Bug#494514: insserv: Test suite fail on alpha
[Steve Langasek] I can't reproduce this on my alpha here. So this may be a problem with how goetz is set up, rather than a general alpha problem. Right. Which file system type are you using on your alpha? I've given insserv back on alpha to see whether it's reproducible or if this was a fluke, but goetz is the only buildd that I see alive for alpha currently, so if it fails again then I think we need to find a sourceful fix (or figure out what's wrong with the buildd) for release. It failed again. I guess the admin of goetz need to be involved to figure out which file system is used during build. As mentioned earlier, tmpfs had a kernel bug triggering the behaviuor we see during build. If it is used or other file systems have it took, it would explain the issue on the autobuilder for alpha. I guess we should turn off readahead on directories until it is safe to enable it by default. :/ Happy hacking, -- Petter Reinholdtsen -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#494514: insserv: Test suite fail on alpha
On Mon, Aug 18, 2008 at 08:27:29AM +0200, Petter Reinholdtsen wrote: [Steve Langasek] I can't reproduce this on my alpha here. So this may be a problem with how goetz is set up, rather than a general alpha problem. Right. Which file system type are you using on your alpha? In this case, NFS... I can try against a different filesystem tomorrow if you like. Cheers, -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. Ubuntu Developerhttp://www.debian.org/ [EMAIL PROTECTED] [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#494514: insserv: Test suite fail on alpha
[Steve Langasek] In this case, NFS... Right. So ext3 and NFS should be ok. :) I can try against a different filesystem tomorrow if you like. If you happen to know what file system is used on the autobuilder, or if ext2/ext3 is not the default file system on alpha, it would be useful to have a test with those file systems as well. If not, it will be a shot in the dark, and I have no idea what file system to suggest. Happy hacking, -- Petter Reinholdtsen -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#491505: marked as done ([package varmon] varmon segfaults on Etch i386)
Your message dated Mon, 18 Aug 2008 07:47:05 + with message-id [EMAIL PROTECTED] and subject line Bug#491505: fixed in varmon 1.2.1-1 has caused the Debian Bug report #491505, regarding [package varmon] varmon segfaults on Etch i386 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 491505: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=491505 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: varmon Version: 1.2.0-4 Severity: grave --- Please enter the report below this line. --- Varmon segfaults almost immediately. ~# varmon Scanning for VA safety backplane. Please wait a few moments... DAC960: Ctrlr 0, PCI 00:0b:01, IRQ 5, Channels 1 DAC960: Model DAC960PTL1, Firmware 4.08-0-37 Scanning Controller[0], Channel[0], ID[0] Segmentation fault --- System information. --- Architecture: i386 Kernel: Linux 2.6.25-2-686 Debian Release: etch A few Backports are installed. --- Package information. --- Depends: libc6 (= 2.3.6-6), libncurses5 (= 5.4-5) Filename: pool/main/v/varmon/varmon_1.2.0-4_i386.deb Depends(Version) | Installed -+-= libc6 (= 2.3.6-6) | 2.3.6.ds1-13etch2 libncurses5 (= 5.4-5) | 5.5-5 ---End Message--- ---BeginMessage--- Source: varmon Source-Version: 1.2.1-1 We believe that the bug you reported is fixed in the latest version of varmon, which is due to be installed in the Debian FTP archive: varmon_1.2.1-1.diff.gz to pool/main/v/varmon/varmon_1.2.1-1.diff.gz varmon_1.2.1-1.dsc to pool/main/v/varmon/varmon_1.2.1-1.dsc varmon_1.2.1-1_amd64.deb to pool/main/v/varmon/varmon_1.2.1-1_amd64.deb varmon_1.2.1.orig.tar.gz to pool/main/v/varmon/varmon_1.2.1.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Julien Danjou [EMAIL PROTECTED] (supplier of updated varmon package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 18 Aug 2008 09:40:04 +0200 Source: varmon Binary: varmon Architecture: source amd64 Version: 1.2.1-1 Distribution: unstable Urgency: low Maintainer: Julien Danjou [EMAIL PROTECTED] Changed-By: Julien Danjou [EMAIL PROTECTED] Description: varmon - VA RAID monitor Closes: 491505 Changes: varmon (1.2.1-1) unstable; urgency=low . * New upstream release + Fix segmentation fault on start (Closes: #491505) * Bump standard version Checksums-Sha1: ea66f96a383a12b8da15ee6f625769073c5242b5 948 varmon_1.2.1-1.dsc 2b2cddd26d94d0a32de2e5a942d958e2da51eece 497921 varmon_1.2.1.orig.tar.gz 2faafaf716d923dfd1350442341f25f7883b70a1 2957 varmon_1.2.1-1.diff.gz 3613c9b8ee71b2fcab17c1d9bcce24258754ee16 483214 varmon_1.2.1-1_amd64.deb Checksums-Sha256: d57b4d3c947f55a1ecbdaee4542933a8da5e2410024265b8aa7fa7937e5ca172 948 varmon_1.2.1-1.dsc 7ca2a6faad40e12cbdf140a6cf42e49944abcd840dcc51e0ddb8d76f9b1a0621 497921 varmon_1.2.1.orig.tar.gz ee69f61a36cb424d5b8b74711e056362ec9190491a3c30d7ae3c8444f96b254b 2957 varmon_1.2.1-1.diff.gz 145123020c9f75e162a67b4671eacf68f2d0c9d444ec2dffcd1bb70aa1778ab9 483214 varmon_1.2.1-1_amd64.deb Files: fce229ef93d97a5372f85ed4bb4f249e 948 admin extra varmon_1.2.1-1.dsc d930501abfe6f223db381a1720cc2f09 497921 admin extra varmon_1.2.1.orig.tar.gz fa5efa9ba9d8dc708101ecd6b11fd507 2957 admin extra varmon_1.2.1-1.diff.gz c3f8f8ab6ceb6ab5b915c52d24abc3f5 483214 admin extra varmon_1.2.1-1_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkipJ98ACgkQpGK1HsL+5c3yFgCgzpMQM2oKWTTyhpvUd7dQL5Gz ghkAoMFgiXATesHbwX08qGpPNMFjRZy+ =FvAT -END PGP SIGNATURE- ---End Message---
Bug#491396: This bug is affecting lenny and should be fixed
Hi Raphael, Raphael Hertzog wrote: severity 491396 serious thanks On Sat, 16 Aug 2008, Christian Perrier wrote: Therefore, I think this deserves to be fixed for lenny, unless we want to release with a non-working ACPI support. I should even have tagged the bug as release critical, imho. Leaving that up to the maintainer. Agreed. Bart, can you handle that? The bug is in acpid, right? I don't think I can do much else other than bug the acpid maintainer. Unless I want to go and NMU of course. :-) Cheers, Bart -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495184: wodim: Fails, then asks me to use the option I've already given
Sven Joachim wrote: On 2008-08-15 10:00 +0200, Nigel Horne wrote: Package: wodim Version: 9:1.1.8-1 Severity: grave Justification: renders package unusable wodim --devices says: wodim: No such file or directory. Cannot open SCSI driver! For possible targets try 'wodim --devices' or 'wodim -scanbus'. For possible transport specifiers try 'wodim dev=help'. For IDE/ATAPI devices configuration, see the file README.ATAPI.setup from the wodim documentation. Well, quoting that file: ,[ /usr/share/doc/wodim/README.ATAPI.setup ] | Only users part of the system group cdrom are able to write CDs. | If you wish to allow non-root users to write CDs then add your users to the | cdrom group (adduser user cdrom) and let the user completely logout and | re-login. ` Are you a member of the cdrom group? I was running as root, on a default system. Does Debian include root in the cdrom group by default? Sven -- Nigel Horne. Adjudicator, Arranger, Band Trainer, Conductor, Composer, Tutor. NJH Music, Barnsley, UK. ICQ#20252325 [EMAIL PROTECTED] http://www.bandsman.co.uk -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495514: azureus and openjdk
package: azureus severity: serious justification: policy 3.5 There were a number of rc bugs reported about azureus not working with gij. Theese were closed with the justification that azureus could now be used with openjdk. However no packaging changes were made to reflect this. IMO the following changes should be made to the azureus package * the dependencies should be changed to reflect the JVMs that azureus actually works with. * the azureus launch script should be changed to make sure azureus actually uses a vm that it works with * the azureus-gcj package should be dropped -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#491396: This bug is affecting lenny and should be fixed
Raphael Hertzog wrote: On Mon, 18 Aug 2008, Bart Samwel wrote: Agreed. Bart, can you handle that? The bug is in acpid, right? Why? /etc/acpi/power.sh is part of acpi-support and needs to be updated to use /sys/class/power_supply/ instead of /proc/acpi/ac_adapter/ which has been removed in recent kernels (2.6.26 in Debian sid, intended for lenny)... I don't see what concerns acpid here. Oh, aaargh, I've done some bad reading here. Will get this fixed. BTW, if I fix anything for this, do I need to make a special update containing *only* a fix for this bug, or can I piggyback some other nasty bug fixes onto the update? Cheers, Bart -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Freeze exception for libapache2-mod-perl2/2.0.4-2
Processing commands for [EMAIL PROTECTED]: block 494677 with 494679 Bug#494679: perl: $ENV{TMPDIR} breaks CGI.pm in taint mode Bug#494677: libapache2-mod-perl2: FTBFS: dpkg-checkbuilddeps: Unmet build dependencies: libcgi-pm-perl (= 3.33) Was not blocked by any bugs. Blocking bugs of 494677 added: 494679 block 480154 with 494679 Bug#494679: perl: $ENV{TMPDIR} breaks CGI.pm in taint mode Bug#480154: non-determistic FTBFS: cgiupload tests fail Was not blocked by any bugs. Blocking bugs of 480154 added: 494679 thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#494677: Freeze exception for libapache2-mod-perl2/2.0.4-2
block 494677 with 494679 block 480154 with 494679 thanks On Sun, Aug 17, 2008 at 11:41:08PM +0100, Adeodato Simó wrote: * Niko Tyni [Mon, 11 Aug 2008 14:03:27 +0300]: Please allow the just-uploaded version 2.0.4-2 of libapache2-mod-perl2 to migrate to lenny. The upload contains a fix for a FTBFS bug[0] that shows itself preferably on slow architectures. libcgi-pm-perl (which is added to build-dependencies) is at version 3.38 in lenny. Darn, it failed on all autobuilders because their sbuilds still suffer from #395271 I suppose we need to do something else to fix libapache2-mod-perl2. Any progress on this fix? As discussed in #494677, fixing the CGI.pm bug in perl-modules (tracked as #494679 and waiting for 5.10.0-13 to get in lenny first) should take care of the original non-deterministic libapache2-mod-perl2 FTBFS bug (#480154) still present in testing. I don't think we should work around the problem in libapache2-mod-perl2 at this point. For reference: #480154 libapache2-mod-perl2: non-determistic FTBFS: cgiupload tests fail #494677 libapache2-mod-perl2: FTBFS: dpkg-checkbuilddeps: Unmet build dependencies: libcgi-pm-perl (= 3.33) #494679 perl: $ENV{TMPDIR} breaks CGI.pm in taint mode Hope this clears it up :) -- Niko Tyni [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#491396: This bug is affecting lenny and should be fixed
On Mon, 18 Aug 2008, Bart Samwel wrote: Agreed. Bart, can you handle that? The bug is in acpid, right? Why? /etc/acpi/power.sh is part of acpi-support and needs to be updated to use /sys/class/power_supply/ instead of /proc/acpi/ac_adapter/ which has been removed in recent kernels (2.6.26 in Debian sid, intended for lenny)... I don't see what concerns acpid here. Cheers, -- Raphaël Hertzog Le best-seller français mis à jour pour Debian Etch : http://www.ouaza.com/livre/admin-debian/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495525: exaile is crashing on start
Package: exaile Version: 0.2.11.1+debian-2 Severity: grave Justification: renders package unusable Hi! I am not sure if it is a bug that should be assigned to exaile ... but exaile is crashing on start . with following error message : exaile failed 1 Traceback (most recent call last): File /usr/lib/exaile/exaile.py, line 90, in module from xl.gui import main as exailemain File /usr/lib/exaile/xl/gui/main.py, line 23, in module from xl import library, media, audioscrobbler, equalizer, burn, common File /usr/lib/exaile/xl/library.py, line 20, in module from xl import common, media, db, audioscrobbler, xlmisc, dbusinterface File /usr/lib/exaile/xl/media/__init__.py, line 1, in module from xl.media import mp3, ogg, flac, wav, wv, mpc, tta File /usr/lib/exaile/xl/media/mp3.py, line 2, in module from xl import xlmisc File /usr/lib/exaile/xl/xlmisc.py, line 32, in module from xl import mozembed File /usr/lib/exaile/xl/mozembed.py, line 29, in module import gtkmozembed SystemError: dynamic module not initialized properly zsh: exit 1 exaile Important : the package is working on another amd64-based machine Regards mahashakti89 -System Information: Debian Release: lenny/sid Architecture: i386 (i686) Kernel: Linux 2.6.26 (SMP w/2 CPU cores) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages exaile depends on: ii gstreamer0.10-alsa0.10.20-1 GStreamer plugin for ALSA ii gstreamer0.10-esd 0.10.8-4 GStreamer plugin for ESD ii gstreamer0.10-plugins-base0.10.20-1 GStreamer plugins from the base ii gstreamer0.10-plugins-good0.10.8-4 GStreamer plugins from the good ii libatk1.0-0 1.22.0-1 The ATK accessibility toolkit ii libc6 2.7-13 GNU C Library: Shared libraries ii libcairo2 1.6.4-6The Cairo 2D vector graphics libra ii libglib2.0-0 2.16.5-1 The GLib library of C routines ii libgstreamer0.10-00.10.20-1 Core GStreamer libraries and eleme ii libgtk2.0-0 2.12.11-3 The GTK+ graphical user interface ii libpango1.0-0 1.20.5-1 Layout and rendering of internatio ii python2.5.2-2An interactive high-level object-o ii python-dbus 0.83.0-1 simple interprocess messaging syst ii python-elementtree1.2.6-12 Light-weight toolkit for XML proce ii python-glade2 2.12.1-6 GTK+ bindings: Glade support ii python-gst0.100.10.12-1 generic media-playing framework (P ii python-gtk2 2.12.1-6 Python bindings for the GTK+ widge ii python-mutagen1.14-1 audio metadata editing library ii python-pysqlite2 2.4.1-1Python interface to SQLite 3 ii python-pyvorbis 1.3-2 A Python interface to the Ogg Vorb ii python-support0.8.5 automated rebuilding support for P Versions of packages exaile recommends: ii gstreamer0.10-plugins-ugly0.10.8-1 GStreamer plugins from the ugly ii python-cddb 1.4-5.1+b1 Python interface to CD-IDs and Fre ii python-gamin 0.1.9-2Python binding for the gamin clien ii python-gnome2-extras 2.19.1-2 Extra Python bindings for the GNOM ii python-gpod 0.6.0-6Python bindings for libgpod ii python-notify 0.1.1-2+b1 Python bindings for libnotify ii streamripper 1.63.5-1 download online streams into audio exaile suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#491396: This bug is affecting lenny and should be fixed
On Mon, 18 Aug 2008, Bart Samwel wrote: Raphael Hertzog wrote: On Mon, 18 Aug 2008, Bart Samwel wrote: Agreed. Bart, can you handle that? The bug is in acpid, right? Why? /etc/acpi/power.sh is part of acpi-support and needs to be updated to use /sys/class/power_supply/ instead of /proc/acpi/ac_adapter/ which has been removed in recent kernels (2.6.26 in Debian sid, intended for lenny)... I don't see what concerns acpid here. Oh, aaargh, I've done some bad reading here. Will get this fixed. BTW, if I fix anything for this, do I need to make a special update containing *only* a fix for this bug, or can I piggyback some other nasty bug fixes onto the update? As long as they are important and well tested, yes. The release team will have to approve the change so they will review it, so it's best when the changes are limited. Cheers, -- Raphaël Hertzog Le best-seller français mis à jour pour Debian Etch : http://www.ouaza.com/livre/admin-debian/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495521: kaya: 0.4.2 contains data corruption bugs
