Bug#503878: fglrx-atieventsd: authatieventsd.sh uses finger without depending on it and is unreliable

2008-11-04 Thread Romain Beauxis
Le Tuesday 04 November 2008 06:56:33 Mark Purcell, vous avez écrit :
> On Wednesday 29 October 2008 10:16:21 Luca Niccoli wrote:
> > I've attached the modified script, to be diffed against the upstream one.
>
> Romain & Bertrand,

Hi !

> This RC bug effecting lenny, with a patch, has been sitting without a
> response for a week.
>
> Are you in a position to prepare a fixed package?

I will try to prepare a fixed package as soon as possible, which means at 
least this week end.

Romain



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504467: boinc-app-seti: Package uninstallable

2008-11-04 Thread David Baron
Package: boinc-app-seti
Version: 5.13+cvs20060510-4
Severity: grave
Justification: renders package unusable

The configure/post-configure script of the installation fails.

The reason is most probably that /etc/init.d/boinc-client distribution will
not start boinc. The daemon start/stop utility simple does not work with
boinc and has not for a long time!

To use it, I changed to brute force boinc -d and killall to start and stop.
There is no longer any pid file/pid number for use in other parts of this
script. Should be a better way to bypass the daemon tool when necessary?



-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (650, 'testing'), (500, 'stable'), (1, 
'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.23-rt1-davidb (SMP w/1 CPU core; PREEMPT)
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/bash

Versions of packages boinc-app-seti depends on:
ii  boinc-client   6.2.14-2  core client for the BOINC distribu
ii  libc6  2.7-15GNU C Library: Shared libraries
ii  libfftw3-3 3.1.2-3.1 library for computing Fast Fourier
ii  libgcc11:4.3.2-1 GCC support library
ii  libssl0.9.80.9.8g-14 SSL shared libraries
ii  libstdc++6 4.3.2-1   The GNU Standard C++ Library v3
ii  zlib1g 1:1.2.3.3.dfsg-12 compression library - runtime

boinc-app-seti recommends no packages.

boinc-app-seti suggests no packages.

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#502824: alevt: diff for NMU version 1:1.6.1-10.2

2008-11-04 Thread Chris Lamb
Mark Purcell <[EMAIL PROTECTED]> wrote:

> Chris, Any progress on your NMU to fix this RC bug for lenny?

I have prepared and uploaded it *3* times, both to the SSH queue on
ravel and via FTP; every time the upload simply disappears.


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  [EMAIL PROTECTED]
   `-


signature.asc
Description: PGP signature


Bug#503712: etch->lenny upgrade left the system in broken state

2008-11-04 Thread Niko Tyni
On Tue, Nov 04, 2008 at 05:02:42PM +1100, Mark Purcell wrote:
> On Friday 31 October 2008 08:00:49 Niko Tyni wrote:
> > reassign 503712 ghostscript 8.62.dfsg.1-3.1
> > severity 503712 serious
> [...]
> 
> > On Thu, Oct 30, 2008 at 12:52:28PM +0100, Giovanni Rapagnani wrote:
> > > On 30/10/08 10:33, Niko Tyni wrote:
> [...]
> > > Is this something that needs documentation in the release-notes ?
> >
> > I think it would be much better to fix the upgrade path if possible.
> 
> Giovanni,
> 
> Are you planning on tacking any action on this?
> 
> This bug report against your package is currently being tracked with the RC 
> bugs for lenny and I was wondering if there was any action being planned to 
> resolve?

Clarification: Giovanni isn't the ghostscript maintainer, he 
just reported the issue.
-- 
Niko Tyni   [EMAIL PROTECTED]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#503337: Bug present in unstable but not in testing

2008-11-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> notfound 503337 0.7-1.2
Bug#503337: On upgrades the default power off mode ends up as reboot
Bug no longer marked as found in version 0.7-1.2.

> found 503337 0.8-1
Bug#503337: On upgrades the default power off mode ends up as reboot
Bug marked as found in version 0.8-1.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503337: Bug present in unstable but not in testing

2008-11-04 Thread Tim Dijkstra
notfound 503337 0.7-1.2
found 503337 0.8-1
thanks

Christian Perrier schreef:
> From what I read in the bug log and what I remember from the history
> of uswsusp, this RC bug is *not* present in testing.
>
> Testing has a 0.7-1.2 version which does not have the config change
> described by Tim Dijkstra in the bug log.
>
> As a consequence, I think we can safely decide that the following
> should be sent to [EMAIL PROTECTED]:
>


>





-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: reopening 498505, notfixed 498505 in 2.6.7.1-1

2008-11-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> reopen 498505
Bug#498505: mdadm: mdadm segfaults on superblock detection
Bug#496334: mdadm segfault on --assemble --force with raid10
Bug#499643: Segmentation fault when attempting re-assembly of a failed RAID5 
via "mdadm -v -A --run --force"
Bug reopened, originator not changed.

> notfixed 498505 2.6.7.1-1
Bug#498505: mdadm: mdadm segfaults on superblock detection
Bug#496334: mdadm segfault on --assemble --force with raid10
Bug#499643: Segmentation fault when attempting re-assembly of a failed RAID5 
via "mdadm -v -A --run --force"
Bug no longer marked as fixed in version 2.6.7.1-1.

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504118: marked as done (sbcl: install fails through apt-get but succeeds otherwise)

2008-11-04 Thread Debian Bug Tracking System

Your message dated Tue, 4 Nov 2008 10:17:38 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Re: #504118: unreproducible
has caused the Debian Bug report #504118,
regarding sbcl: install fails through apt-get but succeeds otherwise
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
504118: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504118
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: sbcl
Version: 1:0.9.16.0-1
Severity: serious
Justification: no longer builds from source

#apt-get install sbcl


 [loading a thousand packages...]


; #
; loading system definition from /usr/lib/sbcl/sb-grovel/sb-grovel.asd into
; #
; loading system definition from /usr/lib/sbcl/sb-grovel/sb-grovel.asd into
; #
; loading system definition from /usr/lib/sbcl/sb-grovel/sb-grovel.asd into
; #
;
; compilation unit aborted
;   caught 1 fatal ERROR condition

Error running init-common-lisp-controller-v4: error opening 
#P"/usr/lib/sbcl/sb-grovel/sb-grovel.asd":
Too many open files
mv: cannot stat `sbcl-new.core': No such file or directory
FAILED

-- System Information: Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-6-686
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages sbcl depends on:
ii  common-lisp-controller 6.9   This is a Common Lisp source and c
ii  libc6  2.3.6.ds1-13etch7 GNU C Library: Shared libraries

Versions of packages sbcl recommends:
pn  binfmt-support (no description available)


--- End Message ---
--- Begin Message ---
On Mon, 3 Nov 2008 21:30:32 +0100 meingbg wrote:

> Now it is unreproducible for me as well.
> 
> Sorry for sending false alarm.

Okay, then I'm closing this bug for now.
Feel free to reopen when you have a case when you can reproduce it.

Regards
Evgeni


pgpvKY7s22Tdw.pgp
Description: PGP signature
--- End Message ---


Bug#503878: fglrx-atieventsd: authatieventsd.sh uses finger without depending on it and is unreliable

2008-11-04 Thread Mark Purcell
On Tuesday 04 November 2008 19:21:17 Romain Beauxis wrote:
> I will try to prepare a fixed package as soon as possible, which means at
> least this week end.

Romain,

Thanks that is great news.

Mark



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504380: (no subject)

2008-11-04 Thread Ed Hein
I've got the same problem on Debian Lenny x86_64.
icecc-monitor 1.1-1 works fine, 1.1-3 cannot find the scheduler.

The scheduler is set up in a different subnet so broadcast won't find it. I'm 
using USE_SCHEDULER to point the monitor to the correct location.

~$ icemon
ignoring localhost lo
broadcast eth0 10.149.111.255
scheduler is on 10.150.32.87:8765 (net )
QSocketNotifier: Invalid socket specified
QSocketNotifier: Internal error
ignoring localhost lo
broadcast eth0 10.149.111.255
ignoring localhost lo
broadcast eth0 10.149.111.255
scheduler is on 10.150.32.87:8765 (net )
QSocketNotifier: Invalid socket specified
QSocketNotifier: Internal error
ignoring localhost lo
broadcast eth0 10.149.111.255
ignoring localhost lo
broadcast eth0 10.149.111.255



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503712: etch->lenny upgrade left the system in broken state

2008-11-04 Thread Mark Purcell
On Tuesday 04 November 2008 18:55:41 Niko Tyni wrote:
> > > On Thu, Oct 30, 2008 at 12:52:28PM +0100, Giovanni Rapagnani wrote:
> > > > On 30/10/08 10:33, Niko Tyni wrote:
> > > > Is this something that needs documentation in the release-notes ?
> > >
> > > I think it would be much better to fix the upgrade path if possible.
[...]
> Clarification: Giovanni isn't the ghostscript maintainer, he
> just reported the issue.

Sorry Giovanni, I did get confused over who was running with this bug.

Masayuki, Torsten, Jonas,

This release critical bug effecting lenny has been in sitting against your 
package since last week without comment from you.

Are you in a position to comment/ prepare a package to fix this issue and help 
the lenny release?

Mark



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Merging #481103 #503713 to fix the same issue at once

2008-11-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 481103 serious
Bug#481103: on upgrade postinstall configuration replaces the modified 
/etc/default/bindgraph
Severity set to `serious' from `important'

> merge 481103 503713
Bug#481103: on upgrade postinstall configuration replaces the modified 
/etc/default/bindgraph
Bug#503713: overwrittes manually modified /etc/default/bindgraph on upgrade
Merged 481103 503713.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: reassign 504457 to xulrunner-1.9, forcibly merging 482415 504457

2008-11-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.10.7~bpo.1
> reassign 504457 xulrunner-1.9
Bug#504457: iceweasel and epiphany crash on starting
Bug reassigned from package `iceweasel' to `xulrunner-1.9'.

> forcemerge 482415 504457
Bug#482415: iceweasel: crashes immediately upon startup
Bug#504457: iceweasel and epiphany crash on starting
Bug#486334: segfault in iceweasel 3.0~rc2-1
Bug#486354: iceweasel: Iceweasel rc2 does not start
Bug#492488: iceweasel: crashes on startup (x64)
Forcibly Merged 482415 486334 486354 492488 504457.

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503712: etch->lenny upgrade left the system in broken state

2008-11-04 Thread Jonas Smedegaard
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Tue, Nov 04, 2008 at 09:17:09PM +1100, Mark Purcell wrote:
>On Tuesday 04 November 2008 18:55:41 Niko Tyni wrote:
>> > > On Thu, Oct 30, 2008 at 12:52:28PM +0100, Giovanni Rapagnani wrote:
>> > > > On 30/10/08 10:33, Niko Tyni wrote:
>> > > > Is this something that needs documentation in the release-notes ?
>> > >
>> > > I think it would be much better to fix the upgrade path if possible.
>[...]
>> Clarification: Giovanni isn't the ghostscript maintainer, he
>> just reported the issue.
>
>Sorry Giovanni, I did get confused over who was running with this bug.
>
>Masayuki, Torsten, Jonas,
>
>This release critical bug effecting lenny has been in sitting against 
>your package since last week without comment from you.
>
>Are you in a position to comment/ prepare a package to fix this issue 
>and help the lenny release?


Thanks for pinging us!

I am now preparing an updated package that makes ghostscript depend on 
gs-common >= 8.62.dfsg.1-3.1.

This means we need to keep the dummy transitional gs-common around until 
Lenny+1 is released, but I see no other way to ensure that the fix for 
#495703 is actually applied.

@Niko: you mention that this would cause a circular dependency. I 
believe that is not the case when the dependency is versioned and newer 
than the versioned conflict.  If I misunderstood, then please elaborate.


Kind regards, and thanks for all the help with this one!

  - Jonas

- -- 
* Jonas Smedegaard - idealist og Internet-arkitekt
* Tlf.: +45 40843136  Website: http://dr.jones.dk/

  [x] quote me freely  [ ] ask before reusing  [ ] keep private
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkQOwYACgkQn7DbMsAkQLgBXgCgoZ/A9N91U7dYPOac1gFWE+Xk
Zs0An2lDgEeL+vC5ucoHKNzgYjD2fDe4
=/v7s
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#345780: Patch for #345780

2008-11-04 Thread Kari Pahula
Attached is a patch for #345780.  RFC 821 says that an implementation
should at least handle text lines of 1000 characters, but it says also
that when possible, an implementation should avoid having these
limits.  These issues happen with lines over 2k long, but even if it
didn't support them, it should return "500 Line too long." and not
just die or litter extra "\r\n" markers in between long lines.

I can NMU but I'd like to have someone review my patch.  This thing
involves far too many buffers to my liking and I'm sure I've missed an
off by one error in there somewhere.
Index: ssmtp-2.62/ssmtp.c
===
--- ssmtp-2.62.orig/ssmtp.c 2008-11-04 14:56:56.0 +0200
+++ ssmtp-2.62/ssmtp.c  2008-11-04 15:05:27.0 +0200
@@ -343,28 +343,26 @@
 /*
 standardise() -- Trim off '\n's and double leading dots
 */
-void standardise(char *str)
+bool_t standardise(char *str, bool_t *linestart)
 {
size_t sl;
char *p;
-
-   if((p = strchr(str, '\n'))) {
-   *p = (char)NULL;
-   }
+   bool_t leadingdot = False;
 
/* Any line beginning with a dot has an additional dot inserted;
-   not just a line consisting solely of a dot. Thus we have to slide
-   the buffer down one */
-   sl = strlen(str);
+   not just a line consisting solely of a dot. Thus we have to move
+   the buffer start up one */
 
-   if(*str == '.') {
-   if((sl + 2) > BUF_SZ) {
-   die("standardise() -- Buffer overflow");
-   }
-   (void)memmove((str + 1), str, (sl + 1));/* Copy 
trailing \0 */
+   if(*linestart && *str == '.') {
+   leadingdot = True;
+   }
+   *linestart = False;
 
-   *str = '.';
+   if((p = strchr(str, '\n'))) {
+   *p = (char)NULL;
+   *linestart = True;
}
+   return(leadingdot);
 }
 
 /*
@@ -1359,12 +1357,12 @@
 */
 ssize_t smtp_write(int fd, char *format, ...)
 {
-   char buf[(BUF_SZ + 1)];
+   char buf[(BUF_SZ + 2)];
va_list ap;
ssize_t outbytes = 0;
 
va_start(ap, format);
-   if(vsnprintf(buf, (BUF_SZ - 2), format, ap) == -1) {
+   if(vsnprintf(buf, (BUF_SZ - 1), format, ap) == -1) {
die("smtp_write() -- vsnprintf() failed");
}
va_end(ap);
@@ -1402,16 +1400,18 @@
 */
 int ssmtp(char *argv[])
 {
-   char buf[(BUF_SZ + 1)], *p, *q;
+   char b[(BUF_SZ + 2)], *buf = b+1, *p, *q;
 #ifdef MD5AUTH
char challenge[(BUF_SZ + 1)];
 #endif
struct passwd *pw;
int i, sock;
uid_t uid;
-   bool_t minus_v_save;
+   bool_t minus_v_save, leadingdot, linestart = True;
int timeout = 0;
+   int bufsize = sizeof(b)-1;
 
+   b[0] = '.';
outbytes = 0;
ht = &headers;
 
@@ -1494,12 +1494,12 @@
}
strncpy(challenge, strchr(buf,' ') + 1, 
sizeof(challenge));
 
-   memset(buf, 0, sizeof(buf));
+   memset(buf, 0, bufsize);
crammd5(challenge, auth_user, auth_pass, buf);
}
else {
 #endif
-   memset(buf, 0, sizeof(buf));
+   memset(buf, 0, bufsize);
to64frombits(buf, auth_user, strlen(auth_user));
if (use_oldauth) {
outbytes += smtp_write(sock, "AUTH LOGIN %s", buf);
@@ -1511,7 +1511,7 @@
die("Server didn't like our AUTH LOGIN (%s)", 
buf);
}
/* we assume server asked us for Username */
-   memset(buf, 0, sizeof(buf));
+   memset(buf, 0, bufsize);
to64frombits(buf, auth_user, strlen(auth_user));
outbytes += smtp_write(sock, buf);
}
@@ -1520,7 +1520,7 @@
if(smtp_read(sock, buf) != 3) {
die("Server didn't accept AUTH LOGIN (%s)", buf);
}
-   memset(buf, 0, sizeof(buf));
+   memset(buf, 0, bufsize);
 
to64frombits(buf, auth_pass, strlen(auth_pass));
 #ifdef MD5AUTH
@@ -1631,7 +1631,7 @@
 
/* don't hang forever when reading from stdin */
while(!feof(stdin) && timeout < MEDWAIT) {
-   if (!fgets(buf, sizeof(buf), stdin)) {
+   if (!fgets(buf, bufsize, stdin)) {
/* if nothing was received, then no transmission
 * over smtp should be done */
sleep(1);
@@ -1639,12 +1639,25 @@
continue;
}
/* Trim off \n, double leading .'s */
-   standardise(buf);
-
-   outbytes += smtp_write(sock, "%s", buf);
+   leadingdot = standardise(buf, &linestart);
 
+  

Bug#504142: any news?

2008-11-04 Thread Neil Williams
This bug is tagged pending but no sign of an upload. I know it's only
been a few days but I'm preparing the RC upload for #502760 which is
virtually identical and I can do this one too if you don't have time.


-- 


Neil Williams
=
http://www.data-freedom.org/
http://www.nosoftwarepatents.com/
http://www.linux.codehelp.co.uk/




signature.asc
Description: This is a digitally signed message part


Processed: setting package to libnss-ldap, tagging 502760

2008-11-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> #libnss-ldap (261-2.1) unstable; urgency=low
> #
> #  * libnss-ldap calls nscd init script w/o checking its existance
> #(Closes: #502760)
> #
> package libnss-ldap
Ignoring bugs not assigned to: libnss-ldap

> tags 502760 + pending
Bug#502760: libnss-ldap calls nscd init script w/o checking its existance
Tags were: patch
Tags added: pending

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504142: Willing to upload

2008-11-04 Thread Neil Williams
Just for the bug report, this is the patch I'd use for the NMU.

I'd like to upload today, along with the fix for #502760.

If you want to make the upload yourself, please ping me on irc
(codehelp) - find me on #debian-uk, #emdebian or #debian-dpkg

-- 


Neil Williams
=
http://www.data-freedom.org/
http://www.nosoftwarepatents.com/
http://www.linux.codehelp.co.uk/


diff -Nru nss-ldapd-0.6.5/debian/changelog nss-ldapd-0.6.5+nmu1/debian/changelog
--- nss-ldapd-0.6.5/debian/changelog	2008-08-22 10:46:55.0 +0100
+++ nss-ldapd-0.6.5+nmu1/debian/changelog	2008-11-04 14:06:32.0 +
@@ -1,3 +1,11 @@
+nss-ldapd (0.6.5+nmu1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * libnss-ldap calls nscd init script w/o checking its existance
+(Closes: #504142)
+
+ -- Neil Williams <[EMAIL PROTECTED]>  Tue, 04 Nov 2008 14:06:28 +
+
 nss-ldapd (0.6.5) unstable; urgency=low
 
   * updated Swedish debconf translation by Martin Ågren (closes: #492910)
diff -Nru nss-ldapd-0.6.5/debian/libnss-ldapd.postinst nss-ldapd-0.6.5+nmu1/debian/libnss-ldapd.postinst
--- nss-ldapd-0.6.5/debian/libnss-ldapd.postinst	2008-11-04 14:03:04.0 +
+++ nss-ldapd-0.6.5+nmu1/debian/libnss-ldapd.postinst	2008-11-04 14:06:59.0 +
@@ -244,7 +244,7 @@
   #   as backup)
   # restart nscd to pick up changes in nsswitch.conf
   # (other processes will have to be restarted manually)
-  if [ -s /usr/sbin/nscd ] && [ `pidof -s nscd` ]
+  if [ -x /etc/init.d/nscd ] && [ `pidof -s nscd` ]
   then
 if which invoke-rc.d >/dev/null 2>&1
 then


signature.asc
Description: This is a digitally signed message part


Bug#504150: marked as done (snmpd: DoS in getbulk handling code in net-snmp)

2008-11-04 Thread Debian Bug Tracking System

Your message dated Tue, 04 Nov 2008 14:02:05 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#504150: fixed in net-snmp 5.4.1~dfsg-11
has caused the Debian Bug report #504150,
regarding snmpd: DoS in getbulk handling code in net-snmp
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
504150: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504150
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: snmpd
Severity: grave
Tags: security, patch
Justification: user security hole

Hi

The following announcement has been released by net-snmp upstream:

SECURITY ISSUE: A bug in the getbulk handling code could let anyone
with even minimal access crash the agent. If you have open access 
to your snmp agents (bad bad bad; stop doing that!) or if you don't 
trust everyone that does have access to your agents you should 
updated immediately to prevent potential denial of service attacks.


