Bug#294895: dependency problems prevent configuration of a2ps

2005-02-11 Thread Richard Lewis
Package: a2ps
Version: 1:4.13b-4.3
Severity: grave
Justification: renders package unupgradeable

(I hope the severity is appropriate; it's not exactly hard to fix the
problem but clearly something needs to be fixed)

When doing a "apt-get dist-upgrade" (from version 1:4.13b-4)
I got the following error

dpkg: dependency problems prevent configuration of a2ps:
 a2ps depends on emacsen-common; however:
   Package emacsen-common is not configured yet.
   dpkg: error processing a2ps (--configure):
dependency problems - leaving unconfigured

re-running "apt-get dist-upgrade" fixed things.
emacsen-common was upgraded from 1.4.15 -> 1.4.16



-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.10-2005-01-22
Locale: LANG=en_GB, LC_CTYPE=en_GB (charmap=ISO-8859-1)

Versions of packages a2ps depends on:
ii  emacsen-common  1.4.16   Common facilities for all emacsen
ii  libc6   2.3.2.ds1-20 GNU C Library: Shared libraries an
ii  libpaper1   1.1.14-3 Library for handling paper charact

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#294896: CAN-2005-0365: insecure temporary file creation in kdelibs 3.3.2

2005-02-11 Thread Martin Schulze
Package: kdelibs
Version: 3.2.3-3.sarge.2 3.3.2-1
Severity: grave
Tags: security sarge sid patch

Please
 . update the package in sid
 . mention the CVE id from the subject in the changelog
 . use priority=high
 . you probably need to upload into testing-proposed-updates as well

Regards,

Joey


- Forwarded message from Davide Madrisan <[EMAIL PROTECTED]> -

From: Davide Madrisan <[EMAIL PROTECTED]>
Organization: QiNet s.r.l.
To: bugtraq@securityfocus.com
Subject: insecure temporary file creation in kdelibs 3.3.2
Date: Fri, 11 Feb 2005 09:16:38 +0100

The `dcopidlng' script in the KDE library package 
(kdelibs-3.3.2/dcop/dcopidlng/dcopidlng)
creates temporary files in a unsecure manner.

This bug has been fixed in 32 minutes (!) by Stephan Kulow, the KDE team 
leader. Here you can found the official patch:
http://bugs.kde.org/show_bug.cgi?id=97608

Note: This bug has been find by `autospec', the work-in-progress tool used by 
the QiLinux team to (semi)automatically create specfiles from tarballs and 
update/check rpm packages. It's released under GPL and not QiLinux specific.
The latest release can be found at the URL:
ftp://ftp.qilinux.it/pub/QiLinux/devel/tools/autospec/

#include 
---
Davide Madrisan
QiLinux Security Team Leader
PGP keyID: 4B72B0B9 fp: 2B79 BFF1 EE33 EE8C 3258 E43C CDA8 EFF3 4B72 B0B9
PGP public key: 
http://www.qilinux.it



- End forwarded message -

-- 
If you come from outside of Finland, you live in wrong country.
-- motd of irc.funet.fi

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Processed: new version only in sid

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 294831 sid
Bug#294831: piwi: FTBFS: chmod: cannot access `/etc/piwi/config.pl': No such 
file or directory
There were no tags set.
Tags added: sid

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#294865: coq-doc: The documentation for coq is non-free (this issue is being solved)

2005-02-11 Thread Steve Langasek
> I'm dealing this issue with upstream (it should be released under GPL) but
> it should not be released with sarge if this issue has been solved in the
> meantime which is why I'm filling this RC bug.

Do you mean that the package should not be released with sarge if the issue
has *not* been solved?

-- 
Steve Langasek
postmodern programmer


signature.asc
Description: Digital signature


Bug#294751: marked as done (FTBFS: cannot build powerpc 2.6 kernels, missing rule for conf.vars)

2005-02-11 Thread Debian Bug Tracking System
Your message dated Sat, 12 Feb 2005 02:02:02 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#294751: fixed in kernel-package 8.121
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 11 Feb 2005 13:28:07 +
>From [EMAIL PROTECTED] Fri Feb 11 05:28:07 2005
Return-path: <[EMAIL PROTECTED]>
Received: from smtp3.wanadoo.fr [193.252.22.28] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1Czaq7-0001nC-00; Fri, 11 Feb 2005 05:28:07 -0800
Received: from me-wanadoo.net (localhost [127.0.0.1])
by mwinf0303.wanadoo.fr (SMTP Server) with ESMTP id BB0921C0038C;
Fri, 11 Feb 2005 14:27:35 +0100 (CET)
Received: from pegasos (AStrasbourg-251-1-57-187.w82-126.abo.wanadoo.fr 
[82.126.137.187])
by mwinf0303.wanadoo.fr (SMTP Server) with ESMTP id 7C4911C003E2;
Fri, 11 Feb 2005 14:27:35 +0100 (CET)
X-ME-UUID: [EMAIL PROTECTED]
Received: from luther by pegasos with local (Exim 4.44)
id 1Czajz-0003Bd-54; Fri, 11 Feb 2005 14:21:47 +0100
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Sven Luther <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: FTBFS: cannot build powerpc 2.6 kernels, missing rule for conf.vars
X-Mailer: reportbug 3.7.1
Date: Fri, 11 Feb 2005 14:21:47 +0100
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: kernel-package
Version: 8.120
Severity: serious
Justification: FTBFS


As said, i am not able to build the powerpc 2.6.10 kernel package with this,
while building it with my 8.119 + versioned script hack worked fine :

cd
/home/sven/debian/kernel/build/kernel-patch-powerpc-2.6.10-2.6.10/tmp/kernel-source-2.6.10;
APPEND_TO_VERSION='' make-kpkg configure
make[1]: Entering directory
`/home/sven/debian/kernel/build/kernel-patch-powerpc-2.6.10-2.6.10/tmp/kernel-source-2.6.10'
# work around idiocy in recent kernel versions
test ! -e scripts/package/builddeb || \
mv -f scripts/package/builddeb scripts/package/builddeb.dist
test ! -e scripts/package/Makefile || \
(mv -f scripts/package/Makefile scripts/package/Makefile.dist && \
   echo "# Dummy file " >  scripts/package/Makefile)
test ! -f stamp-debian && test ! -f debian/official && \
  rm -rf ./debian && mkdir ./debian
make[1]: [stamp-debian] Error 1 (ignored)
test ! -f stamp-debian && \
   ( test ! -f debian/official || test ! -f debian/control) && \
   sed -e 's/=V/2.6.10/g'-e 's/=D/2.6.10-2/g'   \
   -e 's/=A/powerpc/g'   -e 's/=SA//g' \
-e 's/=L/quik, /g' -e 's/=I/initrd-tools (>= 0.1.48), /g'\
-e 's/=CV/2.6/g' \
-e 's/=M/Unknown Kernel Package Maintainer
<[EMAIL PROTECTED]>/g'\
-e 's/=ST/kernel/g'  \
 /usr/share/kernel-package/Control> debian/control
make[1]: [stamp-debian] Error 1 (ignored)
test ! -f stamp-debian && test ! -f debian/official &&  \
   sed -e 's/=V/2.6.10/g' -e 's/=D/2.6.10-2/g'  \
-e 's/=A/powerpc/g' -e 's/=M/Unknown Kernel Package Maintainer
<[EMAIL PROTECTED]>/g' \
-e 's/=ST/kernel/g' \
/usr/share/kernel-package/changelog > debian/changelog
make[1]: [stamp-debian] Error 1 (ignored)
test ! -f debian/rules &&   \
   install -p -m 755 /usr/share/kernel-package/rules debian/rules
echo done >  stamp-debian
make[1]: *** No rule to make target `conf.vars', needed by `stamp-configure'.
Stop.
make[1]: Leaving directory
`/home/sven/debian/kernel/build/kernel-patch-powerpc-2.6.10-2.6.10/tmp/kernel-source-2.6.10'
make: *** [stamp-configure] Error 2

Hope you can find what is broken here :)

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: powerpc (ppc)
Kernel: Linux 2.6.8-powerpc
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages kernel-package depends on:
ii  dpkg 1.10.26 Package maintenance system for Deb
ii  dpkg-dev   

Bug#294867: base: de4x5.ko generates endless loop of errors with phobos p430tx

2005-02-11 Thread Steve Langasek
reassign 294867 hotplug
thanks

This sounds like a problem with hotplug (or discover?) loading the wrong
driver for the hardware.

-- 
Steve Langasek
postmodern programmer


signature.asc
Description: Digital signature


Bug#294889: marked as done (kernel-package locks up when building)

2005-02-11 Thread Debian Bug Tracking System
Your message dated Sat, 12 Feb 2005 02:02:02 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#294889: fixed in kernel-package 8.121
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 12 Feb 2005 05:36:09 +
>From [EMAIL PROTECTED] Fri Feb 11 21:36:09 2005
Return-path: <[EMAIL PROTECTED]>
Received: from dialup-4.246.102.250.dial1.sanjose1.level3.net 
(nofear.bounceme.net) [4.246.102.250] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1Czpwu-00081z-00; Fri, 11 Feb 2005 21:36:09 -0800
Received: from [10.1.1.66] (hades [10.1.1.66])
(using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
(No client certificate requested)
by nofear.bounceme.net (Postfix) with ESMTP id 8FEB973B94
for <[EMAIL PROTECTED]>; Fri, 11 Feb 2005 21:36:05 -0800 (PST)
Message-ID: <[EMAIL PROTECTED]>
Disposition-Notification-To: "C.Y.M" <[EMAIL PROTECTED]>
Date: Fri, 11 Feb 2005 21:38:13 -0800
From: "C.Y.M" <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
Organization: CooLNeT
User-Agent: Mozilla Thunderbird 0.8 (Windows/20040913)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Submit Debian Bugs <[EMAIL PROTECTED]>
Subject: kernel-package locks up when building
X-Enigmail-Version: 0.86.1.0
X-Enigmail-Supports: pgp-inline, pgp-mime
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: kernel-package
Version: 8.120
Severity: critical

Description: When attempting to build a new 2.6 kernel snapshot with this 
latest 
version of kernel-package, the build script just locks up.

Test: Build kernel 2.6.11-rc3-bk8 with the following command:

fakeroot make-kpkg --append-to-version=.021105.1 --added-modules=nvidia-kernel 
kernel-image modules-image




---
Received: (at 294889-close) by bugs.debian.org; 12 Feb 2005 07:08:03 +
>From [EMAIL PROTECTED] Fri Feb 11 23:08:03 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CzrNr-0005Xn-00; Fri, 11 Feb 2005 23:08:03 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1CzrI2-0006Hd-00; Sat, 12 Feb 2005 02:02:02 -0500
From: Manoj Srivastava <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#294889: fixed in kernel-package 8.121
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sat, 12 Feb 2005 02:02:02 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 2

Source: kernel-package
Source-Version: 8.121

We believe that the bug you reported is fixed in the latest version of
kernel-package, which is due to be installed in the Debian FTP archive:

kernel-package_8.121.dsc
  to pool/main/k/kernel-package/kernel-package_8.121.dsc
kernel-package_8.121.tar.gz
  to pool/main/k/kernel-package/kernel-package_8.121.tar.gz
kernel-package_8.121_all.deb
  to pool/main/k/kernel-package/kernel-package_8.121_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Manoj Srivastava <[EMAIL PROTECTED]> (supplier of updated kernel-package 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 12 Feb 2005 00:06:22 -0600
Source: kernel-package
Binary: kernel-package
Architecture: source all
Version: 8.121
Distribution: unstable
Urgency: low
Maintainer: Manoj Srivastava <

Processed: Re: base: de4x5.ko generates endless loop of errors with phobos p430tx

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> reassign 294867 hotplug
Bug#294867: base: de4x5.ko generates endless loop of errors with phobos p430tx
Bug reassigned from package `base' to `hotplug'.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#294821: samba-common: smbd runs amok after smbclient '\\SERVER\SHARE' -U% -N and uses all available disk space for logging

2005-02-11 Thread Steve Langasek
severity 294821 important
thanks

On Fri, Feb 11, 2005 at 08:48:13PM +0100, Stefan Kanthak wrote:
> Package: samba-common
> Version: 2.2.3a-14.1
> Severity: critical
> Justification: breaks the whole system

> The share \\SERVER\SHARE is setup for guest access without passwd.
> smbclient '\\SERVER\SHARE' -U% -N connects successfully; upon exit of
> smbclient the smbd starts writing the following two lines to its log
> until the filesystem runs out of space.

> [2005/02/11 20:21:30, 0] lib/util_str.c:string_sub(1221)
>   ERROR: string overflow by 2 in string_sub(%a, 172)

> I can reproduce the error with both smbd/smbclient from 2.2.3a-14.1 as
> well as the ones from the 2.2.11-0.1 package provided by the Samba team.
> I can even reproduce this error on smbd 2.2.12 running on non-Debian
> systems (SINIX-Z 5.42C on i386 and ReliantUnix 5.45C on MIPS R1).
> The error does NOT show when using the smbclient 2.2.12 from said
> SINIX and ReliantUnix against the Debian or another machine.

Please forward us a copy of your smb.conf file.  It appears that some
substitution in your configuration is causing a string overflow, but as the
possible values for %a as documented are all reasonably short, this would
seem to require an exceptional configuration to trigger it.

As such, I am downgrading this bug, since you are the first person I've ever
heard of even using %a in a config.  The straightforward workaround is
probably to reduce the use of substitutions in your smb.conf.

Also, the line number in your log above does not match the source code to
2.2.3a-14.1.  Which Samba server does this come from?

-- 
Steve Langasek
postmodern programmer


signature.asc
Description: Digital signature


Processed: Re: Bug#294821: samba-common: smbd runs amok after smbclient '\\SERVER\SHARE' -U% -N and uses all available disk space for logging

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 294821 important
Bug#294821: samba-common: smbd runs amok after smbclient '\\SERVER\SHARE' -U% 
-N and uses all available disk space for logging
Severity set to `important'.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#294889: kernel-package locks up when building

2005-02-11 Thread Grahame White
On Saturday 12 February 2005 06:28, C.Y.M wrote:
> Manoj Srivastava wrote:
> > Hi,
> >
> > Can't reproduce this. Do you have any additional details? Like
> >  a log of where the "lock up" happened?
> >
> >  manoj



> make: *** No rule to make target `conf.vars', needed by
> `stamp-configure'.  Stop.

I've just posted a bug report against kernel-source-2.6.10 with the same 
error message. Looks like I may have reported against the wrong package.

I went through the same steps:
 make-kpkg clean
 make-kpkg --revision=custom.1 kernel_image

That's when I got the error.


Grahame


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#294889: kernel-package locks up when building

2005-02-11 Thread C.Y.M
Manoj Srivastava wrote:
Hi,
Can't reproduce this. Do you have any additional details? Like
 a log of where the "lock up" happened?
	manoj

OK, it doesnt appear to be actually locking up now, sorry for the poor 
description.  The first time I tried it, it just sat there for a few minutes and 
did nothing so I stopped it. Now I am getting the following error (note that If 
I reinstall the previous version of kernel-package that this error does not occur):

/usr/bin/make -f /usr/share/kernel-package/rules real_stamp_clean
make[1]: Entering directory `/usr/src/linux-2.6.11-rc3-bk8'
test ! -f .config || cp -pf .config config.precious
test -f Makefile && \
/usr/bin/make   ARCH=i386 distclean
make[2]: Entering directory `/usr/src/linux-2.6.11-rc3-bk8'
  CLEAN   .config
make[2]: Leaving directory `/usr/src/linux-2.6.11-rc3-bk8'
test ! -f config.precious || mv -f config.precious .config
test ! -f stamp-patch || /usr/bin/make -f /usr/share/kernel-package/rules 
unpatch_now
test -f stamp-building || test -f debian/official || rm -rf debian
# work around idiocy in recent kernel versions
test ! -e scripts/package/builddeb.dist || \
mv -f scripts/package/builddeb.dist scripts/package/builddeb
test ! -e scripts/package/Makefile.dist || \
mv -f scripts/package/Makefile.dist scripts/package/Makefile
rm -f modules/modversions.h modules/ksyms.ver debian/files conf.vars 
scripts/cramfs/cramfsck scripts/cramfs/mkcramfs applied_patches debian/buildinfo 
stamp-build stamp-configure stamp-source stamp-image stamp-headers stamp-src 
stamp-diff stamp-doc stamp-buildpackage stamp-libc-kheaders stamp-debian 
stamp-patch stamp-kernel-configure
rm -rf debian/tmp-source debian/tmp-headers debian/tmp-image debian/tmp-doc
make[1]: Leaving directory `/usr/src/linux-2.6.11-rc3-bk8'
# work around idiocy in recent kernel versions
test ! -e scripts/package/builddeb || \
mv -f scripts/package/builddeb scripts/package/builddeb.dist
test ! -e scripts/package/Makefile || \
(mv -f scripts/package/Makefile scripts/package/Makefile.dist && \
   echo "# Dummy file " >  scripts/package/Makefile)
test ! -f stamp-debian && test ! -f debian/official && \
  rm -rf ./debian && mkdir ./debian
test ! -f stamp-debian && \
   ( test ! -f debian/official || test ! -f debian/control) && \
   sed -e 's/=V/2.6.11-rc3-bk8.021105.2/g'-e 's/=D/10.00.Custom/g'   \
   -e 's/=A/i386/g'   -e 's/=SA//g' \
-e 's/=L/lilo (>= 19.1) | grub, /g' -e 's/=I//g'\
-e 's/=CV/2.6/g' \
-e 's/=M/Unknown Kernel Package Maintainer 
<[EMAIL PROTECTED]>/g'  \
-e 's/=ST/kernel/g'  \
 /usr/share/kernel-package/Control> debian/control
test ! -f stamp-debian && test ! -f debian/official &&  \
   sed -e 's/=V/2.6.11-rc3-bk8.021105.2/g' -e 's/=D/10.00.Custom/g' 
  \
-e 's/=A/i386/g' -e 's/=M/Unknown Kernel Package Maintainer 
<[EMAIL PROTECTED]>/g' \
-e 's/=ST/kernel/g' \
/usr/share/kernel-package/changelog > debian/changelog
test ! -f debian/rules &&   \
   install -p -m 755 /usr/share/kernel-package/rules debian/rules
echo done >  stamp-debian
make: *** No rule to make target `conf.vars', needed by `stamp-configure'.  Stop.

--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#293813: bug 293813, no en locale

2005-02-11 Thread Kevin Mark
Package: gazpacho
Version: 0.4.0-1
Followup-For: Bug #293813

Saw new info on gnomedesktop.org. Downloaded debian package. found
errors. noticed LOCALE error. found NO en locale file.
did:
LC_ALL es_ES gazpacho
still didnt run but the LOCALE error was gone.
so, i guess it needs a en locale for us en-speaking folks.
-Kev

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-1-386
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages gazpacho depends on:
ii  python2.3.4-6An interactive high-level object-o
ii  python-gtk2   2.4.1-2Python bindings for the GTK+ widge

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#294889: kernel-package locks up when building

2005-02-11 Thread Manoj Srivastava
Hi,

Can't reproduce this. Do you have any additional details? Like
 a log of where the "lock up" happened?

manoj
-- 
Linux is obsolete (Andrew Tanenbaum)
Manoj Srivastava   <[EMAIL PROTECTED]>  
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#291709: asterisk-chan-misdn: Please add versioned Build-Depends on misdn lib with -fPIC

2005-02-11 Thread Goswin Brederlow
Package: asterisk-chan-misdn
Version: 0.0.3rc2-4
Followup-For: Bug #291709

Hi,

please add versioned Build-Depends on misdn lib with -fPIC.

MfG,
Goswin

-- System Information:
Debian Release: 3.1
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.8-frosties-1
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#294889: kernel-package locks up when building

2005-02-11 Thread C.Y.M
Package: kernel-package
Version: 8.120
Severity: critical
Description: When attempting to build a new 2.6 kernel snapshot with this latest 
version of kernel-package, the build script just locks up.

Test: Build kernel 2.6.11-rc3-bk8 with the following command:
fakeroot make-kpkg --append-to-version=.021105.1 --added-modules=nvidia-kernel 
kernel-image modules-image



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Processed: Merging 281641 and 267428 (boot failure on sparc64)

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> retitle 281641 Ultra 2 boot fails early with "FP Disabled" message
Bug#281641: installation-reports
Changed Bug title.

