Processed: Reopening 696051

2012-12-29 Thread Debian Bug Tracking System
Processing control commands:

> reopen -1
Bug #696051 {Done: Michael Tokarev } [src:qemu] potential 
guest-side buffer overflow caused by e1000 device emulation and large incoming 
packets
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
No longer marked as fixed in versions qemu/1.1.2+dfsg-3 and 
qemu-kvm/1.1.2+dfsg-3.
> retitle -1 potential guest-side buffer overflow caused by e1000 device 
> emulation and large incoming packets - CVE-2012-6075
Bug #696051 [src:qemu] potential guest-side buffer overflow caused by e1000 
device emulation and large incoming packets
Changed Bug title to 'potential guest-side buffer overflow caused by e1000 
device emulation and large incoming packets - CVE-2012-6075' from 'potential 
guest-side buffer overflow caused by e1000 device emulation and large incoming 
packets'
> tags -1 + patch pending upstream
Bug #696051 [src:qemu] potential guest-side buffer overflow caused by e1000 
device emulation and large incoming packets - CVE-2012-6075
Added tag(s) pending.

-- 
696051: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696051
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#696051: Reopening 696051

2012-12-29 Thread Michael Tokarev

Control: reopen -1
Control: retitle -1 potential guest-side buffer overflow caused by e1000 device 
emulation and large incoming packets - CVE-2012-6075
Control: tags -1 + patch pending upstream

There is another half of the same issue.  Current patch/fix which
has been applied is about the case when no jumbo frames are enabled
at all -  in this case the maximum packet size is 1522 bytes.

But the re's another case - when jumbo frames are actully enabled
but not any size (there's another bit that enables very large
packets, in this case receiving method is different).  In this
case, maximum packet size a guest can handle is 16384 bytes.

In both cases old code allowed larger packets to be received,
and in both cases it will result in guest-side buffer overflow
with potential to execute any code in guest.

Reopening this bug now and updating the subject, mentioning
meanwhile-assigned CVE#.

Thanks,

/mjt


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: tagging 568362

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 568362 + pending
Bug #568362 {Done: Ben Hutchings } [usbip-source] 
usbip-source: fails to build on 2.6.32
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
568362: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=568362
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#646704: Bug severity is too high

2012-12-29 Thread Christian PERRIER
Quoting Christian PERRIER (bubu...@debian.org):

> release and that it's not planned to happen in 2012, I'll be fine with

s/2012/2014




signature.asc
Description: Digital signature


Bug#646704: Bug severity is too high

2012-12-29 Thread Christian PERRIER
Quoting Daniel Baumann (daniel.baum...@progress-technologies.net):

> since you put yourself into uploaders of live-installer some time ago,
> maybe you want to look at it yourself too?

You know the reasons for this: be able to do l10n upload when needed
without them to be considered NMUs. That's it and mostly it and, no, I
can't (understand I don't have the skills) try finding a fix.

> 
> > Sorry, I'm still deeply convinced that this issue is mostly a case 
> > that doesn't deserve an RC severity. I'll downgrade this bug again
> > in 4 weeks if nothing happened in the meantime.
> 
> should that be the case, i'll restore the original severity of course.


Well, as long as you remember that we're currently working on a
release and that it's not planned to happen in 2012, I'll be fine with
that. But, still, this bug is not release critical as it doesn't fit
the definition of "serious".




signature.asc
Description: Digital signature


Processed: found 654341 in 0.48.3.1-1.1

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> found 654341 0.48.3.1-1.1
Bug #654341 {Done: John Paul Adrian Glaubitz } 
[inkscape] [CVE-2012-6076] inkscape reads .eps files from /tmp instead of the 
current directory
Marked as found in versions inkscape/0.48.3.1-1.1.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
654341: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=654341
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#654341: inkscape reads .eps files from /tmp instead of the

2012-12-29 Thread Debian Bug Tracking System
Processing control commands:

> retitle -1 [CVE-2012-6076] inkscape reads .eps files from /tmp instead of the 
> current directory
Bug #654341 {Done: John Paul Adrian Glaubitz } 
[inkscape] inkscape reads .eps files from /tmp instead of the current directory
Changed Bug title to '[CVE-2012-6076] inkscape reads .eps files from /tmp 
instead of the current directory' from 'inkscape reads .eps files from /tmp 
instead of the current directory'
> retitle 696915 unblock: inkscape/0.48.3.1-1.3
Bug #696915 [release.debian.org] unblock: inkscape/0.48.3.1-1.2
Changed Bug title to 'unblock: inkscape/0.48.3.1-1.3' from 'unblock: 
inkscape/0.48.3.1-1.2'

-- 
654341: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=654341
696915: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696915
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#654341: inkscape reads .eps files from /tmp instead of the

2012-12-29 Thread Salvatore Bonaccorso
Control: retitle -1 [CVE-2012-6076] inkscape reads .eps files from /tmp instead 
of the current directory
Control: retitle 696915 unblock: inkscape/0.48.3.1-1.3

Hi

On Sat, Dec 29, 2012 at 09:48:42PM +0100, John Paul Adrian Glaubitz wrote:
> Hi,
> 
> I have just uploaded inkscape 0.48.3.1-1.3 which includes a patch by
> Michael Karcher to address this issue.
> 
> We have thoroughly tested the patch and the bug is now
> fixed. Further checks show that the patch doesn't have any negative
> impact on other areas of the script engine.
> 
> The patch makes sure that the relative file names are expanded before
> they are passed to external scripts. EPS files are imported by
> inkscape by means of an external Python script. The bug is caused by
> the script engine assuming the filename passed is absolute and then it
> changes the current working directory to the script directory first,
> then into /tmp to make sure it is possible to write to disk.
> 
> I am attaching a series of patches against the git repository for the
> Debian packaging [1]. The packaging repository is currently at version
> 0.48.3.1-1, the following three NMUs are therefore not in the
> repository and I am attaching all patches necessary to update the
> repository to version 0.48.3.1-1.3.

Thanks for your update. It was assigned now a CVE for this issue:
CVE-2012-6076.

Regards,
Salvatore


signature.asc
Description: Digital signature


Bug#696920: briquolo: incomplete debian/copyright

2012-12-29 Thread Bart Martens
Hi Markus,

On Sat, Dec 29, 2012 at 11:00:59PM +0100, Markus Koschany wrote:
> The DejaVuSans.ttf file gets removed during
> build time in debian/rules. Therefore the package depends on ttf-dejavu
> and just links to usr/share/fonts/truetype/ttf-dejavu/DejaVuSans.ttf
> accordingly. I presume the copyright file in ttf-dejavu covers the issue.

A source package is also a package, and "every package must be accompanied by a
verbatim copy of its copyright information and distribution license (...)".
http://www.debian.org/doc/debian-policy/ch-docs.html#s-copyrightfile

> 
> Alternatively i can remove the font file completely from the sources.
> What do you prefer?

When I read the reasons for repackaging the orig file, then I think that in
this case the copyright and license should be added to debian/copyright, but I
don't it's a big problem if you would choose to repackage the orig.
http://www.debian.org/doc/manuals/developers-reference/best-pkging-practices.html#bpp-origtargz

Regards,

Bart Martens


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#696816: jenkins: Security issues were found in Jenkins core

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> clone 696816 -1
Bug #696816 [jenkins] jenkins: Security issues were found in Jenkins core
Bug 696816 cloned as bug 696974
> reassign -1 jenkins-winstone 0.9.10-jenkins-37+dfsg-1
Bug #696974 [jenkins] jenkins: Security issues were found in Jenkins core
Bug reassigned from package 'jenkins' to 'jenkins-winstone'.
No longer marked as found in versions jenkins/1.447.2+dfsg-2.
Ignoring request to alter fixed versions of bug #696974 to the same values 
previously set
Bug #696974 [jenkins-winstone] jenkins: Security issues were found in Jenkins 
core
There is no source info for the package 'jenkins-winstone' at version 
'0.9.10-jenkins-37+dfsg-1' with architecture ''
Unable to make a source version for version '0.9.10-jenkins-37+dfsg-1'
Marked as found in versions 0.9.10-jenkins-37+dfsg-1.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
696816: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696816
696974: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696974
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#696816: jenkins: Security issues were found in Jenkins core

2012-12-29 Thread Nobuhiro Ban
clone 696816 -1
reassign -1 jenkins-winstone 0.9.10-jenkins-37+dfsg-1
thanks

Dear Maintainer,

I found upstream "SECURITY-44" (aka CVE-2012-6072) was from Winstone,
and it might be fixed in 0.9.10-jenkins-40.


https://github.com/jenkinsci/jenkins/commit/ad084edb571555e7c5a9bc5b27aba09aac8da98d
>[FIXED SECURITY-44]
> Picked up a new version of Winstone

https://github.com/jenkinsci/winstone/commit/62e890b9589a844553d837d91b5f68eb3dba334e
>[FIXED SECURITY-44]
> Do not allow the webapp to split HTTP header values into multiple lines. 
> Since there's no obvious escaping semantics here, we just drop those 
> characters, which is what Jetty does.


Regards,
Nobuhiro


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#695717: cpio: diff for NMU version 2.11+dfsg-0.1

2012-12-29 Thread David Prévot
tags 695717 + patch
thanks

Dear maintainer,

I've prepared an NMU for cpio (versioned as 2.11+dfsg-0.1) and
uploaded it to DELAYED/2. Please feel free to tell me if I
should delay it longer.

Regards.

David
diff -Nru cpio-2.11/debian/changelog cpio-2.11+dfsg/debian/changelog
--- cpio-2.11/debian/changelog	2012-06-12 07:41:45.0 -0400
+++ cpio-2.11+dfsg/debian/changelog	2012-12-29 22:02:32.0 -0400
@@ -1,3 +1,12 @@
+cpio (2.11+dfsg-0.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Remove non DFSG-compliant doc/cpio.info and doc/cpio.texi from source.
+Closes: #695717
+  * Do not build nor ship cpio.info because of the above.
+
+ -- David Prévot   Sat, 29 Dec 2012 22:02:30 -0400
+
 cpio (2.11-8) unstable; urgency=low
 
   * Enable hardened build flags
diff -Nru cpio-2.11/debian/patches/695717-no-cpio.info.patch cpio-2.11+dfsg/debian/patches/695717-no-cpio.info.patch
--- cpio-2.11/debian/patches/695717-no-cpio.info.patch	1969-12-31 20:00:00.0 -0400
+++ cpio-2.11+dfsg/debian/patches/695717-no-cpio.info.patch	2012-12-29 21:57:54.0 -0400
@@ -0,0 +1,17 @@
+Description: Do not build cpio.info anymore
+Author: David Prévot 
+Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695717
+Applied-Upstream: not-needed
+Last-Update: 2012-12-29
+---
+This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
+--- a/doc/Makefile.in
 b/doc/Makefile.in
+@@ -149,7 +149,6 @@
+ am__v_at_0 = @
+ SOURCES =
+ DIST_SOURCES =
+-INFO_DEPS = $(srcdir)/cpio.info
+ TEXINFO_TEX = $(top_srcdir)/build-aux/texinfo.tex
+ am__TEXINFO_TEX_DIR = $(top_srcdir)/build-aux
+ DVIS = cpio.dvi
diff -Nru cpio-2.11/debian/patches/series cpio-2.11+dfsg/debian/patches/series
--- cpio-2.11/debian/patches/series	2012-06-12 07:30:10.0 -0400
+++ cpio-2.11+dfsg/debian/patches/series	2012-12-29 21:51:52.0 -0400
@@ -6,3 +6,4 @@
 218086-reporting-bugs.patch
 588020-manpages-see-also.patch
 627444-invalid-redefinition-of-stat.patch
+695717-no-cpio.info.patch
diff -Nru cpio-2.11/debian/rules cpio-2.11+dfsg/debian/rules
--- cpio-2.11/debian/rules	2012-06-12 07:40:49.0 -0400
+++ cpio-2.11+dfsg/debian/rules	2012-12-29 22:28:56.0 -0400
@@ -123,8 +123,7 @@
 	  debian/tmp/usr/share/doc/$(package)/changelog.Debian
 	gzip -9v debian/tmp/usr/share/doc/$(package)/*
 	gzip -9v debian/tmp/usr/share/man/*/*
-	gzip -9v debian/tmp/usr/share/info/*
-	rm -f debian/tmp/usr/share/info/dir.gz
+	rm -rf debian/tmp/usr/share/info
 	install -m 644 debian/copyright debian/tmp/usr/share/doc/$(package)/.
 # Determine shared library dependencies
 	dpkg-shlibdeps debian/tmp/bin/cpio debian/tmp/bin/mt-gnu
diff -Nru cpio-2.11/doc/cpio.info cpio-2.11+dfsg/doc/cpio.info
--- cpio-2.11/doc/cpio.info	2010-03-11 01:01:40.0 -0400
+++ cpio-2.11+dfsg/doc/cpio.info	1969-12-31 20:00:00.0 -0400
@@ -1,562 +0,0 @@
-This is cpio.info, produced by makeinfo version 4.13 from cpio.texi.
-
-INFO-DIR-SECTION Archiving
-START-INFO-DIR-ENTRY
-* Cpio: (cpio). Copy-in-copy-out archiver to tape or disk.
-END-INFO-DIR-ENTRY
-
-   This manual documents GNU cpio (version 2.11, 12 February 2010).
-
-   Copyright (C) 1995, 2001, 2002, 2004, 2010 Free Software Foundation,
-Inc.
-
- Permission is granted to copy, distribute and/or modify this
- document under the terms of the GNU Free Documentation License,
- Version 1.2 or any later version published by the Free Software
- Foundation; with no Invariant Sections, with the Front-Cover texts
- being "A GNU Manual", and with the Back-Cover Texts as in (a)
- below.  A copy of the license is included in the section entitled
- "GNU Free Documentation License".
-
- (a) The FSF's Back-Cover Text is: "You have freedom to copy and
- modify this GNU Manual, like GNU software.  Copies published by
- the Free Software Foundation raise funds for GNU development."
-
-
-File: cpio.info,  Node: Top,  Next: Introduction,  Prev: (dir),  Up: (dir)
-
-cpio
-
-
-GNU cpio is a tool for creating and extracting archives, or copying
-files from one place to another.  It handles a number of cpio formats as
-well as reading and writing tar files.  This is the first edition of the
-GNU cpio documentation and is consistent with 2.11.
-
-* Menu:
-
-* Introduction::
-* Tutorial::Getting started.
-* Invoking cpio::   How to invoke `cpio'.
-* Media::   Using tapes and other archive media.
-* Reports:: Reporting bugs or suggestions
-* Concept Index::   Concept index.
-
- --- The Detailed Node Listing ---
-
-Invoking cpio
-
-* Copy-out mode::
-* Copy-in mode::
-* Copy-pass mode::
-* Options::
-
-
-File: cpio.info,  Node: Introduction,  Next: Tutorial,  Prev: Top,  Up: Top
-
-1 Introduction
-**
-
-GNU cpio copies files into or out of a cpio or tar archive, The archive
-can be another file on the disk, a magnetic tape, or a pipe.
-
-   GNU cpio s

Processed: cpio: diff for NMU version 2.11+dfsg-0.1

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 695717 + patch
Bug #695717 [src:cpio] cpio: includes non-free documentation (GFDL with 
unmodifiable sections)
Added tag(s) patch.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
695717: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695717
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: limit source to cpio, tagging 695717

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> #cpio (2.11+dfsg-0.1) unstable; urgency=low
> #
> #  * Remove non DFSG-compliant doc/cpio.info and doc/cpio.texi from source.
> #Closes: #695717
> #
> limit source cpio
Limiting to bugs with field 'source' containing at least one of 'cpio'
Limit currently set to 'source':'cpio'

> tags 695717 + pending
Bug #695717 [src:cpio] cpio: includes non-free documentation (GFDL with 
unmodifiable sections)
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
695717: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695717
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: bash: diff for NMU version 4.2+dfsg-0.1

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 695709 + patch
Bug #695709 [src:bash] bash: includes non-free documentation (GFDL with 
unmodifiable sections)
Added tag(s) patch.
> tags 695709 + pending
Bug #695709 [src:bash] bash: includes non-free documentation (GFDL with 
unmodifiable sections)
Ignoring request to alter tags of bug #695709 to the same tags previously set
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
695709: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695709
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: limit source to bash, tagging 695709

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> #bash (4.2+dfsg-0.1) unstable; urgency=low
> #
> #  * Remove unused and non DFSG-compliant bash-4.2/lib/readline/doc from
> #source. (Closes: #695709)
> #
> limit source bash
Limiting to bugs with field 'source' containing at least one of 'bash'
Limit currently set to 'source':'bash'

> tags 695709 + pending
Bug #695709 [src:bash] bash: includes non-free documentation (GFDL with 
unmodifiable sections)
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
695709: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695709
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#696971: cdO;FTBFS: configure fails

2012-12-29 Thread Christoph Egger
Package: src:cdo
Version: 1.5.9+dfsg.1-1
Severity: serious
Justification: fails to build from source (but built successfully in the past)

Hi!

