Bug#382419: This is not the problem!

2006-09-06 Thread Ola Lundqvist
severity 382419 important
thanks

Hi

I have now been able to determine that if I define
#define BITS_PER_LONG
at the top of that file on that machine, it no longer
display that warning.

However the segmentation fault still exist.

So it is something else!

But this bug is still valid. It is not a serious bug anymore though.

And I have found it in the makedepend binary.

Regards,

// Ola

-- 
 - Ola Lundqvist ---
/  [EMAIL PROTECTED] Annebergsslingan 37  \
|  [EMAIL PROTECTED] 654 65 KARLSTAD  |
|  +46 (0)54-10 14 30  +46 (0)70-332 1551   |
|  http://www.opal.dhs.org UIN/icq: 4912500 |
\  gpg/f.p.: 7090 A92B 18FE 7994 0C36  4FE4 18A1 B1CF 0FE5 3DD9 /
 ---


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: This is not the problem!

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 382419 important
Bug#382419: vnc4: FTBFS on amd64: # error do_div() does not yet support the C64
Severity set to `important' from `serious'

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Depends or not.

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 385696 serious
Bug#385696: ./MAKEDEV: No such file or directory
Severity set to `serious' from `normal'

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386164: [pkg-wpa-devel] Bug#386164: wpasupplicant is missing versioned depends: on lsb-base

2006-09-06 Thread Kel Modderman
On Wednesday 06 September 2006 05:24, Andreas Janssen wrote:
 The missing functions log_action_begin and log_action_end were
 introduced in lsb-base 3.0-6.

Ok, thanks. wpasupplicant packaging has been updated accordingly.

Kel.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: reopening 291040

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.9.21
 reopen 291040
Bug#291040: catdvi: Missing dependencies
'reopen' is deprecated when a bug has been closed with a version;
use 'found' or 'submitter' as appropriate instead.
Bug reopened, originator not changed.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#358575: [Pkg-mailman-hackers] Bug#358575: Doesn't seem to be fixed in 3.1r3

2006-09-06 Thread Lionel Elie Mamane
On Fri, Sep 01, 2006 at 10:48:07AM +0100, Sam Morris wrote:

 I installed mailman 2.1.5-8sarge3 this morning, but the harmful sed
 command is still present in '/var/lib/dpkg/info/mailman.postrm'.

Please show me your /var/lib/dpkg/info/mailman.postrm file and the
output of dpkg -l mailman and apt-cache policy mailman.

-- 
Lionel


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#368968: [Petr Olsak] Re: Fixing teTeX's license violation in Debian; new license for cs stuff?

2006-09-06 Thread Frank Küster
---BeginMessage---

On Tue, 5 Sep 2006, Frank [iso-8859-1] Küster wrote:

 Hi Petr,

 sorry for answering so late - I was on holiday, then at work again and
 again away, and just didn't find time.

 Petr Olsak [EMAIL PROTECTED] wrote:

  As a short-term solution, is it possible to just take the three ini
  files from the current version and install them along with the old files
  already included in teTeX-3.0?
 
  Roughly speaking: Yes.
 [...]

 Thanks for the clarifications.

  The second question:  Have you come to a conclusion regarding the future
  license of the cs stuff?  As I understood it, you weren't aware of the
  problems of your mixed license (GPL + renaming clause) and needed some
  thinking (probably without being yelled at on the mailing lists...).
 
  I plan to keep the meaning of my licesne in csplain.ini the same but to
  change the text in csplain.ini file in order to the word GPL will be not
  mentioned. Simply speaking: You can do anything with csplain code but you
  cannot expect any warranty from me and you cannot distribute the
  csplain.ini, csfonts.tex, il2code.tex, t1code.tex, hyphen.lan and
  plaina4.tex files in changed form.

 You mean, unless I rename them, correct?

Yes.

 I strongly suggest to not invent a new license text.  I think the LPPL
 is just what you need, although it allows modification without renaming
 in the case that a prominent notice is printed that it is a different
 system.  If you find that not strict enough, I suggest to use a wording
 like Knuth did (or even better, add a After renaming, you may freely
 use, distribute and/or modify the files).

Thank you for your suggestions. I know that I never use LPPL license
simply because I dislike the word LaTeX in the name of this license.
From my point of view the LaTeX has totally bad philosophy. TeX itself was
not designed in order to do so big and complicated macrocode like LaTeX.
The effort to separate the TeX difficulties from user by macrocode cannot
be succesfull, IMHO. My opinion is well known (for example from my
article Why I dislike LaTeX in Czech) so everybody know that I have
nothing common with LaTeX. It means the word LaTeX canot be mentioned
in my licension text.

 Note, however, that
 renaming is not as clear as one might think on a web2c-based TeX
 system: Just moving a file around in a TEXMF tree may have the desired
 effect that it is not found when using cstex, while a renamed file will
 still be found with an appropriate line in TEXMF/aliases.

I know about this problem. Ideally, the TeX distribution cannot name the
format csplain if changed files was read during format initialisation.
The _name_used_by_user_ is more important than names of some files.
Yesterday, a user sent me a problem with \everypar and wrote: I used TeX
and your book about TeX [TeXbook naruby] and the program behaves different
than what is written in your book. I have read his log and I have had to
answer him: you did not use TeX but pdfetex in extended mode. Use original
TeX and you will see that my book describes the problem correctly. The
main mistake was, that you named the program TeX but it was not TeX.

The main aim of my license is to avoid these mistakes when a user
mentioned the word csplain.

 Do you have a timeline for a new release?  Later this year, there will

Sorry, I have had plans to do this in Jun, but I have solved more
important things (outside TeX). I mean that my new release will only
change the license text mentioned in csplain.ini. I don't plan more changes.
So, my timeline is: the end of september.

 be a new TeXlive version (and a new Debian release which contains these
 files in teTeX and TeXlive packages).  It would be a pity if the csplain
 things would have to be excluded from Debian (we are currently not
 allowed to distribute them).

 Regards, Frank


 By the way, may I forward your and my mail to the Debian Bugtracking
 system, in order to archive this discussion?

Yes, including all your archives of my letters.

Best regards

Petr



---End Message---


-- 
Frank Küster
Single Molecule Spectroscopy, Protein Folding @ Inst. f. Biochemie, Univ. Zürich
Debian Developer (teTeX/TeXLive)


Bug#368968: [Frank Küster] Fixing teTeX's license violation in Debian; new license for cs stuff?

2006-09-06 Thread Frank Küster
---BeginMessage---
Hi Petr,

I've got two questions regarding csTeX stuff.  The first is:  As
promised, I want to fix the license violation within Debian by updating
to the new version from CTAN.  However, this is more work than I
thought, because the Debian package is based on the original teTeX
tarball plus diff.gz, and I will have to recreate the tarball.  Since
I'll need to do that later, anyway, I'd rather postpone this solution.

As a short-term solution, is it possible to just take the three ini
files from the current version and install them along with the old files
already included in teTeX-3.0?

The second question:  Have you come to a conclusion regarding the future
license of the cs stuff?  As I understood it, you weren't aware of the
problems of your mixed license (GPL + renaming clause) and needed some
thinking (probably without being yelled at on the mailing lists...).

Just to rehash the legal problems:  The GPL says explicitly (addressed
at me, the distributor): 

,
| You may not impose any further restrictions on the recipients'
| exercise of the rights granted herein.
`

This means that I am not allowed to distribute a GPL'ed program with
further restrictions, like the renaming clause.  But that has the effect
that nobody except you is allowed to distribute csplain (or derivative
works of it), since you distribute it with an additional clause:  The
GPL requires me to drop it, but you license combination forbids it.

As I said previously, the LPPL gives you the protection you want in
terms of name changing.  Why don't you just switch the licensing to
LPPL?  Is the work of others included that you would have to ask first? 

Thanks in advance, Frank
-- 
Frank Küster
Single Molecule Spectroscopy, Protein Folding @ Inst. f. Biochemie, Univ. Zürich
Debian Developer (teTeX)

---End Message---


-- 
Frank Küster
Single Molecule Spectroscopy, Protein Folding @ Inst. f. Biochemie, Univ. Zürich
Debian Developer (teTeX/TeXLive)


Bug#368968: Fixing teTeX's license violation in Debian; new license for cs stuff?

2006-09-06 Thread Frank Küster
Petr Olsak [EMAIL PROTECTED] wrote:

 be succesfull, IMHO. My opinion is well known (for example from my
 article Why I dislike LaTeX in Czech) so everybody know that I have
 nothing common with LaTeX. It means the word LaTeX canot be mentioned
 in my licension text.

Oh, well, that's a reason I can understand.

 Do you have a timeline for a new release?  Later this year, there will

 Sorry, I have had plans to do this in Jun, but I have solved more
 important things (outside TeX). I mean that my new release will only
 change the license text mentioned in csplain.ini. I don't plan more changes.
 So, my timeline is: the end of september.

Oh, that would be fine.

Kind regards, Frank
-- 
Frank Küster
Single Molecule Spectroscopy, Protein Folding @ Inst. f. Biochemie, Univ. Zürich
Debian Developer (teTeX/TeXLive)



Bug#358575: [Pkg-mailman-hackers] Bug#358575: Doesn't seem to be fixed in 3.1r3

2006-09-06 Thread Sam Morris
mailman:
  Installed: 2.1.5-8sarge3
  Candidate: 2.1.5-8sarge3
  Version table:
 *** 2.1.5-8sarge3 0
540 http://ftp.nl.debian.org sarge/main Packages
100 /var/lib/dpkg/status
 2.1.5-8sarge2 0
540 http://security.debian.org sarge/updates/main Packages


ii  mailman2.1.5-8sarge3  Powerful, web-based mailing list manager


#! /bin/sh -e
# $URL: svn+ssh://svn.debian.org/svn/pkg-mailman/trunk/debian/postrm $
# $Id: postrm 39 2004-03-28 21:11:33Z bsb $

# Automatically added by dh_installinit
if [ $1 = purge ] ; then
update-rc.d mailman remove /dev/null || exit 0
fi
# End automatically added section
# Automatically added by dh_installdebconf
if [ $1 = purge ]  [ -e /usr/share/debconf/confmodule ]; then
. /usr/share/debconf/confmodule
db_purge
fi
# End automatically added section


if [ $1 = purge ]; then
  # HACK: At present there is no way to ask ucf for registered files
  #   except for directly querying its database.
  echo -n Purging files from ucf database  2
  for file in $(sed -e ':/etc/mailman:!d' -e 's:^[0-9a-f]* *::' 
/var/lib/ucf/hashfile); do
ucf --purge ${file} 2/dev/null
echo -n . 2
  done
  ucf --purge /etc/cron.d/mailman 2/dev/null
  echo . done. 2
fi

if [ $1 = purge ]; then
  rm -f /etc/cron.d/mailman
  rm -rf /etc/mailman
  rm -rf /var/log/mailman
#  rm -rf /var/lib/mailman
fi


-- 
Sam Morris
http://robots.org.uk/

PGP key id 1024D/5EA01078
3412 EA18 1277 354B 991B  C869 B219 7FDB 5EA0 1078


signature.asc
Description: This is a digitally signed message part


Bug#368968: [Petr Olsak] Re: Fixing teTeX's license violation in Debian; new license for cs stuff?

2006-09-06 Thread Frank Küster
---BeginMessage---

On Mon, 26 Jun 2006, Frank [iso-8859-1] Küster wrote:

 Hi Petr,

Hi Frank,

I am sorry, I saved your e-mail to my to-do stack, but this stack was
filled up suddenly. Now, I return to my old rests.

 I've got two questions regarding csTeX stuff.  The first is:  As
 promised, I want to fix the license violation within Debian by updating
 to the new version from CTAN.  However, this is more work than I
 thought, because the Debian package is based on the original teTeX
 tarball plus diff.gz, and I will have to recreate the tarball.  Since
 I'll need to do that later, anyway, I'd rather postpone this solution.

 As a short-term solution, is it possible to just take the three ini
 files from the current version and install them along with the old files
 already included in teTeX-3.0?

Roughly speaking: Yes.

I am managing only two .ini files: csplain.ini, cslatex.ini. The
third .ini file cseplain.ini is very simple copy of csplain.ini
done by Yenya Kasprzak.

FYI I attach my email which I sent to Thomas Esser and Sebastian Rahtz
at March 3 2005:

---

Hello,

please, update contents of three CSTeX files in your TeX distribution.
These files are attached in this e-mail.

The description of the changes follows.

csplain.ini: new macro-code solves the following:
  * possibility of non-pdf csplain initialisation by pdftex
  * The pdftexconfig.tex is read during pdfcsplain initialisation
if this file exists.

t1code.tex: bug in \uccodes removed.

cslatex.ini: similar as csplain.ini

The csplain.ini and t1code.tex files belong to csplain package and
cslatex.ini belongs to cslatex package (but may be it is not
important for you).

Thank you very much.

Petr Olsak

-

This implies that the third file is t1code.tex.


 The second question:  Have you come to a conclusion regarding the future
 license of the cs stuff?  As I understood it, you weren't aware of the
 problems of your mixed license (GPL + renaming clause) and needed some
 thinking (probably without being yelled at on the mailing lists...).

I plan to keep the meaning of my licesne in csplain.ini the same but to
change the text in csplain.ini file in order to the word GPL will be not
mentioned. Simply speaking: You can do anything with csplain code but you
cannot expect any warranty from me and you cannot distribute the
csplain.ini, csfonts.tex, il2code.tex, t1code.tex, hyphen.lan and
plaina4.tex files in changed form.

Note, that this license problem is related only to csplain files, no to
all CSTeX. CSTeX has many authors with different licensions (similar as
whole teTeX).

Best regards

Petr Olsak



---End Message---


-- 
Frank Küster
Single Molecule Spectroscopy, Protein Folding @ Inst. f. Biochemie, Univ. Zürich
Debian Developer (teTeX/TeXLive)


Bug#384585: manedit: crashes with autogenerated rc file

2006-09-06 Thread Nacho Barrientos Arias
Date: Wed, 6 Sep 2006 01:16:59 +0200
Thomas Girard [EMAIL PROTECTED] wrote:

 On Tue, Sep 05, 2006 at 09:06:18PM +0200, Nacho Barrientos Arias wrote:
  #0  0x2b78e4d943f0 in gtk_style_init (style=0x826780, 
  colormap=0x6dd870, depth=value optimized out)
  at gtkstyle.c:657
  gc_values = {foreground = {pixel = 7150384, red = 0, green = 0, 
  blue = 0}, background = {pixel = 25167021, 
  red = 4, green = 130, blue = 0}, font = 0x0, function = GDK_COPY, 
  fill = GDK_SOLID, tile = 0x0, stipple = 0x0, 
clip_mask = 0x824e70, subwindow_mode = 3841190889, ts_x_origin = 11128, 
  ts_y_origin = 0, clip_x_origin = 0, 
clip_y_origin = 8541904, graphics_exposures = 0, line_width = 8539760, 
  line_style = GDK_LINE_SOLID, 
cap_style = 4753056, join_style = GDK_JOIN_MITER}
  i = value optimized out
  __PRETTY_FUNCTION__ = gtk_style_init
 
 Thanks, we're getting closer.  Can you please do the same thing again and 
 when it has crashed type print *style then if it's not NULL print
 style-font?
 
 style-font or style-font-type should be NULL.  If it is, then we have
 found the culprit and we can start investigating.  It it's not then I'm
 stuck.

Yes, style-font is NULL.

-- 
bye,
- Nacho


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#368968: [Frank Küster] Re: Fixing teTeX's license violation in Debian; new license for cs stuff?

2006-09-06 Thread Frank Küster
---BeginMessage---
Hi Petr,

sorry for answering so late - I was on holiday, then at work again and
again away, and just didn't find time.

Petr Olsak [EMAIL PROTECTED] wrote:

 As a short-term solution, is it possible to just take the three ini
 files from the current version and install them along with the old files
 already included in teTeX-3.0?

 Roughly speaking: Yes.
[...]

Thanks for the clarifications.

 The second question:  Have you come to a conclusion regarding the future
 license of the cs stuff?  As I understood it, you weren't aware of the
 problems of your mixed license (GPL + renaming clause) and needed some
 thinking (probably without being yelled at on the mailing lists...).

 I plan to keep the meaning of my licesne in csplain.ini the same but to
 change the text in csplain.ini file in order to the word GPL will be not
 mentioned. Simply speaking: You can do anything with csplain code but you
 cannot expect any warranty from me and you cannot distribute the
 csplain.ini, csfonts.tex, il2code.tex, t1code.tex, hyphen.lan and
 plaina4.tex files in changed form.

You mean, unless I rename them, correct? 

I strongly suggest to not invent a new license text.  I think the LPPL
is just what you need, although it allows modification without renaming
in the case that a prominent notice is printed that it is a different
system.  If you find that not strict enough, I suggest to use a wording
like Knuth did (or even better, add a After renaming, you may freely
use, distribute and/or modify the files).  Note, however, that
renaming is not as clear as one might think on a web2c-based TeX
system: Just moving a file around in a TEXMF tree may have the desired
effect that it is not found when using cstex, while a renamed file will
still be found with an appropriate line in TEXMF/aliases.

Do you have a timeline for a new release?  Later this year, there will
be a new TeXlive version (and a new Debian release which contains these
files in teTeX and TeXlive packages).  It would be a pity if the csplain
things would have to be excluded from Debian (we are currently not
allowed to distribute them).

Regards, Frank


By the way, may I forward your and my mail to the Debian Bugtracking
system, in order to archive this discussion?

Anyway, many thanks for providing a localized TeX system!

Regards, Frank
-- 
Frank Küster
Single Molecule Spectroscopy, Protein Folding @ Inst. f. Biochemie, Univ. Zürich
Debian Developer (teTeX/TeXLive)

---End Message---


-- 
Frank Küster
Single Molecule Spectroscopy, Protein Folding @ Inst. f. Biochemie, Univ. Zürich
Debian Developer (teTeX/TeXLive)


Processed: reopen

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 reopen 361511
Bug#361511: pan: crashes while switching newsgroups
Bug reopened, originator not changed.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#373687: overkill: patch for CVE-2006-2971

2006-09-06 Thread Ying-Chun Liu (PaulLiu)
tags 373687 +patch
thanks

Hello,

I've made a patch for this bug.

regards,
 Ying-Chun Liu

-- 
PaulLiu(劉穎駿)
E-mail address: [EMAIL PROTECTED]
--- net.c   2006-09-06 17:18:19.0 +0800
+++ net.c   2006-09-06 17:18:19.0 +0800
@@ -91,7 +91,7 @@
r=p[8]+(p[9]8)+(p[10]16)+(p[11]24);
mem_free(p);
if (retval==-1)return -1;
-   if (crc!=crc32(packet,retval-12))return -1;
+   if (retval  12 || crc!=crc32(packet,retval-12))return -1;
if (r!=recipient)return -1;
if (sender_servers)return -1;
return retval-12;


signature.asc
Description: OpenPGP digital signature


Processed: overkill: patch for CVE-2006-2971

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 373687 +patch
Bug#373687: overkill: CVE-2006-2971: remote denial of service (daemon crash)
Tags were: help security
Tags added: patch

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386245: SECURITY: SIG Processing (CVE-2006-4095) and INSIST failure (CVE-2006-4096)

2006-09-06 Thread Christian Hammers
Package: bind9
Version: 1:9.2.4-1
Severity: grave
Tags: security

Hello

I assume that the Security-Team has already been notified by vendor-sec
by this? Is a DSA in preperation?

http://www.isc.org/index.pl?/sw/bind/bind-security.php
* SIG Query Processing (CVE-2006-4095)
* Excessive Recursive Queries INSIST failure (CVE-2006-4096)

bye,

-christian-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#358575: mailman 2.1.5-8sarge3: screwup between security and maintainer upload

2006-09-06 Thread Lionel Elie Mamane
Hi,

let a be an architecture in sarge. Then one of the following holds for
mailman in sarge r3:

 - it is affected by a security problem.

 - it has a severity critical bug.

Mailman in sid:

 - may or may not suffer of a security problem

A security problem in Mailman in sarge patched in May has _not_ been
issued a DSA.

Details:


There seems to have been a screw-up in handling of mailman security
and stable updates: There are two different mailman packages in Debian
with version number 2.1.5-8sarge3.

History, in chronological order:

 -8sarge2 security update to fix:
  potential DoS attack with malformed multi-part messages (closes: #358892) 
[CVE-2006-0052]

 -8sarge3 maintainer update (that got frozen waiting for -8sarge2 to
  happen in order not to conflict with it) to fix bug #358575, a
  severity critical bug.

