Bug#601741: openoffice.org-impress: OOo freeze and after some minutes freeze Xorg

2010-10-29 Thread rpnpif
Package: openoffice.org-impress
Version: 1:3.2.1-7
Severity: grave
Justification: causes non-serious data loss


Open 
http://media.eduscol.education.fr/file/seminaire_STI2D/56/7/STI2D_BacSTI2D_157567.odp
Export in PDF/A-1a.
The message export to PDF is displaying in status bar and OOo freezes with an 
high
CPU activity.
After some minutes, Xorg freezes (with no possible activity of the mouse).

-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/1 CPU core)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages openoffice.org-impress depends on:
ii  libc6  2.11.2-6+squeeze1 Embedded GNU C Library: Shared lib
ii  libgcc11:4.4.5-4 GCC support library
ii  libstdc++6 4.4.5-4   The GNU Standard C++ Library v3
ii  libstlport4.6ldbl  4.6.2-7   STLport C++ class library
ii  openoffice.org-core1:3.2.1-7 office productivity suite -- arch-
ii  openoffice.org-draw1:3.2.1-7 office productivity suite -- drawi
ii  ure1.6.1+OOo3.2.1-7  OpenOffice.org UNO runtime environ

openoffice.org-impress recommends no packages.

openoffice.org-impress suggests no packages.

Versions of packages openoffice.org-core depends on:
ii  fontconfig 2.8.0-2.1 generic font configuration library
ii  libc6  2.11.2-6+squeeze1 Embedded GNU C Library: Shared lib
ii  libcairo2  1.8.10-6  The Cairo 2D vector graphics libra
ii  libcurl3-gnutls7.21.0-1  Multi-protocol file transfer libra
ii  libdb4.8   4.8.30-2  Berkeley v4.8 Database Libraries [
ii  libexpat1  2.0.1-7   XML parsing C library - runtime li
ii  libfreetype6   2.4.2-1   FreeType 2 font engine, shared lib
ii  libgcc11:4.4.5-4 GCC support library
ii  libglib2.0-0   2.24.2-1  The GLib library of C routines
ii  libgraphite3   1:2.3.1-0.2   SILGraphite - a smart font rende
ii  libgstreamer-plugins-b 0.10.30-1 GStreamer libraries from the base
ii  libgstreamer0.10-0 0.10.30-1 Core GStreamer libraries and eleme
ii  libgtk2.0-02.20.1-2  The GTK+ graphical user interface 
ii  libhunspell-1.2-0  1.2.11-1  spell checker and morphological an
ii  libhyphen0 2.5-1 ALTLinux hyphenation library - sha
ii  libice62:1.0.6-1 X11 Inter-Client Exchange library
ii  libicu44   4.4.1-6   International Components for Unico
ii  libjpeg62  6b1-1 The Independent JPEG Group's JPEG 
ii  libmythes-1.2-02:1.2.1-1 simple thesaurus library
ii  libneon27-gnutls   0.29.3-2  An HTTP and WebDAV client library 
ii  libnspr4-0d4.8.6-1   NetScape Portable Runtime Library
ii  libnss3-1d 3.12.8-1  Network Security Service libraries
ii  librdf01.0.10-3  Redland Resource Description Frame
ii  libsm6 2:1.1.1-1 X11 Session Management library
ii  libssl0.9.80.9.8o-2  SSL shared libraries
ii  libstdc++6 4.4.5-4   The GNU Standard C++ Library v3
ii  libstlport4.6ldbl  4.6.2-7   STLport C++ class library
ii  libx11-6   2:1.3.3-3 X11 client-side library
ii  libxaw72:1.0.7-1 X11 Athena Widget library
ii  libxext6   2:1.1.2-1 X11 miscellaneous extension librar
ii  libxinerama1   2:1.1-3   X11 Xinerama extension library
ii  libxml22.7.7.dfsg-4  GNOME XML library
ii  libxrandr2 2:1.3.0-3 X11 RandR extension library
ii  libxrender11:0.9.6-1 X Rendering Extension client libra
ii  libxslt1.1 1.1.26-6  XSLT 1.0 processing library - runt
ii  libxt6 1:1.0.7-1 X11 toolkit intrinsics library
ii  openoffice.org-common  1:3.2.1-7 office productivity suite -- arch-
ii  ttf-opensymbol 1:3.2.1-7 OpenSymbol TrueType font
ii  ure1.6.1+OOo3.2.1-7  OpenOffice.org UNO runtime environ
ii  zlib1g 1:1.2.3.4.dfsg-3  compression library - runtime

Versions of packages openoffice.org-draw depends on:
ii  libc6  2.11.2-6+squeeze1 Embedded GNU C Library: Shared lib
ii  libgcc11:4.4.5-4 GCC support library
ii  libstdc++6 4.4.5-4   The GNU Standard C++ Library v3
ii  libstlport4.6ldbl  4.6.2-7   STLport C++ class library
ii  libwpd8c2a 0.8.14-1  Library for handling WordPerfect d
ii  libwpg-0.1-1   0.1.3-1   WordPerfect graphics import/conver
ii  

Bug#595446: Re: ntop: diff for NMU version 3:3.3-14.1

2010-10-29 Thread Ludovico Cavedon
Hi Alexander,

On 01/-10/-28163 11:59 AM, Alexander Reichle-Schmehl wrote:
 Sure, I rescheduled them to delayed/15.  But if you would rather provide
 backports and not release the package, wouldn't it make sense to cancel
 it alltogether?

I am going to co-maintain ntop with Jordan. As you have probably seen,
we have just uploaded a new version of ntop changing the maintainers and
fixing the RC bug, as a temporary package until ntop 4 is ready. We are
are now going to ask removal from squeeze though.

Thanks for you patch and NMU!

Cheers,
Ludovico




-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601430: gdebi-kde: gdebi gui ask for password but will not install package

2010-10-29 Thread Luca Falavigna
Could you please try to launch gdebi-kde in a console window to
eventually get a backtrace, or a meaningful log? Thanks!

-- 

  .''`.
 : :' :   Luca Falavigna dktrkr...@debian.org
 `. `'
   `-



signature.asc
Description: OpenPGP digital signature


Bug#588696: Attempted to update that package and failed :(

2010-10-29 Thread Alexander Reichle-Schmehl
Hi!

I just tried to bring this package in shape for the release.  Changelog
reads as follows:

iceowl-l10n (1.0~b1+debian.1-1) unstable; urgency=medium

   * QA upload.
   * New upstream release:
* These languages packs support iceowl 1.0~bX
  (Closes: #566396, #588696, #595621, #588897)
* Drop iceowl-l10n-gl-ES, iceowl-l10n-mk, iceowl-l10n-mn,
  iceowl-l10n-sl, iceowl-l10n-sv-SE, ceowl-l10n-uk, and
  iceowl-l10n-zh-TW as these languages doesn't seem to be supported
  anymore
* Added new translations iceowl-l10n-et, iceowl-l10n-fy-NL,
  iceowl-l10n-gl, iceowl-l10n-he, iceowl-l10n-id, iceowl-l10n-si,
  iceowl-l10n-ta-lk, iceowl-l10n-vi
* Adjust dependencies accordingly
* Also recommend hunspell dictionaries, fi they exist (Closes: #593582)
   * Bump debhelper build depends to  (= 7.0.50~) as dh overrider are
   * used
   * Bump standards to 3.9.1 (no changes needed)
   * Don't build as native package

 -- Alexander Reichle-Schmehl toli...@debian.org  Thu, 28 Oct 2010 16:05:43 
+0200

I basically downloaded the new files from
http://releases.mozilla.org/pub/mozilla.org/calendar/sunbird/releases/1.0b1/linux-i686/xpi/
dropped no longer supported languages
(http://www.mancomun.org/raquo-descargas/software-libre/produtos-mozilla/sunbird/traducion-galego-sunbird.html
doesn't seem to work anymore) and added packages for the new languages.

The package builds cleanly, can be installed and is also recognized by
iceowl:  If I install one of the packages, it will be shown in the
Addon-Menu of iceowl.  I think it also fixes #546189 (installation
problem with Italian language pack); at least I wasn't able to reproduce
it.

However, iceowl doesn't use the installed langauge packs, all menus and
everything are still shown in English.  I don't see anything on iceowls
error console, nor any usefull console output.  I have no idea, why the
new language packs are not used and don't know enough about mozilla
stuff to find it out.  FWIW I upload the results I had so far to
http://people.debian.org/~tolimar/tmp/iceowl-l10n/ in case someone would
like to work on them.


Dmitry, Christop, as you maintain similar packages for iceweasel and
icedove, or Daniel as former maintainer, do you have any idea or hints
where I should look at?


Best Regards,
  Alexander


signature.asc
Description: Digital signature


Bug#601747: RDS protocol vulnerability

2010-10-29 Thread Hideki Yamane
Package: linux-2.6
Version: 2.6.32-26
Severity: critical
Tags: security, patch

Hi,

 You know, RDS protocol vulnerability was found in Linux kernel.
 US-Cert says (http://www.kb.cert.org/vuls/id/362983)

 The RDS protocol implementation of Linux kernels 2.6.30 through
 2.6.38-rc8 contain a local privilege escalation vulnerability.

 And the patch from upstream git
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff_plain;h=799c10559d60f159ab2232203f222f18fa3c4a5f
 can apply to 2.6.32-26 with 1 hunk, please check it.

 thanks.



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#591457: status update

2010-10-29 Thread Neil Williams
xapt is in the NEW queue, aimed at experimental, but a lot of changes
needed to be made to the version that is currently part of
pdebuild-cross. Therefore, I do not think it suitable to push xapt as a
replacement for apt-cross as a fix for this particular bug. The two
programs are trying to do a similar task but are not equivalent. xapt
is a new codebase, it is a different approach.

To make things a little easier for users of apt-cross, xapt has been
uploaded to the Emdebian toolchain repository:

http://www.emdebian.org/toolchains/search.php?arch=i386distro=sidpackage=xapt

apt-cross was only ever useful when allied to a cross-building
toolchain on a Debian system, so this means that users of such
toolchains can now get xapt directly.

This should minimise the problems of removing apt-cross from Squeeze
without having a direct replacement in Debian itself.

I'll be seeking the removal of apt-cross from Squeeze this weekend.

-- 


Neil Williams
=
http://www.data-freedom.org/
http://www.linux.codehelp.co.uk/
http://e-mail.is-not-s.ms/



pgpPNlTXz3HkW.pgp
Description: PGP signature


Processed: bug is not new

2010-10-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 found 600826 23.2+1-4
Bug #600826 [src:emacs23] emacs23: FTBFS: E: Package 'mailx' has no 
installation candidate
Bug Marked as found in versions emacs23/23.2+1-4.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
600826: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600826
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: tagging 601747

2010-10-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 # Automatically generated email from bts, devscripts version 2.10.35lenny7
 tags 601747 + pending
Bug #601747 [linux-2.6] RDS protocol vulnerability
Added tag(s) pending.

End of message, stopping processing here.

Please contact me if you need assistance.
-- 
601747: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601747
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#600826: emacs23: FTBFS: E: Package 'mailx' has no installation candidate

2010-10-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 600826 + patch
Bug #600826 [src:emacs23] emacs23: FTBFS: E: Package 'mailx' has no 
installation candidate
Added tag(s) patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
600826: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600826
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#600826: emacs23: FTBFS: E: Package 'mailx' has no installation candidate

2010-10-29 Thread Sven Joachim
tags 600826 + patch
thanks

On 2010-10-20 14:25 +0200, Cyril Brulebois wrote:

 Source: emacs23
 Version: 23.2+1-5
 Severity: serious
 Justification: FTBFS

 Hi,

 you're build-depending on a virtual package, mailx, which isn't blessed
 by policy. That's not supported by the buildds (#595934), so depending
 on the installed packages in the chroots and on the running version of
 sbuild running, your package may be given back again and again.

This can trivially be avoided by preferring bsd-mailx over mailx as
build dependency.  I've attached a diff in case somebody wants to NMU.

Cheers,
   Sven

diff -Nru emacs23-23.2+1/debian/changelog emacs23-23.2+1/debian/changelog
--- emacs23-23.2+1/debian/changelog 2010-10-18 07:17:56.0 +0200
+++ emacs23-23.2+1/debian/changelog 2010-10-29 11:31:54.0 +0200
@@ -1,3 +1,11 @@
+emacs23 (23.2+1-5.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Prefer bsd-mailx over mailx as build dependency, since the latter
+is a pure virtual package (Closes: #600826).
+
+ -- Sven Joachim svenj...@gmx.de  Fri, 29 Oct 2010 11:31:54 +0200
+
 emacs23 (23.2+1-5) unstable; urgency=low
 
   * Apply upstream patches to prevent the string and unibyte-string
diff -Nru emacs23-23.2+1/debian/control emacs23-23.2+1/debian/control
--- emacs23-23.2+1/debian/control   2010-10-18 07:19:32.0 +0200
+++ emacs23-23.2+1/debian/control   2010-10-29 11:36:47.0 +0200
@@ -2,7 +2,7 @@
 Section: editors
 Priority: optional
 Maintainer: Rob Browning r...@defaultvalue.org
-Build-Depends: mailx, libncurses5-dev, texinfo, liblockfile-dev, librsvg2-dev,
+Build-Depends: bsd-mailx | mailx, libncurses5-dev, texinfo, liblockfile-dev, 
librsvg2-dev,
  libgif-dev | libungif4-dev, libtiff4-dev | libtiff-dev, xaw3dg-dev,
  libpng12-dev, libjpeg62-dev, libm17n-dev, libotf-dev,
  libgpm-dev [!hurd-i386 !kfreebsd-i386 !kfreebsd-amd64], libdbus-1-dev,
diff -Nru emacs23-23.2+1/debian/control.in emacs23-23.2+1/debian/control.in
--- emacs23-23.2+1/debian/control.in2010-08-14 18:54:18.0 +0200
+++ emacs23-23.2+1/debian/control.in2010-10-29 11:31:38.0 +0200
@@ -2,7 +2,7 @@
 Section: editors
 Priority: optional
 Maintainer: Rob Browning r...@defaultvalue.org
-Build-Depends: mailx, libncurses5-dev, texinfo, liblockfile-dev, librsvg2-dev,
+Build-Depends: bsd-mailx | mailx, libncurses5-dev, texinfo, liblockfile-dev, 
librsvg2-dev,
  libgif-dev | libungif4-dev, libtiff4-dev | libtiff-dev, xaw3dg-dev,
  libpng12-dev, libjpeg62-dev, libm17n-dev, libotf-dev,
  libgpm-dev [!hurd-i386 !kfreebsd-i386 !kfreebsd-amd64], libdbus-1-dev,


Bug#601754: Psql binary license incompatibility

2010-10-29 Thread Arto Jantunen

Package: postgresql-client
Version: 8.3.12-0lenny1
Severity: serious

During a general conversation about readline licensing, I noticed that psql
links to both libreadline (GPL v2+) and libssl (BSD-like, incompatible with
the GPL), thus ending up with the terms of both licenses applying. My
reasoning is that since the licenses are incompatible with each other, the
binary is technically undistributable. The consensus on #debian-devel was that
this reasoning is correct.