You can find the upstream patch here[0], which applies fine to the sid
version.

Once we get a CVE id for this issue, I'll forward it to this bugreport.

For lenny, I guess an upload to sid with high urgency should be sufficient.
I'll email you soon about the stable situation.

Cheers
Steffen

[0]: 
http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-4-2-1/net-snmp/agent/snmp_agent.c?view=patch&r1=17272&r2=17271&pathrev=17272


--- End Message ---
--- Begin Message ---
Source: net-snmp
Source-Version: 5.4.1~dfsg-11

We believe that the bug you reported is fixed in the latest version of
net-snmp, which is due to be installed in the Debian FTP archive:

libsnmp-base_5.4.1~dfsg-11_all.deb
  to pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-11_all.deb
libsnmp-dev_5.4.1~dfsg-11_sparc.deb
  to pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-11_sparc.deb
libsnmp-perl_5.4.1~dfsg-11_sparc.deb
  to pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-11_sparc.deb
libsnmp-python_5.4.1~dfsg-11_sparc.deb
  to pool/main/n/net-snmp/libsnmp-python_5.4.1~dfsg-11_sparc.deb
libsnmp15_5.4.1~dfsg-11_sparc.deb
  to pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-11_sparc.deb
net-snmp_5.4.1~dfsg-11.diff.gz
  to pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-11.diff.gz
net-snmp_5.4.1~dfsg-11.dsc
  to pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-11.dsc
snmp_5.4.1~dfsg-11_sparc.deb
  to pool/main/n/net-snmp/snmp_5.4.1~dfsg-11_sparc.deb
snmpd_5.4.1~dfsg-11_sparc.deb
  to pool/main/n/net-snmp/snmpd_5.4.1~dfsg-11_sparc.deb
tkmib_5.4.1~dfsg-11_all.deb
  to pool/main/n/net-snmp/tkmib_5.4.1~dfsg-11_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jochen Friedrich <[EMAIL PROTECTED]> (supplier of updated net-snmp package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Mon, 03 Nov 2008 17:58:35 +0100
Source: net-snmp
Binary: snmpd snmp libsnmp-base libsnmp15 libsnmp-dev libsnmp-perl 
libsnmp-python tkmib
Architecture: source all sparc
Version: 5.4.1~dfsg-11
Distribution: unstable
Urgency: high
Maintainer: Net-SNMP Packaging Team <[EMAIL PROTECTED]>
Changed-By: Jochen Friedrich <[EMAIL PROTECTED]>
Description: 
 libsnmp-base - SNMP (Simple Network Management Protocol) MIBs and documentation
 libsnmp-dev - SNMP (Simple Network Management Protocol) development files
 libsnmp-perl - SNMP (Simple Network Management Protocol) Perl5 support
 libsnmp-python - SNMP (Simple Network Management Protocol) Python support
 libsnmp15  - SNMP (Simple Network Management Protocol) library
 snmp   - SNMP (Simple Network Management Protocol) applications
 snmpd  - SNMP (Simple Network Management Protocol) agents
 tkmib  - SNMP (Simple Network Management Protocol) MIB browser
Closes: 504150
Changes: 
 net-snmp (5.4.1~dfsg-11) unstable; urgency=high
 .
   * This update fixes the following security issue:
 - CVE-2008-4309: A bug in the getbulk handling code could let anyone
   with even minimal access crash the agent. (Closes: #504150)
Checksums-Sha1: 
 387cce37a2a7a4bedcecec44c671b2ab47bf000f 1783 net-snmp_5.4.1~dfsg-11.dsc
 d6731c778fc5d3f096c330840683b30f81b43a21 82263 net-snmp_5.4.1~dfsg-11.diff.gz
 37b33a3a2922489b9961aa2a94a5589e9552c08e 1369164 
libsnmp-base_5.4.1~dfsg-11_all.deb

Bug#502760: The actual patch

2008-11-04 Thread Neil Williams
I'll make this NMU upload today. Just one more test to run.

-- 


Neil Williams
=
http://www.data-freedom.org/
http://www.nosoftwarepatents.com/
http://www.linux.codehelp.co.uk/


diff -u libnss-ldap-261/debian/libnss-ldap.postinst libnss-ldap-261/debian/libnss-ldap.postinst
--- libnss-ldap-261/debian/libnss-ldap.postinst
+++ libnss-ldap-261/debian/libnss-ldap.postinst
@@ -176,7 +176,7 @@
 	cp -p /etc/ldap.secret /etc/libnss-ldap.secret
 fi
 
-if [ -s /usr/sbin/nscd ]; then
+if [ -x /etc/init.d/nscd ]; then
 	if [ `pidof -s nscd` ]; then 
 		if which invoke-rc.d >/dev/null 2>&1; then
 			invoke-rc.d nscd restart
diff -u libnss-ldap-261/debian/changelog libnss-ldap-261/debian/changelog
--- libnss-ldap-261/debian/changelog
+++ libnss-ldap-261/debian/changelog
@@ -1,3 +1,11 @@
+libnss-ldap (261-2.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * libnss-ldap calls nscd init script w/o checking its existance
+(Closes: #502760)
+
+ -- Neil Williams <[EMAIL PROTECTED]>  Tue, 04 Nov 2008 14:07:23 +
+
 libnss-ldap (261-2) unstable; urgency=low
 
   * Updated nl.po   Closes: #469175


signature.asc
Description: This is a digitally signed message part


Bug#503712: etch->lenny upgrade left the system in broken state

2008-11-04 Thread Jonas Smedegaard
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Tue, Nov 04, 2008 at 09:17:09PM +1100, Mark Purcell wrote:
>On Tuesday 04 November 2008 18:55:41 Niko Tyni wrote:
>> > > On Thu, Oct 30, 2008 at 12:52:28PM +0100, Giovanni Rapagnani wrote:
>> > > > On 30/10/08 10:33, Niko Tyni wrote:
>> > > > Is this something that needs documentation in the release-notes ?
>> > >
>> > > I think it would be much better to fix the upgrade path if possible.
>[...]
>> Clarification: Giovanni isn't the ghostscript maintainer, he
>> just reported the issue.
>
>Sorry Giovanni, I did get confused over who was running with this bug.
>
>Masayuki, Torsten, Jonas,
>
>This release critical bug effecting lenny has been in sitting against your 
>package since last week without comment from you.
>
>Are you in a position to comment/ prepare a package to fix this issue and help 
>the lenny release?


This bug is caused by broken prerm in gs-common in Etch, and occur 
only when removing that package during the Perl 5.8 -> 5.10 transition.

As the bug occurs before reaching Lenny, I see no way to *fix* it in 
Lenny. We can make it less likely to occur, and we can ensure similar 
things won't happen in the future, but to really avoid the bug happening 
we need to apply the bugfix to Etch!


We can...

1) Juggle dependencies to make the bug less likely to occur. 
Specifically this seems to imply creating a circular dependency between 
ghostscript and gs-common, and forcing ghostscript-x (and X11) onto all 
installations of ghostscript.

2) Provide a fixed package in an Etch point release, and (if that is not 
there already since long) add to the upgrade procedures that newest 
point release of stable needs to be installed first.

3) Have aptitude (and, if possible, APT generally) include a hint that 
gs-common should not be auto-removed by default, and add to upgrade 
procedures to install newest aptitude before dist-upgrading.


Comments?

  - Jonas

- -- 
* Jonas Smedegaard - idealist og Internet-arkitekt
* Tlf.: +45 40843136  Website: http://dr.jones.dk/

  [x] quote me freely  [ ] ask before reusing  [ ] keep private
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkQYD8ACgkQn7DbMsAkQLicsQCeMcabhZHH5FbxaAkK4AL68bVc
67IAn2dlYwZaDC8JZBAr0nQat44EzzXO
=pKEe
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504502: btrfs-source - BUG during bonnie

2008-11-04 Thread Bastian Blank
Package: btrfs-source
Version: 0.16-1
Severity: grave

btrfs crashs during the first bonnie run on a -686-bigmem Debian kernel.

| Btrfs v0.16 loaded
| device fsid 5040f1716e8b0b41-88d8a2bd5feac9c devid 1 transid 12 /dev/xvdb
| space info full 1
| space info full 36
| allocation failed flags 36
| [ cut here ]
| kernel BUG at 
[...]/linux-modules-extra-2.6-2.6.26/debian/build/build_i386_none_686-bigmem_btrfs/extent-tree.c:2111!
| invalid opcode:  [#1] SMP
| Modules linked in: btrfs libcrc32c ipv6 evdev joydev xen_netfront pcspkr ext3 
jbd mbcache xen_blkfront thermal_sys
|   
| Pid: 8704, comm: bonnie Not tainted (2.6.26-1-686-bigmem #1)
| EIP: 0061:[] EFLAGS: 00010292 CPU: 0
| EIP is at __btrfs_reserve_extent+0x267/0x2ab [btrfs]
| EAX: 002d EBX: c98e43e4 ECX:  EDX: 
| ESI: c98e43e4 EDI: 0024 EBP:  ESP: ce9a5c14
|  DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0069
| Process bonnie (pid: 8704, ti=ce9a4000 task=cef51a40 task.ti=ce9a4000)
| Stack: d08ba311 0024  ce9d609c c57a7e00 c98e43e4 ce9d6000 c57a7e00
|c98e43e4 ce9a5cdf c98e43e4 d089865d 1000  1000 
|      ce9a5cdf 
| Call Trace:
|  [] btrfs_alloc_extent+0x4c/0x99 [btrfs]
|  [] btrfs_alloc_free_block+0x58/0x83 [btrfs]
|  [] __btrfs_cow_block+0x20f/0x570 [btrfs]
|  [] btrfs_cow_block+0x163/0x16c [btrfs]
|  [] btrfs_search_slot+0x340/0xfab [btrfs]
|  [] btrfs_del_items+0x428/0x432 [btrfs]
|  [] btrfs_inode_ref_index+0x9b/0xa9 [btrfs]
|  [] btrfs_lookup_dir_index_item+0x4e/0x79 [btrfs]
|  [] btrfs_unlink_trans+0x133/0x204 [btrfs]
|  [] btrfs_unlink+0x68/0xa5 [btrfs]
|  [] vfs_unlink+0x8c/0xd7
|  [] do_unlinkat+0xa2/0x136
|  [] xen_evtchn_do_upcall+0xc1/0xf1
|  [] syscall_call+0x7/0xb
|  ===
| Code: 55 57 ff 74 24 34 ff 74 24 34 8b 44 24 1c e8 1e ca ff ff 83 c4 14 e9 50 
fe ff ff 85 c0 74 13 55 57 68 11 a3 8b d0 e8 22 14 89 ef <0f> 0b 83 c4 0c eb fe 
8b 74 24 4c 8b 7c 24 04 8b 16 8b 87 e0 00
| EIP: [] __btrfs_reserve_extent+0x267/0x2ab [btrfs] SS:ESP 
0069:ce9a5c14
| ---[ end trace 2d1c7656a4250c53 ]---

Bastian

-- 
Warp 7 -- It's a law we can live with.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#502760: Please unblock libnss-ldap (RC bug fix)

2008-11-04 Thread Andreas Barth
* Neil Williams ([EMAIL PROTECTED]) [081104 16:03]:
> http://incoming.debian.org/libnss-ldap_261-2.1_amd64.changes
> 
> $ debdiff ../libnss-ldap_261-2.dsc ../libnss-ldap_261-2.1.dsc
> 
> diff -u libnss-ldap-261/debian/libnss-ldap.postinst 
> libnss-ldap-261/debian/libnss-ldap.postinst
> --- libnss-ldap-261/debian/libnss-ldap.postinst
> +++ libnss-ldap-261/debian/libnss-ldap.postinst
> @@ -176,7 +176,7 @@
>   cp -p /etc/ldap.secret /etc/libnss-ldap.secret
>  fi
>  
> -if [ -s /usr/sbin/nscd ]; then
> +if [ -x /etc/init.d/nscd ]; then
>   if [ `pidof -s nscd` ]; then 
>   if which invoke-rc.d >/dev/null 2>&1; then
>   invoke-rc.d nscd restart
> diff -u libnss-ldap-261/debian/changelog libnss-ldap-261/debian/changelog
> --- libnss-ldap-261/debian/changelog
> +++ libnss-ldap-261/debian/changelog
> @@ -1,3 +1,11 @@
> +libnss-ldap (261-2.1) unstable; urgency=low
> +
> +  * Non-maintainer upload.
> +  * libnss-ldap calls nscd init script w/o checking its existance
> +(Closes: #502760)
> +
> + -- Neil Williams <[EMAIL PROTECTED]>  Tue, 04 Nov 2008 14:07:23 +
> +
>  libnss-ldap (261-2) unstable; urgency=low
>  
>* Updated nl.po   Closes: #469175

I doubt that this changes is correct, because /etc/init.d/nscd is an
conffile and isn't removed during remove but only during purge.

You need to check that both the conffile exists plus the binary.



Cheers,
Andi



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503878: [Pkg-fglrx-devel] Bug#503878: fglrx-atieventsd: authatieventsd.sh uses finger without depending on it and is unreliable

2008-11-04 Thread Bertrand Marc

Hi!

I just sent a new version to the svn with a reasonable changelog (based 
on #500077) and the patch for atienventsd. I think it is ready to upload 
to unstable, but I can't test it as I don't have a ATI card anymore...


Regards,
Bertrand

Mark Purcell a écrit :

On Tuesday 04 November 2008 19:21:17 Romain Beauxis wrote:
  

I will try to prepare a fixed package as soon as possible, which means at
least this week end.



Romain,

Thanks that is great news.

Mark



___
Pkg-fglrx-devel mailing list
[EMAIL PROTECTED]
http://lists.alioth.debian.org/mailman/listinfo/pkg-fglrx-devel
  





--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#502760: marked as done (libnss-ldap calls nscd init script w/o checking its existance)

2008-11-04 Thread Debian Bug Tracking System

Your message dated Tue, 04 Nov 2008 15:02:04 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#502760: fixed in libnss-ldap 261-2.1
has caused the Debian Bug report #502760,
regarding libnss-ldap calls nscd init script w/o checking its existance
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
502760: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502760
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: ldapscripts
Version: 1.7.1-2
Severity: serious
User: [EMAIL PROTECTED]
Usertags: piuparts-20081019 piuparts

Hi,

During tests using piuparts of all packages in lenny,
I ran into the following problem:

>   Reading package lists...
>   Building dependency tree...
>   Reading state information...
>   The following packages were automatically installed and are no longer 
> required:
> libgc1c2
>   Use 'apt-get autoremove' to remove them.
>   The following extra packages will be installed:
> adduser ifupdown ldap-utils libdb4.2 libgcrypt11 libgdbm3 libgnutls26
> libgpg-error0 libkeyutils1 libkrb53 libldap-2.4-2 libltdl3 libnss-ldap
> libpam-ldap libperl5.10 libsasl2-2 libsasl2-modules libslp1 libssl0.9.8
> libtasn1-3 libwrap0 net-tools netbase nscd odbcinst1debian1 perl perl-doc
> perl-modules psmisc sharutils slapd tcpd unixodbc
>   Suggested packages:
> iproute dhcp3-client dhcp-client ppp rng-tools gnutls-bin krb5-doc 
> krb5-user
> libsasl2-modules-otp libsasl2-modules-ldap libsasl2-modules-sql
> libsasl2-modules-gssapi-mit libsasl2-modules-gssapi-heimdal slpd 
> openslp-doc
> libterm-readline-gnu-perl libterm-readline-perl-perl man-browser groff 
> mailx
> libmyodbc odbc-postgresql libct1
>   The following NEW packages will be installed:
> adduser ifupdown ldap-utils ldapscripts libdb4.2 libgcrypt11 libgdbm3
> libgnutls26 libgpg-error0 libkeyutils1 libkrb53 libldap-2.4-2 libltdl3
> libnss-ldap libpam-ldap libperl5.10 libsasl2-2 libsasl2-modules libslp1
> libssl0.9.8 libtasn1-3 libwrap0 net-tools netbase nscd odbcinst1debian1 
> perl
> perl-doc perl-modules psmisc sharutils slapd tcpd unixodbc
>   0 upgraded, 34 newly installed, 0 to remove and 0 not upgraded.
>   Need to get 25.2MB of archives.
>   After this operation, 65.8MB of additional disk space will be used.
>   WARNING: The following packages cannot be authenticated!
> libdb4.2 libgpg-error0 libgcrypt11 libtasn1-3 libgnutls26 libsasl2-2
> libldap-2.4-2 libltdl3 libperl5.10 net-tools libslp1 libwrap0
> odbcinst1debian1 unixodbc psmisc perl-modules libgdbm3 perl adduser slapd
> ifupdown libssl0.9.8 netbase tcpd libkeyutils1 libkrb53 sharutils 
> ldap-utils
> libpam-ldap libnss-ldap ldapscripts libsasl2-modules nscd perl-doc
>   Authentication warning overridden.
>   Get:1 http://127.0.0.1 lenny/main libdb4.2 4.2.52+dfsg-5 [401kB]
>   Get:2 http://127.0.0.1 lenny/main libgpg-error0 1.4-2 [34.6kB]
>   Get:3 http://127.0.0.1 lenny/main libgcrypt11 1.4.1-1 [242kB]
>   Get:4 http://127.0.0.1 lenny/main libtasn1-3 1.4-1 [58.7kB]
>   Get:5 http://127.0.0.1 lenny/main libgnutls26 2.4.1-1 [455kB]
>   Get:6 http://127.0.0.1 lenny/main libsasl2-2 2.1.22.dfsg1-23 [106kB]
>   Get:7 http://127.0.0.1 lenny/main libldap-2.4-2 2.4.10-3 [187kB]
>   Get:8 http://127.0.0.1 lenny/main libltdl3 1.5.26-4 [177kB]
>   Get:9 http://127.0.0.1 lenny/main libperl5.10 5.10.0-15 [623kB]
>   Get:10 http://127.0.0.1 lenny/main net-tools 1.60-20 [263kB]
>   Get:11 http://127.0.0.1 lenny/main libslp1 1.2.1-7.4 [51.4kB]
>   Get:12 http://127.0.0.1 lenny/main libwrap0 7.6.q-16 [30.1kB]
>   Get:13 http://127.0.0.1 lenny/main odbcinst1debian1 2.2.11-16 [65.8kB]
>   Get:14 http://127.0.0.1 lenny/main unixodbc 2.2.11-16 [286kB]
>   Get:15 http://127.0.0.1 lenny/main psmisc 22.6-1 [84.7kB]
>   Get:16 http://127.0.0.1 lenny/main perl-modules 5.10.0-15 [3191kB]
>   Get:17 http://127.0.0.1 lenny/main libgdbm3 1.8.3-3 [22.5kB]
>   Get:18 http://127.0.0.1 lenny/main perl 5.10.0-15 [4547kB]
>   Get:19 http://127.0.0.1 lenny/main adduser 3.110 [184kB]
>   Get:20 http://127.0.0.1 lenny/main slapd 2.4.10-3 [1385kB]
>   Get:21 http://127.0.0.1 lenny/main ifupdown 0.6.8+nmu1 [47.2kB]
>   Get:22 http://127.0.0.1 lenny/main libssl0.9.8 0.9.8g-13 [2973kB]
>   Get:23 http://127.0.0.1 lenny/main netbase 4.34 [18.5kB]
>   Get:24 http://127.0.0.1 lenny/main tcpd 7.6.q-16 [78.1kB]
>   Get:25 http://127.0.0.1 lenny/main libkeyutils1 1.2-9 [5584B]
>   Get:26 http://127.0.0.1 lenny/main libkrb53 1.6.dfsg.4~beta1-4 [481kB]
>   Get:27 http://127.0.0.1 lenny/main sharutils 1:4.6.3-1 [206kB]
>   Get

Bug#504142: Willing to upload

2008-11-04 Thread Arthur de Jong

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1



Just for the bug report, this is the patch I'd use for the NMU.

