Processed: r1452 - pear/php-net-smtp/trunk/debian

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 602865 pending
Bug #602865 [php-pear] upgrading from Lenny breaks php-pear setup
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
602865: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602865
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#602865: marked as done (upgrading from Lenny breaks php-pear setup)

2010-11-14 Thread Debian Bug Tracking System
Your message dated Sun, 14 Nov 2010 08:32:06 +
with message-id e1phy0m-0007t8...@franck.debian.org
and subject line Bug#602865: fixed in php-net-smtp 1.4.2-2
has caused the Debian Bug report #602865,
regarding upgrading from Lenny breaks php-pear setup
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
602865: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602865
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: php-pear
Version: 5.2.6.dfsg.1-1+lenny9
Severity: important


Package php-pear makes /usr/share/php/doc a symlink
Package php-net-smtp makes /usr/share/php/doc a directory

This makes installation of both packages fail.

By the way, I had both packages installed without problems.
The problem became when upgrading apt-net-smtp from version
1.3.1-1 (lenny) to 1.4.2-1 (squeeze) with php-pear version
5.2.6.dfsg.1-1+lenny9 installed.

I ignore if the debian policy for php packages tells how
to handle the /usr/share/php/doc directory, but probably it should.

Thanks for your great work at Debian.

Best regards,
Gonzalo.

-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-bpo.5-686-bigmem (SMP w/2 CPU cores)
Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages php-pear depends on:
ii  php5-cli   5.2.6.dfsg.1-1+lenny9 command-line interpreter for the p
ii  php5-common5.2.6.dfsg.1-1+lenny9 Common files for packages built fr

Versions of packages php-pear recommends:
ii  gnupg 1.4.9-3+lenny1 GNU privacy guard - a free PGP rep

Versions of packages php-pear suggests:
pn  php5-dev | php4-dev   none (no description available)

-- no debconf information


---End Message---
---BeginMessage---
Source: php-net-smtp
Source-Version: 1.4.2-2

We believe that the bug you reported is fixed in the latest version of
php-net-smtp, which is due to be installed in the Debian FTP archive:

php-net-smtp_1.4.2-2.debian.tar.gz
  to main/p/php-net-smtp/php-net-smtp_1.4.2-2.debian.tar.gz
php-net-smtp_1.4.2-2.dsc
  to main/p/php-net-smtp/php-net-smtp_1.4.2-2.dsc
php-net-smtp_1.4.2-2_all.deb
  to main/p/php-net-smtp/php-net-smtp_1.4.2-2_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 602...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thomas Goirand z...@debian.org (supplier of updated php-net-smtp package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160

Format: 1.8
Date: Sun, 14 Nov 2010 16:16:34 +0800
Source: php-net-smtp
Binary: php-net-smtp
Architecture: source all
Version: 1.4.2-2
Distribution: unstable
Urgency: low
Maintainer: Debian PHP Maintainers pkg-php-ma...@lists.alioth.debian.org
Changed-By: Thomas Goirand z...@debian.org
Description: 
 php-net-smtp - PHP PEAR module implementing SMTP protocol
Closes: 602865
Changes: 
 php-net-smtp (1.4.2-2) unstable; urgency=low
 .
   * Added a Conflicts: php-pear ( 5.3), and now depends on php-pear (= 5.3)
 because otherwise upgrading path from Lenny is borken (Closes: #602865).
   * Added myself as an uploader.
Checksums-Sha1: 
 0117ec0032cd429f9277b8c5b81718de167d8ab9 1355 php-net-smtp_1.4.2-2.dsc
 14da74813357c3143565beb5e911d5c443dffe97 4614 
php-net-smtp_1.4.2-2.debian.tar.gz
 f9b78d839a2fd7a904dab8405f153b53b0d8b439 21530 php-net-smtp_1.4.2-2_all.deb
Checksums-Sha256: 
 12875f4b5cd8ab9c2f5d6f9d8678873d5e388008fe827c4ed5b912fb645c1914 1355 
php-net-smtp_1.4.2-2.dsc
 21ac78a039d115de6af081a13d8876ea43c063fd8366be41808ab6ea6c3594d9 4614 
php-net-smtp_1.4.2-2.debian.tar.gz
 37a1877669af80d096485b6f4e88f3d22e88eacfb00da72349dd146163cd917e 21530 
php-net-smtp_1.4.2-2_all.deb
Files: 
 763572870b8848fe9c2d442a7dde8c7f 1355 php optional php-net-smtp_1.4.2-2.dsc
 c83064e6ea8ee4e1dc4320c59f9a1eea 4614 php optional 
php-net-smtp_1.4.2-2.debian.tar.gz
 8ffbb92efdb854efb54471ef83e006d6 21530 php optional 
php-net-smtp_1.4.2-2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEAREDAAYFAkzfnHwACgkQl4M9yZjvmklA2gCgsGS8G1jOG8dwcwA2SunYPt3R
RmkAoMbGeVzXpqfGl6akmRH/HSV0tOTX
=uXQb
-END PGP SIGNATURE-



Bug#594119: Upgrade path from Lenny to Squeeze is broken

2010-11-14 Thread Stefan Hornburg (Racke)

On 11/13/2010 09:59 PM, Julien Cristau wrote:

On Tue, Nov  2, 2010 at 12:27:59 +0100, Stefan Hornburg (Racke) wrote:


On 11/02/2010 12:25 PM, Julien Cristau wrote:

On Sun, Oct 10, 2010 at 03:15:22 +0200, Jonas Smedegaard wrote:


On Sat, Oct 09, 2010 at 05:36:08PM +0200, Julien Cristau wrote:

On Tue, Aug 31, 2010 at 15:00:32 +0200, Stefan Hornburg (Racke) wrote:


Fix applied to Git:

http://git.debian.org/?p=collab-maint/sympa.git;a=commitdiff;h=edd77f243ec95fddd4eac534b0f1f76dcf5895ba;hp=c175d2ae1a605e4e651df76408d1a8035f8a2aa1


Any chance we can get this bug fix uploaded?


I'll do it tomorrow!


Err.  That was uploaded as part of a new upstream release, which as far
as I can tell doesn't really match the criteria from
http://lists.debian.org/debian-devel-announce/2010/10/msg2.html

What's the plan for getting this fixed in squeeze?



Through an upload via testing-proposed-updates.


When is that supposed to happen?


I committed the necessary patches to debian-squeeze branch in our Git 
repository. I'll write
to the release mailinglist tomorrow.

Regards
Racke


--
LinuXia Systems = http://www.linuxia.de/
Expert Interchange Consulting and System Administration
ICDEVGROUP = http://www.icdevgroup.org/
Interchange Development Team




--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#577321: RM bug filed

2010-11-14 Thread Neil Williams
I've picked through this bug and replicated the various issues. I agree
with Tim, gpib should be removed from Squeeze. I've filed an RM bug at
release.debian.org: 603399

-- 


Neil Williams
=
http://www.linux.codehelp.co.uk/



pgpI0Ed9Qu7Wx.pgp
Description: PGP signature


Bug#603450: offlineimap: fails check the remote servers ssl certificate is valid

2010-11-14 Thread david b
Package: offlineimap
Severity: grave
Tags: security
Justification: user security hole

offlineimap performs absolutely no ssl certificate checking. So users could/can 
be the victim of a man in the middle attack.
In debian the following bugs exist:

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=536421 (re certificate 
expiration)
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=153240 (re ssl fingerprint 
checking)

This could be considered a bug in imaplib (http://bugs.python.org/issue10274).
A partial 'fix' is the following(this 'fix' isn't complete and would break 
connections to servers using self-signed certificates):


WARNING XXX: I haven't tested this 'fix' at all and so it is most likely wrong.

diff --git a/offlineimap/imaplibutil.py b/offlineimap/imaplibutil.py
index a60242b..c37688c 100644
--- a/offlineimap/imaplibutil.py
+++ b/offlineimap/imaplibutil.py
@@ -62,7 +62,7 @@ class IMAP4_Tunnel(IMAP4):
 self.infd.close()
 self.outfd.close()
 self.process.wait()
-
+
 class sslwrapper:
 def __init__(self, sslsock):
 self.sslsock = sslsock
@@ -171,7 +171,7 @@ def new_open_ssl(self, host = '', port = IMAP4_SSL_PORT):
 if last_error != 0:
 # FIXME
 raise socket.error(last_error)
-self.sslobj = ssl_wrap(self.sock, self.keyfile, self.certfile)
+self.sslobj = ssl_wrap(self.sock, self.keyfile, self.certfile, 
cert_reqs=ssl.CERT_REQUIRED, ca_certs=/etc/ssl/certs/ca-certificates.crt)
 self.sslobj = sslwrapper(self.sslobj)



Although, this isn't complete because it will break self-signed certificate 
using servers and http://bugs.python.org/issue1589 means that it won't provide 
full protection etc.
Really, what is required is that by default the certificate is checked and 
perhaps an option is added to bypass the check.

This isn't a new discovery, see [1], but the package provides no warning about 
this fact. I added a warning too https://github.com/jgoerzen/offlineimap/wiki/ 
perhaps debian can add a warning (in the package description) until this is 
fixed.

[0] - http://thread.gmane.org/gmane.mail.imap.offlineimap.general/760

-- System Information:
Debian Release: 5.0.6
  APT prefers stable
  APT policy: (900, 'stable'), (650, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.36 (SMP w/4 CPU cores)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#597375: No response, RM bug filed

2010-11-14 Thread Neil Williams
In the absence of any progress, despite pings, I've filed the RM bug
to have bsc removed from Squeeze. If there is a fix, it can go into
unstable or if no news in another month, bsc can be removed from
unstable too.

-- 


Neil Williams
=
http://www.linux.codehelp.co.uk/



pgpRQeTllDDPc.pgp
Description: PGP signature


Bug#591194: tdiary: does not build .swf files from source

2010-11-14 Thread d+deb
Hi,

On Sat, Nov 13, 2010 at 10:02:16PM +, Simon McVittie wrote:
  The package cannot be released with squeeze as it is now, so I'll try to 
  list some options:
  
1. Remove package from Squeeze (leaving it in unstable) and think about 
  it for the next release
2. Move the package to non-free
3. Find the sources and build flash files from source.
4. Completely remove package from Debian.
 
 5. repack the tarball as tdiary_2.2.1+dfsg1.orig.tar.gz (or similar), removing
 the two sourceless flash files; fix tdiary-contrib so it still builds, with
 the two plugins that need those flash files removed.

Here is option 5 approach.

- Removing tdiary-2.2.1/contrib2/plugin/tdiarygraph/ and
  tdiary-2.2.1/contrib2/plugin/tdiarytimes/ directories.
  The two plugins need flash files. Without flash files,
  they are quite useless. So, we need to remove the two
  plugins completely. Upstream agrees with this approach.

- Removing tdiarygraph and tdiarytimes from debian/tdiary.copyright.

% pwd
/usr/src/tdiary/tdiary-2.2.1+dfsg1
% find -name '*swf'
%
% find -name '*tdiarygraph*'
% find -name '*tdiarytimes*'
%
% grep -ir tdiarygraph *
% grep -ir tdiarytimes *
%

That's all.  Patch attached.
-- 
Regards,
dai

GPG Fingerprint = 0B29 D88E 42E6 B765 B8D8 EA50 7839 619D D439 668E
diff -urNp tdiary-2.2.1/debian/tdiary-contrib.copyright tdiary-2.2.1+dfsg1/debian/tdiary-contrib.copyright
--- tdiary-2.2.1/debian/tdiary-contrib.copyright	2010-11-14 17:32:37.0 +0900
+++ tdiary-2.2.1+dfsg1/debian/tdiary-contrib.copyright	2010-11-14 17:33:07.0 +0900
@@ -87,14 +87,6 @@ plugin/select_theme
   Copyright (C) 2005  akira yamada
   License: GPL2
 
-plugin/tdiarygraph
-  Copyright (c) 2004 phonondrive tdi...@phonondrive.com
-  License: GPL
-
-plugin/tdiarytimes
-  Copyright (c) 2003 neuichi neui...@nmnl.jp
-  License: GPL
-
 plugin/twitter[
   Copyright (C) 2007 Michitaka Ohno el...@mars.dti.ne.jp
   License: GPL2


signature.asc
Description: Digital signature


Bug#603450: Acknowledgement (offlineimap: fails check the remote servers ssl certificate is valid)

2010-11-14 Thread dave b
I wish debian let me edit bugs like ubuntu does!

(offlineimap: fails check the remote
 servers ssl certificate is valid)

should be
(offlineimap: fails *to* check the remote
 server's ssl certificate is valid)


s/servers/server's/



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#599282: phamm 0.5.18-3

2010-11-14 Thread Alessandro De Zorzi
sorry for delay,
just sent to my sponsor the new version patched for upload

dsc available here:

http://open.rhx.it/debian/source/phamm_0.5.18-3.dsc

Alessandro (lota)


Bug#591194: tdiary: does not build .swf files from source

2010-11-14 Thread Hideki Yamane
Hi,

 I'm not going to do option 5 myself because I have no idea how to test tdiary,
 but that seems like the only way we're likely to keep it in Squeeze.
 Since tdiary is a leaf package with a lowish popcon score, I'm inclined to
 ask the release team to drop tdiary from squeeze (i.e. option 1) if there 
 isn't any progress on this.

 I'm one of the users of tdiary :)
 # and had worked for DSA for this package
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=572417


 Those swf files are not main component for tdiary, but just an addon,
 so option 5 approach is kind for us (me, upstream authors and other users).

 And surely I can test it (roughly, though).
 Dai, could you upload updated one to mentors or attache debdiff for it?


-- 
Regards,

 Hideki Yamane henrich @ debian.or.jp/org
 http://wiki.debian.org/HidekiYamane



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: tagging 599282

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 599282 + pending
Bug #599282 [phamm] phamm: [patch] fix for failure to install in chroot
Bug #603080 [phamm] phamm: fails to install
Added tag(s) pending.
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
599282: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599282
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#591194: tdiary: does not build .swf files from source

2010-11-14 Thread d+deb
Hi,

On Sun, Nov 14, 2010 at 07:24:43PM +0900, Hideki Yamane wrote:
  I'm not going to do option 5 myself because I have no idea how to test 
  tdiary,
  but that seems like the only way we're likely to keep it in Squeeze.
  Since tdiary is a leaf package with a lowish popcon score, I'm inclined to
  ask the release team to drop tdiary from squeeze (i.e. option 1) if there 
  isn't any progress on this.

  Those swf files are not main component for tdiary, but just an addon,
  so option 5 approach is kind for us (me, upstream authors and other users).
 
  And surely I can test it (roughly, though).
  Dai, could you upload updated one to mentors or attache debdiff for it?

uploaded to mentors.

- URL: http://mentors.debian.net/debian/pool/main/t/tdiary
- Source repository: deb-src http://mentors.debian.net/debian unstable main 
contrib non-free
- dget 
http://mentors.debian.net/debian/pool/main/t/tdiary/tdiary_2.2.1+dfsg1-0.1.dsc

I repackaged source tarball and modified debian/tdiary.copyright and
debian/changelog.  Would you please check and modify to suitable
for official?
-- 
Regards,
dai

GPG Fingerprint = 0B29 D88E 42E6 B765 B8D8 EA50 7839 619D D439 668E


signature.asc
Description: Digital signature


Bug#602778: one project packages twice (u-boot and uboot-mkimage)

2010-11-14 Thread Julien Cristau
On Sat, Nov 13, 2010 at 01:13:59 +0100, Julien Cristau wrote:

 On Mon, Nov  8, 2010 at 01:30:00 +0100, Benjamin Drung wrote:
 
  Hi,
  
  I just want to let you know that the uboot-mkimage source package
  contains a stripped version the u-boot source package and both packages
  have the same functionality. I filed the series bug #602778 [1].
  
  [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602778
  
 uboot-mkimage hasn't been uploaded since before lenny, and Clint says we
 should get rid of it, so I'll get it out of squeeze.  Please reassign
 602778 and file a bug against ftp.debian.org for its removal from
 unstable.
 
It looks like debian-installer build-depends on uboot-mkimage.  Is
switching to u-boot an option?  If not, I guess the removal will have to
be deferred.

Cheers,
Julien


signature.asc
Description: Digital signature


Bug#594150: Bug#594153: Bug#594150: CURLOPT_TIMEOUT defaults to zero seconds

2010-11-14 Thread Daniel Stenberg

On Sat, 13 Nov 2010, Simon McVittie wrote:

# GNUTLS backend, zero timeout, fails ./debian/build-gnutls/src/curl -k 
https://apt-test.aviatis.com/apt-cacher/ftp.us.debian.org/debian/dists/squeeze/Release 
--cert ../test-client.apt-test.aviatis.com.crt --key 
../test-client.apt-test.aviatis.com.key curl: (28) SSL connection timeout


It turns out that the error in the GNUTLS, zero timeout test is the 
*second* occurrence of this error message in lib/gtls.c handshake() (the one 
marked as g2 in my git branch referenced above). Curl_timeleft() returns 
0, and Curl_socket_ready() also returns 0.


