Bug#353277: Call for vote: ndiswrapper: Move to contrib

2007-04-04 Thread Steve Langasek
On Thu, Mar 29, 2007 at 10:16:52AM -0600, Bdale Garbee wrote:
> As Anthony noted in his recent summary of open issues, there were four votes 
> on his earlier proposal, in favour from Anthony and Manoj, against from Ian 
> and Raul.  Time has passed and additional discussion has occurred, so what 
> I'd like to ask is that we treat this as a fresh vote of the current TC 
> members in hopes of finally bringing this issue to closure, perhaps still in 
> time for our decision to be reflected in the etch release.

Only if the decision is in favor of the status quo ;)

> - - - -=-=-=-=-=- Don't Delete Anything Between These Lines =-=-=-=-=-=-=-=-
> [ 2 ] Choice 1: ndiswrapper should move to contrib as per bugs #353277, 
> #353278
> [ 1 ] Choice 2: ndiswrapper should remain in main despite bugs #353277, 
> #353278
> [ 3 ] Choice 3: Further discussion
> - - - -=-=-=-=-=- Don't Delete Anything Between These Lines =-=-=-=-=-=-=-=-

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Bug#417869: marked as done (kernel-image-2.6.8-3-686: Depends on initrd-tools, which has been removed from unstable, uninstallable)

2007-04-04 Thread Debian Bug Tracking System
Your message dated Wed, 4 Apr 2007 22:37:46 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#417869: kernel-image-2.6.8-3-686: Depends on initrd-tools, 
which has been removed from unstable, uninstallable
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: kernel-image-2.6.8-3-686
Severity: grave
Justification: renders package unusable

Due to initrd-tools being removed from unstable, this kernel line is no longer 
installable.


-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-686
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

--- End Message ---
--- Begin Message ---
On Wed, Apr 04, 2007 at 09:53:50PM -0700, Jesse Molina wrote:
> Package: kernel-image-2.6.8-3-686
> Severity: grave
> Justification: renders package unusable

> Due to initrd-tools being removed from unstable, this kernel line is no 
> longer installable.

It's also not *in* unstable.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/
--- End Message ---


Bug#417869: kernel-image-2.6.8-3-686: Depends on initrd-tools, which has been removed from unstable, uninstallable

2007-04-04 Thread Jesse Molina
Package: kernel-image-2.6.8-3-686
Severity: grave
Justification: renders package unusable

Due to initrd-tools being removed from unstable, this kernel line is no longer 
installable.


-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-686
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Debian bug #399761: lib3ds.a need recompilation

2007-04-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 399761 serious
Bug#399761: lib3ds.a need recompilation
Severity set to `serious' from `normal'

> tags 399761 patch
Bug#399761: lib3ds.a need recompilation
There were no tags set.
Tags added: patch

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#417327: marked as done (spurious use of debconf)

2007-04-04 Thread Debian Bug Tracking System
Your message dated Thu, 05 Apr 2007 03:32:03 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#417327: fixed in libcwd 0.99.44-0.2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: libcwd-dev
Version: 0.99.44-0.1
Severity: serious
Usertags: postrm-depends-nonessential
Justification: Policy violation, see section 7.2

hi,

while running archive wide piuparts tests your package failed on install
because of debconf beeing unavailable during postinst:

   Setting up libcwd-dev (0.99.44-0.1) ...
  /var/lib/dpkg/info/libcwd-dev.postinst: line 13: 
/usr/share/debconf/confmodule: No such file or directory
  dpkg: error processing libcwd-dev (--configure):
   subprocess post-installation script returned error exit status 1
  Errors were encountered while processing:
   libcwd-dev
  E: Sub-process /usr/bin/dpkg returned an error code (1)

the full log can be found here:

 http://people.debian.org/~abi/piuparts/

please add proper depends for debconf.

bye,
- michael

--- End Message ---
--- Begin Message ---
Source: libcwd
Source-Version: 0.99.44-0.2

We believe that the bug you reported is fixed in the latest version of
libcwd, which is due to be installed in the Debian FTP archive:

libcwd-dev_0.99.44-0.2_i386.deb
  to pool/non-free/libc/libcwd/libcwd-dev_0.99.44-0.2_i386.deb
libcwd-doc_0.99.44-0.2_all.deb
  to pool/non-free/libc/libcwd/libcwd-doc_0.99.44-0.2_all.deb
libcwd0-dbg_0.99.44-0.2_i386.deb
  to pool/non-free/libc/libcwd/libcwd0-dbg_0.99.44-0.2_i386.deb
libcwd0_0.99.44-0.2_i386.deb
  to pool/non-free/libc/libcwd/libcwd0_0.99.44-0.2_i386.deb
libcwd_0.99.44-0.2.diff.gz
  to pool/non-free/libc/libcwd/libcwd_0.99.44-0.2.diff.gz
libcwd_0.99.44-0.2.dsc
  to pool/non-free/libc/libcwd/libcwd_0.99.44-0.2.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Steve Langasek <[EMAIL PROTECTED]> (supplier of updated libcwd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 04 Apr 2007 20:14:20 -0700
Source: libcwd
Binary: libcwd-doc libcwd0 libcwd-dev libcwd0-dbg
Architecture: source all i386
Version: 0.99.44-0.2
Distribution: unstable
Urgency: high
Maintainer: Matt T Galvin <[EMAIL PROTECTED]>
Changed-By: Steve Langasek <[EMAIL PROTECTED]>
Description: 
 libcwd-dev - c++ debugging support library
 libcwd-doc - c++ debugging support library
 libcwd0- c++ debugging support library
 libcwd0-dbg - c++ debugging support library
Closes: 417327
Changes: 
 libcwd (0.99.44-0.2) unstable; urgency=high
 .
   * Non-maintainer upload.
   * High-urgency upload for RC bugfix.
   * Drop dangling reference to /usr/share/debconf/module in
 libcwd-dev.postinst, nothing in this package uses debconf.  Closes: 
#417327.
Files: 
 5c0f75ebecdf5910136d9b55a07c6150 717 non-free/libs optional 
libcwd_0.99.44-0.2.dsc
 c9cffde5f3e4c88a020fa462a143e374 21717 non-free/libs optional 
libcwd_0.99.44-0.2.diff.gz
 421ed2515616c3d1b7d0a1f4bbda12fe 629132 non-free/doc optional 
libcwd-doc_0.99.44-0.2_all.deb
 69a2210ceb4f53549233cc37546b352b 62964 non-free/libdevel optional 
libcwd-dev_0.99.44-0.2_i386.deb
 15f6dfcc846aad1fbcf7f5cb2691ce5f 311944 non-free/libs optional 
libcwd0_0.99.44-0.2_i386.deb
 51011998950ab269cbd3a249fa6d3d74 1470586 non-free/libdevel optional 
libcwd0-dbg_0.99.44-0.2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGFGsGKN6ufymYLloRAgI3AJ9B5eoXDVbGzohOlZElONAO3JnqwwCgxg0Z
NKc0BQT82TFbmgfmk+T3aek=
=GM8G
-END PGP SIGNATURE-

--- End Message ---


Bug#417327: missing dependency on debconf

2007-04-04 Thread Steve Langasek
retitle 417327 spurious use of debconf
tags 417327 patch
thanks

This is not a missing dependency on debconf, the package doesn't use debconf
at all and should not be sourcing confmodule in the postinst.

The attached trivial patch corrects this.

Since we are only three days out from locking the archive down for the etch
release, I'm going ahead with a 0-day NMU on this package using the attached
patch.  The NMU will be uploaded to incoming shortly.

Thanks,
-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/
diff -u libcwd-0.99.44/debian/libcwd-dev.postinst libcwd-0.99.44/debian/libcwd-dev.postinst
--- libcwd-0.99.44/debian/libcwd-dev.postinst
+++ libcwd-0.99.44/debian/libcwd-dev.postinst
@@ -10,7 +10,6 @@
 #`removing'
 #   
 
-. /usr/share/debconf/confmodule
 test $DEBIAN_SCRIPT_DEBUG && set -v -x
 
 case "$1" in
diff -u libcwd-0.99.44/debian/changelog libcwd-0.99.44/debian/changelog
--- libcwd-0.99.44/debian/changelog
+++ libcwd-0.99.44/debian/changelog
@@ -1,3 +1,12 @@
+libcwd (0.99.44-0.2) unstable; urgency=high
+
+  * Non-maintainer upload.
+  * High-urgency upload for RC bugfix.
+  * Drop dangling reference to /usr/share/debconf/module in
+libcwd-dev.postinst, nothing in this package uses debconf.  Closes: #417327.
+
+ -- Steve Langasek <[EMAIL PROTECTED]>  Wed, 04 Apr 2007 20:14:20 -0700
+
 libcwd (0.99.44-0.1) unstable; urgency=low
 
   * Non-maintainer upload.


Processed: Re: missing dependency on debconf

2007-04-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> retitle 417327 spurious use of debconf
Bug#417327: missing dependency on debconf
Changed Bug title to spurious use of debconf from missing dependency on debconf.

> tags 417327 patch
Bug#417327: spurious use of debconf
There were no tags set.
Tags added: patch

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#417539: upstream references

2007-04-04 Thread Eddy Petrișor
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

tags 417539 patch
thanks


Issue according to the changelog:
http://www.tinymux.org/changes.txt

- -- Fix buffer overflow in fun_ladd (Issue 282)

BTS in upstream is:
http://code.google.com/p/tinymux/issues/detail?q=282&can=2&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary&id=282

and claims the issue is fixed in revision 1004.

Upstream patch is attached.

- --
Regards,
EddyP
=
"Imagination is more important than knowledge" A.Einstein
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGFGTSY8Chqv3NRNoRAuusAJ9khzkdquRyBWKC0sXtsK4nhG49iQCbBxKQ
+M2AKZGsXEV6an5HGXjl2kw=
=H/fk
-END PGP SIGNATURE-
Index: mux/src/funmath.cpp
===
--- mux/src/funmath.cpp	(revision 1003)
+++ mux/src/funmath.cpp	(revision 1004)
@@ -314,7 +314,8 @@
 }
 
 char *cp = trim_space_sep(fargs[0], &sep);
-while (cp)
+while (  cp 
+  && n < (LBUF_SIZE+1)/2)
 {
 char *curr = split_token(&cp, &sep);
 g_aDoubles[n++] = mux_atof(curr);
Index: mux/CHANGES
===
--- mux/CHANGES	(revision 1003)
+++ mux/CHANGES	(revision 1004)
@@ -57,6 +57,7 @@
  -- Fix signed / unsigned warning in dump_info() (Issue 276).
  -- Corrected minor typo in @comon section of help.txt. (Issue 275)
  -- Restore newline skipping in wrap(), broken in 2.7.0.2 (Issue 278).
+ -- Fix potential buffer overflow in ladd() (Issue 282). Thanks Jake.
 
 
 Performance Enhancements:


Processed: upstream references

2007-04-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 417539 patch
Bug#417539: tinymux: Buffer overflow in fun_ladd of funmath.cpp with security 
implications.
Tags were: security
Tags added: patch

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#414045: [EMAIL PROTECTED]: graphicsmagick and bug 414045]

2007-04-04 Thread Steve Langasek
clone 414045 -1
reopen -1
reassign -1 graphicsmagick
notforwarded -1
thanks

Hi Larry,

On Tue, Apr 03, 2007 at 10:36:40PM -0700, [EMAIL PROTECTED] wrote:
> I suspect the RMs are ignoring it because it's tagged
> security, and "we can always put out security fixes
> post-release".

> This bug sits in a misleading status, though, because
> the patches I posted apply to both graphicsmagick and
> libx11.  So the BTS doesn't currently have an RC bug
> applied to graphicsmagick.

> I suggest you do the following:
>  - clone the bug to graphicsmagick
>  - add "patched" tags
>  - post clarifications (and links, maybe with md5sums) as to
> what image files generate the two bugs.
> I don't want to take those first two steps myself,
> since IANADD, and I'd probably bungle them.  If you want
> to delegate the last step to me, I can do that.

Well, you don't have to be a DD to make those changes; and anyway, there are
plenty of eyeballs on the release-critical bugs who will help if you do
misstep. :)

Anyway, I've done the first two bits, the third seems like something for
someone closer to the bug.

I don't see any particular reason that graphicsmagick should be specially
discriminated against by the security team when it comes to segfaults on
untrusted input, so I'm leaving the severity at 'grave' for now.

Thanks,
-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: [EMAIL PROTECTED]: graphicsmagick and bug 414045]

2007-04-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> clone 414045 -1
Bug#414045: libX11: Buffer overflow in XGetPixel().
Bug 414045 cloned as bug 417862.

> reopen -1
Bug#417862: libX11: Buffer overflow in XGetPixel().
'reopen' may be inappropriate when a bug has been closed with a version;
you may need to use 'found' to remove fixed versions.
Bug reopened, originator not changed.

> reassign -1 graphicsmagick
Bug#417862: libX11: Buffer overflow in XGetPixel().
Bug reassigned from package `libx11' to `graphicsmagick'.

> notforwarded -1
Bug#417862: libX11: Buffer overflow in XGetPixel().
Removed annotation that Bug had been forwarded to [EMAIL PROTECTED]

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#404148: kernel: data corruption with nvidia chipsets and IDE/SATA drives // memory hole mapping

2007-04-04 Thread Steve Langasek
On Sat, Mar 31, 2007 at 11:29:23PM +0200, Christoph Anton Mitterer wrote:
> Steve Langasek wrote:
> > Well, there's no reason that someone can't use iommu=soft when booting the
> > installer, as well.  So perhaps it would be best to clone that bug and
> > include this information in the installation guide or errata?

> Yes that's a good idea.

> I assume it would be also a problem, too just set the installer to
> iomm=soft (e.g. via the bootloader)?

Yes, it is a problem; there is no window of opportunity for making such a
change before release (there was even less of one than for the kernel), and
the fix properly belongs in the kernel package, not in the installer or
bootloaders.

> One last thing perhaps. I'd include a link to the kernel.org bug report
> in your release notes text and maybe some information that systems might
> already have some data corruption (as this bug is not new).

Link to kernel.org is included; "systems might already have some data
corruption" is not relevant to the release notes that I can see, the release
notes are about upgrades from sarge which did not have this problem (because
it didn't support hw iommu at all).

> btw: Is the kernel team now aware of your patch and will it use it in
> following linux-* packages? i.e. in unstable?

The kernel team is aware of it, but no decision has been made yet to include
it in the kernel packages, since the verdict is still out upstream.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#417407: debian-installer: d-i destroyed existing raid device

2007-04-04 Thread Steve Langasek
severity 417407 important
thanks

At this point, there is a lack of evidence showing that this data loss was
caused by os-prober.  There is, however, evidence that the RAID was in an
inconsistent state before debian-installer ever looked at it -- more
inconsistent than the d-i team was able to forcibly achieve in testing.