  Uploaded to stable-proposed-updates in the night from 11 to 12
  April 2006, where it created problems because -8sarge1 was to be
  going in sarge r2, and having -8sarge3 appear confused
  everything. Stable update team says something along the lines of
  will consider for sarge r3.

 -8sarge3 security update to fix:
  formt string vulnerability [src/common.c, 
debian/patches/72_CVE-2006-2191.dpatch]

  That security update has not been announced by a DSA, and cannot be
  downloaded from
  http://security.debian.org/pool/updates/main/m/mailman/ .

  I don't have access to the source of this package. It was apparently
  prepared by Martin Joey Schulze on 13 May 2006.


As a maintainer of Mailman, I have no recollection of being notified
of CVE-2006-2191 (it is possible I have missed the notification, but
my email archives do not contain anything relevant with subject
mailman and 2191 in the body); the CVE entry at mitre.org contains
no information. I have no idea whether this security problem affects
the version in sid or not, I have no precise information _what_ this
security problem is.

The situation right now:

 - sarge r3 contains mailman 2.1.5-8sarge3, but some architectures
   have the security update (such as i386) and others have the
   maintainer update (such as source, sparc and alpha).

   Thus all architectures are screwed up in one way or the other.

 - mailman 2.1.5-8sarge3 the security update is not publicly
   available, except for a few select architectures in binary form
   only (no source).


So, please, security team, tell us about CVE-2006-2191. If
appropriate, issue a DSA about it, for a package under version number
-8sarge4, built on top of -8sarge3 the maintainer update. Please give
us (the mailman-in-Debian maintainers) the information needed to fix
CVE-2006-2191 in sid, or make a retroactive note in the changelog to
note when it was fixed by a new upstream version.


Stable release team, please react accordingly; you may for example do
a binary sourceless NMU for the architectures that have -8sarge3 the
security update so that they all have -8sarge3 the maintainer update.



Thank you in advance for your participation in untangling that mess,

-- 
Lionel Elie Mamane



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: severity of 385840 is normal

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.9.20
  # only removed on hppa, this package isn't built there
 severity 385840 normal
Bug#385840: package build-depends on g++-3.4, which is not available on hppa
Severity set to `normal' from `serious'


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386251: cdrecord is going away ; xcdroast do not work with wodim

2006-09-06 Thread Sune Vuorela
Package: xcdroast
Version: 0.98+0alpha15-7
Severity: grave
Justification: renders package unusable


Hi!

cdrecord is going away and a command line compatible client wodim has
just entered debian.

Unfortunately, xcdroast do not recognize wodim as being
cdrecord-compatible.

in src/io.c, from around line 9980 and the next many lines, xcdroast is
doing a cdrecord -version, mkisofs -version, readcd -version and parses
the output from all of them.

I have tried some to fix it, but I can't get all the way thru, and the 
last one is also quite ugly.

But anyway, I attach them here:

--- xcdroast-0.98+0alpha15/src/io.c 2003-10-26 15:24:48.0 +0100
+++ io.c2006-09-06 12:11:27.0 +0200
@@ -9912,7 +9912,7 @@
} else {
get_wrap_path(CDRECORD,line);
}
-   strcat(line, -version 2/dev/null);
+   strcat(line, -version 21);

dodebug(1, calling: %s\n, line);
 if ((fpin = popen(line,r)) == NULL) {
@@ -10136,7 +10136,7 @@

strcpy(ver,);
get_wrap_path(READCD,line);
-   strcat(line, -version 2/dev/null);
+   strcat(line, -version 2/dev/null | head -1);

dodebug(1, calling: %s\n, line);
 if ((fpin = popen(line,r)) == NULL) {


This make the versioning problems go away, but it makes xcdroast segfault.

#0  0xa7878250 in strcpy () from /lib/tls/libc.so.6
#1  0x08092f20 in scandrivers () at io.c:1219
#2  0x0805031d in init (argc=1, argv=0xafacf4c4, nonrootmode=0xafacf424,
altdevscan=0x80f27a0) at init.c:1011
#3  0x0804ed7f in main (argc=1701052540, argv=0x6f727473) at main.c:384

ANd about here, I unfortunately have to give up.


/Sune


-- System Information:
Debian Release: unstable/experimental
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (200, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/dash
Kernel: Linux 2.6.16-1-k7
Locale: LANG=en_GB, LC_CTYPE=en_GB (charmap=ISO-8859-1)

Versions of packages xcdroast depends on:
ii  cdda2wav5:1.0~pre3-1 Creates WAV files from audio CDs
ii  cdrecord5:1.0~pre3-1 Dummy package for transition to wo
ii  debconf [debconf-2.0]   1.5.3Debian configuration management sy
ii  libatk1.0-0 1.12.1-1 The ATK accessibility toolkit
ii  libc6   2.3.6.ds1-4  GNU C Library: Shared libraries
ii  libcairo2   1.2.4-1  The Cairo 2D vector graphics libra
ii  libfontconfig1  2.3.2-7  generic font configuration library
ii  libglib2.0-02.10.3-3 The GLib library of C routines
ii  libgtk2.0-0 2.8.20-1 The GTK+ graphical user interface 
ii  libpango1.0-0   1.12.3-2 Layout and rendering of internatio
ii  libx11-62:1.0.0-8X11 client-side library
ii  libxcursor1 1.1.7-4  X cursor management library
ii  libxext61:1.0.1-2X11 miscellaneous extension librar
ii  libxfixes3  1:3.0.1.2-4  X11 miscellaneous 'fixes' extensio
ii  libxi6  1:1.0.1-3X11 Input extension library
ii  libxinerama11:1.0.1-4.1  X11 Xinerama extension library
ii  libxrandr2  2:1.1.0.2-4  X11 RandR extension library
ii  libxrender1 1:0.9.1-3X Rendering Extension client libra
ii  mkisofs 5:1.0~pre3-1 Creates ISO-9660 CD-ROM filesystem

xcdroast recommends no packages.

-- debconf-show failed


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#384826: still continues to fail to work at all

2006-09-06 Thread Rob Browning
reopen 384826
thanks

  $ dpkg --status duplicity | grep Version
  Version: 0.4.2-7

  $ duplicity
  Traceback (most recent call last):
File /usr/bin/duplicity, line 28, in ?
  import getpass, gzip, os, sys, time, types, \
  ImportError: No module named commandline

  $ dpkg --listfiles duplicity | grep commandline
  /usr/share/python-support/duplicity/commandline.py

  $ python -c 'import sys; print sys.path'| grep /usr/share/python-support
  $

-- 
Rob Browning
rlb @defaultvalue.org and @debian.org; previously @cs.utexas.edu
GPG starting 2002-11-03 = 14DD 432F AE39 534D B592  F9A0 25C8 D377 8C7E 73A4


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: still continues to fail to work at all

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 reopen 384826
Bug#384826: still continues to fail to work at all
'reopen' is deprecated when a bug has been closed with a version;
use 'found' or 'submitter' as appropriate instead.
Bug#384489: duplicity: ImportError: No module named duplicity
Bug reopened, originator not changed.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386252: debdelta: terminates with error: NameError: name 'T' is not defined

2006-09-06 Thread David

Package: debdelta
Version: 0.17
Severity: grave
Justification: renders package unusable

When running debdelta to create a delta:

Transcript begins
debdelta -v  rrcontrol-center-generic_7.4-2_all.deb
rrcontrol-center-generic_7.4-3_all.deb rrcontrol-center.debdelta
OLD: Package: rrcontrol-center-generic Version: 7.4-2 Architecture: all
Installed-Size: 16676
NEW: Package: rrcontrol-center-generic Version: 7.4-3 Architecture: all
Installed-Size: 16680
 Hmmm... there is a md5 but not a file:
var/www/control_center/security/hosts.deny
deb delta is  0.8% of deb; that is, 8494kB are saved, on a total of
8559kB.
delta time: 66.77 sec, speed: 128kB /sec, (bsdiff time: 57.72sec speed
225kB /sec) (corr 0.22 sec)
Traceback (most recent call last):
 File /usr/bin/debdelta, line 2104, in ?
   append_info(delta,info,T)
Trascript ends

I checked /usr/bin/debdelta's source at line 2104:

 append_info(delta,info,T)

However, append_info (on line 274) only takes 2 arguments.

Removing the T argument from line 2104 appears to fix the problem.

-- System Information:
Debian Release: testing/unstable
 APT prefers testing
 APT policy: (990, 'testing'), (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16-2-686
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages debdelta depends on:
ii  bsdiff   4.3-3   generate/apply a patch between two
ii  libc62.3.6.ds1-4 GNU C Library: Shared libraries
ii  python   2.3.5-11An interactive high-level object-o
ii  xdelta   1.1.3-6.1   A diff utility which works with bi
ii  zlib1g   1:1.2.3-13  compression library - runtime

Versions of packages debdelta recommends:
ii  python-apt0.6.19 Python interface to libapt-pkg

-- no debconf information


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386257: FTBFS: ./configure: line 26383: syntax error near unexpected token `('

2006-09-06 Thread Martin Michlmayr
Package: rivet
Version: 0.5.0-3
Severity: serious

This package fails to build in unstable.

 Automatic build of rivet_0.5.0-3 on em64t by sbuild/amd64 0.49
...
 checking how to build libraries... shared
 checking if 64bit support is enabled... no
 checking if 64bit Sparc VIS support is requested... no
 checking system version (for dynamic loading)... ./configure: line 26383: 
 syntax error near unexpected token `('
 ./configure: line 26383: `case `(ac_space=' '; set | grep ac_space) 21` 
 in'
 make: *** [configure-stamp] Error 2
 **
 Build finished at 20060905-0252
 FAILED [dpkg-buildpackage died]

-- 
Martin Michlmayr
http://www.cyrius.com/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386258: FTBFS: ./configure: line 8248: syntax error near unexpected token `('

2006-09-06 Thread Martin Michlmayr
Package: tkrat
Version: 1:2.1.4-2
Severity: serious

This package fails to build in unstable:

 Automatic build of tkrat_1:2.1.4-2 on em64t by sbuild/amd64 0.49
...
 checking for OpenSSL... /usr
 checking system version (for imap  dynamic loading)... ./configure: line 
 8248: syntax error near unexpected token `('
 ./configure: line 8248: `  for ac_var in `(set) 21 | sed -n 
 's/^\([a-zA-Z_][a-zA-Z0-9_]*\)=.*/\1/p'`; do'
 make: *** [build-tree/tkrat-2.1.4/config.status] Error 2
 **
 Build finished at 20060904-1739
 FAILED [dpkg-buildpackage died]

-- 
Martin Michlmayr
http://www.cyrius.com/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386261: FTBFS: @MKINSTALLDIRS@: No such file or directory

2006-09-06 Thread Martin Michlmayr
Package: cryptonit
Version: 0.9.7-1
Severity: serious

This package fails to build in unstable:

 Automatic build of cryptonit_0.9.7-1 on em64t by sbuild/amd64 0.49
...
 The following NEW packages will be installed:
   autoconf automake1.9 autotools-dev debhelper esound-common gettext
...
 Making install in po
 make[2]: Entering directory `/build/tbm/cryptonit-0.9.7/po'
 /bin/sh @MKINSTALLDIRS@ /build/tbm/cryptonit-0.9.7/debian/cryptonit/usr/share
 /bin/sh: @MKINSTALLDIRS@: No such file or directory
 make[2]: *** [install-data-yes] Error 127
 make[2]: Leaving directory `/build/tbm/cryptonit-0.9.7/po'
 make[1]: *** [install-recursive] Error 1

-- 
Martin Michlmayr
http://www.cyrius.com/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386259: FTBFS: aclocal: macro `AM_PROG_MKDIR_P' required but not defined

2006-09-06 Thread Martin Michlmayr
Package: enigma
Version: 0.92.3-2
Severity: serious

This package fails to build in unstable:

 Automatic build of enigma_0.92.3-2 on em64t by sbuild/amd64 0.49
...
 The following NEW packages will be installed:
   autoconf automake1.7 autotools-dev bzip2 cdbs debhelper esound-common
...
 make[1]: Nothing to be done for `update-config'.
 make[1]: Leaving directory `/build/tbm/enigma-0.92.3'
 cd build-tree/enigma-svn \
aclocal-1.7 \
autoheader \
automake-1.7 --add-missing --foreign --copy \
autoconf
 aclocal: macro `AM_PROG_MKDIR_P' required but not defined
 aclocal: macro `AM_PROG_MKDIR_P' required but not defined
 make: *** [stamp-autogen] Error 1
 **
 Build finished at 20060906-0145
 FAILED [dpkg-buildpackage died]

-- 
Martin Michlmayr
http://www.cyrius.com/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#378295: still there

2006-09-06 Thread Martin Michlmayr
reopen 378295 !
found 378295 2.6.17.10-1
thanks

As indicated in James' message, this is still there.

-- 
Martin Michlmayr
http://www.cyrius.com/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386262: FTBFS: @MKINSTALLDIRS@: No such file or directory

2006-09-06 Thread Martin Michlmayr
Package: xemeraldia
Version: 0.4.1-2
Severity: serious

This package no longer builds in unstable:

 Automatic build of xemeraldia_0.4.1-2 on em64t by sbuild/amd64 0.49
...
 The following NEW packages will be installed:
   autoconf automake1.9 autotools-dev debhelper gettext gettext-base html2text
...
 make[2]: Leaving directory `/build/tbm/xemeraldia-0.4.1/m4'
 Making install in po
 make[2]: Entering directory `/build/tbm/xemeraldia-0.4.1/po'
 /bin/sh @MKINSTALLDIRS@ 
 /build/tbm/xemeraldia-0.4.1/debian/xemeraldia/usr/share
 /bin/sh: @MKINSTALLDIRS@: No such file or directory
 make[2]: *** [install-data-yes] Error 127
 make[2]: Leaving directory `/build/tbm/xemeraldia-0.4.1/po'
 make[1]: *** [install-recursive] Error 1

-- 
Martin Michlmayr
http://www.cyrius.com/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: still there

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 reopen 378295 !
Bug#378295: joystick.h: expected specifier-qualifier-list before 'int32_t'
'reopen' is deprecated when a bug has been closed with a version;
use 'found' or 'submitter' as appropriate instead.
Bug reopened, originator set to Martin Michlmayr [EMAIL PROTECTED].

 found 378295 2.6.17.10-1
Bug#378295: joystick.h: expected specifier-qualifier-list before 'int32_t'
Bug marked as found in version 2.6.17.10-1.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#385894: marked as done (CVE-2006-4436: replay protection bypass vulnerability in isakmpd)

2006-09-06 Thread Debian Bug Tracking System
Your message dated Wed, 06 Sep 2006 04:17:09 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#385894: fixed in isakmpd 20041012-4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: isakmpd
Severity: grave
Tags: security patch
Justification: user security hole

A vulnerability has been found in isakmpd:

isakmpd in OpenBSD 3.8, 3.9, and possibly earlier versions, creates
Security Associations (SA) with a replay window of size 0 when isakmpd
acts as a responder during SA negotiation, which allows remote
attackers to replay IPSec packets and bypass the replay protection.

A patch is available at 
http://www.openbsd.org/errata.html#isakmpd

---End Message---
---BeginMessage---
Source: isakmpd
Source-Version: 20041012-4

We believe that the bug you reported is fixed in the latest version of
isakmpd, which is due to be installed in the Debian FTP archive:

isakmpd_20041012-4.diff.gz
  to pool/main/i/isakmpd/isakmpd_20041012-4.diff.gz
isakmpd_20041012-4.dsc
  to pool/main/i/isakmpd/isakmpd_20041012-4.dsc
isakmpd_20041012-4_sparc.deb
  to pool/main/i/isakmpd/isakmpd_20041012-4_sparc.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jochen Friedrich [EMAIL PROTECTED] (supplier of updated isakmpd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon,  4 Sep 2006 18:41:00 +0200
Source: isakmpd
Binary: isakmpd
Architecture: source sparc
Version: 20041012-4
Distribution: unstable
Urgency: high
Maintainer: Jochen Friedrich [EMAIL PROTECTED]
Changed-By: Jochen Friedrich [EMAIL PROTECTED]
Description: 
 isakmpd- The Internet Key Exchange protocol openbsd implementation
Closes: 385894
Changes: 
 isakmpd (20041012-4) unstable; urgency=high
 .
   * Fix replay protection (CVE-2006-4436)
 Thanks to Stefan Fritsch [EMAIL PROTECTED] (Closes: #385894)
Files: 
 7bc5eeb8ea57cd6823369ba2a7176551 936 net optional isakmpd_20041012-4.dsc
 3256d8ef06f5e26649651760c0750726 32679 net optional isakmpd_20041012-4.diff.gz
 62b984202356fbc3a9b66204cf5e47f0 608678 net optional 
isakmpd_20041012-4_sparc.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBRP6sIsP9a9GOLSE6AQLHIggAh0t0m/f7S45sJcc9UdWisC5F+oZ3e/dW
H2NeS1NH8RUaqnYrchPr597ZMh0wfdG1iOmfwAylurIxZ+v6YmhZH9w99Co/yEup
UxDRUQ4YSlRXNzbDVK1PgYvw/MjJn8LUju9ZG+8zzZkFWI3jzZXLSIdppTOWwLGf
8Q7aijQUWkGC/1CNBkJNdMnydsLTKl4GWxFAkbmOYfdiLS/kBG/LMmoI8oqTgNXF
6XPhVXPztJvoZE2aVSpGKPYZXD31sODpYbKEnw0NZPUz3jSs98Q2TpxVxSfGtGPq
JQecMb6pzPCNjY4MXf/zh6t8Su1CXnkVq/4Vmrp9g9iXUT/wlZK2xw==
=p45U
-END PGP SIGNATURE-

---End Message---


Bug#386263: FTBFS: aclocal: macro `AM_PROG_MKDIR_P' required but not defined

2006-09-06 Thread Martin Michlmayr
Package: gnome-lokkit
Version: 0.50.22-6
Severity: serious

 Automatic build of gnome-lokkit_0.50.22-6 on em64t by sbuild/amd64 0.49
...
 The following NEW packages will be installed:
   autoconf automake1.4 autotools-dev cvs debhelper docbook docbook-dsssl
...
  debian/rules build
 dh_testdir
 # Rebootstrap the package
 aclocal -I macros
 aclocal: macro `AM_PROG_MKDIR_P' required but not defined
 aclocal: macro `AM_PROG_MKDIR_P' required but not defined
 make: *** [configure-stamp] Error 1
 **
 Build finished at 20060906-0218
 FAILED [dpkg-buildpackage died]

-- 
Martin Michlmayr
http://www.cyrius.com/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#376301: marked as done (dccifd does not work when IPv6 is not supported by the kernel)

2006-09-06 Thread Debian Bug Tracking System
Your message dated Wed, 06 Sep 2006 04:17:07 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#376301: fixed in dcc 1.2.74-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: dcc-client
Version: 1.2.74
Severity: important
Tags: ipv6

If i try to use dccifd with a kernel that does not support IPv6, it fails to 
scan messages, giving the following error:

Jul  1 13:16:34 sa01 dccifd[1894]: socket(UDP): Address family not supported 
by protocol

I have built a local version of the package with the --disable-ipv6 flag, but 
this is obviously not suitable for everyone.

