Bug#684426: marked as done ([owncloud] Users can overwrite read-only shared files owned by other users via WebDAV)

2012-08-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Aug 2012 06:03:21 +
with message-id e1szijd-00060h...@franck.debian.org
and subject line Bug#684426: fixed in owncloud 4.0.5debian2-2
has caused the Debian Bug report #684426,
regarding [owncloud] Users can overwrite read-only shared files owned by other 
users via WebDAV
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
684426: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684426
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: owncloud
Version: 4.0.5debian2-1
Severity: grave
Tags: patch security
X-Debbugs-CC: secure-testing-t...@lists.alioth.debian.org

--- Please enter the report below this line. ---
Hi,

I stumbled over a security bug in owncloud with the result of data loss
or modification, depending on the configuration of owncloud.

It is possible for regular users of owncloud to overwrite files that are
shared by another owncloud user via WebDAV.

If version control is activated user1 could revert the file to its
previous state, but if it's not activated, user1's data is lost.

Find attached a patch that should fix the security flaw for owncloud
4.0.5debian2-1.

Cheers - Fuddl

--- System information. ---
Architecture: amd64
Kernel:   Linux 3.2.0-3-amd64

Debian Release: wheezy/sid
  500 unstableftp.de.debian.org 
1 experimentalftp.de.debian.org 

--- Package information. ---
Package's Depends field is empty.

Package's Recommends field is empty.

Package's Suggests field is empty.



From 05648dac619942dfccc76180d30fcd79364355ec Mon Sep 17 00:00:00 2001
From: Michael Gapczynski mt...@owncloud.com
Date: Wed, 8 Aug 2012 11:25:24 -0400
Subject: [PATCH] Don't return file handle if the mode supports writing and
 the file is not writable

---
 apps/files_sharing/sharedstorage.php |   19 +++
 1 file changed, 19 insertions(+)

Index: owncloud-4.0.5debian2/apps/files_sharing/sharedstorage.php
===
--- owncloud-4.0.5debian2.orig/apps/files_sharing/sharedstorage.php	2012-07-19 18:50:49.0 +0200
+++ owncloud-4.0.5debian2/apps/files_sharing/sharedstorage.php	2012-08-09 11:29:58.0 +0200
@@ -416,6 +416,25 @@
 	public function fopen($path, $mode) {
 		$source = $this-getSource($path);
 		if ($source) {
+   switch ($mode) {
+   case 'r+':
+   case 'rb+':
+   case 'w+':
+   case 'wb+':
+   case 'x+':
+   case 'xb+':
+   case 'a+':
+   case 'ab+':
+   case 'w':
+   case 'wb':
+   case 'x':
+   case 'xb':
+   case 'a':
+   case 'ab':
+   if (!$this-is_writable($path)) {
+   return false;
+   }
+   }
 			$storage = OC_Filesystem::getStorage($source);
 			return $storage-fopen($this-getInternalPath($source), $mode);
 		}


signature.asc
Description: This is a digitally signed message part
---End Message---
---BeginMessage---
Source: owncloud
Source-Version: 4.0.5debian2-2

We believe that the bug you reported is fixed in the latest version of
owncloud, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 684...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thomas Mueller thomas.muel...@tmit.eu (supplier of updated owncloud package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 09 Aug 2012 23:29:25 +0200
Source: owncloud
Binary: owncloud owncloud-mysql owncloud-sqlite
Architecture: source all
Version: 4.0.5debian2-2
Distribution: unstable
Urgency: high
Maintainer: ownCloud for Debian maintainers 
pkg-owncloud-maintain...@lists.alioth.debian.org
Changed-By: Thomas Mueller thomas.muel...@tmit.eu
Description: 
 owncloud   - cloud storage 

Bug#684454: ruby-actionpack-3.2: CVE-2012-3463 / CVE-2012-3464 / CVE-2012-3465

2012-08-10 Thread Moritz Muehlenhoff
Package: ruby-actionpack-3.2
Severity: grave
Tags: security
Justification: user security hole

Please see

CVE-2012-3465
http://www.openwall.com/lists/oss-security/2012/08/09/9


CVE-2012-3464
http://www.openwall.com/lists/oss-security/2012/08/09/10


CVE-2012-3463
http://www.openwall.com/lists/oss-security/2012/08/09/8

Since Wheezy is frozen, please use the isolated patches instead of updating to
3.2.8


Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#684456: qpid-cpp: CVE-2012-3467

2012-08-10 Thread Moritz Muehlenhoff
Package: qpid-cpp
Severity: grave
Tags: security
Justification: user security hole

Please see http://www.openwall.com/lists/oss-security/2012/08/09/6

Since we're in freeze, please fix this with an isolated patch.

Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#680845: derivations: FTBFS: Can't create output index file /«PKGBUILDDIR»/tex/main.ind.

2012-08-10 Thread Sebastian Ramacher
Hi,

On 09/08/12 18:09, Hilmar Preusse wrote:
 Benjamin Mako Hill provided a patch, which probably solves the
 problem. I've uploaded new packages here, do you have a chance to
 test if they do?
 
 http://wagner.debian.org/~hilmar-guest/rubber/

derivations built for me with the patched package. Didn't try anything else.

Cheers
-- 
Sebastian Ramacher



signature.asc
Description: OpenPGP digital signature


Bug#684463: condor fails to install if condor user already exists

2012-08-10 Thread Tiziano Zito
Package: condor
Version: 7.8.1~dfsg.1-1~nd12.04+1
Severity: grave
Justification: renders package unusable

Hi!

when I try to install condor on a machine where the condor user already exists 
(either
because the machine uses LDAP authentication and condor user is in
LDAP or because I am just re-installing or upgrading condor), the
configuration step fails with:

Setting up condor (7.8.1~dfsg.1-1~nd60+1) ...
adduser: The user `condor' already exists. Exiting.
dpkg: error processing condor (--configure):
 subprocess installed post-installation script returned error exit status 1
configured to not write apport reports
Errors were encountered while processing:
 condor
E: Sub-process /usr/bin/dpkg returned an error code (1)
A package failed to install.  Trying to recover:
Setting up condor (7.8.1~dfsg.1-1~nd60+1) ...
adduser: The user `condor' already exists. Exiting.
dpkg: error processing condor (--configure):
 subprocess installed post-installation script returned error exit status 1
Errors were encountered while processing:
 condor

I am somehow unsure what is happening, because I have this also on a
machine where condor is already installed and working, but:

hamxxx ~ # dpkg-reconfigure condor
/usr/sbin/dpkg-reconfigure: condor is broken or not fully installed
hamxxx ~ # condor_q
-- Submitter: hamxxx : 172.29.xxx.xxx:40590 : hamxxx
 ID  OWNERSUBMITTED RUN_TIME ST PRI SIZE CMD
2586.0   xxx 8/9  15:50   0+05:36:39 R  0   43.9 bash_lc_var_5 2586
2586.1   xxx 8/9  15:50   0+05:36:39 R  0   43.9 bash_lc_var_5 2586
[...]

this happens on squeeze, wheezy and ubuntu precise...

am I doing something wrong?

thank you,
tiziano

-- System Information:
Debian Release: wheezy/sid
  APT prefers precise-updates
  APT policy: (500, 'precise-updates'), (500, 'precise-security'), (500, 
'precise')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-27-generic (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages condor depends on:
ii  adduser 3.113ubuntu2
ii  debconf [debconf-2.0]   1.5.42ubuntu1
ii  libc6   2.15-0ubuntu10
ii  libclassad3 7.8.1~dfsg.1-1~nd12.04+1
ii  libcomerr2  1.42-1ubuntu2
ii  libcurl37.22.0-3ubuntu4
ii  libdate-manip-perl  6.25-1
ii  libexpat1   2.0.1-7.2ubuntu1
ii  libgcc1 1:4.6.3-1ubuntu5
ii  libglobus-common0   14.5-1
ii  libglobus-ftp-control1  4.2-1
ii  libglobus-gass-transfer27.1-1
ii  libglobus-gram-client3  12.3-2
ii  libglobus-gsi-credential1   5.1-1
ii  libglobus-gsi-proxy-core0   6.1-1
ii  libglobus-gsi-sysconfig15.1-1
ii  libglobus-gss-assist3   8.1-1
ii  libglobus-gssapi-gsi4   10.2-1
ii  libglobus-io3   9.2-1
ii  libglobus-rsl2  9.1-2
ii  libglobus-xio0  3.2-1
ii  libgsoap1   2.8.4-2
ii  libk5crypto31.10+dfsg~beta1-2ubuntu0.3
ii  libkrb5-3   1.10+dfsg~beta1-2ubuntu0.3
ii  libldap-2.4-2   2.4.28-1.1ubuntu4.1
ii  libpcre38.12-4
ii  libssl1.0.0 1.0.1-4ubuntu5.3
ii  libstdc++6  4.6.3-1ubuntu5
ii  libuuid12.20.1-1ubuntu3
ii  libvirt00.9.8-2ubuntu17.3
ii  neurodebian-popularity-contest  0.28~nd12.04+1
ii  perl5.14.2-6ubuntu2
ii  python  2.7.3-0ubuntu2

Versions of packages condor recommends:
ii  dmtcp  1.2.5-1~nd12.04+1

Versions of packages condor suggests:
pn  coop-computing-tools  none

-- debconf information excluded


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#668721: Any reason to not upload the patched package to close #668721

2012-08-10 Thread Andreas Tille
Hi Joey,

lacking any answer from you I NMUed to DELAYED/10.

Hope you like this

Andreas.

On Mon, Aug 06, 2012 at 12:08:34PM +0200, Andreas Tille wrote:
 Hi Joey,
 
 following the advise to look into RC bugs before reading Bits from DPL
 I stumbled over this one.  Could you give any reason why you do not
 upload with the provided patch?
 
 Please give some signal what to do (I'd volunteer to NMU in case you
 might have some time issues).
 
 Kind regards
 
 Andreas.
 
 -- 
 http://fam-tille.de

-- 
http://fam-tille.de


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: [bts-link] source package gnome-keyring

2012-08-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 #
 # bts-link upstream status pull for source package gnome-keyring
 # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html
 #
 user bts-link-upstr...@lists.alioth.debian.org
Setting user to bts-link-upstr...@lists.alioth.debian.org (was 
bts-link-de...@lists.alioth.debian.org).
 # remote status report for #683655 (http://bugs.debian.org/683655)
 # Bug title: gnome-keyring: gpg passphrase cached forever
 #  * http://bugzilla.gnome.org/show_bug.cgi?id=681081
 #  * remote status changed: UNCONFIRMED - RESOLVED
 #  * remote resolution changed: (?) - FIXED
 #  * closed upstream
 tags 683655 + fixed-upstream
Bug #683655 [gnome-keyring] gnome-keyring: gpg passphrase cached forever
Added tag(s) fixed-upstream.
 usertags 683655 - status-UNCONFIRMED
Usertags were: status-UNCONFIRMED.
Usertags are now: .
 usertags 683655 + status-RESOLVED resolution-FIXED
There were no usertags set.
Usertags are now: status-RESOLVED resolution-FIXED.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
683655: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683655
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#684479: wheezy: Network File Services are major issue in Wheezy.

