Bug#410498: ntop: after recent upgrade can't login: SSL expired certificate?

2007-02-11 Thread Steve Langasek
severity 410498 normal
thanks

On Sun, Feb 11, 2007 at 02:22:09AM -0500, Yaroslav Halchenko wrote:
 Since I suspect that the cause is in SSL error mentioned below, and
 since shipped certificate is the one used on all the systems and no
 directions are given that it has to be replaced for ntop to
 function properly, I raised severity to grave.

No, this is not grave.  You shouldn't be depending on a package-provided
private key for any SSL operations anyway, because it provides no real
security when anyone else with a copy of the package can decrypt your web
traffic.

So by all rights, the fact that this certificate is broken should be
considered a feature, not a bug.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410501: destar: Conf files are not saved if there's not writing access to zaptel.conf

2007-02-11 Thread Alejandro Rios P.
Package: destar
Version: 0.2.0-3
Severity: grave
Tags: patch
Justification: renders package unusable

There was a bad conditional expresion on one dpatch file edited on last
package upload. Here's the fix to the bug:

--- zaptel.dpatch   2007-02-11 00:05:55.0 -0500
+++ zaptel.dpatch.patch 2007-02-11 01:59:41.0 -0500
@@ -12,7 +12,7 @@
for _fn,cnf in configlets.asterisk_configfiles:
if _fn == 'op_server.cfg' and panelutils.isConfigured() != 1:
continue
-+  if not os.access(/etc/zaptel.conf, os.O_RDWR):
++  if _fn == 'zaptel.conf' and not os.access(/etc/zaptel.conf, 
os.O_RDWR):
 +  continue
try:
cnf.write()




-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-686
Locale: LANG=es_CO.UTF-8, LC_CTYPE=es_CO.UTF-8 (charmap=UTF-8)

Versions of packages destar depends on:
ii  asterisk 1:1.2.14~dfsg-4 Open Source Private Branch Exchang
ii  python   2.4.4-2 An interactive high-level object-o
ii  python-medusa0.5.4+clean-1   Framework for implementing asynchr
ii  python-pychart   1.39-5  Python library for creating high q
ii  python-pysqlite2 2.3.2-2 python interface to SQLite 3
ii  python-quixote1  1.2-4   A highly Pythonic Web application 
ii  sqlite3  3.3.8-1 A command line interface for SQLit

Versions of packages destar recommends:
ii  op-panel 0.26.dfsg-5 switchboard type application for t

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#410498: ntop: after recent upgrade can't login: SSL expired certificate?

2007-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 410498 normal
Bug#410498: ntop: after recent upgrade can't login: SSL expired certificate?
Severity set to `normal' from `grave'

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410094: Bug#410079: hyphenation patterns distributed without license and copyright

2007-02-11 Thread Steve Langasek
severity 410079 important
severity 410093 important
severity 410094 important
thanks

On Wed, Feb 07, 2007 at 04:09:47PM +0100, Matthias Klose wrote:
 Many hyphenation patterns are distributed without copyright and
 license information. It seems that most patterns are copied from the
 Openoffice.org sources, where these files are now removed.

As far as I'm aware, hyphenation rules for a language contain no significant
creative element and as such are not subject to copyright.  It's fine to
credit the folks responsible for compiling these hyphenation rules into a
usable form, and to respect their wishes regarding the use of those rules,
but I don't see anything here that would warrant removing packages from a
release.

Thanks,
-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#376812: If no progress, please let vlc know

2007-02-11 Thread Philippe Cloutier
Aside from supporting Kurt's request for a status update, I would like 
Guillem to take note that vlc maintainers should be informed if you 
don't expect to be able to fix this bug in time for Etch, due to 
vlc-plugin-glide.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410199: rawdog: Critical UnicodeDecodeError while writing.

2007-02-11 Thread Steve Langasek
severity 410199 important
thanks

On Thu, Feb 08, 2007 at 05:31:05PM +0300, Eugene Oleinik wrote:
 Package: rawdog
 Version: 2.10.dfsg.1-1
 Severity: grave

 I'm encountering a critical error while trying to update and write
 news with rawdog.

I'm sorry that rawdog isn't working for you.  This bug doesn't make the
package unusable for everyone, though; ascii-only RSS is a common case, and
I don't think this package should be excluded from the release for not
handling non-ASCII characters, so I'm downgrading this bug.

A fix would certainly be accepted into etch for this if made available.

Cheers,
-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#410199: rawdog: Critical UnicodeDecodeError while writing.

2007-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 410199 important
Bug#410199: rawdog: Critical UnicodeDecodeError while writing.
Severity set to `important' from `grave'

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#409308: marked as done (casper should depend on 'file')

2007-02-11 Thread Debian Bug Tracking System
Your message dated Sun, 11 Feb 2007 09:17:03 +
with message-id [EMAIL PROTECTED]
and subject line Bug#409308: fixed in casper 1.77+debian-7
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: casper
Version: 1.79+debian-1
Severity: serious

/etc/rc0.d/S89casper attempts to use the 'file' command, but 'file' is
not required by the package.



---End Message---
---BeginMessage---
Source: casper
Source-Version: 1.77+debian-7

We believe that the bug you reported is fixed in the latest version of
casper, which is due to be installed in the Debian FTP archive:

casper_1.77+debian-7.diff.gz
  to pool/main/c/casper/casper_1.77+debian-7.diff.gz
casper_1.77+debian-7.dsc
  to pool/main/c/casper/casper_1.77+debian-7.dsc
casper_1.77+debian-7_i386.deb
  to pool/main/c/casper/casper_1.77+debian-7_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Marco Amadori [EMAIL PROTECTED] (supplier of updated casper package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu,  8 Feb 2007 11:19:46 +0100
Source: casper
Binary: casper
Architecture: source i386
Version: 1.77+debian-7
Distribution: testing
Urgency: medium
Maintainer: Debian Live debian-live-devel@lists.alioth.debian.org
Changed-By: Marco Amadori [EMAIL PROTECTED]
Description: 
 casper - Debian Live initramfs generator
Closes: 409308
Changes: 
 casper (1.77+debian-7) testing; urgency=medium
 .
   * Backported two 1 line fixes (both serious bugs) from casper-1.79+debian-1
 and casper-1.79+debian-3:
 - It now depends also on file (Closes: #409308).
 - Fix DEFCONSOLE for autoserial console, thanks to
 Alex Owen [EMAIL PROTECTED].
Files: 
 6ff1086a52eac33db035d39d15929beb 693 misc extra casper_1.77+debian-7.dsc
 2bb5ce09773581f6e8899f01bcdc5bd2 38865 misc extra casper_1.77+debian-7.diff.gz
 82292e5cc0e740bc938ad599241adbd0 49992 misc extra casper_1.77+debian-7_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFywAb+C5cwEsrK54RAkHlAJ0ZIns/pHaOcuu8scdT9wqEhDIKiwCgyfy8
m/48+2XdcytsxV3ZNOl4i18=
=4Pu9
-END PGP SIGNATURE-

---End Message---


Bug#410093: Bug#410079: hyphenation patterns distributed without license and copyright

2007-02-11 Thread Oleksandr Moskalenko
* Steve Langasek [EMAIL PROTECTED] [2007-02-11 00:37:31 -0800]:

 severity 410079 important
 severity 410093 important
 severity 410094 important
 thanks
 
 On Wed, Feb 07, 2007 at 04:09:47PM +0100, Matthias Klose wrote:
  Many hyphenation patterns are distributed without copyright and
  license information. It seems that most patterns are copied from the
  Openoffice.org sources, where these files are now removed.
 
 As far as I'm aware, hyphenation rules for a language contain no significant
 creative element and as such are not subject to copyright.  It's fine to
 credit the folks responsible for compiling these hyphenation rules into a
 usable form, and to respect their wishes regarding the use of those rules,
 but I don't see anything here that would warrant removing packages from a
 release.
 
 Thanks,
 -- 
 Steve Langasek   Give me a lever long enough and a Free OS
 Debian Developer   to set it on, and I can move the world.
 [EMAIL PROTECTED]   http://www.debian.org/

Steve,

I've forwarded Matthias's report upstream and as far as the relevant folks
have been able to check those files are dfsg-free and the only problem seems
to be the wording in the readme files. All word list files were originally
taken from the openoffice distribution and those that differ from the oo have
licensing information. Thank you for stepping in and saying a word about the
RC status. I will finish pulling info from upstream to adjust the copyright
statement, but I also believe that this issue is not release-critical.

Regards,

Alex.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410507: pike7.7_7.7.24-1(experimental/amd64/xenophanes): Depends on non-existing package libmysqlclient10-dev

2007-02-11 Thread Marc 'HE' Brockschmidt
Package: pike7.7
Version: 7.7.24-1
Severity: serious
Tags: experimental

Heya,

Trying to build the version of pike7.7 shows this:

Automatic build of pike7.7_7.7.24-1 on xenophanes by sbuild/amd64 98-farm
Build started at 20070207-1830
**
Checking available source versions...
Fetching source files...
Reading Package Lists...
Building Dependency Tree...
Need to get 19.7MB of source archives.
Get:1 http://sinclair.farm.ftbfs.de experimental/main pike7.7 7.7.24-1 (dsc) 
[1547B]
Get:2 http://sinclair.farm.ftbfs.de experimental/main pike7.7 7.7.24-1 (tar) 
[19.6MB]
Get:3 http://sinclair.farm.ftbfs.de experimental/main pike7.7 7.7.24-1 (diff) 
[25.6kB]
Fetched 19.7MB in 0s (26.6MB/s)
Download complete and in download only mode
** Using build dependencies supplied by package:
Build-Depends: debhelper ( 4.0.0), libgdbm-dev, libgmp3-dev, libz-dev, 
libjpeg-dev, libttf-dev, libmysqlclient10-dev, libreadline-dev, perl, bison, 
debhelper, freeglut3-dev (= 2.2.0-6.1) [alpha hppa] | libglut3-dev, 
freeglut3-dev [!alpha !hppa] | libglut3-dev, xlibmesa-glu-dev | libglu-dev, 
xlibmesa-gl-dev | libgl-dev, libxpm-dev, gnome-devel, libgtkxmhtml-dev, 
libfreetype6-dev, autoconf, libiodbc2-dev, libsane-dev, postgresql-dev, 
librsvg2-dev, libsdl-mixer1.2-dev, libsdl1.2-dev, libperl-dev, sharutils, 
libpng3-dev, gtkglarea5-dev, libtiff4-dev,  bc, libpcre3-dev, libbz2-dev, 
libnettle-dev, libsqlite3-dev, libfuse-dev, libglade0-dev, fftw3-dev, pkg-config

Please either remove the libmysqlclient10-dev build-dep (and use 15
instead) or remove it from the archive.

Thanks,
Marc
-- 
Fachbegriffe der Informatik - Einfach erklärt
23: Codefreeze
   Linux Kernel Patch v1.3, patch-1.3.94 (00/55) (Kristian Köhntopp)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410497: sparc32 kernel is too big, fails to boot

2007-02-11 Thread Bastian Blank
On Sat, Feb 10, 2007 at 10:54:15PM -0800, Jurij Smakov wrote:
 The config variable CONFIG_DEBUG_FS, enabled recently for all kernel 
 flavours adds over 400K to the size of the compressed image size on 
 sparc32. As a result, it does not boot anymore (uncompressed image 
 does not fit into the allotted space).

The change was commited one month ago and we had test builds since this.
You said yourself that it changes the abi so it now up to you to decide
what to do:
- Remove it and don't support sparc32 with this etch kernel.
- Change the abi without the abiname.

Bastian

-- 
Leave bigotry in your quarters; there's no room for it on the bridge.
-- Kirk, Balance of Terror, stardate 1709.2


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: tagging bugs that are closed by packages in NEW as pending

2007-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # the following bugs are closed by packages in NEW
 #
 tags 296840 pending
Bug#296840: armagetron server DOS by fake players (CAN-2005-0371)
Tags were: security
Tags added: pending

 tags 311736 pending
Bug#311736: armagetron: Grammar error
Tags were: fixed
Tags added: pending

 tags 312905 pending
Bug#312905: armagetron: no hints in menu file
There were no tags set.
Tags added: pending

 tags 318998 pending
Bug#318998: FTBFS: C++ errors
Tags were: fixed patch
Tags added: pending

 tags 325101 pending
Bug#325101: armagetron: New upstream version available
There were no tags set.
Tags added: pending

 tags 325110 pending
Bug#325110: armagetron: NMU to fix C++ ABI issue and a few others
There were no tags set.
Tags added: pending

 tags 379062 pending
Bug#379062: armagetron: CVE-2006-3673 and CVE-2006-3674: remote denial of 
service
Tags were: security
Tags added: pending

 tags 410021 pending
Bug#410021: ITP: gkrelltop -- Plugin for gkrellm to display the top three 
intensive processes
There were no tags set.
Tags added: pending

 tags 410502 pending
Bug#410502: ITP: libcm -- Support code for compositing managers
There were no tags set.
Tags added: pending

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Bug#374355: linux-sound-base: apparent missing dependency on module-init-tools

2007-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 374355 serious
Bug#374355: linux-sound-base: apparent missing dependency on module-init-tools
Severity set to `serious' from `normal'

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: r622 - in pear/php-xml-util/trunk: . XML_Util-1.1.1 debian

2007-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 318484 pending
Bug#318484: ITP: php-xml-util -- module PEAR with XML utility
There were no tags set.
Tags added: pending

 tags 359627 pending
Bug#359627: php-xml-util: Conflicts with php-pear package
There were no tags set.
Tags added: pending

 tags 375566 pending
Bug#375566: php-xml-util doesn't add Util.php needed by php-xml-serializer
There were no tags set.
Tags added: pending

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: r617 - in pear/php-net-checkip/trunk: . debian

