Bug#410498: ntop: after recent upgrade can't login: SSL expired certificate?
severity 410498 normal thanks On Sun, Feb 11, 2007 at 02:22:09AM -0500, Yaroslav Halchenko wrote: Since I suspect that the cause is in SSL error mentioned below, and since shipped certificate is the one used on all the systems and no directions are given that it has to be replaced for ntop to function properly, I raised severity to grave. No, this is not grave. You shouldn't be depending on a package-provided private key for any SSL operations anyway, because it provides no real security when anyone else with a copy of the package can decrypt your web traffic. So by all rights, the fact that this certificate is broken should be considered a feature, not a bug. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410501: destar: Conf files are not saved if there's not writing access to zaptel.conf
Package: destar Version: 0.2.0-3 Severity: grave Tags: patch Justification: renders package unusable There was a bad conditional expresion on one dpatch file edited on last package upload. Here's the fix to the bug: --- zaptel.dpatch 2007-02-11 00:05:55.0 -0500 +++ zaptel.dpatch.patch 2007-02-11 01:59:41.0 -0500 @@ -12,7 +12,7 @@ for _fn,cnf in configlets.asterisk_configfiles: if _fn == 'op_server.cfg' and panelutils.isConfigured() != 1: continue -+ if not os.access(/etc/zaptel.conf, os.O_RDWR): ++ if _fn == 'zaptel.conf' and not os.access(/etc/zaptel.conf, os.O_RDWR): + continue try: cnf.write() -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-4-686 Locale: LANG=es_CO.UTF-8, LC_CTYPE=es_CO.UTF-8 (charmap=UTF-8) Versions of packages destar depends on: ii asterisk 1:1.2.14~dfsg-4 Open Source Private Branch Exchang ii python 2.4.4-2 An interactive high-level object-o ii python-medusa0.5.4+clean-1 Framework for implementing asynchr ii python-pychart 1.39-5 Python library for creating high q ii python-pysqlite2 2.3.2-2 python interface to SQLite 3 ii python-quixote1 1.2-4 A highly Pythonic Web application ii sqlite3 3.3.8-1 A command line interface for SQLit Versions of packages destar recommends: ii op-panel 0.26.dfsg-5 switchboard type application for t -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#410498: ntop: after recent upgrade can't login: SSL expired certificate?
Processing commands for [EMAIL PROTECTED]: severity 410498 normal Bug#410498: ntop: after recent upgrade can't login: SSL expired certificate? Severity set to `normal' from `grave' thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410094: Bug#410079: hyphenation patterns distributed without license and copyright
severity 410079 important severity 410093 important severity 410094 important thanks On Wed, Feb 07, 2007 at 04:09:47PM +0100, Matthias Klose wrote: Many hyphenation patterns are distributed without copyright and license information. It seems that most patterns are copied from the Openoffice.org sources, where these files are now removed. As far as I'm aware, hyphenation rules for a language contain no significant creative element and as such are not subject to copyright. It's fine to credit the folks responsible for compiling these hyphenation rules into a usable form, and to respect their wishes regarding the use of those rules, but I don't see anything here that would warrant removing packages from a release. Thanks, -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#376812: If no progress, please let vlc know
Aside from supporting Kurt's request for a status update, I would like Guillem to take note that vlc maintainers should be informed if you don't expect to be able to fix this bug in time for Etch, due to vlc-plugin-glide. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410199: rawdog: Critical UnicodeDecodeError while writing.
severity 410199 important thanks On Thu, Feb 08, 2007 at 05:31:05PM +0300, Eugene Oleinik wrote: Package: rawdog Version: 2.10.dfsg.1-1 Severity: grave I'm encountering a critical error while trying to update and write news with rawdog. I'm sorry that rawdog isn't working for you. This bug doesn't make the package unusable for everyone, though; ascii-only RSS is a common case, and I don't think this package should be excluded from the release for not handling non-ASCII characters, so I'm downgrading this bug. A fix would certainly be accepted into etch for this if made available. Cheers, -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#410199: rawdog: Critical UnicodeDecodeError while writing.
Processing commands for [EMAIL PROTECTED]: severity 410199 important Bug#410199: rawdog: Critical UnicodeDecodeError while writing. Severity set to `important' from `grave' thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#409308: marked as done (casper should depend on 'file')
Your message dated Sun, 11 Feb 2007 09:17:03 + with message-id [EMAIL PROTECTED] and subject line Bug#409308: fixed in casper 1.77+debian-7 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: casper Version: 1.79+debian-1 Severity: serious /etc/rc0.d/S89casper attempts to use the 'file' command, but 'file' is not required by the package. ---End Message--- ---BeginMessage--- Source: casper Source-Version: 1.77+debian-7 We believe that the bug you reported is fixed in the latest version of casper, which is due to be installed in the Debian FTP archive: casper_1.77+debian-7.diff.gz to pool/main/c/casper/casper_1.77+debian-7.diff.gz casper_1.77+debian-7.dsc to pool/main/c/casper/casper_1.77+debian-7.dsc casper_1.77+debian-7_i386.deb to pool/main/c/casper/casper_1.77+debian-7_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Marco Amadori [EMAIL PROTECTED] (supplier of updated casper package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Thu, 8 Feb 2007 11:19:46 +0100 Source: casper Binary: casper Architecture: source i386 Version: 1.77+debian-7 Distribution: testing Urgency: medium Maintainer: Debian Live debian-live-devel@lists.alioth.debian.org Changed-By: Marco Amadori [EMAIL PROTECTED] Description: casper - Debian Live initramfs generator Closes: 409308 Changes: casper (1.77+debian-7) testing; urgency=medium . * Backported two 1 line fixes (both serious bugs) from casper-1.79+debian-1 and casper-1.79+debian-3: - It now depends also on file (Closes: #409308). - Fix DEFCONSOLE for autoserial console, thanks to Alex Owen [EMAIL PROTECTED]. Files: 6ff1086a52eac33db035d39d15929beb 693 misc extra casper_1.77+debian-7.dsc 2bb5ce09773581f6e8899f01bcdc5bd2 38865 misc extra casper_1.77+debian-7.diff.gz 82292e5cc0e740bc938ad599241adbd0 49992 misc extra casper_1.77+debian-7_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFFywAb+C5cwEsrK54RAkHlAJ0ZIns/pHaOcuu8scdT9wqEhDIKiwCgyfy8 m/48+2XdcytsxV3ZNOl4i18= =4Pu9 -END PGP SIGNATURE- ---End Message---
Bug#410093: Bug#410079: hyphenation patterns distributed without license and copyright
* Steve Langasek [EMAIL PROTECTED] [2007-02-11 00:37:31 -0800]: severity 410079 important severity 410093 important severity 410094 important thanks On Wed, Feb 07, 2007 at 04:09:47PM +0100, Matthias Klose wrote: Many hyphenation patterns are distributed without copyright and license information. It seems that most patterns are copied from the Openoffice.org sources, where these files are now removed. As far as I'm aware, hyphenation rules for a language contain no significant creative element and as such are not subject to copyright. It's fine to credit the folks responsible for compiling these hyphenation rules into a usable form, and to respect their wishes regarding the use of those rules, but I don't see anything here that would warrant removing packages from a release. Thanks, -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ Steve, I've forwarded Matthias's report upstream and as far as the relevant folks have been able to check those files are dfsg-free and the only problem seems to be the wording in the readme files. All word list files were originally taken from the openoffice distribution and those that differ from the oo have licensing information. Thank you for stepping in and saying a word about the RC status. I will finish pulling info from upstream to adjust the copyright statement, but I also believe that this issue is not release-critical. Regards, Alex. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410507: pike7.7_7.7.24-1(experimental/amd64/xenophanes): Depends on non-existing package libmysqlclient10-dev
Package: pike7.7 Version: 7.7.24-1 Severity: serious Tags: experimental Heya, Trying to build the version of pike7.7 shows this: Automatic build of pike7.7_7.7.24-1 on xenophanes by sbuild/amd64 98-farm Build started at 20070207-1830 ** Checking available source versions... Fetching source files... Reading Package Lists... Building Dependency Tree... Need to get 19.7MB of source archives. Get:1 http://sinclair.farm.ftbfs.de experimental/main pike7.7 7.7.24-1 (dsc) [1547B] Get:2 http://sinclair.farm.ftbfs.de experimental/main pike7.7 7.7.24-1 (tar) [19.6MB] Get:3 http://sinclair.farm.ftbfs.de experimental/main pike7.7 7.7.24-1 (diff) [25.6kB] Fetched 19.7MB in 0s (26.6MB/s) Download complete and in download only mode ** Using build dependencies supplied by package: Build-Depends: debhelper ( 4.0.0), libgdbm-dev, libgmp3-dev, libz-dev, libjpeg-dev, libttf-dev, libmysqlclient10-dev, libreadline-dev, perl, bison, debhelper, freeglut3-dev (= 2.2.0-6.1) [alpha hppa] | libglut3-dev, freeglut3-dev [!alpha !hppa] | libglut3-dev, xlibmesa-glu-dev | libglu-dev, xlibmesa-gl-dev | libgl-dev, libxpm-dev, gnome-devel, libgtkxmhtml-dev, libfreetype6-dev, autoconf, libiodbc2-dev, libsane-dev, postgresql-dev, librsvg2-dev, libsdl-mixer1.2-dev, libsdl1.2-dev, libperl-dev, sharutils, libpng3-dev, gtkglarea5-dev, libtiff4-dev, bc, libpcre3-dev, libbz2-dev, libnettle-dev, libsqlite3-dev, libfuse-dev, libglade0-dev, fftw3-dev, pkg-config Please either remove the libmysqlclient10-dev build-dep (and use 15 instead) or remove it from the archive. Thanks, Marc -- Fachbegriffe der Informatik - Einfach erklärt 23: Codefreeze Linux Kernel Patch v1.3, patch-1.3.94 (00/55) (Kristian Köhntopp) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410497: sparc32 kernel is too big, fails to boot
On Sat, Feb 10, 2007 at 10:54:15PM -0800, Jurij Smakov wrote: The config variable CONFIG_DEBUG_FS, enabled recently for all kernel flavours adds over 400K to the size of the compressed image size on sparc32. As a result, it does not boot anymore (uncompressed image does not fit into the allotted space). The change was commited one month ago and we had test builds since this. You said yourself that it changes the abi so it now up to you to decide what to do: - Remove it and don't support sparc32 with this etch kernel. - Change the abi without the abiname. Bastian -- Leave bigotry in your quarters; there's no room for it on the bridge. -- Kirk, Balance of Terror, stardate 1709.2 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: tagging bugs that are closed by packages in NEW as pending
