Bug#698112: asterisk: Segfault when making a call after update to 1.6.2.9-2+squeeze9

2013-01-14 Thread Dennis Rech
Package: asterisk
Version: 1:1.6.2.9-2+squeeze8
Severity: grave
Justification: renders package unusable


asterisk crashes when placing a call after a update to recent versions with 
apt-get

Upgrade: asterisk:i386 (1.6.2.9-2+squeeze8, 1.6.2.9-2+squeeze9), 
asterisk-sounds-main:i386 (1.6.2.9-2+squeeze8, 1.6.2.9-2+squeeze9), 
asterisk-config:i386 (1.6.2.9-2+squeeze8, 1.6.2.9-2+squeeze9)

Error:

[9058168.846934] asterisk[2585]: segfault at 1 ip b7493b77 sp b5415684 error 4 
in libc-2.11.3.so[b741e000+14]
[9058212.632085] asterisk[2709]: segfault at 1 ip b748db77 sp b540f684 error 4 
in libc-2.11.3.so[b7418000+14]



-- System Information:
Debian Release: 6.0.6
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/4 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages asterisk depends on:
ii  adduser3.112+nmu2add and remove users and groups
ii  asterisk-config1:1.6.2.9-2+squeeze8  Configuration files for Asterisk
ii  asterisk-sounds-ma 1:1.6.2.9-2+squeeze8  Core Sound files for Asterisk (Eng
ii  dahdi  1:2.2.1.1-1   utilities for using the DAHDI kern
ii  libasound2 1.0.23-2.1shared library for ALSA applicatio
ii  libc-client2007e   8:2007e~dfsg-3.1  c-client library for mail protocol
ii  libc6  2.11.3-4  Embedded GNU C Library: Shared lib
ii  libcap21:2.19-3  support for getting/setting POSIX.
ii  libcurl3   7.21.0-2.1+squeeze2   Multi-protocol file transfer libra
ii  libgcc11:4.4.5-8 GCC support library
ii  libglib2.0-0   2.24.2-1  The GLib library of C routines
ii  libgmime-2.0-2a2.2.25-2  MIME library
ii  libgsm11.0.13-3  Shared libraries for GSM speech co
ii  libiksemel31.2-4 C library for the Jabber IM platfo
ii  libjack-jackd2-0 [ 1.9.6~dfsg.1-2JACK Audio Connection Kit (librari
ii  libldap-2.4-2  2.4.23-7.2OpenLDAP libraries
ii  liblua5.1-05.1.4-5   Simple, extensible, embeddable pro
ii  libncurses55.7+20100313-5shared libraries for terminal hand
ii  libnewt0.520.52.11-1 Not Erik's Windowing Toolkit - tex
ii  libogg01.2.0~dfsg-1  Ogg bitstream library
ii  libopenais31.1.2-2   Standards-based cluster framework 
ii  libopenr2-31.3.0-2   MFC/R2 (telephony) call setup libr
ii  libpopt0   1.16-1lib for parsing cmdline parameters
ii  libpq5 8.4.13-0squeeze1  PostgreSQL C client library
ii  libpri1.4  1.4.11.3-1Primary Rate ISDN specification li
ii  libradiusclient-ng 0.5.6-1.1 Enhanced RADIUS client library
ii  libresample1   0.1.3-3   real-time audio resampling library
ii  libsdl1.2debian1.2.14-6.1Simple DirectMedia Layer
ii  libsnmp15  5.4.3~dfsg-2  SNMP (Simple Network Management Pr
ii  libspandsp20.0.6~pre12-1 Telephony signal processing librar
ii  libspeex1  1.2~rc1-1 The Speex codec runtime library
ii  libspeexdsp1   1.2~rc1-1 The Speex extended runtime library
ii  libsqlite0 2.8.17-6  SQLite shared library
ii  libss7-1   1.0.2-1   Signalling System 7 (ss7) library
ii  libssl0.9.80.9.8o-4squeeze13 SSL shared libraries
ii  libstdc++6 4.4.5-8   The GNU Standard C++ Library v3
ii  libsybdb5  0.82-7libraries for connecting to MS SQL
ii  libtiff4   3.9.4-5+squeeze8  Tag Image File Format (TIFF) libra
ii  libtonezone2.0 1:2.2.1.1-1   tonezone library (runtime)
ii  libvorbis0a1.3.1-1+squeeze1  The Vorbis General Audio Compressi
ii  libvorbisenc2  1.3.1-1+squeeze1  The Vorbis General Audio Compressi
ii  libvpb04.2.52-2  Voicetronix telephony hardware use
ii  libx11-6   2:1.3.3-4 X11 client-side library
ii  libxml22.7.8.dfsg-2+squeeze6 GNOME XML library
ii  unixodbc   2.2.14p2-1ODBC tools libraries
ii  zlib1g 1:1.2.3.4.dfsg-3  compression library - runtime

Versions of packages asterisk recommends:
ii  sox   14.3.1-1   Swiss army knife of sound processi

Versions of packages asterisk suggests:
pn  asterisk-dev  none (no description available)
pn  asterisk-doc  none (no description available)
pn  asterisk-h323 none (no description available)

-- Configuration Files:
/etc/default/asterisk changed [not included]
/etc/logrotate.d/asterisk changed [not included]

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of 

Bug#698115: dcap and dicom3tools: error when trying to install together

2013-01-14 Thread Ralf Treinen
Package: dicom3tools,dcap
Version: dicom3tools/1.0~20121227-1
Version: dcap/2.47.7-1
Severity: serious
User: trei...@debian.org
Usertags: edos-file-overwrite

Date: 2013-01-14
Architecture: amd64
Distribution: sid

Hi,

automatic installation tests of packages that share a file and at the
same time do not conflict by their package dependency relationships has
detected the following problem:


WARNING: The following packages cannot be authenticated!
  libdcap1 dcap dicom3tools
Authentication warning overridden.
Can not write log, openpty() failed (/dev/pts not mounted?)
Selecting previously unselected package libdcap1.
(Reading database ... 10762 files and directories currently installed.)
Unpacking libdcap1 (from .../libdcap1_2.47.7-1_amd64.deb) ...
Selecting previously unselected package dcap.
Unpacking dcap (from .../dcap_2.47.7-1_amd64.deb) ...
Selecting previously unselected package dicom3tools.
Unpacking dicom3tools (from .../dicom3tools_1.0~20121227-1_amd64.deb) ...
dpkg: error processing 
/var/cache/apt/archives/dicom3tools_1.0~20121227-1_amd64.deb (--unpack):
 trying to overwrite '/usr/share/man/man1/dccp.1.gz', which is also in package 
dcap 2.47.7-1
dpkg-deb: error: subprocess paste was killed by signal (Broken pipe)
Processing triggers for man-db ...
Errors were encountered while processing:
 /var/cache/apt/archives/dicom3tools_1.0~20121227-1_amd64.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)


This is a serious bug as it makes installation fail, and violates
sections 7.6.1 and 10.1 of the policy. An optimal solution would
consist in only one of the packages installing that file, and renaming
or removing the file in the other package. Depending on the
circumstances you might also consider Replace relations or file
diversions. If the conflicting situation cannot be resolved then, as a
last resort, the two packages have to declare a mutual
Conflict. Please take into account that Replaces, Conflicts and
diversions should only be used when packages provide different
implementations for the same functionality.

Here is a list of files that are known to be shared by both packages
(according to the Contents file for sid/amd64, which may be
slightly out of sync):

  /usr/bin/dccp
  /usr/share/man/man1/dccp.1.gz

This bug has been filed against both packages. If you, the maintainers of
the two packages in question, have agreed on which of the packages will
resolve the problem please reassign the bug to that package. You may then
also register in the BTS that the other package is affected by the bug.

-Ralf.

PS: for more information about the detection of file overwrite errors
of this kind see http://edos.debian.net/file-overwrites/.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698108: jdk7u11 not supported

2013-01-14 Thread Simon Vos
Hi,

This problem seems related to
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=597294. For oracle jdk 1.6
2 digits update numbers are supported, but for 1.7 only 1 digits is
supported.

/usr/share/java-package/oracle-j2sdk.sh contains
'jdk-7u[0-9]-linux-i586.tar.gz' instead of
'jdk-7u[0-9][0-9]-linux-i586.tar.gz' and
 'jdk-7u[0-9][0-9]-linux-x64.tar.gz' instead
of 'jdk-7u[0-9]-linux-x64.tar.gz'.


Bug#693577: libfso-glib: not properly built from source (actual source is in fso-specs)

2013-01-14 Thread Simon McVittie
On 13/01/13 00:25, Paul Wise wrote:
 On Sat, 2013-01-12 at 21:44 +, Simon McVittie wrote:
 This sounds very familiar. I considered this approach for
 Telepathy, but rejected it because of problems like this.
 
 BTW, Debian strongly discourages embedded code copies:
 
 https://wiki.debian.org/EmbeddedCodeCopies

I know, but D-Bus interface XML is pretty far from being code - the
closest equivalent that you'd call code would be C headers that don't
have any inline functions or macros. It can't have bugs other than
design flaws and feature requests, and the closest it can get to a
security bug is implementations of this method that obey its
documentation can't be secure (which would still be a bug in the
implementation, IMO).

 Personally, I think the solution is to merge the specs into the
 library source package and drop the specs source package.

If there's only one library, this is functionally equivalent; in
Debian, telepathy-spec is only provided as documentation.

 Unless the specs are used in multiple source packages, then the
 solution is the one used by libshr-glib (use Built-Using and don't
 ship pre-generated files).

Not shipping pre-generated files, sure. Telepathy doesn't do that
either; we do the code-generation at build-time.

I still think importing D-Bus interfaces from another source package,
if they affect your ABI, is actively harmful: it makes the ABI of the
current source package depend on an external factor. To make the ABI
predictable you'd need a (= something) dependency, at which point
you'd have to do sourceful uploads of every affected package in lockstep.

S


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698112: asterisk: Segfault when making a call after update to 1.6.2.9-2+squeeze9

2013-01-14 Thread Tzafrir Cohen
On Mon, Jan 14, 2013 at 08:38:35AM +0100, Dennis Rech wrote:
 Package: asterisk
 Version: 1:1.6.2.9-2+squeeze8
 Severity: grave
 Justification: renders package unusable
 
 
 asterisk crashes when placing a call after a update to recent versions with 
 apt-get
 
 Upgrade: asterisk:i386 (1.6.2.9-2+squeeze8, 1.6.2.9-2+squeeze9), 
 asterisk-sounds-main:i386 (1.6.2.9-2+squeeze8, 1.6.2.9-2+squeeze9), 
 asterisk-config:i386 (1.6.2.9-2+squeeze8, 1.6.2.9-2+squeeze9)
 
 Error:
 
 [9058168.846934] asterisk[2585]: segfault at 1 ip b7493b77 sp b5415684 error 
 4 in libc-2.11.3.so[b741e000+14]
 [9058212.632085] asterisk[2709]: segfault at 1 ip b748db77 sp b540f684 error 
 4 in libc-2.11.3.so[b7418000+14]

How asy is this issue to reproduce? What type of call? SIP? TCP?

Could you please install asterisk-dbg and gdb, run asterisk as:

cd /var/spool/asterisk
asterisk -U asterisk -g -c

and reproduce the issue

Then run:

  gdb -c core /usr/sbin/asterisk

and in the prompt of gdb run:

 bt
 bt full

and provide the output here.

-- 
   Tzafrir Cohen
icq#16849755  jabber:tzafrir.co...@xorcom.com
+972-50-7952406   mailto:tzafrir.co...@xorcom.com
http://www.xorcom.com  iax:gu...@local.xorcom.com/tzafrir


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698118: asterisk: version 1:1.6.2.9-2+squeeze9 crashes on SIP call, +squeeze6 does not

2013-01-14 Thread Diego Guella
Package: asterisk
Version: 1:1.6.2.9-2+squeeze9
Severity: grave
Justification: renders package unusable

I have a production, fully working asterisk server.
I use many Siemens C470IP cordless phones on the office, they are SIP peers in 
my asterisk installation.
I had asterisk and asterisk-config version 1:1.6.2.9-2+squeeze6 installed, 
and all was working nicely.
Today, I updated to 1.6.2.9-2+squeeze9 and found out that asterisk seems 
working, but as soon as I do a SIP call with the cordless, asterisk crashes 
suddenly.
I reverted to 1.6.2.9-2+squeeze6 since this is a production asterisk and I 
can't have downtimes.
This is Debian Stable! A package should not break like this :(

Cheers,
Diego Guella



-- System Information:
Debian Release: 6.0.6
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-amd64 (SMP w/4 CPU cores)
Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages asterisk depends on:
ii  adduser3.112+nmu2add and remove users and groups
ii  asterisk-config1:1.6.2.9-2+squeeze9  Configuration files for Asterisk
ii  asterisk-core-soun 1.4.19-1  asterisk PBX sound files - English
ii  dahdi  1:2.2.1.1-1   utilities for using the DAHDI kern
ii  libasound2 1.0.23-2.1shared library for ALSA applicatio
ii  libc-client2007e   8:2007e~dfsg-3.1  c-client library for mail protocol
ii  libc6  2.11.3-4  Embedded GNU C Library: Shared lib
ii  libcap21:2.19-3  support for getting/setting POSIX.
ii  libcurl3   7.21.0-2.1+squeeze2   Multi-protocol file transfer libra
ii  libgcc11:4.4.5-8 GCC support library
ii  libglib2.0-0   2.24.2-1  The GLib library of C routines
ii  libgmime-2.0-2a2.2.25-2  MIME library
ii  libgsm11.0.13-3  Shared libraries for GSM speech co
ii  libiksemel31.2-4 C library for the Jabber IM platfo
ii  libjack-jackd2-0 [ 1.9.6~dfsg.1-2JACK Audio Connection Kit (librari
ii  libldap-2.4-2  2.4.23-7.2OpenLDAP libraries
ii  liblua5.1-05.1.4-5   Simple, extensible, embeddable pro
ii  libncurses55.7+20100313-5shared libraries for terminal hand
ii  libnewt0.520.52.11-1 Not Erik's Windowing Toolkit - tex
ii  libogg01.2.0~dfsg-1  Ogg bitstream library
ii  libopenais31.1.2-2   Standards-based cluster framework 
ii  libopenr2-31.3.0-2   MFC/R2 (telephony) call setup libr
ii  libpopt0   1.16-1lib for parsing cmdline parameters
ii  libpq5 8.4.13-0squeeze1  PostgreSQL C client library
ii  libpri1.4  1.4.11.3-1Primary Rate ISDN specification li
ii  libradiusclient-ng 0.5.6-1.1 Enhanced RADIUS client library
ii  libresample1   0.1.3-3   real-time audio resampling library
ii  libsdl1.2debian1.2.14-6.1Simple DirectMedia Layer
ii  libsnmp15  5.4.3~dfsg-2  SNMP (Simple Network Management Pr
ii  libspandsp20.0.6~pre12-1 Telephony signal processing librar
ii  libspeex1  1.2~rc1-1 The Speex codec runtime library
ii  libspeexdsp1   1.2~rc1-1 The Speex extended runtime library
ii  libsqlite0 2.8.17-6  SQLite shared library
ii  libss7-1   1.0.2-1   Signalling System 7 (ss7) library
ii  libssl0.9.80.9.8o-4squeeze13 SSL shared libraries
ii  libstdc++6 4.4.5-8   The GNU Standard C++ Library v3
ii  libsybdb5  0.82-7libraries for connecting to MS SQL
ii  libtiff4   3.9.4-5+squeeze8  Tag Image File Format (TIFF) libra
ii  libtonezone2.0 1:2.2.1.1-1   tonezone library (runtime)
ii  libvorbis0a1.3.1-1+squeeze1  The Vorbis General Audio Compressi
ii  libvorbisenc2  1.3.1-1+squeeze1  The Vorbis General Audio Compressi
ii  libvpb04.2.52-2  Voicetronix telephony hardware use
ii  libx11-6   2:1.3.3-4 X11 client-side library
ii  libxml22.7.8.dfsg-2+squeeze6 GNOME XML library
ii  unixodbc   2.2.14p2-1ODBC tools libraries
ii  zlib1g 1:1.2.3.4.dfsg-3  compression library - runtime

Versions of packages asterisk recommends:
ii  sox  14.3.1-1+b1 Swiss army knife of sound processi

Versions of packages asterisk suggests:
pn  asterisk-dev  none (no description available)
pn  asterisk-doc  none (no description available)
pn  asterisk-h323 none (no description available)

-- Configuration Files:
/etc/logrotate.d/asterisk changed:

Bug#698112: asterisk: Segfault when making a call after update to 1.6.2.9-2+squeeze9

2013-01-14 Thread Dennis Rech

I've tried it on another system. Heres the output:

Core was generated by `asterisk -U asterisk -g -c'.
Program terminated with signal 11, Segmentation fault.
#0  0xb74e8b77 in strchrnul () from /lib/i686/cmov/libc.so.6
(gdb) bt
#0  0xb74e8b77 in strchrnul () from /lib/i686/cmov/libc.so.6
#1  0xb74afd78 in vfprintf () from /lib/i686/cmov/libc.so.6
#2  0xb74d2e30 in vsnprintf () from /lib/i686/cmov/libc.so.6
#3  0x080a683a in ast_devstate_changed (state=AST_DEVICE_UNKNOWN, 
cachable=AST_DEVSTATE_CACHABLE, fmt=0x1 Address 0x1 out of bounds) at 
devicestate.c:524
#4  0xb5b7d4be in update_call_counter (fup=value optimized out, 
event=value optimized out) at chan_sip.c:5914
#5  0xb5baa61b in handle_request_invite (p=value optimized out, 
req=value optimized out, debug=0, seqno=38802, sin=0xb54a822c, 
recount=0xb54a7cbc,
e=0xb4f97793 sip:3...@obelisk.wikon.de;user=phone, 
nounlock=0xb54a7cb8) at chan_sip.c:20297
#6  0xb5bb1000 in handle_incoming (p=value optimized out, req=value 
optimized out, sin=0xb54a822c, recount=0xb54a7cbc, nounlock=0xb54a7cb8)

at chan_sip.c:21984
#7  0xb5bb22e0 in handle_request_do (req=value optimized out, 
sin=value optimized out) at chan_sip.c:22296
#8  0xb5bb3af0 in sipsock_read (id=0x878a388, fd=13, events=1, 
ignore=0x0) at chan_sip.c:22185

#9  0x080cf2e5 in ast_io_wait (ioc=0x8750b60, howlong=1000) at io.c:288
#10 0xb5b8a273 in do_monitor (data=0x0) at chan_sip.c:22757
#11 0x0812ddc7 in dummy_start (data=0x878a7a0) at utils.c:967
#12 0xb732d955 in start_thread () from /lib/i686/cmov/libpthread.so.0
#13 0xb753f1de in clone () from /lib/i686/cmov/libc.so.6



