVE-2008-5160: allows remote attackers to cause a denial of service (daemon crash) via multiple invalid requests

2008-11-20 Thread Moritz Muehlenhoff
On Thu, Nov 20, 2008 at 01:57:54PM -0600, Raphael Geissert wrote:
> Hi,
> 
> 2008/11/20 Nico Golde <[EMAIL PROTECTED]>:
> > Hi,
> > * Raphael Geissert <[EMAIL PROTECTED]> [2008-11-20 09:32]:
> >> The following CVE (Common Vulnerabilities & Exposures) id was published for
> >> msp-webserver.
> >>
> >> CVE-2008-5160[1]:
> >  [...]
> >
> > Did you manage to reproduce that? Not reproducible for me
> > with the unstable version.
> 
> No, I didn't have time to setup the server and attempt to reproduce it.
> But I did check the changelog and the patches being applied and found
> nothing relevant that could "fix" or prevent the issue.
> 
> I have just tried to reproduce it and I succeeded.
> 
> I made four fruitful attempts:
> 1. original exploit: nothing.
> 2. 200 requests: server segfaulted
> 3. 2000 requests: too many childs are spawned and they start eating
> the memory almost by 100MBs per sec.
> 4. 3000 requests: same as with the 2000 requests.
> 
> Note that I had to run the exploit a couple of times to reproduce the
> issue triggered at 3, and when I tried to reproduce the segfault under
> gdb to get a backtrace I didn't succeed to reproduce it.

So let's just drop it from Lenny. We don't need the 40th minimal web
server in the archive, especially not if it crashes under load.

Such errors in fringe servers are not DoS vulnerabilities, but regular
bugs. We're not talking about Apache here.

Cheers,
Moritz



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#418462: mailman: Fails to upgrade from Sarge to Etch

2008-11-20 Thread Christian Fromme
Sorry, but I can't test this currently. It should be possible for you 
to check if the python-symlink is upgraded properly or not.

Thanks,
Christian



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506353: mailscanner: many scripts allow local users to overwrite arbitrary files, and more, via symlink attacks

2008-11-20 Thread Raphael Geissert
Package: mailscanner
Version: 4.55.10-3
Severity: grave
Tags: security

Hi,

I have found more issues on the autoupdate scripts and other files shipped by 
mailscanner than those reported in CVE-2008-5140[1].

In 4.55.10-3, grepping the files throw this:
/etc/MailScanner/autoupdate/:
> f-prot-autoupdate:$TempDir= "/var/tmp/f-prot";
> f-prot-autoupdate:$TmpFile = "tmp-web";
> clamav-autoupdate:$LogFile = "/tmp/ClamAV.update.log";
> panda-autoupdate.new:TEMPDIR="/tmp"
> trend-autoupdate.new:wget -q -O /tmp/$OPRINI $FTPSERV/opr.ini
> trend-autoupdate.new:NEWVER=`grep PatternVersionNPF /tmp/opr.ini.$$ | sed 
s/^PatternVersionNPF=//g | cut -c 3-5`
> trend-autoupdate.new:wget -q -P /tmp  $FTPSERV/lpt$NEWVER.zip 
> trend-autoupdate.new:DATCHECK=`unzip -o -t /tmp/lpt$NEWVER.zip |
> grep "No errors"`
> trend-autoupdate.new:mv /tmp/lpt$NEWVER.zip /etc/iscan
> trend-autoupdate.new:rm -f /tmp/lpt*.zip /tmp/$OPRINI $PackageDir/*.zip 
> rav-autoupdate.new:my($LockFile)  = '/tmp/RavBusy.lock';

(omitting other affected files in that package version, read below)

In 4.68.8-1:
/etc/MailScanner/autoupdate/:
> f-prot-autoupdate:$TempDir= "$FProtRoot/tmp";
> f-prot-autoupdate:$TmpFile = "tmp-web";
> clamav-autoupdate:$LogFile = "/tmp/ClamAV.update.log";
> avast-autoupdate:$LogFile = "/tmp/Avast.update.log";
> f-prot-6-autoupdate:my $logfile = "/tmp/f-prot-6-update-$$";
> f-prot-6-autoupdate:  unlink "/tmp/fpavdef.lock";

/etc/MailScanner/wrapper/:
> bitdefender-wrapper:LogFile=/tmp/log.bdc.$$
> kaspersky-wrapper:  Report=/tmp/kavoutput.tmp.$$
> kaspersky-wrapper:  Report=/tmp/kavoutput.tmp.$$
> kaspersky-wrapper:  Report=/tmp/kavoutput.tmp.$$
> clamav-wrapper:TempDir="/tmp/clamav.$$"
> clamav-wrapper:if [ -x "${TempDir}" ]; then
> clamav-wrapper: rm -rf ${TempDir} >/dev/null 2>&1
> clamav-wrapper:mkdir "${TempDir}" >/dev/null 2>&1
> clamav-wrapper:trap "rm -rf ${TempDir}" EXIT
> clamav-wrapper:  ExtraScanOptions="$ExtraScanOptions --tempdir=${TempDir}"
> clamav-wrapper:chown ${ClamUser}:${ClamGroup} "${TempDir}"
> clamav-wrapper:if [ -x "${TempDir}" ]; then
> clamav-wrapper: rm -rf ${TempDir}
> rav-wrapper:my $tmpdir = '/tmp';
> rav-wrapper:my $reportfile = sprintf('%s/report.vir.%s', $tmpdir, $$);

/usr/share/MailScanner/MailScanner/:
> Quarantine.pm:  $testfn = MailScanner::Config::Value('lockfiledir')
> || '/tmp'; 
> TNEF.pm:   require File::Temp; 
> TNEF.pm:  mkdir "/tmp/tnef.$$", 0777;
> TNEF.pm:  chmod 0700, "/tmp/tnef.$$";
> TNEF.pm: output_dir  => "/tmp/tnef.$$",
> TNEF.pm:system("rm -rf /tmp/tnef.$$");
> TNEF.pm:system("rm -rf /tmp/tnef.$$");
> MessageBatch.pm:  my $newmessage = MailScanner::Message->new(1, '/tmp', 1);
> MessageBatch.pm:  my $fh = new FileHandle(">/tmp/MSLint.body.$$");
> MessageBatch.pm:  $newmessage->{store}->{dpath} = "/tmp/MSLint.body.$$";
> WorkArea.pm:  $testfn = MailScanner::Config::Value('lockfiledir') ||
> '/tmp';
> WorkArea.pm:  or MailScanner::Log::DieLog("Cannot create temporary Work
> Dir %s. " .
> SA.pm:  # Create the $TMPDIR for SpamAssassin if necessary, then check we
> can 
> SA.pm:  # write to it. If not, change to /tmp. 
> SA.pm:  my $tmpdir = MailScanner::Config::Value('spamassassintempdir');
> SA.pm:  mkdir $tmpdir;
> SA.pm:  stat $tmpdir; # Is the directory writeable?
> SA.pm:  $tmpdir = '/tmp' unless -d _ && -r _ && -w _ && -x _;
> SA.pm:  $ENV{'TMPDIR'} = $tmpdir;
> SA.pm:  MailScanner::Log::InfoLog("SpamAssassin temporary working directory
> is %s", 
> SA.pm:$tmpdir); 
> SA.pm:  print STDERR "SpamAssassin temp dir = $tmpdir\n";

Other dirs:
> /etc/MailScanner/mailscanner.conf.with.mcp:Lockfile Dir = /tmp
> /usr/sbin/MailScanner:  unlink "/tmp/MSLint.body.$$";
> /usr/sbin/MailScanner:  $msg = MailScanner::Message->new('1','/tmp','fake');

I'm using severity grave as this package should definitely not be shipped in 
any release as is.

A good start point to fix this mess is by checking the above mentioned files, 
and then grep -riE "\bte?mp[^l]" path/to/code, and carefully review the 
matches files.

Of course, not even that would guarantee that there are no left ways to 
conduct symlink attacks via temporary files.
A full code audition is really needed IMHO.

[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5140
     http://security-tracker.debian.net/tracker/CVE-2008-5140

Cheers,
-- 
Raphael Geissert - Debian Maintainer
www.debian.org - get.debian.net


signature.asc
Description: This is a digitally signed message part.


Bug#506354: lvm2: system fails to boot after upgrade

2008-11-20 Thread Євгеній Мещеряков
Package: lvm2
Version: 2.02.39-3
Severity: grave

My system fails to boot after upgrade to 2.02.39-3. During boot
there is error message from lvm2:
Locking type 1 initialisation failed
after that system activates swap (successfuly) and tries to check
filesystems (all, except /, are on lvm), but devices do not exist,
so this step fails. Then boot stops with root password prompt.

In the root shell it is possible to run
 /etc/init.d/lvm2 start
It finishes without errors. After exiting the root shell, system
boots normally.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.28-rc5 (SMP w/2 CPU cores; PREEMPT)
Locale: LANG=uk_UA.UTF-8, LC_CTYPE=uk_UA.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages lvm2 depends on:
ii  libc62.7-16  GNU C Library: Shared libraries
ii  libdevmapper1.02.1   2:1.02.27-4 The Linux Kernel Device Mapper use
ii  libreadline5 5.2-3   GNU readline and history libraries
ii  lsb-base 3.2-20  Linux Standard Base 3.2 init scrip

lvm2 recommends no packages.

