Bug#361675: marked as done ([i386] kernel requirement needs to be updated to 2.4.)

2006-04-11 Thread Debian Bug Tracking System
Your message dated Tue, 11 Apr 2006 07:56:15 +0200
with message-id [EMAIL PROTECTED]
and subject line Bug#361675: [i386] kernel requirement needs to be updated to 
2.4.
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: apt
Version: 0.6.43.3
Severity: normal


After a dist-upgrade this morning, apt-get starts to emit the following 
traceback
right after it finishes downloading packages:

...
Fetched 2205kB in 4s (468kB/s)
Traceback (most recent call last):
  File /usr/bin/apt-listchanges, line 30, in ?
import apt_pkg
ImportError: libstdc++.so.6: cannot handle TLS data
...

I'm unsure whether this is a dependency problem for apt (maybe it should
link to an older libstdc++6?), or a libstdc++ regression (built with less
features than the gcc4.0 version?).  But since (so far) I only see this
problem with apt, I'm filing it here.

-- Package-specific info:

-- apt-config dump --

APT ;
APT::Architecture i386;
APT::Build-Essential ;
APT::Build-Essential:: build-essential;
Dir /;
Dir::State var/lib/apt/;
Dir::State::lists lists/;
Dir::State::cdroms cdroms.list;
Dir::State::userstatus status.user;
Dir::State::status /var/lib/dpkg/status;
Dir::Cache var/cache/apt/;
Dir::Cache::archives archives/;
Dir::Cache::srcpkgcache srcpkgcache.bin;
Dir::Cache::pkgcache pkgcache.bin;
Dir::Etc etc/apt/;
Dir::Etc::sourcelist sources.list;
Dir::Etc::sourceparts sources.list.d;
Dir::Etc::vendorlist vendors.list;
Dir::Etc::vendorparts vendors.list.d;
Dir::Etc::main apt.conf;
Dir::Etc::parts apt.conf.d;
Dir::Etc::preferences preferences;
Dir::Bin ;
Dir::Bin::methods /usr/lib/apt/methods;
Dir::Bin::dpkg /usr/bin/dpkg;
DPkg ;
DPkg::Pre-Install-Pkgs ;
DPkg::Pre-Install-Pkgs:: /usr/bin/apt-listchanges --apt || test $? -ne 10;
DPkg::Pre-Install-Pkgs:: /usr/sbin/dpkg-preconfigure --apt || true;
DPkg::Tools ;
DPkg::Tools::Options ;
DPkg::Tools::Options::/usr/bin/apt-listchanges ;
DPkg::Tools::Options::/usr/bin/apt-listchanges::Version 2;

-- (no /etc/apt/preferences present) --


-- /etc/apt/sources.list --

deb http://ftp.debian.skynet.be/ftp/debian/ testing main contrib non-free
deb-src http://ftp.debian.skynet.be/ftp/debian/ testing main contrib non-free

deb http://security.debian.org/ testing/updates main contrib non-free

deb http://ftp.debian-unofficial.org/debian/ stable main contrib non-free

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.4.27-2-686-smp
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages apt depends on:
ii  libc6 2.3.6-3GNU C Library: Shared libraries an
ii  libgcc1   1:4.1.0-1  GCC support library
ii  libstdc++64.1.0-1The GNU Standard C++ Library v3

Versions of packages apt recommends:
ii  debian-archive-keyring2006.01.18 GnuPG archive keys of the Debian a

-- no debconf information

---End Message---
---BeginMessage---
Hi,

I haven't seen this bug has been cloned and reassign to the glibc.

glibc 2.3.6-6 is now in incoming and has, among others, the following
changes:
- kernel requirement updated to 2.4.0
- patch (from Petr Salinger) to support TLS with 2.4 kernels on i386

I am therefore closing this bug.

Bye,
Aurelien

-- 
  .''`.  Aurelien Jarno | GPG: 1024D/F1BCDB73
 : :' :  Debian developer   | Electrical Engineer
 `. `'   [EMAIL PROTECTED] | [EMAIL PROTECTED]
   `-people.debian.org/~aurel32 | www.aurel32.net
---End Message---


Processed: Security

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 361853 + security
Bug#361853: phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2
There were no tags set.
Tags added: security

 tags 361854 + security
Bug#361854: function *() php/apache Crash PHP 4.4.2 and 5.1.2
There were no tags set.
Tags added: security

 tags 361855 + security
Bug#361855: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2
There were no tags set.
Tags added: security

 tags 361856 + security
Bug#361856: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2
There were no tags set.
Tags added: security


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: reopening

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 reopen 360387
Bug#360387: wpasupplicant: please support the old daemon mode as an 
configuration option
Bug reopened, originator not changed.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#360387: reopening

2006-04-11 Thread Joerg Friedrich
reopen 360387
thanks


Package: wpasupplicant
Version: 0.4.8-2
Followup-For: Bug #360387


Hi!

I hereby reopen this bug, since I do not see that this problem is
already solved.

I'm quoting to Norberts report here, because this was I nice summary:

 From: Norbert Preining [EMAIL PROTECTED]
 Subject: wpasupplicant: grave policy violation
 Date: Mon, 3 Apr 2006 12:21:03 +0200

 I change the severity level of this bug to grave. I consider it a
 grave violation to break the usage of this program. Mentioning
 something in {NEWS,README}.Debian is not enough. It makes this package
 unusable for many users.

This is exactly the point, upgrading to 0.4.8 silently keeps
wpasupplicant from working as before.



 It is all about the roaming usage of laptops, and I have to concur with
 the OP that this is the normal usage of a laptop. I myself have 5
 different wlan ap configured in my conf file, together with a fall back
 dhcp without any encryption.

similar setup here.


 To sum it up: If you make such a drastic change to the package, you
 should provide:

First, I would expect to see a (debconf) notice on upgrade, that the
configuration has changed.

 - a clear guide on HOW to upgrade from the old roaming usage to the new
   system, and ensuring that it is actually working
 - ensure that if you upgrade from one of the respective setups, that you
   don't break usage

and do not delete any old config-files!

 - or at least ask while installation which mode should be used.
 - in the worst case you should leave the /etc/init.d file around and
   change the mode of working only via /etc/default. So the admin would
   also need to have to edit /e/d/wpasupplicant
exactly this way . 

I see that your new configuration method is easier to setup, especially
its very useful for configuration by (thirdparty) frondends (gui).
But the already mentioned trio ifplugd, wpasupplicant, guessnet is very 
powerful.

Please support the 'old' configuration method. 
And not only by providing the init-script in
/usr/share/doc/wpa../examples, but as a working one in /e/init.d/ and
maybe disabled in /e/defaults/wpasupplicant.

By the way, can you explain why the 'old' way is deprecated as you state
in Readme.Debian? I haven't found any notice on upstream about this.
Furthermore there are some tutorials in the web which use the 'old' way.

-- 
Jörg Friedrich

There are only 10 types of people:
Those who understand binary and those who don't.



Bug#361904: Failed to load application: libstdc++.so.6: cannot handle TLS data

2006-04-11 Thread Matteo Calorio
Package: apt-proxy
Version: 1.9.33-0.1
Severity: grave
Justification: renders package unusable

*** Please type your report below this line ***
# /etc/init.d/apt-proxy start
Starting apt-proxy
Failed to load application: libstdc++.so.6: cannot handle TLS data

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.4.27-2-686
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages apt-proxy depends on:
ii  adduser   3.85   Add and remove users and groups
ii  bzip2 1.0.3-2high-quality block-sorting file 
co
ii  debconf [debconf-2.0] 1.4.72 Debian configuration management 
sy
ii  logrotate 3.7.1-2Log rotation utility
ii  python2.3.5-5An interactive high-level 
object-o
ii  python-apt0.6.16.1   Python interface to libapt-pkg
ii  python-twisted2.2.0-1Event-based framework for 
internet
ii  python-twisted-web0.5.0-4An HTTP protocol implementation 
to
ii  python2.3 2.3.5-9.1  An interactive high-level 
object-o

apt-proxy recommends no packages.

-- debconf information:
  apt-proxy/upgrading-v2:
  apt-proxy/upgrading-v2-result:


___ 
Yahoo! Messenger with Voice: chiama da PC a telefono a tariffe esclusive 
http://it.messenger.yahoo.com



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361903: policycoreutils - FTBFS: error: 'SEMANAGE_CAN_READ' undeclared

2006-04-11 Thread Bastian Blank
Package: policycoreutils
Version: 1.30-1
Severity: serious

There was an error while trying to autobuild your package:

 Automatic build of policycoreutils_1.30-1 on debian01 by sbuild/s390 85
[...]
 make[2]: Entering directory `/build/buildd/policycoreutils-1.30/semodule'
 cc -O2 -g -I/usr/include   -c -o semodule.o semodule.c
 semodule.c: In function 'main':
 semodule.c:248: error: 'SEMANAGE_CAN_READ' undeclared (first use in this 
 function)
 semodule.c:248: error: (Each undeclared identifier is reported only once
 semodule.c:248: error: for each function it appears in.)
 make[2]: *** [semodule.o] Error 1
 make[2]: Leaving directory `/build/buildd/policycoreutils-1.30/semodule'
 make[1]: *** [all] Error 1
 make[1]: Leaving directory `/build/buildd/policycoreutils-1.30'
 make: *** [build/policycoreutils] Error 2
 **
 Build finished at 20060410-2324
 FAILED [dpkg-buildpackage died]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361800: Does not compile now

2006-04-11 Thread Lupe Christoph
Hi!

Even with the patch I submitted, the resulting kernel does not compile:

  CC [M]  net/ipsec/ipsec_tunnel.o
net/ipsec/ipsec_tunnel.c: In function 'ipsec_tunnel_SAlookup':
net/ipsec/ipsec_tunnel.c:279: error: dereferencing pointer to incomplete type
net/ipsec/ipsec_tunnel.c:279: error: dereferencing pointer to incomplete type
net/ipsec/ipsec_tunnel.c:279: error: dereferencing pointer to incomplete type
net/ipsec/ipsec_tunnel.c:280: error: dereferencing pointer to incomplete type
net/ipsec/ipsec_tunnel.c:280: error: dereferencing pointer to incomplete type
net/ipsec/ipsec_tunnel.c:280: error: dereferencing pointer to incomplete type
make[3]: *** [net/ipsec/ipsec_tunnel.o] Error 1

It's missing the definition of struct tcp_tw_bucket. This struct was
removed after 2.6.12.

struct tcp_tw_bucket *tw;

tw = (struct tcp_tw_bucket *)ixs-skb-sk;

This code knows that the struct sock pointed to by ixs-skb-sk is in
fact a struct tcp_tw_bucket. But what is it in 2.6.15? I don't know the
kernel, and I can't find out what to use in 2.6.15.

I've commented out that section to see if more problems exist in the
code.

Lupe Christoph
-- 
| You know we're sitting on four million pounds of fuel, one nuclear |
| weapon and a thing that has 270,000 moving parts built by the lowest   |
| bidder. Makes you feel good, doesn't it?   |
| Rockhound in Armageddon, 1998, about the Space Shuttle   |


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#334697: apt-listbugs does not query b.d.o

2006-04-11 Thread Peter Palfrader
It seems apt-listbugs does not query bugs.debian.org but some other
server.

It gets its list of bugs from
http://osdn.debian.or.jp/~taru/apt-listbugs/index.db-grave.gz
[similary for -criticial and other severities].

Individual bug information is acquired from
http://osdn.debian.or.jp/~taru/apt-listbugs/db-h/42/332442.status
and similar URLs.


The index file apparently has not been updated since October 2005.

It's probably not a very good idea to make packages like this depend on
non-debian infrastructure.

Peter
-- 
 PGP signed and encrypted  |  .''`.  ** Debian GNU/Linux **
messages preferred.| : :' :  The  universal
   | `. `'  Operating System
 http://www.palfrader.org/ |   `-http://www.debian.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361856: [php-maint] Bug#361856: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2

2006-04-11 Thread Ondrej Sury
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

[copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2]

Author: Maksymilian Arciemowicz (cXIb8O3)
Date:
- -Written: 2.4.2006
- -Public: 8.4.2006
from SECURITYREASON.COM
CVE-2006-1608

- --- 0.Description ---
PHP is an HTML-embedded scripting language. Much of its syntax is
borrowed from C, Java and
Perl with a couple of unique PHP-specific features thrown in. The goal
of the language is to
allow web developers to write dynamically generated pages quickly.

A nice introduction to PHP by Stig S#230;ther Bakken can be found at
http://www.zend.com/zend/art/intro.php on the Zend website. Also, much
of the PHP Conference
Material is freely available. 

The PHP safe mode is an attempt to solve the shared-server security
problem. It is
architecturally incorrect to try to solve this problem at the PHP level,
but since the
alternatives at the web server and OS levels aren't very realistic, many
people, especially
ISP's, use safe mode for now.

- --- 1. Safe Mode Bypass ---
General problem exists in safe mode function, because safe mode accept
path like
compress.zlib://. 

PHP442 File main/safe_mode.c
- -78-80---
wrapper = php_stream_locate_url_wrapper(filename, NULL,
STREAM_LOCATE_WRAPPERS_ONLY
TSRMLS_CC);
if (wrapper != NULL)
return 1;
- -78-80---

if php_stream_locate_url_wrapper() return something.. safe mode is going
to stop.
Let`s see the function php_stream_locate_url_wrapper().

PHP442 File main/streams.c

- -2522-2588---
PHPAPI php_stream_wrapper *php_stream_locate_url_wrapper(const char
*path, char
**path_for_open, int options TSRMLS_DC)
{
HashTable *wrapper_hash = (FG(stream_wrappers) ? FG(stream_wrappers) :
url_stream_wrappers_hash);
php_stream_wrapper *wrapper = NULL;
const char *p, *protocol = NULL;
int n = 0;

if (path_for_open)
*path_for_open = (char*)path;

if (options  IGNORE_URL)
return (options  STREAM_LOCATE_WRAPPERS_ONLY) ? NULL :
php_plain_files_wrapper;

for (p = path; isalnum((int)*p) || *p == '+' || *p == '-' || *p == '.';
p++) {
n++;
}

if ((*p == ':')  (n  1)  !strncmp(://, p, 3)) {
protocol = path;
} else if (strncasecmp(path, zlib:, 5) == 0) {
/* BC with older php scripts and zlib wrapper */
protocol = compress.zlib;
n = 13;
if (options  REPORT_ERRORS) {
php_error_docref(NULL TSRMLS_CC, E_WARNING, Use of \zlib:\ wrapper is
deprecated; please use \compress.zlib://\ instead.);
}
}

if (protocol) {
if (FAILURE == zend_hash_find(wrapper_hash, (char*)protocol, n,
(void**)wrapper)) {
char wrapper_name[32];

if (options  REPORT_ERRORS) {
if (n = sizeof(wrapper_name))
n = sizeof(wrapper_name) - 1;
PHP_STRLCPY(wrapper_name, protocol, sizeof(wrapper_name), n);

php_error_docref(NULL TSRMLS_CC, E_NOTICE, Unable to find the wrapper
\%s\ - did you forget to enable it when you configured PHP?,
wrapper_name);
}

wrapper = NULL;
protocol = NULL;
}
}
/* TODO: curl based streams probably support file:// properly */
if (!protocol || !strncasecmp(protocol, file, n)) {
if (protocol  path[n+1] == '/'  path[n+2] == '/') {
if (options  REPORT_ERRORS)
php_error_docref(NULL TSRMLS_CC, E_WARNING, remote host file access not
supported,
%s, path);
return NULL;
}
if (protocol  path_for_open)
*path_for_open = (char*)path + n + 1;

/* fall back on regular file access */
return (options  STREAM_LOCATE_WRAPPERS_ONLY) ? NULL :
php_plain_files_wrapper;
}

if (wrapper  wrapper-is_url  !PG(allow_url_fopen)) {
if (options  REPORT_ERRORS)
php_error_docref(NULL TSRMLS_CC, E_WARNING, URL file-access is disabled
in the
server configuration);
return NULL;
}

return wrapper;
}
- -2522-2588---

So if you use in your path (for example compress.zlib://), function
php_stream_locate_url_wrapper() return something variable and safe mode
return 1.

Let's see now the source of function copy().

PHP442: ext/standard/file.c

- -2114-2138---
PHP_FUNCTION(copy)
{
zval **source, **target;

if (ZEND_NUM_ARGS() != 2 || zend_get_parameters_ex(2, source, target)
== FAILURE)
{
WRONG_PARAM_COUNT;
}

convert_to_string_ex(source);
convert_to_string_ex(target);

if (PG(safe_mode) (!php_checkuid(Z_STRVAL_PP(source), NULL,
CHECKUID_CHECK_FILE_AND_DIR))) {
RETURN_FALSE;
}

if (php_check_open_basedir(Z_STRVAL_PP(source) TSRMLS_CC)) {
RETURN_FALSE;
}

if (php_copy_file(Z_STRVAL_PP(source), Z_STRVAL_PP(target)
TSRMLS_CC)==SUCCESS) {
RETURN_TRUE;
} else {
RETURN_FALSE;
}
}
- -2114-2138---

http://pl2.php.net/manual/en/function.copy.php

Description
bool copy ( string source, string dest )

example:
copy(compress.zlib:///etc/passwd, /home/cxib/to/bandyta/passwd.txt);

safe mode return 1 and skip security.

if (PG(safe_mode) (!php_checkuid(Z_STRVAL_PP(source), NULL,
CHECKUID_CHECK_FILE_AND_DIR))) {
RETURN_FALSE;
}

return true.