(gdb) bt full
#0  0xb74e8b77 in strchrnul () from /lib/i686/cmov/libc.so.6
No symbol table info available.
#1  0xb74afd78 in vfprintf () from /lib/i686/cmov/libc.so.6
No symbol table info available.
#2  0xb74d2e30 in vsnprintf () from /lib/i686/cmov/libc.so.6
No symbol table info available.
#3  0x080a683a in ast_devstate_changed (state=AST_DEVICE_UNKNOWN, 
cachable=AST_DEVSTATE_CACHABLE, fmt=0x1 Address 0x1 out of bounds) at 
devicestate.c:524
buf = \000mJ\265\000mJ\265\340lJ\265\270\207\371\264\Marco 
Spann\ 
sip:65\000ob`\030L\267\370mJ\265w\376\062\267\000\000\000\000i\022\063\267phon\324\302M\267ag=c\023\034\000\000\364_[\267
#4  0xb5b7d4be in update_call_counter (fup=value optimized out, 
event=value optimized out) at chan_sip.c:5914
name = 65, '\000' repeats 78 times, 
P3x\b\000\000\000\000xnJ\265\024}J\265\000\000\000\000\360|J\265\000\000\000\000\200w\371\264\017\000\000\000\224@\273\265\f\000\000\000rz\371\264, 
'\000' repeats 12 times, 
p\206\274\265\241z\371\264\000\000\000\000\310nJ\265\246.\265\265\274nJ\265\002\000\023\242\254\036\325\005p\206\274\265\241z\371\264\242\023\000\000\000\000\000\000\005\000\000\000\001\000\000\000\377\377\377\377\000\000\000\000\003, 
'\000' repeats 23 times, \017\001\000\000\001\000\000\000\016, 
'\000' repeats 11 times, XvJ\265p\206\274\265

outgoing = 0
p = 0x8796368
__PRETTY_FUNCTION__ = update_call_counter
#5  0xb5baa61b in handle_request_invite (p=value optimized out, 
req=value optimized out, debug=0, seqno=38802, sin=0xb54a822c, 
recount=0xb54a7cbc,
e=0xb4f97793 sip:3...@obelisk.wikon.de;user=phone, 
nounlock=0xb54a7cb8) at chan_sip.c:20297

res = value optimized out
gotdest = -1253413064
p_replaces = value optimized out
replace_id = value optimized out
refer_locked = 0
required = 0xb5bb779a 
required_profile = value optimized out
c = value optimized out
reinvite = -1245936016
rtn = value optimized out
p_uac_se_hdr = value optimized out
p_uac_min_se = value optimized out
uac_max_se = -1
uac_min_se = -1
st_active = value optimized out
st_interval = -1246005350
st_ref = SESSION_TIMER_REFRESHER_AUTO
dlg_min_se = value optimized out
pickup = {exten = '\000' repeats 79 times, context = '\000' 
repeats 79 times}

__PRETTY_FUNCTION__ = handle_request_invite
#6  0xb5bb1000 in handle_incoming (p=value optimized out, req=value 
optimized out, sin=0xb54a822c, recount=0xb54a7cbc, nounlock=0xb54a7cb8)

at chan_sip.c:21984
cmd = value optimized out
cseq = value optimized out
useragent = value optimized out
seqno = 38802
   len = value optimized out
respid = value optimized out
res = value optimized out
debug = 0
e = value optimized out
oldmethod = 6
acked = value optimized out
__PRETTY_FUNCTION__ = handle_incoming
#7  0xb5bb22e0 in handle_request_do (req=value optimized out, 
sin=value optimized out) at chan_sip.c:22296

p = value optimized out
recount = 0
nounlock = 0
lockretry = 10
__PRETTY_FUNCTION__ = handle_request_do
#8  0xb5bb3af0 in sipsock_read (id=0x878a388, fd=13, events=1, 
ignore=0x0) at chan_sip.c:22185
req = {rlPart1 = 0, 

Bug#698112: Segfault when making a call after update to 1.6.2.9-2+squeeze9

2013-01-14 Thread Guillaume Rousseau
Package: asterisk
Severity: normal


Got more details with gdb, using asterisk debugging procedure (bt, bt full, and 
thread apply all bt):

#0  0xb74fbb77 in strchrnul () from /lib/i686/cmov/libc.so.6
#1  0xb74c2d78 in vfprintf () from /lib/i686/cmov/libc.so.6
#2  0xb74e5e30 in vsnprintf () from /lib/i686/cmov/libc.so.6
#3  0x080a683a in ast_devstate_changed ()
#4  0xb69384be in ?? () from /usr/lib/asterisk/modules/chan_sip.so
#5  0xb696561b in ?? () from /usr/lib/asterisk/modules/chan_sip.so
#6  0xb696c000 in ?? () from /usr/lib/asterisk/modules/chan_sip.so
#7  0xb696d2e0 in ?? () from /usr/lib/asterisk/modules/chan_sip.so
#8  0xb696eaf0 in ?? () from /usr/lib/asterisk/modules/chan_sip.so
#9  0x080cf2e5 in ast_io_wait ()
#10 0xb6945273 in ?? () from /usr/lib/asterisk/modules/chan_sip.so
#11 0x0812ddc7 in ?? ()
#12 0xb7340955 in start_thread () from /lib/i686/cmov/libpthread.so.0
#13 0xb75521de in clone () from /lib/i686/cmov/libc.so.6
#0  0xb74fbb77 in strchrnul () from /lib/i686/cmov/libc.so.6
No symbol table info available.
#1  0xb74c2d78 in vfprintf () from /lib/i686/cmov/libc.so.6
No symbol table info available.
#2  0xb74e5e30 in vsnprintf () from /lib/i686/cmov/libc.so.6
No symbol table info available.
#3  0x080a683a in ast_devstate_changed ()
No symbol table info available.
#4  0xb69384be in ?? () from /usr/lib/asterisk/modules/chan_sip.so
No symbol table info available.
#5  0xb696561b in ?? () from /usr/lib/asterisk/modules/chan_sip.so
No symbol table info available.
#6  0xb696c000 in ?? () from /usr/lib/asterisk/modules/chan_sip.so
No symbol table info available.
#7  0xb696d2e0 in ?? () from /usr/lib/asterisk/modules/chan_sip.so
No symbol table info available.
#8  0xb696eaf0 in ?? () from /usr/lib/asterisk/modules/chan_sip.so
No symbol table info available.
#9  0x080cf2e5 in ast_io_wait ()
No symbol table info available.
#10 0xb6945273 in ?? () from /usr/lib/asterisk/modules/chan_sip.so
No symbol table info available.
#11 0x0812ddc7 in ?? ()
No symbol table info available.
#12 0xb7340955 in start_thread () from /lib/i686/cmov/libpthread.so.0
No symbol table info available.
#13 0xb75521de in clone () from /lib/i686/cmov/libc.so.6
No symbol table info available.

Thread 37 (Thread 7401):
#0  0xb777b424 in __kernel_vsyscall ()
#1  0xb7344fcf in pthread_cond_wait@@GLIBC_2.3.2 () from 
/lib/i686/cmov/libpthread.so.0
#2  0xb755f14d in pthread_cond_wait () from /lib/i686/cmov/libc.so.6
#3  0x080d552c in ?? ()
#4  0x0812ddc7 in ?? ()
#5  0xb7340955 in start_thread () from /lib/i686/cmov/libpthread.so.0
#6  0xb75521de in clone () from /lib/i686/cmov/libc.so.6

Thread 36 (Thread 7427):
#0  0xb777b424 in __kernel_vsyscall ()
#1  0xb75449a6 in poll () from /lib/i686/cmov/libc.so.6
#2  0x080cf27c in ast_io_wait ()
#3  0xb6646ac3 in ?? () from /usr/lib/asterisk/modules/chan_iax2.so
#4  0x0812ddc7 in ?? ()
#5  0xb7340955 in start_thread () from /lib/i686/cmov/libpthread.so.0
#6  0xb75521de in clone () from /lib/i686/cmov/libc.so.6

Thread 35 (Thread 7398):
#0  0xb777b424 in __kernel_vsyscall ()
#1  0xb754309b in read () from /lib/i686/cmov/libc.so.6
#2  0x0813adf6 in ?? ()
#3  0x08136458 in el_getc ()
#4  0x0813665f in el_gets ()
#5  0x08078770 in main ()

Thread 34 (Thread 7431):
#0  0xb777b424 in __kernel_vsyscall ()
#1  0xb751d2a6 in nanosleep () from /lib/i686/cmov/libc.so.6
#2  0xb67ef86b in ?? () from /usr/lib/asterisk/modules/func_lock.so
#3  0x0812ddc7 in ?? ()
#4  0xb7340955 in start_thread () from /lib/i686/cmov/libpthread.so.0
#5  0xb75521de in clone () from /lib/i686/cmov/libc.so.6

Thread 33 (Thread 7430):
#0  0xb777b424 in __kernel_vsyscall ()
#1  0xb75449a6 in poll () from /lib/i686/cmov/libc.so.6
#2  0x080cf27c in ast_io_wait ()
#3  0xb6772a9e in ?? () from /usr/lib/asterisk/modules/chan_unistim.so
#4  0x0812ddc7 in ?? ()
#5  0xb7340955 in start_thread () from /lib/i686/cmov/libpthread.so.0
#6  0xb75521de in clone () from /lib/i686/cmov/libc.so.6

Thread 32 (Thread 7429):
#0  0xb777b424 in __kernel_vsyscall ()
#1  0xb754b361 in select () from /lib/i686/cmov/libc.so.6
#2  0xb62456a3 in ?? () from /usr/lib/asterisk/modules/chan_phone.so
#3  0x0812ddc7 in ?? ()
#4  0xb7340955 in start_thread () from /lib/i686/cmov/libpthread.so.0
#5  0xb75521de in clone () from /lib/i686/cmov/libc.so.6

Thread 31 (Thread 7428):
#0  0xb777b424 in __kernel_vsyscall ()
#1  0xb75449a6 in poll () from /lib/i686/cmov/libc.so.6
#2  0xb602d0c4 in ?? () from /usr/lib/asterisk/modules/chan_dahdi.so
#3  0x0812ddc7 in ?? ()
#4  0xb7340955 in start_thread () from /lib/i686/cmov/libpthread.so.0
#5  0xb75521de in clone () from /lib/i686/cmov/libc.so.6

Thread 30 (Thread 7426):
#0  0xb777b424 in __kernel_vsyscall ()
#1  0xb7344fcf in pthread_cond_wait@@GLIBC_2.3.2 () from 
/lib/i686/cmov/libpthread.so.0
#2  0xb755f14d in pthread_cond_wait () from /lib/i686/cmov/libc.so.6
#3  0xb66713b6 in ?? () from /usr/lib/asterisk/modules/chan_iax2.so
#4  0x0812ddc7 in ?? ()
#5  0xb7340955 in start_thread () from /lib/i686/cmov/libpthread.so.0

Processed: affects 698118

2013-01-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 affects 698118 + security.debian.org release.debian.org
Bug #698118 [asterisk] asterisk: version 1:1.6.2.9-2+squeeze9 crashes on SIP 
call, +squeeze6 does not
Added indication that 698118 affects security.debian.org and release.debian.org
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
698118: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698118
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698112: confirmation

2013-01-14 Thread Václav Ovsík
Hi,
I can confirm this on i386 virtual machine:

Jan 14 09:13:28 ipbx kernel: [8686326.314568] asterisk[21321]: segfault at 1 ip 
b7501b77 sp b53dd684 error 4 in libc-2.11.3.so[b748c000+14]
Jan 14 09:29:12 ipbx kernel: [  167.335659] asterisk[1181]: segfault at 1 ip 
b751ab77 sp b53ba684 error 4 in libc-2.11.3.so[b74a5000+14]
Jan 14 09:33:51 ipbx kernel: [   36.331820] asterisk[1001]: segfault at 1 ip 
b7477b77 sp b5319684 error 4 in libc-2.11.3.so[b7402000+14]

I have downgraded to revision 2+squeeze8
Regards
-- 
Zito


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: tagging 697150

2013-01-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 697150 + sid
Bug #697150 [mtpfs] mtpfs should not depends on fuse-utils but on fuse
Added tag(s) sid.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
697150: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697150
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: severity of 697150 is serious

2013-01-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 697150 serious
Bug #697150 [mtpfs] mtpfs should not depends on fuse-utils but on fuse
Severity set to 'serious' from 'important'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
697150: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697150
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698112: Segfault when making a call after update to 1.6.2.9-2+squeeze9

2013-01-14 Thread Pierre Tourbeaux
Hello.

Same thing here. When I make a call from my SIP phone (UDP) asterisk
(1.6.2.9-2+squeeze9, arch amd64) crashes and segfaults :

Jan 13 23:18:23 hestia kernel: [42381160.134024] asterisk[2811]:
segfault at 0 ip 7fdaa3213f2a sp 7fda7bbf4968 error 4 in
libc-2.11.3.so[7fdaa3193000+159000]

Regards,
Pierre Tourbeaux


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#697150: mtpfs should not depends on fuse-utils but on fuse

2013-01-14 Thread Salvatore Bonaccorso
Hi

This now implies that mtpfs is not installable anymore in sid, as
fuse-utils transitional package was droppen in unstable. I have
increased thus the severity.

Regards,
Salvatore


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698112: asterisk: Segfault when making a call after update to 1.6.2.9-2+squeeze9

2013-01-14 Thread Dennis Rech

Dear Mr. Cohen,

after the update to squeeze9, the asterisk process restarts fine. When 
someone does a SIP call, the asterisk process immediately terminates 
with the described segmentation fault (according to dmesg). As the 
software is running on our production server infrastructure, I have 
performed a downgrade to squeeze8 again to ensure proper operation 
during our office hours. That's also the reason why I won't be able to 
upgrade again and debug the system now because I have to keep the 
telephony operational during office hours.


Maybe I can reproduce it with a test system, I'll keep you informed.

Regards,

Dennis Rech

Am 14.01.2013 09:36, schrieb Tzafrir Cohen:

On Mon, Jan 14, 2013 at 08:38:35AM +0100, Dennis Rech wrote:

Package: asterisk
Version: 1:1.6.2.9-2+squeeze8
Severity: grave
Justification: renders package unusable


asterisk crashes when placing a call after a update to recent versions with 
apt-get

Upgrade: asterisk:i386 (1.6.2.9-2+squeeze8, 1.6.2.9-2+squeeze9), 
asterisk-sounds-main:i386 (1.6.2.9-2+squeeze8, 1.6.2.9-2+squeeze9), 
asterisk-config:i386 (1.6.2.9-2+squeeze8, 1.6.2.9-2+squeeze9)

Error:

[9058168.846934] asterisk[2585]: segfault at 1 ip b7493b77 sp b5415684 error 4 
in libc-2.11.3.so[b741e000+14]
[9058212.632085] asterisk[2709]: segfault at 1 ip b748db77 sp b540f684 error 4 
in libc-2.11.3.so[b7418000+14]

How asy is this issue to reproduce? What type of call? SIP? TCP?

Could you please install asterisk-dbg and gdb, run asterisk as:

cd /var/spool/asterisk
asterisk -U asterisk -g -c

and reproduce the issue

Then run:

   gdb -c core /usr/sbin/asterisk

and in the prompt of gdb run:

  bt
  bt full

and provide the output here.




--

Mit freundlichen Grüßen / Best regards,

Dennis Rech
Dipl.-Inf. (TU)

WIKON Kommunikationstechnik GmbH
Entwicklung / IT

Luxemburger Str. 1-3, D-67657 Kaiserslautern
mailto:d...@wikon.de * http://www.wikon.de
Tel: +49-631-205777-64 * Fax: +49-631-205777-99

Haftungsausschluss: http://www.wikon.de/cms/de/kontakt-impressum/impressum.html
HR B-Nr: 2561, Kaiserslautern
Geschäftsführer: Joachim Molz und Andreas Konzelmann

==
 WIKON - Fernwirksysteme über GSM
==


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: severity of 694987 is serious

2013-01-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 694987 serious
Bug #694987 [obexfs] obexfs: depends on transitional package fuse-utils
Severity set to 'serious' from 'normal'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
694987: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694987
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698121: djmount: Depends on fuse-utils; uninstallable in sid

2013-01-14 Thread carnil
Package: djmount
Version: 0.71-5
Severity: serious
Tags: sid
User: car...@debian.org
Usertags: depends-on-fuse-utils

Hi

djmount 0.71-5 has a Depends on fuse-utils. In unstable fuse-utils
was dropped. This makes djmount uninstallable in sid. Wheezy is not
directly affected as the transitional package fuse-utils is still
present there, so tagging this 'sid' only.

Please change this dependency to fuse.

Regards,

Salvatore 


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698120: acetoneiso: Depends on fuse-utils; uninstallable in sid

2013-01-14 Thread carnil
Package: acetoneiso
Version: 2.3-2
Severity: serious
Tags: sid
User: car...@debian.org
Usertags: depends-on-fuse-utils

Hi

acetoneiso 2.3-2 has a Depends on fuse-utils. In unstable fuse-utils
was dropped. This makes acetoneiso uninstallable in sid. Wheezy is
not directly affected as the transitional package fuse-utils is still
present there, so tagging this 'sid' only.

Please change this dependency to fuse.

Regards,

Salvatore 


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698122: fuseext2: Depends on fuse-utils; uninstallable in sid

2013-01-14 Thread carnil
Package: fuseext2
Version: 0.4-1
Severity: serious
Tags: sid
User: car...@debian.org
Usertags: depends-on-fuse-utils

Hi

fuseext2 0.4-1 has a Depends on fuse-utils. In unstable fuse-utils
was dropped. This makes fuseext2 uninstallable in sid. Wheezy is not
directly affected as the transitional package fuse-utils is still
present there, so tagging this 'sid' only.

Please change this dependency to fuse.

Regards,

Salvatore 


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698123: fusefat: Depends on fuse-utils; uninstallable in sid

2013-01-14 Thread carnil
Package: fusefat
Version: 0.1a-1
Severity: serious
Tags: sid
User: car...@debian.org
Usertags: depends-on-fuse-utils

Hi

fusefat 0.1a-1 has a Depends on fuse-utils. In unstable fuse-utils
was dropped. This makes fusefat uninstallable in sid. Wheezy is not
directly affected as the transitional package fuse-utils is still
present there, so tagging this 'sid' only.

Please change this dependency to fuse.

Regards,

Salvatore 


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698124: fuseiso9660: Depends on fuse-utils; uninstallable in sid

2013-01-14 Thread carnil
Package: fuseiso9660
Version: 0.3-1
Severity: serious
Tags: sid
User: car...@debian.org
Usertags: depends-on-fuse-utils

Hi

fuseiso9660 0.3-1 has a Depends on fuse-utils. In unstable fuse-utils
was dropped. This makes fuseiso9660 uninstallable in sid. Wheezy is
not directly affected as the transitional package fuse-utils is still
present there, so tagging this 'sid' only.