2012-08-10 Thread Hughe Chung
Package: wheezy
Version: Wheezy
Severity: serious
Justification: required

Dear Maintainer,
*** Please consider answering these questions, where appropriate ***

   * What led up to the situation?
   Network File services hung up the fresh Wheezy startup. 
   * What exactly did you do (or not do) that was effective (or
 ineffective)?
   I had to boot in rescue mode, then removed NFS related packages.
   * What was the outcome of this action?
   Wheezy boots up like Squeeze did before
   * What outcome did you expect instead?

*** End of the template - remove these lines ***

Also /etc/pm/sleep.d/56nfs script file that I made for NFS months ago prevented
pm-suspend. On Squeeze it won't affect suspend action at all. Simply removing
the file from /etc/pm/sleep.d directory solved non-suspend problem at least in
my system.



-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#684480: libjs-wax: Missing html4-defs.js

2012-08-10 Thread Andrew Harvey
Package: libjs-wax
Version: 5.0.1+ds1-1
Justification: renders package unusable
Severity: grave

Dear Maintainer,

Upon trying to use wax.leaf.js the browser reports html4 is not
defined from wax.leaf.js:842.

The html4 object which it mentions is provided by the html4 package
within google-caja.

More specifically in debian/rules the get-orig-source target removes the
third-party embedded libs for the google-caja html-sanitizer from the
source package (ext/html-sanitizer-bundle.js) and
re-pulls this file from
http://google-caja.googlecode.com/svn/trunk/src/com/google/caja/plugin/html-sanitizer.js.

However, the two files are not the same. Specifically the one you pull
in doesn't provide html4, whereas the one included in the upstream
source package did.

This is furthermore complicated by the fact that upstream removed the
html4-defs.js file (which is the one we need) from the upstream source
tree in r3013 because it is now build as part of the build process of
google-caja, so we can't simply pull it in.

I see two options to fix this issue.

Option 1 is to leave the included ext/html-sanitizer-bundle.js from the
upstream source tarball in tact and use it. However I don't think this
is a viable option as it is probably against Debian policy.

Option two is to package google-caja in Debian. Doing so will build the
required html4-defs.js file from source and provide it for use within
Debian, allowing libjs-wax to simply Depend on google-caja and use it's
html4-defs.js file.

Until such time as this is fixed, unless there is some other way to use
wax, I think the package should be removed from Debian since it is not
usable in it's current form (happy to be proven wrong).

Thanks.



signature.asc
Description: OpenPGP digital signature


Bug#608981: Crash with long GGI_DISPLAY environment variable

2012-08-10 Thread Jonathan Wiltshire
Package: libggi

Dear maintainer,

Recently you fixed one or more security problems and as a result you closed
this bug. These problems were not serious enough for a Debian Security
Advisory, so they are now on my radar for fixing in the following suites
through point releases:

squeeze (6.0.6) - use target stable

Please prepare a minimal-changes upload targetting each of these suites,
and submit a debdiff to the Release Team [0] for consideration. They will
offer additional guidance or instruct you to upload your package.

I will happily assist you at any stage if the patch is straightforward and
you need help. Please keep me in CC at all times so I can
track [1] the progress of this request.

For details of this process and the rationale, please see the original
announcement [2] and my blog post [3].

0: debian-rele...@lists.debian.org
1: http://prsc.debian.net/tracker/608981/
2: 201101232332.11736.th...@debian.org
3: http://deb.li/prsc

Thanks,

with his security hat on:
--
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#684423: live-tools: Broken link ( /usr/sbin/update-initramfs - ../bin/live-update-initramfs )

2012-08-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 684423 grave
Bug #684423 [live-tools] live-tools: Broken link ( /usr/sbin/update-initramfs 
- ../bin/live-update-initramfs )
Severity set to 'grave' from 'important'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
684423: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684423
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#684423: update-initramfs workaround

2012-08-10 Thread Sam Morris
The following hook can be used to work around this bug.

$ cat config/hooks/fix-update-initramfs.chroot 
#!/bin/sh
set -eu
ln
-sf ../../bin/live-update-initramfs /usr/sbin/update-initramfs

-- 
Sam Morris s...@robots.org.uk


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#682905: can't import signatures

2012-08-10 Thread Daniel Pocock

 You could also try with another local user account on that machine, to
 rule out that it is due to specific settings in your home directory.

 I created a new UNIX user, new email address and new PGP key
... snip ...
 Therefore, it appears to be good for a completely clean user account
 
 That's partially good news. Let's narrow it down further. Please create
 a new icedove profile within your existing user account (icedove
 -ProfileManager on the command-line, when no instance of icedove is
 running). and do essentially the same you did within the new user
 account. That way, we make sure that it is your icedove profile, not
 your whole user account that accounts for these problems.

I've tried this.  I created a completely different profile using
ProfileManager and then I set up my account in the profile.

I didn't set up everything, I have a lot of settings.  I just put my
main email identity (dan...@pocock.com.au)

I was able to successfully import signatures attached to emails - no
error message

 I am willing to try swapping out my own user profile somehow to isolate
 the problem, but (a) I do want to preserve my settings and (b) that
 won't be a good solution for all users upgrading from squeeze-wheezy

 Particular features of my user account:
 - was working fine with squeeze
 - gpg: includes an old 1024 bit key, now revoked
 - icedove: includes enigmail and iceowl-extension
 
 I think it is unlikely that iceowl causes incompatibilities, but to be
 sure about it, you could temporarily disable all extensions except enigmail.

I tried that too, it didn't fix the problem

 BTW: Did you ever install enigmail as a local extension (i.e. downloaded
 it as xpi file from enigmail.mozdez.org or addons.mozilla.org)?

I can't remember if I have ever done that.  I believe I started using
the enigmail package from about 2010

I have used icedove for a long time, and each time I upgrade Debian and
Icedove, I keep using the same profile.  The oldest file under the
~/.icedove/profile directory is from 2007, but I may have had this
profile since before that, I can't remember.

On squeeze, I last used 3.0.11-1+squeeze11 with Enigmail 2:1.0.1-5.  I
stopped using squeeze to run icedove a few weeks ago.

On wheezy, I have 10.0.5-1 and Enigmail 2:1.4.1-2


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#684488: puppet-lint not working with ruby1.9.1

2012-08-10 Thread Laurent Bigonville
Package: puppet-lint
Version: 0.1.13-1
Severity: serious
Tags: sid wheezy

Hi,

it seems that puppet-lint is not working with ruby1.9.1 which is the
default version in wheezy.

/usr/lib/ruby/1.9.1/rubygems/custom_require.rb:36:in `require': iconv will be 
deprecated in the future, use String#encode instead.
/usr/bin/puppet-lint:88:in `main': undefined method `each' for 
config.pp:String (NoMethodError)

Using ruby1.8 is working flawlessly.

Cheers

Laurent Bigonville

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.4-trunk-amd64 (SMP w/4 CPU cores)
Locale: LANG=fr_BE.utf8, LC_CTYPE=fr_BE.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages puppet-lint depends on:
ii  puppet-common 2.7.18-1
ii  ruby  4.9
ii  ruby1.8 [ruby-interpreter]1.8.7.358-4
ii  ruby1.9.1 [ruby-interpreter]  1.9.3.194-1

puppet-lint recommends no packages.

Versions of packages puppet-lint suggests:
pn  rake  none

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#684489: gksu-polkit: CVE-2011-0703

2012-08-10 Thread Moritz Muehlenhoff
Package: gksu-polkit
Severity: grave
Tags: security
Justification: user security hole

I just noticed that this never made it to the BTS:

http://www.openwall.com/lists/oss-security/2011/03/15/8

It was assiged CVE-2011-0703

Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#682574: tagging 672870, tagging 664261, tagging 682382, tagging 682499, found 682574 in live-utils/3.0.3-1 ...

2012-08-10 Thread Evgeni Golov
On Mon, Jul 23, 2012 at 10:45:30PM +0200, Andreas Beckmann wrote:
 found 682574 live-utils/3.0.3-1

You surely meant live-tools/3.0.3-1 here, right?
Which makes live-tools/3.0.3-1 in Wheezy RC-buggy?

-- 
Bruce Schneier can read and understand Perl programs.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#684423: live-tools: Broken link ( /usr/sbin/update-initramfs - ../bin/live-update-initramfs )

2012-08-10 Thread Daniel Baumann

On 08/10/2012 01:58 PM, Evgeni Golov wrote:

Thank you *so* much for breaking stuff, again.


you should work on your attitude. of course i don't break things on 
purpose. besides, it's sid. you should know that.



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: affects 681960, affects 681218

2012-08-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 affects 681960 - wheezy unstable
Bug #681960 {Done: Scott Kitterman sc...@kitterman.com} [clamav-freshclam] 
clamav-freshclam: removes directories that were installed by another package: 
/var/{lib, log}/clamav/
Removed indication that 681960 affects wheezy and unstable
 affects 681218 - sid wheezy squeeze
Bug #681218 {Done: Debian FTP Masters ftpmas...@ftp-master.debian.org} 
[kcheckgmail] kcheckgmail: Google authentication has changed - kcheckgmail is 
no more usable
Removed indication that 681218 affects sid, wheezy, and squeeze
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
681218: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681218
681960: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681960
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#682634: Bug#682631: linaro-image-tools: FTBFS: AttributeError: 'tuple' object has no attribute 'major'

2012-08-10 Thread gregor herrmann
On Thu, 09 Aug 2012 17:37:01 +0200, gregor herrmann wrote:

  I'm no python expert and only did the NMU upload for
  nautilus-image-manipulator recently, but I have found that e.g.
  google-apps-manager does [1,2] for python2.6 'compatibility':
  
   [1]: http://code.google.com/p/google-apps-manager/issues/detail?id=61
   [2]: https://code.google.com/p/google-apps-manager/source/detail?r=253#
  
 
 Nice, I'm learning something about python by looking at bug reports
 :)
 
 https://code.google.com/p/google-apps-manager/source/diff?spec=svn253r=253format=sidepath=/trunk/gam.py
 shows the diff.

But:

The error

| WARNING: the following files are not recognized by DistUtilsExtra.auto:
| Traceback (most recent call last):
|   File setup.py, line 86, in module
| cmdclass={'install': InstallAndUpdateDataDirectory}
|   File /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py, line 107, 
in setup
| if(sys.version_info.major  3):
| AttributeError: 'tuple' object has no attribute 'major'
| dh_auto_clean: python2.6 setup.py clean -a returned exit code 1
| make: *** [clean] Error 1

in sid or in wheezy:

| Traceback (most recent call last):
|   File setup.py, line 86, in module
| cmdclass={'install': InstallAndUpdateDataDirectory}
|   File /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py, line 98, in 
setup
| __requires(attrs, src_all)
|   File /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py, line 458, 
in __requires
| __add_imports(imports, s, attrs)
|   File /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py, line 383, 
in __add_imports
| if(sys.version_info.major  3):
| AttributeError: 'tuple' object has no attribute 'major'
| dh_auto_build: python2.6 setup.py build --force returned exit code 1
| make: *** [build] Error 1


doesn't happen in these packages themselves but:

# ls -l /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py
lrwxrwxrwx 1 root root 49 Aug  3 11:57 
/usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py - 
../../../../share/pyshared/DistUtilsExtra/auto.py
# readlink -f /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py
/usr/share/pyshared/DistUtilsExtra/auto.py
# dpkg -S /usr/share/pyshared/DistUtilsExtra/auto.py
python-distutils-extra: /usr/share/pyshared/DistUtilsExtra/auto.py


Should the bugs be reassigned? Someone with python knowledge needed
here :)


Cheers,
gregor
 
-- 
 .''`.  Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06
 : :' : Debian GNU/Linux user, admin, and developer  -  http://www.debian.org/
 `. `'  Member of VIBE!AT  SPI, fellow of the Free Software Foundation Europe
   `-   NP: Beatles: Sgt. Pepper's Lonely Hearts Club Band


signature.asc
Description: Digital signature


Bug#684421: [DRE-maint] Bug#684421: FTBFS: tests require internet connectivity

2012-08-10 Thread Felix Geyer
Hi,

On 10.08.2012 02:04, Gunnar Wolf wrote:
 Hi Felix,
 
 Thanks for the report - I also am not sure of the action to take, so I'm 
 asking the rest of
 the team for input here. Looking at the source, I see quite often the mention 
 of:
 
 c = @http.connection_for @uri
 
 where @uri is often defined as 'https://example.com/path'. I am surprised the 
 tests failed
 for you only three times — How are you checking for network connectivity? 
 Just running in an
 environment with no networking defined? FWIW, I tested the build killing my 
 default gateway,
 and the tests now succeed (or are skipped).