Versions of packages lvm2 suggests:
pn  dmsetup(no description available)

-- debconf-show failed



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506264: marked as done (gnunet-server: freeze in gnunet-update)

2008-11-20 Thread Debian Bug Tracking System

Your message dated Thu, 20 Nov 2008 21:02:09 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#506264: fixed in gnunet 0.8.0b-4
has caused the Debian Bug report #506264,
regarding gnunet-server: freeze in gnunet-update
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
506264: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506264
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: gnunet-server
Version: 0.8.0b-3
Severity: important

I'm seeing a freeze in gnunet-update which is identical to as reported here 
https://gnunet.org/mantis/view.php?id=1349

I was only able to complete postinst by commenting out the associated line.

My system is not likely to be completely up-to-date, but is clean according to 
dpkg.

A new upstream may/may not be available as the report doesn't mention versions.

Regards,


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.22 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash

Versions of packages gnunet-server depends on:
ii  adduser3.47  Add and remove users and groups
ii  debconf [debconf-2.0]  1.5.24Debian configuration management sy
ii  gettext0.14.5-2  GNU Internationalization utilities
ii  gnunet-client  0.8.0b-3  secure, trust-based peer-to-peer f
ii  gnunet-common  0.8.0b-3  secure, trust-based peer-to-peer f
ii  guile-1.8-libs 1.8.2+1-2 Main Guile libraries
ii  libadns1   1.4-2 Asynchronous-capable DNS client li
ii  libbz2-1.0 1.0.5-1   high-quality block-sorting file co
ii  libc6  2.7-16GNU C Library: Shared libraries
ii  libcurl3-gnutls7.18.2-7  Multi-protocol file transfer libra
ii  libesmtp5  0.8.11-2  LibESMTP SMTP client library
ii  libextractor1c2a   0.5.21+dfsg-1 extracts meta-data from files of a
ii  libgcrypt111.4.1-2   LGPL Crypto library - runtime libr
ii  libglib2.0-0   2.16.6-1  The GLib library of C routines
ii  libgmp3c2  2:4.2.2+dfsg-3Multiprecision arithmetic library
ii  libgpg-error0  1.4-1 library for common error values an
ii  libgsf-1-114   1.14.10-3 Structured File Library - runtime 
ii  libltdl3   1.5.6-4   A system independent dlopen wrappe
ii  libmicrohttpd4 0.4.0~pre0-2  library embedding HTTP server func
ii  libmysqlclient15off5.0.67-1  MySQL database client library
ii  libsqlite3-0   3.5.9-6   SQLite 3 shared library
ii  libssl0.9.80.9.8g-14 SSL shared libraries
ii  libxml22.6.32.dfsg-4 GNOME XML library
ii  netbase4.34  Basic TCP/IP networking system
ii  zlib1g 1:1.2.3.3.dfsg-12 compression library - runtime

gnunet-server recommends no packages.

gnunet-server suggests no packages.

-- debconf information:
  gnunet-server/warning:
* gnunet-server/gnunet_user: gnunet
* gnunet-server/gnunet_group: gnunet
* gnunet-server/launch_at_startup: false
  gnunet-server/prior_07:
  gnunet-server/failed:


--- End Message ---
--- Begin Message ---
Source: gnunet
Source-Version: 0.8.0b-4

We believe that the bug you reported is fixed in the latest version of
gnunet, which is due to be installed in the Debian FTP archive:

gnunet-client_0.8.0b-4_i386.deb
  to pool/main/g/gnunet/gnunet-client_0.8.0b-4_i386.deb
gnunet-common_0.8.0b-4_i386.deb
  to pool/main/g/gnunet/gnunet-common_0.8.0b-4_i386.deb
gnunet-dbg_0.8.0b-4_i386.deb
  to pool/main/g/gnunet/gnunet-dbg_0.8.0b-4_i386.deb
gnunet-dev_0.8.0b-4_i386.deb
  to pool/main/g/gnunet/gnunet-dev_0.8.0b-4_i386.deb
gnunet-server_0.8.0b-4_i386.deb
  to pool/main/g/gnunet/gnunet-server_0.8.0b-4_i386.deb
gnunet-tools_0.8.0b-4_i386.deb
  to pool/main/g/gnunet/gnunet-tools_0.8.0b-4_i386.deb
gnunet_0.8.0b-4.diff.gz
  to pool/main/g/gnunet/gnunet_0.8.0b-4.diff.gz
gnunet_0.8.0b-4.dsc
  to pool/main/g/gnunet/gnunet_0.8.0b-4.dsc
gnunet_0.8.0b-4_all.deb
  to pool/main/g/gnunet/gnunet_0.8.0b-4_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate

Bug#505237: Possible patch

2008-11-20 Thread Ferenc Wagner
Patrick Matthäi <[EMAIL PROTECTED]> writes:

> Ferenc Wagner schrieb:
>> Patrick Matthäi <[EMAIL PROTECTED]> writes:
>> 
>>> I attached a diff which might fix it, could you please test it?
>> 
>> Yes, this is what I use since the last upgrade.  However, I don't
>> think it's a good idea to use --oknodo on restart and reload.  The
>> missing process is a genuine error in those cases, isn't it?
>
> This should be okay, so on you can also restart if the service is not
> started yet.

Hi Patrick,

Well yes, that excuses the initial stop action during restart, but
after that the start mustn't fail.  The same goes for reload: I'd
expect it to fail if the service isn't running.  So in the latter two
cases --oknodo could only hide a real problem.  Isn't this the
recommended practice with init script actions?
-- 
Cheers,
Feri.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506179: no-ip: remote code execution vulnerability

2008-11-20 Thread Avi Rozen
Nico Golde wrote:
> Looks good please upload.
>   

Thanks, but I'm just the resident code monkey ;-)
Otavio should upload.

> BTW, you should use size_t instead of int for a length 
> field.
>   

True. Pushed a fix.

Cheers,
Avi.





-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506268: CVE-2008-5160: allows remote attackers to cause a denial of service (daemon crash) via multiple invalid requests

2008-11-20 Thread Nico Golde
Hi,
* Raphael Geissert <[EMAIL PROTECTED]> [2008-11-20 21:39]:
> 2008/11/20 Nico Golde <[EMAIL PROTECTED]>:
> > * Raphael Geissert <[EMAIL PROTECTED]> [2008-11-20 09:32]:
> >> The following CVE (Common Vulnerabilities & Exposures) id was published for
> >> msp-webserver.
> >>
> >> CVE-2008-5160[1]:
> >  [...]
> >
> > Did you manage to reproduce that? Not reproducible for me
> > with the unstable version.
[...] 
> Note that I had to run the exploit a couple of times to reproduce the
> issue triggered at 3, and when I tried to reproduce the segfault under
> gdb to get a backtrace I didn't succeed to reproduce it.

Hmm ok, same here, I tried it attaching gdb to it.

Cheers
Nico
-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgp4xw7GCvCer.pgp
Description: PGP signature


Bug#506341: kpdf crashes when opening graphically-intensive files

2008-11-20 Thread Pino Toscano
Hi,

> sometimes when I open certain PDFs

Please provide one of them, otherwise there's very little that can be done.

-- 
Pino Toscano


signature.asc
Description: This is a digitally signed message part.


Bug#506296: Works here

2008-11-20 Thread Matej Kosik
Michael Meskes wrote:
> tag 506296 unreproducible
> thanks
> 
> I just installed spawg and tested it here on an up-to-date sid system. Granted
> I only used the dvi file provided in the bug report to test, but spawg works
> like a charm. 
> 
> Michael

Let me update the original information then.

If you perform the following steps:

cd /tmp
wget http://altair.sk/uploads/sample.tar.gz
tar xvzf sample.tar.gz
cd sample
spawg ccs.dvi

then you should see the problem
(I am not sure about Sid but definitely on Lenny).

The difference is that if the program does not find external *.EPS
files, then it only prints a message

Can't find EPS file: Figures/Fig/sem.eps.

and works OK.

However, if the file(s) are in place, it seems to go into some
neverending loop. It then (after 10 seconds or so) prints

gs_kill

I haven't tried this on Sid (I do not have it around) but it behaves
like this on Lenny.

Matej



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506268: CVE-2008-5160: allows remote attackers to cause a denial of service (daemon crash) via multiple invalid requests

2008-11-20 Thread Raphael Geissert
Hi,

2008/11/20 Nico Golde <[EMAIL PROTECTED]>:
> Hi,
> * Raphael Geissert <[EMAIL PROTECTED]> [2008-11-20 09:32]:
>> The following CVE (Common Vulnerabilities & Exposures) id was published for
>> msp-webserver.
>>
>> CVE-2008-5160[1]:
>  [...]
>
> Did you manage to reproduce that? Not reproducible for me
> with the unstable version.

No, I didn't have time to setup the server and attempt to reproduce it.
But I did check the changelog and the patches being applied and found
nothing relevant that could "fix" or prevent the issue.

I have just tried to reproduce it and I succeeded.

I made four fruitful attempts:
1. original exploit: nothing.
2. 200 requests: server segfaulted
3. 2000 requests: too many childs are spawned and they start eating
the memory almost by 100MBs per sec.
4. 3000 requests: same as with the 2000 requests.

Note that I had to run the exploit a couple of times to reproduce the
issue triggered at 3, and when I tried to reproduce the segfault under
gdb to get a backtrace I didn't succeed to reproduce it.

>
> Cheers
> Nico
> --
> Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
> For security reasons, all text in this mail is double-rot13 encrypted.
>

Cheers,
-- 
Raphael Geissert - Debian Maintainer
www.debian.org - get.debian.net

Dan Quayle  - "This President is going to lead us out of this recovery."