2007-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 329661 pending
Bug#329661: ITP: php-net-checkip -- check the syntax of IPv4 addresses
There were no tags set.
Tags added: pending

 tags 332614 pending
Bug#332614: 'please update the license text'
There were no tags set.
Tags added: pending

 tags 337898 pending
Bug#337898: php-net-checkip: debian/copyright is missing a copy of the license
There were no tags set.
Tags added: pending

 tags 354353 pending
Bug#354353: php-net-checkip: FTBFS: no available versions of package php-pear 
can satisfy version requirements
Tags were: patch
Tags added: pending

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410531: gpe-calendar: Failed to open files in /usr/share/pixmaps/

2007-02-11 Thread Mykola A. Nickishov
Package: gpe-calendar
Version: 0.72-1
Severity: grave
Justification: renders package unusable

[EMAIL PROTECTED]:~$ LANG=C gpe-calendar 
GPE-ERROR: Failed to open file '/usr/share/pixmaps//day_view.png': No such file 
or directory
GPE-ERROR: Failed to open file '/usr/share/pixmaps//week_view.png': No such 
file or directory
GPE-ERROR: Failed to open file '/usr/share/pixmaps//month_view.png': No such 
file or directory
GPE-ERROR: Failed to open file '/usr/share/pixmaps//bell.png': No such file or 
directory
GPE-ERROR: Failed to open file '/usr/share/pixmaps//recur.png': No such file or 
directory
GPE-ERROR: Failed to open file '/usr/share/pixmaps//bell_recur.png': No such 
file or directory

Installed with 'aptitude -t experimental install gpe-calendar'

-- System Information:
Debian Release: 4.0
  APT prefers testing
  APT policy: (990, 'testing'), (99, 'unstable'), (9, 'experimental'), (1, 
'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-xen-k7
Locale: LANG=uk_UA.UTF-8, LC_CTYPE=uk_UA.UTF-8 (charmap=UTF-8)

Versions of packages gpe-calendar depends on:
ii  libatk1.0-0  1.12.4-1The ATK accessibility toolkit
ii  libc62.5-0exp3   GNU C Library: Shared libraries
ii  libcairo21.2.6-1 The Cairo 2D vector graphics libra
ii  libdbus-1-3  1.0.2-1 simple interprocess messaging syst
ii  libdbus-glib-1-2 0.72-4  simple interprocess messaging syst
ii  libeventdb0  0.21-1  library that provides access to gp
ii  libfontconfig1   2.4.2-1 generic font configuration library
ii  libglib2.0-0 2.12.9-2The GLib library of C routines
ii  libgpepimc0  0.6-1   category management for GPE applic
ii  libgpeschedule0  0.16-2  scheduling library for GPE
ii  libgpevtype0 0.16-2  data interchange library for GPE a
ii  libgpewidget10.114-2 GPE Palmtop Environment widget lib
ii  libgtk2.0-0  2.10.7-1The GTK+ graphical user interface 
ii  libmimedir-gnome0.3  0.3.1-1 MIME Directory Profile implementat
ii  libpango1.0-01.14.8-5Layout and rendering of internatio
ii  libsqlite0   2.8.17-2SQLite shared library
ii  libx11-6 2:1.1.1-1   X11 client-side library
ii  libxcursor1  1.1.7-4 X cursor management library
ii  libxext6 1:1.0.3-1   X11 miscellaneous extension librar
ii  libxfixes3   1:4.0.1-5   X11 miscellaneous 'fixes' extensio
ii  libxi6   1:1.1.0-1   X11 Input extension library
ii  libxinerama1 1:1.0.1-4.1 X11 Xinerama extension library
ii  libxrandr2   2:1.1.0.2-5 X11 RandR extension library
ii  libxrender1  1:0.9.1-3   X Rendering Extension client libra
ii  libxsettings-client0 0.17-1  utility functions for the Xsetting

gpe-calendar recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410531: gpe-calendar: Failed to open files in /usr/share/pixmaps/

2007-02-11 Thread Neil Williams
On Sun, 11 Feb 2007 16:02:32 +0200
Mykola A. Nickishov [EMAIL PROTECTED] wrote:

 Package: gpe-calendar
 Version: 0.72-1

 [EMAIL PROTECTED]:~$ LANG=C gpe-calendar
 GPE-ERROR: Failed to open file '/usr/share/pixmaps//day_view.png': No such 
 file or directory
 GPE-ERROR: Failed to open file '/usr/share/pixmaps//week_view.png': No such 
 file or directory
 GPE-ERROR: Failed to open file '/usr/share/pixmaps//month_view.png': No such 
 file or directory
 GPE-ERROR: Failed to open file '/usr/share/pixmaps//bell.png': No such file 
 or directory
 GPE-ERROR: Failed to open file '/usr/share/pixmaps//recur.png': No such file 
 or directory
 GPE-ERROR: Failed to open file '/usr/share/pixmaps//bell_recur.png': No such 
 file or directory

Those are part of gpe-icons - I'm testing v0.72-3 now but could you
check to see if installing gpe-icons from unstable fixes these reports?

Thanks.

--


Neil Williams
=
http://www.data-freedom.org/
http://www.nosoftwarepatents.com/
http://www.linux.codehelp.co.uk/



pgpULlnzPLue6.pgp
Description: PGP signature


Bug#410538: xine-lib_1.1.4-2(sparc/experimental): FTBFS: ffmpeg_config.h: No such file or directory

2007-02-11 Thread Frank Lichtenheld
Package: xine-lib
Version: 1.1.4-2
Severity: serious

Hi,

your package failed to build from source on sparc in experimental. The
error seems to be specific to this architecture, since it build
successfully on all other architectures. Note that adding -I../..
to the commandline of the failing command lets it succeed.

| Automatic build of xine-lib_1.1.4-2 on odin by sbuild/sparc 98-farm
| Build started at 20070211-1506
| **
| Checking available source versions...
| Fetching source files...
| Reading Package Lists...
| Building Dependency Tree...
| Need to get 8623kB of source archives.
| Get:1 http://ftp.de.debian.org experimental/main xine-lib 1.1.4-2 (dsc) 
[1200B]
| Get:2 http://ftp.de.debian.org experimental/main xine-lib 1.1.4-2 (tar) 
[8604kB]
| Get:3 http://ftp.de.debian.org experimental/main xine-lib 1.1.4-2 (diff) 
[17.7kB]
| Fetched 8623kB in 7s (1086kB/s)
| Download complete and in download only mode
| ** Using build dependencies supplied by package:
| Build-Depends: debhelper (= 5.0.1), binutils (= 2.12.90.0.9), pkg-config, 
libxinerama-dev, libxv-dev, libxvmc-dev, libxt-dev, libasound2-dev 
[!kfreebsd-i386 !kfreebsd-amd64 !hurd-i386], libaa1-dev, libcaca-dev, 
libmodplug-dev, libmagick9-dev, libpng12-dev, libfreetype6-dev, libogg-dev, 
libvorbis-dev, libtheora-dev, libesd0-dev, libgnomevfs2-dev, zlib1g-dev, 
libartsc0-dev, liblircclient-dev, libflac-dev, libpulse-dev, libsdl1.2-dev, 
libsmbclient-dev, libspeex-dev, libmng-dev, libmad0-dev, libcdio-dev (= 
0.76-1), w3m, transfig, gs, sgmltools-lite
|  Warning:
|  The following central src deps are (probably) missing:
|   slang1-dev, xlibs-dev ( 4.1.0)
| Checking for already installed source dependencies...
| debhelper: missing
| Using default version 5.0.42
| binutils: already installed (2.17.20070103cvs-2 = 2.12.90.0.9 is satisfied)
| pkg-config: missing
| libxinerama-dev: missing
| libxv-dev: missing
| libxvmc-dev: missing
| libxt-dev: missing
| libasound2-dev: missing
| libaa1-dev: missing
| libcaca-dev: missing
| libmodplug-dev: missing
| libmagick9-dev: missing
| libpng12-dev: missing
| libfreetype6-dev: missing
| libogg-dev: missing
| libvorbis-dev: missing
| libtheora-dev: missing
| libesd0-dev: missing
| libgnomevfs2-dev: missing
| zlib1g-dev: missing
| libartsc0-dev: missing
| liblircclient-dev: missing
| libflac-dev: missing
| libpulse-dev: missing
| libsdl1.2-dev: missing
| libsmbclient-dev: missing
| libspeex-dev: missing
| libmng-dev: missing
| libmad0-dev: missing
| libcdio-dev: missing
| Using default version 0.76-1
| w3m: missing
| transfig: missing
| gs: missing
| sgmltools-lite: missing
| Checking for source dependency conflicts...
[...]
|  gcc -DHAVE_CONFIG_H -I. -I. -I../../../.. -I../../../.. 
-I../../../../include -I../../../../include -I../../../../src 
-I../../../../src/xine-engine -I../../../../src/xine-engine 
-I../../../../src/xine-utils -I../../../../src/input -I../../../../src/input 
-I../../../../lib -I../../../../lib -DHAVE_AV_CONFIG_H -DRUNTIME_CPUDETECT 
-DXINE_MPEG_ENCODER -D_ISOC9X_SOURCE -DCONFIG_DECODERS 
-I../../../../src/libffmpeg/libavutil -fno-strict-aliasing -DNDEBUG 
-D_REENTRANT -D_FILE_OFFSET_BITS=64 -DXINE_COMPILE -O3 -finline-functions -Wall 
-Wnested-externs -Wcast-align -Wchar-subscripts -Wmissing-declarations 
-Wmissing-prototypes -g -mcpu=v9 -Wformat=2 -Wno-format-zero-length 
-Wmissing-format-attribute -Wstrict-aliasing=2 -MT dsputil_vis.lo -MD -MP -MF 
.deps/dsputil_vis.Tpo -c dsputil_vis.c  -fPIC -DPIC -o .libs/dsputil_vis.o
| In file included from ../dsputil.h:33,
|  from dsputil_vis.c:34:
| ../../../../src/libffmpeg/libavutil/common.h:368:27: error: ffmpeg_config.h: 
No such file or directory
| make[6]: *** [dsputil_vis.lo] Error 1
| make[6]: Leaving directory 
`/build/buildd/xine-lib-1.1.4/src/libffmpeg/libavcodec/sparc'
| make[5]: Leaving directory 
`/build/buildd/xine-lib-1.1.4/src/libffmpeg/libavcodec'
| make[4]: *** [all-recursive] Error 1
| make[4]: Leaving directory `/build/buildd/xine-lib-1.1.4/src/libffmpeg'
| make[3]: *** [all-recursive] Error 1
| make[3]: Leaving directory `/build/buildd/xine-lib-1.1.4/src'
| make[2]: *** [all-recursive] Error 1
| make[2]: Leaving directory `/build/buildd/xine-lib-1.1.4'
| make[1]: *** [all] Error 2
| make[1]: Leaving directory `/build/buildd/xine-lib-1.1.4'
| make: *** [build-stamp] Error 2
| **
| Build finished at 20070211-1529
| FAILED [dpkg-buildpackage died]

Full build log(s): 
http://experimental.ftbfs.de/build.php?ver=1.1.4-2pkg=xine-libarch=sparc

Gruesse,
-- 
Frank Lichtenheld [EMAIL PROTECTED]
www: http://www.djpig.de/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410537: FTBFS (alpha): XmlUniformiserTest::testAssertXmlEqual fails

2007-02-11 Thread Falk Hueffner
Package: cppunit
Version: 1.12.0-2
Severity: serious
Justification: no longer builds from source

cppunit fails to build on Alpha:
[...]
XmlUniformiserTest::testElementWithContent : OK
XmlUniformiserTest::testElementsHierarchyWithContents : OK
XmlUniformiserTest::testAssertXmlEqual/bin/sh: line 4:  3601 Aborted
 (core dumped) ${dir}$tst
FAIL: cppunittestmain
===
1 of 1 tests failed
===
make[4]: *** [check-TESTS] Error 1
make[4]: Leaving directory `/home/falk/cppunit-1.12.0/examples/cppunittest'

Full log at
http://buildd.debian.org/fetch.cgi?pkg=cppunitarch=alphaver=1.12.0-2stamp=1169836270

Falk


-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: alpha
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.20
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410531: gpe-calendar: Failed to open files in /usr/share/pixmaps/

2007-02-11 Thread Mykola Nikishov
On Sun, Feb 11, 2007 at 02:49:18PM +, Neil Williams wrote:
 
 Those are part of gpe-icons - I'm testing v0.72-3 now but could you
 check to see if installing gpe-icons from unstable fixes these reports?

Yes, with gpe-icons problem goes away.