Processing commands for [EMAIL PROTECTED]: # the following bugs are closed by packages in NEW # tags 296840 pending Bug#296840: armagetron server DOS by fake players (CAN-2005-0371) Tags were: security Tags added: pending tags 311736 pending Bug#311736: armagetron: Grammar error Tags were: fixed Tags added: pending tags 312905 pending Bug#312905: armagetron: no hints in menu file There were no tags set. Tags added: pending tags 318998 pending Bug#318998: FTBFS: C++ errors Tags were: fixed patch Tags added: pending tags 325101 pending Bug#325101: armagetron: New upstream version available There were no tags set. Tags added: pending tags 325110 pending Bug#325110: armagetron: NMU to fix C++ ABI issue and a few others There were no tags set. Tags added: pending tags 379062 pending Bug#379062: armagetron: CVE-2006-3673 and CVE-2006-3674: remote denial of service Tags were: security Tags added: pending tags 410021 pending Bug#410021: ITP: gkrelltop -- Plugin for gkrellm to display the top three intensive processes There were no tags set. Tags added: pending tags 410502 pending Bug#410502: ITP: libcm -- Support code for compositing managers There were no tags set. Tags added: pending thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Bug#374355: linux-sound-base: apparent missing dependency on module-init-tools
Processing commands for [EMAIL PROTECTED]: severity 374355 serious Bug#374355: linux-sound-base: apparent missing dependency on module-init-tools Severity set to `serious' from `normal' thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: r622 - in pear/php-xml-util/trunk: . XML_Util-1.1.1 debian
Processing commands for [EMAIL PROTECTED]: tags 318484 pending Bug#318484: ITP: php-xml-util -- module PEAR with XML utility There were no tags set. Tags added: pending tags 359627 pending Bug#359627: php-xml-util: Conflicts with php-pear package There were no tags set. Tags added: pending tags 375566 pending Bug#375566: php-xml-util doesn't add Util.php needed by php-xml-serializer There were no tags set. Tags added: pending thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: r617 - in pear/php-net-checkip/trunk: . debian
Processing commands for [EMAIL PROTECTED]: tags 329661 pending Bug#329661: ITP: php-net-checkip -- check the syntax of IPv4 addresses There were no tags set. Tags added: pending tags 332614 pending Bug#332614: 'please update the license text' There were no tags set. Tags added: pending tags 337898 pending Bug#337898: php-net-checkip: debian/copyright is missing a copy of the license There were no tags set. Tags added: pending tags 354353 pending Bug#354353: php-net-checkip: FTBFS: no available versions of package php-pear can satisfy version requirements Tags were: patch Tags added: pending thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410531: gpe-calendar: Failed to open files in /usr/share/pixmaps/
Package: gpe-calendar Version: 0.72-1 Severity: grave Justification: renders package unusable [EMAIL PROTECTED]:~$ LANG=C gpe-calendar GPE-ERROR: Failed to open file '/usr/share/pixmaps//day_view.png': No such file or directory GPE-ERROR: Failed to open file '/usr/share/pixmaps//week_view.png': No such file or directory GPE-ERROR: Failed to open file '/usr/share/pixmaps//month_view.png': No such file or directory GPE-ERROR: Failed to open file '/usr/share/pixmaps//bell.png': No such file or directory GPE-ERROR: Failed to open file '/usr/share/pixmaps//recur.png': No such file or directory GPE-ERROR: Failed to open file '/usr/share/pixmaps//bell_recur.png': No such file or directory Installed with 'aptitude -t experimental install gpe-calendar' -- System Information: Debian Release: 4.0 APT prefers testing APT policy: (990, 'testing'), (99, 'unstable'), (9, 'experimental'), (1, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-3-xen-k7 Locale: LANG=uk_UA.UTF-8, LC_CTYPE=uk_UA.UTF-8 (charmap=UTF-8) Versions of packages gpe-calendar depends on: ii libatk1.0-0 1.12.4-1The ATK accessibility toolkit ii libc62.5-0exp3 GNU C Library: Shared libraries ii libcairo21.2.6-1 The Cairo 2D vector graphics libra ii libdbus-1-3 1.0.2-1 simple interprocess messaging syst ii libdbus-glib-1-2 0.72-4 simple interprocess messaging syst ii libeventdb0 0.21-1 library that provides access to gp ii libfontconfig1 2.4.2-1 generic font configuration library ii libglib2.0-0 2.12.9-2The GLib library of C routines ii libgpepimc0 0.6-1 category management for GPE applic ii libgpeschedule0 0.16-2 scheduling library for GPE ii libgpevtype0 0.16-2 data interchange library for GPE a ii libgpewidget10.114-2 GPE Palmtop Environment widget lib ii libgtk2.0-0 2.10.7-1The GTK+ graphical user interface ii libmimedir-gnome0.3 0.3.1-1 MIME Directory Profile implementat ii libpango1.0-01.14.8-5Layout and rendering of internatio ii libsqlite0 2.8.17-2SQLite shared library ii libx11-6 2:1.1.1-1 X11 client-side library ii libxcursor1 1.1.7-4 X cursor management library ii libxext6 1:1.0.3-1 X11 miscellaneous extension librar ii libxfixes3 1:4.0.1-5 X11 miscellaneous 'fixes' extensio ii libxi6 1:1.1.0-1 X11 Input extension library ii libxinerama1 1:1.0.1-4.1 X11 Xinerama extension library ii libxrandr2 2:1.1.0.2-5 X11 RandR extension library ii libxrender1 1:0.9.1-3 X Rendering Extension client libra ii libxsettings-client0 0.17-1 utility functions for the Xsetting gpe-calendar recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410531: gpe-calendar: Failed to open files in /usr/share/pixmaps/
On Sun, 11 Feb 2007 16:02:32 +0200 Mykola A. Nickishov [EMAIL PROTECTED] wrote: Package: gpe-calendar Version: 0.72-1 [EMAIL PROTECTED]:~$ LANG=C gpe-calendar GPE-ERROR: Failed to open file '/usr/share/pixmaps//day_view.png': No such file or directory GPE-ERROR: Failed to open file '/usr/share/pixmaps//week_view.png': No such file or directory GPE-ERROR: Failed to open file '/usr/share/pixmaps//month_view.png': No such file or directory GPE-ERROR: Failed to open file '/usr/share/pixmaps//bell.png': No such file or directory GPE-ERROR: Failed to open file '/usr/share/pixmaps//recur.png': No such file or directory GPE-ERROR: Failed to open file '/usr/share/pixmaps//bell_recur.png': No such file or directory Those are part of gpe-icons - I'm testing v0.72-3 now but could you check to see if installing gpe-icons from unstable fixes these reports? Thanks. -- Neil Williams = http://www.data-freedom.org/ http://www.nosoftwarepatents.com/ http://www.linux.codehelp.co.uk/ pgpULlnzPLue6.pgp Description: PGP signature
Bug#410538: xine-lib_1.1.4-2(sparc/experimental): FTBFS: ffmpeg_config.h: No such file or directory
Package: xine-lib Version: 1.1.4-2 Severity: serious Hi, your package failed to build from source on sparc in experimental. The error seems to be specific to this architecture, since it build successfully on all other architectures. Note that adding -I../.. to the commandline of the failing command lets it succeed. | Automatic build of xine-lib_1.1.4-2 on odin by sbuild/sparc 98-farm | Build started at 20070211-1506 | ** | Checking available source versions... | Fetching source files... | Reading Package Lists... | Building Dependency Tree... | Need to get 8623kB of source archives. | Get:1 http://ftp.de.debian.org experimental/main xine-lib 1.1.4-2 (dsc) [1200B] | Get:2 http://ftp.de.debian.org experimental/main xine-lib 1.1.4-2 (tar) [8604kB] | Get:3 http://ftp.de.debian.org experimental/main xine-lib 1.1.4-2 (diff) [17.7kB] | Fetched 8623kB in 7s (1086kB/s) | Download complete and in download only mode | ** Using build dependencies supplied by package: | Build-Depends: debhelper (= 5.0.1), binutils (= 2.12.90.0.9), pkg-config, libxinerama-dev, libxv-dev, libxvmc-dev, libxt-dev, libasound2-dev [!kfreebsd-i386 !kfreebsd-amd64 !hurd-i386], libaa1-dev, libcaca-dev, libmodplug-dev, libmagick9-dev, libpng12-dev, libfreetype6-dev, libogg-dev, libvorbis-dev, libtheora-dev, libesd0-dev, libgnomevfs2-dev, zlib1g-dev, libartsc0-dev, liblircclient-dev, libflac-dev, libpulse-dev, libsdl1.2-dev, libsmbclient-dev, libspeex-dev, libmng-dev, libmad0-dev, libcdio-dev (= 0.76-1), w3m, transfig, gs, sgmltools-lite | Warning: | The following central src deps are (probably) missing: | slang1-dev, xlibs-dev ( 4.1.0) | Checking for already installed source dependencies... | debhelper: missing | Using default version 5.0.42 | binutils: already installed (2.17.20070103cvs-2 = 2.12.90.0.9 is satisfied) | pkg-config: missing | libxinerama-dev: missing | libxv-dev: missing | libxvmc-dev: missing | libxt-dev: missing | libasound2-dev: missing | libaa1-dev: missing | libcaca-dev: missing | libmodplug-dev: missing | libmagick9-dev: missing | libpng12-dev: missing | libfreetype6-dev: missing | libogg-dev: missing | libvorbis-dev: missing | libtheora-dev: missing | libesd0-dev: missing | libgnomevfs2-dev: missing | zlib1g-dev: missing | libartsc0-dev: missing | liblircclient-dev: missing | libflac-dev: missing | libpulse-dev: missing | libsdl1.2-dev: missing | libsmbclient-dev: missing | libspeex-dev: missing | libmng-dev: missing | libmad0-dev: missing | libcdio-dev: missing | Using default version 0.76-1 | w3m: missing | transfig: missing | gs: missing | sgmltools-lite: missing | Checking for source dependency conflicts... [...] | gcc -DHAVE_CONFIG_H -I. -I. -I../../../.. -I../../../.. -I../../../../include -I../../../../include -I../../../../src -I../../../../src/xine-engine -I../../../../src/xine-engine -I../../../../src/xine-utils -I../../../../src/input -I../../../../src/input -I../../../../lib -I../../../../lib -DHAVE_AV_CONFIG_H -DRUNTIME_CPUDETECT -DXINE_MPEG_ENCODER -D_ISOC9X_SOURCE -DCONFIG_DECODERS -I../../../../src/libffmpeg/libavutil -fno-strict-aliasing -DNDEBUG -D_REENTRANT -D_FILE_OFFSET_BITS=64 -DXINE_COMPILE -O3 -finline-functions -Wall -Wnested-externs -Wcast-align -Wchar-subscripts -Wmissing-declarations -Wmissing-prototypes -g -mcpu=v9 -Wformat=2 -Wno-format-zero-length -Wmissing-format-attribute -Wstrict-aliasing=2 -MT dsputil_vis.lo -MD -MP -MF .deps/dsputil_vis.Tpo -c dsputil_vis.c -fPIC -DPIC -o .libs/dsputil_vis.o | In file included from ../dsputil.h:33, | from dsputil_vis.c:34: | ../../../../src/libffmpeg/libavutil/common.h:368:27: error: ffmpeg_config.h: No such file or directory | make[6]: *** [dsputil_vis.lo] Error 1 | make[6]: Leaving directory `/build/buildd/xine-lib-1.1.4/src/libffmpeg/libavcodec/sparc' | make[5]: Leaving directory `/build/buildd/xine-lib-1.1.4/src/libffmpeg/libavcodec' | make[4]: *** [all-recursive] Error 1 | make[4]: Leaving directory `/build/buildd/xine-lib-1.1.4/src/libffmpeg' | make[3]: *** [all-recursive] Error 1 | make[3]: Leaving directory `/build/buildd/xine-lib-1.1.4/src' | make[2]: *** [all-recursive] Error 1 | make[2]: Leaving directory `/build/buildd/xine-lib-1.1.4' | make[1]: *** [all] Error 2 | make[1]: Leaving directory `/build/buildd/xine-lib-1.1.4' | make: *** [build-stamp] Error 2 | ** | Build finished at 20070211-1529 | FAILED [dpkg-buildpackage died] Full build log(s): http://experimental.ftbfs.de/build.php?ver=1.1.4-2pkg=xine-libarch=sparc Gruesse, -- Frank Lichtenheld [EMAIL PROTECTED] www: http://www.djpig.de/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410537: FTBFS (alpha): XmlUniformiserTest::testAssertXmlEqual fails