Please change this dependency to fuse.

Regards,

Salvatore 


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698125: glusterfs-client: Depends on fuse-utils; uninstallable in sid

2013-01-14 Thread carnil
Package: glusterfs-client
Version: 3.2.7-3
Severity: serious
Tags: sid
User: car...@debian.org
Usertags: depends-on-fuse-utils

Hi

glusterfs-client 3.2.7-3 has a Depends on fuse-utils. In unstable
fuse-utils was dropped. This makes glusterfs-client uninstallable in
sid. Wheezy is not directly affected as the transitional package
fuse-utils is still present there, so tagging this 'sid' only.

Please change this dependency to fuse.

Regards,

Salvatore 


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698126: ifuse: Depends on fuse-utils; uninstallable in sid

2013-01-14 Thread carnil
Package: ifuse
Version: 1.0.0-1
Severity: serious
Tags: sid
User: car...@debian.org
Usertags: depends-on-fuse-utils

Hi

ifuse 1.0.0-1 has a Depends on fuse-utils. In unstable fuse-utils was
dropped. This makes ifuse uninstallable in sid. Wheezy is not
directly affected as the transitional package fuse-utils is still
present there, so tagging this 'sid' only.

Please change this dependency to fuse.

Regards,

Salvatore 


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698127: ltspfs: Depends on fuse-utils; uninstallable in sid

2013-01-14 Thread carnil
Package: ltspfs
Version: 1.1-2
Severity: serious
Tags: sid
User: car...@debian.org
Usertags: depends-on-fuse-utils

Hi

ltspfs 1.1-2 has a Depends on fuse-utils. In unstable fuse-utils was
dropped. This makes ltspfs uninstallable in sid. Wheezy is not
directly affected as the transitional package fuse-utils is still
present there, so tagging this 'sid' only.

Please change this dependency to fuse.

Regards,

Salvatore 


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698128: mhddfs: Depends on fuse-utils; uninstallable in sid

2013-01-14 Thread carnil
Package: mhddfs
Version: 0.1.39
Severity: serious
Tags: sid
User: car...@debian.org
Usertags: depends-on-fuse-utils

Hi

mhddfs 0.1.39 has a Depends on fuse-utils. In unstable fuse-utils was
dropped. This makes mhddfs uninstallable in sid. Wheezy is not
directly affected as the transitional package fuse-utils is still
present there, so tagging this 'sid' only.

Please change this dependency to fuse.

Regards,

Salvatore 


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698129: unionfs-fuse: Depends on fuse-utils; uninstallable in sid

2013-01-14 Thread carnil
Package: unionfs-fuse
Version: 0.24-2.1
Severity: serious
Tags: sid
User: car...@debian.org
Usertags: depends-on-fuse-utils

Hi

unionfs-fuse 0.24-2.1 has a Depends on fuse-utils. In unstable
fuse-utils was dropped. This makes unionfs-fuse uninstallable in sid.
Wheezy is not directly affected as the transitional package
fuse-utils is still present there, so tagging this 'sid' only.

Please change this dependency to fuse.

Regards,

Salvatore 


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698137: destroys icinga.cfg on postinst when it's a symlink

2013-01-14 Thread Peter Palfrader
Package: icinga-common
Version: 1.7.1-4
Severity: serious
Tags: patch

icinga-common's postinst has the following construct:

| cp -a -f $conffile $conffile.tmp
| sed -e ...  $conffile  $conffile.tmp

In my case, $conffile is a symlink:
} lrwxrwxrwx 1 root root 26 Nov  1 15:11 /etc/icinga/icinga.cfg - 
from-git/static/icinga.cfg

so the postinst does effectively sed  $file  $file, and we all know
that this doesn't work and results in $file being empty at the end.

I propose to use sed's -i instead:

(untested)
--- ./icinga-common.postinst2012-10-01 06:20:10.0 +
+++ /root/icinga-common.postinst2013-01-14 10:57:43.751049610 +
@@ -65,25 +65,20 @@
 
false)
check_external_commands=0
;;
esac
 
-   cp -a -f $conffile $conffile.tmp
-
# If the admin deleted or commented some variables but then set
# them via debconf, (re-)add them to the config file.
 
test -z $check_external_commands || \
grep -Eq '^ *check_external_commands=' $conffile || \
echo check_external_commands=  $conffile
 
-   sed -e s|^ 
*check_external_commands=.*|check_external_commands=$check_external_commands| \
-$conffile  $conffile.tmp
-
-   mv -f $conffile.tmp $conffile
+   sed -i -e s|^ 
*check_external_commands=.*|check_external_commands=$check_external_commands| 
$conffile
 
# Stop a not already stopped icinga instance,
# debhelper will start it again automatically at the bottom
status=$(/etc/init.d/icinga status /dev/null 21; echo $?)
 
if [ $status -ne 3 ]; then

Cheers,
weasel


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698112: asterisk: Segfault when making a call after update to 1.6.2.9-2+squeeze9

2013-01-14 Thread Tzafrir Cohen
tag 698112 pending
thanks

On Mon, Jan 14, 2013 at 10:03:55AM +0100, Dennis Rech wrote:
 I've tried it on another system. Heres the output:

Thanks. Issue traced to a typo (of my part) in one of the two patches:

http://anonscm.debian.org/viewvc/pkg-voip?view=revisionrevision=10073

I uploaded test packages to
http://people.debian.org/~tzafrir/ast_squeeze10/

-- 
   Tzafrir Cohen
icq#16849755  jabber:tzafrir.co...@xorcom.com
+972-50-7952406   mailto:tzafrir.co...@xorcom.com
http://www.xorcom.com  iax:gu...@local.xorcom.com/tzafrir


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#698112: asterisk: Segfault when making a call after update to 1.6.2.9-2+squeeze9

2013-01-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tag 698112 pending
Bug #698112 [asterisk] asterisk: Segfault when making a call after update to 
1.6.2.9-2+squeeze9
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
698112: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698112
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#696169: marked as done (texlive-base: fails to upgrade from 'sid' - trying to overwrite /usr/share/texmf/web2c/texmfcnf.lua)

2013-01-14 Thread Debian Bug Tracking System
Your message dated Mon, 14 Jan 2013 11:34:13 +
with message-id e1tuiiv-0004fo...@franck.debian.org
and subject line Bug#696169: fixed in texlive-base 2012.20130111-1
has caused the Debian Bug report #696169,
regarding texlive-base: fails to upgrade from 'sid' - trying to overwrite 
/usr/share/texmf/web2c/texmfcnf.lua
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
696169: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696169
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: texlive-base
Version: 2012.20121205-1
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts
Control: affects -1 + context

Hi,

during a test with piuparts I noticed your package fails to upgrade from
'sid' to 'experimental'.
It installed fine in 'sid', then the upgrade to 'experimental' fails
because it tries to overwrite other packages files without declaring a
Breaks+Replaces relation.

See policy 7.6 at
http://www.debian.org/doc/debian-policy/ch-relationships.html#s-replaces

From the attached log (scroll to the bottom...):

  Preparing to replace texlive-base 2012.20120611-5 (using 
.../texlive-base_2012.20121205-1_all.deb) ...
  Unpacking replacement texlive-base ...
  dpkg: error processing 
/var/cache/apt/archives/texlive-base_2012.20121205-1_all.deb (--unpack):
   trying to overwrite '/usr/share/texmf/web2c/texmfcnf.lua', which is also in 
package context 2012.05.30.20120611-1


cheers,

Andreas


context_2012.05.30.20121209-1.log.gz
Description: GNU Zip compressed data
---End Message---
---BeginMessage---
Source: texlive-base
Source-Version: 2012.20130111-1

We believe that the bug you reported is fixed in the latest version of
texlive-base, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 696...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Norbert Preining prein...@debian.org (supplier of updated texlive-base 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Fri, 11 Jan 2013 08:25:20 +0900
Source: texlive-base
Binary: texlive-base texlive-generic-recommended texlive-latex-base 
texlive-latex-recommended texlive-fonts-recommended texlive-pictures 
texlive-luatex texlive-metapost texlive-omega texlive-xetex texlive 
texlive-full texlive-common texlive-fonts-recommended-doc 
texlive-latex-base-doc texlive-latex-recommended-doc texlive-metapost-doc 
texlive-pictures-doc
Architecture: source all
Version: 2012.20130111-1
Distribution: experimental
Urgency: low
Maintainer: Debian TeX Maintainers debian-tex-ma...@lists.debian.org
Changed-By: Norbert Preining prein...@debian.org
Description: 
 texlive- TeX Live: A decent selection of the TeX Live packages
 texlive-base - TeX Live: Essential programs and files
 texlive-common - TeX Live: Base component
 texlive-fonts-recommended - TeX Live: Recommended fonts
 texlive-fonts-recommended-doc - TeX Live: Documentation files for 
texlive-fonts-recommended
 texlive-full - TeX Live: metapackage pulling in all components of TeX Live
 texlive-generic-recommended - TeX Live: Recommended generic packages
 texlive-latex-base - TeX Live: Basic LaTeX packages
 texlive-latex-base-doc - TeX Live: Documentation files for texlive-latex-base
 texlive-latex-recommended - TeX Live: LaTeX recommended packages
 texlive-latex-recommended-doc - TeX Live: Documentation files for 
texlive-latex-recommended
 texlive-luatex - TeX Live: LuaTeX packages
 texlive-metapost - TeX Live: MetaPost (and Metafont) drawing packages
 texlive-metapost-doc - TeX Live: Documentation files for texlive-metapost
 texlive-omega - TeX Live: Omega packages
 texlive-pictures - TeX Live: Graphics packages and programs
 texlive-pictures-doc - TeX Live: Documentation files for texlive-pictures
 texlive-xetex - TeX Live: XeTeX packages
Closes: 696169
Changes: 
 texlive-base (2012.20130111-1) experimental; urgency=low
 .
   * new upstream checkout
   * replace/breaks with older context versions shipping texmfcnf.lua
 (Closes: #696169)
Checksums-Sha1: 
 a8e81dba48a575e8c1d3c521e678be492e255fdc 2348 texlive-base_2012.20130111-1.dsc
 ef6043414dc8a3cf116d49d938f2ecf916ba4825 206783340 

Bug#697677: Processed: severity of 697150 is serious

2013-01-14 Thread Salvatore Bonaccorso
Control: reopen 697677
Control: found 697677 1.1-3
Control: tags 697677 + sid
Control: forcemerge 697677 697150

Hi Chris

Thanks for your quick reply :-)

On Mon, Jan 14, 2013 at 10:11:10AM +, Chris Lamb wrote:
 This was fixed in 1.1-3. Thanks for your work on this.

Hmm, apt-cache show mtpfs still shows:

Depends: libc6 (= 2.2.5), libfuse2 (= 2.8.1), libglib2.0-0 (= 2.31.8), 
libid3tag0 (= 0.15.1b), libmad0 (= 0.15.1b-3), libmtp9 (= 1.1.0), 
libusb-1.0-0 (= 2:1.0.8), zlib1g (= 1:1.1.4), fuse-utils

Regards,
Salvatore


signature.asc
Description: Digital signature


Processed: Re: Processed: severity of 697150 is serious

2013-01-14 Thread Debian Bug Tracking System
Processing control commands:

 reopen 697677
Bug #697677 {Done: Chris Lamb la...@debian.org} [mtpfs] mtpfs: Missing 
fuse-utils dependency
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
No longer marked as fixed in versions mtpfs/1.1-3.
 found 697677 1.1-3
Bug #697677 [mtpfs] mtpfs: Missing fuse-utils dependency
Marked as found in versions mtpfs/1.1-3.
 tags 697677 + sid
Bug #697677 [mtpfs] mtpfs: Missing fuse-utils dependency
Ignoring request to alter tags of bug #697677 to the same tags previously set
 forcemerge 697677 697150
Bug #697677 [mtpfs] mtpfs: Missing fuse-utils dependency
Bug #697150 [mtpfs] mtpfs should not depends on fuse-utils but on fuse
Severity set to 'grave' from 'serious'
Marked as found in versions mtpfs/1.1-3.
Merged 697150 697677

-- 
697150: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697150
697677: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697677
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698112: asterisk: Segfault when making a call after update to 1.6.2.9-2+squeeze9

2013-01-14 Thread Pierre Tourbeaux
Le lundi 14 janvier 2013 à 13:29 +0200, Tzafrir Cohen a écrit :
 tag 698112 pending
 thanks
 
 On Mon, Jan 14, 2013 at 10:03:55AM +0100, Dennis Rech wrote:
  I've tried it on another system. Heres the output:
 
 Thanks. Issue traced to a typo (of my part) in one of the two patches:
 
 http://anonscm.debian.org/viewvc/pkg-voip?view=revisionrevision=10073
 
 I uploaded test packages to
 http://people.debian.org/~tzafrir/ast_squeeze10/

Just installed your packages, it works.

Thanks,
Pierre Tourbeaux


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#697931: [Pkg-nagios-devel] Bug#697931: icinga: CVE-2012-6096

2013-01-14 Thread Alexander Wirt
tag 697931 patch
thanks

Alexander Wirt schrieb am Saturday, den 12. January 2013:

 On Fri, 11 Jan 2013, Moritz Muehlenhoff wrote:
 
  Package: icinga
  Severity: grave
  Tags: security
  Justification: user security hole
  
  This was assigned CVE-2012-6096:
  http://archives.neohapsis.com/archives/fulldisclosure/2012-12/0108.html
  
  Fix:
  http://nagios.svn.sourceforge.net/viewvc/nagios?view=revisionrevision=2547
 As it currently seems this fix is incomplete. The severity of the problem
 isn't hat high, so I want to wait until the icinga team has an official
 patch.
Ok, I backported the official patch to stable and attached it. Should I
provide an updated package for security.d.o?

Alex
-- 
Alexander Wirt, formo...@formorer.de 
CC99 2DDD D39E 75B0 B0AA  B25C D35B BC99 BC7D 020A
#! /bin/sh /usr/share/dpatch/dpatch-run
## 99_fix_CVE-2012-6096.dpatch by  root@
##
## All lines beginning with `## DP:' are a description of the patch.
## DP: No description.

@DPATCH@
diff -urNad '--exclude=CVS' '--exclude=.svn' '--exclude=.git' '--exclude=.arch' 
'--exclude=.hg' '--exclude=_darcs' '--exclude=.bzr' icinga-1.0.2~/cgi/getcgi.c 
icinga-1.0.2/cgi/getcgi.c
--- icinga-1.0.2~/cgi/getcgi.c  2010-06-30 09:13:42.0 +
+++ icinga-1.0.2/cgi/getcgi.c   2013-01-14 06:05:50.511798545 +
@@ -153,15 +153,17 @@
/* check for NULL query string environment variable - 04/28/00 
(Ludo Bosmans) */
if(getenv(QUERY_STRING)==NULL){
cgiinput=(char *)malloc(1);
+   if (cgiinput != NULL) {
+   cgiinput[0] = '\x0';
+   }
+   } else 
+   cgiinput = strdup(getenv(QUERY_STRING));
if(cgiinput==NULL){
printf(getcgivars(): Could not allocate memory 
for CGI input.\n);
exit(1);
-   }
-   cgiinput[0]='\x0';
-   }
-   else
-   cgiinput=strdup(getenv(QUERY_STRING));
-   }
+   }
+   }
+   }
 
else if(!strcmp(request_method,POST) || 
!strcmp(request_method,PUT)){
 
@@ -236,7 +238,11 @@
paircount=0;
nvpair=strtok(cgiinput,);
while(nvpair){
-   pairlist[paircount++]=strdup(nvpair);
+   pairlist[paircount] = strdup(nvpair);
+   if(pairlist[paircount++] == NULL) {
+   printf(getcgivars(): Could not allocate memory for 
name-value pair element #%d.\n, paircount);
+   exit(1);
+   }
if(!(paircount%256)){
pairlist=(char 
**)realloc(pairlist,(paircount+256)*sizeof(char **));
if(pairlist==NULL){
@@ -261,14 +267,29 @@
/* get the variable name preceding the equal (=) sign */
if((eqpos=strchr(pairlist[i],'='))!=NULL){
*eqpos='\0';
-   unescape_cgi_input(cgivars[i*2+1]=strdup(eqpos+1));
-   } 
+   cgivars[i*2+1] = strdup(eqpos + 1);
+   if(cgivars[i*2+1] == NULL) {
+   printf(getcgivars(): Could not allocate memory 
for cgi param value #%d.\n, i);
+   exit(1);
+   }
+   unescape_cgi_input(cgivars[i*2+1]);
+   } 
else
-   unescape_cgi_input(cgivars[i*2+1]=strdup());
+   cgivars[i*2+1] = strdup();
+   if(cgivars[i*2+1] == NULL) {
+   printf(getcgivars(): Could not allocate memory 
for empty cgi param value #%d.\n, i);
+   exit(1);
+   }
+   unescape_cgi_input(cgivars[i*2+1]);
 
/* get the variable value (or name/value of there was no real 
pair in the first place) */
-   unescape_cgi_input(cgivars[i*2]=strdup(pairlist[i]));
-   }
+   cgivars[i*2] = strdup(pairlist[i]);
+   if(cgivars[i*2] == NULL) {
+   printf(getcgivars(): Could not allocate memory for cgi 
param name #%d.\n, i);
+   exit(1);
+   }
+   unescape_cgi_input(cgivars[i*2]);
+   }
 
/* terminate the name-value list */
cgivars[paircount*2]='\x0';
diff -urNad '--exclude=CVS' '--exclude=.svn' '--exclude=.git' '--exclude=.arch' 
'--exclude=.hg' '--exclude=_darcs' '--exclude=.bzr' icinga-1.0.2~/cgi/history.c 
icinga-1.0.2/cgi/history.c
--- icinga-1.0.2~/cgi/history.c 2010-06-30 09:13:42.0 +
+++ icinga-1.0.2/cgi/history.c  2013-01-14 06:05:50.511798545 +
@@ -808,16 +808,16 @@
else if(display_type==DISPLAY_HOSTS){
 
 

Processed: Re: [Pkg-nagios-devel] Bug#697931: icinga: CVE-2012-6096

2013-01-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tag 697931 patch
Bug #697931 {Done: Alexander Wirt formo...@debian.org} [icinga] icinga: 
CVE-2012-6096
Added tag(s) patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
697931: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697931
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#640939: Please test solution for Kerberos problem

2013-01-14 Thread Wolfgang Schweer
On Mon, Jan 14, 2013 at 08:18:46AM +0100, Didier 'OdyX' Raboud wrote:
 
 I am far from confident enough in this patch to apply it so late in the 
 freeze. So I reported the bug upstream: http://www.cups.org/str.php?L4140
 
 As you have a working test-case, could you possibly:
 - test cups from unstable with the attached patch on top;
 - test cups from experimental (1.6.1) ?
 

With your patch applied to the version in unstable, dpkg-buildpackage 
would hang (on arch amd64).