Since we no one seems to have any leads on a way forward on this issue, I
don't think it's reasonable to treat it as "critical".  Of course, if
someone does identify a cause for this bug in debian-installer, it would be
reasonable to fix it at the next possible moment.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: debian-installer: d-i destroyed existing raid device

2007-04-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 417407 important
Bug#417407: debian-installer: d-i destroyed existing raid device
Severity set to `important' from `critical'

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#417859: banshee crashes when I try to create a intelligent list

2007-04-04 Thread Cheli Pineda Ferrer
Package: banshee
Version: 0.11.3+dfsg-2
Severity: grave
Justification: renders package unusable

Banshee crashs when I try to create an intelligent list whith the next options:

coincidence unchecket, limit to 25 songs aleatory

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.20.120207
Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8)

Versions of packages banshee depends on:
ii  boo0.7.6.2237-6  a python-like language and compile
ii  gconf2 2.18.0.1-2GNOME configuration database syste
ii  gstreamer0.10-gnomevfs 0.10.12-1 GStreamer plugin for GnomeVFS
ii  gstreamer0.10-plugins-base 0.10.12-1 GStreamer plugins from the "base" 
ii  gstreamer0.10-plugins-good 0.10.5-4  GStreamer plugins from the "good" 
ii  libatk1.0-01.18.0-1  The ATK accessibility toolkit
ii  libbonobo2-0   2.18.0-1  Bonobo CORBA interfaces library
ii  libc6  2.5-0exp6 GNU C Library: Shared libraries
ii  libcairo2  1.4.2-1   The Cairo 2D vector graphics libra
ii  libdbus-1-31.0.2-1   simple interprocess messaging syst
ii  libdbus-glib-1-2   0.73-1simple interprocess messaging syst
ii  libfontconfig1 2.4.2-1.2 generic font configuration library
ii  libgconf2-42.18.0.1-2GNOME configuration database syste
ii  libgconf2.0-cil2.16.0-1  CLI binding for GConf 2.16
ii  libglade2.0-cil2.10.0-1  CLI binding for the Glade librarie
ii  libglib2.0-0   2.12.11-1 The GLib library of C routines
ii  libglib2.0-cil 2.10.0-1  CLI binding for the GLib utility l
ii  libgnome2.0-cil2.16.0-1  CLI binding for Gnome 2.16
ii  libgnomevfs2-0 1:2.18.0.1-1  GNOME Virtual File System (runtime
ii  libgstreamer0.10-0 0.10.12-2 Core GStreamer libraries and eleme
ii  libgtk2.0-02.10.11-1 The GTK+ graphical user interface 
ii  libgtk2.0-cil  2.10.0-1  CLI binding for the GTK+ toolkit 2
ii  libipoddevice0 0.5.2-1   library for retrieving information
ii  libmono-cairo2.0-cil   1.2.2.1-2 Mono Cairo library
ii  libmono-corlib1.0-cil  1.2.3.1-3 Mono core library (1.0)
ii  libmono-corlib2.0-cil  1.2.3.1-3 Mono core library (2.0)
ii  libmono-security2.0-cil1.2.3.1-3 Mono Security library
ii  libmono-sqlite2.0-cil  1.2.3.1-3 Mono Sqlite library
ii  libmono-system-data2.0-cil 1.2.3.1-3 Mono System.Data Library
ii  libmono-system-web2.0-cil  1.2.3.1-3 Mono System.Web Library
ii  libmono-system2.0-cil  1.2.3.1-3 Mono System libraries (2.0)
ii  libmono1.0-cil 1.2.3.1-3 Mono libraries (1.0)
ii  libmono2.0-cil 1.2.3.1-3 Mono libraries (2.0)
ii  libmusicbrainz4c2a 2.1.4-1   Second generation incarnation of t
ii  libnautilus-burn3  2.14.3-8+b1   Nautilus Burn Library - runtime ve
ii  libnjb52.2.5-4.1 Creative Labs Nomad Jukebox librar
ii  liborbit2  1:2.14.4-1libraries for ORBit2 - a CORBA ORB
ii  libpango1.0-0  1.16.1-1  Layout and rendering of internatio
ii  libusb-0.1-4   2:0.1.12-6userspace USB programming library
ii  libx11-6   2:1.1.1-1 X11 client-side library
ii  libxcursor11:1.1.8-1 X cursor management library
ii  libxext6   1:1.0.3-1 X11 miscellaneous extension librar
ii  libxfixes3 1:4.0.3-1 X11 miscellaneous 'fixes' extensio
ii  libxi6 2:1.1.0-2 X11 Input extension library
ii  libxinerama1   1:1.0.1-4.1   X11 Xinerama extension library
ii  libxml22.6.27.dfsg-1 GNOME XML library
ii  libxrandr2 2:1.2.0-4 X11 RandR extension library
ii  libxrender11:0.9.1-3 X Rendering Extension client libra
ii  mono-runtime   1.2.3.1-3 Mono runtime

Versions of packages banshee recommends:
ii  gstreamer0.10-plugins-ugly0.10.5-1   GStreamer plugins from the "ugly" 

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#416824: klaptopdaemon: lock & hibernate allowing unauthorised access

2007-04-04 Thread Raúl Sánchez Siles
forwarded 416824 https://bugs.kde.org/show_bug.cgi?id=143859
thanks

El Martes, 3 de Abril de 2007 00:01, Sune Vuorela escribió:
> > > Hi, I'm using Etch RC2 and I use klaptopdaemon to lock and hibernate my
> > > laptop when I noticed an interesting little bug.  I access lock and
> > > hibernate by right-clicking on the system tray icon and clicking on the
> > > option there.
>
> I have absolutely only very little clue about this, but I took a look at
> the klaptopdaemon sources - and it seems it invokes the lock command and
> after that it invokes hibernate.
>
> It might be that the lock command returns immediately while the locking can
> be delayed for some reasons.
>
  After some conversation on #kde they pointed me the reason is indeed that, 
but instead of carrying out the test Sune proposed it suggested me a "smarter 
kde way" (TM) which consists of substituing the asynchronous "send" dcop API 
call by a "call" which is synchronous.

  I also opened a bug on kde and there is a proposed patch

-- 
 Raúl Sánchez Siles
->Proud Debian user<-
Linux registered user #416098


pgpbZPswyoP3Q.pgp
Description: PGP signature


Bug#416374: marked as done (kernel: data corruption with nvidia chipsets and IDE/SATA drives // memory hole mapping related bug?!)

2007-04-04 Thread Debian Bug Tracking System
Your message dated Wed, 4 Apr 2007 17:05:02 -0700
with message-id <[EMAIL PROTECTED]>
and subject line kernel: data corruption with nvidia chipsets and IDE/SATA 
drives // memory hole mapping related bug?! 
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: kernel
Severity: critical
Justification: causes serious data loss

Hi everybody.

I'm currently (together with others) investigating in a severe data
corruption problem that at least many users might suffer from.

A short description, when you validate lots of GBs over and over with
md5sums (or another hash) there are errors found.

We do not yet know the real reson for the problems but it might relate
to Opteron (and perhaps Athlon) CPUs and/or Nvidia chipsets (mainboard).
So it might be a hardware design error (but even a kernel error could be
possible).
This is definitely not a single hardware issue of my system as many
other users on lkml reported the problem (and we all did very extensive
hardware tests).

The error occurs only if on has so much memory that the system uses
memory mapping (and the hardware iommu).
At lkml we currently found two "solutions" (I consider them more
workarounds, as we don't know exactly why they're solving the problem):
1) Disabling memory hole mapping in the system BIOS. The downside is
that there is no memory hole mapping at all, and the users looses much
of his main memory (in my case 1,5 GB)
2) Setting iommu=soft. The users keeps it full memory, and in all our
tests (at least as far as I am informed), and we do very much tests as I
and someone else administer some big linux clusters,... the error did
_not_ occur.

Windows users do generally not suffer from this corruption, as Windows
(at least until Vista) was not able to make use of the hardware iommu,
and always uses the software iommu.
The Intel CPUs with EMT64/Intel64 don't suffer from that problem either,
as they don't have an hwiommu, too (at least as far as I know).

We are not yet sure if this is a large scale problem or affects only
some special hardware combinations. We do however think that the issue
occurs only with PCI-DMA accesses. (Tests showed, that when disabling
dma or at least using slower dma modes on the disks, the issue disappeared).
The problem is vendors (at least Nvidia) does not help very much, they
even didn't answer my mails.
And most "normal" users won't recognise this problem, as they don't have
enought main memory and even it they have the error occurs very rarely
(perhaps some 100 bytes every 30 GB <- only a very imprecise scale).

What I suggest know:
As this is a very grave I suggest

- to configure all the default kernels for etch that may be affected (as
far as I know that are the amd64-k8 and amd64-generic kernels. Perhaps
the i386 packages too, have a look at lkml for this) to use iommu=soft.
- to update all packages in sarge and woody (as far as they might be
affected)
- put some warnings in the packages where users might configure their
own kernel and the boot-loaders.

Have a look at this thread at lkml
http://marc.theaimsgroup.com/?t=11650212181&r=1&w=2 for in-depth
information.
It also contains links to some previous threads. There are also some
posts to lkml about this topics in separate threads (e.g. "amd64 iommu
causing corruption? (was Re: data corruption with nvidia chipsets and
IDE/SATA drives // memory hole mapping related bug?!)").

Best wishes,
Chris.

btw: please CC me as I'm off-list at the moment.
PS: I'll also write this the debian-kernel mailinglist.



-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/dash
Kernel: Linux 2.6.18
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=UTF-8)


begin:vcard
fn:Mitterer, Christoph Anton
n:Mitterer;Christoph Anton
email;internet:[EMAIL PROTECTED]
x-mozilla-html:TRUE
version:2.1
end:vcard

--- End Message ---
--- Begin Message ---
clone 416374 -1
reassign -1 installation-guide-amd64
reopen -1
found -1 20070319
severity -1 important
thanks

The following explanatory text has been added to the release notes in CVS:

 5.1.7 Data corruption with Hardware IOMMU on Nvidia chipsets

 A problem has been identified on AMD64 systems with Nvidia chipsets and more
 than 3GB of RAM that causes sporadic data corruption when the hardware IOMMU
 is used. This problem is still under investigation by the Linux kernel
 developers and the hardware manufacturers, and no official upstream fix has
 been

Processed: Re: kernel: data corruption with nvidia chipsets and IDE/SATA drives // memory hole mapping related bug?!

2007-04-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> clone 416374 -1
Bug#416374: kernel: data corruption with nvidia chipsets and IDE/SATA drives // 
memory hole mapping related bug?!
Bug 416374 cloned as bug 417853.

> reassign -1 installation-guide-amd64
Bug#417853: kernel: data corruption with nvidia chipsets and IDE/SATA drives // 
memory hole mapping related bug?!
Bug reassigned from package `release-notes' to `installation-guide-amd64'.

> reopen -1
Bug#417853: kernel: data corruption with nvidia chipsets and IDE/SATA drives // 
memory hole mapping related bug?!
Bug is already open, cannot reopen.

> found -1 20070319
Bug#417853: kernel: data corruption with nvidia chipsets and IDE/SATA drives // 
memory hole mapping related bug?!
Bug marked as found in version 20070319.

> severity -1 important
Bug#417853: kernel: data corruption with nvidia chipsets and IDE/SATA drives // 
memory hole mapping related bug?!
Severity set to `important' from `serious'

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#417848: gclcvs: FTBFS: Error: FLOATING-POINT-OVERFLOW

2007-04-04 Thread Kurt Roeckx
Package: gclcvs
Version: 2.7.0-66
Severity: serious

Hi,

Your package failed to build with the following error:
>echo "(compile-file \"demos/gc-monitor.lisp\" :c-file nil :c-debug nil)" | 
>../unixport/saved_gcl
GCL (GNU Common Lisp)  2.7.0 CLtL1Apr  4 2007 22:39:43
Source License: LGPL(gcl,gmp,pargcl), GPL(unexec,bfd,xgcl)
Binary License:  GPL due to GPL'ed components: (XGCL READLINE BFD UNEXEC)
Modifications of this banner must retain notice of a compatible license
Dedicated to the memory of W. Schelter

Use (help) to get some basic information on how to use GCL.

Temporary directory for compiler files set to /tmp/

>
;; Compiling demos/gc-monitor.lisp.
;; Loading ./gcl_cmpinit.lsp
;; Loading tk-package.lsp
;; Finished loading tk-package.lsp
;; Finished loading ./gcl_cmpinit.lsp

Error: FLOATING-POINT-OVERFLOW :OPERATION * :OPERANDS (-6.45636043S19 
-9223372036854775808) NIL
Fast links are on: do (si::use-fast-links nil) for debugging
Signalled by COMPILER::COMPILE-FILE1.
FLOATING-POINT-OVERFLOW :OPERATION * :OPERANDS (-6.45636043S19 
-9223372036854775808) NIL

Broken at COMPILER::COMPILE-FILE1.  Type :H for Help.
TK>>make[2]: *** [demos/gc-monitor.o] Error 255
make[2]: Leaving directory `/build/buildd/gclcvs-2.7.0/gcl-tk'


Kurt



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#417844: gobby: symbol lookup error: gobby: undefined symbol: _ZN3Gtk6Window16set_urgency_hintEb

2007-04-04 Thread Steve Langasek
severity 417844 normal
reassign 417844 libgtkmm-2.4-1c2a
thanks

On Wed, Apr 04, 2007 at 02:58:48PM -0700, Kingsley G. Morse Jr. wrote:
> Package: gobby
> Version: 0.4.1-2
> Severity: grave
> Justification: renders package unusable

> Thanks for maintaining gobby. I'm looking forward
> to white-boarding.

> I noticed that the first time I ran gobby, it
> crashed with:

> gobby: symbol lookup error: gobby: undefined symbol: 
> _ZN3Gtk6Window16set_urgency_hintEb

> This was fixed by upgrading libgtkmm-2.4-1c2a from
> version 1:2.6.5-1 to 1:2.8.8-1.

> Perhaps gobby's dependencies should say

> libgtkmm-2.4-1c2a (>= 1:2.8.8-1).

Yes, they should, but this is an automatically generated dependency based on
the shlibs provided by libgtkmm-2.4-1c2a, so this is a bug in that package
for not providing correctly versioned shlibs.

However, as 1:2.8.8-1 is the only version of libgtkmm-2.4-1c2a in the
archive since June 2006 (and hence the only version formally supported by
Debian), this is not a grave bug.  Downgrading and reassigning.

Thanks,
-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#417844: gobby: symbol lookup error: gobby: undefined symbol: _ZN3Gtk6Window16set_urgency_hintEb

2007-04-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 417844 normal
Bug#417844: gobby: symbol lookup error: gobby: undefined symbol: 
_ZN3Gtk6Window16set_urgency_hintEb
Severity set to `normal' from `grave'

> reassign 417844 libgtkmm-2.4-1c2a
Bug#417844: gobby: symbol lookup error: gobby: undefined symbol: 
_ZN3Gtk6Window16set_urgency_hintEb
Bug reassigned from package `gobby' to `libgtkmm-2.4-1c2a'.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#417049: marked as done (gclcvs: ./saved_pre_gcl: No such file or directory)

2007-04-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Apr 2007 22:32:08 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#417049: fixed in gclcvs 2.7.0-66
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: gclcvs
Version: 2.7.0-65
Severity: serious

Hi,

Your package is failing to build on 64 bit arches with the
following error:
Lisp initialization failed.
rm -f tmp_image
rm raw_pre_gcl pre_init.lsp post_init.lsp
make[2]: Leaving directory `/build/buildd/gclcvs-2.7.0/unixport'
cd unixport && echo '(si::use-fast-links nil)(load "boot.lisp")' | 
./saved_pre_gcl && /usr/bin/make saved_gcl && mv saved_gcl saved_pre_gcl
/bin/sh: ./saved_pre_gcl: No such file or directory
make[1]: *** [unixport/saved_pre_gcl] Error 127
make[1]: Leaving directory `/build/buildd/gclcvs-2.7.0'
make: *** [build-trad-stamp] Error 2


Kurt


--- End Message ---
--- Begin Message ---
Source: gclcvs
Source-Version: 2.7.0-66

We believe that the bug you reported is fixed in the latest version of
gclcvs, which is due to be installed in the Debian FTP archive:

gclcvs-doc_2.7.0-66_all.deb
  to pool/main/g/gclcvs/gclcvs-doc_2.7.0-66_all.deb
gclcvs_2.7.0-66.dsc
  to pool/main/g/gclcvs/gclcvs_2.7.0-66.dsc
gclcvs_2.7.0-66.tar.gz
  to pool/main/g/gclcvs/gclcvs_2.7.0-66.tar.gz
gclcvs_2.7.0-66_i386.deb
  to pool/main/g/gclcvs/gclcvs_2.7.0-66_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Camm Maguire <[EMAIL PROTECTED]> (supplier of updated gclcvs package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 04 Apr 2007 14:01:28 -0400
Source: gclcvs
Binary: gclcvs gclcvs-doc
Architecture: source i386 all
Version: 2.7.0-66
Distribution: unstable
Urgency: low
Maintainer: Camm Maguire <[EMAIL PROTECTED]>
Changed-By: Camm Maguire <[EMAIL PROTECTED]>
Description: 
 gclcvs - GNU Common Lisp compiler, CVS snapshot
 gclcvs-doc - Documentation for GNU Common Lisp, CVS snapshot
Closes: 417049
Changes: 
 gclcvs (2.7.0-66) unstable; urgency=low
 .
   * clisp-style directory;fix multiple-setq-expander
   * fix 64bit array sizes, Closes: #417049
   * fix name-char on control characters
   * fix reading and printing of random-states
   * fix reading and printing of floats
   * fix equalp on random-states
Files: 
 419757d675c02f335d05295a3147e1ce 686 interpreters optional gclcvs_2.7.0-66.dsc
 b286753920599127cb1f17218ba5b4e6 23286707 interpreters optional 
gclcvs_2.7.0-66.tar.gz
 185c6fb354733bec67bf8da58fd7d264 2352558 doc optional 
gclcvs-doc_2.7.0-66_all.deb
 0dd4a3b6c5513b8b0967e1db82fe0738 39539636 interpreters optional 
gclcvs_2.7.0-66_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGFCFlczG1wFfwRdwRAkr9AKC0nd2bekwGQvBxtgOws/jYnZEbJwCgiGLu
ozFVmVRs+y/SUXoESjw2b78=
=WWCz
-END PGP SIGNATURE-

--- End Message ---


Bug#401010: evolution: Evolution hangs when i try to read a mail

2007-04-04 Thread Øystein Gisnås

2007/4/4, WaVeR <[EMAIL PROTECTED]>:

But still have the same problem, as u can see on the gdb backtrace


Ok. Thanks for reporting back. The bug is fixed upstream. The bug we
had to revert was my attempt at a backport. Since we're so close to a
release, we'll wait until the release and evolution 2.8 is pushed from
experimental to unstable. Then we'll upload 2.10, which has this
fixed. I've already built 2.10, so it shouldn't take too long. Give me
a hint if you want to try 2.10.

