Processed: tagging 496334

2008-11-13 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 496334 - moreinfo
Bug#496334: mdadm segfault on --assemble --force with raid10
Tags were: fixed-upstream moreinfo patch
Bug#498505: mdadm: mdadm segfaults on superblock detection
Bug#499643: Segmentation fault when attempting re-assembly of a failed RAID5 
via "mdadm -v -A --run --force"
Tags removed: moreinfo

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: tagging 498505

2008-11-13 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 498505 fixed-upstream
Bug#498505: mdadm: mdadm segfaults on superblock detection
Tags were: fixed-upstream moreinfo patch
Bug#496334: mdadm segfault on --assemble --force with raid10
Bug#499643: Segmentation fault when attempting re-assembly of a failed RAID5 
via "mdadm -v -A --run --force"
Tags added: fixed-upstream

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#494058: marked as done (epiphany-browser: Download window is broken)

2008-11-13 Thread Debian Bug Tracking System

Your message dated Fri, 14 Nov 2008 01:32:05 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#494058: fixed in epiphany-browser 2.24.1-1
has caused the Debian Bug report #494058,
regarding epiphany-browser: Download window is broken
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
494058: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494058
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: epiphany-browser
Version: 2.22.3-1
Severity: important

This is rather strange. Today I noticed that the download window had
been redesigned. It now looks like the window from Firefox 3, except
that it no longer displays any downloads at all!

Screenshot attached.

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (530, 'testing'), (520, 'unstable'), (510, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages epiphany-browser depends on:
ii  epiphany-gecko2.22.3-1   Intuitive GNOME web browser - Geck

epiphany-browser recommends no packages.

epiphany-browser suggests no packages.

Versions of packages epiphany-gecko depends on:
ii  dbus   1.2.1-2   simple interprocess messaging syst
ii  epiphany-browser-data  2.22.3-1  Data files for the GNOME web brows
ii  gnome-icon-theme   2.22.0-1  GNOME Desktop icon theme
ii  iso-codes  3.1-1 ISO language, territory, currency,
ii  libart-2.0-2   2.3.20-2  Library of functions for 2D graphi
ii  libatk1.0-01.22.0-1  The ATK accessibility toolkit
ii  libavahi-client3   0.6.22-3  Avahi client library
ii  libavahi-common3   0.6.22-3  Avahi common library
ii  libavahi-gobject0  0.6.22-3  Avahi GObject library
ii  libbonobo2-0   2.22.0-1  Bonobo CORBA interfaces library
ii  libbonoboui2-0 2.22.0-1  The Bonobo UI library
ii  libc6  2.7-10GNU C Library: Shared libraries
ii  libcairo2  1.6.4-6   The Cairo 2D vector graphics libra
ii  libdbus-1-31.2.1-2   simple interprocess messaging syst
ii  libdbus-glib-1-2   0.76-1simple interprocess messaging syst
ii  libenchant1c2a 1.4.2-3   a wrapper library for various spel
ii  libfontconfig1 2.6.0-1   generic font configuration library
ii  libfreetype6   2.3.7-1   FreeType 2 font engine, shared lib
ii  libgcc11:4.3.1-2 GCC support library
ii  libgconf2-42.22.0-1  GNOME configuration database syste
ii  libglade2-01:2.6.2-1 library to load .glade files at ru
ii  libglib2.0-0   2.16.4-2  The GLib library of C routines
ii  libgnome-desktop-2 2.22.3-1  Utility library for loading .deskt
ii  libgnome2-02.20.1.1-1The GNOME 2 library - runtime file
ii  libgnomecanvas2-0  2.20.1.1-1A powerful object-oriented display
ii  libgnomeui-0   2.20.1.1-1The GNOME 2 libraries (User Interf
ii  libgnomevfs2-0 1:2.22.0-4GNOME Virtual File System (runtime
ii  libgtk2.0-02.12.10-2 The GTK+ graphical user interface 
ii  libice62:1.0.4-1 X11 Inter-Client Exchange library
ii  libnotify1 [libnotify1 0.4.4-3sam1   sends desktop notifications to a n
ii  libnspr4-0d4.7.1-3   NetScape Portable Runtime Library
ii  liborbit2  1:2.14.13-0.1 libraries for ORBit2 - a CORBA ORB
ii  libpango1.0-0  1.20.5-1  Layout and rendering of internatio
ii  libpixman-1-0  0.10.0-2  pixel-manipulation library for X a
ii  libpng12-0 1.2.27-1  PNG library - runtime
ii  libpopt0   1.14-4lib for parsing cmdline parameters
ii  libsm6 2:1.0.3-2 X11 Session Management library
ii  libstartup-notificatio 0.9-1 library for program launch feedbac
ii  libstdc++6 4.3.1-2   The GNU Standard C++ Library v3
ii  libx11-6   2:1.1.4-2 X11 client-side library
ii  libxcb-render-util00.2+git36-1   utility libraries for X C Binding 
ii  libxcb-render0 1.1-1.1   X C Binding, render extension
ii  libxcb11.1-1.1   X C Binding
ii  libxcursor1

Bug#494058: marked as done (epiphany-browser: Download window is broken)

2008-11-13 Thread Debian Bug Tracking System

Your message dated Fri, 14 Nov 2008 00:47:06 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#494058: fixed in epiphany-browser 2.22.3-8
has caused the Debian Bug report #494058,
regarding epiphany-browser: Download window is broken
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
494058: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494058
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: epiphany-browser
Version: 2.22.3-1
Severity: important

This is rather strange. Today I noticed that the download window had
been redesigned. It now looks like the window from Firefox 3, except
that it no longer displays any downloads at all!

Screenshot attached.

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (530, 'testing'), (520, 'unstable'), (510, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages epiphany-browser depends on:
ii  epiphany-gecko2.22.3-1   Intuitive GNOME web browser - Geck

epiphany-browser recommends no packages.

epiphany-browser suggests no packages.

Versions of packages epiphany-gecko depends on:
ii  dbus   1.2.1-2   simple interprocess messaging syst
ii  epiphany-browser-data  2.22.3-1  Data files for the GNOME web brows
ii  gnome-icon-theme   2.22.0-1  GNOME Desktop icon theme
ii  iso-codes  3.1-1 ISO language, territory, currency,
ii  libart-2.0-2   2.3.20-2  Library of functions for 2D graphi
ii  libatk1.0-01.22.0-1  The ATK accessibility toolkit
ii  libavahi-client3   0.6.22-3  Avahi client library
ii  libavahi-common3   0.6.22-3  Avahi common library
ii  libavahi-gobject0  0.6.22-3  Avahi GObject library
ii  libbonobo2-0   2.22.0-1  Bonobo CORBA interfaces library
ii  libbonoboui2-0 2.22.0-1  The Bonobo UI library
ii  libc6  2.7-10GNU C Library: Shared libraries
ii  libcairo2  1.6.4-6   The Cairo 2D vector graphics libra
ii  libdbus-1-31.2.1-2   simple interprocess messaging syst
ii  libdbus-glib-1-2   0.76-1simple interprocess messaging syst
ii  libenchant1c2a 1.4.2-3   a wrapper library for various spel
ii  libfontconfig1 2.6.0-1   generic font configuration library
ii  libfreetype6   2.3.7-1   FreeType 2 font engine, shared lib
ii  libgcc11:4.3.1-2 GCC support library
ii  libgconf2-42.22.0-1  GNOME configuration database syste
ii  libglade2-01:2.6.2-1 library to load .glade files at ru
ii  libglib2.0-0   2.16.4-2  The GLib library of C routines
ii  libgnome-desktop-2 2.22.3-1  Utility library for loading .deskt
ii  libgnome2-02.20.1.1-1The GNOME 2 library - runtime file
ii  libgnomecanvas2-0  2.20.1.1-1A powerful object-oriented display
ii  libgnomeui-0   2.20.1.1-1The GNOME 2 libraries (User Interf
ii  libgnomevfs2-0 1:2.22.0-4GNOME Virtual File System (runtime
ii  libgtk2.0-02.12.10-2 The GTK+ graphical user interface 
ii  libice62:1.0.4-1 X11 Inter-Client Exchange library
ii  libnotify1 [libnotify1 0.4.4-3sam1   sends desktop notifications to a n
ii  libnspr4-0d4.7.1-3   NetScape Portable Runtime Library
ii  liborbit2  1:2.14.13-0.1 libraries for ORBit2 - a CORBA ORB
ii  libpango1.0-0  1.20.5-1  Layout and rendering of internatio
ii  libpixman-1-0  0.10.0-2  pixel-manipulation library for X a
ii  libpng12-0 1.2.27-1  PNG library - runtime
ii  libpopt0   1.14-4lib for parsing cmdline parameters
ii  libsm6 2:1.0.3-2 X11 Session Management library
ii  libstartup-notificatio 0.9-1 library for program launch feedbac
ii  libstdc++6 4.3.1-2   The GNU Standard C++ Library v3
ii  libx11-6   2:1.1.4-2 X11 client-side library
ii  libxcb-render-util00.2+git36-1   utility libraries for X C Binding 
ii  libxcb-render0 1.1-1.1   X C Binding, render extension
ii  libxcb11.1-1.1   X C Binding
ii  libxcursor1

Bug#505621: marked as done (gocr: installs file in /usr/man)

2008-11-13 Thread Debian Bug Tracking System

Your message dated Thu, 13 Nov 2008 23:32:03 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#505621: fixed in gocr 0.46-2
has caused the Debian Bug report #505621,
regarding gocr: installs file in /usr/man
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
505621: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505621
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: gocr
Version: 0.46
Severity: serious
Justification: http://release.debian.org/lenny/rc_policy.txt 5(c)

gocr recently started installing a file in /usr/man rather than
/usr/share/man; version 0.45-2 did not suffer from this problem. It
looks like you're using a very old version of autoconf, since this was
fixed in autoconf 2.59c released in April 2006; could you please either
upgrade that or override this in debian/rules?