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506341: kpdf crashes when opening graphically-intensive files

2008-11-20 Thread Martin Unzner
Package: kpdf
Version: 4:3.5.9-3
Severity: critical
Justification: breaks the whole system

Hi,

sometimes when I open certain PDFs (especially, but not only 
when opening directly from Firefox), esp. those with few written text 
and complex graphics, the whole system completely crashes (i.e. doesn't 
react to keyboard and mouse, music player hangs and so on). syslog and 
dmesg don't deliver related information (at least not as far as I could 
figure out), so I have absolutely no clue what is the problem. Can 
someone help me with this?

Thank you in advance for your answer!

Martin Unzner

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages kpdf depends on:
ii  kdelibs4c2a 4:3.5.9.dfsg.1-6 core libraries and binaries for al
ii  libc6   2.7-16   GNU C Library: Shared libraries
ii  libfreetype62.3.7-2  FreeType 2 font engine, shared lib
ii  libgcc1 1:4.3.2-1GCC support library
ii  libpaper1   1.1.23+nmu1  library for handling paper charact
ii  libqt3-mt   3:3.3.8b-5   Qt GUI Library (Threaded runtime v
ii  libstdc++6  4.3.2-1  The GNU Standard C++ Library v3
ii  libxft2 2.1.12-3 FreeType-based font drawing librar

Versions of packages kpdf recommends:
ii  kghostview4:3.5.9-3  PostScript viewer for KDE

Versions of packages kpdf suggests:
ii  khelpcente 4:4.0.0.really.3.5.9.dfsg.1-5 help center for KDE

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#506189: countrycodes: Uses outdated data: should be dropped or use iso-codes data

2008-11-20 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 506189 wishlist
Bug#506189: countrycodes: Uses outdated data: should be dropped or use 
iso-codes data
Severity set to `wishlist' from `grave'

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506189: countrycodes: Uses outdated data: should be dropped or use iso-codes data

2008-11-20 Thread Ola Lundqvist
severity 506189 wishlist
thanks

Hi Christian

Since when did "outdated and possibly misleading data" become a grave bug?
Bug #492014 refer to montenegro, which I agree is a fault but I can hardly
tell that this is a grave bug.

On Wed, Nov 19, 2008 at 08:39:02AM +0100, Christian Perrier wrote:
> Package: countrycodes
> Version: 1.0.5-2
> Severity: grave
> Justification: renders package unusable
> 
> This package, which is apparently very loosely maintained is currently
> providing outdated and possibly misleading data.

Where did you get the information that it is loosely maintained from?
I agree that it has not been updated for some time, but I have not had any
really important bugs on it either.

> The ISO-3166 codes have changed since last updates and no update for the
> package came to correct this. See also #492014 for misleading data.

Yes true. However as you also probably know we have had freeze for some time
and during that time no corrections for "normal" bugs are accepted. This could
partly be treated as documentation but I'm not sure it will be accepted.

> In parallel, the iso-codes packages is providing up-to-date lists with the
> ISO-3166 maintenance agency data used as reference.

Yes but this is only documentation. No binary to simplify.

> I think that, as is, this package should not be shipped with lenny but
> either be completely dropped from  the archive is noones wants to maintain
> it, or modified to avoid using an internal reference list but rather
> iso-codes' XML data (and then have the package depend on iso-codes).

I do not agree. Countrycodes is packaged version of the "upstream" countrycodes
software. This is the only intention of this package.

> Please note, in the meantime, isoquery came out, which allows using
> iso-codes data for either ISO 639, 3166 or 4217.

I was not aware of that. If it is good then it can probably replace countrycodes
in the future. We could add some kind of transition, but that should not be
done in the middle of a freeze.

As you can see from popcon the countrycodes package is fairly popular
http://qa.debian.org/popcon.php?package=countrycodes

I can see that isoquery is more popular which could vote for a drop of 
countrycodes
but let us take that after Lenny in that case.

Best regards,

// Ola


> -- System Information:
> Debian Release: lenny/sid
>   APT prefers unstable
>   APT policy: (500, 'unstable'), (1, 'experimental')
> Architecture: i386 (i686)
> 
> Kernel: Linux 2.6.25-2-686 (SMP w/1 CPU core)
> Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
> Shell: /bin/sh linked to /bin/dash
> 
> Versions of packages countrycodes depends on:
> ii  libc6 2.7-16 GNU C Library: Shared libraries
> 
> countrycodes recommends no packages.
> 
> countrycodes suggests no packages.
> 
> -- no debconf information
> 
> 
> 

-- 
 - Ola Lundqvist ---
/  [EMAIL PROTECTED] Annebergsslingan 37  \
|  [EMAIL PROTECTED]  654 65 KARLSTAD  |
|  http://inguza.com/  +46 (0)70-332 1551   |
\  gpg/f.p.: 7090 A92B 18FE 7994 0C36  4FE4 18A1 B1CF 0FE5 3DD9 /
 ---



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506179: no-ip: remote code execution vulnerability

2008-11-20 Thread Nico Golde
Hi,
* Avi Rozen <[EMAIL PROTECTED]> [2008-11-19 20:17]:
[...] 
> [1]http://git.debian.org/?p=collab-maint/no-ip.git;a=commit;h=60ed93621ff36d9731ba5d9f9336d6eb91122302

Looks good please upload.
BTW, you should use size_t instead of int for a length 
field. In this case it doesn't matter as you catch len = 0 
before it can become negative

Cheers
Nico
-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpCd1MZJE4mQ.pgp
Description: PGP signature


Bug#506334: marked as done (yorick-curses is not 64bit-safe)

2008-11-20 Thread Debian Bug Tracking System

Your message dated Thu, 20 Nov 2008 18:17:03 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#506334: fixed in yorick-curses 0.1-3
has caused the Debian Bug report #506334,
regarding yorick-curses is not 64bit-safe
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
506334: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506334
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---

Package: yorick-curses
Version: 0.1-2
Severity: grave
Justification: renders package unusable

yorick-curses just won't work on amd64 (segfaults). I'm working on a  
fix.


Regards, Thibaut.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.25.9 (SMP w/4 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash

Versions of packages yorick-ml4 depends on:
ii  libc6  2.7-16GNU C Library: Shared  
libraries
ii  libncurses5   5.6+20080907-1 shared libraries for  
terminal hand
ii  yorick 2.1.05+dfsg-6 interpreted language and  
scientifi


yorick-curses recommends no packages.

yorick-curses suggests no packages.

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: yorick-curses
Source-Version: 0.1-3

We believe that the bug you reported is fixed in the latest version of
yorick-curses, which is due to be installed in the Debian FTP archive:

yorick-curses_0.1-3.diff.gz
  to pool/main/y/yorick-curses/yorick-curses_0.1-3.diff.gz
yorick-curses_0.1-3.dsc
  to pool/main/y/yorick-curses/yorick-curses_0.1-3.dsc
yorick-curses_0.1-3_i386.deb
  to pool/main/y/yorick-curses/yorick-curses_0.1-3_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thibaut Paumard <[EMAIL PROTECTED]> (supplier of updated yorick-curses package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 20 Nov 2008 18:54:53 +0100
Source: yorick-curses
Binary: yorick-curses
Architecture: source i386
Version: 0.1-3
Distribution: unstable
Urgency: high
Maintainer: Thibaut Paumard <[EMAIL PROTECTED]>
Changed-By: Thibaut Paumard <[EMAIL PROTECTED]>
Description: 
 yorick-curses - interface to the (n)curses library for the Yorick language
Closes: 506334
Changes: 
 yorick-curses (0.1-3) unstable; urgency=high
 .
   * fixed bug "yorick-curses is not 64bit-safe" (Closes: #506334).
Checksums-Sha1: 
 2f229435ded7d53220511bea652999237af94d89 1067 yorick-curses_0.1-3.dsc
 7849c7774bad1209a2b6c61baf03c761ebc20e6d 4312 yorick-curses_0.1-3.diff.gz
 094f68db739bedb6c32f9a6eda800b67fbed38aa 12394 yorick-curses_0.1-3_i386.deb
Checksums-Sha256: 
 05864762c846281c34ff12ef3a19c18aea65ccf620bc9aaba9531e8814a1cba3 1067 
yorick-curses_0.1-3.dsc
 b6021001d110cd12360e1456acfb1f7030fd3a18033a57f8204f63010ed0ddd3 4312 
yorick-curses_0.1-3.diff.gz
 97182649f6dce79a240590e154eb9e872761352833873110c29dc98161e03922 12394 
yorick-curses_0.1-3_i386.deb
Files: 
 486d769f9e7c953ea37f4a21bf32955b 1067 math optional yorick-curses_0.1-3.dsc
 4586e9fa77a4cff0c9cd0a9b4a0f4b16 4312 math optional yorick-curses_0.1-3.diff.gz
 498d4a2d305cc17a7e6f56e3c3af9763 12394 math optional 
yorick-curses_0.1-3_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkklpjEACgkQ+37NkUuUiPFiOgCeMCT5jeBoqHhDYgoXB6kVZwBp
zLEAnA/U5RHoH0tPn64OW0WNUhCO0e8S
=xKeg
-END PGP SIGNATURE-


--- End Message ---


Bug#506334: yorick-curses is not 64bit-safe

2008-11-20 Thread Thibaut Paumard

Package: yorick-curses
Version: 0.1-2
Severity: grave
Justification: renders package unusable

yorick-curses just won't work on amd64 (segfaults). I'm working on a  
fix.


Regards, Thibaut.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.25.9 (SMP w/4 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash

Versions of packages yorick-ml4 depends on:
ii  libc6  2.7-16GNU C Library: Shared  
libraries
ii  libncurses5   5.6+20080907-1 shared libraries for  
terminal hand
ii  yorick 2.1.05+dfsg-6 interpreted language and  
scientifi


yorick-curses recommends no packages.

yorick-curses suggests no packages.