I'd like to upload today, along with the fix for #502760.


I'll do it this evening. I have the same fix pending:
http://arthurenhella.demon.nl/viewcvs/nss-ldapd/nss-ldapd/debian/libnss-ldapd.postinst?rev=789&r1=747&r2=789

(I have some other small updates that I want to include)


If you want to make the upload yourself, please ping me on irc
(codehelp) - find me on #debian-uk, #emdebian or #debian-dpkg


I'm sorry I don't use irc.

- -- 
- -- arthur - [EMAIL PROTECTED] - http://people.debian.org/~adejong --

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFJEGNUVYan35+NCKcRAmoRAJ9w6C1By95LeK8zlG71bKS580ID+ACZAbXK
a1B7qwFCRrxg5Wvp9i9XakY=
=XYDF
-END PGP SIGNATURE-



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#502760: Please unblock libnss-ldap (RC bug fix)

2008-11-04 Thread Bastian Blank
On Tue, Nov 04, 2008 at 04:08:12PM +0100, Andreas Barth wrote:
> I doubt that this changes is correct, because /etc/init.d/nscd is an
> conffile and isn't removed during remove but only during purge.

The initscript have to check this on its own anyway.

Bastian

-- 
We have phasers, I vote we blast 'em!
-- Bailey, "The Corbomite Maneuver", stardate 1514.2



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503878: [Pkg-fglrx-devel] Bug#503878: fglrx-atieventsd: authatieventsd.sh uses finger without depending on it and is unreliable

2008-11-04 Thread Romain Beauxis
Le Tuesday 04 November 2008 16:15:18 Bertrand Marc, vous avez écrit :
> Hi!

Hi !

> I just sent a new version to the svn with a reasonable changelog (based
> on #500077) and the patch for atienventsd. I think it is ready to upload
> to unstable, but I can't test it as I don't have a ATI card anymore...

Problem is that even though we could have considered asking for a testing 
update from sid since fglrx is crappy in any version, I don't know wether it 
is reasonable now, since it would need some decent testing.

The plan could be to fix the package in lenny, as well as uploading a new 
package for sid, wait for the bugs to come, and if it is still possible, 
consider proposing an update.

The issue is that it is quite hard for me to test the hardware now. Actually, 
I don't plan on continuing the maintenance of this package after lenny is 
released.


Romain



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: bug 504258 is forwarded to [EMAIL PROTECTED]

2008-11-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.10.35
> forwarded 504258 [EMAIL PROTECTED]
Bug#504258: CVE-2008-4796: missing input sanitising in embedded copy of 
Snoopy.class.php
Noted your statement that Bug has been forwarded to [EMAIL PROTECTED]

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503633: Status of this RC bug

2008-11-04 Thread Felipe Sateler
On Tue, Nov 4, 2008 at 4:17 AM, Kartik Mistry <[EMAIL PROTECTED]> wrote:
> Hi,
>
> Any update on this bug? tpu prepared? Let me know if I can help/upload this..

There has already been a tpu uploaded, but it failed to build on all archs. I am
not at home, so I can't review the problem until thursday.


-- 

Felipe Sateler



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504200: segmentation violation when running recite

2008-11-04 Thread Sven Joachim
On 2008-11-01 17:32 +0100, [EMAIL PROTECTED] wrote:

> Package: recite
> Version: 1.0-8
> Severity: grave
> Tags: security
> Justification: renders package unusable
>
>
> When running "recite ok", me and two other fairly random lenny users
> get a segmentation violation. Also a fairly random sid user reported
> this problem.

And another fairly random sid user (me) can confirm this as well.
However, when I rebuilt the package to get a backtrace of the segfault,
the crash magically disappeared.

Sven



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: found 502760 in 261-2

2008-11-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> found 502760 261-2
Bug#502760: libnss-ldap calls nscd init script w/o checking its existance
Bug marked as found in version 261-2.

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#439363: reopen, affects etch

2008-11-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> reassign 439363 release.debian.org
Bug#439363: youtube-dl: version in etch useless
Bug reassigned from package `youtube-dl' to `release.debian.org'.

> retitle 439363 RM: youtube-dl/etch -- RoQA; broken
Bug#439363: youtube-dl: version in etch useless
Changed Bug title to `RM: youtube-dl/etch -- RoQA; broken' from `youtube-dl: 
version in etch useless'.

> severity 439363 normal
Bug#439363: RM: youtube-dl/etch -- RoQA; broken
Severity set to `normal' from `grave'

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504167: T60

2008-11-04 Thread Jan Korbel

Hmm after cca 10 compilations i can't resume even with vanilla 2.6.26.6 :(

I'll try another one and 2.6.26.5 too.

J.


smime.p7s
Description: S/MIME Cryptographic Signature


Bug#502760: Please unblock libnss-ldap (RC bug fix)

2008-11-04 Thread Cyril Brulebois
Andreas Barth <[EMAIL PROTECTED]> (04/11/2008):
> I doubt that this changes is correct, because /etc/init.d/nscd is an
> conffile and isn't removed during remove but only during purge.
> 
> You need to check that both the conffile exists plus the binary.

Hmm, that's the init script's job, not the postinst's?

Mraw,
KiBi.


signature.asc
Description: Digital signature


Processed: reopen 504447

2008-11-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> reopen 504447
Bug#504447: xserver-xorg-video-nouveau: fails to install due to 
incompatibilities with current experimental X server
Bug reopened, originator not changed.

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: reopen 504447

2008-11-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> close 504447
Bug#504447: xserver-xorg-video-nouveau: fails to install due to 
incompatibilities with current experimental X server
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug closed, send any further explanations to Eric Valette <[EMAIL PROTECTED]>

> kthxbye
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Bug in libflickr-api-perl fixed in revision 26655

2008-11-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tag 504481 + pending
Bug#504481: [libflickr-api-perl] Flickr API calls fail with 'API returned an 
invalid response' 
Tags were: patch
Tags added: pending

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504481: [libflickr-api-perl] Flickr API calls fail with 'API returned an invalid response'

2008-11-04 Thread gregor herrmann
On Tue, 04 Nov 2008 10:45:10 +, Mark Broadbent wrote:

> This is related to bug #502312.
> It would appear that the XML library used by this code has reverted back 
> to returning 'element' types rather than 'tag' types requiring that the 
> patch used in #502312 be reverted.

Thanks for your bug report.

Your hint 'the XML library used by this code' was good, I indeed
found interesting differences in libxml-parser-lite-tree-perl's
Tree.pm between 0.03 and 0.08 (and 0.08 was uploaded two days ago):
several occurences of

-   'type' => 'tag',
+   'type' => 'element',


I'm going the revert the change from #502312 now and bump the
dependency on libxml-parser-lite-tree-perl.
(Tests with and without the patch from #502312 showed the expected
behaviour.)
 
Cheers,
gregor
-- 
 .''`.   Home: http://info.comodo.priv.at/{,blog/} / GPG Key ID: 0x00F3CFE4
 : :' :  Debian GNU/Linux user, admin, & developer - http://www.debian.org/
 `. `'   Member of VIBE!AT, SPI Inc., fellow of FSFE | http://got.to/quote/
   `-NP: Janis Joplin: Piece Of My Heart


signature.asc
Description: Digital signature


Bug#504481: Bug in libflickr-api-perl fixed in revision 26655

2008-11-04 Thread pkg-perl-maintainers
tag 504481 + pending
thanks

Some bugs are closed in revision 26655
by Gregor Herrmann (gregoa)

Commit message:

Drop patch should_query_for_tags_not_elements, breaks with newer
libxml-parser-lite-tree-perl. Bump versioned dependency on
libxml-parser-lite-tree-perl to >= 0.08. Thanks to Mark Broadbent for the
bug report. Closes: #504481



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: bug 504258 is not forwarded

2008-11-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.10.35
> notforwarded 504258
Bug#504258: CVE-2008-4796: missing input sanitising in embedded copy of 
Snoopy.class.php
Removed annotation that Bug had been forwarded to [EMAIL PROTECTED]

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504511: missing dependency on libaugeas0

2008-11-04 Thread Guido Günther
Package: python-augeas
Version: 0.2.0-1
Severity: grave

Subject says it all:

py> import augeas
Traceback (most recent call last):
  File "", line 1, in 
  File "/var/lib/python-support/python2.5/augeas.py", line 43, in 
class Augeas(object):
  File "/var/lib/python-support/python2.5/augeas.py", line 56, in Augeas
_libaugeas = _dlopen("augeas")
  File "/var/lib/python-support/python2.5/augeas.py", line 48, in _dlopen
if not lib: raise ImportError, "Unable to import lib%s!" % args[0]
ImportError: Unable to import libaugeas!

Any plans to push this into lenny once the bug is fixed?
Cheers,
 -- Guido



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: reopen 504447

2008-11-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> reopen 504447
Bug#504447: xserver-xorg-video-nouveau: fails to install due to 
incompatibilities with current experimental X server
Bug reopened, originator not changed.

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504481: marked as done ([libflickr-api-perl] Flickr API calls fail with 'API returned an invalid response' )

2008-11-04 Thread Debian Bug Tracking System

Your message dated Tue, 04 Nov 2008 17:02:03 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#504481: fixed in libflickr-api-perl 1.01-3
has caused the Debian Bug report #504481,
regarding [libflickr-api-perl] Flickr API calls fail with 'API returned an 
invalid response' 
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
504481: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504481
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---

Package: libflickr-api-perl
Version: 1.01-2
Severity: grave
Tags: patch

--- Please enter the report below this line. ---

This is related to bug #502312.

It would appear that the XML library used by this code has reverted back 
to returning 'element' types rather than 'tag' types requiring that the 
patch used in #502312 be reverted.


Patch below for the reversion:

--- a/API.pm2008-11-04 10:32:38.0 +
+++ b/API.pm2008-11-04 10:32:52.0 +
@@ -135,7 +135,7 @@
sub _find_tag {
my ($self, $children) = @_;
for my $child(@{$children}){
-return $child if $child->{type} eq 'tag';
+return $child if $child->{type} eq 'element';
}
return {};
}


Thanks
Mark


--- System information. ---
Architecture: i386
Kernel: Linux 2.6.26-1-686

Debian Release: lenny/sid
500 unstable ftp.heanet.ie
500 unstable apt-cache.devel.messagelabs.com
500 testing apt-cache.devel.messagelabs.com
500 stable security.debian.org
500 stable apt-cache.devel.messagelabs.com

--- Package information. ---
Depends (Version) | Installed
==-+-==
perl (>= 5.6.0-16) | 5.10.0-17
libxml-parser-lite-tree-perl (>= 0.03-2) | 0.08-1
libwww-perl | 5.813-1
liburi-perl | 1.35.dfsg.1-1


__
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
__



--- End Message ---
--- Begin Message ---
Source: libflickr-api-perl
Source-Version: 1.01-3

We believe that the bug you reported is fixed in the latest version of
libflickr-api-perl, which is due to be installed in the Debian FTP archive:

libflickr-api-perl_1.01-3.diff.gz
  to pool/main/libf/libflickr-api-perl/libflickr-api-perl_1.01-3.diff.gz
libflickr-api-perl_1.01-3.dsc
  to pool/main/libf/libflickr-api-perl/libflickr-api-perl_1.01-3.dsc
libflickr-api-perl_1.01-3_all.deb
  to pool/main/libf/libflickr-api-perl/libflickr-api-perl_1.01-3_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
gregor herrmann <[EMAIL PROTECTED]> (supplier of updated libflickr-api-perl 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 04 Nov 2008 17:56:51 +0100
Source: libflickr-api-perl
Binary: libflickr-api-perl
Architecture: source all
Version: 1.01-3
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group <[EMAIL PROTECTED]>
Changed-By: gregor herrmann <[EMAIL PROTECTED]>
Description: 
 libflickr-api-perl - Perl interface to the Flickr API
Closes: 504481
Changes: 
 libflickr-api-perl (1.01-3) unstable; urgency=low
 .
   * Drop patch should_query_for_tags_not_elements, breaks with newer
 libxml-parser-lite-tree-perl. Bump versioned dependency on
 libxml-parser-lite-tree-perl to >= 0.08. Thanks to Mark Broadbent for the
 bug report. Closes: #504481
   * debian/copyright: refresh formatting, update years of upstream copyright.
   * Set debhelper compatibility level to 7; adapt
 debian/{control,compat,rules}. Drop cdbs from build dependencies.
   * Add /me to Uploaders.
   * Don't install almost empty README any more.
   * debian/watch: extended regexp for matching upstream releases.
Checksums-Sha1: 
 c81b444c3be8a977dd1a1d7bcb41894961f3649f 1492 libflickr-api-perl_1.01-3.dsc
 21cc28013b1b4600a621669ad5373d1cf47907ed 2684 libflickr-api-perl_1.01-3.diff.gz
 1c2e8384426e36a0c240307195f6ee6d97f5 13778 
libflickr-api-perl_1.01-3_all.deb
Checksums-Sha256: 
 f44971b8851e77f335e26f182418a8e5a03365f0bbdf32e1adaf127b8d559d5b 1492 
libflickr-api-per

Bug#504447: Additionnal info

2008-11-04 Thread Eric Valette

Maintainer keeps closing this bug because he claims it is for the
unstable X server but did also deliberately put the package in
experimental instead of unstable.

When I reply that I have X server form experimental installed, he
objects that I do not know of to use apt!

I do explicitly want the 1.5.2 X server that is available in
experimental and I also would like that the experimental package play
nicely with other experimental packages (especially currently when kde4
require experimental!)

Sound too complicated to understand.

And BTW: I do run it already using today's git and have been for quite a
long time but as it is fairly stable it should be made more broadly
available:
- either by putting it in unstable once the new stable is out
- or by making experimental consistent

X.Org X Server 1.5.2   <
Release Date: 10 October 2008
X Protocol Version 11, Revision 0
Build Operating System: Linux 2.6.17.7 x86_64 Debian
Current Operating System: Linux tri-yann3 2.6.27.4 #13 SMP PREEMPT Sun
Oct 26 09:56:37 CET 2008 x86_64
Build Date: 12 October 2008  11:36:41AM

...
(II) LoadModule: "nouveau"
(II) Loading /usr/lib/xorg/modules/drivers//nouveau_drv.so
(II) Module nouveau: vendor="X.Org Foundation"


-- eric




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503005: marked as done (ghc-pkg: dependency hslogger-1.0.5 doesn't exist (use --force to override))

2008-11-04 Thread Debian Bug Tracking System

Your message dated Tue, 04 Nov 2008 17:32:05 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#503005: fixed in missingh 1.0.2.1
has caused the Debian Bug report #503005,
regarding ghc-pkg: dependency hslogger-1.0.5 doesn't exist (use --force to 
override)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
503005: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=503005
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: libghc6-missingh-dev
Version: 1.0.1.0
Severity: important


libghc6-missingh-dev fails to install because it apparently depends on
hslogger-1.0.5 while Debian Sid contains hslogger-1.0.6

> Setting up libghc6-missingh-dev (1.0.1.0) ...
> Reading package info from
> "/usr/lib/haskell-packages/ghc6/lib/MissingH-1.0.1/installed-pkg-config"
> ... done.
> ghc-pkg: dependency hslogger-1.0.5 doesn't exist (use --force to
> override)
> dpkg: error processing libghc6-missingh-dev (--configure):
>  subprocess post-installation script returned error exit status 1

ghc-pkg list output:
> /usr/lib/ghc-6.8.2/package.conf:
> Cabal-1.2.3.0, HTTP-3001.0.4, HUnit-1.2.0.0, QuickCheck-1.1.0.0,
> array-0.1.0.0, base-3.0.1.0, bytestring-0.9.0.1,
> containers-0.1.0.1, directory-1.0.0.0, filepath-1.1.0.0,
> (ghc-6.8.2), haskell98-1.0.1.0, hpc-0.5.0.0, hslogger-1.0.6,
> mtl-1.1.0.0, network-2.1.0.0, old-locale-1.0.0.0, old-time-1.0.0.0,
> packedstring-0.1.0.0, parsec-2.1.0.0, pretty-1.0.0.0,
> process-1.0.0.0, random-1.0.0.0, readline-1.0.1.0,
> regex-base-0.93.1, regex-compat-0.91, regex-posix-0.93.1, rts-1.0,
> template-haskell-2.2.0.0, time-1.1.2.0, unix-2.3.0.0

Either the package should be updated to support hslogger-1.0.6 or
hslogger-1.0.5 should be added as an exact dependency (currently >=1.0.5)


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages libghc6-missingh-dev depends on:
ii  ghc6 [libghc6-unix-dev]   6.8.2-7GHC - the Glasgow Haskell Compilat
ii  libghc6-hslogger-dev  1.0.6.1The Haskell Logging Framework, GHC
ii  libghc6-hunit-dev 1.2.0.0-2  Haskell unit testing framework for
ii  libghc6-mtl-dev   1.1.0.0-2  Haskell monad transformer library 
ii  libghc6-network-dev   2.1.0.0-2  Haskell network library for GHC
ii  libghc6-quickcheck-dev1.1.0.0-2  Haskell automatic testing library 
ii  libghc6-regex-compat-dev  0.91-1 GHC 6 library provinding old Text.

libghc6-missingh-dev recommends no packages.

Versions of packages libghc6-missingh-dev suggests:
pn  missingh-doc   (no description available)

-- no debconf information


--- End Message ---
--- Begin Message ---
Source: missingh
Source-Version: 1.0.2.1

We believe that the bug you reported is fixed in the latest version of
missingh, which is due to be installed in the Debian FTP archive:

libghc6-missingh-dev_1.0.2.1_i386.deb
  to pool/main/m/missingh/libghc6-missingh-dev_1.0.2.1_i386.deb
missingh-doc_1.0.2.1_all.deb
  to pool/main/m/missingh/missingh-doc_1.0.2.1_all.deb
missingh_1.0.2.1.dsc
  to pool/main/m/missingh/missingh_1.0.2.1.dsc
missingh_1.0.2.1.tar.gz
  to pool/main/m/missingh/missingh_1.0.2.1.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
John Goerzen <[EMAIL PROTECTED]> (supplier of updated missingh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 04 Nov 2008 06:21:17 -0600
Source: missingh
Binary: libghc6-missingh-dev missingh-doc
Architecture: source all i386
Version: 1.0.2.1
Distribution: unstable
Urgency: low
Maintainer: John Goerzen <[EMAIL PROTECTED]>
Changed-By: John Goerzen <[EMAIL PROTECTED]>
Description: 
 libghc6-missingh-dev - Library of utility functions for Haskell, GHC6 package
 missingh-doc - Documentation for Haskell utility library
Closes: 503005
Changes: 
 missingh (1.0.2.1) unstable; urgency=low
 .
   * Rebuilt with newer hslogger.  Closes:

Bug#504445: Reported..

