Processed: ... and in etch :-)

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tag 318061 + etch
Bug#318061: mozilla-firefox: version 1.0.5 fixes several security bugs
Tags were: sarge security
Tags added: etch

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#316590: woody backport now available for all cacti security issues

2005-07-19 Thread Martin Schulze
Sean Finney wrote:
 hi,
 
 On Mon, Jul 18, 2005 at 07:21:29PM +0200, Martin Schulze wrote:
   i'll try and set some time aside tonight or tomorrow to test, but
   it looks good from an initial glance.
  
  Any outcome?  In other words, any reason not to issue the advisory
  and update now?
 
 i haven't had a chance to look at it yet, i've been busy packing up
 my personal life into boxes the past few days.  i'm flying out to
 california today, and will have ample airport/airplane time with my
 laptop, so i should have something for you in the next 24 hours.  i'll
 not only verify the patch works, but also see if there are any other
 variables that we missed which need to be dug up for sanity checking.  

Ok, I'll wait.

Regards,

Joey

-- 
Whenever you meet yourself you're in a time loop or in front of a mirror.

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#318995: boost: rebuild needed for C++ ABI transition (NMU patch attached)

2005-07-19 Thread Steve Langasek
Package: boost
Version: 1.32.0-6
Severity: serious

Hi Domenico,

Under the 0-day NMU policy for the C++ ABI transition, I have prepared an
NMU for boost, because its C++ library packages need to be rebuilt so that a
number of other C++-based packages can transition to g++ 4.0.  The diff for
this NMU is attached; the NMU will be uploaded shortly.  If you see any
problems with the patch, let me know so I can have the package rejected out
of NEW.

Thanks,
-- 
Steve Langasek
postmodern programmer
diff -u boost-1.32.0/debian/control boost-1.32.0/debian/control
--- boost-1.32.0/debian/control
+++ boost-1.32.0/debian/control
@@ -58,10 +58,12 @@
  .
   Homepage: http://www.boost.org/libs/
 
-Package: libboost-date-time1.32.0
+Package: libboost-date-time1.32.0c2
 Architecture: any
 Section: libs
 Depends: ${shlibs:Depends}
+Conflicts: libboost-date-time1.32.0
+Replaces: libboost-date-time1.32.0
 Description: set of date-time libraries based on generic programming concepts
  Part of the Boost.org library collection.
  .
@@ -73,7 +75,7 @@
 Package: libboost-date-time-dev
 Architecture: any
 Section: libdevel
-Depends: libboost-dev (=${Source-Version}), libboost-date-time1.32.0 
(=${Source-Version})
+Depends: libboost-dev (=${Source-Version}), libboost-date-time1.32.0c2 
(=${Source-Version})
 Replaces: libboost-dev ( 1.30.0-1)
 Description: set of date-time libraries based on generic programming concepts
  Part of the Boost.org library collection.
@@ -83,10 +85,12 @@
  .
   Homepage: http://www.boost.org/libs/date_time/
 
-Package: libboost-filesystem1.32.0
+Package: libboost-filesystem1.32.0c2
 Architecture: any
 Section: libs
 Depends: ${shlibs:Depends}
+Conflicts: libboost-filesystem1.32.0
+Replaces: libboost-filesystem1.32.0
 Description: filesystem operations (portable paths, iteration over 
directories, etc) in C++
  Part of the Boost.org library collection.
  .
@@ -99,7 +103,7 @@
 Package: libboost-filesystem-dev
 Architecture: any
 Section: libdevel
-Depends: libboost-dev (=${Source-Version}), libboost-filesystem1.32.0 
(=${Source-Version})
+Depends: libboost-dev (=${Source-Version}), libboost-filesystem1.32.0c2 
(=${Source-Version})
 Replaces: libboost-dev ( 1.31.0-1)
 Description: filesystem operations (portable paths, iteration over 
directories, etc) in C++
  Part of the Boost.org library collection.
@@ -110,10 +114,12 @@
  .
   Homepage: http://boost.org/libs/filesystem/
 
-Package: libboost-graph1.32.0
+Package: libboost-graph1.32.0c2
 Architecture: any
 Section: libs
 Depends: ${shlibs:Depends}
+Conflicts: libboost-graph1.32.0
+Replaces: libboost-graph1.32.0
 Description: generic graph components and algorithms in C++
  Part of the Boost.org library collection.
  .
@@ -128,7 +134,7 @@
 Package: libboost-graph-dev
 Architecture: any
 Section: libdevel
-Depends: libboost-dev (=${Source-Version}), libboost-graph1.32.0 
(=${Source-Version})
+Depends: libboost-dev (=${Source-Version}), libboost-graph1.32.0c2 
(=${Source-Version})
 Description: generic graph components and algorithms in C++
  Part of the Boost.org library collection.
  .
@@ -140,10 +146,12 @@
  .
   Homepage: http://www.boost.org/libs/graph/
 
-Package: libboost-program-options1.32.0
+Package: libboost-program-options1.32.0c2
 Architecture: any
 Section: libs
 Depends: ${shlibs:Depends}
+Conflicts: libboost-program-options1.32.0
+Replaces: libboost-program-options1.32.0
 Description: program options library for C++
  Part of the Boost.org library collection.
  .
@@ -156,7 +164,7 @@
 Package: libboost-program-options-dev
 Architecture: any
 Section: libdevel
-Depends: libboost-dev (= ${Source-Version}), libboost-program-options1.32.0 (= 
${Source-Version})
+Depends: libboost-dev (= ${Source-Version}), libboost-program-options1.32.0c2 
(= ${Source-Version})
 Description: program options library for C++
  Part of the Boost.org library collection.
  .
@@ -166,10 +174,12 @@
  .
   Homepage: http://www.boost.org/libs/program_options/
 
-Package: libboost-python1.32.0
+Package: libboost-python1.32.0c2
 Architecture: any
 Section: python
 Depends: ${shlibs:Depends}
+Conflicts: libboost-python1.32.0
+Replaces: libboost-python1.32.0
 Description: Boost.Python Library 
  Part of the Boost.org library collection.
  .
@@ -189,7 +199,7 @@
 Package: libboost-python-dev
 Architecture: any
 Section: libdevel
-Depends: libboost-dev (=${Source-Version}), libboost-python1.32.0 
(=${Source-Version}), python2.3-dev
+Depends: libboost-dev (=${Source-Version}), libboost-python1.32.0c2 
(=${Source-Version}), python2.3-dev
 Replaces: libboost-dev ( 1.31.0-3)
 Description: Boost.Python Library development files
  Part of the Boost.org library collection.
@@ -207,10 +217,12 @@
  .
   Homepage: http://www.boost.org/libs/python/
 
-Package: libboost-regex1.32.0
+Package: libboost-regex1.32.0c2
 Architecture: any
 Section: libs
 Depends: ${shlibs:Depends}
+Conflicts: libboost-regex1.32.0
+Replaces: libboost-regex1.32.0
 Description: regular expression library for C++
  

Bug#315671: webcalendar unauthorized access

2005-07-19 Thread Martin Schulze
Stephen Gran wrote:
 Hello all,

Thanks a lot for contacting us.

 There is a security bug in webcalendar (#315671 and
 http://www.securityfocus.com/bid/14072, for reference).  Tim is the
 maintainer, but does not yet have a debian account, and cannot upload.
 We have a fixed version for sarge ready (patch attached).  I am happy to
 upload it for Tim, or you could based on the attached patch.  Please let
 us know which way you want to handle this.  Tim is copied on this mail,
 please keep both of us in the follow ups.
 
 There is as yet no CVE, but the bugtraq ID is 14072.

I have requested an id.

While we're at it, have you checked this vulnerability as well?
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0474

I'll take care of sarge.

Regards,

Joey

-- 
Whenever you meet yourself you're in a time loop or in front of a mirror.

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#318525: atlas: FTBFS: Memory inputs not directly addressable

2005-07-19 Thread Matt Kraai
On Sun, Jul 17, 2005 at 10:09:52PM -0700, Matt Kraai wrote:
 On Sun, Jul 17, 2005 at 08:25:21PM +0100, Roger Leigh wrote:
  Is this still reproducible with a current etch or sid system?
  
  Also, your bug report did not state the architecture, subarchitecture
  or compiler you were using, not the distribution you built on.  Given
  that this is using ASM, this will affect which platforms can reproduce
  it.

As I mentioned before, this failure occurred on i386.  I was using gcc
4:4.0.0-2 in a sid pbuilder chroot.

I was able to reproduce the failure.

-- 
Matt


signature.asc
Description: Digital signature


Bug#318998: FTBFS: C++ errors

2005-07-19 Thread Matt Kraai
Package: armagetron
Version: 0.2.7.0-1
Severity: serious

armagetron fails to build with some C++ errors:

i486-linux-gnu-g++ -I. -I.. -I../.. -Wall -g -O2 -I/usr/include/SDL 
-D_REENTRANT -I../../../src/tools/ -I../../../src/engine/ 
-I../../../src/network/ -I../../../src/ui/ -I../../../src/render/  
-I../../../src/tron -I../../../src -c  ../../../src/tron/gServerBrowser.cpp -o 
gServerBrowser.o
../../../src/tools/tSafePTR.h: In member function 'const T* 
tCheckedPTRConstT::operator-() const':
../../../src/tools/tSafePTR.h:108: error: 'operator-' is not a member of 
'tCheckedPTRBase'
../../../src/tools/tSafePTR.h: In destructor 
'tStackObjectT::~tStackObject()':../../../src/tools/tSafePTR.h:414: error: 
'refCtr_' was not declared in this scope
../../../src/tools/tList.h: In destructor 'tListT, MALLOC, 
REFERENCE::~tList()':
../../../src/tools/tList.h:100: error: there are no arguments to 'Len' that 
depend on a template parameter, so a declaration of 'Len' must be available
../../../src/tools/tList.h:100: error: (if you use '-fpermissive', G++ will 
accept your code, but allowing the use of an undeclared name is deprecated)
../../../src/tools/tList.h:101: error: there are no arguments to 'operator()' 
that depend on a template parameter, so a declaration of 'operator()' must be 
available
../../../src/tools/tList.h: In member function 'void tListT, MALLOC, 
REFERENCE::Add(T*, int)':
../../../src/tools/tList.h:110: error: there are no arguments to 'Len' that 
depend on a template parameter, so a declaration of 'Len' must be available
../../../src/tools/tList.h:111: error: there are no arguments to 'operator[]' 
that depend on a template parameter, so a declaration of 'operator[]' must be 
available
../../../src/tools/tList.h: In member function 'void tListT, MALLOC, 
REFERENCE::Remove(T*, int)':
../../../src/tools/tList.h:141: error: there are no arguments to 'Len' that 
depend on a template parameter, so a declaration of 'Len' must be available
../../../src/tools/tList.h:143: error: there are no arguments to 'Len' that 
depend on a template parameter, so a declaration of 'Len' must be available
../../../src/tools/tList.h:145: error: there are no arguments to 'operator()' 
that depend on a template parameter, so a declaration of 'operator()' must be 
available
../../../src/tools/tList.h:150: error: there are no arguments to 'Len' that 
depend on a template parameter, so a declaration of 'Len' must be available
../../../src/tools/tList.h:152: error: there are no arguments to 'Len' that 
depend on a template parameter, so a declaration of 'Len' must be available
../../../src/network/nNetwork.h: In member function 'nMessage 
nMessage::operator(T*)':
../../../src/network/nNetwork.h:432: error: incomplete type 'nNetObject' used 
in nested name specifier
../../../src/network/nNetwork.h: In member function 'nMessage 
nMessage::operator(tControlledPTRT)':
../../../src/network/nNetwork.h:455: error: incomplete type 'nNetObject' used 
in nested name specifier
../../../src/tools/tLocale.h: At global scope:
../../../src/tools/tLocale.h:112: error: invalid pure specifier (only `= 0' is 
allowed) before ';' token
../../../src/tools/tLocale.h:113: error: invalid pure specifier (only `= 0' is 
allowed) before ';' token
make[2]: *** [gServerBrowser.o] Error 1
make[2]: Leaving directory `/tmp/buildd/armagetron-0.2.7.0/client/src/tron'
make[1]: *** [all] Error 2
make[1]: Leaving directory `/tmp/buildd/armagetron-0.2.7.0/client'
make: *** [build-stamp.client] Error 2

-- 
Matt


signature.asc
Description: Digital signature


Processed: merging 285918 288966

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.8.14
 merge 285918 288966
Bug#285918: felt: FTBFS (amd64/gcc-4.0): invalid lvalue in assignment
Bug#288966: felt: FTBFS (amd64/gcc-4.0): invalid lvalue in assignment
Merged 285918 288966.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#319000: no documentation in libcegui-mk2-doc

2005-07-19 Thread Elias Kunnas
Package: libcegui-mk2-doc
Version: 0.3.0-1
Severity: grave
Justification: renders package unusable


It seems CEGUI as of version 0.3.0 has no longer any documentation shipped
with the Linux tarballs. Currently the documentation can only be found
from the win32 zip available from:
http://prdownloads.sourceforge.net/crayzedsgui/cegui_mk2-0.3.0-win32.zip?download.
Maybe this should also be reported to the upstream?


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.11-1-k7
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=UTF-8)

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#318826: marked as done (libpam-umask encounters a Segmentation fault - preventing login)

2005-07-19 Thread Debian Bug Tracking System
Your message dated Tue, 19 Jul 2005 02:32:58 -0400
with message-id [EMAIL PROTECTED]
and subject line Bug#318826: fixed in pam-umask 0.03
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 17 Jul 2005 23:35:17 +
From [EMAIL PROTECTED] Sun Jul 17 16:35:17 2005
Return-path: [EMAIL PROTECTED]
Received: from sccrmhc11.comcast.net [204.127.202.55] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1DuIfF-000397-00; Sun, 17 Jul 2005 16:35:17 -0700
Received: from smtp.misumasu.dyndns.org (misumasu.dyndns.org[68.35.133.22])
  by comcast.net (sccrmhc11) with ESMTP
  id 2005071723344501100qi1one; Sun, 17 Jul 2005 23:34:45 +
Received: by smtp.misumasu.dyndns.org (Postfix, from userid 1)
id AD95C1228C8; Sun, 17 Jul 2005 17:34:44 -0600 (MDT)
Content-Type: text/plain; charset=us-ascii
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Michael Berg [EMAIL PROTECTED]
To: Debian Bug Tracking System [EMAIL PROTECTED]
Subject: libpam-umask encounters a Segmentation fault - preventing login
X-Mailer: reportbug 3.15
Date: Sun, 17 Jul 2005 17:34:44 -0600
Message-Id: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: libpam-umask
Version: 0.02
Severity: grave
Justification: renders package unusable

The latest libpam-umask (0.02) encounters a SIGSEGV (Segmentation fault)
that prevents all uses from logging in through any path that references
pam_umask.so in the PAM configuration.

This even effects optional entries in PAM configurations since
pam_umask.so seg-faults.

I had the following line in /etc/pam.d/common-session
sessionoptionalpam_umask.so umask=0077

Commenting out this line allows users to log in again.


Below are ltrace and gdb output for the getty process when pam_umask
is enabled on the system.

Running getty through ltrace, and then attempting to log in produced
# ltrace /sbin/getty 38400 tty8
...
pam_start(0x804f1c9, 0xbfe1a2d0, 0x804f088, 0x8051618, 0)= 0
pam_set_item(0x9242228, 4, 0x804ff87, 0x8051618, 0)  = 0
pam_set_item(0x9242228, 3, 0xbfe182d0, 0x8051618, 0) = 0
pam_fail_delay(0x9242228, 0x2dc6c0, 0xbfe182d0, 0x8051618, 0) = 0
gethostname(server, 256)   = 0
snprintf(server login: , 256, %s login: , server)  = 14
pam_set_item(0x9242228, 9, 0xbfe17e50, 0xbfe17f50, 0)= 0
pam_get_item(0x9242228, 2, 0xbfe17e48, 0xbfe17f50, 0)= 0
pam_fail_delay(0x9242228, 0x2dc6c0, 0xbfe17e48, 0xbfe17f50, 0) = 0
pam_authenticate(0x9242228, 0, 0xbfe17e48, 0xbfe17f50, 0 unfinished ...
misc_conv(1, 0xbfe17d1c, 0xbfe17d28, 0, 0xb7f0a280)  = 0
... pam_authenticate resumed ) = 0
pam_get_item(0x9242228, 2, 0xbfe17e48, 0xbfe17f50, 0)= 0
getpwnam(michael)  = 0x4114c0b8
strcmp(MAIL_CHECK_ENAB, FAILLOG_ENAB)= 1
strcmp(ERASECHAR, FAILLOG_ENAB)  = -1
strcmp(HUSHLOGIN_FILE, FAILLOG_ENAB) = 1
strcmp(FTMP_FILE, FAILLOG_ENAB)  = 1
strcmp(FAIL_DELAY, FAILLOG_ENAB) = 1
strcmp(FAILLOG_ENAB, FAILLOG_ENAB)   = 0
strcasecmp(yes, yes) = 0
open64(/var/log/faillog, 2, 0145)  = 7
lseek64(7, 24, 0, 0, 0x41021158) = 24
read(7, , 24)  = 24
lseek64(7, 24, 0, 0, 0)  = 24
write(7, , 24) = 24
close(7) = 0
alarm(0) = 58
pam_acct_mgmt(0x9242228, 0, 0, 0xbfe17f50, 0)= 0
pam_get_item(0x9242228, 2, 0xbfe17e48, 0xbfe17f50, 0)= 0
setpwent()   = void
getpwnam(michael)  = 0x4114c0b8
setgid(1)= 0
initgroups(0x9249e5a, 1, 0x4114c0b8, 0x4114c0b8, 0x4114c0b8) = 0
pam_setcred(0x9242228, 2, 0xbfe17e48, 0xbfe17f50, 0) = 0

Bug#317098: kmail: Same problem for me - segfault without any information

2005-07-19 Thread Georg Hoermann
Package: kmail
Version: 4:3.3.2-3
Followup-For: Bug #317098



-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (990, 'unstable'), (500, 'proposed-updates'), (500, 'testing'), 
(500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.4.26
Locale: LANG=C, LC_CTYPE=C (charmap=ISO-8859-15) (ignored: LC_ALL set to [EMAIL 
PROTECTED])

Versions of packages kmail depends on:
ii  kdelibs4  4:3.3.2-7  KDE core libraries
ii  libc6 2.3.2.ds1-22   GNU C Library: Shared libraries an
ii  libgcc1   1:4.0.1-2  GCC support library
ii  libice6   6.8.2.dfsg.1-3 Inter-Client Exchange library
ii  libkcal2a 4:3.3.2-3  KDE calendaring library
ii  libkdenetwork24:3.3.2-3  KDE Network library
ii  libkdepim14:3.3.2-3  KDE PIM library
ii  libkleopatra0a4:3.3.2-3  KDE GnuPG interface libraries
ii  libkpimidentities14:3.3.2-3  KDE PIM user identity information 
ii  libksieve04:3.3.2-3  KDE mail/news message filtering li
ii  libmimelib1a  4:3.3.2-3  KDE mime library
ii  libpng12-01.2.8rel-1 PNG library - runtime
ii  libqt3c102-mt 3:3.3.4-3  Qt GUI Library (Threaded runtime v
ii  libsm66.8.2.dfsg.1-3 X Window System Session Management
ii  libstdc++51:3.3.6-7  The GNU Standard C++ Library v3
ii  libx11-6  6.8.2.dfsg.1-3 X Window System protocol client li
ii  libxext6  6.8.2.dfsg.1-3 X Window System miscellaneous exte
ii  perl  5.8.7-4Larry Wall's Practical Extraction 
ii  xlibs 6.8.2.dfsg.1-3 X Window System client libraries m
ii  zlib1g1:1.2.2-9  compression library - runtime

Versions of packages kmail recommends:
ii  kdebase-kio-plugins   4:3.3.2-1  KDE I/O Slaves
ii  kdepim-kio-plugins4:3.3.2-3  KDE pim I/O Slaves
ii  procmail  3.22-11Versatile e-mail processor

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Whoops, syntax error :)

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 318673 serious
Bug#318673: flac: rebuild needed for C++ ABI transition (NMU patch attached)
Severity set to `serious'.

 tags 318673 patch
Bug#318673: flac: rebuild needed for C++ ABI transition (NMU patch attached)
There were no tags set.
Tags added: patch

 found 318673 1.1.1-5
Bug#318673: flac: rebuild needed for C++ ABI transition (NMU patch attached)
Bug marked as found in version 1.1.1-5.

 fixed 318673 1.1.1-5.1
Unknown command or malformed arguments to command.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#288966: felt: FTBFS (amd64/gcc-4.0): invalid lvalue in assignment

2005-07-19 Thread Steve Langasek
Hi Alex,

 Thanks for the patch, I'll get this patch into the next release, which
 should be this weekend.

You wrote this six months ago.  Has this release happened?  When will it be
uploaded to Debian?

Thanks,
-- 
Steve Langasek
postmodern programmer


signature.asc
Description: Digital signature


Processed: blah blah blah

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 close 318673 1.1.1-5.1
Bug#318673: flac: rebuild needed for C++ ABI transition (NMU patch attached)
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 1.1.1-5.1, send any further explanations to 
Steve Langasek [EMAIL PROTECTED]


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#319003: xserver-xorg: Trident and -3: libvgahw is still broken

2005-07-19 Thread Guillaume Melquiond
Package: xserver-xorg
Version: 6.8.2.dfsg.1-3
Severity: grave
Justification: renders package unusable

This bug-report is related to #318218, #318231, #318271, #318405. Feel 
free to merge it with them. I didn't, because part of the problem 
reported in these bug-reports was indeed fixed by the last version.

With the previous versions of xserver-xorg, because of the 
miscompilation in libvgahw, the screen was pure white in graphical mode, 
and completely garbled when switching to text VTs. Now, with the fix 
included in -3, the text consoles are usable again. But the screen is 
still pure white in graphical mode.

Installing the libvgahw.a file compiled by Ender fixes the problem. So 
it seems there is another miscompilation somewhere in the file.


-- Package-specific info:

VGA-compatible devices on PCI bus:
:01:00.0 VGA compatible controller: Trident Microsystems CyberBlade XPAi1 
(rev 82)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#318405: acknowledged by developer (Bug#318218: fixed in xorg-x11 6.8.2.dfsg.1-3)

2005-07-19 Thread Reinhard Karcher
Debian Bug Tracking System schrieb:
 This is an automatic notification regarding your Bug report
 #318405: xserver-xorg sets wrong palete on switching to console.,
 which was filed against the xserver-xorg package.
 
 It has been closed by one of the developers, namely
 David Nusinow [EMAIL PROTECTED].
 
 Their explanation is attached below.  If this explanation is
 unsatisfactory and you have not received a better one in a separate
 message then please contact the developer, by replying to this email.
 
 A summary of the changes between this version and the previous one is
 attached.
 
 Thank you for reporting the bug, which will now be closed.  If you
 have further comments please address them to [EMAIL PROTECTED],
 and the maintainer will reopen the bug report if appropriate.
 
 Debian distribution maintenance software
 pp.
 David Nusinow [EMAIL PROTECTED] (supplier of updated xorg-x11 package)
 
 (This message was generated automatically at their request; if you
 believe that there is a problem with it please contact the archive
 administrators by mailing [EMAIL PROTECTED])
 
Changes by David Nusinow:
   - Add 030_libvgahw_gcc4_volatile_fix.diff to work around libvgahw.a gcc4
 breakages. Thanks David Marti­nez Moreno and Paul Hampson.
 Closes: #318218, #318231, #318271, #318405, #318430
 
Sorry,
the bug is not fixed by 6.8.2.dfsg.1-3.
I have to use the same workaround as before.
Please reopen bug.