Rest functions have checking safe_mode without path and safe mode works.
I don't have tested
all functions in php ;].

- --- 2. How to fix ---
CVS
http://cvs.php.net/viewcvs.cgi/php-src/NEWS

- --- 3. Exploit ---
http://securityreason.com/achievement_exploitalert/8

- --- 4. Greets ---

For: sp3x

Bug#361853: [php-maint] Bug#361853: phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2

2006-04-11 Thread Ondrej Sury
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

[phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2]

Author: Maksymilian Arciemowicz (cXIb8O3)
Date:
- -Written: 26.2.2006
- -Public: 8.4.2006
from SecurityReason.Com
CVE-2006-0996

- --- 0.Description ---
PHP is an HTML-embedded scripting language. Much of its syntax is
borrowed from C, Java and
Perl with a couple of unique PHP-specific features thrown in. The goal
of the language is to
allow web developers to write dynamically generated pages quickly.

A nice introduction to PHP by Stig S#230;ther Bakken can be found at
http://www.zend.com/zend/art/intro.php on the Zend website. Also, much
of the PHP Conference
Material is freely available. 

- --- 1. Cross Site Scripting ---
In phpinfo() you can see all Varibles like:

file: standard/info.c
- -630-636---
php_print_gpcse_array(_REQUEST, sizeof(_REQUEST)-1 TSRMLS_CC);
php_print_gpcse_array(_GET, sizeof(_GET)-1 TSRMLS_CC);
php_print_gpcse_array(_POST, sizeof(_POST)-1 TSRMLS_CC);
php_print_gpcse_array(_FILES, sizeof(_FILES)-1 TSRMLS_CC);
php_print_gpcse_array(_COOKIE, sizeof(_COOKIE)-1 TSRMLS_CC);
php_print_gpcse_array(_SERVER, sizeof(_SERVER)-1 TSRMLS_CC);
php_print_gpcse_array(_ENV, sizeof(_ENV)-1 TSRMLS_CC);
- -630-636---

Function php_print_gpcse_array() for any arrays check 4096b of varible. 

file: standard/info.c
- -135-154---
if (Z_TYPE_PP(tmp) == IS_ARRAY) {
zval *tmp3;
MAKE_STD_ZVAL(tmp3);
if (!sapi_module.phpinfo_as_text) {
PUTS(pre);
}
php_start_ob_buffer(NULL, 4096, 1 TSRMLS_CC);
zend_print_zval_r(*tmp, 0);
php_ob_get_buffer(tmp3 TSRMLS_CC);
php_end_ob_buffer(0, 0 TSRMLS_CC);

elem_esc = php_info_html_esc(Z_STRVAL_P(tmp3) TSRMLS_CC);
PUTS(elem_esc);
efree(elem_esc);
zval_ptr_dtor(tmp3);

if (!sapi_module.phpinfo_as_text) {
PUTS(/pre);
}
} else if (Z_TYPE_PP(tmp) != IS_STRING) {
- -135-154---

So if we create array longer like 4096, html tags don't be remove.

Exploit:
If in php script is function phpinfo() try create some varibles (array)
like

phpinfo.php?cx[][][][][][][][][][][][][][][][][][][][][][][][][][][][][][][][][][][][][]=[XSS
]

or 

phpinfo.php?cx[]=c..~4096chars...ccc[XSS]

- --- 2. How to fix ---
CVS
http://cvs.php.net/viewcvs.cgi/php-src/NEWS

- --- 3. Greets ---

For: sp3x
and
p_e_a, pi3, eax ;]

- --- 4. Contact ---
Author: SecurityReason.Com [ Maksymilian Arciemowicz ( cXIb8O3 ) ]
Email: max [at] jestsuper [dot] pl or cxib [at] securityreason [dot] com
GPG: http://securityreason.com/key/Arciemowicz.Maksymilian.gpg
SecurityReason.Com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (FreeBSD)

iD8DBQFEOAIl3Ke13X/fTO4RAo4LAJ0fBxJWN64vWrDYJEuhGkqc/OC42QCbBxip
f35+6LHjuBoqP5D2JV84ufs=
=iz3m
-END PGP SIGNATURE-
-- 
Ondrej Sury [EMAIL PROTECTED]


signature.asc
Description: This is a digitally signed message part


Bug#361854: [php-maint] Bug#361854: function *() php/apache Crash PHP 4.4.2 and 5.1.2

2006-04-11 Thread Ondrej Sury
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

[function *() php/apache Crash PHP 4.4.2 and 5.1.2]

Author: Maksymilian Arciemowicz (cXIb8O3)
Date:
- -Written: 21.3.2006
- -Public: 8.4.2006
from SECURITYREASON.COM
CVE-2006-1549

- --- 0.Description ---
PHP is an HTML-embedded scripting language. Much of its syntax is
borrowed from C, Java and
Perl with a couple of unique PHP-specific features thrown in. The goal
of the language is to
allow web developers to write dynamically generated pages quickly.

A nice introduction to PHP by Stig S#230;ther Bakken can be found at
http://www.zend.com/zend/art/intro.php on the Zend website. Also, much
of the PHP Conference
Material is freely available. 

- --- 1. function *() Crash ---
PHP4/5 is vulnerability to a local denial-of-service. General problem is
in allocated data to
memory. 

for example attack:

cxib# php -r 'function cx(){ cx(); } cx();'
Segmentation fault (core dumped)
cxib# 

Segfault.. let`s see what we have in gdb

- ---
cxib# cat /www/functionsegfault.php
?
function cx(){
cx();
} 
cx();
?
cxib# gdb -q php
(gdb) r '/www/functionsegfault.php'
Starting program: /usr/local/bin/php '/www/functionsegfault.php'

Program received signal SIGSEGV, Segmentation fault.
0x080de6bd in _zval_copy_ctor (zvalue=0xbbc00260, 
__zend_filename=0x811d8c0
/usr/ports/lang/php4/work/php-4.4.2/Zend/zend_execute.c,
__zend_lineno=1568)
at /usr/ports/lang/php4/work/php-4.4.2/Zend/zend_variables.c:111
111 /usr/ports/lang/php4/work/php-4.4.2/Zend/zend_variables.c: No such
file or
directory.
in /usr/ports/lang/php4/work/php-4.4.2/Zend/zend_variables.c
(gdb) bt
#0 0x080de6bd in _zval_copy_ctor (zvalue=0xbbc00260, 
__zend_filename=0x811d8c0
/usr/ports/lang/php4/work/php-4.4.2/Zend/zend_execute.c,
__zend_lineno=1568)
at /usr/ports/lang/php4/work/php-4.4.2/Zend/zend_variables.c:111
#1 0x080f042a in execute (op_array=0x81b3880)
at /usr/ports/lang/php4/work/php-4.4.2/Zend/zend_execute.c:1568
#2 0x080f019a in execute (op_array=0x81b3880)
at /usr/ports/lang/php4/work/php-4.4.2/Zend/zend_execute.c:1719
#3 0x080f019a in execute (op_array=0x81b3880)
at /usr/ports/lang/php4/work/php-4.4.2/Zend/zend_execute.c:1719
#4 0x080f019a in execute (op_array=0x81b3880)
at /usr/ports/lang/php4/work/php-4.4.2/Zend/zend_execute.c:1719
#5 0x080f019a in execute (op_array=0x81b3880)
...
- ---

or in apache error_log

[Mon Mar 20 12:12:54 2006] [notice] child pid 744 exit signal Illegal
instruction (4)

- --- 2. Greets ---

For: sp3x
and
p_e_a, pi3, eax, Infospec ;]

- --- 3. Contact ---
Author: SecurityReason.Com [ Maksymilian Arciemowicz ( cXIb8O3 ) ]
Email: max [at] jestsuper [dot] pl or cxib [at] securityreason [dot] com
GPG: http://securityreason.com/key/Arciemowicz.Maksymilian.gpg
SecurityReason.Com

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (FreeBSD)

iD8DBQFEOAT43Ke13X/fTO4RAiFnAKC+vzJm1w24b4VN9CMdhE6e6a2L4QCePbp7
lNzhZke21IHXM0TvvjntXyY=
=Y7Ft
-END PGP SIGNATURE-
-- 
Ondrej Sury [EMAIL PROTECTED]


signature.asc
Description: This is a digitally signed message part


Bug#361912: xutils-dev - FTBFS: No package 'xproto' found

2006-04-11 Thread Bastian Blank
Package: xutils-dev
Version: 1:1.0.1-3
Severity: serious

There was an error while trying to autobuild your package:

 Automatic build of xutils-dev_1:1.0.1-3 on debian-31 by sbuild/s390 85
[...]
 checking pkg-config is at least version 0.9.0... yes
 checking for XPROTO... configure: error: Package requirements (xproto) were 
 not met:
 
 No package 'xproto' found
 
 Consider adjusting the PKG_CONFIG_PATH environment variable if you
 installed software in a non-standard prefix.
 
 Alternatively, you may set the environment variables XPROTO_CFLAGS
 and XPROTO_LIBS to avoid the need to call pkg-config.
 See the pkg-config man page for more details.
 
 make: *** [build-stamp] Error 1
 **
 Build finished at 20060410-2300
 FAILED [dpkg-buildpackage died]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: apt-listbugs does not show several grave/serious bugs

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 334697 + fixed
Bug#334697: apt-listbugs does not show several grave/serious bugs
There were no tags set.
Tags added: fixed

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#334697: apt-listbugs does not show several grave/serious bugs

2006-04-11 Thread Kenshi Muto
tags 334697 + fixed
thanks

I noticed maintainer's cron script at osdn.d.o.j had stopped
since a long time ago by wrong permission.

I fixed it and hope this bug is solved. 

Thanks,
-- 
Kenshi Muto
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361909: xserver-xorg-input-digitaledge - FTBFS: Wrong architecture line

2006-04-11 Thread Bastian Blank
Package: xserver-xorg-input-digitaledge
Version: 1:1.0.1.3-2
Severity: serious

There was an error while trying to autobuild your package:

 Automatic build of xserver-xorg-input-digitaledge_1:1.0.1.3-2 on debian-31 by 
 sbuild/s390 85
[...]
 Building Dependency Tree...
 E: Couldn't find package xserver-xorg-dev
 apt-get failed.
 Package installation failed
 Trying to reinstall removed packages:
 Trying to uninstall newly installed packages:
 Source-dependencies not satisfied; skipping xserver-xorg-input-digitaledge
 **
 Finished at 20060410-2257
 Build needed 00:00:00, 0k disk space



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361855: [php-maint] Bug#361855: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2

2006-04-11 Thread Ondrej Sury
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

[tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2]

Author: Maksymilian Arciemowicz (cXIb8O3)
Date:
- -Written: 26.3.2006
- -Public: 8.4.2006
from SECURITYREASON.COM
CVE-2006-1494

- --- 0.Description ---
PHP is an HTML-embedded scripting language. Much of its syntax is
borrowed from C, Java and
Perl with a couple of unique PHP-specific features thrown in. The goal
of the language is to
allow web developers to write dynamically generated pages quickly.

A nice introduction to PHP by Stig S#230;ther Bakken can be found at
http://www.zend.com/zend/art/intro.php on the Zend website. Also, much
of the PHP Conference
Material is freely available. 
tempnam -- Create file with unique file name

- --- 1. tempnam() open_basedir bypass ---
In function tempname() are required 2 arg`s.

http://pl.php.net/manual/en/function.tempnam.php

string tempnam ( string dir, string prefix )

So, if we have open_basedir set to /home, we can't create file
over /home directory.
In ext/standard/file.c (PHP 4.4.2)

- -550-578---
PHP_FUNCTION(tempnam)
{
pval **arg1, **arg2;
char *d;
char *opened_path;
char p[64];
FILE *fp;

if (ZEND_NUM_ARGS() != 2 || zend_get_parameters_ex(2, arg1, arg2) ==
FAILURE) {
WRONG_PARAM_COUNT;
}
convert_to_string_ex(arg1);
convert_to_string_ex(arg2);

if (php_check_open_basedir(Z_STRVAL_PP(arg1) TSRMLS_CC)) {
RETURN_FALSE;
}

d = estrndup(Z_STRVAL_PP(arg1), Z_STRLEN_PP(arg1));
strlcpy(p, Z_STRVAL_PP(arg2), sizeof(p));

if ((fp = php_open_temporary_file(d, p, opened_path TSRMLS_CC))) {
fclose(fp);
RETVAL_STRING(opened_path, 0);
} else {
RETVAL_FALSE;
}
efree(d);
}
- -550-578---

if (php_check_open_basedir(Z_STRVAL_PP(arg1) TSRMLS_CC)) {
RETURN_FALSE;
}

Where is arg2?
So we can write exploit like:
tempnam(path_from_open_basedir,
../../../../../../../../Open_basedir_bypasswd);

tempnam(/home, ../../../../../../tmp/cx);

etc.

It is low issue but you can try create a lot of files and overload
inodes from HD.I have one
particion.

/var /dev/ad0s1e 1.0G 97M 858M 10% /var - Space (B)
/dev/ad0s1e 1012974 94472 837466 10% 3796 137514 3% /var - INODES

where mysql and apache try create some file. WWhen we overload free
inodes, system have big
problem with apache, mysql.

Example:

cxib# php -r 'function cx(){ tempnam(/www/,
../../../../../../var/tmp/cx); cx(); } cx();'
/var: create/symlink failed, no inodes free

/var: create/symlink failed, no inodes free

/var: create/symlink failed, no inodes free

/var: create/symlink failed, no inodes free
... etc

/usr/local/libexec/mysqld: Can't create/write to file
'/var/tmp/ibBIsZ6o' (Errcode: 13)
And mysql die()!

- --- 2. How to fix ---
CVS
http://cvs.php.net/viewcvs.cgi/php-src/NEWS

- --- 3. Greets ---

For: sp3x
and
p_e_a, pi3, eax, Infospec ;]

- --- 4. Contact ---
Author: SecurityReason.Com [ Maksymilian Arciemowicz ( cXIb8O3 ) ]
Email: max [at] jestsuper [dot] pl or cxib [at] securityreason [dot] com
GPG: http://securityreason.com/key/Arciemowicz.Maksymilian.gpg
SecurityReason.Com

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (FreeBSD)

iD8DBQFEOAZB3Ke13X/fTO4RAiDmAKCbBZP8JBC0F/9cB5OgUFJPgqHB4QCgon9L
kBEMIExP2TZ0+NP7l5uk9TE=
=f3i4
-END PGP SIGNATURE-
-- 
Ondrej Sury [EMAIL PROTECTED]


signature.asc
Description: This is a digitally signed message part


Bug#361908: xorg - FTBFS: debian/scripts/vars.s390: No such file or directory

2006-04-11 Thread Bastian Blank
Package: xorg
Version: 1:7.0.10
Severity: serious

There was an error while trying to autobuild your package:

 Automatic build of xorg_1:7.0.10 on debian-31 by sbuild/s390 85
[...]
  /usr/bin/fakeroot debian/rules clean
 debian/rules:39: debian/scripts/vars.s390: No such file or directory
 make: *** No rule to make target `debian/scripts/vars.s390'.  Stop.
 **
 Build finished at 20060410-2236
 FAILED [dpkg-buildpackage died]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361910: FTBFS (alpha): Undefined system call: sigprocmask

2006-04-11 Thread Falk Hueffner
Package: klibc
Severity: serious
Justification: no longer builds from source

klibc fails to build on alpha:
[...]
SYSCALL FOUND: getrlimit
SYSCALL FOUND: tkill
klibc/syscalls/SYSCALLS.i:187: Undefined system call: sigprocmask
  ld -r -o klibc/syscalls/syscalls.o
ld: no input files
make[4]: *** [klibc/syscalls/syscalls.o] Error 1
make[3]: *** [klibc/syscalls] Error 2
make[2]: *** [all] Error 2
make[1]: *** [klibc] Error 2
make[1]: Leaving directory `/tmp/buildd/klibc-1.3.3'

Full log at
http://buildd.debian.org/fetch.php?pkg=klibcver=1.3.3-1arch=alphastamp=1144343491file=logas=raw

Falk


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: alpha
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16-g3cbb90a9-dirty
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#360387: [pkg-wpa-devel] Bug#360387: init script gone

2006-04-11 Thread Kel Modderman
What would people say to providing an init daemon for wpasupplicant in a 
separate binary package, for example, wparoamd or so?


Thanks, Kel.


