Bug#506008: [grub-invaders] Fails to boot

2008-11-19 Thread Fabian Greffrath

Hello Robert,

please have a look at #506008. I remember that we have discussed the 
affected lines before I asked you to upload the package. Can you 
imagine what went wrong?


If you like, please NMU.

Cheers,
Fabian

--
Dipl.-Phys. Fabian Greffrath

Ruhr-Universität Bochum
Lehrstuhl für Energieanlagen und Energieprozesstechnik (LEAT)
Universitätsstr. 150, IB 3/134
D-44780 Bochum

Telefon: +49 (0)234 / 32-26334
Fax: +49 (0)234 / 32-14227
E-Mail:  [EMAIL PROTECTED]



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#505446: mlocate always creates empty database

2008-11-19 Thread Nigel Horne

Sebastian Andrzej Siewior wrote:

* Nigel Horne | 2008-11-18 21:35:14 [+]:

  

According to your strace output it seems that mlocate skips your root
device. Could you start |/usr/bin/updatedb.mlocate --debug-pruning

and paste what you get?

  
  

conf_block:
prune_bind_mounts\000


you remove all bind mounts

  

---
Rebuilding bind_mount_paths:
`/', opts `rw,noatime,errors=remount-ro'
`/lib/init/rw', opts `rw,nosuid,mode=0755'
`/proc', opts `rw,noexec,nosuid,nodev'
`/sys', opts `rw,noexec,nosuid,nodev'
`/proc/bus/usb', opts `rw'
`/dev', opts `rw,mode=0755'
`/dev/shm', opts `rw,nosuid,nodev'
`/dev/pts', opts `rw,noexec,nosuid,gid=5,mode=620'
`/sys/fs/fuse/connections', opts `rw'
`/home', opts `rw,noatime'
`/mnt/c', opts `rw,allow_other,blksize=4096'
`/mnt/d', opts `rw,allow_other,blksize=4096'
`/', opts `rw,bind'
= adding `/'
`/home', opts `rw,bind'
= adding `/home'
`/var/lib/nfs/rpc_pipefs', opts `rw'
`/net', opts `rw,fd=4,pgrp=3012,minproto=2,maxproto=4'
`/smb', opts `rw,fd=4,pgrp=2980,minproto=2,maxproto=4'
...done
Skipping `/': bind mount



and your root is bind mounted. Your setup may be be broken somehow. I
guess your / mount point is twice in /etc/mtab with ext3 and with a bind
mount. Once you get rid of this, your mlocate will work again.

Do you have a special fstab, initrd hooks or something else that would
explain it? Maybe it is a leftover from an earlier install and will work
once you remove that line.
  


Its a clean installation, the disc was formatted before installation.
If something is wrong it's nothing I've done!

Here is my /etc/mtab

/dev/sda6 / ext3 rw,noatime,errors=remount-ro 0 0
tmpfs /lib/init/rw tmpfs rw,nosuid,mode=0755 0 0
proc /proc proc rw,noexec,nosuid,nodev 0 0
sysfs /sys sysfs rw,noexec,nosuid,nodev 0 0
procbususb /proc/bus/usb usbfs rw 0 0
udev /dev tmpfs rw,mode=0755 0 0
tmpfs /dev/shm tmpfs rw,nosuid,nodev 0 0
devpts /dev/pts devpts rw,noexec,nosuid,gid=5,mode=620 0 0
fusectl /sys/fs/fuse/connections fusectl rw 0 0
/dev/sdb2 /home ext3 rw,noatime 0 0
/dev/sda2 /mnt/c fuseblk rw,allow_other,blksize=4096 0 0
/dev/sdb1 /mnt/d fuseblk rw,allow_other,blksize=4096 0 0
/ / bind rw,bind 0 0
/home /home bind rw,bind 0 0
rpc_pipefs /var/lib/nfs/rpc_pipefs rpc_pipefs rw 0 0
automount(pid3573) /net autofs rw,fd=4,pgrp=3573,minproto=2,maxproto=4 0 0
automount(pid3544) /smb autofs rw,fd=4,pgrp=3544,minproto=2,maxproto=4 0 0



Sebastian
  



--
Nigel Horne
ClamAV, The Open-Source GPL Multi-Platform Anti-Virus tool-kit




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: unarchiving 495655

2008-11-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 unarchive 495655
Bug 495655 [cpufreqd] cpufreqd: Fails to read battery info
Unarchived Bug 495655

End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#495655: not fixed in cpufreqd 2.3.3-3

2008-11-19 Thread Dirk Mueller
reopen 495655
found 495655 2.3.3-3
thanks


error messages:


cpufreqd: get_class_device_attribute: couldn't 
open /sys/class/power_supply/C1ED/energy_full (No such file or directory)
cpufreqd: get_class_device_attribute: couldn't 
open /sys/class/power_supply/C1ED/energy_now (No such file or directory)


under
  /sys/class/power_supply/C1ED

 I can find charge_full and charge_now.


Package Information:

Package: cpufreqd
Priority: optional
Section: admin
Installed-Size: 376
Maintainer: Mattia Dongili [EMAIL PROTECTED]
Architecture: amd64
Version: 2.3.3-3
Depends: libc6 (= 2.7-1), libcpufreq0, libsensors3 (= 1:2.10.3-1), 
libsysfs2, lsb-base (= 3.0)
Recommends: acpid
Suggests: cpufrequtils
Conflicts: cpudyn, powernowd
Filename: pool/main/c/cpufreqd/cpufreqd_2.3.3-3_amd64.deb
Size: 86048
MD5sum: a7586d4ecf39a083dc6352723c2f0c11
SHA1: 26f70179357ff135ebc7290dbf3a2871ee71c203
SHA256: 33fd69d99b1eed663c18fd096006c054330a0dd4838eaa4031acfd9071f69f1f



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Bug#495655: not fixed in cpufreqd 2.3.3-3

2008-11-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 reopen 495655
Bug#495655: cpufreqd: Fails to read battery info
'reopen' may be inappropriate when a bug has been closed with a version;
you may need to use 'found' to remove fixed versions.
Bug reopened, originator not changed.

 found 495655 2.3.3-3
Bug#495655: cpufreqd: Fails to read battery info
Bug marked as found in version 2.3.3-3.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#504373: Please unblock libtemplate-plugin-dbi-perl/2.64-1

2008-11-19 Thread Dominic Hargreaves
On Tue, Nov 04, 2008 at 02:13:16PM -0600, Gunnar Wolf wrote:
 Dominic Hargreaves dijo [Tue, Nov 04, 2008 at 01:07:50PM +]:
  It was a deliberate decision not to proactively package Template::DBI
  based on the fact that no package used that functionality at the time
  (and presumably still doesn't).
  
  If it's now considered essential, then another option would be to
  repackage Template::DBI inside the main TT package as a high-urgency
  upload (and preparing a package for NEW) if that would make it more
  likely to be accepted by the release team.
  
  I am happy to do the work either as a NEW package for lenny or as
  described above, if there is consensus.
 
 Umh, IMHO it would be way cleaner and better to make this a new
 package. After all, the release team are not robots, and I guess that
 making this a clean solution will look much better in their eyes than
 clumping (hiding even?) a full module inside this package.

Dear release team,

As above, please could you unblock the humble new package
libtemplate-plugin-dbi-perl/2.64-1 to help fix RC bug #504373.

libtemplate-perl in etch contains version 2.63 of this module, and 2.64
contains only trivial changes, so I believe the possibility for
regressions by including this module is very slight.

Once you have confirmed this, an upload of libtemplate-perl to t-p-u
will follow, adding the dependency on libtemplate-plugin-dbi-perl.

Thanks,
Dominic.

-- 
Dominic Hargreaves | http://www.larted.org.uk/~dom/
PGP key 5178E2A5 from the.earth.li (keyserver,web,email)



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#504528: libghc6-configfile-dev: Fails to configure: MissingH-1.0.1 doesn't exist

2008-11-19 Thread Philipp Kern
Hi John,

On Tue, Nov 11, 2008 at 09:51:01PM +0100, Stefan Potyra wrote:
 simply rebuilding will make the maintainer scripts pickup the newer
 missingh dependency, and hence will fix this bug.
 However I haven't tested yet if haskell-configfile will still be
 functional with the later missingh (though doubt it isn't).

adding calls to dh_haskell_depends would prevent further bug reports
of this kind.  It looks like it fixes the problem also in this case
properly (i.e. adding sensible binary dependencies).  Would you mind
to add such calls to your debian/rules or look into adding it
to dh_haskell?

Kind regards,
Philipp Kern


signature.asc
Description: Digital signature


Bug#502346: not fixed

2008-11-19 Thread Bastian Blank
This bug is _not_ fixed.

Bastian

-- 
Prepare for tomorrow -- get ready.
-- Edith Keeler, The City On the Edge of Forever,
   stardate unknown



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#506008: [grub-invaders] Fails to boot

2008-11-19 Thread Didier Raboud
Le mercredi 19 novembre 2008 11:26:05, vous avez écrit :
 Hi!

 The proposed patch is wrong.  I have no idea how it is supposed to fix the
 problem, but grub isn't supposed to perform UUID search for a partition
 unless it is going to be accessed (i.e. after user selection).

Hi,

I tend to agree and I still wonder why it didn't work, but note that this is 
what is done in /etc/grub.d/10_linux . That's why I proposed a patch doing the 
same.

See my attached /boot/grub/grub.cfg and its relevant parts in 10_linux :

set root=(hd0,1)
search --fs-uuid --set 055ce214-7182-4b61-84e8-c831372d5e64
menuentry Debian GNU/Linux, linux 2.6.27-1-amd64 {
(...)

 On Mon, Nov 17, 2008 at 07:11:02PM +0100, Didier Raboud wrote:
  While trying grub-pc, I went over grub-invaders. Installation went fine,
  but it failed to boot with an error like multiboot unknown (can't
  remember exactly).

 I need a better description of the problem before I can figure out what
 causes it.  Please provide exact error, and a copy of your grub.cfg.

You'll find attached a picture of my screen after having tried to 
boot invaders. 

You'll see (good eyes needed ;) ) :

  Booting 'GRUB Invaders'

error: unknown command 'multiboot'

Press any key to continue

With my patch (even if wrong though), I am able to play 'GRUB invaders' with 
sound, colors and fullscreen ;)

Regards, 

OdyX
-- 
Didier Raboud, proud Debian user.
CH-1802 Corseaux
[EMAIL PROTECTED]
#
# DO NOT EDIT THIS FILE
#
# It is automatically generated by /usr/sbin/update-grub using templates
# from /etc/grub.d and settings from /etc/default/grub
#

### BEGIN /etc/grub.d/00_header ###
set default=0
set timeout=5
set root=(hd0,1)
search --fs-uuid --set 055ce214-7182-4b61-84e8-c831372d5e64
if font /grub/ascii.pff ; then
  set gfxmode=640x480
  insmod gfxterm
  insmod vbe
  terminal gfxterm
fi
### END /etc/grub.d/00_header ###

### BEGIN /etc/grub.d/05_debian_theme ###
set root=(hd0,1)
search --fs-uuid --set 055ce214-7182-4b61-84e8-c831372d5e64
insmod png
if background_image /grub/moreblue-orbit-grub.png ; then
  set color_normal=black/black
  set color_highlight=magenta/black
else
  set menu_color_normal=cyan/blue
  set menu_color_highlight=white/blue
fi
### END /etc/grub.d/05_debian_theme ###

### BEGIN /etc/grub.d/10_hurd ###
### END /etc/grub.d/10_hurd ###

### BEGIN /etc/grub.d/10_linux ###
set root=(hd0,1)
search --fs-uuid --set 055ce214-7182-4b61-84e8-c831372d5e64
menuentry Debian GNU/Linux, linux 2.6.27-1-amd64 {
linux   /vmlinuz-2.6.27-1-amd64 root=/dev/mapper/Tamino-Root ro quiet 
vga=792 
initrd  /initrd.img-2.6.27-1-amd64
}
menuentry Debian GNU/Linux, linux 2.6.27-1-amd64 (single-user mode) {
linux   /vmlinuz-2.6.27-1-amd64 root=/dev/mapper/Tamino-Root ro single 
quiet vga=792
initrd  /initrd.img-2.6.27-1-amd64
}
menuentry Debian GNU/Linux, linux 2.6.26-1-xen-amd64 {
linux   /vmlinuz-2.6.26-1-xen-amd64 root=/dev/mapper/Tamino-Root ro 
quiet vga=792 
initrd  /initrd.img-2.6.26-1-xen-amd64
}
menuentry Debian GNU/Linux, linux 2.6.26-1-xen-amd64 (single-user mode) {
linux   /vmlinuz-2.6.26-1-xen-amd64 root=/dev/mapper/Tamino-Root ro 
single quiet vga=792
initrd  /initrd.img-2.6.26-1-xen-amd64
}
menuentry Debian GNU/Linux, linux 2.6.26-1-amd64 {
linux   /vmlinuz-2.6.26-1-amd64 root=/dev/mapper/Tamino-Root ro quiet 
vga=792 
initrd  /initrd.img-2.6.26-1-amd64
}
menuentry Debian GNU/Linux, linux 2.6.26-1-amd64 (single-user mode) {
linux   /vmlinuz-2.6.26-1-amd64 root=/dev/mapper/Tamino-Root ro single 
quiet vga=792
initrd  /initrd.img-2.6.26-1-amd64
}
### END /etc/grub.d/10_linux ###

### BEGIN /etc/grub.d/22_invaders ###
menuentry GRUB Invaders {
set root=(hd0,1)
search --fs-uuid --set 055ce214-7182-4b61-84e8-c831372d5e64
multiboot   /invaders
}
### END /etc/grub.d/22_invaders ###

### BEGIN /etc/grub.d/30_os-prober ###
### END /etc/grub.d/30_os-prober ###
attachment: 8AI90059.jpg

signature.asc
Description: This is a digitally signed message part.


Bug#506008: [grub-invaders] Fails to boot

2008-11-19 Thread Robert Millan
On Wed, Nov 19, 2008 at 11:52:22AM +0100, Didier Raboud wrote:
 Le mercredi 19 novembre 2008 11:26:05, vous avez écrit :
  Hi!
 
  The proposed patch is wrong.  I have no idea how it is supposed to fix the
  problem, but grub isn't supposed to perform UUID search for a partition
  unless it is going to be accessed (i.e. after user selection).
 
 Hi,
 
 I tend to agree and I still wonder why it didn't work, but note that this is 
 what is done in /etc/grub.d/10_linux . That's why I proposed a patch doing 
 the 
 same.
 
 See my attached /boot/grub/grub.cfg and its relevant parts in 10_linux :
 
   set root=(hd0,1)
   search --fs-uuid --set 055ce214-7182-4b61-84e8-c831372d5e64
   menuentry Debian GNU/Linux, linux 2.6.27-1-amd64 {
   (...)

Note that this was a bug.  It was fixed in:

2008-08-01  Robert Millan  [EMAIL PROTECTED]

* util/grub.d/10_linux.in: Use prepare_grub_to_access_device() from
within menuentries, not before them.
util/grub.d/10_hurd.in: Likewise.

Not sure if it made it to Lenny.

-- 
Robert Millan

  The DRM opt-in fallacy: Your data belongs to us. We will decide when (and
  how) you may access your data; but nobody's threatening your freedom: we
  still allow you to remove your data and not access it at all.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#505576: marked as done (lacks dependency on procps)

2008-11-19 Thread Debian Bug Tracking System

Your message dated Wed, 19 Nov 2008 11:47:05 +
with message-id [EMAIL PROTECTED]
and subject line Bug#505576: fixed in buffycli 0.2.1-3
has caused the Debian Bug report #505576,
regarding lacks dependency on procps
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
505576: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505576
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: buffycli
Version: 0.2.1-1
Severity: serious
Tags: patch

Commit 0c4e5e20a4c64231d612c24e88efe86e62f151fd in the Git repo
fixes this.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-1-amd64 (SMP w/1 CPU core)
Locale: LANG=en_GB, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages buffycli depends on:
ii  libbuffy-perl 0.9Perl wrapper for the libbuffy libr
ii  libtext-formattable-perl  1.01-3 Format text tables
ii  libtie-ixhash-perl1.21-2 ordered associative arrays for Per
ii  perl  5.10.0-17  Larry Wall's Practical Extraction 

buffycli recommends no packages.

Versions of packages buffycli suggests:
ii  mutt  1.5.18-4   text-based mailreader supporting M
ii  offlineimap   6.0.3  IMAP/Maildir synchronization and r

-- no debconf information


-- 
 .''`.   martin f. krafft [EMAIL PROTECTED]
: :'  :  proud Debian developer, author, administrator, and user
`. `'`   http://people.debian.org/~madduck - http://debiansystem.info
  `-  Debian - when you have better things to do than fixing systems


digital_signature_gpg.asc
Description: Digital signature (see http://martin-krafft.net/gpg/)
---End Message---
---BeginMessage---
Source: buffycli
Source-Version: 0.2.1-3

We believe that the bug you reported is fixed in the latest version of
buffycli, which is due to be installed in the Debian FTP archive:

buffycli_0.2.1-3.diff.gz
  to pool/main/b/buffycli/buffycli_0.2.1-3.diff.gz
buffycli_0.2.1-3.dsc
  to pool/main/b/buffycli/buffycli_0.2.1-3.dsc
buffycli_0.2.1-3_all.deb
  to pool/main/b/buffycli/buffycli_0.2.1-3_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
martin f. krafft [EMAIL PROTECTED] (supplier of updated buffycli package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Wed, 19 Nov 2008 12:30:03 +0100
Source: buffycli
Binary: buffycli
Architecture: source all
Version: 0.2.1-3
Distribution: unstable
Urgency: low
Maintainer: Penny Leach [EMAIL PROTECTED]
Changed-By: martin f. krafft [EMAIL PROTECTED]
Description: 
 buffycli   - a text mode alternative to Buffy
Closes: 505576
Changes: 
 buffycli (0.2.1-3) unstable; urgency=low
 .
   * Tame the drunken GNOMES in my computer and show them who's the real boss.
 Due to some _inexplicable_ reason, commits 1,3,4 of the four commits
 between -1 and -2 ended up in the source package, but the second commit,
 the one actually fixing the RC bug and adding the procps dependency,
 didn't. If this happens again, I will quit computers and take up
 gardening, or somesuch. Hm, tempting. Maybe the gnomes will think alike
 and come up again with something supernatural to prevent that this upload
 actually closes: #505576. Maybe they'll come staying up my chimney, and
 we'll be living on caviar and honey, hooray!
Checksums-Sha1: 
 4d99222fc284109f3f99e84d9947aac91e3d 1110 buffycli_0.2.1-3.dsc
 b0543f37514418b98cba1fff528f3d247e616404 2623 buffycli_0.2.1-3.diff.gz
 4d0ee79f77078a1253445ea69696219693d259de 10148 buffycli_0.2.1-3_all.deb
Checksums-Sha256: 
 4bae57a8972eb2ac3f1d4bfae44461ddac42c44988d0a4406b9ce6484bc0cdab 1110 
buffycli_0.2.1-3.dsc
 547a868b53d107335fe5c99b786202d2febe12084ae934d4849691f8ba1ef4c7 2623 
buffycli_0.2.1-3.diff.gz
 105abd9622e4996ae0d1fd1734c7c5544a4d0b0a92160d5b081203dac38a7d9c 10148 
buffycli_0.2.1-3_all.deb
Files: 
 969126bbefcdd81059226a78ddef0177 1110 mail optional buffycli_0.2.1-3.dsc
 a634bfa2f23827a803fcd080c60fc603 2623 mail optional 

Processed: severity of 506181 is important, tagging 506181

2008-11-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 506181 important
Bug#506181: cups: Can't add local printers
Severity set to `important' from `grave'

 tags 506181 unreproducible moreinfo
Bug#506181: cups: Can't add local printers
There were no tags set.
Tags added: unreproducible, moreinfo


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#504167: T60

2008-11-19 Thread Bastian Blank
On Tue, Nov 04, 2008 at 04:37:25PM +0100, Jan Korbel wrote:
 Hmm after cca 10 compilations i can't resume even with vanilla 2.6.26.6 :(
 I'll try another one and 2.6.26.5 too.