Reinhard




Bug#319005: import fails to map .deb files to backends

2005-07-19 Thread Eduard Bloch
Package: apt-proxy
Version: 1.9.31
Severity: serious

Hello,

on my server machine, I tried to import the current apt-cacher cache
(real debian packages) into apt-proxy, but the import script fails,
unnable to find a suitable backend:

2005/07/19 09:18 CEST [-] [import] centericq-common_4.20.0-8_i386.deb
skipped - no suitable backend found
2005/07/19 09:18 CEST [-] [import] libxxf86misc1_6.8.2.dfsg.1-3_i386.deb
skipped - no suitable backend found
2005/07/19 09:18 CEST [-] [import] libnewt0.51_0.51.6-28_i386.deb
skipped - no suitable backend found
2005/07/19 09:18 CEST [-] [import] libgconf2-dev_2.10.1-1_i386.deb
skipped - no suitable backend found
2005/07/19 09:18 CEST [-] [import] cupsys-client_1.1.23-11_i386.deb
skipped - no suitable backend found
2005/07/19 09:18 CEST [-] [import] dictionaries-common_0.49.2_all.deb
skipped - no suitable backend found

Howver, its non-sense, there are backends and there also Packages files
therein:

find /var/cache/apt-proxy/debian/
/var/cache/apt-proxy/debian/
/var/cache/apt-proxy/debian/dists
/var/cache/apt-proxy/debian/dists/unstable
/var/cache/apt-proxy/debian/dists/unstable/main
/var/cache/apt-proxy/debian/dists/unstable/main/binary-i386
/var/cache/apt-proxy/debian/dists/unstable/main/binary-i386/Packages.bz2
/var/cache/apt-proxy/debian/dists/unstable/Release.gpg
/var/cache/apt-proxy/debian/dists/unstable/contrib
/var/cache/apt-proxy/debian/dists/unstable/contrib/binary-i386
/var/cache/apt-proxy/debian/dists/unstable/contrib/binary-i386/Packages.bz2
/var/cache/apt-proxy/debian/dists/unstable/Release
/var/cache/apt-proxy/debian/dists/unstable/non-free
/var/cache/apt-proxy/debian/dists/unstable/non-free/binary-i386
/var/cache/apt-proxy/debian/dists/unstable/non-free/binary-i386/Packages.bz2
/var/cache/apt-proxy/debian/pool
/var/cache/apt-proxy/debian/pool/main
/var/cache/apt-proxy/debian/pool/main/g
/var/cache/apt-proxy/debian/pool/main/g/gutenprint
/var/cache/apt-proxy/debian/pool/main/g/gutenprint/libgutenprint2_4.3.99+cvs20050715-1_i386.deb
/var/cache/apt-proxy/debian/pool/main/c
/var/cache/apt-proxy/debian/pool/main/c/cupsys
/var/cache/apt-proxy/debian/pool/main/c/cupsys/libcupsimage2_1.1.23-11_i386.deb
/var/cache/apt-proxy/debian/pool/main/c/cupsys/libcupsys2-gnutls10_1.1.23-11_i386.deb
/var/cache/apt-proxy/debian/pool/main/z
/var/cache/apt-proxy/debian/pool/main/z/zlib
/var/cache/apt-proxy/debian/pool/main/z/zlib/zlib1g-dev_1.2.2-9_i386.deb
/var/cache/apt-proxy/debian/pool/main/z/zlib/zlib1g_1.2.2-9_i386.deb

Maybe it does not work with .bz2 variants?

Regards,
Eduard.


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (990, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)

Versions of packages apt-proxy depends on:
ii  bzip2 1.0.2-7high-quality block-sorting file co
ii  debconf   1.4.52 Debian configuration management sy
ii  logrotate 3.7-5  Log rotation utility
ii  python2.3.5-3An interactive high-level object-o
ii  python-apt0.6.12.1   Python interface to libapt-pkg
ii  python-bsddb3 3.3.0-6Python interface to libdb3
ii  python-twisted2.0.1-3Event-based framework for internet
ii  python2.3 2.3.5-6An interactive high-level object-o

apt-proxy recommends no packages.

-- debconf information excluded


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Fixed by upload of 1.0.5-1 and 1.0.99+deerpark-alpha2-1

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 close 318061 1.0.5-1
Bug#318061: mozilla-firefox: version 1.0.5 fixes several security bugs
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 1.0.5-1, send any further explanations to 
Florian Weimer [EMAIL PROTECTED]

 close 318061 1.0.99+deerpark-alpha2-1
Bug#318061: mozilla-firefox: version 1.0.5 fixes several security bugs
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 1.0.99+deerpark-alpha2-1, send any further 
explanations to Florian Weimer [EMAIL PROTECTED]

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#318164: CXX 4.0 transition

2005-07-19 Thread Josselin Mouette
Le lundi 18 juillet 2005 à 23:38 +0200, Robert Jordens a écrit :
 Hello!
 
 [Thu, 14 Jul 2005] Josselin Mouette wrote:
  On second thought this probably requires NUMing mpich as well, as the
  mpich version seems to be statically linked to libpmpich++. I'll see if
  I have time for these.
 
 lam is linked statically against mpich. But libmpich++ is shipped with
 lam and lam builds and links against that. That is bad and incorrect but
 subject of another yet-to-file bug.

Whoa ? LAM is linked against mpich ? Aren't they two independent
implementations of MPI ?

 I'm planning the NMU of lam.

Thanks. I guess we also need a NMU of mpich, so that libmpich++ is
rebuilt. Modifying mpicc.mpich to use dynamic linking would be a good
idea as well.
-- 
 .''`.   Josselin Mouette/\./\
: :' :   [EMAIL PROTECTED]
`. `'[EMAIL PROTECTED]
   `-  Debian GNU/Linux -- The power of freedom




Bug#318164: CXX 4.0 transition

2005-07-19 Thread Robert Jordens
Hello!

[Tue, 19 Jul 2005] Josselin Mouette wrote:
  lam is linked statically against mpich. But libmpich++ is shipped with
  lam and lam builds and links against that. That is bad and incorrect but
  subject of another yet-to-file bug.
 
 Whoa ? LAM is linked against mpich ? Aren't they two independent
 implementations of MPI ?

Yes. I confused it with mpich. liblammpi++ is part of lam and built
against.

  I'm planning the NMU of lam.
 
 Thanks. I guess we also need a NMU of mpich, so that libmpich++ is
 rebuilt. Modifying mpicc.mpich to use dynamic linking would be a good
 idea as well.

Similar for lam. lam4 should be split into c++ and pure-C library packages.
But since that's mor a decision of the maintainer, I'll leave that to
him.

Robert.

-- 
Neutrinos are into physicists.


signature.asc
Description: Digital signature


Bug#315703: Bug#316590: woody backport now available for all cacti security issues

2005-07-19 Thread Sean Finney
On Tue, Jul 19, 2005 at 07:54:31AM +0200, Martin Schulze wrote:
 Ok, I'll wait.

so, a 6 hour plane flight later, i've learned 3 things:

1 - there are a number of other variables that also need to be included.
2 - there are a number of calls where variables are indirectly passed
to mysql_foo functions via other functions (which causes a problem
for the current sanity checking method)
3 - there is another, ridiculously obvious security vulnerability in
the woody version.


1 is easy to fix, we can just add on the extra variables to the file.
of the 900 or so calls to mysql_foo functions, i had about 170 left
to look at when my battery crapped out.

2 is trickier.  we could either repeat the process i'm about finished
with wrt mysql_foo for all the functions that pass variables to
mysql_foo, or we could do the sanity checking in the function.  as
the former sounds ugly and even more time consuming i'm going to
side with thte latter. 

what i think i'm going to do is split sanitize.php into sanitize and
sanitize-functions.  sanitize will include_once sanitize-functions,
so then sanitize can be included multiple times (otherwise i believe
that php will bitch about functions being redefined), and i'll just
slip in a line in each mysql-calling function to include sanitize,
and add the variables in said functions to sanitize.php.

as for 3, well... there's a variable, which is stored in a cookie.
the cookie name is cactilogin, and the value is an integer.  want to
guess what it does?  a fix for this shouldn't be too hard, this kind
of info should be stored in the session and not in the cookie.

anyway, i'll have a fair amount of free time tomorrow, but will need
a little sleep first :)


sean

-- 


signature.asc
Description: Digital signature


Processed: Re: Bug#318959: gcc-4.0: compiles broken code

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 reassign 318959 libc6
Bug#318959: gcc-4.0: compiles broken code
Bug reassigned from package `gcc-4.0' to `libc6'.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#315703: Bug#316590: woody backport now available for all cacti security issues

2005-07-19 Thread Martin Schulze
Sean Finney wrote:
 On Tue, Jul 19, 2005 at 07:54:31AM +0200, Martin Schulze wrote:
  Ok, I'll wait.
 
 so, a 6 hour plane flight later, i've learned 3 things:
 
 1 - there are a number of other variables that also need to be included.
 2 - there are a number of calls where variables are indirectly passed
 to mysql_foo functions via other functions (which causes a problem
 for the current sanity checking method)
 3 - there is another, ridiculously obvious security vulnerability in
 the woody version.

Thanks a lot for your investigation!

 1 is easy to fix, we can just add on the extra variables to the file.
 of the 900 or so calls to mysql_foo functions, i had about 170 left
 to look at when my battery crapped out.
 
 2 is trickier.  we could either repeat the process i'm about finished
 with wrt mysql_foo for all the functions that pass variables to
 mysql_foo, or we could do the sanity checking in the function.  as
 the former sounds ugly and even more time consuming i'm going to
 side with thte latter. 

The less work and the less intrusive the patch the better.

 what i think i'm going to do is split sanitize.php into sanitize and
 sanitize-functions.  sanitize will include_once sanitize-functions,
 so then sanitize can be included multiple times (otherwise i believe
 that php will bitch about functions being redefined), and i'll just
 slip in a line in each mysql-calling function to include sanitize,
 and add the variables in said functions to sanitize.php.

Sounds good.

 as for 3, well... there's a variable, which is stored in a cookie.
 the cookie name is cactilogin, and the value is an integer.  want to
 guess what it does?  a fix for this shouldn't be too hard, this kind
 of info should be stored in the session and not in the cookie.

Hmm, having the user id stored in a cookie is common practice.
The variable obviously needs to be sanitised as well.

 anyway, i'll have a fair amount of free time tomorrow, but will need
 a little sleep first :)

Ok.  For reference I'm attaching the interdiff between the woody
version and the current updated version on security.debian.org (in
the private queue).

Regards,

Joey

-- 
Whenever you meet yourself you're in a time loop or in front of a mirror.

Please always Cc to me when replying to me on the lists.
diff -u cacti-0.6.7/include/config.php cacti-0.6.7/include/config.php
--- cacti-0.6.7/include/config.php
+++ cacti-0.6.7/include/config.php
@@ -23,6 +23,21 @@
 */?
 ?
 
+/* whether or not we pull from a db, we need re-initilize */
+global $config;
+
+/* test for suspicious user-supplied variables that would otherwise
+   affect program execution, and if so zero out config for safety */
+if(isset($_GET[do_not_read_config]) || isset($_POST[do_not_read_config])
+   || isset($_GET[config]) || isset($_POST[config])){
+$config = array();
+}
+$colors = array();
+
+## debian security backport ##
+require_once(sanitize.php);
+## debian security backport ##
+
 ## Debian packaging ##
 include(/etc/cacti/config.php);
 ## Debian packaging ##
@@ -30,9 +45,6 @@
 /* make sure this variable reflects your operating system type: 'unix' or 
'win32' */
 $cacti_server_os = unix;
 
-/* whether or not we pull from a db, we need re-initilize */
-global $config;
-
 if ($do_not_read_config != true) {
if (isset($config) == false) {
/* make a connection to the database */
diff -u cacti-0.6.7/debian/changelog cacti-0.6.7/debian/changelog
--- cacti-0.6.7/debian/changelog
+++ cacti-0.6.7/debian/changelog
@@ -1,3 +1,25 @@
+cacti (0.6.7-2.4) oldstable-security; urgency=high
+
+  * Non-maintainer upload by the Security Team
+  * Switched to using $_REQUEST instead of $_GET and $_POST since this
+version only uses $foo which is similar to $_REQUEST[foo]
+  * Reduced the number of tested variables to those actually used.
+
+ -- Martin Schulze [EMAIL PROTECTED]  Fri, 15 Jul 2005 16:06:58 +0200
+
+cacti (0.6.7-2.3) oldstable-security; urgency=high
+  
+  * update prepared for the security team by new maintainer.
+  * include backported updates against the two latest cacti security
+releases.  this includes the following CAN id's:
+- CAN-2005-1524 (idefense remote file inclusion)
+- CAN-2005-1525 (idefense SQL injection)
+- CAN-2005-1526 (idefense remote code execution)
+- CAN-2005-2148 (hardened-php advisories 032005 and 042005)
+- CAN-2005-2149 (hardened-php advisory 052005)
+
+ -- sean finney [EMAIL PROTECTED]  Mon, 11 Jul 2005 20:35:12 -0400
+
 cacti (0.6.7-2.2) stable-security; urgency=medium
 
   * Non-maintainer upload by Stable Release Manager
only in patch2:
unchanged:
--- cacti-0.6.7.orig/include/sanitize.php
+++ cacti-0.6.7/include/sanitize.php
@@ -0,0 +1,123 @@
+?php
+
+/*
+ * backported security-related changes from cacti 
+ * by sean finney [EMAIL PROTECTED]
+ *
+ * to preserve my own sanity, all sanity checks are done in here, which
+ * is included by the main configuration, which is included by 

Bug#318959: gcc-4.0: compiles broken code

2005-07-19 Thread Matthias Klose
reassign 318959 libc6
thanks

looks like this only happens, when lround from libm is used.

Thorsten Jordan writes:
 Package: gcc-4.0
 Version: 4.0.1-2
 Severity: grave
 Justification: renders package unusable
 
 
 gcc-4.0 generates code that gives false results for this
 tiny program:
 
 #include stdio.h
 #include math.h
 int main()
 {
 volatile double a = 1.04837e+06, b = 1.04866e+06;
 printf(%li %li\n, lround(a), lround(b));
 return 0;
 }
 
 compilation with -O1 or -O2 gives wrong results for
 lround(b), although the number would fit the long
 variable obviously.
 
 
 
 -- System Information:
 Debian Release: testing/unstable
   APT prefers unstable
   APT policy: (500, 'unstable')
 Architecture: i386 (i686)
 Shell:  /bin/sh linked to /bin/bash
 Kernel: Linux 2.6.12
 Locale: LANG=de_DE, LC_CTYPE=de_DE (charmap=ISO-8859-1)
 
 Versions of packages gcc-4.0 depends on:
 ii  binutils2.16.1-2 The GNU assembler, linker
 and bina
 ii  cpp-4.0 4.0.1-2  The GNU C preprocessor
 ii  gcc-4.0-base4.0.1-2  The GNU Compiler Collection
 (base
 ii  libc6   2.3.2.ds1-22 GNU C Library: Shared
 libraries an
 ii  libgcc1 1:4.0.1-2GCC support library
 
 Versions of packages gcc-4.0 recommends:
 ii  libc6-dev   2.3.2.ds1-22 GNU C Library: Development
 Librari
 ii  libmudflap0-dev 4.0.1-2  GCC mudflap support
 libraries (dev
 
 -- no debconf information
 
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#260652: Yet another improved munpack patch

2005-07-19 Thread Daniel Schepler
Here's an improved version of Roger Leigh's patch which fixes all the
implicit declarations and a couple other warnings (and the
uninitialized variable warning was harmless).  It also fixes a problem
which caused munpack to detect corruption on amd64 when there was none
(that's the part in md5.h).
-- 
Daniel Schepler  Please don't disillusion me.  I
[EMAIL PROTECTED]haven't had breakfast yet.
 -- Orson Scott Card
diff -urN mpack-1.6.old/codes.c mpack-1.6/codes.c
--- mpack-1.6.old/codes.c	2003-07-21 13:51:08.0 -0700
+++ mpack-1.6/codes.c	2005-07-19 01:28:48.0 -0700
@@ -128,7 +128,7 @@
 int nbytes;
 
 MD5Init(context);
-while (nbytes = fread(buf, 1, sizeof(buf), infile)) {
+while ((nbytes = fread(buf, 1, sizeof(buf), infile))) {
 	length += nbytes;
 	MD5Update(context, buf, nbytes);
 }
diff -urN mpack-1.6.old/decode.c mpack-1.6/decode.c
--- mpack-1.6.old/decode.c	2003-07-21 13:47:54.0 -0700
+++ mpack-1.6/decode.c	2005-07-19 01:56:57.0 -0700
@@ -26,8 +26,10 @@
  * SOFTWARE.  */
 
 #include stdio.h
+#include stdlib.h
 #include string.h
 #include ctype.h
+#include unistd.h
 #include xmalloc.h
 #include common.h
 #include part.h
@@ -37,6 +39,19 @@
 extern FILE *os_newtypedfile(char *fname, char *contentType, int flags, params contentParams);
 extern FILE *os_createnewfile(char *fname);
 extern char *md5contextTo64(MD5_CTX *context);
+extern void warn(char *s);
+extern void os_perror(char *str);
+extern void chat(char *s);
+extern void os_donewithdir(char *dir);
+extern void os_warnMD5mismatch(void);
+extern void os_closetypedfile(FILE *outfile);
+
+extern int part_depth(struct part *part);
+extern void part_ungets(char *s, struct part *part);
+extern void part_close(struct part *part);
+extern int part_fill(struct part *part);
+extern void part_addboundary(struct part *part, char *boundary);
+extern int part_readboundary(struct part *part);
 
 /* The possible content transfer encodings */
 enum encoding { enc_none, enc_qp, enc_base64 };
@@ -49,6 +64,17 @@
 void from64(struct part *inpart, FILE *outfile, char **digestp, int suppressCR);
 void fromqp(struct part *inpart, FILE *outfile, char **digestp);
 void fromnone(struct part *inpart, FILE *outfile, char **digestp);
+int handlePartial(struct part *inpart, char *headers, params contentParams,
+		  int extractText);
+int ignoreMessage(struct part *inpart);
+int handleMultipart(struct part *inpart, char *contentType,
+		params contentParams, int extractText);
+int handleUuencode(struct part *inpart, char *subject, int extractText);
+int handleText(struct part *inpart, enum encoding contentEncoding);
+int saveToFile(struct part *inpart, int inAppleDouble, char *contentType,
+	   params contentParams, enum encoding contentEncoding,
+	   char *contentDisposition, char *contentMD5);
+
 /*
  * Read and handle an RFC 822 message from the body-part 'inpart'.
  */
@@ -624,7 +650,7 @@
 }
 thispart = atoi(p);
 
-if (p = getParam(contentParams, total)) {
+if ((p = getParam(contentParams, total))) {
 	nparts = atoi(p);
 	if (nparts = 0) {
 	warn(partial message has invalid number of parts);
@@ -643,7 +669,7 @@
 else {
 	/* Try to retrieve number of parts from reassembly directory */
 	sprintf(buf, %sCT, dir);
-	if (partfile = fopen(buf, r)) {
+	if ((partfile = fopen(buf, r))) {
 	if (fgets(buf, sizeof(buf), partfile)) {
 		nparts = atoi(buf);
 		if (nparts  0) nparts = 0;
diff -urN mpack-1.6.old/encode.c mpack-1.6/encode.c
--- mpack-1.6.old/encode.c	2003-07-21 13:35:31.0 -0700
+++ mpack-1.6/encode.c	2005-07-19 01:44:56.0 -0700
@@ -23,12 +23,15 @@
  * SOFTWARE.
  */
 #include stdio.h
+#include stdlib.h
 #include string.h
 
 extern char *magic_look(FILE *infile);
 extern char *os_genid(void);
 extern FILE *os_createnewfile(char *fname);
 extern char *md5digest(FILE *infile, long int *len);
+extern void os_perror(char *str);
+extern int to64(FILE *infile, FILE *outfile, long int limit);
 
 #define NUMREFERENCES 4
 
@@ -43,7 +46,7 @@
 char *type;
 FILE *outfile;
 char *cleanfname, *p;
-char *digest, *appledigest;
+char *digest, *appledigest = NULL;
 long filesize, l, written;
 int thispart, numparts = 1;
 int wrotefiletype = 0;
@@ -57,12 +60,12 @@
 /* This filename-cleaning knowledge will probably
  * be moved to the os layer in a future version.
  */
-if (p = strrchr(cleanfname, '.')) cleanfname = p+1;
+if ((p = strrchr(cleanfname, '.'))) cleanfname = p+1;
 #else
-if (p = strrchr(cleanfname, '/')) cleanfname = p+1;
-if (p = strrchr(cleanfname, '\\')) cleanfname = p+1;
+if ((p = strrchr(cleanfname, '/'))) cleanfname = p+1;
+if ((p = strrchr(cleanfname, '\\'))) cleanfname = p+1;
 #endif
-if (p = strrchr(cleanfname, ':')) cleanfname = p+1;
+if ((p = strrchr(cleanfname, ':'))) cleanfname = p+1;
 
 /* Find file type */
 if (typeoverride) {

Bug#319019: popularity-contest: New HTTP uploader do not follow CGI specification

2005-07-19 Thread Petter Reinholdtsen

Package: popularity-contest
Version: 1.30
Severity: serious

The HTTP POST upload being done by popcon-upload do not seem to follow
the CGI file upload specification.  This make it hard to use common
CGI parsers on the server end, and also make it confusing to analyze
the HTTP trafic.  In addition, this make the Debian and Ubuntu HTTP
upload protocol incompatible with each other.

We should change the protocol and make sure the HTTP POST protocol
look like a normal browser upload before the this new
popularity-contest make it into testing.  I set severity to serious
because of this.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Bug not fixed

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 reopen 318526
Bug#318526: FTBFS: Declaration with no type
Bug reopened, originator not changed.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#317098: kmail: Kmail segfaults : gdb backtrace

2005-07-19 Thread Sebastien Couret
Package: kmail
Version: 4:3.3.2-3
Followup-For: Bug #317098


Hi All,
As already reported in Bug#317098 , kmail is segfaulting since a recent
apt upgrade.
Here's a gdb backtrace obtained on kmail :

Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread -1244858304 (LWP 5358)]
0xb758d95b in QString::QString () from /usr/lib/libqt-mt.so.3
(gdb) bt
#0  0xb758d95b in QString::QString () from /usr/lib/libqt-mt.so.3
#1  0xb6aaeea5 in KPIM::Identity::Identity ()
  from /usr/lib/libkpimidentities.so.1
#2  0xb6ab21d2 in KPIM::IdentityManager::functions ()
  from /usr/lib/libkpimidentities.so.1
#3  0xb6ab22eb in KPIM::IdentityManager::functions ()
  from /usr/lib/libkpimidentities.so.1
#4  0xb6ab5965 in QMemArraychar::detach ()
  from /usr/lib/libkpimidentities.so.1
#5  0xb6aa7c85 in _init () from
 /usr/lib/libkpimidentities.so.1
#6  0xb7ff61ce in _dl_catch_error () from /lib/ld-linux.so.2
#7  0xb7ff62ba in _dl_init () from /lib/ld-linux.so.2
#8  0xb7feac5d in ?? () from /lib/ld-linux.so.2
(gdb) 

Hope this helps.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.11
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages kmail depends on:
ii  kdelibs4  4:3.3.2-7  KDE core libraries
ii  libc6 2.3.2.ds1-22   GNU C Library: Shared libraries an
ii  libgcc1   1:4.0.1-2  GCC support library
ii  libice6   6.8.2.dfsg.1-3 Inter-Client Exchange library
ii  libkcal2a 4:3.3.2-3  KDE calendaring library
ii  libkdenetwork24:3.3.2-3  KDE Network library
ii  libkdepim14:3.3.2-3  KDE PIM library
ii  libkleopatra0a4:3.3.2-3  KDE GnuPG interface libraries
ii  libkpimidentities14:3.3.2-3  KDE PIM user identity information 
ii  libksieve04:3.3.2-3  KDE mail/news message filtering li
ii  libmimelib1a  4:3.3.2-3  KDE mime library
ii  libpng12-01.2.8rel-1 PNG library - runtime
ii  libqt3c102-mt 3:3.3.4-3  Qt GUI Library (Threaded runtime v
ii  libsm66.8.2.dfsg.1-3 X Window System Session Management
ii  libstdc++51:3.3.6-7  The GNU Standard C++ Library v3
ii  libx11-6  6.8.2.dfsg.1-3 X Window System protocol client li
ii  libxext6  6.8.2.dfsg.1-3 X Window System miscellaneous exte
ii  perl  5.8.7-4Larry Wall's Practical Extraction 
ii  xlibs 6.8.2.dfsg.1-3 X Window System client libraries m
ii  zlib1g1:1.2.2-9  compression library - runtime

Versions of packages kmail recommends:
ii  kdebase-kio-plugins   4:3.3.2-1  KDE I/O Slaves
ii  kdepim-kio-plugins4:3.3.2-3  KDE pim I/O Slaves
ii  procmail  3.22-11Versatile e-mail processor

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#303779: marked as done (motor: FTBFS (amd64/gcc-4.0): cast from 'void*' to 'int' loses precision)

2005-07-19 Thread Debian Bug Tracking System
Your message dated Tue, 19 Jul 2005 05:47:27 -0400
with message-id [EMAIL PROTECTED]
and subject line Bug#303779: fixed in motor 2:3.4.0-4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 8 Apr 2005 18:47:23 +
From [EMAIL PROTECTED] Fri Apr 08 11:47:23 2005
Return-path: [EMAIL PROTECTED]
Received: from c203154.adsl.hansenet.de (localhost.localdomain) 
[213.39.203.154] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DJyVm-000128-00; Fri, 08 Apr 2005 11:47:22 -0700
Received: from aj by localhost.localdomain with local (Exim 4.50)
id 1DJyVj-0003Kh-B0; Fri, 08 Apr 2005 20:47:19 +0200
To: Debian Bug Tracking System [EMAIL PROTECTED]
From: Andreas Jochens [EMAIL PROTECTED]
Subject: motor: FTBFS (amd64/gcc-4.0): cast from 'void*' to 'int' loses 
precision
Message-Id: [EMAIL PROTECTED]
Date: Fri, 08 Apr 2005 20:47:19 +0200
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: motor
Version: 2:3.4.0-2
Severity: normal
Tags: patch

When building 'motor' on amd64/unstable with gcc-4.0,
I get the following error:

c++ -DHAVE_CONFIG_H -I. -I. -I.. -g -O2 -c kkstrtext.cc
kkstrtext.cc: In function 'int intcompare(void*, void*)':
kkstrtext.cc:434: error: cast from 'void*' to 'int' loses precision
kkstrtext.cc:434: error: cast from 'void*' to 'int' loses precision
make[3]: *** [kkstrtext.o] Error 1
make[3]: Leaving directory `/motor-3.4.0/kkstrtext'

The attached patch fixes these errors.