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: your mail

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 clone 361853 -1
Bug#361853: phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2
Bug 361853 cloned as bug 361914.

 clone 361856 -2
Bug#361856: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2
Bug 361856 cloned as bug 361915.

 clone 361855 -3
Bug#361855: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2
Bug 361855 cloned as bug 361916.

 clone 361854 -4
Bug#361854: function *() php/apache Crash PHP 4.4.2 and 5.1.2
Bug 361854 cloned as bug 361917.

 reassign -1 php5 5.1.2-1
Bug#361914: phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2
Bug reassigned from package `php4' to `php5'.

 reassign -2 php5 5.1.2-1
Bug#361915: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2
Bug reassigned from package `php4' to `php5'.

 reassign -3 php5 5.1.2-1
Bug#361916: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2
Bug reassigned from package `php4' to `php5'.

 reassign -4 php5 5.1.2-1
Bug#361917: function *() php/apache Crash PHP 4.4.2 and 5.1.2
Bug reassigned from package `php4' to `php5'.

 tags -1 +security
Bug#361914: phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2
Tags were: security
Tags added: security

 tags -2 +security
Bug#361915: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2
Tags were: security
Tags added: security

 tags -3 +security
Bug#361916: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2
Tags were: security
Tags added: security

 tags -4 +security
Bug#361917: function *() php/apache Crash PHP 4.4.2 and 5.1.2
Tags were: security
Tags added: security

 tags 361853 +security
Bug#361853: phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2
Tags were: security
Tags added: security

 tags 361856 +security
Bug#361856: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2
Tags were: security
Tags added: security

 tags 361855 +security
Bug#361855: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2
Tags were: security
Tags added: security

 tags 361854 +security
Bug#361854: function *() php/apache Crash PHP 4.4.2 and 5.1.2
Tags were: security
Tags added: security

 thank you
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361913: linphone: passwords stored world-readable

2006-04-11 Thread Lionel Elie Mamane
Package: linphone
Version: 1.2.0-3
Severity: grave
Tags: security
Justification: user security hole

The accounts information, including CLEAR-TEXT passwords, is stored in
$HOME/.gnome2/linphone, which is by default world-readable. It should
be in $HOME/.gnome2_private/linphone (or any other path below
$HOME/.gnome2_private/), where it will be safe, since
$HOME/.gnome2_private/ is mode 0700.

sarge does not contain linphone.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (200, 'experimental')
Architecture: i386 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15-deb1-64bit
Locale: LANG=fr_LU.UTF-8, LC_CTYPE=fr_LU.UTF-8 (charmap=UTF-8)

Versions of packages linphone depends on:
ii  libart-2.0-2 2.3.17-1Library of functions for 2D graphi
ii  libatk1.0-0  1.10.3-1The ATK accessibility toolkit
ii  libbonobo2-0 2.10.1-1Bonobo CORBA interfaces library
ii  libbonoboui2-0   2.10.1-2The Bonobo UI library
ii  libc62.3.6-1 GNU C Library: Shared libraries an
ii  libcairo21.0.2-3 The Cairo 2D vector graphics libra
ii  libfontconfig1   2.3.2-2 generic font configuration library
ii  libgconf2-4  2.12.1-9GNOME configuration database syste
ii  libglib2.0-0 2.8.6-1 The GLib library of C routines
ii  libgnome-keyring00.4.7-1 GNOME keyring services library
ii  libgnome2-0  2.12.0.1-5  The GNOME 2 library - runtime file
ii  libgnomecanvas2-02.12.0-2A powerful object-oriented display
ii  libgnomeui-0 2.12.1-1The GNOME 2 libraries (User Interf
ii  libgnomevfs2-0   2.12.2-6GNOME virtual file-system (runtime
ii  libgtk2.0-0  2.8.12-1The GTK+ graphical user interface 
ii  libice6  6.9.0.dfsg.1-4  Inter-Client Exchange library
ii  liblinphone1 1.2.0-3 linphone web phone's library (supp
ii  liborbit21:2.12.4-1  libraries for ORBit2 - a CORBA ORB
ii  libosip2-3   2.2.2-2 Session Initiation Protocol (SIP) 
ii  libpanel-applet2-0   2.12.3-1library for GNOME 2 panel applets
ii  libpango1.0-01.10.3-1Layout and rendering of internatio
ii  libpopt0 1.7-5   lib for parsing cmdline parameters
ii  libsm6   6.9.0.dfsg.1-4  X Window System Session Management
ii  libx11-6 6.9.0.dfsg.1-4  X Window System protocol client li
ii  libxcursor1  1.1.3-1 X cursor management library
ii  libxext6 6.9.0.dfsg.1-4  X Window System miscellaneous exte
ii  libxi6   6.9.0.dfsg.1-4  X Window System Input extension li
ii  libxinerama1 6.9.0.dfsg.1-4  X Window System multi-head display
ii  libxml2  2.6.23.dfsg.2-2 GNOME XML library
ii  libxrandr2   6.9.0.dfsg.1-4  X Window System Resize, Rotate and
ii  libxrender1  1:0.9.0.2-1 X Rendering Extension client libra
ii  linphone-nox 1.2.0-3 web phone
ii  zlib1g   1:1.2.3-9   compression library - runtime

linphone recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#360387: [pkg-wpa-devel] Bug#360387: init script gone

2006-04-11 Thread Joerg Friedrich
Kel Modderman schrieb am Dienstag, 11. April 2006 um 18:14:06 +1000:
 What would people say to providing an init daemon for wpasupplicant in a 
 separate binary package, for example, wparoamd or so?

Its a lot of overhead providing a 2kb init script in a seperate package.
-- 
Jörg Friedrich

There are only 10 types of people:
Those who understand binary and those who don't.



Bug#361823: marked as done (libapache2-mod-authz-ldap: undefined symbol ssl_var_lookup)

2006-04-11 Thread Debian Bug Tracking System
Your message dated Tue, 11 Apr 2006 10:52:31 +0200
with message-id [EMAIL PROTECTED]
and subject line libapache2-mod-authz-ldap: undefined symbol ssl_var_lookup
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: libapache2-mod-authz-ldap
Version: 0.26-1
Severity: grave
Justification: renders package unusable

Trying to get libapache2-mod-authz-ldap to work, spits the following:

ftbfs:~/source# /etc/init.d/apache2 start
Cannot load /usr/lib/apache2/modules/mod_authz_ldap.so into server: 
/usr/lib/apache2/modules/mod_authz_ldap.so: undefined symbol: ssl_var_lookup

The package is running under sarge and has been recompiled. If the package is
not supposed to work in sarge, please, close this report.

Thanks.

-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.6.8-1-386
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-1) (ignored: 
LC_ALL set to en_US)

-- 
Jesus Climent  info:www.pumuki.org
Unix SysAdm|Linux User #66350|Debian Developer|2.6.15|Helsinki Finland
GPG: 1024D/86946D69 BB64 2339 1CAA 7064 E429  7E18 66FC 1D7F 8694 6D69

- ... todos necesitamos creer en algo.
- Si, yo también creo... Creo... que me voy a tomar una cerveza.
--Sor Trini (Año Mariano)

---End Message---
---BeginMessage---
I did not notice that the ssl module has to be activated also in apache.

Forget about this bug, although it might need a bigger figlet sign pointing
to user stupidity. :)

-- 
Jesus Climent  info:www.pumuki.org
Unix SysAdm|Linux User #66350|Debian Developer|2.6.15|Helsinki Finland
GPG: 1024D/86946D69 BB64 2339 1CAA 7064 E429  7E18 66FC 1D7F 8694 6D69

Shall I make us a nice cup of tea, Ma'am ?
--Mrs. Mills (The others)
---End Message---


Bug#354847: marked as done (FTBFS: 1.15.1-4 fails 2 tests on amd64)

2006-04-11 Thread Debian Bug Tracking System
Your message dated Tue, 11 Apr 2006 01:32:10 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#354847: fixed in tar 1.15.1dfsg-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: tar
Version: 1.15.1-4
Severity: serious
Justification: fails to build from source

Hello,
tar 1.15.1-4 FTBFS on amd64, because not all tests from /bin/sh
./testsuite are successful. In fact:

## - ##
## Test results. ##
## - ##

ERROR: 32 tests were run,
2 failed unexpectedly.
6 tests were skipped.

You can read full log at: http://amd64.ftbfs.de/build.php?arch=pkg=tar

Thanks,
Roberto

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=UTF-8) (ignored: LC_ALL 
set to [EMAIL PROTECTED])

Versions of packages tar depends on:
ii  libc6 2.3.6-1GNU C Library: Shared libraries an

tar recommends no packages.

-- no debconf information

---End Message---
---BeginMessage---
Source: tar
Source-Version: 1.15.1dfsg-1

We believe that the bug you reported is fixed in the latest version of
tar, which is due to be installed in the Debian FTP archive:

tar_1.15.1dfsg-1.diff.gz
  to pool/main/t/tar/tar_1.15.1dfsg-1.diff.gz
tar_1.15.1dfsg-1.dsc
  to pool/main/t/tar/tar_1.15.1dfsg-1.dsc
tar_1.15.1dfsg-1_i386.deb
  to pool/main/t/tar/tar_1.15.1dfsg-1_i386.deb
tar_1.15.1dfsg.orig.tar.gz
  to pool/main/t/tar/tar_1.15.1dfsg.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bdale Garbee [EMAIL PROTECTED] (supplier of updated tar package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 11 Apr 2006 17:18:12 +0900
Source: tar
Binary: tar
Architecture: source i386
Version: 1.15.1dfsg-1
Distribution: unstable
Urgency: low
Maintainer: Bdale Garbee [EMAIL PROTECTED]
Changed-By: Bdale Garbee [EMAIL PROTECTED]
Description: 
 tar- GNU tar
Closes: 354847 356657 357259
Changes: 
 tar (1.15.1dfsg-1) unstable; urgency=low
 .
   * remove the documentation source from this package, since it is licensed
 under the GFDL with invariant cover texts that upstream is unwilling or
 unable to to remove, closes: #357259
   * remove install-info call from postinst, since it is no longer relevant
   * include URL for the online version of the tar documentation in the man page
   * run make with same env vars set as configure to avoid situation where
 make re-running configure causes rsh to not be found, etc, closes: #356657
   * another patch from Goswin to fix test failures on amd64, closes: #354847
Files: 
 d9aa2510ec9cef94addd398ee5bfca65 591 utils required tar_1.15.1dfsg-1.dsc
 3bffebc4999cb4ce60d5def1b9743f81 1579038 utils required 
tar_1.15.1dfsg.orig.tar.gz
 cd5e38483a68bdf42879ab95b090e456 52321 utils required tar_1.15.1dfsg-1.diff.gz
 c557f14900f0c9a8a99dc967213586f2 521524 utils required 
tar_1.15.1dfsg-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEO2eyZKfAp/LPAagRAlrQAJ4148tGKD8AM5LthGyc9xiBkVR+DACeKj/e
Uk5xKieygqhFjTzmKWSp+KE=
=z/nY
-END PGP SIGNATURE-

---End Message---


Bug#357955: FTBFS: b-d libmysqlclient14-dev no longer exists

2006-04-11 Thread Thijs Kinkhorst
 libmysqlclient14-dev no longer exists in unstable; you have to move to
 version 15.

As noted in #357069, you just need to remove the build dependency since
it's unneeded.


Thijs


signature.asc
Description: This is a digitally signed message part


Bug#357259: marked as done (tar: GFDL documentation with unmodifiable sections)

2006-04-11 Thread Debian Bug Tracking System
Your message dated Tue, 11 Apr 2006 01:32:10 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#357259: fixed in tar 1.15.1dfsg-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---

Package: tar
Version: 1.15.1-4
Severity: serious

From the tar info manual:

 Permission is granted to copy, distribute and/or modify this
 document under the terms of the GNU Free Documentation License,
 Version 1.1 or any later version published by the Free Software
 Foundation; with the Invariant Sections being GNU General Public
 License, with the Front-Cover Texts being A GNU Manual, and
 with the Back-Cover Texts as in (a) below.  A copy of the license
 is included in the section entitled GNU Free Documentation
 License.

 (a) The FSF's Back-Cover Text is: You are free to copy and modify
 this GNU Manual.  Buying copies from GNU Press supports the FSF in
 developing GNU and promoting software freedom.

Please try to obtain permission from upstream to delete the
unmodifiable sections, otherwise you will have to remove the whole
manual. :-(

Note that there is something strange with the manual, as the GPL is
not actually included AFAICS; this seems to be an upstream mistake.


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.4.32
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)

Versions of packages tar depends on:
ii  libc6 2.3.6-3GNU C Library: Shared libraries an

tar recommends no packages.

-- no debconf information



---End Message---
---BeginMessage---
Source: tar
Source-Version: 1.15.1dfsg-1

We believe that the bug you reported is fixed in the latest version of
tar, which is due to be installed in the Debian FTP archive:

tar_1.15.1dfsg-1.diff.gz
  to pool/main/t/tar/tar_1.15.1dfsg-1.diff.gz
tar_1.15.1dfsg-1.dsc
  to pool/main/t/tar/tar_1.15.1dfsg-1.dsc
tar_1.15.1dfsg-1_i386.deb
  to pool/main/t/tar/tar_1.15.1dfsg-1_i386.deb
tar_1.15.1dfsg.orig.tar.gz
  to pool/main/t/tar/tar_1.15.1dfsg.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bdale Garbee [EMAIL PROTECTED] (supplier of updated tar package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 11 Apr 2006 17:18:12 +0900
Source: tar
Binary: tar
Architecture: source i386
Version: 1.15.1dfsg-1
Distribution: unstable
Urgency: low
Maintainer: Bdale Garbee [EMAIL PROTECTED]
Changed-By: Bdale Garbee [EMAIL PROTECTED]
Description: 
 tar- GNU tar
Closes: 354847 356657 357259
Changes: 
 tar (1.15.1dfsg-1) unstable; urgency=low
 .
   * remove the documentation source from this package, since it is licensed
 under the GFDL with invariant cover texts that upstream is unwilling or
 unable to to remove, closes: #357259
   * remove install-info call from postinst, since it is no longer relevant
   * include URL for the online version of the tar documentation in the man page
   * run make with same env vars set as configure to avoid situation where
 make re-running configure causes rsh to not be found, etc, closes: #356657
   * another patch from Goswin to fix test failures on amd64, closes: #354847
Files: 
 d9aa2510ec9cef94addd398ee5bfca65 591 utils required tar_1.15.1dfsg-1.dsc
 3bffebc4999cb4ce60d5def1b9743f81 1579038 utils required 
tar_1.15.1dfsg.orig.tar.gz
 cd5e38483a68bdf42879ab95b090e456 52321 utils required tar_1.15.1dfsg-1.diff.gz
 c557f14900f0c9a8a99dc967213586f2 521524 utils required 
tar_1.15.1dfsg-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEO2eyZKfAp/LPAagRAlrQAJ4148tGKD8AM5LthGyc9xiBkVR+DACeKj/e
Uk5xKieygqhFjTzmKWSp+KE=
=z/nY
-END PGP SIGNATURE-

---End Message---


Bug#360843:

2006-04-11 Thread Thomas Schoepf
 Wrong.  The use of Replaces is a mandatory *part* of the fix.  You don't
 move a file from one package to another without using Replaces.

You're assuming that those manpages are to be moved from modutils to
manpages-dev. But they're not.
joey's fix was to disable those manpages in manpages-dev since modutils
contains them since I don't know when.
So, no move, no Replaces.

Thomas

-- 
Feel free - 10 GB Mailbox, 100 FreeSMS/Monat ...
Jetzt GMX TopMail testen: http://www.gmx.net/de/go/topmail


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361929: grub - grub-install uses tools from /usr

2006-04-11 Thread Bastian Blank
Package: grub
Version: 0.97-5
Severity: serious

/sbin/grub-install uses tools which are location in /usr/bin. This is a
FHS violation, as tools in /bin and /sbin have to work without /usr.

Bastian

-- 
The face of war has never changed.  Surely it is more logical to heal
than to kill.
-- Surak of Vulcan, The Savage Curtain, stardate 5906.5


signature.asc
Description: Digital signature


Bug#356853: Scalable LaTeX font: Licensing question regarding ae fonts

2006-04-11 Thread Frank Küster
Grüezi,

I assume that I am right in attributing the ae fonts collection for
LaTeX to you?  While doing a license cleanup in teTeX and TeXLive, I
noticed that there is a small problem with this package.  It contains a
copy of the GPL which probably indicates that it is intended to be
released under that license.  

However, this is not sufficient to put a work under GPL; instead one has
to follow the procedure described in the text:  Namely putting a short
GPL notice into each file, or instead listing all files and saying they
are all under GPL.

I would be grateful if you could clarify this.  Since we're both in
Zurich, you're welcome to give me a phone call at 044-635-5536 (work
hours) or at home (043-5393706).

Merci vielmal,
Regards, Frank

-- 
Frank Küster
Single Molecule Spectroscopy, Protein Folding @ Inst. f. Biochemie, Univ. Zürich
Debian Developer (teTeX)




Bug#361931: tar - FTBFS: cd: doc: No such file or directory

2006-04-11 Thread Bastian Blank
Package: tar
Version: 1.15.1dfsg-1
Severity: serious

There was an error while trying to autobuild your package:

 Automatic build of tar_1.15.1dfsg-1 on debian-31 by sbuild/s390 85
[...]
 make[2]: Entering directory `/build/buildd/tar-1.15.1dfsg'
 Making all in doc
 /bin/sh: line 11: cd: doc: No such file or directory
 make[2]: *** [all-recursive] Error 1
 make[2]: Leaving directory `/build/buildd/tar-1.15.1dfsg'
 make[1]: *** [all] Error 2
 make[1]: Leaving directory `/build/buildd/tar-1.15.1dfsg'


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#356745: NMU

2006-04-11 Thread Julien Danjou
Hello,

NMU of this package has been made to DELAYED/5.
So you still have 5 days to override my upload.