-- 
MAN-UANIC


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410531: marked as done (gpe-calendar: Failed to open files in /usr/share/pixmaps/)

2007-02-11 Thread Debian Bug Tracking System
Your message dated Sun, 11 Feb 2007 16:17:03 +
with message-id [EMAIL PROTECTED]
and subject line Bug#410531: fixed in gpe-calendar 0.72-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: gpe-calendar
Version: 0.72-1
Severity: grave
Justification: renders package unusable

[EMAIL PROTECTED]:~$ LANG=C gpe-calendar 
GPE-ERROR: Failed to open file '/usr/share/pixmaps//day_view.png': No such file 
or directory
GPE-ERROR: Failed to open file '/usr/share/pixmaps//week_view.png': No such 
file or directory
GPE-ERROR: Failed to open file '/usr/share/pixmaps//month_view.png': No such 
file or directory
GPE-ERROR: Failed to open file '/usr/share/pixmaps//bell.png': No such file or 
directory
GPE-ERROR: Failed to open file '/usr/share/pixmaps//recur.png': No such file or 
directory
GPE-ERROR: Failed to open file '/usr/share/pixmaps//bell_recur.png': No such 
file or directory

Installed with 'aptitude -t experimental install gpe-calendar'

-- System Information:
Debian Release: 4.0
  APT prefers testing
  APT policy: (990, 'testing'), (99, 'unstable'), (9, 'experimental'), (1, 
'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-xen-k7
Locale: LANG=uk_UA.UTF-8, LC_CTYPE=uk_UA.UTF-8 (charmap=UTF-8)

Versions of packages gpe-calendar depends on:
ii  libatk1.0-0  1.12.4-1The ATK accessibility toolkit
ii  libc62.5-0exp3   GNU C Library: Shared libraries
ii  libcairo21.2.6-1 The Cairo 2D vector graphics libra
ii  libdbus-1-3  1.0.2-1 simple interprocess messaging syst
ii  libdbus-glib-1-2 0.72-4  simple interprocess messaging syst
ii  libeventdb0  0.21-1  library that provides access to gp
ii  libfontconfig1   2.4.2-1 generic font configuration library
ii  libglib2.0-0 2.12.9-2The GLib library of C routines
ii  libgpepimc0  0.6-1   category management for GPE applic
ii  libgpeschedule0  0.16-2  scheduling library for GPE
ii  libgpevtype0 0.16-2  data interchange library for GPE a
ii  libgpewidget10.114-2 GPE Palmtop Environment widget lib
ii  libgtk2.0-0  2.10.7-1The GTK+ graphical user interface 
ii  libmimedir-gnome0.3  0.3.1-1 MIME Directory Profile implementat
ii  libpango1.0-01.14.8-5Layout and rendering of internatio
ii  libsqlite0   2.8.17-2SQLite shared library
ii  libx11-6 2:1.1.1-1   X11 client-side library
ii  libxcursor1  1.1.7-4 X cursor management library
ii  libxext6 1:1.0.3-1   X11 miscellaneous extension librar
ii  libxfixes3   1:4.0.1-5   X11 miscellaneous 'fixes' extensio
ii  libxi6   1:1.1.0-1   X11 Input extension library
ii  libxinerama1 1:1.0.1-4.1 X11 Xinerama extension library
ii  libxrandr2   2:1.1.0.2-5 X11 RandR extension library
ii  libxrender1  1:0.9.1-3   X Rendering Extension client libra
ii  libxsettings-client0 0.17-1  utility functions for the Xsetting

gpe-calendar recommends no packages.

-- no debconf information

---End Message---
---BeginMessage---
Source: gpe-calendar
Source-Version: 0.72-3

We believe that the bug you reported is fixed in the latest version of
gpe-calendar, which is due to be installed in the Debian FTP archive:

gpe-calendar_0.72-3.diff.gz
  to pool/main/g/gpe-calendar/gpe-calendar_0.72-3.diff.gz
gpe-calendar_0.72-3.dsc
  to pool/main/g/gpe-calendar/gpe-calendar_0.72-3.dsc
gpe-calendar_0.72-3_amd64.deb
  to pool/main/g/gpe-calendar/gpe-calendar_0.72-3_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Neil Williams [EMAIL PROTECTED] (supplier of updated gpe-calendar package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sun, 11 Feb 2007 14:45:23 +
Source: gpe-calendar
Binary: gpe-calendar
Architecture: 

Bug#389579: marked as done (libapache-mod-auth-mysql: FTBFS against apache 2.2)

2007-02-11 Thread Debian Bug Tracking System
Your message dated Sun, 11 Feb 2007 16:17:05 +
with message-id [EMAIL PROTECTED]
and subject line Bug#389579: fixed in libapache-mod-auth-mysql 4.3.9-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---

Package: libapache-mod-auth-mysql
Version: 4.3.9-2.1
Tags: patch

Please update and test this package for use with Apache 2.2, which may
go into sid and etch soon.  The following patch may help.  It allows
the package to compile, but I did not test runtime functionality.
Apache 2.2 is currently in experimental.

Note that the authz / authn interface in Apache 2.2 has been updated
somewhat, so the fact that an auth module compiles does not mean it
works correctly and optimally.

Peter

Index: mod_auth_mysql.c
--- mod_auth_mysql.c
+++ mod_auth_mysql.c
@@ -48,6 +48,7 @@
 #include http_log.h
 #ifdef APACHE2
 #include http_request.h   /* for ap_hook_(check_user_id | auth_checker)*/
+#include apr_general.h
 #include apr_md5.h
 #include apr_sha1.h
 #else
@@ -70,6 +71,10 @@
 #define FALSE 0
 #endif
 
+#ifndef APR_XtOffsetOf
+#define APR_XtOffsetOf APR_OFFSETOF
+#endif
+
 /* This are the system-wide config options; the more specific options live in
  * a mysql_auth_config_rec structure, one for each MySQL-configured directory.
  */


signature.asc
Description: Digital signature
---End Message---
---BeginMessage---
Source: libapache-mod-auth-mysql
Source-Version: 4.3.9-3

We believe that the bug you reported is fixed in the latest version of
libapache-mod-auth-mysql, which is due to be installed in the Debian FTP 
archive:

libapache-mod-auth-mysql_4.3.9-3.diff.gz
  to 
pool/main/liba/libapache-mod-auth-mysql/libapache-mod-auth-mysql_4.3.9-3.diff.gz
libapache-mod-auth-mysql_4.3.9-3.dsc
  to 
pool/main/liba/libapache-mod-auth-mysql/libapache-mod-auth-mysql_4.3.9-3.dsc
libapache-mod-auth-mysql_4.3.9-3_i386.deb
  to 
pool/main/liba/libapache-mod-auth-mysql/libapache-mod-auth-mysql_4.3.9-3_i386.deb
libapache2-mod-auth-mysql_4.3.9-3_i386.deb
  to 
pool/main/liba/libapache-mod-auth-mysql/libapache2-mod-auth-mysql_4.3.9-3_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Mario Iseli [EMAIL PROTECTED] (supplier of updated libapache-mod-auth-mysql 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sun, 11 Feb 2007 14:04:10 +0100
Source: libapache-mod-auth-mysql
Binary: libapache-mod-auth-mysql libapache2-mod-auth-mysql
Architecture: source i386
Version: 4.3.9-3
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group [EMAIL PROTECTED]
Changed-By: Mario Iseli [EMAIL PROTECTED]
Description: 
 libapache-mod-auth-mysql - Apache module for MySQL authentication
 libapache2-mod-auth-mysql - Apache 2 module for MySQL authentication
Closes: 389579
Changes: 
 libapache-mod-auth-mysql (4.3.9-3) unstable; urgency=medium
 .
   * QA Upload
   * Set maintainer to Debian QA Group [EMAIL PROTECTED].
   * apache2 module depends now on apache2.2-common.
   * Removed the ,,changes* directories from the diff.gz.
   * Use now make distclean instead of make clean in debian/rules.
   * Build-depend now on dpatch.
   * Build-depend now on debhelper 5 instead of 4.
   * Converted the patches to dpatch.
   * Applied a patch to fix FTBFS against apache2.2 (Closes: #389579).
 Thanks to Julian Calaby for the patch.
Files: 
 46885decf180bc5728563430d1643a45 741 web optional 
libapache-mod-auth-mysql_4.3.9-3.dsc
 1c37eec26870642d09cdfb2d3b995772 8708 web optional 
libapache-mod-auth-mysql_4.3.9-3.diff.gz
 aa1548b2582023cdd5dc06886b6bc775 22052 web optional 
libapache-mod-auth-mysql_4.3.9-3_i386.deb
 55b39246c46ae18a9ad3baf4a7da144e 22192 web optional 
libapache2-mod-auth-mysql_4.3.9-3_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFzz7n+C5cwEsrK54RArCWAJ9OdLvf7f7duV+PY+XDgdtpYCvVGQCeKxb1
OQbwEEtrdwgLzmuVhm16nOs=
=+JQ7
-END PGP SIGNATURE-

---End Message---


Processed: notfound 395858 in 0.56-1.1

2007-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.9.27
 notfound 395858 0.56-1.1
Bug#395858: libfile-homedir-perl: FTBFS: tests failed
Bug marked as not found in version 0.56-1.1.
(By the way, this Bug is currently marked as done.)


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410463: [Pkg-octave-devel] Bug#410463: octave2.9-forge: FTBFS: error: invalid matrix index = 1

2007-02-11 Thread Thomas Weber
Hi, 

Am Samstag, 10. Februar 2007 21:38 schrieb Kurt Roeckx:
 Package: octave2.9
 Version: 2.9.9-8
 Severity: serious

 Hi,

 When trying to build octave2.9-forge version 2006.07.09+dfsg1-7 (on amd64)
 I get the following error:

That bug is triggered by the fix for #410070.

Can you look at fntests.log in the case of Octave 2.9.9-7 and confirm if it's 
full of 
? XYZ does not exist in path
messages?

Thomas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#409255: audacity - FTBFS: error: unrecognized command line option -msse

2007-02-11 Thread Joost Yervante Damad
Hi,

the problem is that the sse_optimized.cpp file NEEDS to be compiled with -msse 
on the i386 and amd64 archs. The runtime cpu detection system of the program 
will take care of actually using it or not depending on the cpu features.

Joost

-- 
The planet Andete is famous for it's killer edible poets.


pgpV9ojAdhKYs.pgp
Description: PGP signature


Bug#410497: sparc32 kernel is too big, fails to boot

2007-02-11 Thread Jurij Smakov
On Sun, Feb 11, 2007 at 11:15:45AM +0100, Bastian Blank wrote:

 The change was commited one month ago and we had test builds since this.

Yes, I should have tested it earlier, sorry about that.

 You said yourself that it changes the abi so it now up to you to decide
 what to do:
 - Remove it and don't support sparc32 with this etch kernel.
 - Change the abi without the abiname.

I think that changing ABI without abiname bump is a more reasonable 
solution than dropping it completely. Impact would be pretty minor, 
given the number of people using sparc32.

Best regards,
-- 
Jurij Smakov   [EMAIL PROTECTED]
Key: http://www.wooyd.org/pgpkey/  KeyID: C99E03CC


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410435: imagemagick: Buffer overflow vulnerability in PALM coder. (CVE-2007-0770)

2007-02-11 Thread Moritz Muehlenhoff
Daniel Kobras wrote:
 The attached patches fix a regression introduced while trying to plug
 CVE-2006-5456. It's due to a textbook example of a coding error that I
 cannot blame on anybody else but me. A malicious image file in PALM
 format can still circumvent a range check and cause a buffer overflow.
 Other vendors refer to this vulnerability as CVE-2007-0770. The new patch
 appears to originate from Vladimir Nadvornik, at least I dug it out of
 his OpenSuSE packages. I'll fix my own mess in unstable unless Ryuichi
 objects. As sarge is affected as well, I'd like to ask the security team
 to release another DSA. The debdiffs for both sid and sarge are
 attached.

Thanks, update is building.

Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: notfound 395858 in 0.64-1

2007-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.9.27
 notfound 395858 0.64-1
Bug#395858: libfile-homedir-perl: FTBFS: tests failed
Bug marked as not found in version 0.64-1.
(By the way, this Bug is currently marked as done.)


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410552: moinmoin-common: MoinMoin vulnerability

2007-02-11 Thread Marcus Husar
Package: moinmoin-common
Version: 1.5.3-1.1
Severity: critical

MoinMoin has a security hole, as you can see here:
http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0206.html

Please update the package.

Cheers,
Marcus Husar


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#400535: marked as done (coq_8.1~gamma-2(hppa/experimental): FTBFS: ocamlopt: command not found)

2007-02-11 Thread Debian Bug Tracking System
Your message dated Sun, 11 Feb 2007 18:32:04 +
with message-id [EMAIL PROTECTED]
and subject line Bug#400535: fixed in coq 8.1~gamma-4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: coq
Version: 8.1~gamma-2
Severity: serious

Hi,

your package failed to build from source because it couldn't
find the ocamlopt command. I'm honestly not sure whether this
is a bug in your build-depends or in ocaml-nox, which seems to
have provided this command in the past, but doesn't do so anymore.

| Automatic build of coq_8.1~gamma-2 on meitner by sbuild/hppa 79
| Build started at 20061126-1620
| **
| coq_8.1~gamma-2.dsc exists in cwd
| ** Using build dependencies supplied by package:
| Build-Depends: debhelper (= 4.0.0), dpkg-dev (= 1.13.19), dpatch, ocaml-nox 
(= 3.09.0), ocaml-best-compilers, liblablgtk2-ocaml-dev (= 2.4.0), 
tetex-extra, hevea
| ** Filtered missing central deps that are dependencies of or provide 
build-deps:
| libncurses5-dev (= 5.3.20030510-1)
[...]
| make[1]: Leaving directory `/build/buildd/coq-8.1~gamma'
| NATIVE CODE COMPILATION FAILED
| Coq was built in bytecode instead
| /usr/bin/make glob.dump
| make[1]: Entering directory `/build/buildd/coq-8.1~gamma'
| rm -f glob.dump
| rm -f theories/*/*.vo
| /usr/bin/make GLOB=-dump-glob glob.dump world
| make[2]: Entering directory `/build/buildd/coq-8.1~gamma'
| OCAMLOPT  config/coq_config.ml
| /bin/sh: ocamlopt: command not found
| make[2]: *** [config/coq_config.cmx] Error 127
| make[2]: Leaving directory `/build/buildd/coq-8.1~gamma'
| make[1]: *** [glob.dump] Error 2
| make[1]: Leaving directory `/build/buildd/coq-8.1~gamma'
| make: *** [build-stamp] Error 2
| **
| Build finished at 20061126-1809
| FAILED [dpkg-buildpackage died]

Full build log(s): 
http://experimental.ftbfs.de/build.php?ver=8.1~gamma-2pkg=coqarch=hppa