Øystein



Processed: reopening 401010, found 401010 in 1.8.2-3

2007-04-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.10.2
> reopen 401010 WaVeR <[EMAIL PROTECTED]>
Bug#401010: evolution: Evolution hangs when i try to read a mail
'reopen' may be inappropriate when a bug has been closed with a version;
you may need to use 'found' to remove fixed versions.
Bug reopened, originator set to WaVeR <[EMAIL PROTECTED]>.

> found 401010 1.8.2-3
Bug#401010: evolution: Evolution hangs when i try to read a mail
Bug marked as found in version 1.8.2-3.

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#417844: gobby: symbol lookup error: gobby: undefined symbol: _ZN3Gtk6Window16set_urgency_hintEb

2007-04-04 Thread Kingsley G. Morse Jr.
Package: gobby
Version: 0.4.1-2
Severity: grave
Justification: renders package unusable


Thanks for maintaining gobby. I'm looking forward
to white-boarding.

I noticed that the first time I ran gobby, it
crashed with:

gobby: symbol lookup error: gobby: undefined symbol: 
_ZN3Gtk6Window16set_urgency_hintEb

This was fixed by upgrading libgtkmm-2.4-1c2a from
version 1:2.6.5-1 to 1:2.8.8-1.

Perhaps gobby's dependencies should say

libgtkmm-2.4-1c2a (>= 1:2.8.8-1).

Thanks,
Kingsley

-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-k7
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages gobby depends on:
ii  libart-2.0-2  2.3.16-5   Library of functions for 2D graphi
ii  libatk1.0-0   1.12.2-1   The ATK accessibility toolkit
ii  libavahi-compat-howl0 0.6.16-5   Avahi Howl compatibility library
ii  libbonobo2-0  2.14.0-1   Bonobo CORBA interfaces library
ii  libc6 2.3.6-7GNU C Library: Shared libraries
ii  libcairo2 1.2.4-1The Cairo 2D vector graphics libra
ii  libfontconfig12.4.1-2generic font configuration library
ii  libgcc1   1:4.1.1-18 GCC support library
ii  libgconf2-4   2.14.0-4   GNOME configuration database syste
ii  libglib2.0-0  2.12.4-2   The GLib library of C routines
ii  libglibmm-2.4-1c2a2.8.2-2C++ wrapper for the GLib toolkit (
ii  libgnomeprint2.2-02.12.1-6   The GNOME 2.2 print architecture -
ii  libgnomevfs2-02.14.2-2+b1GNOME virtual file-system (runtime
ii  libgnutls13   1.4.4-1the GNU TLS library - runtime libr
ii  libgtk2.0-0   2.8.10-1   The GTK+ graphical user interface 
ii  libgtkmm-2.4-1c2a 1:2.8.8-1  C++ wrappers for GTK+ 2.4 (shared 
ii  libgtksourceview1.0-0 1.8.1-2shared libraries for the GTK+ synt
ii  libnet6-1.3-0 1:1.3.1-3  Network access framework for IPv4/
ii  libobby-0.4-0 0.4.1-2Synced document buffers
ii  liborbit2 1:2.14.3-0.1   libraries for ORBit2 - a CORBA ORB
ii  libpango1.0-0 1.14.8-2   Layout and rendering of internatio
ii  libsigc++-2.0-0c2a2.0.16-2   type-safe Signal Framework for C++
ii  libstdc++64.1.1-18   The GNU Standard C++ Library v3
ii  libx11-6  2:1.0.3-4  X11 client-side library
ii  libxcursor1   1.1.3-1X cursor management library
ii  libxext6  1:1.0.1-2  X11 miscellaneous extension librar
ii  libxfixes31:4.0.1-5  X11 miscellaneous 'fixes' extensio
ii  libxi61:1.0.1-4  X11 Input extension library
ii  libxinerama1  6.8.2.dfsg.1-7 X Window System multi-head display
ii  libxml++2.6-2 2.14.0-0.1 A C++ interface to the GNOME XML l
ii  libxml2   2.6.27.dfsg-1  GNOME XML library
ii  libxrandr24.3.0.dfsg.1-1 X Window System Resize, Rotate and
ii  libxrender1   1:0.9.0.2-1X Rendering Extension client libra
ii  zlib1g1:1.2.1-2  compression library - runtime

gobby recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#401010: evolution: Evolution hangs when i try to read a mail

2007-04-04 Thread WaVeR
Hi Øystein,

I update my evolution-data-server


23:42 [EMAIL PROTECTED] ~% dpkg -l \*evolution\* | grep ^ii
ii  evolution  2.8.2.1-1  groupware suite with mail client and organizer
ii  evolution-common  2.8.2.1-1  architecture independent files for
Evolution
ii  evolution-data-server  1.8.2-3  evolution database backend server
ii  evolution-data-server-common  1.8.2-3  architecture independent
files for Evolution D
ii  openoffice.org-evolution 2.0.4.dfsg.2-7 Evolution Addressbook
support for OpenOffice.o

But still have the same problem, as u can see on the gdb backtrace:

(evolution-2.8:26329): camel-WARNING **: Camel operation status stack
non empty: 
I/O error : Too many open files
I/O warning : failed to load external entity
"/home/waver/.evolution/mail/config/et-expanded-maildir:___home_waver_Maildir#._23evolution_Trash"
I/O error : Too many open files
I/O warning : failed to load external entity
"/usr/share/evolution/2.8/views/mail/galview.xml"
I/O error : Too many open files
I/O warning : failed to load external entity
"/home/waver/.evolution/mail/views/current_view-maildir:___home_waver_Maildir#._23evolution_Trash.xml"
[New Thread -1301283920 (LWP 26359)]

(evolution-2.8:26329): camel-WARNING **: camel_exception_get_id called
with NULL parameter.

(evolution-2.8:26329): camel-WARNING **: camel_exception_get_id called
with NULL parameter.

(evolution-2.8:26329): camel-WARNING **: camel_exception_get_id called
with NULL parameter.

(evolution-2.8:26329): camel-WARNING **: camel_exception_get_id called
with NULL parameter.

(evolution-2.8:26329): e-table-CRITICAL **: e_table_state_duplicate:
assertion `state != NULL' failed

Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread -1232451904 (LWP 26329)]
0xb7e7b7fe in e_table_state_load_from_node ()
from /usr/lib/evolution/2.8/libetable.so.0
(gdb) backtrace
#0  0xb7e7b7fe in e_table_state_load_from_node ()
from /usr/lib/evolution/2.8/libetable.so.0
#1  0xb7e7ba71 in e_table_state_load_from_file ()
from /usr/lib/evolution/2.8/libetable.so.0
#2  0xb6551aa8 in ?? () from /usr/lib/evolution/2.8/libmenus.so.0
#3  0x in ?? ()


Regards,

Le mercredi 04 avril 2007 à 15:29 +0200, Øystein Gisnås a écrit : 
> A patch which supposedly should fix this problem was uploaded, but
> created consistent crashes. I've reverted the patch and Loïc has
> reoploaded. Do you have a chance to see if the problem is existent
> with the newly uploaded 1.8.2-3 version of evolution-data-server (and
> its libraries)?
> 
> Cheers,
> Øystein
> 




Bug#417763: marked as done (monodevelop-versioncontrol: uninstalable because wrong dependencies on libapr0 and libsvn0)

2007-04-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Apr 2007 20:32:08 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#417763: fixed in monodevelop 0.13.1+dfsg-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: monodevelop-versioncontrol
Version: 0.13.1+dfsg-1
Severity: grave
Justification: renders package unusable


Package is uninstalable, depends are wrong, libapr0 >= 2.0.55 and
libsvn0 >= 1.4.0 don't exist on Debian archive.


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (99, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-k7
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

--- End Message ---
--- Begin Message ---
Source: monodevelop
Source-Version: 0.13.1+dfsg-2

We believe that the bug you reported is fixed in the latest version of
monodevelop, which is due to be installed in the Debian FTP archive:

monodevelop-boo_0.13.1+dfsg-2_all.deb
  to pool/main/m/monodevelop/monodevelop-boo_0.13.1+dfsg-2_all.deb
monodevelop-java_0.13.1+dfsg-2_all.deb
  to pool/main/m/monodevelop/monodevelop-java_0.13.1+dfsg-2_all.deb
monodevelop-nunit_0.13.1+dfsg-2_all.deb
  to pool/main/m/monodevelop/monodevelop-nunit_0.13.1+dfsg-2_all.deb
monodevelop-query_0.13.1+dfsg-2_all.deb
  to pool/main/m/monodevelop/monodevelop-query_0.13.1+dfsg-2_all.deb
monodevelop-versioncontrol_0.13.1+dfsg-2_all.deb
  to pool/main/m/monodevelop/monodevelop-versioncontrol_0.13.1+dfsg-2_all.deb
monodevelop_0.13.1+dfsg-2.diff.gz
  to pool/main/m/monodevelop/monodevelop_0.13.1+dfsg-2.diff.gz
monodevelop_0.13.1+dfsg-2.dsc
  to pool/main/m/monodevelop/monodevelop_0.13.1+dfsg-2.dsc
monodevelop_0.13.1+dfsg-2_all.deb
  to pool/main/m/monodevelop/monodevelop_0.13.1+dfsg-2_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Mirco Bauer <[EMAIL PROTECTED]> (supplier of updated monodevelop package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 04 Apr 2007 22:00:22 +0200
Source: monodevelop
Binary: monodevelop-versioncontrol monodevelop-nunit monodevelop-java 
monodevelop-boo monodevelop monodevelop-query
Architecture: source all
Version: 0.13.1+dfsg-2
Distribution: unstable
Urgency: low
Maintainer: Mirco Bauer <[EMAIL PROTECTED]>
Changed-By: Mirco Bauer <[EMAIL PROTECTED]>
Description: 
 monodevelop - C#/Boo/Java/Nemerle/ILasm/ASP.NET Development Environment
 monodevelop-boo - Boo plugin for MonoDevelop
 monodevelop-java - Java plugin for MonoDevelop
 monodevelop-nunit - NUnit plugin for MonoDevelop
 monodevelop-query - MonoQuery plugin for MonoDevelop
 monodevelop-versioncontrol - VersionControl plugin for MonoDevelop
Closes: 417763
Changes: 
 monodevelop (0.13.1+dfsg-2) unstable; urgency=low
 .
   * debian/patches/use_libsvn1.dpatch:
 debian/patches/use_libapr1.dpatch:
 + Remove references in the code that pulls libsvn0 and libapr0 in.
   (Closes: #417763)
Files: 
 e49f0eafdfd0161ac63ee43374eeb103 1730 devel optional 
monodevelop_0.13.1+dfsg-2.dsc
 d5343fb4a9f1ca23eb406636795cc359 18222 devel optional 
monodevelop_0.13.1+dfsg-2.diff.gz
 63b5766c9cee507ccae0128aecb9d5d0 2041174 devel optional 
monodevelop_0.13.1+dfsg-2_all.deb
 2de7412c13a09f208c67a9b317918aeb 60194 devel optional 
monodevelop-boo_0.13.1+dfsg-2_all.deb
 5ea7330b25e8d541fe973df063bb474c 51526 devel optional 
monodevelop-java_0.13.1+dfsg-2_all.deb
 c56d127dbc55754192549e9dd9c5dfdf 52768 devel optional 
monodevelop-nunit_0.13.1+dfsg-2_all.deb
 e267cc92146add1f841afa513e2974ca 96754 devel optional 
monodevelop-versioncontrol_0.13.1+dfsg-2_all.deb
 a0b5c37ae567546e3526b7102fdb666c 68382 devel optional 
monodevelop-query_0.13.1+dfsg-2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iQEVAwUBRhQE4nEn5avu+UbIAQKGzAf8DZMNl9/cISMgDmDTRRG3BcsK/a1ZlixX
wk3etkHbO1RwDUTQGIvJodmzZiM57ycnBmbiR7+a/nyR7jmPmPqD+Iff1XYMuLKa
XntiuWsjHWf44/LxtRByhQSHJb1c2b2RJU+eQMRvyXrDfF4W/xAEA1rU8EtoFEX5
s7O7RR79nqh3MQ+UJKonUfdRwPFwmDDTp+wxja3R9ilZAnDci6HjLrZ336cSYXPe
taQFF2El/XB2eqNgLkOnTBf1QmQkIBq7yOid6PA2bkYGSxVVsAt

Bug#417649: 100% cpu utilization with kdelibs 4:3.5.5a.dfsg.1-8

2007-04-04 Thread Steve Langasek
On Wed, Apr 04, 2007 at 05:24:25PM +0100, Ana Guerrero wrote:

> > >Can you try to upgrade again to -8 and see if still happens?

> > The problem persisted; when I downgrade to a previous version the  
> > problem disappear. Please notice that I'm not only upgrading  
> > (downgrading) kdelibs, I've also upgrading (downgrading) kdelibs4c2a  
> > and kdelibs-data.

> Yes, all those packages are built from the same source.

> > I'm using 8859-1 as my locale (probably it doesn't matter, but the  
> > patch is about a problem with utf-8, I'm bringing this to your  
> > attention just in case it would matter).

> Yes, that is the *only* change between versions, so i do not understand 
> where you problem come from.

As a test, it might be a good idea for the user to rebuild local copies of
both -7 and -8 to see if the bug follows the source or the binary.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#417789: this doesn't seem like a security issue

2007-04-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 417789 security
Bug#417789: elinks: elinks uses untrusted gettext catalog
Tags were: patch
Tags added: security

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#417789: this doesn't seem like a security issue

2007-04-04 Thread Steve Langasek
tags 417789 security
thanks

On Wed, Apr 04, 2007 at 08:04:52PM +0300, Eddy Petrișor wrote:

> > I tagged this bug as grave+security because it can be used to make
> > elinks load any corrupted file, and possibly execute arbitrary code.

> How? Those are only strings. Nothing is executed from po/mo/gmo files.

You've audited the code and proven that the segfault in elinks2 can't be
exploited into an arbitrary code execution bug?

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/



Bug#417673: /sbin/fsck.vfat: Incorrectly truncates files of 4294966784 bytes length during boot.

2007-04-04 Thread Andreas Barth
* Andrew Vaughan ([EMAIL PROTECTED]) [070404 08:54]:
> The file system on /dev/hda8 was checked immediately before reboot using the 
> GUI tool 
> in Windows 2000.  As the output /var/log/fsck/checkfs shows /sbin/fsck.vfat 
> decided 
> during boot that the filesystem was inconsistent and automatically truncated 
> the file.  
> Note that it hasn't actually released the clusters yet.  The clusters seem to 
> be freed 
> during when fsck is run at the next boot.
> 
> Also shown below is the result of manually copying an equivalant file, and 
> manually 
> running fsck.vfat is sufficent to reproduce the problem.
> 
> A quick test shows that Sarge does not truncate the file during boot.

The only difference between these versions is:
--- dosfstools-2.11.orig/dosfsck/boot.c
+++ dosfstools-2.11/dosfsck/boot.c
@@ -40,7 +40,7 @@
 ({ \
unsigned short __v; \
memcpy( &__v, &f, sizeof(__v) );\
-   CF_LE_W( *(unsigned short *)&f );   \
+   CF_LE_W( *(unsigned short *)&__v ); \
 })
 #else
 #define GET_UNALIGNED_W(f) CF_LE_W( *(unsigned short *)&f )


Cheers,
Andi
-- 
  http://home.arcor.de/andreas-barth/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#400218: marked as done (havp: install directory in /var/tmp)

2007-04-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Apr 2007 19:32:03 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#400218: fixed in havp 0.85-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: havp
Version: 0.82-1
Severity: serious
Justification: FHS violation

Hello Rene,

havp includes a directory in /var/tmp.

dpkg-deb -c havp_0.82-1_i386.deb | grep /var/tmp
drwxrwxr-x root/root 0 2006-08-02 22:21:47 ./var/tmp/
drwxr-xr-x root/root 0 2006-08-02 22:21:47 ./var/tmp/havp/

You should rather use /var/lib/havp or create the directory at run-time.