I recently switched from iptables rules that reject packets from the
pbuilder user to network namespaces.
So pbuilder only has access to a virtual network device where it can
reach my apt-cacher-ng instance.

With the patch you attached the package builds fine for me as well.

 It would be good to build with network access. But it is sometimes 
 impossible. And the
 network is a changing thing outside our control. So, yes, not having network 
 access should
 not make the test fail - and the only way out is to report it as such.

Ideally the package would start a local HTTP(S) server and do
s/example.com/localhost/ in the tests.

Felix



signature.asc
Description: OpenPGP digital signature


Bug#681756: cannot reproduce

2012-08-10 Thread gregor herrmann
On Mon, 30 Jul 2012 09:24:39 -0300, gustavo panizzo gfa wrote:

 i cannot reproduce this bug  using piuparts 

Me neither, with piuparts 0.45.

Log attached, the piuparts call should be sufficiently similar to
what Andreas used.

Cheers,
gregor

-- 
 .''`.  Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06
 : :' : Debian GNU/Linux user, admin, and developer  -  http://www.debian.org/
 `. `'  Member of VIBE!AT  SPI, fellow of the Free Software Foundation Europe
   `-   NP: Flying Pickets


canna.log.gz
Description: Binary data


signature.asc
Description: Digital signature


Bug#682631: Bug#682634: Bug#682631: linaro-image-tools: FTBFS: AttributeError: 'tuple' object has no attribute 'major'

2012-08-10 Thread Salvatore Bonaccorso
Hi Gregor

(Adding python-distutils-ex...@packages.debian.org to recipients)

On Fri, Aug 10, 2012 at 03:35:31PM +0200, gregor herrmann wrote:
 But:
 
 The error
 
 | WARNING: the following files are not recognized by DistUtilsExtra.auto:
 | Traceback (most recent call last):
 |   File setup.py, line 86, in module
 | cmdclass={'install': InstallAndUpdateDataDirectory}
 |   File /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py, line 107, 
 in setup
 | if(sys.version_info.major  3):
 | AttributeError: 'tuple' object has no attribute 'major'
 | dh_auto_clean: python2.6 setup.py clean -a returned exit code 1
 | make: *** [clean] Error 1
 
 in sid or in wheezy:
 
 |   File setup.py, line 86, in module
 | cmdclass={'install': InstallAndUpdateDataDirectory}
 |   File /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py, line 98, 
 in setup
 | __requires(attrs, src_all)
 |   File /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py, line 458, 
 in __requires
 | __add_imports(imports, s, attrs)
 |   File /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py, line 383, 
 in __add_imports
 | if(sys.version_info.major  3):
 | AttributeError: 'tuple' object has no attribute 'major'
 | dh_auto_build: python2.6 setup.py build --force returned exit code 1
 | make: *** [build] Error 1
 
 
 doesn't happen in these packages themselves but:
 
 # ls -l /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py
 lrwxrwxrwx 1 root root 49 Aug  3 11:57 
 /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py - 
 ../../../../share/pyshared/DistUtilsExtra/auto.py
 # readlink -f /usr/lib/python2.6/dist-packages/DistUtilsExtra/auto.py
 /usr/share/pyshared/DistUtilsExtra/auto.py
 # dpkg -S /usr/share/pyshared/DistUtilsExtra/auto.py
 python-distutils-extra: /usr/share/pyshared/DistUtilsExtra/auto.py
 
 
 Should the bugs be reassigned? Someone with python knowledge needed
 here :)

Yes, this is true, this does not happen in the respective packages,
see my initial comment for #682634[1], but I was not fully clear there
:). In the commit referenced there, it was introduced the test for
sys.version_info.major  3.

 [1]: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=682634#10
 [2]: 
http://bazaar.launchpad.net/~python-distutils-extra-hackers/python-distutils-extra/debian/revision/295

What I do not yet understand, is why it still uses python2.6 for both
packages: at least nautilus-image-manipulator depends on python, which
now defaults to 2.7, so some other dependencies brings in python2.6?

[I did a rebuild of all packages which build-depends on
python-distutils-extra, and these two seem the only two FTBFS with the
above.]

But again, I only did a first look so my initial disclaimer still
holds :)

Thanks for looking too at it Gregor.

Regards,
Salvatore


signature.asc
Description: Digital signature


Processed: closing 683151

2012-08-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 close 683151
Bug #683151 [telepathy-mission-control-5] telepathy-mission-control-5: Random 
crashes due to access to freed memory
Marked Bug as done
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
683151: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683151
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#682631: Bug#682634: Bug#682631: linaro-image-tools: FTBFS: AttributeError: 'tuple' object has no attribute 'major'

2012-08-10 Thread gregor herrmann
On Fri, 10 Aug 2012 15:52:43 +0200, Salvatore Bonaccorso wrote:

 What I do not yet understand, is why it still uses python2.6 for both
 packages: at least nautilus-image-manipulator depends on python, which
 now defaults to 2.7, so some other dependencies brings in python2.6?

In the chroot when the build fails:

# aptitude why python2.6
i   pbuilder-satisfydepends-dummy Depends python-nose
i A python-nose   Depends python2.6  

But then again, it also shouldn't fail if python2.6 is installed by
accident on the build system.
 
 But again, I only did a first look so my initial disclaimer still
 holds :)

Same here :)
 
 Thanks for looking too at it Gregor.

The perl group makes an expidition into python land? Let's see if
this is successful :)


Cheers,
gregor

-- 
 .''`.  Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06
 : :' : Debian GNU/Linux user, admin, and developer  -  http://www.debian.org/
 `. `'  Member of VIBE!AT  SPI, fellow of the Free Software Foundation Europe
   `-   NP: Pink Floyd: Time


signature.asc
Description: Digital signature


Bug#684506: FTBFS: quilt patches don't apply after unpack

2012-08-10 Thread Michael Tautschnig
Package: accountsservice
Version: 0.6.21-6
Severity: serious

In an attempt to rebuild your package, a simple dget -x fails:

dget -qx 
http://cdn.debian.net/debian/pool/main/a/accountsservice/accountsservice_0.6.21-6.dsc
2012-08-10 16:18:07 
URL:http://cdn.debian.net/debian/pool/main/a/accountsservice/accountsservice_0.6.21-6.dsc
 [2419/2419] - accountsservice_0.6.21-6.dsc [1]
2012-08-10 16:18:07 
URL:http://cdn.debian.net/debian/pool/main/a/accountsservice/accountsservice_0.6.21.orig.tar.gz
 [99198/99198] - accountsservice_0.6.21.orig.tar.gz [1]
2012-08-10 16:18:07 
URL:http://cdn.debian.net/debian/pool/main/a/accountsservice/accountsservice_0.6.21-6.debian.tar.gz
 [38824/38824] - accountsservice_0.6.21-6.debian.tar.gz [1]
accountsservice_0.6.21-6.dsc:
  Good signature found
   validating accountsservice_0.6.21.orig.tar.gz
   validating accountsservice_0.6.21-6.debian.tar.gz
All files validated successfully.
dpkg-source: info: extracting accountsservice in accountsservice-0.6.21
dpkg-source: info: unpacking accountsservice_0.6.21.orig.tar.gz
dpkg-source: info: unpacking accountsservice_0.6.21-6.debian.tar.gz
dpkg-source: info: applying 0001-formats-locale-property.patch
dpkg-source: info: applying 
0002-create-and-manage-groups-like-on-a-ubuntu-system.patch
dpkg-source: info: applying 0005-gdm_config_file_path_ubuntu.patch
dpkg-source: info: applying 0006-adduser_instead_of_useradd.patch
dpkg-source: info: applying 0007-add-lightdm-support.patch
dpkg-source: info: applying 0008-nopasswdlogin-group.patch
dpkg-source: info: applying 0009-language-tools.patch
dpkg-source: info: applying 0010-set-language.patch
patching file src/user.c
Hunk #1 FAILED at 114.
Hunk #2 succeeded at 1852 (offset 1659 lines).
Hunk #3 FAILED at 1091.
Hunk #4 FAILED at 1098.
Hunk #5 FAILED at .
Hunk #6 FAILED at 1162.
Hunk #7 FAILED at 1175.
6 out of 7 hunks FAILED -- saving rejects to file src/user.c.rej
dpkg-source: error: LC_ALL=C patch -t -F 0 -N -p1 -u -V never -g0 -E -b -B 
.pc/0010-set-language.patch/  
accountsservice-0.6.21/debian/patches/0010-set-language.patch gave error exit 
status 1

Best,
Michael



pgpaBw3OFrgou.pgp
Description: PGP signature


Processed: bug 680806 is forwarded to http://rt.cpan.org/Public/Bug/Display.html?id=78891

2012-08-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 forwarded 680806 http://rt.cpan.org/Public/Bug/Display.html?id=78891
Bug #680806 [src:libio-async-loop-glib-perl] libio-async-loop-glib-perl: FTBFS: 
tests failed
Set Bug forwarded-to-address to 
'http://rt.cpan.org/Public/Bug/Display.html?id=78891'.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
680806: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680806
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#684463: condor fails to install if condor user already exists

2012-08-10 Thread Evgeni Golov
Hi,

On Fri, Aug 10, 2012 at 10:30:36AM +0200, Tiziano Zito wrote:
 Package: condor
 Version: 7.8.1~dfsg.1-1~nd12.04+1

Where does this version come from?
Debian has 7.8.1~dfsg.1-2 in Wheezy and Sid.

 when I try to install condor on a machine where the condor user already 
 exists (either
 because the machine uses LDAP authentication and condor user is in
 LDAP or because I am just re-installing or upgrading condor), the
 configuration step fails with:
 
 Setting up condor (7.8.1~dfsg.1-1~nd60+1) ...
 adduser: The user `condor' already exists. Exiting.
 dpkg: error processing condor (--configure):
  subprocess installed post-installation script returned error exit status 1

This does not happen with 7.8.1~dfsg.1-2 on my machine.
The user is created once and then adduser silently ignores the calls 
because of the --system switch.

 this happens on squeeze, wheezy and ubuntu precise...

Squeeze and Precise do not even have a condor package...

I would close the bug as non-existing, but awaiting your reply first.