This turned out to be a minor bug in curl, yes, and I've fixed it upstream 
now. BUT, I'd like to stress that the timeout problem was just a false track 
and it simply made the error reporting a bit confused and now with my fix curl 
will instead say this:


$ ./src/curl -k 
https://apt-test.aviatis.com/apt-cacher/ftp.us.debian.org/debian/dists/squeeze/ 
-v

* About to connect() to apt-test.aviatis.com port 443 (#0)
*   Trying 204.145.147.227... connected
* Connected to apt-test.aviatis.com (204.145.147.227) port 443 (#0)
* found 141 certificates in /etc/ssl/certs/ca-certificates.crt
*server certificate verification SKIPPED
*common name: apt-test.aviatis.com (matched)
*server certificate expiration date OK
*server certificate activation date OK
*certificate public key: RSA
*certificate version: #1
*subject: C=US,ST=CA,O=apt-test.aviatis.com,CN=apt-test.aviatis.com
*start date: Mon, 23 Aug 2010 04:23:41 GMT
*expire date: Sun, 19 May 2013 04:23:41 GMT
*issuer: C=US,ST=CA,O=apt-test.aviatis.com,CN=apt-test.aviatis.com
*compression: NULL
*cipher: AES-128-CBC
*MAC: SHA1

GET /apt-cacher/ftp.us.debian.org/debian/dists/squeeze/ HTTP/1.1
User-Agent: curl/7.21.3-DEV (i686-pc-linux-gnu) libcurl/7.21.3-DEV 

GnuTLS/2.8.6 zlib/1.2.3.4 c-ares/1.7.4-DEV libidn/1.18 libssh2/1.2.6

Host: apt-test.aviatis.com
Accept: */*


* gnutls_handshake() failed: Decryption has failed.
* Closing connection #0
curl: (35) gnutls_handshake() failed: Decryption has failed.


... this should be compared with what curl says when instead built to use 
OpenSSL (the exact same code base, the current git version built with some 
extra debug):



$ ./src/curl -k 
https://apt-test.aviatis.com/apt-cacher/ftp.us.debian.org/debian/dists/squeeze/ 
-v

* About to connect() to apt-test.aviatis.com port 443 (#0)
*   Trying 204.145.147.227... connected
* Connected to apt-test.aviatis.com (204.145.147.227) port 443 (#0)
* successfully set certificate verify locations:
*   CAfile: /etc/ssl/certs/ca-certificates.crt
  CApath: none
* SSLv3, TLS handshake, Client hello (1):
* SSLv3, TLS handshake, Server hello (2):
* SSLv3, TLS handshake, CERT (11):
* SSLv3, TLS handshake, Server key exchange (12):
* SSLv3, TLS handshake, Server finished (14):
* SSLv3, TLS handshake, Client key exchange (16):
* SSLv3, TLS change cipher, Client hello (1):
* SSLv3, TLS handshake, Finished (20):
* SSLv3, TLS change cipher, Client hello (1):
* SSLv3, TLS handshake, Finished (20):
* SSL connection using DHE-RSA-AES256-SHA
* Server certificate:
*subject: C=US; ST=CA; O=apt-test.aviatis.com; CN=apt-test.aviatis.com
*start date: 2010-08-23 04:23:41 GMT
*expire date: 2013-05-19 04:23:41 GMT
*common name: apt-test.aviatis.com (matched)
*issuer: C=US; ST=CA; O=apt-test.aviatis.com; CN=apt-test.aviatis.com
* 	 SSL certificate verify result: self signed certificate (18), 
continuing anyway.

GET /apt-cacher/ftp.us.debian.org/debian/dists/squeeze/ HTTP/1.1
User-Agent: curl/7.21.3-DEV (i686-pc-linux-gnu) libcurl/7.21.3-DEV 
OpenSSL/0.9.8o zlib/1.2.3.4 c-ares/1.7.4-DEV libidn/1.18 libssh2/1.2.8_DEV 
librtmp/2.2e

Host: apt-test.aviatis.com
Accept: */*


* SSLv3, TLS handshake, Hello request (0):
* SSLv3, TLS handshake, Client hello (1):
* SSLv3, TLS handshake, Server hello (2):
* SSLv3, TLS handshake, CERT (11):
* SSLv3, TLS handshake, Server key exchange (12):
* SSLv3, TLS handshake, Request CERT (13):
* SSLv3, TLS handshake, Server finished (14):
* SSLv3, TLS handshake, CERT (11):
* SSLv3, TLS handshake, Client key exchange (16):
* SSLv3, TLS change cipher, Client hello (1):
* SSLv3, TLS handshake, Finished (20):
* SSLv3, TLS alert, Server hello (2):
* SSL read: error:14094410:SSL routines:SSL3_READ_BYTES:sslv3 alert handshake 
failure, errno 0

* Closing connection #0
curl: (56) SSL read: error:14094410:SSL routines:SSL3_READ_BYTES:sslv3 alert 
handshake failure, errno 0



... to me, it seems the remote server is a bit troublesome.


--

 / daniel.haxx.se



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#602778: one project packages twice (u-boot and uboot-mkimage)

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tag 602778 squeeze-ignore
Bug #602778 [uboot-mkimage] u-boot and uboot-mkimage conflict
Added tag(s) squeeze-ignore.
 kthxbye
Stopping processing here.

Please contact me if you need assistance.
-- 
602778: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602778
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#602778: one project packages twice (u-boot and uboot-mkimage)

2010-11-14 Thread Julien Cristau
tag 602778 squeeze-ignore
kthxbye

On Sun, Nov 14, 2010 at 12:45:57 +0100, Julien Cristau wrote:

 On Sat, Nov 13, 2010 at 01:13:59 +0100, Julien Cristau wrote:
 
  On Mon, Nov  8, 2010 at 01:30:00 +0100, Benjamin Drung wrote:
  
   Hi,
   
   I just want to let you know that the uboot-mkimage source package
   contains a stripped version the u-boot source package and both packages
   have the same functionality. I filed the series bug #602778 [1].
   
   [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602778
   
  uboot-mkimage hasn't been uploaded since before lenny, and Clint says we
  should get rid of it, so I'll get it out of squeeze.  Please reassign
  602778 and file a bug against ftp.debian.org for its removal from
  unstable.
  
 It looks like debian-installer build-depends on uboot-mkimage.  Is
 switching to u-boot an option?  If not, I guess the removal will have to
 be deferred.
 
tbm says this is post squeeze, so I'll ignore this for now.

13:11  tbm jcristau: sounsd like uboot-mkimage should become a dummy package
 depending on u-boot
13:16  jcristau tbm: we can't just change the build-dep and remove
  uboot-mkimage?
13:20  tbm jcristau: for d-i, sure.  but there are other things that use
 uboot-mkimage
13:20  jcristau there's no other reverse dep
13:20  tbm jcristau: but imho this is post-squeeze
13:20  jcristau ok
13:21  tbm flash-kernel uses uboot-mkimage, but it's not Depends

Cheers,
Julien


signature.asc
Description: Digital signature


Bug#584327: Bug #584327: is it an issue?

2010-11-14 Thread Nacho Barrientos Arias
On Sun, Nov 14, 2010 at 01:59:31AM +0100, Luca Falavigna wrote:
 I wonder whether this is still an issue, given that enigmail now builds
 on mipsel again, see related log:

It builds fine because mozilla-devscripts (a build-dep of enigmail) no
longer depends on this package.

Rdflib 3.0.0 is on its way (I promise, he) so, as it does not ship C
extensions, it will be impossible to reproduce this problem.

Willi, do you agree on closing this bug? 

Nacho


signature.asc
Description: Digital signature


Bug#584327: Bug #584327: is it an issue?

2010-11-14 Thread Willi Mann
Am 2010-11-14 01:59, schrieb Luca Falavigna:
 I wonder whether this is still an issue, given that enigmail now builds
 on mipsel again, see related log:
 
 https://buildd.debian.org/fetch.cgi?pkg=enigmailarch=mipselver=2%3A1.0.1-5stamp=1278109432file=logas=raw
 

I builds on mipsel because we switched to another rdf query
implementation in mozilla-devscripts. m-d did the SIGBUS-causing query
when building enigmail on mipsel. I already posted this on Jun 10, but
my message was probably to cryptic.

WM



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: policykit-1: FTBFS on kfreebsd-*: sys/signalfd.h: No such file or directory

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 602476 + experimental
Bug #602476 [src:policykit-1] policykit-1: FTBFS on kfreebsd-*: sys/signalfd.h: 
No such file or directory
Added tag(s) experimental.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
602476: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602476
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#584327: Bug #584327: is it an issue?

2010-11-14 Thread Willi Mann
Am 2010-11-14 13:30, schrieb Nacho Barrientos Arias:
 On Sun, Nov 14, 2010 at 01:59:31AM +0100, Luca Falavigna wrote:
 I wonder whether this is still an issue, given that enigmail now builds
 on mipsel again, see related log:
 
 It builds fine because mozilla-devscripts (a build-dep of enigmail) no
 longer depends on this package.
 
 Rdflib 3.0.0 is on its way (I promise, he) so, as it does not ship C
 extensions, it will be impossible to reproduce this problem.
 
 Willi, do you agree on closing this bug? 

Yes, I'm fine with that as it no longer touches one of my packages.
Additionally, if there's still a bug, it's in gcc.

WM



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#591194: tdiary: does not build .swf files from source

2010-11-14 Thread Daigo Moriwaki
Dai, Hideki,

2010/11/14  d+...@vdr.jp:
 On Sun, Nov 14, 2010 at 07:24:43PM +0900, Hideki Yamane wrote:
  I'm not going to do option 5 myself because I have no idea how to test 
  tdiary,
  but that seems like the only way we're likely to keep it in Squeeze.
  Since tdiary is a leaf package with a lowish popcon score, I'm inclined to
  ask the release team to drop tdiary from squeeze (i.e. option 1) if there 
  isn't any progress on this.

  Those swf files are not main component for tdiary, but just an addon,
  so option 5 approach is kind for us (me, upstream authors and other users).

  And surely I can test it (roughly, though).
  Dai, could you upload updated one to mentors or attache debdiff for it?

 uploaded to mentors.

 - URL: http://mentors.debian.net/debian/pool/main/t/tdiary
 - Source repository: deb-src http://mentors.debian.net/debian unstable main 
 contrib non-free
 - dget 
 http://mentors.debian.net/debian/pool/main/t/tdiary/tdiary_2.2.1+dfsg1-0.1.dsc

 I repackaged source tarball and modified debian/tdiary.copyright and
 debian/changelog.  Would you please check and modify to suitable
 for official?

Thank you for the preparation and sorry for my too late reply.

I will be able to take time tomorrow.
I will check and upload the package.

Regards,
Daigo

-- 
Daigo Moriwaki
beatles at sgtpepper dot net



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601989: Permission to upload vanessa-logger_0.0.10-1.1 (NMU)

2010-11-14 Thread Julien Cristau
On Sun, Nov 14, 2010 at 02:06:20 +0100, Luca Falavigna wrote:

 --- vanessa-logger-0.0.10.orig/debian/control
 +++ vanessa-logger-0.0.10/debian/control
 @@ -20,6 +20,8 @@
  Architecture: any
  Section: libdevel
  Depends: libvanessa-logger0 (= ${binary:Version}), ${misc:Depends}
 +Breaks: libvanessa-logger0 ( 0.0.8-1)
 +Replaces: libvanessa-logger0 ( 0.0.8-1)
  Description: Headers and static libraries for libvanessa-logger
   Headers and static libraries required to develop against vanessa-logger.
   Vanessa logger is a generic logging layer that may be used to log to

The Breaks field seems unnecessary, as you already have Depends on the
exact version.  If you agree please drop the Breaks and go ahead.

Cheers,
Julien


signature.asc
Description: Digital signature


Processed: Re: qtcreator: FTBFS on kfreebsd-*: expected unqualified-id before 'int'

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 600652 + experimental
Bug #600652 [src:qtcreator] qtcreator: FTBFS on kfreebsd-*: expected 
unqualified-id before 'int'
Added tag(s) experimental.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
600652: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600652
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: severity of 603439 is serious

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 603439 serious
Bug #603439 [gpsd] gpsd: SEGV when receiving short aivdm message type 26
Severity set to 'serious' from 'important'

 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
603439: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603439
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#592768: clisp segfaults on install on powerpc system.

2010-11-14 Thread Hector Oron
Hello,

I have successfully installed this package into powerpc machine.

On Thu, Aug 12, 2010 at 01:14:45PM -0400, Len Sorensen wrote:
 ;;  Loaded file 
 /usr/share/common-lisp/source/common-lisp-controller/common-lisp-controller.lisp
   
   
 *** - handle_fault error2 ! address = 0x77946b98 not in 
 [0x69a5a0d8,0x69b37000) ! 
   

 SIGSEGV cannot be cured. Fault address = 0x77946b98.  
   
   
  
Reinstalling for clisp
Recompiling Common Lisp Controller for clisp
Installing clc...
;; Loading file /usr/lib/clisp-2.48/install-clc.lisp ...
;;  Loading file 
/usr/share/common-lisp/source/common-lisp-controller/common-lisp-controller.lisp
 ...
;;  Loaded file 
/usr/share/common-lisp/source/common-lisp-controller/common-lisp-controller.lisp
;;  Loading file 
/var/cache/common-lisp-controller/0/clisp/common-lisp-controller/common-lisp-controller.fas
 ...
;;  Loaded file 
/var/cache/common-lisp-controller/0/clisp/common-lisp-controller/common-lisp-controller.fas
;;  Loading file /var/cache/common-lisp-controller/0/clisp/cl-asdf/asdf.fas ...
;;  Loaded file /var/cache/common-lisp-controller/0/clisp/cl-asdf/asdf.fas
;;  Loading file 
/var/cache/common-lisp-controller/0/clisp/cl-asdf/wild-modules.fas ...
;;  Loaded file 
/var/cache/common-lisp-controller/0/clisp/cl-asdf/wild-modules.fas
;;  Loading file 
/var/cache/common-lisp-controller/0/clisp/common-lisp-controller/post-sysdef-install.fas
 ...
;;  Loaded file 
/var/cache/common-lisp-controller/0/clisp/common-lisp-controller/post-sysdef-install.fas
;; Loaded file /usr/lib/clisp-2.48/install-clc.lisp
;; Wrote the memory image into /usr/lib/clisp-2.48/full/lispinit.mem (3,384,224 
bytes)
Bytes permanently allocated:108,736
Bytes currently in use:   3,268,676
Bytes available until next GC:  814,454
created /usr/lib/clisp-2.48/full/lispinit.mem as expected.
-rw-r--r-- 1 root root 3384224 nov 14 13:54 
/usr/lib/clisp-2.48/full/lispinit.mem

Done rebuilding
Configurando common-lisp-controller (7.4+nmu1) ...
Reinstalling for clisp
Recompiling Common Lisp Controller for clisp
Installing clc...
;; Loading file /usr/lib/clisp-2.48/install-clc.lisp ...
;;  Loading file 
/usr/share/common-lisp/source/common-lisp-controller/common-lisp-controller.lisp
 ...
;;  Loaded file 
/usr/share/common-lisp/source/common-lisp-controller/common-lisp-controller.lisp
;;  Loading file 
/var/cache/common-lisp-controller/0/clisp/common-lisp-controller/common-lisp-controller.fas
 ...
;;  Loaded file 
/var/cache/common-lisp-controller/0/clisp/common-lisp-controller/common-lisp-controller.fas
;;  Loading file /var/cache/common-lisp-controller/0/clisp/cl-asdf/asdf.fas ...
;;  Loaded file /var/cache/common-lisp-controller/0/clisp/cl-asdf/asdf.fas
;;  Loading file 
/var/cache/common-lisp-controller/0/clisp/cl-asdf/wild-modules.fas ...
;;  Loaded file 
/var/cache/common-lisp-controller/0/clisp/cl-asdf/wild-modules.fas
;;  Loading file 
/var/cache/common-lisp-controller/0/clisp/common-lisp-controller/post-sysdef-install.fas
 ...
;;  Loaded file 
/var/cache/common-lisp-controller/0/clisp/common-lisp-controller/post-sysdef-install.fas
;; Loaded file /usr/lib/clisp-2.48/install-clc.lisp
;; Wrote the memory image into /usr/lib/clisp-2.48/full/lispinit.mem (3,384,224 
bytes)
Bytes permanently allocated:108,736
Bytes currently in use:   3,268,676
Bytes available until next GC:  814,454
created /usr/lib/clisp-2.48/full/lispinit.mem as expected.
-rw-r--r-- 1 root root 3384224 nov 14 13:54 
/usr/lib/clisp-2.48/full/lispinit.mem

Done rebuilding
Configurando clisp (1:2.48-3) ...
Installing clc...
;; Loading file /usr/lib/clisp-2.48/install-clc.lisp ...
;;  Loading file 
/usr/share/common-lisp/source/common-lisp-controller/common-lisp-controller.lisp
 ...
;;  Loaded file 
/usr/share/common-lisp/source/common-lisp-controller/common-lisp-controller.lisp
;;  Loading file 
/var/cache/common-lisp-controller/0/clisp/common-lisp-controller/common-lisp-controller.fas
 ...
;;  Loaded file 
/var/cache/common-lisp-controller/0/clisp/common-lisp-controller/common-lisp-controller.fas
;;  Loading file /var/cache/common-lisp-controller/0/clisp/cl-asdf/asdf.fas ...
;;  Loaded file /var/cache/common-lisp-controller/0/clisp/cl-asdf/asdf.fas
;;  Loading file 
/var/cache/common-lisp-controller/0/clisp/cl-asdf/wild-modules.fas ...
;;  Loaded file 
/var/cache/common-lisp-controller/0/clisp/cl-asdf/wild-modules.fas
;;  Loading file 

Bug#603319: dmraid-activate (silently) fails to active RAID1 array

2010-11-14 Thread Modestas Vainius
retitle 603319 dmraid-activate does not handle DDF1-based disks properly
thanks

Hello,

apparently, this problem is strictly related to DDF1 format. dmraid-activate 
needs special handling for it because /sbin/dmraid binary provides no way to 
extract names of DDF1 RAID subsets for the particular physical device. `dmraid 
-r` returns only the top group .ddf1_disks [1] which is useless because 
`dmraid -s` refuses to work with it [2] (contrary to dmraid 1.0.0.rc14 where 
this works)

[1] #  dmraid -r /dev/sda
/dev/sda: ddf1, .ddf1_disks, GROUP, ok, 486326272 sectors, data@ 0

[2] # dmraid -s .ddf1_disks
ERROR: ddf1: wrong # of devices in RAID set 
ddf1_4c534920202020201055471147110a28 [1/2] on /dev/sdb
ERROR: ddf1: wrong # of devices in RAID set 
ddf1_4c534920202020201055471147110a28 [1/2] on /dev/sda
ERROR: either the required RAID set not found or more options required
no raid sets and with names: .ddf1_disks

I wrote an awk based program which extracts RAID subsets from the native log 
of the physical drive (dmraid -i -n /dev/sda). I will test it in the next few 
days and I will send a patch for dmraid-activate if it works. Special casing 
is obviously not optimal but changing behaviour of /sbin/dmraid at this point 
would be worse imho.