Package: cppunit Version: 1.12.0-2 Severity: serious Justification: no longer builds from source cppunit fails to build on Alpha: [...] XmlUniformiserTest::testElementWithContent : OK XmlUniformiserTest::testElementsHierarchyWithContents : OK XmlUniformiserTest::testAssertXmlEqual/bin/sh: line 4: 3601 Aborted (core dumped) ${dir}$tst FAIL: cppunittestmain === 1 of 1 tests failed === make[4]: *** [check-TESTS] Error 1 make[4]: Leaving directory `/home/falk/cppunit-1.12.0/examples/cppunittest' Full log at http://buildd.debian.org/fetch.cgi?pkg=cppunitarch=alphaver=1.12.0-2stamp=1169836270 Falk -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: alpha Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.20 Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410531: gpe-calendar: Failed to open files in /usr/share/pixmaps/
On Sun, Feb 11, 2007 at 02:49:18PM +, Neil Williams wrote: Those are part of gpe-icons - I'm testing v0.72-3 now but could you check to see if installing gpe-icons from unstable fixes these reports? Yes, with gpe-icons problem goes away. -- MAN-UANIC -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410531: marked as done (gpe-calendar: Failed to open files in /usr/share/pixmaps/)
Your message dated Sun, 11 Feb 2007 16:17:03 + with message-id [EMAIL PROTECTED] and subject line Bug#410531: fixed in gpe-calendar 0.72-3 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: gpe-calendar Version: 0.72-1 Severity: grave Justification: renders package unusable [EMAIL PROTECTED]:~$ LANG=C gpe-calendar GPE-ERROR: Failed to open file '/usr/share/pixmaps//day_view.png': No such file or directory GPE-ERROR: Failed to open file '/usr/share/pixmaps//week_view.png': No such file or directory GPE-ERROR: Failed to open file '/usr/share/pixmaps//month_view.png': No such file or directory GPE-ERROR: Failed to open file '/usr/share/pixmaps//bell.png': No such file or directory GPE-ERROR: Failed to open file '/usr/share/pixmaps//recur.png': No such file or directory GPE-ERROR: Failed to open file '/usr/share/pixmaps//bell_recur.png': No such file or directory Installed with 'aptitude -t experimental install gpe-calendar' -- System Information: Debian Release: 4.0 APT prefers testing APT policy: (990, 'testing'), (99, 'unstable'), (9, 'experimental'), (1, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-3-xen-k7 Locale: LANG=uk_UA.UTF-8, LC_CTYPE=uk_UA.UTF-8 (charmap=UTF-8) Versions of packages gpe-calendar depends on: ii libatk1.0-0 1.12.4-1The ATK accessibility toolkit ii libc62.5-0exp3 GNU C Library: Shared libraries ii libcairo21.2.6-1 The Cairo 2D vector graphics libra ii libdbus-1-3 1.0.2-1 simple interprocess messaging syst ii libdbus-glib-1-2 0.72-4 simple interprocess messaging syst ii libeventdb0 0.21-1 library that provides access to gp ii libfontconfig1 2.4.2-1 generic font configuration library ii libglib2.0-0 2.12.9-2The GLib library of C routines ii libgpepimc0 0.6-1 category management for GPE applic ii libgpeschedule0 0.16-2 scheduling library for GPE ii libgpevtype0 0.16-2 data interchange library for GPE a ii libgpewidget10.114-2 GPE Palmtop Environment widget lib ii libgtk2.0-0 2.10.7-1The GTK+ graphical user interface ii libmimedir-gnome0.3 0.3.1-1 MIME Directory Profile implementat ii libpango1.0-01.14.8-5Layout and rendering of internatio ii libsqlite0 2.8.17-2SQLite shared library ii libx11-6 2:1.1.1-1 X11 client-side library ii libxcursor1 1.1.7-4 X cursor management library ii libxext6 1:1.0.3-1 X11 miscellaneous extension librar ii libxfixes3 1:4.0.1-5 X11 miscellaneous 'fixes' extensio ii libxi6 1:1.1.0-1 X11 Input extension library ii libxinerama1 1:1.0.1-4.1 X11 Xinerama extension library ii libxrandr2 2:1.1.0.2-5 X11 RandR extension library ii libxrender1 1:0.9.1-3 X Rendering Extension client libra ii libxsettings-client0 0.17-1 utility functions for the Xsetting gpe-calendar recommends no packages. -- no debconf information ---End Message--- ---BeginMessage--- Source: gpe-calendar Source-Version: 0.72-3 We believe that the bug you reported is fixed in the latest version of gpe-calendar, which is due to be installed in the Debian FTP archive: gpe-calendar_0.72-3.diff.gz to pool/main/g/gpe-calendar/gpe-calendar_0.72-3.diff.gz gpe-calendar_0.72-3.dsc to pool/main/g/gpe-calendar/gpe-calendar_0.72-3.dsc gpe-calendar_0.72-3_amd64.deb to pool/main/g/gpe-calendar/gpe-calendar_0.72-3_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Neil Williams [EMAIL PROTECTED] (supplier of updated gpe-calendar package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 11 Feb 2007 14:45:23 + Source: gpe-calendar Binary: gpe-calendar Architecture:
Bug#389579: marked as done (libapache-mod-auth-mysql: FTBFS against apache 2.2)
Your message dated Sun, 11 Feb 2007 16:17:05 + with message-id [EMAIL PROTECTED] and subject line Bug#389579: fixed in libapache-mod-auth-mysql 4.3.9-3 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: libapache-mod-auth-mysql Version: 4.3.9-2.1 Tags: patch Please update and test this package for use with Apache 2.2, which may go into sid and etch soon. The following patch may help. It allows the package to compile, but I did not test runtime functionality. Apache 2.2 is currently in experimental. Note that the authz / authn interface in Apache 2.2 has been updated somewhat, so the fact that an auth module compiles does not mean it works correctly and optimally. Peter Index: mod_auth_mysql.c --- mod_auth_mysql.c +++ mod_auth_mysql.c @@ -48,6 +48,7 @@ #include http_log.h #ifdef APACHE2 #include http_request.h /* for ap_hook_(check_user_id | auth_checker)*/ +#include apr_general.h #include apr_md5.h #include apr_sha1.h #else @@ -70,6 +71,10 @@ #define FALSE 0 #endif +#ifndef APR_XtOffsetOf +#define APR_XtOffsetOf APR_OFFSETOF +#endif + /* This are the system-wide config options; the more specific options live in * a mysql_auth_config_rec structure, one for each MySQL-configured directory. */ signature.asc Description: Digital signature ---End Message--- ---BeginMessage--- Source: libapache-mod-auth-mysql Source-Version: 4.3.9-3 We believe that the bug you reported is fixed in the latest version of libapache-mod-auth-mysql, which is due to be installed in the Debian FTP archive: libapache-mod-auth-mysql_4.3.9-3.diff.gz to pool/main/liba/libapache-mod-auth-mysql/libapache-mod-auth-mysql_4.3.9-3.diff.gz libapache-mod-auth-mysql_4.3.9-3.dsc to pool/main/liba/libapache-mod-auth-mysql/libapache-mod-auth-mysql_4.3.9-3.dsc libapache-mod-auth-mysql_4.3.9-3_i386.deb to pool/main/liba/libapache-mod-auth-mysql/libapache-mod-auth-mysql_4.3.9-3_i386.deb libapache2-mod-auth-mysql_4.3.9-3_i386.deb to pool/main/liba/libapache-mod-auth-mysql/libapache2-mod-auth-mysql_4.3.9-3_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Mario Iseli [EMAIL PROTECTED] (supplier of updated libapache-mod-auth-mysql package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 11 Feb 2007 14:04:10 +0100 Source: libapache-mod-auth-mysql Binary: libapache-mod-auth-mysql libapache2-mod-auth-mysql Architecture: source i386 Version: 4.3.9-3 Distribution: unstable Urgency: medium Maintainer: Debian QA Group [EMAIL PROTECTED] Changed-By: Mario Iseli [EMAIL PROTECTED] Description: libapache-mod-auth-mysql - Apache module for MySQL authentication libapache2-mod-auth-mysql - Apache 2 module for MySQL authentication Closes: 389579 Changes: libapache-mod-auth-mysql (4.3.9-3) unstable; urgency=medium . * QA Upload * Set maintainer to Debian QA Group [EMAIL PROTECTED]. * apache2 module depends now on apache2.2-common. * Removed the ,,changes* directories from the diff.gz. * Use now make distclean instead of make clean in debian/rules. * Build-depend now on dpatch. * Build-depend now on debhelper 5 instead of 4. * Converted the patches to dpatch. * Applied a patch to fix FTBFS against apache2.2 (Closes: #389579). Thanks to Julian Calaby for the patch. Files: 46885decf180bc5728563430d1643a45 741 web optional libapache-mod-auth-mysql_4.3.9-3.dsc 1c37eec26870642d09cdfb2d3b995772 8708 web optional libapache-mod-auth-mysql_4.3.9-3.diff.gz aa1548b2582023cdd5dc06886b6bc775 22052 web optional libapache-mod-auth-mysql_4.3.9-3_i386.deb 55b39246c46ae18a9ad3baf4a7da144e 22192 web optional libapache2-mod-auth-mysql_4.3.9-3_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFFzz7n+C5cwEsrK54RArCWAJ9OdLvf7f7duV+PY+XDgdtpYCvVGQCeKxb1 OQbwEEtrdwgLzmuVhm16nOs= =+JQ7 -END PGP SIGNATURE- ---End Message---
Processed: notfound 395858 in 0.56-1.1
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.9.27 notfound 395858 0.56-1.1 Bug#395858: libfile-homedir-perl: FTBFS: tests failed Bug marked as not found in version 0.56-1.1. (By the way, this Bug is currently marked as done.) End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410463: [Pkg-octave-devel] Bug#410463: octave2.9-forge: FTBFS: error: invalid matrix index = 1
Hi, Am Samstag, 10. Februar 2007 21:38 schrieb Kurt Roeckx: Package: octave2.9 Version: 2.9.9-8 Severity: serious Hi, When trying to build octave2.9-forge version 2006.07.09+dfsg1-7 (on amd64) I get the following error: That bug is triggered by the fix for #410070. Can you look at fntests.log in the case of Octave 2.9.9-7 and confirm if it's full of ? XYZ does not exist in path messages? Thomas -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#409255: audacity - FTBFS: error: unrecognized command line option -msse
Hi, the problem is that the sse_optimized.cpp file NEEDS to be compiled with -msse on the i386 and amd64 archs. The runtime cpu detection system of the program will take care of actually using it or not depending on the cpu features. Joost -- The planet Andete is famous for it's killer edible poets. pgpV9ojAdhKYs.pgp Description: PGP signature
Bug#410497: sparc32 kernel is too big, fails to boot
On Sun, Feb 11, 2007 at 11:15:45AM +0100, Bastian Blank wrote: The change was commited one month ago and we had test builds since this. Yes, I should have tested it earlier, sorry about that. You said yourself that it changes the abi so it now up to you to decide what to do: - Remove it and don't support sparc32 with this etch kernel. - Change the abi without the abiname. I think that changing ABI without abiname bump is a more reasonable solution than dropping it completely. Impact would be pretty minor, given the number of people using sparc32. Best regards, -- Jurij Smakov [EMAIL PROTECTED] Key: http://www.wooyd.org/pgpkey/ KeyID: C99E03CC -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410435: imagemagick: Buffer overflow vulnerability in PALM coder. (CVE-2007-0770)
Daniel Kobras wrote: The attached patches fix a regression introduced while trying to plug CVE-2006-5456. It's due to a textbook example of a coding error that I cannot blame on anybody else but me. A malicious image file in PALM format can still circumvent a range check and cause a buffer overflow. Other vendors refer to this vulnerability as CVE-2007-0770. The new patch appears to originate from Vladimir Nadvornik, at least I dug it out of his OpenSuSE packages. I'll fix my own mess in unstable unless Ryuichi objects. As sarge is affected as well, I'd like to ask the security team to release another DSA. The debdiffs for both sid and sarge are attached. Thanks, update is building. Cheers, Moritz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: notfound 395858 in 0.64-1
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.9.27 notfound 395858 0.64-1 Bug#395858: libfile-homedir-perl: FTBFS: tests failed Bug marked as not found in version 0.64-1. (By the way, this Bug is currently marked as done.) End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410552: moinmoin-common: MoinMoin vulnerability