Can you try to use this patch? It is not nearly nice but the best guess.

| --- a/kernel/time/tick-broadcast.c
| +++ b/kernel/time/tick-broadcast.c
| @@ -508,7 +508,7 @@ static void tick_broadcast_init_next_event(cpumask_t 
*mask, ktime_t expires)
|  void tick_broadcast_setup_oneshot(struct clock_event_device *bc)
|  {
| /* Set it up only once ! */
| -   if (bc-event_handler != tick_handle_oneshot_broadcast) {
| +   {
| int was_periodic = bc-mode == CLOCK_EVT_MODE_PERIODIC;
| int cpu = smp_processor_id();
| cpumask_t mask;

Bastian

-- 
The joys of love made her human and the agonies of love destroyed her.
-- Spock, Requiem for Methuselah, stardate 5842.8



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#502346: [Pkg-virtualbox-devel] Bug#502346: not fixed

2008-11-19 Thread Michael Meskes
On Wed, Nov 19, 2008 at 12:26:24PM +0100, Bastian Blank wrote:
 This bug is _not_ fixed.

Great email! Would you care to explain? This bug is about 

virtualbox-ose-modules package older than virtualbox-ose

right?

Sid atm has:

virtualbox-ose 1.6.6-dfsg-3
virtualbox-ose-modules 2.6.26+1.6.6-dfsg-5

So where's the problem? Both are 1.6.6-dfsg. What do I miss? 

I do agree that we have to move the modules out of lme, but this is not what
this bug is about. Okay, you could rename and all, but I'd prefer to report a
new one for that. Also I'd very much prefer to make this change past Lenny. 

Michael
-- 
Michael Meskes
Michael at Fam-Meskes dot De, Michael at Meskes dot (De|Com|Net|Org)
Michael at BorussiaFan dot De, Meskes at (Debian|Postgresql) dot Org
ICQ: 179140304, AIM/Yahoo: michaelmeskes, Jabber: [EMAIL PROTECTED]
Go VfL Borussia! Go SF 49ers! Use Debian GNU/Linux! Use PostgreSQL!



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#504167: T60

2008-11-19 Thread Bastian Blank
On Wed, Nov 19, 2008 at 01:33:08PM +0100, Bastian Blank wrote:
 On Tue, Nov 04, 2008 at 04:37:25PM +0100, Jan Korbel wrote:
  Hmm after cca 10 compilations i can't resume even with vanilla 2.6.26.6 :(
  I'll try another one and 2.6.26.5 too.
 
 Can you try to use this patch? It is not nearly nice but the best guess.

Better, try to apply aa276e1cafb3ce9d01d1e837bcd67e92616013ac.

Bastian

-- 
I have never understood the female capacity to avoid a direct answer to
any question.
-- Spock, This Side of Paradise, stardate 3417.3



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#506008: [grub-invaders] Fails to boot

2008-11-19 Thread Didier Raboud
Le mercredi 19 novembre 2008 12:45:03 Robert Millan, vous avez écrit :
 On Wed, Nov 19, 2008 at 11:52:22AM +0100, Didier Raboud wrote:
  Le mercredi 19 novembre 2008 11:26:05, vous avez écrit :
   Hi!
  
   The proposed patch is wrong.  I have no idea how it is supposed to fix
   the problem, but grub isn't supposed to perform UUID search for a
   partition unless it is going to be accessed (i.e. after user
   selection).
 
  Hi,
 
  I tend to agree and I still wonder why it didn't work, but note that this
  is what is done in /etc/grub.d/10_linux . That's why I proposed a patch
  doing the same.
 
  See my attached /boot/grub/grub.cfg and its relevant parts in 10_linux :
 
  set root=(hd0,1)
  search --fs-uuid --set 055ce214-7182-4b61-84e8-c831372d5e64
  menuentry Debian GNU/Linux, linux 2.6.27-1-amd64 {
  (...)

 Note that this was a bug.  It was fixed in:

 2008-08-01  Robert Millan  [EMAIL PROTECTED]

 * util/grub.d/10_linux.in: Use prepare_grub_to_access_device() from
 within menuentries, not before them.
 util/grub.d/10_hurd.in: Likewise.

 Not sure if it made it to Lenny.

Hi again, 

from reading the changelog.gz, I confirm that this should have made it to 
Lenny. 
After purging and reinstalling grub-pc from Lenny, 10_linux is still producing 
a similar entry as above.

The mentioned bug (number ?) is then still open. I fear to try the change 
because if invaders fails, what tells me that my boot won't fail too ?

What I see here on my laptop is that with the prepare_grub_to_access_device() 
outside of the entries, it works and with it being inside the entry 
for invaders, it fails.

So ?

Regards, 

OdyX

-- 
Didier Raboud, proud Debian user.
CH-1802 Corseaux
[EMAIL PROTECTED]


signature.asc
Description: This is a digitally signed message part.


Bug#506008: [grub-invaders] Fails to boot

2008-11-19 Thread Robert Millan
tags 506008 - patch
thanks

On Wed, Nov 19, 2008 at 08:57:54AM +0100, Fabian Greffrath wrote:
 Hello Robert,
 
 please have a look at #506008. I remember that we have discussed the 
 affected lines before I asked you to upload the package. Can you 
 imagine what went wrong?
 
 If you like, please NMU.

Hi!

The proposed patch is wrong.  I have no idea how it is supposed to fix the
problem, but grub isn't supposed to perform UUID search for a partition
unless it is going to be accessed (i.e. after user selection).

On Mon, Nov 17, 2008 at 07:11:02PM +0100, Didier Raboud wrote:

 While trying grub-pc, I went over grub-invaders. Installation went fine, but 
 it
 failed to boot with an error like multiboot unknown (can't remember 
 exactly).

I need a better description of the problem before I can figure out what causes
it.  Please provide exact error, and a copy of your grub.cfg.

-- 
Robert Millan

  The DRM opt-in fallacy: Your data belongs to us. We will decide when (and
  how) you may access your data; but nobody's threatening your freedom: we
  still allow you to remove your data and not access it at all.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#506170: marked as done (libfontconfig1: does not install)

2008-11-19 Thread Debian Bug Tracking System

Your message dated Wed, 19 Nov 2008 08:20:29 -0200
with message-id [EMAIL PROTECTED]
and subject line #506170 isn't a bug
has caused the Debian Bug report #506170,
regarding libfontconfig1: does not install
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
506170: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506170
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: libfontconfig1
Severity: grave
Justification: renders package unusable


The following packages have unmet dependencies:
  libfontconfig1: Depends: fontconfig-config (= 2.6.0-2) but 2.6.0-3 is 
to be installed
E: Broken packages


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash


---End Message---
---BeginMessage---
Hi!

You can't install libfontconfig1 because the new version of it is still not
built yet on i386. Soon it will be available for your arch.
This is not a bug, thus closing it.

Best regards,
Nelson

---End Message---


Processed: Re: [grub-invaders] Fails to boot

2008-11-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 506008 - patch
Bug#506008: [grub-invaders] Fails to boot
Tags were: patch
Tags removed: patch

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#506181: [Pkg-cups-devel] Bug#506181: Various backends have the wrong permissions

2008-11-19 Thread Martin Pitt
Hello Chanoch,

Chanoch (Ken) Bloom [2008-11-18 23:23 -0600]:
 After spending some time learning what the
 rootbackends-worldreadable.dpatch in expermental does, and learning what
 the code behind it does, I understand the problem.

Please note that this patch has never been in unstable/testing, and I
don't plan to upload it there before Lenny's release.

The patch previously broke the backends which were supposed to run as
root, such as lpd and ipp, but it never broke usb. It is fully fixed
in experimental now.

So rootbackends-worldreadable.dpatch is entirely unrelated to your
problem, especially since you reported it against the unstable/lenny
version.

 crw-rw 1 root lp6,  0 2008-11-18 08:10 /dev/lp0
 crw-rw 1 root dialout   4, 64 2008-11-18 08:09 /dev/ttyS0
 crw-rw 1 root dialout   4, 65 2008-11-18 08:09 /dev/ttyS1
 crw-rw 1 root dialout   4, 66 2008-11-18 08:09 /dev/ttyS2
 crw-rw 1 root dialout   4, 67 2008-11-18 08:09 /dev/ttyS3
 crw-rw 1 root lp  180,  0 2008-11-18 08:09 /dev/usb/lp0

That looks normal.

 CUPS default permissions for running filters (including the backends) is
 to run in group lpadmin.

No, it's lp, not lpadmin. Filters are always run as lp, backends
installed with permissions 0755 are run as lp, and backends with
permissions 0700 (or 0744 in experimental) are run as root.

 If I change the group that filters run in (adding the line Group lp
 in /etc/cups/cupsd.conf) then I can make the usb and parallel backends
 work. (But I can't make usb and parallel work at the same time as serial
 because they require different groups to run)

I do see the issue with the serial backends. For that we probably need
to make the serial backend run as root.

Did you previously have a different Group statement in cupsd.conf?
On a standard Debian system, the backends *are* run as lp, thus usb
and parallel printers work. Therefore I downgrade this to important,
since it does not affect all Debian users.

Let's do a test whether backend permissions are wedged up for you.
Please do this as root:

  echo -e '!/bin/sh\nid  /tmp/cups-backend.txt'  /usr/lib/cups/backend/test
  chmod 755 /usr/lib/cups/backend/test
  lpinfo -v

Then please give me the output of cat /tmp/cups-backend.txt. It
should say user/group lp, but maybe it is lpadmin for you for some
reason. Also, what does id lp give for you?

Afterwards, please remove the test backend again:

  rm /usr/lib/cups/backend/test

Thanks,

Martin

-- 
Martin Pitt| http://www.piware.de
Ubuntu Developer (www.ubuntu.com)  | Debian Developer  (www.debian.org)


signature.asc
Description: Digital signature


Bug#506206: haskell-configfile - needs to use dh_haskell_depends

2008-11-19 Thread Bastian Blank
Package: haskell-configfile
Version: 1.0.4.3
Severity: serious

According to several people haskell-configfile lacks calls to
dh_haskell_depends to generate proper dependencies.

Bastian

-- 
No one may kill a man.  Not for any purpose.  It cannot be condoned.
-- Kirk, Spock's Brain, stardate 5431.6



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: reopening 502346

2008-11-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 reopen 502346
Bug#502346: virtualbox-ose-modules package older than virtualbox-ose
Bug#502539: virtualbox-ose-modules-2.6.26-1-686 contains outdated module for 
VirtualBox
Bug#504353: virtualbox-ose-modules-2.6.26-1-amd64 version mismatch on Lenny
Bug reopened, originator not changed.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#504087: netmaze: FTBFS on ia64 (using -O2 for allmove.c, works)

2008-11-19 Thread Adeodato Simó
* peter green [Wed, 19 Nov 2008 02:47:07 +]:

 Thanks, peter. John uploaded a fixed package with your patch.

 The good news is it built sucessfully on ia64

 The bad news is it failed on alpha arm mips s390 and sparc due to a  
 failure to install the build-depends.

 libfontconfig1: Depends: fontconfig-config (= 2.6.0-2) but 2.6.0-3 is to  
 be installed

 Release team could you requeue it on those architectures with a dep-wait  
 on libfontconfig1 = 2.6.0-3

Done, thanks.

 I have reproduced this failure on  my qemu arm system and the culprit
 seems to be

Should you not have had a qemu system handy, there are other means, eg.:

  http://chistera.yi.org/~adeodato/blog/106_fakeapt.html

-- 
Adeodato Simó dato at net.com.org.es
Debian Developer  adeodato at debian.org
 
Listening to: Dar Williams - What Do You Love More Than Love




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#504528: libghc6-configfile-dev: Fails to configure: MissingH-1.0.1 doesn't exist

2008-11-19 Thread John Goerzen
Philipp Kern wrote:
 Hi John,
 
 On Tue, Nov 11, 2008 at 09:51:01PM +0100, Stefan Potyra wrote:
 simply rebuilding will make the maintainer scripts pickup the newer
 missingh dependency, and hence will fix this bug.
 However I haven't tested yet if haskell-configfile will still be
 functional with the later missingh (though doubt it isn't).
 
 adding calls to dh_haskell_depends would prevent further bug reports
 of this kind.  It looks like it fixes the problem also in this case
 properly (i.e. adding sensible binary dependencies).  Would you mind
 to add such calls to your debian/rules or look into adding it
 to dh_haskell?

Hi Philipp,

I hadn't actually noticed that command had been added.  I'll take a look.

I no longer maintain dh_haskell, FWIW.

-- John

 
 Kind regards,
 Philipp Kern




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#504167: T60

2008-11-19 Thread Jan Korbel
Vanilla 2.6.26.6 with this patch is ok. I can resume notebook (and there 
is no delay).


J.

Bastian Blank wrote:

Can you try to use this patch? It is not nearly nice but the best guess.

| --- a/kernel/time/tick-broadcast.c
| +++ b/kernel/time/tick-broadcast.c
| @@ -508,7 +508,7 @@ static void tick_broadcast_init_next_event(cpumask_t 
*mask, ktime_t expires)
|  void tick_broadcast_setup_oneshot(struct clock_event_device *bc)
|  {
| /* Set it up only once ! */
| -   if (bc-event_handler != tick_handle_oneshot_broadcast) {
| +   {
| int was_periodic = bc-mode == CLOCK_EVT_MODE_PERIODIC;
| int cpu = smp_processor_id();
| cpumask_t mask;

Bastian



smime.p7s
Description: S/MIME Cryptographic Signature


Bug#506222: open-vm-tools does not work with vmware v6.5

2008-11-19 Thread Tong Sun
Package: open-vm-tools
Version: 2008.10.10-123053-2
Severity: grave
Justification: renders package unusable

Hi Daniel,

I found that the latest open-vm-tools does not work, at least with
vmware v6.5. Neither clipboard copy/paste, nor host-share mounting
work.

As posted in,
http://article.gmane.org/gmane.linux.debian.user/339037/

I had been able to use Open VMware Tools to copy/paste x-selections
between VMware host and client via clipboard without any specify
setup in other distros before. But not now.

Also, host-share mounting does not work either.

 root:~# vmware-hgfsmounter .host:/ /mnt/hgfs/
 Error: cannot mount filesystem: No such device

 root:~# vmware-hgfsclient
 share

 root:~# vmware-hgfsmounter .host:/share /mnt/hgfs/
 Error: cannot mount filesystem: No such device

My VMware:

 $ vmware -v
 VMware Workstation 6.5.0 build-118166

-- System Information:
Debian Release: lenny/sid
 APT prefers testing
 APT policy: (300, 'testing'), (50, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-grml (SMP w/1 CPU core; PREEMPT)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash

Versions of packages open-vm-tools depends on:
ii  libc6 2.7-13 GNU C Library: Shared libraries
ii  libdumbnet1   1.8-1.5A dumb, portable networking librar
ii  libgcc1   1:4.3.2-1  GCC support library
ii  libicu38  3.8.1-3International Components for Unico
ii  libstdc++64.3.2-1The GNU Standard C++ Library v3
ii  procps1:3.2.7-8  /proc file system utilities

Versions of packages open-vm-tools recommends:
pn  ethtool   none (no description available)
pn  open-vm-sourcenone (no description available)
pn  zerofree  none (no description available)

Versions of packages open-vm-tools suggests:
pn  open-vm-toolbox   none (no description available)

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#506206: haskell-configfile - needs to use dh_haskell_depends

2008-11-19 Thread John Goerzen
severity 506206 important
thanks

You are correct, but that doesn't mean that the dependencies of the
packages now existing in the archive are broken for lenny.  Really, this
just needs to be fixed for lenny+1.

-- John

Bastian Blank wrote:
 Package: haskell-configfile
 Version: 1.0.4.3
 Severity: serious
 
 According to several people haskell-configfile lacks calls to
 dh_haskell_depends to generate proper dependencies.
 
 Bastian
 




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#499336: Delayed upload done

2008-11-19 Thread Lincoln de Sousa
I asked a debian developer (kov) to upload the package, it fixes some
serious known and unknown bugs and makes lintian happy =)

It was a Delayed upload (4) and I taken the maintainership of the
package.