-- 
Julien Danjou
.''`.  Debian Developer
: :' : http://julien.danjou.info
`. `'  http://people.debian.org/~acid
  `-   9A0D 5FD9 EB42 22F6 8974  C95C A462 B51E C2FE E5CD


signature.asc
Description: Digital signature


Bug#350493: marked as done (Subject: python-hid: Python bindings are virtually unusable)

2006-04-11 Thread Debian Bug Tracking System
Your message dated Tue, 11 Apr 2006 03:47:08 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#350493: fixed in libhid 0.2.15+20060325-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: python-hid
Version: 0.2.12-1
Severity: grave
Justification: renders package unusable

The SWIG interface file in libhid 0.2.12-1 does not properly handle
conversion of Python string and list objects into buffer/length pairs.
This means that nearly all of the functions which pass HID path arrays
or binary buffers will not work (resulting in TypeErrors, or crashing
the interpreter).

Upstream SVN (post 0.2.15) has fixes for all of the functions currently
known to be broken.

-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.6.12-11-686
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages python-hid depends on:
ii  libc62.3.2.ds1-22GNU C Library: Shared
libraries an
ii  libhid0  0.2.12-1userspace USB HID access library
ii  libusb-0.1-4 2:0.1.10a-9.sarge.1 userspace USB programming
library
ii  python   2.3.5-2 An interactive high-level
object-o

-- no debconf information


---End Message---
---BeginMessage---
Source: libhid
Source-Version: 0.2.15+20060325-2

We believe that the bug you reported is fixed in the latest version of
libhid, which is due to be installed in the Debian FTP archive:

libhid-dev_0.2.15+20060325-2_i386.deb
  to pool/main/libh/libhid/libhid-dev_0.2.15+20060325-2_i386.deb
libhid0_0.2.15+20060325-2_i386.deb
  to pool/main/libh/libhid/libhid0_0.2.15+20060325-2_i386.deb
libhid_0.2.15+20060325-2.dsc
  to pool/main/libh/libhid/libhid_0.2.15+20060325-2.dsc
libhid_0.2.15+20060325-2.tar.gz
  to pool/main/libh/libhid/libhid_0.2.15+20060325-2.tar.gz
python-hid_0.2.15+20060325-2_i386.deb
  to pool/main/libh/libhid/python-hid_0.2.15+20060325-2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Arnaud Quette [EMAIL PROTECTED] (supplier of updated libhid package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 10 Apr 2006 14:42:52 +0200
Source: libhid
Binary: libhid0 libhid-dev python-hid
Architecture: source i386
Version: 0.2.15+20060325-2
Distribution: unstable
Urgency: low
Maintainer: martin f. krafft [EMAIL PROTECTED]
Changed-By: Arnaud Quette [EMAIL PROTECTED]
Description: 
 libhid-dev - userspace USB HID development files
 libhid0- userspace USB HID access library
 python-hid - Python wrapper for USB HID access library
Closes: 345190 350493
Changes: 
 libhid (0.2.15+20060325-2) unstable; urgency=low
 .
   * forgot to close the fixed python binding bug (closes: Bug#350493)
   * build on GNU/kFreeBSD as also been fixed upstream in svn (closes:
 Bug#345190)
Files: 
 ce221ecd45bcf298802de3dd733e76ce 700 libs optional libhid_0.2.15+20060325-2.dsc
 de370a7ed1a9aaa58092af9c51222c9a 537342 libs optional 
libhid_0.2.15+20060325-2.tar.gz
 d91c06813ca315577f08a38814392da9 40732 libdevel optional 
libhid-dev_0.2.15+20060325-2_i386.deb
 763ade8e5c26740fd850acd593ae82f6 28606 libs optional 
libhid0_0.2.15+20060325-2_i386.deb
 9157cf0de192d7989979f01e971e1b86 42572 python optional 
python-hid_0.2.15+20060325-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEO4WA22QUyiBN3xsRAh+2AKCs8veq+smrymW5JfKKNxYzOIekOACePaRd
l4vzukO+K8BJRxemX9iu8vw=
=Ah21
-END PGP SIGNATURE-

---End Message---


Processed: severity of 316180 is grave, tagging 316180

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.9.15
 severity 316180 grave
Bug#316180: luxman: Does not start
Severity set to `grave'.

 tags 316180 + confirmed
Bug#316180: luxman: Does not start
There were no tags set.
Tags added: confirmed


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361937: libsasl2: DIGEST-MD5 Pre-Auth DoS found in 2.1.18, likely to also be in 2.1.19 and 2.1.20

2006-04-11 Thread Sven Mueller
Package: libsasl2
Version: 2.1.19-1.5
Severity: serious
Tags: security
Justification: Security problem

Please see http://labs.musecurity.com/advisories/MU-200604-01.txt for
more information.

Regrads,
Sven


-- System Information:
Debian Release: 3.1
  APT prefers stable
  APT policy: (990, 'stable'), (400, 'experimental'), (90, 'testing'), (50, 
'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.11.12-incase
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages libsasl2 depends on:
ii  libc6   2.3.2.ds1-22 GNU C Library: Shared libraries an
ii  libdb4.24.2.52-18Berkeley v4.2 Database Libraries [

Versions of packages libsasl2 recommends:
ii  libsasl2-modules  2.1.19-1.5 Pluggable Authentication Modules f

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361943: ipe: FTBFS (amd64): format '%d' expects type 'int', but argument 3 has type 'size_t'

2006-04-11 Thread Andreas Jochens
Package: ipe
Version: 6.0pre26-2
Severity: serious
Tags: patch

When building 'ipe' on amd64/unstable, I get the following error:

make[2]: Entering directory `/ipe-6.0pre26/src/ipetopng'
g++ -c -pipe -O2 -D_REENTRANT -Wall -W -Werror  -DQT_NO_CAST_FROM_ASCII 
-DQT_NO_DEBUG -DQT_GUI_LIB -DQT_CORE_LIB -I/usr/share/qt4/mkspecs/linux-g++ -I. 
-I/usr/include/qt4/QtCore -I/usr/include/qt4/QtGui -I/usr/include/qt4 
-I../include -I../ipemodel -I../ipecanvas -I../../build/moc/ipetopng -I. -o 
../../build/obj/ipetopng/ipetopng.o ipetopng.cpp
cc1plus: warnings being treated as errors
ipetopng.cpp: In function 'int topng(const char*, const char*, int, double)':
ipetopng.cpp:77: warning: format '%d' expects type 'int', but argument 3 has 
type 'size_t'
make[2]: *** [../../build/obj/ipetopng/ipetopng.o] Error 1
make[2]: Leaving directory `/ipe-6.0pre26/src/ipetopng'

With the attached patch 'ipe' can be compiled on amd64.

Regards
Andreas Jochens

diff -urN ../tmp-orig/ipe-6.0pre26/src/ipetopng/ipetopng.cpp 
./src/ipetopng/ipetopng.cpp
--- ../tmp-orig/ipe-6.0pre26/src/ipetopng/ipetopng.cpp  2005-12-14 
04:45:59.0 +
+++ ./src/ipetopng/ipetopng.cpp 2006-04-11 08:24:57.0 +
@@ -73,7 +73,7 @@
   }
   if (pageNum  1 || pageNum  int(doc-size())) {
 fprintf(stderr,
-   The document contains %d pages, cannot convert page %d.\n,
+   The document contains %ld pages, cannot convert page %d.\n,
doc-size(), pageNum);
 delete doc;
 return 1;


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#323815: bzflag: shoots through other players

2006-04-11 Thread Steve Langasek
Hi Tim,

There are reports saying that this bug still exists after your latest
upload.  Can you confirm this?  Is this problem specific to amd64 now?

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Bug#331661: extensions/*.jar ship without source code, shipped jar files are installed

2006-04-11 Thread Steve Langasek
Hello,

Don's analysis of this bug is absolutely correct; we can't ship .jar files
in main that don't have corresponding source that can be rebuilt as needed
for bugfixing; including in the source package.  Is anything being done for
this bug?

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Bug#334697: apt-listbugs does not show several grave/serious bugs

2006-04-11 Thread Steve Langasek
tags 334697 -fixed
severity 334697 serious
thanks

On Tue, Apr 11, 2006 at 04:52:28PM +0900, Kenshi Muto wrote:

 I noticed maintainer's cron script at osdn.d.o.j had stopped
 since a long time ago by wrong permission.

 I fixed it and hope this bug is solved. 

I'm afraid I don't think apt-listbugs is releasable as long as it depends on
this external source for bug indices.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Bug#357456: error in postinst script

2006-04-11 Thread Steve Langasek
severity 357456 important
thanks

This is a policy violation, but it doesn't appear to be a release-critical
one per se; the abort-upgrade target is only ever called if there's another
bug in a future version of the package.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Bug#358135: dvilib2: directory /usr/share/DVIlib2 is missing in testing version of the package

2006-04-11 Thread Steve Langasek
clone 358135 -1
reassign -1 vflib3-dev 3.6.13-3
severity -1 serious
retitle -1 vflib3-dev: missing dependencies on libttf-dev and libt1-dev for .la 
files
tags -1 patch
thanks

This is actually two bugs.  One is that bits of the tex-guy build are
failing, and nothing is trapping the errors, so parts of the package are
silently lost.

The other is that vflib3-dev is missing a dependency on two -dev packages,
which is what causes the errors that tex-guy is silently ignoring.  Attached
is a patch for this second issue.

I don't think I have the patience to go through and try to fix up tex-guy's
build rules to propagate errors, though; instead, I'm planning to remove
tex-guy from testing pending resolution of this bug.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/
diff -Nru /tmp/PWiIcwmXAW/vflib3-3.6.13/config.guess 
/tmp/y69NQvePhe/vflib3-3.6.13/config.guess
--- /tmp/PWiIcwmXAW/vflib3-3.6.13/config.guess  2006-04-11 02:16:54.0 
-0700
+++ /tmp/y69NQvePhe/vflib3-3.6.13/config.guess  2006-04-11 02:16:54.0 
-0700
@@ -3,7 +3,7 @@
 #   Copyright (C) 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999,
 #   2000, 2001, 2002, 2003, 2004, 2005 Free Software Foundation, Inc.
 
-timestamp='2005-08-03'
+timestamp='2006-02-23'
 
 # This file is free software; you can redistribute it and/or modify it
 # under the terms of the GNU General Public License as published by
@@ -106,7 +106,7 @@
 trap exitcode=\$?; (rm -f \$tmpfiles 2/dev/null; rmdir \$tmp 2/dev/null)  
exit \$exitcode 0 ;
 trap rm -f \$tmpfiles 2/dev/null; rmdir \$tmp 2/dev/null; exit 1 1 2 13 15 
;
 : ${TMPDIR=/tmp} ;
- { tmp=`(umask 077  mktemp -d -q $TMPDIR/cgXX) 2/dev/null`  test -n 
$tmp  test -d $tmp ; } ||
+ { tmp=`(umask 077  mktemp -d $TMPDIR/cgXX) 2/dev/null`  test -n 
$tmp  test -d $tmp ; } ||
  { test -n $RANDOM  tmp=$TMPDIR/cg$$-$RANDOM  (umask 077  mkdir $tmp) 
; } ||
  { tmp=$TMPDIR/cg-$$  (umask 077  mkdir $tmp)  echo Warning: creating 
insecure temp directory 2 ; } ||
  { echo $me: cannot create a temporary directory in $TMPDIR 2 ; exit 1 ; } 
;
@@ -206,6 +206,9 @@
 *:ekkoBSD:*:*)
echo ${UNAME_MACHINE}-unknown-ekkobsd${UNAME_RELEASE}
exit ;;
+*:SolidBSD:*:*)
+   echo ${UNAME_MACHINE}-unknown-solidbsd${UNAME_RELEASE}
+   exit ;;
 macppc:MirBSD:*:*)
echo powerppc-unknown-mirbsd${UNAME_RELEASE}
exit ;;
@@ -764,7 +767,12 @@
echo ${UNAME_MACHINE}-unknown-bsdi${UNAME_RELEASE}
exit ;;
 *:FreeBSD:*:*)
-   echo ${UNAME_MACHINE}-unknown-freebsd`echo ${UNAME_RELEASE}|sed -e 
's/[-(].*//'`
+   case ${UNAME_MACHINE} in
+   pc98)
+   echo i386-unknown-freebsd`echo ${UNAME_RELEASE}|sed -e 
's/[-(].*//'` ;;
+   *)
+   echo ${UNAME_MACHINE}-unknown-freebsd`echo ${UNAME_RELEASE}|sed 
-e 's/[-(].*//'` ;;
+   esac
exit ;;
 i*:CYGWIN*:*)
echo ${UNAME_MACHINE}-pc-cygwin
@@ -772,6 +780,9 @@
 i*:MINGW*:*)
echo ${UNAME_MACHINE}-pc-mingw32
exit ;;
+i*:MSYS_NT-*:*:*)
+   echo ${UNAME_MACHINE}-pc-mingw32
+   exit ;;
 i*:windows32*:*)
# uname -m includes -pc on this system.
echo ${UNAME_MACHINE}-mingw32
@@ -779,8 +790,11 @@
 i*:PW*:*)
echo ${UNAME_MACHINE}-pc-pw32
exit ;;
-x86:Interix*:[34]*)
-   echo i586-pc-interix${UNAME_RELEASE}|sed -e 's/\..*//'
+x86:Interix*:[345]*)
+   echo i586-pc-interix${UNAME_RELEASE}
+   exit ;;
+EM64T:Interix*:[345]*)
+   echo x86_64-unknown-interix${UNAME_RELEASE}
exit ;;
 [345]86:Windows_95:* | [345]86:Windows_98:* | [345]86:Windows_NT:*)
echo i${UNAME_MACHINE}-pc-mks
@@ -851,7 +865,11 @@
#endif
#endif
 EOF
-   eval `$CC_FOR_BUILD -E $dummy.c 2/dev/null | grep ^CPU=`
+   eval `$CC_FOR_BUILD -E $dummy.c 2/dev/null | sed -n '
+   /^CPU/{
+   s: ::g
+   p
+   }'`
test x${CPU} != x  { echo ${CPU}-unknown-linux-gnu; exit; }
;;
 mips64:Linux:*:*)
@@ -870,7 +888,11 @@
#endif
#endif
 EOF
-   eval `$CC_FOR_BUILD -E $dummy.c 2/dev/null | grep ^CPU=`
+   eval `$CC_FOR_BUILD -E $dummy.c 2/dev/null | sed -n '
+   /^CPU/{
+   s: ::g
+   p
+   }'`
test x${CPU} != x  { echo ${CPU}-unknown-linux-gnu; exit; }
;;
 or32:Linux:*:*)
@@ -919,6 +941,9 @@
 sparc:Linux:*:* | sparc64:Linux:*:*)
echo ${UNAME_MACHINE}-unknown-linux-gnu
exit ;;
+vax:Linux:*:*)
+   echo ${UNAME_MACHINE}-dec-linux-gnu
+   exit ;;
 x86_64:Linux:*:*)
echo x86_64-unknown-linux-gnu
exit ;;
@@ -964,7 +989,7 @@
LIBC=gnulibc1
# endif
#else
-   #ifdef __INTEL_COMPILER
+   #if 

Processed: Re: dvilib2: directory /usr/share/DVIlib2 is missing in testing version of the package

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 clone 358135 -1
Bug#358135: dvilib2: directory /usr/share/DVIlib2 is missing in testing version 
of the package
Bug 358135 cloned as bug 361944.

 reassign -1 vflib3-dev 3.6.13-3
Bug#361944: dvilib2: directory /usr/share/DVIlib2 is missing in testing version 
of the package
Bug reassigned from package `dvilib2' to `vflib3-dev'.

 severity -1 serious
Bug#361944: dvilib2: directory /usr/share/DVIlib2 is missing in testing version 
of the package
Severity set to `serious'.

 retitle -1 vflib3-dev: missing dependencies on libttf-dev and libt1-dev for 
 .la files
Bug#361944: dvilib2: directory /usr/share/DVIlib2 is missing in testing version 
of the package
Changed Bug title.

 tags -1 patch
Bug#361944: vflib3-dev: missing dependencies on libttf-dev and libt1-dev for 
.la files
There were no tags set.
Tags added: patch

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#334697: apt-listbugs does not show several grave/serious bugs

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 334697 -fixed
Bug#334697: apt-listbugs does not show several grave/serious bugs
Tags were: fixed
Tags removed: fixed

 severity 334697 serious
Bug#334697: apt-listbugs does not show several grave/serious bugs
Severity set to `serious'.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361904: Failed to load application: libstdc++.so.6: cannot handle TLS data

2006-04-11 Thread Steve Langasek
reassign 361904 libstdc++6
severity 361904 critical
merge 360776 361904
thanks

On Tue, Apr 11, 2006 at 09:13:35AM +0200, Matteo Calorio wrote:
 Package: apt-proxy
 Version: 1.9.33-0.1
 Severity: grave
 Justification: renders package unusable

 *** Please type your report below this line ***
 # /etc/init.d/apt-proxy start
 Starting apt-proxy
 Failed to load application: libstdc++.so.6: cannot handle TLS data

This is a bug in libstdc++.so.6, not in apt-proxy.