Your package failed to build on the buildds:

checking for gcc... gcc
checking whether the C compiler works... no
configure: error: in 
`/build/buildd-cdo_1.5.9+dfsg.1-1-amd64-SRhBVs/cdo-1.5.9+dfsg.1':
configure: error: C compiler cannot create executables
See `config.log' for more details
make[1]: *** [override_dh_auto_configure] Error 77

Full build log at
https://buildd.debian.org/status/package.php?p=cdo

Regards

Christoph


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#696962: marked as done (grub-efi-{amd64, ia32}: fails to install: cp: cannot create regular file '/boot/grub/': Not a directory)

2012-12-29 Thread Debian Bug Tracking System
Your message dated Sun, 30 Dec 2012 01:18:44 +
with message-id 
and subject line Bug#696962: fixed in grub2 2.00-9
has caused the Debian Bug report #696962,
regarding grub-efi-{amd64, ia32}: fails to install: cp: cannot create regular 
file '/boot/grub/': Not a directory
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
696962: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696962
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: grub-efi-amd64,grub-efi-ia32
Version: 1.99-24
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package failed to install. As
per definition of the release team this makes the package too buggy for
a release, thus the severity.

>From the attached log (scroll to the bottom...):

  Selecting previously unselected package grub-efi-amd64.
  (Reading database ... 7077 files and directories currently installed.)
  Unpacking grub-efi-amd64 (from .../grub-efi-amd64_1.99-24_amd64.deb) ...
  Setting up grub-efi-amd64 (1.99-24) ...
  
  Creating config file /etc/default/grub with new version
  cp: cannot create regular file '/boot/grub/': Not a directory
  dpkg: error processing grub-efi-amd64 (--configure):
   subprocess installed post-installation script returned error exit status 1
  Errors were encountered while processing:
   grub-efi-amd64


cheers,

Andreas


grub-efi-amd64_1.99-24.log.gz
Description: GNU Zip compressed data
--- End Message ---
--- Begin Message ---
Source: grub2
Source-Version: 2.00-9

We believe that the bug you reported is fixed in the latest version of
grub2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 696...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson  (supplier of updated grub2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sat, 29 Dec 2012 23:44:51 +
Source: grub2
Binary: grub2 grub-linuxbios grub-efi grub-common grub2-common grub-emu 
grub-emu-dbg grub-pc-bin grub-pc-dbg grub-pc grub-rescue-pc grub-coreboot-bin 
grub-coreboot-dbg grub-coreboot grub-efi-ia32-bin grub-efi-ia32-dbg 
grub-efi-ia32 grub-efi-amd64-bin grub-efi-amd64-dbg grub-efi-amd64 
grub-efi-ia64-bin grub-efi-ia64-dbg grub-efi-ia64 grub-ieee1275-bin 
grub-ieee1275-dbg grub-ieee1275 grub-firmware-qemu grub-yeeloong-bin 
grub-yeeloong-dbg grub-yeeloong grub-theme-starfield grub-mount-udeb
Architecture: source i386
Version: 2.00-9
Distribution: experimental
Urgency: low
Maintainer: GRUB Maintainers 
Changed-By: Colin Watson 
Description: 
 grub-common - GRand Unified Bootloader (common files)
 grub-coreboot - GRand Unified Bootloader, version 2 (Coreboot version)
 grub-coreboot-bin - GRand Unified Bootloader, version 2 (Coreboot binaries)
 grub-coreboot-dbg - GRand Unified Bootloader, version 2 (Coreboot debug files)
 grub-efi   - GRand Unified Bootloader, version 2 (dummy package)
 grub-efi-amd64 - GRand Unified Bootloader, version 2 (EFI-AMD64 version)
 grub-efi-amd64-bin - GRand Unified Bootloader, version 2 (EFI-AMD64 binaries)
 grub-efi-amd64-dbg - GRand Unified Bootloader, version 2 (EFI-AMD64 debug 
files)
 grub-efi-ia32 - GRand Unified Bootloader, version 2 (EFI-IA32 version)
 grub-efi-ia32-bin - GRand Unified Bootloader, version 2 (EFI-IA32 binaries)
 grub-efi-ia32-dbg - GRand Unified Bootloader, version 2 (EFI-IA32 debug files)
 grub-efi-ia64 - GRand Unified Bootloader, version 2 (IA64 version)
 grub-efi-ia64-bin - GRand Unified Bootloader, version 2 (IA64 binaries)
 grub-efi-ia64-dbg - GRand Unified Bootloader, version 2 (IA64 debug files)
 grub-emu   - GRand Unified Bootloader, version 2 (emulated version)
 grub-emu-dbg - GRand Unified Bootloader, version 2 (emulated debug files)
 grub-firmware-qemu - GRUB firmware image for QEMU
 grub-ieee1275 - GRand Unified Bootloader, version 2 (Open Firmware version)
 grub-ieee1275-bin - GRand Unified Bootloader, version 2 (Open Firmware 
binaries)
 grub-ieee1275-dbg - GRand Unified Bootloader, version 2 (Open Firmware debug 
files)
 grub-linuxbios - GRand Unified Bootloader, version 2 (dummy package)
 grub-mount-udeb - export GRUB filesyste

Processed: severity of 696939 is wishlist

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> # support for jabber accounts = feature request, hence severity wishlist
> severity 696939 wishlist
Bug #696939 [gnome-online-accounts] can't create jabber accounts
Severity set to 'wishlist' from 'serious'
>
End of message, stopping processing here.

Please contact me if you need assistance.
-- 
696939: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696939
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#696962: marked as done (grub-efi-{amd64, ia32}: fails to install: cp: cannot create regular file '/boot/grub/': Not a directory)

2012-12-29 Thread Debian Bug Tracking System
Your message dated Sun, 30 Dec 2012 00:33:52 +
with message-id 
and subject line Bug#696962: fixed in grub2 1.99-25
has caused the Debian Bug report #696962,
regarding grub-efi-{amd64, ia32}: fails to install: cp: cannot create regular 
file '/boot/grub/': Not a directory
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
696962: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696962
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: grub-efi-amd64,grub-efi-ia32
Version: 1.99-24
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package failed to install. As
per definition of the release team this makes the package too buggy for
a release, thus the severity.

>From the attached log (scroll to the bottom...):

  Selecting previously unselected package grub-efi-amd64.
  (Reading database ... 7077 files and directories currently installed.)
  Unpacking grub-efi-amd64 (from .../grub-efi-amd64_1.99-24_amd64.deb) ...
  Setting up grub-efi-amd64 (1.99-24) ...
  
  Creating config file /etc/default/grub with new version
  cp: cannot create regular file '/boot/grub/': Not a directory
  dpkg: error processing grub-efi-amd64 (--configure):
   subprocess installed post-installation script returned error exit status 1
  Errors were encountered while processing:
   grub-efi-amd64


cheers,

Andreas


grub-efi-amd64_1.99-24.log.gz
Description: GNU Zip compressed data
--- End Message ---
--- Begin Message ---
Source: grub2
Source-Version: 1.99-25

We believe that the bug you reported is fixed in the latest version of
grub2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 696...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson  (supplier of updated grub2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sat, 29 Dec 2012 23:45:01 +
Source: grub2
Binary: grub2 grub-linuxbios grub-efi grub-common grub2-common grub-emu 
grub-pc-bin grub-pc grub-rescue-pc grub-coreboot-bin grub-coreboot 
grub-efi-ia32-bin grub-efi-ia32 grub-efi-amd64-bin grub-efi-amd64 
grub-ieee1275-bin grub-ieee1275 grub-firmware-qemu grub-yeeloong-bin 
grub-yeeloong grub-mount-udeb
Architecture: source i386
Version: 1.99-25
Distribution: unstable
Urgency: low
Maintainer: GRUB Maintainers 
Changed-By: Colin Watson 
Description: 
 grub-common - GRand Unified Bootloader (common files)
 grub-coreboot - GRand Unified Bootloader, version 2 (Coreboot version)
 grub-coreboot-bin - GRand Unified Bootloader, version 2 (Coreboot binaries)
 grub-efi   - GRand Unified Bootloader, version 2 (dummy package)
 grub-efi-amd64 - GRand Unified Bootloader, version 2 (EFI-AMD64 version)
 grub-efi-amd64-bin - GRand Unified Bootloader, version 2 (EFI-AMD64 binaries)
 grub-efi-ia32 - GRand Unified Bootloader, version 2 (EFI-IA32 version)
 grub-efi-ia32-bin - GRand Unified Bootloader, version 2 (EFI-IA32 binaries)
 grub-emu   - GRand Unified Bootloader, version 2 (emulated version)
 grub-firmware-qemu - GRUB firmware image for QEMU
 grub-ieee1275 - GRand Unified Bootloader, version 2 (Open Firmware version)
 grub-ieee1275-bin - GRand Unified Bootloader, version 2 (Open Firmware 
binaries)
 grub-linuxbios - GRand Unified Bootloader, version 2 (dummy package)
 grub-mount-udeb - export GRUB filesystems using FUSE (udeb)
 grub-pc- GRand Unified Bootloader, version 2 (PC/BIOS version)
 grub-pc-bin - GRand Unified Bootloader, version 2 (PC/BIOS binaries)
 grub-rescue-pc - GRUB bootable rescue images, version 2 (PC/BIOS version)
 grub-yeeloong - GRand Unified Bootloader, version 2 (Yeeloong version)
 grub-yeeloong-bin - GRand Unified Bootloader, version 2 (Yeeloong binaries)
 grub2  - GRand Unified Bootloader, version 2 (dummy package)
 grub2-common - GRand Unified Bootloader (common files for version 2)
Closes: 696962
Changes: 
 grub2 (1.99-25) unstable; urgency=low
 .
   * Ensure /boot/grub exists before copying files to it for EFI installs
 (closes: #696962).
Checksums-Sha1: 
 a0c39f27bfb97f3ab2596af0ce924f80db50f88a 3757 grub2_1.99-25.dsc
 9ecf5631b9cb63aac2ad02d9ab8d0d42c30d00e9 420

Bug#685625: libgeom: may cause segfault of grub-probe

2012-12-29 Thread Steven Chamberlain
On 29/12/12 23:56, Christoph Egger wrote:
> Steven, SVN has fixes for #694374 and #695679
> already. do you intent these for wheezy?

Yes, please.

They are not RC severity but sufficiently important for release, and in
particular #695679 should be fixed for people doing squeeze->wheezy
upgrades of jail systems.

> If so let's add #696514 and
> potentially the implicit declarations and get it uploaded as well.

I think it is beneficial, yes.  And as minimal as it can be.

There are some remaining implicit declarations, but are more complex,
therefore I'm leaving those as they are and I haven't enabled the
-Werror flag for this package yet.

Thanks!
Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#685625: marked as done ([kfreebsd] libgeom: may cause segfault of grub-probe)

2012-12-29 Thread Debian Bug Tracking System
Your message dated Sun, 30 Dec 2012 00:02:58 +
with message-id 
and subject line Bug#685625: fixed in freebsd-libs 9.0+ds1-4
has caused the Debian Bug report #685625,
regarding [kfreebsd] libgeom: may cause segfault of grub-probe
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
685625: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685625
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: kfreebsd-image-9.0-2-amd64
Version: 9.0-5
Severity: important

Dear Maintainer,

When using "apt-get upgrade" to get the latest version of
kfreebsd-image-9.0-2-amd64, the package segfaults in the "configure"
stage.

,
| # dpkg --configure kfreebsd-image-9.0-2-amd64
| Setting up kfreebsd-image-9.0-2-amd64 (9.0-5) ...
| run-parts: executing /etc/kernel/postinst.d/apt-dater-host_reboot 9.0-2-amd64 
/boot/kfreebsd-9.0-2-amd64.gz
| run-parts: executing /etc/kernel/postinst.d/zz-update-grub 9.0-2-amd64 
/boot/kfreebsd-9.0-2-amd64.gz
| Segmentation fault
| Segmentation fault
| Generating grub.cfg ...
| Found kernel of FreeBSD: /boot/kfreebsd-9.0-2-amd64.gz
| Found kernel module directory: /lib/modules/9.0-2-amd64
| Segmentation fault
| Segmentation fault
| Segmentation fault
| ls: cannot access /lib/modules/9.0-2-amd64/unknown.ko: No such file or 
directory
| run-parts: /etc/kernel/postinst.d/zz-update-grub exited with return code 2
| dpkg: error processing kfreebsd-image-9.0-2-amd64 (--configure):
|  subprocess installed post-installation script returned error exit status 1
| Errors were encountered while processing:
|  kfreebsd-image-9.0-2-amd64
`

Not sure if I dare reboot, but will assist with debugging if needed.

Thanks

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: kfreebsd-amd64 (x86_64)

Kernel: kFreeBSD 9.0-1-amd64
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages kfreebsd-image-9.0-2-amd64 depends on:
ii  devd   9.0+ds1-7
ii  freebsd-utils  9.0+ds1-7
ii  kbdcontrol 9.0+ds1-7
ii  kldutils   9.0+ds1-7

kfreebsd-image-9.0-2-amd64 recommends no packages.

kfreebsd-image-9.0-2-amd64 suggests no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: freebsd-libs
Source-Version: 9.0+ds1-4

We believe that the bug you reported is fixed in the latest version of
freebsd-libs, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 685...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christoph Egger  (supplier of updated freebsd-libs 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sat, 29 Dec 2012 15:49:19 -0800
Source: freebsd-libs
Binary: libsbuf6 libsbuf6-udeb libsbuf-dev libcam6 libcam-dev libgeom1 
libgeom-dev libgeom1-udeb libusbhid4debian libusbhid-common libusbhid-dev 
libusb2debian libusb2-dev libusb2debian-udeb libkvm0 libkvm-dev libdevstat7 
libdevstat-dev libmemstat3 libmemstat-dev libnetgraph4 libnetgraph-dev libipx2 
libipx-dev libipx2-udeb libkiconv4 libkiconv-dev libjail1 libjail-dev libalias7 
libalias-dev
Architecture: source kfreebsd-amd64 all
Version: 9.0+ds1-4
Distribution: unstable
Urgency: low
Maintainer: GNU/kFreeBSD Maintainers 
Changed-By: Christoph Egger 
Description: 
 libalias-dev - Development files for libalias
 libalias7  - FreeBSD packet aliasing library
 libcam-dev - Development files for libcam
 libcam6- FreeBSD CAM (Common Access Method) library
 libdevstat-dev - Development files for libdevstat
 libdevstat7 - FreeBSD devstat (kernel interface) library
 libgeom-dev - Development files for libgeom
 libgeom1   - FreeBSD GEOM library
 libgeom1-udeb - FreeBSD GEOM library (udeb) (udeb)
 libipx-dev - Development files for libipx
 libipx2- FreeBSD IPX address conversion support library
 libipx2-udeb - FreeBSD IPX address conversion support library (udeb) (udeb)
 libjail-dev - Development files for libjail
 libjail1   - FreeBSD jail library
 libkiconv-dev - Development files for libkiconv
 libkiconv4 - FreeBSD kernel side iconv library (udeb)
 libkvm-dev - Development files for libkvm
 libk

Processed: autoconf2.59: diff for NMU version 2.59+dfsg-0.1

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 695704 + patch
Bug #695704 [src:autoconf2.59] autoconf2.59: includes non-free documentation 
(GFDL with unmodifiable sections)
Added tag(s) patch.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
695704: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695704
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#685625: libgeom: may cause segfault of grub-probe

2012-12-29 Thread Christoph Egger
Christoph Egger  writes:
>   I'd like to hear -release@'s opinion on that. Do you prefer the
> smaller patch only fixing the implicit declarations/includes where we
> know it has caused this segfaults or can I upload the full change below?

Oh sorry I should read more carefull. That's of course a diff for a
different package (-utils vs -libs). I'm still inclined to also upload
-utils with that diff. Steven, SVN has fixes for #694374 and #695679
already. do you intent these for wheezy? If so let's add #696514 and
potentially the implicit declarations and get it uploaded as well.

Regards

Christoph


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: limit source to autoconf2.59, tagging 695704

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> #autoconf2.59 (2.59+dfsg-0.1) UNRELEASED; urgency=low
> #
> #  * Remove non DFSG-compliant doc/autoconf.* from source. (Closes: #695704)
> #
> limit source autoconf2.59
Limiting to bugs with field 'source' containing at least one of 'autoconf2.59'
Limit currently set to 'source':'autoconf2.59'

> tags 695704 + pending
Bug #695704 [src:autoconf2.59] autoconf2.59: includes non-free documentation 
(GFDL with unmodifiable sections)
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
695704: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695704
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#675845: marked as done (adanaxisgpl: FTBFS:)

2012-12-29 Thread Debian Bug Tracking System
Your message dated Sat, 29 Dec 2012 23:47:34 +
with message-id 
and subject line Bug#675845: fixed in adanaxisgpl 1.2.5.dfsg.1-5
has caused the Debian Bug report #675845,
regarding adanaxisgpl: FTBFS:
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
675845: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=675845
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:adanaxisgpl
Version: 1.2.5.dfsg.1-4.1
Severity: serious
Tags: sid wheezy
User: debian-...@lists.debian.org
Usertags: kfreebsd
X-Debbugs-Cc: debian-...@lists.debian.org
Justification: fails to build from source (but built successfully in the past)

Hi!