Thank you,
-- 
Lincoln de Sousa - AlfaiaTI/MinasLivre

xmpp:[EMAIL PROTECTED]
http://alfaiati.net
http://minaslivre.org

+55 31 9209 4987


signature.asc
Description: Digital signature


Processed: forcibly merging 504167 504761

2008-11-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 forcemerge 504167 504761
Bug#504167: linux-2.6 - regression: fails to unblank on resume
Bug#504761: linux-image-2.6.26-1-686: Usually fails to resume from suspend to 
ram on eeepc 1000
Forcibly Merged 504167 504761.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: reassign 504761 to linux-2.6, forcibly merging 504167 504761

2008-11-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 reassign 504761 linux-2.6
Bug#504761: linux-image-2.6.26-1-686: Usually fails to resume from suspend to 
ram on eeepc 1000
Bug#504167: linux-2.6 - regression: fails to unblank on resume
Bug reassigned from package `linux-image-2.6.26-1-686' to `linux-2.6'.

 forcemerge 504167 504761
Bug#504167: linux-2.6 - regression: fails to unblank on resume
Bug#504761: linux-image-2.6.26-1-686: Usually fails to resume from suspend to 
ram on eeepc 1000
Forcibly Merged 504167 504761.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Changing severity of all ndiswrapper crashes to important

2008-11-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 package ndiswrapper ndiswrapper-source ndiswrapper-utils-1.9
Ignoring bugs not assigned to: ndiswrapper-utils-1.9 ndiswrapper-source 
ndiswrapper

 # Setting them to important
 severity 505096 important
Bug#505096: ndiswrapper-source: system freezes shortly after loading module
Severity set to `important' from `critical'

 severity 431951 important
Bug#431951: Module Crash
Severity set to `important' from `normal'

 severity 465267 important
Bug#465267: Ndiswrapper fails on resume with kernels = 2.6.23
Severity set to `important' from `normal'

 severity 471012 important
Bug#471012: ndiswrapper module crash kernel amd64 2.6.24 and SMP
Severity set to `important' from `normal'

 severity 494089 important
Bug#494089: ndiswrapper module with USB 802.11b/g/n wireless crashes after a 
few minutes
Severity set to `important' from `normal'

 # Bug related to the kernel module
 reassign 494089 ndiswrapper-source
Bug#494089: ndiswrapper module with USB 802.11b/g/n wireless crashes after a 
few minutes
Bug reassigned from package `ndiswrapper' to `ndiswrapper-source'.

 # Bug related to the utils
 reassign 356769 ndiswrapper-utils-1.9
Bug#356769: ndiswrapper-utils: Fails to detect manufaturer names in inf-file 
rendering unusable
Bug reassigned from package `ndiswrapper' to `ndiswrapper-utils-1.9'.

 # I can confirm it, maybe we should get a
 # list of all affected versions, too.
 tag 356769 confirmed
Bug#356769: ndiswrapper-utils: Fails to detect manufaturer names in inf-file 
rendering unusable
There were no tags set.
Tags added: confirmed

 found 356769 1.53-1
Bug#356769: ndiswrapper-utils: Fails to detect manufaturer names in inf-file 
rendering unusable
Bug marked as found in version 1.53-1.

 found 356769 1.53-2
Bug#356769: ndiswrapper-utils: Fails to detect manufaturer names in inf-file 
rendering unusable
Bug marked as found in version 1.53-2.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: tagging 504167

2008-11-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.9.26
 tags 504167 + pending
Bug#504167: linux-2.6 - regression: fails to unblank on resume
There were no tags set.
Bug#504761: linux-image-2.6.26-1-686: Usually fails to resume from suspend to 
ram on eeepc 1000
Tags added: pending


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#495655: marked as done (cpufreqd: Fails to read battery info)

2008-11-19 Thread Debian Bug Tracking System

Your message dated Thu, 20 Nov 2008 00:17:53 +0900
with message-id [EMAIL PROTECTED]
and subject line Re: Bug#495655: not fixed in cpufreqd 2.3.3-3
has caused the Debian Bug report #495655,
regarding cpufreqd: Fails to read battery info
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
495655: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495655
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: cpufreqd
Version: 2.3.2-2
Severity: important


cpufreqd fails to read battery info on my system because it tries to read
files named energy_full and energy_now while the files are named
charge_full and charge_now.

The attached patch fixes this by trying the charge_* names of reading energy_*
fails.


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core)
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to pt_BR.UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages cpufreqd depends on:
ii  libc6 2.7-13 GNU C Library: Shared libraries
ii  libcpufreq0   004-2  shared library to deal with the cp
ii  libsensors3   1:2.10.7-1 library to read temperature/voltag
ii  libsysfs2 2.1.0-4interface library to sysfs
ii  lsb-base  3.2-19 Linux Standard Base 3.2 init scrip

Versions of packages cpufreqd recommends:
ii  acpid 1.0.6-10   Utilities for using ACPI power man

Versions of packages cpufreqd suggests:
ii  cpufrequtils  004-2  utilities to deal with the cpufreq

-- no debconf information
--- cpufreqd-2.3.2.orig/src/cpufreqd_acpi_battery.c
+++ cpufreqd-2.3.2/src/cpufreqd_acpi_battery.c
@@ -31,6 +31,8 @@
 #define BATTERY_TYPE	Battery
 #define ENERGY_FULL	energy_full
 #define ENERGY_NOW	energy_now
+#define CHARGE_FULL charge_full
+#define CHARGE_NOW  charge_now
 #define PRESENT		present
 #define STATUS		status
 #define CURRENT_NOW	current_now
@@ -123,11 +125,20 @@
 	binfo-open = 1;
 
 	binfo-energy_full = get_class_device_attribute(binfo-cdev, ENERGY_FULL);
-	if (!binfo-energy_full)
-		return -1;
+	if (!binfo-energy_full) {
+		/* try the charge_full name */
+		binfo-energy_full = get_class_device_attribute(binfo-cdev,
+		CHARGE_FULL);
+		if (!binfo-energy_full)
+			return -1;
+	}
 	binfo-energy_now = get_class_device_attribute(binfo-cdev, ENERGY_NOW);
-	if (!binfo-energy_now)
-		return -1;
+	if (!binfo-energy_now) {
+		/* try the charge_now name */
+		binfo-energy_now = get_class_device_attribute(binfo-cdev, CHARGE_NOW);
+		if (!binfo-energy_now)
+			return -1;
+	}
 	binfo-present = get_class_device_attribute(binfo-cdev, PRESENT);
 	if (!binfo-present)
 		return -1;
---End Message---
---BeginMessage---
On Wed, Nov 19, 2008 at 10:09:38AM +0100, Dirk Mueller wrote:
 reopen 495655
 found 495655 2.3.3-3
 thanks
 
 
 error messages:
 
 
 cpufreqd: get_class_device_attribute: couldn't 
 open /sys/class/power_supply/C1ED/energy_full (No such file or directory)
 cpufreqd: get_class_device_attribute: couldn't 
 open /sys/class/power_supply/C1ED/energy_now (No such file or directory)
 
 
 under
   /sys/class/power_supply/C1ED
 
  I can find charge_full and charge_now.

cpufrequd might be too verbose but it actually opens charge_now and
charge_full after failing energy_*

run it with -V7 and check yourself.

thanks
-- 
mattia
:wq!

---End Message---


Bug#506008: [grub-invaders] Fails to boot

2008-11-19 Thread Robert Millan
On Wed, Nov 19, 2008 at 02:19:38PM +0100, Didier Raboud wrote:
 
 Hi again, 
 
 from reading the changelog.gz, I confirm that this should have made it to 
 Lenny. 
 After purging and reinstalling grub-pc from Lenny, 10_linux is still 
 producing 
 a similar entry as above.
 
 The mentioned bug (number ?) is then still open. I fear to try the change 
 because if invaders fails, what tells me that my boot won't fail too ?

It doesn't matter.  It's a small bugfix, not worth backporting it.

 What I see here on my laptop is that with the prepare_grub_to_access_device() 
 outside of the entries, it works and with it being inside the entry 
 for invaders, it fails.

Sounds like a GRUB bug to me.  What version of grub-pc are you using? (make
sure you have run grub-install on that version)

Also, check:  grep multiboot /boot/grub/command.lst

-- 
Robert Millan

  The DRM opt-in fallacy: Your data belongs to us. We will decide when (and
  how) you may access your data; but nobody's threatening your freedom: we
  still allow you to remove your data and not access it at all.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#506008: [grub-invaders] Fails to boot

2008-11-19 Thread Didier Raboud
Le mercredi 19 novembre 2008 16:30:11 Robert Millan, vous avez écrit :
 On Wed, Nov 19, 2008 at 02:19:38PM +0100, Didier Raboud wrote:
  Hi again,
 
  from reading the changelog.gz, I confirm that this should have made it to
  Lenny. After purging and reinstalling grub-pc from Lenny, 10_linux is
  still producing a similar entry as above.
 
  The mentioned bug (number ?) is then still open. I fear to try the change
  because if invaders fails, what tells me that my boot won't fail too ?

 It doesn't matter.  It's a small bugfix, not worth backporting it.

It is in the changelog.gz, but the change is not in my package (my 10_linux is 
attached).

  What I see here on my laptop is that with the
  prepare_grub_to_access_device() outside of the entries, it works and with
  it being inside the entry for invaders, it fails.

 Sounds like a GRUB bug to me.  What version of grub-pc are you using? (make
 sure you have run grub-install on that version)

Done. 

$ LANG=C apt-cache policy grub-pc
grub-pc:
  Installed: 1.96+20080724-12
  Candidate: 1.96+20080724-12
  Version table:
 1.96+20081108-1 0
 50 ftp://mirror.switch.ch experimental/main Packages
 *** 1.96+20080724-12 0
700 ftp://mirror.switch.ch testing/main Packages
600 ftp://mirror.switch.ch unstable/main Packages
100 /var/lib/dpkg/status


 Also, check:  grep multiboot /boot/grub/command.lst

$ grep multiboot /boot/grub/command.lst
module: multiboot
multiboot: multiboot

After a closer look... The changed 10_linux is in the grub-common package in 
experimental.

What stays is that in the actual state of things, grub-invaders is not bootable 
with grub-pc in Lenny.

Regards, 

OdyX

-- 
Didier Raboud, proud Debian user.
CH-1802 Corseaux
[EMAIL PROTECTED]


10_linux
Description: application/shellscript


signature.asc
Description: This is a digitally signed message part.


Bug#506008: [grub-invaders] Fails to boot

2008-11-19 Thread Didier Raboud
Le mercredi 19 novembre 2008 16:30:11 Robert Millan, vous avez écrit :
 On Wed, Nov 19, 2008 at 02:19:38PM +0100, Didier Raboud wrote:
  Hi again,
 
  from reading the changelog.gz, I confirm that this should have made it to
  Lenny. After purging and reinstalling grub-pc from Lenny, 10_linux is
  still producing a similar entry as above.
 
  The mentioned bug (number ?) is then still open. I fear to try the change
  because if invaders fails, what tells me that my boot won't fail too ?

 It doesn't matter.  It's a small bugfix, not worth backporting it.

  What I see here on my laptop is that with the
  prepare_grub_to_access_device() outside of the entries, it works and with
  it being inside the entry for invaders, it fails.

 Sounds like a GRUB bug to me.  What version of grub-pc are you using? (make
 sure you have run grub-install on that version)

 Also, check:  grep multiboot /boot/grub/command.lst

OK. 

I begin to understand... ( #497791 )

The problem is that if you only run update-grub, grub-install device is 
not run automagically and will then put grub in a weird state.

grub-install device should be run after each update-grub if I understand 
correctly - right ?

Regards, 

OdyX

-- 
Didier Raboud, proud Debian user.
CH-1802 Corseaux
[EMAIL PROTECTED]


signature.asc
Description: This is a digitally signed message part.


Bug#504726: marked as done (insecure /tmp dir)

2008-11-19 Thread Debian Bug Tracking System

Your message dated Wed, 19 Nov 2008 17:02:07 +
with message-id [EMAIL PROTECTED]
and subject line Bug#504726: fixed in universalindentgui 0.8.1-1.2
has caused the Debian Bug report #504726,
regarding insecure /tmp dir
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
504726: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504726
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
X-Debbugs-CC: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED]
Package: universalindentgui
Severity: serious
Version: 0.8.1-1

Hi,

as discussed for other packages and on debian-devel at great lengths,
using fixed dirs in /tmp is not a good idea.
Please be sure to fix this when you take care of #486577.
Overall it might be more prudent to have universalindentgui wait for
squeeze if it had little testing exposure (evidenced by the #486577,
there must not have been a whole lot of testing going on).

Kind regards

T.
-- 
Thomas Viehmann, http://thomas.viehmann.net/


---End Message---
---BeginMessage---
Source: universalindentgui
Source-Version: 0.8.1-1.2

We believe that the bug you reported is fixed in the latest version of
universalindentgui, which is due to be installed in the Debian FTP archive:

universalindentgui_0.8.1-1.2.diff.gz
  to pool/main/u/universalindentgui/universalindentgui_0.8.1-1.2.diff.gz
universalindentgui_0.8.1-1.2.dsc
  to pool/main/u/universalindentgui/universalindentgui_0.8.1-1.2.dsc
universalindentgui_0.8.1-1.2_i386.deb
  to pool/main/u/universalindentgui/universalindentgui_0.8.1-1.2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Eddy Petrișor [EMAIL PROTECTED] (supplier of updated universalindentgui 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Wed, 12 Nov 2008 01:34:23 +0200
Source: universalindentgui
Binary: universalindentgui
Architecture: source i386
Version: 0.8.1-1.2
Distribution: unstable
Urgency: low
Maintainer: Sebastian Pipping [EMAIL PROTECTED]
Changed-By: Eddy Petrișor [EMAIL PROTECTED]
Description: 
 universalindentgui - GUI frontend for several code beautifiers
Closes: 504726
Changes: 
 universalindentgui (0.8.1-1.2) unstable; urgency=low
 .
   * Non-maintainer upload.
   * Avoid symlink attacks by using mkdtemp (Closes: 504726)
Checksums-Sha1: 
 89585d95356d409cb28331bed427f9993cf3a3d6 1184 universalindentgui_0.8.1-1.2.dsc
 69c190aabd5fb112e8cab85ea5b4c73b51c2c314 21866 
universalindentgui_0.8.1-1.2.diff.gz
 6440922465225ee0b20a53a78726825d1c67a719 576700 
universalindentgui_0.8.1-1.2_i386.deb
Checksums-Sha256: 
 562d180ebeadb8bf9ecb0bf04a04b1a1e9dc4aedcd37e78b0026587d18421183 1184 
universalindentgui_0.8.1-1.2.dsc
 9b480fbe5fde6002ed12d5edec6ad716b38db9df457df319b2b441d9a4a2a409 21866 
universalindentgui_0.8.1-1.2.diff.gz
 164869dbf48002947eb92008c8ff187d227ce4173e9ab5960c81cab73c593426 576700 
universalindentgui_0.8.1-1.2_i386.deb
Files: 
 33d0505d3bb65450231e0d7dc4169b9b 1184 devel optional 
universalindentgui_0.8.1-1.2.dsc
 2d3fffe656b31d9dae4a0f0753faf4a8 21866 devel optional 
universalindentgui_0.8.1-1.2.diff.gz
 8ab41a4d0d30be81ced1aa05232c151b 576700 devel optional 
universalindentgui_0.8.1-1.2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkkQv8ACgkQ5ItltUs5T34xyACgyjE1VyY+7Fj+N8hgc4ysTJ6w
Mu8AmgJXaudoDXE4T6nwCA+aR/7M2WHC
=sYeB
-END PGP SIGNATURE-


---End Message---


Bug#486577: marked as done (universalindentgui: all indenters fail)

2008-11-19 Thread Debian Bug Tracking System

Your message dated Wed, 19 Nov 2008 19:37:55 +0200
with message-id [EMAIL PROTECTED]
and subject line #486577 was also fixed by 0.8.1-1.2
has caused the Debian Bug report #486577,
regarding universalindentgui: all indenters fail
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
486577: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=486577
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---

Package: universalindentgui
Version: 0.8.1-1
Severity: normal

Hello,

when I tried the live preview of any file in universalindentgui, every  
indenter failed. The error message was always like this:


Indenter returned with exit code: 255
Indent console output was:
Couldn't Open Config File: /tmpUniversalIndentGUI/bcpp.cfg Read Docs For  
Configuration Settings Couldn't Open, or Create File indentinput.h  
Cleaning Up Dinner ... Done !


Callstring was: bcpp -fi indentinput.h -fnc  
/tmpUniversalIndentGUI/bcpp.cfg -fo indentoutput.h


I think the problem is a missing slash after tmp in the path. While  
starting, it prints:


tempDirctoryStr =  /tmpUniversalIndentGUI

which is probably causing the problem.

Regards
Jiri Palecek

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.24.3-test (SMP w/1 CPU core; PREEMPT)
Locale: LANG=cs_CZ, LC_CTYPE=cs_CZ (charmap=ISO-8859-2) (ignored: LC_ALL  
set to cs_CZ)

Shell: /bin/sh linked to /bin/dash

Versions of packages universalindentgui depends on:
ii  libc6 2.7-3  GNU C Library: Shared  
libraries

ii  libgcc1   1:4.3.0-5  GCC support library
ii  libqscintilla2-3  2.2-1  The Qt4 port of the Scintilla  
sour

ii  libqt4-network4.4.0-2Qt 4 network module
ii  libqt4-script 4.4.0-2Qt 4 script module
ii  libqtcore44.4.0-2Qt 4 core module
ii  libqtgui4 4.4.0-2Qt 4 GUI module
ii  libstdc++64.3.0-5The GNU Standard C++ Library  
v3


Versions of packages universalindentgui recommends:
ii  astyle1.22-1 Source code indenter for  
C++/C/Jav

ii  bcpp  0.0.20050725-1 C(++) beautifier
pn  csstidy   none (no description available)
ii  indent2.2.10-1   C language source code  
formatting
ii  tidy  20051018-1 HTML syntax checker and  
reformatte
ii  uncrustify0.44-1 C, C++, C#, D, Java and Pawn  
sourc


-- no debconf information


--
Using Opera's revolutionary e-mail client: http://www.opera.com/mail/


---End Message---
---BeginMessage---
Version: 0.8.1-1.2

Format: 1.8
Date: Wed, 12 Nov 2008 01:34:23 +0200
Source: universalindentgui
Binary: universalindentgui
Architecture: source amd64
Version: 0.8.1-1.2
Distribution: unstable
Urgency: high
Maintainer: Sebastian Pipping [EMAIL PROTECTED]
Changed-By: Eddy Petrișor [EMAIL PROTECTED]
Description:
 universalindentgui - GUI frontend for several code beautifiers
Closes: 486577 504726
Changes:
 universalindentgui (0.8.1-1.2) unstable; urgency=low
 .
   * Avoid symlink attacks by using mkdtemp (Closes: 504726)
 .
 universalindentgui (0.8.1-1.1) unstable; urgency=high
 .
   * Non-maintainer upload.
   * urgency high since universalindentgui is actually useless by default
 (can be hacked to work by setting TMPDIR='/tmp/a')
   * fixed temporary path asamblation so indents can work
 (Closes: 486577)

-- 
Regards,
EddyP
=
Imagination is more important than knowledge A.Einstein
---End Message---


Processed: Re: Bug#506222: open-vm-tools does not work with vmware v6.5

2008-11-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 506222 important
Bug#506222: open-vm-tools does not work with vmware v6.5
Severity set to `important' from `grave'

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#506008: [grub-invaders] Fails to boot

2008-11-19 Thread Robert Millan
On Wed, Nov 19, 2008 at 05:03:10PM +0100, Didier Raboud wrote:
 
 OK. 
 