A fix is being worked on; in the meantime, you might want to consider
upgrading to a 2.6 kernel, since Debian isn't releasing any supported
2.4 kernels with etch.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Bug#361908: xorg - FTBFS: debian/scripts/vars.s390: No such file or directory

2006-04-11 Thread Steve Langasek
severity 361908 important
user debian-release@lists.debian.org
usertag 361908 rc-s390
thanks

:/

On Tue, Apr 11, 2006 at 09:50:38AM +0200, Bastian Blank wrote:
 Package: xorg
 Version: 1:7.0.10
 Severity: serious

 There was an error while trying to autobuild your package:

  Automatic build of xorg_1:7.0.10 on debian-31 by sbuild/s390 85
 [...]
   /usr/bin/fakeroot debian/rules clean
  debian/rules:39: debian/scripts/vars.s390: No such file or directory
  make: *** No rule to make target `debian/scripts/vars.s390'.  Stop.
  **
  Build finished at 20060410-2236
  FAILED [dpkg-buildpackage died]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Unfortunately, the wrong severity for an architecture that's currently not
RC.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Bug#361939: lessdisks-terminal: Depends: devfsd, but no 2.4 kernels planned for etch

2006-04-11 Thread Steve Langasek
Package: lessdisks-terminal
Version: 0.5.3cvs.20040906-16
Severity: serious

Hi Jonas,

The lessdisks-termianl package depends on devfsd.  In addition to simply
being RC-buggy, devfsd is not useful with current 2.6 kernels; and no 2.4
kernels are planned for the etch release.  I'm removing devfsd from etch for
bug #306990, so lessdisks is not releasable with this dependency.

If lessdisks-terminal is compatible with 2.6 kernels, please remove the
dependency on devfsd.  If it isn't, please update it so that it is
compatible.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Processed: Re: Bug#361854: function *() php/apache Crash PHP 4.4.2 and 5.1.2

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 Version: 4:4.4.2-1
Unknown command or malformed arguments to command.

 severity 361854 important
Bug#361854: function *() php/apache Crash PHP 4.4.2 and 5.1.2
Severity set to `important'.

 severity 361855 important
Bug#361855: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2
Severity set to `important'.

 severity 361856 important
Bug#361856: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2
Severity set to `important'.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#361919 acknowledged by developer (Re: [exim-dev] Dropping all hosts with ignore_target_hosts results in host lookup did not complete)

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 found #361919 4.50-8sarge1
Bug#361919: exim4: Dropping all hosts with ignore_target_hosts results in host 
lookup did not complete
Bug marked as found in version 4.50-8sarge1.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#358981: enigmail: FTBFS on powerpc

2006-04-11 Thread Steve Langasek
severity 358981 important
thanks

Since enigmail has no previous binaries in the archive for powerpc, this bug
is not release-critical.

Thanks,
-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Processed: Re: Bug#361909: xserver-xorg-input-digitaledge - FTBFS: Wrong architecture line

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 361909 normal
Bug#361909: xserver-xorg-input-digitaledge - FTBFS: Wrong architecture line
Severity set to `normal'.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#361827: libgdal1-grass: fails to read GRASS vectors

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 reassign 361827 libgdal1-1.3.1-grass
Bug#361827: libgdal1-grass: fails to read GRASS vectors
Warning: Unknown package 'libgdal1-grass'
Bug reassigned from package `libgdal1-grass' to `libgdal1-1.3.1-grass'.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: severity of 361919 is serious

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 361919 serious
Bug#361919: exim4: Dropping all hosts with ignore_target_hosts results in host 
lookup did not complete
Severity set to `serious'.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361909: xserver-xorg-input-digitaledge - FTBFS: Wrong architecture line

2006-04-11 Thread Steve Langasek
severity 361909 normal
thanks

On Tue, Apr 11, 2006 at 09:51:11AM +0200, Bastian Blank wrote:
 Package: xserver-xorg-input-digitaledge
 Version: 1:1.0.1.3-2
 Severity: serious

 There was an error while trying to autobuild your package:

  Automatic build of xserver-xorg-input-digitaledge_1:1.0.1.3-2 on debian-31 
  by sbuild/s390 85
 [...]
  Building Dependency Tree...
  E: Couldn't find package xserver-xorg-dev
  apt-get failed.
  Package installation failed
  Trying to reinstall removed packages:
  Trying to uninstall newly installed packages:
  Source-dependencies not satisfied; skipping xserver-xorg-input-digitaledge
  **
  Finished at 20060410-2257
  Build needed 00:00:00, 0k disk space

Not RC; the package evidently will build on any architecture where the
build-deps are satisfied, so arch: any seems valid to me.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Bug#361827: libgdal1-grass: fails to read GRASS vectors

2006-04-11 Thread Steve Langasek
reassign 361827 libgdal1-1.3.1-grass
thanks

On Mon, Apr 10, 2006 at 05:10:09PM +0200, Paolo Cavallini wrote:
 Package: libgdal1-grass
 Version: 1.3.1
 Severity: grave
 Justification: renders package unusable

There is no package of this name in Debian; presumably this should be
assigned to libgdal1-1.3.1-grass.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Bug#361805: bug-buddy: fails to update bug information and crashes afterwards

2006-04-11 Thread Steve Langasek
severity 361805 important
thanks

On Mon, Apr 10, 2006 at 02:38:46PM +0200, Dirk De Groote wrote:
 Package: bug-buddy
 Version: 2.8.0-3
 Severity: grave
 Justification: renders package unusable

 tested on 2 computers, with same result : lauching bug-buddy proposes
 you to update your bug-information. Clicking update starts downloading
 6 (4 on the other box) updates. Then an error message appears :
 application has quit unexpectedly and you get 3 options : restart
 app, close or inform developpers ( the latter being impossible
 since that one tries to launch bug-buddy ...). Selecting restart
 puts you back in the update loop , this time only requiering 2 updates
 , but those never succeed ... same loop all over : crash -- restart --
 update -- crash -- restart ... etc.

So click the don't update button instead?

I'm not sure why this functionality is enabled at all in the Debian package
of bug-buddy, since updates should happen through the Debian package system
and *not* by pulling updates from third-party websites; but in any case, you
don't have to agree to update in order to use bug-buddy, so I don't think
this warrants a grave severity.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Processed: Re: Bug#361904: Failed to load application: libstdc++.so.6: cannot handle TLS data

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 reassign 361904 libstdc++6
Bug#361904: Failed to load application: libstdc++.so.6: cannot handle TLS data
Bug reassigned from package `apt-proxy' to `libstdc++6'.

 severity 361904 critical
Bug#361904: Failed to load application: libstdc++.so.6: cannot handle TLS data
Severity set to `critical'.

 merge 360776 361904
Bug#360776: apt-show-versions: cron.daily fails noisily
Bug#361904: Failed to load application: libstdc++.so.6: cannot handle TLS data
Mismatch - only Bugs in same state can be merged:
Values for `blocked-by' don't match:
 #360776 has `361675';
 #361904 has `'

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#361805: bug-buddy: fails to update bug information and crashes afterwards

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 361805 important
Bug#361805: bug-buddy: fails to update bug information and crashes afterwards
Severity set to `important'.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361940: python-mysqldb: can't be binNMUed due to arch: all - arch: any dep

2006-04-11 Thread Steve Langasek
Package: python-mysqldb
Version: 1.2.1c3-6
Severity: grave

The python-mysqldb package is uninstallable in unstable because
python-mysqldb was binNMUed for the mysqlclient ABI change, and
python-mysqldb, an arch: all package, has a dependency on 
python2.3-mysqldb (= 1.2.1c3-6) which no longer exists.

Arch: all - Arch: any strict versioned dependencies are fundamentally
incompatible with binNMUs.  Please either make a single arch: any
python-mysqldb package that Provides: python2.3-mysqldb, or relax the
dependency so it can be satisfied by +b1 ... +bN versions of the package.

Either way, python-mysqldb currently needs a sourceful upload for the
libmysqlclient transition.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Processed: Re: error in postinst script

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 357456 important
Bug#357456: error in postinst script
Severity set to `important'.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361853: marked as done (phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2)

2006-04-11 Thread Debian Bug Tracking System
Your message dated Mon, 10 Apr 2006 22:01:02 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#361854: function *() php/apache Crash PHP 4.4.2 and 5.1.2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: php4
Version: 4:4.3.10-16
Severity: grave

for more informaton see:
http://securityreason.com/achievement_securityalert/34

--
Oliver Paulus

OpenPGP
Key id: 28D9C44F
Fingerprint: EADA 62FC 07DC 3361 A3D6  4174 2DE3 C027 28D9 C44F
Public Key: http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x28D9C44F





pgpZTgHtku1sd.pgp
Description: Digitale PGP-Unterschrift
---End Message---
---BeginMessage---
Version: 4:4.4.2-1
severity 361854 important
severity 361855 important
severity 361856 important
thanks

On Mon, Apr 10, 2006 at 11:14:43PM +0200, Oliver Paulus wrote:
 for more informaton see:
 http://securityreason.com/achievement_securityalert/34

On Mon, Apr 10, 2006 at 11:14:43PM +0200, Oliver Paulus wrote:
 for more informaton see:
 http://securityreason.com/achievement_securityalert/35

On Mon, Apr 10, 2006 at 11:16:11PM +0200, Oliver Paulus wrote:
 for more informaton see:
 http://securityreason.com/achievement_securityalert/36

On Mon, Apr 10, 2006 at 11:17:52PM +0200, Oliver Paulus wrote:

 for more informaton see:
 http://securityreason.com/achievement_securityalert/37

It is my understanding that all of these bugs are fixed in the etch version
of php4; I'm accordingly marking them as closed.

In addition, except for the cross-site scripting bug, none of these appear
to warrant severity: grave.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature
---End Message---


Bug#306990: lvm2: Strange error when attempting to install

2006-04-11 Thread Steve Langasek
Hi Arthur,

It seems this bug still exists in devfsd package.  Given that the only
kernel planned as part of the etch release is 2.6.16+ which has no support
for devfs, perhaps it's time to request removal of devfsd from etch/sid?

Thanks,
-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Processed: Re: enigmail: FTBFS on powerpc

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 358981 important
Bug#358981: enigmail: FTBFS on powerpc
Severity set to `important'.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#361908: xorg - FTBFS: debian/scripts/vars.s390: No such file or directory

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 361908 important
Bug#361908: xorg - FTBFS: debian/scripts/vars.s390: No such file or directory
Severity set to `important'.

 user debian-release@lists.debian.org
Setting user to debian-release@lists.debian.org (was [EMAIL PROTECTED]).
 usertag 361908 rc-s390
There were no usertags set.
Usertags are now: rc-s390.
 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#356916: GFDL/non-free procedure

2006-04-11 Thread Norbert Preining
Dear all!

I am moving out the GFDL documentation from the texinfo package and want
to ask whether the following procedure is the right way to do it:

Current status:
source package: texinfo
orig file:  texinfo_4.8.orig.tar.gz
binary packages:texinfo_4.8-8, info_4.8-8

New status:
source package: texinfo
orig file:  texinfo_4.8.dfsg.orig.tar.gz
binary packags: texinfo_4.8.dfsg-1, info_4.8.dfsg-1

source package: texinfo-doc-nonfree
orig file:  texinfo-doc-nonfree_4.8.orig.tar.gz
binary package: texinfo-doc-nonfree_4.8-1

Then I probably need something like

texinfo-doc-nonfree:Replaces texinfo/info = 4.8-8
Conflicts texinfo/info = 4.8-8

Is this ok?

Best wishes

Norbert

---
Dr. Norbert Preining preining AT logic DOT at Università di Siena
gpg DSA: 0x09C5B094  fp: 14DF 2E6C 0307 BE6D AD76  A9C0 D2BF 4AA3 09C5 B094
---
KERRY (n.)
The small twist of skin which separated each sausage on a string.
--- Douglas Adams, The Meaning of Liff


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361943: ipe: FTBFS (amd64): format '%d' expects type 'int', but argument 3 has type 'size_t'

2006-04-11 Thread Stephen Gran
This one time, at band camp, Andreas Jochens said:
 Package: ipe
 Version: 6.0pre26-2
 Severity: serious
 Tags: patch
 
 When building 'ipe' on amd64/unstable, I get the following error:
 
 make[2]: Entering directory `/ipe-6.0pre26/src/ipetopng'
 g++ -c -pipe -O2 -D_REENTRANT -Wall -W -Werror  -DQT_NO_CAST_FROM_ASCII 
 -DQT_NO_DEBUG -DQT_GUI_LIB -DQT_CORE_LIB -I/usr/share/qt4/mkspecs/linux-g++ 
 -I. -I/usr/include/qt4/QtCore -I/usr/include/qt4/QtGui -I/usr/include/qt4 
 -I../include -I../ipemodel -I../ipecanvas -I../../build/moc/ipetopng -I. -o 
 ../../build/obj/ipetopng/ipetopng.o ipetopng.cpp
 cc1plus: warnings being treated as errors
 ipetopng.cpp: In function 'int topng(const char*, const char*, int, double)':
 ipetopng.cpp:77: warning: format '%d' expects type 'int', but argument 3 has 
 type 'size_t'
 
 diff -urN ../tmp-orig/ipe-6.0pre26/src/ipetopng/ipetopng.cpp 
 ./src/ipetopng/ipetopng.cpp
 --- ../tmp-orig/ipe-6.0pre26/src/ipetopng/ipetopng.cpp2005-12-14 
 04:45:59.0 +
 +++ ./src/ipetopng/ipetopng.cpp   2006-04-11 08:24:57.0 +
 @@ -73,7 +73,7 @@
}
if (pageNum  1 || pageNum  int(doc-size())) {
  fprintf(stderr,
 - The document contains %d pages, cannot convert page %d.\n,
 + The document contains %ld pages, cannot convert page %d.\n,
   doc-size(), pageNum);

C99 has introduced the prefix z for size_t, so this should really be
written as:
+ The document contains %zd pages, cannot convert page %d.\n,
   doc-size(), pageNum);

Andreas, can you confirm that this works for you?

Take care,
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Bug#361376: liferea segfaults randomly

2006-04-11 Thread Lars Lindner
On 4/11/06, Junichi Uekawa [EMAIL PROTECTED] wrote:
 Hi.

We receive a lot of user reports about crashes with gtkhtml2.
And retests with the Mozilla renderer showed that the reason
lies withing gtkhtml2. So I assume that it is no Liferea problem.
So (at least from the upstream point of view) this won't fix.
Please use Mozilla for rendering if you can.
  
   It might be just better if you ditched the liferea-gtkhtml package.
 
  Why? Only the latest libgtkhtml2 versions are broken.

 Okay, so, that's not a fundamental problem, but a hopefully transient
 problem?  It might be good to get some bugs marked as 'serious' on
 gtkhtml so that apt-listbugs users can know it's broken before it's
 upgraded/installed.

   I've switched over to mozilla rendering for now.
 
  Should be better anyway.

 Fonts Look uglier, and I don't see a preferences box to fix it...

The rendering code reuses the GNOME default application font. This
might be ugly, depending of what font you configured :-)

But you can overwrite it by supplying a user defined stylesheet as
described in the FAQ on the project homepage.



Bug#361943: ipe: FTBFS (amd64): format '%d' expects type 'int', but argument 3 has type 'size_t'

2006-04-11 Thread Andreas Jochens
On 06-Apr-11 13:00, Stephen Gran wrote:
 C99 has introduced the prefix z for size_t, so this should really be
 written as:
 + The document contains %zd pages, cannot convert page %d.\n,
doc-size(), pageNum);
 
 Andreas, can you confirm that this works for you?

Yes, this works for me, thanks!

Regards
Andreas Jochens



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361952: tex4ht-common: Package uninstallable due to missing configuration file

2006-04-11 Thread Meike Reichle
Package: tex4ht-common
Version: 20060312-1
Severity: grave
Justification: renders package unusable


Installing tex4ht-common fails with this error message:

update-texmf: Basic configuration file /etc/texmf/texmf.d/05TeXMF.cnf
missing.

It can be (quick)fixed doing a touch /etc/texmf/texmf.d/05TeXMF.cnf

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-1-686
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages tex4ht-common depends on:
ii  tetex-bin 2.0.2-31   The teTeX binary files

Versions of packages tex4ht-common recommends:
ii  dvipng1.5-2.1convert PNG graphics from DVI file
ii  tex4ht20060312-1 LaTeX and TeX for Hypertext (HTML)
ii  zip   2.31-3 Archiver for .zip files

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361800: Does not compile now

2006-04-11 Thread Lupe Christoph
I should have checked before using so much time on trying to get the
2.4.4 version going. The OpenSWAN project released 2.4.5 a few days ago.
That version is supposed to work with the 2.6.15 kernel.