IMO this is due to a minor error in your patch. Using the attached one, 
building succeded and -- at least for my test cases -- the reported 
failure doesn't occure. 

Will test the version in experimental later on.

Wolfgang

[ no need to cc me, bug subscribed ]
--- working/client.c	2013-01-14 14:21:48.0 +0100
+++ orig/client.c	2013-01-14 13:31:04.0 +0100
@@ -2589,11 +2589,6 @@
 #ifdef HAVE_GSSAPI
 else if (auth_type == CUPSD_AUTH_NEGOTIATE)
 {
-#  ifdef AF_LOCAL
-  if (_httpAddrFamily(con-http.hostaddr) == AF_LOCAL)
-strlcpy(auth_str, Basic realm=\CUPS\, sizeof(auth_str));
-  else
-#  endif /* AF_LOCAL */
   strlcpy(auth_str, Negotiate, sizeof(auth_str));
 }
 #endif /* HAVE_GSSAPI */


signature.asc
Description: Digital signature


Bug#688847: libav: multiple CVEs in ffmpeg/libav

2013-01-14 Thread Reinhard Tartler
On Tue, Dec 25, 2012 at 11:31 AM, Moritz Mühlenhoff j...@inutil.org wrote:
 On Mon, Oct 15, 2012 at 05:38:37AM -0400, Reinhard Tartler wrote:
  None of these are merged into 0.5.x, has the code diverged so much?

 I arrived only today from my two week trip and will work on backports
 for 0.7-0.5 this week. Sorry for the delay.

 Merry christmas Reinhard,

 did you have a chance to work on this in the mean time?


Later than anticipated, but 0.8.5-1 is now finally in unstable.
Moritz, last time you did some extensive testing and reported the
results to the RMs. Can you do so this time again?

Thanks,
Reinhard


-- 
regards,
Reinhard


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698151: libguestfs: FTBFS in unstable due to dropped fuse-utils (Build-Depends)

2013-01-14 Thread Salvatore Bonaccorso
Source: libguestfs
Version: 1:1.18.11-1
Severity: serious
Tags: sid
Justification: FTBFS
User: car...@debian.org
Usertags: depends-on-fuse-utils

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi

libguestfs has a Build-Depends on fuse-utils. But fuse-utils was
dropped (it was a transitional package). Thus libguestfs FTBFS in
unstable.

Note: this is not a problem for wheezy, as the transitional package is
still present there.

Regards,
Salvatore

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=5NMy
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed (with 1 errors): merging 698112 698118

2013-01-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 merge 698112 698118
Bug #698112 [asterisk] asterisk: Segfault when making a call after update to 
1.6.2.9-2+squeeze9
Unable to merge bugs because:
affects of #698118 is 'security.debian.org,release.debian.org' not ''
Failed to merge 698112: Did not alter merged bugs
Debbugs::Control::set_merged('transcript', 'GLOB(0x28dbc40)', 
'requester', 'Tzafrir Cohen tzaf...@debian.org', 'request_addr', 
'cont...@bugs.debian.org', 'request_msgid', 
'1358170350-4176-bts-tzaf...@debian.org', 'request_subject', ...) called at 
/usr/local/lib/site_perl/Debbugs/Control/Service.pm line 538
eval {...} called at 
/usr/local/lib/site_perl/Debbugs/Control/Service.pm line 537
Debbugs::Control::Service::control_line('line', undef, 'clonebugs', 
'HASH(0x2855160)', 'limit', 'HASH(0x2854b48)', 'common_control_options', 
'ARRAY(0x2854b90)', 'errors', ...) called at /usr/lib/debbugs/service line 474

 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
698112: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698112
698118: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698118
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed (with 1 errors): your mail

2013-01-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 merge 698112 698118
Bug #698112 [asterisk] asterisk: Segfault when making a call after update to 
1.6.2.9-2+squeeze9
Unable to merge bugs because:
affects of #698118 is 'security.debian.org,release.debian.org' not ''
Failed to merge 698112: Did not alter merged bugs
Debbugs::Control::set_merged('transcript', 'GLOB(0x2cd6cd0)', 
'requester', 'Tzafrir Cohen tzaf...@cohens.org.il', 'request_addr', 
'cont...@bugs.debian.org', 'request_msgid', 
'20130114134339.gy12...@pear.tzafrir.org.il', 'request_subject', ...) called 
at /usr/local/lib/site_perl/Debbugs/Control/Service.pm line 538
eval {...} called at 
/usr/local/lib/site_perl/Debbugs/Control/Service.pm line 537
Debbugs::Control::Service::control_line('line', undef, 'clonebugs', 
'HASH(0x2c50160)', 'limit', 'HASH(0x2c4fb48)', 'common_control_options', 
'ARRAY(0x2c4fb90)', 'errors', ...) called at /usr/lib/debbugs/service line 474

 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
698112: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698112
698118: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698118
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: limit source to asterisk, tagging 698118

2013-01-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 #asterisk (1:1.6.2.9-2+squeeze10) stable-security; urgency=high
 #
 #  * Fix typo in patch AST-2012-015 (Closes: #698112, #698118).
 #
 limit source asterisk
Limiting to bugs with field 'source' containing at least one of 'asterisk'
Limit currently set to 'source':'asterisk'

 tags 698118 + pending
Bug #698118 [asterisk] asterisk: version 1:1.6.2.9-2+squeeze9 crashes on SIP 
call, +squeeze6 does not
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
698118: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698118
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698118: asterisk 1:1.6.2.9-2+squeeze9 segfaults

2013-01-14 Thread Valentin Vidic
Same thing here, started segfaulting after an upgrade this morning:

2013-01-14 10:32:13 upgrade asterisk 1:1.6.2.9-2+squeeze8 1:1.6.2.9-2+squeeze9

[783312.661049] asterisk[27654]: segfault at 1 ip b748db77 sp b5319684 error 4 
in libc-2.11.3.so[b7418000+14]
[783442.211589] asterisk[13070]: segfault at 1 ip b74a0b77 sp b532d684 error 4 
in libc-2.11.3.so[b742b000+14]
[787731.493578] asterisk[13304]: segfault at 1 ip b74b6b77 sp b5344684 error 4 
in libc-2.11.3.so[b7441000+14]
[787933.505841] asterisk[937]:   segfault at 1 ip b750fb77 sp b539c684 error 4 
in libc-2.11.3.so[b749a000+14]
[788010.077989] asterisk[2168]:  segfault at 1 ip b745db77 sp b52eb684 error 4 
in libc-2.11.3.so[b73e8000+14]
[788592.836440] asterisk[2359]:  segfault at 1 ip b7550b77 sp b53dc684 error 4 
in libc-2.11.3.so[b74db000+14]
[792704.434687] asterisk[6096]:  segfault at 1 ip b746cb77 sp b52fa684 error 4 
in libc-2.11.3.so[b73f7000+14]
[793003.009440] asterisk[25102]: segfault at 1 ip b751db77 sp b53a9684 error 4 
in libc-2.11.3.so[b74a8000+14]

-- 
Valentin


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: tagging 698121

2013-01-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 698121 + pending
Bug #698121 [djmount] djmount: Depends on fuse-utils; uninstallable in sid
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
698121: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698121
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Please consider including this patch before wheezy

2013-01-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 683312 patch
Bug #683312 [uif] [PATCH] uif uses depricated position of ! to negate rules
Added tag(s) patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
683312: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683312
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#698140: Beanstalkd: OUT_OF_MEMORY after crash

2013-01-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 698140 serious
Bug #698140 [beanstalkd] Beanstalkd: OUT_OF_MEMORY after crash
Severity set to 'serious' from 'important'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
698140: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698140
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#697892: src:virtualbox: FTBFS in sid and experimental: /usr/bin/mk_sed: file /tmp/buildd/virtualbox-4.1.8-dfsg/src/VBox/Runtime/common/err/errmsg.sed line 31: Unmatched [ or [^

2013-01-14 Thread James McCoy
Control: reassign -1 kbuild 1:0.1.9998svn2543+dfsg-0.1
Control: affects -1 src:virtualbox
Control: retitle -1 kmk_sed fails to parse character classes
Control: tag -1 + upstream - sid experimental
Control: forwarded -1 http://svn.netlabs.org/kbuild/ticket/112

On Fri, Jan 11, 2013 at 12:26:53AM +0100, gregor herrmann wrote:
 While trying to rebuild virtualbox with the patch from #691169 (which
 works fine BTW), I noticed that the package doesn't build in a sid or
 experimental chroot.  The error is:

 kBuild: Creating directory /tmp/buildd/virtualbox-4.1.18-dfsg/out/obj/Runtime/
 kmk_builtin_mkdir -p -- /tmp/buildd/virtualbox-4.1.18-dfsg/out/obj/Runtime/
 kBuild: Generating 
 /tmp/buildd/virtualbox-4.1.18-dfsg/out/obj/Runtime/errmsgdata.h from 
 /tmp/buildd/virtualbox-4.1.18-dfsg/include/iprt/err.h 
 /tmp/buildd/virtualbox-4.1.18-dfsg/include/VBox/err.h
 /usr/bin/kmk_redirect -wo 
 /tmp/buildd/virtualbox-4.1.18-dfsg/out/obj/Runtime/errmsgdata.h -- 
 /usr/bin/kmk_sed -f 
 /tmp/buildd/virtualbox-4.1.18-dfsg/src/VBox/Runtime/common/err/errmsg.sed 
 /tmp/buildd/virtualbox-4.1.18-dfsg/include/iprt/err.h 
 /tmp/buildd/virtualbox-4.1.18-dfsg/include/VBox/err.h
 /usr/bin/kmk_sed: file 
 /tmp/buildd/virtualbox-4.1.18-dfsg/src/VBox/Runtime/common/err/errmsg.sed 
 line 31: Unmatched [ or [^
 kmk: *** [/tmp/buildd/virtualbox-4.1.18-dfsg/out/obj/Runtime/errmsgdata.h] 
 Error 1
 kmk: *** Deleting file 
 `/tmp/buildd/virtualbox-4.1.18-dfsg/out/obj/Runtime/errmsgdata.h'
 kmk: *** Waiting for unfinished jobs

The kbuild NMU, which migrated on Jan. 12th, seems to have exposed a bug
in kmk_sed which is affecting the virtualbox build.  I've tried
rebuilding kbuild with Wheezy's gcc-4.6, since upstream indicates this
is a gcc-4.7-specific problem, but that didn't make a difference.

Reassigning to kbuild.

Cheers,
--
James
GPG Key: 4096R/331BA3DB 2011-12-05 James McCoy james...@debian.org


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#697892: src:virtualbox: FTBFS in sid and experimental: /usr/bin/mk_sed: file /tmp/buildd/virtualbox-4.1.8-dfsg/src/VBox/Runtime/common/err/errmsg.sed line 31: Unmatched [ or [^

2013-01-14 Thread Debian Bug Tracking System
Processing control commands:

 reassign -1 kbuild 1:0.1.9998svn2543+dfsg-0.1
Bug #697892 [src:virtualbox] src:virtualbox: FTBFS in sid and experimental: 
/usr/bin/kmk_sed: file 
/tmp/buildd/virtualbox-4.1.18-dfsg/src/VBox/Runtime/common/err/errmsg.sed line 
31: Unmatched [ or [^
Bug reassigned from package 'src:virtualbox' to 'kbuild'.
No longer marked as found in versions virtualbox/4.1.18-dfsg-1.1.
Ignoring request to alter fixed versions of bug #697892 to the same values 
previously set
Bug #697892 [kbuild] src:virtualbox: FTBFS in sid and experimental: 
/usr/bin/kmk_sed: file 
/tmp/buildd/virtualbox-4.1.18-dfsg/src/VBox/Runtime/common/err/errmsg.sed line 
31: Unmatched [ or [^
Marked as found in versions kbuild/1:0.1.9998svn2543+dfsg-0.1.
 affects -1 src:virtualbox
Bug #697892 [kbuild] src:virtualbox: FTBFS in sid and experimental: 
/usr/bin/kmk_sed: file 
/tmp/buildd/virtualbox-4.1.18-dfsg/src/VBox/Runtime/common/err/errmsg.sed line 
31: Unmatched [ or [^
Added indication that 697892 affects src:virtualbox
 retitle -1 kmk_sed fails to parse character classes
Bug #697892 [kbuild] src:virtualbox: FTBFS in sid and experimental: 
/usr/bin/kmk_sed: file 
/tmp/buildd/virtualbox-4.1.18-dfsg/src/VBox/Runtime/common/err/errmsg.sed line 
31: Unmatched [ or [^
Changed Bug title to 'kmk_sed fails to parse character classes' from 
'src:virtualbox: FTBFS in sid and experimental: /usr/bin/kmk_sed: file 
/tmp/buildd/virtualbox-4.1.18-dfsg/src/VBox/Runtime/common/err/errmsg.sed line 
31: Unmatched [ or [^'
 tag -1 + upstream - sid experimental
Bug #697892 [kbuild] kmk_sed fails to parse character classes
Added tag(s) upstream.
Bug #697892 [kbuild] kmk_sed fails to parse character classes
Removed tag(s) sid and experimental.
 forwarded -1 http://svn.netlabs.org/kbuild/ticket/112
Bug #697892 [kbuild] kmk_sed fails to parse character classes
Set Bug forwarded-to-address to 'http://svn.netlabs.org/kbuild/ticket/112'.

-- 
697892: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697892
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#684604: Same problem here

2013-01-14 Thread Niels Thykier
On 2012-09-24 21:55, Ulrich Van Den Hekke wrote:
 Hi,
 
 I have the same problem. I start eclipse configure some project, install ADT 
 plugin to work, after a few restart, i have this bug (splash screen hang on 
 Loading Workbench). Removing .eclipse resolve the problem, but i need to 
 reinstall plugin, and configuration, until the next hang.
 
 

Hi,

What version of Java are you using to run Eclipse?  If in doubt, running
readlink -f /usr/bin/java should be a good guess.  Example:


  $ readlink -f /usr/bin/java
  /usr/lib/jvm/java-6-openjdk-i386/jre/bin/java


If that gives you Java 6 (examples include java-6-openjdk or
java-6-sun-java), could you try with Java 7?  Ensure you have
openjdk-7-jdk installed and run (as root):


  $ update-java-alternatives --set java-1.7.0-openjdk-i386



~Niels


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#684604: eclipse-rcp: eclipse 3.8 hangs on splash screen with Loading Workbench after update from 3.7.2

2013-01-14 Thread Niels Thykier
On 2013-01-02 18:13, Dave Tapesar wrote:
 Hello there,
 
 I had the same issue on a Debian SID x86_64.
 As a sid, there was no eclipse update, only an install on July:
 eclipse:amd64 (3.8.0~rc4-1)
 The only openjdk update is from October 23rd
 openjdk-6-jre:amd64 6b24-1.11.4-3 - 6b24-1.11.5-1
 
 The problem appeared after the SVN plugin uninstall (because of a plugin
 problem) : when asked to reboot, I agreed and Eclipse would stop at the
 point Loading Workbench. Killing the graphic application launched what
 seemed to be a deadlock, as the java process was taking all CPU time. A
 simple kill pid stopped the process. Unfortunately, I have not kept the
 details (haven't made a strace)
 
 [...]
 
 Hope it helps.
 
 

To be honest, it sound like you have / had a different problem[1].

That said, I am glad you have resolved it and we will keep it in mind in
case others report problems with a similar set of symptoms.

~Niels

[1] The fact that is solved by upgrading Java6 to Java7 make it sound
like it is/was a bug in Java6.  The original problem includes a
configuration issue that (to my knowledge) has not been triggered by
bugs in OpenJDK (yet).


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#697230: asterisk: Two security issues: AST-2012-014 / AST-2012-015

2013-01-14 Thread Tzafrir Cohen
On Fri, Jan 11, 2013 at 11:00:30PM +, Tzafrir Cohen wrote:
 On Tue, Jan 08, 2013 at 06:49:56PM +0100, Moritz Mühlenhoff wrote:
  On Tue, Jan 08, 2013 at 02:45:59AM +0200, Tzafrir Cohen wrote:
   Hi,
   
   On Wed, Jan 02, 2013 at 10:56:43PM +0100, Salvatore Bonaccorso wrote:
Package: asterisk
Severity: grave
Tags: security
Justification: user security hole

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi,

the following vulnerabilities were published for asterisk.

CVE-2012-5976[0]:
Crashes due to large stack allocations when using TCP

CVE-2012-5977[1]:
Denial of Service Through Exploitation of Device State Caching

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities  Exposures) ids in your changelog entry.

For further information see:

[0] http://security-tracker.debian.org/tracker/CVE-2012-5976
[1] http://security-tracker.debian.org/tracker/CVE-2012-5977

Please adjust the affected versions in the BTS as needed.

According to the advisories all 1.8.x versions seems affected.
   
   Likewise is version 1.6.2 from Stable. I have fixes ready.
  
  Ok, please upload to security-master once tests are sufficient.
 
 Uploaded.

It seems that there has been a bug with the patch for Stable (#698112,
#698118):

  http://anonscm.debian.org/viewvc/pkg-voip?view=revisionrevision=10073

I have prepared a fix for this (1:1.6.2.9-2+squeeze10).

-- 
   Tzafrir Cohen
icq#16849755  jabber:tzafrir.co...@xorcom.com
+972-50-7952406   mailto:tzafrir.co...@xorcom.com
http://www.xorcom.com  iax:gu...@local.xorcom.com/tzafrir


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#684604: Same problem here

2013-01-14 Thread Niels Thykier
On 2013-01-14 15:43, Niels Thykier wrote:
 On 2012-09-24 21:55, Ulrich Van Den Hekke wrote:
 Hi,

 I have the same problem. I start eclipse configure some project, install ADT 
 plugin to work, after a few restart, i have this bug (splash screen hang on 
 Loading Workbench). Removing .eclipse resolve the problem, but i need to 
 reinstall plugin, and configuration, until the next hang.


 
 Hi,
 
 What version of Java are you using to run Eclipse?  If in doubt, running
 readlink -f /usr/bin/java should be a good guess.  Example:
 
 
   $ readlink -f /usr/bin/java
   /usr/lib/jvm/java-6-openjdk-i386/jre/bin/java
 
 
 If that gives you Java 6 (examples include java-6-openjdk or
 java-6-sun-java), could you try with Java 7?  Ensure you have
 openjdk-7-jdk installed and run (as root):
 
 
   $ update-java-alternatives --set java-1.7.0-openjdk-i386
 
 

Correction; if you are on an i386 that above command is correct, though
it changes based on your architecture.  Running the following command
(yes, quotes in it are important) should give you a list of valid Java7
installations you can use with update-java-alternatives --set:


  # update-java-alternatives --list | awk '/1\.7/ { print $1 }'



~Niels


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#695275: marked as done (src:dspam: harmful actions in multiple postrm scripts of M-A:same packages)

2013-01-14 Thread Debian Bug Tracking System
Your message dated Mon, 14 Jan 2013 15:17:45 +
with message-id e1tulnf-0002e8...@franck.debian.org
and subject line Bug#695275: fixed in dspam 3.10.2+dfsg-4
has caused the Debian Bug report #695275,
regarding src:dspam: harmful actions in multiple postrm scripts of M-A:same 
packages
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
695275: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695275
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: src:dspam
Version: 3.10.2+dfsg-2
Severity: serious

Let me give an example of the general issue in libdspam7. All the other
issues are of similar nature.