 I begin to understand... ( #497791 )
 
 The problem is that if you only run update-grub, grub-install device is 
 not run automagically and will then put grub in a weird state.
 
 grub-install device should be run after each update-grub if I understand 
 correctly - right ?

grub-install should be run often, but only by the user.  It's too risky to run
automatically.

So, to summarize, if you grub-install with the versions of grub-pc / grub-common
in sid, invaders works, but if you grub-install with the ones in experimental,
it doesn't?  (disregard update-grub calls in this test, but make sure you're
using /etc/grub.d/*_multiboot unmodified).

-- 
Robert Millan

  The DRM opt-in fallacy: Your data belongs to us. We will decide when (and
  how) you may access your data; but nobody's threatening your freedom: we
  still allow you to remove your data and not access it at all.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#506031: NMU

2008-11-19 Thread Dominic Hargreaves
Will upload the attached NMU fixing this problem unless the maintainer
wishes otherwise.

Dominic.

-- 
Dominic Hargreaves | http://www.larted.org.uk/~dom/
PGP key 5178E2A5 from the.earth.li (keyserver,web,email)
diff -u dovecot-1.0.15/debian/changelog dovecot-1.0.15/debian/changelog
--- dovecot-1.0.15/debian/changelog
+++ dovecot-1.0.15/debian/changelog
@@ -1,3 +1,14 @@
+dovecot (1:1.0.15-2.3) unstable; urgency=medium
+
+  * Non-maintainer upload
+  * Urgency medium due to RC bug fix
+  * Fix ManageSieve security hole virtual users can edit scripts of other
+virtual users described at
+http://dovecot.org/list/dovecot/2008-November/035259.html
+(closes: #506031)
+
+ -- Dominic Hargreaves [EMAIL PROTECTED]  Wed, 19 Nov 2008 18:11:36 +
+
 dovecot (1:1.0.15-2.2) unstable; urgency=medium
 
   * Non-maintainer upload
diff -u dovecot-1.0.15/debian/patches/00list dovecot-1.0.15/debian/patches/00list
--- dovecot-1.0.15/debian/patches/00list
+++ dovecot-1.0.15/debian/patches/00list
@@ -1,4 +1,5 @@
 dovecot-MANAGESIEVE-9.3
+dovecot-1.0.15-managesieve-v9.3-security
 dovecot-example
 dovecot-sql
 dovecot-drac
only in patch2:
unchanged:
--- dovecot-1.0.15.orig/debian/patches/dovecot-1.0.15-managesieve-v9.3-security.dpatch
+++ dovecot-1.0.15/debian/patches/dovecot-1.0.15-managesieve-v9.3-security.dpatch
@@ -0,0 +1,43 @@
+#! /bin/sh /usr/share/dpatch/dpatch-run
+## dovecot-1.0.15-managesieve-v9.3-security.dpatch by
+## Stephan Bosch [EMAIL PROTECTED]
+##
+## All lines beginning with `## DP:' are a description of the patch.
+## DP: fix security hole in managesieve: virtual users can edit scripts
+## DP: of other virtual users
+
[EMAIL PROTECTED]@
+diff -uNr --exclude=.hg dovecot-1.0.old/src/lib-sievestorage/sieve-save.c dovecot-1.0/src/lib-sievestorage/sieve-save.c
+--- dovecot-1.0.old/src/lib-sievestorage/sieve-save.c	2008-11-17 16:45:54.0 +0100
 dovecot-1.0/src/lib-sievestorage/sieve-save.c	2008-11-17 16:44:17.0 +0100
+@@ -154,6 +154,13 @@
+ 	struct ostream *output;
+ 	const char *path;
+ 
++	/* Disallow '/' characters in script name */
++	if ( strchr(scriptname, '/') != NULL ) {
++		sieve_storage_set_error(storage, Invalid script name '%s'.,
++			scriptname);
++		return NULL;
++	}
++
+ 	/* Prevent overwriting the active script link when it resides in the 
+ 	 * sieve storage directory.
+ 	 */
+diff -uNr --exclude=.hg dovecot-1.0.old/src/lib-sievestorage/sieve-script.c dovecot-1.0/src/lib-sievestorage/sieve-script.c
+--- dovecot-1.0.old/src/lib-sievestorage/sieve-script.c	2008-11-17 16:45:54.0 +0100
 dovecot-1.0/src/lib-sievestorage/sieve-script.c	2008-11-17 16:44:17.0 +0100
+@@ -93,6 +93,13 @@
+ 	struct sieve_script *script;
+ 	const char *filename;
+ 
++	/* Disallow '/' characters in script name */
++	if ( strchr(scriptname, '/') != NULL ) {	
++		sieve_storage_set_error(storage, Invalid script name '%s'.,
++			scriptname);
++		return NULL;
++	}
++
+ 	t_push();
+ 
+ 	filename = t_strconcat


Processed: bug 503383 is forwarded to http://rt.cpan.org/Ticket/Display.html?id=39689

2008-11-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.35
 forwarded 503383 http://rt.cpan.org/Ticket/Display.html?id=39689
Bug#503383: libkinosearch-perl - FTBFS: Expects signed char
Noted your statement that Bug has been forwarded to 
http://rt.cpan.org/Ticket/Display.html?id=39689.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: tagging 503383

2008-11-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.35
 tags 503383 upstream
Bug#503383: libkinosearch-perl - FTBFS: Expects signed char
Tags were: upstream
Tags added: upstream


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#506179: no-ip: remote code execution vulnerability

2008-11-19 Thread Avi Rozen
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I've pushed a fix[1] for this vulnerability, based on analysis of the
exploit and the no-ip client code, and some limited local experiments.

Note that I couldn't get a working reverse shell - I suspect the
exploit itself is buggy, but I have no time to debug it...

Thanks,
Avi.

[1]http://git.debian.org/?p=collab-maint/no-ip.git;a=commit;h=60ed93621ff36d9731ba5d9f9336d6eb91122302

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkkkYN8ACgkQwK8SobAxNVkBvgCfUlSZ6kxGrAGZYb7kfls7GzMG
ZGMAoN04Qv0rHxuEtjopoK3bnx6+zFhx
=RugG
-END PGP SIGNATURE-




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#504359: intent to NMU

2008-11-19 Thread Nico Golde
Hi,
I am uploading a 0-day NMU to fix this bug.

debdiff attached and archived on:
http://people.debian.org/~nion/nmu-diff/csound-5.08.2~dfsg-1_5.08.2~dfsg-1.1.patch

Cheers
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
diff -u csound-5.08.2~dfsg/debian/changelog csound-5.08.2~dfsg/debian/changelog
--- csound-5.08.2~dfsg/debian/changelog
+++ csound-5.08.2~dfsg/debian/changelog
@@ -1,3 +1,11 @@
+csound (1:5.08.2~dfsg-1.1) unstable; urgency=high
+
+  * Non-maintainer upload by the Security Team.
+  * Fix insecure python search path by adding patch provided by
+James Vega (No CVE id yet; Closes: #504359).
+
+ -- Nico Golde [EMAIL PROTECTED]  Wed, 19 Nov 2008 20:20:13 +0100
+
 csound (1:5.08.2~dfsg-1) unstable; urgency=low
 
   [ Jonas Smedegaard ]
diff -u csound-5.08.2~dfsg/debian/patches/series csound-5.08.2~dfsg/debian/patches/series
--- csound-5.08.2~dfsg/debian/patches/series
+++ csound-5.08.2~dfsg/debian/patches/series
@@ -3,6 +3,7 @@
 1001-fix-csoundac-amd64.diff
 1002-type-punning.diff
 1003-abi-plugin-dir.diff
+1004-sanitize-sys.path.diff
 2000-avoid-nonfree-scansyn-plugin.diff
 2001-lua-link.diff
 2002-csoundac.diff
only in patch2:
unchanged:
--- csound-5.08.2~dfsg.orig/debian/patches/1004-sanitize-sys.path.diff
+++ csound-5.08.2~dfsg/debian/patches/1004-sanitize-sys.path.diff
@@ -0,0 +1,22 @@
+--- a/frontends/CsoundAC/Shell.cpp
 b/frontends/CsoundAC/Shell.cpp
+@@ -211,6 +211,8 @@ namespace csound
+   void Shell::main(int argc, char **argv)
+   {
+ PySys_SetArgv_(argc, argv);
++/* Sanitize sys.path */
++PyRun_SimpleString_(import sys; sys.path = filter(None, sys.path));
+   }
+ 
+   void Shell::initialize()
+--- a/frontends/CsoundVST/ScoreGeneratorVst.cpp
 b/frontends/CsoundVST/ScoreGeneratorVst.cpp
+@@ -427,6 +427,8 @@
+   Shell::open();
+   char *argv[] = {,};
+   PySys_SetArgv(1, argv);
++  /* Sanitize sys.path */
++  PyRun_SimpleString(import sys; sys.path = filter(None, sys.path));
+   PyObject *mainModule = PyImport_ImportModule(__main__);
+   result = runScript(import sys\n);
+   if(result)


pgp0ecTSaP2u7.pgp
Description: PGP signature


Bug#505196: darcs patch: Added cl-ironclas dependency.

2008-11-19 Thread Peter De Wachter
Wed Nov 19 20:29:46 CET 2008  Peter De Wachter [EMAIL PROTECTED]
  * Added cl-ironclas dependency.
  There's still one missing dependency: s-http-client (for the
  kpax-examples system), but that library isn't packaged yet.

New patches:

[Added cl-ironclas dependency.
Peter De Wachter [EMAIL PROTECTED]**20081119192946
 There's still one missing dependency: s-http-client (for the
 kpax-examples system), but that library isn't packaged yet.
] hunk ./debian/control 14
 
 Package: cl-kpax
 Architecture: all
-Depends: ${misc:Depends}, cl-who, cl-puri, cl-s-utils, cl-s-sysdeps, cl-s-base64, cl-s-http-server | cl-aserve
+Depends: ${misc:Depends}, cl-who, cl-puri, cl-ironclad, cl-s-utils, cl-s-sysdeps, cl-s-base64, cl-s-http-server | cl-aserve
 Description: A Common Lisp Application Framework
  KPAX is a Common Lisp Web Application Framework. Although KPAX is quite mature
  and has been in production use for years, the documentation is currently not

Context:

[Updated Standard Version without real changes
Peter Van Eynde [EMAIL PROTECTED] 
[Added Homepage field
Peter Van Eynde [EMAIL PROTECTED] 
[Corrected Vcs-Darcs control field
Peter Van Eynde [EMAIL PROTECTED] 
[Changed to group maintanance
Peter Van Eynde [EMAIL PROTECTED] 
[TAG UPSTREAM_kpax_20080304
Peter Van Eynde [EMAIL PROTECTED] 
[redefined log flush logic
Sven Van Caekenberghe [EMAIL PROTECTED]**20080304132247] 
[renamed a function
Sven Van Caekenberghe [EMAIL PROTECTED]**20080304130549] 
[added some more deployed app maintenance code
Sven Van Caekenberghe [EMAIL PROTECTED]**20080304111827] 
[fixes to allow pi to run without css
Sven Van Caekenberghe [EMAIL PROTECTED]**20080303102624] 
[webapps now print full url when they start
Sven Van Caekenberghe [EMAIL PROTECTED]**20080226130840] 
[added get-scheme and get-port to server protocol
Sven Van Caekenberghe [EMAIL PROTECTED]**20080226130807] 
[logging changes from info to debug levels
Sven Van Caekenberghe [EMAIL PROTECTED]**20080226124402] 
[documented logging levels
Sven Van Caekenberghe [EMAIL PROTECTED]**20080226104352] 
[fixed example secure-login
Sven Van Caekenberghe [EMAIL PROTECTED]**20080226104248] 
[more config stuff
Sven Van Caekenberghe [EMAIL PROTECTED]**20080222183658] 
[fixed makefile for moved server
Sven Van Caekenberghe [EMAIL PROTECTED]**20080222183538] 
[added response-size following s-http-server access logging changes
Sven Van Caekenberghe [EMAIL PROTECTED]**20080222161312] 
[added response-status-translated
Sven Van Caekenberghe [EMAIL PROTECTED]**20080222161041] 
[added some tools to manipulate a running server
Sven Van Caekenberghe [EMAIL PROTECTED]**20080222133441] 
[changed spam protection system
Sven Van Caekenberghe [EMAIL PROTECTED]**20070605120605] 
[bugfix added parsing protection
Sven Van Caekenberghe [EMAIL PROTECTED]**20070604083954] 
[replaced a make-byte-vector usage
Sven Van Caekenberghe [EMAIL PROTECTED]**20070601141531] 
[some security fixes
Sven Van Caekenberghe [EMAIL PROTECTED]**20070530073701] 
[added cleanu-links function
Sven Van Caekenberghe [EMAIL PROTECTED]**20070529131802] 
[added some spam proofing and cleanup features
Sven Van Caekenberghe [EMAIL PROTECTED]**20070529121133] 
[Removed in-project md5, sha1 and hmac code and replaced it with a dependency on Ironclad
Sven Van Caekenberghe [EMAIL PROTECTED]**20070524124522] 
[tried a patch from Nathan Froyd to no avail
Sven Van Caekenberghe [EMAIL PROTECTED]**20070507090629] 
[added option to ignore non-ascii chars
Sven Van Caekenberghe [EMAIL PROTECTED]**20070314121807] 
[ignore unicode chars silently
Sven Van Caekenberghe [EMAIL PROTECTED]**20070314121740] 
[copy-stream improvements for CLISP
Sven Van Caekenberghe [EMAIL PROTECTED]**20070312135822] 
[improved start/stop webapps logic
Sven Van Caekenberghe [EMAIL PROTECTED]**2007031213] 
[take ignore-errors into account when stopping a webapp
Sven Van Caekenberghe [EMAIL PROTECTED]**20070312135257] 
[lose the progn and print message earlier
Sven Van Caekenberghe [EMAIL PROTECTED]**20070312135008] 
[we need :debug t with init-kpax also to enable all logging early on
Sven Van Caekenberghe [EMAIL PROTECTED]**20070312134802] 
[fixed a dependency
Sven Van Caekenberghe [EMAIL PROTECTED]**20070310082409] 
[added the case where there is no multiprocessing
Sven Van Caekenberghe [EMAIL PROTECTED]**20070310082324] 
[improved s-http-server keep-alive and http-protocol handling
Sven Van Caekenberghe [EMAIL PROTECTED]**20070307115336] 
[silence the s-http-server by default
Sven Van Caekenberghe [EMAIL PROTECTED]**20070307112131] 
[changed default start-kpax behavior to use standalone s-http-server
Sven Van Caekenberghe [EMAIL PROTECTED]**20070307111928] 
[deal better with missing backtrace
Sven Van Caekenberghe [EMAIL PROTECTED]**20061127110628] 
[fixed get-secure-random-seed to deal correctly with missing dev random
Sven Van Caekenberghe [EMAIL PROTECTED]**20061127110605] 
[extended error-hook with backtrace feature
Sven Van Caekenberghe [EMAIL 

Bug#454363: marked as done (GTK_IM_MODULE=XIM does not work)

2008-11-19 Thread Debian Bug Tracking System

Your message dated Wed, 19 Nov 2008 19:47:09 +
with message-id [EMAIL PROTECTED]
and subject line Bug#454363: fixed in fcitx 1:3.4.3-1.1
has caused the Debian Bug report #454363,
regarding GTK_IM_MODULE=XIM does not work
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
454363: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454363
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: fcitx
Version: 1:3.4.3-1
Severity: normal
Tags: patch

--- Please enter the report below this line. ---

Hello,

/etc/X11/xinit/xinput.d/fcitx contain `GTK_IM_MODULE=XIM', but this does not
work, it should be `GTK_IM_MODULE=xim'.

the patch:

diff -ur fcitx-3.4.3.orig/debian/im-switch/fcitx
fcitx-3.4.3/debian/im-switch/fcitx
--- fcitx-3.4.3.orig/debian/im-switch/fcitx 2007-12-05 16:28:28.0
+0800
+++ fcitx-3.4.3/debian/im-switch/fcitx  2007-12-05 16:28:46.0 +0800
@@ -1,6 +1,6 @@
 XIM=fcitx
 XIM_PROGRAM=/usr/bin/fcitx
 XIM_ARGS=
-GTK_IM_MODULE=XIM
+GTK_IM_MODULE=xim
 QT_IM_MODULE=XIM
 DEPENDS=fcitx


--- System information. ---
Architecture: i386
Kernel:   Linux 2.6.22-3-686

Debian Release: 4.0
  500 unstableanheng.com.cn
  500 stable  security.debian.org

--- Package information. ---
Depends   (Version) | Installed
===-+-=
libc6  (= 2.3.6-6) | 2.6.1-6
libfontconfig1   (= 2.4.0) | 2.4.91-1
libx11-6| 2:1.0.3-7
libxft2  ( 2.1.1) | 2.1.12-2
libxpm4 | 1:3.5.7-1