Upstream claims that it should be possible to replace readline with libedit,
and I noticed that libeditline is another option. It would of course be
preferable to use one of those instead of disabling the functionality
completely.

I decided to file this against the version of the package in lenny, since it
in my understanding applies to all versions currently distributed by Debian
(the one in lenny being the oldest).

-- 
Arto Jantunen



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#592024: marked as done (glib2.0: FTBFS on kfreebsd-*: /bin/bash: C: command not found)

2010-10-29 Thread Debian Bug Tracking System
Your message dated Fri, 29 Oct 2010 10:32:21 +
with message-id e1pbmfx-0006bo...@franck.debian.org
and subject line Bug#592024: fixed in glib2.0 2.27.1-1
has caused the Debian Bug report #592024,
regarding glib2.0: FTBFS on kfreebsd-*: /bin/bash: C: command not found
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
592024: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=592024
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Source: glib2.0
Version: 2.25.12-2
Severity: serious
Justification: FTBFS
User: debian-...@lists.debian.org
Usertags: kfreebsd

Hi,

your package no longer builds on kfreebsd-*:
| make[3]: Entering directory 
`/build/buildd-glib2.0_2.25.12-2-kfreebsd-amd64-1vI2PE/glib2.0-2.25.12/debian/build/deb/glib'
| cd ..  \
| /bin/bash ./config.status glib/glibconfig.h
| config.status: executing glib/glibconfig.h commands
| config.status: glib/glibconfig.h is unchanged
| C -h -s 
/build/buildd-glib2.0_2.25.12-2-kfreebsd-amd64-1vI2PE/glib2.0-2.25.12/glib/glib_probes.d
 -o glib_probes.h.tmp
| /bin/bash: C: command not found
| make[3]: [glib_probes.h] Error 127 (ignored)
| sed -e s,define STAP_HAS_SEMAPHORES 1,undef STAP_HAS_SEMAPHORES,  
glib_probes.h.tmp  glib_probes.h  rm -f glib_probes.h.tmp
| /bin/bash: glib_probes.h.tmp: No such file or directory
| make[3]: *** [glib_probes.h] Error 1

Full build logs:
  https://buildd.debian.org/status/package.php?p=glib2.0suite=experimental

Mraw,
KiBi.


---End Message---
---BeginMessage---
Source: glib2.0
Source-Version: 2.27.1-1

We believe that the bug you reported is fixed in the latest version of
glib2.0, which is due to be installed in the Debian FTP archive:

glib2.0_2.27.1-1.diff.gz
  to main/g/glib2.0/glib2.0_2.27.1-1.diff.gz
glib2.0_2.27.1-1.dsc
  to main/g/glib2.0/glib2.0_2.27.1-1.dsc
glib2.0_2.27.1.orig.tar.gz
  to main/g/glib2.0/glib2.0_2.27.1.orig.tar.gz
libglib2.0-0-dbg_2.27.1-1_amd64.deb
  to main/g/glib2.0/libglib2.0-0-dbg_2.27.1-1_amd64.deb
libglib2.0-0-refdbg_2.27.1-1_amd64.deb
  to main/g/glib2.0/libglib2.0-0-refdbg_2.27.1-1_amd64.deb
libglib2.0-0_2.27.1-1_amd64.deb
  to main/g/glib2.0/libglib2.0-0_2.27.1-1_amd64.deb
libglib2.0-bin_2.27.1-1_amd64.deb
  to main/g/glib2.0/libglib2.0-bin_2.27.1-1_amd64.deb
libglib2.0-data_2.27.1-1_all.deb
  to main/g/glib2.0/libglib2.0-data_2.27.1-1_all.deb
libglib2.0-dev_2.27.1-1_amd64.deb
  to main/g/glib2.0/libglib2.0-dev_2.27.1-1_amd64.deb
libglib2.0-doc_2.27.1-1_all.deb
  to main/g/glib2.0/libglib2.0-doc_2.27.1-1_all.deb
libglib2.0-udeb_2.27.1-1_amd64.udeb
  to main/g/glib2.0/libglib2.0-udeb_2.27.1-1_amd64.udeb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 592...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sebastian Dröge sl...@debian.org (supplier of updated glib2.0 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Fri, 29 Oct 2010 11:32:02 +0200
Source: glib2.0
Binary: libglib2.0-0 libglib2.0-udeb libglib2.0-bin libglib2.0-dev 
libglib2.0-0-dbg libglib2.0-data libglib2.0-doc libgio-fam libglib2.0-0-refdbg
Architecture: source all amd64
Version: 2.27.1-1
Distribution: experimental
Urgency: low
Maintainer: Loic Minier l...@dooz.org
Changed-By: Sebastian Dröge sl...@debian.org
Description: 
 libgio-fam - GLib Input, Output and Streaming Library (fam module)
 libglib2.0-0 - The GLib library of C routines
 libglib2.0-0-dbg - The GLib libraries and debugging symbols
 libglib2.0-0-refdbg - The GLib library of C routines - refdbg library
 libglib2.0-bin - The programs for the GLib library
 libglib2.0-data - Common files for GLib library
 libglib2.0-dev - Development files for the GLib library
 libglib2.0-doc - Documentation files for the GLib library
 libglib2.0-udeb - The GLib library of C routines - minimal runtime (udeb)
Closes: 592024 599743
Changes: 
 glib2.0 (2.27.1-1) experimental; urgency=low
 .
   [ Josselin Mouette ]
   * Drop lynx dependency in the -doc package. Suggest devhelp instead.
 Closes: #599743.
 .
   [ Sebastian Dröge ]
   * New upstream development release:
 + debian/patches/70_fix-header-cleaup-fallout.patch:
   - Dropped, merged upstream.
 + debian/patches/*:
   - Refreshed.
 + 

Bug#601760: Does not work with new Xapian libs

2010-10-29 Thread Enrico Zini
Package: fuss-launcher
Version: 0.4-1
Severity: serious

Hello,

fuss-launcher does not work with python-xapian currently in squeeze.
Trying to search anything gives no reply and this on stderr:

Traceback (most recent call last):
  File /usr/lib/pymodules/python2.6/fusslauncher/ui.py, line 529, in 
update_filter
desktops = [x[1] for x in self.engine.documents()]
  File /usr/lib/pymodules/python2.6/fusslauncher/engine.py, line 348, in 
documents
for score, doc in self.db.documents(first, count):
  File /usr/lib/pymodules/python2.6/fusslauncher/engine.py, line 189, in 
documents
score = m[xapian.MSET_PERCENT]
TypeError: 'MSetItem' object does not support indexing

I'll now prepare an updated version which uses the new Python Xapian API.


Ciao,

Enrico

-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages fuss-launcher depends on:
ii  app-install-data2010.08.21   Application Installer Data Files
ii  apt-xapian-index0.40 maintenance and search tools for a
ii  python  2.6.6-3+squeeze1 interactive high-level object-orie
ii  python-gconf2.28.1-1 Python bindings for the GConf conf
ii  python-gtk2 2.17.0-4 Python bindings for the GTK+ widge
ii  python-support  1.0.10   automated rebuilding support for P
ii  python-xapian   1.2.3-3  Xapian search engine interface for
ii  python-xdg  0.19-2   Python library to access freedeskt

fuss-launcher recommends no packages.

fuss-launcher suggests no packages.

-- no debconf information



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601762: freeimage: hardcodes arch-specific values from i386

2010-10-29 Thread Julien Cristau
Package: freeimage
Version: 3.10.0-2
Severity: grave

Source/LibTIFF/tif_config.h has:
#define SIZEOF_LONG 4

tif_config.h is generated by tiff's configure script, and as such is
arch-specific.

Cheers,
Julien


signature.asc
Description: Digital signature


Bug#601760: marked as done (Does not work with new Xapian libs)

2010-10-29 Thread Debian Bug Tracking System
Your message dated Fri, 29 Oct 2010 11:32:07 +
with message-id e1pbnbn-0001l1...@franck.debian.org
and subject line Bug#601760: fixed in fuss-launcher 0.5-1
has caused the Debian Bug report #601760,
regarding Does not work with new Xapian libs
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
601760: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601760
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: fuss-launcher
Version: 0.4-1
Severity: serious

Hello,

fuss-launcher does not work with python-xapian currently in squeeze.
Trying to search anything gives no reply and this on stderr:

Traceback (most recent call last):
  File /usr/lib/pymodules/python2.6/fusslauncher/ui.py, line 529, in 
update_filter
desktops = [x[1] for x in self.engine.documents()]
  File /usr/lib/pymodules/python2.6/fusslauncher/engine.py, line 348, in 
documents
for score, doc in self.db.documents(first, count):
  File /usr/lib/pymodules/python2.6/fusslauncher/engine.py, line 189, in 
documents
score = m[xapian.MSET_PERCENT]
TypeError: 'MSetItem' object does not support indexing

I'll now prepare an updated version which uses the new Python Xapian API.


Ciao,

Enrico

-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages fuss-launcher depends on:
ii  app-install-data2010.08.21   Application Installer Data Files
ii  apt-xapian-index0.40 maintenance and search tools for a
ii  python  2.6.6-3+squeeze1 interactive high-level object-orie
ii  python-gconf2.28.1-1 Python bindings for the GConf conf
ii  python-gtk2 2.17.0-4 Python bindings for the GTK+ widge
ii  python-support  1.0.10   automated rebuilding support for P
ii  python-xapian   1.2.3-3  Xapian search engine interface for
ii  python-xdg  0.19-2   Python library to access freedeskt

fuss-launcher recommends no packages.

fuss-launcher suggests no packages.

-- no debconf information


---End Message---
---BeginMessage---
Source: fuss-launcher
Source-Version: 0.5-1

We believe that the bug you reported is fixed in the latest version of
fuss-launcher, which is due to be installed in the Debian FTP archive:

fuss-launcher_0.5-1.diff.gz
  to main/f/fuss-launcher/fuss-launcher_0.5-1.diff.gz
fuss-launcher_0.5-1.dsc
  to main/f/fuss-launcher/fuss-launcher_0.5-1.dsc
fuss-launcher_0.5-1_all.deb
  to main/f/fuss-launcher/fuss-launcher_0.5-1_all.deb
fuss-launcher_0.5.orig.tar.gz
  to main/f/fuss-launcher/fuss-launcher_0.5.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 601...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Enrico Zini enr...@debian.org (supplier of updated fuss-launcher package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 29 Oct 2010 12:55:13 +0200
Source: fuss-launcher
Binary: fuss-launcher
Architecture: source all
Version: 0.5-1
Distribution: unstable
Urgency: low
Maintainer: Enrico Zini enr...@debian.org
Changed-By: Enrico Zini enr...@debian.org
Description: 
 fuss-launcher - a simple application launcher
Closes: 601760
Changes: 
 fuss-launcher (0.5-1) unstable; urgency=low
 .
   * Port to new Xapian API. Closes: #601760
Checksums-Sha1: 
 71f75abe5a028768ed0302a48d04bf463b84fb09 1930 fuss-launcher_0.5-1.dsc
 7b1b37e4766f564e016b6eecac8c4da4c8a8287c 27034 fuss-launcher_0.5.orig.tar.gz
 206f80b1a31b5e50815287c1095021aa05afe7f2 3235 fuss-launcher_0.5-1.diff.gz
 ef46b94f8d2789c18ce7520a5f56efec52101faf 22136 fuss-launcher_0.5-1_all.deb
Checksums-Sha256: 
 133ed6718d5b87ca50972fcf3f61c5c5600110c20cec038a44599a70be7fb312 1930 
fuss-launcher_0.5-1.dsc
 94e957c124d2ef32c0eb60b5fe97b42146c449a9bdd61728301878f16cb0b293 27034 
fuss-launcher_0.5.orig.tar.gz
 43ac9d73b997a115777d5a4e2d4740ffc5982740197cd2da715a9ac8fffcc6cd 3235 
fuss-launcher_0.5-1.diff.gz
 

Bug#601685: libbsf-java: package does not support optional libs (as the description claims)

2010-10-29 Thread Ximin Luo
severity 601685 important

On 29/10/10 06:17, tony mancill wrote:
 I've applied the patch and committed the update to the packaging repo.

cool, thanks :)

 I'm not sure I agree with the severity - the current package isn't completely
 unusable, is it?  (Your bug report says mostly useless.)  Would severity
 important be more appropriate?

oh, I picked that based on the fact that only 1/5 of the options are supported.
after playing around with the package, i've found that this issue currently
only affects js on java 5, so I guess important is better.

(the other three libs are not supported by debian anyway, and js/bsf is
included with java 6.)

X

-- 
GPG: 4096R/5FBBDBCE



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed (with 5 errors): Re: Bug#601685: libbsf-java: package does not support optional libs (as the description claims)

2010-10-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 601685 important
Bug #601685 [libbsf-java] libbsf-java: package does not support optional libs 
(as the description claims)
Severity set to 'important' from 'grave'

 On 29/10/10 06:17, tony mancill wrote:
Unknown command or malformed arguments to command.

  I've applied the patch and committed the update to the packaging repo.
Unknown command or malformed arguments to command.

 cool, thanks :)
Unknown command or malformed arguments to command.

  I'm not sure I agree with the severity - the current package isn't 
  completely
Unknown command or malformed arguments to command.

  unusable, is it?  (Your bug report says mostly useless.)  Would severity
Unknown command or malformed arguments to command.

Too many unknown commands, stopping here.

Please contact me if you need assistance.
-- 
601685: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601685
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601768: does not configure during upgrade

2010-10-29 Thread Sven Hartge
Package: isdnutils-base
Version: 1:3.9.20060704+dfsg.2-5
Severity: grave

Hi.

During upgrade and configure, the following happens:

Setting up isdnutils-base (1:3.9.20060704+dfsg.2-5) ...
dpkg: error processing isdnutils-base (--configure):
 subprocess installed post-installation script returned error exit status 30
dpkg: dependency problems prevent configuration of isdnlog:
 isdnlog depends on isdnutils-base (= 1:3.9.20060704+dfsg.2-5); however:
  Package isdnutils-base is not configured yet.
dpkg: error processing isdnlog (--configure):
 dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of isdnvboxserver:
 isdnvboxserver depends on isdnutils-base (= 1:3.9.20060704+dfsg.2-5); however:
  Package isdnutils-base is not configured yet.
dpkg: error processing isdnvboxserver (--configure):
 dependency problems - leaving unconfigured
 isdnutils-base
 isdnlog
 isdnvboxserver

This is the same as bug 554537. 

Maybe reopen that old one and merge these two bugs?

Grüße,
Sven.