> severity 281641 critical
Bug#281641: Ultra 2 boot fails early with "FP Disabled" message
Severity set to `critical'.

> reassign 281641 silo
Bug#281641: Ultra 2 boot fails early with "FP Disabled" message
Bug reassigned from package `installation-reports' to `silo'.

> merge 267428 281641
Bug#267428: Silo 1.4.8 fails to boot 2.4.26 kernel on an Ultra 5
Bug#281641: Ultra 2 boot fails early with "FP Disabled" message
Merged 267428 281641.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#293932: [Python-Dev] license issues with profiler.py and md5.h/md5c.c

2005-02-11 Thread Donovan Baarda
G'day,

From: "Bob Ippolito" <[EMAIL PROTECTED]>
> On Feb 11, 2005, at 6:11 PM, Donovan Baarda wrote:
[...]
> > Given that Python is already dependant on openssl, it makes sense to
> > change
> > md5sum to use it. I have a feeling that openssl internally uses md5,
> > so this
> > way we wont link against two different md5sum implementations.
>
> It is an optional dependency that is used when present (read: not just
> win32).  The sources are not included with Python.

Are there any potential problems with making the md5sum module availability
"optional" in the same way as this?

> OpenSSL does internally have an implementation of md5 (and sha1, among
> other things).

Yeah, I know, that's why it could be used for the md5sum module :-)

What I meant was a Python application using ssl sockets and the md5sum
module will effectively have two different md5sum implementations in memory.
Using the openssl md5sum for the md5sum module will make it "leaner", as
well as faster.


Donovan Baardahttp://minkirri.apana.org.au/~abo/




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#294751: Same Problem....i386

2005-02-11 Thread liam
Hello,

I've got an identical problem to luther.  Tried patch but it didn't work
either.  I reverted to using the 'rules' file from the 8.119 package and
this seemed to work once I'd done a 'make-kpkg clean' and 'rm
debian/changelog'.

I'm not sure what other complications will arise from using the older
'rules' file but it works for me for now.

Liam.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#294404: udev does not create /dev/md* devices at boot-up

2005-02-11 Thread Jeroen van Wolffelaar
reassign 294404 mdadm
thanks

On Wed, Feb 09, 2005 at 01:14:26PM -0500, Brian White wrote:
> > This is a kernel bug.
> > There is already a bug open against the kernel.
> > I have seen no progress on its resolution.
> 
> I couldn't find the bug number, so I just reassigned this to the base
> kernel I'm using.  Somebody else will have to merge it.

It's #273182, but I was told by Marco d'Itri that it's hard to solve
this in the kernel atm.

Therefore, I'm reassigning to mdadm -- which is the package failing to
start on missing md* nodes. I think that since this bug is hard to solve
in udev (should it create md* always, even if one hasn't RAID at all?)
or the kernel (autostarting simply isn't possible in modular md, it
seems), it would be appropriate for mdadm to while scanning partitions
for RAID parts to assamble, to create md device nodes as needed, in
stead of failing on the non-exitance of them.

Thanks,
--Jeroen

-- 
Jeroen van Wolffelaar
[EMAIL PROTECTED]
http://jeroen.A-Eskwadraat.nl


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#293932: [Python-Dev] license issues with profiler.py and md5.h/md5c.c

2005-02-11 Thread Bob Ippolito
On Feb 11, 2005, at 6:11 PM, Donovan Baarda wrote:
G'day again,
From: "Gregory P. Smith" <[EMAIL PROTECTED]>
I think it would be cleaner and simpler to modify the existing
md5module.c to use the openssl md5 layer API (this is just a
search/replace to change the function names). The bigger problem is
deciding what/how/whether to include the openssl md5 implementation
sources so that win32 can use them.
yes, that is all i was suggesting.
win32 python is already linked against openssl for the socket module
ssl support, having the md5 and sha1 modules depend on openssl should
not cause a problem.
IANAL... I have too much common sense, so I won't argue licences :-)
So is openssl already included in the Python sources, or is it just a
dependency? I had a quick look and couldn't find it so it must be a
dependency.
Given that Python is already dependant on openssl, it makes sense to 
change
md5sum to use it. I have a feeling that openssl internally uses md5, 
so this
way we wont link against two different md5sum implementations.
It is an optional dependency that is used when present (read: not just 
win32).  The sources are not included with Python.

OpenSSL does internally have an implementation of md5 (and sha1, among 
other things).

-bob

--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Processed: Re: Bug#294404: udev does not create /dev/md* devices at boot-up

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> reassign 294404 mdadm
Bug#294404: udev does not create /dev/md* devices at boot-up
Bug reassigned from package `kernel-image-2.6-686' to `mdadm'.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#293880: marked as done (FTBFS: Should disable mono bindings.)

2005-02-11 Thread Debian Bug Tracking System
Your message dated Fri, 11 Feb 2005 20:17:13 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#293880: fixed in clearsilver 0.9.13-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 6 Feb 2005 15:38:47 +
>From [EMAIL PROTECTED] Sun Feb 06 07:38:47 2005
Return-path: <[EMAIL PROTECTED]>
Received: from smtp.telefonica.net (telesmtp4.mail.isp) [213.4.129.135] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CxoUo-0003Ek-00; Sun, 06 Feb 2005 07:38:46 -0800
Received: from [192.168.1.110] ([217.172.66.230]) by
  telesmtp4.mail.isp (terra.es) with ESMTP id IBHY4I00.3AS for
  <[EMAIL PROTECTED]>; Sun, 6 Feb 2005 16:38:42 +0100 
Subject: FTBFS: Should disable mono bindings.
From: Emilio =?ISO-8859-1?Q?Jes=FAs?= Gallego Arias <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Content-Type: text/plain
Date: Sun, 06 Feb 2005 16:39:10 +0100
Message-Id: <[EMAIL PROTECTED]>
Mime-Version: 1.0
X-Mailer: Evolution 2.0.3 
Content-Transfer-Encoding: 7bit
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Subject: FTBFS: Should disable mono bindings.
Package: clearsilver
Severity: serious
Justification: no longer builds from source

tags +patch

Hi!

I tried to build clearsilver on my host, and got a FTBFS:

gcc -pthread -fno-strict-aliasing -DNDEBUG -g -O3 -Wall
-Wstrict-prototypes -fPIC -I../ -I/usr/include/python2.3 -c neo_cgi.c -o
build/temp.linux-i686-2.3/neo_cgi.o
gcc -pthread -shared build/temp.linux-i686-2.3/neo_cgi.o
build/temp.linux-i686-2.3/neo_cs.o build/temp.linux-i686-2.3/neo_util.o
-L../libs -lz -lneo_cgi -lneo_cs -lneo_utl -o neo_cgi.so
make[2]: Leaving directory
`/home/emilio/fuentes/debian/clearsilver/clearsilver-0.9.13/build-tree/clearsilver-0.9.13/python'
make[2]: Entering directory
`/home/emilio/fuentes/debian/clearsilver/clearsilver-0.9.13/build-tree/clearsilver-0.9.13/dso'
/usr/bin/ld  -rpath ../libs -shared -o libneo.so
-whole-archive ../libs/libneo_cgi.a ../libs/libneo_cs.a ../libs/libneo_utl.a 
-no-whole-archive -lz -L../libs/
gcc -o dsotest dsotest.c -lneo -L. -I..
make[2]: Leaving directory
`/home/emilio/fuentes/debian/clearsilver/clearsilver-0.9.13/build-tree/clearsilver-0.9.13/dso'
make[2]: Entering directory
`/home/emilio/fuentes/debian/clearsilver/clearsilver-0.9.13/build-tree/clearsilver-0.9.13/csharp'
/usr/bin/mcs -target:library --unsafe CS.cs -out:clearsilver.dll
CS.cs(84) error CS0214: Pointers may only be used in an unsafe context
Compilation failed: 1 error(s), 0 warnings
make[2]: *** [clearsilver.dll] Error 1
make[2]: Leaving directory
`/home/emilio/fuentes/debian/clearsilver/clearsilver-0.9.13/build-tree/clearsilver-0.9.13/csharp'
make[1]: *** [cs] Error 2
make[1]: Leaving directory
`/home/emilio/fuentes/debian/clearsilver/clearsilver-0.9.13/build-tree/clearsilver-0.9.13'
make: *** [debian/stamp-makefile-build] Error 2

This is caused because I have mono-dev installed and configure tried to
build mono bindings, which seem broken.

The workaround is to disable mono bindings:

--- rules.old   2005-02-06 15:06:07.557676648 +0100
+++ rules   2005-02-06 14:50:12.671841360 +0100
@@ -10,6 +10,7 @@

 DEB_CONFIGURE_EXTRA_FLAGS := --with-python=/usr/bin/python2.3 \
  --disable-perl \
+ --disable-csharp \
  --disable-ruby \
  --disable-apache \
  --enable-gettext

Regards and thank you for taking care of this,

Emilio


-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.10
Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8)


---
Received: (at 293880-close) by bugs.debian.org; 12 Feb 2005 01:23:11 +
>From [EMAIL PROTECTED] Fri Feb 11 17:23:11 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1Czm07-0002cN-00; Fri, 11 Feb 2005 17:23:11 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1CzluL-0003Mz-00; Fri, 11 Feb 2005 20:17:13 -0500
F

Bug#293574: marked as done (clearsilver-dev depends on unavailable package clearsilver)

2005-02-11 Thread Debian Bug Tracking System
Your message dated Fri, 11 Feb 2005 20:17:13 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#293574: fixed in clearsilver 0.9.13-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 4 Feb 2005 13:17:57 +
>From [EMAIL PROTECTED] Fri Feb 04 05:17:56 2005
Return-path: <[EMAIL PROTECTED]>
Received: from goofy.fi.upm.es [138.100.8.23] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1Cx3LQ-0002y5-00; Fri, 04 Feb 2005 05:17:56 -0800
Received: from babel.ls.fi.upm.es (babel.ls.fi.upm.es [138.100.12.136])
 by relay.fi.upm.es (PMDF V6.2-X27 #30875)
 with ESMTPS id <[EMAIL PROTECTED]> for
 [EMAIL PROTECTED]; Fri, 04 Feb 2005 14:16:43 +0100 (MET)
Received: from egallego by babel.ls.fi.upm.es with local (Exim 4.34)
id 1Cx3OC-0005LF-3u; Fri, 04 Feb 2005 14:20:48 +0100
Date: Fri, 04 Feb 2005 14:20:48 +0100
From: Emilio Gallego <[EMAIL PROTECTED]>
Subject: Clearsilver can't enter testing.
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Message-id: <[EMAIL PROTECTED]>
MIME-version: 1.0
X-Mailer: reportbug 3.2
Content-type: text/plain; charset=us-ascii
Content-transfer-encoding: 7bit
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: clearsilver
Severity: normal

Hi!

I'm wondering why clearsilver hasn't entered testing, bjorn page says:

* clearsilver has no old version in testing (trying to add, not update)
* Adding clearsilver makes 1 non-depending packages uninstallable on alpha: 
clearsilver-dev

and grep-excuses:

clearsilver (- to 0.9.13-1)
Maintainer: Jesus Climent
18 days old (needed 10 days)
clearsilver-dev/alpha unsatisfiable Depends: clearsilver1
clearsilver-dev/arm unsatisfiable Depends: clearsilver1
clearsilver-dev/hppa unsatisfiable Depends: clearsilver1
clearsilver-dev/i386 unsatisfiable Depends: clearsilver1
clearsilver-dev/ia64 unsatisfiable Depends: clearsilver1
clearsilver-dev/m68k unsatisfiable Depends: clearsilver1
clearsilver-dev/mips unsatisfiable Depends: clearsilver1
clearsilver-dev/mipsel unsatisfiable Depends: clearsilver1
clearsilver-dev/powerpc unsatisfiable Depends: clearsilver1
clearsilver-dev/s390 unsatisfiable Depends: clearsilver1
clearsilver-dev/sparc unsatisfiable Depends: clearsilver1
Valid candidate

Humm, maybe they need a hint, I don't know, but it would be nice to solve
this so we can have trac in testing.

Regards and keep the good work,

Emilio

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-1-686-smp
Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8)

---
Received: (at 293574-close) by bugs.debian.org; 12 Feb 2005 01:23:10 +
>From [EMAIL PROTECTED] Fri Feb 11 17:23:10 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1Czm06-0002cB-00; Fri, 11 Feb 2005 17:23:10 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1CzluL-0003Mx-00; Fri, 11 Feb 2005 20:17:13 -0500
From: Otavio Salvador <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#293574: fixed in clearsilver 0.9.13-3
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Fri, 11 Feb 2005 20:17:13 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: clearsilver
Source-Version: 0.9.13-3

We believe that the bug you reported is fixed in the latest version of
clearsilver, which is due to be installed in the Debian FTP archive:

clearsilver-dev_0.9.13-3_i386.deb
  to pool/main/c/clearsilver/clearsilver-dev_0.9.13-3_i386.deb
clearsilver_0.9.13-3.diff.gz
  to pool/main/c/clearsilver/clearsilver_0.9.13-3.diff.gz
clearsilver_0.9.13-3.dsc
  to pool/main/c/clearsilver/clearsilver_0.9.13-3.dsc
python-clearsilver_0.9.1

Bug#294763: marked as done (pvm: missing dependency on libpvm3)

2005-02-11 Thread Debian Bug Tracking System
Your message dated Sat, 12 Feb 2005 02:10:22 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Fixed in pvm 3.4.2-18
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 11 Feb 2005 15:55:37 +
>From [EMAIL PROTECTED] Fri Feb 11 07:55:37 2005
Return-path: <[EMAIL PROTECTED]>
Received: from gate.ibr.ch [213.144.140.114] (root)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1Czd8r-0004RQ-00; Fri, 11 Feb 2005 07:55:37 -0800
Received: from bacardi.ibr.ch (bacardi.ibr.ch [172.16.1.1])
by gate.ibr.ch (8.12.6/8.12.6/Debian-6Woody) with ESMTP id 
j1BFtZZ1014297
for <[EMAIL PROTECTED]>; Fri, 11 Feb 2005 16:55:35 +0100
Received: from coruba.ibr.ch (coruba [172.16.8.23])
by bacardi.ibr.ch (Postfix) with ESMTP
id 6CD4815E9F; Fri, 11 Feb 2005 16:55:34 +0100 (CET)
Received: from uwe by coruba.ibr.ch with local (Exim 3.36 #1 (Debian))
id 1Czd8l-00012b-00; Fri, 11 Feb 2005 16:55:31 +0100
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Uwe Storbeck <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: pvm: missing dependency on libpvm3
X-Mailer: reportbug 3.2
Date: Fri, 11 Feb 2005 16:55:31 +0100
Message-Id: <[EMAIL PROTECTED]>
Sender: Uwe Storbeck <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: pvm
Version: 3.4.2-17
Severity: grave
Justification: renders package unusable

pvm needs libpvm3.so.3, which is in package libpvm3:

  $ ldd /usr/bin/pvm
libpvm3.so.3 => not found
libc.so.6 => /lib/libc.so.6 (0x40029000)
/lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x4000)

But pvm does not depend on libpvm3:

  $ dpkg -s pvm
  Depends: libc6 (>= 2.3.2.ds1-4)

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (750, 'testing'), (650, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.4.29
Locale: LANG=C, LC_CTYPE=de_CH (charmap=ISO-8859-1)

Versions of packages pvm depends on:
ii  libc6   2.3.2.ds1-20 GNU C Library: Shared libraries an

-- no debconf information

---
Received: (at 294763-done) by bugs.debian.org; 12 Feb 2005 01:10:25 +
>From [EMAIL PROTECTED] Fri Feb 11 17:10:25 2005
Return-path: <[EMAIL PROTECTED]>
Received: from cassarossa.samfundet.no [129.241.93.19] (Debian-exim)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1Czlnl-I1-00; Fri, 11 Feb 2005 17:10:25 -0800
Received: from trofast.ipv6.sesse.net ([2001:700:300:dc03:20e:cff:fe36:a766] 
helo=trofast.sesse.net)
by cassarossa.samfundet.no with esmtp (Exim 4.34)
id 1Czlnj-0005bt-3h
for [EMAIL PROTECTED]; Sat, 12 Feb 2005 02:10:23 +0100
Received: from sesse by trofast.sesse.net with local (Exim 3.36 #1 (Debian))
id 1Czlni-00074a-00
for <[EMAIL PROTECTED]>; Sat, 12 Feb 2005 02:10:22 +0100
Date: Sat, 12 Feb 2005 02:10:22 +0100
From: "Steinar H. Gunderson" <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Fixed in pvm 3.4.2-18
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
X-Operating-System: Linux 2.6.8.1 on a i686
User-Agent: Mutt/1.5.6+20040907i
X-Spam-Score: -2.8 (--)
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no 
version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Hi,

#294763 has been fixed in 3.4.2-18, but to add to my list of messups, I
specified the wrong bug number in the changelog. Consider it fixed, thanks
for your bug report. :-)

/* Steinar */
-- 
Homepage: http://www.sesse.net/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#293568: gnome-themes-extras: no compressed archive icon in Nuvola theme

2005-02-11 Thread Josselin Mouette
clone 293568 -1
unmerge -1
reopen -1
severity -1 normal
retitle -1 No icons for application/x-compressed-tar
reassign -1 gnome-themes-extras
thanks

Le mardi 08 février 2005 à 01:23 +0100, Christian Surchi a écrit :
> > This should be fixed in gtk+-2.0 2.6.2-2. However, the problematic file 
> > (/usr/share/icons/icon-theme.cache) is not removed upon upgrade, you'll 
> > have to remove it by yourself.
> 
> I did it, but I can't see any result... :\

D'uh, there's a specific issue about compressed files. I'll update the
package.
-- 
 .''`.   Josselin Mouette/\./\
: :' :   [EMAIL PROTECTED]
`. `'[EMAIL PROTECTED]
  `-  Debian GNU/Linux -- The power of freedom


signature.asc
Description: Ceci est une partie de message	=?ISO-8859-1?Q?num=E9riquement?= =?ISO-8859-1?Q?_sign=E9e?=


Bug#286905: [vendor-sec] CAN-2004-0452 File::Path::rmtree() vulnerability

2005-02-11 Thread Brendan O'Dea
On Fri, Feb 04, 2005 at 03:32:05PM +0100, Thierry Carrez wrote:
>Brendan O'Dea wrote:
>
>> Seems a pretty clean fix, I've applied this to Debian's 5.8.4-5 package. 
>
>Paul Szabo brought to our attention that the fix for CAN-2004-0452 does
>not handle all race conditions cases and that rmtree is still vulnerable :
>
>=
>Just changing the chmod to 0700 and 0600 instead of 0777 and 0666
>does NOT solve the issue. The chmod change was for another, but related,
>problem. See bugs.debian.org/286905 and 286922.
>=
>
>Apparently discussion still rages on how this would best be fixed.
>Any clue ?

Well actually, discussion doesn't rage at all as to how this should be
fixed.

Basically it's been acknowledged as a problem, but one that requires
more than a trivial patch to rmtree to correct, so as such is currently
languishing until such time as rmtree is rewritten to remove the race
condition.

I was kind of hoping that someone else would tackle that task since I
don't really regard myself as a security expert and did't want to make
the problem worse by introducing new, different security issues with a
recursive implementation.

However in the absence of any alternate suggestion, I've appended a
first-cut rmtree replacement.

For the moment I've ignored the third argument entirely; tempted to do
so permanently.

I've also ignored $Is_VMS and $Is_MacOS; will need some input from
perl5-porters as to what changes are required to support those
platforms.