---End Message---
---BeginMessage---
Source: fcitx
Source-Version: 1:3.4.3-1.1

We believe that the bug you reported is fixed in the latest version of
fcitx, which is due to be installed in the Debian FTP archive:

fcitx_3.4.3-1.1.diff.gz
  to pool/main/f/fcitx/fcitx_3.4.3-1.1.diff.gz
fcitx_3.4.3-1.1.dsc
  to pool/main/f/fcitx/fcitx_3.4.3-1.1.dsc
fcitx_3.4.3-1.1_i386.deb
  to pool/main/f/fcitx/fcitx_3.4.3-1.1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Barry deFreese [EMAIL PROTECTED] (supplier of updated fcitx package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Wed, 19 Nov 2008 12:31:10 -0500
Source: fcitx
Binary: fcitx
Architecture: source i386
Version: 1:3.4.3-1.1
Distribution: unstable
Urgency: low
Maintainer: Yu Guanghui [EMAIL PROTECTED]
Changed-By: Barry deFreese [EMAIL PROTECTED]
Description: 
 fcitx  - Free Chinese Input Toy for X (XIM)
Closes: 454363
Changes: 
 fcitx (1:3.4.3-1.1) unstable; urgency=low
 .
   * Non-maintainer upload.
   [ LI Daobing ]
   * fix lintian error:
 - build-depends-on-obsolete-package build-depends: x-dev
 - declares-possibly-conflicting-debhelper-compat-versions rules=5 compat=5
   * fix im-switch conf file (Closes: #454363)
   [ Barry deFreese ]
   * Make clean not ignore errors.
   * Add copyright holders in debian/copyright.
   * Add watch file.
   * Add Homepage in source stanza.
   * Bump Standards Version to 3.8.0. (No changes needed).
Checksums-Sha1: 
 7a5cb9ac8a742844823147e4c00c8b6433803e4f 1022 fcitx_3.4.3-1.1.dsc
 8fab291212fb4b69368aee025595d0d1dd97fb62 85066 fcitx_3.4.3-1.1.diff.gz
 a91a5aa57c75207dad28c6f6e902409ddc97ca05 3290676 fcitx_3.4.3-1.1_i386.deb
Checksums-Sha256: 
 0c83e7818399739b179b232fbc071f63b3a8baa944ef984fa6c10322632d615d 1022 
fcitx_3.4.3-1.1.dsc
 7b334d0a47753353e95f246ce74c26c51d002d756c71abf37136cf5b75cee2c0 85066 
fcitx_3.4.3-1.1.diff.gz
 c60e9f719b4368fa7aad502d259deec25c17bb9d58249f66362456552e080528 3290676 
fcitx_3.4.3-1.1_i386.deb
Files: 
 b924d6d5d8a63e652ea4482877fb2404 1022 utils optional fcitx_3.4.3-1.1.dsc
 67f9596b3454486aa7e5067d8209e202 85066 utils optional fcitx_3.4.3-1.1.diff.gz
 2913f0709074be8dcdbd668359137280 3290676 utils optional 
fcitx_3.4.3-1.1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkkacgACgkQ5ItltUs5T36djgCgmapyXz5CbvQaby0biOlvai6D
tsMAoI/C0G0plJRO23F7LTTAFyMmksH4
=w117
-END PGP SIGNATURE-


---End Message---


Bug#504359: marked as done (csound: Python scripts load modules from current directory)

2008-11-19 Thread Debian Bug Tracking System

Your message dated Wed, 19 Nov 2008 19:47:05 +
with message-id [EMAIL PROTECTED]
and subject line Bug#504359: fixed in csound 1:5.08.2~dfsg-1.1
has caused the Debian Bug report #504359,
regarding csound: Python scripts load modules from current directory
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
504359: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504359
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: csound
Version: 1:5.08.2~dfsg-1
Severity: grave
Tags: security patch
Justification: user security hole
Usertags: pythonpath

csound's python interface calls PySys_SetArgv with an argv[0] that
doesn't resolve to a filename.  This causes Python to prepend sys.path
with an empty string which, due to the use of relative imports, allows
the possibility to run arbitrary code on the user's system if a file in
their working directory matches the name of a python module csound tries
to import.

This should be fixed by Python 2.6 as it uses absolute imports by
default, but I have not been able to test it and this still needs a fix
for packages built against/used with the currently supported versions of
Python.

-- 
James
GPG Key: 1024D/61326D40 2003-09-02 James Vega [EMAIL PROTECTED]
--- a/frontends/CsoundAC/Shell.cpp
+++ b/frontends/CsoundAC/Shell.cpp
@@ -211,6 +211,8 @@ namespace csound
   void Shell::main(int argc, char **argv)
   {
 PySys_SetArgv_(argc, argv);
+/* Sanitize sys.path */
+PyRun_SimpleString_(import sys; sys.path = filter(None, sys.path));
   }
 
   void Shell::initialize()
--- a/frontends/CsoundVST/ScoreGeneratorVst.cpp
+++ b/frontends/CsoundVST/ScoreGeneratorVst.cpp
@@ -427,6 +427,8 @@
   Shell::open();
   char *argv[] = {,};
   PySys_SetArgv(1, argv);
+  /* Sanitize sys.path */
+  PyRun_SimpleString(import sys; sys.path = filter(None, sys.path));
   PyObject *mainModule = PyImport_ImportModule(__main__);
   result = runScript(import sys\n);
   if(result)


signature.asc
Description: Digital signature
---End Message---
---BeginMessage---
Source: csound
Source-Version: 1:5.08.2~dfsg-1.1

We believe that the bug you reported is fixed in the latest version of
csound, which is due to be installed in the Debian FTP archive:

csladspa_5.08.2~dfsg-1.1_amd64.deb
  to pool/main/c/csound/csladspa_5.08.2~dfsg-1.1_amd64.deb
csound-gui_5.08.2~dfsg-1.1_amd64.deb
  to pool/main/c/csound/csound-gui_5.08.2~dfsg-1.1_amd64.deb
csound-utils_5.08.2~dfsg-1.1_amd64.deb
  to pool/main/c/csound/csound-utils_5.08.2~dfsg-1.1_amd64.deb
csound_5.08.2~dfsg-1.1.diff.gz
  to pool/main/c/csound/csound_5.08.2~dfsg-1.1.diff.gz
csound_5.08.2~dfsg-1.1.dsc
  to pool/main/c/csound/csound_5.08.2~dfsg-1.1.dsc
csound_5.08.2~dfsg-1.1_amd64.deb
  to pool/main/c/csound/csound_5.08.2~dfsg-1.1_amd64.deb
libcsnd-java_5.08.2~dfsg-1.1_amd64.deb
  to pool/main/c/csound/libcsnd-java_5.08.2~dfsg-1.1_amd64.deb
libcsnd5.1_5.08.2~dfsg-1.1_amd64.deb
  to pool/main/c/csound/libcsnd5.1_5.08.2~dfsg-1.1_amd64.deb
libcsound64-5.1_5.08.2~dfsg-1.1_amd64.deb
  to pool/main/c/csound/libcsound64-5.1_5.08.2~dfsg-1.1_amd64.deb
libcsound64-dev_5.08.2~dfsg-1.1_all.deb
  to pool/main/c/csound/libcsound64-dev_5.08.2~dfsg-1.1_all.deb
libcsound64-doc_5.08.2~dfsg-1.1_all.deb
  to pool/main/c/csound/libcsound64-doc_5.08.2~dfsg-1.1_all.deb
libcsoundac5.1_5.08.2~dfsg-1.1_amd64.deb
  to pool/main/c/csound/libcsoundac5.1_5.08.2~dfsg-1.1_amd64.deb
pd-csound_5.08.2~dfsg-1.1_amd64.deb
  to pool/main/c/csound/pd-csound_5.08.2~dfsg-1.1_amd64.deb
python-csound_5.08.2~dfsg-1.1_amd64.deb
  to pool/main/c/csound/python-csound_5.08.2~dfsg-1.1_amd64.deb
python-csoundac_5.08.2~dfsg-1.1_amd64.deb
  to pool/main/c/csound/python-csoundac_5.08.2~dfsg-1.1_amd64.deb
tclcsound_5.08.2~dfsg-1.1_amd64.deb
  to pool/main/c/csound/tclcsound_5.08.2~dfsg-1.1_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Nico Golde [EMAIL PROTECTED] (supplier of updated csound package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Wed, 19 Nov 2008 20:20:13 +0100
Source: csound
Binary: csound csound-gui csound-utils libcsound64-5.1 libcsnd-java 
libcsound64-dev pd-csound python-csound libcsnd5.1 

Bug#506058: Tested

2008-11-19 Thread Daniel Dickinson
On Tue, 18 Nov 2008 11:59:47 +0100
Patrick Matthäi [EMAIL PROTECTED] wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 Hello,
 
 I tried to reproduce it with a pure Lenny/i386 without success, could
 you maybe give more informations on this?

Hmmm...

I did a fresh install (standard system) then added a pile of packages,
including gkrellmd.  When I tried to start gkrellmd it had the problems
described (actually it might be the other bug that was the problem;
that is failing to start when already started, but when I did ps
aux|grep gkrellmd nothing came up except the grep). In order to fix it I
tried to find what was wrong by running gkrellmd manually
(i.e. /usr/bin/gkrellmd instead of /etc/init.d/gkrellmd start) after
which /etc/init.d/gkrellmd started.

I don't know what else to tell you as I can't reinstall on that system
because it is in use.

-- 
And that's my crabbing done for the day.  Got it out of the way early, 
now I have the rest of the afternoon to sniff fragrant tea-roses or 
strangle cute bunnies or something.   -- Michael Devore
GnuPG Key Fingerprint 86 F5 81 A5 D4 2E 1F 1C  http://gnupg.org
The C Shore: http://www.wightman.ca/~cshore


signature.asc
Description: PGP signature


Bug#505197: [Pkg-trac-devel] Bug#505197: SA32652: Trac Multiple Vulnerabilities

2008-11-19 Thread gass

Hi all!

First, thanks for your upload.

I was intended to get that done last sunday, but i got sick and only got
things done again today.

This shall never happen again, thank you all.

Luis Matos


Em 11/17/2008, Dominic Hargreaves [EMAIL PROTECTED] escreveu:

On Sun, Nov 16, 2008 at 06:54:32PM +0100, Giuseppe Iuculano wrote:
 I've prepared a NMU to fix this bug.

 Debdiff in attachment.


 The package can be found on mentors.debian.net:
 - URL: http://mentors.debian.net/debian/pool/main/t/trac
 - Source repository: deb-src http://mentors.debian.net/debian unstable main
 contrib non-free
 - dget http://mentors.debian.net/debian/pool/main/t/trac/trac_0.11.1-2.1.dsc

Uploaded to DELAYED/1-day.

Cheers,
Dominic.

--
Dominic Hargreaves | http://www.larted.org.uk/~dom/
PGP key 5178E2A5 from the.earth.li (keyserver,web,email)



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#504359: intent to NMU

2008-11-19 Thread Felipe Sateler
El 19/11/08 16:35 Nico Golde escribió:
 Hi,
 I am uploading a 0-day NMU to fix this bug.

Thanks for the NMU. I have the fixed applied in the git repository, but 
haven't uploaded yet due to issues with new upstream version.
Note that this bug was fixed in a t-p-u upload, since this version can't 
migrate.


Saludos,
Felipe Sateler


signature.asc
Description: This is a digitally signed message part.


Bug#505446: mlocate always creates empty database

2008-11-19 Thread Sebastian Andrzej Siewior
* Nigel Horne | 2008-11-19 08:12:19 [+]:

 Its a clean installation, the disc was formatted before installation.
 If something is wrong it's nothing I've done!

 Here is my /etc/mtab

 /dev/sda6 / ext3 rw,noatime,errors=remount-ro 0 0
 tmpfs /lib/init/rw tmpfs rw,nosuid,mode=0755 0 0
 proc /proc proc rw,noexec,nosuid,nodev 0 0
 sysfs /sys sysfs rw,noexec,nosuid,nodev 0 0
 procbususb /proc/bus/usb usbfs rw 0 0
 udev /dev tmpfs rw,mode=0755 0 0
 tmpfs /dev/shm tmpfs rw,nosuid,nodev 0 0
 devpts /dev/pts devpts rw,noexec,nosuid,gid=5,mode=620 0 0
 fusectl /sys/fs/fuse/connections fusectl rw 0 0
 /dev/sdb2 /home ext3 rw,noatime 0 0
 /dev/sda2 /mnt/c fuseblk rw,allow_other,blksize=4096 0 0
 /dev/sdb1 /mnt/d fuseblk rw,allow_other,blksize=4096 0 0
 / / bind rw,bind 0 0
 /home /home bind rw,bind 0 0
 rpc_pipefs /var/lib/nfs/rpc_pipefs rpc_pipefs rw 0 0
 automount(pid3573) /net autofs rw,fd=4,pgrp=3573,minproto=2,maxproto=4 0 0
 automount(pid3544) /smb autofs rw,fd=4,pgrp=3544,minproto=2,maxproto=4 0 0

You have your / and /home mounted onto itself + you have automount on
/net and /smb. This is not part of the a standard installation.
Either you have it by accident in your fstab or a chroot mount script
went wrong. I guess the latter.

Does your /proc/mounts contain a line like

|tmpfs / tmpfs rw,size=10240k,mode=755 0 0

? If so, than this is a *valid* bind mount.

Sebastian



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#505714: libimlib2-dev: another imlib2 xpm buffer overflow

2008-11-19 Thread Peter De Wachter
Package: libimlib2-dev
Version: 1.4.0-1.1
Tags: security
Followup-For: Bug #505714

This is another buffer overflow in the XPM loader. (The xpm attached
to this bug report is a 32x32 image according to the header, but
contains 33x32 pixels.)

--- a/src/modules/loaders/loader_xpm.c
+++ b/src/modules/loaders/loader_xpm.c
@@ -246,8 +246,8 @@
  return 0;
   }
 ptr = im-data;
-end = ptr + (sizeof(DATA32) * w * h);
 pixels = w * h;
+end = ptr + pixels;
  }
else
  {



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: tagging 505196

2008-11-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 505196 + patch
Bug#505196: incomplete list for dependencies for cl-kpax
There were no tags set.
Tags added: patch


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: tagging 505714

2008-11-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 505714 + security patch
Bug#505714: Crash on loading XPM file
There were no tags set.
Tags added: security, patch


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#489045: cups: infinite loop, 100%CPU use, while trying to print with HPJetDirect

2008-11-19 Thread Patricio Rojo
1.3.9-5 seems to be working for me!!! thank you very much! 


On Mon, 2008-11-17 at 11:44 +0100, Martin Pitt wrote:
 Martin Pitt [2008-11-16 16:59 +0100]:
  Upstream committed a different patch:
  
http://www.cups.org/strfiles/3001/str3001.patch
 
 This patch is now included in 1.3.9-5, which just got uploaded to
 experimental. Can you guys please test this version? If it works, I
 need to push that to unstable and lenny, too, but the window for that
 gets smaller every day.
 
 Thank you!
 
 Martin




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#506258: dpkg doesn't handle symlinks to directories as directory

2008-11-19 Thread Carl Fürstenberg
Package: dpkg
Version: 1.13.25
Severity: serious
Justification: Policy 6.6

After mailing the dpkg mailing list, I was instructed that I should file
a bug, so here it is:

In the php5 package, the current situation is that /etc/php5/cgi/conf.d
is a symlink to /etc/php5/conf.d; By failing to know that, we in a local
package installed a file under /etc/php5/cgi/conf.d/admin.ini, which
went on without any problem. But due that the php5 package had been
updated, a problem arised, which resulted in following error:

  (Reading database ... 28064 files and directories currently installed.)
  Preparing to replace php5-cgi 5.2.0-8+etch11 (using
/php5-cgi_5.2.0-8+etch13_powerpc.deb) ...
  Unpacking replacement php5-cgi ...
  dpkg: error processing
/var/cache/apt/archives/php5-cgi_5.2.0-8+etch13_powerpc.deb
(--unpack):
  trying to overwrite `/etc/php5/cgi/conf.d', which is also in
package bubba-frontend
  Errors were encountered while processing:
  /var/cache/apt/archives/php5-cgi_5.2.0-8+etch13_powerpc.deb
  E: Sub-process /usr/bin/dpkg returned an error code (1)

After some discussion at #debian-devel, a pinter to section 6.6 point 4
in the policy where given, and that the point in particular was in
effect for etch as well, which states:

A directory will never be replaced by a symbolic link to a directory
or vice versa;
instead, the existing state (symlink or not) will be left alone and
dpkg will follow
the symlink if there is one.

My interpreation of the policy is that the above error shouln't arise,
even though we should have installed the config file under
/etc/php5/conf.d anyway, as it wouldn't make any runtime difference
(somewhat a bug in the php5 packages). So I ask you if this is an bug,
or that out interpreation of the poliy is lousy at best.

Above is all related to Etch, and I don't know if this error is
present in lenny/sid.

/Carl



-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core)
Locale: LANG=sv_SE.UTF-8, LC_CTYPE=sv_SE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#506261: enscript: Buffer overflows

2008-11-19 Thread Moritz Muehlenhoff
Package: enscript
Version: 1.6.4-12
Severity: grave
Tags: security
Justification: user security hole

Hi, 
buffer overflows have been discovered in enscript:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3863
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4306

I'm attaching a patch by Werner Fink of SuSE covering these
issues.

Cheers,
Moritz

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core)
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash

Versions of packages enscript depends on:
ii  libc62.7-15  GNU C Library: Shared libraries
ii  libpaper11.1.23+nmu1 library for handling paper charact

enscript recommends no packages.