Your package failed to build on the kfreebsd-* buildds:

gcc -DHAVE_CONFIG_H -I. -I..   -DMUSH_DATA_DIR=\"/usr/share/games\" 
-I/usr/include/SDL -D_GNU_SOURCE=1 -D_REENTRANT -I. -I./API -DNDEBUG  
-I./Platform/X11  -DMUSH_DATA_DIR=\"/usr/share/games\" -g -O2 -I. -I./API 
-DNDEBUG -c -o io.o `test -f 'MushRuby/io.c' || echo './'`MushRuby/io.c
In file included from /usr/include/sys/kern/param.h:67:0,
 from /usr/include/osreldate.h:1,
 from /usr/include/i386-kfreebsd-gnu/sys/param.h:39,
 from MushRuby/io.c:91:
/usr/include/sys/kern/types.h:189:18: error: two or more data types in 
declaration specifiers

Full build log at
https://buildd.debian.org/status/fetch.php?pkg=adanaxisgpl&arch=kfreebsd-i386&ver=1.2.5.dfsg.1-4.1&stamp=1338283407

Regards

Christoph

If you have further questions please mail debian-...@lists.debian.org

-- 
9FED 5C6C E206 B70A 5857  70CA 9655 22B9 D49A E731
Debian Developer | Lisp Hacker | CaCert Assurer


--- End Message ---
--- Begin Message ---
Source: adanaxisgpl
Source-Version: 1.2.5.dfsg.1-5

We believe that the bug you reported is fixed in the latest version of
adanaxisgpl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 675...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christoph Egger  (supplier of updated adanaxisgpl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sat, 29 Dec 2012 14:20:57 -0800
Source: adanaxisgpl
Binary: adanaxisgpl adanaxisgpl-data
Architecture: source kfreebsd-amd64 all
Version: 1.2.5.dfsg.1-5
Distribution: unstable
Urgency: low
Maintainer: Debian Games Team 
Changed-By: Christoph Egger 
Description: 
 adanaxisgpl - Action game in four spatial dimensions
 adanaxisgpl-data - Action game in four spatial dimensions
Closes: 675845
Changes: 
 adanaxisgpl (1.2.5.dfsg.1-5) unstable; urgency=low
 .
   * Team Upload
   * Fix FTBFS on kFreeBSD (Closes: #675845)
 Thanks to Steven Chamberlain for the patch
Checksums-Sha1: 
 f082f76bd1c423caea43f5c6c107073131800d6b 2273 adanaxisgpl_1.2.5.dfsg.1-5.dsc
 276b377988836eec440f8c94aafff4ff7c0acb49 16886 
adanaxisgpl_1.2.5.dfsg.1-5.debian.tar.gz
 a15f2d132abd73aed009237e69734bb190ce4622 1546362 
adanaxisgpl_1.2.5.dfsg.1-5_kfreebsd-amd64.deb
 e89caaefa7899c05aa15c399eb5652f0146de4ec 18349320 
adanaxisgpl-data_1.2.5.dfsg.1-5_all.deb
Checksums-Sha256: 
 6aeb7b9f5938053f3e5ffc61224857333a573aeca6f44c8ec9a2140d6bde7574 2273 
adanaxisgpl_1.2.5.dfsg.1-5.dsc
 13991bc9dbf55b466a373d191585d3e41eee7ddcd86b8f07aa95d77ab9c0c3c1 16886 
adanaxisgpl_1.2.5.dfsg.1-5.debian.tar.gz
 3a4be99ee1830e39b836c37a7d25f358dd41efca9605d9a2e3009541edff4234 1546362 
adanaxisgpl_1.2.5.dfsg.1-5_kfreebsd-amd64.deb
 395a4965bd46b7701d064f9d96a23d2f1ce36897fa9b039f616a594b2629f862 18349320 
adanaxisgpl-data_1.2.5.dfsg.1-5_all.deb
Files: 
 7106d4f26875a9db8384d02c81844ede 2273 games optional 
adanaxisgpl_1.2.5.dfsg.1-5.dsc
 4193fc49aed9ec554cf7f03b13953d91 16886 games optional 
adanaxisgpl_1.2.5.dfsg.1-5.debian.tar.gz
 61a2293b95eeb377e7589161cfcdefad 1546362 games optional 
adanaxisgpl_1.2.5.dfsg.1-5_kfreebsd-amd64.deb
 e412ac4eec60dd8f86bdf5c7076aa76d 18349320 games optional 
adanaxisgpl-data_1.2.5.dfsg.1-5_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/kFreeBSD)

iQIcBAEBCAAGBQJQ335OAAoJEKv/7bJACMb5WCsQALFjnKMOs3MuNbrwrMt2l1pF
/zIQzMdWUbKKAbkvkRG33R1DGMy4hjbPAUuBoSy7QDEb9up+H753y73KWf/F9DQL
yuHGlg5BHZZKSEepNbR95FIPObEny4pd/D4oB6z/33sQwnne3w+lCx/UmiJK/deo
tyXj

Processed: found 696962 in 2.00-8

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> found 696962 2.00-8
Bug #696962 [grub-efi-amd64,grub-efi-ia32] grub-efi-{amd64, ia32}: fails to 
install: cp: cannot create regular file '/boot/grub/': Not a directory
Marked as found in versions grub2/2.00-8.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
696962: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696962
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#696962: grub-efi-{amd64, ia32}: fails to install: cp: cannot create regular file '/boot/grub/': Not a directory

2012-12-29 Thread Andreas Beckmann
Package: grub-efi-amd64,grub-efi-ia32
Version: 1.99-24
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package failed to install. As
per definition of the release team this makes the package too buggy for
a release, thus the severity.

>From the attached log (scroll to the bottom...):

  Selecting previously unselected package grub-efi-amd64.
  (Reading database ... 7077 files and directories currently installed.)
  Unpacking grub-efi-amd64 (from .../grub-efi-amd64_1.99-24_amd64.deb) ...
  Setting up grub-efi-amd64 (1.99-24) ...
  
  Creating config file /etc/default/grub with new version
  cp: cannot create regular file '/boot/grub/': Not a directory
  dpkg: error processing grub-efi-amd64 (--configure):
   subprocess installed post-installation script returned error exit status 1
  Errors were encountered while processing:
   grub-efi-amd64


cheers,

Andreas


grub-efi-amd64_1.99-24.log.gz
Description: GNU Zip compressed data


Processed: tagging 695701

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 695701 - pending
Bug #695701 [src:kdesdk] kdesdk: includes non-free documentation (GFDL with 
invariant sections)
Removed tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
695701: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695701
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#696446: nmap: Errors out at startup if running as root and there is a network interface in monitor mode

2012-12-29 Thread Daniel Franke
Hilko Bengen  writes off-list:

> I have attached the .diff.gz. Are you able to build binary .deb packages
> or should I provide a .deb?

I've built and tested it. It works.

Note: the errors below from sendto are normal. They're caused by a
firewall rule on my router.

root@cascade:/home/dfranke# ifconfig mon.wlan0
mon.wlan0 Link encap:UNSPEC  HWaddr 
F8-D1-11-19-DD-F6-B0-6E-00-00-00-00-00-00-00-00  
  UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
  RX packets:7226684 errors:0 dropped:0 overruns:0 frame:0
  TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
  collisions:0 txqueuelen:1000 
  RX bytes:1048411222 (999.8 MiB)  TX bytes:0 (0.0 B)

root@cascade:/home/dfranke# apt-get purge nmap
Reading package lists... Done
Building dependency tree   
Reading state information... Done
The following packages will be REMOVED:
  nmap*
0 upgraded, 0 newly installed, 1 to remove and 0 not upgraded.
After this operation, 17.4 MB disk space will be freed.
Do you want to continue [Y/n]? 
(Reading database ... 93326 files and directories currently installed.)
Removing nmap ...
Processing triggers for man-db ...
root@cascade:/home/dfranke# dpkg --install nmap_6.00-0.3_amd64.deb
Selecting previously unselected package nmap.
(Reading database ... 92696 files and directories currently installed.)
Unpacking nmap (from nmap_6.00-0.3_amd64.deb) ...
Setting up nmap (6.00-0.3) ...
Processing triggers for man-db ...
root@cascade:/home/dfranke# nmap --version

Nmap version 6.00 ( http://nmap.org )
Platform: x86_64-unknown-linux-gnu
Compiled with: liblua-5.1.5 openssl-1.0.1c libpcre-8.30 libpcap-1.3.0 
nmap-libdnet-1.12 ipv6
Compiled without:
root@cascade:/home/dfranke# nmap scanme.nmap.org

Starting Nmap 6.00 ( http://nmap.org ) at 2012-12-29 18:01 EST
sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, 74.207.244.221, 16) => 
Operation not permitted
Offending packet: TCP 98.110.150.34:42418 > 74.207.244.221:25 S ttl=46 id=39742 
iplen=44  seq=3342432888 win=1024 
sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, 74.207.244.221, 16) => 
Operation not permitted
Offending packet: TCP 98.110.150.34:42419 > 74.207.244.221:25 S ttl=37 id=980 
iplen=44  seq=3342367353 win=1024 
sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, 74.207.244.221, 16) => 
Operation not permitted
Offending packet: TCP 98.110.150.34:42420 > 74.207.244.221:25 S ttl=55 id=26664 
iplen=44  seq=3342563962 win=1024 
Nmap scan report for scanme.nmap.org (74.207.244.221)
Host is up (0.090s latency).
Not shown: 996 closed ports
PORT STATESERVICE
22/tcp   open ssh
25/tcp   filtered smtp
80/tcp   open http
9929/tcp open nping-echo

Nmap done: 1 IP address (1 host up) scanned in 4.36 seconds


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#696820: Acknowledgement (Error: open(/var/mail/USER) failed: Permission denied)

2012-12-29 Thread Norbert Veber
Actually it didnt exist, the directory is empty:
nveber@pyre[4761:~]$ ls -al /var/mail
total 8
drwxrwsr-x  2 root mail 4096 Jul  8  2010 .
drwxr-xr-x 13 root root 4096 Nov  4 22:22 ..
nveber@pyre[4762:~]$

It seems the default mail_location doesnt work for some reason at least
on my system.

On Fri, Dec 28, 2012 at 08:10:55PM -0500, Jaldhar H. Vyas wrote:
> Normally it would be a non-fatal error but your /var/mail/%u did
> exist but didn't have write permission.
> 
> Set mail_location appropriately and everything should work properly
> now and in the future.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#696420: python-gmsh: undefined symbol: mca_base_param_reg_int

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 696420 normal
Bug #696420 [python-gmsh] python-gmsh: undefined symbol: mca_base_param_reg_int
Severity set to 'normal' from 'grave'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
696420: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696420
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: limit source to kdesdk, tagging 695701

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> #kdesdk (4:4.8.4+dfsg-0.1) unstable; urgency=low
> #
> #  * Remove unused and non DFSG-compliant 
> scripts/kde-emacs/kde-emacs-tips.texi
> #from source. (Closes: #695701)
> #
> limit source kdesdk
Limiting to bugs with field 'source' containing at least one of 'kdesdk'
Limit currently set to 'source':'kdesdk'

> tags 695701 + pending
Bug #695701 [src:kdesdk] kdesdk: includes non-free documentation (GFDL with 
invariant sections)
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
695701: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695701
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#696420: python-gmsh: undefined symbol: mca_base_param_reg_int

2012-12-29 Thread Anton Gladky
severity 696420 normal
thanks

As Christophe said, the information about using this package
is in README.Debian. We know about this problem as it
persists since the beginning of this binary. And we would be
happy to get a suggestion, how can it be fixed without this
workaround.

Thanks,

Anton


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: Re: virtualbox-source: Virtualbox does not compile with 3.7 kernels

2012-12-29 Thread Debian Bug Tracking System
Processing control commands:

> severity -1 important
Bug #696953 [virtualbox-source] virtualbox-source: Virtualbox does not compile 
with 3.7 kernels
Severity set to 'important' from 'serious'

-- 
696953: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696953
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#696953: virtualbox-source: Virtualbox does not compile with 3.7 kernels

2012-12-29 Thread Ivo De Decker
Control: severity -1 important

Hi,

On Sat, Dec 29, 2012 at 10:33:28PM +0100, Isaac Jurado wrote:
> Severity: serious
> Justification: fails to build from source (but built successfully in the past)

As there is currently no 3.7 kernel in wheezy or sid, this justification is
not correct. Downgrading.

Cheers,

Ivo


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#654341: marked as done (inkscape reads .eps files from /tmp instead of the current directory)

2012-12-29 Thread Debian Bug Tracking System
Your message dated Sat, 29 Dec 2012 22:17:43 +
with message-id 
and subject line Bug#654341: fixed in inkscape 0.48.3.1-1.3
has caused the Debian Bug report #654341,
regarding inkscape reads .eps files from /tmp instead of the current directory
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
654341: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=654341
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: inkscape
Version: 0.48.1-2.1+b1
Severity: grave
Tags: security
Justification: user security hole

When I want to open a .eps file with something like

  inkscape file.eps

inkscape tries to open the file from /tmp instead of the current
directory (if the file doesn't exist, I get a ghostscript error from
ps2pdf, which is the same error as when ps2pdf is run manually).

According to strace, inkscape does a chdir to /tmp before running
ps2pdf on the argument, hence the problem.

The security problem is that the user A may open a file belonging
to some user B from /tmp, which can contain incorrect data, an
offensive image and so on. It can also be a symbolic link to some
protected file of user A (which may inadvertently diffused to other
users) or to some other special file that shouldn't be read, such as
/proc//fd/0, which can make program  behave incorrectly.

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 
'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.1.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=POSIX, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages inkscape depends on:
ii  libaspell15 0.60.7~20110707-1
ii  libatk1.0-0 2.2.0-2
ii  libatkmm-1.6-1  2.22.6-1
ii  libc6   2.13-24
ii  libcairo2   1.10.2-6.2
ii  libcairomm-1.0-11.10.0-1
ii  libfontconfig1  2.8.0-3
ii  libfreetype62.4.8-1
ii  libgc1c21:7.1-8
ii  libgcc1 1:4.6.2-9
ii  libgconf2-4 3.2.3-1
ii  libgdk-pixbuf2.0-0  2.24.0-2
ii  libglib2.0-02.30.2-4
ii  libglibmm-2.4-1c2a  2.30.0-2
ii  libgnomevfs2-0  1:2.24.4-1
ii  libgomp14.6.2-9
ii  libgsl0ldbl 1.15+dfsg-1
ii  libgtk2.0-0 2.24.8-2
ii  libgtkmm-2.4-1c2a   1:2.24.2-1
ii  libgtkspell02.0.16-1
ii  liblcms11.19.dfsg-1+b1
ii  libmagick++48:6.6.9.7-5+b2
ii  libmagickcore4  8:6.6.9.7-5+b2
ii  libpango1.0-0   1.29.4-2
ii  libpangomm-1.4-12.28.4-1
ii  libpng12-0  1.2.46-3
ii  libpoppler-glib60.16.7-2+b1
ii  libpoppler130.16.7-2+b1
ii  libpopt01.16-3
ii  libsigc++-2.0-0c2a  2.2.9-1.1
ii  libstdc++6  4.6.2-9
ii  libwpd-0.9-90.9.4-1
ii  libwpg-0.2-20.2.1-1
ii  libx11-62:1.4.4-4
ii  libxml2 2.7.8.dfsg-5.1
ii  libxslt1.1  1.1.26-8
ii  zlib1g  1:1.2.3.4.dfsg-3

Versions of packages inkscape recommends:
ii  aspell   0.60.7~20110707-1
ii  imagemagick  8:6.6.9.7-5+b2
ii  libwmf-bin   
ii  perlmagick   
ii  pstoedit 3.60-1

Versions of packages inkscape suggests:
pn  dia | dia-gnome  
pn  libgnomevfs2-extra   1:2.24.4-1
pn  libsvg-perl  
pn  libxml-xql-perl  
pn  python   2.7.2-9
pn  python-lxml  
pn  python-numpy 1:1.5.1-3
pn  python-uniconvertor  
pn  ruby 4.8
pn  ruby1.8 [ruby]   1.8.7.352-2
pn  skencil  

-- no debconf information


--- End Message ---
--- Begin Message ---
Source: inkscape
Source-Version: 0.48.3.1-1.3

We believe that the bug you reported is fixed in the latest version of
inkscape, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 654...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
John Paul Adrian Glaubitz  (supplier of updated 
inkscape package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sat, 29 Dec 2012 19:15:46 +0100
Source: inkscape
Binary: inkscape
Architecture: source amd64
Version: 0.48.3.1-1.3
Distribution: unstable
Urgency: low
Maintainer: Wolfram Quester 
Changed-By: John Pau

Bug#696483: Uploaded to DELAYED/7

2012-12-29 Thread Frank Habermann
Hi,

> I've uploaded a NMU with the patch above to DELAYED/7.
Thanks for your patch and the work and sorry for delayed answer.
Christmas holidays and family ;)
Now, i am sitting on a patch for stable/squeeze.

regards,
Frank


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#695963: marked as done (magics++: FTBFS: configure error)

2012-12-29 Thread Debian Bug Tracking System
Your message dated Sat, 29 Dec 2012 22:03:00 +
with message-id 
and subject line Bug#695963: fixed in magics++ 2.18.7-2
has caused the Debian Bug report #695963,
regarding magics++: FTBFS: configure error
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
695963: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695963
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:magics++
Version: 2.18.7-1
Severity: serious
Justification: fails to build from source (but built successfully in the past)

Hi!