Thanks,

-- 
Colin Watson   [EMAIL PROTECTED]


--- End Message ---
--- Begin Message ---
Source: gocr
Source-Version: 0.46-2

We believe that the bug you reported is fixed in the latest version of
gocr, which is due to be installed in the Debian FTP archive:

gocr-tk_0.46-2_all.deb
  to pool/main/g/gocr/gocr-tk_0.46-2_all.deb
gocr_0.46-2.diff.gz
  to pool/main/g/gocr/gocr_0.46-2.diff.gz
gocr_0.46-2.dsc
  to pool/main/g/gocr/gocr_0.46-2.dsc
gocr_0.46-2_i386.deb
  to pool/main/g/gocr/gocr_0.46-2_i386.deb
gocr_0.46.orig.tar.gz
  to pool/main/g/gocr/gocr_0.46.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Cosimo Alfarano <[EMAIL PROTECTED]> (supplier of updated gocr package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 13 Nov 2008 21:02:24 -0200
Source: gocr
Binary: gocr gocr-tk
Architecture: source i386 all
Version: 0.46-2
Distribution: unstable
Urgency: low
Maintainer: Cosimo Alfarano <[EMAIL PROTECTED]>
Changed-By: Cosimo Alfarano <[EMAIL PROTECTED]>
Description: 
 gocr   - A command line OCR
 gocr-tk- A tcl/tk wrapper around gocr
Closes: 505621
Changes: 
 gocr (0.46-2) unstable; urgency=low
 .
   * Fixed /usr/man usage for manpages updating files from 
/usr/share/misc/config.{guess,sub}  (Closes: #505621)
   * added Debian revision number and orig file
Checksums-Sha1: 
 62a2137c7264e85599c79800790c754117e7e703 974 gocr_0.46-2.dsc
 7cd4677b75172d77d860445a1ae6148f13a6b2a1 702318 gocr_0.46.orig.tar.gz
 2b592fe2799cc8e77957385db907202462220179 5853 gocr_0.46-2.diff.gz
 cdfee5ddf122f124d33a5913c3699b7812e32892 204892 gocr_0.46-2_i386.deb
 f50b16cbecbebdc6b0b546b8fa7bfb31bc80a888 8948 gocr-tk_0.46-2_all.deb
Checksums-Sha256: 
 25582524b19e17256f2254c44bbad42532690821b5fc44560101470472979bf2 974 
gocr_0.46-2.dsc
 9fe667b42b33517cb04e1566b7d26f9aae89f1c1a512603e3deb23bafbaae00c 702318 
gocr_0.46.orig.tar.gz
 9da69cb3fd3c818fed9372e46f41f475fd1fde4523c77719d690a04398d2 5853 
gocr_0.46-2.diff.gz
 badb7d328bd6ded68a9aecf4071bd781b8f81f30e6a97af40765e5b01252a4a4 204892 
gocr_0.46-2_i386.deb
 7a996e2eee2c50af639dfb7fa57ac189c773f83c8b117e2550defbf541eeafd3 8948 
gocr-tk_0.46-2_all.deb
Files: 
 3b4a21ca6abfa693a9b47f761a8d2c51 974 graphics optional gocr_0.46-2.dsc
 69af85e49bcff46d970d57ddb6b14ffa 702318 graphics optional gocr_0.46.orig.tar.gz
 be354ed34e84b6d06f706fbc011b0830 5853 graphics optional gocr_0.46-2.diff.gz
 31468a3676b41e4102b1536f82a5d9dc 204892 graphics optional gocr_0.46-2_i386.deb
 8ec4ad37b5d5cdcf8da2c7e90c7aa405 8948 graphics optional gocr-tk_0.46-2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkctKAACgkQ5DsVPMtGficdWgCfeEBKB0UfXw8fTWOthS/z6uIH
mmsAn0q5n/3Cql7ouus/kr8/TG6krY8x
=jveY
-END PGP SIGNATURE-


--- End Message ---


Bug#505635: [xserver-xorg-input-evdev] keyboard acts as if I had pressed every key multiple times.

2008-11-13 Thread Julien Cristau
On Thu, Nov 13, 2008 at 23:55:02 +0100, Matthias Berndt wrote:

> Since I upgraded xserver-xorg-input-evdev from 1:2.0.3-2 to
> 1:2.0.99.3-1, the driver is completely broken for me. I used it for my
> USB keyboard, but since the upgrade, every time I press a key, X acts
> as if I had pressed that key twice. This makes it impossible to work
> or even log in. 
> 
Please send your full X log and config.

Also please avoid using reportbug-ng, it generates bug reports which
lack a lot of important information.

Cheers,
Julien



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505635: [xserver-xorg-input-evdev] keyboard acts as if I had pressed every key multiple times.

2008-11-13 Thread Matthias Berndt
Package: xserver-xorg-input-evdev
Version: 1:2.0.99.3-1
Severity: grave

--- Please enter the report below this line. ---
Since I upgraded xserver-xorg-input-evdev from 1:2.0.3-2 to 1:2.0.99.3-1, the 
driver is completely broken for me. I used it for my USB keyboard, but since 
the upgrade, every time I press a key, X acts as if I had pressed that key 
twice. This makes it impossible to work or even log in. 

--- System information. ---
Architecture: i386
Kernel:   Linux 2.6.26-1-686

Debian Release: lenny/sid
  500 unstablewww.debian-multimedia.org 
  500 unstableftp2.de.debian.org 
  101 experimentalftp.tu-chemnitz.de 

--- Package information. ---
Depends  (Version) | Installed
==-+-=
libc6   (>= 2.7-1) | 2.7-16
xserver-xorg-core (>= 2:1.5.3) | 2:1.5.3-1

--- Output from package bug script ---




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505576: marked as done (lacks dependency on procps)

2008-11-13 Thread Debian Bug Tracking System

Your message dated Thu, 13 Nov 2008 21:32:07 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#505576: fixed in buffycli 0.2.1-2
has caused the Debian Bug report #505576,
regarding lacks dependency on procps
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
505576: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505576
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: buffycli
Version: 0.2.1-1
Severity: serious
Tags: patch

Commit 0c4e5e20a4c64231d612c24e88efe86e62f151fd in the Git repo
fixes this.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-1-amd64 (SMP w/1 CPU core)
Locale: LANG=en_GB, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages buffycli depends on:
ii  libbuffy-perl 0.9Perl wrapper for the libbuffy libr
ii  libtext-formattable-perl  1.01-3 Format text tables
ii  libtie-ixhash-perl1.21-2 ordered associative arrays for Per
ii  perl  5.10.0-17  Larry Wall's Practical Extraction 

buffycli recommends no packages.

Versions of packages buffycli suggests:
ii  mutt  1.5.18-4   text-based mailreader supporting M
ii  offlineimap   6.0.3  IMAP/Maildir synchronization and r

-- no debconf information


-- 
 .''`.   martin f. krafft <[EMAIL PROTECTED]>
: :'  :  proud Debian developer, author, administrator, and user
`. `'`   http://people.debian.org/~madduck - http://debiansystem.info
  `-  Debian - when you have better things to do than fixing systems


digital_signature_gpg.asc
Description: Digital signature (see http://martin-krafft.net/gpg/)
--- End Message ---
--- Begin Message ---
Source: buffycli
Source-Version: 0.2.1-2

We believe that the bug you reported is fixed in the latest version of
buffycli, which is due to be installed in the Debian FTP archive:

buffycli_0.2.1-2.diff.gz
  to pool/main/b/buffycli/buffycli_0.2.1-2.diff.gz
buffycli_0.2.1-2.dsc
  to pool/main/b/buffycli/buffycli_0.2.1-2.dsc
buffycli_0.2.1-2_all.deb
  to pool/main/b/buffycli/buffycli_0.2.1-2_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
martin f. krafft <[EMAIL PROTECTED]> (supplier of updated buffycli package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 13 Nov 2008 22:02:54 +0100
Source: buffycli
Binary: buffycli
Architecture: source all
Version: 0.2.1-2
Distribution: unstable
Urgency: low
Maintainer: Penny Leach <[EMAIL PROTECTED]>
Changed-By: martin f. krafft <[EMAIL PROTECTED]>
Description: 
 buffycli   - a text mode alternative to Buffy
Closes: 505576
Changes: 
 buffycli (0.2.1-2) unstable; urgency=low
 .
   * Reword the long description a bit.
   * Add dependency on procps (closes: #505576).
   * Add myself as an uploader.
Checksums-Sha1: 
 8220dc0280f7b7e50b7cedfa3e975f8debf53382 1110 buffycli_0.2.1-2.dsc
 908111b71b7db9aba16cbb059f794b0a41e48fa9 2265 buffycli_0.2.1-2.diff.gz
 8c2cefa09569d243f098241026d7b449121c4bab 9762 buffycli_0.2.1-2_all.deb
Checksums-Sha256: 
 58ec4025265658baf850f45e2a077aa73e372d4303c20fdb5e3fdb87b18b6a55 1110 
buffycli_0.2.1-2.dsc
 b9e9cee9cc737b59bcb2eee22a64efb02ab8e4dfc285e0a7bd5a2128e9565756 2265 
buffycli_0.2.1-2.diff.gz
 a3855292f0cfd8cb6c485c59fcb7460488e778a32c86fa1434ff0fd6aedaf116 9762 
buffycli_0.2.1-2_all.deb
Files: 
 90d3a343980b58749012790f534b99a2 1110 mail optional buffycli_0.2.1-2.dsc
 ebb3d5415fc1ec9c70aa57e43775edc9 2265 mail optional buffycli_0.2.1-2.diff.gz
 76065582f0360d9affd7603b355e9fe1 9762 mail optional buffycli_0.2.1-2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkclw4ACgkQIgvIgzMMSnVKgwCdGtEOWFYnv/MwlIN9qznY+kNL
gicAnRQmHo7g9iXUfqNwFDhH/eOLvLdE
=Q87x
-END PGP SIGNATURE-


--- End Message ---


Bug#502357: marked as done ([libpam-mount] pammount doesn't mount loopback filesystem after upgrade)

2008-11-13 Thread Debian Bug Tracking System

Your message dated Thu, 13 Nov 2008 22:02:09 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#502357: fixed in libpam-mount 1.2+gitaa4791f-1
has caused the Debian Bug report #502357,
regarding [libpam-mount] pammount doesn't mount loopback filesystem after 
upgrade
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
502357: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502357
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: libpam-mount
Version: 0.48-1
Severity: grave

--- Please enter the report below this line. ---

Hi,

I upgraded my Debian/Sid today and my pam-mount doesn't mount my loopback AES
encrypted home partition anymore. At login, it gives this error:

login: crypto.c:213: decrypted_key: Assertion `ret == 0` failed.

Because I can manually mount the partition as root (with encryption), I expect
the problem to be in pam-mount.

Inside my pam_mount.conf.xml:
  

If I look at the error-message, it seems a developer piece of code isn't
removed... is that correct?
And how can I fix this?

Thanks!