Versions of packages enscript suggests:
ii  ghostscript [postscript- 8.62.dfsg.1-3.1 The GPL Ghostscript PostScript/PDF
ii  lpr  1:2008.05.17BSD lpr/lpd line printer spooling 

-- no debconf information
--- src/psgen.c
+++ src/psgen.c	2008-10-29 10:43:08.512598143 +0100
@@ -24,6 +24,7 @@
  * Boston, MA 02111-1307, USA.
  */
 
+#include limits.h
 #include gsint.h
 
 /*
@@ -124,7 +125,7 @@ struct gs_token_st
 	  double xscale;
 	  double yscale;
 	  int llx, lly, urx, ury; /* Bounding box. */
-	  char filename[512];
+	  char filename[PATH_MAX];
 	  char *skipbuf;
 	  unsigned int skipbuf_len;
 	  unsigned int skipbuf_pos;
@@ -135,11 +136,11 @@ struct gs_token_st
   Color bgcolor;
   struct
 	{
-	  char name[512];
+	  char name[PATH_MAX];
 	  FontPoint size;
 	  InputEncoding encoding;
 	} font;
-  char filename[512];
+  char filename[PATH_MAX];
 } u;
 };
 
@@ -248,7 +249,7 @@ static int do_print = 1;
 static int user_fontp = 0;
 
 /* The user [EMAIL PROTECTED] font. */
-static char user_font_name[256];
+static char user_font_name[PATH_MAX];
 static FontPoint user_font_pt;
 static InputEncoding user_font_encoding;
 
@@ -978,7 +979,8 @@ large for page\n),
 			FATAL ((stderr,
 _(user font encoding can be only the system's default or `ps')));
 
-		  strcpy (user_font_name, token.u.font.name);
+		  memset  (user_font_name, 0, sizeof(user_font_name));
+		  strncpy (user_font_name, token.u.font.name, sizeof(user_font_name) - 1);
 		  user_font_pt.w = token.u.font.size.w;
 		  user_font_pt.h = token.u.font.size.h;
 		  user_font_encoding = token.u.font.encoding;
@@ -1444,7 +1446,7 @@ read_special_escape (InputStream *is, To
 	  buf[i] = ch;
 	  if (i + 1 = sizeof (buf))
 	FATAL ((stderr, _(too long argument for %s escape:\n%.*s),
-		escapes[i].name, i, buf));
+		escapes[e].name, i, buf));
 	}
   buf[i] = '\0';
 
@@ -1452,7 +1454,8 @@ read_special_escape (InputStream *is, To
   switch (escapes[e].escape)
 	{
 	case ESC_FONT:
-	  strcpy (token-u.font.name, buf);
+	  memset  (token-u.font.name, 0, sizeof(token-u.font.name));
+	  strncpy (token-u.font.name, buf, sizeof(token-u.font.name) - 1);
 
 	  /* Check for the default font. */
 	  if (strcmp (token-u.font.name, default) == 0)
@@ -1465,7 +1468,8 @@ read_special_escape (InputStream *is, To
 		FATAL ((stderr, _(malformed font spec for [EMAIL PROTECTED] escape: %s),
 			token-u.font.name));
 
-	  strcpy (token-u.font.name, cp);
+	  memset  (token-u.font.name, 0, sizeof(token-u.font.name));
+	  strncpy (token-u.font.name, cp, sizeof(token-u.font.name) - 1);
 	  xfree (cp);
 	}
 	  token-type = tFONT;
@@ -1544,7 +1548,8 @@ read_special_escape (InputStream *is, To
 	  break;
 
 	case ESC_SETFILENAME:
-	  strcpy (token-u.filename, buf);
+	  memset  (token-u.filename, 0, sizeof(token-u.font.name));
+	  strncpy (token-u.filename, buf, sizeof(token-u.filename) - 1);
 	  token-type = tSETFILENAME;
 	  break;
 


Bug#506261: enscript: Buffer overflows

2008-11-19 Thread Florian Weimer
* Moritz Muehlenhoff:

 Hi, 
 buffer overflows have been discovered in enscript:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3863
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4306

 I'm attaching a patch by Werner Fink of SuSE covering these
 issues.

While you are at it, please update the manpage regarding the espf
special escape (command execution is no longer possible).



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#506261: enscript: Buffer overflows

2008-11-19 Thread Tim Retout
On Wed, 2008-11-19 at 23:29 +0100, Moritz Muehlenhoff wrote:
 Package: enscript
 Version: 1.6.4-12
 Severity: grave
 Tags: security
 Justification: user security hole
 
 Hi, 
 buffer overflows have been discovered in enscript:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3863
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4306
 
 I'm attaching a patch by Werner Fink of SuSE covering these
 issues.

Thanks. There go my hopes for a quiet lenny release. :)

I'm just building a patched package. I can look at the manpage issue as
well, but it's quite late here.

-- 
Tim Retout [EMAIL PROTECTED]




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#506261: enscript: Buffer overflows

2008-11-19 Thread Tim Retout
On Wed, 2008-11-19 at 23:29 +0100, Moritz Muehlenhoff wrote:
 I'm attaching a patch by Werner Fink of SuSE covering these
 issues.

How does this debdiff look?

-- 
Tim Retout [EMAIL PROTECTED]
diff -u enscript-1.6.4/debian/patches/series enscript-1.6.4/debian/patches/series
--- enscript-1.6.4/debian/patches/series
+++ enscript-1.6.4/debian/patches/series
@@ -24,0 +25 @@
+506261-buffer-overflows
diff -u enscript-1.6.4/debian/changelog enscript-1.6.4/debian/changelog
--- enscript-1.6.4/debian/changelog
+++ enscript-1.6.4/debian/changelog
@@ -1,3 +1,11 @@
+enscript (1.6.4-13) unstable; urgency=high
+
+  * debian/patches/506261-buffer-overflows: New patch by Werner Fink to fix
+buffer overflows. (Closes: #506261)
+  * Urgency set to high for RC security bugfix.
+
+ -- Tim Retout [EMAIL PROTECTED]  Wed, 19 Nov 2008 22:45:35 +
+
 enscript (1.6.4-12) unstable; urgency=low
 
   * New maintainer. (Closes: #413482)
only in patch2:
unchanged:
--- enscript-1.6.4.orig/debian/patches/506261-buffer-overflows
+++ enscript-1.6.4/debian/patches/506261-buffer-overflows
@@ -0,0 +1,96 @@
+Patch by Werner Fink. See Debian bug #506261.
+
+
+Index: enscript-1.6.4/src/psgen.c
+===
+--- enscript-1.6.4.orig/src/psgen.c	2008-11-19 22:49:31.0 +
 enscript-1.6.4/src/psgen.c	2008-11-19 22:49:36.0 +
+@@ -24,6 +24,7 @@
+  * Boston, MA 02111-1307, USA.
+  */
+ 
++#include limits.h
+ #include gsint.h
+ 
+ /*
+@@ -124,7 +125,7 @@
+ 	  double xscale;
+ 	  double yscale;
+ 	  int llx, lly, urx, ury; /* Bounding box. */
+-	  char filename[512];
++	  char filename[PATH_MAX];
+ 	  char *skipbuf;
+ 	  unsigned int skipbuf_len;
+ 	  unsigned int skipbuf_pos;
+@@ -135,11 +136,11 @@
+   Color bgcolor;
+   struct
+ 	{
+-	  char name[512];
++	  char name[PATH_MAX];
+ 	  FontPoint size;
+ 	  InputEncoding encoding;
+ 	} font;
+-  char filename[512];
++  char filename[PATH_MAX];
+ } u;
+ };
+ 
+@@ -248,7 +249,7 @@
+ static int user_fontp = 0;
+ 
+ /* The user [EMAIL PROTECTED] font. */
+-static char user_font_name[256];
++static char user_font_name[PATH_MAX];
+ static FontPoint user_font_pt;
+ static InputEncoding user_font_encoding;
+ 
+@@ -978,7 +979,8 @@
+ 			FATAL ((stderr,
+ _(user font encoding can be only the system's default or `ps')));
+ 
+-		  strcpy (user_font_name, token.u.font.name);
++		  memset  (user_font_name, 0, sizeof(user_font_name));
++		  strncpy (user_font_name, token.u.font.name, sizeof(user_font_name) - 1);
+ 		  user_font_pt.w = token.u.font.size.w;
+ 		  user_font_pt.h = token.u.font.size.h;
+ 		  user_font_encoding = token.u.font.encoding;
+@@ -1444,7 +1446,7 @@
+ 	  buf[i] = ch;
+ 	  if (i + 1 = sizeof (buf))
+ 	FATAL ((stderr, _(too long argument for %s escape:\n%.*s),
+-		escapes[i].name, i, buf));
++		escapes[e].name, i, buf));
+ 	}
+   buf[i] = '\0';
+ 
+@@ -1452,7 +1454,8 @@
+   switch (escapes[e].escape)
+ 	{
+ 	case ESC_FONT:
+-	  strcpy (token-u.font.name, buf);
++	  memset  (token-u.font.name, 0, sizeof(token-u.font.name));
++	  strncpy (token-u.font.name, buf, sizeof(token-u.font.name) - 1);
+ 
+ 	  /* Check for the default font. */
+ 	  if (strcmp (token-u.font.name, default) == 0)
+@@ -1465,7 +1468,8 @@
+ 		FATAL ((stderr, _(malformed font spec for [EMAIL PROTECTED] escape: %s),
+ 			token-u.font.name));
+ 
+-	  strcpy (token-u.font.name, cp);
++	  memset  (token-u.font.name, 0, sizeof(token-u.font.name));
++	  strncpy (token-u.font.name, cp, sizeof(token-u.font.name) - 1);
+ 	  xfree (cp);
+ 	}
+ 	  token-type = tFONT;
+@@ -1544,7 +1548,8 @@
+ 	  break;
+ 
+ 	case ESC_SETFILENAME:
+-	  strcpy (token-u.filename, buf);
++	  memset  (token-u.filename, 0, sizeof(token-u.font.name));
++	  strncpy (token-u.filename, buf, sizeof(token-u.filename) - 1);
+ 	  token-type = tSETFILENAME;
+ 	  break;
+ 


signature.asc
Description: This is a digitally signed message part


Processed: portmap

2008-11-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 504867 serious
Bug#504867: Update to portmap_6.0-7 does not work / hangs
Severity set to `serious' from `important'

 severity 504305 serious
Bug#504305: portmap/loopback: true is not honored by init script
Bug#506207: portmap is not correctly started
Severity set to `serious' from `normal'

 tags 504867 + pending
Bug#504867: Update to portmap_6.0-7 does not work / hangs
There were no tags set.
Tags added: pending

 tags 504305 + pending
Bug#504305: portmap/loopback: true is not honored by init script
Tags were: patch
Bug#506207: portmap is not correctly started
Tags added: pending


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#490893: initscripts: reboot fails to unmount '/'

2008-11-19 Thread Aníbal Monsalve Salazar
On Wed, Nov 12, 2008 at 10:17:34AM +0500, Subhashis Roy wrote:
I have checked that despite update of 'portmap' initscript, the
Bug#490893 is still reproducible.

I couldn't reproduce this bug.

Please try version 6.0-8 to see if it fixes this bug.


signature.asc
Description: Digital signature


Bug#504305: marked as done (portmap/loopback: true is not honored by init script)

2008-11-19 Thread Debian Bug Tracking System

Your message dated Thu, 20 Nov 2008 00:47:04 +
with message-id [EMAIL PROTECTED]
and subject line Bug#506207: fixed in portmap 6.0-8
has caused the Debian Bug report #506207,
regarding portmap/loopback: true is not honored by init script
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
506207: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506207
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: portmap
Version: 6.0-7
Severity: normal
Tags: patch

*** Please type your report below this line ***

Dear Anibal,

the debconf setting portmap/loopback: true is not honored anymore by the
init script. It is correctly applied to /etc/defaults/portmap, but portmap
still binds to all interfaces.

Apparently in /etc/init.d/portmap, the function pidofproc starts portmap,
but does not receive the $OPTIONS variable as the start-stop-daemin does.
This can be fixed by passing the option here:

--- /etc/init.d/portmap 2008-10-27 00:53:10.0 +0100
+++ portmap 2008-11-02 19:01:09.0 +0100
@@ -30,7 +30,7 @@
 case $1 in
 start)
log_begin_msg Starting portmap daemon...
-   pid=pidofproc portmap
+   pid=pidofproc portmap $OPTIONS
if [ -n $pid ] ; then
  log_begin_msg Already running.
  log_end_msg 0

I am not sure if this is not really a bug of init-functions, though.

Cheers
Jan

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (101, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-1-686-bigmem (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages portmap depends on:
ii  debconf [debconf-2.0] 1.5.24 Debian configuration management 
sy
ii  libc6 2.7-15 GNU C Library: Shared libraries
ii  libwrap0  7.6.q-16   Wietse Venema's TCP wrappers 
libra
ii  lsb-base  3.2-20 Linux Standard Base 3.2 init 
scrip

portmap recommends no packages.

portmap suggests no packages.

-- debconf information:
* portmap/loopback: true


---End Message---
---BeginMessage---
Source: portmap
Source-Version: 6.0-8

We believe that the bug you reported is fixed in the latest version of
portmap, which is due to be installed in the Debian FTP archive:

portmap_6.0-8.diff.gz
  to pool/main/p/portmap/portmap_6.0-8.diff.gz
portmap_6.0-8.dsc
  to pool/main/p/portmap/portmap_6.0-8.dsc
portmap_6.0-8_i386.deb
  to pool/main/p/portmap/portmap_6.0-8_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Anibal Monsalve Salazar [EMAIL PROTECTED] (supplier of updated portmap 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 20 Nov 2008 10:01:57 +1100
Source: portmap
Binary: portmap
Architecture: source i386
Version: 6.0-8
Distribution: unstable
Urgency: high
Maintainer: Anibal Monsalve Salazar [EMAIL PROTECTED]
Changed-By: Anibal Monsalve Salazar [EMAIL PROTECTED]
Description: 
 portmap- RPC port mapper
Closes: 504867 506207 506207
Changes: 
 portmap (6.0-8) unstable; urgency=high
 .
   * Fix the fix for #448470; patch by Juan Cespedes; closes: #506207, #506207
   * Replace pidof with pidofproc in postinst; closes: #504867
Checksums-Sha1: 
 7b71fdf824f9dfa15d6d5153732f91374feab794 1049 portmap_6.0-8.dsc
 7315ff799568549f682d6148278c8a8ce98e22bb 26006 portmap_6.0-8.diff.gz
 23ec21152eeed6c5175844722a7bb63819155139 35836 portmap_6.0-8_i386.deb
Checksums-Sha256: 
 630d68e42649ab749243f8b3969dffabc26053b7b4df0e116daa559e8027b395 1049 
portmap_6.0-8.dsc
 8288379e32db7cbfa6233ee1717229bba5340dbad59007788fd0f247c747870a 26006 
portmap_6.0-8.diff.gz
 f7cc122776627f8ddcf99a6aebc0a15d1444eb139a46099151ef4fdf6344d947 35836 
portmap_6.0-8_i386.deb
Files: 
 6bcc6b7b1f44c48e6cbf7adf4d6cb604 1049 net standard portmap_6.0-8.dsc
 a05422ac894a7cbd7bf0342342a40126 26006 net standard portmap_6.0-8.diff.gz
 181995c2ed79e9af0163cd5f6f1415d4 35836 net standard portmap_6.0-8_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)


Bug#506207: marked as done (portmap is not correctly started)

2008-11-19 Thread Debian Bug Tracking System

Your message dated Thu, 20 Nov 2008 00:47:04 +
with message-id [EMAIL PROTECTED]
and subject line Bug#506207: fixed in portmap 6.0-8
has caused the Debian Bug report #506207,
regarding portmap is not correctly started
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
506207: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506207
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: portmap
Version: 6.0-7

In file /etc/init.d/portmap, when doing a start, there is a check to
see if portmap is already running.  The check currently looks like this:

pid=pidofproc portmap

But, of course, it should be:

pid=`pidofproc portmap`

Right now, it always tries to start portmap in that line, without
specifying any potions, even if there are in /etc/default/portmap, and
even if it is already running.

Thanks,

-- 
Juan Cespedes
http://www.cespedes.org/


---End Message---
---BeginMessage---
Source: portmap
Source-Version: 6.0-8

We believe that the bug you reported is fixed in the latest version of
portmap, which is due to be installed in the Debian FTP archive:

portmap_6.0-8.diff.gz
  to pool/main/p/portmap/portmap_6.0-8.diff.gz
portmap_6.0-8.dsc
  to pool/main/p/portmap/portmap_6.0-8.dsc
portmap_6.0-8_i386.deb
  to pool/main/p/portmap/portmap_6.0-8_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Anibal Monsalve Salazar [EMAIL PROTECTED] (supplier of updated portmap 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 20 Nov 2008 10:01:57 +1100
Source: portmap
Binary: portmap
Architecture: source i386
Version: 6.0-8
Distribution: unstable
Urgency: high
Maintainer: Anibal Monsalve Salazar [EMAIL PROTECTED]
Changed-By: Anibal Monsalve Salazar [EMAIL PROTECTED]
Description: 
 portmap- RPC port mapper
Closes: 504867 506207 506207
Changes: 
 portmap (6.0-8) unstable; urgency=high
 .
   * Fix the fix for #448470; patch by Juan Cespedes; closes: #506207, #506207
   * Replace pidof with pidofproc in postinst; closes: #504867
Checksums-Sha1: 
 7b71fdf824f9dfa15d6d5153732f91374feab794 1049 portmap_6.0-8.dsc
 7315ff799568549f682d6148278c8a8ce98e22bb 26006 portmap_6.0-8.diff.gz
 23ec21152eeed6c5175844722a7bb63819155139 35836 portmap_6.0-8_i386.deb
Checksums-Sha256: 
 630d68e42649ab749243f8b3969dffabc26053b7b4df0e116daa559e8027b395 1049 
portmap_6.0-8.dsc
 8288379e32db7cbfa6233ee1717229bba5340dbad59007788fd0f247c747870a 26006 
portmap_6.0-8.diff.gz
 f7cc122776627f8ddcf99a6aebc0a15d1444eb139a46099151ef4fdf6344d947 35836 
portmap_6.0-8_i386.deb
Files: 
 6bcc6b7b1f44c48e6cbf7adf4d6cb604 1049 net standard portmap_6.0-8.dsc
 a05422ac894a7cbd7bf0342342a40126 26006 net standard portmap_6.0-8.diff.gz
 181995c2ed79e9af0163cd5f6f1415d4 35836 net standard portmap_6.0-8_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkksL8ACgkQgY5NIXPNpFWyyQCgzS/iWPGNuRC7jSNEnqCcaOg2
0eoAn3tHH7hrOJMaYXULTdvxAP8Vd1LV
=KGQS
-END PGP SIGNATURE-


---End Message---


Bug#504867: marked as done (Update to portmap_6.0-7 does not work / hangs)

2008-11-19 Thread Debian Bug Tracking System

Your message dated Thu, 20 Nov 2008 00:47:04 +
with message-id [EMAIL PROTECTED]
and subject line Bug#504867: fixed in portmap 6.0-8
has caused the Debian Bug report #504867,
regarding Update to portmap_6.0-7 does not work / hangs
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
504867: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504867
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: portmap
Version: 6.0-6
Severity: important


If I want to upgrade my system via apt-get upgrade, apt-get hangs when trying 
to install the new version of portmap (6.0-7). It stops at the 
point Preparing to replace portmap. If I interrupt apt-get with Strg+C, it 
says: Warning, old pre-removal-script was killed. dpkg - try to 
use the script in the new package. Stopping portmap-deamon. Again, it hangs 
(is not able to stop the deamon). After killing it again with 
Strg+C dpkg reports, that there has been problem while upgrading. 
E: Sub-process /usr/bin/dpkg returned an error code (1)
If you need any further informations, please contact me. The error-messages 
might not be the exactly correct ones, since I translated them from 
german back to english.