Regards
Evgeni


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: bug 680790 is forwarded to http://rt.cpan.org/Public/Bug/Display.html?id=78892

2012-08-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 forwarded 680790 http://rt.cpan.org/Public/Bug/Display.html?id=78892
Bug #680790 [src:libio-async-loop-epoll-perl] libio-async-loop-epoll-perl: 
FTBFS: tests failed
Set Bug forwarded-to-address to 
'http://rt.cpan.org/Public/Bug/Display.html?id=78892'.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
680790: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680790
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#680790: Update for libio-async-loop-*-perl bugs

2012-08-10 Thread gregor herrmann
1) I've forwarded both bug reports upstream now.
2) Both packages have no reverse (build) dependencies and a low
   popcon, so removing them from wheezy would be no desaster.

Cheers,
gregor

-- 
 .''`.  Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06
 : :' : Debian GNU/Linux user, admin, and developer  -  http://www.debian.org/
 `. `'  Member of VIBE!AT  SPI, fellow of the Free Software Foundation Europe
   `-   NP: Bob Dylan: Lonesome Day Blues


signature.asc
Description: Digital signature


Bug#684463: condor fails to install if condor user already exists

2012-08-10 Thread Evgeni Golov
On Fri, Aug 10, 2012 at 05:41:21PM +0200, Evgeni Golov wrote:
 Hi,
 
 On Fri, Aug 10, 2012 at 10:30:36AM +0200, Tiziano Zito wrote:
  Package: condor
  Version: 7.8.1~dfsg.1-1~nd12.04+1
 
 Where does this version come from?
 Debian has 7.8.1~dfsg.1-2 in Wheezy and Sid.

It seems to come from http://neuro.debian.net and to be a backport of 
7.8.1~dfsg.1-1.
It has the very same postinst script as the Debian version and it should 
really not fail. Unless the user is not a system user.

Is your condor user a regular LDAP user?

-- 
Bruce Schneier can read and understand Perl programs.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#684454: ruby-actionpack-3.2: CVE-2012-3463 / CVE-2012-3464 / CVE-2012-3465

2012-08-10 Thread Antonio Terceiro
clone 684454 -1
reassign -1 ruby-activesupport-3.2
retitle -1 ruby-activesupport-3.2: CVE-2012-3464
thanks

Moritz Muehlenhoff escreveu isso aí:
 Package: ruby-actionpack-3.2
 Severity: grave
 Tags: security
 Justification: user security hole
 
 Please see
 
 CVE-2012-3465
 http://www.openwall.com/lists/oss-security/2012/08/09/9
 
 
 CVE-2012-3464
 http://www.openwall.com/lists/oss-security/2012/08/09/10
 
 
 CVE-2012-3463
 http://www.openwall.com/lists/oss-security/2012/08/09/8
 
 Since Wheezy is frozen, please use the isolated patches instead of updating to
 3.2.8

the patch for CVE-2012-3464 has to be split between ruby-actionpack-3.2
and ruby-activesupport-3.2.

I am working on this, expect uploads RSN.

-- 
Antonio Terceiro terce...@debian.org


signature.asc
Description: Digital signature


Processed: Bug#684454: ruby-actionpack-3.2: CVE-2012-3463 / CVE-2012-3464 / CVE-2012-3465

2012-08-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 clone 684454 -1
Bug #684454 [ruby-actionpack-3.2] ruby-actionpack-3.2: CVE-2012-3463 / 
CVE-2012-3464 / CVE-2012-3465
Bug 684454 cloned as bug 684517
 reassign -1 ruby-activesupport-3.2
Bug #684517 [ruby-actionpack-3.2] ruby-actionpack-3.2: CVE-2012-3463 / 
CVE-2012-3464 / CVE-2012-3465
Bug reassigned from package 'ruby-actionpack-3.2' to 'ruby-activesupport-3.2'.
Ignoring request to alter found versions of bug #684517 to the same values 
previously set
Ignoring request to alter fixed versions of bug #684517 to the same values 
previously set
 retitle -1 ruby-activesupport-3.2: CVE-2012-3464
Bug #684517 [ruby-activesupport-3.2] ruby-actionpack-3.2: CVE-2012-3463 / 
CVE-2012-3464 / CVE-2012-3465
Changed Bug title to 'ruby-activesupport-3.2: CVE-2012-3464' from 
'ruby-actionpack-3.2: CVE-2012-3463 / CVE-2012-3464 / CVE-2012-3465'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
684454: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684454
684517: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684517
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: severity of 682034 is grave

2012-08-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 682034 grave
Bug #682034 [src:python2.7] Add Breaks  2:7.3.547-4 for 
vim-{nox,gtk,gnome,athena}
Severity set to 'grave' from 'important'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
682034: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=682034
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#682034: Bug#681599: vim/python2.7: symbol lookup error: vim: undefined symbol: init_hashlib

2012-08-10 Thread Scott Kitterman
On Tuesday, July 24, 2012 06:52:13 AM James McCoy wrote:
 On Wed, Jul 18, 2012 at 09:35:28AM +0200, Jakub Wilk wrote:
  Plan B
  ==
  In any order:
  - Fix vim build not to link config.c into the binary. (I attached a
  proposed patch.)
 
 I've uploaded Vim 2:7.3.547-4.
 
  - Fix python2.7 symbols. Add Breaks for each provider of vim-python.
 
 Please add Breaks for vim-nox, vim-athena, vim-gtk, and vim-gnome
 accordingly in your next python2.7 upload.

This is more than just breaks, it's also identifying the changes that caused 
the symbol issues and getting them resolved.  Bumped to grave since this 
breaks other packages.

Scott K

signature.asc
Description: This is a digitally signed message part.


Bug#684454: marked as done (ruby-actionpack-3.2: CVE-2012-3463 / CVE-2012-3464 / CVE-2012-3465)

2012-08-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Aug 2012 17:32:14 +
with message-id e1szt4i-0003je...@franck.debian.org
and subject line Bug#684454: fixed in ruby-actionpack-3.2 3.2.6-4
has caused the Debian Bug report #684454,
regarding ruby-actionpack-3.2: CVE-2012-3463 / CVE-2012-3464 / CVE-2012-3465
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
684454: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684454
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: ruby-actionpack-3.2
Severity: grave
Tags: security
Justification: user security hole

Please see

CVE-2012-3465
http://www.openwall.com/lists/oss-security/2012/08/09/9


CVE-2012-3464
http://www.openwall.com/lists/oss-security/2012/08/09/10


CVE-2012-3463
http://www.openwall.com/lists/oss-security/2012/08/09/8

Since Wheezy is frozen, please use the isolated patches instead of updating to
3.2.8


Cheers,
Moritz
---End Message---
---BeginMessage---
Source: ruby-actionpack-3.2
Source-Version: 3.2.6-4

We believe that the bug you reported is fixed in the latest version of
ruby-actionpack-3.2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 684...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Antonio Terceiro terce...@debian.org (supplier of updated ruby-actionpack-3.2 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Fri, 10 Aug 2012 13:08:08 -0300
Source: ruby-actionpack-3.2
Binary: ruby-actionpack-3.2
Architecture: source all
Version: 3.2.6-4
Distribution: unstable
Urgency: high
Maintainer: Debian Ruby Extras Maintainers 
pkg-ruby-extras-maintain...@lists.alioth.debian.org
Changed-By: Antonio Terceiro terce...@debian.org
Description: 
 ruby-actionpack-3.2 - web-flow and rendering framework putting the VC in MVC 
(part of R
Closes: 684454
Changes: 
 ruby-actionpack-3.2 (3.2.6-4) unstable; urgency=high
 .
   * Add patches for security problems (Closes: #684454):
 + CVE-2012-3463 - Ruby on Rails Potential XSS Vulnerability in select_tag
   prompt
 + CVE-2012-3465 - XSS Vulnerability in strip_tags
 + Both patches were edited from their original versions in two ways:
   - the leading a/ and b/ from the filenames were stripped
   - changes over test files were removed, since the Debian package
 contains no test files.
Checksums-Sha1: 
 38d9541007135c215ea4a6c3de5517638d33e6e8 1683 ruby-actionpack-3.2_3.2.6-4.dsc
 c598b0bc82b33735f7061846ebee54a212eb2808 4307 
ruby-actionpack-3.2_3.2.6-4.debian.tar.gz
 d1ecf1fe0596cc5e714a28fd9e93c4dd5dd3f85f 387618 
ruby-actionpack-3.2_3.2.6-4_all.deb
Checksums-Sha256: 
 f110bcba58e48a2aad548830c892d661c63113fb5a1c5b182d9741dfd66fc697 1683 
ruby-actionpack-3.2_3.2.6-4.dsc
 2e1266853a1ffd22e456bbad283b0fdcf1eb04b1f1b92fe9f863f164b588844a 4307 
ruby-actionpack-3.2_3.2.6-4.debian.tar.gz
 c5bd73bbf085d8059fb3ff4459d19aa97380aa0a6ae9442f41184ec27aaa0d21 387618 
ruby-actionpack-3.2_3.2.6-4_all.deb
Files: 
 d1b71c00580f03e8d8bd9c9140d0a51a 1683 ruby optional 
ruby-actionpack-3.2_3.2.6-4.dsc
 9baaa0b914285aef6f15de0c52ad78a5 4307 ruby optional 
ruby-actionpack-3.2_3.2.6-4.debian.tar.gz
 5029f55804c25a69d7fcf345d1439a8b 387618 ruby optional 
ruby-actionpack-3.2_3.2.6-4_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlAlQtMACgkQDOM8kQ+cso8q3QCdGRsTvclVtO4dTxFfFgKxDZol
AQwAnj3QNOWjvuluYm/xKviLrlpZZSLG
=ZyG4
-END PGP SIGNATUREEnd Message---


Bug#684517: marked as done (ruby-activesupport-3.2: CVE-2012-3464)

2012-08-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Aug 2012 17:47:10 +
with message-id e1sztik-0004kk...@franck.debian.org
and subject line Bug#684517: fixed in ruby-activesupport-3.2 3.2.6-4
has caused the Debian Bug report #684517,
regarding ruby-activesupport-3.2: CVE-2012-3464
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
684517: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684517
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: ruby-actionpack-3.2
Severity: grave
Tags: security
Justification: user security hole

Please see

CVE-2012-3465
http://www.openwall.com/lists/oss-security/2012/08/09/9


CVE-2012-3464
http://www.openwall.com/lists/oss-security/2012/08/09/10


CVE-2012-3463
http://www.openwall.com/lists/oss-security/2012/08/09/8

Since Wheezy is frozen, please use the isolated patches instead of updating to
3.2.8


Cheers,
Moritz
---End Message---
---BeginMessage---
Source: ruby-activesupport-3.2
Source-Version: 3.2.6-4

