Bug#700002: curl: CVE-2013-0249

2013-02-07 Thread Moritz Muehlenhoff
Package: curl
Severity: grave
Tags: security
Justification: user security hole

http://curl.haxx.se/docs/adv_20130206.html

Remember we're in freeze, so please upload only the minimal security fix.

Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#685251: marked as done (quantum-plugin-ryu-agent: ImportError: No module named ryu.agent.ryu_quantum_agent / ryu.app)

2013-02-07 Thread Debian Bug Tracking System
Your message dated Thu, 07 Feb 2013 10:02:32 +
with message-id e1u3ojm-00059w...@franck.debian.org
and subject line Bug#685251: fixed in quantum 2012.1-5+deb70u1
has caused the Debian Bug report #685251,
regarding quantum-plugin-ryu-agent: ImportError: No module named 
ryu.agent.ryu_quantum_agent / ryu.app
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
685251: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685251
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---

Package: quantum-plugin-ryu-agent
Version: 2012.1-6
Severity: grave
Justification: renders package unusable

If quantum-plugin-ryu is not installed, quantum-ryu-agent doesn't start:

# /usr/bin/quantum-ryu-agent
Traceback (most recent call last):
File /usr/bin/quantum-ryu-agent, line 22, in module
  from quantum.plugins.ryu.agent.ryu_quantum_agent import main
ImportError: No module named ryu.agent.ryu_quantum_agent


If quantum-plugin-ryu is installed, quantum-ryu-agent doesn't start 
either, but with a different error:


# /usr/bin/quantum-ryu-agent
Traceback (most recent call last):
File /usr/bin/quantum-ryu-agent, line 22, in module
  from quantum.plugins.ryu.agent.ryu_quantum_agent import main
File 
/usr/lib/python2.7/dist-packages/quantum/plugins/ryu/agent/ryu_quantum_agent.py, 
line 32, in module
  from ryu.app import rest_nw_id
ImportError: No module named ryu.app


(Disclaimer: I have no idea what quantum-ryu-agent is about. I 
discovered that it doesn't work by running some semi-automatic tests.)


-- System Information:
Debian Release: wheezy/sid
APT prefers unstable
APT policy: (990, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 3.2.0-3-686-pae (SMP w/1 CPU core)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash

Versions of packages quantum-plugin-ryu-agent depends on:
ii  python  2.7.3-2
ii  python-quantum  2012.1-6
ii  python2.7   2.7.3-3

--
Jakub Wilk
---End Message---
---BeginMessage---
Source: quantum
Source-Version: 2012.1-5+deb70u1

We believe that the bug you reported is fixed in the latest version of
quantum, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 685...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ola Lundqvist o...@debian.org (supplier of updated quantum package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 07 Jan 2013 10:29:07 +0200
Source: quantum
Binary: quantum-server quantum-plugin-cisco quantum-plugin-openvswitch 
quantum-plugin-sample quantum-plugin-nicira quantum-plugin-linuxbridge 
quantum-plugin-openvswitch-agent quantum-plugin-linuxbridge-agent python-quantum
Architecture: source all
Version: 2012.1-5+deb70u1
Distribution: testing-proposed-updates
Urgency: high
Maintainer: PKG OpenStack openstack-de...@lists.alioth.debian.org
Changed-By: Ola Lundqvist o...@debian.org
Description: 
 python-quantum - Quantum is a virutal network service for Openstack. (python 
libra
 quantum-plugin-cisco - OpenStack Virtual network service - cisco plugin
 quantum-plugin-linuxbridge - OpenStack Virtual network service - linux bridge 
plugin
 quantum-plugin-linuxbridge-agent - OpenStack Virtual network service - 
linuxbridge agent
 quantum-plugin-nicira - OpenStack Virtual network service - nicira NVP plugin
 quantum-plugin-openvswitch - OpenStack Virtual network service - openvswitch 
plugin
 quantum-plugin-openvswitch-agent - OpenStack Virtual network service - 
openvswitch agent
 quantum-plugin-sample - OpenStack Virtual network service - sample plugin
 quantum-server - OpenStack Virtual network service - server
Closes: 685251
Changes: 
 quantum (2012.1-5+deb70u1) testing-proposed-updates; urgency=high
 .
   * Non-maintainer upload.
   * Backport of the removal of ryu app from upcoming 2012.1-7.
 This needs to go directly to testing as the changes in 2012.1-6 is
 too excessive. Closes: #685251.
Checksums-Sha1: 
 5a8573aba7664ea5bf42cae1267f0be4dfe7dd8f 2218 quantum_2012.1-5+deb70u1.dsc
 39ed59ce24f7916dd7ff886e598fc33b2b456818 6980 
quantum_2012.1-5+deb70u1.debian.tar.gz
 38f5c4aa705509ae679039a952ec812c10b1ca39 7258 

Bug#694473: Fix doesn't work for me

2013-02-07 Thread Mechtilde
Hello

on my testing system which also updated yesterday and today I get the
same error again.

So for me it isn't solved.

Kind regards

Mechtilde



signature.asc
Description: OpenPGP digital signature


Bug#694473: [php-maint] Bug#694473: Fix doesn't work for me

2013-02-07 Thread Ondřej Surý
Please provide a backtrace.  And if you can please test with PHP from
experimental.

Thanks,
Ondrej

On Thu, Feb 7, 2013 at 11:11 AM, Mechtilde o...@mechtilde.de wrote:
 Hello

 on my testing system which also updated yesterday and today I get the
 same error again.

 So for me it isn't solved.

 Kind regards

 Mechtilde


 ___
 pkg-php-maint mailing list
 pkg-php-ma...@lists.alioth.debian.org
 http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-php-maint



-- 
Ondřej Surý ond...@sury.org


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699852: syncevolution-http: sync from nokia e51 to syncevo-http-server not possible invalid server [ERROR] twisted: Unhandled Error

2013-02-07 Thread Christof Schulze
Hi,

following the advice of Patrick Ohly, I compiled the latest version of
syncevolution (1.3.99.2) on this machine and the issue is resolved.

Please upgrade syncevolution to this version.

Regards

Christof
-- 
()  ascii ribbon campaign - against html e-mail
/\  www.asciiribbon.org   - against proprietary attachments


signature.asc
Description: This is a digitally signed message part.


Bug#700008: FTBFS: strip.c:24:28: fatal error: linux/if_strip.h: No such file or directory

2013-02-07 Thread Adam Borowski
Package: src:net-tools
Version: 1.60-24.2
Severity: serious
Tags: patch
Justification: fails to build from source (but built successfully in the past)

Apparently, STRIP support is now an unthing, and kernel headers no longer
have it.

Ubuntu have already patched it; from their patch:

diff -pruN 1.60-24.2/debian/config.h 1.60-24.2ubuntu1/debian/config.h
--- 1.60-24.2/debian/config.h   2012-12-04 01:05:53.0 +
+++ 1.60-24.2ubuntu1/debian/config.h2012-12-04 01:05:54.0 +
@@ -49,8 +49,8 @@
 #define HAVE_HWSLIP 1
 #define HAVE_HWPPP 1
 #define HAVE_HWTUNNEL 1
-#define HAVE_HWSTRIP 1
-#define HAVE_HWTR 1
+#define HAVE_HWSTRIP 0
+#define HAVE_HWTR 0
 #define HAVE_HWAX25 1
 #define HAVE_HWROSE 1
 #define HAVE_HWNETROM 1
diff -pruN 1.60-24.2/debian/config.make 1.60-24.2ubuntu1/debian/config.make
--- 1.60-24.2/debian/config.make2012-12-04 01:05:53.0 +
+++ 1.60-24.2ubuntu1/debian/config.make 2012-12-04 01:05:54.0 +
@@ -16,8 +16,8 @@ HAVE_HWARC=1
 HAVE_HWSLIP=1
 HAVE_HWPPP=1
 HAVE_HWTUNNEL=1
-HAVE_HWSTRIP=1
-HAVE_HWTR=1
+HAVE_HWSTRIP=0
+HAVE_HWTR=0
 HAVE_HWAX25=1
 HAVE_HWROSE=1
 HAVE_HWNETROM=1

which makes net-tools build again.


-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (150, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.7.1-x32 (SMP w/6 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699596: syslinux-common: vesamenu.c32 is not a valid com32 image

2013-02-07 Thread Yves-Alexis Perez
On jeu., 2013-02-07 at 08:37 +0100, Daniel Baumann wrote:
 On 02/06/2013 10:03 PM, Yves-Alexis Perez wrote:
  There's no such thing as libcom32.c32 in /boot so that'd explain why.
 
 you might want to look at the bug it was merged with, specifically:
 
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699382#40
 
And? I'm not especially saying it's not the same bug, just that:

- my system is not unbootable
- I have no idea if it's syslinux or syslinux-themes-debian fault
- the bug is still present in 2:5.01+dfsg-1 / 12-1.1

If it needs manual tuning in some scripts to port it to the new
syslinux, then fine, you seem to be the de factor maintainer of both
packages so everything's under your control.

Regards,
-- 
Yves-Alexis


signature.asc
Description: This is a digitally signed message part


Bug#699596: syslinux-common: vesamenu.c32 is not a valid com32 image

2013-02-07 Thread Daniel Baumann

On 02/07/2013 01:02 PM, Yves-Alexis Perez wrote:

- I have no idea if it's syslinux or syslinux-themes-debian fault


did you read the other bug?

usually, opening a duplicate bug doesn't mean that the maintainer will 
re-tell the whole story again, and that pointing to the first bug about 
the same issue should be enough, so that the bug reporter would read it 
there when being pointed at it.



- the bug is still present in 2:5.01+dfsg-1 / 12-1.1


that's why it's open and not closed yet.


If it needs manual tuning in some scripts to port it to the new
syslinux, then fine, you seem to be the de factor maintainer of both
packages so everything's under your control.


look at the live-build commit and replicate it in 
/usr/share/syslinux/theme/$your_theme, or wait until the theme in debian 
is fixed.


--
Address:Daniel Baumann, Donnerbuehlweg 3, CH-3012 Bern
Email:  daniel.baum...@progress-technologies.net
Internet:   http://people.progress-technologies.net/~daniel.baumann/


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#693208: Bug#699899: tpu: clang/3.0-6.1+deb7u0

2013-02-07 Thread Michael Stapelberg
Hi Adam,

Adam D. Barratt a...@adam-barratt.org.uk writes:
 I wasn't particularly suggesting re-introducing 3.0 to unstable.
 However, given that packages from tpu get essentially no testing at all
 (no pun intended) before hitting testing, being able to prove a patch in
 unstable first avoids a number of (admittedly not all) potential
 issues.
Now I understand what your point was, thanks for clarifying.

 Looking at the proposed tpu diff and the 3.0 - 3.1 diff, it looks like
 the armhf changes should apply as is to 3.1; has anyone tried that?
I have ported the patches from 3.0 to 3.1 and successfully built the
package on amd64, where it works.

Therefore, I will now build it on armhf, which will take around a day.

Sylvestre: Are you okay with me NMUing clang 3.1-8.1 to unstable in
order to expose my changes to a wider audience before we do the fix via
t-p-u?

-- 
Best regards,
Michael


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#591199: marked as done (yui: does not build swf files from source)

2013-02-07 Thread Debian Bug Tracking System
Your message dated Thu, 07 Feb 2013 12:19:08 +
with message-id e1u3qry-00054k...@franck.debian.org
and subject line Bug#591199: fixed in yui 2.9.0.dfsg.0.1-0.1
has caused the Debian Bug report #591199,
regarding yui: does not build swf files from source
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
591199: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591199
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Source: yui
Version: 2.8.1-1
Severity: serious

Hi,

yui ships multiple swf files but does not build them from source.

Cheers,
-- 
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net


---End Message---
---BeginMessage---
Source: yui
Source-Version: 2.9.0.dfsg.0.1-0.1

We believe that the bug you reported is fixed in the latest version of
yui, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 591...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Dominic Hargreaves d...@earth.li (supplier of updated yui package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sun, 03 Feb 2013 11:54:19 +
Source: yui
Binary: libjs-yui libjs-yui-doc
Architecture: source all
Version: 2.9.0.dfsg.0.1-0.1
Distribution: unstable
Urgency: low
Maintainer: Debian Javascript Maintainers 
pkg-javascript-de...@lists.alioth.debian.org
Changed-By: Dominic Hargreaves d...@earth.li
Description: 
 libjs-yui  - Yahoo User Interface Library
 libjs-yui-doc - Documentation and examples for the Yahoo User Interface Library
Closes: 591199 692434
Changes: 
 yui (2.9.0.dfsg.0.1-0.1) unstable; urgency=low
 .
   * Non-maintainer upload.
   * Disable installation of uploader.swf and swfstore.swf as examples
 owing to unfixed security issues (Closes: #692434)
   * Repack orig.tar.gz to remove all SWF files, including those
 without source (Closes: #591199)
Checksums-Sha1: 
 e7945d332e3a9deba6acc5f19d032609372c9b11 1443 yui_2.9.0.dfsg.0.1-0.1.dsc
 4602442034cf4b0a9ab12370ba94f7e6fce80649 10944741 
yui_2.9.0.dfsg.0.1.orig.tar.gz
 ecad33d65a1968cc80d495456e0d5ef3fec85037 24422 
yui_2.9.0.dfsg.0.1-0.1.debian.tar.gz
 6e312ccd553ef1eb33760c663248a2557b066b13 2478182 
libjs-yui_2.9.0.dfsg.0.1-0.1_all.deb
 16c824112ef7c4da3dae97cacf52ce528d016c62 7670202 
libjs-yui-doc_2.9.0.dfsg.0.1-0.1_all.deb
Checksums-Sha256: 
 5d39440dbf4da7a57b77441599c09a0513267a319f4ae623754ca4b948595596 1443 
yui_2.9.0.dfsg.0.1-0.1.dsc
 aa3a2f09edb65cf0b6261164bece9f4f7784f2eb2c9363fa2c5f111d452169aa 10944741 
yui_2.9.0.dfsg.0.1.orig.tar.gz
 d61ebf8154b54868805535a1ba0175ff90c07d84f0bdc46356056a69c38f84a6 24422 
yui_2.9.0.dfsg.0.1-0.1.debian.tar.gz
 6281b3dbc0a13ba1e455d4841e7df95d49c2ff1cb9a02bde50bc35042337d5bf 2478182 
libjs-yui_2.9.0.dfsg.0.1-0.1_all.deb
 df795b752c806bccc05d957fbb9c04061487cf5e2b3140333c7fd71195f25d5c 7670202 
libjs-yui-doc_2.9.0.dfsg.0.1-0.1_all.deb
Files: 
 a3363dd5c7386ec8979e29ec1b22cde0 1443 web optional yui_2.9.0.dfsg.0.1-0.1.dsc
 b6e5418833e342e9dcaaf7b451657346 10944741 web optional 
yui_2.9.0.dfsg.0.1.orig.tar.gz
 a58439ee57db6cd2641652fec8e40811 24422 web optional 
yui_2.9.0.dfsg.0.1-0.1.debian.tar.gz
 0deff15a4a40ba4f03e34e66e271e88c 2478182 web optional 
libjs-yui_2.9.0.dfsg.0.1-0.1_all.deb
 a03aa9a7315e5b92db238a3e5cd5bac3 7670202 doc optional 
libjs-yui-doc_2.9.0.dfsg.0.1-0.1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFRDlC/YzuFKFF44qURAlo7AJ9V8NZHNEdPfDlxkv4nCkql3215oQCdGf5W
eWHQrU4WTBbwfbMg8jHE9uc=
=enZY
-END PGP SIGNATUREEnd Message---


Bug#692434: marked as done (CVE-2012-5883, CVE-2012-5882, CVE-2012-5881 - YUI 2.x security issue regarding embedded SWF files)

2013-02-07 Thread Debian Bug Tracking System
Your message dated Thu, 07 Feb 2013 12:19:08 +
with message-id e1u3qry-00054o...@franck.debian.org
and subject line Bug#692434: fixed in yui 2.9.0.dfsg.0.1-0.1
has caused the Debian Bug report #692434,
regarding CVE-2012-5883, CVE-2012-5882, CVE-2012-5881 - YUI 2.x security issue 
regarding embedded SWF files
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
692434: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692434
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: yui
Severity: grave
Tags: security
Justification: user security hole

Hi,
please see :
http://www.yuiblog.com/blog/2012/10/30/security-announcement-swf-vulnerability-
in-yui-2/

Are vulnerable versions in Debian?