Gruesse,
-- 
Frank Lichtenheld [EMAIL PROTECTED]
www: http://www.djpig.de/

---End Message---
---BeginMessage---
Source: coq
Source-Version: 8.1~gamma-4

We believe that the bug you reported is fixed in the latest version of
coq, which is due to be installed in the Debian FTP archive:

coq-libs_8.1~gamma-4_all.deb
  to pool/main/c/coq/coq-libs_8.1~gamma-4_all.deb
coq_8.1~gamma-4.diff.gz
  to pool/main/c/coq/coq_8.1~gamma-4.diff.gz
coq_8.1~gamma-4.dsc
  to pool/main/c/coq/coq_8.1~gamma-4.dsc
coq_8.1~gamma-4_i386.deb
  to pool/main/c/coq/coq_8.1~gamma-4_i386.deb
coqide_8.1~gamma-4_i386.deb
  to pool/main/c/coq/coqide_8.1~gamma-4_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Samuel Mimram [EMAIL PROTECTED] (supplier of updated coq package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sun, 11 Feb 2007 18:02:49 +0100
Source: coq
Binary: coqide coq-libs coq
Architecture: source i386 all
Version: 8.1~gamma-4
Distribution: experimental
Urgency: low
Maintainer: Debian OCaml Maintainers debian-ocaml-maint@lists.debian.org
Changed-By: Samuel Mimram [EMAIL PROTECTED]
Description: 
 coq- proof assistant for higher-order logic (toplevel and compiler)
 coq-libs   - proof assistant for higher-order logic (theories)
 coqide - proof assistant for higher-order logic (gtk interface)
Closes: 400535
Changes: 
 coq (8.1~gamma-4) experimental; urgency=low
 .
   * Correctly build glob.dump on non-native archs, closes: #400535.
Files: 
 764fd9afaa2805b30dc28fa8cd99e3dc 945 math optional coq_8.1~gamma-4.dsc
 5f7094afff6a0b0ef0586784694bdb90 14185 math optional coq_8.1~gamma-4.diff.gz
 cc7c480ef2568e7ec6138f0b5e54552e 14581038 math optional 
coq-libs_8.1~gamma-4_all.deb
 64216e305953a33b4e99092a56d90a39 6307048 math optional coq_8.1~gamma-4_i386.deb
 7394d1e7a8538d75a508ce5dee553961 4587346 math optional 
coqide_8.1~gamma-4_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFz176Iae1O4AJae8RAig5AJwPcGDhdWe0E2Fa7yaxiFxs1nFh/ACeOQj5
zjmz3ij+6/FHCUhiAI99Mqs=
=dD9B
-END PGP SIGNATURE-

---End Message---

Bug#410554: stlport5.1_5.1.0-1(experimental/alpha/ds10): error: size of array '__static_assert' is negative

2007-02-11 Thread Marc 'HE' Brockschmidt
Package: stlport5.1
Version: 5.1.0-1
Severity: serious
Tags: experimental

Heya,

stlport5.1 failed to build on alpha:

Automatic build of stlport5.1_5.1.0-1 on ds10 by sbuild/alpha 98-farm
Build started at 20070211-1039
**
[...]
/usr/bin/make -C build/lib -f gcc.mak depend release-shared 
make[1]: Entering directory `/build/buildd/stlport5.1-5.1.0/build/lib'
c++ -pthread -fexceptions -fident  -fPIC -O2 -g -fuse-cxa-atexit  -D_REENTRANT 
-D_STLP_REAL_LOCALE_IMPLEMENTED -D_GNU_SOURCE -D_LARGEFILE_SOURCE 
-D_FILE_OFFSET_BITS=64 -I../../stlport  -c -o obj/gcc/so/dll_main.o 
../../src/dll_main.cpp
../../stlport/stl/_cwchar.h:114: error: size of array '__static_assert' is 
negative
make[1]: *** [obj/gcc/so/dll_main.o] Error 1
make[1]: Leaving directory `/build/buildd/stlport5.1-5.1.0/build/lib'
make: *** [debian/stamp-makefile-build] Error 2

Marc
-- 
BOFH #25:
Decreasing electron flux


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410557: /etc/dokuwiki/.htaccess doesn't exist in Debian package and allow access to acl and users

2007-02-11 Thread Iñaki Baz Castillo
Package: dokuwiki
Version: 0.0.20061106-1
Severity: critical


Dokuwiki 2006-11-06 from the official page [1]  contains the 
file conf/.htacces:
 
  conf/.htaccess
   -
  ## no access to the conf directory
  order allow,deny
  deny from all
  ---

This .htaccess deny web access to files in conf directory (ACL's, users).

But Debian package doesn't include it in /etc/dokuwiki so any user can see the 
ACL's and user list (name, mail, role, encripted password) by accessing to:

  http://dokuwiki_base/conf
  http://dokuwiki_base/conf/acl.auth.php
  http://dokuwiki_base/conf/users.auth.php

I suggest to include the .htaccess file in /etc/dokuwiki.

Note: The issue exists too in the experimental 0.0.20061106-2 version [2].




[1] Dokuwiki official download:
http://www.splitbrain.org/projects/dokuwiki

[2] Changelog in experimental 20061106-2 version:
http://packages.debian.org/changelogs/pool/main/d/dokuwiki/dokuwiki_0.0.20061106-2/changelog

[3] Related bug in Dokuwiki bug database:
http://bugs.splitbrain.org/?do=detailsid=1076


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410463: [Pkg-octave-devel] Bug#410463: octave2.9-forge: FTBFS: error: invalid matrix index = 1

2007-02-11 Thread Kurt Roeckx
On Sun, Feb 11, 2007 at 05:49:31PM +0100, Thomas Weber wrote:
 Hi, 
 
 Am Samstag, 10. Februar 2007 21:38 schrieb Kurt Roeckx:
  Package: octave2.9
  Version: 2.9.9-8
  Severity: serious
 
  Hi,
 
  When trying to build octave2.9-forge version 2006.07.09+dfsg1-7 (on amd64)
  I get the following error:
 
 That bug is triggered by the fix for #410070.
 
 Can you look at fntests.log in the case of Octave 2.9.9-7 and confirm if it's 
 full of 
   ? XYZ does not exist in path
 messages?

with 2.9.9-7 it looks like:
 processing main/audio/clip.m
? main/audio/clip.m does not exist in path
 processing main/audio/soundsc.m
? main/audio/soundsc.m does not exist in path
 processing main/comm/awgn.m
? main/comm/awgn.m does not exist in path
 processing main/comm/genqammod.m
[...]

clip.m is at ./main/audio/clip.m


Kurt



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410554: stlport5.1_5.1.0-1(experimental/alpha/ds10): error: size of array '__static_assert' is negative

2007-02-11 Thread Thomas Girard
Hi,

thanks for reporting.

On Sun, Feb 11, 2007 at 07:21:09PM +0100, Marc 'HE' Brockschmidt wrote:
 Package: stlport5.1
 Version: 5.1.0-1
 Severity: serious
 Tags: experimental
 
 Heya,
 
 stlport5.1 failed to build on alpha:

[...]

 ../../stlport/stl/_cwchar.h:114: error: size of array '__static_assert' is 
 negative

This reminds me of a previous patch, possibly disabled. I'll have a look
at next week.

Thomas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#409255: audacity - FTBFS: error: unrecognized command line option -msse

2007-02-11 Thread Joost Yervante Damad
Hi,

The addition of

AC_CANONICAL_HOST
case $host in
amd64-*-*) LIBSSE_CFLAGS=-msse ;;
i?86-*-*)  LIBSSE_CFLAGS=-msse ;;
*) LIBSSE_CFLAGS= ;;
esac
AC_SUBST([LIBSSE_CFLAGS])

to configure.ac of soundtouch and

noinst_LTLIBRARIES = libsse.la
libSoundTouch_la_LIBADD = libsse.la
libsse_la_SOURCES = sse_optimized.cpp
libsse_la_CXXFLAGS = -O3 $(LIBSSE_CFLAGS) -fcheck-new -I../../include

to the Makefile.am of soundtouch/source/SoundTouch

Seems to do the job for me.

Joost

-- 
The planet Andete is famous for it's killer edible poets.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410497: sparc32 kernel is too big, fails to boot

2007-02-11 Thread Frans Pop
On Sunday 11 February 2007 18:21, Jurij Smakov wrote:
 I think that changing ABI without abiname bump is a more reasonable
 solution than dropping it completely. Impact would be pretty minor,
 given the number of people using sparc32.

Note that this does mean that any packages containing kernel modules 
will/may need rebuilding on sparc.


pgpGlGTY4oWcg.pgp
Description: PGP signature


Bug#410561: php5: multiple security issues fixed in php 5.2.1

2007-02-11 Thread Stefan Fritsch
Package: php5
Version: 5.2.0-8
Severity: grave
Tags: security
Justification: user security hole


PHP 5.2.1 fixes some security problems. See

http://www.php.net/releases/5_2_1.php
http://secunia.com/advisories/24089/

PHP 4.4 is affected by at least some of the issues, too.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410565: FTBFS (alpha): libtool: link: cannot find the library `/usr/local/lib/libstdc++.la'

2007-02-11 Thread Falk Hueffner
Package: bmpx
Version: 0.36.1-1
Severity: serious
Justification: no longer builds from source

bmpx does not build on Alpha:

[...]
/bin/sh ../libtool --tag=CXX --mode=link alpha-linux-gnu-g++  -g -O2-o 
bmp2-bin -Wl,--export-dynamicbmp2_bin-main.o bmp2_bin-debug.o 
bmp2_bin-logger.o bmp2_bin-network.o bmp2_bin-vfs.o bmp2_bin-database.o 
bmp2_bin-library.o bmp2_bin-play.o bmp2_bin-mbxml.o bmp2_bin-lyrics.o 
bmp2_bin-bookmarks.o bmp2_bin-lastfm.o bmp2_bin-amazon.o bmp2_bin-monitor.o 
bmp2_bin-util_file.o bmp2_bin-sanity.o bmp2_bin-signals.o bmp2_bin-uri++.o 
bmp2_bin-util.o bmp2_bin-md5.o bmp2_bin-xml.o bmp2_bin-audio.o 
bmp2_bin-service_core.o bmp2_bin-sm.o bmp2_bin-ui_toolbox.o bmp2_bin-button.o 
bmp2_bin-ui-banner-image.o bmp2_bin-xds.o bmp2_bin-stock.o bmp2_bin-popup.o 
bmp2_bin-taskdialog.o bmp2_bin-fs.o bmp2_bin-splash-screen.o 
bmp2_bin-dialog-add-podcast.o bmp2_bin-dialog-about.o bmp2_bin-dialog-export.o 
bmp2_bin-dialog-filelist.o bmp2_bin-dialog-gsterror.o bmp2_bin-dialog-lyrics.o 
bmp2_bin-dialog-progress.o bmp2_bin-preferences-ui.o bmp2_bin-podcast.o 
bmp2_bin-podcast-libxml2-sax.o bmp2_bin-ui-p
 art-podcasts.o bmp2_bin-playershell.o bmp2_bin-ui-part-cdda.o 
bmp2_bin-ui-part-lastfm.o bmp2_bin-ui-part-playlist.o 
bmp2_bin-ui-part-shoutcast-streams.o bmp2_bin-streams-shoutcast.o 
bmp2_bin-ui-part-icecast-streams.o bmp2_bin-streams-icecast.o 
bmp2_bin-ui-part-albums.o bmp2_bin-library-ui-modify.o 
bmp2_bin-library-ui-import.o bmp2_bin-library-ui-relocate-album.o   
bmp2_bin-gstpuid.o  bmp2_bin-bmpneonhttpsrc.o bmp2_bin-hal.o  
bmp2_bin-bmp-marshalers.o -lglibmm-2.4 -lgobject-2.0 -lsigc-2.0 -lglib-2.0   
-lxml2   -ltag   -lfam ../sqlite/libsqlite.la  -lneon   -lmusicbrainz
-lasound -lm -ldl -lpthread   -Wl,--export-dynamic -pthread -lgstbase-0.10 
-lgstreamer-0.10 -lgobject-2.0 -lgmodule-2.0 -ldl -lgthread-2.0 -lxml2 
-lglib-2.0   -ldbus-glib-1 -ldbus-1 -lglib-2.0 -L/usr/lib -lcdda_interface 
-lrsvg-2 -lgdk_pixbuf-2.0 -lm -lgobject-2.0 -lgmodule-2.0 -ldl -lglib-2.0   
../mcs/libmconfig.la ../neon++/libneonpp.la ../uuid/libuuid.la -lgstvideo-0.10 
-lgstinterfaces-0.10 ../libhal
 ++/libhalcc.la -lstartup-notification-1-lSM -lICE -lX11  -lSM -lICE 
-lgtkmm-2.4 -lgdkmm-2.4 -latkmm-1.6 -lgtk-x11-2.0 -lpangomm-1.4 -lglibmm-2.4 
-lsigc-2.0 -lgdk-x11-2.0 -latk-1.0 -lgdk_pixbuf-2.0 -lm -lpangocairo-1.0 
-lfontconfig -lXext -lXrender -lXinerama -lXi -lXrandr -lXcursor -lXfixes 
-lpango-1.0 -lcairo -lX11 -lgobject-2.0 -lgmodule-2.0 -ldl -lglib-2.0   
-lglademm-2.4 -lgtkmm-2.4 -lglade-2.0 -lgdkmm-2.4 -latkmm-1.6 -lpangomm-1.4 
-lglibmm-2.4 -lsigc-2.0 -lgtk-x11-2.0 -lxml2 -lgdk-x11-2.0 -latk-1.0 
-lgdk_pixbuf-2.0 -lm -lpangocairo-1.0 -lfontconfig -lXext -lXrender -lXinerama 
-lXi -lXrandr -lXcursor -lXfixes -lpango-1.0 -lcairo -lX11 -lgobject-2.0 
-lgmodule-2.0 -ldl -lglib-2.0   -lcairomm-1.0 -lcairo   -lboost_regex 
../widgets/libbmpwidgets.la -lofa -lexpat -lfftw3 -lm   -lhal-storage -lhal 
-ldbus-1   
mkdir .libs
libtool: link: cannot find the library `/usr/local/lib/libstdc++.la' or 
unhandled argument `/usr/local/lib/libstdc++.la'
make[4]: *** [bmp2-bin] Error 1
make[4]: Leaving directory `/home/falk/bmpx-0.36.1/src

Full log at:
http://buildd.debian.org/fetch.cgi?pkg=bmpxarch=alphaver=0.36.1-1stamp=1169981975

I have no idea why this happens only on Alpha.