We believe that the bug you reported is fixed in the latest version of
ruby-activesupport-3.2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 684...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Antonio Terceiro terce...@debian.org (supplier of updated 
ruby-activesupport-3.2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Fri, 10 Aug 2012 14:10:41 -0300
Source: ruby-activesupport-3.2
Binary: ruby-activesupport-3.2
Architecture: source all
Version: 3.2.6-4
Distribution: unstable
Urgency: high
Maintainer: Debian Ruby Extras Maintainers 
pkg-ruby-extras-maintain...@lists.alioth.debian.org
Changed-By: Antonio Terceiro terce...@debian.org
Description: 
 ruby-activesupport-3.2 - Support and utility classes used by the Rails 3.2 
framework
Closes: 684517
Changes: 
 ruby-activesupport-3.2 (3.2.6-4) unstable; urgency=high
 .
   * debian/patches/CVE-2012-3464.patch: fixes potential XSS vulnerability.
 CVE-2012-3464 (Closes: #684517).
Checksums-Sha1: 
 b14ea6293b9c2a1c0b826206509e7f905a81e22e 1601 
ruby-activesupport-3.2_3.2.6-4.dsc
 9d2789a1a12d777c8be2b495d33f5ef461f5e31d 3182 
ruby-activesupport-3.2_3.2.6-4.debian.tar.gz
 863542bd6a399a9b0c295dc4728ad0782bd21e27 322474 
ruby-activesupport-3.2_3.2.6-4_all.deb
Checksums-Sha256: 
 41dfc5cd1a23c4845ed0fe72f4cba6bca495ceb342c9ef7e2eb97357d06d5cce 1601 
ruby-activesupport-3.2_3.2.6-4.dsc
 602a5dd2eaac99b170af8dd44acdec3e41447fce8a2c93f24e69dd42adddf837 3182 
ruby-activesupport-3.2_3.2.6-4.debian.tar.gz
 3d5c9b1dfdb6103c01011b4185682d9a6670721e20eea706e20bd7b483780af6 322474 
ruby-activesupport-3.2_3.2.6-4_all.deb
Files: 
 333db4118671642ea143f9fb81e5fb20 1601 ruby optional 
ruby-activesupport-3.2_3.2.6-4.dsc
 790bafee9f67372b209e4cb8f2f577ab 3182 ruby optional 
ruby-activesupport-3.2_3.2.6-4.debian.tar.gz
 5f171c36977fbd3be310f101b14430cb 322474 ruby optional 
ruby-activesupport-3.2_3.2.6-4_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlAlRMQACgkQDOM8kQ+cso+uuACbBtv+U7rLt50jpL9uvwcHoxqn
yIMAn3V3m88Ut8zYwAdKkife40b6lbG9
=uAXT
-END PGP SIGNATUREEnd Message---


Bug#684463: condor fails to install if condor user already exists

2012-08-10 Thread Tiziano Zito
   Package: condor
   Version: 7.8.1~dfsg.1-1~nd12.04+1
  
  Where does this version come from?
  Debian has 7.8.1~dfsg.1-2 in Wheezy and Sid.
 
 It seems to come from http://neuro.debian.net and to be a backport of 
 7.8.1~dfsg.1-1.

Sorry for not mentioning it, I quickly checked on two different
machines, but both were using the neuro.debian repos... 

 It has the very same postinst script as the Debian version and it should 
 really not fail. Unless the user is not a system user.
 
 Is your condor user a regular LDAP user?

Yes, it has  UID  1000 as suggested by pam_ldap. Why should the
condor user be a system user? for one, it requires a valid email
address if you want email sent by condor not being tagged as SPAM by
overzealous SPAM filters. And if you use LDAP for authentication you
typically use it for email too, so the condor user naturally fits as
a non-system LDAP user. Couldn't this check be lifted altogether, or
at least give the possibility to set UID and GID of the condor user
on installation? 

Thank you for your quick reply!

Tiziano


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#681680: mediathekview: finds only 1376 out of 57537 movies

2012-08-10 Thread Markus Koschany
Here is a short summary what has happened so far.

-   I built mediathekview-3.0.0 successfully on Sid
-   Now i am trying to improve the package and i am doing some
tests
-   I am in contact with the upstream developer of mediathekview
who is responsive and helpful.
-   He is even working on a patch which adresses this bug report. I
will try it out at the weekend and report back.




signature.asc
Description: OpenPGP digital signature


Bug#684463: condor fails to install if condor user already exists

2012-08-10 Thread Evgeni Golov
Hi,

On Fri, Aug 10, 2012 at 08:07:28PM +0200, Tiziano Zito wrote:
Package: condor
Version: 7.8.1~dfsg.1-1~nd12.04+1
   
   Where does this version come from?
   Debian has 7.8.1~dfsg.1-2 in Wheezy and Sid.
  
  It seems to come from http://neuro.debian.net and to be a backport of 
  7.8.1~dfsg.1-1.
 
 Sorry for not mentioning it, I quickly checked on two different
 machines, but both were using the neuro.debian repos... 

About which you theoreticaly should not fill bugs into the Debian BTS, 
as these aren't Debian packages. But given these are rebuilds only, lets 
see what we can do for you :)
[ condor maintainer might disagree here ]

  It has the very same postinst script as the Debian version and it should 
  really not fail. Unless the user is not a system user.
  
  Is your condor user a regular LDAP user?
 
 Yes, it has  UID  1000 as suggested by pam_ldap. Why should the
 condor user be a system user? for one, it requires a valid email
 address if you want email sent by condor not being tagged as SPAM by
 overzealous SPAM filters. And if you use LDAP for authentication you
 typically use it for email too, so the condor user naturally fits as
 a non-system LDAP user. Couldn't this check be lifted altogether, or
 at least give the possibility to set UID and GID of the condor user
 on installation? 

Well, users created for packages should be created as system users.
No idea how the fact of being a system user might play into your spam 
issue.
I have little clue about LDAP and no clue about condor (just stumbled 
over the bug while RC-bughunting), but I would say you should not have a 
condor user in your LDAP and let it be a lonely local user created by 
adduser.
If you want condor@host to work, add an alias or something.

However, these are my two cheap cents, maintainers might disagree here.

-- 
Bruce Schneier can read and understand Perl programs.


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#677054: nut-client: prompting due to modified conffiles which were not modified by the user

2012-08-10 Thread Laurent Bigonville
Hi,

I'm tempted to close that bug as WONTFIX.

The original issue is IMHO that the post-install script is modifying
nut.conf in the version present in squeeze (see #684392).

I see no easy way (not involving a dirty hack[0]) to fix this.

Moreover it's very unlikely that the user has NOT modified that file
himself already, as it controls which daemon should be started on the
system.

Cheers

Laurent Bigonville

[0] The dirty hack would involve trying to undo the change made by the
postinst script of the squeeze version in the preinst script.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#684527: openssl: CVE-2011-5095 - The remote SSL/TLS server accepts a weak Diffie-Hellman public value

2012-08-10 Thread Arne Wichmann
Package: openssl
Version: 0.9.8o-4squeeze13
Severity: grave
Tags: security
Justification: user security hole

openssl in squeeze (at least up to 0.9.8o-4squeeze13) is vulnerable to
CVE-2011-5095 [1]. For reference you might have a look at [2] - the problem
seems to be that fips/dh/fips_dh_key.c does not incorporate a fix in
crypto/dh/dh_key.c, namely calling DH_check_pub_key, like in [3].

As far as I can see the problem is gone in 1.0.1c - but I leave this bug
open for unstable/testing so that it can be doublechecked by someone more
versed in openssl.

[1] http://security-tracker.debian.org/tracker/CVE-2011-5095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5095
[2] http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-5095.html
[3] http://cvs.openssl.org/chngview?cn=14375

cu

AW

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'stable'), (50, 'unstable'), (40, 
'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.23 (SMP w/2 CPU cores; PREEMPT)
Locale: LANG=C, LC_CTYPE=de_DE (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/dash

Versions of packages openssl depends on:
ii  libc62.13-33
ii  libssl1.0.0  1.0.1c-3
ii  zlib1g   1:1.2.7.dfsg-13

openssl recommends no packages.

Versions of packages openssl suggests:
ii  ca-certificates  20120623

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#680814: marked as done (conduit: FTBFS: unable to parse es/conduit.xml)

2012-08-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Aug 2012 19:32:09 +
with message-id e1szuwl-0008eh...@franck.debian.org
and subject line Bug#680814: fixed in conduit 0.3.17-1.1
has caused the Debian Bug report #680814,
regarding conduit: FTBFS: unable to parse es/conduit.xml
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
680814: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680814
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Source: conduit
Version: 0.3.17-1
Severity: serious
Tags: wheezy sid
User: debian...@lists.debian.org
Usertags: qa-ftbfs-20120708 qa-ftbfs
Justification: FTBFS on amd64

Hi,

During a rebuild of all packages in sid, your package failed to build on
amd64.

Relevant part:
 make[2]: Entering directory `/«PKGBUILDDIR»/help'
 xsltproc -o conduit-C.omf --stringparam db2omf.basename conduit --stringparam 
 db2omf.format 'docbook' --stringparam db2omf.dtd -//OASIS//DTD DocBook XML 
 V4.1.2//EN --stringparam db2omf.lang C --stringparam db2omf.omf_dir 
 /usr/share/omf --stringparam db2omf.help_dir /usr/share/gnome/help 
 --stringparam db2omf.omf_in /«PKGBUILDDIR»/help/conduit.omf.in  
 `/usr/bin/pkg-config --variable db2omf gnome-doc-utils` C/conduit.xml || { rm 
 -f conduit-C.omf; exit 1; }
 xsltproc -o conduit-de.omf --stringparam db2omf.basename conduit 
 --stringparam db2omf.format 'docbook' --stringparam db2omf.dtd -//OASIS//DTD 
 DocBook XML V4.1.2//EN --stringparam db2omf.lang de --stringparam 
 db2omf.omf_dir /usr/share/omf --stringparam db2omf.help_dir 
 /usr/share/gnome/help --stringparam db2omf.omf_in 
 /«PKGBUILDDIR»/help/conduit.omf.in  `/usr/bin/pkg-config --variable db2omf 
 gnome-doc-utils` de/conduit.xml || { rm -f conduit-de.omf; exit 1; }
 xsltproc -o conduit-el.omf --stringparam db2omf.basename conduit 
 --stringparam db2omf.format 'docbook' --stringparam db2omf.dtd -//OASIS//DTD 
 DocBook XML V4.1.2//EN --stringparam db2omf.lang el --stringparam 
 db2omf.omf_dir /usr/share/omf --stringparam db2omf.help_dir 
 /usr/share/gnome/help --stringparam db2omf.omf_in 
 /«PKGBUILDDIR»/help/conduit.omf.in  `/usr/bin/pkg-config --variable db2omf 
 gnome-doc-utils` el/conduit.xml || { rm -f conduit-el.omf; exit 1; }
 xsltproc -o conduit-es.omf --stringparam db2omf.basename conduit 
 --stringparam db2omf.format 'docbook' --stringparam db2omf.dtd -//OASIS//DTD 
 DocBook XML V4.1.2//EN --stringparam db2omf.lang es --stringparam 
 db2omf.omf_dir /usr/share/omf --stringparam db2omf.help_dir 
 /usr/share/gnome/help --stringparam db2omf.omf_in 
 /«PKGBUILDDIR»/help/conduit.omf.in  `/usr/bin/pkg-config --variable db2omf 
 gnome-doc-utils` es/conduit.xml || { rm -f conduit-es.omf; exit 1; }
 http://www.oasis-open.org/docbook/xml/4.1.2/dbhierx.mod:115: parser warning : 
 PEReference: %list.class; not found
   %local.divcomponent.mix;
^
 http://www.oasis-open.org/docbook/xml/4.1.2/dbhierx.mod:115: parser warning : 
 PEReference: %admon.class; not found
   %local.divcomponent.mix;
^
 http://www.oasis-open.org/docbook/xml/4.1.2/dbhierx.mod:115: parser warning : 
 PEReference: %linespecific.class; not found
   %local.divcomponent.mix;
^
 http://www.oasis-open.org/docbook/xml/4.1.2/dbhierx.mod:115: parser warning : 
 PEReference: %synop.class; not found
   %local.divcomponent.mix;
^
 http://www.oasis-open.org/docbook/xml/4.1.2/dbhierx.mod:115: parser warning : 
 PEReference: %para.class; not found
   %local.divcomponent.mix;
^
 http://www.oasis-open.org/docbook/xml/4.1.2/dbhierx.mod:115: parser warning : 
 PEReference: %informal.class; not found
   %local.divcomponent.mix;
^
 http://www.oasis-open.org/docbook/xml/4.1.2/dbhierx.mod:115: parser warning : 
 PEReference: %formal.class; not found
   %local.divcomponent.mix;
^
 http://www.oasis-open.org/docbook/xml/4.1.2/dbhierx.mod:115: parser warning : 
 PEReference: %compound.class; not found
   %local.divcomponent.mix;
^
 http://www.oasis-open.org/docbook/xml/4.1.2/dbhierx.mod:115: parser warning : 
 PEReference: %genobj.class; not found
   %local.divcomponent.mix;
^
 http://www.oasis-open.org/docbook/xml/4.1.2/dbhierx.mod:115: parser warning : 
 PEReference: %descobj.class; not found
   