Cheers,
luciano
---End Message---
---BeginMessage---
Source: yui
Source-Version: 2.9.0.dfsg.0.1-0.1

We believe that the bug you reported is fixed in the latest version of
yui, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 692...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Dominic Hargreaves d...@earth.li (supplier of updated yui package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sun, 03 Feb 2013 11:54:19 +
Source: yui
Binary: libjs-yui libjs-yui-doc
Architecture: source all
Version: 2.9.0.dfsg.0.1-0.1
Distribution: unstable
Urgency: low
Maintainer: Debian Javascript Maintainers 
pkg-javascript-de...@lists.alioth.debian.org
Changed-By: Dominic Hargreaves d...@earth.li
Description: 
 libjs-yui  - Yahoo User Interface Library
 libjs-yui-doc - Documentation and examples for the Yahoo User Interface Library
Closes: 591199 692434
Changes: 
 yui (2.9.0.dfsg.0.1-0.1) unstable; urgency=low
 .
   * Non-maintainer upload.
   * Disable installation of uploader.swf and swfstore.swf as examples
 owing to unfixed security issues (Closes: #692434)
   * Repack orig.tar.gz to remove all SWF files, including those
 without source (Closes: #591199)
Checksums-Sha1: 
 e7945d332e3a9deba6acc5f19d032609372c9b11 1443 yui_2.9.0.dfsg.0.1-0.1.dsc
 4602442034cf4b0a9ab12370ba94f7e6fce80649 10944741 
yui_2.9.0.dfsg.0.1.orig.tar.gz
 ecad33d65a1968cc80d495456e0d5ef3fec85037 24422 
yui_2.9.0.dfsg.0.1-0.1.debian.tar.gz
 6e312ccd553ef1eb33760c663248a2557b066b13 2478182 
libjs-yui_2.9.0.dfsg.0.1-0.1_all.deb
 16c824112ef7c4da3dae97cacf52ce528d016c62 7670202 
libjs-yui-doc_2.9.0.dfsg.0.1-0.1_all.deb
Checksums-Sha256: 
 5d39440dbf4da7a57b77441599c09a0513267a319f4ae623754ca4b948595596 1443 
yui_2.9.0.dfsg.0.1-0.1.dsc
 aa3a2f09edb65cf0b6261164bece9f4f7784f2eb2c9363fa2c5f111d452169aa 10944741 
yui_2.9.0.dfsg.0.1.orig.tar.gz
 d61ebf8154b54868805535a1ba0175ff90c07d84f0bdc46356056a69c38f84a6 24422 
yui_2.9.0.dfsg.0.1-0.1.debian.tar.gz
 6281b3dbc0a13ba1e455d4841e7df95d49c2ff1cb9a02bde50bc35042337d5bf 2478182 
libjs-yui_2.9.0.dfsg.0.1-0.1_all.deb
 df795b752c806bccc05d957fbb9c04061487cf5e2b3140333c7fd71195f25d5c 7670202 
libjs-yui-doc_2.9.0.dfsg.0.1-0.1_all.deb
Files: 
 a3363dd5c7386ec8979e29ec1b22cde0 1443 web optional yui_2.9.0.dfsg.0.1-0.1.dsc
 b6e5418833e342e9dcaaf7b451657346 10944741 web optional 
yui_2.9.0.dfsg.0.1.orig.tar.gz
 a58439ee57db6cd2641652fec8e40811 24422 web optional 
yui_2.9.0.dfsg.0.1-0.1.debian.tar.gz
 0deff15a4a40ba4f03e34e66e271e88c 2478182 web optional 
libjs-yui_2.9.0.dfsg.0.1-0.1_all.deb
 a03aa9a7315e5b92db238a3e5cd5bac3 7670202 doc optional 
libjs-yui-doc_2.9.0.dfsg.0.1-0.1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFRDlC/YzuFKFF44qURAlo7AJ9V8NZHNEdPfDlxkv4nCkql3215oQCdGf5W
eWHQrU4WTBbwfbMg8jHE9uc=
=enZY
-END PGP SIGNATUREEnd Message---


Bug#591383: marked as done (libjs-yui: does not build .swf files from source)

2013-02-07 Thread Debian Bug Tracking System
Your message dated Thu, 07 Feb 2013 12:19:08 +
with message-id e1u3qry-00054k...@franck.debian.org
and subject line Bug#591199: fixed in yui 2.9.0.dfsg.0.1-0.1
has caused the Debian Bug report #591199,
regarding libjs-yui: does not build .swf files from source
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
591199: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591199
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Source: otrs2
Version: 2.4.7-5
Severity: serious

Hi,

otrs2 ships multiple swf files which are not built from source.

Cheers,
-- 
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net


---End Message---
---BeginMessage---
Source: yui
Source-Version: 2.9.0.dfsg.0.1-0.1

We believe that the bug you reported is fixed in the latest version of
yui, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 591...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Dominic Hargreaves d...@earth.li (supplier of updated yui package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sun, 03 Feb 2013 11:54:19 +
Source: yui
Binary: libjs-yui libjs-yui-doc
Architecture: source all
Version: 2.9.0.dfsg.0.1-0.1
Distribution: unstable
Urgency: low
Maintainer: Debian Javascript Maintainers 
pkg-javascript-de...@lists.alioth.debian.org
Changed-By: Dominic Hargreaves d...@earth.li
Description: 
 libjs-yui  - Yahoo User Interface Library
 libjs-yui-doc - Documentation and examples for the Yahoo User Interface Library
Closes: 591199 692434
Changes: 
 yui (2.9.0.dfsg.0.1-0.1) unstable; urgency=low
 .
   * Non-maintainer upload.
   * Disable installation of uploader.swf and swfstore.swf as examples
 owing to unfixed security issues (Closes: #692434)
   * Repack orig.tar.gz to remove all SWF files, including those
 without source (Closes: #591199)
Checksums-Sha1: 
 e7945d332e3a9deba6acc5f19d032609372c9b11 1443 yui_2.9.0.dfsg.0.1-0.1.dsc
 4602442034cf4b0a9ab12370ba94f7e6fce80649 10944741 
yui_2.9.0.dfsg.0.1.orig.tar.gz
 ecad33d65a1968cc80d495456e0d5ef3fec85037 24422 
yui_2.9.0.dfsg.0.1-0.1.debian.tar.gz
 6e312ccd553ef1eb33760c663248a2557b066b13 2478182 
libjs-yui_2.9.0.dfsg.0.1-0.1_all.deb
 16c824112ef7c4da3dae97cacf52ce528d016c62 7670202 
libjs-yui-doc_2.9.0.dfsg.0.1-0.1_all.deb
Checksums-Sha256: 
 5d39440dbf4da7a57b77441599c09a0513267a319f4ae623754ca4b948595596 1443 
yui_2.9.0.dfsg.0.1-0.1.dsc
 aa3a2f09edb65cf0b6261164bece9f4f7784f2eb2c9363fa2c5f111d452169aa 10944741 
yui_2.9.0.dfsg.0.1.orig.tar.gz
 d61ebf8154b54868805535a1ba0175ff90c07d84f0bdc46356056a69c38f84a6 24422 
yui_2.9.0.dfsg.0.1-0.1.debian.tar.gz
 6281b3dbc0a13ba1e455d4841e7df95d49c2ff1cb9a02bde50bc35042337d5bf 2478182 
libjs-yui_2.9.0.dfsg.0.1-0.1_all.deb
 df795b752c806bccc05d957fbb9c04061487cf5e2b3140333c7fd71195f25d5c 7670202 
libjs-yui-doc_2.9.0.dfsg.0.1-0.1_all.deb
Files: 
 a3363dd5c7386ec8979e29ec1b22cde0 1443 web optional yui_2.9.0.dfsg.0.1-0.1.dsc
 b6e5418833e342e9dcaaf7b451657346 10944741 web optional 
yui_2.9.0.dfsg.0.1.orig.tar.gz
 a58439ee57db6cd2641652fec8e40811 24422 web optional 
yui_2.9.0.dfsg.0.1-0.1.debian.tar.gz
 0deff15a4a40ba4f03e34e66e271e88c 2478182 web optional 
libjs-yui_2.9.0.dfsg.0.1-0.1_all.deb
 a03aa9a7315e5b92db238a3e5cd5bac3 7670202 doc optional 
libjs-yui-doc_2.9.0.dfsg.0.1-0.1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFRDlC/YzuFKFF44qURAlo7AJ9V8NZHNEdPfDlxkv4nCkql3215oQCdGf5W
eWHQrU4WTBbwfbMg8jHE9uc=
=enZY
-END PGP SIGNATUREEnd Message---


Bug#693608: marked as done (CVE-2012-5883, CVE-2012-5882, CVE-2012-5881 - YUI 2.x security issue regarding embedded SWF files)

2013-02-07 Thread Debian Bug Tracking System
Your message dated Thu, 07 Feb 2013 12:19:08 +
with message-id e1u3qry-00054o...@franck.debian.org
and subject line Bug#692434: fixed in yui 2.9.0.dfsg.0.1-0.1
has caused the Debian Bug report #692434,
regarding CVE-2012-5883, CVE-2012-5882, CVE-2012-5881 - YUI 2.x security issue 
regarding embedded SWF files
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
692434: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692434
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: yui
Severity: grave
Tags: security

Hi,
the following vulnerabilities were published for yui.

CVE-2012-5883[0]:
| Cross-site scripting (XSS) vulnerability in the Flash component
| infrastructure in YUI 2.8.0 through 2.9.0, as used in Bugzilla 3.7.x
| and 4.0.x before 4.0.9, 4.1.x and 4.2.x before 4.2.4, and 4.3.x and
| 4.4.x before 4.4rc1, allows remote attackers to inject arbitrary web
| script or HTML via vectors related to swfstore.swf, a similar issue to
| CVE-2010-4209.

CVE-2012-5882[1]:
| Cross-site scripting (XSS) vulnerability in the Flash component
| infrastructure in YUI 2.5.0 through 2.9.0 allows remote attackers to
| inject arbitrary web script or HTML via vectors related to
| uploader.swf, a similar issue to CVE-2010-4208.

CVE-2012-5881[2]:
| Cross-site scripting (XSS) vulnerability in the Flash component
| infrastructure in YUI 2.4.0 through 2.9.0 allows remote attackers to
| inject arbitrary web script or HTML via vectors related to charts.swf,
| a similar issue to CVE-2010-4207.

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities  Exposures) ids in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5883
http://security-tracker.debian.org/tracker/CVE-2012-5883
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5882
http://security-tracker.debian.org/tracker/CVE-2012-5882
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5881
http://security-tracker.debian.org/tracker/CVE-2012-5881
http://yuilibrary.com/support/20121030-vulnerability/

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0


pgpiYlJW3T9ty.pgp
Description: PGP signature
---End Message---
---BeginMessage---
Source: yui
Source-Version: 2.9.0.dfsg.0.1-0.1

We believe that the bug you reported is fixed in the latest version of
yui, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 692...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Dominic Hargreaves d...@earth.li (supplier of updated yui package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sun, 03 Feb 2013 11:54:19 +
Source: yui
Binary: libjs-yui libjs-yui-doc
Architecture: source all
Version: 2.9.0.dfsg.0.1-0.1
Distribution: unstable
Urgency: low
Maintainer: Debian Javascript Maintainers 
pkg-javascript-de...@lists.alioth.debian.org
Changed-By: Dominic Hargreaves d...@earth.li
Description: 
 libjs-yui  - Yahoo User Interface Library
 libjs-yui-doc - Documentation and examples for the Yahoo User Interface Library
Closes: 591199 692434
Changes: 
 yui (2.9.0.dfsg.0.1-0.1) unstable; urgency=low
 .
   * Non-maintainer upload.
   * Disable installation of uploader.swf and swfstore.swf as examples
 owing to unfixed security issues (Closes: #692434)
   * Repack orig.tar.gz to remove all SWF files, including those
 without source (Closes: #591199)
Checksums-Sha1: 
 e7945d332e3a9deba6acc5f19d032609372c9b11 1443 yui_2.9.0.dfsg.0.1-0.1.dsc
 4602442034cf4b0a9ab12370ba94f7e6fce80649 10944741 
yui_2.9.0.dfsg.0.1.orig.tar.gz
 ecad33d65a1968cc80d495456e0d5ef3fec85037 24422 
yui_2.9.0.dfsg.0.1-0.1.debian.tar.gz
 6e312ccd553ef1eb33760c663248a2557b066b13 2478182 
libjs-yui_2.9.0.dfsg.0.1-0.1_all.deb
 16c824112ef7c4da3dae97cacf52ce528d016c62 7670202 
libjs-yui-doc_2.9.0.dfsg.0.1-0.1_all.deb
Checksums-Sha256: 
 5d39440dbf4da7a57b77441599c09a0513267a319f4ae623754ca4b948595596 1443 
yui_2.9.0.dfsg.0.1-0.1.dsc
 aa3a2f09edb65cf0b6261164bece9f4f7784f2eb2c9363fa2c5f111d452169aa 10944741 
yui_2.9.0.dfsg.0.1.orig.tar.gz
 

Bug#699596: syslinux-common: vesamenu.c32 is not a valid com32 image

2013-02-07 Thread Yves-Alexis Perez
On jeu., 2013-02-07 at 13:19 +0100, Daniel Baumann wrote:
 On 02/07/2013 01:02 PM, Yves-Alexis Perez wrote:
  - I have no idea if it's syslinux or syslinux-themes-debian fault
 
 did you read the other bug?

Actually yes, even without being bitten by the bug it'd be hard to miss.
 
 usually, opening a duplicate bug doesn't mean that the maintainer will 
 re-tell the whole story again, and that pointing to the first bug about 
 the same issue should be enough, so that the bug reporter would read it 
 there when being pointed at it.
 
  - the bug is still present in 2:5.01+dfsg-1 / 12-1.1
 
 that's why it's open and not closed yet.

Yeah, I was merely pointing out that version tracking was definitely
confusing here (because of the reassigns)
 
  If it needs manual tuning in some scripts to port it to the new
  syslinux, then fine, you seem to be the de factor maintainer of both
  packages so everything's under your control.
 
 look at the live-build commit and replicate it in 
 /usr/share/syslinux/theme/$your_theme,

Actually it's $your_theme, but eh.

  or wait until the theme in debian 
 is fixed.

I'm waiting.
-- 
Yves-Alexis


signature.asc
Description: This is a digitally signed message part


Bug#699596: syslinux-common: vesamenu.c32 is not a valid com32 image

2013-02-07 Thread Daniel Baumann

On 02/07/2013 01:25 PM, Yves-Alexis Perez wrote:

Actually it's $your_theme, but eh.


i ment '$your_theme' as in 'the one you've chosen from the ones that are 
available in the package', but whatever.


--
Address:Daniel Baumann, Donnerbuehlweg 3, CH-3012 Bern
Email:  daniel.baum...@progress-technologies.net
Internet:   http://people.progress-technologies.net/~daniel.baumann/


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#693208: Bug#699899: tpu: clang/3.0-6.1+deb7u0

2013-02-07 Thread Sylvestre Ledru
Le 02/07/13 13:15, Michael Stapelberg a écrit :
 Hi Adam,

 Adam D. Barratt a...@adam-barratt.org.uk writes:
 Looking at the proposed tpu diff and the 3.0 - 3.1 diff, it looks like
 the armhf changes should apply as is to 3.1; has anyone tried that?
 I have ported the patches from 3.0 to 3.1 and successfully built the
 package on amd64, where it works.

 Therefore, I will now build it on armhf, which will take around a day.

 Sylvestre: Are you okay with me NMUing clang 3.1-8.1 to unstable in
 order to expose my changes to a wider audience before we do the fix via
 t-p-u?

Please go ahread. :)

Thanks again,
Sylvestre


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699859: PlayOnLinux doesn't start

2013-02-07 Thread Markus Koschany
Hello,

i'm not sure if the creators of PlayOnLinux have ever considered the
software to be used on kfreeBSD.

However can you confirm that the software is otherwise usable if you
modify the check for a Linux system in /usr/share/playonlinux/playonlinux?

If this is the case then a simple solution would be to improve the check
and to test whether a Linux kernel or a kFreeBSD kernel is in use.

If you cannot use playonlinux although you have removed the check then
it's probably better to state in README.Debian that kfreeBSD is not
supported.

Regards,

Markus



signature.asc
Description: OpenPGP digital signature


Bug#694473: [php-maint] Bug#694473: Fix doesn't work for me

2013-02-07 Thread Mechtilde
Hello Ondrej,

Can you provide me an exact description what you need as backtrace.
then I will send you the data I have.

I I repeated the test under an actual Sid with php5 from experimental in
the same virtual machine as I did the first test writing this bugreport.

I get the same error message as before.

Kind regards

Mechtilde

Am 07.02.2013 11:21, schrieb Ondřej Surý:
 Please provide a backtrace.  And if you can please test with PHP from
 experimental.
 
 Thanks,
 Ondrej
 
 On Thu, Feb 7, 2013 at 11:11 AM, Mechtilde o...@mechtilde.de wrote:
 Hello

 on my testing system which also updated yesterday and today I get the
 same error again.

 So for me it isn't solved.

 Kind regards

 Mechtilde




signature.asc
Description: OpenPGP digital signature


Bug#700027: kfreebsd-kernel-headers: Redefinition of struct termios

2013-02-07 Thread Guillem Jover
Package: kfreebsd-kernel-headers
Version: 0.82
Severity: serious
Control: affects -1 inetutils

Hi!

I just uploaded a new inetutils version (with a minimal change) which
FTBFS, but it built fine before. Just for reference, here's the build
log:

  
https://buildd.debian.org/status/fetch.php?pkg=inetutilsarch=kfreebsd-amd64ver=2%3A1.9-2stamp=1360207021

The problem is a redefinition of struct termios, that can be
reproduced with something like:

,--- termios.c
#include sys/tty.h
#include termios.h
int main() { return 0; }
`---

I'm filing this to track the issue, and because I have to do some
other stuff, if no one else has dealt with it by then I'll look into
fixing and uploading the package.