2008-11-04 Thread Romain Beauxis
Just for the record: I have contacted upstream about this issue and am waiting 
for his answer.


Romain



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503878: fglrx-atieventsd: authatieventsd.sh uses finger without depending on it and is unreliable

2008-11-04 Thread Bertrand Marc

Hi everyone!

In fact I will patch the SVN very soon. But my computer is dead, so I 
won't be able to test it...


Regards,
Bertrand

Romain Beauxis a écrit :

Le Tuesday 04 November 2008 06:56:33 Mark Purcell, vous avez écrit :
  

On Wednesday 29 October 2008 10:16:21 Luca Niccoli wrote:


I've attached the modified script, to be diffed against the upstream one.
  

Romain & Bertrand,



Hi !

  

This RC bug effecting lenny, with a patch, has been sitting without a
response for a week.

Are you in a position to prepare a fixed package?



I will try to prepare a fixed package as soon as possible, which means at 
least this week end.


Romain
  





--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#502761: Bug#496431: emacspeak UNTESTED patch for Lenny backport

2008-11-04 Thread Christian Perrier
Quoting Kumar Appaiah ([EMAIL PROTECTED]):
> Dear Mark,
> 
> On Tue, Nov 04, 2008 at 04:46:28PM +1100, Mark Purcell wrote:
> > Have you received any feed back on your backport patch to fix #496431 RC 
> > bug in 
> > lenny?
> 
> I have not received any feedback on the patch for 496431. I also don't
> use the package, so I cannot be of much help in testing the backported
> patch. Apologies for this.
> 
> > > I plan to build an NMU unless the maintainer is OK to upload
> > > himself...or find another solution (but, again, hasty debconf
> > > introduction would seem too risky for me) ?
> > 
> > I also see that Christian is proposing to do a NMU as well.  Christian any 
> > progress?

Well, I was mostly proposing this as I noticed this is an apparently
easy to fix RC bug. I don't really have "hard" intent to NMU.

So, I'd very pleased to let this off to someone else.




signature.asc
Description: Digital signature


Bug#504373: Template Toolkit, Template::DBI and Etch updates breakage

2008-11-04 Thread Dominic Hargreaves
On Tue, Nov 04, 2008 at 01:26:35AM +0100, Ansgar Burchardt wrote:
> Gunnar Wolf wrote:
> > However, a big "selling point" for the Template Toolkit has long been
> > the Template::DBI module. Sadly, I believe we are quite a bit late to
> > introduce it into Lenny - But the package could be uploaded into
> > Debian, and basically added straight to lenny-backports as soon as it
> > is available.
> 
> If the Template::DBI module is an important part of Template Toolkit, we
> should avoid regressions *within* Debian instead of referring users to
> backports.  That look more like a work-around for the release process to
> me.
> 
> We should ask the release team if the package could still be allowed for
> Lenny -- the code has already been in Debian before after all and it
> would avoid regressions.  Though I agree it very late, probably too
> late, for this.

It was a deliberate decision not to proactively package Template::DBI
based on the fact that no package used that functionality at the time
(and presumably still doesn't).

If it's now considered essential, then another option would be to
repackage Template::DBI inside the main TT package as a high-urgency
upload (and preparing a package for NEW) if that would make it more
likely to be accepted by the release team.

I am happy to do the work either as a NEW package for lenny or as
described above, if there is consensus.

Dominic.

-- 
Dominic Hargreaves | http://www.larted.org.uk/~dom/
PGP key 5178E2A5 from the.earth.li (keyserver,web,email)



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#468793: marked as done (tokyocabinet - FTBFS: pthread_mutex_lock.c:71: __pthread_mutex_lock: Assertion `mutex->__data.__owner == 0' failed.)

2008-11-04 Thread Debian Bug Tracking System

Your message dated Tue, 04 Nov 2008 18:47:09 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#468793: fixed in glibc 2.7-16
has caused the Debian Bug report #468793,
regarding tokyocabinet - FTBFS: pthread_mutex_lock.c:71: __pthread_mutex_lock: 
Assertion `mutex->__data.__owner == 0' failed.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
468793: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=468793
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: tokyocabinet
Version: 1.1.15-2
Severity: important

There was an error while trying to autobuild your package:

> Automatic build of tokyocabinet_1.1.15-2 on debian-31.osdl.marist.edu by 
> sbuild/s390 98
[...]
> LD_LIBRARY_PATH=.  ./tchmttest typical -rr 1000 casket 5 5 5000
> ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be 
> preloaded: ignored.
> 
>   path=casket  tnum=5  rnum=5  bnum=5000  apow=-1  fpow=-1  opts=0  
> rcnum=0  omode=0  nc=0  rratio=1000
> 
> . (5000)
> . (0001)
> ...tchmttest: pthread_mutex_lock.c:71: __pthread_mutex_lock: Assertion 
> `mutex->__data.__owner == 0' failed.
> make[1]: *** [check] Aborted
> make[1]: Leaving directory `/build/buildd/tokyocabinet-1.1.15'
> make: *** [build-arch-stamp] Error 2
> dpkg-buildpackage: failure: /usr/bin/fakeroot debian/rules binary-arch gave 
> error exit status 2
> **
> Build finished at 20080224-1355
> FAILED [dpkg-buildpackage died]


--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.7-16

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive:

glibc-doc_2.7-16_all.deb
  to pool/main/g/glibc/glibc-doc_2.7-16_all.deb
glibc-source_2.7-16_all.deb
  to pool/main/g/glibc/glibc-source_2.7-16_all.deb
glibc_2.7-16.diff.gz
  to pool/main/g/glibc/glibc_2.7-16.diff.gz
glibc_2.7-16.dsc
  to pool/main/g/glibc/glibc_2.7-16.dsc
libc6-dbg_2.7-16_amd64.deb
  to pool/main/g/glibc/libc6-dbg_2.7-16_amd64.deb
libc6-dev-i386_2.7-16_amd64.deb
  to pool/main/g/glibc/libc6-dev-i386_2.7-16_amd64.deb
libc6-dev_2.7-16_amd64.deb
  to pool/main/g/glibc/libc6-dev_2.7-16_amd64.deb
libc6-i386_2.7-16_amd64.deb
  to pool/main/g/glibc/libc6-i386_2.7-16_amd64.deb
libc6-pic_2.7-16_amd64.deb
  to pool/main/g/glibc/libc6-pic_2.7-16_amd64.deb
libc6-prof_2.7-16_amd64.deb
  to pool/main/g/glibc/libc6-prof_2.7-16_amd64.deb
libc6-udeb_2.7-16_amd64.udeb
  to pool/main/g/glibc/libc6-udeb_2.7-16_amd64.udeb
libc6_2.7-16_amd64.deb
  to pool/main/g/glibc/libc6_2.7-16_amd64.deb
libnss-dns-udeb_2.7-16_amd64.udeb
  to pool/main/g/glibc/libnss-dns-udeb_2.7-16_amd64.udeb
libnss-files-udeb_2.7-16_amd64.udeb
  to pool/main/g/glibc/libnss-files-udeb_2.7-16_amd64.udeb
locales-all_2.7-16_amd64.deb
  to pool/main/g/glibc/locales-all_2.7-16_amd64.deb
locales_2.7-16_all.deb
  to pool/main/g/glibc/locales_2.7-16_all.deb
nscd_2.7-16_amd64.deb
  to pool/main/g/glibc/nscd_2.7-16_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno <[EMAIL PROTECTED]> (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 04 Nov 2008 16:31:04 +0100
Source: glibc
Binary: glibc-doc glibc-source locales locales-all nscd libc6 libc6-dev 
libc6-dbg libc6-prof libc6-pic libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg 
libc6.1-prof libc6.1-pic libc6.1-udeb libc0.3 libc0.3-dev libc0.3-dbg 
libc0.3-prof libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev libc0.1-dbg 
libc0.1-prof libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc64 
libc6-dev-sparc64 libc6-s390x libc6-dev-s390x libc6-amd64 libc6-dev-amd64 
libc6-powerpc libc6-dev-powerpc libc6-ppc64 libc6-dev-ppc64 libc6-mipsn32 
libc6-dev-mipsn32 libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 
libc6-sparcv9b libc6-i686 libc6-xen libc0.1-i686 libc6.1-alphaev67 
libnss-dns-udeb libnss-files-udeb
Architecture: source all amd64
Version: 2.7-16
Distribution: unstable
Urgency: low
Maintainer: Aurelien Jarno <[EMAIL PR

Bug#503645: jhead: CVE-2008-4640, CVE-2008-4641 command injection via filename and insecure file handling

2008-11-04 Thread Bruno De Fraine

Hello Matthias,

On 3-nov-08, at 16:04, Matthias Wandel wrote:

Ok, I have integrated this patch, plus a temp file patch that was  
submitted,
and uploaded it as the head rev copy on the website.  The head rev  
version

number has been changed to 2.85.

I have made sure it works under Windows, and done some quick checks  
under

Linux.

Let me know if its good for you.


I have some problems with the mkstemp on line 352 of jhead.c: this  
will open/create the temp file and return the file descriptor.


- In case of a mistaken command string that involves "&o" but does not  
create an output file (such as "echo &i &o"), jhead will no longer  
detect that no output file is created, and blindly delete the input  
file (possible data loss)

- Shouldn't you close the file descriptor returned by mkstemp?
- Previously, the temp output file was normally never present when the  
command is run, now it is always present. This might break some  
commands strings that previously worked, when commands are used that  
don't overwrite existing files.


(In summary, I think this change should be tested before going in a  
stable Debian release.)


line 379 of jhead.c seems a debug line that should be removed.

Regards,
Bruno



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503645: jhead: CVE-2008-4640, CVE-2008-4641 command injection via filename and insecure file handling

2008-11-04 Thread Matthias Wandel

Ok, I changed the mkstemp back to mktemp.

Sorry about that.

Matthias
- Original Message - 
From: "Bruno De Fraine" <[EMAIL PROTECTED]>

To: "Matthias Wandel" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Tuesday, November 04, 2008 5:13 AM
Subject: Re: Bug#503645: jhead: CVE-2008-4640, CVE-2008-4641 command 
injection via filename and insecure file handling




Hello Matthias,

On 3-nov-08, at 16:04, Matthias Wandel wrote:

Ok, I have integrated this patch, plus a temp file patch that was 
submitted,
and uploaded it as the head rev copy on the website.  The head rev 
version

number has been changed to 2.85.

I have made sure it works under Windows, and done some quick checks 
under

Linux.

Let me know if its good for you.


I have some problems with the mkstemp on line 352 of jhead.c: this  will 
open/create the temp file and return the file descriptor.


- In case of a mistaken command string that involves "&o" but does not 
create an output file (such as "echo &i &o"), jhead will no longer  detect 
that no output file is created, and blindly delete the input  file 
(possible data loss)

- Shouldn't you close the file descriptor returned by mkstemp?
- Previously, the temp output file was normally never present when the 
command is run, now it is always present. This might break some  commands 
strings that previously worked, when commands are used that  don't 
overwrite existing files.


(In summary, I think this change should be tested before going in a 
stable Debian release.)


line 379 of jhead.c seems a debug line that should be removed.

Regards,
Bruno






--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: the pending tag here...

2008-11-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 345780 -pending
Bug#345780: Very long lines with dots
Tags were: pending
Tags removed: pending

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: found #504373 in unstable

2008-11-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> package libtemplate-perl
Ignoring bugs not assigned to: libtemplate-perl

> found 504373 2.20-1
Bug#504373: libtemplate-perl: Upgrade from etch breaks code using DBI plugins
Bug marked as found in version 2.20-1.

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504483: iceweasel hangs when restoring bookmarks

2008-11-04 Thread Mike Hommey
On Tue, Nov 04, 2008 at 12:15:28PM +0100, Oliver Cordes wrote:
> Package: iceweasel
> Version: 3.0.3-3
> Severity: grave
> Justification: renders package unusable
> 
> Hi, after upgrading to iceweasel 3.0 in debian the browser crashed at least 
> 2 times per day. I though it has something to do with faulty plugins which I
> downloaded from the mozilla-plugin website. Friends told me that the same 
> version worked fine for them ... So today I backupd my bookmarks in a 
> json-File
> removed the .mozilla and started from scratch. Then I wanted to restore my 
> bookmarks but before any bookmrk reading can start iceweasel stucked with an
> open dialog box to confirm that I want to overide the existing bookmarks.
> I could only kill iceweasel ...
> 
> Starting from the commandline with PLUGINS disabled I got the following 
> output:

Since pango is involved in your stacktrace, do you happen to have
pango-graphite installed?

Mike



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503712: etch->lenny upgrade left the system in broken state

2008-11-04 Thread Niko Tyni
On Tue, Nov 04, 2008 at 03:01:04PM +0100, Jonas Smedegaard wrote:
> On Tue, Nov 04, 2008 at 02:34:55PM +0200, Niko Tyni wrote:

> >The circular dependency I was referring to is that gs-common already
> >depends on (unversioned) ghostscript, and this introduces the other
> >direction. I'm not sure if that is a problem at all, probably not.

> Circular dependencies are indeed bad, even when tied to same source 
> package. I believe it is not a policy violation (§7.2 even documents how 
> they should be treated), but so tricky to avoid that they are strongly 
> discouraged.

> So this bug really is #495703 wrongly assumed fixed by adding a prerm to 
> gs-common.
>
> @niko: When you proposed to add a dummy prerm script to gs-common, did 
> you then consider enhancing ghostscript instead?

#495703 is about (the more common case of) gs-common 'prerm upgrade',
and the ghostscript binary package isn't involved in that. I don't see
any other fix than the new dummy gs-common prerm.

> Reading Debian Policy §6.8, first few lines, it seems possible to add 
> a (dummy?) abort-remove section to ghostscript.

The abort-remove section that gets run here is the Etch gs-common postinst.

If you're thinking of 'conflictor's-postinst abort-remove in-favour ...',
I believe the conflict there means a file conflict between packages.

> Alternatively, if gs-common dummy prerm is really required, then it 
> needs to always be applied, which means we mandate ghostscript-x on all 
> installations: Old gs-common depended on "any ghostscript", including 
> the X11 driver, and even if the package was not advertised as such, 
> other packages abused that to ensure a working ghostscript without 
> favouring any in particular.
>
> In principle we could ignore that assumption from other packages and 
> simply drop the gs-common dependencies on ghostscript and ghostscript-x, 
> and then file bugreports against packages failing to work. But really 
> that is unacceptable this late in the release process IMHO.

There are only three packages in lenny/sid that Depend on gs-common:
latex-make, page-crunch, zope-textindexng3.

Further, one package (python-epydoc) Recommends it and five packages
(caspar, latex-mk, latexmk, opensched, xapian-omega) Suggest it.

It would seem doable to (for instance) move ghostscript-x from the
gs-common Depends: to Recommends:, and then just check the three packages
above. A quick look says latex-make and page-crunch only need ps2pdf
and zope-textindexng3 needs ps2ascii, in which case -x wouldn't be needed.

On Tue, Nov 04, 2008 at 01:37:27PM +0100, Jonas Smedegaard wrote:

> Adding dependency while preserving conflict does not work: It still 
> allows old gs-common to be removed before installing the newer one.

I think apt/aptitude would not do that if they have the chance to just
upgrade gs-common instead, but basically yes, there are no guarantees
at the dpkg level.

I suppose making all of perl-base+perl+perl-modules conflict with the
old gs-common might work, but that seems really overkill.

On Tue, Nov 04, 2008 at 03:46:24PM +0100, Jonas Smedegaard wrote:

> This bug is caused by broken prerm in gs-common in Etch, and occur 
> only when removing that package during the Perl 5.8 -> 5.10 transition.

> 1) Juggle dependencies to make the bug less likely to occur. 

> 2) Provide a fixed package in an Etch point release, and (if that is not 
> there already since long) add to the upgrade procedures that newest 
> point release of stable needs to be installed first.

While it would certainly be good to fix this is a point release, we
haven't required upgrading through point releases in the past AFAIK,
and I think anyone would have a hard time pushing for that now.

> 3) Have aptitude (and, if possible, APT generally) include a hint that 
> gs-common should not be auto-removed by default, and add to upgrade 
> procedures to install newest aptitude before dist-upgrading.

Hm, that's a novel idea. I doubt the apt/aptitude maintainers would welcome
it, though, and it's still in the 'less likely to occur' category...
-- 
Niko Tyni   [EMAIL PROTECTED]



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503712: etch->lenny upgrade left the system in broken state

2008-11-04 Thread Niko Tyni
On Tue, Nov 04, 2008 at 01:07:34PM +0100, Jonas Smedegaard wrote:

> I am now preparing an updated package that makes ghostscript depend on 
> gs-common >= 8.62.dfsg.1-3.1.

> @Niko: you mention that this would cause a circular dependency. I 
> believe that is not the case when the dependency is versioned and newer 
> than the versioned conflict.  If I misunderstood, then please elaborate.

The circular dependency I was referring to is that gs-common already
depends on (unversioned) ghostscript, and this introduces the other
direction. I'm not sure if that is a problem at all, probably not.
-- 
Niko Tyni   [EMAIL PROTECTED]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#345780: the pending tag here...

2008-11-04 Thread Holger Levsen
tags 345780 -pending
thanks

Hi,

maybe the pending tag was a bit premature, [EMAIL PROTECTED] is working on a 
patch, but 
he just told me the patch he has is not ready yet, so.

I tagged it pending, so that not 10 other people jump at this issue... but 
still, it's not pending _yet_, so I rather remove the tag now.


regards,
Holger


pgpFowgDyXlta.pgp
Description: PGP signature


Bug#503005: ghc-pkg: dependency hslogger-1.0.5 doesn't exist (use --force to override)

2008-11-04 Thread John Goerzen
On Tue, Nov 04, 2008 at 05:28:41PM +1100, Mark Purcell wrote:
> On Wednesday 22 October 2008 05:20:01 Stefan Parviainen wrote:
> > libghc6-missingh-dev fails to install because it apparently depends on
> > hslogger-1.0.5 while Debian Sid contains hslogger-1.0.6
> 
> John,
> 
> This RC bug effecting lenny has been sitting against your package for a week 
> without a comment from you.
> 
> Are you in a position to address this issue with your package?

It's been an extremely busy week for me, but I do intend to make an
upload today.

-- John

> 
> Mark
> 

-- 
John Goerzen
Author, Foundations of Python Network Programming
http://www.amazon.com/exec/obidos/tg/detail/-/1590593715



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: reassign 504526 to libzebra-dev,libpacklib1-dev

2008-11-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> reassign 504526 libzebra-dev,libpacklib1-dev
Bug#504526: libzebra-dev: tries to install file owned by libpacklib1-dev
Bug reassigned from package `libzebra-dev' to `libzebra-dev,libpacklib1-dev'.