Package: kaya Version: 0.4.2-2 Severity: grave Tags: patch Justification: causes non-serious data loss 0.4.2 contains a few data loss / data corruption bugs that are fixed upstream in 0.4.3. The attached patch fixes these bugs, as well as a compiler error where valid code would not compile. In order from most serious to least, the bugs are: rts/VMState.cc: fixes memory allocation bug which can cause hard-to-trace crashes. libs/my_inter.cc: fixes data corruption bug where values returned from prepared queries in MySQL contain NULLs stdlib/Mime.k: fixes bug with processing of form fields in file upload forms stdlib/Regex.k: fixes bug with Regex splitting of strings where the delimiter terminates the string compiler/LambdaLift.hs: fixes bug with for loops and lambda functions Thanks -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.18 (SMP w/1 CPU core) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages kaya depends on: ii g++-4.24.2.3-2 The GNU C++ compiler ii libc6 2.7-9 GNU C Library: Shared libraries ii libgc-dev 1:6.8-1.1 conservative garbage collector for ii libgc1c2 1:6.8-1.1 conservative garbage collector for ii libgcc11:4.3-20080227-1 GCC support library ii libgcrypt111.4.0-3 LGPL Crypto library - runtime libr ii libgcrypt11-dev1.4.0-3 LGPL Crypto library - development ii libgmp3c2 2:4.2.1+dfsg-5Multiprecision arithmetic library ii libgnutls-dev 2.2.2-1 the GNU TLS library - development ii libncurses55.6+20080203-1Shared libraries for terminal hand ii libpcre3 7.6-2 Perl 5 Compatible Regular Expressi ii libpcre3-dev 7.6-2 Perl 5 Compatible Regular Expressi ii libreadline5 5.2-3 GNU readline and history libraries ii libstdc++6 4.3-20080227-1The GNU Standard C++ Library v3 ii zlib1g 1:1.2.3.3.dfsg-11 compression library - runtime ii zlib1g-dev 1:1.2.3.3.dfsg-11 compression library - development kaya recommends no packages. -- no debconf information diff -rN -u old-kaya/compiler/LambdaLift.hs new-kaya/compiler/LambdaLift.hs --- old-kaya/compiler/LambdaLift.hs 2008-08-18 10:04:38.0 +0100 +++ new-kaya/compiler/LambdaLift.hs 2008-08-18 10:04:38.0 +0100 @@ -83,7 +83,7 @@ let (defs'',e2') = lift' defs' locs e2 in (defs'',DoWhile e1' e2') lift' defs locs (For i nm j lval e1 e2) = - let (defs',e1') = lift' defs locs e1 in + let (defs',e1') = lift' defs (fakevars++locs) e1 in let (defs'',e2') = lift' defs' (fakevars++locs) e2 in let (defs''',lval') = liftlval defs'' locs lval in (defs''',For i nm j lval' e1' e2') diff -rN -u old-kaya/libs/my_inter.cc new-kaya/libs/my_inter.cc --- old-kaya/libs/my_inter.cc 2008-08-18 10:04:38.0 +0100 +++ new-kaya/libs/my_inter.cc 2008-08-18 10:04:38.0 +0100 @@ -289,7 +289,11 @@ for(int j = 0; jnumflds; j++) { KayaValue pv,fld; - pv = KayaString(KSTRING((char*)rbind[i].buffer)); + if (rnull[j]) { + pv = KayaString(L); + } else { + pv = KayaString(KSTRING((char*)rbind[j].buffer)); + } fld = KayaUnion(0,1); KayaUnionSetArg(fld,0,pv); KayaArrayPush(row,fld); diff -rN -u old-kaya/rts/VMState.cc new-kaya/rts/VMState.cc --- old-kaya/rts/VMState.cc 2008-08-18 10:04:38.0 +0100 +++ new-kaya/rts/VMState.cc 2008-08-18 10:04:38.0 +0100 @@ -28,7 +28,7 @@ void initFunMap(kint sz, kint fmhash) { -func* funcs = (func*)malloc(sizeof(func)*sz); +func* funcs = (func*)GC_MALLOC_UNCOLLECTABLE(sizeof(func)*sz); m_funmap[0] = funcs; m_funmapsize = sz; m_funmaphash = fmhash; diff -rN -u old-kaya/stdlib/Mime.k new-kaya/stdlib/Mime.k --- old-kaya/stdlib/Mime.k 2008-08-18 10:04:38.0 +0100 +++ new-kaya/stdlib/Mime.k 2008-08-18 10:04:38.0 +0100 @@ -135,7 +135,13 @@ pop(bstack); } if (fname == ) { - push(mimeobjs,Mime(copy(blockname),copy(ctype),MimeString(copy(content; + if (substr(content,-2,2) == \r\n) { + push(mimeobjs,Mime(copy(blockname),copy(ctype),MimeString(substr(content,0,length(content)-2; + } else if (substr(content,-1,1) == \n || substr(content,-1,1) == \r) { + push(mimeobjs,Mime(copy(blockname),copy(ctype),MimeString(substr(content,0,length(content)-1; + } else { + push(mimeobjs,Mime(copy(blockname),copy(ctype),MimeString(copy(content; + } } else { push(mimeobjs,Mime(copy(blockname),copy(ctype),MimeFile(copy(fname),copy(tmpname; close(mfh); @@ -148,7 +154,7 @@ leavestate = DecodeBody; } else { if (fname == ) { - trim(line); + // trim(line);
Bug#495531: blobandconquer: Contains non-free music and sounds
Package: blobandconquer Version: 0.99-1 Severity: serious The music and sounds in Blob and Conquer are taken from various free online repositories, which allow distribution and non-commercial use at the minimum, but not necessarily DFSG-free. Some sounds and music files may be in the public domain, but this is not clear yet. The sounds and music should be split into a blobwars-data-nonfree package. (I'm reporting this bug to prevent blobandconquer from getting released with lenny before this is fixed.) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495530: [evolution] Evolution craches on startup
Package: evolution Version: 2.22.3.1-1 Severity: critical --- Please enter the report below this line. --- Every time I try to run evolution, it craches with the following stack trace. This makes it unusable. It used to work correctly before. I have 2 to 3 seconds before it craches to stop it and make it work offline. In offline mode it will not crache. [EMAIL PROTECTED]:lazarus]$gdb evolution GNU gdb 6.8-debian Copyright (C) 2008 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type show copying and show warranty for details. This GDB was configured as i486-linux-gnu... (gdb) r Starting program: /usr/bin/evolution [Thread debugging using libthread_db enabled] [New Thread 0x418d9ce0 (LWP 14617)] CalDAV Eplugin starting up ... evolution-shell-Message: Killing old version of evolution-data-server... [New Thread 0x42aa3b90 (LWP 14645)] [New Thread 0x432a3b90 (LWP 14646)] [New Thread 0x43aa3b90 (LWP 14647)] [New Thread 0x442acb90 (LWP 14648)] [Thread 0x442acb90 (LWP 14648) exited] [New Thread 0x442acb90 (LWP 14664)] [New Thread 0x44b5cb90 (LWP 14665)] [New Thread 0x45b64b90 (LWP 14667)] [New Thread 0x46364b90 (LWP 14668)] [New Thread 0x45364b90 (LWP 14666)] [Thread 0x46364b90 (LWP 14668) exited] [Thread 0x45364b90 (LWP 14666) exited] [Thread 0x45b64b90 (LWP 14667) exited] [Thread 0x442acb90 (LWP 14664) exited] [Thread 0x42aa3b90 (LWP 14645) exited] [New Thread 0x42aa3b90 (LWP 14687)] libnm_glib_nm_state_cb: dbus returned an error. (org.freedesktop.DBus.Error.AccessDenied) A security policy in place prevents this sender from sending this message to this recipient, see message bus configuration file (rejected message had interface org.freedesktop.NetworkManager member state error name (unset) destination org.freedesktop.NetworkManager) [New Thread 0x463beb90 (LWP 14689)] [New Thread 0x442acb90 (LWP 14692)] [New Thread 0x45364b90 (LWP 14693)] [New Thread 0x45b64b90 (LWP 14694)] [New Thread 0x46364b90 (LWP 14695)] [New Thread 0x46cffb90 (LWP 14696)] [Thread 0x45b64b90 (LWP 14694) exited] [Thread 0x46cffb90 (LWP 14696) exited] [Thread 0x442acb90 (LWP 14692) exited] [Thread 0x45364b90 (LWP 14693) exited] [Thread 0x46364b90 (LWP 14695) exited] (evolution:14617): evolution-mail-WARNING **: Failed to refresh folders: Pas de dossier « Shared Folders » (evolution:14617): evolution-mail-WARNING **: Failed to refresh folders: Pas de dossier « Shared Folders/User » (evolution:14617): evolution-mail-WARNING **: Failed to refresh folders: Pas de dossier « Shared Folders/User/anybody » [Thread 0x43aa3b90 (LWP 14647) exited] Program received signal SIGSEGV, Segmentation fault. [Switching to Thread 0x432a3b90 (LWP 14646)] 0x41276968 in g_markup_escape_text () from /usr/lib/libglib-2.0.so.0 (gdb) bt #0 0x41276968 in g_markup_escape_text () from /usr/lib/libglib-2.0.so.0 #1 0x41277ab7 in g_markup_vprintf_escaped () from /usr/lib/libglib-2.0.so.0 #2 0x41277bd8 in g_markup_printf_escaped () from /usr/lib/libglib-2.0.so.0 #3 0x4229bbdc in imap_connect_online (service=0x825e920, ex=0x432a32a4) at camel-imap-store.c:1429 #4 0x401d4bcf in disco_connect (service=0x825e920, ex=0x432a32a4) at camel-disco-store.c:162 #5 0x401f51cf in camel_service_connect (service=0x825e920, ex=0x432a32a4) at camel-service.c:371 #6 0x42296c2a in camel_imap_store_connected (store=0x825e920, ex=0x432a32a4) at camel-imap-store.c:3017 #7 0x42292c7f in imap_refresh_info (folder=0x838c870, ex=0x432a32a4) at camel-imap-folder.c:585 #8 0x401d36d6 in disco_refresh_info (folder=0x838c870, ex=0x432a32a4) at camel-disco-folder.c:269 #9 0x401e53d9 in camel_folder_refresh_info (folder=0x838c870, ex=0x432a32a4) at camel-folder.c:302 #10 0x41e93b67 in refresh_folders_exec (m=0x8235d80) at mail-send-recv.c:825 #11 0x41e8d9e9 in mail_msg_proxy (msg=0x8235d80) at mail-mt.c:523 #12 0x4129d8f6 in ?? () from /usr/lib/libglib-2.0.so.0 #13 0x08235d80 in ?? () #14 0x in ?? () (gdb) q The program is running. Exit anyway? (y or n) y --- System information. --- Architecture: i386 Kernel: Linux 2.6.18 Debian Release: lenny/sid 500 unstableftp.fr.debian.org --- Package information. --- Depends (Version) | Installed ==-+-== libart-2.0-2 (= 2.3.18) | 2.3.20-2 libatk1.0-0(= 1.20.0) | 1.22.0-1 libbluetooth2(= 3.14) | 3.36-1 libbonobo2-0 (= 2.15.0) | 2.22.0-1 libbonoboui2-0 (= 2.15.1) | 2.22.0-1 libc6 (= 2.7-1) | 2.7-13 libcairo2 (= 1.2.4) | 1.6.4-6 libcamel1.2-11 (= 2.22.2) | 2.22.3-1 libdbus-1-3 (= 1.0.2) | 1.2.1-3 libdbus-glib-1-2 (=
Bug#493397: patch for 1.4.11dfsg
Note however that vzaphfc als needs patching ;-). Patch is based on the 1.2 version -- A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? A: Top-posting. Q: What is the most annoying thing in email? --- zaptel-base.c.orig 2008-08-18 12:55:48.0 +0200 +++ zaptel-base.c 2008-08-18 12:49:25.0 +0200 @@ -163,13 +163,29 @@ /* udev necessary data structures. Yeah! */ #ifdef CONFIG_ZAP_UDEV - -#if LINUX_VERSION_CODE = KERNEL_VERSION(2,6,15) +#if LINUX_VERSION_CODE = KERNEL_VERSION(2,6,26) +#define CLASS_DEV_CREATE(class, devt, device, name) \ +device_create(class, device, devt, name) +#elif LINUX_VERSION_CODE = KERNEL_VERSION(2,6,15) #define CLASS_DEV_CREATE(class, devt, device, name) \ class_device_create(class, NULL, devt, device, name) -#else +#elif LINUX_VERSION_CODE = KERNEL_VERSION(2,6,13) #define CLASS_DEV_CREATE(class, devt, device, name) \ class_device_create(class, devt, device, name) +#else +#define CLASS_DEV_CREATE(class, devt, device, name) \ +class_simple_device_add(class, devt, device, name) +#endif + +#if LINUX_VERSION_CODE = KERNEL_VERSION(2,6,26) +#define CLASS_DEV_DESTROY(class, devt) \ +device_destroy(class, devt) +#elif LINUX_VERSION_CODE = KERNEL_VERSION(2,6,13) +#define CLASS_DEV_DESTROY(class, devt) \ +class_device_destroy(class, devt) +#else +#define CLASS_DEV_DESTROY(class, devt) \ +class_simple_device_remove(class, devt) #endif #if LINUX_VERSION_CODE = KERNEL_VERSION(2,6,13) @@ -178,8 +194,6 @@ static struct class_simple *zap_class = NULL; #define class_create class_simple_create #define class_destroy class_simple_destroy -#define class_device_create class_simple_device_add -#define class_device_destroy(a, b) class_simple_device_remove(b) #endif #endif /* CONFIG_ZAP_UDEV */ @@ -5337,7 +5351,7 @@ #ifdef CONFIG_ZAP_UDEV for (x = 0; x span-channels; x++) { if (span-chans[x].channo 250) - class_device_destroy(zap_class, MKDEV(ZT_MAJOR, span-chans[x].channo)); + CLASS_DEV_DESTROY(zap_class, MKDEV(ZT_MAJOR, span-chans[x].channo)); } #endif /* CONFIG_ZAP_UDEV */ @@ -7825,7 +7839,7 @@ int zt_unregister_chardev(struct zt_chardev *dev) { #ifdef CONFIG_ZAP_UDEV - class_device_destroy(zap_class, MKDEV(ZT_MAJOR, dev-minor)); + CLASS_DEV_DESTROY(zap_class, MKDEV(ZT_MAJOR, dev-minor)); #endif /* CONFIG_ZAP_UDEV */ #ifdef CONFIG_DEVFS_FS @@ -7904,10 +7918,10 @@ devfs_unregister_chrdev(ZT_MAJOR, zaptel); #else #ifdef CONFIG_ZAP_UDEV - class_device_destroy(zap_class, MKDEV(ZT_MAJOR, 253)); /* timer */ - class_device_destroy(zap_class, MKDEV(ZT_MAJOR, 254)); /* channel */ - class_device_destroy(zap_class, MKDEV(ZT_MAJOR, 255)); /* pseudo */ - class_device_destroy(zap_class, MKDEV(ZT_MAJOR, 0)); /* ctl */ + CLASS_DEV_DESTROY(zap_class, MKDEV(ZT_MAJOR, 253)); /* timer */ + CLASS_DEV_DESTROY(zap_class, MKDEV(ZT_MAJOR, 254)); /* channel */ + CLASS_DEV_DESTROY(zap_class, MKDEV(ZT_MAJOR, 255)); /* pseudo */ + CLASS_DEV_DESTROY(zap_class, MKDEV(ZT_MAJOR, 0)); /* ctl */ class_destroy(zap_class); #endif /* CONFIG_ZAP_UDEV */ unregister_chrdev(ZT_MAJOR, zaptel);
Bug#495530: [evolution] Evolution craches when passwd is not correct
Package: evolution Version: 2.22.3.1-1 --- Please enter the report below this line. --- After investigation, this bug seems to be related to the fact the a stored password was not correct. The server response seems to be the cause of the segmentation fault. the used server was imap.clubinternet.fr. --- System information. --- Architecture: i386 Kernel: Linux 2.6.18 Debian Release: lenny/sid 500 unstableftp.fr.debian.org --- Package information. --- Depends (Version) | Installed ==-+-== libart-2.0-2 (= 2.3.18) | 2.3.20-2 libatk1.0-0(= 1.20.0) | 1.22.0-1 libbluetooth2(= 3.14) | 3.36-1 libbonobo2-0 (= 2.15.0) | 2.22.0-1 libbonoboui2-0 (= 2.15.1) | 2.22.0-1 libc6 (= 2.7-1) | 2.7-13 libcairo2 (= 1.2.4) | 1.6.4-6 libcamel1.2-11 (= 2.22.2) | 2.22.3-1 libdbus-1-3 (= 1.0.2) | 1.2.1-3 libdbus-glib-1-2 (= 0.71) | 0.76-1 libebook1.2-9 (= 2.22.2) | 2.22.3-1 libecal1.2-7 (= 2.22.2) | 2.22.3-1 libedataserver1.2-9(= 2.22.2) | 2.22.3-1 libedataserverui1.2-8 (= 2.22.2) | 2.22.3-1 libegroupwise1.2-13(= 2.22.2) | 2.22.3-1 libexchange-storage1.2-3 (= 2.22.2) | 2.22.3-1 libfontconfig1 (= 2.4.0) | 2.6.0-1 libfreetype6(= 2.3.5) | 2.3.7-1 libgconf2-4(= 2.13.5) | 2.22.0-1 libglade2-0 (= 1:2.6.1) | 1:2.6.2-1 libglib2.0-0 (= 2.16.0) | 2.16.5-1 libgnome-pilot2 (= 2.0.2) | 2.0.15-2.4 libgnome2-0(= 2.17.3) | 2.20.1.1-1 libgnomecanvas2-0 (= 2.11.1) | 2.20.1.1-1 libgnomeui-0 (= 2.17.1) | 2.20.1.1-1 libgnomevfs2-0 (= 1:2.17.90) | 1:2.22.0-4 libgtk2.0-0(= 2.12.0) | 2.12.11-3 libgtkhtml3.14-19 (= 3.18.3) | 3.18.3-1 libhal1 (= 0.5.8.1) | 0.5.11-3 libice6 (= 1:1.0.0) | 2:1.0.4-1 libldap-2.4-2 (= 2.4.7) | 2.4.10-3 libnm-glib0| 0.6.6-2 libnotify1 (= 0.4.4) | 0.4.4-3 libnotify1-gtk2.10 | libnspr4-0d (= 1.8.0.10) | 4.7.1-3 libnss3-1d (= 3.12.0~1.9b1) | 3.12.0-5 liborbit2 (= 1:2.14.10) | 1:2.14.13-0.1 libpango1.0-0 (= 1.20.3) | 1.20.5-1 libpisock9 | 0.12.3-5 libpisync1 | 0.12.3-5 libpixman-1-0 | 0.10.0-2 libpng12-0 (= 1.2.13-4) | 1.2.27-1 libpopt0 (= 1.14) | 1.14-4 libsm6 | 2:1.0.3-2 libsoup2.4-1(= 2.4.1) | 2.4.1-2 libusb-0.1-4 (= 2:0.1.12) | 2:0.1.12-12 libx11-6 | 2:1.1.4-2 libxcb-render-util0| 0.2.1+git1-1 libxcb-render0 | 1.1-1.1 libxcb1| 1.1-1.1 libxcursor1 ( 1.1.2) | 1:1.1.9-1 libxext6 | 2:1.0.4-1 libxfixes3(= 1:4.0.1) | 1:4.0.3-2 libxi6 | 2:1.1.3-1 libxinerama1 | 2:1.0.3-2 libxml2(= 2.6.27) | 2.6.32.dfsg-2 libxrandr2 | 2:1.2.3-1 libxrender1| 1:0.9.4-2 zlib1g(= 1:1.1.4) | 1:1.2.3.3.dfsg-12 gconf2 (= 2.10.1-2) | 2.22.0-1 evolution-common(= 2.22.3.1-1) | 2.22.3.1-1 evolution-data-server (= 2.21.92) | 2.22.3-1 evolution-data-server ( 2.23.0) | 2.22.3-1 gtkhtml3.14(= 3.17.5) | 3.18.3-1 gnome-icon-theme (= 2.19.91) | 2.22.0-1 dbus | 1.2.1-3 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#494415: marked as done (aswiki: package is completely unusable)
Your message dated Mon, 18 Aug 2008 11:02:03 + with message-id [EMAIL PROTECTED] and subject line Bug#494415: fixed in aswiki 1.0.4-6 has caused the Debian Bug report #494415, regarding aswiki: package is completely unusable to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 494415: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494415 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: aswiki Version: 1.0.4-5 Severity: grave Justification: renders package unusable Hi, aswiki is broken. When running it as a CGI script, the following exception is shown: wrong number of arguments (1 for 0) /usr/lib/ruby/1.8/aswiki/handler.rb:229:in `initialize' /usr/lib/ruby/1.8/aswiki/handler.rb:229:in `new' /usr/lib/ruby/1.8/aswiki/handler.rb:229:in `makeeditpage' /usr/lib/ruby/1.8/aswiki/handler.rb:257:in `initialize' /home/schm/public_html/aswiki/aswiki.cgi:48:in `new' /home/schm/public_html/aswiki/aswiki.cgi:48 This is apparently caused by aswiki relying on Digest::MD5.new accepting an argument containing the text to digest, which it does not. After fixing this problem by monkey-patching Digest::MD5, aswiki reacted with IndexPage /usr/lib/ruby/1.8/aswiki/backup.rb:40:in `ci' /usr/lib/ruby/1.8/aswiki/repository.rb:31:in `save' /usr/lib/ruby/1.8/aswiki/handler.rb:155:in `initialize' /home/schm/public_html/aswiki/aswiki.cgi:50:in `new' /home/schm/public_html/aswiki/aswiki.cgi:50 on saving a page, which was when I gave up. As aswiki has a low popcon store and is seemingly unmaintained upstream, removing it might be the easiest solution. -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (700, 'testing'), (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.22-3-686 (SMP w/1 CPU core) Locale: LANG=de_AT.UTF-8, LC_CTYPE=de_AT.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to de_AT.UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages aswiki depends on: ii libalgorithm-diff-ruby1.8 0.4-5 Ruby conversion of the Perl's Algo ii libamrita-ruby1.8 1.0.2-4HTML/XML template library for Ruby ii libdbm-ruby1.81.8.7.22-2 DBM interface for Ruby 1.8 ii libruby1.8 [libstrscan-ruby1. 1.8.7.22-2 Libraries necessary to run Ruby 1. ii ruby1.8 1.8.7.22-2 Interpreter of object-oriented scr Versions of packages aswiki recommends: ii libdb4.4-ruby1.8 0.6.2-1Interface to Berkeley DB for Ruby pn rcs none (no description available) aswiki suggests no packages. -- no debconf information Cheers, -- Michael Schutte [EMAIL PROTECTED] signature.asc Description: Digital signature ---End Message--- ---BeginMessage--- Source: aswiki Source-Version: 1.0.4-6 We believe that the bug you reported is fixed in the latest version of aswiki, which is due to be installed in the Debian FTP archive: aswiki_1.0.4-6.diff.gz to pool/main/a/aswiki/aswiki_1.0.4-6.diff.gz aswiki_1.0.4-6.dsc to pool/main/a/aswiki/aswiki_1.0.4-6.dsc aswiki_1.0.4-6_all.deb to pool/main/a/aswiki/aswiki_1.0.4-6_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. TANIGUCHI Takaki [EMAIL PROTECTED] (supplier of updated aswiki package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sat, 16 Aug 2008 22:25:52 +0900 Source: aswiki Binary: aswiki Architecture: source all Version: 1.0.4-6 Distribution: unstable Urgency: low Maintainer: Taku YASUI [EMAIL PROTECTED] Changed-By: TANIGUCHI Takaki [EMAIL PROTECTED] Description: aswiki - WikiWikiWeb clone (Wiki Engine) written in Ruby Closes: 494415 Changes: aswiki (1.0.4-6) unstable; urgency=low . * Fixed Ruby MD5 library API change's error. (closes: #494415) * Policy 3.8.0. Checksums-Sha1: 526f611852319e79036fa632ea7d86169ffe2f1d 988 aswiki_1.0.4-6.dsc 0816d1c75da8fe3f755875d95c154f08f95f2f4a 4186 aswiki_1.0.4-6.diff.gz a117725a99bb0dd609d0c722698ef0b5f8d0e85b 34530 aswiki_1.0.4-6_all.deb Checksums-Sha256:
Bug#494648: About (TWiki/web apps) sessions save dir - Was: Re: RFS: Second try for twiki-ldapcontrib, new upstream version - Re: RFS: twiki-ldapcontrib - LDAP services for TWiki