---End Message---
---BeginMessage---
Source: dcc
Source-Version: 1.2.74-3

We believe that the bug you reported is fixed in the latest version of
dcc, which is due to be installed in the Debian FTP archive:

dcc-client_1.2.74-3_amd64.deb
  to pool/main/d/dcc/dcc-client_1.2.74-3_amd64.deb
dcc-client_1.2.74-3_i386.deb
  to pool/main/d/dcc/dcc-client_1.2.74-3_i386.deb
dcc-client_1.2.74-3_sparc.deb
  to pool/main/d/dcc/dcc-client_1.2.74-3_sparc.deb
dcc-common_1.2.74-3_amd64.deb
  to pool/main/d/dcc/dcc-common_1.2.74-3_amd64.deb
dcc-common_1.2.74-3_i386.deb
  to pool/main/d/dcc/dcc-common_1.2.74-3_i386.deb
dcc-common_1.2.74-3_sparc.deb
  to pool/main/d/dcc/dcc-common_1.2.74-3_sparc.deb
dcc-milter_1.2.74-3_amd64.deb
  to pool/main/d/dcc/dcc-milter_1.2.74-3_amd64.deb
dcc-milter_1.2.74-3_i386.deb
  to pool/main/d/dcc/dcc-milter_1.2.74-3_i386.deb
dcc-milter_1.2.74-3_sparc.deb
  to pool/main/d/dcc/dcc-milter_1.2.74-3_sparc.deb
dcc-server_1.2.74-3_amd64.deb
  to pool/main/d/dcc/dcc-server_1.2.74-3_amd64.deb
dcc-server_1.2.74-3_i386.deb
  to pool/main/d/dcc/dcc-server_1.2.74-3_i386.deb
dcc-server_1.2.74-3_sparc.deb
  to pool/main/d/dcc/dcc-server_1.2.74-3_sparc.deb
dcc_1.2.74-3.diff.gz
  to pool/main/d/dcc/dcc_1.2.74-3.diff.gz
dcc_1.2.74-3.dsc
  to pool/main/d/dcc/dcc_1.2.74-3.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Anibal Monsalve Salazar [EMAIL PROTECTED] (supplier of updated dcc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 06 Sep 2006 19:23:15 +1000
Source: dcc
Binary: dcc-client dcc-milter dcc-common dcc-server
Architecture: source i386 sparc amd64
Version: 1.2.74-3
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group [EMAIL PROTECTED]
Changed-By: Anibal Monsalve Salazar [EMAIL PROTECTED]
Description: 
 dcc-client - Distributed Checksum Clearinghouse - client programs
 dcc-common - Distributed Checksum Clearinghouse - common files
 dcc-milter - Distributed Checksum Clearinghouse - sendmail milter plugin
 dcc-server - Distributed Checksum Clearinghouse - server programs
Closes: 304236 307672 376301
Changes: 
 dcc (1.2.74-3) unstable; urgency=low
 .
   * QA upload.
   * Fixed RC bug dccifd does not work when IPv6 is not supported by the
 kernel. Patch by dean gaudet [EMAIL PROTECTED]. Closes: #376301.
   * Fixed errors in dccifd startup script. Patch by Rene Konasz
 [EMAIL PROTECTED]. Closes: #304236.
   * Fixed Can't purge dcc-common if LDAP is used. Patch by MJ Ray
 [EMAIL PROTECTED]. Closes: #307672.
Files: 
 6e8340b068d9403161f02bd91307bb5f 620 mail extra dcc_1.2.74-3.dsc
 6cc70aa622efb3426c8bc1f1366e96cf 14888 mail extra dcc_1.2.74-3.diff.gz
 6b9958c39617709c4d5c4eb8c0ac160e 411886 mail extra dcc-client_1.2.74-3_i386.deb
 66788e0e20b28597b752f745d301e963 174354 mail extra dcc-common_1.2.74-3_i386.deb
 b61c1122e31628a7d2b3423280f67f11 212170 mail extra dcc-milter_1.2.74-3_i386.deb
 26088c76289a1dd9028b860b442355aa 190416 mail extra dcc-server_1.2.74-3_i386.deb
 6618747fe5a0ecbe0d531dd61c1b8742 439680 mail extra 
dcc-client_1.2.74-3_amd64.deb
 8a10fa775452d70ee6a9b6e070809658 188926 mail extra 
dcc-common_1.2.74-3_amd64.deb
 f30ace0ed1f96e63081114e1859be4a7 226848 mail extra 
dcc-milter_1.2.74-3_amd64.deb
 d6c3663407d924da2cebbfc81dab7aee 214236 mail extra 
dcc-server_1.2.74-3_amd64.deb
 86f9196b786ab88256e8790e8ac4b358 452658 mail extra 
dcc-client_1.2.74-3_sparc.deb
 a2754fe598d73d244682893f21c64cda 178370 mail extra 

Bug#384826: still continues to fail to work at all

2006-09-06 Thread Martin Wuertele
Hi Rob!

* Rob Browning [EMAIL PROTECTED] [2006-09-06 12:53]:

 reopen 384826
 thanks
 
   $ dpkg --status duplicity | grep Version
   Version: 0.4.2-7
 
   $ duplicity
   Traceback (most recent call last):
 File /usr/bin/duplicity, line 28, in ?
   import getpass, gzip, os, sys, time, types, \
   ImportError: No module named commandline
 
   $ dpkg --listfiles duplicity | grep commandline
   /usr/share/python-support/duplicity/commandline.py
 
Looks like i386 buildd is broken. If I create a fresh i386 chroot,
apt-get -b source duplicity and install it, it runs fine (just what
happened back when 384826 was opened).

Could you please try to verify, thanks.

yours Martin
-- 
[EMAIL PROTECTED]  Debian GNU/Linux - The Universal Operating System
macan I think I should take a shower and sleep
fatalerror macan, I totally agree


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#373687: marked as done (overkill: CVE-2006-2971: remote denial of service (daemon crash))

2006-09-06 Thread Debian Bug Tracking System
Your message dated Wed, 06 Sep 2006 04:47:10 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#373687: fixed in overkill 0.16-9
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: overkill
Severity: important
Tags: security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

CVE-2006-2971: Integer overflow in the recv_packet function in 0verkill
0.16 allows remote attackers to cause a denial of service (daemon crash)
via a UDP packet with fewer than 12 bytes, which results in a long
length value to the crc32 function.

There is a sample exploit [1] available.  Sarge and Woody may be affected.

Please mention the CVE in your changelog.

Thanks,

Alec

[1] http://www.securityfocus.com/archive/1/archive/1/436659/100/0/threaded

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.3 (GNU/Linux)

iD4DBQFEkL2hAud/2YgchcQRAomxAJjMfv7iEjb3Laci2o9bvwCjFQHbAKCkDpt3
pevbgxW//O2iq39xLliVEg==
=JvUJ
-END PGP SIGNATURE-

---End Message---
---BeginMessage---
Source: overkill
Source-Version: 0.16-9

We believe that the bug you reported is fixed in the latest version of
overkill, which is due to be installed in the Debian FTP archive:

overkill_0.16-9.diff.gz
  to pool/main/o/overkill/overkill_0.16-9.diff.gz
overkill_0.16-9.dsc
  to pool/main/o/overkill/overkill_0.16-9.dsc
overkill_0.16-9_i386.deb
  to pool/main/o/overkill/overkill_0.16-9_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joachim Breitner [EMAIL PROTECTED] (supplier of updated overkill package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed,  6 Sep 2006 11:30:56 +
Source: overkill
Binary: overkill
Architecture: source i386
Version: 0.16-9
Distribution: unstable
Urgency: low
Maintainer: Joachim Breitner [EMAIL PROTECTED]
Changed-By: Joachim Breitner [EMAIL PROTECTED]
Description: 
 overkill   - bloody 2D action deathmatch-like game in ascii-art
Closes: 373687
Changes: 
 overkill (0.16-9) unstable; urgency=low
 .
   * CVE-2006-2971: remote denial of service (daemon crash) (Closes:
 #373687)
   * Fixes security problem, thanks to Ying-Chun Liu for the patch
 (Considering how small the chage is I should have tried it myself...)
 severity low despite fixing RC bug, since package was removed from etch
   * bumped standards version, no change
Files: 
 6ddd7c5e221ec9a5da040cbb3e72dbaa 728 games optional overkill_0.16-9.dsc
 52c93cdb97f74f2c4105c72bb2cc35ad 21834 games optional overkill_0.16-9.diff.gz
 97f4d02d36d69c3907d0254b3c53359f 348816 games optional overkill_0.16-9_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iQCVAwUBRP6xvL8Zfhn2SkeXAQLu5wP+P7lymoHU6opXKzl+cWE+18FYnggrZpIb
06kO4LDo6n/7gfOtEjRVQKxzSCaAXknE+/26znvvf2hfddyRBzNFGx6lU671Ju2e
p/D2TGqCwAhti9YCATDlfO4EDCLCNKleh5Sf69MkM1dJEEiliTfmjw0Cs7oz6VON
jJNWMKETDhY=
=m/Oe
-END PGP SIGNATURE-

---End Message---


Bug#386267: FTBFS: sysutil.c:604: error: assignment of read-only member '__in'

2006-09-06 Thread Martin Michlmayr
Package: vsftpd
Version: 2.0.5-1
Severity: serious
Tags: patch

The problem here is that __typeof inherits the const.  Patch below,
although I don't know if there's a better way.

 Automatic build of vsftpd_2.0.5-1 on em64t by sbuild/amd64 0.49
...
 gcc -c sysutil.c -g -O2 -Wall -W -Wshadow  -idirafter dummyinc
 sysutil.c: In function 'vsf_sysutil_wait_exited_normally':
 sysutil.c:604: error: assignment of read-only member '__in'
 sysutil.c: In function 'vsf_sysutil_wait_get_exitcode':
 sysutil.c:614: error: assignment of read-only member '__in'
 make[1]: *** [sysutil.o] Error 1

--- sysutil.c~  2006-09-06 13:29:46.677233758 +0200
+++ sysutil.c   2006-09-06 13:30:43.824611192 +0200
@@ -601,7 +601,7 @@
 vsf_sysutil_wait_exited_normally(
   const struct vsf_sysutil_wait_retval* p_waitret)
 {
-  return WIFEXITED(p_waitret-exit_status);
+  return WIFEXITED((struct vsf_sysutil_wait_retval *)p_waitret-exit_status);
 }
 
 int
@@ -611,7 +611,7 @@
   {
 bug(not a normal exit in vsf_sysutil_wait_get_exitcode);
   }
-  return WEXITSTATUS(p_waitret-exit_status);
+  return WEXITSTATUS((struct vsf_sysutil_wait_retval *)p_waitret-exit_status);
 }
 
 void

-- 
Martin Michlmayr
http://www.cyrius.com/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Fixed in NMU of podbrowser 0.03-1.1

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tag 384937 + fixed
Bug#384937: podbrowser: uninstallable; depends on removed libgtk2-podviewer-perl
There were no tags set.
Tags added: fixed

 quit
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386276: java-gcj-compat-plugin: Needs to depend on gappletviewer-4.1

2006-09-06 Thread Jonas Smedegaard
Package: java-gcj-compat-plugin
Version: 1.0.65-1
Severity: grave
Justification: renders package unusable

The package installs some symlinks, that are broken unless gappletviewer-4.1 is 
installed as well.


The severity is arguably only serious, but no less than that IMHO.


 - Jonas

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: powerpc (ppc)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.17-2-powerpc
Locale: LANG=da_DK.UTF-8, LC_CTYPE=da_DK.UTF-8 (charmap=UTF-8)

Versions of packages java-gcj-compat-plugin depends on:
ii  java-gcj-compat   1.0.65-1   Java runtime environment using GIJ

java-gcj-compat-plugin recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Fixed in NMU of docbook-website 2.5.0.0-7.2

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tag 233004 + fixed
Bug#233004: docbook-website: The catalog doesn't contain rewrite rules for URIs
Tags were: patch
Tags added: fixed

 quit
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#385968: cheesetracker: Effect settings not loaded

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 package cheesetracker
Ignoring bugs not assigned to: cheesetracker

 severity 385968 important
Bug#385968: cheesetracker: Effect settings not loaded
Severity set to `important' from `grave'

 tags 385968 upstream
Bug#385968: cheesetracker: Effect settings not loaded
There were no tags set.
Tags added: upstream

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386287: default install doesn't work with apache2: syntax error in apache config file

2006-09-06 Thread Adrian von Bidder
Package: egroupware
Version: 1.2-104.dfsg-1
Severity: grave
Justification: default installation causes apache to not start up anymore

Yo!

On a minimal etch installation (installed with beta3 installer just now), I 
basically did aptitude install egroupware egroupware-ldap postgresql-7.4 
php4-{auth-pam,mcrypt,mhash}.  Trying to connect to egroupware/setup/, I 
noticed that apache wasn't running.

+++
opitegw:~# apache2ctl configtest
Syntax error on line 42 of /etc/apache2/conf.d/egroupware:
Invalid command 'Script', perhaps mis-spelled or defined by a module not 
included in the server configuration
+++

turns out that mod_actions was not activated - is probabyl a one-line fix in 
postinst.

cheers
-- vbi

-- 
According to my calculations the problem doesn't exist.


pgpPDyn5lX6bk.pgp
Description: PGP signature


Processed: severity of 386245 is serious, severity of 386237 is serious, merging 386237 386245

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 386245 serious
Bug#386245: SECURITY: SIG Processing (CVE-2006-4095) and INSIST failure 
(CVE-2006-4096)
Severity set to `serious' from `grave'

 severity 386237 serious
Bug#386237: bind9: Security update! Please!
Severity set to `serious' from `normal'

 merge 386237 386245
Bug#386237: bind9: Security update! Please!
Bug#386245: SECURITY: SIG Processing (CVE-2006-4095) and INSIST failure 
(CVE-2006-4096)
Merged 386237 386245.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386289: libfreetype6: libfreetype.so.6 being removed

2006-09-06 Thread Mathias Brodala
Package: libfreetype6
Version: 2.2.1-2
Severity: critical
Justification: breaks unrelated software

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

After upgrading to the latest release (2.2.1-3) there was no libfreetype.so.6 
and no libfreetype.so.6.3.10 under 
/usr/lib anymore. Due to that almost every program could not be started. Even 
after downgrading to version 2.2.1-2 
again these files would not be created. I had to manually extract the package 
and move the files to their place.

(After the upgrade only libfreetype.a and libfreetype.la resided under 
/usr/lib.)

- -- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.17-2-k7
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to de_DE.UTF-8)

Versions of packages libfreetype6 depends on:
ii  libc62.3.6.ds1-4 GNU C Library: Shared libraries
ii  zlib1g   1:1.2.3-13  compression library - runtime

libfreetype6 recommends no packages.

- -- no debconf information

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE/teOYfUFJ3ewsJgRAoV8AJ9xBf7iSPr52IkLwJseUPVZLBC2RwCcCCuF
Uq/8O+LduCxUxxoUslj3YeY=
=ObOb
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386169: gstreamer0.10-plugins-good: Doesnt build from source

2006-09-06 Thread Loïc Minier
Hi,

On Tue, Sep 05, 2006, Jean-Luc Coulon (f5ibh) wrote:
 I cannot build the package from source, I get the following errors:
 Making all in libcaca
  gstcacasink.c: In function 'gst_cacasink_dither_get_type':
  gstcacasink.c:111: error: 'CACA_DITHERING_NONE' undeclared (first use in this
  function)

 Thanks, the libcaca maintainer has been contacted and is working on the
 problem.

   Bye,
-- 
Loïc Minier [EMAIL PROTECTED]



Bug#386245: marked as done (SECURITY: SIG Processing (CVE-2006-4095) and INSIST failure (CVE-2006-4096))

2006-09-06 Thread Debian Bug Tracking System
Your message dated Wed, 06 Sep 2006 08:02:13 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#386245: fixed in bind9 1:9.3.2-P1-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: bind9
Version: 1:9.2.4-1
Severity: grave
Tags: security

Hello

I assume that the Security-Team has already been notified by vendor-sec
by this? Is a DSA in preperation?

http://www.isc.org/index.pl?/sw/bind/bind-security.php
* SIG Query Processing (CVE-2006-4095)
* Excessive Recursive Queries INSIST failure (CVE-2006-4096)

bye,

-christian-

---End Message---
---BeginMessage---
Source: bind9
Source-Version: 1:9.3.2-P1-1

We believe that the bug you reported is fixed in the latest version of
bind9, which is due to be installed in the Debian FTP archive:

bind9-doc_9.3.2-P1-1_all.deb
  to pool/main/b/bind9/bind9-doc_9.3.2-P1-1_all.deb
bind9-host_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/bind9-host_9.3.2-P1-1_i386.deb
bind9_9.3.2-P1-1.diff.gz
  to pool/main/b/bind9/bind9_9.3.2-P1-1.diff.gz
bind9_9.3.2-P1-1.dsc
  to pool/main/b/bind9/bind9_9.3.2-P1-1.dsc
bind9_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/bind9_9.3.2-P1-1_i386.deb
bind9_9.3.2-P1.orig.tar.gz
  to pool/main/b/bind9/bind9_9.3.2-P1.orig.tar.gz
dnsutils_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/dnsutils_9.3.2-P1-1_i386.deb
libbind-dev_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libbind-dev_9.3.2-P1-1_i386.deb
libbind9-0_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libbind9-0_9.3.2-P1-1_i386.deb
libdns21_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libdns21_9.3.2-P1-1_i386.deb
libisc11_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libisc11_9.3.2-P1-1_i386.deb
libisccc0_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libisccc0_9.3.2-P1-1_i386.deb
libisccfg1_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libisccfg1_9.3.2-P1-1_i386.deb
liblwres9_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/liblwres9_9.3.2-P1-1_i386.deb
lwresd_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/lwresd_9.3.2-P1-1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
LaMont Jones [EMAIL PROTECTED] (supplier of updated bind9 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed,  6 Sep 2006 08:07:13 -0600
Source: bind9
Binary: libisccc0 lwresd libbind9-0 bind9-doc dnsutils bind9 libbind-dev 
bind9-host liblwres9 libisc11 libisccfg1 libdns21
Architecture: all i386 source 
Version: 1:9.3.2-P1-1
Distribution: unstable
Urgency: high
Maintainer: LaMont Jones [EMAIL PROTECTED]
Changed-By: LaMont Jones [EMAIL PROTECTED]
Description: 
 bind9  - Internet Domain Name Server
 bind9-doc  - Documentation for BIND
 bind9-host - Version of 'host' bundled with BIND 9.X
 dnsutils   - Clients provided with BIND
 libbind-dev - Static Libraries and Headers used by BIND
 libbind9-0 - BIND9 Shared Library used by BIND
 libdns21   - DNS Shared Library used by BIND
 libisc11   - ISC Shared Library used by BIND
 libisccc0  - Command Channel Library used by BIND
 libisccfg1 - Config File Handling Library used by BIND
 liblwres9  - Lightweight Resolver Library used by BIND
 lwresd - Lightweight Resolver Daemon
Closes: 239665 342957 356914 372203 386091 386224 386237 386245
Changes: 
 bind9 (1:9.3.2-P1-1) unstable; urgency=high
 .
   * New upstream, fixes CVE-2006-4095 and CVE-2006-4096.
 Closes: #386237, #386245
   * Drop gcc-3.4 [powerpc] dependency.  Closes: #342957, #372203
   * Add -fno-strict-aliasing for type-punned pointer aliasing issues
 Closes: #386224
   * Use getent in postinst instead of chown/chgrp.  Closes: #386091, #239665
   * Drop redundant update-rc.d calls.  Closes: #356914
Files: 
 4300b25ce950ee43c46e528d44289d0d 107540 net standard 
bind9-host_9.3.2-P1-1_i386.deb
 493c9774c810fa2cb0fcb80e1e551f84 285196 net optional bind9_9.3.2-P1-1_i386.deb
 49bef4db312e0df38a0d2b640143de26 199574 net optional lwresd_9.3.2-P1-1_i386.deb
 6e68b98e1752ab306221c3fb6be5efde 105836 libs standard 
liblwres9_9.3.2-P1-1_i386.deb
 7caf939d49a12e93e8472ac9177c1951 977156 libdevel optional 
libbind-dev_9.3.2-P1-1_i386.deb
 895e86142c4cc0caefa60bfb6ce727ef 86899 net 

Bug#386237: marked as done (bind9: Security update! Please!)

2006-09-06 Thread Debian Bug Tracking System
Your message dated Wed, 06 Sep 2006 08:02:13 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#386245: fixed in bind9 1:9.3.2-P1-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: bind9
Version: 1:9.3.2-2.1
Severity: normal
Tags: patch


http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en

Since most BIND installations are also open recursive resolvers, it is too
easy to shoot down the named process from anywhere.

Source: 
ftp://ftp.isc.org/isc/bind9/9.3.2-P1/bind-9.3.2-P1.tar.gz
ftp://ftp.isc.org/isc/bind9/9.3.2-P1/bind-9.3.2-P1.tar.gz.asc
ftp://ftp.isc.org/isc/bind9/9.3.2-P1/bind-9.3.2-P1.tar.gz.sha256.asc
ftp://ftp.isc.org/isc/bind9/9.3.2-P1/bind-9.3.2-P1.tar.gz.sha512.asc

Public key from here:
http://www.isc.org/about/openpgp/pgpkey2006.txt

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (990, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.13.2
Locale: LANG=en, LC_CTYPE=sv_SE (charmap=UTF-8) (ignored: LC_ALL set to 
en_US.UTF-8)

Versions of packages bind9 depends on:
ii  adduser  3.97Add and remove users and groups
ii  libbind9-0   1:9.3.2-2.1 BIND9 Shared Library used by BIND
ii  libc62.3.6.ds1-4 GNU C Library: Shared libraries
ii  libdns21 1:9.3.2-2.1 DNS Shared Library used by BIND
ii  libisc11 1:9.3.2-2.1 ISC Shared Library used by BIND
ii  libisccc01:9.3.2-2.1 Command Channel Library used by BI
ii  libisccfg1   1:9.3.2-2.1 Config File Handling Library used 
ii  liblwres91:9.3.2-2.1 Lightweight Resolver Library used 
ii  libssl0.9.8  0.9.8b-2SSL shared libraries
ii  lsb-base 3.1-15  Linux Standard Base 3.1 init scrip
ii  netbase  4.26Basic TCP/IP networking system

bind9 recommends no packages.