--bod

use strict;
use warnings;
use Carp;
use Cwd 'getcwd';

sub _rmtree;
sub _rmtree
{
my ($path, $prefix, $up, $up_dev, $up_ino, $verbose) = @_;

my ($dev, $ino) = lstat $path or return 0;
unless (-d _)
{
unlink $path or return 0;
print "unlink $prefix$path\n" if $verbose;
return 1;
}

chdir $path or return 0;

# avoid a race condition where a directory may be replaced by a
# symlink between the lstat and the chdir
my ($new_dev, $new_ino) = stat '.';
unless ("$new_dev:$new_ino" eq "$dev:$ino")
{
croak "Directory $prefix$path changed before chdir, aborting\n";
}

my $count = 0;
if (opendir my $dir, '.')
{
my $entry;
while (defined ($entry = readdir $dir))
{
next if $entry =~ /^\.\.?$/;
$count += _rmtree $entry, "$prefix$path/", '..', $dev, $ino,
$verbose;
}

closedir $dir;
}

# don't leave the caller in an unexpected directory
unless (chdir $up)
{
croak "Can't return to $up from $prefix$path ($!)\n";
}

# ensure that a chdir ..  didn't take us somewhere other than
# where we expected (see CVE-2002-0435)
unless (($new_dev, $new_ino) = stat '.'
and "$new_dev:$new_ino" eq "$up_dev:$up_ino")
{
croak "Previous directory $up changed since entering $prefix$path\n";
}

if (rmdir $path)
{
print "rmdir $prefix$path\n" if $verbose;
$count++;
};

return $count;
}

sub rmtree
{
my ($p, $verbose) = @_;
$p = [] unless defined $p and length $p;
$p = [ $p ] unless ref $p;
my @paths = grep defined && length, @$p;

unless (@paths)
{
carp "No root path(s) specified\n";
return;
}

my $oldpwd = getcwd or do {
carp "Can't fetch initial working directory\n";
return;
};

my ($dev, $ino) = stat '.' or do {
carp "Can't stat initial working directory\n";
return;
};

my $count = 0;
for my $path (@paths)
{
$count += _rmtree $path, '', $oldpwd, $dev, $ino, $verbose;
}

$count;
}


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Processed: Re: openoffice.org-thesaurus-it: should be Arch all

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 289622 grave
Bug#289622: openoffice.org-thesaurus-it: should be Arch all
Severity set to `grave'.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#293932: [Python-Dev] license issues with profiler.py and md5.h/md5c.c

2005-02-11 Thread "Martin v. Löwis"
Phillip J. Eby wrote:
I personally can't see how taking the reasonable interpretation of a 
public domain declaration can lead to any difficulties, but then, 
IANAL.
The ultimate question is whether we could legally relicense such
code under the Python license, ie. remove the PD declaration, and
attach the Python license to it. I'm sure somebody would come along
and claim "you cannot do that, and because you did, I cannot use
your code, because it is not legally trustworthy"; people would
say the same if the PD declaration would stay around.
It is important for us that our users (including our commercial
users) trust that Python has a clear legal track record. For such
users, it is irrelevant whether you think that a litigation of
the actual copyright holder would have any chance to stand in court,
or whether such action is even likely.
So for some users, replacing RSA-copyrighted-and-licensed code
with PD-declared-and-unlicensed code makes Python less trustworthy.
Clearly, for Debian, it is exactly the other way 'round. So I
have rejected the patch, preserving the status quo, until a properly
licensed open source implementation of md5 arrives. Until then,
Debian will have to patch Python.
But again, IANAL, certainly not a famous one like Mr. Rosen.  I *am* 
most curious to know why his article seems to imply that a promise not 
to sue someone for copyright infringement isn't a valid defense against 
such a suit
It might be, but that is irrelevant for open source projects that
include contributions. Either they don't care too much about such
things, in which case anything remotely "free" would be acceptable,
or they are very nit-picking, in which case you need a good record
for any contribution you ever received.
Regards,
Martin
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#294867: base: de4x5.ko generates endless loop of errors with phobos p430tx

2005-02-11 Thread Dan
Package: base
Severity: critical
Justification: breaks the whole system

Debian autodetects my 4 port Phobos P430TX and attempts to use the de4x5.ko 
driver. When the boot process gets to initializeing the card it outputs an
endless loop of this message, and won't finish booting:
bad media code [17] detected in SROM

I had to remove the card to get it the machine to boot. 
I corrected the problem by renaming de4x5.ko to de4x5.off. Then on next boot
it defaulted to useing tulip.ko and so far everything appears to work ok.

I tried the card in 2 different debian machines, same problem. I tried both 
the current 2.6 and 2.4 kernel, same problem. 

 

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-1-386
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#294763: pvm: missing dependency on libpvm3

2005-02-11 Thread Steinar H. Gunderson
On Fri, Feb 11, 2005 at 04:55:31PM +0100, Uwe Storbeck wrote:
> Severity: grave
> Justification: renders package unusable

More correctly "serious", but no difference, still RC. :-)

> But pvm does not depend on libpvm3:
> 
>   $ dpkg -s pvm
>   Depends: libc6 (>= 2.3.2.ds1-4)

You are perfectly right; -17 has this bug, since I built -17 in a pbuilder
and I do dh_makeshlibdeps _after_ dh_makeshlibs. I'm fixing this now, expect
a fixed -18 shortly. (This package is following me forever for sarge, it
seems :-P)

/* Steinar */
-- 
Homepage: http://www.sesse.net/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#294865: coq-doc: The documentation for coq is non-free (this issue is being solved)

2005-02-11 Thread Samuel Mimram
Package: coq-doc
Version: 8.0pl1.0-2
Severity: serious
Justification: license not DFSG-free

The coq documentation is currently not free (we don't even have the sources of
it excepting for the documentation of the library which is generated by
coq-doc).
I'm dealing this issue with upstream (it should be released under GPL) but it
should not be released with sarge if this issue has been solved in the meantime
which is why I'm filling this RC bug.

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.10
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#294843: marked as done (udev: /etc/init.d/udev start only works on system start-up)

2005-02-11 Thread Debian Bug Tracking System
Your message dated Sat, 12 Feb 2005 00:10:08 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Bug#294843: acknowledged by developer (Re: Bug#294843: udev: 
/etc/init.d/udev start only works on system start-up)
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 11 Feb 2005 21:14:25 +
>From [EMAIL PROTECTED] Fri Feb 11 13:14:24 2005
Return-path: <[EMAIL PROTECTED]>
Received: from mailserver3.hrz.tu-darmstadt.de [130.83.174.21] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1Czi7M-0006Lf-00; Fri, 11 Feb 2005 13:14:24 -0800
Received: from gaja.helas.net (drm9-d514ea1d.pool.mediaWays.net [213.20.234.29])
(authenticated bits=0)
by mailserver3.hrz.tu-darmstadt.de (8.12.10/8.12.7) with ESMTP id 
j1BLE8uj016786
(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO)
for <[EMAIL PROTECTED]>; Fri, 11 Feb 2005 22:14:09 +0100
Received: by gaja.helas.net (Postfix, from userid 1000)
id 7D1A02009C4; Fri, 11 Feb 2005 22:14:10 +0100 (CET)
Date: Fri, 11 Feb 2005 22:14:10 +0100
From: Martin Zobel-Helas <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: udev: /etc/init.d/udev start only works on system start-up
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-GPG-Key: http://helas.dyndns.org/~hel/public-key.asc
X-GPG-Fingerprint: 4CF7 EF52 616A 53B3 BA59  E9E1 85F1 3484 FA4F 45BC
User-Agent: Mutt/1.5.6+20040907i
X-TUD-HRZ-MailScanner: Found to be clean
X-TUD-HRZ-MailScanner-SpamCheck: not spam, SpamAssassin (Wertung=0,
benoetigt 5)
X-MailScanner-From: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 


Package: udev
Severity: serious
Justification: Debian Policy 9.3.2

Hi Marco,

Policy say at 9.3.2

These scripts should be named /etc/init.d/package, and they should
accept one argument, saying what to do:

start
start the service, 

stop
stop the service,



02/11/05 [21:57:36] < zobel> Md: at least policy says in 9.3.2 that start 
should result in starting the service..
02/11/05 [21:57:54] < zobel> so if i stop and start it udev needs to be started
02/11/05 [21:58:29] < zobel> so udev is currently not policy-conform6 
02/11/05 [21:59:19] < zobel> udev start currently only works at system startup.
02/11/05 [22:00:55] < Md> zobel: too bad. I tried, believe me, but it's just 
too hard to be worth it. postinst can start it, but stopping it is not 
  possible
02/11/05 [22:02:41] < zobel> Md: so i would say udev is to experimental at this 
state and would sugest to remove it from testing 'til starting 
   (and stoppping[1]) udev not only on system startup 
works...


Greetings
Martin

[1] added.
--
Successophobia:
The fear that if one is successful, then one's personal needs
will be forgotten and one will no longer have one's childish needs
catered to.
-- Douglas Coupland, "Generation X: Tales for an Accelerated
   Culture"

---
Received: (at 294843-done) by bugs.debian.org; 11 Feb 2005 23:12:03 +
>From [EMAIL PROTECTED] Fri Feb 11 15:12:03 2005
Return-path: <[EMAIL PROTECTED]>
Received: from attila.bofh.it [213.92.8.2] (postfix)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CzjxD-0003Qx-00; Fri, 11 Feb 2005 15:12:03 -0800
Received: by attila.bofh.it (Postfix, from userid 10)
id 9C42E5F9B6; Sat, 12 Feb 2005 00:12:01 +0100 (CET)
Received: by wonderland.linux.it (Postfix, from userid 1001)
id 3D06E1C2A7; Sat, 12 Feb 2005 00:10:08 +0100 (CET)
Date: Sat, 12 Feb 2005 00:10:08 +0100
To: [EMAIL PROTECTED]
Subject: Re: Bug#294843: acknowledged by developer (Re: Bug#294843: udev: 
/etc/init.d/udev start only works on system start-up)
Message-ID: <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL 
PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="/04w6evG8XlLl3ft"
Content-Disposition: inline
In-Reply-To: <[EMAIL PROTECTED]>
User-Agent: Mutt/1.5.6+20040907i
From: [EMAIL P

Bug#293932: [Python-Dev] license issues with profiler.py and md5.h/md5c.c

2005-02-11 Thread Donovan Baarda
G'day again,

From: "Gregory P. Smith" <[EMAIL PROTECTED]>
> > I think it would be cleaner and simpler to modify the existing
> > md5module.c to use the openssl md5 layer API (this is just a
> > search/replace to change the function names). The bigger problem is
> > deciding what/how/whether to include the openssl md5 implementation
> > sources so that win32 can use them.
>
> yes, that is all i was suggesting.
>
> win32 python is already linked against openssl for the socket module
> ssl support, having the md5 and sha1 modules depend on openssl should
> not cause a problem.

IANAL... I have too much common sense, so I won't argue licences :-)

So is openssl already included in the Python sources, or is it just a
dependency? I had a quick look and couldn't find it so it must be a
dependency.

Given that Python is already dependant on openssl, it makes sense to change
md5sum to use it. I have a feeling that openssl internally uses md5, so this
way we wont link against two different md5sum implementations.


Donovan Baardahttp://minkirri.apana.org.au/~abo/




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#293932: [Python-Dev] license issues with profiler.py and md5.h/md5c.c

2005-02-11 Thread Phillip J. Eby
At 03:46 PM 2/11/05 -0500, Tim Peters wrote:
If Larry is correct, it isn't legally possible for an individual in
the US to disclaim copyright, regardless what they may say or sign.
The danger then is that accepting software that purports to be free of
copyright can come back to bite you, if the author later changes their
mind (from your POV; the claim is that from US law's POV, nothing has
actually changed, since the author never actually gave up copyright to
begin with).
The very fact that this argument exists underscores the desirability
of only accepting software with an explicit license, spelling out the
copyright holder's intents wrt distribution, modification, etc.  Then
you're just in legal mud, instead of legal quicksand.
And as long as we're flailing about in a substance which may include, but 
is not limited to, mud and/or quicksand or other flailing-suitable legal 
substances, it should be pointed out that even though software presented by 
its owner to be in the public domain is technically still copyright by that 
individual, the odds of them successfully prosecuting a copyright 
enforcement action might be significantly narrowed, due to the doctrine of 
promissory estoppel.

Promissory estoppel is basically the idea that one-sided promises *are* 
enforceable when somebody reasonably relies on them and is injured by the 
withdrawal.  IBM, for example, has pled in its defense against SCO that 
SCO's distribution of its so-called proprietary code under the GPL 
constituted a reasonable promise that others were free to use the code 
under the terms of the GPL, and that IBM further relied on that 
promise.  Ergo, they are claiming, SCO's promise is enforceable by law.

Of course, SCO v. IBM hasn't had any judgments yet, certainly not on that 
subject, and maybe never will.  But it's important to know that the law 
*does* have some principles like this that allow overriding the more 
egregiously insane aspects of the law.  :)

Oh, also, if somebody decides to back out on their dedication to the public 
domain, and you can show that they did it on purpose, then that's "unclean 
hands" and possibly "copyright abuse" as well.

Just to muddy up the waters a little bit.  :)  Obviously, the PSF should 
follow its own lawyer's advice, but it seemed to me that the point of Mr. 
Rosen's article was more to advise people releasing software to use a 
license that allows them to disclaim warranties.

I personally can't see how taking the reasonable interpretation of a public 
domain declaration can lead to any difficulties, but then, IANAL.  I'm 
surprised, however, that he didn't even touch on promissory estoppel, if 
there is some reason he believes that the doctrine wouldn't apply to a 
software license.  Heck, I was under the impression that free copyright 
licenses in general got their effect by way of promissory estoppel, since 
such licenses are always one-sided promises.  The GPL in particular makes 
an explicit point of this, even though it doesn't use the words "promissory 
estoppel".  The point is that the law doesn't allow you to copy, so the 
license is your defense against a charge of copyright 
infringement.  Therefore, even Rosen's so-called "Give it away" license is 
enforceable, in the sense that the licensor should be barred from taking 
action against someone taking the license at face value.

Rosen also says, "Under basic contract law, a gift cannot be enforced. The 
donor can retract his gift at any time, for any reason".  If this were 
true, I could give you a watch for Christmas and then sue you to make you 
give it back, so I'm not sure what he's getting at here.

But again, IANAL, certainly not a famous one like Mr. Rosen.  I *am* most 
curious to know why his article seems to imply that a promise not to sue 
someone for copyright infringement isn't a valid defense against such a 
suit, because that would seem to imply that *no* free software license is 
valid, including the GPL or the PSF license!  (Surely those "gifts" can be 
retracted too, no?)


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#294843: acknowledged by developer (Re: Bug#294843: udev: /etc/init.d/udev start only works on system start-up)

2005-02-11 Thread Martin Zobel-Helas
reopen 294843
thanks


Hi Marco,

On Friday, 11 Feb 2005, Debian Bug Tracking System <[EMAIL PROTECTED]> wrote:
> We just discussed this.
> Either send a patch or learn to deal with it.

sorry, but i consider this as not Policy conform and thus it is RC.

Greetings
Martin

--
Before I knew the best part of my life had come, it had gone.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#294843 acknowledged by developer (Re: Bug#294843: udev: /etc/init.d/udev start only works on system start-up)

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> reopen 294843
Bug#294843: udev: /etc/init.d/udev start only works on system start-up
Bug reopened, originator not changed.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294843: marked as done (udev: /etc/init.d/udev start only works on system start-up)

2005-02-11 Thread Debian Bug Tracking System
Your message dated Fri, 11 Feb 2005 22:31:07 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Bug#294843: udev: /etc/init.d/udev start only works on system 
start-up
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 11 Feb 2005 21:14:25 +
>From [EMAIL PROTECTED] Fri Feb 11 13:14:24 2005
Return-path: <[EMAIL PROTECTED]>
Received: from mailserver3.hrz.tu-darmstadt.de [130.83.174.21] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1Czi7M-0006Lf-00; Fri, 11 Feb 2005 13:14:24 -0800
Received: from gaja.helas.net (drm9-d514ea1d.pool.mediaWays.net [213.20.234.29])
(authenticated bits=0)
by mailserver3.hrz.tu-darmstadt.de (8.12.10/8.12.7) with ESMTP id 
j1BLE8uj016786
(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO)
for <[EMAIL PROTECTED]>; Fri, 11 Feb 2005 22:14:09 +0100
Received: by gaja.helas.net (Postfix, from userid 1000)
id 7D1A02009C4; Fri, 11 Feb 2005 22:14:10 +0100 (CET)
Date: Fri, 11 Feb 2005 22:14:10 +0100
From: Martin Zobel-Helas <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: udev: /etc/init.d/udev start only works on system start-up
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-GPG-Key: http://helas.dyndns.org/~hel/public-key.asc
X-GPG-Fingerprint: 4CF7 EF52 616A 53B3 BA59  E9E1 85F1 3484 FA4F 45BC
User-Agent: Mutt/1.5.6+20040907i
X-TUD-HRZ-MailScanner: Found to be clean
X-TUD-HRZ-MailScanner-SpamCheck: not spam, SpamAssassin (Wertung=0,
benoetigt 5)
X-MailScanner-From: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 


Package: udev
Severity: serious
Justification: Debian Policy 9.3.2

Hi Marco,

Policy say at 9.3.2

These scripts should be named /etc/init.d/package, and they should
accept one argument, saying what to do:

start
start the service, 

stop
stop the service,



02/11/05 [21:57:36] < zobel> Md: at least policy says in 9.3.2 that start 
should result in starting the service..
02/11/05 [21:57:54] < zobel> so if i stop and start it udev needs to be started
02/11/05 [21:58:29] < zobel> so udev is currently not policy-conform6 
02/11/05 [21:59:19] < zobel> udev start currently only works at system startup.
02/11/05 [22:00:55] < Md> zobel: too bad. I tried, believe me, but it's just 
too hard to be worth it. postinst can start it, but stopping it is not 
  possible
02/11/05 [22:02:41] < zobel> Md: so i would say udev is to experimental at this 
state and would sugest to remove it from testing 'til starting 
   (and stoppping[1]) udev not only on system startup 
works...


Greetings
Martin

[1] added.
--
Successophobia:
The fear that if one is successful, then one's personal needs
will be forgotten and one will no longer have one's childish needs
catered to.
-- Douglas Coupland, "Generation X: Tales for an Accelerated
   Culture"

---
Received: (at 294843-done) by bugs.debian.org; 11 Feb 2005 21:31:20 +
>From [EMAIL PROTECTED] Fri Feb 11 13:31:20 2005
Return-path: <[EMAIL PROTECTED]>
Received: from attila.bofh.it [213.92.8.2] (postfix)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CziNj-0005gq-00; Fri, 11 Feb 2005 13:31:19 -0800
Received: by attila.bofh.it (Postfix, from userid 10)
id 8B3645F7AA; Fri, 11 Feb 2005 22:31:17 +0100 (CET)
Received: by wonderland.linux.it (Postfix, from userid 1001)
id 06D041C2A8; Fri, 11 Feb 2005 22:31:08 +0100 (CET)
Date: Fri, 11 Feb 2005 22:31:07 +0100
To: [EMAIL PROTECTED]
Subject: Re: Bug#294843: udev: /etc/init.d/udev start only works on system 
start-up
Message-ID: <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="SUOF0GtieIMvvwua"
Content-Disposition: inline
In-Reply-To: <[EMAIL PROTECTED]>
User-Agent: Mutt/1.5.6+20040907i
From: [EMAIL PROTECTED] (Marco d'Itri)
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09

Bug#294843: udev: /etc/init.d/udev start only works on system start-up

2005-02-11 Thread Martin Zobel-Helas

Package: udev
Severity: serious
Justification: Debian Policy 9.3.2

Hi Marco,

Policy say at 9.3.2

These scripts should be named /etc/init.d/package, and they should
accept one argument, saying what to do:

start
start the service, 

stop
stop the service,



02/11/05 [21:57:36] < zobel> Md: at least policy says in 9.3.2 that start 
should result in starting the service..
02/11/05 [21:57:54] < zobel> so if i stop and start it udev needs to be started
02/11/05 [21:58:29] < zobel> so udev is currently not policy-conform6 
02/11/05 [21:59:19] < zobel> udev start currently only works at system startup.
02/11/05 [22:00:55] < Md> zobel: too bad. I tried, believe me, but it's just 
too hard to be worth it. postinst can start it, but stopping it is not 
  possible
02/11/05 [22:02:41] < zobel> Md: so i would say udev is to experimental at this 
state and would sugest to remove it from testing 'til starting 
   (and stoppping[1]) udev not only on system startup 
works...