Thanks,
Guillem


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: kfreebsd-kernel-headers: Redefinition of struct termios

2013-02-07 Thread Debian Bug Tracking System
Processing control commands:

 affects -1 inetutils
Bug #700027 [kfreebsd-kernel-headers] kfreebsd-kernel-headers: Redefinition of 
struct termios
Added indication that 700027 affects inetutils

-- 
700027: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700027
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#693208: Bug#699899: tpu: clang/3.0-6.1+deb7u0

2013-02-07 Thread Michael Stapelberg
Hi Adam,

Michael Stapelberg stapelb...@debian.org writes:
 Therefore, I will now build it on armhf, which will take around a day.
Update: the armhf build failed because about 100 testcases fail.

I have no clue on how to fix this and can’t spend much more time on
debugging this either.

Given that the 3.0 version works — it passed all the clang tests and can
compile non-trivial software on armhf and amd64 — can we just upload
that? Or, as a last resort, re-introduce 3.0 in unstable, even if
switching to an epoch is ugly?

-- 
Best regards,
Michael


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#675684: closing 675684

2013-02-07 Thread Joachim Breitner
close 675684 
thanks


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: closing 675684

2013-02-07 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 close 675684
Bug #675684 [src:haskell-github] Needs to bump http-conduit dependency
Marked Bug as done
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
675684: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=675684
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: severity of 699848 is serious

2013-02-07 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 # raising severity since I think the package is actually useless like this
 severity 699848 serious
Bug #699848 [sks] sks: sks_build.sh hangs
Severity set to 'serious' from 'normal'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
699848: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699848
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#693208: Bug#699899: tpu: clang/3.0-6.1+deb7u0

2013-02-07 Thread Sylvestre Ledru
Le 02/07/13 18:07, Michael Stapelberg a écrit :
 Hi Adam,

 Michael Stapelberg stapelb...@debian.org writes:
 Therefore, I will now build it on armhf, which will take around a day.
 Update: the armhf build failed because about 100 testcases fail.

 I have no clue on how to fix this and can’t spend much more time on
 debugging this either.

 Given that the 3.0 version works — it passed all the clang tests and can
 compile non-trivial software on armhf and amd64 — can we just upload
 that? Or, as a last resort, re-introduce 3.0 in unstable, even if
 switching to an epoch is ugly?

Don't bother too much about the epoch, clang source package is going to
be removed anyway...
(I am working on a LLVM toolchain package including llvm + clang + other
stuff).

Sylvestre


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#700037: libgo-perl: libgraphviz-perl dependency missing

2013-02-07 Thread Laszlo Kajan
Package: libgo-perl
Version: 0.13-1
Severity: grave
Justification: renders package unusable

Dear Maintainer, Deb Med Team, so myself as well,

/usr/share/perl5/GO/IO/Dotty.pm:24: 'use GraphViz;'. However d/control does not 
Depends: libgraphviz-perl.

Module fails to load when libgraphviz-perl is not installed.

I am fixing this in an upload to upstable as soon as I get the bug number.

Laszlo

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (990, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF8, LC_CTYPE=en_US.UTF8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_US.UTF8)
Shell: /bin/sh linked to /bin/dash

Versions of packages libgo-perl depends on:
ii  libdata-stag-perl  0.11-2
ii  perl   5.14.2-17
ii  perl-modules   5.14.2-17

Versions of packages libgo-perl recommends:
ii  libxml-checker-perl  0.13-5
ii  libxml-libxml-perl   2.0010+dfsg-1
ii  libxml-libxslt-perl  1.78-1
ii  libxml-writer-perl   0.615-1
ii  xsltproc 1.1.26-14

Versions of packages libgo-perl suggests:
ii  bioperl  1.6.901-3

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#673038: Re: [Pkg-openldap-devel] Bug#673038: Bug#673038: slapd: slapcat output truncated every now and then

2013-02-07 Thread Bálint Réczey
tags 673038 + patch fixed-upstream
thanks

Hi All,

2013/1/28 Bálint Réczey bal...@balintreczey.hu:
...

 I think we're all in agreement that the code should be fixed.  Please
 help to do that, if you can.
 Upstream has rejected the proposed fix.
 Since it seems I'm not familiar enough with upstream's plans and
 coding practices I'm not the best person to provide a fix.
Upstream (Howard Chu, thanks!) has committed and alternate fix [1] [2].
Please consider back-porting it to Debian instead of using my patch.

Cheers,
Balint

[1]: http://www.openldap.org/lists/openldap-bugs/201302/msg00016.html
[2]: 
http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=blobdiff;f=servers/slapd/back-bdb/init.c;h=57690fc532a3c3c803ceeb1b404ad5952b5df734;hp=1d8527332a956d4c4122ae94a69f07ba9f4da9a1;hb=HEAD;hpb=1c99711ede25860b24750aab9c529a49c53756ae


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Re: [Pkg-openldap-devel] Bug#673038: Bug#673038: slapd: slapcat output truncated every now and then

2013-02-07 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 673038 + patch fixed-upstream
Bug #673038 [slapd] slapd: slapcat output truncated every now and then
Added tag(s) fixed-upstream and patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
673038: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=673038
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#672524: [Pkg-bitcoin-devel] Bug#672524: upload of bitcoin package

2013-02-07 Thread Scott Howard
Uploaded, thanks so much for your help!

Here is the results from the buildlog.



Debug output for #672524
pwd
/build/buildd-bitcoin_0.7.2-3-kfreebsd-i386-Os85sN/bitcoin-0.7.2
ls -Rl .
{SNIP}
./src/test/data:
total 96
-rw-r--r-- 1 buildd sbuild   438 Dec 10 14:47 base58_encode_decode.json
-rw-r--r-- 1 buildd sbuild  4195 Dec 10 14:47 base58_keys_invalid.json
-rw-r--r-- 1 buildd sbuild 12618 Dec 10 14:47 base58_keys_valid.json
-rw-r--r-- 1 buildd sbuild 20645 Dec 10 14:47 script_invalid.json
-rw-r--r-- 1 buildd sbuild 33360 Dec 10 14:47 script_valid.json
-rw-r--r-- 1 buildd sbuild  7507 Dec 10 14:47 tx_invalid.json
-rw-r--r-- 1 buildd sbuild  9525 Dec 10 14:47 tx_valid.json

ok so it is there. Later on:

HOME=/build/buildd-bitcoin_0.7.2-3-kfreebsd-i386-Os85sN/bitcoin-0.7.2/debian/home
src/test_bitcoin
Running 70 test cases...
Trying to open 
/build/buildd-bitcoin_0.7.2-3-kfreebsd-1-Os85sN/bitcoin-0.7.2/src/test/data/base58_encode_decode.json
test/script_tests.cpp(109): error in base58_EncodeBase58: Cound not
find/open base58_encode_decode.json
Trying to open 
/build/buildd-bitcoin_0.7.2-3-kfreebsd-1-Os85sN/bitcoin-0.7.2/src/test/data/base58_encode_decode.json
test/script_tests.cpp(109): error in base58_DecodeBase58: Cound not
find/open base58_encode_decode.json
Trying to open 
/build/buildd-bitcoin_0.7.2-3-kfreebsd-1-Os85sN/bitcoin-0.7.2/src/test/data/base58_keys_valid.json
test/script_tests.cpp(109): error in base58_keys_valid_parse: Cound
not find/open base58_keys_valid.json
Trying to open 
/build/buildd-bitcoin_0.7.2-3-kfreebsd-1-Os85sN/bitcoin-0.7.2/src/test/data/base58_keys_valid.json
test/script_tests.cpp(109): error in base58_keys_valid_gen: Cound
not find/open base58_keys_valid.json
Trying to open 
/build/buildd-bitcoin_0.7.2-3-kfreebsd-1-Os85sN/bitcoin-0.7.2/src/test/data/base58_keys_invalid.json
test/script_tests.cpp(109): error in base58_keys_invalid: Cound not
find/open base58_keys_invalid.json
Trying to open 
/build/buildd-bitcoin_0.7.2-3-kfreebsd-1-Os85sN/bitcoin-0.7.2/src/test/data/script_valid.json
test/script_tests.cpp(109): error in script_valid: Cound not
find/open script_valid.json
Trying to open 
/build/buildd-bitcoin_0.7.2-3-kfreebsd-1-Os85sN/bitcoin-0.7.2/src/test/data/script_invalid.json
test/script_tests.cpp(109): error in script_invalid: Cound not
find/open script_invalid.json
Trying to open 
/build/buildd-bitcoin_0.7.2-3-kfreebsd-1-Os85sN/bitcoin-0.7.2/src/test/data/tx_valid.json
test/script_tests.cpp(109): error in tx_valid: Cound not find/open
tx_valid.json
Trying to open 
/build/buildd-bitcoin_0.7.2-3-kfreebsd-1-Os85sN/bitcoin-0.7.2/src/test/data/tx_invalid.json
test/script_tests.cpp(109): error in tx_invalid: Cound not find/open
tx_invalid.json
*** 9 failures detected in test suite Bitcoin Test Suite
make: *** [debian/stamps-perpkg-build/bitcoind] Error 201

In summary: i386 and kfreebsd-i386 builds fail on buildd machines.
They don't fail on other machines, pbuilder chroots, or Ubuntu
builders. The failure comes from he test suite not being able to find
a file, but our debugging shows that the file exists and that it is
attempting to open the correct file.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#673038: Re: [Pkg-openldap-devel] Bug#673038: Bug#673038: slapd: slapcat output truncated every now and then

2013-02-07 Thread Bálint Réczey
2013/2/7 Quanah Gibson-Mount qua...@zimbra.com:
 --On Thursday, February 07, 2013 7:45 PM +0100 Bálint Réczey
 bal...@balintreczey.hu wrote:

 tags 673038 + patch fixed-upstream
 thanks
...
 Upstream (Howard Chu, thanks!) has committed and alternate fix [1] [2].
 Please consider back-porting it to Debian instead of using my patch.


 As noted in the follow up, this fix needs to be *tested* by someone who is
 affected.  Not just grabbed and applied.
Usually the considering part includes waiting for testers or testing
the fix. ;-)
I just wanted to note that the proposed patch (for which I set the
patch tag again)
is not the one I submitted.

Cheers,
Balint


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#673038: Re: [Pkg-openldap-devel] Bug#673038: Bug#673038: slapd: slapcat output truncated every now and then

2013-02-07 Thread Quanah Gibson-Mount
--On Thursday, February 07, 2013 7:45 PM +0100 Bálint Réczey 
bal...@balintreczey.hu wrote:



tags 673038 + patch fixed-upstream
thanks

Hi All,

2013/1/28 Bálint Réczey bal...@balintreczey.hu:
...


I think we're all in agreement that the code should be fixed.  Please
help to do that, if you can.

Upstream has rejected the proposed fix.
Since it seems I'm not familiar enough with upstream's plans and
coding practices I'm not the best person to provide a fix.

Upstream (Howard Chu, thanks!) has committed and alternate fix [1] [2].
Please consider back-porting it to Debian instead of using my patch.


As noted in the follow up, this fix needs to be *tested* by someone who is 
affected.  Not just grabbed and applied.


--Quanah

--

Quanah Gibson-Mount
Sr. Member of Technical Staff
Zimbra, Inc
A Division of VMware, Inc.

Zimbra ::  the leader in open source messaging and collaboration


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699889: [Pkg-openssl-devel] Bug#699889: several issues in Security Advisory 5 Feb 2013

2013-02-07 Thread Kurt Roeckx
On Wed, Feb 06, 2013 at 11:59:18AM +0100, Thijs Kinkhorst wrote:
 Package: openssl
 Severity: serious
 Tags: security
 
 Hi,
 
 Several issues were announced in the OpenSSL security advisory of 05 Feb 2013 
 (http://www.openssl.org/news/secadv_20130205.txt):
 
  SSL, TLS and DTLS Plaintext Recovery Attack (CVE-2013-0169)
  TLS 1.1 and 1.2 AES-NI crash (CVE-2012-2686) (does not affect stable)

It seems people are having issues with this patch.  commit
125093b59f3c2a2d33785b5563d929d0472f1721 is the problematic
commit, but is also the one that fixes both CVEs as far
as I can tell.

I understand that 1.0 isn't affected, so 0.9.8 probably also
isn't.

I might be able to fix the 2nd one by disabling the AES-NI
part.

  OCSP invalid key DoS issue (CVE-2013-0166)

I don't see this as being urgent.

So I'm waiting upstream to fix the 1.0.1d version before
uploading to unstable.  I think I'll also wait to see
if this applies to other versions or not.


Kurt


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#672524: [Pkg-bitcoin-devel] Bug#672524: upload of bitcoin package

2013-02-07 Thread Christoph Egger
Hi all!

Scott Howard showard...@gmail.com writes:
 In summary: i386 and kfreebsd-i386 builds fail on buildd machines.
 They don't fail on other machines, pbuilder chroots, or Ubuntu
 builders. The failure comes from he test suite not being able to find
 a file, but our debugging shows that the file exists and that it is
 attempting to open the correct file.

Not necessarily.

ifstream ifs(testFile.string().c_str(), ifstream::in);
Value v;
if (!read_stream(ifs, v))
{
if (ifs.fail())
BOOST_ERROR(Cound not find/open   filename);
else
BOOST_ERROR(JSON syntax error in   filename);
return Array();
}

The error is printed if the istream signals a fail() *after* parsing the
whole json context. [0] indicates this might just be someone trying to
read an invalid type from the stream (like an int while the next word in
facht is a name). I stopped digging the source after the first few
wrappers around wrappers around wrappers so no further analysis there.

Regards

Christoph

[0] http://en.cppreference.com/w/cpp/io/basic_ios/fail


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#672524: [Pkg-bitcoin-devel] Bug#672524: upload of bitcoin package

2013-02-07 Thread Petter Reinholdtsen
[Christoph Egger]
 The error is printed if the istream signals a fail() *after* parsing
 the whole json context. [0] indicates this might just be someone
 trying to read an invalid type from the stream (like an int while
 the next word in facht is a name). I stopped digging the source
 after the first few wrappers around wrappers around wrappers so no
 further analysis there.

But how can this only happen when the Debian autobuilders, and not
when building manually or built by Ubuntu?  The types should be the
same both places.

Any idea how to further debug this?  It is hard to pinpoint when it do
not show up during manual build.

-- 
Happy hacking
Petter Reinholdtsen


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#672524: [Pkg-bitcoin-devel] Bug#672524: upload of bitcoin package

2013-02-07 Thread Christoph Egger
Petter Reinholdtsen p...@hungry.com writes:
 [Christoph Egger]
 The error is printed if the istream signals a fail() *after* parsing
 the whole json context. [0] indicates this might just be someone
 trying to read an invalid type from the stream (like an int while
 the next word in facht is a name). I stopped digging the source
 after the first few wrappers around wrappers around wrappers so no
 further analysis there.

 But how can this only happen when the Debian autobuilders, and not
 when building manually or built by Ubuntu?  The types should be the
 same both places.

 Any idea how to further debug this?  It is hard to pinpoint when it do
 not show up during manual build.

One thing that is rather easy to test is to see if the ifstream is
actually bad() and not only fail(). If it is not bad() (and therefor no
IO error has occured) I fear it quickly gets to debugging the
boost::spririt parser which is -- I guess -- about impossible especially
without a way to reproduce it outside the buildds.

Regards

Christoph


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#700037: marked as done (libgo-perl: libgraphviz-perl dependency missing)

2013-02-07 Thread Debian Bug Tracking System
Your message dated Thu, 07 Feb 2013 19:47:34 +
with message-id e1u3xrw-0007bo...@franck.debian.org
and subject line Bug#700037: fixed in libgo-perl 0.13-2
has caused the Debian Bug report #700037,
regarding libgo-perl: libgraphviz-perl dependency missing
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
700037: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700037
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: libgo-perl
Version: 0.13-1
Severity: grave
Justification: renders package unusable

Dear Maintainer, Deb Med Team, so myself as well,

/usr/share/perl5/GO/IO/Dotty.pm:24: 'use GraphViz;'. However d/control does not 
Depends: libgraphviz-perl.

Module fails to load when libgraphviz-perl is not installed.

I am fixing this in an upload to upstable as soon as I get the bug number.