-- no debconf information

---End Message---
---BeginMessage---
Source: bind9
Source-Version: 1:9.3.2-P1-1

We believe that the bug you reported is fixed in the latest version of
bind9, which is due to be installed in the Debian FTP archive:

bind9-doc_9.3.2-P1-1_all.deb
  to pool/main/b/bind9/bind9-doc_9.3.2-P1-1_all.deb
bind9-host_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/bind9-host_9.3.2-P1-1_i386.deb
bind9_9.3.2-P1-1.diff.gz
  to pool/main/b/bind9/bind9_9.3.2-P1-1.diff.gz
bind9_9.3.2-P1-1.dsc
  to pool/main/b/bind9/bind9_9.3.2-P1-1.dsc
bind9_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/bind9_9.3.2-P1-1_i386.deb
bind9_9.3.2-P1.orig.tar.gz
  to pool/main/b/bind9/bind9_9.3.2-P1.orig.tar.gz
dnsutils_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/dnsutils_9.3.2-P1-1_i386.deb
libbind-dev_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libbind-dev_9.3.2-P1-1_i386.deb
libbind9-0_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libbind9-0_9.3.2-P1-1_i386.deb
libdns21_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libdns21_9.3.2-P1-1_i386.deb
libisc11_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libisc11_9.3.2-P1-1_i386.deb
libisccc0_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libisccc0_9.3.2-P1-1_i386.deb
libisccfg1_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libisccfg1_9.3.2-P1-1_i386.deb
liblwres9_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/liblwres9_9.3.2-P1-1_i386.deb
lwresd_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/lwresd_9.3.2-P1-1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
LaMont Jones [EMAIL PROTECTED] (supplier of updated bind9 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed,  6 Sep 2006 08:07:13 -0600
Source: bind9
Binary: libisccc0 lwresd libbind9-0 bind9-doc dnsutils bind9 libbind-dev 
bind9-host liblwres9 libisc11 libisccfg1 libdns21
Architecture: all i386 source 
Version: 1:9.3.2-P1-1
Distribution: unstable
Urgency: high
Maintainer: LaMont Jones [EMAIL PROTECTED]
Changed-By: LaMont Jones [EMAIL PROTECTED]
Description: 
 bind9  - Internet Domain Name Server
 bind9-doc  - Documentation for BIND
 

Processed: closing 386287

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.9.20
 close 386287 1.2-104.dfsg-2
Bug#386287: default install doesn't work with apache2: syntax error in apache 
config file
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 1.2-104.dfsg-2, send any further explanations to 
Adrian von Bidder [EMAIL PROTECTED]


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386245: marked as done (SECURITY: SIG Processing (CVE-2006-4095) and INSIST failure (CVE-2006-4096))

2006-09-06 Thread Debian Bug Tracking System
Your message dated Wed, 06 Sep 2006 08:02:13 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#386237: fixed in bind9 1:9.3.2-P1-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: bind9
Version: 1:9.2.4-1
Severity: grave
Tags: security

Hello

I assume that the Security-Team has already been notified by vendor-sec
by this? Is a DSA in preperation?

http://www.isc.org/index.pl?/sw/bind/bind-security.php
* SIG Query Processing (CVE-2006-4095)
* Excessive Recursive Queries INSIST failure (CVE-2006-4096)

bye,

-christian-

---End Message---
---BeginMessage---
Source: bind9
Source-Version: 1:9.3.2-P1-1

We believe that the bug you reported is fixed in the latest version of
bind9, which is due to be installed in the Debian FTP archive:

bind9-doc_9.3.2-P1-1_all.deb
  to pool/main/b/bind9/bind9-doc_9.3.2-P1-1_all.deb
bind9-host_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/bind9-host_9.3.2-P1-1_i386.deb
bind9_9.3.2-P1-1.diff.gz
  to pool/main/b/bind9/bind9_9.3.2-P1-1.diff.gz
bind9_9.3.2-P1-1.dsc
  to pool/main/b/bind9/bind9_9.3.2-P1-1.dsc
bind9_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/bind9_9.3.2-P1-1_i386.deb
bind9_9.3.2-P1.orig.tar.gz
  to pool/main/b/bind9/bind9_9.3.2-P1.orig.tar.gz
dnsutils_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/dnsutils_9.3.2-P1-1_i386.deb
libbind-dev_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libbind-dev_9.3.2-P1-1_i386.deb
libbind9-0_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libbind9-0_9.3.2-P1-1_i386.deb
libdns21_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libdns21_9.3.2-P1-1_i386.deb
libisc11_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libisc11_9.3.2-P1-1_i386.deb
libisccc0_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libisccc0_9.3.2-P1-1_i386.deb
libisccfg1_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libisccfg1_9.3.2-P1-1_i386.deb
liblwres9_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/liblwres9_9.3.2-P1-1_i386.deb
lwresd_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/lwresd_9.3.2-P1-1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
LaMont Jones [EMAIL PROTECTED] (supplier of updated bind9 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed,  6 Sep 2006 08:07:13 -0600
Source: bind9
Binary: libisccc0 lwresd libbind9-0 bind9-doc dnsutils bind9 libbind-dev 
bind9-host liblwres9 libisc11 libisccfg1 libdns21
Architecture: all i386 source 
Version: 1:9.3.2-P1-1
Distribution: unstable
Urgency: high
Maintainer: LaMont Jones [EMAIL PROTECTED]
Changed-By: LaMont Jones [EMAIL PROTECTED]
Description: 
 bind9  - Internet Domain Name Server
 bind9-doc  - Documentation for BIND
 bind9-host - Version of 'host' bundled with BIND 9.X
 dnsutils   - Clients provided with BIND
 libbind-dev - Static Libraries and Headers used by BIND
 libbind9-0 - BIND9 Shared Library used by BIND
 libdns21   - DNS Shared Library used by BIND
 libisc11   - ISC Shared Library used by BIND
 libisccc0  - Command Channel Library used by BIND
 libisccfg1 - Config File Handling Library used by BIND
 liblwres9  - Lightweight Resolver Library used by BIND
 lwresd - Lightweight Resolver Daemon
Closes: 239665 342957 356914 372203 386091 386224 386237 386245
Changes: 
 bind9 (1:9.3.2-P1-1) unstable; urgency=high
 .
   * New upstream, fixes CVE-2006-4095 and CVE-2006-4096.
 Closes: #386237, #386245
   * Drop gcc-3.4 [powerpc] dependency.  Closes: #342957, #372203
   * Add -fno-strict-aliasing for type-punned pointer aliasing issues
 Closes: #386224
   * Use getent in postinst instead of chown/chgrp.  Closes: #386091, #239665
   * Drop redundant update-rc.d calls.  Closes: #356914
Files: 
 4300b25ce950ee43c46e528d44289d0d 107540 net standard 
bind9-host_9.3.2-P1-1_i386.deb
 493c9774c810fa2cb0fcb80e1e551f84 285196 net optional bind9_9.3.2-P1-1_i386.deb
 49bef4db312e0df38a0d2b640143de26 199574 net optional lwresd_9.3.2-P1-1_i386.deb
 6e68b98e1752ab306221c3fb6be5efde 105836 libs standard 
liblwres9_9.3.2-P1-1_i386.deb
 7caf939d49a12e93e8472ac9177c1951 977156 libdevel optional 
libbind-dev_9.3.2-P1-1_i386.deb
 895e86142c4cc0caefa60bfb6ce727ef 86899 net 

Bug#386237: marked as done (bind9: Security update! Please!)

2006-09-06 Thread Debian Bug Tracking System
Your message dated Wed, 06 Sep 2006 08:02:13 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#386237: fixed in bind9 1:9.3.2-P1-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: bind9
Version: 1:9.3.2-2.1
Severity: normal
Tags: patch


http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en

Since most BIND installations are also open recursive resolvers, it is too
easy to shoot down the named process from anywhere.

Source: 
ftp://ftp.isc.org/isc/bind9/9.3.2-P1/bind-9.3.2-P1.tar.gz
ftp://ftp.isc.org/isc/bind9/9.3.2-P1/bind-9.3.2-P1.tar.gz.asc
ftp://ftp.isc.org/isc/bind9/9.3.2-P1/bind-9.3.2-P1.tar.gz.sha256.asc
ftp://ftp.isc.org/isc/bind9/9.3.2-P1/bind-9.3.2-P1.tar.gz.sha512.asc

Public key from here:
http://www.isc.org/about/openpgp/pgpkey2006.txt

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (990, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.13.2
Locale: LANG=en, LC_CTYPE=sv_SE (charmap=UTF-8) (ignored: LC_ALL set to 
en_US.UTF-8)

Versions of packages bind9 depends on:
ii  adduser  3.97Add and remove users and groups
ii  libbind9-0   1:9.3.2-2.1 BIND9 Shared Library used by BIND
ii  libc62.3.6.ds1-4 GNU C Library: Shared libraries
ii  libdns21 1:9.3.2-2.1 DNS Shared Library used by BIND
ii  libisc11 1:9.3.2-2.1 ISC Shared Library used by BIND
ii  libisccc01:9.3.2-2.1 Command Channel Library used by BI
ii  libisccfg1   1:9.3.2-2.1 Config File Handling Library used 
ii  liblwres91:9.3.2-2.1 Lightweight Resolver Library used 
ii  libssl0.9.8  0.9.8b-2SSL shared libraries
ii  lsb-base 3.1-15  Linux Standard Base 3.1 init scrip
ii  netbase  4.26Basic TCP/IP networking system

bind9 recommends no packages.

-- no debconf information

---End Message---
---BeginMessage---
Source: bind9
Source-Version: 1:9.3.2-P1-1

We believe that the bug you reported is fixed in the latest version of
bind9, which is due to be installed in the Debian FTP archive:

bind9-doc_9.3.2-P1-1_all.deb
  to pool/main/b/bind9/bind9-doc_9.3.2-P1-1_all.deb
bind9-host_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/bind9-host_9.3.2-P1-1_i386.deb
bind9_9.3.2-P1-1.diff.gz
  to pool/main/b/bind9/bind9_9.3.2-P1-1.diff.gz
bind9_9.3.2-P1-1.dsc
  to pool/main/b/bind9/bind9_9.3.2-P1-1.dsc
bind9_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/bind9_9.3.2-P1-1_i386.deb
bind9_9.3.2-P1.orig.tar.gz
  to pool/main/b/bind9/bind9_9.3.2-P1.orig.tar.gz
dnsutils_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/dnsutils_9.3.2-P1-1_i386.deb
libbind-dev_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libbind-dev_9.3.2-P1-1_i386.deb
libbind9-0_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libbind9-0_9.3.2-P1-1_i386.deb
libdns21_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libdns21_9.3.2-P1-1_i386.deb
libisc11_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libisc11_9.3.2-P1-1_i386.deb
libisccc0_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libisccc0_9.3.2-P1-1_i386.deb
libisccfg1_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/libisccfg1_9.3.2-P1-1_i386.deb
liblwres9_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/liblwres9_9.3.2-P1-1_i386.deb
lwresd_9.3.2-P1-1_i386.deb
  to pool/main/b/bind9/lwresd_9.3.2-P1-1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
LaMont Jones [EMAIL PROTECTED] (supplier of updated bind9 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed,  6 Sep 2006 08:07:13 -0600
Source: bind9
Binary: libisccc0 lwresd libbind9-0 bind9-doc dnsutils bind9 libbind-dev 
bind9-host liblwres9 libisc11 libisccfg1 libdns21
Architecture: all i386 source 
Version: 1:9.3.2-P1-1
Distribution: unstable
Urgency: high
Maintainer: LaMont Jones [EMAIL PROTECTED]
Changed-By: LaMont Jones [EMAIL PROTECTED]
Description: 
 bind9  - Internet Domain Name Server
 bind9-doc  - Documentation for BIND
 

Bug#385991: marked as done (hyperestraier - FTBFS: #error This version of QDBM is too old. Use 1.8.65 or later.)

2006-09-06 Thread Debian Bug Tracking System
Your message dated Wed, 06 Sep 2006 08:32:23 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#385991: fixed in hyperestraier 1.4.1-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: hyperestraier
Version: 1.4.1-1
Severity: serious

There was an error while trying to autobuild your package:

 Automatic build of hyperestraier_1.4.1-1 on debian-31 by sbuild/s390 85
[...]
 ** Using build dependencies supplied by package:
 Build-Depends: debhelper (= 4.0.0), autotools-dev, pkg-config, zlib1g-dev, 
 libqdbm-dev (= 1.8.65), libfcgi-dev, ruby, ruby1.8, ruby1.8-dev, gcj (= 
 3:3.2.2-0) [!hppa !mips !mipsel !hurd-i386 !kfreebsd-i386 !kfreebsd-amd64], 
 fastjar [!hppa !mips !mipsel !hurd-i386 !kfreebsd-i386 !kfreebsd-amd64], 
 sablevm [!hppa !mips !mipsel !hurd-i386 !kfreebsd-i386 !kfreebsd-amd64]
[...]
 make[1]: Entering directory `/build/buildd/hyperestraier-1.4.1'
 s390-linux-gnu-gcc -c -I. -I/home/buildd/include -I/usr/local/include 
 -I/usr/include/qdbm -D_XOPEN_SOURCE_EXTENDED=1 -D_GNU_SOURCE=1 
 -D__EXTENSIONS__=1 -D_HPUX_SOURCE=1 -DPIC=1 -D_THREAD_SAFE=1 -D_REENTRANT=1 
 -DNDEBUG -Wall -fPIC -fsigned-char -O3 -fomit-frame-pointer -fforce-addr 
 estraier.c
 In file included from estraier.c:22:
 myconf.h:235:2: error: #error This version of QDBM is too old. Use 1.8.65 or 
 later.
 make[1]: *** [estraier.o] Error 1
 make[1]: Leaving directory `/build/buildd/hyperestraier-1.4.1'
 make: *** [build-arch-stamp] Error 2
 **
 Build finished at 20060904-1041
 FAILED [dpkg-buildpackage died]

---End Message---
---BeginMessage---
Source: hyperestraier
Source-Version: 1.4.1-2

We believe that the bug you reported is fixed in the latest version of
hyperestraier, which is due to be installed in the Debian FTP archive:

hyperestraier_1.4.1-2.diff.gz
  to pool/main/h/hyperestraier/hyperestraier_1.4.1-2.diff.gz
hyperestraier_1.4.1-2.dsc
  to pool/main/h/hyperestraier/hyperestraier_1.4.1-2.dsc
hyperestraier_1.4.1-2_i386.deb
  to pool/main/h/hyperestraier/hyperestraier_1.4.1-2_i386.deb
libestraier-dev_1.4.1-2_i386.deb
  to pool/main/h/hyperestraier/libestraier-dev_1.4.1-2_i386.deb
libestraier-java_1.4.1-2_i386.deb
  to pool/main/h/hyperestraier/libestraier-java_1.4.1-2_i386.deb
libestraier-ruby1.8_1.4.1-2_i386.deb
  to pool/main/h/hyperestraier/libestraier-ruby1.8_1.4.1-2_i386.deb
libestraier8_1.4.1-2_i386.deb
  to pool/main/h/hyperestraier/libestraier8_1.4.1-2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Fumitoshi UKAI [EMAIL PROTECTED] (supplier of updated hyperestraier package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue,  5 Sep 2006 22:40:04 +0900
Source: hyperestraier
Binary: hyperestraier libestraier-java libestraier8 libestraier-dev 
libestraier-ruby1.8
Architecture: source i386
Version: 1.4.1-2
Distribution: unstable
Urgency: low
Maintainer: Fumitoshi UKAI [EMAIL PROTECTED]
Changed-By: Fumitoshi UKAI [EMAIL PROTECTED]
Description: 
 hyperestraier - a full-text search system for communities
 libestraier-dev - a full-text search system Libraries [development]
 libestraier-java - Hyper Estraier Node API Libraries for Java
 libestraier-ruby1.8 - Hyper Estraier Node API Libraries for Ruby
 libestraier8 - a full-text search system Libraries [runtime]
Closes: 385991
Changes: 
 hyperestraier (1.4.1-2) unstable; urgency=low
 .
   * it actually build-depends on libqdbm-dev (= 1.8.68), which
 provides QDBM_LIBVER 1404 or more.
 closes: Bug#385991
Files: 
 d852c448bd4ed84d5edbc7df3150a018 992 text optional hyperestraier_1.4.1-2.dsc
 8b840d3227f8f676eb63c8e6dc18264b 72018 text optional 
hyperestraier_1.4.1-2.diff.gz
 a36fe6e2bcc5c0a631b90698773649b6 433228 text optional 
hyperestraier_1.4.1-2_i386.deb
 306dda2f16cb69911e9698563c9d7711 120458 text optional 
libestraier8_1.4.1-2_i386.deb
 b803124654bf38cf5644c9626404707e 160510 text optional 
libestraier-dev_1.4.1-2_i386.deb
 0df425d95a2a1db94d5b34b81a54f421 81010 text optional 
libestraier-ruby1.8_1.4.1-2_i386.deb
 

Bug#386299: ekg2: Plugin/program compilation option mismatch

2006-09-06 Thread Tristan Seligmann
Package: ekg2
Version: 20060826+0920-1
Severity: grave
Justification: renders package unusable

Attempting to run ekg2 yields the following:

plugin ncurses cannot be loaded because of mishmashed compilation...
program compilated with: --enable-unicode
 plugin compilated with: --disable-unicode
plugin gtk cannot be loaded because of mishmashed compilation...
program compilated with: --enable-unicode
 plugin compilated with: --disable-unicode
No UI-PLUGIN!
plugin jabber cannot be loaded because of mishmashed compilation...
program compilated with: --enable-unicode
 plugin compilated with: --disable-unicode
plugin gg cannot be loaded because of mishmashed compilation...
program compilated with: --enable-unicode
 plugin compilated with: --disable-unicode
plugin irc cannot be loaded because of mishmashed compilation...
program compilated with: --enable-unicode
 plugin compilated with: --disable-unicode
Error opening script variable file..

Without being able to load the UI or network plugins, this seems to
render the package essentially non-functional.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.17-2-k7
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages ekg2 depends on:
ii  libaspell15  0.60.4-4GNU Aspell spell-checker runtime l
ii  libatk1.0-0  1.12.1-1The ATK accessibility toolkit
ii  libc62.3.6.ds1-2 GNU C Library: Shared libraries
ii  libcairo21.2.4-1 The Cairo 2D vector graphics libra
ii  libexpat11.95.8-3.2  XML parsing C library - runtime li
ii  libfontconfig1   2.3.2-7 generic font configuration library
ii  libgadu3 1:1.7~rc2-1 Gadu-Gadu protocol library - runti
ii  libglib2.0-0 2.10.3-3The GLib library of C routines
ii  libgnutls13  1.4.2-1 the GNU TLS library - runtime libr
ii  libgpmg1 1.19.6-22   General Purpose Mouse - shared lib
ii  libgtk2.0-0  2.8.20-1The GTK+ graphical user interface 
ii  libjpeg626b-13   The Independent JPEG Group's JPEG 
ii  libncurses5  5.5-2   Shared libraries for terminal hand
ii  libpango1.0-01.12.3-2Layout and rendering of internatio
ii  libperl5.8   5.8.8-6.1   Shared Perl library
ii  libsqlite3-0 3.3.7-1 SQLite 3 shared library
ii  libssl0.9.8  0.9.8b-2SSL shared libraries
ii  libungif4g   4.1.4-2 shared library for GIF images (run
ii  libx11-6 2:1.0.0-8   X11 client-side library
ii  libxcursor1  1.1.5.2-5   X cursor management library
ii  libxext6 1:1.0.0-4   X11 miscellaneous extension librar
ii  libxfixes3   1:3.0.1.2-4 X11 miscellaneous 'fixes' extensio
ii  libxi6   1:1.0.0-5   X11 Input extension library
ii  libxinerama1 1:1.0.1-4.1 X11 Xinerama extension library
ii  libxosd2 2.2.14-1.3  X On-Screen Display library - runt
ii  libxrandr2   2:1.1.0.2-4 X11 RandR extension library
ii  libxrender1  1:0.9.0.2-4 X Rendering Extension client libra
ii  python   2.4.3-11An interactive high-level object-o
ii  python-central   0.5.5   register and build utility for Pyt
ii  python2.42.4.3-8 An interactive high-level object-o
ii  zlib1g   1:1.2.3-13  compression library - runtime

Versions of packages ekg2 recommends:
ii  perl  5.8.8-6.1  Larry Wall's Practical Extraction 

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#358575: mailman 2.1.5-8sarge3: screwup between security and maintainer upload

2006-09-06 Thread Martin Schulze
Lionel Elie Mamane wrote:
 let a be an architecture in sarge. Then one of the following holds for
 mailman in sarge r3:
 
  - it is affected by a security problem.
 