Please also remove 

'libstdc++5-dev ( 3.2.3) | libstdc++5-3.3-dev | libstdc++6-dev'

from the Build-Depends in debian/control because it is not necessary
anymore and it may confuse autobuilders.


Regards
Andreas Jochens

diff -urN ../tmp-orig/motor-3.4.0/debian/control ./debian/control
--- ../tmp-orig/motor-3.4.0/debian/control  2005-04-08 20:30:30.878851779 
+0200
+++ ./debian/control2005-04-08 20:29:06.186098884 +0200
@@ -3,7 +3,6 @@
 Priority: optional
 Maintainer: Krzysztof Krzyzaniak (eloy) [EMAIL PROTECTED]
-Build-Conflicts: libstdc++5-dev (= 3.2.3)
-Build-Depends: debhelper (= 4.1.37), dpatch, libgpmg1-dev, libncurses5-dev | 
libncurses-dev, gettext, libfribidi-dev (= 0.10.4-4), libstdc++5-dev ( 
3.2.3) | libstdc++5-3.3-dev | libstdc++6-dev
+Build-Depends: debhelper (= 4.1.37), dpatch, libgpmg1-dev, libncurses5-dev | 
libncurses-dev, gettext, libfribidi-dev (= 0.10.4-4)
 Standards-Version: 3.6.1.0
 
 Package: motor-common
diff -urN ../tmp-orig/motor-3.4.0/kkconsui/src/texteditor.cc 
./kkconsui/src/texteditor.cc
--- ../tmp-orig/motor-3.4.0/kkconsui/src/texteditor.cc  2003-09-09 
23:51:33.0 +0200
+++ ./kkconsui/src/texteditor.cc2005-04-08 20:30:03.690067218 +0200
@@ -1940,7 +1940,7 @@
 }
 
 int texteditor::findint(void *p1, void *p2) {
-return *(int *) p1 != (int) p2;
+return *(int *) p1 != (long) p2;
 }
 
 int texteditor::findhighline(void *p1, void *p2) {
diff -urN ../tmp-orig/motor-3.4.0/kkstrtext/kkstrtext.cc 
./kkstrtext/kkstrtext.cc
--- ../tmp-orig/motor-3.4.0/kkstrtext/kkstrtext.cc  2005-02-01 
01:13:24.0 +0100
+++ ./kkstrtext/kkstrtext.cc2005-04-08 20:30:03.691067026 +0200
@@ -431,7 +431,7 @@
 }
 
 int intcompare(void *s1, void *s2) {
-return (int) s1 != (int) s2;
+return s1 != s2;
 }
 
 string i2str(int i) {
diff -urN ../tmp-orig/motor-3.4.0/src/ui/ncurses/ncursesui.cc 
./src/ui/ncurses/ncursesui.cc
--- ../tmp-orig/motor-3.4.0/src/ui/ncurses/ncursesui.cc 2004-11-14 
22:04:08.0 +0100
+++ ./src/ui/ncurses/ncursesui.cc   2005-04-08 20:30:03.691067026 +0200
@@ -1242,7 +1242,7 @@
populatesettingstree(*db.gettree());
 if(fin = !db.open(n, b, p)) break;
 
-switch((int) p) {
+switch((long) p) {
 case 10:
if(input(motorui::text, buf = project.getversion(),
_(version: )) == motorui::yes) {
@@ -1356,7 +1356,8 @@
 vectorshitpair treeshit;
 
 void ncursesui::populatecontentstree(treeview tree, motorproject mp, 
projeditaction pea, bool setcurrent) {
-int foldid, id, cfid = -1, i, sid;
+int foldid, id, cfid = -1, i;
+long sid;
 vectormotorfolder::iterator ifold;
 vectormotorfile::iterator ifile;
 static vectorstring cnodes;
@@ -1368,7 +1369,7 @@
  

Bug#318892: Patch to make /var/cache handling more robust

2005-07-19 Thread Marc Haber
tags #318893 moreinfo patch
thanks

Can you please try the attached patch? This allows the contents of
/var/cache/torrus to be deleted, but does not handle the directory
vanishing as it would require escalated privileges to re-create.

Greetings
Marc

-- 
-
Marc Haber | I don't trust Computers. They | Mailadresse im Header
Mannheim, Germany  |  lose things.Winona Ryder | Fon: *49 621 72739834
Nordisch by Nature |  How to make an American Quilt | Fax: *49 621 72739835
Index: perllib/Torrus/Renderer.pm
===
RCS file: /cvsroot/torrus/src/perllib/Torrus/Renderer.pm,v
retrieving revision 1.6
diff -u -r1.6 Renderer.pm
--- perllib/Torrus/Renderer.pm  9 Mar 2005 10:01:14 -   1.6
+++ perllib/Torrus/Renderer.pm  19 Jul 2005 09:50:42 -
@@ -118,22 +118,23 @@
 ($t_render, $t_expires, $filename, $mime_type) =
 $self-getCache( $cachekey );
 
-if( defined( $filename ) )
-{
-if( $t_expires = time() )
-{
-return ($Torrus::Global::cacheDir.'/'.$filename,
-$mime_type, $t_expires - time());
-}
-# Else reuse the old filename
-}
-else
+my $not_in_cache = 0;
+
+if( not defined( $filename ) )
 {
 $filename = Torrus::Renderer::newCacheFileName( $cachekey );
+$not_in_cache = 1;
 }
 
 my $cachefile = $Torrus::Global::cacheDir.'/'.$filename;
 
+if( ( not $not_in_cache ) and
+-f $cachefile and
+$t_expires = time() )
+{
+return ($cachefile, $mime_type, $t_expires - time());
+}
+
 my $method = 'render_' . $config_tree-getParam($view, 'view-type');
 
 ($t_expires, $mime_type) =


Bug#318526: marked as done (FTBFS: Declaration with no type)

2005-07-19 Thread Debian Bug Tracking System
Your message dated Tue, 19 Jul 2005 06:02:04 -0400
with message-id [EMAIL PROTECTED]
and subject line Bug#318526: fixed in atom4 4.1-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 16 Jul 2005 01:40:08 +
From [EMAIL PROTECTED] Fri Jul 15 18:40:08 2005
Return-path: [EMAIL PROTECTED]
Received: from zoot.lafn.org [206.117.18.6] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1Dtbex-0004We-00; Fri, 15 Jul 2005 18:40:08 -0700
Received: from localhost.localdomain 
(pool-71-104-165-253.lsanca.dsl-w.verizon.net [71.104.165.253])
(authenticated bits=0)
by zoot.lafn.org (8.13.1/8.13.1) with ESMTP id j6G1e6Oc023445
(version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO)
for [EMAIL PROTECTED]; Fri, 15 Jul 2005 18:40:07 -0700 (PDT)
(envelope-from [EMAIL PROTECTED])
Received: from kraai by localhost.localdomain with local (Exim 4.50)
id 1DtRgv-q2-00
for [EMAIL PROTECTED]; Fri, 15 Jul 2005 08:01:30 -0700
Date: Fri, 15 Jul 2005 08:01:28 -0700
From: Matt Kraai [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: FTBFS: Declaration with no type
Message-ID: [EMAIL PROTECTED]
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol=application/pgp-signature; boundary=pvezYHf7grwyp3Bc
Content-Disposition: inline
User-Agent: Mutt/1.5.9i
X-Virus-Scanned: ClamAV version 0.85.1, clamav-milter version 0.85 on 
zoot.lafn.org
X-Virus-Status: Clean
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no 
version=2.60-bugs.debian.org_2005_01_02


--pvezYHf7grwyp3Bc
Content-Type: multipart/mixed; boundary=UugvWAfsgieZRqgk
Content-Disposition: inline


--UugvWAfsgieZRqgk
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: atom4
Version: 4.1-1
Severity: serious

atom4 fails to build from source because it declares server with no
type:

g++ -pedantic -DDATADIR=3D\/usr/share/games/atom4\ -O2 -Iinclude -Iprogli=
b/include -c net/server.cc -o net/server.o
net/server.h:31: error: ISO C++ forbids declaration of 'server' with no type
net/server.h:31: error: expected ';' before '*' token
net/server.h:78: error: expected `)' before '*' token
net/server.cc: In member function 'void clientconn::p_requ()':
net/server.cc:69: error: 'serv' was not declared in this scope
net/server.cc: In member function 'void clientconn::p_move()':
net/server.cc:84: error: 'serv' was not declared in this scope
net/server.cc: In member function 'void clientconn::p_play()':
net/server.cc:126: error: 'serv' was not declared in this scope
net/server.cc: In member function 'void clientconn::p_who()':
net/server.cc:147: error: 'serv' was not declared in this scope
net/server.cc: In member function 'void clientconn::enter_connected_state()=
':
net/server.cc:212: error: 'serv' was not declared in this scope
net/server.cc: In member function 'virtual void clientconn::disconnected()':
net/server.cc:263: error: 'serv' was not declared in this scope
net/server.cc: At global scope:
net/server.cc:268: error: prototype for 'clientconn::clientconn(server*, in=
t, int, char*, eventloop*, int)' does not match any in class 'clientconn'
net/server.h:28: error: candidates are: clientconn::clientconn(const client=
conn)
net/server.h:28: error: clientconn::clientconn()
net/server.cc: In constructor 'clientconn::clientconn(server*, int, int, ch=
ar*, eventloop*, int)':
net/server.cc:269: error: class 'clientconn' does not have any field named =
'serv'
net/server.cc: In member function 'int server::new_client()':
net/server.cc:437: error: no matching function for call to 'clientconn::cli=
entconn(server* const, int, int, char*, eventloop*, int)'
net/server.h:28: note: candidates are: clientconn::clientconn()
net/server.h:28: note: clientconn::clientconn(const clientc=
onn)cons: *** [net/server.o] Error 1
cons: errors constructing net/server.o
make: *** [install] Error 2

The attached patch fixes this problem by predeclaring server as a
class.

--=20
Matt

--UugvWAfsgieZRqgk
Content-Type: text/plain; charset=us-ascii
Content-Disposition: attachment; filename=atom4_4.1-1.patch
Content-Transfer-Encoding: quoted-printable

only in patch2:
unchanged:
--- 

Bug#318959: libc6: varying behaviour with different compiler/optimization combinations

2005-07-19 Thread giuseppe bonacci
Package: libc6
Version: 2.3.2.ds1-22
Followup-For: Bug #318959


Actually there is something wrong even without volatile:

/* file: ki.c */
#include stdio.h
#include math.h

extern long int lround(double x);

int main()
{
double b;
long int i;
b = 1.04866e+6;
i = lround(b);
printf(%e %ld %ld\n, b, lround(b), i);
return 0;
}

try running the following bash script:

for c in 3.3 3.4 4.0; do
for o in 0 1 2 3 ; do
printf gcc-%s -O%s\t $c $o;
gcc-$c -W -Wall -O$o  -std=c99 ki.c -lm;
./a.out;
done;
done

on my debian (stable, uniprocessor), the results are... mysterious:

gcc-3.3 -O0 1.048660e+06 -2146434988 -2146434988
gcc-3.3 -O1 1.048660e+06 -2146434988 -2146434988
gcc-3.3 -O2 1.048660e+06 -2146434988 -2146434988
gcc-3.3 -O3 1.048660e+06 -2146434988 -2146434988
gcc-3.4 -O0 1.048660e+06 -2146434988 -2146434988
gcc-3.4 -O1 1.048660e+06 -2146434988 -2146434988
gcc-3.4 -O2 1.048660e+06 -2146434988 -2146434988
gcc-3.4 -O3 1.048660e+06 -2146434988 -2146434988
gcc-4.0 -O0 1.048660e+06 -2146434988 -2146434988
gcc-4.0 -O1 1.048660e+06 1048660 1048660
gcc-4.0 -O2 1.048660e+06 1048660 1048660
gcc-4.0 -O3 1.048660e+06 1048660 1048660

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.8-2-686-smp
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages libc6 depends on:
ii  libdb1-compat 2.1.3-7The Berkeley database routines [gl

libc6 recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Fwd: Reopening libvgahw.a bugs.

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 found 318405 6.8.2.dfsg.1-3
Bug#318405: xserver-xorg sets wrong palete on switching to console.
Bug#318218: xserver-xorg: libvgahw.a is miscompiled by gcc-4
Bug#318231: Console gets garbled when starting X
Bug#318271: xserver-xorg: [trident] works only with dbg version
Bug marked as found in version 6.8.2.dfsg.1-3.

 merge 319003 318218
Bug#318218: xserver-xorg: libvgahw.a is miscompiled by gcc-4
Bug#319003: xserver-xorg: Trident and -3: libvgahw is still broken
Mismatch - only Bugs in same state can be merged:
Values for `done mark' don't match:
 #318218 has `done';
 #319003 has `open'

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Patch to make /var/cache handling more robust

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags #318893 - moreinfo patch
Bug#318893: libparagui1.0: wrong library name
Tags were: patch moreinfo
Tags removed: moreinfo, patch

 tags #318892 moreinfo patch
Bug#318892: torrus-common - fails if /var/cache is cleared
Tags were: upstream confirmed
Tags added: moreinfo, patch

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#318893: Patch to make /var/cache handling more robust

2005-07-19 Thread Marc Haber
tags #318893 - moreinfo patch
tags #318892 moreinfo patch
thanks

goof with the bug number. Sorry.

Greetings
Marc

-- 
-
Marc Haber | I don't trust Computers. They | Mailadresse im Header
Mannheim, Germany  |  lose things.Winona Ryder | Fon: *49 621 72739834
Nordisch by Nature |  How to make an American Quilt | Fax: *49 621 72739835


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#318796: gq: backtraces

2005-07-19 Thread juan
Package: gq
Followup-For: Bug #318796


with a working cfg file (.gq)

Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 16384 (LWP 6231)]
tokenize (list=0x0, keyword=0x80d49f8 Begins with) at util.c:845
845  for(i = 0; list[i].keyword  strlen(list[i].keyword); i++)
(gdb) bt
#0  tokenize (list=0x0, keyword=0x80d49f8 Begins with) at util.c:845
#1  0x08081a43 in search_argumentE (ctx=0xb5bc, e=0x80d49d0) at 
gq-xml.c:286
#2  0x0808315a in endElementH (ctx=0xb5bc, name=0x80d4428 
search-argument) at xmlparse.c:248
#3  0x44b80291 in xmlSkipBlankChars () from /usr/lib/libxml2.so.2
#4  0x44b8b5ba in xmlParseElement () from /usr/lib/libxml2.so.2
#5  0x44b89c64 in xmlParseContent () from /usr/lib/libxml2.so.2
#6  0x44b8b3e7 in xmlParseElement () from /usr/lib/libxml2.so.2
#7  0x44b8bb39 in xmlParseDocument () from /usr/lib/libxml2.so.2
#8  0x08083411 in XMLparse (tags=0x0, handler=0x80d12c8, user_data=0x0, 
file=0x80d0e00 /export/home/jon/.gq)
at xmlparse.c:347
#9  0x0808299a in process_rcfile_XML (error_context=0, 
filename=0x80d0e00 /export/home/jon/.gq) at gq-xml.c:1185
#10 0x080683e0 in load_config () at configfile.c:374
#11 0x08068494 in init_config () at configfile.c:871
#12 0x08060ee5 in main (argc=1, argv=0xb8c4) at gq.c:124



when creating a new server 

#0  0x08069782 in create_edit_server_window (server=0x827a858, 
modalFor=0x81e78e0) at prefs.c:829
#1  0x414c52a6 in g_cclosure_marshal_VOID__VOID () from 
/usr/lib/libgobject-2.0.so.0
#2  0x414b3736 in g_closure_invoke () from /usr/lib/libgobject-2.0.so.0
#3  0x414c4dcf in g_signal_emit_by_name () from /usr/lib/libgobject-2.0.so.0
#4  0x414c3e9c in g_signal_emit_valist () from /usr/lib/libgobject-2.0.so.0
#5  0x414c4126 in g_signal_emit () from /usr/lib/libgobject-2.0.so.0
#6  0x44863af5 in gtk_button_clicked () from /usr/lib/libgtk-x11-2.0.so.0
#7  0x4486497a in _gtk_button_paint () from /usr/lib/libgtk-x11-2.0.so.0
#8  0x414c52a6 in g_cclosure_marshal_VOID__VOID () from 
/usr/lib/libgobject-2.0.so.0
#9  0x414b39c9 in g_cclosure_new_swap () from /usr/lib/libgobject-2.0.so.0
#10 0x414b3736 in g_closure_invoke () from /usr/lib/libgobject-2.0.so.0
#11 0x414c4651 in g_signal_emit_by_name () from /usr/lib/libgobject-2.0.so.0
#12 0x414c3e9c in g_signal_emit_valist () from /usr/lib/libgobject-2.0.so.0
#13 0x414c4126 in g_signal_emit () from /usr/lib/libgobject-2.0.so.0
#14 0x44863a65 in gtk_button_released () from /usr/lib/libgtk-x11-2.0.so.0
#15 0x44864823 in _gtk_button_paint () from /usr/lib/libgtk-x11-2.0.so.0
#16 0x4492a47e in _gtk_marshal_BOOLEAN__BOXED () from 
/usr/lib/libgtk-x11-2.0.so.0
#17 0x414b39c9 in g_cclosure_new_swap () from /usr/lib/libgobject-2.0.so.0
#18 0x414b3736 in g_closure_invoke () from /usr/lib/libgobject-2.0.so.0
#19 0x414c4855 in g_signal_emit_by_name () from /usr/lib/libgobject-2.0.so.0
#20 0x414c3c8c in g_signal_emit_valist () from /usr/lib/libgobject-2.0.so.0
#21 0x414c4126 in g_signal_emit () from /usr/lib/libgobject-2.0.so.0
#22 0x44a19cf7 in gtk_widget_send_expose () from 
/usr/lib/libgtk-x11-2.0.so.0
#23 0x44928f92 in gtk_propagate_event () from /usr/lib/libgtk-x11-2.0.so.0
#24 0x44927de6 in gtk_main_do_event () from /usr/lib/libgtk-x11-2.0.so.0
#25 0x447bb8e5 in _gdk_events_queue () from /usr/lib/libgdk-x11-2.0.so.0
#26 0x41f7d5c2 in g_main_depth () from /usr/lib/libglib-2.0.so.0
#27 0x41f7e638 in g_main_context_dispatch () from /usr/lib/libglib-2.0.so.0
#28 0x41f7e970 in g_main_context_dispatch () from /usr/lib/libglib-2.0.so.0
#29 0x41f7ef13 in g_main_loop_run () from /usr/lib/libglib-2.0.so.0
#30 0x44927693 in gtk_main () from /usr/lib/libgtk-x11-2.0.so.0
#31 0x08060f6a in main (argc=1, argv=0xb8c4) at gq.c:158


-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.4.30-vs1.2.10
Locale: LANG=C, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#318970: marked as done (Integer overflow in libgadu)

2005-07-19 Thread Debian Bug Tracking System
Your message dated Tue, 19 Jul 2005 07:02:10 -0400
with message-id [EMAIL PROTECTED]
and subject line Bug#318970: fixed in ekg 1:1.5+20050718+1.6rc3-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 18 Jul 2005 22:56:06 +
From [EMAIL PROTECTED] Mon Jul 18 15:56:06 2005
Return-path: [EMAIL PROTECTED]
Received: from starnet.skynet.com.pl (skynet.skynet.com.pl) [213.25.173.230] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1DueWs-00065q-00; Mon, 18 Jul 2005 15:56:06 -0700
Received: from gw4.bielsko.msk.pl ([81.219.223.245] helo=localhost)
by skynet.skynet.com.pl with asmtp (Exim 3.35 #1 (Debian))
id 1DueWk-0006vE-00
for [EMAIL PROTECTED]; Tue, 19 Jul 2005 00:55:58 +0200
Received: from porridge by localhost with local (Exim 4.52)
id 1DueWn-00078D-PI
for [EMAIL PROTECTED]; Tue, 19 Jul 2005 00:56:01 +0200
Date: Tue, 19 Jul 2005 00:56:01 +0200
From: Marcin Owsiany [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Integer overflow in libgadu
Message-ID: [EMAIL PROTECTED]
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.9i
X-Scanner: exiscan *1DueWk-0006vE-00*/PQlzAnd4xk*
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
RCVD_IN_SBLXBL,RCVD_IN_SBLXBL_CBL autolearn=no 
version=2.60-bugs.debian.org_2005_01_02

Package: ekg
Version: 1.5+20050411-4
Severity: grave
Tags: pending, security

This is potentially a remote arbitrary code execution

http://cvs.toxygen.net/ekg/lib/libgadu.c.diff?r1=1.147r2=1.148f=u
http://cvs.toxygen.net/ekg/lib/events.c.diff?r1=1.95r2=1.96f=u

This is also present in versions in testing/sid (including 
1.5+20050712+1.6rc2-1)

It is fixed upstream in 1.6rc3

I will prepare uploads now.