Having slept on it, I agree with Vincent and Dmitry. I think there is no sane way to have a secure session dir for cgi apps that might at any time need to be recreated with a unique name... basically, imagine what happens when you have a heavily loaded server, each of 100s of cgi scripts realising that the session dir has gone, and they all create a unique new one, and try to update the cfg file!!! seriously bad news. I will re-do the twiki package to rely on /var/run/twiki (or /var/lib/twiki/tmp if someone here suggests so) and a cronjob. Post Lenny, I think is is desperatly important for DD's to get a Secure cgi session _file_ policy created - and I suspect, some support systems to ensure that it won't cause the server issues such as filling up /var, preventing logging (the reason that I originally was asked to move it out of /var/lib/twiki). Could someone please give me an idea of how long i have before it is too late to fix this for lenny? Sven Olivier Berger wrote: Hi Vincent. Le samedi 16 août 2008 à 13:26 +0200, Vincent Bernat a écrit : I would be happy to upload your fix but I disagree with it. As pointed by Olivier at the end of the bug report, /tmp can be flushed at boot or by some cronjobs. Therefore, you cannot ensure that the twiki directory still exists when twiki will be running. I cannot give an universal solution, but in Roundcube, we use /var/lib/roundcube/temp and we provide a cron job that will clean it every m days where m can be set by the user in /etc/default/roundcube (and I just noticed that this is broken... will upload a fix). This way, we don't fill up /var but we don't rely on anything in /tmp. Moreover, we don't have to handle a complex script in postinst to circumvent symlinks attacks. The problem with webapps is that we don't have a clear policy of what to do. You can just look at other packages, like phpmyadmin, mediawiki, etc. Each attempt to establish a webapps policy seems to be aborted. That's why I asked for advice on debian-devel@ with no success :( http://lists.debian.org/debian-devel/2008/08/msg00340.html Feel free to comment anyway ;) Best regards, -- Professional Wiki Innovation and Support Sven Dowideit - http://DistributedINFORMATION.com A WikiRing Partner - http://wikiring.com Public key - http://pgp.mit.edu:11371/pks/lookup?search=Sven+Dowideitop=indexexact=on -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495122: marked as done (drupal5: Drupal Core - Multiple vulnerabilities - SA-2008-047)
Your message dated Mon, 18 Aug 2008 11:47:03 + with message-id [EMAIL PROTECTED] and subject line Bug#495122: fixed in drupal5 5.9-1.1+lenny1 has caused the Debian Bug report #495122, regarding drupal5: Drupal Core - Multiple vulnerabilities - SA-2008-047 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 495122: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495122 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: drupal5 Version: 5.9-1 Severity: grave Tags: security Justification: user security hole Drupal 5.9 suffers from several vulnerabilities (XSS). See http://drupal.org/node/295053 for more details. Please upload Drupal 5.10 soon. Thx! Regards, Ingo -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-6-xen-amd64 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Versions of packages drupal5 depends on: ii apache2 2.2.3-4+etch5 Next generation, scalable, extenda ii apache2-mpm-prefork [http 2.2.3-4+etch5 Traditional model for Apache HTTPD ii curl 7.15.5-1etch1 Get a file from an HTTP, HTTPS, FT ii dbconfig-common 1.8.29+etch1 common framework for packaging dat ii debconf 1.5.11etch2Debian configuration management sy ii exim4-daemon-heavy [mail- 4.63-17exim MTA (v4) daemon with extended ii mysql-client 5.0.32-7etch6 mysql database client (meta packag ii mysql-client-5.0 [mysql-c 5.0.32-7etch6 mysql database client binaries ii php5 5.2.0-8+etch11 server-side, HTML-embedded scripti ii php5-gd 5.2.0-8+etch11 GD module for php5 ii php5-mysql5.2.0-8+etch11 MySQL module for php5 ii php5-pgsql5.2.0-8+etch11 PostgreSQL module for php5 ii wwwconfig-common 0.0.48 Debian web auto configuration Versions of packages drupal5 recommends: pn mysql-server | postgresql none (no description available) -- debconf information excluded ---End Message--- ---BeginMessage--- Source: drupal5 Source-Version: 5.9-1.1+lenny1 We believe that the bug you reported is fixed in the latest version of drupal5, which is due to be installed in the Debian FTP archive: drupal5_5.9-1.1+lenny1.diff.gz to pool/main/d/drupal5/drupal5_5.9-1.1+lenny1.diff.gz drupal5_5.9-1.1+lenny1.dsc to pool/main/d/drupal5/drupal5_5.9-1.1+lenny1.dsc drupal5_5.9-1.1+lenny1_all.deb to pool/main/d/drupal5/drupal5_5.9-1.1+lenny1_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Antoine Beaupré [EMAIL PROTECTED] (supplier of updated drupal5 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sat, 16 Aug 2008 12:13:23 -0300 Source: drupal5 Binary: drupal5 Architecture: source all Version: 5.9-1.1+lenny1 Distribution: testing-security Urgency: high Maintainer: Luigi Gangitano [EMAIL PROTECTED] Changed-By: Antoine Beaupré [EMAIL PROTECTED] Description: drupal5- a fully-featured content management framework Closes: 495122 Changes: drupal5 (5.9-1.1+lenny1) testing-security; urgency=high . * Non-maintainer upload * Urgency high due to security fixes * Fixes Multiple vulnerabilities to the Drupal core (Ref: SA-2008-047) (Closes: #495122) Checksums-Sha1: b6849c955187fb92b3fffeb8cd7566d0ce4dd086 1114 drupal5_5.9-1.1+lenny1.dsc 9f82a7570c936e0f2e4211db2ff0ae1fc84b36df 34588 drupal5_5.9-1.1+lenny1.diff.gz f6addc65ecd2a00112a00e38526b473c29103ea4 789690 drupal5_5.9-1.1+lenny1_all.deb Checksums-Sha256: 78c12da2899420865a83b49b3131987fc4644db80d968ccd40c279fb5ead6542 1114 drupal5_5.9-1.1+lenny1.dsc f53aa0ecbfdf188e8b0c7e9a25c44633215e47cc7137993d63b9a35e547e3a5f 34588 drupal5_5.9-1.1+lenny1.diff.gz 00eff4966fcaba40bd51287ab0eca729380586f35982714a8cd1eb29e50ffc06 789690 drupal5_5.9-1.1+lenny1_all.deb Files: 0029a0e00de8b93653e17af05c49b6d0 1114 web extra drupal5_5.9-1.1+lenny1.dsc 4ea88a7c84cde5eaa1893ee0c2874b57 34588 web extra drupal5_5.9-1.1+lenny1.diff.gz eed02f0ff5f04c59d0ff68a3ae1d8cc1
Bug#491396: This bug is affecting lenny and should be fixed
Quoting Raphael Hertzog ([EMAIL PROTECTED]): severity 491396 serious thanks On Sat, 16 Aug 2008, Christian Perrier wrote: Therefore, I think this deserves to be fixed for lenny, unless we want to release with a non-working ACPI support. I should even have tagged the bug as release critical, imho. Leaving that up to the maintainer. Agreed. Bart, can you handle that? Well, I'm indeed really sorry for putting such pressure but this is the only way to handle these things after the very very annoying decision taken by the Kernel Team when disabling /proc/acpi so close to the release. I'm still pondering raising an RC issue on linux-2.6 for /proc/acpi to be back. I know that bugs have been reassigned to various packages when they were reported but I think I would then go up to CTTE as an attempt to revert to /proc/acpi support to be reintroduced in the kernel. I only regret not doing that much earlier when I noticed that 2/3 of my power management utilities had been broken without prior notice. Of course, when it comes at acpi-support itself, I think that supporting /sysfs would be good anyway. signature.asc Description: Digital signature
Bug#491396: This bug is affecting lenny and should be fixed
Hi Christian, Christian Perrier wrote: Quoting Raphael Hertzog ([EMAIL PROTECTED]): severity 491396 serious thanks On Sat, 16 Aug 2008, Christian Perrier wrote: Therefore, I think this deserves to be fixed for lenny, unless we want to release with a non-working ACPI support. I should even have tagged the bug as release critical, imho. Leaving that up to the maintainer. Agreed. Bart, can you handle that? Well, I'm indeed really sorry for putting such pressure but this is the only way to handle these things after the very very annoying decision taken by the Kernel Team when disabling /proc/acpi so close to the release. Yeah, that is a very annoying decision. IMO Work without /proc/acpi is something that should go in as a general release goal like the bash transition -- don't change the default in the first release, but file bugs against anything that breaks if you do. Then change the default in the next release. I'm still pondering raising an RC issue on linux-2.6 for /proc/acpi to be back. I know that bugs have been reassigned to various packages when they were reported but I think I would then go up to CTTE as an attempt to revert to /proc/acpi support to be reintroduced in the kernel. There may be much more breakage waiting to be found, and there's no time to fix it all. These kind of changes need months of testing! I only regret not doing that much earlier when I noticed that 2/3 of my power management utilities had been broken without prior notice. Of course, when it comes at acpi-support itself, I think that supporting /sysfs would be good anyway. Definitely, and it was already planned for a future update -- I just wasn't aware that this default had changed already. :-/ Cheers, Bart -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#493899: marked as done (libdirectfb-1.0-0: DirectFB fails to start (Could not initialize 'system' core!))
Your message dated Mon, 18 Aug 2008 12:32:03 + with message-id [EMAIL PROTECTED] and subject line Bug#493899: fixed in directfb 1.0.1-11 has caused the Debian Bug report #493899, regarding libdirectfb-1.0-0: DirectFB fails to start (Could not initialize 'system' core!) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 493899: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493899 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: libdirectfb-1.0-0 Version: 1.0.1-10 Severity: grave Justification: renders package unusable While trying to use libdirectfb-1.0-0, I encountered a big problem that I resolved by disabling 92_reopen_console.patch. The problem occurs when I try to use mplayer (both using sdl or directfb as video output driver) or any directfb aware executable. ,[ dfbinfo using directfb-1.0.1-10 ] | | ===| DirectFB 1.0.1 |=== | (c) 2001-2007 The DirectFB Organization (directfb.org) | (c) 2000-2004 Convergence (integrated media) GmbH | | | (*) DirectFB/Core: Single Application Core. (2008-07-22 17:13) | (*) Direct/Memcpy: Using libc memcpy() | (!) DirectFB/Core: Could not initialize 'system' core! | -- Access denied! | (#) DirectFBError [DirectFBCreate() failed]: Access denied! ` I tried to enable DirectFB's debug output but it wasn't useful. I'm available if you need more info. Thanks, Olivier; -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.26-1-amd64 (SMP w/1 CPU core) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages libdirectfb-1.0-0 depends on: ii libc6 2.7-13 GNU C Library: Shared libraries ii libsysfs2 2.1.0-4interface library to sysfs ii libts-0.0-0 1.0-4 touch screen library libdirectfb-1.0-0 recommends no packages. libdirectfb-1.0-0 suggests no packages. -- no debconf information ---End Message--- ---BeginMessage--- Source: directfb Source-Version: 1.0.1-11 We believe that the bug you reported is fixed in the latest version of directfb, which is due to be installed in the Debian FTP archive: directfb_1.0.1-11.diff.gz to pool/main/d/directfb/directfb_1.0.1-11.diff.gz directfb_1.0.1-11.dsc to pool/main/d/directfb/directfb_1.0.1-11.dsc libdirectfb-1.0-0-udeb_1.0.1-11_amd64.udeb to pool/main/d/directfb/libdirectfb-1.0-0-udeb_1.0.1-11_amd64.udeb libdirectfb-1.0-0_1.0.1-11_amd64.deb to pool/main/d/directfb/libdirectfb-1.0-0_1.0.1-11_amd64.deb libdirectfb-bin-udeb_1.0.1-11_amd64.udeb to pool/main/d/directfb/libdirectfb-bin-udeb_1.0.1-11_amd64.udeb libdirectfb-bin_1.0.1-11_amd64.deb to pool/main/d/directfb/libdirectfb-bin_1.0.1-11_amd64.deb libdirectfb-dev_1.0.1-11_amd64.deb to pool/main/d/directfb/libdirectfb-dev_1.0.1-11_amd64.deb libdirectfb-extra_1.0.1-11_amd64.deb to pool/main/d/directfb/libdirectfb-extra_1.0.1-11_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Fathi Boudra [EMAIL PROTECTED] (supplier of updated directfb package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 17 Aug 2008 16:42:54 +0200 Source: directfb Binary: libdirectfb-1.0-0 libdirectfb-1.0-0-udeb libdirectfb-bin libdirectfb-bin-udeb libdirectfb-extra libdirectfb-dev Architecture: source amd64 Version: 1.0.1-11 Distribution: unstable Urgency: low Maintainer: Fathi Boudra [EMAIL PROTECTED] Changed-By: Fathi Boudra [EMAIL PROTECTED] Description: libdirectfb-1.0-0 - direct frame buffer graphics - shared libraries libdirectfb-1.0-0-udeb - direct frame buffer graphics - shared libraries (udeb) libdirectfb-bin - direct frame buffer graphics - binaries libdirectfb-bin-udeb - direct frame buffer graphics - binaries (udeb) libdirectfb-dev - direct frame buffer graphics library - development files libdirectfb-extra - direct frame buffer graphics - extra providers
Bug#495359: perl is in an unusable state during etch-lenny dist-upgrade and breaks the upgrade process
On Sat, Aug 16, 2008 at 09:21:54PM +0300, Niko Tyni wrote: First, what happens here is that the 'old-prerm upgrade' invocation of gs-common invokes /usr/bin/defoma-app, which needs File::Copy from perl-modules. The new perl-modules and perl packages have been unpacked but not configured yet, so their dependencies are not guaranteed to be satisfied (and indeed, the critical perl - perl-base dependency isn't.) well, there are some other cases related to debsums in other maintainer scripts (in one of my experiments, i simply disabled the error in gs-common by letting the prerm in /var/lib/dpkg/config directly exit with exitcode 0. Quoting Brendan O'Dea in #479711, in the Locale::Gettext problem context: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=479711#120 One issue which should be highlighted is that no such guarantees are made *during* the upgrade process. In fact Debian policy is pretty explicit as to what is valid for maintainer scripts to invoke: either the package providing the binary must be flagged as Essential (in which case there are additional requirements placed on the package such that it is functional even when not configured) or a Pre-Dependency must be declared (ensuring that dpkg with not only unpack, but will configure said dependency package before attempting to configure the dependant). (The perl-base package is the only Essential:yes one built from the perl source.) That said, I can't find this explicit explanation in the policy myself. Section 7.2 looks like the place, but these come closest: http://www.debian.org/doc/debian-policy/ch-relationships.html#s-binarydeps The Depends field should also be used if the postinst, prerm or postrm scripts require the package to be present in order to run. [...] Pre-Depends should be used sparingly, preferably only by packages whose premature upgrade or installation would hamper the ability of the system to continue with any upgrade that might be in progress. Pre-Depends are also required if the preinst script depends on the named package. It is best to avoid this situation if possible. well, then how to solve the problems of maintainer scripts using the more complex debian helpers like defoma/debsums? make each package pre-depend on the corresponding package and them in turn on perl? this is AFAIK impossible and clutters the archive by big amounts... so one idea would be to change the maintainer script interface of defoma/debsums/whatever to only use modules contained in perl-base. but then, in turn: do we now need release notes to manually update half of the system before running aptitude dist-upgrade? i think this is most easily solved with proper dependencies of the perl packages, maybe by introducing a conflicts with a too-old perl-base package. Even if this is deemed to be a policy violation by the gs-common package, I suspect it's not the only one, and finding them all is non-trivial. and AFAIK this has to be solved before the lenny release. I'll have to think a bit about any possibilities of solving this with Pre-Dependencies. I also wonder if using Conflicts: perl-base ( 5.10.0) or something like that might work. Pre-Dependency together with conflicts worked a few years ago when updating a a huge amount of machines from woody to sarge; for this, I prepared locally patched perl packages with the following changes: * perl-base: - Conflicts: perl ( 5.8.0-1), perl-modules ( 5.8.0-1) * perl-modules: - unchanged * perl: - moved from Depends: to Pre-Depends: perl-base (= 5.8.4-5.1) this combination forced apt to update the perl packages in the right order, meaning the order to keep all three packages consistent which fixed similar problems at that time. p.s.: this change was rejected at that time with the argument you quoted from Brendan O'Dea, i.e. that it is basically the mainainer scripts' fault and not perls. I know that a pre-depends is a quite strong measure, but in this case it is AFAIK justified... Merging perl-base, perl and perl-modules seems like a very intrusive change at this stage of the release cycle. yes, and also quite improbable to be accepted by the embedded crowd... difficulty is, that this problem is seen very rarely during the normal testing cycle and it can be observed most often when it is too late: when people are already upgrading from old-/stable to testing/stable. Please send the result of 'dpkg -l list' (it chops off long columns if outputting to the terminal) in the initial state with Etch installed, so I can set up a similar chroot and try to reproduce it. should be attached to this mail :) you may have problems finding some of the packages, i have backported and packaged from scratch a lot of stuff on my own... -- c u henning ruprecht-backup-20080813-2.dpkg-l.gz Description: Binary data