--- System information. ---
Architecture: amd64
Kernel:   Linux 2.6.26-1-amd64

Debian Release: lenny/sid
  500 unstableftp.nl.debian.org

--- Package information. ---
Depends(Version) | Installed
-+-==
libc6 (>= 2.7-1) | 2.7-15
libhx14  | 1.25-1
libpam0g   (>= 0.99.7.1) | 1.0.1-4+b1
libssl0.9.8(>= 0.9.8f-5) | 0.9.8g-13
libxml2  (>= 2.6.27) | 2.6.32.dfsg-4
mount(>= 2.12-3) | 2.13.1.1-1
libxml-writer-perl   | 0.604-1
debconf  | 1.5.24





signature.asc
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---
Source: libpam-mount
Source-Version: 1.2+gitaa4791f-1

We believe that the bug you reported is fixed in the latest version of
libpam-mount, which is due to be installed in the Debian FTP archive:

libpam-mount_1.2+gitaa4791f-1.diff.gz
  to pool/main/libp/libpam-mount/libpam-mount_1.2+gitaa4791f-1.diff.gz
libpam-mount_1.2+gitaa4791f-1.dsc
  to pool/main/libp/libpam-mount/libpam-mount_1.2+gitaa4791f-1.dsc
libpam-mount_1.2+gitaa4791f-1_amd64.deb
  to pool/main/libp/libpam-mount/libpam-mount_1.2+gitaa4791f-1_amd64.deb
libpam-mount_1.2+gitaa4791f.orig.tar.gz
  to pool/main/libp/libpam-mount/libpam-mount_1.2+gitaa4791f.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Kleineidam <[EMAIL PROTECTED]> (supplier of updated libpam-mount 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Wed, 12 Nov 2008 17:48:27 +0100
Source: libpam-mount
Binary: libpam-mount
Architecture: source amd64
Version: 1.2+gitaa4791f-1
Distribution: unstable
Urgency: low
Maintainer: Bastian Kleineidam <[EMAIL PROTECTED]>
Changed-By: Bastian Kleineidam <[EMAIL PROTECTED]>
Description: 
 libpam-mount - PAM module that can mount volumes for a user session
Closes: 494108 495177 502355 502357 502956 503873 505258
Changes: 
 libpam-mount (1.2+gitaa4791f-1) unstable; urgency=low
 .
   * New upstream release (with some patches still in the git repo).
 + Fixes cryptoloop bug (Closes: #502357, #502355)
 + Fixes unmounting folders ending in a slash (Closes: #495177)
 + Replaces old mount_ehd script (Closes: #494108)
 + Fixes mount.crypt option error (Closes: #502956)
   * Updated package description.
   * Suggest xfsprogs for XFS volume mounting.
   * Added patch from Michael Bramer to allow usernames to start with
 digits. Thanks! (Closes: #505258)
   * Do not support upgrading from old versions << 0.20 anymore.
 This means debconf templates are not needed anymore, including the
 new swedish one from Martin Bagge. Thanks anyway! (Closes: #503873)
   * New patch 11_correct_device_for_luks_test:
  + fix mounting of LUKS devices with mount.crypt
   * New patch 12_init_crypto_device_name:
  + Initialize crypto device name with NULL
Checksums-Sha1: 
 a0f0c7228a7c03c1035d9fbe063edf7421458a47 1291 libpam-mount_1.2+gitaa4791f-1.dsc
 c

Bug#505609: Unbootable after kernel upgrade: Lilo can't load kernel

2008-11-13 Thread Ben Hutchings
On Thu, 2008-11-13 at 20:54 +0100, Xavier Brochard wrote:
> Package: linux-image-2.6.26-1-amd64
> Version: 2.6.26-10
> Severity: critical
> 
> I've did an upgrade on 2008-11-09, on a new installed system, upgrading 
> kernel 
> 2.6.26-09 to 2.6.26.10. Apt was also upgraded.
> I've seen nothing strange during upgrade and in the apt and dpkg logs. The 
> system is entirely on LVM partitions.
> 
> When reboting I obtain this message from Lilo:
> "Loading LinuxEBDA is big; kernel setup stack overlaps LILO second stage".
> and the computer halt.

I think this might be bug 479607 .  Did
you add "large-memory" to /etc/lilo.conf?  If not, does that fix the
problem?

Ben.



signature.asc
Description: This is a digitally signed message part


Bug#505621: gocr: installs file in /usr/man

2008-11-13 Thread Colin Watson
Package: gocr
Version: 0.46
Severity: serious
Justification: http://release.debian.org/lenny/rc_policy.txt 5(c)

gocr recently started installing a file in /usr/man rather than
/usr/share/man; version 0.45-2 did not suffer from this problem. It
looks like you're using a very old version of autoconf, since this was
fixed in autoconf 2.59c released in April 2006; could you please either
upgrade that or override this in debian/rules?

Thanks,

-- 
Colin Watson   [EMAIL PROTECTED]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#505384: libnss-ldapd: problem with debconf configuration

2008-11-13 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> found 505384 0.6.1
Bug#505384: libnss-ldapd: problem with debconf configuration
Bug marked as found in version 0.6.1.

> severity 505384 serious
Bug#505384: libnss-ldapd: problem with debconf configuration
Severity set to `serious' from `important'

> tags 505384 + pending
Bug#505384: libnss-ldapd: problem with debconf configuration
Tags were: help
Tags added: pending

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505613: Kernel unable to mount file system and to execute init

2008-11-13 Thread Xavier Brochard
Package: linux-image-2.6.26-1-amd64
Version: 2.6.26-9
Severity: critical

I've downgraded my kernel from 2.6.26-10 to 2.6.26-9 after the system became 
unbootable (see bug report #505609). Now the system boot, but stop before 
mounting the file system and executing init. See below for the output.

The system is entirely on LVM. Partitions comes from the same Volume Group:
/ (root file system)
/tmp
/usr
/var
/home
/usr/local
swap
/media/empty

While the system was unbootable (see bug report #505609), I've used the rescue 
mode of the Debian installer CD-ROM to boot, to mount the root and the /var 
partitions (and also /proc et /sys) and reinstall the package linux-
image-2.6.26-1-amd64-2.6.26-9.deb (which was still on the hard drive). There 
was no errors in the output.
I've rebooted, Lilo launch the new kernel, as slow as before (see my bug 
report  505579), the kernel boot and failed to mount filesystem and execute 
init. Here's the output:
-
Begin: Mounting root file system... Begin: Running /scripts/local-top...
[  6.588232] device-mapper: uevent: version 1.03
[  6.588970] device-mapper: ioctl: 4.13.0-ioctl (2007-10-18) initialized: dm-
[EMAIL PROTECTED]
8 logical volume(s) in volume group "debian" now active
done.
Begin: Running /scripts/local-premount... kinit: name_to_dev_t 
(/dev/mapper/debian-swap) = dm-5 (254,5)
kinit: trying to resume from /dev/mapper/debian-swap
[  6.819292] PM: Starting manual resume from disk
kinit: no resume image, doing normal boot...
resume: libgcrypt version 1.4.1
done.
mount: mounting /dev/root on /root failed: No such device
Begin: Running /scripts/local-bottom... done.
done.
Begin: Running /scripts/init-bottom... mount: mounting /dev on /root/dev 
failed: No such file or directory
done.
mount: mounting /sys on /root/sys failed: No such file or directory
mount: mounting /proc on /root/proc failed: no such file or directory
Target file system doesn't have /sbin/init
No init found. Try passing init=bootarg.
-
Then I got a shell in the initrd image.

cat /proc/cmdline:
BOOT_IMAGE=Linux ro root=fd00
(which is correct, Lilo -q -v5 shows me that 0xFD00 is /dev/debian/root)


I've rebooted the system using Debian installer, and tried to:
reinstall kernel
run mkinitramfs
run lilo
but nothing change after that.

please tell me if you need more informations.

regards 
--
Xavier
[EMAIL PROTECTED]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505324: (no subject)

2008-11-13 Thread Christian Welzel
This bug is now officially announced as 

"TYPO3 Security Bulletin TYPO3-20081113-1: Cross-Site Scripting vulnerability 
in TYPO3 Core"

See this url for more information:
http://typo3.org/teams/security/security-bulletins/typo3-20081113-1/

-- 
 MfG, Christian Welzel

  GPG-Key: http://www.camlann.de/key.asc
  Fingerprint: 4F50 19BF 3346 36A6 CFA9 DBDC C268 6D24 70A1 AD15



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505325: (no subject)

2008-11-13 Thread Christian Welzel
This bug is now officially announced as 

"TYPO3 Security Bulletin TYPO3-20081113-2: Cross-Site Scripting vulnerability 
in TYPO3 Core"

See this url for more information:
http://typo3.org/teams/security/security-bulletins/typo3-20081113-2/

-- 
 MfG, Christian Welzel

  GPG-Key: http://www.camlann.de/key.asc
  Fingerprint: 4F50 19BF 3346 36A6 CFA9 DBDC C268 6D24 70A1 AD15



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505360: marked as done (libgnutls26: CVE-2008-4989 security flaw in certificate chain verification)

2008-11-13 Thread Debian Bug Tracking System

Your message dated Thu, 13 Nov 2008 19:32:04 +
with message-id <[EMAIL PROTECTED]>
and subject line Bug#505360: fixed in gnutls26 2.6.2-1
has caused the Debian Bug report #505360,
regarding libgnutls26: CVE-2008-4989 security flaw in certificate chain 
verification
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
505360: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505360
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: libgnutls26
Version: 2.4.2-2
Severity: grave
Tags: security
Justification: user security hole

redhat has just released an update that fixes a security flaw in gnutls [1].
the CVE page [2] indicates that the issue is currently reserved, but redhat
describes the problem as:

 Martin von Gagern discovered a flaw in the way GnuTLS verified certificate
 chains provided by a server. A malicious server could use this flaw to
 spoof its identity by tricking client applications using the GnuTLS library
 to trust invalid certificates. (CVE-2008-4989)

redhat describes this as a "moderate severity" issue, so i assume that this
should be tracked as medium-urgency in debian.

it is not clear which versions are affected.  the redhat updates are only
for their enterprise (rhel 5) version, which is gnutls 1.4.1.