Marcin
-- 
Marcin Owsiany [EMAIL PROTECTED] http://marcin.owsiany.pl/
GnuPG: 1024D/60F41216  FE67 DA2D 0ACA FC5E 3F75  D6F6 3A0D 8AA0 60F4 1216

---
Received: (at 318970-close) by bugs.debian.org; 19 Jul 2005 11:14:40 +
From [EMAIL PROTECTED] Tue Jul 19 04:14:40 2005
Return-path: [EMAIL PROTECTED]
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1Duq3c-0004Bo-00; Tue, 19 Jul 2005 04:14:40 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1DuprW-0004hZ-00; Tue, 19 Jul 2005 07:02:10 -0400
From: Marcin Owsiany [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#318970: fixed in ekg 1:1.5+20050718+1.6rc3-1
Message-Id: [EMAIL PROTECTED]
Sender: Archive Administrator [EMAIL PROTECTED]
Date: Tue, 19 Jul 2005 07:02:10 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: ekg
Source-Version: 1:1.5+20050718+1.6rc3-1

We believe that the bug you reported is fixed in the latest version of
ekg, which is due to be installed in the Debian FTP archive:

ekg_1.5+20050718+1.6rc3-1.diff.gz
  to pool/main/e/ekg/ekg_1.5+20050718+1.6rc3-1.diff.gz
ekg_1.5+20050718+1.6rc3-1.dsc
  to pool/main/e/ekg/ekg_1.5+20050718+1.6rc3-1.dsc
ekg_1.5+20050718+1.6rc3-1_i386.deb
  to pool/main/e/ekg/ekg_1.5+20050718+1.6rc3-1_i386.deb
ekg_1.5+20050718+1.6rc3.orig.tar.gz
  to pool/main/e/ekg/ekg_1.5+20050718+1.6rc3.orig.tar.gz
libgadu-dev_1.5+20050718+1.6rc3-1_i386.deb
  to pool/main/e/ekg/libgadu-dev_1.5+20050718+1.6rc3-1_i386.deb
libgadu3_1.5+20050718+1.6rc3-1_i386.deb
  to pool/main/e/ekg/libgadu3_1.5+20050718+1.6rc3-1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Marcin Owsiany [EMAIL PROTECTED] (supplier of updated ekg package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please 

Bug#260797: marked as done (opensp: FTBFS with gcc-3.4: `wideCharMax' undeclared (first use this function))

2005-07-19 Thread Debian Bug Tracking System
Your message dated Tue, 19 Jul 2005 07:02:34 -0400
with message-id [EMAIL PROTECTED]
and subject line Bug#260797: fixed in opensp 1.5.1.0-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 22 Jul 2004 09:33:54 +
From [EMAIL PROTECTED] Thu Jul 22 02:33:54 2004
Return-path: [EMAIL PROTECTED]
Received: from c214235.adsl.hansenet.de (localhost) [213.39.214.235] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1BnZxX-0003At-00; Thu, 22 Jul 2004 02:33:51 -0700
Received: from aj by localhost with local (Exim 4.34)
id 1BnZxU-000358-Bi; Thu, 22 Jul 2004 11:33:48 +0200
To: Debian Bug Tracking System [EMAIL PROTECTED]
From: Andreas Jochens [EMAIL PROTECTED]
Subject: opensp: FTBFS with gcc-3.4: `wideCharMax' undeclared (first use this 
function)
Message-Id: [EMAIL PROTECTED]
Date: Thu, 22 Jul 2004 11:33:48 +0200
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: opensp
Severity: normal
Tags: patch

When building 'opensp' with gcc-3.4 I get the following error:

../include/RangeMap.cxx: In member function `unsigned int 
OpenSP::RangeMapFrom, To::inverseMap(To, From, 
OpenSP::ISetOpenSP::WideChar, OpenSP::WideChar) const':
../include/RangeMap.cxx:50: error: `wideCharMax' undeclared (first use this 
function)
../include/RangeMap.cxx:50: error: (Each undeclared identifier is reported only 
once for each function it appears in.)
In file included from ../include/UnivCharsetDesc.h:16,
 from ../include/CharsetInfo.h:11,
 from ../include/Sd.h:13,
 from ../include/Event.h:20,
 from ../include/ArcEngine.h:11,
 from ArcEngine.cxx:10:
../include/constant.h: At global scope:
../include/constant.h:16: error: `const OpenSP::WideChar OpenSP::wideCharMax' 
used prior to declaration
make[4]: *** [ArcEngine.lo] Error 1
make[4]: Leaving directory `/opensp-1.5.1.0/lib'
make[3]: *** [all] Error 2
make[3]: Leaving directory `/opensp-1.5.1.0/lib'
make[2]: *** [all-recursive] Error 1
make[2]: Leaving directory `/opensp-1.5.1.0'
make[1]: *** [all] Error 2
make[1]: Leaving directory `/opensp-1.5.1.0'
make: *** [build-stamp] Error 2

With the attached patch 'opensp' can be compiled using gcc-3.4.

Regards
Andreas Jochens

diff -urN ../tmp-orig/opensp-1.5.1.0/include/RangeMap.cxx ./include/RangeMap.cxx
--- ../tmp-orig/opensp-1.5.1.0/include/RangeMap.cxx 2000-02-25 
17:55:21.0 +0100
+++ ./include/RangeMap.cxx  2004-07-22 11:08:13.556726757 +0200
@@ -7,6 +7,7 @@
 #include RangeMap.h
 #include ISet.h
 #include types.h
+#include constant.h
 
 #ifdef SP_NAMESPACE
 namespace SP_NAMESPACE {

---
Received: (at 260797-close) by bugs.debian.org; 19 Jul 2005 11:08:04 +
From [EMAIL PROTECTED] Tue Jul 19 04:08:04 2005
Return-path: [EMAIL PROTECTED]
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1DupxE-0002j2-00; Tue, 19 Jul 2005 04:08:04 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1Dupru-0004t9-00; Tue, 19 Jul 2005 07:02:34 -0400
From: Neil Roeth [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#260797: fixed in opensp 1.5.1.0-3
Message-Id: [EMAIL PROTECTED]
Sender: Archive Administrator [EMAIL PROTECTED]
Date: Tue, 19 Jul 2005 07:02:34 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: opensp
Source-Version: 1.5.1.0-3

We believe that the bug you reported is fixed in the latest version of
opensp, which is due to be installed in the Debian FTP archive:

libosp-dev_1.5.1.0-3_i386.deb
  to pool/main/o/opensp/libosp-dev_1.5.1.0-3_i386.deb
libosp4c2_1.5.1.0-3_i386.deb
  to pool/main/o/opensp/libosp4c2_1.5.1.0-3_i386.deb
opensp_1.5.1.0-3.diff.gz
  to pool/main/o/opensp/opensp_1.5.1.0-3.diff.gz
opensp_1.5.1.0-3.dsc
  to pool/main/o/opensp/opensp_1.5.1.0-3.dsc
opensp_1.5.1.0-3_i386.deb
  to 

Bug#319031: Crash on File-Open...

2005-07-19 Thread Max Alekseyev

Package: kino
Version: 0.76-2
Severity: grave
Justification: renders package unusable

Run kino, click File-Open..., kino crashes.

Backtrace:

Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 46912583339152 (LWP 12836)]
0x2e18ac00 in strlen () from /lib/libc.so.6
(gdb) bt
#0  0x2e18ac00 in strlen () from /lib/libc.so.6
#1  0x2d24eea2 in g_strdup () from /usr/lib/libglib-2.0.so.0
#2  0x2c753292 in g_value_array_sort_with_data ()
   from /usr/lib/libgobject-2.0.so.0
#3  0x2c7399c1 in g_object_new_valist ()
   from /usr/lib/libgobject-2.0.so.0
#4  0x2c739193 in g_object_new () from /usr/lib/libgobject-2.0.so.0
#5  0x2bc74ad9 in gtk_button_new_from_stock ()
   from /usr/lib/libgtk-x11-2.0.so.0
#6  0x2bcb5b66 in gtk_dialog_add_button ()
   from /usr/lib/libgtk-x11-2.0.so.0
#7  0x2bcce361 in gtk_file_chooser_dialog_get_type ()
   from /usr/lib/libgtk-x11-2.0.so.0
#8  0x2bcce435 in gtk_file_chooser_dialog_new ()
   from /usr/lib/libgtk-x11-2.0.so.0
#9  0x00479576 in KinoCommon::getFileToOpen ()
#10 0x0047fcbe in KinoCommon::loadFile ()
#11 0x00439df9 in on_open_activate ()
#12 0x2c746d22 in g_cclosure_marshal_VOID__VOID ()
   from /usr/lib/libgobject-2.0.so.0
#13 0x2c737056 in g_closure_invoke () from /usr/lib/libgobject-2.0.so.0
#14 0x2c7468ce in g_signal_emit_by_name ()
   from /usr/lib/libgobject-2.0.so.0
#15 0x2c745906 in g_signal_emit_valist ()
   from /usr/lib/libgobject-2.0.so.0
#16 0x2c745bd3 in g_signal_emit () from /usr/lib/libgobject-2.0.so.0
#17 0x2bc74c1c in gtk_button_clicked ()
   from /usr/lib/libgtk-x11-2.0.so.0
#18 0x2bc75836 in _gtk_button_paint ()
   from /usr/lib/libgtk-x11-2.0.so.0
#19 0x2c746d22 in g_cclosure_marshal_VOID__VOID ()
   from /usr/lib/libgobject-2.0.so.0
#20 0x2c7372d0 in g_cclosure_new_swap ()
   from /usr/lib/libgobject-2.0.so.0
#21 0x2c737056 in g_closure_invoke () from /usr/lib/libgobject-2.0.so.0
#22 0x2c746182 in g_signal_emit_by_name ()
   from /usr/lib/libgobject-2.0.so.0
#23 0x2c745906 in g_signal_emit_valist ()
   from /usr/lib/libgobject-2.0.so.0
#24 0x2c745bd3 in g_signal_emit () from /usr/lib/libgobject-2.0.so.0
#25 0x2bc74bbc in gtk_button_released ()
   from /usr/lib/libgtk-x11-2.0.so.0
#26 0x2bc756f9 in _gtk_button_paint ()
   from /usr/lib/libgtk-x11-2.0.so.0
#27 0x2bd1d593 in _gtk_marshal_BOOLEAN__BOXED ()
   from /usr/lib/libgtk-x11-2.0.so.0
#28 0x2c7372d0 in g_cclosure_new_swap ()
   from /usr/lib/libgobject-2.0.so.0
#29 0x2c737056 in g_closure_invoke () from /usr/lib/libgobject-2.0.so.0
#30 0x2c74637a in g_signal_emit_by_name ()
   from /usr/lib/libgobject-2.0.so.0
#31 0x2c745713 in g_signal_emit_valist ()
   from /usr/lib/libgobject-2.0.so.0
#32 0x2c745bd3 in g_signal_emit () from /usr/lib/libgobject-2.0.so.0
#33 0x2bdec626 in gtk_widget_send_expose ()
   from /usr/lib/libgtk-x11-2.0.so.0
#34 0x2bd1c0e5 in gtk_propagate_event ()
   from /usr/lib/libgtk-x11-2.0.so.0
#35 0x2bd1b2b2 in gtk_main_do_event ()
   from /usr/lib/libgtk-x11-2.0.so.0
#36 0x2c050c53 in _gdk_events_queue ()
   from /usr/lib/libgdk-x11-2.0.so.0
#37 0x2d23b94c in g_main_depth () from /usr/lib/libglib-2.0.so.0
#38 0x2d23c8e4 in g_main_context_dispatch ()
   from /usr/lib/libglib-2.0.so.0
#39 0x2d23cbee in g_main_context_dispatch ()
   from /usr/lib/libglib-2.0.so.0
#40 0x2d23d0d5 in g_main_loop_run () from /usr/lib/libglib-2.0.so.0
#41 0x2bd1ac81 in gtk_main () from /usr/lib/libgtk-x11-2.0.so.0
---Type return to continue, or q return to quit---
#42 0x00439ae8 in main ()


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12.2.64
Locale: LANG=ru_RU.KOI8-R, LC_CTYPE=ru_RU.KOI8-R (charmap=KOI8-R)

Versions of packages kino depends on:
ii  libart-2.0-2  2.3.17-1   Library of functions for 2D graphi
ii  libatk1.0-0   1.10.1-2   The ATK accessibility toolkit
ii  libavc1394-0  0.5.1-1control IEEE 1394 audio/video devi
ii  libbonobo2-0  2.10.0-1   Bonobo CORBA interfaces library
ii  libbonoboui2-02.10.0-1   The Bonobo UI library
ii  libc6 2.3.2.ds1-22   GNU C Library: Shared libraries an
ii  libdv40.103-2software library for DV format dig
ii  libgcc1   1:4.0.1-2  GCC support library
ii  libgconf2-4   2.10.1-1   GNOME configuration database syste
ii  libglade2-0   1:2.5.1-2  library to load .glade files at ru
ii  libglib2.0-0  2.6.5-1The GLib library of C routines
ii  libgnome2-0 

Processed: Fixed in NMU of freepops 0.0.31-1

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tag 316221 + fixed
Bug#316221: freepops: init script doesn't work with dash
Tags were: patch
Tags added: fixed

 quit
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#173082: marked as done (libnss-db_2.2-6.1(hppa/unstable): FTBFS: assumes __LT_SPINLOCK_INIT is int)

2005-07-19 Thread Debian Bug Tracking System
Your message dated Tue, 19 Jul 2005 08:32:34 -0400
with message-id [EMAIL PROTECTED]
and subject line Bug#173082: fixed in libnss-db 2.2.3pre1-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 14 Dec 2002 20:10:51 +
From [EMAIL PROTECTED] Sat Dec 14 14:10:51 2002
Return-path: [EMAIL PROTECTED]
Received: from atlrel6.hp.com [156.153.255.205] 
by master.debian.org with esmtp (Exim 3.12 1 (Debian))
id 18NIcc-0003fd-00; Sat, 14 Dec 2002 14:10:50 -0600
Received: from whatone.fc.hp.com (whatone.fc.hp.com [15.238.0.60])
by atlrel6.hp.com (Postfix) with ESMTP id 81F87A80
for [EMAIL PROTECTED]; Sat, 14 Dec 2002 15:10:50 -0500 (EST)
Received: by whatone.fc.hp.com (Postfix, from userid 1000)
id 456D11D4812; Sat, 14 Dec 2002 13:10:50 -0700 (MST)
Date: Sat, 14 Dec 2002 13:10:50 -0700
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: libnss-db_2.2-6.1(hppa/unstable): FTBFS: gcc 3.0 errors
Message-ID: [EMAIL PROTECTED]
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.3.25i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Status: No, hits=-8.4 required=5.0
tests=NO_REAL_NAME,QUOTED_EMAIL_TEXT,SPAM_PHRASE_00_01,
  USER_AGENT,USER_AGENT_MUTT
version=2.41
X-Spam-Level: 

Package: libnss-db
Version: 2.2-6.1
Severity: serious

There was an error while trying to autobuild your package:

Dies with gcc 3.0 errors, as below.

lamont

 Automatic build of libnss-db_2.2-6.1 on sarti by sbuild/hppa 1.169
 Build started at 20021211-0541

[...]

 ** Using build dependencies supplied by package:
 Build-Depends: libdb3-dev (= 3.2.9-16), debhelper, automake, autoconf2.13, 
 libtool

[...]

 checking host system type... hppa-unknown-linux-gnu
 updating cache ./config.cache
 creating ./config.status
 cd . \
CONFIG_FILES=Makefile CONFIG_HEADERS= /bin/sh ./config.status
 creating Makefile
 make[1]: Leaving directory `/build/buildd/libnss-db-2.2/build-tree/nss_db-2.2'
 make[1]: Entering directory 
 `/build/buildd/libnss-db-2.2/build-tree/nss_db-2.2'
 /bin/sh ./libtool --mode=compile gcc -DPACKAGE=\nss_db\ -DVERSION=\2.2\ 
 -DHAVE_DLFCN_H=1 -DHAVE_LIBDB3=1  -I. -I.  -D_GNU_SOURCE-g -O2 -c 
 db-alias.c
 gcc -DPACKAGE=\nss_db\ -DVERSION=\2.2\ -DHAVE_DLFCN_H=1 -DHAVE_LIBDB3=1 
 -I. -I. -D_GNU_SOURCE -g -O2 -c db-alias.c  -fPIC -DPIC -o db-alias.lo
 In file included from db-alias.c:29:
 libc-lock.h:29:5: { is not valid in #if expressions
 make[1]: *** [db-alias.lo] Error 1
 make[1]: Leaving directory `/build/buildd/libnss-db-2.2/build-tree/nss_db-2.2'
 make: *** [stampdir/build] Error 2

A full build log can be found at:
http://buildd.debian.org/build.php?arch=hppapkg=libnss-dbver=2.2-6.1


---
Received: (at 173082-close) by bugs.debian.org; 19 Jul 2005 12:41:51 +
From [EMAIL PROTECTED] Tue Jul 19 05:41:51 2005
Return-path: [EMAIL PROTECTED]
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1DurPz-0004kD-00; Tue, 19 Jul 2005 05:41:51 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1DurH0-Ta-00; Tue, 19 Jul 2005 08:32:34 -0400
From: Piotr Roszatycki [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#173082: fixed in libnss-db 2.2.3pre1-1
Message-Id: [EMAIL PROTECTED]
Sender: Archive Administrator [EMAIL PROTECTED]
Date: Tue, 19 Jul 2005 08:32:34 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 7

Source: libnss-db
Source-Version: 2.2.3pre1-1

We believe that the bug you reported is fixed in the latest version of
libnss-db, which is due to be installed in the Debian FTP archive:

libnss-db_2.2.3pre1-1.diff.gz
  to pool/main/libn/libnss-db/libnss-db_2.2.3pre1-1.diff.gz
libnss-db_2.2.3pre1-1.dsc
  to pool/main/libn/libnss-db/libnss-db_2.2.3pre1-1.dsc
libnss-db_2.2.3pre1-1_i386.deb
  to pool/main/libn/libnss-db/libnss-db_2.2.3pre1-1_i386.deb
libnss-db_2.2.3pre1.orig.tar.gz
  to pool/main/libn/libnss-db/libnss-db_2.2.3pre1.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.


Bug#165298: marked as done (FTBFS: Build failure of libnss-db on i386)

2005-07-19 Thread Debian Bug Tracking System
Your message dated Tue, 19 Jul 2005 08:32:34 -0400
with message-id [EMAIL PROTECTED]
and subject line Bug#165298: fixed in libnss-db 2.2.3pre1-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 18 Oct 2002 08:46:56 +
From [EMAIL PROTECTED] Fri Oct 18 03:46:56 2002
Return-path: [EMAIL PROTECTED]
Received: from mikilab.doshisha.ac.jp [202.23.156.50] 
by master.debian.org with esmtp (Exim 3.12 1 (Debian))
id 182SmV-74-00; Fri, 18 Oct 2002 03:46:55 -0500
Received: from atoron.work.isl.doshisha.ac.jp (localhost [127.0.0.1])
by mikilab.doshisha.ac.jp (8.9.3/3.7W) with SMTP id RAA25269
for [EMAIL PROTECTED]; Fri, 18 Oct 2002 17:46:24 +0900
X-Authentication-Warning: mikilab.doshisha.ac.jp: Host localhost [127.0.0.1] 
claimed to be atoron.work.isl.doshisha.ac.jp
Date: Fri, 18 Oct 2002 17:46:26 +0900
From: Junichi Uekawa [EMAIL PROTECTED]
To: submit bug tracking system [EMAIL PROTECTED]
Subject: FTBFS: Build failure of libnss-db on i386
Message-Id: [EMAIL PROTECTED]
Organization: Netfort project
X-Mailer: Sylpheed version 0.8.3 (GTK+ 1.2.10; i386-debian-linux-gnu)
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Delivered-To: [EMAIL PROTECTED]
X-Spam-Status: No, hits=-7.0 required=5.0
tests=NOSPAM_INC,SIGNATURE_SHORT_DENSE,SPAM_PHRASE_02_03,
  X_AUTH_WARNING
version=2.41
X-Spam-Level: 



Package: libnss-db
Version: 2.2-6
Severity: serious


libnss-db fails to build from source on i386, when doing a rebuild inside 
chroot.

I am filing this bug to notify you that I failed to build your
package from source in the current sid distribution.
It is a serious problem that your source does not 
build from source using the information provided in your control files,
and such a package should not be distributed in a stable Debian distribution.

This build was done using pbuilder package.


The build system is having problems with newer autoconf.

Build log follows:
===
touch stampdir/patch
cd build-tree/nss_db-2.2  libtoolize -c -f  autoconf
You should update your `aclocal.m4' by running aclocal.
configure.in:72: warning: AC_CANONICAL_HOST invoked multiple times
dh_testdir
cd build-tree/nss_db-2.2  CFLAGS=-O2 -Wall ./configure --prefix=/usr \
--build=i386-linux --host=i386-linux
checking for a BSD-compatible install... /usr/bin/install -c
checking whether build environment is sane... yes
checking whether make sets ${MAKE}... yes
checking for working aclocal... found
checking for working autoconf... found

  .
  .
  .

checking build system type... i386-pc-linux-gnu
checking host system type... i386-pc-linux-gnu
checking for i386-linux-ranlib... no
checking for ranlib... ranlib
checking for ld used by GCC... /usr/bin/ld
checking if the linker (/usr/bin/ld) is GNU ld... yes
checking for BSD-compatible nm... /usr/bin/nm -B
checking whether ln -s works... yes
loading cache /dev/null within ltconfig
ltconfig: you must specify a host type if you use `--no-verify'
Try `ltconfig --help' for more information.
configure: error: libtool configure failed
make: *** [stampdir/configure] Error 1
===


regards,
   junichi


-- 
[EMAIL PROTECTED]  http://www.netfort.gr.jp/~dancer




---
Received: (at 165298-close) by bugs.debian.org; 19 Jul 2005 12:41:49 +
From [EMAIL PROTECTED] Tue Jul 19 05:41:49 2005
Return-path: [EMAIL PROTECTED]
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1DurPx-0004jp-00; Tue, 19 Jul 2005 05:41:49 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1DurH0-TV-00; Tue, 19 Jul 2005 08:32:34 -0400
From: Piotr Roszatycki [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#165298: fixed in libnss-db 2.2.3pre1-1
Message-Id: [EMAIL PROTECTED]
Sender: Archive Administrator [EMAIL PROTECTED]
Date: Tue, 19 Jul 2005 08:32:34 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 5

Source: libnss-db
Source-Version: 2.2.3pre1-1

We 

Bug#306990: acknowledged by developer (fixed in 1.3.25-23)

2005-07-19 Thread John Goerzen
On Mon, Jul 18, 2005 at 03:18:16PM -0700, Debian Bug Tracking System wrote:
 Version: 1.3.25-23
 
 use that cool BTS versioning now to see bugs in not-unstable

Excuse me, but that says nothing about how the bug was fixed (or even if
it was).

-- John


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#315671: webcalendar unauthorized access

2005-07-19 Thread Stephen Gran
This one time, at band camp, Martin Schulze said:
 Stephen Gran wrote:
  Hello all,
 
 Thanks a lot for contacting us.
 
  There is a security bug in webcalendar (#315671 and
  http://www.securityfocus.com/bid/14072, for reference).  Tim is the
  maintainer, but does not yet have a debian account, and cannot upload.
  We have a fixed version for sarge ready (patch attached).  I am happy to
  upload it for Tim, or you could based on the attached patch.  Please let
  us know which way you want to handle this.  Tim is copied on this mail,
  please keep both of us in the follow ups.
  
  There is as yet no CVE, but the bugtraq ID is 14072.
 
 I have requested an id.

Great, thanks.

 While we're at it, have you checked this vulnerability as well?
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0474

I had not seen it before.  We will get you a patch for this as well.

 I'll take care of sarge.

Excellent news.  So we'll try to get you a patch for CAN-2005-0474 later
today if possible, and you'll handle the upload fixing both - does that
work for you?  I guess I'll file a bug about CAN-2005-0474, so it's
easier to track it getting into both sid and etch.

Thanks again,
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Bug#315671: webcalendar unauthorized access

2005-07-19 Thread Stephen Gran
This one time, at band camp, Martin Schulze said:
 While we're at it, have you checked this vulnerability as well?
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0474

My mistake.  It appears that this is #295960 and #296280 and was fixed
in 0.9.45-3, so it made it to sarge.  So the only issue to fix is the
one we already sent a patch for, and you don't need to wait on anything
from us at this point, am I correct?