It is possible to install libdspam7:amd64 and libdspam7:i386 in
parallel. Now a user could purge libdspam7:i386, but still use
libdspam7:amd64. The postrm purge script would ensure that the dspam
user is now locked. This breaks libdspam7:amd64.

Basically every postrm script shipped contains a similar issue. I am not
aware of a general solution to the problem. Different packages have come
up with different solutions (example: libwrap0). Due to the size of the
problem here I suggest to remove the M-A:same headers in a t-p-u upload
and defer a real solution until after wheezy. I'd expect said real
solution to involve a new package Arch:all package and ship the dspam
user.

Helmut
---End Message---
---BeginMessage---
Source: dspam
Source-Version: 3.10.2+dfsg-4

We believe that the bug you reported is fixed in the latest version of
dspam, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 695...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thomas Preud'homme robo...@debian.org (supplier of updated dspam package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 08 Jan 2013 18:50:26 +0100
Source: dspam
Binary: dspam dspam-webfrontend libdspam7 libdspam7-dev libdspam7-drv-hash 
libdspam7-drv-pgsql libdspam7-drv-mysql libdspam7-drv-sqlite3 dspam-doc 
dspam-dbg libdspam7-dbg
Architecture: source amd64 all
Version: 3.10.2+dfsg-4
Distribution: unstable
Urgency: low
Maintainer: Debian DSPAM Maintainers pkg-dspam-m...@lists.alioth.debian.org
Changed-By: Thomas Preud'homme robo...@debian.org
Description: 
 dspam  - Scalable, fast and statistical anti-spam filter
 dspam-dbg  - debugging symbols for dspam
 dspam-doc  - Documentation for DSPAM anti-spam filter
 dspam-webfrontend - Webfrontend for DSPAM anti-spam filter
 libdspam7  - Core message processing and classification functionality for DSPA
 libdspam7-dbg - debugging symbols for DSPAM related libraries
 libdspam7-dev - Development headers for libdspam
 libdspam7-drv-hash - Hash backend for DSPAM anti-spam filter
 libdspam7-drv-mysql - MySQL backend for DSPAM anti-spam filter
 libdspam7-drv-pgsql - PostgreSQL backend for DSPAM anti-spam filter
 libdspam7-drv-sqlite3 - sqlite3 backend for DSPAM anti-spam filter
Closes: 695275 698136
Changes: 
 dspam (3.10.2+dfsg-4) unstable; urgency=low
 .
   * Disable multi-arch since it create many problems with regards to the
 handling of shared resources when a package is installed for several
 architectures (Closes: #695275).
   * Enhance 008_fix_exim_integration_doc.diff to state more explicitly in
 CHANGELOG which changes are backports for Debian of upstream commits.
   * Cherry-pick patch from upstream to fix recipient corruption when releasing
 a message from quarantine (Closes: #698136).
   * Bump Standards-Version to 3.9.4 (no changes needed).
Checksums-Sha1: 
 84f2acdc97f055e1117739263b87818d4b157166 2602 dspam_3.10.2+dfsg-4.dsc
 c0a5a3e0c6d23a85f2d64c37b524d55926465283 65845 
dspam_3.10.2+dfsg-4.debian.tar.gz
 8d0f8f13af04052d0213b3f77af24d394f9df0a2 437134 dspam_3.10.2+dfsg-4_amd64.deb
 ccd0bdbdf7013cdba2de93fb355a4c3dabb07fee 202300 
dspam-webfrontend_3.10.2+dfsg-4_all.deb
 36ddba5fe92d199ebc039cb10bb76fd54d2467f5 150728 
libdspam7_3.10.2+dfsg-4_amd64.deb
 b89b95ec903e9d55283a96e1d2a595fa7cd11788 309540 
libdspam7-dev_3.10.2+dfsg-4_amd64.deb
 6bd0467229ea639bc245d366fd5b3fbbb6e3fd21 110962 
libdspam7-drv-hash_3.10.2+dfsg-4_amd64.deb
 514ba838a84bc45ad5717d8085f646bec8f14e6f 126474 

Bug#697230: asterisk: Two security issues: AST-2012-014 / AST-2012-015

2013-01-14 Thread Javier Serrano Polo
AST-2012-014: b/channels/chan_sip.c

@@ -3078,7 +3079,7 @@ static void *_sip_tcp_helper_thread(stru
req.socket.fd = tcptls_session-fd;
 
/* Read in headers one line at a time */
-   while (req.len  4 || strncmp(REQ_OFFSET_TO_STR(req, 
len - 4), \r\n\r\n, 4)) {
+   while ((req.len = SIP_MAX_PACKET_SIZE) || (req.len  4 
|| strncmp(REQ_OFFSET_TO_STR(req, len - 4), \r\n\r\n, 4))) {
if (!tcptls_session-client  !authenticated ) 
{
if ((timeout = 
sip_check_authtimeout(start))  0) {
goto cleanup;

Are you sure? That size hint condition should be ANDed.


smime.p7s
Description: S/MIME cryptographic signature


Bug#697230: asterisk: Two security issues: AST-2012-014 / AST-2012-015

2013-01-14 Thread Tzafrir Cohen
On Mon, Jan 14, 2013 at 04:02:22PM +0100, Javier Serrano Polo wrote:
 AST-2012-014: b/channels/chan_sip.c
 
 @@ -3078,7 +3079,7 @@ static void *_sip_tcp_helper_thread(stru
   req.socket.fd = tcptls_session-fd;
  
   /* Read in headers one line at a time */
 - while (req.len  4 || strncmp(REQ_OFFSET_TO_STR(req, 
 len - 4), \r\n\r\n, 4)) {
 + while ((req.len = SIP_MAX_PACKET_SIZE) || (req.len  4 
 || strncmp(REQ_OFFSET_TO_STR(req, len - 4), \r\n\r\n, 4))) {
   if (!tcptls_session-client  !authenticated ) 
 {
   if ((timeout = 
 sip_check_authtimeout(start))  0) {
   goto cleanup;
 
 Are you sure? That size hint condition should be ANDed.

You're right.

-- 
   Tzafrir Cohen
icq#16849755  jabber:tzafrir.co...@xorcom.com
+972-50-7952406   mailto:tzafrir.co...@xorcom.com
http://www.xorcom.com  iax:gu...@local.xorcom.com/tzafrir


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698140: Beanstalkd: OUT_OF_MEMORY after crash

2013-01-14 Thread Serafeim Zanikolas
Hi again,

On Mon, Jan 14, 2013 at 04:24:45PM +0200, Potamianos Gregory wrote:
[..]
 If the server crashes with an empty binlog, on the next startup it
 answers every submitted job with out of memory error and discards
 it. So the service is rendered useless and requires manual
 intervention.

 Furthermore the patch is very trivial. Maybe it should be reconsidered?

Sure. Preparing the release is trivial -- it's bugging the release team for a
package with a small number of users I was concerned about.

bye,
sez

-- 
Every great idea is worthless without someone to do the work. --Neil Williams


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#640939: Please test solution for Kerberos problem

2013-01-14 Thread Didier 'OdyX' Raboud
Le lundi, 14 janvier 2013 14.36:31, Wolfgang Schweer a écrit :
 On Mon, Jan 14, 2013 at 08:18:46AM +0100, Didier 'OdyX' Raboud wrote:
  I am far from confident enough in this patch to apply it so late in the
  freeze. So I reported the bug upstream: http://www.cups.org/str.php?L4140
  
  As you have a working test-case, could you possibly:
  - test cups from unstable with the attached patch on top;
  - test cups from experimental (1.6.1) ?
 
 With your patch applied to the version in unstable, dpkg-buildpackage
 would hang (on arch amd64).
 
 IMO this is due to a minor error in your patch. Using the attached one,
 building succeded and -- at least for my test cases -- the reported
 failure doesn't occure.

Hrm weird; both patches are afaik correct.

Anyway, given your report, I will probably upload a new version for this 
serious issue as soon as the actual version would have migrated to Wheezy.

Many thanks for your investigation time and dedication!

Cheers,

OdyX


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#640939: Please test solution for Kerberos problem

2013-01-14 Thread Wolfgang Schweer
On Mon, Jan 14, 2013 at 06:38:19PM +0100, Didier 'OdyX' Raboud wrote:
 Le lundi, 14 janvier 2013 14.36:31, Wolfgang Schweer a écrit :
  On Mon, Jan 14, 2013 at 08:18:46AM +0100, Didier 'OdyX' Raboud wrote:
   I am far from confident enough in this patch to apply it so late in the
   freeze. So I reported the bug upstream: http://www.cups.org/str.php?L4140
   
   As you have a working test-case, could you possibly:
   - test cups from unstable with the attached patch on top;
   - test cups from experimental (1.6.1) ?
  
  With your patch applied to the version in unstable, dpkg-buildpackage
  would hang (on arch amd64).
  
  IMO this is due to a minor error in your patch. Using the attached one,
  building succeded and -- at least for my test cases -- the reported
  failure doesn't occure.
 
 Hrm weird; both patches are afaik correct.
 
 Anyway, given your report, I will probably upload a new version for this 
 serious issue as soon as the actual version would have migrated to Wheezy.

Same result for cups 1.6.1 in experimental: builds, reported failure gone. 
 
Wolfgang


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#683312: Please consider including this patch before wheezy

2013-01-14 Thread gregor herrmann
On Sun, 13 Jan 2013 19:10:00 +, Alex Owen wrote:

 I have regenerated the patch against uif- 1.0.6 to make it simple to
 review and apply to the package currently in Wheezy.

Seems you didn't attach this new patch?
 
BTW: After looking at your original patch, I have the impression that
you missed moving one $not (dport, in the line with two $nots).

Cheers,
gregor

-- 
 .''`.  Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06
 : :' : Debian GNU/Linux user, admin, and developer  -  http://www.debian.org/
 `. `'  Member of VIBE!AT  SPI, fellow of the Free Software Foundation Europe
   `-   NP: REM: Half A World Away


signature.asc
Description: Digital signature


Bug#695001: closed by Nicholas Bamber nicho...@periapt.co.uk (Bug#695001: fixed in mysql-5.5 5.5.29+dfsg-1)

2013-01-14 Thread Moritz Mühlenhoff
On Sat, Jan 12, 2013 at 12:30:11AM +, Debian Bug Tracking System wrote:
 This is an automatic notification regarding your Bug report
 which was filed against the mysql-5.5 package:
 
 #695001: mysql-5.5: New MySQL issues
 
 It has been closed by Nicholas Bamber nicho...@periapt.co.uk.
 
 Their explanation is attached below along with your original report.
 If this explanation is unsatisfactory and you have not received a
 better one in a separate message then please contact Nicholas Bamber 
 nicho...@periapt.co.uk by
 replying to this email.

The bug you closed mentioned various security issues:

CVE-2012-5611 (formerly tracked as CVE-2012-5579)
CVE-2012-5612
CVE-2012-5613
CVE-2012-5614
CVE-2012-5615

Is there a advisory or a changelog from Oracle, which specifies
the CVE IDs fixed in 5.5.29?

Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#683312: Please consider including this patch before wheezy

2013-01-14 Thread Alex Owen
On 14 January 2013 17:54, gregor herrmann gre...@debian.org wrote:
 On Sun, 13 Jan 2013 19:10:00 +, Alex Owen wrote:

 I have regenerated the patch against uif- 1.0.6 to make it simple to
 review and apply to the package currently in Wheezy.

 Seems you didn't attach this new patch?
Oops! Sorry!

 BTW: After looking at your original patch, I have the impression that
 you missed moving one $not (dport, in the line with two $nots).

Good catch...

Here (and really attached this time) is an updated patch including
Gregor's point also.

Regards
Alex Owen


uif-pling-position-v2.patch
Description: Binary data


Bug#698125: glusterfs-client: Depends on fuse-utils; uninstallable in sid

2013-01-14 Thread Patrick Matthäi

Am 14.01.2013 10:38, schrieb car...@debian.org:

Package: glusterfs-client
Version: 3.2.7-3
Severity: serious
Tags: sid
User: car...@debian.org
Usertags: depends-on-fuse-utils

Hi

glusterfs-client 3.2.7-3 has a Depends on fuse-utils. In unstable
fuse-utils was dropped. This makes glusterfs-client uninstallable in
sid. Wheezy is not directly affected as the transitional package
fuse-utils is still present there, so tagging this 'sid' only.

Please change this dependency to fuse.

Regards,

Salvatore



sick.. why are such changes uploaded to sid at the current time.. will 
be fixed in experimental with my next upload..


--
/*
Mit freundlichem Gruß / With kind regards,
 Patrick Matthäi
 GNU/Linux Debian Developer

E-Mail: pmatth...@debian.org
patr...@linux-dev.org
*/


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698037: can't log in to blogger.com

2013-01-14 Thread Daniel Pocock


On 13/01/13 16:40, John Paul Adrian Glaubitz wrote:
 Hi,
 
 This is known to impact blogger.com and likely other sites
 Upstream has release 0.8.3 which fixes the issue
 Requires unblock approval for wheezy
 
 Which will not happen if it's a new upstream version. Unblocks at this
 time of the freeze will be granted for small fixes only.
 
 I will look at the upstream bug tracker and see if I can extract a
 working patch. Since you seem to be using this software, I'd like to
 ask you to test my patch then.

Actually, I am a DD now and could potentially apply the patch on 0.8.1,
but wanted some clarity from release team before uploading anything at all

I also think we need upstream input on this, so I've copied Kelvin on
this email.  Kelvin, have you had any personal contact with Debian or
Ubuntu users of SimpleID?  Are you aware of other fixes in 0.8.2 or
0.8.3 that really are essential for the Debian package, or 0.8.1 + this
one patch will be fine?


http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698037


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#683312: Please consider including this patch before wheezy

2013-01-14 Thread gregor herrmann
On Mon, 14 Jan 2013 18:36:05 +, Alex Owen wrote:

  I have regenerated the patch against uif- 1.0.6 to make it simple to
  review and apply to the package currently in Wheezy.
  Seems you didn't attach this new patch?
 Oops! Sorry!

No problem :)

  BTW: After looking at your original patch, I have the impression that
  you missed moving one $not (dport, in the line with two $nots).
 Good catch...
 Here (and really attached this time) is an updated patch including
 Gregor's point also.

I think I found another one ...

What I did was switching the (-)-$args and $nots with perl, and
comparing the result with your patch there's one difference:

#v+
-+  push (@source, $not -s $1 -m mac --mac-source $not $2);
++  push (@source, $not -s $1 -m mac $not --mac-source $2);
#v-

I'm attaching my complete (auto-)patch; could you please double-check?


Cheers,
gregor

-- 
 .''`.  Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06
 : :' : Debian GNU/Linux user, admin, and developer  -  http://www.debian.org/
 `. `'  Member of VIBE!AT  SPI, fellow of the Free Software Foundation Europe
   `-   NP: Tracy Chapman: Subcity
diff --git a/uif.pl b/uif.pl
index be60276..40fe2f1 100755
--- a/uif.pl
+++ b/uif.pl
@@ -984,14 +984,14 @@ sub genRuleDump {
 }
 my $range;
 foreach $range (@{$$rule{\u$proto}[2]}) {
-	push (@protocol, -p $proto -m $proto --sport $not $range);
+	push (@protocol, -p $proto -m $proto $not --sport $range);
 }
 foreach $range (@{$$rule{\u$proto}[3]}) {
-	push (@protocol, -p $proto -m $proto --dport $not $range);
+	push (@protocol, -p $proto -m $proto $not --dport $range);
 }
 foreach $range (@{$$rule{\u$proto}[4]}) {
 	$range =~ /^(.+)\/(.+)$/;
-	push (@protocol, -p $proto -m $proto --sport $not $1 --dport $not $2);
+	push (@protocol, -p $proto -m $proto $not --sport $1 $not --dport $2);
 }
 			}
 		}
@@ -999,16 +999,16 @@ sub genRuleDump {
 			my $type;
 			foreach $type (@{$$rule{'ICMP'}}) {
 if ($type eq 'all') {
-	push (@protocol, -p $not icmp);
+	push (@protocol, $not -p icmp);
 } else {
-	push (@protocol, -p icmp -m icmp --icmp-type $not $type);
+	push (@protocol, -p icmp -m icmp $not --icmp-type $type);
 }
 			}
 		}
 		if (exists($$rule{'OtherProtocols'})) {
 			my $proto;
 			foreach $proto (@{$$rule{'OtherProtocols'}}) {
-push (@protocol, -p $not $proto);
+push (@protocol, $not -p $proto);
 			}
 		}
 		if (exists($$rule{'Source'})) {
@@ -1020,10 +1020,10 @@ sub genRuleDump {
 			my $source;
 			foreach $source (@{$$rule{'Source'}}) {
 if ($source =~ /(.+)=(.+)/  ($$rule{'Table'} eq 'filter')) {
-	push (@source, -s $not $1 -m mac --mac-source $not $2);
+	push (@source, $not -s $1 -m mac $not --mac-source $2);
 } else {
 	$source =~ /([^=]+)/;
-	push (@source, -s $not $1);
+	push (@source, $not -s $1);
 }
 			}
 		}
@@ -1036,7 +1036,7 @@ sub genRuleDump {
 			my $destination;
 			foreach $destination (@{$$rule{'Destination'}}) {
 $destination =~ /([^=]+)/;
-push (@destination, -d $not $1);
+push (@destination, $not -d $1);
 			}
 		}
 		if (exists($$rule{'TranslatedSource'})) {
@@ -1093,7 +1093,7 @@ sub genRuleDump {
 			}
 			my $input;
 			foreach $input (@{$$rule{'InputInterface'}}) {
-push (@inputinterface, -i $not $input);
+push (@inputinterface, $not -i $input);
 			}
 		}
 		if (exists($$rule{'OutputInterface'})) {
@@ -1104,7 +1104,7 @@ sub genRuleDump {
 			}
 			my $output;
 			foreach $output (@{$$rule{'OutputInterface'}}) {
-push (@outputinterface, -o $not $output);
+push (@outputinterface, $not -o $output);
 			}
 		}
 		if (exists($$rule{'PhysicalInputInterface'})) {
@@ -1115,7 +1115,7 @@ sub genRuleDump {
 			}
 			my $input;
 			foreach $input (@{$$rule{'PhysicalInputInterface'}}) {
-push (@physicalinputinterface, -m physdev --physdev-in $not $input);
+push (@physicalinputinterface, -m physdev $not --physdev-in $input);
 			}
 		}
 		if (exists($$rule{'PhysicalOutputInterface'})) {
@@ -1126,7 +1126,7 @@ sub genRuleDump {
 			}
 			my $output;
 			foreach $output (@{$$rule{'PhysicalOutputInterface'}}) {
-push (@physicaloutputinterface, -m physdev --physdev-out $not $output);
+push (@physicaloutputinterface, -m physdev $not --physdev-out $output);
 			}
 		}
 		if (exists($$rule{'MarkMatch'})) {


signature.asc
Description: Digital signature


Bug#683312: Please consider including this patch before wheezy

2013-01-14 Thread Alex Owen
On 14 January 2013 19:04, gregor herrmann gre...@debian.org wrote:
 I think I found another one ...