Greetings
Martin

[1] added.
--
Successophobia:
The fear that if one is successful, then one's personal needs
will be forgotten and one will no longer have one's childish needs
catered to.
-- Douglas Coupland, "Generation X: Tales for an Accelerated
   Culture"


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#293932: [Python-Dev] license issues with profiler.py and md5.h/md5c.c

2005-02-11 Thread Tim Peters
[Jeremy Hylton]
>> Unfortunately a license that says it is in the public domain is
>> unacceptable (and should be for Debian, too).  That is to say, it's
>> not possible for someone to claim that something they produce is in
>> the public domain.  See http://www.linuxjournal.com/article/6225

[Michael Chermside]
> Not quite true. It would be a bit off-topic to discuss on this list
> so I will simply point you to:
> 
>http://creativecommons.org/license/publicdomain-2
> 
> ...which is specifically designed for the US legal system. It _IS_
> possible for someone to produce something in the public domain, it
> just isn't as easy as some people think (just saying it doesn't
> necessarily make it so (at least under US law)) and it may not be
> a good idea.

The article Jeremy pointed at was written by the Python Software
Foundation's occasional legal counsel, and he disagrees.  While I
would love to believe that copyright law isn't this bizarre, I can't
recommend going against the best legal advice the PSF was willing to
pay for .

Note that Creative Commons doesn't recommend that you do either; from their FAQ:

   Can I use a Creative Commons license for software?

   In theory, yes, but it is not in your best interest. We strongly
encourage you to
   use one of the very good software licenses available today. (The
Free Software
   Foundation and the Open Source Initiative stand out as resources for such
   licenses.) 

> I would expect that if something truly WERE in the public domain,
> then it would be acceptable for Python (and for Debian too, for
> that matter).

So would I, but according to Larry there isn't such a thing (excepting
software written by the US Government; and for other software you
might be thinking about today, maybe in about a century if the author
lets their copyright lapse).

If Larry is correct, it isn't legally possible for an individual in
the US to disclaim copyright, regardless what they may say or sign. 
The danger then is that accepting software that purports to be free of
copyright can come back to bite you, if the author later changes their
mind (from your POV; the claim is that from US law's POV, nothing has
actually changed, since the author never actually gave up copyright to
begin with).

The very fact that this argument exists underscores the desirability
of only accepting software with an explicit license, spelling out the
copyright holder's intents wrt distribution, modification, etc.  Then
you're just in legal mud, instead of legal quicksand.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294835: FWD: [USN-80-1] mod_python vulnerability

2005-02-11 Thread Joey Hess
Package: libapache2-mod-python
Version: 3.1.3-2.2
Severity: serious
Tags: security patch

I suppose we're vulnerable to this hole. Here's the patch red hat used:

https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=110440&action=view

I'm not sure if the information discolsure is release critical, so this
bug report could be downgraded. Or just quickly fixed. ;-)

- Forwarded message from Martin Pitt <[EMAIL PROTECTED]> -

From: Martin Pitt <[EMAIL PROTECTED]>
Date: Fri, 11 Feb 2005 10:41:39 +0100
To: [EMAIL PROTECTED]
Cc: full-disclosure@lists.netsys.com, bugtraq@securityfocus.com
Subject: [USN-80-1] mod_python vulnerability
User-Agent: Mutt/1.5.6+20040907i

===
Ubuntu Security Notice USN-80-1   February 11, 2005
libapache2-mod-python vulnerabilities
CAN-2005-0088
===

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The following packages are affected:

libapache2-mod-python2.2
libapache2-mod-python2.3

The problem can be corrected by upgrading the affected package to
version 3.1.3-1ubuntu3.2.  After a standard system upgrade you need to
restart the Apache 2 web server using

  sudo /etc/init.d/apache2 restart

to effect the necessary changes.

Details follow:

Graham Dumpleton discovered an information disclosure in the
"publisher" handle of mod_python. By requesting a carefully crafted
URL for a published module page, anybody can obtain extra information
about internal variables, objects, and other information which is not
intended to be visible.

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/liba/libapache2-mod-python/libapache2-mod-python_3.1.3-1ubuntu3.2.diff.gz
  Size/MD5:24067 485183927dd680eedb351cedbd0bb882

http://security.ubuntu.com/ubuntu/pool/main/liba/libapache2-mod-python/libapache2-mod-python_3.1.3-1ubuntu3.2.dsc
  Size/MD5:  806 3b141dd6a13c2abc0c1780ff8d9c34aa

http://security.ubuntu.com/ubuntu/pool/main/liba/libapache2-mod-python/libapache2-mod-python_3.1.3.orig.tar.gz
  Size/MD5:   293548 2e1983e35edd428f308b0dfeb1c23bfe

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/liba/libapache2-mod-python/libapache2-mod-python-doc_3.1.3-1ubuntu3.2_all.deb
  Size/MD5:   100700 6890472b77b13191bf5106123bbebc6c

http://security.ubuntu.com/ubuntu/pool/main/liba/libapache2-mod-python/libapache2-mod-python_3.1.3-1ubuntu3.2_all.deb
  Size/MD5:12462 b48ab5f2c09c47bfe0c7c02243766c4f

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/liba/libapache2-mod-python/libapache2-mod-python2.2_3.1.3-1ubuntu3.2_amd64.deb
  Size/MD5:87564 e331d0cbb7aacadc64ef44d41d326587

http://security.ubuntu.com/ubuntu/pool/main/liba/libapache2-mod-python/libapache2-mod-python2.3_3.1.3-1ubuntu3.2_amd64.deb
  Size/MD5:87650 0dcbdb227cae1b4721c4b8e0454b4ea6

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/universe/liba/libapache2-mod-python/libapache2-mod-python2.2_3.1.3-1ubuntu3.2_i386.deb
  Size/MD5:80502 003d29054ae210f2f81826bac8de7856

http://security.ubuntu.com/ubuntu/pool/main/liba/libapache2-mod-python/libapache2-mod-python2.3_3.1.3-1ubuntu3.2_i386.deb
  Size/MD5:80538 1813380c5c39583e9311e117f2823aca

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/universe/liba/libapache2-mod-python/libapache2-mod-python2.2_3.1.3-1ubuntu3.2_powerpc.deb
  Size/MD5:85218 d56d5f3a5cda43096dda9d1d7fc3fc0b

http://security.ubuntu.com/ubuntu/pool/main/liba/libapache2-mod-python/libapache2-mod-python2.3_3.1.3-1ubuntu3.2_powerpc.deb
  Size/MD5:85350 9df8b87f95570137d2402818a252b38d



- End forwarded message -

-- 
see shy jo


signature.asc
Description: Digital signature


Bug#294832: FWD: insecure temporary file creation in kdelibs 3.3.2

2005-02-11 Thread Joey Hess
Package: kdelibs-data
Version: 4:3.3.2-1
Tags: security
Severity: grave

We're vulnerable.

- Forwarded message from Davide Madrisan <[EMAIL PROTECTED]> -

From: Davide Madrisan <[EMAIL PROTECTED]>
Date: Fri, 11 Feb 2005 09:16:38 +0100
To: bugtraq@securityfocus.com
Subject: insecure temporary file creation in kdelibs 3.3.2
Organization: QiNet s.r.l.
User-Agent: KMail/1.7.2

The `dcopidlng' script in the KDE library package 
(kdelibs-3.3.2/dcop/dcopidlng/dcopidlng)
creates temporary files in a unsecure manner.

This bug has been fixed in 32 minutes (!) by Stephan Kulow, the KDE team 
leader. Here you can found the official patch:
http://bugs.kde.org/show_bug.cgi?id=97608

Note: This bug has been find by `autospec', the work-in-progress tool used by 
the QiLinux team to (semi)automatically create specfiles from tarballs and 
update/check rpm packages. It's released under GPL and not QiLinux specific.
The latest release can be found at the URL:
ftp://ftp.qilinux.it/pub/QiLinux/devel/tools/autospec/

#include 
---
Davide Madrisan
QiLinux Security Team Leader
PGP keyID: 4B72B0B9 fp: 2B79 BFF1 EE33 EE8C 3258 E43C CDA8 EFF3 4B72 B0B9
PGP public key: 
http://www.qilinux.it



- End forwarded message -

-- 
see shy jo


signature.asc
Description: Digital signature


Bug#294809: Really merge

2005-02-11 Thread Adam D. Barratt
# It helps if I don't typo the bug number *sigh*
package apt
merge 294809 294684
thanks



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294831: piwi: FTBFS: chmod: cannot access `/etc/piwi/config.pl': No such file or directory

2005-02-11 Thread Kurt Roeckx
Package: piwi
Version: 0.8+20041206-1
Severity: serious

Hi,

Your package is failing to build with the following error:
install -m644 debian/httpd.conf /usr/src/piwi-0.8+20041206/debian/piwi/etc/piwi/
chown -R www-data:www-data 
/usr/src/piwi-0.8+20041206/debian/piwi/var/cache/piwi/generated
chmod 600 /etc/piwi/config.pl
chmod: cannot access `/etc/piwi/config.pl': No such file or directory


Kurt



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294690: marked as done (CAN-2005-0300: Directory traversal in JSBoard)

2005-02-11 Thread Debian Bug Tracking System
Your message dated Fri, 11 Feb 2005 21:20:48 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Bug#294690: CAN-2005-0300: Directory traversal in JSBoard
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 11 Feb 2005 05:27:34 +
>From [EMAIL PROTECTED] Thu Feb 10 21:27:34 2005
Return-path: <[EMAIL PROTECTED]>
Received: from luonnotar.infodrom.org [195.124.48.78] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CzTL4-0001qv-00; Thu, 10 Feb 2005 21:27:34 -0800
Received: by luonnotar.infodrom.org (Postfix, from userid 10)
id C7F3A366B78; Fri, 11 Feb 2005 06:27:36 +0100 (CET)
Received: at Infodrom Oldenburg (/\##/\ Smail-3.2.0.102 1998-Aug-2 #2)
from infodrom.org by finlandia.Infodrom.North.DE
via smail from stdin
id <[EMAIL PROTECTED]>
for [EMAIL PROTECTED]; Fri, 11 Feb 2005 06:22:26 +0100 (CET) 
Date: Fri, 11 Feb 2005 06:22:26 +0100
From: Martin Schulze <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: CAN-2005-0300: Directory traversal in JSBoard
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
X-Debbugs-Cc: [EMAIL PROTECTED]
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: jsboard
Version: 2.0.10-2
Severity: grave
Tags: sarge sid security patch

Please fix the directory traversal vulnerability.

http://marc.theaimsgroup.com/?l=bugtraq&m=110627201120011&w=2

Details
===
PHP has a feature discarding the input values containing null characters
when magic_quotes_gpc = off. Because JSBoard session.php doesn't sanitize
$table variable, a malicious attacker can read arbitrary files.

---
include_once "include/print.php";
parse_query_str();
$opt = $table ? "&table=$table" : "";
$opts = $table ? "?table=$table" : "";
...snip...
---

This is CAN-2005-0300
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0300

Reference: BUGTRAQ:20050120 STG Security Advisory: [SSA-20050120-22] JSBoard 
file disclosure
Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=110627201120011&w=2
Reference: BID:12319
Reference: URL:http://www.securityfocus.com/bid/12319
Reference: XF:jsboard-session-file-include(18990)
Reference: URL:http://xforce.iss.net/xforce/xfdb/18990

Regards,

Joey

-- 
The good thing about standards is that there are so many to choose from.
-- Andrew S. Tanenbaum

Please always Cc to me when replying to me on the lists.

---
Received: (at 294690-done) by bugs.debian.org; 11 Feb 2005 20:27:27 +
>From [EMAIL PROTECTED] Fri Feb 11 12:27:27 2005
Return-path: <[EMAIL PROTECTED]>
Received: from luonnotar.infodrom.org [195.124.48.78] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CzhNu-wS-00; Fri, 11 Feb 2005 12:27:27 -0800
Received: by luonnotar.infodrom.org (Postfix, from userid 10)
id EB8DF366B65; Fri, 11 Feb 2005 21:27:29 +0100 (CET)
Received: at Infodrom Oldenburg (/\##/\ Smail-3.2.0.102 1998-Aug-2 #2)
from infodrom.org by finlandia.Infodrom.North.DE
via smail from stdin
id <[EMAIL PROTECTED]>
for [EMAIL PROTECTED]; Fri, 11 Feb 2005 21:20:49 +0100 (CET) 
Date: Fri, 11 Feb 2005 21:20:48 +0100
From: Martin Schulze <[EMAIL PROTECTED]>
To: Joey Hess <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED]
Subject: Re: Bug#294690: CAN-2005-0300: Directory traversal in JSBoard
Message-ID: <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
In-Reply-To: <[EMAIL PROTECTED]>
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Joey Hess wrote:
> > http://marc.theaimsgroup.com/?l=bugtraq&m=110627201120011&w=2
> > 
> > Details
> > ===
> > PHP has a feature discarding the input values containing null characters
> > when m

Processed: Really merge

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # It helps if I don't typo the bug number *sigh*
> package apt
Ignoring bugs not assigned to: apt

> merge 294809 294684
Bug#294684: apt depends on experimental libgcc1
Bug#294809: apt: missing dependancies
Merged 294684 294809.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#293932: [Python-Dev] license issues with profiler.py and md5.h/md5c.c

2005-02-11 Thread Michael Chermside
Jeremy writes:

> Unfortunately a license that says it is in the public domain is
> unacceptable (and should be for Debian, too).  That is to say, it's
> not possible for someone to claim that something they produce is in
> the public domain.  See http://www.linuxjournal.com/article/6225

Not quite true. It would be a bit off-topic to discuss on this list
so I will simply point you to:

http://creativecommons.org/license/publicdomain-2

...which is specifically designed for the US legal system. It _IS_
possible for someone to produce something in the public domain, it
just isn't as easy as some people think (just saying it doesn't
necessarily make it so (at least under US law)) and it may not be
a good idea.

I would expect that if something truly WERE in the public domain,
then it would be acceptable for Python (and for Debian too, for
that matter). I can't comment on whether this applies to libmd.

-- Michael Chermside



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: swig1.3: FTBFS: too few arguments to function `zend_rsrc_list_get_rsrc_type'

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 294499 serious
Bug#294499: swig1.3: ftbfs [sparc] too few arguments to function 
`zend_rsrc_list_get_rsrc_type'
Severity set to `serious'.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294821: samba-common: smbd runs amok after smbclient '\\SERVER\SHARE' -U% -N and uses all available disk space for logging

2005-02-11 Thread Stefan Kanthak
Package: samba-common
Version: 2.2.3a-14.1
Severity: critical
Justification: breaks the whole system

The share \\SERVER\SHARE is setup for guest access without passwd.
smbclient '\\SERVER\SHARE' -U% -N connects successfully; upon exit of
smbclient the smbd starts writing the following two lines to its log
until the filesystem runs out of space.

[2005/02/11 20:21:30, 0] lib/util_str.c:string_sub(1221)
  ERROR: string overflow by 2 in string_sub(%a, 172)

I can reproduce the error with both smbd/smbclient from 2.2.3a-14.1 as
well as the ones from the 2.2.11-0.1 package provided by the Samba team.
I can even reproduce this error on smbd 2.2.12 running on non-Debian
systems (SINIX-Z 5.42C on i386 and ReliantUnix 5.45C on MIPS R1).
The error does NOT show when using the smbclient 2.2.12 from said
SINIX and ReliantUnix against the Debian or another machine.

-- System Information
Debian Release: 3.0
Architecture: i386
Kernel: Linux debian 2.4.26-1-686-smp #1 SMP Fri Aug 20 19:39:10 CEST 2004 i686
Locale: LANG=C, LC_CTYPE=C

Versions of packages samba-common depends on:
ii  debconf  1.0.32  Debian configuration management sy
ii  libc62.2.5-11.8  GNU C Library: Shared libraries an
ii  libcupsys2   1.1.14-5woody12 Common UNIX Printing System(tm) - 
ii  libpam-modules   0.72-35 Pluggable Authentication Modules f
ii  libpam0g 0.72-35 Pluggable Authentication Modules l


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294809: apt: missing dependancies

2005-02-11 Thread Adam D. Barratt
package apt
close 294809
merge 294684 284809
thanks

On Fri, 2005-02-11 at 13:49 -0500, Ross Bemrose wrote:
> Package: apt
> Version: 0.5.28.1
> Severity: grave
> Justification: renders package unusable
>
> apt-get install apt returns the following:
> The following packages have unmet dependencies:
>   apt: Depends: libgcc1 (>= 1:4.0) but 1:3.4.3-9 is to be installed

This is fixed in 0.5.28.3, which is currently in incoming and should hit
the mirrors soon.

Regards,

Adam



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#294809: apt: missing dependancies

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> package apt
Ignoring bugs not assigned to: apt

> close 294809
Bug#294809: apt: missing dependancies
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug closed, send any further explanations to Ross Bemrose <[EMAIL PROTECTED]>

> merge 294684 284809
Bug#284809: bittorrent: outgoing connections should use common source port to 
make traffic shaping easier
Bug#294684: apt depends on experimental libgcc1
Mismatch - only Bugs in same state can be merged:
Values for `package' don't match:
 #284809 has `bittorrent';
 #294684 has `apt'
Values for `severity' don't match:
 #284809 has `normal';
 #294684 has `grave'
Values for `done mark' don't match:
 #284809 has `open';
 #294684 has `done'

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294809: apt: missing dependancies

2005-02-11 Thread Ross Bemrose
Package: apt
Version: 0.5.28.1
Severity: grave
Justification: renders package unusable


apt-get install apt returns the following:
The following packages have unmet dependencies:
  apt: Depends: libgcc1 (>= 1:4.0) but 1:3.4.3-9 is to be installed


-- Package-specific info:

-- (no /etc/apt/preferences present) --


-- /etc/apt/sources.list --

# the main Debian packages.
deb http://208.185.25.35/debian/ unstable main contrib
# Uncomment the deb-src line if you want 'apt-get source'
# to work with most packages.
deb-src http://208.185.25.35/debian/ unstable main contrib

# the non-US Debian packages.
deb http://ftp.lug.udel.edu/debian-non-US/ unstable/non-US main contrib
# Uncomment the deb-src line if you want 'apt-get source'
# to work with most non-US packages
deb-src http://ftp.lug.udel.edu/debian-non-US/ unstable/non-US main contrib

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.6-2-k7
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages apt depends on:
ii  libc6   2.3.2.ds1-20 GNU C Library: Shared libraries an
ii  libgcc1 1:3.4.3-9GCC support library
ii  libstdc++5  1:3.3.5-8The GNU Standard C++ Library v3

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: tagging 294717

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.8.10
> tags 294717 sid
Bug#294717: gpsbabel doesn't build on most architectures
There were no tags set.
Tags added: sid

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294751: oh well, the patch was not enough :/

2005-02-11 Thread Sven Luther
Hello,

The previous patch did fix the one issue, but it immediately failed with : 

test ! -f debian/rules &&   \
   install -p -m 755 /usr/share/kernel-package/rules debian/rules
echo done >  stamp-debian
Please ignore the warning about overriding and ignoring targets above.
These are harmless. They are only invoked in a part of the process
that tries to snarf variable values for the conf.vars file.
sed: -e expression #1, char 0: no previous regular expression
make[1]: *** [conf.vars] Error 1
make[1]: Leaving directory
`/home/sven/debian/kernel/build/kernel-patch-powerpc-2.6.10-2.6.10/tmp/kernel-source-2.6.10'
make: *** [stamp-configure] Error 2

Which clearly seems to be a bug in :

  @sed -e 's%$(TOPDIR)%$$(TOPDIR)%g' .mak > conf.vars

And .mak is :

VERSION  = 2
PATCHLEVEL   = 6
SUBLEVEL= 10
EXTRAVERSION =
KPKG_SELECTED_MODULES =
Debian Revision  = 2.6.10-2
KPKG_ARCH=
do_parallel  =
fast_dep =

Not sure what this is about, so let's see what meld tells me of your changes :)

Mmm, nothing very speaking.

Friendly,




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294751: trivial patch : conf_vars -> conf.vars :)

2005-02-11 Thread Sven Luther
tags 294751 + patch
thanks

Here is attached the trivial patch to fix this issue, at least i think so.

Friendly,

Sven Luther
--- /usr/share/kernel-package/rules.orig2005-02-11 18:54:57.783898864 
+0100
+++ /usr/share/kernel-package/rules 2005-02-11 18:55:16.107113312 +0100
@@ -1707,7 +1707,7 @@
   install -p -m 755 $(DEBDIR)/rules debian/rules
echo done >  $@
 
-conf_vars: Makefile .config
+conf.vars: Makefile .config
@rm -f .mak
@touch .mak
@echo Please ignore the warning about overriding and ignoring targets 
above.