-- 
Modestas Vainius mo...@debian.org


signature.asc
Description: This is a digitally signed message part.


Processed: Re: dmraid-activate (silently) fails to active RAID1 array

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 retitle 603319 dmraid-activate does not handle DDF1-based disks properly
Bug #603319 [dmraid] dmraid-activate (silently) fails to activate RAID1 array
Changed Bug title to 'dmraid-activate does not handle DDF1-based disks 
properly' from 'dmraid-activate (silently) fails to activate RAID1 array'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
603319: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603319
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#598424: Patch for CVE-2010-3394

2010-11-14 Thread Jakub Wilk

found 598424 1:1.0.7.4-3
thanks

* Etienne Millon etienne.mil...@gmail.com, 2010-10-20, 09:44:

It does, indeed. On line 30 of /usr/bin/texmacs, the inclusion of
$TEXMACS_BIN_PATH/lib is properly done, because :

 - if LD_LIBRARY_PATH is empty before, the ${LD_LIBRARY_PATH+...}
constructs evaluates to the empty string (and no colon is added)


No. It evalutes to empty string only if LD_LIBRARY_PATH is unset, not 
when it's empty:


$ LD_LIBRARY_PATH=
$ LD_LIBRARY_PATH=/foobar${LD_LIBRARY_PATH+:$LD_LIBRARY_PATH}
$ echo $LD_LIBRARY_PATH 
/foobar:


--
Jakub Wilk


signature.asc
Description: Digital signature


Processed: Re: Bug#598424: Patch for CVE-2010-3394

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 found 598424 1:1.0.7.4-3
Bug #598424 {Done: Atsuhito KOHDA ko...@debian.org} [texmacs] texmacs: 
CVE-2010-3394: insecure library loading
Bug Marked as found in versions texmacs/1:1.0.7.4-3; no longer marked as fixed 
in versions texmacs/1:1.0.7.4-3 and reopened.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
598424: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598424
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#603473: zshdb: Installation fails

2010-11-14 Thread Antti Kultanen
Package: zshdb
Version: 0.05+git20101031-1
Severity: grave
Tags: sid
Justification: renders package unusable

Package installation fails, also happens when upgrading.

-8-
Setting up zshdb (0.05+git20101031-1) ...
emacsen-common: Handling install of emacsen flavor emacs
emacsen-common: Handling install of emacsen flavor emacs21
emacsen-common: byte-compiling for emacs21
Wrote /etc/emacs21/site-start.d/00debian-vars.elc
Wrote /usr/share/emacs21/site-lisp/debian-startup.elc
Done
install/zshdb: Handling install for emacsen flavor emacs21
/usr/lib/emacsen-common/packages/install/zshdb: line 36: cd: 
/usr/share/emacs/site-lisp/zshdb: No such file or directory
emacs-package-install: /usr/lib/emacsen-common/packages/install/zshdb emacs21 
emacs21 failed at /usr/lib/emacsen-common/emacs-package-install line 30, 
TSORT line 2.
dpkg: error processing zshdb (--configure):
 subprocess installed post-installation script returned error exit status 1
configured to not write apport reports
  Errors were encountered while processing:
 zshdb
E: Sub-process /usr/bin/dpkg returned an error code (1)
zsh: exit 100   apt-get install zshdb
-8-

Probably because directory /usr/share/emacs/site-lisp/zshdb does not exist and 
zshdb is not creating one.

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.33.1-bfs315 (SMP w/4 CPU cores)
Locale: LANG=C, LC_CTYPE=fi_FI (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/bash

Versions of packages zshdb depends on:
ii  emacsen-common1.4.19 Common facilities for all emacsen
ii  zsh   4.3.10-16  A shell with lots of features

zshdb recommends no packages.

zshdb suggests no packages.

-- no debconf information



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: severity of 566559 is important

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 566559 important
Bug #566559 [libdspam7-drv-pgsql] fails to install
Severity set to 'important' from 'serious'

 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
566559: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566559
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: tagging 591566

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 591566 - squeeze
Bug #591566 [opensync-module-python] opensync-module-python not installable in 
unstable
Removed tag(s) squeeze.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
591566: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591566
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: tagging 569393

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 569393 - squeeze
Bug #569393 [src:libopensync-plugin-python] libopensync-plugin-python: FTBFS: 
Nonexistent build-dependency: libopensync0-dev
Removed tag(s) squeeze.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
569393: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=569393
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: tagging 591990

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 591990 + sid
Bug #591990 [opensync-plugin-barry] opensync-plugin-barry: not installable in 
sid
Added tag(s) sid.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
591990: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591990
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: tagging 569443

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 569443 + sid
Bug #569443 [src:barry] barry: FTBFS: Nonexistent build-dependency: 
libopensync0-dev
Added tag(s) sid.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
569443: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=569443
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: tagging 569382

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 569382 + sid
Bug #569382 [src:libopensync-plugin-kdepim] libopensync-plugin-kdepim: FTBFS: 
Nonexistent build-dependency: libopensync0-dev
Added tag(s) sid.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
569382: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=569382
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: tagging 603439

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 603439 + fixed-upstream
Bug #603439 [gpsd] gpsd: SEGV when receiving short aivdm message type 26
Added tag(s) fixed-upstream.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
603439: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603439
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601989: Permission to upload vanessa-logger_0.0.10-1.1 (NMU)

2010-11-14 Thread Luca Falavigna
Il 14/11/2010 14:06, Julien Cristau ha scritto:
 The Breaks field seems unnecessary, as you already have Depends on the
 exact version.  If you agree please drop the Breaks and go ahead.

Correct, thanks for spotting.
Simon ACKed the first NMU proposal, so I'm going to upload the revised
version (as per attached debdiff) without delay.

-- 
  .''`.
 :  :' :   Luca Falavigna dktrkr...@debian.org
 `.  `'
   `-
only in patch2:
unchanged:
--- vanessa-logger-0.0.10.orig/debian/changelog
+++ vanessa-logger-0.0.10/debian/changelog
@@ -1,3 +1,12 @@
+vanessa-logger (0.0.10-1.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Add Replaces field on libvanessa-logger0 ( 0.0.8-1) for
+libvanessa-logger-dev package to fix overwrite issues with
+/usr/share/doc/libvanessa-logger-dev/README file (Closes: #601989).
+
+ -- Luca Falavigna dktrkr...@debian.org  Sun, 14 Nov 2010 16:06:16 +0100
+
 vanessa-logger (0.0.10-1) unstable; urgency=low
 
   * New upstream
only in patch2:
unchanged:
--- vanessa-logger-0.0.10.orig/debian/control
+++ vanessa-logger-0.0.10/debian/control
@@ -20,6 +20,7 @@
 Architecture: any
 Section: libdevel
 Depends: libvanessa-logger0 (= ${binary:Version}), ${misc:Depends}
+Replaces: libvanessa-logger0 ( 0.0.8-1)
 Description: Headers and static libraries for libvanessa-logger
  Headers and static libraries required to develop against vanessa-logger.
  Vanessa logger is a generic logging layer that may be used to log to


signature.asc
Description: OpenPGP digital signature


Bug#594150: Bug#594153: Bug#594150: CURLOPT_TIMEOUT defaults to zero seconds

2010-11-14 Thread Simon McVittie
On Sun, 14 Nov 2010 at 12:51:34 +0100, Daniel Stenberg wrote:
 This turned out to be a minor bug in curl, yes, and I've fixed it
 upstream now.

Thanks!

(https://github.com/bagder/curl/commit/cbf4961bf3e42d88f6489f981efd509faa86f501
for those following the Debian bug log)

 BUT, I'd like to stress that the timeout problem was
 just a false track and it simply made the error reporting a bit
 confused and now with my fix curl will instead say this:
 
 $ ./src/curl -k 
 https://apt-test.aviatis.com/apt-cacher/ftp.us.debian.org/debian/dists/squeeze/
 -v

That's not meant to work here: the test case is an apt repository where you
have to present a client certificate to gain access. Presumably Johannes also
has a real repository that contains private data or something, but this one is
just a mirror of ftp.us.debian.org configured with similar access control, for
testing; see http://apt-test.aviatis.com/ for a working client certificate and
its private key.

 curl: (35) gnutls_handshake() failed: Decryption has failed.

 routines:SSL3_READ_BYTES:sslv3 alert handshake failure, errno 0

You'd know better than I do whether these are what you'd expect to see if the
server requires a client certificate and you didn't have one...

I'm not sure whether apt-cacher does directory listings, but here's the
URL to a flat-file which works with Debian's (OpenSSL-based) curl(1):

https://apt-test.aviatis.com/apt-cacher/ftp.us.debian.org/debian/dists/squeeze/Release

The command I've been using to test is something like this:

curl -k 
https://apt-test.aviatis.com/apt-cacher/ftp.us.debian.org/debian/dists/squeeze/Release
 --cert ../test-client.apt-test.aviatis.com.crt --key 
../test-client.apt-test.aviatis.com.key

Hope this helps,
S



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601989: marked as done (libvanessa-adt-dev: file conflict when upgrading from lenny)

2010-11-14 Thread Debian Bug Tracking System
Your message dated Sun, 14 Nov 2010 15:32:30 +
with message-id e1phezc-0003yf...@franck.debian.org
and subject line Bug#601989: fixed in vanessa-logger 0.0.10-1.1
has caused the Debian Bug report #601989,
regarding libvanessa-adt-dev: file conflict when upgrading from lenny
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
601989: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601989
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: libvanessa-adt-dev
Version: 0.0.9-1
Severity: serious

Installing the package in a lenny chroot, then upgrading to squeeze,
causes:
   Preparing to replace libvanessa-logger-dev 0.0.7-2 (using 
.../libvanessa-logger-dev_0.0.10-1_amd64.deb) ...
   Unpacking replacement libvanessa-logger-dev ...
   dpkg: error processing 
/var/cache/apt/archives/libvanessa-logger-dev_0.0.10-1_amd64.deb (--unpack):
trying to overwrite `/usr/share/doc/libvanessa-logger-dev/README', which is 
also in package libvanessa-logger0

Interestingly, it doesn't seem to be reproducible when upgrading only 
libvanessa-logger-dev. I'm not sure why. But it's reproducible when upgrading 
libvanessa-socket-dev.

- Lucas


---End Message---
---BeginMessage---
Source: vanessa-logger
Source-Version: 0.0.10-1.1

We believe that the bug you reported is fixed in the latest version of
vanessa-logger, which is due to be installed in the Debian FTP archive:

libvanessa-logger-dev_0.0.10-1.1_amd64.deb
  to main/v/vanessa-logger/libvanessa-logger-dev_0.0.10-1.1_amd64.deb
libvanessa-logger-sample_0.0.10-1.1_amd64.deb
  to main/v/vanessa-logger/libvanessa-logger-sample_0.0.10-1.1_amd64.deb
libvanessa-logger0_0.0.10-1.1_amd64.deb
  to main/v/vanessa-logger/libvanessa-logger0_0.0.10-1.1_amd64.deb
vanessa-logger_0.0.10-1.1.diff.gz
  to main/v/vanessa-logger/vanessa-logger_0.0.10-1.1.diff.gz
vanessa-logger_0.0.10-1.1.dsc
  to main/v/vanessa-logger/vanessa-logger_0.0.10-1.1.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 601...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Luca Falavigna dktrkr...@debian.org (supplier of updated vanessa-logger 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sun, 14 Nov 2010 16:06:16 +0100
Source: vanessa-logger
Binary: libvanessa-logger0 libvanessa-logger-dev libvanessa-logger-sample
Architecture: source amd64
Version: 0.0.10-1.1
Distribution: unstable
Urgency: medium
Maintainer: Simon Horman ho...@debian.org
Changed-By: Luca Falavigna dktrkr...@debian.org
Description: 
 libvanessa-logger-dev - Headers and static libraries for libvanessa-logger
 libvanessa-logger-sample - Sample programme using libvanessa-logger
 libvanessa-logger0 - Generic Logging Library
Closes: 601989
Changes: 
 vanessa-logger (0.0.10-1.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Add Replaces field on libvanessa-logger0 ( 0.0.8-1) for
 libvanessa-logger-dev package to fix overwrite issues with
 /usr/share/doc/libvanessa-logger-dev/README file (Closes: #601989).
Checksums-Sha1: 
 db7df49650c738a427eb49ad794e8ddd6fba6633 1065 vanessa-logger_0.0.10-1.1.dsc
 eda0e9f7353eadeab0b855a8746a4d6d9ba0edb6 515 vanessa-logger_0.0.10-1.1.diff.gz
 1226bf69c3799e9d8f8601583b2254440eb6f9a1 9862 
libvanessa-logger0_0.0.10-1.1_amd64.deb
 d1c3fb093c3ac49c5935e3cfb1181801bcaf2410 13450 
libvanessa-logger-dev_0.0.10-1.1_amd64.deb
 88331486b72bf0b6f0ed203d973ffcac440db0f6 9724 
libvanessa-logger-sample_0.0.10-1.1_amd64.deb
Checksums-Sha256: 
 21062c438ab2849b888760ec5707e7d869c1413c4537554deae15378b5eee429 1065 
vanessa-logger_0.0.10-1.1.dsc
 6be11d7f9a43fca94c44ef6a90b122ba61c299facb20c0f5c6c63584da3a9cde 515 
vanessa-logger_0.0.10-1.1.diff.gz
 fbb37caf8aa3f24873a922ee12ceccfdd47aa6468acf2c4ae8c929879f8a039c 9862 
libvanessa-logger0_0.0.10-1.1_amd64.deb
 080624dceec00fe6d8f8d21431d4ec2fcbdb99f046f1a81a7f11fe2ef0073b68 13450 
libvanessa-logger-dev_0.0.10-1.1_amd64.deb
 47b0fb63d6ea9347d7be7e8c90b83d89690f27d334312aa5012792158ce8ba29 9724 
libvanessa-logger-sample_0.0.10-1.1_amd64.deb
Files: 
 eacc26a9ea41944645871e337fa22712 1065 libs optional 
vanessa-logger_0.0.10-1.1.dsc
 d81b9d1e087bde3a7785cbc9ead9bac5 515 libs optional 

Bug#590884: grub-pc: upgrading with vmlinuz-2.6.32-5-amd64 kernel fails on device detection

2010-11-14 Thread Vladimir 'φ-coder/phcoder' Serbinenko
This looks like the failure of grub-probe to find underlying device from
partition. This should be fixed by now. Can you retest?