Your package failed to build on the buildds:

checking for pbopen in -lemosR64... yes
Emoslib found.
checking for pj_init in -lproj... no
configure: error: Proj4 could not be linked! 
"tail -v -n +0 config.log"

Full build log at
https://buildd.debian.org/status/fetch.php?pkg=magics%2B%2B&arch=amd64&ver=2.18.7-1&stamp=1355221432

Regards

Christoph

-- 
--- End Message ---
--- Begin Message ---
Source: magics++
Source-Version: 2.18.7-2

We believe that the bug you reported is fixed in the latest version of
magics++, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 695...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alastair McKinstry  (supplier of updated magics++ package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 18 Dec 2012 11:54:23 +
Source: magics++
Binary: libmagplus3 libmagics++-dev magics++ python-magics++ libmagics++-data
Architecture: source i386 all
Version: 2.18.7-2
Distribution: unstable
Urgency: low
Maintainer: Alastair McKinstry 
Changed-By: Alastair McKinstry 
Description: 
 libmagics++-data - Data files needed for magics++ library
 libmagics++-dev - Development files for ECMWF  plotting software MAGICS++
 libmagplus3 - ECMWF meteorological plotting software library
 magics++   - Executables for the magics++ library
 python-magics++ - python support for Magics++
Closes: 695963
Changes: 
 magics++ (2.18.7-2) unstable; urgency=low
 .
   * libproj-dev is now a requirement, not optional. Include it.
 Closes: #695963.
   * Enable hardening.
   * Don't ship empty dir /usr/share/magics in -dev package.
   * -data package is now M-A: foreign to satisfy m-a dependencies.
Checksums-Sha1: 
 52481da5dcabd869271a275ebd4a58ff75fdb4a3 2422 magics++_2.18.7-2.dsc
 ed3b1a105ff28cd4f9730b31fb01795237714e23 12296 magics++_2.18.7-2.debian.tar.xz
 dbee9a6c35d02b0b0e2ad5c40d27f6fafa0e222d 3406268 libmagplus3_2.18.7-2_i386.deb
 b96cb22a4d079ff2531486cdbaf08dd611da3378 8765812 
libmagics++-dev_2.18.7-2_i386.deb
 e552f5f20017b00f3954bcabb13475c7db8f40f7 38448 magics++_2.18.7-2_i386.deb
 d9f4778d9b4bd69b2da54c4fed8cbc74def2dd0e 83970 
python-magics++_2.18.7-2_i386.deb
 3e637344c5bd23935fba489a33c20be6b34af08e 25340222 
libmagics++-data_2.18.7-2_all.deb
Checksums-Sha256: 
 edab7eb429ba58c45d825585a531dfad6743c715923e51c0f90988d02399e6e6 2422 
magics++_2.18.7-2.dsc
 2ae9d507833c5b88d3a24bef4e5c3879c2b23216ee59323805184de7a4395363 12296 
magics++_2.18.7-2.debian.tar.xz
 a488f64199b36dd3b0f60571bbf974d5812ace72db3773665d7b86072b3b7102 3406268 
libmagplus3_2.18.7-2_i386.deb
 b578074441204d09255f805f05e3738e0cd257376fdc646bd2b1f97b7a187f45 8765812 
libmagics++-dev_2.18.7-2_i386.deb
 9355b5283ac03852926a97db4d500fe56ffb4a94039d19a2a54d0e70dd8139bf 38448 
magics++_2.18.7-2_i386.deb
 63fdc93f19accad629eaff3132e9b4b46fc87bf26c4eb36e55b4c238dfeb07ec 83970 
python-magics++_2.18.7-2_i386.deb
 02ebf23c78274fbde31e0555d33d520ea870283b330abe2d0bed0ed9045f79a9 25340222 
libmagics++-data_2.18.7-2_all.deb
Files: 
 0a86aa579f681188e1c69285dbf588e5 2422 utils optional magics++_2.18.7-2.dsc
 5c888189e4d6e3e235297c5012982e73 12296 utils optional 
magics++_2.18.7-2.debian.tar.xz
 6f44c52b5efd44e3c7ad585cbcae9a9c 3406268 libs optional 
libmagplus3_2.18.7-2_i386.deb
 aa762e77a3a3424761c809b468cab288 8765812 libdevel optional 
libmagics++-dev_2.18.7-2_i386.deb
 59964d7b2c640013814a3bed567ee11d 38448 utils optional 
magics++_2.18.7-2_i386.deb
 46b109308051e1cfed7fab08a946eb89 83970 python optional 
python-magics++_2.18.7-2_i386.deb
 c335e628fabd9b1b4c02026e6c0e1329 25340222 utils optional 
libmagics++-data_2.18.7-2_a

Bug#685625: libgeom: may cause segfault of grub-probe

2012-12-29 Thread Christoph Egger
Hi all!

  I'd like to hear -release@'s opinion on that. Do you prefer the
smaller patch only fixing the implicit declarations/includes where we
know it has caused this segfaults or can I upload the full change below?

Regards

Christoph

Steven Chamberlain  writes:
> This is a multi-part message in MIME format.
> --030202080401090604090105
> Content-Type: text/plain; charset=ISO-8859-1
> Content-Transfer-Encoding: 7bit
>
> On 29/12/12 16:47, Steven Chamberlain wrote:
>> I can provide a similar patch for freebsd-utils which has the same
>> issues, but the only problem I could confirm yet was a segfault in
>> ifconfig bridge configuration (#696514) due to it.
>
> Attached is a similar patch for freebsd-utils, fixing implicit
> declarations that are due to libbsd no longer being used.  Should we
> apply it?
>
> The warnings are potentially serious, but I don't know of any specific
> bugs that this will fix.  (#696514 turned out not to be due to these).
>
> Regards,
> -- 
> Steven Chamberlain
> ste...@pyro.eu.org
>
> --030202080401090604090105
> Content-Type: text/x-patch;
>  name="implicit-declaration.patch"
> Content-Transfer-Encoding: 7bit
> Content-Disposition: attachment;
>  filename="implicit-declaration.patch"
>
> Index: freebsd-utils-9.0+ds1/usr.sbin/mountd/mountd.c
> ===
> --- freebsd-utils-9.0+ds1.orig/usr.sbin/mountd/mountd.c   2012-12-29 
> 19:56:58.0 +
> +++ freebsd-utils-9.0+ds1/usr.sbin/mountd/mountd.c2012-12-29 
> 20:05:01.478673213 +
> @@ -80,6 +80,8 @@
>  #include 
>  #include 
>  #include 
> +#include 
> +
>  #include "pathnames.h"
>  #include "mntopts.h"
>  
> Index: freebsd-utils-9.0+ds1/usr.sbin/vidcontrol/vidcontrol.c
> ===
> --- freebsd-utils-9.0+ds1.orig/usr.sbin/vidcontrol/vidcontrol.c   
> 2010-03-29 21:12:44.0 +0100
> +++ freebsd-utils-9.0+ds1/usr.sbin/vidcontrol/vidcontrol.c2012-12-29 
> 20:05:04.610607859 +
> @@ -48,6 +48,8 @@
>  #include 
>  #include 
>  #include 
> +#include 
> +
>  #include "path.h"
>  #include "decode.h"
>  
> Index: freebsd-utils-9.0+ds1/usr.sbin/ppp/defs.c
> ===
> --- freebsd-utils-9.0+ds1.orig/usr.sbin/ppp/defs.c2004-09-05 
> 02:46:52.0 +0100
> +++ freebsd-utils-9.0+ds1/usr.sbin/ppp/defs.c 2012-12-29 20:00:01.091748618 
> +
> @@ -47,6 +47,7 @@
>  #include 
>  #endif
>  #include 
> +#include 
>  
>  #if defined(__FreeBSD__) && !defined(NOKLDLOAD)
>  #include "id.h"
> Index: freebsd-utils-9.0+ds1/usr.sbin/nfsd/nfsd.c
> ===
> --- freebsd-utils-9.0+ds1.orig/usr.sbin/nfsd/nfsd.c   2012-12-29 
> 19:56:58.0 +
> +++ freebsd-utils-9.0+ds1/usr.sbin/nfsd/nfsd.c2012-12-29 
> 20:00:04.194641584 +
> @@ -71,6 +71,7 @@
>  #include 
>  #include 
>  #include 
> +#include 
>  
>  /* Global defs */
>  #ifdef DEBUG
> Index: freebsd-utils-9.0+ds1/usr.sbin/arp/arp.c
> ===
> --- freebsd-utils-9.0+ds1.orig/usr.sbin/arp/arp.c 2012-12-29 
> 19:56:58.0 +
> +++ freebsd-utils-9.0+ds1/usr.sbin/arp/arp.c  2012-12-29 20:00:07.442606898 
> +
> @@ -80,6 +80,7 @@
>  #include 
>  #include 
>  #include 
> +#include 
>  
>  typedef void (action_fn)(struct sockaddr_dl *sdl,
>   struct sockaddr_inarp *s_in, struct rt_msghdr *rtm);
> Index: freebsd-utils-9.0+ds1/usr.sbin/rpc.lockd/kern.c
> ===
> --- freebsd-utils-9.0+ds1.orig/usr.sbin/rpc.lockd/kern.c  2012-12-29 
> 19:56:58.0 +
> +++ freebsd-utils-9.0+ds1/usr.sbin/rpc.lockd/kern.c   2012-12-29 
> 20:00:14.848822213 +
> @@ -52,6 +52,7 @@
>  #include 
>  #include 
>  #include 
> +#include 
>  
>  #include 
>  #include 
> Index: freebsd-utils-9.0+ds1/usr.sbin/pppctl/pppctl.c
> ===
> --- freebsd-utils-9.0+ds1.orig/usr.sbin/pppctl/pppctl.c   2004-12-13 
> 14:50:13.0 +
> +++ freebsd-utils-9.0+ds1/usr.sbin/pppctl/pppctl.c2012-12-29 
> 20:00:17.754640690 +
> @@ -48,6 +48,7 @@
>  #include 
>  #include 
>  #include 
> +#include 
>  
>  #define LINELEN 2048
>  
> Index: freebsd-utils-9.0+ds1/usr.bin/kdump/kdump.c
> ===
> --- freebsd-utils-9.0+ds1.orig/usr.bin/kdump/kdump.c  2012-12-29 
> 19:56:58.0 +
> +++ freebsd-utils-9.0+ds1/usr.bin/kdump/kdump.c   2012-12-29 
> 20:05:19.540626059 +
> @@ -83,6 +83,8 @@
>  #include 
>  #include 
>  #include 
> +#include 
> +
>  #include "ktrace.h"
>  #include "kdump_subr.h"
>  
> Index: freebsd-utils-9.0+ds1/sbin/geom/core/geom.c
> ===
> --- freebsd-utils-9.0+d

Bug#696920: briquolo: incomplete debian/copyright

2012-12-29 Thread Markus Koschany
Hi Bart,

thanks for your report. The DejaVuSans.ttf file gets removed during
build time in debian/rules. Therefore the package depends on ttf-dejavu
and just links to usr/share/fonts/truetype/ttf-dejavu/DejaVuSans.ttf
accordingly. I presume the copyright file in ttf-dejavu covers the issue.

Alternatively i can remove the font file completely from the sources.
What do you prefer?

You are right regarding the intl directory and the LGPL license. I will
prepare a NMU for briquolo and ask for sponsorship at mentors soon.

Regards,

Markus



signature.asc
Description: OpenPGP digital signature


Bug#664225: Bug reproducible

2012-12-29 Thread Christian PERRIER
I can reproduce this bug. No idea what are those "Google gadgets"
aboutbut definitely trying to "download" some makes plasma-desktop
crash very consistently.

-- 





signature.asc
Description: Digital signature


Bug#696446: nmap: Errors out at startup if running as root and there is a network interface in monitor mode

2012-12-29 Thread Daniel Franke
Hilko Bengen  writes:

> I have just uploaded 6.00-0.3 to DELAYED/5. If/when it hits unstable,
> I'll ask the release team for a freeze exception.


Thanks Hilko. I'll install this package on my wireless router and verify
that it works for me.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#646704: Bug severity is too high

2012-12-29 Thread Daniel Baumann
On 12/29/2012 10:33 PM, Samuel Thibault wrote:
> As Christian said, it's not just a bug "in live-installer", but "with
> crypted volume", which makes it much less grave.

the purpose of live-installer is to be able to use d-i to install
live-images. like i said, if that fails (by an original bug in
live-installer or by lacking a workaround in live-installer for
something else in d-i), it's serious.

if the bug is not to be fixed (or workarounded) in live-installer, the
bug needs to be reassigned (please do so; and then i don't care about
the severity, as it's none of the packages i'm looking after).

-- 
Address:Daniel Baumann, Donnerbuehlweg 3, CH-3012 Bern
Email:  daniel.baum...@progress-technologies.net
Internet:   http://people.progress-technologies.net/~daniel.baumann/


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#646704: Bug severity is too high

2012-12-29 Thread Daniel Baumann
On 12/29/2012 10:10 PM, Christian PERRIER wrote:
> Which probably explains why you haven't done anything since
> September, I guess.

i for my part have clearly said publicly many times when i'm going to
work on live-installer parts (when the other live-* parts are done,
that is), so that's no surprise there.

since you put yourself into uploaders of live-installer some time ago,
maybe you want to look at it yourself too?

> Sorry, I'm still deeply convinced that this issue is mostly a case 
> that doesn't deserve an RC severity. I'll downgrade this bug again
> in 4 weeks if nothing happened in the meantime.

should that be the case, i'll restore the original severity of course.

-- 
Address:Daniel Baumann, Donnerbuehlweg 3, CH-3012 Bern
Email:  daniel.baum...@progress-technologies.net
Internet:   http://people.progress-technologies.net/~daniel.baumann/


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#696953: virtualbox-source: Virtualbox does not compile with 3.7 kernels

2012-12-29 Thread Isaac Jurado
Package: virtualbox-source
Version: 4.1.18-dfsg-1.1
Severity: serious
Tags: upstream
Justification: fails to build from source (but built successfully in the past)

Please send upstream:

The virtualbox-source package, version 4.1.18-dfsg-1.1, fails to build with a
3.7.x kernel.  It complains about an undefined symbol VM_RESERVED.  This
constant was replaced in 3.7, see:

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=314e51b9851b4f4e8ab302243ff5a6fc6147f379

Which is mentioned by:

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=547b1e81afe3119f7daf702cc03b158495535a25

Find an attached patch (generated with quilt) to fix this issue.


-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.6.10 (SMP w/4 CPU cores)
Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages virtualbox-source depends on:
ii  build-essential  11.5
ii  bzip21.0.6-4
ii  debhelper9.20120909
ii  kbuild   1:0.1.9998svn2543-2

Versions of packages virtualbox-source recommends:
pn  module-assistant  

virtualbox-source suggests no packages.

-- no debconf information
Index: modules/virtualbox/r0drv/linux/memobj-r0drv-linux.c
===
--- modules.orig/virtualbox/r0drv/linux/memobj-r0drv-linux.c	2012-12-29 20:05:16.153098332 +0100
+++ modules/virtualbox/r0drv/linux/memobj-r0drv-linux.c	2012-12-29 20:12:14.170179009 +0100
@@ -1448,7 +1448,11 @@
 
 #if   defined(VBOX_USE_INSERT_PAGE) && LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 22)
 rc = vm_insert_page(vma, ulAddrCur, pMemLnxToMap->apPages[iPage]);
+#  if LINUX_VERSION_CODE >= KERNEL_VERSION(3, 7, 0)
+vma->vm_flags |= VM_DONTEXPAND | VM_DONTDUMP; /* This flag helps making 100% sure some bad stuff wont happen (swap, core, ++). */
+#  else
 vma->vm_flags |= VM_RESERVED; /* This flag helps making 100% sure some bad stuff wont happen (swap, core, ++). */
+#  endif
 #elif LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 11)
 rc = remap_pfn_range(vma, ulAddrCur, page_to_pfn(pMemLnxToMap->apPages[iPage]), PAGE_SIZE, fPg);
 #elif defined(VBOX_USE_PAE_HACK)
Index: modules/virtualbox/vboxpci/VBoxPciInternal.h
===
--- modules.orig/virtualbox/vboxpci/VBoxPciInternal.h	2012-10-18 22:46:48.0 +0200
+++ modules/virtualbox/vboxpci/VBoxPciInternal.h	2012-12-29 20:13:55.157199146 +0100
@@ -30,6 +30,7 @@
 #endif
 
 #ifdef VBOX_WITH_IOMMU
+#include 
 #include 
 #include 
 #endif


Bug#646704: Bug severity is too high

2012-12-29 Thread Samuel Thibault
Daniel Baumann, le Sat 29 Dec 2012 20:16:57 +0100, a écrit :
> On 12/29/2012 0502 PM, Christian PERRIER wrote:
> > This bug doesn't fit the definition of "serious" as it only shows up
> > for a precise set of installation types, those not being the most
> > common, particularly when people use the Live CD to install.
> 
> a bug in live-installer which leads to an incomplete installation is
> serious.

As Christian said, it's not just a bug "in live-installer", but "with
crypted volume", which makes it much less grave.

Samuel


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: Bug severity overflated?

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 655757 important
Bug #655757 [korganizer] korganizer: Korganizer Reminder Daemon does not stop 
reminding
Severity set to 'important' from 'grave'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
655757: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655757
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#655757: Bug severity overflated?

2012-12-29 Thread Christian PERRIER
severity 655757 important
thanks

Once again, I think we have here a bug severity that is overflated.