Bug#293932: [Python-Dev] license issues with profiler.py and md5.h/md5c.c

2005-02-11 Thread Gregory P. Smith
> I think it would be cleaner and simpler to modify the existing
> md5module.c to use the openssl md5 layer API (this is just a
> search/replace to change the function names). The bigger problem is
> deciding what/how/whether to include the openssl md5 implementation
> sources so that win32 can use them.

yes, that is all i was suggesting.

win32 python is already linked against openssl for the socket module
ssl support, having the md5 and sha1 modules depend on openssl should
not cause a problem.

-greg



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: trivial patch : conf_vars -> conf.vars :)

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 294751 + patch
Bug#294751: FTBFS: cannot build powerpc 2.6 kernels, missing rule for conf.vars
There were no tags set.
Tags added: patch

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294793: FWD: [SECURITY] [DSA 676-1] New xpcd packages fix arbitrary code execution as root

2005-02-11 Thread Joey Hess
Package: xpcd
Version: 2.08-11
Severity: grave
Tags: security

Please see DSA below, I don't see a bug report for this or fix for
unstable yet.

- Forwarded message from Martin Schulze <[EMAIL PROTECTED]> -

From: Martin Schulze <[EMAIL PROTECTED]>
Date: Fri, 11 Feb 2005 11:29:03 +0100 (CET)
To: Debian Security Announcements 
Subject: [SECURITY] [DSA 676-1] New xpcd packages fix arbitrary code execution 
as root
User-Agent: dsa-launch $Revision: 1.17 $
Reply-To: debian-security@lists.debian.org

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 676-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
February 11th, 2005 http://www.debian.org/security/faq
- --

Package: xpcd
Vulnerability  : buffer overflow
Problem-Type   : local
Debian-specific: no
CVE ID : CAN-2005-0074

Erik Sjölund discovered a buffer overflow in pcdsvgaview, an SVGA
PhotoCD viewer.  xpcd-svga is part of xpcd and uses svgalib to display
graphics on the Linux console for which root permissions are required.
A malicious user could overflow a fixed-size buffer and may cause the
program to execute arbitrary code with elevated privileges.

For the stable distribution (woody) this problem has been fixed in
version 2.08-8woody3.

For the unstable distribution (sid) this problem will be fixed soon.

We recommend that you upgrade your xpcd-svga package immediately.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- 

  Source archives:

http://security.debian.org/pool/updates/main/x/xpcd/xpcd_2.08-8woody3.dsc
  Size/MD5 checksum:  706 b1e7b8aeafd929cd31f9403b6534c86b

http://security.debian.org/pool/updates/main/x/xpcd/xpcd_2.08-8woody3.diff.gz
  Size/MD5 checksum:14837 e67ca4ae6f6c0cc09033e195ad188825
http://security.debian.org/pool/updates/main/x/xpcd/xpcd_2.08.orig.tar.gz
  Size/MD5 checksum:   103104 59bf5b8d0466ecb3c58ed1fffcdf499e

  Alpha architecture:


http://security.debian.org/pool/updates/main/x/xpcd/xpcd_2.08-8woody3_alpha.deb
  Size/MD5 checksum:81170 17302a158ec404cf6b7961b8434cec33

http://security.debian.org/pool/updates/main/x/xpcd/xpcd-gimp_2.08-8woody3_alpha.deb
  Size/MD5 checksum:13494 a0a1cec324c9c5fb202e18f33ee5fa59

  ARM architecture:


http://security.debian.org/pool/updates/main/x/xpcd/xpcd_2.08-8woody3_arm.deb
  Size/MD5 checksum:68116 7219d4fbdf1602941a2e17bb136ab348

http://security.debian.org/pool/updates/main/x/xpcd/xpcd-gimp_2.08-8woody3_arm.deb
  Size/MD5 checksum:11954 c47772b3c30cfc26be6f7c53450225bc

  Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/x/xpcd/xpcd_2.08-8woody3_i386.deb
  Size/MD5 checksum:64336 33d7f7a4ddf29576e4a37b89c3feb8eb

http://security.debian.org/pool/updates/main/x/xpcd/xpcd-gimp_2.08-8woody3_i386.deb
  Size/MD5 checksum:11840 3234d80da9074230309b8ac5e3e5e0c3

http://security.debian.org/pool/updates/main/x/xpcd/xpcd-svga_2.08-8woody3_i386.deb
  Size/MD5 checksum:20964 9aba7400f6af8a22c90ff3cb69a44431

  Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/x/xpcd/xpcd_2.08-8woody3_ia64.deb
  Size/MD5 checksum:97850 88da140c9f83d0f56768e80e08923b82

http://security.debian.org/pool/updates/main/x/xpcd/xpcd-gimp_2.08-8woody3_ia64.deb
  Size/MD5 checksum:15450 9333d80f7e16cf885b5138291969d3fb

  HP Precision architecture:


http://security.debian.org/pool/updates/main/x/xpcd/xpcd_2.08-8woody3_hppa.deb
  Size/MD5 checksum:73434 e479d36155807d7b0b19cf62e40ade42

http://security.debian.org/pool/updates/main/x/xpcd/xpcd-gimp_2.08-8woody3_hppa.deb
  Size/MD5 checksum:12944 cb8feab07d3cb23488f3487192d2f82d

  Motorola 680x0 architecture:


http://security.debian.org/pool/updates/main/x/xpcd/xpcd_2.08-8woody3_m68k.deb
  Size/MD5 checksum:62778 262bc4fa9f4a76c727aa7ae3be63dd02

http://security.debian.org/pool/updates/main/x/xpcd/xpcd-gimp_2.08-8woody3_m68k.deb
  Size/MD5 checksum:11630 0240c6672a38049666b7383e9eb5b193

  Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/x/xpcd/xpcd_2.08-8woody3_mips.deb
  Size/MD5 checksum:73636 75f8f7d42cdbfd51e505c89516a7966a

http://security.debia

Bug#294795: FWD: [SECURITY] [DSA 677-1] New sympa packages fix potential arbitrary code execution

2005-02-11 Thread Joey Hess
Package: sympa
Version: 4.1.2-2
Severity: serious
Tags: security

See DSA below. I don't see a fix in unstable yet or any other bug
report.

- Forwarded message from Martin Schulze <[EMAIL PROTECTED]> -

From: Martin Schulze <[EMAIL PROTECTED]>
Date: Fri, 11 Feb 2005 12:38:39 +0100 (CET)
To: Debian Security Announcements 
Subject: [SECURITY] [DSA 677-1] New sympa packages fix potential arbitrary code 
execution
User-Agent: dsa-launch $Revision: 1.17 $
Reply-To: debian-security@lists.debian.org

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 677-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
February 11th, 2005 http://www.debian.org/security/faq
- --

Package: sympa
Vulnerability  : buffer overflow
Problem-Type   : local
Debian-specific: no
CVE ID : CAN-2005-0073

Erik Sjölund discovered that a support script of sympa, a mailing list
manager, is running setuid sympa and vulnerable to a buffer overflow.
This could potentially lead to the execution of arbitrary code under
the sympa user id.

For the stable distribution (woody) this problem has been fixed in
version 3.3.3-3woody2.

For the unstable distribution (sid) this problem will be fixed soon.

We recommend that you upgrade your sympa package.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- 

  Source archives:

http://security.debian.org/pool/updates/main/s/sympa/sympa_3.3.3-3woody2.dsc
  Size/MD5 checksum:  601 757b8a0b0b6dde6e1b4626768e98aaaf

http://security.debian.org/pool/updates/main/s/sympa/sympa_3.3.3-3woody2.diff.gz
  Size/MD5 checksum:44518 1bcea87b271163637a68aae20e1e14f9
http://security.debian.org/pool/updates/main/s/sympa/sympa_3.3.3.orig.tar.gz
  Size/MD5 checksum:  1457710 59776560bfb6c124c5a25129127383be

  Architecture independent components:


http://security.debian.org/pool/updates/main/s/sympa/wwsympa_3.3.3-3woody2_all.deb
  Size/MD5 checksum:   349648 0933a74b3e7b529bc3ccfff1e44fd310

  Alpha architecture:


http://security.debian.org/pool/updates/main/s/sympa/sympa_3.3.3-3woody2_alpha.deb
  Size/MD5 checksum:   636122 bcf354d30dd2bda45baeebb512ac84f2

  ARM architecture:


http://security.debian.org/pool/updates/main/s/sympa/sympa_3.3.3-3woody2_arm.deb
  Size/MD5 checksum:   634994 3936100bb555bc3f0c67cc4476138d46

  Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/s/sympa/sympa_3.3.3-3woody2_i386.deb
  Size/MD5 checksum:   634982 bb63c09723a848b727d95994d9804ee9

  Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/s/sympa/sympa_3.3.3-3woody2_ia64.deb
  Size/MD5 checksum:   637714 2f88784e6c5a9cffdb5a75c56e08ec6d

  HP Precision architecture:


http://security.debian.org/pool/updates/main/s/sympa/sympa_3.3.3-3woody2_hppa.deb
  Size/MD5 checksum:   635516 9808c2d9c7e812141c6bb21c63694903

  Motorola 680x0 architecture:


http://security.debian.org/pool/updates/main/s/sympa/sympa_3.3.3-3woody2_m68k.deb
  Size/MD5 checksum:   635186 0fa581c1fc424991e18079e09dec910d

  Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/s/sympa/sympa_3.3.3-3woody2_mips.deb
  Size/MD5 checksum:   634980 b7cba06ff5e119967c0568392797d78c

  Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/s/sympa/sympa_3.3.3-3woody2_mipsel.deb
  Size/MD5 checksum:   635016 fbf75e6f39246a03007e0627b35ea8b0

  PowerPC architecture:


http://security.debian.org/pool/updates/main/s/sympa/sympa_3.3.3-3woody2_powerpc.deb
  Size/MD5 checksum:   634678 061911261f49ddd13918c1af45d2738b

  IBM S/390 architecture:


http://security.debian.org/pool/updates/main/s/sympa/sympa_3.3.3-3woody2_s390.deb
  Size/MD5 checksum:   635834 f127573347d01e3cd5daedb6235462b5

  Sun Sparc architecture:


http://security.debian.org/pool/updates/main/s/sympa/sympa_3.3.3-3woody2_sparc.deb
  Size/MD5 checksum:   639518 c86008d13499edddeaf9f5f5daf5a667


  These files will probably be moved into the stable distribution on
  its next update.

- 
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debia

Processed: strange mixture of bugs(2)

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 290474 important
Bug#290474: kernel-image-2.6.10-1-686: impossible to mount the root partition 
on a SATA disk
Severity set to `important'.

> stop
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294690: CAN-2005-0300: Directory traversal in JSBoard

2005-02-11 Thread Joey Hess
Martin Schulze wrote:
> Package: jsboard
> Version: 2.0.10-2
> Severity: grave
> Tags: sarge sid security patch
> 
> Please fix the directory traversal vulnerability.
> 
> http://marc.theaimsgroup.com/?l=bugtraq&m=110627201120011&w=2
> 
> Details
> ===
> PHP has a feature discarding the input values containing null characters
> when magic_quotes_gpc = off. Because JSBoard session.php doesn't sanitize
> $table variable, a malicious attacker can read arbitrary files.
> 
> ---
> include_once "include/print.php";
> parse_query_str();
> $opt = $table ? "&table=$table" : "";
> $opts = $table ? "?table=$table" : "";
> ...snip...
> ---
> 
> This is CAN-2005-0300
> URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0300
> 
> Reference: BUGTRAQ:20050120 STG Security Advisory: [SSA-20050120-22] JSBoard 
> file disclosure
> Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=110627201120011&w=2
> Reference: BID:12319
> Reference: URL:http://www.securityfocus.com/bid/12319
> Reference: XF:jsboard-session-file-include(18990)
> Reference: URL:http://xforce.iss.net/xforce/xfdb/18990

Wasn't this fixed in version 2.0.10-1?

-- 
see shy jo


signature.asc
Description: Digital signature


Bug#294790: libgphoto2-2: Cannot import photos from Kodak DX6340 camera

2005-02-11 Thread Leandro Noferini
Package: libgphoto2-2
Version: 2.1.5-3
Severity: grave
Justification: renders package unusable

If you try to import photos using gthumb you get the error "PTP error".
If you try to import using gphoto2 directly you get the error

*** Error ***
PTP Protocol error, response expected
*** Error (-1: 'Unspecified error') ***

If you try 'env LANG=C gphoto2 --debug -P' you get a long response (that
I could send if you need)

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: powerpc (ppc)
Kernel: Linux 2.6.8.1-3-powerpc
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages libgphoto2-2 depends on:
ii  adduser 3.59 Add and remove users and groups
ii  libc6   2.3.2.ds1-20 GNU C Library: Shared libraries an
ii  libexif10   0.6.9-4  The EXIF library allows you to par
ii  libgphoto2-port02.1.5-3  gphoto2 digital camera port librar
ii  libjpeg62   6b-9 The Independent JPEG Group's JPEG 

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294576: marked as done (Configuration should use /etc//conf.d/horde2.conf)

2005-02-11 Thread Debian Bug Tracking System
Your message dated Fri, 11 Feb 2005 11:32:04 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#294576: fixed in horde2 2.2.7-5
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 10 Feb 2005 14:37:46 +
>From [EMAIL PROTECTED] Thu Feb 10 06:37:45 2005
Return-path: <[EMAIL PROTECTED]>
Received: from postfix3-1.free.fr [213.228.0.44] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CzFRx-0006KT-00; Thu, 10 Feb 2005 06:37:45 -0800
Received: from [127.0.0.1] (meneltarma.homelinux.net [82.66.234.65])
by postfix3-1.free.fr (Postfix) with ESMTP id 837231734B6;
Thu, 10 Feb 2005 15:37:42 +0100 (CET)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: =?utf-8?q?Rapha=C3=ABl_=27SurcouF=27_Bordet?= <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: Configuration should use /etc//conf.d/horde2.conf
X-Mailer: reportbug 3.7.1
Date: Thu, 10 Feb 2005 15:34:13 +0100
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: horde2
Version: 2.2.7-4
Severity: wishlist

Hi,
Using /etc//conf.d/apache.conf is confusing...
Most packages uses a configuration file named whose name corresponds to 
that of the application, like for horde2: /etc/apache2/conf.d/horde2.conf

Best regards,

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-2-k7
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=UTF-8)

Versions of packages horde2 depends on:
ii  apache [httpd]1.3.33-4   versatile, high-performance HTTP s
ii  apache2-mpm-prefork [httpd]   2.0.53-1   traditional model for Apache2
ii  binutils  2.15-5 The GNU assembler, linker and bina
ii  debconf   1.4.45 Debian configuration management sy
ii  gettext   0.14.1-10  GNU Internationalization utilities
ii  logrotate 3.7-2  Log rotation utility
ii  make  3.80-9 The GNU version of the "make" util
ii  perl  5.8.4-6Larry Wall's Practical Extraction 
ii  php4  4:4.3.10-3 server-side, HTML-embedded scripti
ii  php4-pear 4:4.3.10-3 PEAR - PHP Extension and Applicati
ii  php4-pear-log 1.6.0-1.1  Log module for PEAR
ii  wwwconfig-common  0.0.42 Debian web auto configuration

-- debconf information:
* horde2/database_user: uid=admin,dc=debianfr,dc=net
* horde2/welcome:
* horde2/databasemgr_port: 389
* horde2/databasemgr_type: LDAP
* horde2/database_name: dc=debianfr,dc=net
  horde2/dbpgadmin: postgres
* horde2/databasemgr_server: localhost
  horde2/dbmyadmin: root

---
Received: (at 294576-close) by bugs.debian.org; 11 Feb 2005 16:38:20 +
>From [EMAIL PROTECTED] Fri Feb 11 08:38:19 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CzdoB-0003xV-00; Fri, 11 Feb 2005 08:38:19 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1Czdi8-0001FL-00; Fri, 11 Feb 2005 11:32:04 -0500
From: Ola Lundqvist <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#294576: fixed in horde2 2.2.7-5
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Fri, 11 Feb 2005 11:32:04 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: horde2
Source-Version: 2.2.7-5

We believe that the bug you reported is fixed in the latest version of
horde2, which is due to be installed in the Debian FTP archive:

horde2_2.2.7-5.diff.gz
  to pool/main/h/horde2/horde2_2.2.7-5.diff.gz
horde2_2.2.7-5.dsc
  to pool/main/h/horde2/horde2_

Bug#294544: marked as done (sfs-server: enables any user to manipulate any file exported from the server, ignoring permissions)

2005-02-11 Thread Debian Bug Tracking System
Your message dated Fri, 11 Feb 2005 10:18:58 -0600
with message-id <[EMAIL PROTECTED]>
and subject line Bug#294544: unr
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 10 Feb 2005 09:24:47 +
>From [EMAIL PROTECTED] Thu Feb 10 01:24:47 2005
Return-path: <[EMAIL PROTECTED]>
Received: from hawkesnest.net (tiberius.hawkesnest.net) [68.78.212.97] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CzAZ5-0006AW-00; Thu, 10 Feb 2005 01:24:47 -0800
Received: from hawke by tiberius.hawkesnest.net with local (Exim 4.34)
id 1CzATu-0004eQ-3W; Thu, 10 Feb 2005 03:19:26 -0600
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Alex Mauer <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: sfs-server: enables any user to manipulate any file exported from the 
server,
 ignoring permissions
X-Mailer: reportbug 3.2
Date: Thu, 10 Feb 2005 03:19:26 -0600
Message-Id: <[EMAIL PROTECTED]>
X-hawkesnest-MailScanner: Found to be clean
X-hawkesnest-MailScanner-SpamCheck: not spam, SpamAssassin (score=-5.871,
required 6, autolearn=not spam, ALL_TRUSTED -3.30, AWL 0.03,
BAYES_00 -2.60)
X-MailScanner-From: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: sfs-server
Version: 1:0.8-0+pre20041016.1-1
Severity: grave
Tags: security
Justification: user security hole

I created a file owned by root on the sfs server, permissions rw-r--r--.
Ran sfskey login to my non-root server account, I was able to remove the file.  
Tested this for non-root users as well: any user can remove any other users 
file.