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (200, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.32.3-221
Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages isdnutils-base depends on:
ii  debconf [debconf-2.0] 1.5.36 Debian configuration management sy
ii  libc6 2.11.2-6   Embedded GNU C Library: Shared lib
ii  libncurses5   5.7+20100313-4 shared libraries for terminal hand
ii  lsb-base  3.2-26 Linux Standard Base 3.2 init scrip
ii  makedev   2.3.1-89   creates device files in /dev
ii  udev  164-1  /dev/ and hotplug management daemo

isdnutils-base recommends no packages.

Versions of packages isdnutils-base suggests:
pn  ipppdnone  (no description available)
pn  isdnlog  none  (no description available)
pn  isdnutils-docnone  (no description available)
pn  isdnutils-xtools none  (no description available)
ii  isdnvboxclient   1:3.9.20060704+dfsg.2-5 ISDN utilities - answering machine
pn  isdnvboxserver   none  (no description available)

-- debconf-show failed



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#553502: gdb'ing

2010-10-29 Thread Marcos Marado
Did
apt-get source autolog
make
1) could reproduce the problem with ./autolog -d -o
2) could NOT reproduce the problem with gdb --args ./autolog -d -o

:-( Anything else I should do?

-- 
Marcos Marado



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601768: does not configure during upgrade

2010-10-29 Thread Rolf Leggewie
severity 601768 normal
thanks


Sven,

thank you for the bug report.

I've only just taken over isdnutils with this release.  There's still
many things that need to be worked out in isdnutils and I'm sure
there'll be more breakage before that's done.  Please bear with me.

I'll turn off abort on error again to allow for the upgrades to
happen.  I've put a small FIXME note in the maintenance scripts to
remind Jan and me to fix this properly, pointing to this ticket.  As
such, I won't close this ticket although the upgrade breakage should be
fixed with the next release, but the underlying issue isn't.  I'll
downgrade severity since it's no longer an RC bug.

Regards

Rolf



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#601768: does not configure during upgrade

2010-10-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 601768 normal
Bug #601768 [isdnutils-base] does not configure during upgrade
Severity set to 'normal' from 'grave'

 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
601768: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601768
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601617: Installed into /lib, but depends on libraries from /usr/lib

2010-10-29 Thread Marco d'Itri
On Oct 29, Julien Cristau jcris...@debian.org wrote:

 On Wed, Oct 27, 2010 at 23:02:23 +0200, Josselin Mouette wrote:
 
  Apparently libgpod-common is using libgobject too, in a binary run from
  udev rules. So that makes another reason for moving libgobject to /lib -
  maybe even in squeeze, if this is considered RC.

 There's no way we're moving all that crap to /lib...
Agreed. At least for these programs the correct solution is to use 
wait_for_file in a wrapper, like /lib/udev/alsa-utils.

Unless anybody has a better idea, in the next upload (is there any
hurry?) I will move the library back to /usr for the time being.

-- 
ciao,
Marco


signature.asc
Description: Digital signature


Bug#601617: Installed into /lib, but depends on libraries from /usr/lib

2010-10-29 Thread Julien Cristau
On Wed, Oct 27, 2010 at 23:02:23 +0200, Josselin Mouette wrote:

 Apparently libgpod-common is using libgobject too, in a binary run from
 udev rules. So that makes another reason for moving libgobject to /lib -
 maybe even in squeeze, if this is considered RC.
 
The way to fix that for squeeze would be to fix it in libgpod imo (to
either not use this stuff from udev rules, or not use gobject), not in
glib.  /lib/udev/ipod-set-info and /lib/udev/iphone-set-info are utterly
screwed up, and not just wrt glib:

$ ldd /lib/udev/ipod-set-info |grep -c usr
17
$ ldd /lib/udev/iphone-set-info |grep -c usr
10

There's no way we're moving all that crap to /lib...

Cheers,
Julien


signature.asc
Description: Digital signature


Bug#385760: The dspam daemon should NOT be run by user dspam or default port needs to move

2010-10-29 Thread Julien Cristau
On Thu, Oct 28, 2010 at 06:45:52 +0200, Julien Valroff wrote:

 tags 385760 + pending
 thanks
 
 Le jeudi 28 oct. 2010 à 00:55:18 (+0200), Martin Zobel-Helas a écrit :
  Hi,
 
 Hi Martin,
  
  in the default configuration of dspam, if daemon gets enabled, the
  daemon wants to listen on tcp port 24. Starting dspam per default as
  user dspam then will just not work. Linux prevents direct “reserved
  port” assignments by any process other than system root.
  
  So you either let it run by root or fix the default port for this
  application.
  
  Interim-Solution: fix the init-script to blow up if user tries this.
 
 This is already fixed in git. The default port is now 1024.
 
1024 really doesn't sound like a good idea either, imo, there's every
chance somebody else will choose the first non-privileged port for some
other use.

Cheers,
Julien


signature.asc
Description: Digital signature


Bug#553502: gdb'ing

2010-10-29 Thread Luis Uribe
Hi

On Fri, Oct 29, 2010 at 01:01:17PM +0100, Marcos Marado wrote:
 Did
 apt-get source autolog
 make
 1) could reproduce the problem with ./autolog -d -o
 2) could NOT reproduce the problem with gdb --args ./autolog -d -o
 
 :-( Anything else I should do?

Same to me.

I follow the instructions on  http://wiki.debian.org/HowToGetABacktrace 
and https://wiki.ubuntu.com/Backtrace

volatile:~# file /usr/sbin/autolog
/usr/sbin/autolog: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV),
dynamically linked (uses shared libs), for GNU/Linux 2.6.18, not stripped


-- 
Luis
http://eviled.org


signature.asc
Description: Digital signature


Bug#595559: marked as done (freeimage: should this package be orphaned?)

2010-10-29 Thread Debian Bug Tracking System
Your message dated Fri, 29 Oct 2010 13:32:12 +
with message-id e1pbp40-00039v...@franck.debian.org
and subject line Bug#595559: fixed in freeimage 3.10.0-3
has caused the Debian Bug report #595559,
regarding freeimage: should this package be orphaned?
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
595559: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=595559
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Source: freeimage
Version: 3.10.0-2
Severity: grave

Hi,

The package hasn't seen any upload since September last year and is six 
releases behind. Given that the package uses multiple embedded libraries, it 
needs to be actively maintained (it should use the system libraries too.)

Unless somebody steps up to maintain it, it should probably be dropped from 
Squeeze.

Cheers,
-- 
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net


---End Message---
---BeginMessage---
Source: freeimage
Source-Version: 3.10.0-3

We believe that the bug you reported is fixed in the latest version of
freeimage, which is due to be installed in the Debian FTP archive:

freeimage_3.10.0-3.diff.gz
  to main/f/freeimage/freeimage_3.10.0-3.diff.gz
freeimage_3.10.0-3.dsc
  to main/f/freeimage/freeimage_3.10.0-3.dsc
libfreeimage-dev_3.10.0-3_amd64.deb
  to main/f/freeimage/libfreeimage-dev_3.10.0-3_amd64.deb
libfreeimage3-dbg_3.10.0-3_amd64.deb
  to main/f/freeimage/libfreeimage3-dbg_3.10.0-3_amd64.deb
libfreeimage3_3.10.0-3_amd64.deb
  to main/f/freeimage/libfreeimage3_3.10.0-3_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 595...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Julien Cristau jcris...@debian.org (supplier of updated freeimage package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 29 Oct 2010 14:46:46 +0200
Source: freeimage
Binary: libfreeimage-dev libfreeimage3 libfreeimage3-dbg
Architecture: source amd64
Version: 3.10.0-3
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group packa...@qa.debian.org
Changed-By: Julien Cristau jcris...@debian.org
Description: 
 libfreeimage-dev - Support library for graphics image formats (development 
files)
 libfreeimage3 - Support library for graphics image formats (library)
 libfreeimage3-dbg - Support library for graphics image formats (debugging 
symbols)
Closes: 558857 595559 595560 601002 601762
Changes: 
 freeimage (3.10.0-3) unstable; urgency=low
 .
   * Don't use embedded copies of various libraries, add build-deps on their
 packaged versions (closes: #595560):
 - libjpeg 6b
 - libmng 1.0.9
 - libopenjpeg 1.2.0
 - libpng 1.2.23
   + CVE-2010-2249, CVE-2010-1205, CVE-2010-0205, CVE-2009-2042,
 CVE-2008-6218, CVE-2008-5907, CVE-2009-0040, CVE-2008-3964,
 CVE-2008-1382
 - openexr 1.6.1
   + CVE-2009-1720, CVE-2009-1721
 - zlib 1.2.3
   * The embedded libtiff copy is still used, because freeimage uses its
 internals and I couldn't figure out how to unentangle this.  Update the
 tiff copy to 3.9.4-5, though:
 CVE-2010-3087, CVE-2010-2483, CVE-2010-2482, CVE-2010-2481, CVE-2010-2443,
 CVE-2010-2233, CVE-2010-2067, CVE-2010-2065, CVE-2010-1411, CVE-2009-2347,
 CVE-2008-2327.
   * Add tiff copyright and license to debian/copyright (closes: #601002)
   * Link with -lm (closes: #558857).
   * Try to avoid arch-specific values in our copy of tif_config.h and
 tiffconf.h (closes: #601762)
   * Set LFS CFLAGS in Makefile.gnu.
   * Orphan package (closes: #595559).
Checksums-Sha1: 
 11e6b0d0e1eaf7413f64e1ce00e478006fd4cb81 1966 freeimage_3.10.0-3.dsc
 542471c11ecc15facf712c218416d2a5a41b3335 535198 freeimage_3.10.0-3.diff.gz
 0905735a7e997ed078f54f0d08064646b0261c8e 8057990 
libfreeimage-dev_3.10.0-3_amd64.deb
 078e561ca29d262f14a58e04a86109f725485ab0 801806 
libfreeimage3_3.10.0-3_amd64.deb
 39add70677607e057efc8dde26748dd51a2e5e44 2493874 
libfreeimage3-dbg_3.10.0-3_amd64.deb
Checksums-Sha256: 
 c821fbdcb7662c8e26b4e9938f96444197af2e7069007451c54e9d6cd86180e2 1966 
freeimage_3.10.0-3.dsc
 948f293e48478b73124ad21d37c75036287dabf2344b42e528965930eb49f98b 535198 
freeimage_3.10.0-3.diff.gz
 

Bug#595560: marked as done (freeimage: multiple vulnerabilities in embedded code copies)

2010-10-29 Thread Debian Bug Tracking System
Your message dated Fri, 29 Oct 2010 13:32:12 +
with message-id e1pbp40-00039a...@franck.debian.org
and subject line Bug#595560: fixed in freeimage 3.10.0-3
has caused the Debian Bug report #595560,
regarding freeimage: multiple vulnerabilities in embedded code copies
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
595560: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=595560
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Source: freeimage
Version: 3.10.0-1
Severity: grave
Tags: security

Hi,

At least the tiff, libpng, and openexr embedded copies have multiple 
vulnerabilities each.

You should refer to the following pages to determine what vulnerabilities 
affect freeimage:
http://security-tracker.debian.org/tracker/source-package/libpng
http://security-tracker.debian.org/tracker/source-package/tiff
http://security-tracker.debian.org/tracker/source-package/openexr

Regards,
-- 
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net


---End Message---
---BeginMessage---
Source: freeimage
Source-Version: 3.10.0-3

We believe that the bug you reported is fixed in the latest version of
freeimage, which is due to be installed in the Debian FTP archive:

freeimage_3.10.0-3.diff.gz
  to main/f/freeimage/freeimage_3.10.0-3.diff.gz
freeimage_3.10.0-3.dsc
  to main/f/freeimage/freeimage_3.10.0-3.dsc
libfreeimage-dev_3.10.0-3_amd64.deb
  to main/f/freeimage/libfreeimage-dev_3.10.0-3_amd64.deb
libfreeimage3-dbg_3.10.0-3_amd64.deb
  to main/f/freeimage/libfreeimage3-dbg_3.10.0-3_amd64.deb
libfreeimage3_3.10.0-3_amd64.deb
  to main/f/freeimage/libfreeimage3_3.10.0-3_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 595...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Julien Cristau jcris...@debian.org (supplier of updated freeimage package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 29 Oct 2010 14:46:46 +0200
Source: freeimage
Binary: libfreeimage-dev libfreeimage3 libfreeimage3-dbg
Architecture: source amd64
Version: 3.10.0-3
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group packa...@qa.debian.org
Changed-By: Julien Cristau jcris...@debian.org
Description: 
 libfreeimage-dev - Support library for graphics image formats (development 
files)
 libfreeimage3 - Support library for graphics image formats (library)
 libfreeimage3-dbg - Support library for graphics image formats (debugging 
symbols)
Closes: 558857 595559 595560 601002 601762
Changes: 
 freeimage (3.10.0-3) unstable; urgency=low
 .
   * Don't use embedded copies of various libraries, add build-deps on their
 packaged versions (closes: #595560):
 - libjpeg 6b
 - libmng 1.0.9
 - libopenjpeg 1.2.0
 - libpng 1.2.23
   + CVE-2010-2249, CVE-2010-1205, CVE-2010-0205, CVE-2009-2042,
 CVE-2008-6218, CVE-2008-5907, CVE-2009-0040, CVE-2008-3964,
 CVE-2008-1382
 - openexr 1.6.1
   + CVE-2009-1720, CVE-2009-1721
 - zlib 1.2.3
   * The embedded libtiff copy is still used, because freeimage uses its
 internals and I couldn't figure out how to unentangle this.  Update the
 tiff copy to 3.9.4-5, though:
 CVE-2010-3087, CVE-2010-2483, CVE-2010-2482, CVE-2010-2481, CVE-2010-2443,
 CVE-2010-2233, CVE-2010-2067, CVE-2010-2065, CVE-2010-1411, CVE-2009-2347,
 CVE-2008-2327.
   * Add tiff copyright and license to debian/copyright (closes: #601002)
   * Link with -lm (closes: #558857).
   * Try to avoid arch-specific values in our copy of tif_config.h and
 tiffconf.h (closes: #601762)
   * Set LFS CFLAGS in Makefile.gnu.
   * Orphan package (closes: #595559).
Checksums-Sha1: 
 11e6b0d0e1eaf7413f64e1ce00e478006fd4cb81 1966 freeimage_3.10.0-3.dsc
 542471c11ecc15facf712c218416d2a5a41b3335 535198 freeimage_3.10.0-3.diff.gz
 0905735a7e997ed078f54f0d08064646b0261c8e 8057990 
libfreeimage-dev_3.10.0-3_amd64.deb
 078e561ca29d262f14a58e04a86109f725485ab0 801806 
libfreeimage3_3.10.0-3_amd64.deb
 39add70677607e057efc8dde26748dd51a2e5e44 2493874 
libfreeimage3-dbg_3.10.0-3_amd64.deb
Checksums-Sha256: 
 c821fbdcb7662c8e26b4e9938f96444197af2e7069007451c54e9d6cd86180e2 1966 
freeimage_3.10.0-3.dsc
 

Bug#601002: marked as done (libfreeimage3: No mention of embedded libraries in copyright file)

2010-10-29 Thread Debian Bug Tracking System
Your message dated Fri, 29 Oct 2010 13:32:12 +
with message-id e1pbp40-00039e...@franck.debian.org
and subject line Bug#601002: fixed in freeimage 3.10.0-3
has caused the Debian Bug report #601002,
regarding libfreeimage3: No mention of embedded libraries in copyright file
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
601002: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601002
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: libfreeimage3
Version: 3.10.0-2
Severity: serious
Justification: Policy 12.5 Copyright Information

Every package must be accompanied by a verbatim copy of its copyright
information and distribution license in the file
/usr/share/doc/package/copyright.