Cheers,
-- 
Bill. <[EMAIL PROTECTED]>

Imagine a large blue swirl here. 

--- End Message ---
--- Begin Message ---
Source: havp
Source-Version: 0.85-1

We believe that the bug you reported is fixed in the latest version of
havp, which is due to be installed in the Debian FTP archive:

havp_0.85-1.diff.gz
  to pool/main/h/havp/havp_0.85-1.diff.gz
havp_0.85-1.dsc
  to pool/main/h/havp/havp_0.85-1.dsc
havp_0.85-1_i386.deb
  to pool/main/h/havp/havp_0.85-1_i386.deb
havp_0.85.orig.tar.gz
  to pool/main/h/havp/havp_0.85.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Rene Mayrhofer <[EMAIL PROTECTED]> (supplier of updated havp package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 16 Mar 2007 11:43:14 +
Source: havp
Binary: havp
Architecture: source i386
Version: 0.85-1
Distribution: unstable
Urgency: low
Maintainer: Rene Mayrhofer <[EMAIL PROTECTED]>
Changed-By: Rene Mayrhofer <[EMAIL PROTECTED]>
Description: 
 havp   - HTTP Anti Virus Proxy
Closes: 350681 381113 400218 400218 409690
Changes: 
 havp (0.85-1) unstable; urgency=low
 .
   This is the "two Austrians independently submit patches to the slacking
   Austrian maintainer" release. Thanks for the help, which was surprisingly
   nearly orthogonal so that I could integrate both patches!
   * New upstream release, fixes compilation with libclamav 0.90. Now
 build-depend on libclamav-dev instead of libclamav1-dev.
 Closes: #409690: FTBFS: 'cl_loaddbdir' was not declared in this scope
   * Move run-time files from /var/tmp/havp to /var/spool/havp, which is still
 not ideal but my current interpretation of FHS 2.3 in the context of what
 havp is doing with these files (temporary storage for the scanner
 threads).
 Closes: #400218: havp: install directory in /var/tmp
   * Add debconf question about automatic creation of loopback filesystem. This
 creates a filesystem of user-defined size under /var/lib/state and mounts
 it at /var/spool/havp with mandatory locking support. In my interpretation
 of FHS 2.3, this is the best placement, but please feel free to comment.
 Now pre-depend on debconf and build-depend on po-debconf.
 Closes: #400218: havp: install directory in /var/tmp
 Closes: #381113 Problem removing havp
   * Make init script support the status command and only try to stop havp when
 it is considered to be running.
 Prevents future instances of: #381113 Problem removing havp
   Integrate parts of a patch by Michael Fladischer, many thanks!
   * Bump Standards-Version to 3.7.2.1, no changes.
   * Add suggests: squid.
   * Fix my messed up long description formatting.
 Closes: #350681: havp: poorly formatted description
   * Fix typo in LSB header of init script.
   * Add a manual page, now build-depend on docbook-to-man.
   * Also migrate this package to use dpatch, now build-depend on dpatch.
   Integrate and rework parts of a patch by Harald Jenny, many thanks!
   * Support automatic creation of a loopback filesystem to solve the problem
 of required mandatory locks for temporary files. However, mounting and
 unmounting is done by the init script and not via fstab, which seems
 "safer" to me (havp mount errors for its temporary storage should not
 prevent the whole system but just havp from starting).
   * Enable SSL passing support (--enable-ssl-tunnel configure option).
Files: 
 9b2197d625a675f8d2a5e1267e46919f 638 net optional havp_0.85-1.dsc
 6f05

Bug#409690: marked as done (FTBFS: 'cl_loaddbdir' was not declared in this scope)

2007-04-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Apr 2007 19:32:03 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#409690: fixed in havp 0.85-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: havp
Version: 0.82-1
Severity: serious

This package fails to compile:

> Automatic build of havp_0.82-1 on em64t by sbuild/amd64 0.52
...
> x86_64-linux-gnu-g++ -Wall -g -O2 -O2 -I/usr/include -g -O2 -Wall 
> -DUSECLAMLIB -c -o scanners/clamlibscanner.o scanners/clamlibscanner.cpp
> scanners/clamlibscanner.cpp: In member function 'virtual bool 
> ClamLibScanner::InitDatabase()':
> scanners/clamlibscanner.cpp:32: error: 'cl_loaddbdir' was not declared in 
> this scope
> scanners/clamlibscanner.cpp: In member function 'virtual bool 
> ClamLibScanner::ReloadDatabase()':
> scanners/clamlibscanner.cpp:68: error: 'cl_loaddbdir' was not declared in 
> this scope
> make[2]: *** [scanners/clamlibscanner.o] Error 1
> make[2]: Leaving directory `/build/tbm/havp-0.82/havp'

-- 
Martin Michlmayr
http://www.cyrius.com/

--- End Message ---
--- Begin Message ---
Source: havp
Source-Version: 0.85-1

We believe that the bug you reported is fixed in the latest version of
havp, which is due to be installed in the Debian FTP archive:

havp_0.85-1.diff.gz
  to pool/main/h/havp/havp_0.85-1.diff.gz
havp_0.85-1.dsc
  to pool/main/h/havp/havp_0.85-1.dsc
havp_0.85-1_i386.deb
  to pool/main/h/havp/havp_0.85-1_i386.deb
havp_0.85.orig.tar.gz
  to pool/main/h/havp/havp_0.85.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Rene Mayrhofer <[EMAIL PROTECTED]> (supplier of updated havp package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 16 Mar 2007 11:43:14 +
Source: havp
Binary: havp
Architecture: source i386
Version: 0.85-1
Distribution: unstable
Urgency: low
Maintainer: Rene Mayrhofer <[EMAIL PROTECTED]>
Changed-By: Rene Mayrhofer <[EMAIL PROTECTED]>
Description: 
 havp   - HTTP Anti Virus Proxy
Closes: 350681 381113 400218 400218 409690
Changes: 
 havp (0.85-1) unstable; urgency=low
 .
   This is the "two Austrians independently submit patches to the slacking
   Austrian maintainer" release. Thanks for the help, which was surprisingly
   nearly orthogonal so that I could integrate both patches!
   * New upstream release, fixes compilation with libclamav 0.90. Now
 build-depend on libclamav-dev instead of libclamav1-dev.
 Closes: #409690: FTBFS: 'cl_loaddbdir' was not declared in this scope
   * Move run-time files from /var/tmp/havp to /var/spool/havp, which is still
 not ideal but my current interpretation of FHS 2.3 in the context of what
 havp is doing with these files (temporary storage for the scanner
 threads).
 Closes: #400218: havp: install directory in /var/tmp
   * Add debconf question about automatic creation of loopback filesystem. This
 creates a filesystem of user-defined size under /var/lib/state and mounts
 it at /var/spool/havp with mandatory locking support. In my interpretation
 of FHS 2.3, this is the best placement, but please feel free to comment.
 Now pre-depend on debconf and build-depend on po-debconf.
 Closes: #400218: havp: install directory in /var/tmp
 Closes: #381113 Problem removing havp
   * Make init script support the status command and only try to stop havp when
 it is considered to be running.
 Prevents future instances of: #381113 Problem removing havp
   Integrate parts of a patch by Michael Fladischer, many thanks!
   * Bump Standards-Version to 3.7.2.1, no changes.
   * Add suggests: squid.
   * Fix my messed up long description formatting.
 Closes: #350681: havp: poorly formatted description
   * Fix typo in LSB header of init script.
   * Add a manual page, now build-depend on docbook-to-man.
   * Also migrate this package to use dpatch, now build-depend on dpatch.
   Integrate and rework parts of a patch by Harald Jenny, many thanks!
   * Support automatic creation of a loopback filesystem to solve the problem
 of required mandatory locks for temporary files. However, moun

Processed: Unmark as forwarded

2007-04-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> notforwarded 416374
Bug#416374: kernel: data corruption with nvidia chipsets and IDE/SATA drives // 
memory hole mapping related bug?!
Removed annotation that Bug had been forwarded to 
http://bugzilla.kernel.org/show_bug.cgi?id=7768.

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#416824: klaptopdaemon: lock & hibernate allowing unauthorised access

2007-04-04 Thread Raúl Sánchez Siles
El Miércoles, 4 de Abril de 2007 11:34, Marc Haber escribió:
> On Wed, Apr 04, 2007 at 08:55:19AM +0200, Raúl Sánchez Siles wrote:
> > El Lunes, 2 de Abril de 2007 20:42, Marc Haber escribió:
> > > On Mon, Apr 02, 2007 at 04:48:04PM +0100, Ana Guerrero wrote:
> > > > anyone has experiment something like this:
> > > >
> > > > On Fri, Mar 30, 2007 at 03:39:02PM +0100, Sheridan Hutchinson wrote:
> > > > > Depending on the load on the system, klaptopdaemon appears to be
> > > > > allowing somone unhibernating a locked & hibernated system, brief
> > > > > access to the desktop.
> >
> >   I think the first step step is knowing what procedure is used in order
> > to hibernate. Is this guy using the hibernate scripts? is he using
> > suspend or suspend2 method ?
>
> How do I find out what I use?
>
> >   True, so if we want kdelaptop solves the problem we should use a
> > solution as the one proposed by Sune, or alternatively we would need to
> > get a verbose hibernate log and analyse it, increasing the LogVerbosity
> > value up to 9 in the hibernate common.conf located at /etc/hibernate.
>
> I do not have an /etc/hibernate directory.
>
> Greetings
> Marc
>

  From this I guess you are using uswsusp. please check that package hibernate 
is _not_ installed and that uswsusp _is_. If you don't know how to do this 
check the existance of the dirs /usr/share/doc/uswsusp 
and /usr/share/doc/hibernate. If the dir doesn't exist, then the package is 
not installed.

  Unfortunately I thing I ran out of ideas, so maybe tweaking klaptopdaemon 
code would be the only solution. In this case, maybe some chat with kde 
people would help to do a sensible thing with this.

-- 
 Raúl Sánchez Siles
->Proud Debian user<-
Linux registered user #416098


pgpFARq5bCPc2.pgp
Description: PGP signature


Processed: this doesn't seem like a security issue

2007-04-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 417789 -security
Bug#417789: elinks: elinks uses untrusted gettext catalog
Tags were: patch security
Tags removed: security

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#417789: this doesn't seem like a security issue

2007-04-04 Thread Eddy Petrișor
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

tags 417789 -security
thanks

> I tagged this bug as grave+security because it can be used to make
> elinks load any corrupted file, and possibly execute arbitrary code.

How? Those are only strings. Nothing is executed from po/mo/gmo files.

> Imagine an evil user placing some specially crafted files in
> "/tmp/po/".  Then, another user (root for example) runs elinks from a
> directory "/tmp/foo/", and thus loads the bad file(s).

If they are loaded, that doesn't mean they are executed.

I won't deny that the relative path thingie leads to segfault (I
haven't tested), but the security tag doesn't seem justified.

- --
Regards,
EddyP
=
"Imagination is more important than knowledge" A.Einstein
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGE9qzY8Chqv3NRNoRAgS4AJ9QhbdIeovqdFZlmKqVhDREcxhGkQCfeZi1
Ru7qVfge1S0ofWGjCwj8fwc=
=bLEZ
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#417618: marked as done (hf: FTBFS: error: 'rdtsc_ok' undeclared (first use in this function))

2007-04-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Apr 2007 15:47:03 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#417618: fixed in hf 0.8-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: hf
Version: 0.8-2
Severity: serious


Hi,

Your package is failing to build with the following error:
refclock.c: In function 'refclock_current':
refclock.c:228: error: 'rdtsc_ok' undeclared (first use in this function)
refclock.c:228: error: (Each undeclared identifier is reported only once
refclock.c:228: error: for each function it appears in.)
refclock.c:217: warning: label 'time_known' defined but not used
make[4]: *** [refclock.o] Error 1


Kurt


--- End Message ---
--- Begin Message ---
Source: hf
Source-Version: 0.8-3

We believe that the bug you reported is fixed in the latest version of
hf, which is due to be installed in the Debian FTP archive:

hf_0.8-3.diff.gz
  to pool/main/h/hf/hf_0.8-3.diff.gz
hf_0.8-3.dsc
  to pool/main/h/hf/hf_0.8-3.dsc
hf_0.8-3_i386.deb
  to pool/main/h/hf/hf_0.8-3_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joop Stakenborg <[EMAIL PROTECTED]> (supplier of updated hf package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 04 Apr 2007 17:42:27 +0200
Source: hf
Binary: hf
Architecture: source i386
Version: 0.8-3
Distribution: unstable
Urgency: low
Maintainer: Debian Hamradio Maintainers 
Changed-By: Joop Stakenborg <[EMAIL PROTECTED]>
Description: 
 hf - amateur-radio protocol suite using a soundcard as a modem
Closes: 417618
Changes: 
 hf (0.8-3) unstable; urgency=low
 .
   * Compilation fix. Closes: #417618. Thanks Kurt Roeckx for reporting.
Files: 
 77241eb4d958919a0f26f5c415faa08f 844 hamradio optional hf_0.8-3.dsc
 5dc6f409389f5eb5d106b7785c33877a 119478 hamradio optional hf_0.8-3.diff.gz
 9335db609a1e90c6a3b08e0f8b277ddf 637060 hamradio optional hf_0.8-3_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGE8iT/CqtjGLxpX8RAovNAJ9/q2w857Red8zgtIAEjjMHzZ3bKQCgpeam
FPJ8xBjopyNYKgUlpKxdi7U=
=CZo1
-END PGP SIGNATURE-

--- End Message ---


Bug#417649: 100% cpu utilization with kdelibs 4:3.5.5a.dfsg.1-8

2007-04-04 Thread Ana Guerrero
> >
> >Can you try to upgrade again to -8 and see if still happens?
> >
> 
> The problem persisted; when I downgrade to a previous version the  
> problem disappear. Please notice that I'm not only upgrading  
> (downgrading) kdelibs, I've also upgrading (downgrading) kdelibs4c2a  
> and kdelibs-data.
>
Yes, all those packages are built from the same source.

> I'm using 8859-1 as my locale (probably it doesn't matter, but the  
> patch is about a problem with utf-8, I'm bringing this to your  
> attention just in case it would matter).
> 

Yes, that is the *only* change between versions, so i do not understand 
where you problem come from.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#417789: elinks: elinks uses untrusted gettext catalog

2007-04-04 Thread Arnaud Giersch
Package: elinks
Version: 0.11.1-1.2
Severity: grave
Tags: security, patch

Hi,

Elinks loads untrusted gettext catalog from the relative directory
"../po/", and crashes (SIGSEGV) if the loaded file is corrupted.  You
can check by yourself with with the following commands:

$ mkdir -p /tmp/elinks/{run,po}
$ cp /usr/share/locale/fr/LC_MESSAGES/elinks.mo /tmp/elinks/po/fr.gmo
$ dd if=/dev/urandom of=/tmp/elinks/po/fr.gmo bs=1024 seek=1 count=200
$ cd /tmp/elinks/run

$ LANG=fr_FR strace -eopen -otrace elinks
[...]
open("/usr/lib/locale/locale-archive", O_RDONLY|O_LARGEFILE) = 3
open("/usr/share/locale/locale.alias", O_RDONLY|O_LARGEFILE) = 3
open("../po/fr_FR.gmo", O_RDONLY|O_LARGEFILE) = -1 ENOENT (No such file or 
directory)
open("/usr/share/locale/fr_FR/LC_MESSAGES/messages.mo", O_RDONLY|O_LARGEFILE) = 
-1 ENOENT (No such file or directory)
open("../po/fr.gmo", O_RDONLY|O_LARGEFILE) = 3
--- SIGSEGV (Segmentation fault) @ 0 (0) ---
+++ killed by SIGSEGV (core dumped) +++
Process 29917 detached

A gdb backtrace is included at the end of the message.

I tagged this bug as grave+security because it can be used to make
elinks load any corrupted file, and possibly execute arbitrary code.