[1] https://rhn.redhat.com/errata/RHSA-2008-0982.html
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4989


--- End Message ---
--- Begin Message ---
Source: gnutls26
Source-Version: 2.6.2-1

We believe that the bug you reported is fixed in the latest version of
gnutls26, which is due to be installed in the Debian FTP archive:

gnutls-bin_2.6.2-1_i386.deb
  to pool/main/g/gnutls26/gnutls-bin_2.6.2-1_i386.deb
gnutls-doc_2.6.2-1_all.deb
  to pool/main/g/gnutls26/gnutls-doc_2.6.2-1_all.deb
gnutls26_2.6.2-1.diff.gz
  to pool/main/g/gnutls26/gnutls26_2.6.2-1.diff.gz
gnutls26_2.6.2-1.dsc
  to pool/main/g/gnutls26/gnutls26_2.6.2-1.dsc
gnutls26_2.6.2.orig.tar.gz
  to pool/main/g/gnutls26/gnutls26_2.6.2.orig.tar.gz
guile-gnutls_2.6.2-1_i386.deb
  to pool/main/g/gnutls26/guile-gnutls_2.6.2-1_i386.deb
libgnutls-dev_2.6.2-1_i386.deb
  to pool/main/g/gnutls26/libgnutls-dev_2.6.2-1_i386.deb
libgnutls26-dbg_2.6.2-1_i386.deb
  to pool/main/g/gnutls26/libgnutls26-dbg_2.6.2-1_i386.deb
libgnutls26_2.6.2-1_i386.deb
  to pool/main/g/gnutls26/libgnutls26_2.6.2-1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andreas Metzler <[EMAIL PROTECTED]> (supplier of updated gnutls26 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 13 Nov 2008 19:30:06 +0100
Source: gnutls26
Binary: libgnutls-dev libgnutls26 libgnutls26-dbg gnutls-bin gnutls-doc 
guile-gnutls
Architecture: source all i386
Version: 2.6.2-1
Distribution: experimental
Urgency: low
Maintainer: Debian GnuTLS Maintainers <[EMAIL PROTECTED]>
Changed-By: Andreas Metzler <[EMAIL PROTECTED]>
Description: 
 gnutls-bin - the GNU TLS library - commandline utilities
 gnutls-doc - the GNU TLS library - documentation and examples
 guile-gnutls - the GNU TLS library - GNU Guile bindings
 libgnutls-dev - the GNU TLS library - development files
 libgnutls26 - the GNU TLS library - runtime library
 libgnutls26-dbg - GNU TLS library - debugger symbols
Closes: 505360
Changes: 
 gnutls26 (2.6.2-1) experimental; urgency=low
 .
   * New upstream version.
 + Fixes certification verifaction error CVE-2008-4989. Closes: #505360
 + Drop 20_fix_501077.diff.
   * ia64 has guile-1.8 nowadays, let's try building the guile-gnutls wrappper
 there.
   * Add Simon Josefsson to uploaders.
Checksums-Sha1: 
 62cec831e2cc4c1a494669a3c8b77672e3f610a3 1576 gnutls26_2.6.2-1.dsc
 b894618226dab33e1cfc6da04572359607be895f 6078585 gnutls26_2.6.2.orig.tar.gz
 046c53f8ea7cbec90884ee647d6abd2277f5314b 14664 gnutls26_2.6.2-1.diff.gz
 0fd4f50a163e40340dba70d4b9c5e528cff23d2e 2835304 gnutls-doc_2.6.2-1_all.deb
 b38f0498fb82f1981d3ad691d913fc3092eec54a 545362 libgnutls-dev_2.6.2-1_i386.deb
 5f00108c713304cf55563f6788f842cb8bc2c4fd 476672 libgnutls26_2.6.2-1_i386.deb
 587aa3106a9260b2b72b36672b3ce611dfb4e2fa 1054680 
libgnutls26-dbg_2.6.2-1_i386.deb
 70d38c0fffdd2280d7e11002096

Bug#505609: Unbootable after kernel upgrade: Lilo can't load kernel

2008-11-13 Thread Xavier Brochard
Package: linux-image-2.6.26-1-amd64
Version: 2.6.26-10
Severity: critical

I've did an upgrade on 2008-11-09, on a new installed system, upgrading kernel 
2.6.26-09 to 2.6.26.10. Apt was also upgraded.
I've seen nothing strange during upgrade and in the apt and dpkg logs. The 
system is entirely on LVM partitions.

When reboting I obtain this message from Lilo:
"Loading LinuxEBDA is big; kernel setup stack overlaps LILO second stage".
and the computer halt.


regards
-- 
Xavier
[EMAIL PROTECTED]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#490999: Code details.

2008-11-13 Thread Raúl Sánchez Siles
tags 490999 +help
thanks

  Hello All:

  I've been looking into the code. This is the relevant(crashing) part:
  kicker/applets/clock/clock.cpp:310

void DigitalClock::updateClock()
{
static bool colon = true;
QString newStr;
QTime t(_applet->clockGetTime());

int h = t.hour();
int m = t.minute();
int s = t.second();

  The crash happens on/around the call to t.hour() which is QTime::hour() 
prototype qdatetime.h:135 file. This belongs to Qt library.

  With this information which is all I could collect I have two hypothesis:

  · bug in the code calling QTime::hour
  · bug in the QTime::hour code

  Being a SIGBUS crash and not having an sparc dissasembler I think it's all I 
can say. I would appreciate some help from anyone having access to a sparc 
machine.

  Thanks.
-- 
 Raúl Sánchez Siles
->Proud Debian user<-
Linux registered user #416098


signature.asc
Description: This is a digitally signed message part.


Processed: Code details.

2008-11-13 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 490999 +help
Bug#490999: kicker: crashes on startup
Tags were: confirmed
Tags added: help

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505548: installation-reports: Blank Screen using Graphical & Normal Installer

2008-11-13 Thread Christian Perrier
Quoting James Robertson ([EMAIL PROTECTED]):
> Package: installation-reports
> Severity: critical
> Justification: breaks the whole system
> 
> When booting the Lenny RC1 installer from the normal install or graphical 
> installer the screen goes blank and the PC becomes unresponsive.
> Cannot CTRL-ALT-DEL to reboot and have to reset the PC.  Tried vga=788 as 
> suggested to use vesa but that does not work.  The Video Card is a
> ATI Radeon 4850 so perhaps that has an affect on it although Beta2 installed 
> OK but I think I had to use noapic at boot.


Before going blank, does the system display something?




signature.asc
Description: Digital signature


Bug#505548: marked as done (installation-reports: Blank Screen using Graphical & Normal Installer)

2008-11-13 Thread Debian Bug Tracking System

Your message dated Thu, 13 Nov 2008 18:30:25 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Re: Bug#505548: Resolved using noapic
has caused the Debian Bug report #505548,
regarding installation-reports: Blank Screen using Graphical & Normal Installer
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
505548: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505548
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: installation-reports
Severity: critical
Justification: breaks the whole system

When booting the Lenny RC1 installer from the normal install or graphical 
installer the screen goes blank and the PC becomes unresponsive.
Cannot CTRL-ALT-DEL to reboot and have to reset the PC.  Tried vga=788 as 
suggested to use vesa but that does not work.  The Video Card is a
ATI Radeon 4850 so perhaps that has an affect on it although Beta2 installed OK 
but I think I had to use noapic at boot.

-- Package-specific info:

Boot method: CD
Image version: 
http://cdimage.debian.org/cdimage/lenny_di_rc1/i386/iso-cd/debian-testing-i386-netinst.iso
Date: Fri Nov 14 00:13:49 EST 2008

Machine: Asus M2N-MX AMD AM2 4800+ Generic PC
Partitions: This is from the currently running system installed via Beta 2 not 
sure if its even useful?
FilesystemType   1K-blocks  Used Available Use% Mounted on
/dev/sdb1 ext3 7874528   1177380   6297132  16% /
tmpfstmpfs 2074296 0   2074296   0% /lib/init/rw
udev tmpfs   10240   108 10132   2% /dev
tmpfstmpfs 2074296 0   2074296   0% /dev/shm
/dev/sdb3 ext365117128   1458728  60350620   3% /home


Base System Installation Checklist:
[O] = OK, [E] = Error (please elaborate below), [ ] = didn't try it

Initial boot:   [E]
Detect network card:[ ]
Configure network:  [ ]
Detect CD:  [ ]
Load installer modules: [ ]
Detect hard drives: [ ]
Partition hard drives:  [ ]
Install base system:[ ]
Clock/timezone setup:   [ ]
User/password setup:[ ]
Install tasks:  [ ]
Install boot loader:[ ]
Overall install:[ ]

Comments/Problems:

Besides what is written above I had to use Vesa or install the latest ReadonHD 
or ATI graphics drivers to get video to work at all.
The details below are from the currently running system.

-- 

Please make sure that the hardware-summary log file, and any other
installation logs that you think would be useful are attached to this
report. Please compress large files using gzip.

Once you have filled out this report, mail it to [EMAIL PROTECTED]

==
Installer lsb-release:
==
DISTRIB_ID=Debian
DISTRIB_DESCRIPTION="Debian GNU/Linux installer"
DISTRIB_RELEASE="5.0 (lenny) - installer build 20080522"
X_INSTALLATION_MEDIUM=cdrom

==
Installer hardware-summary:
==
umame -a: Linux bertie 2.6.24-1-486 #1 Thu May 8 01:29:10 UTC 2008 i686 unknown
lspci -knn: 00:00.0 RAM memory [0500]: nVidia Corporation MCP61 Memory 
Controller [10de:03ea] (rev a1)
lspci -knn: 00:01.0 ISA bridge [0601]: nVidia Corporation MCP61 LPC Bridge 
[10de:03e0] (rev a2)
lspci -knn: 00:01.1 SMBus [0c05]: nVidia Corporation MCP61 SMBus [10de:03eb] 
(rev a2)
lspci -knn: 00:01.2 RAM memory [0500]: nVidia Corporation MCP61 Memory 
Controller [10de:03f5] (rev a2)
lspci -knn: 00:02.0 USB Controller [0c03]: nVidia Corporation MCP61 USB 
Controller [10de:03f1] (rev a2)
lspci -knn: Kernel driver in use: ohci_hcd
lspci -knn: Kernel modules: ohci-hcd
lspci -knn: 00:02.1 USB Controller [0c03]: nVidia Corporation MCP61 USB 
Controller [10de:03f2] (rev a2)
lspci -knn: Kernel driver in use: ehci_hcd
lspci -knn: Kernel modules: ehci-hcd
lspci -knn: 00:04.0 PCI bridge [0604]: nVidia Corporation MCP61 PCI bridge 
[10de:03f3] (rev a1)
lspci -knn: 00:05.0 Audio device [0403]: nVidia Corporation MCP61 High 
Definition Audio [10de:03f0] (rev a2)
lspci -knn: 00:06.0 IDE interface [0101]: nVidia Corporation MCP61 IDE 
[10de:03ec] (rev a2)
lspci -knn: Kernel driver in use: AMD_IDE
lspci -knn: Kernel modules: amd74xx
lspci -knn: 00:07.0 Bridge [0680]: nVidia Corporation MCP61 Ethernet 
[10de:03ef] (rev a2)
lspci -knn: Kernel driver in use: forcedeth
lspci -knn: Kernel modules: forcedeth
lspci -knn: 00:08.0 IDE interface [0101]: nVidia Corporation MCP61 SATA 
Controller [10de:03f6] (rev a2)
lspci -knn: Kernel driver in use: sata_nv
lspci -knn: Kernel modules