  - it has a severity critical bug.
 
 Mailman in sid:
 
  - may or may not suffer of a security problem
 
 A security problem in Mailman in sarge patched in May has _not_ been
 issued a DSA.

Oh.  Which security problem are you talking about?

 There seems to have been a screw-up in handling of mailman security
 and stable updates: There are two different mailman packages in Debian
 with version number 2.1.5-8sarge3.

Ugh?  How did that happen?

Where is the second one?  I only see 2.1.5-8sarge3 in stable but only
2.1.5-8sarge2 in the security archive.

 History, in chronological order:
 
  -8sarge2 security update to fix:
   potential DoS attack with malformed multi-part messages (closes: #358892) 
 [CVE-2006-0052]
 
  -8sarge3 maintainer update (that got frozen waiting for -8sarge2 to
   happen in order not to conflict with it) to fix bug #358575, a
   severity critical bug.
 
   Uploaded to stable-proposed-updates in the night from 11 to 12
   April 2006, where it created problems because -8sarge1 was to be
   going in sarge r2, and having -8sarge3 appear confused
   everything. Stable update team says something along the lines of
   will consider for sarge r3.

Apparently it has been installed in the archive.

  -8sarge3 security update to fix:
   formt string vulnerability [src/common.c, 
 debian/patches/72_CVE-2006-2191.dpatch]
 
   That security update has not been announced by a DSA, and cannot be
   downloaded from
   http://security.debian.org/pool/updates/main/m/mailman/ .
 
   I don't have access to the source of this package. It was apparently
   prepared by Martin Joey Schulze on 13 May 2006.

Umh?  But where is it?  I don't have it either.  I have recorded the
patch to fix this vulnerability, though.  It's attached.

 As a maintainer of Mailman, I have no recollection of being notified
 of CVE-2006-2191 (it is possible I have missed the notification, but
 my email archives do not contain anything relevant with subject
 mailman and 2191 in the body); the CVE entry at mitre.org contains
 no information. I have no idea whether this security problem affects
 the version in sid or not, I have no precise information _what_ this
 security problem is.

I found a trace.  Apparently this problem has been considered not
exploitable later, and hence the issue was disregarded.  The
researcher was Karl Chen.  He suggested to file a normal bug then.  If
that has happened, you should have (had) it in your bug list.

 The situation right now:
 
  - sarge r3 contains mailman 2.1.5-8sarge3, but some architectures
have the security update (such as i386) and others have the
maintainer update (such as source, sparc and alpha).
 
Thus all architectures are screwed up in one way or the other.

AARRRGGG!

This is an interesting screwup...

 So, please, security team, tell us about CVE-2006-2191. If
 appropriate, issue a DSA about it, for a package under version number
 -8sarge4, built on top of -8sarge3 the maintainer update. Please give
 us (the mailman-in-Debian maintainers) the information needed to fix
 CVE-2006-2191 in sid, or make a retroactive note in the changelog to
 note when it was fixed by a new upstream version.

I'll forward you the mails wrt this issue.

Guess we didn't contact you earlier because it became a non-issue.

 Stable release team, please react accordingly; you may for example do
 a binary sourceless NMU for the architectures that have -8sarge3 the
 security update so that they all have -8sarge3 the maintainer update.

Imho, it's more useful to upload 2.1.5-8sarge4 and only bump the
version number to get the new version built for all architectures into
the archive.

Regards,

Joey

-- 
Linux - the choice of a GNU generation.

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386276: marked as done (java-gcj-compat-plugin: Needs to depend on gappletviewer-4.1)

2006-09-06 Thread Debian Bug Tracking System
Your message dated Wed, 06 Sep 2006 09:32:08 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#386276: fixed in java-gcj-compat 1.0.65-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: java-gcj-compat-plugin
Version: 1.0.65-1
Severity: grave
Justification: renders package unusable

The package installs some symlinks, that are broken unless gappletviewer-4.1 is 
installed as well.


The severity is arguably only serious, but no less than that IMHO.


 - Jonas

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: powerpc (ppc)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.17-2-powerpc
Locale: LANG=da_DK.UTF-8, LC_CTYPE=da_DK.UTF-8 (charmap=UTF-8)

Versions of packages java-gcj-compat-plugin depends on:
ii  java-gcj-compat   1.0.65-1   Java runtime environment using GIJ

java-gcj-compat-plugin recommends no packages.

-- no debconf information

---End Message---
---BeginMessage---
Source: java-gcj-compat
Source-Version: 1.0.65-2

We believe that the bug you reported is fixed in the latest version of
java-gcj-compat, which is due to be installed in the Debian FTP archive:

java-gcj-compat-dev_1.0.65-2_i386.deb
  to pool/main/j/java-gcj-compat/java-gcj-compat-dev_1.0.65-2_i386.deb
java-gcj-compat-plugin_1.0.65-2_i386.deb
  to pool/main/j/java-gcj-compat/java-gcj-compat-plugin_1.0.65-2_i386.deb
java-gcj-compat_1.0.65-2.diff.gz
  to pool/main/j/java-gcj-compat/java-gcj-compat_1.0.65-2.diff.gz
java-gcj-compat_1.0.65-2.dsc
  to pool/main/j/java-gcj-compat/java-gcj-compat_1.0.65-2.dsc
java-gcj-compat_1.0.65-2_i386.deb
  to pool/main/j/java-gcj-compat/java-gcj-compat_1.0.65-2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Matthias Klose [EMAIL PROTECTED] (supplier of updated java-gcj-compat package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed,  6 Sep 2006 17:45:05 +0200
Source: java-gcj-compat
Binary: java-gcj-compat-plugin java-gcj-compat-dev java-gcj-compat
Architecture: source i386
Version: 1.0.65-2
Distribution: unstable
Urgency: high
Maintainer: Debian GCC Maintainers debian-gcc@lists.debian.org
Changed-By: Matthias Klose [EMAIL PROTECTED]
Description: 
 java-gcj-compat - Java runtime environment using GIJ
 java-gcj-compat-dev - Java runtime environment with GCJ
 java-gcj-compat-plugin - Web browser plugin to execute Java (tm) applets
Closes: 386276
Changes: 
 java-gcj-compat (1.0.65-2) unstable; urgency=high
 .
   * debian/rules: Call dh_gencontrol with parameters. Closes: #386276.
Files: 
 2e9fcc0d124ea7e77d43e7493670f636 866 interpreters optional 
java-gcj-compat_1.0.65-2.dsc
 20bb6d3bd1cdafa2833711e4e386b2db 8115 interpreters optional 
java-gcj-compat_1.0.65-2.diff.gz
 ba1f0847d9064a1838abcfbdcdf06b1a 19438 devel optional 
java-gcj-compat-dev_1.0.65-2_i386.deb
 0d72596255881c82b0c7de9b19d85b99 12376 interpreters optional 
java-gcj-compat_1.0.65-2_i386.deb
 74fb405b685a09fb4bb1db303d690632 1274 interpreters optional 
java-gcj-compat-plugin_1.0.65-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE/u26StlRaw+TLJwRAtNuAJ94E3dmgl+8+J/3uKghOwRFNmfSrwCgnLSn
gppnPENC4BiHz688fa2t4JE=
=SXxV
-END PGP SIGNATURE-

---End Message---


Bug#358575: mailman 2.1.5-8sarge3: screwup between security and maintainer upload

2006-09-06 Thread Martin Zobel-Helas

Hi *,

Martin Schulze [EMAIL PROTECTED] writes:
 Stable release team, please react accordingly; you may for example do
 a binary sourceless NMU for the architectures that have -8sarge3 the
 security update so that they all have -8sarge3 the maintainer update.

 Imho, it's more useful to upload 2.1.5-8sarge4 and only bump the
 version number to get the new version built for all architectures into
 the archive.
Please go ahead.

Greetings
Martin

-- 
Martin Zobel-Helas  GPG Key-ID:0x5d64f870
Debian DevelopereMail Privat:  [EMAIL PROTECTED]
Debian Stable Release Manager   eMail Debian:  [EMAIL PROTECTED]




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386237: bind9: Security update! Please!

2006-09-06 Thread Micah Anderson

Does this patch work with just plain ole 'bind' (not bind9)? That
package also seems vulnerable...

Micah

Patrik Wallstrom wrote:
 Package: bind9
 Version: 1:9.3.2-2.1
 Severity: normal
 Tags: patch
 
 
 http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en
 
 Since most BIND installations are also open recursive resolvers, it is too
 easy to shoot down the named process from anywhere.
 
 Source: 
 ftp://ftp.isc.org/isc/bind9/9.3.2-P1/bind-9.3.2-P1.tar.gz
 ftp://ftp.isc.org/isc/bind9/9.3.2-P1/bind-9.3.2-P1.tar.gz.asc
 ftp://ftp.isc.org/isc/bind9/9.3.2-P1/bind-9.3.2-P1.tar.gz.sha256.asc
 ftp://ftp.isc.org/isc/bind9/9.3.2-P1/bind-9.3.2-P1.tar.gz.sha512.asc
 
 Public key from here:
 http://www.isc.org/about/openpgp/pgpkey2006.txt
 
 -- System Information:
 Debian Release: testing/unstable
   APT prefers unstable
   APT policy: (990, 'unstable')
 Architecture: i386 (i686)
 Shell:  /bin/sh linked to /bin/bash
 Kernel: Linux 2.6.13.2
 Locale: LANG=en, LC_CTYPE=sv_SE (charmap=UTF-8) (ignored: LC_ALL set to 
 en_US.UTF-8)
 
 Versions of packages bind9 depends on:
 ii  adduser  3.97Add and remove users and groups
 ii  libbind9-0   1:9.3.2-2.1 BIND9 Shared Library used by BIND
 ii  libc62.3.6.ds1-4 GNU C Library: Shared libraries
 ii  libdns21 1:9.3.2-2.1 DNS Shared Library used by BIND
 ii  libisc11 1:9.3.2-2.1 ISC Shared Library used by BIND
 ii  libisccc01:9.3.2-2.1 Command Channel Library used by 
 BI
 ii  libisccfg1   1:9.3.2-2.1 Config File Handling Library 
 used 
 ii  liblwres91:9.3.2-2.1 Lightweight Resolver Library 
 used 
 ii  libssl0.9.8  0.9.8b-2SSL shared libraries
 ii  lsb-base 3.1-15  Linux Standard Base 3.1 init 
 scrip
 ii  netbase  4.26Basic TCP/IP networking system
 
 bind9 recommends no packages.
 
 -- no debconf information
 
 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386305: iacd won't start if the pidfile already exists

2006-09-06 Thread Dimitri Puzin
Package: iacd
Version: 0.0.26-5
Severity: grave

Hello,

the current version of iacd won't remove its pidfile, even on normal
shutdown of the daemon. The daemon won't start if the pidfile already
exists. This prevents the daemon from starting up the next time via
initscript. The init script terminates silently without error. This bug
renders the package effectively unusable. The cause for this behavior is
the privilege drop which appears to happen after the pidfile was
created. The pidfile then belongs to root and cannot be removed by the
daemon which runs under uid/gid of irc.
One possible solution to this bug could be the removal of the pidfile
inside the init script after termination of the daemon.

Bug #268636 also deserves some attention, please. It took quite some
time to figure it out. This could also be of severity grave.

Regards,

-Dimitri Puzin aka Tristan-777


signature.asc
Description: OpenPGP digital signature


Bug#386311: Architecure dependend binary in /usr/share/games/koules

2006-09-06 Thread Alexander Schmehl
Package: koules
Version: 1.4-13
Severity: serious
Justification: fails FHS

$ file /usr/share/games/koules/koules.sndsrv.linux
/usr/share/games/koules/koules.sndsrv.linux: ELF 32-bit LSB executable,
Intel 80386, version 1 (SYSV), for GNU/Linux 2.4.1, dynamically linked
(uses shared libs), for GNU/Linux 2.4.1, stripped



-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16-2-k7
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)

Versions of packages koules depends on:
ii  libc62.3.6.ds1-4 GNU C Library: Shared libraries
ii  libx11-6 2:1.0.0-8   X11 client-side library
ii  libxext6 1:1.0.0-4   X11 miscellaneous extension librar

Versions of packages koules recommends:
ii  tcl8.38.3.5-5Tcl (the Tool Command Language) v8
ii  tk8.3 8.3.5-6Tk toolkit for Tcl and X11, v8.3 -

-- no debconf information

-- 
Yours sincerely,
  Alexander



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#386299: ekg2: Plugin/program compilation option mismatch

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 386299 minor
Bug#386299: ekg2: Plugin/program compilation option mismatch
Severity set to `minor' from `grave'

 retitle 386299 Fails when run in UTF-8 environment
Bug#386299: ekg2: Plugin/program compilation option mismatch
Changed Bug title.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386262: marked as done (FTBFS: @MKINSTALLDIRS@: No such file or directory)

2006-09-06 Thread Debian Bug Tracking System
Your message dated Wed, 06 Sep 2006 10:05:19 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#386262: fixed in xemeraldia 0.4.1-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: xemeraldia
Version: 0.4.1-2
Severity: serious

This package no longer builds in unstable:

 Automatic build of xemeraldia_0.4.1-2 on em64t by sbuild/amd64 0.49
...
 The following NEW packages will be installed:
   autoconf automake1.9 autotools-dev debhelper gettext gettext-base html2text
...
 make[2]: Leaving directory `/build/tbm/xemeraldia-0.4.1/m4'
 Making install in po
 make[2]: Entering directory `/build/tbm/xemeraldia-0.4.1/po'
 /bin/sh @MKINSTALLDIRS@ 
 /build/tbm/xemeraldia-0.4.1/debian/xemeraldia/usr/share
 /bin/sh: @MKINSTALLDIRS@: No such file or directory
 make[2]: *** [install-data-yes] Error 127
 make[2]: Leaving directory `/build/tbm/xemeraldia-0.4.1/po'
 make[1]: *** [install-recursive] Error 1

-- 
Martin Michlmayr
http://www.cyrius.com/

---End Message---
---BeginMessage---
Source: xemeraldia
Source-Version: 0.4.1-3

We believe that the bug you reported is fixed in the latest version of
xemeraldia, which is due to be installed in the Debian FTP archive:

xemeraldia_0.4.1-3.diff.gz
  to pool/main/x/xemeraldia/xemeraldia_0.4.1-3.diff.gz
xemeraldia_0.4.1-3.dsc
  to pool/main/x/xemeraldia/xemeraldia_0.4.1-3.dsc
xemeraldia_0.4.1-3_i386.deb
  to pool/main/x/xemeraldia/xemeraldia_0.4.1-3_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joey Hess [EMAIL PROTECTED] (supplier of updated xemeraldia package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed,  6 Sep 2006 12:39:48 -0400
Source: xemeraldia
Binary: xemeraldia
Architecture: source i386
Version: 0.4.1-3
Distribution: unstable
Urgency: low
Maintainer: Joey Hess [EMAIL PROTECTED]
Changed-By: Joey Hess [EMAIL PROTECTED]
Description: 
 xemeraldia - not just another tetris clone
Closes: 386262
Changes: 
 xemeraldia (0.4.1-3) unstable; urgency=low
 .
   * Fix MKINSTALLDIRS breakage. Closes: #386262
Files: 
 7407e54fe7821e0b0a522cfcd9451195 638 games optional xemeraldia_0.4.1-3.dsc
 ff830eb6bb3260f825cfa94af5208c2a 4348 games optional xemeraldia_0.4.1-3.diff.gz
 a0f5cb7e441ad0a1231d0c6edffd9fec 26090 games optional 
xemeraldia_0.4.1-3_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE/vqh2tp5zXiKP0wRAj5bAJ0ebId9UkCm8jRmSv8OwyIkcVLr5QCgvOSB
G1oYzQKwfUsh09+q+/9hkt4=
=qgJ8
-END PGP SIGNATURE-

---End Message---


Bug#386299: ekg2: Plugin/program compilation option mismatch

2006-09-06 Thread Marcin Owsiany
severity 386299 minor
retitle 386299 Fails when run in UTF-8 environment
thanks

Unicode support in ekg2 is highly experimental and not yet supported
upstream, therefore the debian package is built without UTF-8 support.

On Wed, Sep 06, 2006 at 05:56:17PM +0200, Tristan Seligmann wrote:
 Attempting to run ekg2 yields the following:

Try running it in some iso-8859 locale.

 plugin ncurses cannot be loaded because of mishmashed compilation...
 program compilated with: --enable-unicode
  plugin compilated with: --disable-unicode

This is not true, everything was built without unicode support. The
messages need to be fixed.

Marcin
-- 
Marcin Owsiany [EMAIL PROTECTED] http://marcin.owsiany.pl/
GnuPG: 1024D/60F41216  FE67 DA2D 0ACA FC5E 3F75  D6F6 3A0D 8AA0 60F4 1216


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386194: moinmoin-common: Internal Server Error after Python 2.4 upgrade using debian/testing

2006-09-06 Thread Jonas Smedegaard
On Tue, 05 Sep 2006 23:54:59 +0200 Didier wrote:

 My moinmoin is broken after upgrading my Debian testing.
 I've forced installing the unstable version but nothing has been
 fixed.

I don't quite understand.

Do you consider it a bug that moinmoin from unstable does not work when
manually installed into a system running testing?

Please clarify...


 - Jonas

-- 
* Jonas Smedegaard - idealist og Internet-arkitekt
* Tlf.: +45 40843136  Website: http://dr.jones.dk/

 - Enden er nær: http://www.shibumi.org/eoti.htm


pgpMvguJBvuMc.pgp
Description: PGP signature


Bug#386237: bind9: Security update! Please!

2006-09-06 Thread Patrik Wallstrom
On Wed, 06 Sep 2006, Micah Anderson wrote:

 Does this patch work with just plain ole 'bind' (not bind9)? That
 package also seems vulnerable...

No, there are separate packages för BIND 8. (All BIND users should
upgrade to version 9 anyway.)

All new versions are published at isc.org.

-- 
patrik_wallstrom-foodfight-[EMAIL PROTECTED]+46-733173956



Bug#384826: still continues to fail to work at all

2006-09-06 Thread Rob Browning
Martin Wuertele [EMAIL PROTECTED] writes:

 Looks like i386 buildd is broken. If I create a fresh i386 chroot,
 apt-get -b source duplicity and install it, it runs fine (just what
 happened back when 384826 was opened).

 Could you please try to verify, thanks.

Certainly.  I did an apt-get install for all the build depends, and
then a fakeroot debian/rules binary, and the resulting package
appears to be broken in the same way.  Note that this wasn't from a
clean chroot; if I have time, and if it's still of interest, I might
be able to try that later.