FreeImage ships embedded copies of libjpeg, libmng, libopenjpeg, libpng,
libtiff and openexr, but there is no mention of these works in the
copyright file.

-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (530, 'testing'), (520, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages libfreeimage3 depends on:
ii  libc6 2.11.2-6   Embedded GNU C Library: Shared lib
ii  libgcc1   1:4.4.5-4  GCC support library
ii  libstdc++64.4.5-4The GNU Standard C++ Library v3

libfreeimage3 recommends no packages.

libfreeimage3 suggests no packages.

-- no debconf information


---End Message---
---BeginMessage---
Source: freeimage
Source-Version: 3.10.0-3

We believe that the bug you reported is fixed in the latest version of
freeimage, which is due to be installed in the Debian FTP archive:

freeimage_3.10.0-3.diff.gz
  to main/f/freeimage/freeimage_3.10.0-3.diff.gz
freeimage_3.10.0-3.dsc
  to main/f/freeimage/freeimage_3.10.0-3.dsc
libfreeimage-dev_3.10.0-3_amd64.deb
  to main/f/freeimage/libfreeimage-dev_3.10.0-3_amd64.deb
libfreeimage3-dbg_3.10.0-3_amd64.deb
  to main/f/freeimage/libfreeimage3-dbg_3.10.0-3_amd64.deb
libfreeimage3_3.10.0-3_amd64.deb
  to main/f/freeimage/libfreeimage3_3.10.0-3_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 601...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Julien Cristau jcris...@debian.org (supplier of updated freeimage package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 29 Oct 2010 14:46:46 +0200
Source: freeimage
Binary: libfreeimage-dev libfreeimage3 libfreeimage3-dbg
Architecture: source amd64
Version: 3.10.0-3
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group packa...@qa.debian.org
Changed-By: Julien Cristau jcris...@debian.org
Description: 
 libfreeimage-dev - Support library for graphics image formats (development 
files)
 libfreeimage3 - Support library for graphics image formats (library)
 libfreeimage3-dbg - Support library for graphics image formats (debugging 
symbols)
Closes: 558857 595559 595560 601002 601762
Changes: 
 freeimage (3.10.0-3) unstable; urgency=low
 .
   * Don't use embedded copies of various libraries, add build-deps on their
 packaged versions (closes: #595560):
 - libjpeg 6b
 - libmng 1.0.9
 - libopenjpeg 1.2.0
 - libpng 1.2.23
   + CVE-2010-2249, CVE-2010-1205, CVE-2010-0205, CVE-2009-2042,
 CVE-2008-6218, CVE-2008-5907, CVE-2009-0040, CVE-2008-3964,
 CVE-2008-1382
 - openexr 1.6.1
   + CVE-2009-1720, CVE-2009-1721
 - zlib 1.2.3
   * The embedded libtiff copy is still used, because freeimage uses its
 internals and I couldn't figure out how to unentangle this.  Update the
 tiff copy to 3.9.4-5, though:
 CVE-2010-3087, CVE-2010-2483, CVE-2010-2482, CVE-2010-2481, CVE-2010-2443,
 CVE-2010-2233, CVE-2010-2067, CVE-2010-2065, CVE-2010-1411, CVE-2009-2347,
 CVE-2008-2327.
   * Add tiff copyright and license to debian/copyright (closes: #601002)
   * Link with -lm (closes: #558857).
   * Try to avoid arch-specific values in our copy of tif_config.h and
 tiffconf.h (closes: #601762)
   * Set LFS CFLAGS in Makefile.gnu.
   * Orphan package 

Bug#601762: marked as done (freeimage: hardcodes arch-specific values from i386)

2010-10-29 Thread Debian Bug Tracking System
Your message dated Fri, 29 Oct 2010 13:32:12 +
with message-id e1pbp40-00039j...@franck.debian.org
and subject line Bug#601762: fixed in freeimage 3.10.0-3
has caused the Debian Bug report #601762,
regarding freeimage: hardcodes arch-specific values from i386
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
601762: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601762
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: freeimage
Version: 3.10.0-2
Severity: grave

Source/LibTIFF/tif_config.h has:
#define SIZEOF_LONG 4

tif_config.h is generated by tiff's configure script, and as such is
arch-specific.

Cheers,
Julien


signature.asc
Description: Digital signature
---End Message---
---BeginMessage---
Source: freeimage
Source-Version: 3.10.0-3

We believe that the bug you reported is fixed in the latest version of
freeimage, which is due to be installed in the Debian FTP archive:

freeimage_3.10.0-3.diff.gz
  to main/f/freeimage/freeimage_3.10.0-3.diff.gz
freeimage_3.10.0-3.dsc
  to main/f/freeimage/freeimage_3.10.0-3.dsc
libfreeimage-dev_3.10.0-3_amd64.deb
  to main/f/freeimage/libfreeimage-dev_3.10.0-3_amd64.deb
libfreeimage3-dbg_3.10.0-3_amd64.deb
  to main/f/freeimage/libfreeimage3-dbg_3.10.0-3_amd64.deb
libfreeimage3_3.10.0-3_amd64.deb
  to main/f/freeimage/libfreeimage3_3.10.0-3_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 601...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Julien Cristau jcris...@debian.org (supplier of updated freeimage package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 29 Oct 2010 14:46:46 +0200
Source: freeimage
Binary: libfreeimage-dev libfreeimage3 libfreeimage3-dbg
Architecture: source amd64
Version: 3.10.0-3
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group packa...@qa.debian.org
Changed-By: Julien Cristau jcris...@debian.org
Description: 
 libfreeimage-dev - Support library for graphics image formats (development 
files)
 libfreeimage3 - Support library for graphics image formats (library)
 libfreeimage3-dbg - Support library for graphics image formats (debugging 
symbols)
Closes: 558857 595559 595560 601002 601762
Changes: 
 freeimage (3.10.0-3) unstable; urgency=low
 .
   * Don't use embedded copies of various libraries, add build-deps on their
 packaged versions (closes: #595560):
 - libjpeg 6b
 - libmng 1.0.9
 - libopenjpeg 1.2.0
 - libpng 1.2.23
   + CVE-2010-2249, CVE-2010-1205, CVE-2010-0205, CVE-2009-2042,
 CVE-2008-6218, CVE-2008-5907, CVE-2009-0040, CVE-2008-3964,
 CVE-2008-1382
 - openexr 1.6.1
   + CVE-2009-1720, CVE-2009-1721
 - zlib 1.2.3
   * The embedded libtiff copy is still used, because freeimage uses its
 internals and I couldn't figure out how to unentangle this.  Update the
 tiff copy to 3.9.4-5, though:
 CVE-2010-3087, CVE-2010-2483, CVE-2010-2482, CVE-2010-2481, CVE-2010-2443,
 CVE-2010-2233, CVE-2010-2067, CVE-2010-2065, CVE-2010-1411, CVE-2009-2347,
 CVE-2008-2327.
   * Add tiff copyright and license to debian/copyright (closes: #601002)
   * Link with -lm (closes: #558857).
   * Try to avoid arch-specific values in our copy of tif_config.h and
 tiffconf.h (closes: #601762)
   * Set LFS CFLAGS in Makefile.gnu.
   * Orphan package (closes: #595559).
Checksums-Sha1: 
 11e6b0d0e1eaf7413f64e1ce00e478006fd4cb81 1966 freeimage_3.10.0-3.dsc
 542471c11ecc15facf712c218416d2a5a41b3335 535198 freeimage_3.10.0-3.diff.gz
 0905735a7e997ed078f54f0d08064646b0261c8e 8057990 
libfreeimage-dev_3.10.0-3_amd64.deb
 078e561ca29d262f14a58e04a86109f725485ab0 801806 
libfreeimage3_3.10.0-3_amd64.deb
 39add70677607e057efc8dde26748dd51a2e5e44 2493874 
libfreeimage3-dbg_3.10.0-3_amd64.deb
Checksums-Sha256: 
 c821fbdcb7662c8e26b4e9938f96444197af2e7069007451c54e9d6cd86180e2 1966 
freeimage_3.10.0-3.dsc
 948f293e48478b73124ad21d37c75036287dabf2344b42e528965930eb49f98b 535198 
freeimage_3.10.0-3.diff.gz
 e726a8ec4bd0e3b09670205227f62570c32eb6901c3f8bd1ada955c272c36e56 8057990 
libfreeimage-dev_3.10.0-3_amd64.deb
 4b3e080935314281761855e9359799713eda765d07b868334aad1bf78d6ce814 801806 
libfreeimage3_3.10.0-3_amd64.deb
 

Bug#601712: salome: FTBFS due to missing graphviz

2010-10-29 Thread Adam C Powell IV
tags 601712 pending
thanks

This is now fixed in alioth.  I'll upload in a week or when NETGEN
meshing is working, whichever comes first.

-Adam

On Thu, 2010-10-28 at 16:49 -0400, Adam C Powell IV wrote:
 Package: src:salome
 Version: 5.1.3-11
 Severity: serious
 
 Because graphviz is only Build-Depends-Indep and not Build-Depends, dot
 is missing, so YACS thinks libgraphviz-dev is missing, and doesn't set
 GRAPHVIZ_CPPFLAGS, and the build fails when trying to #include gvc.h .
 
 -Adam
-- 
GPG fingerprint: D54D 1AEE B11C CE9B A02B  C5DD 526F 01E8 564E E4B6

Engineering consulting with open source tools
http://www.opennovation.com/


signature.asc
Description: This is a digitally signed message part


Bug#553502: autolog: a segfault patch

2010-10-29 Thread Julien Viard de Galbert
Package: autolog
Severity: normal

Hi,

I could get a segfault by simply running './autolog -d -o', even by running
'./autolog -d -o -n' which does not even try to kill processes...
So I don't know if this is the same case as the original submitter as I 
didn't have to wait for any warning before getting the segfault.

Anyway, you will find a patch that fixes the one I found.

About the bug:

Basically it parses (using strtok by the way) the output of a ps command line
by line. The line buffer has a size of 256 bytes so if the output line of ps
is longer than that, it get parsed as the next line and it will of course not
parse correctly.

For some reasons, when ran from gdb, the ps command limits its output to 80
chars as if ps was run in a terminal, so it does not segfault ;)

The patch simply read the line until it finds the ending \n so that the parser
will not segfault. (by the way as the config file allows the change the ps
command, the parser should probably be written in a safer way...)

Regards,

Julien Vdg

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.utf8, LC_CTYPE=fr_FR.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -au autolog-0.40.orig/autolog.c autolog-0.40/autolog.c
--- autolog-0.40.orig/autolog.c	2010-10-29 16:15:11.0 +0200
+++ autolog-0.40/autolog.c	2010-10-29 16:14:27.0 +0200
@@ -1082,6 +1082,18 @@
 		}
 	}
 	}
+	/* Read to the end of line to avoid parsing the rest of the command
+	 * line in next round and getting a segfault as ps_pid will be null!!
+	 */
+	i=strlen(iline);
+	while(iline[i-1] != '\n'){
+	if(!fgets(iline, LINELEN, ps)) {
+	  /* end of file, exit*/
+	  fclose(ps);
+	  return;
+	}
+	i=strlen(iline);
+	}
 }
 fclose(ps);
 }
Les sous-répertoires autolog-0.40.orig/debian et autolog-0.40/debian sont identiques.
Les sous-répertoires autolog-0.40.orig/.pc et autolog-0.40/.pc sont identiques.


Processed: tagging 553502

2010-10-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 553502 + patch
Bug #553502 [autolog] autolog exits on Segmentation Fault
Added tag(s) patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
553502: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=553502
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#601747: RDS protocol vulnerability

2010-10-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tag 601747 + moreinfo
Bug #601747 [linux-2.6] RDS protocol vulnerability
Added tag(s) moreinfo.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
601747: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601747
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601747: RDS protocol vulnerability

2010-10-29 Thread Adam D. Barratt
tag 601747 + moreinfo
thanks

On Fri, 2010-10-29 at 18:07 +0900, Hideki Yamane wrote:
 Package: linux-2.6
 Version: 2.6.32-26
  You know, RDS protocol vulnerability was found in Linux kernel.
  US-Cert says (http://www.kb.cert.org/vuls/id/362983)
 
  The RDS protocol implementation of Linux kernels 2.6.30 through
  2.6.38-rc8 contain a local privilege escalation vulnerability.

Are you actually experiencing this in 2.6.32-26, or just assuming it's
affected because the US-CERT page says it is?

-26 is the upload which is intended *to fix* this issue; see the
changelog and http://security-tracker.debian.org/tracker/CVE-2010-3904

Regards

Adam




-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601721: installation-reports: Build w/ /boot partition succeeds, but re-boot fails in fsck 445148

2010-10-29 Thread Lukasz Szybalski
What I don't understand is that in squezze the fstab shows:

/etc/fstab

# /boot was on /dev/sda5 during installation
UUID=dec79ed9-b96a-47e4-81f0-7e32735b5057 /boot   ext2
defaults0   2
# /boot2 was on /dev/sdb1 during installation
UUID=bb0512c5-6de6-4164-a7af-4312a4718ce3 /boot2  ext2
defaults0   2

Which means system figured out that the sda and sdb swapped, and used
the UUID to mount the folders, but why am I still getting the fsck
failed? Is that happening during boot, and fstab is not involved. If
that's the case which file needs to be modified? I would figure that
the same process that updated fstab would update the other file? (Is
the other file a grub file or?)

Thanks,
Lucas



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#385760: The dspam daemon should NOT be run by user dspam or default port needs to move

2010-10-29 Thread Julien Valroff
Le vendredi 29 oct. 2010 à 15:02:37 (+0200), Julien Cristau a écrit :
 On Thu, Oct 28, 2010 at 06:45:52 +0200, Julien Valroff wrote:
 
  tags 385760 + pending
  thanks
  
  Le jeudi 28 oct. 2010 à 00:55:18 (+0200), Martin Zobel-Helas a écrit :
   Hi,
  
  Hi Martin,
   
   in the default configuration of dspam, if daemon gets enabled, the
   daemon wants to listen on tcp port 24. Starting dspam per default as
   user dspam then will just not work. Linux prevents direct “reserved
   port” assignments by any process other than system root.
   