Bug#505576: lacks dependency on procps

2008-11-13 Thread martin f krafft
Package: buffycli
Version: 0.2.1-1
Severity: serious
Tags: patch

Commit 0c4e5e20a4c64231d612c24e88efe86e62f151fd in the Git repo
fixes this.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-1-amd64 (SMP w/1 CPU core)
Locale: LANG=en_GB, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages buffycli depends on:
ii  libbuffy-perl 0.9Perl wrapper for the libbuffy libr
ii  libtext-formattable-perl  1.01-3 Format text tables
ii  libtie-ixhash-perl1.21-2 ordered associative arrays for Per
ii  perl  5.10.0-17  Larry Wall's Practical Extraction 

buffycli recommends no packages.

Versions of packages buffycli suggests:
ii  mutt  1.5.18-4   text-based mailreader supporting M
ii  offlineimap   6.0.3  IMAP/Maildir synchronization and r

-- no debconf information


-- 
 .''`.   martin f. krafft <[EMAIL PROTECTED]>
: :'  :  proud Debian developer, author, administrator, and user
`. `'`   http://people.debian.org/~madduck - http://debiansystem.info
  `-  Debian - when you have better things to do than fixing systems


digital_signature_gpg.asc
Description: Digital signature (see http://martin-krafft.net/gpg/)


Bug#504502: btrfs is WiP

2008-11-13 Thread marcos.marado
Hi there,

Daniel Baumann <[EMAIL PROTECTED]> wrote:
> since the description clearly states that it is experimental, it's
> better to have it in than out because it makes backporting easier
> (limits interdiffs), gets more attention by people.

Since the description states that it is experimental, it is my understanding 
that the package really is experimental, thus not being suited for a stable 
release. 

Making backporting easier is a nice-to-have, but not if it affects the 
stability of the stable release. In the same way, getting more attention by 
people is nice, but not if we're drawing their attention to buggy stuff with 
the risk of them not knowing that the package is unstable. I, for one, expect 
to get stable packages from the stable repository.

This is my oppinion as a Debian user, but there might be other oppinions. 
IMHO, if there's a conflict of oppinions on this matter, this should be bring 
into the attention of the release team, and let them decide: after all this 
is an RC bug.

Best regards,
-- 
Marcos Marado



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505548: Resolved using noapic

2008-11-13 Thread Otavio Salvador
James Robertson <[EMAIL PROTECTED]> writes:

> This is to let you know that booting with noapic fixes the issue

Did you test it with RC1 and sid kernels?

-- 
O T A V I OS A L V A D O R
-
 E-mail: [EMAIL PROTECTED]  UIN: 5906116
 GNU/Linux User: 239058 GPG ID: 49A5F855
 Home Page: http://otavio.ossystems.com.br
-
"Microsoft sells you Windows ... Linux gives
 you the whole house."



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504467: please reassign

2008-11-13 Thread marcos.marado
Please, reassign this bug to the boinc package. 

Also, read 
http://ubuntuforums.org/showpost.php?p=4406159&postcount=10
if you want somewhere to look into the issue of the wrong PID.

Best regards,
-- 
Marcos Marado



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505565: Mozilla SeaMonkey Multiple Vulnerabilities

2008-11-13 Thread Giuseppe Iuculano
Package: iceape
Severity: critical
Tags: security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

The following SA (Secunia Advisory) id was published for SeaMonkey:

SA32714[1]

Description:
Some vulnerabilities have been reported in Mozilla SeaMonkey, which can
be exploited by malicious people to disclose sensitive information,
bypass certain security restrictions, or compromise a user's system.

For more information:
SA32693

The vulnerabilities are reported in versions prior to 1.1.13.

Solution:
Update to version 1.1.13.

Original Advisory:
http://www.mozilla.org/security/announce/2008/mfsa2008-47.html
http://www.mozilla.org/security/announce/2008/mfsa2008-48.html
http://www.mozilla.org/security/announce/2008/mfsa2008-49.html
http://www.mozilla.org/security/announce/2008/mfsa2008-50.html
http://www.mozilla.org/security/announce/2008/mfsa2008-52.html
http://www.mozilla.org/security/announce/2008/mfsa2008-54.html
http://www.mozilla.org/security/announce/2008/mfsa2008-55.html
http://www.mozilla.org/security/announce/2008/mfsa2008-56.html
http://www.mozilla.org/security/announce/2008/mfsa2008-57.html
http://www.mozilla.org/security/announce/2008/mfsa2008-58.html

Other References:
SA32693[2]

If you fix the vulnerability please also make sure to include the the
CVE id in the changelog entry.

[1]http://secunia.com/advisories/32714/
[2]http://secunia.com/advisories/32693/

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkcRCgACgkQNxpp46476aonswCeMfUB5+j2+eLl1Z8P9u1QnqZo
yU0An3CqF9pgPfO6J/qI9fF/i0yIp+jt
=QbeL
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505563: Mozilla Thunderbird Multiple Vulnerabilities

2008-11-13 Thread Giuseppe Iuculano
Package: icedove
Severity: critical
Tags: security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

The following SA (Secunia Advisory) id was published for Thunderbird:

SA32715[1]

Description:
Some vulnerabilities have been reported in Mozilla Thunderbird, which
can be exploited by malicious people to disclose sensitive information,
bypass certain security restrictions, or compromise a user's system.

For more information:
SA32693

The vulnerabilities are reported in versions prior to 2.0.0.18.

Solution:
The vulnerabilities will be fixed in the upcoming 2.0.0.18 version.

The vendor recommends disabling JavaScript support.

Original Advisory:
http://www.mozilla.org/security/announce/2008/mfsa2008-48.html
http://www.mozilla.org/security/announce/2008/mfsa2008-50.html
http://www.mozilla.org/security/announce/2008/mfsa2008-52.html
http://www.mozilla.org/security/announce/2008/mfsa2008-55.html
http://www.mozilla.org/security/announce/2008/mfsa2008-56.html
http://www.mozilla.org/security/announce/2008/mfsa2008-58.html

Other References:
SA32693[2]

CVE reference:
CVE-2008-5012
CVE-2008-5014
CVE-2008-5017
CVE-2008-5018
CVE-2008-5021
CVE-2008-5022
CVE-2008-5024

If you fix the vulnerability please also make sure to include the the
CVE id in the changelog entry.

[1]http://secunia.com/advisories/32715/
[2]http://secunia.com/advisories/32693/

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkcQtAACgkQNxpp46476ao5OwCeNCFW4/5lurndSIqfTBQtkC4i
u6EAn0NS5yuBbdPRyHFDYxVdjEPKSIZI
=41lt
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505548: Resolved using noapic

2008-11-13 Thread James Robertson

This is to let you know that booting with noapic fixes the issue



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505558: Mozilla Firefox 2 Multiple Vulnerabilities

2008-11-13 Thread Giuseppe Iuculano
Package: iceweasel
Version: 2.0.0.17-0etch1
Severity: critical
Tags: security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

The following SA (Secunia Advisory) id was published for Firefox 2:

SA32693[1]

Description:
Some vulnerabilities have been reported in Mozilla Firefox, which can be
exploited by malicious people to disclose sensitive information, bypass
certain security restrictions, or compromise a user's system.

1) An error in the processing of ".url" shortcuts can be exploited to
obtain sensitive information from the local cache.

For more information:
SA32192

2) An error in the handling of HTTP redirect requests can be exploited
to bypass the same-origin policy and access sensitive information from
another domain.

3) An error exists when testing if a Flash module is dynamically
unloaded. This can be exploited to dereference memory no longer mapped
to the Flash module via an SWF file that dynamically unloads itself from
an outside JavaScript function.

4) An error when locking a non-native object can be exploited to cause a
crash via a web page assigning a specially crafted value to the
"window.__proto__.__proto__" object.

5) An error in the browser engine can be exploited to cause a memory
corruption.

6) Two errors in the JavaScript engine can be exploited to cause memory
corruptions.

Successful exploitation of vulnerabilities #3-#6 may allow execution of
arbitrary code.

7) An error in the browser's restore feature can be exploited to violate
the same-origin policy and run arbitrary JavaScript code in the context
of another site.

NOTE: The vulnerability can also be exploited to execute arbitrary
JavaScript code with chrome privileges.

8) An error in the processing of the "http-index-format" MIME type can
be exploited to execute arbitrary code via a specially crafted 200
header line included in an HTTP index response.

9) An error in the DOM constructing code can be exploited to dereference
uninitialized memory and potentially execute arbitrary code by modifying
certain properties of a file input element before the element has
finished initializing.

10) An error in the implementation of the
"nsXMLHttpRequest::NotifyEventListeners()" method can be exploited to
execute arbitrary JavaScript code in the context of another site.

11) An error when handling the "-moz-binding" CSS property can be
exploited to manipulate signed JAR files and execute arbitrary
JavaScript code in the context of another site.

12) An error exists when parsing the default XML namespace of an E4X
document. This can be exploited to inject arbitrary XML code via a
specially crafted namespace containing quote characters.

The vulnerabilities are reported in versions prior to 2.0.0.18.

Solution:
Update to version 2.0.0.18.

CVE reference:
CVE-2008-0017
CVE-2008-4582
CVE-2008-5012
CVE-2008-5013
CVE-2008-5014
CVE-2008-5017
CVE-2008-5018
CVE-2008-5019
CVE-2008-5021
CVE-2008-5022
CVE-2008-5023
CVE-2008-5024


If you fix the vulnerability please also make sure to include the the
CVE id in the changelog entry.