-- 
Regards
Vladimir 'φ-coder/phcoder' Serbinenko




signature.asc
Description: OpenPGP digital signature


Bug#496718: marked as done (vpnc: Disconnects after an hour and loops trying to reconnect)

2010-11-14 Thread Debian Bug Tracking System
Your message dated Sun, 14 Nov 2010 15:32:42 +
with message-id e1phezo-0003b8...@franck.debian.org
and subject line Bug#496718: fixed in vpnc 0.5.3r449-2.1
has caused the Debian Bug report #496718,
regarding vpnc: Disconnects after an hour and loops trying to reconnect
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
496718: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496718
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: vpnc
Version: 0.5.1r334-1
Severity: important

When I use vpnc to connect to my company's VPN, I only stay connected
for an hour.  After that, vpnc sometimes stays up for a bit of time,
but I can't access the VPN during that time.  Eventually, the client
will usually give up and exit.

I'm attaching a log of debug output using 'vpnc-connect --debug 2
--no-detach snt'.  This time the client hung at a time I needed to do
more on the VPN, so I needed to kill it using vpnc-disconnect.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages vpnc depends on:
ii  libc6 2.7-13 GNU C Library: Shared libraries
ii  libgcrypt11   1.4.1-1LGPL Crypto library - runtime libr

Versions of packages vpnc recommends:
ii  iproute   20080725-2 networking and traffic control too
ii  resolvconf1.42   name server information handler

vpnc suggests no packages.

-- no debconf information

-- 
Daniel Schepler


vpnc-log.lzma
Description: Binary data
---End Message---
---BeginMessage---
Source: vpnc
Source-Version: 0.5.3r449-2.1

We believe that the bug you reported is fixed in the latest version of
vpnc, which is due to be installed in the Debian FTP archive:

vpnc_0.5.3r449-2.1.diff.gz
  to main/v/vpnc/vpnc_0.5.3r449-2.1.diff.gz
vpnc_0.5.3r449-2.1.dsc
  to main/v/vpnc/vpnc_0.5.3r449-2.1.dsc
vpnc_0.5.3r449-2.1_i386.deb
  to main/v/vpnc/vpnc_0.5.3r449-2.1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 496...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Reinhard Tartler siret...@tauware.de (supplier of updated vpnc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 09 Nov 2010 12:03:17 +0100
Source: vpnc
Binary: vpnc
Architecture: source i386
Version: 0.5.3r449-2.1
Distribution: unstable
Urgency: low
Maintainer: Eric Warmenhoven warmenho...@debian.org
Changed-By: Reinhard Tartler siret...@tauware.de
Description: 
 vpnc   - Cisco-compatible VPN client
Closes: 496718
Changes: 
 vpnc (0.5.3r449-2.1) unstable; urgency=low
 .
   * Non-maintainer upload.
   * Bug fix: Disconnects after an hour and loops trying to reconnect,
 thanks to Daniel Schepler (Closes: #496718, LP: #479632). Patch taken
 from upstream: http://www.gossamer-threads.com/lists/vpnc/devel/3442
Checksums-Sha1: 
 56b6682d4b0c393a7cd1c73a2a9f992e9b21adba 1149 vpnc_0.5.3r449-2.1.dsc
 df0228a912caa7593320ffd7e1dfe39f1ad7541d 53551 vpnc_0.5.3r449-2.1.diff.gz
 51af34bb8e719f43d63c4fd1fc4eef584aa98b27 81222 vpnc_0.5.3r449-2.1_i386.deb
Checksums-Sha256: 
 d81e8bea1773d2fff28948c0533e387b001fc9661ff9b275ca13452993b5f06e 1149 
vpnc_0.5.3r449-2.1.dsc
 fd037c3d069e4aa9ba59bd3ac10a61c39271966952198759372102c33ad83275 53551 
vpnc_0.5.3r449-2.1.diff.gz
 ec26493ceeda570b2d1b0b32c34d379f7b118400574cd74a29ac7981f432a726 81222 
vpnc_0.5.3r449-2.1_i386.deb
Files: 
 d53198a76663beb50f8f12da1303953b 1149 net extra vpnc_0.5.3r449-2.1.dsc
 05a9da0920b4fc0169ef55c8f446ec2b 53551 net extra vpnc_0.5.3r449-2.1.diff.gz
 0bc5436bbc1019e79054b548b0b8b446 81222 net extra vpnc_0.5.3r449-2.1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Debian Powered!

iJwEAQECAAYFAkzZY0kACgkQ78RAoABp8o8rRgP+Lzildfo6of/Sb4/hTC53zK9O
lbQ5KDxCx7Fe7ZRnjP6ttPGvwsclUxfKlijVa96vzyf234uctiFDlwEZmvX1qCUI
22Nj1fXkQg1l9L/Le3Vyp3imudir9Qelf2c2Tbj01T0P+kWq8J5OwCBRQMlJ5eNZ
7AZsMUTCw7AC7RpWhnI=
=y3HN
-END PGP SIGNATURE-


---End 

Bug#599303: hacky patch and link

2010-11-14 Thread Dr. David Alan Gilbert
Hi,
  I believe the cause of this bug is a missing NULL check in kdebase-workspace;
I've filed a bug for it as bug 603480, that causes a seg if hiding a file dialog
before making it visible.

The following hacky patch to ktoon works around the bug in kdebase-workspace
and solves this problem; but I think the right thing is to fix 
kdebase-workspace.

Dave



--- ktoon-0.8.1/src/core/configwizard.cpp   2007-06-15 03:33:07.0 
+0100
+++ ktoon-0.8.1-daveg/src/core/configwizard.cpp 2010-11-14 15:49:54.0 
+
@@ -115,6 +115,7 @@
connect(fd, SIGNAL(currentChanged ( const QString  )), m_kthome, 
SLOT(setText(const QString )));
fd-setFileMode(QFileDialog::Directory);
fd-setModal(true);
+   fd-show(); /* DAG */
fd-hide();
connect(button, SIGNAL(clicked()), fd, SLOT(show()));

@@ -131,6 +132,7 @@
QFileDialog *fd2 = new QFileDialog(hbox2);
connect(fd2, SIGNAL(currentChanged ( const QString  )), m_ktrepos, 
SLOT(setText(const QString )));

+   fd2-show(); /* DAG */
fd2-hide();
fd2-setFileMode(QFileDialog::Directory);
fd2-setModal(true);


-- 
 -Open up your eyes, open up your mind, open up your code ---   
/ Dr. David Alan Gilbert|   Running GNU/Linux   | Happy  \ 
\ gro.gilbert @ treblig.org |   | In Hex /
 \ _|_ http://www.treblig.org   |___/



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601220: noip2: abuse of debconf

2010-11-14 Thread Hector Oron
Hello,

On Sun, Oct 24, 2010 at 02:44:16PM +0200, Jakub Wilk wrote:
 Package: noip2
 Version: 2.1.9-3
 Severity: serious
 Justification: Policy 10.7
 
 The only place noip2 store configuration data (apart from the
 debconf cache) is a binary blob in /var/lib/noip2/. This file will
 be happily overwritten on each upgrade using *only* values supplied
 by debconf.

  debconf is set to critical asking those questions.

  Otavio, could you give us some feedback on this bug?
  You can read data back (all but password) with noip -S, do you need a patch 
for this?

  Best regards



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#404760: closed: fixed in inetutils 2:1.8-1

2010-11-14 Thread Hector Oron
Hello,

  Could you consider backporting the fix to unstable/testing?

On Sun, Sep 12, 2010 at 02:51:10PM +, Debian Bug Tracking System wrote:
 #404760: inetutils-inetd: [in.tftpd-hpda] received address was not AF_INET

 zumbi #404760 needs to be unblocked?
 jcristau zumbi: there's a freeze exception request.  no decision yet, as it 
came with lots of changes.
 zumbi jcristau: thanks - i was trying to ping guillem and see if fix is 
backportable
 adsb It looked like it should be backportable from my look over the diff a 
few months ago. There were a lot of other changes though, as jcristau said :-/
 adsb iirc we appear to be one of the few distributions shipping inetutils at 
all, and the only one currently shipping our version
 jcristau having just the rc bug fix(es?) in sid would make things easier...

Best regards,
  -- Héctor Orón



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#597057: live-manual is outdated for squeeze

2010-11-14 Thread Hector Oron
Hello Daniel,

On Thu, Sep 16, 2010 at 10:30:04AM +0200, Daniel Baumann wrote:
 content needs updates for squeeze.
 
 It looks like deep freeze is approaching, do you need help on this task?
 (http://live.debian.net/devel/live-manual/todo/ is the reference to follow?)

Best regards,
  -- Héctor Orón



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#597057: live-manual is outdated for squeeze

2010-11-14 Thread Daniel Baumann
On 11/14/2010 05:12 PM, Hector Oron wrote:
 Hello Daniel,

Hi,

  It looks like deep freeze is approaching, do you need help on this task?
  (http://live.debian.net/devel/live-manual/todo/ is the reference to follow?)

above todo contains more than what is required for squeeze.

for squeeze, all the files in the sources at manual/en/other_* are the
remaining ones that needs to be reviewed. any help with that welcome.

Regards,
Daniel

-- 
Address:Daniel Baumann, Burgunderstrasse 3, CH-4562 Biberist
Email:  daniel.baum...@panthera-systems.net
Internet:   http://people.panthera-systems.net/~daniel-baumann/



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#599437: Looks like we should drop gdisk for squeeze

2010-11-14 Thread Adam D. Barratt
On Sat, 2010-11-13 at 17:27 +, Steve McIntyre wrote:
 gdisk 0.5.1-1 is currently in squeeze and sid and has the RC bug
 #599437 open against it. There's a new upstream version available
 (0.6.13), but the change is huge (39 files changed, 9069
 insertions(+), 2593 deletions(-)); IMHO the changes are far too large
 for an update now.
 
 The code in the older version of gdisk looks nasty, I'll be honest,
 and I would rather see it removed. Small popcon usage and no rdeps.

For the record, Julien added a removal hint for this yesterday and it's
no longer in Squeeze.

Regards,

Adam




-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#584327: marked as done (python-rdflib: fails with SIGBUS on mipsel - breaks build of enigmail)

2010-11-14 Thread Debian Bug Tracking System
Your message dated Sun, 14 Nov 2010 07:19:15 -0600
with message-id 20101114131915.ga3...@dev.localdomain
and subject line Re: Bug#584327: Bug #584327: is it an issue?
has caused the Debian Bug report #584327,
regarding python-rdflib: fails with SIGBUS on mipsel - breaks build of enigmail
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
584327: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584327
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: python-rdflib
Version: 2.4.2-1+b1
Severity: serious
Justification: Breaks build of another package

Building enigmail 1.0.1-2 on mipsel fails with Bus error:

https://buildd.debian.org/fetch.cgi?pkg=enigmailarch=mipselver=2%3A1.0.1-2stamp=1275423629file=logas=raw

I've reproduced this on a qemu-emulated mipsel machine. The problem 
is the script /usr/bin/install-xpi that uses rdflib to parse the file
install.rdf.

I've reduced install-xpi to the method that shows the problem, and added 
printf debugging to find the failing method. 

The output of this script on mipsel is

$ ./install-xpi 
gei 1 install.rdf
gei 2
gei 3
gei 4
gei 5
Bus error

So the problem occurs when calling rdf_graph.query().

I have no experience at debugging python applications, especially not when
system level bugs are involved, so I can't debug this issue further.

I can make the qemu image I used available. It is based on the lenny image by 
Aurélien Jarno.
#!/usr/bin/python

# Copyright (c) 2009 Benjamin Drung bdr...@ubuntu.com
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the Software), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
# copies of the Software, and to permit persons to whom the Software is
# furnished to do so, subject to the following conditions:
#
# The above copyright notice and this permission notice shall be included in
# all copies or substantial portions of the Software.
# 
# THE SOFTWARE IS PROVIDED AS IS, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
# THE SOFTWARE.

import csv
import optparse
import os
import stat
import subprocess
import sys
import zipfile

from rdflib import Namespace
from rdflib.Graph import Graph

# error codes
COMMAND_LINE_SYNTAX_ERROR = 1
XPI_FILE_DOES_NOT_EXISTS = 2

def get_extension_id(install_rdf):
	print gei 1  + install_rdf
	extension_ids = set()
	print gei 2
	rdf_graph = Graph()
	print gei 3
	rdf_graph.parse(install_rdf)
	print gei 4
	query = SELECT ?id WHERE {?x1 em:targetApplication ?x2 . ?x1 em:id ?id }
	print gei 5
	results = rdf_graph.query(query, initNs=dict(em=Namespace(http://www.mozilla.org/2004/em-rdf#;)))
	print gei 6
	for result in results:
		print gei 7
		extension_ids.add(str(result[0]))
	print gei 8
	return extension_ids.pop()

if __name__ == __main__:

	extension_id = get_extension_id(install.rdf)



install.rdf
Description: XML document
---End Message---
---BeginMessage---
On Sun, Nov 14, 2010 at 01:54:15PM +0100, Willi Mann wrote:
 Am 2010-11-14 13:30, schrieb Nacho Barrientos Arias:
  On Sun, Nov 14, 2010 at 01:59:31AM +0100, Luca Falavigna wrote:
  I wonder whether this is still an issue, given that enigmail now builds
  on mipsel again, see related log:
  
  It builds fine because mozilla-devscripts (a build-dep of enigmail) no
  longer depends on this package.
  
  Rdflib 3.0.0 is on its way (I promise, he) so, as it does not ship C
  extensions, it will be impossible to reproduce this problem.
  
  Willi, do you agree on closing this bug? 
 
 Yes, I'm fine with that as it no longer touches one of my packages.
 Additionally, if there's still a bug, it's in gcc.

I'm closing it then. Feel free to reopen the report if something
similar arises in the future.

Thanks.

Nacho


signature.asc
Description: Digital signature
---End Message---


Bug#602084: further analysis + plan (1-day NMU of autofs5 today)

2010-11-14 Thread Holger Levsen
found 602765 5.0.3-3
tags 602765 + patch
thanks

Hi,

so this bug (602765) is also present in+since lenny, etch had no autofs5-ldap 
package. And, to repeat myself: the autofs-ldap package ships this configfile 
with the same path since etch... 

In sid, there are currently 80 schema files deployed in /etc/ldap/schema/ and 
non in /etc/ldap/ except this one. 

So I'll go ahead with my NMU now, but I'll make it 1-day. Tomorrow I'll then 
upload a fixed (602084) debian-edu-config package.

The fix is simply to fix the path in debian/autofs5-ldap.install 


cheers,
Holger


signature.asc
Description: This is a digitally signed message part.


Processed: further analysis + plan (1-day NMU of autofs5 today)

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 found 602765 5.0.3-3
Bug #602765 [autofs5-ldap] schema file has changed path, breaking other software
Bug Marked as found in versions autofs5/5.0.3-3.
 tags 602765 + patch
Bug #602765 [autofs5-ldap] schema file has changed path, breaking other software
Added tag(s) patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
602765: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602765
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601989: Permission to upload vanessa-logger_0.0.10-1.1 (NMU)

2010-11-14 Thread Julien Cristau
On Sun, Nov 14, 2010 at 16:12:38 +0100, Luca Falavigna wrote:

 Il 14/11/2010 14:06, Julien Cristau ha scritto:
  The Breaks field seems unnecessary, as you already have Depends on the
  exact version.  If you agree please drop the Breaks and go ahead.
 
 Correct, thanks for spotting.
 Simon ACKed the first NMU proposal, so I'm going to upload the revised
 version (as per attached debdiff) without delay.
 
Unblocked, thanks.

Cheers,
Julien


signature.asc
Description: Digital signature


Bug#548099: Some debug

2010-11-14 Thread Giovanni Mascellani
Hi.

I can reproduce this bug (using a kFreeBSD AMD64 in VirtualBox).

As noted, this bug does only happen when root access is gained using
sudo, because $SSH_CONNECTION is not passed to sudo's children. Using su
or logging directly as root works fine.

Unfortunately the patch suggested by Martin doesn't completely solve the
Linux-ism, because under kFreeBSD sshd apparently doesn't retain the TTY
name in the children it spawns:

 r...@bestiola:~# ps ax | grep sshd
   911 ?R+ 0:00 grep sshd
   862 ?S  0:00 /usr/sbin/sshd -R
   858 ?Ss 0:00 /usr/sbin/sshd -R
   468 ?Ss 0:00 /usr/sbin/sshd

Thus the pgrep test always fails and isn't able to detect SSH
connections (unless $SSH_CONNECTION is set, that triggers the other test).

I don't know why, but ps seems to be unable to detect the running TTY of
a program (here, the TTY column is the one full of ?: the same happens
for the rest of processes in ps ax). One could rely on the fact that
ps (without arguments) displays the processes with the same TTY and
calling user and test if its output contains a sshd. It doesn't seem to
be the Right Way(tm), but it may work.

Thanks, Giovanni.
-- 
Giovanni Mascellani mascell...@poisson.phc.unipi.it
Pisa, Italy

Web: http://poisson.phc.unipi.it/~mascellani
Jabber: g.mascell...@jabber.org / giova...@elabor.homelinux.org



signature.asc
Description: OpenPGP digital signature


Processed: tagging 599303

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 599303 + patch
Bug #599303 [ktoon] ktoon: KToon crashes with Signal 11
Added tag(s) patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
599303: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599303
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#594150: More information

2010-11-14 Thread Neil Williams
Daniel Silverstone  I have been trying to get some debug output of
this bug during the Manchester BSP. 