-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: alpha
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.20
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages bmpx depends on:
ii  dbus 1.0.2-1 simple interprocess messaging syst
ii  libasoun 1.0.13-1ALSA library
ii  libatk1. 1.12.4-1The ATK accessibility toolkit
ii  libboost 1.33.1-10   regular expression library for C++
ii  libc6.1  2.3.6.ds1-11GNU C Library: Shared libraries
ii  libcairo 1.2.4-4 The Cairo 2D vector graphics libra
ii  libcairo 0.6.0-4 C++ wrappers for Cairo (shared lib
ii  libcdpar 3.10+debian~pre0-4  audio extraction tool for sampling
ii  libcomer 1.39+1.40-WIP-2006.11.14+dfsg-1 common error description library
ii  libdbus- 1.0.2-1 simple interprocess messaging syst
ii  libdbus- 0.71-3  simple interprocess messaging syst
ii  libexpat 1.95.8-3.4  XML parsing C library - runtime li
ii  libfam0  2.7.0-12Client library to control the FAM 
ii  libfontc 2.4.2-1 generic font configuration library
ii  libfreet 2.2.1-5 FreeType 2 font engine, shared lib
ii  libgcc1  1:4.1.1-21  GCC support library
ii  libglade 1:2.6.0-4   library to load .glade files at ru
ii  libglade 2.6.2-2 C++ 

Bug#410352: gstreamer0.8: Should not be released with Etch

2007-02-11 Thread Steve Langasek
severity 410352 important
unblock 410441 by 410352
block 410352 by 410441
unblock 410442 by 410352
block 410352 by 410442
unblock 410384 by 410352
block 410352 by 410384
thanks

On Fri, Feb 09, 2007 at 05:58:53PM -0800, David Schleef wrote:
 On Sat, Feb 10, 2007 at 12:44:24AM +0100, Moritz Muehlenhoff wrote:
  Package: gstreamer0.8
  Severity: serious

  gstreamer-0.8 embeds a full copy of the ffmpeg, which frequently
  has vulnerabilities.

 gstreamer0.8 != gstreamer0.8-ffmpeg

That seems to remove the rationale for treating gstreamer0.8 as RC-buggy for
etch, so I think it's appropriate to downgrade this bug.

Thanks,
-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410497: sparc32 kernel is too big, fails to boot

2007-02-11 Thread Steve Langasek
On Sun, Feb 11, 2007 at 08:38:23PM +0100, Frans Pop wrote:
 On Sunday 11 February 2007 18:21, Jurij Smakov wrote:
  I think that changing ABI without abiname bump is a more reasonable
  solution than dropping it completely. Impact would be pretty minor,
  given the number of people using sparc32.

 Note that this does mean that any packages containing kernel modules 
 will/may need rebuilding on sparc.

In practice, this appears limited to loop-aes, d-i, and l-m-e-2.6.

Cheers,
-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410557: /etc/dokuwiki/.htaccess doesn't exist in Debian package and allow access to acl and users

2007-02-11 Thread Steve Langasek
On Sun, Feb 11, 2007 at 07:56:57PM +0100, Iñaki Baz Castillo wrote:
 Dokuwiki 2006-11-06 from the official page [1]  contains the 
 file conf/.htacces:

   conf/.htaccess
-
   ## no access to the conf directory
   order allow,deny
   deny from all
   ---

 This .htaccess deny web access to files in conf directory (ACL's, users).

 But Debian package doesn't include it in /etc/dokuwiki so any user can see 
 the 
 ACL's and user list (name, mail, role, encripted password) by accessing to:

   http://dokuwiki_base/conf
   http://dokuwiki_base/conf/acl.auth.php
   http://dokuwiki_base/conf/users.auth.php

 I suggest to include the .htaccess file in /etc/dokuwiki.

 Note: The issue exists too in the experimental 0.0.20061106-2 version [2].

Um.  Why is anything under /etc/ being exposed under the http heirarchy *at
all*?

Ah, that would be the link ./usr/share/dokuwiki/conf - /etc/dokuwiki being
shipped in the package, probably as a cheap workaround for a lack of config
include path in the software. :/

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/



Processed: severity of 410352 is serious

2007-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.9.27
 severity 410352 serious
Bug#410352: gstreamer0.8: Should not be released with Etch
Severity set to `serious' from `serious'


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410557: /etc/dokuwiki/.htaccess doesn't exist in Debian package and allow access to acl and users

2007-02-11 Thread Iñaki
 Ah, that would be the link ./usr/share/dokuwiki/conf - /etc/dokuwiki being
 shipped in the package, probably as a cheap workaround for a lack of config
 include path in the software. :/

There are more web applications in Debian accessing to /etc. For example 
PhpMyAdmin:

  ~$  ls -l /usr/share/phpldapadmin/config/config.php
  config.php - /etc/phpldapadmin/config.php

I think it would be better if directories or files in /etc/web_app/ are 
links to /usr/share/web_app/ instead.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410561: [php-maint] Bug#410561: php5: multiple security issues fixed in php 5.2.1

2007-02-11 Thread Ondřej Surý
Oh my goddess :-(

 PHP 5.2.1 fixes some security problems. See
 
 http://www.php.net/releases/5_2_1.php
 http://secunia.com/advisories/24089/

Seems there is a lot of stack and buffer overflows fixed.
Unfortunatelly our lovely PHP upstream maintainers bundled
a lot of stuff into 5.2.1 as well including changes in default
behaviour.  I would love to have 5.2.1 in etch, but I am prepared to go
cherry picking.

Steve, what's your opinion?  Cesspool will remain cesspool, so I don't
see big difference between 5.2.0 and 5.2.1 in terms of bugginess.

 PHP 4.4 is affected by at least some of the issues, too.

That troubles me :-(((, since new php4 is not available.

Ondrej.
-- 
Ondřej Surý [EMAIL PROTECTED]  ***  http://blog.rfc1925.org/
Kulturní občasník  ***  http://www.obcasnik.cz/





Bug#410580: CVE-2007-0855: Stack-based buffer overflow in Unrar

2007-02-11 Thread Stefan Fritsch
Package: unrar
Version: 1:3.7.2-1
Severity: critical
Tags: security



From CVE-2007-0855:

Stack-based buffer overflow in RARLabs Unrar, as packaged in WinRAR and
possibly other products, allows user-assisted remote attackers to execute
arbitrary code via a crafted, password-protected archive.

See [1] for details. On the day of the public release of the advisory, unrar
3.7.3 has been released, which implies that version 3.7.2 is vulnerable (there
is no detailed changelog, however).

A new rar version has also been released.

Severity critical because rar or unrar is called by amavisd-new in its default
configuration (with parameter -p- to suppress password input), which probably
turns this issue into a remote arbitrary code execution vulnerability.


[1] 
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=472


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410557: /etc/dokuwiki/.htaccess doesn't exist in Debian package and allow access to acl and users

2007-02-11 Thread Steve Langasek
On Sun, Feb 11, 2007 at 09:45:06PM +0100, Iñaki wrote:
  Ah, that would be the link ./usr/share/dokuwiki/conf - /etc/dokuwiki being
  shipped in the package, probably as a cheap workaround for a lack of config
  include path in the software. :/

 There are more web applications in Debian accessing to /etc. For example 
 PhpMyAdmin:

   ~$  ls -l /usr/share/phpldapadmin/config/config.php
   config.php - /etc/phpldapadmin/config.php

 I think it would be better if directories or files in /etc/web_app/ are 
 links to /usr/share/web_app/ instead.

No, it would be better if webapps didn't suck, and could reference /etc
directly.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/



Processed: rar is also affected

2007-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 clone 410580 -1
Bug#410580: CVE-2007-0855: Stack-based buffer overflow in Unrar
Bug 410580 cloned as bug 410582.

 reassign -1 rar
Bug#410582: CVE-2007-0855: Stack-based buffer overflow in Unrar
Bug reassigned from package `unrar' to `rar'.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410557: /etc/dokuwiki/.htaccess doesn't exist in Debian package and allow access to acl and users

2007-02-11 Thread Iñaki
 No, it would be better if webapps didn't suck, and could reference /etc
 directly.

That is not possible with PHP web apps since PHP needs all the config files in 
the public dir of the web server. This is the issue that sucks.

The solution most used if to hide config files with .htaccess and other 
strange methods, but PHP webapps will be always potential buggy apps.

Note that Java and RubyOnRails apps expose never the config files (database 
login and so) in the public directory because a good and secure design. But 
in PHP there is no rules. :(


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410581: linux-kernel-headers: file conflict with amd64-libs-dev

2007-02-11 Thread Bill Allombert
Package: linux-kernel-headers
Version: 2.6.18-6
Severity: serious
Justification: Break sarge to etch upgrade

Hello GLibc maintainers,

There is an error when upgrading the package from sarge to etch,
it should Replaces amd64-libs-dev:

Preparing to replace linux-kernel-headers 2.5.999-test7-bk-17 (using 
.../linux-kernel-headers_2.6.18-6_i386.deb) ...
Unpacking replacement linux-kernel-headers ...
dpkg: error processing 
/var/cache/apt/archives/linux-kernel-headers_2.6.18-6_i386.deb (--unpack):
 trying to overwrite `/usr/include/asm/bootsetup.h', which is also in package 
amd64-libs-dev
dpkg-deb: subprocess paste killed by signal (Broken pipe)

The sarge package of amd64-libs-dev includes the file
/usr/include/asm/bootsetup.h.

Cheers,
-- 
Bill. [EMAIL PROTECTED]

Imagine a large blue swirl here. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: severity of 410580 is grave

2007-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.9.27
 severity 410580 grave
Bug#410580: CVE-2007-0855: Stack-based buffer overflow in Unrar
Severity set to `grave' from `critical'


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410557: /etc/dokuwiki/.htaccess doesn't exist in Debian package and allow access to acl and users

2007-02-11 Thread Iñaki
El Domingo, 11 de Febrero de 2007, Steve Langasek escribió:
  That is not possible with PHP web apps since PHP needs all the config
  files in the public dir of the web server. This is the issue that sucks.

 No, it doesn't.  I don't know where you got that idea.

Yes, it's possible to have config files out of the public dir, but the fact is 
that many PHP apps contain their config files into the public dir (as 
Dokuwiki, PhpMyAdmin and so).

What I mean is that PHP doesn't force the developer to protect the config 
files, it's optional and many times using relative security as .htaccess 
files.  



Bug#410583: installation-report: Installing tasks stalls at 5%

2007-02-11 Thread Dave Page
On Sun, Feb 11, 2007 at 09:41:13PM +, Dave Page wrote:

 I had thought that this was due to using my local apt-proxy cache for
 installations, but I ran into two people on #debian who had the same
 issues when installing from http://ftp.(us|uk).debian.org/

Hmm. Just after filing this bug report, I recieved
http://lists.debian.org/debian-devel-announce/2007/02/msg00011.html via
e-mail which may explain the problems which I and others have seen.
Can't wait for RC2! :)

Dave
-- 
Dave Page [EMAIL PROTECTED]
Jabber: [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410557: /etc/dokuwiki/.htaccess doesn't exist in Debian package and allow access to acl and users

2007-02-11 Thread Steve Langasek
On Sun, Feb 11, 2007 at 10:30:20PM +0100, Iñaki wrote:
  No, it would be better if webapps didn't suck, and could reference /etc
  directly.

 That is not possible with PHP web apps since PHP needs all the config files 
 in 
 the public dir of the web server. This is the issue that sucks.

No, it doesn't.  I don't know where you got that idea.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/



Processed: tagging 410375

2007-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 410375 + pending
Bug#410375: network interfaces not autoconfigured for ipv6 after reboot
Tags were: confirmed
Tags added: pending


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410557: marked as done (/etc/dokuwiki/.htaccess doesn't exist in Debian package and allow access to acl and users)

2007-02-11 Thread Debian Bug Tracking System
Your message dated Sun, 11 Feb 2007 22:32:03 +
with message-id [EMAIL PROTECTED]
and subject line Bug#410557: fixed in dokuwiki 0.0.20061106-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: dokuwiki
Version: 0.0.20061106-1
Severity: critical


Dokuwiki 2006-11-06 from the official page [1]  contains the 
file conf/.htacces:
 
  conf/.htaccess
   -
  ## no access to the conf directory
  order allow,deny
  deny from all
  ---

This .htaccess deny web access to files in conf directory (ACL's, users).

But Debian package doesn't include it in /etc/dokuwiki so any user can see the 
ACL's and user list (name, mail, role, encripted password) by accessing to:

  http://dokuwiki_base/conf
  http://dokuwiki_base/conf/acl.auth.php
  http://dokuwiki_base/conf/users.auth.php

I suggest to include the .htaccess file in /etc/dokuwiki.

Note: The issue exists too in the experimental 0.0.20061106-2 version [2].