-- no debconf information




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505847: How to remove package?

2008-11-20 Thread Peter Jay Salzman
How can this package be removed?  Dpkg won't let me uninstall it due to
unregistered fonts.

Thanks!



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505237: Possible patch

2008-11-20 Thread Patrick Matthäi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Ferenc Wagner schrieb:
> Patrick Matthäi <[EMAIL PROTECTED]> writes:
> 
>> I attached a diff which might fix it, could you please test it?
> 
> Yes, this is what I use since the last upgrade.  However, I don't
> think it's a good idea to use --oknodo on restart and reload.  The
> missing process is a genuine error in those cases, isn't it?

This should be okay, so on you can also restart if the service is not
started yet.

- --
/*
Mit freundlichem Gruß / With kind regards,
Patrick Matthäi

E-Mail: [EMAIL PROTECTED]

Comment:
Always if we think we are right,
we were maybe wrong.
*/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkklnIQACgkQ2XA5inpabMepVgCfS8a8fo6g2BPVJEm1y0si97ZP
odAAn0ynLYfNMEcMqzg5evuU9yy2HKaD
=uPfP
-END PGP SIGNATURE-



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504167: T60

2008-11-20 Thread Jan Korbel

2.6.26-11~snapshot.12402 is ok

Bastian Blank wrote:

Can you please test a current snapshot[1]? I reverted the two patches
where this change is included.

Bastian

[1]: http://wiki.debian.org/DebianKernel



smime.p7s
Description: S/MIME Cryptographic Signature


Bug#505237: Possible patch

2008-11-20 Thread Ferenc Wagner
Patrick Matthäi <[EMAIL PROTECTED]> writes:

> I attached a diff which might fix it, could you please test it?

Yes, this is what I use since the last upgrade.  However, I don't
think it's a good idea to use --oknodo on restart and reload.  The
missing process is a genuine error in those cases, isn't it?
-- 
Thanks,
Feri.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503332: marked as done (iscsitarget-modules-2.6.26-1-xen-686: unable to load kernel module)

2008-11-20 Thread Debian Bug Tracking System

Your message dated Thu, 20 Nov 2008 17:17:18 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Re: Bug#503332: iscsitarget-modules-2.6.26-1-xen-686: unable 
to load kernel module
has caused the Debian Bug report #503332,
regarding iscsitarget-modules-2.6.26-1-xen-686: unable to load kernel module
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
503332: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=503332
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: iscsitarget-modules-2.6.26-1-xen-686
Version: 2.6.26+0.4.16+svn162-4
Severity: grave
Justification: renders package unusable

../iscsitarget start
Starting iSCSI enterprise target service: FATAL: Error inserting iscsi_trgt 
(/lib/modules/2.6.26-1-xen-686/extra/iscsitarget/kernel/iscsi_trgt.ko):
Invalid module format
failed - module is missing!

dmesg output:
iscsi_trgt: disagrees about version of symbol struct_module


-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-1-xen-686 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages iscsitarget-modules-2.6.26-1-xen-686 depends on:
ii  linux-modules-2.6.26-1-xen-68 2.6.26-8   Linux 2.6.26 modules on i686

iscsitarget-modules-2.6.26-1-xen-686 recommends no packages.

iscsitarget-modules-2.6.26-1-xen-686 suggests no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Version: 2.6.26-5

Fixed.

--- End Message ---


Bug#504093: marked as done (drbd8-modules-2.6.26-1-xen-686: module doesn't load)

2008-11-20 Thread Debian Bug Tracking System

Your message dated Thu, 20 Nov 2008 17:16:32 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Re: Bug#504093: drbd8-modules-2.6.26-1-xen-686: module doesn't 
load
has caused the Debian Bug report #504093,
regarding drbd8-modules-2.6.26-1-xen-686: module doesn't load
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
504093: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504093
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---

Package: drbd8-modules-2.6.26-1-xen-686
Version: 2.6.26+8.0.13-4
Severity: grave
Justification: renders package unusable

Hi,

drbd8-modules-2.6.26-1-xen-686: module doesn't load
Please update binary to actual kernel.

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-1-xen-686 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages drbd8-modules-2.6.26-1-xen-686 depends on:
ii  linux-modules-2.6.26-1-xen-68 2.6.26-8   Linux 2.6.26 modules on i686

drbd8-modules-2.6.26-1-xen-686 recommends no packages.

drbd8-modules-2.6.26-1-xen-686 suggests no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Version: 2.6.26-5

Fixed.

--- End Message ---


Bug#505446: mlocate always creates empty database

2008-11-20 Thread Nigel Horne



Can you send your /etc/fstab too? I'm curious whether the / bind mount
is defined there, or some script is doing it on their own.
  

# /etc/fstab: static file system information.
#
#
proc/proc   procdefaults0   0
/dev/sda6   /   ext3errors=remount-ro,noatime 0   1
/dev/sdb2   /home   ext3noatime0   2
/dev/sda5   noneswapsw  0   0
/dev/hdc/media/cdrom0   udf,iso9660 user,noauto,exec,utf8 
0   0

/dev/sda2/mnt/cntfs-3gdefaults,umask=0,nls-utf800
/dev/sdb1/mnt/dntfs-3gdefaults,umask=0,nls-utf800
/  /./  bind  bind  0 
/home  /home  bind  bind  0 


--
Nigel Horne
ClamAV, The Open-Source GPL Multi-Platform Anti-Virus tool-kit




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506031: marked as done (dovecot-common: ManageSieve security hole: virtual users can edit scripts of other virtual users)

2008-11-20 Thread Debian Bug Tracking System

Your message dated Thu, 20 Nov 2008 15:32:05 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#506031: fixed in dovecot 1:1.0.15-2.3
has caused the Debian Bug report #506031,
regarding dovecot-common: ManageSieve security hole: virtual users can edit 
scripts of other virtual users
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
506031: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506031
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: dovecot-common
Version: 1:1.0.15-2.2
Severity: grave
Tags: security
Justification: user security hole

Stephan Bosch has reported¹ a security hole in ManageSieve implementation for
Dovecot.
"… clever virtual users that know the directory structure of the server can
read and edit script files of other virtual users with the same system uid…"

The security patch for Dovecot 1.0.15 is available at:
http://www.rename-it.nl/dovecot/1.0/dovecot-1.0.15-managesieve-v9.3-security.patch

Regards,
Pascal

1 = http://dovecot.org/list/dovecot/2008-November/035259.html


-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing'), (50, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages dovecot-common depends on:
ii  adduser   3.110  add and remove users and groups
ii  libc6 2.7-15 GNU C Library: Shared libraries
ii  libcomerr21.41.3-1   common error description library
ii  libkrb53  1.6.dfsg.4~beta1-4 MIT Kerberos runtime libraries
ii  libldap-2.4-2 2.4.11-1   OpenLDAP libraries
ii  libmysqlclient15off   5.0.51a-17 MySQL database client library
ii  libpam-runtime1.0.1-4Runtime support for the PAM librar
ii  libpam0g  1.0.1-4+b1 Pluggable Authentication Modules l
ii  libpq58.3.5-1PostgreSQL C client library
ii  libsqlite3-0  3.5.9-5SQLite 3 shared library
ii  libssl0.9.8   0.9.8g-14  SSL shared libraries
ii  openssl   0.9.8g-14  Secure Socket Layer (SSL) binary a
ii  ucf   3.0010 Update Configuration File: preserv
ii  zlib1g1:1.2.3.3.dfsg-12  compression library - runtime

dovecot-common recommends no packages.

dovecot-common suggests no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Source: dovecot
Source-Version: 1:1.0.15-2.3

We believe that the bug you reported is fixed in the latest version of
dovecot, which is due to be installed in the Debian FTP archive:

dovecot-common_1.0.15-2.3_i386.deb
  to pool/main/d/dovecot/dovecot-common_1.0.15-2.3_i386.deb
dovecot-dev_1.0.15-2.3_i386.deb
  to pool/main/d/dovecot/dovecot-dev_1.0.15-2.3_i386.deb
dovecot-imapd_1.0.15-2.3_i386.deb
  to pool/main/d/dovecot/dovecot-imapd_1.0.15-2.3_i386.deb
dovecot-pop3d_1.0.15-2.3_i386.deb
  to pool/main/d/dovecot/dovecot-pop3d_1.0.15-2.3_i386.deb
dovecot_1.0.15-2.3.diff.gz
  to pool/main/d/dovecot/dovecot_1.0.15-2.3.diff.gz
dovecot_1.0.15-2.3.dsc
  to pool/main/d/dovecot/dovecot_1.0.15-2.3.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Dominic Hargreaves <[EMAIL PROTECTED]> (supplier of updated dovecot package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Wed, 19 Nov 2008 18:11:36 +
Source: dovecot
Binary: dovecot-common dovecot-dev dovecot-imapd dovecot-pop3d
Architecture: source i386
Version: 1:1.0.15-2.3
Distribution: unstable
Urgency: medium
Maintainer: Dovecot Maintainers <[EMAIL PROTECTED]>
Changed-By: Dominic Hargreaves <[EMAIL PROTECTED]>
Description: 
 dovecot-common - secure mail server that supports mbox and maildir mailboxes
 dovecot-dev - header files for the dovecot mail server
 dovecot-imapd - secure IMAP server that supports mbox and maildir mailboxes
 dovecot-pop3d - secure POP3 server that supports mbox and maildir mailboxes
Closes: 506031
Changes: 
 dovecot (1:1.0.1

Processed: Possible patch

2008-11-20 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags #505237 patch
Bug#505237: /etc/init.d/snmpd start reports error if already running
There were no tags set.
Tags added: patch

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505237: Possible patch

2008-11-20 Thread Patrick Matthäi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

tags #505237 patch
thanks

Hello,

I attached a diff which might fix it, could you please test it?
Thanks.