It strongly appears to be a bug in the gnutls library, rather than curl
and is also restricted to client certificates only. gnutls is failing
in the rehandshake for client certificates. This section of gtls.c:

  if(ret == GNUTLS_E_REHANDSHAKE) {
/* BLOCKING call, this is bad but a work-around for now. Fixing
this the proper way takes a whole lot of work. */
CURLcode rc = handshake(conn, num, FALSE, FALSE);
if(rc)
  /* handshake() writes error message on its own */
  *curlcode = rc;
else
  *curlcode = CURLE_AGAIN; /* then return as if this was a
wouldblock */ return -1;
  }

Performing a manual glutls-cli does not work for client certificates
when the equivalent command with openssl s_client does work.

Tested with:

gnutls-cli --insecure -p 443
--x509certfile /etc/apt/client-certs/test-client.apt-test.aviatis.com.crt
--x509keyfile /etc/apt/client-certs/test-client.apt-test.aviatis.com.key
apt-test.aviatis.com

Also tested with libgnutls26 (2.10.2-1) from experimental.

Entering the data:
GET /apt-cacher/ftp.us.debian.org/debian/dists/squeeze/Release HTTP/1.1
Host: apt-test.aviatis.com

Gives:

*** Non fatal error: Rehandshake was requested by the peer.
*** Received rehandshake request

*** Fatal error: Unsafe renegotiation denied.
*** Rehandshake Failed.
*** Fatal error: An unexpected TLS packet was received.
*** Server has terminated the connection abnormally.

openssl command:
openssl s_client -key test-client.apt-test.aviatis.com.key -cert
test-client.apt-test.aviatis.com.crt -connect apt-test.aviatis.com:https

-- 


Neil Williams
=
http://www.linux.codehelp.co.uk/



pgpZKHG2KeqcS.pgp
Description: PGP signature


Bug#597962: Seems to have resolved itself

2010-11-14 Thread Mike Paul
I was going to take a shot at debugging this today, since it's on the RC
bug list for squeeze, but it seems to have resolved itself at some
point, at least in unstable.  QL starts without errors, and it's playing
music right now.

The last time I tried it was weeks ago, so unfortunately I don't know
which of the many package updates between then and now was responsible
for the change.  I also don't have a system running squeeze, so I can't
test whether it works there.  But it's working for me in sid.
-- 
Mike Paul m...@wyzardry.net




-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#597933: Non-free files distributed in sdcc

2010-11-14 Thread Hector Oron
Hello,

On Fri, Sep 24, 2010 at 12:45:57PM +0200, Philipp Klaus Krause wrote:
 Package: sdcc
 Version: 2.9.0-5
 Severity: serious
 
 Since the 2.9.0 release sdcc is in the process of changing the lbrary
 license to GPL+LE. The process is mostly complete. While doing so, some
 files of unclear license status were found. Rights holders have been
 contacted and, with one exception (), agreed to license their files
 under GPL+LE.
 This exception is Microchip Technology Inc. They insist on a the file
 can be used only with authentic Microchip devices condition, which
 clearly violates DFSG §6.

I have review all files under pic and pic16 directories in sdcc 2.9.0 package 
in testing/unstable.
 $ grep -nRH authentic Microchip devices * tells me nothing

I do not really see anything wrong in the licensing of this package. Could you 
please point out which files are affected?

Best regards,
  -- Héctor Orón




-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: tagging 597933

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 597933 + moreinfo
Bug #597933 [sdcc] Non-free files distributed in sdcc
Added tag(s) moreinfo.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
597933: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=597933
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#603450: Acknowledgement (offlineimap: fails check the remote servers ssl certificate is valid)

2010-11-14 Thread Steve McIntyre
retitle 603540 offlineimap: fails to check the remote server's ssl certificate 
is valid
thanks

On Sun, Nov 14, 2010 at 08:15:18PM +1100, dave b wrote:
I wish debian let me edit bugs like ubuntu does!

Done. See http://www.debian.org/Bugs/server-control for more details
on the commands available.

(offlineimap: fails check the remote
 servers ssl certificate is valid)

should be
(offlineimap: fails *to* check the remote
 server's ssl certificate is valid)

s/servers/server's/

-- 
Steve McIntyre, Cambridge, UK.st...@einval.com
The problem with defending the purity of the English language is that
 English is about as pure as a cribhouse whore. We don't just borrow words; on
 occasion, English has pursued other languages down alleyways to beat them
 unconscious and rifle their pockets for new vocabulary.  -- James D. Nicoll




-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#534466: Is this IA64 specific?

2010-11-14 Thread Dr. David Alan Gilbert

I haven't got a machine to try and recreate this on easily, but I wonder
if this bug is IA64 specific?
If not then it's even more important - unless someone knows of a specific
ia64 change in the md raid sb then I guess it might be more general.

Dave
-- 
 -Open up your eyes, open up your mind, open up your code ---   
/ Dr. David Alan Gilbert|   Running GNU/Linux   | Happy  \ 
\ gro.gilbert @ treblig.org |   | In Hex /
 \ _|_ http://www.treblig.org   |___/



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#591206: License updated (flvplayer)

2010-11-14 Thread Hector Oron
Hello,

On Thu, Nov 11, 2010 at 04:35:53PM +0100, Alexander Reichle-Schmehl wrote:

 If I understand it correctly, it's just a plugin of tinymce in need of
 that flash player?  Then couldn't that plugin be moved to non-free (in a
 sepperate source package) so that a tinymce cleaned from this plugin
 could stay in main as well as the other packages?
 
$ find . -name *swf*
./jscripts/tiny_mce/plugins/media/img/flv_player.swf
./examples/media/sample.swf

How important are those files? Could those be replaced or removed without 
affecting application functionality?

Cheers



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601115: adabrowse: FTBFS in squeeze: error: (/usr/lib/ada/adalib/asis/a4g-contt-dp.ali is obsolete and read-only)

2010-11-14 Thread Adrian-Ken Rueegsegger
Hi Lucas,

Sorry for the late reply...

Lucas Nussbaum wrote:
 Package: adabrowse
 Version: 4.0.3-4
 Severity: serious
 Tags: squeeze sid
 User: debian...@lists.debian.org
 Usertags: qa-ftbfs-20101023 qa-ftbfs
 Justification: FTBFS on amd64
 
 Hi,
 
 During a rebuild of all packages in a squeeze chroot, your package failed
 to build on amd64.

I just setup a fresh squeeze chroot on an amd64 machine and was able to
build the adabrowse package without any errors...

 gnatbind -shared -I- -x 
 /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/obj/adabrowse.ali
 error: a4g-contt-dp.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/a4g-contt-dp.ali is obsolete and 
 read-only)
 error: a4g-contt-ut.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/a4g-contt-ut.ali is obsolete and 
 read-only)
 error: a4g-contt-tt.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/a4g-contt-tt.ali is obsolete and 
 read-only)
 error: a4g-asis_tables.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/a4g-asis_tables.ali is obsolete and 
 read-only)
 error: uintp.adb has been modified and must be recompiled
 error: a4g-contt-sd.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/a4g-contt-sd.ali is obsolete and 
 read-only)
 error: a4g-cu_info2.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/a4g-cu_info2.ali is obsolete and 
 read-only)
 error: a4g-vcheck.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/a4g-vcheck.ali is obsolete and read-only)
 error: asis-extensions.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/asis-extensions.ali is obsolete and 
 read-only)
 error: a4g-a_sem.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/a4g-a_sem.ali is obsolete and read-only)
 error: a4g-mapping.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/a4g-mapping.ali is obsolete and read-only)
 error: a4g-norm.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/a4g-norm.ali is obsolete and read-only)
 error: asis-declarations.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/asis-declarations.ali is obsolete and 
 read-only)
 error: a4g-decl_sem.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/a4g-decl_sem.ali is obsolete and 
 read-only)
 error: asis-definitions.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/asis-definitions.ali is obsolete and 
 read-only)
 error: asis-elements.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/asis-elements.ali is obsolete and 
 read-only)
 error: a4g-encl_el.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/a4g-encl_el.ali is obsolete and read-only)
 error: asis-expressions.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/asis-expressions.ali is obsolete and 
 read-only)
 error: a4g-expr_sem.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/a4g-expr_sem.ali is obsolete and 
 read-only)
 error: a4g-dda_aux.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/a4g-dda_aux.ali is obsolete and read-only)
 error: asis-data_decomposition.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/asis-data_decomposition.ali is obsolete 
 and read-only)
 error: asis-data_decomposition-aux.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/asis-data_decomposition-aux.ali is 
 obsolete and read-only)
 error: asis-data_decomposition-set_get.adb must be compiled
 error: (/usr/lib/ada/adalib/asis/asis-data_decomposition-set_get.ali is 
 obsolete and read-only)
 gnatmake: *** bind failed.
 make: *** [build-stamp] Error 4

This suggests that the linker detects a version/source mismatch for the
ASIS library by means of the ALI files. I fail to see however why it
should fail for you and not for me.

I will add Ludovic, the maintainer of the ASIS package, as CC to this mail.

Thanks again for the report,
Adrian



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: tagging 591206

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 591206 + moreinfo
Bug #591206 [src:tinymce] tinymce: contains Flash files without source code, 
notably non-free flv_player.swf
Added tag(s) moreinfo.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
591206: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591206
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#584942: by the way

2010-11-14 Thread Peter Gervai
yeh the bug's still present, and isn't it the same as bug #569580 ?



-- 
 byte-byte,
    grin



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#602765: Fwd: Bug#603491: acknowledge or cancel 5.0.4-3.2 NMU

2010-11-14 Thread Holger Levsen

--  Forwarded Message  --

Betreff: Bug#603491: acknowledge or cancel 5.0.4-3.2 NMU
Datum: Sonntag, 14. November 2010
Von: Holger Levsen hol...@layer-acht.org
An: sub...@bugs.debian.org

package: autofs5

Hi,

please include my change from 5.0.4-3.2 (diff attached) into your next upload. 
I've just uploaded it to 1-day delayed, so if you want to, you could also 
cancel that upload and fix 602765 by an upload of yours.


cheers  thanks for maintaining autofs5!
Holger

---

attachment omitted here.


signature.asc
Description: This is a digitally signed message part.


Bug#512883: marked as done (gphoto2: Silently fails when unable to retreive files from camera)

2010-11-14 Thread Debian Bug Tracking System
Your message dated Sun, 14 Nov 2010 18:03:25 +
with message-id e1phgvf-0001tl...@franck.debian.org
and subject line Bug#512883: fixed in gphoto2 2.4.5-3
has caused the Debian Bug report #512883,
regarding gphoto2: Silently fails when unable to retreive files from camera
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
512883: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512883
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: gphoto2
Version: 2.4.0-1
Severity: normal


When I run gphoto2 -P from within a directory where the user has no write 
permissions, 
gphoto shows that the file is being retreived, and shows a successful exit, 
though the files 
are not actually saved on to the harddisk. 

A sample directory permission where the command failed:-

drwxr-xr-x  3 paivakil root 4096 2008-04-21 10:59 2008March2

A different user, who is not a member of the root group ran gphoto2 -P 
from within the above directory, and was told that the files are being 
downloaded. Running ls at the end of the process shows that the files were
not actually saved:-

Output of the command:-

gphoto2 -P
Downloading '100_2496.JPG' from folder '/store_00010001/DCIM/100KC663'...
Saving file as 100_2496.JPG
Downloading '100_2497.JPG' from folder '/store_00010001/DCIM/100KC663'...
Saving file as 100_2497.JPG
Downloading 'DDISCVRY.DPS' from folder '/store_00020001'...
Saving file as DDISCVRY.DPS

Resulst of ls -la at end of the command:-

total 22632
-rw--- 1 nandana camera 1486326 2008-03-03 21:23 100_1523.JPG
-rw--- 1 nandana camera 1425718 2008-03-03 21:23 100_1524.JPG
-rw--- 1 nandana camera 1467106 2008-03-03 21:23 100_1525.JPG
-rw--- 1 nandana camera 1238891 2008-03-03 21:23 100_1526.JPG
-rw--- 1 nandana camera 1251119 2008-03-03 21:24 100_1527.JPG
-rw--- 1 nandana camera 1424014 2008-03-03 21:24 100_1528.JPG
-rw--- 1 nandana camera 1066989 2008-03-03 21:24 100_1529.JPG
-rw--- 1 nandana camera 1244265 2008-03-03 21:24 100_1530.JPG
-rw--- 1 nandana camera 1945151 2008-03-03 21:24 100_1531.JPG
-rw--- 1 nandana camera 1664090 2008-03-03 21:24 100_1532.JPG
-rw--- 1 nandana camera 1411502 2008-03-03 21:24 100_1533.JPG
-rw--- 1 nandana camera  675804 2008-03-03 21:24 100_1534.JPG
-rw--- 1 nandana camera 1290160 2008-03-03 21:24 100_1535.JPG
-rw--- 1 nandana camera 1384751 2008-03-03 21:24 100_1536.JPG
-rw--- 1 nandana camera 1386654 2008-03-03 21:24 100_1537.JPG
-rw--- 1 nandana camera  740676 2008-03-03 21:24 100_1538.JPG
-rw--- 1 nandana camera 1161485 2008-03-03 21:24 100_1539.JPG
-rw--- 1 nandana camera  805859 2008-03-03 21:24 100_1540.JPG

(Those files were already in the folder; before running gphoto; downloaded 
earlier, and chmod'ed.  the point I want to make is that the two files we 
are told are being saved are not found in the listing).


But running under strace does show some problems:-

ioctl(4, USBDEVFS_REAPURBNDELAY, 0x7fffe9254b68) = -1 EAGAIN (Resource 
temporarily unavailable)  
select(5, NULL, [4], NULL, {0, 1000})   = 1 (out [4], left {0, 1000})   
 
ioctl(4, USBDEVFS_REAPURBNDELAY, 0x7fffe9254b68) = 0
 
ioctl(4, USBDEVFS_SUBMITURB, 0x7fffe9254af0) = 0
 
ioctl(4, USBDEVFS_REAPURBNDELAY, 0x7fffe9254b68) = -1 EAGAIN (Resource 
temporarily unavailable)  
select(5, NULL, [4], NULL, {0, 1000})   = 0 (Timeout)   
 
ioctl(4, USBDEVFS_REAPURBNDELAY, 0x7fffe9254b68) = -1 EAGAIN (Resource 
temporarily unavailable)  
select(5, NULL, [4], NULL, {0, 1000})   = 0 (Timeout)   
 
ioctl(4, USBDEVFS_REAPURBNDELAY, 0x7fffe9254b68) = -1 EAGAIN (Resource 
temporarily unavailable)  
select(5, NULL, [4], NULL, {0, 1000})   = 0 (Timeout)   
 
ioctl(4, USBDEVFS_REAPURBNDELAY, 0x7fffe9254b68) = -1 EAGAIN (Resource 
temporarily unavailable)  
select(5, NULL, [4], NULL, {0, 1000})   = 0 (Timeout)   
 
ioctl(4, USBDEVFS_REAPURBNDELAY, 0x7fffe9254b68) = -1 EAGAIN (Resource 
temporarily unavailable)  

Bug#601220: noip2: abuse of debconf

2010-11-14 Thread Otavio Salvador
On Sun, Nov 14, 2010 at 1:57 PM, Hector Oron zu...@debian.org wrote:
  Otavio, could you give us some feedback on this bug?
  You can read data back (all but password) with noip -S, do you need a patch 
 for this?

I haven't have time to look at it. If you can look at it please do.
It is in collab-maint so please take it over :-D

-- 
Otavio Salvador                  O.S. Systems
E-mail: ota...@ossystems.com.br  http://www.ossystems.com.br
Mobile: +55 53 9981-7854         http://projetos.ossystems.com.br



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#602765: further analysis + plan (1-day NMU of autofs5 today)

2010-11-14 Thread Holger Levsen
h01ger autofs5 (#602765) NMUed+uploaded to delayed-1
pere_ how do you make sure those using the old path will still find the 
schema?
h01ger i could do an archive wide grep
h01ger i suspect that path has no/very few users
h01ger people still use autofs-ldap
h01ger popcon is at 135 installed and 12 recent
h01ger thats half the popcon score of debian-edu-config
h01ger autofs-ldap OTOH, has 666 installed and 17 recent
h01ger pere, also there is no other schema file in /etc/ldap, all 80 in sid 
are in /etc/ldap/schema so i'm very confident that this is *right*
h01ger pere, i'd like to put our discussion until 18:34 into the bug log, 
you're fine with that? :)
pere_ h01ger: I am fine with that.  you might want to address those with 
their own local slapd.conf setup, as in not from a debian package.  that 
would be the majority, as most sites create their own ldap server config.


signature.asc
Description: This is a digitally signed message part.