Imagine an evil user placing some specially crafted files in
"/tmp/po/".  Then, another user (root for example) runs elinks from a
directory "/tmp/foo/", and thus loads the bad file(s).

A quick grep for '\.\./po' in the elinks sources gives the culprit
function : add_filename_to_string() around line 216 of file
"elinks-0.11.1/src/intl/gettext/loadmsgcat.c".

IMHO, changing this function to return NULL unconditionally should fix
the problem (I did not want to download all the build dependencies to
verify).

Regards,

Arnaud Giersch


$ gdb -q /usr/bin/elinks -c core
(no debugging symbols found)
Using host libthread_db library "/lib/tls/i686/cmov/libthread_db.so.1".

warning: Can't read pathname for load map: Input/output error.
Reading symbols from /usr/lib/libgnutls.so.13...(no debugging symbols 
found)...done.
Loaded symbols for /usr/lib/libgnutls.so.13
Reading symbols from /usr/lib/liblua50.so.5.0...(no debugging symbols 
found)...done.
Loaded symbols for /usr/lib/liblua50.so.5.0
Reading symbols from /usr/lib/liblualib50.so.5.0...(no debugging symbols 
found)...done.
Loaded symbols for /usr/lib/liblualib50.so.5.0
Reading symbols from /lib/tls/i686/cmov/libm.so.6...
(no debugging symbols found)...done.
Loaded symbols for /lib/tls/i686/cmov/libm.so.6
Reading symbols from /usr/lib/libperl.so.5.8...(no debugging symbols 
found)...done.
Loaded symbols for /usr/lib/libperl.so.5.8
Reading symbols from /lib/tls/i686/cmov/libdl.so.2...(no debugging symbols 
found)...done.
Loaded symbols for /lib/tls/i686/cmov/libdl.so.2
Reading symbols from /lib/tls/i686/cmov/libpthread.so.0...
(no debugging symbols found)...done.
Loaded symbols for /lib/tls/i686/cmov/libpthread.so.0
Reading symbols from /lib/tls/i686/cmov/libc.so.6...(no debugging symbols 
found)...done.
Loaded symbols for /lib/tls/i686/cmov/libc.so.6
Reading symbols from /lib/tls/i686/cmov/libcrypt.so.1...(no debugging symbols 
found)...done.
Loaded symbols for /lib/tls/i686/cmov/libcrypt.so.1
Reading symbols from /usr/lib/libgpm.so.1...
(no debugging symbols found)...done.
Loaded symbols for /usr/lib/libgpm.so.1
Reading symbols from /usr/lib/libz.so.1...(no debugging symbols found)...done.
Loaded symbols for /usr/lib/libz.so.1
Reading symbols from /lib/libbz2.so.1.0...(no debugging symbols found)...done.
Loaded symbols for /lib/libbz2.so.1.0
Reading symbols from /usr/lib/libexpat.so.1...
(no debugging symbols found)...done.
Loaded symbols for /usr/lib/libexpat.so.1
Reading symbols from /usr/lib/libgnutls-openssl.so.13...(no debugging symbols 
found)...done.
Loaded symbols for /usr/lib/libgnutls-openssl.so.13
Reading symbols from /usr/lib/libtasn1.so.3...(no debugging symbols 
found)...done.
Loaded symbols for /usr/lib/libtasn1.so.3
Reading symbols from /usr/lib/libgcrypt.so.11...
(no debugging symbols found)...done.
Loaded symbols for /usr/lib/libgcrypt.so.11
Reading symbols from /usr/lib/libgpg-error.so.0...(no debugging symbols 
found)...done.
Loaded symbols for /usr/lib/libgpg-error.so.0
Reading symbols from /lib/ld-linux.so.2...Reading symbols from 
/usr/lib/debug/lib/ld-2.3.6.so...(no debugging symbols found)...done.

(no debugging symbols found)...done.
Loaded symbols for /lib/ld-linux.so.2
Reading symbols from /lib/tls/i686/cmov/libnsl.so.1...(no debugging symbols 
found)...done.
Loaded symbols for /lib/tls/i686/cmov/libnsl.so.1
(no debugging symbols found)
Core was generated by `elinks'.
Program terminated with signal 11, Segmentation fault.
#0  0x0809da6c in _nl_find_msg ()
(gdb)  where
#0  0x0809da6c in _nl_find_msg ()
#1  0x0809f4fe in _nl_init_domain_conv ()
#2  0x0809fc28 in _nl_load_domain ()
#3  0x0809e896 in _nl_find_domain ()
#4  0x0809de99 in dcigettext__ ()
#5  0x0809d4c1 in dcgettext__ ()
#6  0x0809e8c2 in gettext__ ()
#7  0x080a356e in get_dyn_full_ver

Bug#417763: monodevelop-versioncontrol: uninstalable because wrong dependencies on libapr0 and libsvn0

2007-04-04 Thread Daniel Serpell
Package: monodevelop-versioncontrol
Version: 0.13.1+dfsg-1
Severity: grave
Justification: renders package unusable


Package is uninstalable, depends are wrong, libapr0 >= 2.0.55 and
libsvn0 >= 1.4.0 don't exist on Debian archive.


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (99, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-k7
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: notfound 405186 in 0.12-5

2007-04-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.9.26
> notfound 405186 0.12-5
Bug#405186: docbook2x: FTBFS: reference to nonexistent nodes
Bug marked as not found in version 0.12-5.

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#401010: evolution: Evolution hangs when i try to read a mail

2007-04-04 Thread Øystein Gisnås

A patch which supposedly should fix this problem was uploaded, but
created consistent crashes. I've reverted the patch and Loïc has
reoploaded. Do you have a chance to see if the problem is existent
with the newly uploaded 1.8.2-3 version of evolution-data-server (and
its libraries)?

Cheers,
Øystein



Bug#417656: marked as done (evolution: Crashes when run)

2007-04-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Apr 2007 13:17:05 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#417656: fixed in evolution-data-server 1.8.2-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: evolution
Version: 2.8.2.1-1
Severity: grave
Justification: renders package unusable

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Maybe this is actually the fault of e-d-s since I just upgraded it
from 1.8.2-1 to 1.8.2-2. Anyway, here's a backtrace:

(gdb) run
Starting program: /usr/bin/evolution 
Failed to read a valid object file image from memory.
[Thread debugging using libthread_db enabled]
[New Thread 16384 (LWP 4988)]
CalDAV Eplugin starting up ...
evolution-shell-Message: Killing old version of evolution-data-server...

(evolution-2.8:4988): evolution-mail-WARNING **: ignored this junk plugin: not 
enabled or we have already loaded one

(evolution-2.8:4988): e-utils-WARNING **: Plugin 'Spamassassin junk plugin' 
failed to load hook 'org.gnome.evolution.mail.junk:1.0'
[New Thread 32769 (LWP 5015)]
[New Thread 16386 (LWP 5016)]
[New Thread 32771 (LWP 5017)]

Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 16386 (LWP 5016)]
0xb6272e5a in mail_msg_received (e=0x81d7638, msg=0x81db938, data=0x0)
at mail-mt.c:561
561 mail-mt.c: No such file or directory.
in mail-mt.c
(gdb) bt full
#0  0xb6272e5a in mail_msg_received (e=0x81d7638, msg=0x81db938, data=0x0)
at mail-mt.c:561
No locals.
#1  0xb7be292f in thread_dispatch (din=0x81d7638) at e-msgport.c:1025
e = 
m = (EMsg *) 0x81db938
info = 
self = 16386
#2  0xb7699c51 in pthread_start_thread (arg=0x81dec00) at manager.c:310
ldt_entry = {entry_number = 6, base_addr = 136178688, limit = 1048575, 
  seg_32bit = 1, contents = 0, read_exec_only = 0, limit_in_pages = 1, 
  seg_not_present = 0, useable = 1, empty = 0}
request = {req_thread = 0x0, req_kind = REQ_CREATE, req_args = {
create = {attr = 0x0, fn = 0, arg = 0x0, mask = {__val = {
  0 , 3077158621, 3077189620, 3077199008, 136178688, 
  3055169464, 3077169544, 136178688, 1, 3077169806, 1, 136178688}}}, 
free = {thread_id = 0}, exit = {code = 0}, post = 0x0, for_each = {fn = 0, 
  arg = 0x0}}}
outcome = 
#3  0xb7699db4 in pthread_start_thread_event (arg=0x81dec00) at manager.c:334
ldt_entry = {entry_number = 6, base_addr = 136178688, limit = 1048575, 
  seg_32bit = 1, contents = 0, read_exec_only = 0, limit_in_pages = 1, 
  seg_not_present = 0, useable = 1, empty = 0}
#4  0xb6c3f38a in clone () from /usr/lib/debug/libc.so.6
fstab_state = {fs_fp = 0x0, fs_buffer = 0x0, fs_mntres = {
mnt_fsname = 0x0, mnt_dir = 0x0, mnt_type = 0x0, mnt_opts = 0x0, 
mnt_freq = 0, mnt_passno = 0}, fs_ret = {fs_spec = 0x0, fs_file = 0x0, 
fs_vfstype = 0x0, fs_mntops = 0x0, fs_type = 0x0, fs_freq = 0, 
fs_passno = 0}}
__elf_set___libc_subfreeres_element_fstab_free__ = (
const void *) 0xb6c7a040
(gdb) quit

- -- System Information:
Debian Release: 4.0
  APT prefers testing
  APT policy: (530, 'testing'), (520, 'unstable'), (510, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-k7
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)

Versions of packages evolution depends on:
ii  dbus  1.0.2-1simple interprocess messaging syst
ii  evolution-common  2.8.2.1-1  architecture independent files for
ii  evolution-data-server 1.8.2-2evolution database backend server
ii  gconf22.16.1-1   GNOME configuration database syste
ii  gnome-icon-theme  2.18.0-1   GNOME Desktop icon theme
ii  gtkhtml3.83.12.1-2   HTML rendering/editing library - b
ii  libart-2.0-2  2.3.17-1   Library of functions for 2D graphi
ii  libatk1.0-0   1.18.0-1   The ATK accessibility toolkit
ii  libaudiofile0 0.2.6-6Open-source version of SGI's audio
ii  libavahi-client3  0.6.16-3etch1  Avahi client library
ii  libavahi-common3  0.6.16-3etch1  Avahi common library
ii  libavahi-glib10.6.16-3etch1  Avahi glib integration library
ii  libbonobo2-0  2.18.0-1   Bonobo CORBA interfaces library
ii  libbonoboui2-02.18.0-1   The Bonobo UI library
ii  libc6 2.3.6.ds1-13   GNU C Library: Shared libraries
ii  libcairo2 1

Bug#417747: Overwrites custom crontab

2007-04-04 Thread Michal Cihar
Package: planet
Version: 2.0-8
Severity: serious

Hi

on package upgrade postinst overwrites /etc/cron.d/planet regardless it
had some local modifications. This is IMHO against 10.7.3 of Debian
Policy Manual and should be fixed.

Maybe you can consider using ucf, which was built for such purpose.

-- 
Michal Čihař | http://cihar.com | http://blog.cihar.com


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/dash
Kernel: Linux 2.6.18-4-vserver-amd64
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)

Versions of packages planet depends on:
ii  debconf   1.5.13 Debian configuration management sy
ii  lighttpd [httpd]  1.4.13-10  A fast webserver with minimal memo
ii  python2.4.4-2An interactive high-level object-o
ii  python-support0.6.3  automated rebuilding support for p

planet recommends no packages.

-- debconf information excluded


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: debconf bug is in yada

2007-04-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> block 417557 with 417739
Bug#417739: depends on non-essential package debconf in postrm
Bug#417557: depends on non-essential package debconf in postrm
Was not blocked by any bugs.
Blocking bugs of 417557 added: 417739

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#417018: depends on non-essential package debconf in postrm

2007-04-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> clone 417018 -1
Bug#417018: depends on non-essential package debconf in postrm
Bug 417018 cloned as bug 417739.

> reassign -1 yada
Bug#417739: depends on non-essential package debconf in postrm
Bug reassigned from package `phpmyadmin' to `yada'.

> block 417018 by -1
Bug#417739: depends on non-essential package debconf in postrm
Bug#417018: depends on non-essential package debconf in postrm
Was not blocked by any bugs.
Blocking bugs of 417018 added: 417739

> # other package that also uses yada
> block 416744 by -1
Bug#417739: depends on non-essential package debconf in postrm
Bug#416744: depends on non-essential package debconf in postrm
Was not blocked by any bugs.
Blocking bugs of 416744 added: 417739

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#417018: depends on non-essential package debconf in postrm

2007-04-04 Thread Thijs Kinkhorst
clone 417018 -1
reassign -1 yada
block 417018 by -1
# other package that also uses yada
block 416744 by -1
thanks


Hi Michael,

On Sun, 2007-04-01 at 10:41 +0200, Michael Ablassmeier wrote:
> while running archive wide piuparts tests your package failed on purge
> because of debconf beeing unavailable during postrm:
> 
>Removing phpmyadmin ...
>   Purging configuration files for phpmyadmin ...
>   rmdir: /var/lib/phpmyadmin: No such file or directory
>   rmdir: /etc/phpmyadmin: No such file or directory
>   /var/lib/dpkg/info/phpmyadmin.postrm: line 86: db_stop: command not found

This is yada-generated code. I hence think that this bug should be fixed
in yada and then a rebuild of phpmyadmin should be done. I'm cloning
this bug for yada.

The db_stop should indeed be called only conditionally.

Thanks for your work in researching this.

Thijs


signature.asc
Description: This is a digitally signed message part


Bug#416755: marked as done (depends on non-essential package adduser in postrm)

2007-04-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Apr 2007 13:02:03 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#416755: fixed in git-core 1:1.5.1-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: git-daemon-run
Version: 1:1.5.0.3-1, 1:1.4.4.4-2
Severity: serious
Justification: Policy violation

hi,

while running archive wide piuparts tests your package failed on purge
because of adduser beeing unavailable during postrm:

   Purging configuration files for git-daemon-run ...
  /var/lib/dpkg/info/git-daemon-run.postrm: line 7: deluser: command not found
  dpkg: error processing git-daemon-run (--purge):
   subprocess post-removal script returned error exit status 127
  Errors were encountered while processing:
   git-daemon-run

the full log can be found here:

 http://people.debian.org/~abi/piuparts/

please be sure to use a conditional call in your postrm.

bye,
- michael

--- End Message ---
--- Begin Message ---
Source: git-core
Source-Version: 1:1.5.1-1

We believe that the bug you reported is fixed in the latest version of
git-core, which is due to be installed in the Debian FTP archive:

git-arch_1.5.1-1_all.deb
  to pool/main/g/git-core/git-arch_1.5.1-1_all.deb
git-core_1.5.1-1.diff.gz
  to pool/main/g/git-core/git-core_1.5.1-1.diff.gz
git-core_1.5.1-1.dsc
  to pool/main/g/git-core/git-core_1.5.1-1.dsc
git-core_1.5.1.orig.tar.gz
  to pool/main/g/git-core/git-core_1.5.1.orig.tar.gz
git-cvs_1.5.1-1_all.deb
  to pool/main/g/git-core/git-cvs_1.5.1-1_all.deb
git-daemon-run_1.5.1-1_all.deb
  to pool/main/g/git-core/git-daemon-run_1.5.1-1_all.deb
git-doc_1.5.1-1_all.deb
  to pool/main/g/git-core/git-doc_1.5.1-1_all.deb
git-email_1.5.1-1_all.deb
  to pool/main/g/git-core/git-email_1.5.1-1_all.deb
git-gui_1.5.1-1_all.deb
  to pool/main/g/git-core/git-gui_1.5.1-1_all.deb
git-svn_1.5.1-1_all.deb
  to pool/main/g/git-core/git-svn_1.5.1-1_all.deb
gitk_1.5.1-1_all.deb
  to pool/main/g/git-core/gitk_1.5.1-1_all.deb
gitweb_1.5.1-1_all.deb
  to pool/main/g/git-core/gitweb_1.5.1-1_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Gerrit Pape <[EMAIL PROTECTED]> (supplier of updated git-core package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed,  4 Apr 2007 11:56:18 +
Source: git-core
Binary: git-email git-core git-daemon-run git-doc git-cvs git-svn gitk gitweb 
git-arch git-gui
Architecture: all source
Version: 1:1.5.1-1
Distribution: unstable
Urgency: low
Maintainer: Gerrit Pape <[EMAIL PROTECTED]>
Changed-By: Gerrit Pape <[EMAIL PROTECTED]>
Description: 
 git-arch   - fast, scalable, distributed revision control system (arch interop
 git-core   - fast, scalable, distributed revision control system
 git-cvs- fast, scalable, distributed revision control system (cvs interope
 git-daemon-run - fast, scalable, distributed revision control system 
(git-daemon s
 git-doc- fast, scalable, distributed revision control system (documentatio
 git-email  - fast, scalable, distributed revision control system (email add-on
 git-gui- fast, scalable, distributed revision control system (GUI)
 git-svn- fast, scalable, distributed revision control system (svn interope
 gitk   - fast, scalable, distributed revision control system (revision tre
 gitweb - fast, scalable, distributed revision control system (web interfac
Closes: 416372 416755
Changes: 
 git-core (1:1.5.1-1) unstable; urgency=low
 .
   * new upstream release.
 * git-svn got almost a rewrite (closes: #416372).
   * debian/diff/git-cvsserver-update-hook.diff: remove; included upstream.
   * debian/diff/Documentation-git-svnimport.txt-fix-typo.diff,
 debian/diff/http-fetch-don-t-use-double-slash-as-directory-sepa.diff,
 debian/diff/Documentation-git-rev-parse.txt-fix-example-in-SPEC.diff:
 remove; applied upstream.
   * debian/diff/GNU-Hurd.diff: remove; obsolete.
   * debian/git-daemon-run.postrm: check for deluser being available, if
 not, print warning and don't remove system user (closes: #416755).
   * debian/changelog.upstream: upstream changes taken from mailin

Bug#417649: 100% cpu utilization with kdelibs 4:3.5.5a.dfsg.1-8

2007-04-04 Thread toshiro

> > Package: kdelibs
> > Version: 4:3.5.5a.dfsg.1-7
> > Severity: grave
> > Justification: renders package unusable
> >
> >
> > When KDE starts, kded daemon takes almost 100% of the cpu; it usually
> > happens when kdewallet asked for the passphrase to open the passwords,
> > it makes the system unusable because it never opens the kdewallet
> > passwords. Killing kded (and restarting kded after that) helps with the
> > CPU utilization, but kdewallet won't work anymore.
>
> Is this issue specific to the -8 version? i.e. does it not apply on the -7
> version?