- --
/*
Mit freundlichem Gruß / With kind regards,
Patrick Matthäi

E-Mail: [EMAIL PROTECTED]

Comment:
Always if we think we are right,
we were maybe wrong.
*/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkklgx0ACgkQ2XA5inpabMfbjgCeJrb29uGaqblEnBuabadaQKgi
hiQAoJ/aorwxGdjalN7BZ2oQKwbp6aZR
=5VRO
-END PGP SIGNATURE-
diff -Naur net-snmp-5.4.1~dfsg.orig/debian/snmpd.init net-snmp-5.4.1~dfsg/debian/snmpd.init
--- net-snmp-5.4.1~dfsg.orig/debian/snmpd.init	2008-11-20 16:27:19.0 +0100
+++ net-snmp-5.4.1~dfsg/debian/snmpd.init	2008-11-20 16:29:17.0 +0100
@@ -40,12 +40,12 @@
   start)
 echo -n "Starting network management services:"
 if [ "$SNMPDRUN" = "yes" -a -f /etc/snmp/snmpd.conf ]; then
-	start-stop-daemon --quiet --start --exec /usr/sbin/snmpd \
+	start-stop-daemon --quiet --oknodo --start --exec /usr/sbin/snmpd \
 	-- $SNMPDOPTS
 	echo -n " snmpd"
 fi
 if [ "$TRAPDRUN" = "yes" -a -f /etc/snmp/snmptrapd.conf ]; then
-	start-stop-daemon --quiet --start --exec /usr/sbin/snmptrapd \
+	start-stop-daemon --quiet --oknodo --start --exec /usr/sbin/snmptrapd \
 	-- $TRAPDOPTS
 	echo -n " snmptrapd"
 fi
@@ -66,13 +66,13 @@
 # Allow the daemons time to exit completely.
 sleep 2
 if [ "$SNMPDRUN" = "yes" -a -f /etc/snmp/snmpd.conf ]; then
-	start-stop-daemon --quiet --start --exec /usr/sbin/snmpd -- $SNMPDOPTS
+	start-stop-daemon --quiet --oknodo --start --exec /usr/sbin/snmpd -- $SNMPDOPTS
 	echo -n " snmpd"
 fi
 if [ "$TRAPDRUN" = "yes" -a -f /etc/snmp/snmptrapd.conf ]; then
 	# Allow snmpd time to start up.
 	sleep 1
-	start-stop-daemon --quiet --start --exec /usr/sbin/snmptrapd -- $TRAPDOPTS
+	start-stop-daemon --quiet --oknodo --start --exec /usr/sbin/snmptrapd -- $TRAPDOPTS
 	echo -n " snmptrapd"
 fi
 echo "."
@@ -80,7 +80,7 @@
   reload|force-reload)
 echo -n "Reloading network management services:"
 if [ "$SNMPDRUN" = "yes" -a -f /etc/snmp/snmpd.conf ]; then
-start-stop-daemon --quiet --stop --signal 1 \
+start-stop-daemon --quiet --oknodo --stop --signal 1 \
 	--pidfile /var/run/snmpd.pid --exec /usr/sbin/snmpd
 	echo -n " snmpd"
 fi


add_oknodo_snmpd_init.diff.sig
Description: Binary data


Bug#506296: Works here

2008-11-20 Thread Michael Meskes
tag 506296 unreproducible
thanks

I just installed spawg and tested it here on an up-to-date sid system. Granted
I only used the dvi file provided in the bug report to test, but spawg works
like a charm. 

Michael
-- 
Michael Meskes
Michael at Fam-Meskes dot De, Michael at Meskes dot (De|Com|Net|Org)
Michael at BorussiaFan dot De, Meskes at (Debian|Postgresql) dot Org
ICQ: 179140304, AIM/Yahoo: michaelmeskes, Jabber: [EMAIL PROTECTED]
Go VfL Borussia! Go SF 49ers! Use Debian GNU/Linux! Use PostgreSQL!



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: severity of 504655 is important

2008-11-20 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 504655 important
Bug#504655: debian-installer: Kernel panic when velocity driver started
Severity set to `important' from `grave'

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: tagging 505101

2008-11-20 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 505101 sid
Bug#505101: "libupsclient-dev points to /usr/lib not /lib"
There were no tags set.
Tags added: sid

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Works here

2008-11-20 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tag 506296 unreproducible
Bug#506296: spawg program runs, shows the window but always blocks afterward
There were no tags set.
Tags added: unreproducible

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: notfound 505101 in 2.2.2-6.2

2008-11-20 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> notfound 505101 2.2.2-6.2
Bug#505101: "libupsclient-dev points to /usr/lib not /lib"
Bug no longer marked as found in version 2.2.2-6.2.

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506323: #506323

2008-11-20 Thread Bastian Blank
severity 506323 important
thanks

First, make sure you have the last version installed, this is 2.6.26-10.
Second, make sure you have the latest firmware installed, both for the
machine and the raid controller.

Also you should catch the console output either via serial console or
netconsole.

Bastian

-- 
Women are more easily and more deeply terrified ... generating more
sheer horror than the male of the species.
-- Spock, "Wolf in the Fold", stardate 3615.4



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506058: Possible patch

2008-11-20 Thread Patrick Matthäi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hello,

does the attached patch maybe help for your init script?

It would be also interestend if var/run is a part of your / partition.

- --
/*
Mit freundlichem Gruß / With kind regards,
Patrick Matthäi

E-Mail: [EMAIL PROTECTED]

Comment:
Always if we think we are right,
we were maybe wrong.
*/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkklfQ0ACgkQ2XA5inpabMdoaQCfS8TxI6RR1/3fwK5bAzlVTqzz
bNMAnA1dEeD7CHajdluFk37+ZSl/aCeR
=cT+A
-END PGP SIGNATURE-
diff -Naur gkrellm-2.3.2.orig/debian/gkrellmd.init gkrellm-2.3.2/debian/gkrellmd.init
--- gkrellm-2.3.2.orig/debian/gkrellmd.init	2008-11-20 16:01:35.0 +0100
+++ gkrellm-2.3.2/debian/gkrellmd.init	2008-11-20 16:02:31.0 +0100
@@ -26,7 +26,7 @@
 case "$1" in
   start)
 	echo -n "Starting $DESC: "
-	start-stop-daemon --start --quiet \
+	start-stop-daemon --start --quiet --oknodo \
 		--exec $DAEMON -- --pidfile /var/run/$NAME.pid $DAEMON_OPTS
 	echo "$NAME."
 	;;
@@ -58,7 +58,7 @@
 	start-stop-daemon --stop --quiet --pidfile \
 		/var/run/$NAME.pid --exec $DAEMON --oknodo
 	sleep 1
-	start-stop-daemon --start --quiet --pidfile \
+	start-stop-daemon --start --quiet --oknodo --pidfile \
 		/var/run/$NAME.pid --exec $DAEMON -- --pidfile /var/run/$NAME.pid $DAEMON_OPTS
 	echo "$NAME."
 	;;


poss_patch_gkrellmd_init.diff.sig
Description: Binary data


Bug#504353: Adjusting

2008-11-20 Thread Michael Meskes
severity 504353 wishlist
retitle 504353 Make virtualbox-ose module packages independant of 
linux-modules-extra
tag 504353 pending
thanks

To solve the current problem in Lenny all we have to do is to wait for the
migration of the packages already in Sid. In the long run there will be a new
package taking care of this, but this move hopefully can wait until Lenny is
released.

Therefore I downcast the bug and tag it pending, after all the new package is
already done, but not uploaded.

I hope this explains it and puts the discussions to an end.

Michael
-- 
Michael Meskes
Michael at Fam-Meskes dot De, Michael at Meskes dot (De|Com|Net|Org)
Michael at BorussiaFan dot De, Meskes at (Debian|Postgresql) dot Org
ICQ: 179140304, AIM/Yahoo: michaelmeskes, Jabber: [EMAIL PROTECTED]
Go VfL Borussia! Go SF 49ers! Use Debian GNU/Linux! Use PostgreSQL!



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506008: marked as done ([grub-invaders] Fails to boot)

2008-11-20 Thread Debian Bug Tracking System

Your message dated Thu, 20 Nov 2008 15:51:59 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Re: [grub-invaders] Fails to boot
has caused the Debian Bug report #506008,
regarding [grub-invaders] Fails to boot
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
506008: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506008
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: grub-invaders
Version: 1.0.0-8
Severity: grave
Tags: patch

--- Please enter the report below this line. ---
Hi,

While trying grub-pc, I went over grub-invaders. Installation went fine, but it 
failed to boot with an error like "multiboot unknown" (can't remember exactly).

The attached patch solves the issue (at least for me).

It moves line 10 ( prepare_grub_to_access_device…) after line 6, so that the 
menuentry contains only the multiboot, which is then recognised (for an unknown 
reason).