Bug#603237: marked as done (python2.7-minimal: fails to configure with IOError: invalid Python installation: unable to open /usr/lib/python2.7/config/Makefile)

2010-11-14 Thread Debian Bug Tracking System
Your message dated Sun, 14 Nov 2010 19:50:13 +
with message-id e1phiab-al...@franck.debian.org
and subject line Bug#603237: fixed in python2.7 2.7.1~rc1-2
has caused the Debian Bug report #603237,
regarding python2.7-minimal: fails to configure with IOError: invalid Python 
installation: unable to open /usr/lib/python2.7/config/Makefile
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
603237: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603237
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: python2.7-minimal
Version: 2.7-9
Severity: grave

Stock experimental system.  python2.6 is already installed and
working great.  Trying to investigate [1], I hope to install python2.7:

 # cupt install python2.7
 [...]
 (Reading database ... 118078 files and directories currently installed.)
 Unpacking python2.7-minimal (from .../python2.7-minimal_2.7-9_i386.deb) ...
 Setting up python2.7-minimal (2.7-9) ...
 Traceback (most recent call last):
   File /usr/lib/python2.7/site.py, line 552, in module
 main()
   File /usr/lib/python2.7/site.py, line 534, in main
 known_paths = addusersitepackages(known_paths)
   File /usr/lib/python2.7/site.py, line 261, in addusersitepackages
 user_site = getusersitepackages()
   File /usr/lib/python2.7/site.py, line 236, in getusersitepackages
 user_base = getuserbase() # this will also set USER_BASE
   File /usr/lib/python2.7/site.py, line 226, in getuserbase
 USER_BASE = get_config_var('userbase')
   File /usr/lib/python2.7/sysconfig.py, line 558, in get_config_var
 return get_config_vars().get(name)
   File /usr/lib/python2.7/sysconfig.py, line 457, in get_config_vars
 _init_posix(_CONFIG_VARS)
   File /usr/lib/python2.7/sysconfig.py, line 310, in _init_posix
 raise IOError(msg)
 IOError: invalid Python installation: unable to open 
/usr/lib/python2.7/config/Makefile (No such file or directory)
 dpkg: error processing python2.7-minimal (--configure):
  subprocess installed post-installation script returned error exit status 1

Indeed, there is no /usr/lib/python2.7/config directory.  Unpacking
python2.7 with an explicit dpkg invocation allows the installation to
continue, so all is well.

[1] http://bugs.python.org/issue1736483


---End Message---
---BeginMessage---
Source: python2.7
Source-Version: 2.7.1~rc1-2

We believe that the bug you reported is fixed in the latest version of
python2.7, which is due to be installed in the Debian FTP archive:

idle-python2.7_2.7.1~rc1-2_all.deb
  to main/p/python2.7/idle-python2.7_2.7.1~rc1-2_all.deb
libpython2.7_2.7.1~rc1-2_i386.deb
  to main/p/python2.7/libpython2.7_2.7.1~rc1-2_i386.deb
python2.7-dbg_2.7.1~rc1-2_i386.deb
  to main/p/python2.7/python2.7-dbg_2.7.1~rc1-2_i386.deb
python2.7-dev_2.7.1~rc1-2_i386.deb
  to main/p/python2.7/python2.7-dev_2.7.1~rc1-2_i386.deb
python2.7-doc_2.7.1~rc1-2_all.deb
  to main/p/python2.7/python2.7-doc_2.7.1~rc1-2_all.deb
python2.7-examples_2.7.1~rc1-2_all.deb
  to main/p/python2.7/python2.7-examples_2.7.1~rc1-2_all.deb
python2.7-minimal_2.7.1~rc1-2_i386.deb
  to main/p/python2.7/python2.7-minimal_2.7.1~rc1-2_i386.deb
python2.7_2.7.1~rc1-2.diff.gz
  to main/p/python2.7/python2.7_2.7.1~rc1-2.diff.gz
python2.7_2.7.1~rc1-2.dsc
  to main/p/python2.7/python2.7_2.7.1~rc1-2.dsc
python2.7_2.7.1~rc1-2_i386.deb
  to main/p/python2.7/python2.7_2.7.1~rc1-2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 603...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Matthias Klose d...@debian.org (supplier of updated python2.7 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sun, 14 Nov 2010 09:40:09 +0100
Source: python2.7
Binary: python2.7 python2.7-minimal libpython2.7 python2.7-examples 
python2.7-dev idle-python2.7 python2.7-doc python2.7-dbg
Architecture: source all i386
Version: 2.7.1~rc1-2
Distribution: experimental
Urgency: low
Maintainer: Matthias Klose d...@debian.org
Changed-By: Matthias Klose d...@debian.org
Description: 
 idle-python2.7 - An IDE for Python (v2.7) using Tkinter
 libpython2.7 - Shared Python runtime library (version 2.7)
 python2.7  - An interactive high-level object-oriented language (version 2.7)

Bug#590418: libxr: FTBFS: make[2]: *** [doxy] Segmentation fault

2010-11-14 Thread Fabien Boucher
Package: libxr
Severity: normal


Hi,
I can reproduce this seg fault in a random way. It seems
the seg fault occurs when generating man pages. Thoses
pages are not relevant and I plan to simply avoid the
build of man pages by doxygen.

Best Regards
Fabien

-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/1 CPU core)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#603371: Please Reassign to Package tar

2010-11-14 Thread Martin Gallant
I have isolated this issue to upgrading tar from 1.23-3 to 1.24-1.

The bug still exists in the latest version 1.25-2.



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601802: marked as done (sun-java6-jre: update 22 not available in lenny is a security issue)

2010-11-14 Thread Debian Bug Tracking System
Your message dated Sun, 14 Nov 2010 19:59:30 +
with message-id e1phija-0001qm...@franck.debian.org
and subject line Bug#601802: fixed in sun-java6 6-22-0lenny1
has caused the Debian Bug report #601802,
regarding sun-java6-jre: update 22 not available in lenny is a security issue
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
601802: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601802
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: sun-java6-jre
Version: 6-20-0lenny1

Some time ago Oracle released Java 6 update 22 patching a critical
security issue. Is it possible to make this version available to Debian
Lenny?


---End Message---
---BeginMessage---
Source: sun-java6
Source-Version: 6-22-0lenny1

We believe that the bug you reported is fixed in the latest version of
sun-java6, which is due to be installed in the Debian FTP archive:

ia32-sun-java6-bin_6-22-0lenny1_amd64.deb
  to non-free/s/sun-java6/ia32-sun-java6-bin_6-22-0lenny1_amd64.deb
sun-java6-bin_6-22-0lenny1_amd64.deb
  to non-free/s/sun-java6/sun-java6-bin_6-22-0lenny1_amd64.deb
sun-java6-bin_6-22-0lenny1_i386.deb
  to non-free/s/sun-java6/sun-java6-bin_6-22-0lenny1_i386.deb
sun-java6-demo_6-22-0lenny1_amd64.deb
  to non-free/s/sun-java6/sun-java6-demo_6-22-0lenny1_amd64.deb
sun-java6-demo_6-22-0lenny1_i386.deb
  to non-free/s/sun-java6/sun-java6-demo_6-22-0lenny1_i386.deb
sun-java6-doc_6-22-0lenny1_all.deb
  to non-free/s/sun-java6/sun-java6-doc_6-22-0lenny1_all.deb
sun-java6-fonts_6-22-0lenny1_all.deb
  to non-free/s/sun-java6/sun-java6-fonts_6-22-0lenny1_all.deb
sun-java6-javadb_6-22-0lenny1_all.deb
  to non-free/s/sun-java6/sun-java6-javadb_6-22-0lenny1_all.deb
sun-java6-jdk_6-22-0lenny1_amd64.deb
  to non-free/s/sun-java6/sun-java6-jdk_6-22-0lenny1_amd64.deb
sun-java6-jdk_6-22-0lenny1_i386.deb
  to non-free/s/sun-java6/sun-java6-jdk_6-22-0lenny1_i386.deb
sun-java6-jre_6-22-0lenny1_all.deb
  to non-free/s/sun-java6/sun-java6-jre_6-22-0lenny1_all.deb
sun-java6-plugin_6-22-0lenny1_amd64.deb
  to non-free/s/sun-java6/sun-java6-plugin_6-22-0lenny1_amd64.deb
sun-java6-plugin_6-22-0lenny1_i386.deb
  to non-free/s/sun-java6/sun-java6-plugin_6-22-0lenny1_i386.deb
sun-java6-source_6-22-0lenny1_all.deb
  to non-free/s/sun-java6/sun-java6-source_6-22-0lenny1_all.deb
sun-java6_6-22-0lenny1.diff.gz
  to non-free/s/sun-java6/sun-java6_6-22-0lenny1.diff.gz
sun-java6_6-22-0lenny1.dsc
  to non-free/s/sun-java6/sun-java6_6-22-0lenny1.dsc
sun-java6_6-22.orig.tar.gz
  to non-free/s/sun-java6/sun-java6_6-22.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 601...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Torsten Werner twer...@debian.org (supplier of updated sun-java6 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sat, 06 Nov 2010 10:56:16 +0100
Source: sun-java6
Binary: sun-java6-jre sun-java6-bin sun-java6-plugin ia32-sun-java6-bin 
ia32-sun-java6-plugin sun-java6-fonts sun-java6-jdk sun-java6-demo 
sun-java6-source sun-java6-doc sun-java6-javadb
Architecture: all amd64 i386 source
Version: 6-22-0lenny1
Distribution: stable
Urgency: low
Maintainer: Matthias Klose d...@ubuntu.com
Changed-By: Torsten Werner twer...@debian.org
Closes: 601802
Description: 
 ia32-sun-java6-bin - Sun Java(TM) Runtime Environment (JRE) 6 (32-bit)
 ia32-sun-java6-plugin - The Java(TM) Plug-in, Java SE 6 (32-bit)
 sun-java6-bin - Sun Java(TM) Runtime Environment (JRE) 6 (architecture 
dependent 
 sun-java6-demo - Sun Java(TM) Development Kit (JDK) 6 demos and examples
 sun-java6-doc - Sun JDK(TM) Documention -- integration installer
 sun-java6-fonts - Lucida TrueType fonts (from the Sun JRE)
 sun-java6-javadb - Java(TM) DB, Sun Microsystems' distribution of Apache Derby
 sun-java6-jdk - Sun Java(TM) Development Kit (JDK) 6
 sun-java6-jre - Sun Java(TM) Runtime Environment (JRE) 6 (architecture 
independen
 sun-java6-plugin - The Java(TM) Plug-in, Java SE 6
 sun-java6-source - Sun Java(TM) Development Kit (JDK) 6 source files
Changes: 
 sun-java6 (6-22-0lenny1) stable; urgency=low
 .
   * New upstream release (Closes: #601802)
   * SECURITY UPDATE: multiple upstream vulnerabilities. Upstream fixes:
 - 

Bug#603371: Update

2010-11-14 Thread Martin Gallant
I have made progress isolating the problem by using manual invocations of GNU 
tar.

Apparently the semantics of .tar .one-file-system. has changed.
If I remove this option from my test invocation, the dump proceeds normally.



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#565738: drupal: shouldn't enable on all sites by default

2010-11-14 Thread Patrick Matthäi
I agree with Gunnar.
This big is not realy security relevant, it would be, if there were open
security issues with..

Users could deactivate drupal easily by just removing the symlink and
this method is used by several other packages, so that they work after
installation.

Sure it would be nice to get asked by debconf if it should be activated,
but that is something like wishlist IMHO.

I recommend, that the submitter of this report or the package maintainer
will downgrade this bug to something != release critical.

-- 
/*
Mit freundlichem Gruß / With kind regards,
 Patrick Matthäi
 GNU/Linux Debian Developer

E-Mail: pmatth...@debian.org
patr...@linux-dev.org

Comment:
Always if we think we are right,
we were maybe wrong.
*/



signature.asc
Description: OpenPGP digital signature


Bug#585392: mysql-server: MySQL Server segfaults after upgrade

2010-11-14 Thread Patrick Matthäi
What happens if you decrease this values:

* key_buffer_size
* read_buffer_size
* sort_buffer_size
* max_connections (to something like 30)


Jun 10 09:46:06 gir mysqld[25223]: and this may fail.
Jun 10 09:46:06 gir mysqld[25223]:
Jun 10 09:46:06 gir mysqld[25223]: key_buffer_size=16777216
Jun 10 09:46:06 gir mysqld[25223]: read_buffer_size=131072
Jun 10 09:46:06 gir mysqld[25223]: max_used_connections=1
Jun 10 09:46:06 gir mysqld[25223]: max_connections=100
Jun 10 09:46:06 gir mysqld[25223]: threads_connected=1
Jun 10 09:46:06 gir mysqld[25223]: It is possible that mysqld could use
up to
Jun 10 09:46:06 gir mysqld[25223]: key_buffer_size + (read_buffer_size +
sort_buffer_size)*max_connections = 233983 K
Jun 10 09:46:06 gir mysqld[25223]: bytes of memory
Jun 10 09:46:06 gir mysqld[25223]: Hope that's ok; if not, decrease some
variables in the equation.

-- 
/*
Mit freundlichem Gruß / With kind regards,
 Patrick Matthäi
 GNU/Linux Debian Developer

E-Mail: pmatth...@debian.org
patr...@linux-dev.org

Comment:
Always if we think we are right,
we were maybe wrong.
*/



signature.asc
Description: OpenPGP digital signature


Processed: reassign 603371 tar 1.24-1

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 reassign 603371 tar 1.24-1
Bug #603371 [amanda-server] amanda-server: Cannot guntar dump local volumes on 
server
Bug reassigned from package 'amanda-server' to 'tar'.
Bug No longer marked as found in versions amanda/1:3.1.0-1.
Bug #603371 [tar] amanda-server: Cannot guntar dump local volumes on server
Bug Marked as found in versions tar/1.24-1.

End of message, stopping processing here.

Please contact me if you need assistance.
-- 
603371: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603371
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: scummvm: FTBFS on kfreebsd-*: undefined reference to alsa stuff

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags #600655 + patch
Bug #600655 [src:scummvm] scummvm: FTBFS on kfreebsd-*: undefined reference to 
alsa stuff
Added tag(s) patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
600655: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600655
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#600655: scummvm: FTBFS on kfreebsd-*: undefined reference to alsa stuff

2010-11-14 Thread Patrick Matthäi
tags #600655 + patch
thanks

Hello,

kfbsd does not support alsa, so I have patched (see attachment)
debian/rules to use --disable-alsa, if the build os is kfreebsd.

I have didn't tested, if there are other FTBFS, but for this bug it
should do it's job.
-- 
/*
Mit freundlichem Gruß / With kind regards,
 Patrick Matthäi
 GNU/Linux Debian Developer

E-Mail: pmatth...@debian.org
patr...@linux-dev.org

Comment:
Always if we think we are right,
we were maybe wrong.
*/
diff -Naur scummvm-1.2.0.orig/debian/rules scummvm-1.2.0/debian/rules
--- scummvm-1.2.0.orig/debian/rules	2010-10-17 16:01:38.0 +0200
+++ scummvm-1.2.0/debian/rules	2010-11-14 21:18:15.0 +0100
@@ -4,7 +4,8 @@
 	dh $@
 
 override_dh_auto_configure:
+ifeq ($(DEB_BUILD_ARCH_OS),kfreebsd)
+	./configure --prefix=/usr --datadir=/usr/share/scummvm --disable-alsa
+else
 	./configure --prefix=/usr --datadir=/usr/share/scummvm
-
-
-
+endif


signature.asc
Description: OpenPGP digital signature


Bug#601115: marked as done (adabrowse: FTBFS in squeeze: error: (/usr/lib/ada/adalib/asis/a4g-contt-dp.ali is obsolete and read-only))

2010-11-14 Thread Debian Bug Tracking System
Your message dated Sun, 14 Nov 2010 21:20:30 +0100
with message-id 8739r3r71t@ludovic-brenta.org
and subject line Re: Bug#601115: adabrowse: FTBFS in squeeze: error: 
(/usr/lib/ada/adalib/asis/a4g-contt-dp.ali is obsolete and read-only)
has caused the Debian Bug report #601115,
regarding adabrowse: FTBFS in squeeze: error: 
(/usr/lib/ada/adalib/asis/a4g-contt-dp.ali is obsolete and read-only)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
601115: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601115
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: adabrowse
Version: 4.0.3-4
Severity: serious
Tags: squeeze sid
User: debian...@lists.debian.org
Usertags: qa-ftbfs-20101023 qa-ftbfs
Justification: FTBFS on amd64

Hi,

During a rebuild of all packages in a squeeze chroot, your package failed
to build on amd64.