I don't think I can close this bug as a non-DD. Rene, please do that.

I hope you find time soon to package 2.4.5...

Thanks,
Lupe Christoph
-- 
| You know we're sitting on four million pounds of fuel, one nuclear |
| weapon and a thing that has 270,000 moving parts built by the lowest   |
| bidder. Makes you feel good, doesn't it?   |
| Rockhound in Armageddon, 1998, about the Space Shuttle   |


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361956: nagios2-common: postinstall script uses unconditional chmod/chown, breaking any dpkg-statoverride

2006-04-11 Thread Heiko Schlittermann
Package: nagios2-common
Version: 2.1-1
Severity: serious
Tags: patch
Justification: Policy 10.9.1

As stated in the subject -- the postinstall uses unconditionally
chmod/chown.  If the local admin tries to change permissions using
dpkg-statoverride, these local changes are not respected.

-- System Information:
Debian Release: testing/unstable
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16.jumper
Locale: LANG=C, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
diff -ruN nagios2-2.1/debian/lintian/overrides/nagios2-common 
nagios2-2.hs/debian/lintian/overrides/nagios2-common
--- nagios2-2.1/debian/lintian/overrides/nagios2-common 2006-04-11 
14:15:11.0 +0200
+++ nagios2-2.hs/debian/lintian/overrides/nagios2-common1970-01-01 
01:00:00.0 +0100
@@ -1 +0,0 @@
-non-standard-file-perm etc/nagios2/resource.cfg 0600 != 0644
diff -ruN nagios2-2.1/debian/nagios2-common.install 
nagios2-2.hs/debian/nagios2-common.install
--- nagios2-2.1/debian/nagios2-common.install   2006-04-11 14:15:11.0 
+0200
+++ nagios2-2.hs/debian/nagios2-common.install  2006-04-11 14:09:30.0 
+0200
@@ -5,6 +5,5 @@
 sample-config/template-object/README 
/usr/share/doc/nagios2-common/examples/template-object
 sample-config/template-object/*.cfg 
/usr/share/doc/nagios2-common/examples/template-object
 debian/httpd.webapps-common /usr/share/nagios2/debian
-debian/lintian/overrides/nagios2-common usr/share/lintian/overrides
 debian/gateway.cfg usr/share/nagios2/debian
 debian/extcommands.cfg usr/share/nagios2/debian
diff -ruN nagios2-2.1/debian/nagios2-common.postinst 
nagios2-2.hs/debian/nagios2-common.postinst
--- nagios2-2.1/debian/nagios2-common.postinst  2006-04-11 14:15:11.0 
+0200
+++ nagios2-2.hs/debian/nagios2-common.postinst 2006-04-11 11:48:57.0 
+0200
@@ -20,6 +20,16 @@
 # location of the default htpasswd authentication file.
 htpw=$en/htpasswd.users
 
+# useful functions
+setperm() {
+local user=$1; shift
+local group=$1; shift
+local mode=$1; shift
+local file=$1; shift
+dpkg-statoverride --list $file /dev/null  return 0
+dpkg-statoverride --update --add $user $group $mode $file
+}
+
 case $1 in
   configure)
 if ! getent passwd nagios  /dev/null ; then
@@ -76,14 +86,15 @@
 
# explicitly set permissions on some files that are dependent
# on the uid/gid of the nagios user, which is dynamically created.
-   chown root:nagios $en/resource.cfg
-   chmod 640 $en/resource.cfg
-install -d -onagios -gadm -m2751 /var/log/nagios2
-install -d -onagios -gnagios -m750 /var/run/nagios2
-install -d -onagios -gnagios -m750 /var/lib/nagios2
-   # chown instead of install to preserve permission bits
-   chown nagios /var/lib/nagios2/rw
-install -d -onagios -gwww-data -m2750 /var/cache/nagios2
+   # .hs
+   # Do not forget to remove these statoverrides when purging the
+   # package!
+   setperm root nagios 0640 $en/resource.cfg
+   setperm nagios adm 2751 /var/log/nagios2
+   setperm nagios nagios 0750 /var/run/nagios2
+   setperm nagios nagios 0750 /var/lib/nagios2
+   setperm nagios www-data 02750 /var/cache/nagios2
+   setperm nagios www-data 0700 /var/lib/nagios2/rw
 
# everything went well, so now let's reset the password
db_set nagios2/adminpassword 
diff -ruN nagios2-2.1/debian/nagios2-common.postrm 
nagios2-2.hs/debian/nagios2-common.postrm
--- nagios2-2.1/debian/nagios2-common.postrm2006-04-11 14:15:11.0 
+0200
+++ nagios2-2.hs/debian/nagios2-common.postrm   2006-04-11 11:50:02.0 
+0200
@@ -13,6 +13,13 @@
ucf --purge /etc/nagios2/apache2.conf
ucf --purge /etc/nagios2/conf.d/host-gateway_nagios2.cfg
#ucf --purge /etc/nagios2/conf.d/extcommands_nagios2.cfg
+
+   dpkg-statoverride --force --remove /etc/nagios2/resource.cfg
+   dpkg-statoverride --force --remove /var/log/nagios2
+   dpkg-statoverride --force --remove /var/run/nagios2
+   dpkg-statoverride --force --remove /var/lib/nagios2
+   dpkg-statoverride --force --remove /var/cache/nagios2
+   dpkg-statoverride --force --remove /var/lib/nagios2/rw
 ;;
 esac
 
diff -ruN nagios2-2.1/debian/rules nagios2-2.hs/debian/rules
--- nagios2-2.1/debian/rules2006-04-11 14:15:11.0 +0200
+++ nagios2-2.hs/debian/rules   2006-04-11 14:12:23.0 +0200
@@ -137,10 +137,9 @@
# remove empty directory
rmdir --ignore-fail-on-non-empty -p $b/nagios2/var/lib/nagios2/archives
# set up /var/cache/nagios2 for access by www-data
-   chgrp www-data ${bnc}/var/cache/nagios2
-   chmod g+s ${bnc}/var/cache/nagios2
-   chown root:www-data ${bnc}/var/lib/nagios2/rw
-   chmod 700 ${bnc}/var/lib/nagios2/rw
+   # Permissions are set in postinstall using dpkg-statoverride
+   # for following parts: /var/cache/nagios2
+   #  /var/lib/nagios2/rw
# alter some 

Bug#361958: modutils conflicts with manpages-dev. see Bug #360843

2006-04-11 Thread Hámorszky Balázs
Package: modutils
Version: 2.4.27.0-5
Severity: critical
Justification: breaks unrelated software


Unpacking replacement manpages-dev ...
dpkg: error processing /var/cache/apt/archives/manpages-dev_2.25-2_all.deb 
(--unpack):
 trying to overwrite `/usr/share/man/man2/create_module.2.gz', which is also in 
package modutils
dpkg-deb: subprocess paste killed by signal (Broken pipe)
Errors were encountered while processing:
 /var/cache/apt/archives/manpages-dev_2.25-2_all.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16
Locale: LANG=hu_HU, LC_CTYPE=hu_HU (charmap=ISO-8859-2)

Versions of packages modutils depends on:
ii  libc62.3.6-5 GNU C Library: Shared libraries an
ii  sysvinit 2.86.ds1-14 System-V-like init utilities

modutils recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361800: Does not compile now

2006-04-11 Thread Lupe Christoph
On Tuesday, 2006-04-11 at 09:42:30 +0200, Lupe Christoph wrote:
 Hi!

 Even with the patch I submitted, the resulting kernel does not compile:

   CC [M]  net/ipsec/ipsec_tunnel.o

Here is another one:

  CC [M]  net/ipsec/pfkey_v2.o
net/ipsec/pfkey_v2.c: In function 'pfkey_destroy_socket':
net/ipsec/pfkey_v2.c:464: error: 'struct sk_buff' has no member named 'list'
net/ipsec/pfkey_v2.c:466: error: 'struct sk_buff' has no member named 'stamp'
net/ipsec/pfkey_v2.c:466: error: 'struct sk_buff' has no member named 'stamp'
net/ipsec/pfkey_v2.c: In function 'pfkey_recvmsg':
net/ipsec/pfkey_v2.c:1383: error: 'struct sk_buff' has no member named 'stamp'

I'm giving up. Rene, the ball is on your side ;-)
Lupe Christoph
-- 
| You know we're sitting on four million pounds of fuel, one nuclear |
| weapon and a thing that has 270,000 moving parts built by the lowest   |
| bidder. Makes you feel good, doesn't it?   |
| Rockhound in Armageddon, 1998, about the Space Shuttle   |


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361800: Does not compile now

2006-04-11 Thread Rene Mayrhofer
Am Tuesday 11 April 2006 14:02 schrieb Lupe Christoph:
 I should have checked before using so much time on trying to get the
 2.4.4 version going. The OpenSWAN project released 2.4.5 a few days ago.
 That version is supposed to work with the 2.6.15 kernel.

 I don't think I can close this bug as a non-DD. Rene, please do that.

 I hope you find time soon to package 2.4.5...
I'll try to find time for that within the next few days, but I can't promise - 
very busy right now with other projects
-- 
-
Gibraltar firewall   http://www.gibraltar.at/


pgpZexcy5E5hn.pgp
Description: PGP signature


Processed: Reopen

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 361915 important
Bug#361915: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2
Severity set to `important'.

 severity 361917 important
Bug#361917: function *() php/apache Crash PHP 4.4.2 and 5.1.2
Severity set to `important'.

 severity 361916 important
Bug#361916: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2
Severity set to `important'.

 found 361853 4:4.4.2-1
Bug#361853: phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2
Bug marked as found in version 4:4.4.2-1.

 found 361854 4:4.4.2-1
Bug#361854: function *() php/apache Crash PHP 4.4.2 and 5.1.2
Bug marked as found in version 4:4.4.2-1.

 found 361855 4:4.4.2-1
Bug#361855: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2
Bug marked as found in version 4:4.4.2-1.

 found 361856 4:4.4.2-1
Bug#361856: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2
Bug marked as found in version 4:4.4.2-1.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361943: ipe: FTBFS (amd64): format '%d' expects type 'int', but argument 3 has type 'size_t'

2006-04-11 Thread Steve M. Robbins
Hey Folks,

Thanks for your interest in Ipe.

On Tue, Apr 11, 2006 at 01:00:08PM +0100, Stephen Gran wrote:

 
 C99 has introduced the prefix z for size_t, so this should really be
 written as:
 + The document contains %zd pages, cannot convert page %d.\n,
doc-size(), pageNum);
 
 Andreas, can you confirm that this works for you?

Bastian Blank had previously pointed out %z to me (BTS #361773).
I uploaded revision -3 last night that uses %zu in two places.
I wonder if you could try building that version and see if there
are any printf()s that I have overlooked.

Thanks,
-Steve


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#309670: marked as done (gabber: FTBFS: Missing build dependency.)

2006-04-11 Thread Debian Bug Tracking System
Your message dated Tue, 11 Apr 2006 10:59:45 -0300
with message-id [EMAIL PROTECTED]
and subject line The failing package doesn't exist anymore
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: gabber
Version: 1.9.4-1
Severity: serious
Tags: experimental

Hi,

Gabber is failing to build in experimental with the following
error:
checking for intltool = 0.23... 0.30 found
checking for perl... /usr/bin/perl
configure: error: XML::Parser perl module is required for intltool
make: *** [config.status] Error 1

Adding a bulid dependency on libxml-parser-perl could fix this.


Kurt


---End Message---
---BeginMessage---
This bug existed in a version of the gabber package which was present in
experimental. It was removed from experimental, so I'm closing this bug.

-- 
Goedson Teixeira Paixao [EMAIL PROTECTED]


signature.asc
Description: Esta é uma parte de mensagem	assinada digitalmente
---End Message---


Bug#333906: marked as done (apt-get build-dep fails due to glademm transition)

2006-04-11 Thread Debian Bug Tracking System
Your message dated Tue, 11 Apr 2006 11:08:16 -0300
with message-id [EMAIL PROTECTED]
and subject line Buggy package was removed
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Package: gabber
Severity: serious
Version: 0.8.8-5

Hi

Please update your build dependency on libglademm2.0-dev to
libglademm2.4-dev

Cheers

Luk

- --
Luk Claes - http://people.debian.org/~luk - GPG key 1024D/9B7C328D
Fingerprint:   D5AF 25FB 316B 53BB 08E7   F999 E544 DE07 9B7C 328D
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDT5kh5UTeB5t8Mo0RAmsJAJ4/gqtIvrLVI3wqQh694+HihcmZFgCggq0a
Q7Zhi+TMHdq5xTXhBNpvtWo=
=mIUC
-END PGP SIGNATURE-

---End Message---
---BeginMessage---
This bug was only present on a version of the package existent in
experimental. It is not present anymore, so I'm closing this bug.

-- 
Goedson Teixeira Paixao [EMAIL PROTECTED]


signature.asc
Description: Esta é uma parte de mensagem	assinada digitalmente
---End Message---


Bug#361967: Horde3 Critical Vunerability

2006-04-11 Thread Pedro Müller



Package: horde3Version: 3.0.9-3Severity: critical 


"Horde is prone to a remote PHP code-execution 
vulnerability. 

An attacker can exploit this issue to execute arbitrary 
malicious PHP code and in the context of the webserver process. This may help 
the attacker compromise the application and the underlying system; other attacks 
are also possible. 

Horde versions 3.0 up to 3.0.9 and 3.1.0 are vulnerable; 
other versions may also be affected."

See:http://www.securityfocus.com/bid/17292/info

Pedro MüllerSecurity Officer



Bug#361903: marked as done (policycoreutils - FTBFS: error: 'SEMANAGE_CAN_READ' undeclared)

2006-04-11 Thread Debian Bug Tracking System
Your message dated Tue, 11 Apr 2006 07:32:05 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#361903: fixed in policycoreutils 1.30-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: policycoreutils
Version: 1.30-1
Severity: serious

There was an error while trying to autobuild your package:

 Automatic build of policycoreutils_1.30-1 on debian01 by sbuild/s390 85
[...]
 make[2]: Entering directory `/build/buildd/policycoreutils-1.30/semodule'
 cc -O2 -g -I/usr/include   -c -o semodule.o semodule.c
 semodule.c: In function 'main':
 semodule.c:248: error: 'SEMANAGE_CAN_READ' undeclared (first use in this 
 function)
 semodule.c:248: error: (Each undeclared identifier is reported only once
 semodule.c:248: error: for each function it appears in.)
 make[2]: *** [semodule.o] Error 1
 make[2]: Leaving directory `/build/buildd/policycoreutils-1.30/semodule'
 make[1]: *** [all] Error 1
 make[1]: Leaving directory `/build/buildd/policycoreutils-1.30'
 make: *** [build/policycoreutils] Error 2
 **
 Build finished at 20060410-2324
 FAILED [dpkg-buildpackage died]

---End Message---
---BeginMessage---
Source: policycoreutils
Source-Version: 1.30-2

We believe that the bug you reported is fixed in the latest version of
policycoreutils, which is due to be installed in the Debian FTP archive:

policycoreutils_1.30-2.diff.gz
  to pool/main/p/policycoreutils/policycoreutils_1.30-2.diff.gz
policycoreutils_1.30-2.dsc
  to pool/main/p/policycoreutils/policycoreutils_1.30-2.dsc
policycoreutils_1.30-2_i386.deb
  to pool/main/p/policycoreutils/policycoreutils_1.30-2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Manoj Srivastava [EMAIL PROTECTED] (supplier of updated policycoreutils 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 11 Apr 2006 09:07:42 -0500
Source: policycoreutils
Binary: policycoreutils
Architecture: source i386
Version: 1.30-2
Distribution: unstable
Urgency: low
Maintainer: Manoj Srivastava [EMAIL PROTECTED]
Changed-By: Manoj Srivastava [EMAIL PROTECTED]
Description: 
 policycoreutils - SELinux core policy utilities
Closes: 361903
Changes: 
 policycoreutils (1.30-2) unstable; urgency=low
 .
   * Bug fix: policycoreutils - FTBFS: error: 'SEMANAGE_CAN_READ'
 undeclared, thanks to Bastian Blank. Tighten dependency on
 libsemanage1-dev(Closes: #361903).
Files: 
 6ab4356366010c0cdbb262dd759f6a36 683 utils optional policycoreutils_1.30-2.dsc
 22abe1cd390c63b1e57c4e7218e2 46038 utils optional 
policycoreutils_1.30-2.diff.gz
 916275783d47bf28890e3ff612038928 166440 utils optional 
policycoreutils_1.30-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEO7p+Ibrau78kQkwRAnfGAJ4toWXVOKA6IyEyd66bIAuMRZny9QCeI7/V
2naLjaPIyC45qduYS6IvzyE=
=qstR
-END PGP SIGNATURE-

---End Message---


Bug#361958: marked as done (modutils conflicts with manpages-dev. see Bug #360843)

2006-04-11 Thread Debian Bug Tracking System
Your message dated Tue, 11 Apr 2006 10:05:49 -0400
with message-id [EMAIL PROTECTED]
and subject line Invalid
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: modutils
Version: 2.4.27.0-5
Severity: critical
Justification: breaks unrelated software


Unpacking replacement manpages-dev ...
dpkg: error processing /var/cache/apt/archives/manpages-dev_2.25-2_all.deb 
(--unpack):
 trying to overwrite `/usr/share/man/man2/create_module.2.gz', which is also in 
package modutils
dpkg-deb: subprocess paste killed by signal (Broken pipe)
Errors were encountered while processing:
 /var/cache/apt/archives/manpages-dev_2.25-2_all.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16
Locale: LANG=hu_HU, LC_CTYPE=hu_HU (charmap=ISO-8859-2)

Versions of packages modutils depends on:
ii  libc62.3.6-5 GNU C Library: Shared libraries an
ii  sysvinit 2.86.ds1-14 System-V-like init utilities

modutils recommends no packages.