Bug#684528: elfutils: FTBFS with new dpkg-buildpackage due to build-arch split

2012-08-10 Thread Adam Conrad
Package: elfutils
Version: 0.153-1
Severity: serious
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu quantal ubuntu-patch


Due to a slight thinko (I assume), your build-arch/build-indep split
leads elfutils to FTBFS with the new dpkg-buildpackage, which calls
build-arch for arch-only builds.  I uploaded the attached patch to
Ubuntu, with the following changelog entry to resolve this:

  * Fix build-arch and build-indep targets to not require root.


I think this follows the spirit of what you were trying to achieve,
while making sure that the install target is only a dependency of
targets that require root (ie: the binary* targets).

... Adam


-- System Information:
Debian Release: wheezy/sid
  APT prefers precise-updates
  APT policy: (500, 'precise-updates'), (500, 'precise-security'), (500, 
'precise')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-27-generic (SMP w/4 CPU cores)
Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -Nru elfutils-0.153/debian/rules elfutils-0.153/debian/rules
--- elfutils-0.153/debian/rules	2012-02-24 16:01:45.0 -0700
+++ elfutils-0.153/debian/rules	2012-08-10 13:16:08.0 -0600
@@ -87,12 +87,13 @@
 	rm debian/tmp/usr/include/elfutils/libebl.h
 
 # Build architecture-independent files here.
-build-indep: build install
-binary-indep: build-indep
+build-indep: build
+binary-indep: build-indep install
 # We have nothing to do.
 
 # Build architecture-dependent files here.
-build-arch: build install
+build-arch: build
+binary-arch: build-arch install
 	dh_testdir
 	dh_testroot
 	dh_installchangelogs ChangeLog
@@ -113,7 +114,6 @@
 	dh_md5sums
 	dh_builddeb
 
-binary-arch: build-arch
 binary: binary-indep binary-arch
 
 maint-unpatch:


Processed: severity of 658702 is serious

2012-08-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 # breaks upgrades from squeeze
 severity 658702 serious
Bug #658702 [libxml-sax-perl] libxml-sax-perl: update-perl-sax-parsers 
sometimes fails when called from old-prerm during squeeze-wheezy update
Severity set to 'serious' from 'normal'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
658702: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=658702
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: severity of 658702 is normal

2012-08-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 # no, ignore me, the new prerm script does not have this problem
 severity 658702 normal
Bug #658702 [libxml-sax-perl] libxml-sax-perl: update-perl-sax-parsers 
sometimes fails when called from old-prerm during squeeze-wheezy update
Severity set to 'normal' from 'serious'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
658702: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=658702
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#684528: elfutils: FTBFS with new dpkg-buildpackage due to build-arch split

2012-08-10 Thread Kurt Roeckx
On Fri, Aug 10, 2012 at 01:34:39PM -0600, Adam Conrad wrote:
 Package: elfutils
 Version: 0.153-1
 Severity: serious
 Tags: patch
 User: ubuntu-de...@lists.ubuntu.com
 Usertags: origin-ubuntu quantal ubuntu-patch
 
 
 Due to a slight thinko (I assume), your build-arch/build-indep split
 leads elfutils to FTBFS with the new dpkg-buildpackage, which calls
 build-arch for arch-only builds.  I uploaded the attached patch to
 Ubuntu, with the following changelog entry to resolve this:
 
   * Fix build-arch and build-indep targets to not require root.
 
 
 I think this follows the spirit of what you were trying to achieve,
 while making sure that the install target is only a dependency of
 targets that require root (ie: the binary* targets).

So that change was part of the patch I got in #657139, and 
0.152-1 (in testing) has things differently.  Looking more
carefully at the patch I applied, it doesn't make much sense.

So I think testing is not affected.  Testing it against
the 0.153-1 version I can reproduce it.

But the version in testing actually fails with an other error.


Kurt


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#684527: [Pkg-openssl-devel] Bug#684527: openssl: CVE-2011-5095 - The remote SSL/TLS server accepts a weak Diffie-Hellman public value

2012-08-10 Thread Kurt Roeckx
On Fri, Aug 10, 2012 at 09:12:14PM +0200, Arne Wichmann wrote:
 Package: openssl
 Version: 0.9.8o-4squeeze13
 Severity: grave
 Tags: security
 Justification: user security hole
 
 openssl in squeeze (at least up to 0.9.8o-4squeeze13) is vulnerable to
 CVE-2011-5095 [1]. For reference you might have a look at [2] - the problem
 seems to be that fips/dh/fips_dh_key.c does not incorporate a fix in
 crypto/dh/dh_key.c, namely calling DH_check_pub_key, like in [3].

This doesn't make any sense at all.  This is a bug fixed in 0.9.8a
in 2005.

It only seem to be relavant for the fips version, which we never
had.  Unless someone can tell me why you think this affects
anything in Debian, I'm just going to close it.


Kurt

 As far as I can see the problem is gone in 1.0.1c - but I leave this bug
 open for unstable/testing so that it can be doublechecked by someone more
 versed in openssl.

This doesn't make sense at all.  You file it against the version
in stable, but the version tracking will say this only affects
stable because the version in testing/unstable is not based on
the version in stable, they split at 0.9.8o-4.  If you want to
have this bug affect all versions you should have filed this
against the 0.9.8o-4 version.

Also, everything seems to indicate that 1.0 isn't affected at all.


Kurt


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#683288: rt-authen-externalauth: privilege escalation

2012-08-10 Thread Tom Jampen
tag 683288 pending
thanks

On 30.07.2012 16:55, Yves-Alexis Perez wrote:
 For Wheezy, please fix this  with an isolated fix instead of updating to a
 new upstream release (since the freeze is in effect)

Fixed in git.
Tom


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#684531: FTBFS: unknown type name bool

2012-08-10 Thread Michael Tautschnig
Package: cde
Version: 0.1-1
Severity: serious

In a recent local rebuild, your package failed to build in a wheezy build
environment:

Making all in tests
make[4]: Entering directory `/root/build/cde/cde-0.1/strace-4.6/tests'
make[4]: Nothing to be done for `all'.
make[4]: Leaving directory `/root/build/cde/cde-0.1/strace-4.6/tests'
make[4]: Entering directory `/root/build/cde/cde-0.1/strace-4.6'
source='strace.c' object='strace.o' libtool=no \
DEPDIR=.deps depmode=gcc /bin/bash ./depcomp \
gcc -DHAVE_CONFIG_H -I.  -I./linux/x86_64 -I./linux -I./linux  -Wall 
-Wwrite-strings -Wl,--hash-style=both  -g -O2 -fno-stack-protector 
-U_FORTIFY_SOURCE -D_GNU_SOURCE  -c strace.c
strace.c:128:1: error: unknown type name 'bool'
strace.c: In function 'main':
strace.c:836:9: warning: unused variable 'pid' [-Wunused-variable]
strace.c: In function 'trace':
strace.c:2792:15: warning: unused variable 'si' [-Wunused-variable]


It seems that strace.c lacks a #include stdbool.h.

Best,
Michael



pgpV8L2FUarrO.pgp
Description: PGP signature


Bug#684423: marked as done (live-tools: Broken link ( /usr/sbin/update-initramfs - ../bin/live-update-initramfs ))

2012-08-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Aug 2012 21:02:46 +
with message-id e1szwm2-0008tf...@franck.debian.org
and subject line Bug#684423: fixed in live-tools 3.0.8-1
has caused the Debian Bug report #684423,
regarding live-tools: Broken link ( /usr/sbin/update-initramfs - 
../bin/live-update-initramfs )
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
684423: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684423
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: live-tools
Version: 3.0.7-1
Severity: important

Dear Maintainer,

live-tools is shipped with broken link
/usr/sbin/update-initramfs - ../bin/live-update-initramf
which break an automatic initrd images generation and update.

Changing the link to
/usr/sbin/update-initramfs - /bin/live-update-initramf
restores lost functionality.

Best regards,
Viktor Malyarchuk


-- System Information:
Debian Release: wheezy/sid
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'unstable'), (500, 'testing'), 
(500, 'stable'), (101, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 3.5.0+ (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages live-tools depends on:
ii  initramfs-tools  0.107
ii  procps   1:3.3.3-2

live-tools recommends no packages.

Versions of packages live-tools suggests:
ii  debian-installer-launcher  13
ii  perl   5.14.2-12
ii  rsync  3.0.9-3

-- no debconf information
---End Message---
---BeginMessage---
Source: live-tools
Source-Version: 3.0.8-1

We believe that the bug you reported is fixed in the latest version of
live-tools, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 684...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Daniel Baumann dan...@debian.org (supplier of updated live-tools package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Fri, 10 Aug 2012 22:27:08 +0200
Source: live-tools
Binary: live-tools
Architecture: source all
Version: 3.0.8-1
Distribution: unstable
Urgency: low
Maintainer: Debian Live Project debian-l...@lists.debian.org
Changed-By: Daniel Baumann dan...@debian.org
Description: 
 live-tools - Debian Live - System Support Scripts
Closes: 684423
Changes: 
 live-tools (3.0.8-1) unstable; urgency=low
 .
   * Moving symlink from /usr/bin to /bin where live-update-initramfs
 actually resides now (Closes: #684423).
Checksums-Sha1: 
 f7db7abd1b40b1d1dc100f6c7e89fdb21229d991 1259 live-tools_3.0.8-1.dsc
 9350c04ac5602c973bad7a6c39bb49d5f5502df3 19104 live-tools_3.0.8.orig.tar.xz
 9316ef2658fe80d17dd19716b9e6de41eae9cc46 3956 live-tools_3.0.8-1.debian.tar.xz
 a8b7352146e60b94c8b5bc77af4852260bdc259f 11970 live-tools_3.0.8-1_all.deb
Checksums-Sha256: 
 372fc76f197e66020c381bf158831cd8bfe813347bf5d78a34110bf9ce36bc15 1259 
live-tools_3.0.8-1.dsc
 2947f8ca1874220cb65f2fe45bac06d2a12cf60c958ee68c9a535b2de4580603 19104 
live-tools_3.0.8.orig.tar.xz
 a10aed0eb7b0fdfd6e787ebf281f2636a7e71be764105503154cf5fc607da2dd 3956 
live-tools_3.0.8-1.debian.tar.xz
 5cfa2d5ff0da47175c5f619afd53fe02cf53d9efd1f3b68798a00d54c1672e00 11970 
live-tools_3.0.8-1_all.deb
Files: 
 b2f05343cf35134bd30b6b7efacb8ed7 1259 misc optional live-tools_3.0.8-1.dsc
 e6ac8987a622bf6d4c0ab1aab53a5a09 19104 misc optional 
live-tools_3.0.8.orig.tar.xz
 dd02b857e5939deef93a9afac7d1d7c7 3956 misc optional 
live-tools_3.0.8-1.debian.tar.xz
 140b2ecdf73f6b253db0e84356975b80 11970 misc optional live-tools_3.0.8-1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAlAlcGUACgkQ+C5cwEsrK56PIwCfR0UGZjx9NQW2Q8t3VghJDfsC
DiAAn3z9HGaMtgGjpG4NAT4AvK5Wy8RC
=k/Yd
-END PGP SIGNATUREEnd Message---


Bug#684456: marked as done (qpid-cpp: CVE-2012-3467)

2012-08-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Aug 2012 21:03:03 +
with message-id e1szwmj-6q...@franck.debian.org
and subject line Bug#684456: fixed in qpid-cpp 0.16-7
has caused the Debian Bug report #684456,
regarding qpid-cpp: CVE-2012-3467
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
684456: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684456
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: qpid-cpp
Severity: grave
Tags: security
Justification: user security hole

Please see http://www.openwall.com/lists/oss-security/2012/08/09/6

Since we're in freeze, please fix this with an isolated patch.