 What I did was switching the (-)-$args and $nots with perl, and
 comparing the result with your patch there's one difference:

 #v+
 -+  push (@source, $not -s $1 -m mac --mac-source $not $2);
 ++  push (@source, $not -s $1 -m mac $not --mac-source $2);
 #v-

 I'm attaching my complete (auto-)patch; could you please double-check?


Hello Gregor,
I have used grep and wc -l and looked and re-looked... your patch
looks complete to me.
Thanks for looking at this issue and fixing my mistakes!

Alex Owen


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698125: marked as done (glusterfs-client: Depends on fuse-utils; uninstallable in sid)

2013-01-14 Thread Debian Bug Tracking System
Your message dated Mon, 14 Jan 2013 19:47:48 +
with message-id e1tuq0a-0002rw...@franck.debian.org
and subject line Bug#698125: fixed in glusterfs 3.4.0~qa6-2
has caused the Debian Bug report #698125,
regarding glusterfs-client: Depends on fuse-utils; uninstallable in sid
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
698125: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698125
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: glusterfs-client
Version: 3.2.7-3
Severity: serious
Tags: sid
User: car...@debian.org
Usertags: depends-on-fuse-utils

Hi

glusterfs-client 3.2.7-3 has a Depends on fuse-utils. In unstable
fuse-utils was dropped. This makes glusterfs-client uninstallable in
sid. Wheezy is not directly affected as the transitional package
fuse-utils is still present there, so tagging this 'sid' only.

Please change this dependency to fuse.

Regards,

Salvatore 
---End Message---
---BeginMessage---
Source: glusterfs
Source-Version: 3.4.0~qa6-2

We believe that the bug you reported is fixed in the latest version of
glusterfs, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 698...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Patrick Matthäi pmatth...@debian.org (supplier of updated glusterfs package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 14 Jan 2013 19:54:10 +0100
Source: glusterfs
Binary: glusterfs-client glusterfs-server glusterfs-common glusterfs-dbg
Architecture: source amd64
Version: 3.4.0~qa6-2
Distribution: experimental
Urgency: low
Maintainer: Patrick Matthäi pmatth...@debian.org
Changed-By: Patrick Matthäi pmatth...@debian.org
Description: 
 glusterfs-client - clustered file-system (client package)
 glusterfs-common - GlusterFS common libraries and translator modules
 glusterfs-dbg - GlusterFS debugging symbols
 glusterfs-server - clustered file-system (server package)
Closes: 698125
Changes: 
 glusterfs (3.4.0~qa6-2) experimental; urgency=low
 .
   * Set homepage to www.gluster.org.
   * Migrate package from cdbs to minimal debhelper.
   * Switch to xz compression and add a Pre-Depends on dpkg.
   * Depend on fuse instead of fuse-utils package.
 Closes: #698125
Checksums-Sha1: 
 086206d160fe84b614d8fa23164492f62230f926 2175 glusterfs_3.4.0~qa6-2.dsc
 c727f4a4e9bd6260173d7eea824edd9bb3b1ac58 11532 
glusterfs_3.4.0~qa6-2.debian.tar.gz
 2d34bfe42c218161d5ecaf2567eaf287316461e2 1360348 
glusterfs-client_3.4.0~qa6-2_amd64.deb
 5e32830727a021265d47a9862f9ded1308d8f1a6 1428858 
glusterfs-server_3.4.0~qa6-2_amd64.deb
 4923d03cad2b0f236de66566bed50ec0a11fefda 2837566 
glusterfs-common_3.4.0~qa6-2_amd64.deb
 1122736668bb09402665776b1a261d1b38b63812 7967256 
glusterfs-dbg_3.4.0~qa6-2_amd64.deb
Checksums-Sha256: 
 cc4546126f28890080874c21a4ddeec04bb4db3f748ee3c88b63456c238e6dd8 2175 
glusterfs_3.4.0~qa6-2.dsc
 81693f8a9a73f7480a1e4ded72ecbdbb4539ae34733045f2800f437945315eb0 11532 
glusterfs_3.4.0~qa6-2.debian.tar.gz
 8ff399171b9eec0eff0444b6595022bf4abed65bf64b9cf26942dcf2d1fb9110 1360348 
glusterfs-client_3.4.0~qa6-2_amd64.deb
 2f62a355b862f325e7c2059863d6cc259773222d05e648e72633a68c5731e127 1428858 
glusterfs-server_3.4.0~qa6-2_amd64.deb
 2db51a84f7d11a899d8632c5145827471525cbfe89586d1281ba7e1a120bfc94 2837566 
glusterfs-common_3.4.0~qa6-2_amd64.deb
 c86b80d50914be55b99d0014c6beb892d39af4e6e300cb006f8ed07b61fc4749 7967256 
glusterfs-dbg_3.4.0~qa6-2_amd64.deb
Files: 
 102500f76b316e4a07934a8e085b9f66 2175 admin optional glusterfs_3.4.0~qa6-2.dsc
 8a95147b0d0bd57acfe54754f992e939 11532 admin optional 
glusterfs_3.4.0~qa6-2.debian.tar.gz
 01701095f514d10a957344312fec9bd5 1360348 admin optional 
glusterfs-client_3.4.0~qa6-2_amd64.deb
 98828a5075db6c9cf44f1e8b0629a8e6 1428858 admin optional 
glusterfs-server_3.4.0~qa6-2_amd64.deb
 4513feb9a9e3f448906b71e3241d48dc 2837566 libs optional 
glusterfs-common_3.4.0~qa6-2_amd64.deb
 dc188a76d4f21a4949fda3c4e66a5db5 7967256 debug extra 
glusterfs-dbg_3.4.0~qa6-2_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQIcBAEBCAAGBQJQ9F0UAAoJEBLZsEqQy9jkybcP/iFTCmaKGTTl1x9Mr4g8ubGV

Bug#683312: Please consider including this patch before wheezy

2013-01-14 Thread gregor herrmann
On Mon, 14 Jan 2013 19:25:50 +, Alex Owen wrote:

  What I did was switching the (-)-$args and $nots with perl, and
  comparing the result with your patch there's one difference:
 
  #v+
  -+  push (@source, $not -s $1 -m mac --mac-source $not 
  $2);
  ++  push (@source, $not -s $1 -m mac $not --mac-source 
  $2);
  #v-
 
  I'm attaching my complete (auto-)patch; could you please double-check?

 I have used grep and wc -l and looked and re-looked... your patch
 looks complete to me.

Cool.

 Thanks for looking at this issue and fixing my mistakes!

Thanks for checking.


Cheers,
gregor, preparing an NMU

-- 
 .''`.  Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06
 : :' : Debian GNU/Linux user, admin, and developer  -  http://www.debian.org/
 `. `'  Member of VIBE!AT  SPI, fellow of the Free Software Foundation Europe
   `-   NP: Die Schmetterlinge: Die Mühlen der Gerechtigkeit / Lied der Justiz


signature.asc
Description: Digital signature


Processed: uif: diff for NMU version 1.0.6-1.1

2013-01-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 683312 + pending
Bug #683312 [uif] [PATCH] uif uses depricated position of ! to negate rules
Added tag(s) pending.
 tags 692838 + pending
Bug #692838 [uif] uif: [INTL:ja] New Japanese translation
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
683312: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683312
692838: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692838
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#683312: uif: diff for NMU version 1.0.6-1.1

2013-01-14 Thread gregor herrmann
tags 683312 + pending
tags 692838 + pending
thanks

Dear maintainer,

I've prepared an NMU for uif (versioned as 1.0.6-1.1) and
uploaded it to DELAYED/5. Please feel free to tell me if I
should delay it longer.

Regards.

-- 
 .''`.  Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06
 : :' : Debian GNU/Linux user, admin, and developer  -  http://www.debian.org/
 `. `'  Member of VIBE!AT  SPI, fellow of the Free Software Foundation Europe
   `-   NP: Davy Graham: Stan's Guitar
Binary files /home/gregoa/tmp/n_mpPpDXFI/uif-1.0.6/.git/index and /home/gregoa/tmp/LUmA9Ks3AE/uif-1.0.6/.git/index differ
diff -Nru uif-1.0.6/debian/changelog uif-1.0.6/debian/changelog
--- uif-1.0.6/debian/changelog	2011-08-24 08:06:18.0 +0200
+++ uif-1.0.6/debian/changelog	2013-01-14 20:49:43.0 +0100
@@ -1,3 +1,15 @@
+uif (1.0.6-1.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Fix uif uses deprecated position of ! to negate rules:
+patch uif.pl to put '!' before the parameters.
+Thanks to Alex Owen for the bug report and the initial patch.
+(Closes: #683312)
+  * Fix New Japanese translation: add ja.po, thanks to victory.
+(Closes: #692838)
+
+ -- gregor herrmann gre...@debian.org  Mon, 14 Jan 2013 20:48:18 +0100
+
 uif (1.0.6-1) unstable; urgency=low
 
   * New upstream version.
diff -Nru uif-1.0.6/debian/po/ja.po uif-1.0.6/debian/po/ja.po
--- uif-1.0.6/debian/po/ja.po	1970-01-01 01:00:00.0 +0100
+++ uif-1.0.6/debian/po/ja.po	2013-01-14 20:34:51.0 +0100
@@ -0,0 +1,149 @@
+# SOME DESCRIPTIVE TITLE.
+# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER
+# This file is distributed under the same license as the PACKAGE package.
+# victory victory@gmail.com, 2012.
+#
+msgid 
+msgstr 
+Project-Id-Version: uif\n
+Report-Msgid-Bugs-To: \n
+POT-Creation-Date: 2012-06-17 00:37+\n
+PO-Revision-Date: 2012-06-17 09:37+0900\n
+Last-Translator: victory victory@gmail.com\n
+Language-Team: Japanese debian-japan...@lists.debian.org\n
+Language: ja\n
+MIME-Version: 1.0\n
+Content-Type: text/plain; charset=UTF-8\n
+Content-Transfer-Encoding: 8bit\n
+
+#. Type: select
+#. Choices
+#: ../templates:1001
+msgid don't touch
+msgstr 触らない
+
+#. Type: select
+#. Choices
+#: ../templates:1001
+msgid workstation
+msgstr ワークステーション
+
+#. Type: select
+#. Description
+#: ../templates:1002
+msgid Firewall configuration method
+msgstr ファイアウォール設定方法
+
+#. Type: select
+#. Description
+#: ../templates:1002
+msgid 
+The firewall can be initialized using debconf, or using information you 
+manually put into /etc/uif/uif.conf.
+msgstr 
+ファイアウォールは debconf を使って、あるいは /etc/uif/uif.conf に手作業で書き
+込んだ情報を元に初期設定できます。
+
+#. Type: string
+#. Description
+#: ../templates:2001
+msgid Enter trusted hosts and/or networks:
+msgstr 信頼するホストやネットワークを入力してください:
+
+#. Type: string
+#. Description
+#: ../templates:2001
+msgid 
+In workstation mode, you can specify some hosts or networks to be globally 
+trusted. All incoming traffic coming from there will be allowed. Multiple 
+entries have to be separate with spaces.
+msgstr 
+ワークステーションモードでは、全体的に信頼するホストやネットワークを指定できま
+す。そこからのトラフィックはすべて許可されます。エントリを複数入力する場合は、
+スペースで区切ってください。
+
+#. Type: string
+#. Description
+#: ../templates:2001
+msgid Example: 10.1.0.0/16 trust.mydomain.com 192.168.1.55
+msgstr 例: 10.1.0.0/16 trust.mydomain.com 192.168.1.55
+
+#. Type: boolean
+#. Description
+#: ../templates:3001
+msgid Do you want your host to be reachable via ping?
+msgstr ホストを ping が到達可能にしますか?
+
+#. Type: boolean
+#. Description
+#: ../templates:3001
+msgid 
+Normally an Internet host should be reachable with pings. Choosing no here 
+will disable pings which might be somewhat confusing when analyzing network 
+problems.
+msgstr 
+通常、インターネットホストは ping が到達可能であるべきです。ここで no を選択す
+ると ping を無効にするため、ネットワーク問題の分析の際にやや混乱が生まれるかも
+しれません。
+
+#. Type: boolean
+#. Description
+#: ../templates:4001
+msgid Do you want your host to react to traceroutes?
+msgstr ホストを traceroute に反応するようにしますか?
+
+#. Type: boolean
+#. Description
+#: ../templates:4001
+msgid 
+Normally an Internet host should react to traceroutes. Choosing no here will 
+disable this, which might be somewhat confusing when analyzing network 
+problems.
+msgstr 
+通常、インターネットホストは traceroute に反応するべきです。ここで no を選択す
+るとこれを無効にするため、ネットワーク問題の分析の際にやや混乱が生まれるかも
+しれません。
+
+#. Type: note
+#. Description
+#: ../templates:5001
+msgid Firewall for simple workstation setups
+msgstr 単純なワークステーション用設定によるファイアウォール
+
+#. Type: note
+#. Description
+#: ../templates:5001
+msgid 
+Warning: This configuration provides a very simple firewall setup which is 
+only able to trust certain hosts and configure global ping / traceroute 
+behaviour.
+msgstr 
+警告: この設定が提供するのは非常に単純なファイアウォールで、できることは特定の
+ホストを信頼することと全体的な ping / traceroute の動作の設定だけです。
+
+#. Type: note
+#. Description
+#: ../templates:5001
+msgid 
+If you need a more specific setup, use /etc/uif/uif.conf as a template and 
+choose \don't touch\ next time.
+msgstr 
+もっと具体的な設定が必要な場合は、/etc/uif/uif.conf 

Processed: python-pygame: must add versioned dependency on python-numpy following ABI change

2013-01-14 Thread Debian Bug Tracking System
Processing control commands:

 block 685812 by -1
Bug #685812 [python-numpy] ABI change in 1.6.1 version
685812 was blocked by: 698042 698039
685812 was not blocking any bugs.
Added blocking bug(s) of 685812: 698169

-- 
685812: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685812
698169: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698169
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698169: python-pygame: must add versioned dependency on python-numpy following ABI change

2013-01-14 Thread Sébastien Villemot
Package: python-pygame
Version: 1.9.1release+dfsg-7
Severity: serious
Tags: patch
Control: block 685812 by -1

Dear Maintainer,

python-pygame uses the PyArray_CHAR enum which has been affected by an ABI
breakage in python-numpy (see #685812). Note that the version of python-pygame
currently in testing and unstable (1.9.1release+dfsg-7) was built against
python-numpy = 1:1.6.1 and therefore does not need to be rebuilt.

However, python-pygame does not declare a versioned dependency on python-numpy.
This can break partial upgrades from Squeeze to Wheezy. I am therefore
attaching a patch that fixes the issue.

For Jessie you might want to automatically generate the right versioned
dependencies on python-numpy, as explained in
/usr/share/doc/python-numpy/README.DebianMaints. This would avoid the need for
sourceful uploads in such situations.

Cheers,

-- 
 .''`.Sébastien Villemot
: :' :Debian Developer
`. `' http://www.dynare.org/sebastien
  `-  GPG Key: 4096R/381A7594
diff -Nru pygame-1.9.1release+dfsg/debian/changelog pygame-1.9.1release+dfsg/debian/changelog
--- pygame-1.9.1release+dfsg/debian/changelog	2012-09-11 00:10:20.0 +0200
+++ pygame-1.9.1release+dfsg/debian/changelog	2013-01-14 20:49:07.0 +0100
@@ -1,3 +1,12 @@
+pygame (1.9.1release+dfsg-7.1) UNRELEASED; urgency=low
+
+  * Non-maintainer upload.
+  * Following the ABI change in python-numpy = 1:1.6.1 (see #685812), add
+Depends on python-numpy (= 1:1.6.1) and python-numpy-abi9 in order to
+support partial upgrades. (Closes: #XX)
+
+ -- Sébastien Villemot sebast...@debian.org  Mon, 14 Jan 2013 20:48:08 +0100
+
 pygame (1.9.1release+dfsg-7) unstable; urgency=low
 
   * Add missing licenses and copyright holders in debian/copyright.
diff -Nru pygame-1.9.1release+dfsg/debian/control pygame-1.9.1release+dfsg/debian/control
--- pygame-1.9.1release+dfsg/debian/control	2012-04-20 05:21:47.0 +0200
+++ pygame-1.9.1release+dfsg/debian/control	2013-01-14 20:47:55.0 +0100
@@ -27,7 +27,8 @@
 Package: python-pygame
 Architecture: any
 Depends:
- python-numpy,
+ python-numpy (= 1:1.6.1),
+ python-numpy-abi9,
  ttf-freefont,
  ${misc:Depends},
  ${python:Depends},


signature.asc
Description: Digital signature


Bug#697866: marked as done (libgtk-3-bin fails to upgrade to 3.4.2-5)

2013-01-14 Thread Debian Bug Tracking System
Your message dated Mon, 14 Jan 2013 21:13:31 +0100
with message-id 1358194411.6300.34.ca...@brouzouf.villemot.name
and subject line Re: Bug#697866: libgtk-3-bin fails to upgrade to 3.4.2-5
has caused the Debian Bug report #697866,
regarding libgtk-3-bin fails to upgrade to 3.4.2-5
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
697866: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697866
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: libgtk-3-bin
Version: 3.4.2-5
Severity: serious

When trying to upgrade from 3.4.2-4 to 3.4.2-5 I get following error and
aptitude aborts

Adding 'diversion of /usr/sbin/update-icon-caches to 
/usr/sbin/update-icon-caches.gtk2 by libgtk-3-bin'
dpkg-divert: error: rename involves overwriting 
`/usr/sbin/update-icon-caches.gtk2' with
  different file `/usr/sbin/update-icon-caches', not allowed
dpkg: error processing /var/cache/apt/archives/libgtk-3-bin_3.4.2-5_amd64.deb 
(--unpack):
 subprocess new pre-installation script returned error exit status 2
Errors were encountered while processing:
 /var/cache/apt/archives/libgtk-3-bin_3.4.2-5_amd64.deb

This leaves the package management in broken state hence I marked the
bug as serious

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
armel

Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_IN, LC_CTYPE=en_IN (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages libgtk-3-bin depends on:
ii  libgtk-3-0   3.4.2-5
ii  libgtk-3-common  3.4.2-5

libgtk-3-bin recommends no packages.

libgtk-3-bin suggests no packages.