Thanks, and we'll get something into sid shortly.
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Bug#318840: marked as done (vnc4server: depends on xbase-clients)

2005-07-19 Thread Debian Bug Tracking System
Your message dated Tue, 19 Jul 2005 15:02:53 +0200
with message-id [EMAIL PROTECTED]
and subject line Bug#318840: vnc4server: depends on xbase-clients
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 18 Jul 2005 07:45:59 +
From [EMAIL PROTECTED] Mon Jul 18 00:45:59 2005
Return-path: [EMAIL PROTECTED]
Received: from mxfep01.bredband.com [195.54.107.70] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1DuQK7-0007LB-00; Mon, 18 Jul 2005 00:45:59 -0700
Received: from zpif.whero.net ([83.226.218.4] [83.226.218.4])
  by mxfep01.bredband.com with ESMTP
  id [EMAIL PROTECTED]
  for [EMAIL PROTECTED]; Mon, 18 Jul 2005 09:45:26 +0200
Received: from johan by zpif.whero.net with local (Exim 4.52)
id 1DuQJb-9U-2N; Mon, 18 Jul 2005 09:45:27 +0200
Date: Mon, 18 Jul 2005 09:45:27 +0200
From: Johan =?iso-8859-1?Q?Bj=F6rklund?= [EMAIL PROTECTED]
To: Debian Bug Tracking System [EMAIL PROTECTED]
Subject: vnc4server: depends on xbase-clients
Message-ID: [EMAIL PROTECTED]
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
X-Reportbug-Version: 3.15
User-Agent: Mutt/1.5.9i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: vnc4server
Version: 4.0-8
Severity: grave
Justification: renders package unusable


Science migration to X.org it's impossible to install vnc4server. 

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (100, 'unstable'), (90, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.11-jb.1
Locale: LANG=sv_SE, LC_CTYPE=sv_SE (charmap=ISO-8859-1)

-- 
+---+
| Johan Björklund [EMAIL PROTECTED] http://whero.net/ |
|  PGP = 813B 014F C0FA B56C FA70  31DC 1C11 3A20 B02B C881 |
+---+

---
Received: (at 318840-done) by bugs.debian.org; 19 Jul 2005 13:00:08 +
From [EMAIL PROTECTED] Tue Jul 19 06:00:08 2005
Return-path: [EMAIL PROTECTED]
Received: from c-adt-5.ataco.se (bixbite.opalsys.net) [213.115.168.248] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1Durhg-0008V4-00; Tue, 19 Jul 2005 06:00:08 -0700
Received: from ola by bixbite.opalsys.net with local (Exim 4.50)
id 1DurkL-0006FW-Mp; Tue, 19 Jul 2005 15:02:53 +0200
Date: Tue, 19 Jul 2005 15:02:53 +0200
From: Ola Lundqvist [EMAIL PROTECTED]
To: Johan =?iso-8859-1?Q?Bj=C3=B6rklund?= [EMAIL PROTECTED],
[EMAIL PROTECTED]
Subject: Re: Bug#318840: vnc4server: depends on xbase-clients
Message-ID: [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
References: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: [EMAIL PROTECTED]
User-Agent: Mutt/1.5.9i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Ok, thanks.

Regards,

// Ola

On Tue, Jul 19, 2005 at 07:53:38AM +0200, Johan Björklund wrote:
 On Mon, Jul 18, 2005 at 16:44 CEST, 
Ola Lundqvist [EMAIL PROTECTED] wrote:
  Hello
  
  Ok, what should I depend on instead?
  
  Regards,
  
  // Ola
 
 Hello,
 
 this seems to be an effect of xbase-clients bug #318491 which is fixed.
 With the latest X.org packages xbase-clients is installable and
 therefore vnc4server runs just fine.
 
 Please go ahead and close this bug report.
 
 mvh
 -- 
 +---+
 | Johan Björklund [EMAIL PROTECTED] http://whero.net/ |
 |  PGP = 813B 014F C0FA B56C FA70  31DC 1C11 3A20 B02B C881 |
 +---+
 | -  longf_ffree;/* free file nodes in fs */
 | +  longf_ffree;/* freie Dateiknoten im Dateisystem */
 | -- Seen in a translation
 

Bug#317925: sql-ledger: Logout does not properly terminate a session

2005-07-19 Thread William McKee
On Mon, Jul 18, 2005 at 12:44:24AM +0200, Petter Reinholdtsen wrote:
 What do you mean?  Can one continue to work in sql-ledger after
 logging out?  Your description lead me to think that you expected the
 browsers cached pages to disappear at log out time.  What did you
 expect would happen when you logged out?  How could sql-ledger be
 changed to make it happen?

Hi Petter,

I was trying to say that I can continue to work in sql-ledger after
logging out. I'm not sure why I was seeing this behavior on my
installation. Currently my version is functioning as expected so you can
close this ticket. I'll try to track it down further if I can reproduce
this behavior.


Thanks,
William

-- 
Knowmad Services Inc.
http://www.knowmad.com


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#306990: acknowledged by developer (fixed in 1.3.25-23)

2005-07-19 Thread Arthur Korn
John Goerzen schrieb:
 On Mon, Jul 18, 2005 at 03:18:16PM -0700, Debian Bug Tracking System wrote:
  Version: 1.3.25-23
  
  use that cool BTS versioning now to see bugs in not-unstable
 
 Excuse me, but that says nothing about how the bug was fixed (or even if
 it was).

It doesn't have to, see the bug report logs why.

-- 
Secure email, spread GPG, clearsign all mail. http://www.gnupg.org
.
Tomorrow will be canceled due to lack of interest.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#306990: acknowledged by developer (fixed in 1.3.25-23)

2005-07-19 Thread John Goerzen
On Tue, Jul 19, 2005 at 03:45:02PM +0200, Arthur Korn wrote:
 John Goerzen schrieb:
  On Mon, Jul 18, 2005 at 03:18:16PM -0700, Debian Bug Tracking System wrote:
   Version: 1.3.25-23
   
   use that cool BTS versioning now to see bugs in not-unstable
  
  Excuse me, but that says nothing about how the bug was fixed (or even if
  it was).
 
 It doesn't have to, see the bug report logs why.

Huh, somehow I never received that auto-generated message.  Anyway,
thanks.

-- John


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#318790: puts data files in a location where discover does not work

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 318790 fixed
Bug#318790: puts data files in a location where discover does not work
Tags were: d-i
Tags added: fixed

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#319031: Crash on File-Open...

2005-07-19 Thread Paul Brossier
Hi,

Could you try building this version: http://piem.org/debian/kino/ ?

Cheers, piem


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#318790: puts data files in a location where discover does not work

2005-07-19 Thread Joey Hess
tags 318790 fixed
thanks

I NMUed for this bug using the attached patch.

-- 
see shy jo
diff -ur old/discover1-data-1.2005.07.12/debian/changelog 
discover1-data-1.2005.07.12/debian/changelog
--- old/discover1-data-1.2005.07.12/debian/changelog2005-07-12 
12:28:59.0 -0400
+++ discover1-data-1.2005.07.12/debian/changelog2005-07-17 
13:53:37.0 -0400
@@ -1,3 +1,11 @@
+discover1-data (1.2005.07.12.0.1) unstable; urgency=low
+
+  * NMU to un-break d-i.
+  * Ship the udeb's data files in /lib/discover same as the deb, so discover
+can find them.
+
+ -- Joey Hess [EMAIL PROTECTED]  Sun, 17 Jul 2005 20:52:52 +0300
+
 discover1-data (1.2005.07.12) unstable; urgency=low
 
   [ Joshua Kwan ]
diff -ur old/discover1-data-1.2005.07.12/debian/rules 
discover1-data-1.2005.07.12/debian/rules
--- old/discover1-data-1.2005.07.12/debian/rules2005-07-12 
12:09:36.0 -0400
+++ discover1-data-1.2005.07.12/debian/rules2005-07-17 13:52:44.0 
-0400
@@ -26,7 +26,7 @@
install -m 755 debian/discover1-data.bug 
debian/$(PACKAGE)/usr/share/bug/$(PACKAGE)
 
 # discover1-data-udeb
-   $(MAKE) install-udeb prefix=/usr DESTDIR=$(CURDIR)/debian/$(UPACKAGE)
+   $(MAKE) install-udeb prefix=/lib DESTDIR=$(CURDIR)/debian/$(UPACKAGE)
 
 binary-arch: build install
 


signature.asc
Description: Digital signature


Bug#317762: Same here. hidden dependency?

2005-07-19 Thread annonygmouse

In testing I uninstalled openoffice.org and now I can't install it
again.

maschine3:~# apt-cache search openoffice.org-bin
openoffice.org-bin - OpenOffice.org office suite binary files
maschine3:~# apt-cache search openoffice.org-debian-files
openoffice.org-debian-files - Debian specific parts of OpenOffice.org
maschine3:~# apt-get install openoffice.org-debian-files
Reading... done
Constructing ... Done

bla bla bla

The following packages have unsatisfied dependencies:
  openoffice.org-debian-files: Depends: openoffice.org ( 1.1.3+1.1.4)
but won't be installed
   Depends: openoffice.org-bin (
1.1.3+1.1.4) but won't be installedrà instal·lat
E: Broken packages

Should'nt apt-get show the real broken dependency?


maschine3:~# apt-get install openoffice.org-debian-files openoffice.org
 openoffice.org-bin
bla bla...

The following packages have unsatisfied dependencies:
  openoffice.org-bin: Depends: libmyspell3 but can't be installed
E: Broken packages


Yours.

Sebastià.




___ 
Yahoo! Messenger - NEW crystal clear PC to PC calling worldwide with voicemail 
http://uk.messenger.yahoo.com


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#317762: Workarround found.

2005-07-19 Thread annonygmouse

Change apt.conf and use testing.

Install openoffice.

Change againt to unstable

apt-get update  apt-get dist-upgrade


Now I have openoffice 1.4 again in my machine.

That did the trick :)
Maybe this helps anyone.


Thanks for the great job maintaining this beast.

Sebastià.



___ 
How much free photo storage do you get? Store your holiday 
snaps for FREE with Yahoo! Photos http://uk.photos.yahoo.com


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: severity of 318886 is grave

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.8.14
 severity 318886 grave
Bug#318886: gksu missing dependence
Severity set to `grave'.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#318790: marked as done (puts data files in a location where discover does not work)

2005-07-19 Thread Debian Bug Tracking System
Your message dated Tue, 19 Jul 2005 09:13:55 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#318790: puts data files in a location where discover does 
not  work
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 17 Jul 2005 17:50:53 +
From [EMAIL PROTECTED] Sun Jul 17 10:50:52 2005
Return-path: [EMAIL PROTECTED]
Received: from kitenet.net [64.62.161.42] (postfix)
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1DuDHw-5X-00; Sun, 17 Jul 2005 10:50:52 -0700
Received: from dragon.kitenet.net (kitenet.net [127.0.0.1])
(using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
(Client CN Joey Hess, Issuer Joey Hess (verified OK))
by kitenet.net (Postfix) with ESMTP id 5371E17DCB
for [EMAIL PROTECTED]; Sun, 17 Jul 2005 17:50:52 + (GMT)
Received: by dragon.kitenet.net (Postfix, from userid 1000)
id 06A716E8FE; Sun, 17 Jul 2005 20:51:45 +0300 (EEST)
Date: Sun, 17 Jul 2005 20:51:45 +0300
From: Joey Hess [EMAIL PROTECTED]
To: Debian Bug Tracking System [EMAIL PROTECTED]
Subject: puts data files in a location where discover does not work
Message-ID: [EMAIL PROTECTED]
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol=application/pgp-signature; boundary=6TrnltStXW4iwmi0
Content-Disposition: inline
X-Reportbug-Version: 3.15
User-Agent: Mutt/1.5.9i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02


--6TrnltStXW4iwmi0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: discover1-data-udeb
Severity: grave
Tags: d-i

The recent move of the data files was botched; now they are in
/usr/discover of all places in the udeb, and the discover binary expects
them in /lib/discover, and fails to find any hardware, so d-i no longer
works:

# discover --format=3D%m:%V %M\n --disable-all --enable=3Dpci,ide,scsi,pc=
mcia ide scsi cdrom ethernet bridge
# echo $?
0

(Why discover doesn't exit nonzero in this broken situation I don't
know.)=20

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.4.27
Locale: LANG=3Den_US.UTF-8, LC_CTYPE=3Den_US.UTF-8 (charmap=3DUTF-8)

--=20
see shy jo

--6TrnltStXW4iwmi0
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: Digital signature
Content-Disposition: inline

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFC2pqwd8HHehbQuO8RAoroAKCwUykjHXKUmd7FXZh/ykqCebCtsQCfb+Zx
Awi4MV7cRiR3dCWwIJLhDNk=
=NfrH
-END PGP SIGNATURE-

--6TrnltStXW4iwmi0--

---
Received: (at 318790-done) by bugs.debian.org; 19 Jul 2005 16:14:32 +
From [EMAIL PROTECTED] Tue Jul 19 09:14:31 2005
Return-path: [EMAIL PROTECTED]
Received: from dyn50.sunlabs.com (mail-mta.sunlabs.com) [204.153.12.50] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1Duujn-0005Ec-00; Tue, 19 Jul 2005 09:14:31 -0700
Received: from mail.sunlabs.com ([152.70.2.186]) by mail-mta.sfvic.sunlabs.com
 (Sun Java System Messaging Server 6.1 HotFix 0.02 (built Aug 25 2004))
 with ESMTP id [EMAIL PROTECTED] for
 [EMAIL PROTECTED]; Tue, 19 Jul 2005 09:13:57 -0700 (PDT)
Received: from [152.70.69.77] by mail.sunlabs.com
 (Sun Java System Messaging Server 6.1 HotFix 0.02 (built Aug 25 2004))
 with ESMTPSA id [EMAIL PROTECTED] for
 [EMAIL PROTECTED]; Tue, 19 Jul 2005 09:13:57 -0700 (PDT)
Date: Tue, 19 Jul 2005 09:13:55 -0700
From: Joshua Kwan [EMAIL PROTECTED]
Subject: Re: Bug#318790: puts data files in a location where discover does not
  work
In-reply-to: [EMAIL PROTECTED]
To: Joey Hess [EMAIL PROTECTED], [EMAIL PROTECTED]
Message-id: [EMAIL PROTECTED]
MIME-version: 1.0
Content-type: multipart/mixed; boundary=Boundary_(ID_YLH/CGuZtM76x+xuXjf4bQ)
X-Accept-Language: en-us, en
X-Enigmail-Version: 0.91.0.0
References: [EMAIL PROTECTED]
 [EMAIL PROTECTED]
User-Agent: Debian Thunderbird 1.0.2 (X11/20050602)
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 

Bug#319070: fiaif installs a cron script that modifies its conffiles

2005-07-19 Thread Josselin Mouette
Package: fiaif
Severity: serious
Tags: sarge etch sid

The script installed in /etc/cron.daily updates two conffiles provided
by the package. As it is enabled by default, I think it enters in the
don't touch conffiles category.

As this update is also quite useless (updating a list of private
networks) and dangerous WRT security, it should probably just be
disabled.

Regards,
-- 
Josselin Mouette


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#318995: boost: rebuild needed for C++ ABI transition (NMU patch attached)

2005-07-19 Thread Domenico Andreoli
On Mon, Jul 18, 2005 at 10:44:46PM -0700, Steve Langasek wrote:
 
 Hi Domenico,

hi Steve,

 Under the 0-day NMU policy for the C++ ABI transition, I have prepared an
 NMU for boost, because its C++ library packages need to be rebuilt so that a
 number of other C++-based packages can transition to g++ 4.0.  The diff for
 this NMU is attached; the NMU will be uploaded shortly.  If you see any
 problems with the patch, let me know so I can have the package rejected out
 of NEW.

i thought my statements in #318139 were clear, i'm working on boost
1.33.0 prelease packages which solve also the transition to g++ 4.0. i'm
then surprised to see your NMU, as if you forgot everything...

IMHO such NMU is not necessary, the fixed version of boost 1.32.0 is going
to live few days anyway. haven't you anything more important to do? :))

cheers
domenico

-[ Domenico Andreoli, aka cavok
 --[ http://people.debian.org/~cavok/gpgkey.asc
   ---[ 3A0F 2F80 F79C 678A 8936  4FEE 0677 9033 A20E BC50


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#319073: lxr: lxr binary is installed inside /var/lib/lxr/bin instead of /usr/bin

2005-07-19 Thread Ramakrishnan Muthukrishnan
Package: lxr
Version: 0.3.1-2
Severity: serious

I installed lxr today. In the README file in the /usr/share/doc/lxr directory
there was no mention of how to run the program, neighther was there a 
README.Debian

So, I was forced to find what was in the package using dpkg -L (as given 
below). The
package seem to be installing the binary inside /var/lib/lxr/bin/genxref which 
is 
a serious violation of the policy. The Binaries should have been in /usr/bin 
instead.

Thanks
Ramakrishnan

radio:/usr/share/doc/lxr$ dpkg -L lxr
/.
/var
/var/www
/var/lib
/var/lib/lxr
/var/lib/lxr/source
/var/lib/lxr/http
/var/lib/lxr/http/lib
/var/lib/lxr/http/lib/LXR
/var/lib/lxr/http/lib/LXR/Common.pm
/var/lib/lxr/http/lib/LXR/Config.pm
/var/lib/lxr/http/lib/SimpleParse.pm
/var/lib/lxr/http/find
/var/lib/lxr/http/ident
/var/lib/lxr/http/search
/var/lib/lxr/http/diff
/var/lib/lxr/http/source
/var/lib/lxr/http/blurb.html
/var/lib/lxr/http/lxr.conf
/var/lib/lxr/http/search_help.html
/var/lib/lxr/http/template-dir
/var/lib/lxr/http/template-head
/var/lib/lxr/http/template-tail
/var/lib/lxr/http/valid_html3.2.gif
/var/lib/lxr/bin
/var/lib/lxr/bin/genxref
/usr
/usr/share
/usr/share/doc
/usr/share/doc/lxr
/usr/share/doc/lxr/README
/usr/share/doc/lxr/copyright
/usr/share/doc/lxr/README.Debian.gz
/usr/share/doc/lxr/changelog.Debian.gz



-- System Information:
Debian Release: testing/unstable
Architecture: i386
Kernel: Linux radio 2.6.12 #1 Tue Jul 19 20:50:20 IST 2005 i686
Locale: LANG=C, LC_CTYPE=C

Versions of packages lxr depends on:
ii  mzscheme [httpd]  1:209-3PLT Scheme Interpreter
ii  perl [perl5]  5.8.4-6Larry Wall's Practical Extraction 

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#297272: marked as done (dgen: FTBFS (amd64/gcc-4.0): duplicate 'unsigned')

2005-07-19 Thread Debian Bug Tracking System
Your message dated Tue, 19 Jul 2005 13:47:03 -0400
with message-id [EMAIL PROTECTED]
and subject line Bug#297272: fixed in dgen 1.23-8
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 28 Feb 2005 11:32:05 +
From [EMAIL PROTECTED] Mon Feb 28 03:32:05 2005
Return-path: [EMAIL PROTECTED]
Received: from c204041.adsl.hansenet.de (localhost.localdomain) [213.39.204.41] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1D5j89-0004Mk-00; Mon, 28 Feb 2005 03:32:05 -0800
Received: from aj by localhost.localdomain with local (Exim 4.44)
id 1D5k4T-0007sE-8z; Mon, 28 Feb 2005 13:32:21 +0100
To: Debian Bug Tracking System [EMAIL PROTECTED]
From: Andreas Jochens [EMAIL PROTECTED]
Subject: dgen: FTBFS (amd64/gcc-4.0): duplicate 'unsigned'
Message-Id: [EMAIL PROTECTED]
Date: Mon, 28 Feb 2005 13:32:21 +0100
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.4 required=4.0 tests=BAYES_00,HAS_PACKAGE,
UPPERCASE_25_50 autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: dgen
Severity: normal
Tags: patch

When building 'dgen' on amd64 with gcc-4.0,
I get the following error:

creating mz80/Makefile
creating sdl/Makefile
/usr/bin/make AUTOMAKE=echo # avoid running automake
make[1]: Entering directory `/dgen-1.23'
Making all in musa
make[2]: Entering directory `/dgen-1.23/musa'
gcc -DPACKAGE=\dgen-sdl\ -DVERSION=\1.23\ -DSDL_OPENGL_SUPPORT=1 
-DJOYSTICK_SUPPORT=1 -DSDL_JOYSTICK_SUPPORT=1 -DHAVE_SDL_WM_TOGGLEFULLSCREEN=1 
-DCOMPILE_WITH_MUSA=1  -I. -I.  -g -O2 -I/usr/include/SDL -D_REENTRANT  
-Umemcpy -c m68kcpu.c
gcc -DPACKAGE=\dgen-sdl\ -DVERSION=\1.23\ -DSDL_OPENGL_SUPPORT=1 
-DJOYSTICK_SUPPORT=1 -DSDL_JOYSTICK_SUPPORT=1 -DHAVE_SDL_WM_TOGGLEFULLSCREEN=1 
-DCOMPILE_WITH_MUSA=1  -I. -I.  -g -O2 -I/usr/include/SDL -D_REENTRANT  
-Umemcpy -c m68kmake.c
gcc  -g -O2 -I/usr/include/SDL -D_REENTRANT  -Umemcpy  -o m68kmake  m68kmake.o  
-L/usr/X11R6/lib
./m68kmake
gcc -DPACKAGE=\dgen-sdl\ -DVERSION=\1.23\ -DSDL_OPENGL_SUPPORT=1 
-DJOYSTICK_SUPPORT=1 -DSDL_JOYSTICK_SUPPORT=1 -DHAVE_SDL_WM_TOGGLEFULLSCREEN=1 
-DCOMPILE_WITH_MUSA=1  -I. -I.  -g -O2 -I/usr/include/SDL -D_REENTRANT  
-Umemcpy -c m68kops.c
In file included from /usr/include/stdlib.h:433,
 from m68kops.c:7:
/usr/include/sys/types.h:153: error: duplicate 'unsigned'
/usr/include/sys/types.h:153: error: two or more data types in declaration 
specifiers
make[2]: *** [m68kops.o] Error 1
make[2]: Leaving directory `/dgen-1.23/musa'

With the attached patch 'dgen' can be compiled
on amd64 using gcc-4.0.

Regards
Andreas Jochens

diff -urN ../tmp-orig/dgen-1.23/musa/m68kmake.c ./musa/m68kmake.c
--- ../tmp-orig/dgen-1.23/musa/m68kmake.c   1999-12-20 03:15:59.0 
+
+++ ./musa/m68kmake.c   2005-02-28 12:28:47.518661261 +
@@ -1029,9 +1029,9 @@
fprintf(filep, /* = OPCODE TABLE BUILDER 
= */\n);
fprintf(filep, /* 
 
*/\n\n);
 
+   fprintf(filep, #include stdlib.h\n\n);
fprintf(filep, #include \m68kops.h\\n);
fprintf(filep, #include \m68kcpu.h\\n);
-   fprintf(filep, #include stdlib.h\n\n);
fprintf(filep, #include string.h\n\n);
 
fprintf(filep, extern void  (*m68k_instruction_jump_table[])(void); /* 
opcode handler jump table */\n\n);

---
Received: (at 297272-close) by bugs.debian.org; 19 Jul 2005 17:56:12 +
From [EMAIL PROTECTED] Tue Jul 19 10:56:12 2005
Return-path: [EMAIL PROTECTED]
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1DuwKC-0003ys-00; Tue, 19 Jul 2005 10:56:12 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1DuwBL-00011U-00; Tue, 19 Jul 2005 13:47:03 -0400
From: Joey Hess [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#297272: fixed in dgen 1.23-8
Message-Id: [EMAIL PROTECTED]
Sender: Archive Administrator [EMAIL PROTECTED]
Date: Tue, 19 Jul 2005 13:47:03 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 

Processed: setting package to debian-installer debian-installer-manual, tagging 250028, tagging 284289 ... ... ... ...

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.8.15
 package debian-installer debian-installer-manual
Ignoring bugs not assigned to: debian-installer-manual debian-installer

 tags 250028 + pending
Bug#250028: debian-installer-manual: Is there RARP support for ia64
Tags were: d-i
Tags added: pending

 tags 284289 + pending
Bug#284289: partial preseeding after manual partman
Tags were: d-i
Tags added: pending

 tags 301374 + pending
Bug number 301374 belongs to package installation-reports, skipping.

 tags 311704 + pending
Bug#311704: debian-installer-manual: Must unset LANG when configuring 
debootstrap'd environment
There were no tags set.
Tags added: pending

 tags 313488 + pending
Bug#313488: www.debian.org: install manual incorrectly states HFS+ can't be 
read under debian
There were no tags set.
Tags added: pending

 tags 316487 + pending
Bug#316487: debian-installer-manual: Missing copyright credit: Karsten M. Self 
for section C.4
There were no tags set.
Tags added: pending


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#318525: atlas: FTBFS: Memory inputs not directly addressable

2005-07-19 Thread Roger Leigh
Matt Kraai [EMAIL PROTECTED] writes:

 On Sun, Jul 17, 2005 at 10:09:52PM -0700, Matt Kraai wrote:
 On Sun, Jul 17, 2005 at 08:25:21PM +0100, Roger Leigh wrote:
  Is this still reproducible with a current etch or sid system?
  