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504528: libghc6-configfile-dev: Fails to configure: MissingH-1.0.1 doesn't exist

2008-11-04 Thread Kurt Roeckx
Package: libghc6-configfile-dev
Version: 1.0.4.2
Severity: serious

Hi,

Your package is failing to install with the following error:
Setting up libghc6-configfile-dev (1.0.4.2) ...
Reading package info from 
"/usr/lib/haskell-packages/ghc6/lib/ConfigFile-1.0.4/installed-pkg-config" ...  
done.
ghc-pkg: dependency MissingH-1.0.1 doesn't exist (use --force to override)
dpkg: error processing libghc6-configfile-dev (--configure):
 subprocess post-installation script returned error exit status 1


Kurt




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504373: Template Toolkit, Template::DBI and Etch updates breakage

2008-11-04 Thread Gunnar Wolf
Dominic Hargreaves dijo [Tue, Nov 04, 2008 at 01:07:50PM +]:
> It was a deliberate decision not to proactively package Template::DBI
> based on the fact that no package used that functionality at the time
> (and presumably still doesn't).
> 
> If it's now considered essential, then another option would be to
> repackage Template::DBI inside the main TT package as a high-urgency
> upload (and preparing a package for NEW) if that would make it more
> likely to be accepted by the release team.
> 
> I am happy to do the work either as a NEW package for lenny or as
> described above, if there is consensus.

Umh, IMHO it would be way cleaner and better to make this a new
package. After all, the release team are not robots, and I guess that
making this a clean solution will look much better in their eyes than
clumping (hiding even?) a full module inside this package.

Greetins,

-- 
Gunnar Wolf - [EMAIL PROTECTED] - (+52-55)5623-0154 / 1451-2244
PGP key 1024D/8BB527AF 2001-10-23
Fingerprint: 0C79 D2D1 2C4E 9CE4 5973  F800 D80E F35A 8BB5 27AF



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#393837: marked as done (epiphany-extensions: Unable to edit or delete certificates)

2008-11-04 Thread Debian Bug Tracking System

Your message dated Tue, 04 Nov 2008 19:52:22 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#393837: fixed in epiphany-browser 2.14.3-8
has caused the Debian Bug report #393837,
regarding epiphany-extensions: Unable to edit or delete certificates
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
393837: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=393837
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: epiphany-extensions
Version: 2.14.1.1-1
Severity: important

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

The certificate manager extension is currently unusable. The OK and
Cancel buttons in the Edit Certificate dialog do nothing, and the Delete
Certificate dialog contains no text, only similarly non-functional OK
and Cancel buttons.

- -- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (530, 'testing'), (520, 'unstable'), (510, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.17-2-k7
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)

Versions of packages epiphany-extensions depends on:
ii  epiphany-browser 2.14.3-2Intuitive GNOME web browser
ii  libc62.3.6.ds1-4 GNU C Library: Shared libraries
ii  libgcc1  1:4.1.1-13  GCC support library
ii  libnspr4-0d  1.8.0.7-1   NetScape Portable Runtime Library
ii  libosp5  1.5.2-3 Runtime library for OpenJade group
ii  libpcre3 6.7-1   Perl 5 Compatible Regular Expressi
ii  libxul0d 1.8.0.7-1   Gecko engine library
ii  python-gnome22.12.4-5Python bindings for the GNOME desk
ii  python-gtk2  2.8.6-6 Python bindings for the GTK+ widge
ii  sgml-data2.0.3   common SGML and XML data
ii  w3c-dtd-xhtml1.1-5   W3C eXtensible HyperText Markup La

epiphany-extensions recommends no packages.

- -- no debconf information

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFNW/pshl/216gEHgRAlbMAKDRjS4ou+4hP2qbb6Oc9mptvGCYUQCePtmz
3RDJFD5ZTJIw2QQw9ZMWLWI=
=v8iu
-END PGP SIGNATURE-

--- End Message ---
--- Begin Message ---
Source: epiphany-browser
Source-Version: 2.14.3-8

We believe that the bug you reported is fixed in the latest version of
epiphany-browser, which is due to be installed in the Debian FTP archive:

epiphany-browser-dev_2.14.3-8_all.deb
  to pool/main/e/epiphany-browser/epiphany-browser-dev_2.14.3-8_all.deb
epiphany-browser_2.14.3-8.diff.gz
  to pool/main/e/epiphany-browser/epiphany-browser_2.14.3-8.diff.gz
epiphany-browser_2.14.3-8.dsc
  to pool/main/e/epiphany-browser/epiphany-browser_2.14.3-8.dsc
epiphany-browser_2.14.3-8_amd64.deb
  to pool/main/e/epiphany-browser/epiphany-browser_2.14.3-8_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Josselin Mouette <[EMAIL PROTECTED]> (supplier of updated epiphany-browser 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 28 Oct 2008 13:07:50 +0100
Source: epiphany-browser
Binary: epiphany-browser epiphany-browser-dev
Architecture: source amd64 all
Version: 2.14.3-8
Distribution: stable
Urgency: low
Maintainer: Jordi Mallach <[EMAIL PROTECTED]>
Changed-By: Josselin Mouette <[EMAIL PROTECTED]>
Description: 
 epiphany-browser - Intuitive GNOME web browser
 epiphany-browser-dev - Development files for Epiphany web browser
Closes: 393837
Changes: 
 epiphany-browser (2.14.3-8) stable; urgency=low
 .
   * Backport changes from unstable.
   * debian/certManager.js: this is a custom version of certManager.js
 that doesn’t use deletecert.xul, which doesn’t work because of
 broken argument passing.
   * 21_chrome_certmanager.patch: override certManager.js with the custom
 version.
   * epiphany-browser.install: install it.
   * Closes: #393837. Thanks to Romain Beauxis and Mike Hommey.
Files: 
 077ec3382af60b930229c57ee723d9d3 2056 gnome optional 
epiphany-browser_2.14.3-8.dsc
 7cb5c573320237a9e5e469a7bde2ccc8 19342 gnome optional 
epiphany-b

Bug#421332: marked as done (epiphany-extensions: can't delete certificate using certificate manager)

2008-11-04 Thread Debian Bug Tracking System

Your message dated Tue, 04 Nov 2008 19:52:22 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#393837: fixed in epiphany-browser 2.14.3-8
has caused the Debian Bug report #393837,
regarding epiphany-extensions: can't delete certificate using certificate 
manager
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
393837: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=393837
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: epiphany-extensions
Version: 2.18.1-2
Severity: normal

I have two certificates from Massachusetts Institute of Technology
installed in epiphany, one expired and one active. When I try using the
certificate manager extension to delete the expired certificate
by activating the extension and going to Tools -> Certificate manager,
selecting the correct certificate and clicking the "delete" button, I am
presented with a blank popup window with two buttons. Clicking on the
"OK" button in this window does nothing. In fact, clicking the "cancel"
button in this window also does nothing.


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.18-3-686 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages epiphany-extensions depends on:
ii  epiphany-browser  2.18.1-2   Intuitive GNOME web browser
ii  gconf22.18.0.1-3 GNOME configuration database syste
ii  libc6 2.5-4  GNU C Library: Shared libraries
ii  libgcc1   1:4.1.1-21 GCC support library
ii  libnspr4-0d   4.6.6-3NetScape Portable Runtime Library
ii  libosp5   1.5.2-3Runtime library for OpenJade group
ii  libpcre3  6.7-1  Perl 5 Compatible Regular Expressi
ii  libxul0d  1.8.0.11-4 Gecko engine library
ii  python-elementtree1.2.6-10   Light-weight toolkit for XML proce
ii  python-gnome2 2.18.2-1   Python bindings for the GNOME desk
ii  python-gtk2   2.10.4-2   Python bindings for the GTK+ widge
ii  python-support0.6.3  automated rebuilding support for p
ii  python2.4 2.4.4-4An interactive high-level object-o
ii  sgml-data 2.0.3  common SGML and XML data
ii  w3c-dtd-xhtml 1.1-5  W3C eXtensible HyperText Markup La

epiphany-extensions recommends no packages.

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: epiphany-browser
Source-Version: 2.14.3-8

We believe that the bug you reported is fixed in the latest version of
epiphany-browser, which is due to be installed in the Debian FTP archive:

epiphany-browser-dev_2.14.3-8_all.deb
  to pool/main/e/epiphany-browser/epiphany-browser-dev_2.14.3-8_all.deb
epiphany-browser_2.14.3-8.diff.gz
  to pool/main/e/epiphany-browser/epiphany-browser_2.14.3-8.diff.gz
epiphany-browser_2.14.3-8.dsc
  to pool/main/e/epiphany-browser/epiphany-browser_2.14.3-8.dsc
epiphany-browser_2.14.3-8_amd64.deb
  to pool/main/e/epiphany-browser/epiphany-browser_2.14.3-8_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Josselin Mouette <[EMAIL PROTECTED]> (supplier of updated epiphany-browser 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 28 Oct 2008 13:07:50 +0100
Source: epiphany-browser
Binary: epiphany-browser epiphany-browser-dev
Architecture: source amd64 all
Version: 2.14.3-8
Distribution: stable
Urgency: low
Maintainer: Jordi Mallach <[EMAIL PROTECTED]>
Changed-By: Josselin Mouette <[EMAIL PROTECTED]>
Description: 
 epiphany-browser - Intuitive GNOME web browser
 epiphany-browser-dev - Development files for Epiphany web browser
Closes: 393837
Changes: 
 epiphany-browser (2.14.3-8) stable; urgency=low
 .
   * Backport changes from unstable.
   * debian/certManager.js: this is a custom version of certManager.js
 that doesn’t use deletecert.xul, which doesn’t w

Bug#503005: ghc-pkg: dependency hslogger-1.0.5 doesn't exist (use --force to override)

2008-11-04 Thread Mark Purcell
On Wednesday 05 November 2008 00:24:16 John Goerzen wrote:
> It's been an extremely busy week for me, but I do intend to make an
> upload today.

Thanks John,

Great news.

Mark



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#502824: alevt: diff for NMU version 1:1.6.1-10.2

2008-11-04 Thread Mark Purcell
On Tuesday 04 November 2008 19:08:55 Chris Lamb wrote:
> I have prepared and uploaded it *3* times, both to the SSH queue on
> ravel and via FTP; every time the upload simply disappears.

Thats a bit weird ;-(

Can you upload somewhere else, such as people.debian.org and do you want to 
have someone else to try and upload?

Mark



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503878: [Pkg-fglrx-devel] Bug#503878: fglrx-atieventsd: authatieventsd.sh uses finger without depending on it and is unreliable

2008-11-04 Thread Mark Purcell
On Wednesday 05 November 2008 02:29:52 Romain Beauxis wrote:
> The plan could be to fix the package in lenny, as well as uploading a new
> package for sid, wait for the bugs to come, and if it is still possible,
> consider proposing an update.

Romain & Bertand,

Thanks for your efforts on this.

I would recommend you upload the fixed package to sid, which will give at least 
a 10 day testing period, but the good thing is that this bug will of been 
addressed and we can reassess if further uploads are needed.

Mark



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#496431: emacspeak UNTESTED patch for Lenny backport

2008-11-04 Thread Mark Purcell
On Tuesday 04 November 2008 17:10:08 Kumar Appaiah wrote:
> I have not received any feedback on the patch for 496431. I also don't
> use the package, so I cannot be of much help in testing the backported
> patch. Apologies for this.

Kumar,

If we don't hear back from the maintainer it might be best if you upload your 
NMU which would still give it at least 10 days testing in unstable.

It would be good if you could also incorporate Christian's patch.

Mark



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#499860: marked as done (vlc_0.9.2-1(hppa/experimental): FTBFS: cannot stat `debian/tmp/usr/lib/vlc/misc/libmemcpy3dn_plugin.so')

2008-11-04 Thread Debian Bug Tracking System

Your message dated Tue, 4 Nov 2008 21:50:06 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Re: Bug#499860: vlc_0.9.2-1(hppa/experimental): FTBFS: cannot 
stat `debian/tmp/usr/lib/vlc/misc/libmemcpy3dn_plugin.so'
has caused the Debian Bug report #499860,
regarding vlc_0.9.2-1(hppa/experimental): FTBFS: cannot stat 
`debian/tmp/usr/lib/vlc/misc/libmemcpy3dn_plugin.so'
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
499860: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499860
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: vlc
Version: 0.9.2-1
Severity: serious

Hi,

your package failed to build from source.

| Automatic build of vlc_0.9.2-1 on lofn by sbuild/hppa 98-farm
| Build started at 20080923-0133
| **
| Checking available source versions...
| Fetching source files...
| Reading package lists...
| Building dependency tree...
| Need to get 22.1MB of source archives.
| Get:1 http://sinclair.farm.ftbfs.de experimental/main vlc 0.9.2-1 (dsc) 
[3154B]
| Get:2 http://sinclair.farm.ftbfs.de experimental/main vlc 0.9.2-1 (tar) 
[22.1MB]
| Get:3 http://sinclair.farm.ftbfs.de experimental/main vlc 0.9.2-1 (diff) 
[43.6kB]
| Fetched 22.1MB in 19s (1120kB/s)
| Download complete and in download only mode
| ** Using build dependencies supplied by package:
| Build-Depends: debhelper (>= 6), dh-buildinfo, quilt, nasm, yasm [amd64 
kfreebsd-amd64], gettext, iceape-dev (>= 1.1.9-4), libgl1-mesa-dev, 
liba52-0.7.4-dev, libaa1-dev, libarts1-dev (>= 1.4.2), libasound2-dev (>= 
0.9.0beta10a) [!kfreebsd-i386 !kfreebsd-amd64 !hurd-i386], libaudiofile-dev, 
libavahi-client-dev, libavcodec-dev (>= 0.cvs20060823), libavformat-dev (>= 
0.cvs20060823), libswscale-dev, libcaca-dev (>= 0.99.beta4), libcdio-dev, 
libdvbpsi4-dev, libdvdnav-dev, libdvdread-dev (>= 0.9.5), libesd0-dev, 
libflac-dev (>= 1.1.2-3), libfreetype6-dev, libfribidi-dev, libggi2-dev, 
libglib2.0-0, libgnutls-dev (>= 1.2.8), libhal-dev (>= 0.5.5.1-3) 
[!kfreebsd-i386 !kfreebsd-amd64 !hurd-i386], libid3tag0-dev, libidl0, 
libimlib2-dev, liblircclient-dev, liblivemedia-dev (>= 2008.07.24), 
liblua5.1-0-dev, libmad0-dev, libmatroska-dev (>= 0.8.0), libmodplug-dev, 
libmpcdec-dev, libmpeg2-4-dev, libncurses5-dev, libogg-dev, libpostproc-dev (>= 
0.cvs20060823), libpng12-dev, libpulse-dev, libschroedinger-dev, 
libsmbclient-dev, libsvga1-dev [amd64 i386], libsysfs-dev, libtag1-dev, 
libtar-dev, libtheora-dev, libvcdinfo-dev, libvorbis-dev, libx11-dev, 
libxext-dev, libxpm-dev, libxml2-dev, libxt-dev, libxv-dev, zlib1g-dev, 
libavc1394-dev [!kfreebsd-i386 !kfreebsd-amd64 !hurd-i386], libraw1394-dev 
[!kfreebsd-i386 !kfreebsd-amd64 !hurd-i386], libdc1394-22-dev [!kfreebsd-i386 
!kfreebsd-amd64 !hurd-i386], libnotify-dev, libtwolame-dev (>= 0.3.8), 
libspeex-dev, libsdl-image1.2-dev, libshout3-dev, libqt4-dev, pkg-config, 
qt4-dev-tools, libfaad-dev, libjack-dev
| Checking for already installed source dependencies...
[...]
| dh_install -si --fail-missing --sourcedir=debian/tmp
| failed to open configuration file `/home/buildd/.dpkg.cfg' for reading: 
Permission denied
| failed to open configuration file `/home/buildd/.dpkg.cfg' for reading: 
Permission denied
| failed to open configuration file `/home/buildd/.dpkg.cfg' for reading: 
Permission denied
| cp: cannot stat `debian/tmp/usr/lib/vlc/misc/libmemcpy3dn_plugin.so': No such 
file or directory
| dh_install: command returned error code 256
| make: *** [install] Error 1
| dpkg-buildpackage: failure: /usr/bin/fakeroot debian/rules binary-arch gave 
error exit status 2
| **
| Build finished at 20080923-0348
| FAILED [dpkg-buildpackage died]

Full build log(s): 
http://experimental.ftbfs.de/build.php?&ver=0.9.2-1&pkg=vlc&arch=hppa

Gruesse,
-- 
Frank Lichtenheld <[EMAIL PROTECTED]>
www: http://www.djpig.de/


--- End Message ---
--- Begin Message ---
Package: vlc
Version: 0.9.3-1


> your package failed to build from source.
> | cp: cannot stat `debian/tmp/usr/lib/vlc/misc/libmemcpy3dn_plugin.so': No 
> such file or directory

vlc (0.9.3-1) experimental; urgency=low
[...]
   * vlc-nox.install
 + Be more general for the memcopy modules.
   Fix a FTBFS on non-intel arch (Closes: #499860).
 

Not sure why the bug was not close automatically


-- 
Xtophe

--- End Message ---


Bug#481818: Drop nbsmtp from lenny?

2008-11-04 Thread Marco Rodrigues
Hi!

I agree with KiBi. I think "nbsmtp" is a duplicate of "ssmtp" that is more
active upstream, so it should be removed from lenny until a new upload is done
by maintainer to fix this issue.

Personally, I think it should be removed, we don't need duplicated packages, and
this one doesn't have an official homepage and upstream looks dead.
It also doesn't support SSL, so it does insecure connections by nature.

Thanks

-- 
Marco Rodrigues

http://Marco.Tondela.org



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503712: etch->lenny upgrade left the system in broken state

2008-11-04 Thread Mark Purcell
On Tuesday 04 November 2008 23:37:27 Jonas Smedegaard wrote:
> Adding dependency while preserving conflict does not work: It still
> allows old gs-common to be removed before installing the newer one.

What about a Pre-Depends: gs-common?

I know it is a hack, but it may at least ensure that gs-common  is in a sane 
state before continuing.

Mark



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503645: jhead: CVE-2008-4640, CVE-2008-4641 command injection via filename and insecure file handling

2008-11-04 Thread Matthias Wandel

Oops - I changed it to mktemp and tested it.

Afterwards, I compiled it for linux, and it suggested I change it to 
mkstemp, which I did, but I didn't test it much.


I'll change it back to mktemp.

Matthias
- Original Message - 
From: "Bruno De Fraine" <[EMAIL PROTECTED]>

To: "Matthias Wandel" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Tuesday, November 04, 2008 5:13 AM
Subject: Re: Bug#503645: jhead: CVE-2008-4640, CVE-2008-4641 command 
injection via filename and insecure file handling




Hello Matthias,

On 3-nov-08, at 16:04, Matthias Wandel wrote:

Ok, I have integrated this patch, plus a temp file patch that was 
submitted,
and uploaded it as the head rev copy on the website.  The head rev 
version

number has been changed to 2.85.

I have made sure it works under Windows, and done some quick checks 
under

Linux.

Let me know if its good for you.


I have some problems with the mkstemp on line 352 of jhead.c: this  will 
open/create the temp file and return the file descriptor.


- In case of a mistaken command string that involves "&o" but does not 
create an output file (such as "echo &i &o"), jhead will no longer  detect 
that no output file is created, and blindly delete the input  file 
(possible data loss)

- Shouldn't you close the file descriptor returned by mkstemp?
- Previously, the temp output file was normally never present when the 
command is run, now it is always present. This might break some  commands 
strings that previously worked, when commands are used that  don't 
overwrite existing files.


(In summary, I think this change should be tested before going in a 
stable Debian release.)


line 379 of jhead.c seems a debug line that should be removed.