Package: moinmoin-common Version: 1.5.3-1.1 Severity: critical MoinMoin has a security hole, as you can see here: http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0206.html Please update the package. Cheers, Marcus Husar -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#400535: marked as done (coq_8.1~gamma-2(hppa/experimental): FTBFS: ocamlopt: command not found)
Your message dated Sun, 11 Feb 2007 18:32:04 + with message-id [EMAIL PROTECTED] and subject line Bug#400535: fixed in coq 8.1~gamma-4 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: coq Version: 8.1~gamma-2 Severity: serious Hi, your package failed to build from source because it couldn't find the ocamlopt command. I'm honestly not sure whether this is a bug in your build-depends or in ocaml-nox, which seems to have provided this command in the past, but doesn't do so anymore. | Automatic build of coq_8.1~gamma-2 on meitner by sbuild/hppa 79 | Build started at 20061126-1620 | ** | coq_8.1~gamma-2.dsc exists in cwd | ** Using build dependencies supplied by package: | Build-Depends: debhelper (= 4.0.0), dpkg-dev (= 1.13.19), dpatch, ocaml-nox (= 3.09.0), ocaml-best-compilers, liblablgtk2-ocaml-dev (= 2.4.0), tetex-extra, hevea | ** Filtered missing central deps that are dependencies of or provide build-deps: | libncurses5-dev (= 5.3.20030510-1) [...] | make[1]: Leaving directory `/build/buildd/coq-8.1~gamma' | NATIVE CODE COMPILATION FAILED | Coq was built in bytecode instead | /usr/bin/make glob.dump | make[1]: Entering directory `/build/buildd/coq-8.1~gamma' | rm -f glob.dump | rm -f theories/*/*.vo | /usr/bin/make GLOB=-dump-glob glob.dump world | make[2]: Entering directory `/build/buildd/coq-8.1~gamma' | OCAMLOPT config/coq_config.ml | /bin/sh: ocamlopt: command not found | make[2]: *** [config/coq_config.cmx] Error 127 | make[2]: Leaving directory `/build/buildd/coq-8.1~gamma' | make[1]: *** [glob.dump] Error 2 | make[1]: Leaving directory `/build/buildd/coq-8.1~gamma' | make: *** [build-stamp] Error 2 | ** | Build finished at 20061126-1809 | FAILED [dpkg-buildpackage died] Full build log(s): http://experimental.ftbfs.de/build.php?ver=8.1~gamma-2pkg=coqarch=hppa Gruesse, -- Frank Lichtenheld [EMAIL PROTECTED] www: http://www.djpig.de/ ---End Message--- ---BeginMessage--- Source: coq Source-Version: 8.1~gamma-4 We believe that the bug you reported is fixed in the latest version of coq, which is due to be installed in the Debian FTP archive: coq-libs_8.1~gamma-4_all.deb to pool/main/c/coq/coq-libs_8.1~gamma-4_all.deb coq_8.1~gamma-4.diff.gz to pool/main/c/coq/coq_8.1~gamma-4.diff.gz coq_8.1~gamma-4.dsc to pool/main/c/coq/coq_8.1~gamma-4.dsc coq_8.1~gamma-4_i386.deb to pool/main/c/coq/coq_8.1~gamma-4_i386.deb coqide_8.1~gamma-4_i386.deb to pool/main/c/coq/coqide_8.1~gamma-4_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Samuel Mimram [EMAIL PROTECTED] (supplier of updated coq package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 11 Feb 2007 18:02:49 +0100 Source: coq Binary: coqide coq-libs coq Architecture: source i386 all Version: 8.1~gamma-4 Distribution: experimental Urgency: low Maintainer: Debian OCaml Maintainers debian-ocaml-maint@lists.debian.org Changed-By: Samuel Mimram [EMAIL PROTECTED] Description: coq- proof assistant for higher-order logic (toplevel and compiler) coq-libs - proof assistant for higher-order logic (theories) coqide - proof assistant for higher-order logic (gtk interface) Closes: 400535 Changes: coq (8.1~gamma-4) experimental; urgency=low . * Correctly build glob.dump on non-native archs, closes: #400535. Files: 764fd9afaa2805b30dc28fa8cd99e3dc 945 math optional coq_8.1~gamma-4.dsc 5f7094afff6a0b0ef0586784694bdb90 14185 math optional coq_8.1~gamma-4.diff.gz cc7c480ef2568e7ec6138f0b5e54552e 14581038 math optional coq-libs_8.1~gamma-4_all.deb 64216e305953a33b4e99092a56d90a39 6307048 math optional coq_8.1~gamma-4_i386.deb 7394d1e7a8538d75a508ce5dee553961 4587346 math optional coqide_8.1~gamma-4_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFFz176Iae1O4AJae8RAig5AJwPcGDhdWe0E2Fa7yaxiFxs1nFh/ACeOQj5 zjmz3ij+6/FHCUhiAI99Mqs= =dD9B -END PGP SIGNATURE- ---End Message---
Bug#410554: stlport5.1_5.1.0-1(experimental/alpha/ds10): error: size of array '__static_assert' is negative
Package: stlport5.1 Version: 5.1.0-1 Severity: serious Tags: experimental Heya, stlport5.1 failed to build on alpha: Automatic build of stlport5.1_5.1.0-1 on ds10 by sbuild/alpha 98-farm Build started at 20070211-1039 ** [...] /usr/bin/make -C build/lib -f gcc.mak depend release-shared make[1]: Entering directory `/build/buildd/stlport5.1-5.1.0/build/lib' c++ -pthread -fexceptions -fident -fPIC -O2 -g -fuse-cxa-atexit -D_REENTRANT -D_STLP_REAL_LOCALE_IMPLEMENTED -D_GNU_SOURCE -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -I../../stlport -c -o obj/gcc/so/dll_main.o ../../src/dll_main.cpp ../../stlport/stl/_cwchar.h:114: error: size of array '__static_assert' is negative make[1]: *** [obj/gcc/so/dll_main.o] Error 1 make[1]: Leaving directory `/build/buildd/stlport5.1-5.1.0/build/lib' make: *** [debian/stamp-makefile-build] Error 2 Marc -- BOFH #25: Decreasing electron flux -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410557: /etc/dokuwiki/.htaccess doesn't exist in Debian package and allow access to acl and users
Package: dokuwiki Version: 0.0.20061106-1 Severity: critical Dokuwiki 2006-11-06 from the official page [1] contains the file conf/.htacces: conf/.htaccess - ## no access to the conf directory order allow,deny deny from all --- This .htaccess deny web access to files in conf directory (ACL's, users). But Debian package doesn't include it in /etc/dokuwiki so any user can see the ACL's and user list (name, mail, role, encripted password) by accessing to: http://dokuwiki_base/conf http://dokuwiki_base/conf/acl.auth.php http://dokuwiki_base/conf/users.auth.php I suggest to include the .htaccess file in /etc/dokuwiki. Note: The issue exists too in the experimental 0.0.20061106-2 version [2]. [1] Dokuwiki official download: http://www.splitbrain.org/projects/dokuwiki [2] Changelog in experimental 20061106-2 version: http://packages.debian.org/changelogs/pool/main/d/dokuwiki/dokuwiki_0.0.20061106-2/changelog [3] Related bug in Dokuwiki bug database: http://bugs.splitbrain.org/?do=detailsid=1076 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410463: [Pkg-octave-devel] Bug#410463: octave2.9-forge: FTBFS: error: invalid matrix index = 1
On Sun, Feb 11, 2007 at 05:49:31PM +0100, Thomas Weber wrote: Hi, Am Samstag, 10. Februar 2007 21:38 schrieb Kurt Roeckx: Package: octave2.9 Version: 2.9.9-8 Severity: serious Hi, When trying to build octave2.9-forge version 2006.07.09+dfsg1-7 (on amd64) I get the following error: That bug is triggered by the fix for #410070. Can you look at fntests.log in the case of Octave 2.9.9-7 and confirm if it's full of ? XYZ does not exist in path messages? with 2.9.9-7 it looks like: processing main/audio/clip.m ? main/audio/clip.m does not exist in path processing main/audio/soundsc.m ? main/audio/soundsc.m does not exist in path processing main/comm/awgn.m ? main/comm/awgn.m does not exist in path processing main/comm/genqammod.m [...] clip.m is at ./main/audio/clip.m Kurt -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410554: stlport5.1_5.1.0-1(experimental/alpha/ds10): error: size of array '__static_assert' is negative
Hi, thanks for reporting. On Sun, Feb 11, 2007 at 07:21:09PM +0100, Marc 'HE' Brockschmidt wrote: Package: stlport5.1 Version: 5.1.0-1 Severity: serious Tags: experimental Heya, stlport5.1 failed to build on alpha: [...] ../../stlport/stl/_cwchar.h:114: error: size of array '__static_assert' is negative This reminds me of a previous patch, possibly disabled. I'll have a look at next week. Thomas -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#409255: audacity - FTBFS: error: unrecognized command line option -msse
Hi, The addition of AC_CANONICAL_HOST case $host in amd64-*-*) LIBSSE_CFLAGS=-msse ;; i?86-*-*) LIBSSE_CFLAGS=-msse ;; *) LIBSSE_CFLAGS= ;; esac AC_SUBST([LIBSSE_CFLAGS]) to configure.ac of soundtouch and noinst_LTLIBRARIES = libsse.la libSoundTouch_la_LIBADD = libsse.la libsse_la_SOURCES = sse_optimized.cpp libsse_la_CXXFLAGS = -O3 $(LIBSSE_CFLAGS) -fcheck-new -I../../include to the Makefile.am of soundtouch/source/SoundTouch Seems to do the job for me. Joost -- The planet Andete is famous for it's killer edible poets. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410497: sparc32 kernel is too big, fails to boot
On Sunday 11 February 2007 18:21, Jurij Smakov wrote: I think that changing ABI without abiname bump is a more reasonable solution than dropping it completely. Impact would be pretty minor, given the number of people using sparc32. Note that this does mean that any packages containing kernel modules will/may need rebuilding on sparc. pgpGlGTY4oWcg.pgp Description: PGP signature
Bug#410561: php5: multiple security issues fixed in php 5.2.1
Package: php5 Version: 5.2.0-8 Severity: grave Tags: security Justification: user security hole PHP 5.2.1 fixes some security problems. See http://www.php.net/releases/5_2_1.php http://secunia.com/advisories/24089/ PHP 4.4 is affected by at least some of the issues, too. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410565: FTBFS (alpha): libtool: link: cannot find the library `/usr/local/lib/libstdc++.la'
Package: bmpx Version: 0.36.1-1 Severity: serious Justification: no longer builds from source bmpx does not build on Alpha: [...] /bin/sh ../libtool --tag=CXX --mode=link alpha-linux-gnu-g++ -g -O2-o bmp2-bin -Wl,--export-dynamicbmp2_bin-main.o bmp2_bin-debug.o bmp2_bin-logger.o bmp2_bin-network.o bmp2_bin-vfs.o bmp2_bin-database.o bmp2_bin-library.o bmp2_bin-play.o bmp2_bin-mbxml.o bmp2_bin-lyrics.o bmp2_bin-bookmarks.o bmp2_bin-lastfm.o bmp2_bin-amazon.o bmp2_bin-monitor.o bmp2_bin-util_file.o bmp2_bin-sanity.o bmp2_bin-signals.o bmp2_bin-uri++.o bmp2_bin-util.o bmp2_bin-md5.o bmp2_bin-xml.o bmp2_bin-audio.o bmp2_bin-service_core.o bmp2_bin-sm.o bmp2_bin-ui_toolbox.o bmp2_bin-button.o bmp2_bin-ui-banner-image.o bmp2_bin-xds.o bmp2_bin-stock.o bmp2_bin-popup.o bmp2_bin-taskdialog.o bmp2_bin-fs.o bmp2_bin-splash-screen.o bmp2_bin-dialog-add-podcast.o bmp2_bin-dialog-about.o bmp2_bin-dialog-export.o bmp2_bin-dialog-filelist.o bmp2_bin-dialog-gsterror.o bmp2_bin-dialog-lyrics.o bmp2_bin-dialog-progress.o bmp2_bin-preferences-ui.o bmp2_bin-podcast.o bmp2_bin-podcast-libxml2-sax.o bmp2_bin-ui-p art-podcasts.o bmp2_bin-playershell.o bmp2_bin-ui-part-cdda.o bmp2_bin-ui-part-lastfm.o bmp2_bin-ui-part-playlist.o bmp2_bin-ui-part-shoutcast-streams.o bmp2_bin-streams-shoutcast.o bmp2_bin-ui-part-icecast-streams.o bmp2_bin-streams-icecast.o bmp2_bin-ui-part-albums.o bmp2_bin-library-ui-modify.o bmp2_bin-library-ui-import.o bmp2_bin-library-ui-relocate-album.o bmp2_bin-gstpuid.o bmp2_bin-bmpneonhttpsrc.o bmp2_bin-hal.o bmp2_bin-bmp-marshalers.o -lglibmm-2.4 -lgobject-2.0 -lsigc-2.0 -lglib-2.0 -lxml2 -ltag -lfam ../sqlite/libsqlite.la -lneon -lmusicbrainz -lasound -lm -ldl -lpthread -Wl,--export-dynamic -pthread -lgstbase-0.10 -lgstreamer-0.10 -lgobject-2.0 -lgmodule-2.0 -ldl -lgthread-2.0 -lxml2 -lglib-2.0 -ldbus-glib-1 -ldbus-1 -lglib-2.0 -L/usr/lib -lcdda_interface -lrsvg-2 -lgdk_pixbuf-2.0 -lm -lgobject-2.0 -lgmodule-2.0 -ldl -lglib-2.0 ../mcs/libmconfig.la ../neon++/libneonpp.la ../uuid/libuuid.la -lgstvideo-0.10 -lgstinterfaces-0.10 ../libhal ++/libhalcc.la -lstartup-notification-1-lSM -lICE -lX11 -lSM -lICE -lgtkmm-2.4 -lgdkmm-2.4 -latkmm-1.6 -lgtk-x11-2.0 -lpangomm-1.4 -lglibmm-2.4 -lsigc-2.0 -lgdk-x11-2.0 -latk-1.0 -lgdk_pixbuf-2.0 -lm -lpangocairo-1.0 -lfontconfig -lXext -lXrender -lXinerama -lXi -lXrandr -lXcursor -lXfixes -lpango-1.0 -lcairo -lX11 -lgobject-2.0 -lgmodule-2.0 -ldl -lglib-2.0 -lglademm-2.4 -lgtkmm-2.4 -lglade-2.0 -lgdkmm-2.4 -latkmm-1.6 -lpangomm-1.4 -lglibmm-2.4 -lsigc-2.0 -lgtk-x11-2.0 -lxml2 -lgdk-x11-2.0 -latk-1.0 -lgdk_pixbuf-2.0 -lm -lpangocairo-1.0 -lfontconfig -lXext -lXrender -lXinerama -lXi -lXrandr -lXcursor -lXfixes -lpango-1.0 -lcairo -lX11 -lgobject-2.0 -lgmodule-2.0 -ldl -lglib-2.0 -lcairomm-1.0 -lcairo -lboost_regex ../widgets/libbmpwidgets.la -lofa -lexpat -lfftw3 -lm -lhal-storage -lhal -ldbus-1 mkdir .libs libtool: link: cannot find the library `/usr/local/lib/libstdc++.la' or unhandled argument `/usr/local/lib/libstdc++.la' make[4]: *** [bmp2-bin] Error 1 make[4]: Leaving directory `/home/falk/bmpx-0.36.1/src Full log at: http://buildd.debian.org/fetch.cgi?pkg=bmpxarch=alphaver=0.36.1-1stamp=1169981975 I have no idea why this happens only on Alpha. -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: alpha Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.20 Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages bmpx depends on: ii dbus 1.0.2-1 simple interprocess messaging syst ii libasoun 1.0.13-1ALSA library ii libatk1. 