Bug#495554: imp4: It can be use to inject email thought Imp
Package: imp4 Version: 4.1.3-4 Severity: grave Tags: security Justification: user security hole Imp4 allows spammer to inject email throught it with out login. this is an example: 80.30.19.50 - - [11/Aug/2008:19:26:31 -0400] GET /imp/expand.php HTTP/1.1 200 243 http://mail.domain.tld/imp/compose.php?thismailbox=INBOXuniq=1218497650159; Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322;.NET CLR 2.0.50727) 80.30.19.50 - - [11/Aug/2008:19:31:13 -0400] GET /imp/expand.php?actionID=expand_addressesfield_name=bccfield_value=-shayna-maydle-%40excite.com%2C%2005%40hotmail.com%2C%20100.218017%40germanynet.de%2C%2012645%40msn.com%2C%201633%40hotmail.com%2C%201964%40yahoo.com%2C%201%401.com%2C%201I%40HOTMAIL.COM%2C%201ofthegoodguys%40go.com%2C%201wmrnhbus%40treddmd.com%2C%20202-0549%40mcimail.com%2C%2025%40earthlink.net%2C%2025%40yahoo.com%2C%202manyids%40corvettefun.com%2C%2031299%40yahoo.com%2C%20373%40hotmail.com%2C%2039ya7%40rocketmail.com%2C%203par%40msn.com%2C%2041392%4041392.br%2C%204kerrs%40cableregina.com%2C%20514alsoo%40alatavissta.com%2C%20517%40yahoo.com%2C%205402%40student-mail.jsu.edu%2C%2078019%40udel.edu%2C%207m%40work.com%2C%208adgihf%40maill.com%2C%208gk%40aquaed.de%2C%208rlkges%40usaa.com%2C%209loucke%40fontbonne.edu%2C%20ANNBRUCE%40SCCOAST.NET%2C%20AT..toyotaregister%40hotmail.com%2C%20Amanda090%40webtv.co%2C%20BASkeen27%40aol.com%2C%20BSGReunion58%40aol.com%2C%20BThomas688%40aol.com%2C%20Bama%40yahoo.com%2C%20Bckboys3%40aol.com%2C%20Beans%40aol.com%2C%20Benjstr%40prodigy.net%2C%20BethGerace%40aol.com%2C%20Bhand%40aol.com%2C%20Budda216%40aol.com%2C%20CBRAD1546%40AOL.COM%2C%20CDCA%40WANADOO.FR%2C%20CJM1993%40aol.com%2C%20CPANOT%40AOL.COM%2C%20CUDAGRL040872%40YAHOO.COM%2C%20DC1000%40AOL.COM%2C%20DGUMBITA%40STARPOWER.NET%2C%20Darksaber76%40hotmail.com%2C%20Datkison%40yahoo.com%2C%20Discolady1349%40cs.com%2C%20EDMR2%40WEBTV.NET%2C%20Esgstone37%40aol.Com%2C%20GARYOLSEN%40AOL.COM%2C%20GSLATER%40IPA.NET%2C%20GSRcivic7%40hotmail.com%2C%20GaMaCBaker%40cs.comWent%2C%20GoLela%40aol.com%2C%20Gsmall1835%40aol.com%2C%20HOTSUSIE%40VERIZON.NET%2C%20Hecsr5%40hotmail.com%2C%20Hermelindoperez%40msn.com%2C%20HlthSolutn%40aol.com%2C%20HolJL%40aol.com%2C%20Hotheat100%40aol.com%2C%20Hovindfam%40aol.com%2C%20JAMMYDODGERS2000%40HOTMAIL.COM%2C%20JEDRN67%40aol.com%2C%20JMRIVERA0469%40BELLSOUTH.NET%2C%20JPYTHON%40WEBTV.NET%2C%20JWeiner576%40aol.com%2C%20Jabbajar%40yahoo.com%2C%20Jadim274%40aol.com%2C%20JaysAccounts%40yahoo.com%2C%20John.p.sousa%40citigroup.com%2C%20JohnanaSyl%40pronet.ne HTTP/1.1 200 1106 - Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322; .NET CLR 2.0.50727) So i cannot block expand.php because this is use by the user that log into the systen to send email. but besides the spammers are abusing the system. Someone with this problem? Regards. Michael.- -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-4-686 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495555: copyright-file and README.Debian are practically useless
Package: unicode Version: 0.9 Severity: serious This is weird: Normally /usr/share/doc/packagename/copyright tells, where pristine source-code was downloaded from, but in this package it is not said. -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (1100, 'testing'), (990, 'stable'), (500, 'testing-proposed-updates'), (500, 'proposed-updates'), (101, 'testing'), (99, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core) Locale: LANG=fi_FI.utf8, LC_CTYPE=fi_FI.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages unicode depends on: ii python2.5.2-2An interactive high-level object-o unicode recommends no packages. Versions of packages unicode suggests: ii console-data 2:1.07-5 keymaps, fonts, charset maps, fall ii perl-modules 5.10.0-13 Core Perl modules ii unicode-data 5.1.0-1Property data for the Unicode char -- no debconf information -- Juhapekka naula Tolvanen * http colon slash slash iki dot fi slash juhtolv Boku wa ongakuka dentaku katate ni. Tashitari. Hiitari. Sousa shite. Sakkyoku suru. Kono botan oseba ongaku kanaderu. Kraftwerk -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495188: kde4 currently uninstallable
aptitude -t experimental install kde4 fails because kdebase-workspace cannot be installed. Aptitude is looking for version 4:4.1.0-2, but for i386, the highest version in experimental is still only 4:4.1.0-1. My options appear to be: 1. Build it myself, from the source package 2. Wait for 4:4.1.0-2 to be uploaded. Tim Fairbank -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495554: [pkg-horde] Bug#495554: imp4: It can be use to inject email thought Imp
Hello, On Mon, Aug 18, 2008 at 10:39:59AM -0400, Michael wrote: Imp4 allows spammer to inject email throught it with out login. this is an example: 80.30.19.50 - - [11/Aug/2008:19:26:31 -0400] GET /imp/expand.php HTTP/1.1 200 243 http://mail.domain.tld/imp/compose.php?thismailbox=INBOXuniq=1218497650159; Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322;.NET CLR 2.0.50727) 80.30.19.50 - - [11/Aug/2008:19:31:13 -0400] GET /imp/expand.php?actionID=expand_addressesfield_name=bccfield_value=-shayna-maydle-%40excite.com%2C%2005%40hotmail.com%2C%20100.218017%40germanynet.de%2C%2012645%40msn.com%2C%201633%40hotmail.com%2C%201964%40yahoo.com%2C%201%401.com%2C%201I%40HOTMAIL.COM%2C%201ofthegoodguys%40go.com%2C%201wmrnhbus%40treddmd.com%2C%20202-0549%40mcimail.com%2C%2025%40earthlink.net%2C%2025%40yahoo.com%2C%202manyids%40corvettefun.com%2C%2031299%40yahoo.com%2C%20373%40hotmail.com%2C%2039ya7%40rocketmail.com%2C%203par%40msn.com%2C%2041392%4041392.br%2C%204kerrs%40cableregina.com%2C%20514alsoo%40alatavissta.com%2C%20517%40yahoo.com%2C%205402%40student-mail.jsu.edu%2C%2078019%40udel.edu%2C%207m%40work.com%2C%208adgihf%40maill.com%2C%208gk%40aquaed.de%2C%208rlkges%40usaa.com%2C%209loucke%40fontbonne.edu%2C%20ANNBRUCE%40SCCOAST.NET%2C%20AT..toyotaregister%40hotmail.com%2C%20Amanda090%40webtv.co%2C%20BASkeen27%40aol.com%2C%20BSGReunion58%40aol.com%2C%20BThomas688%40aol.com%2C%20Bama%40yahoo.com%2C%20Bckboys3%40aol.com%2C%20Beans%40aol.com%2C%20Benjstr%40prodigy.net%2C%20BethGerace%40aol.com%2C%20Bhand%40aol.com%2C%20Budda216%40aol.com%2C%20CBRAD1546%40AOL.COM%2C%20CDCA%40WANADOO.FR%2C%20CJM1993%40aol.com%2C%20CPANOT%40AOL.COM%2C%20CUDAGRL040872%40YAHOO.COM%2C%20DC1000%40AOL.COM%2C%20DGUMBITA%40STARPOWER.NET%2C%20Darksaber76%40hotmail.com%2C%20Datkison%40yahoo.com%2C%20Discolady1349%40cs.com%2C%20EDMR2%40WEBTV.NET%2C%20Esgstone37%40aol.Com%2C%20GARYOLSEN%40AOL.COM%2C%20GSLATER%40IPA.NET%2C%20GSRcivic7%40hotmail.com%2C%20GaMaCBaker%40cs.comWent%2C%20GoLela%40aol.com%2C%20Gsmall1835%40aol.com%2C%20HOTSUSIE%40VERIZON.NET%2C%20Hecsr5%40hotmail.com%2C%20Hermelindoperez%40msn.com%2C%20HlthSolutn%40aol.com%2C%20HolJL%40aol.com%2C%20Hotheat100%40aol.com%2C%20Hovindfam%40aol.com%2C%20JAMMYDODGERS2000%40HOTMAIL.COM%2C%20JEDRN67%40aol.com%2C%20JMRIVERA0469%40BELLSOUTH.NET%2C%20JPYTHON%40WEBTV.NET%2C%20JWeiner576%40aol.com%2C%20Jabbajar%40yahoo.com%2C%20Jadim274%40aol.com%2C%20JaysAccounts%40yahoo.com%2C%20John.p.sousa%40citigroup.com%2C%20JohnanaSyl%40pronet.ne HTTP/1.1 200 1106 - Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322; .NET CLR 2.0.50727) So i cannot block expand.php because this is use by the user that log into the systen to send email. but besides the spammers are abusing the system. Thanks for your report. Are you sure spammers don't use a stolen login/password? Are you sure mails are really sent? Regards, -- Gregory Colpart [EMAIL PROTECTED] GnuPG:1024D/C1027A0E Evolix - Informatique et Logiciels Libres http://www.evolix.fr/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495554: [pkg-horde] Bug#495554: imp4: It can be use to inject email thought Imp
On Mon, 2008-08-18 at 16:36 +0200, Gregory Colpart wrote: Hello, On Mon, Aug 18, 2008 at 10:39:59AM -0400, Michael wrote: Imp4 allows spammer to inject email throught it with out login. this is an example: 80.30.19.50 - - [11/Aug/2008:19:26:31 -0400] GET /imp/expand.php HTTP/1.1 200 243 http://mail.domain.tld/imp/compose.php?thismailbox=INBOXuniq=1218497650159; Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322;.NET CLR 2.0.50727) 80.30.19.50 - - [11/Aug/2008:19:31:13 -0400] GET /imp/expand.php?actionID=expand_addressesfield_name=bccfield_value=-shayna-maydle-%40excite.com%2C%2005%40hotmail.com%2C%20100.218017%40germanynet.de%2C%2012645%40msn.com%2C%201633%40hotmail.com%2C%201964%40yahoo.com%2C%201%401.com%2C%201I%40HOTMAIL.COM%2C%201ofthegoodguys%40go.com%2C%201wmrnhbus%40treddmd.com%2C%20202-0549%40mcimail.com%2C%2025%40earthlink.net%2C%2025%40yahoo.com%2C%202manyids%40corvettefun.com%2C%2031299%40yahoo.com%2C%20373%40hotmail.com%2C%2039ya7%40rocketmail.com%2C%203par%40msn.com%2C%2041392%4041392.br%2C%204kerrs%40cableregina.com%2C%20514alsoo%40alatavissta.com%2C%20517%40yahoo.com%2C%205402%40student-mail.jsu.edu%2C%2078019%40udel.edu%2C%207m%40work.com%2C%208adgihf%40maill.com%2C%208gk%40aquaed.de%2C%208rlkges%40usaa.com%2C%209loucke%40fontbonne.edu%2C%20ANNBRUCE%40SCCOAST.NET%2C%20AT..toyotaregister%40hotmail.com%2C%20Amanda090%40webtv.co%2C%20BASkeen27%40aol.com%2C%20BSGReunion58%40aol.com%2C%20BThomas688%40aol.com%2C%20Bama%40yahoo.com%2C%20Bckboys3%40aol.com%2C%20Beans%40aol.com%2C%20Benjstr%40prodigy.net%2C%20BethGerace%40aol.com%2C%20Bhand%40aol.com%2C%20Budda216%40aol.com%2C%20CBRAD1546%40AOL.COM%2C%20CDCA%40WANADOO.FR%2C%20CJM1993%40aol.com%2C%20CPANOT%40AOL.COM%2C%20CUDAGRL040872%40YAHOO.COM%2C%20DC1000%40AOL.COM%2C%20DGUMBITA%40STARPOWER.NET%2C%20Darksaber76%40hotmail.com%2C%20Datkison%40yahoo.com%2C%20Discolady1349%40cs.com%2C%20EDMR2%40WEBTV.NET%2C%20Esgstone37%40aol.Com%2C%20GARYOLSEN%40AOL.COM%2C%20GSLATER%40IPA.NET%2C%20GSRcivic7%40hotmail.com%2C%20GaMaCBaker%40cs.comWent%2C%20GoLela%40aol.com%2C%20Gsmall1835%40aol.com%2C%20HOTSUSIE%40VERIZON.NET%2C%20Hecsr5%40hotmail.com%2C%20Hermelindoperez%40msn.com%2C%20HlthSolutn%40aol.com%2C%20HolJL%40aol.com%2C%20Hotheat100%40aol.com%2C%20Hovindfam%40aol.com%2C%20JAMMYDODGERS2000%40HOTMAIL.COM%2C%20JEDRN67%40aol.com%2C%20JMRIVERA0469%40BELLSOUTH.NET%2C%20JPYTHON%40WEBTV.NET%2C%20JWeiner576%40aol.com%2C%20Jabbajar%40yahoo.com%2C%20Jadim274%40aol.com%2C%20JaysAccounts%40yahoo.com%2C%20John.p.sousa%40citigroup.com%2C%20JohnanaSyl%40pronet.ne HTTP/1.1 200 1106 - Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322; .NET CLR 2.0.50727) So i cannot block expand.php because this is use by the user that log into the systen to send email. but besides the spammers are abusing the system. Thanks for your report. Thanks to you... Are you sure spammers don't use a stolen login/password? Ohhh, yea!, so much. Are you sure mails are really sent? Of course, i already change twice the Outside Ip of my mail server. After that the domain (destination) hotmail.com, yahoo.com and so many others block my IP. Regards! Michael.- Regards, -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495554: [pkg-horde] Bug#495554: Bug#495554: imp4: It can be use to inject email thought Imp
On Mon, Aug 18, 2008 at 11:38:00AM -0400, Michael Fernández M wrote: Are you sure spammers don't use a stolen login/password? Ohhh, yea!, so much. I'm sorry to insist but are you *really* sure? Because here[*] there was a similar question and upstream author said it's from a regular user. Could you try to track him in horde's logs? Could you also give the version of your horde3 package? [*]http://marc.info/?l=hordem=120119991901767w=2 Regards, -- Gregory Colpart [EMAIL PROTECTED] GnuPG:1024D/C1027A0E Evolix - Informatique et Logiciels Libres http://www.evolix.fr/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495562: btrfs-tools: immature software not fit for stable release
Package: btrfs-tools Severity: critical Justification: causes serious data loss it would serve our users poorly to include support for a filesystem that does not pretend to have a stable on-disc format yet. please do not relase this as stable. /andreas -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.25-2-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#494514: insserv: Test suite fail on alpha
On Mon, Aug 18, 2008 at 08:46:08AM +0200, Petter Reinholdtsen wrote: [Steve Langasek] In this case, NFS... Right. So ext3 and NFS should be ok. :) I can try against a different filesystem tomorrow if you like. If you happen to know what file system is used on the autobuilder, or if ext2/ext3 is not the default file system on alpha, it would be useful to have a test with those file systems as well. If not, it will be a shot in the dark, and I have no idea what file system to suggest. ext3 is the default filesystem on all archs, so no, I don't know what's going on there. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. Ubuntu Developerhttp://www.debian.org/ [EMAIL PROTECTED] [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: your mail
Processing commands for [EMAIL PROTECTED]: severity 495562 important Bug#495562: btrfs-tools: immature software not fit for stable release Severity set to `important' from `critical' End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495565: emacs22-nox: Missing Files :: Installation Fails on ARM
Package: emacs22-nox Version: 22.2+2-3 Severity: grave Justification: renders package unusable Trying to run apt-get install emacs22-nox, I get: Reading package lists... Building dependency tree... Reading state information... Suggested packages: emacs22-common-non-dfsg The following NEW packages will be installed: emacs22-nox 0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. Need to get 2374kB of archives. After this operation, 7336kB of additional disk space will be used. Get:1 http://ftp2.de.debian.org unstable/main emacs22-nox 22.2+2-3 [2374kB] Fetched 2374kB in 5s (416kB/s) Selecting previously deselected package emacs22-nox. (Reading database ... 15474 files and directories currently installed.) Unpacking emacs22-nox (from .../emacs22-nox_22.2+2-3_armel.deb) ... Setting up emacs22-nox (22.2+2-3) ... emacs-install emacs22 emacsen-common: Handling install of emacsen flavor emacs22 emacsen-common: byte-compiling for emacs22 cp: cannot create regular file `/usr/share/emacs22/site-lisp/debian-startup.el': No such file or directory emacs-install: /usr/lib/emacsen-common/packages/install/emacsen-common emacs22 failed at /usr/lib/emacsen-common/emacs-install line 28, TSORT line 1. dpkg: error processing emacs22-nox (--configure): subprocess post-installation script returned error exit status 1 Errors were encountered while processing: emacs22-nox E: Sub-process /usr/bin/dpkg returned an error code (1) -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: armel (armv4tl) Kernel: Linux 2.6.24 (PREEMPT) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/bash Versions of packages emacs22-nox depends on: ii emacs22-bin-common22.2+2-3 The GNU Emacs editor's shared, arc ii libc6 2.7-13 GNU C Library: Shared libraries ii libncurses5 5.6+20080804-1 shared libraries for terminal hand emacs22-nox recommends no packages. Versions of packages emacs22-nox suggests: pn emacs22-common-non-dfsg none (no description available) -- no debconf information -- Esben Stien is [EMAIL PROTECTED] s a http://www. s tn m irc://irc. b - i . e/%23contact sip:b0ef@ e e jid:b0ef@n n -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495184: Info received (Bug#495184: wodim: Fails, then asks me to use the option I've already given)
Cdrecord worked first time, clearly wodim is very broken! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#494514: insserv: Test suite fail on alpha