Relevant part:
  /usr/bin/fakeroot debian/rules clean
 QUILT_PATCHES=debian/patches \
   quilt --quiltrc /dev/null pop -a -R || test $? = 2
 No patch removed
 rm -rf .pc debian/stamp-patched
 dh_testdir
 dh_testroot
 rm -rf obj adabrowse sdefault.adb ad-projects-impl_yes-get_parent.adb
 rm -f build-stamp
 dh_clean
  dpkg-source -b adabrowse-4.0.3
 dpkg-source: warning: no source format specified in debian/source/format, see 
 dpkg-source(1)
 dpkg-source: info: using source format `1.0'
 dpkg-source: info: building adabrowse using existing 
 adabrowse_4.0.3.orig.tar.gz
 dpkg-source: info: building adabrowse in adabrowse_4.0.3-4.diff.gz
 dpkg-source: warning: ignoring deletion of file 
 ad-projects-impl_yes-get_parent.adb
 dpkg-source: warning: ignoring deletion of file sdefault.adb
 dpkg-source: info: building adabrowse in adabrowse_4.0.3-4.dsc
  debian/rules build
 QUILT_PATCHES=debian/patches \
   quilt --quiltrc /dev/null push -a || test $? = 2
 Applying patch 01-gnatmake.patch
 patching file ad-driver.adb
 patching file ad-projects.ads
 
 Applying patch 02-use-gnatgcc.patch
 patching file ad-setup.ads
 
 Now at patch 02-use-gnatgcc.patch
 touch debian/stamp-patched
 dh_testdir
 mkdir -p obj
 gcc -c util-nl.c -o obj/util-nl.o -O2
 gnatmake -j8 -Pdebian/misc/adabrowse.gpr
 gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA 
 /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/adabrowse.adb
 gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA 
 /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad.ads
 gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA 
 /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad-driver.adb
 ad-driver.adb:699:27: warning: VERBOSITY is already use-visible through 
 package use clause at line 158
 ad-driver.adb:1145:30: warning: FILE_ACCESS is already use-visible through 
 package use clause at line 156
 gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA 
 /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad-compiler.adb
 gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA 
 /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad-config.adb
 gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA 
 /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad-crossrefs.adb
 gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA 
 /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad-environment.adb
 gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA 
 /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad-exclusions.adb
 gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA 
 /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad-file_ops.adb
 gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA 
 /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad-filters.adb
 gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA 
 /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad-html.adb
 ad-crossrefs.adb:50:06: warning: redundant with clause in body
 ad-crossrefs.adb:52:06: warning: redundant with clause in body
 ad-crossrefs.adb:65:06: warning: redundant with clause in body
 ad-exclusions.adb:78:07: warning: K is not modified, could be declared 
 constant
 gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA 
 /build/user-adabrowse_4.0.3-4-amd64-QpJb0F/adabrowse-4.0.3/ad-indices.adb
 ad-html.adb:63:06: warning: redundant with clause in body
 gcc-4.4 -c -O2 -gnatafno -gnatVa -gnatwa -gnaty3abefhiklmprt -I- -gnatA 
 

Bug#601117: marked as done (adacontrol: FTBFS in squeeze: error: (/usr/lib/ada/adalib/asis/a4g-contt-dp.ali is obsolete and read-only))

2010-11-14 Thread Debian Bug Tracking System
Your message dated Sun, 14 Nov 2010 21:20:30 +0100
with message-id 8739r3r71t@ludovic-brenta.org
and subject line Re: Bug#601115: adabrowse: FTBFS in squeeze: error: 
(/usr/lib/ada/adalib/asis/a4g-contt-dp.ali is obsolete and read-only)
has caused the Debian Bug report #601117,
regarding adacontrol: FTBFS in squeeze: error: 
(/usr/lib/ada/adalib/asis/a4g-contt-dp.ali is obsolete and read-only)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
601117: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601117
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: adacontrol
Version: 1.12r4-1
Severity: serious
Tags: squeeze sid
User: debian...@lists.debian.org
Usertags: qa-ftbfs-20101023 qa-ftbfs
Justification: FTBFS on amd64

Hi,

During a rebuild of all packages in a squeeze chroot, your package failed
to build on amd64.

Relevant part:
  /usr/bin/fakeroot debian/rules clean
 QUILT_PATCHES=debian/patches \
   quilt --quiltrc /dev/null pop -a -R || test $? = 2
 No patch removed
 rm -rf .pc debian/stamp-patched
 rm -rf adactl pfni ptree obj
 dh_clean
  dpkg-source -b adacontrol-1.12r4
 dpkg-source: warning: no source format specified in debian/source/format, see 
 dpkg-source(1)
 dpkg-source: info: using source format `1.0'
 dpkg-source: info: building adacontrol using existing 
 adacontrol_1.12r4.orig.tar.gz
 dpkg-source: info: building adacontrol in adacontrol_1.12r4-1.diff.gz
 dpkg-source: info: building adacontrol in adacontrol_1.12r4-1.dsc
  debian/rules build
 QUILT_PATCHES=debian/patches \
   quilt --quiltrc /dev/null push -a || test $? = 2
 Applying patch info-dir-section.patch
 patching file doc/adacontrol_pm.info
 patching file doc/adacontrol_ug.info-1
 
 Applying patch gps-integration.patch
 patching file GPS/zadactl.xml
 
 Applying patch build.patch
 patching file src/build.gpr
 
 Now at patch build.patch
 touch debian/stamp-patched
 gnatmake -j8 -p -Psrc/build.gpr
 object directory 
 /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/../obj 
 created
 gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA 
 /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/adactl.adb
 gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA 
 /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/adactl_options.adb
 gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA 
 /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/framework.adb
 gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA 
 /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/framework-language.adb
 gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA 
 /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/framework-reports.adb
 gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA 
 /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/framework-rules_manager.adb
 gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA 
 /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/thick_queries.adb
 gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA 
 /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/units_list.adb
 gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA 
 /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/utilities.adb
 utilities.adb:91:18: warning: others choice is redundant
 utilities.adb:91:18: warning: previous choices cover all values
 gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA 
 /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/a4g_bugs.adb
 gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA 
 /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/linear_queue.adb
 gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA 
 /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/framework-control_manager.adb
 gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA 
 /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/adactl_constants.ads
 gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA 
 /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/binary_map.adb
 gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA 
 /build/user-adacontrol_1.12r4-1-amd64-QdBz__/adacontrol-1.12r4/src/framework-control_manager-generic_context_iterator.ads
 gcc-4.4 -c -g -O2 -gnatwa -gnatWh -gnat95 -gnatafo -g -I- -gnatA 
 

Bug#603511: proftpd: cve-2010-4221 remote code execution vulnerability

2010-11-14 Thread Michael Gilbert
Package: proftpd-dfsg
Version: 1.3.1-17lenny4
Severity: grave
Tags: security , patch

Hi,
the following CVE (Common Vulnerabilities  Exposures) id was
published for proftpd-dfsg.

CVE-2010-4221[0]:
| Multiple stack-based buffer overflows in the pr_netio_telnet_gets
| function in netio.c in ProFTPD before 1.3.3c allow remote attackers to
| execute arbitrary code via vectors involving a TELNET IAC escape
| character to a (1) FTP or (2) FTPS server.

Patch available:
http://bugs.proftpd.org/show_bug.cgi?id=3521

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4221
http://security-tracker.debian.org/tracker/CVE-2010-4221



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#603513: yui: multiple xss issues in included swf files

2010-11-14 Thread Michael Gilbert
Package: yui
Version: 2.5.0-1
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities  Exposures) ids were
published for yui.

CVE-2010-4207[0]:
| Cross-site scripting (XSS) vulnerability in the Flash component
| infrastructure in YUI 2.4.0 through 2.8.1, as used in Bugzilla,
| Moodle, and other products, allows remote attackers to inject
| arbitrary web script or HTML via vectors related to
| charts/assets/charts.swf.

CVE-2010-4208[1]:
| Cross-site scripting (XSS) vulnerability in the Flash component
| infrastructure in YUI 2.5.0 through 2.8.1, as used in Bugzilla,
| Moodle, and other products, allows remote attackers to inject
| arbitrary web script or HTML via vectors related to
| uploader/assets/uploader.swf.

CVE-2010-4209[2]:
| Cross-site scripting (XSS) vulnerability in the Flash component
| infrastructure in YUI 2.8.0 through 2.8.1, as used in Bugzilla 3.7.1
| through 3.7.3 and 4.1, allows remote attackers to inject arbitrary web
| script or HTML via vectors related to swfstore/swfstore.swf.

These are fixed in upstream 2.8.2.  I couldn't find the patches, and
you're going to need source for the affected swf files anyway (i.e. fix
bug #591199 first).

If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4207
http://security-tracker.debian.org/tracker/CVE-2010-4207
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4208
http://security-tracker.debian.org/tracker/CVE-2010-4208
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4209
http://security-tracker.debian.org/tracker/CVE-2010-4209



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#600571: perl: Fails to complete unpack during installation

2010-11-14 Thread Niko Tyni
severity 600571 important
thanks

On Tue, Oct 19, 2010 at 09:35:28AM +0300, Niko Tyni wrote:
 On Mon, Oct 18, 2010 at 10:33:57AM +0100, Roger Leigh wrote:
  Package: perl
  Version: 5.10.1-15
  Severity: serious
  Justification: Breaks installation
  
  While dist-upgrading my system today, the perl package failed to 
  unpack/configure 
  (transcript below) and hung for over an hour until I killed the dpkg 
  process.  After 
  running dpkg --configure -a and apt-get -f install the package then 
  continued to 
  configure correctly.  It looks like it was somehow stuck between unpacking 
  and 
  configuring.  There was no response in the terminal to any keys (I tried 
  hitting enter, 
  but there was no response to the input, so maybe apt-get was doing 
  something odd with 
  termios if this wasn't a deliberate action by the perl maintainer scripts).

 This is very weird. No, the maintainer scripts of the perl package
 certainly don't mess with ptys in any way and actually do nothing at
 the unpack stage of an upgrade. There are no conffiles and no debconf
 usage either.

 The package seems to work for other people (10 days in unstable without
 other reports) and the changes in 5.10.1-15 seem unlikely to cause
 something like this.
 
 My best guess is that this is either a problem with your system or some
 corner case in apt-get / dpkg interaction but this is all just handwaving.
 
 Tagging as unreproducible, let's wait a while for any other reports. The
 package just migrated to squeeze so there should be plenty of people
 upgrading in the next few days.

Now that we've seen 5.10.1-16 migrate to squeeze too after ten days in
unstable and no other reports of anything like this, I think it's clear
this is not an issue with the perl package.

I'm downgrading the severity so that RC bughunters can concentrate on other
things. TBH, I don't see much point in keeping the bug open at all.

Roger, please let me know if you're OK with closing this or if you want it
reassigned somewhere else. Personally I doubt the dpkg or apt maintainers
can do much about it either.
-- 
Niko Tyni   nt...@debian.org



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#600571: perl: Fails to complete unpack during installation

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 600571 important
Bug #600571 [perl] perl: Fails to complete unpack during installation
Severity set to 'important' from 'serious'

 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
600571: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600571
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#594119: marked as done (Upgrade path from Lenny to Squeeze is broken)

2010-11-14 Thread Debian Bug Tracking System
Your message dated Sun, 14 Nov 2010 20:53:31 +
with message-id e1phjzr-00073k...@franck.debian.org
and subject line Bug#594119: fixed in sympa 6.0.1+dfsg-3
has caused the Debian Bug report #594119,
regarding Upgrade path from Lenny to Squeeze is broken
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
594119: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594119
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: sympa
Version: 6.0.1+dfsg-2
Severity: critical


{,family,bounce}queue binaries are now installed in
/usr/lib/sympa/lib/sympa/ instead of /usr/lib/sympa/bin before. It will
breaks mail aliases used by SYMPA during the upgrade from Lenny to
Squeeze. It also means that the snippet installed in /etc/aliases can't
work for now.


M.

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (101, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.33-2-686 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


---End Message---
---BeginMessage---
Source: sympa
Source-Version: 6.0.1+dfsg-3

We believe that the bug you reported is fixed in the latest version of
sympa, which is due to be installed in the Debian FTP archive:

sympa_6.0.1+dfsg-3.debian.tar.gz
  to main/s/sympa/sympa_6.0.1+dfsg-3.debian.tar.gz
sympa_6.0.1+dfsg-3.dsc
  to main/s/sympa/sympa_6.0.1+dfsg-3.dsc
sympa_6.0.1+dfsg-3_amd64.deb
  to main/s/sympa/sympa_6.0.1+dfsg-3_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 594...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Stefan Hornburg (Racke) ra...@linuxia.de (supplier of updated sympa package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sun, 14 Nov 2010 21:16:36 +0100
Source: sympa
Binary: sympa
Architecture: source amd64
Version: 6.0.1+dfsg-3
Distribution: testing-proposed-updates
Urgency: low
Maintainer: Debian Sympa team pkg-sympa-de...@lists.alioth.debian.org
Changed-By: Stefan Hornburg (Racke) ra...@linuxia.de
Description: 
 sympa  - Modern mailing list manager
Closes: 583307 583852 586821 590225 590337 590590 594119
Changes: 
 sympa (6.0.1+dfsg-3) testing-proposed-updates; urgency=low
 .
   [ Stefan Hornburg (Racke) ]
   * Provide symbolic links for queue binaries to prevent broken mail
 aliases on upgrades from Lenny (Closes: #594119).
 .
   [ Emmanuel Bouthenot ]
   * Add or Update debconf translations:
 - Portuguese: Thanks to Miguel Figueiredo (Closes: #583307).
 - Spanish: Thanks to Francisco Javier Cuadrado (Closes: #583852).
 - Swedish: Thanks to Martin Bagge (Closes: #586821).
 - Japanese: Thanks to Hideki Yamane (Closes: #590225).
 - Czech: Thanks to Miroslav Kure (Closes: #590337).
 - Basque: Thanks to Iñaki Larrañaga Murgoitio (Closes: 590590).
   * Update copyright file with new and updated debconf translations.
   * Add a patch to disable the build of PO files previously removed from
 the DFSG sources (fix a FTBFS).
Checksums-Sha1: 
 01e547999b119a71b53400b4b71a0714618b0321 1984 sympa_6.0.1+dfsg-3.dsc
 dfb40318b0b602c3af480e75f938d20acb1758f6 108701 
sympa_6.0.1+dfsg-3.debian.tar.gz
 8766ed4f5f650fb234428d4af501f54d516401f5 1153294 sympa_6.0.1+dfsg-3_amd64.deb
Checksums-Sha256: 
 5b93155b9615b9216e6868ce660ac92158b0b56da3b64d1b7b9a6dee40c053ae 1984 
sympa_6.0.1+dfsg-3.dsc
 6d48fd1e76075edbb5e8b33e4b7778b2d679622c8b0bfdab93ce1cd1826f92a9 108701 
sympa_6.0.1+dfsg-3.debian.tar.gz
 c18e5adfb0e0d8840129ff18f126ce488df21a4c876a051e73d5360c082ef5ec 1153294 
sympa_6.0.1+dfsg-3_amd64.deb
Files: 
 29aa78655c8d44f9742e6f60479d3168 1984 mail optional sympa_6.0.1+dfsg-3.dsc
 04de41a5a9a2487b9678f57973558663 108701 mail optional 
sympa_6.0.1+dfsg-3.debian.tar.gz
 f887eb37acdde133127c0ae3a7ebacff 1153294 mail optional 
sympa_6.0.1+dfsg-3_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkzgRa8ACgkQjgVfE5tya3GMWQCcDpLuh6ZDgrdx+oWYuhkPmv00
PJoAoIW9/rAqghmcw2egMMfLV9Vpjqiq
=943A
-END PGP SIGNATURE-


---End Message---


Bug#603511: marked as done (proftpd: cve-2010-4221 remote code execution vulnerability)

2010-11-14 Thread Debian Bug Tracking System
Your message dated Sun, 14 Nov 2010 22:10:12 +0100
with message-id 20101114211012.gq5...@radis.liafa.jussieu.fr
and subject line Re: Bug#603511: proftpd: cve-2010-4221 remote code execution 
vulnerability
has caused the Debian Bug report #603511,
regarding proftpd: cve-2010-4221 remote code execution vulnerability
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
603511: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603511
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: proftpd-dfsg
Version: 1.3.1-17lenny4
Severity: grave
Tags: security , patch

Hi,
the following CVE (Common Vulnerabilities  Exposures) id was
published for proftpd-dfsg.

CVE-2010-4221[0]:
| Multiple stack-based buffer overflows in the pr_netio_telnet_gets
| function in netio.c in ProFTPD before 1.3.3c allow remote attackers to
| execute arbitrary code via vectors involving a TELNET IAC escape
| character to a (1) FTP or (2) FTPS server.

Patch available:
http://bugs.proftpd.org/show_bug.cgi?id=3521

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4221
http://security-tracker.debian.org/tracker/CVE-2010-4221


---End Message---
---BeginMessage---
On Sun, Nov 14, 2010 at 15:46:09 -0500, Michael Gilbert wrote:

 Package: proftpd-dfsg
 Version: 1.3.1-17lenny4
 Severity: grave
 Tags: security , patch
 
 Hi,
 the following CVE (Common Vulnerabilities  Exposures) id was
 published for proftpd-dfsg.
 