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.4.27-2-686-smp
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages sfs-server depends on:
ii  libc62.3.2.ds1-20GNU C Library: Shared libraries an
ii  libdb4.2 4.2.52-17   Berkeley v4.2 Database Libraries [
ii  libgcc1  1:3.4.3-6   GCC support library
ii  libgmp3  4.1.4-5 Multiprecision arithmetic library
ii  libpam0g 0.76-22 Pluggable Authentication Modules l
ii  libsfs0  1:0.8-0+pre20041016.1-1 Self-Certifying File System shared
ii  libstdc++5   1:3.3.5-5   The GNU Standard C++ Library v3
ii  nfs-kernel-serve 1:1.0.7-1   Kernel NFS server support
ii  sfs-common   1:0.8-0+pre20041016.1-1 Self-Certifying File System common

-- no debconf information

---
Received: (at 294544-done) by bugs.debian.org; 11 Feb 2005 16:20:24 +
>From [EMAIL PROTECTED] Fri Feb 11 08:20:24 2005
Return-path: <[EMAIL PROTECTED]>
Received: from hawkesnest.net (tiberius.hawkesnest.net) [68.78.212.97] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CzdWq-0008LD-00; Fri, 11 Feb 2005 08:20:24 -0800
Received: from [208.255.6.238] (helo=gtpl2332l.bgt.banta.com)
by tiberius.hawkesnest.net with asmtp (TLS-1.0:RSA_ARCFOUR_MD5:16)
(Exim 4.34)
id 1CzdVn-0006IS-AP; Fri, 11 Feb 2005 10:19:19 -0600
Subject: Re: Bug#294544: unr
From: Alex Mauer <[EMAIL PROTECTED]>
To: Clint Adams <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED]
In-Reply-To: <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]>
Content-Type: multipart/signed; micalg=pgp-sha1; 
protocol="application/pgp-signature"; boundary="=-pcflTxxPGNo6Q3qQHq+j"
Date: Fri, 11 Feb 2005 10:18:58 -0600
Message-Id: <[EMAIL PROTECTED]>
Mime-Version: 1.0
X-Mailer: Evolution 2.0.3 
X-hawkesnest-MailScanner: Found to be clean
X-hawkesnest-MailScanner-SpamCheck: not spam, SpamAssassin (score=-5.873,
required 6, autolearn=not spam, ALL_TRUSTED -3.30, AWL 0.03,
BAYES_00 -2.60)
X-MailScanner-From: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.d

Bug#289791: marked as done (systraq: Sends cronjob output every hour about missing paterns file)

2005-02-11 Thread Debian Bug Tracking System
Your message dated Fri, 11 Feb 2005 11:17:20 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#289791: fixed in systraq 0.0.20050209-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 11 Jan 2005 02:19:11 +
>From [EMAIL PROTECTED] Mon Jan 10 18:19:11 2005
Return-path: <[EMAIL PROTECTED]>
Received: from mail.kollegiegaarden.dk [194.239.210.251] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CoBcl-0006OB-00; Mon, 10 Jan 2005 18:19:11 -0800
Received: from localhost (localhost [127.0.0.1])
by mail.kollegiegaarden.dk (Postfix) with ESMTP id 985A1780005
for <[EMAIL PROTECTED]>; Tue, 11 Jan 2005 03:19:09 +0100 (CET)
Received: from mail.kollegiegaarden.dk ([127.0.0.1])
by localhost (mail [127.0.0.1]) (amavisd-new, port 10024) with ESMTP
id 10150-05; Tue, 11 Jan 2005 03:19:06 +0100 (CET)
Received: from babamus.kollegiegaarden.dk (babamus.kollegiegaarden.dk 
[194.239.210.15])
by mail.kollegiegaarden.dk (Postfix) with ESMTP id 2302D780004;
Tue, 11 Jan 2005 03:19:06 +0100 (CET)
Received: from bruun by babamus.kollegiegaarden.dk with local (Exim 4.34)
id 1CoBee-000751-Pi; Tue, 11 Jan 2005 03:21:09 +0100
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Christian Bruun <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: systraq: Sends cronjob output every hour about missing paterns file
X-Mailer: reportbug 3.5
Date: Tue, 11 Jan 2005 03:20:38 +0100
Message-Id: <[EMAIL PROTECTED]>
X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at kollegiegaarden.dk
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: systraq
Version: 0.0.20041118-1
Severity: minor


Just installed systraq yesterday, and since I have got an cronjob output email 
every hour with the folowing line:

/usr/sbin/st_snapshot: patterns file /etc/systraq/snapshot_root.list not 
readable



Have checked, the file is not there.

Christian



-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.9-rc2
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages systraq depends on:
ii  adduser   3.59   Add and remove users and groups
ii  debsums   2.0.13 Verify installed package files aga
ii  exim4-daemon-light [mail-tran 4.34-10Lightweight version of the Exim (v
ii  filetraq  0.2-11 Small utility to keep track of cha
ii  net-tools 1.60-10The NET-3 networking toolkit
ii  procps1:3.2.4-1  The /proc file system utilities

-- no debconf information

---
Received: (at 289791-close) by bugs.debian.org; 11 Feb 2005 16:23:03 +
>From [EMAIL PROTECTED] Fri Feb 11 08:23:03 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CzdZP-As-00; Fri, 11 Feb 2005 08:23:03 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1CzdTs-mv-00; Fri, 11 Feb 2005 11:17:20 -0500
From: Laurent Fousse <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#289791: fixed in systraq 0.0.20050209-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Fri, 11 Feb 2005 11:17:20 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: systraq
Source-Version: 0.0.20050209-1

We believe that the bug you reported is fixed in the latest version of
systraq, which is due to be installed in the Debian FTP archive:

systraq_0.0.20050209-1.diff.gz
  to pool/main/s/systraq/systraq_0.0.20050209-1.diff.gz
systraq_0.0.20050209-1.dsc
  to pool/main/s/systraq/systraq_0.0.20050209-1.dsc
systraq_0.0.20050209-1_all.deb
 

Bug#294488: Ubuntu patch

2005-02-11 Thread Martin Schulze
Thanks.

Martin Pitt wrote:
> Here is the patch used for the Ubuntu security update:
> 
>   http://patches.ubuntu.com/patches/awstats.more-CAN-2005-0016.diff

CAN-2005-0016 is the gatos problem Debian fixed in DSA 640

>  awstats (6.2-1.1ubuntu1) hoary; urgency=low
>  .
>* SECURITY UPDATE: fix more arbitrary command execution vulnerabilities
>* wwwroot/cgi-bin/awstats.pl: remove all non-path characters from the
>  "config", "pluginmode", "loadplugin", and "noloadplugin" parameters 
> (which
>  are defined by the remote user) to prevent execution of arbitrary shell
>  commands through shell metacharacters.
>* References:
>  similar to CAN-2005-0116

CAN-2005-0116 does not apply to the stable Debian release
http://www.debian.org/security/nonvulns-woody#CAN-2005-0116

However, from the patch you provided, at least the "config" is part
of the version in woody so we'll have to issue an update I guess.

Regards,

Joey

-- 
The good thing about standards is that there are so many to choose from.
-- Andrew S. Tanenbaum


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#291619: marked as done (systraq: FTBFS: Tries to download sources outside the debian archive.)

2005-02-11 Thread Debian Bug Tracking System
Your message dated Fri, 11 Feb 2005 11:17:20 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#291619: fixed in systraq 0.0.20050209-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 21 Jan 2005 21:54:22 +
>From [EMAIL PROTECTED] Fri Jan 21 13:54:22 2005
Return-path: <[EMAIL PROTECTED]>
Received: from poros.telenet-ops.be [195.130.132.44] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1Cs6jW-0002Ht-00; Fri, 21 Jan 2005 13:54:22 -0800
Received: from localhost (localhost.localdomain [127.0.0.1])
by poros.telenet-ops.be (Postfix) with SMTP id 9A8E83BC1E7
for <[EMAIL PROTECTED]>; Fri, 21 Jan 2005 22:54:21 +0100 (MET)
Received: from Q.roeckx.be (dD5775FD9.access.telenet.be [213.119.95.217])
by poros.telenet-ops.be (Postfix) with ESMTP id 8D7ED3BC102
for <[EMAIL PROTECTED]>; Fri, 21 Jan 2005 22:54:21 +0100 (MET)
Received: by Q.roeckx.be (Postfix, from userid 501)
id 6EFCB26136; Fri, 21 Jan 2005 22:54:21 +0100 (CET)
Date: Fri, 21 Jan 2005 22:54:21 +0100
From: Kurt Roeckx <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: systraq: FTBFS: Tries to download sources outside the debian archive.
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.4.2.1i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: systraq
Version: 0.0.20041118-2
Severity: serious

Hi,

Your package is failing to build because it's trying to connect
to the internet.  A package should be completly build from the
source and should not need anything outside the archive to build.

An extraction from the log:
/usr/bin/openjade -t sgml -D ../doc -d ./html.dsl 
/usr/share/sgml/declaration/xml.dcl manual.dbx
/usr/bin/openjade:manual.dbx:6:0:E: error connecting to "www.oasis-open.org" 
(Connection timed out)
/usr/bin/openjade:manual.dbx:6:0:E: DTD did not contain element declaration for 
document type name
[...]


Kurt


---
Received: (at 291619-close) by bugs.debian.org; 11 Feb 2005 16:23:04 +
>From [EMAIL PROTECTED] Fri Feb 11 08:23:04 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CzdZP-B4-00; Fri, 11 Feb 2005 08:23:04 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1CzdTs-mx-00; Fri, 11 Feb 2005 11:17:20 -0500
From: Laurent Fousse <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#291619: fixed in systraq 0.0.20050209-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Fri, 11 Feb 2005 11:17:20 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 2

Source: systraq
Source-Version: 0.0.20050209-1

We believe that the bug you reported is fixed in the latest version of
systraq, which is due to be installed in the Debian FTP archive:

systraq_0.0.20050209-1.diff.gz
  to pool/main/s/systraq/systraq_0.0.20050209-1.diff.gz
systraq_0.0.20050209-1.dsc
  to pool/main/s/systraq/systraq_0.0.20050209-1.dsc
systraq_0.0.20050209-1_all.deb
  to pool/main/s/systraq/systraq_0.0.20050209-1_all.deb
systraq_0.0.20050209.orig.tar.gz
  to pool/main/s/systraq/systraq_0.0.20050209.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Laurent Fousse <[EMAIL PROTECTED]> (supplier of updated systraq package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN P

Processed: Re: Bug#294576: Configuration should use /etc//conf.d/horde2.conf

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 294576 serious
Bug#294576: Configuration should use /etc//conf.d/horde2.conf
Severity set to `serious'.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294763: pvm: missing dependency on libpvm3

2005-02-11 Thread Uwe Storbeck
Package: pvm
Version: 3.4.2-17
Severity: grave
Justification: renders package unusable

pvm needs libpvm3.so.3, which is in package libpvm3:

  $ ldd /usr/bin/pvm
libpvm3.so.3 => not found
libc.so.6 => /lib/libc.so.6 (0x40029000)
/lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x4000)

But pvm does not depend on libpvm3:

  $ dpkg -s pvm
  Depends: libc6 (>= 2.3.2.ds1-4)

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (750, 'testing'), (650, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.4.29
Locale: LANG=C, LC_CTYPE=de_CH (charmap=ISO-8859-1)

Versions of packages pvm depends on:
ii  libc6   2.3.2.ds1-20 GNU C Library: Shared libraries an

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294328: marked as done (specimen: FTBFS: Missing Build-Depends on 'libphat0-dev')

2005-02-11 Thread Debian Bug Tracking System
Your message dated Fri, 11 Feb 2005 10:47:05 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#294328: fixed in specimen 0.4.5-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 9 Feb 2005 08:26:14 +
>From [EMAIL PROTECTED] Wed Feb 09 00:26:14 2005
Return-path: <[EMAIL PROTECTED]>
Received: from d157137.adsl.hansenet.de (localhost.localdomain) 
[80.171.157.137] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CynAs-0001kR-00; Wed, 09 Feb 2005 00:26:14 -0800
Received: from aj by localhost.localdomain with local (Exim 4.34)
id 1CynAp-0003K9-05; Wed, 09 Feb 2005 09:26:11 +0100
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
From: Andreas Jochens <[EMAIL PROTECTED]>
Subject: specimen: FTBFS: Missing Build-Depends on 'libphat0-dev'
Message-Id: <[EMAIL PROTECTED]>
Date: Wed, 09 Feb 2005 09:26:11 +0100
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: specimen
Severity: serious
Tags: patch

When building 'specimen' in a clean chroot,
I get the following error:

checking for pkg-config... /usr/bin/pkg-config
checking for gtk+-2.0 libxml-2.0 jack alsa samplerate sndfile phat... Package 
phat was not found in the pkg-config search path.
Perhaps you should add the directory containing `phat.pc'
to the PKG_CONFIG_PATH environment variable
No package 'phat' found

configure: error: Library requirements (gtk+-2.0 libxml-2.0 jack alsa 
samplerate sndfile phat) not met; consider adjusting the PKG_CONFIG_PATH 
environment variable if your libraries are in a nonstandard prefix so 
pkg-config can find them.
make: *** [config.status] Error 1

Please add the missing Build-Depends on 'libphat0-dev'
to debian/control.

When this is fixed, I get another error when trying to build the
package on amd64 with gcc-4.0:

if x86_64-linux-gcc -DHAVE_CONFIG_H -I. -I. -I. -O3 -DXTHREADS 
-I/usr/include/gtk-2.0 -I/usr/lib/gtk-2.0/include -I/usr/X11R6/include 
-I/usr/include/atk-1.0 -I/usr/include/pango-1.0 -I/usr/include/freetype2 
-I/usr/include/glib-2.0 -I/usr/lib/glib-2.0/include -I/usr/include/libxml2 
-I/usr/include/alsa   -pthread -DPIXMAPSDIR=\"/usr/share/specimen/pixmaps/\" 
-Wall -Werror -MT beef.o -MD -MP -MF".deps/beef.Tpo" -c -o beef.o beef.c; \
then mv -f ".deps/beef.Tpo" ".deps/beef.Po"; else rm -f ".deps/beef.Tpo"; exit 
1; fi
cc1: warnings being treated as errors
beef.c: In function 'beef_write':
beef.c:39: warning: pointer targets in passing argument 1 of 'xmlNewDoc' 
differin signedness
make[4]: *** [beef.o] Error 1
make[4]: Leaving directory `/srv/dbuild/tmp/specimen-0.4.5/src'

The attached patch also fixes this.

Regards
Andreas Jochens

diff -urN ../tmp-orig/specimen-0.4.5/debian/control ./debian/control
--- ../tmp-orig/specimen-0.4.5/debian/control   2005-02-09 08:45:39.686432279 
+0100
+++ ./debian/control2005-02-09 08:42:25.0 +0100
@@ -2,7 +2,7 @@
 Section: sound
 Priority: optional
 Maintainer: Eduardo Marcel Macan <[EMAIL PROTECTED]>
-Build-Depends: debhelper (>= 4.0.0), libphat0 (>= 0.2.3), libgtk2.0-dev (>= 
2.4.13), libjack-dev ,  libsamplerate0-dev (>= 0.1.1), libxml2-dev (>= 2.6.11), 
libsndfile1-dev (>= 1.0.10),  libasound2-dev (>= 1.0.8)
+Build-Depends: debhelper (>= 4.0.0), libphat0-dev (>= 0.2.3), libgtk2.0-dev 
(>= 2.4.13), libjack-dev ,  libsamplerate0-dev (>= 0.1.1), libxml2-dev (>= 
2.6.11), libsndfile1-dev (>= 1.0.10),  libasound2-dev (>= 1.0.8)
 Standards-Version: 3.6.1
 
 Package: specimen
diff -urN ../tmp-orig/specimen-0.4.5/src/beef.c ./src/beef.c
--- ../tmp-orig/specimen-0.4.5/src/beef.c   2004-10-03 06:56:34.0 
+0200
+++ ./src/beef.c2005-02-09 08:45:22.321802453 +0100
@@ -36,7 +36,7 @@
 debug ("Writing current bank to file %s\n", name);
 
 /* create the guts of the doc */
-doc = xmlNewDoc ("1.0");
+doc = xmlNewDoc ((unsigned char*)"1.0");
 rootnode = xmlNewDocNode (doc, NULL, (const xmlChar *) "beef", NULL);
 xmlDocSetRootElement (doc, rootnode);
 

---
Received: (at 294328-close) by bugs.debian.org; 11 Feb 2005 15:53:08 +
>From [EMAIL PROTECTED] Fri Feb 11 07:53:07 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)

Bug#293207: bogofilter: last two versions caused db errors

2005-02-11 Thread Micah Anderson
On Fri, 11 Feb 2005, Justin Pryzby wrote:

> On Thu, Feb 10, 2005 at 11:55:49PM -0600, Micah Anderson wrote:

> > I am now going to try the same suite of tests with version 0.93.3 and
> > then attempt to upgrade to 0.93.5-1 as this is where Karl seemed to
> > have a problem, moving from 0.93.3 to 0.93.5. I need to somehow track
> > down an older version of the .deb.
> Well, normally there is
> http://www.backports.org/debian/dists/woody/bogofilter/binary-i386/
> but, it doesn't have any other versions.
> 
> I also tried Google:
> http://www.google.com/search?hl=en&lr=&q=inurl%3Abogofilter_0.93.3&btnG=Search
> but without success.
> 
I found snapshot.debian.org which has old versions of packages and the
tests are on their way.

micah





-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294755: FTBFS in experimental

2005-02-11 Thread Andreas Barth
Package: snort
Version: 2.3.0-1
Severity: serious
Tags: experimental

Hi,
please see http://experimental.ftbfs.de/build.php?arch=&pkg=snort
for the full build log

Cheers,
Andi

Automatic build of snort_2.3.0-1 on zx6000 by sbuild/ia64 1.170.5
Build started at 20050211-0712
**
[...]
Checking correctness of source dependencies...
Toolchain package versions: libc6.1-dev_2.3.2.ds1-20 
linux-kernel-headers_2.5.999-test7-bk-17 gcc-3.3_1:3.3.5-8 g++-3.3_1:3.3.5-6 
binutils_2.15-5 libstdc++5_1:3.3.5-6 libstdc++5-3.3-dev_1:3.3.5-6
--
[...]
cp -a doc/snort_schema_v106.pdf debian/snort-doc/usr/share/doc/snort-doc
cp -a doc/snort_manual.pdf debian/snort-doc/usr/share/doc/snort-doc
cp: cannot stat `doc/snort_manual.pdf': No such file or directory
dh_installdocs: command returned error code 256
make: *** [binary-arch] Error 1
**
Build finished at 20050211-0719
FAILED [dpkg-buildpackage died]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294607: which version? (was: Re: Bug#294607)

2005-02-11 Thread Alessandro Speranza
On Thu, 10 Feb 2005, Frank Lichtenheld wrote:
Hi. After I upgraded to wvdial 1.54 I get "Cannot set information for serial 
port"
when I connect via gprs on my usb Motorola phone. No problem if I
downgrade to wvdial 1.53 from stable distribution
This bug should be fixed with libwvstreams version 4.0.1-1.3
Hi.
Thanks for the reply. I saw the bug report on libwvstreams, and I saw they 
suggest installing a patch, but I guess then one should recompile the 
library from source. Where do you find libwvstreams4.0-extras verstion 
4.0.1-1.3 anyway?
Cheers
	Alessandro

--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Bug#290811: marked as done (Upgrading to 2.4.1-1 version causes meld to crash.)