-- no debconf information

-- 
Vasudev Kamath
http://copyninja.info
Connect on ~friendica: copyninja@{frndk.de | vasudev.homelinux.net}
IRC nick: copyninja | vasudev {irc.oftc.net | irc.freenode.net}
GPG Key: C517 C25D E408 759D 98A4  C96B 6C8F 74AE 8770 0B7E


signature.asc
Description: Digital signature
---End Message---
---BeginMessage---
Le dimanche 13 janvier 2013 à 08:41 +0530, Vasudev Kamath a écrit :

 After following Michael's instruction the upgrade was successful and I
 guess we can close the bug now

Thanks, closing.

Don't hesitate to come back with more details if by chance you find what
put your system in this broken state.

-- 
 .''`.Sébastien Villemot
: :' :Debian Developer
`. `' http://www.dynare.org/sebastien
  `-  GPG Key: 4096R/381A7594



signature.asc
Description: This is a digitally signed message part
---End Message---


Bug#698175: python-sidl: needs rebuild because of python-numpy ABI change; must add corresponding versioned dependency

2013-01-14 Thread Sébastien Villemot
Package: python-sidl
Version: 1.4.0.dfsg-8
Severity: serious
Tags: patch
Control: block 685812 by -1

Dear Maintainer,

python-sidl uses the PyArray_CHAR enum which is affected by an ABI breakage in
python-numpy (see #685812). It must therefore be rebuilt.

Unfortunately a binNMU is not enough because this wouldn't produce the right
versioned dependency on python-numpy (and we want to support partial upgrades).
I am therefore attaching a patch for a sourceful upload.

For Jessie you might want to automatically generate the right versioned
dependencies on python-numpy, as explained in
/usr/share/doc/python-numpy/README.DebianMaints. This would avoid the need for
sourceful uploads in such situations.

Regards,

-- 
 .''`.Sébastien Villemot
: :' :Debian Developer
`. `' http://www.dynare.org/sebastien
  `-  GPG Key: 4096R/381A7594
diff -Nru babel-1.4.0.dfsg/debian/changelog babel-1.4.0.dfsg/debian/changelog
--- babel-1.4.0.dfsg/debian/changelog	2010-08-06 23:31:03.0 +0200
+++ babel-1.4.0.dfsg/debian/changelog	2013-01-14 21:45:33.0 +0100
@@ -1,3 +1,13 @@
+babel (1.4.0.dfsg-8.1) UNRELEASED; urgency=low
+
+  * Non-maintainer upload.
+  * Rebuild against python-numpy = 1:1.6.1 because of ABI change (see
+#685812), and add Depends on python-numpy (= 1:1.6.1) and
+python-numpy-abi9 in order to support partial upgrades.
+(Closes: #XX)
+  
+ -- Sébastien Villemot sebast...@debian.org  Mon, 14 Jan 2013 21:03:37 +0100
+
 babel (1.4.0.dfsg-8) unstable; urgency=low
 
   * Changed PYTHONINC variables for numpy package changes (closes: #590344).
diff -Nru babel-1.4.0.dfsg/debian/control babel-1.4.0.dfsg/debian/control
--- babel-1.4.0.dfsg/debian/control	2010-08-06 23:29:10.0 +0200
+++ babel-1.4.0.dfsg/debian/control	2013-01-14 21:45:36.0 +0100
@@ -56,7 +56,8 @@
 Package: python-sidl
 Architecture: any
 Section: python
-Depends: python-numpy, ${python:Depends}, ${shlibs:Depends}, ${misc:Depends}
+Depends: python-numpy (= 1:1.6.1), python-numpy-abi9, ${python:Depends},
+ ${shlibs:Depends}, ${misc:Depends}
 XB-Python-Version: ${python:Versions}
 Description: Scientific Interface Definition Language (SIDL) Python runtime
  Babel is a compiler for the Scientific Interface Definition Language (SIDL),


signature.asc
Description: Digital signature


Processed: python-sidl: needs rebuild because of python-numpy ABI change; must add corresponding versioned dependency

2013-01-14 Thread Debian Bug Tracking System
Processing control commands:

 block 685812 by -1
Bug #685812 [python-numpy] ABI change in 1.6.1 version
685812 was blocked by: 698042 698039 698169
685812 was not blocking any bugs.
Added blocking bug(s) of 685812: 698175

-- 
685812: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685812
698175: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698175
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#696909: chromium segfaults on startup on armhf

2013-01-14 Thread peter green

Note: adding debian-arm to cc for feedback from other porters.

Jonathan Nieder wrote:

Hi Peter,

peter green wrote:

  

Patch to make the package use bfd rather than gold on armel and armhf is
attached. I may or may not upload this as a NMU.



If you'll have time to continue working on chromium:arm in the future,
it would probably be better to just add yourself to pkg-chromium on
alioth
Like any other package if chromium gives us problems over in raspbian I 
will try to get those problems fixed and will contribute what I discover 
back to debian where appropriate but I don't have any real knowlege of 
chromium's internals or build system nor do I have the time or 
inclination to learn them.


Anyway I have some bad news. When I try to do an armel build with bfd on 
my imx board I get.

 LINK(target) out/Release/chrome
/usr/bin/ld.bfd.real: failed to set dynamic section sizes: Memory exhausted
collect2: ld returned 1 exit status

I have plenty of swap so i'm pretty sure the real problem is not memory 
per-se but address space. I had the same problem with the raspbian build 
(but not with the debian armhf build) and for raspbian I worked arround 
it by building with user mode qemu on an x64 host (which provides 
significantly more virtual address space than any real arm system) but 
i'm not sure that is acceptable for debian.


Thoughts on what to do for chromium on armel? leave it broken? drop it 
completely? upload packages built with bfd under user mode qemu 
(assuming that succeeds and produces usable packages) to the archive?



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: 618...@bugs.debian.org

2013-01-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 618968 + patch
Bug #618968 [netgen] netgen: links with both GPL-licensed and GPL-incompatible 
libraries
Added tag(s) patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
618968: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618968
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#696817: dovecot destroys user ssl configuration

2013-01-14 Thread Jaldhar H. Vyas

On Mon, 31 Dec 2012, Ian Zimmerman wrote:


Ob-content: this looks like a rerun of #644121.


That one got closed without ever getting resolved didn't it?  I don't 
think it is the same problem because all the configuration files are 
protected by dpkg's upgrade mechanisms.  The certificate stuff is a 
special case and it shouldn't be.


--
Jaldhar H. Vyas jald...@debian.org


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#696817: dovecot destroys user ssl configuration

2013-01-14 Thread Jaldhar H. Vyas
Sorry for not responding sooner I was unexpectedly swamped during the new 
year.


On Fri, 28 Dec 2012, Dominik George wrote:


The breakage is even worse.

1. The code that causes the problem is intended to set the *new*
  path to the certificates. Why the f*** does it print $OLD_SSL_CERT ??


No the idea was that if you have the certs in the old location, only to 
update 10-ssl.conf and make sure it has the right configuration 
values otherwise leave them alone.



2. NEVER EVER touch user confiuration! It even breaks *own* paths set.
3. Why?
4. Why??
5. Why???



The idea was to move the self-generated certs only.  Obviously I did not 
consider the scenario where a user had their own certificates but did 
not remove the dummy certificates which leads me to...



Here is a patch that leaves site-local confiuration as it is if it does
not reference the default files and only touches it when it referenced
the old default path before. It even uses the *new* path, sih ... did the
maintainer even test this *once*?


I do try and test this package as much as possible and I even had several 
other people test it before uploading but they didn't catch this either. 
The way Debians process is supposed to work is that packages get uploaded 
to unstable and with a wider audience problems will get caught before the 
package migrates to testing and mostly it works.  But it seems that with 
dovecot people wait until it is already in testing before trying it which 
defeats the whole scheme.


So what we really need is more testing before an upload even happens.  In 
theory there is a team maintaining this package but in practice the others 
have even less free time than I do and this last year I have had next to 
no time at all.  (I mean its been 3 weeks since this problem was reported 
and I'm only just responding. That would be unacceptable as a user even to 
me.)  I try and recruit anyone who shows interest but that hasn't worked 
either so far.  So once again, I ask anyone reading this who cares about 
the best possible dovecot package in Debian to pitch in.  It's easy to get 
access to the source repository and I'll help in anyway I can even giving 
you ownership if you can do a better job.


In the meantime I am preparing a new revision which will include your 
patch and better documentation of the situation.  That's the best I can do 
for now.


However, the only valid way to handle this is NOT handle it. Or do the 
modification in the ucf template *before* runnin ucf so it is merged 
into the confi file if and *only* if the user chooses to apply the 
chanes.


Yes all this stuff needs to be moved over to ucf.  I had someone offer to 
do this before the freeze began but then they disappeared and by that time 
it was too late for me to make such an invasive change.  (See above.)


--
Jaldhar H. Vyas jald...@debian.org


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#696909: chromium segfaults on startup on armhf

2013-01-14 Thread shawnlandden
It works when built with gold 2.23 on an armv6+ hardware host (bug 696284). 
This bug is also a dup, and was njotriced shortely after chromium 22 was made 
to build again on arm (ftbfs since chromium 18) due to my patches.

peter green plugw...@p10link.net wrote:

Note: adding debian-arm to cc for feedback from other porters.

Jonathan Nieder wrote:
 Hi Peter,

 peter green wrote:

   
 Patch to make the package use bfd rather than gold on armel and
armhf is
 attached. I may or may not upload this as a NMU.
 

 If you'll have time to continue working on chromium:arm in the
future,
 it would probably be better to just add yourself to pkg-chromium on
 alioth
Like any other package if chromium gives us problems over in raspbian I

will try to get those problems fixed and will contribute what I
discover 
back to debian where appropriate but I don't have any real knowlege of 
chromium's internals or build system nor do I have the time or 
inclination to learn them.

Anyway I have some bad news. When I try to do an armel build with bfd
on 
my imx board I get.
  LINK(target) out/Release/chrome
/usr/bin/ld.bfd.real: failed to set dynamic section sizes: Memory
exhausted
collect2: ld returned 1 exit status

I have plenty of swap so i'm pretty sure the real problem is not memory

per-se but address space. I had the same problem with the raspbian
build 
(but not with the debian armhf build) and for raspbian I worked arround

it by building with user mode qemu on an x64 host (which provides 
significantly more virtual address space than any real arm system) but 
i'm not sure that is acceptable for debian.

Thoughts on what to do for chromium on armel? leave it broken? drop it 
completely? upload packages built with bfd under user mode qemu 
(assuming that succeeds and produces usable packages) to the archive?


-- 
To UNSUBSCRIBE, email to debian-arm-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact
listmas...@lists.debian.org
Archive: http://lists.debian.org/50f46ff0.6080...@p10link.net

-- 
Sent from my Android phone with K-9 Mail. Please excuse my brevity.

Bug#681147: sendmail symlinks messed up during upgrade, copyright files missing

2013-01-14 Thread Andreas Beckmann
On 2012-11-24 13:46, Andreas Beckmann wrote:
 I think the patch for this issue is ready in GIT:
 
 git://github.com/anbe42/sendmail.git branch salvage (or bug-681147)

 I just didn't proceed to prepare a NMU and look for a sponsor since
 there is another RC bug (#684645) that I don't know how to fix.

I intend to upload this (#681147 only) as a NMU (DELAYED/10) once my DD
account got created and my key was added to the DD keyring.

Andreas


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#696820: Acknowledgement (Error: open(/var/mail/USER) failed: Permission denied)

2013-01-14 Thread Jaldhar H. Vyas

On Sat, 5 Jan 2013, Norbert Veber wrote:


While I'm not 100% clear on how dovecot handles permissions, would the
fix not be to set mail_access_groups=mail?

Per http://wiki2.dovecot.org/Errors/ChgrpNoPerm

Otherwise your default mail_location can not work unless it writes the
files as root or something.  This doesnt seem to be the case judging
from the permission errors reported earlier.


We want to avoid setting mail_access_group=mail because then a user would 
be able to read everyone elses  mailbox.  It should not in theory matter 
is mail_location is set appropriately but it looks like I'll have to 
investigate it further.


--
Jaldhar H. Vyas jald...@debian.org


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#696820: Error: open(/var/mail/USER) failed: Permission denied

2013-01-14 Thread Jaldhar H. Vyas

On Sat, 29 Dec 2012, Jonas Smedegaard wrote:


...but something else must be going on as well: That change warned about
in that accidentally silenced NEWS entry is way old, and what I did
yesterday on multiple machines was update from 1:2.1.7-2.

Seems to me that if I chose in earlier updates to keep my settings (as I
suspect many would do, since that worked just fine!) the update process
should have warned me about changing that file - it didn't!

So regardless of that NEWS bug (which I have now reopened) I believe
something is wrong here too.



I'll redo the NEWS file in the next update so the various issues for 
upgraders are better explained and made more prominent.


--
Jaldhar H. Vyas jald...@debian.org


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#676841: marked as done (cairo-dock-core: segfault in cairo_dock_new_dialog() from libgldi.so3 when using log out applet)

2013-01-14 Thread Debian Bug Tracking System
Your message dated Mon, 14 Jan 2013 22:32:30 +
with message-id e1tuszy-0008ss...@franck.debian.org
and subject line Bug#676841: fixed in cairo-dock 3.0.0-2+deb7u1
has caused the Debian Bug report #676841,
regarding cairo-dock-core: segfault in cairo_dock_new_dialog() from libgldi.so3 
when using log out applet
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
676841: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=676841
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: cairo-dock-core
Version: 3.0.0-2
Severity: important

I have the log-out applet added to my dock. When I click any of the options in
the Log out applet (such as Log out, Reboot, Shutdown,...), cairo-dock
segfaults and is restarted automatically. No log out happens.

cairo-dock is missing a -dbg package, so it seems impossible to get a complete
stack trace.

Program received signal SIGSEGV, Segmentation fault.
0x734c9729 in cairo_dock_new_dialog () from /usr/lib/libgldi.so.3
(gdb) thread apply all bt

Thread 5 (Thread 0x7fffc6c56700 (LWP 27203)):
#0  0x731caa93 in *__GI___poll (fds=optimized out, nfds=optimized
out, timeout=-1) at ../sysdeps/unix/sysv/linux/poll.c:87
#1  0x7fffdcfe3e3f in ?? () from /usr/lib/x86_64-linux-gnu/libpulse.so.0
#2  0x7fffdcfd539c in pa_mainloop_poll () from /usr/lib/x86_64-linux-
gnu/libpulse.so.0
#3  0x7fffdcfd59f9 in pa_mainloop_iterate () from /usr/lib/x86_64-linux-
gnu/libpulse.so.0
#4  0x7fffdcfd5ab0 in pa_mainloop_run () from /usr/lib/x86_64-linux-
gnu/libpulse.so.0
#5  0x7fffdcfe3def in ?? () from /usr/lib/x86_64-linux-gnu/libpulse.so.0
#6  0x7fffdcb8a423 in ?? () from /usr/lib/x86_64-linux-
gnu/pulseaudio/libpulsecommon-2.0.so
#7  0x72ee7b50 in start_thread (arg=optimized out) at
pthread_create.c:304
#8  0x731d56dd in clone () at
.../sysdeps/unix/sysv/linux/x86_64/clone.S:112
#9  0x in ?? ()

Thread 3 (Thread 0x7fffd71ae700 (LWP 27194)):
#0  0x731caa93 in *__GI___poll (fds=optimized out, nfds=optimized
out, timeout=-1) at ../sysdeps/unix/sysv/linux/poll.c:87
#1  0x751794d4 in g_main_context_poll (n_fds=1, fds=0xc05fb0,
timeout=-1, context=0x7fffcc0011a0, priority=optimized out)
at /tmp/buildd/glib2.0-2.32.3/./glib/gmain.c:3440
#2  g_main_context_iterate (context=0x7fffcc0011a0, block=block@entry=1,
dispatch=dispatch@entry=1,
self=error reading variable: Unhandled dwarf expression opcode 0xfa) at
/tmp/buildd/glib2.0-2.32.3/./glib/gmain.c:3141
#3  0x75179932 in g_main_loop_run (loop=0x7fffcc000f80) at
/tmp/buildd/glib2.0-2.32.3/./glib/gmain.c:3340
#4  0x772957f6 in gdbus_shared_thread_func (user_data=0x7fffcc001170)
at /tmp/buildd/glib2.0-2.32.3/./gio/gdbusprivate.c:277
#5  0x7519bdf5 in g_thread_proxy (data=0xc814f0) at
/tmp/buildd/glib2.0-2.32.3/./glib/gthread.c:801
#6  0x72ee7b50 in start_thread (arg=optimized out) at
pthread_create.c:304
#7  0x731d56dd in clone () at
.../sysdeps/unix/sysv/linux/x86_64/clone.S:112
#8  0x in ?? ()

Thread 2 (Thread 0x7fffd79af700 (LWP 27193)):
#0  pthread_cond_timedwait@@GLIBC_2.3.2 () at
.../nptl/sysdeps/unix/sysv/linux/x86_64/pthread_cond_timedwait.S:216
#1  0x751b5525 in g_cond_wait_until (cond=cond@entry=0xec2548,
mutex=mutex@entry=0xec2540, end_time=end_time@entry=705083450967)
at /tmp/buildd/glib2.0-2.32.3/./glib/gthread-posix.c:855
#2  0x7514fdb1 in g_async_queue_pop_intern_unlocked
(queue=queue@entry=0xec2540, wait=wait@entry=1,
end_time=end_time@entry=705083450967) at
/tmp/buildd/glib2.0-2.32.3/./glib/gasyncqueue.c:424
#3  0x751503fa in g_async_queue_timeout_pop (queue=0xec2540,
timeout=timeout@entry=1500)
at /tmp/buildd/glib2.0-2.32.3/./glib/gasyncqueue.c:545
#4  0x7519c5b2 in g_thread_pool_wait_for_new_pool () at
/tmp/buildd/glib2.0-2.32.3/./glib/gthreadpool.c:169
#5  g_thread_pool_thread_proxy (data=optimized out) at
/tmp/buildd/glib2.0-2.32.3/./glib/gthreadpool.c:366
#6  0x7519bdf5 in g_thread_proxy (data=0x6719e0) at
/tmp/buildd/glib2.0-2.32.3/./glib/gthread.c:801
#7  0x72ee7b50 in start_thread (arg=optimized out) at
pthread_create.c:304
---Type return to continue, or q return to quit---
#8  0x731d56dd in clone () at
.../sysdeps/unix/sysv/linux/x86_64/clone.S:112
#9  0x in ?? ()

Thread 1 (Thread 0x77fb9980 (LWP 27188)):
#0  0x734c9729 in cairo_dock_new_dialog () from /usr/lib/libgldi.so.3
#1  0x734ccd4a in cairo_dock_build_dialog () from /usr/lib/libgldi.so.3
#2  

Processed: found 687947 in 1:4.04~dfsg-1

2013-01-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 found 687947 1:4.04~dfsg-1
Bug #687947 [wims] wims: modifies shipped files: 
/var/lib/wims/public_html/gifs/*, /var/lib/wims/public_html/themes/*
Marked as found in versions wims/1:4.04~dfsg-1.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
687947: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687947
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: limit source to java-package, tagging 698108

2013-01-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 #java-package (0.50+nmu2) unstable; urgency=high
 #
 #  * Java 7 updates now get two digits. Closes: #698108
 #
 limit source java-package
Limiting to bugs with field 'source' containing at least one of 'java-package'
Limit currently set to 'source':'java-package'

 tags 698108 + pending
Bug #698108 [java-package] jdk7u11 not supported
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
698108: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698108
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698108: java-package: diff for NMU version 0.50+nmu2

2013-01-14 Thread David Prévot
tags 698108 + patch
thanks

Dear maintainer,

I've prepared an NMU for java-package (versioned as 0.50+nmu2) and
uploaded it to DELAYED/2. Please feel free to tell me if I
should delay it longer (or even if I should dcut it to 0-day, given the
security matter).