 CVE-2010-4221[0]:
 | Multiple stack-based buffer overflows in the pr_netio_telnet_gets
 | function in netio.c in ProFTPD before 1.3.3c allow remote attackers to
 | execute arbitrary code via vectors involving a TELNET IAC escape
 | character to a (1) FTP or (2) FTPS server.
 
Sounds like a dupe of 602279, which is fixed in sid/squeeze and doesn't
affect lenny.  Please reopen if that's wrong.

Cheers,
Julien


signature.asc
Description: Digital signature
---End Message---


Bug#599333: marked as done (request-tracker3.8: $WebPath debconf variable is reset to its default value when upgrading package)

2010-11-14 Thread Debian Bug Tracking System
Your message dated Sun, 14 Nov 2010 21:28:13 +
with message-id e1phk7r-0005ec...@franck.debian.org
and subject line Bug#599333: fixed in request-tracker3.8 3.8.8-6
has caused the Debian Bug report #599333,
regarding request-tracker3.8: $WebPath debconf variable is reset to its default 
value when upgrading package
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
599333: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599333
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: request-tracker3.8
Version: 3.8.8-5
Severity: normal

We have $WebPath set to an empty string as we're hosting RT using
virtual hosts (and hence no path dispatching is needed).
The variable is set using debconf dialog.

When upgrading the package this variable is reset to its default
value, /rt. Other variables survive upgrading.

I first faced this when I was upgrading stock request-tracking3.8 from
Squeeze to the set of throw-away packages provided by Dominic to test
his fix for #595054 (race condition), and now I encountered it again
when upgrading to the actual version (containing the said fix).

I'm not sure but possibly an empty string is treated in a somehow
special manner by the debconf machinery or RT maintainer scripts.

By the way when I was setting RT for the first time, I tried to set that
variable to / as I thought it was a sensible way to specify no path
component but it turned out RT disliked it and failed to find various
resources such as images, styles and scripts, so I figured out an empty
string works OK.

-- Package-specific info:
Changed files:

There are locally modified files in /usr/local/share/request-tracker3.8/,
 these may (or may not) be the source of the problem.


-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages request-tracker3.8 depends on:
ii  dbconfig-common 1.8.46   common framework for packaging dat
ii  debconf [debconf-2.0]   1.5.35   Debian configuration management sy
ii  libapache-session-perl  1.87-1   Perl modules for keeping persisten
ii  libcache-simple-timedexpiry 0.27-2   Perl module to cache and expire ke
ii  libcalendar-simple-perl 1.21-1   module for producing simple calend
ii  libcgi-fast-perl5.10.1-14CGI::Fast Perl module
ii  libcgi-pm-perl  3.49-1   module for Common Gateway Interfac
ii  libclass-returnvalue-perl   0.55-1   A return-value object that lets yo
ii  libcss-squish-perl  0.09-1   module to compact many CSS files i
ii  libdata-ical-perl   0.16+dfsg-1  Perl module for manipulating iCale
ii  libdbi-perl 1.612-1  Perl Database Interface (DBI)
ii  libdbix-searchbuilder-perl  1.56-1   Perl implementation of a simple OR
ii  libdevel-stacktrace-perl1.2100-1 Perl module containing stack trace
ii  libemail-address-perl   1.889-2  RFC 2822 Address Parsing and Creat
ii  libfcgi-procmanager-perl0.18-2   Functions for managing FastCGI app
ii  libfile-sharedir-perl   1.00-0.1 Locate per-dist and per-module sha
ii  libgd-graph-perl1.44-3   Graph Plotting Module for Perl 5
ii  libgd-text-perl 0.86-5   Text utilities for use with GD
ii  libgnupg-interface-perl 0.42-3   Perl interface to GnuPG
ii  libgraphviz-perl2.04-1   Perl interface to the GraphViz gra
ii  libhtml-mason-perl  1:1.44-1 HTML::Mason Perl module
ii  libhtml-parser-perl 3.66-1   collection of modules that parse H
ii  libhtml-rewriteattributes-p 0.03-1   concise attribute rewriting
ii  libhtml-scrubber-perl   0.08-4   Perl extension for scrubbing/sanit
ii  libipc-run-safehandles-perl 0.02-1   Use IPC::Run and IPC::Run3 safely
ii  libjs-prototype 1.6.1-1  JavaScript Framework for dynamic w
ii  libjs-scriptaculous 1.8.3-1  JavaScript library for dynamic web
ii  liblocale-maketext-fuzzy-pe 0.10-1   Maketext from already interpolated
ii  liblocale-maketext-lexicon- 0.82-1   lexicon-handling backends for Loca
ii  liblog-dispatch-perl2.22-1   Dispatches messages to multiple Lo
ii  libmailtools-perl   2.06-1   Manipulate email in perl programs
ii  libmime-tools-perl [libmime 5.428-1  Perl5 modules for MIME-compliant m
ii  

Bug#602570: marked as done (fails to install because of /etc/cron.d/ missing)

2010-11-14 Thread Debian Bug Tracking System
Your message dated Sun, 14 Nov 2010 21:28:13 +
with message-id e1phk7r-0005ei...@franck.debian.org
and subject line Bug#602570: fixed in request-tracker3.8 3.8.8-6
has caused the Debian Bug report #602570,
regarding fails to install because of /etc/cron.d/ missing
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
602570: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602570
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: request-tracker3.8
Version: 3.8.8-5
Severity: serious

Hi,

if cron is not installed (because rt correctly doesn't declare a depends
to it), and request-tracker3.8/install-cronjobs is answered yes, then
the postinst fails because /etc/cron.d/ is missing.

therefore, you should always create /etc/cron.d to make sure it exists.
will send patch after having recieved the bug number.

Regards,
Daniel

-- 
Address:Daniel Baumann, Burgunderstrasse 3, CH-4562 Biberist
Email:  daniel.baum...@panthera-systems.net
Internet:   http://people.panthera-systems.net/~daniel-baumann/


---End Message---
---BeginMessage---
Source: request-tracker3.8
Source-Version: 3.8.8-6

We believe that the bug you reported is fixed in the latest version of
request-tracker3.8, which is due to be installed in the Debian FTP archive:

request-tracker3.8_3.8.8-6.diff.gz
  to main/r/request-tracker3.8/request-tracker3.8_3.8.8-6.diff.gz
request-tracker3.8_3.8.8-6.dsc
  to main/r/request-tracker3.8/request-tracker3.8_3.8.8-6.dsc
request-tracker3.8_3.8.8-6_all.deb
  to main/r/request-tracker3.8/request-tracker3.8_3.8.8-6_all.deb
rt3.8-apache2_3.8.8-6_all.deb
  to main/r/request-tracker3.8/rt3.8-apache2_3.8.8-6_all.deb
rt3.8-clients_3.8.8-6_all.deb
  to main/r/request-tracker3.8/rt3.8-clients_3.8.8-6_all.deb
rt3.8-db-mysql_3.8.8-6_all.deb
  to main/r/request-tracker3.8/rt3.8-db-mysql_3.8.8-6_all.deb
rt3.8-db-postgresql_3.8.8-6_all.deb
  to main/r/request-tracker3.8/rt3.8-db-postgresql_3.8.8-6_all.deb
rt3.8-db-sqlite_3.8.8-6_all.deb
  to main/r/request-tracker3.8/rt3.8-db-sqlite_3.8.8-6_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 602...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Dominic Hargreaves d...@earth.li (supplier of updated request-tracker3.8 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sun, 14 Nov 2010 21:00:14 +
Source: request-tracker3.8
Binary: request-tracker3.8 rt3.8-clients rt3.8-apache2 rt3.8-db-postgresql 
rt3.8-db-mysql rt3.8-db-sqlite
Architecture: source all
Version: 3.8.8-6
Distribution: unstable
Urgency: low
Maintainer: Debian Request Tracker Group 
pkg-request-tracker-maintain...@lists.alioth.debian.org
Changed-By: Dominic Hargreaves d...@earth.li
Description: 
 request-tracker3.8 - extensible trouble-ticket tracking system
 rt3.8-apache2 - Apache 2 specific files for request-tracker3.8
 rt3.8-clients - mail gateway and command-line interface to request-tracker3.8
 rt3.8-db-mysql - MySQL database backend for request-tracker3.8
 rt3.8-db-postgresql - PostgreSQL database backend for request-tracker3.8
 rt3.8-db-sqlite - SQLite database backend for request-tracker3.8
Closes: 599333 602570 603247
Changes: 
 request-tracker3.8 (3.8.8-6) unstable; urgency=low
 .
   * Make sure /etc/cron.d exists in postinst before installing cronjob,
 to cater for the case where cron is not installed (Closes: #602570)
   * Add cron-daemon to Recommends
   * Allow for an empty $WebPath config variable in debconf in
 debian/config (Closes: #599333)
   * Improve documentation for rt-dump-database and add pointers to
 UPGRADING in NOTES.Debian (Closes: #603247)
Checksums-Sha1: 
 80470457fd7940ca5b7d9703f6845e8155dc4a6a 1596 request-tracker3.8_3.8.8-6.dsc
 9591e71b101f7ad01a7c2668d464cd0fa8f33b29 72886 
request-tracker3.8_3.8.8-6.diff.gz
 19094fe4f82cc1d758273529f1ce163ff0baaf0f 4652822 
request-tracker3.8_3.8.8-6_all.deb
 b1d3693b5d35507c10a5d2fe8c70e12335cf23f5 46578 rt3.8-clients_3.8.8-6_all.deb
 8833d3f1e460fb700fc30a9d08572bec55a9cbd8 11880 rt3.8-apache2_3.8.8-6_all.deb
 0f682c9f328f0f7d781b94d587a39356d81e06a2 10544 
rt3.8-db-postgresql_3.8.8-6_all.deb
 27cef63801400ea8816eb719e2bbb7d4447d78d5 10540 

Bug#579523: pkgsel - Does not detect ENOSPC errors

2010-11-14 Thread Steve M. Robbins
On Sat, Jun 19, 2010 at 02:34:53PM +0100, Martin Michlmayr wrote:
 * Bastian Blank wa...@debian.org [2010-04-28 12:03]:
  On Mon, Apr 05, 2010 at 11:09:56PM +0200, Bastian Blank wrote:
   - 1GiB is not longer sufficient as /var as the to be installed packages
 are already larger. However there is no clear error shown after
 aptitude via tasksel (why does it need aptitude anyway?) hits ENOSPC.
 
 This sounds like #264903 in tasksel to me.

Shall we merge the bugs, then?

-Steve


signature.asc
Description: Digital signature


Bug#603237: #603237: python2.7-minimal: fails to configure with IOError: invalid Python installation: unable to open /usr/lib/python2.7/config/Makefile

2010-11-14 Thread Jonathan Nieder
Matthias Klose wrote:

* Move the pyconfig.h file into the -min package, required by sysconfig.

Thanks again.  It works now.



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#557495: Bug #557495 pending?

2010-11-14 Thread Steve M. Robbins
Hello,

The freeze is quickly deepening and as Ralf Treinen noted, the bug has
been marked as pending; can that be uploaded to resolve this?

If not, I can prepare an NMU that just declares the undeclared package
conflict which will resolve the bug.  After the squeeze release, a
more sophisticated solution can be uploaded.

Cheers,
-Steve


signature.asc
Description: Digital signature


Processed: Fwd: Re: Bug#603117: roarplaylistd: ..needs a wee jump starting 'touch /tmp/.rpld '

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity #603117 grave
Bug #603117 [roarplaylistd] roarplaylistd: ..needs a wee jump starting 'touch 
/tmp/.rpld '
Severity set to 'grave' from 'minor'

 merge #603042 #603117
Bug#603042: roarplaylistd: /tmp/.rpld may fail to materialize
Bug#603117: roarplaylistd: ..needs a wee jump starting 'touch /tmp/.rpld '
Merged 603042 603117.

 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
603042: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603042
603117: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603117
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#594150: Bug#594153: Bug#594150: CURLOPT_TIMEOUT defaults to zero seconds

2010-11-14 Thread Steve M. Robbins
On Sun, Nov 14, 2010 at 03:17:16PM +, Simon McVittie wrote:
 On Sun, 14 Nov 2010 at 12:51:34 +0100, Daniel Stenberg wrote:
  This turned out to be a minor bug in curl, yes, and I've fixed it
  upstream now.
 
 Thanks!
 
 (https://github.com/bagder/curl/commit/cbf4961bf3e42d88f6489f981efd509faa86f501
 for those following the Debian bug log)

Wow, thanks a heap to Daniel and Simon for investigating this issue
because it's been way over my head :-)

My interest is in reducing the RC bug count to get squeeze released.
So let me ask the questions: 

1. There was a minor bug in curl now fixed upstream and in github; is
   there really an RC bug here?  
2. If so, is it in curl or in apt-transport-https?

Cheers,
-Steve



signature.asc
Description: Digital signature


Processed: tagging 582964

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 582964 + patch
Bug #582964 [cscope] emacs-install should be moved from cscope to cscope-el too
Bug #603081 [cscope] cscope-el: fails to install
Added tag(s) patch.
Added tag(s) patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
582964: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582964
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#599966: Forwarding articles to moderators is broken / FTBFS

2010-11-14 Thread Steve M. Robbins
Hi,

Marco: are you actively working on these issues?  If not, I can prepare an NMU.

Julien: have there been any more patches upstream for the moderator
issue in addition to the two you pointed to?

Thanks,
-Steve



signature.asc
Description: Digital signature


Processed: tagging 570899, tagging 592678

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 570899 + sid
Bug #570899 [src:gxemul] gxemul: FTBFS on kfreebsd-i386: 1 TESTS FAILED!
Added tag(s) sid.
 tags 592678 + sid
Bug #592678 [src:gxemul] gxemul: FTBFS on mips*: ../include/cpu.h:441: error: 
expected unqualified-id before numeric constant
Added tag(s) sid.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
592678: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=592678
570899: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=570899
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#598135: Forwarding articles to moderators is broken / FTBFS

2010-11-14 Thread Steve M. Robbins
On Sun, Nov 14, 2010 at 04:41:31PM -0600, Steve M. Robbins wrote:
 Hi,
 
 Marco: are you actively working on these issues?  If not, I can prepare an 
 NMU.

Hi again.  I did a little digging for the FTBFS (#599966) and
subsequently realized it only affects sid, so it's not required to
release squeeze.  Moreover, the current sid version of inn2
build-depends on libdb5.0-dev, which no longer exists in unstable (was
replaced by 5.1) and was never in testing.  So, rather than get mixed up
in a libdb transition (if there is one), what do you think about uploading
a fix for #598135 targeted only for testing that drops back to libdb 4.8?

Cheers,
-Steve


signature.asc
Description: Digital signature


Bug#600374: mokomaze: uses non-free, possibly non-distributable icons

2010-11-14 Thread Steve M. Robbins
Hello,

On Sat, Oct 16, 2010 at 11:18:27PM +0800, Paul Wise wrote:

 I've forwarded this bug upstream so hopefully they will apply my patches
 and replace these icons with something DSFG-free.

Paul, since you have made patches, could you upload a fixed version
to Debian and resolve this RC bug?

Thanks,
-Steve


signature.asc
Description: Digital signature


Bug#600374: mokomaze: uses non-free, possibly non-distributable icons

2010-11-14 Thread Paul Wise
On Sun, 2010-11-14 at 17:39 -0600, Steve M. Robbins wrote:
 On Sat, Oct 16, 2010 at 11:18:27PM +0800, Paul Wise wrote:
 
  I've forwarded this bug upstream so hopefully they will apply my patches
  and replace these icons with something DSFG-free.
 
 Paul, since you have made patches, could you upload a fixed version
 to Debian and resolve this RC bug?

I should clarify. The patches I wrote are for other issues (mostly
autotools cleanup). When I sent the patches upstream I also informed the
maintainer about the non-free icons. I quote from our email exchange:

On Sat, 2010-10-16 at 23:26 +0800, Paul Wise wrote:

 In addition it appears that the Blue Velvet icons you are using are
 non-free anyway and you and I do not have permission to modify them or
 distribute them on CD or anywhere else not on the Internet:
 
 http://bugs.debian.org/600374
 http://dryicons.com/terms/free/

On Sat, 2010-10-16 at 20:43 +0400, Anton Olkhovik wrote:

 Yes, they are needed to be replaced, but I have no skill in drawing
 and I'm not familiar with any artist that will draw for free. Maybe
 some suitable icons can be found within KDE/Gnome themes.

Anton, did you make any progress in finding some replacements?

-- 
bye,
pabs

http://wiki.debian.org/PaulWise


signature.asc
Description: This is a digitally signed message part


Processed: severity of 601568 is serious

2010-11-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 601568 serious
Bug #601568 {Done: Charles Plessy ple...@debian.org} [bwa] bwa: Bug in 
scoring matrix incurs errors in indel calling.
Severity set to 'serious' from 'important'


End of message, stopping processing here.

Please contact me if you need assistance.
-- 
601568: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601568
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



  1   2   >