2005-02-11 Thread Debian Bug Tracking System
Your message dated Fri, 11 Feb 2005 08:47:14 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#290811: fixed in libglade2 1:2.4.2-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 16 Jan 2005 21:47:19 +
>From [EMAIL PROTECTED] Sun Jan 16 13:47:19 2005
Return-path: <[EMAIL PROTECTED]>
Received: from boefje.phys.uu.nl [131.211.32.64] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CqIEw-0005FE-00; Sun, 16 Jan 2005 13:47:19 -0800
Received: from localhost (amavis.phys.uu.nl [131.211.32.145])
by boefje.phys.uu.nl (Postfix) with ESMTP id CB6267ED1;
Sun, 16 Jan 2005 22:47:17 +0100 (CET)
Received: from boefje.phys.uu.nl ([131.211.32.64])
 by localhost (mail.phys.uu.nl [131.211.32.145]) (amavisd-new, port 10024)
 with ESMTP id 18056-09; Sun, 16 Jan 2005 22:47:14 +0100 (CET)
Received: from matilda.phys.uu.nl (matilda.phys.uu.nl [131.211.36.104])
by boefje.phys.uu.nl (Postfix) with ESMTP id 1C0F17ECC;
Sun, 16 Jan 2005 22:47:14 +0100 (CET)
Received: from bas by matilda.phys.uu.nl with local (Exim 4.34)
id 1CqIEj-Rn-TJ; Sun, 16 Jan 2005 22:47:05 +0100
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Bas Zoetekouw <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: meld crashes on start
X-Mailer: reportbug 3.5
Date: Sun, 16 Jan 2005 22:47:05 +0100
Message-Id: <[EMAIL PROTECTED]>
X-Virus-Scanned: amavisd-new at phys.uu.nl
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: meld
Version: 0.9.4.1-1
Severity: grave

Since a while back, meld simply stopped working:

[EMAIL PROTECTED]/scratch/kevin> meld test/mn_fit_v5_03 mn-fit-5.03  
/usr/lib/meld/gnomeglade.py:145: GtkWarning: Unable to locate theme engine in 
module_path: "raleigh",
  image = gtk.Image()
/usr/lib/meld/gnomeglade.py:46: GtkWarning: file gtklabel.c: line 2792 
(gtk_label_set_use_underline): assertion `GTK_IS_LABEL (label)' failed
  self.xml = gtk.glade.XML(file, root, gettext.textdomain() )
/usr/lib/meld/gnomeglade.py:46: GtkWarning: gtkwidget.c:3076: widget 
`GtkToolButton' has no activatable signal "clicked" without arguments
  self.xml = gtk.glade.XML(file, root, gettext.textdomain() )

(meld:1619): GLib-GObject-WARNING **: gsignal.c:1657: signal `pressed' is 
invalid for instance `0x8393338'
/usr/lib/meld/dirdiff.py:278: DeprecationWarning: 
  _("Hide %s") % f.label, "", icon, self._update_name_filter, i )
/usr/lib/meld/dirdiff.py:278: GtkWarning: mixing deprecated and non-deprecated 
GtkToolbar API is not allowed
  _("Hide %s") % f.label, "", icon, self._update_name_filter, i )
Traceback (most recent call last):
  File "/usr/bin/meld", line 88, in ?
meldapp.main()
  File "/usr/lib/meld/meldapp.py", line 911, in main
app.append_diff(args)
  File "/usr/lib/meld/meldapp.py", line 798, in append_diff
self.append_dirdiff(paths)
  File "/usr/lib/meld/meldapp.py", line 770, in append_dirdiff
doc = dirdiff.DirDiff(self.prefs, len(dirs))
  File "/usr/lib/meld/dirdiff.py", line 242, in __init__
self.create_name_filters()
  File "/usr/lib/meld/dirdiff.py", line 279, in create_name_filters
toggle.set_active(f.active)
AttributeError: 'NoneType' object has no attribute 'set_active'


-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (990, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.9-ac6
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)

Versions of packages meld depends on:
ii  python2.3.4-5An interactive high-level object-o
ii  python-glade2 2.4.1-2GTK+ bindings: Glade support
ii  python-gnome2 2.6.1-1Python bindings for the GNOME desk
ii  python-gtk2   2.4.1-2Python bindings for the GTK+ widge

-- no debconf information

---
Received: (at 290811-close) by bugs.debian.org; 11 Feb 2005 13:53:42 +
>From [EMAIL PROTECTED] Fri Feb 11 05:53:42 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp 

Bug#293207: bogofilter: last two versions caused db errors

2005-02-11 Thread Justin Pryzby
On Thu, Feb 10, 2005 at 11:55:49PM -0600, Micah Anderson wrote:
> A report on my findings thus far:
> 
> I set up a pristine test environment to try and replicate the problem
> that Karl has been having. I have been able to setup a system running
> exim with the same configuration that Karl has, plugged into
> delivering mail through bogofilter, using the same bogofilter
> configuration as Karl. To setup the bogofilter databases, I fed
> approximately 2,000 ham messages and approximately 6,000 spam messages
> into bogofilter, creating database files in /etc/bogofilter with the
> same permissions as Exim. 
> 
> I then proceeded to send test mails. In the beginning bogofilter
> failed after about 20 messages due to database corruption. This was
> because the /etc/bogofilter directory was not set to have the correct
> ownership and permissions as was needed. After confirming with Karl
> how he had his setup, I changed it in the test scenario and restarted
> the tests. I ran tests that simulated mail delivery of approximately
> 1200 messages an hour (approximately 20/minute) for over 24 hours with
> no failures, I delivered approximately 35,000 messages with no
> problems at all.
> 
> This is with exim 4.34-10 and bogofilter 0.93.5-1. It certainly seems
> that with a fresh installation of these versions everything works as
> expected.
> 
> I am now going to try the same suite of tests with version 0.93.3 and
> then attempt to upgrade to 0.93.5-1 as this is where Karl seemed to
> have a problem, moving from 0.93.3 to 0.93.5. I need to somehow track
> down an older version of the .deb.
Well, normally there is
http://www.backports.org/debian/dists/woody/bogofilter/binary-i386/
but, it doesn't have any other versions.

I also tried Google:
http://www.google.com/search?hl=en&lr=&q=inurl%3Abogofilter_0.93.3&btnG=Search
but without success.

:-/

Justin

> On Thu, 10 Feb 2005, Clint Adams wrote:
> 
> > > >Can you provide the configuration you use with exim to plug bogofilter
> > > >in? I am particularly interested because version 4.34-10 of exim
> > > >depends on libdb3 and exim 4.44-2 depends on libdb4.2 so I am curious
> > > >to know if exim uses libdb to interface with bogofilter in any way.
> > > >
> > > >micah
> > > 
> > > I can use libdb - but I'm not using any db lists.
> > 
> > That's an interesting question; maybe you should try the exim in
> > project/experimental, which is linked against libdb4.2.
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 

-- 
Justin Pryzby
"Now seeking qualified employers"

References

[0] 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294751: FTBFS: cannot build powerpc 2.6 kernels, missing rule for conf.vars

2005-02-11 Thread Sven Luther
Package: kernel-package
Version: 8.120
Severity: serious
Justification: FTBFS


As said, i am not able to build the powerpc 2.6.10 kernel package with this,
while building it with my 8.119 + versioned script hack worked fine :

cd
/home/sven/debian/kernel/build/kernel-patch-powerpc-2.6.10-2.6.10/tmp/kernel-source-2.6.10;
APPEND_TO_VERSION='' make-kpkg configure
make[1]: Entering directory
`/home/sven/debian/kernel/build/kernel-patch-powerpc-2.6.10-2.6.10/tmp/kernel-source-2.6.10'
# work around idiocy in recent kernel versions
test ! -e scripts/package/builddeb || \
mv -f scripts/package/builddeb scripts/package/builddeb.dist
test ! -e scripts/package/Makefile || \
(mv -f scripts/package/Makefile scripts/package/Makefile.dist && \
   echo "# Dummy file " >  scripts/package/Makefile)
test ! -f stamp-debian && test ! -f debian/official && \
  rm -rf ./debian && mkdir ./debian
make[1]: [stamp-debian] Error 1 (ignored)
test ! -f stamp-debian && \
   ( test ! -f debian/official || test ! -f debian/control) && \
   sed -e 's/=V/2.6.10/g'-e 's/=D/2.6.10-2/g'   \
   -e 's/=A/powerpc/g'   -e 's/=SA//g' \
-e 's/=L/quik, /g' -e 's/=I/initrd-tools (>= 0.1.48), /g'\
-e 's/=CV/2.6/g' \
-e 's/=M/Unknown Kernel Package Maintainer
<[EMAIL PROTECTED]>/g'\
-e 's/=ST/kernel/g'  \
 /usr/share/kernel-package/Control> debian/control
make[1]: [stamp-debian] Error 1 (ignored)
test ! -f stamp-debian && test ! -f debian/official &&  \
   sed -e 's/=V/2.6.10/g' -e 's/=D/2.6.10-2/g'  \
-e 's/=A/powerpc/g' -e 's/=M/Unknown Kernel Package Maintainer
<[EMAIL PROTECTED]>/g' \
-e 's/=ST/kernel/g' \
/usr/share/kernel-package/changelog > debian/changelog
make[1]: [stamp-debian] Error 1 (ignored)
test ! -f debian/rules &&   \
   install -p -m 755 /usr/share/kernel-package/rules debian/rules
echo done >  stamp-debian
make[1]: *** No rule to make target `conf.vars', needed by `stamp-configure'.
Stop.
make[1]: Leaving directory
`/home/sven/debian/kernel/build/kernel-patch-powerpc-2.6.10-2.6.10/tmp/kernel-source-2.6.10'
make: *** [stamp-configure] Error 2

Hope you can find what is broken here :)

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: powerpc (ppc)
Kernel: Linux 2.6.8-powerpc
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages kernel-package depends on:
ii  dpkg 1.10.26 Package maintenance system for Deb
ii  dpkg-dev 1.10.26 Package building tools for Debian
ii  gcc [c-compiler] 4:3.3.5-1   The GNU C compiler
ii  gcc-2.95 [c-compiler]1:2.95.4-22 The GNU C compiler
ii  gcc-3.3 [c-compiler] 1:3.3.5-8   The GNU C compiler
ii  make 3.80-9  The GNU version of the "make" util
ii  perl 5.8.4-6 Larry Wall's Practical Extraction 

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#293932: [Python-Dev] license issues with profiler.py and md5.h/md5c.c

2005-02-11 Thread Jeremy Hylton
On Fri, 11 Feb 2005 12:55:02 +0100, Matthias Klose <[EMAIL PROTECTED]> wrote:
> > Currently md5c.c is included in the python sources. The libmd
> > implementation has a drop in replacement for md5c.c. The openssl
> > implementation is a complicated tangle of Makefile expanded template
> > code that would be harder to include in the Python sources.
> 
> I would prefer that one as a short term solution. Patch at #1118602.

Unfortunately a license that says it is in the public domain is
unacceptable (and should be for Debian, too).  That is to say, it's
not possible for someone to claim that something they produce is in
the public domain.  See http://www.linuxjournal.com/article/6225

Jeremy


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294488: Ubuntu patch

2005-02-11 Thread Martin Pitt
tag 294488 patch
thanks

Here is the patch used for the Ubuntu security update:

  http://patches.ubuntu.com/patches/awstats.more-CAN-2005-0016.diff

 awstats (6.2-1.1ubuntu1) hoary; urgency=low
 .
   * SECURITY UPDATE: fix more arbitrary command execution vulnerabilities
   * wwwroot/cgi-bin/awstats.pl: remove all non-path characters from the
 "config", "pluginmode", "loadplugin", and "noloadplugin" parameters (which
 are defined by the remote user) to prevent execution of arbitrary shell
 commands through shell metacharacters.
   * References:
 similar to CAN-2005-0116
 http://packetstormsecurity.nl/0501-exploits/AWStatsVulnAnalysis.pdf

Martin
-- 
Martin Pitt   http://www.piware.de
Ubuntu Developerhttp://www.ubuntulinux.org
Debian GNU/Linux Developer   http://www.debian.org


signature.asc
Description: Digital signature


Processed: Ubuntu patch

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tag 294488 patch
Bug#294488: awstats: Arbitrary command execution not completely fixed
Tags were: security
Tags added: patch

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Fixed in NMU of postgresql 7.2.1-2woody7

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tag 293125 + fixed
Bug#293125: postgresql: LOAD security issue
Tags were: woody security
Tags added: fixed

> quit
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#293932: [Python-Dev] license issues with profiler.py and md5.h/md5c.c

2005-02-11 Thread Matthias Klose
Donovan Baarda writes:
> On Tue, 2005-02-08 at 11:52 -0800, Gregory P. Smith wrote:
> > > The md5.h/md5c.c files allow "copy and use", but no modification of
> > > the files. There are some alternative implementations, i.e. in glibc,
> > > openssl, so a replacement should be sage. Any other requirements when
> > > considering a replacement?
> 
> One thing to consider is "degree of difficulty" :-)
> 
> > >   Matthias
> > 
> > I believe the "plan" for md5 and sha1 and such is to use the much
> > faster openssl versions "in the future" (based on a long thread
> > debating future interfaces to such things on python-dev last summer).
> > That'll sidestep any tedious license issue and give a better
> > implementation at the same time.  i don't believe anyone has taken the
> > time to make such a patch yet.
> 
> I wasn't around for that discussion. There are two viable replacements
> for the RSA implementation currently used; 
> 
> libmd 
> openssl .
> 
> The libmd implementation is by Colin Plumb and has the licence; "This
> code is in the public domain; do with it what you wish." The API is
> identical to the RSA implementation and BSD world's libmd and hence is a
> drop in replacement. This implementation is faster than the RSA
> implementation.
> 
[...]
> 
> Currently md5c.c is included in the python sources. The libmd
> implementation has a drop in replacement for md5c.c. The openssl
> implementation is a complicated tangle of Makefile expanded template
> code that would be harder to include in the Python sources.

I would prefer that one as a short term solution. Patch at #1118602.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294522: marked as done (linda: missing depends on new (and non-free) python-profile)

2005-02-11 Thread Debian Bug Tracking System
Your message dated Fri, 11 Feb 2005 06:47:40 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#294522: fixed in linda 0.3.9
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 10 Feb 2005 06:41:45 +
>From [EMAIL PROTECTED] Wed Feb 09 22:41:45 2005
Return-path: <[EMAIL PROTECTED]>
Received: from master.debian.org [146.82.138.7] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1Cz81J-00041a-00; Wed, 09 Feb 2005 22:41:45 -0800
Received: from rcm-200-220-132-60.nipnet.net.br (khazad-dum.debian.net) 
[200.220.132.60] 
by master.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1Cz81I-0003S2-00; Thu, 10 Feb 2005 00:41:45 -0600
Received: from localhost (localhost [127.0.0.1])
by localhost.khazad-dum.debian.net (Postfix) with ESMTP id 7FA47201484;
Thu, 10 Feb 2005 04:41:39 -0200 (BRST)
Received: from khazad-dum.debian.net ([127.0.0.1])
by localhost (khazad-dum [127.0.0.1]) (amavisd-new, port 10024)
with LMTP id 01344-01-2; Thu, 10 Feb 2005 04:41:37 -0200 (BRST)
Received: by khazad-dum.debian.net (Postfix, from userid 1000)
id EB2F22014DA; Thu, 10 Feb 2005 04:41:37 -0200 (BRST)
Date: Thu, 10 Feb 2005 04:41:37 -0200
From: Henrique de Moraes Holschuh <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: linda: missing depends on new (and non-free) python-profile
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-Reportbug-Version: 3.7.1
X-Debbugs-Cc: [EMAIL PROTECTED]
X-GPG-Fingerprint: 1024D/1CDB0FE3 5422 5C61 F6B7 06FB 7E04  3738 EE25 DE3F 1CDB 
0FE3
User-Agent: Mutt/1.5.6+20040907i
X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at khazad-dum.debian.net
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: linda
Version: 0.3.8
Severity: grave
Tags: sid
Justification: renders package unusable

The python packages moved the profile module (due to non-freeness) to
non-free.  This breaks linda, since it does not depend on the new non-free
packages (and linda will have to move to contrib, unless it drops whatever
need it has for the profile module).

Currently, linda won't run, thus the severity.

Original "remove profile module" bug CC'd in quiet mode.

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (990, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.10-debian5+libata9dev1+bluesmoke
Locale: LANG=pt_BR.ISO-8859-1, LC_CTYPE=pt_BR.ISO-8859-1 (charmap=ISO-8859-1)

Versions of packages linda depends on:
ii  binutils  2.15-5 The GNU assembler, linker and bina
ii  dash  0.5.2-1The Debian Almquist Shell
ii  file  4.12-1 Determines file type using "magic"
ii  man-db2.4.2-21   The on-line manual pager
ii  python2.3.4-6An interactive high-level object-o

-- no debconf information

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh

---
Received: (at 294522-close) by bugs.debian.org; 11 Feb 2005 11:53:56 +
>From [EMAIL PROTECTED] Fri Feb 11 03:53:56 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CzZMy-0002oc-00; Fri, 11 Feb 2005 03:53:56 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1CzZGu-0001Fq-00; Fri, 11 Feb 2005 06:47:40 -0500
From: Steve Kowalik <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#294522: fixed in linda 0.3.9
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Fri, 11 Feb 2005 06:47:40 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
   

Bug#294725: Acknowledgement (k3b hangs then crashes on startup)

2005-02-11 Thread Helen Faulkner
severity 294725 normal
retitle 294725 k3b crashes on startup unless started by root
thanks mate :)
Hi,
I have just realised that whatever k3b is doing when it crashes on 
startup, it doesn't do that when I run it as root.  So that's not as 
bad, though clearly it isn't ideal either.

Sorry for the hassle of having a mistitled bug with the wrong severity 
submitted at you.

Thanks again,
Helen
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Processed: Re: Bug#294725: Acknowledgement (k3b hangs then crashes on startup)

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 294725 normal
Bug#294725: k3b hangs then crashes on startup
Severity set to `normal'.

> retitle 294725 k3b crashes on startup unless started by root
Bug#294725: k3b hangs then crashes on startup
Changed Bug title.

> thanks mate :)
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294725: k3b hangs then crashes on startup

2005-02-11 Thread Helen Faulkner
Package: k3b
Version: 0.11.19-1
Severity: grave
Hello,
This might be related to Bug#292892, since the symptoms are similar, in
which case it is presumably not actually a k3b bug.  But it's not 
exactly the same so I figured I'd better report it here. I'm not sure 
whether this one should be "grave" or "important", but it certainly 
renders k3b entirely unusable to me, so I'm going for grave for now. 
Sorry if I have gotten this wrong.

When I start k3b, I get the splash-screen, and it gets to "Reading Local
Song database".  At this point it hangs, for several minutes, using most
of my processor time.  Then it crashes.
Running k3b from the terminal produces the following output:
 helen:~> k3b
 k3b: ERROR: (K3bCdDevice) Unable to do inquiry.
 KCrash: Application 'k3b' crashing...
 zsh: alarm  k3b
That's all.
Please let me know if I can provide any more information about this
problem.
Thanks,
Helen.
-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-2-686
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
Versions of packages k3b depends on:
ii  cdparanoia   3a9.8-11An audio extraction tool 
for sampl
ii  cdrecord 4:2.01+01a01-2  command line CD writing tool
ii  k3blibs  0.11.19-1   The KDE cd burning 
application lib
ii  kcontrol 4:3.3.2-1   KDE Control Center
ii  kdebase-bin  4:3.3.2-1   KDE Base (binaries)
ii  kdelibs-data 4:3.3.2-1   KDE core shared data
ii  kdelibs4 4:3.3.2-1   KDE core libraries
ii  libart-2.0-2 2.3.17-1Library of functions for 2D 
graphi
ii  libarts1 1.3.2-2 aRts Sound system
ii  libasound2   1.0.8-1 ALSA library
ii  libaudio21.7-2   The Network Audio System 
(NAS). (s
ii  libaudiofile00.2.6-5 Open-source version of 
SGI's audio
ii  libc62.3.2.ds1-20GNU C Library: Shared 
libraries an
ii  libesd0  0.2.35-2Enlightened Sound Daemon - 
Shared
ii  libfam0c102  2.7.0-6 client library to control 
the FAM
ii  libfontconfig1   2.2.3-4 generic font configuration 
library
ii  libfreetype6 2.1.7-2.3   FreeType 2 font engine, 
shared lib
ii  libgcc1  1:3.4.3-9   GCC support library
ii  libglib2.0-0 2.6.2-1 The GLib library of C routines
ii  libice6  4.3.0.dfsg.1-10 Inter-Client Exchange library
ii  libidn11 0.5.2-3 GNU libidn library, 
implementation
ii  libjack0.80.0-0  0.99.0-4JACK Audio Connection Kit 
(librari
ii  libmad0  0.15.1b-1   MPEG audio decoder library
ii  libogg0  1.1.0-1 Ogg Bitstream Library
ii  libpng12-0   1.2.8rel-1  PNG library - runtime
ii  libqt3c102-mt3:3.3.3-8   Qt GUI Library (Threaded 
runtime v
ii  libsm6   4.3.0.dfsg.1-10 X Window System Session 
Management
ii  libstdc++5   1:3.3.5-8   The GNU Standard C++ Library v3
ii  libvorbis0a  1.0.1-1 The Vorbis General Audio 
Compressi
ii  libvorbisenc21.0.1-1 The Vorbis General Audio 
Compressi
ii  libvorbisfile3   1.0.1-1 The Vorbis General Audio 
Compressi
ii  libx11-6 4.3.0.dfsg.1-10 X Window System protocol 
client li
ii  libxcursor1  1.1.3-1 X cursor management library
ii  libxext6 4.3.0.dfsg.1-10 X Window System 
miscellaneous exte
ii  libxft2  2.1.2-6 FreeType-based font drawing 
librar
ii  libxrandr2   4.3.0.dfsg.1-10 X Window System Resize, 
Rotate and
ii  libxrender1  0.8.3-7 X Rendering Extension 
client libra
ii  libxt6   4.3.0.dfsg.1-10 X Toolkit Intrinsics
ii  mkisofs  4:2.01+01a01-2  Creates ISO-9660 CD-ROM 
filesystem
ii  xlibs4.3.0.dfsg.1-10 X Keyboard Extension (XKB) 
configu
ii  zlib1g   1:1.2.2-4   compression library - runtime

-- no debconf information
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Processed: still present in sarge

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> reopen 289623
Bug#289623: openoffice.org-thesaurus-it: should depend on openoffice.org
Bug reopened, originator not changed.

> tags 289623 -sid
Bug#289623: openoffice.org-thesaurus-it: should depend on openoffice.org
Tags were: patch sarge sid
Tags removed: sid

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: still present in sarge

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> reopen 287788
Bug#287788: gtkboard: doc-base file is invalid
Bug reopened, originator not changed.