  Also, your bug report did not state the architecture, subarchitecture
  or compiler you were using, not the distribution you built on.  Given
  that this is using ASM, this will affect which platforms can reproduce
  it.

 As I mentioned before, this failure occurred on i386.  I was using gcc
 4:4.0.0-2 in a sid pbuilder chroot.

 I was able to reproduce the failure.

Thanks.  As a powerpc user, I'm afraid I can't do much more here...


-- 
Roger Leigh
Printing on GNU/Linux?  http://gimp-print.sourceforge.net/
Debian GNU/Linuxhttp://www.debian.org/
GPG Public Key: 0x25BFB848.  Please sign and encrypt your mail.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#317098: 317098

2005-07-19 Thread David Raleigh Arnold
When attempting to start kmail by means of icon, there is message
kdeinit 
could not launch kmail.  Otherwise of course it segfaults.  I notice
that there is
no kdeinit_kmail.  daveA



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#318995: boost: rebuild needed for C++ ABI transition (NMU patch attached)

2005-07-19 Thread Steve Langasek
On Tue, Jul 19, 2005 at 07:10:26PM +0200, Domenico Andreoli wrote:
 On Mon, Jul 18, 2005 at 10:44:46PM -0700, Steve Langasek wrote:

 hi Steve,

  Under the 0-day NMU policy for the C++ ABI transition, I have prepared an
  NMU for boost, because its C++ library packages need to be rebuilt so that a
  number of other C++-based packages can transition to g++ 4.0.  The diff for
  this NMU is attached; the NMU will be uploaded shortly.  If you see any
  problems with the patch, let me know so I can have the package rejected out
  of NEW.

 i thought my statements in #318139 were clear, i'm working on boost
 1.33.0 prelease packages which solve also the transition to g++ 4.0. i'm
 then surprised to see your NMU, as if you forgot everything...

 IMHO such NMU is not necessary, the fixed version of boost 1.32.0 is going
 to live few days anyway. haven't you anything more important to do? :))

The maintainer of a package which depends on boost asked me for it, and
yes, I forgot about the discussion in 318139.  Please feel free to upload
your own version of the package. :)

-- 
Steve Langasek
postmodern programmer


signature.asc
Description: Digital signature


Bug#319031: Crash on File-Open...

2005-07-19 Thread Max Alekseyev

Paul Brossier wrote:


Could you try building this version: http://piem.org/debian/kino/ ?


It didn't help. Kino 0.76-3 is still crashing.
Backtrace is essentially the same:

Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 46912583339200 (LWP 3854)]
0x2e18ac00 in strlen () from /lib/libc.so.6
(gdb) bt
#0  0x2e18ac00 in strlen () from /lib/libc.so.6
#1  0x2d13aea2 in g_strdup () from /usr/lib/libglib-2.0.so.0
#2  0x2c63f292 in g_value_array_sort_with_data ()
   from /usr/lib/libgobject-2.0.so.0
#3  0x2c6259c1 in g_object_new_valist ()
   from /usr/lib/libgobject-2.0.so.0
#4  0x2c625193 in g_object_new () from /usr/lib/libgobject-2.0.so.0
#5  0x2bb5fad9 in gtk_button_new_from_stock ()
   from /usr/lib/libgtk-x11-2.0.so.0
#6  0x2bba0b66 in gtk_dialog_add_button ()
   from /usr/lib/libgtk-x11-2.0.so.0
#7  0x2bbb9361 in gtk_file_chooser_dialog_get_type ()
   from /usr/lib/libgtk-x11-2.0.so.0
#8  0x2bbb9435 in gtk_file_chooser_dialog_new ()
   from /usr/lib/libgtk-x11-2.0.so.0
#9  0x0047a143 in KinoCommon::getFileToOpen ()
etc. etc.

Max


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: grave

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 319067 grave
Bug#319067: resolvconf: pdns fix breaks local dns interface
Severity set to `grave'.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#319089: oprofile: Does not start -- libbfd-2.15.so not found

2005-07-19 Thread Erik Schnetter
Package: oprofile
Version: 0.8.1-2
Severity: grave
Justification: renders package unusable

When I say oprof_start, I receive the error message

oprof_start: error while loading shared libraries: libbfd-2.15.so: cannot open 
shared object file: No such file or directory

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (990, 'testing'), (600, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.8-2-686
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages oprofile depends on:
ii  binutils 2.16.1-2The GNU assembler, linker and bina
ii  debconf  1.4.52  Debian configuration management sy
ii  libc62.3.2.ds1-22GNU C Library: Shared libraries an
ii  libgcc1  1:4.0.0-9   GCC support library
ii  libice6  4.3.0.dfsg.1-14 Inter-Client Exchange library
ii  libpopt0 1.7-5   lib for parsing cmdline parameters
ii  libqt3c102-mt3:3.3.4-3   Qt GUI Library (Threaded runtime v
ii  libsm6   4.3.0.dfsg.1-14 X Window System Session Management
ii  libstdc++5   1:3.3.5-13  The GNU Standard C++ Library v3
ii  libx11-6 4.3.0.dfsg.1-14 X Window System protocol client li
ii  xlibs4.3.0.dfsg.1-14 X Keyboard Extension (XKB) configu

Versions of packages oprofile recommends:
pn  oprofile-modules0.8   none (no description available)

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#263337: FTBFS with gcc-3.4: parse error before string constant

2005-07-19 Thread Roger Leigh
This RC bug has been fixed in a non-maintainer upload.  The patch is
attached; please apply it and acknowledge it in your next maintainer
upload.


Regards,
Roger


diff -urN dict-gcide-0.48.original/debian/changelog 
dict-gcide-0.48/debian/changelog
--- dict-gcide-0.48.original/debian/changelog   2005-07-19 20:35:08.0 
+0100
+++ dict-gcide-0.48/debian/changelog2005-07-19 20:43:28.767882848 +0100
@@ -1,3 +1,12 @@
+dict-gcide (0.48-4.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Apply patch from Andreas Jochens to allow building with
+GCC 3.4 and 4.0, replacing the non-standard preprocessor
+macro __FUNCTION__ with the C99 __func__ (Closes: #263337).
+
+ -- Roger Leigh [EMAIL PROTECTED]  Tue, 19 Jul 2005 20:39:38 +0100
+
 dict-gcide (0.48-4) unstable; urgency=low
 
   * Corrected format of Build-Depends-Indep: Closes: #218709
diff -urN dict-gcide-0.48.original/libmaa/parse.c dict-gcide-0.48/libmaa/parse.c
--- dict-gcide-0.48.original/libmaa/parse.c 1998-02-22 19:32:36.0 
+
+++ dict-gcide-0.48/libmaa/parse.c  2005-07-19 20:38:19.674872128 +0100
@@ -75,7 +75,7 @@
 
if (!cpp) {
   if ((cpp = getenv( KHEPERA_CPP ))) {
- PRINTF(MAA_PARSE,(__FUNCTION__ : Using KHEPERA_CPP from %s\n,cpp));
+ PRINTF(MAA_PARSE,(%s: Using KHEPERA_CPP from %s\n,__func__,cpp));
   }
   
 /* Always look for gcc's cpp first, since
@@ -86,7 +86,7 @@
  
  if (fread( buf, 1, 1023, tmp )  0) {
 if ((t = strchr( buf, '\n' ))) *t = '\0';
-PRINTF(MAA_PARSE,(__FUNCTION__ : Using GNU cpp from %s\n,buf));
+PRINTF(MAA_PARSE,(%s: Using GNU cpp from %s\n,__func__,buf));
 cpp = str_find( buf );
 extra_options = -nostdinc -nostdinc++;
  }
@@ -103,7 +103,7 @@
  for (pt = cpps; **pt; pt++) {
 if (!access( *pt, X_OK )) {
PRINTF(MAA_PARSE,
-  (__FUNCTION__ : Using system cpp from %s\n,*pt));
+  (%s: Using system cpp from %s\n,__func__,*pt));
cpp = *pt;
break;
 }
@@ -111,8 +111,8 @@
   }
   
   if (!cpp)
-err_fatal( __FUNCTION__,
-   Cannot locate cpp -- set KHEPERA_CPP to cpp's path\n );
+err_fatal(%s:Cannot locate cpp -- set KHEPERA_CPP to cpp's path\n,
+  __func__ );
}
 
buffer = alloca( strlen( cpp )
@@ -123,10 +123,9 @@
sprintf( buffer, %s -I. %s %s 2/dev/null, cpp,
_prs_cpp_options ? _prs_cpp_options : , filename );
 
-   PRINTF(MAA_PARSE,(__FUNCTION__ : %s\n,buffer));
+   PRINTF(MAA_PARSE,(%s: %s\n,__func__,buffer));
if (!(yyin = popen( buffer, r )))
-  err_fatal_errno( __FUNCTION__,
-  Cannot open \%s\ for read\n, filename );
+  err_fatal_errno(%s Cannot open \%s\ for read\n, __func__, filename );
 
src_new_file( filename );
yydebug = _prs_debug_flag;
@@ -144,11 +143,10 @@
 void prs_file_nocpp( const char *filename )
 {
if (!filename)
-  err_fatal( __FUNCTION__, No filename specified\n );
+  err_fatal( %s No filename specified\n, __func__ );
 
if (!(yyin = fopen( filename, r )))
-  err_fatal_errno( __FUNCTION__,
-  Cannot open \%s\ for read\n, filename );
+  err_fatal_errno( %s Cannot open \%s\ for read\n, __func__, filename 
);
 
src_new_file( filename );
yydebug = _prs_debug_flag;

-- 
Roger Leigh
Printing on GNU/Linux?  http://gimp-print.sourceforge.net/
Debian GNU/Linuxhttp://www.debian.org/
GPG Public Key: 0x25BFB848.  Please sign and encrypt your mail.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#318537: marked as done (gnus: FTBFS: Error running texi2html)

2005-07-19 Thread Debian Bug Tracking System
Your message dated Tue, 19 Jul 2005 16:17:28 -0400
with message-id [EMAIL PROTECTED]
and subject line Bug#318537: fixed in gnus 5.10.6-1.NO.20050719-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 16 Jul 2005 03:17:54 +
From [EMAIL PROTECTED] Fri Jul 15 20:17:54 2005
Return-path: [EMAIL PROTECTED]
Received: from pop06.mail.atl.earthlink.net [207.69.200.40] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1DtdBa-0004tn-00; Fri, 15 Jul 2005 20:17:54 -0700
Received: from user-119bq03.biz.mindspring.com ([66.149.232.3] 
helo=frobnitz.homelinux.net)
by pop06.mail.atl.earthlink.net with esmtp (Exim 3.36 #10)
id 1DtdBZ-0001js-00
for [EMAIL PROTECTED]; Fri, 15 Jul 2005 23:17:53 -0400
Received: from daniel by frobnitz.homelinux.net with local (Exim 4.52)
id 1DtdBL-bP-TH
for [EMAIL PROTECTED]; Fri, 15 Jul 2005 20:17:44 -0700
To: Debian Bug Tracking System [EMAIL PROTECTED]
Subject: gnus: FTBFS: Error running texi2html
From: Daniel Schepler [EMAIL PROTECTED]
Date: Fri, 15 Jul 2005 20:17:22 -0700
Message-ID: [EMAIL PROTECTED]
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: gnus
Version: 5.10.6-1.NO.20050713-1
Severity: serious

From my build log:

...
test -f stamp-build-gnus || (cd texi; \
 texi2html -doctype html2 -expandinfo -menu \
   -split=chapter -Verbose  gnus.texi; )
# Expanded: verbatim ifnotxml documentdescription ifnotplaintext html ifinfo 
ifnotdocbook titlepage ifset menu copying ifnottex ifclear ifhtml 
*** can't create directory gnus
make: *** [build/gnus] Error 17

-- System Information:
Debian Release: testing/unstable
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.11-9-amd64-k8
Locale: LANG=en, LC_CTYPE=en (charmap=UTF-8) (ignored: LC_ALL set to 
en_US.UTF-8)

Versions of packages gnus depends on:
ii  emacs21   21.4a-1The GNU Emacs editor
ii  make  3.80-9 The GNU version of the make util
ii  ucf   2.000  Update Configuration File: preserv
ii  xemacs21  21.4.17-2  highly customizable text editor
ii  xemacs21-mule [xemacs21]  21.4.17-2  highly customizable text editor --

gnus recommends no packages.

-- debconf information:
  gnus/upgrade/pre_5.9.0: false

-- 
Daniel Schepler  Please don't disillusion me.  I
[EMAIL PROTECTED]haven't had breakfast yet.
 -- Orson Scott Card

---
Received: (at 318537-close) by bugs.debian.org; 19 Jul 2005 20:23:14 +
From [EMAIL PROTECTED] Tue Jul 19 13:23:14 2005
Return-path: [EMAIL PROTECTED]
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1DuycT-00085M-00; Tue, 19 Jul 2005 13:23:14 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1DuyWu-0006uG-00; Tue, 19 Jul 2005 16:17:28 -0400
From: Manoj Srivastava [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#318537: fixed in gnus 5.10.6-1.NO.20050719-1
Message-Id: [EMAIL PROTECTED]
Sender: Archive Administrator [EMAIL PROTECTED]
Date: Tue, 19 Jul 2005 16:17:28 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 2

Source: gnus
Source-Version: 5.10.6-1.NO.20050719-1

We believe that the bug you reported is fixed in the latest version of
gnus, which is due to be installed in the Debian FTP archive:

gnus_5.10.6-1.NO.20050719-1.diff.gz
  to pool/main/g/gnus/gnus_5.10.6-1.NO.20050719-1.diff.gz
gnus_5.10.6-1.NO.20050719-1.dsc
  to pool/main/g/gnus/gnus_5.10.6-1.NO.20050719-1.dsc
gnus_5.10.6-1.NO.20050719-1_all.deb
  to pool/main/g/gnus/gnus_5.10.6-1.NO.20050719-1_all.deb
gnus_5.10.6-1.NO.20050719.orig.tar.gz
  to pool/main/g/gnus/gnus_5.10.6-1

Processed: important

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 319067 important
Bug#319067: resolvconf: pdns fix breaks local dns interface
Severity set to `important'.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#317493: works for me

2005-07-19 Thread Arthur Korn

ii  liballegro4a  4.0.3-14   portable library for 
cross-platform game and
ii  liballegro4a-plugin-arts  4.0.3-14   aRts audio plugin for the Allegro 
library
ii  liquidwar 5.6.2-1A truely original multiplayer 
wargame

I get correct sound output and liquidwar confirms my setting
with digi_card set to either of ARTS, OSSD or ALSA.

This is onboard sound of a ASUS P4P800-VM: Intel ICH5 with
AD1980.

I smell some sampling-rate or other audio encoding
misunderstanding somewhere between the soundcard and userspace.

Regards, 2ri
-- 
Secure email, spread GPG, clearsign all mail. http://www.gnupg.org
.
'How long do you envision this rule of the universe to be?' -- Steven 
Levy
'[in Mathematica] perhaps three, four lines of code.' -- Stephen 
Wolfram
'A *real* god would do it in but a single line of Perl.' -- number 
one duck (/.)
'That explains why the world is so F'd up: he couldn't read it six 
months later
to debug it.' -- Tablizer on slashdot.org


signature.asc
Description: Digital signature


Bug#317283: evolution: another pin approach and some info

2005-07-19 Thread Ross Boylan
Package: evolution
Version: 2.2.2-4
Followup-For: Bug #317283

You can also put this in your preferences:

Package: libgnomecanvas2-0
Pin: version 2.8.0-1
Pin-Priority: 1001

Package: libgnomecanvas2-common
Pin: version 2.8.0-1
Pin-Priority: 1001

I'm not sure if it's still necessary to specify a priority on the
command line with these settings; they will keep those versions in
place through later dist-upgrades.

If I understand the other information in this bug, the 2.10 versions
will start working when appropriate other gnome stuff (evolution?
libraries?) gets into testing.  Can anyone confirm or elaborate on
that?  At any rate, you'll want to remove the pinning at that point.

The startup failure under 2.10 came with this message in
.xsesssion-errors.  I'm reporting it in case it's useful:
---
X Error: BadAccess (attempt to access private resource denied) 10
  Major opcode:  2
  Minor opcode:  0
  Resource id:  0x345
DCOPReply: cast to 'QStringList' error
DCOPReply: cast to 'QString' error
evolution-shell-Message: Killing old version of evolution-data-server...
es menu class init
adding hook target 'source'
evolution-shell-Message: Killing old version of evolution-data-server...
es menu class init
adding hook target 'source'
---

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (600, 'testing'), (500, 'stable'), (50, 'unstable'), (40, 
'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.4.27adnvcd
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages evolution depends on:
ii  evolution-data-server1.2 1.2.2-5.1   evolution database backend server
ii  gconf2   2.10.0-2GNOME configuration database syste
ii  gnome-icon-theme 2.10.1-2GNOME Desktop icon theme
ii  gtkhtml3.6   3.6.2-1 HTML rendering/editing library - b
ii  libart-2.0-2 2.3.17-1Library of functions for 2D graphi
ii  libatk1.0-0  1.10.1-2The ATK accessibility toolkit
ii  libaudiofile00.2.6-6 Open-source version of SGI's audio
ii  libbonobo2-0 2.10.0-1Bonobo CORBA interfaces library
ii  libbonoboui2-0   2.8.1-2 The Bonobo UI library
ii  libc62.3.2.ds1-22GNU C Library: Shared libraries an
ii  libcamel1.2-01.2.2-5.1   The Evolution MIME message handlin
ii  libcompfaceg11989.11.11-24   Compress/decompress images for mai
ii  libdb4.1 4.1.25-18   Berkeley v4.1 Database Libraries [
ii  libebook1.2-31.2.2-5.1   Client library for evolution addre
ii  libecal1.2-2 1.2.2-5.1   Client library for evolution calen
ii  libedataserver1.2-4  1.2.2-5.1   Utily library for evolution data s
ii  libedataserverui1.2-41.2.2-5.1   GUI utily library for evolution da
ii  libesd0  0.2.36-1Enlightened Sound Daemon - Shared 
ii  libfontconfig1   2.3.2-1 generic font configuration library
ii  libfreetype6 2.1.7-2.4   FreeType 2 font engine, shared lib
ii  libgail-common   1.8.4-1 GNOME Accessibility Implementation
ii  libgail171.8.4-1 GNOME Accessibility Implementation
ii  libgal2.4-0  2.4.2-1 G App Libs (run time library)
ii  libgal2.4-common 2.4.2-1 G App Libs (common files)
ii  libgconf2-4  2.10.0-2GNOME configuration database syste
ii  libgcrypt11  1.2.0-11.1  LGPL Crypto library - runtime libr
ii  libglade2-0  1:2.5.1-2   library to load .glade files at ru
ii  libglib2.0-0 2.6.5-1 The GLib library of C routines
ii  libgnome-keyring00.4.3-1 GNOME keyring services library
ii  libgnome-pilot2  2.0.12-1.2  Support libraries for gnome-pilot
ii  libgnome2-0  2.8.1-2 The GNOME 2 library - runtime file
ii  libgnomecanvas2-02.8.0-1 A powerful object-oriented display
ii  libgnomeprint2.2-0   2.10.3-2The GNOME 2.2 print architecture -
ii  libgnomeprintui2.2-0 2.10.2-2GNOME 2.2 print architecture User 
ii  libgnomeui-0 2.8.1-3 The GNOME 2 libraries (User Interf
ii  libgnomevfs2-0   2.8.4-4 The GNOME virtual file-system libr
ii  libgnutls11  1.0.16-13.1 GNU TLS library - runtime library
ii  libgpg-error01.0-1   library for common error values an
ii  libgtk2.0-0  2.6.8-1 The GTK+ graphical user interface 
ii  libgtkhtml3.6-18 3.6.2-1 HTML rendering/editing library - r
ii  libice6  4.3.0.dfsg.1-14 Inter-Client Exchange library
ii  libjpeg626b-10 

Processed: your mail

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 319089 normal
Bug#319089: oprofile: Does not start -- libbfd-2.15.so not found
Severity set to `normal'.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Fixed in NMU of lam 7.1.1-3.2

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tag 318960 + fixed
Bug#318960: C++ 4.0 transition
There were no tags set.
Tags added: fixed

 quit
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Fixed in NMU of gtkmm2.4 1:2.6.2-1.1

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tag 310403 + fixed
Bug#310403: libgtkmm-2.4-1: delivers wrong shlibs control file
Tags were: patch experimental
Tags added: fixed

 quit
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Fixed in NMU of cln 1.1.9-1.1

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tag 314831 + fixed
Bug#314831: cln: FTBFS (amd64/gcc-4.0): ISO C++ forbids declaration of 
'cl_string' with no type
Tags were: patch
Tags added: fixed

 tag 318210 + fixed
Bug#318210: Needs recompile with libgmp3c2
There were no tags set.
Tags added: fixed

 quit
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Fixed in NMU of eterm 0.9.2-8.1

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tag 297917 + fixed
Bug#297917: eterm: FTBFS (amd64/gcc-4.0): invalid lvalue in assignment
Tags were: patch
Tags added: fixed

 quit
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Fixed in NMU of dict-gcide 0.48-4.1

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tag 263337 + fixed
Bug#263337: dict-gcide: FTBFS with gcc-3.4: parse error before string constant
Tags were: patch
Tags added: fixed

 quit
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#297917: eterm: FTBFS (amd64/gcc-4.0): invalid lvalue in assignment

2005-07-19 Thread Roger Leigh
This RC bug has been fixed in a non-maintainer upload.  The changes in
the upload are detailed in the following diff.  Please apply the diff
and acknowledge it in your next maintainer upload.

CDBS also made some changes, but these are excluded from the diff.