   So you either let it run by root or fix the default port for this
   application.
   
   Interim-Solution: fix the init-script to blow up if user tries this.
  
  This is already fixed in git. The default port is now 1024.
  
 1024 really doesn't sound like a good idea either, imo, there's every
 chance somebody else will choose the first non-privileged port for some
 other use.

I can easily change this, what do you suggest?
I also thought at 2424, what do you think?

Cheers,
Julien

-- 
Julien Valroff jul...@kirya.net
http://www.kirya.net
GPG key: 1024D/9F71D449
17F4 93D8 746F F011 B845  9F91 210B F2AB 9F71 D449


signature.asc
Description: Digital signature


Bug#601585: marked as done (weborf: DoS on malformed requests)

2010-10-29 Thread Debian Bug Tracking System
Your message dated Fri, 29 Oct 2010 15:32:06 +
with message-id e1pbqw2-0005qa...@franck.debian.org
and subject line Bug#601585: fixed in weborf 0.12.4-1
has caused the Debian Bug report #601585,
regarding weborf: DoS on malformed requests
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
601585: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601585
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: weborf
Version: 0.12.3-1
Severity: grave
Tags: security upstream
Justification: user security hole

Example of exploit here:

https://galileo.dmi.unict.it/wiki/weborf/doku.php?id=news:released_0.12.4



-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (500, 'experimental'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.35.7-calipso (SMP w/2 CPU cores; PREEMPT)
Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages weborf depends on:
ii  libc6 2.11.2-6   Embedded GNU C Library: Shared lib

weborf recommends no packages.

Versions of packages weborf suggests:
ii  php5-cgi  5.3.3-2server-side, HTML-embedded scripti

-- no debconf information


---End Message---
---BeginMessage---
Source: weborf
Source-Version: 0.12.4-1

We believe that the bug you reported is fixed in the latest version of
weborf, which is due to be installed in the Debian FTP archive:

weborf-daemon_0.12.4-1_all.deb
  to main/w/weborf/weborf-daemon_0.12.4-1_all.deb
weborf_0.12.4-1.debian.tar.gz
  to main/w/weborf/weborf_0.12.4-1.debian.tar.gz
weborf_0.12.4-1.dsc
  to main/w/weborf/weborf_0.12.4-1.dsc
weborf_0.12.4-1_i386.deb
  to main/w/weborf/weborf_0.12.4-1_i386.deb
weborf_0.12.4.orig.tar.gz
  to main/w/weborf/weborf_0.12.4.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 601...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvo 'LtWorf' Tomaselli tipos...@tiscali.it (supplier of updated weborf 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Wed, 27 Oct 2010 16:01:35 +0200
Source: weborf
Binary: weborf weborf-daemon
Architecture: source i386 all
Version: 0.12.4-1
Distribution: unstable
Urgency: high
Maintainer: Salvo 'LtWorf' Tomaselli tipos...@tiscali.it
Changed-By: Salvo 'LtWorf' Tomaselli tipos...@tiscali.it
Description: 
 weborf - Fast and small webserver meant to be run without root privileges
 weborf-daemon - init script for weborf
Closes: 601585
Changes: 
 weborf (0.12.4-1) unstable; urgency=high
 .
   * New upstream release
   * Fixes DoS (Closes: #601585)
Checksums-Sha1: 
 b61b8fb471ad9a798dac982ee3b426e06224ce61 1049 weborf_0.12.4-1.dsc
 f038df807997dc0d68f549cc325a1bb2c1a50706 58220 weborf_0.12.4.orig.tar.gz
 81227144537870ff4ac9b711ad989eb49238f226 3429 weborf_0.12.4-1.debian.tar.gz
 5c110fd90a98eee5b6095d02a1a6441bb197ae62 28098 weborf_0.12.4-1_i386.deb
 f1892468627b91f30924ef9d3c92fe25ece51893 10208 weborf-daemon_0.12.4-1_all.deb
Checksums-Sha256: 
 70c8187678a06b6cc5d8da51a85c47dd9478a7b6002876a1e387a423c5b6748e 1049 
weborf_0.12.4-1.dsc
 084bed0e9a19fa76b7ad85e51530d0a4ccd554306dcfb048d311abbd8d96 58220 
weborf_0.12.4.orig.tar.gz
 d63e3053b69cde0565ebe4612a0b5e1da3f5c478b940a73f92bae54f32a3ebe8 3429 
weborf_0.12.4-1.debian.tar.gz
 ab2a3a423be3d3147370e24156e2ffdc5613331de611b962f10c2aecc05aa94a 28098 
weborf_0.12.4-1_i386.deb
 c41cb4c1f0c238acbbfa0eea871e133f7dd8f81be85e4ef980be4f2942561733 10208 
weborf-daemon_0.12.4-1_all.deb
Files: 
 dba90b68ee3bad2c0b10ba8f4947e968 1049 httpd optional weborf_0.12.4-1.dsc
 c6932626d9a477da004345332f5fd896 58220 httpd optional weborf_0.12.4.orig.tar.gz
 742cbd17063365a03ae29bb7b57f053f 3429 httpd optional 
weborf_0.12.4-1.debian.tar.gz
 044c223870ef1d76a186714f14700255 28098 httpd optional weborf_0.12.4-1_i386.deb
 339a08da53ab12e5a5b7a6e989130236 10208 httpd optional 
weborf-daemon_0.12.4-1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkzK540ACgkQ5qqQFxOSsXS+4wCeKDGcUHN/6Rjrk8WV1i4ZJRyX
KEgAnivLN8hLGnb51crGuZFnDQcDXAJ9
=CFgr
-END PGP SIGNATURE-


---End Message---


Bug#601721: installation-reports: Build w/ /boot partition succeeds, but re-boot fails in fsck 445148

2010-10-29 Thread Lukasz Szybalski
It seems like Grub.cfg is also using proper drive by UUID.

menuentry 'Debian GNU/Linux, with Linux 2.6.32-5-amd64' --class debian
--class gnu-linux --class gnu --class os {
insmod part_msdos
insmod ext2
set root='(hd0,msdos5)'
search --no-floppy --fs-uuid --set dec79ed9-b96a-47e4-81f0-7e32735b5057
echo'Loading Linux 2.6.32-5-amd64 ...'
linux   /vmlinuz-2.6.32-5-amd64 root=/dev/mapper/-root ro  quiet
echo'Loading initial ramdisk ...'
initrd  /initrd.img-2.6.32-5-amd64

But somewhere in a boot process system shows:

FSCK from Util-Linux-ng 2.17.2
unable to resolve UUID=.5b5057

(I'm not sure which log after start it would be in :)

It seems as the after system is starting to load the UUID is not
resolved and  /dev/sda and /dev/sdb get loaded incorrectly ?

Thanks,
Lucas



On Fri, Oct 29, 2010 at 10:10 AM, Lukasz Szybalski szybal...@gmail.com wrote:
 What I don't understand is that in squezze the fstab shows:

 /etc/fstab

 # /boot was on /dev/sda5 during installation
 UUID=dec79ed9-b96a-47e4-81f0-7e32735b5057 /boot           ext2
 defaults        0       2
 # /boot2 was on /dev/sdb1 during installation
 UUID=bb0512c5-6de6-4164-a7af-4312a4718ce3 /boot2          ext2
 defaults        0       2

 Which means system figured out that the sda and sdb swapped, and used
 the UUID to mount the folders, but why am I still getting the fsck
 failed? Is that happening during boot, and fstab is not involved. If
 that's the case which file needs to be modified? I would figure that
 the same process that updated fstab would update the other file? (Is
 the other file a grub file or?)

 Thanks,
 Lucas




--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601386: dup of #451659?

2010-10-29 Thread dann frazier
Version: 2.0.7-1

This looks like a duplicate of #451659 which was fixed in 2.0.7-1, so
I'm closing as such. Feel free to reopen if this is still reproducible
with newer versions.



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601386: marked as done (nano corrupts script files)

2010-10-29 Thread Debian Bug Tracking System
Your message dated Fri, 29 Oct 2010 10:29:37 -0600
with message-id 20101029162936.ga29...@dannf.org
and subject line dup of #451659?
has caused the Debian Bug report #601386,
regarding nano corrupts script files
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
601386: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601386
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: nano
Version: 2.0.2-1etch1
Severity: critical

This breaks some systems using some scripts edited by nano.
Apologies if critical is wrong - I didn't want to use it but it fits
your definition ...

+++-==-==-
ii  nano   2.0.2-1etch1   free Pico clone with some new features

No error messages logged.

TO REPRODUCE:
Use nano to edit the script named before.  Edit as follows:

Insert one space as the first character of the file.
Delete that space.
Exit and save.

The resulting file has been named after.

output of diff is also included.

before runs and gives output as required.
after just seems not to run.

Cheers.

Chris Cowsley
Head of ICT
Hitchin Boys' School

drcows...@ntlworld.com


nano-bug.tar.gz
Description: application/compressed-tar
---End Message---
---BeginMessage---
Version: 2.0.7-1

This looks like a duplicate of #451659 which was fixed in 2.0.7-1, so
I'm closing as such. Feel free to reopen if this is still reproducible
with newer versions.

---End Message---


Bug#601786: ia32-sun-java6-bin: When the ia32 java is run to fails due to a syntax error with ( unexpected.

2010-10-29 Thread Jeffrey Coppock
Package: ia32-sun-java6-bin
Version: 6.22-1
Severity: grave
Justification: renders package unusable

I'm running a 64-bit system but I have an application that needs the 32-bit
java.  This application fails.  When I run java -version I get ./java: 1:
Syntax error: ( unexpected returned.  The 64-bit java runs fine.  An strace
of running java -version follows:

execve(/usr/bin/sudo, [sudo, /usr/lib/jvm/ia32-java-6-sun-1.6...,
-version], [/* 16 vars */]) = 0
brk(0)  = 0xc4b000
access(/etc/ld.so.nohwcap, F_OK)  = -1 ENOENT (No such file or directory)
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
0x7f1dc1d3f000
access(/etc/ld.so.preload, R_OK)  = -1 ENOENT (No such file or directory)
open(/etc/ld.so.cache, O_RDONLY)  = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=106553, ...}) = 0
mmap(NULL, 106553, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7f1dc1d24000
close(3)= 0
access(/etc/ld.so.nohwcap, F_OK)  = -1 ENOENT (No such file or directory)
open(/lib/libutil.so.1, O_RDONLY) = 3
read(3, \177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\0\1\0\0\0\20\16\0\0\0\0\0\0...,
832) = 832
fstat(3, {st_mode=S_IFREG|0644, st_size=10648, ...}) = 0
mmap(NULL, 2105608, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
0x7f1dc1921000
mprotect(0x7f1dc1923000, 2093056, PROT_NONE) = 0
mmap(0x7f1dc1b22000, 8192, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1000) = 0x7f1dc1b22000
close(3)= 0
access(/etc/ld.so.nohwcap, F_OK)  = -1 ENOENT (No such file or directory)
open(/lib/libpam.so.0, O_RDONLY)  = 3
read(3, \177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\0\1\0\0\0\200%\0\0\0\0\0\0...,
832) = 832
fstat(3, {st_mode=S_IFREG|0644, st_size=49728, ...}) = 0
mmap(NULL, 2144864, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
0x7f1dc1715000
mprotect(0x7f1dc1721000, 2093056, PROT_NONE) = 0
mmap(0x7f1dc192, 4096, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xb000) = 0x7f1dc192
close(3)= 0
access(/etc/ld.so.nohwcap, F_OK)  = -1 ENOENT (No such file or directory)
open(/lib/libdl.so.2, O_RDONLY)   = 3
read(3, \177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\0\1\0\0\0\340\r\0\0\0\0\0\0...,
832) = 832
fstat(3, {st_mode=S_IFREG|0644, st_size=14696, ...}) = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
0x7f1dc1d23000
mmap(NULL, 2109696, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
0x7f1dc1511000
mprotect(0x7f1dc1513000, 2097152, PROT_NONE) = 0
mmap(0x7f1dc1713000, 8192, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0x7f1dc1713000
close(3)= 0
access(/etc/ld.so.nohwcap, F_OK)  = -1 ENOENT (No such file or directory)
open(/lib/libc.so.6, O_RDONLY)= 3
read(3, \177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\0\1\0\0\0`\355\1\0\0\0\0\0...,
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=1432968, ...}) = 0
mmap(NULL, 3541032, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
0x7f1dc11b
mprotect(0x7f1dc1308000, 2093056, PROT_NONE) = 0
mmap(0x7f1dc1507000, 20480, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x157000) = 0x7f1dc1507000
mmap(0x7f1dc150c000, 18472, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f1dc150c000
close(3)= 0
access(/etc/ld.so.nohwcap, F_OK)  = -1 ENOENT (No such file or directory)
open(/lib/libcrypt.so.1, O_RDONLY)= 3
read(3, \177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\0\1\0\0\0P\n\0\0\0\0\0\0...,
832) = 832
fstat(3, {st_mode=S_IFREG|0644, st_size=35104, ...}) = 0
mmap(NULL, 2318784, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
0x7f1dc0f79000
mprotect(0x7f1dc0f81000, 2093056, PROT_NONE) = 0
mmap(0x7f1dc118, 8192, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x7000) = 0x7f1dc118
mmap(0x7f1dc1182000, 184768, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f1dc1182000
close(3)= 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
0x7f1dc1d22000
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
0x7f1dc1d21000
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
0x7f1dc1d2
arch_prctl(ARCH_SET_FS, 0x7f1dc1d21700) = 0
mprotect(0x7f1dc118, 4096, PROT_READ) = 0
mprotect(0x7f1dc1507000, 16384, PROT_READ) = 0
mprotect(0x7f1dc1713000, 4096, PROT_READ) = 0
mprotect(0x7f1dc1b22000, 4096, PROT_READ) = 0
mprotect(0x7f1dc1d41000, 4096, PROT_READ) = 0
munmap(0x7f1dc1d24000, 106553)  = 0
brk(0)  = 0xc4b000
brk(0xc6c000)   = 0xc6c000
open(/usr/lib/locale/locale-archive, O_RDONLY) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=1527584, ...}) = 0
mmap(NULL, 1527584, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7f1dc1bab000
close(3)

Bug#600916: can't reproduce

2010-10-29 Thread Marcos Marado
Hi there,

I tested this and I wasn't able to see any problem. The differences:
1) some of my packages are more recent than yourse (all from squeeze, so an 
aptitude upgrade should put you with the same package versions as me);
2) I'm at i686, the problem might be affecting amd64.