Exactly. I forgot to mention that I downgraded to -7 and the problem
disappeared.



Can you try to upgrade again to -8 and see if still happens?



The problem persisted; when I downgrade to a previous version the  
problem disappear. Please notice that I'm not only upgrading  
(downgrading) kdelibs, I've also upgrading (downgrading) kdelibs4c2a  
and kdelibs-data.


I'm using 8859-1 as my locale (probably it doesn't matter, but the  
patch is about a problem with utf-8, I'm bringing this to your  
attention just in case it would matter).


Regards,

--
Toshiro
http://www.perlhowto.com





Bug#417656: [Evolution] Bug#417656: evolution: Crashes when run

2007-04-04 Thread Sam Morris
On Wed, Apr 04, 2007 at 01:05:08PM +0200, Øystein Gisnås wrote:
> 2007/4/4, Loïc Minier <[EMAIL PROTECTED]>:
> >On Wed, Apr 04, 2007, Øystein Gisnås wrote:
> >> > The patch isn't present in the unstable version, I suppose it's not
> >> > affected and I'll request migration to etch if you're ok with that.
> >>
> >> I'll do a build and report the results tonight..
> >
> >02:04 < cortana> who broke evolution! :)
> >10:07 <@lool> cortana: I did, trying to fix it; can you try rebuilding 
> >e-d-s
> >  with the mentionned patch removed?
> >11:32 < cortana> lool: FYI reverting e-d-s does not fix the crash
> >11:35 <@lool> cortana: Reverting the patch?
> >
> > (That's all I got.)
> 
> I want you to double-double check that downgrading doesn't help. I can
> reproduce the crash with 1.8.2-2. I can start it with 'evolution -c
> $COMPONENT' with $COMPONENT != mail and it will crash and burn when I
> change to mail view.

Oops, it seems I have libedataserver1.2-7 version 1.8.2-2 installed--I
just blindly downloaded & installed the package files you listed in your
original email :)

> When you downgrade, make sure you downgrade libedataserver1.2-7 to
> 1.8.2-1, as that's the library causing the crash. If it still crashes
> after the first attempt, run evolution --force-shutdown or kill e-d-s
> manually and try again.

Downloading _just_ libedataserver1.2-7 causes another crash, backtrace
following in case it's relevant to anything. I then downgraded _all_ of
e-d-s' binary packages to version 1.8.2-1, and Evolution started working
again--thanks :)

Starting program: /usr/bin/evolution 
Failed to read a valid object file image from memory.
[Thread debugging using libthread_db enabled]
[New Thread 16384 (LWP 28240)]
CalDAV Eplugin starting up ...
evolution-shell-Message: Killing old version of evolution-data-server...

(evolution-2.8:28240): evolution-mail-WARNING **: ignored this junk plugin: not 
enabled or we have already loaded one

(evolution-2.8:28240): e-utils-WARNING **: Plugin 'Spamassassin junk plugin' 
failed to load hook 'org.gnome.evolution.mail.junk:1.0'
[New Thread 32769 (LWP 28268)]
[New Thread 16386 (LWP 28269)]
[New Thread 32771 (LWP 28270)]
[New Thread 49156 (LWP 28271)]
[New Thread 65541 (LWP 28272)]
[Thread 49156 (LWP 28271) exited]

camel-ERROR **: file camel-operation.c: line 205 (camel_operation_unref): 
assertion failed: (cc->refcount > 0)
aborting...

Program received signal SIGABRT, Aborted.
[Switching to Thread 16386 (LWP 28269)]
0xb6b71b01 in kill () from /usr/lib/debug/libc.so.6
(gdb) where
#0  0xb6b71b01 in kill () from /usr/lib/debug/libc.so.6
#1  0xb7660f65 in pthread_kill (thread=16386, signo=6) at signals.c:69
#2  0xb7660fab in __pthread_raise (sig=6) at signals.c:200
#3  0xb6b71894 in *__GI_raise (sig=6)
at ../linuxthreads/sysdeps/unix/sysv/linux/raise.c:38
#4  0xb6b72ccc in *__GI_abort () at ../sysdeps/generic/abort.c:88
#5  0xb6cac074 in IA__g_logv (log_domain=, 
log_level=G_LOG_LEVEL_ERROR, 
format=0xb6cd6800 "file %s: line %d (%s): assertion failed: (%s)", 
args1=0xb6166d1c "hmҷ�") at gmessages.c:497
#6  0xb6cac0a9 in IA__g_log (log_domain=0xb7d21894 "camel", 
log_level=G_LOG_LEVEL_ERROR, 
format=0xb6cd6800 "file %s: line %d (%s): assertion failed: (%s)")
at gmessages.c:517
#7  0xb6cac127 in IA__g_assert_warning (log_domain=0xb7d21894 "camel", 
file=0xb7d26d68 "camel-operation.c", line=205, 
pretty_function=0xb7d26da7 "camel_operation_unref", 
expression=0xb7d26d57 "cc->refcount > 0") at gmessages.c:552
#8  0xb7d155cf in camel_operation_unref () from /usr/lib/libcamel-1.2.so.8
#9  0xb623e8ba in ms_thread_msg_new (session=0x819cac8, ops=0xb6185af0, 
size=52) at mail-session.c:555
#10 0xb7d5f865 in camel_session_thread_msg_new ()
   from /usr/lib/libcamel-provider-1.2.so.8
#11 0xb617a1ed in get_folder_info_online (store=0x8237000, top=0xb6182b52 "", 
flags=, ex=0x82433b0) at camel-imap-store.c:2691
#12 0xb7d3f2aa in ?? () from /usr/lib/libcamel-provider-1.2.so.8
#13 0x08237000 in ?? ()
#14 0xb6182b52 in ?? ()
   from /usr/lib/evolution-data-server-1.2/camel-providers-8/libcamelimap.so
#15 0x0007 in ?? ()
#16 0x082433b0 in ?? ()
#17 0x in ?? ()

-- 
Sam Morris
http://robots.org.uk/

PGP key id 1024D/5EA01078
3412 EA18 1277 354B 991B  C869 B219 7FDB 5EA0 1078


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#417160: marked as done (postgresql-8.2_8.2.3-2(sparc/experimental): FTBFS: test error)

2007-04-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Apr 2007 11:47:03 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#417160: fixed in postgresql-8.2 8.2.3-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: postgresql-8.2
Version: 8.2.3-2
Severity: serious

Hi,

your package failed to build from source.

| Automatic build of postgresql-8.2_8.2.3-2 on odin by sbuild/sparc 98-farm
| Build started at 20070331-1633
| **
| Checking available source versions...
| Fetching source files...
| Reading Package Lists...
| Building Dependency Tree...
| Need to get 12.2MB of source archives.
| Get:1 http://sinclair.farm.ftbfs.de experimental/main postgresql-8.2 8.2.3-2 
(dsc) [1104B]
| Get:2 http://sinclair.farm.ftbfs.de experimental/main postgresql-8.2 8.2.3-2 
(tar) [12.2MB]
| Get:3 http://sinclair.farm.ftbfs.de experimental/main postgresql-8.2 8.2.3-2 
(diff) [27.4kB]
| Fetched 12.2MB in 1s (10.1MB/s)
| Download complete and in download only mode
| ** Using build dependencies supplied by package:
| Build-Depends: debhelper (>= 5.0.37.2), cdbs (>= 0.4.43), bison, perl (>= 
5.8), libperl-dev, tk8.4-dev, flex, libreadline5-dev (>= 4.2), libssl-dev, 
zlib1g-dev | libz-dev, libpam0g-dev | libpam-dev, libxml2-dev, libkrb5-dev, 
libxslt1-dev, python-dev, python-central (>= 0.5), gettext, bzip2
| Checking for already installed source dependencies...
| debhelper: missing
| Using default version 5.0.42 (Priority: 990)
| cdbs: missing
| Using default version 0.4.48 (Priority: 990)
| bison: missing
| Using default version 1:2.3.dfsg-4 (Priority: 990)
| perl: already installed (5.8.8-7 >= 5.8 is satisfied)
| libperl-dev: missing
| Using default version 5.8.8-7 (Priority: 990)
| tk8.4-dev: missing
| Using default version 8.4.12-1 (Priority: 990)
| flex: missing
| Using default version 2.5.33-11 (Priority: 990)
| libreadline5-dev: missing
| Using default version 5.2-2 (Priority: 990)
| libssl-dev: missing
| Using default version 0.9.8e-4 (Priority: 990)
| zlib1g-dev: missing
| Using default version 1:1.2.3-13 (Priority: 990)
| libz-dev: missing
| No default version. Virtual package?
| libpam0g-dev: missing
| Using default version 0.79-4 (Priority: 990)
| libpam-dev: missing
| No default version. Virtual package?
| libxml2-dev: missing
| Using default version 2.6.27.dfsg-1 (Priority: 990)
| libkrb5-dev: missing
| Using default version 1.4.4-7 (Priority: 990)
| libxslt1-dev: missing
| Using default version 1.1.19-1 (Priority: 990)
| python-dev: missing
| Using default version 2.4.4-2 (Priority: 990)
| python-central: missing
| Using default version 0.5.12 (Priority: 990)
| gettext: missing
| Using default version 0.16.1-1 (Priority: 990)
| bzip2: already installed (1.0.3-6)
| Checking for source dependency conflicts...
[...]
| STATEMENT:  alter table anothertab alter column atcol1 type boolean
|   using case when atcol1 % 2 = 0 then true else false end;
| NOTICE:  CREATE TABLE will create implicit sequence "t1_f1_seq" for serial 
column "t1.f1"
| NOTICE:  CREATE TABLE / PRIMARY KEY will create implicit index "t1_pkey" for 
table "t1"
| NOTICE:  drop cascades to composite type alter2.ctype
| NOTICE:  drop cascades to type alter2.ctype
| NOTICE:  drop cascades to type alter2.posint
| NOTICE:  drop cascades to function alter2.plus1(integer)
| NOTICE:  drop cascades to view alter2.v1
| NOTICE:  drop cascades to rule _RETURN on view alter2.v1
| NOTICE:  drop cascades to sequence alter2.t1_f1_seq
| NOTICE:  drop cascades to default for table alter2.t1 column f1
| NOTICE:  drop cascades to table alter2.t1
| NOTICE:  drop cascades to constraint t1_f2_check on table alter2.t1
| ERROR:  could not set permissions on directory "/no/such/location": No such 
file or directory
| STATEMENT:  CREATE TABLESPACE badspace LOCATION '/no/such/location';
| ERROR:  tablespace "nosuchspace" does not exist
| STATEMENT:  CREATE TABLE bar (i int) TABLESPACE nosuchspace;
| ERROR:  tablespace "testspace" is not empty
| STATEMENT:  DROP TABLESPACE testspace;
| NOTICE:  drop cascades to table testschema.asexecute
| NOTICE:  drop cascades to table testschema.asselect
| NOTICE:  drop cascades to table testschema.foo
| LOG:  received fast shutdown request
| LOG:  shutting down
| LOG:  database system is shut down
| make: *** [binary-predeb/postgresql-8.2] Error 1
| **
| Build finished at 20070331-1712
| FAILED [dpkg-buildpackage died]

Bug#416824: Further Info

2007-04-04 Thread Sheridan Hutchinson
Just for the sake of further info, I'm using the innate 'in-kernel' 
support for suspend and hibernate and have *not* installed the hibernate 
script nor suspend2, as I've never had to.  For whatever reason 
in-kernel support works like a charm on this laptop.


--
Regards,
Sheridan Hutchinson
[EMAIL PROTECTED]


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#417656: evolution: confirmed : downgrading to 1.8.2-1 works

2007-04-04 Thread Eamonn Hamilton
Package: evolution
Followup-For: Bug #417656

Hi,

Downgrading e-d-s didn't suffice, downgrading the libraries as well
sorted this out.