[1] Dokuwiki official download:
http://www.splitbrain.org/projects/dokuwiki

[2] Changelog in experimental 20061106-2 version:
http://packages.debian.org/changelogs/pool/main/d/dokuwiki/dokuwiki_0.0.20061106-2/changelog

[3] Related bug in Dokuwiki bug database:
http://bugs.splitbrain.org/?do=detailsid=1076

---End Message---
---BeginMessage---
Source: dokuwiki
Source-Version: 0.0.20061106-3

We believe that the bug you reported is fixed in the latest version of
dokuwiki, which is due to be installed in the Debian FTP archive:

dokuwiki_0.0.20061106-3.diff.gz
  to pool/main/d/dokuwiki/dokuwiki_0.0.20061106-3.diff.gz
dokuwiki_0.0.20061106-3.dsc
  to pool/main/d/dokuwiki/dokuwiki_0.0.20061106-3.dsc
dokuwiki_0.0.20061106-3_all.deb
  to pool/main/d/dokuwiki/dokuwiki_0.0.20061106-3_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Mohammed Adnène Trojette [EMAIL PROTECTED] (supplier of updated dokuwiki 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sun, 11 Feb 2007 21:53:00 +0100
Source: dokuwiki
Binary: dokuwiki
Architecture: source all
Version: 0.0.20061106-3
Distribution: unstable
Urgency: high
Maintainer: Mohammed Adnène Trojette [EMAIL PROTECTED]
Changed-By: Mohammed Adnène Trojette [EMAIL PROTECTED]
Description: 
 dokuwiki   - a standards compliant simple to use wiki
Closes: 410557
Changes: 
 dokuwiki (0.0.20061106-3) unstable; urgency=high
 .
   * High urgency for RC bug fixing.
   * Prepend dokuwiki's configuration directory to avoid disclosing
 /etc/dokuwiki as suggested on
 http://wiki.splitbrain.org/wiki:security#the_._conf_directory
 (Closes: #410557)
   * Just in case, also ship /etc/dokuwiki with .htaccess.
Files: 
 4c988f12a08f67bee474eb920e30787b 648 web optional dokuwiki_0.0.20061106-3.dsc
 5908c64f63e897bbeaa7969e9735208f 26170 web optional 
dokuwiki_0.0.20061106-3.diff.gz
 c864ba1254cad3a10cb7a703289d8cc7 1106250 web optional 
dokuwiki_0.0.20061106-3_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFz5gqOU3FkQ7XBOoRAvvKAKC2Fe7ry8uLT0ktVB/lV6/khlyTZQCfSMLL
xhc+FzdAfdAPbyp5PPNXW+o=
=4o/7
-END PGP SIGNATURE-

---End Message---


Processed: tagging 410561

2007-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.9.26
 tags 410561 + upstream fixed-upstream
Bug#410561: php5: multiple security issues fixed in php 5.2.1
Tags were: security
Tags added: upstream, fixed-upstream


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: retitle 410552 to CVE-2007-0857 - Multiple XSS vulnerabilities, tagging 410552

2007-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 retitle 410552 CVE-2007-0857 - Multiple XSS vulnerabilities
Bug#410552: moinmoin-common: MoinMoin vulnerability
Changed Bug title.

 tags 410552 + upstream fixed-upstream security
Bug#410552: CVE-2007-0857 - Multiple XSS vulnerabilities
There were no tags set.
Tags added: upstream, fixed-upstream, security


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410600: filterproxy: An Error Occurred: 500 Access to 'http' URIs has been disabled

2007-02-11 Thread Brian May
Package: filterproxy
Version: 0.30-6.2
Severity: grave
Justification: renders package unusable

Whenever I try to access any URLs, using the default configuration, I
get the following message:

An Error Occurred
500 Access to 'http' URIs has been disabled 


The following is logged:

[29154 Mon Feb 12 12:23:30 2007] Deleting child: 30552, from localhost:37584
[30902 Mon Feb 12 12:23:30 2007] New proxy connection accepted from 
localhost:37585
[30902 Mon Feb 12 12:23:30 2007] do_host_authentication: 127.0.0.1 connecting 
to 127.0.0.1
[30902 Mon Feb 12 12:23:30 2007] HTTP/1.1 proxy request for 
http://www.google.com.au/ received.
[30902 Mon Feb 12 12:23:30 2007] Going to apply filter Compress order -10 for 
http://www.google.com.au/, matching /.*/.
[30902 Mon Feb 12 12:23:30 2007] Going to apply filter Header order -10 for 
http://www.google.com.au/, matching /.*/.
[30902 Mon Feb 12 12:23:30 2007] Sending request for http://www.google.com.au/
[30902 Mon Feb 12 12:23:30 2007] [Perl WARNING] Use of uninitialized value in 
string eq at /usr/share/perl5/LWP/UserAgent.pm line 168.
[30902 Mon Feb 12 12:23:30 2007] [Perl WARNING] Use of uninitialized value in 
string eq at /usr/share/perl5/LWP/UserAgent.pm line 168.
[30902 Mon Feb 12 12:23:30 2007] [Perl WARNING] Use of uninitialized value in 
string eq at /usr/share/perl5/LWP/UserAgent.pm line 168.
[30902 Mon Feb 12 12:23:30 2007] [Perl WARNING] Use of uninitialized value in 
concatenation (.) or string at /usr/share/perl5/LWP/UserAgent.pm line 172.
[30902 Mon Feb 12 12:23:30 2007] [500 Access to 'http' URIs has been disabled] 
for http://www.google.com.au/
[30902 Mon Feb 12 12:23:30 2007] Going to apply filter Header order 10 for 
http://www.google.com.au/, matching /.*/.
[30902 Mon Feb 12 12:23:31 2007] Exiting for client localhost:37585 (1 requests 
processed) {No more requests from this connection}


At which stage I am lost (for now anyway).

-- System Information:
Debian Release: 4.0
  APT prefers testing
  APT policy: (500, 'testing'), (200, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-xen-686
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)

Versions of packages filterproxy depends on:
ii  adduser 3.102Add and remove users and groups
ii  libcompress-zlib-pe 1.42-2   Perl module for creation and manip
ii  libhtml-mason-perl  1:1.35-2 HTML::Mason Perl module
ii  liburi-perl 1.35-2   Manipulates and accesses URI strin
ii  libwww-perl 5.805-1  WWW client/server library for Perl
ii  libxml-libxml-perl  1.59-2   Perl module for using the GNOME li
ii  libxml-libxslt-perl 1.59-1   Perl module for using the GNOME li
ii  perl [libtime-hires 5.8.8-7  Larry Wall's Practical Extraction 
ii  perlmagick  7:6.2.4.5.dfsg1-0.13 A perl interface to the libMagick 

filterproxy recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410605: dpkg: bzip2 code in compression.c incorrectly uses zlib define (Z_ERRNO)

2007-02-11 Thread Mike Frysinger
Package: dpkg
Version: 1.13.25
Severity: serious
Justification: no longer builds from source

in the decompress_cat() function in the compression.c file, you can see
the bzip2 code comparing the results of BZ2_bzerror() to the zlib define
Z_ERRNO ... that should prob be comparing err to some BZ_ error define.


-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (990, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.19.2-grsec
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages dpkg depends on:
ii  coreutils   5.97-5.2 The GNU core utilities
ii  libc6   2.3.6.ds1-10 GNU C Library: Shared libraries

dpkg recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410600: marked as done (filterproxy: An Error Occurred: 500 Access to 'http' URIs has been disabled)

2007-02-11 Thread Debian Bug Tracking System
Your message dated Mon, 12 Feb 2007 13:32:24 +1100
with message-id [EMAIL PROTECTED]
and subject line filterproxy: An Error Occurred: 500 Access to 'http' URIs has 
been disabled
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: filterproxy
Version: 0.30-6.2
Severity: grave
Justification: renders package unusable

Whenever I try to access any URLs, using the default configuration, I
get the following message:

An Error Occurred
500 Access to 'http' URIs has been disabled 


The following is logged:

[29154 Mon Feb 12 12:23:30 2007] Deleting child: 30552, from localhost:37584
[30902 Mon Feb 12 12:23:30 2007] New proxy connection accepted from 
localhost:37585
[30902 Mon Feb 12 12:23:30 2007] do_host_authentication: 127.0.0.1 connecting 
to 127.0.0.1
[30902 Mon Feb 12 12:23:30 2007] HTTP/1.1 proxy request for 
http://www.google.com.au/ received.
[30902 Mon Feb 12 12:23:30 2007] Going to apply filter Compress order -10 for 
http://www.google.com.au/, matching /.*/.
[30902 Mon Feb 12 12:23:30 2007] Going to apply filter Header order -10 for 
http://www.google.com.au/, matching /.*/.
[30902 Mon Feb 12 12:23:30 2007] Sending request for http://www.google.com.au/
[30902 Mon Feb 12 12:23:30 2007] [Perl WARNING] Use of uninitialized value in 
string eq at /usr/share/perl5/LWP/UserAgent.pm line 168.
[30902 Mon Feb 12 12:23:30 2007] [Perl WARNING] Use of uninitialized value in 
string eq at /usr/share/perl5/LWP/UserAgent.pm line 168.
[30902 Mon Feb 12 12:23:30 2007] [Perl WARNING] Use of uninitialized value in 
string eq at /usr/share/perl5/LWP/UserAgent.pm line 168.
[30902 Mon Feb 12 12:23:30 2007] [Perl WARNING] Use of uninitialized value in 
concatenation (.) or string at /usr/share/perl5/LWP/UserAgent.pm line 172.
[30902 Mon Feb 12 12:23:30 2007] [500 Access to 'http' URIs has been disabled] 
for http://www.google.com.au/
[30902 Mon Feb 12 12:23:30 2007] Going to apply filter Header order 10 for 
http://www.google.com.au/, matching /.*/.
[30902 Mon Feb 12 12:23:31 2007] Exiting for client localhost:37585 (1 requests 
processed) {No more requests from this connection}


At which stage I am lost (for now anyway).

-- System Information:
Debian Release: 4.0
  APT prefers testing
  APT policy: (500, 'testing'), (200, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-xen-686
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)

Versions of packages filterproxy depends on:
ii  adduser 3.102Add and remove users and groups
ii  libcompress-zlib-pe 1.42-2   Perl module for creation and manip
ii  libhtml-mason-perl  1:1.35-2 HTML::Mason Perl module
ii  liburi-perl 1.35-2   Manipulates and accesses URI strin
ii  libwww-perl 5.805-1  WWW client/server library for Perl
ii  libxml-libxml-perl  1.59-2   Perl module for using the GNOME li
ii  libxml-libxslt-perl 1.59-1   Perl module for using the GNOME li
ii  perl [libtime-hires 5.8.8-7  Larry Wall's Practical Extraction 
ii  perlmagick  7:6.2.4.5.dfsg1-0.13 A perl interface to the libMagick 

filterproxy recommends no packages.

-- no debconf information

---End Message---
---BeginMessage---
 Brian == Brian May [EMAIL PROTECTED] writes:

Brian Whenever I try to access any URLs, using the default
Brian configuration, I get the following message:

I lied.

I tried changing the proxy settings.

It turns out that proxy settings don't take affect immediately, so
when I deleted the proxy settings it still tried to use the old
settings.

It turns out that proxy:3128 is not a valid proxy value, I needed to
use http://proxy:3128;.

Possibly the error message could be improved too.

Closing this bug...
-- 
Brian May [EMAIL PROTECTED]
---End Message---


Bug#410610: ttf-mph-2b-damase: contains glyphs from a non-free font

2007-02-11 Thread Paul Wise
Package: ttf-mph-2b-damase
Version: 001.000-1
Severity: serious
Justification: contains non-free glyphs

The attached messages indicate that some of the glyphs in
ttf-mph-2b-damase will need to be stripped.

This may or may not be possible with the latest fontforge:

(12:07:52) pabs: oh, yeah, I should probably update the debian package
to remove the Sylheti glyphs, are you able to do that and send me a new
copy? I'd have to do it with fontforge and I don't know if it would be
able to preserve all the font features you used
(12:08:49) mark: I don't have a font application that supports plane 1,
so it would ruin the font if I did it. I had to send it out to James
Kass for the p1 support.
(12:09:03) pabs: oh, hmm
(12:09:21) mark: But I didn't use any special features that would be
ruined, I don't think
(12:10:29) pabs: ok, well, I'll try with fontforge, we'll see though :)
(12:10:58) mark: ok

-- 
bye,
pabs

http://wiki.debian.org/PaulWise
---BeginMessage---
Everyone -

 Mark Williamson [EMAIL PROTECTED] is the author and he released it
 into the public domain...

Far be it from me to discourage development of free fonts, but I don't think
Mark has the rights to release it into the public domain. In a quick look at
the font, I saw many font styles I recognised - including ones that are not
currently under free licenses. For example, the Sylheti Nagri glyphs are an
identical copy (node for node, coordinate for coordinate) of the Sylheti
font available from http://www.sylheti.org.uk/page5.html. That font is
freeware, but is not under public domain, or any FLOSS license.

I hate to sound like the font police, but this font is not legal, as it
contains copyrighted material from other fonts without any acknowledgement.
I'm not at all implying that Mark intentionally intended to breach
copyright, as it is particularly common in South Asia to find fonts that
have been copied with the copyright stripped out, replaced with public
domain. Mark may have copied glyphs from one of those fonts. I just think
someone ought to do a little more research to be sure that all the contents
are truly free. It may even be that some of Mark's sources could be
convinced to release OFL versions of their fonts!

If we want to get the typographic community's support behind free and open
source fonts, we have to prove to them that we honour copyright. Otherwise
all our arguments fall flat, and designers will run from FLOSS and the OFLB
like the plague. 

V.

-
Victor Gaultney
SIL International


---End Message---
---BeginMessage---
On Sun, 2007-02-11 at 15:17 +, Victor Gaultney wrote:

  Mark Williamson [EMAIL PROTECTED] is the author and he released it
  into the public domain...
 
 Far be it from me to discourage development of free fonts, but I don't think
 Mark has the rights to release it into the public domain.

(11:53:52) mark: I don't remember copying that font. I suppose it's
possible, I know I used it for information about the script
(11:54:32) mark: But if necessary, Sylheti can be removed from the font,
or new glyphs can be designed. Simply recognizing font styles doesn't
imply any sort of breach of copyright
(11:56:30) mark: The Latin, Hebrew, Greek, Cyrillic, Arabic glyphs are
all original, as are the Glagolitic, Gothic, Linear B, Cypriot, because
I actually still have the designs for all of those
(11:57:01) mark: The other ones, I'd have to check to make sure
(11:57:06) mark: But I was sure the entire font was my work
(11:57:25) mark: One sec
(11:58:38) mark: ok... the arabic glyphs are original, but in most apps
if you type them it will show up as your system's default arabic font
because there aren't OpenType tables for it
(12:02:32) mark: but after a cursory look, it appears eveything's
original (most of the ranges are typified by uneven contours because I
didn't finish the glyph outlines off)
(12:02:41) mark: except for Sylheti
(12:03:46) pabs: thanks for the info, I'll let you know of any more
questions
(12:03:50) mark: ok :-)

 If we want to get the typographic community's support behind free and open
 source fonts, we have to prove to them that we honour copyright. Otherwise
 all our arguments fall flat, and designers will run from FLOSS and the OFLB
 like the plague. 