1.12.4-1The ATK accessibility toolkit ii libboost 1.33.1-10 regular expression library for C++ ii libc6.1 2.3.6.ds1-11GNU C Library: Shared libraries ii libcairo 1.2.4-4 The Cairo 2D vector graphics libra ii libcairo 0.6.0-4 C++ wrappers for Cairo (shared lib ii libcdpar 3.10+debian~pre0-4 audio extraction tool for sampling ii libcomer 1.39+1.40-WIP-2006.11.14+dfsg-1 common error description library ii libdbus- 1.0.2-1 simple interprocess messaging syst ii libdbus- 0.71-3 simple interprocess messaging syst ii libexpat 1.95.8-3.4 XML parsing C library - runtime li ii libfam0 2.7.0-12Client library to control the FAM ii libfontc 2.4.2-1 generic font configuration library ii libfreet 2.2.1-5 FreeType 2 font engine, shared lib ii libgcc1 1:4.1.1-21 GCC support library ii libglade 1:2.6.0-4 library to load .glade files at ru ii libglade 2.6.2-2 C++
Bug#410352: gstreamer0.8: Should not be released with Etch
severity 410352 important unblock 410441 by 410352 block 410352 by 410441 unblock 410442 by 410352 block 410352 by 410442 unblock 410384 by 410352 block 410352 by 410384 thanks On Fri, Feb 09, 2007 at 05:58:53PM -0800, David Schleef wrote: On Sat, Feb 10, 2007 at 12:44:24AM +0100, Moritz Muehlenhoff wrote: Package: gstreamer0.8 Severity: serious gstreamer-0.8 embeds a full copy of the ffmpeg, which frequently has vulnerabilities. gstreamer0.8 != gstreamer0.8-ffmpeg That seems to remove the rationale for treating gstreamer0.8 as RC-buggy for etch, so I think it's appropriate to downgrade this bug. Thanks, -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410497: sparc32 kernel is too big, fails to boot
On Sun, Feb 11, 2007 at 08:38:23PM +0100, Frans Pop wrote: On Sunday 11 February 2007 18:21, Jurij Smakov wrote: I think that changing ABI without abiname bump is a more reasonable solution than dropping it completely. Impact would be pretty minor, given the number of people using sparc32. Note that this does mean that any packages containing kernel modules will/may need rebuilding on sparc. In practice, this appears limited to loop-aes, d-i, and l-m-e-2.6. Cheers, -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410557: /etc/dokuwiki/.htaccess doesn't exist in Debian package and allow access to acl and users
On Sun, Feb 11, 2007 at 07:56:57PM +0100, Iñaki Baz Castillo wrote: Dokuwiki 2006-11-06 from the official page [1] contains the file conf/.htacces: conf/.htaccess - ## no access to the conf directory order allow,deny deny from all --- This .htaccess deny web access to files in conf directory (ACL's, users). But Debian package doesn't include it in /etc/dokuwiki so any user can see the ACL's and user list (name, mail, role, encripted password) by accessing to: http://dokuwiki_base/conf http://dokuwiki_base/conf/acl.auth.php http://dokuwiki_base/conf/users.auth.php I suggest to include the .htaccess file in /etc/dokuwiki. Note: The issue exists too in the experimental 0.0.20061106-2 version [2]. Um. Why is anything under /etc/ being exposed under the http heirarchy *at all*? Ah, that would be the link ./usr/share/dokuwiki/conf - /etc/dokuwiki being shipped in the package, probably as a cheap workaround for a lack of config include path in the software. :/ -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/
Processed: severity of 410352 is serious
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.9.27 severity 410352 serious Bug#410352: gstreamer0.8: Should not be released with Etch Severity set to `serious' from `serious' End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410557: /etc/dokuwiki/.htaccess doesn't exist in Debian package and allow access to acl and users
Ah, that would be the link ./usr/share/dokuwiki/conf - /etc/dokuwiki being shipped in the package, probably as a cheap workaround for a lack of config include path in the software. :/ There are more web applications in Debian accessing to /etc. For example PhpMyAdmin: ~$ ls -l /usr/share/phpldapadmin/config/config.php config.php - /etc/phpldapadmin/config.php I think it would be better if directories or files in /etc/web_app/ are links to /usr/share/web_app/ instead. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410561: [php-maint] Bug#410561: php5: multiple security issues fixed in php 5.2.1
Oh my goddess :-( PHP 5.2.1 fixes some security problems. See http://www.php.net/releases/5_2_1.php http://secunia.com/advisories/24089/ Seems there is a lot of stack and buffer overflows fixed. Unfortunatelly our lovely PHP upstream maintainers bundled a lot of stuff into 5.2.1 as well including changes in default behaviour. I would love to have 5.2.1 in etch, but I am prepared to go cherry picking. Steve, what's your opinion? Cesspool will remain cesspool, so I don't see big difference between 5.2.0 and 5.2.1 in terms of bugginess. PHP 4.4 is affected by at least some of the issues, too. That troubles me :-(((, since new php4 is not available. Ondrej. -- Ondřej Surý [EMAIL PROTECTED] *** http://blog.rfc1925.org/ Kulturní občasník *** http://www.obcasnik.cz/
Bug#410580: CVE-2007-0855: Stack-based buffer overflow in Unrar
Package: unrar Version: 1:3.7.2-1 Severity: critical Tags: security From CVE-2007-0855: Stack-based buffer overflow in RARLabs Unrar, as packaged in WinRAR and possibly other products, allows user-assisted remote attackers to execute arbitrary code via a crafted, password-protected archive. See [1] for details. On the day of the public release of the advisory, unrar 3.7.3 has been released, which implies that version 3.7.2 is vulnerable (there is no detailed changelog, however). A new rar version has also been released. Severity critical because rar or unrar is called by amavisd-new in its default configuration (with parameter -p- to suppress password input), which probably turns this issue into a remote arbitrary code execution vulnerability. [1] http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=472 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410557: /etc/dokuwiki/.htaccess doesn't exist in Debian package and allow access to acl and users
On Sun, Feb 11, 2007 at 09:45:06PM +0100, Iñaki wrote: Ah, that would be the link ./usr/share/dokuwiki/conf - /etc/dokuwiki being shipped in the package, probably as a cheap workaround for a lack of config include path in the software. :/ There are more web applications in Debian accessing to /etc. For example PhpMyAdmin: ~$ ls -l /usr/share/phpldapadmin/config/config.php config.php - /etc/phpldapadmin/config.php I think it would be better if directories or files in /etc/web_app/ are links to /usr/share/web_app/ instead. No, it would be better if webapps didn't suck, and could reference /etc directly. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/
Processed: rar is also affected
Processing commands for [EMAIL PROTECTED]: clone 410580 -1 Bug#410580: CVE-2007-0855: Stack-based buffer overflow in Unrar Bug 410580 cloned as bug 410582. reassign -1 rar Bug#410582: CVE-2007-0855: Stack-based buffer overflow in Unrar Bug reassigned from package `unrar' to `rar'. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410557: /etc/dokuwiki/.htaccess doesn't exist in Debian package and allow access to acl and users
No, it would be better if webapps didn't suck, and could reference /etc directly. That is not possible with PHP web apps since PHP needs all the config files in the public dir of the web server. This is the issue that sucks. The solution most used if to hide config files with .htaccess and other strange methods, but PHP webapps will be always potential buggy apps. Note that Java and RubyOnRails apps expose never the config files (database login and so) in the public directory because a good and secure design. But in PHP there is no rules. :( -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410581: linux-kernel-headers: file conflict with amd64-libs-dev
Package: linux-kernel-headers Version: 2.6.18-6 Severity: serious Justification: Break sarge to etch upgrade Hello GLibc maintainers, There is an error when upgrading the package from sarge to etch, it should Replaces amd64-libs-dev: Preparing to replace linux-kernel-headers 2.5.999-test7-bk-17 (using .../linux-kernel-headers_2.6.18-6_i386.deb) ... Unpacking replacement linux-kernel-headers ... dpkg: error processing /var/cache/apt/archives/linux-kernel-headers_2.6.18-6_i386.deb (--unpack): trying to overwrite `/usr/include/asm/bootsetup.h', which is also in package amd64-libs-dev dpkg-deb: subprocess paste killed by signal (Broken pipe) The sarge package of amd64-libs-dev includes the file /usr/include/asm/bootsetup.h. Cheers, -- Bill. [EMAIL PROTECTED] Imagine a large blue swirl here. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: severity of 410580 is grave
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.9.27 severity 410580 grave Bug#410580: CVE-2007-0855: Stack-based buffer overflow in Unrar Severity set to `grave' from `critical' End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410557: /etc/dokuwiki/.htaccess doesn't exist in Debian package and allow access to acl and users
El Domingo, 11 de Febrero de 2007, Steve Langasek escribió: That is not possible with PHP web apps since PHP needs all the config files in the public dir of the web server. This is the issue that sucks. No, it doesn't. I don't know where you got that idea. Yes, it's possible to have config files out of the public dir, but the fact is that many PHP apps contain their config files into the public dir (as Dokuwiki, PhpMyAdmin and so). What I mean is that PHP doesn't force the developer to protect the config files, it's optional and many times using relative security as .htaccess files.