Regards,
Bruno






--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503712: etch->lenny upgrade left the system in broken state

2008-11-04 Thread Jonas Smedegaard
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Tue, Nov 04, 2008 at 09:17:09PM +1100, Mark Purcell wrote:
>On Tuesday 04 November 2008 18:55:41 Niko Tyni wrote:
>> > > On Thu, Oct 30, 2008 at 12:52:28PM +0100, Giovanni Rapagnani wrote:
>> > > > On 30/10/08 10:33, Niko Tyni wrote:
>> > > > Is this something that needs documentation in the release-notes ?
>> > >
>> > > I think it would be much better to fix the upgrade path if possible.
>[...]
>> Clarification: Giovanni isn't the ghostscript maintainer, he
>> just reported the issue.
>
>Sorry Giovanni, I did get confused over who was running with this bug.
>
>Masayuki, Torsten, Jonas,
>
>This release critical bug effecting lenny has been in sitting against 
>your package since last week without comment from you.
>
>Are you in a position to comment/ prepare a package to fix this issue 
>and help the lenny release?


Adding dependency while preserving conflict does not work: It still 
allows old gs-common to be removed before installing the newer one.


Looking some more...


  - Jonas

- -- 
* Jonas Smedegaard - idealist og Internet-arkitekt
* Tlf.: +45 40843136  Website: http://dr.jones.dk/

  [x] quote me freely  [ ] ask before reusing  [ ] keep private
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkQQgYACgkQn7DbMsAkQLizQACeIN2NE9rg7uGZUhbNu0EVxZSz
xZYAoILcoH+mgF/UOhuq6RVSxWaNmuwJ
=ONPp
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503005: ghc-pkg: dependency hslogger-1.0.5 doesn't exist (use --force to override)

2008-11-04 Thread John Goerzen
Mark Purcell wrote:
> On Wednesday 05 November 2008 00:24:16 John Goerzen wrote:
>> It's been an extremely busy week for me, but I do intend to make an
>> upload today.
> 
> Thanks John,
> 
> Great news.
> 
> Mark
> 
> 
> 

And, in fact, that upload has been made by now.

-- John



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503712: etch->lenny upgrade left the system in broken state

2008-11-04 Thread Jonas Smedegaard
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Niko tyni wrote earlier:
> I wrote earlier:
>> In principle we could ignore that assumption from other packages and 
>> simply drop the gs-common dependencies on ghostscript and 
>> ghostscript-x, and then file bugreports against packages failing to 
>> work. But really that is unacceptable this late in the release 
>> process IMHO.
>
> There are only three packages in lenny/sid that Depend on gs-common: 
> latex-make, page-crunch, zope-textindexng3.

I also only see three packages depending. I did not check all 
architectures, however. And more importantly, I did not check 
build-depends!

Any hint on looking up reverse build-dependencies somehow?


>> Adding dependency while preserving conflict does not work: It still 
>> allows old gs-common to be removed before installing the newer one.
>
> I think apt/aptitude would not do that if they have the chance to just 
> upgrade gs-common instead, but basically yes, there are no guarantees 
> at the dpkg level.

That's the issue here AFAICT: We are dealing with a corner case.


>> 2) Provide a fixed package in an Etch point release, and (if that is 
>> not there already since long) add to the upgrade procedures that 
>> newest point release of stable needs to be installed first.
>
> While it would certainly be good to fix this is a point release, we 
> haven't required upgrading through point releases in the past AFAIK, 
> and I think anyone would have a hard time pushing for that now.

I believe we did so for Linux kernels for Sarge (due to 2.4.x -> 2.6.x
transition for many archs and problems switching from initrd-tools to 
either initramfs-tools or yaird).

And again in Etch we bumped both initramfs-tool and yaird in etchnhalf - 
I haven't checked it out, but expect upgrade instructions to include 
upgrading to etchnhalf before upgrading to Lenny.



>> 3) Have aptitude (and, if possible, APT generally) include a hint 
>> that gs-common should not be auto-removed by default, and add to 
>> upgrade procedures to install newest aptitude before dist-upgrading.
>
> Hm, that's a novel idea.

No, not really. Already exercised for Linux kernels: Have a look on a 
Lenny/Sid at /etc/apt/apt.conf.d/01autoremove :-)


> I doubt the apt/aptitude maintainers would welcome it, though, and 
> it's still in the 'less likely to occur' category...



How about this approach, then: Consider this a corner case, lower to 
some non-RC level and leave it hanging...?


  - Jonas

- -- 
* Jonas Smedegaard - idealist og Internet-arkitekt
* Tlf.: +45 40843136  Website: http://dr.jones.dk/

  [x] quote me freely  [ ] ask before reusing  [ ] keep private
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkQuLoACgkQn7DbMsAkQLjH2gCgm2kpHipw4HrBoePLeYRxe3fY
kjwAn3cdkJ6FjhoZyWhtdgQMa2WULoc7
=ViiG
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503713: Investigating Lenny release blocker bug: #503713

2008-11-04 Thread Sebastiaan Couwenberg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I've been looking in to this bug because I use this package myself too,
and because it is among the RC bugs blocking lenny.

As I wrote in my message to control@ [1], I merged this issue with
#481103 because they report the same issue only for a different version
of the package.

This issue is similar to #433510 reported against mailgraph [2], which
changed the maintainer scripts to only generate the /etc/default/
configuration file if it does not exist and to source it otherwise.

The following section in debian/postinst appears to be the culprit that
changes the /etc/default/bindgraph file, specifically lines 64-70:

[...]
 31 DEFAULTS=/etc/default/bindgraph
[...]
 40 db_get bindgraph/logfile || true
 41 LOGFILE="$RET"
[...]
 52 # Solve #293819
 53 BIND_VER="`dpkg -l bind9 | awk '/^ii/ { print $3; }'`"
 54 if [ -n $BIND_VER ] && dpkg --compare-versions "$BIND_VER"
ge '9.3' ; then
 55 log_ver="bind93" ;
 56 else
 57 log_ver="bind92" ;
 58 fi
 59
 60 if [ ! -f $DEFAULTS ]; then
 61 echo "DNS_LOG=$LOGFILE" > $DEFAULTS
 62 echo "LOG_FORMAT=${log_ver}" >> $DEFAULTS
 63
 64 elif [ -z "`grep $LOGFILE $DEFAULTS`" ]; then
 65 # update log file location
 66 mv $DEFAULTS $DEFAULTS.tmp
 67 grep -v DNS_LOG $DEFAULTS.tmp > $DEFAULTS
 68 echo "DNS_LOG=$LOGFILE" >> $DEFAULTS
 69 rm -f $DEFAULTS.tmp
 70 fi
 71
 72 if [ -n "$2" ]; then
 73 # if we are upgrading, update config :-)
 74 if [ -z "`grep LOG_FORMAT ${DEFAULTS}`" ]; then
 75 echo "LOG_FORMAT=${log_ver}" >> $DEFAULTS
 76 fi
 77 fi
[...]

The Debconf config.dat contains the following for bindgraph/logfile:

Name: bindgraph/logfile
Template: bindgraph/logfile
Value: /var/log/bind9-query.log
Owners: bindgraph

If the value of DNS_LOG in /etc/default/bindgraph does not match the
debconf bindgraph/logfile value, the debconf value is set in
/etc/default/bindgraph.

This logic seems to have been introduced to fix #318458 if I look at the
changelog and bug in question:

bindgraph (0.2a-3) unstable; urgency=high

  * Reconfigure now updates logfile location (Closes: 318458)


I'll have a look to see if the bindgrapg maintainer scripts can be
modified to resemble those of mailgraph to fix this issue and not to
regress the previous issues.

Regards,

Bas


References:

[1]: http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=7;bug=503713
[2]: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=433510

- --
GnuPG: 0x77A975AD
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkkQSh8ACgkQRWRRA3epda2hsgCfSK1EojO8L8mNI44DXg1y5e5S
JzIAn0Hk/aMh/n+clCzKTh+55qGeRbmk
=mXmx
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#490999: kicker: Confirmed

2008-11-04 Thread Modestas Vainius
Hello,

antradienis 04 Lapkritis 2008, Max Dmitrichenko rašė:
> I would gladly help to debug this. But I'm very unfamiliar with KDE.
> Running kicker under gdb is meanless because every time it finishes
> successfuly, but kicker dies somewhere "outside" of gdb.
Try kicker --nofork

-- 
Modestas Vainius <[EMAIL PROTECTED]>



signature.asc
Description: This is a digitally signed message part.


Bug#504457: iceweasel and epiphany crash on starting

2008-11-04 Thread Craig Small
On Tue, Nov 04, 2008 at 07:46:38AM +0100, Mike Hommey wrote:
> I bet /usr/lib/xulrunner-1.9/chrome is an empty directory on your
> system.
Why, it is!

> Remove it, and apt-get install --reinstall xulrunner-1.9.
I did.

And it works!! Thankyou :)

This seems familiar, was this a problem like this a few years ago?  I
remember something about xulrunner and removing a directory.

 - Craig

-- 
Craig Small  GnuPG:1C1B D893 1418 2AF4 45EE  95CB C76C E5AC 12CA DFA5
http://www.enc.com.au/ csmall at : enc.com.au
http://www.debian.org/  Debian GNU/Linux, software should be Free 



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504526: marked as done (libzebra-dev: tries to install file owned by libpacklib1-dev)

2008-11-04 Thread Debian Bug Tracking System

Your message dated Tue, 04 Nov 2008 21:18:40 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#504526: fixed in zebra 0.5+debian-2
has caused the Debian Bug report #504526,
regarding libzebra-dev: tries to install file owned by libpacklib1-dev
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
504526: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504526
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: libzebra-dev
Version: 0.5+debian-1
Severity: serious


Hi,

automatic installation tests of packages that share a file and at the
same time do not conflict by their package dependency relationships has
detected the following problem:


Date: 2008-11-03
Architecture: amd64
Distribution: sid
Command: apt-get --assume-yes --allow-unauthenticated install libpacklib1-dev 
libzebra-dev

Reading package lists...
Building dependency tree...
The following extra packages will be installed:
  cernlib-base cernlib-base-dev cfortran defoma file fontconfig
  fontconfig-config gsfonts liba52-0.7.4 libatk1.0-0 libatk1.0-dev libbz2-dev
  libc6-dev libcairo2 libcairo2-dev libcroco3 libcups2 libdatrie0
  libdirectfb-1.0-0 libdirectfb-dev libdirectfb-extra libdjvulibre-dev
  libdjvulibre-text libdjvulibre21 libexif-dev libexif12 libexpat1
  libexpat1-dev libfontconfig1 libfontconfig1-dev libfreetype6
  libfreetype6-dev libgd2-noxpm libgfortran3 libglib2.0-0 libglib2.0-dev
  libgraphviz-dev libgraphviz4 libgsf-1-114 libgsf-1-common libgtk2.0-0
  libgtk2.0-common libgtk2.0-dev libice-dev libice6 libilmbase-dev libilmbase6
  libjasper-dev libjasper1 libjpeg62 libjpeg62-dev libkernlib1-dev
  libkernlib1-gfortran libkeyutils1 libkrb53 liblcms1 liblcms1-dev libltdl3
  libltdl3-dev libmagic1 libmagick++10 libmagick++9-dev libmagick10
  libmagick9-dev libmpeg3-1 libmpeg3-dev libopenexr-dev libopenexr6
  libpacklib1-gfortran libpango1.0-0 libpango1.0-common libpango1.0-dev
  libpcre3 libpixman-1-0 libpixman-1-dev libpng12-0 libpng12-dev
  libpthread-stubs0 libpthread-stubs0-dev librsvg2-2 librsvg2-dev libsm-dev
  libsm6 libsysfs-dev libsysfs2 libthai-data libthai0 libtiff4 libtiff4-dev
  libtiffxx0c2 libts-0.0-0 libwmf-dev libwmf0.2-7 libx11-6 libx11-data
  libx11-dev libxau-dev libxau6 libxcb-render-util0 libxcb-render-util0-dev
  libxcb-render0 libxcb-render0-dev libxcb-xlib0 libxcb-xlib0-dev libxcb1
  libxcb1-dev libxcomposite-dev libxcomposite1 libxcursor-dev libxcursor1
  libxdamage-dev libxdamage1 libxdmcp-dev libxdmcp6 libxext-dev libxext6
  libxfixes-dev libxfixes3 libxft-dev libxft2 libxi-dev libxi6 libxinerama-dev
  libxinerama1 libxml2 libxml2-dev libxml2-utils libxrandr-dev libxrandr2
  libxrender-dev libxrender1 libxt-dev libxt6 libzebra3 linux-libc-dev perl
  perl-modules pkg-config ttf-dejavu ttf-dejavu-core ttf-dejavu-extra ucf
  x11-common x11proto-composite-dev x11proto-core-dev x11proto-damage-dev
  x11proto-fixes-dev x11proto-input-dev x11proto-kb-dev x11proto-randr-dev
  x11proto-render-dev x11proto-xext-dev x11proto-xinerama-dev xtrans-dev
  zlib1g-dev
Suggested packages:
  vim-addon-manager defoma-doc dfontmgr psfontmgr x-ttcidfont-conf glibc-doc
  manpages-dev libcairo2-doc cups-common libgd-tools libglib2.0-doc
  ocaml-base-nox-3.10.2 ocaml-findlib librsvg2-common libgtk2.0-doc
  libjasper-runtime krb5-doc krb5-user liblcms-utils libtool-doc libwmf-bin
  html2ps libpacklib-lesstif1-dev xterm x-terminal-emulator ttf-kochi-gothic
  ttf-kochi-mincho ttf-thryomanes ttf-baekmuk ttf-arphic-gbsn00lp
  ttf-arphic-bsmi00lp ttf-arphic-gkai00mp ttf-arphic-bkai00mp libpango1.0-doc
  imagemagick librsvg2-bin libwmf-doc libterm-readline-gnu-perl
  libterm-readline-perl-perl
Recommended packages:
  gcc c-compiler gfortran fortran-compiler libft-perl libatk1.0-data
  libglib2.0-data python hicolor-icon-theme libgtk2.0-bin debhelper libtool
  ghostscript xml-core perl-doc
The following NEW packages will be installed:
  cernlib-base cernlib-base-dev cfortran defoma file fontconfig
  fontconfig-config gsfonts liba52-0.7.4 libatk1.0-0 libatk1.0-dev libbz2-dev
  libc6-dev libcairo2 libcairo2-dev libcroco3 libcups2 libdatrie0
  libdirectfb-1.0-0 libdirectfb-dev libdirectfb-extra libdjvulibre-dev
  libdjvulibre-text libdjvulibre21 libexif-dev libexif12 libexpat1
  libexpat1-dev libfontconfig1 libfontconfig1-dev libfreetype6
  libfreetype6-dev libgd2-noxpm libgfortran3 libglib2.0-0 libglib2.0-dev
  libgraphviz-dev libgraphviz4 libgsf-1-114 libgsf-1-common libgtk2.0-0
  libgtk2.0-common libgtk2.0-dev libice-dev libice6 libilmbase-dev libilmbase6
  libjasper-dev libjasper1 libjpeg62 libjpeg62-dev libkern

Bug#504481: [libflickr-api-perl] Flickr API calls fail with 'API returned an invalid response'

2008-11-04 Thread Mark Broadbent

Package: libflickr-api-perl
Version: 1.01-2
Severity: grave
Tags: patch

--- Please enter the report below this line. ---

This is related to bug #502312.

It would appear that the XML library used by this code has reverted back 
to returning 'element' types rather than 'tag' types requiring that the 
patch used in #502312 be reverted.


Patch below for the reversion:

--- a/API.pm2008-11-04 10:32:38.0 +
+++ b/API.pm2008-11-04 10:32:52.0 +
@@ -135,7 +135,7 @@
sub _find_tag {
my ($self, $children) = @_;
for my $child(@{$children}){
-return $child if $child->{type} eq 'tag';
+return $child if $child->{type} eq 'element';
}
return {};
}


Thanks
Mark


--- System information. ---
Architecture: i386
Kernel: Linux 2.6.26-1-686

Debian Release: lenny/sid
500 unstable ftp.heanet.ie
500 unstable apt-cache.devel.messagelabs.com
500 testing apt-cache.devel.messagelabs.com
500 stable security.debian.org
500 stable apt-cache.devel.messagelabs.com

--- Package information. ---
Depends (Version) | Installed
==-+-==
perl (>= 5.6.0-16) | 5.10.0-17
libxml-parser-lite-tree-perl (>= 0.03-2) | 0.08-1
libwww-perl | 5.813-1
liburi-perl | 1.35.dfsg.1-1


__
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
__




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#439363: reopen, affects etch

2008-11-04 Thread Philipp Kern
reassign 439363 release.debian.org
retitle 439363 RM: youtube-dl/etch -- RoQA; broken
severity 439363 normal
thanks

On Tue, Sep 11, 2007 at 03:28:48PM -0400, Robert Edmonds wrote:
> reopen 439363
> retitle 439363 youtube-dl: version in etch useless
> tags 439363 etch
> thanks
> 
> The version of youtube-dl in etch is completely broken due to this bug.

Reassigning to release.debian.org and scheduling it for removal in the
next point release.