Cheers,
Eamonn



-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (300, 'stable'), (50, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.20
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)

Versions of packages evolution depends on:
ii  dbus  1.0.2-1simple interprocess messaging syst
ii  evolution-common  2.8.2.1-1  architecture independent files for
ii  evolution-data-server 1.8.2-1evolution database backend server
ii  gconf22.18.0.1-2 GNOME configuration database syste
ii  gnome-icon-theme  2.18.0-1   GNOME Desktop icon theme
ii  gtkhtml3.83.12.2-1   HTML rendering/editing library - b
ii  libart-2.0-2  2.3.19-2   Library of functions for 2D graphi
ii  libatk1.0-0   1.18.0-1   The ATK accessibility toolkit
ii  libaudiofile0 0.2.6-6Open-source version of SGI's audio
ii  libavahi-client3  0.6.17-1   Avahi client library
ii  libavahi-common3  0.6.17-1   Avahi common library
ii  libavahi-glib10.6.17-1   Avahi glib integration library
ii  libbonobo2-0  2.18.0-1   Bonobo CORBA interfaces library
ii  libbonoboui2-02.18.0-1   The Bonobo UI library
ii  libc6 2.5-0exp6  GNU C Library: Shared libraries
ii  libcairo2 1.4.2-1The Cairo 2D vector graphics libra
ii  libcamel1.2-8 1.8.2-1The Evolution MIME message handlin
ii  libdbus-1-3   1.0.2-1simple interprocess messaging syst
ii  libdbus-glib-1-2  0.73-1 simple interprocess messaging syst
ii  libebook1.2-9 1.8.2-1Client library for evolution addre
ii  libecal1.2-7  1.8.2-1Client library for evolution calen
ii  libedataserver1.2-7   1.8.2-1Utility library for evolution data
ii  libedataserverui1.2-8 1.8.2-1GUI utility library for evolution 
ii  libegroupwise1.2-12   1.8.2-2Client library for accessing group
ii  libesd-alsa0 [libesd0]0.2.36-3   Enlightened Sound Daemon (ALSA) - 
ii  libexchange-storage1.2-2  1.8.2-2Backend library for evolution cale
ii  libfontconfig12.4.2-1.2  generic font configuration library
ii  libfreetype6  2.2.1-5FreeType 2 font engine, shared lib
ii  libgconf2-4   2.18.0.1-2 GNOME configuration database syste
ii  libgcrypt11   1.2.4-1LGPL Crypto library - runtime libr
ii  libglade2-0   1:2.6.0-4  library to load .glade files at ru
ii  libglib2.0-0  2.12.11-1  The GLib library of C routines
ii  libgnome-keyring0 0.8-1  GNOME keyring services library
ii  libgnome-pilot2   2.0.15-2   Support libraries for gnome-pilot
ii  libgnome2-0   2.18.0-2   The GNOME 2 library - runtime file
ii  libgnomecanvas2-0 2.14.0-2   A powerful object-oriented display
ii  libgnomeprint2.2-02.18.0-1   The GNOME 2.2 print architecture -
ii  libgnomeprintui2.2-0  2.18.0-1   GNOME 2.2 print architecture User 
ii  libgnomeui-0  2.18.1-1   The GNOME 2 libraries (User Interf
ii  libgnomevfs2-01:2.18.0.1-1   GNOME Virtual File System (runtime
ii  libgnutls13   1.6.1-1the GNU TLS library - runtime libr
ii  libgpg-error0 1.4-2  library for common error values an
ii  libgtk2.0-0   2.10.11-1  The GTK+ graphical user interface 
ii  libgtkhtml3.8-15  3.12.2-1   HTML rendering/editing library - r
ii  libhal1   0.5.8.1-9  Hardware Abstraction Layer - share
ii  libice6   1:1.0.3-1  X11 Inter-Client Exchange library
ii  libjpeg62 6b-13  The Independent JPEG Group's JPEG 
ii  libldap2  2.1.30-13.4OpenLDAP libraries
ii  libnm-glib0   0.6.4-7network management framework (GLib
ii  libnotify10.4.4-2sends desktop notifications to a n
ii  libnspr4-0d   1.8.0.11-2 NetScape Portable Runtime Library
ii  libnss3-0d1.8.0.11-2 Network Security Service libraries
ii  liborbit2 1:2.14.4-1 libraries for ORBit2 - a CORBA ORB
ii  libpango1.0-0 1.16.1-1   Layout and rendering of internatio
ii  libpisock90.12.2-9   library for communicating with a P
ii  libpisync00.12.2-9   synchronization library for PalmOS
ii  libpng12-01.2.15~beta5-1 PNG library - runtime
ii  libpopt0  1.10-3 lib for parsi

Bug#417160: marked as done (postgresql-8.2_8.2.3-2(sparc/experimental): FTBFS: test error)

2007-04-04 Thread Debian Bug Tracking System
Your message dated Wed, 4 Apr 2007 13:29:47 +0200
with message-id <[EMAIL PROTECTED]>
and subject line Bug#417160: postgresql-8.2_8.2.3-2(sparc/experimental): FTBFS: 
test error
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: postgresql-8.2
Version: 8.2.3-2
Severity: serious

Hi,

your package failed to build from source.

| Automatic build of postgresql-8.2_8.2.3-2 on odin by sbuild/sparc 98-farm
| Build started at 20070331-1633
| **
| Checking available source versions...
| Fetching source files...
| Reading Package Lists...
| Building Dependency Tree...
| Need to get 12.2MB of source archives.
| Get:1 http://sinclair.farm.ftbfs.de experimental/main postgresql-8.2 8.2.3-2 
(dsc) [1104B]
| Get:2 http://sinclair.farm.ftbfs.de experimental/main postgresql-8.2 8.2.3-2 
(tar) [12.2MB]
| Get:3 http://sinclair.farm.ftbfs.de experimental/main postgresql-8.2 8.2.3-2 
(diff) [27.4kB]
| Fetched 12.2MB in 1s (10.1MB/s)
| Download complete and in download only mode
| ** Using build dependencies supplied by package:
| Build-Depends: debhelper (>= 5.0.37.2), cdbs (>= 0.4.43), bison, perl (>= 
5.8), libperl-dev, tk8.4-dev, flex, libreadline5-dev (>= 4.2), libssl-dev, 
zlib1g-dev | libz-dev, libpam0g-dev | libpam-dev, libxml2-dev, libkrb5-dev, 
libxslt1-dev, python-dev, python-central (>= 0.5), gettext, bzip2
| Checking for already installed source dependencies...
| debhelper: missing
| Using default version 5.0.42 (Priority: 990)
| cdbs: missing
| Using default version 0.4.48 (Priority: 990)
| bison: missing
| Using default version 1:2.3.dfsg-4 (Priority: 990)
| perl: already installed (5.8.8-7 >= 5.8 is satisfied)
| libperl-dev: missing
| Using default version 5.8.8-7 (Priority: 990)
| tk8.4-dev: missing
| Using default version 8.4.12-1 (Priority: 990)
| flex: missing
| Using default version 2.5.33-11 (Priority: 990)
| libreadline5-dev: missing
| Using default version 5.2-2 (Priority: 990)
| libssl-dev: missing
| Using default version 0.9.8e-4 (Priority: 990)
| zlib1g-dev: missing
| Using default version 1:1.2.3-13 (Priority: 990)
| libz-dev: missing
| No default version. Virtual package?
| libpam0g-dev: missing
| Using default version 0.79-4 (Priority: 990)
| libpam-dev: missing
| No default version. Virtual package?
| libxml2-dev: missing
| Using default version 2.6.27.dfsg-1 (Priority: 990)
| libkrb5-dev: missing
| Using default version 1.4.4-7 (Priority: 990)
| libxslt1-dev: missing
| Using default version 1.1.19-1 (Priority: 990)
| python-dev: missing
| Using default version 2.4.4-2 (Priority: 990)
| python-central: missing
| Using default version 0.5.12 (Priority: 990)
| gettext: missing
| Using default version 0.16.1-1 (Priority: 990)
| bzip2: already installed (1.0.3-6)
| Checking for source dependency conflicts...
[...]
| STATEMENT:  alter table anothertab alter column atcol1 type boolean
|   using case when atcol1 % 2 = 0 then true else false end;
| NOTICE:  CREATE TABLE will create implicit sequence "t1_f1_seq" for serial 
column "t1.f1"
| NOTICE:  CREATE TABLE / PRIMARY KEY will create implicit index "t1_pkey" for 
table "t1"
| NOTICE:  drop cascades to composite type alter2.ctype
| NOTICE:  drop cascades to type alter2.ctype
| NOTICE:  drop cascades to type alter2.posint
| NOTICE:  drop cascades to function alter2.plus1(integer)
| NOTICE:  drop cascades to view alter2.v1
| NOTICE:  drop cascades to rule _RETURN on view alter2.v1
| NOTICE:  drop cascades to sequence alter2.t1_f1_seq
| NOTICE:  drop cascades to default for table alter2.t1 column f1
| NOTICE:  drop cascades to table alter2.t1
| NOTICE:  drop cascades to constraint t1_f2_check on table alter2.t1
| ERROR:  could not set permissions on directory "/no/such/location": No such 
file or directory
| STATEMENT:  CREATE TABLESPACE badspace LOCATION '/no/such/location';
| ERROR:  tablespace "nosuchspace" does not exist
| STATEMENT:  CREATE TABLE bar (i int) TABLESPACE nosuchspace;
| ERROR:  tablespace "testspace" is not empty
| STATEMENT:  DROP TABLESPACE testspace;
| NOTICE:  drop cascades to table testschema.asexecute
| NOTICE:  drop cascades to table testschema.asselect
| NOTICE:  drop cascades to table testschema.foo
| LOG:  received fast shutdown request
| LOG:  shutting down
| LOG:  database system is shut down
| make: *** [binary-predeb/postgresql-8.2] Error 1
| **
| Build finished at 20070331-1712
| FA

Bug#417656: [Evolution] Bug#417656: evolution: Crashes when run

2007-04-04 Thread Øystein Gisnås

2007/4/4, Loïc Minier <[EMAIL PROTECTED]>:

On Wed, Apr 04, 2007, Øystein Gisnås wrote:
> > The patch isn't present in the unstable version, I suppose it's not
> > affected and I'll request migration to etch if you're ok with that.
>
> I'll do a build and report the results tonight..

02:04 < cortana> who broke evolution! :)
10:07 <@lool> cortana: I did, trying to fix it; can you try rebuilding e-d-s
  with the mentionned patch removed?
11:32 < cortana> lool: FYI reverting e-d-s does not fix the crash
11:35 <@lool> cortana: Reverting the patch?

 (That's all I got.)


I want you to double-double check that downgrading doesn't help. I can
reproduce the crash with 1.8.2-2. I can start it with 'evolution -c
$COMPONENT' with $COMPONENT != mail and it will crash and burn when I
change to mail view.

When you downgrade, make sure you downgrade libedataserver1.2-7 to
1.8.2-1, as that's the library causing the crash. If it still crashes
after the first attempt, run evolution --force-shutdown or kill e-d-s
manually and try again.

Øystein



Bug#417656: [Evolution] Bug#417656: evolution: Crashes when run

2007-04-04 Thread Øystein Gisnås

2007/4/4, Loïc Minier <[EMAIL PROTECTED]>:

On Wed, Apr 04, 2007, =?UTF-8?Q? =C3=98ystein_?= =?UTF-8?Q?Gisn=C3=A5s ?= wrote:
> I actually can reproduce this myself, and it's probably due to the
> 20_too-many-open-files.patch. Downgrading e-d-s to 1.8.2-1 helps.
>
> We'll remove the patch, test it and reupload as soon as we can.

 Blah; sorry, I can't test e-d-s decently as I don't use evolution.  Can
 you confirm removing this patch helps?  If it does, I'll upload ASAP.

 The patch isn't present in the unstable version, I suppose it's not
 affected and I'll request migration to etch if you're ok with that.


I think I got you right. I can confirm that 1.8.2-1 works and 1.8.2-2
crashes. I haven't built 1.8.2-2 without the
20_too-many-open-files.patch, but I can't imagine any of the two other
patches create problems in mail-mt.c..

Øystein



Bug#416402: marked as done (wzdftpd-mod-avahi: unusuable)

2007-04-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Apr 2007 10:02:34 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#416402: fixed in wzdftpd 0.8.1-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---

Package: wzdftpd-mod-avahi
Version: 0.8.1-1
Severity: serious


Coin,

wzdftpd start, then crash 2s later with the following message:
wzdftpd: libwzd_avahi.c:182: publish_reply: Assertion `g == ctx->group' failed.

Regards.

-- 
Marc Dequènes (Duck)


pgpl2qDvxnP7o.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---
Source: wzdftpd
Source-Version: 0.8.1-2

We believe that the bug you reported is fixed in the latest version of
wzdftpd, which is due to be installed in the Debian FTP archive:

wzdftpd-back-mysql_0.8.1-2_amd64.deb
  to pool/main/w/wzdftpd/wzdftpd-back-mysql_0.8.1-2_amd64.deb
wzdftpd-back-pgsql_0.8.1-2_amd64.deb
  to pool/main/w/wzdftpd/wzdftpd-back-pgsql_0.8.1-2_amd64.deb
wzdftpd-dev_0.8.1-2_amd64.deb
  to pool/main/w/wzdftpd/wzdftpd-dev_0.8.1-2_amd64.deb
wzdftpd-mod-avahi_0.8.1-2_amd64.deb
  to pool/main/w/wzdftpd/wzdftpd-mod-avahi_0.8.1-2_amd64.deb
wzdftpd-mod-perl_0.8.1-2_amd64.deb
  to pool/main/w/wzdftpd/wzdftpd-mod-perl_0.8.1-2_amd64.deb
wzdftpd-mod-tcl_0.8.1-2_amd64.deb
  to pool/main/w/wzdftpd/wzdftpd-mod-tcl_0.8.1-2_amd64.deb
wzdftpd_0.8.1-2.diff.gz
  to pool/main/w/wzdftpd/wzdftpd_0.8.1-2.diff.gz
wzdftpd_0.8.1-2.dsc
  to pool/main/w/wzdftpd/wzdftpd_0.8.1-2.dsc
wzdftpd_0.8.1-2_amd64.deb
  to pool/main/w/wzdftpd/wzdftpd_0.8.1-2_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Pierre Chifflier <[EMAIL PROTECTED]> (supplier of updated wzdftpd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 04 Apr 2007 11:16:49 +0200
Source: wzdftpd
Binary: wzdftpd-mod-perl wzdftpd-back-mysql wzdftpd-dev wzdftpd-mod-avahi 
wzdftpd-back-pgsql wzdftpd wzdftpd-mod-tcl
Architecture: source amd64
Version: 0.8.1-2
Distribution: unstable
Urgency: high
Maintainer: Pierre Chifflier <[EMAIL PROTECTED]>
Changed-By: Pierre Chifflier <[EMAIL PROTECTED]>
Description: 
 wzdftpd- A portable, modular, small and efficient ftp server
 wzdftpd-back-mysql - MySQL backend for wzdftpd
 wzdftpd-back-pgsql - PostgreSQL backend for wzdftpd
 wzdftpd-dev - Development files for wzdftpd
 wzdftpd-mod-avahi - Zeroconf module for wzdftpd
 wzdftpd-mod-perl - Perl module for wzdftpd
 wzdftpd-mod-tcl - TCL module for wzdftpd
Closes: 416402
Changes: 
 wzdftpd (0.8.1-2) unstable; urgency=high
 .
   * Fix assertion failed in avahi module (Closes: #416402)
   * urgency=high because of the above bug, and to reach etch
   * Update my email address
Files: 
 8362ccbd4243c08f4042d1bda43f6cf7 853 net optional wzdftpd_0.8.1-2.dsc
 ca65ab3e90af7df515f33f12540c3c8b 11237 net optional wzdftpd_0.8.1-2.diff.gz
 22185987ebc23e9e8022afafb182 273682 net optional wzdftpd_0.8.1-2_amd64.deb
 c2c428d20bc056b7a09f4ae190f46ddc 39708 net optional 
wzdftpd-back-mysql_0.8.1-2_amd64.deb
 b2951f217032b9439b2682ac8fcfea9c 39650 net optional 
wzdftpd-back-pgsql_0.8.1-2_amd64.deb
 cce020a796b78f76ae5e3edb356aa815 30872 net optional 
wzdftpd-mod-avahi_0.8.1-2_amd64.deb
 0e1bc1a4896c86e1b966d9abd1ada06a 35506 net optional 
wzdftpd-mod-tcl_0.8.1-2_amd64.deb
 19fd0ae509a9e0bdc9b14c89b5188389 52482 net optional 
wzdftpd-mod-perl_0.8.1-2_amd64.deb
 a6d778f11ef097cb89ce3a7cd0287af3 280090 libdevel optional 
wzdftpd-dev_0.8.1-2_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGE3YUw3ao2vG823MRAg/4AJ9gd4RNb6OztrybmXQfigwtjxsQmQCfRful
9yOaAJmsSPk20w/mZZwxvPc=
=ZPLO
-END PGP SIGNATURE-

--- End Message ---


Bug#417649: 100% cpu utilization with kdelibs 4:3.5.5a.dfsg.1-8

2007-04-04 Thread Ana Guerrero
> 
> Attached is the diff from the version -7 and -8 (fixing a security bug). As
> you can see, we have not changed anything that can lead to this problem.
>

Attached now O)

diff -u kdelibs-3.5.5a.dfsg.1/debian/changelog kdelibs-3.5.5a.dfsg.1/debian/changelog
--- kdelibs-3.5.5a.dfsg.1/debian/changelog
+++ kdelibs-3.5.5a.dfsg.1/debian/changelog
@@ -1,3 +1,10 @@
+kdelibs (4:3.5.5a.dfsg.1-8) unstable; urgency=high
+
+  * Add patch to fix utf8-parsing vulnerability.
+  * Urgency high due to security fix.
+
+ -- Sune Vuorela <[EMAIL PROTECTED]>  Thu, 29 Mar 2007 21:19:35 +0200
+
 kdelibs (4:3.5.5a.dfsg.1-7) unstable; urgency=high
 
   * Add patch 46_CVE-2007-1564-kdelibs-3.5.6.diff: untrusted sites that allow 
only in patch2:
unchanged:
--- kdelibs-3.5.5a.dfsg.1.orig/debian/patches/47_kdelibs-kjs-utf8-parsing.diff
+++ kdelibs-3.5.5a.dfsg.1/debian/patches/47_kdelibs-kjs-utf8-parsing.diff
@@ -0,0 +1,38 @@
+
+r645387 | porten | 2007-03-22 15:01:13 +0100 (Thu, 22 Mar 2007) | 4 lines
+
+substitute some of the invalid sequences with the standard replacement
+char. this matches Mozilla but not IE which leaves them unchanged (or
+throws an exception)
+
+
+--- kjs/function.cpp
 kjs/function.cpp
+@@ -244,11 +244,15 @@ UString decodeURI(ExecState *exec, UStri
+   }
+ 
+   // UTF-8 transform
++  const unsigned long replacementChar = 0xFFFD;
+   unsigned long V;
+   if (n == 2) {
+ 	unsigned long y = octets[0] & 0x1F;
+ 	unsigned long zz = octets[1] & 0x3F;
+ 	V = (y << 6) | zz;
++	// 2-byte sequence overlong for this value?
++	if (V < 0xFF)
++	  V = replacementChar;
+ 	C = UChar((unsigned short)V);
+   }
+   else if (n == 3) {
+@@ -256,6 +260,11 @@ UString decodeURI(ExecState *exec, UStri
+ 	unsigned long yy = octets[1] & 0x3F;
+ 	unsigned long zz = octets[2] & 0x3F;
+ 	V = ( << 12) | (yy << 6) | zz;
++	// 3-byte sequence overlong for this value,
++	// an invalid value or UTF-16 surrogate?
++	if (V < 0x800 || V == 0xFFFE || V == 0x ||
++	(V >= 0xD800 && V <= 0xDFFF))
++	  V = replacementChar;
+ 	C = UChar((unsigned short)V);
+   }
+   else {


Bug#417656: evolution: Crashes when run

2007-04-04 Thread Sam Morris
On Wed, Apr 04, 2007 at 08:34:07AM +0200, Øystein Gisnås wrote:
> >Maybe this is actually the fault of e-d-s since I just upgraded it
> >from 1.8.2-1 to 1.8.2-2. Anyway, here's a backtrace:
> 
> Does this happen on every invocation?