[1] http://secunia.com/advisories/32693/



-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkcOnkACgkQNxpp46476aq8uwCeOoUJekricOaj+E04X2PPg3bf
5wQAniz3ycwyj0KlvdGJvTFAum/tBrlV
=qeCk
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505557: Mozilla Firefox 3 Multiple Vulnerabilities

2008-11-13 Thread Giuseppe Iuculano
Package: iceweasel
Version: 3.0.3-3
Severity: critical
Tags: security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Hi,

The following SA (Secunia Advisory) id was published for Firefox 3.

SA32713[1]

Description:
Some vulnerabilities have been reported in Mozilla Firefox, which can be
exploited by malicious people to disclose sensitive information, bypass
certain security restrictions, or compromise a user's system.

1) An error when processing "file:" URIs can be exploited to execute
arbitrary JavaScript code with chrome privileges by tricking a user into
opening a malicious local file in a tab previously opened for a
"chrome:" document or a privileged "about:" URI.

2) Various errors in the layout engine can be exploited to cause memory
corruptions and potentially execute arbitrary code.

3) An error in the browser engine can be exploited to cause a crash.

For more information see vulnerability #5 in:
SA32693

4) An error in the JavaScript engine can be exploited to cause a memory
corruption and potentially execute arbitrary code.

5) An error in the browser's restore feature can be exploited to violate
the same-origin policy.

For more information see vulnerability #7 in:
SA32693

6) An error in the processing of the "http-index-format" MIME type can
be exploited to execute arbitrary code.

For more information see vulnerability #8 in:
SA32693

7) An error in the DOM constructing code can be exploited to dereference
uninitialized memory and potentially execute arbitrary code:

For more information see vulnerability #9 in:
SA32693

8) An error in "nsXMLHttpRequest::NotifyEventListeners()" can be
exploited to bypass certain security restrictions.

For more information see vulnerability #10 in:
SA32693

9) An error can be exploited to manipulate signed JAR files and execute
arbitrary JavaScript code in the context of another site.

For more information see vulnerability #11 in:
SA32693

10) An error exists when parsing E4X documents can be exploited to
inject arbitrary XML code.

For more information see vulnerability #12 in:
SA32693

The vulnerabilities are reported in versions prior to 3.0.4.

Solution:
Update to version 3.0.4.


CVE reference:

CVE-2008-0017
CVE-2008-5015
CVE-2008-5016
CVE-2008-5017
CVE-2008-5018
CVE-2008-5019
CVE-2008-5021
CVE-2008-5022
CVE-2008-5023
CVE-2008-5024

If you fix the vulnerability please also make sure to include the the CVE id in 
the changelog entry.


[1]http://secunia.com/advisories/32713/

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkcOQkACgkQNxpp46476arZ+QCfZ9MG8NFbSAMAXKBnB/Lx5BWn
6woAoJ99q6HGzMo1XWDCrNh9swljrkO3
=U3tk
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505554: drgeo: sistematically segfaults if rebuilt in unstable

2008-11-13 Thread Pietro Battiston
Package: drgeo
Version: 1.1.0-1
Severity: grave
Tags: patch
Justification: renders package unusable


drgeo 1.1.0-1 actually seems to work, in Lenny, just by luck, but if 
recompiled with a more modern gcc, i.e. the one found in Sid (or in Ubuntu 
Intrepid), it sistematically segfaults.

The bug is known upstream and has been solved in CVS, but still not in 
the upstream release.

The corresponding Launchpad bug, LP #257797, has both a minimal patch 
and a debdiff for the Ubuntu version; I can provide a debdiff for Debian 
if it is appreciated.


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-1-486
Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505548: installation-reports: Blank Screen using Graphical & Normal Installer

2008-11-13 Thread James Robertson
Package: installation-reports
Severity: critical
Justification: breaks the whole system

When booting the Lenny RC1 installer from the normal install or graphical 
installer the screen goes blank and the PC becomes unresponsive.
Cannot CTRL-ALT-DEL to reboot and have to reset the PC.  Tried vga=788 as 
suggested to use vesa but that does not work.  The Video Card is a
ATI Radeon 4850 so perhaps that has an affect on it although Beta2 installed OK 
but I think I had to use noapic at boot.

-- Package-specific info:

Boot method: CD
Image version: 
http://cdimage.debian.org/cdimage/lenny_di_rc1/i386/iso-cd/debian-testing-i386-netinst.iso
Date: Fri Nov 14 00:13:49 EST 2008

Machine: Asus M2N-MX AMD AM2 4800+ Generic PC
Partitions: This is from the currently running system installed via Beta 2 not 
sure if its even useful?
FilesystemType   1K-blocks  Used Available Use% Mounted on
/dev/sdb1 ext3 7874528   1177380   6297132  16% /
tmpfstmpfs 2074296 0   2074296   0% /lib/init/rw
udev tmpfs   10240   108 10132   2% /dev
tmpfstmpfs 2074296 0   2074296   0% /dev/shm
/dev/sdb3 ext365117128   1458728  60350620   3% /home


Base System Installation Checklist:
[O] = OK, [E] = Error (please elaborate below), [ ] = didn't try it

Initial boot:   [E]
Detect network card:[ ]
Configure network:  [ ]
Detect CD:  [ ]
Load installer modules: [ ]
Detect hard drives: [ ]
Partition hard drives:  [ ]
Install base system:[ ]
Clock/timezone setup:   [ ]
User/password setup:[ ]
Install tasks:  [ ]
Install boot loader:[ ]
Overall install:[ ]

Comments/Problems:

Besides what is written above I had to use Vesa or install the latest ReadonHD 
or ATI graphics drivers to get video to work at all.
The details below are from the currently running system.

-- 

Please make sure that the hardware-summary log file, and any other
installation logs that you think would be useful are attached to this
report. Please compress large files using gzip.

Once you have filled out this report, mail it to [EMAIL PROTECTED]

==
Installer lsb-release:
==
DISTRIB_ID=Debian
DISTRIB_DESCRIPTION="Debian GNU/Linux installer"
DISTRIB_RELEASE="5.0 (lenny) - installer build 20080522"
X_INSTALLATION_MEDIUM=cdrom

==
Installer hardware-summary:
==
umame -a: Linux bertie 2.6.24-1-486 #1 Thu May 8 01:29:10 UTC 2008 i686 unknown
lspci -knn: 00:00.0 RAM memory [0500]: nVidia Corporation MCP61 Memory 
Controller [10de:03ea] (rev a1)
lspci -knn: 00:01.0 ISA bridge [0601]: nVidia Corporation MCP61 LPC Bridge 
[10de:03e0] (rev a2)
lspci -knn: 00:01.1 SMBus [0c05]: nVidia Corporation MCP61 SMBus [10de:03eb] 
(rev a2)
lspci -knn: 00:01.2 RAM memory [0500]: nVidia Corporation MCP61 Memory 
Controller [10de:03f5] (rev a2)
lspci -knn: 00:02.0 USB Controller [0c03]: nVidia Corporation MCP61 USB 
Controller [10de:03f1] (rev a2)
lspci -knn: Kernel driver in use: ohci_hcd
lspci -knn: Kernel modules: ohci-hcd
lspci -knn: 00:02.1 USB Controller [0c03]: nVidia Corporation MCP61 USB 
Controller [10de:03f2] (rev a2)
lspci -knn: Kernel driver in use: ehci_hcd
lspci -knn: Kernel modules: ehci-hcd
lspci -knn: 00:04.0 PCI bridge [0604]: nVidia Corporation MCP61 PCI bridge 
[10de:03f3] (rev a1)
lspci -knn: 00:05.0 Audio device [0403]: nVidia Corporation MCP61 High 
Definition Audio [10de:03f0] (rev a2)
lspci -knn: 00:06.0 IDE interface [0101]: nVidia Corporation MCP61 IDE 
[10de:03ec] (rev a2)
lspci -knn: Kernel driver in use: AMD_IDE
lspci -knn: Kernel modules: amd74xx
lspci -knn: 00:07.0 Bridge [0680]: nVidia Corporation MCP61 Ethernet 
[10de:03ef] (rev a2)
lspci -knn: Kernel driver in use: forcedeth
lspci -knn: Kernel modules: forcedeth
lspci -knn: 00:08.0 IDE interface [0101]: nVidia Corporation MCP61 SATA 
Controller [10de:03f6] (rev a2)
lspci -knn: Kernel driver in use: sata_nv
lspci -knn: Kernel modules: sata_nv
lspci -knn: 00:08.1 IDE interface [0101]: nVidia Corporation MCP61 SATA 
Controller [10de:03f6] (rev a2)
lspci -knn: Kernel driver in use: sata_nv
lspci -knn: Kernel modules: sata_nv
lspci -knn: 00:09.0 PCI bridge [0604]: nVidia Corporation MCP61 PCI Express 
bridge [10de:03e8] (rev a2)
lspci -knn: Kernel driver in use: pcieport-driver
lspci -knn: 00:0b.0 PCI bridge [0604]: nVidia Corporation MCP61 PCI Express 
bridge [10de:03e9] (rev a2)
lspci -knn: Kernel driver in use: pcieport-driver
lspci -knn: 00:0c.0 PCI bridge [0604]: nVidia Corporation MCP61 PCI Express 
bridge [10de:03e9] (rev a2)
lspci -knn: Kernel driver in use: pcieport-driver
lspci -knn: 00:18.0 Host bridge [0600]: Advanced Micro Devices [AMD] K8 
[Athlon64/Opteron] HyperTransport Technology Configuration [1022:1100]
lspci -knn: 00:18.1 Host

Bug#505270: a workaround .

2008-11-13 Thread Tim Richardson
In the process of trying to debug this, I discovered that I can make it
boot properly if I create the file 
/etc/directfbrc

and include this one line in the file

log-file=/tmp/directfb.log


I had no directfbrc file on my system.
An empty file doesn't help.

My attempt to make the log file was to capture output of the
macroDFBCHECK 

but it doesn't seem to work.

I hope this is helpful to someone who knows directfb well.







-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: bug 489045 is forwarded to http://www.cups.org/str.php?L3001, tagging 489045

2008-11-13 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> forwarded 489045 http://www.cups.org/str.php?L3001
Bug#489045: cups: infinite loop, 100%CPU use, while trying to print with 
HPJetDirect
Bug#502100: cups: socket backend hangs in tight select/read loop (larger 
printouts?)
Noted your statement that Bug has been forwarded to 
http://www.cups.org/str.php?L3001.