Indeed.

-- 
bye,
pabs

http://wiki.debian.org/PaulWise


signature.asc
Description: This is a digitally signed message part
---End Message---


signature.asc
Description: This is a digitally signed message part


Bug#410605: dpkg: bzip2 code in compression.c incorrectly uses zlib define (Z_ERRNO)

2007-02-11 Thread Steve Langasek
severity 410605 important
thanks

On Sun, Feb 11, 2007 at 08:34:53PM -0500, Mike Frysinger wrote:
 Justification: no longer builds from source

Huh?  This bug doesn't describe a build failure.

 in the decompress_cat() function in the compression.c file, you can see
 the bzip2 code comparing the results of BZ2_bzerror() to the zlib define
 Z_ERRNO ... that should prob be comparing err to some BZ_ error define.

Probably; but I don't see how that causes a build failure as claimed, the
package is built fine on all Debian architectures.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#410605: dpkg: bzip2 code in compression.c incorrectly uses zlib define (Z_ERRNO)

2007-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 410605 important
Bug#410605: dpkg: bzip2 code in compression.c incorrectly uses zlib define 
(Z_ERRNO)
Severity set to `important' from `serious'

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410581: marked as done (linux-kernel-headers: file conflict with amd64-libs-dev)

2007-02-11 Thread Debian Bug Tracking System
Your message dated Mon, 12 Feb 2007 03:17:04 +
with message-id [EMAIL PROTECTED]
and subject line Bug#410581: fixed in linux-kernel-headers 2.6.18-7
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: linux-kernel-headers
Version: 2.6.18-6
Severity: serious
Justification: Break sarge to etch upgrade

Hello GLibc maintainers,

There is an error when upgrading the package from sarge to etch,
it should Replaces amd64-libs-dev:

Preparing to replace linux-kernel-headers 2.5.999-test7-bk-17 (using 
.../linux-kernel-headers_2.6.18-6_i386.deb) ...
Unpacking replacement linux-kernel-headers ...
dpkg: error processing 
/var/cache/apt/archives/linux-kernel-headers_2.6.18-6_i386.deb (--unpack):
 trying to overwrite `/usr/include/asm/bootsetup.h', which is also in package 
amd64-libs-dev
dpkg-deb: subprocess paste killed by signal (Broken pipe)

The sarge package of amd64-libs-dev includes the file
/usr/include/asm/bootsetup.h.

Cheers,
-- 
Bill. [EMAIL PROTECTED]

Imagine a large blue swirl here. 

---End Message---
---BeginMessage---
Source: linux-kernel-headers
Source-Version: 2.6.18-7

We believe that the bug you reported is fixed in the latest version of
linux-kernel-headers, which is due to be installed in the Debian FTP archive:

linux-kernel-headers_2.6.18-7.diff.gz
  to pool/main/l/linux-kernel-headers/linux-kernel-headers_2.6.18-7.diff.gz
linux-kernel-headers_2.6.18-7.dsc
  to pool/main/l/linux-kernel-headers/linux-kernel-headers_2.6.18-7.dsc
linux-kernel-headers_2.6.18-7_i386.deb
  to pool/main/l/linux-kernel-headers/linux-kernel-headers_2.6.18-7_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Clint Adams [EMAIL PROTECTED] (supplier of updated linux-kernel-headers 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sun, 11 Feb 2007 22:02:52 -0500
Source: linux-kernel-headers
Binary: linux-kernel-headers
Architecture: source i386
Version: 2.6.18-7
Distribution: unstable
Urgency: high
Maintainer: GNU Libc Maintainers debian-glibc@lists.debian.org
Changed-By: Clint Adams [EMAIL PROTECTED]
Description: 
 linux-kernel-headers - Linux Kernel Headers for development
Closes: 410581
Changes: 
 linux-kernel-headers (2.6.18-7) unstable; urgency=high
 .
   * Add Conflicts and Replaces on amd64-libs-dev ( 1.4).
 closes: #410581.
Files: 
 17896678daa45689ad1370781490eaed 881 devel standard 
linux-kernel-headers_2.6.18-7.dsc
 02978e682801f1aacb61c2e875804222 24758 devel standard 
linux-kernel-headers_2.6.18-7.diff.gz
 1802c639dd1a9c4a9c16ab1f86f88554 1875338 devel standard 
linux-kernel-headers_2.6.18-7_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Debian!

iD8DBQFFz9sN5m0u66uWM3ARAiJQAJ9H6fCv7gdS0QGvRZd6uOkd1//AIQCg2PxD
bkkZY85U1Qmsh94svlR+yOA=
=TqRa
-END PGP SIGNATURE-

---End Message---


Bug#410561: [php-maint] Bug#410561: php5: multiple security issues fixed in php 5.2.1

2007-02-11 Thread Steve Langasek
On Sun, Feb 11, 2007 at 10:01:22PM +0100, Ondřej Surý wrote:
 Oh my goddess :-(

  PHP 5.2.1 fixes some security problems. See

  http://www.php.net/releases/5_2_1.php
  http://secunia.com/advisories/24089/

 Seems there is a lot of stack and buffer overflows fixed.
 Unfortunatelly our lovely PHP upstream maintainers bundled
 a lot of stuff into 5.2.1 as well including changes in default
 behaviour.  I would love to have 5.2.1 in etch, but I am prepared to go
 cherry picking.

 Steve, what's your opinion?  Cesspool will remain cesspool, so I don't
 see big difference between 5.2.0 and 5.2.1 in terms of bugginess.

Well, as you mention changes to default behavior, the difference is the
impact that such changes would have on other apps that depend on the current
behavior.  So I'm afraid this needs to be handled in a way that we get the
security fixes without whatever random changes upstream has decided to make.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/



Bug#410580: marked as done (CVE-2007-0855: Stack-based buffer overflow in Unrar)

2007-02-11 Thread Debian Bug Tracking System
Your message dated Mon, 12 Feb 2007 04:02:04 +
with message-id [EMAIL PROTECTED]
and subject line Bug#410580: fixed in unrar-nonfree 1:3.7.3-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: unrar
Version: 1:3.7.2-1
Severity: critical
Tags: security



From CVE-2007-0855:

Stack-based buffer overflow in RARLabs Unrar, as packaged in WinRAR and
possibly other products, allows user-assisted remote attackers to execute
arbitrary code via a crafted, password-protected archive.

See [1] for details. On the day of the public release of the advisory, unrar
3.7.3 has been released, which implies that version 3.7.2 is vulnerable (there
is no detailed changelog, however).

A new rar version has also been released.

Severity critical because rar or unrar is called by amavisd-new in its default
configuration (with parameter -p- to suppress password input), which probably
turns this issue into a remote arbitrary code execution vulnerability.


[1] 
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=472

---End Message---
---BeginMessage---
Source: unrar-nonfree
Source-Version: 1:3.7.3-1

We believe that the bug you reported is fixed in the latest version of
unrar-nonfree, which is due to be installed in the Debian FTP archive:

unrar-nonfree_3.7.3-1.diff.gz
  to pool/non-free/u/unrar-nonfree/unrar-nonfree_3.7.3-1.diff.gz
unrar-nonfree_3.7.3-1.dsc
  to pool/non-free/u/unrar-nonfree/unrar-nonfree_3.7.3-1.dsc
unrar-nonfree_3.7.3.orig.tar.gz
  to pool/non-free/u/unrar-nonfree/unrar-nonfree_3.7.3.orig.tar.gz
unrar_3.7.3-1_amd64.deb
  to pool/non-free/u/unrar-nonfree/unrar_3.7.3-1_amd64.deb
unrar_3.7.3-1_i386.deb
  to pool/non-free/u/unrar-nonfree/unrar_3.7.3-1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Martin Meredith [EMAIL PROTECTED] (supplier of updated unrar-nonfree package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 12 Feb 2007 02:47:55 +
Source: unrar-nonfree
Binary: unrar
Architecture: amd64 i386 source 
Version: 1:3.7.3-1
Distribution: unstable
Urgency: high
Maintainer: Martin Meredith [EMAIL PROTECTED]
Changed-By: Martin Meredith [EMAIL PROTECTED]
Description: 
 unrar  - Unarchiver for .rar files (non-free version)
Closes: 410580
Changes: 
 unrar-nonfree (1:3.7.3-1) unstable; urgency=high
 .
   * New upstream release (Closes: #410580)
Files: 
 0aa5df1e268eace4f2bd0932fc59d6a1 129328 non-free/utils optional 
unrar-nonfree_3.7.3.orig.tar.gz
 323ad6490b22e4ef6916f59cc7977380 96966 non-free/utils optional 
unrar_3.7.3-1_i386.deb
 c0a8487d0a5ab860a753027da8ba0ddc 4388 non-free/utils optional 
unrar-nonfree_3.7.3-1.diff.gz
 18a4653150fd01f2774deb30465a8629 589 non-free/utils optional 
unrar-nonfree_3.7.3-1.dsc
 e906d606f707468fc6feb8c91df222d3 96362 non-free/utils optional 
unrar_3.7.3-1_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFz+K5AQwuptkwlkQRAgIdAJ9A3aOCaPFsojfHemLBnu21a+xEngCeI3bR
ce6S/vr1oATF/9Ty/Li4IsI=
=ZhHW
-END PGP SIGNATURE-

---End Message---


Bug#410582: marked as done (CVE-2007-0855: Stack-based buffer overflow in Unrar)

2007-02-11 Thread Debian Bug Tracking System
Your message dated Mon, 12 Feb 2007 04:17:03 +
with message-id [EMAIL PROTECTED]
and subject line Bug#410582: fixed in rar 1:3.7b1-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: unrar
Version: 1:3.7.2-1
Severity: critical
Tags: security



From CVE-2007-0855:

Stack-based buffer overflow in RARLabs Unrar, as packaged in WinRAR and
possibly other products, allows user-assisted remote attackers to execute
arbitrary code via a crafted, password-protected archive.

See [1] for details. On the day of the public release of the advisory, unrar
3.7.3 has been released, which implies that version 3.7.2 is vulnerable (there
is no detailed changelog, however).

A new rar version has also been released.

Severity critical because rar or unrar is called by amavisd-new in its default
configuration (with parameter -p- to suppress password input), which probably
turns this issue into a remote arbitrary code execution vulnerability.


[1] 
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=472

---End Message---
---BeginMessage---
Source: rar
Source-Version: 1:3.7b1-1

We believe that the bug you reported is fixed in the latest version of
rar, which is due to be installed in the Debian FTP archive:

rar_3.7b1-1.diff.gz
  to pool/non-free/r/rar/rar_3.7b1-1.diff.gz
rar_3.7b1-1.dsc
  to pool/non-free/r/rar/rar_3.7b1-1.dsc
rar_3.7b1-1_amd64.deb
  to pool/non-free/r/rar/rar_3.7b1-1_amd64.deb
rar_3.7b1-1_i386.deb
  to pool/non-free/r/rar/rar_3.7b1-1_i386.deb
rar_3.7b1.orig.tar.gz
  to pool/non-free/r/rar/rar_3.7b1.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Martin Meredith [EMAIL PROTECTED] (supplier of updated rar package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 12 Feb 2007 02:59:57 +
Source: rar
Binary: rar
Architecture: amd64 i386 source 
Version: 1:3.7b1-1
Distribution: unstable
Urgency: high
Maintainer: Martin Meredith [EMAIL PROTECTED]
Changed-By: Martin Meredith [EMAIL PROTECTED]
Description: 
 rar- Archiver for .rar files
Closes: 410582
Changes: 
 rar (1:3.7b1-1) unstable; urgency=high
 .
   * New upstream release (Closes: #410582)
Files: 
 422ab98779a8bc3e46daba15e97c8f5f 267472 non-free/utils optional 
rar_3.7b1-1_i386.deb
 92df6d36aa97d48150fe7ad661a69e52 267248 non-free/utils optional 
rar_3.7b1-1_amd64.deb
 e3513d790d0e590175467d2a35929522 7791 non-free/utils optional 
rar_3.7b1-1.diff.gz
 5a814f0e746c8568fe311c5d84adabb1 568 non-free/utils optional rar_3.7b1-1.dsc
 f9313410e1f9d223c40e75d7207c6f0a 769033 non-free/utils optional 
rar_3.7b1.orig.tar.gz

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFz+ZYAQwuptkwlkQRAi1aAJ9tkW/TGv6sngcQvocOIDlISg301ACdEsv8
Ip3ahR9k3YqoCbhrHr3aFZQ=
=6NN+
-END PGP SIGNATURE-

---End Message---


Bug#407460: USB ethernet interface renamed after installation on NSLU2 which causes the system to be inaccessible

2007-02-11 Thread Gordon Farquharson

Hi Marco

On 2/10/07, Gordon Farquharson [EMAIL PROTECTED] wrote:


On 1/18/07, Martin Michlmayr [EMAIL PROTECTED] wrote:

 Well, I still believe this is a problem with udev.  CCing Marco.


I just tested a patch [1,2] that was applied to udev to fix the
network interface renaming code to see if it would solve this bug, but
no luck. The USB ethernet adapter is still (most often) renamed
eth1_rename despite the rule to name it eth0 in
/etc/udev/rules.d/z25_persistent-net.rules.

Gordon

[1] 
http://git.kernel.org/git/?p=linux/hotplug/udev.git;a=commitdiff;h=ca714ef70e549aad486a62f4d6ef849572e3a7f1
[2] http://marc.theaimsgroup.com/?l=linux-hotplug-develm=116956926523008w=2

--
Gordon Farquharson


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#398535: apache2.2-common: missing dep on procps

2007-02-11 Thread Steve Langasek
tags 398535 patch
thanks

Hi folks,

I've prepared an NMU to fix this RC bug.  The short diff is attached; I'll
be uploading shortly to incoming.