It does.

> Do you have a chance to downgrade to 1.8.2-1 again and see if that's
> the reason? Remember to kill your running e-d-s completely before you
> start evolution.

I've just done that and it doesn't seem to make a difference--I still
have the same crash. :(

> Cheers,
> Øystein

-- 
Sam Morris
http://robots.org.uk/

PGP key id 1024D/5EA01078
3412 EA18 1277 354B 991B  C869 B219 7FDB 5EA0 1078


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#417649: 100% cpu utilization with kdelibs 4:3.5.5a.dfsg.1-8

2007-04-04 Thread Ana Guerrero
On Tue, Apr 03, 2007 at 09:48:04PM -0300, Toshiro wrote:
> > > Package: kdelibs
> > > Version: 4:3.5.5a.dfsg.1-7
> > > Severity: grave
> > > Justification: renders package unusable
> > >
> > >
> > > When KDE starts, kded daemon takes almost 100% of the cpu; it usually
> > > happens when kdewallet asked for the passphrase to open the passwords,
> > > it makes the system unusable because it never opens the kdewallet
> > > passwords. Killing kded (and restarting kded after that) helps with the
> > > CPU utilization, but kdewallet won't work anymore.
> >
> > Is this issue specific to the -8 version? i.e. does it not apply on the -7
> > version?
> 
> Exactly. I forgot to mention that I downgraded to -7 and the problem 
> disappeared.
>

Can you try to upgrade again to -8 and see if still happens? 

Attached is the diff from the version -7 and -8 (fixing a security bug). As
you can see, we have not changed anything that can lead to this problem.

I already have been told for an user this upgrade works fine, if i get another
positive answer i'm downgrading this bug severity.

Ana





-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: raising severity

2007-04-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 416816 serious
Bug#416816: idjc: Missing python-gtk2 dependency
Severity set to `serious' from `important'

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#417652: kvm: undeclared file conflict

2007-04-04 Thread Stephen Gran
This one time, at band camp, Baruch Even said:
> * Stephen Gran <[EMAIL PROTECTED]> [070404 02:25]:
> > Package: kvm
> > Version: 14-1
> > Severity: serious
> > 
> > Unpacking replacement kvm ...
> > dpkg: error processing /var/cache/apt/archives/kvm_18-1_i386.deb (--unpack):
> >  trying to overwrite `/usr/share/modass/packages/kvm-source', which is also 
> > in package kvm-source
> 
> I've moved a symlink from kvm-source to kvm, should have figured it will
> cause this problem.
> 
> As an interim fix you can remove the kvm-souce package, install kvm and
> then install kvm-source again. I'll work on a fix in the packaging for
> it.

It works fine if kvm-source is upgrated before kvm, which implies to me
you need a versioned conflicts, as well as a replaces and so on.
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Bug#417673: /sbin/fsck.vfat: Incorrectly truncates files of 4294966784 bytes length during boot.

2007-04-04 Thread Andrew Vaughan
Package: dosfstools
Version: 2.11-2.1
Severity: critical
File: /sbin/fsck.vfat
Justification: causes serious data loss

/sbin/fsck.vfat truncates files of 4294966784 bytes length.

The file system on /dev/hda8 was checked immediately before reboot using the 
GUI tool 
in Windows 2000.  As the output /var/log/fsck/checkfs shows /sbin/fsck.vfat 
decided 
during boot that the filesystem was inconsistent and automatically truncated 
the file.  
Note that it hasn't actually released the clusters yet.  The clusters seem to 
be freed 
during when fsck is run at the next boot.

Also shown below is the result of manually copying an equivalant file, and 
manually 
running fsck.vfat is sufficent to reproduce the problem.

A quick test shows that Sarge does not truncate the file during boot.
 
Thanks for your work in Debian

Andrew V.



$ cat /var/log/fsck/checkfs
Log of fsck -C -V -R -A -a
Wed Apr  4 17:23:06 2007

fsck 1.40-WIP (14-Nov-2006)
Checking all file systems.
[/sbin/fsck.ext3 (1) -- /mnt/p4-backup-root] fsck.ext3 -a -C0 /dev/hda6
/dev/hda6: Superblock last mount time is in the future.  FIXED.
/dev/hda6: clean, 19738/128520 files, 313092/514048 blocks
[/sbin/fsck.vfat (1) -- /mnt/p4-shared] fsck.vfat -a /dev/hda8
dosfsck 2.11, 12 Mar 2005, FAT32, LFN
/Sarge Hard Disk.vhd
  File size is 4294966784 bytes, cluster chain length is 0 bytes.
  Truncating file to 0 bytes.
Performing changes.
/dev/hda8: 63 files, 950195/2076388 clusters
fsck died with exit status 1

Wed Apr  4 17:23:07 2007


$ cp /mnt/p4-games/tmp/MS-Virtual-PC/sarge1/Sarge\ Hard\ Disk.vhd 
/mnt/p4-shared/sarge_test

$ ll /mnt/p4-shared/
total 4194368
[...]
-rwxr-xr-x 1 andrew andrew  0 2007-03-29 18:32 Sarge Hard Disk.vhd
-rwxr-xr-x 1 andrew andrew 4294966784 2007-04-04 17:34 sarge_test

$ sudo umount /dev/hda8

$ sudo fsck.vfat -a /dev/hda8
dosfsck 2.11, 12 Mar 2005, FAT32, LFN
/sarge_test
  File size is 4294966784 bytes, cluster chain length is 0 bytes.
  Truncating file to 0 bytes.
/Sarge Hard Disk.vhd
  File size is 0 bytes, cluster chain length is > 0 bytes.
  Truncating file to 0 bytes.
Free cluster summary wrong (864049 vs. really 1126193)
  Auto-correcting.
Performing changes.
/dev/hda8: 64 files, 950195/2076388 clusters

$ sudo fsck.vfat -a /dev/hda8
dosfsck 2.11, 12 Mar 2005, FAT32, LFN
/sarge_test
  File size is 0 bytes, cluster chain length is > 0 bytes.
  Truncating file to 0 bytes.
Free cluster summary wrong (1126193 vs. really 1388337)
  Auto-correcting.
Performing changes.
/dev/hda8: 64 files, 688051/2076388 clusters


-- System Information:
Debian Release: 4.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-686
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)

Versions of packages dosfstools depends on:
ii  libc6   2.3.6.ds1-13 GNU C Library: Shared libraries

dosfstools recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#417407: debian-installer: possible workarounds for "d-i destroyed existing raid device"

2007-04-04 Thread Alex Owen

Cut and paste from BTS web interface so sorry for the formatting!


From: Samuel Thibault <[EMAIL PROTECTED]>
Subject: Re: Bug#417407: debian-installer: d-i destroyed existing raid device
Date: Tue, 3 Apr 2007 19:26:25 +0200

Hi,

martin f krafft, le Tue 03 Apr 2007 10:28:24 +0200, a écrit :

And the other question of course is why the kernel decided it had
any business doing recovery on an fs that was marked for ro mount.

Because it always do so, see linux/fs/ext3/super.c:ext3_load_journal():
even if the mount is read-only, the journal is recovered. If (but only
if) the device itself is read-only, then nothing is written back to the
disk. Ext3 clearly lacks xfs' norecovery mount option.


I can think of two possible workarounds for this. NB: I have not
looked at the code but I'm just thinking out loud.

[1] at the partitioner stage configure md devices... IIRC this should
recognize the preexisting device. Then mark the device to be mounted
at /home (or /oldhome for the ultra paranoid) and markit to be left
alone (ie not formatted). _Presumably_ os-prober would then ignore the
md device and it's components when looking for other OS's.

[2] wrap the mount/umount sections of code in os-prober with calls to
blockdev to set the block device readonly (and restore old perms on
umount). This would side step the deficiencies in the "unconditional
ext3 journal recovery code". (but this would need a block-dev udeb
added to util-linux source)

Just some thoughts...
Alex Owen



Bug#417662: wengophone_2.1.0~rc2-svn10386-1(hppa/unstable): FTBFS: bad build-depends

2007-04-04 Thread Marco Nenciarini
On Tue, Apr 03, 2007 at 09:50:43PM -0600, [EMAIL PROTECTED] wrote:
> 
> 
> g++-3.4 does not exist on hppa.

This is a problem. Wengophone does not work with gcc 4.1 and current
boost library. 

http://dev.openwengo.com/pipermail/wengophone-devel/2006-December/004731.html

Here you can read burgrport on opensuse 

https://bugzilla.novell.com/show_bug.cgi?id=228524 

and on ubuntu

https://launchpad.net/ubuntu/+source/gcc-4.1/+bug/75724

I need a c++ compiler >= 3.4 and != 4.1 . Is there some good candidate
in hppa?

Ciao

-- 
-
|Marco Nenciarini| Debian/GNU Linux Developer - Plug Member |
| [EMAIL PROTECTED] | http://www.prato.linux.it/~mnencia   |
-
Key fingerprint = FED9 69C7 9E67 21F5 7D95  5270 6864 730D F095 E5E4



signature.asc
Description: Digital signature


Bug#417656: [Evolution] Bug#417656: evolution: Crashes when run

2007-04-04 Thread Loïc Minier
On Wed, Apr 04, 2007, =?UTF-8?Q? =C3=98ystein_?= =?UTF-8?Q?Gisn=C3=A5s ?= wrote:
> I actually can reproduce this myself, and it's probably due to the
> 20_too-many-open-files.patch. Downgrading e-d-s to 1.8.2-1 helps.
> 
> We'll remove the patch, test it and reupload as soon as we can.

 Blah; sorry, I can't test e-d-s decently as I don't use evolution.  Can
 you confirm removing this patch helps?  If it does, I'll upload ASAP.

 The patch isn't present in the unstable version, I suppose it's not
 affected and I'll request migration to etch if you're ok with that.

-- 
Loïc Minier



Bug#417624: marked as done (Several build bugs)

2007-04-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Apr 2007 07:32:07 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#417624: fixed in mldonkey 2.8.4-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---

Package: mldonkey-server
Version: 2.8.4-1

These bug were reported in build logs:

http://buildd.debian.org/build.php?arch=hppa&pkg=mldonkey&ver=2.8.4-1
make[1]: Entering directory `/build/buildd/mldonkey-2.8.4/debian/xml-man'
# Verification
xmllint --nonet --noout --postvalid --xinclude mlgui.xml
make[1]: xmllint: Command not found
make[1]: [mlgui.1] Error 127 (ignored)

---

http://buildd.debian.org/build.php?arch=arm&pkg=mldonkey&ver=2.8.4-1
dpatch  apply-all
applying patch 01_see to ./ ... ok.
applying patch arm_dynamic_loop_delay to ./ ... failed.
make: *** [patch-stamp] Error 1
**
Build finished at 20070402-0031
FAILED [dpkg-buildpackage died]
Purging chroot-unstable/build/buildd/mldonkey-2.8.4

Patch arm_dynamic_loop_delay is already included in CVS

---

http://buildd.debian.org/fetch.cgi?&pkg=mldonkey&ver=2.8.4-1&arch=ia64&stamp=1175467141&file=log
cd debian/xml-man && /usr/bin/make all
make[1]: Entering directory `/build/buildd/mldonkey-2.8.4/debian/xml-man'
# Verification
xmllint --nonet --noout --postvalid --xinclude mlgui.xml
make[1]: xmllint: Command not found
make[1]: [mlgui.1] Error 127 (ignored)

_
Sie suchen E-Mails, Dokumente oder Fotos? Die neue MSN Suche Toolbar mit 
Windows-Desktopsuche liefert in sekundenschnelle Ergebnisse. Jetzt neu! 
http://desktop.msn.de/ Jetzt gratis downloaden!



--- End Message ---
--- Begin Message ---
Source: mldonkey
Source-Version: 2.8.4-2

We believe that the bug you reported is fixed in the latest version of
mldonkey, which is due to be installed in the Debian FTP archive:

mldonkey-gui_2.8.4-2_i386.deb
  to pool/main/m/mldonkey/mldonkey-gui_2.8.4-2_i386.deb
mldonkey-server_2.8.4-2_i386.deb
  to pool/main/m/mldonkey/mldonkey-server_2.8.4-2_i386.deb
mldonkey_2.8.4-2.diff.gz
  to pool/main/m/mldonkey/mldonkey_2.8.4-2.diff.gz
mldonkey_2.8.4-2.dsc
  to pool/main/m/mldonkey/mldonkey_2.8.4-2.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Samuel Mimram <[EMAIL PROTECTED]> (supplier of updated mldonkey package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 02 Apr 2007 09:12:54 +0200
Source: mldonkey
Binary: mldonkey-gui mldonkey-server
Architecture: source i386
Version: 2.8.4-2
Distribution: unstable
Urgency: low
Maintainer: Debian OCaml Maintainers 
Changed-By: Samuel Mimram <[EMAIL PROTECTED]>
Description: 
 mldonkey-gui - Graphical frontend for mldonkey based on GTK
 mldonkey-server - Door to the 'donkey' network
Closes: 417624
Changes: 
 mldonkey (2.8.4-2) unstable; urgency=low
 .
   * Added a missing build-dependency on libxml2-utils which is needed for
 xmllint.
   * Removed arm_dynamic_loop_delay.dpatch, integrated upstream,
 closes: #417624.
Files: 
 2c81900204f87f4e4c327a959df949eb 1186 net optional mldonkey_2.8.4-2.dsc
 212c030afd9788b9a592ddc93602d0d3 124051 net optional mldonkey_2.8.4-2.diff.gz
 8ad25696ec1436651235c4b9d4b26e67 2528014 net optional 
mldonkey-server_2.8.4-2_i386.deb
 e4fc98bdca94270ec017fcc17f31c069 3555414 net optional 
mldonkey-gui_2.8.4-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGE1KqIae1O4AJae8RAl7MAJ4qf7DG12xuGmLA1sMFl433I32a+gCfapS9
v8vdcFO9aeAt3hDmr5J7egA=
=mYY8
-END PGP SIGNATURE-

--- End Message ---


Processed: tagging 414045

2007-04-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.10.2
> tags 414045 + patch
Bug#414045: libX11: Buffer overflow in XGetPixel().
Tags were: upstream security
Tags added: patch

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: severity of 417624 is serious

2007-04-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.10.2
> severity 417624 serious
Bug#417624: Several build bugs
Severity set to `serious' from `normal'

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#417656: evolution: Crashes when run

2007-04-04 Thread Øystein Gisnås

2007/4/4, Øystein Gisnås <[EMAIL PROTECTED]>:

> Maybe this is actually the fault of e-d-s since I just upgraded it
> from 1.8.2-1 to 1.8.2-2. Anyway, here's a backtrace:

Does this happen on every invocation?


I actually can reproduce this myself, and it's probably due to the
20_too-many-open-files.patch. Downgrading e-d-s to 1.8.2-1 helps.

We'll remove the patch, test it and reupload as soon as we can.