Hope that helps.
-- 
Rob Browning
rlb @defaultvalue.org and @debian.org; previously @cs.utexas.edu
GPG starting 2002-11-03 = 14DD 432F AE39 534D B592  F9A0 25C8 D377 8C7E 73A4


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386319: gnome-commander: Ships with scrollkeeper files

2006-09-06 Thread Josselin Mouette
Package: gnome-commander
Version: 1.2.0-3.1
Severity: critical
Justification: breaks unrelated software

gnome-commander ships with all files in var/lib/scrollkeeper/$LANG. This 
breaks the scrollkeeper database for other packages.
-- 
 .''`.   Josselin Mouette/\./\
: :' :   [EMAIL PROTECTED]
`. `'[EMAIL PROTECTED]
  `-  Debian GNU/Linux -- The power of freedom


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386321: hugin: new packages must replace old ones

2006-09-06 Thread Yann Dirson
Package: hugin
Version: 0.6.1-1
Severity: serious

Selecting previously deselected package hugin-data.
(Reading database ... 297466 files and directories currently installed.)
Unpacking hugin-data (from .../hugin-data_0.6.1-1_all.deb) ...
dpkg: error processing
/var/cache/apt/archives/hugin-data_0.6.1-1_all.deb (--unpack):
 trying to overwrite `/usr/share/applications/hugin.desktop', which is also in 
package hugin
dpkg-deb: subprocess paste killed by signal (Broken pipe)
Selecting previously deselected package hugin-bin.
Unpacking hugin-bin (from .../hugin-bin_0.6.1-1_i386.deb) ...
dpkg: error processing
/var/cache/apt/archives/hugin-bin_0.6.1-1_i386.deb (--unpack):
 trying to overwrite `/usr/bin/hugin', which is also in package hugin
dpkg-deb: subprocess paste killed by signal (Broken pipe)
Selecting previously deselected package hugin-tools.
Unpacking hugin-tools (from .../hugin-tools_0.6.1-1_i386.deb) ...
dpkg: error processing
/var/cache/apt/archives/hugin-tools_0.6.1-1_i386.deb (--unpack):
 trying to overwrite `/usr/bin/autooptimiser', which is also in
package hugin
dpkg-deb: subprocess paste killed by signal (Broken pipe)
Preparing to replace hugin 0.6.1-0.0 (using
.../archives/hugin_0.6.1-1_all.deb) ...
Unpacking replacement hugin ...
Errors were encountered while processing:
 /var/cache/apt/archives/hugin-data_0.6.1-1_all.deb
 /var/cache/apt/archives/hugin-bin_0.6.1-1_i386.deb
 /var/cache/apt/archives/hugin-tools_0.6.1-1_i386.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)


-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (90, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15.4-smp-gbbde1285
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages hugin depends on:
pn  hugin-bin none (no description available)
pn  hugin-tools   none (no description available)
ii  libpano12-bin 2.8.1-1panorama tools utilities

hugin recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386237: bind9: Security update! Please!

2006-09-06 Thread LaMont Jones
On Wed, Sep 06, 2006 at 07:33:34PM +0200, Patrik Wallstrom wrote:
 On Wed, 06 Sep 2006, Micah Anderson wrote:
  Does this patch work with just plain ole 'bind' (not bind9)? That
  package also seems vulnerable...
 No, there are separate packages för BIND 8. (All BIND users should
 upgrade to version 9 anyway.)
 All new versions are published at isc.org.

And neither CVE-2006-4095 nor CVE-2006-4096 affect BIND 8, according
to the CERT advisory.

lamont



Bug#386194: moinmoin-common: Internal Server Error after Python 2.4 upgrade using debian/testing

2006-09-06 Thread Didier Dubois




I'm running 'testing'.
When running reportbug, I was said there is a 'better' version in
unstable and suggest to upgrade.

I changed sources.list and and upgraded moinmoin-common.

But still do not works.

See error below:


Internal Server Error
The server encountered an internal error or
misconfiguration and was unable to complete
your request.
Please contact the server administrator, [EMAIL PROTECTED] and
inform them of the time the error occurred,
and anything you might have done that may have
caused the error.
More information about this error may be available
in the server error log.

Apache/2.0.55 (Debian) DAV/2 SVN/1.3.2 Server at X
Port 80


Jonas Smedegaard wrote:

  On Tue, 05 Sep 2006 23:54:59 +0200 Didier wrote:

  
  
My moinmoin is broken after upgrading my Debian testing.
I've forced installing the unstable version but nothing has been
fixed.

  
  
I don't quite understand.

Do you consider it a bug that moinmoin from unstable does not work when
manually installed into a system running testing?

Please clarify...


 - Jonas

  





-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: tagging 386311

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 386311 + pending
Bug#386311: Architecure dependend binary in /usr/share/games/koules
There were no tags set.
Tags added: pending


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386321: hugin: new packages must replace old ones

2006-09-06 Thread Florent Bayle
Yann Dirson wrote :
 Package: hugin
 Version: 0.6.1-1
 Severity: serious
 
 Selecting previously deselected package hugin-data.
 (Reading database ... 297466 files and directories currently installed.)
 Unpacking hugin-data (from .../hugin-data_0.6.1-1_all.deb) ...
 dpkg: error processing
 /var/cache/apt/archives/hugin-data_0.6.1-1_all.deb (--unpack):
  trying to overwrite `/usr/share/applications/hugin.desktop', which is also 
 in package hugin
 dpkg-deb: subprocess paste killed by signal (Broken pipe)
 Selecting previously deselected package hugin-bin.
 Unpacking hugin-bin (from .../hugin-bin_0.6.1-1_i386.deb) ...
 dpkg: error processing
 /var/cache/apt/archives/hugin-bin_0.6.1-1_i386.deb (--unpack):
  trying to overwrite `/usr/bin/hugin', which is also in package hugin
 dpkg-deb: subprocess paste killed by signal (Broken pipe)
 Selecting previously deselected package hugin-tools.
 Unpacking hugin-tools (from .../hugin-tools_0.6.1-1_i386.deb) ...
 dpkg: error processing
 /var/cache/apt/archives/hugin-tools_0.6.1-1_i386.deb (--unpack):
  trying to overwrite `/usr/bin/autooptimiser', which is also in
 package hugin
 dpkg-deb: subprocess paste killed by signal (Broken pipe)
 Preparing to replace hugin 0.6.1-0.0 (using
 .../archives/hugin_0.6.1-1_all.deb) ...
 Unpacking replacement hugin ...
 Errors were encountered while processing:
  /var/cache/apt/archives/hugin-data_0.6.1-1_all.deb
  /var/cache/apt/archives/hugin-bin_0.6.1-1_i386.deb
  /var/cache/apt/archives/hugin-tools_0.6.1-1_i386.deb
 E: Sub-process /usr/bin/dpkg returned an error code (1)
 

Hi,

This version of Hugin is the first one included in Debian. Maybe are
you using unofficial packages. Could you please send me the output of
the command apt-cache policy hugin ?

Thanks.

-- 
Florent


pgpubeWuWyB32.pgp
Description: PGP signature


Bug#386289: marked as done (libfreetype6: libfreetype.so.6 being removed)

2006-09-06 Thread Debian Bug Tracking System
Your message dated Wed, 6 Sep 2006 13:14:17 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#386289: libfreetype6: libfreetype.so.6 being removed
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: libfreetype6
Version: 2.2.1-2
Severity: critical
Justification: breaks unrelated software

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

After upgrading to the latest release (2.2.1-3) there was no libfreetype.so.6 
and no libfreetype.so.6.3.10 under 
/usr/lib anymore. Due to that almost every program could not be started. Even 
after downgrading to version 2.2.1-2 
again these files would not be created. I had to manually extract the package 
and move the files to their place.

(After the upgrade only libfreetype.a and libfreetype.la resided under 
/usr/lib.)

- -- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.17-2-k7
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to de_DE.UTF-8)

Versions of packages libfreetype6 depends on:
ii  libc62.3.6.ds1-4 GNU C Library: Shared libraries
ii  zlib1g   1:1.2.3-13  compression library - runtime

libfreetype6 recommends no packages.

- -- no debconf information

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE/teOYfUFJ3ewsJgRAoV8AJ9xBf7iSPr52IkLwJseUPVZLBC2RwCcCCuF
Uq/8O+LduCxUxxoUslj3YeY=
=ObOb
-END PGP SIGNATURE-

---End Message---
---BeginMessage---
On Wed, Sep 06, 2006 at 04:13:34PM +0200, Mathias Brodala wrote:
 Package: libfreetype6
 Version: 2.2.1-2
 Severity: critical
 Justification: breaks unrelated software

 After upgrading to the latest release (2.2.1-3) there was no
 libfreetype.so.6 and no libfreetype.so.6.3.10 under /usr/lib anymore. Due
 to that almost every program could not be started. Even after downgrading
 to version 2.2.1-2 again these files would not be created. I had to
 manually extract the package and move the files to their place.

Um, those files are present in the libfreetype6 package on i386, of both
versions.  I don't know what's happening on your system, but it doesn't
appear to be a bug in the package.

You may want to check what dpkg -S /usr/lib/libfreetype.so.6 says on your
system.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/
---End Message---


Bug#381343: plucker-desktop: FutureWarning / DepreciationWarning on channel update

2006-09-06 Thread Ludovic Rousseau
unmerge 381343
close 381343
thanks

Le 03.08.2006, à 21:14:35, Florian Schlichting a écrit:
 Package: plucker-desktop
 Version: 1.8-15
 Severity: minor
 
 this is just in case you haven't encountered this - 
 
 when updating a channel, the first messages I get are the following:
 
 
 /usr/lib/python2.3/site-packages/PyPlucker/helper/gettext.py:131: 
 FutureWarning: hex/oct constants  sys.maxint will return positive values in 
 Python 2.4 and up
   if _lsbStrToInt(buffer[:4]) != 0x950412de:
 /usr/lib/python2.3/site-packages/PyPlucker/helper/gettext.py:176: 
 FutureWarning: hex/oct constants  sys.maxint will return positive values in 
 Python 2.4 and up
   f.write(_intToLsbStr(0x950412de))# magic number
 /usr/lib/python2.3/site-packages/PyPlucker/PluckerDocs.py:86: 
 DeprecationWarning: Non-ASCII character '\xfc' in file 
 /usr/lib/python2.3/site-packages/PyPlucker/helper/doc_compress.py on line 23, 
 but no encoding declared; see http://www.python.org/peps/pep-0263.html for 
 details
   from PyPlucker.helper import doc_compress
 /usr/lib/python2.3/site-packages/PyPlucker/Writer.py:21: DeprecationWarning: 
 Non-ASCII character '\xfc' in file 
 /usr/lib/python2.3/site-packages/PyPlucker/helper/prc.py on line 20, but no 
 encoding declared; see http://www.python.org/peps/pep-0263.html for details
   from PyPlucker.helper import prc, dict
 /usr/lib/python2.3/site-packages/PyPlucker/helper/prc.py:244: FutureWarning: 
 hex/oct constants  sys.maxint will return positive values in Python 2.4 and 
 up
   attr = (auid  0xff00)  24
 /usr/lib/python2.3/site-packages/PyPlucker/helper/prc.py:876: FutureWarning: 
 hex/oct constants  sys.maxint will return positive values in Python 2.4 and 
 up
   attr = (auid  0xff00)  24

I do not have these warnings with Python 2.4 anymore.

The code should still work since Python is doing the expected
calculation.

$ python
Python 2.4.4c0 (#2, Jul 30 2006, 15:43:58)
[GCC 4.1.2 20060715 (prerelease) (Debian 4.1.1-9)] on linux2
Type help, copyright, credits or license for more information.
 auid=0x12345678
 hex((auid  0xff00)  24)
'0x12L'


I now close this bug.

Thanks

-- 
 Dr. Ludovic Rousseau[EMAIL PROTECTED]
 -- Normaliser Unix c'est comme pasteuriser le camembert, L.R. --



Processed: Re: Bug#381343: plucker-desktop: FutureWarning / DepreciationWarning on channel update

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 unmerge 381343
Bug#381343: plucker-desktop: FutureWarning / DepreciationWarning on channel 
update
Bug#385191: plucker-desktop: won't update channels, no error messages
Disconnected #381343 from all other report(s).

 close 381343
Bug#381343: plucker-desktop: FutureWarning / DepreciationWarning on channel 
update
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug closed, send any further explanations to Florian Schlichting [EMAIL 
PROTECTED]

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#385191: plucker-desktop: won't update channels, no error messages

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 385191 normal
Bug#385191: plucker-desktop: won't update channels, no error messages
Severity set to `normal' from `grave'

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386311: marked as done (Architecure dependend binary in /usr/share/games/koules)

2006-09-06 Thread Debian Bug Tracking System
Your message dated Wed, 06 Sep 2006 14:20:06 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#386311: fixed in koules 1.4-14
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: koules
Version: 1.4-13
Severity: serious
Justification: fails FHS

$ file /usr/share/games/koules/koules.sndsrv.linux
/usr/share/games/koules/koules.sndsrv.linux: ELF 32-bit LSB executable,
Intel 80386, version 1 (SYSV), for GNU/Linux 2.4.1, dynamically linked
(uses shared libs), for GNU/Linux 2.4.1, stripped



-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16-2-k7
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)

Versions of packages koules depends on:
ii  libc62.3.6.ds1-4 GNU C Library: Shared libraries
ii  libx11-6 2:1.0.0-8   X11 client-side library
ii  libxext6 1:1.0.0-4   X11 miscellaneous extension librar

Versions of packages koules recommends:
ii  tcl8.38.3.5-5Tcl (the Tool Command Language) v8
ii  tk8.3 8.3.5-6Tk toolkit for Tcl and X11, v8.3 -

-- no debconf information

-- 
Yours sincerely,
  Alexander


---End Message---
---BeginMessage---
Source: koules
Source-Version: 1.4-14

We believe that the bug you reported is fixed in the latest version of
koules, which is due to be installed in the Debian FTP archive:

koules_1.4-14.diff.gz
  to pool/main/k/koules/koules_1.4-14.diff.gz
koules_1.4-14.dsc
  to pool/main/k/koules/koules_1.4-14.dsc
koules_1.4-14_i386.deb
  to pool/main/k/koules/koules_1.4-14_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alexander Schmehl [EMAIL PROTECTED] (supplier of updated koules package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed,  6 Sep 2006 21:54:19 +0200
Source: koules
Binary: koules
Architecture: source i386
Version: 1.4-14
Distribution: unstable
Urgency: low
Maintainer: Debian Games Team [EMAIL PROTECTED]
Changed-By: Alexander Schmehl [EMAIL PROTECTED]
Description: 
 koules - Space action game for X11
Closes: 386311
Changes: 
 koules (1.4-14) unstable; urgency=low
 .
   * The It's not a script!  It's a space station! release
   * Move arch dependend sound server binary from /usr/share/games/koules to
 /usr/lib/... (Closes: #386311)
 - created some symlinks for the soundfiles
Files: 
 f0117a5ec972cdf6b02aff744968e37a 683 games optional koules_1.4-14.dsc
 43bd3a7e9ab836030d2301e35cfdfc2e 10138 games optional koules_1.4-14.diff.gz
 b0baa7f5f78a43ef72b6ab8eb141310d 216912 games optional koules_1.4-14_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE/zc7Bxd04ADYzRYRAhAyAJ45r2OkLy/GT8XOw6C8HkEQaWTIvQCeNchO
wkTbPGHeacUGXGVcJe1jOKE=
=cS3W
-END PGP SIGNATURE-

---End Message---


Bug#385191: plucker-desktop: won't update channels, no error messages

2006-09-06 Thread Ludovic Rousseau
severity 385191 normal
thanks

Le 29.08.2006, à 19:22:26, Florian Schlichting a écrit:
 Package: plucker-desktop
 Version: 1.8-16+b1
 Severity: grave
 Justification: renders package unusable
 
 since the last update of plucker (1.8-16+b1, a binary NMU by the buildd
 to rebuild plucker against python2.4), it won't update my channel any
 more. Without any error messages, it merely reports success, albeit
 without the usual progress messages (retrieving http:// etc). After 
 finishing, there is no file in the output location, or if a file is
 still cached in ~/.plucker, it will be copied without being updated.
 
 since updating channels is the whole point of plucker-desktop, I believe
 the severity is justified

I can't reproduce the bug. I am using plucker-desktop 1.8-17 and the
channels are updated.

Did you had a look in ~/.plucker/channels/ to see if you find a
directory named after your channels and with a *.pdb file inside?
You can use the plucker command to view the .pdb file.

Thanks

-- 
 Dr. Ludovic Rousseau[EMAIL PROTECTED]
 -- Normaliser Unix c'est comme pasteuriser le camembert, L.R. --



Bug#385945: present with Sparc

2006-09-06 Thread Gonéri Le Bouder
I've the same issue with Sparc:

open /dev/[sound/]dsp: No such file or directory
boson: ERROR: [BosonAudioAL::BosonAudioAL()] could not open device using alc
X Error: BadRequest (invalid request code or no such operation) 1
  Major opcode:  128
  Minor opcode:  1
  Resource id:  0x387
boson: ERROR: [void BosonCanvasRenderer::initGL()] boson requires 
GL_EXT_framebuffer_object
X Error: BadValue (integer parameter out of range for operation) 2
  Major opcode:  155
  Minor opcode:  4
  Resource id:  0x100
boson: indirect_vertex_array.c:1359: __indirect_glTexCoordPointer: Assertion 
`a != ((void *)0)' failed.
emergencySave(): retrieving current time for filenames
emergencySave(): trying to save game logs
emergencySave(): game logs saved
KCrash: Application 'boson' crashing...
X Error: BadValue (integer parameter out of range for operation) 2
  Major opcode:  155
  Minor opcode:  4
  Resource id:  0x100


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#385357: marked as done (wireshark-dev: Fails to install: wireshark-dev.postinst: line 7: /usr/bin/python2.3: No such file or directory)

2006-09-06 Thread Debian Bug Tracking System
Your message dated Wed, 06 Sep 2006 15:02:37 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#385357: fixed in wireshark 0.99.2-6
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: wireshark-dev
Version: 0.99.2-5
Severity: serious

Hi,

Your package is failing to install with the following error:
Setting up wireshark-dev (0.99.2-5) ...
/var/lib/dpkg/info/wireshark-dev.postinst: line 7: /usr/bin/python2.3: No such 
file or directory
dpkg: error processing wireshark-dev (--configure):
 subprocess post-installation script returned error exit status 1


I have no idea about the current python policy, but I assume you need to
use python instead of python2.3.


Kurt


---End Message---
---BeginMessage---
Source: wireshark
Source-Version: 0.99.2-6

We believe that the bug you reported is fixed in the latest version of
wireshark, which is due to be installed in the Debian FTP archive:

ethereal-common_0.99.2-6_i386.deb
  to pool/main/w/wireshark/ethereal-common_0.99.2-6_i386.deb
ethereal-dev_0.99.2-6_i386.deb
  to pool/main/w/wireshark/ethereal-dev_0.99.2-6_i386.deb
ethereal_0.99.2-6_i386.deb
  to pool/main/w/wireshark/ethereal_0.99.2-6_i386.deb
tethereal_0.99.2-6_i386.deb
  to pool/main/w/wireshark/tethereal_0.99.2-6_i386.deb
tshark_0.99.2-6_i386.deb
  to pool/main/w/wireshark/tshark_0.99.2-6_i386.deb
wireshark-common_0.99.2-6_i386.deb
  to pool/main/w/wireshark/wireshark-common_0.99.2-6_i386.deb
wireshark-dev_0.99.2-6_i386.deb
  to pool/main/w/wireshark/wireshark-dev_0.99.2-6_i386.deb
wireshark_0.99.2-6.diff.gz
  to pool/main/w/wireshark/wireshark_0.99.2-6.diff.gz
wireshark_0.99.2-6.dsc
  to pool/main/w/wireshark/wireshark_0.99.2-6.dsc
wireshark_0.99.2-6_i386.deb
  to pool/main/w/wireshark/wireshark_0.99.2-6_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Frederic Peters [EMAIL PROTECTED] (supplier of updated wireshark package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed,  6 Sep 2006 23:34:36 +0200
Source: wireshark
Binary: wireshark ethereal-dev wireshark-common tshark wireshark-dev ethereal 
ethereal-common tethereal
Architecture: source i386
Version: 0.99.2-6
Distribution: unstable
Urgency: low
Maintainer: Frederic Peters [EMAIL PROTECTED]
Changed-By: Frederic Peters [EMAIL PROTECTED]
Description: 
 ethereal   - dummy upgrade package for ethereal - wireshark
 ethereal-common - dummy upgrade package for ethereal - wireshark
 ethereal-dev - dummy upgrade package for ethereal - wireshark
 tethereal  - dummy upgrade package for ethereal - wireshark
 tshark - network traffic analyzer (console)
 wireshark  - network traffic analyzer
 wireshark-common - network traffic analyser (common files)
 wireshark-dev - network traffic analyser (development tools)
Closes: 385357
Changes: 
 wireshark (0.99.2-6) unstable; urgency=low
 .
   * Acknowledge NMU, thank Steinar.
   * debian/wireshark-dev.postinst: removed rests of old Python module
 compilation, it is not needed by new policy.  (closes: #385357)
Files: 
 49e62479c6bfeadd3e6b964d8956908b 990 net optional wireshark_0.99.2-6.dsc
 76d486339e1cf5fb0668f013446cd9ae 90385 net optional wireshark_0.99.2-6.diff.gz
 c761041f06c517f1de9e97d7005f5018 7011896 net optional 
wireshark-common_0.99.2-6_i386.deb
 17b86350dd69543b014c24aa42da6e62 538636 net optional 
wireshark_0.99.2-6_i386.deb
 a8e0d267f32af9d621821f4de83cab56 99174 net optional tshark_0.99.2-6_i386.deb
 7ba252597710b2d4478dc29b1ee68f9b 173658 devel optional 
wireshark-dev_0.99.2-6_i386.deb
 84a58b366617e3835eb2b74702be9da1 21104 net optional 
ethereal-common_0.99.2-6_i386.deb
 065ce21d7bbf92e9dbb771443e968a07 21102 devel optional 
ethereal-dev_0.99.2-6_i386.deb
 d7f2eb4dd79f1246e9f9770d32cdee54 21088 net optional ethereal_0.99.2-6_i386.deb
 57d841b048f6d25e0cb1efb16206add5 21092 net optional tethereal_0.99.2-6_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE/0NmoR3LsWeD7V4RAr0gAJ9igtlCtq3TyXP5L7BtkfWwOqao0QCgm7d7
YczM5uN+O55RylVJ7UfsdHg=
=AHp6
-END PGP SIGNATURE-