Best regards,
-- 
Marcos Marado



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601721: installation-reports: Build w/ /boot partition succeeds, but re-boot fails in fsck 445148

2010-10-29 Thread Lennart Sorensen
On Fri, Oct 29, 2010 at 11:08:59AM -0500, Lukasz Szybalski wrote:
 It seems like Grub.cfg is also using proper drive by UUID.
 
 menuentry 'Debian GNU/Linux, with Linux 2.6.32-5-amd64' --class debian
 --class gnu-linux --class gnu --class os {
 insmod part_msdos
 insmod ext2
 set root='(hd0,msdos5)'
 search --no-floppy --fs-uuid --set 
 dec79ed9-b96a-47e4-81f0-7e32735b5057
 echo'Loading Linux 2.6.32-5-amd64 ...'
 linux   /vmlinuz-2.6.32-5-amd64 root=/dev/mapper/-root ro  
 quiet
 echo'Loading initial ramdisk ...'
 initrd  /initrd.img-2.6.32-5-amd64
 
 But somewhere in a boot process system shows:
 
 FSCK from Util-Linux-ng 2.17.2
 unable to resolve UUID=.5b5057
 
 (I'm not sure which log after start it would be in :)
 
 It seems as the after system is starting to load the UUID is not
 resolved and  /dev/sda and /dev/sdb get loaded incorrectly ?

fsck uses /etc/fstab.  Now my fstab has entries of UUID=xxx-xxx-xxx
(no quotes).  Perhaps that is the problem.  It appears yours has quotes.

-- 
Len Sorensen



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: change severity

2010-10-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 568971 serious
Bug #568971 [modemmanager] /usr/sbin/modem-manager: modem manager rapidly fills 
up daemon.log
Severity set to 'serious' from 'important'

 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
568971: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=568971
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601721: installation-reports: Build w/ /boot partition succeeds, but re-boot fails in fsck 445148

2010-10-29 Thread Lukasz Szybalski
On Fri, Oct 29, 2010 at 12:01 PM, Lennart Sorensen
lsore...@csclub.uwaterloo.ca wrote:
 On Fri, Oct 29, 2010 at 11:08:59AM -0500, Lukasz Szybalski wrote:
 It seems like Grub.cfg is also using proper drive by UUID.

 menuentry 'Debian GNU/Linux, with Linux 2.6.32-5-amd64' --class debian
 --class gnu-linux --class gnu --class os {
         insmod part_msdos
         insmod ext2
         set root='(hd0,msdos5)'
         search --no-floppy --fs-uuid --set 
 dec79ed9-b96a-47e4-81f0-7e32735b5057
         echo    'Loading Linux 2.6.32-5-amd64 ...'
         linux   /vmlinuz-2.6.32-5-amd64 root=/dev/mapper/-root ro  
 quiet
         echo    'Loading initial ramdisk ...'
         initrd  /initrd.img-2.6.32-5-amd64

 But somewhere in a boot process system shows:

 FSCK from Util-Linux-ng 2.17.2
 unable to resolve UUID=.5b5057

 (I'm not sure which log after start it would be in :)

 It seems as the after system is starting to load the UUID is not
 resolved and  /dev/sda and /dev/sdb get loaded incorrectly ?

 fsck uses /etc/fstab.  Now my fstab has entries of UUID=xxx-xxx-xxx
 (no quotes).  Perhaps that is the problem.  It appears yours has quotes.


It does not. That was my typo, sorry:

/etc/fstab

 /boot was on /dev/sda5 during installation
UUID=dec79ed9-b96a-47e4-81f0-7e32735b5057 /boot   ext2
defaults0   2
# /boot2 was on /dev/sdb1 during installation
UUID=bb0512c5-6de6-4164-a7af-4312a4718ce3 /boot2  ext2
defaults0   2


The temporary solution right now is to change the option (pass) from 2
to 0. Not sure what that does other then checks the FS for corruption
at boot. This will make sure server starts and loads all the services.

UUID=dec79ed9-b96a-47e4-81f0-7e32735b5057 /boot   ext2
defaults0   0

Thanks,
Lucas



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#574219: Intent to NMU (dict-xdict: package removal fails)

2010-10-29 Thread Jari Aalto
This bug seems to be a candidate for NMU. I have some free time
and I am offering to help fix it. Please let me know if this bug
is already been worked on or if it's okay to NMU the package.



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#598305: marked as done (teamspeak-server: CVE-2010-3383: insecure library loading)

2010-10-29 Thread Debian Bug Tracking System
Your message dated Fri, 29 Oct 2010 19:32:07 +
with message-id e1pbugj-0008va...@franck.debian.org
and subject line Bug#598305: fixed in teamspeak-server 2.0.24.1+debian-1.1
has caused the Debian Bug report #598305,
regarding teamspeak-server: CVE-2010-3383: insecure library loading
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
598305: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598305
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: teamspeak-server
Version: 2.0.24.1+debian-1
Severity: grave
Tags: security
User: t...@security.debian.org
Usertags: ldpath

Hello,

During a review of the Debian archive, I've found your package to
contain a script that can be abused by an attacker to execute arbitrary
code.

The vulnerability is introduced by an insecure change to
LD_LIBRARY_PATH, and environment variable used by ld.so(8) to look for
libraries on a directory other than the standard paths.

Vulnerable code follows:

/usr/bin/teamspeak-server line 5:
export LD_LIBRARY_PATH=/usr/lib/teamspeak-server:$LD_LIBRARY_PATH

When there's an empty item on the colon-separated list of
LD_LIBRARY_PATH, ld.so treats it as '.' (i.e. CWD/$PWD.)
If the given script is executed from a directory where a potential,
local, attacker can write files to, there's a chance to exploit this
bug.

This vulnerability has been assigned the CVE id CVE-2010-3383. Please make sure
you mention it when forwarding this report to upstream and when fixing
this bug (everywhere: upstream and here at Debian.)

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3383
[1] http://security-tracker.debian.org/tracker/CVE-2010-3383

Sincerely,
Raphael Geissert


---End Message---
---BeginMessage---
Source: teamspeak-server
Source-Version: 2.0.24.1+debian-1.1

We believe that the bug you reported is fixed in the latest version of
teamspeak-server, which is due to be installed in the Debian FTP archive:

teamspeak-server_2.0.24.1+debian-1.1.diff.gz
  to non-free/t/teamspeak-server/teamspeak-server_2.0.24.1+debian-1.1.diff.gz
teamspeak-server_2.0.24.1+debian-1.1.dsc
  to non-free/t/teamspeak-server/teamspeak-server_2.0.24.1+debian-1.1.dsc
teamspeak-server_2.0.24.1+debian-1.1_i386.deb
  to non-free/t/teamspeak-server/teamspeak-server_2.0.24.1+debian-1.1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 598...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Etienne Millon etienne.mil...@gmail.com (supplier of updated teamspeak-server 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sun, 24 Oct 2010 20:02:31 +0200
Source: teamspeak-server
Binary: teamspeak-server
Architecture: source i386
Version: 2.0.24.1+debian-1.1
Distribution: unstable
Urgency: high
Maintainer: Adam Cécile (Le_Vert) gand...@le-vert.net
Changed-By: Etienne Millon etienne.mil...@gmail.com
Description: 
 teamspeak-server - VoIP chat for online gaming (server)
Closes: 598305
Changes: 
 teamspeak-server (2.0.24.1+debian-1.1) unstable; urgency=high
 .
   * Non-maintainer upload.
   * debian/teamspeak-server.wrapper
 - Fix security issue CVE-2010-3383 (grave, security; Closes: #598305)
 - Proper quoting of $@ (thanks to Jari Aalto jari.aa...@cante.net)
Checksums-Sha1: 
 a83796adb6e5662b9b2faa95964146d113a05b0c 1794 
teamspeak-server_2.0.24.1+debian-1.1.dsc
 a4079d43648673ffef78f71538e0bd61716da6f3 15495 
teamspeak-server_2.0.24.1+debian-1.1.diff.gz
 23a5a98617d98ceff90b976282a5b1292c127064 1097688 
teamspeak-server_2.0.24.1+debian-1.1_i386.deb
Checksums-Sha256: 
 ee7247092104822ad63330c94b16c03c507a7ed66265a089bbf0e7a1d9c9ed40 1794 
teamspeak-server_2.0.24.1+debian-1.1.dsc
 bdafee076bfecfb6f5da0f0b7b431cdc9dd625a7cec18b0e4c6c1bf4fe389061 15495 
teamspeak-server_2.0.24.1+debian-1.1.diff.gz
 b726e54c8752567124c2fae2138a258f66f0412fd17ff285c08a7bdb59c5e754 1097688 
teamspeak-server_2.0.24.1+debian-1.1_i386.deb
Files: 
 71563fbfcb19b1a3435bddda2c6fe842 1794 non-free/net optional 
teamspeak-server_2.0.24.1+debian-1.1.dsc
 d00f33517ad0c28ecd9fdb6ca8c48dae 15495 non-free/net optional 
teamspeak-server_2.0.24.1+debian-1.1.diff.gz
 ffd9ae551f87916bbb26ba30cff893e3 1097688 non-free/net optional 

Bug#599937: mysql-5.1: 5.1.51 fixes several vulnerabilities

2010-10-29 Thread Moritz Muehlenhoff
tags 599937 patch
thanks

On Tue, Oct 12, 2010 at 05:56:38PM +0200, Moritz Muehlenhoff wrote:
 Package: mysql-5.1
 Severity: grave
 Tags: security
 Justification: user security hole
 
 5.1.51 fixes eight security issues. It has already been uploaded
 to experimental, so depending on the amount and quality of
 changes it needs to be checked whether this version shold be
 uploaded to Squeeze or fixes need to be cherry-picked:

Patch against 5.1.49 attached.

Cheers,
Moritz
diff -Naur mysql-5.1-5.1.49.orig//mysql-test/r/func_gconcat.result mysql-5.1-5.1.49/mysql-test/r/func_gconcat.result
--- mysql-5.1-5.1.49.orig//mysql-test/r/func_gconcat.result	2010-07-09 15:02:55.0 +0200
+++ mysql-5.1-5.1.49/mysql-test/r/func_gconcat.result	2010-10-29 21:52:45.0 +0200
@@ -995,6 +995,7 @@
 1
 1
 DROP TABLE t1;
+End of 5.0 tests
 #
 # Bug #52397: another crash with explain extended and group_concat
 #
@@ -1010,4 +1011,22 @@
 Warnings:
 Note	1003	select 1 AS `1` from (select group_concat(`test`.`t1`.`a` order by `test`.`t1`.`a` ASC separator ',') AS `GROUP_CONCAT(t1.a ORDER BY t1.a ASC)` from `test`.`t1` `t2` join `test`.`t1` group by `test`.`t1`.`a`) `d`
 DROP TABLE t1;
-End of 5.0 tests
+#
+# Bug #54476: crash when group_concat and 'with rollup' in prepared statements
+# 
+CREATE TABLE t1 (a INT);
+INSERT INTO t1 VALUES (1), (2);
+PREPARE stmt FROM SELECT GROUP_CONCAT(t1.a ORDER BY t1.a) FROM t1 JOIN t1 t2 GROUP BY t1.a WITH ROLLUP;
+EXECUTE stmt;
+GROUP_CONCAT(t1.a ORDER BY t1.a)
+1,1
+2,2
+1,1,2,2
+EXECUTE stmt;
+GROUP_CONCAT(t1.a ORDER BY t1.a)
+1,1
+2,2
+1,1,2,2
+DEALLOCATE PREPARE stmt;
+DROP TABLE t1;
+End of 5.1 tests
diff -Naur mysql-5.1-5.1.49.orig//mysql-test/r/func_misc.result mysql-5.1-5.1.49/mysql-test/r/func_misc.result
--- mysql-5.1-5.1.49.orig//mysql-test/r/func_misc.result	2010-07-09 15:02:55.0 +0200
+++ mysql-5.1-5.1.49/mysql-test/r/func_misc.result	2010-10-29 21:52:47.0 +0200
@@ -336,4 +336,19 @@
 select connection_id()  0;
 connection_id()  0
 1
+#
+# Bug #54461: crash with longblob and union or update with subquery
+#
+CREATE TABLE t1 (a INT, b LONGBLOB);
+INSERT INTO t1 VALUES (1, '2'), (2, '3'), (3, '2');
+SELECT DISTINCT LEAST(a, (SELECT b FROM t1 LIMIT 1)) FROM t1 UNION SELECT 1;
+LEAST(a, (SELECT b FROM t1 LIMIT 1))
+1
+2
+SELECT DISTINCT GREATEST(a, (SELECT b FROM t1 LIMIT 1)) FROM t1 UNION SELECT 1;
+GREATEST(a, (SELECT b FROM t1 LIMIT 1))
+2
+3
+1
+DROP TABLE t1;
 End of tests
diff -Naur mysql-5.1-5.1.49.orig//mysql-test/r/join.result mysql-5.1-5.1.49/mysql-test/r/join.result
--- mysql-5.1-5.1.49.orig//mysql-test/r/join.result	2010-07-09 15:03:00.0 +0200
+++ mysql-5.1-5.1.49/mysql-test/r/join.result	2010-10-29 21:52:39.0 +0200
@@ -1184,4 +1184,55 @@
 NULL
 1
 DROP TABLE t1, t2, mm1;
+#
+# Bug #55568: user variable assignments crash server when used within
+# query
+#
+CREATE TABLE t1 (a INT);
+INSERT INTO t1 VALUES (0), (1);
+SELECT MULTIPOINT(
+1,
+(
+SELECT MULTIPOINT(
+MULTIPOINT(
+1,
+(SELECT COUNT(*) FROM (SELECT 1 FROM t1 GROUP BY a,a) d)
+)
+) FROM t1
+)
+) != COUNT(*) q FROM t1 GROUP BY a;
+q
+NULL
+NULL
+SELECT MULTIPOINT(
+1,
+(
+SELECT MULTIPOINT(
+MULTIPOINT(
+1,
+(SELECT COUNT(*) FROM (SELECT 1 FROM t1 GROUP BY a,a) d)
+)
+) FROM t1
+)
+) != COUNT(*) q FROM t1 GROUP BY a;
+q
+NULL
+NULL
+DROP TABLE t1;
+#
+# Bug #54468: crash after item's print() function when ordering/grouping 
+# by subquery
+#
+CREATE TABLE t1(a INT, b INT);
+INSERT INTO t1 VALUES (), ();
+SELECT 1 FROM t1
+GROUP BY
+GREATEST(t1.a,
+(SELECT 1 FROM
+(SELECT t1.b FROM t1,t1 t2
+ORDER BY t1.a, t1.a LIMIT 1) AS d)
+);
+1
+1
+DROP TABLE t1;
 End of 5.1 tests
diff -Naur mysql-5.1-5.1.49.orig//mysql-test/r/user_var.result mysql-5.1-5.1.49/mysql-test/r/user_var.result
--- mysql-5.1-5.1.49.orig//mysql-test/r/user_var.result	2010-07-09 15:03:13.0 +0200
+++ mysql-5.1-5.1.49/mysql-test/r/user_var.result	2010-10-29 21:52:42.0 +0200
@@ -430,4 +430,21 @@
 INSERT INTO t1 VALUES (1);
 INSERT INTO t1 VALUES (1);
 DROP TABLE t1;
+CREATE TABLE t1(a INT);
+INSERT INTO t1 VALUES (0),(0);
+# BUG#55615 : should not crash
+SELECT (@a:=(SELECT @a:=1 FROM t1 LIMIT 1)) AND COUNT(1) FROM t1 GROUP BY @a;
+(@a:=(SELECT @a:=1 FROM t1 LIMIT 1)) AND COUNT(1)
+1
+1
+# BUG#55564 : should not crash
+SELECT IF(
+...@v:=LEAST((SELECT 1 FROM t1 t2 LEFT JOIN t1 ON (@v) GROUP BY t1.a), a),
+count(*), 1) 
+FROM t1 GROUP BY a LIMIT 1;
+IF(
+...@v:=LEAST((SELECT 1 FROM t1 t2 LEFT JOIN t1 ON (@v) GROUP BY t1.a), a),
+count(*), 1)
+1
+DROP TABLE t1;
 End of 5.1 tests
diff -Naur mysql-5.1-5.1.49.orig//mysql-test/suite/innodb/r/innodb_mysql.result mysql-5.1-5.1.49/mysql-test/suite/innodb/r/innodb_mysql.result
--- mysql-5.1-5.1.49.orig//mysql-test/suite/innodb/r/innodb_mysql.result	2010-07-09 15:05:40.0 +0200
+++ mysql-5.1-5.1.49/mysql-test/suite/innodb/r/innodb_mysql.result	2010-10-29 21:52:36.0 +0200
@@ -2499,4 +2499,17 @@
 id	select_type	table	