> tags 489045 upstream pending
Bug#489045: cups: infinite loop, 100%CPU use, while trying to print with 
HPJetDirect
Tags were: patch moreinfo
Bug#502100: cups: socket backend hangs in tight select/read loop (larger 
printouts?)
Tags added: upstream, pending

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#489045: cups: infinite loop, 100%CPU use, while trying to print with HPJetDirect

2008-11-13 Thread Martin Pitt
Hi Samuel,

Samuel Thibault [2008-11-11 14:46 +0100]:
> Right but here the issue is on the input side: device_fd got to EOF,
> thus select() returning it and read() on it returning 0. The attached
> patch at least prevents select from returning, avoiding 100% CPU usage.

Thanks for your analysis and the patch! It looks correct to me, and I
applied it to the package bzr. I forwarded it to upstream
(http://www.cups.org/str.php?L3001) and will wait a day or two for
upstream's comment before uploading it.

Martin
-- 
Martin Pitt| http://www.piware.de
Ubuntu Developer (www.ubuntu.com)  | Debian Developer  (www.debian.org)


signature.asc
Description: Digital signature


Bug#499504: Verified

2008-11-13 Thread Scott Kitterman
Glad to hear it.  It's still a valid RC bug in Etch for python-dns, so I 
think it must stay open for now.  If nothing else, someone else with the 
problem will find it more easily and know what to do.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505519: marked as done (linux-image-2.6.26-1-686: after Bios check system halt with "wrong compressed format")

2008-11-13 Thread Debian Bug Tracking System

Your message dated Thu, 13 Nov 2008 11:59:07 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Re: Bug#505519: linux-image-2.6.26-1-686: after Bios check 
system halt with "wrong compressed format"
has caused the Debian Bug report #505519,
regarding linux-image-2.6.26-1-686: after Bios check system halt with "wrong 
compressed format"
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
505519: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505519
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: linux-image-2.6.26-1-686
Version: 2.6.26-10
Severity: grave
Justification: renders package unusable

after the latest update to 2.6.26-10 booting stops after the bios check with 
wrong compressed format

-- Package-specific info:

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.25-2-686 (SMP w/1 CPU core)
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash

Versions of packages linux-image-2.6.26-1-686 depends on:
ii  debconf [debconf-2.0] 1.5.24 Debian configuration management sy
ii  initramfs-tools [linux-initra 0.92l  tools for generating an initramfs
ii  module-init-tools 3.4-1  tools for managing Linux kernel mo

Versions of packages linux-image-2.6.26-1-686 recommends:
ii  libc6-i6862.7-16 GNU C Library: Shared libraries [i

Versions of packages linux-image-2.6.26-1-686 suggests:
ii  lilo  1:22.8-6.4 LInux LOader - The Classic OS load
pn  linux-doc-2.6.26   (no description available)

-- debconf information:
  linux-image-2.6.26-1-686/preinst/abort-overwrite-2.6.26-1-686:
  linux-image-2.6.26-1-686/postinst/bootloader-error-2.6.26-1-686:
  linux-image-2.6.26-1-686/postinst/depmod-error-initrd-2.6.26-1-686: false
  linux-image-2.6.26-1-686/postinst/old-system-map-link-2.6.26-1-686: true
  linux-image-2.6.26-1-686/prerm/would-invalidate-boot-loader-2.6.26-1-686: true
  linux-image-2.6.26-1-686/preinst/elilo-initrd-2.6.26-1-686: true
  linux-image-2.6.26-1-686/postinst/old-dir-initrd-link-2.6.26-1-686: true
  linux-image-2.6.26-1-686/postinst/kimage-is-a-directory:
  linux-image-2.6.26-1-686/postinst/create-kimage-link-2.6.26-1-686: true
  linux-image-2.6.26-1-686/preinst/overwriting-modules-2.6.26-1-686: true
  linux-image-2.6.26-1-686/postinst/depmod-error-2.6.26-1-686: false
  shared/kernel-image/really-run-bootloader: true
  linux-image-2.6.26-1-686/prerm/removing-running-kernel-2.6.26-1-686: true
  linux-image-2.6.26-1-686/preinst/abort-install-2.6.26-1-686:
  linux-image-2.6.26-1-686/preinst/lilo-has-ramdisk:
  linux-image-2.6.26-1-686/preinst/bootloader-initrd-2.6.26-1-686: true
  linux-image-2.6.26-1-686/preinst/lilo-initrd-2.6.26-1-686: true
  linux-image-2.6.26-1-686/postinst/old-initrd-link-2.6.26-1-686: true
  linux-image-2.6.26-1-686/postinst/bootloader-test-error-2.6.26-1-686:
  linux-image-2.6.26-1-686/preinst/failed-to-move-modules-2.6.26-1-686:
  linux-image-2.6.26-1-686/preinst/initrd-2.6.26-1-686:


--- End Message ---
--- Begin Message ---
On Thu, Nov 13, 2008 at 10:31:31AM +0100, bernhard kleine wrote:
> after the latest update to 2.6.26-10 booting stops after the bios check with 
> wrong compressed format

Known bug in lilo. Use the large-memory option.

Bastian

-- 
... bacteriological warfare ... hard to believe we were once foolish
enough to play around with that.
-- McCoy, "The Omega Glory", stardate unknown

--- End Message ---


Processed: Re: pre-approving universalindentgui/0.8.1-1.1

2008-11-13 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 504726 patch
Bug#504726: insecure /tmp dir
There were no tags set.
Tags added: patch

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#504726: pre-approving universalindentgui/0.8.1-1.1

2008-11-13 Thread Eddy Petrișor
tags 504726 patch
thanks

Adeodato Simó a scris:
> * Thomas Schweitzer [Wed, 12 Nov 2008 11:47:53 +0100]:
> 
>> Oh, I see.
>> There are such evil people out there? ;-) Ok I never had such a way of
>> abuse on my mind, so I didn't care about that.
> 
>> The next version 1.0.3 will have that fixed and I will send the
>> package to Marcela Tiznado so she can upload it for being tested.
> 
> Note that at this stage of the release process, only targetted fixes are
> allowed into testing. This means that, if you wat Lenny to release with
> universalindentgui 0.8.x, you should prepare an upload that fixes only
> its RC bugs, and for which the diff of it can be reasonably reviewed by
> the release team.

I have prepared a fix for 504726, but I am uneasy about C++ people looking at 
it (is strictly C).
Also, I am aware this will, most likely not work on windows (but since this is 
a fix for us and
symlinks are not possible under Windows, I guess is OK).

A package (changelog is referenced against official debian package version) is 
available at:

http://users.alioth.debian.org/~eddyp-guest/upload/universalindentgui-0.8.1-1.2/

DSC available at:

http://users.alioth.debian.org/~eddyp-guest/upload/universalindentgui-0.8.1-1.2/universalindentgui_0.8.1-1.2.dsc



-- 
Regards,
EddyP
=
"Imagination is more important than knowledge" A.Einstein
diff --git a/universalindentgui-0.8.1/debian/changelog b/universalindentgui-0.8.1/debian/changelog
index 38cb52f..d8a10b0 100644
--- a/universalindentgui-0.8.1/debian/changelog
+++ b/universalindentgui-0.8.1/debian/changelog
@@ -1,3 +1,19 @@
+universalindentgui (0.8.1-1.2) unstable; urgency=low
+
+  * Avoid symlink attacks by using mkdtemp (Closes: 504726)
+
+ -- Eddy Petrișor <[EMAIL PROTECTED]>  Wed, 12 Nov 2008 01:34:23 +0200
+
+universalindentgui (0.8.1-1.1) unstable; urgency=high
+
+  * Non-maintainer upload.
+  * urgency high since universalindentgui is actually useless by default
+(can be hacked to work by setting TMPDIR='/tmp/a')
+  * fixed temporary path asamblation so indents can work
+(Closes: 486577)
+
+ -- Eddy Petrișor <[EMAIL PROTECTED]>  Wed, 05 Nov 2008 03:51:48 +0200
+
 universalindentgui (0.8.1-1) unstable; urgency=low
 
   * New upstream release
diff --git a/universalindentgui-0.8.1/src/mainwindow.cpp b/universalindentgui-0.8.1/src/mainwindow.cpp
index 287662b..67680a8 100644
--- a/universalindentgui-0.8.1/src/mainwindow.cpp
+++ b/universalindentgui-0.8.1/src/mainwindow.cpp
@@ -18,6 +18,7 @@
  ***/
 
 #include "mainwindow.h"
+#include 
 
 //! \defgroup grp_MainWindow All concerning main window functionality.
 
@@ -87,12 +88,16 @@ MainWindow::MainWindow(QWidget *parent) : QMainWindow(parent) {
 QFile::copy( globalFilesDirectoryStr+"/config/UiGuiSyntaxHighlightConfig.ini", settingsDirctoryStr+"/UiGuiSyntaxHighlightConfig.ini" );
 }
 indenterDirctoryStr = globalFilesDirectoryStr + "/indenters";
-#ifdef Q_OS_WIN
-tempDirctoryStr = QDir::tempPath() + "/UniversalIndentGUI";
-#else
-tempDirctoryStr = QDir::tempPath() + "UniversalIndentGUI";
-#endif
-dirCreator.mkpath( tempDirctoryStr );
+tempDirctoryStr = QDir::tempPath() + "/uigXX";
+QByteArray ba = tempDirctoryStr.toLatin1();
+char *dtpl = ba.data();
+char *nd;
+if ( (nd=mkdtemp( dtpl )) == NULL ) {
+// failed to create the temp dir
+qDebug() << "Failed to create temporary directory.\n";
+exit(1);
+}
+tempDirctoryStr = QString(QLatin1String(nd));
 }
 
 qDebug() << "Using directories:\nsettings = " << settingsDirctoryStr;
diff --git a/universalindentgui-0.8.1/translations/universalindent.ts b/universalindentgui-0.8.1/translations/universalindent.ts
index c4ab633..bdeffc1 100644
--- a/universalindentgui-0.8.1/translations/universalindent.ts
+++ b/universalindentgui-0.8.1/translations/universalindent.ts
@@ -411,103 +411,103 @@ Credits:
 
 MainWindow
 
-
+
 Error opening file
 
 
 
-
+
 Cannot read the file 
 
 
 
-
+
 Supported by indenter
 
 
 
-
+
 All files
 
 
 
-
+
 Choose source code file
 
 
 
-
+
 Save source code file
 
 
 
-
+
 Save indent config file
 
 
 
-
+
 Choose indenter config file
 
 
 
-
+
 PDF Document
 
 
 
-
+
 Export source code file
 
 
 
-
+
 HTML Document
 
 
 
-
+
 Modified code
 
 
 
-
+
 The source code has been

Bug#499504: Verified

2008-11-13 Thread Felix Knecht
I updated to latest backports packages and it still works. I get the 
expected TempError for amazon.com and aol.com.