> tags 287788 -sid
Bug#287788: gtkboard: doc-base file is invalid
Tags were: patch sid
Tags removed: sid

> tags 287788 +sarge
Bug#287788: gtkboard: doc-base file is invalid
Tags were: patch
Tags added: sarge

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294720: lirc-modules-source: module fails to load (unknown symbols)

2005-02-11 Thread Julien Langer
Package: lirc-modules-source
Version: 0.7.1pre1-2
Severity: grave
Justification: renders package unusable

I applied the patch from #294689 to build the module for kernel 2.6
However the built module can't be loaded:
root[/usr/src]# modprobe lirc_serial 
FATAL: Error inserting lirc_serial (/lib/modules/2.6.10/misc/lirc_serial.ko): 
Unknown symbol in module, or unknown parameter (see dmesg)

dmesg says:
lirc_serial: Unknown symbol lirc_unregister_plugin
lirc_serial: Unknown symbol lirc_register_plugin
lirc_serial: Unknown symbol lirc_unregister_plugin
lirc_serial: Unknown symbol lirc_register_plugin
lirc_serial: Unknown symbol lirc_unregister_plugin
lirc_serial: Unknown symbol lirc_register_plugin
lirc_serial: Unknown symbol lirc_unregister_plugin
lirc_serial: Unknown symbol lirc_register_plugin


-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable'), (101, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.10
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages lirc-modules-source depends on:
ii  debconf [debconf-2.0] 1.4.45 Debian configuration management sy
ii  debhelper 4.2.30 helper programs for debian/rules
ii  debianutils   2.11.2 Miscellaneous utilities specific t

-- debconf information:
* lirc-modules-source/use_lirc_hints: true
  lirc-modules-source/parallel_irq: 7
* lirc-modules-source/do-build: false
  lirc-modules-source/parallel_timer: 65536
* lirc-modules-source/serial_transmitter: false
  lirc-modules-source/not_needed:
* lirc-modules-source/serial_port: 0x3f8
* lirc-modules-source/drivers: serial
* lirc-modules-source/serial_irq: 4
* lirc-modules-source/serial_type: Other
* lirc-modules-source/kernel-source: /usr/src/linux/
  lirc-modules-source/sir_port: 0x2f8
  lirc-modules-source/parallel_port: 0x378
* lirc-modules-source/what_next:
  lirc-modules-source/sir_type: Other
* lirc-modules-source/serial_softcarrier: true
* lirc-modules-source/kernel-source-not-found:
  lirc-modules-source/sir_irq: 3


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#292478: oops on boot with usb cdburner attached

2005-02-11 Thread Uwe Dippel
I *guess* I'm sitting on the same problem, though here the report would 
read slightly differently:

Had this since I added 2.6.8-1 to 2.6.7: 2.6.8 starts and kind-of freezes
after some lines of kernel-error-messages; after mounting the harddisk.
Didn't bother, hoping that it would go away with the next version. But on
2.6.8-2 the same thing happens. 2.6.7 boots fine, though.
It boots, does a lot of things then writes some error messages. No,
/var/log/kern is and remains empty whenever I (fail to) boot to 2.6.8. 
So here is
what happens:
...
[] kernel-Thread_helper+0x5/0x18
Code: 89 01 89 48 04 b8 00 01 10 00 c7 43 04 00 02 20 00 8d 9a 8c
<6>note: kblockd/0[42] exited with preempt_count 1
Yenta:

[then it continues for a few lines until:]
...
ieee1394: Host added:ID:Bus [0-00:1023] GUID [434fc0003ab22838]
From then onwards, nothing. It still echoes Enter; but nothing more
happens. Ctrl-Alt-Del doesn't work, Ctrl-C, Ctrl-D don't do anything
either.
Then I found this bug (292478). And checked. If I unplug the usb burner, 
it does boot; so I guess it is the same bug. But here, 2.6.7 boots great 
with burner (and burns great). Only with 2.6.8 the trouble crept in.
I'm sitting on a DELL Latitude D400, and here I attach the whole dmesg. 
Of cause, I boot without usb-burner; and attach the device later, so 
that you know its details (scroll down):


Linux version 2.6.8-2-686 ([EMAIL PROTECTED]) (gcc version 
3.3.5 (Debian 1:3.3.5-6)) #1 Mon Jan 24 03:58:38 EST 2005
BIOS-provided physical RAM map:
BIOS-e820:  - 0009f000 (usable)
BIOS-e820: 0009f000 - 000a (reserved)
BIOS-e820: 0010 - 0feaa000 (usable)
BIOS-e820: 0feaa000 - 1000 (reserved)
BIOS-e820: fec1 - fec2 (reserved)
BIOS-e820: feda - fee0 (reserved)
BIOS-e820: ffb0 - 0001 (reserved)
0MB HIGHMEM available.
254MB LOWMEM available.
On node 0 totalpages: 65194
 DMA zone: 4096 pages, LIFO batch:1
 Normal zone: 61098 pages, LIFO batch:14
 HighMem zone: 0 pages, LIFO batch:1
DMI 2.3 present.
Dell Latitude with broken BIOS detected. Refusing to enable the local APIC.
ACPI: RSDP (v000 DELL  ) @ 0x000fdf00
ACPI: RSDT (v001 DELLCPi R   0x27d30a0f ASL  0x0061) @ 0x0fef
ACPI: FADT (v001 DELLCPi R   0x27d30a0f ASL  0x0061) @ 0x0fef0400
ACPI: ASF! (v016 DELLCPi R   0x27d30a0f ASL  0x0061) @ 0x0fef0800
ACPI: DSDT (v001 INT430 SYSFexxx 0x1001 MSFT 0x010e) @ 0x
ACPI: PM-Timer IO Port: 0x808
Built 1 zonelists
Kernel command line: root=/dev/hda7 ro
Initializing CPU#0
PID hash table entries: 1024 (order 10: 8192 bytes)
Detected 1399.107 MHz processor.
Using pmtmr for high-res timesource
Console: colour VGA+ 80x25
Dentry cache hash table entries: 32768 (order: 5, 131072 bytes)
Inode-cache hash table entries: 16384 (order: 4, 65536 bytes)
Memory: 250468k/260776k available (1550k kernel code, 9596k reserved, 
688k data, 148k init, 0k highmem)
Checking if this processor honours the WP bit even in supervisor mode... Ok.
Calibrating delay loop... 2777.08 BogoMIPS
Security Scaffold v1.0.0 initialized
Mount-cache hash table entries: 512 (order: 0, 4096 bytes)
CPU: After generic identify, caps: a7e9f9bf   
CPU: After vendor identify, caps:  a7e9f9bf   
CPU: L1 I cache: 32K, L1 D cache: 32K
CPU: L2 cache: 1024K
CPU: After all inits, caps:a7e9f9bf   0040
Intel machine check architecture supported.
Intel machine check reporting enabled on CPU#0.
CPU: Intel(R) Pentium(R) M processor 1400MHz stepping 05
Enabling fast FPU save and restore... done.
Enabling unmasked SIMD FPU exception support... done.
Checking 'hlt' instruction... OK.
checking if image is initramfs...it isn't (ungzip failed); looks like an 
initrd
Freeing initrd memory: 4704k freed
NET: Registered protocol family 16
PCI: PCI BIOS revision 2.10 entry at 0xfc97e, last bus=1
PCI: Using configuration type 1
mtrr: v2.0 (20020519)
ACPI: Subsystem revision 20040326
ACPI: IRQ9 SCI: Edge set to Level Trigger.
ACPI: Interpreter enabled
ACPI: Using PIC for interrupt routing
ACPI: PCI Root Bridge [PCI0] (00:00)
PCI: Probing PCI hardware (bus 00)
PCI: Ignoring BAR0-3 of IDE controller :00:1f.1
PCI: Transparent bridge - :00:1e.0
ACPI: PCI Interrupt Routing Table [\_SB_.PCI0._PRT]
ACPI: PCI Interrupt Link [LNKA] (IRQs 9 10 *11)
ACPI: PCI Interrupt Link [LNKB] (IRQs 5 7) *11
ACPI: PCI Interrupt Link [LNKC] (IRQs 9 10 *11)
ACPI: PCI Interrupt Link [LNKD] (IRQs 5 7 9 10 *11)
ACPI: PCI Interrupt Link [LNKE] (IRQs 3 4 5 6 7 9 10 11 12 14 15) *0, 
disabled.
ACPI: PCI Interrupt Link [LNKH] (IRQs 3 4 5 6 7 9 10 *11 12 14 15)
ACPI: PCI Interrupt Routing Table [\_SB_.PCI0.PCIE._PRT]
Linux Plug and Play Support v0.97 (c) Adam Belay
PnPBIOS: Scanning system for PnP BIOS support...
PnPBIOS: Found PnP BIOS installation structure at 0xc00fe2d0

Bug#294719: wdm: can't fulfill the build dependencies in sarge

2005-02-11 Thread Adrian Bunk
Package: wdm
Version: 1.27-2.1
Severity: serious
Tags: sarge


The build dependency on libproplist0-dev can't be fulfilled in sarge.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: still present in sarge

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> reopen 276467
Bug#276467: stars: requires packages/data outside of main
Bug reopened, originator not changed.

> tags 276467 +sarge
Bug#276467: stars: requires packages/data outside of main
There were no tags set.
Tags added: sarge

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294717: gpsbabel doesn't build on most architectures

2005-02-11 Thread Adrian Bunk
Package: gpsbabel
Version: 1.2.4-1
Severity: serious


According to buildd.debian.org, there are different errors during
"make check" on several architectures.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: still present in sarge

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> reopen 289310
Bug#289310: galeon-common: Remove complains about missing 
/etc/gconf/gconf.xml.defaults/apps/galeon
Bug#290951: galeon: Dpkg error while upgrading Galeon
Bug reopened, originator not changed.

> tags 289310 +sarge
Bug#289310: galeon-common: Remove complains about missing 
/etc/gconf/gconf.xml.defaults/apps/galeon
There were no tags set.
Bug#290951: galeon: Dpkg error while upgrading Galeon
Tags added: sarge

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: your mail

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 294628 grave
Bug#294628: openoffice.org: impress crashes when trying to modify style of a 
text box
Severity set to `grave'.

> merge 294628 289715
Bug#289715: openoffice.org-bin: Impress single Word color modification is 
broken again
Bug#294628: openoffice.org: impress crashes when trying to modify style of a 
text box
Bug#284096: openoffice.org: writer crash in 'modify style' when selecting 
another tab
Merged 284096 289715 294628.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294172: marked as done (strace - builds no s390 binary)

2005-02-11 Thread Debian Bug Tracking System
Your message dated Fri, 11 Feb 2005 10:04:24 +
with message-id <[EMAIL PROTECTED]>
and subject line strace - builds no s390 binary
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 8 Feb 2005 10:01:26 +
>From [EMAIL PROTECTED] Tue Feb 08 02:01:25 2005
Return-path: <[EMAIL PROTECTED]>
Received: from wavehammer.waldi.eu.org [82.139.196.55] (postfix)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CySBR-0001MF-00; Tue, 08 Feb 2005 02:01:25 -0800
Received: by wavehammer.waldi.eu.org (Postfix, from userid 1000)
id C5EA43C01F; Tue,  8 Feb 2005 11:01:23 +0100 (CET)
Date: Tue, 8 Feb 2005 11:01:23 +0100
From: Bastian Blank <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: strace - builds no s390 binary
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="LQksG6bCIzRHxTLp"
Content-Disposition: inline
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 


--LQksG6bCIzRHxTLp
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: strace
Version: 4.5.5-1
Severity: grave
Tags: sarge

The source wants to build a s390x binary but no s390 binary.

Bastian

--=20
Time is fluid ... like a river with currents, eddies, backwash.
-- Spock, "The City on the Edge of Forever", stardate 3134.0

--LQksG6bCIzRHxTLp
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.0 (GNU/Linux)

iEYEARECAAYFAkIIjfMACgkQnw66O/MvCNHuyQCgjq9KfGsWKaG/DWKTuqPofEx7
1koAoIufQuwtPQwBdIm3PRAcI84GwGx8
=Kmua
-END PGP SIGNATURE-

--LQksG6bCIzRHxTLp--

---
Received: (at 294172-done) by bugs.debian.org; 11 Feb 2005 10:04:41 +
>From [EMAIL PROTECTED] Fri Feb 11 02:04:39 2005
Return-path: <[EMAIL PROTECTED]>
Received: from chiark.greenend.org.uk [193.201.200.170] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CzXf5-00064u-00; Fri, 11 Feb 2005 02:04:31 -0800
Received: from [192.168.124.112] (helo=riva.lab.dotat.at)
by chiark.greenend.org.uk (Debian Exim 3.35 #1) with esmtp
(return-path [EMAIL PROTECTED])
id 1CzXez-0005AZ-00
for [EMAIL PROTECTED]; Fri, 11 Feb 2005 10:04:25 +
Received: from cjwatson by riva.lab.dotat.at with local (Exim 3.35 #1 (Debian))
for [EMAIL PROTECTED]
id 1CzXey-00056R-00; Fri, 11 Feb 2005 10:04:24 +
Date: Fri, 11 Feb 2005 10:04:24 +
From: Colin Watson <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Re: strace - builds no s390 binary
Message-ID: <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[EMAIL PROTECTED]>
User-Agent: Mutt/1.3.28i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no 
version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

On Tue, Feb 08, 2005 at 11:01:23AM +0100, Bastian Blank wrote:
> Package: strace
> Version: 4.5.5-1
> Severity: grave
> Tags: sarge
> 
> The source wants to build a s390x binary but no s390 binary.

I've pushed 4.5.8-1.2 into sarge, which I believe fixes this bug.

Cheers,

-- 
Colin Watson   [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294431: Standard network configurations

2005-02-11 Thread Thomas Hood
Please note that the standard way of setting up a Debian system that
lacks a permanent network card is:

$ cat /etc/hostname
foo
$ hostname
foo
$ cat /etc/hosts
127.0.0.1 localhost.localdomain localhost foo
...
$ hostname -f
localhost.localdomain

The setup that I recommend, and which I plan to promote as the future
standard, for machines without permanent network cards is:
$ cat /etc/hostname
foo
$ hostname
foo
$ cat /etc/hosts
127.0.0.1 localhost.localdomain localhost
127.0.1.1 foo
...
$ hostname -f
foo

If the machine has a permanent network card with a permanent IP address
(i.e., not assigned by DHCP) but no permanent domain name then the
standard configuration is:

$ cat /etc/hostname
foo
$ hostname
foo
$ cat /etc/hosts
127.0.0.1 localhost.localdomain localhost
202.13.55.88 foo
...
$ hostname -f
foo

If the machine has a permanent network card with a permanent IP address
and a permanent domain name then the standard configuration is:

$ cat /etc/hostname
foo
$ hostname
foo
$ cat /etc/hosts
127.0.0.1 localhost.localdomain localhost
202.13.55.88 foo.foodomain foo
...
$ hostname -f
foo.foodomain


On installation, squid should be able to handle all these standard
configurations without failing in order to be considered fit for
release.
-- 
Thomas Hood <[EMAIL PROTECTED]>



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: severity non-RC

2005-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 294628 important
Bug#294628: openoffice.org: impress crashes when trying to modify style of a 
text box
Severity set to `important'.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#290474: are you sure swap can be labeled?

2005-02-11 Thread Vassilii Khachaturov
> You could use something like
>
> LABEL=root /  ext2defaults0   1
> LABEL=swap none   swapsw  0   0
> LABEL=home /home  ext2defaults0   1
>
> in your /etc/fstab, instead of /dev/hda1 or /dev/sda1.

Is your fstab example a real life one, or fictional? in the 1st case,
how did you manage to have the swap labeled??

I don't know how can one label a swap partition, if at all.
mkswap/swapon/swapoff don't seem to be providing such an option.
I know I can remove the swap partition and create another
one with one big file on it to hold the swap, but I suspect from the
architectural reasons this will be worse than using a dedicated partition.

I have suffered my share of problems with trying to keep
2.4 and 2.6 going together smoothly on the same machine
(see http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286515 )
and came up with nothing better than going single and
moving the appropriate fstab (sda flavoured for 2.6 and hda for 2.4)
in place. BTW, I have never figured how to force the cdrw
not to work in the ide-scsi emulation mode in 2.6; even with the
ide-cd driver preloaded by /etc/modules and an option

 options ide-scsi ignore=hdd

added to the modules.conf (via update-modutils), the scsi
emulation still grabs hdd (somehow pulled in by the sata_sil?)

Regards,
vassilii


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#294688: marked as done (CAN-2005-0299: Directory traversal in GForge)

2005-02-11 Thread Debian Bug Tracking System
Your message dated Fri, 11 Feb 2005 08:43:08 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Bug#294688: CAN-2005-0299: Directory traversal in GForge
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 11 Feb 2005 05:17:22 +
>From [EMAIL PROTECTED] Thu Feb 10 21:17:22 2005
Return-path: <[EMAIL PROTECTED]>
Received: from luonnotar.infodrom.org [195.124.48.78] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CzTBC-xE-00; Thu, 10 Feb 2005 21:17:22 -0800
Received: by luonnotar.infodrom.org (Postfix, from userid 10)
id 8B3F7366B74; Fri, 11 Feb 2005 06:17:25 +0100 (CET)
Received: at Infodrom Oldenburg (/\##/\ Smail-3.2.0.102 1998-Aug-2 #2)
from infodrom.org by finlandia.Infodrom.North.DE
via smail from stdin
id <[EMAIL PROTECTED]>
for [EMAIL PROTECTED]; Fri, 11 Feb 2005 06:15:18 +0100 (CET) 
Date: Fri, 11 Feb 2005 06:15:17 +0100
From: Martin Schulze <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: CAN-2005-0299: Directory traversal in GForge
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
X-Debbugs-Cc: [EMAIL PROTECTED]
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: gforge
Version: 3.1-26
Severity: grave
Tags: security sarge sid patch

The sid/sarge version seems to be vulnerable to this.  Please correct it.
The correction should be in the GForge CVS, otherwise sanitising the dir
should be easy (i.e. recursively strip "../").

Candidate: CAN-2005-0299
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0299

Reference: BUGTRAQ:20050120 STG Security Advisory: [SSA-20050120-24] GForge 3.x 
directory
Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=110627132209963&w=2
Reference: BID:12318
Reference: URL:http://www.securityfocus.com/bid/12318
Reference: XF:gforge-dir-dirname-directory-traversal(18988)
Reference: URL:http://xforce.iss.net/xforce/xfdb/18988

Directory traversal vulnerability in GForge 3.3 and earlier allows
remote attackers to read arbitrary files via a .. (dot dot) in the (1)
dir parameter to controller.php or (2) dir_name parameter to
controlleroo.php.

Regards,

Joey

-- 
The good thing about standards is that there are so many to choose from.
-- Andrew S. Tanenbaum

Please always Cc to me when replying to me on the lists.

---
Received: (at 294688-done) by bugs.debian.org; 11 Feb 2005 07:47:28 +
>From [EMAIL PROTECTED] Thu Feb 10 23:47:28 2005
Return-path: <[EMAIL PROTECTED]>
Received: from luonnotar.infodrom.org [195.124.48.78] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CzVWR-0003XN-00; Thu, 10 Feb 2005 23:47:28 -0800
Received: by luonnotar.infodrom.org (Postfix, from userid 10)
id BF51C366B74; Fri, 11 Feb 2005 08:47:31 +0100 (CET)
Received: at Infodrom Oldenburg (/\##/\ Smail-3.2.0.102 1998-Aug-2 #2)
from infodrom.org by finlandia.Infodrom.North.DE
via smail from stdin
id <[EMAIL PROTECTED]>
for [EMAIL PROTECTED]; Fri, 11 Feb 2005 08:43:08 +0100 (CET) 
Date: Fri, 11 Feb 2005 08:43:08 +0100
From: Martin Schulze <[EMAIL PROTECTED]>
To: Julien Cristau <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED]
Subject: Re: Bug#294688: CAN-2005-0299: Directory traversal in GForge
Message-ID: <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
In-Reply-To: <[EMAIL PROTECTED]>
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Julien Cristau wrote:
> On 11/02/2005-06:32, Martin Schulze wrote:
> 
> > Package: gforge
> > Version: 3.1-26
> > Severity: grave
> > Tags: security sarge sid patch
> > 
> > The sid/sarge version seems to be vulnerable to this.  Please correct it.
> > The correction sh