Hi Petter and Steve, On Monday 18 August 2008 16:46:08 Petter Reinholdtsen wrote: [Steve Langasek] In this case, NFS... Right. So ext3 and NFS should be ok. :) I can try against a different filesystem tomorrow if you like. If you happen to know what file system is used on the autobuilder, or if ext2/ext3 is not the default file system on alpha, it would be useful to have a test with those file systems as well. If not, it will be a shot in the dark, and I have no idea what file system to suggest. I think insserv can handle this situation without disabling optimisations, the problem seems to concern the use of an underterministic directory sequence, as returned by a while readdir() loop, when scanning the init.d/ directory to load LSB init info. The fact that the problem was discovered with a symlink test, is I think interesting, but not neccessarily an indication of some lower level problem with kernel / filesystem interaction. The problem can be reproduced with a more simple test too: --- test_deterministic_order() { echo echo info: test two or more initscripts providing same facility, making sure echo info: that the first script can be registered with insserv, but others fail. echo initdir_purge addscript abc 'EOF' || true ### BEGIN INIT INFO # Provides: service # Required-Start: # Required-Stop: # Default-Start: S # Default-Stop: ### END INIT INFO EOF addscript xyz 'EOF' || true ### BEGIN INIT INFO # Provides: service # Required-Start: # Required-Stop: # Default-Start: S # Default-Stop: ### END INIT INFO EOF addscript hjk 'EOF' || true ### BEGIN INIT INFO # Provides: service # Required-Start: # Required-Stop: # Default-Start: S # Default-Stop: ### END INIT INFO EOF insserv_reg xyz || true insserv_reg hjk || true insserv_reg abc || true list_rclinks check_script_present S xyz check_script_not_present S abc check_script_not_present S hjk } --- The above test will always fail, but differently when run on different filesystems (eg. ext3 vs tmpfs). It seems the information that readdir(3) returns from a filesystem is not always the same. insserv could defend against this behaviour, by ensuring that the script being registered is parsed first, followed by all other scripts. I've put together a hack to do just that, it is attached. WIll commit it to the packaging SVN with test case for further discussions. Thanks, Kel. --- --- a/insserv.c +++ b/insserv.c @@ -2238,6 +2238,7 @@ boolean del = false; boolean defaults = false; boolean ignore = false; +boolean loadarg = argc; myname = basename(*argv); @@ -2490,17 +2491,45 @@ /* * Scan now all scripts found in the init.d/ directory */ -while ((d = readdir(initdir)) != (struct dirent*)0) { - const boolean isarg = chkfor(d-d_name, argv, argc); +for (;;) { service_t * service = (service_t*)0; char * token; char * begin = (char*)0;/* hold start pointer of strings handled by strsep() */ boolean hard = false; + boolean isarg = false; uchar lsb = 0; #if defined(DEBUG) (DEBUG 0) int nobug = 0; #endif + if ((d = readdir(initdir)) == (struct dirent*)0) { + /* +* If first script in argument list was loaded in advance, then +* rewind the init.d/ directory stream and attempt to load all +* other scripts. +*/ + if (loadarg) { + loadarg = false; + rewinddir(initdir); + continue; + } + break; + } + + isarg = chkfor(d-d_name, argv, argc); + + /* +* Load first script in argument list before all other scripts. This +* avoids problems with loading services in underterministic sequence +* returned by readdir(3). +*/ + if (loadarg !isarg) + continue; + else if (loadarg isarg (curr_argc != 0)) + continue; + else if (!loadarg isarg (curr_argc == 0)) + continue; + if (*d-d_name == '.') continue; errno = 0; --- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#495565: emacs22-nox: Missing Files :: Installation Fails on ARM
Processing commands for [EMAIL PROTECTED]: severity 495565 normal Bug#495565: emacs22-nox: Missing Files :: Installation Fails on ARM Severity set to `normal' from `grave' tags 495565 + moreinfo Bug#495565: emacs22-nox: Missing Files :: Installation Fails on ARM There were no tags set. Tags added: moreinfo thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495565: emacs22-nox: Missing Files :: Installation Fails on ARM
severity 495565 normal tags 495565 + moreinfo thanks On 2008-08-18 20:44 +0200, Esben Stien wrote: Package: emacs22-nox Version: 22.2+2-3 Severity: grave Justification: renders package unusable Hardly. You're the first to report this, and this package has been installed successfully on hundreds of machines. Something is broken on your system. Trying to run apt-get install emacs22-nox, I get: Reading package lists... Building dependency tree... Reading state information... Suggested packages: emacs22-common-non-dfsg The following NEW packages will be installed: emacs22-nox 0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. Need to get 2374kB of archives. After this operation, 7336kB of additional disk space will be used. Get:1 http://ftp2.de.debian.org unstable/main emacs22-nox 22.2+2-3 [2374kB] Fetched 2374kB in 5s (416kB/s) Selecting previously deselected package emacs22-nox. (Reading database ... 15474 files and directories currently installed.) Unpacking emacs22-nox (from .../emacs22-nox_22.2+2-3_armel.deb) ... Setting up emacs22-nox (22.2+2-3) ... emacs-install emacs22 emacsen-common: Handling install of emacsen flavor emacs22 emacsen-common: byte-compiling for emacs22 cp: cannot create regular file `/usr/share/emacs22/site-lisp/debian-startup.el': No such file or directory The /usr/share/emacs22/site-lisp directory should exist, as it is part of emacs22-common on which emacs22-nox indirectly depends. Does it exist on your system? And does /usr/share/emacs/site-lisp/debian-startup.el exist? Sven -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495188: kde4 currently uninstallable
Le Monday 18 August 2008 16:16:07 Tim Fairbank, vous avez écrit : aptitude -t experimental install kde4 fails because kdebase-workspace cannot be installed. Aptitude is looking for version 4:4.1.0-2, but for i386, the highest version in experimental is still only 4:4.1.0-1. My options appear to be: 1. Build it myself, from the source package 2. Wait for 4:4.1.0-2 to be uploaded. Hello kdebase-workspace 4:4.1.0-2 has been uploaded for amd64 but not i386 yes. You have to wait a day or two for it to autobuild and be available. This is not a bug, please close it. Regards -- Xavier Vello -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#494031: [Pkg-scicomp-devel] Bug#494031: Bug#494031: paraview_3.2.3-2(sparc/unstable): FTBFS on sparc, bus error
Hi, the problem on sparc is this: (sid)[EMAIL PROTECTED]:~/paraview-3.2.2/obj-sparc-linux-gnu/bin$ ./H5detect /* Generated automatically by H5detect -- do not edit */ /* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * Copyright by the Board of Trustees of the University of Illinois. * * All rights reserved. * * * * This file is part of HDF5. The full HDF5 copyright notice, including * * terms governing use, modification, and redistribution, is contained in* * the files COPYING and Copyright.html. COPYING can be found at the root * * of the source code distribution tree; Copyright.html can be found at the * * root level of an installed copy of the electronic HDF5 document set and * * is linked from the top-level documents page. It can also be found at * * http://hdf.ncsa.uiuc.edu/HDF5/doc/Copyright.html. If you do not have * * access to either file, you may request a copy from [EMAIL PROTECTED] * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * Created: Aug 18, 2008 * Ondrej Certik [EMAIL PROTECTED] * * Purpose: This machine-generated source code contains * information about the various integer and * floating point numeric formats found on this * architecture. The parameters below should be * checked carefully and errors reported to the * HDF5 maintainer. * * Each of the numeric formats listed below are * printed from most significant bit to least * significant bit even though the actual bytes * might be stored in a different order in * memory. The integers above each binary byte * indicate the relative order of the bytes in * memory; little-endian machines have * decreasing numbers while big-endian machines * have increasing numbers. * * The fields of the numbers are printed as * letters with `S' for the mantissa sign bit, * `M' for the mantissa magnitude, and `E' for * the exponent. The exponent has an associated * bias which can be subtracted to find the * true exponent. The radix point is assumed * to be before the first `M' bit. Any bit * of a floating-point value not falling into one * of these categories is printed as a question * mark. Bits of integer types are printed as * `I' for 2's complement and `U' for magnitude. * * If the most significant bit of the normalized * mantissa (always a `1' except for `0.0') is * not stored then an `implicit=yes' appears * under the field description. In thie case, * the radix point is still assumed to be * before the first `M' but after the implicit * bit. * * Modifications: * * DO NOT MAKE MODIFICATIONS TO THIS FILE! * It was generated by code in `H5detect.c'. * *- */ Bus error (sid)[EMAIL PROTECTED]:~/paraview-3.2.2/obj-sparc-linux-gnu/bin$ So this should not happen. Now we need to debug this program to figure out what went wrong. Ondrej -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495333: A possible misunderstanding
I believe that the mozilla-plugin-gnash package should depend on a package which provides the /usr/lib/mozilla/plugins directory. I am not sure if this is the correct fix. I suspect it is better to include the directory in the package itself. Maybe I couldn't express my thoughts clearly. What I meant was to have a package named, say, mozilla-plugins-common which provides the /usr/lib/mozilla/plugins directory, and have all packages which provide Mozilla plugins depend on this new package. I proposed this because the mozilla-plugin-gnash and swfdec-mozilla packages no longer directly provide files in the /usr/lib/mozilla/plugins directory. Instead, during installation they utilize the alternatives system to create the symlink /usr/lib/mozilla/plugins/flash-mozilla.so which (via /etc/alternatives/flash-mozilla.so) points to the preferred flash-decoder plugin. However, you are probably right; it would be easier and simpler to include that directory in the aforementioned packages instead of having a package for a directory. [snip] Happy hacking, -- Perre Reinholdtsen Regards, M. Vefa Bıçakcı -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#494677: Freeze exception for libapache2-mod-perl2/2.0.4-2
* Niko Tyni [Mon, 18 Aug 2008 11:51:19 +0300]: Darn, it failed on all autobuilders because their sbuilds still suffer from #395271 I suppose we need to do something else to fix libapache2-mod-perl2. Any progress on this fix? As discussed in #494677, fixing the CGI.pm bug in perl-modules (tracked as #494679 and waiting for 5.10.0-13 to get in lenny first) should take care of the original non-deterministic libapache2-mod-perl2 FTBFS bug (#480154) still present in testing. I don't think we should work around the problem in libapache2-mod-perl2 at this point. Sigh, I even commented on 494679, but I failed to associate that with this thread. Sorry for the noise. Hope this clears it up :) Thank you. -- Adeodato Simó dato at net.com.org.es Debian Developer adeodato at debian.org As scarce as truth is, the supply has always been in excess of the demand. -- Josh Billings -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495574: Installation of swfdec-mozilla fails because there is no /usr/lib/mozilla/plugins
Package: swfdec-mozilla Version: 0.6.0-3 Severity: grave Justification: The package is not installable on systems which do not already have the /usr/lib/mozilla/plugins directory Hello, When I try to install the swfdec-mozilla package to my Debian Sid system, I get the following output: === 8 === # apt-get install swfdec-mozilla Reading package lists... Done Building dependency tree Reading state information... Done The following NEW packages will be installed: swfdec-mozilla 0 upgraded, 1 newly installed, 0 to remove and 7 not upgraded. Need to get 27.3kB of archives. After this operation, 77.8kB of additional disk space will be used. Get:1 http://ftp.us.debian.org sid/main swfdec-mozilla 0.6.0-3 [27.3kB] Fetched 27.3kB in 1s (18.2kB/s) Selecting previously deselected package swfdec-mozilla. (Reading database ... 187206 files and directories currently installed.) Unpacking swfdec-mozilla (from .../swfdec-mozilla_0.6.0-3_i386.deb) ... Setting up swfdec-mozilla (0.6.0-3) ... update-alternatives: unable to make /usr/lib/mozilla/plugins/flash-mozilla.so.dpkg-tmp a symlink to /etc/alternatives/flash-mozilla.so: No such file or directory dpkg: error processing swfdec-mozilla (--configure): subprocess post-installation script returned error exit status 2 Errors were encountered while processing: swfdec-mozilla E: Sub-process /usr/bin/dpkg returned an error code (1) === 8 === This happens because my system does not have the /usr/lib/mozilla/plugins directory. For the record, the mozilla-plugin-gnash package had a similar problem too. The maintainer of that package resolved this issue by including the mentioned directory in the package. Regards, M. Vefa Bıçakcı -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495359: perl is in an unusable state during etch-lenny dist-upgrade and breaks the upgrade process
On Mon, Aug 18, 2008 at 02:52:56PM +0200, Henning Glawe wrote: On Sat, Aug 16, 2008 at 09:21:54PM +0300, Niko Tyni wrote: Quoting Brendan O'Dea in #479711, in the Locale::Gettext problem context: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=479711#120 One issue which should be highlighted is that no such guarantees are made *during* the upgrade process. In fact Debian policy is pretty explicit as to what is valid for maintainer scripts to invoke: either the package providing the binary must be flagged as Essential (in which case there are additional requirements placed on the package such that it is functional even when not configured) or a Pre-Dependency must be declared (ensuring that dpkg with not only unpack, but will configure said dependency package before attempting to configure the dependant). (The perl-base package is the only Essential:yes one built from the perl source.) That said, I can't find this explicit explanation in the policy myself. Ah, I think I grok it now. Section 6.6 states that 'old-prerm upgrade' is run at the unpack phase, which makes it equivalent to the preinst case: non-essential dependencies must be Pre-Depended on. http://www.debian.org/doc/debian-policy/ch-maintainerscripts.html#s-unpackphase Actually, even an unversioned Pre-Dependency may not be enough when upgrading. Section 7.2: http://www.debian.org/doc/debian-policy/ch-relationships.html#s-binarydeps When a package declaring a pre-dependency is about to be unpacked the pre-dependency can be satisfied if the depended-on package is either fully configured, or even if the depended-on package(s) are only unpacked or half-configured, provided that they have been configured correctly at some point in the past (and not removed or partially removed since). In this case, both the previously-configured and currently unpacked or half-configured versions must satisfy any version clause in the Pre-Depends field. So even an unversioned 'Pre-Depends: perl-modules' wouldn't be enough... well, then how to solve the problems of maintainer scripts using the more complex debian helpers like defoma/debsums? make each package pre-depend on the corresponding package and them in turn on perl? My interpretation is that 'prerm upgrade' may only rely on essential packages or carefully versioned pre-dependencies being functional, Just to be sure: this does not apply to the configure stage, the postinst script can rely on the dependencies being fully configured (module circular dependencies). this is AFAIK impossible and clutters the archive by big amounts... so one idea would be to change the maintainer script interface of defoma/debsums/whatever to only use modules contained in perl-base. but then, in turn: do we now need release notes to manually update half of the system before running aptitude dist-upgrade? There's still a way out when 'old-prerm upgrade' fails: dpkg then calls 'new-prerm failed-upgrade' that can fix the situation. i think this is most easily solved with proper dependencies of the perl packages, maybe by introducing a conflicts with a too-old perl-base package. For reference, this was last discussed in #278495 / #279232 when the 5.6 - 5.8 transition was taking place. The context was doc-base and /usr/sbin/install-docs, but much of the discussion seems valid here too. Particularly this comment from Brendan: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=279232#22 Even having perl-modules and perl pre-depend on perl-base doesn't necessarily fix the problem since while that would ensure that perl-base was upgraded before either of those modules, there's no guarantee that other packages wouldn't be pre-configured/configured between perl-base and perl, perl-modules. So while this kind of fixes may work for most cases, there are no guarantees and they may still break for some people. Even if this is deemed to be a policy violation by the gs-common package, I suspect it's not the only one, and finding them all is non-trivial. In light of the above, I think it is a policy violation and I don't really think we have much choice here. For the gs-common / defoma case, the way out would seem to be something like: - go through the packages depending on defoma in Etch, find broken prerm scripts and make sure they have equivalents in Lenny that survive 'failed-upgrade'. It may be possible to do most of this by changing /usr/bin/dh_installdefoma behaviour and binNMUing the packages, not sure about that. - remove all defoma-app invocations from the 'prerm upgrade' code paths in lenny so we don't hit this again in the future - (optionally) fix /usr/sbin/defoma-app in lenny to fail gracefully when its dependencies are unconfigured, particularly when File::Copy can't be found, to avoid the 'failed-upgrade' path if defoma happens to get upgraded first The debsums issue is quite different,
Bug#493573: Backtrace on 'hung' apache2 (while trying to stop service)
On Monday 18 August 2008, Chris Horn wrote: Chris Horn wrote: I'm not really a programmer (so this may be obvious from the backtrace), but disabling the PHP5 module completely solves the problem. Sorry for so much traffic, but I bring good news. I just upgraded all of my MySQL packages to 'testing' and now everything appears to work. ii libmysqlclient15off 5.0.51a-12 ok, thanks for the info. I forgot about that one. Then it's the same as #490859 but for php5-mysql and not libaprutil1. I think I will reassign this one to php and reopen the bug for libaprutil1. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: unarchiving 490859, reopening 490859, found 490859 in 1.2.12+dfsg-4 ..., cloning 493573 ...