So it is fixed for me. Guess you can close the bug.

Thanks for your work!



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505519: linux-image-2.6.26-1-686: after Bios check system halt with "wrong compressed format"

2008-11-13 Thread bernhard kleine
Package: linux-image-2.6.26-1-686
Version: 2.6.26-10
Severity: grave
Justification: renders package unusable

after the latest update to 2.6.26-10 booting stops after the bios check with 
wrong compressed format

-- Package-specific info:

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.25-2-686 (SMP w/1 CPU core)
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash

Versions of packages linux-image-2.6.26-1-686 depends on:
ii  debconf [debconf-2.0] 1.5.24 Debian configuration management sy
ii  initramfs-tools [linux-initra 0.92l  tools for generating an initramfs
ii  module-init-tools 3.4-1  tools for managing Linux kernel mo

Versions of packages linux-image-2.6.26-1-686 recommends:
ii  libc6-i6862.7-16 GNU C Library: Shared libraries [i

Versions of packages linux-image-2.6.26-1-686 suggests:
ii  lilo  1:22.8-6.4 LInux LOader - The Classic OS load
pn  linux-doc-2.6.26   (no description available)

-- debconf information:
  linux-image-2.6.26-1-686/preinst/abort-overwrite-2.6.26-1-686:
  linux-image-2.6.26-1-686/postinst/bootloader-error-2.6.26-1-686:
  linux-image-2.6.26-1-686/postinst/depmod-error-initrd-2.6.26-1-686: false
  linux-image-2.6.26-1-686/postinst/old-system-map-link-2.6.26-1-686: true
  linux-image-2.6.26-1-686/prerm/would-invalidate-boot-loader-2.6.26-1-686: true
  linux-image-2.6.26-1-686/preinst/elilo-initrd-2.6.26-1-686: true
  linux-image-2.6.26-1-686/postinst/old-dir-initrd-link-2.6.26-1-686: true
  linux-image-2.6.26-1-686/postinst/kimage-is-a-directory:
  linux-image-2.6.26-1-686/postinst/create-kimage-link-2.6.26-1-686: true
  linux-image-2.6.26-1-686/preinst/overwriting-modules-2.6.26-1-686: true
  linux-image-2.6.26-1-686/postinst/depmod-error-2.6.26-1-686: false
  shared/kernel-image/really-run-bootloader: true
  linux-image-2.6.26-1-686/prerm/removing-running-kernel-2.6.26-1-686: true
  linux-image-2.6.26-1-686/preinst/abort-install-2.6.26-1-686:
  linux-image-2.6.26-1-686/preinst/lilo-has-ramdisk:
  linux-image-2.6.26-1-686/preinst/bootloader-initrd-2.6.26-1-686: true
  linux-image-2.6.26-1-686/preinst/lilo-initrd-2.6.26-1-686: true
  linux-image-2.6.26-1-686/postinst/old-initrd-link-2.6.26-1-686: true
  linux-image-2.6.26-1-686/postinst/bootloader-test-error-2.6.26-1-686:
  linux-image-2.6.26-1-686/preinst/failed-to-move-modules-2.6.26-1-686:
  linux-image-2.6.26-1-686/preinst/initrd-2.6.26-1-686:



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#505490: ocaml-batteries_0.20081112+gitBB342A7-1(hppa/experimental): FTBFS: Failure: Cannot find "ocamlbuildlib.cmxa"

2008-11-13 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 505490 + pending
Bug#505490: ocaml-batteries_0.20081112+gitBB342A7-1(hppa/experimental): FTBFS: 
Failure: Cannot find "ocamlbuildlib.cmxa"
There were no tags set.
Tags added: pending

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#505490: ocaml-batteries_0.20081112+gitBB342A7-1(hppa/experimental): FTBFS: Failure: Cannot find "ocamlbuildlib.cmxa"

2008-11-13 Thread Stefano Zacchiroli
tags 505490 + pending
thanks

On Thu, Nov 13, 2008 at 12:30:24AM +0100, Frank Lichtenheld wrote:
> Package: ocaml-batteries
> Version: 0.20081112+gitBB342A7-1
> Severity: serious

Thanks, the bug it's already fixed in the git repo (as usual, I
discovered it 5 minutes after the upload, because it is not trivially
reproducible on my dev machine).

Nevertheless, I won't bother re-upload to experimental before the next
upstream release, as we are still talking about a pre-beta upstream
release.

Cheers.

-- 
Stefano Zacchiroli -o- PhD in Computer Science \ PostDoc @ Univ. Paris 7
[EMAIL PROTECTED],pps.jussieu.fr,debian.org} -<>- http://upsilon.cc/zack/
Dietro un grande uomo c'è ..|  .  |. Et ne m'en veux pas si je te tutoie
sempre uno zaino ...| ..: | Je dis tu à tous ceux que j'aime


signature.asc
Description: Digital signature


Bug#505446: mlocate always creates empty database

2008-11-13 Thread Nigel Horne



It works fine on my amd64 system. Can you run as root:

  # strace -o strace.log /usr/bin/updatedb.mlocate

and send strace.log by mail? (Compress it if it's big, please.)
  


Attached (not compressed, it's not that big!)

Thanks,

  


-Nigel

--
Nigel Horne
ClamAV, The Open-Source GPL Multi-Platform Anti-Virus tool-kit

execve("/usr/bin/updatedb.mlocate", ["/usr/bin/updatedb.mlocate"], [/* 50 vars */]) = 0
brk(0)  = 0x23bd000
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f37c619
access("/etc/ld.so.nohwcap", F_OK)  = -1 ENOENT (No such file or directory)
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f37c618e000
access("/etc/ld.so.preload", R_OK)  = -1 ENOENT (No such file or directory)
open("/etc/ld.so.cache", O_RDONLY)  = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=67876, ...}) = 0
mmap(NULL, 67876, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7f37c617d000
close(3)= 0
access("/etc/ld.so.nohwcap", F_OK)  = -1 ENOENT (No such file or directory)
open("/lib/libc.so.6", O_RDONLY)= 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\300\342\1\0\0\0\0\0@"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=1375536, ...}) = 0
mmap(NULL, 3482232, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f37c5c23000
mprotect(0x7f37c5d6d000, 2093056, PROT_NONE) = 0
mmap(0x7f37c5f6c000, 20480, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x149000) = 0x7f37c5f6c000
mmap(0x7f37c5f71000, 17016, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f37c5f71000
close(3)= 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f37c617c000
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f37c617b000
arch_prctl(ARCH_SET_FS, 0x7f37c617b6e0) = 0
mprotect(0x7f37c5f6c000, 12288, PROT_READ) = 0
munmap(0x7f37c617d000, 67876)   = 0
brk(0)  = 0x23bd000
brk(0x23de000)  = 0x23de000
open("/usr/lib/locale/locale-archive", O_RDONLY) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=1282800, ...}) = 0
mmap(NULL, 1282800, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7f37c6041000
close(3)= 0
open("/etc/updatedb.conf", O_RDONLY)= 3
fstat(3, {st_mode=S_IFREG|0644, st_size=248, ...}) = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f37c618d000
read(3, "PRUNE_BIND_MOUNTS=\"yes\"\n# PRUNENA"..., 4096) = 248
read(3, ""..., 4096)= 0
close(3)= 0
munmap(0x7f37c618d000, 4096)= 0
stat("/etc/mtab", {st_mode=S_IFREG|0644, st_size=808, ...}) = 0
open("/etc/mtab", O_RDONLY) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=808, ...}) = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f37c618d000
read(3, "/dev/sda6 / ext3 rw,noatime,error"..., 4096) = 808
lstat("/home", {st_mode=S_IFDIR|0755, st_size=4096, ...}) = 0
read(3, ""..., 4096)= 0
close(3)= 0
munmap(0x7f37c618d000, 4096)= 0
open("/var/lib/mlocate/mlocate.db", O_RDWR) = 3
read(3, "\0mlocate\0\0\0\331\0\1\0\0/\0prune_bind_moun"..., 8192) = 235
read(3, ""..., 8192)= 0
fcntl(3, F_SETLK, {type=F_WRLCK, whence=SEEK_SET, start=0, len=0}) = 0
rt_sigaction(SIGABRT, {0x403d40, [INT ABRT TERM], SA_RESTORER, 0x7f37c5c54f60}, NULL, 8) = 0
rt_sigaction(SIGINT, {0x403d40, [INT ABRT TERM], SA_RESTORER, 0x7f37c5c54f60}, NULL, 8) = 0
rt_sigaction(SIGTERM, {0x403d40, [INT ABRT TERM], SA_RESTORER, 0x7f37c5c54f60}, NULL, 8) = 0
getpid()= 4861
open("/var/lib/mlocate/mlocate.db.EhRV9C", O_RDWR|O_CREAT|O_EXCL, 0600) = 4
rt_sigprocmask(SIG_BLOCK, [INT ABRT TERM], [], 8) = 0
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
fcntl(4, F_GETFL)   = 0x8002 (flags O_RDWR|O_LARGEFILE)
fstat(4, {st_mode=S_IFREG|0600, st_size=0, ...}) = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f37c618d000
lseek(4, 0, SEEK_CUR)   = 0
chdir("/")  = 0
lstat(".", {st_mode=S_IFDIR|0755, st_size=4096, ...}) = 0
stat("/etc/mtab", {st_mode=S_IFREG|0644, st_size=808, ...}) = 0
write(4, "\0mlocate\0\0\0\331\0\1\0\0/\0prune_bind_moun"..., 235) = 235
close(4)= 0
munmap(0x7f37c618d000, 4096)= 0
socket(PF_FILE, SOCK_STREAM, 0) = 4
fcntl(4, F_SETFL, O_RDWR|O_NONBLOCK)= 0
connect(4, {sa_family=AF_FILE, path="/var/run/nscd/socket"...}, 110) = -1 ENOENT (No such file or directory)
close(4)= 0
socket(PF_FILE, SOCK_STREAM, 0) = 4
fcntl(4, F_SETFL, O_RDWR|O_NONBLOCK)= 0
connect(4, {sa_family=AF_FILE, path="/var/run/nscd/socket"...}, 110) = -1 ENOENT (No such file or directory