Laszlo

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (990, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF8, LC_CTYPE=en_US.UTF8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_US.UTF8)
Shell: /bin/sh linked to /bin/dash

Versions of packages libgo-perl depends on:
ii  libdata-stag-perl  0.11-2
ii  perl   5.14.2-17
ii  perl-modules   5.14.2-17

Versions of packages libgo-perl recommends:
ii  libxml-checker-perl  0.13-5
ii  libxml-libxml-perl   2.0010+dfsg-1
ii  libxml-libxslt-perl  1.78-1
ii  libxml-writer-perl   0.615-1
ii  xsltproc 1.1.26-14

Versions of packages libgo-perl suggests:
ii  bioperl  1.6.901-3

-- no debconf information
---End Message---
---BeginMessage---
Source: libgo-perl
Source-Version: 0.13-2

We believe that the bug you reported is fixed in the latest version of
libgo-perl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 700...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Laszlo Kajan lka...@debian.org (supplier of updated libgo-perl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 07 Feb 2013 19:24:51 +0100
Source: libgo-perl
Binary: libgo-perl
Architecture: source all
Version: 0.13-2
Distribution: unstable
Urgency: low
Maintainer: Debian Med Packaging Team 
debian-med-packag...@lists.alioth.debian.org
Changed-By: Laszlo Kajan lka...@debian.org
Description: 
 libgo-perl - perl modules for GO and other OBO ontologies
Closes: 700037
Changes: 
 libgo-perl (0.13-2) unstable; urgency=low
 .
   * Added missing libgraphviz-perl dependency (Closes: #700037).
Checksums-Sha1: 
 0b322a59b13089e0914677a35a1e5eae6d9be9cb 2073 libgo-perl_0.13-2.dsc
 c6b9f2c091c6a09a14f37cc9dc390d90b868b0b1 47141 libgo-perl_0.13-2.diff.gz
 6045548d17b4191da6a30f20da15dfe5f7c24416 358372 libgo-perl_0.13-2_all.deb
Checksums-Sha256: 
 73f7556c884ce5516f6bccdbe20b567eb1c2e76d6295fb45f11612d033bdfe56 2073 
libgo-perl_0.13-2.dsc
 26507509e5ef78b4fc60ae38ff973cb64f720c28b385cc85c06aee26b26447ed 47141 
libgo-perl_0.13-2.diff.gz
 52ac09ecadadfd1fef07409f50a57474cfd7b1bc8999031a7fae99362513e890 358372 
libgo-perl_0.13-2_all.deb
Files: 
 4543e9f00404bf568b018858ae3bb89e 2073 perl optional libgo-perl_0.13-2.dsc
 b4c8d26ba5059d41410fd23eb0768c86 47141 perl optional libgo-perl_0.13-2.diff.gz
 2d84281b3dee5e7d9be575e2f5ee423d 358372 perl optional libgo-perl_0.13-2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=tH4x
-END PGP 

Bug#700037: libgo-perl: libgraphviz-perl dependency missing

2013-02-07 Thread Adam D. Barratt
On Thu, 2013-02-07 at 19:33 +0100, Laszlo Kajan wrote:
 /usr/share/perl5/GO/IO/Dotty.pm:24: 'use GraphViz;'. However d/control does 
 not Depends: libgraphviz-perl.
 
 Module fails to load when libgraphviz-perl is not installed.

I was looking at this for a potential unblock, but had a query... why
does the debdiff contain this?

 t/data/GO.defs.obo_xml   | 2361
+++
 t/data/GO.defs.obo_xml.go_def|  987 +
 t/data/go-truncated.obo.obo_xml  |  494 
 t/data/go-truncated.obo.obo_xml.obo_text |  230 ++
 t/data/sample.ncbi_taxonomy.obo  | 1154 +++
 t/data/test-function.dat.obo_text|  469 
 t/data/test-function.dat.obo_text.obo_xml|  538 +
 t/data/test-function.dat.obo_text.obo_xml.go_ont |   72 
 t/data/test-function.dat.obo_text.pathlist   |   80 
 t/data/test-function.dat.obo_text.prolog |  399 +++
 t/data/test-function.dat.obo_text.rdf|  451 
 t/data/test-function.dat.obo_xml |  535 +
 t/data/test-function.dat.pathlist|   80 
 t/data/test-function.dat.prolog  |  398 +++
 t/data/test-function.dat.rdf |  451 

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#700047: sysvinit: fails to create /etc/inittab from a fresh debootstrap

2013-02-07 Thread David Comeau (SaturnNiGHTS)

Package: sysvinit
Version: 2.88dsf-40
Severity: critical

Hello.

It appears that with the new package that has been pushed to 
sid/unstable [sysvinit 2.88dsf-40], performing a debootstrap install 
results in an installation with no /etc/inittab.  This appears to occur 
due to a section of sysvinit.postinst not running, due to being in a 
fakeroot/chroot/install environment, and having no init process to 
reinitialize.  That section of the postinst looks like it doesn't 
execute [do_restart()], which unfortunately also includes:


if [ ! -f /etc/inittab ]
then
cp -p /usr/share/sysvinit/inittab /etc/inittab
fi

This results in a debootstrap that has no /etc/inittab, and fails:

Begin: Running /scripts/init-bottom ... done.
INIT: version 2.88 booting
INIT: No inittab file found

Enter runlevel:


David Comeau


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#700037: [Debian-med-packaging] Bug#700037: libgo-perl: libgraphviz-perl dependency missing

2013-02-07 Thread Adam D. Barratt
On Thu, 2013-02-07 at 21:53 +0100, Laszlo Kajan wrote:
  /usr/share/perl5/GO/IO/Dotty.pm:24: 'use GraphViz;'. However d/control 
  does not Depends: libgraphviz-perl.
 
  Module fails to load when libgraphviz-perl is not installed.
  
  I was looking at this for a potential unblock, but had a query... why
  does the debdiff contain this?
  
   t/data/GO.defs.obo_xml   | 2361
  +++
   t/data/GO.defs.obo_xml.go_def|  987 +
 
 Thank you Adam for pointing this out!
 
 That is my mistake. My build directory got dirty, appaently, and I
 forgot to check the debdiff before uploading.
 
 I've rebuilt it again, clean, 0.13-3, and uploaded. Debdiff now looks
 ok. Please unblock. Thank you!

Done; thanks.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#700037: [Debian-med-packaging] Bug#700037: libgo-perl: libgraphviz-perl dependency missing

2013-02-07 Thread Laszlo Kajan
 /usr/share/perl5/GO/IO/Dotty.pm:24: 'use GraphViz;'. However d/control does 
 not Depends: libgraphviz-perl.

 Module fails to load when libgraphviz-perl is not installed.
 
 I was looking at this for a potential unblock, but had a query... why
 does the debdiff contain this?
 
  t/data/GO.defs.obo_xml   | 2361
 +++
  t/data/GO.defs.obo_xml.go_def|  987 +

Thank you Adam for pointing this out!

That is my mistake. My build directory got dirty, appaently, and I forgot to 
check the debdiff before uploading.

I've rebuilt it again, clean, 0.13-3, and uploaded. Debdiff now looks ok. 
Please unblock. Thank you!

Best regards, Laszlo


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699616: gosa: diff for NMU version 2.7.4-4.2

2013-02-07 Thread Jonathan Wiltshire
tags 699616 + pending
thanks

Dear maintainer,

I've prepared an NMU for gosa (versioned as 2.7.4-4.2) and
uploaded it to DELAYED/2. Please feel free to tell me if I
should delay it longer.

Regards.

-- 
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51

directhex i have six years of solaris sysadmin experience, from
8-10. i am well qualified to say it is made from bonghits
layered on top of bonghits
diff -Nru gosa-2.7.4/debian/changelog gosa-2.7.4/debian/changelog
--- gosa-2.7.4/debian/changelog	2013-01-27 14:15:25.0 +
+++ gosa-2.7.4/debian/changelog	2013-02-07 20:28:31.0 +
@@ -1,3 +1,14 @@
+gosa (2.7.4-4.2) unstable; urgency=low
+
+  [ Jonathan Wiltshire ]
+  * Non-maintainer upload.
+
+  [ Vagrant Cascadian ]
+  * debian/gosa.postinst, debian/gosa.postrm: Only restart apache2 or lighttpd
+when binary is present. (Closes: #699616)
+
+ -- Jonathan Wiltshire j...@debian.org  Thu, 07 Feb 2013 20:28:29 +
+
 gosa (2.7.4-4.1) unstable; urgency=low
 
   * Non-maintainer upload.
diff -Nru gosa-2.7.4/debian/gosa.postinst gosa-2.7.4/debian/gosa.postinst
--- gosa-2.7.4/debian/gosa.postinst	2013-01-27 12:28:42.0 +
+++ gosa-2.7.4/debian/gosa.postinst	2013-02-07 20:27:07.0 +
@@ -59,11 +59,13 @@
   fi
 
   # Finally restart servers
+  if [ -x /usr/sbin/apache2 ]; then
   if [ -x /usr/sbin/invoke-rc.d ]; then
 invoke-rc.d apache2 reload
   else
 /etc/init.d/apache2 reload
   fi
+  fi
 fi
 
 if [ -d /etc/lighttpd/conf-available ]; then
@@ -85,11 +87,13 @@
   fi
 
   # Finally restart servers
+  if [ -x /usr/sbin/lighttpd ]; then
   if [ -x /usr/sbin/invoke-rc.d ]; then
 invoke-rc.d lighttpd reload
   else
 /etc/init.d/lighttpd reload
   fi
+  fi
 
 fi
 
diff -Nru gosa-2.7.4/debian/gosa.postrm gosa-2.7.4/debian/gosa.postrm
--- gosa-2.7.4/debian/gosa.postrm	2012-06-19 07:47:42.0 +0100
+++ gosa-2.7.4/debian/gosa.postrm	2013-02-07 20:27:07.0 +
@@ -27,11 +27,13 @@
   [ -L /etc/apache2/conf.d/gosa.conf ]  rm -f /etc/apache2/conf.d/gosa.conf
 
   # Restart servers
+  if [ -x /usr/sbin/apache2 ]; then
   if [ -x /usr/sbin/invoke-rc.d ]; then
 invoke-rc.d apache2 restart
   else
 /etc/init.d/apache2 restart
   fi
+  fi
 fi
 
 if [ -d /etc/lighttpd/conf-available ]; then
@@ -39,11 +41,13 @@
   [ -L /etc/lighttpd/conf-enabled/99gosa-lighttpd.conf ]  rm -f /etc/lighttpd/conf-enabled/99gosa-lighttpd.conf
 
   # Restart servers
+  if [ -x /usr/sbin/lighttpd ]; then
   if [ -x /usr/sbin/invoke-rc.d ]; then
 invoke-rc.d lighttpd restart
   else
 /etc/init.d/lighttpd restart
   fi
+  fi
 fi
 
 ;;


signature.asc
Description: Digital signature


Processed: gosa: diff for NMU version 2.7.4-4.2

2013-02-07 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 699616 + pending
Bug #699616 [src:gosa] gosa: postinst/rm uses -d /etc/apache2/conf.d as guard 
across calls to Apache
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
699616: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699616
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698632: rstatd: Patch 03-627217-netio.patch breaks RPC protocol compatibility for rstatd

2013-02-07 Thread Aníbal Monsalve Salazar
On Tue, Feb 05, 2013 at 03:43:56PM +0100, Salvatore Bonaccorso wrote:
At this stage of the freeze this option (droping the patch for 627217)
looks the best to me, what do you think Anibal?

Hello Salvatore,

I'll prepare a new package without it.

Cheers,

Aníbal


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699887: marked as done (TLS timing attack in polarssl (Lucky 13))

2013-02-07 Thread Debian Bug Tracking System
Your message dated Thu, 07 Feb 2013 21:32:47 +
with message-id e1u3z5l-0003z2...@franck.debian.org
and subject line Bug#699887: fixed in polarssl 1.1.4-2
has caused the Debian Bug report #699887,
regarding TLS timing attack in polarssl (Lucky 13)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
699887: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699887
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: polarssl
Severity: serious
Tags: security

Hi,

Nadhem Alfardan and Kenny Paterson have discovered a weakness in the handling
of CBC ciphersuites in SSL, TLS and DTLS. Their attack exploits timing
differences arising during MAC processing. Details of this attack can be
found at: http://www.isg.rhul.ac.uk/tls/

The problems are addressed in PolarSSL 1.2.5:
https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released

The generic protocol issue has been assigned CVE name CVE-2013-0169. The 
specific fix in PolarSSL is known as CVE-2013-1621 and CVE-2013-1622. Please 
mention these identifiers in the changelog.

Can you see to it that this issue is addressed in unstable and testing? And 
are you available to create an update for stable-security?


Cheers,
Thijs


signature.asc
Description: This is a digitally signed message part.
---End Message---
---BeginMessage---
Source: polarssl
Source-Version: 1.1.4-2

We believe that the bug you reported is fixed in the latest version of
polarssl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 699...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Roland Stigge sti...@antcom.de (supplier of updated polarssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 07 Feb 2013 22:08:26 +0100
Source: polarssl
Binary: libpolarssl-dev libpolarssl-runtime libpolarssl0
Architecture: source amd64
Version: 1.1.4-2
Distribution: unstable
Urgency: high
Maintainer: Roland Stigge sti...@antcom.de
Changed-By: Roland Stigge sti...@antcom.de
Description: 
 libpolarssl-dev - lightweight crypto and SSL/TLS library
 libpolarssl-runtime - lightweight crypto and SSL/TLS library
 libpolarssl0 - lightweight crypto and SSL/TLS library
Closes: 699887
Changes: 
 polarssl (1.1.4-2) unstable; urgency=high
 .
   * Security fix for CVE-2013-0169: Lucky 13 TLS protocol timing flaw
 including CVE-2013-1621 and CVE-2013-1622, backported from upstream
 diff from 1.2.4 to 1.2.5. (Closes: #699887)
Checksums-Sha1: 
 0ceeecc6928708ddf74bb44265bad12924689879 1174 polarssl_1.1.4-2.dsc
 4c25d337b584bcb26ad418b43079ce70128e1f94 5849 polarssl_1.1.4-2.debian.tar.gz
 0aa5b67d60a2918f7355ee7eab616aad74a4006a 206866 
libpolarssl-dev_1.1.4-2_amd64.deb
 aaeaa2f91c185bebc1dfb0e834ec7664a9488ac1 1944546 
libpolarssl-runtime_1.1.4-2_amd64.deb
 eb9de163c3dc7a8e93225db1115e5f89ea251691 142912 libpolarssl0_1.1.4-2_amd64.deb
Checksums-Sha256: 
 36e70fcdeb68c86c7260c2a71dcb7f0a2eaa03fb7053967b5515bcf940dd2959 1174 
polarssl_1.1.4-2.dsc
 bd1de8901201e1b26a6306ddb17616652bc80f5e47b4adc3d3cba63b80bc5733 5849 
polarssl_1.1.4-2.debian.tar.gz
 97ff477e462545a51671849c4eb85f9953a529aea3ce50522d4c2865e724dbcb 206866 
libpolarssl-dev_1.1.4-2_amd64.deb
 00f9071ab31f1e39c2b99866f167c5e94e659a613c64cf87b8c2ab88e6786bd0 1944546 
libpolarssl-runtime_1.1.4-2_amd64.deb
 95595fee55cfcb52eb32af0fbe0a9823e202b946c7b1bef2993cf6bb75d97f38 142912 
libpolarssl0_1.1.4-2_amd64.deb
Files: 
 f79178372844636920a7d9a92e50e580 1174 libs optional polarssl_1.1.4-2.dsc
 22871443cc0256937a8de1fcecf1d130 5849 libs optional 
polarssl_1.1.4-2.debian.tar.gz
 59327ef471269ff056b9cd0603229979 206866 libdevel optional 
libpolarssl-dev_1.1.4-2_amd64.deb
 eed5ee8d290e0dd37596c14c5727bb5a 1944546 libdevel optional 
libpolarssl-runtime_1.1.4-2_amd64.deb
 4cf74101610259a5380747441493459d 142912 libs optional 
libpolarssl0_1.1.4-2_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFRFBpOcaH/YBv43g8RAry0AJ0Qf9+Ko5/L+Nei6Ufo5kq5LZK99wCgvJD0
UZn6nIxM2EfKc1qM3VGjLY8=
=ISr+
-END PGP SIGNATUREEnd Message---


Bug#700050: libflickcurl0: New version available (and needed for new oAuth scheme)

2013-02-07 Thread Jose Carlos Garcia Sogo
Package: libflickcurl0
Version: 1.22-1
Severity: grave
Justification: renders package unusable

A new version (1.23) is available, and adds support for oAuth, which is needed
right now to authenticate in Flickr. The old method has been dropped now.


-- System Information:
Debian Release: wheezy/sid
  APT prefers quantal-updates
  APT policy: (500, 'quantal-updates'), (500, 'quantal-security'), (500, 
'quantal'), (100, 'quantal-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.5.0-23-generic (SMP w/2 CPU cores)
Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages libflickcurl0 depends on:
ii  libc62.15-0ubuntu20
ii  libcurl3-gnutls  7.27.0-1ubuntu1
ii  libxml2  2.8.0+dfsg1-5ubuntu2.1

libflickcurl0 recommends no packages.

libflickcurl0 suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#700047: sysvinit: fails to create /etc/inittab from a fresh debootstrap

2013-02-07 Thread Roger Leigh
On Thu, Feb 07, 2013 at 03:58:16PM -0500, David Comeau (SaturnNiGHTS) wrote:
 It appears that with the new package that has been pushed to
 sid/unstable [sysvinit 2.88dsf-40], performing a debootstrap install
 results in an installation with no /etc/inittab.  This appears to
 occur due to a section of sysvinit.postinst not running, due to
 being in a fakeroot/chroot/install environment, and having no init
 process to reinitialize.  That section of the postinst looks like it
 doesn't execute [do_restart()], which unfortunately also includes:
 
 if [ ! -f /etc/inittab ]
 then
 cp -p /usr/share/sysvinit/inittab /etc/inittab
 fi

Awfully sorry that this has happened, this is certainly wrong.
I'll have a -41 upload done later this evening.