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.10.35 unarchive 490859 Bug 490859 [libaprutil1] libaprutil1 Depends libmysqlclient15off = 5.0.27-1 is wrong Unarchived Bug 490859 reopen 490859 Bug#490859: libaprutil1 Depends libmysqlclient15off = 5.0.27-1 is wrong Bug reopened, originator not changed. found 490859 1.2.12+dfsg-4 Bug#490859: libaprutil1 Depends libmysqlclient15off = 5.0.27-1 is wrong Bug marked as found in version 1.2.12+dfsg-4. retitle 490859 libaprutil1 should depend on libmysqlclient15off = 5.0.51a Bug#490859: libaprutil1 Depends libmysqlclient15off = 5.0.27-1 is wrong Changed Bug title to `libaprutil1 should depend on libmysqlclient15off = 5.0.51a' from `libaprutil1 Depends libmysqlclient15off = 5.0.27-1 is wrong'. severity 493573 important Bug#493573: apache2: Restart and reload does not work Severity set to `important' from `grave' clone 493573 -1 Bug#493573: apache2: Restart and reload does not work Bug 493573 cloned as bug 495575. reassign -1 php5-mysql Bug#495575: apache2: Restart and reload does not work Bug reassigned from package `apache2.2-common' to `php5-mysql'. retitle -1 php5-mysql should depend on libmysqlclient15off = 5.0.51a Bug#495575: apache2: Restart and reload does not work Changed Bug title to `php5-mysql should depend on libmysqlclient15off = 5.0.51a' from `apache2: Restart and reload does not work'. block 493573 with -1 Bug#495575: php5-mysql should depend on libmysqlclient15off = 5.0.51a Bug#493573: apache2: Restart and reload does not work Was not blocked by any bugs. Blocking bugs of 493573 added: 495575 block 493573 with 490859 Bug#490859: libaprutil1 should depend on libmysqlclient15off = 5.0.51a Bug#493573: apache2: Restart and reload does not work Was blocked by: 495575 Blocking bugs of 493573 added: 490859 End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495585: vpnc: Does not work and ends my ethernet connection
Package: vpnc Version: 0.5.1r334-1 Severity: grave Justification: renders package unusable Hi, I tried to to connect to a CISCO VPN unsuccessfully (I can connect using CISCO VPNClient for Windows, so is not a authentification issue). Furthermore, after executing vpnc, my machine is taken off the web, and I have to execute ifdown/ifup to bring it back (receiving a 'SIOCDELRT: No such process' error on ifdown) Below is a log of what I do (Changing part of my local IP for YYY.YY. and part of the remote VPN for XXX.XXX for increased security:D) I'll be happy to supply whatever more info you need. Thank you very much! Patricio -- $ sudo vpnc VPNC started in background (pid: 11616)... $ ping www.google.com PING www.l.google.com (74.125.45.147) 56(84) bytes of data. ^C --- www.l.google.com ping statistics --- 8 packets transmitted, 0 received, 100% packet loss, time 7014ms $ sudo route Kernel IP routing table Destination Gateway Genmask Flags Metric RefUse Iface XXX.XXX.10.66 astro1.das.uchi 255.255.255.255 UGH 0 00 eth0 YYY.YY.9.0 * 255.255.255.128 U 0 00 eth0 default * 0.0.0.0 U 0 00 tun0 $ sudo ifconfig eth0 Link encap:Ethernet HWaddr 00:19:db:60:c5:0e inet addr:YYY.YY.9.56 Bcast:YYY.YY.9.255 Mask:255.255.255.128 inet6 addr: fe80::219:dbff:fe60:c50e/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:2338493 errors:0 dropped:0 overruns:0 frame:0 TX packets:1488041 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:1883137901 (1.7 GiB) TX bytes:854748727 (815.1 MiB) Interrupt:23 Base address:0x2000 loLink encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:797583 errors:0 dropped:0 overruns:0 frame:0 TX packets:797583 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:697599429 (665.2 MiB) TX bytes:697599429 (665.2 MiB) tun0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 inet addr:XXX.XXX.14.139 P-t-P:XXX.XXX.14.139 Mask:255.255.255.255 UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1412 Metric:1 RX packets:79 errors:0 dropped:0 overruns:0 frame:0 TX packets:136 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:500 RX bytes:9065 (8.8 KiB) TX bytes:20100 (19.6 KiB) $ sudo ifdown eth0 ; sudo ifup eth0 SIOCDELRT: No such process -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing'), (500, 'stable'), (50, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.25-2-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) Shell: /bin/sh linked to /bin/bash Versions of packages vpnc depends on: ii libc6 2.7-13 GNU C Library: Shared libraries ii libgcrypt11 1.4.1-1LGPL Crypto library - runtime libr Versions of packages vpnc recommends: ii iproute 20080725-2 networking and traffic control too ii resolvconf1.41 name server information handler vpnc suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495587: lsb-base: fix for killproc breaks many things
Package: lsb-base Version: 3.2-16 Severity: grave This change in lsb-base 3.2-16 * Fix behavior of killproc and pidofproc when no pidfile is passed in. breaks the stop action in many init scripts, as evidenced by bugs such as #494268 and #495437 coming in now. The consensus appears to be that using the --name option of start-stop-daemon is evil. I also don't understand what this fix is trying to accomplish. (No bug number is listed.) The LSB spec states: The start_daemon, killproc and pidofproc functions shall use the following algorithm for determining the status and the process identifiers of the specified program. 1. If the -p pidfile option is specified, and the named pidfile exists, a single line at the start of the pidfile shall be read. If this line contains one or more numeric values, separated by spaces, these values shall be used. If the -p pidfile option is specified and the named pidfile does not exist, the functions shall assume that the daemon is not running. 2. Otherwise, /var/run/basename.pid shall be read in a similar fashion. If this contains one or more numeric values on the first line, these values shall be used. Optionally, implementations may use unspecified additional methods to locate the process identifiers required. What the old version did is #2, and at least in case of dirmngr (bug #495437) this is exactly the behavior the init script wanted. The current version does something that is not in agreement with the LSB spec and breaks init scripts quite trivially. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#494268: at: diff for NMU version 3.1.10.2
Don't upload this yet. This is a bug in the lsb-base package. Many packages besides at are affected. (Basically all packages whose init script has the same base name as the daemon, which might be most.) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495581: Acknowledgement (Postfix local privilege escalation via hardlinked symlinks)
tags 495581 - lenny sid fixed 495581 2.5.2-2lenny1 fixed 495581 2.5.4-1 thanks -- Kevin Price http://www.kevin-price.de/ signature.asc Description: OpenPGP digital signature
Processed: Re: Bug#495581: Acknowledgement (Postfix local privilege escalation via hardlinked symlinks)
Processing commands for [EMAIL PROTECTED]: tags 495581 - lenny sid Bug#495581: Postfix local privilege escalation via hardlinked symlinks Tags were: sid lenny etch fixed-upstream security patch Tags removed: lenny, sid fixed 495581 2.5.2-2lenny1 Bug#495581: Postfix local privilege escalation via hardlinked symlinks Bug marked as fixed in version 2.5.2-2lenny1. fixed 495581 2.5.4-1 Bug#495581: Postfix local privilege escalation via hardlinked symlinks Bug marked as fixed in version 2.5.4-1. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#492818: marked as done (solfege_3.11.3-1(sparc/unstable): FTBFS on sparc: NameError: global name 'getcwd' is not defined)
Your message dated Mon, 18 Aug 2008 21:55:51 +0200 with message-id [EMAIL PROTECTED] and subject line Fixed in 3.11.3-4 has caused the Debian Bug report #492818, regarding solfege_3.11.3-1(sparc/unstable): FTBFS on sparc: NameError: global name 'getcwd' is not defined to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 492818: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492818 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: solfege Version: 3.11.3-1 Severity: serious There was an error while trying to autobuild your package: Automatic build of solfege_3.11.3-1 on lebrun by sbuild/sparc 98 Build started at 20080729-0243 [...] ** Using build dependencies supplied by package: Build-Depends: swig, gettext, python-dev, debhelper (= 7), m4, texinfo, python-gnome2 (= 1.99.11), python-gtk2 (= 2.6.0), python-gtk2-dev (= 2.6.1), python-gnome2-dev (= 2.10.0), librsvg2-bin, txt2man, pkg-config, libglib2.0-dev (= 2.8.0), python-support (= 0.8.1), xvfb, xauth, xfonts-base, libxml2-utils, gnome-doc-utils, dpatch [...] src.cfg.initialise(default.config, None, ) File ./src/cfg.py, line 322, in initialise _user_filename = user_filename = filesystem.expanduser(user_filename) File ./src/filesystem.py, line 100, in expanduser return s.replace(~, get_home_dir()) File ./src/filesystem.py, line 95, in get_home_dir return _get_home_dir().decode(iso-8859-1) File ./src/filesystem.py, line 72, in _get_home_dir return getcwd() NameError: global name 'getcwd' is not defined make[1]: *** [test] Error 1 make[1]: Leaving directory `/build/buildd/solfege-3.11.3' dh_auto_test: command returned error code 512 make: *** [build-stamp] Error 1 dpkg-buildpackage: failure: debian/rules build gave error exit status 2 A full build log can be found at: http://buildd.debian.org/build.php?arch=sparcpkg=solfegever=3.11.3-1 ---End Message--- ---BeginMessage--- Package: solfege Version: 3.11.3-4 The bug _is_ fixed in 3.11.3-4. Version number typo in my previous email to the bts, saying fixed in -1. Sorry for wasting your time. See: http://buildd.debian.org/build.php?arch=sparcpkg=solfegever=3.11.3-4 -- Tom Cato Amundsen [EMAIL PROTECTED] http://www.solfege.org/ GNU Solfege - free ear training http://www.gnu.org/software/solfege/ ---End Message---
Bug#495554: [pkg-horde] Bug#495554: Bug#495554: imp4: It can be use to inject email thought Imp
On Mon, 2008-08-18 at 17:20 +0200, Gregory Colpart wrote: On Mon, Aug 18, 2008 at 11:38:00AM -0400, Michael Fernández M wrote: Are you sure spammers don't use a stolen login/password? Ohhh, yea!, so much. I'm sorry to insist but are you *really* sure? Because here[*] there was a similar question and upstream author said it's from a regular user. Could you try to track him in horde's logs? Could you also give the version of your horde3 package? [*]http://marc.info/?l=hordem=120119991901767w=2 Wow, i did not look into those logs. I will search, then i'll inform you. The horde3's version is: 3.1.3-4etch3 Regards... Regards, -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495581: marked as done (Postfix local privilege escalation via hardlinked symlinks)
Your message dated Mon, 18 Aug 2008 22:57:24 +0200 with message-id [EMAIL PROTECTED] and subject line this is fixed has caused the Debian Bug report #495581, regarding Postfix local privilege escalation via hardlinked symlinks to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 495581: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495581 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: postfix Version: 2.3.8-2 Severity: normal Tags: patch Hi all! I am wondering if a debian fix for this postfix issue is necessary and underway. It's 4 days old. There is a patch supplied by upstream. Gentoo, Suse, Mandrake and Pardus have already fixed this. See Wietse's original message in the attachment. best regards Kevin -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.24-etchnhalf.1-amd64 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages postfix depends on: ii adduser3.102 Add and remove users and ii debconf [debconf-2.0] 1.5.11etch2 Debian configuration ii dpkg 1.13.25 package maintenance system ii libc6 2.3.6.ds1-13etch7 GNU C Library: Shared -- Kevin Price http://www.kevin-price.de/ ---BeginMessage--- Summary: Solaris and Linux file system behavior has changed over time, breaking one of the assumptions in Postfix. See below for a description of the behavior and how it disagrees with standards. Postfix is not affected on systems with standard (POSIX, X/Open) file system behavior, i.e. *BSD, AIX, MacOS, HP-UX, and very old Sun/Linux systems. The fix and workarounds are simple. There are efforts to get the non-standard behavior approved by standards (a function called llink). Today's fix for Solaris, Linux etc. also makes Postfix future-proof for such changes. Wietse 1. Postfix local privilege escalation via hardlinked symlinks = Sebastian Krahmer of SuSE has found a privilege escalation problem. On some systems an attacker can hardlink a root-owned symlink to for example /var/mail, and cause Postfix to append mail to existing files that are owned by root or non-root accounts. This can happen on operating systems with specific non-standard behavior. Symlinks (symbolic links) implement aliasing for UNIX pathnames. They were introduced with 4.2BSD UNIX in 1983, and were adopted by other UNIX systems in the course of time. Hardlinks are older and implement the primary mechanism for accessing file system objects. In some UNIX systems, the link(symlink, newpath) operation has changed over time: instead of recursively following the symlink and creating a hardlink to the file thus found, it creates a hardlink to the symlink itself. This behavior disagrees with, for example, the POSIX.1-2001 and X/Open XPG4v2 standards, and is the default on current Solaris, IRIX and Linux systems. On systems with this non-standard behavior, Postfix may be vulnerable depending on how it is configured. Postfix allows a root-owned symlink as a local mail destination, so that mail can be delivered to e.g. /dev/null which is a symlink on Solaris. 2. What configurations are (not) affected = A configuration is considered affected when an attacker with local access to a system can make Postfix append mail to an existing file of a different user. Appendix A gives a procedure to determine if a system is affected. The following configurations are NOT affected: Postfix on FreeBSD 7.0, OpenBSD 4.3, NetBSD 4.0, MacOS X 10.5, AIX 5.3, HP-UX 11.11, Solaris 1.x, Linux kernel 1.2.13, and other systems with standard hardlink behavior. However, these systems may become affected when they share file systems with hosts where users can create hardlinks to symlinks. Also not affected are the following configurations: a) maildir-style delivery with the Postfix built-in local or virtual delivery agents; b) mail delivery with non-Postfix local or virtual delivery agents; c) mailbox-style delivery with the Postfix built-in virtual delivery agent when virtual mailbox parent directories have no group or other write permissions. The following configurations are known to be affected on Linux kernel = 2.0, Solaris = 2.0, OpenSolaris 11-2008.5, IRIX 6.5, and other systems where users can create hardlinks to symlinks: a) mailbox-style delivery with the Postfix built-in local delivery
Processed: (kein Betreff)
Processing commands for [EMAIL PROTECTED]: severity 495603 critical Bug#495603: daily netinst CD installation fails on a FSC Primergy RX300 with a level 5 RAID Severity set to `critical' from `normal' retitle 495603 grub-installer fails on a FSC Primergy RX300 with a level 5 RAID Bug#495603: daily netinst CD installation fails on a FSC Primergy RX300 with a level 5 RAID Changed Bug title to `grub-installer fails on a FSC Primergy RX300 with a level 5 RAID' from `daily netinst CD installation fails on a FSC Primergy RX300 with a level 5 RAID'. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495604: postfix security upgrade is treated as a downgrade by dpkg
Package: postfix Version: 2.3.8-2etch1 Severity: grave Tags: security Justification: renders a DSA ineffective The DSA 1629-1 upgrade of postfix is treated as a downgrade by dpkg and apt, and thus the upgrade won't happen unless the user takes unusual action (instructing them to proceed with a downgrade): dpkg - warning: downgrading postfix from 2.3.8-2+b1 to 2.3.8-2etch1. Preparing to replace postfix 2.3.8-2+b1 (using .../postfix_2.3.8-2etch1_i386.deb) ... -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (990, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.23.1-bytemark-uml Locale: LANG=fi_FI.UTF-8, LC_CTYPE=fi_FI.UTF-8 (charmap=UTF-8) Versions of packages postfix depends on: ii adduser3.102 Add and remove users and groups ii debconf [debconf-2.0] 1.5.11etch2 Debian configuration management sy ii dpkg 1.13.25 package maintenance system for Deb ii libc6 2.3.6.ds1-13etch7 GNU C Library: Shared libraries ii libdb4.3 4.3.29-8 Berkeley v4.3 Database Libraries [ ii libsasl2-2 2.1.22.dfsg1-8Authentication abstraction library ii libssl0.9.80.9.8c-4etch3 SSL shared libraries ii lsb-base 3.1-23.2etch1 Linux Standard Base 3.1 init scrip ii netbase4.29 Basic TCP/IP networking system ii ssl-cert 1.0.14Simple debconf wrapper for openssl Versions of packages postfix recommends: ii emacs21 [mail-re 21.4a+1-3etch1 The GNU Emacs editor ii mailx [mail-read 1:8.1.2-0.20050715cvs-1 A simple mail user agent ii mutt [mail-reade 1.5.13-1.1etch1 text-based mailreader supporting M -- debconf information excluded -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495581: this is fixed
Thijs Kinkhorst schrieb: Version: 2.3.8-2etch1 Ah, thank you. Justification: introduces a security hole on systems where you install the packages Huh? Have you read the author's announcement? It does no such thing on Debian systems - it only introduces a local security hole on systems where you (quite specifically) change the shipped configuration. Sure I read it. That's why I forwarded it to you. The issue is now fixed in all distributions, so no need to argue over severity - I'm rather closing this bug. FACK But in the future please be more careful when making statements about the impact of vulnerabilities. Please help me understand how you would have preferred me to report this, so next time I can do it right. From what I understand, security holes are critical or grave bugs, depending on whether a local account or the system are affected (can possibly be modified/compromised) In this case, it is the whole system, provided that the mail system is configured in a specific way, because not only a user using postfix may be affected, but also files belonging to other users or root. Why does this not justify critical? Would you really believe that grave would be more appropriate? Why? -- Kevin Price http://www.kevin-price.de/ signature.asc Description: OpenPGP digital signature