-- no debconf information

---End Message---
---BeginMessage---

Hi,
this is a manpages-dev bug.
---End Message---


Processed: found 360843 in 2.25-2

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 found 360843 2.25-2
Bug#360843: manpages-dev tries to overwrite files from modutils 
(create_module.2.gz)
Bug#361084: package manpages-dev in unstable is broken
Bug#361369: conflicting files with modutils
Bug marked as found in version 2.25-2.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361956: [Pkg-nagios-devel] Bug#361956: nagios2-common: postinstall script uses unconditional chmod/chown, breaking any dpkg-statoverride

2006-04-11 Thread Marc Haber
On Tue, Apr 11, 2006 at 02:35:09PM +0200, Heiko Schlittermann wrote:
 As stated in the subject -- the postinstall uses unconditionally
 chmod/chown.  If the local admin tries to change permissions using
 dpkg-statoverride, these local changes are not respected.
 +# useful functions
 +setperm() {
 +local user=$1; shift
 +local group=$1; shift
 +local mode=$1; shift
 +local file=$1; shift
 +dpkg-statoverride --list $file /dev/null  return 0
 +dpkg-statoverride --update --add $user $group $mode $file
 +}

The maintainer script adding the statoverride does not seem to be
policy compliant to me. We are not to touch the dpkg-statoverride
database.

For exim4, we have solved this with the following code:

# honor dpkg-statoverride settings for files not managed with dpkg
for pat in /var/\*/exim4 /var/\*/exim4/\*; do
[ $EX4DEBUG ]  eval echo evaluate statoverride $pat
eval dpkg-statoverride --list $pat | while read USER GROUP MODE 
FILE; do
[ $EX4DEBUG ]  echo statoverride $USER $GROUP $MODE 
$FILE
chown ${USER}:${GROUP} $FILE
chmod $MODE $FILE
done
done

I don't particularly like the way this is implemented, though. Comments?

Greetings
Marc

-- 
-
Marc Haber | I don't trust Computers. They | Mailadresse im Header
Mannheim, Germany  |  lose things.Winona Ryder | Fon: *49 621 72739834
Nordisch by Nature |  How to make an American Quilt | Fax: *49 621 72739835


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Horde3 Vulnerability: CVE-2006-1491 remote arbitrary command execution

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags  361967 +etch sarge security
Bug#361967: Horde3 Critical Vunerability
There were no tags set.
Tags added: etch, sarge, security

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361976: nant: incorrect clilibs control file leading to broken dependencies

2006-04-11 Thread Sebastian Dröge
Package: nant
Version: 0.84+0.85-rc3-8
Severity: serious

Hi,
currently the clilibs control file of nant lists all kinds of libraries:
 NDoc.Core 1.3.1851.0__b9896512f28c0f09 nant (= 0.84+0.85)
 NDoc.Documenter.Msdn 1.3.1851.0__b9896512f28c0f09 nant (= 0.84+0.85)
 NDoc.ExtendedUI 1.3.1851.0__b9896512f28c0f09 nant (= 0.84+0.85)
 nunit.framework 2.2.0.0__96d09a1eb7f44a77 nant (= 0.84+0.85)
 nunit.core 2.2.0.0__96d09a1eb7f44a77 nant (= 0.84+0.85)
 NUnitCore 1.11.786.40392__1fd1558aebfb1c04 nant (= 0.84+0.85)
 ICSharpCode.SharpZipLib 0.83.1.0__1b03e6acf1164f73 nant (= 0.84+0.85)
 log4net 1.2.1.40796__aaa0f432407c68df nant (= 0.84+0.85)

These are, although they're shipped by nant, not meant to be used by external
programs and (more important) are not installed into the GAC at all.
nant simply shouldn't call dh_makeclilibs.

This wrong clilibs file for example gets one a nant Depends on packages that
link to nunit.core.dll instead of the correct libnunit-cil Depends and leads
to a missing assembly in the GAC which results in an application crash.

Bye



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361956: [Pkg-nagios-devel] Bug#361956: nagios2-common: postinstall script uses unconditional chmod/chown, breaking any dpkg-statoverride

2006-04-11 Thread Heiko Schlittermann
Marc Haber [EMAIL PROTECTED] (Di 11 Apr 2006 16:16:53 CEST):
 On Tue, Apr 11, 2006 at 02:35:09PM +0200, Heiko Schlittermann wrote:
  As stated in the subject -- the postinstall uses unconditionally
  chmod/chown.  If the local admin tries to change permissions using
  dpkg-statoverride, these local changes are not respected.
  +# useful functions
  +setperm() {
  +local user=$1; shift
  +local group=$1; shift
  +local mode=$1; shift
  +local file=$1; shift
  +dpkg-statoverride --list $file /dev/null  return 0
  +dpkg-statoverride --update --add $user $group $mode $file
  +}
 
 The maintainer script adding the statoverride does not seem to be
 policy compliant to me. We are not to touch the dpkg-statoverride
 database.

What about the policy manual 10.9.1?

Given the above, dpkg-statoverride is essentially a tool for system
administrators and would not normally be needed in the maintainer scripts.
There is one type of situation, though, where calls to dpkg-statoverride 
would
be needed in the maintainer scripts, and that involves packages which use
dynamically allocated user or group ids. In such a situation, something like
the following idiom can be very helpful in the package's postinst, where
sysuser is a dynamically allocated id:




Of course, both (not touching the statoverride data base - and - using
statoverride for fixing the permissions) have their pro  con.

Pro using statoverride:

o it's clean interface
o admin is able to see all permissions different from
root:root 0755/0644
o easy way to recover lost permissions of packaged files

Contra:

o probably huge data base of statoverrides

o more steps for admin to change the permissions of 
  statoverridden files (as statoverride only changes
  the permissions during '--add', and the files are added
  already during package installation)

  (May be a new version of statoverride could solve it:
dpkg-statoverride --update --list pattern)


Best regards from Dresden
Viele Grüße aus Dresden
Heiko Schlittermann
-- 
 SCHLITTERMANN.de  internet  unix support -
 Heiko Schlittermann HS12-RIPE -
 gnupg encrypted messages are welcome - key ID: 48D0359B ---
 gnupg fingerprint: 3061 CFBF 2D88 F034 E8D2  7E92 EE4E AC98 48D0 359B -





signature.asc
Description: Digital signature


Bug#361967: Horde3 Vulnerability: CVE-2006-1491 remote arbitrary command execution

2006-04-11 Thread Lionel Elie Mamane
tags  361967 +etch sarge security
thanks

On Tue, Apr 11, 2006 at 10:46:07AM -0300, Pedro Müller wrote:

   See this:
 http://www.securityfocus.com/bid/17292/info

 Please, fix this or update to 3.0.10.

An update has been submitted to the security team; I suppose they are
going to release a security advisory and put the said update on the
archive on security.debian.org anytime now.

If you wish to use the update we prepared before it is approved by the
security team, you can take it from
http://people.debian.org/~lmamane/horde/ . (That update is for Debian
stable 3.1 sarge. Debian unstable sid is already fixed. Debian testing
etch (the beta version of Debian 3.2) is going to get the update
automatically in a few days. If you are running Debian testing etch,
you can install the horde3 / imp4 / turba2 / ... packages from
unstable sid.

The secure testing team might want to consider pushing turba2 2.1-1
to etch prematurely, as it is blocking horde3 3.1.1-1 (the version
that fixes this) to migrate to testing.


 This is critical!

Yes, it is.

-- 
Lionel


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361977: evolution: [composer] crashes on line-wrap

2006-04-11 Thread Matthew T. Atkinson
Package: evolution
Version: 2.4.2.1-1
Severity: grave
Justification: renders package unusable

Hello,

When typing a message into the Evolution composer, which carries out
automatic line-wrapping, the entire application freezes when the first
line-wrap would have been carried out.

The only way to close evolution is to ``Force Quit'' or kill the process
manually.

The only work-around is to type the message in another editor, then
paste it into Evolution with automatic line-wrapping turned off.

It happened after a very recent upgrade, on two different Etch machines
that I have access to.

best regards,


Matthew

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (900, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-1-686
Locale: LANG=en_GB, LC_CTYPE=en_GB (charmap=ISO-8859-1)

Versions of packages evolution depends on:
ii  evolution-dat 1.4.2.1-1  evolution database backend server
ii  gconf22.14.0-1   GNOME configuration database syste
ii  gnome-icon-th 2.12.1-2   GNOME Desktop icon theme
ii  gtkhtml3.83.8.1-1HTML rendering/editing library - b
ii  libart-2.0-2  2.3.17-1   Library of functions for 2D graphi
ii  libatk1.0-0   1.11.3-1   The ATK accessibility toolkit
ii  libaudiofile0 0.2.6-6Open-source version of SGI's audio
ii  libbonobo2-0  2.14.0-1   Bonobo CORBA interfaces library
ii  libbonoboui2- 2.10.1-2   The Bonobo UI library
ii  libc6 2.3.6-3GNU C Library: Shared libraries an
ii  libcairo2 1.0.2-3The Cairo 2D vector graphics libra
ii  libcamel1.2-6 1.4.2.1-1  The Evolution MIME message handlin
ii  libcomerr21.38+1.39-WIP-2005.12.31-1 common error description library
ii  libcompfaceg1 1:1.5.2-3  Compress/decompress images for mai
ii  libdb4.2  4.2.52-23.1Berkeley v4.2 Database Libraries [
ii  libebook1.2-5 1.4.2.1-1  Client library for evolution addre
ii  libecal1.2-3  1.4.2.1-1  Client library for evolution calen
ii  libedataserve 1.4.2.1-1  Utility library for evolution data
ii  libedataserve 1.4.2.1-1  GUI utility library for evolution 
ii  libesd0   0.2.36-3   Enlightened Sound Daemon - Shared 
ii  libfontconfig 2.3.2-1.1  generic font configuration library
ii  libfreetype6  2.1.10-1   FreeType 2 font engine, shared lib
ii  libgail-commo 1.8.11-1   GNOME Accessibility Implementation
ii  libgail17 1.8.11-1   GNOME Accessibility Implementation
ii  libgconf2-4   2.14.0-1   GNOME configuration database syste
ii  libgcrypt11   1.2.2-1LGPL Crypto library - runtime libr
ii  libglade2-0   1:2.5.1-2  library to load .glade files at ru
ii  libglib2.0-0  2.10.1-2   The GLib library of C routines
ii  libgnome-keyr 0.4.9-1GNOME keyring services library
ii  libgnome-pilo 2.0.12-1.4 Support libraries for gnome-pilot
ii  libgnome2-0   2.12.0.1-5 The GNOME 2 library - runtime file
ii  libgnomecanva 2.14.0-1   A powerful object-oriented display
ii  libgnomeprint 2.12.1-3   The GNOME 2.2 print architecture -
ii  libgnomeprint 2.12.1-2   GNOME 2.2 print architecture User 
ii  libgnomeui-0  2.12.1-1   The GNOME 2 libraries (User Interf
ii  libgnomevfs2- 2.12.2-5   GNOME virtual file-system (runtime
ii  libgnutls11   1.0.16-14  GNU TLS library - runtime library
ii  libgpg-error0 1.2-1  library for common error values an
ii  libgtk2.0-0   2.8.16-1   The GTK+ graphical user interface 
ii  libgtkhtml3.8 3.8.1-1HTML rendering/editing library - r
ii  libice6   6.9.0.dfsg.1-6 Inter-Client Exchange library
ii  libjpeg62 6b-12  The Independent JPEG Group's JPEG 
ii  libkrb53  1.4.3-6MIT Kerberos runtime libraries
ii  libldap2  2.1.30-13  OpenLDAP libraries
ii  libnspr4  2:1.7.12-1.1   Netscape Portable Runtime Library
ii  libnss3   2:1.7.12-1.1   Network Security Service Libraries
ii  liborbit2 1:2.14.0-1 libraries for ORBit2 - a CORBA ORB
ii  libpango1.0-0 1.12.0-2   Layout and rendering of internatio
ii  libpisock80.11.8-21  Library for communicating with a P
ii  libpisync00.11.8-21  Synchronization library for PalmOS
ii  libpng12-01.2.8rel-5 PNG library - runtime
ii  libpopt0  1.7-5  lib for parsing cmdline parameters

Bug#361984: pgpool: postinst failure (No such file or directory)

2006-04-11 Thread Laurent Bonnaud
Package: pgpool
Version: 3.0.1-1
Severity: grave
Justification: renders package unusable


Hi,

here is the problem:

Setting up pgpool (3.0.1-1) ...
Starting pgpool: pgpool-su: /usr/sbin/pgpool -n  21 /dev/null | logger -t 
pgpool -p local0.info /dev/null 21 : No such file or directory
 failed!
invoke-rc.d: initscript pgpool, action start failed.
dpkg: error processing pgpool (--configure):
 subprocess post-installation script returned error exit status 127


You should use su -c.


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (100, 'unstable'), (99, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16-1-686
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages pgpool depends on:
ii  libc6 2.3.6-5GNU C Library: Shared libraries an
ii  lsb-base  3.1-2  Linux Standard Base 3.1 init scrip
ii  postgresql-common 49 manager for PostgreSQL database cl

pgpool recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361919: marked as done (exim4: Dropping all hosts with ignore_target_hosts results in host lookup did not complete)

2006-04-11 Thread Debian Bug Tracking System
Your message dated Tue, 11 Apr 2006 08:47:09 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#361919: fixed in exim4 4.50-8sarge2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: exim4
Version: 4.60-4
Severity: normal

The following routers for remote domains (the reason for this
configuration is left as an excercise to the reader)

--8--
lookuphost:
  driver = dnslookup
  domains = ! +local_domains
  ignore_target_hosts = ! /0 : ! 85.194.0.0/18 : ! 212.214.126.0/24 : ! 
85.8.0.0/20
  same_domain_copy_routing
  transport = remote_smtp

smarthost:
  driver = manualroute
  domains = ! +local_domains
  transport = remote_smtp
  route_list = * smtpserver.stunet.se:mail.visit.se
  no_more
--8--

give the following (partial) output for exim4 -d -bt
[EMAIL PROTECTED]:

--8--
 lookuphost router 
local_part=holmgren domain=lysator.liu.se
checking domains
lysator.liu.se in @ : ittma-hohah : localhost : kibibyte.se : 
mail.kibibyte.se? no (end of list)
lysator.liu.se in ! +local_domains? yes (end of list)
calling lookuphost router
lookuphost router called for [EMAIL PROTECTED]
  domain = lysator.liu.se
DNS lookup of lysator.liu.se (MX) succeeded
DNS lookup of mail.lysator.liu.se () gave NO_DATA
returning DNS_NODATA
DNS lookup of mail.lysator.liu.se (A) succeeded
130.236.254.3 in ! /0 : ! 85.194.0.0/18 : ! 212.214.126.0/24 : ! 
85.8.0.0/20? yes (end of list)
ignored host mail.lysator.liu.se [130.236.254.3]
mail.lysator.liu.se in hosts_treat_as_local? no (end of list)
fully qualified name = lysator.liu.se
host_find_bydns yield = HOST_FIND_AGAIN (1); returned hosts:
  mail.lysator.liu.se null MX=10 *
lookuphost router: defer for [EMAIL PROTECTED]
  message: host lookup did not complete
[EMAIL PROTECTED] cannot be resolved at this time:
  host lookup did not complete
search_tidyup called
--8--

As you can see, there is no hint of DNS problems, so the
HOST_FIND_AGAIN is very strange. After downgrading to 4.60-1, the
problem went away. I suspect this might be caused by the fix to bug
#342619. More investigation to come...