Regards,
Roger

-- 
  .''`.  Roger Leigh
 : :' :  Debian GNU/Linuxhttp://people.debian.org/~rleigh/
 `. `'   schroot and sbuild  http://alioth.debian.org/projects/buildd-tools
   `-GPG Public Key  F33D 281D 470A B443 6756 147C 07B3 C8BC 4083 E800


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699887: Unblock request for polarssl 1.1.4-2

2013-02-07 Thread Roland Stigge
Hi,

polarssl 1.1.4-2 just hit unstable. Fixes security bug #699887,
CVE-2013-0169, so please unblock.

Thanks!

(Will contact the security team separately for the respective security
update for the version in stable.)

Roland


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699887: Unblock request for polarssl 1.1.4-2

2013-02-07 Thread Adam D. Barratt
On Thu, 2013-02-07 at 22:53 +0100, Roland Stigge wrote:
 polarssl 1.1.4-2 just hit unstable. Fixes security bug #699887,
 CVE-2013-0169, so please unblock.

Unblocked; thanks.

Please consider filing a usertagged unblock tag (e.g. via reportbug) in
future. They're much easier for us to keep track of.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: severity of 547092 is grave

2013-02-07 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 547092 grave
Bug #547092 [nagios-nrpe-server] nagios-nrpe-server: Insecure 'SSL' option, key 
identical for all debian systems
Severity set to 'grave' from 'important'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
547092: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=547092
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699887: Security fix for #699887, CVE-2013-0169

2013-02-07 Thread Roland Stigge
Hi,

I prepared a security upload for stable (attached debdiff). Should I
upload it to stable-security(security-master)?

Thanks,

Roland
diff -ruN temp/polarssl-0.12.1/debian/changelog polarssl-0.12.1/debian/changelog
--- temp/polarssl-0.12.1/debian/changelog   2013-02-07 22:54:41.0 
+0100
+++ polarssl-0.12.1/debian/changelog2013-02-07 22:23:50.692035233 +0100
@@ -1,3 +1,11 @@
+polarssl (0.12.1-1squeeze1) stable-security; urgency=low
+
+  * Security fix for CVE-2013-0169: Lucky 13 TLS protocol timing flaw
+including CVE-2013-1621 and CVE-2013-1622, backported from upstream
+diff from 1.2.4 to 1.2.5. (Closes: #699887)
+
+ -- Roland Stigge sti...@antcom.de  Thu, 07 Feb 2013 22:17:00 +0100
+
 polarssl (0.12.1-1) unstable; urgency=low
 
   * New upstream release.
diff -ruN temp/polarssl-0.12.1/debian/control polarssl-0.12.1/debian/control
--- temp/polarssl-0.12.1/debian/control 2013-02-07 22:54:41.0 +0100
+++ polarssl-0.12.1/debian/control  2013-02-07 22:45:29.536070015 +0100
@@ -1,7 +1,7 @@
 Source: polarssl
 Section: libs
 Priority: optional
-Maintainer: Arnaud Cornet acor...@debian.org
+Maintainer: Roland Stigge sti...@antcom.de
 Standards-Version: 3.8.3
 Build-Depends: debhelper (= 7.0.50~), quilt
 Homepage: http://polarssl.org
diff -ruN temp/polarssl-0.12.1/debian/patches/CVE-2013-0169.diff 
polarssl-0.12.1/debian/patches/CVE-2013-0169.diff
--- temp/polarssl-0.12.1/debian/patches/CVE-2013-0169.diff  1970-01-01 
01:00:00.0 +0100
+++ polarssl-0.12.1/debian/patches/CVE-2013-0169.diff   2013-02-07 
22:15:39.388022077 +0100
@@ -0,0 +1,125 @@
+Description: Fix for CVE-2013-0169
+ This patch fixes CVE-2013-0169: Lucky 13 TLS protocol timing flaw
+ This also refers to CVE-2013-1621 and CVE-2013-1622. It is a backport from
+ upstreams diff between versions 1.2.4 to 1.2.5, doing only minimal changes
+ addressing the CVE.
+Author: Roland Stigge sti...@antcom.de
+Bug-Debian: http://bugs.debian.org/699887
+
+--- polarssl-0.12.1.orig/library/ssl_tls.c
 polarssl-0.12.1/library/ssl_tls.c
+@@ -601,7 +601,7 @@
+ 
+ static int ssl_decrypt_buf( ssl_context *ssl )
+ {
+-int i, padlen;
++int i, padlen = 0, correct = 1;
+ unsigned char tmp[20];
+ 
+ SSL_DEBUG_MSG( 2, ( = decrypt buf ) );
+@@ -616,7 +616,6 @@
+ if( ssl-ivlen == 0 )
+ {
+ #if defined(POLARSSL_ARC4_C)
+-padlen = 0;
+ arc4_crypt( (arc4_context *) ssl-ctx_dec,
+ ssl-in_msg, ssl-in_msglen );
+ #else
+@@ -625,6 +624,7 @@
+ }
+ else
+ {
++size_t minlen = 0, fake_padlen;
+ /*
+  * Decrypt and check the padding
+  */
+@@ -635,6 +635,17 @@
+ return( POLARSSL_ERR_SSL_INVALID_MAC );
+ }
+ 
++if( ssl-minor_ver = SSL_MINOR_VERSION_2 )
++minlen += ssl-ivlen;
++
++if( ssl-in_msglen  minlen + ssl-ivlen ||
++ssl-in_msglen  minlen + ssl-maclen + 1 )
++{
++SSL_DEBUG_MSG( 1, ( msglen (%d)  max( ivlen(%d), maclen (%d) + 
1 ) ( + expl IV ),
++   ssl-in_msglen, ssl-ivlen, ssl-maclen ) );
++return( POLARSSL_ERR_SSL_INVALID_MAC );
++}
++
+ switch( ssl-ivlen )
+ {
+ #if defined(POLARSSL_DES_C)
+@@ -676,13 +687,20 @@
+ 
+ padlen = 1 + ssl-in_msg[ssl-in_msglen - 1];
+ 
++fake_padlen = 256 - padlen;
++
++if( ssl-in_msglen  ssl-maclen + padlen )
++{
++padlen = 0;
++fake_padlen = 256;
++correct = 0;
++}
++
+ if( ssl-minor_ver == SSL_MINOR_VERSION_0 )
+ {
+ if( padlen  ssl-ivlen )
+ {
+-SSL_DEBUG_MSG( 1, ( bad padding length: is %d, 
+-should be no more than %d,
+-   padlen, ssl-ivlen ) );
++correct = 0;
+ padlen = 0;
+ }
+ }
+@@ -695,12 +713,18 @@
+ {
+ if( ssl-in_msg[ssl-in_msglen - i] != padlen - 1 )
+ {
+-SSL_DEBUG_MSG( 1, ( bad padding byte: should be 
+-%02x, but is %02x, padlen - 1,
+-   ssl-in_msg[ssl-in_msglen - i] ) );
++correct = 0;
++fake_padlen = 256 - i;
+ padlen = 0;
+ }
+ }
++for( i = 1; i = fake_padlen; i++ )
++{
++if( ssl-in_msg[i + 1] != fake_padlen - 1 )
++minlen = 0;
++else
++minlen = 1;
++}
+ }
+ }
+ 
+@@ -715,7 +739,7 @@
+ ssl-in_hdr[3] = (unsigned char)( ssl-in_msglen  8 );
+ ssl-in_hdr[4] = (unsigned char)( ssl-in_msglen  );
+ 
+-memcpy( tmp, ssl-in_msg + ssl-in_msglen, 20 );
++memcpy( tmp, ssl-in_msg + ssl-in_msglen, ssl-maclen );
+ 
+ if( ssl-minor_ver == 

Bug#700051: sysvinit: fails to create /etc/inittab from a fresh debootstrap

2013-02-07 Thread David Comeau (SaturnNiGHTS)

Package: sysvinit
Version: 2.88dsf-40
Severity: critical

Hello.

It appears that with the new package that has been pushed to 
sid/unstable [sysvinit 2.88dsf-40], performing a debootstrap install 
results in an installation with no /etc/inittab.  This appears to occur 
due to a section of sysvinit.postinst not running, due to being in a 
fakeroot/chroot/install environment, and having no init process to 
reinitialize.  That section of the postinst looks like it doesn't 
execute [do_restart()], which unfortunately also includes:


if [ ! -f /etc/inittab ]
then
cp -p /usr/share/sysvinit/inittab /etc/inittab
fi

This results in a debootstrap that has no /etc/inittab, and fails:

Begin: Running /scripts/init-bottom ... done.
INIT: version 2.88 booting
INIT: No inittab file found

Enter runlevel:


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#685469: ekg2: missing copyright file

2013-02-07 Thread Marcin Owsiany
On Sun, Feb 03, 2013 at 05:20:24AM +0100, Andreas Beckmann wrote:
 Followup-For: Bug #685469
 Control: tag -1 patch
 
 Hi,
 
 I'm attaching my sugggested patch to fix this problem. The fixup should
 only be performed by ekg2.postinst - ekg2-core should have nothing to do
 as everything is fine within this package.

You're right. My patch was confused and incorrect.

-- 
Marcin Owsiany porri...@debian.org http://marcin.owsiany.pl/
GnuPG: 2048R/02F946FC  35E9 1344 9F77 5F43 13DD  6423 DBF4 80C6 02F9 46FC


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#547092: nrpe ssl security problem

2013-02-07 Thread Matt Taggart
As pointed out in a previous message to the bug, #547092
nagios-nrpe-server: Insecure 'SSL' option, key identical for all
debian systems is severity grave due to the security problem it
introduces in the service (but not critical since the problem is
limited to the nrpe service). I have adjusted it.

This bug hasn't had any activity for almost a year and was mostly
shouting before that. This package shouldn't be in testing/stable
until this is fixed lest others (as I did) spend a bunch of effort
implementing lots of nrpe based checks before realizing they just
opened a security hole on all their systems...

If this can't be solved, maybe we could recommend better
 alternatives?

Thanks,

-- 
Matt Taggart
tagg...@debian.org


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#547092: nrpe ssl security problem

2013-02-07 Thread Christoph Anton Mitterer
On Thu, 2013-02-07 at 14:13 -0800, Matt Taggart wrote:
 If this can't be solved, maybe we could recommend better
  alternatives?
The better alternative is using ssh with control channel
multiplexing,... which is as fast as nrpe.

The only thing missing there was a restricted shell for the remote hosts
where they can specify white (the check commands and their args) and
blacklists (evil stuff like * or ..) in order to control the
commands that the monitoring node may run (as they can do on a very,
very, limited and insecure way with nrpe).


Removing nrpe from testing is IMHO a bad idea... but I would suggest to
add big fat warnings the nrpe is completely insecure.


Cheers,
Chris.


smime.p7s
Description: S/MIME cryptographic signature


Bug#700051: Acknowledgement (sysvinit: fails to create /etc/inittab from a fresh debootstrap)

2013-02-07 Thread David Comeau (SaturnNiGHTS)
i don't know why this created again.  really sorry about that.  please 
close as already filed.


700051:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=70005



On 02/07/2013 05:09 PM, Debian Bug Tracking System wrote:

Thank you for filing a new Bug report with Debian.

This is an automatically generated reply to let you know your message
has been received.

Your message is being forwarded to the package maintainers and other
interested parties for their attention; they will reply in due course.

Your message has been sent to the package maintainer(s):
  Debian sysvinit maintainerspkg-sysvinit-de...@lists.alioth.debian.org

If you wish to submit further information on this problem, please
send it to 700...@bugs.debian.org.

Please do not send mail to ow...@bugs.debian.org unless you wish
to report a problem with the Bug-tracking system.




--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#547092: [Pkg-nagios-devel] Bug#547092: nrpe ssl security problem

2013-02-07 Thread Alexander Wirt
On Thu, 07 Feb 2013, Matt Taggart wrote:

 As pointed out in a previous message to the bug, #547092
 nagios-nrpe-server: Insecure 'SSL' option, key identical for all
 debian systems is severity grave due to the security problem it
 introduces in the service (but not critical since the problem is
 limited to the nrpe service). I have adjusted it.
 
 This bug hasn't had any activity for almost a year and was mostly
 shouting before that. This package shouldn't be in testing/stable
 until this is fixed lest others (as I did) spend a bunch of effort
 implementing lots of nrpe based checks before realizing they just
 opened a security hole on all their systems...
 
 If this can't be solved, maybe we could recommend better
  alternatives?
In fact nothing is new here and security wouldn't change much with different
keys. The implementation ist just broken. But if you have an idea to improve
it, feel free to send a patch. (as long as it doesn't make nrpe incompatible
to upstreams nrpe).

Alternatives would be check_by_ssh, check_mk, snmp. There are also some nrpe
replacements flying around but I never tested one of them.

Alex


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#547092: [Pkg-nagios-devel] Bug#547092: nrpe ssl security problem

2013-02-07 Thread Markus Frosch
Just my 2 cents (without any hat on):

TLS integration in NRPE was broken from the beginning and more or less
by design.

The real and only security feature is to configure a appropriate
allowed_hosts list, which might be enough security for internal
networks in respect of TCP sessions.

Question is: Do we really want to remove NRPE from testing because of
it promising a incomplete feature?

It should be pointed out that the TLS feature is broken, but still
allowing users to use NRPE.

Because the problem is: we (Debian) might not be able to change it -
but I personally don't want users to use some self built stuff.

2013/2/7 Matt Taggart tagg...@debian.org:
 As pointed out in a previous message to the bug, #547092
 nagios-nrpe-server: Insecure 'SSL' option, key identical for all
 debian systems is severity grave due to the security problem it
 introduces in the service (but not critical since the problem is
 limited to the nrpe service). I have adjusted it.

 This bug hasn't had any activity for almost a year and was mostly
 shouting before that. This package shouldn't be in testing/stable
 until this is fixed lest others (as I did) spend a bunch of effort
 implementing lots of nrpe based checks before realizing they just
 opened a security hole on all their systems...

 If this can't be solved, maybe we could recommend better
  alternatives?

-- 
Markus Frosch
mar...@lazyfrosch.de
http://www.lazyfrosch.de


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#547092: [Pkg-nagios-devel] Bug#547092: Bug#547092: nrpe ssl security problem

2013-02-07 Thread Michael Friedrich

On 08.02.2013 00:31, Markus Frosch wrote:

Just my 2 cents (without any hat on):

TLS integration in NRPE was broken from the beginning and more or less
by design.

The real and only security feature is to configure a appropriate
allowed_hosts list, which might be enough security for internal
networks in respect of TCP sessions.

Question is: Do we really want to remove NRPE from testing because of
it promising a incomplete feature?

It should be pointed out that the TLS feature is broken, but still
allowing users to use NRPE.

Because the problem is: we (Debian) might not be able to change it -
but I personally don't want users to use some self built stuff.


i've tried the idea of the ssl x509 patch in an unofficial nrpe fork.
lives in git here, until it dies, and will never get released, so 
beware: https://git.icinga.org/?p=icinga-irpe.git;a=summary


the nrpe implementation as is an entire mess, and one would rather 
rewrite it entirely than fix the ssl issue just for sanity. besides - 
the dh key gets generated on each configure run. so at least only the 
same package revisions share the same key.
you may figure, that not only nrpe is hard to maintain, but also nsca 
(and code wise, nagios is horrible, so is icinga 1.x).


so unless there's an idea about what to fix now or likewise, a 
maintainer capable of managing what upstream did and does wrong, there's 
not much chance to fix it. in the past you already had to fix broken 
upstream releases of nrpe/nsca/nagios and that's not really the job of a 
packager to take care of upstream's fuckups. thing is - people use and 
depend on nrpe, with or without ssl. rather then cutting that off now 
enforcing people to compile nrpe once again on their debian systems, i'd 
rather adapt the readme.


anyhow, for the alternatives - check_by_ssh or snmp. the checkmk agent 
is not capable of ssl itsself nor does it support ipv6 natively. you'd 
have to used xinetd with a ssh tunnel to make this work (and while at 
it, you could tunnel nrpe then too).



the future in icinga regards will introduce a new agent, based on the 
(already in dev) existing icinga2 message protocol (native v4/v6, x509, 
compression). but it's not yet implemented as it's planned for a later 
milestone this year.


kind regards,
Michael


--
DI (FH) Michael Friedrich

mail: michael.friedr...@gmail.com
twitter:  https://twitter.com/dnsmichi
jabber:   dnsmi...@jabber.ccc.de
irc:  irc.freenode.net/icinga dnsmichi

icinga open source monitoring
position: lead core developer
url:  https://www.icinga.org


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#547092: [Pkg-nagios-devel] Bug#547092: nrpe ssl security problem

2013-02-07 Thread Christoph Anton Mitterer
On Fri, 2013-02-08 at 00:26 +0100, Alexander Wirt wrote:
 In fact nothing is new here and security wouldn't change much with different
 keys. The implementation ist just broken. But if you have an idea to improve
 it, feel free to send a patch. (as long as it doesn't make nrpe incompatible
 to upstreams nrpe).
 