Bug#491396: This bug is affecting lenny and should be fixed
On Mon, 18 Aug 2008, Christian Perrier wrote: I'm still pondering raising an RC issue on linux-2.6 for /proc/acpi to be back. I know that bugs have been reassigned to various packages when they were reported but I think I would then go up to CTTE as an attempt to revert to /proc/acpi support to be reintroduced in the kernel. Going through the CTTE is going to take a while even if all stars align;[1] the best thing would be to work with the kernel team and release team to find a workable solution for this. Don Armstrong 1: And of course, the CTTE could decide to require fixing /proc/acpi using bits. -- I may not have gone where I intended to go, but I think I have ended up where I needed to be. -- Douglas Adams _The Long Dark Tea-Time of the Soul_ http://www.donarmstrong.com http://rzlab.ucr.edu -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495256: cacao-oj6 should not duplicate the upstream, openjdk and cacao sources
I cannot find this package anyway, Maybe a typo? cacao-oj6 is the source package name. http://packages.qa.debian.org/c/cacao-oj6.html -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: setting package to simutrans-makeobj, tagging 493409
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.10.35 package simutrans-makeobj Ignoring bugs not assigned to: simutrans-makeobj tags 493409 + pending Bug#493409: simutrans-makeobj: [amd64] makeobj fails Tags were: patch Tags added: pending End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#487970: #487970: solved by -fsigned-char
I found some (char) casts where OpenArena expects to get signed chars, and Evgeni Golov verified that the game works when compiling with -fsigned-char. So it looks like this can be solved with a simple Makefile tweak. -- Peter De Wachter -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495585: vpnc: Does not work and ends my ethernet connection
severity 495585 normal tags 495585 + upstream moreinfo thanks #include hallo.h * Patricio Rojo [Mon, Aug 18 2008, 02:53:34PM]: Package: vpnc Version: 0.5.1r334-1 Severity: grave Justification: renders package unusable Not really, i.e. talk only for yourself. Hi, I tried to to connect to a CISCO VPN unsuccessfully (I can connect using CISCO VPNClient for Windows, so is not a authentification issue). Furthermore, after executing vpnc, my machine is taken off the web, and I have to execute ifdown/ifup to bring it back (receiving a 'SIOCDELRT: No such process' error on ifdown) Below is a log of what I do (Changing part of my local IP for YYY.YY. and part of the remote VPN for XXX.XXX for increased security:D) s/security/obscurity/. I'll be happy to supply whatever more info you need. Thank you very much! Patricio -- $ sudo vpnc VPNC started in background (pid: 11616)... There is no password prompt. Stored it in the config? Or fabricated this log? $ sudo route Kernel IP routing table Destination Gateway Genmask Flags Metric RefUse Iface XXX.XXX.10.66 astro1.das.uchi 255.255.255.255 UGH 0 00 eth0 YYY.YY.9.0 * 255.255.255.128 U 0 00 eth0 default * 0.0.0.0 U 0 00 tun0 Yeah, still having the old default route set and therefore confusing the routing. Something bad happened while replacing routes, but I cannot tell you what happened without having REAL logs. Please create one with vpnc --debug 3 ... and post it. Feel free to XXYure but don't hide stuff. $ sudo ifdown eth0 ; sudo ifup eth0 SIOCDELRT: No such process And? A brutal method to kill the host link, you cannot expect it to work smoothly. Please RTFM vpnc-disconnect. Regards, Eduard. -- Ganneff warum kann telnet ohne portangabe nicht direkt auf port 25 gehen? Ganneff 99,9% der telnetnutzung ist smtp -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#495585: vpnc: Does not work and ends my ethernet connection
Processing commands for [EMAIL PROTECTED]: severity 495585 normal Bug#495585: vpnc: Does not work and ends my ethernet connection Severity set to `normal' from `grave' tags 495585 + upstream moreinfo Bug#495585: vpnc: Does not work and ends my ethernet connection There were no tags set. Tags added: upstream, moreinfo thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495514: patch to make azureus use only sun based runtimes
tags 495514 +patch thanks patch is attatched. note: while I have written a changlog entry explaining the changes I am not a dd so I cannot upload the package diff -ur azureus-3.1.1.0/debian/bin/azureus azureus-3.1.1.0.new/debian/bin/azureus --- azureus-3.1.1.0/debian/bin/azureus 2008-08-19 00:02:34.0 +0100 +++ azureus-3.1.1.0.new/debian/bin/azureus 2008-08-18 23:50:17.0 +0100 @@ -1,5 +1,85 @@ -#!/bin/sh -JAVA='java -Xmx1024M' +#!/bin/bash +JAVA=`readlink /etc/alternatives/java` +JAVA_HOME=${JAVA_HOME:=${JAVA%/*/*/*}} +echo $JAVA_HOME + + +#we need to check the JRE exists, is sun based and is not headless +#checking for $JAVA_HOME/jre/bin/policytool will kill all theese birds with +#one stone + +ACCEPTABLE=1 + +if [[ -e $JAVA_HOME/jre/bin/policytool ]] +then + echo this jre passed the installed/sun based/not headless test +else + ACCEPTABLE=0 + echo this jre failed the installed/sun based/not headless test +fi + +ARCH=`dpkg --print-installation-architecture` +#32 bit jre's on amd64 installations will fail to load SWT +if [[ ARCH -eq amd64 ]] +then + if objdump -f $JAVA_HOME/jre/bin/java | grep elf32-i386 /dev/null + then +echo this jre failed the amd64 system needs 64 bit jre for swt to load test +ACCEPTABLE=0; + else +echo this jre passed the amd64 system needs 64 bit jre for swt to load test + fi + +fi + +if [[ $ACCEPTABLE -eq 0 ]] +then + if [[ -e /usr/lib/jvm/java-6-openjdk/jre/bin/policytool ]] + then +JAVA_HOME=/usr/lib/jvm/java-6-openjdk +ACCEPTABLE=1 + fi +fi + +if [[ $ACCEPTABLE -eq 0 ]] +then + if [[ -e /usr/lib/jvm/java-6-cacao/jre/bin/policytool ]] + then +JAVA_HOME=/usr/lib/jvm/java-6-cacao +ACCEPTABLE=1 + fi +fi + +if [[ $ACCEPTABLE -eq 0 ]] +then + if [[ -e /usr/lib/jvm/java-6-sun/jre/bin/policytool ]] + then +JAVA_HOME=/usr/lib/jvm/java-6-sun +ACCEPTABLE=1 + fi +fi + +if [[ $ACCEPTABLE -eq 0 ]] +then + if [[ -e /usr/lib/jvm/java-1.5.0-sun/jre/bin/policytool ]] + then +JAVA_HOME=/usr/lib/jvm/java-1.5.0-sun +ACCEPTABLE=1 + fi +fi + + +if [[ $ACCEPTABLE -eq 0 ]] +then + echo no acceptable jre could be found, this should never happen unless + echo dependencies are broken + exit 1 +fi + +echo $JAVA_HOME + +export JAVA_HOME +JAVA=$JAVA_HOME/jre/bin/java -Xmx1024M . /usr/share/java-config/libswt-3.4-java exec $JAVA -Djava.library.path=/usr/lib/jni:/usr/lib \ -classpath /usr/share/java/Azureus2.jar:$JARS \ diff -ur azureus-3.1.1.0/debian/changelog azureus-3.1.1.0.new/debian/changelog --- azureus-3.1.1.0/debian/changelog 2008-08-19 00:02:34.0 +0100 +++ azureus-3.1.1.0.new/debian/changelog 2008-08-18 23:43:05.0 +0100 @@ -1,3 +1,13 @@ +azureus (3.1.1.0-3.1) unreleased; urgency=medium + + * fixups to stop azureus using gcj (which it doesn't work with) +* don't bother generating a package with useless gij native code +* make startup script select a suitable runtime +* change depdencies +* Closes: 495514 + + -- Peter Green [EMAIL PROTECTED] Mon, 18 Aug 2008 23:33:00 -0100 + azureus (3.1.1.0-3) unstable; urgency=medium * Remove the four non-latin characters in DateParserRegex.java. diff -ur azureus-3.1.1.0/debian/control azureus-3.1.1.0.new/debian/control --- azureus-3.1.1.0/debian/control 2008-08-19 00:02:34.0 +0100 +++ azureus-3.1.1.0.new/debian/control 2008-08-18 23:32:27.0 +0100 @@ -9,8 +9,7 @@ Package: azureus Architecture: all -Depends: java-gcj-compat | java-virtual-machine, - java-gcj-compat | java2-runtime, libcommons-cli-java, +Depends: openjdk-6-jre | cacao-oj6-jre | sun-java6-jre | sun-java5-jre, binutils, libcommons-cli-java, liblog4j1.2-java, libswt-gtk-3.4-java Suggests: vuze, azureus-gcj Description: BitTorrent client @@ -21,13 +20,6 @@ access to numerous pieces of information about your torrents. Azureus now features an embedded tracker easily set up and ready to use. -Package: azureus-gcj -Architecture: any -Depends: azureus (= ${source:Version}), azureus ( ${source:Version}.1~), - ${misc:Depends}, ${shlibs:Depends} -Description: native binary of Azureus - This package contains a native binary of Azureus built using GCJ. - Package: vuze Architecture: all Depends: azureus, libswt-cairo-gtk-3.4-jni, libswt-gnome-gtk-3.4-jni, diff -ur azureus-3.1.1.0/debian/rules azureus-3.1.1.0.new/debian/rules --- azureus-3.1.1.0/debian/rules 2008-08-19 00:02:34.0 +0100 +++ azureus-3.1.1.0.new/debian/rules 2008-08-18 22:47:48.0 +0100 @@ -40,7 +40,9 @@ include /usr/share/gcj/debian_defaults -binary-arch: build +binary-arch: + +binary-arch-old: build dh_clean -k dh_install -a dh_installchangelogs -a
Processed: patch to make azureus use only sun based runtimes
Processing commands for [EMAIL PROTECTED]: tags 495514 +patch Bug#495514: azureus and openjdk There were no tags set. Tags added: patch thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#493857: marked as done (mga-vid: Please update to 2.6.26)
Your message dated Mon, 18 Aug 2008 23:32:02 + with message-id [EMAIL PROTECTED] and subject line Bug#493857: fixed in mga-vid 2.6.24-3 has caused the Debian Bug report #493857, regarding mga-vid: Please update to 2.6.26 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 493857: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493857 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: mga-vid Severity: wishlist Hello! The current version did not compile with the kernel 2.6.26. Please upgrade to the new upstream version 2.6.26-2008-08-03. Thank you in advance. BR, Dirk -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.26 (PREEMPT) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash ---End Message--- ---BeginMessage--- Source: mga-vid Source-Version: 2.6.24-3 We believe that the bug you reported is fixed in the latest version of mga-vid, which is due to be installed in the Debian FTP archive: mga-vid-common_2.6.24-3_i386.deb to pool/main/m/mga-vid/mga-vid-common_2.6.24-3_i386.deb mga-vid-source_2.6.24-3_i386.deb to pool/main/m/mga-vid/mga-vid-source_2.6.24-3_i386.deb mga-vid_2.6.24-3.diff.gz to pool/main/m/mga-vid/mga-vid_2.6.24-3.diff.gz mga-vid_2.6.24-3.dsc to pool/main/m/mga-vid/mga-vid_2.6.24-3.dsc A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Sune Vuorela [EMAIL PROTECTED] (supplier of updated mga-vid package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 19 Aug 2008 01:08:34 +0200 Source: mga-vid Binary: mga-vid-source mga-vid-common Architecture: source i386 Version: 2.6.24-3 Distribution: unstable Urgency: low Maintainer: Sune Vuorela [EMAIL PROTECTED] Changed-By: Sune Vuorela [EMAIL PROTECTED] Description: mga-vid-common - Module aliases and test program for /dev/mga_vid mga-vid-source - Kernel driver for the back-end scaler on Matrox cards (source) Closes: 493857 Changes: mga-vid (2.6.24-3) unstable; urgency=low . * Cherry pick fix to make it bulid with 2.6.24. Don't pull full new version, as it needs updated mplayer to work. (Closes: #493857) Checksums-Sha1: 01bb1ade712c8a228a048875ea7e1d3677a6ea07 1033 mga-vid_2.6.24-3.dsc 876e65c0d630d22602d02ccaae14d9658bfbf6a4 7906 mga-vid_2.6.24-3.diff.gz 9fd1581a72ddffca4482e23a0afb0c81845600b4 21806 mga-vid-source_2.6.24-3_i386.deb 34ca8797717a1d5b9e84d23c8a61ae585cf2378d 9650 mga-vid-common_2.6.24-3_i386.deb Checksums-Sha256: d968f5a58976badc755f2e661438e3c6425c4688e81b1965cbc5e59fb91e6c98 1033 mga-vid_2.6.24-3.dsc e5dfc625a8f206e5b62e2158198ca67d92aed07a759995dc9572643d466a260e 7906 mga-vid_2.6.24-3.diff.gz edbdcb18d6fff10e44230ae1315f58b1fc80124006c90f692010820a7a62589e 21806 mga-vid-source_2.6.24-3_i386.deb e27502498ae19060647b8a815a3cbdda2f907077e8e3014059afd509ba49a74c 9650 mga-vid-common_2.6.24-3_i386.deb Files: 9700f253173bda429f6fa175deffefa4 1033 graphics extra mga-vid_2.6.24-3.dsc 4ef1366b0c607eed30724478d2956a74 7906 graphics extra mga-vid_2.6.24-3.diff.gz 1a9caafdd7e8f92df1e4645e12cf86e3 21806 misc extra mga-vid-source_2.6.24-3_i386.deb b30a47d065733f1203a31e2e79cfeb4c 9650 misc extra mga-vid-common_2.6.24-3_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkiqAkYACgkQnMvaFgH6i0pm5QCbBAJuiDTqSvbZPFR6E3Nrh/pR O3gAn1x40gan63I+TPeQcThRHgxn1aB3 =LTnp -END PGP SIGNATURE- ---End Message---
Bug#495514: Patch for #495514
tag 495514 + patch thanks Here's a debdiff that fixes #495514 by using openjdk-6-jdk as the default JDK, while still giving a user the option to rebuild with any JDK he likes, without changing debian/{rules,control}. I've just uploaded 3.1.1.0-3.0 to DELAYED/7, so feel free to take that debdiff and massage it any way you see fit, if something in there is not quite to your liking :) Cheers, --Seb diff -u azureus-3.1.1.0/debian/rules azureus-3.1.1.0/debian/rules --- azureus-3.1.1.0/debian/rules +++ azureus-3.1.1.0/debian/rules @@ -1,8 +1,12 @@ #!/usr/bin/make -f +SUBSTVARS := debian/azureus.substvars + build: dist/Azureus2.jar dist/Azureus2.jar: + dpkg -S `readlink -f $$(which javac)` | perl -pe 's|(.+):.+|jre:Depends=$$1|' $(SUBSTVARS) + mkdir -p build/libs ln -s \ /usr/share/java/commons-cli.jar \ @@ -20,11 +24,10 @@ clean: dh_clean - rm -rf build/libs + rm -rf build/libs $(SUBSTVARS) ant clean binary-indep: build - dh_clean -k dh_install -i dh_installchangelogs -i dh_installdocs -i @@ -33,30 +36,13 @@ dh_compress -i dh_desktop -i dh_fixperms -i + dh_lintian -i dh_installdeb -i dh_gencontrol -i dh_md5sums -i dh_builddeb -i -include /usr/share/gcj/debian_defaults - -binary-arch: build - dh_clean -k - dh_install -a - dh_installchangelogs -a - dh_installdocs -a -ifneq (,$(filter $(DEB_HOST_ARCH), $(gcj_native_archs))) - dh_install -i - dh_nativejava -a -endif - dh_compress -a - dh_fixperms -a - dh_strip -a - dh_installdeb -a - dh_shlibdeps -a - dh_gencontrol -a - dh_md5sums -a - dh_builddeb -a +binary-arch: binary: binary-indep binary-arch diff -u azureus-3.1.1.0/debian/control azureus-3.1.1.0/debian/control --- azureus-3.1.1.0/debian/control +++ azureus-3.1.1.0/debian/control @@ -2,17 +2,16 @@ Section: net Priority: optional Maintainer: Shaun Jackman [EMAIL PROTECTED] -Build-Depends: default-jdk-builddep | java2-compiler, ant, - libcommons-cli-java, liblog4j1.2-java, libswt-gtk-3.4-java, - fastjar, junit, debhelper ( 5) +Build-Depends: openjdk-6-jdk | sun-java6-compiler | java2-compiler, ant, debhelper (= 6.0.7~) +Build-Depends-Indep: libcommons-cli-java, liblog4j1.2-java, + libswt-gtk-3.4-java, fastjar, junit Standards-Version: 3.8.0.1 Package: azureus Architecture: all -Depends: java-gcj-compat | java-virtual-machine, - java-gcj-compat | java2-runtime, libcommons-cli-java, - liblog4j1.2-java, libswt-gtk-3.4-java -Suggests: vuze, azureus-gcj +Depends: ${jre:Depends}, libcommons-cli-java, liblog4j1.2-java, + libswt-gtk-3.4-java +Suggests: vuze Description: BitTorrent client BitTorrent is a peer-to-peer file distribution tool. . @@ -21,13 +20,6 @@ access to numerous pieces of information about your torrents. Azureus now features an embedded tracker easily set up and ready to use. -Package: azureus-gcj -Architecture: any -Depends: azureus (= ${source:Version}), azureus ( ${source:Version}.1~), - ${misc:Depends}, ${shlibs:Depends} -Description: native binary of Azureus - This package contains a native binary of Azureus built using GCJ. - Package: vuze Architecture: all Depends: azureus, libswt-cairo-gtk-3.4-jni, libswt-gnome-gtk-3.4-jni, diff -u azureus-3.1.1.0/debian/changelog azureus-3.1.1.0/debian/changelog --- azureus-3.1.1.0/debian/changelog +++ azureus-3.1.1.0/debian/changelog @@ -1,3 +1,14 @@ +azureus (3.1.1.0-3.0) unstable; urgency=low + + * Tentative NMU. + * Build with openjdk-6-jdk by default (but allows for user rebuilds +using any JDK), and remove azureus-gcj altogether (Closes: #495514). + * Add a lintian override to signify that java and ant are indeed needed +as Build-Depends-Indep even though we do not build any arch-dependent +binary packages. + + -- Sebastien Delafond [EMAIL PROTECTED] Mon, 18 Aug 2008 16:45:49 -0700 + azureus (3.1.1.0-3) unstable; urgency=medium * Remove the four non-latin characters in DateParserRegex.java. only in patch2: unchanged: --- azureus-3.1.1.0.orig/debian/source.lintian-overrides +++ azureus-3.1.1.0/debian/source.lintian-overrides @@ -0,0 +1,2 @@ +# java and ant are required to run clean +azureus source: build-depends-without-arch-dep signature.asc Description: Digital signature
Processed: Patch for #495514
Processing commands for [EMAIL PROTECTED]: tag 495514 + patch Bug#495514: azureus and openjdk Tags were: patch Tags added: patch thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495514: Patch for #495514
Here's a debdiff that fixes #495514 by using openjdk-6-jdk as the default JDK, while still giving a user the option to rebuild with any JDK he likes, What JDK the package is built with is irrelevent. The problem is it doesn't work when RUN WITH gij. Indeed the dependencies on your package don't even seem to ensure that a JRE is installed at all by default. In other words your patch (unlike mine) does not actually fix the problem. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495514: Patch for #495514