Cheers,
Moritz
---End Message---
---BeginMessage---
Source: qpid-cpp
Source-Version: 0.16-7

We believe that the bug you reported is fixed in the latest version of
qpid-cpp, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 684...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Cajus Pollmeier ca...@debian.org (supplier of updated qpid-cpp package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Fri, 10 Aug 2012 20:39:06 +0200
Source: qpid-cpp
Binary: qpidd qpid-client libqmf1 libqmf-dev libqmf2-1 libqmf2-dev 
libqmfconsole2 libqmfconsole2-dev libqpidmessaging2 libqpidmessaging2-dev 
libsslcommon2 libsslcommon2-dev librdmawrap2 librdmawrap2-dev libqpidtypes1 
libqpidtypes1-dev libqpidcommon2 libqpidcommon2-dev libqpidclient2 
libqpidclient2-dev libqpidbroker2 libqpidbroker2-dev libqmfengine1 
libqmfengine1-dev python-cqpid python-qmf2 python-cqmf2 python-qmf qmfgen 
qpid-doc ruby-qpid libqpid-ruby1.8 libqpid-perl
Architecture: source amd64 all
Version: 0.16-7
Distribution: unstable
Urgency: low
Maintainer: Cajus Pollmeier ca...@debian.org
Changed-By: Cajus Pollmeier ca...@debian.org
Description: 
 libqmf-dev - enterprise messaging system - QMF development files
 libqmf1- enterprise messaging system - QMF libraries
 libqmf2-1  - enterprise messaging system - QMF2 libraries
 libqmf2-dev - enterprise messaging system - QMF2 development files
 libqmfconsole2 - enterprise messaging system - QMF console library
 libqmfconsole2-dev - enterprise messaging system - QMF console development 
files
 libqmfengine1 - enterprise messaging system - QMF engine libraries
 libqmfengine1-dev - enterprise messaging system - QMF engine development files
 libqpid-perl - enterprise messaging system - Perl bindings
 libqpid-ruby1.8 - Transitional package for ruby-qpid
 libqpidbroker2 - enterprise messaging system - broker libraries
 libqpidbroker2-dev - enterprise messaging system - broker development files
 libqpidclient2 - enterprise messaging system - client libraries
 libqpidclient2-dev - enterprise messaging system - client development files
 libqpidcommon2 - enterprise messaging system - common libraries
 libqpidcommon2-dev - enterprise messaging system - common development files
 libqpidmessaging2 - enterprise messaging system - AMQP messaging libraries
 libqpidmessaging2-dev - enterprise messaging system - AMQP messaging 
development files
 libqpidtypes1 - enterprise messaging system - API libraries
 libqpidtypes1-dev - enterprise messaging system - API development files
 librdmawrap2 - enterprise messaging system - RDMA libraries
 librdmawrap2-dev - enterprise messaging system - RDMA development files
 libsslcommon2 - enterprise messaging system - common SSL libraries
 libsslcommon2-dev - enterprise messaging system - common SSL development files
 python-cqmf2 - enterprise messaging system - Python CQMF2 bindings
 python-cqpid - enterprise messaging system - Python CQPID bindings
 python-qmf - enterprise messaging system - Python QMF module
 python-qmf2 - enterprise messaging system - Python QMF2 bindings
 qmfgen - enterprise messaging system - Python QMF interface generator
 qpid-client - enterprise messaging system - AMQP client
 qpid-doc   - enterprise messaging system - documentation and examples
 qpidd  - enterprise messaging system - AMQP broker
 ruby-qpid  - enterprise messaging system - Ruby bindings
Closes: 684456
Changes: 
 qpid-cpp (0.16-7) unstable; urgency=low
 .
   * Fixes security issue CVE-2012-3467 

Bug#684533: Fwd: RDF::TrineShortcuts - deprecation

2012-08-10 Thread Kjetil Kjernsmo
Package: librdf-trineshortcuts-perl
Version: 0.104-1
Severity: serious

Please see the below email from the upstream developer. Given this, I 
suppose this package shouldn't make it to Wheezy when it is stable. If I'm 
wrong, please feel free to close.

Cheers,

Kjetil


--  Forwarded Message  --

Subject: RDF::TrineShortcuts - deprecation
Date: Wednesday 30. May 2012, 09.11.32
From: Toby Inkster m...@tobyinkster.co.uk
To: d...@lists.perlrdf.org

RDF::TrineShortcuts is a pretty nasty hack, and many of the reasons for
its existence are no longer valid. For example, at the time I wrote it,
RDF::Trine didn't have support for auto-detecting the serialization of
a URL or file and parsing it; now it does.

Anyway, it should be considered strongly deprecated. It will be deleted
from CPAN at some point later this year (though will still be
available from BackPAN). I just need to rework a few modules that
currently depend on it.

-- 
Toby A Inkster
mailto:m...@tobyinkster.co.uk
http://tobyinkster.co.uk

___
Dev mailing list
d...@lists.perlrdf.org
http://lists.perlrdf.org/listinfo/dev
-


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#684535: hyperestraier: FTBFS on s390x

2012-08-10 Thread Nobuhiro Iwamatsu
Source: hyperestraier
Version: 1.4.13-7
Severity: serious
Justification: fails to build from source

Hi,

hyperestraier FTBFS on s390.
 
https://buildd.debian.org/status/fetch.php?pkg=hyperestraierarch=s390xver=1.4.13-7stamp=1343612759

-
./estcmd: INFO: [325:220]: search: 0 hits
./estcmd: INFO: [332:226]: search: 0 hits
./estcmd: INFO: flushing index words: name=casket dnum=230 wnum=1
fsiz=7066382 crnum=17860 csiz=1353273 dknum=2221
./estcmd: INFO: [342:232]: attr: file:///tmp/wicked-0267-12275.est
./estcmd: INFO: [354:243]: search: 0 hits
./estcmd: INFO: [355:243]: search: 2 hits
./estcmd: INFO: [363:247]: search: 0 hits
./estcmd: INFO: [365:248]: attr: file:///tmp/wicked-0152-12275.est
./estcmd: INFO: [367:248]: search: 0 hits
./estcmd: INFO: [370:248]: out
make: *** [build-arch-stamp] Terminated
./estcmd: INFO: the termination signal 15 catched
./estcmd: INFO: the termination signal 15 catched
Build killed with signal TERM after 150 minutes of inactivity
Build killed with signal KILL after 5 minutes of inactivity
-

Please check your package.

Best regards,
 Nobuhiro

--
Nobuhiro Iwamatsu
   iwamatsu at {nigauri.org / debian.org}
   GPG ID: 40AD1FA6


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#684315: Fwd: A thinkfan 0.8 bug and a patch

2012-08-10 Thread Victor Mataré
OK, I recently received a sysfs-fix.diff, which looks correct to me.
I've fixed the problem in a different way though, on git.sf.net. My
patches are larger, but they should waste less CPU time. The second one
fixes a potential bug in the parser. I'll also make this the 0.8.1
release. Hope that works for debian^^


 Original Message 
Subject:A thinkfan 0.8 bug and a patch
Date:   Sat, 14 Jul 2012 21:15:54 -0400
From:   M. Vefa Bicakci m@runbox.com
To: mat...@lih.rwth-aachen.de



Dear Victor Matare,

I have found a bug in thinkfan 0.8 regarding the handling of sysfs files. I am
using a 32-bit Debian Sid installation, up-to-date as of today, on a Thinkpad 
T420.

In summary, instead of writing only the string form of an integer to a sysfs
pwm fan control file, thinkfan 0.8 writes the string level integer. As you
will predict, this causes the kernel to report an error, which causes thinkfan
to terminate.

I am attaching a patch which fixes this issue. Even though the way I convert the
level integer to a string is a bit crude, the patch fixes the bug.

Thank you,

M. Vefa Bicakci




Index: thinkfan-0.8.0/globaldefs.h
===
--- thinkfan-0.8.0.orig/globaldefs.h	2012-05-10 14:37:34.0 -0400
+++ thinkfan-0.8.0/globaldefs.h	2012-07-14 20:54:27.188026323 -0400
@@ -95,7 +95,7 @@
 
 struct tf_config *config;
 unsigned long int errcnt;
-int *temps, tmax, last_tmax, lvl_idx, *b_tmax, line_count;
+int *temps, tmax, last_tmax, cur_nlvl, lvl_idx, *b_tmax, line_count;
 unsigned int chk_sanity, watchdog_timeout, num_temps;
 char *config_file, *prefix, *rbuf,
 	*cur_lvl,
Index: thinkfan-0.8.0/system.c
===
--- thinkfan-0.8.0.orig/system.c	2012-05-10 14:37:34.0 -0400
+++ thinkfan-0.8.0/system.c	2012-07-14 20:56:06.332031818 -0400
@@ -249,14 +249,20 @@
  * Set fan speed (sysfs interface).
  ***/
 void setfan_sysfs() {
-	int fan, l = strlen(cur_lvl);
+	#define INT_STR_SIZE 128
+	int fan, l;
+	char buf[INT_STR_SIZE];
 
-	if (unlikely((fan = open(config-fan, O_WRONLY))  0)) {
+	if (unlikely((l = snprintf(buf, INT_STR_SIZE, %d, cur_nlvl)) = INT_STR_SIZE)) {
+		report(LOG_ERR, LOG_ERR, %d is too large!\n, cur_nlvl);
+		errcnt++;
+	}
+	else if (unlikely((fan = open(config-fan, O_WRONLY))  0)) {
 		report(LOG_ERR, LOG_ERR, %s: %s\n, config-fan, strerror(errno));
 		errcnt++;
 	}
 	else {
-		if (unlikely(write(fan, cur_lvl, l)  l)) {
+		if (unlikely(write(fan, buf, l)  l)) {
 			report(LOG_ERR, LOG_ERR, MSG_ERR_FANCTRL);
 			errcnt++;
 		}
Index: thinkfan-0.8.0/thinkfan.c
===
--- thinkfan-0.8.0.orig/thinkfan.c	2012-05-10 14:37:34.0 -0400
+++ thinkfan-0.8.0/thinkfan.c	2012-07-14 20:54:27.191026323 -0400
@@ -37,6 +37,7 @@
 unsigned int sleeptime, tmp_sleeptime;
 