Kind regards,
Philipp Kern



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504526: libzebra-dev: tries to install file owned by libpacklib1-dev

2008-11-04 Thread Ralf Treinen
Package: libzebra-dev
Version: 0.5+debian-1
Severity: serious


Hi,

automatic installation tests of packages that share a file and at the
same time do not conflict by their package dependency relationships has
detected the following problem:


Date: 2008-11-03
Architecture: amd64
Distribution: sid
Command: apt-get --assume-yes --allow-unauthenticated install libpacklib1-dev 
libzebra-dev

Reading package lists...
Building dependency tree...
The following extra packages will be installed:
  cernlib-base cernlib-base-dev cfortran defoma file fontconfig
  fontconfig-config gsfonts liba52-0.7.4 libatk1.0-0 libatk1.0-dev libbz2-dev
  libc6-dev libcairo2 libcairo2-dev libcroco3 libcups2 libdatrie0
  libdirectfb-1.0-0 libdirectfb-dev libdirectfb-extra libdjvulibre-dev
  libdjvulibre-text libdjvulibre21 libexif-dev libexif12 libexpat1
  libexpat1-dev libfontconfig1 libfontconfig1-dev libfreetype6
  libfreetype6-dev libgd2-noxpm libgfortran3 libglib2.0-0 libglib2.0-dev
  libgraphviz-dev libgraphviz4 libgsf-1-114 libgsf-1-common libgtk2.0-0
  libgtk2.0-common libgtk2.0-dev libice-dev libice6 libilmbase-dev libilmbase6
  libjasper-dev libjasper1 libjpeg62 libjpeg62-dev libkernlib1-dev
  libkernlib1-gfortran libkeyutils1 libkrb53 liblcms1 liblcms1-dev libltdl3
  libltdl3-dev libmagic1 libmagick++10 libmagick++9-dev libmagick10
  libmagick9-dev libmpeg3-1 libmpeg3-dev libopenexr-dev libopenexr6
  libpacklib1-gfortran libpango1.0-0 libpango1.0-common libpango1.0-dev
  libpcre3 libpixman-1-0 libpixman-1-dev libpng12-0 libpng12-dev
  libpthread-stubs0 libpthread-stubs0-dev librsvg2-2 librsvg2-dev libsm-dev
  libsm6 libsysfs-dev libsysfs2 libthai-data libthai0 libtiff4 libtiff4-dev
  libtiffxx0c2 libts-0.0-0 libwmf-dev libwmf0.2-7 libx11-6 libx11-data
  libx11-dev libxau-dev libxau6 libxcb-render-util0 libxcb-render-util0-dev
  libxcb-render0 libxcb-render0-dev libxcb-xlib0 libxcb-xlib0-dev libxcb1
  libxcb1-dev libxcomposite-dev libxcomposite1 libxcursor-dev libxcursor1
  libxdamage-dev libxdamage1 libxdmcp-dev libxdmcp6 libxext-dev libxext6
  libxfixes-dev libxfixes3 libxft-dev libxft2 libxi-dev libxi6 libxinerama-dev
  libxinerama1 libxml2 libxml2-dev libxml2-utils libxrandr-dev libxrandr2
  libxrender-dev libxrender1 libxt-dev libxt6 libzebra3 linux-libc-dev perl
  perl-modules pkg-config ttf-dejavu ttf-dejavu-core ttf-dejavu-extra ucf
  x11-common x11proto-composite-dev x11proto-core-dev x11proto-damage-dev
  x11proto-fixes-dev x11proto-input-dev x11proto-kb-dev x11proto-randr-dev
  x11proto-render-dev x11proto-xext-dev x11proto-xinerama-dev xtrans-dev
  zlib1g-dev
Suggested packages:
  vim-addon-manager defoma-doc dfontmgr psfontmgr x-ttcidfont-conf glibc-doc
  manpages-dev libcairo2-doc cups-common libgd-tools libglib2.0-doc
  ocaml-base-nox-3.10.2 ocaml-findlib librsvg2-common libgtk2.0-doc
  libjasper-runtime krb5-doc krb5-user liblcms-utils libtool-doc libwmf-bin
  html2ps libpacklib-lesstif1-dev xterm x-terminal-emulator ttf-kochi-gothic
  ttf-kochi-mincho ttf-thryomanes ttf-baekmuk ttf-arphic-gbsn00lp
  ttf-arphic-bsmi00lp ttf-arphic-gkai00mp ttf-arphic-bkai00mp libpango1.0-doc
  imagemagick librsvg2-bin libwmf-doc libterm-readline-gnu-perl
  libterm-readline-perl-perl
Recommended packages:
  gcc c-compiler gfortran fortran-compiler libft-perl libatk1.0-data
  libglib2.0-data python hicolor-icon-theme libgtk2.0-bin debhelper libtool
  ghostscript xml-core perl-doc
The following NEW packages will be installed:
  cernlib-base cernlib-base-dev cfortran defoma file fontconfig
  fontconfig-config gsfonts liba52-0.7.4 libatk1.0-0 libatk1.0-dev libbz2-dev
  libc6-dev libcairo2 libcairo2-dev libcroco3 libcups2 libdatrie0
  libdirectfb-1.0-0 libdirectfb-dev libdirectfb-extra libdjvulibre-dev
  libdjvulibre-text libdjvulibre21 libexif-dev libexif12 libexpat1
  libexpat1-dev libfontconfig1 libfontconfig1-dev libfreetype6
  libfreetype6-dev libgd2-noxpm libgfortran3 libglib2.0-0 libglib2.0-dev
  libgraphviz-dev libgraphviz4 libgsf-1-114 libgsf-1-common libgtk2.0-0
  libgtk2.0-common libgtk2.0-dev libice-dev libice6 libilmbase-dev libilmbase6
  libjasper-dev libjasper1 libjpeg62 libjpeg62-dev libkernlib1-dev
  libkernlib1-gfortran libkeyutils1 libkrb53 liblcms1 liblcms1-dev libltdl3
  libltdl3-dev libmagic1 libmagick++10 libmagick++9-dev libmagick10
  libmagick9-dev libmpeg3-1 libmpeg3-dev libopenexr-dev libopenexr6
  libpacklib1-dev libpacklib1-gfortran libpango1.0-0 libpango1.0-common
  libpango1.0-dev libpcre3 libpixman-1-0 libpixman-1-dev libpng12-0
  libpng12-dev libpthread-stubs0 libpthread-stubs0-dev librsvg2-2 librsvg2-dev
  libsm-dev libsm6 libsysfs-dev libsysfs2 libthai-data libthai0 libtiff4
  libtiff4-dev libtiffxx0c2 libts-0.0-0 libwmf-dev libwmf0.2-7 libx11-6
  libx11-data libx11-dev libxau-dev libxau6 libxcb-render-util0
  libxcb-render-util0-dev libxcb-render0 libxcb-render0-dev libxcb-xlib0
  libxcb-xlib0-dev libxcb1 libxcb1-dev libxcomposite-dev libxcomposite1
  libxcursor-dev libxcursor1 libxdamage-dev l

Bug#503712: etch->lenny upgrade left the system in broken state

2008-11-04 Thread Jonas Smedegaard
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Tue, Nov 04, 2008 at 02:34:55PM +0200, Niko Tyni wrote:
>On Tue, Nov 04, 2008 at 01:07:34PM +0100, Jonas Smedegaard wrote:
>
>> I am now preparing an updated package that makes ghostscript depend on 
>> gs-common >= 8.62.dfsg.1-3.1.
>
>> @Niko: you mention that this would cause a circular dependency. I 
>> believe that is not the case when the dependency is versioned and newer 
>> than the versioned conflict.  If I misunderstood, then please elaborate.
>
>The circular dependency I was referring to is that gs-common already
>depends on (unversioned) ghostscript, and this introduces the other
>direction. I'm not sure if that is a problem at all, probably not.

Thanks for clarifying!

(doh, how did I miss that?)

Circular dependencies are indeed bad, even when tied to same source 
package. I believe it is not a policy violation (§7.2 even documents how 
they should be treated), but so tricky to avoid that they are strongly 
discouraged.


So this bug really is #495703 wrongly assumed fixed by adding a prerm to 
gs-common.

@niko: When you proposed to add a dummy prerm script to gs-common, did 
you then consider enhancing ghostscript instead?

Reading Debian Policy §6.8, first few lines, it seems possible to add 
a (dummy?) abort-remove section to ghostscript.



Alternatively, if gs-common dummy prerm is really required, then it 
needs to always be applied, which means we mandate ghostscript-x on all 
installations: Old gs-common depended on "any ghostscript", including 
the X11 driver, and even if the package was not advertised as such, 
other packages abused that to ensure a working ghostscript without 
favouring any in particular.

In principle we could ignore that assumption from other packages and 
simply drop the gs-common dependencies on ghostscript and ghostscript-x, 
and then file bugreports against packages failing to work. But really 
that is unacceptable this late in the release process IMHO.


I would hate to enforce X11 on all ghostscript installations, so looking 
closer at an alternative solution for the underlying bug#495703 would be 
nice.



  - Jonas

- -- 
* Jonas Smedegaard - idealist og Internet-arkitekt
* Tlf.: +45 40843136  Website: http://dr.jones.dk/

  [x] quote me freely  [ ] ask before reusing  [ ] keep private
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkQVZ8ACgkQn7DbMsAkQLhf2wCfZXUSBi6/6vxMCwkOxVxYGNCG
C1wAn1UVp2n7vgymTH+tTG7Kv4V4SvRC
=npFz
-END PGP SIGNATURE-



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: raise severity

2008-11-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # justification: data loss is RC - this bug makes ssmtp drop some mails (all
> # mails over a certain size...)
> severity 345780 serious
Bug#345780: Very long lines with dots
Severity set to `serious' from `normal'

> tags 345780 +pending
Bug#345780: Very long lines with dots
There were no tags set.
Tags added: pending

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504426: closed by Bastian Blank <[EMAIL PROTECTED]> (Re: Bug#504426: linux-image-2.6.26-1-xen-amd64 does not boot)

2008-11-04 Thread LM Jogbäck
On Mon, Nov 3, 2008 at 10:54 PM, Dave Page <[EMAIL PROTECTED]> wrote:
> On Monday 03 November 2008 21:36:04 Debian Bug Tracking System wrote:
>
>> Their explanation is attached below along with your original report.
>> If this explanation is unsatisfactory and you have not received a
>> better one in a separate message then please contact Bastian Blank
>> <[EMAIL PROTECTED]> by replying to this email.
>
> Installing a linux-image-*-xen* package is all you need to do to get a
> Xen-enabled dom0 on Etch; if it's not that simple on Lenny, I consider that a
> bug.

This is not correct. On Etch (and Lenny) you need to either:
a) Install linux-image-*-xen*  AND xen-hypervisor-*
or
b) Install xen-linux-system* (which depends on both the kernel and the
hypervisor)

This is documented here:
http://wiki.debian.org/Xen#head-ddd7539db0f171b560c15136fb96ee6c5370418e

Best Regards,
/LM



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504426: closed by Bastian Blank <[EMAIL PROTECTED]> (Re: Bug#504426: linux-image-2.6.26-1-xen-amd64 does not boot)

2008-11-04 Thread Dave Page
On Tuesday 04 November 2008 11:27:16 LM Jogbäck wrote:

> This is not correct. On Etch (and Lenny) you need to either:
> a) Install linux-image-*-xen*  AND xen-hypervisor-*
> or
> b) Install xen-linux-system* (which depends on both the kernel and the
> hypervisor)

Would it make sense for the package description for the Xen kernel to mention 
this, or for the package to depend or recommend the full Xen system?

A simple description line reading "If you want to run this kernel as a Xen 
host (dom0), look at the xen-linux-system-2.6.26-1-xen-amd64 package" would 
help.

Dave
-- 
Dave Page <[EMAIL PROTECTED]>
Jabber: [EMAIL PROTECTED]



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503543: changes in postinst from etch -> lenny version

2008-11-04 Thread Sven Hoexter
Ok as it looks to me now the intention of the change in postinst between
etch and lenny was to place the files generated by mktexupd into
/var/lib/texmf/web2c/ptex instead of the /var/lib/texmf/web2c itself.

If that should really happen it looks like the postinst script has to
create the directory by hand or it should be shipped in the package itself.

Looking around on my system it seems that context ships a pdftex diretory
in web2c within the package while e.g. luatex doesn't.

So I'm a bit unsure which the right way is but if nobody else comes up
with something better I'll try to prepare a patch in the next two days
with checks for the existens of the tools and the directory creation.

Sven
-- 
If God passed a mic to me to speak
I'd say stay in bed, world
Sleep in peace
   [The Cardigans - 03:45: No sleep]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504483: iceweasel hangs when restoring bookmarks

2008-11-04 Thread Oliver-Mark Cordes

Hi Mike,

On Tue, 4 Nov 2008, Mike Hommey wrote:


On Tue, Nov 04, 2008 at 12:15:28PM +0100, Oliver Cordes wrote:

Package: iceweasel



[...]
Starting from the commandline with PLUGINS disabled I got the following output:


Since pango is involved in your stacktrace, do you happen to have
pango-graphite installed?

Yes, pango-graphite is installed. I cannot say which package pulled this 
into my machine because I can remove it without removing other packages 
...


Cheers,
Oliver


Mike



--
 (O>  (0-   _o)   -O)
 //\  //\/\\  /\\
 V_/_ V_/_  _\_V _\_V

 Dr. Oliver-M. Cordes   E-Mail:   [EMAIL PROTECTED]
WWW-URL:  http://www.astro.uni-bonn.de/~ocordes/
 Argelander Institut fuer Astronomie
 Universitaet Bonn  Phone:(49) 228 / 73-5656
 Auf dem Huegel 71  Fax:  (49) 228 / 73-3672
 D - 53121 BonnGermany

 Private address: Zukunftsweg 10 , D - 53343 Wachtberg-Villiprott
 Private phone:   (49) 228 / 7482582



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503713: Investigating Lenny release blocker bug: #503713

2008-11-04 Thread José Luis Tallón
Sebastiaan Couwenberg wrote:
> I've been looking in to this bug because I use this package myself too,
> and because it is among the RC bugs blocking lenny.
>
> As I wrote in my message to control@ [1], I merged this issue with
> #481103 because they report the same issue only for a different version
> of the package.
Ok. Thank you for your efforts.

I look forward to your suggestion and/or patch.


Regards,

J.L.




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503712: etch->lenny upgrade left the system in broken state

2008-11-04 Thread Luk Claes
Jonas Smedegaard wrote:
> Niko tyni wrote earlier:
>> I wrote earlier:
>>> In principle we could ignore that assumption from other packages and 
>>> simply drop the gs-common dependencies on ghostscript and 
>>> ghostscript-x, and then file bugreports against packages failing to 
>>> work. But really that is unacceptable this late in the release 
>>> process IMHO.
>> There are only three packages in lenny/sid that Depend on gs-common: 
>> latex-make, page-crunch, zope-textindexng3.
> 
> I also only see three packages depending. I did not check all 
> architectures, however. And more importantly, I did not check 
> build-depends!
> 
> Any hint on looking up reverse build-dependencies somehow?

dak rm -Rn -s testing ghostscript|grep build-dependency|grep gs-common

Cheers

Luk



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#490999: kicker: Confirmed

2008-11-04 Thread Max Dmitrichenko
Thanks Modestas!

Running kicker --nofork under gdb produces the same crash with SIGBUS.
Tested several times - backtrace doesn't differ except for object
addresses. GDB's backtrace is attached.

What's next? Is there a way to build only kicker from sources? Not
necessary to build a package. Rebuilding the whole kdebase on my sparc
will last 6-10 hours :(

--
  Max



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503712: etch->lenny upgrade left the system in broken state

2008-11-04 Thread Jonas Smedegaard
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Wed, Nov 05, 2008 at 07:52:26AM +1100, Mark Purcell wrote:
>On Tuesday 04 November 2008 23:37:27 Jonas Smedegaard wrote:
>> Adding dependency while preserving conflict does not work: It still
>> allows old gs-common to be removed before installing the newer one.
>
>What about a Pre-Depends: gs-common?
>
>I know it is a hack, but it may at least ensure that gs-common is in a 
>sane state before continuing.

The problem is not the state of gs-common before installing ghostscript. 
It is the state of Perl before removing gs-common.

Yes, we can minimize the risk of gs-common being removed during the Perl 
transition, not by pre-depending instead of depending, but by not 
conflicting on it at all, and depend depend on (a recent version of) it.

Problem with this is we are then stuck with gs-common until Lenny+1.

...which makes two other issues suddently quite relevant to resolve too: 
gs-common currently depends on both ghostscript and ghostscript-x, so...

1) Having ghostscript depend on gs-common creates a circular dependency

2) Having ghostscript depend on gs-common indirectly makes it depend on 
ghostsript-x, making the separation of ghostscript and ghostscript-x a 
joke. For 2 distro releases forward.

Both these issues due to this corner case of gs-common in some cases 
being removed during upgrade. :-P



  - Jonas

- -- 
* Jonas Smedegaard - idealist og Internet-arkitekt
* Tlf.: +45 40843136  Website: http://dr.jones.dk/

  [x] quote me freely  [ ] ask before reusing  [ ] keep private
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkQv14ACgkQn7DbMsAkQLic/QCcCH7XE9j+3po17YJCq7ao4AlW
TxUAoJeywp5htsP/zYri9eaNMw9/bK3n
=OT1N
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#503712: etch->lenny upgrade left the system in broken state

2008-11-04 Thread Jonas Smedegaard
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Tue, Nov 04, 2008 at 11:09:18PM +0100, Luk Claes wrote:
>Jonas Smedegaard wrote:
>> Niko tyni wrote earlier:
>>> I wrote earlier:
 In principle we could ignore that assumption from other packages and 
 simply drop the gs-common dependencies on ghostscript and 
 ghostscript-x, and then file bugreports against packages failing to 
 work. But really that is unacceptable this late in the release 
 process IMHO.
>>> There are only three packages in lenny/sid that Depend on gs-common: 
>>> latex-make, page-crunch, zope-textindexng3.
>> 
>> I also only see three packages depending. I did not check all 
>> architectures, however. And more importantly, I did not check 
>> build-depends!
>> 
>> Any hint on looking up reverse build-dependencies somehow?
>
>dak rm -Rn -s testing ghostscript|grep build-dependency|grep gs-common

Thanks, but...

I suspect I need to run that command on a Debian host (unlike rmadison) 
right?

Which host - I tried debian.org (gluck) and alioth.debian.org but none 
of them have dak installed.

Or am I completely missing the point here?


  - Jonas


- -- 
* Jonas Smedegaard - idealist og Internet-arkitekt
* Tlf.: +45 40843136  Website: http://dr.jones.dk/

  [x] quote me freely  [ ] ask before reusing  [ ] keep private
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkQy0oACgkQn7DbMsAkQLgtvgCgopDV+/3G7zomOGvh+BIP/+LO
JoYAoJvpOG3WMmlsKitJsmkexKKXeesS
=geOs
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504142: marked as done (libnss-ldap calls nscd init script w/o checking its existance)

2008-11-04 Thread Debian Bug Tracking System

Your message dated Tue, 04 Nov 2008 22:02:02 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#504142: fixed in nss-ldapd 0.6.6
has caused the Debian Bug report #504142,
regarding libnss-ldap calls nscd init script w/o checking its existance
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
504142: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504142
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: ldapscripts
Version: 1.7.1-2
Severity: serious
User: [EMAIL PROTECTED]
Usertags: piuparts-20081019 piuparts

Hi,

During tests using piuparts of all packages in lenny,
I ran into the following problem:

>   Reading package lists...
>   Building dependency tree...
>   Reading state information...
>   The following packages were automatically installed and are no longer 
> required:
> libgc1c2
>   Use 'apt-get autoremove' to remove them.
>   The following extra packages will be installed:
> adduser ifupdown ldap-utils libdb4.2 libgcrypt11 libgdbm3 libgnutls26
> libgpg-error0 libkeyutils1 libkrb53 libldap-2.4-2 libltdl3 libnss-ldap
> libpam-ldap libperl5.10 libsasl2-2 libsasl2-modules libslp1 libssl0.9.8
> libtasn1-3 libwrap0 net-tools netbase nscd odbcinst1debian1 perl perl-doc
> perl-modules psmisc sharutils slapd tcpd unixodbc
>   Suggested packages:
> iproute dhcp3-client dhcp-client ppp rng-tools gnutls-bin krb5-doc 
> krb5-user
> libsasl2-modules-otp libsasl2-modules-ldap libsasl2-modules-sql
> libsasl2-modules-gssapi-mit libsasl2-modules-gssapi-heimdal slpd 
> openslp-doc
> libterm-readline-gnu-perl libterm-readline-perl-perl man-browser groff 
> mailx
> libmyodbc odbc-postgresql libct1
>   The following NEW packages will be installed:
> adduser ifupdown ldap-utils ldapscripts libdb4.2 libgcrypt11 libgdbm3
> libgnutls26 libgpg-error0 libkeyutils1 libkrb53 libldap-2.4-2 libltdl3
> libnss-ldap libpam-ldap libperl5.10 libsasl2-2 libsasl2-modules libslp1
> libssl0.9.8 libtasn1-3 libwrap0 net-tools netbase nscd odbcinst1debian1 
> perl
> perl-doc perl-modules psmisc sharutils slapd tcpd unixodbc
>   0 upgraded, 34 newly installed, 0 to remove and 0 not upgraded.
>   Need to get 25.2MB of archives.
>   After this operation, 65.8MB of additional disk space will be used.
>   WARNING: The following packages cannot be authenticated!
> libdb4.2 libgpg-error0 libgcrypt11 libtasn1-3 libgnutls26 libsasl2-2
> libldap-2.4-2 libltdl3 libperl5.10 net-tools libslp1 libwrap0
> odbcinst1debian1 unixodbc psmisc perl-modules libgdbm3 perl adduser slapd
> ifupdown libssl0.9.8 netbase tcpd libkeyutils1 libkrb53 sharutils 
> ldap-utils
> libpam-ldap libnss-ldap ldapscripts libsasl2-modules nscd perl-doc
>   Authentication warning overridden.
>   Get:1 http://127.0.0.1 lenny/main libdb4.2 4.2.52+dfsg-5 [401kB]
>   Get:2 http://127.0.0.1 lenny/main libgpg-error0 1.4-2 [34.6kB]
>   Get:3 http://127.0.0.1 lenny/main libgcrypt11 1.4.1-1 [242kB]
>   Get:4 http://127.0.0.1 lenny/main libtasn1-3 1.4-1 [58.7kB]
>   Get:5 http://127.0.0.1 lenny/main libgnutls26 2.4.1-1 [455kB]
>   Get:6 http://127.0.0.1 lenny/main libsasl2-2 2.1.22.dfsg1-23 [106kB]
>   Get:7 http://127.0.0.1 lenny/main libldap-2.4-2 2.4.10-3 [187kB]
>   Get:8 http://127.0.0.1 lenny/main libltdl3 1.5.26-4 [177kB]
>   Get:9 http://127.0.0.1 lenny/main libperl5.10 5.10.0-15 [623kB]
>   Get:10 http://127.0.0.1 lenny/main net-tools 1.60-20 [263kB]
>   Get:11 http://127.0.0.1 lenny/main libslp1 1.2.1-7.4 [51.4kB]
>   Get:12 http://127.0.0.1 lenny/main libwrap0 7.6.q-16 [30.1kB]
>   Get:13 http://127.0.0.1 lenny/main odbcinst1debian1 2.2.11-16 [65.8kB]
>   Get:14 http://127.0.0.1 lenny/main unixodbc 2.2.11-16 [286kB]
>   Get:15 http://127.0.0.1 lenny/main psmisc 22.6-1 [84.7kB]
>   Get:16 http://127.0.0.1 lenny/main perl-modules 5.10.0-15 [3191kB]
>   Get:17 http://127.0.0.1 lenny/main libgdbm3 1.8.3-3 [22.5kB]
>   Get:18 http://127.0.0.1 lenny/main perl 5.10.0-15 [4547kB]
>   Get:19 http://127.0.0.1 lenny/main adduser 3.110 [184kB]
>   Get:20 http://127.0.0.1 lenny/main slapd 2.4.10-3 [1385kB]
>   Get:21 http://127.0.0.1 lenny/main ifupdown 0.6.8+nmu1 [47.2kB]
>   Get:22 http://127.0.0.1 lenny/main libssl0.9.8 0.9.8g-13 [2973kB]
>   Get:23 http://127.0.0.1 lenny/main netbase 4.34 [18.5kB]
>   Get:24 http://127.0.0.1 lenny/main tcpd 7.6.q-16 [78.1kB]
>   Get:25 http://127.0.0.1 lenny/main libkeyutils1 1.2-9 [5584B]
>   Get:26 http://127.0.0.1 lenny/main libkrb53 1.6.dfsg.4~beta1-4 [481kB]
>   Get:27 http://127.0.0.1 lenny/main sharutils 1:4.6.3-1 [206kB]
>   Get:28 