Let's re-read the definition of "grave":

  makes the package in question unusable or mostly so, or causes
  data loss, or introduces a security hole allowing access to the
  accounts of users who use the package.

On the other hand, let's read the definition of "important":
  a bug which has a major effect on the usability of a package,
  without rendering it completely unusable to everyone.

I think this bug deserves to have "important" severity.


-- 




signature.asc
Description: Digital signature


Bug#696446: nmap: Errors out at startup if running as root and there is a network interface in monitor mode

2012-12-29 Thread Hilko Bengen
I have just uploaded 6.00-0.3 to DELAYED/5. If/when it hits unstable,
I'll ask the release team for a freeze exception.

The patch I applied is attached below.

Cheers,
-Hilko

diff --git a/libdnet-stripped/include/dnet/arp.h b/libdnet-stripped/include/dnet/arp.h
index bfb4a64..2f3d0bf 100644
--- a/libdnet-stripped/include/dnet/arp.h
+++ b/libdnet-stripped/include/dnet/arp.h
@@ -39,6 +39,8 @@ struct arp_hdr {
 #define ARP_HRD_ETH 	0x0001	/* ethernet hardware */
 #define ARP_HRD_IEEE802	0x0006	/* IEEE 802 hardware */
 
+#define ARP_HRD_IEEE80211_RADIOTAP 0x0323  /* IEEE 802.11 + radiotap header */
+
 /*
  * Protocol address format
  */
	Modified   libdnet-stripped/src/addr.c
diff --git a/libdnet-stripped/src/addr.c b/libdnet-stripped/src/addr.c
index 7a71345..392d44f 100644
--- a/libdnet-stripped/src/addr.c
+++ b/libdnet-stripped/src/addr.c
@@ -318,6 +318,7 @@ addr_ston(const struct sockaddr *sa, struct addr *a)
 #endif
 	case AF_UNSPEC:
 	case ARP_HRD_ETH:	/* XXX- Linux arp(7) */
+	case ARP_HRD_IEEE80211_RADIOTAP: /* IEEE 802.11 + radiotap header */
 		a->addr_type = ADDR_TYPE_ETH;
 		a->addr_bits = ETH_ADDR_BITS;
 		memcpy(&a->addr_eth, sa->sa_data, ETH_ADDR_LEN);


Bug#646704: Bug severity is too high

2012-12-29 Thread Christian PERRIER
Quoting Daniel Baumann (daniel.baum...@progress-technologies.net):
> severity 646704 serious
> thanks
> 
> On 12/29/2012 0502 PM, Christian PERRIER wrote:
> > This bug doesn't fit the definition of "serious" as it only shows up
> > for a precise set of installation types, those not being the most
> > common, particularly when people use the Live CD to install.
> 
> a bug in live-installer which leads to an incomplete installation is
> serious.

Which probably explains why you haven't done anything since September,
I guess.

Sorry, I'm still deeply convinced that this issue is mostly a case
that doesn't deserve an RC severity. I'll downgrade this bug again in
4 weeks if nothing happened in the meantime.






signature.asc
Description: Digital signature


Bug#654341: inkscape reads .eps files from /tmp instead of the

2012-12-29 Thread John Paul Adrian Glaubitz
Hi,

I have just uploaded inkscape 0.48.3.1-1.3 which includes a patch by
Michael Karcher to address this issue.

We have thoroughly tested the patch and the bug is now
fixed. Further checks show that the patch doesn't have any negative
impact on other areas of the script engine.

The patch makes sure that the relative file names are expanded before
they are passed to external scripts. EPS files are imported by
inkscape by means of an external Python script. The bug is caused by
the script engine assuming the filename passed is absolute and then it
changes the current working directory to the script directory first,
then into /tmp to make sure it is possible to write to disk.

I am attaching a series of patches against the git repository for the
Debian packaging [1]. The packaging repository is currently at version
0.48.3.1-1, the following three NMUs are therefore not in the
repository and I am attaching all patches necessary to update the
repository to version 0.48.3.1-1.3.

I will file an unblock request to the release team for version
0.48.3.1-1.3. The bug should be closed by my upload anytime soon.

Cheers,

Adrian

> [1] git://git.debian.org/git/collab-maint/inkscape.git

-- 
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer - glaub...@debian.org
`. `'   Freie Universitaet Berlin - glaub...@physik.fu-berlin.de
  `-GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913
>From fd837b10f2fb8c48a308c4a3ddba8dd79609418d Mon Sep 17 00:00:00 2001
From: Pino Toscano 
Date: Sat, 29 Dec 2012 18:34:12 +0100
Subject: [PATCH 1/6] - switch the libpng12-dev build dependency to libpng-dev
 - add the libpoppler-private-dev build dependency

---
 debian/control |3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/debian/control b/debian/control
index f54b02e..50990b7 100644
--- a/debian/control
+++ b/debian/control
@@ -22,7 +22,8 @@ Build-Depends: autoconf,
liblcms1-dev,
libmagick++-dev,
libpango1.0-dev,
-   libpng12-dev,
+   libpng-dev,
+   libpoppler-private-dev,
libpoppler-glib-dev,
libpopt-dev,
libsigc++-2.0-dev (>= 2.0.16-2),
-- 
1.7.10.4

>From 0cc17c45fbfd0ca198d61f86a49e082f2499eaa2 Mon Sep 17 00:00:00 2001
From: Pino Toscano 
Date: Sat, 29 Dec 2012 19:00:14 +0100
Subject: [PATCH 2/6] Update Debian changelog for 0.48.3.1-1.1.

---
 debian/changelog |8 
 1 file changed, 8 insertions(+)

diff --git a/debian/changelog b/debian/changelog
index 4f92cf4..d1fdf41 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+inkscape (0.48.3.1-1.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Switch the libpng12-dev build dependency to libpng-dev (closes: #662378)
+  * Add the libpoppler-private-dev build dependency (closes: #660987)
+
+ -- Pino Toscano   Fri, 15 Jun 2012 16:40:22 +0200
+
 inkscape (0.48.3.1-1) unstable; urgency=low
 
   * [cb1a6e2] delete 01-libwpg0.2.dpatch since proper patch appied upstream
-- 
1.7.10.4

>From f74d957bdac1a39e62d2e12bc8dfd1e191afedaa Mon Sep 17 00:00:00 2001
From: John Paul Adrian Glaubitz 
Date: Sat, 29 Dec 2012 19:04:14 +0100
Subject: [PATCH 3/6] Add Debian patch to fix vulnerability CVE-2012-5656.

---
 debian/patches/03-CVE-2012-5656.diff |   75 ++
 debian/patches/series|1 +
 2 files changed, 76 insertions(+)
 create mode 100644 debian/patches/03-CVE-2012-5656.diff

diff --git a/debian/patches/03-CVE-2012-5656.diff b/debian/patches/03-CVE-2012-5656.diff
new file mode 100644
index 000..c787ed4
--- /dev/null
+++ b/debian/patches/03-CVE-2012-5656.diff
@@ -0,0 +1,75 @@
+From eaa98e6b71d66195f0ca76358b85cca64d611fd9 Mon Sep 17 00:00:00 2001
+From: John Paul Adrian Glaubitz 
+Date: Sun, 23 Dec 2012 18:22:16 +0100
+Subject: [PATCH] Apply changes from upstream svn commit 11931 to fix
+ CVE-2012-5656.
+
+---
+ src/preferences-skeleton.h|4 
+ src/ui/dialog/ocaldialogs.cpp |   10 --
+ src/xml/repr-io.cpp   |8 +++-
+ 3 files changed, 19 insertions(+), 3 deletions(-)
+
+diff --git a/src/preferences-skeleton.h b/src/preferences-skeleton.h
+index 32f4b7c..e4dd2c8 100644
+--- a/src/preferences-skeleton.h
 b/src/preferences-skeleton.h
+@@ -315,6 +315,10 @@ static char const preferences_skeleton[] =
+ "   clips=\"16711935\"" // 00ff00ff
+ "   masks=\"65535\"/>\n" // 0x
+ "\n"
++"\n"
++"  \n"
++"\n"
+ "\n"
+ "\n"
+ "\n"
+diff --git a/src/ui/dialog/ocaldialogs.cpp b/src/ui/dialog/ocaldialogs.cpp
+index 2ae7d69..63c56f7 100644
+--- a/src/ui/dialog/ocaldialogs.cpp
 b/src/ui/dialog/ocaldialogs.cpp
+@@ -468,9 +468,14 @@ void FileImportFromOCALDialog::searchTagEntryChangedCallback()
+ xmlDoc *doc = NULL;
+ xmlNode *root_element = NULL;
+ 
++int parse_options = XML_PARSE_RECOVER + XML_PARSE_NOWARNING + XML_PARSE_NOERROR;  // do not use XML_PARSE_NO

Bug#685625: libgeom: may cause segfault of grub-probe

2012-12-29 Thread Steven Chamberlain
On 29/12/12 16:47, Steven Chamberlain wrote:
> I can provide a similar patch for freebsd-utils which has the same
> issues, but the only problem I could confirm yet was a segfault in
> ifconfig bridge configuration (#696514) due to it.

Attached is a similar patch for freebsd-utils, fixing implicit
declarations that are due to libbsd no longer being used.  Should we
apply it?

The warnings are potentially serious, but I don't know of any specific
bugs that this will fix.  (#696514 turned out not to be due to these).

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org
Index: freebsd-utils-9.0+ds1/usr.sbin/mountd/mountd.c
===
--- freebsd-utils-9.0+ds1.orig/usr.sbin/mountd/mountd.c	2012-12-29 19:56:58.0 +
+++ freebsd-utils-9.0+ds1/usr.sbin/mountd/mountd.c	2012-12-29 20:05:01.478673213 +
@@ -80,6 +80,8 @@
 #include 
 #include 
 #include 
+#include 
+
 #include "pathnames.h"
 #include "mntopts.h"
 
Index: freebsd-utils-9.0+ds1/usr.sbin/vidcontrol/vidcontrol.c
===
--- freebsd-utils-9.0+ds1.orig/usr.sbin/vidcontrol/vidcontrol.c	2010-03-29 21:12:44.0 +0100
+++ freebsd-utils-9.0+ds1/usr.sbin/vidcontrol/vidcontrol.c	2012-12-29 20:05:04.610607859 +
@@ -48,6 +48,8 @@
 #include 
 #include 
 #include 
+#include 
+
 #include "path.h"
 #include "decode.h"
 
Index: freebsd-utils-9.0+ds1/usr.sbin/ppp/defs.c
===
--- freebsd-utils-9.0+ds1.orig/usr.sbin/ppp/defs.c	2004-09-05 02:46:52.0 +0100
+++ freebsd-utils-9.0+ds1/usr.sbin/ppp/defs.c	2012-12-29 20:00:01.091748618 +
@@ -47,6 +47,7 @@
 #include 
 #endif
 #include 
+#include 
 
 #if defined(__FreeBSD__) && !defined(NOKLDLOAD)
 #include "id.h"
Index: freebsd-utils-9.0+ds1/usr.sbin/nfsd/nfsd.c
===
--- freebsd-utils-9.0+ds1.orig/usr.sbin/nfsd/nfsd.c	2012-12-29 19:56:58.0 +
+++ freebsd-utils-9.0+ds1/usr.sbin/nfsd/nfsd.c	2012-12-29 20:00:04.194641584 +
@@ -71,6 +71,7 @@
 #include 
 #include 
 #include 
+#include 
 
 /* Global defs */
 #ifdef DEBUG
Index: freebsd-utils-9.0+ds1/usr.sbin/arp/arp.c
===
--- freebsd-utils-9.0+ds1.orig/usr.sbin/arp/arp.c	2012-12-29 19:56:58.0 +
+++ freebsd-utils-9.0+ds1/usr.sbin/arp/arp.c	2012-12-29 20:00:07.442606898 +
@@ -80,6 +80,7 @@
 #include 
 #include 
 #include 
+#include 
 
 typedef void (action_fn)(struct sockaddr_dl *sdl,
 	struct sockaddr_inarp *s_in, struct rt_msghdr *rtm);
Index: freebsd-utils-9.0+ds1/usr.sbin/rpc.lockd/kern.c
===
--- freebsd-utils-9.0+ds1.orig/usr.sbin/rpc.lockd/kern.c	2012-12-29 19:56:58.0 +
+++ freebsd-utils-9.0+ds1/usr.sbin/rpc.lockd/kern.c	2012-12-29 20:00:14.848822213 +
@@ -52,6 +52,7 @@
 #include 
 #include 
 #include 
+#include 
 
 #include 
 #include 
Index: freebsd-utils-9.0+ds1/usr.sbin/pppctl/pppctl.c
===
--- freebsd-utils-9.0+ds1.orig/usr.sbin/pppctl/pppctl.c	2004-12-13 14:50:13.0 +
+++ freebsd-utils-9.0+ds1/usr.sbin/pppctl/pppctl.c	2012-12-29 20:00:17.754640690 +
@@ -48,6 +48,7 @@
 #include 
 #include 
 #include 
+#include 
 
 #define LINELEN 2048
 
Index: freebsd-utils-9.0+ds1/usr.bin/kdump/kdump.c
===
--- freebsd-utils-9.0+ds1.orig/usr.bin/kdump/kdump.c	2012-12-29 19:56:58.0 +
+++ freebsd-utils-9.0+ds1/usr.bin/kdump/kdump.c	2012-12-29 20:05:19.540626059 +
@@ -83,6 +83,8 @@
 #include 
 #include 
 #include 
+#include 
+
 #include "ktrace.h"
 #include "kdump_subr.h"
 
Index: freebsd-utils-9.0+ds1/sbin/geom/core/geom.c
===
--- freebsd-utils-9.0+ds1.orig/sbin/geom/core/geom.c	2011-03-24 19:11:05.0 +
+++ freebsd-utils-9.0+ds1/sbin/geom/core/geom.c	2012-12-29 20:06:16.428605677 +
@@ -46,6 +46,8 @@
 #include 
 #include 
 #include 
+#include 
+
 #include 
 #include 
 
Index: freebsd-utils-9.0+ds1/sbin/geom/class/eli/geom_eli.c
===
--- freebsd-utils-9.0+ds1.orig/sbin/geom/class/eli/geom_eli.c	2010-11-22 20:10:48.0 +
+++ freebsd-utils-9.0+ds1/sbin/geom/class/eli/geom_eli.c	2012-12-29 20:00:30.210625738 +
@@ -43,6 +43,7 @@
 #include 
 #include 
 #include 
+#include 
 
 #include 
 #include 
Index: freebsd-utils-9.0+ds1/sbin/geom/class/stripe/geom_stripe.c
===
--- freebsd-utils-9.0+ds1.orig/sbin/geom/class/stripe/geom_stripe.c	2010-10-09 21:20:27.0 +0100
+++ freebsd-utils-9.0+ds1/sbin/geom/class/stripe/geom_stripe.c	2012-12-29 20:02:33.016673155 +
@@ -36,6 +36,8 @@
 #incl

Processed: Re: Bug#696514: freebsd-net-tools: /sbin/ifconfig: segfaults getting bridge status

2012-12-29 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + patch
Bug #696514 [freebsd-net-tools] freebsd-net-tools: /sbin/ifconfig: segfaults 
getting bridge status
Added tag(s) patch.
> unblock -1 by 685625
Bug #696514 [freebsd-net-tools] freebsd-net-tools: /sbin/ifconfig: segfaults 
getting bridge status
696514 was blocked by: 685625
696514 was not blocking any bugs.
Removed blocking bug(s) of 696514: 685625

-- 
696514: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696514
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#694908: [Debian-med-packaging] Bug#694908: Contains non-free data

2012-12-29 Thread Steffen Möller
- Ursprüngliche Nachricht -
Von: Julien Cristau
Gesendet: 29.12.12 18:46 Uhr
An: Charles Plessy, 694...@bugs.debian.org
Betreff: [Debian-med-packaging] Bug#694908: Contains non-free data

 On Sun, Dec 2, 2012 at 09:39:14 +0900, Charles Plessy wrote: > Package: emboss 
> Version: 6.4.0-4 > Severity: serious > > As discussed in the following 
message, EMBOSS contains non-free data. > > 
https://lists.debian.org/20120918045219.ga26...@falafel.plessy.net > > We need 
to consider short- and long-term solutions to this problem. For the > 
short-term solution, I think that I will not have time to split free and > 
non-free parts of EMBOSS, so we need again to consider to move it altogether to 
> non-free. In contrary to the UniProt files which were in the test suite, the 
> Gene Ontology files are needed by EMBOSS to run some of its programs. > Does 
that mean emboss and embassy-* need to be removed from wheezy?  The GO license 
I read as "scientific integrity". Yes, as a consequence you cannot modify
 the database at will or it is not GO any more and you cite it where you use 
it. IIRC some
 two GO terms or so I had at some point suggested myself, so changes _can_ be 
made
 and one is even helped to get it done consistently. For other views on the 
world,
 have all the freedom of the world to start your own ontologies, and many are 
doing so.
 In my mind, having it all shipping together is just fine enough for Wheezy. A 
hard core
 alternative would be to substitute it with a mockup GO with the only entries 
explaining
 how to install the real thing. One could also just remove the database and see 
a few tools fail.
 To me, it is a small side issue and I suggest to demote the bug from Serious 
to Wishlist.