Regards, 

OdyX

--- System information. ---
Architecture: amd64
Kernel:   Linux 2.6.27-1-amd64

Debian Release: lenny/sid
  700 testing mirror.switch.ch 
  600 unstablepkg-fso.alioth.debian.org 
  600 unstablemirror.switch.ch 
  500 testing-proposed-updates mirror.switch.ch 
   50 unstablemirror.switch.ch 
   50 unstableftp.uni-kl.de 
   50 testing-proposed-updates mirror.switch.ch 
   50 testing mirror.switch.ch 
   50 testing ftp.uni-kl.de 
   50 kernel-dists-trunk kernel-archive.buildserver.net 
   50 kernel-dists-sid kernel-archive.buildserver.net 
   50 experimentalmirror.switch.ch 
   50 experimentalftp.uni-kl.de 

--- Package information. ---
Depends   (Version) | Installed
===-+-===
| 



-- 
Didier Raboud, proud Debian user.
CH-1802 Corseaux
[EMAIL PROTECTED]
--- etc/grub.d/22_invaders	2008-08-04 11:07:08.0 +0200
+++ /etc/grub.d/22_invaders	2008-11-17 17:16:01.0 +0100
@@ -4,11 +4,10 @@
   source /usr/lib/grub/update-grub_lib
   INVADERSPATH=$( make_system_path_relative_to_its_root "/boot/invaders" )
   echo "Found GRUB Invaders image: /boot/invaders" >&2
-  cat << EOF
-menuentry "GRUB Invaders" {
-EOF
+
   prepare_grub_to_access_device ${GRUB_DEVICE_BOOT} | sed -e "s/^/\t/g"
   cat << EOF
+menuentry "GRUB Invaders" {
 	multiboot	${INVADERSPATH}
 }
 EOF


signature.asc
Description: This is a digitally signed message part.
--- End Message ---
--- Begin Message ---
Le mercredi 19 novembre 2008 19:20:20 Robert Millan, vous avez écrit :
> On Wed, Nov 19, 2008 at 05:03:10PM +0100, Didier Raboud wrote:
> > OK.
> >
> > I begin to understand... ( #497791 )
> >
> > The problem is that if you only run "update-grub", "grub-install
> > " is not run automagically and will then put grub in a weird
> > state.
> >
> > "grub-install " should be run after each update-grub if I
> > understand correctly - right ?
>
> grub-install should be run often, but only by the user.  It's too risky to
> run automatically.

OK. I think that this is not clear though : nothing in /usr/share/doc/grub-pc 
nor anywhere where I could find it. Maybe there is something to do…

> So, to summarize, if you grub-install with the versions of grub-pc /
> grub-common in sid, invaders works, but if you grub-install with the ones
> in experimental, it doesn't?  (disregard update-grub calls in this test,
> but make sure you're using /etc/grub.d/*_multiboot unmodified).

Lenny/Sid version : everything boots and works
Experimental version :  everything boots, but no background image

The experimental version wants to use the old desktop-base image 
(another bug…)

So, the issue was simply to run 'grub-install ' after each grub-update 
to be sure that everything is copied correctly in /boot.

I'm closing the bug with '-done', because it was my mis-use of the package.

Regards, 

OdyX

-- 
Didier Raboud, proud Debian user.
CH-1802 Corseaux
[EMAIL PROTECTED]


signature.asc
Description: This is a digitally signed message part.
--- End Message ---


Processed: Adjusting

2008-11-20 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 504353 wishlist
Bug#504353: virtualbox-ose-modules-2.6.26-1-amd64 version mismatch on Lenny
Bug#502346: virtualbox-ose-modules package older than virtualbox-ose
Bug#502539: virtualbox-ose-modules-2.6.26-1-686 contains outdated module for 
VirtualBox
Severity set to `wishlist' from `serious'

> retitle 504353 Make virtualbox-ose module packages independant of 
> linux-modules-extra
Bug#504353: virtualbox-ose-modules-2.6.26-1-amd64 version mismatch on Lenny
Changed Bug title to `Make virtualbox-ose module packages independant of 
linux-modules-extra' from `virtualbox-ose-modules-2.6.26-1-amd64 version 
mismatch on Lenny'.

> tag 504353 pending
Bug#504353: Make virtualbox-ose module packages independant of 
linux-modules-extra
There were no tags set.
Bug#502346: virtualbox-ose-modules package older than virtualbox-ose
Bug#502539: virtualbox-ose-modules-2.6.26-1-686 contains outdated module for 
VirtualBox
Tags added: pending

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504167: T60

2008-11-20 Thread Bastian Blank
On Wed, Nov 19, 2008 at 03:11:09PM +0100, Jan Korbel wrote:
> Vanilla 2.6.26.6 with this patch is ok. I can resume notebook (and there  
> is no delay).

Can you please test a current snapshot[1]? I reverted the two patches
where this change is included.

Bastian

[1]: http://wiki.debian.org/DebianKernel

-- 
Our missions are peaceful -- not for conquest.  When we do battle, it
is only because we have no choice.
-- Kirk, "The Squire of Gothos", stardate 2124.5



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506297: marked as done (yorick-ml4 is not 64bit-safe)

2008-11-20 Thread Debian Bug Tracking System

Your message dated Thu, 20 Nov 2008 14:02:03 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#506297: fixed in yorick-ml4 0.5.1-3
has caused the Debian Bug report #506297,
regarding yorick-ml4 is not 64bit-safe
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
506297: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506297
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---

Package: yorick-ml4
Version: 0.5.1-2
Severity: grave
Justification: renders package unusable

The package is completely broken under amd64. ml4write never returns,  
ml4read segfaults...


In ml4.c, the "info" array at the beginning of each ml4 variable must  
be of type int, not long.


I'm working on a fix.

Regards, Thibaut.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.25.9 (SMP w/4 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash

Versions of packages yorick-ml4 depends on:
ii  libc6  2.7-16GNU C Library: Shared  
libraries
ii  yorick 2.1.05+dfsg-6 interpreted language and  
scientifi


yorick-ml4 recommends no packages.

yorick-ml4 suggests no packages.

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: yorick-ml4
Source-Version: 0.5.1-3

We believe that the bug you reported is fixed in the latest version of
yorick-ml4, which is due to be installed in the Debian FTP archive:

yorick-ml4_0.5.1-3.diff.gz
  to pool/main/y/yorick-ml4/yorick-ml4_0.5.1-3.diff.gz
yorick-ml4_0.5.1-3.dsc
  to pool/main/y/yorick-ml4/yorick-ml4_0.5.1-3.dsc
yorick-ml4_0.5.1-3_i386.deb
  to pool/main/y/yorick-ml4/yorick-ml4_0.5.1-3_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thibaut Paumard <[EMAIL PROTECTED]> (supplier of updated yorick-ml4 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 20 Nov 2008 13:58:21 +0100
Source: yorick-ml4
Binary: yorick-ml4
Architecture: source i386
Version: 0.5.1-3
Distribution: unstable
Urgency: high
Maintainer: Thibaut Paumard <[EMAIL PROTECTED]>
Changed-By: Thibaut Paumard <[EMAIL PROTECTED]>
Description: 
 yorick-ml4 - Matlab file format support for the Yorick language
Closes: 506297
Changes: 
 yorick-ml4 (0.5.1-3) unstable; urgency=high
 .
   * Fixed bug "yorick-ml4 is not 64bit-safe" (Closes: #506297).
Checksums-Sha1: 
 d14889db8b6c07d69eadd2794192808934ba1f8a 1027 yorick-ml4_0.5.1-3.dsc
 21978f13fc9cef710e73350ac1f3ebe53d60b797 4943 yorick-ml4_0.5.1-3.diff.gz
 f3bc6593127194b261f5688d2c1eccae132eb8e7 13558 yorick-ml4_0.5.1-3_i386.deb
Checksums-Sha256: 
 dcd81d11946a53567c70a6f569821a2a663b7fdb2d3a9f91ba76047d12c4784f 1027 
yorick-ml4_0.5.1-3.dsc
 6b28f329e5bcde275c58dca4e9c7d836c248fa3230738700ae4fe1515829c3ef 4943 
yorick-ml4_0.5.1-3.diff.gz
 5356b626b47324b914fb32c5eab4948e4e2ee6bace6ccfa6cf26d7eeb80a 13558 
yorick-ml4_0.5.1-3_i386.deb
Files: 
 774497d2a335c6af5e271f0bf70cf22e 1027 math optional yorick-ml4_0.5.1-3.dsc
 6eb8f67126e522317b844e285b73a384 4943 math optional yorick-ml4_0.5.1-3.diff.gz
 7b8e6a3b62765f667048e856195a9fbe 13558 math optional 
yorick-ml4_0.5.1-3_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkklZ6gACgkQ+37NkUuUiPHnmgCfUt79DmaVpKWXv7jUbQe8N8ej
IgwAnjMNe7HuMft0aQYIr9HY6hM+Q7Jz
=NG8p
-END PGP SIGNATURE-


--- End Message ---


Bug#505446: mlocate always creates empty database

2008-11-20 Thread Adeodato Simó
* Nigel Horne [Wed, 19 Nov 2008 08:12:19 +]:

> Here is my /etc/mtab

Can you send your /etc/fstab too? I'm curious whether the / bind mount
is defined there, or some script is doing it on their own.

-- 
Adeodato Simó dato at net.com.org.es
Debian Developer  adeodato at debian.org
 
The problem I have with making an intelligent statement is that some
people then think that it's not an isolated occurrance.
-- Simon Travaglia




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506268: CVE-2008-5160: allows remote attackers to cause a denial of service (daemon crash) via multiple invalid requests

2008-11-20 Thread Nico Golde
Hi,
* Raphael Geissert <[EMAIL PROTECTED]> [2008-11-20 09:32]:
> The following CVE (Common Vulnerabilities & Exposures) id was published for 
> msp-webserver.
> 
> CVE-2008-5160[1]:
 [...] 