Bug#503712: etch->lenny upgrade left the system in broken state

2008-11-04 Thread Adam D. Barratt
On Tue, 2008-11-04 at 23:23 +0100, Jonas Smedegaard wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> On Tue, Nov 04, 2008 at 11:09:18PM +0100, Luk Claes wrote:
> >Jonas Smedegaard wrote:
[...]
> >> Any hint on looking up reverse build-dependencies somehow?
> >
> >dak rm -Rn -s testing ghostscript|grep build-dependency|grep gs-common
> 
> Thanks, but...
> 
> I suspect I need to run that command on a Debian host (unlike rmadison) 
> right?
> 
> Which host - I tried debian.org (gluck) and alioth.debian.org but none 
> of them have dak installed.

merkel has a projectb (the dak database) mirror and a copy of dak.

Regards,

Adam



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504483: iceweasel hangs when restoring bookmarks

2008-11-04 Thread Oliver Cordes
Package: iceweasel
Version: 3.0.3-3
Severity: grave
Justification: renders package unusable

Hi, after upgrading to iceweasel 3.0 in debian the browser crashed at least 
2 times per day. I though it has something to do with faulty plugins which I
downloaded from the mozilla-plugin website. Friends told me that the same 
version worked fine for them ... So today I backupd my bookmarks in a json-File
removed the .mozilla and started from scratch. Then I wanted to restore my 
bookmarks but before any bookmrk reading can start iceweasel stucked with an
open dialog box to confirm that I want to overide the existing bookmarks.
I could only kill iceweasel ...

Starting from the commandline with PLUGINS disabled I got the following output:

env MOZILLA_DISABLE_PLUGINS=1 iceweasel

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Invalid borders specified for theme pixmap:
/user3/ocordes/.themes/AquaX/gtk-2.0/entry1.png,
borders don't fit within the image

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Invalid borders specified for theme pixmap:
/user3/ocordes/.themes/AquaX/gtk-2.0/entry2.png,
borders don't fit within the image

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment

** (firefox-bin:31634): WARNING **: Exception in gr::RangeSegment
*** glibc detected *** /usr/lib/iceweasel/firefox-bin: realloc(): invalid next 
size: 0x02bbd8b0 ***
=== Backtrace: =
/lib/libc.so.6[0x2b1a0b8be948]
/lib/libc.so.6[0x2b1a0b8c2541]
/lib/libc.so.6(realloc+0x12f)[0x2b1a0b8c2fbf]
/usr/lib/libglib-2.0.so.0(g_realloc+0x2e)[0x2b1a0fcceaae]
/usr/lib/libpango-1.0.so.0(pango_glyph_string_set_size+0x78)[0x2b1a0f363968]
/usr/lib/pango/1.6.0/modules/pango-basic-fc.so[0x2c53836a]
/usr/lib/libpango-1.0.so.0(pango_shape+0x4a)[0x2b1a0f37a4ea]
/usr/lib/iceweasel/xulrunner/libxul.so(_ZN17gfxPangoFontGroup24CreateGlyphRunsItemizingEP10gfxTextRunPKcjj+0x1ff)[0x2b1a0cbd6529]
/usr/lib/iceweasel/xulrunner/libxul.so(_ZN17gfxPangoFontGroup11MakeTextRunEPKtjPKN17gfxTextRunFactory10ParametersEj+0x11e)[0x2b1a0cbd68d4]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0cbd2be8]
/usr/lib/iceweasel/xulrunner/libxul.so(_ZN15gfxTextRunCache11MakeTextRunEPKtjP12gfxFontGroupP10gfxContextjj+0x39)[0x2b1a0cbd17d3]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0cb0ac3a]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0cb0a07a]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0cbbe3b6]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0c5c1584]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0c6b1802]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0c6b185f]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0c6b193d]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0c6a538d]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0c6a446a]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0c6ba280]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0c6a538d]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0c6a446a]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0c6a538d]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0c6a446a]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0c5f8edb]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0c6a538d]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0c6a446a]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0c6a538d]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0c6a446a]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0c6a538d]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0c6a446a]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0c6ba36c]
/usr/lib/iceweasel/xulrunner/libxul.so[0x2b1a0c6a2bc1]
/usr/lib/iceweasel/xulrunner/libxul.so

Bug#498965: marked as done (dbus_bus_get(): An SELinux policy prevents this sender from sending this message to this recipient)

2008-11-04 Thread Debian Bug Tracking System

Your message dated Wed, 5 Nov 2008 00:40:21 +0200
with message-id <[EMAIL PROTECTED]>
and subject line Re: Reproducibility of the hal selinux bug
has caused the Debian Bug report #498965,
regarding dbus_bus_get(): An SELinux policy prevents this sender from sending 
this message to this recipient
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
498965: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498965
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: selinux-policy-default
Version: 2:0.0.20080702-7
Severity: critical
Justification: breaks unrelated software

Hello,

It seems that some SELinux policy prevents hal from starting:


bounty:/# invoke-rc.d hal start
Starting Hardware abstraction layer: haldinvoke-rc.d: initscript hal,
action "start" failed.

bounty:/# hald --daemon=no --verbose=yes
00:08:02.145 [I] hald.c:669: hal 0.5.11
00:08:02.145 [I] hald.c:734: Will not daemonize
00:08:02.145 [I] hald_dbus.c:5381: local server is listening at
unix:abstract=/var/run/hald/dbus-Taiqx8gvk9,guid=e5eb7f12c69f20514e282eea48cd7d32
00:08:02.147 [E] hald_dbus.c:5747: dbus_bus_get(): An SELinux policy
prevents this sender from sending this message to this recipient
(rejected message had interface "org.freedesktop.DBus" member "Hello"
error name "(unset)" destination "org.freedesktop.DBus")


It seems the problems appeared after upgrading these (related) packages:

2008-09-14 17:30:24 upgrade hal 0.5.11-2 0.5.11-3
2008-09-14 21:35:38 upgrade libhal1 0.5.11-2 0.5.11-3
2008-09-14 21:35:38 upgrade libhal-storage1 0.5.11-2 0.5.11-3
2008-09-14 22:50:52 upgrade pulseaudio-module-hal 0.9.10-2 0.9.10-3

2008-09-14 17:30:30 upgrade selinux-utils 2.0.65-2 2.0.65-4
2008-09-14 17:30:31 upgrade setools 2.4-3 3.3.5.ds-1

2008-09-14 21:35:26 upgrade libselinux1-dev 2.0.65-2 2.0.65-4
2008-09-14 21:35:27 upgrade libselinux1 2.0.65-2 2.0.65-4


I tried upgrading to more recent versions from sid, but I have the same
issue:

2008-09-14 23:51:06 upgrade selinux-policy-default 2:0.0.20080702-6
2:0.0.20080702-7
2008-09-14 23:51:10 upgrade setools 3.3.5.ds-1 3.3.5.ds-3
2008-09-14 23:51:11 upgrade libsetools-tcl 3.3.5.ds-1 3.3.5.ds-3
2008-09-14 23:51:14 upgrade selinux-basics 0.3.3+nmu4 0.3.4



-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (900, 'testing'), (500, 'stable'), (10, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=ro_RO.UTF-8, LC_CTYPE=ro_RO.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages selinux-policy-default depends on:
ii  libpam-modules1.0.1-4+b1 Pluggable Authentication Modules f
ii  libselinux1   2.0.65-4   SELinux shared libraries
ii  libsepol1 2.0.30-2   Security Enhanced Linux policy lib
ii  policycoreutils   2.0.49-5   SELinux core policy utilities
ii  python2.5.2-2An interactive high-level object-o

Versions of packages selinux-policy-default recommends:
ii  checkpolicy   2.0.16-1   SELinux policy compiler
ii  setools   3.3.5.ds-3 tools for Security Enhanced Linux

Versions of packages selinux-policy-default suggests:
pn  logcheck   (no description available)
pn  syslog-summary (no description available)

-- no debconf information

-- 
Regards,
EddyP
=
"Imagination is more important than knowledge" A.Einstein


--- End Message ---
--- Begin Message ---
Version: 2:0.0.20080702-6

OK, I managed to get rid of the bug by removing all selinux packages I
could (and some other packages, too):

-bwidget 1.8.0-3
-checkpolicy 2.0.16-1
-libsetools-tcl 3.3.5.ds-5
-python-sepolgen 1.0.11-5
-selinux-utils 2.0.65-5

Then I purged the following:

-selinux-basics 0.3.5
-selinux-policy-default 2:0.0.20080702-8
-setools 3.3.5.ds-5


I reinstalled selinux-basics which pulled through a recommends
selinux-policy-default (complete list follows)

+bwidget 1.8.0-3
+checkpolicy 2.0.16-1
+libsetools-tcl 3.3.5.ds-5
+python-selinux 2.0.65-5
+python-semanage 2.0.25-2
+python-sepolgen 1.0.11-5
+selinux-basics 0.3.5
+selinux-policy-default 2:0.0.20080702-6
+selinux-utils 2.0.65-5
+setools 3.3.5.ds-5


then I forced a relabeling via "touch /.autorelabel" and rebooted
(relevant boot parameters are: selinux=1 audit=1 ro enforcing=0)


After the relabeling took place, the system rebooted automatically and
then the problem 

Bug#496431: emacspeak UNTESTED patch for Lenny backport

2008-11-04 Thread Kumar Appaiah
Mark,

On Wed, Nov 05, 2008 at 07:45:47AM +1100, Mark Purcell wrote:
> On Tuesday 04 November 2008 17:10:08 Kumar Appaiah wrote:
> > I have not received any feedback on the patch for 496431. I also don't
> > use the package, so I cannot be of much help in testing the backported
> > patch. Apologies for this.
> 
> Kumar,
> 
> If we don't hear back from the maintainer it might be best if you upload your 
> NMU which would still give it at least 10 days testing in unstable.
> 
> It would be good if you could also incorporate Christian's patch.

I think it would be unwise for me to upload an NMU which I haven't
tested. However, I shall try to find some emacspeak user who can do
it, and then go ahead. I shall try to be fast on it.

Thanks.

Kumar
-- 
Kumar Appaiah


signature.asc
Description: Digital signature


Bug#490999: Ответ: Bug#490999: kicker: Confirmed

2008-11-04 Thread Max Dmitrichenko
2008/11/5, Modestas Vainius <[EMAIL PROTECTED]>:
> Hello,
>
> antradienis 04 Lapkritis 2008, Max Dmitrichenko rašė:
>> addresses. GDB's backtrace is attached.
> Is it? I don't see an attachment.

Oops... Another try :)

>> What's next? Is there a way to build only kicker from sources?
> I'm afraid there is no supported way to do this. You can try the following
> though. Run ./configure and then cd to kicker build directory and run
> 'make'.
Ok, I'll try.

--
  Max
(gdb) bt
#0  0xf7fa4168 in ?? () from /lib/ld-linux.so.2
#1  0xf7faaa34 in ?? () from /lib/ld-linux.so.2
#2  0xf5a7e9bc in DigitalClock::updateClock (this=0x19c8b8) at 
/build/buildd/kdebase-3.5.9.dfsg.1/./kicker/applets/clock/clock.cpp:316
#3  0xf5a83900 in ClockApplet::reconfigure (this=0x17e9f0) at 
/build/buildd/kdebase-3.5.9.dfsg.1/./kicker/applets/clock/clock.cpp:1179
#4  0xf5a84038 in ClockApplet (this=0x17e9f0, [EMAIL PROTECTED], 
t=KPanelApplet::Normal, actions=4, parent=,
name=) at 
/build/buildd/kdebase-3.5.9.dfsg.1/./kicker/applets/clock/clock.cpp:902
#5  0xf5a84224 in init (parent=0x17ae80, [EMAIL PROTECTED]) at 
/build/buildd/kdebase-3.5.9.dfsg.1/./kicker/applets/clock/clock.cpp:75
#6  0xf7eff710 in PluginManager::loadApplet (this=0x38c88, [EMAIL PROTECTED], 
parent=0x17ae80)
at 
/build/buildd/kdebase-3.5.9.dfsg.1/./kicker/kicker/core/pluginmanager.cpp:158
#7  0xf7f06698 in AppletContainer (this=0x17aa08, [EMAIL PROTECTED], 
opMenu=, immutable=false,
parent=) at 
/build/buildd/kdebase-3.5.9.dfsg.1/./kicker/kicker/core/container_applet.cpp:102
#8  0xf7f06f94 in PluginManager::createAppletContainer (this=0x38c88, [EMAIL 
PROTECTED], isStartup=true,
configFile=, opMenu=0xcc218, parent=0xd1f60, 
isImmutable=)
at 
/build/buildd/kdebase-3.5.9.dfsg.1/./kicker/kicker/core/pluginmanager.cpp:290
#9  0xf7f0f3b8 in ContainerArea::loadContainers (this=0xcf240, 
containers=)
at 
/build/buildd/kdebase-3.5.9.dfsg.1/./kicker/kicker/core/containerarea.cpp:333
#10 0xf7f0f5e8 in ContainerArea::initialize (this=0xcf240, 
useDefaultConfig=true)
at 
/build/buildd/kdebase-3.5.9.dfsg.1/./kicker/kicker/core/containerarea.cpp:132
#11 0xf7f0f770 in PanelExtension::populateContainerArea (this=0xb2560)
at 
/build/buildd/kdebase-3.5.9.dfsg.1/./kicker/kicker/core/panelextension.cpp:107
#12 0xf7f01b14 in PanelExtension::qt_invoke (this=, 
_id=50, _o=0xffb30438) at ./panelextension.moc:99
#13 0xf714f194 in QObject::activate_signal (this=0xbb818, clist=0xd28b0, 
o=0xffb30438) at kernel/qobject.cpp:2359
#14 0xf748f668 in QSignal::signal (this=0xbb818, t0=) at 
.moc/release-shared-mt/moc_qsignal.cpp:100
#15 0xf7169f44 in QSignal::activate (this=0xbb818) at kernel/qsignal.cpp:215
#16 0xf7171344 in QSingleShotTimer::event (this=0xbb7f0) at 
kernel/qtimer.cpp:289
#17 0xf70ebea8 in QApplication::internalNotify (this=0x65800, receiver=0xbb7f0, 
e=0xffb30860) at kernel/qapplication.cpp:2638
#18 0xf70ecde8 in QApplication::notify (this=0x2f470, receiver=0xbb7f0, 
e=0xffb30860) at kernel/qapplication.cpp:2526
#19 0xf6dc64f0 in KApplication::notify (this=0x2f470, receiver=0xbb7f0, 
event=0xffb30860)
at /build/buildd/kdelibs-3.5.9.dfsg.1/./kdecore/kapplication.cpp:550
#20 0xf70e0494 in QEventLoop::activateTimers (this=) at 
kernel/qapplication.h:523
#21 0xf7096ef4 in QEventLoop::processEvents (this=0x56828, flags=0) at 
kernel/qeventloop_x11.cpp:392
#22 0xf71044f4 in QEventLoop::processEvents (this=0x56828, flags=, maxTime=3000) at kernel/qeventloop.cpp:261
#23 0xf7f10814 in ExtensionManager::initialize (this=0x786e0)
at 
/build/buildd/kdebase-3.5.9.dfsg.1/./kicker/kicker/core/extensionmanager.cpp:129
#24 0xf7f11224 in ExtensionManager::qt_invoke (this=0x786e0, _id=3, 
_o=0xffb30d00) at ./extensionmanager.moc:122
#25 0xf714f194 in QObject::activate_signal (this=0x38bf8, clist=0x38db8, 
o=0xffb30d00) at kernel/qobject.cpp:2359
#26 0xf748f668 in QSignal::signal (this=0x38bf8, t0=) at 
.moc/release-shared-mt/moc_qsignal.cpp:100
#27 0xf7169f44 in QSignal::activate (this=0x38bf8) at kernel/qsignal.cpp:215
#28 0xf7171344 in QSingleShotTimer::event (this=0x38bd0) at 
kernel/qtimer.cpp:289
#29 0xf70ebea8 in QApplication::internalNotify (this=0x65800, receiver=0x38bd0, 
e=0xffb31128) at kernel/qapplication.cpp:2638
#30 0xf70ecde8 in QApplication::notify (this=0x2f470, receiver=0x38bd0, 
e=0xffb31128) at kernel/qapplication.cpp:2526
#31 0xf6dc64f0 in KApplication::notify (this=0x2f470, receiver=0x38bd0, 
event=0xffb31128)
at /build/buildd/kdelibs-3.5.9.dfsg.1/./kdecore/kapplication.cpp:550
#32 0xf70e0494 in QEventLoop::activateTimers (this=) at 
kernel/qapplication.h:523
#33 0xf7096ef4 in QEventLoop::processEvents (this=0x56828, flags=4) at 
kernel/qeventloop_x11.cpp:392
---Type  to continue, or q  to quit---
#34 0xf71045b4 in QEventLoop::enterLoop (this=0x56828) at 
kernel/qeventloop.cpp:201
#35 0xf71043d8 in QEventLoop::exec (this=0x56828) at kernel/qeventloop.cpp:148
#36 0xf70eba58 in QApplication::exec (this=0x2f470) at 
kernel/qapplication.

  1   2   >