 Steffen


Processed: Re: live-installer: installer doesn't write /etc/crypttab for crypt+LVM

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tag 646704 - confirmed
Bug #646704 [live-installer] live-installer: installer doesn't write 
/etc/crypttab for crypt+LVM
Removed tag(s) confirmed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
646704: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646704
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#646704: live-installer: installer doesn't write /etc/crypttab for crypt+LVM

2012-12-29 Thread Daniel Baumann
tag 646704 - confirmed
thanks

usage of the tag 'confirmed' is reserved for the maintainer to indicate
that he could reproduce it, not users (re)reporting it.

-- 
Address:Daniel Baumann, Donnerbuehlweg 3, CH-3012 Bern
Email:  daniel.baum...@progress-technologies.net
Internet:   http://people.progress-technologies.net/~daniel.baumann/


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#646704: Bug severity is too high

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 646704 serious
Bug #646704 [live-installer] live-installer: installer doesn't write 
/etc/crypttab for crypt+LVM
Severity set to 'serious' from 'important'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
646704: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646704
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#696947: biojava3-live: FTBFS without Internet access

2012-12-29 Thread Ilya Barygin
Package: biojava3-live
Version: 3.0.5-1
Severity: serious
Tags: upstream
Justification: fails to build from source (but built successfully in the past)

biojava3-live fails to build without Internet access. One of the tests fails:

test:
[junit] Running org.biojava3.ronn.JronnTest
[junit] Testsuite: org.biojava3.ronn.JronnTest
[junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 2.203 sec
[junit] Tests run: 1, Failures: 0, Errors: 0, Time elapsed: 2.203 sec
[junit] 
[junit] Testcase: verifyRanges took 2.192 sec
[junit] Running org.biojava3.ronn.NonstandardProteinCompoundTest
[junit] Testsuite: org.biojava3.ronn.NonstandardProteinCompoundTest
[junit] Tests run: 1, Failures: 1, Errors: 0, Time elapsed: 0.042 sec
[junit] Tests run: 1, Failures: 1, Errors: 0, Time elapsed: 0.042 sec
[junit] - Standard Error -
[junit] Dec 06, 2012 5:15:54 PM 
org.biojava3.core.sequence.loader.UniprotProxySequenceReader getUniprotXML
[junit] INFO: Loading 
http://www.uniprot.org/uniprot/?query=O30642&format=xml
[junit] java.net.UnknownHostException: www.uniprot.org
[junit] at 
java.net.AbstractPlainSocketImpl.connect(AbstractPlainSocketImpl.java:178)
[...]

Build logs can be found at
https://launchpad.net/ubuntu/+source/biojava3-live/3.0.5-1

-- System Information:
Debian Release: wheezy/sid
  APT prefers quantal-updates
  APT policy: (500, 'quantal-updates'), (500, 'quantal-security'), (500, 
'quantal-proposed'), (500, 'quantal'), (100, 'quantal-backports')
Architecture: i386 (i686)

Kernel: Linux 3.5.0-21-generic (SMP w/2 CPU cores)
Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#696903: [1.83->1.84 regression]: GRUB won't install to a character device

2012-12-29 Thread Steven Chamberlain
Control: tags -1 + patch

Allow installing GRUB to a character device, as on GNU/kFreeBSD

diff --git a/grub-installer b/grub-installer
index 5d9fd77..6e2c7fc 100755
--- a/grub-installer
+++ b/grub-installer
@@ -651,9 +651,9 @@ if [ -z "$frdisk" ]; then
# Install grub on each space separated disk in the list
bootdevs="$bootdev"
for bootdev in $bootdevs; do
# workaround for #681227
-   if [ ! -b $bootdev -a $bootdev != dummy ]; then
+   if [ ! -b $bootdev -a ! -c $bootdev -a $bootdev != dummy ]; then
continue
fi
grub_install_params=
if ! is_floppy "$bootdev"; then


Or instead - make the logical IMHO clearer, and while here, wrap
$bootdev in quotes to be paranoid:

diff --git a/grub-installer b/grub-installer
index 5d9fd77..552c9bc 100755
--- a/grub-installer
+++ b/grub-installer
@@ -651,9 +651,9 @@ if [ -z "$frdisk" ]; then
# Install grub on each space separated disk in the list
bootdevs="$bootdev"
for bootdev in $bootdevs; do
# workaround for #681227
-   if [ ! -b $bootdev -a $bootdev != dummy ]; then
+   if ! [ "$bootdev" = dummy -o -b "$bootdev" -o -c "$bootdev" ]; 
then
continue
fi
grub_install_params=
if ! is_floppy "$bootdev"; then


Thanks,
Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#696903: [1.83->1.84 regression]: GRUB won't install to a character device

2012-12-29 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + patch
Bug #696903 [grub-installer] [1.83->1.84 regression]: GRUB won't install to a 
character device
Added tag(s) patch.

-- 
696903: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696903
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#696895: marked as done (mosquitto: Topic access can be incorrectly granted to all clients)

2012-12-29 Thread Debian Bug Tracking System
Your message dated Sat, 29 Dec 2012 18:47:38 +
with message-id 
and subject line Bug#696895: fixed in mosquitto 0.15-2
has caused the Debian Bug report #696895,
regarding mosquitto: Topic access can be incorrectly granted to all clients
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
696895: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696895
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: mosquitto
Version: 0.15-1
Severity: grave
Tags: upstream security
Justification: user security hole

When the acl_file option is in use to specify topic access control, if only
pattern access is used then all clients can obtain access regardless of the ACL
restrictions. This allows MQTT clients to access data that they shouldn't, but
does not affect security of the system.

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.5.0-19-generic (SMP w/4 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash

Versions of packages mosquitto depends on:
ii  adduser   3.113+nmu3
ii  libc6 2.13-37
ii  libwrap0  7.6.q-24
ii  lsb-base  4.1+Debian9

mosquitto recommends no packages.

mosquitto suggests no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: mosquitto
Source-Version: 0.15-2

We believe that the bug you reported is fixed in the latest version of
mosquitto, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 696...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Roger A. Light  (supplier of updated mosquitto package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 28 Dec 2012 22:55:03 +
Source: mosquitto
Binary: mosquitto libmosquitto0 libmosquitto0-dev libmosquittopp0 
libmosquittopp0-dev mosquitto-clients python-mosquitto
Architecture: source amd64 all
Version: 0.15-2
Distribution: unstable
Urgency: low
Maintainer: Roger A. Light 
Changed-By: Roger A. Light 
Description: 
 libmosquitto0 - MQTT version 3.1 client library
 libmosquitto0-dev - MQTT version 3.1 client library, development files
 libmosquittopp0 - MQTT version 3.1 client C++ library
 libmosquittopp0-dev - MQTT version 3.1 client C++ library, development files
 mosquitto  - MQTT version 3.1 compatible message broker
 mosquitto-clients - Mosquitto command line MQTT clients
 python-mosquitto - MQTT version 3.1 client library, python bindings
Closes: 696889 696891 696895
Changes: 
 mosquitto (0.15-2) unstable; urgency=low
 .
   * Fix broker crash when a client connects with a bad protocol version.
 (Closes: #696889)
   * Fix the possibility of topic access being granted when only acl_patterns
 is in use. (Closes: #696895)
   * Fix persistence option reloading. (Closes: #696891)
Checksums-Sha1: 
 189b473bc76b94146fd3af676a8fc1351e33f4aa  mosquitto_0.15-2.dsc
 06056fda01fe697dd5cc45b166b02cb7a9c6f02b 7237 mosquitto_0.15-2.debian.tar.gz
 5e8744a81e18a73f353ca3a54e502ef5788620e0 68096 mosquitto_0.15-2_amd64.deb
 0cb4330945f839e4205629307ac61a8f2d1e8ea7 25452 libmosquitto0_0.15-2_amd64.deb
 d804f9bdb44c79aaae2ad960e2f98aac72cbe2c5 20136 libmosquitto0-dev_0.15-2_all.deb
 ffe3222a7d56757d1cf66d8b405cd846ed5ce1cf 15892 libmosquittopp0_0.15-2_amd64.deb
 899dcff293f6a39ece92b884ea2953e7c646f2bd 12378 
libmosquittopp0-dev_0.15-2_all.deb
 336757d4eb70da0e60063f2ec58ee3ad691342b9 27928 
mosquitto-clients_0.15-2_amd64.deb
 c7fe9fc12642e5034ed60c482d411632e48d1aed 17982 python-mosquitto_0.15-2_all.deb
Checksums-Sha256: 
 a7a820b7866cf3628c2abab1a3a9d63e3d39dc5c81f463c1a3e5081194b3ddba  
mosquitto_0.15-2.dsc
 640681cc0c53ea58be4427257a01939ab3b60f52860a3368d3fd9c6ff991 7237 
mosquitto_0.15-2.debian.tar.gz
 0e57f9dc95ece1f186359595253b9f0e2479deaa261dfd28fbb2cdba3e7f075c 68096 
mosquitto_0.15-2_amd64.deb
 6e4a80e8b1281ce241c301fd05838e3f2511fda44ed590be390bba21142e1fde 25452 
libmosquitto0_0.15-2_amd64.deb
 cc706da3ec11dee7ea094491e6f97493ed7439b41ce3395e04e65abad9a7cda4 20136 
libmosquitto0-dev_0.15-2_all.deb
 5c032a206ccd0ea3c1d3437bb0e5c442959a44c6b34dc25eaea3d09de8752

Bug#696891: marked as done (mosquitto: Broker persistence settings are lost if configuration is reloaded)

2012-12-29 Thread Debian Bug Tracking System
Your message dated Sat, 29 Dec 2012 18:47:38 +
with message-id 
and subject line Bug#696891: fixed in mosquitto 0.15-2
has caused the Debian Bug report #696891,
regarding mosquitto: Broker persistence settings are lost if configuration is 
reloaded
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
696891: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696891
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: mosquitto
Version: 0.15-1
Severity: grave
Tags: upstream
Justification: causes non-serious data loss

Sending SIGHUP to the broker causes the configuration to be reloaded. If the
persistence_file or persistence_location options are used they are not reloaded
on SIGHUP and set to NULL. This means that persistence is effectively disabled
after a reload and so persistence data will be lost.

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.5.0-19-generic (SMP w/4 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash

Versions of packages mosquitto depends on:
ii  adduser   3.113+nmu3
ii  libc6 2.13-37
ii  libwrap0  7.6.q-24
ii  lsb-base  4.1+Debian9

mosquitto recommends no packages.

mosquitto suggests no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: mosquitto
Source-Version: 0.15-2

We believe that the bug you reported is fixed in the latest version of
mosquitto, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 696...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Roger A. Light  (supplier of updated mosquitto package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 28 Dec 2012 22:55:03 +
Source: mosquitto
Binary: mosquitto libmosquitto0 libmosquitto0-dev libmosquittopp0 
libmosquittopp0-dev mosquitto-clients python-mosquitto
Architecture: source amd64 all
Version: 0.15-2
Distribution: unstable
Urgency: low
Maintainer: Roger A. Light 
Changed-By: Roger A. Light 
Description: 
 libmosquitto0 - MQTT version 3.1 client library
 libmosquitto0-dev - MQTT version 3.1 client library, development files
 libmosquittopp0 - MQTT version 3.1 client C++ library
 libmosquittopp0-dev - MQTT version 3.1 client C++ library, development files
 mosquitto  - MQTT version 3.1 compatible message broker
 mosquitto-clients - Mosquitto command line MQTT clients
 python-mosquitto - MQTT version 3.1 client library, python bindings
Closes: 696889 696891 696895
Changes: 
 mosquitto (0.15-2) unstable; urgency=low
 .
   * Fix broker crash when a client connects with a bad protocol version.
 (Closes: #696889)
   * Fix the possibility of topic access being granted when only acl_patterns
 is in use. (Closes: #696895)
   * Fix persistence option reloading. (Closes: #696891)
Checksums-Sha1: 
 189b473bc76b94146fd3af676a8fc1351e33f4aa  mosquitto_0.15-2.dsc
 06056fda01fe697dd5cc45b166b02cb7a9c6f02b 7237 mosquitto_0.15-2.debian.tar.gz
 5e8744a81e18a73f353ca3a54e502ef5788620e0 68096 mosquitto_0.15-2_amd64.deb
 0cb4330945f839e4205629307ac61a8f2d1e8ea7 25452 libmosquitto0_0.15-2_amd64.deb
 d804f9bdb44c79aaae2ad960e2f98aac72cbe2c5 20136 libmosquitto0-dev_0.15-2_all.deb
 ffe3222a7d56757d1cf66d8b405cd846ed5ce1cf 15892 libmosquittopp0_0.15-2_amd64.deb
 899dcff293f6a39ece92b884ea2953e7c646f2bd 12378 
libmosquittopp0-dev_0.15-2_all.deb
 336757d4eb70da0e60063f2ec58ee3ad691342b9 27928 
mosquitto-clients_0.15-2_amd64.deb
 c7fe9fc12642e5034ed60c482d411632e48d1aed 17982 python-mosquitto_0.15-2_all.deb
Checksums-Sha256: 
 a7a820b7866cf3628c2abab1a3a9d63e3d39dc5c81f463c1a3e5081194b3ddba  
mosquitto_0.15-2.dsc
 640681cc0c53ea58be4427257a01939ab3b60f52860a3368d3fd9c6ff991 7237 
mosquitto_0.15-2.debian.tar.gz
 0e57f9dc95ece1f186359595253b9f0e2479deaa261dfd28fbb2cdba3e7f075c 68096 
mosquitto_0.15-2_amd64.deb
 6e4a80e8b1281ce241c301fd05838e3f2511fda44ed590be390bba21142e1fde 25452 
libmosquitto0_0.15-2_amd64.deb
 cc706da3ec11dee7ea094491e6f97493ed7439b41ce3395e04e65abad9a7cda4 20136 
libmosquitto0-dev_0.15-2_all.deb
 5c032a206ccd0ea3c1d3437bb0e5c44295

Bug#696889: marked as done (mosquitto: Mosquitto crashes using bad version of protocol)

2012-12-29 Thread Debian Bug Tracking System
Your message dated Sat, 29 Dec 2012 18:47:38 +
with message-id 
and subject line Bug#696889: fixed in mosquitto 0.15-2
has caused the Debian Bug report #696889,
regarding mosquitto: Mosquitto crashes using bad version of protocol
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
696889: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696889
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: mosquitto
Version: 0.15-1
Severity: grave
Tags: upstream
Justification: causes non-serious data loss

If a client connects to the broker with an incorrect protocol version (i.e. not
3) then the broker will crash. The cause is a double free(), so there is no
chance of a buffer overrun or similar vulnerability. This bug allows any client
to perform a simple DoS on the broker and will result in other clients losing
messages.

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.5.0-19-generic (SMP w/4 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash

Versions of packages mosquitto depends on:
ii  adduser   3.113+nmu3
ii  libc6 2.13-37
ii  libwrap0  7.6.q-24
ii  lsb-base  4.1+Debian9

mosquitto recommends no packages.

mosquitto suggests no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: mosquitto
Source-Version: 0.15-2

We believe that the bug you reported is fixed in the latest version of
mosquitto, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 696...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Roger A. Light  (supplier of updated mosquitto package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 28 Dec 2012 22:55:03 +
Source: mosquitto
Binary: mosquitto libmosquitto0 libmosquitto0-dev libmosquittopp0 
libmosquittopp0-dev mosquitto-clients python-mosquitto
Architecture: source amd64 all
Version: 0.15-2
Distribution: unstable
Urgency: low
Maintainer: Roger A. Light 
Changed-By: Roger A. Light 
Description: 
 libmosquitto0 - MQTT version 3.1 client library
 libmosquitto0-dev - MQTT version 3.1 client library, development files
 libmosquittopp0 - MQTT version 3.1 client C++ library
 libmosquittopp0-dev - MQTT version 3.1 client C++ library, development files
 mosquitto  - MQTT version 3.1 compatible message broker
 mosquitto-clients - Mosquitto command line MQTT clients
 python-mosquitto - MQTT version 3.1 client library, python bindings
Closes: 696889 696891 696895
Changes: 
 mosquitto (0.15-2) unstable; urgency=low
 .
   * Fix broker crash when a client connects with a bad protocol version.
 (Closes: #696889)
   * Fix the possibility of topic access being granted when only acl_patterns
 is in use. (Closes: #696895)
   * Fix persistence option reloading. (Closes: #696891)
Checksums-Sha1: 
 189b473bc76b94146fd3af676a8fc1351e33f4aa  mosquitto_0.15-2.dsc
 06056fda01fe697dd5cc45b166b02cb7a9c6f02b 7237 mosquitto_0.15-2.debian.tar.gz
 5e8744a81e18a73f353ca3a54e502ef5788620e0 68096 mosquitto_0.15-2_amd64.deb
 0cb4330945f839e4205629307ac61a8f2d1e8ea7 25452 libmosquitto0_0.15-2_amd64.deb
 d804f9bdb44c79aaae2ad960e2f98aac72cbe2c5 20136 libmosquitto0-dev_0.15-2_all.deb
 ffe3222a7d56757d1cf66d8b405cd846ed5ce1cf 15892 libmosquittopp0_0.15-2_amd64.deb
 899dcff293f6a39ece92b884ea2953e7c646f2bd 12378 
libmosquittopp0-dev_0.15-2_all.deb
 336757d4eb70da0e60063f2ec58ee3ad691342b9 27928 
mosquitto-clients_0.15-2_amd64.deb
 c7fe9fc12642e5034ed60c482d411632e48d1aed 17982 python-mosquitto_0.15-2_all.deb
Checksums-Sha256: 
 a7a820b7866cf3628c2abab1a3a9d63e3d39dc5c81f463c1a3e5081194b3ddba  
mosquitto_0.15-2.dsc
 640681cc0c53ea58be4427257a01939ab3b60f52860a3368d3fd9c6ff991 7237 
mosquitto_0.15-2.debian.tar.gz
 0e57f9dc95ece1f186359595253b9f0e2479deaa261dfd28fbb2cdba3e7f075c 68096 
mosquitto_0.15-2_amd64.deb
 6e4a80e8b1281ce241c301fd05838e3f2511fda44ed590be390bba21142e1fde 25452 
libmosquitto0_0.15-2_amd64.deb
 cc706da3ec11dee7ea094491e6f97493ed7439b41ce3395e04e65abad9a7cda4 20136 
libmosquitto0-dev_0.15-2_all.deb
 5c032a206ccd0ea3c1

Processed: Retitling this bug....and pushing for the solution

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> retitle 681654 kstars-data-extra-tycho2: should be moved to non-free
Bug #681654 [kstars-data-extra-tycho2] kstars-data-extra-tycho2: undistributable
Changed Bug title to 'kstars-data-extra-tycho2: should be moved to non-free' 
from 'kstars-data-extra-tycho2: undistributable'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
681654: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681654
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#681654: Retitling this bug....and pushing for the solution

2012-12-29 Thread Christian PERRIER
retitle 681654 kstars-data-extra-tycho2: should be moved to non-free
thanks

After reading this bug log, I'm convinced that the only remaining
issue is the failure to comply with DFSG #6.