Bug#410583: installation-report: Installing tasks stalls at 5%
On Sun, Feb 11, 2007 at 09:41:13PM +, Dave Page wrote: I had thought that this was due to using my local apt-proxy cache for installations, but I ran into two people on #debian who had the same issues when installing from http://ftp.(us|uk).debian.org/ Hmm. Just after filing this bug report, I recieved http://lists.debian.org/debian-devel-announce/2007/02/msg00011.html via e-mail which may explain the problems which I and others have seen. Can't wait for RC2! :) Dave -- Dave Page [EMAIL PROTECTED] Jabber: [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410557: /etc/dokuwiki/.htaccess doesn't exist in Debian package and allow access to acl and users
On Sun, Feb 11, 2007 at 10:30:20PM +0100, Iñaki wrote: No, it would be better if webapps didn't suck, and could reference /etc directly. That is not possible with PHP web apps since PHP needs all the config files in the public dir of the web server. This is the issue that sucks. No, it doesn't. I don't know where you got that idea. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/
Processed: tagging 410375
Processing commands for [EMAIL PROTECTED]: tags 410375 + pending Bug#410375: network interfaces not autoconfigured for ipv6 after reboot Tags were: confirmed Tags added: pending End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410557: marked as done (/etc/dokuwiki/.htaccess doesn't exist in Debian package and allow access to acl and users)
Your message dated Sun, 11 Feb 2007 22:32:03 + with message-id [EMAIL PROTECTED] and subject line Bug#410557: fixed in dokuwiki 0.0.20061106-3 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: dokuwiki Version: 0.0.20061106-1 Severity: critical Dokuwiki 2006-11-06 from the official page [1] contains the file conf/.htacces: conf/.htaccess - ## no access to the conf directory order allow,deny deny from all --- This .htaccess deny web access to files in conf directory (ACL's, users). But Debian package doesn't include it in /etc/dokuwiki so any user can see the ACL's and user list (name, mail, role, encripted password) by accessing to: http://dokuwiki_base/conf http://dokuwiki_base/conf/acl.auth.php http://dokuwiki_base/conf/users.auth.php I suggest to include the .htaccess file in /etc/dokuwiki. Note: The issue exists too in the experimental 0.0.20061106-2 version [2]. [1] Dokuwiki official download: http://www.splitbrain.org/projects/dokuwiki [2] Changelog in experimental 20061106-2 version: http://packages.debian.org/changelogs/pool/main/d/dokuwiki/dokuwiki_0.0.20061106-2/changelog [3] Related bug in Dokuwiki bug database: http://bugs.splitbrain.org/?do=detailsid=1076 ---End Message--- ---BeginMessage--- Source: dokuwiki Source-Version: 0.0.20061106-3 We believe that the bug you reported is fixed in the latest version of dokuwiki, which is due to be installed in the Debian FTP archive: dokuwiki_0.0.20061106-3.diff.gz to pool/main/d/dokuwiki/dokuwiki_0.0.20061106-3.diff.gz dokuwiki_0.0.20061106-3.dsc to pool/main/d/dokuwiki/dokuwiki_0.0.20061106-3.dsc dokuwiki_0.0.20061106-3_all.deb to pool/main/d/dokuwiki/dokuwiki_0.0.20061106-3_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Mohammed Adnène Trojette [EMAIL PROTECTED] (supplier of updated dokuwiki package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 11 Feb 2007 21:53:00 +0100 Source: dokuwiki Binary: dokuwiki Architecture: source all Version: 0.0.20061106-3 Distribution: unstable Urgency: high Maintainer: Mohammed Adnène Trojette [EMAIL PROTECTED] Changed-By: Mohammed Adnène Trojette [EMAIL PROTECTED] Description: dokuwiki - a standards compliant simple to use wiki Closes: 410557 Changes: dokuwiki (0.0.20061106-3) unstable; urgency=high . * High urgency for RC bug fixing. * Prepend dokuwiki's configuration directory to avoid disclosing /etc/dokuwiki as suggested on http://wiki.splitbrain.org/wiki:security#the_._conf_directory (Closes: #410557) * Just in case, also ship /etc/dokuwiki with .htaccess. Files: 4c988f12a08f67bee474eb920e30787b 648 web optional dokuwiki_0.0.20061106-3.dsc 5908c64f63e897bbeaa7969e9735208f 26170 web optional dokuwiki_0.0.20061106-3.diff.gz c864ba1254cad3a10cb7a703289d8cc7 1106250 web optional dokuwiki_0.0.20061106-3_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFFz5gqOU3FkQ7XBOoRAvvKAKC2Fe7ry8uLT0ktVB/lV6/khlyTZQCfSMLL xhc+FzdAfdAPbyp5PPNXW+o= =4o/7 -END PGP SIGNATURE- ---End Message---
Processed: tagging 410561
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.9.26 tags 410561 + upstream fixed-upstream Bug#410561: php5: multiple security issues fixed in php 5.2.1 Tags were: security Tags added: upstream, fixed-upstream End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: retitle 410552 to CVE-2007-0857 - Multiple XSS vulnerabilities, tagging 410552
Processing commands for [EMAIL PROTECTED]: retitle 410552 CVE-2007-0857 - Multiple XSS vulnerabilities Bug#410552: moinmoin-common: MoinMoin vulnerability Changed Bug title. tags 410552 + upstream fixed-upstream security Bug#410552: CVE-2007-0857 - Multiple XSS vulnerabilities There were no tags set. Tags added: upstream, fixed-upstream, security End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410600: filterproxy: An Error Occurred: 500 Access to 'http' URIs has been disabled
Package: filterproxy Version: 0.30-6.2 Severity: grave Justification: renders package unusable Whenever I try to access any URLs, using the default configuration, I get the following message: An Error Occurred 500 Access to 'http' URIs has been disabled The following is logged: [29154 Mon Feb 12 12:23:30 2007] Deleting child: 30552, from localhost:37584 [30902 Mon Feb 12 12:23:30 2007] New proxy connection accepted from localhost:37585 [30902 Mon Feb 12 12:23:30 2007] do_host_authentication: 127.0.0.1 connecting to 127.0.0.1 [30902 Mon Feb 12 12:23:30 2007] HTTP/1.1 proxy request for http://www.google.com.au/ received. [30902 Mon Feb 12 12:23:30 2007] Going to apply filter Compress order -10 for http://www.google.com.au/, matching /.*/. [30902 Mon Feb 12 12:23:30 2007] Going to apply filter Header order -10 for http://www.google.com.au/, matching /.*/. [30902 Mon Feb 12 12:23:30 2007] Sending request for http://www.google.com.au/ [30902 Mon Feb 12 12:23:30 2007] [Perl WARNING] Use of uninitialized value in string eq at /usr/share/perl5/LWP/UserAgent.pm line 168. [30902 Mon Feb 12 12:23:30 2007] [Perl WARNING] Use of uninitialized value in string eq at /usr/share/perl5/LWP/UserAgent.pm line 168. [30902 Mon Feb 12 12:23:30 2007] [Perl WARNING] Use of uninitialized value in string eq at /usr/share/perl5/LWP/UserAgent.pm line 168. [30902 Mon Feb 12 12:23:30 2007] [Perl WARNING] Use of uninitialized value in concatenation (.) or string at /usr/share/perl5/LWP/UserAgent.pm line 172. [30902 Mon Feb 12 12:23:30 2007] [500 Access to 'http' URIs has been disabled] for http://www.google.com.au/ [30902 Mon Feb 12 12:23:30 2007] Going to apply filter Header order 10 for http://www.google.com.au/, matching /.*/. [30902 Mon Feb 12 12:23:31 2007] Exiting for client localhost:37585 (1 requests processed) {No more requests from this connection} At which stage I am lost (for now anyway). -- System Information: Debian Release: 4.0 APT prefers testing APT policy: (500, 'testing'), (200, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-3-xen-686 Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8) Versions of packages filterproxy depends on: ii adduser 3.102Add and remove users and groups ii libcompress-zlib-pe 1.42-2 Perl module for creation and manip ii libhtml-mason-perl 1:1.35-2 HTML::Mason Perl module ii liburi-perl 1.35-2 Manipulates and accesses URI strin ii libwww-perl 5.805-1 WWW client/server library for Perl ii libxml-libxml-perl 1.59-2 Perl module for using the GNOME li ii libxml-libxslt-perl 1.59-1 Perl module for using the GNOME li ii perl [libtime-hires 5.8.8-7 Larry Wall's Practical Extraction ii perlmagick 7:6.2.4.5.dfsg1-0.13 A perl interface to the libMagick filterproxy recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410605: dpkg: bzip2 code in compression.c incorrectly uses zlib define (Z_ERRNO)
Package: dpkg Version: 1.13.25 Severity: serious Justification: no longer builds from source in the decompress_cat() function in the compression.c file, you can see the bzip2 code comparing the results of BZ2_bzerror() to the zlib define Z_ERRNO ... that should prob be comparing err to some BZ_ error define. -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (990, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.19.2-grsec Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages dpkg depends on: ii coreutils 5.97-5.2 The GNU core utilities ii libc6 2.3.6.ds1-10 GNU C Library: Shared libraries dpkg recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410600: marked as done (filterproxy: An Error Occurred: 500 Access to 'http' URIs has been disabled)
Your message dated Mon, 12 Feb 2007 13:32:24 +1100 with message-id [EMAIL PROTECTED] and subject line filterproxy: An Error Occurred: 500 Access to 'http' URIs has been disabled has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: filterproxy Version: 0.30-6.2 Severity: grave Justification: renders package unusable Whenever I try to access any URLs, using the default configuration, I get the following message: An Error Occurred 500 Access to 'http' URIs has been disabled The following is logged: [29154 Mon Feb 12 12:23:30 2007] Deleting child: 30552, from localhost:37584 [30902 Mon Feb 12 12:23:30 2007] New proxy connection accepted from localhost:37585 [30902 Mon Feb 12 12:23:30 2007] do_host_authentication: 127.0.0.1 connecting to 127.0.0.1 [30902 Mon Feb 12 12:23:30 2007] HTTP/1.1 proxy request for http://www.google.com.au/ received. [30902 Mon Feb 12 12:23:30 2007] Going to apply filter Compress order -10 for http://www.google.com.au/, matching /.*/. [30902 Mon Feb 12 12:23:30 2007] Going to apply filter Header order -10 for http://www.google.com.au/, matching /.*/. [30902 Mon Feb 12 12:23:30 2007] Sending request for http://www.google.com.au/ [30902 Mon Feb 12 12:23:30 2007] [Perl WARNING] Use of uninitialized value in string eq at /usr/share/perl5/LWP/UserAgent.pm line 168. [30902 Mon Feb 12 12:23:30 2007] [Perl WARNING] Use of uninitialized value in string eq at /usr/share/perl5/LWP/UserAgent.pm line 168. [30902 Mon Feb 12 12:23:30 2007] [Perl WARNING] Use of uninitialized value in string eq at /usr/share/perl5/LWP/UserAgent.pm line 168. [30902 Mon Feb 12 12:23:30 2007] [Perl WARNING] Use of uninitialized value in concatenation (.) or string at /usr/share/perl5/LWP/UserAgent.pm line 172. [30902 Mon Feb 12 12:23:30 2007] [500 Access to 'http' URIs has been disabled] for http://www.google.com.au/ [30902 Mon Feb 12 12:23:30 2007] Going to apply filter Header order 10 for http://www.google.com.au/, matching /.*/. [30902 Mon Feb 12 12:23:31 2007] Exiting for client localhost:37585 (1 requests processed) {No more requests from this connection} At which stage I am lost (for now anyway). -- System Information: Debian Release: 4.0 APT prefers testing APT policy: (500, 'testing'), (200, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-3-xen-686 Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8) Versions of packages filterproxy depends on: ii adduser 3.102Add and remove users and groups ii libcompress-zlib-pe 1.42-2 Perl module for creation and manip ii libhtml-mason-perl 1:1.35-2 HTML::Mason Perl module ii liburi-perl 1.35-2 Manipulates and accesses URI strin ii libwww-perl 5.805-1 WWW client/server library for Perl ii libxml-libxml-perl 1.59-2 Perl module for using the GNOME li ii libxml-libxslt-perl 1.59-1 Perl module for using the GNOME li ii perl [libtime-hires 5.8.8-7 Larry Wall's Practical Extraction ii perlmagick 7:6.2.4.5.dfsg1-0.13 A perl interface to the libMagick filterproxy recommends no packages. -- no debconf information ---End Message--- ---BeginMessage--- Brian == Brian May [EMAIL PROTECTED] writes: Brian Whenever I try to access any URLs, using the default Brian configuration, I get the following message: I lied. I tried changing the proxy settings. It turns out that proxy settings don't take affect immediately, so when I deleted the proxy settings it still tried to use the old settings. It turns out that proxy:3128 is not a valid proxy value, I needed to use http://proxy:3128;. Possibly the error message could be improved too. Closing this bug... -- Brian May [EMAIL PROTECTED] ---End Message---
Bug#410610: ttf-mph-2b-damase: contains glyphs from a non-free font