Did you manage to reproduce that? Not reproducible for me 
with the unstable version.

Cheers
Nico
-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgp0MIXbQlzOw.pgp
Description: PGP signature


Bug#506297: yorick-ml4 is not 64bit-safe

2008-11-20 Thread Thibaut Paumard

Package: yorick-ml4
Version: 0.5.1-2
Severity: grave
Justification: renders package unusable

The package is completely broken under amd64. ml4write never returns,  
ml4read segfaults...


In ml4.c, the "info" array at the beginning of each ml4 variable must  
be of type int, not long.


I'm working on a fix.

Regards, Thibaut.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.25.9 (SMP w/4 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash

Versions of packages yorick-ml4 depends on:
ii  libc6  2.7-16GNU C Library: Shared  
libraries
ii  yorick 2.1.05+dfsg-6 interpreted language and  
scientifi


yorick-ml4 recommends no packages.

yorick-ml4 suggests no packages.

-- no debconf information




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506295: xgdvi: after a window is opened, the whole program blocks

2008-11-20 Thread Matej Kosik
Package: xgdvi
Version: 1.3.2-5
Severity: grave
Justification: renders package unusable

If I try to use this program, appropriate window appears but then the program 
does not react to any interaction. It is impossible to scroll the contents of 
the window, go to other pages of the document, resize the window. Nothing.

Here is one of the  example dvi files I tried
http://altair.sk/uploads/ccs.dvi
but I experienced the same behavior with any other dvi file I tried.

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages xgdvi depends on:
ii  libc6  2.7-15GNU C Library: Shared libraries
ii  libdvilib2-16  1.3.2-5   a portable DVI interpreter library
ii  libfreetype6   2.3.7-2   FreeType 2 font engine, shared lib
ii  libglib1.2ldbl 1.2.10-19 The GLib library of C routines
ii  libgtk1.2  1.2.10-18.1   The GIMP Toolkit set of widgets fo
ii  libkpathsea4   2007.dfsg.2-4 TeX Live: path search library for 
ii  libt1-55.1.2-3   Type 1 font rasterizer library - r
ii  libx11-6   2:1.1.5-2 X11 client-side library
ii  libxext6   2:1.0.4-1 X11 miscellaneous extension librar
ii  libxi6 2:1.1.3-1 X11 Input extension library
ii  vflib3 3.6.14.dfsg-1 Versatile Font Library

Versions of packages xgdvi recommends:
ii  texlive-extra-utils [dviut 2007.dfsg.2-4 TeX Live: TeX auxiliary programs

xgdvi suggests no packages.

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506296: spawg program runs, shows the window but always blocks afterward

2008-11-20 Thread Matej Kosik
Package: spawg
Version: 1.3.2-5
Severity: grave
Justification: renders package unusable

If I try to open any dvi file with spawg,
a window appears but the whole program blocks afterwards.
The window does not react to any interaction (such as
attempts to scroll the content of the dvi document,
move to other pages etc).

Here is an example dvi document I tried to open
http://altair.sk/uploads/ccs.dvi
but I am experiencing the same behavior with any other dvi file.

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages spawg depends on:
ii  libc6  2.7-15GNU C Library: Shared libraries
ii  libdvilib2-16  1.3.2-5   a portable DVI interpreter library
ii  libfreetype6   2.3.7-2   FreeType 2 font engine, shared lib
ii  libglib1.2ldbl 1.2.10-19 The GLib library of C routines
ii  libgtk1.2  1.2.10-18.1   The GIMP Toolkit set of widgets fo
ii  libkpathsea4   2007.dfsg.2-4 TeX Live: path search library for 
ii  libt1-55.1.2-3   Type 1 font rasterizer library - r
ii  libx11-6   2:1.1.5-2 X11 client-side library
ii  libxext6   2:1.0.4-1 X11 miscellaneous extension librar
ii  libxi6 2:1.1.3-1 X11 Input extension library
ii  vflib3 3.6.14.dfsg-1 Versatile Font Library

spawg recommends no packages.

spawg suggests no packages.

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#491621: File Your Claim !

2008-11-20 Thread Fondazion Di Vittorio
--
Fondazione di vitiirio Italy has 
choosen you among the 40 lucky 
recepient to receive 
$500.000.00USD,you are to contact 
Mrs Maria Carolla  with the 
following Ref:(N-222-6747, E-900-
56).and your personal details 
such as names and location.
Email:[EMAIL PROTECTED]

With Regards.
Sir Mario Domenico
Fondazion Officer



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#496896: Thanks, works fine now

2008-11-20 Thread Axel Beckert
Hi,

Trent W. Buck wrote:
> As Lenny now includes libglib2.0-0=2.16.6-1, this bug should not
> manifest.

just wanna acknowledge that the bug is really gone now. Thanks!

Regards, Axel
-- 
Axel Beckert - [EMAIL PROTECTED], [EMAIL PROTECTED] - http://noone.org/abe/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: closing 495501

2008-11-20 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.10.35
> # As Lenny now includes libglib2.0-0=2.16.6-1, this bug should not manifest.
> close 495501
Bug#495501: midori: segfaults on many webpages.
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug#496306: midori: segfault on slashdot.org
Bug#496896: midori: segfaults on cuil.com results
Bug closed, send any further explanations to Kapil Hari Paranjape <[EMAIL 
PROTECTED]>

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505446: mlocate always creates empty database

2008-11-20 Thread Nigel Horne

Sebastian Andrzej Siewior wrote:

* Nigel Horne | 2008-11-19 08:12:19 [+]:

  

Its a clean installation, the disc was formatted before installation.
If something is wrong it's nothing I've done!

Here is my /etc/mtab

/dev/sda6 / ext3 rw,noatime,errors=remount-ro 0 0
tmpfs /lib/init/rw tmpfs rw,nosuid,mode=0755 0 0
proc /proc proc rw,noexec,nosuid,nodev 0 0
sysfs /sys sysfs rw,noexec,nosuid,nodev 0 0
procbususb /proc/bus/usb usbfs rw 0 0
udev /dev tmpfs rw,mode=0755 0 0
tmpfs /dev/shm tmpfs rw,nosuid,nodev 0 0
devpts /dev/pts devpts rw,noexec,nosuid,gid=5,mode=620 0 0
fusectl /sys/fs/fuse/connections fusectl rw 0 0
/dev/sdb2 /home ext3 rw,noatime 0 0
/dev/sda2 /mnt/c fuseblk rw,allow_other,blksize=4096 0 0
/dev/sdb1 /mnt/d fuseblk rw,allow_other,blksize=4096 0 0
/ / bind rw,bind 0 0
/home /home bind rw,bind 0 0
rpc_pipefs /var/lib/nfs/rpc_pipefs rpc_pipefs rw 0 0
automount(pid3573) /net autofs rw,fd=4,pgrp=3573,minproto=2,maxproto=4 0 0
automount(pid3544) /smb autofs rw,fd=4,pgrp=3544,minproto=2,maxproto=4 0 0



You have your / and /home mounted onto itself + you have automount on
/net and /smb. This is not part of the a standard installation.
Either you have it by accident in your fstab or a chroot mount script
went wrong. I guess the latter.

Does your /proc/mounts contain a line like

|tmpfs / tmpfs rw,size=10240k,mode=755 0 0

? If so, than this is a *valid* bind mount.
  

No it doesn't.

Sebastian
  



--
Nigel Horne
ClamAV, The Open-Source GPL Multi-Platform Anti-Virus tool-kit




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#495501: closing 495501

2008-11-20 Thread Trent W . Buck
# Automatically generated email from bts, devscripts version 2.10.35
# As Lenny now includes libglib2.0-0=2.16.6-1, this bug should not manifest.
close 495501 




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#502100: marked as done (cups: socket backend hangs in tight select/read loop (larger printouts?))

2008-11-20 Thread Debian Bug Tracking System

Your message dated Thu, 20 Nov 2008 09:32:05 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#489045: fixed in cups 1.3.8-1lenny3
has caused the Debian Bug report #489045,
regarding cups: socket backend hangs in tight select/read loop (larger 
printouts?)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
489045: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=489045
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: cups
Version: 1.3.9-1

Hi,

(this did occur with 1.3.8-11 as well)

I have the suspicion that it seems to be larger printouts which make
the socket backend lock up entirely (up to about 10 pages worked fine multiple 
times,
however trying something larger locked up multiple times).

strace -f -p gives endless:

read(5, ""..., 1024)= 0
select(6, [5], [5], NULL, NULL) = 1 (in [5])
read(5, ""..., 1024)= 0
select(6, [5], [5], NULL, NULL) = 1 (in [5])
read(5,  
Process 9753 detached



# ltrace -f -p 9753
--- SIGSTOP (Stopped (signal)) ---
--- SIGSTOP (Stopped (signal)) ---



(gdb) attach 9753
Attaching to program: /usr/lib/cups/backend-available/socket, process 9753
(no debugging symbols found)
(no debugging symbols found)
(no debugging symbols found)
0xb7eee5ae in ?? ()
(gdb) bt
#0  0xb7eee5ae in ?? ()
#1  0xb7f6dff4 in ?? ()
#2  0xb7f6c33f in ?? ()
#3  0x0005 in ?? ()
#4  0xbfe6b768 in ?? ()
#5  0x0400 in ?? ()
#6  0x in ?? ()

A "fin" on frame 0 does _never_ return.

disas on any frame address fails (No function contains specified address.).
Corrupt stack??

Remote printer is hplj4000tn:9100, client connected via two routers (one WLAN).
Routers don't display any relevant firewall logs.