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'stable'), (90, 'unstable'), (10, 
'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15-ittmahohah1
Locale: LANG=sv_SE.UTF-8, LC_CTYPE=sv_SE.UTF-8 (charmap=UTF-8)

---End Message---
---BeginMessage---
Source: exim4
Source-Version: 4.50-8sarge2

We believe that the bug you reported is fixed in the latest version of
exim4, which is due to be installed in the Debian FTP archive:

exim4-base_4.50-8sarge2_i386.deb
  to pool/main/e/exim4/exim4-base_4.50-8sarge2_i386.deb
exim4-config_4.50-8sarge2_all.deb
  to pool/main/e/exim4/exim4-config_4.50-8sarge2_all.deb
exim4-daemon-heavy_4.50-8sarge2_i386.deb
  to pool/main/e/exim4/exim4-daemon-heavy_4.50-8sarge2_i386.deb
exim4-daemon-light_4.50-8sarge2_i386.deb
  to pool/main/e/exim4/exim4-daemon-light_4.50-8sarge2_i386.deb
exim4_4.50-8sarge2.diff.gz
  to pool/main/e/exim4/exim4_4.50-8sarge2.diff.gz
exim4_4.50-8sarge2.dsc
  to pool/main/e/exim4/exim4_4.50-8sarge2.dsc
exim4_4.50-8sarge2_all.deb
  to pool/main/e/exim4/exim4_4.50-8sarge2_all.deb
eximon4_4.50-8sarge2_i386.deb
  to pool/main/e/exim4/eximon4_4.50-8sarge2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Marc Haber [EMAIL PROTECTED] (supplier of updated exim4 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 11 Apr 2006 12:23:25 +
Source: exim4
Binary: eximon4 exim4-daemon-custom exim4-daemon-heavy exim4-base exim4 
exim4-daemon-light exim4-config
Architecture: source i386 all
Version: 4.50-8sarge2
Distribution: stable
Urgency: low
Maintainer: Exim4 Maintainers [EMAIL PROTECTED]
Changed-By: Marc Haber [EMAIL PROTECTED]
Description: 
 exim4  

Bug#360379: Fixed in 2.3.11

2006-04-11 Thread Pawel Salek
This issue was fixed in January 2006, release 2.3.11. It's about a  
symbol that got deprecated in gnome libs.


Pawel



Processed: #361227: firebird2: debian/rules clean leaves generated files

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 361227 pending
Bug#361227: firebird2: debian/rules clean leaves generated files
There were no tags set.
Tags added: pending

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361976: marked as done (nant: incorrect clilibs control file leading to broken dependencies)

2006-04-11 Thread Debian Bug Tracking System
Your message dated Tue, 11 Apr 2006 09:32:09 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#361976: fixed in nant 0.84+0.85-rc3-10
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: nant
Version: 0.84+0.85-rc3-8
Severity: serious

Hi,
currently the clilibs control file of nant lists all kinds of libraries:
 NDoc.Core 1.3.1851.0__b9896512f28c0f09 nant (= 0.84+0.85)
 NDoc.Documenter.Msdn 1.3.1851.0__b9896512f28c0f09 nant (= 0.84+0.85)
 NDoc.ExtendedUI 1.3.1851.0__b9896512f28c0f09 nant (= 0.84+0.85)
 nunit.framework 2.2.0.0__96d09a1eb7f44a77 nant (= 0.84+0.85)
 nunit.core 2.2.0.0__96d09a1eb7f44a77 nant (= 0.84+0.85)
 NUnitCore 1.11.786.40392__1fd1558aebfb1c04 nant (= 0.84+0.85)
 ICSharpCode.SharpZipLib 0.83.1.0__1b03e6acf1164f73 nant (= 0.84+0.85)
 log4net 1.2.1.40796__aaa0f432407c68df nant (= 0.84+0.85)

These are, although they're shipped by nant, not meant to be used by external
programs and (more important) are not installed into the GAC at all.
nant simply shouldn't call dh_makeclilibs.

This wrong clilibs file for example gets one a nant Depends on packages that
link to nunit.core.dll instead of the correct libnunit-cil Depends and leads
to a missing assembly in the GAC which results in an application crash.

Bye


---End Message---
---BeginMessage---
Source: nant
Source-Version: 0.84+0.85-rc3-10

We believe that the bug you reported is fixed in the latest version of
nant, which is due to be installed in the Debian FTP archive:

nant_0.84+0.85-rc3-10.diff.gz
  to pool/main/n/nant/nant_0.84+0.85-rc3-10.diff.gz
nant_0.84+0.85-rc3-10.dsc
  to pool/main/n/nant/nant_0.84+0.85-rc3-10.dsc
nant_0.84+0.85-rc3-10_all.deb
  to pool/main/n/nant/nant_0.84+0.85-rc3-10_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Dave Beckett [EMAIL PROTECTED] (supplier of updated nant package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 11 Apr 2006 09:09:30 -0700
Source: nant
Binary: nant
Architecture: source all
Version: 0.84+0.85-rc3-10
Distribution: unstable
Urgency: low
Maintainer: Dave Beckett [EMAIL PROTECTED]
Changed-By: Dave Beckett [EMAIL PROTECTED]
Description: 
 nant   - .NET build tool similar to Ant
Closes: 361976
Changes: 
 nant (0.84+0.85-rc3-10) unstable; urgency=low
 .
   * Remove call to dh_makeclilibs since nant has no public GAC installed
 libraries (Closes: 361976)
Files: 
 0bc21d0c7fb3a467f201f8f97c679db7 700 devel optional nant_0.84+0.85-rc3-10.dsc
 4d57459e7f1c90231893a29449d5bd83 10162 devel optional 
nant_0.84+0.85-rc3-10.diff.gz
 acd3fad6ea35ef09d3e93e5ba649a150 1998712 devel optional 
nant_0.84+0.85-rc3-10_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEO9WEQ+ySUE9xlVoRAi4zAJ48bepFAFvcVif1OGprOlLyFP0uQQCfZYrt
iFHQLBsS6jxEla18sHi95iA=
=xKgy
-END PGP SIGNATURE-

---End Message---


Bug#300270: updated patch / bug #300270 status

2006-04-11 Thread Martin Michlmayr
* Paul Melnikow [EMAIL PROTECTED] [2006-04-03 15:41]:
 please go ahead -- thank you. sorry i can't be more helpful right
 now.

OK, I'll sponsor Joost's NMU in the next few days.
-- 
Martin Michlmayr
http://www.cyrius.com/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Do not close, but reassign and merge

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 reopen 361958
Bug#361958: modutils conflicts with manpages-dev. see Bug #360843
Bug reopened, originator not changed.

 severity 361958 serious
Bug#361958: modutils conflicts with manpages-dev. see Bug #360843
Severity set to `serious'.

 reassign 361958 manpages-dev
Bug#361958: modutils conflicts with manpages-dev. see Bug #360843
Bug reassigned from package `modutils' to `manpages-dev'.

 merge 361958 361369
Bug#361369: conflicting files with modutils
Bug#361958: modutils conflicts with manpages-dev. see Bug #360843
Bug#360843: manpages-dev tries to overwrite files from modutils 
(create_module.2.gz)
Bug#361084: package manpages-dev in unstable is broken
Merged 360843 361084 361369 361958.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: should dpkg check for changed types of conffiles ?

2006-04-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 clone 360673 -1
Bug#360673: lessdisks-terminal: purging removes /etc/mtab
Bug 360673 cloned as bug 361996.

 severity -1 wishlist
Bug#361996: lessdisks-terminal: purging removes /etc/mtab
Severity set to `wishlist'.

 reassign -1 dpkg
Bug#361996: lessdisks-terminal: purging removes /etc/mtab
Bug reassigned from package `lessdisks-terminal' to `dpkg'.

 retitle -1 dpkg: should check for changed types of conffiles ?
Bug#361996: lessdisks-terminal: purging removes /etc/mtab
Changed Bug title.

 In #360673, a package included a symbolic link from /etc/mtab to
Unknown command or malformed arguments to command.

 /proc/mounts.  Installing the package causes /etc/mtab to be
Unknown command or malformed arguments to command.

 overwritten, and purging the package causes it to be removed.  I
Unknown command or malformed arguments to command.

 reported it as a grave bug, since no package should overwriting or
Unknown command or malformed arguments to command.

 removing a file that doesn't specifically belong to that package.
Unknown command or malformed arguments to command.

Too many unknown commands, stopping here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#361995: evolution: Creating new address book creates only an alias, but deleting deletes the original folder

2006-04-11 Thread Benjamin Mesing
Package: evolution
Version: 2.4.2.1-2
Severity: critical
Justification: causes serious data loss
X-Debbugs-Cc: [EMAIL PROTECTED]


When I create a new address book, this only creates an alias to an exisiting
one (the last in the list of those available - but tried only once). 
Deleting this new (alias) addressbook, however, does also delete the real 
data behind it. Trying to access the original folder result in the following
error message:
  We were unable to open this addressbook.  Please check that the path 
  my-home/.evolution/addressbook/local exists and that you have 
  permission to access it.


Steps to reproduce: 
  new - addressbook
  delete the new addressbook
  the content of the aliased folder will be lost

Best regads 

Ben


-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15.6
Locale: LANG=en_GB.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_GB.UTF-8)

Versions of packages evolution depends on:
ii  evolution-data-serve 1.4.2.1-2   evolution database backend server
ii  gconf2   2.14.0-1GNOME configuration database syste
ii  gnome-icon-theme 2.8.0-4 GNOME Desktop icon theme
ii  gtkhtml3.8   3.8.1-1.1   HTML rendering/editing library - b
ii  libart-2.0-2 2.3.17-1Library of functions for 2D graphi
ii  libatk1.0-0  1.10.1-2The ATK accessibility toolkit
ii  libaudiofile00.2.6-6 Open-source version of SGI's audio
ii  libavahi-client3 0.6.4-2 Avahi client library
ii  libavahi-common3 0.6.9-6 Avahi common library
ii  libavahi-compat-howl 0.6.9-6 Avahi Howl compatibility library
ii  libavahi-glib1   0.6.9-6 Avahi glib integration library
ii  libbonobo2-0 2.14.0-1Bonobo CORBA interfaces library
ii  libbonoboui2-0   2.8.1-2 The Bonobo UI library
ii  libc62.3.6-4 GNU C Library: Shared libraries an
ii  libcairo21.0.2-3 The Cairo 2D vector graphics libra
ii  libcamel1.2-61.4.2.1-1   The Evolution MIME message handlin
ii  libcomerr2   1.37-2  common error description library
ii  libdb4.2 4.2.52-18   Berkeley v4.2 Database Libraries [
ii  libdbus-1-2  0.61-5  simple interprocess messaging syst
ii  libebook1.2-51.4.2.1-1   Client library for evolution addre
ii  libecal1.2-3 1.4.2.1-1   Client library for evolution calen
ii  libedataserver1.2-4  1.4.2.1-1   Utility library for evolution data
ii  libedataserverui1.2- 1.4.2.1-1   GUI utility library for evolution 
ii  libesd-alsa0 [libesd 0.2.35-2Enlightened Sound Daemon (ALSA) - 
ii  libfontconfig1   2.3.1-2 generic font configuration library
ii  libfreetype6 2.1.10-1FreeType 2 font engine, shared lib
ii  libgail-common   1.8.3-1 GNOME Accessibility Implementation
ii  libgail171.8.3-1 GNOME Accessibility Implementation
ii  libgconf2-4  2.14.0-1GNOME configuration database syste
ii  libgcrypt11  1.2.2-1 LGPL Crypto library - runtime libr
ii  libglade2-0  1:2.5.1-2   library to load .glade files at ru
ii  libglib2.0-0 2.10.1-2The GLib library of C routines
ii  libgnome-keyring00.4.3-1 GNOME keyring services library
ii  libgnome-pilot2  2.0.12-1.2  Support libraries for gnome-pilot
ii  libgnome2-0  2.8.1-2 The GNOME 2 library - runtime file
ii  libgnomecanvas2-02.12.0-1A powerful object-oriented display
ii  libgnomeprint2.2-0   2.12.1-2The GNOME 2.2 print architecture -
ii  libgnomeprintui2.2-0 2.12.1-1GNOME 2.2 print architecture User 
ii  libgnomeui-0 2.8.1-3 The GNOME 2 libraries (User Interf
ii  libgnomevfs2-0   2.14.0-1GNOME virtual file-system (runtime
ii  libgnutls11  1.0.16-14   GNU TLS library - runtime library
ii  libgpg-error01.2-1   library for common error values an
ii  libgtk2.0-0  2.8.9-2 The GTK+ graphical user interface 
ii  libgtkhtml3.8-15 3.8.1-1.1   HTML rendering/editing library - r
ii  libice6  4.3.0.dfsg.1-12.0.1 Inter-Client Exchange library
ii  libjpeg626b-10   The Independent JPEG Group's JPEG 
ii  libkrb53 1.4.3-4 MIT Kerberos runtime libraries
ii  libldap2 2.1.30-6OpenLDAP libraries
ii  libnspr4 2:1.7.12-1.1Netscape Portable Runtime Library
ii  libnss3  2:1.7.12-1.1Network Security Service Libraries
ii  liborbit2   

Bug#360673: should dpkg check for changed types of conffiles ?

2006-04-11 Thread Justin Pryzby
clone 360673 -1
severity -1 wishlist
reassign -1 dpkg
retitle -1 dpkg: should check for changed types of conffiles ?

In #360673, a package included a symbolic link from /etc/mtab to
/proc/mounts.  Installing the package causes /etc/mtab to be
overwritten, and purging the package causes it to be removed.  I
reported it as a grave bug, since no package should overwriting or
removing a file that doesn't specifically belong to that package.

However, I wonder whether this exposes a bug that dpkg should handle
better.  Installing lessdisks-terminal didn't cause a conffile prompt
(for me) presumably because
  [ md5sum(/proc/mtab) = md5sum(/etc/mtab.dpkg-new = /proc/mounts) ]

I know that dpkg intentionally doesn't overwrite symlinks with
directories and vice-versa, but I think that in this case (at least)
I should have been prompted.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#350677: apr-util: Patch to force PIC generation

2006-04-11 Thread Vincent Danjean
Vincent Danjean wrote:
 Here is a dpatch file to force the use of the -fPIC flags.

  Hi,

  Is there a problem with my patch ? There has been no information since
my mail (and the initial bug report) for this bug.
  If I do not hear otherwise, I intend to NMU this package with my patch
applied to close this RC-bug.

  Best regards,
Vincent



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#362001: [security] Insecure semaphore permissions

2006-04-11 Thread Damyan Ivanov
Package: libfbembed1
Version: 1.5.1-1
Severity: serious
Tags: security patch upstream

Hi,

(The purpose of this bugreport is mainly to get it fixed in stable.
Upload to unstable is pending.)

This time the security-related bug in firebird2 is DoS. The classic
flavour of the server (contained in libfbembed1) uses semaphore array
for IPC and creates this array with world-writable permissions. This
allows a local attacker to lock all semaphores in the array effectively
blocking further requests.

I post the bug in the BTS without privatelly discussion with the team,
since the vulnerability is published in upstreams bugtracker[1].

[1]
http://sourceforge.net/tracker/index.php?func=detailaid=1466193group_id=9028atid=593943

A fix to the vulnerability is to create semaphores with 0660
permissions. The patch to unstable package is in
separate-file-and-sem-perms.dpatch[2]. Patch to stable package may be
based on it (stable implements part of it). I can also prepare an
interdiff for stable if you prefer.

[2]
http://svn.debian.org/wsvn/pkg-firebird/trunk/debian/patches/separate-file-and-sem-perms.dpatch?op=filerev=0sc=0

A note about Version: in stable the libfbembed1 package is named
libfirebird2-classic. The vulnerability is present in all 1.5 versions.

Ah, there is also one file created with 0666, but it is in
/var/run/firebird2, which is accessable for firebird:firebird only and
thus poses no threats.


Please tell me if I can be of some help.


Greetings, dam



-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.13+reiser4+dam.1
Locale: LANG=bg_BG.UTF-8, LC_CTYPE=bg_BG.UTF-8 (charmap=UTF-8)

Versions of packages libfbembed1 depends on:
ii  libc6 2.3.6-4GNU C Library: Shared libraries an
ii  libgcc1   1:4.1.0-1  GCC support library
ii  libncurses5   5.5-1  Shared libraries for terminal hand
ii  libstdc++64.1.0-1The GNU Standard C++ Library v3

libfbembed1 recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#321057: intend to NMU

2006-04-11 Thread Bastian Venthur
Hi again,

since you've not responded to my NMU offer one month ago, I'd like to
offer the NMU again. I see that you're (like me) not (yet) a DD, so you
can't upload this fix yourself. If you need a sponsor, my AM offered to
sponsor this upload for you. Please drop me a note if you'd like to take
this offer.


Kind regards,

Bastian


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#360843: manpages-dev still tries to overwrite files from modutils

2006-04-11 Thread Torok Edwin
Package: manpages-dev
Version: 2.25-2
Followup-For: Bug #360843

Manpages-dev is still uninstallable:

Unpacking replacement manpages-dev ...
dpkg: error processing /var/cache/apt/archives/manpages-dev_2.25-2_all.deb 
(--unpack):
 trying to overwrite `/usr/share/man/man2/create_module.2.gz', which is also in 
package modutils

BTW, what is the correct way of reporting bugs for packages that are not 
installable? What version should I put
in the bugreport? The version of the new package, that doesn't install, or 
the version I have currently installed,
and can't upgrade from it? (I used the new version)



-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16-1-amd64-k8
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages manpages-dev depends on:
ii  manpages  2.25-2 Manual pages about using a GNU/Lin

manpages-dev recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



  1   2   >