---End Message---


Bug#336529: marked as done (tla-buildpackage: cannot import new project)

2006-09-06 Thread Debian Bug Tracking System
Your message dated Wed, 06 Sep 2006 14:47:23 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#358317: fixed in tla-buildpackage 0.9.11
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: tla-buildpackage
Version: 0.9.9
Severity: normal

Trying to import a new project:

# tbp-importdsc gnustep-ppd_1.0.0-4.dsc
 * tar -zxSpf /home/hubert/prog/debian/gnustep-ppd_1.0.0.orig.tar.gz
 *** Import upstream package gnustep-ppd version 1.0.0 from directory 
/home/hubert/prog/debian/,,tbp-importorigtargz/gnustep-ppd-1.0.0.orig
 * tla tree-version
tla version will be [EMAIL PROTECTED]/gnustep-ppd--head--1.0
 * tla revisions [EMAIL PROTECTED]/gnustep-ppd--head--1.0
Setting up version [EMAIL PROTECTED]/gnustep-ppd--head--1.0
 * tla archive-setup [EMAIL PROTECTED]/gnustep-ppd--head--1.0
Initializing storage area for upstream...
 * tla init-tree --nested [EMAIL PROTECTED]/gnustep-ppd--head--1.0
Traceback (most recent call last):
  File /usr/bin/tbp-importdsc, line 38, in ?
tbpimport.importdsc(dscname)
  File /usr/lib/python2.3/site-packages/tbppy/tbpimport.py, line 67, in 
importdsc
versions.getupstreamver(dscinfo['Version'][0]))
  File /usr/lib/python2.3/site-packages/tbppy/tbpimport.py, line 161, in 
importorigtargz
importorigdir(srcdir, package, version)
  File /usr/lib/python2.3/site-packages/tbppy/tbpimport.py, line 211, in 
importorigdir
extcmd.qrun('tla %s explicit' % cmd().tagging_method)
  File /usr/lib/python2.3/site-packages/tla_support/commandver.py, line 113, 
in cmd
gettlasyntax()
  File /usr/lib/python2.3/site-packages/tla_support/commandver.py, line 49, 
in gettlasyntax
elif util.getstdoutsafeexec(tlacmd, ['-V'])[0].find('tla-1.0.') != -1:
  File /usr/lib/python2.3/site-packages/tla_support/util.py, line 71, in 
getstdoutsafeexec
pid = mainexec(program, args, child_stdout = pipes[1], wait  = 0)
  File /usr/lib/python2.3/site-packages/tla_support/util.py, line 52, in 
mainexec
os.execvp(program, (program,) + tuple(args))
  File /usr/lib/python2.3/os.py, line 336, in execvp
_execvpe(file, args)
  File /usr/lib/python2.3/os.py, line 360, in _execvpe
head, tail = path.split(file)
  File /usr/lib/python2.3/posixpath.py, line 77, in split
i = p.rfind('/') + 1
AttributeError: 'NoneType' object has no attribute 'rfind'
Removing temporary directory /home/hubert/prog/debian/,,tbp-importorigdir...
 * rm -fr /home/hubert/prog/debian/,,tbp-importorigdir
Removing temporary directory /home/hubert/prog/debian/,,tbp-importorigtargz...
 * rm -fr /home/hubert/prog/debian/,,tbp-importorigtargz
Traceback (most recent call last):
  File /usr/bin/tbp-importdsc, line 38, in ?
tbpimport.importdsc(dscname)
  File /usr/lib/python2.3/site-packages/tbppy/tbpimport.py, line 67, in 
importdsc
versions.getupstreamver(dscinfo['Version'][0]))
  File /usr/lib/python2.3/site-packages/tbppy/tbpimport.py, line 161, in 
importorigtargz
importorigdir(srcdir, package, version)
  File /usr/lib/python2.3/site-packages/tbppy/tbpimport.py, line 211, in 
importorigdir
extcmd.qrun('tla %s explicit' % cmd().tagging_method)
  File /usr/lib/python2.3/site-packages/tla_support/commandver.py, line 113, 
in cmd
gettlasyntax()
  File /usr/lib/python2.3/site-packages/tla_support/commandver.py, line 49, 
in gettlasyntax
elif util.getstdoutsafeexec(tlacmd, ['-V'])[0].find('tla-1.0.') != -1:
  File /usr/lib/python2.3/site-packages/tla_support/util.py, line 75, in 
getstdoutsafeexec
checkpid(pid, expected)
  File /usr/lib/python2.3/site-packages/tla_support/util.py, line 99, in 
checkpid
return checkresult(os.waitpid(pid, 0)[1], expected)
  File /usr/lib/python2.3/site-packages/tla_support/util.py, line 95, in 
checkresult
raise ExecProblem, info +  (expected exit code %d) % expected
tla_support.util.ExecProblem: exited with code 1 (expected exit code 0)

tbp-importorig gives similar errors.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (101, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.10-mm3
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages tla-buildpackage depends on:
ii  devscripts2.9.7  Scripts to make the life of a Debi
ii  dpkg-dev  1.13.11package building tools for Debian
ii  python-apt0.6.13.1   Python interface to libapt-pkg
ii  python2.3 2.3.5-8  

Bug#386337: mysql-server-5.0: crash on INSERT query

2006-09-06 Thread Christoph Hohmann
Package: mysql-server-5.0
Version: 5.0.24a-3
Severity: grave
Justification: renders package unusable

MySQL crashes every time doing the query below with the following log entry:

---8---
mysqld got signal 11;
This could be because you hit a bug. It is also possible that this binary
or one of the libraries it was linked against is corrupt, improperly built,
or misconfigured. This error can also be caused by malfunctioning hardware.
We will try our best to scrape up some info that will hopefully help diagnose
the problem, but since we have already crashed, something is definitely wrong
and this may fail.

key_buffer_size=16777216
read_buffer_size=131072
max_used_connections=1
max_connections=100
threads_connected=2
It is possible that mysqld could use up to 
key_buffer_size + (read_buffer_size + sort_buffer_size)*max_connections = 
233983 K
bytes of memory
Hope that's ok; if not, decrease some variables in the equation.

thd=0x8b8c980
Attempting backtrace. You can use the following information to find out
where mysqld died. If you see no messages after this, something went
terribly wrong...
Cannot determine thread, fp=0x4746accc, backtrace may not be correct.
Stack range sanity check OK, backtrace follows:
0x81b98fc handle_segfault + 668
0xe420 _end + -141347824
(nil)
0x821ea07 
_Z12mysql_insertP3THDP13st_table_listR4ListI4ItemERS3_IS5_ES6_S6_15enum_duplicatesb
 + 1847
0x81d06b4 _Z21mysql_execute_commandP3THD + 10068
0x81d5009 _Z11mysql_parseP3THDPcj + 329
0x81d5560 _Z16dispatch_command19enum_server_commandP3THDPcj + 1120
0x81d67f8 _Z10do_commandP3THD + 136
0x81d7204 handle_one_connection + 2308
0x40054e60 _end + 932748880
0x402888ee _end + 935057630
New value of fp=(nil) failed sanity check, terminating stack trace!
Please read http://dev.mysql.com/doc/mysql/en/Using_stack_trace.html and follow 
instructions on how to resolve the stack trace. Resolved
stack trace is much more helpful in diagnosing the problem, so please do 
resolve it
Trying to get some variables.
Some pointers may be invalid and cause the dump to abort...
thd-query at 0x8c05110 = INSERT DELAYED INTO log SET ip=10.0.1.1, 
agent=Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.0.6) Gecko/20060728 
Firefox/1.5.0.6 (Debian-1.5.dfsg+1.5.0.6-3), request=/commsy/commsy.php?, 
method=GET, uid=, ulogin=guest, cid=192261, module=home, fct=index, 
param=, iid=-1
thd-thread_id=8
The manual page at http://www.mysql.com/doc/en/Crashing.html contains
information that should help you find out what is causing the crash.
---8---

If I can give any more information please ask.

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.5
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages mysql-server-5.0 depends on:
ii  adduser   3.85   Add and remove users and groups
ii  debconf [debconf-2.0] 1.4.72 Debian configuration management sy
ii  libc6 2.3.6-7GNU C Library: Shared libraries
ii  libdbi-perl   1.50-2 Perl5 database interface by Tim Bu
ii  libgcc1   1:4.1.1-13 GCC support library
ii  libmysqlclient15off   5.0.24a-3  mysql database client library
ii  libncurses5   5.5-1  Shared libraries for terminal hand
ii  libreadline5  5.1-7  GNU readline and history libraries
ii  libstdc++64.1.1-13   The GNU Standard C++ Library v3
ii  libwrap0  7.6.dbs-9  Wietse Venema's TCP wrappers libra
ii  lsb-base  3.1-4  Linux Standard Base 3.1 init scrip
ii  mysql-client-5.0  5.0.24a-3  mysql database client binaries
ii  mysql-common  5.0.24a-3  mysql database common files (e.g. 
ii  passwd1:4.0.13-7 change and administer password and
ii  perl  5.8.8-6.1  Larry Wall's Practical Extraction 
ii  psmisc22.2-1 Utilities that use the proc filesy
ii  zlib1g1:1.2.3-11 compression library - runtime

Versions of packages mysql-server-5.0 recommends:
ii  mailx1:8.1.2-0.20050715cvs-1 A simple mail user agent

-- debconf information:
  mysql-server-5.0/really_downgrade: false
  mysql-server-5.0/start_on_boot: true
  mysql-server-5.0/nis_warning:
  mysql-server-5.0/postrm_remove_databases: false
  mysql-server-5.0/no_upgrade_with_isam_tables:
* mysql-server-5.0/mysql_install_db_notes:


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386321: hugin: new packages must replace old ones

2006-09-06 Thread Yann Dirson
On Wed, Sep 06, 2006 at 10:07:53PM +0200, Florent Bayle wrote:
 This version of Hugin is the first one included in Debian. Maybe are
 you using unofficial packages. Could you please send me the output of
 the command apt-cache policy hugin ?

Oh, right, they are from debian-multimedia - sorry for the severity,
that should have been at best a wishlist item :(

(sources.list: deb http://www.debian-multimedia.org testing main)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#358317: marked as done (tla-buildpackage: Needs adapting to new tla-load-dirs libraries)

2006-09-06 Thread Debian Bug Tracking System
Your message dated Wed, 06 Sep 2006 14:47:23 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#358317: fixed in tla-buildpackage 0.9.11
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: tla-buildpackage
Version: 0.9.9
Severity: grave
Justification: renders package unusable

Most commands fail with something like:

Traceback (most recent call last):
  File /usr/bin/tbp-importdsc, line 38, in ?
tbpimport.importdsc(dscname)
(...)
  File /usr/lib/python2.3/site-packages/tbppy/configs.py, line 38, in 
makepkgconfigifneeded
extcmd.run('tla %s configs/%s/%s' % (' '.join(cmd().add),
  File /usr/lib/python2.3/site-packages/tla_support/commandver.py, line 113, 
in cmd
gettlasyntax()
  File /usr/lib/python2.3/site-packages/tla_support/commandver.py, line 49, 
in gettlasyntax
elif util.getstdoutsafeexec(tlacmd, ['-V'])[0].find('tla-1.0.') != -1:
  File /usr/lib/python2.3/site-packages/tla_support/util.py, line 71, in 
getstdoutsafeexec
pid = mainexec(program, args, child_stdout = pipes[1], wait  = 0)
  File /usr/lib/python2.3/site-packages/tla_support/util.py, line 52, in 
mainexec
os.execvp(program, (program,) + tuple(args))
  File /usr/lib/python2.3/os.py, line 336, in execvp
_execvpe(file, args)
  File /usr/lib/python2.3/os.py, line 360, in _execvpe
head, tail = path.split(file)
  File /usr/lib/python2.3/posixpath.py, line 77, in split
i = p.rfind('/') + 1
AttributeError: 'NoneType' object has no attribute 'rfind'


The problem is that tla-load-dirs now needs to be initialised to tell
it what VCS is being used (tla, baz or darcs). As a matter of example,
a patch for tbp-initarchive is attached.


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.14-2-amd64-k8-smp
Locale: LANG=fr_LU.UTF-8, LC_CTYPE=fr_LU.UTF-8 (charmap=UTF-8)

Versions of packages tla-buildpackage depends on:
ii  devscripts2.9.15 Scripts to make the life of a Debi
ii  dpkg-dev  1.13.16package building tools for Debian
ii  python-apt0.6.16.1   Python interface to libapt-pkg
ii  python2.3 2.3.5-9An interactive high-level object-o
ii  tla   1.3.3-3arch revision control system
ii  tla-load-dirs 1.0.28 Import upstream archives into tla/

tla-buildpackage recommends no packages.

-- no debconf information
--- /usr/bin/tbp-initarchive2005-06-21 15:17:10.0 +0200
+++ tbp-initarchive 2006-03-22 08:14:07.562934583 +0100
@@ -20,6 +20,7 @@
 import os, sys
 from tbppy import tla, extcmd
 from tla_support.commandver import cmd
+from tla_support import commandver
 
 def printhelp():
 print Usage:
@@ -42,6 +43,8 @@
 if len(sys.argv)  4:
 syntax()
 
+commandver.setscm(tla)
+
 progname, ARCHIVENAME, ARCHIVELOC, WCLOC = sys.argv
 CONFIGVER = %s/configs--head--1.0 % ARCHIVENAME
 if os.path.exists(ARCHIVELOC):
---End Message---
---BeginMessage---
Source: tla-buildpackage
Source-Version: 0.9.11

We believe that the bug you reported is fixed in the latest version of
tla-buildpackage, which is due to be installed in the Debian FTP archive:

tla-buildpackage_0.9.11.dsc
  to pool/main/t/tla-buildpackage/tla-buildpackage_0.9.11.dsc
tla-buildpackage_0.9.11.tar.gz
  to pool/main/t/tla-buildpackage/tla-buildpackage_0.9.11.tar.gz
tla-buildpackage_0.9.11_all.deb
  to pool/main/t/tla-buildpackage/tla-buildpackage_0.9.11_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Mohammed Adnène Trojette [EMAIL PROTECTED] (supplier of updated 
tla-buildpackage package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed,  6 Sep 2006 14:38:02 +0200
Source: tla-buildpackage
Binary: tla-buildpackage
Architecture: source all
Version: 0.9.11
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group [EMAIL PROTECTED]
Changed-By: Mohammed Adnène Trojette [EMAIL PROTECTED]

Bug#385160: marked as done (fetchmail: FTBFS: /usr/bin/msgfmt: found 1 fatal error)

2006-09-06 Thread Debian Bug Tracking System
Your message dated Wed, 06 Sep 2006 14:19:49 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#385160: fixed in fetchmail 6.3.4-6
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: fetchmail
Version: 6.3.4-5
Severity: serious
Justification: no longer builds from source

Hello,

There was a problem while autobuilding your package:

 Automatic build of fetchmail_6.3.4-5 on saturne by sbuild/amd64 85
 Build started at 20060828-0043
 **

[...]

 # recreate gmo-files as workaround
 (cd po; /usr/bin/make update-gmo)
 make[1]: Entering directory `/build/buildd/fetchmail-6.3.4/po'
 rm -f ca.gmo  /usr/bin/msgfmt -c --statistics -o ca.gmo ca.po
 607 translated messages, 8 fuzzy translations, 4 untranslated messages.
 rm -f cs.gmo  /usr/bin/msgfmt -c --statistics -o cs.gmo cs.po
 571 translated messages, 33 fuzzy translations, 15 untranslated messages.
 rm -f de.gmo  /usr/bin/msgfmt -c --statistics -o de.gmo de.po
 619 translated messages.
 rm -f es.gmo  /usr/bin/msgfmt -c --statistics -o es.gmo es.po
 619 translated messages.
 rm -f fr.gmo  /usr/bin/msgfmt -c --statistics -o fr.gmo fr.po
 616 translated messages, 3 untranslated messages.
 rm -f ja.gmo  /usr/bin/msgfmt -c --statistics -o ja.gmo ja.po
 ja.po:8: nplurals = 1...
 ja.po:162: ...but some messages have 2 plural forms
 /usr/bin/msgfmt: found 1 fatal error
 619 translated messages.
 make[1]: *** [ja.gmo] Error 1
 make[1]: Leaving directory `/build/buildd/fetchmail-6.3.4/po'
 make: *** [build-stamp] Error 2
 **
 Build finished at 20060828-0043
 FAILED [dpkg-buildpackage died]

-- 
Florent


pgp9zpZLzkyKe.pgp
Description: PGP signature
---End Message---
---BeginMessage---
Source: fetchmail
Source-Version: 6.3.4-6

We believe that the bug you reported is fixed in the latest version of
fetchmail, which is due to be installed in the Debian FTP archive:

fetchmail_6.3.4-6.diff.gz
  to pool/main/f/fetchmail/fetchmail_6.3.4-6.diff.gz
fetchmail_6.3.4-6.dsc
  to pool/main/f/fetchmail/fetchmail_6.3.4-6.dsc
fetchmail_6.3.4-6_i386.deb
  to pool/main/f/fetchmail/fetchmail_6.3.4-6_i386.deb
fetchmailconf_6.3.4-6_all.deb
  to pool/main/f/fetchmail/fetchmailconf_6.3.4-6_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Hector Garcia [EMAIL PROTECTED] (supplier of updated fetchmail package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed,  6 Sep 2006 22:18:56 +0200
Source: fetchmail
Binary: fetchmailconf fetchmail
Architecture: source i386 all
Version: 6.3.4-6
Distribution: unstable
Urgency: low
Maintainer: Fetchmail Maintainers [EMAIL PROTECTED]
Changed-By: Hector Garcia [EMAIL PROTECTED]
Description: 
 fetchmail  - SSL enabled POP3, APOP, IMAP mail gatherer/forwarder
 fetchmailconf - fetchmail configurator
Closes: 223820 385160
Changes: 
 fetchmail (6.3.4-6) unstable; urgency=low
 .
   [Hector Garcia]
   * Applied patch suggested by upstream (Matthias Andree)
 to fix build when DEB_FETCHMAIL_BUILD_OPTIONS includes
 KRB5. (Closes: #223820)
   [Nico Golde]
   * Fixed problem with ja.po file because of new gettext version
 (Closes: #385160).
Files: 
 8bbea5ebece85b4ac426ba53a9ce5f92 817 mail optional fetchmail_6.3.4-6.dsc
 b8f2a10955d0a30f8d4f6db9b640661b 44906 mail optional fetchmail_6.3.4-6.diff.gz
 f64c0738cb41db678be7056875001392 59442 mail optional 
fetchmailconf_6.3.4-6_all.deb
 872d742d585c614481e5b69cdfc557c8 593066 mail optional 
fetchmail_6.3.4-6_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE/zEOMwsDi2xjdG0RAkmXAKDvmWNIvZ7y3LkkLK/YjVyST0iRtwCbB5ZF
WvdLoAijxtRT7ApE896Ef+c=
=lWew
-END PGP SIGNATURE-

---End Message---


Bug#386347: initscripts: BOOT FAILURE: checkroot.sh can't fsck /dev/shm/root because /dev/shm is mounted nodev

2006-09-06 Thread Chip Salzenberg
Package: initscripts
Version: 2.86.ds1-16
Severity: critical
Justification: breaks the whole system

The checkroot.sh init script sometimes needs to mknod the root filesystem
device as /dev/shm/root so it can fsck.  This worked fine, until the recent
change that mounts /dev/shm with the nodev option.  Now, any system that
fscks /dev/shm/root is unbootable.