 Alternatives would be check_by_ssh, check_mk, snmp. There are also some nrpe
 replacements flying around but I never tested one of them.
All agreed... but would you consider to add some big warnings about that
fact? :)

Cheers,
Chris.


smime.p7s
Description: S/MIME cryptographic signature


Bug#547092: [Pkg-nagios-devel] Bug#547092: Bug#547092: nrpe ssl security problem

2013-02-07 Thread Christoph Anton Mitterer
Off topic but...


Hi Michael

On Fri, 2013-02-08 at 00:55 +0100, Michael Friedrich wrote:
 i've tried the idea of the ssl x509 patch in an unofficial nrpe fork.
 lives in git here, until it dies, and will never get released, so 
 beware: https://git.icinga.org/?p=icinga-irpe.git;a=summary
If nothing speaks against ssh (and at least the performance problems are
IMHO solved), that I would suggest that the long term plan should be to
drop any solution as NRPE.
What it does it remotely executing commands - well we already have a
protocol for that: ssh ... which supports many different auth methods
(certs, ssh keys, krb, etc.)


 the nrpe implementation as is an entire mess, and one would rather 
 rewrite it entirely than fix the ssl issue just for sanity. besides - 
 the dh key gets generated on each configure run. so at least only the 
 same package revisions share the same key.
That doesn't help,... still any other side with any other key can
connect.


 the future in icinga regards will introduce a new agent, based on the 
 (already in dev) existing icinga2 message protocol (native v4/v6, x509, 
 compression). but it's not yet implemented as it's planned for a later 
 milestone this year.
Does it give anything that ssh doesn't have?
Another protocol is just another thing to develop, maintain and another
attack target.


Cheers,
Chris.


smime.p7s
Description: S/MIME cryptographic signature


Bug#700061: No usable local backends

2013-02-07 Thread Andrey Rahmatullin
Package: python-selenium
Version: 2.2.0-1
Severity: grave

Current selenium package includes the firefox webdriver, which doesn't work
with recent iceweasel, and the chrome webdriver, which requires external
binaries from http://code.google.com/p/chromedriver/downloads/list
I cannot say anything about the remote driver, but absence of usable local
drivers sounds very serious to me.



-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.8.0-rc3-wrar-1+ (SMP w/4 CPU cores; PREEMPT)
Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages python-selenium depends on:
ii  python 2.7.3-3
ii  python-rdflib  2.4.2-1+b2
ii  python2.6  2.6.8-1.1
ii  python2.7  2.7.3-6

python-selenium recommends no packages.

python-selenium suggests no packages.

-- debconf-show failed


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#700051: Acknowledgement (sysvinit: fails to create /etc/inittab from a fresh debootstrap)

2013-02-07 Thread Roger Leigh
forcemerge 700048 700051
thanks

On Thu, Feb 07, 2013 at 05:11:00PM -0500, David Comeau (SaturnNiGHTS) wrote:
 i don't know why this created again.  really sorry about that.
 please close as already filed.

No worries, I'll just merge them so they are closed together.

-- 
  .''`.  Roger Leigh
 : :' :  Debian GNU/Linuxhttp://people.debian.org/~rleigh/
 `. `'   schroot and sbuild  http://alioth.debian.org/projects/buildd-tools
   `-GPG Public Key  F33D 281D 470A B443 6756 147C 07B3 C8BC 4083 E800


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed (with 1 errors): Re: Bug#700051: Acknowledgement (sysvinit: fails to create /etc/inittab from a fresh debootstrap)

2013-02-07 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 forcemerge 700048 700051
Bug #700048 [src:haveged] Log for attempted build of haveged_1.4-4 on m68k 
(dist=unstable)
Unable to merge bugs because:
package of #700051 is 'sysvinit' not 'src:haveged'
Failed to forcibly merge 700048: Did not alter merged bugs
Debbugs::Control::set_merged('transcript', 'GLOB(0x2c6a838)', 
'requester', 'Roger Leigh rle...@codelibre.net', 'request_addr', 
'cont...@bugs.debian.org', 'request_msgid', 
'20130208003739.gd21...@codelibre.net', 'request_subject', ...) called at 
/usr/local/lib/site_perl/Debbugs/Control/Service.pm line 552
eval {...} called at 
/usr/local/lib/site_perl/Debbugs/Control/Service.pm line 551
Debbugs::Control::Service::control_line('line', undef, 'clonebugs', 
'HASH(0x2be4160)', 'limit', 'HASH(0x2be3b48)', 'common_control_options', 
'ARRAY(0x2be3b90)', 'errors', ...) called at /usr/lib/debbugs/service line 474

 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
700048: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700048
700051: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700051
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: forcemerge 700047 700051

2013-02-07 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 forcemerge 700047 700051
Bug #700047 [sysvinit] sysvinit: fails to create /etc/inittab from a fresh 
debootstrap
Bug #700051 [sysvinit] sysvinit: fails to create /etc/inittab from a fresh 
debootstrap
Merged 700047 700051
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
700047: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700047
700051: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700051
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#700051: marked as done (sysvinit: fails to create /etc/inittab from a fresh debootstrap)

2013-02-07 Thread Debian Bug Tracking System
Your message dated Fri, 08 Feb 2013 00:48:23 +
with message-id e1u3c8d-0001fi...@franck.debian.org
and subject line Bug#700051: fixed in sysvinit 2.88dsf-41
has caused the Debian Bug report #700051,
regarding sysvinit: fails to create /etc/inittab from a fresh debootstrap
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
700051: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700051
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---

Package: sysvinit
Version: 2.88dsf-40
Severity: critical

Hello.

It appears that with the new package that has been pushed to 
sid/unstable [sysvinit 2.88dsf-40], performing a debootstrap install 
results in an installation with no /etc/inittab.  This appears to occur 
due to a section of sysvinit.postinst not running, due to being in a 
fakeroot/chroot/install environment, and having no init process to 
reinitialize.  That section of the postinst looks like it doesn't 
execute [do_restart()], which unfortunately also includes:


if [ ! -f /etc/inittab ]
then
cp -p /usr/share/sysvinit/inittab /etc/inittab
fi

This results in a debootstrap that has no /etc/inittab, and fails:

Begin: Running /scripts/init-bottom ... done.
INIT: version 2.88 booting
INIT: No inittab file found

Enter runlevel:
---End Message---
---BeginMessage---
Source: sysvinit
Source-Version: 2.88dsf-41

We believe that the bug you reported is fixed in the latest version of
sysvinit, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 700...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Roger Leigh rle...@debian.org (supplier of updated sysvinit package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 07 Feb 2013 23:32:12 +
Source: sysvinit
Binary: sysvinit sysvinit-utils sysv-rc initscripts bootlogd
Architecture: source amd64 all
Version: 2.88dsf-41
Distribution: unstable
Urgency: low
Maintainer: Debian sysvinit maintainers 
pkg-sysvinit-de...@lists.alioth.debian.org
Changed-By: Roger Leigh rle...@debian.org
Description: 
 bootlogd   - daemon to log boot messages
 initscripts - scripts for initializing and shutting down the system
 sysv-rc- System-V-like runlevel change mechanism
 sysvinit   - System-V-like init utilities
 sysvinit-utils - System-V-like utilities
Closes: 700051
Changes: 
 sysvinit (2.88dsf-41) unstable; urgency=low
 .
   [ Roger Leigh ]:
   * sysvinit postinst always creates /etc/inittab if absent during
 configuration (Closes: #700051).
Checksums-Sha1: 
 b82dc0119bea82529ffd767b5dd77abe436bcacf 2342 sysvinit_2.88dsf-41.dsc
 cc799e2de4188de3fadd3d134b855b0541343076 210323 
sysvinit_2.88dsf-41.debian.tar.gz
 839cf3c247401653a680f1198ec397582bc37396 133118 sysvinit_2.88dsf-41_amd64.deb
 84f7eb1719f5635cfd3adb391d0ee23b825c2183 99510 
sysvinit-utils_2.88dsf-41_amd64.deb
 d1978e2ccf1cb2b1c6fa086119433aa25012601c 81390 sysv-rc_2.88dsf-41_all.deb
 257d9997ee70d884988d03de81fcf481741b121a 94072 initscripts_2.88dsf-41_amd64.deb
 87cf96e6cb8ea5c4261d99a3f5da89d37b04e9e0 54906 bootlogd_2.88dsf-41_amd64.deb
Checksums-Sha256: 
 8f1d6e6219300df8233cd244e0b44378feb5deaa11d3b84230554b5f754e4d55 2342 
sysvinit_2.88dsf-41.dsc
 742757028aec954738ef16470269333d362b30f6016a8898f5fbb59b3bfc681e 210323 
sysvinit_2.88dsf-41.debian.tar.gz
 03ecb1e4301ddcaafff50f750bef4b7d12a3635cc0ac4e718cd9a37cf67e63cd 133118 
sysvinit_2.88dsf-41_amd64.deb
 fc76469677bac36490ae64e4bb06716a483a21b6a389e9fb691666ae1d78 99510 
sysvinit-utils_2.88dsf-41_amd64.deb
 463121f373083f92cd8c91e2161ef3e1838e6ea18dab748056004e25cd944a77 81390 
sysv-rc_2.88dsf-41_all.deb
 8900ccf6a4f2af407235156694fc5ca02797cb02d3e67a9534cd7c3afc706803 94072 
initscripts_2.88dsf-41_amd64.deb
 71a0fd26c1648d45ed87540c95bea467e300e08e2c796a4cf41acb9e66c0dabe 54906 
bootlogd_2.88dsf-41_amd64.deb
Files: 
 6e40966960924604f69e10b9c6359799 2342 admin required sysvinit_2.88dsf-41.dsc
 517972a85593ebec738a01fba0b452ab 210323 admin required 
sysvinit_2.88dsf-41.debian.tar.gz
 1012bff33f1709cf2c655ba9e62276ab 133118 admin required 
sysvinit_2.88dsf-41_amd64.deb
 9f6e7daff04593fe0213fa71a5668e99 99510 admin required 
sysvinit-utils_2.88dsf-41_amd64.deb
 

Bug#700047: marked as done (sysvinit: fails to create /etc/inittab from a fresh debootstrap)

2013-02-07 Thread Debian Bug Tracking System
Your message dated Fri, 08 Feb 2013 00:48:23 +
with message-id e1u3c8d-0001fi...@franck.debian.org
and subject line Bug#700051: fixed in sysvinit 2.88dsf-41
has caused the Debian Bug report #700051,
regarding sysvinit: fails to create /etc/inittab from a fresh debootstrap
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
700051: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700051
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---

Package: sysvinit
Version: 2.88dsf-40
Severity: critical

Hello.

It appears that with the new package that has been pushed to 
sid/unstable [sysvinit 2.88dsf-40], performing a debootstrap install 
results in an installation with no /etc/inittab.  This appears to occur 
due to a section of sysvinit.postinst not running, due to being in a 
fakeroot/chroot/install environment, and having no init process to 
reinitialize.  That section of the postinst looks like it doesn't 
execute [do_restart()], which unfortunately also includes:


if [ ! -f /etc/inittab ]
then
cp -p /usr/share/sysvinit/inittab /etc/inittab
fi

This results in a debootstrap that has no /etc/inittab, and fails:

Begin: Running /scripts/init-bottom ... done.
INIT: version 2.88 booting
INIT: No inittab file found

Enter runlevel:


David Comeau
---End Message---
---BeginMessage---
Source: sysvinit
Source-Version: 2.88dsf-41

We believe that the bug you reported is fixed in the latest version of
sysvinit, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 700...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Roger Leigh rle...@debian.org (supplier of updated sysvinit package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 07 Feb 2013 23:32:12 +
Source: sysvinit
Binary: sysvinit sysvinit-utils sysv-rc initscripts bootlogd
Architecture: source amd64 all
Version: 2.88dsf-41
Distribution: unstable
Urgency: low
Maintainer: Debian sysvinit maintainers 
pkg-sysvinit-de...@lists.alioth.debian.org
Changed-By: Roger Leigh rle...@debian.org
Description: 
 bootlogd   - daemon to log boot messages
 initscripts - scripts for initializing and shutting down the system
 sysv-rc- System-V-like runlevel change mechanism
 sysvinit   - System-V-like init utilities
 sysvinit-utils - System-V-like utilities
Closes: 700051
Changes: 
 sysvinit (2.88dsf-41) unstable; urgency=low
 .
   [ Roger Leigh ]:
   * sysvinit postinst always creates /etc/inittab if absent during
 configuration (Closes: #700051).
Checksums-Sha1: 
 b82dc0119bea82529ffd767b5dd77abe436bcacf 2342 sysvinit_2.88dsf-41.dsc
 cc799e2de4188de3fadd3d134b855b0541343076 210323 
sysvinit_2.88dsf-41.debian.tar.gz
 839cf3c247401653a680f1198ec397582bc37396 133118 sysvinit_2.88dsf-41_amd64.deb
 84f7eb1719f5635cfd3adb391d0ee23b825c2183 99510 
sysvinit-utils_2.88dsf-41_amd64.deb
 d1978e2ccf1cb2b1c6fa086119433aa25012601c 81390 sysv-rc_2.88dsf-41_all.deb
 257d9997ee70d884988d03de81fcf481741b121a 94072 initscripts_2.88dsf-41_amd64.deb
 87cf96e6cb8ea5c4261d99a3f5da89d37b04e9e0 54906 bootlogd_2.88dsf-41_amd64.deb
Checksums-Sha256: 
 8f1d6e6219300df8233cd244e0b44378feb5deaa11d3b84230554b5f754e4d55 2342 
sysvinit_2.88dsf-41.dsc
 742757028aec954738ef16470269333d362b30f6016a8898f5fbb59b3bfc681e 210323 
sysvinit_2.88dsf-41.debian.tar.gz
 03ecb1e4301ddcaafff50f750bef4b7d12a3635cc0ac4e718cd9a37cf67e63cd 133118 
sysvinit_2.88dsf-41_amd64.deb
 fc76469677bac36490ae64e4bb06716a483a21b6a389e9fb691666ae1d78 99510 
sysvinit-utils_2.88dsf-41_amd64.deb
 463121f373083f92cd8c91e2161ef3e1838e6ea18dab748056004e25cd944a77 81390 
sysv-rc_2.88dsf-41_all.deb
 8900ccf6a4f2af407235156694fc5ca02797cb02d3e67a9534cd7c3afc706803 94072 
initscripts_2.88dsf-41_amd64.deb
 71a0fd26c1648d45ed87540c95bea467e300e08e2c796a4cf41acb9e66c0dabe 54906 
bootlogd_2.88dsf-41_amd64.deb
Files: 
 6e40966960924604f69e10b9c6359799 2342 admin required sysvinit_2.88dsf-41.dsc
 517972a85593ebec738a01fba0b452ab 210323 admin required 
sysvinit_2.88dsf-41.debian.tar.gz
 1012bff33f1709cf2c655ba9e62276ab 133118 admin required 
sysvinit_2.88dsf-41_amd64.deb
 9f6e7daff04593fe0213fa71a5668e99 99510 admin required 

Bug#698632: marked as done (rstatd: Patch 03-627217-netio.patch breaks RPC protocol compatibility for rstatd)

2013-02-07 Thread Debian Bug Tracking System
Your message dated Fri, 08 Feb 2013 01:32:31 +
with message-id e1u3cpl-0002by...@franck.debian.org
and subject line Bug#698632: fixed in rstatd 4.0.1-8
has caused the Debian Bug report #698632,
regarding rstatd: Patch 03-627217-netio.patch breaks RPC protocol compatibility 
for rstatd
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
698632: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698632
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Source: rstatd
Version: 4.0.1-7
Severity: serious
Justification: Regression, mixed environments Squeeze and Wheezy

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi Anibal

At our workplace we found that the patch 03-627217-netio.patch
introduced in version 4.0.1-5 breaks the compatibility of rstatd in a
inhomogeneous setup, where wheezy, squeeze and even solaris hosts interact.

I have set the severity to serious as it introduces a 'regression' for Squeeze
- - Wheezy, where one has mixed Squeeze and Wheezy setups, but can be 
downgraded
to important if you don't agree. But IMHO should get version working in mixed
environment.

Here is a small example to reproduce the problem:

sid 192.168.122.53 (rstatd and rstat-client 4.0.1-7)
squeeze 192.168.122.54 (rstatd and rstat-client 4.0.1-4+squeeze1)

- cut-cut-cut-cut-cut-cut-
root@sid:~# rup 192.168.122.53
sid   12:50 up  3:58,1 user, load 0.00 0.01 0.04
root@sid:~# rup 192.168.122.54
rup: RPC: Success
root@sid:~#
- cut-cut-cut-cut-cut-cut-

- cut-cut-cut-cut-cut-cut-
root@squeeze:~# rup 192.168.122.53
192.168.122.53 1:00 up  , 1358769030 load 0.00 0.01 0.04
root@squeeze:~# rup 192.168.122.54
squeeze   12:50 up   2 days,3:39,1 user, load 0.00 0.00 0.00
root@squeeze:~#
- cut-cut-cut-cut-cut-cut-

(Note that rup also shows wrong information on 192.168.122.53).