Regards,
Roger


diff -urN eterm-0.9.2.original/debian/changelog eterm-0.9.2/debian/changelog
--- eterm-0.9.2.original/debian/changelog   2005-07-19 22:41:39.0 
+0100
+++ eterm-0.9.2/debian/changelog2005-07-19 22:51:57.733941872 +0100
@@ -1,3 +1,14 @@
+eterm (0.9.2-8.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Apply patch from Andreas Jochens to fix GCC 4.0 build failure,
+by not casting lvalues (Closes: #297917).
+  * debian/control:
+- Remove duplicate Depends lines.
+- Update to Standards-Version 3.6.2.
+
+ -- Roger Leigh [EMAIL PROTECTED]  Tue, 19 Jul 2005 22:51:21 +0100
+
 eterm (0.9.2-8) unstable; urgency=low
 
   * src/startup.c: disable use of ~/user.cfg, patch provdided by Michael
diff -urN eterm-0.9.2.original/debian/control eterm-0.9.2/debian/control
--- eterm-0.9.2.original/debian/control 2005-07-19 22:41:39.0 +0100
+++ eterm-0.9.2/debian/control  2005-07-19 22:51:17.798013056 +0100
@@ -2,7 +2,7 @@
 Section: x11
 Priority: optional
 Maintainer: Laurence J. Lane [EMAIL PROTECTED]
-Standards-Version: 3.6.1.0
+Standards-Version: 3.6.2
 Build-Depends: libxmu-dev,libsm-dev, libice-dev, libxext-dev, libx11-dev, 
libxt-dev, libimlib2-dev, libast2-dev (= 0.6-0pre2003010606), libpcre3-dev, 
cdbs, debhelper ( 4.1.0)
 
 Package: eterm
@@ -11,7 +11,6 @@
 Provides: x-terminal-emulator, eterm-backgrounds
 Conflicts: eterm-backgrounds, eterm-ml
 Replaces: eterm-ml, eterm-backgrounds
-Depends: ${shlibs:Depends}
 Description: Enlightened Terminal Emulator
  A terminal emulator in the spirit of xterm or rxvt, eterm uses an
  Enlightenment style config file, as well as themes.  The Imlib2 graphics
diff -urN eterm-0.9.2.original/src/command.c eterm-0.9.2/src/command.c
--- eterm-0.9.2.original/src/command.c  2005-07-19 22:41:39.0 +0100
+++ eterm-0.9.2/src/command.c   2005-07-19 22:42:53.464683376 +0100
@@ -2995,9 +2995,9 @@
 Xfd = XConnectionNumber(Xdisplay);
 D_CMD((Xfd = %d\n, Xfd));
 cmdbuf_ptr = cmdbuf_endp = cmdbuf_base;
-AT_LEAST((int) num_fds, Xfd + 1);
+AT_LEAST(num_fds, Xfd + 1);
 if (pipe_fd = 0) {
-AT_LEAST((int) num_fds, pipe_fd + 1);
+AT_LEAST(num_fds, pipe_fd + 1);
 }
 if ((cmd_fd = command_func(argv))  0) {
 print_error(Unable to run sub-command.\n);


-- 
Roger Leigh
Printing on GNU/Linux?  http://gimp-print.sourceforge.net/
Debian GNU/Linuxhttp://www.debian.org/
GPG Public Key: 0x25BFB848.  Please sign and encrypt your mail.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#319102: GCC 4.0 - error: static declaration of 'current_menu' follows non-static declaration

2005-07-19 Thread Daniel Leidert
Package: kernel-source-2.6.8
Version: 2.6.8-16
Severity: grave
Justification: renders package unusable

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

The kernel does not compile with gcc 4.0:

  [..]
  HOSTCC  scripts/kconfig/mconf.o
  scripts/kconfig/mconf.c:91: error: static declaration of 'current_menu' 
follows non-static declaration
  scripts/kconfig/lkc.h:63: error: previous declaration of 'current_menu' was 
here
  make[1]: *** [scripts/kconfig/mconf.o] Error 1
  make: *** [xconfig] Error 2
  
Regards, Daniel

- -- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (850, 'unstable'), (700, 'testing'), (500, 'oldstable'), (500, 
'stable'), (110, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.8.15050330
Locale: LANG=de_DE, LC_CTYPE=de_DE (charmap=ISO-8859-1)

Versions of packages kernel-source-2.6.8 depends on:
ii  binutils  2.16.1-2   The GNU assembler, linker and bina
ii  bzip2 1.0.2-7high-quality block-sorting file co
ii  coreutils [fileutils] 5.2.1-2The GNU core utilities
ii  fileutils 5.2.1-2The GNU file management utilities 

Versions of packages kernel-source-2.6.8 recommends:
ii  gcc 4:4.0.0-2The GNU C compiler
ii  libc6-dev [libc-dev]2.3.2.ds1-22 GNU C Library: Development Librari
ii  make3.80-9   The GNU version of the make util

- -- no debconf information

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFC3XVYdg0kG0+YFBERAo+sAJ9cNcZ4+D6V985qmeRobwMfpg1gjQCfaX0H
RhFxyLVKVps+wZQLIh5m3hg=
=7+Q9
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#318972: marked as done (libsoundtouch1: CXX 4.0 transition)

2005-07-19 Thread Debian Bug Tracking System
Your message dated Tue, 19 Jul 2005 18:00:32 -0400
with message-id [EMAIL PROTECTED]
and subject line Bug#318972: fixed in soundtouch 1.2.1-7
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 18 Jul 2005 23:00:15 +
From [EMAIL PROTECTED] Mon Jul 18 16:00:15 2005
Return-path: [EMAIL PROTECTED]
Received: from farad.aurel32.net [82.232.2.251] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1Dueat-0006T0-00; Mon, 18 Jul 2005 16:00:15 -0700
Received: from bode.aurel32.net ([2001:618:400:fc13:2e0:18ff:fea3:b80f])
by farad.aurel32.net with esmtps (TLS-1.0:RSA_AES_256_CBC_SHA:32)
(Exim 4.50)
id 1Dueas-su-8b; Tue, 19 Jul 2005 01:00:14 +0200
Received: from aurel32 by bode.aurel32.net with local (Exim 4.52)
id 1Dueas-0001TF-1r; Tue, 19 Jul 2005 01:00:14 +0200
Content-Type: text/plain; charset=us-ascii
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Aurelien Jarno [EMAIL PROTECTED]
To: Debian Bug Tracking System [EMAIL PROTECTED]
Subject: libsoundtouch1: CXX 4.0 transition
X-Mailer: reportbug 3.15
Date: Tue, 19 Jul 2005 01:00:14 +0200
Message-Id: [EMAIL PROTECTED]
Sender: Aurelien Jarno [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.8 required=4.0 tests=BAYES_00,FROM_ENDS_IN_NUMS,
HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: libsoundtouch1
Version: 1.2.1-6
Severity: serious

Even if it does not depends on libstdc++, libsoundtouch1 is a C++
library with a C++ interface.

Thus, even if this library is not present on most of the lists of
the packages affected by the CXX ABI transition, it *has* to be
transitioned.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.11.7
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to fr_FR.UTF-8)

Versions of packages libsoundtouch1 depends on:
ii  libc6   2.3.2.ds1-22 GNU C Library: Shared libraries an
ii  libgcc1 1:4.0.1-2GCC support library

libsoundtouch1 recommends no packages.

-- no debconf information

---
Received: (at 318972-close) by bugs.debian.org; 19 Jul 2005 22:09:41 +
From [EMAIL PROTECTED] Tue Jul 19 15:09:41 2005
Return-path: [EMAIL PROTECTED]
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1Dv0HV-0007pM-00; Tue, 19 Jul 2005 15:09:41 -0700
Received: from joerg by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1Dv08e-0005LA-00; Tue, 19 Jul 2005 18:00:32 -0400
From: Guenter Geiger (Debian/GNU) [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: lisa $Revision: 1.30 $
Subject: Bug#318972: fixed in soundtouch 1.2.1-7
Message-Id: [EMAIL PROTECTED]
Sender: Joerg Jaspert [EMAIL PROTECTED]
Date: Tue, 19 Jul 2005 18:00:32 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: soundtouch
Source-Version: 1.2.1-7

We believe that the bug you reported is fixed in the latest version of
soundtouch, which is due to be installed in the Debian FTP archive:

libsoundtouch1-dev_1.2.1-7_i386.deb
  to pool/main/s/soundtouch/libsoundtouch1-dev_1.2.1-7_i386.deb
libsoundtouch1c2_1.2.1-7_i386.deb
  to pool/main/s/soundtouch/libsoundtouch1c2_1.2.1-7_i386.deb
soundtouch_1.2.1-7.diff.gz
  to pool/main/s/soundtouch/soundtouch_1.2.1-7.diff.gz
soundtouch_1.2.1-7.dsc
  to pool/main/s/soundtouch/soundtouch_1.2.1-7.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Guenter Geiger (Debian/GNU) [EMAIL PROTECTED] (supplier of updated soundtouch 
package)

(This message was generated automatically at 

Bug#318971: marked as done (libsoundtouch1: /usr/lib/libSoundTouch.so.1 has undefined symbols)

2005-07-19 Thread Debian Bug Tracking System
Your message dated Tue, 19 Jul 2005 18:00:32 -0400
with message-id [EMAIL PROTECTED]
and subject line Bug#318971: fixed in soundtouch 1.2.1-7
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 18 Jul 2005 22:57:48 +
From [EMAIL PROTECTED] Mon Jul 18 15:57:48 2005
Return-path: [EMAIL PROTECTED]
Received: from farad.aurel32.net [82.232.2.251] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1DueYV-0006Bm-00; Mon, 18 Jul 2005 15:57:48 -0700
Received: from bode.aurel32.net ([2001:618:400:fc13:2e0:18ff:fea3:b80f])
by farad.aurel32.net with esmtps (TLS-1.0:RSA_AES_256_CBC_SHA:32)
(Exim 4.50)
id 1DueYT-sA-Q3; Tue, 19 Jul 2005 00:57:45 +0200
Received: from aurel32 by bode.aurel32.net with local (Exim 4.52)
id 1DueYT-0001SU-Ig; Tue, 19 Jul 2005 00:57:45 +0200
Content-Type: text/plain; charset=us-ascii
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Aurelien Jarno [EMAIL PROTECTED]
To: Debian Bug Tracking System [EMAIL PROTECTED]
Subject: libsoundtouch1: /usr/lib/libSoundTouch.so.1 has undefined symbols
X-Mailer: reportbug 3.15
Date: Tue, 19 Jul 2005 00:57:45 +0200
Message-Id: [EMAIL PROTECTED]
Sender: Aurelien Jarno [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.8 required=4.0 tests=BAYES_00,FROM_ENDS_IN_NUMS,
HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: libsoundtouch1
Version: 1.2.1-6
Severity: serious

libsoundtouch1 has undefined symbols

[bode:~]$ ldd -r /usr/lib/libSoundTouch.so.1
libm.so.6 = /lib/tls/i686/cmov/libm.so.6 (0xb7fb4000)
libgcc_s.so.1 = /lib/libgcc_s.so.1 (0xb7fa9000)
libc.so.6 = /lib/tls/i686/cmov/libc.so.6 (0xb7e73000)
/lib/ld-linux.so.2 = /lib/ld-linux.so.2 (0x8000)
undefined symbol: _ZTVN10__cxxabiv120__si_class_type_infoE 
(/usr/lib/libSoundTouch.so.1)
undefined symbol: _ZTISt9exception  (/usr/lib/libSoundTouch.so.1)
undefined symbol: __gxx_personality_v0  (/usr/lib/libSoundTouch.so.1)
undefined symbol: _ZTVN10__cxxabiv117__class_type_infoE 
(/usr/lib/libSoundTouch.so.1)
undefined symbol: __cxa_pure_virtual(/usr/lib/libSoundTouch.so.1)
undefined symbol: _ZNSt13runtime_errorD1Ev (/usr/lib/libSoundTouch.so.1)
undefined symbol: _ZTISt13runtime_error (/usr/lib/libSoundTouch.so.1)
undefined symbol: __cxa_free_exception  (/usr/lib/libSoundTouch.so.1)
undefined symbol: _Znaj (/usr/lib/libSoundTouch.so.1)
undefined symbol: _ZNSt9exceptionD2Ev   (/usr/lib/libSoundTouch.so.1)
undefined symbol: _ZdlPv(/usr/lib/libSoundTouch.so.1)
undefined symbol: __cxa_throw   (/usr/lib/libSoundTouch.so.1)
undefined symbol: _ZdaPv(/usr/lib/libSoundTouch.so.1)
undefined symbol: _ZNSsC1EPKcRKSaIcE(/usr/lib/libSoundTouch.so.1)
undefined symbol: __cxa_allocate_exception (/usr/lib/libSoundTouch.so.1)
undefined symbol: _Znwj (/usr/lib/libSoundTouch.so.1)
undefined symbol: _ZNSs4_Rep10_M_destroyERKSaIcE (/usr/lib/libSoundTouch.so.1)
undefined symbol: _ZNSt13runtime_errorC1ERKSs (/usr/lib/libSoundTouch.so.1)

All these symbols are mostly C++ symbols. It is probably because the
final link is done with gcc instead of g++, due to an old libtool.


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.11.7
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to fr_FR.UTF-8)

Versions of packages libsoundtouch1 depends on:
ii  libc6   2.3.2.ds1-22 GNU C Library: Shared libraries an
ii  libgcc1 1:4.0.1-2GCC support library

libsoundtouch1 recommends no packages.

-- no debconf information

---
Received: (at 318971-close) by bugs.debian.org; 19 Jul 2005 22:10:29 +
From [EMAIL PROTECTED] Tue Jul 19 15:10:29 2005
Return-path: [EMAIL PROTECTED]
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1Dv0IH-00088y-00; Tue, 19 Jul 2005 15:10:29 -0700
Received: from joerg by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1Dv08e-0005L8-00; Tue, 19 Jul 2005 18:00:32 -0400
From: Guenter Geiger (Debian/GNU) [EMAIL 

Bug#263337: FTBFS with gcc-3.4: parse error before string constant

2005-07-19 Thread Roger Leigh
The diff for the NMU was amended, due to the transitional package
causing problems.  It has now been removed.


Regards,
Roger


diff -urN dict-gcide-0.48.original/debian/changelog 
dict-gcide-0.48/debian/changelog
--- dict-gcide-0.48.original/debian/changelog   2005-07-19 20:35:08.0 
+0100
+++ dict-gcide-0.48/debian/changelog2005-07-19 22:32:46.306985376 +0100
@@ -1,3 +1,14 @@
+dict-gcide (0.48-4.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Apply patch from Andreas Jochens to allow building with
+GCC 3.4 and 4.0, replacing the non-standard preprocessor
+macro __FUNCTION__ with the C99 __func__ (Closes: #263337).
+  * debian/rules, debian/control: Remove statically-versioned
+dict-web1913 transitional package.
+
+ -- Roger Leigh [EMAIL PROTECTED]  Tue, 19 Jul 2005 22:31:41 +0100
+
 dict-gcide (0.48-4) unstable; urgency=low
 
   * Corrected format of Build-Depends-Indep: Closes: #218709
diff -urN dict-gcide-0.48.original/debian/control dict-gcide-0.48/debian/control
--- dict-gcide-0.48.original/debian/control 2005-07-19 20:35:08.0 
+0100
+++ dict-gcide-0.48/debian/control  2005-07-19 22:31:39.199187312 +0100
@@ -31,11 +31,3 @@
 Replaces: dict-web1913
 Conflicts: dict-web1913 (= 1.4-0.47pd-3)
 
-Package: dict-web1913
-Section: text
-Priority: optional
-Architecture: all
-Description: Empty package to assist the transition to dict-gcide 
- .
- This package may be removed after dict-gcide is installed.
-Depends: dict-gcide, debconf
diff -urN dict-gcide-0.48.original/debian/rules dict-gcide-0.48/debian/rules
--- dict-gcide-0.48.original/debian/rules   2005-07-19 20:35:08.0 
+0100
+++ dict-gcide-0.48/debian/rules2005-07-19 22:30:52.522283280 +0100
@@ -4,8 +4,8 @@
 ## rules ---
 ## Author   : Robert D. Hilliard hilliard@@debian.org
 ## Created On   : Sun, 19 Apr 1998 23:33:01 -0400
-## Last Modified By : Robert D. Hilliard hilliard@@debian.org
-## Last Modified On : Tue, 03 Jun 2003 17:47:17 -0400
+## Last Modified By : Roger Leigh [EMAIL PROTECTED]
+## Last Modified On : Tue, 19 Jul 2005 22:30:36 +0100
 ## Status   : $Id: rules,v 0.16 2003/06/03 21:48:14 bob Exp bob $
 ## Last Changes : $Log: rules,v $
 ## Last Changes : Revision 0.16  2003/06/03 21:48:14  bob
@@ -25,7 +25,6 @@
 
 # The name of the package (for example, `emacs').
 pkg1   := dict-gcide
-pkg2   := dict-web1913
 
 # Configuration variables (these should be pretty generic)
 CC = cc
@@ -43,7 +42,7 @@
 export LC_ALL=C
 
 FILES_TO_CLEAN  = debian/files debian/*~ *~ *.dict* *.index
-DIRS_TO_CLEAN   = debian/$(pkg1) debian/$(pkg2) 
+DIRS_TO_CLEAN   = debian/$(pkg1) 
 STAMPS_TO_CLEAN = stamp-configure stamp-build stamp-binary-indep
 DICTDIR = debian/$(pkg1)/usr/share/dictd
 
@@ -112,16 +111,6 @@
chown -R root.root   debian/$(pkg1)
dpkg --build debian/$(pkg1) ..
 
-   $(make_directory)debian/$(pkg2)/DEBIAN
-   $(install_program)   debian/postinst.web debian/$(pkg2)/DEBIAN/postinst
-   $(install_program)   debian/postrm.web debian/$(pkg2)/DEBIAN/postrm
-   $(install_program)   debian/config debian/$(pkg2)/DEBIAN/
-   $(install_file)  debian/templates debian/$(pkg2)/DEBIAN/
-
-   dpkg-gencontrol  -isp -p$(pkg2) -v1.4-0.47pd-9 -Pdebian/$(pkg2) 
-   chown -R root.root   debian/$(pkg2)
-   dpkg --build debian/$(pkg2) ..
-
touchstamp-binary-indep
 
 
diff -urN dict-gcide-0.48.original/libmaa/parse.c dict-gcide-0.48/libmaa/parse.c
--- dict-gcide-0.48.original/libmaa/parse.c 1998-02-22 19:32:36.0 
+
+++ dict-gcide-0.48/libmaa/parse.c  2005-07-19 20:38:19.674872128 +0100
@@ -75,7 +75,7 @@
 
if (!cpp) {
   if ((cpp = getenv( KHEPERA_CPP ))) {
- PRINTF(MAA_PARSE,(__FUNCTION__ : Using KHEPERA_CPP from %s\n,cpp));
+ PRINTF(MAA_PARSE,(%s: Using KHEPERA_CPP from %s\n,__func__,cpp));
   }
   
 /* Always look for gcc's cpp first, since
@@ -86,7 +86,7 @@
  
  if (fread( buf, 1, 1023, tmp )  0) {
 if ((t = strchr( buf, '\n' ))) *t = '\0';
-PRINTF(MAA_PARSE,(__FUNCTION__ : Using GNU cpp from %s\n,buf));
+PRINTF(MAA_PARSE,(%s: Using GNU cpp from %s\n,__func__,buf));
 cpp = str_find( buf );
 extra_options = -nostdinc -nostdinc++;
  }
@@ -103,7 +103,7 @@
  for (pt = cpps; **pt; pt++) {
 if (!access( *pt, X_OK )) {
PRINTF(MAA_PARSE,
-  (__FUNCTION__ : Using system cpp from %s\n,*pt));
+  (%s: Using system cpp from %s\n,__func__,*pt));
cpp = *pt;
break;
 }
@@ -111,8 +111,8 @@
   }
   
   if (!cpp)
-err_fatal( __FUNCTION__,
-   Cannot locate cpp -- set KHEPERA_CPP to cpp's path\n );
+err_fatal(%s:Cannot locate cpp -- set KHEPERA_CPP to cpp's path\n,
+  

Bug#308810: marked as done (FTBFS with g++-4.0)

2005-07-19 Thread Debian Bug Tracking System
Your message dated Tue, 19 Jul 2005 17:41:32 -0400
with message-id [EMAIL PROTECTED]
and subject line Bug#308810: fixed in jade 1.2.1-44
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 12 May 2005 13:04:35 +
From [EMAIL PROTECTED] Thu May 12 06:04:35 2005
Return-path: [EMAIL PROTECTED]
Received: from mail.cs.tu-berlin.de [130.149.17.13] (root)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DWDMg-0002et-00; Thu, 12 May 2005 06:04:34 -0700
Received: from mailhost.cs.tu-berlin.de ([EMAIL PROTECTED] [130.149.17.13])
by mail.cs.tu-berlin.de (8.9.3p2/8.9.3) with ESMTP id PAA03559
for [EMAIL PROTECTED]; Thu, 12 May 2005 15:04:31 +0200 (MEST)
Received: from localhost (localhost [127.0.0.1])
by mailhost.cs.tu-berlin.de (Postfix) with ESMTP id 830CCFB5F
for [EMAIL PROTECTED]; Thu, 12 May 2005 15:04:30 +0200 (MEST)
Received: from mailhost.cs.tu-berlin.de ([127.0.0.1])
 by localhost (bueno [127.0.0.1]) (amavisd-new, port 10224) with ESMTP
 id 27452-09 for [EMAIL PROTECTED];
 Thu, 12 May 2005 15:04:30 +0200 (MEST) 13978
Received: from bolero.cs.tu-berlin.de (bolero.cs.tu-berlin.de [130.149.19.1])
by mailhost.cs.tu-berlin.de (Postfix) with ESMTP
for [EMAIL PROTECTED]; Thu, 12 May 2005 15:04:30 +0200 (MEST)
Received: (from [EMAIL PROTECTED])
by bolero.cs.tu-berlin.de (8.12.10+Sun/8.12.8/Submit) id j4CD4UNd028380;
Thu, 12 May 2005 15:04:30 +0200 (MEST)
From: Matthias Klose [EMAIL PROTECTED]
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: [EMAIL PROTECTED]
Date: Thu, 12 May 2005 15:04:30 +0200
To: [EMAIL PROTECTED]
Subject: FTBFS with g++-4.0
X-Mailer: VM 7.17 under 21.4 (patch 17) Jumbo Shrimp XEmacs Lucid
X-Virus-Scanned: by amavisd-new at cs.tu-berlin.de
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.4 required=4.0 tests=BAYES_00,HAS_PACKAGE,
UPPERCASE_25_50 autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: jade
Severity: important
Version: 1.2.1-43

 g++-4.0 -g -pipe -D_REENTRANT -O2 -fno-implicit-templates -I. -I./../include 
-I./../generic -DPACKAGE_NAME=\\ -DPACKAGE_TARNAME=\\ 
-DPACKAGE_VERSION=\\ -DPACKAGE_STRING=\\ -DPACKAGE_BUGREPORT=\\ 
-DSTDC_HEADERS=1 -DHAVE_SYS_TYPES_H=1 -DHAVE_SYS_STAT_H=1 -DHAVE_STDLIB_H=1 
-DHAVE_STRING_H=1 -DHAVE_MEMORY_H=1 -DHAVE_STRINGS_H=1 -DHAVE_INTTYPES_H=1 
-DHAVE_STDINT_H=1 -DHAVE_UNISTD_H=1 -DHAVE_LIMITS_H=1 
-DHAVE_STRUCT_STAT_ST_BLKSIZE=1 -DHAVE_ST_BLKSIZE=1 -DSP_HAVE_BOOL=1 
-DSP_HAVE_LOCALE=1 -DSP_ANSI_CLASS_INST=1 -DSP_HAVE_SOCKET=1 -DJADE_MIF=1 
-DJADE_HTML=1 -DSP_MULTI_BYTE=1 
-DSGML_CATALOG_FILES_DEFAULT=\/etc/sgml/catalog\ 
-DSGML_SEARCH_PATH_DEFAULT=\/usr/local/share/sgml:/usr/share/sgml\ 
-DHAVE_DLFCN_H=1 -c CharsetInfo.cxx  -fPIC -DPIC -o .libs/CharsetInfo.o
./../include/RangeMap.h: In instantiation of 'RangeMapIterWideChar, UnivChar':
./../include/UnivCharsetDesc.h:86:   instantiated from here
./../include/RangeMap.h:57: error: 'class VectorRangeMapRangeFrom, To 
::const_iterator' resolves to 'const RangeMapRangeWideChar, UnivChar*', 
which is is not a class type
make[3]: *** [CharsetInfo.lo] Error 1
make[3]: Leaving directory `/home/packages/cxx/jade-1.2.1/lib'

---
Received: (at 308810-close) by bugs.debian.org; 19 Jul 2005 21:53:37 +
From [EMAIL PROTECTED] Tue Jul 19 14:53:37 2005
Return-path: [EMAIL PROTECTED]
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1Dv01w-00038i-00; Tue, 19 Jul 2005 14:53:36 -0700
Received: from joerg by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1DuzqG-0003Tc-00; Tue, 19 Jul 2005 17:41:32 -0400
From: Neil Roeth [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: lisa $Revision: 1.30 $
Subject: Bug#308810: fixed in jade 1.2.1-44
Message-Id: [EMAIL PROTECTED]
Sender: Joerg Jaspert [EMAIL PROTECTED]
Date: Tue, 19 Jul 2005 17:41:32 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: jade

Processed: Fixed in NMU of freeglut 2.2.0-8.1

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tag 296242 + fixed
Bug#296242: freeglut: FTBFS (amd64/gcc-4.0): invalid lvalue in assignment
Tags were: patch
Tags added: fixed

 quit
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#315671: webcalendar unauthorized access

2005-07-19 Thread Martin Schulze
Stephen Gran wrote:
 Hello all,
 
 There is a security bug in webcalendar (#315671 and
 http://www.securityfocus.com/bid/14072, for reference).  Tim is the
 maintainer, but does not yet have a debian account, and cannot upload.
 We have a fixed version for sarge ready (patch attached).  I am happy to
 upload it for Tim, or you could based on the attached patch.  Please let
 us know which way you want to handle this.  Tim is copied on this mail,
 please keep both of us in the follow ups.
 
 There is as yet no CVE, but the bugtraq ID is 14072.