On Tue, Aug 19, 2008 at 01:28:37AM +0100, peter green wrote: What JDK the package is built with is irrelevent. The problem is it doesn't work when RUN WITH gij. generally speaking, the JDK the package is built with *is* relevant, if only to avoid java.lang.UnsupportedClassVersionError: for instance your fix considers the JRE from sun-java5-jre to be acceptable, when it definitely is not if the package is compiled with a JDK6 (which is what will happen with the Build-Depends line you left as is). The solid fix is IMHO to ensure that you run the program with the JRE associated to the JDK you used for building. Otherwise, you have to resort to using poorly-scalable solutions, like you did in /usr/bin/azureus by trying to hand-select what JREs are appropriate or not. Another, more proper solution, would be for example to Build-Depends: java5-sdk and Depends: java5-runtime, but unfortunately java-gcj-compat provides java5-runtime, which takes us back to square one. Indeed the dependencies on your package don't even seem to ensure that a JRE is installed at all by default. ah, thanks for spotting this: my mistake, that substvar wasn't defined the right way. That's fixed in -3.1, which I've also uploaded to DELAYED/7, and I've attached the debdiff to this email as well. In other words your patch (unlike mine) does not actually fix the problem. when I started working on fixing this issue, your patch had not made it to the BTS yet. Cheers, --Seb diff -u azureus-3.1.1.0/debian/rules azureus-3.1.1.0/debian/rules --- azureus-3.1.1.0/debian/rules +++ azureus-3.1.1.0/debian/rules @@ -1,8 +1,13 @@ #!/usr/bin/make -f +SUBSTVARS := debian/azureus.substvars + build: dist/Azureus2.jar dist/Azureus2.jar: + dpkg -S `readlink -f $$(which java)` | perl -pe 's|(.+):.+|jre:Depends=$$1|' $(SUBSTVARS) + sed -i -e 's/-headless//' $(SUBSTVARS) + mkdir -p build/libs ln -s \ /usr/share/java/commons-cli.jar \ @@ -20,11 +25,10 @@ clean: dh_clean - rm -rf build/libs + rm -rf build/libs $(SUBSTVARS) ant clean binary-indep: build - dh_clean -k dh_install -i dh_installchangelogs -i dh_installdocs -i @@ -33,30 +37,13 @@ dh_compress -i dh_desktop -i dh_fixperms -i + dh_lintian -i dh_installdeb -i dh_gencontrol -i dh_md5sums -i dh_builddeb -i -include /usr/share/gcj/debian_defaults - -binary-arch: build - dh_clean -k - dh_install -a - dh_installchangelogs -a - dh_installdocs -a -ifneq (,$(filter $(DEB_HOST_ARCH), $(gcj_native_archs))) - dh_install -i - dh_nativejava -a -endif - dh_compress -a - dh_fixperms -a - dh_strip -a - dh_installdeb -a - dh_shlibdeps -a - dh_gencontrol -a - dh_md5sums -a - dh_builddeb -a +binary-arch: binary: binary-indep binary-arch diff -u azureus-3.1.1.0/debian/control azureus-3.1.1.0/debian/control --- azureus-3.1.1.0/debian/control +++ azureus-3.1.1.0/debian/control @@ -2,17 +2,16 @@ Section: net Priority: optional Maintainer: Shaun Jackman [EMAIL PROTECTED] -Build-Depends: default-jdk-builddep | java2-compiler, ant, - libcommons-cli-java, liblog4j1.2-java, libswt-gtk-3.4-java, - fastjar, junit, debhelper ( 5) +Build-Depends: openjdk-6-jdk | java2-jdk, ant, debhelper (= 6.0.7~) +Build-Depends-Indep: libcommons-cli-java, liblog4j1.2-java, + libswt-gtk-3.4-java, fastjar, junit Standards-Version: 3.8.0.1 Package: azureus Architecture: all -Depends: java-gcj-compat | java-virtual-machine, - java-gcj-compat | java2-runtime, libcommons-cli-java, - liblog4j1.2-java, libswt-gtk-3.4-java -Suggests: vuze, azureus-gcj +Depends: ${jre:Depends}, libcommons-cli-java, liblog4j1.2-java, + libswt-gtk-3.4-java +Suggests: vuze Description: BitTorrent client BitTorrent is a peer-to-peer file distribution tool. . @@ -21,13 +20,6 @@ access to numerous pieces of information about your torrents. Azureus now features an embedded tracker easily set up and ready to use. -Package: azureus-gcj -Architecture: any -Depends: azureus (= ${source:Version}), azureus ( ${source:Version}.1~), - ${misc:Depends}, ${shlibs:Depends} -Description: native binary of Azureus - This package contains a native binary of Azureus built using GCJ. - Package: vuze Architecture: all Depends: azureus, libswt-cairo-gtk-3.4-jni, libswt-gnome-gtk-3.4-jni, diff -u azureus-3.1.1.0/debian/changelog azureus-3.1.1.0/debian/changelog --- azureus-3.1.1.0/debian/changelog +++ azureus-3.1.1.0/debian/changelog @@ -1,3 +1,22 @@ +azureus (3.1.1.0-3.1) unstable; urgency=low + + * Tentative NMU. + * Depends: on the JRE associated to the JDK used for building, and not +on the JDK itself, which is silly. + + -- Sebastien Delafond [EMAIL PROTECTED] Mon, 18 Aug 2008 17:53:35 -0700 + +azureus (3.1.1.0-3.0) unstable; urgency=low + + * Tentative NMU. + * Build with openjdk-6-jdk
Bug#495514: Patch for #495514
generally speaking, the JDK the package is built with *is* relevant, if only to avoid java.lang.UnsupportedClassVersionError: for instance your fix considers the JRE from sun-java5-jre to be acceptable, when it definitely is not if the package is compiled with a JDK6 (which is what will happen with the Build-Depends line you left as is). The build depends line would by default be satisfied by java-gcj-compat-dev and I have confirmed that a binary built with that DOES work with the sun-java5-jdk. It would be an issue if building with sun java6 though and It probablly does make sense to explicitly specify a classfile version. The solid fix is IMHO to ensure that you run the program with the JRE associated to the JDK you used for building. Yeah, completely ignoring the users JRE preferences is an easy fix, I dunno if that is considered acceptable or not Otherwise, you have to resort to using poorly-scalable solutions, like you did in /usr/bin/azureus by trying to hand-select what JREs are appropriate or not. I didn't just try to hand select them, I tested all the sun based jre's in debian Another, more proper solution, would be for example to Build-Depends: java5-sdk and Depends: java5-runtime, but unfortunately java-gcj-compat provides java5-runtime, which takes us back to square one. And even if it didn't provide it depending on a JRE does not provide any gaurantee that the JRE you depend on will be the JRE the user/system select as default. So if you want functionality that is not provided by every JRE you need to either lock to one JRE or use a selection script like the one I wrote (this is something that should probablly be centralised but that is something to be considered post-lenny) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495514: Patch for #495514
On Tue, Aug 19, 2008 at 03:04:40AM +0100, peter green wrote: It would be an issue if building with sun java6 though [...] I didn't just try to hand select them, I tested all the sun based jre's in debian that's what I meant by not scalable: your solution is valid at this particular point in time only, and that is why it is not very appealing to me. OTOH... Yeah, completely ignoring the users JRE preferences is an easy fix, I dunno if that is considered acceptable or not [...] So if you want functionality that is not provided by every JRE you need to either lock to one JRE or use a selection script like the one I wrote ... my solution is indeed more restrictive as to what JRE a Debian lambda user (that doesn't build his own package) can run azureus with. (this is something that should probablly be centralised but that is something to be considered post-lenny) [...] And even if it didn't provide it depending on a JRE does not provide any gaurantee that the JRE you depend on will be the JRE the user/system select as default. I indeed do not see any obvious policy about that, and I certainly will not argue that the solution I chose to implement in this NMU should be applied to all the Debian packages that require a JRE to run. Anyway, I'm sure Shaun now has enough datapoints to decide what sort of solution he'd like to implement. I've removed all my past NMU uploads from DELAYED/7, and uploaded a single -3.1 that regroups all the fixes needed for my solution to the problem. The debdiff attached to this email represents those changes. Cheers, --Seb reverted: --- azureus-3.1.1.0/debian/bin/azureus +++ azureus-3.1.1.0.orig/debian/bin/azureus @@ -1,7 +0,0 @@ -#!/bin/sh -JAVA='java -Xmx1024M' -. /usr/share/java-config/libswt-3.4-java -exec $JAVA -Djava.library.path=/usr/lib/jni:/usr/lib \ - -classpath /usr/share/java/Azureus2.jar:$JARS \ - -Dazureus.install.path=$HOME/.azureus \ - org.gudy.azureus2.ui.common.Main $@ diff -u azureus-3.1.1.0/debian/rules azureus-3.1.1.0/debian/rules --- azureus-3.1.1.0/debian/rules +++ azureus-3.1.1.0/debian/rules @@ -1,8 +1,16 @@ #!/usr/bin/make -f +SUBSTVARS := debian/azureus.substvars +BIN_FILE := debian/bin/azureus +BIN_TEMPLATE := $(BIN_FILE).template + build: dist/Azureus2.jar dist/Azureus2.jar: + dpkg -S `readlink -f $$(which java)` | perl -pe 's|(.+):.+|jre:Depends=$$1|' $(SUBSTVARS) + perl -i -pe 's/-headless//' $(SUBSTVARS) + perl -pe s|%JAVA%|`readlink -f $$(which java)`| $(BIN_TEMPLATE) $(BIN_FILE) + mkdir -p build/libs ln -s \ /usr/share/java/commons-cli.jar \ @@ -20,11 +28,10 @@ clean: dh_clean - rm -rf build/libs + rm -rf build/libs $(SUBSTVARS) $(BIN_FILE) ant clean binary-indep: build - dh_clean -k dh_install -i dh_installchangelogs -i dh_installdocs -i @@ -33,30 +40,13 @@ dh_compress -i dh_desktop -i dh_fixperms -i + dh_lintian -i dh_installdeb -i dh_gencontrol -i dh_md5sums -i dh_builddeb -i -include /usr/share/gcj/debian_defaults - -binary-arch: build - dh_clean -k - dh_install -a - dh_installchangelogs -a - dh_installdocs -a -ifneq (,$(filter $(DEB_HOST_ARCH), $(gcj_native_archs))) - dh_install -i - dh_nativejava -a -endif - dh_compress -a - dh_fixperms -a - dh_strip -a - dh_installdeb -a - dh_shlibdeps -a - dh_gencontrol -a - dh_md5sums -a - dh_builddeb -a +binary-arch: binary: binary-indep binary-arch diff -u azureus-3.1.1.0/debian/control azureus-3.1.1.0/debian/control --- azureus-3.1.1.0/debian/control +++ azureus-3.1.1.0/debian/control @@ -2,17 +2,16 @@ Section: net Priority: optional Maintainer: Shaun Jackman [EMAIL PROTECTED] -Build-Depends: default-jdk-builddep | java2-compiler, ant, - libcommons-cli-java, liblog4j1.2-java, libswt-gtk-3.4-java, - fastjar, junit, debhelper ( 5) +Build-Depends: openjdk-6-jdk | java2-jdk, ant, debhelper (= 6.0.7~) +Build-Depends-Indep: libcommons-cli-java, liblog4j1.2-java, + libswt-gtk-3.4-java, fastjar, junit Standards-Version: 3.8.0.1 Package: azureus Architecture: all -Depends: java-gcj-compat | java-virtual-machine, - java-gcj-compat | java2-runtime, libcommons-cli-java, - liblog4j1.2-java, libswt-gtk-3.4-java -Suggests: vuze, azureus-gcj +Depends: ${jre:Depends}, libcommons-cli-java, liblog4j1.2-java, + libswt-gtk-3.4-java +Suggests: vuze Description: BitTorrent client BitTorrent is a peer-to-peer file distribution tool. . @@ -21,13 +20,6 @@ access to numerous pieces of information about your torrents. Azureus now features an embedded tracker easily set up and ready to use. -Package: azureus-gcj -Architecture: any -Depends: azureus (= ${source:Version}), azureus ( ${source:Version}.1~), - ${misc:Depends}, ${shlibs:Depends} -Description: native binary of Azureus - This package
Bug#495626: postfix security upgrade is treated as a downgrade by dpkg
Package: postfix Version: 2.3.8-2etch1 Severity: grave Justification: renders a DSA ineffective Tags: security The DSA 1629-1 upgrade of postfix is treated as a downgrade by dpkg and apt, and thus the upgrade won't happen unless the user takes unusual action (instructing them to proceed with a downgrade): dpkg - warning: downgrading postfix from 2.3.8-2+b1 to 2.3.8-2etch1. Preparing to replace postfix 2.3.8-2+b1 (using .../postfix_2.3.8-2etch1_i386.deb) ... (Incidentally, I'll note that I tried to send this report about eight hours ago, but the upgrade silently broke my setup by overwriting my /etc/aliases for some strange reason, and the message went into the bit bucket due to debian.org not being able to do a successful sender callout test. Fortunately reportbug doesn't delete its temporary file containing the report it had supposedly sent.) -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (990, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.23.1-bytemark-uml Locale: LANG=fi_FI.UTF-8, LC_CTYPE=fi_FI.UTF-8 (charmap=UTF-8) Versions of packages postfix depends on: ii adduser3.102 Add and remove users and groups ii debconf [debconf-2.0] 1.5.11etch2 Debian configuration management sy ii dpkg 1.13.25 package maintenance system for Deb ii libc6 2.3.6.ds1-13etch7 GNU C Library: Shared libraries ii libdb4.3 4.3.29-8 Berkeley v4.3 Database Libraries [ ii libsasl2-2 2.1.22.dfsg1-8Authentication abstraction library ii libssl0.9.80.9.8c-4etch3 SSL shared libraries ii lsb-base 3.1-23.2etch1 Linux Standard Base 3.1 init scrip ii netbase4.29 Basic TCP/IP networking system ii ssl-cert 1.0.14Simple debconf wrapper for openssl Versions of packages postfix recommends: ii emacs21 [mail-re 21.4a+1-3etch1 The GNU Emacs editor ii mailx [mail-read 1:8.1.2-0.20050715cvs-1 A simple mail user agent ii mutt [mail-reade 1.5.13-1.1etch1 text-based mailreader supporting M -- debconf information excluded -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495257: dbus: System bus must not be restarted during package upgrades
First up, I'm not a DBus daemon developer. I disagree that the DBus daemon should never be restarted because the NetworkManager developers say so. This is a step towards the dark side - rebooting your box after performing an upgrade is the M$ way of doing things. Solid engineering can prevent this. I have no idea if the following is possible, but it may be a good start to solving the DBus upgrade/restart puzzle: 1. Start new DBus daemon on a new socket: /var/run/dbus/system_bus_socket.new 2. Connect to the old socket and start proxying messages between the 2 daemons. 3. Move the new socket over the top of the old socket: mv /var/run/dbus/system_bus_socket.new /var/run/dbus/system_bus_socket 4. Send message to the old daemon to force disconnection of all clients which should reconnect to the new daemon, once all clients disconnected then the old daemon shuts down. Comments? -- Regards Tyson Clugg Programmer = Unique Micro Design Pty Ltd.engineering ICT solutions Wellington Road Business Park 200 Wellington Road Clayton, VIC 3168, Australia PO Box 4297, Mulgrave, VIC 3170, Australia +61-3-9582-7095 [EMAIL PROTECTED] DIRECT +61-3-9582-7070 [EMAIL PROTECTED] +61-3-9582-7060 [EMAIL PROTECTED] +61-3-9582-7050 [EMAIL PROTECTED] +61-3-9582-7010 [EMAIL PROTECTED] +61-3-9582-7000 [EMAIL PROTECTED] +61-3-9582-7001 Fax - Sales and office +61-3-9582-7069 Fax - Service === www.umd.com.auUMD Web Address www.umd.com.au/rfid/UMD and RFID www.umd.com.au/gprsUMD and GPRS www.umd.com.au/solutions/UMD Solution Sourcing www.cardgate.netUMD E-Commerce Division === -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495626: marked as done (postfix security upgrade is treated as a downgrade by dpkg)
Your message dated Tue, 19 Aug 2008 08:28:26 +0300 with message-id [EMAIL PROTECTED] and subject line Re: Bug#495626: Acknowledgement (postfix security upgrade is treated as a downgrade by dpkg) has caused the Debian Bug report #495626, regarding postfix security upgrade is treated as a downgrade by dpkg to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 495626: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495626 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: postfix Version: 2.3.8-2etch1 Severity: grave Justification: renders a DSA ineffective Tags: security The DSA 1629-1 upgrade of postfix is treated as a downgrade by dpkg and apt, and thus the upgrade won't happen unless the user takes unusual action (instructing them to proceed with a downgrade): dpkg - warning: downgrading postfix from 2.3.8-2+b1 to 2.3.8-2etch1. Preparing to replace postfix 2.3.8-2+b1 (using .../postfix_2.3.8-2etch1_i386.deb) ... (Incidentally, I'll note that I tried to send this report about eight hours ago, but the upgrade silently broke my setup by overwriting my /etc/aliases for some strange reason, and the message went into the bit bucket due to debian.org not being able to do a successful sender callout test. Fortunately reportbug doesn't delete its temporary file containing the report it had supposedly sent.) -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (990, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.23.1-bytemark-uml Locale: LANG=fi_FI.UTF-8, LC_CTYPE=fi_FI.UTF-8 (charmap=UTF-8) Versions of packages postfix depends on: ii adduser3.102 Add and remove users and groups ii debconf [debconf-2.0] 1.5.11etch2 Debian configuration management sy ii dpkg 1.13.25 package maintenance system for Deb ii libc6 2.3.6.ds1-13etch7 GNU C Library: Shared libraries ii libdb4.3 4.3.29-8 Berkeley v4.3 Database Libraries [ ii libsasl2-2 2.1.22.dfsg1-8Authentication abstraction library ii libssl0.9.80.9.8c-4etch3 SSL shared libraries ii lsb-base 3.1-23.2etch1 Linux Standard Base 3.1 init scrip ii netbase4.29 Basic TCP/IP networking system ii ssl-cert 1.0.14Simple debconf wrapper for openssl Versions of packages postfix recommends: ii emacs21 [mail-re 21.4a+1-3etch1 The GNU Emacs editor ii mailx [mail-read 1:8.1.2-0.20050715cvs-1 A simple mail user agent ii mutt [mail-reade 1.5.13-1.1etch1 text-based mailreader supporting M -- debconf information excluded ---End Message--- ---BeginMessage--- My mistake. I hadn't realized the bug report *had* in fact gone through. -- Antti-Juhani Kaijanaho, Jyväskylä, Finland http://antti-juhani.kaijanaho.fi/newblog/ http://www.flickr.com/photos/antti-juhani/ ---End Message---
Processed (with 5 errors): Cc: field stil not filled in when replying
Processing commands for [EMAIL PROTECTED]: Severity 479533 grave Bug#479533: Cc: field in not filled in when replying or forwarding a message! Severity set to `grave' from `important' Notforwarded 479533 Bug#479533: Cc: field in not filled in when replying or forwarding a message! Removed annotation that Bug had been forwarded to http://bugzilla.gnome.org/show_bug.cgi?id=502913. Some more info: Cc: field is filled in when creating a new mail. Unknown command or malformed arguments to command. However, when replying (Reply, Reply to all) it is not! Is this intended Unknown command or malformed arguments to command. behaviour? This is in contrast with earlier versions of evolution! Unknown command or malformed arguments to command. This behaviour is present in at least 2.2.23.1-1 in both unstable and Unknown command or malformed arguments to command. testing as well as 2.2.22.1-1. Unknown command or malformed arguments to command. Too many unknown commands, stopping here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#495604: postfix security upgrade is treated as a downgrade by dpkg
tags 495604 pending thanks On Monday 18 August 2008 23:17, Antti-Juhani Kaijanaho wrote: The DSA 1629-1 upgrade of postfix is treated as a downgrade by dpkg and apt, and thus the upgrade won't happen unless the user takes unusual action (instructing them to proceed with a downgrade): dpkg - warning: downgrading postfix from 2.3.8-2+b1 to 2.3.8-2etch1. Preparing to replace postfix 2.3.8-2+b1 (using .../postfix_2.3.8-2etch1_i386.deb) ... Hmm, yet another case of a missed binnmu when preparing a security update... we should really add an automated check of that. I'm sending off an updated version to the buildd's now. Sorry for the inconvenience. Thijs pgptydQycSLHn.pgp Description: PGP signature
Processed: Re: Bug#495604: postfix security upgrade is treated as a downgrade by dpkg
Processing commands for [EMAIL PROTECTED]: tags 495604 pending Bug#495604: postfix security upgrade is treated as a downgrade by dpkg Tags were: security Tags added: pending thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]