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-1-686 (SMP w/2 CPU cores)
Locale: LANG=de_AT.UTF-8, LC_CTYPE=de_AT.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages portmap depends on:
ii  debconf [debconf-2.0] 1.5.22 Debian configuration management sy
ii  libc6 2.7-15 GNU C Library: Shared libraries
ii  libwrap0  7.6.q-16   Wietse Venema's TCP wrappers libra
ii  lsb-base  3.2-20 Linux Standard Base 3.2 init scrip

portmap recommends no packages.

portmap suggests no packages.

-- debconf information:
  portmap/loopback: false


---End Message---
---BeginMessage---
Source: portmap
Source-Version: 6.0-8

We believe that the bug you reported is fixed in the latest version of
portmap, which is due to be installed in the Debian FTP archive:

portmap_6.0-8.diff.gz
  to pool/main/p/portmap/portmap_6.0-8.diff.gz
portmap_6.0-8.dsc
  to pool/main/p/portmap/portmap_6.0-8.dsc
portmap_6.0-8_i386.deb
  to pool/main/p/portmap/portmap_6.0-8_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Anibal Monsalve Salazar [EMAIL PROTECTED] (supplier of updated portmap 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 20 Nov 2008 10:01:57 +1100
Source: portmap
Binary: portmap
Architecture: source i386
Version: 6.0-8
Distribution: unstable
Urgency: high
Maintainer: Anibal Monsalve Salazar [EMAIL PROTECTED]
Changed-By: Anibal Monsalve Salazar [EMAIL PROTECTED]
Description: 
 portmap- RPC port mapper
Closes: 504867 506207 506207
Changes: 
 portmap (6.0-8) unstable; urgency=high
 .
   * Fix the fix for #448470; patch by Juan Cespedes; closes: #506207, #506207
   * Replace pidof with pidofproc in postinst; closes: #504867
Checksums-Sha1: 
 7b71fdf824f9dfa15d6d5153732f91374feab794 1049 portmap_6.0-8.dsc
 7315ff799568549f682d6148278c8a8ce98e22bb 26006 portmap_6.0-8.diff.gz
 23ec21152eeed6c5175844722a7bb63819155139 35836 portmap_6.0-8_i386.deb
Checksums-Sha256: 
 630d68e42649ab749243f8b3969dffabc26053b7b4df0e116daa559e8027b395 1049 
portmap_6.0-8.dsc
 8288379e32db7cbfa6233ee1717229bba5340dbad59007788fd0f247c747870a 26006 
portmap_6.0-8.diff.gz
 f7cc122776627f8ddcf99a6aebc0a15d1444eb139a46099151ef4fdf6344d947 35836 
portmap_6.0-8_i386.deb
Files: 
 6bcc6b7b1f44c48e6cbf7adf4d6cb604 1049 net standard portmap_6.0-8.dsc
 a05422ac894a7cbd7bf0342342a40126 26006 net standard portmap_6.0-8.diff.gz
 181995c2ed79e9af0163cd5f6f1415d4 35836 net standard portmap_6.0-8_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkksL8ACgkQgY5NIXPNpFWyyQCgzS/iWPGNuRC7jSNEnqCcaOg2
0eoAn3tHH7hrOJMaYXULTdvxAP8Vd1LV
=KGQS
-END PGP SIGNATURE-


---End Message---


Bug#506268: CVE-2008-5160: allows remote attackers to cause a denial of service (daemon crash) via multiple invalid requests

2008-11-19 Thread Raphael Geissert
Package: msp-webserver
Severity: grave
Version: 0.8.11-2
Tags: security

Hi,

The following CVE (Common Vulnerabilities  Exposures) id was published for 
msp-webserver.

CVE-2008-5160[1]:
 Unspecified vulnerability in MyServer 0.8.11 allows remote attackers to
 cause a denial of service (daemon crash) via multiple invalid requests with
 the HTTP GET, DELETE, OPTIONS, and possibly other methods, related to a
 204 No Content error.

If you fix the vulnerability please also make sure to include the CVE id in 
the changelog entry.

[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5160
     http://security-tracker.debian.net/tracker/CVE-2008-5160

Cheers,
-- 
Raphael Geissert - Debian Maintainer
www.debian.org - get.debian.net


signature.asc
Description: This is a digitally signed message part.


Bug#506258: marked as done (dpkg doesn't handle symlinks to directories as directory)

2008-11-19 Thread Debian Bug Tracking System

Your message dated Thu, 20 Nov 2008 03:58:29 +0200
with message-id [EMAIL PROTECTED]
and subject line Re: Bug#506258: dpkg doesn't handle symlinks to directories as 
directory
has caused the Debian Bug report #506258,
regarding dpkg doesn't handle symlinks to directories as directory
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
506258: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506258
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: dpkg
Version: 1.13.25
Severity: serious
Justification: Policy 6.6

After mailing the dpkg mailing list, I was instructed that I should file
a bug, so here it is:

In the php5 package, the current situation is that /etc/php5/cgi/conf.d
is a symlink to /etc/php5/conf.d; By failing to know that, we in a local
package installed a file under /etc/php5/cgi/conf.d/admin.ini, which
went on without any problem. But due that the php5 package had been
updated, a problem arised, which resulted in following error:

  (Reading database ... 28064 files and directories currently installed.)
  Preparing to replace php5-cgi 5.2.0-8+etch11 (using
/php5-cgi_5.2.0-8+etch13_powerpc.deb) ...
  Unpacking replacement php5-cgi ...
  dpkg: error processing
/var/cache/apt/archives/php5-cgi_5.2.0-8+etch13_powerpc.deb
(--unpack):
  trying to overwrite `/etc/php5/cgi/conf.d', which is also in
package bubba-frontend
  Errors were encountered while processing:
  /var/cache/apt/archives/php5-cgi_5.2.0-8+etch13_powerpc.deb
  E: Sub-process /usr/bin/dpkg returned an error code (1)

After some discussion at #debian-devel, a pinter to section 6.6 point 4
in the policy where given, and that the point in particular was in
effect for etch as well, which states:

A directory will never be replaced by a symbolic link to a directory
or vice versa;
instead, the existing state (symlink or not) will be left alone and
dpkg will follow
the symlink if there is one.

My interpreation of the policy is that the above error shouln't arise,
even though we should have installed the config file under
/etc/php5/conf.d anyway, as it wouldn't make any runtime difference
(somewhat a bug in the php5 packages). So I ask you if this is an bug,
or that out interpreation of the poliy is lousy at best.

Above is all related to Etch, and I don't know if this error is
present in lenny/sid.

/Carl



-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core)
Locale: LANG=sv_SE.UTF-8, LC_CTYPE=sv_SE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash


---End Message---
---BeginMessage---
Version: 1.14.6

On Wed, 2008-11-19 at 23:13:23 +0100, Carl Fürstenberg wrote:
 Package: dpkg
 Version: 1.13.25
 Severity: serious
 Justification: Policy 6.6

 In the php5 package, the current situation is that /etc/php5/cgi/conf.d
 is a symlink to /etc/php5/conf.d; By failing to know that, we in a local
 package installed a file under /etc/php5/cgi/conf.d/admin.ini, which
 went on without any problem. But due that the php5 package had been
 updated, a problem arised, which resulted in following error:
 
   (Reading database ... 28064 files and directories currently installed.)
   Preparing to replace php5-cgi 5.2.0-8+etch11 (using
 /php5-cgi_5.2.0-8+etch13_powerpc.deb) ...
   Unpacking replacement php5-cgi ...
   dpkg: error processing
 /var/cache/apt/archives/php5-cgi_5.2.0-8+etch13_powerpc.deb
 (--unpack):
   trying to overwrite `/etc/php5/cgi/conf.d', which is also in
 package bubba-frontend
   Errors were encountered while processing:
   /var/cache/apt/archives/php5-cgi_5.2.0-8+etch13_powerpc.deb
   E: Sub-process /usr/bin/dpkg returned an error code (1)
 
 After some discussion at #debian-devel, a pinter to section 6.6 point 4
 in the policy where given, and that the point in particular was in
 effect for etch as well, which states:
 
   A directory will never be replaced by a symbolic link to a directory
 or vice versa;
   instead, the existing state (symlink or not) will be left alone and
 dpkg will follow
   the symlink if there is one.
 
 My interpreation of the policy is that the above error shouln't arise,
 even though we should have installed the config file under
 /etc/php5/conf.d anyway, as it wouldn't make any runtime difference
 (somewhat a bug in the php5 packages). So I ask you if this is an bug,
 or that out interpreation of the poliy is lousy at best.
 
 Above is all 

Bug#496411: #496411: nothing was fixed at all

2008-11-19 Thread Raphael Geissert
found 496411 20060918-3
found 496411 20081031+dfsg-1
thanks

I have found all of the reported issues in BOTH versions marked as fixed.
Please stop blindly closing this report and *do verify* everything is fixed.

Attached are the results of a quick grep on both packages.

Regards,
-- 
Raphael Geissert - Debian Maintainer
www.debian.org - get.debian.net
grep -r /tmp/ -A5 -B5 usr/lib/debian-test/tests/linux/ 2/dev/null | cut -d/ 
-f8-





rwtest01%f





ns-udpsender matches
test_1_to_1_nonblock matches
test_1_to_1_connectx matches
test_1_to_1_socket_bind_listen matches
opts_e matches
--
nfsstress-
nfsstress-# Setting the NFS to version 2 with UDP by default
nfsstress-PID=$$
nfsstress-VERSION=${VERSION:=2}
nfsstress-SOCKET_TYPE=${SOCKET_TYPE:=udp}
nfsstress:TESTDIR=${TESTDIR:=/tmp/$TC$PID.testdir}
nfsstress-NFS_TYPE=${NFS_TYPE:=nfs}
nfsstress-
nfsstress-# If CLEANUP is not set; set it to ON
nfsstress-CLEANUP=${CLEANUP:=ON}
nfsstress-
test_1_to_1_events matches
test_assoc_abort matches
ns-mcast_join matches
open_files matches
test_1_to_1_sendmsg matches
--
nfs01-
nfs01-VERSION=${VERSION:=2}
nfs01-RHOST=${RHOST:=`hostname`}
nfs01-NFILES=${NFILES:=1000}
nfs01-SOCKET_TYPE=${SOCKET_TYPE:=udp}
nfs01:TESTDIR=${TESTDIR:=/tmp/$TC$PID.testdir}
nfs01-NFS_TYPE=${NFS_TYPE:=nfs}
nfs01-
nfs01-echo 
nfs01-echo Test Options:
nfs01-echo  VERSION: $VERSION
test_recvmsg matches
test_sockopt matches
ltpServer matches
test_1_to_1_send matches
test_sockopt_v6 matches
rpc1 matches
test_1_to_1_addrs matches
opts matches
test_inaddr_any_v6 matches
--
xinetd_tests.sh-trap cleanup 0
xinetd_tests.sh-
xinetd_tests.sh-# create the temporary directory used by this testcase
xinetd_tests.sh-if [ -z $TMP ]
xinetd_tests.sh-then
xinetd_tests.sh:LTPTMP=/tmp/tst_xinetd.$$
xinetd_tests.sh-else
xinetd_tests.sh-LTPTMP=$TMP/tst_xinetd.$$
xinetd_tests.sh-fi
xinetd_tests.sh-
xinetd_tests.sh-mkdir -p $LTPTMP /dev/null || RC=$?
--
traceroute_tests.sh-trap cleanup 0
traceroute_tests.sh-
traceroute_tests.sh-# create the temporary directory used by this testcase
traceroute_tests.sh-if [ -z $TMP ]
traceroute_tests.sh-then
traceroute_tests.sh:LTPTMP=/tmp/tst_traceroute.$$
traceroute_tests.sh-else
traceroute_tests.sh-LTPTMP=$TMP/tst_traceroute.$$
traceroute_tests.sh-fi
traceroute_tests.sh-
traceroute_tests.sh-mkdir -p $LTPTMP /dev/null || RC=$?
--
tcpdump01-#Uncomment line below for debug output.
tcpdump01-#trace_logic=${trace_logic:-set -x}
tcpdump01-$trace_logic
tcpdump01-
tcpdump01-TC=tcpdump
tcpdump01:TCtmp=${TCtmp:-/tmp/$TC$$}
tcpdump01-RHOST=${RHOST:-`hostname`}
tcpdump01-IFNAME=${IFNAME:-$(netstat -i -n | grep ^[b-z]\{2,4\}[0-9][^*] | 
awk '{print $1}' | head -n1)}
tcpdump01-NUMLOOPS=${NUMLOOPS:-20}
tcpdump01-OUTFILE=$TCtmp/tcpdump_out
tcpdump01-LTPROOT=${LTPROOT:-../../../../}
test_1_to_1_connect matches
nfs04_create_file matches
test_1_to_1_recvmsg matches
--
nfs03-PID=$$
nfs03-
nfs03-# Setting the NFS to version 2 by default
nfs03-VERSION=${VERSION:=2}
nfs03-SOCKET_TYPE=${SOCKET_TYPE:=udp}
nfs03:TESTDIR=${TESTDIR:=/tmp/$TC$PID.testdir}
nfs03-NFS_TYPE=${NFS_TYPE:=nfs}
nfs03-
nfs03-# If CLEANUP is not set; set it to ON
nfs03-CLEANUP=${CLEANUP:=ON}
nfs03-
test_1_to_1_sockopt matches
ns-igmp_querier matches
test_basic_v6 matches
ns-udpclient matches
test_assoc_shutdown matches
ns-icmpv6_sender matches
test_1_to_1_shutdown matches
ns-tcpserver matches
test_inaddr_any matches
pingpong matches
test_fragments_v6 matches
--
dhcpd_tests.sh- export TCID=dhcpd # this is the init function.
dhcpd_tests.sh- export TST_COUNT=0  # init identifier,
dhcpd_tests.sh-
dhcpd_tests.sh- if [ -z $TMP ]
dhcpd_tests.sh- then
dhcpd_tests.sh: LTPTMP=/tmp/tst_dhcpd.$$/
dhcpd_tests.sh- else
dhcpd_tests.sh- LTPTMP=$TMP/tst_dhcpd.$$/
dhcpd_tests.sh- fi
dhcpd_tests.sh-
dhcpd_tests.sh- # Initialize cleanup function.
--
nfsstat01-
nfsstat01-PID=$$
nfsstat01-
nfsstat01-TC=nfsstat01
nfsstat01-TCbin=${TCbin:=`pwd`}
nfsstat01:EXPORTDIR=${EXPORTDIR:=/tmp/$TC$PID}
nfsstat01-HOST=`hostname`
nfsstat01-CLEANUP=${CLEANUP:=ON}
nfsstat01-VERSION=${VERSION:=2}
nfsstat01:TESTDIR=${TESTDIR:=/tmp/$TC$PID.testdir}
nfsstat01-NFS_TYPE=${NFS_TYPE:nfs}
nfsstat01-
nfsstat01-if [ x$NFS_TYPE != xnfs4 ]; then
nfsstat01-OPTS=${OPTS:=-o vers=$VERSION }
nfsstat01-fi
test_connectx matches
--
nfs02-PID=$$
nfs02-
nfs02-RHOST=${RHOST:=`hostname`}
nfs02-VERSION=${VERSION:=2}
nfs02-SOCKET_TYPE=${SOCKET_TYPE:=udp}
nfs02:TESTDIR=${TESTDIR:=/tmp/$TC$PID.testdir}
nfs02-CLEANUP=${CLEANUP:=ON}
nfs02-NFS_TYPE=${NFS_TYPE:=nfs}
nfs02-
nfs02-#-#
nfs02-# FUNCTION: do_setup
ns-tcpclient matches
test_1_to_1_recvfrom matches
rpc_server matches
ltpClient matches
--
mc_cmds-#Uncomment line below for debug output.
mc_cmds-#trace_logic=${trace_logic:-set -x}
mc_cmds-$trace_logic
mc_cmds-

Processed: #496411: nothing was fixed at all

2008-11-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 found 496411 20060918-3
Bug#496411: The possibility of attack with the help of symlinks in some Debian 
packages
Bug marked as found in version 20060918-3.

 found 496411 20081031+dfsg-1
Bug#496411: The possibility of attack with the help of symlinks in some Debian 
packages
Bug marked as found in version 20081031+dfsg-1 and reopened.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#502761: I suggest removing the call to emacspeakconfig and add a mention in README.Debian

2008-11-19 Thread James R. Van Zandt


I have uploaded a new package with debconf support:
emacspeak_28.0-4_all.deb.  I think it is working correctly.  However
this is the first time I've used debconf, and I may have set some kind
of record for complexity.  I'd appreciate someone checking it.

Assuming it checks out okay, I'd like to see that package in Lenny.  

Yes, I realize that my first package of version 28.0 missed the
deadline for Lenny by a few days.  The functional difference from
version 26.0 is not great.  (Dr. Raman just increments the version
number every six months.)  However, that does make it a year newer
than the version currently in testing.

   - Jim Van Zandt



   Date: Sat, 25 Oct 2008 13:35:44 +0200
   From: Christian Perrier [EMAIL PROTECTED]
   MIME-Version: 1.0
   Content-Type: multipart/signed; micalg=pgp-sha1;
   protocol=application/pgp-signature; boundary=jsrFa/5v3cIbBmG8
   Content-Disposition: inline
   Resent-Sender: Debian BTS [EMAIL PROTECTED]


   --jsrFa/5v3cIbBmG8
   Content-Type: multipart/mixed; boundary=IihjUyvzd0n5Ehsu
   Content-Disposition: inline


   --IihjUyvzd0n5Ehsu
   Content-Type: text/plain; charset=iso-8859-15
   Content-Disposition: inline
   Content-Transfer-Encoding: quoted-printable

   tags 502761 patch
   thanks

   Introducing debconf support in a package that doesn't use it already
   is IO too invasive and risking breakage.