 #define set_fan cur_lvl = config-limits[lvl_idx].level; \
+	cur_nlvl = config-limits[lvl_idx].nlevel; \
 	if (!quiet  nodaemon) \
 	report(LOG_DEBUG, LOG_DEBUG, MSG_DBG_T_STAT); \
 	config-setfan();

From 6de7d99e8cb95d15117454ffc5eea037bef54656 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Victor=20Matar=C3=A9?= mat...@lih.rwth-aachen.de
Date: Fri, 10 Aug 2012 21:42:15 +0200
Subject: [PATCH 1/2] fix sysfs fan level string

---
 config.c |9 ++---
 globaldefs.h |4 ++--
 system.c |3 ++-
 thinkfan.c   |3 +--
 4 files changed, 11 insertions(+), 8 deletions(-)

diff --git a/config.c b/config.c
index 9ccf794..2b34532 100644
--- a/config.c
+++ b/config.c
@@ -183,7 +183,7 @@ struct tf_config *readconfig(char* fname) {
cfg_local-uninit_fan = uninit_fan_ibm;
}
 
-   cur_lvl = cfg_local-limits[cfg_local-num_limits - 1].level;
+   lvl_idx = cfg_local-num_limits - 1;
 
// configure sensor interface
if (cfg_local-num_sensors  0 
@@ -310,6 +310,8 @@ static int add_limit(struct tf_config *cfg, struct limit 
*limit) {
long int tmp;
char *end, *conv_lvl;
 
+   limit-sysfslevel = NULL;
+
// Check formatting of level string...
tmp = strtol(limit-level, end, 0);
if (tmp  INT_MIN || tmp  INT_MAX) {
@@ -324,13 +326,13 @@ static int add_limit(struct tf_config *cfg, struct limit 
*limit) {
}
else if (*end == 0) {
// just a number
+   limit-sysfslevel = limit-level;
conv_lvl = calloc(7 + strlen(limit-level), sizeof(char));
snprintf(conv_lvl, 7 + strlen(limit-level), level %d, 
(int)tmp);
-   free(limit-level);
limit-level = conv_lvl;
limit-nlevel = (int)tmp;
}
-   else if (sscanf(limit-level, level %d, (int * )tmp)) {
+   else if (sscanf(limit-level, level %d, (int *)tmp)) {
limit-nlevel = (int)tmp;
}
else if 

Processed: [bts-link] source package gnome-keyring

2012-08-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 #
 # bts-link upstream status pull for source package gnome-keyring
 # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html
 #
 user bts-link-upstr...@lists.alioth.debian.org
Setting user to bts-link-upstr...@lists.alioth.debian.org (was 
bts-link-de...@lists.alioth.debian.org).
 # remote status report for #683655 (http://bugs.debian.org/683655)
 # Bug title: gnome-keyring: gpg passphrase cached forever
 #  * http://bugzilla.gnome.org/show_bug.cgi?id=681081
 #  * remote status changed: UNCONFIRMED - RESOLVED
 #  * remote resolution changed: (?) - FIXED
 #  * closed upstream
 tags 683655 + fixed-upstream
Bug #683655 [gnome-keyring] gnome-keyring: gpg passphrase cached forever
Ignoring request to alter tags of bug #683655 to the same tags previously set
 usertags 683655 - status-UNCONFIRMED
Usertags were: status-RESOLVED resolution-FIXED.
Usertags are now: status-RESOLVED resolution-FIXED.
 usertags 683655 + status-RESOLVED resolution-FIXED
Usertags were: status-RESOLVED resolution-FIXED.
Usertags are now: status-RESOLVED resolution-FIXED.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
683655: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683655
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#684531: FTBFS: unknown type name bool

2012-08-10 Thread Yaroslav Halchenko
severity 684531 important
tags 684531 +more-info
thanks

I just built it fine using cowbuilder in up-to-date amd64 wheezy and sid
environments... so I guess this failure is somehow specific to your
setup... full build log and build-depends versioning information would
be of help. meanwhile, since failed to reproduce reducing severity

 It seems that strace.c lacks a #include stdbool.h.
this one?

$ grep -1 stdbool strace-4.6/defs.h 
#ifdef HAVE_STDBOOL_H
#include stdbool.h
#endif

which ones again boils down to question why on your system ./configure
decided that stdbool is empty, since in my case:

$ grep stdbool cde_0.1-1_amd64.build
checking for stdbool.h that conforms to C99... yes

Cheers

On Fri, 10 Aug 2012, Michael Tautschnig wrote:

 Package: cde
 Version: 0.1-1
 Severity: serious

 In a recent local rebuild, your package failed to build in a wheezy build
 environment:

 Making all in tests
 make[4]: Entering directory `/root/build/cde/cde-0.1/strace-4.6/tests'
 make[4]: Nothing to be done for `all'.
 make[4]: Leaving directory `/root/build/cde/cde-0.1/strace-4.6/tests'
 make[4]: Entering directory `/root/build/cde/cde-0.1/strace-4.6'
 source='strace.c' object='strace.o' libtool=no \
 DEPDIR=.deps depmode=gcc /bin/bash ./depcomp \
 gcc -DHAVE_CONFIG_H -I.  -I./linux/x86_64 -I./linux -I./linux  -Wall 
 -Wwrite-strings -Wl,--hash-style=both  -g -O2 -fno-stack-protector 
 -U_FORTIFY_SOURCE -D_GNU_SOURCE  -c strace.c
 strace.c:128:1: error: unknown type name 'bool'
 strace.c: In function 'main':
 strace.c:836:9: warning: unused variable 'pid' [-Wunused-variable]
 strace.c: In function 'trace':
 strace.c:2792:15: warning: unused variable 'si' [-Wunused-variable]


 It seems that strace.c lacks a #include stdbool.h.

 Best,
 Michael




-- 
Yaroslav O. Halchenko
Postdoctoral Fellow,   Department of Psychological and Brain Sciences
Dartmouth College, 419 Moore Hall, Hinman Box 6207, Hanover, NH 03755
Phone: +1 (603) 646-9834   Fax: +1 (603) 646-1419
WWW:   http://www.linkedin.com/in/yarik


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed (with 1 errors): Re: Bug#684531: FTBFS: unknown type name bool

2012-08-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 684531 important
Bug #684531 [cde] FTBFS: unknown type name bool
Severity set to 'important' from 'serious'
 tags 684531 +more-info
Unknown tag/s: more-info.
Recognized are: patch wontfix moreinfo unreproducible fixed potato woody sid 
help security upstream pending sarge sarge-ignore experimental d-i confirmed 
ipv6 lfs fixed-in-experimental fixed-upstream l10n etch etch-ignore lenny 
lenny-ignore squeeze squeeze-ignore wheezy wheezy-ignore.

Bug #684531 [cde] FTBFS: unknown type name bool
Requested to add no tags; doing nothing.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
684531: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684531
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#681687: Call for votes on evince MIME entry

2012-08-10 Thread Bdale Garbee
Ian Jackson ijack...@chiark.greenend.org.uk writes:

 I'm calling for votes on the following proposal.  There are
 three options - two positive versions, and FD.  In summary
  A.  Do not overrule release team.  It is too late for automation.
  B.  Do not overrule release team.  Defer to them on automation.
  F.  Further Discussion.

I vote BAF.

Bdale


pgpK9nA7PmkMg.pgp
Description: PGP signature


Bug#684552: clementine: does not start: error while loading shared libraries: libGLEW.so.1.5

2012-08-10 Thread James Utter
Package: clementine
Version: 1.0.1+dfsg-2+b1
Severity: grave
Justification: renders package unusable

Dear Maintainer,

Clementine is no longer starting.

running clementine at the command line returns the following error

clementine: error while loading shared libraries: libGLEW.so.1.5: cannot
open shared object file: No such file or directory

My system has libglew1.7 installed (no libglew1.5)

I tried creating a symlink /usr/lib/x86_64-linux-gnu/libGLEW.so.1.5
pointing to /usr/lib/x86_64-linux-gnu/libGLEW.so.1.7, but I get the
following error

clementine: error while loading shared libraries: libCg.so: cannot open
shared object file: No such file or directory

Reinstalling clementine was ineffective.
Failed to build from source with the following command:
$ apt-get -b source clementine
with an error in 
src/CMakeFiles/clementine_lib.dir/visualisations/projectmvisualisation.cpp.o

Regards,

James

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages clementine depends on:
ii  gstreamer0.10-plugins-base   0.10.36-1
ii  gstreamer0.10-plugins-good   0.10.31-3
ii  gstreamer0.10-plugins-ugly   0.10.19-2+b2
ii  libc62.13-33
ii  libcdio130.83-4
ii  libchromaprint0  0.6-2
ii  libechonest1.2   1.2.1-1
ii  libgcc1  1:4.7.1-2
ii  libgdk-pixbuf2.0-0   2.26.1-1
ii  libglib2.0-0 2.32.3-1
ii  libgpod4 0.8.2-6
ii  libgstreamer-plugins-base0.10-0  0.10.36-1
ii  libgstreamer0.10-0   0.10.36-1
ii  libimobiledevice21.1.1-4
ii  libindicate-qt1  0.2.5.91-5
ii  liblastfm0   0.4.0~git20090710-2
ii  libmtp9  1.1.3-35-g0ece104-2
ii  libplist11.8-1
ii  libprojectm2 2.1.0+dfsg-1
ii  libqjson00.7.1-6
ii  libqt4-dbus  4:4.8.2-1
ii  libqt4-network   4:4.8.2-1
ii  libqt4-opengl4:4.8.2-1
ii  libqt4-sql   4:4.8.2-1
ii  libqt4-sql-sqlite4:4.8.2-1
ii  libqt4-xml   4:4.8.2-1
ii  libqtcore4   4:4.8.2-1
ii  libqtgui44:4.8.2-1
ii  libqxt-gui0  0.6.1-6
ii  libstdc++6   4.7.1-2
ii  libtag1c2a   1.7.2-1
ii  libusb-1.0-0 2:1.0.11-1
ii  libusbmuxd1  1.0.7-2
ii  libx11-6 2:1.5.0-1
ii  libxml2  2.8.0+dfsg1-5
ii  projectm-data2.1.0+dfsg-1
ii  zlib1g   1:1.2.7.dfsg-13

Versions of packages clementine recommends:
ii  gstreamer0.10-alsa0.10.36-1
ii  gstreamer0.10-pulseaudio  0.10.31-3

clementine suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#681687: Call for votes on evince MIME entry

2012-08-10 Thread Steve Langasek
On Tue, Aug 07, 2012 at 06:03:17PM +0100, Ian Jackson wrote:
 I'm calling for votes on the following proposal.  There are
 three options - two positive versions, and FD.  In summary
  A.  Do not overrule release team.  It is too late for automation.
  B.  Do not overrule release team.  Defer to them on automation.
  F.  Further Discussion.

I vote BAF.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
Ubuntu Developerhttp://www.debian.org/
slanga...@ubuntu.com vor...@debian.org


signature.asc
Description: Digital signature