Package: ttf-mph-2b-damase Version: 001.000-1 Severity: serious Justification: contains non-free glyphs The attached messages indicate that some of the glyphs in ttf-mph-2b-damase will need to be stripped. This may or may not be possible with the latest fontforge: (12:07:52) pabs: oh, yeah, I should probably update the debian package to remove the Sylheti glyphs, are you able to do that and send me a new copy? I'd have to do it with fontforge and I don't know if it would be able to preserve all the font features you used (12:08:49) mark: I don't have a font application that supports plane 1, so it would ruin the font if I did it. I had to send it out to James Kass for the p1 support. (12:09:03) pabs: oh, hmm (12:09:21) mark: But I didn't use any special features that would be ruined, I don't think (12:10:29) pabs: ok, well, I'll try with fontforge, we'll see though :) (12:10:58) mark: ok -- bye, pabs http://wiki.debian.org/PaulWise ---BeginMessage--- Everyone - Mark Williamson [EMAIL PROTECTED] is the author and he released it into the public domain... Far be it from me to discourage development of free fonts, but I don't think Mark has the rights to release it into the public domain. In a quick look at the font, I saw many font styles I recognised - including ones that are not currently under free licenses. For example, the Sylheti Nagri glyphs are an identical copy (node for node, coordinate for coordinate) of the Sylheti font available from http://www.sylheti.org.uk/page5.html. That font is freeware, but is not under public domain, or any FLOSS license. I hate to sound like the font police, but this font is not legal, as it contains copyrighted material from other fonts without any acknowledgement. I'm not at all implying that Mark intentionally intended to breach copyright, as it is particularly common in South Asia to find fonts that have been copied with the copyright stripped out, replaced with public domain. Mark may have copied glyphs from one of those fonts. I just think someone ought to do a little more research to be sure that all the contents are truly free. It may even be that some of Mark's sources could be convinced to release OFL versions of their fonts! If we want to get the typographic community's support behind free and open source fonts, we have to prove to them that we honour copyright. Otherwise all our arguments fall flat, and designers will run from FLOSS and the OFLB like the plague. V. - Victor Gaultney SIL International ---End Message--- ---BeginMessage--- On Sun, 2007-02-11 at 15:17 +, Victor Gaultney wrote: Mark Williamson [EMAIL PROTECTED] is the author and he released it into the public domain... Far be it from me to discourage development of free fonts, but I don't think Mark has the rights to release it into the public domain. (11:53:52) mark: I don't remember copying that font. I suppose it's possible, I know I used it for information about the script (11:54:32) mark: But if necessary, Sylheti can be removed from the font, or new glyphs can be designed. Simply recognizing font styles doesn't imply any sort of breach of copyright (11:56:30) mark: The Latin, Hebrew, Greek, Cyrillic, Arabic glyphs are all original, as are the Glagolitic, Gothic, Linear B, Cypriot, because I actually still have the designs for all of those (11:57:01) mark: The other ones, I'd have to check to make sure (11:57:06) mark: But I was sure the entire font was my work (11:57:25) mark: One sec (11:58:38) mark: ok... the arabic glyphs are original, but in most apps if you type them it will show up as your system's default arabic font because there aren't OpenType tables for it (12:02:32) mark: but after a cursory look, it appears eveything's original (most of the ranges are typified by uneven contours because I didn't finish the glyph outlines off) (12:02:41) mark: except for Sylheti (12:03:46) pabs: thanks for the info, I'll let you know of any more questions (12:03:50) mark: ok :-) If we want to get the typographic community's support behind free and open source fonts, we have to prove to them that we honour copyright. Otherwise all our arguments fall flat, and designers will run from FLOSS and the OFLB like the plague. Indeed. -- bye, pabs http://wiki.debian.org/PaulWise signature.asc Description: This is a digitally signed message part ---End Message--- signature.asc Description: This is a digitally signed message part
Bug#410605: dpkg: bzip2 code in compression.c incorrectly uses zlib define (Z_ERRNO)
severity 410605 important thanks On Sun, Feb 11, 2007 at 08:34:53PM -0500, Mike Frysinger wrote: Justification: no longer builds from source Huh? This bug doesn't describe a build failure. in the decompress_cat() function in the compression.c file, you can see the bzip2 code comparing the results of BZ2_bzerror() to the zlib define Z_ERRNO ... that should prob be comparing err to some BZ_ error define. Probably; but I don't see how that causes a build failure as claimed, the package is built fine on all Debian architectures. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#410605: dpkg: bzip2 code in compression.c incorrectly uses zlib define (Z_ERRNO)
Processing commands for [EMAIL PROTECTED]: severity 410605 important Bug#410605: dpkg: bzip2 code in compression.c incorrectly uses zlib define (Z_ERRNO) Severity set to `important' from `serious' thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410581: marked as done (linux-kernel-headers: file conflict with amd64-libs-dev)
Your message dated Mon, 12 Feb 2007 03:17:04 + with message-id [EMAIL PROTECTED] and subject line Bug#410581: fixed in linux-kernel-headers 2.6.18-7 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: linux-kernel-headers Version: 2.6.18-6 Severity: serious Justification: Break sarge to etch upgrade Hello GLibc maintainers, There is an error when upgrading the package from sarge to etch, it should Replaces amd64-libs-dev: Preparing to replace linux-kernel-headers 2.5.999-test7-bk-17 (using .../linux-kernel-headers_2.6.18-6_i386.deb) ... Unpacking replacement linux-kernel-headers ... dpkg: error processing /var/cache/apt/archives/linux-kernel-headers_2.6.18-6_i386.deb (--unpack): trying to overwrite `/usr/include/asm/bootsetup.h', which is also in package amd64-libs-dev dpkg-deb: subprocess paste killed by signal (Broken pipe) The sarge package of amd64-libs-dev includes the file /usr/include/asm/bootsetup.h. Cheers, -- Bill. [EMAIL PROTECTED] Imagine a large blue swirl here. ---End Message--- ---BeginMessage--- Source: linux-kernel-headers Source-Version: 2.6.18-7 We believe that the bug you reported is fixed in the latest version of linux-kernel-headers, which is due to be installed in the Debian FTP archive: linux-kernel-headers_2.6.18-7.diff.gz to pool/main/l/linux-kernel-headers/linux-kernel-headers_2.6.18-7.diff.gz linux-kernel-headers_2.6.18-7.dsc to pool/main/l/linux-kernel-headers/linux-kernel-headers_2.6.18-7.dsc linux-kernel-headers_2.6.18-7_i386.deb to pool/main/l/linux-kernel-headers/linux-kernel-headers_2.6.18-7_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Clint Adams [EMAIL PROTECTED] (supplier of updated linux-kernel-headers package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 11 Feb 2007 22:02:52 -0500 Source: linux-kernel-headers Binary: linux-kernel-headers Architecture: source i386 Version: 2.6.18-7 Distribution: unstable Urgency: high Maintainer: GNU Libc Maintainers debian-glibc@lists.debian.org Changed-By: Clint Adams [EMAIL PROTECTED] Description: linux-kernel-headers - Linux Kernel Headers for development Closes: 410581 Changes: linux-kernel-headers (2.6.18-7) unstable; urgency=high . * Add Conflicts and Replaces on amd64-libs-dev ( 1.4). closes: #410581. Files: 17896678daa45689ad1370781490eaed 881 devel standard linux-kernel-headers_2.6.18-7.dsc 02978e682801f1aacb61c2e875804222 24758 devel standard linux-kernel-headers_2.6.18-7.diff.gz 1802c639dd1a9c4a9c16ab1f86f88554 1875338 devel standard linux-kernel-headers_2.6.18-7_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) Comment: Debian! iD8DBQFFz9sN5m0u66uWM3ARAiJQAJ9H6fCv7gdS0QGvRZd6uOkd1//AIQCg2PxD bkkZY85U1Qmsh94svlR+yOA= =TqRa -END PGP SIGNATURE- ---End Message---
Bug#410561: [php-maint] Bug#410561: php5: multiple security issues fixed in php 5.2.1
On Sun, Feb 11, 2007 at 10:01:22PM +0100, Ondřej Surý wrote: Oh my goddess :-( PHP 5.2.1 fixes some security problems. See http://www.php.net/releases/5_2_1.php http://secunia.com/advisories/24089/ Seems there is a lot of stack and buffer overflows fixed. Unfortunatelly our lovely PHP upstream maintainers bundled a lot of stuff into 5.2.1 as well including changes in default behaviour. I would love to have 5.2.1 in etch, but I am prepared to go cherry picking. Steve, what's your opinion? Cesspool will remain cesspool, so I don't see big difference between 5.2.0 and 5.2.1 in terms of bugginess. Well, as you mention changes to default behavior, the difference is the impact that such changes would have on other apps that depend on the current behavior. So I'm afraid this needs to be handled in a way that we get the security fixes without whatever random changes upstream has decided to make. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/
Bug#410580: marked as done (CVE-2007-0855: Stack-based buffer overflow in Unrar)
Your message dated Mon, 12 Feb 2007 04:02:04 + with message-id [EMAIL PROTECTED] and subject line Bug#410580: fixed in unrar-nonfree 1:3.7.3-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: unrar Version: 1:3.7.2-1 Severity: critical Tags: security From CVE-2007-0855: Stack-based buffer overflow in RARLabs Unrar, as packaged in WinRAR and possibly other products, allows user-assisted remote attackers to execute arbitrary code via a crafted, password-protected archive. See [1] for details. On the day of the public release of the advisory, unrar 3.7.3 has been released, which implies that version 3.7.2 is vulnerable (there is no detailed changelog, however). A new rar version has also been released. Severity critical because rar or unrar is called by amavisd-new in its default configuration (with parameter -p- to suppress password input), which probably turns this issue into a remote arbitrary code execution vulnerability. [1] http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=472 ---End Message--- ---BeginMessage--- Source: unrar-nonfree Source-Version: 1:3.7.3-1 We believe that the bug you reported is fixed in the latest version of unrar-nonfree, which is due to be installed in the Debian FTP archive: unrar-nonfree_3.7.3-1.diff.gz to pool/non-free/u/unrar-nonfree/unrar-nonfree_3.7.3-1.diff.gz unrar-nonfree_3.7.3-1.dsc to pool/non-free/u/unrar-nonfree/unrar-nonfree_3.7.3-1.dsc unrar-nonfree_3.7.3.orig.tar.gz to pool/non-free/u/unrar-nonfree/unrar-nonfree_3.7.3.orig.tar.gz unrar_3.7.3-1_amd64.deb to pool/non-free/u/unrar-nonfree/unrar_3.7.3-1_amd64.deb unrar_3.7.3-1_i386.deb to pool/non-free/u/unrar-nonfree/unrar_3.7.3-1_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Martin Meredith [EMAIL PROTECTED] (supplier of updated unrar-nonfree package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 12 Feb 2007 02:47:55 + Source: unrar-nonfree Binary: unrar Architecture: amd64 i386 source Version: 1:3.7.3-1 Distribution: unstable Urgency: high Maintainer: Martin Meredith [EMAIL PROTECTED] Changed-By: Martin Meredith [EMAIL PROTECTED] Description: unrar - Unarchiver for .rar files (non-free version) Closes: 410580 Changes: unrar-nonfree (1:3.7.3-1) unstable; urgency=high . * New upstream release (Closes: #410580) Files: 0aa5df1e268eace4f2bd0932fc59d6a1 129328 non-free/utils optional unrar-nonfree_3.7.3.orig.tar.gz 323ad6490b22e4ef6916f59cc7977380 96966 non-free/utils optional unrar_3.7.3-1_i386.deb c0a8487d0a5ab860a753027da8ba0ddc 4388 non-free/utils optional unrar-nonfree_3.7.3-1.diff.gz 18a4653150fd01f2774deb30465a8629 589 non-free/utils optional unrar-nonfree_3.7.3-1.dsc e906d606f707468fc6feb8c91df222d3 96362 non-free/utils optional unrar_3.7.3-1_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFFz+K5AQwuptkwlkQRAgIdAJ9A3aOCaPFsojfHemLBnu21a+xEngCeI3bR ce6S/vr1oATF/9Ty/Li4IsI= =ZhHW -END PGP SIGNATURE- ---End Message---
Bug#410582: marked as done (CVE-2007-0855: Stack-based buffer overflow in Unrar)
Your message dated Mon, 12 Feb 2007 04:17:03 + with message-id [EMAIL PROTECTED] and subject line Bug#410582: fixed in rar 1:3.7b1-1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: unrar Version: 1:3.7.2-1 Severity: critical Tags: security From CVE-2007-0855: Stack-based buffer overflow in RARLabs Unrar, as packaged in WinRAR and possibly other products, allows user-assisted remote attackers to execute arbitrary code via a crafted, password-protected archive. See [1] for details. On the day of the public release of the advisory, unrar 3.7.3 has been released, which implies that version 3.7.2 is vulnerable (there is no detailed changelog, however). A new rar version has also been released. Severity critical because rar or unrar is called by amavisd-new in its default configuration (with parameter -p- to suppress password input), which probably turns this issue into a remote arbitrary code execution vulnerability. [1] http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=472 ---End Message--- ---BeginMessage--- Source: rar Source-Version: 1:3.7b1-1 We believe that the bug you reported is fixed in the latest version of rar, which is due to be installed in the Debian FTP archive: rar_3.7b1-1.diff.gz to pool/non-free/r/rar/rar_3.7b1-1.diff.gz rar_3.7b1-1.dsc to pool/non-free/r/rar/rar_3.7b1-1.dsc rar_3.7b1-1_amd64.deb to pool/non-free/r/rar/rar_3.7b1-1_amd64.deb rar_3.7b1-1_i386.deb to pool/non-free/r/rar/rar_3.7b1-1_i386.deb rar_3.7b1.orig.tar.gz to pool/non-free/r/rar/rar_3.7b1.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Martin Meredith [EMAIL PROTECTED] (supplier of updated rar package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 12 Feb 2007 02:59:57 + Source: rar Binary: rar Architecture: amd64 i386 source Version: 1:3.7b1-1 Distribution: unstable Urgency: high Maintainer: Martin Meredith [EMAIL PROTECTED] Changed-By: Martin Meredith [EMAIL PROTECTED] Description: rar- Archiver for .rar files Closes: 410582 Changes: rar (1:3.7b1-1) unstable; urgency=high . * New upstream release (Closes: #410582) Files: 422ab98779a8bc3e46daba15e97c8f5f 267472 non-free/utils optional rar_3.7b1-1_i386.deb 92df6d36aa97d48150fe7ad661a69e52 267248 non-free/utils optional rar_3.7b1-1_amd64.deb e3513d790d0e590175467d2a35929522 7791 non-free/utils optional rar_3.7b1-1.diff.gz 5a814f0e746c8568fe311c5d84adabb1 568 non-free/utils optional rar_3.7b1-1.dsc f9313410e1f9d223c40e75d7207c6f0a 769033 non-free/utils optional rar_3.7b1.orig.tar.gz -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFFz+ZYAQwuptkwlkQRAi1aAJ9tkW/TGv6sngcQvocOIDlISg301ACdEsv8 Ip3ahR9k3YqoCbhrHr3aFZQ= =6NN+ -END PGP SIGNATURE- ---End Message---