Processed: Re: mysql-5.1: 5.1.51 fixes several vulnerabilities

2010-10-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 599937 patch
Bug #599937 [mysql-5.1] mysql-5.1: 5.1.51 fixes several vulnerabilities
Added tag(s) patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
599937: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599937
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601700: exception bug occurring with libsqlite3-0 3.7.3-1

2010-10-29 Thread Thomas Arendsen Hein
Package: monotone
Version: 0.48-2
Severity: serious


I noticed this error today, too. I'm not sure if it is caused by the
libsqlite3-0 upgrade (which I did two days ago), because I no longer have
the old package.

Here is the debug log of running test-convert-mtn.t of the Mercurial test
suite:

beginning commit on branch 'com.selenic.test'
Encountered an error while musing upon the following:
database.cc:1495: detected database error, 'E(value)' violated
Encountered an error while musing upon the following:
migrate_schema.cc:105: detected system error, 'E(false)' violated
Encountered an error while musing upon the following:
botan_pipe_cache.hh:42: detected internal error, 'I(!pipe)' violated
Encountered an error while musing upon the following:
botan_pipe_cache.hh:42: detected internal error, 'I(!pipe)' violated
Encountered an error while musing upon the following:
botan_pipe_cache.hh:42: detected internal error, 'I(!pipe)' violated
Encountered an error while musing upon the following:
botan_pipe_cache.hh:42: detected internal error, 'I(!pipe)' violated
Encountered an error while musing upon the following:
botan_pipe_cache.hh:42: detected internal error, 'I(!pipe)' violated
Encountered an error while musing upon the following:
botan_pipe_cache.hh:42: detected internal error, 'I(!pipe)' violated
Current work set: 4 items
- begin 'system_flavour' (in virtual void sanity::initialize(int, char**, 
const char*), at sanity.cc:112)
Linux 2.6.32-5-686 #1 SMP Tue Oct 19 14:40:34 UTC 2010 i686
-   end 'system_flavour' (in virtual void sanity::initialize(int, char**, 
const char*), at sanity.cc:112)
- begin 'cmdline_string' (in virtual void sanity::initialize(int, char**, 
const char*), at sanity.cc:126)
'mtn', 'ci', '-m', 'divergentdirmove2'
-   end 'cmdline_string' (in virtual void sanity::initialize(int, char**, 
const char*), at sanity.cc:126)
- begin 'string(lc_all)' (in virtual void sanity::initialize(int, char**, 
const char*), at sanity.cc:131)
C
-   end 'string(lc_all)' (in virtual void sanity::initialize(int, char**, 
const char*), at sanity.cc:131)
- begin 'full_version_string' (in virtual void mtn_sanity::initialize(int, 
char**, const char*), at mtn-sanity.cc:32)
monotone 0.48 (base revision: 844268c137aaa783aa800a9c16ae61edda80ecea)
Running on  : Linux 2.6.32-5-686 #1 SMP Tue Oct 19 14:40:34 UTC 2010 
i686
C++ compiler: GNU C++ version 4.4.4
C++ standard library: GNU libstdc++ version 20100712
Boost version   : 1_42
SQLite version  : 3.7.3 (compiled against 3.7.0)
Lua version : Lua 5.1
PCRE version: 8.02 2010-03-19 (compiled against 8.2)
Botan version   : 1.8.9 (compiled against 1.8.8)
Changes since base revision:
format_version 1

new_manifest [86bede3ba4251594f3a0f7e0c31560f9f8ce3744]

old_revision [844268c137aaa783aa800a9c16ae61edda80ecea]

  Generated from data cached in the distribution;
  further changes may have been made.
-   end 'full_version_string' (in virtual void mtn_sanity::initialize(int, 
char**, const char*), at mtn-sanity.cc:32)


-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (550, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages monotone depends on:
ii  libbotan-1.8.2 1.8.9-1   multiplatform crypto library
ii  libc6  2.11.2-6+squeeze1 Embedded GNU C Library: Shared lib
ii  libgcc11:4.4.5-4 GCC support library
ii  libidn11   1.15-2GNU Libidn library, implementation
ii  liblua5.1-05.1.4-5   Simple, extensible, embeddable pro
ii  libpcre3   8.02-1.1  Perl 5 Compatible Regular Expressi
ii  libsqlite3-0   3.7.3-1   SQLite 3 shared library
ii  libstdc++6 4.4.5-4   The GNU Standard C++ Library v3
ii  zlib1g 1:1.2.3.4.dfsg-3  compression library - runtime

monotone recommends no packages.

Versions of packages monotone suggests:
pn  monotone-doc  none (no description available)
pn  monotone-server   none (no description available)

-- no debconf information



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601805: viewvc: Grave python errors which can be fixed with a one liner, already upstream

2010-10-29 Thread Tom Albers
Package: viewvc
Version: 1.1.5-1
Severity: grave
Tags: upstream patch
Justification: renders package unusable

Upstream version 1.1.6 includes a fix for some nasty python errors. We are 
hitting the bug on lots of places, which renders the package unusuable. More 
details can be found in the upstream bugtracker: 
http://viewvc.tigris.org/issues/show_bug.cgi?id=454

The fix is a oneliner included in the bug. It fixes the links like 'Copied 
from: ' link seen on, for example:
http://websvn.kde.org/trunk/kdesupport/strigi/libstreamanalyzer/lib/analysisresult.cpp?view=log

Tom Albers
KDE Sysadmin


-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.35.4-rscloud (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages viewvc depends on:
ii  python  2.6.6-3  interactive high-level object-orie
ii  python-subversion   1.6.12dfsg-2 Python bindings for Subversion
ii  python-support  1.0.10   automated rebuilding support for P
ii  rcs 5.7-25   The GNU Revision Control System
ii  subversion  1.6.12dfsg-2 Advanced version control system

Versions of packages viewvc recommends:
ii  apache2 2.2.16-3 Apache HTTP Server metapackage
ii  apache2-mpm-itk [httpd-cgi] 2.2.16-3 multiuser MPM for Apache 2.2
ii  python-pygments 1.3.1+dfsg-1 syntax highlighting package writte

Versions of packages viewvc suggests:
pn  cvsgraph  none (no description available)
pn  libapache2-mod-python none (no description available)
ii  mime-support  3.48-1 MIME files 'mime.types'  'mailcap
pn  python-tk none (no description available)
pn  viewvc-query  none (no description available)

-- Configuration Files:
/etc/viewvc/mimetypes.conf changed [not included]
/etc/viewvc/templates/diff.ezt changed [not included]
/etc/viewvc/templates/dir_new.ezt changed [not included]
/etc/viewvc/templates/file.ezt changed [not included]
/etc/viewvc/templates/include/footer.ezt changed [not included]
/etc/viewvc/templates/include/header.ezt changed [not included]
/etc/viewvc/templates/query_form.ezt changed [not included]
/etc/viewvc/templates/query_results.ezt changed [not included]
/etc/viewvc/viewvc.conf changed [not included]

-- no debconf information



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601807: heartbeat: Segfault while using a failover IPv6 address

2010-10-29 Thread Laurent Caron
Package: heartbeat
Version: 2.1.3-6lenny4
Severity: grave
Justification: renders package unusable


Hi,

Heartbeat doesn't seem to play nice with ipv6.

It segfaults while trying to add an IPv6 address.



-- System Information:
Debian Release: 5.0.6
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.35.420100909 (SMP w/8 CPU cores)
Locale: lang=fr...@euro, lc_ctype=fr...@euro (charmap=ISO-8859-15) (ignored: 
LC_ALL set to fr...@euro)
Shell: /bin/sh linked to /bin/bash

Versions of packages heartbeat depends on:
ii  adduser 3.110add and remove users and groups
ii  gawk1:3.1.5.dfsg-4.1 GNU awk, a pattern scanning and pr
ii  iproute 20080725-2   networking and traffic control too
ii  iputils-ping3:20071127-1+lenny1  Tools to test the reachability of 
ii  libbz2-1.0  1.0.5-1+lenny1   high-quality block-sorting file co
ii  libc6   2.7-18lenny4 GNU C Library: Shared libraries
ii  libcurl37.18.2-8lenny4   Multi-protocol file transfer libra
ii  libglib2.0-02.16.6-3 The GLib library of C routines
ii  libgnutls26 2.4.2-6+lenny2   the GNU TLS library - runtime libr
ii  libltdl31.5.26-4+lenny1  A system independent dlopen wrappe
ii  libncurses5 5.7+20081213-1   shared libraries for terminal hand
ii  libnet1 1.1.2.1-2library for the construction and h
ii  libopenhpi2 2.12.0-1 OpenHPI libraries (runtime and sup
ii  libpam-runtime  1.0.1-7  Runtime support for the PAM librar
ii  libpam0g1.0.1-7  Pluggable Authentication Modules l
ii  libsnmp15   5.4.1~dfsg-12SNMP (Simple Network Management Pr
ii  libssl0.9.8 0.9.8g-15+lenny8 SSL shared libraries
ii  libuuid11.41.3-1 universally unique id library
ii  libwrap07.6.q-16 Wietse Venema's TCP wrappers libra
ii  libxml2 2.6.32.dfsg-5+lenny1 GNOME XML library
ii  libxml2-utils   2.6.32.dfsg-5+lenny1 XML utilities
ii  mawk1.3.3-11.1   a pattern scanning and text proces
ii  psmisc  22.6-1   Utilities that use the proc filesy
ii  python  2.5.2-3  An interactive high-level object-o
ii  python-central  0.6.8register and build utility for Pyt
ii  zlib1g  1:1.2.3.3.dfsg-12compression library - runtime

Versions of packages heartbeat recommends:
ii  iptables  1.4.2-6administration tools for packet fi
ii  logrotate 3.7.1-5Log rotation utility
ii  syslog-ng [system-log-daemon] 2.0.9-4.1  Next generation logging daemon

heartbeat suggests no packages.

-- no debconf information



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#600571: perl: Fails to complete unpack during installation

2010-10-29 Thread Manuel Kaufmann
I could install this package without any problem. Here is the log:

[humitos] [~]$ sudo apt-get upgrade
Leyendo lista de paquetes... Hecho
Creando árbol de dependencias
Leyendo la información de estado... Hecho
Los siguientes paquetes se han retenido:
  apt apt-utils aptitude debtags goplay libapt-pkg-perl
libdpkg-ruby1.8 libept1 libtracker-client-0.8-0 python-apt synaptic
xindy
  xserver-xorg-video-intel
Se actualizarán los siguientes paquetes:
  libperl5.10 perl perl-base perl-suid
4 actualizados, 0 se instalarán, 0 para eliminar y 13 no actualizados.
Se necesita descargar 0B/5.418kB de archivos.
Se utilizarán 0B de espacio de disco adicional después de esta operación.
¿Desea continuar [S/n]? s
Reading package fields... Done
Reading package status... Done
Retrieving bug reports... Done
Parsing Found/Fixed information... Done
serious bugs of perl (5.10.1-14 - 5.10.1-15) unfixed
 #600571 - perl: Fails to complete unpack during installation
Summary:
 perl(1 bug)
Are you sure you want to install/upgrade the above packages? [Y/n/?/...]
(Leyendo la base de datos ... 299606 files and directories currently installed.)
Preparando para reemplazar perl-suid 5.10.1-14 (usando
.../perl-suid_5.10.1-15_i386.deb) ...
Desempaquetando el reemplazo de perl-suid ...
Preparando para reemplazar libperl5.10 5.10.1-14 (usando
.../libperl5.10_5.10.1-15_i386.deb) ...
Desempaquetando el reemplazo de libperl5.10 ...
Preparando para reemplazar perl 5.10.1-14 (usando
.../perl_5.10.1-15_i386.deb) ...
Desempaquetando el reemplazo de perl ...
Preparando para reemplazar perl-base 5.10.1-14 (usando
.../perl-base_5.10.1-15_i386.deb) ...
Desempaquetando el reemplazo de perl-base ...
Procesando disparadores para man-db ...
Configurando perl-base (5.10.1-15) ...
Configurando perl (5.10.1-15) ...
Configurando libperl5.10 (5.10.1-15) ...
Configurando perl-suid (5.10.1-15) ...
[humitos] [~]$

Thanks,

-- 
Kaufmann Manuel
Blog: http://humitos.wordpress.com/
PyAr: http://www.python.com.ar/



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#594535: [gnome-shell] cannot start after upgrade to 2.29.0-3+b1

2010-10-29 Thread Jon Dowland
I don't get a blinking screen, I get the following:

j...@hathor:~$ gnome-shell --replace 
[1] 3493
j...@hathor:~$ do_wait: drmWaitVBlank returned -1, IRQs don't seem to 
be working correctly.
Try adjusting the vblank_mode configuration parameter.
Shell killed with signal 11

Is this the same bug?