Just got it:

==
Candidate: CAN-2005-2320
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2320
Reference: BID:14072
Reference: URL:http://www.securityfocus.com/bid/14072

WebCalendar before 1.0.0 does not properly restrict access to
assistant_edit.php, which allows remote attackers to gain privileges.


Regards,

Joey

-- 
Whenever you meet yourself you're in a time loop or in front of a mirror.

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: BTS clean-up with new features

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 found 305605 2.4.6-2woody1
Bug#305605: CAN-2005-0718: remote DoS from aborted connections
Bug marked as found in version 2.4.6-2woody1.

 close 305605 2.5.8-1
Bug#305605: CAN-2005-0718: remote DoS from aborted connections
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 2.5.8-1, send any further explanations to Geoff 
Crompton [EMAIL PROTECTED]

 found 309504 2.4.6-2woody1
Bug#309504: CAN-2005-1519: DNS Spoofing
Bug marked as found in version 2.4.6-2woody1.

 close 309504 2.5.9-9
Bug#309504: CAN-2005-1519: DNS Spoofing
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 2.5.9-9, send any further explanations to Martin 
Pitt [EMAIL PROTECTED]

 close 309504 2.4.6-2woody9
Bug#309504: CAN-2005-1519: DNS Spoofing
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 2.4.6-2woody9, send any further explanations to 
Martin Pitt [EMAIL PROTECTED]

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#319121: FTBFS: Missing build-dependency on libselinux1-dev

2005-07-19 Thread Matt Kraai
Package: groff
Version: 1.18.1.1-8
Severity: serious
Tags: patch

groff fails to build because it cannot find libselinux:

gcc -m32 -o gxditview -g -O2 -fno-strict-aliasing   -L/usr/X11R6/lib   
xditview.o   Dvi.o   draw.o   font.o   lex.o   page.o   parse.o   XFontName.o   
DviChar.o   device.o -lXaw -lXmu -lXt -lSM -lICE -lXpm -lXp -lXext -lX11   
-lselinux   -lm
/usr/bin/ld: cannot find -lselinux
collect2: ld returned 1 exit status
make[1]: *** [gxditview] Error 1
make[1]: Leaving directory `/tmp/buildd/groff-1.18.1.1/src/xditview'
make: *** [build-groff-x11] Error 2

The attached patch adds a build-dependency on libselinux1-dev, which
fixes this problem.

-- 
Matt
diff -u groff-1.18.1.1/debian/control groff-1.18.1.1/debian/control
--- groff-1.18.1.1/debian/control
+++ groff-1.18.1.1/debian/control
@@ -4,7 +4,7 @@
 Maintainer: Colin Watson [EMAIL PROTECTED]
 Uploaders: Fumitoshi UKAI [EMAIL PROTECTED]
 Standards-Version: 3.6.1
-Build-Depends: byacc, debhelper (= 3.0.9), gs, netpbm, psutils, xutils, 
libxaw7-dev | libxaw-dev, xlibs-dev
+Build-Depends: byacc, debhelper (= 3.0.9), gs, netpbm, psutils, xutils, 
libxaw7-dev | libxaw-dev, xlibs-dev, libselinux1-dev
 
 Package: groff-base
 Architecture: any


signature.asc
Description: Digital signature


Bug#319120: FTBFS: Unable to find libXxf86vm

2005-07-19 Thread Matt Kraai
Package: 3ddesktop
Version: 0.2.8-1
Severity: serious

3ddesktop fails to build because it cannot find libXxf86vm (presumably
due to the X.org packages):

checking for XF86VidModeSetViewPort in -lXxf86vm... no
configure: error: libXxf86vm is needed to compile 3ddesktop
make: *** [config.status] Error 1

-- 
Matt


signature.asc
Description: Digital signature


Processed: severity/ merge

2005-07-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 318742 important
Bug#318742: dependency problem
Severity set to `important'.

 retitle 318742 gnomemeeting: uninstallable [C++ transition]
Bug#318742: dependency problem
Changed Bug title.

 merge 319051 318742
Bug#318742: gnomemeeting: uninstallable [C++ transition]
Bug#319051: gnomemeeting: uninstallable [C++ transition]
Bug#318679: gnomemeeting: uninstallable [C++ transition]
Merged 318679 318742 319051.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#296242: Fixed in NMU of freeglut 2.2.0-8.1

2005-07-19 Thread Jamie Wilkinson
I was holding off an upload because of the libGLU c++ transition.  Did you
take that into account?

Also, last I checked, contacting the maintainer was a required step in an
NMU.  When were you planning on letting me know your intentions?

This one time, at band camp, Roger Leigh wrote:
tag 296242 + fixed

quit

This message was generated automatically in response to a
non-maintainer upload.  The .changes file follows.

Format: 1.7
Date: Tue, 19 Jul 2005 23:15:25 +0100
Source: freeglut
Binary: freeglut3-dbg freeglut3-dev freeglut3
Architecture: source powerpc
Version: 2.2.0-8.1
Distribution: unstable
Urgency: low
Maintainer: Jamie Wilkinson [EMAIL PROTECTED]
Changed-By: Roger Leigh [EMAIL PROTECTED]
Description: 
 freeglut3  - OpenGL Utility Toolkit
 freeglut3-dbg - OpenGL Utility Toolkit debugging information
 freeglut3-dev - OpenGL Utility Toolkit development files
Closes: 296242
Changes: 
 freeglut (2.2.0-8.1) unstable; urgency=low
 .
   * Non-maintainer upload.
   * Apply patch from Paul Brook to fix build failure with GCC 4.0
 (Closes: #296242).
Files: 
 07ee1c6928724b630d8c3e4d366501dc 714 graphics optional freeglut_2.2.0-8.1.dsc
 e3ce5cde7f0a4d02ecd94f30b19293c0 14187 graphics optional 
 freeglut_2.2.0-8.1.diff.gz
 229743b2c08719a8ba2460d6b4d1bd61 78326 libs optional 
 freeglut3_2.2.0-8.1_powerpc.deb
 8b611f0813fd01ed04bcbd3b8ecc9973 149726 libdevel optional 
 freeglut3-dev_2.2.0-8.1_powerpc.deb
 cb146c060ad99335ef825b28736e7e90 113120 libdevel optional 
 freeglut3-dbg_2.2.0-8.1_powerpc.deb



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#318525: atlas: FTBFS: Memory inputs not directly addressable

2005-07-19 Thread Matt Kraai
On Tue, Jul 19, 2005 at 07:20:47PM +0100, Roger Leigh wrote:
 Matt Kraai [EMAIL PROTECTED] writes:
 
  On Sun, Jul 17, 2005 at 10:09:52PM -0700, Matt Kraai wrote:
  On Sun, Jul 17, 2005 at 08:25:21PM +0100, Roger Leigh wrote:
   Is this still reproducible with a current etch or sid system?
   
   Also, your bug report did not state the architecture, subarchitecture
   or compiler you were using, not the distribution you built on.  Given
   that this is using ASM, this will affect which platforms can reproduce
   it.
 
  As I mentioned before, this failure occurred on i386.  I was using gcc
  4:4.0.0-2 in a sid pbuilder chroot.
 
  I was able to reproduce the failure.
 
 Thanks.  As a powerpc user, I'm afraid I can't do much more here...

If you're a developer, there are a number of i386 machines that you
can access remotely.  See

 http://db.debian.org/machines.cgi

for more information.

-- 
Matt


signature.asc
Description: Digital signature


Bug#319126: debtags: breaks in postinst

2005-07-19 Thread Steinar H. Gunderson
Package: debtags
Version: 1.1
Severity: serious

Every time I try to do something with apt, it tries to configure
debtags:

Setting up debtags (1.1) ...
Get:1 http://people.debian.org/~enrico/tags/tags-current.gz [144kB]
Get:2 http://people.debian.org/~enrico/tags/vocabulary.gz [7978B]
Fetched 152kB in 2s (70.1kB/s)   
Source http://people.debian.org/~enrico/tags/ has problems: ignoring it
debtags: ConsistencyCheckException: Unable to use any data source (not
even previously cached ones)

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.11.8
Locale: LANG=en_DK.UTF-8, LC_CTYPE=en_DK.UTF-8 (charmap=UTF-8)

Versions of packages debtags depends on:
ii  apt [libapt-pkg-libc6.3-5-3.9 0.6.38 Advanced front-end for dpkg
ii  libc6 2.3.5-1GNU C Library: Shared libraries an
ii  libgcc1   1:4.0.0-12 GCC support library
ii  libstdc++51:3.3.6-7  The GNU Standard C++ Library v3
ii  libtdb1   1.0.6-13   Trivial Database - shared library
ii  zlib1g1:1.2.2-8  compression library - runtime

debtags recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#315703: Bug#316590: woody backport now available for all cacti security issues

2005-07-19 Thread Sean Finney
and (hopefully,) a final update...

On Tue, Jul 19, 2005 at 10:52:43AM +0200, Martin Schulze wrote:
  2 is trickier.  we could either repeat the process i'm about finished
  with wrt mysql_foo for all the functions that pass variables to
  mysql_foo, or we could do the sanity checking in the function.  as
  the former sounds ugly and even more time consuming i'm going to
  side with thte latter. 
 
 The less work and the less intrusive the patch the better.

this is done now.  turns out all the db-querying functions included
a database.php file at the beginning of the function, which then
included config.php, which then included sanitize.php.

  what i think i'm going to do is split sanitize.php into sanitize and
  sanitize-functions.  sanitize will include_once sanitize-functions,
  so then sanitize can be included multiple times (otherwise i believe
  that php will bitch about functions being redefined), and i'll just
  slip in a line in each mysql-calling function to include sanitize,
  and add the variables in said functions to sanitize.php.
 
 Sounds good.

this is done now.

  as for 3, well... there's a variable, which is stored in a cookie.
  the cookie name is cactilogin, and the value is an integer.  want to
  guess what it does?  a fix for this shouldn't be too hard, this kind
  of info should be stored in the session and not in the cookie.
 
 Hmm, having the user id stored in a cookie is common practice.
 The variable obviously needs to be sanitised as well.

the sanitizing functions now check all of get/post/cookie (and global
scoped variables for one of them too because it changes their value),
which after thinking about it seemed safer since there's no penalty for
unset variables other than a few wasted cycles.

as for the id thing, what i'm suspecting is that most/all pages are
accepting the value of that cookie as the logged in userid without making
sure the user is authenticated.  but, i'm willing to keep my head in the
sand and not dig deep enough to find out whether or not this really is
a problem, because i'm just so fucking tired of dealing with this.

anyway, all the goodies are at

http://people.debian.org/~seanius/cacti/woody

and attached is the interdiff between oldstable and my patch (i believe
it also includes the latest changelog changes from you too, might want
to doublecheck that).



sean

-- 
diff -u cacti-0.6.7/include/config.php cacti-0.6.7/include/config.php
--- cacti-0.6.7/include/config.php
+++ cacti-0.6.7/include/config.php
@@ -23,6 +23,21 @@
 */?
 ?
 
+/* whether or not we pull from a db, we need re-initilize */
+global $config;
+
+/* test for suspicious user-supplied variables that would otherwise
+   affect program execution, and if so zero out config for safety */
+if(isset($_GET[do_not_read_config]) || isset($_POST[do_not_read_config])
+   || isset($_GET[config]) || isset($_POST[config])){
+$config = array();
+}
+$colors = array();
+
+## debian security backport ##
+require_once(sanitize.php);
+## debian security backport ##
+
 ## Debian packaging ##
 include(/etc/cacti/config.php);
 ## Debian packaging ##
@@ -30,9 +45,6 @@
 /* make sure this variable reflects your operating system type: 'unix' or 
'win32' */
 $cacti_server_os = unix;
 
-/* whether or not we pull from a db, we need re-initilize */
-global $config;
-
 if ($do_not_read_config != true) {
if (isset($config) == false) {
/* make a connection to the database */
diff -u cacti-0.6.7/debian/changelog cacti-0.6.7/debian/changelog
--- cacti-0.6.7/debian/changelog
+++ cacti-0.6.7/debian/changelog
@@ -1,3 +1,34 @@
+cacti (0.6.7-2.5) oldstable-security; urgency=high
+
+  * retooled version of the sanity checking patch, including a much
+more comprehensive list of variable names to check.  the patch also
+checks for discrepencies in any of the three G/P/C variables, and
+should address variables indirectly passed to sql queries.
+
+ -- sean finney [EMAIL PROTECTED]  Tue, 19 Jul 2005 20:41:10 -0400
+
+cacti (0.6.7-2.4) oldstable-security; urgency=high
+
+  * Non-maintainer upload by the Security Team
+  * Switched to using $_REQUEST instead of $_GET and $_POST since this
+version only uses $foo which is similar to $_REQUEST[foo]
+  * Reduced the number of tested variables to those actually used.
+
+ -- Martin Schulze [EMAIL PROTECTED]  Fri, 15 Jul 2005 16:06:58 +0200
+
+cacti (0.6.7-2.3) oldstable-security; urgency=high
+  
+  * update prepared for the security team by new maintainer.
+  * include backported updates against the two latest cacti security
+releases.  this includes the following CAN id's:
+- CAN-2005-1524 (idefense remote file inclusion)
+- CAN-2005-1525 (idefense SQL injection)
+- CAN-2005-1526 (idefense remote code execution)
+- CAN-2005-2148 (hardened-php advisories 032005 and 042005)
+- CAN-2005-2149 (hardened-php advisory 052005)
+
+ -- sean finney [EMAIL PROTECTED]  Mon, 11 Jul 2005 20:35:12 -0400
+
 cacti 

Bug#318672: mozilla-firefox: should probably conflict with mozilla-tabextensions 1.14.2005051901-1

2005-07-19 Thread Eric Dorland
* Vincent Lefevre ([EMAIL PROTECTED]) wrote:
 On 2005-07-17 12:09:46 +0200, Mike Hommey wrote:
  If i got it correctly, this bug got introduced because of the changes to
  the security model for XUL applications... so, for once, we can't really
  blame the it should have been a bug-fix release only, since it is what
  it was, except that security fixes has side effects.
 
 The Debian changelog just says:
 
   * New upstream release, fixes security issues. (Closes: #318061)
   * debian/rules: Disable freetype in the build for the time being. This
 *might* break printing in some cases.
   * gfx/idl/nsIFreeType2.idl, gfx/src/freetype/nsFreeType.cpp,
 gfx/src/freetype/nsFreeType.h, gfx/src/ps/nsFontMetricsPS.cpp,
 gfx/src/ps/nsFontMetricsPS.h, gfx/src/x11shared/nsFontFreeType.cpp,
 gfx/src/x11shared/nsFontFreeType.h,
 layout/svg/renderer/src/libart/nsSVGLibartGlyphMetricsFT.cpp: Patch
 from bz#234035 to try to get building with the new freetype. (Closes:
 #314243)
 
 I can see nothing there that this can break extensions.

Firefox is not a shared library. I don't remember any guarantee
things wouldn't break between releases. 

 And if due to the change of the security model for XUL applications,
 it is known to break some extensions, I really think that the conflict
 should be marked in the packages (in mozilla-firefox, since this is
 where the change happens). Hence the bug.

Umm, that makes no sense. I'm not going to track all the extensions
every release to see if they break, that's their maintainers job.

Anyway, this whole thing is moot, the breakage was not known until
after the release. 1.0.6 has just been released to fix the API.

 In a similar way, if a library changes its ABI, one doesn't expect the
 packages that use it to silently break just because of the upgrade.

Firefox is not a library, new versions can and will break things. You
can bet your ass Firefox 1.1 will break things.

 The user needs to know if an upgrade will break packages.

This is unstable, things break. If you can't handle it, don't use
unstable. 

-- 
Eric Dorland [EMAIL PROTECTED]
ICQ: #61138586, Jabber: [EMAIL PROTECTED]
1024D/16D970C6 097C 4861 9934 27A0 8E1C  2B0A 61E9 8ECF 16D9 70C6

-BEGIN GEEK CODE BLOCK-
Version: 3.12
GCS d- s++: a-- C+++ UL+++ P++ L++ E++ W++ N+ o K- w+ 
O? M++ V-- PS+ PE Y+ PGP++ t++ 5++ X+ R tv++ b+++ DI+ D+ 
G e h! r- y+ 
--END GEEK CODE BLOCK--


signature.asc
Description: Digital signature


Bug#318062: mozilla-browser: version 1.7.9 fixes security bugs

2005-07-19 Thread Takuo KITAME
2005-07-13 (水) の 09:25 +0200 に Florian Weimer さんは書きました:
 Package: mozilla-browser
 Version: 2:1.7.8-1
 Severity: grave
 Tags: security
 Justification: user security hole
 
 Mozilla 1.7.9 fixes several security bugs, one of them rated critical.
 Unfortunately, details for this bug are embargoed until at least July
 20, 2005. 8-(

1.7.9 is still not released yet.
pending.

-- 
Takuo KITAME



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#318959: libc6: unreproducible on powerpc

2005-07-19 Thread Paul Brossier
Package: libc6
Version: 2.3.2.ds1-22
Followup-For: Bug #318959

for info, i have been testing both testcases on powerpc and could not reproduce
the issue.

bye, piem 

$ for c in 3.3 3.4 4.0; do for o in 0 1 2 3 ; do printf gcc-%s 
-O%s\t $c $o; gcc-$c -W -Wall -O$o  -std=c99 ki.c -lm; ./a.out; done; done
gcc-3.3 -O0 1.048660e+06 1048660 1048660
gcc-3.3 -O1 1.048660e+06 1048660 1048660
gcc-3.3 -O2 1.048660e+06 1048660 1048660
gcc-3.3 -O3 1.048660e+06 1048660 1048660
gcc-3.4 -O0 1.048660e+06 1048660 1048660
gcc-3.4 -O1 1.048660e+06 1048660 1048660
gcc-3.4 -O2 1.048660e+06 1048660 1048660
gcc-3.4 -O3 1.048660e+06 1048660 1048660
gcc-4.0 -O0 1.048660e+06 1048660 1048660
gcc-4.0 -O1 1.048660e+06 1048660 1048660
gcc-4.0 -O2 1.048660e+06 1048660 1048660
gcc-4.0 -O3 1.048660e+06 1048660 1048660


$ for c in 3.3 3.4 4.0; do for o in 0 1 2 3 ; do printf gcc-%s 
-O%s\t $c $o; gcc-$c -W -Wall -O$o  -std=c99 ki.c -lm; ./a.out; done; done
gcc-3.3 -O0 1048370 1048660
gcc-3.3 -O1 1048370 1048660
gcc-3.3 -O2 1048370 1048660
gcc-3.3 -O3 1048370 1048660
gcc-3.4 -O0 1048370 1048660
gcc-3.4 -O1 1048370 1048660
gcc-3.4 -O2 1048370 1048660
gcc-3.4 -O3 1048370 1048660
gcc-4.0 -O0 1048370 1048660
gcc-4.0 -O1 1048370 1048660
gcc-4.0 -O2 1048370 1048660
gcc-4.0 -O3 1048370 1048660


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: powerpc (ppc)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-rc5-powerpc
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)

Versions of packages libc6 depends on:
ii  libdb1-compat 2.1.3-7The Berkeley database routines [gl

libc6 recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#319135: kmail: SIGSEGV QString::QString () from /usr/lib/libqt-mt.so.3

2005-07-19 Thread Bob Tanner
Package: kmail
Version: 4:3.3.2-3
Severity: grave
Justification: renders package unusable


Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 1110622880 (LWP 1841)]
0x40e1395b in QString::QString () from /usr/lib/libqt-mt.so.3
(gdb) bt
#0  0x40e1395b in QString::QString () from /usr/lib/libqt-mt.so.3
#1  0x41551ea5 in KPIM::Identity::Identity ()
   from /usr/lib/libkpimidentities.so.1
#2  0x415551d2 in KPIM::IdentityManager::functions ()
   from /usr/lib/libkpimidentities.so.1
#3  0x415552eb in KPIM::IdentityManager::functions ()
   from /usr/lib/libkpimidentities.so.1
#4  0x41558965 in QMemArraychar::detach ()
   from /usr/lib/libkpimidentities.so.1
#5  0x4154ac85 in _init () from /usr/lib/libkpimidentities.so.1
#6  0x4000c1ce in _dl_catch_error () from /lib/ld-linux.so.2
#7  0x4000c2ba in _dl_init () from /lib/ld-linux.so.2
#8  0x4c5d in ?? () from /lib/ld-linux.so.2


Script started on Wed Jul 20 00:10:36 2005
$ strace kmila   ail

execve(/usr/bin/kmail, [kmail], [/* 12 vars */]) = 0

uname({sys=Linux, node=mom, ...})   = 0

brk(0)  = 0x804c000

old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 
0x40017000

access(/etc/ld.so.nohwcap, F_OK)  = -1 ENOENT (No such file or directory)

open(/etc/ld.so.preload, O_RDONLY)= -1 ENOENT (No such file or directory)

open(/etc/ld.so.cache, O_RDONLY)  = 3

fstat64(3, {st_mode=S_IFREG|0644, st_size=53066, ...}) = 0

old_mmap(NULL, 53066, PROT_READ, MAP_PRIVATE, 3, 0) = 0x40018000

close(3)= 0

access(/etc/ld.so.nohwcap, F_OK)  = -1 ENOENT (No such file or directory)

open(/usr/lib/libkmailprivate.so.0, O_RDONLY) = 3

read(3, \177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0\220~\22..., 512) = 512

fstat64(3, {st_mode=S_IFREG|0644, st_size=4351600, ...}) = 0

old_mmap(NULL, 4360308, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0x40025000

old_mmap(0x40421000, 180224, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 3, 
0x3fb000) = 0x40421000

old_mmap(0x4044d000, 2164, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x4044d000

close(3)= 0

access(/etc/ld.so.nohwcap, F_OK)  = -1 ENOENT (No such file or directory)

open(/usr/lib/libstdc++.so.5, O_RDONLY) = 3

read(3, \177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0\320\277..., 512) = 512

fstat64(3, {st_mode=S_IFREG|0644, st_size=737532, ...}) = 0

old_mmap(NULL, 761152, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0x4044e000

old_mmap(0x404fe000, 20480, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 3, 
0xaf000) = 0x404fe000

old_mmap(0x40503000, 19776, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x40503000

close(3)= 0

access(/etc/ld.so.nohwcap, F_OK)  = -1 ENOENT (No such file or directory)

open(/lib/tls/libm.so.6, O_RDONLY)= 3

read(3, \177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\5\0\000..., 512) = 
512

fstat64(3, {st_mode=S_IFREG|0644, st_size=134496, ...}) = 0

old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 
0x40508000

old_mmap(NULL, 136976, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0x40509000

old_mmap(0x4052a000, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 3, 
0x2) = 0x4052a000

close(3)= 0

access(/etc/ld.so.nohwcap, F_OK)  = -1 ENOENT (No such file or directory)

open(/lib/libgcc_s.so.1, O_RDONLY)= 3

read(3, \177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\\30\0..., 512) = 512

fstat64(3, {st_mode=S_IFREG|0644, st_size=41156, ...}) = 0

old_mmap(NULL, 44296, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0x4052b000

old_mmap(0x40535000, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 3, 
0x9000) = 0x40535000

close(3)= 0

access(/etc/ld.so.nohwcap, F_OK)  = -1 ENOENT (No such file or directory)

open(/lib/tls/libc.so.6, O_RDONLY)= 3

read(3, \177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0`Z\1\000..., 512) = 512

fstat64(3, {st_mode=S_IFREG|0755, st_size=1254468, ...}) = 0

old_mmap(NULL, 1264780, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0x40536000

old_mmap(0x4066, 36864, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 3, 
0x129000) = 0x4066

old_mmap(0x40669000, 7308, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x40669000

close(3)= 0

access(/etc/ld.so.nohwcap, F_OK)  = -1 ENOENT (No such file or directory)

open(/usr/lib/libkdecore.so.4, O_RDONLY) = 3

read(3, \177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0\200~\n..., 512) = 512

fstat64(3, {st_mode=S_IFREG|0644, st_size=2264432, ...}) = 0

old_mmap(NULL, 2272476, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0x4066b000

old_mmap(0x40884000, 65536, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 3, 
0x219000) = 0x40884000

old_mmap(0x40894000, 7388, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) =