As a consequence, the solution is obvious : this package should be
moved to non-free.

I'm ready to help in uploading a package fixing this. Please CC me to answers.

-- 




signature.asc
Description: Digital signature


Processed: tagging 696179

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tag 696179 + squeeze
Bug #696179 {Done: Thorsten Glaser } 
[mediawiki-extensions-base] mediawiki-extensions-base: RSS_Reader Javascript 
injection
Added tag(s) squeeze.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
696179: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696179
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: [1.83->1.84 regression]: GRUB won't install to a dummy device

2012-12-29 Thread Debian Bug Tracking System
Processing control commands:

> block 681227 by -1
Bug #681227 [grub-installer] installation-reports: grub-install tries to 
install to a nonsense string
681227 was blocked by: 696903
681227 was not blocking any bugs.
Added blocking bug(s) of 681227: 696942

-- 
681227: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681227
696942: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696942
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#696942: [1.83->1.84 regression]: GRUB won't install to a dummy device

2012-12-29 Thread Steven Chamberlain
Package: grub-installer
Version: 1.84
Severity: grave
Tags: d-i
X-Debbugs-Cc: paj...@gmail.com
Control: block 681227 by -1

Hello,

On 29/12/12 10:39, alberto fuentes wrote:
> Dec 29 00:41:32 grub-installer: info: Installing grub on 'dummy'
> Dec 29 00:41:32 grub-installer: error: no boot device found to install to

That is new a problem affecting at least grub-efi and grub-yeeloong and
was fixed in Git but I think we need a bug number for it now:

http://lists.debian.org/debian-boot/2012/12/msg00463.html
http://anonscm.debian.org/gitweb/?p=d-i/grub-installer.git;a=commitdiff;h=99389d59fc539c399e147eb74acedfce04da011f


Does it matter that $bootdev is not in quotes?  Every other use of it in
the script is quoted.  It can't contain spaces at least:

> --- a/grub-installer
> +++ b/grub-installer
> @@ -651,7 +651,7 @@ if [ -z "$frdisk" ]; then
>   # Install grub on each space separated disk in the list
>   bootdevs="$bootdev"
>   for bootdev in $bootdevs; do
>   # workaround for #681227
> - if [ ! -b $bootdev ]; then
> + if [ ! -b $bootdev -a $bootdev != dummy ]; then
>   continue
>   fi

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#680404: marked as done (fails to build comedilib documentation on mips (java.lang.IllegalArgumentException))

2012-12-29 Thread Debian Bug Tracking System
Your message dated Sat, 29 Dec 2012 19:18:06 +0100
with message-id <20121229181806.gv6...@mykerinos.kheops.frmug.org>
and subject line Closing "fixed" bug report
has caused the Debian Bug report #680404,
regarding fails to build comedilib documentation on mips 
(java.lang.IllegalArgumentException)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
680404: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680404
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: fop
Version: 1:1.0.dfsg2-6
Severity: serious
Justification: fails to build from source

It might be reincarnation of #580333 which was supposedly fixed.
Now, comedilib documentation fails to build on mips (only):
https://buildd.debian.org/status/fetch.php?pkg=comedilib&arch=mips&ver=0.10.0-2&stamp=1340692713

,---
| Making portrait pages on a4 paper (210mmx297mm)
| Element include in namespace 'http://www.w3.org/2001/XInclude' encountered in 
programlisting, but no template matches.
| [warning] /usr/bin/fop: Unable to locate servlet-api in /usr/share/java
| Exception
| java.lang.IllegalArgumentException: Invalid profile data
|
| /tmp/xmlto.riHbLT
| make[4]: Entering directory 
`/build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/doc'
| make[4]: Nothing to be done for `install-exec-am'.
| /bin/mkdir -p 
/build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/debian/tmp/usr/share/doc/comedilib/html
| chmod u+w 
/build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/debian/tmp/usr/share/doc/comedilib/html
| for each in ./doc_html/*.html ./*.gif ./*.css; do \
| /usr/bin/install -c -m 644 $each 
/build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/debian/tmp/usr/share/doc/comedilib/html
 ; done
| /bin/mkdir -p -m 755 
/build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/debian/tmp/usr/share/man/man3
| chmod u+w 
/build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/debian/tmp/usr/share/man/man3
| for each in `find ./man/ -name '*.3'`; do /usr/bin/install -c -m 644 $each 
/build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/debian/tmp/usr/share/man/man3
 ; done
| /usr/bin/xmlto -o ./pdf --skip-validation --with-fop pdf ./comedilib.xml
| warning: failed to load external entity 
"/build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/demo/tut3_part.c"
| 
/build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/doc/tutorial.xml:234:
 element include: XInclude error : could not load 
/build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/demo/tut3_part.c,
 and no fallback was found
| Making portrait pages on a4 paper (210mmx297mm)
| Element include in namespace 'http://www.w3.org/2001/XInclude' encountered in 
programlisting, but no template matches.
| [warning] /usr/bin/fop: Unable to locate servlet-api in /usr/share/java
| Exception
| java.lang.IllegalArgumentException: Invalid profile data
|
| /tmp/xmlto.Hjq8u3
|  /bin/mkdir -p 
'/build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/debian/tmp/usr/share/doc/comedilib'
|  /usr/bin/install -c -m 644 ././pdf/comedilib.pdf 
'/build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/debian/tmp/usr/share/doc/comedilib'
| /usr/bin/install: cannot stat `././pdf/comedilib.pdf': No such file or 
directory
| make[4]: *** [install-dist_pdfDATA] Error 1
| make[4]: Leaving directory 
`/build/buildd2-comedilib_0.10.0-2-mips-JLvUAY/comedilib-0.10.0/doc'
| make[3]: *** [install-am] Error 2
`---



-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (900, 'testing'), (600, 'unstable'), (300, 'experimental'), (100, 
'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.1.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages fop depends on:
ii  default-jre-headless [java2-runtime-headless]1:1.6-47
ii  gcj-4.6-jre-headless [java2-runtime-headless]4.6.3-1
ii  gcj-jre-headless [java2-runtime-headless]4:4.6.1-2
ii  gij-4.3 [java2-runtime-headless] 4.3.4-1
ii  libfop-java  1:1.0.dfsg2-6
ii  openjdk-6-jre-headless [java2-runtime-headless]  6b24-1.11.3-2
ii  sun-java5-jre [java2-runtime-headless]   1.5.0-20-1
ii  sun-java6-jre [java2-runtime-headless]   6.26-3

Versions of packages fop recommends:
ii  libsaxon-java  1:6.5.5-7

Versions of packages fop suggests:
pn  fop-doc 
ii  libservlet2.5-java  6.0.32-5

-- no debconf information


--- End Message ---
--- Begin Message ---
Version: 

Processed: Lowering bug severity

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 679917 important
Bug #679917 [korganizer] korganizer: cannot add ics calendar files
Severity set to 'important' from 'grave'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
679917: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=679917
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#679917: Lowering bug severity

2012-12-29 Thread Christian PERRIER
severity 679917 important
thanks

As there is a workaround for this bug (see bug log) and also because
the bug maybe didn't deserve an RC severity from the beginning, I'm
hereby downgrading this severity.

-- 




signature.asc
Description: Digital signature


Bug#696939: can't create jabber accounts

2012-12-29 Thread Daniel Pocock
Package: gnome-online-accounts
Version: 3.4.2-1
Severity: serious

Click system properties and then "Online Accounts"

Click to add an account

The only account types supported are Windows Live, Google and Facebook

It appears that open standards based account types like Jabber are not
supported in a default installation.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#669918: marked as done (kmail crashes when sending an email)

2012-12-29 Thread Debian Bug Tracking System
Your message dated Sat, 29 Dec 2012 19:08:39 +0100
with message-id <20121229180839.gt6...@mykerinos.kheops.frmug.org>
and subject line Closing bug from bug submitter's comments
has caused the Debian Bug report #669918,
regarding kmail crashes when sending an email
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
669918: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669918
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: kmail
Version: 4:4.4.11.1+l10n-1
Severity: grave
Tags: upstream
Justification: renders package unusable

Kmail crashes ( or more freezes) when hitting sent.

+#kmail(5462) KMFolderImap::setImapPath: ignoring empty path
kmail(5462) KMFolderImap::setImapPath: ignoring empty path
kmail(5462)/kdeui (kdelibs): Attempt to use QAction "" with KXMLGUIFactory!
kmail(5462)/kdeui (kdelibs): Attempt to use QAction "" with KXMLGUIFactory!
Enchant dict for "de" 0x96c25b0
kmail(5462) KMFolderImap::setImapPath: ignoring empty path
kmail(5462) KMFolderIndex::updateIndexStreamPtr: utime(
"/home/claw/.kde/share/apps/kmail/imap/.1712157522.directory/.debian-
list.directory/.vote.index.ids" , 0) failed (KMMsgDict::getFolderIdsLocation(
*this ))
kmail(5462) KMFolderIndex::updateIndexStreamPtr: utime(
"/home/claw/.kde/share/apps/kmail/imap/.1712157522.directory/.debian-
list.directory/.vote.index.ids" , 0) failed (KMMsgDict::getFolderIdsLocation(
*this ))
kmail(5462) KMFolderImap::setImapPath: ignoring empty path
kmail(5462)/libakonadi Akonadi::SessionPrivate::socketError: Socket error
occurred: "QLocalSocket::connectToServer: Invalid name"
kmail(5462)/kio (KDirWatch) KDirWatchPrivate::removeEntry: doesn't know
"/home/claw/.kde/share/apps/kabc"
Enchant dict for "de" 0x98cb47
# THIS IS WHERE I HIT SENT


I am able to read all my emails and i dont have any modifications made to kmail
(also tried sending emails without pgp signature but did not solve the problem)

The output is not really reliable so please tell me how to produce better
output.
Thanks for your help



-- System Information:
Debian Release: wheezy/sid
  APT prefers testing-proposed-updates
  APT policy: (500, 'testing-proposed-updates'), (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 3.2.0-2-686-pae (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages kmail depends on:
ii  kdebase-runtime 4:4.7.4-2
ii  kdepim-runtime  4:4.4.11.1-3
ii  kdepimlibs-kio-plugins  4:4.7.4-2+b1
ii  libakonadi-contact4 4:4.7.4-2+b1
ii  libakonadi-kde4 4:4.7.4-2+b1
ii  libc6   2.13-27
ii  libgcc1 1:4.7.0-1
ii  libgpgme++2 4:4.7.4-2+b1
ii  libkabc44:4.7.4-2+b1
ii  libkcal44:4.7.4-2+b1
ii  libkcmutils44:4.7.4-4
ii  libkde3support4 4:4.7.4-4
ii  libkdecore5 4:4.7.4-4
ii  libkdepim4  4:4.4.11.1+l10n-1
ii  libkdeui5   4:4.7.4-4
ii  libkhtml5   4:4.7.4-4
ii  libkimap4   4:4.7.4-2+b1
ii  libkio5 4:4.7.4-4
ii  libkldap4   4:4.7.4-2+b1
ii  libkleo44:4.4.11.1+l10n-1
ii  libkmime4   4:4.7.4-2+b1
ii  libknotifyconfig4   4:4.7.4-4
ii  libkontactinterface44:4.7.4-2+b1
ii  libkparts4  4:4.7.4-4
ii  libkpgp44:4.4.11.1+l10n-1
ii  libkpimidentities4  4:4.7.4-2+b1
ii  libkpimtextedit44:4.7.4-2+b1
ii  libkpimutils4   4:4.7.4-2+b1
ii  libkresources4  4:4.7.4-2+b1
ii  libksieve4  4:4.4.11.1+l10n-1
ii  libktnef4   4:4.7.4-2+b1
ii  libmailtransport4   4:4.7.4-2+b1
ii  libmessagecore4 4:4.4.11.1+l10n-1
ii  libmessagelist4 4:4.4.11.1+l10n-1
ii  libmimelib4 4:4.4.11.1+l10n-1
ii  libnepomuk4 4:4.7.4-4
ii  libphonon4  4:4.6.0.0-1
ii  libqt4-dbus 4:4.7.4-2
ii  libqt4-network  4:4.7.4-2
ii  libqt4-qt3support   4:4.7.4-2
ii  libqt4-xml  4:4.7.4-2
ii  libqtcore4  4:4.7.4-2
ii  libqtgui4   4:4.7.4-2
ii  libstdc++6  4.7.0-1
ii  libthreadweaver44:4.7.4-4
ii  perl5.14.2-9
ii  phonon  4:4.6.0.0-1

Versions of packages kmail recommends:
ii  gnupg-agent   2.0.19-1
ii  gnupg22.0.19-1
ii  pinentry-gtk2 [pinentry-x11]  0.8.1-1

Versions of packages kmail suggests:
ii  bogofilter 1.2.2+dfsg1-1+b1
ii  clamav | f-prot-installer  
ii  kaddressbook   

Bug#696446: nmap: Errors out at startup if running as root and there is a network interface in monitor mode

2012-12-29 Thread Hilko Bengen
* Hilko Bengen:

> Fyodor, can you point me to the specific patch that fixed the issue?

I found it, never mind.

Cheers,
-Hilko


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: severity of 696811 is important

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 696811 important
Bug #696811 [firmware-b43-installer] b43 wlan0 disappears when on battery
Severity set to 'important' from 'serious'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
696811: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696811
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#696179: [Pkg-mediawiki-devel] Bug#696179: mediawiki-extensions-base: RSS_Reader Javascript injection

2012-12-29 Thread Thorsten Glaser
On Wed, 26 Dec 2012, Jonathan Wiltshire wrote:

> > Hello MITRE people,

> Did you hear anything about this yet?

Nothing. They are probably on holidays or something.

bye,
//mirabilos
-- 
«MyISAM tables -will- get corrupted eventually. This is a fact of life. »
“mysql is about as much database as ms access” – “MSSQL at least descends
from a database” “it's a rebranded SyBase” “MySQL however was born from a
flatfile and went downhill from there” – “at least jetDB doesn’t claim to
be a database”  (#nosec)‣‣‣ Please let MySQL and MariaDB finally die!


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: severity of 696878 is important

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> # there is more to empathy than video calls with jitsi
> severity 696878 important
Bug #696878 [empathy] Jitsi fails with Empathy on Debian
Severity set to 'important' from 'serious'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
696878: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696878
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#694908: Contains non-free data

2012-12-29 Thread Julien Cristau
On Sun, Dec  2, 2012 at 09:39:14 +0900, Charles Plessy wrote:

> Package: emboss
> Version: 6.4.0-4
> Severity: serious
> 
> As discussed in the following message, EMBOSS contains non-free data.
> 
>   https://lists.debian.org/20120918045219.ga26...@falafel.plessy.net
> 
> We need to consider short- and long-term solutions to this problem.  For the
> short-term solution, I think that I will not have time to split free and
> non-free parts of EMBOSS, so we need again to consider to move it altogether 
> to
> non-free.  In contrary to the UniProt files which were in the test suite, the
> Gene Ontology files are needed by EMBOSS to run some of its programs.
> 
Does that mean emboss and embassy-* need to be removed from wheezy?