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601817: gparted crashes applying move to right of more than one logical partition

2010-10-29 Thread Aníbal Monsalve Salazar
Package: gparted
Version: 0.6.2-1
Severity: serious
Tags: fixed-upstream

At https://bugzilla.gnome.org/show_bug.cgi?id=628863
Frieder Ferlemann reported:

  On an IBM T42 notebook gparted reproducibly (tried 3 times with
  varying layouts) crashes when rearranging partitions leaving the
  system in an unusable state.


signature.asc
Description: Digital signature


Bug#601818: gparted crashes at start: glibmm-ERROR **

2010-10-29 Thread Aníbal Monsalve Salazar
Package: gparted

  
Version: 0.6.2-1

  
Severity: serious   

  
Tags: fixed-upstream

At https://bugs.launchpad.net/ubuntu/+source/gparted/+bug/617885
Lito reported:

  Always that I try to open gparted from console:

  $ sudo gparted
  ==
  libparted : 2.2
  ==

  glibmm-ERROR **:
  unhandled exception (type std::exception) in signal handler:
  what: basic_string::_S_create

  aborting...


signature.asc
Description: Digital signature


Bug#600890: xul-ext-sync: firefox sync is not functional as it is too old

2010-10-29 Thread Norbert Preining
On Do, 21 Okt 2010, Michael Fladischer wrote:
 I'll contact debian-volatile and debian-release about this issue.
 So far I can only give this advise: Don't upgrade to 1.5 on other
 installations to keep compatibility. Sorry ...

No, better solution - remove the xul-ext-sync package and install it from
within iceweasel.

Then I have a working sync across all possible platforms.

 I think this depends on your POV, as I'm using it to sync several Debian
 installations it's not really broken regarding it's status within Debian
 ... but that's just POV :-)

Yes, from my POV you can close this bug or do whatever, I will not use
the packaged version anymore, since it is a pain to keep in sync
with other computers.

Be reminded that firefox on other platforms automatically (by default, if not
turned off) updates plugins, so keeping them at 1.4 is not practical.

Case closed for me, I see no advantage in using the Debian package, so
it be gone.

Best wishes

Norbert

Norbert Preiningprein...@{jaist.ac.jp, logic.at, debian.org}
JAIST, Japan TeX Live  Debian Developer
DSA: 0x09C5B094   fp: 14DF 2E6C 0307 BE6D AD76  A9C0 D2BF 4AA3 09C5 B094

AGGLETHORPE (n.)
A dispute between two pooves in a boutique.
--- Douglas Adams, The Meaning of Liff



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: reassign 601816 to network-manager, forcibly merging 530024 601816

2010-10-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 reassign 601816 network-manager
Bug #601816 [network-manager-gnome] Network manager in Gnome and Wired 
connection
Bug reassigned from package 'network-manager-gnome' to 'network-manager'.
Bug No longer marked as found in versions network-manager-applet/0.8.1-1.
 forcemerge 530024 601816
Bug#530024: eth0 Wired interface not managed (on squeeze install/upgrade).
Bug#601816: Network manager in Gnome and Wired connection
Forcibly Merged 530024 601816.

 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
530024: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=530024
601816: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601816
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601747: RDS protocol vulnerability

2010-10-29 Thread Hideki Yamane
On Fri, 29 Oct 2010 16:10:35 +0100
Adam D. Barratt a...@adam-barratt.org.uk wrote:
 Are you actually experiencing this in 2.6.32-26, or just assuming it's
 affected because the US-CERT page says it is?

 No, it's shame, I don't check debian/changelog... very sorry for all.
 

-- 
Regards,

 Hideki Yamane henrich @ debian.or.jp/org
 http://wiki.debian.org/HidekiYamane



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: your mail

2010-10-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 close 601747 2.6.32-26
Bug#601747: RDS protocol vulnerability
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 2.6.32-26, send any further explanations to 
Hideki Yamane henr...@debian.or.jp

 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
601747: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601747
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601747: (no subject)

2010-10-29 Thread Hideki Yamane
close 601747 2.6.32-26
thanks


-- 
Regards,

 Hideki Yamane henrich @ debian.or.jp/org
 http://wiki.debian.org/HidekiYamane



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601817: marked as done (gparted crashes applying move to right of more than one logical partition)

2010-10-29 Thread Debian Bug Tracking System
Your message dated Sat, 30 Oct 2010 01:32:08 +
with message-id e1pc0ii-0002e5...@franck.debian.org
and subject line Bug#601817: fixed in gparted 0.7.0-1
has caused the Debian Bug report #601817,
regarding gparted crashes applying move to right of more than one logical 
partition
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
601817: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601817
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: gparted
Version: 0.6.2-1
Severity: serious
Tags: fixed-upstream

At https://bugzilla.gnome.org/show_bug.cgi?id=628863
Frieder Ferlemann reported:

  On an IBM T42 notebook gparted reproducibly (tried 3 times with
  varying layouts) crashes when rearranging partitions leaving the
  system in an unusable state.


signature.asc
Description: Digital signature
---End Message---
---BeginMessage---
Source: gparted
Source-Version: 0.7.0-1

We believe that the bug you reported is fixed in the latest version of
gparted, which is due to be installed in the Debian FTP archive:

gparted_0.7.0-1.debian.tar.bz2
  to main/g/gparted/gparted_0.7.0-1.debian.tar.bz2
gparted_0.7.0-1.dsc
  to main/g/gparted/gparted_0.7.0-1.dsc
gparted_0.7.0-1_mipsel.deb
  to main/g/gparted/gparted_0.7.0-1_mipsel.deb
gparted_0.7.0.orig.tar.bz2
  to main/g/gparted/gparted_0.7.0.orig.tar.bz2



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 601...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Anibal Monsalve Salazar ani...@debian.org (supplier of updated gparted 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sat, 30 Oct 2010 11:08:59 +1100
Source: gparted
Binary: gparted
Architecture: source mipsel
Version: 0.7.0-1
Distribution: unstable
Urgency: high
Maintainer: Anibal Monsalve Salazar ani...@debian.org
Changed-By: Anibal Monsalve Salazar ani...@debian.org
Description: 
 gparted- GNOME partition editor
Closes: 601817 601818
Changes: 
 gparted (0.7.0-1) unstable; urgency=high
 .
   * New upstream release
 Fix gparted crash at start with glibmm-ERROR
   Closes: 601818
   LP: #609477, #617885
 Fix crash moving more than one logical partition right
   Closes: 601817
 Skip move/copy action because linux swap contains no data
   LP: #401228
 Fix several memory leaks and valgrind errors
 Remove unnecessary null pointer checks
 Fix partitions moved or copied are 1 MiB larger
 Insert additional translator comments
 Add initial support for btrfs
Checksums-Sha1: 
 720a8be54f266cba021a6eaa95fc24c6642a0072 1889 gparted_0.7.0-1.dsc
 709d59d2bea01ab81a1c2fd7e4e002bcb821db5e 1374308 gparted_0.7.0.orig.tar.bz2
 ecfb79431d880be47f11b75b63bb783e8c82103e 10890 gparted_0.7.0-1.debian.tar.bz2
 04fb57508654d0af4c53401b522e638d16c0458c 1268214 gparted_0.7.0-1_mipsel.deb
Checksums-Sha256: 
 590887bfb74b8c108480c70f7ff49a906b009b3843feab3f9586c51f2769df0c 1889 
gparted_0.7.0-1.dsc
 8c498411aeb4ec575c15ef60ac3bde2ef46ae157fa53026a7e3ce85d14ad3be7 1374308 
gparted_0.7.0.orig.tar.bz2
 21ef58c819149e700497acd8c64453c6c1a3c2a4512665157f7c6fbd3150c77a 10890 
gparted_0.7.0-1.debian.tar.bz2
 dc4608a427e9778550c86ecea735eec7fe9f4941ce30403ee75e74b6ae680d37 1268214 
gparted_0.7.0-1_mipsel.deb
Files: 
 6baf604c82043ffdbedc0c4cd04939d6 1889 gnome optional gparted_0.7.0-1.dsc
 88c5b2162a7b7847c68ea80f4fcd0153 1374308 gnome optional 
gparted_0.7.0.orig.tar.bz2
 2ad3caf99466e62954b681b4c5558910 10890 gnome optional 
gparted_0.7.0-1.debian.tar.bz2
 e622b7ccd07c421b8eb7e579cb0f0f7d 1268214 gnome optional 
gparted_0.7.0-1_mipsel.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
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Bug#601818: marked as done (gparted crashes at start: glibmm-ERROR **)

2010-10-29 Thread Debian Bug Tracking System
Your message dated Sat, 30 Oct 2010 01:32:08 +
with message-id e1pc0ii-0002e8...@franck.debian.org
and subject line Bug#601818: fixed in gparted 0.7.0-1
has caused the Debian Bug report #601818,
regarding gparted crashes at start: glibmm-ERROR **
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
601818: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601818
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: gparted

  
Version: 0.6.2-1

  
Severity: serious   

  
Tags: fixed-upstream

At https://bugs.launchpad.net/ubuntu/+source/gparted/+bug/617885
Lito reported:

  Always that I try to open gparted from console:

  $ sudo gparted
  ==
  libparted : 2.2
  ==

  glibmm-ERROR **:
  unhandled exception (type std::exception) in signal handler:
  what: basic_string::_S_create

  aborting...


signature.asc
Description: Digital signature
---End Message---
---BeginMessage---
Source: gparted
Source-Version: 0.7.0-1

We believe that the bug you reported is fixed in the latest version of
gparted, which is due to be installed in the Debian FTP archive:

gparted_0.7.0-1.debian.tar.bz2
  to main/g/gparted/gparted_0.7.0-1.debian.tar.bz2
gparted_0.7.0-1.dsc
  to main/g/gparted/gparted_0.7.0-1.dsc
gparted_0.7.0-1_mipsel.deb
  to main/g/gparted/gparted_0.7.0-1_mipsel.deb
gparted_0.7.0.orig.tar.bz2
  to main/g/gparted/gparted_0.7.0.orig.tar.bz2



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 601...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Anibal Monsalve Salazar ani...@debian.org (supplier of updated gparted 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sat, 30 Oct 2010 11:08:59 +1100
Source: gparted
Binary: gparted
Architecture: source mipsel
Version: 0.7.0-1
Distribution: unstable
Urgency: high
Maintainer: Anibal Monsalve Salazar ani...@debian.org
Changed-By: Anibal Monsalve Salazar ani...@debian.org
Description: 
 gparted- GNOME partition editor
Closes: 601817 601818
Changes: 
 gparted (0.7.0-1) unstable; urgency=high
 .
   * New upstream release
 Fix gparted crash at start with glibmm-ERROR
   Closes: 601818
   LP: #609477, #617885
 Fix crash moving more than one logical partition right
   Closes: 601817
 Skip move/copy action because linux swap contains no data
   LP: #401228
 Fix several memory leaks and valgrind errors
 Remove unnecessary null pointer checks
 Fix partitions moved or copied are 1 MiB larger
 Insert additional translator comments
 Add initial support for btrfs
Checksums-Sha1: 
 720a8be54f266cba021a6eaa95fc24c6642a0072 1889 gparted_0.7.0-1.dsc
 709d59d2bea01ab81a1c2fd7e4e002bcb821db5e 1374308 gparted_0.7.0.orig.tar.bz2
 ecfb79431d880be47f11b75b63bb783e8c82103e 10890 gparted_0.7.0-1.debian.tar.bz2
 04fb57508654d0af4c53401b522e638d16c0458c 1268214 gparted_0.7.0-1_mipsel.deb
Checksums-Sha256: 
 590887bfb74b8c108480c70f7ff49a906b009b3843feab3f9586c51f2769df0c 1889 
gparted_0.7.0-1.dsc
 8c498411aeb4ec575c15ef60ac3bde2ef46ae157fa53026a7e3ce85d14ad3be7 1374308 
gparted_0.7.0.orig.tar.bz2
 21ef58c819149e700497acd8c64453c6c1a3c2a4512665157f7c6fbd3150c77a 10890 
gparted_0.7.0-1.debian.tar.bz2
 dc4608a427e9778550c86ecea735eec7fe9f4941ce30403ee75e74b6ae680d37 1268214 
gparted_0.7.0-1_mipsel.deb
Files: 
 6baf604c82043ffdbedc0c4cd04939d6 1889 gnome optional gparted_0.7.0-1.dsc
 88c5b2162a7b7847c68ea80f4fcd0153 1374308 gnome optional 
gparted_0.7.0.orig.tar.bz2
 2ad3caf99466e62954b681b4c5558910 10890 gnome optional 
gparted_0.7.0-1.debian.tar.bz2
 

Bug#601824: imagemagick: reads config files from cwd

2010-10-29 Thread Jakub Wilk

Package: imagemagick
Version: 7:6.3.7.9.dfsg2-1~lenny3
Severity: grave
Tags: security
Justification: user security hole

ImageMagick reads several configuration files[0] from the current 
working directory. Unfortunately, this allows local attackers to execute 
arbitrary code if ImageMagick is run from an untrusted directory.


Steps to reproduce this bug:

1. As an attacker, put the attached files in /tmp.
2. As a victim, in /tmp run:

$ convert /path/to/foo.png /path/to/bar.png
All your base are belong to us.
convert: missing an image filename `/path/to/bar.png'.


[0] http://www.imagemagick.org/script/resources.php

--
Jakub Wilk


coder.xml
Description: XML document


delegates.xml
Description: XML document


signature.asc
Description: Digital signature


Processed: tagging 601824

2010-10-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 601824 + confirmed
Bug #601824 [imagemagick] imagemagick: reads config files from cwd
Added tag(s) confirmed.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
601824: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601824
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601824: imagemagick: reads config files from cwd

2010-10-29 Thread Nelson A. de Oliveira
Hi Jakub!

On Fri, Oct 29, 2010 at 11:43 PM, Jakub Wilk jw...@debian.org wrote:
 ImageMagick reads several configuration files[0] from the current working
 directory. Unfortunately, this allows local attackers to execute arbitrary
 code if ImageMagick is run from an untrusted directory.

I have confirmed it here and forwarded upstream.

Thank you!

Best regards,
Nelson



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#574219: Intent to NMU (dict-xdict: package removal fails)

2010-10-29 Thread Emfox Zhou
feel free to NMU. and thanks.

On 10/30/10, Jari Aalto jari.aa...@cante.net wrote:
 This bug seems to be a candidate for NMU. I have some free time
 and I am offering to help fix it. Please let me know if this bug
 is already been worked on or if it's okay to NMU the package.





-- 
Emfox Zhou

GnuPG Public Key: 0xF7142EC2



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#601807: heartbeat: Segfault while using a failover IPv6 address

2010-10-29 Thread Simon Horman
On Fri, Oct 29, 2010 at 10:54:55PM +0200, Laurent Caron wrote:
 Package: heartbeat
 Version: 2.1.3-6lenny4
 Severity: grave
 Justification: renders package unusable
 
 
 Hi,
 
 Heartbeat doesn't seem to play nice with ipv6.
 
 It segfaults while trying to add an IPv6 address.

Hi Laurent,

could you give a little bit more detail on the configuration
that you have that segfaults?



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org