I suppose the right fix is having checkroot.sh mount a new tmpfs as
/dev/check; mknod /dev/check/root; fsck /dev/check/root; umount /dev/check.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386194: marked as done (moinmoin-common: Internal Server Error after Python 2.4 upgrade using debian/testing)

2006-09-06 Thread Debian Bug Tracking System
Your message dated Thu, 7 Sep 2006 00:39:36 +0200
with message-id [EMAIL PROTECTED]
and subject line Bug#386194: moinmoin-common: Internal Server Error after 
Python 2.4 upgrade using debian/testing
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: moinmoin-common
Version: 1.5.3-1
Severity: grave
Justification: renders package unusable


Dear All,

My moinmoin is broken after upgrading my Debian testing.
I've forced installing the unstable version but nothing has been fixed.

When I access my internal server, I got the following message:

Internal Server Error

The server encountered an internal error or misconfiguration and was
unable to complete your request.

Please contact the server administrator, [EMAIL PROTECTED] and inform
them of the time the error occurred, and anything you might have done
that may have caused the error.

More information about this error may be available in the server error
log.
Apache/2.0.55 (Debian) DAV/2 SVN/1.3.2 Server at XXX.XXX. Port
80A

Any idea?

Thanks a lot,
D.


-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16.16McGuinness
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

moinmoin-common depends on no packages.

Versions of packages moinmoin-common recommends:
pn  python-moinmoin   none (no description available)

-- no debconf information

---End Message---
---BeginMessage---
On Wed, 06 Sep 2006 21:06:54 +0200 Didier Dubois wrote:

 I'm running 'testing'.
 When running reportbug, I was said there is a 'better' version in
 unstable and suggest to upgrade.
 
 I changed sources.list and and upgraded moinmoin-common.
 
 But still do not works.

Then this is not a bug but a misunderstanding: Upgrading to unstable
does not mean picking a single package but changing completely. In this
case you wouldn't succeed due to other bugs (already reported, and
the reason it was removed from testing).

Thanks for reporting this, nevertheless.


 - Jonas

-- 
* Jonas Smedegaard - idealist og Internet-arkitekt
* Tlf.: +45 40843136  Website: http://dr.jones.dk/

 - Enden er nær: http://www.shibumi.org/eoti.htm


pgp4itLAjIHYI.pgp
Description: PGP signature
---End Message---


Bug#386344: apt-proxy: APT-Proxy has Problems with ~ in package-names

2006-09-06 Thread Daniel 'DaB.' Baur
Package: apt-proxy
Version: 1.9.35
Severity: grave
Tags: security
Justification: renders package unusable

Apt-Proxy can not handle Package, which have the new ~ in there names.
A example is libkrb5-dev_1.4.4~beta1-1_i386.deb which gives a 404 file not 
found on
backend error. Please fix it, because it is unpossible to play in any
packages or security-updates.

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16.20
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages apt-proxy depends on:
ii  adduser   3.96   Add and remove users and groups
ii  bzip2 1.0.3-3high-quality block-sorting file co
ii  debconf [debconf-2.0] 1.5.3  Debian configuration management sy
ii  logrotate 3.7.1-3Log rotation utility
ii  python2.3.5-11   An interactive high-level object-o
ii  python-apt0.6.19 Python interface to libapt-pkg
ii  python-central0.5.5  register and build utility for Pyt
ii  python-twisted-web0.6.0-1An HTTP protocol implementation to

apt-proxy recommends no packages.

-- debconf information:
  apt-proxy/upgrading-v2:
  apt-proxy/upgrading-v2-result:


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#384758: Patch for RC bug 384758

2006-09-06 Thread Arjan Oosting
tags 384758 patch
usertag 384758 supplied-patch
thanks

Hi,

I have prepared a simple patch which fixes the FTBFS by replacing the
build dependency on lesstif-dev. It also fixes a typo in some debconf
script.

As I am not a DD yet, I can not do a NMU, but maybe some DD who comes
along can do the NMU.

Greetings Arjan Oosting

 
diff -u cmucl-19c-release-20051115/debian/changelog cmucl-19c-release-20051115/debian/changelog
--- cmucl-19c-release-20051115/debian/changelog
+++ cmucl-19c-release-20051115/debian/changelog
@@ -1,3 +1,12 @@
+cmucl (19c-release-20051115-2.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Update build dependency to lesstif2-dev (Closes: #384758)
+  * Fix typo in debian/config which fixes lintian error: E: cmucl:
+unknown-debconf-priority config:14 critital 
+
+ -- Arjan Oosting [EMAIL PROTECTED]  Thu,  7 Sep 2006 00:25:34 +0200
+
 cmucl (19c-release-20051115-2) unstable; urgency=low
 
   * Included upstream patch 001:
diff -u cmucl-19c-release-20051115/debian/control cmucl-19c-release-20051115/debian/control
--- cmucl-19c-release-20051115/debian/control
+++ cmucl-19c-release-20051115/debian/control
@@ -1,6 +1,6 @@
 Source: cmucl
 Section: devel
-Build-Depends: debhelper (= 4.1.16), lesstif-dev, tetex-extra, cmucl (= 19c-pre1-20051019-1), hevea, tidy, a2ps, x-dev, gcc-3.4, bc
+Build-Depends: debhelper (= 4.1.16), lesstif2-dev, tetex-extra, cmucl (= 19c-pre1-20051019-1), hevea, tidy, a2ps, x-dev, gcc-3.4, bc
 Priority: optional
 Maintainer: Peter Van Eynde [EMAIL PROTECTED]
 Standards-Version: 3.6.2.1
diff -u cmucl-19c-release-20051115/debian/config cmucl-19c-release-20051115/debian/config
--- cmucl-19c-release-20051115/debian/config
+++ cmucl-19c-release-20051115/debian/config
@@ -9,7 +9,7 @@
 configure|reconfigure)
 # do we need to warn?
 	if `grep -q common-lisp-controller.lisp /etc/common-lisp/cmucl/site-init.lisp /var/lib/cmucl/site-init.lisp 2 /dev/null`  ; then
-	db_input critital cmucl/upgradeproblems || true
+	db_input critical cmucl/upgradeproblems || true
 	fi
 
 	db_go || true


signature.asc
Description: Dit berichtdeel is digitaal ondertekend


Processed: Patch for RC bug 384758

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 384758 patch
Bug#384758: FTBFS: build-depends on removed package lesstif-dev
Tags were: etch sid
Tags added: patch

 usertag 384758 supplied-patch
Bug#384758: FTBFS: build-depends on removed package lesstif-dev
There were no usertags set.
Usertags are now: supplied-patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Patch for RC bugs 384309, 383266 and 340253

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tag 384309 patch
Bug#384309: dvipsk-ja: Restores admin-removed conffile
There were no tags set.
Tags added: patch

 usertag 384309 supplied-patch
Bug#384309: dvipsk-ja: Restores admin-removed conffile
There were no usertags set.
Usertags are now: supplied-patch.
 usertag 383266 supplied-patch
Bug#383266: dvipsk-ja: Couldn't find header file texnansi.enc
There were no usertags set.
Usertags are now: supplied-patch.
 usertag 340253 supplied-patch
Bug#340253: dvipsk-ja sets wrong path (TEXPSHEADERS.dvips)
There were no usertags set.
Usertags are now: supplied-patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#340253: Patch for RC bugs 384309, 383266 and 340253

2006-09-06 Thread Arjan Oosting
tag 384309 patch
usertag 384309 supplied-patch
usertag 383266 supplied-patch
usertag 340253 supplied-patch
thanks

Hi,

I have prepared an NMU which fixes RC bug 384309 and also included
Frank's patch for RC bugs 383266 and 340253. As I am not a DD yet I can
not upload this NMU myself so any interested DD is welcome to upload it
of course.

As this patch has to do with the handling of configuration files and
conffiles and it is the first time I have worked with those I urge any
uploader to really look at the patch before uploading. :)

I have tried upgrading, downgrading, removal and purge and it behaves
correctly.

Greetings Arjan


--- dvipsk-ja-5.95a+jp1.7a/debian/rules
+++ dvipsk-ja-5.95a+jp1.7a/debian/rules
@@ -109,6 +109,9 @@
 	install -m 644 $(CURDIR)/dvipsk/contrib/volker/duplong.cfg $(CURDIR)/debian/dvipsk-ja/etc/texmf/dvipsj/config.duplong
 	install -m 644 $(CURDIR)/dvipsk/contrib/volker/dupshort.cfg $(CURDIR)/debian/dvipsk-ja/etc/texmf/dvipsj/config.dupshort
 
+	# Install 70dvpsj.cnf conffile
+	install -D -m 644 $(CURDIR)/debian/70dvipsj.cnf $(CURDIR)/debian/dvipsk-ja/etc/texmf/texmf.d/70dvipsj.cnf
+
 # Build architecture-independent files here.
 binary-indep: build install
 # We have nothing to do by default.
--- dvipsk-ja-5.95a+jp1.7a/debian/changelog
+++ dvipsk-ja-5.95a+jp1.7a/debian/changelog
@@ -1,3 +1,17 @@
+dvipsk-ja (5.95a+jp1.7a-1.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Make /etc/texmf/texmf.d/70dvipsj.cnf a regular conffile (Closes:
+#384309):
+- debian/rules: install /etc/texmf/texmf.d/70dvipsj.cnf
+- debian/postinst: don't create 70dvipsj.cnf anymore.
+- debian/postrm: don't move 70dvipsj.cnf to a backup file anymore.o
+- debian/preinst: remove old 70dvipsj.cnf{.bak} configuration files.
+  * Fix 70dvipsj.cnf by applying patch from Frank KÃŒster. (Closes:
+#340253, #383266)
+  
+ -- Arjan Oosting [EMAIL PROTECTED]  Thu,  7 Sep 2006 01:32:09 +0200
+
 dvipsk-ja (5.95a+jp1.7a-1) unstable; urgency=low
 
   * New upstream release.
--- dvipsk-ja-5.95a+jp1.7a/debian/postinst
+++ dvipsk-ja-5.95a+jp1.7a/debian/postinst
@@ -26,16 +26,6 @@
 case $1 in
 configure)
 
-if [ ! -f /etc/texmf/texmf.d/70dvipsj.cnf ] ; then
-  cat  /etc/texmf/texmf.d/70dvipsj.cnf 'EOF'
-%
-% Japanized DviPS
-%
-TEXPSHEADERS.dvips = .;$TEXMF/{dvipsj,dvips,pdftex,tex,fonts/type1}//
-TEXCONFIG.dvips = .;$TEXMF/{dvipsj,dvips}//
-EOF
-fi
-
 update-texmf
 
 mktexlsr
--- dvipsk-ja-5.95a+jp1.7a/debian/postrm
+++ dvipsk-ja-5.95a+jp1.7a/debian/postrm
@@ -36,8 +36,6 @@
 
remove)
 
-   mv -f /etc/texmf/texmf.d/70dvipsj.cnf /etc/texmf/texmf.d/70dvipsj.bak 
-
dpkg-divert --package dvipsk-ja --remove --rename --divert \
  /usr/bin/dvips.nonja /usr/bin/dvips
dpkg-divert --package dvipsk-ja --remove --rename --divert \
--- dvipsk-ja-5.95a+jp1.7a/debian/preinst
+++ dvipsk-ja-5.95a+jp1.7a/debian/preinst
@@ -28,11 +28,21 @@
 rm -f /etc/texmf/texmf.d/70dvipsj
 rm -f /etc/texmf/texmf.d/70DviPSJ
 
-if [ ! -f /etc/texmf/texmf.d/70dvipsj ] ; then
-  if [ -f /etc/texmf/texmf.d/70dvipsj.bak ] ; then
-mv -f /etc/texmf/texmf.d/70dvipsj.bak /etc/texmf/texmf.d/70dvipsj.cnf
-  fi
-fi
+# Remove old configuration files. 
+# As those files are broken anyway (#383266) and we now provide
+# a CHANGED version as conffile we can remove these files.
+if [ -f /etc/texmf/texmf.d/70dvipsj.cnf ] ; then
+	MD5SUM=`md5sum /etc/texmf/texmf.d/70dvipsj.cnf | cut -f1 -d' '`
+	if [ $MD5SUM = 687e0d9d530ac17150a328e00ac97489 ] ; then
+	rm /etc/texmf/texmf.d/70dvipsj.cnf
+	fi
+fi
+if [ -f /etc/texmf/texmf.d/70dvipsj.cnf.bak ] ; then
+	MD5SUM=`md5sum /etc/texmf/texmf.d/70dvipsj.cnf.bak | cut -f1 -d' '`
+	if [ $MD5SUM = 687e0d9d530ac17150a328e00ac97489 ] ; then
+	rm /etc/texmf/texmf.d/70dvipsj.cnf.bak 
+	fi
+fi
 
 dpkg-divert --package dvipsk-ja --add --rename --divert \
   /usr/bin/dvips.nonja /usr/bin/dvips
--- dvipsk-ja-5.95a+jp1.7a.orig/debian/70dvipsj.cnf
+++ dvipsk-ja-5.95a+jp1.7a/debian/70dvipsj.cnf
@@ -0,0 +1,5 @@
+%
+% Japanized DviPS
+%
+TEXPSHEADERS.dvips = .;$TEXMF/{dvipsj,dvips,pdftex,tex,fonts/{enc,type1,type3}}//
+TEXCONFIG.dvips = .;$TEXMF/{dvipsj,dvips}//


signature.asc
Description: Dit berichtdeel is digitaal ondertekend


Bug#325292: Is this bug still alive?

2006-09-06 Thread Matej Cepl
Hi,

I am just upgrading testing and apt-listchanges shows me this bug 
as still alive. It is really weird, because apparently no KDE 
application was harmed when upgrading qt library. Is it still 
alive?

Matěj
-- 
23 Marion St. #3, Cambridge, MA 02141, (617) 876-1259 
http://matej.ceplovi.cz/blog/, map http://tinyurl.com/r2lfa
GPG Finger: 89EF 4BC6 288A BF43 1BAB  25C3 E09F EF25 D964 84AC
 
We can tell our level of faith in what God wants to do for us by
our level of enthusiasm for what we want God to do for other.
   -- Dave Schmelzer



Processed: block 385235 with 386222

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.9.20
 block 385235 with 386222
Bug#385235: gettext 0.15 causes build failures in multiple packages
Was blocked by: 385160 385161 385165 385177 385181 386072 386220
Blocking bugs of 385235 added: 386222


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#384818: dia-newcanvas: FTBFS: checking for headers required to compile python extensions... not found

2006-09-06 Thread Mohammed Adnène Trojette
On Sun, Aug 27, 2006, Aurelien Jarno wrote:
 Build-depending on python-dev instead of python2.3-dev should fix the problem.

It does fix the FTBFS, indeed (tried on my pbuilder+cowbuilder build).

-- 
adn
Mohammed Adnène Trojette



Bug#386337: mysql-server-5.0: crash on INSERT query

2006-09-06 Thread Christian Hammers


On 2006-09-06 Christoph Hohmann wrote:
 Package: mysql-server-5.0
 Version: 5.0.24a-3
 Severity: grave
 Justification: renders package unusable
 
 MySQL crashes every time doing the query below with the following log
 entry:

Can you provide a 
 SHOW CREATE TABLE ;
and the complete insert (if it was not in the output below)?

If the data is not private then the database files itself could 
be helpful, too. Can you reproduce the problem after creating a fresh new
table and inserting the relevant query there (maybe it's just a filesystem
corruption on this one table).

Please provide your /etc/mysql/my.cnf, too, in case it's a bug related to
charsets or special buffer sizes.

If you need help fast, consider asking the MySQL mailing list or
http://bugs.mysql.com/ for a fix, I can only pass the reports through to
mysql, not fix them :)

bye,

-christian-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: block 385235 with 386263

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.9.20
 block 385235 with 386263
Bug#385235: gettext 0.15 causes build failures in multiple packages
Was blocked by: 385160 385161 385165 385177 385181 386072 386220 386222
Blocking bugs of 385235 added: 386263


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: merging 386072 386263

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.9.20
 merge 386072 386263
Bug#386072: FTBFS: aclocal fails
Bug#386263: FTBFS: aclocal: macro `AM_PROG_MKDIR_P' required but not defined
Merged 386072 386263.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386361: binary blob in asterisk-classic package

2006-09-06 Thread Ron
Package: asterisk-classic
Version: 1:1.2.11.dfsg-1
Severity: serious
Justification: non-free software in main

Hi,

I just ran into /usr/share/asterisk/firmware/iax/iaxy.bin
which appears to be a binary firmware blob without source.

If we are going to distribute this, we really should get
it out of main before the release.

Cheers,
Ron


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: New problems in same package

2006-09-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 382419 serious
Bug#382419: vnc4: FTBFS on amd64: # error do_div() does not yet support the C64
Severity set to `serious' from `important'

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#384667: marked as done (FTBFS on architectures lacking TLS support)

2006-09-06 Thread Debian Bug Tracking System
Your message dated Wed, 06 Sep 2006 22:32:06 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#384667: fixed in libselinux 1.30.27-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: libselinux
Version: 1.30.26-2
Severity: grave
Tags: upstream

libselinux1 currently fails to build on arm, m68k, hppa and mips*
because the version of gcc/binutils currently in etch does not support
TLS.
This is keeping udev, cron and other important packages out from testing.


From #selinux:

Md does the latest libselinux *really* depend on TLS? now it's broken on 
 mips*, arm, m68k and hppa
[...]
PeBenito|work looks like that has been in there since june 26
dwalsh Should be ifdef'd around I guess
PeBenito|work dwalsh: why are those needed?
Md dwalsh: can you confirm that __thread can be safely removed on 
 architectures not supporting TLS?
dwalsh myflags was needed as a global to maintain flags over multiple calls 
 of matchpatchon functions as I recall.
Md also four prev_t2r_* variables in setrans_client.c
dwalsh They are not thread safe, so making it __threads made them thread 
 local variables.
dwalsh Do these other platforms have the concept of thread local variable or 
 do you need to wrap them in semaphores?
Md is this an implementation detail which changed or did it fix a bug which 
 has always been present?
dwalsh They were done to speed things up.
Md dwalsh: at least some have it in trunk gcc/binutils, but it will not be 
 available in time for the next debian release, which is half frozen
PeBenito|work if its not safe w/o TLS, and not all archs have TLS, it seems 
like the design needs to be rethought :x
dwalsh As I recall in translations, if you translate the same context over 
 and over again for example ls -lZ /etc you can save lots of processing
Md (does anybody mind if I will attach this log to the debian bug report?)
PeBenito|work Md: this is a public channel
PeBenito|work Md: you should still send an email to the selinux list, 
referencing the bug

-- 
ciao,
Marco


signature.asc
Description: Digital signature
---End Message---
---BeginMessage---
Source: libselinux
Source-Version: 1.30.27-1

We believe that the bug you reported is fixed in the latest version of
libselinux, which is due to be installed in the Debian FTP archive:

libselinux1-dev_1.30.27-1_i386.deb
  to pool/main/libs/libselinux/libselinux1-dev_1.30.27-1_i386.deb
libselinux1_1.30.27-1_i386.deb
  to pool/main/libs/libselinux/libselinux1_1.30.27-1_i386.deb
libselinux_1.30.27-1.diff.gz
  to pool/main/libs/libselinux/libselinux_1.30.27-1.diff.gz
libselinux_1.30.27-1.dsc
  to pool/main/libs/libselinux/libselinux_1.30.27-1.dsc
libselinux_1.30.27.orig.tar.gz
  to pool/main/libs/libselinux/libselinux_1.30.27.orig.tar.gz
python-selinux_1.30.27-1_i386.deb
  to pool/main/libs/libselinux/python-selinux_1.30.27-1_i386.deb
selinux-utils_1.30.27-1_i386.deb
  to pool/main/libs/libselinux/selinux-utils_1.30.27-1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Manoj Srivastava [EMAIL PROTECTED] (supplier of updated libselinux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed,  6 Sep 2006 23:55:37 -0500
Source: libselinux
Binary: libselinux1-dev selinux-utils libselinux1 python-selinux
Architecture: source i386
Version: 1.30.27-1
Distribution: unstable
Urgency: low
Maintainer: Manoj Srivastava [EMAIL PROTECTED]
Changed-By: Manoj Srivastava [EMAIL PROTECTED]
Description: 
 libselinux1 - SELinux shared libraries
 libselinux1-dev - SELinux development headers
 python-selinux - Python bindings to SELinux shared libraries
 selinux-utils - SELinux utility programs
Closes: 384667 385099
Changes: 
 libselinux (1.30.27-1) unstable; urgency=low
 .
   * New upstream point release
  * Merged patch to not log avc stats upon a reset from Steve Grubb.
  * Applied patch to revert compat_net setting upon policy load.
   * Provide md5sums
   * Bug fix: FTBFS on architectures lacking TLS support, thanks to Marco