Thanks,
-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/
diff -u apache2-2.2.3/debian/changelog apache2-2.2.3/debian/changelog
--- apache2-2.2.3/debian/changelog
+++ apache2-2.2.3/debian/changelog
@@ -1,3 +1,12 @@
+apache2 (2.2.3-3.3) unstable; urgency=high
+
+  * Non-maintainer upload.
+  * High-urgency upload for RC bugfix.
+  * apache2.2-common should depend on procps, since it will fail to create
+httpd.conf if it's not installed.  Closes: #398535.
+
+ -- Steve Langasek [EMAIL PROTECTED]  Mon,  5 Feb 2007 01:55:57 -0800
+
 apache2 (2.2.3-3.2) unstable; urgency=high
 
   * Non-maintainer upload.
diff -u apache2-2.2.3/debian/control apache2-2.2.3/debian/control
--- apache2-2.2.3/debian/control
+++ apache2-2.2.3/debian/control
@@ -8,7 +8,7 @@
 
 Package: apache2.2-common
 Architecture: any
-Depends: ${misc:Depends}, apache2-utils, net-tools, libmagic1, mime-support, lsb-base
+Depends: ${misc:Depends}, apache2-utils, net-tools, libmagic1, mime-support, lsb-base, procps
 Conflicts: apache2-common, libapache2-mod-php5 (= 5.1.6-3), libapache2-mod-php4 (= 4:4.4.4-2), libapache2-mod-mime-xattr (= 0.3-2), libapache2-mod-mono (= 1.1.17-3), libapache2-mod-proxy-html (= 2.4.3-2), libapache2-mod-scgi (= 1.11-1), libapache2-mod-speedycgi (= 2.22-3), libapache2-modxslt (= 2005072700-1), libapache2-redirtoservername (= 0.1-1), libapache2-webauth (= 3.5.3-1), libapache2-webkdc (= 3.5.3-1)
 Replaces: apache2-common
 Description: Next generation, scalable, extendable web server


Processed: Re: apache2.2-common: missing dep on procps

2007-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 398535 patch
Bug#398535: apache2: httpd.conf not shipped, but referenced by apache2.conf, 
causing /usr/sbin/apache2ctl configtest
There were no tags set.
Bug#408282: apache2.2-common: missing dep on procps
Tags added: patch

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#398535: marked as done (apache2: httpd.conf not shipped, but referenced by apache2.conf, causing /usr/sbin/apache2ctl configtest)

2007-02-11 Thread Debian Bug Tracking System
Your message dated Mon, 12 Feb 2007 05:47:03 +
with message-id [EMAIL PROTECTED]
and subject line Bug#398535: fixed in apache2 2.2.3-3.3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: apache2
Version: 2.2.3-3
Severity: important
Usertags: grid5000

Hi,

/etc/apache2/httpd.conf is no longer shipped, but is referenced in
/etc/apache2/apache2.conf. This causes /usr/sbin/apache2ctl configtest
to fail:
# /usr/sbin/apache2ctl configtest
apache2: Syntax error on line 189 of /etc/apache2/apache2.conf: Could
not open configuration file /etc/apache2/httpd.conf: No such file or
directory

It also prevents some other packages to install correctly
(e.g torrus-apache2).
-- 
| Lucas Nussbaum
| [EMAIL PROTECTED]   http://www.lucas-nussbaum.net/ |
| jabber: [EMAIL PROTECTED] GPG: 1024D/023B3F4F |

---End Message---
---BeginMessage---
Source: apache2
Source-Version: 2.2.3-3.3

We believe that the bug you reported is fixed in the latest version of
apache2, which is due to be installed in the Debian FTP archive:

apache2-doc_2.2.3-3.3_all.deb
  to pool/main/a/apache2/apache2-doc_2.2.3-3.3_all.deb
apache2-mpm-event_2.2.3-3.3_i386.deb
  to pool/main/a/apache2/apache2-mpm-event_2.2.3-3.3_i386.deb
apache2-mpm-perchild_2.2.3-3.3_all.deb
  to pool/main/a/apache2/apache2-mpm-perchild_2.2.3-3.3_all.deb
apache2-mpm-prefork_2.2.3-3.3_i386.deb
  to pool/main/a/apache2/apache2-mpm-prefork_2.2.3-3.3_i386.deb
apache2-mpm-worker_2.2.3-3.3_i386.deb
  to pool/main/a/apache2/apache2-mpm-worker_2.2.3-3.3_i386.deb
apache2-prefork-dev_2.2.3-3.3_i386.deb
  to pool/main/a/apache2/apache2-prefork-dev_2.2.3-3.3_i386.deb
apache2-src_2.2.3-3.3_all.deb
  to pool/main/a/apache2/apache2-src_2.2.3-3.3_all.deb
apache2-threaded-dev_2.2.3-3.3_i386.deb
  to pool/main/a/apache2/apache2-threaded-dev_2.2.3-3.3_i386.deb
apache2-utils_2.2.3-3.3_i386.deb
  to pool/main/a/apache2/apache2-utils_2.2.3-3.3_i386.deb
apache2.2-common_2.2.3-3.3_i386.deb
  to pool/main/a/apache2/apache2.2-common_2.2.3-3.3_i386.deb
apache2_2.2.3-3.3.diff.gz
  to pool/main/a/apache2/apache2_2.2.3-3.3.diff.gz
apache2_2.2.3-3.3.dsc
  to pool/main/a/apache2/apache2_2.2.3-3.3.dsc
apache2_2.2.3-3.3_all.deb
  to pool/main/a/apache2/apache2_2.2.3-3.3_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Steve Langasek [EMAIL PROTECTED] (supplier of updated apache2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon,  5 Feb 2007 01:55:57 -0800
Source: apache2
Binary: apache2-utils apache2-prefork-dev apache2 apache2-mpm-prefork 
apache2-doc apache2-mpm-event apache2.2-common apache2-mpm-worker apache2-src 
apache2-threaded-dev apache2-mpm-perchild
Architecture: source all i386
Version: 2.2.3-3.3
Distribution: unstable
Urgency: high
Maintainer: Debian Apache Maintainers debian-apache@lists.debian.org
Changed-By: Steve Langasek [EMAIL PROTECTED]
Description: 
 apache2- Next generation, scalable, extendable web server
 apache2-doc - documentation for apache2
 apache2-mpm-event - Event driven model for Apache HTTPD 2.1
 apache2-mpm-perchild - Transitional package - please remove
 apache2-mpm-prefork - Traditional model for Apache HTTPD 2.1
 apache2-mpm-worker - High speed threaded model for Apache HTTPD 2.1
 apache2-prefork-dev - development headers for apache2
 apache2-src - Apache source code
 apache2-threaded-dev - development headers for apache2
 apache2-utils - utility programs for webservers
 apache2.2-common - Next generation, scalable, extendable web server
Closes: 398535
Changes: 
 apache2 (2.2.3-3.3) unstable; urgency=high
 .
   * Non-maintainer upload.
   * High-urgency upload for RC bugfix.
   * apache2.2-common should depend on procps, since it will fail to create
 httpd.conf if it's not installed.  Closes: #398535.
Files: 
 f4382fa80ca4906795233a042adfa931 1026 web optional apache2_2.2.3-3.3.dsc
 04b7d2eb20965eccc6eb1dc60abc552e 107327 web optional apache2_2.2.3-3.3.diff.gz
 6d835fef0803c39a09f5b53288b62c4c 930816 web optional 
apache2.2-common_2.2.3-3.3_i386.deb
 ff5cedcf5015a79cac1002ba40842e81 420588 web 

Bug#408282: marked as done (apache2.2-common: missing dep on procps)

2007-02-11 Thread Debian Bug Tracking System
Your message dated Mon, 12 Feb 2007 05:47:03 +
with message-id [EMAIL PROTECTED]
and subject line Bug#398535: fixed in apache2 2.2.3-3.3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: torrus-apache2
Version: 1.0.4-1
Severity: serious
Usertags: grid5000 piuparts

Hi,

During a piuparts run over all the packages in etch, I ran into a
problem with your package:

Setting up torrus-common (1.0.4-1) ...
Not starting Torrus collector daemons as no configured trees found.
Not starting Torrus monitor daemons as no configured trees found.

Setting up torrus-apache2 (1.0.4-1) ...
dpkg: error processing torrus-apache2 (--configure):
 subprocess post-installation script returned error exit status 4
Errors were encountered while processing:
 torrus-apache2
E: Sub-process /usr/bin/dpkg returned an error code (1)

This is caused by the fact that apache2ctl configtest fails (bug #398535).
-- 
| Lucas Nussbaum
| [EMAIL PROTECTED]   http://www.lucas-nussbaum.net/ |
| jabber: [EMAIL PROTECTED] GPG: 1024D/023B3F4F |

---End Message---
---BeginMessage---
Source: apache2
Source-Version: 2.2.3-3.3

We believe that the bug you reported is fixed in the latest version of
apache2, which is due to be installed in the Debian FTP archive:

apache2-doc_2.2.3-3.3_all.deb
  to pool/main/a/apache2/apache2-doc_2.2.3-3.3_all.deb
apache2-mpm-event_2.2.3-3.3_i386.deb
  to pool/main/a/apache2/apache2-mpm-event_2.2.3-3.3_i386.deb
apache2-mpm-perchild_2.2.3-3.3_all.deb
  to pool/main/a/apache2/apache2-mpm-perchild_2.2.3-3.3_all.deb
apache2-mpm-prefork_2.2.3-3.3_i386.deb
  to pool/main/a/apache2/apache2-mpm-prefork_2.2.3-3.3_i386.deb
apache2-mpm-worker_2.2.3-3.3_i386.deb
  to pool/main/a/apache2/apache2-mpm-worker_2.2.3-3.3_i386.deb
apache2-prefork-dev_2.2.3-3.3_i386.deb
  to pool/main/a/apache2/apache2-prefork-dev_2.2.3-3.3_i386.deb
apache2-src_2.2.3-3.3_all.deb
  to pool/main/a/apache2/apache2-src_2.2.3-3.3_all.deb
apache2-threaded-dev_2.2.3-3.3_i386.deb
  to pool/main/a/apache2/apache2-threaded-dev_2.2.3-3.3_i386.deb
apache2-utils_2.2.3-3.3_i386.deb
  to pool/main/a/apache2/apache2-utils_2.2.3-3.3_i386.deb
apache2.2-common_2.2.3-3.3_i386.deb
  to pool/main/a/apache2/apache2.2-common_2.2.3-3.3_i386.deb
apache2_2.2.3-3.3.diff.gz
  to pool/main/a/apache2/apache2_2.2.3-3.3.diff.gz
apache2_2.2.3-3.3.dsc
  to pool/main/a/apache2/apache2_2.2.3-3.3.dsc
apache2_2.2.3-3.3_all.deb
  to pool/main/a/apache2/apache2_2.2.3-3.3_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Steve Langasek [EMAIL PROTECTED] (supplier of updated apache2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon,  5 Feb 2007 01:55:57 -0800
Source: apache2
Binary: apache2-utils apache2-prefork-dev apache2 apache2-mpm-prefork 
apache2-doc apache2-mpm-event apache2.2-common apache2-mpm-worker apache2-src 
apache2-threaded-dev apache2-mpm-perchild
Architecture: source all i386
Version: 2.2.3-3.3
Distribution: unstable
Urgency: high
Maintainer: Debian Apache Maintainers debian-apache@lists.debian.org
Changed-By: Steve Langasek [EMAIL PROTECTED]
Description: 
 apache2- Next generation, scalable, extendable web server
 apache2-doc - documentation for apache2
 apache2-mpm-event - Event driven model for Apache HTTPD 2.1
 apache2-mpm-perchild - Transitional package - please remove
 apache2-mpm-prefork - Traditional model for Apache HTTPD 2.1
 apache2-mpm-worker - High speed threaded model for Apache HTTPD 2.1
 apache2-prefork-dev - development headers for apache2
 apache2-src - Apache source code
 apache2-threaded-dev - development headers for apache2
 apache2-utils - utility programs for webservers
 apache2.2-common - Next generation, scalable, extendable web server
Closes: 398535
Changes: 
 apache2 (2.2.3-3.3) unstable; urgency=high
 .
   * Non-maintainer upload.
   * High-urgency upload for RC bugfix.
   * apache2.2-common should depend on procps, since it will fail to create
 httpd.conf if it's not installed.  Closes: #398535.
Files: 
 f4382fa80ca4906795233a042adfa931 1026 web optional 

Bug#405240: Similar error while upgrading to splashy 0.3

2007-02-11 Thread Georg Wittenburg
Hi!

Not sure whether this is related, but during the upgrade to splashy 0.3 the 
same error is triggered and after the upgrade /lib/splashy still contains the 
some files as mentioned in this bug report.

Regards,
   Georg

-- 
Georg Wittenburg
http://page.mi.fu-berlin.de/~wittenbu/


pgpkGnTF8aIuS.pgp
Description: PGP signature


Bug#404876: Doesn't work on BlueWhite G3 either...

2007-02-11 Thread Rick Thomas
Previously I reported that my BlueWhite G3 Powermac didn't get the  
wigglies.  Apparently that was a lie.


I recently re-installed this machine and there there were!  So both  
my G3 machines (Beige OldWorld G3 and BW NewWorld G3) have this  
problem.


Has there been any progress lately?


Rick



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410561: [php-maint] Bug#410561: php5: multiple security issues fixed in php 5.2.1

2007-02-11 Thread sean finney
hey guys,

i should have some time to put forward on this starting wednesday or so.
i believe the folks at redhat are also in our position wrt php4 and have
been independently working on digging up the packages, so i threw
an email to the guy doing it.  hopefully that'll lower the burden just a
bit.


sean


signature.asc
Description: This is a digitally signed message part


Processed: Re: Allow newer rggobi into etch?

2007-02-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 400835 grave
Bug#400835: r-omegahat-ggobi: dead link in copyright + empty package?
Severity set to `grave' from `normal'

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]