   So, I recommend simply commenting the call to emacspeakconfig in
   postinst as of now so that this package can be released for lenny.

   A patch is attached.

   I plan to build an NMU unless the maintainer is OK to upload
   himself...or find another solution (but, again, hasty debconf
   introduction would seem too risky for me)=A0?

   --=20



   --IihjUyvzd0n5Ehsu
   Content-Type: text/x-diff; charset=us-ascii
   Content-Disposition: attachment; filename=emacspeak.patch
   Content-Transfer-Encoding: quoted-printable

   diff -Nru emacspeak-26.0.old/debian/postinst emacspeak-26.0/debian/postinst
   --- emacspeak-26.0.old/debian/postinst   2008-10-25 13:29:00.194881985 
+0200
   +++ emacspeak-26.0/debian/postinst   2008-10-25 13:30:00.242729827 +0200
   @@ -46,7 +46,9 @@
fi
fi
   =20
   -emacspeakconfig -i
   +# Commented as this implies prompting without using
   +# debconf. See #502761
   +# emacspeakconfig -i
   =20
# dh_installdeb will replace this with shell code automatically
# generated by other debhelper scripts.
   diff -Nru emacspeak-26.0.old/debian/README.Debian emacspeak-26.0/debian/REA=
   DME.Debian
   --- emacspeak-26.0.old/debian/README.Debian  2008-10-25 13:29:00.194881985 +=
   0200
   +++ emacspeak-26.0/debian/README.Debian  2008-10-25 13:31:18.994729859 
+0200
   @@ -13,6 +13,9 @@
gets configuration parameters from /etc/emacspeak.conf and starts
emacs with emacspeak support.
   =20
   +Before it is used, Emacspeak must be configured by root, by running
   +'emacspeakconfig -i'.
   +
Several flavors of emacs may be installed at the same time (emacs20,
emacs21, xemacs21, etc.).  In accordance with the Debian emacs policy,
emacspeak is byte-compiled separately for each supported flavor -
   @@ -85,3 +88,5 @@
   =20
James R. Van Zandt [EMAIL PROTECTED], Mon Jan 30 21:36:59 EST 2006
   =20
   +
   + -- Christian Perrier [EMAIL PROTECTED], Sat, 25 Oct 2008 13:31:18 z

   --IihjUyvzd0n5Ehsu--

   --jsrFa/5v3cIbBmG8
   Content-Type: application/pgp-signature; name=signature.asc
   Content-Description: Digital signature
   Content-Disposition: inline

   -BEGIN PGP SIGNATURE-
   Version: GnuPG v1.4.9 (GNU/Linux)

   iEYEARECAAYFAkkDBIoACgkQ1OXtrMAUPS2VGQCeKX3EntQefSRg0eyyFt4IAsJr
   2vcAoJlJ5pHWvO3ZtBdDbM0EcddZd69z
   =9p33
   -END PGP SIGNATURE-

   --jsrFa/5v3cIbBmG8--






-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#506264: gnunet-server: freeze in gnunet-update

2008-11-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 506264 serious
Bug#506264: gnunet-server: freeze in gnunet-update
Severity set to `serious' from `important'

 tags 506264 +pending
Bug#506264: gnunet-server: freeze in gnunet-update
There were no tags set.
Tags added: pending

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#506280: linux-image-2.6.26-1-versatile won't boot on AB926EJ-S

2008-11-19 Thread David Querbach
Package: linux-image-2.6.26-1-versatile
Version: 2.6.26-8
Severity: critical

This kernel won't boot on the ARM Versatile/AB926EJ-S evaluation board.

Initially, we built an nfs-root system using a kernel and cramfs filesystem
from ARM.  (You can get this filesystem, kernel and the kernel config file
from http://www.arm.com/products/os/linux_download.html under the RealView
Versatile PB926/AB926 line in the table of images on that page.) 

We then did a complete Debian/lenny install using the method described in
Installing Debian GNU/Linux from a Unix/Linux System, at
http://www.debian.org/releases/stable/arm/apds03.html.en.  After a reboot,
the ARM kernel successfully runs using the Debian/lenny nfs-root filesystem.

We used then used aptitude running under this ARM-kernel/Debian-filesystem
to install the linux-image-2.6.26-1-versatile package.

The AB926EJ-S board uses U-Boot to load the kernel.  To set this up, we
first use mkimage from the package uboot-mkimage (running on an x86 desktop
machine) to create U-Boot images from the vmlinuz and initrd.img installed
into the nfs-root by the ARM system:

# mkimage -A arm -O linux -T kernel -C none -a 0x8000 -e 0x8000 \
  -n vmlinuz-2.6.26-1-versatile -d /tftpboot/debian/vmlinuz \
  /tftpboot/uImage

# mkimage -A arm -O linux -T ramdisk -C gzip -a 0x80 -e 0x80 \
  -n initrd.img-2.6.26-1-versatile -d /tftpboot/debian/initrd.img \
  /tftpboot/uInitrd

(Addresses in the above are from linux/arch/arm/mach-versatile/Makefile.boot.)

U-Boot is configured as follows:

VersatileAB # printenv
bootdelay=2
baudrate=38400
bootfile=/tftpboot/uImage
ipaddr=192.168.1.7
serverip=192.168.1.40
bootargs=root=/dev/ram rw mem=128M console=ttyAMA0
bootcmd=tftp 0x7fc0 uImage ; tftp 0x7fffc0 uInitrd ; bootm 0x7fc0 0x7fffc0
stdin=serial
stdout=serial
stderr=serial
verify=n

Environment size: 272/8188 bytes
VersatileAB #

(The tftp target addresses are chosen to place the payload of the U-Boot
images at their run addresses.  Loading to different addresses gives the
same results as described below.)

When booting from a hard reset, we see the following (CR's stripped for
clarity):

Reading MCI 0
No card found - Please insert memory card.


ARM AB926EJ-S Boot Monitor
Version:V3.4.2
Build Date: Nov  7 2006
Endian: Little
%BootMonitor-Info, Creating new SYSTEM.DAT
%BootMonitor-Error, Unable to open SYSTEM.DAT

%Flash-Info, Creating new FLASH.DAT
%Flash-Error, Unable to open FLASH.DAT

 flash run u-boot


U-Boot 1.1.5-g58f62f5e-dirty (Nov  2 2006 - 03:06:12)

DRAM:   0 kB
Flash: 64 MB
In:serial
Out:   serial
Err:   serial
Hit any key to stop autoboot:  2  1  0 
Using MAC Address 00:02:F7:00:18:54
TFTP from server 192.168.1.40; our IP address is 192.168.1.7
Filename 'uImage'.
Load address: 0x7fc0
Loading: *#
 #
 #
 #
done
Bytes transferred = 1308460 (13f72c hex)
Using MAC Address 00:02:F7:00:18:54
TFTP from server 192.168.1.40; our IP address is 192.168.1.7
Filename 'uInitrd'.
Load address: 0x7fffc0
Loading: *#
 #
 #
 #
 #
 #
 #
 #
 #
 #
 #
 #
 
done
Bytes transferred = 4299935 (419c9f hex)
## Booting image at 7fc0 ...
   Image Name:   vmlinuz-2.6.26-1-versatile
   Image Type:   ARM Linux Kernel Image (uncompressed)
   Data Size:1308396 Bytes =  1.2 MB
   Load Address: 8000
   Entry Point:  8000
OK
## Loading Ramdisk Image at 007fffc0 ...
   Image Name:   initrd.img-2.6.26-1-versatile
   Image Type:   ARM Linux RAMDisk Image (gzip compressed)
   Data Size:

Bug#506280: linux-image-2.6.26-1-versatile won't boot on AB926EJ-S

2008-11-19 Thread Martin Michlmayr
* David Querbach [EMAIL PROTECTED] [2008-11-19 22:40]:
 One interesting thing of note:  CONFIG_VERSATILE is _not_ set in the config
 file for this kernel, which seems contrary to expectations.

The option is called CONFIG_ARCH_VERSATILE as well as
CONFIG_ARCH_VERSATILE_PB and CONFIG_MACH_VERSATILE_AB, and these are
set.
-- 
Martin Michlmayr
http://www.cyrius.com/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#506280: linux-image-2.6.26-1-versatile won't boot on AB926EJ-S

2008-11-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 506280 important
Bug#506280: linux-image-2.6.26-1-versatile won't boot on AB926EJ-S
Severity set to `important' from `critical'

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#506280: linux-image-2.6.26-1-versatile won't boot on AB926EJ-S

2008-11-19 Thread Martin Michlmayr
* David Querbach [EMAIL PROTECTED] [2008-11-19 22:40]:
 Package: linux-image-2.6.26-1-versatile
 Version: 2.6.26-8
 
 This kernel won't boot on the ARM Versatile/AB926EJ-S evaluation board.

Aurelien, can you comment/take a look.

 Initially, we built an nfs-root system using a kernel and cramfs filesystem
 from ARM.  (You can get this filesystem, kernel and the kernel config file
 from http://www.arm.com/products/os/linux_download.html under the RealView
 Versatile PB926/AB926 line in the table of images on that page.) 
 
 We then did a complete Debian/lenny install using the method described in
 Installing Debian GNU/Linux from a Unix/Linux System, at
 http://www.debian.org/releases/stable/arm/apds03.html.en.  After a reboot,
 the ARM kernel successfully runs using the Debian/lenny nfs-root filesystem.
 
 We used then used aptitude running under this ARM-kernel/Debian-filesystem
 to install the linux-image-2.6.26-1-versatile package.
 
 The AB926EJ-S board uses U-Boot to load the kernel.  To set this up, we
 first use mkimage from the package uboot-mkimage (running on an x86 desktop
 machine) to create U-Boot images from the vmlinuz and initrd.img installed
 into the nfs-root by the ARM system:
 
 # mkimage -A arm -O linux -T kernel -C none -a 0x8000 -e 0x8000 \
   -n vmlinuz-2.6.26-1-versatile -d /tftpboot/debian/vmlinuz \
   /tftpboot/uImage
 
 # mkimage -A arm -O linux -T ramdisk -C gzip -a 0x80 -e 0x80 \
   -n initrd.img-2.6.26-1-versatile -d /tftpboot/debian/initrd.img \
   /tftpboot/uInitrd
 
 (Addresses in the above are from linux/arch/arm/mach-versatile/Makefile.boot.)
 
 U-Boot is configured as follows:
 
 VersatileAB # printenv
 bootdelay=2
 baudrate=38400
 bootfile=/tftpboot/uImage
 ipaddr=192.168.1.7
 serverip=192.168.1.40
 bootargs=root=/dev/ram rw mem=128M console=ttyAMA0
 bootcmd=tftp 0x7fc0 uImage ; tftp 0x7fffc0 uInitrd ; bootm 0x7fc0 0x7fffc0
 stdin=serial
 stdout=serial
 stderr=serial
 verify=n
 
 Environment size: 272/8188 bytes
 VersatileAB #
 
 (The tftp target addresses are chosen to place the payload of the U-Boot
 images at their run addresses.  Loading to different addresses gives the
 same results as described below.)
 
 When booting from a hard reset, we see the following (CR's stripped for
 clarity):
 
 Reading MCI 0
 No card found - Please insert memory card.
 
 
 ARM AB926EJ-S Boot Monitor
 Version:V3.4.2
 Build Date: Nov  7 2006
 Endian: Little
 %BootMonitor-Info, Creating new SYSTEM.DAT
 %BootMonitor-Error, Unable to open SYSTEM.DAT
 
 %Flash-Info, Creating new FLASH.DAT
 %Flash-Error, Unable to open FLASH.DAT
 
  flash run u-boot
 
 
 U-Boot 1.1.5-g58f62f5e-dirty (Nov  2 2006 - 03:06:12)
 
 DRAM:   0 kB
 Flash: 64 MB
 In:serial
 Out:   serial
 Err:   serial
 Hit any key to stop autoboot:  2  1  0 
 Using MAC Address 00:02:F7:00:18:54
 TFTP from server 192.168.1.40; our IP address is 192.168.1.7
 Filename 'uImage'.
 Load address: 0x7fc0
 Loading: 
 *#
  #
  #
  #
 done
 Bytes transferred = 1308460 (13f72c hex)
 Using MAC Address 00:02:F7:00:18:54
 TFTP from server 192.168.1.40; our IP address is 192.168.1.7
 Filename 'uInitrd'.
 Load address: 0x7fffc0
 Loading: 
 *#
  #
  #
  #
  #
  #
  #
  #
  #
  #
  #
  #
  
 done
 Bytes transferred = 4299935 (419c9f hex)
 ## Booting image at 7fc0 ...
Image Name:   vmlinuz-2.6.26-1-versatile
Image Type:   ARM Linux Kernel Image (uncompressed)
Data Size:1308396 Bytes =  1.2 MB
Load Address: 8000
Entry Point:  

Bug#505056: marked as done (flex scanner push-back overflow)

2008-11-19 Thread Debian Bug Tracking System

Your message dated Thu, 20 Nov 2008 07:02:03 +
with message-id [EMAIL PROTECTED]
and subject line Bug#505056: fixed in flex 2.5.35-4
has caused the Debian Bug report #505056,
regarding flex scanner push-back overflow
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
505056: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505056
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: flex
Version: 2.5.35-3
Severity: grave

Hi!

The current flex in sid seems to introduce bugs. During erlang build it
reports the following error message:

% flex -Ca -Pmegaco_flex_scanner_drv -omegaco_flex_scanner_drv.c
megaco_flex_scanner_drv.flex
flex scanner push-back overflow

The version currently in lenny (2.5.35-2) works fine.

I'm not sure this bug is the same as #504030, so I'm openeing a new one.

The flex input is attached.

Cheers!
-- 
Sergei Golovan


---End Message---
---BeginMessage---
Source: flex
Source-Version: 2.5.35-4

We believe that the bug you reported is fixed in the latest version of
flex, which is due to be installed in the Debian FTP archive:

flex-doc_2.5.35-4_all.deb
  to pool/main/f/flex/flex-doc_2.5.35-4_all.deb
flex_2.5.35-4.diff.gz
  to pool/main/f/flex/flex_2.5.35-4.diff.gz
flex_2.5.35-4.dsc
  to pool/main/f/flex/flex_2.5.35-4.dsc
flex_2.5.35-4_amd64.deb
  to pool/main/f/flex/flex_2.5.35-4_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Manoj Srivastava [EMAIL PROTECTED] (supplier of updated flex package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Wed, 19 Nov 2008 23:52:09 -0600
Source: flex
Binary: flex flex-doc
Architecture: source amd64 all
Version: 2.5.35-4
Distribution: unstable
Urgency: low
Maintainer: Manoj Srivastava [EMAIL PROTECTED]
Changed-By: Manoj Srivastava [EMAIL PROTECTED]
Description: 
 flex   - A fast lexical analyzer generator.
 flex-doc   - Documentation for flex (a fast lexical analyzer generator).
Closes: 388438 503732 504030 505056 505233
Changes: 
 flex (2.5.35-4) unstable; urgency=low
 .
   * [f6cc9ae] Narrow buffer size changes to just IA64
 Increasing the buffer size on other architectures cause problems in
 corner cases not caught by the test suite. So perhaps it is not better
 to increase the buffer size unilatereally for all architectures, but
 to just increase it for the architecture it is required on, namely,
 IA64, and leave it unchanged on other architectures. This solution
 should fix the new grave bugs, while not reopening the original but
 that cause this change to be done in the first place.
 Grave Bug fix: flex scanner push-back overflow, thanks to Sergei
 Golovan   (Closes: #505056, #504030)
   * [debiandir:9a6d713] Fix VCS-Browser source field.
 Bug fix: Useless VCS-Browser control field, thanks to Vincent Fourmond
   (Closes: #503732)
   * [d58780f] Wrap ECHO macro to avoid FORTIFY warnings
 This change will enable flex scanners to be compiled with
 -D_FORTIFY_SOURCE=2, which is a good thing security wise.
 Bug Fix: flex causing warnings when compiled with FORTIFY_SOURCE,
 thanks to Kees Cook.   (Closes: #505233, #388438)
Checksums-Sha1: 
 c111c2a68e499df53feb42a34d46c0531954291f 1137 flex_2.5.35-4.dsc
 91b8109b8b8a6b2ba596c3c0002c43460419a451 39966 flex_2.5.35-4.diff.gz
 10f0c6ab2fca9fff89b16f177ce9e9f429c83eee 326464 flex_2.5.35-4_amd64.deb
 c99c2ef8159574943291a569682ad03e6bbf4cdd 204414 flex-doc_2.5.35-4_all.deb
Checksums-Sha256: 
 f13a0b95df0ab93f9b8d617a634e2f7c9d9cad6580db7167306bc69794515954 1137 
flex_2.5.35-4.dsc
 41ec1caf3eebc4c86ebcd876396038069190764626907430e96e633c51537a75 39966 
flex_2.5.35-4.diff.gz
 c3c334baf5e6ba26d3f1bf9c6209abb31e1b5c16b71be3f0f705a038f2bc8d40 326464 
flex_2.5.35-4_amd64.deb
 41b12eabf29a94ee99a7d8efceef98ed2cdfc38145a58416b8d279e8c41ad1d8 204414 
flex-doc_2.5.35-4_all.deb
Files: 
 8e2259b78e119ae95465574f631a3223 1137 devel standard flex_2.5.35-4.dsc
 db073b137ff1dbd2669ab746aa215e14 39966 devel standard flex_2.5.35-4.diff.gz
 

Bug#502761: I suggest removing the call to emacspeakconfig and add a mention in README.Debian

2008-11-19 Thread Christian Perrier
Quoting James R. Van Zandt ([EMAIL PROTECTED]):
 
 
 I have uploaded a new package with debconf support:
 emacspeak_28.0-4_all.deb.  I think it is working correctly.  However
 this is the first time I've used debconf, and I may have set some kind
 of record for complexity.  I'd appreciate someone checking it.

Issues:
- introducing debconf templates without a prior review by
  debian-l10n-english is discouraged
- doing this without any prior call for translations is discouraged as
  well.

So, now, I think tha package, if you uploaded it to unstable, should
enter the Smith review process (see the wiki.debian.org page about
Smith reviews, that basically cover the above points).

I would vote against the package entering lenny if that process hasn't
been completed (which will require another upload once the review is
done and translations are included).

I can take care of the review but I really don't like doing this in a
hurry




signature.asc
Description: Digital signature