Reverting the patch 03-627217-netio.patch let it work in a mixed
squeeze, wheezy environment. If 627217 can be fixed, it should probably
without breaking the protocol. After reverting the patch the requests
give again correct results.

- cut-cut-cut-cut-cut-cut-
root@sid:~# rup 192.168.122.53
sid   14:13 up  5:22,1 user, load 0.00 0.01 0.05
root@sid:~# rup 192.168.122.54
192.168.122.5414:13 up   2 days,5:02,0 user, load 0.00 0.00 0.00
- cut-cut-cut-cut-cut-cut-

- cut-cut-cut-cut-cut-cut-
root@squeeze:~# rup 192.168.122.53
192.168.122.5314:14 up  5:22,0 user, load 0.00 0.01 0.05
root@squeeze:~# rup 192.168.122.54
squeeze   14:14 up   2 days,5:02,1 user, load 0.00 0.00 0.00
root@squeeze:~#
- cut-cut-cut-cut-cut-cut-

Could you please revert at least 03-627217-netio.patch (if fixing
#627217 without creating the compatibility issue cannot be fixed)?

Regards,
Salvatore

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=qt2D
-END PGP SIGNATURE-
---End Message---
---BeginMessage---
Source: rstatd
Source-Version: 4.0.1-8

We believe that the bug you reported is fixed in the latest version of
rstatd, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 698...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian 

Bug#700050: libflickcurl0: New version available (and needed for new oAuth scheme)

2013-02-07 Thread Kumar Appaiah
On Thu, Feb 07, 2013 at 10:26:51PM +0100, Jose Carlos Garcia Sogo wrote:
 A new version (1.23) is available, and adds support for oAuth, which is needed
 right now to authenticate in Flickr. The old method has been dropped now.

Thanks for the report. I have checked the changes, and it looks as
though the changes are too heavy to accomodate at this stage in the
release process. So, I intend to request removal of this package from
wheezy. Do you have any other recommendations?

Thanks.

Kumar
-- 
Kumar Appaiah


signature.asc
Description: Digital signature


Processed: tagging 700050

2013-02-07 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 700050 + confirmed
Bug #700050 [libflickcurl0] libflickcurl0: New version available (and needed 
for new oAuth scheme)
Added tag(s) confirmed.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
700050: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700050
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698632: rstatd: Patch 03-627217-netio.patch breaks RPC protocol compatibility for rstatd

2013-02-07 Thread Aníbal Monsalve Salazar
627217 found rstatd/4.0.1-8
stop

On Mon, Jan 21, 2013 at 02:50:43PM +0100, Salvatore Bonaccorso wrote:
 Source: rstatd
 Version: 4.0.1-7
 Severity: serious
 Justification: Regression, mixed environments Squeeze and Wheezy
 
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA512
 
 Hi Anibal
 
 At our workplace we found that the patch 03-627217-netio.patch
 introduced in version 4.0.1-5 breaks the compatibility of rstatd in a
 inhomogeneous setup, where wheezy, squeeze and even solaris hosts interact.
 
 I have set the severity to serious as it introduces a 'regression' for Squeeze
 - - Wheezy, where one has mixed Squeeze and Wheezy setups, but can be 
 downgraded
 to important if you don't agree. But IMHO should get version working in mixed
 environment.
 
 Here is a small example to reproduce the problem:
 
   sid 192.168.122.53 (rstatd and rstat-client 4.0.1-7)
   squeeze 192.168.122.54 (rstatd and rstat-client 4.0.1-4+squeeze1)
 
 - cut-cut-cut-cut-cut-cut-
 root@sid:~# rup 192.168.122.53
 sid   12:50 up  3:58,1 user, load 0.00 0.01 
 0.04
 root@sid:~# rup 192.168.122.54
 rup: RPC: Success
 root@sid:~#
 - cut-cut-cut-cut-cut-cut-
 
 - cut-cut-cut-cut-cut-cut-
 root@squeeze:~# rup 192.168.122.53
 192.168.122.53 1:00 up  , 1358769030 load 0.00 0.01 
 0.04
 root@squeeze:~# rup 192.168.122.54
 squeeze   12:50 up   2 days,3:39,1 user, load 0.00 0.00 
 0.00
 root@squeeze:~#
 - cut-cut-cut-cut-cut-cut-
 
 (Note that rup also shows wrong information on 192.168.122.53).
 
 Reverting the patch 03-627217-netio.patch let it work in a mixed
 squeeze, wheezy environment. If 627217 can be fixed, it should probably
 without breaking the protocol. After reverting the patch the requests
 give again correct results.
 
 - cut-cut-cut-cut-cut-cut-
 root@sid:~# rup 192.168.122.53
 sid   14:13 up  5:22,1 user, load 0.00 0.01 
 0.05
 root@sid:~# rup 192.168.122.54
 192.168.122.5414:13 up   2 days,5:02,0 user, load 0.00 0.00 
 0.00
 - cut-cut-cut-cut-cut-cut-
 
 - cut-cut-cut-cut-cut-cut-
 root@squeeze:~# rup 192.168.122.53
 192.168.122.5314:14 up  5:22,0 user, load 0.00 0.01 
 0.05
 root@squeeze:~# rup 192.168.122.54
 squeeze   14:14 up   2 days,5:02,1 user, load 0.00 0.00 
 0.00
 root@squeeze:~#
 - cut-cut-cut-cut-cut-cut-
 
 Could you please revert at least 03-627217-netio.patch (if fixing
 #627217 without creating the compatibility issue cannot be fixed)?
 
 Regards,
 Salvatore
 
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.12 (GNU/Linux)
 
 iQIcBAEBCgAGBQJQ/UeuAAoJEHidbwV/2GP+SmsP/ivgYb8Usx1/t4L3kt1Rn6L8
 Qc2wvdq92n76axAJ8XYDEyhvZH1AQHLa3SQihNbfQEtDp0Br7OP4uaqrSB+zPhE/
 +VIv4iffUmKTCimAeBdQnSyrzoY2OgzKxExga0ESaK7Eld/UtrPDJdrz4DSPlcS2
 XpIg6HzwNImkVjkAzOb0rWo/CP2JsQvO8yJ4I8W0Ojh+GczXFugkJ8PMh3siesxw
 jm2tI6Sd1uLu7dtFmb+EScLCdZy7PB8g8MoyxmXZDOAXQ+D+n+BL+T+jYC6Mentg
 KgJb0/URM2FO6blGYNgAEfptYP6TGK6IODlpe2217S/HUDFo3X2KUHU3mIWk0udJ
 JGxHZhhONaMXnjZSl4+beynl/hs1KD0PxP560A6EvkfRoeakOVaHbpCBly/88WaQ
 zY1+TSy/oDumcG7Tf2MBbo3NiAY9WYzni2Z6/J2P5wI3VVadIzQtbZFcZDq5nUp2
 pzF/glRw1ZLc2bK6c/D8xRiMceAlTL/LnLUUkoNGcfmEjQ/I4BJGosQr4UFUmUT4
 7q7za/9xhqoqxYpsayKRcCo577tOVibEn55QnIElBv0zm/9YdsgxdX0w4i4A8LXF
 x0Rnzy4tUitA4/8Id8rpbhixLohXrpYVvYsbfP3nixbx9KdeA4MV48AsMZcgiXjX
 psYM7kFTjZcA2osZ/tqd
 =qt2D
 -END PGP SIGNATURE-

Hello Thomas,

Christian Oetzel's patch introduced a regression and I would be great if
he could have look at this bug report: http://bugs.debian.org/698632

The original patches are at: http://bugs.debian.org/627217

Please pass this message on to Christian Oetzel.

Cheers,

Anibal


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#700067: mtpfs: did not show file in folder without subfolders

2013-02-07 Thread z7z8th
Package: mtpfs
Version: 1.1-4
Severity: grave
Tags: patch
Justification: renders package unusable

Dear Maintainer,
   * What led up to the situation?
mount my android phone with mtpfs-1.1, it will not show files in
folder that didn't have a subfolder.

   * What exactly did you do (or not do) that was effective (or
 ineffective)?
1. mount my phone to a folder: mtpfs -o rw /media/phone
2. open a terminal, cd to a folder with files but no subfolder,
and run ls, nothing will show.

   * What was the outcome of this action?
I can't found some files under the mount point.

   * What outcome did you expect instead?
Show all my files under the mount point.

Here's a patch for this bug. I've tested it, now it can show all my
files.

--- mtpfs-1.1/mtpfs.c   2013-02-07 17:21:31.526325953 +0800
+++ mtpfs-1.1-fix/mtpfs.c   2013-02-07 17:25:22.378680386 +0800
@@ -725,12 +725,12 @@ mtpfs_readdir (const gchar * path, void
 if (folder_id==-2) {
 DBG(Root of storage area);
 folder=storageArea[storageid].folders;
+if (folder == NULL) return_unlock(0);
 } else {
 folder = LIBMTP_Find_Folder (storageArea[storageid].folders,
folder_id);
 if (folder == NULL) return_unlock(0);
 folder = folder-child;
 }
-if (folder == NULL) return_unlock(0);

 while (folder != NULL) {
 if ((folder-parent_id == folder_id) ||

One thing need to mention, I'm using the latest libmtp at sourceforge,
because the version in debian cannot mount my phone.
But I think it won't make any difference to this bug.

-- System Information:
Debian Release: 7.0
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'testing-updates'), (500,
'testing-proposed-updates'), (500, 'stable-updates'), (500,
'proposed-updates'), (500, 'stable'), (400, 'unstable'), (1,
'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages mtpfs depends on:
ii  fuse  2.9.0-2+deb7u1
ii  libc6 2.13-37
ii  libfuse2  2.9.0-2+deb7u1
ii  libglib2.0-0  2.33.12+really2.32.4-3
ii  libid3tag00.15.1b-10
ii  libmad0   0.15.1b-7
ii  libmtp9   1.1.3-35-g0ece104-4
ii  libusb-1.0-0  2:1.0.11-1
ii  zlib1g1:1.2.7.dfsg-13

mtpfs recommends no packages.

mtpfs suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699859: update

2013-02-07 Thread Random Anonymous
When removing the Linux check, playonlinux starts. However, when
trying to install a windows program (7zip), it downloads a linux
version of wine. This (obviously) doesn't work. Maybe recoding
playonlinux to download a custom GNU/kfreeBSD version of wine would
help, but I can understand that this project isn't on the front
burner.

Tldr: It doesn't do anything useful.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699866: clang crashes while translating a trivial C++ program

2013-02-07 Thread Andrey Rahmatullin
On Wed, Feb 06, 2013 at 02:08:10AM +0100, Christian Böhme wrote:
 Package: clang
 Version: 3.0-6
 Severity: grave
 Justification: renders package unusable
 
 Dear Maintainer,
 
 compiling this program
 
 ---8---
 #include cstddef
 
 
 int main ( int argc, char * argv[] )
 {
 int * i = new int (100);
 int j = (*i) + 4;
 delete i;
 
 return j;
 }
 ---8---
 
 causes clang to crash in the lexer complaining about the execution
 of an Illegal instruction and suggesting to file a report with
 
   http://llvm.org/bugs/.
FWIW it doesn't crash on amd64 sid and i386 wheezy.

-- 
WBR, wRAR


signature.asc
Description: Digital signature


Bug#700068: xfe-themes, xfe-i18n: unhandled symlink to directory conversion: /usr/share/doc/PACKAGE

2013-02-07 Thread Andreas Beckmann
Package: xfe-themes,xfe-i18n
Version: 1.32.5-1
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

an upgrade test with piuparts revealed that your package installs files
over existing symlinks and possibly overwrites files owned by other
packages. This usually means an old version of the package shipped a
symlink but that was later replaced by a real (and non-empty)
directory. This kind of overwriting another package's files cannot be
detected by dpkg.

This was observed on the following upgrade paths:

  squeeze - wheezy

For /usr/share/doc/PACKAGE this may not be problematic as long as both
packages are installed, ship byte-for-byte identical files and are
upgraded in lockstep. But once one of the involved packages gets
removed, the other one will lose its documentation files, too,
including the copyright file, which is a violation of Policy 12.5:
http://www.debian.org/doc/debian-policy/ch-docs.html#s-copyrightfile

For other overwritten locations anything interesting may happen.

Note that dpkg intentionally does not replace directories with symlinks
and vice versa, you need the maintainer scripts to do this.
See in particular the end of point 4 in
http://www.debian.org/doc/debian-policy/ch-maintainerscripts.html#s-unpackphase

For switching from a symlink to a directory, the *preinst* script
should do something like this:

DOCDIR=/usr/share/doc/@@PACKAGE@@

if [ -L $DOCDIR ] ; then
rm $DOCDIR
fi


From the attached log (usually somewhere in the middle...):

0m53.2s INFO: dirname part contains a symlink:
  /usr/share/doc/xfe-themes/changelog.Debian.gz (xfe-themes) != 
/usr/share/doc/xfe/changelog.Debian.gz (xfe)
  /usr/share/doc/xfe-themes/changelog.gz (xfe-themes) != 
/usr/share/doc/xfe/changelog.gz (xfe)
  /usr/share/doc/xfe-themes/copyright (xfe-themes) != 
/usr/share/doc/xfe/copyright (xfe)

1m1.7s INFO: dirname part contains a symlink:
  /usr/share/doc/xfe-i18n/changelog.Debian.gz (xfe-i18n) != 
/usr/share/doc/xfe/changelog.Debian.gz (xfe)
  /usr/share/doc/xfe-i18n/changelog.gz (xfe-i18n) != 
/usr/share/doc/xfe/changelog.gz (xfe)
  /usr/share/doc/xfe-i18n/copyright (xfe-i18n) != /usr/share/doc/xfe/copyright 
(xfe)


cheers,

Andreas


xfe-themes_1.32.5-1.log.gz
Description: GNU Zip compressed data


Bug#700069: vim-lesstif: unhandled symlink to directory conversion: /usr/share/doc/PACKAGE

2013-02-07 Thread Andreas Beckmann
Package: vim-lesstif
Version: 2:7.3.547-6
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

an upgrade test with piuparts revealed that your package installs files
over existing symlinks and possibly overwrites files owned by other
packages. This usually means an old version of the package shipped a
symlink but that was later replaced by a real (and non-empty)
directory. This kind of overwriting another package's files cannot be
detected by dpkg.

This was observed on the following upgrade paths:

  squeeze - wheezy

For /usr/share/doc/PACKAGE this may not be problematic as long as both
packages are installed, ship byte-for-byte identical files and are
upgraded in lockstep. But once one of the involved packages gets
removed, the other one will lose its documentation files, too,
including the copyright file, which is a violation of Policy 12.5:
http://www.debian.org/doc/debian-policy/ch-docs.html#s-copyrightfile

For other overwritten locations anything interesting may happen.

Note that dpkg intentionally does not replace directories with symlinks
and vice versa, you need the maintainer scripts to do this.
See in particular the end of point 4 in
http://www.debian.org/doc/debian-policy/ch-maintainerscripts.html#s-unpackphase

For switching from a symlink to a directory, the *preinst* script
should do something like this:

DOCDIR=/usr/share/doc/@@PACKAGE@@

if [ -L $DOCDIR ] ; then
rm $DOCDIR
fi


From the attached log (usually somewhere in the middle...):

1m0.7s INFO: dirname part contains a symlink:
  /usr/share/doc/vim-lesstif/NEWS.Debian.gz (vim-lesstif) != 
/usr/share/doc/vim-gui-common/NEWS.Debian.gz (vim-gui-common)
  /usr/share/doc/vim-lesstif/changelog.Debian.gz (vim-lesstif) != 
/usr/share/doc/vim-gui-common/changelog.Debian.gz (vim-gui-common)
  /usr/share/doc/vim-lesstif/copyright (vim-lesstif) != 
/usr/share/doc/vim-gui-common/copyright (vim-gui-common)


cheers,

Andreas


vim-lesstif_2:7.3.547-6.log.gz
Description: GNU Zip compressed data


Bug#699744: nagios3-cgi: prompting due to modified conffiles which were not modified by the user: /etc/nagios3/stylesheets/outages.css

2013-02-07 Thread Guillem Jover
Hi!

On Wed, 2013-02-06 at 00:50:29 +0100, Andreas Beckmann wrote:
 On Tuesday, 5. February 2013 01:01:43 Vagrant Cascadian wrote:
  As far as I can tell, /etc/nagios3/stylesheets/* were introduced in the
  squeeze nagios3-cgi package. /etc/nagios3/cgi.cfg was a conffile with
  nagios3-common in wheezy, and transitioned to nagios3-cgi for wheezy. My
  guess is something wrong in the transition from nagios3-common to
  nagios3-cgi for cgi.cfg, but I'm not sure what exactly is needed there.

 OK. I see what happened here. Not nagios3's fault.
 Bug #689836: dpkg: md5sums incorrectly recorded for conffile takeover
 http://bugs.debian.org/689836
 
 So it's broken in squeeze (dpkg database is corrupted, i.e. contains the 
 wrong 
 md5sums (well, it contains the correct md5sums, too, but at the wrong 
 place)). Whether this happens depends on the configuration order. If 
 nagios-doc is configured before nagios3-cgi it will record the new md5sum for 
 updated conffiles for nagios3-doc instead of nagios-cgi ... even if it no 
 longer owns these files.
 