If you prefer to fix it in another not intrusive way (not c1fb4d0), I'm
happy to (quickly) sponsor your package too.

Regards.

David
diff -Nru java-package-0.50+nmu1/debian/changelog java-package-0.50+nmu2/debian/changelog
--- java-package-0.50+nmu1/debian/changelog	2012-09-06 18:38:09.0 -0400
+++ java-package-0.50+nmu2/debian/changelog	2013-01-14 19:31:25.0 -0400
@@ -1,3 +1,11 @@
+java-package (0.50+nmu2) unstable; urgency=high
+
+  * Non-maintainer upload.
+  * Java 7 updates now get two digits. Closes: #698108
+  * Update documentation accordingly.
+
+ -- David Prévot taf...@debian.org  Mon, 14 Jan 2013 19:30:55 -0400
+
 java-package (0.50+nmu1) unstable; urgency=low
 
   * Non-maintainer upload.
diff -Nru java-package-0.50+nmu1/debian/control java-package-0.50+nmu2/debian/control
--- java-package-0.50+nmu1/debian/control	2012-09-06 18:38:27.0 -0400
+++ java-package-0.50+nmu2/debian/control	2013-01-14 19:40:26.0 -0400
@@ -19,10 +19,10 @@
  (with archive files downloaded from providers listed below)
  .
  Supported java binary distributions currently include:
-   * Oracle (http://www.oracle.com/technetwork/java/javase/downloads) :
- - The J2SE Development Kit (JDK), version 6 (update = 10), 7
- - The J2SE Runtime Environment (JRE), version 6 (update = 10), 7
- - The J2SE API Javadoc, version 6 (update = 10), 7
+   * Oracle (http://www.oracle.com/technetwork/java/javase/downloads):
+ - The J2SE Development Kit (JDK), version 6 and 7 (update = 10)
+ - The J2SE Runtime Environment (JRE), version 6 and 7 (update = 10)
+ - The J2SE API Javadoc, version 6 and 7 (update = 10)
  (Choose tar.gz archives or self-extracting archives, do _not_ choose the RPM!)
  .
  Please note that Debian recommends the use of openjdk-6-jdk/openjdk-6-jre
diff -Nru java-package-0.50+nmu1/debian/README.Debian java-package-0.50+nmu2/debian/README.Debian
--- java-package-0.50+nmu1/debian/README.Debian	2012-02-08 19:52:45.0 -0400
+++ java-package-0.50+nmu2/debian/README.Debian	2013-01-14 19:40:33.0 -0400
@@ -15,10 +15,10 @@
 - installing the generated package
 
 Supported java binary distributions currently include:
-  * Oracle (http://www.oracle.com/technetwork/java/javase/downloads) :
-- The J2SE Development Kit (JDK), version 6 (update = 10), 7
-- The J2SE Runtime Environment (JRE), version 6 (update = 10), 7
-- The J2SE API Javadoc, version 6 (update = 10), 7
+  * Oracle (http://www.oracle.com/technetwork/java/javase/downloads):
+- The J2SE Development Kit (JDK), version 6 and 7 (update = 10)
+- The J2SE Runtime Environment (JRE), version 6 and 7 (update = 10)
+- The J2SE API Javadoc, version 6 and 7 (update = 10)
   (Choose tar.gz archives or self-extracting archives, do _not_ choose the RPM!)
 
 All other previously supported jvm (Blackdown, IBM, ..) have been removed and
diff -Nru java-package-0.50+nmu1/lib/oracle-j2re.sh java-package-0.50+nmu2/lib/oracle-j2re.sh
--- java-package-0.50+nmu1/lib/oracle-j2re.sh	2012-01-21 08:21:00.0 -0400
+++ java-package-0.50+nmu2/lib/oracle-j2re.sh	2013-01-14 19:10:30.0 -0400
@@ -12,8 +12,8 @@
 	j2se_priority=314
 	found=true
 	;;
-	jre-7u[0-9]-linux-i586.tar.gz) # SUPPORTED
-	j2se_version=1.7.0+update${archive_name:6:1}${revision}
+	jre-7u[0-9][0-9]-linux-i586.tar.gz) # SUPPORTED
+	j2se_version=1.7.0+update${archive_name:6:2}${revision}
 	j2se_expected_min_size=94 #Mb
 	j2se_priority=316
 	found=true
@@ -28,8 +28,8 @@
 	j2se_priority=314
 	found=true
 	;;
-	jre-7u[0-9]-linux-x64.tar.gz) # SUPPORTED
-	j2se_version=1.7.0+update${archive_name:6:1}${revision}
+	jre-7u[0-9][0-9]-linux-x64.tar.gz) # SUPPORTED
+	j2se_version=1.7.0+update${archive_name:6:2}${revision}
 	j2se_expected_min_size=88 #Mb
 	j2se_priority=316
 	found=true
diff -Nru java-package-0.50+nmu1/lib/oracle-j2sdk-doc.sh java-package-0.50+nmu2/lib/oracle-j2sdk-doc.sh
--- java-package-0.50+nmu1/lib/oracle-j2sdk-doc.sh	2012-01-21 08:21:00.0 -0400
+++ java-package-0.50+nmu2/lib/oracle-j2sdk-doc.sh	2013-01-14 19:09:57.0 -0400
@@ -7,8 +7,8 @@
 	j2se_expected_min_size=44 #Mb
 	found=true
 	;;
-	jdk-7u[0-9]-apidocs.zip) # SUPPORTED
-	j2se_version=1.7.0+update${archive_name:6:1}${revision}
+	jdk-7u[0-9][0-9]-apidocs.zip) # SUPPORTED
+	j2se_version=1.7.0+update${archive_name:6:2}${revision}
 	j2se_expected_min_size=290 #Mb
 	found=true
 	;;
diff -Nru java-package-0.50+nmu1/lib/oracle-j2sdk.sh java-package-0.50+nmu2/lib/oracle-j2sdk.sh
--- java-package-0.50+nmu1/lib/oracle-j2sdk.sh	2012-01-21 08:21:00.0 -0400
+++ java-package-0.50+nmu2/lib/oracle-j2sdk.sh	

Processed: java-package: diff for NMU version 0.50+nmu2

2013-01-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 698108 + patch
Bug #698108 [java-package] jdk7u11 not supported
Added tag(s) patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
698108: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698108
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#696820: Error: open(/var/mail/USER) failed: Permission denied

2013-01-14 Thread Jonas Smedegaard
[re-sending to proper addresses]

Quoting Jaldhar H. Vyas (2013-01-14 21:34:10)
 On Sat, 29 Dec 2012, Jonas Smedegaard wrote:
 
  ...but something else must be going on as well: That change warned 
  about in that accidentally silenced NEWS entry is way old, and what 
  I did yesterday on multiple machines was update from 1:2.1.7-2.
 
  Seems to me that if I chose in earlier updates to keep my settings 
  (as I suspect many would do, since that worked just fine!) the 
  update process should have warned me about changing that file - it 
  didn't!
 
  So regardless of that NEWS bug (which I have now reopened) I believe 
  something is wrong here too.
 
 
 I'll redo the NEWS file in the next update so the various issues for 
 upgraders are better explained and made more prominent.


Sounds great!


 - Jonas

-- 
 * Jonas Smedegaard - idealist  Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private


signature.asc
Description: signature


Bug#696909: chromium segfaults on startup on armhf

2013-01-14 Thread peter green

shawnland...@gmail.com wrote:

It works when built with gold 2.23
Is anyone working on either getting that into wheezy (if it's a bugfix 
release that is likely to pass the release teams requirements) or to 
backport the required fixes?



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#696757: ecl hang: SIGNAL problem

2013-01-14 Thread Christoph Egger
My current guess is that ecl seems to block some signals it shouldn't
be able to. However I'm somehow no longer able to run ecl_min in gdb in
a usefull way it seems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#694376: dovecot-common: missing Breaks+Replaces: mailavenger ( 0.8.1-4)

2013-01-14 Thread Andreas Beckmann
Followup-For: Bug #694376
Control: retitle -1 dovecot-core: missing Breaks+Replaces: mailavenger ( 
0.8.1-4)

 The file conflict was fixed by renaming the file in mailavenger, but
 dovecot-common still needs to ensure that it doesn't get installed along
 a mailavenger that predates the rename.

Looks like the dovecot packages were reorganized since this bug was
initially filed and the conflicting files are no longer in
dovecot-common but are in dovecot-core nowadays. Therefore the
Breaks+Replaces need to be added in dovecot-core instead.

The following relationships should be added for a clean takeover
(http://www.debian.org/doc/debian-policy/ch-relationships.html#s-replaces):

  Package:  dovecot-core
  Breaks:   mailavenger ( 0.8.1-4)
  Replaces: mailavenger ( 0.8.1-4)

cheers,

Andreas


mailavenger=0.8.1-3_dovecot-core=1:2.1.7-6.log.gz
Description: GNU Zip compressed data


Processed: Re: dovecot-common: missing Breaks+Replaces: mailavenger ( 0.8.1-4)

2013-01-14 Thread Debian Bug Tracking System
Processing control commands:

 retitle -1 dovecot-core: missing Breaks+Replaces: mailavenger ( 0.8.1-4)
Bug #694376 {Done: jald...@debian.org (Jaldhar H. Vyas)} [dovecot-common] 
dovecot-common: missing Breaks+Replaces: mailavenger ( 0.8.1-4)
Changed Bug title to 'dovecot-core: missing Breaks+Replaces: mailavenger ( 
0.8.1-4)' from 'dovecot-common: missing Breaks+Replaces: mailavenger ( 
0.8.1-4)'

-- 
694376: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694376
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: found 694376 in 1:2.1.7-6, found 697901 in scheme9/2012.12.17-1, found 697901 in c2html/0.9.6-3 ...

2013-01-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 found 694376 1:2.1.7-6
Bug #694376 {Done: jald...@debian.org (Jaldhar H. Vyas)} [dovecot-common] 
dovecot-core: missing Breaks+Replaces: mailavenger ( 0.8.1-4)
Marked as found in versions dovecot/1:2.1.7-6; no longer marked as fixed in 
versions dovecot/1:2.1.7-6 and reopened.
 found 697901 scheme9/2012.12.17-1
Bug #697901 [scheme9,c2html] c2html and scheme9: error when trying to install 
together
Marked as found in versions scheme9/2012.12.17-1.
 found 697901 c2html/0.9.6-3
Bug #697901 [scheme9,c2html] c2html and scheme9: error when trying to install 
together
Marked as found in versions c2html/0.9.6-3.
 found 698115 dicom3tools/1.0~20121227-1
Bug #698115 [dicom3tools,dcap] dcap and dicom3tools: error when trying to 
install together
Marked as found in versions dicom3tools/1.0~20121227-1.
 found 698115 dcap/2.47.7-1
Bug #698115 [dicom3tools,dcap] dcap and dicom3tools: error when trying to 
install together
Marked as found in versions dcap/2.47.7-1.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
694376: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694376
697901: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697901
698115: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698115
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698169: marked as done (python-pygame: must add versioned dependency on python-numpy following ABI change)

2013-01-14 Thread Debian Bug Tracking System
Your message dated Tue, 15 Jan 2013 03:47:52 +
with message-id e1tuxva-w9...@franck.debian.org
and subject line Bug#698169: fixed in pygame 1.9.1release+dfsg-8
has caused the Debian Bug report #698169,
regarding python-pygame: must add versioned dependency on python-numpy 
following ABI change
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
698169: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698169
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: python-pygame
Version: 1.9.1release+dfsg-7
Severity: serious
Tags: patch
Control: block 685812 by -1

Dear Maintainer,

python-pygame uses the PyArray_CHAR enum which has been affected by an ABI
breakage in python-numpy (see #685812). Note that the version of python-pygame
currently in testing and unstable (1.9.1release+dfsg-7) was built against
python-numpy = 1:1.6.1 and therefore does not need to be rebuilt.

However, python-pygame does not declare a versioned dependency on python-numpy.
This can break partial upgrades from Squeeze to Wheezy. I am therefore
attaching a patch that fixes the issue.

For Jessie you might want to automatically generate the right versioned
dependencies on python-numpy, as explained in
/usr/share/doc/python-numpy/README.DebianMaints. This would avoid the need for
sourceful uploads in such situations.

Cheers,

-- 
 .''`.Sébastien Villemot
: :' :Debian Developer
`. `' http://www.dynare.org/sebastien
  `-  GPG Key: 4096R/381A7594
diff -Nru pygame-1.9.1release+dfsg/debian/changelog pygame-1.9.1release+dfsg/debian/changelog
--- pygame-1.9.1release+dfsg/debian/changelog	2012-09-11 00:10:20.0 +0200
+++ pygame-1.9.1release+dfsg/debian/changelog	2013-01-14 20:49:07.0 +0100
@@ -1,3 +1,12 @@
+pygame (1.9.1release+dfsg-7.1) UNRELEASED; urgency=low
+
+  * Non-maintainer upload.
+  * Following the ABI change in python-numpy = 1:1.6.1 (see #685812), add
+Depends on python-numpy (= 1:1.6.1) and python-numpy-abi9 in order to
+support partial upgrades. (Closes: #XX)
+
+ -- Sébastien Villemot sebast...@debian.org  Mon, 14 Jan 2013 20:48:08 +0100
+
 pygame (1.9.1release+dfsg-7) unstable; urgency=low
 
   * Add missing licenses and copyright holders in debian/copyright.
diff -Nru pygame-1.9.1release+dfsg/debian/control pygame-1.9.1release+dfsg/debian/control
--- pygame-1.9.1release+dfsg/debian/control	2012-04-20 05:21:47.0 +0200
+++ pygame-1.9.1release+dfsg/debian/control	2013-01-14 20:47:55.0 +0100
@@ -27,7 +27,8 @@
 Package: python-pygame
 Architecture: any
 Depends:
- python-numpy,
+ python-numpy (= 1:1.6.1),
+ python-numpy-abi9,
  ttf-freefont,
  ${misc:Depends},
  ${python:Depends},


signature.asc
Description: Digital signature
---End Message---
---BeginMessage---
Source: pygame
Source-Version: 1.9.1release+dfsg-8

We believe that the bug you reported is fixed in the latest version of
pygame, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 698...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Vincent Cheng vincentc1...@gmail.com (supplier of updated pygame package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 14 Jan 2013 19:23:48 -0800
Source: pygame
Binary: python-pygame
Architecture: source amd64
Version: 1.9.1release+dfsg-8
Distribution: unstable
Urgency: low
Maintainer: Ed Boraas e...@debian.org
Changed-By: Vincent Cheng vincentc1...@gmail.com
Description: 
 python-pygame - SDL bindings for games development in Python
Closes: 698169
Changes: 
 pygame (1.9.1release+dfsg-8) unstable; urgency=low
 .
   [ Sébastien Villemot ]
   * Following the ABI change in python-numpy = 1:1.6.1 (see #685812), add
 Depends on python-numpy (= 1:1.6.1) and python-numpy-abi9 in order to
 support partial upgrades. (Closes: #698169)
Checksums-Sha1: 
 7dc999a97135f73f3e2c93298dcacfd94be1d9c2 2289 pygame_1.9.1release+dfsg-8.dsc
 de4020dfe2a1fec81e634308771d7f5f70cd4476 2090697 
pygame_1.9.1release+dfsg.orig.tar.gz
 7fec19b8766e41df76fa803b5e2812d12591776a 14617 
pygame_1.9.1release+dfsg-8.debian.tar.gz
 9e2cda11cf722247bf6af764d0857d9432b3e942 2917154 

Processed: tagging as pending bugs that are closed by packages in NEW

2013-01-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 # Monday 21 January  19:03:11 UTC 2013
 # Tagging as pending bugs that are closed by packages in NEW
 # http://ftp-master.debian.org/new.html
 #
 # Source package in NEW: a 
 href=http://packages.qa.debian.org/jquery-goodies;jquery-goodies/a
 tags 697234 + pending
Bug #697234 [wnpp] ITP: libjs-jquery-slides -- Simple slideshow plugin for 
jQuery
Added tag(s) pending.
 # Source package in NEW: a 
 href=http://packages.qa.debian.org/libguestfs;libguestfs/a
 tags 698151 + pending
Bug #698151 [src:libguestfs] libguestfs: FTBFS in unstable due to dropped 
fuse-utils (Build-Depends)
Added tag(s) pending.

End of message, stopping processing here.

Please contact me if you need assistance.
-- 
697234: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697234
698151: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698151
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: found 697901 in scheme9/2013.01.09-1

2013-01-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 found 697901 scheme9/2013.01.09-1
Bug #697901 [scheme9,c2html] c2html and scheme9: error when trying to install 
together
Marked as found in versions scheme9/2013.01.09-1.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
697901: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697901
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698108: java-package: diff for NMU version 0.50+nmu2

2013-01-14 Thread Niels Thykier
On 2013-01-15 00:57, David Prévot wrote:
 tags 698108 + patch
 thanks
 
 Dear maintainer,
 
 I've prepared an NMU for java-package (versioned as 0.50+nmu2) and
 uploaded it to DELAYED/2. Please feel free to tell me if I
 should delay it longer (or even if I should dcut it to 0-day, given the
 security matter).
 
 If you prefer to fix it in another not intrusive way (not c1fb4d0), I'm
 happy to (quickly) sponsor your package too.
 
 Regards.
 
 David
 
 [...]

Seems to me your patch will prevent anyone from using java-package on
the older Java7 binaries.  If we do remove this support because they are
infested with security issues making them unsuitable for anything at
all[1], I think it should have a nice little error message saying Nope,
won't do this - That version is vulnerable/unsupported/$whatever.
  Just so people are aware it is a deliberate choice from our side and
not a buggy script crashing.  (Particularly people have been using it
with older versions before.  They might be surprised to see that
non-descriptive error message the reporter included in the original mail).

~Niels

[1] Something I would find entirely plausible at this point.


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org