_no_ WLAN driver error messages (acx100).

Printout was a PDF file 2-paged via pdftops/psnup/ps2pdf (61 pages).

Admittedly a pretty problematic bug report, if you have some ideas to try,
then just yell.

Thanks,

Andreas Mohr


--- End Message ---
--- Begin Message ---
Source: cups
Source-Version: 1.3.8-1lenny3

We believe that the bug you reported is fixed in the latest version of
cups, which is due to be installed in the Debian FTP archive:

cups-bsd_1.3.8-1lenny3_i386.deb
  to pool/main/c/cups/cups-bsd_1.3.8-1lenny3_i386.deb
cups-client_1.3.8-1lenny3_i386.deb
  to pool/main/c/cups/cups-client_1.3.8-1lenny3_i386.deb
cups-common_1.3.8-1lenny3_all.deb
  to pool/main/c/cups/cups-common_1.3.8-1lenny3_all.deb
cups-dbg_1.3.8-1lenny3_i386.deb
  to pool/main/c/cups/cups-dbg_1.3.8-1lenny3_i386.deb
cups_1.3.8-1lenny3.diff.gz
  to pool/main/c/cups/cups_1.3.8-1lenny3.diff.gz
cups_1.3.8-1lenny3.dsc
  to pool/main/c/cups/cups_1.3.8-1lenny3.dsc
cups_1.3.8-1lenny3_i386.deb
  to pool/main/c/cups/cups_1.3.8-1lenny3_i386.deb
cupsys-bsd_1.3.8-1lenny3_all.deb
  to pool/main/c/cups/cupsys-bsd_1.3.8-1lenny3_all.deb
cupsys-client_1.3.8-1lenny3_all.deb
  to pool/main/c/cups/cupsys-client_1.3.8-1lenny3_all.deb
cupsys-common_1.3.8-1lenny3_all.deb
  to pool/main/c/cups/cupsys-common_1.3.8-1lenny3_all.deb
cupsys-dbg_1.3.8-1lenny3_all.deb
  to pool/main/c/cups/cupsys-dbg_1.3.8-1lenny3_all.deb
cupsys_1.3.8-1lenny3_all.deb
  to pool/main/c/cups/cupsys_1.3.8-1lenny3_all.deb
libcups2-dev_1.3.8-1lenny3_i386.deb
  to pool/main/c/cups/libcups2-dev_1.3.8-1lenny3_i386.deb
libcups2_1.3.8-1lenny3_i386.deb
  to pool/main/c/cups/libcups2_1.3.8-1lenny3_i386.deb
libcupsimage2-dev_1.3.8-1lenny3_i386.deb
  to pool/main/c/cups/libcupsimage2-dev_1.3.8-1lenny3_i386.deb
libcupsimage2_1.3.8-1lenny3_i386.deb
  to pool/main/c/cups/libcupsimage2_1.3.8-1lenny3_i386.deb
libcupsys2-dev_1.3.8-1lenny3_all.deb
  to pool/main/c/cups/libcupsys2-dev_1.3.8-1lenny3_all.deb
libcupsys2_1.3.8-1lenny3_all.deb
  to pool/main/c/cups/libcupsys2_1.3.8-1lenny3_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Martin Pitt <[EMAIL PROTECTED]> (supplier of updated cups package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 20 Nov 2008 09:05:35 +0100
Source: cups
Binary: libcups2 libcupsimage2 cups cups-client libcups2-dev libcupsimage2-dev 
cups-

Bug#489045: marked as done (cups: infinite loop, 100%CPU use, while trying to print with HPJetDirect)

2008-11-20 Thread Debian Bug Tracking System

Your message dated Thu, 20 Nov 2008 09:32:05 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#489045: fixed in cups 1.3.8-1lenny3
has caused the Debian Bug report #489045,
regarding cups: infinite loop, 100%CPU use, while trying to print with 
HPJetDirect
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
489045: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=489045
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: cups
Version: 1.3.7-7
Severity: grave
Justification: renders package unusable

Hi,

   Nothing happens when trying to print, even the test-page, to a HP 
4200 network printer through HPDirect.  If I run 'top', I see a process 
called 'socket' owned by user 'lp' that is using 100% of computer use.

   I first saw this problem several months ago when I was using 'etch' 
on my amd64 machine, but I did not reported a bug because my laptop 
(running i386 'sid') could print without problems in the same printer.  
So, I just thought it was an incompatibility of the etch version of cups 
with the printer.

   However, I'm now runnning 'lenny' on my amd64 machine (and thus I 
have the same version of cups in both computers) and I still have the 
same problem.

   Since no one else is reporting this problem, I guess is something 
very specific to amd64.

   I could not find errors messages anywhere to help with 
the debugging... so please let me know how else can I help.

Thank you very much,

  Patricio 



-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'stable'), (50, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.24-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/bash

Versions of packages cups depends on:
ii  adduser  3.108   add and remove users and groups
ii  cups-common  1.3.7-7 Common UNIX Printing System(tm) - 
ii  debconf [debconf-2.0]1.5.22  Debian configuration management sy
pi  ghostscript  8.62.dfsg.1-2.1 The GPL Ghostscript PostScript/PDF
ii  libavahi-compat-libdnssd 0.6.22-3Avahi Apple Bonjour compatibility 
ii  libc62.7-10  GNU C Library: Shared libraries
ii  libcups2 1.3.7-7 Common UNIX Printing System(tm) - 
pi  libcupsimage21.3.7-7 Common UNIX Printing System(tm) - 
ii  libdbus-1-3  1.2.1-2 simple interprocess messaging syst
ii  libgnutls26  2.4.0-2 the GNU TLS library - runtime libr
ii  libkrb53 1.6.dfsg.3-2MIT Kerberos runtime libraries
ii  libldap-2.4-22.4.9-1 OpenLDAP libraries
ii  libpam0g 0.99.7.1-6  Pluggable Authentication Modules l
ii  libpaper11.1.23  library for handling paper charact
ii  libslp1  1.2.1-7.3   OpenSLP libraries
ii  lsb-base 3.2-12  Linux Standard Base 3.2 init scrip
ii  perl-modules 5.10.0-11   Core Perl modules
ii  procps   1:3.2.7-8   /proc file system utilities
ii  ssl-cert 1.0.20  simple debconf wrapper for OpenSSL
ii  xpdf-utils [poppler-util 3.02-1.3Portable Document Format (PDF) sui

Versions of packages cups recommends:
ii  avahi-utils   0.6.22-3   Avahi browsing, publishing and dis
ii  cups-client   1.3.7-7Common UNIX Printing System(tm) - 
ii  foomatic-filters  3.0.2-20080211-3.1 OpenPrinting printer support - fil
ii  smbclient 2:3.0.30-3 a LanManager-like simple client fo

-- debconf information:
  cupsys/raw-print: true
  cupsys/backend: ipp, lpd, parallel, scsi, serial, socket, usb, snmp, dnssd


--- End Message ---
--- Begin Message ---
Source: cups
Source-Version: 1.3.8-1lenny3

We believe that the bug you reported is fixed in the latest version of
cups, which is due to be installed in the Debian FTP archive:

cups-bsd_1.3.8-1lenny3_i386.deb
  to pool/main/c/cups/cups-bsd_1.3.8-1lenny3_i386.deb
cups-client_1.3.8-1lenny3_i386.deb
  to pool/main/c/cups/cups-client_1.3.8-1lenny3_i386.deb
cups-common_1.3.8-1lenny3_all.deb
  to pool/main/c/cups/cups-common_1.3.8-1lenny3_all.deb
cups-dbg_1.3.8-1lenny3_i386.deb
  to pool/main/c/cups/cups-dbg_1.3.8-1lenny3_i386.deb
cups_1.3.8-1lenny3.diff.gz
  to pool/main/c/cups/cups_1.3.8-1lenny3.diff.gz
cups_1.3.8-1lenny3.dsc
  to pool/main/c/cups/cups_1.3.8-1lenny3.dsc
cups_1.3.8-1len

Processed: severity of 506286 is important

2008-11-20 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.10.35
> #bashisms are a release goal, not RC
> severity 506286 important
Bug#506286: ocaml: FTBFS using dash
Severity set to `important' from `serious'

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506286: severity of 506286 is important

2008-11-20 Thread Paul Wise
# Automatically generated email from bts, devscripts version 2.10.35
#bashisms are a release goal, not RC
severity 506286 important




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#506286: ocaml: FTBFS using dash

2008-11-20 Thread YOSHINO Yoshihito
Package: ocaml
Version: 3.11.0~beta1-1
Severity: serious
Justification: no longer builds from source

Build fails with the following message:

./configure: 1548: Syntax error: "(" unexpected (expecting ")")
make: *** [config-stamp] Error 2
dpkg-buildpackage: failure: debian/rules build gave error exit status 2

Build succeeded when I use bash ("bash ./configure" in debian/rules).

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-1-686 (SMP w/2 CPU cores)
Locale: LANG=ja_JP.UTF-8, LC_CTYPE=ja_JP.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages ocaml depends on:
ii  libx11-dev2:1.1.5-2  X11 client-side library (developme
ii  ocaml-base3.11.0~beta1-1 Runtime system for OCaml bytecode
ii  ocaml-nox 3.11.0~beta1-1 ML language implementation with a

ocaml recommends no packages.

Versions of packages ocaml suggests:
ii  tcl8.4-dev8.4.19-2   Tcl (the Tool Command Language) v8
ii  tk8.4-dev 8.4.19-2   Tk toolkit for Tcl and X11, v8.4 -

-- debconf-show failed



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]