Bug#407460: USB ethernet interface renamed after installation on NSLU2 which causes the system to be inaccessible
Hi Marco On 2/10/07, Gordon Farquharson [EMAIL PROTECTED] wrote: On 1/18/07, Martin Michlmayr [EMAIL PROTECTED] wrote: Well, I still believe this is a problem with udev. CCing Marco. I just tested a patch [1,2] that was applied to udev to fix the network interface renaming code to see if it would solve this bug, but no luck. The USB ethernet adapter is still (most often) renamed eth1_rename despite the rule to name it eth0 in /etc/udev/rules.d/z25_persistent-net.rules. Gordon [1] http://git.kernel.org/git/?p=linux/hotplug/udev.git;a=commitdiff;h=ca714ef70e549aad486a62f4d6ef849572e3a7f1 [2] http://marc.theaimsgroup.com/?l=linux-hotplug-develm=116956926523008w=2 -- Gordon Farquharson -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#398535: apache2.2-common: missing dep on procps
tags 398535 patch thanks Hi folks, I've prepared an NMU to fix this RC bug. The short diff is attached; I'll be uploading shortly to incoming. Thanks, -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. [EMAIL PROTECTED] http://www.debian.org/ diff -u apache2-2.2.3/debian/changelog apache2-2.2.3/debian/changelog --- apache2-2.2.3/debian/changelog +++ apache2-2.2.3/debian/changelog @@ -1,3 +1,12 @@ +apache2 (2.2.3-3.3) unstable; urgency=high + + * Non-maintainer upload. + * High-urgency upload for RC bugfix. + * apache2.2-common should depend on procps, since it will fail to create +httpd.conf if it's not installed. Closes: #398535. + + -- Steve Langasek [EMAIL PROTECTED] Mon, 5 Feb 2007 01:55:57 -0800 + apache2 (2.2.3-3.2) unstable; urgency=high * Non-maintainer upload. diff -u apache2-2.2.3/debian/control apache2-2.2.3/debian/control --- apache2-2.2.3/debian/control +++ apache2-2.2.3/debian/control @@ -8,7 +8,7 @@ Package: apache2.2-common Architecture: any -Depends: ${misc:Depends}, apache2-utils, net-tools, libmagic1, mime-support, lsb-base +Depends: ${misc:Depends}, apache2-utils, net-tools, libmagic1, mime-support, lsb-base, procps Conflicts: apache2-common, libapache2-mod-php5 (= 5.1.6-3), libapache2-mod-php4 (= 4:4.4.4-2), libapache2-mod-mime-xattr (= 0.3-2), libapache2-mod-mono (= 1.1.17-3), libapache2-mod-proxy-html (= 2.4.3-2), libapache2-mod-scgi (= 1.11-1), libapache2-mod-speedycgi (= 2.22-3), libapache2-modxslt (= 2005072700-1), libapache2-redirtoservername (= 0.1-1), libapache2-webauth (= 3.5.3-1), libapache2-webkdc (= 3.5.3-1) Replaces: apache2-common Description: Next generation, scalable, extendable web server
Processed: Re: apache2.2-common: missing dep on procps
Processing commands for [EMAIL PROTECTED]: tags 398535 patch Bug#398535: apache2: httpd.conf not shipped, but referenced by apache2.conf, causing /usr/sbin/apache2ctl configtest There were no tags set. Bug#408282: apache2.2-common: missing dep on procps Tags added: patch thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#398535: marked as done (apache2: httpd.conf not shipped, but referenced by apache2.conf, causing /usr/sbin/apache2ctl configtest)
Your message dated Mon, 12 Feb 2007 05:47:03 + with message-id [EMAIL PROTECTED] and subject line Bug#398535: fixed in apache2 2.2.3-3.3 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: apache2 Version: 2.2.3-3 Severity: important Usertags: grid5000 Hi, /etc/apache2/httpd.conf is no longer shipped, but is referenced in /etc/apache2/apache2.conf. This causes /usr/sbin/apache2ctl configtest to fail: # /usr/sbin/apache2ctl configtest apache2: Syntax error on line 189 of /etc/apache2/apache2.conf: Could not open configuration file /etc/apache2/httpd.conf: No such file or directory It also prevents some other packages to install correctly (e.g torrus-apache2). -- | Lucas Nussbaum | [EMAIL PROTECTED] http://www.lucas-nussbaum.net/ | | jabber: [EMAIL PROTECTED] GPG: 1024D/023B3F4F | ---End Message--- ---BeginMessage--- Source: apache2 Source-Version: 2.2.3-3.3 We believe that the bug you reported is fixed in the latest version of apache2, which is due to be installed in the Debian FTP archive: apache2-doc_2.2.3-3.3_all.deb to pool/main/a/apache2/apache2-doc_2.2.3-3.3_all.deb apache2-mpm-event_2.2.3-3.3_i386.deb to pool/main/a/apache2/apache2-mpm-event_2.2.3-3.3_i386.deb apache2-mpm-perchild_2.2.3-3.3_all.deb to pool/main/a/apache2/apache2-mpm-perchild_2.2.3-3.3_all.deb apache2-mpm-prefork_2.2.3-3.3_i386.deb to pool/main/a/apache2/apache2-mpm-prefork_2.2.3-3.3_i386.deb apache2-mpm-worker_2.2.3-3.3_i386.deb to pool/main/a/apache2/apache2-mpm-worker_2.2.3-3.3_i386.deb apache2-prefork-dev_2.2.3-3.3_i386.deb to pool/main/a/apache2/apache2-prefork-dev_2.2.3-3.3_i386.deb apache2-src_2.2.3-3.3_all.deb to pool/main/a/apache2/apache2-src_2.2.3-3.3_all.deb apache2-threaded-dev_2.2.3-3.3_i386.deb to pool/main/a/apache2/apache2-threaded-dev_2.2.3-3.3_i386.deb apache2-utils_2.2.3-3.3_i386.deb to pool/main/a/apache2/apache2-utils_2.2.3-3.3_i386.deb apache2.2-common_2.2.3-3.3_i386.deb to pool/main/a/apache2/apache2.2-common_2.2.3-3.3_i386.deb apache2_2.2.3-3.3.diff.gz to pool/main/a/apache2/apache2_2.2.3-3.3.diff.gz apache2_2.2.3-3.3.dsc to pool/main/a/apache2/apache2_2.2.3-3.3.dsc apache2_2.2.3-3.3_all.deb to pool/main/a/apache2/apache2_2.2.3-3.3_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Steve Langasek [EMAIL PROTECTED] (supplier of updated apache2 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 5 Feb 2007 01:55:57 -0800 Source: apache2 Binary: apache2-utils apache2-prefork-dev apache2 apache2-mpm-prefork apache2-doc apache2-mpm-event apache2.2-common apache2-mpm-worker apache2-src apache2-threaded-dev apache2-mpm-perchild Architecture: source all i386 Version: 2.2.3-3.3 Distribution: unstable Urgency: high Maintainer: Debian Apache Maintainers debian-apache@lists.debian.org Changed-By: Steve Langasek [EMAIL PROTECTED] Description: apache2- Next generation, scalable, extendable web server apache2-doc - documentation for apache2 apache2-mpm-event - Event driven model for Apache HTTPD 2.1 apache2-mpm-perchild - Transitional package - please remove apache2-mpm-prefork - Traditional model for Apache HTTPD 2.1 apache2-mpm-worker - High speed threaded model for Apache HTTPD 2.1 apache2-prefork-dev - development headers for apache2 apache2-src - Apache source code apache2-threaded-dev - development headers for apache2 apache2-utils - utility programs for webservers apache2.2-common - Next generation, scalable, extendable web server Closes: 398535 Changes: apache2 (2.2.3-3.3) unstable; urgency=high . * Non-maintainer upload. * High-urgency upload for RC bugfix. * apache2.2-common should depend on procps, since it will fail to create httpd.conf if it's not installed. Closes: #398535. Files: f4382fa80ca4906795233a042adfa931 1026 web optional apache2_2.2.3-3.3.dsc 04b7d2eb20965eccc6eb1dc60abc552e 107327 web optional apache2_2.2.3-3.3.diff.gz 6d835fef0803c39a09f5b53288b62c4c 930816 web optional apache2.2-common_2.2.3-3.3_i386.deb ff5cedcf5015a79cac1002ba40842e81 420588 web
Bug#408282: marked as done (apache2.2-common: missing dep on procps)
Your message dated Mon, 12 Feb 2007 05:47:03 + with message-id [EMAIL PROTECTED] and subject line Bug#398535: fixed in apache2 2.2.3-3.3 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: torrus-apache2 Version: 1.0.4-1 Severity: serious Usertags: grid5000 piuparts Hi, During a piuparts run over all the packages in etch, I ran into a problem with your package: Setting up torrus-common (1.0.4-1) ... Not starting Torrus collector daemons as no configured trees found. Not starting Torrus monitor daemons as no configured trees found. Setting up torrus-apache2 (1.0.4-1) ... dpkg: error processing torrus-apache2 (--configure): subprocess post-installation script returned error exit status 4 Errors were encountered while processing: torrus-apache2 E: Sub-process /usr/bin/dpkg returned an error code (1) This is caused by the fact that apache2ctl configtest fails (bug #398535). -- | Lucas Nussbaum | [EMAIL PROTECTED] http://www.lucas-nussbaum.net/ | | jabber: [EMAIL PROTECTED] GPG: 1024D/023B3F4F | ---End Message--- ---BeginMessage--- Source: apache2 Source-Version: 2.2.3-3.3 We believe that the bug you reported is fixed in the latest version of apache2, which is due to be installed in the Debian FTP archive: apache2-doc_2.2.3-3.3_all.deb to pool/main/a/apache2/apache2-doc_2.2.3-3.3_all.deb apache2-mpm-event_2.2.3-3.3_i386.deb to pool/main/a/apache2/apache2-mpm-event_2.2.3-3.3_i386.deb apache2-mpm-perchild_2.2.3-3.3_all.deb to pool/main/a/apache2/apache2-mpm-perchild_2.2.3-3.3_all.deb apache2-mpm-prefork_2.2.3-3.3_i386.deb to pool/main/a/apache2/apache2-mpm-prefork_2.2.3-3.3_i386.deb apache2-mpm-worker_2.2.3-3.3_i386.deb to pool/main/a/apache2/apache2-mpm-worker_2.2.3-3.3_i386.deb apache2-prefork-dev_2.2.3-3.3_i386.deb to pool/main/a/apache2/apache2-prefork-dev_2.2.3-3.3_i386.deb apache2-src_2.2.3-3.3_all.deb to pool/main/a/apache2/apache2-src_2.2.3-3.3_all.deb apache2-threaded-dev_2.2.3-3.3_i386.deb to pool/main/a/apache2/apache2-threaded-dev_2.2.3-3.3_i386.deb apache2-utils_2.2.3-3.3_i386.deb to pool/main/a/apache2/apache2-utils_2.2.3-3.3_i386.deb apache2.2-common_2.2.3-3.3_i386.deb to pool/main/a/apache2/apache2.2-common_2.2.3-3.3_i386.deb apache2_2.2.3-3.3.diff.gz to pool/main/a/apache2/apache2_2.2.3-3.3.diff.gz apache2_2.2.3-3.3.dsc to pool/main/a/apache2/apache2_2.2.3-3.3.dsc apache2_2.2.3-3.3_all.deb to pool/main/a/apache2/apache2_2.2.3-3.3_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Steve Langasek [EMAIL PROTECTED] (supplier of updated apache2 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 5 Feb 2007 01:55:57 -0800 Source: apache2 Binary: apache2-utils apache2-prefork-dev apache2 apache2-mpm-prefork apache2-doc apache2-mpm-event apache2.2-common apache2-mpm-worker apache2-src apache2-threaded-dev apache2-mpm-perchild Architecture: source all i386 Version: 2.2.3-3.3 Distribution: unstable Urgency: high Maintainer: Debian Apache Maintainers debian-apache@lists.debian.org Changed-By: Steve Langasek [EMAIL PROTECTED] Description: apache2- Next generation, scalable, extendable web server apache2-doc - documentation for apache2 apache2-mpm-event - Event driven model for Apache HTTPD 2.1 apache2-mpm-perchild - Transitional package - please remove apache2-mpm-prefork - Traditional model for Apache HTTPD 2.1 apache2-mpm-worker - High speed threaded model for Apache HTTPD 2.1 apache2-prefork-dev - development headers for apache2 apache2-src - Apache source code apache2-threaded-dev - development headers for apache2 apache2-utils - utility programs for webservers apache2.2-common - Next generation, scalable, extendable web server Closes: 398535 Changes: apache2 (2.2.3-3.3) unstable; urgency=high . * Non-maintainer upload. * High-urgency upload for RC bugfix. * apache2.2-common should depend on procps, since it will fail to create httpd.conf if it's not installed. Closes: #398535. Files: f4382fa80ca4906795233a042adfa931 1026 web optional
Bug#405240: Similar error while upgrading to splashy 0.3
Hi! Not sure whether this is related, but during the upgrade to splashy 0.3 the same error is triggered and after the upgrade /lib/splashy still contains the some files as mentioned in this bug report. Regards, Georg -- Georg Wittenburg http://page.mi.fu-berlin.de/~wittenbu/ pgpkGnTF8aIuS.pgp Description: PGP signature
Bug#404876: Doesn't work on BlueWhite G3 either...
Previously I reported that my BlueWhite G3 Powermac didn't get the wigglies. Apparently that was a lie. I recently re-installed this machine and there there were! So both my G3 machines (Beige OldWorld G3 and BW NewWorld G3) have this problem. Has there been any progress lately? Rick -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410561: [php-maint] Bug#410561: php5: multiple security issues fixed in php 5.2.1
hey guys, i should have some time to put forward on this starting wednesday or so. i believe the folks at redhat are also in our position wrt php4 and have been independently working on digging up the packages, so i threw an email to the guy doing it. hopefully that'll lower the burden just a bit. sean signature.asc Description: This is a digitally signed message part
Processed: Re: Allow newer rggobi into etch?
Processing commands for [EMAIL PROTECTED]: severity 400835 grave Bug#400835: r-omegahat-ggobi: dead link in copyright + empty package? Severity set to `grave' from `normal' thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]