 I have no idea how many packages are possibly affected by this or how this 
 can 
 be fixed ... therefore Cc:ing Guillem.

TBH I'm not sure how many can be affected, my guess would be not many
though.

 Wait, we can try this:
 
 # apt-get install --reinstall nagios3-cgi
 # dpkg -s nagios3-cgi
[...]
 
 Great, that FIXED the DB.

Right, it should just be either a matter of time, once every problematic
package has been upgraded after getting a fixed dpkg, or people actively
reinstalling broken packages. In any case, for wheezy I guess it would
be nice to strongly recommend on the release notes to upgrade dpkg first.

I also had in mind checking with the SRM if the fix for the above dpkg
bug would be fine for a stable update, among some others, but only
after having those in unstable and testing for a long while. But that
will still not guarantee that people have upgraded to that stable dpkg
version before the wheezy dist-upgrade, so...

Thanks,
Guillem


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#687407: marked as done (xdotool: FTBFS: cannot load such file -- xdo_test_helper)

2013-02-07 Thread Debian Bug Tracking System
Your message dated Fri, 08 Feb 2013 03:17:34 +
with message-id e1u3et0-00055q...@franck.debian.org
and subject line Bug#680824: fixed in xdotool 1:2.20100701.2961-3+deb7u2
has caused the Debian Bug report #680824,
regarding xdotool: FTBFS: cannot load such file -- xdo_test_helper
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
680824: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680824
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Source: xdotool
Version: 1:2.20100701.2961-3
Severity: serious
Tags: wheezy sid
User: debian...@lists.debian.org
Usertags: qa-ftbfs-20120912 qa-ftbfs
Justification: FTBFS in wheezy on amd64

Hi,

During a rebuild of all packages in *wheezy*, your package failed to
build on amd64.

Relevant part:
 make[5]: Entering directory `/«PKGBUILDDIR»'
 make[5]: Nothing to be done for `all'.
 make[5]: Leaving directory `/«PKGBUILDDIR»'
 Setting up keymap on new server as us
 /usr/lib/ruby/1.9.1/rubygems/custom_require.rb:36:in `require': cannot load 
 such file -- xdo_test_helper (LoadError)
   from /usr/lib/ruby/1.9.1/rubygems/custom_require.rb:36:in `require'
   from test_basic.rb:5:in `main'
 make[4]: *** [do-test] Error 1

The full build log is available from:
   
http://people.debian.org/~lucas/logs/2012/09/12/xdotool_2.20100701.2961-3_wheezy.log

A list of current common problems and possible solutions is available at 
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.
---End Message---
---BeginMessage---
Source: xdotool
Source-Version: 1:2.20100701.2961-3+deb7u2

We believe that the bug you reported is fixed in the latest version of
xdotool, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 680...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Daniel Kahn Gillmor d...@fifthhorseman.net (supplier of updated xdotool 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 07 Feb 2013 22:00:34 -0500
Source: xdotool
Binary: xdotool libxdo2 libxdo-dev
Architecture: source amd64
Version: 1:2.20100701.2961-3+deb7u2
Distribution: testing-proposed-updates
Urgency: low
Maintainer: Daniel Kahn Gillmor d...@fifthhorseman.net
Changed-By: Daniel Kahn Gillmor d...@fifthhorseman.net
Description: 
 libxdo-dev - library for simulating X11 keyboard/mouse input
 libxdo2- library for simulating X11 keyboard/mouse input
 xdotool- simulate X11 keyboard/mouse input
Closes: 680824
Changes: 
 xdotool (1:2.20100701.2961-3+deb7u2) testing-proposed-updates; urgency=low
 .
   * revert previous build attempt (thanks Michael Stapelberg for your work!)
   * build-depend on ruby1.8, build-conflict on ruby1.9.1 (Closes: #680824)
   * remove non-us typing tests (upstream doesn't expect them to work)
Checksums-Sha1: 
 71990af05b1fd5f2af6557793d214277555a7175 2253 
xdotool_2.20100701.2961-3+deb7u2.dsc
 d337ed7305f7be4527e520e60471b95114138739 6257 
xdotool_2.20100701.2961-3+deb7u2.debian.tar.gz
 31a6e559ffa60d4cca005563764273b104137a3d 38116 
xdotool_2.20100701.2961-3+deb7u2_amd64.deb
 f62458f83f49c2428b9cfb7ef8264210ca519fc8 28512 
libxdo2_2.20100701.2961-3+deb7u2_amd64.deb
 ea8551c217befcaf6d172f5b58ce1700cde40907 124284 
libxdo-dev_2.20100701.2961-3+deb7u2_amd64.deb
Checksums-Sha256: 
 fcc958b895f2eeb1b8edaee03ca845d114ca536b7d2b1987ca36d1fe6280cce9 2253 
xdotool_2.20100701.2961-3+deb7u2.dsc
 6e1c00da7b1bff639db98f4ebcea950baaff7a15b156bbfec112f1b6b40f3195 6257 
xdotool_2.20100701.2961-3+deb7u2.debian.tar.gz
 fa5fd24fc38485fa450b6ef496b4d952d1b6ff7ed70a67e4b470da6545204481 38116 
xdotool_2.20100701.2961-3+deb7u2_amd64.deb
 b73d8b4d3d00412156afa7deaa91f13e692952d2b073fd0021bd73083a438187 28512 
libxdo2_2.20100701.2961-3+deb7u2_amd64.deb
 5b2d61c561b3389301b1be2bcd51f10ef762b88fb6d3a702683a939456ec69e4 124284 
libxdo-dev_2.20100701.2961-3+deb7u2_amd64.deb
Files: 
 12d56b6b166ee44015e97c54e7f8dc55 2253 x11 extra 
xdotool_2.20100701.2961-3+deb7u2.dsc
 

Bug#680824: marked as done (xdotool: FTBFS: /usr/lib/ruby/1.9.1/rubygems/custom_require.rb:36:in `require': cannot load such file -- xdo_test_helper (LoadError))

2013-02-07 Thread Debian Bug Tracking System
Your message dated Fri, 08 Feb 2013 03:17:34 +
with message-id e1u3et0-00055q...@franck.debian.org
and subject line Bug#680824: fixed in xdotool 1:2.20100701.2961-3+deb7u2
has caused the Debian Bug report #680824,
regarding xdotool: FTBFS: /usr/lib/ruby/1.9.1/rubygems/custom_require.rb:36:in 
`require': cannot load such file -- xdo_test_helper (LoadError)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
680824: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680824
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Source: xdotool
Version: 1:2.20110530.1-3
Severity: serious
Tags: wheezy sid
User: debian...@lists.debian.org
Usertags: qa-ftbfs-20120708 qa-ftbfs
Justification: FTBFS on amd64

Hi,

During a rebuild of all packages in sid, your package failed to build on
amd64.

Relevant part:
 make[6]: Entering directory `/«PKGBUILDDIR»'
 make[6]: Nothing to be done for `all'.
 make[6]: Leaving directory `/«PKGBUILDDIR»'
 Running test_basic.rb
 Setting up keymap on new server as us
 /usr/lib/ruby/1.9.1/rubygems/custom_require.rb:36:in `require': cannot load 
 such file -- xdo_test_helper (LoadError)
   from /usr/lib/ruby/1.9.1/rubygems/custom_require.rb:36:in `require'
   from test_basic.rb:5:in `main'
 make[5]: *** [do-test] Error 1

The full build log is available from:
   
http://people.debian.org/~lucas/logs/2012/07/08/xdotool_2.20110530.1-3_unstable.log

A list of current common problems and possible solutions is available at 
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.


---End Message---
---BeginMessage---
Source: xdotool
Source-Version: 1:2.20100701.2961-3+deb7u2

We believe that the bug you reported is fixed in the latest version of
xdotool, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 680...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Daniel Kahn Gillmor d...@fifthhorseman.net (supplier of updated xdotool 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 07 Feb 2013 22:00:34 -0500
Source: xdotool
Binary: xdotool libxdo2 libxdo-dev
Architecture: source amd64
Version: 1:2.20100701.2961-3+deb7u2
Distribution: testing-proposed-updates
Urgency: low
Maintainer: Daniel Kahn Gillmor d...@fifthhorseman.net
Changed-By: Daniel Kahn Gillmor d...@fifthhorseman.net
Description: 
 libxdo-dev - library for simulating X11 keyboard/mouse input
 libxdo2- library for simulating X11 keyboard/mouse input
 xdotool- simulate X11 keyboard/mouse input
Closes: 680824
Changes: 
 xdotool (1:2.20100701.2961-3+deb7u2) testing-proposed-updates; urgency=low
 .
   * revert previous build attempt (thanks Michael Stapelberg for your work!)
   * build-depend on ruby1.8, build-conflict on ruby1.9.1 (Closes: #680824)
   * remove non-us typing tests (upstream doesn't expect them to work)
Checksums-Sha1: 
 71990af05b1fd5f2af6557793d214277555a7175 2253 
xdotool_2.20100701.2961-3+deb7u2.dsc
 d337ed7305f7be4527e520e60471b95114138739 6257 
xdotool_2.20100701.2961-3+deb7u2.debian.tar.gz
 31a6e559ffa60d4cca005563764273b104137a3d 38116 
xdotool_2.20100701.2961-3+deb7u2_amd64.deb
 f62458f83f49c2428b9cfb7ef8264210ca519fc8 28512 
libxdo2_2.20100701.2961-3+deb7u2_amd64.deb
 ea8551c217befcaf6d172f5b58ce1700cde40907 124284 
libxdo-dev_2.20100701.2961-3+deb7u2_amd64.deb
Checksums-Sha256: 
 fcc958b895f2eeb1b8edaee03ca845d114ca536b7d2b1987ca36d1fe6280cce9 2253 
xdotool_2.20100701.2961-3+deb7u2.dsc
 6e1c00da7b1bff639db98f4ebcea950baaff7a15b156bbfec112f1b6b40f3195 6257 
xdotool_2.20100701.2961-3+deb7u2.debian.tar.gz
 fa5fd24fc38485fa450b6ef496b4d952d1b6ff7ed70a67e4b470da6545204481 38116 
xdotool_2.20100701.2961-3+deb7u2_amd64.deb
 b73d8b4d3d00412156afa7deaa91f13e692952d2b073fd0021bd73083a438187 28512 
libxdo2_2.20100701.2961-3+deb7u2_amd64.deb
 5b2d61c561b3389301b1be2bcd51f10ef762b88fb6d3a702683a939456ec69e4 124284 
libxdo-dev_2.20100701.2961-3+deb7u2_amd64.deb
Files: 
 

Bug#677565: Bug#682518: Bug#677565: RC bugs in msva-perl

2013-02-07 Thread Daniel Kahn Gillmor
On 02/04/2013 01:28 PM, Dominic Hargreaves wrote:
 On Sat, Feb 02, 2013 at 03:31:33PM +0100, intrigeri wrote:
 FWIW, I've asked about the same on the Monkeysphere mailing-list last
 October, see dkg's answer there:
 https://lists.riseup.net/www/arc/monkeysphere/2012-10/

I've just pushed a proposed upstream msva-perl/0.8.1 targetted bugfix
tag to git://lair.fifthhorseman.net/~dkg/msva-perl, and a wheezy
branch that uses that and targets testing-proposed-updates.

The debdiff between 0.8-2 and the proposed 0.8.1-1 is attached here.  It
is smaller than the previously-submitted changeset to 0.9.1-1, but it is
still non-trivial, alas, due to having to accomodate the new Net::Server
and the change to avoid crashing X11 sessions if the agent fails for any
reason we were not able to anticipate.

I've tested 0.8.1-1 on a wheezy system and it works for me.  I plan to
upload it to t-p-u sometime tomorrow or the next day unless i hear from
anyone that it didn't work for them.

Regards,

--dkg
diff -Nru msva-perl-0.8/Changelog msva-perl-0.8.1/Changelog
--- msva-perl-0.8/Changelog 2010-12-20 16:11:39.0 -0500
+++ msva-perl-0.8.1/Changelog   2013-02-08 00:28:19.0 -0500
@@ -1,3 +1,11 @@
+msva-perl (0.8.1) upstream;
+
+  * stable release:
+   - cherry-picked bugfixes from 0.9 and 0.9.1; reduced refactoring
+changes to get it to work safely with wheezy.
+
+ -- Daniel Kahn Gillmor d...@fifthhorseman.net  Thu, 07 Feb 2013 23:33:46 
-0500
+
 msva-perl (0.8) upstream;
 
   * Minor bugfix release!
diff -Nru msva-perl-0.8/Crypt/Monkeysphere/MSVA/Client.pm 
msva-perl-0.8.1/Crypt/Monkeysphere/MSVA/Client.pm
--- msva-perl-0.8/Crypt/Monkeysphere/MSVA/Client.pm 2010-12-20 
16:11:39.0 -0500
+++ msva-perl-0.8.1/Crypt/Monkeysphere/MSVA/Client.pm   2013-02-08 
00:28:19.0 -0500
@@ -145,7 +145,7 @@
 
 $self-{logger} = Crypt::Monkeysphere::MSVA::Logger-new($args{log_level});
 $self-{socket} = $args{socket};
-$self-{socket} = 'http://localhost:8901'
+$self-{socket} = 'http://127.0.0.1:8901'
   if (! defined $self-{socket} or $self-{socket} eq '');
 
 # create the user agent
diff -Nru msva-perl-0.8/Crypt/Monkeysphere/MSVA/Logger.pm 
msva-perl-0.8.1/Crypt/Monkeysphere/MSVA/Logger.pm
--- msva-perl-0.8/Crypt/Monkeysphere/MSVA/Logger.pm 2010-12-20 
16:11:39.0 -0500
+++ msva-perl-0.8.1/Crypt/Monkeysphere/MSVA/Logger.pm   2013-02-08 
00:28:19.0 -0500
@@ -45,6 +45,8 @@
 my $self = shift;
 my $msglevel = shift;
 
+$msglevel = 'error'
+  if (! defined($msglevel));
 if ($loglevels{lc($msglevel)} = $self-{loglevel}) {
   printf STDERR @_;
 }
@@ -88,7 +90,7 @@
 my $class = shift;
 my $loglevel = shift;
 
-my $self = {loglevel = $loglevels{lc($loglevel)}};
+my $self = {loglevel = $loglevels{defined($loglevel) ? lc($loglevel) : 
'error'}};
 $self-{loglevel} = $loglevels{error}
   if (!defined $self-{loglevel});
 
diff -Nru msva-perl-0.8/Crypt/Monkeysphere/MSVA/MarginalUI.pm 
msva-perl-0.8.1/Crypt/Monkeysphere/MSVA/MarginalUI.pm
--- msva-perl-0.8/Crypt/Monkeysphere/MSVA/MarginalUI.pm 2010-12-20 
16:11:39.0 -0500
+++ msva-perl-0.8.1/Crypt/Monkeysphere/MSVA/MarginalUI.pm   2013-02-08 
00:28:19.0 -0500
@@ -46,7 +46,8 @@
 }
 
 foreach my $keyfpr (@subvalid_key_fprs) {
-  my $fprx = sprintf('0x%.40s', $keyfpr-{fpr}-as_hex_string());
+  $keyfpr-{fpr}-as_hex_string() =~ /([[:xdigit:]]{0,40})/;
+  my $fprx = '0x' . $1;
   $logger-log('debug', checking on %s\n, $fprx);
   foreach my $gpgkey ($gnupg-get_public_keys_with_sigs($fprx)) {
 $logger-log('debug', found key %.40s\n, 
$gpgkey-fingerprint-as_hex_string);
diff -Nru msva-perl-0.8/Crypt/Monkeysphere/MSVA.pm 
msva-perl-0.8.1/Crypt/Monkeysphere/MSVA.pm
--- msva-perl-0.8/Crypt/Monkeysphere/MSVA.pm2010-12-20 16:11:39.0 
-0500
+++ msva-perl-0.8.1/Crypt/Monkeysphere/MSVA.pm  2013-02-08 00:28:19.0 
-0500
@@ -376,7 +376,7 @@
 
 # This is part of a spawned child process.  We don't want the
 # child process to destroy the update monitor when it terminates.
-$self-{updatemonitor}-forget();
+$self-{updatemonitor}-forget() if exists $self-{updatemonitor}  
defined $self-{updatemonitor};
 my $clientinfo = get_client_info(select);
 my $clientuid = $clientinfo-{uid};
 
@@ -759,17 +759,22 @@
 my $self = shift;
 my $server = shift;
 
-$self-spawn_master_subproc($server);
+$self-spawn_as_child($server);
   }
 
-  sub master_subprocess_died {
+  sub pre_accept_hook {
 my $self = shift;
 my $server = shift;
-my $subproc_return = shift;
 
-my $exitstatus = POSIX::WEXITSTATUS($subproc_return);
-msvalog('verbose', Subprocess %d terminated; exiting %d.\n, 
$self-{child_pid}, $exitstatus);
-$server-set_exit_status($exitstatus);
+$self-parent_changed($server) if (defined $self-{parent_pid}  
getppid() != $self-{parent_pid});
+  }
+
+  sub parent_changed