Cheers,
Julien


signature.asc
Description: Digital signature


Processed: severity of 476946 is important

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> # non-working preseed might be annoying, but probably not serious, especially 
> if it's not a regression
> severity 476946 important
Bug #476946 [dbconfig-common] dbconfig-common does not honor preseeded values, 
if priority is too low
Bug #516562 [dbconfig-common] Cannot find a question for 
phpmyadmin/dbconfig-install
Bug #619362 [dbconfig-common] phpMyAdmin package not using admin-user preseed
Bug #625710 [dbconfig-common] phpmyadmin: dbconfig-install is enabled even 
after I've added "false" in debconf-set-selections
Severity set to 'important' from 'serious'
Severity set to 'important' from 'serious'
Severity set to 'important' from 'serious'
Severity set to 'important' from 'serious'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
476946: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476946
516562: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=516562
619362: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=619362
625710: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=625710
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#696446: nmap: Errors out at startup if running as root and there is a network interface in monitor mode

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 696446 grave
Bug #696446 [nmap] nmap: Errors out at startup if running as root and there is 
a network interface in monitor mode
Severity set to 'grave' from 'important'
> thank you
Stopping processing here.

Please contact me if you need assistance.
-- 
696446: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696446
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#693208: clang unable to link trivial test program on armhf

2012-12-29 Thread Julien Cristau
On Mon, Nov 26, 2012 at 11:40:06 +0100, Sylvestre Ledru wrote:

> So, to fix this issue, should I do the following ?
> 
> * ask for a removal of clang 3.1 in unstable
> * upload a version 3.0 in unstable with Peter patch
> * ask for an exception
> 
I'm not sure what the point of your first step would be.  But yes, to
fix this issue you need to upload a fix to sid, and then either get that
fix migrated or get a fix in to tpu.  Why is this so hard?

Cheers,
Julien


signature.asc
Description: Digital signature


Bug#685540: asterisk-flite: app_flite fails to load

2012-12-29 Thread Julien Cristau
Control: tag -1 wheezy-ignore

On Tue, Aug 21, 2012 at 15:08:42 -0400, Gedalya wrote:

> Package: asterisk-flite
> Version: 2.1-1
> Severity: grave
> 
> Using asterisk 1:1.8.13.0~dfsg-1+b1 on wheezy.
> 
> asterisk01-noc01*CLI> module load app_flite
> Unable to load module app_flite
> Command 'module load app_flite' failed.

This should be worked around by the 2.1-1.1 rebuild.  Leaving the bug
open so it can be fixed properly, but marking is as ignored for the
wheezy release.

Cheers,
Julien


signature.asc
Description: Digital signature


Processed: Re: Bug#689109: asterisk-espeak: app_espeak fails to load

2012-12-29 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 wheezy-ignore
Bug #689109 [asterisk-espeak] asterisk-espeak: app_espeak fails to load
Added tag(s) wheezy-ignore.

-- 
689109: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689109
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#689109: asterisk-espeak: app_espeak fails to load

2012-12-29 Thread Julien Cristau
Control: tag -1 wheezy-ignore

On Sat, Sep 29, 2012 at 10:35:41 +0200, Jonas Smedegaard wrote:

> Package: asterisk-espeak
> Version: 2.1-1
> Severity: normal
> 
> coreander*CLI> module load app_espeak.so 
> Unable to load module app_espeak.so
> Command 'module load app_espeak.so ' failed.
> [Sep 29 09:56:45] WARNING[5768]: loader.c:779 inspect_module: Module 
> 'app_espeak.so' was not compiled with the same compile-time options as this 
> version of Asterisk.
> [Sep 29 09:56:45] WARNING[5768]: loader.c:780 inspect_module: Module 
> 'app_espeak.so' will not be initialized as it may cause instability.
> [Sep 29 09:56:45] WARNING[5768]: loader.c:863 load_resource: Module 
> 'app_espeak.so' could not be loaded.
> 
> Fix is to simply rebuild against up-to-date asterisk: apparently
> asterisk provides no or too relaxed shlibs hints!
> 
Worked around by a binNMU, so marking this as ignored for the wheezy
release.

Cheers,
Julien


signature.asc
Description: Digital signature


Processed: Re: Bug#685540: asterisk-flite: app_flite fails to load

2012-12-29 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 wheezy-ignore
Bug #685540 [asterisk-flite] asterisk-flite: app_flite fails to load
Added tag(s) wheezy-ignore.

-- 
685540: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685540
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#685625: libgeom: may cause segfault of grub-probe

2012-12-29 Thread Steven Chamberlain
Hi,

I agree that libbsd and freebsd-glue seem to conflict with each other,
but neither one of them by itself has everything needed for freebsd-libs.

So Jeff's patch is the least intrusive way to fix this, and that's what
we have to go with at this late stage.  It fixes a bug we're seeing now
and is unlikely to introduce more...

I can provide a similar patch for freebsd-utils which has the same
issues, but the only problem I could confirm yet was a segfault in
ifconfig bridge configuration (#696514) due to it.


I propose adding the -Werror part of the patch into Wheezy as well.  If
it does trigger a FTBFS, it's because we missed something, or something
wrong with the build environment that we need to know about.  We might
need to drop it someday for a new upstream release but hopefully not.

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: severity of 693147 is important

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 693147 important
Bug #693147 {Done: Thijs Kinkhorst } [ttytter] ttytter: 
Package breaks against Twitter API 1.1
Severity set to 'important' from 'grave'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
693147: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=693147
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#693147: marked as done (ttytter: Package breaks against Twitter API 1.1)

2012-12-29 Thread Debian Bug Tracking System
Your message dated Sat, 29 Dec 2012 16:33:07 +
with message-id 
and subject line Bug#693147: fixed in ttytter 2.1.0-1
has caused the Debian Bug report #693147,
regarding ttytter: Package breaks against Twitter API 1.1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
693147: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=693147
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Subject: ttytter: Package breaks against Twitter API 1.1
Package: ttytter
Version: 2.0.1-1
Justification: renders package unusable
Severity: grave

Dear Maintainer,

As of 4 October 2012, this version will no longer function properly
against Twitter API 1.1 and unanticipted errors are expected to arise
over time as Twitter further adjusts their API.  A new version that is
more API-compliant has not yet been released but is currently in beta. 
See: http://www.floodgap.com/software/ttytter/beta/ for more
information.

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: armel (armv5tel)

Kernel: Linux 3.2.0-3-kirkwood
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages ttytter depends on:
ii  curl  7.26.0-1
ii  lynx  2.8.8dev.12-2
ii  perl  5.14.2-14

Versions of packages ttytter recommends:
ii  libterm-readline-gnu-perl  1.20-2+b1
ii  libtimedate-perl   1.2000-1

ttytter suggests no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: ttytter
Source-Version: 2.1.0-1

We believe that the bug you reported is fixed in the latest version of
ttytter, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 693...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thijs Kinkhorst  (supplier of updated ttytter package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sat, 29 Dec 2012 17:09:06 +0100
Source: ttytter
Binary: ttytter
Architecture: source all
Version: 2.1.0-1
Distribution: unstable
Urgency: low
Maintainer: Thijs Kinkhorst 
Changed-By: Thijs Kinkhorst 
Description: 
 ttytter- console Twitter client
Closes: 684335 693147
Changes: 
 ttytter (2.1.0-1) unstable; urgency=low
 .
   * New upstream release (closes: #684335).
   * Implements support for Twitter API 1.1 (closes: #693147).
Checksums-Sha1: 
 ebf2711c7c707f50483c5a46c1167f4a1af66823 1462 ttytter_2.1.0-1.dsc
 a4424b1038a743d9bdc7566e5bf71775bcded20f 125353 ttytter_2.1.0.orig.tar.gz
 79069c56ba34b2f5f87f10371a264613e67f57ef 6888 ttytter_2.1.0-1.diff.gz
 7fb4068e315522e27e059675feeed63c12212499 131310 ttytter_2.1.0-1_all.deb
Checksums-Sha256: 
 95a06acadb909fc734cbc7a7fe9e8d966a7718721a2d0dd57ac596865ccd711e 1462 
ttytter_2.1.0-1.dsc
 732e25547f7cee697400ba79d0267a8c1235aa714c0f7fd6f83c302873babab7 125353 
ttytter_2.1.0.orig.tar.gz
 f1d46ee051fc2590c1228a58894bee48a29a99a58a6caa8ea5cb18d5d3d258a4 6888 
ttytter_2.1.0-1.diff.gz
 e2f281b55607cecf5a1a06c516352342b6ba92b6651a5e0189aedb0367f57dbf 131310 
ttytter_2.1.0-1_all.deb
Files: 
 26c6a49d4fb260f606cf0b1abefefebb 1462 non-free/net optional ttytter_2.1.0-1.dsc
 f0b26b58a9eff744fbd91bba44b11488 125353 non-free/net optional 
ttytter_2.1.0.orig.tar.gz
 87935cd6b69dfc16c2133fbaa1cca49d 6888 non-free/net optional 
ttytter_2.1.0-1.diff.gz
 76e9b3ec5271be14ab4839ca41ecb784 131310 non-free/net optional 
ttytter_2.1.0-1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJQ3xfdAAoJEFb2GnlAHawE7QYH/1odCGOTGfKTx68Dr6A6abMk
DHedGvbLL/rsKcInVrTy3pFbxqj8XY84kx2FdFu8kV9U4EHr3BFbOHn3fOZu2R+l
HY/jHL0u2Ikjk9xHteHdZQL5fFTrv6n6UQZ7VCpqbcTLOiwxDi4ihXcw4mre2kT1
iIUzy7PKk9e9H7eCSTZ0HpF+pn27Mgr6Q2KK1Ce25Kg+GX6IPnags2UBNv/wpljY
+mcZwVJIMVFoWVYjEPl0f81qJYhVrteLBv9CuGS79qHHpl79eEdXvtnj/43XIrgM
a2CNtJajtoxOr3GPKn3qTEnWYAKYK8DtOfmjeVxZqy5+sEJRRGfNIlR1oLA2zgM=
=ajXs
-END PGP SIGNATURE End Message ---


Bug#693147: Upstream released Twitter API 1.1 version

2012-12-29 Thread Thijs Kinkhorst
Hi Stephen,

On Fri, December 28, 2012 22:15, Stephen Michael Kellat wrote:
> Okay.  Cameron released TTYtter 2.1.0 as of 27 December 2012 which
> complies with Twitter API 1.1.[1]  Twitter notes on their calendar that
> the "drop dead" date for Twitter API 1.0 is 5 March 2013.[2]  Cameron
> notes that all previous versions of TTYtter will cease to work with
> Twitter as of that date due to Twitter's API deprecation.  Also noted is
> that Term::ReadLine::TTYtter, which currently is packaged with the
> script in Debian, would have to be bumped up to a new version as the
> currently packaged version will not play nice with the new version of
> the script.
>
> The new upstream is done and Wheezy remains in freeze.  The questions
> now:
>
> 1.  Will the Release Team grant an exception since Twitter announced the
> major shift in API through an API deprecation on 16 August 2012 after
> the freeze kicked off on 30 June 2012?
> 2.  If the Release Team will not grant an exception, can the package be
> pulled from shipping with Wheezy since it will likely be unusable
> shortly after Wheezy being released in 2013?
> 3.  Do we have any idea if the other Twitter clients that are in the
> package archive are going to be ready for this API deprecation or will
> other packages be encountering issues if we ship them?  This would be
> something more for the Release Team to consider than for the current
> bug.

The new TTYtter 2.1.0 release is as of now available in Debian unstable.

I have considered the options for this bug. I find that option 1 seems
highly unlikely since it indeed means to allow a freeze exception for not
only a new upstream release but a complete upstream new branch (2.1 vs
2.0). Besides that the package also requires upgrading
Term::Readline::TTYtter to 1.4. I believe we best discount this option.

Option two is certainly at our disposal. I doubt however that we should
ask for removal from wheezy. Firstly, because it still works now, and we
can always pull it from wheezy later when the API indeed is discontinued.
And secondly, because TTYtter may still be useful for non-Twitter usage.
Most notably identi.ca, which is used extensively in the free software
world.

So I'm inclined to go for the following path:
a. Fix the problem in unstable. That has now been done.
b. Lower this bug to severity 'important', to not require removal of
TTYtter from Wheezy now or in the future.
c. Invest effort to ensure that a version that supports Twitter is
available for Wheezy. This can be done after release via Debian Backports
or via the Stable Updates suite.

If we change our mind on the 'b' step, we can always ask for removal
later, we do not lose that option.


Cheers,
Thijs


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: found 695784 in 6.2-8

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> found 695784 6.2-8
Bug #695784 [src:readline6] readline6: includes non-free documentation (GFDL 
with unmodifiable sections)
Marked as found in versions readline6/6.2-8.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
695784: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695784
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#688738: Fwd: Bug#688738: Unfixed RC bug and unable to install updated package

2012-12-29 Thread Jeremy Malcolm
FYI

Begin forwarded message:

> From: Dashamir Hoxha 
> Subject: Re: Bug#688738: Unfixed RC bug and unable to install updated package
> Date: 29 December 2012 11:27:51 PM GMT+08:00
> To: Jeremy Malcolm 
> 
> Hi Jeremy,
> 
> Thanks for letting me know.
> I think that it should be removed from Debian, because it is on a dead end.
> The framework used to build it is old and can be understood and used only
> by me. Which means that nobody can potentially help me for maintaining and
> improving it. Which means that it cannot be fixed and improved. And also
> nobody is using it anyway (not even me myself).
> 
> Instead, I have been thinking about rewriting some parts of docbookwiki as
> Drupal modules. Drupal is also old and a bloated framework, but there are
> lots of developers using it, it is still being maintained and developed,
> it is modular, etc.
> 
> One thing that can be imported from docbookwiki is the wiki syntax, which
> I find more powerful than the other wikis that I have seen (maybe I am 
> biased).
> Another thing is the idea of generating and exporting documents in
> docbook format.
> Keeping the history of changes (revisions), permission control etc. maybe are
> not so important, or maybe Drupal has its own tools for managing them.
> 
> Best regards,
> Dashamir

--
Jeremy Malcolm PhD LLB (Hons) B Com
Internet and Open Source lawyer, consumer advocate and geek
host -t NAPTR 5.9.8.5.2.8.2.2.1.0.6.e164.org|awk -F! '{print $3}'





Processed: Bug severity is too high

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 646704 important
Bug #646704 [live-installer] live-installer: installer doesn't write 
/etc/crypttab for crypt+LVM
Severity set to 'important' from 'grave'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
646704: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646704
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#646704: Bug severity is too high

2012-12-29 Thread Christian PERRIER
severity 646704 important
thanks

This bug doesn't fit the definition of "serious" as it only shows up
for a precise set of installation types, those not being the most
common, particularly when people use the Live CD to install.

Downgrading to "important" as per the definition of "improtant" severity.

-- 




signature.asc
Description: Digital signature


Bug#695770: Shouldn't builds just be reattempted for python-2.6?

2012-12-29 Thread Christian PERRIER
Subject says it all. I'm tempted to think that at least the mips and
i386 failures were just a transient failure and the builds should just
be reattempted.

But I may be mistaken
-- 




signature.asc
Description: Digital signature


Processed: More information needed to handle this bug...anyway, it is not release critical

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 690902 moreinfo
Bug #690902 [gnome-shell] gnome-shell: seg fault randomly
Added tag(s) moreinfo.
> severity 690902 normal
Bug #690902 [gnome-shell] gnome-shell: seg fault randomly
Severity set to 'normal' from 'grave'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
690902: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690902
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#690902: More information needed to handle this bug...anyway, it is not release critical

2012-12-29 Thread Christian PERRIER
tags 690902 moreinfo
severity 690902 normal
thanks

I don't think that gnome-shell segfaulting randomly only for one user
(no other user reported this) should be RC.

Anyway, if you want this bug to be dealt with, you need to follow
advices that have been given in the bug log:

"Check /home/YOURUSER/.xsession-errors  or
/home/YOURUSER/.xsession-errors.old for relevant error messages. Post
them here. Take care as this log can frequently contain sensitive
information logged by some applications.

You could try creating a new user on the computer and try reproducing
the problem with it. If the problem does not happen then it could be
some settings under your other account."


-- 




signature.asc
Description: Digital signature


Bug#685625: libgeom: may cause segfault of grub-probe

2012-12-29 Thread Guillem Jover
On Fri, 2012-12-28 at 19:44:41 -0800, Christoph Egger wrote:
>   I see there's a patch in this bug report. Do you think this is a
> solution for wheezy? If so I'd volunteer to upload a new version of
> freebsd-libs

I've checked now the interaction of the libbsd-overlay and freebsd-glue,
and they do not play well. Consequently that would require way more
changes than the proposed patch, so even if I've not tested it, it would
seem to be the better solution for now given the freeze. Moving the
-Werror line one up would reduce the diff by 1, but that's pretty much
insignificant, so regardless of that:

Acked-by: Guillem Jover 

I'll add missing stuff to libbsd, and for jessie I'll make freebsd-glue
play well with the overlay, once that's fixed the other packages can
be switched back to use the overlay.

Thanks,
Guillem


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Processed: Bug really RC?

2012-12-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 690066 important
Bug #690066 [libreoffice-writer] libreoffice-writer: silently corrupts docx file
Severity set to 'important' from 'grave'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
690066: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690066
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#690066: Bug really RC?

2012-12-29 Thread Christian PERRIER
severity 690066 important
thanks

I don't think this bug is release critical. The right severity, for
me, seems to be "important".

OK, one could argue about "dataloss" but someone opening a file
created in a format that is not native to LO, then modifying the file,
then saving it.should not yell for "dataloss" if (s)he hasn't kept
a copy of the original file somewhere.

Hence downgrading. Feel free to raise the severity if you disagree,
but there are probably more important bugs to focus on.

-- 




signature.asc
Description: Digital signature


  1   2   >